(I) System Overview:
1. The role of the system:
Defense and prevention are anticipating safe havens for attacks and intrusions. In recent years, with the rapid development of the security industry, there has been a significant increase in the use of perimeter defense applications. In China, infrared technology has been widely adopted and accepted, and independent applications are very common. With years of professional experience in security monitoring at home and abroad, its well-designed networked digital integrated monitoring platform has highly integrated domestic and foreign professional achievements such as video surveillance, alarm, access control, and perimeter. As long as the user uses the company's bus system security platform products, through this platform to achieve integrated monitoring of the network to ensure the safety of the community. The overall technology of the platform represents the development direction of security technology in the world today.
According to the information provided by Party A, the total length of the external wall of the community is about 500 meters. Under normal circumstances, once an illegal intruder climbs over the wall, security personnel cannot immediately detect the situation and handle it, which may lead to various types of cases. With the development of modern detector technology and the wide application of security products, at present, in a closed residential community, the use of a combination of air defense technology and defense measures has solved this problem. According to the specific conditions of this community, the use of e-Winp perimeter security alarm platform products can effectively achieve the purpose of perimeter blocking and intelligent alarms, greatly reducing the incidence of various types of cases, and making the district’s public security status. With good improvement, the owner’s sense of security has been further improved. In the following, in combination with the actual conditions of the community, a solution for the perimeter security alarm system of the community is made.
2. System Overview: According to the specific circumstances of the community, the perimeter wall of the community is installed in the bus to construct the electronic fence controller, which constitutes a perimeter security system. E-Winp (Wenpu) WIN-3000C host keyboard installed in the control room, LED electronic map and the center management host electronic map accurately and clearly display the alarm zone, alarm time, alarm location and other information, while producing sound and light alarm So that managers can deal with the police in a timely manner. The WIN-3000C host can also transmit alarms via the network and the telephone (limited to the commercial host) to implement local and remote alarm functions.
(II) System objectives:
The purpose of setting up a perimeter prevention alarm system is to establish a safe and reliable community, strengthen the management of exits and exits, prevent entry of miscellaneous personnel outside the area, and prevent illegal persons from jumping over the fence. When an unexpected situation occurs in the defense area, an alarm is issued and the security department is notified. The high-performance alarm system we designed for the community is to strengthen the management of the perimeter and prevent illegal people from entering the community through the fence.
(III) System Composition:
High-performance intelligent alarm system is to use electronic fence controller and high voltage or low voltage power grid to control the perimeter of the community and connect it to the computer of the management center. If anybody invades forcibly, the electronic fence controller can perform live sound and light alarm and alarm at the same time. The signal is transmitted to the district management office, and the district management computer and the center's computer will issue an alarm to indicate the exact area, time, and zone number of the alarm so that the security personnel can handle it in time.
This program has designed a perimeter alarm system based on the actual conditions of the community. According to the different terrain features around the community, four bus electronic fence controllers are set up on the perimeter wall of the community, and four high-voltage or low-voltage power grids made of specially constructed bare aluminum alloy wires are connected in parallel to prevent unauthorized persons from crossing over. , Intrusion, alarm signal through the bus access control center computer, high voltage or low voltage power grid used to stop illegal personnel overturn, intrusion, if forced to overturn, you can cause a short circuit or disconnection of the power grid, this time the bus electronic fence controller will occur Alarms, and the alarm information is transmitted to the alarm center, the security personnel of the district rushed to the scene to deal with the police situation.
The principle of the system structure diagram is shown in Fig. 1. If someone is forcibly invading, the electronic fence alarm signal will be transmitted to the community management office at the same time. The community management office will issue an alarm to indicate the exact area, time, and other information of the alarm so that the security personnel can Can handle it in time.
The perimeter alarm system of the community consists of the front end, transmission, and the center. These three parts are respectively described below.
1. front end:
It is composed of four specially-made bare aluminum alloy wires arranged in parallel, and the fence controller output pulse high voltage or low voltage to form a power grid, which forms an electronic fence part.
2. Transmitting the various alarm information that the bus electronic fence controller located around the community will receive through the communication bus to the control center computer. The alarm system adopts the independently researched and developed bus communication technology to ensure the safety and reliability of the entire system in communication. To prevent malicious copying and detection. In this way, the perimeter alarm signals in the various defense areas of the community are effectively and quickly transmitted to the control center.
