How to build a large security monitoring system

With the popularization of broadband networks and increasing demand from industry management departments for improving management levels, the requirements of large-scale networked security and video surveillance platforms in urban areas have also been met by administrative departments such as city*, transportation, finance, environmental protection, power, medical, and education. In the past two years, a large increase has been made, among which the demand in cities* and the financial sector has been the most prominent.

In the urban* field, the department is making great efforts to build a model city for science and technology and strengthening the police. The first batch of 22 city security monitoring systems have already been implemented. In 2008, the city will achieve 180 demonstrations of strong science and technology, and eventually 660 in China. Cities and 1642 counties need a public security and image surveillance system based on the Internet.

In the financial sector, in the past few years, the major state-owned banks and commercial banks in China have completed the construction of a large number of grassroots digital monitoring systems in accordance with the requirements of the Bank of China’s PBC and digital reconstruction of bank image surveillance systems. Renovation work has now begun to carry out pilot projects for the transformation of various network monitoring and management systems.

With the maturity of network transmission technologies and image coding and decoding technologies, major breakthroughs have been made in realizing the needs of customers in these emerging industries. Large-scale video surveillance systems are rapidly being constructed throughout the country.

Large-scale monitoring system features

With the construction of the urban security system and the industry security system, we can see that these large-scale monitoring systems have some common features:

1. Take the platform as the core and the network as the link

The scale and planning of our current security system has been a bit daunting or a little daunting for users. How does a large number of cameras capture images? How do a large number of codec devices manage? How do a large number of back-end servers fit in and manage? Manpower cannot solve the management problems of large-scale monitoring systems, so build a management The needs of the platform are very urgent. A good management platform can incorporate all cameras into management, incorporate all alarm points into management, put all codecs into management, and put all back-end servers into management so that the entire system can run smoothly.

The prerequisite for using the platform as the core to manage the entire monitoring system is to have a network with sufficient bandwidth (or enough bandwidth that can meet the requirements after being managed) to connect these devices and servers. Without network, everything is empty talk.

2. Access multiple different devices to achieve interoperability

Due to the historical status of the security industry (mainly independent small-scale applications), a large number of equipment manufacturers are created, and each manufacturer has its own set of codec and network transmission practices. This situation is very detrimental to the formation of large networks. However, because of the existence of this status, we require our large-scale monitoring system platform to be able to access devices from multiple vendors. One protects the user's original investment; both provide solutions when users reduce investment during the construction of the new system.

It now appears that large-scale monitoring systems that have been built or are under construction have made a lot of efforts in this regard. They have all been connected to video codec equipment from domestic mainstream manufacturers, and have basically realized the equipment manufacturers and models at the user end. Transparent.

3. The combination of security and business applications is getting closer

The security system, as a specialized service of the security (guard) system, has always maintained a certain distance from other applications in the industry.

However, with the deepening of network monitoring, with the refinement of management levels, more and more requirements are displayed, and security systems need to be more closely integrated with other business applications in the industry. Here are some simple examples: Internet cafe monitoring.

Internet cafes have typical industry characteristics. At the business level, Internet cafe operators are concerned about the operating conditions of Internet cafes, and the departments and business management are concerned about whether Internet cafes operate illegally. Therefore, for the Internet surveillance and video surveillance, both require are different. From a regulatory point of view, the general security monitoring system should be able to meet certain requirements, and from the perspective of the operator, the ordinary security monitoring system obviously can not meet his needs (and will increase his investment). Therefore, how security systems integrate with the business systems of Internet cafes, reduce investment, increase application efficiency, is our security system needs to be considered, and only solve this problem, our security system is everyone's welcome. To help customers succeed.

For these characteristics, we can analyze the technical points of a large-scale video surveillance system:

1, the platform itself 1.1, centralized management

Centralized management is embodied in that a system is managed by a central management and control server in a unified manner. The configuration changes of any system and the joining of new units are all performed by the central management server for unified authentication, distribution, and scheduling, thereby ensuring system consistency and availability. Security, and access to the unit in the access to timely and consistent information and instructions. In the system, all other servers are uniformly allocated by the central management server. When the server changes, the central management server can perform load transfer in a timely manner to achieve a reasonable distribution and balance of system resources. Centralized management is mainly reflected in the fact that system administrators can manage all the devices in the system at their desks, as well as manage the servers and client units in the system without standing in front of any managed objects. Centralized management makes the system simple in structure, reliable in system, easy to access the client unit, easy to manage authentication and permission management, and can use a unified strategy to handle requests with control contention and ensure the consistency of information.

