Stairs.  Entry group.  Materials.  Doors.  Locks.  Design

Stairs. Entry group. Materials. Doors. Locks. Design

» Security and fire alarm systems. Fire alarm equipment Use of fire alarm system

Security and fire alarm systems. Fire alarm equipment Use of fire alarm system

The head of an enterprise or the owner of any real estate must take care of protecting his property from the negative impact of man-made disasters and intruders. Ensuring the safety of the premises and all objects located in it can be ensured not only by specially trained people standing near the doors. Modern technologies make it possible to ensure the safety of the premises thanks to specially designed interconnected subsystems into one system. Many people are familiar with fire response systems and burglar alarm.

Security and fire alarms: concept and its tasks

An integrated system that includes fire and security alarm systems is called a fire and security system. This system is becoming very popular today. Most often, the system is part of an integrated security complex. The main function of security fire alarm provided by GOST 2642-84. Its main task is to receive, process and transmit to in the prescribed manner information about a fire that has occurred at a protected facility or the entry of unauthorized people into it.

The main functions of the fire security system are:

  • monitoring the condition of the territory throughout the day;
  • detection of even the slightest fire at the facility;
  • determining the exact location of the fire or intruder penetration;
  • information must be provided in an understandable form;
  • responding to attempts to hack and break the system;
  • response to detection device malfunctions.

The security and fire alarm system is a complex system and is quite expensive, but according to consumer reviews and experiments, it is the only reliable electronic protection device.

Modern security equipment includes several subsystems that depend on executive functions:

  • security - the device reacts to any external penetration;
  • fire - the device responds to any signs of fire;
  • alarm – the device calls for the necessary help if a signal of an unexpected attack appears;
  • emergency – the device gives a signal when certain emergency situations occur: gas leak, water breakthrough, water overflow, etc.

Each subsystem has its own strictly established goals. All subsystems are combined into one security system by integrating with each other.

What does an alarm system consist of that provides protection against fire and theft?

The components of the fire and intruder control system are:

  • sensors that are receivers of danger signals;
  • equipment that receives a danger signal;
  • elements that notify of an emerging danger
  • communication installations;
  • autonomous power supply (generator, battery);
  • programs that ensure the correct operation of the device.

How the alarm works

The principle of operation of a security and fire alarm system is very simple. Sensors become the main receivers of information about a fire, the penetration of thieves or ill-wishers. About a fire or attack, sensor mechanisms transmit information to the control panel, which is responsible for collecting data, and in more complex integrated systems, information is transmitted to the control panel. Once the information reaches its destination, the software triggers the system to respond.

The response itself depends on the system hardware. If the alarm system is supplemented with access control system, then thanks to the transmission of information, locks, gates, turnstiles begin to respond to the signal. During a fire, additional escape doors are opened to avoid preventing people from leaving the danger zone.

If the system is equipped with an automatic fire extinguishing program, then in case of danger it will necessarily work together with the smoke removal function. It is important when operating a fire alarm to block the power supply, which protects against additional danger.

When thieves enter and receive a signal, the system launches its protection program depending on the type of alarm.

Types of security and fire systems

The modern equipment market presents a variety of choices for security and fire alarms. Consumers can choose from systems with a simplified security program, systems with additional sensors for monitoring environmental standards that respond to excess gas, water leakage, temperature or humidity levels.

The main distribution of signaling occurs on:

  • Non-addressed;
  • Address;
  • Addressed surveys;
  • Non-survey targeted;
  • Combined.

This classification is based on differences in the principle of operation of the alarm.

Based on the principle of operation of hazard detectors, hazards are divided into:

  • ultrasonic;
  • light detectors;
  • vibration detectors;
  • radio wave;
  • acoustic;
  • infrared;
  • combined.

The following types of sensors are installed in the fire system:

  • smoke responsive;
  • responsive to room temperature;
  • flame reactive;
  • gas responsive;
  • multisensory, which includes responding to 4 signs of fire;

All sensors are different from each other, have different degrees of sensitivity and response speed.

