huawei vcn3000 technical white paper - actfornet€¦ · huawei vcn3000 technical white paper h...
TRANSCRIPT
Huawei VCN3000 Technical White Paper
HUAWEI TECHNOLOGIES CO., LTD.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
i
Copyright © Huawei Technologies Co., Ltd. 2013. All rights reserved.
No part of this document may be reproduced or transmitted in any form or by any means without prior
written consent of Huawei Technologies Co., Ltd.
Trademarks and Permissions
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective
holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and
the customer. All or part of the products, services and features described in this document may not be
within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements,
information, and recommendations in this document are provided "AS IS" without warranties, guarantees or
representations of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.
Huawei Technologies Co., Ltd.
Address: Huawei Industrial Base
Bantian, Longgang
Shenzhen 518129
People's Republic of China
Website: http://www.huawei.com
Email: [email protected]
Huawei eSpace VCN3000
Technical Whitepaper Contents
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
ii
Contents
1 Overview ......................................................................................................................................... 1
1.1 Product Introduction ..................................................................................................................................................... 1
1.2 Service Introduction ...................................................................................................................................................... 2
1.2.1 System Management .................................................................................................................................................. 2
1.2.2 Live Video Surveillance ............................................................................................................................................. 3
1.2.3 Recording Management ............................................................................................................................................. 4
1.2.4 Video Wall ................................................................................................................................................................. 4
1.2.5 Intelligent Analysis .................................................................................................................................................... 5
1.2.6 NE Management ........................................................................................................................................................ 5
2 Key Technologies .......................................................................................................................... 6
2.1 Security and Reliability Design .................................................................................................................................... 6
2.1.1 Hardware Reliability Design ..................................................................................................................................... 6
2.1.2 SafeVideo ................................................................................................................................................................... 7
2.1.3 DataSafe ................................................................................................................................................................... 11
2.1.4 Media Transmission Security ................................................................................................................................... 12
2.1.5 Video Buffering and Resumable Upload ................................................................................................................. 13
2.2 Easy-to-Use Design .................................................................................................................................................... 14
2.2.1 Plug-and-Play PUs ................................................................................................................................................... 14
2.2.2 Automatic Device Inspection ................................................................................................................................... 15
2.2.3 Automatic Client Upgrade ....................................................................................................................................... 17
2.2.4 PU Integration Management .................................................................................................................................... 18
2.3 Open and Compatible Design ..................................................................................................................................... 18
2.3.1 PU Access ................................................................................................................................................................ 18
2.3.2 Platform Interconnection ......................................................................................................................................... 19
2.3.3 Access Control and Alarm Systems ......................................................................................................................... 20
Huawei eSpace VCN3000
Technical Whitepaper 1 Overview
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
1
1 Overview
1.1 Product Introduction
Product
Huawei VCN3000 is a comprehensive intelligent video surveillance platform that integrates
the Huawei Intelligent Video Surveillance (IVS) system and dedicated storage products. The
VCN3000 integrated video surveillance platform offers multiple IVS features, such as HD
video, high performance, high reliability, open architecture, easy maintenance, simplified
management, and convenient deployment.
Video surveillance services are now widely applied in a variety of fields, such as safe city,
emergency command, traffic surveillance, and campus security. To fully meet surveillance
service requirements in these fields, VCN3000 integrates multiple applications, such as live
video surveillance, recording query, recording playback, PTZ control, alarm linkage, voice
intercom, and e-Map.
System architecture
Figure 1-1 shows the logical relationships among internal modules of VCN3000.
Figure 1-1 Logical architecture
Presentation layer C/S client
Control layer Management layer
Platform communication gateway (PCG)
Service control unit (SCU)
Device connection gateway (DCG)
Service management unit
(SMU)
Media layer
Media unit (MU)Operation
management unit (OMU)
Huawei eSpace VCN3000
Technical Whitepaper 1 Overview
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
2
Module Function
Client Displays services and provides a user interface for service
operation and configuration.
Platform connection
gateway (PCG)
Connects to third-party video surveillance platforms that
support GA/T669 and GB/T28181 platform access protocols.
(The PCG can be customized to support more protocols.)
Service control unit
(SCU)
Provides configuration management and service control
functions, such as device management, alarm management,
recording management, login authentication, alarm processing,
PTZ control, and PU access.
Device connection
gateway (DCG)
Connects to PUs, such as encoders, cameras, Digital Video
Recorder (DVRs), and alarm devices. The DCG:
Supports PUs that comply with the Open Network Video
Interface Forum (ONVIF) 1.02, ONVIF 2.0, or ONVIF
Profile S protocol.
