Repair Design Furniture

Security system working principle. Security alarm in the apartment. Selection and installation. Burglar and burglar alarms - what's the difference?

The purpose of the security alarm system is to detect unauthorized entry to the protected object and generate an appropriate alert. Notifications about the operation of the burglar alarm system are:

  • sound;
  • light.

The first are formed by various sirens, bells, etc., which have the common name sound annunciators. The second, respectively, are called light annunciators. Signal lamps, individual LEDs and LED assemblies can be used in this capacity.

It is worth noting that at present, bells and lamps are practically not used. They were replaced by piezoelectric emitters and semiconductor light signaling devices. In addition, the system includes:

  • sensors (detectors) different principles actions;
  • receiving- control devices(PKP) and panels;
  • Power supplies;
  • equipment for transmitting information to the security console (PCO) or the phone of the owner of the facility.

If the tactic of the security alarm does not provide for remote notification transmission (to the remote control or mobile phone), then such a system is called autonomous. By the way, this version of execution has the least efficiency. Various methods are used to transmit alarms to the ARC.

Wired data transmission is carried out over busy or dedicated telephone lines. Modern systems the transmission of notifications is overwhelmingly digital, so their information content is very low. high level. In addition, feedback from the security console with the equipment installed at the facility is possible.

Wireless notification systems can use a dedicated radio channel or channels of cellular operators ( GSM alarm various designs). In this case, the main thing is to ensure control of the communication channel. Obviously, if it is violated (disappears), the generated burglar alarm will simply not be sent to the control point.

The solution to this problem is achieved in two main ways:

  • transmission from the object of the test signal;
  • request about the status of the alarm by the security console and receive the corresponding receipt.

The second option requires a bidirectional channel, so the object part of the notification transmission system must contain both a transmitter and a receiver. Naturally, such equipment is more expensive. In addition, the control of any wireless channel is discrete, that is, the request is made at certain intervals. The smaller they are, the more reliable the system.

OPERATING PRINCIPLE OF THE ALARM

For the end user, the part of the alarm that is installed directly at the facility (shop, house, office, apartment, etc.) is of the greatest interest. Therefore, let's consider the principle of operation of just such equipment. Its composition is given at the beginning of the article, and here I will tell you how these components of security systems work.

Alarm sensors (detectors).

They are designed to detect intrusion or its attempt into a protected area. Since there are several ways to get inside the building (through a broken window, an open door, a broken wall), the principle of operation of the detectors is also different. According to the method of detection, sensors can be divided into devices that detect:

  • breaking;
  • opening;
  • break;
  • motion.

In each of these cases, the sensors convert the corresponding action into an electrical signal. For example, break sensors can detect the sound of breaking glass, and they will be called acoustic or sound sensors, respectively. Since the break is accompanied by shock impacts on the protected structure, vibration detectors are used in this case.

As you can see, the variety of transformation principles here is quite large. exits security sensors can also be of various types, ranging from "dry" relay contacts to digital signal generators.

It is quite natural that the information generated by the detector must be received and processed. For this purpose serve receivers and control panels. They are a kind of "intermediary" between the sensor and warning and signal transmission devices. By the way, a number of devices may have built-in radio channel and GSM transmitters and receivers.

Equally important is the method of transmitting notifications from the security sensor to the device. There are two options:

  • wired - through specially laid communication lines;
  • wireless - by radio channel.

By the way, when talking about wireless alarm, then, first of all, they mean exactly the radio channel communication of the detectors and the control panel.

These are the main points regarding the principles of operation and the design of the burglar alarm system. There are, of course, various nuances, but they need to be considered in separate thematic articles.

TYPES OF SECURITY ALARMS

Some types of security systems have already been mentioned in this article, for example, autonomous and signaling with output to the ARC. True, the differences between these two types are more organizational than technical. The only fundamental difference in the composition of the equipment is the presence or absence of an object device for transmitting notifications.

