Nothing Special   »   [go: up one dir, main page]

CN209250794U - A kind of network architecture of big data Network Security Monitor System - Google Patents

A kind of network architecture of big data Network Security Monitor System Download PDF

Info

Publication number
CN209250794U
CN209250794U CN201920772049.7U CN201920772049U CN209250794U CN 209250794 U CN209250794 U CN 209250794U CN 201920772049 U CN201920772049 U CN 201920772049U CN 209250794 U CN209250794 U CN 209250794U
Authority
CN
China
Prior art keywords
data
memory
monitor system
network architecture
network security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201920772049.7U
Other languages
Chinese (zh)
Inventor
袁亚兴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
National Open University
Original Assignee
National Open University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by National Open University filed Critical National Open University
Priority to CN201920772049.7U priority Critical patent/CN209250794U/en
Application granted granted Critical
Publication of CN209250794U publication Critical patent/CN209250794U/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Alarm Systems (AREA)

Abstract

The utility model relates to a kind of network architecture of big data Network Security Monitor System, the network architecture of the big data Network Security Monitor System includes: primary server (1), large-size screen monitors monitoring device (2), data input device (3), prior-warning device (4), data analysis set-up (5) and memory (6);The network architecture of big data Network Security Monitor System provided by the utility model, not only realizes the integrated application of a variety of big datas, improves the systematicness and safety of data, meets different data amount and requirement of real-time.

