Intrusion Systems


Published on

Published in: Business, Technology
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Intrusion Systems

  1. 1. The world of intrusion alarm
  2. 2. IAS Basics <ul><li>A Security System consists of 3 basic elements : </li></ul><ul><li>DETECTORS, that sense the actions or presence of an intruder </li></ul><ul><li>CONTROL PANEL, that arms and disarms the system, receives the signals from the sensors, processes these signals and initiates the alarm warning devices </li></ul><ul><li>ALARM WARNING DEVICES, for either remote and/or local warning. </li></ul><ul><li>COMMUNICATION SYSTEMS for remote and central monitoring / warning. </li></ul>
  3. 3. IAS Basics -Detectors <ul><li>DETECTORS are normally configured to provide 3 levels of security: </li></ul><ul><li>Perimeter detection - that is used to sense intrusion as the thief attempts to breach the perimeter of the protected premises </li></ul><ul><li>Interior detection - that provides security to strategic areas in which valuables may be found </li></ul><ul><li>24 hour detection - that is used to describe devices that are active in both the armed and disarmed modes of the system </li></ul>
  4. 4. Perimeter Detection <ul><li>Perimeter protection is the type of protection that detects someone entering your home or building from the outside. Obviously, you enter through a door but intruders often use other means of entrance. For the best protection, you will need to protect any opening that can be used as an entrance. This will include not only doors, but also windows, ducts, and any other opening large enough for someone to go through. </li></ul><ul><li>The most common form of protection are &quot;magnetic contacts&quot; which are placed so that if a door or window is opened, a signal will be sent to the control panel and an alarm will results. Contacts may be either recessed, where the contact is usually mounted within the door or window casing and is hidden, or surface mounted. If you look at the top of the door in a retail store, you will usually see a surface mounted contact. Because door casings are steel and the walls are concrete, recessed contacts are difficult to mount in this type of building. Being open to vision, surface contacts can also be a deterrent. </li></ul>Switches installed to all the exterior opening doors, windows, etc
  5. 5. Perimeter Detection <ul><li>What if only the glass is broken in a door or window and entrance is gained without opening the door or window? The magnetic contact will not detect a breach and will not signal an alarm. For this you will need a &quot;glass break sensor&quot; to signal the breach. Glass break sensors will detect either the acoustic, or sound of the glass breaking, the seismic, or feel of the glass breaking, or both. </li></ul>Break glass or vibration sensors installed to detect breakage of windows
  6. 6. Perimeter Detection <ul><li>The last type of perimeter protection actually uses interior protectors. An &quot;infrared detector&quot; is set to form a virtual &quot;barrier&quot; along a wall instead of covering a large area. When someone passes through this barrier, an alarm will be set off. </li></ul>External sensors such as photo-electric beams, special PIR sensors installed to detect intrusion at the perimeter of the property
  7. 7. Interior Detection <ul><li>INTERIOR DETECTION </li></ul><ul><li>Provides security to areas such as the master bedroom, entertainment areas, hallways, study, home office, dining room or other areas that valuables are stored. </li></ul><ul><li>In some instances the system may consist of only interior detection, especially in the lower end of the market. </li></ul><ul><li>Normally consists of Passive Infra Red Sensors (PIR) due to low cost and ease of installation </li></ul>
  8. 8. Interior Detection <ul><li>Interior protection is the type of protection used to detect an intruder inside your home or building. Generally infrared detectors are used for this type of protection. There are two basic types of infrared detectors: ceiling mounted and wall mounted . </li></ul>
  9. 9. Interior Detection -PIR <ul><li>The most common detectors are the passive infrared (PIR) sensors which react to the infrared heat energy emitted by people. PIR sensors emit no radiation. They are passive and are normally designed to detect motion of a heat source. </li></ul><ul><li>A multifaceted (Fresnel) lens in front of the pyroelectric transducer focuses infrared energy from a multitude of narrow, discrete beams or cones. As a warm body moves across the field of view of the detector, the transducer output has peaks and valleys. If the variation is sufficiently intense and rapid, a circuit triggers and closes a relay. This relay provides the dry contact closure normally found on PIR detectors. </li></ul>
  10. 10. Interior Detection <ul><li>24 Hour Detectors - that include: </li></ul><ul><li>Duress, panic and medical alarms, consisting of fixed button and portable wireless units </li></ul><ul><li>Fire alarms including smoke sensors, heat sensors and fixed temperature sensors. </li></ul><ul><li>Plant monitoring devices for freezers, furnaces, air-conditioning, etc </li></ul><ul><li>Tamper devices installed to siren units, control panels and detectors </li></ul>
  11. 11. <ul><li>The security system has 3 basic modes of operation: </li></ul><ul><li>Stay (home) armed mode, where zones are automatically bypassed to allow the occupants to move around in pre-programmed areas. </li></ul><ul><li>Away armed mode where all zones are active </li></ul><ul><li>Disarmed mode when all zones with the exception of 24 hour zones are turned off. </li></ul>IAS –Panels
  12. 12. <ul><li>Contains the microprocessor and electronic circuits that controls system operation. </li></ul><ul><li>Contains the power supply and standby (re-chargeable batteries) required to power the system. </li></ul><ul><li>A control panel is normally selected to suit the number of detection zones, as well as the number of code holders required to operate the system </li></ul><ul><li>Normally one electronic detector is connected to an individual zone </li></ul>Control Panels
  13. 13. <ul><li>The system is controlled by a number of keypads installed near the entry foyer, in the master bedroom, etc. </li></ul><ul><li>Control of the system can also be by wireless remote control or by a remote telephone connection </li></ul><ul><li>The control panel is programmed to suit the individual users requirements either by use of the system keypad, locally by direct connection to a PC, or remotely via a modem. </li></ul>Control Panel - Keypads
  14. 14. <ul><li>The type of alarm warning selected depends upon: </li></ul><ul><li>The geographical location of the premises </li></ul><ul><li>The frequency of patrols in the area </li></ul><ul><li>The type and value of risk involved </li></ul><ul><li>The customers ability to afford the cost involved with central station monitoring </li></ul>Alarm Warning Devices
  15. 15. Communication systems When the alarm sensor activates, the panel will “seize” the telephone line and transmit a digital signal to the Central Monitoring Station receiver. The alarm information and required response information is displayed on a computer terminal for operator evaluation and action
  16. 16. Central Monitoring Station The receiver sends a handshake tone Panel now sends alarm data After successful reception, a “kiss off” tone is sent Sequence of Events - data transfer takes around 4.5 seconds Panel Dials the receiver
  17. 17. C.M.S <ul><li>Information displayed to the Central Station operator includes: </li></ul><ul><li>Customer name & address </li></ul><ul><li>Emergency telephone numbers (police, fire brigade, ambulance, re-call numbers etc.) </li></ul><ul><li>Type of system </li></ul><ul><li>Response action requirements </li></ul><ul><li>A description of zone(s) that are in alarm </li></ul><ul><li>Priority of the alarm </li></ul>