Intrusion alarm technology
Download
1 / 18

INTRUSION ALARM TECHNOLOGY - PowerPoint PPT Presentation


  • 117 Views
  • Uploaded on

INTRUSION ALARM TECHNOLOGY. WIRELESS SYSTEMS. INTRUSION ALARM TECHNOLOGY. Wireless systems use radio frequencies (RF) to connect sensors to the control panel. In wireless system devices can still be hardwired and as a result would be a hybrid system, both wireless and hardwired.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' INTRUSION ALARM TECHNOLOGY' - lauren


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Intrusion alarm technology
INTRUSION ALARM TECHNOLOGY

WIRELESS SYSTEMS


Intrusion alarm technology1
INTRUSION ALARM TECHNOLOGY

  • Wireless systems use radio frequencies (RF) to connect sensors to the control panel.

  • In wireless system devices can still be hardwired and as a result would be a hybrid system, both wireless and hardwired.

  • Wireless devices are normally battery powered and are self contained units with LEDs used as status indicators.


Intrusion alarm technology2
INTRUSION ALARM TECHNOLOGY

  • Because the remote sensors are battery operated they will need to be monitored regularly to make sure the battery power is sufficient enough to transmit signals back to the CP.

  • Wireless systems eliminate the need to install cables to each device which makes them quicker and easier to install.


Intrusion alarm technology3
INTRUSION ALARM TECHNOLOGY

  • Wireless systems can also incorporate CCTV cameras as complete intrusion detection system.

  • This unit has the traditional

    look of a hardwired system

    with a wireless module and

    antenna that transmits and

    receives signals from remote

    devices.


Intrusion alarm technology4
INTRUSION ALARM TECHNOLOGY

  • A wireless security system operates by networking the monitoring devices so that they transmit information back to the receiver, control panel or other receiving device.

  • Depending on the devices that are included in the system, device placement will have to be chosen carefully.


Intrusion alarm technology5
INTRUSION ALARM TECHNOLOGY

  • The devices used in a wireless security system usually have a “range of effectiveness”, in which they are able to easily transmit information back to the receiver.

  • This range is frequency dependent, the higher the frequency the further the operating range of the devices.


Intrusion alarm technology6
INTRUSION ALARM TECHNOLOGY

  • Chinese made wireless alarm systems operate at 433MHz.

  • Common frequencies used for wireless alarm systems are;

  • 315MHz (mainly used in China)

  • 433MHz (USA, Latin America, EU)

  • 868MHz (EU, AU)

  • 912MHz (EU).


Intrusion alarm technology7
INTRUSION ALARM TECHNOLOGY

  • Ranges for remote devices vary widely however an installer can expect 500’ in open air and 100’ to 300’ with obstructions.

RF SIGNALS WILL PENETRATE MOST OBSTACLES, HOWEVER THE FURTHER THE DISTANCE THE LESS EFFECTIVE THE RF SIGNALS WILL BE BASED ON A 433MHz SIGNAL.


Intrusion alarm technology8
INTRUSION ALARM TECHNOLOGY

  • The receiver supervises each remote device at preset time intervals.

  • If the transmitter fails to check in a specific number of times during the preset interval, an indication is made locally or remotely that the sensor is not functioning.

  • This signal is separate and distinct from an alarm signal.


Intrusion alarm technology9
INTRUSION ALARM TECHNOLOGY

  • Todays wireless technology incorporated into intrusion detection systems can offer as many if not more features than a traditional hard wired system.

  • They can provide upwards to 40 programmable wireless zones and can also provide 8 to 22 hard wired zones.

  • Many wireless alarm systems provide 4 CCD cameras incorporated into the system.


Intrusion alarm technology10
INTRUSION ALARM TECHNOLOGY

  • Wireless systems are compatible with cellular alarm monitoring that allows you to control your entire security system from your iPhone, iPad, Android or computer.

  • A full suite of home automation and home control devices that enable remote light, lock, thermostat and surveillance camera control.


Intrusion alarm technology11
INTRUSION ALARM TECHNOLOGY

  • Because wireless alarm systems use radio frequencies sources of interference must be taken into consideration.

  • Depending on the frequency of the system cordless phones operating in the 900MHz range may cause interference.

  • In the lower frequencies radio controlled toys can cause interference.


Intrusion alarm technology12
INTRUSION ALARM TECHNOLOGY

  • Metal obstructions can also degrade the RF signal significantly.

  • Mirrors will cause reflection problems causing much of the signal to bounce in different directions.

  • The thicker the building materials the more the RF signal will degrade.


Intrusion alarm technology13
INTRUSION ALARM TECHNOLOGY

  • Because of their distance limitations wireless alarm systems are primarily designed for home and small business installations.

  • Larger commercial installation will still utilize the traditional hard wired systems where cable lengths can exceed 1000’ or more.


Intrusion alarm technology14
INTRUSION ALARM TECHNOLOGY

  • Wireless alarm systems are similar to addressable systems in which each remote device has it’s own code.

  • New device codes can be programed so that the control panel will recognize it and the user can document each device by an easy numeric system.

  • Once programed the CP will discover the device automatically.


Intrusion alarm technology15
INTRUSION ALARM TECHNOLOGY

  • The initial installation consists of wiring a power transformer, hooking up an RJ-31X and plugging in an Ethernet connection.

  • Everything else can be installed wirelessly.

  • Each remote wireless device has a tamper circuit which replaces the need for an EOLR and will sound an alarm if the device is handle while the system is armed.


Intrusion alarm technology16
INTRUSION ALARM TECHNOLOGY

  • There are additional terminals for hard wired zones, aux power and input devices.

  • The hard wired zones are the exact same as any hard wired intrusion system and require an end of line resistor.


Intrusion alarm technology17
INTRUSION ALARM TECHNOLOGY

  • Depending on the system the receiver antenna can be replaced with a higher gain antenna for longer ranges and to compensate for obstructions.

  • These antennas use either a TNC or SMA connection.


ad