Security Alarm Systems



Similar documents
IP Telephony Basics. Part of The Technology Overview Series for Small and Medium Businesses

Common Questions & Answers

Computer Networking. Definitions. Introduction

1 Introduction to mobile telecommunications

Appendix A: Basic network architecture

WAN Technology. Heng Sovannarith

A SENSIBLE GUIDE TO LATENCY MANAGEMENT

Technical Glossary from Frontier

TAXONOMY OF TELECOM TERMS

Security and Risk Analysis of VoIP Networks

WAN Data Link Protocols

Voice over IP Networks: Ensuring quality through proactive link management

CTS2134 Introduction to Networking. Module 07: Wide Area Networks

Fixed Wireless Broadband

Special Conditions and Service Description for amaysim Mobile Broadband

Alarm Systems Using Wireless or Other Transmission Technology as a Single Path of Communication. Purpose. References. Description of Code Reference

Over the PSTN... 2 Over Wireless Networks Network Architecture... 3

Alarm over IP. What is Alarm over IP? How does Alarm over IP work? Intrusion Systems White Paper Series Alarm over IP

Voice Over IP Digital Phone Concerns with Security and Fire Alarm Communications Systems

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

Access the Test Here

CHAPTER 1 1 INTRODUCTION

Advanced Higher Computing. Computer Networks. Homework Sheets

GPRS and 3G Services: Connectivity Options

Press release. NBN Solution from Bosch Security Systems

GSM Voice Auto Dialer & SMS Sender JC-999

How To Create An Intelligent Infrastructure Solution

Chapter 1 Instructor Version

OVERVIEW OF THE TELEGUARD HOME SECURITY SYSTEM

CMPT 165: The Internet, Part 3

HMS Industrial Networks

How Small Businesses Can Use Voice over Internet Protocol (VoIP) Internet Technology for Voice Communications

Region 10 Videoconference Network (R10VN)

Top 11 Concerns When Buying a VoIP Business Phone System. What You Need to Know Before You Invest

White Paper ON Dual Mode Phone (GSM & Wi-Fi)

The part of the network that connects customers to the exchange, sometimes called the local loop or the last mile.

Configure Policy-based Routing

NeoConnect Home Suite

CCNA Discovery Chapter Four

Home Passport Gateway Series Simplify your Life with Smart Solutions

Dell NetReady Mobile Broadband Service User's Guide

High Speed and Voice over I.P September 1, 2005

NETWORKING TECHNOLOGIES

January Brennan Voice and Data Pty Ltd. Service Level Agreement

communication over wireless link handling mobile user who changes point of attachment to network

Wireless Network Standard and Guidelines

Measuring Wireless Network Performance: Data Rates vs. Signal Strength

ADSL or Asymmetric Digital Subscriber Line. Backbone. Bandwidth. Bit. Bits Per Second or bps

GPRS / 3G Services: VPN solutions supported

Function Description Ascom IP-DECT System

Appendix 1: Satellite broadband service providers

Domonial, le Sucre. Easy to Use Intruder Detection Systems

Introduction to Computer Networks and Data Communications

Computer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1

GSM COMMUNICATORS CATALOGUE

FRANKFORT PLANT BOARD CABLE MODEM INTERNET BROADBAND INTERNET SERVICE DISCLOSURES

NBN Frequently Asked Questions NBN Information Pack for Safety Link Clients

Optimizing Enterprise Network Bandwidth For Security Applications. Improving Performance Using Antaira s Management Features

Security Technician Certification Program

Firmware version: 1.10 Issue: 7 AUTODIALER GD30.2. Instruction Manual

Market Growth and New Regulations Demand Network Modernization

NETWORK MANAGEMENT DISCLOSURE

White Paper. D-Link International Tel: (65) , Fax: (65) Web:

Understanding Eligible Services

HANDBOOK 8 NETWORK SECURITY Version 1.0

Alarm over IP. IRIS Touch Home Installation Manual. Version 1.0 ENGLISH. Now certified and compliant with EN50131, EN50136 Security Grade 4 ATS6

Technical papers Virtual private networks

UL s Perspective on IP Signaling Larry Shudak Principal Engineer Signaling and Security Control Equipment Underwriters Laboratories Inc.

