How to build cloud security technology and build a large security management platform
2023-04-16 13:06:56
Looking back at the history and looking forward to the future, the author believes that there are three main factors that have a major impact on the development trend of the integrated security platform, namely, integration, innovation, and cooperation. These three aspects overlap each other. However, from a business logic point of view, the development of these three aspects determines the future direction of the platform. I believe that grasping these three aspects will inevitably capture the pulse of the development of the future platform.
System integration to build a large security management platform
The most intuitive function of the security integrated platform is to enable unified management of equipment. However, it is necessary to first solve the problem of equipment interconnection and interoperability, the current technical barriers in the security industry are relatively thick, and the overall performance is not open enough. The industry calls for standards and calls for openness.
In the past, due to the single and isolated product and equipment, the customer’s needs were often “over-cut†when faced with customers, and “completely cut†a single requirement into a number of small requirements, and then applied different products, causing customers to repeat Investment, difficult to manage, and the integration and linkage of various security systems are poor, and a large number of information islands are generated.
Taking the power company substation as an example, in order to meet the unattended application scenario, a network remote image monitoring system was set up. To protect the substation power facilities, fire prevention and anti-theft systems were used to monitor the operation status of the communication equipment room. On a telecommunications room environment power remote monitoring system, coupled with residential, office building simulation monitoring system, a power company, only monitoring the management platform will not be the next five or six kinds, whether it is a unified management of the system or the future smooth upgrade Both are impossible tasks.
Taking Safe City as an example, many security and non-security systems, such as electronic bayonet, emergency command, PGIS, and digital*, began to merge or connect with the safe city system. Under such a trend, Huawei has proposed a security and networking system for this situation. Fusion of heterogeneous systems.
The security networking and the integration with heterogeneous systems pose great challenges to the integration capabilities of the system platform. It requires the system platform to have a great deal of openness and flexibility to expand. It is necessary to provide system capabilities in an open interface manner. It is convenient for the cooperation of the manufacturers to customize the business, but also the system has a bus-type capacity integration capabilities, can quickly integrate the security capabilities of the partner manufacturers into the system.
On June 1, 2012, the National Standard for Information Transmission, Exchange, and Control of Security Guard Video Surveillance Networking System (GB/T28181-2011) was officially implemented. This means a unified interface protocol for the national video surveillance system, which itself is the national security platform's appeal for the nationwide video surveillance network.
The large-scale network construction has very important strategic significance for the development of the security management platform, which greatly enhances the management platform's ability to dispatch resources and operational efficiency, and has produced huge social benefits. It also indicates the important development direction of the security management platform.
Taking cloud technology as an example, the development of contemporary cloud technology has constructed a new platform (transmission platform, computing platform, and data storage platform) in three aspects.
In the future, new video surveillance private network technologies can reduce the user's operation and maintenance costs, but they cannot completely solve the problem of transparent transmission platforms. A large number of device routers, bandwidth allocation, faults, and redundancy require a new technology to solve. What is currently foreseeable is the virtualization capabilities of network devices. That is the cloud pipeline. The concept of a cloud pipeline was proposed at the IBM conference in 2002, and network capabilities were all allocated on demand. If this goal can be achieved, it is the future. The foreseeable technological development at present is to increase the virtualization capabilities of network equipment, make the transmission network transparent to bearer services, and achieve redundancy in the case of meeting performance and low cost, and become a truly dedicated video surveillance service. Cloud delivery platform.
Cloud Technology Builds a New Platform
Looking at the large computing platform that supports the video surveillance business, this cloud computing technology is the hottest in the industry, and it is also the most understood. In the video surveillance business, the demand for computing power is mainly in intelligent analysis. At present, intelligent analysis is relatively less used in large-scale projects with open environments such as safe cities, because the recognition rate is low at present, and it is greatly affected by the scenario.
