Author: Shi Xinhua Source: far Extension Technology
On January 7, 2009, the Chinese government officially issued 3G licenses, and various operators are also committed to developing 3G technology. Since then, China's third-generation mobile communications industry has experienced rapid development. According to statistics from the Ministry of Industry and Information Technology, as of the end of 2009, the number of mobile phone users in China had exceeded 710 million, more than half of the country's total population. According to a CNNIC survey, Chinese mobile phone netizens accounted for 34.2% of the total number of mobile phone users, with a total scale of 240 million. These data show that 3G users will also have the potential for substantial growth.
Ministry of Industry and Information Technology: 3G network invests 400 billion yuan in two years
In response to the fast-growing 3G market, the Ministry of Industry and Information Technology and other eight ministries and commissions released the "Opinions on Promoting the Construction of the Third Generation Mobile Communication Network" on Thursday. Reached 150 million households. Since the issuance of 3G licenses in early 2009, the 3G investment of domestic telecommunications companies has been only 160 billion yuan, so the huge investment of 400 billion yuan in the next two years will bring a greater boost to communication equipment manufacturing companies.
In the next two years, the country will invest heavily in the construction of 3G networks
The report of the eight ministries and commissions, including the Ministry of Industry and Information Technology, pointed out that by 2011, the 3G network will cover all prefecture-level cities and most county towns, towns, major highways, scenic spots, etc ...
However, the report also pointed out that in the current construction of 3G networks, problems such as difficult site selection for base stations and insufficient service applications have become increasingly prominent, which will affect the smooth development of subsequent 3G construction. In particular, the frequent occurrence of cases such as theft and destruction of 3G base stations has also caused the construction party to suffer huge economic losses.
3G base station: an abnormal loss of 900 million yuan a year
With the development of 3G services, communication companies have entered another period of rapid development in the construction of base stations. Take China Mobile as an example. At present, China Mobile's base stations are spread all over the country, and a large number of unattended base stations have appeared. However, it is these unattended base stations that have become the focus of "care" by those outlaws in society.
The widening gap between the rich and the poor in social development and the sharp rise in the price of metallic copper have led to a more intense theft of base stations. For example, Henan Mobile Pingdingshan Branch averaged more than 30 base stations stolen per month in July 2007, and a maximum of 4 base stations were stolen per day. The stolen high-voltage transformers of Guangdong Mobile Shaoguan Branch reached more than 10 in 2006, with a direct loss of more than 1 million. The theft of mobile communication base stations nationwide has caused huge losses, and indirect losses are incalculable.
According to incomplete statistics, there were more than 1.35 million cases of theft and destruction of 3G base stations nationwide in 2009, with a direct loss of up to 900 million yuan. This does not include the cost of repeated construction.
Communication company: Base station theft is very "technical"
According to a person in charge of a communications company, in recent years, the number of 3G base stations has increased, and the distribution of base stations has become wider and wider. At the same time, the theft methods of thieves are becoming more and more professional. Using one or two traditional anti-theft measures, it is difficult to play an anti-theft effect. Moreover, the competition among the three domestic telecommunications operators is becoming stronger and stronger. The stolen base station caused a disruption of communications and has a huge impact on the credibility of the telecommunications operators.
Because the base station is in an unattended state, and the remote base station is stolen indoors and outdoors, the existing monitoring methods often fail to prevent and prevent theft in time. It can't even reflect whether the base station has been stolen in time. It is often found that the base station is stolen only after the base station has been stolen for a long time when Daiwei conducts inspections.
Communication company repairs stolen base station
Throughout the theft cases in recent years, especially in recent years, the theft of base stations has the following characteristics: The stolen items are basically treated as waste products. Therefore, most of them are mainly metal, such as copper, lead, iron, etc. Air conditioner outdoor unit, battery pack, power cable, etc. Theft methods are more and more varied, from sawing outdoor cables to breaking into walls and entering the room, such as overturning walls, prying doors, gas cutting doors, opening holes in walls, drilling feeder windows, etc., with professional techniques. Usually, most thieves commit crimes in remote places where police force is not easy to reach, and there is a law of repeatedly committing crimes in the same location. Generally, the theft time is short, and the alarm monitoring device will be destroyed at the first time. Caught. The resulting communication interruption has extremely serious consequences. It's really fast and ruthless.
Therefore, how to protect the security of base stations and how to prevent theft and vandalism have become the main problems faced by various communication companies.
Case study: Concealed monitoring system makes contributions
We can easily find out through the above. A large number of unattended 3G base stations must rely on effective monitoring to play a role in security protection. However, these obvious monitoring devices are often vulnerable to a blow in front of "savvy" thieves.