New UL 864 & NFPA th Edition Fire Alarm Control Panel (FACP) AND. Cellular Communication Regulation Advancements

Network Management System (NMS) FAQ

LOCAL RADIO STATION MODEL VULNERABILITY ASSESSMENT CHECKLIST. Developed by the Toolkit Working Group for the Media Security and Reliability Council

Are you getting the speed that you pay for? Understanding Internet Speeds

Voice Over IP. MultiFlow IP Phone # 3071 Subnet # Subnet Mask IP address Telephone.

Conditions of Service SkyMesh Phone Table of contents

Information Delivery for Remote Monitoring Systems. An Analysis of Communication Platforms

IP/MPLS VPN SERVICE - ADDITIONAL TERMS & CONDITIONS to the IP/MPLS Service Addendum

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

Network Security. Vorlesung Kommunikation und Netze SS 10 E. Nett

RAS Associates, Inc. Systems Development Proposal. Scott Klarman. March 15, 2009

Network Design. Yiannos Mylonas

Discovering Computers Chapter 9 Communications and Networks

Telemetry system for cathodic protection equipment of underground metal pipelines

Packetized Telephony Networks

CPNI VIEWPOINT 03/2007 HOSTED VOICE OVER IP

VST-1815Z IP V-Alarm System VST-1852Z IP/GPRS V-Alarm System

HMS Industrial Networks. Putting industrial applications on the cloud

Teldat Security IP & Wireless GSM/GPRS Alarm Communicators

Transcription:

Security Alarm Systems Monitored alarm systems offer clients peace of mind as they activate on intrusion or tampering at the property and ensure any security alarm will have an appropriate response. However, many clients don t understand how to differentiate between the various types of alarm systems currently on the market. Whilst the onsite detection technology has remained relatively constant in recent times, there has been significant change in the methods employed to transmit the alarm to a monitoring facility. To add to this confusion is Telstra s Securitel network, which will cease operations at the end of 2009. Businesses searching for replacement systems should be made aware of the new Australian Standard, which will allow informed decisions based on the level of reliability, availability and supervision that their business would need from a monitored security system. The introduction of AS/NZ 2201.5-2008 Intruder Alarm Systems Part 5 Alarm Transmission Systems has standardised the terminology for alarm transmission systems. The standard allows alarm systems to be classified and tested to ensure they meet the standard. Class 1 is considered the lowest reliable alarm transmission from the protected building to the alarm monitoring facility and Class 5 being the highest. Note that the standard refers only to the way the alarm is transmitted to the monitoring facility, and doesn t refer to issues such as coverage, local alarming or the type of equipment used for alarming. These five classes are determined by: Transmission Time The time it takes for the alarm to be sent from the panel (customer) to the centre s receiving equipment (monitoring centre). Average Delay Time 120 sec 90 sec 60 sec 30 sec 10 sec Transmission Supervision The maximum time it takes before the monitoring centre detects that the alarm transmission system has failed communication from the panel to the centre s receiving equipment. Average Time 8 days 25 hours 120 sec 60 sec 20 sec Page 1

