Install Security Systems Notes - B

Download as pdf or txt
Download as pdf or txt
You are on page 1of 59

INSTALL SECURITY SYSTEMS

A security system is a hardware system that prevents unauthorized intrusion into a premises, and reports such
attempts. Electronic security systems are electronic equipment which can perform security operations
such as surveillance, access control, alarm sound genera�on or intrusion control for an area.

Terms used with security system


Security camera: Smart security cameras hook up to Wi-Fi, enabling us to livestream footage of our system
remotely and receive notifications when our cameras detect movement, people, or packages.
Motion sensor: Motion sensors should be placed in a main entryway or hallway on the ground floor of a home
so that they can detect motion and alert us when our system is armed.
Entry sensor: Also known as contact sensors, entry sensors have two parts: one that goes on the window or
door and another that goes on the frame.
Glass break sensor: Sometimes, instead of opening windows the old-fashioned way, intruders will simply
break them open to avoid setting off the entry sensors.
Siren: Sirens exist in home security systems both on their own and as part of other devices, such as the base
station.
Keypad: To arm or disarm, security systems commonly require a code, which we enter on a keypad that’s
mounted to the wall or placed on a flat surface.
Key fob: Key fobs allow us to disarm or arm our security system without having to use a keypad.
Panic button: If something goes wrong, a panic button is an easy and fast way to alert emergency services, be
it the police, hospital, or even the fire department. Like key fobs, panic buttons aren’t installed anywhere in
particular, but we always have one around in case of an emergency.
Base station: Base stations sync all of the connected devices with our mobile application so we can receive
those notifications we mentioned earlier.
Yard sign and/ or window stickers: Many security systems also give out yard signs or window stickers that
allow us to advertise that we have a security system.
Smoke and CO detectors: With this simple tool, we are alerted if the air in our home becomes unsafe to
breathe
VSS: System consisting of camera equipment, storage, monitoring and associated equipment for
transmission and controlling purposes.
Security company: An organisation that provides a service for the design, installation, commissioning, maintenance or
monitoring of VSS.
Surveillance: Observation or inspection of persons or premises for security purposes

Functions of a Security System


 To Deter: Discouraging criminals from targeting your property because there’s a higher chance they’ll be
caught.
 To Alert: Letting you, or the security professionals looking after your property, know that a potential incident is
taking place. Depending on the type of security system, you can also be made aware of exactly where on your
property the event is taking place.
 To document: Recording video, or picture, footage of an event, such as a burglary, so you can pass it on to
authorities in hope of catching the criminals responsible.

Importance of security systems


i) Secures the area from unauthorised access
ii) Has quick response and ac�on system
iii) Records data for future reference
iv) Decreases the risk to human life
v Ensures accuracy and efficiency
TYPES OF SECURITY SYSTEMS(CLASSIFICATION)
1. Intrusion detection (Alarm systems)
An intrusion detection system will sound an alarm in the event of any incident on the your premises. These
alarms are armed with motion detectors, door and window sensors.
2. Monitored Alarm
A monitored alarm is different compared your traditional security alarm. It has an assigned personnel who gets
in touch with you when the alarm goes off to identify if it was a mistake or there is a genuine security breach. If
the genuine security breach is identified by the personnel, the local authorities are informed immediately.
3. Smoke( fire detection) Alarm
The alarm consists of smoke detectors that are located throughout the household. When these detectors come in
contact with heat or smoke, they raise the alarm. You could also opt for the one with an indoor sprinkler system
to heighten your safety. It also includes Gas Leak Detection systems used to detect leakage of any kind of gas or a
specific gas in a facility environment.
4. CCTV ( Video Surveillance)Cameras AND Video Door Phones
A CCTV camera is a good method to capture the face of an intruder. It will help the local authorities to identify
the culprit later. Also, you can keep a check on anyone who has constantly been eyeing your home. It could be a
potential burglar. The fascinating quality of CCTV cameras is that you can keep an eye on your house even
when you are not around as they can be accessed remotely.
5. Access Control system
This restricts who can enter your property and when they can do so. For example, you may only allow
employees to enter during business hours. Access control systems often use electronic key cards or fingerprint
scanners. A physical key can be duplicated, and might require changing locks on a regular basis for added
security. However, electronic access controls such as fobs, key cards, or biometrics can’t be duplicated and can
provide an additional barrier to unwanted entry. Others may include electric fence.
6. Scanner Systems
Scanner systems are automated systems which check the identity of any individual by checking a unique pa�ern and
comparing it with the records. These include card scanner, finger print scanner and so on. These are more reliable as they
are accurate and can be used at a greater level for a large number of users.

security system design


Security system design is the process of developing a layout or framework for a security system to be installed
in a building. A good design includes security technology — such as access control systems, surveillance
cameras, sensors, and alarms — that integrate with one another.

Importance of security system design


Security system design is important because it keeps your building’s security technology and safety protocols
organized and effective. A poorly designed security system could result in residents having to input their access
code on two different devices just to gain entry to their apartment. Alternatively, in a building with a good
security design, they would only have to input their PIN code once to access the property

Problems of a poorly designed security systems


I. It’s difficult for building staff to add users or update tenant information in the system.
II. Tedious or constant maintenance.
III. Security weaknesses, otherwise known as blind spots.
IV. Accessing and navigating the building is cumbersome or difficult.
V. Dated technology slows things down or creates hiccups.
Security system design features to include in your building
Security system design features often include various pieces of technology that cohesively fit together to benefit
your building. A well-designed security system should include:
1. Video surveillance systems
2. Access control
3. Alarm systems
4. Intercom systems
5. Computer system

1. Video surveillance systems


Video surveillance systems typically consist of several cameras strategically placed around and within a
building. Surveillance cameras are proven to deter crime. But when they can’t be a deterrent, they’re still useful
for police reports and insurance claims.

2. Access control
Access control is crucial to maintaining security at any property. It’s a broad term that refers to the process of
controlling who can and can’t access a building, room, or space.
There are several kinds of access control technology, including but not limited to keypad entry systems, door
locks, and key fob readers.

3. Alarm systems
Alarm systems can be installed at doors and windows (such as emergency-only exits) that emit a loud noise and
alert building staff to the location.

4. Intercom systems
Intercom systems provide a way for visitors to request access to the building — and for tenants to remotely
grant them access. Additionally, intercom systems allow residents to communicate with visitors and delivery
personnel at the front entrance to confirm who’s there.
When designing your security system, opt for the latest in intercom technology, such as smartphone-based
video intercom systems. This way, residents can visually confirm who’s requesting access via video call, which
enhances security
5. Computer systems
Modern security design should be controlled and organized by computer systems.
All of your security technology should be accessible from mobile apps that building staff can monitor, update,
and control remotely. Efficient computer systems will also allow you to update, add, and delete user
information for residents in your building.

Factors to consider while selecting a security system

As you’re selecting a home security system, you should consider what will offer the best protection for your
family. Here are some factors to consider:

1. Affordability/Budget: You need a system that will keep your premises safe while staying within your
budget. With a custom security system, you can choose which options will protect your living space and which
options you can skip.
2. Ease of installation: If you choose a wireless option, your home security system will be easy to install. You
could even order the technology and install the devices yourself.

3. Wireless or Wired
There is a growing trend for wireless security devices among people as these can be installed without
professional help, and are more aesthetically pleasing since there are no wires running up the walls or around
them.
Wired solutions are preferable if your home or office is under construction since all the wires and drilling can
be done in tandem with the construction which will give you the same aesthetics as wireless solutions.

4. Monitored or Unmonitored
Installing a security system is half the battle. Next comes monitoring.
A monitored plan will cost you a monthly fee but it comes with great protection plans.
In emergency situations, monitored systems can notify your alarm company which will then notify the police or
the fire department.
Unmonitored systems won’t cost you a monthly plan and will, therefore, be cheaper but the onus of monitoring
falls on your shoulders.

5. Mobile App Control


Like many other people, are expected to sell your mobile to acquire a high tech security device.
Thanks to the magic of the internet of things devices (IoT), your entire security system can today be operated
and controlled from a single app on your smartphone or tablet, all wirelessly.
This is another important factor and feature that you should definitely want to have as it gives you a lot of
flexibility.
Usually, there are control panels set up in multiple locations that let you access the system but these days that
can and should be done through mobile apps.
6. Remote/Cloud Access
Having access to your security system from anywhere in the world is one of the most important features that
you will need. We are not always present at our homes or offices and therefore remote or cloud access to
surveillance becomes a must.
Cloud backup of security data can also come in handy in case of emergencies. This allows you to quickly check
up on everything and have peace of mind.
7. Surveillance Systems
Installing a surveillance system helps you keep an eye on things whenever you want and wherever you want if
you have remote access.
You can improve surveillance through cameras which is the preferred method of surveillance and the most
effective too. Cameras can be installed in your backyard or areas where you keep your valuables or are accessed
by maids, staff or other service people.
8. Environmental Factors
Burglars and other intruders are not the only concern when it comes to security. Your security system should
also be able to warn you about environmental factors such as moisture, smoke, fire, carbon monoxide, high
temperatures, and so on. There are sensors for each of these factors that you should integrate into your system.
9. Power Backup
A security system is useless if it goes offline due to power outage. Therefore proper power backup is necessary
to keep things running even if the power goes out., These days, most security devices come with rechargeable
batteries which keep things running for a long time.

What is Security Testing?


Security testing is a process intended to reveal flaws in the security mechanisms of an information system that
protect data and maintain functionality as intended.

Attributes of Security Testing?


1. Authentication
2. Authorization
3. Confidentiality
4. Availability
5. Integrity
6. Non-repudiation
7. Resilience

COMPONENTS OF A SECURITY SYSTEM


A security system consists of different components, including motion sensors, indoor and outdoor cameras,
glass break detectors, door and window sensors, yard signs and window stickers, smoke detectors, and carbon
monoxide detectors, Monitor, Cable, Video Recorders, and Data Storage.

SENSORS
A device which converts a physical quantity into the proportional electrical signal is called a transducer.
The electrical signal produced may be a voltage, current or frequency. A transducer uses many effects to
produce such conversion. A transducer is also called pick up. The transduction element transforms the output of the
sensor to an electrical output, as shown

A transducer will have basically two main components. They are


1. Sensing Element
The physical quantity or its rate of change is sensed and responded to by this part of the transistor.
2. Transduction Element
The output of the sensing element is passed on to the transduction element. This element is responsible
for converting the non-electrical signal into its proportional electrical signal.

A sensor is a device that detects the change in the environment and responds to some output on the other
system. A sensor converts a physical phenomenon into a measurable analog voltage (or sometimes a digital
signal) converted into a human-readable display or transmitted for reading or further processing. The input can
be light, heat, motion, moisture, pressure etc. The sensors used for security applications are known as security
sensors.

Some sensors used in security systems include


1. Door and window contacts/sensors (Intrusion Sensors)
Receive an alert any time a monitored door or window is opened or closed.
Door and window security sensors are made up of two pieces: a magnet and a sensor. When the door or window
is opened and the magnet and sensor separate, the sensor will alert your security system. In some cases, systems
can also send a notification to your smartphone or computer. These notifications can be customized, so you can get a
quick idea of what happened and where.

