China's alarm host difficult network process

From the market share, the alarm host may not be the mainstream product (according to statistics, the current burglar alarm products account for about 15% of the security market), but as the oldest and most widely used security products in foreign countries, its basic functions are realized. The application of specific projects has matured, and the architecture of the anti-theft alarm system itself is also perfect.

With mature technologies and application experience, as the awareness of the Chinese people rises, the market demand for alarm hosts continues to grow, coupled with the promotion of the alarm operating company, it can be predicted that the future burglar alarm system will usher in the “second spring”. ". Based on this, Hangzhou Hikvision Digital Technology Co., Ltd.'s Alarm Division Marketing Director Zeng Jirong said: "With the continuous improvement of user needs, the concept of the alarm host has begun to change from a single alarm dialer to The intelligent control platform has more value-added service functions.

In addition to integration with smart homes, the alarm host has added features such as text messaging and voice to improve system reliability. At the same time, the linkage between anti-theft alarm systems and other systems, as well as IP networking, are the direction of upgrading. ”

The market is born out of demand, but new-born demand will bring about new development opportunities, but it must also imply more or less challenges. Then in today's networked and intelligent background, what kind of veteran products in the security industry, such as the control panel, have upgraded the “sunshine road” and then hidden “blocking road tigers”?

Network alarm host

At present, the most widely used networking method is the telephone line. In addition, the alarm host also does as the Romans do. According to China's special large community environment, the bus-based networking method has been developed, and because of the fast response speed, low operating costs, and the user's lack of monthly fees, etc. Outstanding advantages, have a place in the anti-theft alarm market in China. On the other hand, with the rapid networking of the entire industry, the alarm host has also been driven by new demands for development, driven by market demand - IP networking.

Compared with the telephone line and bus system, the advantage of network transmission is obvious: it is based on the network, fast, less delay; saves the telephone costs, the cost is greatly reduced; can be synchronized monitoring, and maintain contact with mobile terminal equipment in real time; High stability and reliability. Because of this series of obvious advantages, the concept of IP networking has been hot for a few years ago, and now a new generation of alarm hosts on the market will mostly be equipped with network interface modules. Wired and wireless networking will be implemented by embedded modules. However, the specific promotion and application of the market is still in its infancy.

It can be said that the network gives the alarm host a chance to “flop”, but whether or not the market can meet the demand stably and produce and promote mature products in large areas is not only dependent on the efforts of the manufacturers, but also to a certain extent Along with market acceptance and the introduction of corresponding standards, it also puts high demands on network operators.

"Difficult" Networking 1. More Mature Network Platform
The particularity of the network platform makes it possible for the signals transmitted through it to be invaded by viruses, and it is also susceptible to various external factors and even interception of content. Therefore, the security and stability of the network platform are not as good as the telephone line networking at this stage. Although the individual alarm signal transmission has little pressure on the network bandwidth, with the deep integration of video surveillance, the pressure in this area will increase dramatically. In order to maintain the security and stability of the system, the alarm must be configured with a static IP. Yu Junfei, general manager of the Building Automation Division of Shenzhen Shengboer Industrial Development Co., Ltd., said: “Application for a static IP needs at least 6 to 8,000 yuan per month. The cost expenditure in this area will certainly affect the networkization process of the alarm operation company at the current stage, while the current number of static IP configurations in China is limited, and it is likely that the shortage of supply will occur when the network alarm host is widely promoted. The part of the network is bound to be controlled by the operator, and these objective factors require the network operating company to upgrade.

2, market acceptance

Alarm operation is a very professional field. It needs to combine different backgrounds and consider the stability and professionalism of the system from various aspects. Although the telephone system has its inherent shortcomings, but after years of development, its various aspects of standards and technologies are already very mature. Ray Shaojie, manager of Shanghai Branch of Beijing Mascon Electronics Co., Ltd., admitted frankly: “Although the network alarm consoles are now rampant, many users are still using products of more than ten years ago, and even some users have problems because of their habits. Use old products deliberately and reject new products that are more powerful and more human.”

Even if the unit is intentionally used to upgrade the network, on the one hand, the network platform is still not a mainstream product, and the specific use effect is not known. On the other hand, the cost of replacement products and personnel retraining expenses are the prerequisites that must be considered.

3, mature integrated network alarm host
With the growing demand for the alarm consoles in the market, manufacturers in addition to the core components, will also reserve some interfaces, that is, most of the additional functions are achieved by adding different modules, such as network modules, GPRS module , voice modules, home appliance control modules, etc. It is undeniable that this method has its merits, but for the network alarm host, its network function is the basis for supporting all functions, and it needs to be highly stable and mature. According to this report, Liu Aiguo, an engineer of Nanjing Antech Technology Industrial Co., Ltd., said: "More than 80% of our professional fields are using foreign alarm consoles. They have not yet developed a mature integrated network alarm host. Although it is now possible to achieve a good IP networking function through modularization, but as prosthetic limbs are not as good as innate limbs, there must be various differences in actual use.

