Fire Safety Encyclopedia

Security and fire alarm systems. Purpose of the fire alarm system Alarm sensors are installed in this case in several levels

Send your good work in the knowledge base is simple. Use the form below

Students, graduate students, young scientists who use the knowledge base in their studies and work will be very grateful to you.

ESSAY

Theme:" Technical means of security and fire alarm systems"

Introduction

1. Technical means of security and fire alarm systems, their classification and purpose

1.1 Basic terms and definitions

1.2 Classification of technical means of signaling, security and security and fire detectors

2. Organization of protection of the owners' facilities with the help of burglar alarms

3. Purpose, technical characteristics, principle of operation of control and monitoring devices

3.1 Purpose of alarm control panels

3.2 Typical control panels, conditions of use

Conclusion

Bibliography

Introduction

In this paper, we will consider the characteristics of technical means of security and security and fire alarms, permitted for use, and technical means of fire alarms, recommended for use at the present time by the Main Directorate of Higher Education of the Ministry of Internal Affairs of Russia, as well as technical means of protection that were most widely used earlier.

And also we will consider the organization of the protection of the owners' facilities with the help of burglar alarms in open areas, buildings, premises and individual items. Let us describe the organization of the transmission of information about the alarm triggering. We list the types of control devices and conditions of use.

1 Technical means of security and fire alarm systems, their classification and purpose

1.1 Basic terms anddefinitions

Security and fire alarm (FSA)- this is the receipt, processing, transmission and presentation in a given form to consumers of information about penetration into protected objects and fire on them by means of technical means. The consumer of information is the personnel, who are entrusted with the functions of responding to alarms and service notices coming from guarded objects.

Notice in the FSA technique, a message is called that carries information about controlled changes in the state of a protected object or technical means of an FSA and is transmitted using electromagnetic, electrical, light and (or) sound signals. Notifications are divided into alarming and service notifications. An alarm message contains information about intrusion or fire, a service one - about “arming”, “disarming”, equipment malfunction, etc.

Protected object (GS) is called a separate room containing material or other values, equipped with technical means of the fire alarm, or a complex of premises dispersed within one or more buildings, united by a common territory and protected by security units. Places of possible penetration into the RO or separate protected areas are equipped with various detectors, which are included in the alarm loop.

Protected area- this is a part of the protected object controlled by one FSA loop or their combination.

Security and fire alarm complex- is a set of jointly operating technical means of security, fire and (or) security and fire alarms installed at a protected facility and united by a system of engineering networks and communications.

Security detector (fire)- OPS technical means for detecting intrusion (fire), attempted intrusion or physical impact exceeding the standardized level, and generating a notice of intrusion (fire). The security and fire detector combines security and fire functions.

Reception and control device (PPK) is a technical means of security and fire alarms for receiving notifications from detectors (alarm loops) or other control panels, converting signals, issuing notifications for direct human perception, further transmission of notifications and issuing commands to turn on sirens. Depending on the security system, which includes the FSA complex, another control panel (in the case of autonomous security in the presence of an autonomous security point) or an object terminal device (in the case of centralized security) can be connected to the output of the control panel.

Security and fire alarm is a technical means of an OPS designed to warn people about penetration, attempted penetration and (or) fire.

Autonomous security system consists of OPS complexes with access to sirens and (or) another control panel installed at the point of autonomous protection.

Autonomous security point (PAO)- this is a point located on a guarded object or in the immediate vicinity of it, serviced by the security service of the object and equipped with technical means of displaying information about penetration and (or) fire in each of the controlled rooms (zones) of the object for direct human perception.

Notification transmission system (SPI)- this is a set of jointly operating technical means for transmitting through communication channels and receiving at a centralized security point notifications about intrusion into guarded objects and (or) fire on them, service and control and diagnostic notifications, as well as for transmitting and receiving telecontrol commands (if available return channel).

The SPI provides for the installation of terminal devices (EO) at objects, repeaters (R) on cross-automatic telephone exchanges, in residential buildings and other intermediate points and centralized monitoring consoles (CMS) in centralized security points.

UO, R, PTSN are integral parts of the SPI. UO is installed at the protected facility to receive notifications from the control panel.

Centralized security point (ARC)- This is a control room for centralized protection of a number of dispersed objects from penetration and fire using SPI.

Depending on the characteristics of the OO (length, number of rooms, number of storeys, etc.) and the value of material assets located at the facility, its protection can be implemented through one or more alarm loops. In the event that the security structure of the facility includes several loops, placed in such a way that when an intruder enters the OO and moves to material values, he needs to overcome several protected zones controlled by different loops with exits to individual numbers of the monitoring station, the security should be considered as multi-line ... Thus, a loop or a set of loops that control protected areas on the path of the intruder to the material assets of the OO and have access to a separate monitoring station number is called an alarm border, and the set of protected zones controlled by the alarm border is a protection border.

1.2 Classification of technical means of signaling, security and security and fire detectors

Technical means of security and security and fire alarms, designed to obtain information about the state of monitored parameters at a guarded facility, receive, convert, transmit, store, display this information in the form of sound and light alarms, in accordance with OST 25 829-78 is classified into two features: field of application and functional purpose.
According to the field of application, vehicles are divided into security, fire and security and fire; by functional purpose - on technical means of detection (detectors), designed to obtain information about the state of monitored parameters and notification vehicles, intended for receiving, converting, transmitting, storing, processing and displaying information (SPI, PPK and annunciators).

In accordance with GOST 26342-84, security and fire detectors are classified according to the following parameters.

By appointment: for enclosed spaces, for open areas and perimeters of objects.

By the type of zone controlled by the detector: point, linear, surface, volumetric.

According to the principle of operation, security detectors are divided into: ohmic, magnetic contact, shock contact, piezoelectric, capacitive, ultrasonic, optoelectronic, radio wave, combined.

By the number of detection zones: single-zone, multi-zone.

According to the range of action, ultrasonic, optoelectronic and radio wave security detectors for closed rooms are divided into: short range - up to 12 m, medium range - from 12 to 30 m, long range - over 30 m.

By range, optoelectronic and radio wave security detectors for open areas and perimeters of objects are divided into: short range - up to 50 m, medium range - from 50 to 200 m, long range - over 200 m.

By design, ultrasonic, optoelectronic and radio wave security detectors are subdivided into: single-position transmitter (emitter) and receiver combined in one unit (there may be several transmitters and receivers in one unit); two-position transmitter (emitter) and receiver are made in the form of separate units; multi-position - more than two blocks in any combination.

According to the method of power supply, they are divided into: current-not consuming ("dry" contact is used); powered by a loop, from an internal autonomous power source, from an external direct current source with a voltage of 12-24 V, from an alternating current network with a voltage of 220 V;

Security and fire detectors according to the principle of operation, they are subdivided into: magnetic contact, ultrasonic and optoelectronic. By the number of detection zones, range and design, security and fire detectors are classified similarly to security detectors.

2. Organizationprotection of property ownerswith a burglar alarm

Protection of the perimeter of the territory and open areas

Perimeter security alarm technical means can be placed on fences, buildings, structures, structures or in the rejection zone. Security detectors should be installed on walls, special poles or racks, ensuring the absence of vibrations, vibrations.

The perimeter, with the gates and wickets entering into it, should be divided into separate protected areas (zones) with their connection by separate alarm loops to a small-capacity control panel or to an internal security panel installed at the checkpoint or in a specially designated security room of the facility. The length of the section is determined based on the tactics of security, technical characteristics of the equipment, configuration of the external fencing, line-of-sight conditions and terrain, but not more than 200 m for ease of technical operation and responsiveness.

The main gate should stand out as an independent section of the perimeter. Emergency gates, wickets must enter the section of the perimeter on which they are located. As internal security consoles can be used PPK medium and large capacity (concentrators), SPI, automated notification transmission systems (ASPI) and radio notification transmission systems (RSPI). Internal security consoles can operate both with direct round-the-clock duty of personnel on them, and autonomously in the "Self-protection" mode.

Installation of security detectors on top of the fence should only be done if the fence has a height of at least 2 m.

At the checkpoint, in the security room, technical devices for graphical display of the protected perimeter (computer, light board with a mnemonic diagram of the protected perimeter and other devices) should be installed. All equipment included in the perimeter burglar alarm system must be tamper-evident. Open areas with material values ​​on the territory of the facility should have a warning fence and be equipped with volumetric, surface or linear detectors of various operating principles.

Protection of a building, premises, individual items... T

Objects of subgroups AI, AII and BII are equipped with a multi-line security alarm system, objects of subgroup BI - single-line.

The first line of the security alarm, depending on the type of perceived threats to the object, is blocked: wooden entrance doors, loading and unloading hatches, gates - for "opening" and "destruction" ("break"); glazed structures - for "opening" and "destruction" ("breaking") of glass; metal doors, gates - for "opening" and "destruction", walls, ceilings and partitions that do not meet the requirements of this Guidance Document or behind which premises of other owners are located, allowing hidden work on the destruction of the wall - for "destruction" ("breach" ), shells of storage facilities - for "destruction" ("break") and "shock"; grilles, blinds and other protective structures installed on the outside of the window opening - for "opening" and "destruction"; ventilation ducts, chimneys, input / output points of communications with a cross section of more than 200x200 mm - for "destruction" ("break");

Instead of blocking glazed structures for "destruction", walls, doors and gates for "break" and "shock", it is allowed, in justified cases, to block these structures only for "penetration" using volumetric, surface or linear detectors of different operating principles ... It should be borne in mind that the use of passive optoelectronic detectors for these purposes ensures the protection of premises only from direct penetration of the intruder.

If it is impossible to block the entrance doors of the openings (vestibules) with the technical means of early detection according to clause 5.6.5, it is necessary to install security detectors in the doorway between the main and additional doors that detect the intruder. These detectors should be included in one door lock burglar alarm loop. To exclude possible false alarms when the object is armed, the indicated alarm loop must be displayed on the control panel, which has a delay in arming the object.

Detectors blocking entrance doors and unopened windows of premises should be included in different alarm loops in order to be able to block windows in the daytime when the burglar alarm of the doors is turned off. Detectors blocking entrance doors and opening windows are allowed to be included in one alarm loop.

The second line of the burglar alarm protects the volume of premises for "penetration" with the help of volumetric detectors of various operating principles. In large rooms with a complex configuration, requiring the use of a large number of detectors to protect the entire volume, it is allowed to block only local zones (vestibules between doors, corridors, approaches to valuables and other vulnerable places)

The third line of the burglar alarm in the premises blocks individual items, safes, metal cabinets, in which values ​​are concentrated. The technical security equipment installed in buildings should fit into the interior of the room and, if possible, be installed hidden or masked.

In different areas, it is necessary to use security detectors operating on different physical principles of action. The main types of detectors that ensure the protection of the premises of an object and its structures from the intended method of criminal influence.

The number of security alarm loops should be determined by the security tactics, the size of buildings, structures, structures, number of storeys, the number of vulnerabilities, as well as the accuracy of localizing the entry point for prompt response to alarms.

The perimeter of the protected building, as a rule, should be divided into protected zones (facade, rear, sides of the building, central entrance and other areas) with their separation into independent alarm loops and the issuance of separate signals to the control panel or the internal security console of the facility.

To enhance security and increase its reliability, additional detectors - traps should be installed at the facilities. Trap signals are output by independent or, in the absence of technical capability, by existing burglar alarm loops. Each room of subgroups AI and AII must be equipped with separate security alarm loops. Premises of subgroups BI and BII, assigned to one financially responsible person, the owner, or combined on some other grounds should also be equipped with independent security alarm loops, and, for ease of use, no more than five adjacent rooms located on the same floor should be blocked by one loop ...

In rooms where personnel must be around the clock, separate sections of the perimeter of the room, as well as safes and metal cabinets for storing valuables and documents, should be equipped with burglar alarms.

Organization of information transfer about alarm activation.

The number of security alarm lines displayed on the ARC by separate numbers is determined by a joint decision of the facility management and the private security unit based on the facility category, risk analysis and potential threats to the facility, the possibility of integrating and documenting the control panel (internal security console or terminal device) of the incoming information, as well as the procedure for organizing the duty of security personnel at the facility.

The minimum required number of security alarm lines displayed to the ARC from the entire protected facility should be for a subgroup.

BI - one united line (the first is the perimeter);

AI, BII - two united boundaries (the first is the perimeter and the second is the volume) *.

In addition, if there are special rooms at the facility (subgroup AII, safe rooms, weapon rooms and other rooms that require increased protection measures), the security alarm lines of these rooms are also subject to withdrawal to the ARC.

If there is an internal security console at the facility with a round-the-clock duty of its own security service or a private security company, the ARC displays: one common signal that unites all the lines of the facility's security alarm, with the exception of the lines of the special rooms of the facility; the boundaries of the security alarm system (perimeter and volume) of special premises. At the same time, registration of all incoming information from each line of protection of premises on the internal security console should be ensured.

If there is an internal security console at the facility with round-the-clock duty of non-departmental security personnel (Micro-ARC), all security alarm lines of all premises of the facility (including special rooms) are connected to the internal security console, which provides automatic registration of all incoming information, and one is displayed from it. common signal to ARC.

At facilities where only special premises are guarded, all security alarm lines of these premises are subject to output to the ARC.

When protecting only individual devices (ATMs, slot machines, distribution cabinets and other similar devices), one line of the security alarm is displayed on the ARC (blocking for "destruction" and "opening").

In the absence of the technical ability at the protected facility to fulfill the requirements, the issues of withdrawing the boundaries of the security alarm are decided by the non-departmental security unit in each specific case. The security alarm lines should be displayed to the ARC from the internal security console, control panel or terminal device, which ensures the memorization of the alarm state and its fixation on a remote light (sound) annunciator or indicator. For objects of the residential sector, it is allowed to use terminal devices and object blocks without corresponding memorization of the alarm state and its fixation.

Notifications from the alarm loops with one combined signal are output to the central monitoring station and / or to the duty station of the internal affairs bodies directly or through the control panel, the terminal device of the SPI, the internal security console.

Security and alarm notifications can be transmitted to the ARC via specially laid communication lines, free or switched telephone lines for the period of protection, radio channel, busy telephone lines using compaction equipment or informative SPIs by means of a dial-up telephone connection ("auto-dialing" method) with obligatory channel control between the protected object and the ARC. From guarded objects "auto-dialing" should be carried out by two or more telephone numbers.

To prevent unauthorized persons from accessing detectors, control panels, junction boxes, and other security equipment installed at the facility, measures should be taken to mask and hidden them. The covers of the terminal blocks of these devices must be sealed (sealed) by an OPS electrician or an engineer and technical employee of the non-departmental security unit, indicating the name and date in the technical documentation of the facility.

Distribution cabinets intended for crossing alarm loops must be locked, sealed and have interlocking (anti-tampering) buttons connected to individual numbers of the internal security console "without the right to disable", and in the absence of an internal security console, to the ARC as part of the alarm ...

3 ... Onvalue, specifications,principlecontrol panel actions

3.1 Purpose of control panels

Receiving and control devices in security and fire alarm systems are an intermediate link between object primary means of detecting intrusion or fire (detectors) and notification transmission systems. In addition, the control panel can be used in stand-alone mode with the connection of sound and light annunciators at the guarded facility. Depending on the purpose, PPKs are subdivided into security, security and fire, security and route, universal, programmable.

PPK perform the following main functions:

Receiving and processing signals from detectors;

Power supply of detectors (by AL or by a separate line);

Monitoring the state of the loop;

Transmission of signals to the monitoring station;

Management of sound and light annunciators;

Providing procedures for arming and disarming an object.

The main characteristics of the PPK are information capacity and information content. PPKs of small information capacity are intended, as a rule, to organize the protection of one room or a small object. Large-capacity PPKs can be used to combine signaling of a large number of premises or security lines of one object (concentrators), as well as as consoles for autonomous security systems of objects. For certain types of objects, there are also special types of control panels, for example, for the protection of apartments, fire and explosion hazardous premises. According to the method of communication with the detectors, the control panels are subdivided into wired and wireless (radio channel).

According to the climatic design, PPKs are produced for heated and unheated premises.

3 .2 Typical PPK, conditions of usePPK of small information capacity

"WITHignored-3 M-1","WITHignored-3 1 » are the earliest developments and perform the simplest functions. The object is handed over under protection according to the "open door" tactic (there is no time delay for entry - exit). There is no power supply redundancy.