3. The center cell control center is composed of e-Winp (Wenpu) WIN-3000C bus alarm host and central computer. The front-end device, that is, the bus electronic fence controller, can be deployed and disarmed through the control panel of the WIN-3000C host computer or the central computer perimeter alarm system management software. If an illegal intrusion occurs during the deployment, the electronic fence may be short-circuited or disconnected. The bus electronic fence controller promptly sends out alarm information. The central computer electronic map can display the specific alarm location and defenee zone number. At the same time, the computer audio or sirens will start ringing and an audible and visual alarm will be issued to prompt the on-duty personnel to handle the alarm.
(D), system features:
(1) High-voltage or low-voltage electronic fences: They can block unauthorized persons from overflighting and intrusion, and they can also issue warning alerts.
(2) Signal acquisition and transmission stability: Advanced bus communication network transmission technology is used to directly transmit signals to the control center computer. Therefore, it has the advantages of long transmission distance, stable transmission signal, strong anti-interference ability, and large system expansion.
(3) Computer monitoring integration: Adopting digital processing technology, it can quickly respond to and record police conditions through electronic maps, database records, etc., and can be linked with other security systems.
(4) Fast response: The alarm time is extremely short. After the bus electronic fence controller detects the alarm signal, the alarm information can be uploaded to the control center within 0.5s.
(5) Online electronic map display alarm location: Through the alarm software of the factory system, various plane maps can be intuitively displayed. When an alarm occurs, the exact location and type of alarm can be visually displayed.
(6) System design and product selection criteria and specifications.
(7) The technology is advanced, mature, practical and reliable.
(8) System installation, operation, maintenance and low cost, long service life.
(V) Perimeter-wide system design plan This design is based on the requirements of the project unit and comprehensively draws on the advanced technologies of current domestic and international security products. It refers to national standards and perimeter system design requirements, and is based on the architectural layout and use of the community. Functional requirements, the development of the design program, according to the design of the program with advanced equipment performance, strong anti-interference, low false alarm rate, alarm function is complete, stable and reliable.
Perimeter system security design:
1. Equipment safety The security system uses electrical equipment and the host electrical safety and lightning protection safety indicators in line with the relevant national and industry standards, in order to ensure the safety of personnel and equipment can use advanced lightning protection equipment (optional), the overall defense The lightning facilities adopt three lightning protection methods: lightning protection of the front-end equipment, lightning protection of the building power supply, and lightning protection of the power supply and equipment of the equipment room.
2. Data security Establish a sound data backup and recovery mechanism. Ensure that data is not lost due to physical media damage. Data adopts effective encryption protection measures to ensure data security.
3, System Security Center Computer perimeter alarm management system software has a strict identity authentication mechanism to prevent illegal intrusion into the system. The central computer operating system and software system establish a perfect backup system to ensure that the system is quickly restored after being damaged. You can use appropriate anti-virus measures to install powerful anti-virus software and upgrade it in time.
Wire and engineering wiring:
(1) The signal in the perimeter alarm system is transmitted to the host through the cable. In addition to the requirement of a small signal loss rate, the cable should also pay attention to the influence of the environment on the signal, that is, the shielding performance should be high. At the same time, PVC pipe is used to protect the cable, and the corresponding PVC pipe should also be selected according to different protection levels.
(2) The system cabling of this project adopts standardized and structured cabling methods. To ensure the safety, economy and aesthetics of cabling, all cable cabling is connected to the vertical bridge of the weak electric well with a horizontal metal bridge, and the cable exiting from the weak electric well passes through. The bridge is up to the main control room.
(3) During the laying of cables, ensure that all cables are not exposed inside PVC pipes, metal pipes or bridges. Avoid harsh environment conditions or pipeline damage, avoid high-voltage lines, high-power transformers, etc. Electric arc machines and other electrical equipment with strong interference.
(4) The wiring process should be marked clearly and clearly, and it is easy to change lines, maintain and manage.
(5) According to the requirements put forward in this project and in accordance with the consistent construction principles and design principles, and strictly abide by the following standards and norms formulated by the following countries and industry related departments:
Commercial Building Cabling Standards International Cabling Standards Building and Building Integrated Cabling Systems Engineering Design Specifications Building and Building Integrated Cabling Systems Engineering Construction and Acceptance Standards Civilian Electrical Building Design Specifications Chinese Electric Appliance Installation Engineering Construction and Acceptance Specifications (6), Perimeter Prevention The more system equipment parameters: WIN-3000C host WIN-3000C bus system alarm host with keyboard, management center software version 3.1, the default controller can be connected to the 96-channel zone, up to 4 control 480 road defense zone; the keyboard can store 800 Alarm records, 500 status messages.
Features 1, 12V DC voltage, 7A/h battery provides about 6 hours of standby power.
2, 220V AC power supply 3,12V 1A relay alarm status output, can be connected to the siren, siren, police lights.
