Alarm System Report

29
1 1.0 INTRODUCTION OF BURGLAR ALARM SYSTEM . Burglar alarms are systems designed to detect unauthorized entry into a building or area. They consist of an array of sensors, a control panel and alerting system, and interconnections. Sensors detect intruders by many methods such as monitoring door and window contacts, by  passive infrared motion detectors, ultrasound, vibration, electric or magnetic fields, or microwaves. Sensors may be directly wired to a control panel that provides sensor power, or may communicate wirelessly . Some alarm systems serve a single purpose of burglar or fire protection. Combination systems provide both fire and intrusion protection. Intrusion alarm systems may also be combined with closed-circuit television surveillance systems to automatically record the activities of intruders, and may interface to access control systems for electrically locked doors. Systems range from small, self-contained noisemakers, to complicated, multi-zoned systems with color-coded computer monitor outp uts. Burglar alarm are used in residential, industrial, and commercial properties for protection against theft or property damage.

Transcript of Alarm System Report

Page 1: Alarm System Report

8/3/2019 Alarm System Report

http://slidepdf.com/reader/full/alarm-system-report 1/29

1

1.0  INTRODUCTION OF BURGLAR ALARM SYSTEM

Burglar alarms are systems designed to detect unauthorized entry into a building or area.

They consist of an array of sensors, a control panel and alerting system, and interconnections.

Sensors detect intruders by many methods such as monitoring door and window contacts, by

  passive infrared motion detectors, ultrasound, vibration, electric or magnetic fields, or 

microwaves. Sensors may be directly wired to a control panel that provides sensor power, or may

communicate wirelessly.

Some alarm systems serve a single purpose of burglar or fire protection. Combination

systems provide both fire and intrusion protection. Intrusion alarm systems may also be

combined with closed-circuit television surveillance systems to automatically record the

activities of intruders, and may interface to access control systems for electrically locked doors.

Systems range from small, self-contained noisemakers, to complicated, multi-zoned systems

with color-coded computer monitor outputs.

Burglar alarm are used in residential, industrial, and commercial properties for protection

against theft or property damage.

Page 2: Alarm System Report

8/3/2019 Alarm System Report

http://slidepdf.com/reader/full/alarm-system-report 2/29

2.0 PURPOSE OF PROJECT

A Burglar Alarm is widely used to create a warning signal(siren that renders very loud

noise), which makes it become very easy to scare off the burglars.Burglar Alarm System is a

must for most of the houses or business as it provides first line of defence from the Burglars.

Statistics shows that individuals who have no burglar alarm system installed in their home or 

 business tend to be burglarized more than those who have burglar alarm system.

Installing a capable alarm system will go a long way to decrease the chance of coming

home to find that you have been burgled. If any intruder wants to enter the home through the

door or window without permission, home owner would be instantly alerted by the burglar 

alarm.

The main purpose of the burglar alarm systems are to avoid break-ins, but other advanced

models are built to keep your home safe from other threats. Compared to burglar alarms a few

years back, home burglar alarm system nowadays are highly advanced and more sophisticated.

These gadgets are especially designed to protect your homes from any harm or threats.

A burglar alarm system may be used for other than one purpose, such as detecting

suspicious movement since they can also be used for multiple purposes as well. These include,

fire, safety alarms, as well as intrusion. These can also be used simultaneously as well.

Page 3: Alarm System Report

8/3/2019 Alarm System Report

http://slidepdf.com/reader/full/alarm-system-report 3/29

3.0 APPLICATION DRAWING OF ALARM SYSTEM

3.1:- Application Drawing Of Alarm System

This burglar alarm system circuit is using a infrared proximity detector that triggers an

alarm when the rays falling on its sensor are interrupted. It is different from others burglar alarm

systems because is a very simple diy project and can offer you great satisfaction.

The circuit of IR burglar alarm system comprises transmitter and receiver-cum-alarm

sections. It works off 6V DC, 500mA uninterrupted supply and uses low-cost readily-available

electronic components. LED2 is used for indicating power-on. Check out the infrared alarm

circuit too.

