7807 views|4 replies

1170

Posts

0

Resources
The OP

The composition of security monitoring system [Copy link]

Security monitoring system is an emerging profession that is increasingly valued by people. From the current development, its application is becoming more and more widespread, and its technological content is becoming higher and higher. Almost all high-tech can promote its development, especially the advent of the information age, which provides an opportunity for the development of this profession. However, as far as the monitoring industry is concerned, the composition of the system has not been clearly divided, which makes it inconvenient for engineers and users to communicate when talking about security monitoring systems. For security monitoring systems, according to the different functions of each part of the system, we divide the entire security monitoring system into seven layers - presentation layer, control layer, processing layer, transmission layer, execution layer, support layer, and acquisition layer. Of course, due to the increasing integration of equipment, for some systems, some equipment may exist in the system as multiple layers at the same time.
1. Presentation layer The presentation city is what we feel most intuitively, and it shows the quality of the entire security monitoring system. For example, monitoring TV walls, monitors, high-pitched alarm speakers, alarm automatic connection phones, etc. all belong to this layer.
2. Control layer The control layer is the core of the entire security monitoring system, and it is the clearest embodiment of the system's technological level. Usually, we have two control methods - analog control and digital control. Analog control is an early control method. Its console is usually composed of a controller or an analog control matrix. It is suitable for small local security monitoring systems. This control method has low cost and low failure rate. However, for medium and large security monitoring systems, this method is complicated to operate and has no price advantage. At this time, our more sensible choice should be digital control. Digital control is to use industrial computers as the control core of the monitoring system. It turns complex analog control operations into simple mouse click operations, reduces the huge analog controller stack into an industrial computer, and turns complex and large control cables into a serial telephone line. It turns medium and long-distance monitoring into a fact and provides the possibility for Internet remote monitoring. However, digital control is not so perfect. The price of the control host is very expensive, the module is wasted, the system may collapse across the board, and the control is relatively lagging. There are still problems.
3. Processing layer The processing layer should be called the audio and video processing layer. It distributes, amplifies, and divides the audio and video signals sent by the transmission layer, and organically connects the presentation layer with the control layer. Audio and video distributors, audio and video amplifiers, video splitters, audio and video switches, and other devices all belong to this layer.
4. Transmission layer The transmission layer is equivalent to the blood of the security monitoring system. In small security monitoring systems, the most common transmission layer devices are video cables and audio cables. For medium and long-distance monitoring systems, we often use radio frequency cables and microwaves. For remote monitoring, we usually use the Internet, a cheap carrier. It is worth mentioning that the new transmission layer medium - network cable/optical fiber. Most people have a misunderstanding about digital security monitoring. They think that the digital control security monitoring system used by the control layer is a digital security monitoring system, but this is not the case. The transmission medium of a pure digital security monitoring system must be a network cable or optical fiber. When the signal comes out of the acquisition layer, it has been modulated into a digital signal. Digital signals run on the currently mature network, theoretically without attenuation, which ensures lossless display of remote monitoring images, which is incomparable to analog transmission. Of course, high performance returns also require high cost investment, which is one of the most important reasons why pure digital security monitoring systems cannot be popularized.
Five. Execution layer The execution layer is the command object of our control instructions. In some cases, it is not easy to separate it from the support layer and acquisition layer mentioned later. We believe that the controlled object is the execution layer device. For example: PTZ, lens, decoder, ball, etc.
Six. Support layer As the name suggests, the support layer is used to support the back-end equipment, protect and support the acquisition layer and execution layer equipment. It includes auxiliary equipment such as brackets and protective covers.
Seven. Acquisition layer The acquisition layer is the key factor in the quality of the entire security monitoring system, and it is also the place where the system cost expenditure is the largest. It includes lenses, cameras, alarm sensors, etc.
This post is from Creative Market

Latest reply

If you are interested in security, please contact us for discussion and study QQ: 276115226  Details Published on 2008-2-15 16:54

136

Posts

0

Resources
2
Nice to sit on the sofa
This post is from Creative Market
Personal signature喜欢单片机的请加群48811593(500人超级群)

1170

Posts

0

Resources
3
The labor finally paid off.
This post is from Creative Market

10

Posts

0

Resources
4
I think the above is too complicated, and it can be simply summarized in eight words: acquisition, transmission, control, and display. Among them, the acquisition uses a camera; the transmission is divided into wired and wireless; the control uses matrix and other transfer equipment and computers with monitoring software installed; the display is the screen.
This post is from Creative Market

10

Posts

0

Resources
5
If you are interested in security, please contact us for discussion and study QQ: 276115226
This post is from Creative Market

Guess Your Favourite
Just looking around
Find a datasheet?

EEWorld Datasheet Technical Support

Related articles more>>

    EEWorld
    subscription
    account

    EEWorld
    service
    account

    Automotive
    development
    circle

    Robot
    development
    community

    Copyright © 2005-2025 EEWORLD.com.cn, Inc. All rights reserved 京B2-20211791 京ICP备10001474号-1 电信业务审批[2006]字第258号函 京公网安备 11010802033920号
    快速回复 返回顶部 Return list