Remote security: features of choice

pult56

#Remote control security If you decide to engage in remote control security, the most important issue will be the choice of equipment. It is no secret that mistakes made when choosing a security system can be revealed in a few years. It will be very difficult, and often impossible, to correct them.

First of all, you should decide on the method of delivering information.

The methods of transmitting data from the protected object to the console are divided into wired and wireless.

The first method of data transmission is based on physically laid electrical wires.

It is necessary to decide on the owner of the cable and, accordingly, the area of ​​responsibility of the security company.

If you install the communication line yourself, you are fully responsible for its safety. Otherwise, you can rent the line from a cable operator.

The most common option for wired security is data transmission via the Internet. For this, a special device is used — a protocol converter (for example, «Barrier ABI-Ethernet»).

Security via local, independently installed wired communication lines is starting to gain momentum. Especially in territorially located security facilities.

The alarm device (for example, the PKPOP «Barrier-TM3» or PKPOP «Barrier-TM41») in this case has the lowest price.

All objects of the remote control panel are connected to each other by a wired communication line.

The Central Monitoring Console (CMC) (a device for displaying the status of security objects (PKP Barrier-16 or PKP Barrier-2000)) or a device for transmitting to it via another type of communication (for example, in the «ABI-433MS» converter, this is a radio frequency transmission) is also included in this line.

The following data transmission channels are wireless.

Security via radio modems (e.g. Wi-Fi) is a special case of wireless Internet. It is built on the basis of equipment for wireless access to computer networks.

The device for interfacing such equipment with the alarm system is usually a protocol converter (e.g. «Barrier ABI-Ethernet»).

The system capacity in this case is practically unlimited, since the volume of transmitted messages for the protection of objects is negligible compared to normal Internet traffic.

Working on a dedicated frequency is the most common and most reliable option for remote control.

To work, you must obtain permission to use radio frequencies.

I will note here a small legal nuance: according to the law, a security company cannot sell a radio transmitting device to anyone, you can only lease it.

Therefore, when installing a security device, it is necessary to provide for the option of returning it to the security company in the event of termination of contractual relations.

Using a removable transmitter module as part of the security device (as is done in the «Barrier» system) is the most convenient option from this point of view. In the event of any interference or extraneous signals on the air, the problems of detecting them will be taken on by the relevant government services.

For security companies operating in small towns, you can consider the option of working on frequencies in the unregistered range.

There are several such ranges in the Russian Federation.

Amateur radio stations operate in the 27 MHz range and it is not suitable for work in large cities.

The 433 MHz range is specially allocated for devices transmitting data over short distances.

In large cities, the level of extraneous signals from portable radio stations (LPD and PMR) and car alarm key fobs makes the alarm impossible to operate at any significant distance. But many manufacturers (for example, NPO Pioneer) allow you to reprogram carrier frequencies in this range.

This allows you to adjust the operation of the device in a specific location. Functionally, these can be either independent devices (for example, «Barrier — TM3-MS»), or devices for interfacing with already installed equipment — the «Barrier ABI-MS» converter.

The most promising type of communication in remote security, in my opinion, is the GSM cellular network.

This method is the most optimal for security companies just starting their activities. I would like to note that when choosing this type of communication, you get two-way communication with the object of protection. At the same time, the services provided reach a fundamentally new level.

Control from the central control panel becomes available (arming from the central control panel, prompt prohibition of alarm setting for specific users, control of the outputs of the security device).

The most common method of transmitting information to the central monitoring station is GPRS Internet. The most convenient design solution, in my opinion, is to use a cellular module (for example, a GSM-TR modem).

Having two SIM cards is the optimal option for a cellular operator backup.

If transmission via the main SIM card is impossible, the system switches to the second one. The function of sending SMS messages of a certain content to any subscribers from different SIM cards turned out to be very successful in use.

This allows you to optimally spend money on sending messages without reducing the information content.

It is better to leave the burden of payments to the cellular company on the security company.

As a rule, these payments remain constant on the scale of the enterprise.

Based on personal experience, I can say that when choosing a cellular operator, you need to focus not only on the price of the service and the coverage area of ​​the territory, but also on the convenience of the subscriber service.

The time it takes to resolve any problems that arise will directly depend on this.

As a rule, all security facilities have the same personal account, and therefore, if one facility fails, cellular services are disconnected for all.

And the speed of finding the source of the problem will depend not only on the duration of the failure of the entire system, but also on the expenditure of funds on the balance account.

I will dwell in more detail on the periodic signals of the security system.

These are the signals that the alarm unit transmits at certain intervals.

A distinction is made between security periodic signals, those transmitted during guarded time, and test periodic signals, which are transmitted at other times. The total time of receiving these signals at the central monitoring station should not exceed 10–12%. Otherwise, the risk of overlapping signals increases and there is a chance of missing, for example, an alarm or setting signal.

The facility equipment must allow setting the period of these signals and the number of their repetitions.

These parameters play a key role in the maximum number of objects on one communication channel. In addition, periodic signals contain complete information about the current state of the alarm.

The functional capabilities of facility devices are varied.

From the point of view of the security company, the signal of loss of supply voltage or battery discharge plays an important role.

The signal of opening the device — tamper, must be sent as a separate, specially allocated message. The more types of messages a security device can issue, the better.

The more information a security company crew or a technical service employee has, the better and faster they will do their job.

The market for remote monitoring of security devices is huge.

It is encouraging that the leading positions in it are occupied by devices manufactured in Russia.

I hope that my article will help you make the right choice of equipment for a remote security system.

    Мы используем cookie-файлы для наилучшего представления нашего сайта. Продолжая использовать этот сайт, вы соглашаетесь с использованием cookie-файлов.
    Принять