| In decades, security monitoring systems (SMSs) are paid attention on in different walks of life. Xianneng Monitoring limited company (Xianneng Co. Ltd.) has introduced all sorts of SMSs being applied in armies, prisons, bank, campuses, etc. The systems mainly include video surveillance systems, intrusion alarm system and access control systems. However, all the mentioned systems are relatively independent to each other because of lack of an integrated management system. It is used to provide these independent systems with services to the entire management. In this case, Xianneng really needs an "all-in-one" software management system as a system to integrate all SMSs in a rush. It simplifies and unifies procedures, like processing data and analyzing data of sub-systems under a same user interface. Moreover, it increases the effectiveness and efficiency of monitoring and enhances capability of analyzing data. Therefore, the goal can be achieved, that "one-piece-integrated management and connection among the whole system", so to level up the techniques of corporations using the management system.To start with, the background of different kinds of SMSs and their disadvantages is introduced. Also, the necessity of integrated management system of SMSs, being established on SOA, is clarified. Based on those foundations, the following paragraphs discuss the key functions and analyze the core procedures respectively. The former ones are data acquisition and alert information while the later ones are data receiving, data storage, user registering and message information of such monitoring systems as the combination of a video monitoring system, an alarming system and an access control one. What is more, the report writes analysis of service custody architecture of the system and designs of sub-systems, for instance, data management sub-systems, user management subs. How to bring the integrated text message system and video monitoring system into reality is highly emphasized by using SOA-based web services technology. The "step-by-step-deployed or one-time-deployed" requirements of the system are met to maximize profit in this way. Last but not least, the paper analyzes the stability and the scalability of managing the system. |