Talking about the Development and Function of Alarm Host

In many factories, communities, office buildings and other places will be installed anti-theft alarm system, the alarm system is the core alarm host. The alarm host uses the physical or electronic technology to automatically detect the intrusion that occurs in the arming monitoring area, generates an alarm signal, and prompts the staff to place an alarm. The advanced alarm host can also display a system that may take countermeasures. The alarm host is an important facility for preventing accidents such as robbery and theft. The anti-theft alarm host and the entrance and exit control system, closed-circuit television monitoring system, visitor intercom system and electronic patrol system together constitute a security system.
Alarm Host Technology Development Analysis With the continuous improvement of user requirements, the concept of the alarm host has also begun to change, from a single alarm dialer to today's intelligent control platform, with more value-added service features.
At present, the alarm host uses modular settings to facilitate the user's secondary development. When the product is shipped from the factory, in addition to the core components, the vendor also reserves some interfaces. Most additional functions are achieved by adding different modules, such as network modules, GPRS modules, voice modules, and home appliance control modules. . For example, by adding a home appliance control module to the control panel, the control panel becomes the controller of the smart home, and the user can control the switch of the electrical appliances in the home, the lighting control, the gas, and the garage door switch through the keyboard, the remote controller, or the telephone. .
In addition to the integration with smart homes, the alarm host also added SMS and voice functions. Its main purpose is to improve the reliability of the system. With the SMS alarm mode, the alarm signal can be received anywhere, and the communication time is very short and fast. After the addition of the voice system, voice communication can be performed at any time on the telephone, and voice monitoring can be performed to more accurately grasp the situation at the alarm site. Such as Shenzhen Mei'an's wired and wireless compatible alarm host, the user can remotely arm, disarm, remotely monitor and activate the sirens via telephone and mobile phone, and can automatically play this information, and accurately inform the outside world of attacked distress messages. In the product design, Lion used the telephone line and GSM dual-network transmission mode, so that the alarm host can not only be compatible with various systems, but also send text messages and photos to users.
In addition to issuing alarm information, the alarm center can also publish the content of the property management and various notices to the host. At present, this function has been applied in some high-end districts in China. In addition, in order to facilitate the search for the occurrence of alarm accidents to facilitate the rapid detection of the alarm receiving center and the public security department, and to better provide services to customers, more and more alarm hosts have information storage functions and are suitable for central controllers of large networked alarm centers. , can store 1000 pieces of alarm information for users to query at any time, automatic recovery of alarm data, storage capacity of 100,000 or more.
The main functions of the intrusion alarm host The main functions of the intrusion alarm host include: partition and zone, arming and disarming and alarm, event recording and querying, communication and networking, fault detection and display, password and reset, extension and compatibility, and other aspects.
1. Partitions and defense zones: It is generally advocated that alarm hosts with a medium or higher scale should establish partitions to facilitate management. The mainframe can even have multiple partitions, and the number of defense zones included in the partition can be determined by program design.
There are various types of defense zones, such as entrance and exit delay zones, perimeter zones, internal zones, emergency zones, medical rescue zones, fire zones, etc.; zones have various attributes such as sound/silence, continuous sound/intermittent Sound, Allow Bypass/Unbypass, Wireless/Wired, Transmission Delay/No Delay, etc.
The number, types, and attributes of defense zones are appropriate to meet the needs, but not necessarily the better. In fact, some foreign hosts have many types of defense zones, but some are not suitable for domestic needs, but they have caused a lot of burden. And inconvenience.
For ease of memory and use, some mainframes can use partitions, zones, and even entrances and exits to be identified by custom code names or aliases. For example, if several departments of a company occupy different partitions, each partition can be represented by a different department name. .
2. Closing and disarming and alarming: types of arming and disarming, including left and right arming and disarming, outbound arming and disarming, automatic arming and disarming, forced arming and disarming, single defense zone arming and disarming, project arming and disarming (for testing), and setting up zone bypass and cancellation, etc. The more complete the type, the more convenient the user.
There are two types of alarms, one is an intrusion triggered alarm; the other is a variety of detection fault alarms, such as tamper, power, sirens, zone faults, telephone line faults. This kind of alarm involves the self-protection of the host and should be taken seriously.
3, the event records and inquiries: All the host computer during the operation of the police situation, as well as related to changing the settings of various operations, should be stored as an event, when needed, but also can easily be viewed. This kind of incident record does not allow arbitrarily revise, and even if the host is powered off for a long period of time, its record can still be completely saved. This kind of record is of great significance to the inquiry of responsibility and the lessons learned after major changes.
4, communication and networking: including compatible communication protocols, communication objects and directions. Wired telephones are generally used as the main means of communication. They can be networked with two or more centers. They can also report alerts directly to subscribers. Some hosts also added network or mobile communications as backup and assistance, further improving the reliability of communications.
In order to save telephone charges, some hosts may deploy and disarm private phones by default. In the case of hands-free telephone sets, the center can determine the user account for arming or disarming based on the telephone number transmitted by the other party. However, this function must be obtained. Center receiver support.
5, fault detection and display: with the nature of automatic maintenance, usually AC and DC power monitoring, tamper, alarm circuit, loop circuit fault, telephone line failure, communication failure and so on. The more complete this function, the better the host self-protection performance and the higher the reliability of the work. The display method after a failure occurs, and for the LED display, the meaning of the acousto-optic display is required to be clear and easy to understand and remember.
6, password and reset: Common types of passwords are engineering passwords, administrator passwords, user passwords, hijacked passwords, and some can also set a one-time password, a single deployment password (armed effective, disarmed invalid) and remote program design password.
The host should have the function of resetting, in the case of lost passwords or other special circumstances, by reset, restore factory settings or reprogramming. For mainframes, due to the large amount of program design content, the reset is often divided into several levels. Partial reset can be performed specifically for a certain aspect to reduce the workload of program redesign.
7. Extension and compatibility: The expansion of host functions is generally accomplished through the connection of modules, such as the increase of defense zones, the compatibility of wireless zones, the increase of programmable output, and the connection with access controllers. These functions are very popular in the special occasions to meet the individual needs of users.
For a brand, it should also pay attention to the systemic nature of the product. The various hosts it includes should meet the needs of low, medium and high grades respectively.
L-Edge Art Blade,Cutting Knife For Art,Pen Knife Craft,Art Pen Knife
Chunlei Quntification Co.,Ltd , https://www.hychunleitools.com