Intrusion alarm technology
Download
1 / 19

INTRUSION ALARM TECHNOLOGY - PowerPoint PPT Presentation


  • 106 Views
  • Uploaded on

INTRUSION ALARM TECHNOLOGY. KEYPADS (CONTROL UNITS). INTRUSION ALARM TECHNOLOGY. A control unit provides a means of establishing user control over an intrusion system.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' INTRUSION ALARM TECHNOLOGY' - verlee


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Intrusion alarm technology
INTRUSION ALARM TECHNOLOGY

KEYPADS (CONTROL UNITS)


Intrusion alarm technology1
INTRUSION ALARM TECHNOLOGY

  • A control unit provides a means of establishing user control over an intrusion system.

  • Sometimes the control unit for a system is combined with other building system controls, such as those for fire alarms or climate controls.

  • Input of user commands or receipt of system feedback is through operating panels also called control points.


Intrusion alarm technology2
INTRUSION ALARM TECHNOLOGY

  • Control points provide the interface between the control panel and the system operator.

  • Control points can provide different levels of user input and feed back.

  • They provide the user the ability to turn on or turn off zones, arm and disarm the system as well as providing the user with system status and alarms.


Intrusion alarm technology3
INTRUSION ALARM TECHNOLOGY

  • The basic functions of a keypad are;

  • ARMING/DISARMING

  • SHUNTING/BYPASS

  • DURESS/PANIC BUTTON

  • EMERGENCY SERVICES AUTO DIAL

  • PROGRAMMING

  • SYSTEM STATUS

  • TWO WAY COMMUNICATIONS


Intrusion alarm technology4
INTRUSION ALARM TECHNOLOGY

  • Control points include devices such as keypads, key switches, touch screens, telephone controls and computer controls.


Intrusion alarm technology5
INTRUSION ALARM TECHNOLOGY

  • Keypads come in two general types; LCD alphanumeric and LED.


Intrusion alarm technology6
INTRUSION ALARM TECHNOLOGY

  • Keypads can be mounted at the control panel and conveniently located throughout the premises.

  • A keypad will be used as the interface to program the all of the features available for that particular security system.

  • Alphanumeric keypads are similar to telephone keypads, they have the same three letters assigned to each of the numbers.


Intrusion alarm technology7
INTRUSION ALARM TECHNOLOGY

  • Keypads have additional buttons that provide additional features, notice to the right, the three buttons to the left provide a quick way to notify; the fire dept., EMTs and the police department with the push of one button.


Intrusion alarm technology8
INTRUSION ALARM TECHNOLOGY

  • There should be a keypad at the most commonly used points of entry.

  • If there are several points of entry used regularly than there should be a keypad at each of those entrances.

  • Example: the garage entry and the front door/breeze way door.


Intrusion alarm technology9
INTRUSION ALARM TECHNOLOGY

  • The master bedroom should be another location considered for a keypad.

  • If there is a break in the occupants can quickly contact emergency help, see which zone has been tripped and the user can also activate a panic button sounding a siren.

  • Most intruders will scramble at the sound of a loud siren.


Intrusion alarm technology10
INTRUSION ALARM TECHNOLOGY

  • Keypads have an arm/disarm button, sometimes these buttons are labeled; on/off or stay/away.

THE ON/OFF BUTTON ON THIS KEYPAD IS USED TO ARM AND DISARM THE SYSTEM.

ONCE THE CODE IS ENTERED THE USER MUST PRESS THE ON/OFF BUTTON


Intrusion alarm technology11
INTRUSION ALARM TECHNOLOGY

  • Keypads also have a bypass button, this button is used to shunt zones or bypass them.

  • If you want to bypass the backdoor you would leave it open, arm the system and the keypad will tell you not ready to arm and indicate that the back door is open.

  • You would then press the bypass button and the system will then arm with the backdoor unprotected.


Intrusion alarm technology12
INTRUSION ALARM TECHNOLOGY

  • Here is a keypad with the bypass button and a button to display the zone or device that is bypassed.


Intrusion alarm technology13
INTRUSION ALARM TECHNOLOGY

  • The stay button allows a user to arm the system and still move around the interior premises, by pressing stay button interior zones disarm while the perimeter stays armed.


Intrusion alarm technology14
INTRUSION ALARM TECHNOLOGY

  • The reset button is used to reset display statuses and in some cases smoke alarms.


Intrusion alarm technology15
INTRUSION ALARM TECHNOLOGY

  • Alarm systems come out of the box with a default arm/disarm code, it’s an encredibly easy code to defeat.

  • What do you think the four digit default code is?

1234 ARM


Intrusion alarm technology16
INTRUSION ALARM TECHNOLOGY

  • Obviously this code needs to be changed, once the code is changed it will automatically be recognized by all of the keypads in the alarm system.

  • There are several different levels of keypad/system codes;

  • ADMINSTRATOR CODE

  • INSTALLER CODE

  • USER CODES


Intrusion alarm technology17
INTRUSION ALARM TECHNOLOGY

  • The administrators code is used to change features of the system and to assign user codes.

  • The user codes are for basic alarm interfaces such as arming/disarming the system, use of the duress/panic features and use of the quick dial buttons for emergency services.


Intrusion alarm technology18
INTRUSION ALARM TECHNOLOGY

  • The installer code is similar to a master code, this is used to program the system and will remain in memory.

  • If the installer returns for service he can use the installer code for access to the system and make any necessary changes.


ad