What types of burglar alarms are there and how they work. Types and types of burglar alarms There are different types of alarms.

Security systems, video surveillance and alarms are increasingly used in our life. Burglar alarm systems are used to detect the intrusion of unauthorized persons into the guarded object and create a special alert. The alarm can be notified by sound or light. Sound notifications are generated by various bells, sirens and other devices. Light notifications are given by LED assemblies, signal lamps.

Types of alarm systems
The purpose and type of the security system depends on the type of sensors installed in the security system. Sensors can respond to the following actions:
  • The appearance of water.
  • Temperature change.
  • There is vibration, sound, or smoke.
  • The appearance of a moving object.
  • Opening windows and doors.

All types of sensors have the same task: to send a signal to the control unit about the detection of any changes in the monitored place.

Wired and wireless

In addition to the type of events, security alarm systems differ in the method of signal transmission: wired and wireless. In wired security systems, the sensors and the control unit are connected to each other by a cable that sends a signal. The advantage of such systems is the low cost of equipment. The disadvantage is the time-consuming wiring.

In wireless security systems, the control unit and the sensor are connected to each other by radio signals. Installation of such a system is straightforward, as there is no need for complex wiring. However, the cost of wireless equipment is higher compared to a wired system.

Centralized and autonomous

According to the method of responding to information from sensors, security systems are divided into centralized, which are connected to the central observation point, and autonomous, which are ordinary "chants".

Autonomous security alarm systems when a sensor triggering event occurs, a siren is triggered, which attracts the attention of other people. These systems are very simple and have a low cost, therefore they have found widespread use. But autonomous systems are not very effective. Experienced burglars can easily turn off these beeps and get the job done quickly. However, in the event of a fire, the effectiveness of autonomous systems can be up to par. The temperature sensor will react to high temperatures and activate a loud siren that will attract people's attention to call firefighters.

Centralized security alarm systems are more reliable, as they transmit a signal to the dispatcher, who will quickly send security guards to the place of penetration of unauthorized persons. When installing a video surveillance system at the facility, the owner of the facility or the dispatcher can visually observe what is happening at the facility. Centralized systems have an increased cost, and you will also have to pay a subscription fee.

Burglar alarm systems with auto-dialing

If there is no observation point in the required area, or if the payment for security is expensive, you can install a security system with automatic dialing. Its principle of operation is that an alarm signal is sent to a fixed cell phone number.

You can send a message in the form of SMS, or to a landline phone. The advantage of systems with automatic dialing is the availability of remote control functions as well as audio control.

Automatic security alarm systems

Any security system has several automatic processes. This can be the identification of intrusion attempts, the creation of an alert, etc. But there are systems with fully automatic operation, which are even called an intelligent security system.

There are also functions for automatically checking the health of the security system. The sensors are self-tested and the data is transmitted digitally. Such systems operate at the hardware and software level.

The software component makes it possible to perform the following intellectual functions:
  • The ability to integrate the alarm into other systems.
  • Separation of operator access rights to the system.
  • Automatic control of the system according to a specific algorithm or incident.

Many modern alarm sensors use algorithms in their work that make it possible to analyze a set of factors acting on the detector. This reduces the number of false alarms while increasing efficiency and reliability.

Alarm circuit

Consider a typical security alarm scheme. It is the middle between the conceptual and structural diagram. The connection of certain devices and detectors is carried out according to the scheme specified in the technical documentation. But the general rules for organizing the scheme remain standard. The classic principle of constructing an alarm system for the protection of an apartment, house or summer house is shown below.

The first line of the alarm blocks the windows and doors of the backup exits with sensors with different operating principles: for opening - magnetic contact, for glass breaking - acoustic. If necessary, vibration sensors can be connected to detect wall breakouts.

The 2nd line of the security system consists of electronic optical devices of the beam, surface and volumetric principle of operation. Together with them, you can install ultrasonic and radio wave sirens.

The entrance door is connected to the security system separately, since the response time is delayed to prevent the alarm from being triggered when the object is opened and closed. If arming or disarming is performed from the outside of the building with special keys (7), then the front door can be connected to the perimeter circuit of the protected object.