Single-loop control devices"Signal-37 A","WITHignal37M», "WITHignored-3 7Yu» have the tactics of putting the object under protection "with an open door". There is no power supply redundancy, but in the event of a power failure, the control panel switches the AL to direct control from the monitoring station and back without generating an alarm.

"UOTS-1-1 " has the tactics of putting the object under protection "with an open door". The device provides redundancy for the main power supply circuit, two outputs to the monitoring station (normally closed and normally open relay contacts). In the AL, it is allowed to include security and fire current-consuming detectors with a total consumption current of no more than 13 mA and a current limitation at a level of no more than 20 mA.

Single-loop control panel"UOTS-M " has the tactics of putting the object under protection "with an open door". The device provides redundancy for the main power supply circuit. It is allowed to include security current-consuming detectors in the AL. The device provides for separate issuance to the monitoring station of notifications about loop violation and about deviation of its parameters from the established limits.

Single-loop control devices"WITHignored-4 1 », "WITHignal41M» intended for the protection of apartments. The object is handed over under protection according to the "closed door" tactic (there is a time delay for entry and exit). There is no power supply redundancy, but in the event of a power failure, the control panel switches the AL to direct control from the monitoring station and back without generating an alarm. The device provides for: monitoring the operability of the loop, indication of arming, control of entry into the guarded apartment.

Single-loop control panel"WITHignored-4 5 » intended for the protection of apartments. The object is handed over under the protection of the "closed door" tactic. There is no power supply redundancy, but in the event of a power failure, the control panel switches the AL to direct control from the monitoring station and back without generating an alarm. The device provides: control of the loop operability; indication of arming; control of entry into a guarded apartment.

The device has three operating modes:

Centralized security with AL switching over to monitoring by the monitoring station when the supply voltage is cut off. In this case, two options for issuing an alarm notification by the device can be implemented - the alarm notification is issued constantly, the device does not restore to standby mode regardless of the state of the alarm loop, the alarm notification is issued for a limited time, the device is restored to standby mode in 6 ± 4 s after the alarm loop is restored;

Centralized security without switching the loop to monitoring by the monitoring station when the supply voltage is cut off. In this case, both options for issuing an alarm are implemented;

Autonomous security (without connection to the monitoring station). In this case, there can be two options for issuing an alarm notification - an alarm notification is issued constantly, the device is not restored to standby mode, regardless of the state of the alarm loop; alarm notification is issued within 3.5 minutes. regardless of the state of the loop.

Single-loop control panel"WITHignal-VK» has the tactics of putting the object under protection "with an open door". The device provides for: redundancy of the main power supply circuit; providing power supply to active detectors at the ± 12 V output; setting a delay for turning on the sounder (up to 30 s) after issuing an alarm; alarm notifications when turned on within 1 - 4 minutes. are not recorded; preservation of operability while reducing the mains and backup supply voltage, respectively, to 140 V and to 12 V; control of the device status using the built-in indicator when operating from a backup power source. In the AL, it is allowed to include security and fire current-consuming detectors with a total consumption current of no more than 1.2 mA and a current limitation at a level of no more than 20 mA.

Single-loop control panel"WITHignal-VK-R" is similar in its characteristics to PPK "Signal-VK". A distinctive feature of the PPK "Signal-VK-R" is the ability to control the device via a radio channel (up to 30 m) using a remote control. At the same time, the device provides: remote arming and disarming from outside the guarded object; remote re-picking of an object from the outside without opening; transmission of an alarm signal to the device using a remote control; installation of the device in a hidden, inaccessible place.

"WITHignal-VK-4" It is used to replace up to four single-loop devices or to organize at a multi-border protection facility. The device has an additional input for connecting a cipher device or a remote switch for remote arming and disarming, which also allows the device to be installed in hidden inaccessible places. The object is handed over under protection both according to the "open door" and "closed door" tactics. The device provides for: redundancy of the main power supply circuit; providing power supply to active detectors at the ± 12 V output; alarm notifications when turned on within 14 minutes. are not recorded; preservation of efficiency when the mains supply voltage drops to 140 V; selection of the input signal by duration; tracking a slow change in the loop resistance and fixing the "Alarm" signal in case of a fast change in the loop resistance; control of the device status using built-in indicators; four independent outputs to the monitoring station. It is allowed to include security and fire current-consuming detectors in the AL with a total consumption current of no more than 1.2 mA and a current limitation at a level of no more than 20 mA. With the jumpers "ШС3" and "ШС4" installed, the device controls all four ALs only in the "Guard" mode; control of these ALs in the “Disarmed” mode.

Single-loop control panel"WITHignal-SPI» has the tactics of putting the object under protection "with an open door". The device provides for: redundancy of the main power supply circuit; providing power supply to active detectors at the ± 12 V output; setting a delay for turning on the sounder (up to 30 s) after issuing an alarm; alarm notifications when turned on within 14 minutes. are not recorded; preservation of operability while reducing the mains and backup supply voltage, respectively, to 140 V and to 12 V; control of the device status using the built-in indicator, including when operating from a backup power source; two outputs to the monitoring station (normally closed and normally open relay contacts). It is allowed to include security and fire current-consuming detectors in the AL with a total consumption current of no more than 1.2 mA and a current limitation at a level of no more than 20 mA in stand-alone mode.

The device operates in two modes: centralized protection (joint control of the state of the alarm system of the PPK and SPI); autonomous protection (control of the state of the alarm loop only for the control panel).

Five-loop control panel"TOSCREW» It is used to replace up to five single-loop devices or to organize at a multi-border protection facility. The object is handed over under the protection of the "closed door" tactic. The device provides for: redundancy of the main power supply circuit; in case of loss of mains and backup power, the control panel switches AL1 and AL5 to direct monitoring of the monitoring station and vice versa without generating an alarm (outputs from monitoring station1 and monitoring station2, respectively); alarm notifications when turned on within 1.52 min. are not recorded; preservation of performance when the mains supply voltage drops to 140 V; control of the device status using a remote indication board, including when operating from a backup power source; two switched independent outputs to the monitoring station; indication of arming the object; setting the mode "without the right to shutdown" for ШС1, ШС2 and ШС5. It is allowed to include security and fire current-consuming detectors in the AL.

Four-loop control panel"AKKORD» It is used to replace up to four single-loop devices or to organize multi-border protection at a facility with variable algorithms of work. The device has an additional input for connecting a cipher device or a remote switch. The object is handed over under protection both according to the "open door" and "closed door" tactics. The device provides for: backup of the main power supply circuit using a built-in 12 V battery or external 12 V and 24 V power supplies; providing power supply to active detectors via two outputs of ± 12 V, one output being switched off; preservation of performance when the mains supply voltage drops to 160 V; control of the state of the loop by built-in indicators; two relay outputs to the monitoring station (normally closed contact) and two high-frequency outputs organized as devices "Atlas-3" and "Atlas-6"; for the transmission of notifications on busy telephone lines, storage of loop violations. It is allowed to include security and fire current-consuming detectors in the AL. The device operates in three modes: duty ("Disarming") - control of alarming and fire alarm loops; "Protection" ("Arming") - control of all AL; "Alarms".

Changes in the operation algorithms of the device, AL operation modes are set using technological jumpers installed on the MPK, MPA and MVU boards.

Single-loop control panel"ANDinterval» designed for technical control of the performance of service by the security personnel of the facility. The device provides for: redundancy of the main power supply circuit; including a built-in power supply (battery type 3336) for powering the memory of the operating hours and the number of route skips; indication of the duration of work (up to 31 hours) and the number of route skips (up to 7); the ability to set the patrol time (15, 30, 45, 60 min) and the pause time between patrols (30, 60, 90, 120 min); relay output to the monitoring station; transmission of an alarm message when the route is skipped or when any button "MI" or the button "Call police" is pressed three times.

The control panel and power supply unit are installed on the wall of the room, excluding direct sunlight on the front panel. The distance between the power supply unit and the control panel should not exceed 10 m. The MI is installed in a place convenient for operation.

PPK of medium information capacity

Control device"Rubin-3 " is intended for the organization of autonomous protection of large objects with the possibility of transmitting a generalized alarm signal to the monitoring station. The device consists of a 10-numbered base unit and 10-numbered linear units, allowing the capacity to be expanded up to 50 numbers. The control panel provides for redundancy of the main power supply.

Control device"Rubin-6 " is intended for the organization of autonomous protection of large objects with the ability to transmit generalized signals "Alarm", "Fire", "Malfunction" to the monitoring station. The maximum number of alarm loops is 20. The device provides: backup of the main power supply; preservation of performance when the mains supply voltage drops to 140; "self-protection" mode on the 20th loop with the surrender under protection according to the tactics "with an open door"; diagnostic mode for both the device itself and the loop; indication of arming the control panel from the monitoring station; four outputs to the monitoring station, three outputs for transmitting alarm notifications and one for transmitting a signal about an alarm loop; changes in the signal processing algorithm for each loop, and the loop can be grouped into different outputs of the device, set to the "without the right to shutdown" mode (alarm and fire alarm). PPK has a modular design. At the same time, the modules that control the AL (selection modules) are interchangeable.

Firefighter selection module"MJoint venture» allows organizing two fire alarm loops in the Rubin-6 PPK with the ability to connect current-consuming fire detectors. The MSP module is installed instead of any Rubin-6 selection module.

The maximum number of current-consuming fire detectors N for each loop is determined by the formula: N = 5 / Ip, where Ip is the current consumption of one detector in standby mode.

In PPK "Rubin-6" it is allowed to include up to five modules "MSP".

Control device"Rubin-8 NS» is intended for the organization of autonomous protection of medium-sized objects with the possibility of transmitting a generalized alarm signal to the monitoring station. The maximum number of loops is 8, including two firefighters and six security ones. It is allowed to include active current-consuming detectors in fire loops, fire loops can be transferred to security loops (cancellation of the "without the right to remove" mode). The device provides for: redundancy of the main power supply; "self-protection" mode on the 8th AL with the delivery under protection according to the tactics "with an open door"; diagnostic mode for both the device itself and the loop; indication of arming the control panel from the monitoring station; one exit to the monitoring station.

Control device"Pulsar" is intended for the organization of autonomous protection of large objects with the ability to transmit a generalized alarm signal to the monitoring station. The maximum number of alarm loops is 40. The device provides for: redundancy of the main power supply; preservation of performance when the mains supply voltage drops to 140; "self-protection" mode on the 40th AL with the delivery under protection according to the tactics "with an open door"; diagnostic mode for both the device itself and the loop; indication of arming the control panel from the monitoring station; four outputs to the monitoring station, three outputs for transmitting alarm notifications and one for transmitting a signal about an alarm loop failure; changes in the signal processing algorithm for each loop, and the loop can be grouped into different outputs of the device, set in the mode "without the right to disable » (alarm and fire alarm). PPK has a modular design. At the same time, the modules that control the AL (selection modules) are interchangeable.

PPK large information capacity

Control device"BUG" is intended for the organization of autonomous protection of large objects (especially important). The maximum number of alarm loops is 60. The device provides for: redundancy of the main power supply; automated delivery of objects under protection and disarming using a cipher device; automatic registration of messages about the state of objects and service information on a digital printing device; anti-tampering protection of the device blocks; majority logic of signal processing; the decision on the correctness of the information received is recorded after three times confirmation; diagnostic mode for both the device itself and the loop; five outputs to the monitoring station; software change of the signal processing algorithm for each alarm loop, alarm loops can be grouped into security zones with access to various monitoring station lines, set to the mode "without the right to disable » (alarm and fire alarm); programmed change of the delay time for entry / exit for each loop.

The maximum length of a four-wire communication line with a wire diameter of 0.5 mm, depending on the number of object units connected to it: 150 m - 10 pcs., 300 m - 5 pcs., 600 m - 1 pc. Provided that the supply voltage on the last unit of the object is not lower than 18 V, otherwise it is required to lay an additional four-wire line. The "BUG" device consists of a signal processing and control unit (BOU), a digital printing device (CPU) and up to 30 BOs.

Control device"Adres» is intended for the organization of autonomous protection of territorially concentrated objects via a two-wire communication line. The maximum number of alarm loops is 96. The device provides for: redundancy of the main power supply; manual delivery of objects under protection and disarming; automatic registration of messages about the state of objects and service information on a digital printing device; anti-sabotage protection; the decision on the correctness of the information received is recorded after three times confirmation; diagnostic mode; two outputs to the monitoring station; software change of the signal processing algorithm for each alarm loop, alarm loops can be grouped into security zones with access to various monitoring station lines, set in the "without the right to disconnect" mode; non-polar connection of object units (OB) to the communication line; two options for connecting the BO to the communication line. According to the first option, it is allowed to connect up to 32 BOs to the communication line, according to the second - up to 96. It is allowed to include security and fire current-consuming detectors in the AL with a total consumption current of no more than 0.5 mA. The maximum length of a two-wire communication line with a wire diameter of 0.5 mm, with 96 (32) BOs connected to it is 200 m. The supply voltage at the last BO must be at least 24 V. The "Address" device consists of a control unit (CU), power supply unit (PSU), digital printing device (CPU) and up to 96 BOs.

Conclusion

Thus, to summarize, we come to the following conclusion - technical means of security and burglar-fire alarms, designed to obtain information about the state of monitored parameters at a guarded facility, receive, convert, transmit, store, display this information in the form of sound and light alarms, in accordance with GOST 25 829-78 it is classified according to two criteria: scope and functional purpose.

Technical means of perimeter burglar alarms should be selected depending on the type of perceived threat to the object, interference, terrain, length and technical strength of the perimeter, type of fencing, availability of roads along the perimeter, rejection zone, and its width. The security alarm system of the perimeter of the object is designed, as a rule, single-line. To strengthen security, determine the direction of movement of the intruder, blocking vulnerable spots, multi-line security should be used.

T All rooms with permanent or temporary storage of material values, as well as all vulnerable areas of the building (windows, doors, hatches, ventilation shafts, ducts, etc.), through which unauthorized entry into the premises of the facility is possible, should be equipped with technical means of security alarms.

The transmission of notifications about the activation of the burglar alarm from the facility to the ARC can be carried out from a small-capacity control panel, an internal security console, or terminal devices.

Bibliography

Resolution of the Council of Ministers of the Russian Federation No. 455 of 03.09.91 "On the approval of the rules for the use of special means in service with the ATS of the Russian Federation."

Order of the Ministry of Internal Affairs of the Russian Federation No. 170 - 1991 "On Measures to Implement the Resolution of the Council of Ministers of the Russian Federation of 03.09.91" On Approval of the Rules for the Use of Special Means Used by the ATS of the Russian Federation ".

Technical descriptions and operating instructions for the monitoring station, control panel, detectors.

Information and technical journal "Security Technique", M., Scientific Research Center "Security" VNIIIPO of the Ministry of Internal Affairs of Russia, 1994-1997.

Similar documents

    The composition and purpose of security and fire alarm systems. Threshold alarm systems with radial loops and modular structure. Classification of notification transmission systems. Configuring the KODOS A-20 control and monitoring security and fire device.

    thesis, added 06/29/2011

    Review of existing security and fire alarm systems. Characteristics of the practical application of fire detectors, a description of their design, independent sensor solutions. Commissioning of the fire alarm system, study of installation faults.

    thesis, added 06/16/2012

    Installation and commissioning of a fire alarm and voice alarm system in a non-residential building of a shopping center. Technical characteristics of the digital combined passive infrared optical-electronic detector with an acoustic sensor.

    term paper added 08/21/2015

    The choice of the structural and functional diagram of the security and fire alarm system of the facility. Development of a fire detector, modeling of its nodes in the Micro Cap package. System analysis of the performance and safety of the fire alarm system.

    thesis, added 01/27/2016

    Development of a modern security and fire alarm system. Integrated security system "Orion". Digital addressable security and fire system "Grif-2000". Designing a fire alarm system based on a system with analog loops, calculating the cost of installation work.

    thesis, added 06/08/2013

    Goals and objectives of fire automation in ensuring fire safety. Three components of the system and their functions. Integration of security and fire alarms into a single security and fire system. The choice of the calculation scheme for the development of a fire in the protected room.

    term paper, added 04/27/2009

    Acquaintance with the service center of office equipment LLP "Monteko"; organization of office communication systems, access control; selection and justification of the security and fire alarm scheme: threshold systems with radial loops, with a modular structure; fire detectors.

    practice report, added 01/18/2013

    The structure and functions of the security and fire alarm system. Reception and control equipment, detectors. Management and notification functions. Peripheral devices: control panel, short circuit isolation module, conventional line connections. Power supply of devices.

    laboratory work, added 09/13/2013

    Security system and technical means of objects (property). Types of detectors that generate alarms and a control panel. Calculation of economic efficiency from the introduction of security alarms. Safety precautions during operation.

    thesis, added 04/27/2009

    Modern fire alarm systems. Autonomous and centralized security of objects located in hazardous areas. Intrinsically safe electrical circuit device. Centralized fire warning systems. Security alarm system.

