StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Components of an Alarm System - Term Paper Example

Cite this document
Summary
This term paper "The Components of an Alarm System" discusses the building that requires an effective alarm system due to the potential fire and burglary threats. The most appropriate alarm system that has been chosen is a combination of fire and burglar alarm systems…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.9% of users find it useful

Extract of sample "The Components of an Alarm System"

Security Systems Student’s Name Institution Affiliation Introduction The need for security in the modern day environment both in residential and commercial properties has seen an unprecedented rise in demand of effective alarm systems (Weber, 2002). Such systems are capable of performing various purposes for instance detecting intruders, detecting any fire that may occur in a building or even warning of any danger that may be lurking in a particular environment. As such, a working alarm system is first meant to detect an event. After the detection, the system is then programmed in such a way as to be able to determine whether that event is threatening in any way. The National Burglar Fire Alarms Association (2010) observes that detection and deterring are the major roles of an alarm system. However, they add that an alarm also informs or warns about the impending occurrence of that particular event so that necessary precautions can be taken. This association further states that in the process of warning, the alarm system also acts as a deterrent to a crime. For instance, by scaring away potential burglars hence the assertion that besides detection and informing, it also serves as a deterrent to an impending crime. Besides the conventional uses of the alarm, such as detection of intruders as well as fire detection, the need to safeguard personal safety, for instance from injuries has heralded a new use for the alarm. In relation to this, Weber (2002) writes that alarm systems can also be used to inform of any fatal events. Such events may include injuries that have happened to the occupant of a certain environment in order to enable the victim to get help from other people. The purpose of this report is to describe the purpose of the components of an alarm system. Due to the wide nature of today’s systems, this report will pay special focus to volumetric sensors and point sensors, besides looking into the alarm panel. In addition, this report will analyze how the alarm communicates with the central monitoring system and the features associated with a central monitoring system. Volumetric Sensors Trimmer notes that volumetric sensors are those whose design is meant to detect the movement of intruders who may have entered a space or building under protection by the alarm (2000). He further informs that depending on the security requirements of a particular space, volumetric sensors can be classified as being either passive sensors or active sensors. Active Sensors The Canadian Fire Alarms Association (CFAA) (2003) offers credence to this note by further explaining that the active sensors operate by emitting an energy pattern into the to fill the space under protection. In the case that any motion occurs thereby disturbing the energy patterns, the alarm system will recognize such disturbances. This recognition will lead to the triggering of the alarm system, hence informing of the potential intrusion into the space under protection. The most common active sensors are the microwave sensors whose major features are a transmitter and a receiver. Both of these features are in a monostatic combination for applications that are purely indoor but if otherwise, they can be in separate housings for outdoor applications (Zedner, 2007). The microwave sensor functions by emitting microwaves into the space being monitored by the sensors. The detector on its part is meant to recognize any reflections of the waves that have been emitted by the transmitter. Besides that, it also detects any changes that may occur to the intensity of the beam on emission. However, this poses the threat of false alarms but such a threat can be countered through the combination of the active sensor with a passive infrared detector. As such, through variations of the waves that are transmitted, the active sensors can detect the movements of a possible intruder hence setting off the alarm. Passive Sensors On the other hand, the passive sensors do not emit any energy but rather tend to detect any energy that may be emitted by a potential intruder (NATO et.al, 2006). A common type of passive sensor is a passive infrared sensor. This sensor functions by detecting variations in energy patterns that may be because of movements by a potential intruder. In the case that the energy variations satisfy the criteria of the detecting alarm, an alarm is sent. A crucial fact to note is that these sensors just monitor energy radiations of their surrounding environment. For effective functioning of the infrared sensors, the infrared energy ought to be focused directly on the sensing element. The Engineering Equipment and Material Users Association (2002) explain that the focusing techniques are of two types namely reflective focusing and optical lens focusing. In the former technique, the focusing of