Supports PUs that comply with China Mobile Clairvoyance
protocols, GB/T28181, and third-party software
development kits (SDKs).
Supports the access of Conwin and Honeywell alarm
systems, Siemens access control system, and customized
alarm devices.
Media unit (MU) Controls media stream services, such as establishing,
forwarding, and stopping media streams, linking video, and
managing recordings (including storage, query, download, and
playback) functions.
Service management unit
(SMU)
Provides configuration management and service control
functions, such as device management, user management,
alarm management, recording management, signaling routing,
login authentication, alarm processing, and multi-level
multi-domain functions.
Operation management
unit (OMU)
Manages system operation, including initial configuration of
systems and devices, daemon process safeguard, and
performance monitoring, supporting the connection to the
network management system (NMS).
1.2 Service Introduction
1.2.1 System Management
Service Description
User management Allows the administrator to centrally manage all users in the
system.
Huawei eSpace VCN3000
Technical Whitepaper 1 Overview
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
3
1.2.2 Live Video Surveillance
VoD
Authorized users can view live video from surveillance sites using remote clients. A client
enables users to operate the surveillance system anytime anywhere on any physical terminal.
PTZ control
Users can control PTZ cameras in real time. The system administrator can prioritize PTZ
control, which ensures that the system preferentially responds to control commands from
users with higher priorities. Users with a higher priority can lock a PTZ camera to prevent
users with a lower priority from controlling it. Users with a higher priority can also unlock the
PTZ camera in order to resume the PTZ control rights of users with a lower priority.
Voice functions
The system supports the voice intercom and broadcast between the surveillance center and
surveillance sites.
e-Map
Role management Allows the administrator to configure user rights in batches.
Device management Allows the access of PUs including IPCs, DVRs, and DVSs
and allows users to centrally manage all connected PUs.
External domain
information management
Allows authorized users to configure external domain
information.
Storage space management Allows administrators to manage all camera storage space in
a unified manner.
Recording plan
management
Allows users to assign, modify, delete, and query recording
plans for cameras.
PTZ preset position
management
Allows users to centrally manage preset positions of all
connected cameras.
Home position
management
Allows users to centrally manage home positions of all
connected cameras.
Tour track management Allows users to manage camera tour tracks. (A tour track
consists of multiple preset positions.)
Tour plan management Allows users to centrally manage tour plans of all connected
cameras.
Alarm linkage
management
Allows users to centrally manage alarm linkage policies in
the video surveillance system.
Alarm log management Allows users to centrally manage all alarm logs.
System log management Allows users to manage logs that records information about
system operating status and historical user operations.
License management Allows users to manage the e-Map and the numbers of
connected cameras in the local domain and external domains.
Huawei eSpace VCN3000
Technical Whitepaper 1 Overview
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
4
Users can import and manage map images in .jpg, .png, and .bmp formats. Users can perform
live video surveillance and query surveillance sites and alarm sources on electronic maps.
When an alarm is generated, a user can quickly locate the alarm source, view surrounding
conditions, find an appropriate surveillance camera, and view live video from the camera.
1.2.3 Recording Management
Client recording
During live video surveillance, users can record video on the client and store the recorded
video on a local hard disk.
Platform recording
Alarm-triggered recording
Alarm-triggered recording is one of the alarm linkage actions. When detecting an alarm,
the system links a specified camera to record video for a specified period of time and
stores the recorded video to the storage device.
Scheduled recording
Users can schedule recording plans (including the start time, end time, and recording
duration) for cameras in the video surveillance system. The system records video as
specified in the recording plan. Users can enable the system to record video for all day
long or for a specified period of time.
Manual recording
Users can upload recorded surveillance video to the surveillance center for future video
release or evidence collection. Video stored in the surveillance center enjoys higher
reliability than that stored on the client.
PU recording
Users can enable PUs (for example, IPCs and DVRs) with local storage devices to record
video and to directly store recorded video on the local storage devices. This helps save
bandwidth resources required in video uploading.
Video playback and download
Users can play back recordings on the client or download recordings (MP4) to the local PC
and use a common player to play the downloaded recordings.
Video buffering
Maintenance personnel can enable the video buffering function. When the network is
disconnected, cameras with the buffering function temporarily store video on their storage
media as specified in the recording plan. Once the network is restored, the system sends a
video request to the cameras, and the cameras upload their stored video to the system.
This video buffering function is available only for IPCs that support the function and have local SD
cards.
1.2.4 Video Wall
The video wall is widely applied in surveillance centers. A video wall consists of multiple
large Liquid Crystal Displays (LCDs). Users can play surveillance videos on a video wall and
zoom in to view image details.