We look ahead along the lines of the existing technology. With the popularity of high-definition video, a large amount of video data containing rich content is transmitted to the user. The amount of information is increasing. From the current point of view, it is already in a state of overloaded information. According to a scientific article published by NewScientist, exposing a person to an information overload environment is more harmful than smoking marijuana. In other words, humans have not processed so much information before they have reconstructed their brains. Smart analysis can then help humans do some simple tasks. Unfortunately, the current intelligent analysis of high-definition video is still in the early stages of high-definition reduction to SD images and even lower-resolution images for analysis. The main reason is that the complexity of the technology is related to the computing power of existing computers.
Gradually, the cloud computing technology that has just begun to mature gradually can solve this problem of computing resources. After virtualizing the computing capacity, the redundant capacity can be used more rationally depending on the CPU's business idleness, and the same computing resources can be used to complete the workload several decades before virtualization. The smart analytics service deployed on this cloud computing platform will not care about computer management, troubleshooting, and resource scheduling. All this is transparent in the cloud computing platform.
The big data storage platform realized by using cloud storage technology can have very good application. The standard cloud storage technology stores data in slices on all devices in the network and uses redundant algorithms to verify the risks so as to reduce the risk of data silos. Applications in the field of video surveillance differ from standard cloud storage in that data from one police station cannot be stored across the network to another police station. This is a different model from "the economic foundation determines the superstructure." The development of technology always involves the determination of the underlying technology by the upper-level business.
Combine application scenarios to give an example. In a police station, 500 1080P images are stored and stored for 30 days. Converted to 1359TB of disk media and 272TB of redundancy. With the development of technology, the resource utilization rate of the cloud storage platform can be increased from about 55% two years ago to about 86% now, and it already has application capabilities. Even with the most popular 4U24 disk storage system, nearly 34 devices will be deployed. If so many devices follow the traditional N+M redundancy backup method, the cost will be much higher. If you deploy cloud storage platforms on these 34 storage devices at this time, you can achieve N+0 redundancy. While saving spare equipment, it also increases reliability. What is more worth mentioning is that since the cloud storage platform transparently handles the bearer services above, the business no longer needs to care about the equipment management, and concentrates on doing business well.
Cloud transmission, cloud computing, cloud storage, the author has expanded the concept of the traditional security platform to a platform for security applications. In addition to these hosting platforms, our traditional business application platform cannot stop clouding. When many companies in the industry hear the proposition of security platform clouding, they will think of running software platforms into cloud computing and storing them in cloud storage.
In fact, there is no relationship between the cloudization of the security platform and the cloudized hosting platform. Here the author proposes a concept called "business cloudization." A simple example. In the traditional video surveillance technology solution, the camera is connected to an access server via a network. Because access servers have limited access capabilities, a large number of access servers must be deployed in large projects. At this point, different cameras may be deployed to connect to different access servers. At this time, manpower consumption is very large. You can virtualize all access servers into one server and one address by using some unique clustering technologies. At this point, all cameras can be configured with the same address and connected to the same virtual server. This is the cloudization of video and video access services, and the savings in operation and maintenance costs are considerable. On the other hand, with the deep understanding of the security industry in the industry, the company has introduced a solution for cameras directly connected to smart storage devices. Similarly, after virtualization, the camera can be connected to a large virtual storage. This is the cloud of business.
Interaction between Industry Chain Cooperation and Platform Development
An open, standard, and customizable integrated security platform is the basis for industrial chain cooperation. At the same time, the industrial chain cooperation also has a profound impact on the development of the platform.
In the field of video surveillance, some open industry standards have been formed, such as the industry's mainstream protocol standards advocated by organizations such as ONVIF and PSIA, or the domestic GAT669 interconnection protocol. Through the formulation and promulgation of these standards, the majority of manufacturers do not need to spend too much thought to consider the docking between the two, we all follow the unified protocol standards, develop an open system, both to ensure open and compatible, at the same time The speed is also faster, and it is not necessary to replace the whole set of equipment and equipment in the entire network to avoid the waste of human and material resources of the customer.