energy is achieved using parabolic mirrors, which is in opposition to the latter technique in which optical lens focusing is put into use. It is also crucial to note that the use of plastic lenses is preferable due to the effects of infrared energy on a glass, which may render the system incapable of fulfilling the security expectations. In this system, the arrangement of lenses determines the detection pattern of the sensor. However, normally the pattern need not be continuous but should essentially include beams of rays for every segment of the lens. The weakness of the passive infrared sensor is in the fact that it lacks range adjustment features (Gagnon, 2000). However, this weakness is countered through manipulations of the position of the sensor hence enabling one to adjust the range of the sensors. For the sensor to perform optimally, there is a need for one to select the appropriate detection pattern. In order to ensure optimum security of the building in our case, dual-technology sensors are recommended. The preference of these sensors is because they involve a combination of two technologies whereby one incorporates an active sensor and the other a passive sensor (Bose, 2001). Installation of closed circuit television (CCTV) in the building or even surveillance cameras will facilitate the use of video-motion sensors to in detecting the movements of the intruder within the building. The use of dual-technology sensors means that the weaknesses of both active and passive sensors will be countered by the collective strength of the system. Point Sensors In order to ensure that the building under consideration is well secured, the use of point sensors in strengthening the security of the building is also recommended. For instance, the magnetic reed switch is very effective when incorporated into alarms for the purpose of burglar proofing (Capel, 2002). The reed switch refers to a switch, which operates with the use of a magnetic field. It is mainly composed of a pair of metal reeds that are usually in a glass encasement. The metal contacts may be either open or closed. These metals move on exposure to a magnetic field and depending on whether they are closed or open, they always move in the opposite direction. Magnet is attached to the part of the door that is mobile or a window. This attachment is then followed by the fixing of the switch to the window frame or even the frame of the door. In the event that the door is either in a close or open position, the magnet is always close to the switch. In this way, the switch is always kept closed by the magnet until the door opens causing the switch to open. The alarm is always off if the current flowing through the switches is minimal. In case such flow of current stops, the alarm goes on. Therefore, if the relay in use is always on, in the case that there is an interruption of the circuit in the building, then the alarm will be triggered. Fig. 1. A closed and open reed switches (Chicago Sensor, 2007). The major advantage of point sensors especially when considered from our case In point is that they cover a wide range of entrances including windows and doors (CFAA, 2000). As such, the possibility of intruder detection in the commercial building under consideration will be high since most intrusions are likely to happen through the pre-existing entrances. Besides their fixation on entrances, point sensors can also be fixed on cabinets or even drawers that are likely to be targets for potential intruders. Besides that, point sensors are also discreet. Hence, potential intruders may not be able to realize that such a security measure has been put in place in that building. As such, the alarm system will catch them unawares increasing the chances of a potential burglar fleeing, hence protecting the building from burglary. The wireless technology that is applicable in the case of point detectors makes them more attractive in the installation of alarm systems. However, despite their applicability to our situation, a major undoing of reed switches is that they strong electromagnetic currents can totally disable them. Despite this disadvantage, if used alongside other security measures, point sensors offer a good alternative in safeguarding premises. The Alarm Panel Since the building is likely to experience the threat of fire and burglary, a conventional fire and burglary alarm panel is desirable. In this panel, several circuits in connection to sensing devices are wired while in parallel position to each other (Zedner, 2009). The work of the sensors is to reduce the resistance of the circuit in case the conditions being sensed by the alarm exceed the pre-determined limits. The panel will be composed of a keypad for controlling the system. Such controls include the initiation of an alarm during emergencies as well as setting the mode of the control panel. In order to factor in the threats of burglars and fire, the sensors in the system will include magnetic switches as well as heat detectors. The sensors and the fire detectors are wired to the control panel for purposes of round the clock detection of any intrusion or possible fire incidents. In order to ensure that a potential fire hazard is adequately under control, the building in consideration needs to be zoned. Through initiating device circuits, the state of each zone of the