The classification of security and fire systems by types and types can be made according to a number of different parameters. The most obvious of these is purpose. There are three large groups here:

ALARM TYPES

As part of security systems, various types of sensors can also be used, which are wired and wireless, differ in the method of intrusion detection, signal processing. The principles of building security systems may differ depending on their purpose: for a house and a summer residence, an apartment, objects of various organizational and legal forms.

An elementary option is an alarm system consisting of one motion sensor with a built-in GSM module. Despite the seeming simplicity, this type of security is quite reliable and well suited for the protection of small country houses.

In general, the security alarm system uses several types of detectors, which are classified according to their purpose and principle of operation. To ensure reliable protection, sensors are used that control:

  • opening windows and doors;
  • breaking glazed surfaces;
  • break of walls, partitions and ceilings.

The listed equipment serves to protect the perimeter of the premises. In addition, there is a group of sensors that detect movement inside or on the approaches to the object. The choice of specific types of detectors is made taking into account the individual characteristics of the object to be protected.

ESSAY

Topic: "Technical means of security and fire alarm systems"

Introduction

1. Technical means of security and fire alarm systems, their classification and purpose

1.1 Basic terms and definitions

1.2 Classification of technical means of signaling, security and security and fire detectors

2.Organization of the protection of the owners' facilities with the help of burglar alarms

3.Appointment, technical characteristics, principle of operation of control and monitoring devices

3.1 Purpose of alarm control panels

3.2 Typical control panels, conditions of use

Conclusion

Bibliography

Introduction

In this paper, we will consider the characteristics of technical means of security and security and fire alarms, permitted for use, and technical means of fire alarms, recommended for use at the present time by the Main Directorate of Higher Education of the Ministry of Internal Affairs of Russia, as well as technical means of protection that were most widely used earlier.

And also we will consider the organization of the protection of the owners' facilities with the help of burglar alarms in open areas, buildings, premises and individual items. Let us describe the organization of the transmission of information about the alarm triggering. We list the types of control devices and conditions of use.

1 Technical means of security and fire alarm systems, their classification and purpose

1.1 Basic terms and definitions

Security and fire alarm (FSA)- this is the receipt, processing, transmission and presentation in a given form to consumers of information about penetration into protected objects and fire on them by means of technical means. The consumer of information is the personnel, who are entrusted with the functions of responding to alarms and service notices coming from guarded objects.

Notice in the FSA technique, a message is called that carries information about controlled changes in the state of a protected object or technical means of an FSA and is transmitted using electromagnetic, electrical, light and (or) sound signals. Notifications are divided into alarming and service notifications. An alarm message contains information about intrusion or fire, a service one - about “arming”, “disarming”, equipment malfunction, etc.

Protected object (GS) is called a separate room containing material or other values, equipped with technical means of the fire alarm, or a complex of premises dispersed within one or more buildings, united by a common territory and protected by security units. Places of possible penetration into the RO or separate protected areas are equipped with various detectors, which are included in the alarm loop.

Protected area- this is a part of the protected object controlled by one FSA loop or their combination.

Security and fire alarm complex Is a set of jointly operating technical means of security, fire and (or) security and fire alarms installed at a protected facility and united by a system of engineering networks and communications.

Security detector (fire)- OPS technical means for detecting intrusion (fire), attempted intrusion or physical impact exceeding the standardized level, and generating a notice of intrusion (fire). The security and fire detector combines security and fire functions.

Reception and control device (PPK)- this is a technical means of security and fire alarm for receiving notifications from detectors (alarm loops) or other control panels, converting signals, issuing notifications for direct human perception, further transmission of notifications and issuing commands to turn on sirens. Depending on the security system, which includes the FSA complex, another control panel (in the case of autonomous security in the presence of an autonomous security point) or an object terminal device (in the case of centralized security) can be connected to the output of the control panel.

Security and fire alarm Is a technical means of an OPS designed to warn people about penetration, attempted penetration and (or) fire.

Autonomous security system consists of OPS complexes with access to sirens and (or) another control panel installed at the point of autonomous protection.

Autonomous security point (PAO)- this is a point located on a guarded object or in the immediate vicinity of it, serviced by the security service of the object and equipped with technical means of displaying information about penetration and (or) fire in each of the controlled rooms (zones) of the object for direct human perception.

Notification transmission system (SPI)- this is a set of jointly operating technical means for transmitting through communication channels and receiving at a centralized security point notifications about intrusion into guarded objects and (or) fire on them, service and control and diagnostic notifications, as well as for transmitting and receiving telecontrol commands (if available return channel).

The SPI provides for the installation of terminal devices (EO) at objects, repeaters (R) on cross-automatic telephone exchanges, in residential buildings and other intermediate points and centralized monitoring consoles (CMS) in centralized security points.

UO, R, PTSN are integral parts of the SPI. UO is installed at the protected facility to receive notifications from the control panel.

Centralized security point (ARC)- This is a control room for centralized protection of a number of dispersed objects from penetration and fire using SPI.

Depending on the characteristics of the OO (length, number of rooms, number of storeys, etc.) and the value of material assets located at the facility, its protection can be implemented through one or more alarm loops. In the event that the security structure of the facility includes several loops, placed in such a way that when an intruder enters the OO and moves to material values, he needs to overcome several protected zones controlled by different loops with exits to individual numbers of the monitoring station, the security should be considered as multi-line ... Thus, a loop or a set of loops that control protected areas on the path of the intruder to the material assets of the OO and have access to a separate monitoring station number is called an alarm border, and the set of protected zones controlled by the alarm border is a protection border.


1.2 Classification of technical means of signaling, security and security and fire detectors

Technical means of security and security and fire alarms, designed to obtain information about the state of monitored parameters at a guarded object, receive, convert, transmit, store, display this information in the form of sound and light alarms, in accordance with OST 25 829–78 are classified into two features: field of application and functional purpose.
According to the field of application, vehicles are divided into security, fire and security and fire; by functional purpose - to technical means of detection (detectors), designed to obtain information about the state of monitored parameters and notification vehicles, intended for receiving, converting, transmitting, storing, processing and displaying information (SPI, PPK and sirens).

In accordance with GOST 26342–84, security and fire detectors are classified according to the following parameters.

By appointment: for enclosed spaces, for open areas and perimeters of objects.

By the type of zone controlled by the detector: point, linear, surface, volumetric.

According to the principle of operation, security detectors are divided into: ohmic, magnetic contact, shock contact, piezoelectric, capacitive, ultrasonic, optoelectronic, radio wave, combined.

By the number of detection zones: single-zone, multi-zone.

According to the range of action, ultrasonic, optical-electronic and radio wave security detectors for closed rooms are divided into: short-range - up to 12 m, medium-range - from 12 to 30 m, long-range - over 30 m.

By range, optoelectronic and radio wave security detectors for open areas and perimeters of objects are divided into: short range - up to 50 m, medium range - from 50 to 200 m, long range - over 200 m.

By design, ultrasonic, optoelectronic and radio wave security detectors are subdivided into: single-position transmitter (emitter) and receiver combined in one unit (there may be several transmitters and receivers in one unit); two-position transmitter (emitter) and receiver are made in the form of separate units; multi-position - more than two blocks in any combination.

According to the method of power supply, they are divided into: current-not consuming ("dry" contact is used); powered by an AL, from an internal autonomous power source, from an external DC source with a voltage of 12-24 V, from an AC mains with a voltage of 220 V;

Security and fire detectors according to the principle of operation, they are subdivided into: magnetic contact, ultrasonic and optoelectronic. By the number of detection zones, range and design, security and fire detectors are classified similarly to security detectors.

2. Organization of protection of the owners' facilities with the help of burglar alarms

Protection of the perimeter of the territory and open areas

Perimeter security alarm technical means can be placed on fences, buildings, structures, structures or in the rejection zone. Security detectors should be installed on walls, special poles or racks, ensuring the absence of vibrations, vibrations.

The perimeter, with the gates and wickets entering into it, should be divided into separate protected areas (zones) with their connection by separate alarm loops to a small-capacity control panel or to an internal security panel installed at the checkpoint or in a specially designated security room of the facility. The length of the section is determined based on the tactics of security, technical characteristics of the equipment, configuration of the external fencing, line-of-sight conditions and terrain, but not more than 200 m for ease of technical operation and responsiveness.

The main gate should stand out as an independent section of the perimeter. Emergency gates, wickets must enter the section of the perimeter on which they are located. As internal security consoles can be used PPK medium and large capacity (concentrators), SPI, automated notification transmission systems (ASPI) and radio notification transmission systems (RSPI). Internal security consoles can operate both with direct round-the-clock duty of personnel on them, and autonomously in the "Self-protection" mode.

Installation of security detectors on top of the fence should only be done if the fence has a height of at least 2 m.

At the checkpoint, in the security room, technical devices for graphical display of the protected perimeter (computer, light board with a mnemonic diagram of the protected perimeter and other devices) should be installed. All equipment included in the perimeter burglar alarm system must be tamper-evident. Open areas with material values ​​on the territory of the facility should have a warning fence and be equipped with volumetric, surface or linear detectors of various operating principles.

Protection of the building, premises, individual items. T

Objects of subgroups AI, AII and BII are equipped with a multi-line security alarm system, objects of subgroup BI - single-line.

The first line of the security alarm, depending on the type of perceived threats to the object, is blocked: wooden entrance doors, loading and unloading hatches, gates - for "opening" and "destruction" ("break"); glazed structures - for "opening" and "destruction" ("breaking") of glass; metal doors, gates - for "opening" and "destruction", walls, ceilings and partitions that do not meet the requirements of this Guidance Document or behind which premises of other owners are located, allowing hidden work on the destruction of the wall - for "destruction" ("breach" ), shells of storage facilities - for "destruction" ("break") and "shock"; grilles, blinds and other protective structures installed on the outside of the window opening - for "opening" and "destruction"; ventilation ducts, chimneys, input / output points of communications with a cross section of more than 200x200 mm - for "destruction" ("break");

Instead of blocking glazed structures for "destruction", walls, doors and gates for "break" and "shock", it is allowed, in justified cases, to block these structures only for "penetration" using volumetric, surface or linear detectors of different operating principles ... It should be borne in mind that the use of passive optoelectronic detectors for these purposes ensures the protection of premises only from direct penetration of the intruder.

If it is impossible to block the entrance doors of the openings (vestibules) with the technical means of early detection according to clause 5.6.5, it is necessary to install security detectors in the doorway between the main and additional doors that detect the intruder. These detectors should be included in one door lock burglar alarm loop. To exclude possible false alarms when the object is armed, the indicated alarm loop must be displayed on the control panel, which has a delay in arming the object.

Detectors blocking entrance doors and unopened windows of premises should be included in different alarm loops in order to be able to block windows in the daytime when the burglar alarm of the doors is turned off. Detectors blocking entrance doors and opening windows are allowed to be included in one alarm loop.

The second line of the burglar alarm protects the volume of premises for "penetration" with the help of volumetric detectors of various operating principles. In large rooms with a complex configuration, requiring the use of a large number of detectors to protect the entire volume, it is allowed to block only local zones (vestibules between doors, corridors, approaches to valuables and other vulnerable places)

The third line of the burglar alarm in the premises blocks individual items, safes, metal cabinets, in which values ​​are concentrated. The technical security equipment installed in buildings should fit into the interior of the room and, if possible, be installed hidden or masked.

In different areas, it is necessary to use security detectors operating on different physical principles of action. The main types of detectors that ensure the protection of the premises of an object and its structures from the intended method of criminal influence.

The number of security alarm loops should be determined by the security tactics, the size of buildings, structures, structures, number of storeys, the number of vulnerabilities, as well as the accuracy of localizing the entry point for prompt response to alarms.

The perimeter of the protected building, as a rule, should be divided into protected zones (facade, rear, sides of the building, central entrance and other areas) with their separation into independent alarm loops and the issuance of separate signals to the control panel or the internal security console of the facility.

To strengthen security and increase its reliability, additional detectors - traps should be installed at the facilities. Trap signals are output by independent or, in the absence of technical capability, by existing burglar alarm loops. Each room of subgroups AI and AII must be equipped with separate security alarm loops. Premises of subgroups BI and BII, assigned to one financially responsible person, the owner, or combined on some other grounds should also be equipped with independent security alarm loops, and, for ease of use, no more than five adjacent rooms located on the same floor should be blocked by one loop ...

In rooms where personnel must be around the clock, separate sections of the perimeter of the room, as well as safes and metal cabinets for storing valuables and documents, should be equipped with burglar alarms.

Organization of information transfer about alarm activation. The transmission of notifications about the activation of the burglar alarm from the facility to the ARC can be carried out from a small-capacity control panel, an internal security console, or terminal devices.

The number of security alarm lines displayed on the ARC by separate numbers is determined by a joint decision of the facility management and the private security unit based on the facility category, risk analysis and potential threats to the facility, the possibility of integrating and documenting the control panel (internal security console or terminal device) of the incoming information, as well as the procedure for organizing the duty of security personnel at the facility.

The minimum required number of security alarm lines displayed to the ARC from the entire protected facility should be for a subgroup.

BI - one united line (the first is the perimeter);

AI, BII - two united boundaries (the first is the perimeter and the second is the volume) *.

In addition, if there are special rooms at the facility (subgroup AII, safe rooms, weapon rooms and other rooms that require increased protection measures), the security alarm lines of these rooms are also subject to withdrawal to the ARC.

If there is an internal security console at the facility with a round-the-clock duty of its own security service or a private security company, the ARC displays: one common signal that unites all the lines of the facility's security alarm, with the exception of the lines of the special rooms of the facility; the boundaries of the security alarm system (perimeter and volume) of special premises. At the same time, registration of all incoming information from each line of protection of premises on the internal security console should be ensured.

If there is an internal security console at the facility with round-the-clock duty of non-departmental security personnel (Micro-ARC), all security alarm lines of all premises of the facility (including special rooms) are connected to the internal security console, which provides automatic registration of all incoming information, and one is displayed from it. common signal to ARC.

At facilities where only special premises are guarded, all security alarm lines of these premises are subject to output to the ARC.

When protecting only individual devices (ATMs, slot machines, distribution cabinets and other similar devices), one line of the security alarm is displayed on the ARC (blocking for "destruction" and "opening").

In the absence of the technical ability at the protected facility to fulfill the requirements, the issues of withdrawing the boundaries of the security alarm are decided by the non-departmental security unit in each specific case. The security alarm lines should be displayed to the ARC from the internal security console, control panel or terminal device, which ensures the memorization of the alarm state and its fixation on a remote light (sound) annunciator or indicator. For objects of the residential sector, it is allowed to use terminal devices and object blocks without corresponding memorization of the alarm state and its fixation.

Notifications from the alarm loops with one combined signal are output to the central monitoring station and / or to the duty station of the internal affairs bodies directly or through the control panel, the terminal device of the SPI, the internal security console.

Security and alarm notifications can be transmitted to the ARC via specially laid communication lines, free or switched telephone lines for the period of protection, radio channel, busy telephone lines using compaction equipment or informative SPIs by means of a dial-up telephone connection ("auto-dialing" method) with obligatory channel control between the protected object and the ARC. From guarded objects "auto-dialing" should be carried out by two or more telephone numbers.

To prevent unauthorized persons from accessing detectors, control panels, junction boxes, and other security equipment installed at the facility, measures should be taken to mask and hidden them. The covers of the terminal blocks of these devices must be sealed (sealed) by an OPS electrician or an engineer and technical employee of the non-departmental security unit, indicating the name and date in the technical documentation of the facility.

Distribution cabinets intended for crossing alarm loops must be locked, sealed and have interlocking (anti-tampering) buttons connected to individual numbers of the internal security console "without the right to disable", and in the absence of an internal security console, to the ARC as part of the alarm ...