The transmitted IR signal directly falls on IR sensor TSOP1738. Whenever the IR signal

is interrupted, its output pin 3 goes low and IC2 is triggered at pin 5 through transistor T2. As a

result, its output at pin 7 goes low (for a preset time) to forward bias siren-driver transistor T2.

This condition is indicated by the glowing of LED1. The time-out period can be increased or 

decreased by changing the value of capacitor C6.

Page 4: Alarm System Report

8/3/2019 Alarm System Report

http://slidepdf.com/reader/full/alarm-system-report 4/29

The output tone of siren-sound generator IC3 can be set by connecting its pin 6 to either 

Vcc or GND.When pin 6 is connected to Vcc IC3 produces the sound of fire-alarm siren, but

when you connect it to GND it produces the sound of ambulance siren.

Page 5: Alarm System Report

8/3/2019 Alarm System Report

http://slidepdf.com/reader/full/alarm-system-report 5/29

4.0 SYSTEM OPERATION OF ALARM

4.1:- System Operation Of Alarm

The operation of a burglar alarm is the same that of an electric circuit. This principle

works in the same way with burglar alarms. The only difference is that the movements of an

intruder will be detected by the switch. If an intruder breaks in a house through a door or 

window, his movements will be detected by a switch which will trigger the burglar alarm.

Page 6: Alarm System Report

8/3/2019 Alarm System Report

http://slidepdf.com/reader/full/alarm-system-report 6/29

There are 2 categories of circuits:the closed-circuit as well as the open-circuit system. In

a closed circuit system, when a door or window is shut, the electric circuit is closed. This means

that electricity can flow from one end to another in the circuit. But when the door or window is

opened by an intruder, the circuit will be open, thus the alarm will be triggered. This works

opposite in an open-circuit system. The alarm will instead be triggered when the door or window

is closed. The alarm will sound once the circuit is closed.

In knowing about burglar alarms and how they work, one should recognize the magnetic

sensor and know how it works. The magnetic sensor is composed of:

1. A battery that is powering the circuit

2. A spring-driven switch made of metal that is built onto a door or window frame

3. A magnet that is embedded in the door or window, also lined up with the switch

4. A buzzer that is powered separately with a relay-driven switch

When magnetic sensor will detect the movements in the door or window, it would send

signals to the control box which would in turn send a signal to the alarm device, such as a bell.

The bell will sound the alarm, which will frighten the intruder or make him go away. The control

  box also can send a signal to the police department so that they can come and apprehend the

intruder. This is located in a safe place so that the intruder cannot find and disengage it.

Page 7: Alarm System Report

8/3/2019 Alarm System Report

http://slidepdf.com/reader/full/alarm-system-report 7/29

5.0 TYPES OF COMPONENT AND SPECIFICATION OF SENSOR 

Sensor types

a) 

Indoor-These types of sensors are designed for indoor use. Outdoor use would not beadvised due to false alarm vulnerability and weather durability

 b)  Outdoor- These types of sensors would be found most of the time mounted on fences or 

installed on the perimeter of the protected area.

a)  Indoor

i. 

Passive infrared detectors

The passive infrared detector (PIR) is one of the most common detectors found in

household and small business environments because it offers affordable and reliable

functionality. The term  passive means the detector is able to function without the need to

generate and radiate its own energy (unlike ultrasonic and microwave volumetric

intrusion detectors that are ³active´ in operation).

PIRs are able to distinguish if an infrared emitting object is present by first learning the

ambient temperature of the monitored space and then detecting a change in the

temperature caused by the presence of an object. Using the principle of differentiation,

which is a check of presence or nonpresence, PIRs verify if an intruder or object is

actually there. Creating individual zones of detection where each zone comprises one or 

more layers can achieve differentiation. Between the zones there are areas of no

sensitivity (dead zones) that are used by the sensor for comparison.

ii.  Ultrasonic detectors

Using frequencies between 15 kHz and 75 kHz, these active detectors transmit ultrasonic

sound waves that are inaudible to humans. The Doppler shift principle is the underlying

method of operation, in which a change in frequency is detected due to object motion.

Page 8: Alarm System Report

8/3/2019 Alarm System Report

http://slidepdf.com/reader/full/alarm-system-report 8/29

This is caused when a moving object changes the frequency of sound waves around it.

