Wuxi Security Monitoring According to the different functions of each part of the system, we will Security monitoring The system is divided into seven layers, which is our most intuitive feeling. It shows the quality of the entire security monitoring system. Such as monitoring TV wall, monitor, high tone alarm horn, alarm automatic connection telephone, etc., all belong to this floor. What are the parts of Wuxi security monitoring system?
1. The control layer is the core of the entire security monitoring system, which is the most clear embodiment of the system's scientific and technological level. Usually, we have two choices of control mode, which should be digital control. Digital control takes the industrial control computer as the control core of the monitoring system. It changes the complex analog control operation into simple mouse click operation, which will greatly simulate controller The stack is reduced to an industrial computer, and the complex and large number of control cables are changed into a serial telephone line. It turns the medium and remote monitoring into reality, the host is very expensive, the module is wasted, the system may collapse in the whole line, and the control is lagging behind.
2. The processing layer may be called the audio and video processing layer. It distributes, amplifies, segments, etc. the audio and video signals sent from the transmission layer, and organically connects the presentation layer and the control layer. Audio/video distributor, audio/video amplifier, video splitter, audio/video switcher and other equipment belong to this layer.
3. The transport layer is equivalent to the blood of the security monitoring system. In small security monitoring systems, the most common transmission layer devices are video lines and audio lines. For medium and remote monitoring systems, we often use radio frequency lines and microwave. For remote monitoring, we usually use the network to run, which is theoretically non attenuation. This ensures the lossless display of remote monitoring images, which is unmatched by analog transmission. Of course, high performance returns also require high cost investment, which is one of the most important reasons why pure digital security monitoring systems cannot be popularized.
4. The execution layer is the command object of our control instructions. In some cases, it is not completely separated from the support layer and the acquisition layer mentioned later. We believe that the controlled object is the weak current execution layer device.
5. As the name implies, the support layer is used to support back-end devices, protect and support acquisition layer and execution layer devices. It includes support, protective cover and other auxiliary equipment.
6. The acquisition layer is the key factor for the quality of the entire security monitoring system, and it is also the place where the system costs the most. It includes lens video camera , alarm sensor, etc.
The above is part of the Wuxi security monitoring system.