Download presentation
Presentation is loading. Please wait.
Published byVernon Young Modified over 9 years ago
1
1 INTRUSION ALARM TECHNOLOGY WIRELESS SYSTEMS
2
2 INTRUSION ALARM TECHNOLOGY Wireless systems use radio frequencies (RF) to connect sensors to the control panel. In wireless system devices can still be hardwired and as a result would be a hybrid system, both wireless and hardwired. Wireless devices are normally battery powered and are self contained units with LEDs used as status indicators. Wireless systems use radio frequencies (RF) to connect sensors to the control panel. In wireless system devices can still be hardwired and as a result would be a hybrid system, both wireless and hardwired. Wireless devices are normally battery powered and are self contained units with LEDs used as status indicators.
3
3 INTRUSION ALARM TECHNOLOGY Because the remote sensors are battery operated they will need to be monitored regularly to make sure the battery power is sufficient enough to transmit signals back to the CP. Wireless systems eliminate the need to install cables to each device which makes them quicker and easier to install. Because the remote sensors are battery operated they will need to be monitored regularly to make sure the battery power is sufficient enough to transmit signals back to the CP. Wireless systems eliminate the need to install cables to each device which makes them quicker and easier to install.
4
4 INTRUSION ALARM TECHNOLOGY Wireless systems can also incorporate CCTV cameras as complete intrusion detection system. This unit has the traditional look of a hardwired system with a wireless module and antenna that transmits and receives signals from remote devices. Wireless systems can also incorporate CCTV cameras as complete intrusion detection system. This unit has the traditional look of a hardwired system with a wireless module and antenna that transmits and receives signals from remote devices.
5
5 INTRUSION ALARM TECHNOLOGY A wireless security system operates by networking the monitoring devices so that they transmit information back to the receiver, control panel or other receiving device. Depending on the devices that are included in the system, device placement will have to be chosen carefully. A wireless security system operates by networking the monitoring devices so that they transmit information back to the receiver, control panel or other receiving device. Depending on the devices that are included in the system, device placement will have to be chosen carefully.
6
6 INTRUSION ALARM TECHNOLOGY The devices used in a wireless security system usually have a “range of effectiveness”, in which they are able to easily transmit information back to the receiver. This range is frequency dependent, the higher the frequency the further the operating range of the devices. The devices used in a wireless security system usually have a “range of effectiveness”, in which they are able to easily transmit information back to the receiver. This range is frequency dependent, the higher the frequency the further the operating range of the devices.
7
7 INTRUSION ALARM TECHNOLOGY Chinese made wireless alarm systems operate at 433MHz. Common frequencies used for wireless alarm systems are; 1)315MHz (mainly used in China) 2)433MHz (USA, Latin America, EU) 3)868MHz (EU, AU) 4)912MHz (EU). Chinese made wireless alarm systems operate at 433MHz. Common frequencies used for wireless alarm systems are; 1)315MHz (mainly used in China) 2)433MHz (USA, Latin America, EU) 3)868MHz (EU, AU) 4)912MHz (EU).
8
8 INTRUSION ALARM TECHNOLOGY Ranges for remote devices vary widely however an installer can expect 500’ in open air and 100’ to 300’ with obstructions. RF SIGNALS WILL PENETRATE MOST OBSTACLES, HOWEVER THE FURTHER THE DISTANCE THE LESS EFFECTIVE THE RF SIGNALS WILL BE BASED ON A 433MHz SIGNAL.
9
9 INTRUSION ALARM TECHNOLOGY The receiver supervises each remote device at preset time intervals. If the transmitter fails to check in a specific number of times during the preset interval, an indication is made locally or remotely that the sensor is not functioning. This signal is separate and distinct from an alarm signal. The receiver supervises each remote device at preset time intervals. If the transmitter fails to check in a specific number of times during the preset interval, an indication is made locally or remotely that the sensor is not functioning. This signal is separate and distinct from an alarm signal.