Huawei eSpace VCN3000
Technical Whitepaper 1 Overview
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
5
1.2.5 Intelligent Analysis
The VCN3000 supports intelligent analysis on PUs. The VCN3000 automatically detects key
information in video feeds using different intelligent analysis modes, reducing labor costs and
improving detection efficiency. Users can view track and alarm information collected during
video analysis. The VCN3000 provides a wide assortment of intelligent analysis applications
to meet service requirements in different scenarios. The intelligent analysis functions include
tripwire detection, intrusion detection, abandoned object detection, removed object detection,
and loitering detection.
The intelligent analysis function is available only for the following IPCs:
IPC6121-I, IPC6121-WD-I, IPC6521-Z20-FI, IPC6521-Z20-I, IPC6111-I, IPC6111-L1-I,
IPC6511-Z20-FI, and IPC6511-Z20-I
1.2.6 NE Management
After connecting to a network management system (NMS), the VCN3000 can inspect system
operations and report status information. Users can manage the access of service NEs, IPCs,
servers, storage devices in a unified manner and centrally collect and manage alarm,
performance, and topology information using the NMS. The unified convergence of data and
surveillance methods allow users to conveniently view information (for example, about
alarms, performance, and statistics), monitor system operation, and manage NEs.
Huawei eSpace VCN3000
Technical Whitepaper 2 Key Technologies
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
6
2 Key Technologies
2.1 Security and Reliability Design
Considering the complexity of the video surveillance system, Huawei leverages the
high-reliability design at the hardware layer and multi-layer data protection design at the
service layer to ensure service continuity and data integrity.
2.1.1 Hardware Reliability Design
Highly integrated design
The VCN3000 uses the integrated design, allowing a single device to integrate the following
functions:
PU access
Real-time forwarding (prevention)
PU control (control)
Device management
Storage management
Policy management (management)
Video storage
Video query
VoD
Video download (query)
In newly developed or reformed video surveillance projects, this integrated design helps to
reduce the number of external servers and faulty nodes, improve the reliability of the entire
surveillance system, and lower project implementation and system O&M costs.
BIOS redundancy
The VCN3000 supports BOIS redundancy. By deploying two BIOSs in active/standby mode,
the system can perform service switchover when the active BIOS is faulty, improving system
reliability. Users can specify a BIOS for startup, which allows diversified user rights
assignment and facilitates operation rights control.
Huawei eSpace VCN3000
Technical Whitepaper 2 Key Technologies
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
7
Component redundancy
The VCN3000 uses the redundancy design for components, such as CPUs, network ports, and
memories. When a component encounters a hardware fault, the system instantly switch
services to the backup component to ensure service continuity. The power supply module uses
"1+1" redundancy design and supports load balancing.
Hard disk optimization
The VCN3000 isolates data disks from system disks to improve data security. The VDL board
is used to lower the hard disk fault rate, improve hard disk reliability, optimize hard disk I/O
fault processing, and enable intelligent restoration upon hard disk input errors.
Intelligent disk power-on technology
A storage system usually has a large number of hard disks. When being powered on
concurrently, these hard disks generate considerable impact on the power supply module and
may even cause serious accidents such as current overload or trips. The VCN3000 uses the
intelligent disk power-on technology, which is soft start of hard disks, to control startup
current, reduce overall power consumption, and lower system O&M costs. When the device is
powered on, all hard disks switch to the soft-startup mode. That is, the system uses the
dedicated cyclic scanning algorithm to control the power-on sequence of hard disks,
alleviating the power supply pressure. During normal system operation, the system resumes
hard disks to quick power-on mode to ensure that hot swappable hard disks are powered on
promptly.
2.1.2 SafeVideo
While large-scale, HD, and network-based video surveillance is becoming the industry trend,
users are facing challenges of massive data storage and frequent video clip loss. Video
surveillance applications must meet strict regulations to ensure video data integrity.
Surveillance video cannot be recovered once lost. Therefore, hard disk data protection is of
vital importance to video surveillance. Customers require efficient storage, protection, and I/O
of massive video surveillance data.
Based on the in-depth study on steaming media services, Huawei has developed SafeVideo
technology to effectively meet service requirements in the field of streaming media storage.
SafeVideo is an optimized technology that can make full use of video surveillance devices to
store and protect streaming media.
Block Storage (BS)
In traditional solutions, video recordings are stored in files, and video streaming data is
divided into multiple files for storage. Users must invoke stored video files to play back
historical video. Large-scale surveillance systems that use file-based storage system have two
major technical defects. One is that the system faces challenges in processing millions of
recording files, and the other is that the file-based storage system will create massive disk
fragmentation, resulting in system performance deterioration.