3. Purpose, technical characteristics, principle of operation of control and monitoring devices

3.1 Purpose of control panels

Receiving and control devices in security and fire alarm systems are an intermediate link between object primary means of detecting intrusion or fire (detectors) and notification transmission systems. In addition, the control panel can be used in stand-alone mode with the connection of sound and light annunciators at the guarded facility. Depending on the purpose, PPKs are subdivided into security, security and fire, security and route, universal, programmable.

PPK perform the following main functions:

- reception and processing of signals from detectors;

- power supply of detectors (by AL or by a separate line);

- monitoring of the state of the loop;

- transmission of signals to the monitoring station;

- control of sound and light annunciators;

- provision of procedures for arming and disarming an object.

The main characteristics of the PPK are information capacity and information content. PPKs of small information capacity are intended, as a rule, to organize the protection of one room or a small object. Large-capacity PPKs can be used to combine signaling of a large number of premises or security lines of one object (concentrators), as well as as consoles for autonomous security systems of objects. For certain types of objects, there are also special types of control panels, for example, for the protection of apartments, fire and explosion hazardous premises. According to the method of communication with the detectors, the control panels are subdivided into wired and wireless (radio channel).

According to the climatic design, PPKs are produced for heated and unheated premises.

3.2 Typical control panels, conditions of use PPK of small information capacity

Single-loop control devices "Signal-3M-1", "Signal-31" are the earliest developments and perform the simplest functions. The object is handed over under protection according to the "open door" tactic (there is no time delay for entry - exit). There is no power supply redundancy.

Single-loop control devices "Signal-37A", "Signal37M", "Signal-37Yu" have the tactics of putting the object under protection "with an open door". There is no power supply redundancy, but in the event of a power failure, the control panel switches the AL to direct control from the monitoring station and back without generating an alarm.

Single-loop control panel "UOTS-1-1" has the tactics of putting the object under protection "with an open door". The device provides redundancy for the main power supply circuit, two outputs to the monitoring station (normally closed and normally open relay contacts). In the AL, it is allowed to include security and fire current-consuming detectors with a total consumption current of no more than 13 mA and a current limitation at a level of no more than 20 mA.

Single-loop control panel "UOTS-M" has the tactics of putting the object under protection "with an open door". The device provides redundancy for the main power supply circuit. It is allowed to include security current-consuming detectors in the AL. The device provides for separate issuance to the monitoring station of notifications about loop violation and about deviation of its parameters from the established limits.

Single-loop control devices "Signal-41", "Signal41M" intended for the protection of apartments. The object is handed over under protection according to the "closed door" tactic (there is a time delay for entry and exit). There is no power supply redundancy, but in the event of a power failure, the control panel switches the AL to direct control from the monitoring station and back without generating an alarm. The device provides for: monitoring the operability of the loop, indication of arming, control of entry into the guarded apartment.

Single-loop control panel "Signal-45" intended for the protection of apartments. The object is handed over under the protection of the "closed door" tactic. There is no power supply redundancy, but in the event of a power failure, the control panel switches the AL to direct control from the monitoring station and back without generating an alarm. The device provides: control of the loop operability; indication of arming; control of entry into a guarded apartment.

The device has three operating modes:

- centralized security with switching the alarm loop to monitoring by the monitoring station when the supply voltage is cut off. In this case, two options for issuing an alarm notification by the device can be implemented - the alarm notification is issued constantly, the device does not restore to standby mode regardless of the state of the alarm loop, the alarm notification is issued for a limited time, the device is restored to standby mode in 6 ± 4 s after the alarm loop is restored;

- centralized security without switching the loop to monitoring by the monitoring station when the supply voltage is cut off. In this case, both options for issuing an alarm are implemented;

- autonomous protection (without connection to the monitoring station). In this case, there can be two options for issuing an alarm notification - an alarm notification is issued constantly, the device does not return to standby mode, regardless of the state of the alarm loop; alarm notification is issued within 3.5 minutes. regardless of the state of the loop.

Single-loop control panel "Signal-VK" has the tactics of putting the object under protection "with an open door". The device provides for: redundancy of the main power supply circuit; providing power supply to active detectors at the ± 12 V output; setting a delay for turning on the sounder (up to 30 s) after issuing an alarm; alarm notifications when turned on within 1 - 4 minutes. are not recorded; preservation of operability while reducing the mains and backup supply voltage, respectively, to 140 V and to 12 V; control of the device status using the built-in indicator when operating from a backup power source. It is allowed to include security and fire current-consuming detectors in the AL with a total consumption current of no more than 1.2 mA and a current limitation at a level of no more than 20 mA.

Single-loop control panel "Signal-VK-R" is similar in its characteristics to PPK "Signal-VK". A distinctive feature of the PPK "Signal-VK-R" is the ability to control the device via a radio channel (up to 30 m) using a remote control. At the same time, the device provides: remote arming and disarming from outside the guarded object; remote re-picking of an object from the outside without opening; transmission of an alarm signal to the device using a remote control; installation of the device in a hidden, inaccessible place.

Four-loop control panel "Signal-VK-4" It is used to replace up to four single-loop devices or to organize at a multi-border protection facility. The device has an additional input for connecting a cipher device or a remote switch for remote arming and disarming, which also allows the device to be installed in hidden inaccessible places. The object is handed over under protection both according to the "open door" and "closed door" tactics. The device provides for: redundancy of the main power supply circuit; providing power supply to active detectors at the ± 12 V output; alarm notifications when turned on within 14 minutes. are not recorded; preservation of efficiency when the mains supply voltage drops to 140 V; selection of the input signal by duration; tracking a slow change in the loop resistance and fixing the "Alarm" signal in case of a fast change in the loop resistance; control of the device status using built-in indicators; four independent outputs to the monitoring station. It is allowed to include security and fire current-consuming detectors in the AL with a total consumption current of no more than 1.2 mA and a current limitation at a level of no more than 20 mA. With the jumpers "ShS3" and "ShS4" installed, the device controls all four alarm loops only in the "Guard" mode; control of these ALs in the “Disarmed” mode.

Single-loop control device "Signal-SPI" has the tactics of putting the object under protection "with an open door". The device provides for: redundancy of the main power supply circuit; providing power supply to active detectors at the ± 12 V output; setting a delay for turning on the sounder (up to 30 s) after issuing an alarm; alarm notifications when turned on within 14 minutes. are not recorded; preservation of operability while reducing the mains and backup supply voltage, respectively, to 140 V and to 12 V; control of the device status using the built-in indicator, including when operating from a backup power source; two outputs to the monitoring station (normally closed and normally open relay contacts). It is allowed to include security and fire current-consuming detectors in the AL with a total consumption current of no more than 1.2 mA and a current limitation at a level of no more than 20 mA in stand-alone mode.

The device operates in two modes: centralized protection (joint control of the state of the alarm system of the PPK and SPI); autonomous protection (control of the state of the alarm loop only for the control panel).

Five-loop control panel "KVINT" It is used to replace up to five single-loop devices or to organize at a multi-border protection facility. The object is handed over under the protection of the "closed door" tactic. The device provides for: redundancy of the main power supply circuit; in case of loss of mains and backup power, the control panel switches AL1 and AL5 to direct monitoring of the monitoring station and vice versa without generating an alarm (outputs from monitoring station1 and monitoring station2, respectively); alarm notifications when turned on within 1.52 min. are not recorded; preservation of efficiency when the mains supply voltage drops to 140 V; control of the device status using a remote indication board, including when operating from a backup power source; two switched independent outputs to the monitoring station; indication of arming the object; setting the mode "without the right to shutdown" for ШС1, ШС2 and ШС5. It is allowed to include security and fire current-consuming detectors in the AL.

Four-loop control panel "AKKORD" It is used to replace up to four single-loop devices or to organize multi-border protection at a facility with variable algorithms of work. The device has an additional input for connecting a cipher device or a remote switch. The object is handed over under protection both according to the "open door" and "closed door" tactics. The device provides for: backup of the main power supply circuit using a built-in 12 V battery or external 12 V and 24 V power supplies; providing power supply to active detectors via two outputs of ± 12 V, one output being switched off; preservation of performance when the mains supply voltage drops to 160 V; control of the state of the loop by built-in indicators; two relay outputs to the monitoring station (normally closed contact) and two high-frequency outputs organized as devices "Atlas-3" and "Atlas-6"; for the transmission of notifications on busy telephone lines, storage of loop violations. It is allowed to include security and fire current-consuming detectors in the AL. The device operates in three modes: duty ("Disarming") - control of alarming and fire alarm loops; "Protection" ("Arming") - control of all AL; "Alarms".

Changes in the operation algorithms of the device, AL operation modes are set using technological jumpers installed on the MPK, MPA and MVU boards.

Single-loop control panel "Interval" designed for technical control of the performance of service by the security personnel of the facility. The device provides for: redundancy of the main power supply circuit; including a built-in power supply (battery type 3336) for powering the memory of the operating hours and the number of route skips; indication of the duration of work (up to 31 hours) and the number of route skips (up to 7); the ability to set the patrol time (15, 30, 45, 60 min) and the pause time between patrols (30, 60, 90, 120 min); relay output to the monitoring station; transmission of an alarm message when the route is skipped or when any button "MI" or the button "Call police" is pressed three times.

The control panel and power supply unit are installed on the wall of the room, excluding direct sunlight on the front panel. The distance between the power supply unit and the control panel should not exceed 10 m. The MI is installed in a place convenient for operation.

PPK of medium information capacity

Receiving and control device "Rubin-3" is intended for the organization of autonomous protection of large objects with the ability to transmit a generalized alarm signal to the monitoring station. The device consists of a 10-numbered base unit and 10-numbered linear units, allowing the capacity to be expanded up to 50 numbers. The control panel provides for redundancy of the main power supply.

Receiving and control device "Rubin-6" is intended for the organization of autonomous protection of large objects with the ability to transmit generalized signals "Alarm", "Fire", "Malfunction" to the monitoring station. The maximum number of alarm loops is 20. The device provides for: redundancy of the main power supply; preservation of performance when the mains supply voltage drops to 140; "self-protection" mode on the 20th loop with the surrender under protection according to the tactics "with an open door"; diagnostic mode for both the device itself and the loop; indication of arming the control panel from the monitoring station; four outputs to the monitoring station, three outputs for transmitting alarm notifications and one for transmitting a signal about an alarm loop failure; changes in the signal processing algorithm for each loop, and the loop can be grouped into different outputs of the device, set to the "without the right to shutdown" mode (alarm and fire alarm). PPK has a modular design. At the same time, the modules that control the AL (selection modules) are interchangeable.

Fire selection module "MSP" allows organizing two fire alarm loops in the Rubin-6 PPK with the ability to connect current-consuming fire detectors. The MSP module is installed instead of any Rubin-6 selection module.

The maximum number of current-consuming fire detectors N for each loop is determined by the formula: N = 5 / Iп, where Iп is the current consumption of one detector in standby mode.

In PPK "Rubin-6" it is allowed to include up to five modules "MSP".

Receiving and control device "Rubin-8P" is intended for the organization of autonomous protection of medium-sized objects with the possibility of transmitting a generalized alarm signal to the monitoring station. The maximum number of loops is 8, including two firefighters and six security ones. It is allowed to include active current-consuming detectors in fire loops, fire loops can be transferred to security loops (cancellation of the "without the right to remove" mode). The device provides for: redundancy of the main power supply; "self-protection" mode on the 8th AL with the delivery under protection according to the tactics "with an open door"; diagnostic mode for both the device itself and the loop; indication of arming the control panel from the monitoring station; one exit to the monitoring station.

Receiving and control device "Pulsar" is intended for the organization of autonomous protection of large objects with the ability to transmit a generalized alarm signal to the monitoring station. The maximum number of alarm loops is 40. The device provides for: redundancy of the main power supply; preservation of performance when the mains supply voltage drops to 140; "self-protection" mode on the 40th AL with the delivery under protection according to the tactics "with an open door"; diagnostic mode for both the device itself and the loop; indication of arming the control panel from the monitoring station; four outputs to the monitoring station, three outputs for transmitting alarm notifications and one for transmitting a signal about an alarm loop failure; changes in the signal processing algorithm for each loop, and the loop can be grouped into different outputs of the device, set in the mode "without the right to disable » (alarm and fire alarm). PPK has a modular design. At the same time, the modules that control the AL (selection modules) are interchangeable.

PPK large information capacity

Receiving and control device "BUG" is intended for the organization of autonomous protection of large objects (especially important). The maximum number of alarm loops is 60. The device provides for: redundancy of the main power supply; automated delivery of objects under protection and disarming using a cipher device; automatic registration of messages about the state of objects and service information on a digital printing device; anti-tampering protection of the device blocks; majority logic of signal processing; the decision on the correctness of the information received is recorded after three times confirmation; diagnostic mode for both the device itself and the loop; five outputs to the monitoring station; software change of the signal processing algorithm for each alarm loop, alarm loops can be grouped into security zones with access to various monitoring station lines, set to the mode "without the right to disable » (alarm and fire alarm); programmed change of the delay time for entry / exit for each loop.

The maximum length of a four-wire communication line with a wire diameter of 0.5 mm, depending on the number of object units connected to it: 150 m - 10 pcs., 300 m - 5 pcs., 600 m - 1 pc. Provided that the supply voltage on the last unit of the object is not lower than 18 V, otherwise it is required to lay an additional four-wire line. The "BUG" device consists of a signal processing and control unit (BOU), a digital printing device (CPU) and up to 30 BOs.

Control panel "Address" is intended for the organization of autonomous protection of territorially concentrated objects via a two-wire communication line. The maximum number of alarm loops is 96. The device provides for: redundancy of the main power supply; manual delivery of objects under protection and disarming; automatic registration of messages about the state of objects and service information on a digital printing device; anti-sabotage protection; the decision on the correctness of the information received is recorded after three times confirmation; diagnostic mode; two outputs to the monitoring station; software change of the signal processing algorithm for each alarm loop, alarm loops can be grouped into security zones with access to various monitoring station lines, set in the "without the right to disconnect" mode; non-polar connection of object units (OB) to the communication line; two options for connecting the BO to the communication line. According to the first option, it is allowed to connect up to 32 BOs to the communication line, according to the second - up to 96. It is allowed to include security and fire current-consuming detectors in the AL with a total consumption current of no more than 0.5 mA. The maximum length of a two-wire communication line with a wire diameter of 0.5 mm, with 96 (32) BOs connected to it is 200 m. The supply voltage at the last BO must be at least 24 V. The "Address" device consists of a control unit (CU), power supply unit (PSU), digital printing device (CPU) and up to 96 BOs.


Conclusion

Thus, to summarize, we come to the following conclusion - technical means of security and burglar-fire alarms, designed to obtain information about the state of monitored parameters at a guarded facility, receive, convert, transmit, store, display this information in the form of sound and light alarms, in accordance with GOST 25 829–78 it is classified according to two criteria: scope and functional purpose.

Technical means of perimeter burglar alarms should be selected depending on the type of perceived threat to the object, interference, terrain, length and technical strength of the perimeter, type of fencing, availability of roads along the perimeter, rejection zone, and its width. The security alarm system of the perimeter of the object is designed, as a rule, single-line. To strengthen security, determine the direction of movement of the intruder, blocking vulnerable spots, multi-line security should be used.

T All rooms with permanent or temporary storage of material values, as well as all vulnerable areas of the building (windows, doors, hatches, ventilation shafts, ducts, etc.), through which unauthorized entry into the premises of the facility is possible, should be equipped with technical means of security alarms.

The transmission of notifications about the activation of the burglar alarm from the facility to the ARC can be carried out from a small-capacity control panel, an internal security console, or terminal devices.


Bibliography

1. Resolution of the Council of Ministers of the Russian Federation No. 455 of 03.09.91 "On the approval of the rules for the use of special equipment in service with the ATS of the Russian Federation."

2. Order of the Ministry of Internal Affairs of the Russian Federation No. 170 - 1991 "On Measures to Implement the Resolution of the Council of Ministers of the Russian Federation of 03.09.91" On Approval of the Rules for the Use of Special Means Used by the ATS of the Russian Federation ".

