Shenzhen Metro Line 5 Integrated Security System Case
[ad_1]
As the main transportation facility, rail transit has the characteristics of large capacity, fast speed, safety, punctuality, environmental protection, energy saving and land use. The solution to urban transportation problems lies in the priority development of urban public transportation systems with rail transit as the backbone. In recent years, China’s rail transit construction has entered a stage of rapid growth, and the characteristics of rail transit’s closed environment, long lines, and wide area coverage have brought urgent needs for public security. The construction of a rail transit security system is not easy. On the one hand, the scale of various security subsystems is huge and complex, and on the other hand, market demands and new technical requirements are constantly changing. Therefore, this places higher requirements on the security system equipment suppliers. The following takes the integrated security integrated system of the comprehensive building of the Tanglang Depot of Shenzhen Metro Line 5 as an example to analyze the characteristics of rail transit security system construction and advanced and complete solutions one by one.
The Tanglang Depot of Shenzhen Metro Line 5 is located in the east of Nanshan District, west of the intersection of Liuxian Avenue and Central Avenue. The main body of the station runs east-west along Liuxian Avenue. This station is a three-story elevated island platform station on the ground with a 10m wide island platform. The total length of the station is 140m, the standard section width is 17.80m, and the total construction area of the station is 7,971 square meters.
The project is a comprehensive building for the depot, which includes two parts: the main building and the annex. The building height is 99.5 meters and the total construction area is 59,429 square meters. The first to fifth floors are mainly for police, office and staff canteens, the sixth to 27th floors are mainly for staff dormitories, and the first to ninth floors of the annex building are mainly for operating offices and functional rooms.
This project is a comprehensive security integrated system, which needs to fully support the technical architecture of the public security integrated numerical control integration platform, and combine computer technology, network technology, communication technology, and automatic control technology to integrate and manage various subsystems, and supplement and improve the subsystems The function of building a central monitoring and management interface for the entire subway. Through a visual and unified graphical interface, managers can easily and quickly implement monitoring, control and centralized unified management of all subsystems in the complete system. Through this set of products, the characteristics of centralized management, decentralized control and optimized operation of the system can be realized. How to embody this feature can be specifically analyzed from the aspects of system composition, platform structure, and platform functions.
First of all, from the perspective of the composition of this system, the subsystems this time mainly include the following: CCTV monitoring subsystem, access control subsystem, perimeter alarm subsystem, help call subsystem, parking lot management subsystem, offline patrol Subsystem. The independent operation of each subsystem does not affect each other, and the platform conducts decentralized control and management through docking with each subsystem. Taking the closed-circuit television monitoring subsystem as an example, the integrated security integrated system platform controls the video security monitoring system (RS232 or API, etc.) interface provided by the video security monitoring system (RS232 or API, etc.).
1. The system can manage all cameras in a variety of ways with electronic maps and menus;
2. The action sequence of all cameras can be preset;
3. Set the actions of each camera, receive alarm information from other systems and perform corresponding linkage;
4. Observe real-time dynamic monitoring images from the window;
5. Control the camera rotation, tilt and zoom focus, and automatically generate detailed reports for alarm records.
When an alarm occurs in the building (such as receiving an illegal entry signal or a fire alarm message), the camera closest to the scene is pointed at the alarm location according to the linkage relationship, and the image signal of the camera is immediately switched to the main monitor.
In addition, in addition to decentralized control of the subsystems, the integrated security integrated system platform will also conduct centralized management of the subsystems through layers. The entire comprehensive security integrated system platform has three layers, including the equipment layer, the control layer, and the application layer.
The equipment layer is composed of the control, subsystems or device drivers included in the integrated security integrated system, as well as related integrated wiring, communication, and computer network systems. This layer mainly collects and processes real-time information of the subsystem field control equipment . Since each subsystem may adopt different communication protocols and data formats, the drive system of this layer completes the conversion of different protocols and data formats. That is to complete the conversion of the different communication protocols and data information formats of the various subsystems into the protocols and formats recognized by the upper layer (the core decision-making layer), and at the same time convert the information processed by the core layer into the protocols and formats recognized by the corresponding subsystems. Complete the control and management of each subsystem. This layer actually functions as a communication gateway, and can also be called a communication gateway.
The control layer is a key part of the entire system and the “nerve center” of the system. The main tasks it completes are:
(1) The information of each subsystem input from the bottom layer is processed according to the inherent logical relationship, and the processed result is transmitted to the corresponding database, and the upper layer is notified to display it in an intuitive manner. At the same time, it accepts the request information or system control information issued by the upper-level (GUI) authorized operators and processes these information accordingly, and informs the driver layer of the result, and the driver layer informs the corresponding subsystem to complete the corresponding action.
(2) Accept the request information for information integrated management from the upper level (GUI) authorized operator, complete these requested information as required for comprehensive processing, and return the result to the GUI layer for display and output.
(3) To complete the linkage function processing of each subsystem, the occurrence of an event will not only cause the reaction of the subsystem to which the event belongs, but also cause other subsystems related to it to take corresponding actions. This linkage relationship is decided by the core layer.
