Solutions for High-End Community and Villa

Publish time:2018/9/13 13:45:01        Publisher:Admin

1System Overview

The protection of villa perimeter cannot be separated from effective humanized management. By virtue of effective large-scale perimeter protection and the interconnection advantage of multi-level network, single villa can be effectively integrated into large perimeter platform to achieve unified and scientific management, and fiber optic perimeter alarm and video linkage are combined together perfectly through digital networking seamless connection of platform video linkage. When intrusion alarm is triggered, video window can pop up accurately and visually for security guards to dispose of the alarm with ease. Personalized digital integration and intelligent video linkage make villa perimeter protection more perfect and reasonable.

2System Structure

Schematic Diagram of Independent Protection of Single Villa Perimeter

Independent alarm system is established for single villa and it constitutes master control room through INTERNET for cooperating with property security guards to protect villa area for 24 hours. Meanwhile, the front end can be linked with network camera directly or set with linkage device for linking video surveillance system in order for security guards to check alarm information in time and dispose of intrusions quickly so as to ensure the safety of owners and property. The system can be managed by users themselves or assigned to property management for customized trusteeship service during they go out.

 

Networking Level-To-Level Management of Overall Villa Perimeter and Single Villa

 

Perimeter is divided into two areas: villa perimeter and single villa. Centralized and unified management of the two areas is achieved through network. Network-type fiber optical signal collector is placed at the front end of the perimeter for judging intrusion area intelligently and outputting alarm signal to link the alarm lamps of corresponding area to send out high-decibel buzz to deter intrusion personnel and prompt security guards to enter alert state.

3System Configuration

Management Terminal: JAN perimeter alarm system software, third-party alarm receiving platform, third-party standard-switch alarm host.

Detection Terminal: fiber optic collector of JAN-VOC-S8 fiber optic vibration sensor perimeter alarm system collector, dividing device of defense area and vibration cable of JAN-VOC-2500.

4System Features

◇The host adopts network communication achitecture which can be extended indefinitely to really achieves overall protection of large scope and long perimeter.

◇Potential-free defense area: the system adopts optical fiber as potential-free detector. In addition to power supply required by the host, the entire outdoor defense area is potential-free and lightning interference can be avoided effectively. The sytem is especially suitable for inflammable and explosive areas and places with strong electromagnetic interference, such as airport, power station, ammunition arsenal, airport, high-speed railway and so on.

◇Energy-saving and environmental protection: the system achieves copper-free information with power consumption per 100km only 60W -80W.

◇Service life: because outdoor service life of GB optical cables is 20 years, the whole system has long service life, stable performance and low after-sale maintenance cost.

◇Compatibility and matching: as front-end device of IoT, the product is configured with multiple data connection ports which are compatible with other integrated platforms to achieve data connection so as to achieve system linkage. For example, other alarm host, digital matrix, DVR, site sound-light alarm, etc. (alarm host will not affect the reaction speed of the whole system because of linkage).

◇The software has multi-level login authority, electronic map function, video linkage function (every defesen area can be linked with four groups of video images), video matrix function, alarm area display function, alarm recieving and processing function, camera with human voice function, embedded electronic map function and so on.

◇The platform integrates various types of intrusion detectors to enhance comprehensive protection measures, which reflects the high integration under the climate of IoT, the intellectualization of perimeter intrusion detection system, and the centralized control and visuaization of platform.

◇Successful cases are all over China, widely used by water conservancy, military, airports, prisons, cultural relics and sites, petrochemical, electricity and other places.

5Successful Cases