As we all know, the security monitoring system is an emerging profession that people are increasingly paying attention to. As far as the current development is concerned, the application has become more and more widely used and the content of science and technology is getting higher and higher. Almost all hi-tech technologies can promote its development, especially the advent of the information age, and provide opportunities for professional development. However, as far as the monitoring industry is concerned, the system composition has not been clearly divided. This makes it very inconvenient for engineers and users to talk about the security monitoring system.
For the security monitoring system, according to the different functions of the various parts of the system, we divide the entire security monitoring system into seven layers - presentation layer, control layer, processing layer, transport layer, execution layer, support layer, and acquisition layer. Of course, due to the increasing integration of devices, for some systems, some devices may exist in the system as multiple layers at the same time.
First, the presentation layer
Performance City is our most intuitive experience, it shows the quality of the entire security monitoring system. Such as monitoring video wall, monitors, high pitch alarm horns, automatic alarm answering calls, etc. belong to this layer.
Second, the control layer
The control layer is the core of the entire security monitoring system, and it is the most clear embodiment of the system technology level. Usually we have two kinds of control methods - analog control and digital control. Analog control is an early control method. The console is usually composed of a controller or an analog control matrix and is suitable for a small local security monitoring system. This control method has a lower cost and a lower failure rate. However, for medium and large security monitoring systems, this approach is complicated to operate and does not have any price advantage. At this time, we are more sensible choice should be digital control.
The digital control is the control core of the industrial control computer as a monitoring system. It transforms the complex analog control operation into a simple mouse click operation, reduces the huge analog controller stack to an industrial control computer, and changes the complex and huge number of control cables. For a serial phone line. It turns the remote monitoring into facts and provides possibilities for remote monitoring of the Internet. However, the digital control is not so perfect, the price of controlling the host computer is very expensive, the module is wasted, the system may have a crisis of collapse across the board, the control is lagging behind and other issues still exist.
Third, the treatment layer
The processing layer may be referred to as an audio and video processing layer. It processes audio and video signals sent from the transmission layer, distributes them, amplifies them, separates them, etc., and organically connects the presentation layer and the control layer. Audio and video distributors, audio and video amplifiers, video splitters, audio and video switchers, and so on all fall into this category.
Fourth, the transport layer
The transmission layer is equivalent to the blood of the security monitoring system. In the small security monitoring system, our most common transmission layer equipment is video cable and audio cable. For the remote monitoring system, we often use RF cables and microwaves. For remote monitoring, we usually use the Internet. A cheap carrier. It is worth mentioning that the emerging transport layer media - network cable / fiber. Most people have a misunderstanding in digital security monitoring. They think that the digital control security monitoring system used by the control layer is a digital security monitoring system, but it is not. The transmission medium of the pure digital security monitoring system must be a network cable or an optical fiber. When the signal comes out of the acquisition layer, it has already been modulated into a digital signal. The digital signal runs on a network that is already mature and theoretically has no attenuation. This guarantees a lossless display of the remote monitoring image. This is an analog transmission failure. Comparable. Of course, high-performance returns also require high-cost investment, which is one of the most important reasons why pure digital security monitoring systems cannot be popularized.
Fifth, the executive layer
The execution layer is the command object of our control instructions. At some point, it is not very well separated from the support and acquisition layer that we describe later. We think that the controlled object is the execution layer device. For example: PTZ, lens, decoder, ball and so on.
Sixth, support layer
As the name implies, the support layer is used to support the back-end equipment and protect and support the acquisition layer and the execution layer equipment. It includes brackets, protective covers and other auxiliary equipment.
Seven, the acquisition layer
The acquisition layer is the key factor in the quality of the entire security monitoring system, and it is also the place where the system cost is the most expensive. It includes lenses, cameras, alarm sensors, and more.
Juicer Extractor,Fruit Juicer,Electric Juicer,Juicer Machine
Jiangmen Sanxin Appliances Co.,Ltd , https://www.sanxinfty.com