4, lack of battery display.
5, controller fault display, bus short-circuit display, detector (bus electronic fence controller) broken display,
6, Arming, defense, alarm, fault, operator operations and other information records.
7, the central computer perimeter alarm management software electronic map display.
8, the electrical device complies with the internationally accepted CENELEC standard EN61011.
10. The controller meets the outdoor installation IP55 standard.
11. Alarm output normally open normally closed dry contact signal can be converted into RS232/RS485 signal.
12, outside the large LED electronic display map.
13, keyboard fortification, disarm function.
14, perimeter alarm management features:
WIN-3000C bus system alarm host with keyboard, management center software WIN285; each controller can be set to 99 road defense zone, can control up to 495 road defense zone (5 controllers); storage of alarm records (800 alarm messages), Printing can be armed or disarmed by the computer.
The software performs node setting, defense, arming and disarming functions.
II: Bus Electronic Fence Controller Master-06
Features 1, 12V DC voltage, 7A/h battery provides about 6 hours of standby power.
2, can be remote wireless remote control switch 3,220V AC power supply 4,12V 1A relay alarm status output 5, low battery display 6, controller fault display 7, monitor fault display 8,12V DC start alarm siren, emergency lights or other local Emergency Signal 9, Energizer complies with the internationally accepted CENELEC standard EN61011
10, the controller meets the outdoor installation IP55 standard 11, the alarm output normally open normally closed dry contact signal, e-Winp (stabilized) bus module signal output.
This product has a public security department inspection report, will not cause harm to people, the product uses low energy (2.5 joules), low frequency (60 beats / min) pulse, with deterrence, blocking function. Pulse high voltage / low voltage output, pulse high voltage detection cable pulse voltage (700-5000V). The system uses high-voltage electric shock and low-voltage passive detection lines synchronously. The high-voltage electric shock cable provides active warning electric shock. The low-voltage passive cable provides alarm monitoring. The controller has the ability to independently monitor the passive detection cable and the active detection cable alarm analysis (optional feature, this solution is not included). In addition, the passive detection cable can be installed in a large-scale electronic security fence network. Passive detection cables provide a backup system for active detection of cables. The pulse attack time can be adjusted by 1 second, 2 seconds, and 3 seconds.
1. The role of the system:
Defense and prevention are anticipating safe havens for attacks and intrusions. In recent years, with the rapid development of the security industry, there has been a significant increase in the use of perimeter defense applications. In China, infrared technology has been widely adopted and accepted, and independent applications are very common. With years of professional experience in security monitoring at home and abroad, its well-designed networked digital integrated monitoring platform has highly integrated domestic and foreign professional achievements such as video surveillance, alarm, access control, and perimeter. As long as the user uses the company's bus system security platform products, through this platform to achieve integrated monitoring of the network to ensure the safety of the community. The overall technology of the platform represents the development direction of security technology in the world today.
According to the information provided by Party A, the total length of the external wall of the community is about 500 meters. Under normal circumstances, once an illegal intruder climbs over the wall, security personnel cannot immediately detect the situation and handle it, which may lead to various types of cases. With the development of modern detector technology and the wide application of security products, at present, in a closed residential community, the use of a combination of air defense technology and defense measures has solved this problem. According to the specific conditions of this community, the use of e-Winp perimeter security alarm platform products can effectively achieve the purpose of perimeter blocking and intelligent alarms, greatly reducing the incidence of various types of cases, and making the district’s public security status. With good improvement, the owner’s sense of security has been further improved. In the following, in combination with the actual conditions of the community, a solution for the perimeter security alarm system of the community is made.
2. System Overview: According to the specific circumstances of the community, the perimeter wall of the community is installed in the bus to construct the electronic fence controller, which constitutes a perimeter security system. E-Winp (Wenpu) WIN-3000C host keyboard installed in the control room, LED electronic map and the center management host electronic map accurately and clearly display the alarm zone, alarm time, alarm location and other information, while producing sound and light alarm So that managers can deal with the police in a timely manner. The WIN-3000C host can also transmit alarms via the network and the telephone (limited to the commercial host) to implement local and remote alarm functions.
(II) System objectives:
The purpose of setting up a perimeter prevention alarm system is to establish a safe and reliable community, strengthen the management of exits and exits, prevent entry of miscellaneous personnel outside the area, and prevent illegal persons from jumping over the fence. When an unexpected situation occurs in the defense area, an alarm is issued and the security department is notified. The high-performance alarm system we designed for the community is to strengthen the management of the perimeter and prevent illegal people from entering the community through the fence.
