The Constituents of a Security System



Similar documents
Understanding Alarm Systems

This is a preview - click here to buy the full publication TECHNICAL REPORT INFORMATION TECHNOLOGY HOME ELECTRONIC SYSTEM (HES) APPLICATION MODEL

securıty HOME home protection 101

SECTION DETECTION AND ALARM

securıty HOME home protection 101

BURGLAR ALARM SYSTEMS BURGLAR ALARM SYSTEMS BURGLAR ALARM SYSTEM EURO ALARM WIRELESS BURGLAR ALARM SYSTEM OASIS

Keys to understanding your alarm system

SECURITY & MONITORING QUICK GUIDE

SECURITY SYSTEM NOTES SPECIAL CODES. Security System Configuration

SECURITY SYSTEM NOTES. Security System Configuration

GE Concord 4 Quick User Guide

Welcome to Bell Aliant NextGen Home Security

Solution Ultima ICP-CC488 Home security you can rely on

Overview. Components of an alarm system Technology behind the equipment Communication Platforms Industry Terminology False Alarm Tips DSC products

S100. GSM House Alarm System.

What Should I Expect From My Alarm Monitoring Station?

DESTINY 1/19/96 # A

SPECIAL CODES AUXILIARY CODES SYSTEM NOTES

GC2 Panel User Guide

GSM ALARM SYSTEM USER MANUAL

Elite 8D/Lite Version 8 Zone Controller. Arrowhead Alarm Products Ltd. Operating Guide. Proudly Designed and Manufactured in New Zealand

Rogers Smart Home Monitoring QUICK START GUIDE ROG_6093_QST_GDE_EN.indd 1 9/22/12 8:29 AM

IDS X-Series User Manual D Issued July 2012

Intrusion. IC60 security meets design. Answers for infrastructure.

SECURITY SYSTEM NOTES SPECIAL CODES ENTRY / EXIT DELAY TIMES ARM / DISARM CODES

USER INSTRUCTIONS CONTENTS

SECURITY SYSTEM NOTES

Destiny Destiny Owners Manual

SECURITY SYSTEM NOTES AREA LISTINGS SPECIAL CODES ENTRY / EXIT DELAY TIMES ARM / DISARM CODES ZONE DESCRIPTIONS

GUIDE GETTING STARTED IMPORTANT SUPPORT RESOURCES

NetworX NX-6V2. LED Keypad User Manual

Contact ID as of 2/2/2015

SECURITY SYSTEM NOTES SPECIAL CODES AUXILIARY ARM / DISARM CODES ENTRY / EXIT DELAY TIMES ZONE DESCRIPTIONS

Solution Ultima ICP-CC488 Home security you can rely on

VR8. User Guide Intruder Alarm System

NetworX Series. NX- 4/8 Code Pad. User Manual (Australian Version)

FIRST ALERT INSTRUCTION MANUAL FOR FA 270 KEYPADS SECURITY SYSTEM

Ademco Vista-20P/First Alert FA-168C Basic Commands

Wireless Security System

Contact ID Event Definition Codes

The IoT s application to protect your family

SECURITY SYSTEM NOTES

Solution-16 Operators Manual ISSUE 1.60

ABB Stotz-Kontakt GmbH ABB safe&smart Project planning of security systems

FIRE ALARM SYSTEM RECORD OF COMPLETION

FA701 Series. User s Guide. K6249-2V2 5/09 Rev. A

616, 626, 636 & 646 Keypads

HomeSafe-Basic VT-PS99E. User s Manual. PSTN Home Alarm System. Page: 1 / 15

FIRE ALARM SYSTEM RECORD OF COMPLETION

Bright House Networks Home Security and Control. Peace of mind included. QUICK START GUIDE

Alarm Systems. Peace of Mind. Agri-Alert alarms have been protecting swine operations across the world since automated production systems