building will be displayed on the panel ensuring optimal fire fighting in case of any fire incident. The merits of this fire and burglary alarm panel are that is that it involves complete wiring and connection to all the sensors. The panel will also include data link between the panel as well as the sensors. Besides that, the mode button on the panel gives the option of a person to select whether it is daytime or nighttime, and this ensures maximum protection against possible intrusion. This protection will be availed during the night while ensuring that in daytime, the sensors are inactive. This inactivity makes it possible to avoid any false alarms due to the sensing of the people who are in their daily course of business. However, the day and night mode in the panel will not apply to the fire sensors since fire protection will be effected on a twenty-four hour basis. The control panel will also be backed up besides having a hooter that is built in hence very convenient for the security needs of the one storey building. Communication to the Central Monitoring System Communication between the alarm system at the building and the central monitoring system will be through a telephone line. In case the alarm is triggered, the control panel is programmed in a way that it will automatically dial the central station. In the process, it will transmit the appropriate codes for interpretation by the software at the central monitoring station (D’Alto, 2001). An important observation to note is that the control panel of this alarm system will have a built in dialer feature within it. However, despite the convenience of the phone line communication, there are several disadvantages associated with this method. For instance, a burglar may choose to cut the phone line hence disabling the monitoring system through the interruption of communication between the control panel and the central station. To counter this problem at the single storey facility under consideration, an alternative communication channel to operate alongside the phone line communication. The National Burglar and Fire Alarms Association (NBFAA) (2010) states that a cellular communicator is viable for alternative communication. A cellular communicator is a device that uses the cellular network to transmit information from the security system to the central command station. It is usually a separate device unlike the phone in dial, which is a part of the control panel. The major advantage of the cellular communicator is that potential burglars cannot tamper with it. However, it has a drawback in that in case the cellular network is not working, and then communication is hampered. However, when the telephone line and the cellular communicator are incorporated in the alarm system, their strengths overshadow their perceived weaknesses hence enhancing the safety of the premises. Alternatively, with an IP communicator, transmission of signals between the alarm system and the central monitoring station is possible. However, this too requires a working internet connection, which cannot be guaranteed around the clock hence the preference of the previous two methods to the use of the IP communicator. Features of Monitoring Stations A crucial feature for central monitoring stations is that professional teams operate them (Trimmer, 2000). This operating enables such stations to oversee the security needs of their clients besides ensuring that they look into any breaches that have occurred in the premises of the client. The main advantage of this feature is that it ensures that the client’s premises are under watch even when the client is not necessarily within the compound of the premises. Most central monitoring stations also include medical assistance services. This feature enables them to provide for emergency medical needs that may arise at the client’s premises or even in the normal course of attending to emergencies like fire. When medical assistance is available through central station monitoring, clients facing challenging health issues can live independently since help is always available. Another feature of central stations is the customized response by the operators (Khairallah, 2006). This customization is whereby a specific operator is assigned to specific types of alarms. For instance, an operator could be assigned to deal only with specific alarm types like fire alarms while their co-worker attends to another type like the burglar alarms. This assignation facilitates proper coordination of responses by the central monitoring station hence further enhancing the security of the premises. A regular feature of central monitoring stations is the action plans. This feature helps the operators in formulating the best responses to situations that arise in the client’s premises. Action plans ensure that the operations of the central monitoring stations are conducted in an effective and professional manner for the continued safety of the client’s operations. Through the effecting of action plans, emergency responses are well coordinated. This coordination is besides the fact that such plans help in the overall organization of the affairs of the central monitoring system in a bid to provide optimal service to the clients. Station automation is also a feature that is common to most central monitoring stations. This feature allows the