Video security: Achieving IP VMS scalability through aggregation

CCTV Handbook 2014 Surveillance

IP video management systems (IP VMS) used in video security today have an increasing need to deliver new services and features to a large and ever-growing class of new users. These users’ roles go beyond the traditional security mission.

Providing these new services and features becomes even more complicated across multiple independent systems. Some IP VMS solutions rely on system federation to connect multiple systems. However, a different approach – aggregation – offers improved ease of administration and better overall system performance.

Diagram 1. An aggregated solution.
Diagram 1. An aggregated solution.

Previously thought of as mainly security focused, the camera and data feeds monitored by a traditional video management system (VMS) are now being used to manage day-to-day operations, ensure policies are being followed, and ultimately make organisations run more efficiently. Recognising video system data more broadly as information that can inform all kinds of decisions has led to growth in the base of VMS users. Growing businesses are hungry to consolidate and put this information to good use, driving optimisations across their organisations.

An expanded mission for IP video systems

In the broad sense, business owners, security administrators and their responsible delegates are looking to maintain some level oversight across their organisation. More and more, this oversight is extending beyond the traditional security considerations and into operational ones.

The regional manager of a retail store wants to ensure a promotion is set up correctly without driving to each store.

A facilities representative at home wants to validate that an off-hours alarm is a credible threat before dispatching local law enforcement, avoiding potential fees for nuisance alarm responses.

A factory manager utilises security camera feeds to ensure conveyor belts are running as expected, potentially even detecting belt failures prior to breakages, minimising risk to employees and improving factory up time.

An airport uses analytics built into security cameras to calculate the wait time at security check-in locations and updates signs directing passengers to shorter lines, thus improving customer satisfaction.

These newfound uses for what was previously video security specific data require more effective ways to manage and distribute access.

The problem

New user types are being added to the traditional VMS user base, beyond the standard security officer, supervisor or operator. Demands are being made from marketing, operations, facilities and more to leverage the information captured by the security deployment.

Additionally, an increased expectation of connectivity, driven largely by expanding networks and the proliferation of mobile technology, is placing new demands on systems that previously could have been close-looped. Users need access to pertinent information, often from multiple systems available whenever and wherever they happen to be.

Administrators need to ensure that the right people have access to the right information at the right time across these global distributions. An influx of non-security and untrained operators is placing new demands on user interfaces, driving the need for customisation and simplification to ensure that the data a given user needs is what is made available to them.

Traditional video management systems were optimised around the security and surveillance user – supporting CCTV-style keyboards and calling up cameras by camera number or selecting a camera from a lengthy list of cameras, sophisticated search queries for finding and retrieving recorded video, and even more complicated export processes to ensure the authenticity of evidence.

While these systems continue to evolve to further incorporate the needs of security operators, the resulting interfaces and architectures are becoming unbearable for non-security operators.

Finding and displaying a megapixel camera on a monitor in the security operations room is one problem. Serving up a view of that camera and all other related cameras from twenty different stores for the regional produce manager of a grocery chain working on a laptop from his hotel room is quite a different problem indeed.

In order to best meet these diverse needs, Pelco by Schneider Electric is pursuing an approach using proven, standards-based technologies which provide the necessary structure to manage geographically and logically distributed systems.

By treating the VMS as an information system and grouping disparate VMS system information together, employing an aggregated architecture similar to those used by news aggregators and Web-hosting companies, critical information can be both centrally managed and accessed by the user base.

An aggregation solution

Pelco’s aggregated architecture approach decentralises the actual information, by keeping it local, while centralising its flow, or the access to it. This has several advantages over current available models focusing on system federation, where information within a federation must be synchronised across the systems.

Among these are reductions in overall system complexity, reductions in cross-traffic due to synchronisations, less concern over link failures creating database synchronisation problems, more efficient latency management and improved load balancing opportunities. The introduction of the aggregation layer also provides an effective way to provide access to new enhancements for a legacy install base.

These benefits stem from a reduction in data duplication and database synchronisation operations across the system. Traditional VMS systems have had the ability to connect to multiple, independent systems for several years. The DigitalSentry system from Pelco by Schneider Electric, for example, uses the ControlPoint client to connect to any number of systems and display the cameras and recorders from those systems.

However, if a given user’s permissions change to where that user needs to now see a new camera or be prevented from seeing an existing camera, it is important to have a method of updating clients and servers with new credential information.

Active Directory and LDAP interfaces help, but still require a considerable amount of synchronisation information to be exchanged between different servers. This same problem is also present in traditional federated solutions, which attempt to coordinate access across systems by sharing, synchronising and replicating database information.

