House, design, repair, decor. Yard and garden. Do it yourself

House, design, repair, decor. Yard and garden. Do it yourself

» Fire alarm system system serves. Means and fire alarm systems

Fire alarm system system serves. Means and fire alarm systems

Now it is impossible to imagine any object of industrial or civilian purposes not equipped with a security and fire alarm. The assignment of a fire alarm is to perform a certain sequence of actions, according to a given algorithm. These actions include the notification of personnel and relevant services about penetration on a protected object or fire danger occurrence.

Work of security alarm

System security alarm It is a combination of technical specials for special purpose.

The alarm kit includes the following devices:

  • Sensors of various purposes
  • Main unit or receiving and control device
  • Uninterruptible nutrition device
  • Means alert

Sensors, depending on the purpose, react to certain external factorswhich cause them to trigger. These devices can respond to the opening of the doors and windows, the movement of the physical object, the breakdown of the glass, the destruction of the wall structures and the substru. To implement these functions, the design of the sensors involves the use of various physical principles. The triggering of the sensor entails the rupture (opening) of the electrical circuit. Several successively connected sensors of the same type are a security alarm cable. Using the control buttons, each loop can be armed or removed from security.

Designed to connect a specific number of loops, power supply to sensitive sensors and an alarm. The simplest devices intended for protection small apartments Or offices, allow you to connect from one to four loops.

Reception and control devices used in large shopping centers, educational institutions, health facilities and industrial enterprises May have up to several dozen loops. Control such a complex is carried out by a special console using software.

An important element of the security alarm is uninterruptible power systemwhich provides continuous and round-the-clock operation of the system. To do this, in the power supply scheme provided automatic switching to battery, when the network is disappeared in case of emergency situations. Starting time depends on the capacity of the rechargeable battery.

Assignment and Functions of the Security Alarm Provide a notification of the security structure in the following cases:

  • Opening doors and windows
  • Movement in the sensor tracking zone
  • Smoking glass
  • Attempts to destroy the wall

The inclusion of the alerts is performed automatically, if the alarm is assigned to protection. These tools include light and audible signaling devices. The main function of the security alarm is the transmission of an unauthorized penetration signal local security panel and / or challenge of the immediate response group through the control system of centralized observation by cable line, GSM, Wi-Fi channel or radio channel.

Purpose and key functions

The fireguards system also represents special purpose sensors connected using two-wire lines (loops) to the receiving and control device.

Fire sensors (detectors) include the following models:

  • Sensors triggered with temperature increase
  • Sensors reacting to the appearance of smoke
  • Manual detectors (IPR)

Temperature sensors With self-healing react to an increase in temperature over a certain limit. Usually this threshold is + 70 0 S. The smoke sensors (DIP) are triggered at a certain level of smoke indoors. With the help of manual detectors, everyone who noticed smoke or fire can enable the fire alarm system, breaking the glass and pressing the button with fixation, or turning the lever. The design of the IPR does not allow inverse switching without opening the case. When the fire detectors are triggered, the receiving and control instrument includes alarm and alerts.

These include:

  • Removeless signaling devices like "Lighthouse"
  • Siren
  • Light tablet
  • Voice alert system

Fire alarm must provide 24-hour continuous mode Work and maintain its performance in the conditions of fire. Modern fire alarms, thanks to the built-in communication modules, allow when triggered sensors transmit a signal fire alarm in the Ministry of Emergency Situations.

Additional features

Fire alarm functions may include additional featuresimplemented by software. So, for example, the basic security alarm device may include any external devices. It can be a digital automatic camera or a hidden camcorder with information recording on a memory card. If the violator managed to leave the protected object before the operational group arrives, it can be subsequently identify using video materials.

Fire alarm can be programmed to include automatic system Fire extinguishing and smoke removal. In some cases, on industrial facilities, fire alarm It can control hermetic refractory doors, cutting off the source of fire from the rest of the premises.

Fire is a terrible element that takes thousands of lives every year. No less problem is the protection of the property of organizations, enterprises and individuals. To prevent the victims, the death and the embezzlement of material values \u200b\u200bat objects, the means of security and fire alarm or, abbreviated, OPS are installed. With the help of technical and hardware, to prevent and minimize the loss of enterprises and organizations, a security and fire alarm is used. In addition to the timely alert, the fact and time of the protected area of \u200b\u200bthe protected zone is additionally carried out.

Functions of modern OPS:

  • Perimeter security;
  • Warning about the emergence of fire;
  • Call help (alarming function);
  • Warning of some emergency situations in the life support systems of buildings (gas leakage, plumbing, etc.).

Installation of fire alarm is prescribed by law on fire safetyThe installation of security alarms at the facility is most often a mandatory requirement of enterprises providing security services, as well as insurance companies.

Development, design installation and maintenance of the security and fire alarm system of any generation is one of the most demanded services of our company GEFEST Alarm LLC.

Why do you need a security and fire alarm?

As mentioned above, the purpose of the security and fire alarm is the timely alerts of responsible personnel and people who are at the facility, emergency situations, such as the emergence of a fire or a disturbance of the perimeter. This is one of the oldest, efficient and well-proven security complexes.

Combining security and fire alarms into one system caused by purely economic considerations. After all, the security and fire Systems Many common, except for the obvious destination to save lives and property. These are identical communication channels, the processing algorithms coming from information sensors, the flow of anxiety alerts and signals similar to many technical means.

Composition and means of security and fire alarm


The technical means of security and fire alarm are quite diverse. The composition of the modern OPS includes the following means and components.

  • Sensors and alarming detectors, the purpose of which is to respond (automatic trigger) to a specified alarm event. They are infrared, vibration, optical, vibration, etc.
  • Communication lines - wired and wireless, including through the Internet;
  • Reception and control devices (PCP, "Controllers") - the purpose of this OPS tool is to receive and process on specified signaling algorithms of signals coming from sensors and control actuating devices, i.e., turning on and off sensors if they worked falsely, the inclusion of alert and etc.
  • Executive devices - their purpose to perform the specified work. This means - to submit a signal, make a dialing by salvation, activate other systems, for example, fire extinguishing or smoke removal.

