Ping an rural network monitoring overall solution
I. program background
With the deployment and implementation of the strategy of building a new socialist countryside proposed by the party central committee, the construction of rural security and prevention has been put on the agenda. This for security enterprises, no doubt created a new market space. Due to the speeding up of urbanization, a large number of migrant workers into the city, mainly the elderly women in rural areas has become the new target of criminals, weak rural public security tend to give an opportunity to criminals. Strengthening the construction of rural security and defense systems will help improve the public security environment in rural areas, protect the safety of people's lives and property, and raise people's awareness of security and prevention.
Ii. Design principles
1. Interoperability
The monitoring units at all levels in the monitoring system must be able to communicate and share data effectively with open interfaces to other systems.
2. Practicability
The design is reasonable, the structure is simple, the operation is convenient, suits the reality, can effectively improve the work efficiency, satisfies the monitoring comprehensive management platform actual need
3. Extensibility
The system scale and functions are easy to expand, and the supporting software of the system has the ability to upgrade, which can provide SDK and secondary development protocol.
4. Normative
Control protocol, video codec, interface protocol, video file format, transmission protocol and other technical specifications in line with the latest industry standards.
5. Easy operation
The whole system requires flexible operation, easy to use, easy to learn and easy to use, easy to manage and maintain, and provides the software of medium dimension cloud visual communication network management system to realize multi-level remote access function free of charge.
6. Safety
Necessary security measures shall be taken to protect the system against illegal access, illegal access, virus infection and hacker attacks, lightning strikes, overload, power outages and man-made damages. The device must support mainstream encryption.
7. Reliability
With mature and stable technology and equipment, key parts should be backed up and redundant measures should be taken to ensure the long-term effective and stable operation of the system and strong fault tolerance and system recovery capacity.
8. Maintainability:
The system has the function of self-check, fault diagnosis and fault weakening, and can be repaired timely and quickly in case of failure.
9. Unity
The equipment used by each independent subsystem must be provided by the same manufacturer, so as to avoid the problem that the products of different manufacturers cannot be compatible in the later development and expansion.