(III) System Composition:
High-performance intelligent alarm system is to use electronic fence controller and high voltage or low voltage power grid to control the perimeter of the community and connect it to the computer of the management center. If anybody invades forcibly, the electronic fence controller can perform live sound and light alarm and alarm at the same time. The signal is transmitted to the district management office, and the district management computer and the center's computer will issue an alarm to indicate the exact area, time, and zone number of the alarm so that the security personnel can handle it in time.
This program has designed a perimeter alarm system based on the actual conditions of the community. According to the different terrain features around the community, four bus electronic fence controllers are set up on the perimeter wall of the community, and four high-voltage or low-voltage power grids made of specially constructed bare aluminum alloy wires are connected in parallel to prevent unauthorized persons from crossing over. , Intrusion, alarm signal through the bus access control center computer, high voltage or low voltage power grid used to stop illegal personnel overturn, intrusion, if forced to overturn, you can cause a short circuit or disconnection of the power grid, this time the bus electronic fence controller will occur Alarms, and the alarm information is transmitted to the alarm center, the security personnel of the district rushed to the scene to deal with the police situation.
The principle of the system structure diagram is shown in Fig. 1. If someone is forcibly invading, the electronic fence alarm signal will be transmitted to the community management office at the same time. The community management office will issue an alarm to indicate the exact area, time, and other information of the alarm so that the security personnel can Can handle it in time.
The perimeter alarm system of the community consists of the front end, transmission, and the center. These three parts are respectively described below.
1. front end:
It is composed of four specially-made bare aluminum alloy wires arranged in parallel, and the fence controller output pulse high voltage or low voltage to form a power grid, which forms an electronic fence part.
2. Transmitting the various alarm information that the bus electronic fence controller located around the community will receive through the communication bus to the control center computer. The alarm system adopts the independently researched and developed bus communication technology to ensure the safety and reliability of the entire system in communication. To prevent malicious copying and detection. In this way, the perimeter alarm signals in the various defense areas of the community are effectively and quickly transmitted to the control center.
3. The center cell control center is composed of e-Winp (Wenpu) WIN-3000C bus alarm host and central computer. The front-end device, that is, the bus electronic fence controller, can be deployed and disarmed through the control panel of the WIN-3000C host computer or the central computer perimeter alarm system management software. If an illegal intrusion occurs during the deployment, the electronic fence may be short-circuited or disconnected. The bus electronic fence controller promptly sends out alarm information. The central computer electronic map can display the specific alarm location and defenee zone number. At the same time, the computer audio or sirens will start ringing and an audible and visual alarm will be issued to prompt the on-duty personnel to handle the alarm.
(D), system features:
(1) High-voltage or low-voltage electronic fences: They can block unauthorized persons from overflighting and intrusion, and they can also issue warning alerts.
(2) Signal acquisition and transmission stability: Advanced bus communication network transmission technology is used to directly transmit signals to the control center computer. Therefore, it has the advantages of long transmission distance, stable transmission signal, strong anti-interference ability, and large system expansion.
(3) Computer monitoring integration: Adopting digital processing technology, it can quickly respond to and record police conditions through electronic maps, database records, etc., and can be linked with other security systems.
(4) Fast response: The alarm time is extremely short. After the bus electronic fence controller detects the alarm signal, the alarm information can be uploaded to the control center within 0.5s.
(5) Online electronic map display alarm location: Through the alarm software of the factory system, various plane maps can be intuitively displayed. When an alarm occurs, the exact location and type of alarm can be visually displayed.
(6) System design and product selection criteria and specifications.
(7) The technology is advanced, mature, practical and reliable.
(8) System installation, operation, maintenance and low cost, long service life.
(V) Perimeter-wide system design plan This design is based on the requirements of the project unit and comprehensively draws on the advanced technologies of current domestic and international security products. It refers to national standards and perimeter system design requirements, and is based on the architectural layout and use of the community. Functional requirements, the development of the design program, according to the design of the program with advanced equipment performance, strong anti-interference, low false alarm rate, alarm function is complete, stable and reliable.
Perimeter system security design:
1. Equipment safety The security system uses electrical equipment and the host electrical safety and lightning protection safety indicators in line with the relevant national and industry standards, in order to ensure the safety of personnel and equipment can use advanced lightning protection equipment (optional), the overall defense The lightning facilities adopt three lightning protection methods: lightning protection of the front-end equipment, lightning protection of the building power supply, and lightning protection of the power supply and equipment of the equipment room.
2. Data security Establish a sound data backup and recovery mechanism. Ensure that data is not lost due to physical media damage. Data adopts effective encryption protection measures to ensure data security.
