What is the composition of the security monitoring system?

The security monitoring system is an emerging profession that people are paying more and more attention to. As far as the current development is concerned, the application is becoming more and more widespread and the technology content is getting higher and higher. Almost all hi-tech technologies can promote its development, especially the advent of the information age, and provide opportunities for professional development. However, as far as the monitoring industry is concerned, the system composition has not been clearly divided, which makes it very inconvenient for the project owner and user to talk about the security monitoring system.

For the security monitoring system, according to the different functions of each part of the system, we divide the entire security monitoring system into seven layers - presentation layer, control layer, processing layer, transport layer, execution layer, support layer, and acquisition layer. Of course, due to the increasing integration of devices, for some systems, some devices may exist in the system as multiple layers at the same time.

First, the performance level performance city is our most intuitive experience, it shows the quality of the entire security monitoring system. Such as monitoring video wall, monitors, high pitch alarm horns, automatic alarm answering calls, etc. belong to this layer.

Second, the control layer The control layer is the core of the entire security monitoring system, it is the most clear embodiment of the level of system science and technology. Usually we have two control methods - analog control and digital control. Analog control is an early control method. The console is usually composed of a controller or an analog control matrix and is suitable for a small local security monitoring system. This control method has a lower cost and a lower failure rate. However, for medium and large security monitoring systems, this approach is complicated to operate and does not have any price advantage. At this time, we are more sensible choice should be digital control. The digital control is the control core of the industrial control computer as a monitoring system. It transforms the complex analog control operation into a simple mouse click operation, reduces the huge analog controller stack to an industrial control computer, and changes the complex and huge number of control cables. For a serial phone line. It turns the remote monitoring into facts and provides possibilities for remote monitoring of the Internet. However, the digital control is not so perfect, the price of controlling the host computer is very expensive, the module is wasted, the system may have a crisis of collapse across the board, the control is lagging behind and so on.

Third, the processing layer processing layer may be referred to as the audio and video processing layer, it will have a transmission layer audio and video signals sent to the distribution, amplification, segmentation and other processing, the organic presentation layer and the control layer to be connected. Audio and video distributors, audio and video amplifiers, video splitters, audio and video switchers, and so on all fall into this category.

Fourth, the transmission layer The transmission layer is equivalent to the blood of the security monitoring system. In the small security monitoring system, our most common transmission layer equipment is video cable and audio cable. For the remote monitoring system, we often use RF cables and microwaves. For remote monitoring, we usually use the Internet. A cheap carrier. It is worth mentioning that the emerging transport layer media - network cable / fiber. Most people have a misunderstanding in digital security monitoring. They think that the digital control security monitoring system used by the control layer is a digital security monitoring system, but it is not. The transmission medium of the pure digital security monitoring system must be a network cable or an optical fiber. When the signal comes out of the acquisition layer, it has already been modulated into a digital signal. The digital signal runs on a network that is already mature and theoretically has no attenuation. This guarantees a lossless display of the remote monitoring image. This is an analog transmission failure. Comparable. Of course, high-performance returns also require high-cost investment, which is one of the most important reasons why pure digital security monitoring systems cannot be popularized.

V. Execution Layer The execution layer is the command object of our control instructions. At some point, it is not very well separated from the support and acquisition layers that we mentioned later. We believe that the controlled object is the execution layer device. For example: PTZ, lens, decoder, ball and so on.

Six, support layer As the name implies, the support layer is used for the back-end equipment support, protection and support acquisition layer, implementation layer equipment. It includes brackets, protective covers and other auxiliary equipment.

VII. Acquisition Layer The acquisition layer is a key factor in the quality of the entire security monitoring system, and it is also the place where the system cost is the most expensive. It includes lenses, cameras, alarm sensors, and more.