An aggregation approach, on the other hand, treats each system as an independent entity, pulling from the relevant systems at run time, through the client interface. While permissions exist on each independent system, through the aggregation interface, an administrator can manage permissions and push changes out from a central location; pertinent information can be captured into one database and shared with other enterprise applications instead of repeating the same function on each independent system, one at a time.

While the aggregation architecture enables centralised access to and management of the broader organisation, it accomplishes this by providing and facilitating access to the relevant local systems rather than storing a representation of the full organisation of systems and attempting to keep that synchronised. This allows the structure to be separated from the user access/permissions management, pushing those decisions downstream; thus allowing it to scale more appropriately.

As depicted in the diagram, each site can be effectively managed locally as an independent entity. When an organisation determines that it is necessary to see across all their installations, the aggregation server software can be installed, creating the aggregation layer.

Once installed, the aggregation layer is accessed via the same user experience interface being distributed with Pelco products today. There is no waiting period while the local databases synchronise with some central authority or with each other. The only difference the user sees is that they now log into the aggregation server.

System aggregation in a nutshell

System aggregation cleanly allows a system administrator to group information across distributed systems by leveraging proven information sharing architectures and disciplines. Pairing the topology with Web-based user interfaces further simplifies the sharing of information to users regardless of where they are or what device they are using.

For more information contact Pelco by Schneider Electric, +27 (0)11 254 6400, [email protected], www.schneider-electric.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Identity, Security & Access Alliance focuses on intelligence and integration
SMART Security Solutions Ideco Biometrics BoomGate Systems Bosch Building Technologies Technews Publishing Integrated Solutions Surveillance Access Control & Identity Management
The Identity, Security & Access Alliance (ISAA) hosted several launch events in Johannesburg in August, showcasing the participating companies’ technical solutions with a primary focus on the solutions made possible by integrating high-quality systems to deliver comprehensive solutions.

Read more...
Make BIG and COMPLEX small and manageable
neaMetrics Suprema AI & Data Analytics Surveillance Integrated Solutions
Traditional CCTV and access systems often operate separately, creating gaps in visibility and efficiency. TRASSIR and Suprema have partnered to develop an integrated platform that improves security, operations, and situational awareness.

Read more...
Get the AI fundamentals right
Technews Publishing SMART Security Solutions Leaderware Editor's Choice Surveillance AI & Data Analytics
Much of the marketing for CCTV AI detection implies the client can just drop the AI into their existing systems and operations, and they will be detecting all criminals and be far more efficient when doing it.

Read more...
SMART Surveillance Conference in Johannesburg
Arteco Global Africa Technews Publishing SMART Security Solutions Axis Communications SA neaMetrics Editor's Choice Surveillance Security Services & Risk Management Logistics (Industry) AI & Data Analytics
SMART Security Solutions hosted its annual SMART Surveillance Conference in Johannesburg in July, welcoming several guests, sponsors, and speakers for an informative and enjoyable day examining the evolution of the surveillance market.

Read more...
LiDAR protects railways from new and existing dangers
Surveillance
3D LiDAR (Light Detection and Ranging) sensors are being installed to monitor rail traffic and ensure safety of passengers as well as individuals walking near the tracks, or trying to perform dangerous stunts for social media.

Read more...
Securing South Africa’s logistics sector
Secutel Technologies Products & Solutions Surveillance Logistics (Industry)
Unlike traditional guarding services, Visual Verifier operates on an ‘Always On’ principle, ensuring continuous 24/7 coverage of warehouses, depots, transit hubs, and delivery points.

Read more...
Unlock the future of security operations in Bloemfontein
DeepAlert News & Events Surveillance
Security professionals and business leaders are invited to revolutionise their offsite monitoring operations at the DeepAlert Product Road Show, taking place on 16 – 17 September 2025, at the Schoemanspark Golf Club, Bloemfontein.

Read more...
Your Wi-Fi router is about to start watching you
News & Events Surveillance Security Services & Risk Management
Advanced algorithms are able to analyse your Wi-Fi signals and create a representation of your movements, turning your home's Wi-Fi into a motion detection and personal identification system.

Read more...
Secure, modernise and optimise CCTV
Surveillance Products & Solutions
Industrial and commercial organisations are navigating complex digital transformation processes. With SecuVue, companies can bridge the gap between operational technology and information technology for safer, smarter operations.

Read more...
Eagle Eye Precision Person & Vehicle Detection
Surveillance Products & Solutions AI & Data Analytics
Eagle Eye’s new Precision Person & Vehicle Detection feature detects people and vehicles at long distances with high accuracy and is especially designed for customers who actively monitor for intruders

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.