For the protection of a small object, the considered option is quite suitable. But for a separate house with a large number of windows and rooms, it is better to divide each security loop into several.

This is due to a simple search for damage and convenient localization of the penetration site.

Alarm equipment
  • Detectors.
  • Reception and control devices.
  • Power supplies.
  • Annunciators.
  • Notification transmission system.

Detectors alarms are used to detect intrusion into the object of protection. This equipment has differences in the principle of operation, the ability to solve issues of control of the interior of the premises, purpose, etc.

An important component of the equipment is control devices processing data from detectors. They control other signaling devices.

Power supplies serve two main purposes:
  1. In the absence of voltage, they are a spare power source.
  2. Power is supplied to the system equipment from a 220 V network.

Sirens provide information about the performance of detectors and devices. They are light, acoustic and combined. Light blocks can display the status of many loops at once, sound blocks transmit complex voice messages, they are more suitable for fire systems.

Notification transmission systems are used for security guards with a control panel. For autonomous systems, such SPIs are not required. The type of equipment is determined by the security company. Notifications are sent wirelessly or wired. GSM communication systems and radio channels are being used more and more often.

Equipment installation

The main normative document that defines the procedure for the installation and installation of security alarm means is the normative act RD 78. 145 - 93 for private security. If the alarm is not armed on the remote control, then this act may not be used. But this document defines the completeness and reliability of protection of vulnerabilities, it will always be useful.

The technical passport of security equipment should always have general recommendations for installation and assembly. As an auxiliary source of information, documents for a device or detector can be very useful. The wiring diagram must not be allowed to deviate from the wiring option required by the manufacturer.

Alarm system requirements
Reliability is a key requirement. It is achieved by a set of technical measures:
  • Highest system resiliency.
  • Correct selection of technical means.
  • Complete identification of penetration vulnerabilities.

The fault tolerance of the security alarm system determines the increased requirements for the MTBF of the system elements. The quality of the installation plays an important role. Contact connections are weak points in circuits, they gradually degrade the quality of contact. Therefore, high-quality maintenance is a prerequisite for the correct operation of the security system.

The correct choice of equipment determines the choice of the most suitable devices, corresponding in parameters to the tasks that are solved by the security system. Most often, reliability is increased by the simultaneous use of detectors with different operating principles, as well as combined sensors.

The definition of penetration points should be decided at the design stage of the security system. The experience of the designers and knowledge of the regulations play an important role in this. Each individual object of protection has its own characteristics.

13.11.2019

New Year's holidays are just around the corner. Every year before the New Year holidays, a grand season of sales and unusual begins. For everyone who decided not to miss the opportunity to purchase during the New Year holidays, we have prepared this review.

Even with a powerful door and reliable locks, it is impossible to be completely sure of the safety of your own home, especially during the long New Year holidays. To increase the level of protection of yourself and your property to the maximum, you need or. All modern systems operate on a similar principle, but differ in the way information is transmitted, the number and type of sensors, and some other features. In order to understand what is better in each specific case, you need to figure out what types of burglar alarms exist and how they work.

STRUCTURE AND OPERATING PRINCIPLE OF ALARM SIGNALING

Home burglar alarms differ in the way information is transmitted and the recipient who receives this information. Otherwise, their principle of operation is similar and is based on the interaction of the main elements of the system:
- a set of sensors and sensors of various operating principles;
- control panel;
- executive systems, which include sound and light warning devices, as well as equipment that transmit signals to the security console and / or the owner's phone,,,;
- keyboards and other control devices -. Equipped with buttons, display, fingerprint ID, voice, etc .;
- power unit;
- connecting wires, which may be missing when using a wireless alarm system.

Sensors located in different parts of an apartment or a private house react to unauthorized entry and send a signal to the control panel. It receives them, processes and transmits the generated signal to the notification and signal transmission devices. Information within the system can be transmitted via wires or radio channels, and it arrives at the security company and the owner of the apartment using mobile networks, via radio channels or via the Internet.