3. Technical descriptions and operating instructions for the monitoring station, control panel, detectors.

4. Information and technical journal "Security Technique", M., Scientific Research Center "Security" VNIIIPO of the Ministry of Internal Affairs of Russia, 1994-1997.

Security and fire alarm systems (FSA) in one form or another are used today in almost all objects. This is because using electronics is ultimately always more beneficial than using security guards.

Security and fire alarm systems are designed to detect the fact of unauthorized entry into a guarded object or the appearance of signs of fire, to issue an alarm and turn on executive devices (light and sound alarms, relays, etc.). Security and fire alarm systems are very close to each other in terms of the ideology of construction, and at small objects, as a rule, they are combined on the basis of a single control unit - a receiving and control device (PPK) or a control panel (CP). In general, these systems include:

  • detection equipment (detectors);
  • technical means for collecting and processing information (receiving and controlling devices, notification transmission systems, etc.);
  • technical means of notification (sound and light annunciators, modems, etc.).

Detection technology

Detection technology- these are detectors built on various physical principles of action. A detector is a device that generates a certain signal when one or another monitored environmental parameter changes. According to the field of application, the detectors are divided into security, security and fire and fire. Currently, security and fire detectors are practically not produced and are not used. Security detectors according to the type of controlled area are divided into point, linear, surface and volumetric. According to the principle of action - on electrical contact, magnetic contact, shock contact, piezoelectric, optoelectronic, capacitive, sound, ultrasonic, radio wave, combined, combined, etc.

Fire detectors are divided into manual and automatic detectors. Automatic fire detectors are subdivided into heat detectors that respond to an increase in temperature, smoke detectors that respond to the appearance of smoke, and flame that respond to optical radiation from an open flame.

Security detectors

Electrical contact detectors- the simplest type of security detectors. They are a thin metal conductor (foil, wire), specially fixed on a protected object or structure. Designed to protect building structures (glass, doors, hatches, gates, non-capital partitions, walls, etc.) from unauthorized penetration through them by destruction.

Magnetic contact (contact) detectors designed to block various building structures from opening (doors, windows, hatches, gates, etc.). The magnetic contact detector consists of a sealed magnetically controlled contact (reed switch) and a magnet in a plastic or metal non-magnetic housing. The magnet is installed on the movable (opening) part of the building structure (door leaf, window sash, etc.), and the magnetically controlled contact is installed on the stationary one (door frame, window frame, etc.). To block large opening structures (sliding and swing gates) with significant backlash, electrical contact detectors such as travel limit switches are used.

Shock detectors They are designed to block various glazed structures (windows, showcases, stained-glass windows, etc.) for breaking, The detectors consist of a signal processing unit (BFB) and from 5 to 15 glass break sensors (DRS). The location of the component parts of the detectors (BFB and DRS) is determined by the number, relative position and area of ​​the blocked glass sheets.

Piezoelectric detectors designed to block building structures (walls, floors, ceilings, etc.) and individual items (safes, metal cabinets, ATMs, etc.) for destruction. When determining the number of detectors of this type and the place of their installation on the protected structure, it is necessary to take into account that it is possible to use them with 100% or 75% coverage of the blocked area. The area of ​​each unprotected area of ​​the blocked surface should not exceed 0.1 m 2.

Optoelectronic detectors are subdivided into active and passive. Active optoelectronic detectors generate an alarm notification when the reflected flow (single-position detectors) changes or the received flow (two-position detectors) stops (changes) of infrared energy caused by the movement of the intruder in the detection zone. The detection zone of such detectors has the form of a "beam barrier" formed by one or more parallel narrowly directed beams located in a vertical plane. The detection zones of different detectors differ, as a rule, in the length and number of beams. Structurally active optoelectronic detectors, as a rule, consist of two separate units - a radiation unit (BI) and a receiver unit (BP), separated by a working distance (range).

Active optoelectronic detectors are used to protect internal and external perimeters, windows, showcases and approaches to individual items (safes, museum exhibits, etc.).

Passive optoelectronic detectors are most widespread, since with the help of specially designed optical systems (Fresnel lenses), it is possible to simply and quickly obtain detection zones of various shapes and sizes and use them to protect rooms of any configuration, building structures and individual objects ...

The principle of operation of the detectors is based on recording the difference between the intensity of infrared radiation emanating from the human body and the background ambient temperature. The sensitive element of the detectors is a pyroelectric converter (pyroreceiver), on which infrared radiation is focused using a mirror or lens optical system (the latter are the most widespread).

The detection zone of the detector is a spatial discrete system consisting of elementary sensitive zones in the form of beams located in one or several tiers or in the form of thin wide plates located in a vertical plane (of the "curtain" type). Conventionally, the detection zones of detectors can be divided into the following seven types: wide-angle single-tier "fan" type; wide-angle multi-tiered; narrowly directed "curtain" type, narrowly directed "beam barrier" type; panoramic single-storey; panoramic multi-tiered; conical multi-tiered.

Due to the possibility of forming detection zones of various configurations, passive infrared optoelectronic detectors have universal application and can be used to block volumes of rooms, places of concentration of valuables, corridors, internal perimeters, passages between shelves, window and door openings, floors, ceilings, rooms with small animals, warehouses, etc.

Capacitive detectors designed to block metal cabinets, safes, individual items, create protective barriers. The principle of operation of the detectors is based on a change in the electrical capacity of the sensitive element (antenna) when a person approaches or touches a protected object. In this case, the protected object must be installed on a floor with a good insulating cover or on an insulating pad.

It is allowed to connect several metal safes or cabinets to one detector in a room. The number of connected items depends on their capacity, design features of the room and is specified when setting up the detector.

Sound (acoustic) detectors are designed to block glazed structures (windows, shop windows, stained-glass windows, etc.) for breaking. The principle of operation of these detectors is based on a non-contact method of acoustic control of the destruction of a glass sheet by vibrations arising during its destruction in the sound frequency range and propagating through the air.

When installing the detector, all sections of the protected glazed structure must be within its direct view.

Ultrasonic detectors are designed to block volumes of enclosed spaces, The principle of operation of the detectors is based on the registration of disturbances in the field of elastic waves of the ultrasonic range, created by special emitters, when moving in the area of ​​human detection. The detection area of ​​the detector has the shape of an ellipsoid of rotation or a teardrop shape.

Due to the low noise immunity, they are currently practically not used.

Radio wave detectors designed to protect enclosed spaces, internal and external perimeters, individual items and building structures, open areas. The principle of operation of radio wave detectors is based on the registration of disturbances of electromagnetic waves of the microwave range, emitted by the transmitter and registered by the receiver of the detector when a person moves in the detection zone. The detection zone of the detector (as in the case of ultrasonic detectors) has the shape of an ellipsoid of rotation or a drop-shaped shape, The detection zones of different detectors differ only in size.

Radio wave detectors are one-and two-position. Single-position detectors are used to protect volumes of enclosed spaces and open areas. Two-position - for perimeter protection.

When choosing, installing and operating radio wave detectors, one should remember one of their features. For electromagnetic waves of the microwave range, some building materials and structures are not an obstacle (shield) and they freely, with some attenuation, penetrate through them. Therefore, the detection zone of the radio wave detector can, in some cases, go beyond the protected premises, which can cause false alarms. Such materials and structures include, for example, thin plasterboard partitions, windows, wooden and plastic doors, etc. Therefore, radio wave detectors should not be aimed at window openings, thin walls and partitions, behind which during the security period the movement of large objects and people is possible. It is not recommended to use them on objects near which powerful radio transmitting means are located.

Combined detectors are a combination of two detectors built on different physical principles of detection, structurally and schematically combined in one housing. Moreover, they are schematically combined according to the "and" scheme, that is, only when both detectors are triggered, an alarm is generated. The most widely used combination of passive infrared and radio wave detectors.

Combined security detectors have a very high noise immunity and are used to protect premises of objects with a complex interference environment, where the use of other types of detectors is impossible or ineffective.

Combined detectors are two detectors built on different physical principles of detection, structurally combined in one housing. Each detector works independently of the other and has its own detection zone and its own output for connection to the alarm loop. The most widely used combination of infrared passive and acoustic detectors. There are other combinations as well.

Alarm detectors are intended for manual or automatic submission of an alarm notification to the internal control panel of the facility or to the internal affairs bodies in cases of a possible criminal attack on employees, customers or visitors of the facility.

Various buttons and pedals of hand and foot action based on magnetic and electric contact detectors are used as alarms. As a rule, such detectors are fixed in the pressed state and return to their original position is possible only with a key.

For the same purposes, special mini-alarm systems operating over a radio channel have been developed and are being used. They include a receiver that can be connected to the control panel or control panel, and several wearable keyfobs-transmitters for wireless transmission of alarm notifications. Some key fobs include a drop sensor. The range of such systems is from several tens to several hundred meters.

Trap detectors occupy a special place among alarm detectors. They are designed to alert you when you try to steal money or rob a guarded object, regardless of the actions of the personnel. They represent an imitation of a wad of money in a bank package with a volume of 100 bills, into which a magnet is mounted, and a magnetic sensor (reed switch) in a special stand on which the bundle is located.

When the imitation bundle of money is withdrawn (moved) from the stand, the contacts of the magnetic sensor are opened and an alarm is sent to the security console of the facility. There are similar trap detectors, where a special cartridge containing colored (orange) smoke with a volume of 5 m is built in together with a magnet. 2 The smoke composition is sprayed with a time delay (3 minutes) after the magnetic sensor is triggered.

Types of interference and their possible sources

During operation, detectors are exposed to various interfering factors, among which the main ones are: acoustic interference and noises, vibrations of building structures, air movement, electromagnetic interference, changes in temperature and humidity of the environment, technical weakness of the protected object.

The degree of influence of interference depends on their power, as well as on the principle of operation of the detector.

Acoustic interference and noise are created by industrial installations, vehicles, household radio equipment, lightning discharges and other sources. Examples of acoustic interference are given in table 1.

Table 1. Examples of acoustic interference

Sound intensity, dBExamples of sounds of specified strength
0 Sensitivity limit of the human ear.
10 Rustle of leaves. Faint whisper at a distance of 1 m.
20 Quiet garden.
30 Quiet room. Average noise level in the auditorium.
40 Quiet music. Noise in the living area.
50 Poor loudspeaker performance. Noise in an office with open windows.
60 Loud radio receiver. Noise in the store. Average level in colloquial speech at a distance of 1 m.
70 Truck engine noise. Noise inside the tram.
80 Noisy street. Typewriting bureau.
90 Car horn.
100 Car siren. Jackhammer.
120 Heavy thunderclaps. Jet engine.
130 Pain limit. The sound is no longer heard.

This type of interference causes the appearance of inhomogeneities in the air environment, vibrations of not rigidly fixed glazed structures and can cause false alarms of ultrasonic, sound, shock-contact and piezoelectric detectors. In addition, the high-frequency components of acoustic noise affect the operation of ultrasonic detectors.

Vibration of building structures caused by trains and subway trains, powerful compressor units, etc. Shock and piezoelectric detectors are especially sensitive to vibration interference, therefore, these detectors are not recommended to be used on objects subject to such interference.

Air movement in the protected area is caused mainly by heat flows near heating devices, drafts, fans, etc. The most susceptible to the influence of air flows are ultrasonic and passive optoelectronic detectors. Therefore, these detectors should not be installed in places with noticeable air movement (in window openings, near central heating batteries, near ventilation openings, etc.).

Electromagnetic interference are created by lightning discharges, powerful radio transmitting means, high-voltage power lines, distribution power supply networks, electric transport contact networks, installations for scientific research, technological purposes, etc.

Radio wave detectors are most susceptible to electromagnetic interference. Moreover, they are more susceptible to radio interference. The most dangerous electromagnetic interference is power supply interference. They arise when switching powerful loads and can penetrate into the input circuits of the equipment through the power supply inputs, causing its false alarms. A significant decrease in their number gives the use and timely maintenance of backup power supplies.

Eliminating the effect of electromagnetic interference of AC networks on the operation of detectors allows compliance with the basic requirement for the installation of low-voltage connecting lines: the laying of the power supply lines of the detector and the alarm loop must be parallel to the power networks at a distance of at least 50 cm between them, and their intersection must be at right angles.

Changes in ambient temperature and humidity at a protected facility can influence the operation of ultrasonic detectors. This is due to the fact that the absorption of ultrasonic vibrations in air is highly dependent on its temperature and humidity. For example, when the ambient temperature rises from +10 to +30 ° C, the absorption coefficient increases by 2.5-3 times, and when the humidity rises from 20-30% to 98% and decreases to 10%, the absorption coefficient changes by 3-4 times.

A decrease in the temperature at the object at night compared to daytime leads to a decrease in the absorption coefficient of ultrasonic vibrations and, as a consequence, to an increase in the detector's sensitivity. Therefore, if the detector was adjusted during the daytime, at night, sources of interference that were outside this zone during the adjustment period can enter the detection zone, which can trigger the detector.

Technical weakness of objects has a significant effect on the stability of the operation of magnetic detectors used to block elements of building structures (doors, windows, transoms, etc.) for opening. In addition, poor technical strength can cause false alarms of other detectors due to drafts, vibrations of glazed structures, etc.

It should be noted that there are a number of specific factors that cause false alarms for detectors of only a certain category. These include: the movement of small animals and insects, fluorescent lighting, radio transmission of building structures, direct sunlight and car headlights on detectors.

Small animals and insects movement can be perceived as the movement of an intruder by detectors, the principle of which is based on the Doppler effect. These include ultrasonic and radio wave detectors. The influence of crawling insects on the detectors can be excluded by treating their installation sites with special chemicals.

When fluorescent lighting is used at an object guarded by radio wave detectors, the source of interference is a column of ionized gas of the lamp blinking at a frequency of 100 Hz and vibration of the lamp armature at a frequency of 50 Hz.

In addition, fluorescent and neon lamps create continuous fluctuation interference, while mercury and sodium lamps create pulsed interference with a wide frequency spectrum. For example, fluorescent lamps can create significant radio interference in the frequency range of 10-100 MHz or more.

The detection range of such light sources is only 3-5 times less than the detection range of a person, therefore, for the period of protection, they must be turned off, and incandescent lamps should be used as emergency lighting.

Radio transmission of building structure elements can also cause a false triggering of a radio wave detector if the walls are thin or there are large-sized thin-walled openings, windows, doors.

The energy emitted by the detector can go outside the premises, while the detector detects people passing outside, as well as passing vehicles. Examples of radio transmission of building structures are given in Table 2.

Table 2. Examples of radio transmission of building structures

Thermal radiation from lighting fixtures can cause false alarms of passive optoelectronic detectors. In terms of power, this radiation is comparable to the thermal radiation of a person and can cause the detectors to be triggered.

In order to eliminate the effect of these interferences on passive optoelectronic detectors, it is recommended to isolate the detection zone from the effects of radiation from lighting devices. Reducing the influence of interfering factors, and, consequently, reducing the number of false alarms of detectors, is mainly achieved by observing the requirements for the placement of detectors and their optimal configuration at the installation site.

V Table 3 the types and sources of interference and the ways of their elimination are given.

Table 3. Sources of interference and how to eliminate them

Types and sources of interference Detectors
shock contact, magnetic contact ultrasonic acoustic radio waves optoelectronic capacitive piezoelectric Combined IR + microwave
passive active
External acoustic interference and noise: vehicles, construction machines and units, aircraft, loading and unloading operations, etc. close to the object Do not affect Do not affect Apply when the noise level in the room is up to 60 dB Do not affect
Internal acoustic interference and noise: refrigeration units, fans, telephone and electrical calls, fluorescent tube chokes, hydraulic noises in pipes Do not affect Do not affect Do not affect
Collaboration in the same room of detectors of the same operating principle Do not affect Do not affect Install the detector correctly. Use detectors with different letters Do not affect Correctly install and configure the detectors Do not affect
Vibration of building structures In the presence of constant vibrations of large amplitude, it is impossible to use
Air movement: drafts, heat flows from radiators Do not affect Correctly install and configure the detector Do not affect Correctly install and configure the detector Do not affect Correctly install and configure the detectors
Moving objects and people behind non-capital walls, wooden doors Do not affectCorrectly install and configure the detectors Do not affectCorrectly install and configure the detector Do not affectCorrectly install and configure the detectors
Moving objects in the protected area: swinging curtains, plants, rotating fan blades Do not affect Do not install near sources of interference. Configure the detector correctly Do not affect Correctly install and configure the detector Do not affect Correctly install and configure the detector Do not affect Correctly install and configure the detector
Small animals (mice, rats) Do not affect Correctly install and configure the detector Do not affect Correctly install and configure the detector Do not affect
Water movement in plastic pipes Does not affect Do not install near sources of interference. Configure the detector correctly Shielding pipes Does not affect Do not install near sources of interference. Configure the detector correctly Configure the detector correctly
Changing the free space of the protected area due to the introduction, removal of large-sized objects with an increased ability to absorb or reflect Does not affect Reconfigure the detector Does not affect Reconfigure the detector
AC voltage fluctuations Use a DC backup power supply
Electromagnetic interference: vehicles with electric motors, powerful radio transmitters, electric welding machines, power lines, electrical installations with a capacity of more than 15 kVA Does not affect With a field strength of more than 10 V / m and VHF radiation of more than 40 W at a distance of less than 3 m from the detector, it is impossible to use
Fluorescent lighting Does not affect Turn off the lighting for the period of protection Eliminate the influence of direct illumination. Install the detector correctly Does not affect
Sunlight, vehicle headlights Do not affect Install the detector correctly Do not affect
Changing the background temperature Does not affect The rate of change of the background temperature is not more than 1 ° / min Does not affect Does not affect

Fire detectors

Fire detectors are the main elements of automatic fire and security and fire alarm systems.

