Download presentation
1
INTRUSION ALARM TECHNOLOGY
INTRO TO INTRUSION ALARM
2
INTRUSION ALARM TECHNOLOGY
An intrusion detection system consists of several different system components wired together to provide protection of persons and property.
3
INTRUSION ALARM TECHNOLOGY
Intrusion detection systems (IDS) are also called security alarms, security systems, alarm systems, perimeter detection systems, burglar alarm systems and similar terms. Burglar alarms are used in residential, commercial, industrial, and military properties for protection against theft or property damage, as well as personal protection against intruders.
4
INTRUSION ALARM TECHNOLOGY
Car alarms likewise protect vehicles and their contents. Prisons also use security systems for control of inmates. Some alarm systems serve a single purpose of burglary protection; combination systems provide both fire and intrusion protection. Many burg. Panels at a minimum provide a zone for smoke detectors.
5
INTRUSION ALARM TECHNOLOGY
Intrusion alarm systems may also be combined with closed-circuit television (CCTV) surveillance systems to automatically record the activities of intruders. Many CCTV systems have alarm interfaces that facilitate quick and easy interconnection to an intrusion alarm system.
6
INTRUSION ALARM TECHNOLOGY
Burglar alarm systems may interface to access control systems for electrically locked doors that require a key fob or access card/code. Systems range from small, self-contained noisemakers, to complicated, multi-zone systems with computer monitoring and control. PERSONAL ALARM SYSTEM “NOISE MAKER”
7
INTRUSION ALARM TECHNOLOGY
A basic burglar alarm is a simple circuit consisting of a loop, switch, battery and a buzzer. The switch symbol represents many different types of detection devices, switches can be normally open (N.O.) or normally closed (N.C.).
8
INTRUSION ALARM TECHNOLOGY
The switch symbols pictured below represent any detection device such as; PIRs (passive infrared), reed switches, tamper switches, glass break sensors etc. These devices are classified as either a normally open (N.O.) or normally closed device (N.C.). NORMALLY OPEN SWITCH NORMALLY CLOSED SWITCH
9
INTRUSION ALARM TECHNOLOGY
As with many low voltage systems the primary component or heart of the system is the central device that controls all other components. In this case the control panel (CP) is the heart of the intrusion detection system. The CP houses all of the electronics used to monitor the detection devices and route signals to notification devices.
10
INTRUSION ALARM TECHNOLOGY
Alarm systems can be sub-divided into three parts: DETECTION CONTROL SIGNALING
11
INTRUSION ALARM TECHNOLOGY
We can further break down an alarm system into all the separate components.
12
INTRUSION ALARM TECHNOLOGY
Detection devices are used to detect a human or non-human (animals,) intruders. Notification/annunciation devices communicate information about an intrusion system to its user, the information can be audible, visual or both. Communication devices communicate an alarm condition to the user or a monitoring station.
13
INTRUSION ALARM TECHNOLOGY
Control units are keypads that are either LCD (liquid crystal display) or LED (light emitting diode) and provide the means to program the alarm system. The Power supply is both wired and battery back up which is self contained in the control panel enclosure.
14
INTRUSION ALARM TECHNOLOGY
The separate components will be wired to zones in the control panel and it is common for the wiring schematics for the panel to be listed on the inside door of the enclosure. SCHEMATICS INCLUDED
15
INTRUSION ALARM TECHNOLOGY
You have already been introduced to several abbreviations that are frequently used in the burglar alarm industry, we will cover a few more. CP = ? IDS= ? N.O.= ? N.C.= ? CONTROL PANEL INTRUSION DETECTION SYSTEM NORMALLY OPEN NORMALLY CLOSED
16
INTRUSION ALARM TECHNOLOGY
EOL= End of lines resistor, this is used to monitor the wired loop. PIR = Passive infrared detector, a commonly used device to cover large areas. C = Used in control panels to indicate a common lead shared by two zones. POTS = Plain old telephone service, dial tone used by the control panel
17
INTRUSION ALARM TECHNOLOGY
RJ-31X = Is an alarm panel jack, POTS gets wired to this jack. HUA = Holdup alarm, used on keypads or panic buttons. DS = Door strike JB = Junction box
18
INTRUSION ALARM TECHNOLOGY
When working with blueprints to install an intrusion alarm system all of the devices will be represented with a box or rectangle containing an abbreviation. Cables are home runs back to the control panel and are labeled as zones. A zone can have a few devices or dozens of devices wired in either series or parallel.
19
INTRUSION ALARM TECHNOLOGY
Here is an example of zone wiring, notice that zone 1 is a N.O. device loop and zone 2 is a N.C. device loop. WHAT DOES THIS LINE REPRESENT?
20
INTRUSION ALARM TECHNOLOGY
The value of the EOL can be found on the control panel door in the wiring schematic. There are separate wiring terminals for communication devices, notification devices and keypads, these devices are not connected to the zone wiring loops.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.