Lian'an computer equipment wireless anti-theft alarm system
Installation instructions
one. System composition
Luenan computer equipment wireless anti-theft alarm system consists of wireless alarm, alarm host, monitoring computer, as shown in Figure 1:
Figure 1. The composition of the security computer wireless anti-theft alarm system
1. Wireless alarm (card) - installed in the computer chassis or host cabinet, can prevent the computer host, liquid crystal display and other peripherals stolen, the alarm host to the wireless alarm signal.
2. Alarm host - receives the alarm signal from the wireless alarm (card) and transmits the alarm information to the monitoring computer. It can also independently receive and prompt wireless alarm information from the monitoring computer.
3. Monitoring computer - running anti-theft alarm monitoring software, when receiving the alarm signal sent by the alarm host, shows the specific location of the alarm computer, and issued an alarm sound. At the same time with alarm target maintenance management, number management, log query and many other features.
two. Wireless alarm (card)
1. Wireless alarm card composition
Figure 2. Wireless alarm card composition
The composition of the wireless alarm card is shown in Figure 2:
(1) The card iron piece can make the wireless alarm card conveniently fixed on the card fixing slot above the PCI slot;
(2) The battery box is used to install the working battery of the wireless alarm card;
(3) The wireless transmitting antenna adopts a high-quality copper rod antenna, which can be easily pulled out to extend the transmission distance;
(4) The chassis detection switch (interface) is connected to the electronic dome switch. The switch is installed on the side of the chassis power supply to detect the opening signal of the chassis side panel and prevent the chassis power supply from disassembling the intrusion signal.
(5) Peripheral interface is connected to the anti-theft detector of the peripheral equipment. Peripheral anti-theft detector is used for anti-theft of the peripheral equipment such as liquid crystal display. It has anti-disassembly alarm, disconnection alarm, short-circuit alarm and anti-damage alarm function;
(6) The wireless alarm card comes standard with 1 peripheral anti-theft detector, and can also extend 1 anti-theft detector with peripherals. It can be used for the anti-theft of other peripherals, and it can also be used for the anti-theft of other valuables nearby.
2. Wireless alarm card installation
Figure 3. Wireless alarm card installation inside the chassis
(1) The wireless alarm card is installed inside the chassis and it is fixed on the top of the PCI slot just like the graphics card. Only one screw can be fixed. Pull the antenna out during use (it is recommended to pull the 4th antenna out). Extend the wireless transmission distance. If it is limited to the size of the chassis, the antenna can be slightly shortened by about 3 centimeters, and satisfactory wireless transmission effects can also be achieved.
(2) The electronic shrapnel switch from the chassis detection switch interface can be mounted on the side of the chassis power supply. The shrapnel can be tilted appropriately to make the shrapnel pressed when the chassis baffle is closed. The shrapnel springs open when the chassis is closed, causing the switch to open. The signal triggers the wireless alarm card to transmit the alarm signal; (this installation method) can also detect the intrusion signal after the chassis power is disassembled;
(3) Installation of Peripheral Anti-Theft Detector The Peripheral Anti-Theft Probing Line is derived from the Peripheral Security Interface of the Wireless Alarm Card, and is described in the next section.
3. Peripheral anti-theft detector installation
Figure 4. Peripheral Intrusion Detector Installation Legend
(1) Peripheral anti-theft detectors are attached to the back of peripherals such as LCD monitors;
(2) The installation requirement is to make the peripheral anti-theft detector press the elastic piece close to the back of the LCD;
(3) It can be glued with strong high temperature double-sided adhesive, it can also be fixed with hot glue, and it can also be fixed with screws; when double-sided adhesive or hot melt is used, it shall not affect the ejection of the shrapnel;
(4) After the fixing is completed, the peripheral anti-theft detection line must be connected (inserted) to the peripheral detection interface of the wireless alarm card.
(5) The installation methods of the anti-theft detectors used to prevent theft of other peripherals or valuables are much the same, and are not described here.
three. Alarm host
(1) The wireless receiving antenna of the alarm host is used to receive the wireless alarm signal of the wireless alarm (card);
(2) The alarm host is equipped with a digital display for displaying the alarm target code;
(3) The USB interface data cable connects the alarm host and the monitoring computer to realize the data interaction between the alarm host and the monitoring computer;
(4) The host power supply connection provides a suitable working power supply for the wireless alarm host. The LA168 main unit operates with a 5V/500mA DC power supply.
