0% found this document useful (0 votes)
249 views5 pages

Burglar Alarm

Burglar alarms use various sensor types to detect unauthorized entry into buildings and areas. Sensors can detect intruders through door/window contacts, motion detectors, glass breakage, or changes in light, sound, temperature or other fields. Alarm systems range from basic noisemakers to complex multi-zone systems that interface with surveillance cameras and access control for doors. Burglar alarms are used to protect residential, commercial and vehicle properties.

Uploaded by

Bharath Reddy
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
249 views5 pages

Burglar Alarm

Burglar alarms use various sensor types to detect unauthorized entry into buildings and areas. Sensors can detect intruders through door/window contacts, motion detectors, glass breakage, or changes in light, sound, temperature or other fields. Alarm systems range from basic noisemakers to complex multi-zone systems that interface with surveillance cameras and access control for doors. Burglar alarms are used to protect residential, commercial and vehicle properties.

Uploaded by

Bharath Reddy
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 5

Burglar (or intrusion), alarms are systems designed to detect unauthorized entry into a building or area.

They consist of an array of sensors, a control panel a nd alerting system, and interconnections. Sensors detect intruders by many metho ds such as monitoring door and window contacts, by passive infrared motion detec tors, ultrasound, vibration, electric or magnetic fields, or microwaves. Sensors may be directly wired to a control panel that provides sensor power, or may com municate wirelessly. Some alarm systems serve a single purpose of burglar or fire protection. Combina tion systems provide both fire and intrusion protection. Intrusion alarm systems may also be combined with closed-circuit television surveillance systems to aut omatically record the activities of intruders, and may interface to access contr ol systems for electrically locked doors. Systems range from small, self-contain ed noisemakers, to complicated, multi-zoned systems with color-coded computer mo nitor outputs. Burglar alarms (or perimeter security systems, perimeter detection systems, Peri meter protection, intrusion detection systems and other terms for the same thing ) are used in residential, industrial, and commercial properties for protection against theft or property damage. Mobile alarm systems protect vehicles and thei r contents ("car alarms"). Prisons and military facilities use intrusion detecti on systems for security and control of access. There are hundreds of alarm monit oring companies providing real-time monitoring services for varieties of users o n monthly contractual obligations.[1] Contents [hide] 1 Sensor types 1.1 Indoor 1.1.1 Passive infrared detectors 1.1.2 Ultrasonic detectors 1.1.3 Microwave detectors 1.1.4 Photo-electric beams 1.1.5 Glass break detectors 1.1.6 Smoke, heat, and carbon monoxide detectors 2 Outdoor 2.1 Vibration (shaker) or inertia sensors 2.2 Passive magnetic field detection 2.3 E-field 2.4 Microwave barriers 2.5 Microphonic systems 2.6 Taut wire fence systems 2.7 Fibre optic cable 2.8 H-field 3 System connections 4 Alarm connection and monitoring 5 Broadband Alarm Monitoring 6 Radio alarm dual signalling 7 Listen-in alarm monitoring 8 Alarm monitoring services 9 Alarm response 10 Access control and bypass codes 11 False / no alarms 12 False-alarm reduction 13 Cross zoning 14 Enhanced Call Verification 15 Video verification 16 Independent certification 17 See also 18 References 19 Sources 20 External links [edit]Sensor types

