Alarm Systems

From SolidsWiki
Revision as of 10:58, 6 December 2012 by Kodiyath (talk | contribs)
Jump to navigation Jump to search



Alarm System is a system designed to detect intrusion – unauthorized entry – into a building or area. They are also called security alarms,security systems,burglar alarm , intrusion detection systems, perimeter detection systems, and similar terms. Alarm systems are used in residential, commercial, industrial, and military properties for protection against burglary (theft) or property damage, as well as personal protection against intruders. Car alarms likewise protect vehicles and their contents. Prisons also use security systems for control ofinmates.

Some alarm systems serve a single purpose of burglary protection; combination systems provide both fire and intrusion protection. Intrusion alarm systems may also be combined with closed-circuit television surveillance systems to automatically record the activities of intruders, and may interface to access control systems for electrically locked doors. Systems range from small, self-contained noisemakers, to complicated, multi-area systems with computer monitoring and control.

Design

The most basic alarm consists of one or more sensors to detect intruders, and an alerting device to indicate the intrusion. However, a typical premises security alarm employs the following components:

  • Premises control unit (PCU), or panel: The brain of the system, it reads sensor inputs, tracks arm or disarm status, and signals intrusions. In modern systems, this is typically one or more computer circuit boards inside a metal enclosure, along with a power supply.
  • Sensors: Devices which detect intrusions. Sensors may placed at the perimeter of the protected area, within it, or both. Sensors can detect intruders by a variety of methods, such as monitoring doors and windows for opening, or by monitoring unoccupied interiors for motions, sound, vibration, or other disturbances.
  • Alerting devices: These indicate an alarm condition. Most commonly, these are bells, sirens, and/or flashing lights. Alerting devices serve the dual purposes of warning occupants of intrusion, and potentially scaring off burglars.
  • Keypads: Small devices, typically wall-mounted, which function as the human-machine interface to the system. In addition to buttons, keypads typically feature indicator lights, a small mulch-character display, or both.Interconnections between components. This may consist of direct wiring to the control unit, or wireless links with local power supplies.
  • Security devices: Devices to detect thieves such as spotlights, cameras and lasers.

In addition to the system itself, security alarms are often coupled with a monitoring service. In the event of an alarm, the premises control unit contacts a central monitoring station. Operators at the station see the signal and take appropriate action, such as contacting property owners, notifying police, or dispatching private security forces. Such signals may be transmitted via dedicatedalarm circuits, telephone lines, or Internet.


Alarm connection and monitoring

Depending upon the application, the alarm output may be local, remote or a combination. Local alarms do not include monitoring, though may include indoor and/or outdoor sounders and lights which may be useful for signaling an evacuation notice for people during fire alarms, or where one hopes to scare off an amateur burglar quickly. However, with the widespread use of alarm systems , false alarms are very frequent and many urbanites tend to ignore alarms rather than investigating, let alone contacting the necessary authorities. In short, there may be no response at all. In rural areas lights or sounds may not make much difference anyway, as the nearest responders could take so long to get there that nothing can be done to avoid losses.

Remote alarm systems are used to connect the control unit to a predetermined monitor of some sort, and they come in many different configurations. High-end systems connect to a central station or responder via a direct phone wire, a cellular network, a radio network or an IP path. In the case of a dual signalling system two of these options are utilized simultaneously. The alarm monitoring includes not only the sensors, but also the communication transmitter itself. While direct phone circuits are still available in some areas from phone companies, because of their high cost and the advent dual signalling with its comparatively lower cost they are becoming uncommon. Direct connections are now most usually seen only in Federal, State, and Local Government buildings, or on a school campus that has a dedicated security, police, fire, or emergency medical department . More typical systems incorporate a digital cellular communication unit that will contact the central station via the Public Switched Telephone Network and raise the alarm, either with a synthesized voice or increasingly via an encoded message string that the central station decodes. These may connect to the regular phone system on the system side of the demarcation point, but typically connect on the customer side ahead of all phones within the monitored premises so that the alarm system can seize the line by cutting-off any active calls and call the monitoring company if needed. A dual signalling system would raise the alarm wirelessly via a radio path (GPRS/GSM) or cellular path using the phone line or broadband line as a back-up overcoming any compromise to the phone line. Encoders can be programmed to indicate which specific sensor was triggered, and monitors can show the physical location of the sensor on a list or even a map of the protected premises, which can make the resulting response more effective. For example, a heat sensor alarm, coupled with a flame detector in the same area is a more reliable indication of an actual fire than just one or the other sensor indication by itself. Many alarm panels are equipped with a backup communication path for use when the primary PSTN circuit is not functioning. The redundant dialer may be connected to a second communication path, or a specialized encoded cellular phone, radio, or internet interface device to bypass the PSTN entirely, to thwart intentional tampering with the phone line(s). Just the fact that someone tampered with the line could trigger a supervisory alarm via the radio network, giving early warning of an imminent problem . In some cases a remote building may not have PSTN phone service, and the cost of trenching and running a direct line may be prohibitive. It is possible to use a wireless cellular or radio device as the primary communication method.