Fencing is a barrier established to protect a certain range of objects from being infringed, and to some extent it has a protective effect, but it cannot be completely prevented. Traditional fences are used to increase or add dangerous touch objects to increase the safety, but it will affect the appearance, can not take the initiative to knock back, but also bring inconvenience to the characters in the fence. The electronic fence is an active intrusion prevention fence, which counters the intrusion attempt, repels the intruder, delays the invasion time, and does not threaten human life. It also sends the intrusion signal to the security department monitoring equipment to ensure management. The personnel can understand the situation of the alarm area in time and quickly handle it.


See how the network of electronic fence perimeter security

Among them, the network electronic fence is just like a fence. It is a video-linked alarm program. The network electronic fence is a new-generation electronic fence system that combines traditional electronic fence technology and network technology. It is mainly composed of an electronic fence host, intelligent control keyboard and The management software is composed of the user can supervise the electronic fence through the network, realizing the real-time transmission of user information, data interaction and remote supervision functions.

First, the working steps of the network electronic fence electronic fence <br> <br> network zone when someone illegally crossing the wall or damage, the lights will issue an immediate warning light and sound driven; immediately after the pulse electronic fence front-end host receives the signal issued Actively complete the transmission; the camera in the corresponding area is quickly adjusted to the preset position, and the linked LED lights illuminate the invaded area, ensuring that even in dark nights, clear alertness screens can be transmitted to their posts and management centers; within the management center The security management platform software pops up an alarm prompt window, and sends an alarm message to the designated person's mobile phone through the short message module; the on-duty personnel responds immediately after receiving the alarm, and arranges the personnel to go to the scene for processing.

Linkage video surveillance restore field security management platform software with alarm records query, site image review and other functions, to provide scientific basis for future intrusion events. In addition, the software can also realize cross-regional remote control and hierarchical management, so that multiple controlled sites and upper management departments form a system that is closely linked to facilitate unified command and unified management.

Second, the working principle of the network electronic fence

The model structure of the network electronic fence can be divided into five layers: the physical layer, the sensing layer, the control layer, the network layer, and the application layer.

The physical layer is the hardware of the security equipment installed at the site, such as the electronic fence front-end system, video surveillance camera, alarm lights, LED lights, patrol collection points, etc. The main role is to carry the detection signal, blocking, deterrence intrusion By.

Various types of device sensors and transmission cables form a sensing layer and have functions of analyzing and detecting signals, identifying alarm information, and transmitting signals.

The control layer adopts the data bus technology, including the control keyboard, alarm host, hard disk recorder, etc., to perform local integration and management control of front-end sensor layer equipment, and realizes management and control of arming and disarming, work mode adjustment, alarm signal analysis and processing, and signal uploading. Features.

The network layer is the basis for providing network communication support for the system equipment and realizes the information transmission of the front-end alarm equipment. According to the different needs of users, various network structures such as a local area network, a wide area network, and an Internet may be adopted.

The application layer is combined with the user's specific application scenarios to perform proper integration, linkage, analysis, and storage.

When someone illegally climbs over the wall or destroys it, the warning light will immediately give warning light and sound to drive it away. The pulse electronic fence host takes the initiative to complete the transmission immediately after receiving the signal from the front end. The camera in the corresponding area is quickly adjusted to the preset position, and the linked LED lights illuminate the invaded area, ensuring that even in the dark night, the clear alertness screen can be transmitted to the post and management center.

The security management platform software in the management center pops up an alert prompt window, and sends an alarm message to the designated person's mobile phone through the short message module. The on-duty personnel responded immediately after receiving the alarm and arranged for the personnel to go to the scene to handle. The security management platform software has the functions of alarm record query, on-site image review and so on, which provides scientific basis for handling intrusion events later. In addition, the software can also realize cross-regional remote control and hierarchical management, so that multiple controlled sites and upper management departments form a system that is closely linked to facilitate unified command and unified management.

Third, electronic fence installation precautions

1. In order to reduce the risk of electric shock, service personnel are required not to get warning signs when working in the electronic fence, and to prevent other people from moving the warning signs.

2. Do not use damaged wires, especially those with spikes, to prevent harm to humans and animals.

3. When recharging the maintenance-free lead-acid battery or other dry batteries, please remove the battery and recharge it. Do not recharge the battery directly on the electronic fence. This will damage the battery and the electronic fence host.

4, can not be the two electronic fence host to the same fence power supply, this will be due to the electronic fence host issued by the high-voltage pulse inconsistent with the host damage, but also easily lead to human and animal casualties.

5, It is forbidden to modify the internal circuit of the electronic fencing mainframe by oneself, or to replace the electronic components. This can easily cause the machine to malfunction or cause harm to human life.

6. It is forbidden to contact or approach the electronic fence during thunderstorms to prevent the occurrence of a lightning strike. For all electronic fences, whether or not they are protected against lightning, this item must be prohibited.

7. Inform all the personnel who manage the fence how to cut off the output of the electronic fence host to prevent the occurrence of emergencies. In addition, how to cut off the operation guide of the electronic fence host should be placed on the conspicuous place of the electronic fence host.

8. It is strictly forbidden to use the adapter from the mains to the adapter of 12V DC to supply power to the host. It is easy to cause the host's output voltage to be too high due to the failure of the adapter itself, and insulation failure occurs.

9, after the installation, please confirm whether the host is working properly, the host boot light indicates that it has been working, please rest assured that use. Do not touch the fence after starting up.

10. It is forbidden for infants and young children. Pregnant women touch electronic fences. No matter whether they have conditions, they must prevent such personnel from approaching the electronic fence. Otherwise, they cannot install such devices. 11. Must prevent obvious warning signs beside the electronic fence host and place warning signs at the fence. .

12, grounding must be reliable, compact, grounding system must be far away from the living area.

13. It is forbidden to remove the electronic fence host privately. It is strictly forbidden to replace the components without authorization and contact the supplier in case of any problem.

Neodymium Cube Magnets

Strong Cube Magnets,5Mm Cube Magnets,Strong Magnet Cube,Rare Earth Magnet Cube

Dongguan Zhenglong Magnet Co., Ltd , https://www.zlmagent.com