4, mobile client platform

Compared to other "stumbling blocks", in today's networked background of 3G applications, the development of platforms for various types of mobile client products (such as iphone, etc.) is not a big problem in technology, but Zhao Jinxi, product manager of Shenzhen Haoen Technology Co., Ltd. Stressed that: "The big prospect of networking is to be able to check the status of the surveillance at any time and anywhere via the mobile platform or network platform. However, there is currently no end-to-end application platform for enterprise users that has not been promoted on the market. Most of them are developing mobile customers. The enterprises that pay more attention to and serve are the 'non-specific groups' rather than the enterprise users. Of course, it is not how difficult it is to develop platforms, but more difficult to promote them, because it is possible to develop a host 3 Months can be finished in six months, but the platform will not work.To build a platform for enterprise services, the cost and entry point from product to platform architecture and operation mode are totally different from those of products.Currently, Although there have been large companies that are aggressively promoting their platforms, and some have been promoting for several years, The effect did not meet expectations."

5, a unified industry standard

At present, there is no uniform standard restriction on the network of alarm hosts, resulting in the inability of mainstream products on the market. Due to the lack of standards, the current module-type network alarm host, although it can achieve more basic functions of the network, it is difficult to mature and stable. According to Zhang Yuxi, technical manager of Israel Reese, the company said: “Because different manufacturers have different module communication protocols, it is difficult for different brand products to be built in the same system, and the market products are different. Relatively, the telephone line The communications protocol has been unified."

Various objective factors limit the promotion and application of network alarm hosts at this stage. However, IP networking is a major trend. With the popularization of mobile communication devices, the installation rate of home telephones in China has dropped significantly. At the same time, large cities and towns Population and tenants gathered in the area, the future of burglar alarm universal will depend on the network. Therefore, to a certain extent, the network of alarm hosts is imminent.

Multi-system integration

With the popularization of the security concept, the three most important sub-systems of alarm, video, and access control now begin to integrate organically on the front-end control devices and form diversified products. Specific to the alarm host, more appeal lies with the integration of video surveillance. At the same time, with the alarm into the home, the integration of the alarm host and smart home devices is also a general trend.

In recent years, the hot video surveillance field has begun to develop intelligent functions such as image analysis and early warning, and achieved certain achievements. However, from a professional perspective, the role of the alarm host in pre-defense can be described as “irreplaceable”. On the one hand, because it has a wide range of targeted detection and sensing products that can be selected according to various needs and installation environments, on the other hand, under the accumulation of many years of practical application experience, the analysis functions of the alarm host have become increasingly perfect. Because of this irreplaceable professionalism, even though the market is increasingly pursuing integration with video surveillance systems, people in the industry still assert that the next two systems will not replace or merge into one. And to a certain extent, the degree of integration between the alarm host and video diagnostics depends on the process of networking.

The concept of video is introduced by the alarm host. The direct appeal is to reduce the false alarm rate and improve the utilization of monitoring resources. There are already finished products launched in the market, mainly used in high-end venues, but they have not yet been applied particularly well. The first reason is that the foundation of IP networking is not yet solid, and the second is that there is no uniform standard for such technologies or products, resulting in different manufacturers in different directions according to their own advantages. According to this, Zhejiang Dahua Zhiwang Technology Co., Ltd. Li Weiqiang, R&D director of the company, sums up these products in the current market into the following three categories:

· Product integration: Built-in cameras in front-end detectors seamlessly link monitoring and alarms to realize video review and alarm functions. Its advantages are low comprehensive cost, simple deployment, convenient installation, and no need of platform support. The disadvantage is that some functions of the alarm in the integrated host are often weakened, and it is suitable for the low-end market where the level of security is not high, and it may be widely promoted in the future. Popular in shops or homes and other places;

· System linkage: Alarms and monitoring are still two independent systems. The monitoring subsystem and alarm subsystem are integrated and the monitoring system is triggered by the alarm signal. The principle is to verify the authenticity of the alarm condition in real-time through the image of the existing monitoring system, and it needs to transmit to the central management system through the network for integration. The advantage of this method is that the two subsystems have no coupling, independent and stable operation, the strategy of alarm and video linkage can be very flexible, and this method is common in large-scale system applications; the disadvantage is that there must be platform support, and to achieve two The integrated development of the subsystems has a certain amount of development work. It is suitable for high-end places such as banks that require a high degree of monitoring safety.