The following types of detectors are known in the security system:

  • sensors that respond to changes in the distance between the magnet on the doors (windows) and the reed switch;
  • detectors that respond to impact or surface damage;
  • sensors that respond to any movements inside the security object;
  • detectors that respond to approaching or touching a protected object.

Based on the way they react to a particular problem, sensors are divided into active and passive.

Based on the location of the alarm system, the following are distinguished:

  • Internal;
  • External;
  • Combined.

There is a division of the system depending on the equipped sensors:

  1. According to the method of obtaining information, they are distinguished: analog and threshold;
  2. By location of sensors relative to the room: internal and external;
  3. According to the method of responding to changes in space: linear, surface, volumetric;
  4. Depending on the response to individual objects: local and point;
  5. By action factor: thermal, light, manual, combined, ionization;
  6. Depending on the physical impact: closing, capacitive, radio-beam, seismic.

Result of the system

Thanks to the activity of security and fire alarms, many objects are protected from sudden attacks, intrusions, accidents and fires. According to statistics of unauthorized intrusions into facilities in our country, this system is the safest. It is enough to analyze the statistics to understand the importance of signaling:

  • 50% or more percent of unauthorized entry into facilities that have free access for working personnel and visiting clients;
  • About 25% of the territories were targets of illegal entry, while they were equipped with mechanical security elements;
  • 20% of facilities protected by the access control system were subject to illegal entry;
  • 5% of territories equipped with complex electronic security systems were subject to illegal actions by intruders.

Managers must be concerned about protecting their facilities and ensuring high level reliability by organizing a multi-level protection system.

In this case, alarm sensors are installed at several levels:

  • along the outer perimeter of the territory;
  • on windows and doors;
  • in interior spaces;
  • on objects that are considered the most important in the protected area: safes, cabinets, drawers.

Each sensor installation point must be connected to its own separate cell of the device, which monitors the signal from the sensor and responds to it. This allows you to avoid an attacker from bypassing a single point, and also to receive a timely signal about the very first signs of a fire, attack or emergency.

Send your good work in the knowledge base is simple. Use the form below

Students, graduate students, young scientists who use the knowledge base in their studies and work will be very grateful to you.

ABSTRACT

Subject:" Technical means of security and fire alarm systems"

Introduction

1. Technical means of security and fire alarms, their classification and purpose

1.1 Basic terms and definitions

1.2 Classification of technical alarm systems, security and fire detectors

2. Organization of security of property owners using security alarms

3. Purpose, technical characteristics, operating principle of control and control devices

3.1 Purpose of control and control devices

3.2 Typical control panel devices, conditions of use

Conclusion

Bibliography

Introduction

In this work, we will consider the characteristics of technical means of security and fire alarm systems permitted for use, and technical means of fire alarm systems recommended for use at present by the Main Military District of the Ministry of Internal Affairs of Russia, as well as the technical means of security most widely used previously.

We will also consider organizing the protection of property owners using security alarms in open areas, buildings, premises and individual objects. Let us describe the organization of transmission of information about the activation of an alarm. We list the types of control devices and conditions of use.

1 Technical means of security and fire alarms, their classification and purpose

1.1 Basic terms anddefinitions

Security and fire alarm system (FS)- this is the receipt, processing, transmission and presentation in a given form to consumers of information about penetration of protected objects and fire on them using technical means. The consumer of information is the personnel who are entrusted with the functions of responding to alarm and service notifications coming from protected objects.

By notification In security technology, a message is called that carries information about controlled changes in the state of a protected object or technical security device and is transmitted using electromagnetic, electrical, light and (or) sound signals. Notifications are divided into alarm and service notifications. An alarm notification contains information about intrusion or fire, a service notification contains information about arming, disarming, equipment malfunction, etc.

Protected object (OO) is a separate room containing material or other valuables, equipped technical means OPS, or a complex of premises dispersed within one or several buildings, united by a common territory and protected by security units. Places of possible intrusion into the PA or individual protected areas are equipped with various detectors, which are included in the alarm loop.

Protected area- this is a part of a protected object, controlled by one alarm loop or a combination of them.

Security and fire alarm complex- this is a set of jointly operating technical means of security, fire and (or) security and fire alarm systems installed at a protected facility and united by a system utility networks and communications.

