Font Size: a A A

Design And Implementation Of Surveillance Camera Systems Based On Secrecy Net

Posted on:2013-04-23Degree:MasterType:Thesis
Country:ChinaCandidate:X DengFull Text:PDF
GTID:2248330395484964Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the progress of science and technology, network technology, softwaretechnology, distributed servers cluster and video monitor technology developunceasingly and play an important role in public sphere. However, plenty of problems,including signal instability and low security performance, were found during theutilization of the technologies into the secret-relating network. To solve theseproblems, we propose the scheme basing on the video monitoring system ofsecret-relating network.With the characteristic of high security and stability, simple operation, compactstructure, easy maintenance, our system meets the demand for stable signaltransmission of remote video monitoring, equipment remote management,early-warning, information security, real-time backup, scalability and so on. There isa tight link among front-end, internet link and client-end. Especially, the systemcould integrate the resources of servers and common computers, manage the bottomphysical resource detailedly, dispatche and deploy resources properly, enhance theresource utilization and keep load balancing.The main works include:Orchestrating the basic situation of system, meet the demands of secret nets,equipment management and object-oriented, abide the principles of construction ofsecret nets, analysis the emphasis and difficulty of the project.Discuss the process of monitoring system, analysis characteristic of generalmonitoring scheme, choose the most appropriate way that combined practical need ofthe project.Realize the whole project, including remote invocation, management and remotevideo monitoring. The system can found front-end signal automatically, identify theproblems intelligently and supervise system data strictly. The system is convenient,quick and humanity.According to the specific situation in the process of project implementation, thesystem could improve security measures gradually. The system uses other technologyto strengthen and improve the security work at the foundation of the fully using of theconfidential technology.
Keywords/Search Tags:Monitoring system, Network security, Remote management
PDF Full Text Request
Related items