The most important role in the security alarm system belongs to the sensors - they take the hit first and are obliged to notice any illegal movement in the apartment. Sensors are divided into two types:
- security. These are the main sensors that are necessary to detect the entry of uninvited guests into the house;
- detectors. They are present, as a rule, and can warn the owner about water leaks, gas leaks, report a fire, the presence of smoke and carbon monoxide, a lack of electricity, etc.

Security sensors, which are the basis of alarms, can be of different types:
- magnetic contact sensors are located near windows and doors and react to their opening;
- passive infrared detectors are among the most popular sensors. They work on the principle of detecting sudden changes in ambient temperature. If an intruder passed into the field of action of the sensor, the latter records a sharp increase in temperature at a certain point and the same sharp decrease. Such fluctuations will trigger the detector. Detectors of this type are placed on the ceiling or wall, their angle of action can be different: there are sensors for 360 degrees, and there are point ones;
- ultrasonic sensors work on the principle of ultrasonic waves radiation with a frequency of 15-75 kHz. They are emitted from the source, reflected off the solid wall surface, and bounced back. If there is no one in the protected area, then the wave will return with the same frequency. The human body is able to absorb some of the energy by changing the frequency of the waves, the work is based on the Doppler principle. When the sensor detects that the signal has not returned as expected, it transmits the alarm information. It is not difficult to deceive such sensors, therefore they are considered obsolete;
- microwave sensors allow detecting the presence of an intruder by passing microwaves from the transmitter to the receiver. They can be in the same building when it comes to an apartment or house, or in different buildings when the territory in front of the house is guarded. To reduce false alarms, these sensors often work in tandem with passive infrared;
- Photoelectric sensors allow detecting the movement of a thief using beams of visible or infrared light that are emitted by devices on the wall. If an intruder has passed through the beam, an alarm will be triggered. It is not difficult to bypass such sensors, therefore it is recommended to install them randomly, in a checkerboard pattern, so that you get a beam fence;
- seismic sensors are used to detect glass breakage. They are usually attached to glass or to a window frame. When the glass breaks, shock frequencies of 3-5 kHz are emitted, which are recorded by the sensor.

Installing several types of sensors in an apartment increases confidence that not a single step of an intruder will go unnoticed. When a door or window is opened, the integrity of the glass or wall is violated, a signal will be sent to the control point when moving around the apartment. Usually, sensors and alarm control panels are made on the principle of complete interchangeability, which means that, if necessary, the security alarm system can be expanded. The type and number of sensors is selected depending on the configuration and size of the apartment. A large number of sensors is not always good, as they can duplicate each other. That is why it is better to turn to specialists for the competent organization of the security system at home.

You can configure the alarm so that, in addition to alerting the owner and / or security company, triggering sirens and emergency lighting, the front door is blocked or a smoke generator is activated.
Signal transmission from sensors to the control panel and warning devices is carried out wirelessly via radio channels or wired highways.

WIRED AND WIRELESS ALARM SIGNALS FOR HOUSE

Both systems are used equally successfully today, but wireless are still confidently winning back the palm.

Wired systems have the following advantages:
- lower cost of arrangement;
- high signal quality;
- high reliability subject to correct installation.

The main disadvantage of such a system is a lengthy and laborious installation, the presence of cables that can spoil the interior, therefore, it is recommended to equip wired alarm systems even at the stage of repair. Moreover, the wires must be mounted as inconspicuously as possible, otherwise there is a risk that an attacker will violate their integrity and disable the entire alarm system.

The wireless alarm system is being used more and more often due to the following advantages:
- quick installation;
- lack of wires;
- the ability to move sensors or expand the system with new sensors.

Among the disadvantages are the higher cost and the risk that the radio signal can be jammed, so it is better to expand the system with elements that would prevent jamming of the radio signal. The wireless alarm does not always work stably, and the distance between security sensors and the control panel should not be too great.

The disadvantages of wireless systems also include the lack of constant monitoring of the communication channel. Since it is not always possible to track the current state and performance of the sensor, one cannot be completely sure that a notification will be sent in a dangerous situation. On the other hand, wireless alarms cannot be said to be downright unreliable - they can simply fail in the presence of strong electromagnetic interference.