activities of a monitoring station to be overseen by customized computer software hence resulting into greater effectiveness in the monitoring of various alarm systems covering the premises of the client. Besides that, station automation ensures that the operators guide responses using the relevant computer software effectively. In addition, this feature serves to enhance the effecting of continuous communication between the alarm systems belonging to various clients and the central monitoring station. Station automation features are also advantageous in that they reduce the number of operators needed to monitor the alarms without necessarily risking the safety of the clients. As such, it is evident that this is a very crucial feature of central monitoring stations. Associated features of Central Monitoring Stations Various features are associated with central monitoring stations such as tamper switches and end of line monitoring. A tamper switch is a component that is usually included in the alarm system to prevent possible tampering with the control panel. It comes into force when the cover of the control panel is opened hence triggering the alarm. However, it is vital to note that even in cases where the one tampering with the control panel manages to deactivate the alarm, the activity of the anti-tamper circuit are not hindered. It continues to function as long as there is current in the system. Fig. 2. A tamper switch. (Fire Alarms Boston, 2014) End of line monitoring refers to precautionary measures that are usually taken by the central monitoring company in order for them to differentiate between a cut wire and the tripping of a sensor. Through end of line monitoring, the company can also determine whether an alarm is active, whether there has been tampering with the alarm or even detect a case of short circuit in the wire. As such, it is a crucial feature that is associated with central monitoring stations since it directly requires dealing with factors that may negatively affect the functioning of the alarm system. Conclusion Evidently, the building requires an effective alarm system due to the potential fire and burglary threats. The most appropriate alarm system that has been chosen is a combination of fire and burglar alarm system. The effective implementation of this system in the building will enhance the security of the premises by ensuring that potential fire or even intrusion is detected. In relation to the threat of personal injury, the alarm system can still cater for it in the event that such an injury is debilitating and hence the victim is unable to assist themselves. In such a case, one will need to trigger an alarm to initiate communication with the central monitoring station upon which the necessary help will be availed to them. Hence, it is clear that a combination of fire and burglar alarms is the best security measure for the one storey building in question. References Bose, K. W. (2001). Video security systems. Boston: Butterworths. Canadian Fire Alarm Association. (2003). Fire alarm systems: A reference manual. Markham, Ont: Prosafe Publications. Capel, V. (2002). Security systems and intruder alarms. Jordan Hill, Oxford: Heinemann Newnes. Chicago Sensor (2007). Magnetic Reed. Retrieved from http://www.chicagosensor.com/HowFloatSwitchesWork.html D'Alto, J. (January 01, 2001). A lock on the market: The growing demand for security systems in the market. The Journal of European Business, 3(5), 46-50. Engineering Equipment and Materials Users Association. (2007). Alarm systems: A guide to design, management and procurement. London: Engineering Equipment and Materials Users Association. Fire Alarms Boston (2014). Tamper Switch. Retrieved from http://www.firealarmsboston.com/?page id=29 Gagnon, R. M. (2000). Design of special hazard and fire alarm systems. Albany: Delmar Publishers. Khairallah, M. (2006). Physical security systems handbook: The design and implementation of electronic security systems. Amsterdam: Elsevier/Butterworth-Heinemann. National Burglar and Fire Alarm Association. (2010). Security distributing & marketing: SDM. Los Angeles, Calif: Security World Pub. Co. NATO Advanced Research Workshop on Security and Embedded Systems, Giladi, R., & Serpanos, D. N. (2006). Security and embedded systems. Amsterdam: IOS Press. Trimmer, H. W. (2000). Understanding and servicing systems. Boston: Butterworths. Weber, T. L. (2002).Alarm systems and theft prevention. Los Angeles: Security World Pub. Co. Zedner, L. (2009). Security. London: Routledge. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(The Components of an Alarm System Term Paper Example | Topics and Well Written Essays - 3000 words, n.d.)
The Components of an Alarm System Term Paper Example | Topics and Well Written Essays - 3000 words. https://studentshare.org/technology/2064593-about-security
(The Components of an Alarm System Term Paper Example | Topics and Well Written Essays - 3000 Words)
The Components of an Alarm System Term Paper Example | Topics and Well Written Essays - 3000 Words. https://studentshare.org/technology/2064593-about-security.
“The Components of an Alarm System Term Paper Example | Topics and Well Written Essays - 3000 Words”. https://studentshare.org/technology/2064593-about-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Components of an Alarm System

