See how the network of electronic fence perimeter security

Fencing is a barrier established to protect a certain range of objects from being infringed, and to some extent it has a protective effect, but it cannot be completely prevented. Traditional fences are used to increase or add dangerous touch objects to increase safety, but they can affect the appearance, cannot be actively repelled, and bring inconvenience to the characters in the fence. The electronic fence is an active intrusion prevention fence that counters the intrusion attempt, repels the intruder, delays the invasion time, and does not threaten human lives. It sends the intrusion signal to the security department monitoring equipment to ensure management. The personnel can understand the situation of the alarm area in time and quickly handle it.
Among them, the network electronic fence is just like a fence. It is a video-linked alarm program. The network electronic fence is a new-generation electronic fence system that combines traditional electronic fence technology and network technology. It is mainly composed of an electronic fence host, intelligent control keyboard and The management software is composed of the user can supervise the electronic fence through the network, realizing the real-time transmission of user information, data interaction and remote supervision functions.
First, the working steps of the network electronic fence
When the network electronic fence zone illegally climbs over the wall or destroys, the warning light will immediately send out warning lights and sounds to drive away; the pulse electronic fence host takes the initiative to complete the transmission immediately after receiving the signal from the front end; the camera in the corresponding area is quickly adjusted to the preset position. , Linkage LED lights illuminate the invaded areas, ensuring that even in dark nights, clear alertness screens can be transmitted to their post and management center; the security management platform software in the management center pops up an alert window and is sent via SMS module. The alarm message is sent to the designated person's mobile phone; the on-duty personnel respond immediately after receiving the alarm and arrange for the personnel to go to the site for processing.
Linkage video surveillance restore field security management platform software with alarm records query, site image review and other functions, to provide scientific basis for future intrusion events. In addition, the software can also realize cross-regional remote control and hierarchical management, so that multiple controlled sites and upper management departments form a system that is closely linked to facilitate unified command and unified management.
Second, the working principle of the network electronic fence
The model structure of the network electronic fence can be divided into five layers: the physical layer, the sensing layer, the control layer, the network layer, and the application layer.
The physical layer is the hardware of the security equipment installed at the site, such as the electronic fence front-end system, video surveillance camera, alarm lights, LED lights, patrol collection points, etc. The main role is to carry the detection signal, blocking, deterrence intrusion By.
Various types of device sensors and transmission cables form a sensing layer and have functions of analyzing and detecting signals, identifying alarm information, and transmitting signals.
The control layer adopts the data bus technology, including the control keyboard, alarm host, hard disk recorder, etc., and functions as a local integration and management control of front-end sensor layer equipment, and realizes the management and control of arming and disarming, work mode adjustment, alarm signal analysis and processing, and signal uploading. Features.
The network layer is the basis for providing network communication support for the system equipment and realizes the information transmission of the front-end alarm equipment. Various network structures such as LAN, WAN, and Internet can be used according to different requirements of users.
The application layer is combined with the user's specific application scenarios to perform proper integration, linkage, analysis, and storage.
When someone illegally climbs over the wall or destroys it, the warning light will immediately give warning light and sound to drive it away. The pulse electronic fence host takes the initiative to complete the transmission immediately after receiving the signal from the front end. The camera in the corresponding area is quickly adjusted to the preset position, and the linked LED lights illuminate the invaded area, ensuring that even in the dark night, the clear alertness screen can be transmitted to the post and management center.
The security management platform software in the management center pops up an alert prompt window, and sends an alarm message to the designated person's mobile phone through the short message module. The on-duty personnel respond immediately after receiving the alarm and arrange for the personnel to go to the scene to handle. The security management platform software has the functions of alarm record query, on-site image review and so on, which provides scientific basis for handling intrusion events later. In addition, the software can also realize cross-regional remote control and hierarchical management, so that multiple controlled sites and upper management departments form a system that is closely linked to facilitate unified command and unified management.
Third, electronic fence installation precautions
1. In order to reduce the risk of electric shock, service personnel are required not to get warning signs when working in the electronic fence, and to prevent other people from moving the warning signs.
2. Do not use damaged wires, especially those with spikes, to prevent harm to humans and animals.
3. When recharging the maintenance-free lead-acid battery or other dry batteries, please remove the battery and recharge it. Do not recharge the battery directly on the electronic fence. This will damage the battery and the electronic fence host.
4, can not be the two electronic fence host to the same fence power supply, this will be due to the electronic fence host issued by the high-voltage pulse inconsistent and lead to host damage, but also easily lead to human and animal casualties.
5, It is forbidden to modify the internal circuit of the electronic fencing mainframe by oneself, or to replace the electronic components. This can easily lead to machine failure or injury to human life.
6. It is forbidden to contact or approach the electronic fence during thunderstorms to prevent the occurrence of a lightning strike. For all electronic fences, whether or not they are protected against lightning, this item must be prohibited.
7. Inform all the personnel who manage the fence how to cut off the output of the electronic fence host to prevent the occurrence of emergencies. In addition, how to cut off the operation guide of the electronic fence host should be placed on the conspicuous place of the electronic fence host.
8. It is strictly forbidden to use the adapter from the mains to the adapter of 12V DC to supply power to the host. It is easy to cause the output voltage of the host to be too high due to the failure of the adapter itself and insulation failure occurs.
9, after installation, please confirm whether the host is working properly, the host boot light indicates that it has been working, please rest assured that use. Do not touch the fence after starting up.
10. It is forbidden for infants and young children. Pregnant women touch electronic fences. No matter whether they have conditions or not, they must prevent such personnel from approaching the electronic fence. Otherwise, such equipment cannot be installed.
11. It is necessary to prevent visible warning signs from being placed next to the electronic fence host and to place warning signs at the fence.
12, grounding must be reliable, compact, grounding system must be far away from the living area.
13. It is forbidden to remove the electronic fence host privately. It is strictly forbidden to replace the components without authorization and contact the supplier in case of any problem.

Household Chopper

We are manufacturer of household Chopper in China, if you want to buy Chopper, Householld Chopper ,High Quality Chopper,Chopper Blender please contact us.

Jiangmen Hongyi Electrical Appliance Manufacturing Co., Ltd. is a professional enterprise which aims at producing household electrical appliances. Our company is located in Jiangmen City, Guangdong Province. We are adjacent to Guangzhou, Shenzhen, Macao and Hong Kong. The transportation is very convenient.
Our company has product development, mould manufacturing, testing, product manufacturing and other departments. We have a professional team to ensure product quality. We provide quality and high performance products for clients. Our company aims to establish good and stable trade relationships with clients. Our products are exported to Southeast Asia, the Middle East and other countries and regions. We have deeply won consumer's trust.
Our main products are food mixers, blenders, electric fans, electric irons, plastic accessories and hardware.
Our company has consistently adhered to the concept of "outstanding quality, affordable price, excellent service". We hope to strengthen economic cooperation with friends from all over the world and create a bright future together.

Chopper, Householld Chopper ,High Quality Chopper,Chopper Blender Details, CN

Jiangmen HongYi Electrical Appliance Manufacturing CO.LTD , https://www.hongyiappliance.com