[edit]Indoor These types of sensors are designed for indoor use. Outdoor use would not be adv ised due to false alarm vulnerability and weather durability. [edit]Passive infrared detectors A passive infrared sensor of a burglar alarm detection point The passive infrared detector (PIR) is one of the most common detectors found in household and small business environments because it offers affordable and reli able functionality. The term passive means the detector is able to function with out the need to generate and radiate its own energy (unlike ultrasonic and micro wave volumetric intrusion detectors that are active in operation). PIRs are able t o distinguish if an infrared emitting object is present by first learning the am bient temperature of the monitored space and then detecting a change in the temp erature caused by the presence of an object. Using the principle of differentiat ion, which is a check of presence or nonpresence, PIRs verify if an intruder or object is actually there. Creating individual zones of detection where each zone comprises one or more layers can achieve differentiation. Between the zones the re are areas of no sensitivity (dead zones) that are used by the sensor for comp arison. [edit]Ultrasonic detectors Using frequencies between 15 kHz and 75 kHz, these active detectors transmit ult rasonic sound waves that are inaudible to humans. The Doppler shift principle is the underlying method of operation, in which a change in frequency is detected due to object motion. This is caused when a moving object changes the frequency of sound waves around it. Two conditions must occur to successfully detect a Dop pler shift event: There must be motion of an object either towards or away from the receiver. The motion of the object must cause a change in the ultrasonic frequency to the receiver relative to the transmitting frequency. The ultrasonic detector operates by the transmitter emitting an ultrasonic signa l into the area to be protected. The sound waves are reflected by solid objects (such as the surrounding floor, walls and ceiling) and then detected by the rece iver. Because ultrasonic waves are transmitted through air, then hard-surfaced o bjects tend to reflect most of the ultrasonic energy, while soft surfaces tend t o absorb most energy. When the surfaces are stationary, the frequency of the waves detected by the rec eiver will be equal to the transmitted frequency. However, a change in frequency will occur as a result of the Doppler principle, when a person or object is mov ing towards or away from the detector. Such an event initiates an alarm signal. This technology is considered obsolete by many alarm professionals, and is not a ctively installed. [edit]Microwave detectors This device emits microwaves from a transmitter and detects any reflected microw aves or reduction in beam intensity using a receiver. The transmitter and receiv er are usually combined inside a single housing (monostatic) for indoor applicat ions, and separate housings (bistatic) for outdoor applications. To reduce false alarms this type of detector is usually combined with a passive infrared detect or or "Dualtec" alarm. Microwave detectors respond to a Doppler shift in the frequency of the reflected energy, by a phase shift, or by a sudden reduction of the level of received ene rgy. Any of these effects may indicate motion of an intruder. [edit]Photo-electric beams Photoelectric beam systems detect the presence of an intruder by transmitting vi sible or infrared light beams across an area, where these beams may be obstructe d. To improve the detection surface area, the beams are often employed in stacks of two or more. However, if an intruder is aware of the technology's presence, it can be avoided. The technology can be an effective long-range detection syste m, if installed in stacks of three or more where the transmitters and receivers are staggered to create a fence-like barrier. Systems are available for both int

ernal and external applications. To prevent a clandestine attack using a seconda ry light source being used to hold the detector in a 'sealed' condition whilst a n intruder passes through, most systems use and detect a modulated light source. [edit]Glass break detectors The glass break detector may be used for internal perimeter building protection. When glass breaks it generates sound in a wide band of frequencies. These can r ange from infrasonic, which is below 20 hertz (Hz) and can not be heard by the h uman ear, through the audio band from 20 Hz to 20 kHz which humans can hear, rig ht up to ultrasonic, which is above 20 kHz and again cannot be heard. Glass brea k acoustic detectors are mounted in close proximity to the glass panes and liste n for sound frequencies associated with glass breaking. Seismic glass break dete ctors are different in that they are installed on the glass pane. When glass bre aks it produces specific shock frequencies which travel through the glass and of ten through the window frame and the surrounding walls and ceiling. Typically, t he most intense frequencies generated are between 3 and 5 kHz, depending on the type of glass and the presence of a plastic interlayer. Seismic glass break dete ctors feel these shock frequencies and in turn generate an alarm condition. The more primitive detection method involves gluing a thin strip of conducting f oil on the inside of the glass and putting low-power electrical current through it. Breaking the glass is practically guaranteed to tear the foil and break the circuit. [edit]Smoke, heat, and carbon monoxide detectors Heat detection system Most systems may also be equipped with smoke, heat, and/or carbon monoxide detec tors. These are also known as 24 hour zones (which are on at all times). Smoke d etectors and heat detectors protect from the risk of fire and carbon monoxide de tectors protect from the risk of carbon monoxide. Although an intruder alarm pan el may also have these detectors connected, it may not meet all the local fire c ode requirements of a fire alarm system. [edit]Outdoor These types of sensors would be found most of the time mounted on fences or inst alled on the perimeter of the protected area. [edit]Vibration (shaker) or inertia sensors These devices are mounted on barriers and are used primarily to detect an attack on the structure itself. The technology relies on an unstable mechanical config uration that forms part of the electrical circuit. When movement or vibration oc curs, the unstable portion of the circuit moves and breaks the current flow, whi ch produces an alarm. The technology of the devices varies and can be sensitive to different levels of vibration. The medium transmitting the vibration must be correctly selected for the specific sensor as they are best suited to different types of structures and configurations. A rather new and unproven type of sensors use piezo-electric components rather t han mechanical circuits, which can be tuned to be extremely sensitive to vibrati on. pros: Very reliable sensors, low false alarm rate and middle place in the price range. cons: Must be fence mounted. The rather high price deters many customers, but it s effectiveness offsets its high price. Piezo-electric sensors are a new technol ogy with an unproven record as opposed to the mechanical sensor which in some ca ses has a field record in excess of 20 years. [edit]Passive magnetic field detection This buried security system is based on the Magnetic Anomaly Detection principle of operation. The system uses an electromagnetic field generator powered by two wires running in parallel. Both wires run along the perimeter and are usually i nstalled about 5 inches apart on top of a wall or about 12"/30 cm below ground. The wires are connected to a signal processor which analyzes any change in the m agnetic field.

