Hello, welcome to visit Wuxi Security Monitoring, Wuxi Monitoring, Wuxi Remote Monitoring, and the official website of Wuxi Dehang Technology Co., Ltd!

 1512008412106430.png   Service hotline 138-618-32237

 Wuxi Monitoring

technical support

Product classification

contact us

Enterprise name: Wuxi Dehang Technology Co., Ltd

Contact: Mr. Liu

Tel.: 0510-68289990

Mobile: 13861832237

Email: [email protected]

Website: nabenjixie.cn

Address: Room 1202, No. 99 Zhaoshangcheng Road, Wuxi, Jiangsu

Welcome to Wuxi Security Monitoring, Wuxi Monitoring, Wuxi Remote Monitoring - the official website of Wuxi Dehang Technology Co., Ltd!

What are the components of the security monitoring system

What are the components of the security monitoring system

Date of issue: 2022-09-15 Author: Click:

Security monitoring What are the components of the system



1、 Presentation layer


What is required for remote monitoring to form a performance city is the most intuitive feeling, which shows the quality of the entire security monitoring system. For example, the monitoring TV wall, monitor, high tone alarm horn, automatic alarm connection telephone, etc. belong to Shenzhen security on this floor.


2、 Control layer


The control layer is the core of the whole monitoring project, and it is the most clear embodiment of the system technology level. Generally, we have two control modes - analog control and digital control. Analog control is an early control mode, and its console is usually controller Or it is composed of analog control matrix, which is suitable for small local security monitoring system. This control mode has low cost and low failure rate. However, for medium and large security monitoring systems, this mode is complex to operate and has no price advantage. At this time, we should choose digital control more wisely. Digital control takes the industrial control computer as the control core of the monitoring system. It changes the complex analog control operation into simple mouse click operation, reduces the huge analog controller stack into an industrial control computer, and changes the complex and large number of control cables into a serial telephone line. It turns medium and remote monitoring into a fact and makes it possible for Internet remote monitoring. However, the digital control is not perfect. The control host is very expensive, the modules are wasted, the system may collapse, and the control is lagging behind.


3、 Processing layer


The processing layer may be called the audio and video processing layer. It distributes, amplifies, segments, etc. the audio and video signals sent from the transmission layer, and organically connects the presentation layer and the control layer. Audio/video distributor, audio/video amplifier, video splitter, audio/video switcher and other equipment belong to this layer.


 monitor

4、 Transport layer


The transport layer is equivalent to the blood of the security monitoring system. In small monitoring projects, our most common transmission layer equipment is video cable and audio cable. For medium and remote monitoring systems, we often use RF cable and microwave. For remote monitoring, we usually use the Internet as a cheap carrier. It is worth mentioning that the newly emerging transmission layer medium - network cable/optical fiber. Most people have a mistake in digital security monitoring. They think that the digital control security monitoring system used by the control layer is a digital security monitoring system, but it is not. The transmission medium of pure digital security monitoring system must be network cable or optical fiber. When the signal comes out of the acquisition layer, it has been modulated into a digital signal. The digital signal runs on the mature network at present, and theoretically has no attenuation, which ensures the lossless display of remote monitoring images, which is incomparable to analog transmission. Of course, high performance returns also require high cost investment, which is one of the most important reasons why pure digital security monitoring systems cannot be popularized.


5、 Executive layer


The execution layer is the command object of our control instructions. In some cases, it is not completely separated from the support layer and the acquisition layer mentioned later. We believe that the controlled object is the execution layer device. For example: PTZ, lens, decoder, smart ball, etc.




Wuxi Dehang Technology Co., Ltd., founded in 2010, is a computer network system integration and weak current engineering service company.


For many years, the company has been committed to information system integration, Internet/Intranet software development, building a technical service network covering the whole country, and providing a complete set of solutions for large, medium and small users such as early planning, scheme design, application development, system installation, debugging and personnel training of information systems and weak current systems. So far, it has provided hundreds of large and medium-sized computer network systems and weak current engineering solutions in the fields of finance, insurance, securities, power, banking, civil aviation, railway, water conservancy, petrochemical, national defense, customs, telecommunications, scientific research institutions, etc.


Website: //nabenjixie.cn/news/572.html

key word: Security monitoring , Remote monitoring , monitor

Recent browsing:

  • Online Service
  • contact number
    thirteen billion eight hundred and sixty-one million eight hundred and thirty-two thousand two hundred and thirty-seven
  • Online Message
  • Mobile website
  • Online consultation
    Welcome to leave us a message
    Please enter your message here, and we will contact you as soon as possible.
    full name
    contacts
    Telephone
    Landline/mobile number
    mailbox
    mailbox
    address
    address