Analysis of alarm host functions and intrusion alarm technology

Publisher:数据迷航者Latest update time:2013-01-29 Reading articles on mobile phones Scan QR code
Read articles on your mobile phone anytime, anywhere

    To choose a suitable security product, you should first understand its particularity. The alarm host is different from general electronic products. Not only the quality, price, and service should be considered, but also some other technical factors must be considered.

  Alarm host function analysis

  With the continuous increase in market demand and the continuous development of product technology, the functions of network alarm hosts have gradually expanded, such as alarm and video surveillance linkage function, SMS/voice function, monitoring/intercom function, remote control alarm linkage function, etc.

  Alarm and video surveillance linkage function

  Most of the interviewees said that it is very important to verify the alarm situation. False alarms usually cause security personnel to "have a false alarm", so it is particularly important to determine whether the alarm situation really occurred. Combining with video technology has become the direction for many manufacturers to solve the verification of alarm situations and develop new products. Through interviews, the author learned that many alarm systems currently have the "image capture" function, that is, the alarm system sends the scene picture to the alarm center at the same time as sending the alarm information to determine whether there are really criminals at the alarm scene. Some manufacturers attach an alarm review module to the main board of the alarm host, connect the video server to the alarm host, and then upload the audio, video, and data signals to the alarm center through the broadband network. The center can judge the actual situation of the alarm scene based on the three signals at the same time, thereby greatly improving the reliability of the alarm system. Some manufacturers also develop alarm hosts with "MMS" function: by connecting cameras and other image capture devices to the alarm system, the scene pictures can be transmitted through telephone lines, the Internet, GSM mobile networks, etc., and the captured pictures can be received by mobile phones or computers that support the "MMS" function.

  SMS/Voice function

  The main purpose of adding SMS and voice communication functions is to ensure the absolute reliability of the system. With SMS alarm, the alarm signal can be received anywhere, and the communication time is very short and the speed is fast. After adding the voice function, voice monitoring can be performed to more accurately grasp the situation at the alarm site. The SMS and voice functions are mainly suitable for wired/wireless compatible systems and alarm systems that use telephone line networking.

  Monitor/talkback function

  The alarm monitoring function is to enter the correct password (there are two two-way monitoring passwords, one for the alarm center and one for individual users. The alarm center password is usually valid for 10 minutes after the system alarm, and the monitoring is established; while the user can establish monitoring at any time and in any state). Within the alarm monitoring range, the voice and sound of the perpetrator on the scene can be clearly heard, such as the sound of people walking, digging, prying, etc., and the siren of the alarm host can be turned on or off remotely by phone. Usually, it takes 30 seconds to monitor. The voice review function of the alarm center is that when the front-end detector alarms to the center, the alarm center can record the alarm scene with the alarm center software and voice review equipment. In addition, the SD card can be directly inserted to record the actual situation on the scene. If there is abnormal movement, not only can the alarm be made through the transmission network, but the alarm call can also be issued on the scene, and the alarm host can realize voice communication with the dialed destination.

  Remote control alarm linkage function

  In the future, the functional expansion and application of network alarm host will be more extensive. The number of comprehensive alarm multi-function information terminal products for well-off families will gradually increase, and the urban alarm operation system will gradually tend to family services. Due to the improvement of the speed of two-way data exchange, the front-end host can be given more powerful security management functions, such as remote network control and linkage of home equipment automation. With the soundness and stability of 3G network and the variety of business options, people can more conveniently control their own security areas. "Based on the two-way control function and the real-time nature of broadband network, the network transmission module can send events to several or more monitoring centers at the same time, and can also send events to PC, PDA and smart phones through E-MAIL. At the same time, the alarm system can be remotely set or controlled by logging in to the alarm system through PC, PDA and smart phone, and some functions can be started or shut down. It can also expand and integrate other devices (such as smart home, access control, etc.) more flexibly.

  In addition to the above functions, a professional also said that in the future, alarm hosts will gradually develop in the direction of intelligent terminals. The products will not only have general alarm functions, but also have information publishing and receiving functions. In other words, in addition to publishing alarm information, the alarm center can also publish property management content and various notifications to the host. It is reported that this function has been applied in some high-end residential areas in China. In addition, more and more alarm hosts have information storage functions, such as supporting SD card storage or SATA hard disk storage, etc., the purpose of which is to facilitate the search for the occurrence of alarm events, which is conducive to the alarm center and the public security department to solve the case in time and provide better services to customers.