Two conditions must occur to successfully detect a Doppler shift event:

y  There must be motion of an object either towards or away from the receiver.

y  The motion of the object must cause a change in the ultrasonic frequency to the

receiver relative to the transmitting frequency.

The ultrasonic detector operates by the transmitter emitting an ultrasonic signal into the

area to be protected. The sound waves are reflected by solid objects (such as the

surrounding floor, walls and ceiling) and then detected by the receiver. Because

ultrasonic waves are transmitted through air, then hard-surfaced objects tend to reflect

most of the ultrasonic energy, while soft surfaces tend to absorb most energy.

When the surfaces are stationary, the frequency of the waves detected by the receiver will

 be equal to the transmitted frequency. However, a change in frequency will occur as a

result of the Doppler principle, when a person or object is moving towards or away from

the detector. Such an event initiates an alarm signal. This technology is considered

obsolete by many alarm professionals, and is not actively installed

iv.  Microwave detectors

This device emits microwaves from a transmitter and detects any reflected microwaves or 

reduction in beam intensity using a receiver. The transmitter and receiver are usually

combined inside a single housing (monostatic) for indoor applications, and separate

housings (bistatic) for outdoor applications. To reduce false alarms this type of detector is

usually combined with a passive infrared detector or "Dualtec" alarm.

Microwave detectors respond to a Doppler shift in the frequency of the reflected energy,

 by a phase shift, or by a sudden reduction of the level of received energy. Any of these

effects may indicate motion of an intruder.

Page 9: Alarm System Report

8/3/2019 Alarm System Report

http://slidepdf.com/reader/full/alarm-system-report 9/29

v.  Glass break detectors

The glass break detector may be used for internal perimeter building protection. When

glass breaks it generates sound in a wide band of frequencies. These can range from

infrasonic, which is below 20 hertz (Hz) and can not be heard by the human ear, through

the audio band from 20 Hz to 20 kHz which humans can hear, right up to ultrasonic,

which is above 20 kHz and again cannot be heard. Glass break acoustic detectors are

mounted in close proximity to the glass panes and listen for sound frequencies associated

with glass breaking. Seismic glass break detectors are different in that they are installed

on the glass pane. When glass breaks it produces specific shock frequencies which travel

through the glass and often through the window frame and the surrounding walls and

ceiling. Typically, the most intense frequencies generated are between 3 and 5 kHz,depending on the type of glass and the presence of a plastic interlayer. Seismic glass

 break detectors ³feel´ these shock frequencies and in turn generate an alarm condition.

The more primitive detection method involves gluing a thin strip of conducting foil on

the inside of the glass and putting low-power electrical current through it. Breaking the

glass is practically guaranteed to tear the foil and break the circuit.

vi. 

Smoke, heat, and carbon monoxide detectors

Most systems may also be equipped with smoke, heat, and/or carbon monoxide detectors.

These are also known as 24 hour zones (which are on at all times). Smoke detectors and

heat detectors protect from the risk of fire and carbon monoxide detectors protect from

the risk of carbon monoxide. Although an intruder alarm panel may also have these

detectors connected, it may not meet all the local fire code requirements of a fire alarm

system.

Page 10: Alarm System Report

8/3/2019 Alarm System Report

http://slidepdf.com/reader/full/alarm-system-report 10/29

10

b)  Outdoor

i.  inertia sensors

These devices are mounted on barriers and are used primarily to detect an attack on thestructure itself. The technology relies on an unstable mechanical configuration that forms

 part of the electrical circuit. When movement or vibration occurs, the unstable portion of 

the circuit moves and breaks the current flow, which produces an alarm. The technology

of the devices varies and can be sensitive to different levels of vibration. The medium

transmitting the vibration must be correctly selected for the specific sensor as they are

 best suited to different types of structures and configurations.