Modern security and fire alarm means include complex electronic components, and they are often carried out by the computer, so they also include software.

Varieties of security and fire alarm systems

Varieties of ops B. currently It is also used quite a lot. According to the principle of operation, they can be divided into 3 main categories:

  • Non-educational (analog) security and fire alarm systems, today are used mainly in small objects, the signal when one sensor is triggered throughout the cable;
  • Address OPS allow you to determine the locations of the ignition or disturbance of the perimeter on communication protocols, there are surveys and non-questionnaires;
  • The combined OPS systems are the most common prices of funds and components due to the versatility.

Employees of Gefest Alarm LLC have extensive experience in the design and installation of systems and fire alarm systems, we can introduce and help to agree on any OPS solutions on the scale of the scale of objects. All necessary tolerances needed to conduct such works, we offer warranty and post-warranty service.

Send your good work in the knowledge base is simple. Use the form below

Students, graduate students, young scientists who use the knowledge base in their studies and work will be very grateful to you.

ESSAY

Subject:" Technical means of security and fire alarm"

Introduction

1. Technical means of security and fire alarm, their classification and purpose

1.1 Basic Terms and Definitions

1.2 Classification of technical means of signaling, security and security and fire detectors

2. Organization of protection of owners' objects with the help of security alarm system

3. Appointment, technical specifications, principle of operation of receiving and control devices

3.1 Appointment of receiving and control devices

3.2 Typical instruments of receiving and control, application conditions

Conclusion

Bibliography

Introduction

In this paper, we consider the characteristics of the technical means of security and security and fire alarms, allowed for use, and the technical means of fire alarm, recommended for use at present GU in the Ministry of Internal Affairs of Russia, as well as the technical means of protection of the most widely used previously used.

As well as consider the organization of the protection of objects of owners using security alarms on open areas, buildings, premises and individual items. We describe the organization of information about the alarm trigger. We list the types of receiving and control devices and the conditions of application.

1 Technical means of security and fire alarm, their classification and purpose

1.1 The main terms I.definitions

Security and Fire Alarm (OPS) - This is obtained, processing, transferring and presenting in a given form to consumers of information on the penetration of protected objects and fire on them using technical means. The consumer of information is the staff to which the response functions are entrusted to the alarming and official notices coming from protected objects.

Notice The technique of OPS is a message that causes information about controlled changes in the state of a protected object or the technical means of the OPS and transmitted by electromagnetic, electrical, light and (or) sound signals. Notifications are divided into anxious and service. Anxious notice contains information on penetration or fire, service - about "taking" under protection, "removal" with protection, malfunctions of equipment, etc.

Protected object (oo) A separate room containing material or other values, equipped with technical means of OPS, or a complex of premises dispersed within one or more buildings, united by a common territory and protected by security departments. The places of possible penetration on oo or individual protected areas are equipped with various detectors, which are included in the signaling loop.

Protected zone - This is a part of a protected object controlled by one plume of the OPS or a set of them.

Fire alarm complex - This is a combination of jointly active technical means of security, fire and (or) security and fire alarms installed on a protected facility and the combined system engineering networks and communications.

Detector security (fireman) - the technical means of the OPS for detecting the penetration (fire), an attempt to penetrate or physically exposure exceeding the normalized level, and the formation of the notice of penetration (fire). In the Security and Fire Detector combined security and fire functions.

Device receiving-control (PPK) - This is a technical means of security and fire alarm to receive notices from detectors (signaling loops) or other PPKs, signal conversion, issuing notifications for direct perception by man, further transmission of notifications and issuing commands to turn on the bisteners. To the exit of the PPK, depending on the protection system, which includes a complex of the OPS, another PPK can be connected (in the case of autonomous protection in the presence of an autonomous protection point) or the object device terminal (in the case of centralized protection).

Security and Fire Hanging - This is a hydraulic equipment of the OPS, designed to notify people about penetration, attempt to penetrate and (or) fire.

Autonomous Security System Consists of OPS complexes with outputs and (or) other PPKs installed at the autonomous protection point.

Autonomous Protection Point (PJSC) - This is an item located on a guarded facility or in close proximity to it, serviced by the service security service and equipped with technical means displaying information on penetration and (or) fire in each of the controlled facilities (zones) of the object for direct perception by man.

Notification System (SP) - This is a set of jointly existing technical means for transmission through communication channels and reception at the point of centralized protection of notices on the penetration of protected objects and (or) fire on them, service and control and diagnostic notices, as well as for transferring and receiving telecommunication commands (if available reverse channel).

Sleep provides for the installation of terminal devices (UN) on objects, repeaters (P) on the crossings of the PBX, in residential buildings and other intermediate items and consoles of centralized observation (PCN) in centralized security items.

UO, R, PCN are component parts Sleep The UN is installed on a guarded facility for receiving notifications from the PPK.

Point of centralized security (FOS) - This is a dispatching point of centralized protection of a number of dispersed objects from penetration and fire using sleep.

Depending on the characteristics of the OO (length, number of rooms, floors, etc.) and the magnitude of the material values \u200b\u200bplaced on the object, its protection can be implemented by one or more signaling loops. In that case, the structure of the protection of the object includes several loops placed in such a way that when the intruder is penetrated and moved to material values, it needs to overcome several protected areas controlled by various loops with outputs to individual PCN numbers, security should be considered as multi-residents . Thus, the loop or a set of loops that control the protected areas on the way of movement of the violator to the material values \u200b\u200bof OO and having access to a separate PCN number is called the line of alarm, and the aggregate of protected areas controlled by the line of alarm is the line of protection.