System Availability System Availability is dependent on how often the communication path is available and reliable during the year. This availability could be due to faults in the system, transmission times exceeding maximum delays or any downtime due to maintenance on the system. Availability Average 97% p.a 98% p.a 99% p.a 99.7% p.a 99.95% p.a Signalling Security The measures implemented to prevent or detect deliberate attempts to interfere with the transmission of an alarm signal. Refer to the standard for complete details. After understanding how each alarm system is classified, the next phase is to determine which class of alarm transmission is needed, with consideration given to the likelihood and severity of an attack occurring to the premises. Although there are various alarm systems on the market, the security alarm system can only reach the monitoring centre in four ways. 1. Phone Network (PSTN); 2. Mobile Phone Network (GSM); and 3. Internet Network (IP) 4. Mobile & Internet Network (GPRS) What businesses should also be made aware of is that many new alarm transmission systems use multi-path combinations so that if the primary communication path is unavailable, the signal automatically gets transmitted via the next pathway. Therefore many of the alarm system networks interrelate and are used as a back-up if the primary signal fails. The tables on the following pages provide the advantages and disadvantages of the various alarm transmission methods used. What should you do about your alarm? To be comfortable that you have an appropriate security system that you can rely upon, we recommend you determine the class of security alarm transmission that is right for your business, based on the standard AS2201.5. This would depend on the nature of your business and any preference your insurer may have. For example, a company handling high value security goods or significant quantities of cash will need a more reliable alarm transmission than other businesses. But of course this will come at a cost. Contact your security alarm provider and ask what class does your current alarm system comply. If necessary, work with your security company to investigate costs to upgrade, particularly if you currently use the Securitel technology. Page 2

Networks Products Description Advantages Disadvantages Phone Network Digital Dialler / PSTN This system uses existing telephone lines to communicate with the monitoring centre. Cost effective. Entirely relies on the phone line network. Phone lines can be disrupted accidentally or purposely cut, thus the signal will not reach the monitoring centre. Are vulnerable to wiring problems and network congestion. Mobile Phone Monitoring GSM Utilises existing telephone lines and the mobile telephone network to report any alarms. It is mainly used as a back-up if a loss in the telephone line occurred. With a GSM signal transmission, three different technologies can be used SMS, Voice & Data. Needs good mobile coverage. Environmental issues may interfere with GSM signal. Requires a SIM card to operate. Does not give a polled service. GSM jamming devices are now commonly available on the open market. Internet Monitoring IP IP signalling uses exactly the same infrastructure as browsing the Internet, or connecting to a central server in a large organisation. Signals are sent down an Ethernet cable and via a router to their destination. It operates similarly to a GPRS except that monitoring charges are Page 3 The benefit of this system is that it communicates over the internet which can be backed up by a GPRS and PSTN. There is constant Requires a constant and reliable connection to an Internet Service Provider (ISP). IP alarm signalling uses the same infrastructure as if browsing the web and therefore it is imperative to ensure network security is in

Networks Products Description Advantages Disadvantages reduced since it isn t making a call compared to phone and mobile networks. The three main IP networks that are currently being used by the security industry are Public Internet, Virtual Private Networks and Enterprise or private networks. control over the connection between the secured building and the monitoring centre. The receiver and the interface constantly check their connection in set variable intervals (pings). place, and no viruses or worms or any other problems sometimes associated with the Internet, can get into the system via the IP alarm signalling. IP network availability, bandwidth and reliability are all major concerns for any alarm transmission system. Mobile & Internet Network GPRS GPRS devices use the GSM network to achieve wireless connection to the Internet. It provides a polled service at a predetermined interval thus mitigating the risk of the panel being disabled. Provides moderate speed data transfer. A jamming device used at a GPRS only monitoring site will result in a loss of poll alarm at the control room, which can be identified and actioned. When the client location is far from the cell tower, the connection speed drops logarithmically with distance from the base station. GPRS networks are still subject to tower failures, poor signal strength, network congestion and atmospheric conditions. Jamming device blocking all GPRS communication to a control room. GPRS devices do not support audio/voice communications. Table 1 Alarm Transmissions Page 4

Abbreviations Definitions PSTN GPRS GSM VoIP IP Permaconn Public Switch Telephone Network General Packet Radio Service Global System for Mobile communication Voice over IP Internet Protocol Derived from Permanent Connection Table 2 Glossary Page 5