Intrusion alarm technology
This presentation is the property of its rightful owner.
Sponsored Links
1 / 25

INTRUSION ALARM TECHNOLOGY PowerPoint PPT Presentation


  • 87 Views
  • Uploaded on
  • Presentation posted in: General

INTRUSION ALARM TECHNOLOGY. DETECTION DEVICES. INTRUSION ALARM TECHNOLOGY. Detection devices can be either passive or active. P assive devices typically only require two wires and don’t require power.

Download Presentation

INTRUSION ALARM TECHNOLOGY

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Intrusion alarm technology

INTRUSION ALARM TECHNOLOGY

DETECTION DEVICES


Intrusion alarm technology1

INTRUSION ALARM TECHNOLOGY

  • Detection devices can be either passive or active.

  • Passive devices typically only require two wires and don’t require power.

  • Active devices typically require 4 wires, two wires are for power, the other two are for the detection loop.


Intrusion alarm technology2

INTRUSION ALARM TECHNOLOGY

  • In this presentation we will cover the most commonly used detection devices for intrusion detection systems.

  • One of the most commonly used detection devices is the magnetic switch sensor.


Intrusion alarm technology3

INTRUSION ALARM TECHNOLOGY

  • The magnet controls an arm in the switch, when the magnet is removed the metal contact if it is a normally closed switch will make contact and open the circuit.


Intrusion alarm technology4

INTRUSION ALARM TECHNOLOGY

  • The magnetic switch sensor is used to protect the perimeter of a building and is typically used on doors and windows.

  • There are three different magnetic switch technologies;

    1) Magnetic mechanical switch

    2) Magnetic reed switch

    3) Balanced magnetic reed switch


Intrusion alarm technology5

INTRUSION ALARM TECHNOLOGY

  • The magnetic mechanical switch consists of a magnetically actuated switch and a magnet.

  • These switches can handle relatively high levels of current and are vibration sensitive.

  • They can be either N.O. or N.C. and require a relatively high current to operate.


Intrusion alarm technology6

INTRUSION ALARM TECHNOLOGY

  • The magnetic reed switch is an electrical switch operated by an applied magnetic field.

  • It contains two ferrous magnetized strips that react to a permanent magnet and have a long operating life.

  • They can be either N.O. or N.C. or both depending on how it is wired.


Intrusion alarm technology7

INTRUSION ALARM TECHNOLOGY

  • The balanced magnetic switch uses a balanced magnetic field, any change in the magnetic field trips an alarm.

  • These types of switches are hard to circumvent and are also vibration sensitive, they also operate on a relatively small current.

  • They can also be wired as either a N.O. or N.C. device.


Intrusion alarm technology8

INTRUSION ALARM TECHNOLOGY

  • 22/2 or 22/4 would be the best choice of cabling for these devices.

  • The surface mount magnetic switch comes with additional parts; a cover that conceals the screw terminals and spacers to properly align the magnet with the sensor.


Intrusion alarm technology9

INTRUSION ALARM TECHNOLOGY

  • Contrary to Hollywood movies and shows a piece of aluminum foil from a stick of gum placed between the contact and magnet will not defeat the loop, I encourage you to try it when you install a security system in lab.


Intrusion alarm technology10

INTRUSION ALARM TECHNOLOGY

  • Magnetic switch contacts are also available as flush mount type contacts, they’re normally used for doors, the magnet goes into the doorand the switch is placed in the door frame.


Intrusion alarm technology11

INTRUSION ALARM TECHNOLOGY

  • When placing a door contact, surface mount or flush mount it should be installed approximately 4” from the opening side of the door.


Intrusion alarm technology12

INTRUSION ALARM TECHNOLOGY

  • Glass break detectors detect the frequency of breaking glass.

  • Glass break detectors are designed for specific ranges of glass, not all glass is constructed the same.

  • Metal oxide coatings, safety glass and tinting can dramatically reduce the frequency of breaking glass so care has to taken when choosing these types of detectors.


Intrusion alarm technology13

INTRUSION ALARM TECHNOLOGY

  • The type of glass can found by locating the installers mark in the corner of the glass pane.

  • Glass break detectors are designed to be mounted directly on the window, some are designed to be placed in the vicinity of windows.

THIS GLASS DETECTOR IS DESIGNED TO BE PLACED WITHIN 30’ OF THE WINDOWS


Intrusion alarm technology14

INTRUSION ALARM TECHNOLOGY

  • Glass break detectors can be standard detectors, dual frequency detectors or three frequency detectors.

  • Standard detectors monitor the high frequencies of breaking glass.

  • Dual detectors monitor the low and high frequencies.

  • Three frequency detectors monitor low, mid and high frequencies of glass breaking


Intrusion alarm technology15

INTRUSION ALARM TECHNOLOGY

  • Glass break detectors are sometimes called acoustic sensors, sensitivity of these detectors needs to be increased to compensate for heavy drapes or fabric style venetian blinds.

  • These are active devices that require power, the next slide shows how to properly wire an acoustic detector.


Intrusion alarm technology16

INTRUSION ALARM TECHNOLOGY

  • Wiring a glass break detector;

THIS DEVICE IS POLARITY SENSITIVE


Intrusion alarm technology17

INTRUSION ALARM TECHNOLOGY

  • Glass break detectors should always be tested with a glass break simulator.


Intrusion alarm technology18

INTRUSION ALARM TECHNOLOGY

  • PIRs (passive infrared) detectors are very common and used in almost every security system.

  • These devices also require power and polarity needs to be maintained when wiring them.


Intrusion alarm technology19

INTRUSION ALARM TECHNOLOGY

  • PIRs are used for interior protection and perceive and respond to a change in infrared energy, a form of heat.

  • All objects above absolute zero emit heat energy in the form of infrared radiation (infrared light). Usually infrared light is invisible to the human eye, but it can be detected by electronic devices designed for such a purpose.


Intrusion alarm technology20

INTRUSION ALARM TECHNOLOGY

  • PIRs offer a number of different coverage patterns;

  • Short range25’

  • Medium range50’

  • Long range100+’

  • Wide angle

  • Narrow angle

  • Pet alley


Intrusion alarm technology21

INTRUSION ALARM TECHNOLOGY

  • Dual technology PIRs use both infrared and microwave technology to sense movement, both sensors must be tripped to activate an alarm.

  • The dual technology sensors are designed to eliminate or reduce false alarms.

  • PIRs should not face windows, heating systems or air movement from central air ducts.


Intrusion alarm technology22

INTRUSION ALARM TECHNOLOGY

  • Wiring a PIR sensor;


Intrusion alarm technology23

INTRUSION ALARM TECHNOLOGY

  • Some PIRs have a different type of dual technology, they come equipped with cameras.


Intrusion alarm technology24

INTRUSION ALARM TECHNOLOGY

  • They are many different types of detectors out there, but the ones we just covered are by far the most widely used.

  • Pressure mats are another option for perimeter protection and photo electric beams are fairly popular too, especially with small shops.


  • Login