You also need to be prepared that wireless systems require replacement of batteries (batteries or rechargeable batteries). It is better not to save on batteries, and most detectors have an option for warning about a low battery level.

PRINCIPLE OF ORGANIZATION OF SECURITY SIGNALS

Depending on who and how receives information about the entry into the apartment, alarms can be divided into:
- autonomous;
- control rooms.

An autonomous system is the simplest version of the alarm. When the sensors are triggered, a sound (about 120 dB) or light signal is turned on, psychologically affecting the thief and attracting the attention of neighbors, a message can be sent to the owner. The signal to the security service is not received, the owner of the apartment takes full responsibility for himself. Among the advantages of such systems are cheapness and ease of arrangement. An autonomous alarm is great for apartment buildings, but it is not very effective for a private house, especially if it is located in a remote area, in addition, it has a high percentage of false alarms.

The panel signaling provides for the transmission of information about the burglary to the panel in a public or private security structure, but it does not negate the ability to use sound signals. Having received a signal about a robbery, security personnel must arrive at the scene as soon as possible. Such a system allows us to speak about the most effective protection today. Its cost is no longer so high as to abandon the protection of your property, and quite often it is possible to install and connect inexpensively with a promotion, and the subscription fee to a security company is almost equal to the cost of a couple of cups of coffee.

Many fear from mistrust that during their absence from home security company employees will be able to enter the apartment. You should not be afraid of this for a number of reasons: firstly, the unlock code is known only to family members, and secondly, all unlocking situations are recorded in the protocol on the remote control and duplicated in your smartphone. By the way, it also reacts when someone cut the cable, if the system uses this communication channel to transmit information.

In fact, any system can be converted into a GSM signaling by retrofitting with an appropriate module, leaving all existing elements in place. In this context, it is most advantageous to choose a control panel with an existing cellular transmitter.

GSM SIGNALING FOR HOUSE

A burglar alarm that transmits information to owners and a security company via cellular networks is one of the most modern and optimal options for organizing the protection of your own home. A separate or built-in GSM-module is equipped with a SIM-card of one of the operators, with the help of which information is transmitted. It is recommended to use two SIM cards from different operators to ensure maximum reliability and stability of the system.

In case of penetration into the apartment, information about the incident is transferred to the owner, security structure and other authorized persons, and the data can be transmitted in the form of SMS, MMS with a photo or a call. Along with sending information, sirens and flashing lights can be turned on.

An alarm button may be included in this type of security alarm. This is a kind of sensor, but it works if a person presses on it. If you are in the apartment and feel that something was wrong, you just need to press the button for the security personnel to come (when the remote control alarm is used).

GSM alarms are often extended with microphones to visualize what is happening. Sometimes they include sensors for gas and water leaks, but this is no longer a pure security alarm. Signaling capabilities due to the use of cellular communication are significantly expanding, but at the same time the cost of the security system itself increases.

LARGE PRODUCERS OF EQUIPMENT FOR SECURITY SIGNALS

It is difficult to argue with the fact that the reliability of the functioning of a home alarm depends on the quality of execution of each individual element and the interaction between them. There are a lot of proposals on the market for such equipment, there are both foreign and domestic systems, and you can install a standard set or create a security system at your own discretion, equipping it with the required number of sensors of a certain type.

When buying, it is better to focus on the products of large security companies with sufficient experience and their own remote control.

It is better to entrust the installation of equipment to professionals, but if you have minimal knowledge, then a simple autonomous security system can be installed on your own. When choosing a security company that will receive alerts from alarms, pay attention to

Property protection is a top priority for property owners. To implement security on the market, many devices and systems have been proposed that prevent intruders from entering the facility, which will notify the owner and the relevant services about the incident in any attempt to break into. Security alarm systems of mechanical and electronic type are in the greatest demand among buyers.

Mechanical devices significantly complicate the task of intruders, but do not provide 100% of the protected object from burglary. The best solution in terms of reliability is electronic alarm systems with high functionality.

This article will become a full-fledged answer to the question "What type of burglar alarm to choose?"

Purpose of alarm systems

Any electronic alarm is installed on the property in order to protect it from unauthorized entry. When attempting to hack, such a device will warn the owners and the security service about the danger.

