Six issues of wireless video surveillance project

The application of wireless video surveillance will inevitably cause people to worry about it. The “disadvantages” of its application are not all about the investment of equipment, installation costs, or line costs, but there are still many issues that need special attention in engineering. , are summarized as follows:

Network security issues: System security is especially important because wireless video surveillance systems may involve content such as public privacy and social security. Wireless networks use microwaves as the transmission medium and are easily stolen by others, affecting the security of the entire system.

The use of the operator line problem: The three major mobile system operators in the country have opened a 3G wireless private network for industry users, which is divided into APN private network, VPDN private network, and optical cable dedicated to adopting dedicated accounts, mostly fixed IP addresses on the internal network. Whether or not you can completely isolate the links between the Internet and whether you can avoid the effects of viruses and hackers cannot be ignored.

The problem of radio signal reception: The disconnection problem of the wired network is mostly attributed to the operator. The wireless part is also related to the deployment density of the base station antenna and the size of the transmission power. If the power is insufficient, the transmission effect will be directly affected. . In the future, when users start to pursue large-scale cloud monitoring, how to easily and quickly connect to the network is the key. That is, the use of 3G/4G, satellite, and cable network (ADSL/FTTB), or even the current wireless Internet access, is the backbone of the Internet. Therefore, having a variety of backbone network linking capabilities and having "automatically integrated with the cloud" wireless devices is particularly important.

Bandwidth limitation of wireless mobile networks: Currently, wireless mobile network monitoring in China mainly uses CDMA, GPRS based on GSM, and CDMA/GPRS based on public network. Due to the limited bandwidth, the image quality is limited. Even with the use of multi-channel bundling technology, it is generally only possible to achieve CIF-level definition. For emergency command handling emergency, it is not recommended to use CDMA/GPRS technology, because although it can meet the actual transmission capacity needs, its transmission stability still needs to be improved. This is because the transmission of CDMA is related to its coverage. The areas with poor signal coverage have very poor results. The areas with good signal coverage are very effective. That is to say, the same set of equipment is used very well in Shenzhen, and it is in Guangzhou. May not work well. Even if the signal coverage of a certain area is good, if the public network signal is abnormally busy in the event of an emergency, under the principle of operating traffic priority, the image transmission has to “stand by”. When most major emergencies occur, the base station is almost fully loaded. To use it for network image data transmission, there are real problems. In other words, the more urgent, the more difficult the mobile network is to support the wireless transmission of images.

Bandwidth congestion problems: Insufficient bandwidth, congestion, and image delays are also common users. In the case where the wired network has not significantly improved the network environment, many suppliers have already heard such comments. System integrators may be able to reduce the number of smart gadgets on the AP by purchasing specific devices. these questions. For example, at present, many manufacturers have introduced wireless AP products with dual RF modules, which can be used both as an AP and a client, and can optionally set a 2.4G or 5G channel to avoid bandwidth congestion. When two channels transmit the same channel at the same time, they have the data backup effect to ensure that the data does not leak.

Transmission data encryption problem: Because the hacker may use the operator private network to attack the wireless monitoring network system, the data transmitted over the wireless monitoring network needs to be encrypted. At present, the encryption method mainly used is the VPN (virtual private network) technology. This technology constructs a secure encryption channel between the wireless terminal and the center server, which is relatively mature but has certain requirements for the processing capability of the wireless terminal CPU.

The above is a problem that engineers must pay attention to when using and building a wireless monitoring network, and they need to be carefully considered. So if wireless applications have disadvantages and disadvantages, they will not use them? Not necessarily, wireless monitoring systems have many advantages in application.

Tactical Gear

Military Tactical Gear,Tactical Gear,Military Gear,Army Gears

YangJiang Junxiong Trading & Industry Company Co.,Ltd , https://www.cn-sundo.com