Alarm with action (action with alarm). When an alarm event occurs, it triggers related equipment other than alarm equipment to perform actions (such as alarm image review, lighting control, etc.).
Linkage alarm working principle
Alarm linkage monitoring, that is, monitoring equipment, especially searchlights, can be turned off most of the time during the night, and the alarm system is normally turned on 24h.
After the alarm system is triggered, the alarm host sends a signal to the linkage module to turn on the monitoring equipment and the searchlight. The monitoring equipment is connected to the AI ​​(analog input) or DI (digital input) channel of the monitoring host. Once the monitoring host receives the monitoring equipment, The alarm signal (the mechanism of the analog alarm is that the voltage exceeds the preset threshold range to generate an alarm. The mechanism of the switch alarm is the comparison between the switch of the channel and the normal state set in advance, and the change will be the alarm). Software presets or hardware (some products can be directly linked to the hardware) will output a digital signal to the corresponding DO (digital output) channel, and switch the device connected to the DO channel. For example, the high temperature alarm linkage backup air conditioner is turned on, the humidity is too low, the linked humidifier is turned on, the engine room leaks the linkage engine room alarm system, and the linkage between the alarm system and the monitoring system that you mentioned, such as illegal intrusion linkage recording and room lighting, is under normal circumstances. To provide a dry node for the alarm system, connect to the monitoring host through a dry node and link other devices.
Basic principle of network alarm system:
The entire system is divided into three parts: user-end equipment, channels, and alarm center equipment.
1, the client device and its role:
The client-side networking equipment mainly includes: wireless alarm controllers, infrared alarms, door sensors, emergency buttons, smoke, gas leaks, infrared radiation, infrared barrier wireless, and rolling gate clutch sensors.
(1) The network alarm host has two states: Armed alert state and disarmed standby state; can receive the alarm signal sent by the device (through wireless and wired parties), and the networked alarm host will automatically go through the public telephone network to the network in the armed state. The alarm center sends alarm reports as well as alarm information and arming and disarming status information.
(2) Infrared is divided into two kinds of curtains and wide-angle, it will find moving objects (heat radiation) in the detection range, and send electronic signals to the alarm control host. When there is no one within the scope of protection, when the alarm control host is in the armed alert state, once an illegal invasion occurs, infrared will immediately discover and send an electronic signal to the alarm control host. The alarm control host will send an alarm report to the alarm center to prevent the intrusion of the thieves. . The scope of protection of the screen is a plane, which is generally used to prevent windows and other planes; wide-angle protection is a space.
(3) The door magnet is installed on the window of the door. When the door and window are illegally opened in the arming state, it will cause the door magnetism state to change and cause an alarm.
(4) Emergency button: The emergency button is equivalent to a switch that is used to change the status of the alarm loop to achieve the purpose of the alarm. It is simple, convenient and effective to use. Financial bank systems, shops, supermarkets, enterprises and public institutions can promptly receive timely assistance from the alarm center in the event of robbery or when the home user has a patient, the elderly, or when a dangerous button is pressed. For more information on other burglar alarm consoles and burglary alarm accessories, please refer to the Network Alarm Products table.
2, the channel and its role:
The networked alarm system transmits information through the public telephone network. The performance is stable, and the transmission of alarm information is timely and reliable. It is also a relatively mature networking method adopted today. It mainly serves as a medium, integrating the alarm center and the terminal alarm host so that the alarm center can timely and accurately receive the information reported by the front-end equipment and complete the operation of the entire system. Xinguangan technology network alarm system transmission network has a variety of ways: public fixed telephone network, GSM wireless network, GPRS wireless network, Internet broadband network, 3G network. According to the actual conditions and requirements, the market to choose the appropriate networking.
3, network alarm center equipment and its role:
The core part of the networked alarm center is the computer alarm management software, which determines the basic functions of the center. At the same time, the selection of equipment such as the server, terminal network anti-theft alarm host and burglar alarm accessories also affects the overall performance of the center. Xin Guang'an "An Bao Tong" large-scale intelligent network management platform, belonging to the intelligent computer alarm management software, is the latest version of the alarm management system software. The Xinguangan alarm platform is applicable to the series of alarm network of the security assurance agreement, and it is also applicable to other alarm control hosts. Using the Chinese Windows Server operating system, the operation of the window is simple and easy to use, and the mouse and the keyboard are used for function selection and operation, which is easy to manage and maintain.

Aluminum Perfume Cap

Aluminum Perfume Cap,Aluminum Perfume Hat,Aluminum Perfume Bottle Cap,Aluminum Perfume Bottle Tops

Jiangyin First Beauty Packing Industry Co, ltd , https://www.cosmeticpacking.com