Here are the types of systems:

  • wired;
  • wireless;
  • address,

have tangible differences in the principle of construction, composition and operation of the equipment. Each of them has its own range of advantages, disadvantages and application features, which we will briefly consider.

Wired alarm- An old-timer in a security systems company. At one time she had no alternatives. In some cases, even today it is out of competition due to reliability (of course, provided quality installation) and relatively low cost of equipment.

For small objects where it is possible to painlessly lay connecting wires and cables, this type of alarm system may be the most suitable system.

Addressable alarm system can transmit information about the status of sensors both by wire and by radio. In the first case, the connection of all detectors can be performed by one communication line, since each detector has its own unique number and can be uniquely identified by the control panel.

Thus, we have a stable connection of all system components with relatively low installation costs. The equipment, however, will cost a little more than in the traditional non-address version. In general, this type of system is extremely well suited for medium and large objects of various configurations.

Wireless burglar alarm is essentially address system that uses a radio channel for data transmission. The only advantage is the absence of all types of work associated with laying wires. Cons of such a system:

  • high cost of equipment;
  • short range (distance from the security sensor to the device);
  • possible instability in operation at a high level of electromagnetic interference.

In general, the choice of the type of system is an individual process, requiring consideration of many factors, as well as the main listed advantages and disadvantages of each type of equipment.

AUTOMATIC ALARM

By by and large part of the processes of any security alarm is automated. This concerns the issues of detection of intrusion attempts, signal processing and the formation of an alarm. However, there are systems with such a degree of automation that they can be called intelligent.

Self-testing of sensors and transmission of information about their state (operability) is implemented in digital (address) versions of the equipment. I must say that such systems operate at the hardware and software level. The presence of a software component allows you to implement such intelligent functions as:

  • automatic control of equipment according to a given schedule or event;
  • differentiation of user access rights to work with the system;
  • the possibility of integrating the alarm with other security systems.

An example is the integrated security system "Orion" produced by NVP "Bolid". The ability to create various hardware configurations, flexibility of settings, and a fairly clear and friendly interface impress many installers, including me.

It should be noted. that most modern burglar alarm sensors in their work use algorithms that allow you to analyze the totality of factors affecting the detector. This allows to significantly reduce the number of false positives of the system, thereby increasing its reliability and efficiency.


* * *


© 2014-2019 All rights reserved.
The site materials are for informational purposes only and cannot be used as guidelines and normative documents.

At the request of subscribers and readers of my website and YouTube video channel, I am starting a series of articles and videos in which the apartment security alarm system will be discussed in detail. Let's start by considering the principle of operation of a burglar alarm. I'll try to keep things simple plain language so that it is understandable to people far from the security sphere.

Security alarm Designed to protect your home from intrusionand is now widely used. This The best way ensure the security of your apartment in your absence.

Burglar alarm device

The alarm system is technical means protection and schematically consists of three main modules:

  1. sensors;
  2. PKP receiving and control device;
  3. executive devices.

Sensors(or detectors), depending on their type, control certain parameter. This may be the opening of a door or window, movement in the protected room, glass breaking, and other parameters. If an event occurs that controls the sensor (for example, movement in the room), it works, converts the signal into an understandable form for transmission to the control panel.

Control panel monitors and controls all sensors. If the sensor is triggered, it processes the signal received from it, and in accordance with the security tactics programmed into its non-volatile memory, issues a signal to the actuators.

Executive devices are activated when receiving a signal from the receiving-control device. Usually, the signal from the control panel activates a light and sound device (siren) and makes a call with a voice message to a landline or mobile phone.

The signal transmission from the control panel can be carried out via the city telephone network GTS, via GSM, via a radio channel (when a certain frequency is allocated for the transmission of an alarm signal), or via the Internet.

Burglar alarm scheme

Let's look at the structure burglar alarm wiring diagram.

Three types of sensors are mainly used in security alarm systems for apartments and houses.

Opening sensors- magnetic contact. They are installed on doors and windows and give a signal when they are opened.

