The presented analytical article describes the main methods and methods for organizing the protection of movable and immovable property objects and how to notify them of the incident by transferring from the alarm objects to the property owner or to the Centralized Monitoring Station (CMS) using the GSM channel.
Your cell phone today is not only a means of communication and communication, it is capable of solving various other tasks! Namely, it can serve you as a trusted assistant when protecting a remote object.
Recently, security issues have been given special importance. On the one hand, the welfare of our citizens increases and they have something to protect, and on the other hand, the crime situation in Russia has not been decreasing for a long time. The main issue, with the technical protection of the facility, is the timely receipt of an alarm message, or rather, its transfer to the user and security structures. This issue is solved using the following communication channels:
- Dedicated radio channel
- Switched (wired) telephone lines
- GSM channel
The leader among the presented communication channels is wired telephony. The cost of the equipment is relatively low and the maintenance and maintenance costs are low. How regrettable it sounds, but the level of telephony in our country is extremely low. And what about the objects on which there are no telephone lines? What if the criminals cut the telephone cable? How to control the telephone line? Until recently, all these questions remained unanswered.
Radio-channel equipment reliable in operation and operative in the delivery of alarm signals has other weaknesses. Limited range, high cost, delivery of messages ONLY to the central monitoring station (CMS). Also, you need to get a license to use the radio frequency and buy a radio channel, which is always very expensive and not always justified.
Equipment that uses to transmit an alarm message to the GSM network can transmit it via SMS or via voice dialing. Let’s consider these methods in more detail.
The advantage of voice dialing is that it can be implemented not only on the cellular, but also on the city phone. However, dialing has very low informativeness – it is the transmission of only a specific event and the impossibility of recording the events occurring. In addition, the transmission of messages in the voice channel has a rather long dial-up time, which depends on a few little predictable factors:
cell phone line download
the phone can be turned off, not with the owner or he can not use it, etc. And if there is still dialing several numbers, then this time increases many times. SMS messages are very informative and give a complete picture of the protected object (160 characters allow to fully describe the alarm message.The SMS is fixed not only to the monitoring station and the user’s phone, but also to the mobile operator.) In the disputed moments, you can request a printout with the time of sending SMS. SMS messages leave the site within 1-2 seconds and the notification of all users and the monitoring station is assumed by the operator’s center.
In addition, even if the user’s phone is unavailable, it will still receive the message as soon as it is authorized on the network.
In addition, to date, many companies are creating systems transmitting messages over GPRS, MMS ie. video, photo information, using various clients on users’ phones. This direction is promising as different services of communication operators will only develop. However, we should not forget that the mass consumer has an “average” phone and a fairly economical tariff.
Therefore, in the article we will consider systems designed for a mass consumer, whose cost of protecting their property is prohibitively high. This protection should be accessible to him, easy to operate, do not require serious training (especially for elderly people) and do not interfere with basic work and leisure.
To date, there are several security systems on the GSM channel. Consider what a good GSM signaling should be. The device must have at least 4 loops with the ability to connect any sensor type NC, NO. It is desirable that these zones are programmable. As an example, 24-hour security zones for fire detectors or sensors leakage, gas contamination, temperature, and alarm buttons. The number of zones allows to increase the information content of the system, as well as organize the collection of data on the state of the house and their changes. For example, illumination (light on / off), irrigation system control, temperature (heating control). For control, it is necessary to have relay outputs, which can be programmed to specific loops or events. These relays must be powerful enough to directly control the power circuits. In some alarms there are outputs such as “open collector” to which it is necessary to additionally connect the power relay.
Some security devices are able to protect several objects independently from each other by splitting into groups. For example, independent protection of the house and extension one central. Particular attention should be paid to the availability and quality of the built-in uninterruptible power supply with a battery. БП and АКБ on 12 In should provide reliable work of the central panel and the sensors connected to it at switching-off of a network 220В during at least day – as a rule it is АКБ from 7 to 17 А / ч. The power supply unit must protect the battery from deep discharge, withstand short-circuiting 12V power outlets and automatically recover after a short circuit.
The presence of a remote indication allows you to visually monitor the status of the device and the activation of sensors. This is also important when using the electronic keys Touch Memory, remote keys and Proximity cards for remote arming and disarming the device.
Several methods of arming the object are used. The simplest way is a secret button. This method has low protection. Also often used are Touch Memory keys or Proximity cards. A practical and modern way to drawbacks, which are the external reader and the inability to transmit an alarm in the case of “forced entry”. These drawbacks are devoid of the codec panel of the internal installation. In addition, the keyboard allows you to evaluate the status of the control panel and differentiate the tolerance (passwords) between users. It’s good when the keyboard is used in conjunction with the remote controls. Trinkets are convenient in daily use and compact, do not have external receiving devices, and in emergency cases (loss or discharge of the battery, forced entry), you can use the capabilities of the keyboard. Most devices can store up to 255 recent events in memory. This is important for security structures, since you can restore the picture of events even when there was no connection.
For the commissioning of the facility, the controlling authorities, it is necessary to have valid certificates of the established type. A certificate of compliance (PCT) is required for all systems, and a fire safety certificate (SSP) for fire systems.
It is important, whether the GSM-signaling of the message transmits simultaneously to several users and central monitoring consoles. Messages for the monitoring station should be transmitted in encrypted form (this increases the reliability of the security complex). Messages for the user should be easy to read and be as informative as possible. Well, when one message completely describes the state of the entire system. An alarm indicating the zone, the status of the control panel, which relays are switched on, whether there is a network 220, battery charge, telephone line status (if any).
It is useful when security panels work simultaneously in several independent communication channels. Moreover, the GSM channel is a duplicate and simultaneously controls the telephone line. This allows to dramatically reduce operating costs and increase the reliability of the security system. There is no need to replace existing equipment with the monitoring station. The central offices support all the most common exchange protocols.