At the same time, Huawei's adherence to the concept of integration, the independent enabling components in the platform system, and the open design have enabled the integrated manufacturers to have more choices. At the same time, Huawei has helped customers build the most suitable security system, saving costs and shortening the project delivery cycle. In addition, Huawei also provides the most standard and open customized interface services. Based on Service Oriented Architecture (SOA), Huawei provides standardized service development custom interfaces, such as Webservice interfaces and client middleware interfaces, and establishes dedicated open labs for partner companies to conduct business connection. At the same time, Huawei supports ESB (Enterprise Service Bus) and implements online hot plugging of third-party service capabilities to achieve an elastic expansion of the overall system capabilities.
In terms of the survival status of the security industry chain, we are most concerned about the impact of platform development trends on the industry chain and the impact of this impact on the development of the platform itself. In addition to the technical aspects, the cooperation model and marketing operation of suppliers and integrators in the industrial chain will have a significant impact on the development of the security platform. In this process of influence, around the customer demand, the competition and the game between the manufacturers will eventually split the two camps of suppliers and integrators. This is actually the external performance of vertical demand and horizontal demand in the industry market.
Vendors focus on technology leadership, industry standards, open and friendly development ports, provide strong support for integrators from products and technologies, and integrators focus on the business needs of industry customers, dig deep into industry applications, and build well. The customer relationship enhances the integration capabilities of their own programs. Huawei, as a supplier of equipment, adheres to the advantages of Huawei's large platform for R&D, and establishes a joint team consisting mainly of chips, terminals, and platforms in collaboration with Hass, Terminal, and China Research, and actively researches low-bandwidth coding techniques in video surveillance. Packages such as cutting-edge technology, intelligent search and fading memory technology, under the principle of unchanging market drivers, highlight the highlights and features of Huawei's video surveillance, and accelerate the transformation of the market landscape.
Because this is an era of openness, standards, and cooperation, we cannot rest on our own proprietary systems. Only by making products with an open mind and integrating more solutions can we maximize the value of our products. Today, with the globalization of the market, no single company can completely cover all the issues. The cooperation between enterprises is increasingly important. Only by working together can we provide our customers with the most reasonable security management platform solutions. I believe this is also the inspiration for us in the development of the security management platform.
System integration to build a large security management platform
The most intuitive function of the security integrated platform is to enable unified management of equipment. However, it is necessary to first solve the problem of equipment interconnection and interoperability, the current technical barriers in the security industry are relatively thick, and the overall performance is not open enough. The industry calls for standards and calls for openness.
In the past, due to the single and isolated product and equipment, the customer’s needs were often “over-cut†when faced with customers, and “completely cut†a single requirement into a number of small requirements, and then applied different products, causing customers to repeat Investment, difficult to manage, and the integration and linkage of various security systems are poor, and a large number of information islands are generated.
Taking the power company substation as an example, in order to meet the unattended application scenario, a network remote image monitoring system was set up. To protect the substation power facilities, fire prevention and anti-theft systems were used to monitor the operation status of the communication equipment room. On a telecommunications room environment power remote monitoring system, coupled with residential, office building simulation monitoring system, a power company, only monitoring the management platform will not be the next five or six kinds, whether it is a unified management of the system or the future smooth upgrade Both are impossible tasks.
Taking Safe City as an example, many security and non-security systems, such as electronic bayonet, emergency command, PGIS, and digital*, began to merge or connect with the safe city system. Under such a trend, Huawei has proposed a security and networking system for this situation. Fusion of heterogeneous systems.
The security networking and the integration with heterogeneous systems pose great challenges to the integration capabilities of the system platform. It requires the system platform to have a great deal of openness and flexibility to expand. It is necessary to provide system capabilities in an open interface manner. It is convenient for the cooperation of the manufacturers to customize the business, but also the system has a bus-type capacity integration capabilities, can quickly integrate the security capabilities of the partner manufacturers into the system.
On June 1, 2012, the National Standard for Information Transmission, Exchange, and Control of Security Guard Video Surveillance Networking System (GB/T28181-2011) was officially implemented. This means a unified interface protocol for the national video surveillance system, which itself is the national security platform's appeal for the nationwide video surveillance network.