1.2 Classification of technical alarms, security and Security and Fire Detectors

Technical means of security and security and fire alarms, designed to obtain information on the status of controlled parameters on a protected object, reception, transformation, transmission, storage, displaying this information in the form of sound and light alarms, in accordance with the OST 25 829-78 is classified by two Signs: applications and functional purposes.
The scope of TCs is divided into security, firefighters and security fires; According to the functional purpose - on the technical detection tools (detectors), designed to obtain information on the status of controlled parameters and the TC alerts intended for receiving, transformation, transfers, storage, processing, and displaying information (sleep, PPK, and unscakers).

In accordance with GOST 26342-84, fire detectors are classified according to the following parameters.

For appointment: For closed rooms, for open areas and perimeters of objects.

By type of zone controlled by the detector: Point, linear, surface, volumetric.

According to the principle of operation, security detectors are divided into: ohmic, magnetocontact, shock-plane contact, piezoelectric, capacitive, ultrasound, optical-electronic, radio wave, combined.

By the number of discovery zones: Single-room, multi-zone.

For the range of ultrasound, optical-electronic and radio-wave security detectors for closed rooms are divided into: low-range - up to 12 m, medium range - from 12 to 30 m, large range - more than 30 m.

For the range of optical-electronic and radio-wave security detectors for open areas and perimeters of objects are divided into: low-range - up to 50 m, medium range - from 50 to 200 m, large range - over 200 m.

According to the constructive execution of ultrasound, optical-electronic and radio-wave security detectors are divided into: single-position transmitter (emitter) and the receiver are combined in one block (there can be several transmitters and receivers in one block); The two-position transmitter (emitter) and the receiver are made in the form of separate blocks; Multiposition - more than two blocks in any combination.

By the method of power supply are divided into: current consolidating (dry "contact); Food from SC, from an internal autonomous power supply, from an external source direct current 12-24 V voltage, from the AC power supply voltage of 220 V;

Security and Fire Detectors According to the principle of operation, they are divided into: magnetocontact, ultrasound and optical electronic. By the number of detection zones, range and constructive execution, fire detectors are classified similarly to security detectors.

2. Organizationprotection of objects of ownersusing security alarm

Protection of the perimeter of the territory and open areas

The technical means of security alarm perimeter can be placed on the fence, buildings, buildings, structures, or in the rejection zone. Security detectors should be installed on walls, special collisions or racks, ensuring the absence of oscillations, vibrations.

The perimeter, with incoming gates and gates, should be divided into separate protected areas (zones) with the connection of their individual signaling loops to small-scale PPKs or to the internal protection console mounted on the checkp or in a specially dedicated placement of the object protection. The length of the site is determined on the basis of the tactics of the protection, the technical characteristics of the equipment, the configuration of the external fence, the conditions of direct visibility and terrain, but not more than 200 m for the convenience of technical operation and response.

The main gates must be allocated to an independent section of the perimeter. Spare gates, wickets should enter that section of the perimeter on which they are located. The internal security consoles can be used by the PPK of the middle and large capacity (hubs), sleep, automated systems Transferring notices (aspi) and notification radio systems (RSPS). Internal security consoles can work both with directly round-the-clock personnel duty on them, and autonomously in the "self-selected" mode.

The installation of security detectors at the top of the fence should be made only if the fence has a height of at least 2 m.

On the checkpoint, in the premises of the guard should be installed technical devices Graphic display of the protected perimeter (computer, light scoreboard with a monscouch protected perimeter and other devices). All equipment included in the perimeter security alarm system should have an autopsy protection. Open areas With material values \u200b\u200bon the territory of the facility should have a warning fencing and equipped with volumetric, surface or linear detectors of various principles of operation.

Protection of buildings, premises, individual items. T.

Objects subgroups AI, AII and BII are equipped with a multi-section of the security alarm system, the objects of the subgroup of Bi - one-pass.

The first border of the security alarm, depending on the type of alleged threats to the object, block: Wooden entrance doors, loading and unloading hatches, gates - to "opening" and "destruction" ("break"); Glazed designs - on "opening" and "destruction" ("breaking") of glass; metal doors, the gate is on the "opening" and "destruction", walls, overlappings and partitions that do not meet the requirements of this guideline or commercially located the premises of other owners, allowing hidden work on the destruction of the wall - to "destruction" ("break"), shell warehouses - for "destruction" ("break") and "shock impact"; Lattices, blinds and other protective structures installed on the outside of the window opening - on "opening" and "destruction"; ventilation boxes, chimneys, input / output sites with a cross section of more than 200x200 mm - to "destruction" ("break");

Instead of blocking glazed structures on "destruction", walls, doors and gates on the "break" and "shock impact", allowed, in justified cases, to block the specified structures only on "penetration" with the help of volumetric, surface or linear detectors of various principles of operation . It should be borne in mind that the use of passive optical-electronic detectors in these purposes provides protection for premises only against direct intruder penetration.

If it is impossible to block the entrance doors of the openings (tambours) by technical means of early detection according to 5.6.5, it is necessary in doorway Between the main and additional door, install security detectors that detect the intruder penetration. These detectors should be included in one lock of the security alarm blocking of doors. To eliminate possible false positives when taking an object of protection, the specified signaling loop must be displayed on the PPK, which has a delay in taking an object of protection.

Detectors blocking input doors and unopened room windows should be included in different alarm loops, for the possibility of blocking windows during the daytime when the security alarm is turned off. Detectors blocking the input doors and the windows opened is allowed in one box of alarm.

The second frontier of the security alarm is protected by the volumes of premises for "penetration" with the help of volumetric detectors of various principles of operation. In large sizes with complex configuration, requiring the use of a large number of detectors to protect the entire volume, only local zones are allowed (tambura between doors, corridors, approaches to values \u200b\u200band other vulnerable places)

Separate objects, safes, metal cabinets, in which values \u200b\u200bfocus are blocked by the third frontier of the security alarm system. Installation facilities installed in buildings should fit into the interior of the room and, if possible, installed hidden or disguised.