Centralized management is also embodied in a central and multi-level management of the organization's management system. The center establishes the main control center domain, has a central control server, subordinates establish sub-central domains, and has a sub-central control server. The information can be delivered to the subordinate center. The information and request of the subordinate center can also be submitted to the superior center for centralized release, and the user can be managed according to a unified organization to realize the management of multiple subordinate areas. The system arbitrates and grants the interconnection of the two domains.

1.2, distributed services

Because a server can not afford too much device access, to ensure a large number of concurrent access, a multi-server form can be used for distributed services, and at the same time, different types of access are also handled in separate servers. Multiple application servers exist in a domain, allowing dynamic addition or reduction of application servers. When a corresponding server is connected to a central control server, the server becomes available. The central control server coordinates the load between servers (DVR access allocation) according to a certain strategy. The system allows dynamically increasing or decreasing servers. If a server is disconnected, its load is automatically assigned to other active servers.

When the central control server fails, the application server keeps working. After the fault is removed, when the application server is connected to the control server, the current status of the DVR device and the access status of the client are reported to the control server.

When the client requests system access, it will get the connection information of the central control server, automatically connect to the management server of the device to be accessed, and submit the access request to be performed.

1.3, hierarchical storage

It is composed of multi-domain storage and front-end storage. Each domain manages its own equipment. There are multiple storage servers in a domain. It balances the load of the equipment and stores the data resources under a unified path. The unified directory access protocol is used here. Therefore, different storage servers have the same path when accessing the same resource, thereby achieving the purpose of central storage.

Secondly, local storage is also provided on the front-end device, and video is stored locally. This is mainly to achieve the purpose of continuous storage of disconnected networks, and different strategies can be adopted to store necessary data that needs long-term storage in the center, and on the front-end device. Store short-term, comprehensive video data.

1.4, media data forwarding

Because there is a lot of repetitiveness in video surveillance, for the client access, the system adopts the transmission method based on the forwarding server for real-time video distribution, and uses multiple network cards to isolate the device from the client network segment. The device network segment adopts secure TCP. Connection, which can avoid the conflict between the two types of network segments, and ensure the integrity of the data source, while also increasing the actual bandwidth of the server network.

For the historical video viewing on the DVR, the streaming media on demand server transmits the video data to the user's request. The system transmits the data based on the TCP, which ensures the integrity of the video data. For a large number of video viewing requests, the server also performs a cache storage and hitting strategy. The request for viewing the same segment of the video greatly reduces the repeated requests for the DVR and also ensures that the client obtains the timeliness of the data.

1.5, system scalability

Adopts the system's distributed services, and realizes the dynamic service increase and decrease processing, and realizes the system's dynamic extension;

Second, the use of different types of service separation and service registration/deregistration mechanisms has enabled the system to achieve dynamic scalability.

2, device access 2.1, unified access protocol

In order to connect devices of different manufacturers to a large-scale monitoring system, the devices must communicate in accordance with the device access protocol of the system. Only if all devices in the entire system speak the same language, the entire system can be interconnected. The purpose of communication.

Therefore, defining a universal and extensible device access protocol is an important technical task for a large-scale surveillance system.

2.2, provide video development kit

Our unified communication protocol does not mean that all the interconnection and intercommunication problems of the system are solved. Due to various reasons, there are many differences in the encoding formats of audio and video data from various manufacturers, and each manufacturer is required to follow a unified coding. The format and unified data encapsulation format for outputting audio and video data is obviously too demanding. Therefore, it is a good practice to encode data from different manufacturers' devices and use the decoding library (decoding device) provided by the manufacturer to decode the data.

Therefore, if the equipment is to be connected to a large-scale monitoring system, equipment manufacturers need to provide video development packages.

3, intermediate technology

The characteristics of the industry are various, and the requirements of customers vary greatly. Integrating the security system into other business application systems will be a trend in the future. Therefore, our large-scale monitoring system based on the management platform needs to be a very open platform that can provide a variety of development interfaces: input, output, intermediate control, and so on. ,

Therefore, building the basic platform of the security system into a middleware platform is a better solution.

Provides centralized management, device access, media forwarding, centralized storage, electronic map services, alarm access, and more on this middleware platform.

Push Dustbin

Push Dustbin,Top Push Dustbin,Stainless Steel Top Dustbin

Manual Soap Dispenser CO.,Ltd , http://www.nstrashcan.com