(5) Install and use USB data cable at both ends of the first into the alarm host and monitor computer's USB interface, DC power supply power plug plug into the 220V socket, 5V connector into the host power input interface can be;
(6) Fixing of the alarm host - The alarm host can be directly pasted onto a smooth wall with high-quality double-sided adhesive, and it can be pressed tightly when pasting. The back of the LA168 type alarm host is set aside with 2 screw lock holes, which can be directly on the wall. Install two screws in advance, and then directly button up the LA168 alarm host.
(7) Note: The position of the fixed alarm host should be as far as possible to avoid obstacles, and the surrounding vision is particularly good. It is better not to hide too tightly so as not to affect the receiving effect. In use, the receiving antenna must be pulled to the longest. Get the best reception.
(8) After the Control Panel (through the USB cable) is connected to the monitoring computer and the normal power supply is connected, the relevant driver and monitoring software can be installed on the monitoring computer. The installation of monitoring software is described in the next section.
four. Monitoring computer and monitoring software
4.1 Installation of monitoring software under Windows XP (Note: similar installation methods under Windows 2000, 2003)
The first step: install the USB serial driver
(1) Connect the alarm host to the free usable USB slot of the monitoring computer through the USB conversion cable that is equipped with the device;
(2) At this point, the computer automatically prompts "Welcome to the Found New Hardware Wizard" and select "Install from list or specified location (Advanced)
(3) Find the "\\\\USB Serial Port Driver\\\\win" directory under the CD-ROM, click "OK", and follow the prompts to perform "Next" until completed
(4) The system prompts again "Welcome to find a new hardware wizard", select the automatic installation, and follow the prompts to perform "Next" until completed
(5) Under the "Port (COM and LPT)" in the "Device Manager", you can see one more "CP2101 USB TO UART Bridge Controller (COMx)". (If this flag does not appear, it indicates that the USB serial port is not installed successfully. , must be re-installed), the COMX is the monitoring computer and the alarm host communication interface, the monitoring software needs to set the COM port is the COM port, can be set automatically or manually.
At this point, the USB serial driver is installed.
(The sound of '嘀-嘀-嘀' issued by the control panel during the installation process belongs to the alarm host and monitors the sound of the computer software not running. It can be ignored.)
Step Two: Install Monitoring Software
(1) Find the setup.exe executable file in the root directory of the CD
(2) Installed to D:\\\\cnlion according to the default directory, of course, the user can also choose to install the directory
(3) Perform "Next" all the way until the installation is completed
Under normal circumstances, this software can be applied to mainstream operating systems such as windows98, windws2000, windows XP, and windows2003.
Note: If the setup.exe file cannot be successfully installed due to installation restrictions on the computer software of the Internet Cafe Service Desk under Windows 2003, you can do the following:
(1) directly to the CD directory: \ \ \ cnlion copy the entire directory to the D drive.
(2) Drag and drop the shortcut to the AntiStealApp.exe executable file in the D:\\\\cnlion\\\\AntiSteal\\\\ directory to the Start directory and let the system automatically run the monitoring software after it starts.
The third step: configure the USB communication serial port
If the connection between the USB port of the alarm host and the monitoring computer is normal, the monitoring software can generally automatically search the USB port and configure it automatically. This step can be skipped.
If the monitoring software prompts: the communication machine is faulty or the COM port settings are incorrect, press the "Settings" button to reset. Then perform the following steps:
(1) Click the "Settings" menu on the monitoring interface to enter the settings interface
(2) Select "Manual settings" and check the first step (5) COMx seen in Device Manager, such as COM5
(3) Select “OK†and wait a few seconds to configure it normally. If unsuccessful, please check whether the USB connection between the control panel and the computer is reliable.
Step 4: Arrange computer monitors for Internet cafes
According to the on-site computer distribution map, the corresponding computer distribution maps are arranged on the monitoring interface to reserve aisles and vacancies. If individual computers are not equipped with wireless alarms, they should also be arranged on the monitoring screen.
For specific layout methods and procedures, see "Tutorial" on the monitoring software.
Step 5: Configure the wireless alarm to the relevant computer icon on the monitoring interface
For details, see "Tutorial" on the monitoring software. For alarm handling and daily management, see also "Tutorial" on the monitoring software.
Internet cafes, hotel computers to anti-theft, with the security wireless alarm is the most reliable!
Patented product, easy installation, accurate alarm, safe and secure!
Split Case Pump,Horizontal Split Case Pump,Vertical Split Case Pump,Double Suction Split Case Pump
Zhengzhou Shenlong Pump Industry CO.,Ltd , http://www.waterpump-manufacturer.com