Overall solution of Ping An rural network monitoring
1、 Programme background
With the deployment and implementation of the strategy of building a new socialist countryside put forward by the Party Central Committee, the construction of rural security has been put on the agenda. This undoubtedly creates a new market space for security enterprises. Due to the acceleration of urbanization, a large number of migrant workers pour into the city. The rural areas dominated by old and weak women and children have become a new target for criminals. The weak rural public security often gives criminals an opportunity. Strengthening the construction of rural security system will help to improve the rural public security environment, protect the safety of people's lives and property, and improve the people's awareness of security.
2、 Design principles
1. Interoperability
The monitoring units at all levels in the monitoring system must be able to communicate and share data effectively, and open interfaces with other systems must be reserved.
2. Practicability
The design is reasonable, the structure is simple, the operation is convenient and practical, which can effectively improve the work efficiency and meet the actual needs of the monitoring and integrated management platform
3. Expansibility
The scale and function of the system are easy to expand. The supporting software of the system has the ability to upgrade, and SDK and secondary development agreement can be provided.
4. Normative
The control protocol, video codec, interface protocol, video file format, transmission protocol, etc. comply with the technical specifications of the latest industry standards.
5. Ease of operation
The whole system is required to be flexible, easy to use, easy to learn and use, easy to manage and maintain, and provide Zhongwei cloud vision network management system software for free to realize multi-level remote access function.
6. Security
Necessary security protection measures shall be taken for the system to prevent illegal access, illegal access, virus infection and hacker attack, lightning stroke, overload, power failure and man-made damage. The device must support mainstream encryption methods.
7. Reliability
Mature and stable technology and equipment shall be adopted, and backup and redundancy measures shall be taken for key parts, which can ensure the long-term effective and stable operation of the system and have strong fault tolerance and system recovery ability.
8. Maintainability:
The system has the functions of self inspection, fault diagnosis and fault weakening, and can be repaired in time and quickly in case of fault.
9. Unity
The equipment used by each independent subsystem must be the products provided by the same manufacturer to avoid the problem that the products of different manufacturers cannot be compatible in the later development and expansion.