This kind of buried security system sensor cable could be embedded in the top of almost any kind of wall to provide a regular wall detection ability, or can be buried in the ground. They provide a very low false alarm rate, and have a very high chance of detecting real burglars. However, they cannot be installed near h igh voltage lines, or radar transmitters. [edit]E-field This proximity system can be installed on building perimeters, fences, and walls . It also has the ability to be installed free standing on dedicated poles. The system uses an electromagnetic field generator powering one wire, with another s ensing wire running parallel to it. Both wires run along the perimeter and are u sually installed about 800 millimetres apart. The sensing wire is connected to a signal processor that analyses: amplitude change (mass of intruder), rate change (movement of intruder), preset disturbance time (time the intruder is in the pattern). These items define the characteristics of an intruder and when all three are det ected simultaneously, an alarm signal is generated. The barrier can provide protection from the ground to about 4 metres of altitude . It is usually configured in zones of about 200 metre lengths depending on the number of sensor wires installed. pros: concealed as a buried form. cons: expensive, short zones which mean more electronics (more money), high rate of false alarms as it cannot distinguish a cat from a human. In reality it does not work that well, as extreme weather causes false alarms. [edit]Microwave barriers The operation of a microwave barrier is very simple. This type of device produce s an electromagnetic beam using high frequency waves that pass from the transmit ter to the receiver, creating an invisible but sensitive wall of protection. Whe n the receiver detects a difference of condition within the beam (and hence a po ssible intrusion), the system begins a detailed analysis of the situation. If th e system considers the signal a real intrusion, it provides an alarm signal that can be treated in analog or digital form. pros:low cost, easy to install, invisible perimeter barrier, unknown perimeter l imits to the intruder. cons:extremely sensitive to weather as rain, snow and fog for example would caus e the sensors to stop working, need sterile perimeter line because trees, bushes or anything that blocks the beam would cause false alarm or lack of detection. [edit]Microphonic systems Microphonic based systems vary in design but each is generally based on the dete ction of an intruder attempting to cut or climb over a chainwire fence. Usually the microphonic detection systems are installed as sensor cables attached to rig id chainwire fences, however some specialised versions of these systems can also be installed as buried systems underground. Depending on the version selected, it can be sensitive to different levels of noise or vibration. The system is bas ed on coaxial or electro-magnetic sensor cable with the controller having the ab ility to differentiate between signals from the cable or chainwire being cut, an intruder climbing the fence, or bad weather conditions. The systems are designed to detect and analyse incoming electronic signals recei ved from the sensor cable, and then to generate alarms from signals which exceed preset conditions. The systems have adjustable electronics to permit installers to change the sensitivity of the alarm detectors to the suit specific environme ntal conditions. The tuning of the system is usually accomplished during commiss ioning of the detection devices. pros: very cheap, very simple configuration, easy to install. cons: some systems have a high rate of false alarms because some of these sensor s might be too sensitive. Although systems using DSP (Digital Signal Processing) will largely eliminate false alarms on some cases. [edit]Taut wire fence systems A taut wire perimeter security system is basically an independent screen of tens ioned tripwires usually mounted on a fence or wall. Alternatively, the screen ca

n be made so thick that there is no need for a supporting chainwire fence. These systems are designed to detect any physical attempt to penetrate the barrier. T aut wire systems can operate with a variety of switches or detectors that sense movement at each end of the tensioned wires. These switches or detectors can be a simple mechanical contact, static force transducer or an electronic strain gau ge. Unwanted alarms caused by animals and birds can be avoided by adjusting the sensors to ignore objects that exert small amounts of pressure on the wires. Thi s type of system is vulnerable to intruders digging under the fence. A concrete footing directly below the fence is installed to prevent this type of attack. pros: low rate of false alarms, very reliable sensors and high rate of detection . cons: Very expensive, complicated to install and old technology.

You might also like