According to the method of activation, fire detectors are divided into manual and automatic. Manual detectors lack the function of detecting a fire source, their action is reduced to transmitting an alarm message to the electrical circuit of the alarm loop after a person detects a fire and activating the detector by pressing the corresponding start button.

Automatic fire detectors operate without human intervention. With their help, the detection of fire is carried out by one or several analyzed signs and the formation of a fire notification when the controlled physical parameter reaches the set value. Elevated air temperature, release of combustion products, turbulent flows of hot gases, electromagnetic radiation, etc. can be monitored parameters. The use of other signs of fire is also possible. Combined detectors respond to two or more parameters that characterize the appearance of a fire source.

Heat detectors can use the method of forming the analyzed signal, which allows them to respond not only to an increase in the absolute value of temperature above the maximum set threshold, but also to an excess of the slew rate of its limit value. Therefore, in accordance with the nature of the reaction to a change in the controlled trait, they are divided into maximum, differential and maximum-differential. According to the principle of operation, smoke detectors are subdivided into optoelectronic and ionization.

According to the method of power supply, fire detectors are divided into:

  • powered by the alarm loop from the control panel or control panel;
  • powered by a separate external power supply;
  • powered by a built-in internal power source (autonomous fire detectors).

The detector's detection zone is the space near the detector, within which it is guaranteed to be triggered when a fire occurs. Most often, this parameter is expressed in units of area (m 2) controlled by the detector with the required reliability. With an increase in the height of the detector installation, the area controlled by one detector decreases. If the installation height is higher than the specified maximum, the effective detection of the fire source by the detector is not guaranteed.

For light detectors, the protected area is determined by the maximum detection range of an open test fire and the viewing angle, which depends on the design of the optical system.

Fire detectors must ensure reliable detection of a fire source in specific protected areas. To do this, when choosing a detector, it is necessary to take into account the probable nature of ignition and the process of development over time of the main factors of a fire: an increase in temperature, smoke concentration, light radiation at various points in the room. Depending on the type and amount of combustible materials in the event of a fire, there may be a predominance of one or more detectable signs.

Most often, ignition is accompanied by the release of smoke in the initial stage, therefore, in most cases, the use of smoke detectors is most advisable. When choosing a smoke detector, it should be borne in mind that ionization (radioisotope) and optoelectronic smoke detectors have different sensitivity to combustion products, the smoke particles of which have different colors and sizes. Optical-electronic point detectors respond better to light smoke, typical for cellulose-containing materials, as well as smoke consisting of small aerosol particles. Ionization detectors have a relatively higher sensitivity to combustion products that give off black smoke with larger particles (for example, when burning rubber).

Premises, in which the rapid appearance of an open flame is most likely during a fire, should preferably be equipped with light detectors.

It is advisable to install heat detectors, first of all, in those cases when a significant power of the fire source is provided and, therefore, an intense heat release will occur during a fire.

When choosing a detector, it is also necessary to take into account special additional requirements for their design and principle of operation. For example, radioisotope detectors are not recommended to be installed in residential premises and childcare facilities. In hazardous areas, detectors with a special design must be installed.

The calculation of the total number of detectors and the determination of their installation locations should be carried out taking into account the characteristics of the room, as well as the requirements of regulatory and technical documentation. The latter includes the relevant documents regulating general issues of design and installation of fire automation installations, systems and complexes of fire and burglar alarms, as well as operational documentation for the corresponding type of detector.

More and more widespread are fire detectors created using the element base of the fourth generation: specialized controllers and microprocessors.

A common feature of such detectors with extended tactical and technical capabilities is the use of only special devices (control panels) that are part of the security and fire alarm system of the corresponding company for joint operation.

The use of computer technology makes it possible to create addressable fire detectors that transmit information about their location to the central processor of the control panel, which ensures an accurate reconstruction of the picture and analysis of the process of the emergence and development of a fire. They carry out automatically or upon request from the center, the performance monitoring and digital transmission of data on the parameters of their functioning. In such detectors, if necessary, it is possible to adjust the sensitivity when the environmental conditions change. Analog detectors can also transmit information about the level of the monitored parameter. The expansion of the range of detectors is carried out through the use of new technologies. For example, modern foreign linear heat detectors (cable type) detect the difference between normal and elevated temperatures, which makes it possible to generate an alarm signal even before the start of a fire (smoke or fire) when the monitored object overheats. The signal is transmitted in analog form from the detector to a special control panel that allows you to determine the distance to the overheated area. Such detectors can be effectively used to control objects with electrical equipment, rooms with false ceilings, cable routes and channels.

Technical means of collecting and processing information

The technical means of collecting and processing information include receiving and controlling devices, control panels, signaling and starting devices, notification transmission systems, etc. They are designed for continuous collection of information from technical means of detection (detectors) included in the alarm loops, analysis of an alarm situation at the facility and its display, control of local light and sound annunciators, indicators and other devices (relay, modem, transmitter, etc.). ), as well as the formation and transmission of notifications about the state of the object to the central post or the centralized monitoring panel. They also provide the handing over and disarming of the object (room) according to the adopted tactics, as well as, in some cases, the power supply of the detectors.

Receiving and control devices are classified according to information capacity (the number of controlled alarm loops) into devices of small (up to 5 AL), medium (from 6 to 50 AL) and large (over 50 AL) information capacity. In terms of information content, devices can be small (up to 2 types of notifications), medium (from 3 to 5 types) and large (over 5 types) information content.

Notification transmission systems are classified according to information capacity (the number of protected objects) into systems with constant information capacity and with the possibility of increasing information capacity.

In terms of information content, the systems are subdivided into systems of small (up to 2 types of notifications), medium (from 3 to 5 types) and large (over 5) information content.

According to the type of communication lines (channels) used, the systems are subdivided into systems using telephone network lines (including switchable ones), special communication lines, radio channels, combined communication lines, etc.

According to the number of directions of information transmission, they are subdivided into systems with one- and bi-directional information transmission (with the presence of a reverse channel).

According to the object maintenance algorithm, message transmission systems are subdivided into non-automated systems with manual tactics of arming (disarming) objects under protection (disarming) after telephone conversations with the control panel attendant and automated systems with automatic arming and disarming (without telephone conversations).

According to the method of displaying the information coming to the centralized observation console, the notification transmission systems are subdivided into systems with individual or group display of information in the form of light and sound signals, with information being displayed on the display using devices for processing and storing a database.

Control panels for the main tasks to be solved correspond to domestic control devices. Let us also clarify the concepts of a protection zone (a term used in foreign literature) and an alarm loop used in domestic literature. Let us note right away that these concepts are different.

Alarm loop is an electrical circuit that connects the output circuits of the detectors, which includes auxiliary elements (diodes, resistors, etc.), connecting wires and boxes and is designed to issue notifications about intrusion, attempted intrusion, fire, malfunction, and in some cases and to supply power to the detectors.

Thus, the alarm loop is designed to monitor the status of a certain protected zone.

Zone- this is a part of the protected object controlled by one or more alarm loops. Therefore, the term "zone" used in the descriptions of foreign equipment is in this case synonymous with the term "signaling loop".

Modern multifunctional control points have ample opportunities for organizing security, fire and security and fire alarm systems. Knowledge of these capabilities will make it possible to make the right choice of a checkpoint, the characteristics and parameters of which most fully satisfy the solution of the assigned tasks for the protection of a particular object.

The structure of the alarm system organized on the basis of the CP will largely be determined by the method of connecting the alarm loops, which affects the functional characteristics of the organized security system and largely determines the cost of installation work. By the method of connecting the loops, the following types of CP can be distinguished:

  • with trains of radial structure;
  • with a tree structure;
  • addressable.

In a control panel with radial loops, each loop is connected directly to the panel itself. Such a structure justifies itself with a small number of loops (usually up to 16) and at facilities that do not require the organization of remote loops. They are usually used for small and medium-sized facilities.

CPs with a tree structure have a special information bus of several wires (usually 4). Expanders are connected to this bus. In turn, radial loops are connected to the expanders. Several basic radial loops can also be connected to the CP itself. The total number of loops is usually in the range of 24-128. Expanders monitor the status of the loops connected to them, encode information about their status and transmit it via the data bus to the control panel, which has an indication of the status of all loops. Such checkpoints are used to build security systems for medium and large facilities.

Addressable control panels using loops with addressable detectors stand somewhat apart from the rest and are usually used to create rather complex integrated security systems for large and critical facilities. Obviously, addressable detectors are more complicated and more expensive than conventional ones, and their use and advantages are fully manifested in complex and large objects.

There are addressable CPs that have different designs of their loops:

  • beam;
  • annular;
  • annular with ray branches.

The ring train has a rather serious advantage. If it is damaged (broken), it retains its operability, since the information exchange line is preserved. When the loop is closed, special devices, loop dividers, disconnect the short-circuited section, and the rest of the loop continues to function.

Receiving and control devices (PPK) and control panels (CP) are the main elements that form an information and analytical system of security, fire or security and fire alarms at the facility. Such systems can be autonomous or centralized. In the first case, the PPK or KP is installed in the security room (point) located at the guarded facility. With centralized security, the object complex of technical means, formed by one or several control panels (CP), forms an object subsystem of the security and fire alarm system, which, using the notification transmission system (SPI), transmits in a given form information about the state of the object to the centralized monitoring station (CMS), located in the center for receiving alarm notices (centralized security point - ARC). The information generated by the PPK or CP during autonomous and centralized protection is transmitted to employees of special security services of the facility, which are entrusted with the functions of responding to alarms received from the facility.

Technical means of notification are described in detail in section 5 of this catalog.

This section of the catalog presents the means and systems of security and fire alarm systems.

Basic terms used in the section

  1. Detector detection area- part of the protected object space, in which the detector issues an alarm message when the controlled parameter exceeds the threshold value.
  2. Detector sensitivity- the numerical value of the monitored parameter, when exceeded, the detector should be triggered.
  3. Optical density of the medium- the decimal logarithm of the ratio of the radiation flux passing through a smoke-free medium to the radiation flux attenuated by the medium during its partial or complete smoke.

reference Information

Requirements for the placement of fire detectors in accordance with NPB 88-2001 “Fire extinguishing and alarm installations. Norms and rules of design "

In accordance with NPB 88-2001 “Fire extinguishing and alarm installations. Norms and rules for design ", the area controlled by one point smoke detector, as well as the maximum distance between the detectors and the wall, must be determined by Table 5

Table 5. Requirements for the placement of smoke detectors

When monitoring the protected area with two or more smoke linear detectors (LDPI), the maximum distance between their parallel optical axes, optical axis and the wall, depending on the installation height of the fire detector units, should be determined by Table 6.

Table 6. Requirements for the placement of smoke line detectors

In rooms with a height of over 12 m and up to 18 m, the detectors should be installed in two tiers, in accordance with Table 7.

Table 7. Requirements for the placement of linear smoke detectors for two-tier placement

The area monitored by one point heat detector, as well as the maximum distance between the detector and the wall, must be determined by Table 8, but not exceeding the values ​​specified in the technical specifications and passports for the detectors.

Table 8 Requirements for the placement of heat detectors

Classes of thermal fire detectors, in accordance with NPB 85-200 “Heat fire detectors. Fire safety technical requirements. Test methods "

In accordance with NPB 85-200 “Heat fire detectors. Fire safety technical requirements. Test methods ", maximum, maximum differential detectors and detectors with differential characteristics, depending on the temperature and response time, are divided into ten classes: A1, A2, A3, B, C, D, E, F, G, H (see ... Table 9).

Table 9. Classes of maximum differential detectors

Detector classMedium temperature, ° С Response temperature, ° С
conditionally normalmaximum normal minimalmaximum
A125 50 54 65
A225 50 54 70
A335 60 64 76
B40 65 69 85
C55 80 84 100
D70 95 99 115
E85 110 114 130
F100 125 129 145
G115 140 144 160
HIndicated in the TD for specific types of detectors

One of the most important security elements is burglar and fire alarms. These two systems have a lot in common - communication channels, similar algorithms for receiving and processing information, sending alarms, etc. Therefore, they are often (for economic reasons) combined into a single security and fire alarm (OPS). The security and fire alarm is one of the oldest technical means of protection. And until now, this system is one of the most effective security systems.

Modern protection systems are built on several signaling subsystems (the combination of their application allows you to monitor any threats):

burglar - records an attempt to enter;

alarming - an emergency call system in case of a sudden attack;

fire department - registers the appearance of the first signs of fire;

emergency - notifies of gas leaks, water leaks, etc.

The task fire alarm receiving, processing, transferring and presenting in a given form to consumers with the help of technical means of information about a fire at protected facilities (detecting a fire center, determining its place of origin, giving signals for automatic fire extinguishing and smoke removal systems). Task burglar alarm- timely notification of penetration or attempted penetration of the guarded object, with the fixation of the fact, place and time of violation of the guard line. The common goal of both alarm systems is to provide instant response with accurate information about the nature of the event.

Analysis of domestic and foreign statistics of unauthorized intrusions into various objects shows that more than 50% of intrusions are made on objects with free access to personnel and customers; about 25% - for objects with unguarded elements of mechanical protection such as fences, gratings; about 20% - for objects with an access system and only 5% - for objects with an enhanced security regime, using complex technical systems and specially trained personnel. From the practice of the security services when protecting objects, six main zones of protected areas are distinguished:

zone I - the perimeter of the territory in front of the building;

zone II - the perimeter of the building itself;

zone III - a room for receiving visitors;

zone IV - offices of employees and corridors;

zones V and VI - management offices, meeting rooms with partners, storage of values ​​and information.

In order to ensure the required level of security of especially important facilities (banks, cash desks, weapons storage areas), it is necessary to organize multi-border protection of the facility. First line alarm sensors are installed on the outer perimeter. The second line is represented by sensors installed in places of possible penetration into an object (doors, windows, vents, etc.). The third line - volumetric sensors in the interior, the fourth - directly protected items (safes, cabinets, boxes, etc.). At the same time, each line must be connected to an independent cell of the control panel so that an alarm signal from the other is given in case of a possible bypass of one of the security lines by the intruder.

Modern fire alarm systems are often integrated with other security systems into unified complexes.

2.2. The structure of the security and fire alarm system

In general, the security and fire alarm system includes:

sensors- alarm detectors reacting to an alarm event (fire, attempted entry into an object, etc.), the characteristics of the sensors determine the main parameters of the entire alarm system;

control panels(Control panel) - devices that receive an alarm signal from detectors and control the executive devices according to a given algorithm (in the simplest case, control over the operation of a security and fire alarm consists of turning on and off sensors, fixing alarm signals; in complex, branched alarm systems, control and control is carried out using computers);

executive devices- units that ensure the execution of a given algorithm of the system's actions in response to one or another alarming event (giving an alert signal, activating fire extinguishing mechanisms, auto-dialing to specified phone numbers, etc.).

Usually, security and fire alarm systems are created in two versions - an OPS with local or closed security of an object or an OPS with transfer under protection to subdivisions of non-departmental security (or a private security company) and the fire service of the Ministry of Emergencies of Russia.

