Walk Behind Floor Scrubber,Commercial Floor Scrubber,Auto Scrubber,Floor Washer Nantong Weizhuo Environmental Protection Equipment Co.,Ltd , https://www.natongcwz.com
For the security monitoring system, according to the different functions of each part of the system, we divide the entire security monitoring system into seven layers: presentation layer, control layer, processing layer, transport layer, execution layer, support layer, and acquisition layer. Of course, due to the increasing integration of devices, for some systems, some devices may exist in the system as multiple layers at the same time.
I. Presentation layer
The presentation layer is what we most intuitively feel. It shows the quality of the entire security monitoring system. For example, monitoring TV walls, monitors, tweeter alarm horns, automatic alarm answering phones, etc. belong to this layer.
Second, the control layer
The control layer is the core of the entire security monitoring system, and it is the most clear embodiment of the system technology level. Usually we have two kinds of analog control and digital control. Analog control is an early control method. The console is usually composed of a controller or an analog control matrix and is suitable for a small local security monitoring system. This control method has a lower cost and a lower failure rate. However, for medium and large security monitoring systems, this approach is complicated to operate and does not have any price advantage. At this time, we are more sensible choice should be digital control. The digital control is the control core of the industrial control computer as a monitoring system. It transforms the complex analog control operation into a simple mouse click operation, reduces the huge analog controller stack to an industrial control computer, and changes the complex and huge number of control cables. For a serial phone line. It turns the remote monitoring into facts and provides possibilities for remote monitoring of the Internet. However, the digital control is not so perfect, the price of controlling the host computer is very expensive, the module is wasted, the system may have a crisis of collapse across the board, the control is lagging behind and other issues still exist.
Three. Treatment layer
The processing layer may be referred to as an audio and video processing layer. It processes audio and video signals sent from the transmission layer, distributes them, amplifies them, separates them, etc., and organically connects the presentation layer and the control layer. Audio and video distributors, audio and video amplifiers, video splitters, audio and video switchers, and so on all fall into this category.
Four. Transport layer
The transmission layer is equivalent to the blood of the security monitoring system. In the small security monitoring system, our most common transmission layer equipment is video cable and audio cable. For the remote monitoring system, we often use RF cables and microwaves. For remote monitoring, we usually use the Internet. A cheap carrier. It is worth mentioning that the emerging transmission layer media cable/optical fiber. Most people have a misunderstanding in digital security monitoring. They think that the digital control security monitoring system used by the control layer is a digital security monitoring system, but it is not. The transmission medium of the pure digital security monitoring system must be a network cable or an optical fiber. When the signal comes out of the acquisition layer, it has already been modulated into a digital signal. The digital signal runs on a network that is already mature and theoretically has no attenuation. This guarantees a lossless display of the remote monitoring image. This is an analog transmission failure. Comparable. Of course, high-performance returns also require high-cost investment, which is one of the most important reasons why pure digital security monitoring systems cannot be popularized.
V. Executive level
The execution layer is the command object of our control instructions. At some point, it is not very well separated from the support and acquisition layer that we describe later. We think that the controlled object is the execution layer device.
For example: PTZ, lens, decoder, ball and so on.
VI. Support layer
As the name implies, the support layer is used to support the back-end equipment and protect and support the acquisition layer and the execution layer equipment. It also includes support equipment such as brackets and guards.
Seven. Acquisition layer
The acquisition layer is the key factor in the quality of the entire security monitoring system, and it is also the place where the system cost is the most expensive. It includes lenses, cameras, alarm sensors, and more.
Security monitoring system functions and specific division
Nowadays, security monitoring equipment can be seen everywhere. Public places, communities, banks, and even some companies, as an emerging industry that is increasingly valued and thrived by people, the popularity of security monitoring applications has become more and more widespread. In view of this, in order to allow engineers and users When talking about the security monitoring system can have a more consistent understanding, the following for everyone combing the security monitoring system specific division.
Release date:2012/2/14 9:17:12