Review of relevant literature

hellip; the components of e-waste have serious negative implications on the human population's health because of their toxic nature.... Cadmium is one of the components of e-wastes that have toxic elements that affect the kidney.... The ever-increasing cases of disorders, caused by contamination from the components of e-wastes, calls for interventions and remedial strategies.... Mercury can cause dysfunction of the genitourinary system of the body....
3 Pages (750 words) Research Paper

Maryland Department of Public Safety and Correctional Services

Maryland Department of Public Safety and Correctional Services (DPSCS) is one of the largest state agencies in the state of Maryland.... It provides employment opportunities to around 12,000 employees with a budget of US$ 1.... billion.... … Case Study Introduction Maryland Department of Public Safety and Correctional Services (DPSCS) is one of the largest state agencies in the state of Maryland....
11 Pages (2750 words) Assignment

ESD ( Emergency shout down) tool (chemical engneering)

Emergency Shutdown Tools (ESD) are primarily designed to minimize casualties in an event of emergency, these casualties may vary in nature, from unexpected system flooding, escaping poisonous gases or fire outbreak in areas containing hydrocarbons or any other material that is… Traditionally, they are used in high safety levels, often SIL 2 and 3. The system is made up of an array of sensors capable to detect different incoming signals, alarm system, valves, relays and logic processing units, which in With all the components functioning properly, ESD can process an incoming input from the sensors and sends an output signal to initiate a response that handles the emergency....
4 Pages (1000 words) Essay

Boeing and airbus

There are two methods of repairing the safety and alarm system.... For instance, one major problem of the airbus is its sensitive warning system.... The software is not able to handle manageable tolerances and, therefore, the system can be set off even with very minor problems in the aircraft.... In trying to make the sensor less sensitive, they may end up messing the entire system.... All these incidences concerned the battery and the airplane's electrical components....
2 Pages (500 words) Research Paper

Environmental radiation survey

The alarm system will be operated by an acknowledgement switch that can also serve to adjust the rating that further widens the range.... In addition, the user needs to understand the working of the alarms system so as to take precautions Environmental Radiation Survey Ludlum 2242 Device Before use In order to make the correct readings that are comparable to the standard one, it is important to study the features of the device.... In addition, the user needs to understand the working of the alarms system so as to take precautions not to damage the equipment....
1 Pages (250 words) Essay

IT Security System

uestion 1Fire and break-in alarm security system being the only available current on-site security/alarm system is a good foundation than having none.... Therefore, Goodings Landscaping and Nursery Company incorporating the Information Technology in its security would help in the boosting the on-site security system.... And how can use of IT improve the operations of Use of IT in Security system by Goodings Landscaping and Nursery Company Everything operates within a hierarchy, and security is no exception....
2 Pages (500 words) Research Paper

Reliability Engineering in Complex Systems

7 Question Two A2:Determining Mean Time Between Failures (MTBF) For the de-sulphonate tower, the Mean Time Between Failures (MTBF) seeks to compute basic reliability measures for the components of the system that are capable of being repaired.... MTBF gives a description of the duration of time spent before the failure of the de-sulphonation tower is experienced with regard to the components or the assembly of its system (O'connor and Kleyner, 2012, 88).... Here it considers the minimal cut sets of the top events that bring about the failure of the system....
8 Pages (2000 words) Assignment

Development of a Program for Control of a Home Alarm System

This term paper "Development of a Program for Control of a Home Alarm System" discusses the design of an alarm system for homes that will use PIC18f2520 that has 3 ports that are used for LCD and the alarm system.... We also found that our laboratory sensors don't have the ranges necessary to be implemented in a real-life home alarm system, as the operating ranges of our sensors generally didn't lie within the values that should set an alarm off.... The alarm system shown above has 5 sensors which are situated in the hallway, bathroom, sitting room, kitchen, and bedroom....
7 Pages (1750 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us