The whole variety of security and fire alarm systems, with some degree of convention, is subdivided into address, analog and combined systems.

1. Analog (conventional) systems are built according to the following principle. The protected object is divided into areas by laying separate loops that combine a number of sensors (detectors). When any sensor is triggered, an alarm is generated throughout the loop. The decision about the occurrence of an event here is "made" only by the detector, the operability of which can be checked only during the maintenance of the fire alarm. Also, the disadvantages of such systems are the high probability of false alarms, localization of the signal with an accuracy of the loop, and the limitation of the monitored area. The cost of such a system is relatively low, although a large number of loops must be installed. The centralized control tasks are performed by the security and fire panel. The use of analog systems is possible on all types of objects. But with a large number of alarm areas, a large amount of work on the installation of wired communications arises.

2. Address systems imply installation on one alarm loop of address sensors. Such systems make it possible to replace the multicore cables connecting the detectors with the control panel (control panel) with one pair of data bus wires.

3. Address non-interrogation systems are, in fact, threshold, supplemented only by the possibility of transmitting the address code of the triggered detector. These systems have all the disadvantages of analogue systems - the impossibility of automatic control of the fire detectors performance (in case of any failure of the electronics, the connection between the detector and the control panel is terminated).

4. Address polling systems carry out periodic polling of detectors, provide control of their performance in case of any type of failure, which makes it possible to install one detector in each room instead of two. In the address interrogative FSA, complex algorithms for information processing can be implemented, for example, autocompensation for changes in the sensitivity of detectors over time. Reduces the likelihood of false positives. For example, an addressable glass break sensor, unlike an addressless one, will indicate which window was broken. The decision about the event that has occurred is also "made" by the detector.

5. The most promising direction in the field of building alarm systems are combined (address-analog) systems... Analogue addressable detectors measure the amount of smoke or temperature at the facility, and the signal is generated on the basis of mathematical processing of the received data in the control panel (specialized computer). It is possible to connect any sensors, the system is able to determine their type and the required algorithm for working with them, even if all these devices are included in one burglar alarm loop. These systems provide the fastest decision-making and management speed. For the correct operation of the address-analog equipment, it is necessary to take into account the communication language of its components (protocol) that is unique for each system. The use of these systems makes it possible to quickly, without high costs, make changes to an existing system when changing and expanding the zones of the object. The cost of such systems is higher than the previous two.

Now there is a huge variety of detectors, control panels and sirens with different characteristics and capabilities. It should be recognized that the defining elements of the security and fire alarm system are sensors... The parameters of the sensors determine the main characteristics of the entire alarm system. In any of the detectors, the processing of controlled alarming factors is to one degree or another an analog process, and the division of detectors into threshold and analog refers to the method of transmitting information from them.

According to the installation site on the object, the sensors can be subdivided into internal and external, installed respectively inside and outside the protected objects. They have the same principle of operation, the differences are in design and technological characteristics. The installation location can be the most important factor in determining the type of detector.

OPS detectors (sensors) act on the principle of registering environmental changes. These are devices designed to determine the presence of a threat to the security of a guarded object and transmit an alarm message for a timely response. Conventionally, they can be subdivided into volumetric (allowing to control the space), linear, or surface, - to control the perimeters of territories and buildings, local, or point, - to control individual items.

The detectors can be classified according to the type of controlled physical parameter, the principle of operation of the sensitive element, the method of transmitting information to the central alarm control panel.

According to the principle of generating an information signal about the penetration of an object or a fire, the detectors of the security and fire alarm systems are divided into active(the alarm generates a signal in the protected area and reacts to changes in its parameters) and passive(react to changes in environmental parameters). Such types of security detectors as infrared passive, magnetic contact glass-break detectors, perimeter active detectors, combined active detectors are widely used. In fire alarm systems, heat, smoke, light, ionization, combined and manual detectors are used.

The type of sensors in the alarm system is determined by the physical principle of operation. Depending on the type of sensors, the security alarm systems can be capacitive, radio-beam, seismic, reacting to a short or open electrical circuit, etc.

The possibilities of installing security systems, depending on the sensors used, their advantages and disadvantages are shown in Table. 2.


table 2

Perimeter security systems

2.3. Types of security detectors

Contact detectors serve to detect unauthorized opening of doors, windows, gates, etc. Magnetic detectors consist of a magnetically controlled reed switch installed on a stationary part, and a setting element (magnet) installed on the opening module. When the magnet is close to the reed switch, its contacts are in a closed state. These detectors differ from each other in the type of installation and material from which they are made. The disadvantage is the ability to neutralize them with a powerful external magnet. Reed shielded sensors are protected from extraneous magnetic field by special plates and are equipped with signaling reed contacts that are triggered in the presence of an extraneous field and warn about it. When installing magnetic contacts in metal doors, it is very important to shield the field of the main magnet from the induced field of the entire door.

Electrical contact devices- sensors that sharply change the voltage in the circuit with a certain impact on them. They can be either unambiguously “open” (current flows through them), or “closed” (no current flows). The simplest way to build such an alarm is thin wires or foil strips connected to a door or window. Wire, foil or conductive compound "Paste" are connected to the alarm through door hinges, locks, and also through special contact blocks. When trying to penetrate, they are easily destroyed and form an alarm signal. Electrical contact devices provide reliable protection against false alarms.

V mechanical door contact devices a movable contact protrudes from the sensor housing and closes the circuit when pressed (door closed). The installation location of such mechanical devices is difficult to hide, and it is easy to disable them by securing the lever in a closed position (for example, with chewing gum).

Contact mats are made of two decorated sheets of metal foil and a layer of foamed plastic between them. Under the weight of the body, the foil bends, and this provides an electrical contact that generates an alarm signal. Contact mats work on the "normally open" principle and a signal is generated when an electrical contact device closes the circuit. Therefore, if you cut the wire leading to the mat, the alarm will not go off in the future. A flat cable is used to connect the rugs.

Passive infrared detectors (PIR) serve to detect the intrusion of the intruder into the controlled area. This is one of the most common types of security detectors. The principle of operation is based on the registration of changes in the flux of thermal radiation and conversion of infrared radiation into an electrical signal using a pyroelectric element. Currently, two- and four-area pyroelements are used. This can significantly reduce the likelihood of false alarms. In simple PICs, signal processing is performed by analog methods, in more complex ones - by digital ones, using a built-in processor. The detection area is formed by a Fresnel lens or mirrors. Distinguish between volumetric, linear and surface detection zones. It is not recommended to install infrared detectors in the immediate vicinity of ventilation openings, windows and doors that create convection air flows, as well as heating radiators and sources of thermal interference. Also undesirable is the direct hit of light radiation from incandescent lamps, car headlights, the sun on the entrance window of the detector. It is possible to use a thermal compensation circuit to ensure operability in the high temperature region (33–37 ° C), when the signal from human movement decreases sharply due to a decrease in the thermal contrast between the human body and the background.

Active detectors are an optical system made of an LED that emits infrared radiation in the direction of the receiver lens. The light beam is modulated in brightness and acts at a distance of up to 125 m and allows you to form an invisible security line. These emitters can be either single-beam or multi-beam. When the number of beams is more than two, the possibility of false triggering is reduced, since an alarm signal is generated only when all beams are simultaneously crossed. The configuration of the zones can be different - "curtain" (intersection of the surface), "beam" (linear movement), "volume" (movement in space). The detectors may not work in rain or heavy fog.

Radio wave volumetric detectors serve to detect penetration of the protected object by registering the Doppler frequency shift of the reflected microwave (microwave) signal that occurs when an intruder moves in the electromagnetic field created by the microwave module. They can be covertly installed at the facility behind materials that transmit radio waves (fabrics, wood-based panels, etc.). Linear radio wave detectors consist of a transmitting and receiving unit. They form an alarm notification when a person crosses their zone of action. The transmitting unit emits electromagnetic oscillations, the receiving unit receives these oscillations, analyzes the amplitude and time characteristics of the received signal and, if they match the “intruder's” model embedded in the processing algorithm, generates an alarm notification.

Microwave sensors have lost their former popularity, although they are still in demand. In relatively new developments, a significant reduction in their dimensions and energy consumption has been achieved.

Volumetric ultrasonic detectors serve to detect movement in the protected area. Ultrasonic sensors are designed to protect premises in terms of volume and give an alarm signal both when an intruder appears and when a fire breaks out. The emitting element of the detector is a piezoelectric ultrasonic transducer that produces acoustic vibrations of air in the protected volume under the influence of an electric voltage. The sensitive element of the detector located in the receiver is a piezoelectric ultrasonic receiving transducer of acoustic vibrations into an alternating electrical signal. The signal from the receiver is processed in the control circuit, depending on the algorithm embedded in it, and generates one or another notification.

Acoustic detectors are equipped with a highly sensitive miniature microphone that picks up the sound emitted when sheet glass breaks. The sensitive element of such detectors is a condenser electret microphone with a built-in preamplifier on a field-effect transistor. When glass is broken, two types of sound vibrations occur in a strictly defined sequence: first, a shock wave from the vibration of the entire glass array with a frequency of about 100 Hz, and then a wave of glass destruction with a frequency of about 5 kHz. The microphone converts sound vibrations in the air into electrical signals. The detector processes these signals and makes a decision about the presence of intrusion. When installing the detector, all areas of the protected glass must be within its line of sight.

Capacitive system sensor represents one or more metal electrodes placed on the structure of the protected opening. The principle of operation of capacitive security detectors is based on recording the value, speed and duration of the change in the capacitance of the sensitive element, which is used as metal objects connected to the detector or specially laid wires. The detector generates an alarm signal when the electrical capacity of a security item (safe, metal cabinet) changes relative to "ground" caused by a person's approach to this item. Can be used to guard the perimeter of a building through stretched wires.

Vibration detectors serve to protect against penetration into a protected object by destroying various building structures, as well as protecting safes, ATMs, etc. signal during vibration of the piezoelectric element. An electrical signal proportional to the vibration level is amplified and processed by the detector circuit using a special algorithm to separate the destructive effect from the interference signal. The principle of operation of vibration systems with sensor cables is based on the triboelectric effect. When such a cable deforms, electrification occurs in the dielectric located between the central conductor and the conductive braid, which is recorded as a potential difference between the cable conductors. The sensing element is a sensor cable that converts mechanical vibrations into an electrical signal. There are also more advanced electromagnetic microphone cables.

A relatively new principle of protecting premises is to use a change in air pressure when opening a closed room ( barometric sensors) has still not met the expectations placed on it and is almost never used when equipping multifunctional and large facilities. These sensors have a high false alarm rate and rather severe application restrictions.

It is necessary to dwell separately on distributed fiber optic systems for perimeter protection. Modern fiber optic sensors can measure pressure, temperature, distance, position in space, acceleration, vibration, sound wave mass, liquid level, deformation, refractive index, electric field, electric current, magnetic field, gas concentration, radiation dose, and etc. Optical fiber is both a communication line and a sensitive element. The optical fiber is fed with laser light with a high output power and a short radiation pulse, then the parameters of Rayleigh backscattering, as well as Fresnel reflection from the joints and ends of the fiber, are measured. Under the influence of various factors (deformation, acoustic vibrations, temperature, and with an appropriate fiber coating - electric or magnetic field), the phase difference between the supplied and reflected light pulse changes. The location of the inhomogeneity is determined from the time delay between the instant of emission of the pulse and the instant of arrival of the backscattered signal, and the loss in the line section is determined from the intensity of the backscattering radiation.

A signal analyzer based on the principle of a neural network is used to separate the signals generated by the intruder from the noise and interference. The signal to the input of the neural network analyzer is supplied in the form of a spectral vector formed by the DSP processor (Digital Signal Processing), the principle of operation of which is based on algorithms for the fast Fourier transform.

The advantages of distributed fiber-optic systems are the ability to determine the location of the violation of the boundary of the object, use these systems to protect perimeters up to 100 km long, a low level of false alarms and a relatively low price per running meter.

The leader among security alarm equipment is currently combined sensor, built on the use of simultaneously two channels of human detection - passive IR and microwave. Nowadays it is replacing all other devices and many alarm installers use it as the only sensor for the volumetric protection of premises. The average operating time for a false alarm is 3-5 thousand hours, and in some conditions it reaches a year. It allows you to block such rooms where passive IR or microwave sensors are generally not applicable (the first - in rooms with drafts and thermal interference, the second - with thin non-metallic walls). But the probability of detection for such sensors is always less than that of any of the components of its two channels. The same success can be achieved by using separately both sensors (IR and microwave) in the same room, and an alarm signal can be generated only when both detectors are triggered in a given time interval (usually a few seconds), using the capabilities of the control equipment for this purpose.

2.4. Types of fire detectors

The following basic principles of activation can be used to detect fire: fire detectors:

smoke detectors - based on ionization or photoelectric principle;

heat detectors - based on recording the level of temperature rise or some of its specific indicators;

flame detectors - based on the use of ultraviolet or infrared radiation;

gas detectors.

Manual call points are necessary for the forced transfer of the system to the fire alarm mode by a person. They can be realized in the form of levers or buttons covered with transparent materials (easily broken in case of fire). Most often they are installed in easily accessible public areas.

Heat detectors react to changes in ambient temperature. Some materials burn with little or no smoke (eg wood), or the smoke is difficult to spread due to the small space (behind suspended ceilings). They are used in cases where the air contains a high concentration of aerosol particles that have nothing to do with combustion processes (water vapor, flour in a mill, etc.). Thermal threshold fire detectors give a "fire" signal when the threshold temperature is reached, differential- fix a fire hazardous situation by the rate of temperature rise.

Contact threshold heat detector issues an alarm when a predetermined maximum permissible temperature is exceeded. When heated, the contact plate is melted, the electrical circuit is broken and an alarm is generated. These are the simplest detectors. Typically, the threshold temperature is 75 ° C.

A semiconductor element can also be used as a sensitive element. As the temperature rises, the resistance of the circuit drops, and more current flows through it. When the threshold value of the electric current is exceeded, an alarm signal is generated. Semiconductor sensitive elements have a higher response rate, the threshold temperature value can be set arbitrarily, and when the sensor is triggered, the device is not destroyed.

Differential heat detectors usually consist of two thermoelements, one of which is located inside the detector housing, and the other is located outside. The currents flowing through these two circuits are fed to the inputs of the differential amplifier. As the temperature rises, the current flowing through the external circuit changes sharply. In the internal circuit, it almost does not change, which leads to an imbalance of currents and the formation of an alarm signal. The use of a thermocouple eliminates the influence of smooth temperature changes caused by natural causes. These sensors are the fastest in response speed and stable in operation.

Linear heat detectors. The construction consists of four copper conductors with sheaths of a special material with a negative temperature coefficient. The conductors are packed in a common casing so that they are in close contact with their shells. The wires are connected at the end of the line in pairs, forming two loops, touching the shells. Principle of operation: as the temperature rises, the shells change their resistance, also changing the total resistance between the loops, which is measured by a special processing unit. By the magnitude of this resistance, a decision is made about the presence of a fire. The longer the cable length (up to 1.5 km), the higher the sensitivity of the device.

Smoke detectors are designed to detect the presence of a given concentration of smoke particles in the air. The composition of the smoke particles can vary. Therefore, according to the principle of operation, smoke detectors are divided into two main types - optoelectronic and ionization.

Ionization smoke detector. The stream of radioactive particles (usually americium-241 is used) enters two separate chambers. When smoke particles (the color of the smoke is not important) enter the measuring (external) chamber, the current flowing through it decreases, since this leads to a decrease in the path length of β particles and an increase in ion recombination. For processing, the difference between the currents in the measuring and control chambers is used. Ionization detectors do not harm human health (a source of radioactive radiation of the order of 0.9 μCi). These sensors provide real fire protection in hazardous areas. They also have a record low current consumption. The disadvantages are the complexity of burial after the end of the service life (at least 5 years) and vulnerability to changes in humidity, pressure, temperature, and air velocity.

Optical smoke detector. The measuring chamber of this device contains an optoelectronic pair. An LED or a laser (aspiration sensor) is used as a reference element. Radiation of the driving element of the infrared spectrum under normal conditions does not fall on the photodetector. When smoke particles enter the optical chamber, radiation from the LED is scattered. Due to the optical effect of scattering infrared radiation on smoke particles, light enters the photodetector, providing an electrical signal. The higher the concentration of scattering smoke particles in the air, the higher the signal level. For the correct operation of the optical detector, the design of the optical camera is very important.

