Intrusion Systems

17
The world of intrusion alarm

Transcript of Intrusion Systems

Page 1: Intrusion Systems

The world of intrusion alarm

Page 2: Intrusion Systems

IAS Basics

A Security System consists of 3 basic elements:

• DETECTORS, that sense the actions or presence of an intruder

• CONTROL PANEL, that arms and disarms the system, receives the signals from the sensors, processes these signals and initiates the alarm warning devices

• ALARM WARNING DEVICES, for either remote and/or local warning.

• COMMUNICATION SYSTEMS for remote and central monitoring / warning.

Page 3: Intrusion Systems

IAS Basics -Detectors

DETECTORS are normally configured to provide 3 levels of security:

• Perimeter detection - that is used to sense intrusion as the thief attempts to breach the perimeter of the protected premises

• Interior detection - that provides security to strategic areas in which valuables may be found

• 24 hour detection - that is used to describe devices that are active in both the armed and disarmed modes of the system

Page 4: Intrusion Systems

Perimeter Detection• Perimeter protection is the type of protection that detects someone entering your

home or building from the outside. Obviously, you enter through a door but intruders often use other means of entrance. For the best protection, you will need to protect any opening that can be used as an entrance. This will include not only doors, but also windows, ducts, and any other opening large enough for someone to go through.

• The most common form of protection are "magnetic contacts" which are placed so that if a door or window is opened, a signal will be sent to the control panel and an alarm will results. Contacts may be either recessed, where the contact is usually mounted within the door or window casing and is hidden, or surface mounted. If you look at the top of the door in a retail store, you will usually see a surface mounted contact. Because door casings are steel and the walls are concrete, recessed contacts are difficult to mount in this type of building. Being open to vision, surface contacts can also be a deterrent.

Switches installed to all the exterior opening doors, windows, etc

Page 5: Intrusion Systems

Perimeter Detection

What if only the glass is broken in a door or window and entrance is gained without opening the door or window? The magnetic contact will not detect a breach and will not signal an alarm. For this you will need a "glass break sensor" to signal the breach. Glass break sensors will detect either the acoustic, or sound of the glass breaking, the seismic, or feel of the glass breaking, or both.

Break glass or vibration sensors installed to detect breakage of windows

Page 6: Intrusion Systems

Perimeter Detection

The last type of perimeter protection actually uses interior protectors. An "infrared

detector" is set to form a virtual "barrier" along a wall instead of covering a large area. When someone passes through this barrier, an alarm will be set off.

External sensors such as photo-electric beams, special PIR

sensors installed to detect intrusion at the perimeter of the property

Page 7: Intrusion Systems

Interior Detection

INTERIOR DETECTION

• Provides security to areas such as the master bedroom, entertainment areas, hallways, study, home office, dining room or other areas that valuables are stored.

• In some instances the system may consist of only interior detection, especially in the lower end of the market.

• Normally consists of Passive Infra Red Sensors (PIR) due to low cost and ease of installation

Page 8: Intrusion Systems

Interior Detection

Interior protection is the type of protection used to detect an intruder inside your home

or building. Generally infrared detectors are used for this type of protection. There are

two basic types of infrared detectors: ceiling mounted and wall mounted.

Page 9: Intrusion Systems

Interior Detection -PIR

The most common detectors are the passive infrared (PIR)

sensors which react to the infrared heat energy emitted by people. PIR sensors emit no radiation. They are passive and are normally designed to detect motion of a heat source.

A multifaceted (Fresnel) lens in front of the pyroelectric transducer focuses infrared energy from a multitude of narrow, discrete beams or cones. As a warm body moves across the field of view of the detector, the transducer output has peaks and valleys. If the variation is sufficiently intense and rapid, a circuit triggers and closes a relay. This relay provides the dry contact closure normally found on PIR detectors.

Page 10: Intrusion Systems

Interior Detection

24 Hour Detectors - that include:

• Duress, panic and medical alarms, consisting of fixed button and portable wireless units

• Fire alarms including smoke sensors, heat sensors and fixed temperature sensors.

• Plant monitoring devices for freezers, furnaces, air-conditioning, etc

• Tamper devices installed to siren units, control panels and detectors

Page 11: Intrusion Systems

The security system has 3 basic modes of operation:

• Stay (home) armed mode, where zones are automatically bypassed to allow the occupants to move around in pre-programmed areas.

• Away armed mode where all zones are active

• Disarmed mode when all zones with the exception of 24 hour zones are turned off.

IAS –Panels

Page 12: Intrusion Systems

• Contains the microprocessor and electronic circuits that controls system operation.

• Contains the power supply and standby (re-chargeable batteries) required to power the system.

• A control panel is normally selected to suit the number of detection zones, as well as the number of code holders required to operate the system

• Normally one electronic detector is connected to an individual zone

Control Panels

Page 13: Intrusion Systems

• The system is controlled by a number of keypads installed near the entry foyer, in the master bedroom, etc.

• Control of the system can also be by wireless remote control or by a remote telephone connection

• The control panel is programmed to suit the individual users requirements either by use of the system keypad, locally by direct connection to a PC, or remotely via a modem.

Control Panel - Keypads

Page 14: Intrusion Systems

The type of alarm warning selected depends upon:

• The geographical location of the premises

• The frequency of patrols in the area

• The type and value of risk involved

• The customers ability to afford the cost involved with central station monitoring

Alarm Warning Devices

Page 15: Intrusion Systems

Communication systems

When the alarm sensor activates, the panel will “seize” the telephone line and transmit a digital signal to the Central Monitoring Station receiver. The alarm information and required response information is displayed on a computer terminal for operator evaluation and action

Page 16: Intrusion Systems

The receiver sends a handshake tone

Panel now sends alarm data

After successful reception, a “kiss off” tone is sent

Sequence of Events - data transfer takes around 4.5 seconds

Central Monitoring Station

Panel Dials the receiver

Page 17: Intrusion Systems

Information displayed to the Central Station operator includes:

• Customer name & address

• Emergency telephone numbers (police, fire brigade, ambulance, re-call numbers etc.)

• Type of system

• Response action requirements

• A description of zone(s) that are in alarm

• Priority of the alarm

C.M.S