(4) Provide a standard API interface for the lower and upper layers, and a standard ODBC interface for the database system to complete the internal communication with each part of the system.
The application layer is the window of man-machine dialogue. On the one hand, the information processed by the core layer is displayed on the computer screen in a clear and intuitive way, providing users with real-time monitoring and control of all on-site information of the entire building. On the other hand, through this layer of interface, the user can complete the functional configuration and setting of the subsystem according to the pre-design, complete the linkage setting and the comprehensive management of the system.
The user interface layer can support WEB technology, all information can be browsed in the INTERNET/INTRANET environment through a browser, and the remote control and management of the system can be completed through authorization
In addition to the above-mentioned characteristics of centralized management and decentralized control of the system, this integrated security integrated system platform is also an important feature of optimized operation, which can facilitate users to improve work efficiency and reduce operating costs. The powerful and diversified platform functions not only allow the subsystems to perform their duties, but also optimize the operating conditions of the entire system to ensure efficient work by multiple parties. The functions that can be realized by this system are as follows:
(1) Video stream management service
The platform provides users with client-side IE browsing access mode (WEB service), realizes digital video streaming unicast and multicast services, and provides multiple people with the function of viewing 1 channel of video images at the same time (video forwarding service), and centralizes digital video streams Management to provide relevant video index information for video forwarding services. In addition, arbitrary camera images can be selectively stored at the front end, and a disk array can be used for storage (video storage management service).
(2) Real-time image monitoring
On the premise of ensuring real-time and image quality, the platform uses mature H.264 image coding technology to effectively transmit images. The video wall of the monitoring center can display all the image information of each important part in real time, and complete the real-time display function of the image of the important part. Multi-channel (1, 4, 9, 16) real-time image information can be monitored in real time on the authorized client computer to realize simultaneous monitoring on the same screen of one machine.
(3) Round robin
The system has the function of automatic video patrol. The interval time can be set on the TV wall of the monitoring center to display the images of all the monitoring points in the entire system. The objects participating in the patrol can be set arbitrarily, which can be different cameras in the system. , It can also be different preset positions of the same camera, etc. (the front-end camera pan/tilt and decoder support the preset positions), and the interval of round-robins can be set arbitrarily.
(4) Remote control
The monitoring equipment (including PTZ, lens, etc.) can be remotely controlled on the keyboard of the monitoring center and authorized client computers. The level of control rights can be set. High-priority users can unconditionally obtain the control rights of low-priority users according to the principle of level priority, and users of the same level can obtain control rights according to the principle of time priority.
(5) Video recording and video playback
In the monitoring center, the video image of any camera in the system can be displayed, stored, retrieved, and replayed. In addition, full-frame recording, frame skipping recording, timing recording, alarm trigger recording, and screen movement detection recording can be realized on the recording server of the monitoring center. In addition, the playback methods of historical images (time can be set) include: frame by frame, slow playback, normal speed, fast, zoom in/out and other methods.
(6) Web browsing
Users can browse real-time and playback historical images through the Web server with a standard Web browser. Browsing the Web with IE browser
When the server is used, a password is used to log in, and there is an IP address verification to ensure the security of the system and the network. In the web browsing mode, authorized users can also control objects such as cameras and pan-tilts.
(7) Storage management
The platform can realize the functions of regional decentralization and centralized storage, reduce the network backbone information data flow, and improve system efficiency. In addition, the system can also copy distributed data to the centralized storage device of the back-end monitoring center through the network.
(8) Electronic map
The system client software can import the electronic map, mark the position of each camera on the electronic map, and use and adjust the front-end camera and image by clicking the camera icon. At the same time, there is the distribution of alarm detectors on the electronic map. Once a detector alarms, the corresponding detector icon will flash, and the alarm corresponding image will be displayed on the main display.
(9) Authority and security management
With user login and security management functions, users log in and use according to authorization. When logging in, its authorization must be authenticated on the management server through the network, and it is not allowed to log in without leaving the management server. In addition, user permissions can be set according to operation, modification, and management (create/delete users), and are associated with various devices and targets to ensure the security of target devices and information and network security.
On the other hand, all important operations of the system, such as login, control, logout, alarm confirmation, etc., have operation records. The system can query and count the operation records. All operation records cannot be deleted or changed. Not only that, the internal data transmission of the system will be encrypted to ensure that system data and information are not stolen or destroyed. All important data stored in the system, including user information, fire alarm information, operation records, logs, etc., are also undeletable and unchangeable. sex.
This comprehensive security integrated system designed based on mature, advanced, and practical principles not only integrates the various subsystems into a complete and harmonious integrated network system, but also allows the system to share a high degree of information and reasonably distribute it. The project is based on a digital system, combined with advanced design concepts to ensure the stability and advancement of the system, intelligentize the subway building, maintain the safety of the surrounding environment of the subway station, and inject new vitality into the development of the security system .
[ad_2]