The composition of security monitoring system
[Copy link]
Security monitoring system is an emerging profession that is increasingly valued by people. From the current development, its application is becoming more and more widespread, and its technological content is becoming higher and higher. Almost all high-tech can promote its development, especially the advent of the information age, which provides an opportunity for the development of this profession. However, as far as the monitoring industry is concerned, the composition of the system has not been clearly divided, which makes it inconvenient for engineers and users to communicate when talking about security monitoring systems. For security monitoring systems, according to the different functions of each part of the system, we divide the entire security monitoring system into seven layers - presentation layer, control layer, processing layer, transmission layer, execution layer, support layer, and acquisition layer. Of course, due to the increasing integration of equipment, for some systems, some equipment may exist in the system as multiple layers at the same time. 1. Presentation layer The presentation city is what we feel most intuitively, and it shows the quality of the entire security monitoring system. For example, monitoring TV walls, monitors, high-pitched alarm speakers, alarm automatic connection phones, etc. all belong to this layer. 2. Control layer The control layer is the core of the entire security monitoring system, and it is the clearest embodiment of the system's technological level. Usually, we have two control methods - analog control and digital control. Analog control is an early control method. Its console is usually composed of a controller or an analog control matrix. It is suitable for small local security monitoring systems. This control method has low cost and low failure rate. However, for medium and large security monitoring systems, this method is complicated to operate and has no price advantage. At this time, our more sensible choice should be digital control. Digital control is to use industrial computers as the control core of the monitoring system. It turns complex analog control operations into simple mouse click operations, reduces the huge analog controller stack into an industrial computer, and turns complex and large control cables into a serial telephone line. It turns medium and long-distance monitoring into a fact and provides the possibility for Internet remote monitoring. However, digital control is not so perfect. The price of the control host is very expensive, the module is wasted, the system may collapse across the board, and the control is relatively lagging. There are still problems. 3. Processing layer The processing layer should be called the audio and video processing layer. It distributes, amplifies, and divides the audio and video signals sent by the transmission layer, and organically connects the presentation layer with the control layer. Audio and video distributors, audio and video amplifiers, video splitters, audio and video switches, and other devices all belong to this layer. 4. Transmission layer The transmission layer is equivalent to the blood of the security monitoring system. In small security monitoring systems, the most common transmission layer devices are video cables and audio cables. For medium and long-distance monitoring systems, we often use radio frequency cables and microwaves. For remote monitoring, we usually use the Internet, a cheap carrier. It is worth mentioning that the new transmission layer medium - network cable/optical fiber. Most people have a misunderstanding about digital security monitoring. They think that the digital control security monitoring system used by the control layer is a digital security monitoring system, but this is not the case. The transmission medium of a pure digital security monitoring system must be a network cable or optical fiber. When the signal comes out of the acquisition layer, it has been modulated into a digital signal. Digital signals run on the currently mature network, theoretically without attenuation, which ensures lossless display of remote monitoring images, which is incomparable to analog transmission. Of course, high performance returns also require high cost investment, which is one of the most important reasons why pure digital security monitoring systems cannot be popularized. Five. Execution layer The execution layer is the command object of our control instructions. In some cases, it is not easy to separate it from the support layer and acquisition layer mentioned later. We believe that the controlled object is the execution layer device. For example: PTZ, lens, decoder, ball, etc. Six. Support layer As the name suggests, the support layer is used to support the back-end equipment, protect and support the acquisition layer and execution layer equipment. It includes auxiliary equipment such as brackets and protective covers. Seven. Acquisition layer The acquisition layer is the key factor in the quality of the entire security monitoring system, and it is also the place where the system cost expenditure is the largest. It includes lenses, cameras, alarm sensors, etc.
|