In different overheads it is necessary to use security detectors working on various physical principles of action. The main types of detectors providing protection for the facility of the object and its structures from the intended method of criminal impact.

The number of security alarm loops should be determined by the protection tactics, the size of buildings, structures, structures, the floor, the number of vulnerable places, as well as the accuracy of localizing the place of penetration for operational response to the alarms.

The perimeter of the protected building, as a rule, should be divided into protected areas (facade, rear, sides of the building, central input and other areas) with allocating them into independent signaling loops and the issuance of separate signals on the PPK or the internal control panel of the object.

To enhance the protection and increasing its reliability at objects, additional detectors should be installed. Trap signals are displayed according to independent or, in the absence of a technical capabilities, according to the existing security alarm loops. Each room subgroups AI and AII should be equipped with independent security alarm loops. Premises subgroups BI and BII, enshrined at one materially responsible person, the owner or united by any other features should also be equipped with independent trails of security alarms, and, for ease of operation, one loop should be blocked by no more than five adjacent rooms located on one floor .

In rooms where staff should be, the security alarms must be equipped with separate areas of the perimeter of the room, as well as safes and metal cabinets for storing values \u200b\u200band documents.

Organization of the transmission of information about alarm operation.

The number of the security alarms that are displayed on PCS individual numbers is determined by the joint decision of the management of the object and the private security unit based on the object category, risk analysis and potential threats to the object, the possibilities of integration and documentation of the PPK (internal protection or terminal device) of the incoming information, and also Procedure for organizing home personnel duty at the facility.

The minimum quantity of the overseas alarm, derived from the entire protected object, must be for a subgroup.

BI - one combined frontier (first - perimeter);

AI, BII - two combined borders (first - perimeter and second - volume) *.

In addition, if there is at the facility of special premises (AII subgroup, safe, armory and other rooms, requiring increased protection measures), the conclusion is also referred to as the frontier of the security alarm of these premises.

If there is an internal security console with a round-the-clock duty of its own security service or a private security enterprise, it is displayed on a PC: one common signal that combines all the boundary of the security alarm system with the exception of the objects of special facilities of the object; Lightling alarm (perimeter and volume) of special premises. At the same time, the registration of all incoming information of each border of the protection of premises on the inner security console will be provided.

In the presence of an internal protection console with a round-the-clock duty of private security officers (micro-FOS), all the boundary of the security alarm system of all facilities (including special premises) are connected to the internal security console, providing automatic registration of all incoming information, and one is displayed from it. General signal on the PCO.

At objects where only special premises are protected, the conclusion on the PCO is subject to all boundary of the security alarm of these premises.

When protecting only individual devices (ATMs, slot machines, distribution cabinets and other similar devices) One-line of the security alarm system is displayed on the FOS (blocking to "destruction" and "opening").

In the absence of a technical ability to fulfill the requirements, the issues of the output of the burglar alarm are solved by a subdivision of private security in each particular case. Lubricated alarms should be displayed on a PPC from the internal protection console, the PPK or the terminal device that ensures the storage of the alarm state and fixing it on the remote light (sound) unbaggering or indicator. For the objects of the residential sector, it is allowed to use terminal devices and blocks of objects without the corresponding memorization of the alarm condition and its fixation.

Notifications from loops alarm alarm One combined signal is displayed on the FOS and / or in the duty of the internal affairs organs directly or through the PPK, the terminal device of the sleep, the duct of the internal protection.

The notifications of the security and alarm can be transmitted to the PCS on the specially paved communication lines, free or switchable for the period of protection of telephone lines, radio channel engaged in telephone lines using the sealing equipment or informative sleepers by means of a switchable telephone connection (automated transmission method) with mandatory channel control Between the protected object and the PCO. With the protected objects "Avtodozvon" should be carried out on two or more phone numbers.

To eliminate access of unauthorized persons to detectors, PPKs, branching boxes, the other protection installed at the facility should take measures to disguise them and the hidden installation. Cover terminal blocks of these devices must be sealing (sealed) by an OPS electrician or engineering worker of private security units indicating the name and dates in the technical documentation of the facility.

Distribution cabinets intended for crossing the signaling loops should be closed on the lock, be seated and have blocking (anti-sensible) buttons connected to the individual numbers of the internal protection of the "without a shutdown right", and in the absence of the internal protection remote control - on the POS as part of the alarm .

3 . On thevalue, specifications,principle Actions of receiving and control devices

3.1 Appointment of instrument and control devices

Device-control devices In security and fire alarm systems are an intermediate link between object primary penetration detection or fire detection (detectors) and notification systems. In addition, the PPKs can be used offline operation with connecting audio and light bonding on a protected object. Depending on the purpose of the PPCs are divided into security, security-fire, security-route, universal, programmable.

PPKs perform the following main functions:

Receiving and processing signals from detectors;

Nutrition of detectors (SC or separate line);

Monitoring the state of the SC;

Transmission of signals on the PCN;

Management of sound and light alarms;

Providing procedures for taking protection and removal of an object with protection.

The main characteristics of the PPC are information container and informative. PPK small information containers are intended, as a rule, to organize the protection of one room or a small object. Large capacitance PPKs can be used to combine the alarm of a large number of rooms or overhead protection of one object (hubs), as well as as a remote control for autonomous Systems Protection of objects. For certain types of facilities, there are also special types of PPKs, for example, to protect apartments, fire and explosive premises. According to the method of organizing communication with the detectors of PPKs, divided into wired and wireless (radio channels).

According to the climatic execution of PPKs are available for heated and not heated premises.

3 .2 Typical PPCs, Application TermsPPK small information container

"FROMignal-3 M.-one","FROMignal-3 1 » are the earliest developments and perform the simplest functions. The delivery of the object under protection is made in tactics "with open door"(There is no time delay in the input - output). There is no reservation of the power circuit.