Motion sensors- voluminous. Control the volume inside rooms, and when motion is detected, they give a trigger signal.

Glass break sensors. They are installed near windows and, when they are broken, form a signal for the control panel.

in detail various types security sensors (they are also called detectors), the principles of operation, connection diagrams, installation features, I plan to tell in separate thematic articles and videos. Therefore, if you are interested in this topic, subscribe to the newsletter and my video channel, the link is at the bottom of the article.

The control panel is a board that is mounted in a special shield. Power is supplied from the mains 220V through special power unit. To ensure uninterrupted operation in the event of a power failure, a accumulator battery. PKP is necessary right connect to the mains, how to do it - in this.

Special terminal blocks are installed on the control panel board to connect all system devices.

Reception and control devices are produced for a different number of security zones. Many systems support the ability to expand the number of connectable zones, this allows you to connect a large number of detectors and build large multifunctional systems.

A keypad (remote control) is connected to the control panel to control and change settings. From the keypad, you can arm / disarm the entire system or part of it; program the necessary settings; change passwords; view the alarm or fault memory and other options.

The burglar alarm can also be armed or disarmed remotely using a key fob.

After receiving signals from security detectors, the control panel processes them in accordance with the programmed security tactics and issues control signals to the actuating devices. ANDAdditional devices can be connected either directly to the control panel board or through special modules (output expansion boards, dialers, communicators, etc.).

A detailed description of all devices in the system is beyond the scope of this publication and will be discussed in other materials on this topic.

How a burglar alarm works

Briefly, we got acquainted with the device of security automation, now let's look at the principle of operation of a security alarm.

Let's assume that the system is armed and there is movement in one of the rooms.

The volumetric motion sensor will detect this movement and work. The control panel will detect a change in the state in the loop to which this sensor is connected and determine that this is an alarm in this zone. In accordance with the program laid down, he general case, will issue a control signal to the siren and it will turn on, signaling an alarm in the protected facility. At the same time, dialing will be carried out to the telephone numbers stored in the control panel's memory, with a message that an alarm has been triggered.

If the alarm is output to the security console, then the alarm signal will be sent to the security console. As I said, the signal can be transmitted via a subscriber telephone line, via a GSM channel, via a radio channel or via the Internet.

You can turn off the system by entering a special code from the keyboard, or by pressing the button of the key fob registered in the system.

This is how a burglar alarm works. Similarly, the system works when any of the sensors is triggered.

The functionality of the system can be significantly expanded by using special output expanders. So, it is possible when triggered security system turn on the light throughout the apartment, attracting the attention of neighbors and passers-by. You can turn off any devices, etc.

In this article, I tried to present in an accessible form the basic principles of the security alarm system, to clearly show and explain the block diagram. If you delve into the details, then this topic is not one article, it is very extensive and multifaceted. In the following publications, I plan to consider the main modules of security automation in more detail. In order not to miss the release of new materials, subscribe to the news of the site!

Write in the comments so that you are interested in learning about this topic, and what you would like to see on the pages of the site.

To carry out the functions of protecting various real estate objects and closed territories, technical devices are widely used that give an alarm in the event of an emergency situation.

Devices of this class form burglar alarm systems, the definition and classification of which are established state standards Russian Federation. So, GOST R 52435-2015 defines what a burglar alarm is and what functions it performs.

By definition, a security alarm system is a set of interacting technical devices, providing fixation of the fact of unauthorized penetration into the protected area and at the same time giving an alarm signal.

Depending on where the generated alarm is sent, the systems are divided into three types:

  • local or local;
  • centralized control rooms;
  • sending a notification via a telephone line or a GSM channel.

Local systems reproduce the alarm signal directly in the protected area. This can be expressed by the inclusion of a siren, special spotlights, alarms in the room where the guards are. These notification methods can be used individually or in various combinations.