·Back-end implementation: Alarm host and video server or two hosts, integrating DVR, DVS and alarm host at the front end, that is, associating alarms and videos. Its technical points are that the video and alarm control devices use a common CPU, Memory and program control, and the use of common communications lines and remote central control platform for communication, and ultimately through the back-end monitoring platform for the two systems unified management, alarm and video verification verification. The advantage of this method is that the two mainframes can operate stably independently, and the deployment is simple, the installation is convenient, the support of the platform is not needed, and the features and functions of the alarm host can continue. The disadvantage is that the overall cost is higher than the system linkage.

As a market demand and an industry-accepted development direction, video verification needs a long period of exploration and development before becoming a truly mainstream product. The first is the premise of networkization mentioned in the previous article, and the second is that there is no relevant unified standard in the industry. In addition, Sheng Bolu Yu Xiaofei also emphasized: "The alarm system itself is the bottom layer of security, regardless of where to develop too much are deviated from the original intention. Integration with multiple systems is a major trend, but still look at different customers Requirements, in order to define the main system, arrange the rules between different systems, in order to set the final integration method."

Alarm operation

The alarm monitoring system does not require special manpower to manage, and generally acts on unmanned or sparsely populated time and place. After many years of application and promotion, foreign countries have established a mature operational management mechanism that can be used for reference, mainly by professional alarm operators for installation and follow-up services. Domestically, the Bureau originally managed this piece of management in a unified manner. After opening up, with the advent of business opportunities, the market rapidly expanded. According to preliminary statistics, security companies account for 40% of the alarm monitoring market at this stage. Among them, due to the pilot effect of the National Office and the support of the national policy, Henan Province has emerged a number of strong private enterprises and has initially acquired a corresponding market atmosphere. In addition, Shanghai's application status is relatively good.

Although the anti-theft alarm system is not complicated, there are extremely high requirements for the choice of sensor type and installation location. At the same time, most alarm hosts also need higher professional knowledge for certain programming settings. Although the initial investment is lower than the video monitoring system, Late maintenance must be meticulous and long-lasting. Under this premise, if only superficial considerations are made from cost considerations, not only will the system not function as a normal warning, but it will also cause the operating company to not function properly.

The demands of the market, while testing the corresponding industries to reflect and upgrade the speed, also brought great opportunities. An alarm management company that completely relies on the alarm monitoring system will surely promote the application of the alarm host. Dahua Li Weiqiang said accordingly: “Establishing an anti-theft alarm network emergency alarm center between the company and the user, and networking with the * department to provide emergency response. The use of a rental system to establish a system to reduce user investment and win the market. Through pagers and telephones, etc. Establish a personal alarm system to understand the security situation of the fortification office anytime and anywhere. Develop alarm operation services and intermediary services such as consulting, evaluation, and certification to extend the industry's 'short legs'.”

The long journey of the alarm host

Entering a field, product features and standards must be rigorous. At present, there are many problems that need to be solved for video alarm host and network alarm host. For example, video transmission does not take up bandwidth due to its high bandwidth, and how to ensure that the network in the deployed area is secure against external attacks.

At the same time, under the vigorous promotion of various preferential policies of the country, China's anti-theft alarm industry has developed rapidly. The sales volume and total sales volume of anti-theft alarms have risen by 30 to 60%. Part of the military sensors gradually transferred to the civilian market, but also brought powerful factors for the application of the alarm host. Of course, the problems of arming and disarming, installation and use have always been difficult for users who do not have professional knowledge. In order to better adapt to the low-end market, the host needs to further realize the fool of the needs of the Chinese people. Touching. Network and intelligence are the major aspects of the development of the alarm host. How to solve the problem of the function and technical aspects of the alarm host is the direction of future development of the alarm host.

Metal Sieve


The metal sieve be made from woven wire mesh or Perforated Metal mesh, the surface treatment of metal sieve: polishing, spraying, galvanized, the color can be made as per customer's need .

Using of metal Sieve: screen glass grains, grains, raw coal, medicines and so on. It can also be used for precision filtration of metallurgy, wine industry, medicine, chemical industry, agriculture, food, grain, cement, coal, geology, scientific research and other industries.


The advantages of metal sieve:


  • Good filtering .
  • Corrosion resistance.
  • Easy to clean.
  • Acid and alkali resistance,
  • High temperature resistance
  • Uniform aperture size
  • Small orders accepted
  • Long using life.
  • Easy to use and treansport.
  • Wide application


Metal Sieve

Metal Sieve,Perforated Metal Sieve,Metal Garden Sieve,Stainless Steel Sieve,Mine Screen Mesh,Filter Mesh Sieve

ANPING COUNTY SHANGCHEN WIREMESH PRODUCTS CO.,LTD , http://www.scwiremesh.com