The alarm host is the "brain" part of the alarm system, which processes the signals of the detector and controls the alarm system by providing warning and disarming operations through the keyboard and other equipment. When giving an alarm, it can provide an audio/optical prompt, and at the same time, it can transmit the alarm information to the alarm center through the telephone line.
The alarm detector is composed of sensors and signal processing, which is used to detect the intrusion behavior of intruders. The device composed of electronic and mechanical parts is the key to the anti-theft alarm host, and the sensor is the core component of the alarm detector. Sensor devices with different principles can be used to form different kinds of alarm detection devices with different purposes.
Function of alarm host
The main functions of intrusion alarm host include: partition and defense, deployment and alarm, event recording and inquiry, communication and networking, fault detection and display, password and reset, expansion and compatibility.
1, partition and partition protection: generally, it is recommended that alarm hosts with medium or above scale be partitioned, which can facilitate management. A mainframe can even set up multiple zones, and the number of zones contained in a zone can be determined by programming.
There are various types of defense zones, including entrance and exit delay defense zone, perimeter defense zone, internal defense zone, emergency defense zone, medical rescue defense zone and fire protection defense zone. There are also various attributes of the zone, such as sound/mute, continuous sound/intermittent sound, bypass allowed/unable to bypass, wireless/wired, transmission delay/non-delay, etc.
The number, types and attributes of defense zones should meet the needs, not necessarily the more the better. In fact, some foreign hosts have many types of defense zones, but some of them are not suitable for domestic needs and feel cumbersome and inconvenient.
In order to facilitate memory and use, some large hosts can use custom codes or aliases to identify partitions, defense zones, and even entrances and exits. For example, if several departments of a company occupy different partitions, each partition can be represented by a different department name.
2. Deployment and alarm: Deployment types include left-behind deployment, out-of-town deployment, automatic deployment, forced deployment, single deployment, engineering deployment (for testing), setting bypass and promotion. The more complete the types, the more convenient it is for users.
Alarms can be divided into two categories: one is intrusion-triggered alarm; The other is all kinds of detection fault alarms, such as anti-disassembly, power supply, alarm, regional fault, telephone line fault and so on. This kind of alarm involves the self-protection of the host, so pay attention to it.
3. Event recording and inquiry: All alarms and various operations related to changing settings during the operation of the host should be stored as events and can be conveniently viewed when necessary. This kind of event record is not allowed to be deleted at will, and even if the host computer loses power for a long time, its record can still be kept intact. This kind of record is of great significance for accountability and summing up experience and lessons after important changes.
4. Communication and network: including compatible communication protocols, communication objects and directions. Generally speaking, wired telephone is the main means of communication, which can be connected with two or more centers, and can also give an alarm to users directly by telephone. Some hosts also add network or mobile communication as backup and assistance, which further improves the reliability of communication.
In order to save telephone charges, some hosts can deploy and cancel dedicated telephones by default. In the case of hands-free telephone, the center can judge the user account to be deployed or disarmed according to the telephone number sent by the other party, but this function must be supported by the center receiver.
5. Fault detection and display: it has the nature of automatic maintenance, and usually includes AC and DC power supply monitoring, disassembly prevention, alarm circuit, regional protection circuit fault, telephone line fault, communication fault, etc. The more perfect this function is, the better the performance of host self-protection and the higher the reliability of work. The display method after fault, for LED display, requires that the meaning of acousto-optic display is clear and easy to understand and remember.
6. Password and reset: Commonly used passwords include engineering password, administrator password, user password and holding password, and some can also set one-time password, single protection password (effective protection and invalid cancellation) and remote programming password.
The host should have a reset function, which can restore the factory settings or reprogram in case of password loss or other special circumstances. For mainframe, due to the content of program design, its reset is often divided into several levels, and it can be partially reset specifically for a certain aspect to reduce the workload of program redesign.
7. Expansion and compatibility: The expansion of host functions is generally completed by connecting modules, such as the increase of defense zones, the compatibility of wireless defense zones, the increase of programmable outputs, and the connection with access controllers. These functions can meet the personalized needs of users in special occasions and are very popular.
Installation requirements
A, the installation location should be empty, so that it can receive the alarm signal from each detector more smoothly.
B, the host's position should be hidden, not easy to be noticed.
C, and the host cable should be connected correctly.
D, the host should not be installed next to high-frequency electrical appliances to avoid interference by electromagnetic waves.
E, the installation of the host should be more than 0.5 meters away from the ground, in order to avoid the interference of ground shielding.
F. Pull out the receiving antenna after installation.