The maximum level of protection against burglary can only be ensured if the correct choice of burglar alarms is in accordance with the requirements of a particular facility. Modern manufacturers offer customers autonomous or active alarms. Autonomous devices frighten off intruders by emitting a sound signal and light when attempting to enter an object. Active alarms are more expensive, but they cope with their task more efficiently, since the alarm signal is transmitted simultaneously to the security console, as well as to the mobile device of the property owners.

Popular types and principle of operation of security alarms

Security companies offer customers to use a specific type of alarms, depending on the security requirements of a particular room.

Autonomous

The security system implies the installation of a touch sensor on the object that reacts to the following actions:

  1. Movement near the protected object.
  2. Opening the door.
  3. Damage to windows.

The sensors are connected to the central control panel, with the help of which the user can set the parameters of the alarm actuation by himself. To notify property owners about a burglary attempt, sound sirens and light-emitting devices are connected to the device.

If one of the sensors is triggered, the central panel of the system instantly turns on the siren. The alarm can be triggered or deactivated only through the code panel or by means of a special key fob that comes with the device.

The disadvantage of such a system is that when the alarm is triggered, the owner will not receive a notification about penetration into his home.

GSM systems

GSM signaling is an innovative development in the field of real estate security, providing maximum protection against burglary. In addition to standard sensor sensors that respond to movement, opening doors and windows, the system is equipped with a GSM module that connects to the central alarm unit.

If one of the sensors is triggered, the system equipped with a GSM module turns on an audible siren, light indicators, and also transmits an alarm to the owner's phone number, which must be linked to the alarm at the installation stage.

Alarms connected to the telephone line

The principle of operation of these systems is similar to the features of the functioning of other systems. The only difference here will be the way of transmitting the alarm signal to the owner - a simple telephone line serves for this. When detecting threats in one of the protected zones, an audio signal is transmitted to all telephone numbers associated with the device.

Alarm with the ability to connect to the security console


Alarm systems tied to the central control panel of departmental security are in greatest demand among customers and are considered the most effective method of protection. The complete set of these systems includes an electronic unit that integrates the sound signal to the control panel of the security company. Any means can serve as the channel through which the notification is transmitted:

  • telephone lines;
  • radio frequency communication;
  • GSM channels.

To increase the likelihood of timely transmission of an alarm to a security company, experts suggest using several means of transmitting an audio signal at once.

What are the criteria to consider when choosing?

Before buying an alarm system, most customers are interested in the question of what to consider when choosing a security system. There are several criteria that determine the reliability and efficiency of these devices:

  1. Alarm type - autonomous or active.
  2. The way the sensors are connected (wired or RF communication).
  3. Sensitivity of sensors, which is especially important if there are pets in the house, which will give a false alarm when moving.
  4. The number and type of security lines (area of ​​the territory where the alarm sensor operates).
  5. The ability to operate the alarm in the absence of electricity.

Important! If in the future it is planned to expand the security lines, you should choose equipment that implies the possibility of installing additional sensors, modules and actuators.

Conclusion

Thanks to a wide selection of alarms and security systems on the market, which differ in functionality, operation principle and price category, each buyer will be able to find the best solution for himself, taking into account the technical tasks and the available budget. When choosing an alarm, it is important to pay attention to the options and characteristics of the device, and not to the cost of the device. Saving in the issue of ensuring the protection of the object is inappropriate, given that the alarm will protect property, which is much more expensive than the cost of the device itself. The quality of protection is the first and main criterion when choosing an alarm of any type.

On the video: Types of security alarms for the home.


The purpose of the security alarm system is to detect unauthorized intrusion into the protected object and generate a corresponding notification. Notifications about activation of the security alarm system are:

  • sound;
  • light.

The first ones are formed by various sirens, bells, etc., which have the general name of sound annunciators. The second, respectively, are called light annunciators. In this capacity, signal lamps, individual LEDs and LED assemblies can be used.

It should be noted that currently bells and lamps are practically not used. They were replaced by piezoelectric emitters and semiconductor light signaling devices. In addition, the system includes:

  • sensors (detectors) of various operating principles;
  • alarm control panels (PKP) and panels;
  • Power supplies;
  • equipment for transmitting information to the security console (PCO) or the telephone of the owner of the facility.