A rather new and unproven type of sensors use piezo-electric components rather than

mechanical circuits, which can be tuned to be extremely sensitive to vibration.

y    pros: Very reliable sensors, low false alarm rate and middle place in the price

range.

y  cons: Must be fence mounted. The rather high price deters many customers, but

its effectiveness offsets its high price. Piezo-electric sensors are a new technology

with an unproven record as opposed to the mechanical sensor which in some

cases has a field record in excess of 20 years.

ii.  Passive magnetic field detection

This buried security system is based on the Magnetic Anomaly Detection principle of 

operation. The system uses an electromagnetic field generator powered by two wires

running in parallel. Both wires run along the perimeter and are usually installed about

5 inches apart on top of a wall or about 12"/30 cm below ground. The wires are

connected to a signal processor which analyzes any change in the magnetic field.

This kind of buried security system sensor cable could be embedded in the top of almost

any kind of wall to provide a regular wall detection ability, or can be buried in the

ground. They provide a very low false alarm rate, and have a very high chance of 

Page 11: Alarm System Report

8/3/2019 Alarm System Report

http://slidepdf.com/reader/full/alarm-system-report 11/29

11

detecting real burglars. However, they cannot be installed near high voltage lines, or 

radar transmitters.

iii.  E-field

This proximity system can be installed on building perimeters, fences, and walls. It also

has the ability to be installed free standing on dedicated poles. The system uses an

electromagnetic field generator powering one wire, with another sensing wire running

  parallel to it. Both wires run along the perimeter and are usually installed about 800

millimetres apart. The sensing wire is connected to a signal processor that analyses:

y  amplitude change (mass of intruder),

y  rate change (movement of intruder),

y   preset disturbance time (time the intruder is in the pattern).

These items define the characteristics of an intruder and when all three are detected

simultaneously, an alarm signal is generated.

The barrier can provide protection from the ground to about 4 metres of altitude. It is

usually configured in zones of about 200 metre lengths depending on the number of 

sensor wires installed.

y   pros: concealed as a buried form.

y  cons: expensive, short zones which mean more electronics (more money), high

rate of false alarms as it cannot distinguish a cat from a human. In reality it does

not work that well, as extreme weather causes false alarms.

iv.  Microwave barriers

The operation of a microwave barrier is very simple. This type of device produces an

electromagnetic beam using high frequency waves that pass from the transmitter to the

receiver, creating an invisible but sensitive wall of protection. When the receiver detects

a difference of condition within the beam (and hence a possible intrusion), the system

Page 12: Alarm System Report

8/3/2019 Alarm System Report

http://slidepdf.com/reader/full/alarm-system-report 12/29

12 

  begins a detailed analysis of the situation. If the system considers the signal a real

intrusion, it provides an alarm signal that can be treated in analog or digital form.

y   pros:low cost, easy to install, invisible perimeter barrier, unknown perimeter limits to

the intruder.

y  cons:extremely sensitive to weather as rain, snow and fog for example would cause

the sensors to stop working, need sterile perimeter line because trees, bushes or 

anything that blocks the beam would cause false alarm or lack of detection.

v.  Microphonic systems

Microphonic based systems vary in design but each is generally based on the detection of 

an intruder attempting to cut or climb over a chainwire fence. Usually the microphonic

detection systems are installed as sensor cables attached to rigid chainwire fences,

however some specialised versions of these systems can also be installed as buried

systems underground. Depending on the version selected, it can be sensitive to different

levels of noise or vibration. The system is based on coaxial or electro-magnetic sensor 

cable with the controller having the ability to differentiate between signals from the cable

or chainwire being cut, an intruder climbing the fence, or bad weather conditions.

The systems are designed to detect and analyse incoming electronic signals received from

the sensor cable, and then to generate alarms from signals which exceed preset

conditions. The systems have adjustable electronics to permit installers to change the

sensitivity of the alarm detectors to the suit specific environmental conditions. The tuning

of the system is usually accomplished during commissioning of the detection devices.

y   pros: very cheap, very simple configuration, easy to install.

y  cons: some systems have a high rate of false alarms because some of these sensors

might be too sensitive. Although systems using DSP (Digital Signal Processing) will

largely eliminate false alarms on some cases.

Page 13: Alarm System Report

8/3/2019 Alarm System Report

http://slidepdf.com/reader/full/alarm-system-report 13/29

13 

vi.  Taut wire fence systems

A taut wire perimeter security system is basically an independent screen of tensioned

tripwires usually mounted on a fence or wall. Alternatively, the screen can be made so

thick that there is no need for a supporting chainwire fence. These systems are designed

to detect any physical attempt to penetrate the barrier. Taut wire systems can operate with

a variety of switches or detectors that sense movement at each end of the tensioned wires.