2. Motion detectors
Use: Alerts you to movement within an environment. Great for rooms that don’t get a ton of activity, and for
covering rooms with multiple doors and windows when no one’s home.
Motion sensors are usually considered ―active,‖ ―passive,‖ or dual tech/hybrid.
Passive infrared (PIR) sensors are called passive because they don’t send out any energy to detect movement.
Passive sensors detect changes in temperature, making them ideal for sensing body heat from people and
animals.
Active sensors — also known as radar-based motion sensors — emit radio waves or pulses that can reflect off
objects and report back to the device. Active sensors contain an optical, microwave, or acoustic sensor, as well
as a transmitter.
A dual tech sensor uses multiple methods, often combining PIR tech and radar.
3. Glass break sensors/detectors
Use: Detect the sound of breaking glass, such as a smashed window. Great for monitoring rooms with one or
many windows, like a sunroom.
How do glass breaks work
If a burglar doesn’t open the window and just breaks the glass, these sensors are designed to not only listen for
the sound of breaking glass, but also the percussion of the impact.
4. Smart sensors
Use: Place on household objects that you would like to monitor.
How do smart sensors work?
Multi-purpose wireless smart sensors can go pretty much anywhere within range of your security panel. They
are just like door and window contacts, using a magnet and a sensor that alerts when separated.
5. Room temperature sensors
Use: Create a more balanced temperature throughout your home, and see the temperature in different parts of
your home. Requires pairing with a smart thermostat.
How do room temperature sensors work?
Temperature sensors work together with smart thermostats to reduce temperature variations from room to room.
After you set your smart thermostat to your ideal temperature, the temperature sensor will help ensure that the
temperature stays consistent.
6. Flood sensors/water leak sensors
Use: Detect the presence of water. Helps prevent water damage and catch leaks early.
How do water detectors work?
Water sensors for home feature a probe that can be placed anywhere water could be a problem, like
basements, garages, or under sinks.
When water comes into contact with the probe, the transmitter relays the trouble signal. When you have a
monitored water detection device, the transmitter will send that signal to a monitoring center, which can alert
you that there is water present where it shouldn’t be. Then you can take quick action to help prevent costly
water damage!
7. Fire alarms / Smoke detectors
Use: Help protect against fire and smoke inhalation by detecting flames and abnormal levels of smoke. Some
modern home fire and smoke alarm systems also include built-in heat detectors.
How do smoke detectors work?
Smoke detectors use two main kinds of technology: Ionization and photoelectric.
Ionization smoke detectors are better at detecting quick flash fires. They use a small amount of radioactive
material between two plates. When smoke enters, it disrupts the ions and causes an alarm.
Photoelectric is better at detecting slow, smoldering fires that fill your home with smoke. Photoelectric uses a
light source that’s angled away from the sensor. When smoke enters, it causes the light to reflect off the sensor,
causing an alarm.

8. Carbon monoxide detector


Use: Detect carbon monoxide (CO) in your home, and help protect against carbon monoxide poisoning.
CO is a deadly, odorless gas that can come from any combustible appliance. Carbon monoxide alarm
systems are specifically designed to detect gas particles using either a gel or silica chip. When the gas comes
into contact with the chip, it prompts the sensor to send an alert.

9. Lighting sensors
Use: Tell lights to turn off when a room is still and turn on when someone enters.
Smart home light control modules plug right into your existing outlets, letting you control the lighting in your
home remotely. Using Z-Wave technology, these devices can work with your smart security system and other
home automation devices for even more options and security measures.
Light control modules can also work in tandem with motion sensors to trigger lights to turn on when someone enters a
room.
10. Optical sensors, also called photosensors, can detect light waves at different points in the light spectrum,
including ultraviolet light, visible light and infrared light.
11. Proximity sensors detect the presence of an object or determine the distance between objects. Proximity
monitors are used in elevators, assembly lines, parking lots, retail stores, automobiles, robotics and numerous
other environments.
12. Touch sensors. Touch sensing devices detect physical contact on a monitored surface.
13. Tomographic sensors
These emit radio waves and sense when those waves are disturbed. These can detect waves through
walls/objects, and are often positioned in a way that creates a radio wave around the area. These sensors are
useful for warehouses and large storage units.

How to Choose the Right Security Sensors –factors to consider


The size of your property
Larger properties will need more sensors to ensure adequate coverage. These larger estates are more appealing
to intruders as well, which means you’ll want to have all your bases covered with every kind of home intrusion
sensor installed.
The number of doors and windows in your building
If you occupy a windowless basement, you obviously won’t need window sensors, but you’ll still need door
sensors to cover each entrance/exit. On the other hand, if you live in a house with large windows taking up most
of the wall space, you’ll want to invest in window sensors, if the windows open, and glass break sensors for
every 15-foot stretch of windows. For homes with more windows than wall area, glass break detectors may be
better than motion sensors, which could trigger false alarms when they detect neighbors walking on the
sidewalk.
The number of stories in your building
Multi-story homes are best protected when they have smoke/CO detectors, flood sensors, motion detectors, and
glass break detectors on every floor of the home. Keep in mind that you won’t likely need window or door
sensors for second- and third-story access points if they aren’t accessible from the outside, but use your best
judgment.
Whether or not you have children or pets
If you have littles or four-legged friends prone to wandering out of the house, having multiple door sensors, for
example, makes it easier to keep track of where they are and when they go outside. Just keep in mind when
placing motion detectors that dogs over 50 pounds can trigger false alarms.
Whether or not you live alone
Those living alone will have a difficult time keeping an eye on all the vulnerable areas of their house at one
time. For single tenants, we recommend having at least one of each sensor type so no emergency never goes
unnoticed.
The devices you already have in place
If you already have security sensors installed, consider which ones you could add for more comprehensive
home security that would integrate well with your current infrastructure. Consider also if upgrading your current
sensors may benefit you. Could you combine capabilities and save space by purchasing a dual-function
CO/smoke-detecting device? Could you reduce false alarms by investing in a new PIR motion detector?
The biggest threats to your home based on where you live
Picking the security sensors for your home is also a matter of the environmental risks around you. For instance,
do you live in an area prone to flash floods, low temperatures, or wildfires? Is your neighborhood statistically
more susceptible to crime than others?

Difference Between Security Sensors and Detectors


Security sensors are devices that alert you before an intruder has entered your home. Eg. Contact sensors are a
great defense against break-ins through windows or doors, but they only work if windows and doors are kept
locked when you’re away. If an intruder enters through an unlocked back door, contact sensors won’t trigger an
alarm.Additionally, to be maximally effective, contact sensors must be placed on every window and door that a
potential intruder could access.

Security detectors identify when intruders are inside your home. Security detectors work by detecting motion in
your home through one of several different methods.
Security detectors work best if they are placed in high-traffic areas of your home, such as hallways. If you have
pets at home, you will need to purchase a security detector that is able to filter out pet movement. For example,
PIR detectors can be set to ignore pets up to a certain weight.

Detectors are used for the occupancy and motion sensing.


Air pressure sensors: detect changes in air pressure resulted from opening doors and windows
Capacitive detectors: detectors of human body capacitance
Acoustic detectors: detectors of sound produced by people
Photoelectric detectors : interruption of light beams by moving objects
Optoelectric detectors : detection of variations in illumination or optical contrast in the protected area
Pressure mat switches: pressure sensitive long strips used on floors beneath the carpets to detect weight of an
intruder Stress detectors: strain gauges imbedded into floor beams, staircases, and other structural components
Switch sensors: electrical contacts connected to doors and windows
Magnetic switches: a noncontact version of switch sensors
Vibration detectors: react to the vibration of walls or other building structures. Also, may be attached to doors
or windows to detect movements
Glass breakage detectors: sensors reacting to specific vibrations produced by shattered glass
infrared motion detectors: devices sensitive to heat waves emanated from warm or cold moving objects
Microwave detectors: active sensors responsive to microwave electromagnetic signals reflected from objects
Ultrasonic detectors: devices similar to microwave detectors except that instead of electromagnetic radiation,
ultrasonic waves are used
Video motion detectors: a video equipment that compares a stationary image stored in memory with the
current image from a protected area Video face recognition system: image analyzers that compare facial
features with database
Laser system detectors: similar to photoelectric detectors, except that they use narrow light beams and
combinations of reflectors
Tribo-electric detectors: sensors capable of detecting static electric charges carried by moving objects

How a Magnetic Contact Switch Works


• A two-unit device, consisting of a small permanent magnet (with no electrical connections) and a
magnetically sensitive reed switch, which is physically wired into the circuit.
Switch is activated whenever the magnet is brought close enough to it. Moving the magnet further away
deactivates the switch.
• Original magnetic contact switches were open to the air and allowed dust to accumulate inside the switch
• Dust may prevent proper operation.
• With a Reed Switch the switch is enclosed in a sealed tube. This prevents the environment from interfering
with the switch
• Glass tube may break if switch is dropped which exposes the reed to dust and may prevent it from working

Magnetic Reed Switch

Roller-plunger Contacts
• Used on doors, windows and cabinet doors • Plunger held in when door or window is closed
• These sensors depend on direct physical operation or disturbance of the sensor to generate an alarm
• Spring-loaded or plunger devices trigger when a door or window is opened

Roller-plunger Contact Installation


• Install on hinged side of door. Only hermetically sealed, watertight and airtight switches should be used. •
Should not be used on poorly fitting doors and windows
Outdoor Sensors
• Exterior Active Infrared. Beams are sent between posts
• External Microwave. Beams are sent between posts

Considerations for Outdoor Sensors


• Presence of grass or vegetation
• Possibility of leaf accumulation
• Possibility of movement of branches
• Likelihood of snow accumulation
• Possibility of fog, mist or dust
• Occurrence of lightning
• Check manufacturer’s recommendations

Outdoor Installation Guidelines


• Sunlight. Avoid direct sunlight on the plastic lens (even with UV stable plastics)
• Temperature. Make sure the temperature range is within sensor specifications
• Humidity/rain/fog. If conduit is used, run conduit out the side or bottom of the sensor to keep conduit
condensation from draining into the sensor housing.
• Make sure the conduit openings and the mounting holes on the sensor are well sealed

Birds and animals


• Depending on the size, speed, and proximity to the sensor, warm blooded animals can trigger an alarm
• The larger the animal, the farther away it can be detected
• Avoid directing the sensor towards bushes or branches where birds can perch
• You can mount two sensors in parallel to require alarm verification

TYPES OF ALARM SYSTEMS


Alarm systems can be broadly divided into two types: a perimeter (or external) intrusion detection system
(PIDS) or alarm. an internal security alarm system (SAS).

Electric Circuit Alarm Systems


As the name suggests, an electric circuit alarm system uses a series of circuits across various points. It’s one of
the most rudimentary forms of alarm system that work on the principle of circuit breakers. That’s the reason
they’re installed near doors, windows, or other entry points of a home or business.
These alarms systems use a low-voltage current flow between a series of points when a door or window is
closed. When the door or window is opened, the circuit is disrupted and triggers the alarm.
Wired Alarm Systems
Wired alarm systems have been around for decades. They are called ―wired‖ because they require physical
wires to be installed across the premises to function. The wires connect various components of the system like
sensors, control panels, and sirens, to each other.
The benefit of wired alarm systems is they are more reliable than their wireless counterparts. Since the system is
hardwired into the building, it’s less prone to interference or signal issues. Wired systems are also more durable
and can withstand extreme weather that makes them ideal for outdoor installations.
The cons of wired alarm systems are that they can cost a lot more to install than wireless systems. They need
physical wires to be installed throughout your premises making them not as flexible as wireless systems. It can
also be difficult to add or remove components post installation.
Wireless Alarm System
Wireless alarm systems are a newer type of alarm system that use radio frequencies to communicate between
the various components of the system. This means that they do not require physical wires to be installed,
making them more flexible and easier to install.
Ease of installation is one of the main advantages of wireless alarm systems. As they don’t require installing
physical wires, they can be set up much faster and with less disruption to the premises. Wireless systems are
also more flexible, so you can add or remove components as or when needed.
On the downside, wireless alarm systems are still less reliable compared to wired systems. They are prone to
interference and signal issues. They aren’t as durable as wired systems and hence may not be suitable for
outdoor installations.
Monitored Alarm Systems
Whether they’re wired, wireless, or those systems reliant on electric currents, monitored alarms are connected to
a monitoring system that notifies a security solutions provider.
When a monitored house alarm goes off, the system sends out a request for assistance to the police, fire
services, or the monitoring station. They even notify a monitoring service, which contacts you later to confirm
the alarm and make sure you’re secure.