Comparative characteristics of ionization and optical types of detectors are given in table. 3.


Table 3

Comparison of the effectiveness of smoke detection methods

Laser detector provides smoke detection at specific optical density levels approximately 100 times lower than modern LED sensors. There are more expensive systems with forced air intake. To maintain sensitivity and prevent false alarms, both types of detectors (ionization or photoelectric) require periodic cleaning.

Smoke line detectors indispensable in rooms with high ceilings and large areas. They are widely used in fire alarm systems, since it becomes possible to record a fire hazardous situation at the very early stages. The ease of installation, configuration and operation of modern linear sensors allows them to compete in price with point detectors, even in medium-sized rooms.

Combined smoke detector(ionization and optical types of detectors are collected in one housing) operates at two angles of light reflection, which allows you to measure and analyze the ratio of the characteristics of forward and backward scattering of light, determining the types of smoke and reducing the number of false alarms. This is done through the use of bi-angle light scattering technology. It is known that the ratio of forward scattered light to backscattered light for dark smoke (soot) is higher than for light types of smoke (smoldering wood), and even higher for dry substances (cement dust).

It should be noted that the most effective is a detector that combines photoelectric and thermal sensing elements. Today are produced and three-dimensional combined detectors, they combine smoke optical, smoke ionization and thermal detection principles. In practice, they are rarely used.

Flame detectors. Open fire has characteristic radiation in both the ultraviolet and infrared parts of the spectrum. Accordingly, there are two types of devices available:

ultraviolet- a high-voltage gas-discharge indicator constantly monitors the radiation power in the ultraviolet range. When an open fire appears, the intensity of the discharges between the electrodes of the indicator greatly increases and an alarm signal is issued. A similar sensor can monitor an area of ​​up to 200 m 2 at an installation height of up to 20 m. The response time does not exceed 5 s;

infrared- with the help of an infrared sensitive element and an optical focusing system, characteristic bursts of infrared radiation are recorded when a fire occurs. This device allows you to determine within 3 s the presence of a flame with a size of 10 cm at a distance of up to 20 m at a viewing angle of 90 °.

Now there are sensors of a new class - analog detectors with external addressing... The sensors are analog, but are addressed by the alarm loop in which they are installed. The sensor performs a self-test of all its components, checks the dustiness of the smoke chamber, transmits the test results to the control panel. Compensation of dustiness in the smoke chamber allows to increase the detector's operating time until the next service, self-testing eliminates false alarms. Such detectors retain all the advantages of analogue addressable detectors, have a low cost and are able to work with inexpensive conventional control panels. When placing several detectors in the alarm loop, each of which will be installed in the room alone, it is necessary to install remote optical indication devices in the common corridor.

The criterion for the efficiency of the FSA equipment is to minimize the number of errors and false alarms. It is considered an excellent work result if there is one false alarm from one zone per month. The frequency of false alarms is the main characteristic by which one can judge the noise immunity of the detector. Immunity Is an indicator of the quality of the sensor, characterizing its ability to work stably in various conditions.

The control of the security and fire alarm system is carried out from the control panel (concentrator). The composition and characteristics of this equipment depend on the importance of the object, the complexity and branching of the alarm system. In the simplest case, control over the operation of the FSA consists of turning on and off sensors, fixing alarms. In complex, branched signaling systems, monitoring and control is carried out using computers.

Modern security alarm systems are based on the use of microprocessor control panels connected to the monitoring station via wired lines or a radio channel. The system can have several hundred security zones, for ease of management the zones are grouped into sections. This allows you to arm and disarm not only each sensor individually, but also a floor, a building, etc. Usually, a section reflects some logical part of an object, for example, a room or a group of rooms, united by some essential logical feature. The control and monitoring devices allow: control and monitoring of the state of both the entire fire alarm system and each sensor (on / off, alarm, failure, failure on the communication channel, attempts to open sensors or communication channel); analysis of alarms from various types of sensors; performance check of all system nodes; alarm recording; interaction of signaling with other technical means; integration with other security systems (CCTV, security lighting, fire extinguishing systems, etc.). Characteristics of conventional, addressable and analogue addressable fire alarm systems are given in Table. 4.

Table 4

Characteristics of conventional, addressable and analogue addressable fire alarm systems

2.5. Processing and logging of information, generation of control alarm signals for FSA

For processing and recording information and generating control alarm signals, various control and monitoring equipment can be used - central stations, control panels, control panels.

Alarm control panel (PKP) provides power to security and fire detectors via security and fire alarm loops, receives alarm notifications from sensors, generates alarm messages, and also transmits them to a centralized monitoring station and generates alarms for triggering other systems. Such equipment differs in information capacity - the number of monitored alarm loops and the degree of development of control and notification functions.

To ensure the compliance of the device with the chosen tactics of use, control panels of the security and fire alarm systems are distinguished for small, medium and large objects.

Usually, small objects are equipped with conventional systems that control several loops of the security and fire alarm system, and address and address-analog systems are used at medium and large objects.

Small information capacity control panel. Usually, these systems use security and fire alarm control devices, where the maximum permissible number of sensors is included in one loop. These control panels allow you to solve a maximum of tasks at a relatively low cost of completing the system. Small control panels have the versatility of loops according to their purpose, i.e. it is possible to transmit signal and control commands (alarm, security, fire modes of operation). They have a sufficient number of outputs to the central monitoring station, and allow keeping a record of events. The output circuits of small control panels have outputs with sufficient current to power the detectors from the built-in power supply, they can control fire or technological equipment.

Currently, there is a tendency to use instead of a small information capacity control panel a medium information capacity control panel. With this replacement, one-time costs almost do not increase, but labor costs when eliminating faults in the linear part are significantly reduced due to the exact determination of the place of failure.

Control panel of medium and large information capacity. For centralized reception, processing and reproduction of information from a large number of objects of protection, consoles and centralized surveillance systems are used. When using a device with a common central processor with a lumped or tree-like structure for laying loops (both addressable and non-addressable FSA), the incomplete use of the information capacity of the control panel leads to a certain increase in the cost of the system.

V address systems one address must correspond to one addressable device (detector). When using a computer, due to the absence of a central control panel with limited monitoring and control functions in the control panel units themselves, difficulties arise in backing up power supply and the impossibility of full functioning of the alarm system if the computer itself fails.

V analog addressable fire alarm control panels the price of equipment for one address (control panel and sensor) is twice as high as for analog systems. But the number of analogue addressable sensors in separate rooms in comparison with threshold (maximum) detectors can be reduced from two to one. Increased adaptability, information content, self-diagnostics of the system minimize operating costs. The use of addressable, distributed or tree-like structures minimizes the cost of cables and their laying, as well as the cost of maintenance up to 30-50%.

The use of the control panel for fire alarm systems has some specific features. The system structures used are subdivided as follows:

1) control panel with a concentrated structure (in the form of a single unit, with unaddressed radial loops) for fire alarm systems of medium and large information capacity. Such control panels are used less and less; it can be recommended to use them in systems with up to 10–20 loops;

2) control panel for analogue addressable fire alarm systems. Analogue addressable control panels are much more expensive than addressable threshold ones, but they have no particular advantages. They are easier to install, maintain and repair. They have significantly increased information content;

3) control panel for addressable fire alarm systems. Groups of threshold sensors form addressable control zones. The control panels are structurally and programmatically composed of complete functional blocks. The system is combined with detectors of any design and principle of operation, turning them into addressable ones. All devices in the system are usually addressed automatically. They allow combining most of the advantages of analogue addressable systems with the low cost of maximum (threshold) sensors.

To date, a digital-to-analog alarm loop has been developed that combines the advantages of analog and digital loops. It has more information content (in addition to ordinary signals, additional signals can be transmitted). The ability to transmit additional signals allows you to abandon the configuration and programming of alarm loops, to use several types of detectors in one loop at once when automatically setting up to work with any of them. This reduces the number of alarm loops required for each object. In this case, the control panel can simulate the operation of the alarm loop at the command of its detector in order to transmit information to another control panel of the same type acting as central monitoring console (Monitoring station).

The monitoring station can not only receive information, but also transmit basic commands. This security and fire alarm device does not need to be specially programmed (the setting is automatic, similar to the function in the "Plug & Plau" computer). Consequently, no highly qualified specialists are required for maintenance. In one fire loop, the device receives signals from heat, smoke, manual detectors, engineering systems control sensors, distinguishes between the operation of one or two detectors, and can even work with analog fire detectors. The alarm loop address becomes the address of the room, and without programming the parameters of the control panel or detectors.

2.6. OPS actuators

OPS actuators must ensure the implementation of the specified response of the system to an alarm event. The use of intelligent systems makes it possible to carry out a set of measures related to fire elimination (fire detection, alert special services, inform and evacuate personnel, activate the fire extinguishing system), and carry them out in a fully automatic mode. For a long time, automatic fire extinguishing systems have been used, releasing a fire-suppressing agent into the protected room. They can localize and eliminate fires before they develop into a real fire, and act directly on the fires. Now there are a number of systems that can be used without prejudice to technology (including those with electronic filling).

It should be noted that connecting automatic fire extinguishing installations to security and fire control panels is somewhat ineffective. Therefore, experts recommend using a separate fire control panel with the ability to control automatic fire extinguishing installations and voice notification.

Autonomous fire extinguishing systems it is most effective to install in places where fire is especially dangerous and can cause irreparable damage. Autonomous installations necessarily include devices for storing and supplying fire extinguishing agents, devices for detecting fire centers, automatic start devices, means for signaling a fire or triggering an installation. By the type of fire-suppressing agent, the systems are subdivided into water, foam, gas, powder, aerosol.

Sprinkler and deluge automatic fire extinguishing systems are used to extinguish fires with water on large areas with finely sprayed streams of water. In this case, it is necessary to take into account the possibility of indirect damage associated with the loss of consumer properties of equipment and (or) goods when wet.

Foam fire extinguishing systems they use air-mechanical foam for extinguishing and are used without restrictions. The system set includes a foam mixer complete with a strapping and a bladder tank with an elastic container for storing and dosing foam concentrate.

Gas fire extinguishing systems used to protect libraries, computing centers, bank depositories, small offices. In this case, additional costs may be required to ensure proper tightness of the protected object and to carry out organizational and technical measures for the preventive evacuation of personnel.

Powder fire extinguishing systems are used where it is necessary to localize the fire source and ensure the safety of material values ​​and equipment not damaged by fire. Compared to other types of autonomous fire extinguishers, powder modules are distinguished by their low price, ease of maintenance, and environmental safety. Most of the powder fire extinguishing modules can operate both in the electric start mode (according to the signals of fire sensors) and in the self-start mode (when the critical temperature is exceeded). In addition to the autonomous mode of operation, as a rule, they provide for the possibility of manual start. These systems are used to localize and extinguish fire centers in confined spaces and in the open air.

Aerosol fire extinguishing systems- systems that use fine solid particles for extinguishing. The only difference between an aerosol fire extinguishing system and a powder one is that at the moment of operation, an aerosol is released, and not a powder (larger than an aerosol). These two fire extinguishing systems are similar in function and principle of operation.

The advantages of such a fire extinguishing system (such as ease of installation and installation, versatility, high extinguishing capacity, efficiency, use at low temperatures and the ability to extinguish energized materials) are primarily economic, technical and operational.

The disadvantage of such a fire extinguishing system is the danger to human health. The service life is limited to 10 years, after which it must be dismantled and replaced with a new one.

Another important element of the FSA is alert notification. Alarm alert can be carried out by manual, semi-automatic or automatic control. The main purpose of the warning system is to alert people in the building about a fire or other emergency and control their movement to a safe area. The notification of a fire or other emergency should be significantly different from the notification of a burglar alarm. The clarity and uniformity of the information presented in the voice announcement is critical.

Warning systems differ in composition and principle of operation. Block operation control analog warning system is carried out using a matrix control unit. Control digital warning system usually implemented using a computer. Local warning systems a previously recorded text message is broadcast in a limited number of rooms. Usually, such systems do not allow for prompt evacuation control, for example, from a microphone console. Centralized systems automatically broadcasts the recorded emergency message to predefined zones. If necessary, the dispatcher can transmit messages from the microphone console ( semi-automatic broadcast mode).

Most fire alarm systems are modular. The procedure for organizing the warning system depends on the characteristics of the protected object - the architecture of the object, the nature of production activities, the number of personnel, visitors, etc. and light signals to all rooms of the building). In notification systems of the 3rd, 4th and 5th types, one of the main methods of notification is speech. The choice of the number and power of switching on the sirens in a particular room directly depends on such fundamental parameters as the noise level in the room, the size of the room and the sound pressure of the installed sirens.

As a source of audible alarms, loud bangs, sirens, speakers, etc. are used. The most frequently used light displays are “Exit” light boards, “Direction of movement” light indicators, and flashing light annunciators (strobe flashes).

Typically, alarms control other security features. For example, in the event of a non-standard situation, advertisements that seem ordinary at first glance can be transmitted between advertisements, which inform the security service and the personnel of the enterprise about incidents with conventional phrases. For example: "Security guard on duty, call 112". The number 112 could represent a potential attempt to carry unpaid clothing out of the store. In emergency situations, the warning system should provide control over the evacuation of people from premises and buildings. In normal mode, the notification system can also be used to transmit background music or advertisements.

Also, the notification system can be hardware or software integrated with the access control system, and upon receiving an alarm pulse from the sensors, the notification system will issue a command to open the doors of additional emergency exits. For example, in the event of a fire, an alarm triggers the automatic fire extinguishing system, turns on the smoke exhaust system, turns off the forced ventilation of the premises, turns off the power supply, calls back to the specified phone numbers (including emergency services), turns on emergency lighting, etc. And when an unauthorized entry into the premises is detected, the automatic door blocking system is triggered, SMS messages are sent to the cell phone, messages are sent by pager, etc.

Communication channels in the FSA system can be specially laid wired lines or telephone lines, telegraph lines and radio channels already available at the facility.

The most common communication systems are multicore shielded cables, which are placed in metal or plastic pipes, metal hoses to increase the reliability and safety of the signaling operation. The transmission lines that carry the signals from the detectors are physical loops.

In addition to traditional wired communication lines, fire alarm systems today offer security and fire alarms that work with the use of a radio communication channel. They have high mobility, commissioning is minimized, quick installation and dismantling of the fire alarm system is ensured. Setting up radio channel systems is very simple, since each radio button has its own individual code. Such systems are used in situations where it is impossible to stretch a cable or it is not financially justified. The secrecy of these systems is combined with the ability to easily expand or reconfigure them.

Also, we must not forget that there is always a danger of deliberate damage to the electrical circuit by an intruder or a power outage due to an accident. Yet security systems must remain functional. All security and fire alarm devices must be provided with uninterruptible power supply. The power supply of the security alarm system must be redundant. In the absence of voltage in the network, the system must automatically switch to backup power.

In the event of a power outage, the functioning of the alarm does not stop due to the automatic connection of the backup (emergency) power source. To ensure uninterrupted and protected power supply of the system, uninterruptible power supplies, batteries, backup power supply lines, etc. are used. The use of a centralized backup power source leads to losses in the used capacity of backup batteries, to additional costs for wires of increased cross-section, etc. on the object of backup power supplies does not allow monitoring their status. To implement their control, the power supply is included in the address system of the FSA with an independent address.

It is necessary to provide for the possibility of duplicating power supply using various electrical substations. It is also possible to implement backup power line from your generator. Fire safety standards require that the security and fire alarm system can remain operational in the event of a power failure during the day in standby mode and at least three hours in alarm mode.

Currently, a complex application of fire alarm systems is used to ensure the security of an object with a high degree of integration with other security systems such as access control systems, video surveillance, etc. When building integrated security systems, problems of compatibility with other systems appear. To combine security and fire alarm systems, warning, control and management of access, CCTV, automatic fire extinguishing installations, etc., software, hardware (which is the most preferable) and the development of a single finished product are used.

Separately, it should be mentioned that the Russian SNiP 2.01.02-85 also requires that the evacuation doors of buildings do not have locks that cannot be opened from the inside without a key. In such conditions, special handles are used for emergency exits. Anti-panic handle ( Push-Bar) is a horizontal bar, pressing on which at any point causes the door to open.

Similar publications