These switches or detectors can be a simple mechanical contact, static force transducer or 

an electronic strain gauge. Unwanted alarms caused by animals and birds can be avoided

  by adjusting the sensors to ignore objects that exert small amounts of pressure on the

wires. This type of system is vulnerable to intruders digging under the fence. A concrete

footing directly below the fence is installed to prevent this type of attack.

y   pros: low rate of false alarms, very reliable sensors and high rate of detection.

y  cons: Very expensive, complicated to install and old technology.

vii.  Fibre optic cable

A fibre-optic cable can be used to detect intruders by measuring the difference in the

amount of light sent through the fibre core. If the cable is disturbed, light will 'leak' out

and the receiver unit will detect a difference in the amount of light received. The cable

can be attached directly to a chainwire fence or bonded into a barbed steel tape that is

used to protect the tops of walls and fences. This type of barbed tape provides a good

  physical deterrent as well as giving an immediate alarm if the tape is cut or severely

distorted. Other types work on the detection of change in polarization which is caused by

fiber position change.

y   pros: very similar to the Microphonic system, very simple configuration, easy to install.

y  cons: high rate of false alarm or no alarms at all for systems using light that leaks out of 

the optical fiber. The polarization changing system is much more sensitive but false

alarms depend on the alarm processing.

Page 14: Alarm System Report

8/3/2019 Alarm System Report

http://slidepdf.com/reader/full/alarm-system-report 14/29

14 

viii.  H-field

This system employs an electro-magnetic field disturbance principle based on two

unshielded (or 'leaky') coaxial cables buried about 10±15 cm deep and located at about 1

metre apart. The transmitter emits continuous Radio Frequency (RF) energy along one

cable and the energy is received by the other cable. When the change in field strength

weakens due to the presence of an object and reaches a pre-set lower threshold, an alarm

condition is generated. The system is unobtrusive when it has been installed correctly,

however care must be taken to ensure the surrounding soil offers good drainage in order 

to reduce nuisance alarms.

y   pros: concealed as a buried form.

y  cons: can be affected by RF noise, high rate of false alarms, hard to install.

Page 15: Alarm System Report

8/3/2019 Alarm System Report

http://slidepdf.com/reader/full/alarm-system-report 15/29

15 

6.0 INSTALLATION SYSTEM OF ALARM

6.1:- Installation System Of Alarm

Because all switches in this closed-circuit system are in a wiring loop, opening any one of 

them breaks the loop and triggers the bell-ringing circuit. 

Some home security systems are complex and should be installed by a professional. However,

there are many good home security systems sold in kit forms that can be installed by any do-it-

yourselfer. Most simple systems use a bell, loud buzzer, or other sound source to note intrusion.

Installation involves mounting the sound source or sounder in a location where it can be easily

heard. Then attach a circuit of switches to the sounder and connect a battery to the system. Since

the sounder operates from the battery, it remains an effective alarm system even in the event of a

  power failure. Alternately, battery-operated remote wireless sensors and controls can be

installed. However, make sure that batteries are replaced regularly.

Page 16: Alarm System Report

8/3/2019 Alarm System Report

http://slidepdf.com/reader/full/alarm-system-report 16/29

16 

In electrical terminology, this alarm system is called a closed-circuit system. When the doors and

windows are shut, the attached switches are closed. Because all the switches are in a wiring loop,

opening any one of them breaks the loop and triggers the sounder circuit. Simply closing the

door or window, moreover, does not restore the switch loop circuit continuity and does not stop

the sound until either the battery becomes exhausted or someone switches off the circuit from

 battery to sounder.

There is an electronic switch built into the sounder. This switch is turned on by breaking the

magnetic-switch loop. A key-operated switch in the sounder circuit allows you to turn the alarm

system completely off when it is not needed. Also, once the alarm goes on, operating the key

switch is the only way to silence the sounder. Only someone who has a key to the switch can

reset the system.