Security alarm systems Integration


An alarm system may interact with:
– Cameras - Example- cameras zoom in on a door when alarm is activated
– Access Control - Example- Authorized user uses credential to unlock a door and the alarm is bypassed
– Home Automation - Example- User hits away on touchpad which lowers heat, turns off lights and arms the
alarm
– Energy Management - Example- Alarm is armed and heat or air conditioning is lowered

Advantages with integration


– Can reduce costs
– Coordinate activity between systems – example: disarming alarm – turns lights on
Challenges with integration
– One system can adversely impact another
– One component or system may not be designed to work with another

Burglar AlarmSystemComponents
Every burglar alarm system should consist of these main components:
 Alarm Control Panel
 Alarm Keypad
 Door and Window Contacts
 Glass Break Detectors
 Motion Detectors
 System Interruption Sensors

Alarm Control Panel


All burglar alarm systems have a dedicated alarm control panel. The control panel is the brain of the system –
everything is wired to or wirelessly connected to the control panel.
Alarm Keypad
This is your interface for the system. Usually placed near the main entry or at key checkpoints, this pad lets you
arm and disarm the system, and often gives you 2-way communication with your security system monitoring
station.
Door and Window Contacts
These are typically magnetic sensors that connect from the door to the jamb or the window to the wall. If the
sensor contact is broken, like by opening a door or window, the alarm is triggered.
Glass Break Detectors
Glass break detectors are sound detectors that listen for the precise frequency of breaking glass. These sensors
can trigger the alarm in case of entry even if the window contact sensor is bypassed.
Motion Detectors
Most indoor motion detectors include passive infrared (PIR) technology that only picks up the displacement of
body heat. This prevents false alarms since spider webs and bugs will not set off PIR motions. Outdoor motion
detectors use passive infrared and microwave technology to catch intruders without getting false alarms from
squirrels and other small animals.
System Interruption Sensors
The best burglar alarms for businesses will have fail-safes built into their systems to protect themselves from
tampering. An interruption sensor will trigger an alert if any part of the system is taken offline, loses power, or
fails to respond to a ping for any reason.

A complete system has multiple layers of security protection. The four components are:

1. Deterrence. The initial layer of security; the goal of deterrence is to convince unwanted
persons that a successful effort to enter an unauthorized area is unlikely. Fences, walls,
vehicle barriers, electronic card access and cameras at entryways are examples of deterrence
provisions.
2. Detection. Locate, identify and contain the movement of an unwanted persons who have
gained unauthorized entry to buildings. Alarms are centrally received within the Department
of University Safety. Detection devices include door alarms, glass breaks, and motion
sensors.
3. Delay. Impede, isolate and forestall the movement of an unwanted party within a building.
4. Response. Ensure that coordinated, interactive and reliable communication system and
procedures are in place to facilitate an immediate and effective response from University
Safety.

Enhancing home security can be as simple as adding the following types of sensors:
Motion – Used to detect an intruder’s presence.
Glass break – Once a window is broken the sensor sends a signal back to your controller.
Door contacts – Once armed, a signal is sent to the controller if the door is unexpectedly opened.
Window contacts – Operates in a similar manner to door contacts

Design of residential security alarm system


Security zones
A zone in alarm terminology is basically a slot on the control panel for a sensor. An alarm with 8 zones can
handle up to 8 detectors – whether they are PIRs or reed switches or smoke detectors.
A home security zone is defined as a specific area of the house as seen on the alarm system's panel device. Each
zone corresponds to the sensor or alarm component securing it and is identified by an assigned number so that
the security monitoring company and homeowner will know which sensor has been triggered.
Most home security systems can maintain up to eight zones, but there are some that are wired to accommodate
zones made up of multiple devices. For example, a second-floor bedroom might be labeled zone two but be
protected by both a window and a motion detector

Types of zones
01 Delay 1/Final Exit 1
Use this zone type for the main entry/exit detector, normally a magnetic contact on the front door. The zone can
be activated during the exit mode without causing a fault. If the system is armed, activation of the zone will start
the Entry 1 Delay timer for the relevant arm mode.
03 Follower/Entry Route
Use this zone type for detection devices along the entry/exit route. This zone type will allow the user to walk
past the detector without causing a fault during the exit mode or an Intruder alarm during the entry mode.
However, if activated at any other time the zone will cause an immediate intruder alarm. This zone type will
also start the entry mode when the system is stay armed.
04 Intruder
Use this zone type for detection devices such as PIR’s, vibration detectors, magnetic door contacts etc. This
zone type generates an intruder alarm if activated when the system is armed.
05 Perimeter
Use this zone type for detection devices such as external PIR’s, IR beams. This zone type generates an intruder
alarm if activated when the system is armed.
06 Fire
Use this zone type for smoke and heat detectors. This zone type generates a distinctive fire alarm if activated at
any time.
07 PA Silent
Use this zone type for panic buttons. This zone type generates a silent panic alarm if it is activated at any time.
08 PA Audible
Use this zone type for panic buttons. This zone type generates an audible panic alarm if it is activated at any
time.
09 Medical
Use this zone type for medical alarms. This zone type generates a medical alarm if it is activated at any time.
10 24 Hour
Use this zone type for detectors that require 24 hour monitoring. This zone type generates an intruder alarm if it
is activated when the system is armed. If activated during the disarmed state an internal alarm is generated.
11 Tamper
Use this zone type for tamper protection. This zone type generates a tamper alarm if it is activated when the
system is armed.

Call points.
Manual fire alarm call points are devices that enable people to raise a fire alarm in the event of a fire incident by
pressing or breaking an element to activate the fire alarm system.

What is the purpose of a call point?


Conventional manual call points are typically installed at various fire escape route locations throughout a
premises. Featuring bright red housing for ease of identification, the manual call point allows for occupants to
manually activate the fire alarm system in the event of an emergency

Installation of an alarm system- Installation Sequence


1. Design the Layout
Make a rough sketch of the premises to get an idea of where all alarm detection devices, keypads and other
modules are to be located.
2. Mounting the Control Panel
The control panel must be mounted within the protected area close to an unswitched AC power source and the
incoming telephone line.
You must complete all wiring before connecting the battery, or applying AC to the panel.
3. Install the Remote Keypads
Mount the remote keypads at locations that are easily accessible during entry and exit from the protected area.
Connect the remote keypads to the control panel.
4. Zone Wiring
Install detection devices and connect to control panel or expander.
5. Other Wiring
Complete all other wiring including external/internal sounders and telephone line connections.
6. Apply Power to the Control Panel
Once steps 1 to 5 are completed, apply power to the control panel. First, connect the red battery lead to the
positive terminal and the black lead to negative. Then, connect the AC.
7. Program the System
If available use the Eclipse UDL software package to program the system, if this is not available program this
system in accordance with the procedures in Section 3.
8. Testing the System
Test the system thoroughly to ensure that all features and functions are operating as required.

Intrusion Alarm Control Panel


Features
 The panel should be capable of handling wired detectors as well as with wireless detectors.
Components of a burglar alarm
The intruder system comprises detectors, control panels and communications devices.
Detectors identify and react to specific occurrences including movement, shock, vibration, smoke, heat, and
flood.

Different types of detectors are available, each protecting different aspects of the property. These include:
 Passive infrared sensors (PIRs) detect people moving using infrared heat sensing,
 Dual Technology sensors use combined infrared and microwave sensing technologies to help reduce false
alarms,
 Magnetic door contacts detect the opening and closing of doors and windows,
 Glass break sensors listen for the specific noise of breaking glass,
 Shock sensors detect attacks on doors and windows,
 Smoke sensors can be connected to the intruder alarm system to detect fire.

The control panel


It is the brains of the system to which detectors are connected.
It analyses and actions signals from detectors and is operated by a keypad. Keypads are sometimes integrated
into the control panel e.g. Optima Compact, or these can be remote with LED or LCD displays. LED keypads
communicate alarm system status using LED indicators.
LCD keypads use text displays to give a fuller picture of the alarm status including event logs, entry and exit
times of users, and ultimately enable speedy identification of alarm sources. Control panels come in different
shapes, sizes and complexities depending on the type and size of property to protect.
 Number of zones (areas) to protect.
 Ability to set all or part of the system.
 The number of Remote keypads it can accommodate.
 Event memory log PA & Tamper inputs.
In the event of alarm activation, the keypads identify the problem & inform the occupants of the cause and
location of the alert.

DETERRENTS
 Sounders and sirens use different tones and rhythms to communicate the type of alarm internally and/or
externally.
 Externally mounted sounders and sirens are a good visual deterrent for potential intruders and quickly alert
property owners and neighbours to an intrusion. The strobe helps to identify the house when an alarm has gone
off.

ALERTS
 Communications devices such as the Informa speech dialler send pre-recorded voice messages by telephone
when an alarm is triggered. These messages can be sent to the homeowner or nominated contacts either via land
line or mobile phone.
 This is particularly useful for isolated properties and allows action to be taken when property owners are away
from home.

Planning and laying out an intruder alarm.


Step 1: Conduct a site survey with your customer
To ensure that you get the correct intruder alarm system for your customer, you need to carefully plan and
design the system. This is achieved by conducting a short site survey in consultation with your customer.
The location survey comprises two stages:

 A risk assessment of the building content – the total value of target items (electrical goods, jewellery
and so on) will generally indicate the level of security required.
 A risk assessment of the building’s fabric and structure – how easy or difficult it might be to wire the
entire the building, the level of physical security, location, break-in history and so on.
 The technical survey looks at those factors than might influence the choice and design of system and the final
system design proposal. It will look at any aspect that might impact on the performance of the system
such as electrical interference from local plant or machinery.
 The grade of intruder alarm system will depend upon the performance required as determined by the location
survey.
The following questions will help you identify exactly what your customer wants to protect, and will enable you
to map out the system plan and identify the most suitable components.
The site survey
 Is the property isolated or in a built up area?
 What parts of the property have to be protected? Does the entire property or just part require to be protected?
What areas does the customer want to protect to identify the number of zones required?
 How many entry doors exist at the property and that require protection?
 In addition to intruder protection, does the customer require fire protection?
 How many zones will be required?
 What type of keypad does the customer require (integral, LED or LCD)?
 Does the customer require additional keypads?
 Where will the control panel be located?
 Does the customer require the windows to be protected?
 How many rooms are to be protected with movement detectors?
 Does the customer have pets that will remain in the house when the system is set?
 What type of alert is required? (Sounding/visual/remote phone communication)?
 Where will the external siren be located?
 Is a dummy siren also required?
 Is keyfob operation more suited to the household?

Step 2: Map out the property and select products
Using the information you have obtained during the site survey, map out property layout and select the most
appropriate products for the installation.

Step 3: Decide where to position the Intruder alarm system components

1. Control Panels
Positioning
 For control panels with onboard keyboards such as Honeywell’s Optima Compact, these should be installed
near the main access point in a convenient location for mains electricity supply and for user operation
 For control panels which are operated using remote keypads, such as Honeywell’s Accenta Mini, the panel can
be concealed inside a cupboard or loft space in a convenient location for mains electricity supply and it makes
the cabling to the sounder much easier.
Best Practice
 It is best to install the control panel first.
Hints and Tips
 Check the panel voltage to ensure that the control panel has power. REMEMBER to disconnect power before
proceeding with the installation of peripherals
 Remember to link out any zones that you are not using, you need to use a wire link across the unused zones
 The stand by battery can take several hours to charge up so it is a good idea to charge batteries before
commencing the installation.

2. Remote LCD or LED Keypads


Positioning
 Mount in a convenient location which allows easy operation for the system users, typically close to the main
door, back door and master bedroom.
Hints and Tips
 Remember to check that the tamper spring on the keypads is closed
 It is recommended to use the tamper spring whenever the keypad is mounted against a wall so that it is triggered
if an attempt is made to remove it.

3. PIR Motion Sensors


Positioning
 Install the sensor at a height of 3m-2.7m
 Avoid direct or reflected sunlight remembering that the sun moves around during the year!
 Position the sensor away from windows and heating/cooling devices such as radiators and fans.
 The sensor must have a clear line of sight to the protection area.

How to avoid the common mistakes with installing PIRs.


Where the PIR has a look down or ―sneak‖ zone, ensure that this is not obstructed
 Pay attention to avoid blind spots when positioning sensors
 Always adjust the sensitivity of each sensor once it is mounted, taking into consideration the lighting, the
proximity to radiators, windows, mirrors and other external influences
 Tamper switches often cause problems. If you are using the tamper switch ensure that the tamper switch is
closed. If you are not installing the tamper circuit (not advised) you need to ensure that the tamper circuit is
linked out at the control pane.
Hints and Tips
If wall is not square you may need to alter the state of the plastic to make sure when mounting that you hear the
tamper spring ―click‖, closing the circuit.
 Using the black jumper, you can easily set the red LED light to ON or OFF as indicated below. This is
particularly useful in living rooms where the LED flashing on and off could be distracting.
 Allow up to one minute for the PIR to calibrate itself.

4. Pet Tolerant Detectors


Positioning
 Follow the instructions for positioning PIR motion sensors.
 Select correct pet tolerant setting using the black jumper as indicated below.

5. Smoke Sensors
Positioning
 Place in or just outside bedrooms or in the hallway close to any sleeping area. The top of the stairs is also a
good place
Hints and Tips
 Do NOT place smoke sensors in kitchens or bathrooms.