The large-scale network construction has very important strategic significance for the development of the security management platform, which greatly enhances the management platform's ability to dispatch resources and operational efficiency, and has produced huge social benefits. It also indicates the important development direction of the security management platform.
Taking cloud technology as an example, the development of contemporary cloud technology has constructed a new platform (transmission platform, computing platform, and data storage platform) in three aspects.
In the future, new video surveillance private network technologies can reduce the user's operation and maintenance costs, but they cannot completely solve the problem of transparent transmission platforms. A large number of device routers, bandwidth allocation, faults, and redundancy require a new technology to solve. What is currently foreseeable is the virtualization capabilities of network devices. That is the cloud pipeline. The concept of a cloud pipeline was proposed at the IBM conference in 2002, and network capabilities were all allocated on demand. If this goal can be achieved, it is the future. The foreseeable technological development at present is to increase the virtualization capabilities of network equipment, make the transmission network transparent to bearer services, and achieve redundancy in the case of meeting performance and low cost, and become a truly dedicated video surveillance service. Cloud delivery platform.
Cloud Technology Builds a New Platform
Looking at the large computing platform that supports the video surveillance business, this cloud computing technology is the hottest in the industry, and it is also the most understood. In the video surveillance business, the demand for computing power is mainly in intelligent analysis. At present, intelligent analysis is relatively less used in large-scale projects with open environments such as safe cities, because the recognition rate is low at present, and it is greatly affected by the scenario.
We look ahead along the lines of the existing technology. With the popularity of high-definition video, a large amount of video data containing rich content is transmitted to the user. The amount of information is increasing. From the current point of view, it is already in a state of overloaded information. According to a scientific article published by NewScientist, exposing a person to an information overload environment is more harmful than smoking marijuana. In other words, humans have not processed so much information before they have reconstructed their brains. Smart analysis can then help humans do some simple tasks. Unfortunately, the current intelligent analysis of high-definition video is still in the early stages of high-definition reduction to SD images and even lower-resolution images for analysis. The main reason is that the complexity of the technology is related to the computing power of existing computers.
Gradually, the cloud computing technology that has just begun to mature gradually can solve this problem of computing resources. After virtualizing the computing capacity, the redundant capacity can be used more rationally depending on the CPU's business idleness, and the same computing resources can be used to complete the workload several decades before virtualization. The smart analytics service deployed on this cloud computing platform will not care about computer management, troubleshooting, and resource scheduling. All this is transparent in the cloud computing platform.
The big data storage platform realized by using cloud storage technology can have very good application. The standard cloud storage technology stores data in slices on all devices in the network and uses redundant algorithms to verify the risks so as to reduce the risk of data silos. Applications in the field of video surveillance differ from standard cloud storage in that data from one police station cannot be stored across the network to another police station. This is a different model from "the economic foundation determines the superstructure." The development of technology always involves the determination of the underlying technology by the upper-level business.
Combine application scenarios to give an example. In a police station, 500 1080P images are stored and stored for 30 days. Converted to 1359TB of disk media and 272TB of redundancy. With the development of technology, the resource utilization rate of the cloud storage platform can be increased from about 55% two years ago to about 86% now, and it already has application capabilities. Even with the most popular 4U24 disk storage system, nearly 34 devices will be deployed. If so many devices follow the traditional N+M redundancy backup method, the cost will be much higher. If you deploy cloud storage platforms on these 34 storage devices at this time, you can achieve N+0 redundancy. While saving spare equipment, it also increases reliability. What is more worth mentioning is that since the cloud storage platform transparently handles the bearer services above, the business no longer needs to care about the equipment management, and concentrates on doing business well.
Cloud transmission, cloud computing, cloud storage, the author has expanded the concept of the traditional security platform to a platform for security applications. In addition to these hosting platforms, our traditional business application platform cannot stop clouding. When many companies in the industry hear the proposition of security platform clouding, they will think of running software platforms into cloud computing and storing them in cloud storage.