FIRE ALARM AND EMERGENCY COMMUNICATION SYSTEM RECORD OF COMPLETION

Using Your. Security System With Icon Keypad S5020, S5021, S5022

Quick Installation Guide LCD GSM ALARM SYSTEM LH

LYNX Touch Small Business Solutions DYNAMIC, FULL COLOR SELF-CONTAINED BUSINESS CONTROL SYSTEM. Your Connected Business

Palos Verdes Estates Police Department 340 Palos Verdes Drive West, Palos Verdes Estates, CA (310)

TAMARAC FIRE RESCUE INSTRUCTIONS FOR FIRE ALARM PRE-SUBMITTAL CHECKLIST

IDS. Users Guide to Keypad Functions S E C U R I T Y MANUAL NO B ISSUED AUG 2002 VERSION 1.18

Residential & Commercial Alarm Systems by Gross Security, LLC

Nicholas Mezei CSCI 6448 OOA&D Homework #3: Use Cases. Use Case Diagram: Home Security System. Alarm System

ReadyGuard Touch Security System

Contents TABLE OF. List of Illustrations... IX. Preface... XV. Chapter 1: How the Burglar Breaks into Your Home... 1

The Buhl Electric Secure Home. Brought to you by Buhl Electric. Security Packages and Options

Solution 880 Operators Manual ISSUE 1.10

Guarded community solutions Easy Series for villa and apartment projects

Solution 16 plus Security at your fingertips

NX-10-V3 wireless system. To wire or not to wire?

868 Mhz. Wirefree DIY. Friendly. Easy Fit Range of Alarms

D24 ALARM CONTROL PANEL USER S MANUAL REVISION 1.1 A$12.00 INC GST

LYNX Touch. Residential Solutions DYNAMIC, FULL COLOR SELF-CONTAINED HOME CONTROL SYSTEM. Your Connected Home

Security with you in mind. As your needs change, NetworX security systems grow with you.

Users Guide to Keypad Functions

Solution-8 Control Panel

Seamless Security Solutions NORTH AMERICAN EDITION

Total Protection Alarm System

Understanding the Code Pad lights...4. Code Pad tones...5. Fully arming the system On MODE...6. Fully arming the system - Quick Arm MODE...

DESTINY OWNER S MANUAL

User Guide for the DS7060 Control/Communicator

SECURITY SYSTEM MANUAL

NESS D Zone Control Panel and Dialler OWNER S MANUAL

Performance Objective Identification Worksheet

Security System. User's Guide. Keypad

NetworX. Security with you in mind. As your needs change, NetworX security systems grow with you.

Commander 2000 Control Panel

SCORPION Z16040C Alarm Controller User Instructions

SECURITY SYSTEM NOTES. EMERGENCY ACTIVATION KEYS (check if enabled) PROGRAMMED FUNCTIONS

Contact ID Codes. UNDEFINED DSC CONTACT ID CODE 104 RESTORE Zone Test/Misc. DSC CID RESTORE. 103 TECHNICIAN Unknown Test/Misc.

Simon XTi Quick Operation Guide

Module 5. Fire and Emergency Alarm System Part I- Basics

PSTN Home Alarm System

Operating Guide. Alert 8D Version 8 Zone Controller Arrowhead Alarm Products Ltd

LCD -based Intelligent Burglar Alarm System. User Guide. Ver 2.0

Solution-16 Operators Manual ISSUE 1.40

HILLS Series LED Code Pad User Manual

tattletale User Guide Consumer unit version P a g e

PhoneWatch Smart Security System User Manual - Domonial

Contents 1. Terms you may neeed to know 2. Keypad Lights 3, 4. Keypad Buttons 5

National Security Systems Inc (800) Security System User's Guide

Transcription:

