To choose a suitable security product, you should first understand its particularity. The alarm host is different from general electronic products. Not only the quality, price, and service should be considered, but also some other technical factors must be considered.
Alarm host function analysis
With the continuous increase in market demand and the continuous development of product technology, the functions of network alarm hosts have gradually expanded, such as alarm and video surveillance linkage function, SMS/voice function, monitoring/intercom function, remote control alarm linkage function, etc.
Alarm and video surveillance linkage function
Most of the interviewees said that it is very important to verify the alarm situation. False alarms usually cause security personnel to "have a false alarm", so it is particularly important to determine whether the alarm situation really occurred. Combining with video technology has become the direction for many manufacturers to solve the verification of alarm situations and develop new products. Through interviews, the author learned that many alarm systems currently have the "image capture" function, that is, the alarm system sends the scene picture to the alarm center at the same time as sending the alarm information to determine whether there are really criminals at the alarm scene. Some manufacturers attach an alarm review module to the main board of the alarm host, connect the video server to the alarm host, and then upload the audio, video, and data signals to the alarm center through the broadband network. The center can judge the actual situation of the alarm scene based on the three signals at the same time, thereby greatly improving the reliability of the alarm system. Some manufacturers also develop alarm hosts with "MMS" function: by connecting cameras and other image capture devices to the alarm system, the scene pictures can be transmitted through telephone lines, the Internet, GSM mobile networks, etc., and the captured pictures can be received by mobile phones or computers that support the "MMS" function.
SMS/Voice function
The main purpose of adding SMS and voice communication functions is to ensure the absolute reliability of the system. With SMS alarm, the alarm signal can be received anywhere, and the communication time is very short and the speed is fast. After adding the voice function, voice monitoring can be performed to more accurately grasp the situation at the alarm site. The SMS and voice functions are mainly suitable for wired/wireless compatible systems and alarm systems that use telephone line networking.
Monitor/talkback function
The alarm monitoring function is to enter the correct password (there are two two-way monitoring passwords, one for the alarm center and one for individual users. The alarm center password is usually valid for 10 minutes after the system alarm, and the monitoring is established; while the user can establish monitoring at any time and in any state). Within the alarm monitoring range, the voice and sound of the perpetrator on the scene can be clearly heard, such as the sound of people walking, digging, prying, etc., and the siren of the alarm host can be turned on or off remotely by phone. Usually, it takes 30 seconds to monitor. The voice review function of the alarm center is that when the front-end detector alarms to the center, the alarm center can record the alarm scene with the alarm center software and voice review equipment. In addition, the SD card can be directly inserted to record the actual situation on the scene. If there is abnormal movement, not only can the alarm be made through the transmission network, but the alarm call can also be issued on the scene, and the alarm host can realize voice communication with the dialed destination.
Remote control alarm linkage function
In the future, the functional expansion and application of network alarm host will be more extensive. The number of comprehensive alarm multi-function information terminal products for well-off families will gradually increase, and the urban alarm operation system will gradually tend to family services. Due to the improvement of the speed of two-way data exchange, the front-end host can be given more powerful security management functions, such as remote network control and linkage of home equipment automation. With the soundness and stability of 3G network and the variety of business options, people can more conveniently control their own security areas. "Based on the two-way control function and the real-time nature of broadband network, the network transmission module can send events to several or more monitoring centers at the same time, and can also send events to PC, PDA and smart phones through E-MAIL. At the same time, the alarm system can be remotely set or controlled by logging in to the alarm system through PC, PDA and smart phone, and some functions can be started or shut down. It can also expand and integrate other devices (such as smart home, access control, etc.) more flexibly.
In addition to the above functions, a professional also said that in the future, alarm hosts will gradually develop in the direction of intelligent terminals. The products will not only have general alarm functions, but also have information publishing and receiving functions. In other words, in addition to publishing alarm information, the alarm center can also publish property management content and various notifications to the host. It is reported that this function has been applied in some high-end residential areas in China. In addition, more and more alarm hosts have information storage functions, such as supporting SD card storage or SATA hard disk storage, etc., the purpose of which is to facilitate the search for the occurrence of alarm events, which is conducive to the alarm center and the public security department to solve the case in time and provide better services to customers.
Analysis of alarm host intrusion alarm technology
The main functions of the intrusion alarm host include: partitioning and defense zones, arming and disarming, and alarm, event recording and query, communication and networking, fault detection and display, password and reset, expansion and compatibility, etc.
1. Partitions and defense zones: It is generally recommended that medium-sized and larger alarm hosts should be partitioned to facilitate management. Large hosts can even have multiple partitions, and the number of defense zones included in the partitions can be determined by program design.
There are various types of defense zones, such as entry and exit delay defense zones, perimeter defense zones, internal defense zones, emergency defense zones, medical rescue defense zones, fire defense zones, etc.; defense zones also have various attributes, such as audible/silent, continuous sound/intermittent sound, bypass allowed/no bypass, wireless/wired, transmission delay/no delay, etc.
The number, type and attributes of defense zones should be appropriate to meet the needs. The more the better is not necessarily the case. In fact, some foreign hosts have many types of defense zones, but some are not suitable for domestic needs, which seems to cause burden and inconvenience.
To facilitate memorization and use, some large hosts can identify partitions, defense zones, and even entrances and exits with custom codes or aliases. For example, if several departments of a company occupy different partitions, each partition can be represented by a different department name.
2. Arming and disarming and alarm: Types of arming and disarming include stay-at-home arming and disarming, away-from-home arming and disarming, automatic arming and disarming, forced arming and disarming, single zone arming and disarming, engineering arming and disarming (for testing), zone bypassing and release, etc. The more complete the types, the more convenient it is for users.
