Protecting your property is a technical matter.

Protecting real estate is a matter of technique.

According to the Russian Ministry of Internal Affairs, in 2009, the number of crimes registered in the Russian Federation amounted to 2 million 994.8 thousand. Almost half of all registered crimes (47.1%) are thefts of other people's property. Almost every third theft (32.1%), every twenty-third robbery (4.3%) and every twelfth armed robbery (8.2%) were associated with illegal entry into a home, premises or other storage facility.
In Russia as a whole, in the first half of 2009 alone, non-departmental security units detected 62.1 thousand crimes for which criminal cases were initiated, including 4,588 thefts of the guarded property of owners, including 295 from apartments. In this case, more than 85 thousand criminals were detained. During the same period, 13 attacks were committed on credit and financial sector facilities under the protection of private security companies, the total amount of damage was 48 million rubles, 5 employees were injured, 1 employee died.
The capacity of the Russian market for remote security is .5 billion, of which about 0 million are in Moscow and the Moscow region.

The high crime rate in our country has led to the fact that almost all cars are equipped with alarms, and the number of stationary objects equipped with security systems is growing every day. Today, almost no one needs to be convinced of the need to create reliable protection for their business and property. One of the most common methods of combating theft and burglary is remote security.
Remote security is a method of protecting real estate objects, including technical solutions for the objects themselves, remote control, assessment of the situation by the operator of the monitoring center and certain actions to prevent, respond and eliminate emergency events.

The principle of operation of security systems
A control panel and sensors are installed on the property (apartment, house, store, office space): closing/opening of the entrance door, volume, movement, fire and leakage. The sensors are located at entry/exit points and at vulnerable points (glass windows). As soon as the sensor determines its type of threat (volume violation, movement, fire, smoke, water, door opening), it sends an alarm signal to the control panel. From there, the signal goes to the monitoring center or, as they are called, the centralized monitoring station (CMS).
GOST defines a central monitoring station as an independent technical device (a set of technical devices) or an integral part of a notification transmission system installed at a centralized security post to receive notifications about intrusion into protected facilities and/or fires therein from remote control terminal devices or a repeater, service and control and diagnostic notifications, to process, display, record the received information and present it in a specified form for further processing, and also (if there is a return channel) to transmit remote control commands through a remote control terminal device to a repeater and facility terminal devices.
Modern central monitoring stations are based on a computer and specialized software. Centralized monitoring stations can also operate on a local area network (LAN). According to experts, this ensures the reception of information via various communication channels, its transmission to a large circle of users, and maximum use of the capabilities of modern information technologies in the systems.
A fundamentally important point is the communication channels used to transmit information and data from the facility equipment to the central monitoring station.
Until recently, the telephone network was the only medium for transmitting information from an alarm device to a central monitoring station. This was usually done in one of two ways. In the first, autodialing, a remote device called the central monitoring station and transmitted alarm codes using special tone packets. The main disadvantage of this approach is that an intruder can cut the telephone wire and enter the protected facility unnoticed. In the second method, the integrity of the line is constantly monitored, and if a violation is detected, an alarm signal is considered to have been received. But this has its own problems: to implement such monitoring, specialized equipment must be installed on each PBX to which security alarm devices can be connected. This is expensive and troublesome, and sometimes impossible given the different types of PBX equipment. In addition, telephone lines throughout the post-Soviet space are generally of low quality, and either the alarm message does not reach the central monitoring station, or false connection breaks occur. And many facilities are simply not equipped with telephones. Transmitting alarm signals via radio is a completely different approach. You can't cut the wires here. But there are plenty of difficulties. There are quite a few fixed-frequency radio monitoring systems, but there are several serious problems, such as strong radio interference, obstacles in the path of radio wave propagation (buildings, uneven terrain), or the distance of objects from the base station.
In recent years, monitoring stations using a cellular communication channel have appeared. The rapid development and spread of GSM cellular telephone communications has become a good incentive for creating systems that use the wide possibilities of new technologies. Monitoring is a technical component of modern security control panel and involves receiving alarm, service and control signals from a security and fire alarm system installed at the facility; recording in the event register; notifying the client (their authorized person) about receiving alarm notifications or the occurrence of an emergency situation at the facility. If necessary, state emergency response services and a private security company crew are dispatched to the facility.
Modern electronic security guards are equipped with a fairly developed virtual intelligence — they can conduct self-diagnostics and report problems in a timely manner, distinguish people from animals by the nature of their movement on the site, and even transmit video images from the protected site.

Technical sideVarious sensors are used to protect premises. Passive infrared motion sensors are triggered when a moving object emitting heat enters the sensor's sensitivity zone. Glass break sensors react to the sound of breaking glass. The most advanced models analyze the spectrum of sound noises in the room. If the noise spectrum contains a component that matches the spectrum of the damaged glass, the sensor is triggered. One such sensor can protect glass windows, display cases, etc. with an area of ​​up to 10 m². Photoelectric sensors are used in internal and external perimeter protection systems for contactless blocking of spans, doors, elevators, openings, corridors, etc. They are distinguished by high stability and reliability. Photoelectric sensors consist of two parts — a transmitter and a receiver. They are distributed along the security line. A system of modulated infrared rays passes between them. Sensors of this type are triggered when an attempt is made to cross the system of rays, and are distinguished by high stability and reliability. Magnetic sensors are a reed switch-magnet pair and are installed on windows, doors and hatches. They are usually placed at the top of the door or window and are triggered when opening/closing.
When choosing between a wired or radio channel system, it should be remembered that the wire is exposed to external influences along its entire length. Laid in a wall, it can be damaged by a simple drill. Careless installation in distribution boxes can lead to poor contacts, and water penetration can lead to grounding and oxidation. Design errors can, for example, in the event of a fire lead to a situation where the wire burns out before the system can detect the fire.
The main problem of radio channel systems is the reliability of their operation. The occurrence of radio interference can lead to disruption of signal transmission. The wireless equipment set itself cannot be used for security purposes and is only a functional part of the wireless fire alarm system. The receiver is used to receive radio signals from sensors installed at various points of the protected facility, convert radio signals into electrical signals and analyze them in the control panel. Each wireless sensor has an individual identification number, which allows the control panel to uniquely determine from which transmitter the signal was received and makes it difficult for intruders to scan the code.
Receiving and control devices for security, security and fire alarms and fire alarms are the brain of the system. They are designed to receive and process alarm and process signals from sensors; distinguish received signals; light and sound signaling of incoming alarm or damage signals; automatic switching to backup power supply when the main power supply voltage disappears and back with the inclusion of the appropriate signaling, without issuing false signals; transmitting signals to the monitoring center; providing procedures for taking the object under protection and disarming it. Thus, the set of transmitted signals allows the control panel to receive complete information about both the state of the protected premises and the state of the sensor itself, ensuring a high level of reliability of the entire wireless security and fire system as a whole.

    Мы используем cookie-файлы для наилучшего представления нашего сайта. Продолжая использовать этот сайт, вы соглашаетесь с использованием cookie-файлов.
    Принять