Silent Devices receiving and control"Signal-37 A","FROMignal37m», "FROMignal-3 7th» Have the tactics of passing an object under the protection "with an open door". The redundancy of the power circuit is missing, but in the case of the disappearance of the power supply power supply, the PPK switches the SC into direct control from the PCN and back without issuing an anxiety.

"W.UC-1-1 " It has the tactics of the object to protect the "open door". The device provides for the reservation of the main nutrition chain, two exits on the PCN (normal-closed and normally open relay contacts). In SC, it is allowed to include security and fire-consuming detectors with a total consumption current of no more than 13 mA and current limit at no more than 20 mA.

Single Device Receiver"W.UC-M " It has the tactics of the object to protect the "open door". The device provides for the reservation of the main nutrition chain. In SC, it is allowed to include security transmissive detectors. The instrument provides a separate issuance of notifications on the Violation of SC and the deviation of its parameters from the established limits.

Silent Devices receiving and control"FROMignal-4 1 », "FROMignal41m» Designed to protect apartments. The delivery of an object under protection is made on the tactics "with a closed door" (there is a temporary delay in the input). The redundancy of the power circuit is missing, but in the case of the disappearance of the power supply power supply, the PPK switches the SC into direct control from the PCN and back without issuing an anxiety. In the device is provided: the security control of the SC, the indication of the progress, the control of the penetration into the guarded apartment.

Single Device Receiver"FROMignal-4 5 » Designed to protect apartments. The delivery of an object under protection is made in tactics "with a closed door". The reservation of the power circuit is missing, but in case of the disappearance of the power supply, the PPK switches the SC into direct control from the PCN and back without issuing an anxiety. In the device is provided: the control of the power of the SC; Indication of proceeding; Control of penetration into a guarded apartment.

The device has three modes of operation:

Centralized protection with shc switching to monitoring from the PCN when the supply voltage is disconnected. At the same time, two options for issuing alarm notification can be implemented - alarming notice is permanent permanently, the device is not restored to the standby mode independently of the state of the SC, the alarm notice is issued a limited time, the device is restored to the duty regime after 6 ± 4 s after the reduction of the SC;

Centralized protection without switching SC to control from the PCN when disconnecting the supply voltage. At the same time, both options for issuing anxiety notification are implemented;

Autonomous security (without connecting to PCN). In this case, there may be two options for issuing an alarm notification - alarming notice is permanent permanently, the device is not restored to the standby mode regardless of the state of the SC; Anxiety notice is issued for 3.5 minutes. Regardless of the state of the SC.

Single Device Receiver"FROMignal-VK» It has the tactics of the object to protect the "open door". The device provides: reservation of the main nutrition chain; Power supply active detectors to exit ± 12 V; setting the delay on the inclusion of a sound units (up to 30 seconds) after issuing an alarm notification; Alarm notices when turned on for 1 - 4 min. not fixed; Preserving performance while reducing the network and backup power supply, respectively, up to 140 V and up to 12 V; monitoring the state of the device on the built-in indicator when working from reserve source Nutrition. In SC, it is allowed to include security and fire-consuming detectors with a total consumption current of no more than 1.2 mA and current limit at no more than 20 mA.

Single Device Receiver"FROMignal-VK-R" Similar in its characteristics of the Signal-VK PPK. A distinctive feature Signal-VK-R PPK is the ability to control the device by radio channel (up to 30 m) using a transmitter keychain. At the same time, the device provides: remote taking protection and removal from the protection outside the protected object; Remote object transfer outside without autopsy; transmission using the alarm radio alarm to the device; Installation of the device in a hidden, inaccessible place.

"FROMignal-VK-four" Used to replace up to four monostellular instruments or organization at the object of multiser protection. The device has an additional input of the encryption connection or a remote switch for remote protection and disarming, it allows you to install the device in secretive unavailable places. The delivery of an object under protection is made both by tactics "with an open door" and in tactics "with a closed door". The device provides: reservation of the main nutrition chain; Ensuring the power supply of active detectors to output ± 12 V; Alarm notices when turned on for 14 minutes. not fixed; preservation of performance while reducing the power supply voltage up to 140 V; selection of input signal in duration; Tracking a slow change in the resistance of the SC and the fixation of the "Alarm" signal with the rapid change in the resistance of the SC; monitoring the state of the device in embedded indicators; Four independent exits on the PCN. In SC, it is allowed to include security and fire-consuming detectors with a total consumption current of no more than 1.2 mA and current limit at no more than 20 mA. When the jumpers installed "SC3" and "SC4", the device controls all four SC only in the "Protection" mode, when the jumpers removed - SC3 and SC4 are installed in the "without removal right" mode, i.e. Control of these SC and in the "Removal" mode.

Single Device Receiver"FROMignal-Sport» It has the tactics of the object to protect the "open door". The device provides: reservation of the main nutrition chain; Ensuring the power supply of active detectors to output ± 12 V; setting the delay on the inclusion of a sound units (up to 30 seconds) after issuing an alarm notification; Alarm notices when turned on for 14 minutes. not fixed; Preserving performance while reducing the network and backup power supply, respectively, up to 140 V and up to 12 V; monitoring the state of the device according to the built-in indicator, including when working from a backup power supply; Two goals on the PCN (normal-closed and normally open relay contacts). In SC, it is allowed to include security and fire-consuming detectors with a total current consumption current no more than 1.2 mA and current limiting at no more than 20 mA offline operation.

The device works in two modes: centralized protection (joint monitoring of the state of the SC PPK and SP); autonomous protection (monitoring the state of the SC is only PPK).

Five-stake device receiving and control"TOScrew» Used to replace up to five monostellular instruments or organization at the object of multiser protection. The delivery of an object under protection is made in tactics "with a closed door". The device provides: reservation of the main nutrition chain; In the event of the power supply and backup power supply, the PPK switches the SC1 and SC5 into direct control of the PCN and back without issuing an anxiety (the outputs of the PCN1 and PCN2, respectively); Alarm notifications when turned on for 1.52 min. not fixed; preservation of performance while reducing the power supply voltage up to 140 V; monitoring the state of the device for a remote indication board, including when working from a backup power source; two switched independent exits on the PCN; Indication of the object of protection; Installing the "without disabling" mode on Shs1, SC2 and SC5. SC is allowed to include security and fire-consuming detectors.