KEN WCK' PERPECTIVE The Constituents of a ecurity In the article The Basics of a ecurity I introduced a new international model of a security system for home and building automation. This model is part of the Home Electronic, an international standard under development by the member nations of the IO and IEC (International Organization for tandardization and International Electrotechnical Commission). s explained in the prior article, this model extends applications of a security system beyond intrusion detection to include activity monitoring for the elderly and latch-key children, duress notification, and safety monitoring. afety is especially important for commercial customers needing quick notification about environmental pollutants, water leaks, unusual temperature variations, and machinery failures. The concepts of zones and partitions, discussed in the previous article, are traditional in security systems. However, these terms are generalized in the security model to accommodate modern busstructured networks. We now delve further into the security model by exploring the following topics: ensor varieties and technologies Control panels and user interfaces controllers larm devices The physical and logical arrangements of these constituents are illustrated. lso, the possible interaction of a security system with other home automation systems is described. ensors The security model accommodates a range of sensors being market and planned. mong these are: Contact sensor: a switch trips if a door or window is opened. contact sensor may be placed below a mat so it is tripped by someone walking across the mat. coustic sensor (also called a shock sensor): a sensor attached to a window is tripped by the sound of breaking glass. -1- Glass break sensor: a conductive foil used commercially near the edge of a glass pane. If the glass break cuts the foil, a current flow is interrupted indicating a problem to the controller. Motion detector: an infrared device detects temperature changes caused by a person passing across a cone-shaped field in front of the detector. Pick-up coil: an electrical coil buried in a driveway detects large metal objects passing, specifically a car. Photo-electric cell: a photocell detects the interruption of light (visible or infrared) from a source. The photocell is installed at a position where a passing person would interrupt the light. moke detector: the common varieties are photo-electric cell, to detect smoke particles, and ionization, to detect smoke. Heat detector: a sensor that trips upon a prewired or programmed rise in temperature. Water detector: usually placed on the floor to sense flooding. Gas detector: may monitor carbon monoxide, carbon dioxide, or oxides of nitrogen. ome of the sensors listed may be offered with various levels of complexity. For example, there are now dual-tech sensors. Conventional passive infrared sensors can only sense movement tangential to the detector. By contrast, devices using Doppler-shift techniques detect motion towards and away from the detector. Combining passive infrared and, Doppler techniques in a single device and processing the resulting signals provides a good way of improving the discrimination of sensors. ome sensors may be programmable to adjust sensitivity levels and timing characteristics according to the application. lthough some of this processing could be done by the controller, the low cost of electronics frequently permits a considerable degree of signal processing to be done within the sensor.

Control Panels (User Interface) ecurity system control panels are available in many formats: Wall-mounted keypad Typically, this is a numeric key-pad. dditional keys may be provided for special functions. mong these functions are enabling or disabling sensors in a particular zone and selecting the operating mode of the system. ome panels include separate keys for each function. Others require a special sequence of function and numeric keys. The keying procedure affects user convenience and product cost. This model makes no valuejudgment on these market issues. Keypad with voice response Confirmation of user selection at a keypad may be done by a tone, a sequence of tones, or a spoken voice drawn from a synthesized or pre-recorded vocabulary. Computer keyboard few security systems can now be programmed from a personal computer. The system configuration may be entered at the computer and down-loaded into the security controller. nother controller It is possible to program a home automation controller responsible for a different application system (for example, energy management) to set operating parameters in the security system. s security system controller is responsible for: Configuring the sensors into zones and partitions Communicating with the user via control panels Establishing an operating mode for each partition Monitoring the sensors Issuing the appropriate notification or alarms -2- Establishing a telephone or radio link to a monitoring station Monitoring sensor and system integrity Miscellaneous network management and testing Communicating with other home automation controllers Varieties of controllers include: pecialized computer with embedded microcode Personal computer The computer must be kept running all the time to monitor the security sensors and issue alerts according the security mode selected. Fully distributed controller It is possible, though not common, to distribute the functions of a controller among the other elements of security system (sensors, control panels, and alarms). In this case, the controller is a virtual function, not a physical component. The physical model presented here is based on the usual practice of designing a physical controller for a security system. larms ecurity system alarms may include: siren or bells telephone or radio call to a monitoring service or to a specified list of persons The type of alarm depends on the situation requiring notification. s noted in the previous article, this security model may apply to: Intrusion Notification about elderly or latch-key child Medical emergency Panic alarm Forced disarm Fire Gas detection Water leak Temperature extreme Earthquake

