Joke Collection Website - Blessing messages - Key points of system construction for power environment monitoring
Key points of system construction for power environment monitoring
The bottom-end device has alarm records
The traditional method uses a multi-serial port card or a multi-serial port server to run the collection program through the bottom-end monitoring host for data processing. When the monitoring host is abnormal (hardware failure) , program errors, virus attacks, etc.), the monitoring will be seriously lost/missing, and maintenance personnel must go to the site to troubleshoot.
The system should use bottom-end monitoring and collection equipment with on-site alarm generation and recording functions to achieve offline recording and storage, and automatic reporting after online; alarm records defined after offline can send alarms to management through the phone SMS module The responsible person's mobile phone can provide SMS or phone notification functions. The bottom-end device data is actively uploaded
The bottom-end monitoring and collection equipment of the system adopts an active reporting mechanism, which is greatly different from the traditional (multi-serial port card and multi-serial port server) master-slave pointing mechanism. It is pointed out that complete data collection of each power/environment equipment is required. The response time of the power equipment to the collection command is determined by the performance of the power equipment itself. The response rate can be fast or slow (a single device takes more than 10 to 20 seconds to respond). , and respond individually one by one.
The system should adopt an active reporting mechanism, and the intelligent device protocol collector completes front-end data collection and protocol conversion, and converts it into a unified communication protocol to communicate with the device monitoring access controller (including communication protocol conversion, communication wave Bit rate conversion, address conversion). Video linkage alarm display
The system needs to be highly integrated with traditional dynamic environment monitoring, video monitoring, access control management, and alarm management (intrusion and anti-theft). The system has an alarm center duty function. When an alarm occurs in the computer room, it will automatically pop up. The alarm is bound to a video image to achieve video linkage alarm display and visual alarm management. Through video linkage, remote video review can be achieved. Alarm notification
The system platform has a reliable alarm notification function, which is a two-level alarm function:
1. Central alarm notification. After the monitoring center receives the alarm information, if the alarm is not confirmed after a number of minutes (can be set), the responsible person will be automatically notified through the alarm facility of the center platform. It can realize phone voice notification and text message content notification.
2. Bottom alarm notification. After a network failure, the system can still automatically communicate with the person responsible through the bottom alarm device. Realize phone voice notification and text message content notification.
With the above alarm notification function, the platform can schedule and manage the alarm reception personnel. For example, the alarm of UPS and power distribution cabinet will be notified to person on duty A from 08:00 to 18:00, and from 18:00 to 08 in the evening. : 00 Notify duty officer B; notify maintenance person C of machine room access control alarms 0:00~24:00. Any combination of shifts can be arranged according to actual needs. Intuitive data display
The system must have an intuitive data display function, which can display the dynamic environment information of the computer room through the graphic control display interface and the data list display interface. Alarm plan
The system must support the alarm plan function, and the priority of the alarm plan can be defined. The system area supports tree nodes with node area belonging function. If the alarm and plan have been defined in the upper level area IP intercom based on regional group and regional ownership priority plan function
In order to ensure timely and convenient computer room management, the system requires each computer room and monitoring center to install an intercom system and use IP network two-way voice intercom , realize the functions of bottom-end call center, center and bottom-end shouting, monitoring (1-to-1, 1-to-many), etc. It can realize remote conference calls, video linkage, and call up the bound video image synchronous intercom function. In order to confirm the identity of current personnel and visualize the on-site situation management. Arming and disarming
The arming and disarming function integrates dynamic ring monitoring and access control. The dynamic environment monitoring system requires that alarm equipment (infrared dual signature, vibration detection, door/window magnet, etc.) and access control equipment management functions be integrated into the same equipment monitoring access controller to facilitate integrated management of access control and alarm systems, arming and disarming The two subsystems are organically combined and interconnected to prevent the use of independent alarm hosts and access control systems for frequent combined operations to achieve arming and disarming.
For example: multiple card swipes or key presses are used to arm the system, legal card swiping is used to enter and the system is automatically disarmed at the same time, and the platform software can remotely arm and disarm the system. Access control
The dynamic environment monitoring system requires the control of the entrances and exits of each computer room. It can realize two-way or one-way card entry and exit. Different dates and time periods can be set through the schedule to have different door opening modes, such as: machine room The door can be entered and exited by swiping the card during working hours, and the entry and exit mode of the access control automatically switches to the card personal password during off-duty hours.
In ordinary computer rooms, you can swipe the card to open the door during working hours, and swipe the password after get off work to prevent card loss.
The key computer room can open the door by swiping the card during working hours, and remotely confirm the door opening by phone after get off work. It can be used normally even when offline. Personnel access authority management
The dynamic environment monitoring system can authorize according to personnel groups, avoiding the cumbersome operation of authorizing people one by one, and can be flexible when authorized staff in the dynamic environment system change due to transfer positions. To transfer its authorization, there is no need to delete its data and re-enter the authorization. The authorization method is carried out in a drag-and-drop manner, which is convenient, concise, easy to learn and understand. Video linkage capture
The power environment monitoring system requires the function of linking video surveillance and access control to facilitate quick video switching when an alarm occurs and quick video viewing afterwards. The specific functional requirements are as follows:
① The system has a capture server for video capture and video storage. The captured videos and pictures are stored on the capture server. For communities with a small number of cameras (less than 200 cameras) The capture server and the computer room server can be merged. For communities with a large number of cameras, one or more independent capture servers must be configured (one capture server is added for every 200 additional cameras);
② System requirements can be Arbitrarily configure which alarms and events need to be captured, which cameras are used for capture (supports 1-3 cameras to capture simultaneously), whether to capture pictures, capture videos, or both. It is also required to configure the capture from the alarm or event. How many seconds before to how many seconds after the video.
