Alarm host functional anatomy and modular design

It is also a major trend for the development of alarm hosts to develop from a few defense areas to multiple defense areas. Combining with China's special national conditions, in order to meet the actual requirements of users of various large-scale application environments such as intelligent buildings, large-scale residential communities, large-scale shopping malls, judicial agencies, and cultural libraries in the new situation, the capacity of defense zones for many alarm hosts is continuously increasing.

Alarm host function anatomy

The main functions of the intrusion alarm host include: partition and zone, arming and disarming and alarming, event recording and querying, communication and networking, fault detection and display, password and reset, extension and compatibility, and other aspects.

1. Partitions and defense zones: It is generally advocated that alarm hosts with a medium or higher scale should establish partitions to facilitate management. The mainframe can even have multiple partitions, and the number of defense zones included in the partition can be determined by program design.

There are various types of defense zones, such as entrance and exit delay zones, perimeter zones, internal zones, emergency zones, medical rescue zones, fire zones, etc.; zones have various attributes such as sound/silence, continuous sound/intermittent Sound, Bypass/Unbypass, Wireless/Wired, Transmission Delay/No Delay, etc.

The number, types, and attributes of defense zones are suitable to meet the needs, and not necessarily the better. In fact, some hosts in foreign countries have many types of defense zones, but some are not suitable for domestic needs, but they are a burden to the senses. And inconvenience.

In order to facilitate memory and use, some mainframes can use partitions, zones, and even entrances and exits with a custom code or alias. For example, if several departments of a company occupy different partitions, each partition can be represented by a different department name. .

2. Closing and disarming and alarming: The type of arming and disarming, including left and right arming and disarming, out-of-office arming and disarming, automatic arming and disarming, forced arming and disarming, single-area arming and disarming, project arming and disarming (for testing), and setting up zone bypass and release, etc. The more complete the type, the more convenient the user.

There are two types of alarms, one is an intrusion triggered alarm; the other is a variety of detection fault alarms, such as tamper, power supply, sirens, zone faults, and telephone line faults. This kind of alarm involves self-protection of the host and should be taken seriously.

3, the event records and inquiries: All the host computer in the course of the operation of the police, as well as related to changing the set of various operations, should be stored as an event, when needed, but also can be easily viewed. This kind of event record does not allow arbitrarily revise, and even if the host is powered off for a long period of time, its record can still be completely saved. This kind of record is of great significance to the inquiry of responsibility and the lessons learned after major changes.

4, communication and networking: including compatible communication protocols, communication objects and directions. Wired telephones are generally used as the main means of communication. They can be networked with two or more centers. They can also report alerts directly to subscribers. Some hosts also added network or mobile communications as backup and assistance, further improving the reliability of communications.

In order to save telephone charges, some hosts may deploy and disarm private phones by default. In the case of hands-free telephone sets, the center can determine the user account for arming or disarming based on the telephone number transmitted by the other party. However, this function must be obtained. Center receiver support.

5, fault detection and display: with the nature of automatic maintenance, usually AC and DC power monitoring, tamper, alarm loop, loop circuit failure, telephone line failure, communication failure and so on. The more complete this function, the better the host self-protection performance and the higher the reliability of the work. The display method after a failure occurs, and for the LED display, the meaning of the acousto-optic display is required to be clear and easy to understand and remember.

6, password and reset: Common types of passwords are engineering passwords, administrator passwords, user passwords, hijacked passwords, and some can also set a one-time password, a single deployment password (armed effective, disarmed invalid) and remote program design password.

The host should have the function of resetting, in the case of lost passwords or other special circumstances, by resetting, restoring the factory settings or reprogramming. For mainframes, due to the large amount of program design content, the reset is often divided into several levels. Partial reset can be performed specifically for a certain aspect to reduce the workload of program redesign.

7. Extension and compatibility: The expansion of host functions is generally accomplished through the connection of modules, such as the increase of defense zones, the compatibility of wireless zones, the increase of programmable output, and the connection with access controllers. These functions are very popular in the special occasions to meet the individual needs of users.

For a brand, it should also pay attention to the systemic nature of the product. The various hosts it includes should meet the needs of low, medium and high grades respectively.

Alarm host large fighting method
At present there are about 3,000 alarm service centers in China. The number of network users has also exceeded one million, and it is still increasing at a rate of more than 20% per year. However, since its own alarm center, the headache for central management personnel is that the number of false alarms in the system has continued to increase, and the workload of police officers has continued to increase. This has actually made the central police officers busy to collapse.

