1. It is inconvenient to open and close uniformly:
2. When there are too many cell phone jammer, especially after multiple buildings in the prison area are shielded, it is difficult to turn on and off in a centralized and unified manner; even if the power cord is arranged uniformly, a special person is required to be responsible for turning on and off on time;
3. Unable to know the working status and failure of the jammer:
4. After all mobile phone signal jammers are activated, the management personnel cannot know immediately which points of the jammers are working properly;
5. Not energy saving and environmental protection, not conducive to equipment maintenance:
6. In general, keep all shields in an open state for many years, which is not conducive to energy saving, environmental protection, equipment maintenance, and shortening the service life of equipment (such as factory areas, canteens, warehouses, etc., are unmanned at night, and there is no need to Mobile phone jammers in these locations are continuously turned on and run 24 hours a day);
7. Inconvenient group control or point-to-point control;
8. It is impossible to accurately control any grouping or point-to-point timing switch;
9. The phenomenon of deliberate destruction of the shield cannot be prevented;
10. The management personnel cannot immediately determine and learn about the intentional damage or power cut of the prisoner or prison guard that affects the normal operation of the mobile phone jammer;
11. It is impossible to track and investigate the process of artificially closing the jammer;
12. It is impossible to track and investigate the more clever vandalism of prisoners or prison guards (for example: some prison guards cut off the power supply of the jammer without supervision at night, and restore the normal power supply of the jammer the next morning).
Advantages of installing mobile phone shielding network intelligent management system
1. There is no need to arrange control lines, and the installation and construction are simpler;
2. The whole system takes the power carrier as the technical core, and does not require centralized wiring (the power cord for the shielding device does not need to be centralized wiring), and there is no need for wiring between the shielding devices or between the shielding device and the main control computer, and each shielding point You only need to get power from the nearest location (the power cord that supplies power to the shield is used not only for power supply, but also for transmitting remote control signals).
3. The software is unified and centralized control and management, and the electronic map is simple and clear;
4. The entire system is controlled and managed by a set of main control software, and managers can see the shielding status in the surveillance area at a glance through the unit structure diagram (equivalent to unit electronic map) on the main control software.
5. Free grouping, fully open, fully closed, grouped (buildings, sub-regions) switch, point-to-point switch;
6. The management personnel can accurately control the on and off of any shielding point through the main control software on the main control computer, point-to-point or grouped (that is, sub-regional or sub-building);
7. Master the operating status of all points and whether they are faulty, real-time and automatic inquiries, and automatic alarms;
8. Managers can manually or automatically inquire the working status of each mobile phone jammer, and can find out the malfunctioning or damaged jammer in real time. Under the automatic inquiry state, it can provide instant sound and light alarm for the malfunctioning shielding point. And clearly inform the location of the jammer;
9. It can be timed on and off, timed plan can be edited arbitrarily, energy saving and environmental protection;
10. The software can be used to perform precise timing on and off control for any point or group; after the timing is activated for some positions that do not need to be continuously turned on for many years, it is beneficial to energy saving, environmental protection, and prolonging the service life of the equipment;
11. The log function is helpful for tracking and troubleshooting;
12. The perfect system log function will record the working status of each blocker, the operation log of the administrator or operator, and it has tracking and troubleshooting functions for those more sophisticated sabotages (for example, a prison guard cuts off the block at night After the power supply of the device and the power supply is restored during the day, this process will be automatically queried and recorded in the log).
13. Expandable functions in the future: multi-level networking, data aggregation, and mastery of the overall situation;
14. This item is an expandable development function in the future and has not yet been put into application: since each system has an independent database, if there are more than one in the province, the upper management department can call each prison in the future. The database can be used to monitor the operation status of the shielding system of each prison.