Four-sided device receiving and control"BUTChorce» Used to replace up to four single-shuffle devices or organizations at the object of multiser protection with variable work algorithms. The device has an optional input to connect the encryption or the remote switch. The delivery of an object under protection is made both by tactics "with an open door" and in tactics "with a closed door". In the device is provided: reservation of the main power circuit with the built-in battery voltage 12 V or external power supply voltage 12 V and 24 V; Ensuring the power supply of active detectors along two outputs ± 12 V, and one output is turned off; preservation of performance while reducing the power supply voltage to 160 V; CC monitor control over built-in indicators; two relay access to the PCN (normal-closed contact) and two high-frequency exits organized by the type of devices "Atlas-3" and "Atlas-6"; To transfer notices at busy telephone lines, memorizing SC violations. SC is allowed to include security and fire-consuming detectors. The device works in three modes: on duty ("removal") - control of alarm and fire secretion; "Protection" ("Take") - control of all SC; "Alarms".

Changing the algorithms for the operation of the device, the operation modes of the SC are set using the technological jumpers installed on the boards of the IPC, MPa and MIA.

Single Device Receiver"ANDnerval» Designed for technical control of service carrying through the personal protection of the object. The device provides: reservation of the main nutrition chain; including a built-in power supply (battery type 3336) to power the memory hours of operating hours and the number of passage of the route; Indication of the duration of work (up to 31 hours) and the number of passes of routes (up to 7); the ability to set the patrol time (15, 30, 45, 60 min) and pause time between patrolling (30, 60, 90, 120 min); relay access to the PCN; Transfer the alarm notification when you pass the route or with a three-fold press of any button "Mi" or the "Militia Call" button.

Installation of the PCP and BP is produced on the wall of the room, excluding the direct ingress of sunlight on the front panel. The distance between BP and the PCP should not exceed 10 m. Mi is installed in a convenient place.

PPK medium information container

Receiving-control device"Rkilled-3 " Designed to organize autonomous protection of large objects with the possibility of transmitting a generalized alarm signal to the PCN. The device consists of a 10-number base and 10-numbered line blocks that allow you to increase the container to 50 numbers. The PPK provides for main nutrition.

Receiving-control device"Rkilled-6 " Designed to organize autonomous protection of large objects with the possibility of transmitting generalized alarm signals, "Fire", "malfunction" on the PCN. Maximum amount of SC - 20. In the device is provided: main nutrition reservation; preservation of performance with a decrease in power supply voltage to 140; Mode "Self-screen" on the 20th SS with delivery under the tactics "with an open door"; diagnostic mode of both the device itself and SC; Indication of the taking of PPK under protection with PCN; Four outlets on the PCN, and three outputs for transmitting alarm notification and one to transmit the SC malfunction signal; Changes to the signal processing algorithm for each SC, and the SC can be grouped to various instrument outputs, set to "without disabling" mode (alarming and fire alarm). PPK has a modular design. In this case, modules controlling the SC (selection modules) are interchangeable.

Fireplace selection module"M.SP» Allows you to organize two fire alarm loops in the PPK "Rubin-6" with the possibility of connecting top-use fire detectors. The module "SME" is installed instead of any selection module "Rubin-6".

The maximum number of current-consuming fire detectors N for each loop is determined by the formula: N \u003d 5 / IP, where the COD is the current of the consumption of one detector in standby mode.

In Rubin-6 PPK, it is allowed to include up to five modules "SMEs".

Receiving-control device"Rkilled-8 P» Designed to organize autonomous protection of medium-sized objects with the possibility of transmitting a generalized alarm signal to the PCN. Maximum number of SC - 8, of which two firefighters and six security. The fire trains are allowed to include active current-consuming detectors, fire fighters can be transferred to security (cancellation of the "without removal right"). The device provides: main nutrition redundancy; Mode "Self-screen" on 8-μs with delivery under the protection of the "open door" tactics; diagnostic mode of both the device itself and SC; Indication of the taking of PPK under protection with PCN; One way out on the PCN.

Receiving-control device"Pulsar" Designed to organize autonomous protection of large objects with the possibility of transmitting a generalized alarm signal to the PCN. Maximum number of SC - 40. In the instrument provided: main nutrition reservation; preservation of performance with a decrease in power supply voltage to 140; Mode "Self-shrine" in 40 minutes with surrender to the tactics "with an open door"; diagnostic mode of both the device itself and SC; Indication of the taking of PPK under protection with PCN; Four outlets on the PCN, and three outputs for transmitting alarm notification and one to transmit the SC malfunction signal; Changes to the signal processing algorithm for each SC, and the SC can be grouped to various instrument outputs, set to "without a shutdown right » (alarming and fire alarm). PPK has a modular design. In this case, modules controlling the SC (selection modules) are interchangeable.

PPK large information container

Receiving-control device"Bug" Designed to organize autonomous protection of large objects (especially important). Maximum number of SC - 60. In the instrument provided: main nutrition reservation; automated delivery of objects under protection and removal with the help of a cipher; Automatic registration of messages about the status of objects and official information on a digital-printing device; antisabotant protection of the device blocks; Majoritarian signals processing logic; The decision on the correctness of the adopted information is fixed after threefold confirmation; diagnostic mode of both the device itself and SC; Five exits on the PCN; Software change of the signal processing algorithm for each SC, SC can be grouped into the protection zones with output to various PCN lines, set to "without disabling » (alarming and fire alarm); Software change of the input / exit delay time for each SC.

