See how the network of electronic fence perimeter security

Fencing is a barrier established to protect a certain range of objects from being infringed, and to some extent it has a protective effect, but it cannot be completely prevented. Traditional fences are used to increase or add dangerous touch objects to increase safety, but they can affect the appearance, cannot be actively repelled, and bring inconvenience to the characters in the fence. The electronic fence is an active intrusion prevention fence that counters the intrusion attempt, repels the intruder, delays the invasion time, and does not threaten human lives. It sends the intrusion signal to the security department monitoring equipment to ensure management. The personnel can understand the situation of the alarm area in time and quickly handle it.
Among them, the network electronic fence is just like a fence. It is a video-linked alarm program. The network electronic fence is a new-generation electronic fence system that combines traditional electronic fence technology and network technology. It is mainly composed of an electronic fence host, intelligent control keyboard and The management software is composed of the user can supervise the electronic fence through the network, realizing the real-time transmission of user information, data interaction and remote supervision functions.
First, the working steps of the network electronic fence
When the network electronic fence zone illegally climbs over the wall or destroys, the warning light will immediately send out warning lights and sounds to drive away; the pulse electronic fence host takes the initiative to complete the transmission immediately after receiving the signal from the front end; the camera in the corresponding area is quickly adjusted to the preset position. , Linkage LED lights illuminate the invaded areas, ensuring that even in dark nights, clear alertness screens can be transmitted to their post and management center; the security management platform software in the management center pops up an alert window and is sent via SMS module. The alarm message is sent to the designated person's mobile phone; the on-duty personnel respond immediately after receiving the alarm and arrange for the personnel to go to the site for processing.
Linkage video surveillance restore field security management platform software with alarm records query, site image review and other functions, to provide scientific basis for future intrusion events. In addition, the software can also realize cross-regional remote control and hierarchical management, so that multiple controlled sites and upper management departments form a system that is closely linked to facilitate unified command and unified management.
Second, the working principle of the network electronic fence
The model structure of the network electronic fence can be divided into five layers: the physical layer, the sensing layer, the control layer, the network layer, and the application layer.
The physical layer is the hardware of the security equipment installed at the site, such as the electronic fence front-end system, video surveillance camera, alarm lights, LED lights, patrol collection points, etc. The main role is to carry the detection signal, blocking, deterrence intrusion By.
Various types of device sensors and transmission cables form a sensing layer and have functions of analyzing and detecting signals, identifying alarm information, and transmitting signals.
The control layer adopts the data bus technology, including the control keyboard, alarm host, hard disk recorder, etc., and functions as a local integration and management control of front-end sensor layer equipment, and realizes the management and control of arming and disarming, work mode adjustment, alarm signal analysis and processing, and signal uploading. Features.
The network layer is the basis for providing network communication support for the system equipment and realizes the information transmission of the front-end alarm equipment. Various network structures such as LAN, WAN, and Internet can be used according to different requirements of users.
The application layer is combined with the user's specific application scenarios to perform proper integration, linkage, analysis, and storage.
When someone illegally climbs over the wall or destroys it, the warning light will immediately give warning light and sound to drive it away. The pulse electronic fence host takes the initiative to complete the transmission immediately after receiving the signal from the front end. The camera in the corresponding area is quickly adjusted to the preset position, and the linked LED lights illuminate the invaded area, ensuring that even in the dark night, the clear alertness screen can be transmitted to the post and management center.
The security management platform software in the management center pops up an alert prompt window, and sends an alarm message to the designated person's mobile phone through the short message module. The on-duty personnel respond immediately after receiving the alarm and arrange for the personnel to go to the scene to handle. The security management platform software has the functions of alarm record query, on-site image review and so on, which provides scientific basis for handling intrusion events later. In addition, the software can also realize cross-regional remote control and hierarchical management, so that multiple controlled sites and upper management departments form a system that is closely linked to facilitate unified command and unified management.
Third, electronic fence installation precautions
1. In order to reduce the risk of electric shock, service personnel are required not to get warning signs when working in the electronic fence, and to prevent other people from moving the warning signs.
2. Do not use damaged wires, especially those with spikes, to prevent harm to humans and animals.
3. When recharging the maintenance-free lead-acid battery or other dry batteries, please remove the battery and recharge it. Do not recharge the battery directly on the electronic fence. This will damage the battery and the electronic fence host.
4, can not be the two electronic fence host to the same fence power supply, this will be due to the electronic fence host issued by the high-voltage pulse inconsistent and lead to host damage, but also easily lead to human and animal casualties.
5, It is forbidden to modify the internal circuit of the electronic fencing mainframe by oneself, or to replace the electronic components. This can easily lead to machine failure or injury to human life.
6. It is forbidden to contact or approach the electronic fence during thunderstorms to prevent the occurrence of a lightning strike. For all electronic fences, whether or not they are protected against lightning, this item must be prohibited.
7. Inform all the personnel who manage the fence how to cut off the output of the electronic fence host to prevent the occurrence of emergencies. In addition, how to cut off the operation guide of the electronic fence host should be placed on the conspicuous place of the electronic fence host.
8. It is strictly forbidden to use the adapter from the mains to the adapter of 12V DC to supply power to the host. It is easy to cause the output voltage of the host to be too high due to the failure of the adapter itself and insulation failure occurs.
9, after installation, please confirm whether the host is working properly, the host boot light indicates that it has been working, please rest assured that use. Do not touch the fence after starting up.
10. It is forbidden for infants and young children. Pregnant women touch electronic fences. No matter whether they have conditions or not, they must prevent such personnel from approaching the electronic fence. Otherwise, such equipment cannot be installed.
11. It is necessary to prevent visible warning signs from being placed next to the electronic fence host and to place warning signs at the fence.
12, grounding must be reliable, compact, grounding system must be far away from the living area.
13. It is forbidden to remove the electronic fence host privately. It is strictly forbidden to replace the components without authorization and contact the supplier in case of any problem.

Kobelco Excavator Aftermarket Spare Parts including Toolboxes,  Cabs, Doors and Panels,  Engine Hoods, Sheet Metal, Engine Compartment Door Left/Right Hand with Latch and Hinge, Engine Cover, bonnet,  External Guards-Covers-Tinware  with all different models and series like MINI EXCAVATORS  3500 - 11300 lbs:SK17SR-5E  SK25SR-6E  SK30SR-6E  SK35SR-6E  SK45SRX-6E  SK55SRX-6E   SR SERIES  17,100 - 59,300 lbs:  SK75SR-3E  SK85CS-3E  SK140SRLC-5  ED160BLADE RUNNER  ED 160-5 Blade Runner  ED160-3 Blade Runner  SK230SRLC-5  SK270SRLC-5 CONVENTIONAL  48,000 - 184,000 lbs:  SK170LC-10  SK300LC-10  SK210LC-9  SK210LC-10  SK260LC-10  SK260LC-10 Long Reach  SK350LC-10  SK350LC-9E  SK350LC-10  SK500LC-10  SK850LC-9 DEMOLITION  65,000 - 220,000 lbs :SK210D  SK350D-10  SK1000DLC-9. If you have time visit China, you are very welcome to coming to our factory. You will find our products are with high quality and also cheap price. MOQ is 1 piece. 

Kobelco Excavator Aftermarket Spare Parts

Kobelco Excavator Aftermarket Spare Parts,Kobelco Excavator Mechanical Digger Tool Boxes,Kobelco Excavator Doors And Panels,Kobelco Excavator Engine Hoods

Jiaxing Ganland Auto Parts Co., Ltd. , https://www.ganlandparts.com