Equipping facilities with autonomous security alarm systems makes sense only in cases where the alarm signal they give can be heard by a security guard located at or near the facility and take the necessary measures (call the police).

Centralized systems burglar alarms send information about the alarm status via communication channels to the centralized security console. After that, an emergency departure of the operational group to the protected facility is carried out.

This method of protection is one of the most reliable and has the widest distribution. The disadvantages of this scheme include only the need to conclude an agreement with a security structure and a monthly subscription fee.

There is an intermediate version of the security alarm system, which sends alarm information to the owner of the object in the form of a notification via a telephone line or a GSM communication channel. In this case, having received an SMS message, the owner must take measures to protect the property himself, or call the police.

EQUIPMENT FOR ALARM SYSTEMS

There are several types of specific equipment on the basis of which a burglar alarm is built. What is included in these systems is reflected in the following classification:

  • sensors (detectors);
  • reception and control devices;
  • signaling devices;
  • means of communication.

Sensors belong to the main type of equipment. They are the first link that generates a signal in case of violation of the integrity of the object or unauthorized entry. The functioning of the entire complex depends on the sensitivity of this equipment and the correctness of its installation.

The device and principle of operation of sensors can be different and determine the features of the application of each of them.

Reed or magnetic contact sensors.

* * *

© 2014 - 2019 All rights reserved.

The site materials are for informational purposes only and cannot be used as guidelines or official documents.

Security systems, video surveillance and alarms are increasingly used in our lives. Security alarm systems are used to detect the penetration of unauthorized persons to the object of protection and create a special alert. The alarm can notify by sound or light. Sound alerts are generated by various bells, sirens and other devices. Light alerts are given by LED assemblies, signal lamps.

Types of alarm systems

The purpose and type of the security system depends on the type of sensors installed in the security system. Sensors can respond to the following actions:
  • The appearance of water.
  • Temperature change.
  • Presence of vibration, sound or smoke.
  • Appearance of a moving object.
  • Opening windows and doors.

All types of sensors have the same task: to send a signal to the control unit about the detection of any changes in the controlled place.

Wired and wireless

In addition to the type of events, burglar alarm systems differ in the method of signal transmission: wired and wireless. In wired security systems, the sensors and the control unit are connected to each other by a cable through which the signal is received. The advantage of such systems is the low cost of equipment. The disadvantage is the laborious wiring.

In wireless security systems, the control unit and the sensor are connected to each other by radio signals. Installation of such a system is simple, since there is no need for wiring a complex network of wires. However, the cost of wireless equipment is higher compared to a wired system.

Centralized and autonomous

According to the method of responding to information from sensors, security systems are divided into centralized, which are connected to the central observation point, and autonomous, which are ordinary "chants".

Autonomous alarm systems, when a sensor triggered event occurs, a siren is turned on, which attracts the attention of other people. These systems are very simple and have a low cost, so they are widely used. But autonomous systems do not have great efficiency. Experienced robbers can easily turn off these beeps and quickly do their job. However, in the event of a fire, the efficiency autonomous systems might be top notch. Temperature sensor will react to high temperature and turn on a loud siren, which will attract the attention of people to call firefighters.

Centralized security alarm systems are more reliable, as they transmit a signal to the dispatcher, who will quickly send security guards to the place of penetration of unauthorized persons. When installing a video surveillance system at an object, the owner of the object or the dispatcher can visually observe what is happening at the object. Centralized systems have an increased cost, and you will also have to pay a monthly fee.

Alarm systems with auto redial

If there is no observation point in the required area, or if the payment for security is expensive, you can install a security system with automatic dialing. The principle of its operation is that the alarm signal is sent to a fixed cell phone number.

You can send a message in the form of SMS, or to a landline phone. The advantage of systems with automatic dialing is the availability of remote control functions, as well as audio control.

Automatic alarm systems

In any security system, there are several automatic processes. This can be detecting intrusion attempts, creating an alarm notification, etc. But there are systems with completely automatic operation, which is even called an intelligent security system.

