1 / 8

Data corruption in video surveillance

Data corruption occurs when a bit or a set of bits is changed unintentionally due to variety of reasons: hardware errors, data transfer noise, software bugs, many more … The probability of a silent data corruption occurring is proportional to the number of writes being done. A heavy write-intensive application such as video surveillance recording is more exposed than an average email server. Silent data corruption happens more often than you think, - CERN study found 1 in every 1500 files to be corrupted. It can be potentially devastating, - up to 10% of catastrophic storage system failures have been linked to silent corruption of data , according to white paper by NEC. Next generation file system with built-in per-block checksumming, self-healing error correction and atomic copy-on-write snapshots will protect your mission critical surveillance recordings against silent data corruption.

Download Presentation

Data corruption in video surveillance

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. DATA CORRUPTION In Video Surveillance Storage

  2. WHAT IS DATA CORRUPTION? Data corruption occurs when a bit or a set of bits is changed unintentionally due to variety of reasons: Hardware errors Data transfer noise Software bugs Many more …

  3. WHY VIDEO SURVEILLANCE? The probability of a silent data corruption occurring is proportional to the number of writes being done. A heavy write-intensive application such as video surveillance recording is more exposed than an average email server.

  4. HAPPENS MORE OFTEN THAN YOU THINK CERN study found 1 in every 1500 files to have data corruption.

  5. CAN BE POTENTIALLY DEVASTATING Up to 10% of catastrophic storage system failures have been linked to silent corruption of data, according to white paper by NEC.

  6. END-TO-END CHECKSUMS Unlike a simple disk block checksum, end-to-end 256-bit checksum, stored as metadata separate from the data it relates to, will detect all forms of silent data corruption such as misdirected reads and writes, phantom writes, DMA parity errors, driver bugs and accidental overwrites as well as traditional "bit rot."

  7. COPY-ON-WRITE When data is changed, blocks containing active data are never overwritten — the data is always written to a new block and checksummed, ensuring that data is always consistent on the disk.

  8. NEXT GENERATION FILE SYSTEM WITH BUILT-IN PER-BLOCK CHECKSUMMING, SELF-HEALING ERROR CORRECTION AND ATOMIC COPY-ON-WRITE SNAPSHOTS WILL PROTECT YOUR MISSION CRITICAL SURVEILLANCE RECORDINGS AGAINST SILENT DATA CORRUPTION. Copyright © 2014, Lucid Technology, Inc. Lucid Technology is democratizing enterprise-class storage by making high-performance and extensive feature-set accessible in a cost effective and affordably priced appliance, that’s immune to silent data corruption.

More Related