Intruder alarm system (IAS) uses sensor technology and electronic information technology to detect and indicate illegal entry or attempted illegal entry into a fortified area (including the subjective judgment of being hijacked or robbed or other critical situation, deliberately triggering an emergency alarm device) Acting, handling alarm information, sending an electronic system or network of alarm information.
The basic composition of the system The intrusion alarm system is usually composed of front-end equipment (including detectors and emergency alarm devices), transmission equipment, processing/control/management equipment, and display/recording equipment.
The front-end detection part is composed of various detectors and is the tactile part of the intrusion alarm system. It is equivalent to human eyes, nose, ears, and skin. It senses the changes in temperature, humidity, odor, energy, and other physical quantities at the scene, and will It is converted into electrical signals suitable for transmission according to certain rules.
The operation control section is mainly an alarm controller.
The monitoring center is responsible for receiving and processing the alarm information and status information sent by each subsystem, and sends the processed alarm information and monitoring instructions to the alarm receiving center and related subsystems.
Intrusion alarm system formation mode According to the different signal transmission modes, the intrusion alarm system formation mode should be divided into the following modes:
1-point line system: The detectors and emergency alarm devices are connected by a one-to-one dedicated line between the multi-core cable and the alarm control host.
2 Bus system: The detectors and emergency alarm devices are connected through an alarm bus (line) between their corresponding addressing module and the alarm control host.
3 Wireless system: The detectors and emergency alarm devices communicate with the alarm control host through their corresponding wireless devices. The number of emergency alarm devices in one zone must not exceed four.
4 Public network: The detectors and emergency alarm devices are connected through the public network through on-site alarm control equipment and/or network transmission access equipment and alarm control host. The public network may be a wired network, or may be a wired-wireless-wired network.
The basic functions of the system to detect intrusion alarm systems are to perform accurate and real-time detection of the following possible intrusions and generate an alarm state:
a) Open doors, windows, air conditioner shutters, etc.;
b) Violence through doors, windows, ceilings, walls and other building structures;
c) broken glass;
d) move inside the building;
e) access or access to safes or important items;
f) Triggering of emergency alarm device.
When one or more armed areas generate an alarm, the response time of the intrusion alarm system should meet the following requirements:
a) Sub-system intrusion alarm system: no more than 2s;
b) The first alarm of any zone in the wireless and bus system intrusion alarm system: no more than 3s;
Subsequent alarms in other defense areas: no more than 2s;
The indication that the intrusion alarm system should be able to give an indication of the source of the event and the time of occurrence of the following states;
a) normal state;
b) learning status;
c) the alarm status generated by the intrusion;
d) tamper alarm status;
e) fault condition;
f) The main power supply is powered down and the standby power supply is under voltage;
g) adjust the alert (arming) / disarm (disarm) status;
h) Failed to transmit information.
Controlling the intrusion alarm system should be able to program the following functions;
a) Transient and delay zones;
b) All or part of the detection loop equipment warning (arming) and disarming (disarming);
c) transfer information to the remote center or cancel;
d) send a signal to the auxiliary device;
e) The system test shall be conducted with the minimum interruption of the normal operation of the system.
Record and query intrusion alarm systems should be able to record and post-follow the following events:
a) events listed in 4.3.3, programming settings listed in 4.3.4;
b) The name of the person who made the *, the on/off time; #p# Page title #e#
c) handling of the police situation;
d) Maintenance.
Transmission a) The transmission of alarm signals may be by wired and/or wireless transmission;
b) The alarm transmission system should have self-checking and inspection functions;
c) The intruder alarm system shall have an interface for wired and/or wireless communication with a remote center and be able to monitor the failure of the communication line;
d) The technical requirements of the alarm signal transmission system shall comply with IEC 60839-5;
e) Alarm transmission system The serial data interface information format and protocol shall comply with the requirements of IEC 60839-7.
The basic composition of the system The intrusion alarm system is usually composed of front-end equipment (including detectors and emergency alarm devices), transmission equipment, processing/control/management equipment, and display/recording equipment.
The front-end detection part is composed of various detectors and is the tactile part of the intrusion alarm system. It is equivalent to human eyes, nose, ears, and skin. It senses the changes in temperature, humidity, odor, energy, and other physical quantities at the scene, and will It is converted into electrical signals suitable for transmission according to certain rules.
The operation control section is mainly an alarm controller.
The monitoring center is responsible for receiving and processing the alarm information and status information sent by each subsystem, and sends the processed alarm information and monitoring instructions to the alarm receiving center and related subsystems.
Intrusion alarm system formation mode According to the different signal transmission modes, the intrusion alarm system formation mode should be divided into the following modes:
1-point line system: The detectors and emergency alarm devices are connected by a one-to-one dedicated line between the multi-core cable and the alarm control host.
2 Bus system: The detectors and emergency alarm devices are connected through an alarm bus (line) between their corresponding addressing module and the alarm control host.
3 Wireless system: The detectors and emergency alarm devices communicate with the alarm control host through their corresponding wireless devices. The number of emergency alarm devices in one zone must not exceed four.
4 Public network: The detectors and emergency alarm devices are connected through the public network through on-site alarm control equipment and/or network transmission access equipment and alarm control host. The public network may be a wired network, or may be a wired-wireless-wired network.
The basic functions of the system to detect intrusion alarm systems are to perform accurate and real-time detection of the following possible intrusions and generate an alarm state:
a) Open doors, windows, air conditioner shutters, etc.;
b) Violence through doors, windows, ceilings, walls and other building structures;
c) broken glass;
d) move inside the building;
e) access or access to safes or important items;
f) Triggering of emergency alarm device.
When one or more armed areas generate an alarm, the response time of the intrusion alarm system should meet the following requirements:
a) Sub-system intrusion alarm system: no more than 2s;
b) The first alarm of any zone in the wireless and bus system intrusion alarm system: no more than 3s;
Subsequent alarms in other defense areas: no more than 2s;
The indication that the intrusion alarm system should be able to give an indication of the source of the event and the time of occurrence of the following states;
a) normal state;
b) learning status;
c) the alarm status generated by the intrusion;
d) tamper alarm status;
e) fault condition;
f) The main power supply is powered down and the standby power supply is under voltage;
g) adjust the alert (arming) / disarm (disarm) status;
h) Failed to transmit information.
Controlling the intrusion alarm system should be able to program the following functions;
a) Transient and delay zones;
b) All or part of the detection loop equipment warning (arming) and disarming (disarming);
c) transfer information to the remote center or cancel;
d) send a signal to the auxiliary device;
e) The system test shall be conducted with the minimum interruption of the normal operation of the system.
Record and query intrusion alarm systems should be able to record and post-follow the following events:
a) events listed in 4.3.3, programming settings listed in 4.3.4;
b) The name of the person who made the *, the on/off time; #p# Page title #e#
c) handling of the police situation;
d) Maintenance.
Transmission a) The transmission of alarm signals may be by wired and/or wireless transmission;
b) The alarm transmission system should have self-checking and inspection functions;
c) The intruder alarm system shall have an interface for wired and/or wireless communication with a remote center and be able to monitor the failure of the communication line;
d) The technical requirements of the alarm signal transmission system shall comply with IEC 60839-5;
e) Alarm transmission system The serial data interface information format and protocol shall comply with the requirements of IEC 60839-7.
Welding Hinges,Weldable Hinges,Heavy Duty Weld On Hinges,Greasable Hinges
Jiaxing Gates Hardware Products Co.,Ltd , https://www.888gates.com