Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 INTRUSION ALARM TECHNOLOGY INTRO TO INTRUSION ALARM.

Similar presentations


Presentation on theme: "1 INTRUSION ALARM TECHNOLOGY INTRO TO INTRUSION ALARM."— Presentation transcript:

1 1 INTRUSION ALARM TECHNOLOGY INTRO TO INTRUSION ALARM

2 2 INTRUSION ALARM TECHNOLOGY An intrusion detection system consists of several different system components wired together to provide protection of persons and property.

3 3 INTRUSION ALARM TECHNOLOGY Intrusion detection systems (IDS) are also called security alarms, security systems, alarm systems, perimeter detection systems, burglar alarm systems and similar terms. Burglar alarms are used in residential, commercial, industrial, and military properties for protection against theft or property damage, as well as personal protection against intruders. Intrusion detection systems (IDS) are also called security alarms, security systems, alarm systems, perimeter detection systems, burglar alarm systems and similar terms. Burglar alarms are used in residential, commercial, industrial, and military properties for protection against theft or property damage, as well as personal protection against intruders.

4 4 INTRUSION ALARM TECHNOLOGY Car alarms likewise protect vehicles and their contents. Prisons also use security systems for control of inmates. Some alarm systems serve a single purpose of burglary protection; combination systems provide both fire and intrusion protection. Many burg. Panels at a minimum provide a zone for smoke detectors. Car alarms likewise protect vehicles and their contents. Prisons also use security systems for control of inmates. Some alarm systems serve a single purpose of burglary protection; combination systems provide both fire and intrusion protection. Many burg. Panels at a minimum provide a zone for smoke detectors.

5 5 INTRUSION ALARM TECHNOLOGY Intrusion alarm systems may also be combined with closed-circuit television (CCTV) surveillance systems to automatically record the activities of intruders. Many CCTV systems have alarm interfaces that facilitate quick and easy interconnection to an intrusion alarm system. Intrusion alarm systems may also be combined with closed-circuit television (CCTV) surveillance systems to automatically record the activities of intruders. Many CCTV systems have alarm interfaces that facilitate quick and easy interconnection to an intrusion alarm system.

6 6 INTRUSION ALARM TECHNOLOGY Burglar alarm systems may interface to access control systems for electrically locked doors that require a key fob or access card/code. Systems range from small, self-contained noisemakers, to complicated, multi-zone systems with computer monitoring and control. Burglar alarm systems may interface to access control systems for electrically locked doors that require a key fob or access card/code. Systems range from small, self-contained noisemakers, to complicated, multi-zone systems with computer monitoring and control. PERSONAL ALARM SYSTEM NOISE MAKER

7 7 INTRUSION ALARM TECHNOLOGY A basic burglar alarm is a simple circuit consisting of a loop, switch, battery and a buzzer. The switch symbol represents many different types of detection devices, switches can be normally open (N.O.) or normally closed (N.C.). A basic burglar alarm is a simple circuit consisting of a loop, switch, battery and a buzzer. The switch symbol represents many different types of detection devices, switches can be normally open (N.O.) or normally closed (N.C.).

8 8 INTRUSION ALARM TECHNOLOGY The switch symbols pictured below represent any detection device such as; PIRs (passive infrared), reed switches, tamper switches, glass break sensors etc. These devices are classified as either a normally open (N.O.) or normally closed device (N.C.). The switch symbols pictured below represent any detection device such as; PIRs (passive infrared), reed switches, tamper switches, glass break sensors etc. These devices are classified as either a normally open (N.O.) or normally closed device (N.C.). NORMALLY OPEN SWITCH NORMALLY CLOSED SWITCH

9 9 INTRUSION ALARM TECHNOLOGY As with many low voltage systems the primary component or heart of the system is the central device that controls all other components. In this case the control panel (CP) is the heart of the intrusion detection system. The CP houses all of the electronics used to monitor the detection devices and route signals to notification devices. As with many low voltage systems the primary component or heart of the system is the central device that controls all other components. In this case the control panel (CP) is the heart of the intrusion detection system. The CP houses all of the electronics used to monitor the detection devices and route signals to notification devices.

