The company that installed the system may be among those enabled to remotely operate it. In this way it is possible to
conduct diagnostics and eventual maintenance more easily, because the technician need not go to site directly, but will
be able to work remotely via PC.
In more sophisticated systems, security against unauthorized access is guaranteed by the fact that each remote
connection session must be previously authorized by the owner.
Maintenance interventions of this type may be charged for separately.
The presence and type of the means of communication used by the intrusion alarm system can influence its certification.
1.3
THE DEVICES USED TO CREATE AN ALARM SYSTEM
Essentially, an intrusion alarm system consists of four types of components:
the control panel;
the detectors;
the signalling devices;
the complementary devices.
These components are generally separate, but sometimes a single device may enclose more than one.
Below the description and operation of each single component.
1.3.1
The control panel
The control panel is the "brain" of the system and has various functions:
Interpret the different signals coming from the detectors and consequently take the most appropriate actions, such
as ignoring the opening of a window if the system is disarmed or activating the notification devices if it is opened
when the system is armed;
Check that all the system devices are always functioning correctly;
To signal potential anomalies that could threaten the security and functionality of the system;
Record all the main events.
An intrusion alarm system only has one control panel.
1.3.2
The detectors
The detectors are devices capable of detecting changes, voluntary or involuntary, that an element or physical
characteristic of the environment where they are installed may undergo.
The detectors must be designed and installed so as to maximise the detection and minimise the risk of false alarms. For
the alarm system, the detectors are equivalent to our senses.
The detectors may distinguish events according to:
A functioning principle,
A type of change that must be signalled,
Where they must be applied and what they must control,
The physical characteristics of the environment they must monitor.
1.3.2.1
Button
This is the easiest detector to use. There are all types available, from those that are activated manually, those that must
be pulled, and those that can be pressed with one foot. It is sometimes and extension of a more advanced detector.
1.3.2.2
Magnetic contact (reed)
This contact is used to control the opening of doors and windows. The opening sensor has two parts: a magnet and one
contact, with a little blade or something similar. When they are placed next to each other, at a distance of a few
millimetres, the magnetic field of the magnet keeps the blade contact in position to close the electrical circuit. Separating
them reduces the force of the magnetic field, the blade is no longer in position, and the electric circuit is broken,
generating an opening signal. The magnet is applied to the door or casement and the magnetic contact is applied to the
frame, as far as possible from the hinges, so that even slightly opening the door or window may break the circuit.
There are various models available to meet a wide range of aesthetic and technical demands (wooden doors and
windows, security doors, sunken contacts, etc.). This detector is used mainly to create perimeter protection.
DS1068-017
7
LBT20717