3, System Security Center Computer perimeter alarm management system software has a strict identity authentication mechanism to prevent illegal intrusion into the system. The central computer operating system and software system establish a perfect backup system to ensure that the system is quickly restored after being damaged. You can use appropriate anti-virus measures to install powerful anti-virus software and upgrade it in time.
Wire and engineering wiring:
(1) The signal in the perimeter alarm system is transmitted to the host through the cable. In addition to the requirement of a small signal loss rate, the cable should also pay attention to the influence of the environment on the signal, that is, the shielding performance should be high. At the same time, PVC pipe is used to protect the cable, and the corresponding PVC pipe should also be selected according to different protection levels.
(2) The system cabling of this project adopts standardized and structured cabling methods. To ensure the safety, economy and aesthetics of cabling, all cable cabling is connected to the vertical bridge of the weak electric well with a horizontal metal bridge, and the cable exiting from the weak electric well passes through. The bridge is up to the main control room.
(3) During the laying of cables, ensure that all cables are not exposed inside PVC pipes, metal pipes or bridges. Avoid harsh environment conditions or pipeline damage, avoid high-voltage lines, high-power transformers, etc. Electric arc machines and other electrical equipment with strong interference.
(4) The wiring process should be marked clearly and clearly, and it is easy to change lines, maintain and manage.
(5) According to the requirements put forward in this project and in accordance with the consistent construction principles and design principles, and strictly abide by the following standards and norms formulated by the following countries and industry related departments:
Commercial Building Cabling Standards International Cabling Standards Building and Building Integrated Cabling Systems Engineering Design Specifications Building and Building Integrated Cabling Systems Engineering Construction and Acceptance Standards Civilian Electrical Building Design Specifications Chinese Electric Appliance Installation Engineering Construction and Acceptance Specifications (6), Perimeter Prevention The more system equipment parameters: WIN-3000C host WIN-3000C bus system alarm host with keyboard, management center software version 3.1, the default controller can be connected to the 96-channel zone, up to 4 control 480 road defense zone; the keyboard can store 800 Alarm records, 500 status messages.
Features 1, 12V DC voltage, 7A/h battery provides about 6 hours of standby power.
2, 220V AC power supply 3,12V 1A relay alarm status output, can be connected to the siren, siren, police lights.
4, lack of battery display.
5, controller fault display, bus short-circuit display, detector (bus electronic fence controller) broken display,
6, Arming, defense, alarm, fault, operator operations and other information records.
7, the central computer perimeter alarm management software electronic map display.
8, the electrical device complies with the internationally accepted CENELEC standard EN61011.
10. The controller meets the outdoor installation IP55 standard.
11. Alarm output normally open normally closed dry contact signal can be converted into RS232/RS485 signal.
12, outside the large LED electronic display map.
13, keyboard fortification, disarm function.
14, perimeter alarm management features:
WIN-3000C bus system alarm host with keyboard, management center software WIN285; each controller can be set to 99 road defense zone, can control up to 495 road defense zone (5 controllers); storage of alarm records (800 alarm messages), Printing can be armed or disarmed by the computer.
The software performs node setting, defense, arming and disarming functions.
II: Bus Electronic Fence Controller Master-06
Features 1, 12V DC voltage, 7A/h battery provides about 6 hours of standby power.
2, can be remote wireless remote control switch 3,220V AC power supply 4,12V 1A relay alarm status output 5, low battery display 6, controller fault display 7, monitor fault display 8,12V DC start alarm siren, emergency lights or other local Emergency Signal 9, Energizer complies with the internationally accepted CENELEC standard EN61011
10, the controller meets the outdoor installation IP55 standard 11, the alarm output normally open normally closed dry contact signal, e-Winp (stabilized) bus module signal output.
This product has a public security department inspection report, will not cause harm to people, the product uses low energy (2.5 joules), low frequency (60 beats / min) pulse, with deterrence, blocking function. Pulse high voltage / low voltage output, pulse high voltage detection cable pulse voltage (700-5000V). The system uses high-voltage electric shock and low-voltage passive detection lines synchronously. The high-voltage electric shock cable provides active warning electric shock. The low-voltage passive cable provides alarm monitoring. The controller has the ability to independently monitor the passive detection cable and the active detection cable alarm analysis (optional feature, this solution is not included). In addition, the passive detection cable can be installed in a large-scale electronic security fence network. Passive detection cables provide a backup system for active detection of cables. The pulse attack time can be adjusted by 1 second, 2 seconds, and 3 seconds.
Middle Duty Caster Co., Ltd. , http://www.nbcasters.com