SafeVideo uses the block-based storage solution to solve the preceding problems. Video data
is read and written in sequence. In addition, new video data can overwrite the earliest video
data when the storage duration expires.
Huawei eSpace VCN3000
Technical Whitepaper 2 Key Technologies
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
8
Table 2-1 File-based storage and block-based storage
Block storage File storage
Bad Sector Recovery
In media storage, SafeVideo provides disk virtualization technology to divide the physical
disk space into logical and reserved parts. Reserved space takes about 5‰ of the total disk
space for bad sector replacement.
In the traditional RAID system, when the number of bad sectors reach 500, the hard disk is
considered faulty. SafeVideo storage technology allows the system to automatically detect bad
sectors in disks. When detecting a bad sector, the system replaces the bad sector with reserved
space and tries to rectify the bad sector. This improves hard disk availability and reduces the
system fault rate.
SafeVideo, as a proved media storage technology, is applied in multiple commercial sites,
reducing hard disks' annual fault rate to lower than 1%, which is far lower than the industry
average fault rate 5%.
Figure 2-1 Disk space division
Ph
ysic
al sp
ace
Logic part
Reserved part
Lo
gic
sp
ace
The hard disk virtualization technology divides the physical disk space into the following two
parts:
Logical part: stores user data area.
Reserved part: replaces bad sectors.
Huawei eSpace VCN3000
Technical Whitepaper 2 Key Technologies
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
9
Efficient Data Storage and Access Technology
The VCN3000 adopts SafeVideo storage technology dedicated for video surveillance
solutions to enable direct hard disk access. This prevents performance loss caused by
multi-level buffering and partition in the file system and RAID group during data access. By
enabling direct hard disk access and sparing I/O request division, SafeVideo significantly
enhances video I/O performance.
In storage software module design, SafeVideo uses I/O features optimized based on video
surveillance features. This raises the single-time I/O throughput, improves system
performance, and reduces the I/O frequency. The optimized algorithm improves system
reliability, increases disk space usage, and extends hard disk life cycles.
Figure 2-2 SafeVideo
In traditional video surveillance storage, when a hard disk in the RAID group is faulty, the
global hot spare disk will be used for RAID group reconstruction. When the faulty disk is
replaced with a functional one, the system copies data from the global hot spare disk to the
new disk.
This process usually takes hours, bringing pressure to the storage system. Additionally, if
another disk goes faulty during the data copyback, the entire RAID group fails. When the data
copyback is complete, the global hot spare disk is set to the hot backup state. Device
performance deteriorates during RAID group reconstruction and data copyback.
SafeVideo uses the dynamic hot spare disk technology to automatically change the hot spare
disk to a member disk in the RAID group. When a hard disk in the RAID group is faulty, the
system uses the global spare disk for RAID group reconstruction. When a new hard disk is
added to the RAID group, the system uses this new hard disk as the global hot spare disk,
preventing stability risks and performance deterioration.
Media-dedicated RAID Technology
In traditional RAID technologies, such as RAID 5 data and verification information are
evenly distributed in all disks. Therefore, when two (RAID 5), all data in the RAID group will
be lost (cannot be restored), causing serious consequences.
Huawei eSpace VCN3000
Technical Whitepaper 2 Key Technologies
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
10
Figure 2-3 Dedicated RAID
RAID group Hot spare disk RAID group Hot spare disk
RAID group Hot spare diskRAID groupHot spare disk
RAID performance improved with the increase
of the disk count
RAID group hang-up when multiple hard disks are faulty simultaneously
Available LUN and readable data
No data transfer in data disk replacement
SafeVideo storage technology consecutively writes video data into hard disks in large blocks.
In addition to automatic system recovery upon single-disk failure (similar to RAID 5), this
technology allows the system to protect data in normal hard disks when two or more hard
disks are faulty simultaneously. Though data in faulty disks will be lost (no available
technology can protect data in these disks), SafeVideo can minimize data loss. In typical
11-disk RAID groups, when two or more hard disks are faulty simultaneously, SafeVideo
loses 10% video data while traditional RAID 5 loses all.
Load Balancing Among RAID Groups
The VCN3000 uses 36-disk high-density design. Hard disks in a frame can be classified into
multiple RAID groups. The system balances load among these groups to protect streaming
media data.
To ensure that RAID groups synchronously write data, Huawei develops the intelligent
load-balancing algorithm based on RAID group capacity and media traffic to enable
automatic load balancing among RAID groups. When a RAID group is faulty, the system
automatically switches live streaming media data to another RAID group for storage.