Description

A kind of network architecture of big data Network Security Monitor System
Technical field
The utility model relates to monitoring system fields, and in particular to a kind of network rack of big data Network Security Monitor System Structure.
Background technique
In the numerous environment of the personnel such as campus, for convenience often there are a variety of data, frequency image monitoring system in management.Cause This, generally requires multiple data monitoring systems to be monitored.Current monitoring system mainly use camera and other Such as bar code, two dimensional code data input tracking related personnel or information.
In existing monitoring system, there are the following problems: 1) multisystem is difficult to integrate, and there are data to share, utilization rate Low problem;2) data system and safety are low;3) data query transfers difficulty.
In conclusion needing to propose a kind of network architecture of big data Network Security Monitor System, can be realized a variety of big The integrated application of data improves the systematicness and safety of data, meets different data amount and requirement of real-time.
Utility model content
The technical problem to be solved by the utility model is to proposing a kind of network rack of big data Network Security Monitor System Structure can be realized the integrated application of a variety of big datas, improve the systematicness and safety of data, meet different data amount and in real time Property require.
The technical solution adopted by the utility model to solve its technical problems is that:
A kind of network architecture of big data Network Security Monitor System, the network rack of the big data Network Security Monitor System Structure includes: primary server 1, large-size screen monitors monitoring device 2, data input device 3, prior-warning device 4, data analysis set-up 5 and memory 6;Large-size screen monitors monitoring device 2, data input device 3, prior-warning device 4, data analysis set-up 5 and memory 6 are connected respectively to main clothes It is engaged on device 1, specifically, large-size screen monitors monitoring device 2, data input device 3, prior-warning device 4, data analysis set-up 5 and memory 6 are logical It crosses bus and primary server 1 connects, and realize two-way communication;Large-size screen monitors monitoring device 2 includes that multiple cameras and monitoring are big Screen;Data input device 3 includes manual input device and automatic acquisition device;Memory includes sequentially connected operand According to memory, encrypted data store and Data Mart memory;The data analysis set-up 5 include Hadoop analytical equipment, Greenplum analytical equipment and machine learning image mining device.
Specifically, manual input device is the computer being manually entered or other intelligent terminals.
Specifically, automatic acquisition device is other input units such as code reader or near-field sensing.
Specifically, the above-mentioned network architecture further includes information query device.
The network architecture of big data Network Security Monitor System provided by the utility model, not only realizes a variety of big datas Integrated application, improve the systematicness and safety of data, meet different data amount and requirement of real-time.
Detailed description of the invention
Fig. 1 is the structural schematic diagram of the network architecture of big data Network Security Monitor System provided by the utility model.
Specific embodiment
A kind of network architecture of big data Network Security Monitor System to the utility model is made below further detailed Thin description.
The utility model is described in more detail below with reference to accompanying drawings, which show the preferred of the utility model Embodiment, it should be appreciated that those skilled in the art can modify the utility model described herein and still realize the utility model Beneficial effect.Therefore, following description should be understood as the widely known of those skilled in the art, and be not intended as pair The limitation of the utility model.
For clarity, not describing whole features of practical embodiments.In the following description, it is not described in detail well known function And structure, because they can make the utility model chaotic due to unnecessary details.It will be understood that in any practical embodiments Exploitation in, it is necessary to make a large amount of implementation details to realize the specific objective of developer.
To be clearer and more comprehensible the purpose of this utility model, feature, with reference to the accompanying drawing to the specific reality of the utility model The mode of applying is further described.It should be noted that attached drawing is all made of very simplified form and uses non-accurate ratio Rate only aids in illustrating the purpose of the utility model embodiment with a convenience, clearly.
It is a kind of network architecture of big data Network Security Monitor System provided by the utility model, the big number shown in Fig. 1 The network architecture according to Network Security Monitor System includes: primary server 1, large-size screen monitors monitoring device 2, data input device 3, early warning dress Set 4, data analysis set-up 5 and memory 6.Large-size screen monitors monitoring device 2, data input device 3, prior-warning device 4, data analysis set-up 5 and memory 6 be connected respectively on primary server 1, specifically, large-size screen monitors monitoring device 2, data input device 3, prior-warning device 4, Data analysis set-up 5 and memory 6 are connected by bus and primary server 1, and realize two-way communication.And large-size screen monitors monitoring dress It sets double by the relaying realization of primary server 1 between 2, data input device 3, prior-warning device 4, data analysis set-up 5 and memory 6 To communication.
Wherein, large-size screen monitors monitoring device 2 is the picture control information for being mainly used for acquiring each corner in campus, for example, acquisition The picture control information of the positions such as each classroom, examination hall, sports ground, and by above-mentioned picture control information on monitoring large screen Real-time display is carried out to carry out manual security's monitoring and deposit above-mentioned picture control data real-time transmission into memory Storage, so as to the data basis to work as subsequent machine learning image mining.
Large-size screen monitors monitoring device 2 includes camera 1, multiple cameras of camera 2 ... ... and camera n, for showing The monitoring large screen of the image information of above-mentioned multiple camera acquisitions.Above-mentioned monitoring large screen can be the common multi-screen in this field The control and monitor console of curtain combination can either carry out the single screen monitor platform of signal switching.Multiple cameras are for acquiring multiple positions The picture control information set, is mounted at the multiple positions for needing to acquire image information.The information of multiple camera acquisitions is logical It crosses communication connection (can for wired or be wirelessly connected) and is transmitted to monitoring large screen and shown, it can by monitoring large screen Carry out manual security's monitoring.
Further, large-size screen monitors monitoring device 2 further includes the alarm signal trigger mechanism for being attached to above-mentioned monitoring large screen.When When artificial monitoring finds dangerous abnormal, the alarm signal trigger mechanism of above-mentioned monitoring large screen is attached to by manually starting, Alarm signal can be sent to primary server 1 by monitoring large screen, so that can be realized while acquiring big data to safety Monitoring.Above-mentioned alarm signal trigger mechanism can be button, the push rod on the operation panel of the control and monitor console of insertion monitoring large screen Equal switchgears.
Data input device 3 is used for the acquisition of big data comprising manual input device and automatic acquisition device.By hand Input device is specifically as follows the computer being manually entered or other intelligent terminals;Automatic acquisition device can be code reader Or other input units such as near-field sensing.Required big data, such as student individual's letter can be acquired by data input device Breath, achievement or other relevant personnel or project information.
Prior-warning device 4 is connected on primary server 1, receives the early warning of the transmission of large-size screen monitors monitoring device 2 by primary server 1 Information.It is able to carry out manual security's monitoring by monitoring large screen, when artificial monitoring discovery is dangerous abnormal, monitors large screen Alarm signal can be sent, which is transmitted to prior-warning device 4 by primary server to carry out early warning.
Memory 6 is connected on primary server 1, receives large-size screen monitors monitoring device 2 and data input dress by primary server 1 Set the data of 3 transmission.Memory includes sequentially connected operation data memory, encrypted data store and Data Mart storage Device.Shield the data that monitoring device 2 and data input device 3 transmit and is stored in operation first, in accordance with the different classifications in upstream data source In data storage, the data of above-mentioned deposit operation data memory are stored into encrypted data store in next step, are encrypting The data being transmitted in data storage are encrypted storage, further ensure the reliability of system data, finally above-mentioned to add The encryption data stored in ciphertext data memory is stored into Data Mart memory, so that above-mentioned data are decoded and are read It takes.The systematicness that both ensure that data by the setting of above-mentioned memory, in turn ensures data safety.
Data analysis set-up 5 is connected to primary server 1, and above-mentioned data analysis set-up 5 can be arithmetic facility, such as PC machine Equipment.The data analysis set-up 5 includes Hadoop analytical equipment, Greenplum analytical equipment and machine learning image mining Device.Wherein it is mainly used for using Hadoop analytical equipment and the mashed up framework of Greenplum analytical equipment, Hadoop analytical equipment Offline big data quantity calculates;The data processing data of Greenplum analytical equipment is very fast, and data query real-time is very high, Big data monitoring system different data amount and requirement of real-time are met in this way.In addition, data analysis set-up 5 further comprises machine Learn image mining device, machine learning mining data value is carried out by the image data to large-size screen monitors monitoring device 2, such as It can be excavated by monitoring image, the information such as potential user's portrait, students ' behavior portrait, teacher's behaviors portrait.
Information query device 7 is also connected on primary server 1, and information query device 7 can be with input/output unit Computer or other intelligent terminals.It can be accessed to the memory of big data monitoring system by information query device 7 And call reading data.
The network architecture of big data Network Security Monitor System provided by the utility model, not only realizes a variety of big datas Integrated application, improve the systematicness and safety of data, meet different data amount and requirement of real-time.
Have been shown and described above the basic principles and main features and advantage of the utility model, therefore the foregoing is merely The embodiments of the present invention.It should be understood by those skilled in the art that the present utility model is not limited to the above embodiments, on Stating described in embodiment and specification is the principles of the present invention, before not departing from the spirit and scope of the utility model It puts, the utility model further includes various equivalence changes and improvement, these changes and improvements fall within claimed reality With in novel range.The utility model requires protection scope is defined by appending claims and equivalents.