Security (fire) detector- technical means of fire alarm system for detecting penetration (fire), attempted penetration or physical impact exceeding the normal level, and generating a notification about penetration (fire). The security and fire detector combines security and fire functions.

Reception and control device (PPK)- this is a technical means of security and fire alarm systems for receiving notifications from detectors (alarm loops) or other control panels, converting signals, issuing notifications for direct perception by a person, further transmitting notifications and issuing commands to turn on the sirens. Depending on the security system that includes the alarm system complex, another control panel can be connected to the control panel output (in the case of autonomous security if there is an autonomous security point) or an object terminal device (in the case of centralized security).

Security and fire alarm- this is a technical means of fire alarm system designed to notify people about penetration, attempted penetration and (or) fire.

Autonomous security system consists of alarm system complexes with access to sirens and (or) another control panel installed at an autonomous security point.

Autonomous Security Point (ASC)- this is a point located at a protected facility or in close proximity to it, serviced by the facility’s security service and equipped with technical means of displaying information about intrusion and (or) fire in each of the controlled premises (zones) of the facility for direct human perception.

Notification transmission system (SPI)- this is a set of jointly operating technical means for transmitting via communication channels and receiving at a centralized security point notifications about intrusion into protected objects and (or) a fire at them, service and control and diagnostic notifications, as well as for transmitting and receiving telecontrol commands (if available) return channel).

SPI provides for the installation of terminal devices (TD) at facilities, repeaters (R) at ATS cross-connections, in residential buildings and other intermediate points, and central monitoring consoles (CMS) at centralized security points.

UO, R, monitoring station are components of the SPI. The MA is installed at a protected facility to receive notifications from the control panel.

Central security point (CSP) is a control center for centralized protection of a number of dispersed objects from intrusion and fire using SPI.

Depending on the characteristics of the facility (length, number of premises, number of floors, etc.) and the amount of material assets located at the facility, its protection can be implemented through one or more alarm loops. In the event that the security structure of an object includes several loops placed in such a way that when an intruder enters the facility and moves towards material assets, he needs to overcome several protected zones controlled by various loops with exits to separate monitoring station numbers, the security should be considered as multi-line . Thus, a loop or a set of loops that control protected zones along the path of the intruder to the material assets of the organization and have access to a separate monitoring station number is called a signaling line, and the set of protected zones controlled by a signaling line is a security line.

1.2 Classification of technical signaling equipment, security and fire detectors

Technical means of security and fire alarm systems, designed to obtain information about the state of monitored parameters at a protected facility, receive, convert, transmit, store, display this information in the form of sound and light alarms, in accordance with OST 25 829-78 are classified into two features: areas of application and functional purpose.
According to the area of ​​application, vehicles are divided into security, fire and security and fire; by functional purpose - on technical detection means (detectors) designed to obtain information about the state of monitored parameters and warning systems intended for receiving, converting, transmitting, storing, processing and displaying information (SPI, PPK and annunciators).

In accordance with GOST 26342-84, security and fire detectors are classified according to the following parameters.

By purpose: for indoor spaces, for open areas and perimeters of objects.

By type of zone controlled by the detector: point, linear, surface, volumetric.

According to the principle of operation, security detectors are divided into: ohmic, magnetic contact, shock contact, piezoelectric, capacitive, ultrasonic, optical-electronic, radio wave, combined.

By number of detection zones: single-zone, multi-zone.

According to their range, ultrasonic, optical-electronic and radio-wave security detectors for enclosed spaces are divided into: short range - up to 12 m, medium range - from 12 to 30 m, long range - over 30 m.

Based on their range, optical-electronic and radio-wave security detectors for open areas and object perimeters are divided into: short range - up to 50 m, medium range - from 50 to 200 m, long range - over 200 m.

According to their design, ultrasonic, optical-electronic and radio-wave security detectors are divided into: single-position transmitter (emitter) and receiver are combined in one block (there may be several transmitters and receivers in one block); two-position transmitter (emitter) and receiver are made in the form of separate blocks; multi-position - more than two blocks in any combination.