Figure 2-4 Intelligent load balancing
Network video storage node
RAID group 1
RAID group 2
Network video storage node
RAID group 1
RAID group 2
The intelligent load balancing design improves data reliability on video storage nodes.
Huawei eSpace VCN3000
Technical Whitepaper 2 Key Technologies
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
11
Plug-and-Play Storage Technology
Widely-used HD cameras require a high-performance video storage system to collect, store,
and use video data. In addition, disk technology evolution brings hard disks with larger
capacity and lower costs. In 2014, 4-TB hard disks will become mainstream storage media for
video surveillance. Traditional storage technologies face challenges in system efficiency and
data stability of RAID groups that have large-capacity hard disks.
SafeVideo uses the innovative plug-and-play design to completely solve these two problems
for RAID-based storage solutions that use large-capacity disks.
Figure 2-5 Plug-and-play storage
RAID group Hot spare disk
Data disk replacement
RAID group hang-up when multiple hard disks are faulty
simultaneously
RAID performance improved with the increase
of the disk count
No data transfer in data disk replacement
RAID group
RAID groupRAID group
SafeVideo has the following features:
Web-based configuration: SafeVideo provides typical optimized configuration plans,
allowing a common user who has no solid technical knowledge to complete system
configuration.
Optimized fast-initialization algorithm: When started and properly configured, a
full-capacity 108-TB RAID group can complete initialization within 10 minutes.
Compared with traditional RAID technologies, SafeVideo shortens the system
deployment period by over 50 hours.
Being mechanical parts, hard disks can go faulty after running for a certain period of
time. When two or more hard disks in a traditional RAID group are faulty, all data is lost.
To recover the service system, users need to perform professional configuration and
time-consuming initialization. SafeVideo uses innovative technologies and services to
switch the faulty RAID group to read state, allowing users to read data from normal hard
disks. After the system detects and replaces faulty hard disks, SafeVideo uses dedicated
algorithms to automatically reconstruct the RAID group without compromising service
data. The entire process can be completed within 1 minute, supporting plug-and-play.
2.1.3 DataSafe
DataSafe is a software system running on a single host. It periodically backs up
VCN3000-related configuration, environment, and application data saved in the system disk
that may be modified during the running of the system. When a major data fault (such as
system disk damage) occurs, users can restore the entire system using the latest backup data
after the system and application software are reinstalled.
Huawei eSpace VCN3000
Technical Whitepaper 2 Key Technologies
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
12
Figure 2-6 Quick index recovery
Quick index recovery
Index in the system disk
Data disk System disk
Index backup in the data disk
Index recovery from the data disk upon system hard disk replacement
Data disk System disk
Data disk System disk
DataSafe can:
Make multiple copies of key data in the system disk to the data disk.
Replace the faulty system disk with a new one to restore the system disk data.
Automatically find the latest and intact data in the data disk to restore the system disk
database, configuration files, and video index files when the system is reinstalled.
2.1.4 Media Transmission Security
Media transmission protects video data security during network transmission, especially
wireless network transmission. The system encrypts encoded video data and transmits the data
to the server, and the server decrypts the data for storage. The server encrypts video data
requested by a user and transmits the encrypted video data the client. The client decrypts the
video data for playing.
Huawei's video surveillance platform uses the encrypted media transmission technology to
generate initial encryption information and sends the information to IPCs. IPCs use the
encryption information to obtain final encryption keys, encrypt video data by combining these
keys into video streams, send the encrypted video data to the platform. When receiving
encrypted video data, the platform decrypts data for storage or output. This prevents media
information loss and improves media transmission security.
Figure 2-7 Media stream decryption
Huawei eSpace VCN3000
Technical Whitepaper 2 Key Technologies
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
13
2.1.5 Video Buffering and Resumable Upload
When collecting video data and signals using IPCs, the system uses networks to transmit them
to the platform. Network reliability, therefore, becomes a key index to measure video
surveillance system reliability. However, network outages and faults are inevitable during
video surveillance. A mature video surveillance platform must be able to prevent video data
loss upon network outages. Huawei's video surveillance platform uses video buffering
technologies to temporarily store video in storage media embedded in IPCs or encoders upon
network outages. This effectively prevents video data loss caused by network disconnection
and ensures video data integrity.
Figure 2-8 Video buffering and resumable upload
Normal data upload
Actual network faulty pointEstimated
network faulty point
Network recovery point
Normal data upload
Data stored in the local
buffering area during network
outages
Data stored in the local SD card during
network outages Integral
central query data
This video buffering function is available only for IPCs that support the function and have local SD
cards.
1. When the network is properly connected, the system transmits video data to the
VCN3000 for storage over networks.
