Kunshan security monitoring installation application tutorial-Jiangsu Heka Intelligent Technology
Author: ComeFrom: Date:2019-8-26 21:14:01 Hits:1858
Regarding the installation of security monitoring in Kunshan, our company has compiled the content about the knowledge of security monitoring equipment.
Basic knowledge of security monitoring equipment - installation and application tutorial
The Kunshan monitoring system installation first decides whether to install a monitoring card on the existing computer or an embedded hard disk video recorder as your monitoring host. Using a computer to install a monitoring card requires a relatively low overall investment, and is suitable for places that are familiar with computer installation, have professionals on duty, and have many functional requirements. The computer needs to be turned on 24 hours a day; the use of the embedded hard disk video recorder does not require professional knowledge, no need to be on duty, and the operation is very simple, as convenient as using a VCD;
Secondly, the Kunshan monitoring equipment needs to determine how many cameras to install, and determine the monitoring range and image quality of each camera. First decide the number of cameras for monitoring, and then determine the scope of camera lens monitoring according to the specific situation: the distance from the camera to the monitoring point and the area to be monitored must be clear. As for the clarity, we believe that the camera with 480 TV lines is enough.
Third: whether to have night vision function, if your monitoring equipment is installed in dark places such as corridors, hallways, aisles, warehouses, etc., you can consider cameras with infrared night vision functions. It should be noted that infrared cameras are not only professional night vision cameras In addition to visual or special order, the infrared camera also needs to have lights to assist the five fingers on the spot, and the infrared distance will be shortened exponentially. If the scene is a garden lawn, the infrared effect is even worse.
Fourth: direct wiring or wireless transmission to install. In addition to the expensive price, the wireless network does save the trouble and unsightly installation of the camera, but it needs to pay attention to the problem of distance and obstacles. In principle, cement building materials will shorten the wireless transmission distance, and metal materials will completely block the wireless signal. The transmitter (on the camera side) and the receiver (on the host side) should be far away from other electrical appliances to avoid interference. If you want to use a wireless network , It is necessary to have monitoring equipment that can afford more than 2 times the price. We recommend using wired transmission for installation unless necessary.
Fifth: On-site monitoring installation and network monitoring When determining the installation of the monitoring system, you should consider whether network functions are required. That is to say, if you need to monitor and control the monitoring site at any time on the Internet, you need to choose a monitoring system with network functions. host. Avoid the installation is complete but there is no network transfer function.
Basic knowledge of security monitoring equipment - basic knowledge and installation of monitoring equipment
Step 1: Decide whether to install a monitoring card on the existing computer or an embedded hard disk video recorder as your monitoring host;
Using a computer to install a monitoring card, the overall investment is relatively low, and it is suitable for places that are familiar with computer installation, have professionals on duty, and have more functional requirements. The computer needs to be turned on 24 hours a day; the use of the embedded hard disk video recorder does not require professional knowledge, no need to be on duty, and the operation is very simple, as convenient as using a VCD;
Step 2: Decide how many cameras you need, and determine the monitoring range and image quality of each camera
First decide the number of cameras for monitoring, and then determine the lens monitoring range of the camera according to the specific situation: the distance from the camera to the monitoring point and the area to be monitored must be clear. You can get the approximate lens parameters according to the following formula. As for sharpness, we think: 420 TV lines of cameras are enough.
Step 3: Whether to have night vision function
In corridors, hallways, aisles, warehouses and other dark places, cameras with infrared night vision function can be considered. It should be noted that in addition to professional night vision or special customization, infrared cameras also need to have lights to assist five fingers on the spot. Under the conditions, the infrared distance will be shortened exponentially. If the scene is a garden lawn, the infrared effect is even worse.
Step 4: Wiring or Wireless
In addition to the expensive price, wireless network does save the trouble and unsightly of camera wiring, but it needs to pay attention to the problem of distance and obstacles. In principle, cement building materials will shorten the wireless transmission distance, and metal materials will completely block wireless signals. The transmitter (on the camera side) and the receiver (on the host side) should be far away from other electrical appliances to avoid interference. If you want to use a wireless network , It is necessary to be prepared to pay more than 2 times the price. We recommend using wired transmission unless necessary.
Step 5: On-site monitoring and network monitoring
When you determine the monitoring system, you should consider whether you need network function, that is to say, if you need to monitor and control the monitoring site at any time on the Internet, you need to choose a host with network function.
Kunshan security monitoring equipment selection guide
1. The convenience of system upgrade and maintenance. Due to the large scale of the system, the system software and core equipment should have automatic upgrade and maintenance functions; in addition, the security monitoring system is composed of multiple complex systems, including network, storage, operating system, platform software, various front-end equipment, etc., so Each subsystem is required to have work log records, including system modules and core equipment.
2. Practicality. The system should consider factors such as local environmental conditions, monitoring objects, monitoring methods, maintenance and investment scale, and can meet the needs of the normal operation of the monitoring system and the management of social and public safety.
3. Scalability. Distributed system and modular structure design should be adopted to meet the needs of system scale expansion, function expansion and supporting software upgrade. Users can expand or tailor the system at any time as needed, reflecting sufficient flexibility.
4. Reliability and stability. The system should adopt mature technology and reliable equipment, and have backup or redundancy measures for key equipment. The system software has the maintenance guarantee ability and strong fault tolerance and system recovery ability to ensure that the system runs stably for as long as possible, and once the system fails, it can be repaired or recovered as soon as possible.
5. System management functions and ease of operation. Considering the scale and complexity of the networked system, the management software platform should have a better system architecture, and the system core management and business management must be clearly separated to ensure that different application requirements are met. Due to the large number of various management servers, storage and forwarding servers, etc. in the system, the network management function of the system must be strong, otherwise daily maintenance cannot be carried out; the management and user interface provided by the system should be clear, concise and friendly, and the control should be simple and convenient. Flexible, easy to learn and use, easy to manage and maintain.
6, cost performance. The designer should reasonably set the system functions, correctly carry out the system configuration and equipment selection, and ensure that the overall price of the system is low on the premise of good grades of key equipment, so that the system has a high cost performance ratio.
7. Compatibility and standardization. Compatibility is the key to realizing interconnection between devices of many different manufacturers and different protocols. The system should be able to communicate and share data efficiently, as far as possible to achieve compatibility and interoperability between devices or systems. The higher the degree of standardization and the better the openness of the system, the longer the life cycle of the system. Control protocols, transmission protocols, interface protocols, video and audio codecs, and video and audio file formats should all comply with the provisions of corresponding national standards or industry standards.
8. Advancement and inheritance. The construction of the monitoring system cannot completely abandon the original analog-based system. The appropriate method is to include the original analog system as much as possible on the premise of planning a fully digital system. The most ideal system is a seamless connection between the two to form a complete security monitoring system.