If the tactics of the security alarm system does not provide for the remote transmission of a notification (to a remote control or a mobile phone), then such a system is called autonomous. By the way, this version has the lowest efficiency. Various methods are used to transmit alarms to the ARC.

Wired data transmission is carried out over busy or leased telephone lines. The overwhelming majority of modern notification transmission systems are digital, so their information content is at a very high level. In addition, feedback of the security console with the equipment installed at the facility is possible.

Wireless notification transmission systems can use a dedicated radio channel or channels of cellular operators (GSM signaling of various designs). In this case, the main thing is to ensure control of the communication channel. Obviously, if it is violated (disappears), the generated burglar alarm will simply not be sent to the control point.

The solution to this problem is achieved in two main ways:

  • transmission of a test signal from the object;
  • request for alarm status by the security panel and receipt of the corresponding receipt.

The second option requires a bidirectional channel, so the object part of the notification transmission system must contain both a transmitter and a receiver. Naturally, such equipment is more expensive. In addition, the control of any wireless channel is discrete, that is, the request is carried out at regular intervals. The smaller they are, the more reliable the system is.

OPERATING PRINCIPLE OF ALARM SIGNALS

For the end user, the most interesting is that part of the alarm that is installed directly at the facility (store, house, office, apartment, etc.). Therefore, let's consider the principle of operation of just such equipment. Its composition is given at the beginning of the article, and here I will tell you how these components of security systems work.

Alarm sensors (detectors).

They are designed to detect intrusion or attempts to enter the protected area. Since there are several ways to get inside the building (through a broken window, an open door, a broken wall), the principle of operation of the detectors is also different. According to the detection method, sensors can be subdivided into detecting devices:

  • breaking;
  • opening;
  • break;
  • traffic.

In each of the above cases, the sensors convert the corresponding impact into an electrical signal. For example, break detectors can detect the sound of broken glass, respectively, they will be called acoustic or sound.

Since the break is accompanied by shock effects on the structure to be protected, vibration detectors are used in this case.

As you can see, the variety of transformation principles is quite large here. Security sensor outputs can also be of various types, ranging from dry relay contacts to digital signal generators.

It is quite natural that the information generated by the detector should be received and processed. For this purpose they serve receiving devices and control panels... They are a kind of "mediator" between the sensor and the warning and signaling devices.

By the way, a number of devices can have built-in radio channel and GSM transmitters and receivers.

The method of transmitting the notification from the security sensor to the device is also of great importance. There are two options:

  • wired - through specially laid communication lines;
  • wireless - by radio.

By the way, when they talk about wireless signaling, they mean, first of all, the radio channel connection between the detectors and the control panel.

These are the main points regarding the principles of operation and the device of the security alarm system. There are, of course, various nuances, but they must be considered in separate thematic articles.

TYPES OF SECURITY SIGNALS

Some types of security systems have already been mentioned in this article, for example, autonomous and signaling with output to the ARC. True, the differences between the two are organizational rather than technical. The only fundamental difference in the composition of the equipment is the presence or absence of an object device for transmitting notifications.

But such types of systems as:

  • wired;
  • wireless;
  • address,

have tangible differences in the principle of construction, composition and operation of the equipment. Each of them has its own range of advantages, disadvantages and application features, which we will briefly consider.

Wired alarm- an old-timer in a security systems company. At one time there were no alternatives to her. In some cases, even today it is out of competition due to its reliability (of course, subject to high-quality installation) and the relatively low cost of equipment.

For small objects, where it is possible to painlessly lay connecting wires and cables, this type of signaling may be the most suitable system.

Addressable burglar alarm system can transmit information about the status of sensors both by wire and by radio. In the first case, the connection of all detectors can be performed using a single communication line, since each detector has its own unique number and can be uniquely identified by the control panel.

Thus, we have a stable connection of all system components at relatively low installation costs. The equipment, however, will cost a little more than the traditional conventional design. In general, a system of this type is extremely suitable for medium and large objects of various configurations.