Maximum length The four-wire line of the connection with the diameter of the wire is 0.5 mm, depending on the number of objects connected to it: 150 m - 10 pcs., 300 m - 5 pcs., 600 m - 1 pc. Provided that the supply voltage at the last block of the object is not lower than 18 V, otherwise the additional four-wire laying is required. The Bug device consists of a signal processing unit and control (BOU), a digital-printing device (CPU) and up to 30 bo.

Receiving-control device"BUTdresses» Designed to organize autonomous protection of geographically concentrated objects on a two-wire line. Maximum number of SC - 96. In the instrument provided: main nutrition reservation; manual delivery of objects under protection and removal of protection; Automatic registration of messages about the status of objects and official information on a digital-printing device; antisabotant protection; The decision on the correctness of the adopted information is fixed after threefold confirmation; diagnostic mode; two exits on the PCN; Software change of the signal processing algorithm for each SC, SC can be grouped into the protection zone with output to various PCN lines, set to "without disabling" mode; non-polar inclusion of object blocks (Bo) in communication line; Two options of connecting Bo to communication line. According to the first version, it is allowed to connect up to 32 bo, on the second - to 96. In SC, it is allowed to include security and fire-consuming detectors with a total consumption current of no more than 0.5 mA. The maximum length of the two-wire line with the diameter of the wire is 0.5 mm, at 96 (32) BO connected to it is 200 m. The supply voltage on the last bo should be no below 24 V. Address "Address" consists of a control unit (bu), Power supply (BP), digital-printing device (CPU) and up to 96 bo.

Conclusion

Thus, we summarize, we arrive at the following conclusion - technical means of security and security and fire alarms, designed to obtain information about the status of controlled parameters on the protected object, reception, transformation, transmission, storage, mapping this information in the form of sound and light alarm, In accordance with GOST 25 829-78, it is classified for two features: applications and functional applications.

The technical means of the perimeter alarm must be chosen depending on the type of intended threat to the object, the interference, the terrain, the length of the perimeter, the length of the perimeter, such as the fence, the presence of roads along the perimeter, the rejection area, its width. The security alarm of the perimeter of the object is designed, as a rule, a one-pass. To enhance the protection, determining the direction of movement of the violator, the blocking of vulnerable places should be applied to multiser protection.

T.all rooms with permanent or temporary storage of material values, as well as all vulnerable areas of the building (windows, doors, hatches, ventilation mines, box, etc.), should be equipped with extension alarm.

The transfer of notifications on the operation of the security alarm from the object on the PCA can be carried out with the PPK of low capacity, the internal remote control or terminal device devices.

Bibliography

Resolution of the Council of Ministers of the Russian Federation №455 dated 03.09.91 "On Approval of the Rules of Application special Toolsconsisting in service with the Russian ATS. "

Order of the Ministry of Internal Affairs of the Russian Federation №170 - 1991 "On measures to fulfill the decision of the SM RF dated September 3, 2009" On approval of the rules for the application of special funds consisting of the Russian ATS ".

Technical descriptions and operating instructions SCEC, PCP, detectors.

Information and Technical Journal of Protection Technique, M., NIC "Protection" of VNIIIPI of the Ministry of Internal Affairs of Russia, 1994-1997.

Similar documents

    Composition and assignment of security and fire alarm systems. Threshold signaling systems with radial loops and with a modular structure. Classification of notification systems. Setting the receiving and control security and fire instrument "Code A-20".

    thesis, added 06/29/2011

    Overview of existing fire alarm systems. Characteristics of the practical application of fire detectors, a description of their design, self-solving sensors. Installation operations of the OPS system, the development of installation malfunctions.

    thesis, added 16.06.2012

    Installation and commissioning of the system of security and fire alarm and speech alert in the non-residential building of the shopping center. Specifications Digital combined passive infrared optical electronic detector with an acoustic sensor.

    course work, added 08/21/2015

    Select the structural and functional scheme of the object security and fire alarm system. Development of fire detector, modeling its nodes in Micro Cap package. Systemic analysis of the health and safety of the fire alarm system.

    thesis, added 01/27/2016

    Development of a modern security and fire alarm system. Integrated Orion Protection System. Digital address security and fire system "Gryk-2000". Designing OPS based on a system with analog loops, calculation of the cost of installation work.

    thesis, added 08.06.2013

    Objectives and tasks of fire automation when providing fire safety. Three components of the systems and their functions. Integration of security and fire alarm in one security and fire system. The choice of the estimated fire development scheme in the protective room.

    coursework, added 04/27/2009

    Familiarization with service center Officekhniki LLP "Montteko"; organization of office communication systems, access control; Selection and rationale for security and fire alarm schemes: threshold systems with radial loops, with a modular structure; Fire detectors.

    practice Report, added 01/18/2013

    Structure and Fire Alarm Functions. Receiving and control equipment, detectors. Management and alert functions. Peripheral devices: control panel, short circuit insulation module, connecting the non-personal line. Food devices.

    laboratory work, added 09/13/2013

    Protection system and technical means of objects (property). Types of detectors forming alarms and receiving and control instrument. Payment economic efficiency From the introduction of security alarms. Safety in operation.

    thesis, added 04/27/2009

    Modern systems Fire alarm. Autonomous and centralized protection of objects located in explosive areas. The device is an intrinsic electrical circuit. Centralized fire alert systems. Security alarm system.

To prevent unauthorized penetration and detection of foci of ignition at objects, install equipment for security and fire alarm, which is a whole range of special technical means. Thanks to the integration of this complex in the system of providing the life of the object, it is possible to form a multifunctional network that combines access, fire extinguishing systems and all kinds of engineering communications. This approach allows you to automate the process of operation and protect the object.

Functionality

When combining a fire and security system alarm, a multifunctional complex is obtained, which simultaneously protects the facility from the fire and identifies cases of unauthorized penetration.

The implementation of integration is carried out at the control and centralized monitoring level. All systems of the complex are used centrally, however, and are operated separately. Simply put, they are autonomous in the overall system.

