| In view of the current situation that the fire disaster has become one of the major disasters in the city and the traditional building fire monitoring and prevention have many disadvantages. This paper describes the advantages and challenges of wireless sensor networks in the application of building fire monitoring, and under that background, the main problems faced by the wireless sensor network are studied. Referring to the traditional fire monitoring way and the requirements of fire monitoring system in the national standard, this paper designs the building fire monitoring system based on wireless sensor network. Main work shows as follows:Firstly, this paper analyzes the key issues of wireless sensor network’s application in building fire monitoring, the building fire monitoring system is designed according to the requirements of the fire monitoring system and requirements of relevant national standards.Secondly, to ensure the reliability of data acquisition and transmission, the system node and gateway is designed from two aspects of hardware and software. In terms of hardware: this paper illustrates the design method of each hardware module, including the selection of hardware chips, the design module circuit and hardware PCB production etc.. In terms of software: based on the depth analysis of the ZStack-2007 protocol stack, TCP/IP protocol stack, Socket communication and embedded system, this paper realizes the basic function of the Zig Bee node module and the Zig Bee-Wi Fi gateway module.Thirdly, this paper designed data monitoring center, which developed on the Qt with the using of C/S network architecture, My SQL database, multi thread server and XML file management. This software realized the display of data real-time dynamic curve, the inquiry of historical data, the editing and viewing of node information, the setting of alarm value and the data sharing functions in LAN etc..Finally, this paper analyzed Zig Bee and Wi Fi channel distribution mechanism and designed software anti-interference scheme. Systems are tested and verified one by one from the bottom to the upper. The deployment plan of the network nodes is constituted according to the relevant national standards and combining with the test results of the system. |