Figure 2-9 Normal network
Surveillance platform IPCSynchronous detection for
the heartbeat line
Data transmission when the network is normal
2. When the network between the VCN3000 and IPC malfunctions, the system uses the
heartbeat mechanism to detect the network outage and records network status
information. When detecting the network outage, the IPC instantly starts video recording
to store video data in the local SD card. If the network outage lasts for a long period of
time and the size of recorded video exceeds the preset upper limit, the IPC overwrites the
earliest data using the latest one.
Huawei eSpace VCN3000
Technical Whitepaper 2 Key Technologies
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
14
The IPC may not be able to detect the network outage instantly when the outage occurs.
To prevent data loss, the system uses the buffering function to store buffer data in the SD
card. For example, during video surveillance, an IPC buffers 10s of video in its memory.
When the network is restored, the buffered data is deleted when the 10s period elapses.
When a network outage occurs, the system stores the buffered data to the SD card.
Figure 2-10 Faulty network
Surveillance platform IPC Embedded storage cardSynchronous detection for the heartbeat line
PU storage upon network outagesBuffering +
download
3. When detecting network recovery, the VCN3000 automatically queries absent
surveillance video and sends a request to the IPC for recording transmission based on the
preset recording policies. If an exception occurs during video transmission, the
VCN3000 resends the request. The IPC will not delete recordings before the recordings
are successfully transmitted to ensure data integrity and continuity. When the recordings
are successfully transmitted, the IPC automatically deletes video data stored in the local
SD card.
Figure 2-11 Recovered network
Surveillance platform RTP dual streams IPCEmbedded
storage card
Synchronous detection for the heartbeat line
Video upload upon network coverage
IP
2.2 Easy-to-Use Design
2.2.1 Plug-and-Play PUs
Video surveillance systems have growing scales, bringing higher costs to IPC configuration,
installation, commissioning, and maintenance. When deploying an IPC, users need to
configure the parameters on both the IPC and platform to ensure successful connection
between them. To successfully configure the system, users must be familiar with IPCs and
video surveillance services, which is not user-friendly.
Huawei eSpace VCN3000
Technical Whitepaper 2 Key Technologies
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
15
Figure 2-12 Automatic detection for PUs
Detecting new devices
Model: eSpace IPC 5811-WD-Z20Vendor: Huawei
SVN:20:12:07:02:20:57
View
2.2.2 Automatic Device Inspection
In addition to live video surveillance and video storage, the video surveillance system also
provides the automatic device inspection service. In traditional video surveillance systems,
when a camera is faulty, the system cannot detect the fault until the faulty camera is required.
Dedicated maintenance personnel are required to complete time-consuming system inspection
and maintenance, which brings higher O&M costs. Therefore, users need a new video
surveillance solution that can detect and report device faults in a timely and accurate manner.
As major PU devices, Huawei IPCs use the automatic inspection design to monitor the device
operating status and detect system faults, such as temperature and SD card I/O exceptions.
This improves system maintenance efficiency and reduces device maintenance costs.
Figure 2-13 Automatic inspection and fault report
Surveillance platform Real-time video streams IPC System maintenance
Automatic inspection
Device
maintenance
Inspection personnel
Automatic fault-information report
Quickly troubleshooting
IP
Real-time information streams
Temperature Alarm
Huawei IPCs have embedded temperature sensors that can measure the temperature inside the
camera in a real-time manner. When detecting that the inside temperature of an IPC stays
above the upper limit for the specified period of time, the IPC automatically generates an
alarm and sends the alarm to the surveillance center. When receiving alarms and camera
information, the surveillance center dispatches technical personnel for system maintenance.
Huawei eSpace VCN3000
Technical Whitepaper 2 Key Technologies
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
16
Figure 2-14 IPC temperature alarm and maintenance notification
IPC
Timely
maintenance
Maintenance personnel
Temperature alarm information report
Device maintenanceSwitch Surveillance platform
Alarm information
process
IP IP
Automatic Temperature Adjustment (PTZ Camera)
Huawei PTZ IPCs support automatic temperature adjustment. When detecting that the inside
temperature of a PTZ IPC is not within the preset operating temperature, the IPC uses the
internal logic circuit to enable the embedded fan or heater for temperature adjustment. If the
temperature adjustment is proved to be ineffective, the IPC automatically generates an alarm
and sends the alarm to the surveillance center, request manual maintenance services.
Figure 2-15 PTZ IPC temperature control
PTZ IPC
Automatic temperature
control
Temperature alarm information report
Timely
maintenance
Maintenance personnel
Device maintenance
Switch Surveillance platform
Alarm information process
IP IP
Fan Fault Detection
Huawei PTZ IPCs support fan fault detection function. When the embedded fan of an IPC is
faulty, the IPC automatically generates an alarm and sends the alarm to the surveillance center,
request manual maintenance services.