In fact, there is no relationship between the cloudization of the security platform and the cloudized hosting platform. Here the author proposes a concept called "business cloudization." A simple example. In the traditional video surveillance technology solution, the camera is connected to an access server via a network. Because access servers have limited access capabilities, a large number of access servers must be deployed in large projects. At this point, different cameras may be deployed to connect to different access servers. At this time, manpower consumption is very large. You can virtualize all access servers into one server and one address by using some unique clustering technologies. At this point, all cameras can be configured with the same address and connected to the same virtual server. This is the cloudization of video and video access services, and the savings in operation and maintenance costs are considerable. On the other hand, with the deep understanding of the security industry in the industry, the company has introduced a solution for cameras directly connected to smart storage devices. Similarly, after virtualization, the camera can be connected to a large virtual storage. This is the cloud of business.
Interaction between Industry Chain Cooperation and Platform Development
An open, standard, and customizable integrated security platform is the basis for industrial chain cooperation. At the same time, the industrial chain cooperation also has a profound impact on the development of the platform.
In the field of video surveillance, some open industry standards have been formed, such as the industry's mainstream protocol standards advocated by organizations such as ONVIF and PSIA, or the domestic GAT669 interconnection protocol. Through the formulation and promulgation of these standards, the majority of manufacturers do not need to spend too much thought to consider the docking between the two, we all follow the unified protocol standards, develop an open system, both to ensure open and compatible, at the same time The speed is also faster, and it is not necessary to replace the whole set of equipment and equipment in the entire network to avoid the waste of human and material resources of the customer.
At the same time, Huawei's adherence to the concept of integration, the independent enabling components in the platform system, and the open design have enabled the integrated manufacturers to have more choices. At the same time, Huawei has helped customers build the most suitable security system, saving costs and shortening the project delivery cycle. In addition, Huawei also provides the most standard and open customized interface services. Based on Service Oriented Architecture (SOA), Huawei provides standardized service development custom interfaces, such as Webservice interfaces and client middleware interfaces, and establishes dedicated open labs for partner companies to conduct business connection. At the same time, Huawei supports ESB (Enterprise Service Bus) and implements online hot plugging of third-party service capabilities to achieve an elastic expansion of the overall system capabilities.
In terms of the survival status of the security industry chain, we are most concerned about the impact of platform development trends on the industry chain and the impact of this impact on the development of the platform itself. In addition to the technical aspects, the cooperation model and marketing operation of suppliers and integrators in the industrial chain will have a significant impact on the development of the security platform. In this process of influence, around the customer demand, the competition and the game between the manufacturers will eventually split the two camps of suppliers and integrators. This is actually the external performance of vertical demand and horizontal demand in the industry market.
Vendors focus on technology leadership, industry standards, open and friendly development ports, provide strong support for integrators from products and technologies, and integrators focus on the business needs of industry customers, dig deep into industry applications, and build well. The customer relationship enhances the integration capabilities of their own programs. Huawei, as a supplier of equipment, adheres to the advantages of Huawei's large platform for R&D, and establishes a joint team consisting mainly of chips, terminals, and platforms in collaboration with Hass, Terminal, and China Research, and actively researches low-bandwidth coding techniques in video surveillance. Packages such as cutting-edge technology, intelligent search and fading memory technology, under the principle of unchanging market drivers, highlight the highlights and features of Huawei's video surveillance, and accelerate the transformation of the market landscape.
Because this is an era of openness, standards, and cooperation, we cannot rest on our own proprietary systems. Only by making products with an open mind and integrating more solutions can we maximize the value of our products. Today, with the globalization of the market, no single company can completely cover all the issues. The cooperation between enterprises is increasingly important. Only by working together can we provide our customers with the most reasonable security management platform solutions. I believe this is also the inspiration for us in the development of the security management platform.
5050 Led Chip,5050 Red Light Lamp Beads,Epistar Chip Led Light,Epistar Chip Led Work Light
Shenzhen Huangtai Photoelectric Co.,Ltd. , https://www.huangtailed.com