The security monitoring system is an emerging profession that people are paying more and more attention to. As far as the current development is concerned, the application is becoming more and more popular, and the technology content is getting higher and higher. Almost all high-tech technologies can promote their development, especially the advent of the information age, and provide an opportunity for this professional development. However, as far as the monitoring industry is concerned, the system composition has not been clearly divided, which makes it difficult for engineers and users to talk about security monitoring systems.
For the security monitoring system, according to the different functions of each part of the system, we divide the whole security monitoring system into seven layers—the presentation layer, the control layer, the processing layer, the transport layer, the execution layer, the support layer, and the acquisition layer. Of course, due to the increasing integration of devices, for some systems, some devices may exist in the system as multiple layers at the same time.
Performance layer
Performance City is our most intuitive experience, it shows the quality of the entire security monitoring system. Such as monitoring video wall, monitor, treble alarm horn, alarm automatic answering phone, etc. belong to this layer.
Control layer
The control layer is the core of the entire security monitoring system, which is the clearest embodiment of the system technology level. Usually we have two control methods - analog control and digital control. Analog control is an early control method. The console is usually composed of a controller or an analog control matrix. It is suitable for small local security monitoring systems. This control method has lower cost and lower failure rate. However, for medium and large security monitoring systems, this approach is complicated and does not have any price advantage. At this time, our more sensible choice should be digital control. Digital control is the control core of the industrial control computer as a monitoring system. It transforms the complex analog control operation into a simple mouse click operation, shrinking the huge analog controller stack into an industrial computer, and transforming the complex and large number of control cables. For a serial phone line. It turns mid-remote monitoring into a reality and provides the possibility for remote monitoring of the Internet. However, the digital control is not so perfect, the price of controlling the host is very expensive, the module is wasted, the system may have a crisis of full-line collapse, and the control is lagging behind.
Processing layer
The processing layer may be referred to as an audio and video processing layer, which distributes, amplifies, divides, and the like the audio and video signals sent by the transmission layer, and organically connects the presentation layer and the control layer. Audio and video splitters, audio and video amplifiers, video splitters, audio and video switchers and other devices belong to this layer.
Transmission layer
The transport layer is equivalent to the blood of the security monitoring system. In the small security monitoring system, our most common transmission layer devices are video lines and audio lines. For medium and long-range monitoring systems, we often use RF lines and microwaves. For remote monitoring, we usually use the Internet. A cheap carrier. It is worth mentioning that the emerging transmission layer medium - network cable / fiber. Most people have a misunderstanding in digital security monitoring. They think that the digitally controlled security monitoring system used by the control layer is the digital security monitoring system, but it is not. The transmission medium of a pure digital security monitoring system must be a network cable or fiber. When the signal comes out of the acquisition layer, it has been modulated into a digital signal. The digital signal runs on the mature network. In theory, there is no attenuation, which ensures the lossless display of the remote monitoring image. This is impossible for analog transmission. Comparable. Of course, high-performance returns also require high-cost investment, which is one of the most important reasons why pure digital security surveillance systems cannot be popularized.
V. Executive layer
The execution layer is the command object of our control instruction. At some point, it is not completely separate from the support and acquisition layers that we will talk about later. We think that the controlled object is the execution layer device. For example: PTZ, lens, decoder, ball, etc.
Support layer
As the name implies, the support layer is used for the support of the back-end equipment, protecting and supporting the acquisition layer and the execution layer equipment. It includes auxiliary equipment such as brackets, shields, and the like.
7. Acquisition layer
The acquisition layer is the key factor for the quality of the entire security monitoring system, and it is also the place where the system cost is the biggest. It includes lenses, cameras, alarm sensors, and more.
Led Holiday Light,Outdoor Christmas Lights,Christmas Tree Lights,Led Christmas Lights
Yuyao Flylit Appliance Co.,Ltd , https://www.flylitlight.com