|
About Us |
|
|
|
|
|
Home > About Us >Industry News |
|
What does a complete alarm system look like |
2022.03.02 |
|
The anti-theft alarm system refers to the connection of various anti-theft alarm detectors, alarm controllers and other equipment in the area composed of one or more units by wireless, dedicated lines or borrowed lines to form centralized alarm information detection, transmission and control. A complete system of harmonic and light responses. It can detect the police situation in time, and transmit the alarm information to the relevant departments, so as to detect the police situation in time, transmit it quickly, and respond quickly. The establishment of a reasonable and applicable alarm system will play an important role in preventing, stopping and combating crimes, and can minimize losses.
◆ Anti-theft alarm system equipment mainly includes the following parts:
1) Centralized alarm controller: It is usually set in the place where the security guards work, and the security personnel can use this equipment to centrally monitor the working conditions of the alarm controllers at various positions in the security area. Usually the device is connected to the computer, and can monitor the working status of each subsystem at any time.
2) Alarm controller: It is usually installed on the wall near the gate of each unit to facilitate the setting of fortification (including full arming and semi-arming) and disarming by persons with control rights when entering and leaving the unit.
3) Magnetic door switch: installed on the door, balcony door and window of the unit. When someone destroys the door or window of the unit, the door sensor switch will immediately transmit these action signals to the alarm controller for alarming.
4) Glass breakage detector: Mainly used for perimeter protection, installed on the wall or ceiling near the unit windows and glass doors. When the glass of the window or balcony door is broken, the glass break detector will detect the sound of broken glass and send the signal to the alarm controller to give an alarm.
5) Infrared detectors and infrared/microwave dual detectors: for area protection, usually installed on the walls or ceilings of important rooms and main passages. When someone trespasses illegally, the infrared detector determines the trespass by detecting the temperature of the human body, and the infrared/microwave dual detector detects the temperature and movement of the human body to determine trespassing, and transmits the detected signal to the alarm control The device enters the alarm. Managers can also program the level and sensitivity of infrared detectors and infrared/microwave dual detectors.
6) Emergency call button: It is mainly installed in a location where there is a lot of flow of people, so that in the event of an accident, the emergency call button can be pressed to make an emergency call to the security department or others.
7) Alarm speaker and alarm bell: Installed in a position where it is easy to be heard. When the detector detects an unexpected situation and issues an alarm, the alarm detector can send out an alarm sound through the alarm speaker and the alarm bell.
8) Alarm indicator light: It is mainly installed on the wall outside the gate of the unit. When an alarm occurs, the security personnel who come to rescue can quickly find the alarm user through the flashing of the alarm indicator light.
◆ Working principle:
The front-end equipment of the intrusion alarm monitoring system is used to monitor the status of each area in the building in real time, and in turn serves as the main basis for judging whether there are abnormal events.
Various front-end alarms have normally open or normally closed contacts, which are connected to the nearest alarm collectors distributed on each floor through a double-core control cable. , the state of the normally open or normally closed contact changes.
The defense zone alarm collector is connected with the control host and communicates in real time. Once it detects that the state of the front-end alarm has changed, it will immediately transmit the information such as the number of the front-end alarm that generates the alarm signal to the control host in a specific encoding format.
The system control host can automatically identify the source of the alarm signal, and automatically respond to the program according to the set system. At the same time, it provides users with various on-site information, including live video images, sound signals, etc., for users to correctly determine the reliability of abnormal events. The nature and severity of the situation provide the necessary decision-making basis, and prompt the user to take appropriate measures to prevent it in time.
|
|
|
|
|