Optional and functional anatomy of the burglar alarm host

The function of the burglar alarm host. Although the basic functions of the mainframe have been stipulated in the relevant national standards, due to the differences in local environment, user habits, product designers' understanding and experience, there are obvious differences under the premise of ensuring basic functions. There will be a lot of features to meet other needs, and some additional features may not matter, but some can bring great convenience to users.

Anti-theft alarm host function anatomy

The main functions of the intrusion alarm host include: partition and zone, disarming and alarming, event logging and query, communication and networking, fault detection and display, password and reset, expansion and compatibility.

1. Division and defense zone: Generally speaking, the alarm host with medium or above scale should set up a partition to make management convenient. The mainframe can even set up multiple partitions, and the number of zones included in the partition can be determined by program design.

There are various types of defense zones, such as entrance and exit delay zones, perimeter zones, internal zones, emergency zones, medical rescue zones, fire zones, etc. Zones also have various attributes such as voice/silence, continuous sound/intermittent Sound, Allowable Bypass/No Bypass, Wireless/Wired, Transmission Delay/No Delay, etc.

The number, type and attributes of the zones are suitable to meet the needs, not necessarily as many as possible. In fact, some foreign hosts have many types of zones, but some are not suitable for domestic needs, but they are rather cumbersome. And inconvenience.

In order to facilitate the memory and use, some mainframes can identify partitions, zones, and even gateways with custom code or alias. For example, several departments of a company occupy different partitions, and each partition can be represented by different department names. .

2, disarming and alarming: the types of disarming and disarming, including the disarming and disarming, the disarming and disarming, the automatic disarming and disarming, the forced disarming and disarming, the single-arm area disarming, the engineering disarming (testing), setting the zone bypass and lifting, etc. The more complete the type, the more convenient the user.

Alarms are divided into two categories, one is the intrusion trigger alarm; the other is various detection fault alarms, such as tampering, power supply, siren, zone failure, telephone line failure, etc. This kind of alarm involves the self-protection of the host and should be taken seriously.

3. Event records and queries: All the alarms that occur during the running of the host and the various operations related to changing the settings should be stored as events, and can be conveniently viewed when needed. This type of event record does not allow for arbitrary deletions, and even if the host is powered off for a long period of time, its records can be completely preserved. This kind of record is of great significance for the inquiries and lessons learned after the occurrence of important changes.

4. Communication and networking: including compatible communication protocols, communication objects and directions. Generally, wired telephone is used as the main communication means, and it can be networked with two or more centers, and the alarm can be reported directly to the user's telephone. Some hosts also add network or mobile communication as a backup and assistance, further improving the reliability of communication.

In order to save the telephone bill, some hosts can disarm and disarm the special telephone by default. In the case of the hands-free telephone, the center can judge the user account for arming or disarming according to the telephone number transmitted by the other party, but this function must be obtained. Central receiver support.

5, fault detection and display: with the nature of automatic maintenance, usually AC and DC power supply monitoring, tampering, siren circuit, zone loop fault, telephone line failure, communication failure and so on. The more complete this function, the better the performance of the host self-protection and the higher the reliability of the work. The display method after the fault occurs, for the LED display, the meaning of the sound and light display is clear, easy to understand and memorize.

6, password and reset: commonly used password types are engineering password, administrator password, user password, holding password, and some can also set one-time password, single arm defense password (arming effective, disarmed invalid) and remote control program design password.

The host should have a reset function, reset the factory settings or re-programby in the event of a lost password or other special circumstances. For mainframes, due to the large amount of programming content, the reset is often divided into several levels, which can be partially reset for a certain aspect to reduce the workload of the program redesign.

7. Expansion and compatibility: The expansion of the host function is generally accomplished by connecting modules, such as the addition of zones, the compatibility of wireless zones, the increase of programmable output, and the connection to the access controller. These functions are very popular in special occasions to meet the user's individual needs.

For a brand, you should also pay attention to the systemic nature of the product. The various hosts included in it should be able to meet the needs of various grades such as low, medium and high.

Plywood&Veneer

Birch Plywood,MDF,Fancy Plywood

Camlock Couplings Co., Ltd. , http://www.ironhandtools.com