The traditional countermeasures are usually sent to the nuclear police on the spot by telephone or manually. There is also a telephone channel that uses transmission alarms to transmit the sound collected at the scene to the center for monitoring or recording. As a result, although it is simple and convenient and the cost is low, the limitations are great. Because even if there is an illegal invasion, it will not necessarily produce enough sound.

Now, with the popularity of online video, the review of the police situation has turned a turning point. Through the network camera, the image of the scene is transmitted to the center, so that the check-in personnel can see the situation of the alarm scene in real time while receiving the alarm information, so as to make a correct judgment, whether it is a true alarm or a false alarm, whether it is necessary to send an alarm Whether the personnel rushed to the scene should immediately take emergency measures to stop the criminal activities in a timely manner and avoid the loss caused by the users. This type of review is certainly more reliable and ideal.

At present, social security pressures are increasing, social contradictions are prominent, and the situation of social stability is complicated. It is precisely in this situation that the interaction between alarm and monitoring will be rapidly activated. The video review technology will enable the police service to step into another new era. .

Modular design

The Internet of Things is moving from concept to practicality. The demand for anti-theft alarms from users is constantly increasing. The most prominent manifestation is the change in the concept of anti-theft alarm control systems. It is transformed from a single alarm dialer to today's intelligent control system. More value-added service features. In addition, the alarm panel is modularized for the user's secondary development. When the product is shipped from the factory, in addition to the core components, the vendor also reserves some interfaces. Most of the additional functions can be implemented by adding different functional modules, such as network modules, GPRS modules, voice modules, and automatic control modules. Wait.

At present, the idea of ​​modular design has penetrated into many fields. The modular design of the product has made it extremely prominent in terms of installation, maintenance and capacity expansion. For the security industry, it is also a fresh trend.

Zone expansion capacity

It is also a major trend for the development of alarm hosts to develop from a few defense areas to multiple defense areas. Combining with China's special national conditions, in order to meet the actual requirements of users of various large-scale application environments such as intelligent buildings, large-scale residential communities, large-scale shopping malls, judicial agencies, and cultural libraries in the new situation, the capacity of defense zones for many alarm hosts is continuously increasing.

There is no shortage of large scalable systems in imported or domestic alarm systems. The imported PC4020 alarm host, such as Canada DSC, can provide 16 basic on-board wired defense zones, can also be extended to 128 zones through addressable bus, wireless, etc., and can be divided into 8 sub-users for 8 independent users. System; similar systems such as the United States Honeywell's VISTA-l20/250 alarm host, there are nine on-board wired zone, while using four-wire, bus and wireless zones extended to 128/250 zones; another Bosch DS7400 Alarm host, comes with 8 zones in the board, with two-core bus (excluding the detector power line) can be extended to 240 defense zones, a total of 248 defense zones. The most prominent domestic products, such as Inventec's AW-BM1600 large-scale control panel, have 16 defense zones on the board, and can expand up to 1008 single host computers through multiple buses and 62 different types of modules. The defense zone can also be set as 32 subsystems. Each subsystem acts as an independent small alarm system that can independently arm and disarm and can serve 32 independent users. The above-mentioned alarm host has a common feature that can be controlled by programmable relays or circuit outputs to control appliances, CCTV systems, and other security subsystems, enabling alarm linkage.

Ball Valve

Ball valve is evolved from the plug valve, its opening and closing parts as a ball, using the ball to rotate 90 degrees around the axis of the stem to achieve the purpose of opening and closing, the difference is that the cock body is a ball, with a circular through hole or channel through its axis. The ratio of the sphere to the passageway should be such that when the ball is rotated 90 degrees, the inlet and outlet should be completely spherical, thus cutting off the flow.


The role of ball valve in the pipeline is mainly used to cut off, distribute and change the direction of media flow, designed into the V-shaped opening ball valve also has good flow regulation function.

Ball valve is not only simple in structure, good sealing performance, but also in a certain nominal range of small volume, light weight, less material consumption, small installation size, and driving torque is small, easy to operate, easy to realize rapid opening and closing, is one of the fastest developing valve varieties in recent decades. Especially in the United States, Japan, Germany, France, Italy, West, Britain and other industrial developed countries, ball valves are widely used, the variety and number of use is still continuing to expand, and to high temperature, high pressure, large mouth, high sealing, long life, excellent regulatory performance and a valve multifunctional direction, its reliability and other performance indicators have reached a higher level, And has partially replaced Gate Valve, Globe Valve, Regulating Valve.


Ball Valve,Electric Ball Valve,Pneumatic Ball Valve,High Pressure Ball Valve

WUXI KVC-VALVE , https://www.wxkaiweixi.com