Fire alarm performs the following functions:

  1. Timely detection of fire.
  2. Feed alarm to relevant services.
  3. Informing those at the facility of people about what happened.
  4. Ensuring safe evacuation.

Security alarm capabilities:

  1. Prevent unauthorized penetration.
  2. The organization of the access system (employees can only enter certain zones).
  3. Fixing the place and time of penetration.
  4. Determining the penetration method.

Fire alarm equipment

The list of used fire alarm devices depends on the functionality of the system and tasks that will be solved with its help.

Equipment used to ensure fire alarm can be divided into 5 categories:

♦ Equipment that allows you to perform centralized signaling management. This category includes a central computer with the necessary software. It is with its help that an alarm management is automated. The firebar can be used in cases where the fire alarm is required to install a simplified configuration.

♦ To track specific object zones, touch sensors are used. The essence of their work is to control certain parameters, in the case of which the immediate response occurs. This category includes all kinds of detectors and sensors.

♦ Executive equipment. It is necessary to activate the means of protection against fire or unauthorized penetration. These devices are responsible for transmitting alarm to appropriate services and alerts located at the facility of people about potential danger.

♦ Cable equipment. Used to connect all the above devices into a single complex. It is thanks to the wired equipment that the instruments are switched out, the transfer of control pulses and anxiety signals.

Appointment of fire alarm devices

The fire fighting system includes almost the same devices as security alarms. The difference lies only in the executive devices and sensors used. Below will be presented functionality Each single device.

Control panel

It is a small computer on which special software is installed. With it, it is managed by the work of each system device. The control panel allows you to configure the system and manage it. It also includes remote monitoring of the performance of all connected devices.

Receiving and control device

With this special device, data is collected from the signaling sensors, followed by their analysis. These modules are set separately or are part of the control panel. In systems with a simplified configuration, the receiving and control module can be used as a control panel.

Sensory

This category of devices includes detectors and sensors of various types that control the necessary parameters in the zone accountable. The sensor will work only if the value of one of these parameters will be released for the permissible boundaries.

Currently, a huge number of all kinds of sensors are presented on the market, which allow you to prevent people about the danger in a timely manner and use the receiving and control module to send the corresponding signal to the control panel.

There are several types of sensors used in automatic fire alarm:

  1. Smoke sensors. Assess the smallestness of the room arising in the case of fire.
  2. Heat sensors. Calculate changes in the temperature of the medium arising from the fire.
  3. Flame sensors. Feed a signal when open fire is detected.
  4. Gas sensors. It is triggered in the event of a change in the concentration of certain gas in the composition of the air.
  5. Manual sensors. Used the personnel of the object to include fire extinguishing system when fire is detected.
  6. Multisensory sensors. Their peculiarity lies in the fact that they are able to analyze at once 4 signs of fire.

All sensors used in fire alarm systems differ in the operating parameters (triggering speed, sensitivity, etc.). The sensor model should be selected based on the tasks that need to be solved on the object.

Types of sensors used in security alarm systems:

  1. Motion sensors. Determine the availability of movement on a certain territory.
  2. Sensors opening windows and doors. Allow to identify cases of opening windows or doors.
  3. Vibrating sensors. A signal will be fed if you have an arrangement attempts structural elements object, including walls.
  4. Acoustic sensors. Trigger when the glass is broken.

Also, security systems can be equipped with appliances that control the parameters of the object environment. These include water leakage control sensors, gas, increasing humidity and temperature.

Installation of equipment

It is very important to correctly perform an alarm installation. From this depends on the degree of protection of the object. To achieve the maximum level of protection, before starting the installation of the equipment, develop a configuration and plan of the security and fire system.

At this stage, the calculation of the required number of detectors is calculated and the places of their installation are determined. The engineer needs to take into account the speed of triggering the sensors, their sensitivity and the coating zone.

Sensors must be installed in such a way as to overlapping the sensitive zones of each other. This approach will eliminate the presence of "blind" zones. Simply put, under control there should be absolutely all protected area. It is also very important to avoid exposure to the sensors of external factors to which thermal and ultraviolet radiation include, as well as all sorts of mechanical loads.

Wired highways are used to connect to the fire and security alarm devices. Wireless appliances are used to facilitate the installation of the system. In this case, the signal to the central panel from the sensors will be transmitted not by wires, but using radio channels.

Upon completion, you need to make sure that all sensors, receiving and control equipment and the central panel are performed.

Training video on the installation of alarm.

Conclusion

If you want your guard and fire complex to work properly for many years and performed functions assigned to it, the installation of equipment should be entrusted to qualified specialists.

Today, its services for the preparation and implementation of security and fire alarm projects provide many companies. Some of them are additionally engaged and selling the necessary equipment, as well as maintenance and setting systems. Choose correctly necessary equipment And it is unmistakable to fulfill its installation for only a professional. Fire and security alarm is a pledge of the safety of the life and material values \u200b\u200bof the person.

The classification of security and fire systems by types and types can be made on a number of different parameters. The most obvious of them is an appointment. There are three large groups here:

Types of security alarm

As part of security systems can also be used different types Sensors that are wired and wireless are different in the penetration detection method, signal processing. The principles of building security systems may vary depending on their destination: for home and cottage, apartments, objects of various organizational and legal forms.

The elementary option is alarm consisting of one motion sensor with built-in GSM module. Despite the seeming simplicity, this type of protection is quite reliable and is well suited for the protection of small country houses.

In general, the security alarm system uses several types of detectors that are classified for the purpose and the principle of action. Controlling sensors are used to ensure reliable security:

  • opening windows and doors;
  • breaking glazed surfaces;
  • break of walls, partitions and overlaps.

The listed equipment serves to protect the perimeter of the room. In addition, there is a group of sensors that detects movement inside or on the approaches to the object. The choice of specific types of detectors is made taking into account the individual characteristics of the object to be protected.