wireless alarm system, smoke detector, carbon monoxide detector, gas detector, fire alarm, pir sensor

Current Location: Home >> Industry Solution >> Burglar alarm host seven functional analysis

Product

New Arrival
Zigbee Smart Home
Smart Wifi Alarm System
Wifi Door Sensor Alexa
Wifi PIR Detector
Wifi Light Switch
Wifi Smart Plug
WiFi IP camera
Home Alarm Systems
WiFi/Lora/RF433 USmart Home
Z-wave products
Smoke Detector
Accessories

Contact Us

>>Detail

Shenzhen Daping Computer Co., Ltd.

Email: 

info@aglysecurity.com

Sales_vicky@aglysecurity.com 

sales_amy@aglysecurity.com      

Office +86-755-23322627

Tel/Whatsapp : 008613537897340

Skype : daping_securityfactory

Add 1:Floor 4,Xuming Science Park,1193 Guanguang Road,Guihua Community,

         Guanlan Street,Longhua District ,Shenzhen(factory)

Add 2: FLAT B07 FLOOR23,HOVER INDUSTRIAL BUILDING,

           NO.26-38 KWAI CHEONG ROAD,N.T,HONG KONG

 

     

 

 

 

 

Industry Solution

Burglar alarm host seven functional analysis2015-4-22

Host intrusion alarm Key features include: zoning and zone, disarm and alarm, event logging and queries, communications and networking, fault detection and display of multiple aspects and reset passwords, extensions and compatibility.

      1, partition and zone: general proposition above average size of alarm host district should be established, can manage to get convenient, mainframe and even set up multiple partitions, while the number of zones covered by the partition programming OK.

      There are various types of zones, such as the entrance delay zone, perimeter zones, interior zones, emergency zones, medical assistance zones, fire zones, etc; zone there are a variety of different properties, if the sound / silent, sustained sound / intermittent sound, allow the bypass / can not bypass, wireless / wired transmission delay / no delay and so on.

      Zone number, types and properties to meet the needs of appropriate, is not necessarily better, in fact some of the foreign host, the type of which the zone is very large, but some are not suitable for domestic needs, but feel the burden caused and inconvenience.

      In order to facilitate memory and use some of the mainframe can be partitioned, zones, and even the entrance to customize the code name or alias as a logo, as several departments of a company are occupied by different partitions, each partition can be represented by a different department name .

      2, arm and disarm, and alarm: arm and disarm the species, including the stay arm and disarm, disarm out automatically arm and disarm, disarm mandatory, single-zone cloth disarm, disarm project (testing), set the Zone Bypass and discharge, etc., its type more complete, more user convenience.

      Alarm divided into two categories, one is intrusion alarm is triggered; the other is a variety of detection failure alarm, such as tamper, power supplies, alarm, fault zones, telephone line failure. Such alarm involving a host of self-protection, should be taken seriously.

      3, event logging and queries: Where the host alarm occurs during operation, as well as the relationship between the various operations to change the settings, should get stored as an event, when needed, and can be easily viewed. This event record does not allow any deletion, and even a longer period of time the host power failure, its record is still preserved intact. This record is important for liability accident occurred after the inquiry, lessons learned, has considerable significance.

      4, communications and networking: Includes compatible communication protocol, the communication objects and direction. Generally wired telephone as the primary means of communication with two or more central network, you can also report directly to the user'sphone alarm. Some hosts also increases network or mobile communication, as a backup, and an auxiliary, to further improve the reliability of communication.

      To save phone charges, and some hosts can arm and disarm the default special telephone center in case of a hands-free phone, according to the telephone number of the other transport, you can determine the arm or disarm the user account, but this function must be Support Center receiver.

      5, fault detection and display: with automatic maintenance of properties, usually AC-DC power supply monitoring, tamper, alarm circuits, circuit fault zone, phone line failures, communication failures and other content. This function is more complete, better the performance of a host of self-protection, the higher the reliability of the work. After the failure of the display method for LED displays, sound and light show requires unambiguous, easy to understand and remember.

      6, and reset the password: password types are commonly used in engineering password, administrator password, user password, password hostage, and some also set up one-time password, single arm password (arming effective, disarm invalid), and remote programming code.

      Host should reset function, in a lost password or other special circumstances, reset, restore the factory settings or re-programming. For the mainframe, due to programming more content, it is often divided into several levels reset, reset can be partially specialized for certain areas in order to reduce the workload of the design program again.

      7, expansion and compatibility: Extended host function, generally accomplished by connecting the module, such as increasing the zone, there is a compatible wireless zones can increase programming output connected to the access controller and so on. These functions on special occasions, to meet the user's individual needs, is very popular

【Back】