The security monitoring system is an emerging profession that people are increasingly looking at. As far as the current development is concerned, the application is becoming more widespread and the technology content is getting higher and higher. Almost all hi-tech technologies can promote its development, especially the advent of the information age, and provide opportunities for professional development. However, as far as the monitoring industry is concerned, the system composition has not been clearly defined. This makes it very unfavorable for the security engineer to monitor the security monitoring system.
For the security monitoring system, according to the different functions of the various departments of the system, we divide the entire security monitoring system into seven layers - presentation layer, control layer, processing layer, transport layer, execution layer, support layer, and acquisition layer. Of course, as the integration of devices becomes higher and higher, for the departmental system, some devices may exist in the system as multiple layers at the same time.
one. The presentation of the city in the performance layer is the most intuitive and intuitionistic. It demonstrates the quality of the entire security monitoring system. Such as monitor video wall, monitor, high tone alarm horn, automatic alarm answering phone, etc. belong to this layer.
two. The control layer control layer is the core of the entire security monitoring system, and it is the most clear embodiment of the system technology level. Usually we have two control methods - analog control and digital control. Analog control is an early control method. Its console is usually composed of a Controller or an analog control matrix, which is used in small local security monitoring systems. This control method has a low cost and a low failure rate. However, for medium and large security monitoring systems, this approach seems to be complicated to manipulate and without any price advantage, then we are more sensible choice should be digital control. Digital control is the control core of the industrial control computer as a monitoring system. It transforms complex analog control manipulation into simple mouse click manipulation, reduces the huge analog controller stack to an industrial control computer, and changes the complex and huge number of control cables. For a serial phone line. It turns the remote monitoring into facts and provides possibilities for remote monitoring of the Internet. However, the digital control is not so perfect, the price of controlling the host computer is very expensive, the situation of module expansion, the system may cause a crisis of collapse across the board, the control is lagging behind and other issues still exist.
three. The processing layer processing layer may be referred to as an audio and video processing layer. It processes the audio and video signals sent from the transmission layer to distribute, amplify, split, etc., and organically connects the presentation layer and the control layer. Audio and video distributors, audio and video amplifiers, video splitters, audio and video switchers, and so on all fall into this category.
four. The transmission layer transmission layer corresponds to the blood of the security monitoring system. In the small security monitoring system, our most common transmission layer equipment is video cable and audio cable. For the remote monitoring system, we often use RF cables and microwaves. For remote monitoring, we usually use the Internet. A cheap carrier. It is worth mentioning that the newly emerging transmission layer media - network cable / fiber. Most people have a misunderstanding in digital security monitoring. They think that the digital control security monitoring system used by the control layer is a digital security monitoring system, and it is not. The transmission medium of the pure digital security monitoring system must be a network cable or an optical fiber. When the signal comes out of the acquisition layer, it has already been modulated into a digital signal. The digital signal runs on a network that is already mature and theoretically has no attenuation. This guarantees a lossless display of the remote monitoring image. This is an analog transmission failure. Compared to that. Of course, high-performance returns also require high investment, which is one of the most important reasons why pure digital security monitoring systems cannot be popularized.
Fives. Execution layer The execution layer is the command object of our control instructions. At some point, it is not very well separated from the support and acquisition layer that we mentioned later. We think that the controlled object is the execution layer device. Like: PTZ, lens, decoder, ball and so on.
six. Support layer As the name suggests, the support layer is used to support the back-end equipment, protect and support the acquisition layer, the implementation layer equipment. It includes brackets, protective covers and other auxiliary equipment.
Seven. The acquisition layer is the key factor in the quality of the entire security monitoring system, and it is also the place where the cost of the system is the most expensive. It includes lenses, cameras, alarm sensors, and more.
For the security monitoring system, according to the different functions of the various departments of the system, we divide the entire security monitoring system into seven layers - presentation layer, control layer, processing layer, transport layer, execution layer, support layer, and acquisition layer. Of course, as the integration of devices becomes higher and higher, for the departmental system, some devices may exist in the system as multiple layers at the same time.
one. The presentation of the city in the performance layer is the most intuitive and intuitionistic. It demonstrates the quality of the entire security monitoring system. Such as monitor video wall, monitor, high tone alarm horn, automatic alarm answering phone, etc. belong to this layer.
two. The control layer control layer is the core of the entire security monitoring system, and it is the most clear embodiment of the system technology level. Usually we have two control methods - analog control and digital control. Analog control is an early control method. Its console is usually composed of a Controller or an analog control matrix, which is used in small local security monitoring systems. This control method has a low cost and a low failure rate. However, for medium and large security monitoring systems, this approach seems to be complicated to manipulate and without any price advantage, then we are more sensible choice should be digital control. Digital control is the control core of the industrial control computer as a monitoring system. It transforms complex analog control manipulation into simple mouse click manipulation, reduces the huge analog controller stack to an industrial control computer, and changes the complex and huge number of control cables. For a serial phone line. It turns the remote monitoring into facts and provides possibilities for remote monitoring of the Internet. However, the digital control is not so perfect, the price of controlling the host computer is very expensive, the situation of module expansion, the system may cause a crisis of collapse across the board, the control is lagging behind and other issues still exist.
three. The processing layer processing layer may be referred to as an audio and video processing layer. It processes the audio and video signals sent from the transmission layer to distribute, amplify, split, etc., and organically connects the presentation layer and the control layer. Audio and video distributors, audio and video amplifiers, video splitters, audio and video switchers, and so on all fall into this category.
four. The transmission layer transmission layer corresponds to the blood of the security monitoring system. In the small security monitoring system, our most common transmission layer equipment is video cable and audio cable. For the remote monitoring system, we often use RF cables and microwaves. For remote monitoring, we usually use the Internet. A cheap carrier. It is worth mentioning that the newly emerging transmission layer media - network cable / fiber. Most people have a misunderstanding in digital security monitoring. They think that the digital control security monitoring system used by the control layer is a digital security monitoring system, and it is not. The transmission medium of the pure digital security monitoring system must be a network cable or an optical fiber. When the signal comes out of the acquisition layer, it has already been modulated into a digital signal. The digital signal runs on a network that is already mature and theoretically has no attenuation. This guarantees a lossless display of the remote monitoring image. This is an analog transmission failure. Compared to that. Of course, high-performance returns also require high investment, which is one of the most important reasons why pure digital security monitoring systems cannot be popularized.
Fives. Execution layer The execution layer is the command object of our control instructions. At some point, it is not very well separated from the support and acquisition layer that we mentioned later. We think that the controlled object is the execution layer device. Like: PTZ, lens, decoder, ball and so on.
six. Support layer As the name suggests, the support layer is used to support the back-end equipment, protect and support the acquisition layer, the implementation layer equipment. It includes brackets, protective covers and other auxiliary equipment.
Seven. The acquisition layer is the key factor in the quality of the entire security monitoring system, and it is also the place where the cost of the system is the most expensive. It includes lenses, cameras, alarm sensors, and more.
Solar Wall Light,Integrated All In One Solar Light,Solar Led Street Light,Solar Powered Street Lights
Jiamei Energy(hongkong) Limited , https://www.jiameilight.com