6. Door Contacts.
Positioning
 Mount the main part (part with connectors) on the fixed part of the door or window frame. Do not mount them
further than 3‖ from the opening side of the door
 Mount the magnet on the mobile part of the door or window so that it is adjacent to the main part
 Ensure that the two parts are opposite each other and a small gap has been left Hints and Tips
 Ensure that wires are hidden so that they cannot be damaged
 Ensure that wires are hidden so that they cannot be Please note that some Honeywell door contacts have two
rather than five terminals
 If there are only two screws, a tamper loop will need to be created by twisting the cables then insulating them
with electrical tape
 Wrap the wire around the screw in a clockwise direction and tighten the screw for the best connection.

6. External Sirens & Bells


Positioning
 Install in a high location from which the strobe can be seen and the siren heard.
Hints and Tips
 Ensure that the tamper is closed.

7. Internal Siren
Positioning
 Place in the centre of the home out of reach.

8. Speech Dialler Communications


Positioning
 Locate where it can be easily operated by system users and in a convenient location for connection to the phone
line.
 If possible, do not connect other telephone apparatus to the same line.
Best Practice
 Connect the speech dialler directly into the control panel.
 Once wired in, test that the dialer dials through before programming the pre-recorded alert messages according
to trigger cause (e.g. intruder, fire, and flood).
How to avoid the common mistakes with installing a speech dialer
 Ensure that the speech dialer is the first item on the telephone line i.e. the first ―slave socket‖ to be connected to
the master socket (where more than one apparatus is unavoidable). This allows the speech dialer to ―snatch the
line‖ or disconnect any other call should it be triggered.

Installation Advice and Best Practice


 When installing an intruder alarm it is imperative that you follow the necessary Health and Safety requirements
according to The Electricians Guide to the 17th Edition of the IEE Wiring Regulations. Installation of the
intruder alarm is straight forward provided that the installer is a qualified and experienced electrician.

Programming and Commissioning the Intruder Alarm


Programming and commissioning the intruder alarm system really means establishing your customer’s
requirements, programming the system to meet these requirements and then commissioning the system to
ensure it works.
 Test the control panel, keypad and all peripheral devices to ensure they are working.
 Programme the control panel according to the requirements that you agreed with your customer’ There are
different programs for different types of programme setting.

Where to put sensors

Zoning your alarm system


Absence Alarms
An absence alarm is used when you leave home for a period of time, for instance heading out to
work. PIN code is generally used to arm an absence alarm. Once you have entered a correct PIN code, the
various sensors around the house will be armed.

Night Detection Alarms


A night alarm allows you to arm specific security sensors when you go to bed. Typical configurations
involve the arming of all door, window and glass break detectors. However, motion detectors that
pick up movement when you go to the toilet at night are excluded from this type of configuration.
This enables you or a family member to get out of bed in the middle of the night and switch on the
bathroom light, but also have the alarm armed to protect against someone breaking in.

Planning of a Intrusion / Burglar Alarm System

Fire alarm system


A fire alarm system is a set of devices that detect and alert people to the presence of smoke, fire, carbon
monoxide, or other fire-related emergencies.
The Five Basic Parts of a Fire Alarm System
i. Fire alarm control panel.
ii. Initiating devices.
iii. Notification devices.
iv. Primary power supply.
v. Backup power supply.
Fire Alarm Control Panel (FACP)
The fire alarm control panel functions as the central brain of your entire fire alarm and detection system. It
monitors and controls the systems initiation devices. When an initiation device is triggered, it sends a signal to
the control panel, which activates the notification devices or the alarm. The control panel also allows you to
manually control the system and check the status of your system, so you can detect issues when they occur.

Fire Alarm Initiating Devices


Initiating devices are responsible for activating the system in an emergency. There are two categories of
initiating devices, including manual and automatic. Manual initiating devices require you to pull a switch or
handle to initiate the alarm physically. Automatic initiation devices activate automatically upon detecting heat,
smoke, flames, or gas. Listed below are types of initiation devices, both manual and automatic:
Pull stations, Alarm buttons, Duct detectors, Smoke detectors, Beam detectors, Heat detectors, Flame detectors,
Tamper switches, Air aspirating detectors, CO2 detectors
Fire Alarm Notification Devices
Notification devices notify building occupants that a fire or emergency has been detected. They can be
programmed to deliver visual and audible messages relevant to different emergencies and should include:
Strobes, Alarms, Bells, Horns, Sirens, Chimes, Voice Evacuation

Primary Power Supply


The majority of fire alarm systems need a primary and backup power supply. The primary power supply usually
comes from a 120- or 240- Volt AC power source that your property’s power company supplies.

Backup Power Supply


As mentioned above fire alarm system also need a backup power supply just in case the primary power fails or
is shut off. A backup power supply will typically consist of 6- or 12- volt batteries to ensure your fire alarm
system continues to run when the primary power is out.

What is a ‗fire triangle‘?


A fire triangle represents the three elements, which causes a fire in a combustible mixture. The three elements are
fuel, air and ignition

Additional Alarm System Functions


Building codes have special requirements for some types of occupancies in case of fire. In these cases, the fire detection and
alarm system can be designed to initiate the following actions:
• Turn off the heating, ventilating, and air-conditioning (HVAC) system
• Close smoke dampers and/or fire doors
• Pressurize stairwells and/or operate smoke control systems for evacuation purposes
• Unlock doors along the path of egress
• Provide elevator recall to the designated floor and prevent normal opera- tions
• Operate heat and smoke vents
• Activate special fire suppression systems, such as preaction and deluge sprinkler systems or a variety of special-agent fire
extinguishing systems

placements of fire alarm components


What is the purpose of a fire alarm system
The purpose of fire alarm systems shall be primarily to:
1. Provide notification of fire alarm, supervisory, and trouble conditions;
2. Alert the occupants;
3. Summon aid;
4. Control fire safety functions.

How are smoke detectors helpful


Smoke detectors are helpful in two very important ways:
1. Smoke detectors can provide an early warning of a fire. They can warn of a fire at the earliest possible stage.
2. Occupants can evacuate the building immediately because of the early warning. (This reduces the need for
later attempts to rescue occupants who have not evacuated the building

Describe the following smoke detectors


Ionization Detectors use an ionization chamber and a source of ionizing radiation to detect smoke.
Ionization smoke detectors monitor 'ions,' or electrically charged particles in the air. Air molecules in a sample
chamber of ionization smoke detectors are 'ionized' by a radioactive source. This allows a small electrical
current flow. Smoke particles entering the sensing chamber change the electrical balance of the air. The greater
the amount of smoke, the higher the electrical imbalance. When combustion particles enter the smoke detector,
they obstruct the flow of the current. When the current gets too low, the system actives the alarm.
Photoelectric detectors are better at sensing smoky fires, such as a smoldering mattress. Light from the light
source in a photoelectric detector may be reflected off the walls of the sensing chamber, and be seen by the
photosensitive device when no smoke is present.

In which conditions would you avoid in installaing smoke detectors


Unless specifically designed and listed for the expected conditions, smoke
detectors shall not be located if the following conditions exist:
(1) Temperature below 0°C (32°F)
(2) Temperature above 38°C (100°F)
(3) Relative humidity above 93 percent
(4) Air velocity greater than 1.5 m/sec

Inspection, Testing and Cleaning Guidelines


(A) All smoke detectors connected to a defined fire alarm system shall be visually inspected at least
once every 6 months.
(B) All smoke detectors connected to a defined fire alarm system shall be cleaned and tested in
compliance with the procedures set forth in the manufacturer’s recommended
cleaning/specifications.
(C) All smoke detectors connected to a defined fire alarm system shall be:
• Cleaned not less than once every six (6) months, except for analog (intelligent) smoke detectors,
which shall be cleaned no later than one (1) week from receipt of an indication of the need for
cleaning.
• Tested for smoke entry not less than once a year.
• Tested for sensitivity not less than once a year, except for analog (intelligent) smoke detectors,
which shall be tested for sensitivity no later tha
Common Causes of False Alarms
•fumes from cooking process
•steam from bathrooms, showers etc
•tobacco smoke
•dust ( whether built up over time or not)
•insects
•incense, candle
•high humidity
•accidental damage (manual call point)
•aerosol spray
•high air velocities
•water egress
•testing or maintenance of the system without proper disablement.
•arises from fault in equipment
Different Types of Fire Alarm Detectors
At the core of a fire alarm system are the detection devices, from sophisticated intelligent smoke detectors to
simple manually operated break glass units, there are a wide array of different types, but we can divide them
into groups including:
– Heat detectors
– Smoke detectors
– Carbon Monoxide detectors
– Multi-sensor detectors
– Manual Call Points

1. Heat Detectors
Heat detector can either work on a fixed temperature basis, where it will trigger an alarm if the temperature
exceeds a pre-set value or they can work on the rate of change in temperature.

Commonly Heat detectors work in a similar way to an electrical fuse, the detectors contain a eutectic alloy
which is heat sensitive when a certain temperature is reached the alloy turns from a solid to a liquid which in
turn triggers the alarm.
2. Smoke Detectors
There are three basic types of smoke detectors including:
– Ionization
– Light Scattering
– Light Obscuring
2.1. Ionization Smoke Detector
Ionization Smoke detector generally contains two chambers. The first is used as a reference to compensate for
changes in ambient temperature, humidity or pressure.
The second chamber contains a radioactive source, usually alpha particle, which ionizes the air passing through
the chamber where a current flows between two electrodes.
When smoke enters the chamber the current flow decreases. This drop in current flow is used to initiate an
alarm.
2.2. Light Scattering Smoke Detector
The light scattering smoke detector operates on the Tyndall effect; a photocell and light source are separated
from each other by a darkened chamber such that the light source does not fall on the photocell.
The passage of smoke into the chamber causes the light from the source to be scattered and fall on the
photocell. The photocell output is being used to initiate an alarm.
2.3. Light Obscuring Smoke Detector
In the Light obscuring smoke detector, smoke interferes with a light beam between a light source and photocell.
The photocell measures the amount of light it receives.
The variation in photocell output, is being used to initiate an alarm.
This type of fire detection equipment can be used to protect large areas with the light source and photocell
positioned some distance apart.

3. Carbon Monoxide Detectors


Carbon monoxide detectors are known also as CO fire detectors are electronic detectors used to indicate the
outbreak of fire by sensing the level of carbon monoxide in the air.
Carbon monoxide is a poisonous gas produced by combustion.
In this instance, these detectors are not the same as Carbon monoxide detectors used in the home for protecting
residents against carbon monoxide produced by incomplete combustion in appliances such as gas fires or
boilers.
Carbon Monoxide fire detectors use the same type of sensor as those in the home but are more sensitive and
respond more quickly.
Carbon monoxide detectors have an electrochemical cell, which senses carbon monoxide, but not smoke or any
other combustion products

4. Multi-Sensor Detectors
The Multi-sensor detectors combine inputs from both optical and heat sensors and process them using a
sophisticated algorithm built into the detector circuitry.
When polled by the control panel the detector returns a value based on the combined responses from both the
optical and heat sensors. They are designed to be sensitive to a wide range of fires.

5. Manual Call Points


A Manual Call Point or Break Glass Call Point is a device which enables personnel to raise the alarm by
breaking the frangible element on the fascia; this then triggers the alarm.
LAYOUT PLAN FOR INTRUSION AND FIRE ALARMS INSTALLATION
Types of Cable Are Used for Alarm Systems?
1. Siamese cables: Siamese cables consist of a coaxial cable and a power cable that supplies power to the
cameras involved in the system.
In the data world, siamese cable stands for a cable that is built to include both video and power. In contrast to
Power over Ethernet (PoE), the power is attached to the side of the data cable. PoE makes use of wires intended
for data to transfer power

The cable provides all requirements for the cameras without the need of finding a power source next to the
install location.
PRO s
Versati l e
These security camera cables may be used to transmit both data and power at the same time. They thus return
very high value for money and are hence very worthy purchases.
Data I n tegri ty
The cables are structured in such a manner as to allow the transmission of power without any undue interference
with the transmission of video. This greatly enhances the reliability of data.
S i mp l i d f i ed O p erati on s
They may be used to relay signals over moderately longer physical distance.
Ad ap tab l i ty
Owing to the fact that both power and data are transmitted in the same cable, the process of setting up a video
surveillance system is greatly simplified.
CO Ns
I n tri cate
They are more complicated to handle, install and operate when compared to other video security cables.

