Shanghai World Expo Saudi Pavilion Security Integration Application Case

SaveSavedRemoved 0
Deal Score0
Deal Score0

[ad_1]

The importance of security integration platform

In recent years, China’s security market has shown a momentum of vigorous development. According to the “China Security Market Report” issued by the Security Industry Association, China’s security and protection market is expected to soar from US$6.3 billion in 2005 to US$18 billion in 2010. In particular, as China’s international influence is increasing, various major events such as the Beijing Olympics, the Shanghai World Expo, and the Guangzhou Asian Games have promoted the further expansion of the security market.

In addition to traditional video surveillance, the current security system also takes fire alarm, access control, and even building automation, environmental monitoring, elevator control, information release, and daily management as its important components to form a comprehensive monitoring and management system. Unified platform. With such a unified integrated management platform, it can not only realize the integration between security subsystems (such as video monitoring, access control, perimeter prevention and alarm), but also integrate with other various management subsystems, and realize each other The linkage of software and hardware realizes integrated management and ultimately achieves the degree of intelligence of technical prevention work and the improvement of processing efficiency.

The basic idea of ​​building a security integration platform

The author believes that the positioning of the security integration platform is the management platform, which integrates a large number of hardware products and software technologies to achieve the integrated monitoring of various devices. Therefore, building a security integration platform has the following issues to be considered.

· Fully understand the needs of customers, establish corresponding business processes based on the business needs of customers, analyze and collect various data, and distribute, process and display the data, so as to meet the needs of user safety management;
· Through the management of security equipment, including video surveillance equipment, alarm equipment, access control equipment, building equipment and information transmission equipment, automatic collection of information and data is realized;
· Based on the analysis of user needs, fully consider the user’s experience, adopt scientific, humanized, intelligent and innovative design concepts, and show users the actual operating functions with a very practical and friendly interface;
· Stability, reliability, and safety must always be the first element of product evaluation. To establish a user authority pass mechanism, only legitimate users who obtain the pass can access and control the device;
· The system platform must have a wide range of equipment compatibility, because only good equipment compatibility is the greatest protection for the interests of users;
· It should have good scalability and integration performance, and be able to continuously expand as the user’s business model continues to change. At the same time, it can provide standard integrated interfaces such as SIP, WEBSERVICE, etc., which is very convenient to integrate with other technology and business systems.

Security integration requirements of the Saudi Pavilion

As the core and highest monitoring and management of the security system, the security integrated management system of the Saudi Pavilion not only requires the integration of the various subsystems in the security system (closed-circuit television monitoring system, access control system, precautionary alarm), and completes the interaction between the various systems in the security system. Information exchange and linkage control, and can integrate the security inspection information management system, intelligent building management system, automatic fire alarm system, perimeter monitoring and alarm system, and NTP clock synchronization server of the entire venue.

In addition, as a temporary exhibition building, due to its special function positioning and its requirements for “quick construction”, “quick connection” and “quick effect” of construction period and craftsmanship, it provides a security integrated platform for temporary exhibitions. Given new value, the core “three-speed” construction needs are mainly reflected in the following aspects:

· Rapid construction requirements: Due to the requirements of the Expo construction period, the Saudi Pavilion is a special project with “no start time but closing time”. It requires the implementer to complete it within a limited time according to the management regulations of the two countries;
· Quick connection requirements: Since the construction party is the Saudi party, the operator is the Japanese team, and the place of operation is in China, the complex operation structure of the three places, in order to facilitate the needs of all parties to operate and manage the use of members, the security platform must be constituted The graphic interface is the main and the multi-language system is supplemented by the comprehensive operation interface, so that people with different systems can quickly get started. Secondly, through the network access route inside and outside the museum, the security integration system builds an access mode with local and remote thin clients, so that the inside and outside of the embassy can share operating information in and around the museum at the same time.
· Quick-impact requirements: During the construction period, by constructing a wireless or wired + wireless basic security fortification point, a “site management system” is formed to supervise the construction progress and site safety; and when it enters the operation period, it will become a collective The “Intelligent Building Management System” that integrates security deployment and control, building basic unit operation monitoring, exhibition hall three-stream (people flow, logistics, capital flow) monitoring and analysis, etc., enables relevant personnel in different roles to perform effective use at each stage. Reflecting its core values ​​beyond the security platform, providing investors with a more cost-effective comprehensive solution.

The composition of the security integration platform of the Saudi Pavilion

system framework

The entire system is built in a network environment with Ethernet as the bus, and a comprehensive centralized control platform integrating data collection, data processing, and data application is built with IBMS (Intelligent Building Management System) as the redundant server as the center. , Centralized and unified management of the relevant weak current systems in the Saudi Pavilion (Figure 1).

As shown in Figure 1, the integrated platform system consists of a server that is interconnected with other business networks in the venue through network routing to realize the connection with the host/module of each subsystem. In addition, for facility systems without network interfaces (such as closed circuit The TV system is connected to the Ethernet through the conversion of a converter (such as a serial port server, a video encoder, etc.) to meet the requirements of a unified link interface during system integration.

Software Architecture

The integrated platform system takes the JK-IBMS system as the core for secondary development, and implements the deployment of various functions of the Saudi Pavilion integrated platform system. The system uses the collection layer to comprehensively collect and interact with each system interface, and process the collected data The layer performs storage and event linkage according to the application strategy, and mainly displays the collected and processed real-time database data/historical database data in the application layer according to functional blocks (Note: all system software is installed in the main server).