The switch device consists of two parts that look much alike: one small plastic box that contains

a strong magnet, and another that contains the actual switch. When magnet and switch are not

near each other, the switch contacts are separated and the switch is open. On the other hand,

when the magnet and switch are near each other, the switch contacts move together and the

switch closes. The magnet part of the device is screwed to a door or window, and the switch part

is screwed to the door or window frame. Thus, opening a door or window separates magnet from

switch, causing the switch to open and trigger the alarm.

Page 17: Alarm System Report

8/3/2019 Alarm System Report

http://slidepdf.com/reader/full/alarm-system-report 17/29

17 

6.2 :- Closed Circuit System

This closed-circuit system is connected to a key switch, alarm bell, and batteries . 

The three electronic parts that comprise the solid-state switch of the alarm sounder are mounted

on a circuit board. Under the circuit board are a solenoid coil and a plunger that strikes the bell or 

activates the electronic sounder. Below the coil is a set of breaker points that causes the plunger 

to vibrate up and down, activating the sound source.

Installing the Components

Install the sounder first. Decide where you want it located -- either to attract the most attention

for help or to scare away an intruder. If you decide to mount the sounder outdoors, you must drill

a hole through the wall for the wires. To shield the sounder from the weather, you should install

it in a protective metal box of the type made especially for alarm sounders. Inside the box is a

 bracket for mounting a tamper switch that sets off the alarm system if someone tries to open the

alarm sounder box. Located in the side of the box is the key switch that allows a person with a

key (but no one else) to activate, service, reset, or deactivate the alarm system.

Page 18: Alarm System Report

8/3/2019 Alarm System Report

http://slidepdf.com/reader/full/alarm-system-report 18/29

18 

If you want the sounder to be located indoors, you need not install it in a protective metal box.

Mount the sounder on the wall in a place where it can be heard easily. Placing an indoor sounder 

in a closet or other confined space is not recommended.

The kit should include a mounting backplate attached to the sounder by a mounting screw.

Remove the nut and separate the backplate from the sounder. You will see a pattern of holes in

the backplate. Using wood screws, toggle bolts, or other suitable fasteners, attach the plate to the

wall at the place you have chosen to position the sounder. Mount the backplate with enough

fasteners to hold the sounder solidly in place. Make sure that the plate is mounted right side up,

and that the correct side is forward. There is usually a tongue on the backplate that should be at

the top when it is mounted properly. Do not connect the sounder to the backplate until later. You

will find that the protective box for an outdoor installation already contains a built-in backplate.Mount the box in the desired location.

 Next, install the door and window switches. The magnet part goes on the door or window, while

the switch part goes on the window frame or doorjamb. Use the mounting screws in the kit to

attach the parts. Try to position the two parts of the switch so that they are close together --

almost touching -- when the window or door is closed, and widely separated when the door or 

window starts to open.

If you wish, you can include fire sensor switches in the loop of entry-detection switches. Use the

kind of fire sensor switch that breaks the loop when the air temperature in its vicinity reaches

135 degrees Farenheit.

Since that is more than the air temperature is ever likely to reach normally -- except in attics,

furnace rooms, or over wood or coal stoves or other high-heat producers -- you will never 

experience false alarms during hot weather. Install 190 degrees Farenheit sensors in normally hot

locations. You should mount the fire sensor switches in the spots where you feel they will be

most effective. There is no reason why you cannot put one or more sensor in every room that is

 being wired for the security system.

Consider using current-conducting window foil tape for additional security. Silver foil with a

self-adhesive backing is probably available where you purchase your alarm system. It is designed

Page 19: Alarm System Report

8/3/2019 Alarm System Report

http://slidepdf.com/reader/full/alarm-system-report 19/29

19 

to trigger the alarm if an intruder breaks the glass in a door or a window. During installation,

make sure there are no breaks in the foil that you stick on the glass; the tape must be continuous.

Self-adhesive foil terminals or connectors at the ends of the foil tapes let you connect the loop

circuit wiring, and a flexible door cord allows you to open a foil-taped door or window without

setting off the alarm system.