   Analysis of alarm host intrusion alarm technology

  The main functions of the intrusion alarm host include: partitioning and defense zones, arming and disarming, and alarm, event recording and query, communication and networking, fault detection and display, password and reset, expansion and compatibility, etc.

  1. Partitions and defense zones: It is generally recommended that medium-sized and larger alarm hosts should be partitioned to facilitate management. Large hosts can even have multiple partitions, and the number of defense zones included in the partitions can be determined by program design.

  There are various types of defense zones, such as entry and exit delay defense zones, perimeter defense zones, internal defense zones, emergency defense zones, medical rescue defense zones, fire defense zones, etc.; defense zones also have various attributes, such as audible/silent, continuous sound/intermittent sound, bypass allowed/no bypass, wireless/wired, transmission delay/no delay, etc.

  The number, type and attributes of defense zones should be appropriate to meet the needs. The more the better is not necessarily the case. In fact, some foreign hosts have many types of defense zones, but some are not suitable for domestic needs, which seems to cause burden and inconvenience.

  To facilitate memorization and use, some large hosts can identify partitions, defense zones, and even entrances and exits with custom codes or aliases. For example, if several departments of a company occupy different partitions, each partition can be represented by a different department name.

  2. Arming and disarming and alarm: Types of arming and disarming include stay-at-home arming and disarming, away-from-home arming and disarming, automatic arming and disarming, forced arming and disarming, single zone arming and disarming, engineering arming and disarming (for testing), zone bypassing and release, etc. The more complete the types, the more convenient it is for users.

  Alarms are divided into two categories: one is intrusion trigger alarm; the other is various detection fault alarms, such as anti-tampering, power supply, siren, zone failure, telephone line failure, etc. This type of alarm involves the host's self-protection and should be taken seriously.

  3. Event record and query: All alarms that occur during the operation of the host, as well as various operations related to setting changes, should be stored as events, and can be easily viewed when needed. Such event records are not allowed to be deleted or modified at will, and even if the host is powered off for a long period of time, the records can still be completely preserved. Such records are of great significance for responsibility inquiry and summary of experience and lessons after important changes.

  4. Communication and networking: including compatible communication protocols, communication objects and directions. Generally, wired telephone is used as the main means of communication, which can be networked with two or more centers, and can also report alarms directly to users by phone. Some hosts also add network or mobile communication as backup and auxiliary, which further improves the reliability of communication.

  In order to save telephone charges, some hosts may default to a dedicated telephone number for arming and disarming. When the center is using a hands-free phone, it can determine the user account for arming or disarming based on the telephone number transmitted by the other party. However, this function must be supported by the center receiver.

  5. Fault detection and display: It has the characteristics of automatic maintenance, usually including AC and DC power monitoring, anti-tampering, alarm circuit, zone circuit failure, telephone line failure, communication failure, etc. The more complete this function is, the better the host's self-protection performance is, and the higher the reliability of the work. For the display method after a fault occurs, for LED displays, the meaning of the sound and light display is required to be clear and easy to understand and remember.

  6. Password and reset: Common password types include engineering password, administrator password, user password, and hostage password. Some can also set a one-time password, a single arming password (arming is valid, disarming is invalid), and a remote control programming password.

  The host should have a reset function. In case of password loss or other special circumstances, it can be reset to restore factory settings or reprogram. For large hosts, due to the large amount of programming content, the reset is often divided into several levels. Partial reset can be performed specifically for a certain aspect to reduce the workload of reprogramming.

  7. Expansion and compatibility: The expansion of host functions is generally completed by connecting modules, such as adding defense zones, compatibility with wireless defense zones, adding programmable outputs, connecting with access controllers, etc. These functions can meet the individual needs of users in special occasions and are very popular.

  For a brand, we should also pay attention to the systematic nature of the product. The various hosts it includes should be able to meet the needs of low, medium and high grades.

Reference address:Analysis of alarm host functions and intrusion alarm technology

Previous article:Brief Analysis of Elevator Video Alarm Building Intercom Linkage System
Next article:Application of Bluetooth Technology in Automatic Fire Alarm System

Latest Security Electronics Articles
Change More Related Popular Components

EEWorld
subscription
account

EEWorld
service
account

Automotive
development
circle

About Us Customer Service Contact Information Datasheet Sitemap LatestNews


Room 1530, 15th Floor, Building B, No.18 Zhongguancun Street, Haidian District, Beijing, Postal Code: 100190 China Telephone: 008610 8235 0740

Copyright © 2005-2024 EEWORLD.com.cn, Inc. All rights reserved 京ICP证060456号 京ICP备10001474号-1 电信业务审批[2006]字第258号函 京公网安备 11010802033920号