Application of remote network monitoring technolog

  • Detail

Application of building fire remote network monitoring technology

building fire-fighting facilities refer to all fixed fire-fighting facilities set in buildings. Including indoor fire hydrant system, automatic fire alarm control system and automatic sprinkler system. Smoke control system, safety evacuation and emergency lighting system. Fire door, fire shutter system, gas fire extinguishing system, etc. Their intact rate and the reaction speed of fire directly affect the success or failure of fire extinguishing. However, it mainly depends on monitoring equipment to determine the integrity rate of building fire-fighting facilities and the reaction speed when a fire occurs. With the advent of the era of knowledge economy, the amount of information to be processed in fire protection work will increase sharply, and there are broader and faster requirements for information resource sharing and information processing speed than before. In order to meet this social need, the fire protection work must use the most advanced computer network technology, information processing technology and communication technology to carry out the construction of fire information network, and replace the office mode of passing the coke price of 20 yuan/ton in Xingtai, Hebei Province with a modern network office mode. In recent years, due to the continuous emergence of high-rise buildings, the luxurious interior decoration has put forward higher requirements for fire prevention. As a result, many intelligent buildings have emerged in major cities. Therefore, the application of remote network monitoring technology for building fire protection facilities will be more and more widely, which is also the development trend of building fire protection facilities monitoring technology. To truly realize remote network monitoring, the following requirements must be met

1. Hardware composition

1.1 as a whole, it forms

network monitoring. The monitoring and control implemented by computer network is realized by network. According to the overall characteristics of fire protection work, the network structure of our province can be easily changed into three levels. The Provincial Corps built a central control area, referred to as "Corps Center", the local municipal detachment built a sub control area, referred to as "detachment", and the county and district brigades built remote work points; The local area of each detachment is the main connection of the local area of the Corps through the X 25/frame relay special line, and the local area of each detachment is accessed by the county and district brigade through the line in the way of dialing. After the local area is established, it is also interconnected through the X 25/frame relay central line

1.2 the center and detachment of the Corps

in accordance with the relevant regulations of the State Council and the Ministry of information industry, it is necessary to disconnect the processing of internal graphics and image Office (hereinafter referred to as "internal") and external public information (hereinafter referred to as "external"). The center of the Corps adopts the two-level switching Fast Ethernet technology widely used in the Internet, with a star topology; 10m shared local mode and star topology are adopted outside. The structural cabling system adopts the most advanced Lucent SYSTIMAX generic cabling system at present. The detachment adopts 10M Ethernet switching mode and star topology; The external and structured cabling system is similar to the structure of the Corps

1.3 network reliability and security system

1.3.1 high reliability of remote communication

when any remote link or node of the network fails, the main circuit of the system is only partially affected, and the main circuit of the rest of the system can still operate normally. At the same time, the backup route is automatically enabled to ensure that the whole system is still fully connected, and the switching and recovery between the main route and the backup route are automatically realized

1.3.2 server redundant backup

hot dial hard disk is fully selected for the server of the network, and data tape backup is adopted for the primary address server and database server, with disaster recovery function; In addition, important data are also regularly or irregularly engraved into CDs and stored in different places

1.3.3 internal and network level security system

(1) the main security control strategy implemented on the synchronous serial port

allows any access from the inside out. Only hosts using IP addresses in the system are allowed to access the local area from the outside to the inside, and only TCP, UDP, ICMP, routing packets and other protocol packets are allowed; Prohibit other IP address hosts and protocol packets from entering; Turn off pad function, etc

(2) the main security control strategy implemented in the asynchronous serial port

each remote workstation uses a fixed IP address and only allows the host with the specified IP address to enter the local sub access routine service; Chap authentication using encrypted transmission of user accounts and passwords; Establish the rear window authentication server, enable Padius service, realize centralized user authentication, password encryption, account locking, account tracking and other functions, enable the callback function, track the number of illegal dialing, etc

1.3.4 application level security system

application level firewall is based on proxy service, which is mainly to prevent attacks from the Internet, so it adopts a dual host/proxy server structure, and realizes IP conversion, packet filtering, restricted reverse proxy, user authentication, content caching, automatic dialing/folding, alarm and tracking through proxy server; The center of the Corps adopts a dual fortress host structure

1.3.5 other security measures

(1) implementation of anti-virus software

(2) public key system

2. Composition of building fire protection facilities monitoring platform

to monitor the fire protection facilities of a building, the building must have a complete security management system. The security management system is composed of a series of intelligent fire control, disaster prevention, crime prevention and data systems. The main functions are: fire linkage control; Smoke control; Pilot light control; Fire control; Extraordinary time control; Power failure time control; Control against electric leakage and gas leakage; Various sensor alarm control management; Automatic crime prevention equipment management and related data access control and transmission

the application of monitoring technology of building fire-fighting facilities in buildings is reflected through these functions. In addition, it must be realized with the help of computer control screens, cameras and some linkage devices

using such a circuit can not get the correct test results. 3. The realization of remote network monitoring technology

the realization of remote network monitoring technology is realized after the completion of network hardware and building fire protection facilities monitoring platform. It is mainly to organically connect these two blocks through public and private lines, and then use the "electronic map" software in network technology and some databases to control through the network. These operations are completed in each control room connected to the local area

4. Problems needing attention in the application of remote network technology of building fire-fighting facilities

4.1 there is a sound organization and management organization from the headquarters, detachment to the brigade, which is fully responsible for the daily operation and maintenance of the network

4.2 the database in the monitoring system should be input and updated daily

4.3 an information networking management team with excellent technology and strong business should be established and maintained

4.4 special personnel should be responsible for the monitoring of building fire-fighting facilities, and pay attention to keeping the system easy to use at all times

Copyright © 2011 JIN SHI