10 10 INTRUSION ALARM TECHNOLOGY Alarm systems can be sub-divided into three parts: DETECTION CONTROL SIGNALING

11 11 INTRUSION ALARM TECHNOLOGY We can further break down an alarm system into all the separate components.

12 12 INTRUSION ALARM TECHNOLOGY Detection devices are used to detect a human or non- human (animals,) intruders. Notification/annunciation devices communicate information about an intrusion system to its user, the information can be audible, visual or both. Communication devices communicate an alarm condition to the user or a monitoring station. Detection devices are used to detect a human or non- human (animals,) intruders. Notification/annunciation devices communicate information about an intrusion system to its user, the information can be audible, visual or both. Communication devices communicate an alarm condition to the user or a monitoring station.

13 13 INTRUSION ALARM TECHNOLOGY Control units are keypads that are either LCD (liquid crystal display) or LED (light emitting diode) and provide the means to program the alarm system. The Power supply is both wired and battery back up which is self contained in the control panel enclosure. Control units are keypads that are either LCD (liquid crystal display) or LED (light emitting diode) and provide the means to program the alarm system. The Power supply is both wired and battery back up which is self contained in the control panel enclosure.

14 14 INTRUSION ALARM TECHNOLOGY The separate components will be wired to zones in the control panel and it is common for the wiring schematics for the panel to be listed on the inside door of the enclosure. SCHEMATICS INCLUDED

15 15 INTRUSION ALARM TECHNOLOGY You have already been introduced to several abbreviations that are frequently used in the burglar alarm industry, we will cover a few more. CP = ? IDS= ? N.O.= ? N.C.= ? You have already been introduced to several abbreviations that are frequently used in the burglar alarm industry, we will cover a few more. CP = ? IDS= ? N.O.= ? N.C.= ? NORMALLY OPENNORMALLY CLOSED INTRUSION DETECTION SYSTEM CONTROL PANEL

16 16 INTRUSION ALARM TECHNOLOGY EOL= End of lines resistor, this is used to monitor the wired loop. PIR = Passive infrared detector, a commonly used device to cover large areas. C = Used in control panels to indicate a common lead shared by two zones. POTS = Plain old telephone service, dial tone used by the control panel EOL= End of lines resistor, this is used to monitor the wired loop. PIR = Passive infrared detector, a commonly used device to cover large areas. C = Used in control panels to indicate a common lead shared by two zones. POTS = Plain old telephone service, dial tone used by the control panel

17 17 INTRUSION ALARM TECHNOLOGY RJ-31X = Is an alarm panel jack, POTS gets wired to this jack. HUA = Holdup alarm, used on keypads or panic buttons. DS = Door strike JB = Junction box RJ-31X = Is an alarm panel jack, POTS gets wired to this jack. HUA = Holdup alarm, used on keypads or panic buttons. DS = Door strike JB = Junction box

18 18 INTRUSION ALARM TECHNOLOGY When working with blueprints to install an intrusion alarm system all of the devices will be represented with a box or rectangle containing an abbreviation. Cables are home runs back to the control panel and are labeled as zones. A zone can have a few devices or dozens of devices wired in either series or parallel. When working with blueprints to install an intrusion alarm system all of the devices will be represented with a box or rectangle containing an abbreviation. Cables are home runs back to the control panel and are labeled as zones. A zone can have a few devices or dozens of devices wired in either series or parallel.

19 19 INTRUSION ALARM TECHNOLOGY Here is an example of zone wiring, notice that zone 1 is a N.O. device loop and zone 2 is a N.C. device loop. WHAT DOES THIS LINE REPRESENT?

20 20 INTRUSION ALARM TECHNOLOGY The value of the EOL can be found on the control panel door in the wiring schematic. There are separate wiring terminals for communication devices, notification devices and keypads, these devices are not connected to the zone wiring loops. The value of the EOL can be found on the control panel door in the wiring schematic. There are separate wiring terminals for communication devices, notification devices and keypads, these devices are not connected to the zone wiring loops.


Download ppt "1 INTRUSION ALARM TECHNOLOGY INTRO TO INTRUSION ALARM."

Similar presentations


Ads by Google