There are also functions to automatically check the health of the security system. The sensors are self-testing and the data is transmitted digitally. Such systems operate at the hardware-software level.

The software component makes it possible to perform the following intellectual functions:
  • Possibility of embedding the alarm in other systems.
  • Separation of access rights of operators to the system.
  • Automatic control of the system according to a specific algorithm or incident.

Many modern alarm sensors use algorithms in their work that make it possible to analyze the totality of factors acting on the detector. This reduces the number of false alarms while increasing its effectiveness and reliability.

Signaling scheme

Consider a typical burglar alarm scheme. It is the middle between the principle and structural diagram. Connection of certain devices and detectors is carried out according to the scheme specified in the technical documentation. But general rules schema organizations remain standard. Classic principle building an alarm circuit for the protection of an apartment, house or cottage is shown below.

The first frontier of the alarm blocks the windows and doors of the emergency exits with sensors with different operating principles: for opening - magnetic contact, for glass breaking - acoustic. If necessary, vibration sensors can be connected to detect wall breaks.

The 2nd line of the security system consists of electronic optical devices of beam, surface and volumetric principles of operation. Together with them, you can install ultrasonic and radio wave annunciators.

The entrance door is connected to the security separately, since to protect against the alarm triggering when the object is opened and closed, a delay in the response time is performed. If arming or disarming is performed with outer side buildings with special keys (7), then front door can be connected to the scheme of the perimeter of the object of protection.

For the protection of a small object, the considered option is quite suitable. But for a separate house with a large number windows and rooms, it is better to divide each security loop into several.

This is due to a simple search for damage and convenient localization of the penetration site.

Alarm equipment
  • Detectors.
  • Reception and control devices.
  • Power supplies.
  • Notifiers.
  • Notification system.

Detectors alarms are used to detect intrusion on the object of protection. This equipment has differences in the principle of operation, the ability to solve issues of monitoring the interior of the premises, purpose, etc.

Important constituent element equipment are control devices , processing data received from detectors. They control other alarm devices.

Power supplies perform two main tasks:
  1. In the absence of voltage, they are a spare power source.
  2. Supply power to the system equipment from a 220 V network.

Annunciators provide information about the performance of detectors and devices. They are light, acoustic and combined. Light blocks can immediately give the status of many loops, sound blocks transmit complex voice messages, they are more suitable for fire systems.

Notification transmission systems are used for protection with a control panel. Autonomous systems do not require such SPIs. The type of equipment is determined by the security company. Notifications are transmitted wirelessly or by wire. GSM communication systems and radio channels are used more and more often.

Equipment installation

Main normative document, which determines the procedure for the installation and installation of security alarms is the regulatory act RD 78. 145 - 93 for private security. If the alarm is not armed on the remote control, then this act can not be used. But this document defines the completeness and reliability of the protection of vulnerabilities, it will always be useful.

The technical passport of security equipment must always have general recommendations for installation and assembly. As an auxiliary source of information, documents for a device or detector can be very useful. For the connection diagram, deviations from the connection option required by the manufacturer must not be allowed.

Security alarm requirements
The main requirement is reliability. It is achieved by a set of technical measures:
  • The highest fault tolerance of the system.
  • Proper selection of technical equipment.
  • Full identification of vulnerabilities for penetration.

The fault tolerance of the security alarm system determines the increased requirements for the period of time between failures of the elements of the system. The quality of the installation plays an important role. Contact connections are weak spots circuits, they gradually degrade the quality of the contact. Therefore, quality maintenance is prerequisite correct operation security systems.

The right choice of equipment determines the choice of the most suitable devices that correspond in terms of parameters to the tasks that are solved by the security system. Most often, reliability is increased by the simultaneous use of detectors with different operating principles, as well as combined sensors.

The definition of penetration points should be decided at the design stage of the security system. An important role in this is played by the experience of designers and knowledge of regulations. Each separate object of protection has its own characteristics.

