December 01, 2023
ForewordHi everyone, my name is Mr. Lin. The security monitoring system is a new direction that people are paying more and more attention to. As for current development, application is getting more and more popular, and technology content is getting higher and higher. Almost all high and new technologies can contribute to its development, especially advent of information age, which makes it possible for development of this profession. But as far as monitoring industry is concerned, composition of system is not clearly separated, which makes communication between engineering companies and users very inconvenient when it comes to security monitoring systems. For security monitoring system, according to different functions of each part of system, we divide entire security monitoring system into seven layers: presentation layer, control layer, processing layer, transmission layer, execution layer, support layer and collection layer. . Of course, due to increasing hardware integration for some systems, some hardware may exist in system as multiple layers at same time. Text
1. Presentation Layer
City performance is what we feel most intuitively, and it shows quality of entire security monitoring system. This layer includes surveillance video walls, monitors, loudspeakers with high-pitched alarms, telephones with automatic alarm connection, etc.
Two. Control level
The control layer is core of entire security monitoring system and most prominent embodiment of system's technological layer. Usually we have two control methods - analog control and digital control. Analog control is an early control method. His console usually consists of a controller or analog control matrix. It is suitable for small local security monitoring systems. This control method has low cost and low failure rate. But for medium to large security monitoring systems, this method seems difficult to operate and has no cost advantage, so digital control should be our smarter choice at present. Digital control uses an industrial control computer as control core of monitoring system. It converts complex analog control operations into simple mouse click operations, reduces stack of huge analog controllers to an industrial control computer, and converts complex and huge control cables into a telephone serial line. This makes monitoring at medium and long distances a reality and enables remote monitoring via Internet. However, digital control is not so perfect. The price of control host is very high, module overrun, system crisis may collapse across board, and control is relatively lagging behind. Problems still exist.
3. Processing level
The processing layer should probably be called audio and video processing layer. It distributes, amplifies, separates, etc. audio and video signals sent by transport layer and seamlessly links presentation layer and control layer. Audio and video splitters, audio and video amplifiers, video splitters, audio and video switches, and other devices belong to this layer.
Fourth. Transport Layer
The transport level is equivalent to blood security monitoring system. In small security monitoring systems, our most common transport layer devices are video lines and audio lines. For medium and long distance monitoring systems, we often use RF lines and microwaves. For remote monitoring, we usually use Internet. A cheap carrier. It is worth noting that emerging transport layer environment is network cable/fiber. Most people have a misconception about digital security monitoring: they think that digital security monitoring system used by management layer is a digital monitoring system.toring security, but it's not. The transmission medium of a purely digital security monitoring system must be a network cable or optical fiber. When signal leaves acquisition level, it is already modulated into a digital signal. The digital signal operates in current mature network and theoretically has no attenuation. This provides a lossless display of distant image, which is impossible. comparable for analog transmission. Of course, returning high performance also requires a large investment, which is one of biggest reasons pure digital security monitoring systems cannot be popularized.
The runlevel is command object of our control instructions. At some point, it is completely separate from support and receiving layer, which we will talk about later. We think of a managed object as a runtime device. For example: PTZ, lens, decoder, ball and so on.
Six. Support Level
As name implies, support layer is used to support server hardware, protection, and support for collection and execution layer hardware. It includes support, protective cover and other accessories.
Seven. Acquisition level
The level of acquisition is a key factor in quality of entire security monitoring system, as well as place where cost of system is greatest. It includes lenses, cameras, alarm sensors and more.
System Composition (1) Emergency Public Address System, (2) Building Intercom System, (3) Access Control System, (4) Gas Fire Suppression System, (5) Digital Monitoring System, (6) Digital Patrol System, (7 ) ) ) parking management system, (8) perimeter alarm system, (9) five-way elevator alarm system, (10) centralized key management system
In terms of classification: video surveillance subsystem, alarm prevention subsystem, access control subsystem, voice intercom subsystem, audiovisual broadcasting subsystem, intelligent analysis subsystem, perimeter prevention subsystem, location tracking subsystem, energy situation monitoring subsystem