Explain the advantages and disadvantages of the installation of common equipment for prison signal jammers
Shortcoming
It is inconvenient to switch on and off uniformly:
When there are too many mobile phone signal jammers, especially after multiple buildings in the prison area are shielded, it is difficult to turn on and off in a centralized manner; even if the power cord is arranged uniformly, a special person is required to be responsible for turning on and off on time;
Unable to know the working status and failure of the jammer:
After all mobile phone signal jammers are activated, managers cannot immediately know whether the jammers at which points are working normally;
Not energy saving and environmental protection, not conducive to equipment maintenance:
It is not conducive to energy saving, environmental protection, equipment maintenance, and shortening the service life of equipment (such as factory areas, canteens, warehouses, etc., which are unmanned at night, and do not need to be installed in these locations. The mobile phone jammer runs continuously 24 hours a day);
Inconvenient for group control or point-to-point control:
It is impossible to control the timing switch in any precise arbitrary grouping or point-to-point;
The phenomenon of deliberately destroying the jammer cannot be prevented:
If the prisoner or prison guard's intentional damage, cut off the power supply, etc. affects the normal operation and use of the mobile phone jammer, the management personnel cannot immediately determine and know;
The process of manually closing the blocker cannot be tracked and checked:
More sophisticated vandalism by prisoners or guards cannot be tracked and investigated (for example, some guards cut off the power supply to the jammers at night without supervision, and then restore the normal power supply to the jammers the next morning).
Advantages of installing mobile phone shielding network intelligent management system
There is no need to arrange control lines, and the installation and construction are simpler:
The whole system takes the power carrier as the technical core, and does not need centralized wiring (the power line that supplies power to the shield does not need centralized wiring), and there is no need for wiring between the shields or between the shield and the main control computer. It needs to be powered nearby (the power cord that supplies power to the shield is used both as a power supply and as a remote control signal transmission).
Software unified centralized control and management, electronic map is simple and clear:
The whole system is controlled and managed by a set of master control software, and managers can see the shielding status in the monitoring area at a glance through the unit structure diagram (equivalent to the unit electronic map) on the master control software.
Free grouping, fully open, fully closed, grouped (by building, subarea) switch, point-to-point switch:
Managers can control the opening and closing of any shielding point accurately point-to-point or grouping (that is, sub-area or sub-building) through the main control software on the main control computer;
Master the operating status and fault of all points, real-time query and automatic query, automatic alarm:
Managers can manually or automatically inquire about the working status of each mobile phone jammer, and can instantly find out if the jammer is faulty or damaged. Inform the location of the jammer;
It can be switched on and off at regular intervals, programmed at will, energy saving and environmental protection:
Any point or group can be controlled on and off at a precise timing through software; after timing some positions that do not need to be turned on continuously for many years, it is beneficial to energy saving, environmental protection and prolonging the service life of the equipment;
The log function helps to track and troubleshoot:
The perfect system log function will record the working status of each jammer, the operation log of the administrator or operator, and at the same time, it has the function of tracking and troubleshooting for those more sophisticated destructive behaviors (for example, a prison guard cuts off the power supply of the jammer at night). , After the power is restored during the day, this process will be automatically queried and recorded in the log).
Scalable functions in the future: multi-level networking, data aggregation, mastering the overall situation:
This item is an extensible development function in the future and has not yet been put into use: since each prison system has an independent database, if there are multiple prisons in the province, the upper-level prison management department can call each prison in the future. The database of the institutes is used to monitor the operation status of the shielding system of each prison.