At present, in accordance with the requirements of China Mobile Communications Corporation, various provincial mobile companies across the country have established various human activity monitoring systems. These monitoring systems have played a very good role in ensuring the smooth flow of mobile communications. Generally, the mobile base station is unattended. When it is found that the base station has entered illegally, it takes more than 30 minutes for the maintenance personnel to reach the base station. During this time, the theft criminal has already committed the theft. However, some problems that have not been solved by the current system also appear in actual use. That is to say, the difference between concealed monitoring system and non-concealed monitoring system will have very different results in actual use.
Let's take China Mobile as an example: One day, an unattended 3G base station had an abnormal situation. The base immediately called the police, and the police sent people to the base station for inspection as soon as possible. Because the thieves have previously discovered the location of the monitoring system (non-concealed) and destroyed it in the first place. Therefore, when the police arrived at the scene, they were unable to obtain information about the thieves. Therefore, the case entered a dilemma for a while.
(The effect picture can be equipped here)
Afterwards, Mobility replaced the unattended 3G base station with concealed monitoring equipment. When these thieves "visited" again, the hidden human activity monitor at the scene quietly recorded the entire process of the crime. When the police came again, according to the video captured by the video surveillance, in the village near the 3G base station, the stolen suspect Zheng Mou and his associates were arrested in one fell swoop.
Concealed human activity monitor: the guardian of 3G base stations
Concealed human activity monitor is an automatic monitoring instrument independently developed by Nanjing Yuantuo Technology. It is mainly used to pre-warn unauthorized intrusion, and report to the police before the loss is caused, so as not to cause the loss or minimize the loss, which is a real precaution!
Concealed human activity monitor independently developed by Nanjing Yuantuo Technology
Concealed human activity monitor adopts advanced and strict human motion monitoring algorithm, integrates high-level digital integrated circuit processing technology, and uses SMD wiring integrated circuit assembly, detection distance is adjustable from 0-5 meters, with small size, low power consumption, height Features such as concealment. Not only is the performance stable and reliable, and the installation is simple, it can also work in harsh environments such as smoke, dust, water vapor, chemical atmosphere, and high and low temperatures.
The concealed human activity monitor integrates microwave and infrared detection technologies into one. Within the control range, the alarm signal is output only when the detectors of the two alarm technologies both generate an alarm signal. It can maintain the advantages of strong reliability of microwave detectors and has nothing to do with heat sources. It also has the characteristics of passive infrared detectors without lighting and brightness requirements, and can operate day and night, greatly reducing the false alarm rate of the detector. The false alarm rate of this compound alarm detector is a few hundredths of the false alarm rate of a single technology microwave alarm. Simply put, he put the passive infrared detector and the microwave detector together, mainly to improve the detection performance and reduce false alarms.
In terms of the use of 3G base stations, the concealed human activity monitor and the actuator (hard disk recorder / anti-theft host) are connected by four wires, where the red wire is connected to the power supply + 12V, the screen wire is connected to the negative power supply, and the white and ** lines are alarm Trigger output (switch signal output), the detection ability of the loop antenna axis direction is strong, and the loop axis should be directed to the monitored area as much as possible. The human activity monitor adopts viscose fixed installation method. Special attention should be paid to installing it in a solid place, and the detector must not be vibrated or shaken at all. The plane of the antenna loop should be far away from the large metal body, such as the roller shutter door, aluminum alloy door and window frame, reinforced concrete column head, etc., generally should be kept 50mm to ensure that the sensitivity of the received echo will not deteriorate. The human activity monitor has adjusted the detection distance (approximately 1.5 meters) when it leaves the factory, and generally does not need to be adjusted during installation. If it needs to be adjusted, adjust the side potentiometer to adjust its detection radius, which is enough.
Manufacturer: Covert human activity monitor has inestimable social benefits
The widening gap between the rich and the poor in social development and the sharp rise in the price of metallic copper have led to a more intense theft of 3G base stations. Criminals stealing base stations are generally stealing copper cables and copper bars inside the base stations, as well as stealing battery packs and air conditioning equipment. Generally, the direct economic losses of stolen base stations range from 5,000 yuan to tens of thousands of yuan. However, the losses caused by the interruption of base station communications are much greater than this direct economic loss.
It can be seen that at this time, the relevant manufacturers need to invest careful and meticulous monitoring research on the 3G base station to make it safe, intelligent, and technological. Through comparison, experimentation, practice, research and development, a hidden human activity monitor suitable for use in 3G base stations was finally born. The appearance of this product will also have inestimable social benefits for the development of the national communications industry.
Nanjing Yuantuo Technology Co., Ltd. http: // Contact: Mr. Shi Telephone QQ
dining table sets,round dining table,dining table set for 6,dining table sets for 8
Kumusi (Dongguan) Furniture Co., Ltd. , https://www.kcoffeetable.com