Page 20: Alarm System Report

8/3/2019 Alarm System Report

http://slidepdf.com/reader/full/alarm-system-report 20/29

20

7.0 PERIODIC MAINTENANCE OF BURGLAR ALARM

Burglar alarms are one of the most significant ways to deter the intruders from home. These

alarms work even in the absence of the homeowners and thus enhance the security of the house.

However, the alarm systems generally use intricate sensors and other sophisticated devices that

need regular maintenance. Therefore, these alarms should be maintained properly to get optimum

 performance from them.

Components of Burglar Alarms

The entire burglar alarm system comprises of several parts.

» Control panel

» Keyboard

» Sensors

» Motion detectors

» Siren

» Flash light

Why regular maintenance of burglar alarm is important?

Burglar alarms have several components that collaborate with each other to provide the optimum

security solution. However, as they work together, it becomes very important to monitor their 

activities at regular interval. Otherwise, the alarm may either sound falsely or may not set off at

all.

In both these occasions, the homeowners will find themselves in great trouble. Since the use of the home alarm system is necessary in emergency, homeowners often don¶t have the time or 

scope to repair them and start operating them. So, it is important that professional people inspect

the alarm systems to find faults.

Page 21: Alarm System Report

8/3/2019 Alarm System Report

http://slidepdf.com/reader/full/alarm-system-report 21/29

21

7.1:- Maintenance Of Burglar Alarm

Some maintenance tips

Though the complicated issues of the burglar alarm system must be fixed by professional service

  providers, there are some basic steps that the users of these alarms can take to enhance the

functionality.

i.  The homeowners should have a look at the entire system for visible signs and damages. If 

they can detect anything, they should contact the service providers.

ii.  Some of the security system requires power from batteries. While using such system, the

users should replace the batteries at regular interval.

iii.  The users must clean the system regularly. Here, cleaning only refers to the standard

wiping that the users can perform.

iv.  Users must follow the instructions printed in the manuals. They are meant to optimize the

 performance of the alarm system. So, if a user does not follow them, there is a chance of 

damaging the system.

Page 22: Alarm System Report

8/3/2019 Alarm System Report

http://slidepdf.com/reader/full/alarm-system-report 22/29

22 

v.  Finally, users must keep a close eye at the way the entire system is working. If there is

even a slight discrepancy, it will be wise not to overlook it. The service providers should

contact the customer cares immediately to solve the problem

Page 23: Alarm System Report

8/3/2019 Alarm System Report

http://slidepdf.com/reader/full/alarm-system-report 23/29

23 

8.0 CONCLUSION

ADT burglar alarm system has become pop in every house non only of its services but

also helps its customers to enjoy other benefits. These alarms can be used in unlike places and

can also be used in an individual¶s vehicle to stop theft and prevent his car from being robbed.

The alarm systems can be concealed in the car or a vehicle which comes to life when it is

tampered by some one and thus alerts the car proprietor from taking an immediate action. The

device makes a tremendous noise when a alien comes in contact with it; the noise is controlled

  by the vehicle owner by using a remote control keychain. The ADT alarm systems ar really

effective against a break-in by an unknown unknown and one can really count on it during a loot

or robbery at one¶s house.

A part from making a siren, the burglar systems are also used to lock the doors of the car 

and prevent the car from being used. The car burglar system not only makes noise but also

 prevents valuable assets which could be inside the car from being robbed. No doubt that these

system is camouflage and can be installed where ever you need them.

There are also some alarms which consists advanced technology which gives immediate

response to the cops. These alarm systems non only makes a noise during an illegal operation but

also sends a signal to the cops warning them about a break-in or providing information about a

stolen vehicle. The signals that are sending by the alarm system ar standard by the monitoring

centers and thus inform the cops to take immediate action against burglar.

Cost: The ADT burglar alarm system comes within your budget, though other systems ar 

easy gettable in the market and offers you a small amount to be paid; they are unreliable and

would confuse you while sending an immediate response. They would provide you the last form

of self-protection. ADT burglar alarm system gets you the best home security system within your 

 budget.

Equipments Included: The burglar system includes devices such as fire detectors, motion

detectors, doors and windows sensors and control keypad. These gadgets or the devices can be

 placed according to the places or could be mounted where it would be out of reach.