Claims (4)

1. a kind of network architecture of big data Network Security Monitor System, it is characterised in that: the big data network security monitoring system The network architecture of system includes: primary server (1), large-size screen monitors monitoring device (2), data input device (3), prior-warning device (4), data Analytical equipment (5) and memory (6);Large-size screen monitors monitoring device (2), data input device (3), prior-warning device (4), data analysis dress It sets (5) and memory (6) is connected respectively on primary server (1), specifically, large-size screen monitors monitoring device (2), data input device (3), prior-warning device (4), data analysis set-up (5) and memory (6) are connected by bus and primary server (1), and are realized Two-way communication;Large-size screen monitors monitoring device (2) includes multiple cameras and monitoring large screen;Data input device (3) includes by hand Input device and automatic acquisition device;Memory include sequentially connected operation data memory, encrypted data store and Data Mart memory.
2. the network architecture of big data Network Security Monitor System according to claim 1, it is characterised in that: record by hand Entering device is the computer being manually entered or other intelligent terminals.
3. the network architecture of big data Network Security Monitor System according to claim 1, it is characterised in that: adopt automatically Packaging is set to other input units such as code reader or near-field sensing.
4. the network architecture of big data Network Security Monitor System according to claim 1, it is characterised in that: above-mentioned net Network framework further includes information query device (7).
CN201920772049.7U 2019-05-27 2019-05-27 A kind of network architecture of big data Network Security Monitor System Active CN209250794U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201920772049.7U CN209250794U (en) 2019-05-27 2019-05-27 A kind of network architecture of big data Network Security Monitor System

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201920772049.7U CN209250794U (en) 2019-05-27 2019-05-27 A kind of network architecture of big data Network Security Monitor System

Publications (1)

Publication Number Publication Date
CN209250794U true CN209250794U (en) 2019-08-13

Family

ID=67537523

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201920772049.7U Active CN209250794U (en) 2019-05-27 2019-05-27 A kind of network architecture of big data Network Security Monitor System

Country Status (1)

Country Link
CN (1) CN209250794U (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112732686A (en) * 2020-12-29 2021-04-30 广东省电信规划设计院有限公司 Operation method and device for improving data market based on GP (GP) cluster

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112732686A (en) * 2020-12-29 2021-04-30 广东省电信规划设计院有限公司 Operation method and device for improving data market based on GP (GP) cluster

Similar Documents

Publication Publication Date Title
CN101976519A (en) Multi-picture monitoring system of distributed control system (DCS) simulator of nuclear power station
CN202601004U (en) Integrated training platform for internet of things
CN109190897A (en) A kind of campus wisdom class board generalized information management system
US20160085845A1 (en) Server apparatus, data aggregation method, and communication device
CN209250794U (en) A kind of network architecture of big data Network Security Monitor System
CN204576476U (en) Teaching information administrative terminal system
CN112005247A (en) People flow data monitoring system and people flow data display method and device thereof
WO2019203485A1 (en) Reading education service providing method for developing systematic reading habit
CN111736539B (en) Monitoring data display method, device, system, server and storage medium
CN103376894A (en) Laser indication sharing method and system
CN213072720U (en) Intelligent classroom course arrangement and distribution system
CN103605599B (en) The transmission state methods of exhibiting of cloud document and device
CN101114405A (en) Digitization experimental laboratory system and data control method thereof
CN206946738U (en) Long-range high in the clouds experimental system based on hardware experiment platform
CN105900075A (en) Program, information processing device, and image processing system
CN109684013A (en) A kind of display methods and device based on multi-user's display interface
CN210274313U (en) Teaching environment monitoring system based on Zigbee
CN107015815B (en) Device for simulating safety control display equipment of nuclear power station
CN106506990A (en) Video mix matrix/video processor control end signal condition automatic testing method and system
Demchak et al. Data quality for situational awareness during mass-casualty events
Bratthall et al. Understanding some software quality aspects from architecture and design models
CN210119872U (en) VR uses supervise device based on operation function
CN107395725B (en) Application program recommendation method, application program recommendation device and electronic equipment
CN112817548B (en) Electronic device, display control method, display apparatus, and storage medium
DE102020123305B3 (en) Method and system for operating a handheld in a virtual reality, computer program product for a handheld and computer program product for a VR server and handheld and VR server for such a system

Legal Events

Date Code Title Description
GR01 Patent grant
GR01 Patent grant