pneumatic telescopic mast|lighting mast|military mast

NEWS

System features of security lifting monitoring

Time:2021-06-18 View:

Application installation
The first choice for installing security monitoring equipment is to select a monitoring host. Whether to install monitoring card on the computer or an embedded hard disk video recorder as your monitoring host. Computer monitoring card is more suitable for places that are familiar with computer installation, have professional personnel on duty, and have more functional requirements. Its overall investment ratio is relatively low. Since monitoring card is installed in the computer, the computer needs to be turned on 24 hours. As for the latter, it does not need professional knowledge or on duty, which is relatively simple to operate.
To install security monitoring equipment, make sure that several cameras are installed. The influence quality of the cameras and the scope of surveillance. The first choice is to decide how many cameras to use for surveillance, and then determine the camera's lens surveillance range according to how many cameras there are. Therefore, the distance from the camera to the monitoring point and the monitoring area must be clearly defined. The infrared supply network recommends using 480 television line cameras because they are more consistent with that definition.
When installing security monitoring equipment, the third part considers whether the camera has night vision function. If the monitoring is installed in a relatively dark place, it is necessary to consider using the camera with infrared night vision function.
The installation of security monitoring equipment can be installed by wired or wireless transmission. Although the cost of wireless network is relatively high, it can save a lot of installation trouble and make the monitoring site more beautiful. However, the installation of wireless network monitoring equipment should take into account the environmental problems of security sites. Cement building materials will shorten the wireless transmission distance, and metal building materials may complete shielding of wireless signals, infrared-transmitter and infrared receiver should be kept away from other electrical appliances to avoid interference. Because the price of wireless network is almost twice that of wired transmission monitoring equipment, I suggest using wired transmission installation.
On-site monitoring and network monitoring when determining the installation of the monitoring system, you should consider whether network functions are needed, that is to say, if you need to monitor and control the monitoring site at any time on the Internet, you need to select a monitoring host with network functions. Avoid network transmission after installation.
A complete security monitoring equipment must have at least three parts: surveillance camera, PTZ and decoder. The following are their installation methods:
Installation method of surveillance camera:
1. In the environment of strong electromagnetic interference, the installation of surveillance cameras should be insulation against ground isolated.
2. Under the condition of meeting the requirements of monitoring Target Field of view, its installation height: Indoor ground should not be less than 2.5m, outdoor ground should not be less than 3.5m.
3. The surveillance camera in the elevator compartment should be installed on the left or right side above the compartment door, and can effectively monitor the facial features of the occupants in the elevator compartment.
4. Surveillance cameras and their supporting devices, such as lenses, camera housing, brackets, wipers, etc., should be installed firmly and operated flexibly. Attention should be paid to preventing damage and coordinating with the surrounding environment.
5. Signal line and power line should be introduced separately, and the exposed part should be protected by hose, which does not affect the rotation of pan-tilt.
Installation of surveillance camera control equipment:
1. All cables in the control room should be set with cable trough and inlet holes according to the installation position of the equipment, arranged and tied neatly, numbered and with permanent signs.
2. The installation position of the console and Cabinet (rack) should meet the design requirements, and the installation should be stable and firm, which is convenient for operation and maintenance. The back and side of the cabinet rack shall be clearance distance away from the wall to meet the maintenance requirements.
3. The installation of all control, display, recording and other terminal equipment of the surveillance camera should be stable and easy to operate. Among them, monitors (screens) should avoid direct external light, and when unavoidable, measures should be taken to avoid light.
The equipment installed in the console and Cabinet (rack) should have ventilation and heat dissipation measures, and the internal connector should be firmly connected with the equipment.
PTZ and decoder installation:
1. Check whether the rotation angle range of the pan-tilt meets the requirements according to the product technical conditions and system design requirements.
2. The tripod head should be installed firmly without shaking when rotating.
3. The decoder should be installed near the pan-tilt or in the ceiling (but there must be an access hole).
System features
I. Security monitoring system: the platform is the core and the network is the link.
The scale and planning of the security monitoring system make people a little scared, or users a little scared. How to configure and manage the monitoring images, codec devices, and servers collected by a large number of cameras? Human resources can no longer solve the management problems of large-scale monitoring systems, so the need to build a management platform is very urgent. A good management platform can manage all cameras, alarm set point, coding and decoding, and back-end servers, thus enabling the entire security monitoring system and security protection system to run smoothly. There is a premise for managing the entire monitoring system with the platform as the core. Sufficient bandwidth is needed to connect these devices and servers. Without the network, everything is empty talk.
II. Network Monitoring: multiple different devices are interconnected.
Due to the historical situation of security monitoring system (independent small-scale application is the main), there are many manufacturers of security monitoring equipment, and each manufacturer has its own set of coding and decoding and network transmission practices. However, it is also because of the existence of this situation that large monitoring system platforms are required to be able to access devices from multiple manufacturers. One protects users' original investment; The two users provide solutions to reduce their investment in the construction of the new system. The large monitoring systems under construction have made a lot of efforts in this aspect, all of which have been connected to the video codec equipment of domestic mainstream manufacturers, and have basically realized the transparency of the equipment on the client side.
III. Digital integration, networking and intelligence of the system
Security monitoring system covers a wide range of fields, usually including: Integrated wiring, video surveillance, perimeter alarm, high voltage power grid, access control, emergency alarm, patrol, intercom, public broadcasting, meeting recording, more than ten subsystems, including regulatory information. In recent years, although the security monitoring system has made some progress in intelligence, there are still problems that need to be improved urgently due to various reasons. For a long time, each subsystem mentioned above runs independently, information cannot be shared, and there is no correlation between them, forming an information Island. Once an emergency occurs, the systems cannot be linked and linked in time, and the monitoring images and other security resources cannot be shared, resulting in the management not being able to directly correspond and unable to quickly and efficiently play the role of early warning and prevention; after the event, it is difficult to check and find the correlation between recorded information in a unified way, wasting manpower and material resources, resulting in low management efficiency.
The rapid development and popularization of computer, communication, multimedia and control technology are changing this situation. With the openness, scalability and manageability brought by networking, prison security has been able to take monitoring Image resources as the core, realizing perimeter alarm, high-voltage power grid, emergency alarm, patrol, access control, intercom, public broadcasting, meet with the integration and integration of recording, supervision information and other security resources, and realize resource sharing and information exchange among subsystems through the unified coordination of the upper comprehensive management system, so as to achieve the purposes of convenient management, intuitive data and intelligent security of the system.
Therefore, the future development direction of security monitoring system should be: digital integration, networking and intelligence.