As shown in Figure 2, the platform is a software integrated system that transfers data and business flows. There are two interfaces on the upper and lower sides: the device interface for the collection layer and the actual operating user and external application system at the application layer. In the process of layer-to-layer transfer, the real-time data (such as the converted IBMS internal standard protocol, IBMS standard protocol control instructions, etc.) are carried out between the layers in real-time data (such as the converted IBMS internal standard protocol, IBMS standard protocol control instructions, etc.). The involved processing layer and application layer use standard SQL statements for library operations), which enables users to directly monitor various systems in the library, and realize cross-system comprehensive linkage according to preset plans.

1. System acquisition layer

Composed of several gateways (the gateway completes the protocol conversion between the IBMS system and the equipment system, realizes the monitoring and control of the equipment layer, and builds the basis for integration). The systems for this time mainly include building automation, fire protection, and video surveillance There are six systems including video alarm, entrance and exit control, and computer room environment monitoring. When the system builds the basic collection framework, each system sets up an independent collection gateway to complete the functions of data collection and upload, instruction reception and delivery.

2. System processing layer

The system processing layer is the IBMS system operation processing module based on the gateway layer. The data interaction, preprocessing, upper application interaction, cross-system linkage and other intermediate processing links are completed through the JK-IBMS monitoring server software module. This layer is in the entire The core position of the system completes the interactive functions of the entire system.

On the basis of the main platform of the JK-IBMS system, special management sub-platforms (such as security management, energy management) are formed through inter-system linkage to improve the efficiency of linkage and ensure the success rate of its execution. The linkage configuration method is mainly through “point status -Linkage-point action” one-to-one relationship deployment. In case of one-to-many system linkage requirements, multiple linkage rules can be set for the same device state to ensure the versatility of linkage applications (Figure 3).

The linkage form can be divided into logical linkage and physical linkage. Both of these two linkage methods belong to soft linkage. At the system processing level, the plan realizes linear multi-level cross-system linkage or the configuration rule implements nonlinear simple intelligent linkage.

Logical linkage, that is, the linkage of system application functions. The linkage itself does not constitute an integrated subsystem or a change in the physical state of the point. The resulting linkage result is mainly reflected in the IBMS system, mainly to facilitate the user to order the information of each system Monitoring and overall control are mainly manifested in the following three aspects.

1. When an event occurs at a certain point of the intrusion alarm system through the linkage strategy, the video surveillance multimedia control currently viewed by the user is automatically switched to the corresponding area video (PTZ control in logical linkage).
2. When a fault alarm occurs at a certain system point, the system will record the time of the event through sound, printing, etc. while generating the alarm record.
3. The system automatically forwards the data to the corresponding system after receiving the data required by the external system

Physical linkage, this kind of method is to control the equipment points of the integrated subsystems according to linkage rules to make their status change. The result is that even if the point status changes, the main purpose is to realize the use of the system itself. The characteristics of system integration realize cross-system non-linear intelligent linkage through command interaction, which is mainly manifested in the following two aspects.

1. When an alarm occurs in a certain area, immediately switch the set monitor to the area, and send the full open/close command to the entrance and exit system of the area (Note: The linkage behaviors here are all through the configured linkage Rule execution).

2. When the number of people increases, the system operator is prompted to operate the building control equipment (such as air conditioning, exhaust, lighting, etc.), and after the operation is confirmed, it sends instructions to the building control equipment to control the status change of the designated equipment.

Application layer

1. The main user interface

The design of the system will enable the Saudi Pavilion management staff to manage the Saudi Pavilion’s intelligent system more quickly, effectively and conveniently through a user-friendly interface.

The user display interface will adopt the actual floor plan of the Saudi Pavilion, the physical distribution diagram of the system equipment, and the actual connectivity system diagram of each subsystem. The real-time status of the system will be displayed in a dynamic icon display mode. The administrator can choose to enter the Saudi Pavilion at will. Any floor and subsystem, and can enter deeper and more detailed system environment as needed. In the case of an alarm or abnormal state, relevant alarm information can be automatically popped up so that the administrator can solve the problem as soon as possible.

Regarding the control of the system user interface, the application of the system basically only needs a mouse to perform the main control, deployment and monitoring functions. All the instructions of the management personnel are translated by the user control interface and transmitted to each designated device, so that they can perform the set tasks. On this basis, the user control interface also receives the information sent by each device at the same time, and displays it in an interface display mode readable by the administrator after processing.

2. System control interface

The overall framework of the system interface can be divided into seven parts: system main module bar, subsystem navigation bar, geographic area navigation bar, main operation area, operation auxiliary area, system alarm area, and system status bar. However, the system is in a different main module bar. When, some operation areas (such as the geographic area navigation bar) will not appear.

Device display mode

There are three ways to display device information.

· The first method is to display the name of the device when moving on the device;
· The second way is to click on the device in the picture, the main attributes of the device will pop up:
· The third method is to open the main properties of the device, and then click “Detail” to pop up the detailed property information of the device, which is the detailed information of a camera.

Concluding remarks

Behind the successful interpretation requires not only a well-planned theme, but also a good security operation guarantee system. Combining the experience in the fields of banking, securities, electric power, large public construction, and commercial buildings, the author realizes the need for building a security system for the building system. A complete security integration platform can further expand its functional domain through continuous communication with the construction and users, effectively guaranteeing the investment of the builders, and also an optimization and integration process of the products in the security system.

1

[ad_2]

We will be happy to hear your thoughts

Leave a reply

RFID made in China
Logo
Enable registration in settings - general
Compare items
  • Cameras (0)
  • Phones (0)
Compare