2. Coaxial cables: Typically made of thick braided wire, coaxial cables can carry video signals over longer
distances.

 Inner conductor: stranded tinned copper to 42/0.12 (TC)


 Insulation: PE solid core Φ2.95mm
 Outer conductor (shield): 1, longitudinally wrapped aluminum foil, tinned copper wire 96 Code (TC)
 Jacket: Flame retardant gray PVCΦ5.0mm

Coaxial Cable Applications:

Coaxial cable or BNC cable is widely used in the video transmission, signal communication and signal control
systems. The cable used for video surveillance and video meeting wiring projects, video/audio connection, TV
signal (CCTV) transmission...etc. Widely used in video transmission field of cabling system, which require a
high speed signal transfer rate.

If you use the coaxial cable for cctv cameras, then you also need to use separate power cable for providing
power supply to cameras.

T w i s ted Pai r Cab l e

Twisted pair is the ordinary copper wire that connects home and many business computers to the telephone
company. To reduce cross-talk or electromagnetic induction between pairs of wires, two insulated copper wires
are twisted around each other. Each connection on twisted pair requires both wires. Since some telephone sets
or desktop locations require multiple connections, twisted pair is sometimes installed in two or more pairs, all
within a single cable. For some business locations, twisted pair is enclosed in a shield that functions as a
ground. This is known as shielded twisted pair (STP). Ordinary wire to the home is unshielded twisted pair.
PRO s
S i gn al In tegri ty
These cables greatly reduce crosstalk and electromagnetic inductions between pairs of camera wires, which
consequently ensure that the integrity of the signals in transit is upheld at all times.
Con s
L es s Du rab l e
These are generally less durable and are also prone to physical destruction
Twisted pair are further divided into two types based on their noise protection.
Unshielded Twisted Pair (UTP) Cable
The UTP cables do not have any extra shield for protection against noise. They twisted pairs may reduce the
noise but it still affects it. Various categories of UTP cables are used in residential and commercial building
with various bandwidth e.g. CAT1, CAT2 etc.

Shielded Twisted Pair (STP) Cable


The STP cable has an extra layer of foil that protects the wires from electromagnetic interferences. They are
used for high-end applications where the cables may get affected by external environmental interferences.

CAT5 (Category 5 cable) also called UTP 5

Cat 5 or UTP 5 is a twisted pair cable for transmission signals. This type of cable is used in structured cabling
for computer networks such as Ethernet, as well as for IP video surveillance system or analogue surveillance
system with video balun.

Using the Cat 5 cable for analogue surveillance system, you need to use the video balun. The advantage is the
cat 5 cable can not only transmit video signal, but also can transmit power supply, audio signal, even RS485
control. More over, you can easyly shift from analogue system to IP system without re-wiring the cable.
RVV PVC sheathed cables (300/500V)

 nner conductor: OFC bare copper stranded (BC) or tinned copper stranded (TC)
 Insulation: PVC, chromatographic identification
 Cable core: insulated wire stranding, wrapped with polyester film (PP band)
 Sheath: black / white PVC

RVVC Shielded cable application

Used in building automation and control systems, burglar alarm systems, fire systems, communications, Audio,
audio systems, instrumentation, electronic equipment and automation devices to be anti-interference connection.

For burglar alarm system connection between sensors and alarm panel, you need to use RVVP 3×1.5 or RVVP
4X1.5 cable.

RVS Cable

RVS cable also called twisted pair cable.


 Inner conductor: One side with O.F.C the Stranded bare copper wire (BC), the one side of the stranded tinned
copper (TC)
 Insulation: PVC

RVS Cable/twisted pair cable Application

 Widely used in fire alarm system between the fire sensor and fire alarm panel.
 Used for small home appliance, light, small electric tool's power supply. Double white color core cable used for
connection lamp holder. Red and Blue core cable used for fire alarm system. Red & white color core cable used
for broadcast and telephone line.
 Used in connection between amplifier and audio equipment.

O p ti cal Fi b er Cab l e

Optical fiber is a very thin strand of pure glass which acts as a waveguide for light over long distances. It uses a
principle known as total internal reflection. Fiber optic cable is actually composed of two layers of glass: The
core, which carries the actual light signal, and the cladding, which is a layer of glass surrounding the core. The
cladding has a lower refractive index than the core. This causes Total Internal Reflection within the core. Most
fibers operate in duplex pairs: one fiber is used to transmit and the other is used to receive.
But it is possible to send both signals over a single strand. There are two main types of fiber optic
cables: Single-Mode Fiber (SMF) and Multi-Mode Fiber (MMF). The difference is basically in the size of
the core.
MMF has a much wider core, allowing multiple modes (or ―rays‖) of light to propagate. SMF has a very narrow
core which allows only a single mode of light to propagate. Each type of fiber has different properties with its
own advantages and disadvantages.
PRO s
Fas t
These data cables transmit information at amazingly high speeds. They are thus preferable for those situations
that require faster transfer of data rates and as minimal delays as possible.
E ff i ci en t
They carry out their tasks of transmitting data with ruthless efficiency. That’s because the signals in transit are
not subject to electromagnetic interferences and do not need to be re-transmitted.
L arge Cap aci ty
The typical optical fiber handles much more information than conventional copper wires. They, therefore,
return maximum value for money to the users.
L on ger Di s tan ce
They are quite suitable for use in extremely long distances such as between two continents.
Con s
L ab or I n ten s i ve
They require plenty of manpower to install and maintain.
Del i cate
The glass fibers require more protection within an outer cable. Any slight scratch will usually compromise the
ability of the cables to transmit signals effectively.
Co mp l i cated
A fair mastery of intricate electronics engineering jargon is needed to handle and operate them.
E xp e n s i ve
They are by far the most expensive CCTV camera cables.

The fiber optics cable is classified into two main types;


Single Mode or Mono-mode Fiber Optics Cable:
This cable allows only one mode of light to transmit. It is made of a very thin single strand of fiber that allows
only single light wave to propagate. This decreases the number of light reflection which reduces the attenuation
in signal. It provide high transmission rate at long distance with very low attenuation but at high cost.

Multi-Mode Fiber Optics Cable:


This type of fiber optic cable is made of relatively thicker fibers that allow more than one light waves so it can
transmit relatively more data. But the number of light reflections due to large number of waves at large distance
causes attenuation and distort the signal at the receiving end. This is why it is used for relatively short distance
transmission such as LAN, security system etc.
Direct-Buried Cable (DBC)
It is a type of cable used for communication and power transmission. It is specifically designed to be buried
directly underground without the need of extra insulation, sheathing or piping. It is made of bundles of fiber
optic cables with a thick metal core for stiffness. It has multiple layers of protection such as plastic insulation
layer, waterproof layer as well as shock absorbing gel etc. to protect it from heat, moisture and other
underground factors.

Vi d eo Pow er Cab l e s

PRO s
S i mp l i ci ty
They are plug-and-play friendly
Versati l e
They transmit video signals and also supply DC Power to the CCTV Security cameras at the same time.
Af f ord ab l e
They are relatively cheap and hence within the easy reach of any prospective user.
Con s
L i mi ted d i s tan ce
They are only usable within a limited range and are hence unsuitable for longer distances

Pow er Cab l e

A power cable is an assemblage of one or more electrical conductors, that are usually held together by an
overall sheath and used for the transmission of electrical power.
PRO s
S af ety
They are very safe due to the fact that they may be buried underground or ran overhead, way out of the harm of
the home residents.
Pe r man en cy
These cables may be made a permanent part of a building structure and are hence cheaper in the long run.
Ch eap er
They too are relatively cheaper and quite affordable.
Con s
L i mi ted Ap p l i cab i l i ty
They are only used to transmit electrical energy, not video data. They therefore return very low value for
money.
Multi-Conductor or Multicore Cable:
Multi-core or multi-conductor cable has multiple conductors with insulated sheaths that are rolled into one
jacketed cable. Its job is to avoid the messy connection by having one single cable instead of 10 or 20 separate
wires and save time by connecting them one by one.

The individual conductors have insulation sheath with a common housing made from insulating material. But in
some cases, there is an aluminum layer for protection against EMI (electromagnetic interference) or an extra
armored layer for more protection. The multiple core cables usually ends in a multi-pin connector.

The cores are the number of useful connections; a simple 3-phase cable cannot be called a multi-core cable but
a cable having 2 or more then 2 separate 3-phase conductors is a multicore cable. For example, an audio mixer
has multiple input cables from microphones, the cables are joined together to form a multi-core cable which is
easier to plug in instead of plugging each cable in its own spot.
They are mostly used in electronics for data transmission in application such as:
 Transmitting audio signal to audio mixer.
 Sending audio and video signal in gaming consoles.
 Sending camera signal to CCU (camera control unit) in TV studios
 Sending audio and video signal using a single cable from camera.
 in networking

NOTE:
6 core alarm cable is used for sensors in two ways:
1. One pair for power, one pair for sensor, one pair for antitamper.
2. One pair for sensor 1, one pair for sensor 2, one pair for antitamper – if both sensors are unpowered.
4 core cables are still used for unpowered sensors. 8 and 10 core cables are also available for connecting
multiple sensors.
Some sophisticated sensors, such as IR beams, may require cables with more than 6 cores.
There are also the cables connecting the siren, remote keypads, and autodiallers to the main control unit.
The colour code is not standardised nationally but is usually standardised by alarm installation companies.
Burglars have taken advantage of this!

E th ern et cab l es

Ethernet is the traditional technology for connecting wired local area networks (LANs), enabling devices to
communicate with each other via a protocol — a set of rules or common network language.
PRO s
Rel i ab i l i ty
Very easy to use, nor like some technical problems like limited, cannot
be a connection problem that is observed quite frequently in wireless.
S p eed
It gives you fast, secured,reliable transmission across them.
Data S ecu ri ty
Use common firewalls for data security.
Con s
I n f ras tru ctu re Req u i remen ts
You must have the necessary wiring and equipment. Also, you will need a port on the switch for each wired
device.
Di s tan ce L i mi tati o n s
Each wire has maximum length from the network adapter on the computer to the
hub/switch/router/gateway. (Approximately 100m (328ft) for Cat 5/5e UTP (unshielded twisted pair) cables).

Fire Alarm Cable


A Fire Alarm Cable is a cable used for transmitting fire alarm signals. They are typically made of two or more
conductors, each with numerous insulated wires running through them. The cables are designed to be
resistance-welded together, creating a single unit that can withstand the heat and abuse for the protection of fire
alarm systems.
Fire alarm cables are typically made from thermoplastic materials and copper, making them resistant to flame
and heat. They also have a high degree of flexibility, making them ideal for use in tight spaces. And because
they are designed for use in fire alarm systems, they meet all the necessary safety and compliance standards.
Power limited Fire Alarm Cables

1) FPL which is a power-limited fire alarm riser cable is usually the least expensive because it is the most basic
type of fire alarm cable and is also recognized by the NEC (National Electric Code). FPLR cables are suitable
for use in a vertical run through a shaft or from floor to floor within a building.

2) FPLR Shielded is a power-limited fire alarm shielded cable, has the same components of the standard FPLR
but, includes an aluminum polyester foil shield and drain wire to protect against outside interference.

3) FPLP which is a power limited plenum cable and they are recognized by the NEC for use in air ducts and
plenum spaces and any other space that is used for the flow of environmental air. These cables tend to be a little
bit more expensive due to the additional engineering and protection they offer. All FPLP cables are listed as
having adequate fire-resistant and low-smoke-producing characteristics as well.

4) FPLP Shielded cables are power limited plenum fire alarm cables with an aluminum polyester foil shield
and drain wire to block an additional interference within a cable.

Non-Power Limited Fire Alarm Cables

1) NPLF or, non-power limited fire alarm cables are recognized by the NEC and are suitable for all general fire
alarm cable uses. They cannot, however, be used in riser, ducts or plenum spaces that used for environmental air
flow unless they are properly installed within a conduit.

2) NPLFP are non-power limited fire alarm cables are also recognized by the NEC but these cables are suitable
for installation in ducts, plenums and other spaces where environmental air flows.

What type of fire alarms are there?