According to the method of power supply they are divided into: non-current consuming (a “dry” contact is used); powered from the AL, from an internal autonomous power supply, from an external DC source with a voltage of 12-24 V, from the network alternating current voltage 220 V;

Security and fire detectors According to the principle of operation, they are divided into: magnetic contact, ultrasonic and optical-electronic. Based on the number of detection zones, range and design, security and fire detectors are classified similarly to security detectors.

2. Organizationprotection of property ownersusing a burglar alarm

Protection of the perimeter of the territory and open areas

Technical means of perimeter security alarm can be placed on the fence, buildings, structures, structures or in the exclusion zone. Security detectors must be installed on walls, special poles or racks that ensure the absence of vibrations.

The perimeter, with gates and wickets included in it, should be divided into separate protected areas (zones) with their connection by separate alarm loops to a small-capacity control panel or to an internal security console installed at the checkpoint or in a specially designated security room of the facility. The length of the section is determined based on security tactics, technical characteristics of equipment, external fencing configuration, line of sight conditions and terrain, but not more than 200 m for convenience technical operation and responsiveness.

The main gate should stand out as a separate section of the perimeter. Spare gates and wickets must be included in the section of the perimeter on which they are located. Medium and large capacity control panels (concentrators), SPI, automated notification transmission systems (ASPI) and radio notification transmission systems (RSPI) can be used as internal security panels. Internal security consoles can operate both with direct personnel on duty around the clock, and autonomously in the “Self-Security” mode.

Installation of security detectors on the top of the fence should only be done if the fence is at least 2 m high.

At the checkpoint, in the security room, you should install technical devices graphic display of the protected perimeter (computer, light board with a mnemonic diagram of the protected perimeter and other devices). All equipment included in the perimeter security alarm system must be tamper-evident. Open areas with material assets on the territory of the facility must have a warning fence and be equipped with volumetric, surface or linear detectors of various operating principles.

Protection of buildings, premises, individual items. T

Objects of subgroups AI, AII and BII are equipped with a multi-terminal security alarm system, objects of subgroup BI are equipped with a single-terminal alarm system.

The first line of security alarm, depending on the type of alleged threats to the facility, is blocked by: wooden entrance doors, loading and unloading hatches, gates - for “opening” and “destruction” (“break”); glazed structures - for “opening” and “destruction” (“breaking”) of glass; metal doors, gates - for “opening” and “destruction”, walls, ceilings and partitions that do not meet the requirements of this Guiding Document or behind which the premises of other owners are located, allowing for hidden work to destroy the wall - for “destruction” (“break” ), shells of valuable storage facilities - for “destruction” (“break”) and “impact”; grilles, blinds and other protective structures installed with outside window opening - for “opening” and “destruction”; ventilation ducts, chimneys, places of input/output of communications with a cross-section of more than 200x200 mm - for “destruction” (“break”);

Instead of blocking glazed structures for “destruction”, walls, doors and gates for “break” and “impact”, it is allowed, in justified cases, to block these structures only for “penetration” using volumetric, surface or linear detectors of various operating principles . It should be borne in mind that the use of passive optical-electronic detectors for these purposes ensures the protection of premises only from direct penetration of an intruder.

If it is impossible to block the entrance doors of the openings (vestibules) with early detection technical means according to clause 5.6.5, it is necessary to install security detectors in the doorway between the main and additional doors that detect the entry of an intruder. These detectors should be included in one door lock security alarm loop. To eliminate possible false alarms when arming an object, the specified alarm loop must be output to the control panel, which has a delay for arming the object.

Detectors that block entrance doors and non-openable windows of premises should be included in different alarm loops to be able to block windows in daytime when the door security alarm is turned off. Detectors that block entrance doors and openable windows may be included in one alarm loop.

The second line of security alarms protects the volume of premises against “intrusion” using volumetric detectors of various operating principles. Indoors large sizes with a complex configuration that requires the use of a large number of detectors to protect the entire volume, it is allowed to block only local areas (vestibules between doors, corridors, approaches to valuables and other vulnerable places)

The third line of the security alarm in the premises blocks individual objects, safes, metal cabinets in which valuables are concentrated. Technical security equipment installed in buildings must fit into the interior of the premises and, if possible, be installed hidden or camouflaged.