The basic principle of the burglar alarm structure is to detect unauthorized intrusion into the protected area and create a warning alarm. Notifications about the activation of the burglar alarm design are divided into light and sound.

The latter announce themselves with a variety of acoustic effects (bells, sirens, etc.). Each of the devices that create the corresponding sounds when the boundaries of the protected sector are violated received a single name "acoustic detectors". Others, of course, are called light detectors. These include various lighting structures: stand-alone LEDs, signal lights, LED assemblies.

The principle of operation of the security alarm

It should be borne in mind that in this moment both acoustic and light detectors almost never occur in practice. They are actively replaced by piezoelectric emitters and semiconductor lighting signaling devices. Among other things, the structure includes:

    • sensors (annunciators) different principle functioning;
    • receiving and control devices (PKP) and dashboards;
    • energy blocks;
    • devices for sending information to the central security console or cell phone of the owner of the protected enterprise or territory.

If the principle of organizing the operation of a security alarm system does not involve sending a notification remotely (to a security console or a cellular device), then such a structure is called independent (autonomous). Incidentally, this way of organizing protection is characterized by the lowest productivity. Different methods are used to send alarm notifications to the central security console.

Information is sent via a cable connection via dedicated or busy telephone wires. At present, notification sending structures are mostly digital. For this reason, they are able to contain a very large amount of information and, accordingly, their information content is always on top. In addition, it is possible to establish contact between the central security console and devices installed in the protected area.

Wireless structures for transmitting notifications are capable of using either a separate radio channel or channels of companies - mobile operators (various implementations). In this situation, the organization of communication channel management will become the main one. Of course, when it is hacked (disappears), the signal activated by the security alarm about the intrusion of the intruder simply will not reach the control point.

The resolution of this difficulty is carried out by 2 main methods:

  1. sending a test signal from the protected area to the central security point;
  2. requesting the serviceability of the alarm system from the central security point and obtaining appropriate confirmation.

The last method needs a bidirectional channel. For this reason, the object part of the notification sending structure must include both a device for sending and receiving signals. Of course, such structures are expensive. In addition, the management of each wireless channel is separate. In other words, the request is made after uniform time intervals. The shorter these intervals, the more efficient and secure the structure of the security system from hacking.

For the end user, the part of the alarm system that is mounted directly on the protected area (sales outlet; residential, office or warehouse space) is of great interest; industrial enterprise etc.). For this reason, it is necessary to pay attention to the basis of the functioning of just such devices. Below we will talk about the elements of a security alarm system.

Alarm sensors (alarms)

These devices are designed to detect intrusion or attempted intrusion into a protected area or object. Due to the fact that there whole line options to get into the room (break a window, crack a door, ram a wall, etc.), then the essence of the operation of the sensors is also different. According to the method of detection, detectors can be divided into sensors that detect breaking, breaking, opening, movement.

In any of these situations, warning devices transform the corresponding action into an alarm signal. As an example, the following can be given: if an attacker breaks a window or a shop window, then the breaking sensor will work due to the ringing of the destroyed glass. It will recognize the corresponding sound and give an alarm. Such detectors are sound (acoustic). Due to the fact that knocking out walls is inevitably accompanied by strong blows to the protected object, in this situation it is advisable to use vibration-sensitive sensors.

Thus, there is a fairly wide variety of principles for transforming one or another action of intruders into an alarm signal. Security detector connectors are also capable of various kinds: from "dry" switch contacts up to devices generating a digital signal.

Of course, the information obtained with the help of the sensor must be accepted and worked out. To accomplish this task, there are receiving devices and control dashboards. They act as a link between the sensor and the notification and signaling equipment. Incidentally, some devices may have integrated radio channel and equipment for receiving and transmitting Groupe Special Mobile.

Not the last role is played by the method of sending notifications from the protective sensor to the device. There are 2 variations:

Cable (wire) - on separately mounted wires;
wireless - over a radio transmission channel.

On the video: How security alarm sensors work.