There are a few different types of fire alarms to pick from when thinking of installing one:
Non Addressable Fire Alarm System (Conventional)
Conventional fire alarms are perfect for small buildings. The detectors go off individually when they detect heat
or smoke. This type of fire alarm system can be set up in zones, each zone is hardwired to a control panel or
expander. Non addressable fire alarms have a different wire for each device, each wire connects to the control
panel.
Addressable Fire Alarm System
Conventional detectors indicate the zone whereas addressable fire alarm systems indicate the exact detector that
has been activated, they can pinpoint the exact location of the potential fire, this is why it's a necessity to be
installed in large buildings. Every device connected to this type of fire alarm has its own unique address.
Addressable fire alarms connects all devices to the control panel using one wire.

Radio Fire Alarms


Also known as wireless fire alarm systems, they require no cables to install and are usually used as temporary
fire alarm systems on building sites. They operate off batteries so they will still work with no electricity.
Factors to consider when installing(laying out cables) security systems for any site:

 Type of building
Different types of buildings require different types of security systems. Security systems for a shopping mall will for
instance, differ from those installed for a residential property. The property owners should understand the different
types of security systems in the market and their different roles so that during commencement of a construction
project, the choice of security systems will vary with the type of structure being put up.

 Pre-wiring
Security systems such as burglar alarm system in your home for instance, can be pre-wired and a provision of
connecting to a security integrator’s monitoring software being made possible. These alarms can be installed at the
same time when electricians are fixing electric wires. These cables are better off if they are installed as construction
goes on to avoid drilling holes into walls once construction is complete that might leave cracks on the walls
prompting one to start repairs in a new building.

 Type of equipment
Depending on the design of networks for the specific building, the dynamics of installation differ with the
components of security plans such as access control, video surveillance, optical fiber connection or any other
network communication. Electric fencing for instance, require insulators from protection from rain and an alarm
system that is monitored by the security provider on a 24-hour basis to deter any intrusion.

 Future upgrades
With the advancing technology, it is important to keep in touch with your professional security provider to assist in
the upgrade of the security systems. CCTV cameras are remotely monitored unlike in the past when one had to
review the video clip only from a DVR. A home or business owner can also be alerted on their internet-enabled
device of an intrusion from a connected alarm system. Looking into the future, the security provider advises for
gradual upgrades of security system installations.

Cables segregation:Cables carrying different types of signals must be physically separated


CCTV INSTALLATION
CCTV stands for (closed-circuit television) is a TV system in which signals are not publicly distributed but are
monitored, primarily for surveillance and security purposes.. This differs from broadcast television where the
signal is transmitted over the air and viewed with a television. A CCTV system therefore refers to all aspects
and components that make up the system, such as the camera, wiring, video footage storage (via the cloud or
digital video recorder), monitors, access control and general system management

Applications of CCTV
 Maintaining perimeter security in medium- to high-secure areas and installations.
 Observing behavior of incarcerated inmates and potentially dangerous patients in medical facilities.
 Traffic monitoring.
 Overseeing locations that would be hazardous to a human, for example, highly radioactive or toxic
industrial environments.
 Building and grounds security.
 Parking Garages: Monitor & Protect Against Intrusions, Theft
 Warehouses/Loading Docks: Review Shipping/Receiving Protocols & Deliveries
 Casinos/Hotels: Deter Theft & Other Malicious Activities
 Restaurants/Bars: Manage Front- & Back-of-House Activities
 Office Environments: Employee Activity & Productivity Measurement
 Stadiums: Monitor Crowd Control & Social-Distancing Protocols.

How a cctv system works

1. The camera captures the image and then transmits the information of the image to the cable and routers.
2. Then the cable and routers send the images in a sequence to convert the images into video format.
3. The video recorder then series the images and displays them in the format of video.

Types of CCTV
Wired
A cable is used to connect the camera to a recording device, the recording device. This offers a cleaner, tidy
installation process.

Wireless
Wireless CCTV works by connecting to your Wi-Fi network and transmitting security footage from your
camera to your recording device.

COMPONENTS OF CCTV SYSTEMS


CCTV uses components that are directly connected to generate, transmit, display, and store video
data. A CCTV systems are comprised of a number of components falling into several basic categories:
•Cables and routers
• Cameras;
• Lenses;
• Housings and mounts;
• Monitors;
• Switchers and multiplexers; and
• Video recorders.

The camera is a basic need in the CCTV system, and it helps capture a quality image on video.
•Cables and routers help transmit legitimate information to the monitoring station so that they can take instant
action.
•A video recorder - as the name suggests, records the activity in video format.
•Data storage stores the recorded data in video format for future reviews.

TYPES OF CCTV ACCESSORIES-


1.CCTV CABLE AND WIRE-
 COAXIAL CABLES: This is a two conductor which uses BNC connectors to connect cctv cameras to
the DVR.
 SIAMESE CABLES: Siamese CCTV cable is used for both digital video recorder and power signals.
It provides transmission of both data and power at the same time to security cameras

Coaxial siamese cable advantages


 RG59 siamese cable is highly durable. Coaxial cable is designed to transmit video over long distances,
making it the ideal choice if you want a system that is built to last.
 It is always shielded. Camera coax cable has shielding built into its design, so interference is reduced. Not
all ethernet camera cable types are shielded, so if minimizing crosstalk is a priority, then siamese cable
could be the better option.
 No need for an internet connection. If you are in an area with poor network connectivity, relying on an
internet connection for your video security could be problematic. Network outages could put your video
security at risk of disruption or total loss. Coaxial CCTV camera wiring is ―closed circuit‖, so the analog
signal is transmitted to a recorder, at which point it is digitized.
 Reduced cybersecurity risks. By definition, IP devices are linked to the rest of your network, increasing the
number of entry points for hackers. Taking some of your video security system offline by using analog
camera cable can reduce your exposure to cyberattacks.
 Overall, an analog system is cheaper. Whilst RG59 siamese cable is more expensive than ethernet cable, all
the associated equipment and running costs of an analog system are cheaper. This is simply because the
technology for analog (vs. IP cameras) is older and less in demand than IP.

2. CCTV CONNECTORS
It is used to terminate the cables in CCTV surveillance camera installation. These connectors are available in
many styles including 3 piece crimp on the wire comes in 2 pieces.

DIGITAL VIDEO RECORDER-.


A video surveillance camera system is one of the most convenient wireless systems. It records video in a digital
format to a disk drive, USB flash drive, SD memory card, etc.

TYPES OF CCTV CAMERAS


How are cctv cameras classified/ types of CCTV cameras:
Based on movement •Fixed •PTZ
Based on connectivity •Network •Analog
Based on housing •Dome •Box •Bullet
Based on feature •Infrared •High Definition (HD) •Day/Night •Thermal Imaging
Varifocal Camera: A camera having a varifocal lens enables the operator to zoom in and out without removing
its focus on an image
The types of cameras in the market includes,
 Analog CCTV CAMERAS
 IP CCTV CAMERAS
 WIRELESS CCTV CAMERAS
 Dome CCTV Cameras
 Bullet CCTV cameras
 PTZ CCTV cameras
 C-Mount CCTV Cameras
 High Definition (HD) CCTV Cameras
 ANPR/LPR CCTV Cameras

1) HD CCTV Cameras
These HD CCTV cameras provide 4K UHD clarity, continuous recording, motion detection, WDR, and sensor
technologies.
2) Dome CCTV Cameras
Dome cameras are so-called because they are shaped like a dome—a shape that deters vandalism. This security
camera provides a broad view with a 360-degree range of motion.
One key feature of the dome CCTV camera lies in the nature of its design. The dome shape makes it confusing
for criminals to determine the direction. A dome camera is also easy to install because it only needs to be
mounted on a wall or ceiling. Thus, it can be done with minimal disruption to the property.
3) Bullet Cameras
A bullet camera is a typical outdoor security camera. It has a cylindrical shape and is designed to withstand
harsh weather conditions. Most bullet cameras are also equipped with infrared night vision lenses. This feature
allows the device to record even in very low light conditions.
4) C-mount Cameras
The c-mount camera is another type of CCTV camera often used by professionals. This security camera can be
easily mounted to a wall or ceiling and is connected to an external lens. It also has a wide range of views,
making it suitable for large spaces.
One notable feature of the C-mount camera is its ability to capture images in extreme lighting conditions. This
makes it perfect for outdoor applications such as surveillance of parks, open spaces, and industrial complexes.
On the downside, c-mount cameras are bulky and expensive due to their advanced features. This makes them
less ideal for residential use as they can be too costly for many people.
5) PTZ Cameras
PTZ stands for Pan, Tilt, and Zoom and is one of the most advanced types of high-definition CCTV cameras. It
has a motorized mechanism that lets it move horizontally (pan) and vertically (tilt). It also has a zoom feature,
allowing it to capture far-away details.
This type of camera is usually used for live surveillance because it lets the operator control the camera
remotely. The PTZ camera is also very versatile and can be helpful in many security scenarios. It can also be
used for tracking intruders, as it can follow a person or an object. The main drawback of the PTZ camera is its
price. It can be quite expensive and unsuitable for those with a limited budget.
6) Digital CCTV Cameras
These cameras reject analog signals in favor of digital transmission, embracing the digital revolution.
7) Day/Night Cameras
With their extra sensitive imaging chips, day/night cameras can switch from color to black and white mode
when the light starts to fade. This helps provide better visibility in low-light conditions. The day/night camera is
also a great choice for outdoor surveillance since it has a higher resolution than other CCTV cameras. It can
capture more details even in total darkness, making it an excellent option for nighttime surveillance.
The only downside of the day/night camera is residential users may find it too complicated to set up and use.
That means it might not be the best choice for people who only prefer basic security features.
8) Thermal/ Infrared Technology Cameras
Thermal or infrared technology cameras are the best choice for monitoring areas with limited visibility. This
camera uses infrared light to detect objects even in complete darkness. It creates an image based on the object’s
heat signature, allowing it to see in the dark. Thermal cameras are also great for large-scale security as they
cover a wide area. They can detect objects from long distances and generate clear images even in low-light
conditions.
However, this type of camera can be costly and require professional installation. Furthermore, it can only detect
heat signatures—not color or details, so it is not the best choice for facial identification.
9) Wired and Wireless CCTV Cameras
Wireless CCTV cameras are gaining popularity due to their easy installation and portability. They can be set up
anywhere without wires, making them a better option than traditional systems. Likewise, they also have longer
battery life and can be used even in remote locations. They also offer more flexibility regarding placement as
they are easier to move around.
Unfortunately, some popular wired and wireless camera systems may be vulnerable to interference from other
devices. This means that the signal could be disrupted, resulting in blurred images or delays in transmission.
They have a limited range and may need to be closer together for wider coverage. However, these challenges
can be mitigated with the right setup and proper placement.
Advantages of Wired Camera
No interference issue from nearby devices.
 Signal can’t easily be jammed.
 Offers good quality video and high reliability.
 Have longer lifespan.
Disadvantages of Wired Camera
Traditional wired cameras are challenging to install.
 Drilling of holes are required to run cables throughout home.
 Once installed at a place, it is not easily portable.
Advantages of Wireless Camera
Installation is easy and quick.
 No drilling holes.
 Easily portable.
 Can be installed anywhere within the range of Wi-Fi.
Disadvantages of Wireless Camera
Vulnerable to interference from other devices that can cause failure to the security system.
 Risks of being jammed or hacked.
 More expensive than wired ones.

10) Network/IP Cameras


IP CCTV cameras have network video recorders that make them some of the most advanced options in the
market. This type of CCTV camera is connected to an Ethernet network, allowing it to be accessed from any
device. This makes it an ideal selection for those who seek absolute authority over their home security system.
Furthermore, you can have remote access and view your property in real time from anywhere worldwide!
This type of CCTV camera is designed to blend in and stay hidden. Discreet cameras are often used in locations
where having a visible security system can be a disadvantage. They can be disguised as everyday objects,
making them very difficult to spot.
11.Hidden Camera Hidden cameras are compact in size and are used for secret monitoring. They are usually
installed in public places. Hidden cameras have a built-in recorder that records and broadcasts simultaneously
12.Vandal Proof Camera Vandal Proof cameras are used as outdoor security cameras. These cameras are
sheltered within solid material and covered by a ―hub‖ of break-proof glass which doesn’t affect the quality of
the video. It is difficult to break these cameras and this makes them perfect for high security.
13. Indoor Camera Indoor Camera as its name suggests used for indoor security mechanism.
14. Outdoor Camera Outdoor camera is used for outdoor places. They are mostly used for entry and exit
points with limited night lighting. These Cameras have hard shell vandal-proof casings.
15 Fixed Camera: This is positioned in order to have an image captured and also it could be optimized for
various housing application as well as features.