Wireless burglar alarm in essence, it is an address system that uses a radio channel for data transmission. The only advantage is the absence of all types of work related to the laying of wires. Cons of such a system:

  • high cost of equipment;
  • short range (distance from the security sensor to the device);
  • possible instability in operation with a high level of electromagnetic interference.

In general, the choice of the type of system is an individual process that requires taking into account many factors, as well as the main listed advantages and disadvantages of each type of equipment.

AUTOMATIC ALARM SIGNALING

By and large, part of the processes of any security alarm system is automated. This concerns the issues of detection of attempts to enter, signal processing and the formation of an alarm notification. However, there are systems with such a degree of automation that they can be called intelligent.

Self-testing of sensors and transmission of information about their state (operability) is implemented in digital (address) versions of the equipment. I must say that such systems operate at the hardware and software level. The presence of the software component allows you to implement such intelligent functions as:

  • automatic control of equipment according to a specified schedule or event;
  • differentiation of user access rights to work with the system;
  • the ability to integrate the alarm with other security systems.

An example is the Orion integrated security system produced by the Bolid NVP. The ability to create various configurations of equipment, flexibility of settings, a fairly clear and friendly interface appeal to many installers, including me.

It should be noted. that most modern security alarm sensors in their work use algorithms that allow you to analyze a set of factors affecting the detector. This can significantly reduce the number of false alarms of the system, thereby increasing its reliability and efficiency.

* * *


© 2014-2020. All rights reserved.
Site materials are for informational purposes only and cannot be used as guidelines and normative documents.


Any security alarm, regardless of the device and type of alarm signal, is designed to inform the user about unauthorized entry into the facility.

Detection of the presence of an unwanted person in the building is provided by the installation of sensors, and the notification system can be centralized or autonomous.

The system can transmit burglary notices in two ways - by sound and / or by light signals.

In the first case, it is necessary to use sound annunciators (sirens, bells, etc.), in the second - light (LEDs or lamps).

In modern devices, instead of lamps and bells, more reliable and durable signaling devices based on semiconductors or piezoelectric emitters are used. Such devices, among other things, are characterized by smaller dimensions and the possibility of fine-tuning.

Other required contour elements include:

  • intrusion or presence sensors;
  • receiving and control panels and devices (PKP);
  • equipment for transmission of event data.

Information about penetration into the protected object can be transmitted remotely, to the centralized security console or the owner's mobile phone. If such a possibility is not provided (or the option is not used), we are talking about an autonomous security alarm system.

The latter option is extremely ineffective in work and is not recommended for use. Its arrangement is justified only in the case of the constant presence of the controlling person in the immediate vicinity of the protected object.

There are two ways to transmit an intrusion signal to an object - wired or wireless. Wired systems transmit appropriate information over a dedicated or busy phone line, depending on the capabilities of the owner and the proposed installation options.

The advantage of this type of signaling is high-quality, guaranteed stable direct and feedback with the monitoring panel, the ability to constantly monitor the communication channel.

Wireless alarms use the network of any cellular operator or a dedicated radio channel. When using GSM alarms, the most important thing is to ensure continuous monitoring of the availability of communication. Otherwise, it cannot be ruled out that information about the intruder will simply not be brought to the operator of the security console or the owner of the premises in time.

You can verify the availability of communication by receiving a signal from the protected object or by sending a request from the centralized security keypad and receiving the system's response. The use of the second option is more expensive, since it requires the presence of a transmitter and a receiver in the GSM module. In addition, it is necessary to have a bi-directional communication channel.

The connection check can only be discrete: this means that the request is sent at more or less short, but still finite, time intervals. The shorter such intervals, the more reliable the burglar alarm.

OPERATING PRINCIPLE OF ALARM SIGNALS

Of practical interest for the owner of the protected object is the object part of the alarm system installed in a building or room.

The overall reliability of the system largely depends on its high-quality arrangement and functioning. The components of the signaling equipment have been listed earlier. Below we will talk in more detail about the most commonly used - sensors.

The direct purpose of sensors or detectors is the detection of unregulated intrusion into the protected area. You can invade the room through a window or doorway, as well as through a gap in the wall. Therefore, it is necessary to ensure the functioning of sensors that respond to all methods used by attackers.

