1. Without setting control lines, installation and construction are simpler:
The whole system takes the power carrier as the technical core. There is no middle wiring (the power cord that supplies power to the shielding layer does not need to be installed middle wiring), and there is no need for wiring between the shielding layers or between the shielding layer and the host computer. Each shielding point You only need to get electricity nearby (the power cord that supplies power to the shielding layer serves as both the power source and the transmission of remote control signals).
2. The unified centralized control and management of software pairs and electronic maps is simple and clear;
The entire system is controlled and managed by a set of main control software, and managers can understand the shielding status of the monitoring area at a glance through the unit structure diagram (equivalent to the unit electronic map) on the main control software.
3. Free grouping, can be completely opened, and can be completely closed, grouping (sub-building, sub-area) switch can be used, point-to-point switch can be used:
Managers can precisely control the switch of any shielding point, point-to-point or grouping (that is, partition or sub-building) through the main control software on the main control computer.
4. Grasp the operating status and fault status of each point, and realize real-time query, automatic query, and automatic alarm:
Managers can manually or automatically check the working status of each cell phone jammer, and can immediately find faulty or damaged shields. In the automatic query state, the faulty shielding point can immediately sound and light alarm, and clearly inform the position of the protective cover.
5. The time switch can be programmed at will to save energy and protect the environment:
Any bit or group can be controlled by software, with precise timing. The timing of starting some positions that do not need to be continuously started for many years is conducive to energy saving, environmental protection, and prolonging the service life of the equipment.
6. The log function is helpful for tracking and troubleshooting:
The complete system log function will record the working status of each jammer and the operation log of the administrator or operator. At the same time, it has tracking and troubleshooting functions for those more sophisticated sabotages (for example, a prison guard cuts off the power of the jammer at night , After the power supply is restored during the day, this process will be automatically queried and recorded in the log).
7. Expandable functions in the future: multi-level networking, data aggregation, mastering the overall situation:
This item is an expandable development function in the future and has not yet been put into application: Since this system of each prison has an independent database, if there are multiple prisons in the province, the upper prison management department can call each prison in the future. The database of the institute can be used to supervise the operation status of the shielding system of each prison.