SD-Card Inspection
Huawei IPCs support the SD card inspection function. When an SD card is inserted into an
IPC, the IPC starts SD card inspection. When detecting an SD card I/O exception, the IPC
automatically generates an alarm and sends the alarm to the surveillance center.
When detecting a fault during SD card utilization, the IPC records alarm information in alarm
logs and sends the alarm to the surveillance center.
Huawei eSpace VCN3000
Technical Whitepaper 2 Key Technologies
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
17
Figure 2-16 SD card fault detection
IPC
SD card fault detection
Timely
maintenance
Reporting alarm information
Maintenance personnel
Device maintenance
Switch Surveillance platform
Alarm information process
IPIP
2.2.3 Automatic Client Upgrade
Continuous surveillance technologies development and surveillance platform evolution
require users to upgrade clients accordingly to ensure the normal operation of new services
and functions. Traditional video surveillance system uses manual upgrade, which is
inconvenient and time-consuming. Huawei's video surveillance platform uses the automatic
upgrade technology to enable batch client upgrade.
Figure 2-17 Automatic client upgrade
Client Surveillance platform
Client upgrade and verification request (client type and version number)
Version verificationVerification result
Upgrade request
Upgrade-package transmission
Package installation
1. A user logs in to the client, enters the user name and password, and sends the CU version
number and client type (PC, Android phone, Android tablet, iPhone, or iPad) to the
surveillance platform for version verification.
2. The platform verifies client version information, and sends back information about
whether system upgrade is needed and how large is the installation package.
− Need upgrade: The system displays a message, indicating that software upgrade is
needed and asking whether the user is ready for the upgrade. If the user clicks the
Upgrade button on the client, the client automatically downloads and installs the
latest version upgrade file.
− No upgrade is needed: The CU displays the login page, allowing users to log in the
system.
Huawei eSpace VCN3000
Technical Whitepaper 2 Key Technologies
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
18
2.2.4 PU Integration Management
The rapid development of video surveillance services in recent years results in an explosive
growth of surveillance sites. Massive video data brings challenges to video surveillance
alarming and video data management services. When an incident occurs, users need to invoke
a large number of cameras simultaneously to provide comprehensive onsite video surveillance
services. It has been proved to be extremely challenging to manually browse every channel of
video to locate exceptions. Therefore, users need a new video surveillance system that
features advanced intelligent analysis services to automatically record specified events in the
video and generate alarms when detecting exceptions. These intelligent analysis services can
effectively support pre-event warning and post-event analysis, improving security protection
effectiveness.
The intelligent analysis system can detect moving objects, determine object movement based
on preset policies, and generate alarms when preset alarm conditions are met. The intelligent
video analysis system establishes mapping relationship between images and image description,
allowing computers to analyze object movement in video using digital image processing and
analysis technologies. The intelligent analysis technology automatically extracts and analyzes
key information in source video to identify target behaviors. Therefore, when a moving
object's skin color is similar to the background color, missing identification may occur. When
a scenario has a large number of moving objects, or moving objects change frequently, the
intelligent analysis algorithm performs repeated background-learning process, resulting in
analysis errors. Therefore, behavior analysis accuracy varies depending on environment
factors.
2.3 Open and Compatible Design
The VCN3000 uses open architecture to support the interconnection with multiple types of
PUs, third-party platforms, and third-party access control systems.
2.3.1 PU Access
Huawei's VCN3000 uses the device communication gateway (DCG) to enable the access
of third-party PUs. The earlier version DCGs: support the access of Conwin alarming,
Siemens access control, and Honeywell alarming devices, and PUs that support ONVIF
and ONVIF 2.0.
The latest version DCG: supports the access of Hikvision SDK devices, GB/T 28181
PUs, and all PUs that earlier version DCGs support.
SDK
The latest DCG supports SDK-based PU access plug-ins, meeting the plug-in access
requirements of mainstream PUs.
Hikvision SDK devices are connected to the DCG as DCG plug-ins. The system deploys a
dedicated management module on the VCN3000 to operate accessed SDK devices. Note that
SDK interfaces vary with vendors. PUs that connect to the system using SDKs also differ
from each other in functions.
GB/T 28181
Huawei eSpace VCN3000
Technical Whitepaper 2 Key Technologies
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
19
Development of the GB/T28181-2011 Technical Specifications for Information Transmission, Exchange, and Control in Security Protection and Video Surveillance Systems is initiated by
the Informatization Office, Ministry of Public Security of the People's Republic of China
(PRC) and centrally managed by the National Security Alarming System Standardization
Technical Committee (SAC/TC100). The detailed standards are co-drafted by multiple
organizations, such as the First Research Institute of the Ministry of Public Security of PRC.