In different areas it is necessary to use security detectors operating on different physical principles of operation. The main types of detectors that provide protection to the premises of the facility and its structures from the intended method of criminal influence.

The number of security alarm loops should be determined by the security tactics, the size of buildings, structures, structures, number of storeys, the number of vulnerable spots, as well as the accuracy of localization of the penetration point for prompt response to alarm signals.

The perimeter of a protected building, as a rule, should be divided into protected zones (facade, rear, sides of the building, central entrance and other areas), separating them into independent alarm loops and issuing separate signals to the control panel or internal security console of the facility.

To strengthen security and increase its reliability, additional detectors - traps - should be installed at sites. Trap signals are output via independent or, in the absence of technical capabilities, via existing security alarm loops. Each room of subgroups AI and AII must be equipped with independent security alarm loops. Premises of subgroups BI and BII, assigned to one materially responsible person, owner, or united according to some other characteristics, must also be equipped with independent security alarm loops, and, for ease of operation, no more than five adjacent premises located on the same floor should be blocked with one loop .

In premises where personnel must be present 24/7, separate sections of the perimeter of the premises must be equipped with a security alarm, as well as safes and metal cabinets for storing valuables and documents.

Organization of transmission of information about alarm activation.

The number of security alarm lines displayed at the central monitoring station by separate numbers is determined by a joint decision of the facility management and the private security unit based on the category of the facility, risk analysis and potential threats to the facility, the capabilities of integration and documentation by the security control panel (internal security console or terminal device) of incoming information, as well as the procedure for organizing the duty of security personnel at the facility.

The minimum required number of security alarm lines output to the central monitoring station from the entire protected facility should be for a subgroup.

BI - one combined boundary (the first is the perimeter);

AI, BII - two combined boundaries (the first is the perimeter and the second is the volume)*.

In addition, if there are special premises at the facility (subgroup AII, safe rooms, weapons rooms and other premises that require increased protection measures), the security alarm lines of these premises are also subject to output to the central monitoring station.

If there is an internal security console at the facility with round-the-clock duty of its own security service or a private security company, the following is output to the monitoring station: one common signal that unites all the boundaries of the facility’s security alarm system, with the exception of the boundaries of the facility’s special premises; security alarm boundaries (perimeter and volume) of special premises. At the same time, registration of all incoming information of each premises security line on the internal security console must be ensured.

If there is an internal security console at the facility with round-the-clock duty of private security officers (Micro-OCS), all security alarm lines of all premises of the facility (including special premises) are connected to the internal security console, which ensures automatic registration of all incoming information, and one is output from it general signal to the monitoring station.

At facilities where only special premises are protected, all security alarm lines of these premises are subject to output to the central monitoring station.

When protecting only individual devices (ATMs, slot machines, distribution cabinets and other similar devices), one security alarm line is displayed at the monitoring station (blocking for “destruction” and “opening”).

If there is no technical ability to comply with the requirements at the protected facility, issues of removing security alarm lines are resolved by the private security unit on a case-by-case basis. Security alarm lines must be output to the central monitoring station from the internal security console, control panel or terminal device, which ensures that the alarm condition is stored and recorded on a remote light (sound) siren or indicator. For residential sector facilities, it is allowed to use terminal devices and facility units without corresponding storage of the alarm state and its recording.

Notifications from alarm loops are output by one combined signal to the control center and/or to the control room of the internal affairs bodies directly or through the control panel, SPI terminal device, or internal security console.

Security and alarm notifications can be transmitted to the monitoring station via specially laid communication lines, free telephone lines or switched during the security period, a radio channel, busy telephone lines using compression equipment or informant SPI via a dial-up telephone connection (the “auto-dial” method) with mandatory channel monitoring between the protected object and the central monitoring station. From protected facilities, “auto-dial” must be carried out to two or more telephone numbers.

To prevent unauthorized persons from accessing detectors, control panels, junction boxes, and other security equipment installed at the facility, measures must be taken to mask them and hidden installation. The terminal block covers of these devices must be sealed (sealed) by an electrician of the security service or an engineer and technical worker of the private security unit, indicating the name and date in the technical documentation of the facility.