Page 24: Alarm System Report

8/3/2019 Alarm System Report

http://slidepdf.com/reader/full/alarm-system-report 24/29

24 

Wireless: The burglar systems are operated without using any cables or chords which

mean the subscriber can sacrifice those wires which take him hours for installation. They can be

fixed by using two to three screws and would save your precious time during the installation.

Customer Care Services: ADT home services provide is clients with 24/7 client care

services where our experts will be present to solve your problems regarding the installation of 

your home security system.

Guarantee: There are some companies which provide its customers with certain home

security systems which come with a guarantee code. The client must take a good look on the

 product to find the guarantee code.

Page 25: Alarm System Report

8/3/2019 Alarm System Report

http://slidepdf.com/reader/full/alarm-system-report 25/29

25 

9.0 REFERENCE / BIBLIOGRAPHY

1.  http://en.wikipedia.org/wiki/Burglar_alarm 

2.  http://www.the-security-system.com/burglar-alarm-system.html 

3.  http://www.homeburglaralarmguide.com/periodic-maintenance-of -burglar-alarm/ 

4.  http://www.the-security-system.com/best-security-product.html 

5.  http://www.ealarm.com.my/alarmtext.htm 

6.  http://fingerprint-security.net/2010/11/19/burglar-alarm-systems/ 

Page 26: Alarm System Report

8/3/2019 Alarm System Report

http://slidepdf.com/reader/full/alarm-system-report 26/29

26 

10.0 APPENDIXES & SUPPORT DOCUMENT

a) 

b) 

Page 27: Alarm System Report

8/3/2019 Alarm System Report

http://slidepdf.com/reader/full/alarm-system-report 27/29

27 

Page 28: Alarm System Report

8/3/2019 Alarm System Report

http://slidepdf.com/reader/full/alarm-system-report 28/29

28 

SUPPORT DOCUMENT: 

The list of services to be monitored at a Central Station has expanded over the past few

years to include: Access Control; CCTV Monitoring; Environmental Monitoring; Intrusion

Alarm Monitoring; Fire Alarm & Sprinkler Monitoring; Critical Condition Monitoring; Medical

Response Monitoring; Elevator Telephone Monitoring; Hold-Up or Panic Alarm Monitoring;

Duress Monitoring; Auto Dialer tests; Open & Close Signal Supervision & Reporting; Exception

Reports; and PIN or Passcode Management. Increasingly, the Central Stations are making this

information available directly to end users via the internet and a secure log-on to view and create

custom reports on these events themselves.

To be useful, an intrusion alarm system is deactivated or reconfigured when authorized

 personnel are present. Authorization may be indicated in any number of ways, often with keys or 

codes used at the control panel or a remote panel near an entry. High-security alarms may require

multiple codes, or a fingerprint, badge, hand-geometry, retinal scan, encrypted response

generator, and other means that are deemed sufficiently secure for the purpose.

Failed authorizations should result in an alarm or at least a timed lockout to prevent

"experimenting" with possible codes. Some systems can be configured to permit deactivation of 

individual sensors or groups. Others can also be programmed to bypass or ignore individualsensors (once or multiple times) and leave the remainder of the system armed. This feature is

useful for permitting a single door to be opened and closed before the alarm is armed, or to

 permit a person to leave, but not return.

High-end systems allow multiple access codes, and may even permit them to be used

only once, or on particular days, or only in combination with other users' codes (i.e., escorted). In

any case, a remote monitoring center should arrange an oral code to be provided by an

authorized person in case of false alarms, so the monitoring center can be assured that a further 

alarm response is unnecessary. As with access codes, there can also be a hierarchy of oral codes,

say, for furnace repairperson to enter the kitchen and basement sensor areas but not the silver 

vault in the butler's pantry. There are also systems that permit a duress code to be entered and

silence the local alarm, but still trigger the remote alarm to summon the police to a robbery.

Page 29: Alarm System Report

8/3/2019 Alarm System Report

http://slidepdf.com/reader/full/alarm-system-report 29/29

Fire sensors can be "isolated", meaning that when triggered, they will not trigger the main

alarm network. This is important when smoke and heat is intentionally produced. The owners of 

 buildings can be fined for generating False alarms that waste the time of emergency personnel.