The standards specify the interconnection and communication structures, basic and security
requirements, and technical specifications in the information transmission, exchange, and
control of urban security protection and video surveillance systems.
To comply with the GB/T 28181 protocol, the DCG of the latest version uses the GB/T 28181
protocol stack module to parse protocols and GB/T 28181 plug-in module to process PU
access services.
ONVIF
The latest version DCG supports version 1.02 and version 2.10 ONVIF protocol and
integrates the ONVIF protocol adaptation module as a plug-in to process signaling and media
streams. When an ONVIF PU is registered with the system, the ONVIF plug-in of the DCG
sends heartbeat messages to the ONVIF PU and sends the PU heartbeat message to the service
control unit (SCU). During live video browsing, the DCG receives the live video browsing
request from the SCU and invokes the relevant ONVIF PU. The DCG sets up two media ports.
One is used to receive media streams from the PU, while the other to send media streams to
the media distribution unit (MDU).
Note that the DCG directly forwards media packages without first processing them.
Huawei's VCN3000 supports connection to third-party PUs through ONVIF. This allows the
VCN3000 to provide more services, such as browsing live video, recording video on the
platform, controlling the PTZ, processing alarms, and managing devices.
2.3.2 Platform Interconnection
The VCN3000 supports signaling interconnection with all levels of platforms that support the
GB/T28181 standard using the signaling security routing gateway. The media server performs
media connection under signaling control. The system supports cross-level, cross-department,
and private-public network interconnection.
Figure 2-18 GB/T28181 platform interconnection
System interconnection
SignalingSIP monitoring domain 1 SIP monitoring domain 2
Media
IP-based transmission
network
SIP device SIP client
Session control signaling
Media transmission
SIP clientSIP device
Signaling security routing gateway 1
Central signaling control server
Streaming media server
Central signaling control server
Signaling security routing gateway 2
Streaming media server
Huawei eSpace VCN3000
Technical Whitepaper 2 Key Technologies
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
20
The GB/T28181 standard supports functions such as
Registration
Real-time video and audio on demand
Device control
Alarm event notification and distribution
Device information query
Status information distribution
Historical video and audio file retrieval
Historical video and audio playback
Video and audio file download
Network time correction, subscription, and notification
The VCN3000 connects to third-party platforms using external domains based on the
GB/T28181 standard, supporting multiple types of networking, such as cascading and
interconnection.
2.3.3 Access Control and Alarm Systems
Most existing security protection systems are operating independently in information silos.
Users need a new system that can integrate computers, networks, and systems, to provide
comprehensive security protection services. To integrate diverse security protection systems,
improve surveillance service quality, raise system resource usage, and provide advanced and
efficient comprehensive security protection services, the Huawei VCN3000 supports the
access to the access control and alarm systems, allowing users to receive alarm signals and
perform visual alarm-linkage management.
Alarm Access
Figure 2-19 Networking between the VCN3000 and access control system
Access control
Sensor
Emergency button
Audible alarm
Visual alarm
Keyboards Alarm host
CU
Alarm management computer
Siemens access-control system
TCP/IP
VCN3000
TCP/IP
The VCN3000 supports the Siemens SiPass access control management software platform
and Honeywell VISTA120 IP2000 host communication module. Access the access control and alarm systems using loose coupling of alarm signals for video. The VCN3000 receives alarm
Huawei eSpace VCN3000
Technical Whitepaper 2 Key Technologies
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
21
signals from the access control and alarm systems in loose coupling mode and provides video
linkage service. However, users cannot use the VCN3000 to control the access control or
alarm system. User can configure, manage, and operate access control and alarm services only
on the access control and alarm platforms.
Alarm Linkage
Users can customize linkage policies using the VCN3000 linkage function. Users can specify
alarm signals as trigger conditions. When receiving specified alarm signals, the VCN3000
performs relevant operations, such as displaying video, invoking PTZ preset positions, and
recording video.
Access Protocol
The VCN3000 can use third-party device SDKs or communication protocols to enable the
alarm signal transmission from third-party hosts and access controllers to the VCN3000. This
allows video linkage services. For details, such as about protocols and data formats, see the
following table.
System Category Access Protocol
Data Format
Service Description
Alarm system Alarm UDP Text Managing external
systems, devices, and
modules
Filtering alarms
Managing alarms
Maintaining system status
Access control
system
Access control OPC Function
interface
Configuring environments