16. Analog CCTV: An analogue camera is a traditional camera used in CCTV systems. It sends video over
cable to VCRs or DVRs
Drawbacks:
• Scalability: It’s difficult and expensive to scale.
• Cost: Coaxial + Power cable costs more.
• Management Limitations: Video management from DVR only, not practical for multi-site operations.
• Security: It’s less secure because coax cable can be physically breached.

17. IP Surveillance: IP surveillance is a network solution, whereby each camera has its own IP address and
password. Because this solution is built on a network, it offers several advantages.

Advantages:
• Flexibility: It’s scalable and offers flexible installation and placement.
• Affordability: It uses lower-cost CAT 5/6 cabling, which carries power, video, audio, PTZ (Pan, Tilt, Zoom)
and event data.
• Convenience: Remote viewing and management is natively integrated.
Factors To Consider When Choosing CCTV Cameras
1. Image Resolution
The higher the resolution, the more detailed images you’ll get. This is crucial when you need to identify people
or objects.
Camera Size and Shape
Be sure to choose a size and shape that will blend in with your property. This helps deter intruders and prevent
vandalism
2. Budget
You’ll also need to set a budget for your security system.
3. Accessibility
Remote viewing is now a standard feature for modern security cameras. It allows you to access footage from
any device with an internet connection. Ensure your chosen device has this feature, which can be beneficial
when monitoring your property.
4.Camera Size and Shape
5.Monitoring Station
viewing recorded images and footage. Deciding how many monitors you’ll need is dependent upon what, and
which area you are monitoring.
6.Video Recorders
The video recorder is the device where video recorded on the camera gets processed for storage & viewing. A
There are two types of video recorders: DVR (Digital Video Recorders) and NVR (Network Video Recorders).
Digital Video Recorder includes video storage, software and also a computer hard disk – all
put together in one unit. NVRs are actually a better fit due to IP camera integration and compatibility.

Differences Between DVR and NVR

i. DVR (Digital Video Recorder) are mostly wired. You need special equipment to make it wireless. [DVR]
uses analogue cameras which need a two core cable for signal. Usually coax cables are used and u need an
additional cable for power..
ii. NVR systems (Network Video Recorder) run either via ethernet cables or wireless. Higher picture quality
(720p, 1080p) can be achieved by NVR compared to DVR.
[NVR] cables are ethernet if you go with the wired option. Also there are PoE (Power over Ethernet) meaning
both power and signal can be sent through one ethernet cable. [NVR] uses IP cameras as those type of cameras
work on a network using ethernet cables or WiFi.

All DVRs are different. There are various factors to consider when purchasing a DVR besides price
comparison. The basic and most important factors to consider are
I. Number of cameras supported, i.e. number of video inputs
II. Recording at how many frames per second (fps)
III. Compression technology used
IV. Hard disk space, number of hard disk it can support
V. Network connection / remote viewing capability
VI. Motion detection or scheduling recording functions
VII. Video backup means, by USB, CD, DVD or other means.
VIII. Easy and comprehensive search capabilities
CCTV camera installation requirement
The following are the basic necessities for setting up CCTV:
1. CCTV Connectors: These are used for the need of terminating CCTV cables in installation for surveillance
camera. In a transmission line, connectors have an important role to play. The quality and construction influence
attenuation, mechanical strength, connection stability and return loss directly

2. CCTV Wire and Cable: Used in different CCTV applications in order to have the CCTV cameras connected
to the Digital Video Recorder. The use of CCTV Wire and Cable will depend on the type of application.

3. CCTV Ground Loop Isolators: This is a device, has a Ground Loop Interference reduced with the help of
CCTV signals and also it can be easily installed in a new system or one of the existing systems.
4.CCTV Camera Housings: These are required for internal as well as external CCTV camera installations,
though the use for exterior installation is more, in order to protect from elements.
These are required for encasing the CCTV setup for both internal and external installations.

5. CCTV Mounting Brackets: CCTV Mounting Brackets are used for a wide array of products like the CCTV
camera housing, CCTV cameras and CCTV monitors.

6. CCTV Power Supplies: Along with the CCTV Power Supplies, Converters and Battery Packs are used for
the purpose of CCTV Camera installation as well as mobile cameras, hardwiring and alsofor converting a
camera of 12 VDC to 24 VAC of power supply.
7. CCTV Surge Protector: A key element for safety and protection of assets is the CCTV security system
during CCTV operation. Unpredictable disruptions such as electrical surges and lightningstrikes can cause
serious disruptions to the otherwise proper functioning of a security system. The currents that occur due to
surges can get carried over to the metallic conductor which may include the electrical and plumbing wiring. The
surge protection should be thus, installed properly in order to protect the CCTV system.

8. CCTV Twisted Pair Baluns: A balun (an acronym for BALanced/UNbalanced) changes one medium of
transmission to another medium of transmission, using defined impedence (which,
75 ohms coaxial) for the first and another impedence for the transmission to another medium (of 120 ohms
twisted pair, i.e., CAT5e).
9. CCTV Converters, Splitters and Amplifiers: The Splitters enable display of two cameras within one
monitor. The same image gets recorded with the help of one VCR. A single camera image is then displayed on
the full screen of the monitor. Converters are able to take one connection type and then convert the same to
another type, like from VGA to RCA type. Amplifiers amplify the signals that they amplify. These are used
mostly when the cable run will be too long and it causes the signal to not be very clear to the receiving end.

Tools needed for installing CCTV


MultiMeter: It is used for checking voltage and continuity in the CCTV field.
Hammer: Used for hitting, especially for cable clipping works.
Pliers: Used for holding objects firmly and also cutting wires and cables.
Wire cutter: Used for cutting as well as stripping wires.
LAN Tester: This is a tool for connectivity measurement, which is used for CAT5 and CAT6 cable testing.
This will check every connection of the cable to assure if it is perfect or not.
LAN Crimping Tool: Used for crimping and cutting a RJ45 connector to a LAN cable.
Screw Driver: To drive screws in any type of material.
Aligner: A type of small screw driver which is needed for electronic devices and has a
small screw place for calibrating.
Drill Bit: This is used along with drilling machines in order to have holes drilled out
of walls, to mount a camera, conduits along with different operations.
Hexa Blade: Used for cutting conduits in order to fit these as per the site need.
Drill Machine: Drill machines are two types – a hand drill while the other is a bench drill
machine. These are used for camera mounting and also installing cable in conduits.
12V 1A Power Supply: This needs to be kept along with the tools and then be used for
checking the field issues for a CCTV.
Measuring Tape: Ideal for any installation, it is used for measuring first. It can be used for
measuring the length of cable.
Cleaning Brush: Often dust causes a lot of disorder in the CCTV system and hence it is
required to carry a cleaning brush.
CCTV Tool Monitor: It is a small monitor which has the required video inputs and
used for checking the field anytime needed.
Tool Bag: All the tools mentioned must be neatly arranged in a tool bag,
otherwise the required tool may not be found at the time of need.

Basic layout of site for CCTV system installation/ Where to Place CCTV Cameras
The first step in security camera installation is to plan their positions. Other than the cameras’ range, you also
want to consider the length of their cables; they must be long enough to reach the nearest power sockets. If you
don’t want to deal with the mess of wires, you can get a wireless system instead.

1. Below are the ideal placements for home security cameras:


 Front, side and back entrances: Point the camera toward the walkway or sidewalk to capture the faces of
everyone coming up to your door. To keep people from throwing items at or tampering with your camera, you
can fit a wire cage around it or mount it at the second-floor level. French and patio doors are especially
vulnerable to break-ins, so make sure to install cameras in these areas.
 Ground-floor windows/ Basement Stairs: Windows that aren’t facing the street are common entry points for
burglars. Other than CCTV cameras, install smart window locks as security reinforcements.
 Garages and detached buildings: Burglars target detached structures because many homeowners don’t think
to secure these areas. If you’re Wi-Fi doesn’t reach these spots, you can either get a range extender or a camera
that doesn’t need an internet connection.
 Off-Street Windows: Often, a choice of entry is the rear window of a house. A window
which is not in the direct view of a street would mean less chances of getting caught.
 Backyard: Make sure your outdoor cameras cover every inch of your backyard to eliminate blind spots. You
can supplement your backyard CCTV with security lights to discourage burglars from going near your property.
 Second floor: Secure your second-floor main hallway with an indoor camera to safeguard your valuables. It’s a
great way to provide more video evidence in case you have to report a burglary.

How to Install CCTV Cameras


1. Mark the spot where you’ll attach the bracket for mounting. Drill the holes, then insert raw plugs before
screwing the bracket on. For wired cameras, you have to thread the wiring back through the wall to attach it to
the monitoring source. So, make sure that the holes are big enough to pull the wire through.
2. Attach and secure the camera. Plug the power cord into a socket. Some wireless cameras run without power
cards, but you do need to recharge their battery packs.
3. Install the DVR (Digital Video Recorder) in a secure spot. We recommend keeping it inside a locked
compartment to protect your surveillance data. Meanwhile, instead of DVRs, wireless CCTV cameras use
NVRs (Network Video Recorders), which you can install the same way.
4. Plan the cable pathways from the cameras to the DVR. If you’re working with indoor cables, position them
underneath carpets, near skirting boards or near ceiling cornices. For outdoor cameras, use wire mouldings to
keep the cables stable and safe from tampering.
5. Connect the network cable to the internet router. IP cameras use a Cat 5 or Cat 6 cable, whereas analogue
HD cameras require a BNC cable and a DC pin connector.
6. Connect each camera to the DVR or NVR. Then, connect the DVR to the screen where you want the video
feed. We recommend using HDMI for the monitor for a higher resolution.
7. Once everything is hooked up and powered on, check the video feed to see if the cameras are capturing their
intended areas. Adjust their angles to account for blind spots. If some cameras aren’t working, check the
connections and network clips.
Wired CCTV cameras can be challenging to install, especially if you know nothing about cables. For a quick
and painless installation, opt for wireless cameras instead. These rely on wireless receivers to stay connected, so
there’s no need for complicated cable planning. Just make sure that each camera is within the main hub’s range.

2. CCTV Installation for Commercial Purposes:


 The Entrances and Exists: It is important to install cameras at the entry and exit doors
for maximum surveillance. The person in control will be aware of the people entering or
exiting the business premises and if that is authorized or intrusive in nature. During the
day, dull or blackened image can occur whenever a door is opened or closed. Thus, the
camera must face inside and away from the outside light. Also the CCTV cameras must
be easy to view. The intruder will be able to view it and will avoid any plan of burglary.
 Reception Area: This area is a high-traffic area which needs surveillance. A covert
camera will be ideal in this, which will effectively merge with the décor of the office.
 Store Room and Office Supply: Every office has confidential documents which are to
be kept away from outsiders. Surveillance in such places is of utmost importance.
 Places of Customer Interaction: Areas which include cash register, transaction points
and other teller stations need strict surveillance and thus the use of CCTV cameras.

Follow these tips to make sure your cameras record quality videos throughout the day.
 Install cameras 8 to 10 feet from the ground: This height is low enough to capture fine details in the feed but
high enough to be out of easy reach of vandals and thieves.
 Consider the sun: Don’t point your cameras directly at the sun to prevent glare in your footage. Consider the
sun’s movement throughout the day and angle your cameras accordingly for indirect light.
 Protect the cameras from the elements: Invest in water- and weatherproof outdoor security cameras. Look for
CCTV systems that are specially designed for your climate. If you don’t have the budget for premium models,
you can place the cameras underneath eaves or inside wire cages.
 Mind the windows: Avoid pointing indoor cameras out of windows. Doing so can cause reflection issues that
degrade video quality. Many cameras have infrared (IR) light technology that reflects off of the glass. If your
footage looks pale, then it’s likely a reflection problem.
 Augment your cameras with lighting: IR light technology gives security cameras some low-light capability.
But that’s not enough if you want to capture fine details in a wide space. Bollard lights with motion detection
are good supports for your CCTV security system.

5 Ways to Power a Security Camera


1. POE (Power Over Ethernet): Combines data and power, but requires compatibility checks.
2. DC Power: Common for smaller cameras; requires nearby power sources.
3. AC Power: Great high-capacity cameras like larger PTZ cameras, typically requires hardwired
connections.
4. Rechargeable Battery: Wireless option with motion-triggered recording; needs periodic recharging.
5. Solar Panel: Powers wireless cameras but requires optimal sunlight placement.