③ When an alarm or important event occurs at a certain door point, the personnel on duty in the general monitoring center can simultaneously pop up the electronic map and the door point where the alarm occurred within 10 seconds (when the network is open) at the alarm workstation. Real-time video images of all cameras (1-3) corresponding to this door point. Data summary
The system supports the data summary function of upper-level and lower-level servers, which can realize multi-level networking architecture. The lower-level server automatically reports relevant dynamic environment monitoring information and automatically synchronizes it to the upper-level server. The upper-level server can Information on all monitoring and measuring points in the jurisdiction. The power monitoring data of each access point can be analyzed on the upper-level server to provide users with more summary data. Video capture query
In order to facilitate quick video capture retrieval for computer room managers, the power environment monitoring system must provide a convenient video capture query function, as follows:
First of all, the system can Query one or more specified types of event records and alarms within a specified range (which can be a regional computer room in the entire district, a partial regional computer room, a specific door, a specific device, or any selected range) Record and output to the same report interface, and the corresponding captured video and captured image information can be popped up by double-clicking any record, and can be played back immediately. Video viewing
Due to the large number of cameras in the power environment monitoring system, in order to improve the efficiency of handling emergencies using a large number of cameras installed in the system, the power environment monitoring system must provide real-time video viewing integrated with the electronic map Function.
The power environment monitoring system requires that all installed cameras be placed on the electronic map. Through the system's electronic map interface, you can quickly find the camera you need to view, and right-click to pop up the real-time video of the camera. Fire alarm linkage
The power environment monitoring project is a project to protect the computer room. Achieving quick escape in the event of a fire alarm is related to the life safety of personnel.
Therefore, the power environment monitoring system must meet the needs of emergency evacuation and fire protection, and must be linked with fire protection to ensure that when a fire or other emergency occurs, the system automatically opens the door lock to achieve quick and safe evacuation. Voice prompts
In order for the people to better use the access control system, to effectively remind on-site residents to operate according to the normal usage process, and to avoid reducing the security of the system due to personnel negligence, it is required that the door The point site must have a voice prompt function. The details are as follows:
It is required to configure it at the door points where broadcasting and reminders are required (it can be configured at each unit door and computer room door where access control is installed, or it can be configured only at the computer room door, depending on the project funding situation) The voice module provides corresponding voice prompts for events that occur at the on-site gate. The power environment monitoring system can be set through the workstation software to play different voices when different events or alarms occur. These voice materials can be downloaded to the end device through the platform, ensuring that voice broadcasts can be made even when the access controller is not connected to the platform. For example: "Open the door legally, please come in" will be played when the card is swiped normally, "Door is not closed properly, please close the door" will be played when the door is not closed, and "Illegal entry, please leave immediately, the platform has alarmed" will be played during illegal intrusion.
At the same time, personalized services can be provided based on whether the authorization has expired: if the access authorization is about to expire, a voice announcement will be made one week in advance. When the cardholder swipes the card at the door, the system will automatically prompt: "This card is about to expire, please go to the management center to renew!" High integration
Since the power environment monitoring system must realize the data summary function of the entire system and the linkage function of each subsystem, therefore, the construction of power The environmental monitoring system can only use a single platform with high integration. Otherwise, each part of the system will become an island and cannot effectively realize functions such as information summary, trajectory query, and demographic analysis, nor can it realize video linkage capture, alarm, etc. Video screen real-time pop-up and other linkage functions.
Single platform and high integration means that the system uses a set of system software and a database to realize the integration and integration of various subsystems in power environment monitoring. Dynamic environment monitoring, access control management, video surveillance, visitor management, online patrols, information release, etc. can realize resource sharing and information exchange in the system, and realize real-time linkage and intuitive correspondence between monitoring images and other subsystems.
- Previous article:How to send an invitation message when you invite a teacher to dinner?
- Next article:How to view bank transfer records
- Related articles
- Do you want to reply to the work message after work?
- Epidemic prevention and control reminder for returnees in Yantai Penglai District on January 27, 2022
- Apply for an interview and introduce yourself.
- Weather forecast for the next five days in Taizhou, Jiangsu Province
- Why does oppofindx3 mobile phone have a black screen when touched?
- How to restore SMS after Apple's mobile phone replacement?
- When the mobile phone sends and receives text messages or calls, the TV and computer monitor will be subject to certain interference.
- I have bought N tickets with the 1236 high-speed train, but I don't know why there is always such a passage now. In order to protect your personal information, iron
- How to open the incoming call report of Apple SMS?
- Business hours of Suzhou Bank during the epidemic period