Alarms are divided into two categories: one is intrusion trigger alarm; the other is various detection fault alarms, such as anti-tampering, power supply, siren, zone failure, telephone line failure, etc. This type of alarm involves the host's self-protection and should be taken seriously.
3. Event record and query: All alarms that occur during the operation of the host, as well as various operations related to setting changes, should be stored as events, and can be easily viewed when needed. Such event records are not allowed to be deleted or modified at will, and even if the host is powered off for a long period of time, the records can still be completely preserved. Such records are of great significance for responsibility inquiry and summary of experience and lessons after important changes.
4. Communication and networking: including compatible communication protocols, communication objects and directions. Generally, wired telephone is used as the main means of communication, which can be networked with two or more centers, and can also report alarms directly to users by phone. Some hosts also add network or mobile communication as backup and auxiliary, which further improves the reliability of communication.
In order to save telephone charges, some hosts may default to a dedicated telephone number for arming and disarming. When the center is using a hands-free phone, it can determine the user account for arming or disarming based on the telephone number transmitted by the other party. However, this function must be supported by the center receiver.
5. Fault detection and display: It has the characteristics of automatic maintenance, usually including AC and DC power monitoring, anti-tampering, alarm circuit, zone circuit failure, telephone line failure, communication failure, etc. The more complete this function is, the better the host's self-protection performance is, and the higher the reliability of the work. For the display method after a fault occurs, for LED displays, the meaning of the sound and light display is required to be clear and easy to understand and remember.
6. Password and reset: Common password types include engineering password, administrator password, user password, and hostage password. Some can also set a one-time password, a single arming password (arming is valid, disarming is invalid), and a remote control programming password.
The host should have a reset function. In case of password loss or other special circumstances, it can be reset to restore factory settings or reprogram. For large hosts, due to the large amount of programming content, the reset is often divided into several levels. Partial reset can be performed specifically for a certain aspect to reduce the workload of reprogramming.
7. Expansion and compatibility: The expansion of host functions is generally completed by connecting modules, such as adding defense zones, compatibility with wireless defense zones, adding programmable outputs, connecting with access controllers, etc. These functions can meet the individual needs of users in special occasions and are very popular.
For a brand, we should also pay attention to the systematic nature of the product. The various hosts it includes should be able to meet the needs of low, medium and high grades.
Previous article:Brief Analysis of Elevator Video Alarm Building Intercom Linkage System
Next article:Application of Bluetooth Technology in Automatic Fire Alarm System
- Popular Resources
- Popular amplifiers
- Mir T527 series core board, high-performance vehicle video surveillance, departmental standard all-in-one solution
- Akamai Expands Control Over Media Platforms with New Video Workflow Capabilities
- Tsinghua Unigroup launches the world's first open architecture security chip E450R, which has obtained the National Security Level 2 Certification
- Pickering exhibits a variety of modular signal switches and simulation solutions at the Defense Electronics Show
- Parker Hannifin Launches Service Master COMPACT Measuring Device for Field Monitoring and Diagnostics
- Connection and distance: A new trend in security cameras - Wi-Fi HaLow brings longer transmission distance and lower power consumption
- Smartway made a strong appearance at the 2023 CPSE Expo with a number of blockbuster products
- Dual-wheel drive, Intellifusion launches 12TOPS edge vision SoC
- Toyota receives Japanese administrative guidance due to information leakage case involving 2.41 million pieces of user data
- Innolux's intelligent steer-by-wire solution makes cars smarter and safer
- 8051 MCU - Parity Check
- How to efficiently balance the sensitivity of tactile sensing interfaces
- What should I do if the servo motor shakes? What causes the servo motor to shake quickly?
- 【Brushless Motor】Analysis of three-phase BLDC motor and sharing of two popular development boards
- Midea Industrial Technology's subsidiaries Clou Electronics and Hekang New Energy jointly appeared at the Munich Battery Energy Storage Exhibition and Solar Energy Exhibition
- Guoxin Sichen | Application of ferroelectric memory PB85RS2MC in power battery management, with a capacity of 2M
- Analysis of common faults of frequency converter
- In a head-on competition with Qualcomm, what kind of cockpit products has Intel come up with?
- Dalian Rongke's all-vanadium liquid flow battery energy storage equipment industrialization project has entered the sprint stage before production
- Allegro MicroSystems Introduces Advanced Magnetic and Inductive Position Sensing Solutions at Electronica 2024
- Car key in the left hand, liveness detection radar in the right hand, UWB is imperative for cars!
- After a decade of rapid development, domestic CIS has entered the market
- Aegis Dagger Battery + Thor EM-i Super Hybrid, Geely New Energy has thrown out two "king bombs"
- A brief discussion on functional safety - fault, error, and failure
- In the smart car 2.0 cycle, these core industry chains are facing major opportunities!
- The United States and Japan are developing new batteries. CATL faces challenges? How should China's new energy battery industry respond?
- Murata launches high-precision 6-axis inertial sensor for automobiles
- Ford patents pre-charge alarm to help save costs and respond to emergencies
- New real-time microcontroller system from Texas Instruments enables smarter processing in automotive and industrial applications
- About MicroPython ESP8266 WIFI settings problem - thanks!
- [STM32WB55 review]——by freebsder
- There is a large supply of microcontrollers!
- Share the C language program of FIR filter implemented by MSP430 microcontroller
- [2022 Digi-Key Innovation Design Competition] CAN Communication Data Display Terminal
- Oscilloscope waveform jitter can be turned into stable waveform by setting trigger properly
- How to measure the noise floor of an oscilloscope
- PLC online monitoring control cloud configuration software SCADA
- Is this dime-sized millimeter-wave sensor evaluation board worth trying?
- Xintang M2354 Fault Injection Attack Protection