Note: When it comes to CCTV camera power, there are a variety of options to choose from, ranging from
voltage 5v or 12v DC and 24 V AC or direct 220V AC power. options to single line solutions such as Power
over Ethernet-POE and power over Coax PoC
Instead of having a separate power source for each camera, all of them can be connected to a single power
supply box. The CCTV power supply box is simple to use; simply run your cabling and attach the 2-wire leads
from the power part of your Siamese cable to the screw-terminal panel inside the power supply box.
Mains-powered security cameras are connected to the electric mains during installation. These cameras are
popular for their reliability, quality, and ease of use.
Factors to consider When Choosing power supply for a Security Camera
 Check for PoE compatibility in your camera’s spec sheet
 Choose the spots where you can provide easy access to a wall socket, or install wall sockets at the desired
locations
 If you’re setting up more than four IP cameras, invest in a power supply unit box.
 Don’t connect long-distance IP cameras to the same power supply unit as short-distance ones.
 When calculating the total power consumption for your security camera system, always multiply the rated
power of each camera by 1.3, for added safety.
 Install a UPS system for your camera system or look for hardwired cameras with an in-built backup
rechargeable battery.
 If you’re installing solar-powered cameras, clean the solar panels regularly. (at least once a month.)
Video Compression
Video compression is a series of mathematical algorithms used to compress video and image data.
Uncompressed video data uses an extraordinary amount of bandwidth. Compression is required in order to
deploy cameras on a network. Nearly all D-Link cameras support the three most popular forms of video
compression:
• MJPEG is a series of JPEG images, the same format a digital still cameras uses to compress a photo. The M in
MJPEG stands for motion and it’s literally a sequence of JPEG images. Although each image or frame is
compressed, there is no ―video compression‖ happening, meaning each frame is a standalone compressed still
image.
• MPEG-4 is video compression, meaning the camera generates a reference or ―I‖ frame followed by a set
number of changed or ―P‖ frames. The ―P‖ frames represent changes between it and the ―P‖ frame. Only
something moving in the scene consumes data. Still parts of the scene don’t change and are not duplicated,
which can result in significant savings.
• H.264 is the next generation of the MPEG-4. Like MPEG-4, it is a true video compression and uses I and P
frames to reduce bandwidth. It deploys more sophisticated algorithms and is able to produce higher video
quality than MPEG-4 at about 50% the bandwidth usage.

GUIDELINES ON CCTV INSTALLATION IN KENYA


1The ownership and operation of CCTV systems must be clear and publicly known to ensure appropriate
accountability.
2 When considering setting up or expanding a CCTV system, the relevant concerns of all parties potentially
affected by the systemsshould be taken into account.
3 Clear CCTV system objectives should be set to guide the design, installation, operation and management of
CCTV systems.
4 The installation, operation and management of CCTV systems should be part of an integrated, multi-agency
approach to crime control and public safety.
5 The Standard Operating Procedures for the CCTV system should incorporate protocols covering
communication and liaison between the system owners/operators and the law enforcement agencies.
6 All CCTV systems should be open, accountable and operate with due regard for the privacy and civil rights of
individuals and the community.
7 Access to CCTV system images and information should be restricted and there must be clearly defined rules
on who can gain access and for what purpose such access is granted.
8 All CCTV systems owners and operators should develop evaluation frameworks to identify whether their
formal objectives are being achieved.
9 All CCTV systems owners and operators should have procedures for dealing with complaints
10There should be effective review and audit mechanisms to ensure legal requirements, policies and standards
are complied with.

CCTV REGULATIONS IN KENYA

All CCTV Systems shall be in compliance with following national legislations: 7.1.1 The Constitution of Kenya
2010
1 Kenya Communication Act, 1998
2 The Public Archives and Documentation Service Act Chapter 19 Laws of Kenya
3 Records Disposal Act Chapter 14 Laws of Kenya
4 Computer Misuse and Cybercrime Act, 2018
5 Evidence Act, 2012
6 Access to Information Act, 2016
7 Private Security and Regulatory Act, 2016
8 Any other relevant legislation that may be enacted

Cables, conduits and trunking IEE 16 regulations.


i) E.m.f. values no greater than 25 V to earth are involved,
ii) The circulating current causes no corrosion,
iii) There is no danger under fault conditions.

Joints and terminations


The normal installation has many joints, and it follows that these must all remain safe and effective throughout
the life of the system. With this in mind, regulations on joints include the following:
1. - All joints must be durable, adequate for their purpose, and mechanically strong.
2. - They must be constructed to take account of the conductor material and insulation, as well as temperature:
eg, a soldered joint must not be used where the temperature may cause the solder to melt or to weaken. Very
large expansion forces are not uncommon in terminal boxes situated at the end of straight runs of large cables
when subjected to overload or to fault currents.
3. - All joints and connections must be made in an enclosure complying with the appropriate British Standard.
4. - Where sheathed cables are used, the sheath must be continuous into the joint enclosure
5. - All joints must be accessible for inspection and testing unless they are buried in compound or encapsulated,
are between the cold tail and element of a heater such as a pipe tracer or underfloor heating system, or are made
by soldering, welding, brazing or compression.

Importance of terminations

 Prevents loose connections giving rise to heat.


 Stops heat travelling from its point of origin, along the conductor in
 both directions.
 Prevents insulation from becoming brittle, delicate and disintegrating.
 Prevents a high resistance joint.
 Prevent possible damage to equipment.
 Prevents possible electric shock.
 Prevents possible fire hazard.
Termination of cables for CCTV installation

BNC - (Bayonet Neill–Concelman)


 3 piece BNC

● Twisted BNC

● 2 pcs BNC

How to terminate 3 piece BNC


● BNC crimp
● Side cutters

Crimping 2 piece BNC

Ethernet cable crimping


1. use the correct type of cable stripper.
2.Untwist all of the conductors, and arrange them in the correct order

3. Flatten them out with your fingers, chop them off to a length of 10 cm (Do not use normally side cutters)

4. Push on the end on and crimp

A 3+1 cable is a type of cable used in CCTV systems, with three cables for video transmission and one cable for
power supply.
 A 3+1 cable consists of three cables for video transmission and one cable for power supply.
 The three video cables are typically used for transmitting the video signal from the CCTV camera to the
recording device.
 The power supply cable is used to provide power to the CCTV camera.
 This type of cable is commonly used in CCTV installations to simplify the wiring process and reduce cable
clutter.
 Example: In a CCTV system, a 3+1 cable may have three coaxial cables for video transmission and one power
cable with a DC connector.

Resolution and frames per second


Frames per second
Frame rate (expressed in frames per second or fps) is the frequency
(rate) at which consecutive images called frames appear on a display
Real time FPS = 25 fps PAL and 25 fps NTSC
As far as CCTV recording is concern 25 fps or 30 fps can be regarded as real-time.

Pixels
All digital images are made up of small picture elements, called pixels. A pixel is the smallest individual
component of an image, and each has a specific color and intensity. The total amount of pixels in an image is
referred to as the resolution. A resolution of 1920x1080 means there are 1920 columns and 1080 rows (2 073
600 pixels total) of pixels making up the image. Another term for this specific resolution is 2 megapixels, as
there are roughly 2 million pixels in the image.
At a higher resolution, the camera can capture finer details in the scene, but since the value of each pixel needs
to be stored and transferred in a video stream, the bandwidth requirement also increases. Depending on your
operational requirements, you should adjust the resolution to provide sufficient image detail without exceeding
your available bandwidth.
PPI can also describe the resolution, in pixels, of an image file. A 100×100
pixel image printed in a 1 inch square has a resolution of 100 pixels per inch.
● 4K UHD (3840x2160)
● Full HD (1920x1080)
The maximum resolution a conventional analog camera can provide after the
video signal has been digitized in a digital video recorder or a video encoder is
D1, which is 720x480 pixels (NTSC) or 720x576 pixels (PAL).

1080p resolution vs 1080i


Both modes offer the same pixel resolution: 1920 x 1080. The difference is in
the scan type they use. The p in 1080p stands for progressive scan, and the i in
1080i stands for interlaced.
1080p draws all pixels at once.
1080i and 1080p are higher resolutions than 720, but they aren't the same. You
should go for 1080p because of the more efficient way it projects images onto
the screen.

CCTV Camera Storage Calculation Formula


Storage Space (GB) = Bitrate (Kbps) * 1000/8 * 3600 * 24 * Cameras *
Days/1000 000 000

 *1000/8 = to convert kbps to Bytes.


 *3600 = to convert from seconds to hour.
 *24 = to convert from hour to day.
 Cameras = total number of cameras.
 Days = total number of days you want to record

For example, if you have 2 cameras whose maximum bitrate is 1024 Kbps
and you want to record for 7 days nonstop, the required storage space =
1024 * 1000/8 * 3600 * 24 * 2 * 7/1000 000 000 = 154.8288 GB

Example 2
If you have 16 camera system at 1080P16 x 1080P cameras, and you wanted 30 days of storage, your
calculation would look like this: 40 gigabytes x 16 cameras = 640 gigabytes per day. 640 gigabytes x 30 days =
19 TB (minimum needed)

If you have installed 1 HD CCTV and use video compression, this will consume 8-12 GB to store 24 hours
video. And 1TB can store approx. 80-100 days videos for 1 CCTV.

How long does 32GB last in CCTV?


For 1080p@25fps,a 32GB micro SD card can record about 40 hours non-stop. For 1080p@20fps,a 32GB micro
SD card can record about 3 days non-stop. Storing with micro SD card uses loop recording. When the card is
full, it will automatically delete the first hour of the video.

How long will a 64GB SD card record CCTV?


Using H. 264, 64 GB is about 24 hours of continuous footage for one camera that records at 1080P 30 FPS.

The factors that determine CCTV camera storage.


● Resolution – The CCTV camera resolution is measured in vertical and horizontal pixel dimensions, such as
CIF (352 x 240), 720P (1280 x 720), 1080p (1920 x 1080), 1440P (2560 x 1440) and etc.
● Compression – Video compression is a kind of technique that reduces the size of original video file formats
and thus occupies less space than the original files. The popular video compression formats include H.264,
MJPEG and MPEG4. (Read the comparison between the H.264 and MJPEG security cameras).
● Bitrate – The higher the camera bitrate is, the better the video quality. And it is affected by the resolution and
compression formats. Lower resolution and highly compressed videos will require less bitrate.
 Camera – The number of cameras you use can also impact the CCTV storage calculation. If you use
multiple cameras simultaneously, more CCTV storage will be required.
● Days – The longer CCTV recording retention period is, the more storage space is required. When you utilize
the CCTV storage calculation formula, note that it is calculated by days, so you might need to convert the hours
to days if the camera records in hours.

FOUR STEPS TO LINKING SECURITY SYSTEMS TO YOUR PHONE WITH WIFI


Step 1: Install and launch security camera app on your smartphone
Step 2: Add your security camera to the application using the model code or QR code
Step 3: Click on the security camera linked to the phone to see a live view
Step 4: Set configurations such as motion detection, alerts frequency, etc to suit your monitoring requirements.

Describe the following types of camera lenses.


Fix Lens: - A photographic lens for which the focus is not adjustable is called a fixed-focus lens or sometimes
focus-free. The focus is set at the time of lens design, and remains fixed. It is usually set to the hyper focal
distance, so that the depth of field ranges all the way down from half that distance to infinity, which is
acceptable for most cameras used for capturing images of humans or objects larger than a meter.
Manual Lens: - Iris, Zoom Open / close, Focus, control by manually.
Semi manual lens: - Only iris level controlled by camera and rest is control by manually.
Auto lens: - Iris and Focus level controlled automatically.

Distinguish between Hardware Compression and Software Compression. Hardware


Compression: Both Capturing Video Signal and Compressing Video Signal are done by DSP(Digital Signal
Processing) chipset integrated on DVR Board. It doesn't need the computer's CPU to do this work. It's low cost
of CPU and RAM resources. In this system the computer CPU's task focus on answering network request,
streaming the video/audio to network and saving recorded data to local hard disk.
Software Compression: The DVR Board only capture video signal but doesn't compress it, it is the computer
CPU and RAM to do this compression work. It's high cost of CPU and RAM resources. In this system the
computer CPU and RAM are often overloaded. It is easier to crash than hardware compression system.

You might also like