10
10 INTRUSION ALARM TECHNOLOGY Todays wireless technology incorporated into intrusion detection systems can offer as many if not more features than a traditional hard wired system. They can provide upwards to 40 programmable wireless zones and can also provide 8 to 22 hard wired zones. Many wireless alarm systems provide 4 CCD cameras incorporated into the system. Todays wireless technology incorporated into intrusion detection systems can offer as many if not more features than a traditional hard wired system. They can provide upwards to 40 programmable wireless zones and can also provide 8 to 22 hard wired zones. Many wireless alarm systems provide 4 CCD cameras incorporated into the system.
11
11 INTRUSION ALARM TECHNOLOGY Wireless systems are compatible with cellular alarm monitoring that allows you to control your entire security system from your iPhone, iPad, Android or computer. A full suite of home automation and home control devices that enable remote light, lock, thermostat and surveillance camera control. Wireless systems are compatible with cellular alarm monitoring that allows you to control your entire security system from your iPhone, iPad, Android or computer. A full suite of home automation and home control devices that enable remote light, lock, thermostat and surveillance camera control.
12
12 INTRUSION ALARM TECHNOLOGY Because wireless alarm systems use radio frequencies sources of interference must be taken into consideration. Depending on the frequency of the system cordless phones operating in the 900MHz range may cause interference. In the lower frequencies radio controlled toys can cause interference. Because wireless alarm systems use radio frequencies sources of interference must be taken into consideration. Depending on the frequency of the system cordless phones operating in the 900MHz range may cause interference. In the lower frequencies radio controlled toys can cause interference.
13
13 INTRUSION ALARM TECHNOLOGY Metal obstructions can also degrade the RF signal significantly. Mirrors will cause reflection problems causing much of the signal to bounce in different directions. The thicker the building materials the more the RF signal will degrade. Metal obstructions can also degrade the RF signal significantly. Mirrors will cause reflection problems causing much of the signal to bounce in different directions. The thicker the building materials the more the RF signal will degrade.
14
14 INTRUSION ALARM TECHNOLOGY Because of their distance limitations wireless alarm systems are primarily designed for home and small business installations. Larger commercial installation will still utilize the traditional hard wired systems where cable lengths can exceed 1000’ or more. Because of their distance limitations wireless alarm systems are primarily designed for home and small business installations. Larger commercial installation will still utilize the traditional hard wired systems where cable lengths can exceed 1000’ or more.
15
15 INTRUSION ALARM TECHNOLOGY Wireless alarm systems are similar to addressable systems in which each remote device has it’s own code. New device codes can be programed so that the control panel will recognize it and the user can document each device by an easy numeric system. Once programed the CP will discover the device automatically. Wireless alarm systems are similar to addressable systems in which each remote device has it’s own code. New device codes can be programed so that the control panel will recognize it and the user can document each device by an easy numeric system. Once programed the CP will discover the device automatically.
16
16 INTRUSION ALARM TECHNOLOGY The initial installation consists of wiring a power transformer, hooking up an RJ-31X and plugging in an Ethernet connection. Everything else can be installed wirelessly. Each remote wireless device has a tamper circuit which replaces the need for an EOLR and will sound an alarm if the device is handle while the system is armed. The initial installation consists of wiring a power transformer, hooking up an RJ-31X and plugging in an Ethernet connection. Everything else can be installed wirelessly. Each remote wireless device has a tamper circuit which replaces the need for an EOLR and will sound an alarm if the device is handle while the system is armed.
17
17 INTRUSION ALARM TECHNOLOGY There are additional terminals for hard wired zones, aux power and input devices. The hard wired zones are the exact same as any hard wired intrusion system and require an end of line resistor. There are additional terminals for hard wired zones, aux power and input devices. The hard wired zones are the exact same as any hard wired intrusion system and require an end of line resistor.
18
18 INTRUSION ALARM TECHNOLOGY Depending on the system the receiver antenna can be replaced with a higher gain antenna for longer ranges and to compensate for obstructions. These antennas use either a TNC or SMA connection. Depending on the system the receiver antenna can be replaced with a higher gain antenna for longer ranges and to compensate for obstructions. These antennas use either a TNC or SMA connection.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.