230 likes | 521 Views
INTRUSION ALARM TECHNOLOGY. INTRO TO INTRUSION ALARM. INTRUSION ALARM TECHNOLOGY. An intrusion detection system consists of several different system components wired together to provide protection of persons and property. INTRUSION ALARM TECHNOLOGY.
E N D
INTRUSION ALARM TECHNOLOGY INTRO TO INTRUSION ALARM
INTRUSION ALARM TECHNOLOGY • An intrusion detection system consists of several different system components wired together to provide protection of persons and property.
INTRUSION ALARM TECHNOLOGY • Intrusion detection systems (IDS) are also called security alarms, security systems, alarm systems, perimeter detection systems, burglar alarm systems and similar terms. • Burglar alarms are used in residential, commercial, industrial, and military properties for protection against theft or property damage, as well as personal protection against intruders.
INTRUSION ALARM TECHNOLOGY • Car alarms likewise protect vehicles and their contents. Prisons also use security systems for control of inmates. • Some alarm systems serve a single purpose of burglary protection; combination systems provide both fire and intrusion protection. • Many burg. Panels at a minimum provide a zone for smoke detectors.
INTRUSION ALARM TECHNOLOGY • Intrusion alarm systems may also be combined with closed-circuit television (CCTV) surveillance systems to automatically record the activities of intruders. • Many CCTV systems have alarm interfaces that facilitate quick and easy interconnection to an intrusion alarm system.
INTRUSION ALARM TECHNOLOGY • Burglar alarm systems may interface to access control systems for electrically locked doors that require a key fob or access card/code. • Systems range from small, self-contained noisemakers, to complicated, multi-zone systems with computer monitoring and control. PERSONAL ALARM SYSTEM “NOISE MAKER”
INTRUSION ALARM TECHNOLOGY • A basic burglar alarm is a simple circuit consisting of a loop, switch, battery and a buzzer. • The switch symbol represents many different types of detection devices, switches can be normally open (N.O.) or normally closed (N.C.).
INTRUSION ALARM TECHNOLOGY • The switch symbols pictured below represent any detection device such as; PIRs (passive infrared), reed switches, tamper switches, glass break sensors etc. • These devices are classified as either a normally open (N.O.) or normally closed device (N.C.). NORMALLY OPEN SWITCH NORMALLY CLOSED SWITCH
INTRUSION ALARM TECHNOLOGY • As with many low voltage systems the primary component or heart of the system is the central device that controls all other components. • In this case the control panel (CP) is the heart of the intrusion detection system. • The CP houses all of the electronics used to monitor the detection devices and route signals to notification devices.
INTRUSION ALARM TECHNOLOGY • Alarm systems can be sub-divided into three parts: SIGNALING CONTROL DETECTION
INTRUSION ALARM TECHNOLOGY • We can further break down an alarm system into all the separate components.
INTRUSION ALARM TECHNOLOGY • Detection devices are used to detect a human or non-human (animals,) intruders. • Notification/annunciation devices communicate information about an intrusion system to its user, the information can be audible, visual or both. • Communication devices communicate an alarm condition to the user or a monitoring station.
INTRUSION ALARM TECHNOLOGY • Control units are keypads that are either LCD (liquid crystal display) or LED (light emitting diode) and provide the means to program the alarm system. • The Power supply is both wired and battery back up which is self contained in the control panel enclosure.
INTRUSION ALARM TECHNOLOGY • The separate components will be wired to zones in the control panel and it is common for the wiring schematics for the panel to be listed on the inside door of the enclosure. SCHEMATICS INCLUDED
INTRUSION ALARM TECHNOLOGY • You have already been introduced to several abbreviations that are frequently used in the burglar alarm industry, we will cover a few more. • CP = ? IDS= ? • N.O.= ?N.C.= ? INTRUSION DETECTION SYSTEM CONTROL PANEL NORMALLY OPEN NORMALLY CLOSED
INTRUSION ALARM TECHNOLOGY • EOL= End of lines resistor, this is used to monitor the wired loop. • PIR = Passive infrared detector, a commonly used device to cover large areas. • C = Used in control panels to indicate a common lead shared by two zones. • POTS = Plain old telephone service, dial tone used by the control panel
INTRUSION ALARM TECHNOLOGY • RJ-31X = Is an alarm panel jack, POTS gets wired to this jack. • HUA = Holdup alarm, used on keypads or panic buttons. • DS = Door strike • JB = Junction box
INTRUSION ALARM TECHNOLOGY • When working with blueprints to install an intrusion alarm system all of the devices will be represented with a box or rectangle containing an abbreviation. • Cables are home runs back to the control panel and are labeled as zones. • A zone can have a few devices or dozens of devices wired in either series or parallel.
INTRUSION ALARM TECHNOLOGY • Here is an example of zone wiring, notice that zone 1 is a N.O. device loop and zone 2 is a N.C. device loop. WHAT DOES THIS LINE REPRESENT?
INTRUSION ALARM TECHNOLOGY • The value of the EOL can be found on the control panel door in the wiring schematic. • There are separate wiring terminals for communication devices, notification devices and keypads, these devices are not connected to the zone wiring loops.