1 intrusion alarm technology intro to intrusion alarm

20
1 INTRUSION ALARM TECHNOLOGY INTRO TO INTRUSION ALARM

Upload: kelly-truelove

Post on 28-Mar-2015

248 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: 1 INTRUSION ALARM TECHNOLOGY INTRO TO INTRUSION ALARM

1

INTRUSION ALARM TECHNOLOGY

INTRO TO INTRUSION ALARM

Page 2: 1 INTRUSION ALARM TECHNOLOGY INTRO TO INTRUSION ALARM

2

INTRUSION ALARM TECHNOLOGY

An intrusion detection system consists of several different system components wired together to provide protection of persons and property.

Page 3: 1 INTRUSION ALARM TECHNOLOGY INTRO TO INTRUSION ALARM

3

INTRUSION ALARM TECHNOLOGY

Intrusion detection systems (IDS) are also called security alarms, security systems, alarm systems, perimeter detection systems, burglar alarm systems and similar terms.

Burglar alarms are used in residential, commercial, industrial, and military properties for protection against theft or property damage, as well as personal protection against intruders.

Page 4: 1 INTRUSION ALARM TECHNOLOGY INTRO TO INTRUSION ALARM

4

INTRUSION ALARM TECHNOLOGY

Car alarms likewise protect vehicles and their contents. Prisons also use security systems for control of inmates.

Some alarm systems serve a single purpose of burglary protection; combination systems provide both fire and intrusion protection.

Many burg. Panels at a minimum provide a zone for smoke detectors.

Page 5: 1 INTRUSION ALARM TECHNOLOGY INTRO TO INTRUSION ALARM

5

INTRUSION ALARM TECHNOLOGY

Intrusion alarm systems may also be combined with closed-circuit television (CCTV) surveillance systems to automatically record the activities of intruders.

Many CCTV systems have alarm interfaces that facilitate quick and easy interconnection to an intrusion alarm system.

Page 6: 1 INTRUSION ALARM TECHNOLOGY INTRO TO INTRUSION ALARM

6

INTRUSION ALARM TECHNOLOGY

Burglar alarm systems may interface to access control systems for electrically locked doors that require a key fob or access card/code.

Systems range from small, self-contained noisemakers, to complicated, multi-zone systems with computer monitoring and control. PERSONAL ALARM

SYSTEM “NOISE MAKER”

Page 7: 1 INTRUSION ALARM TECHNOLOGY INTRO TO INTRUSION ALARM

7

INTRUSION ALARM TECHNOLOGY

A basic burglar alarm is a simple circuit consisting of a loop, switch, battery and a buzzer.

The switch symbol represents many different types of detection devices, switches can be normally open (N.O.) or normally closed (N.C.).

Page 8: 1 INTRUSION ALARM TECHNOLOGY INTRO TO INTRUSION ALARM

8

INTRUSION ALARM TECHNOLOGY

The switch symbols pictured below represent any detection device such as; PIRs (passive infrared), reed switches, tamper switches, glass break sensors etc.

These devices are classified as either a normally open (N.O.) or normally closed device (N.C.).

NORMALLY OPEN SWITCH NORMALLY CLOSED SWITCH

Page 9: 1 INTRUSION ALARM TECHNOLOGY INTRO TO INTRUSION ALARM

9

INTRUSION ALARM TECHNOLOGY

As with many low voltage systems the primary component or heart of the system is the central device that controls all other components.

In this case the control panel (CP) is the heart of the intrusion detection system.

The CP houses all of the electronics used to monitor the detection devices and route signals to notification devices.

Page 10: 1 INTRUSION ALARM TECHNOLOGY INTRO TO INTRUSION ALARM

10

INTRUSION ALARM TECHNOLOGY

Alarm systems can be sub-divided into three parts:

DETECTION CONTROL SIGNALING

Page 11: 1 INTRUSION ALARM TECHNOLOGY INTRO TO INTRUSION ALARM

11

INTRUSION ALARM TECHNOLOGY

We can further break down an alarm system into all the separate components.

Page 12: 1 INTRUSION ALARM TECHNOLOGY INTRO TO INTRUSION ALARM

12

INTRUSION ALARM TECHNOLOGY

Detection devices are used to detect a human or non-human (animals,) intruders.

Notification/annunciation devices communicate information about an intrusion system to its user, the information can be audible, visual or both.

Communication devices communicate an alarm condition to the user or a monitoring station.

Page 13: 1 INTRUSION ALARM TECHNOLOGY INTRO TO INTRUSION ALARM

13

INTRUSION ALARM TECHNOLOGY

Control units are keypads that are either LCD (liquid crystal display) or LED (light emitting diode) and provide the means to program the alarm system.

The Power supply is both wired and battery back up which is self contained in the control panel enclosure.

Page 14: 1 INTRUSION ALARM TECHNOLOGY INTRO TO INTRUSION ALARM

14

INTRUSION ALARM TECHNOLOGY

The separate components will be wired to zones in the control panel and it is common for the wiring schematics for the panel to be listed on the inside door of the enclosure.

SCHEMATICS INCLUDED

Page 15: 1 INTRUSION ALARM TECHNOLOGY INTRO TO INTRUSION ALARM

15

INTRUSION ALARM TECHNOLOGY

You have already been introduced to several abbreviations that are frequently used in the burglar alarm industry, we will cover a few more.

CP = ? IDS= ?

N.O.= ? N.C.= ?NORMALLY OPEN NORMALLY CLOSED

INTRUSION DETECTION SYSTEM

CONTROL PANEL

Page 16: 1 INTRUSION ALARM TECHNOLOGY INTRO TO INTRUSION ALARM

16

INTRUSION ALARM TECHNOLOGY

EOL= End of lines resistor, this is used to monitor the wired loop.

PIR = Passive infrared detector, a commonly used device to cover large areas.

C = Used in control panels to indicate a common lead shared by two zones.

POTS = Plain old telephone service, dial tone used by the control panel

Page 17: 1 INTRUSION ALARM TECHNOLOGY INTRO TO INTRUSION ALARM

17

INTRUSION ALARM TECHNOLOGY

RJ-31X = Is an alarm panel jack, POTS gets wired to this jack.

HUA = Holdup alarm, used on keypads or panic buttons.

DS = Door strike

JB = Junction box

Page 18: 1 INTRUSION ALARM TECHNOLOGY INTRO TO INTRUSION ALARM

18

INTRUSION ALARM TECHNOLOGY

When working with blueprints to install an intrusion alarm system all of the devices will be represented with a box or rectangle containing an abbreviation.

Cables are home runs back to the control panel and are labeled as zones.

A zone can have a few devices or dozens of devices wired in either series or parallel.

Page 19: 1 INTRUSION ALARM TECHNOLOGY INTRO TO INTRUSION ALARM

19

INTRUSION ALARM TECHNOLOGY

Here is an example of zone wiring, notice that zone 1 is a N.O. device loop and zone 2 is a N.C. device loop.

WHAT DOES THIS LINE REPRESENT?

Page 20: 1 INTRUSION ALARM TECHNOLOGY INTRO TO INTRUSION ALARM

20

INTRUSION ALARM TECHNOLOGY

The value of the EOL can be found on the control panel door in the wiring schematic.

There are separate wiring terminals for communication devices, notification devices and keypads, these devices are not connected to the zone wiring loops.