Burglar alarm sensors (detectors) are used to detect:

  • opening windows and doors;
  • breaking through walls and ceilings;
  • breaking glazed structures;
  • movement inside the protected premises.

In order for the information to be conveyed to the operator of the central control room, it is necessary to convert the detected action into an electrical signal. For example, if a sensor reacts to the ringing of a broken window glass, such a device is called acoustic (sound).

If an intruder breaks through a wall or tries to knock out a door, a vibration sensor will react to his actions, detecting blows to the building structure.

Relay contacts, digital signal generators and other modern technological solutions can be used as detector outputs. After the formation of the electrical signal, it is necessary to ensure its further processing. For this purpose, control and monitoring devices and panels are used. Then the information goes to the warning and transmission devices.

Signal transmission can be carried out both by wire and by means of GSM and radio channel devices. In most cases, wireless communication is understood as a method of transmitting data over a radio channel.

VARIETIES OF ALARM SYSTEMS

There are many principles for classifying these systems: according to the presence or absence of a centralized security console, the types of sensors used, the use of wires in the arrangement and the number of communication lines.

Depending on the method of transferring information, security equipment can be:

  • wired;
  • wireless.

The most common design option for the end user is wired loops. For a long time they simply did not have alternatives and, although they are now recognized as obsolete, they have a number of indisputable advantages.

The first of them is increased reliability, subject to proper installation and ensuring the integrity of the cables connecting the individual elements. The second is the low cost of parts and assembly work.

In general, a wired system is great for small room or freestanding installations. A prerequisite for the functioning of the circuit is regular monitoring of the condition of the connecting cables.

As the name implies, in wireless versions, instead of wires, a radio signal is used, broadcast via a dedicated channel or via GSM, to ensure the interconnection of individual elements. The advantage of such a system is that there is no need for construction and installation work.

Disadvantages include significantly higher prices for the equipment used and attenuation of the transmitted signal at a distance. In addition, in the presence of strong electromagnetic fields in the signaling area, it is impossible to guarantee high-quality communication.

The best option for arranging a burglar alarm is to create an address system. The method is applicable for both wired and wireless options. The principle of operation of addressable signaling is to assign a unique identification number to each sensor. Thus, the alarm control panel can determine exactly from which detector the alarm was received.

The main advantages of the addressable device are the ability to connect all sensors with one communication line and the low cost of installation work. In contrast, the equipment for such circuits is slightly more expensive than for conventional ones. In general, address systems are the best option for protecting large and medium-sized objects.

When choosing a security alarm system, it is necessary to focus on the technical characteristics of the premises, the manufacturer and the financial capabilities of the owner of the facility. It is best to entrust the installation and maintenance of the system to verified certified organizations of the appropriate direction.

AUTOMATIC ALARM SYSTEMS

Since signal transmission between the elements of any circuit occurs without human intervention, any signaling can theoretically be called automatic. At present, intelligent complexes with a significantly higher level of automation are being actively developed.

It is extremely important to have a self-test (automatic control) option in the alarm. Such a possibility can be implemented in addressable devices, and for its functioning, a software add-on is required over the hardware component.

In addition, programmable systems have the following capabilities that are not available in purely hardware systems:

  • integration of individual circuits into a single complex;
  • differentiation of access rights for each operator;
  • creation of complex scenarios of equipment operation.

No matter how modern the burglar alarm is, it is impossible to completely eliminate the risk of false alarms and the associated inconveniences. However, due to the possibility of a comprehensive analysis of factors affecting the sensors, at present this probability can be minimized.

This allows you to reduce the cost of response (visiting the scene) and additional maintenance of the system, as well as create the most comfortable working conditions for the operator.

There are security systems of foreign and domestic production on the market. Among the latter, the most successful development is the Orion system developed by the Bolid NVP.

This complex has a friendly, intuitive interface, a wide range of customizable functions and the ability to configure for specific purposes.

© 2012-2020. All rights reserved.

The materials presented on the site are for informational purposes only and cannot be used as guidelines and normative documents.