Machinery failure trouble The Physical Model of a ecurity The physical elements of the international Home Electronic (HE) security system model are shown in Figure 1. key decision for manufacturers is whether the HE network forms the basis for linking together the security components. Choices include: - Fully HE compatible Every sensor, every alarm, and the controller contain an HE interface. - Partial HE compatible group of sensors or alarms shares a network concentrator. The concentrator includes the HE interface. The concentrators and the controller comprise the HE network. - Isolated network Only the security controller contains an HE interface. The sensors link to the controller via a proprietary network. The communications network interconnecting most security system components sold now is proprietary. ecurity manufacturers are concerned that connections to other systems via a common network will degrade reliability. Most security systems are designed as isolated networks because of concerns for system integrity. Thus, Figure 2 is a physical model according to current practice. In fact, an HE security network could be isolated from all other networks via appropriate choices of private messages or physical devices that isolate subnetworks, each of which uses HE. The security controller may be on a separate bus joined to other home automation applications via a communications router. The router is interposed to provide electrical isolation for an auxiliary power source, such as a battery, supplying part or all of the security system if the mains fail. Power isolation might be limited to critical portions of the security systems. It may not be economical to maintain all sensors active during a power failure. For example, in a mains failure, only the peripheral sensors might be batterybacked to manage the cost of auxiliary power, while the motion detectors would lose power. -3- The Logical Model of a ecurity The logical relationship among these components is illustrated in Figure 3. If the physical model of Figure 2 is implemented, the controller may make the attached components logically visible to the HE network, so Figure 3 still applies. The telephone connection is included because some alarms are issued by calling a preprogrammed telephone number and annunciating the alarm, or using the telephone to report a latch-key child. radio link could substitute for or back up the telephone. Linking ecurity into Home utomation ecurity is one of many application systems possible in a home control network. s shown in Figure 3, the security controller may be linked to other home control systems or to a home coordinator. The coordinator might be responsible for providing common scheduling and interaction among applications. This coordination function may be distributed among the system controllers through sophisticated software, thereby eliminating a separate coordinating controller. The Complete ecurity Model The security system model was successfully balloted by the IO/IEC member countries last year and is being prepared for publication. The complete document includes a section describing messages that are exchanged among the system components: ensors Zone Control Zone Control Partition Control Partition Control larm Partition Control External (nother controller or control panel) National standards bodies and consortia working in home and building automation are urged to adopt this and related application models. ll the models that comprise the Home Electronic standard are generic. This means they apply broadly, can be adapted narrowly, and do not preclude innovative product features. Thus, adopting generic models conserves engineering resources while providing maximum marketing flexibility to position products as unique and worthy of substantial profit margins. Copyright 2007, Kenneth P. Wacks Dr. Kenneth Wacks provides management and engi-

neering consulting in home and building automation to utilities and manufacturers world-wide. He offers impartial and practical advice on business opportunities, network alternatives, and product development. The EI (Electronic Industries lliance) has appointed him chair of the committee establishing international home and building automation standards. For further information, please contact Ken at 9 Pinewood Road, toneham, Massachusetts 02180, U; Tel: (781) 662-6211, Fax: (781) 665-4311, E-mail: kenn@alum.mit.edu. -4-

=larm, Telephone, Radio C=Control Panel =ensor =HE Interface ecurity C C Home Control Medium Other Figure 1. Physical HE ecurity Model -5-

=larm, Telephone, Radio C=Control Panel =ensor =HE Interface C ecurity C Home Control Medium Other Figure 2. Physical HE ecurity Model with Isolated Components Control Panel ensor ensor ensor ecurity larm Telephone Radio Links to other systems or to a home coordinator -6-

Figure 3. Logical Model for HE ecurity -7-