Distribution cabinets intended for crossing alarm loops must be locked, sealed and have locking (anti-tamper) buttons connected to separate numbers of the internal security console “without the right to disconnect”, and in the absence of an internal security console - to the central monitoring station as part of the alarm system .

3 . Onmeaning, technical characteristics,principleoperation of control panels

3.1 Purpose of reception and control devices

Reception and control devices in security and fire alarm systems are an intermediate link between the object's primary means of detecting intrusion or fire (detectors) and notification transmission systems. In addition, control panels can be used in stand-alone mode with the connection of sound and light alarms at a protected facility. Depending on the purpose, control panels are divided into security, security-fire, security-route, universal, programmable.

PPK perform the following main functions:

Reception and processing of signals from detectors;

Power supply for detectors (via AL or via a separate line);

Alarm state monitoring;

Transmitting signals to the monitoring station;

Control of sound and light alarms;

Providing procedures for arming and disarming an object.

The main characteristics of the PPC are information capacity and information content. Security control systems with low information capacity are designed, as a rule, to organize the security of one room or a small object. Large-capacity control panels can be used to combine alarm systems for a large number of premises or security lines of one facility (concentrators), as well as as remote controls for autonomous facility security systems. For certain types of objects, there are also special types of security control systems, for example, for the protection of apartments, fire and explosion hazardous premises. Based on the method of organizing communication with detectors, control panels are divided into wired and wireless (radio channel).

According to climatic design, PPKs are produced for heated and unheated premises.

3 .2 Typical PPK, conditions of usePPC of low information capacity

"WITHbeeped-3 M-1","WITHbeeped-3 1 » are the earliest developments and perform the simplest functions. The placement of an object under protection is carried out using the “open door” tactic (there is no time delay for entry or exit). There is no power supply circuit redundancy.

Single-loop reception and control devices"Signal-37 A","WITHignal37M», "WITHbeeped-3 7YU» have a tactic of putting the object under guard “with the door open.” There is no redundant power supply circuit, but in the event of a power failure, the control panel switches the alarm loop to direct control from the monitoring station and back without issuing an alarm.

"UOTS-1-1" has a tactic of placing an object under guard “with the door open.” The device has a redundant main power circuit and two outputs to the monitoring station (normally closed and normally open relay contacts). It is allowed to switch on security and fire current-consuming detectors in the AL with a total current consumption of no more than 13 mA and a current limitation of no more than 20 mA.

Single-loop reception and control device"UOTS-M" has a tactic of placing an object under guard “with the door open.” The device provides redundancy of the main power supply circuit. It is allowed to include security current-consuming detectors in the AL. The device provides separate issuance to the monitoring station of notifications about violation of the alarm system and about deviation of its parameters from the established limits.

Single-loop reception and control devices"WITHbeeped-4 1 », "WITHignal41M» designed to protect apartments. The object is placed under security using the “closed door” tactic (there is a temporary delay for entry and exit). There is no redundant power supply circuit, but in the event of a power failure, the control panel switches the alarm loop to direct control from the monitoring station and back without issuing an alarm. The device provides: control of alarm system serviceability, indication of arming, control of entry into a guarded apartment.

Single-loop reception and control device"WITHbeeped-4 5 » Designed for apartment security. The placement of an object under protection is carried out using the “closed door” tactic. There is no redundant power supply circuit, but in the event of a power failure, the control panel switches the alarm loop to direct control from the monitoring station and back without issuing an alarm. The device provides: monitoring the serviceability of the AL; indication of arming; control of entry into a guarded apartment.

The device has three operating modes:

Centralized security with alarm switching to control by the monitoring station when the supply voltage is turned off. In this case, two options for issuing an alarm notification by the device can be implemented - the alarm notification is issued constantly, the device is not restored to standby mode regardless of the alarm state, the alarm notification is issued for a limited time, the device is restored to standby mode 6±4 s after the alarm is restored;

Centralized security without switching the alarm system to control by the monitoring station when the supply voltage is turned off. In this case, both options for issuing an alarm notification are implemented;

Autonomous security (without connection to the monitoring station). In this case, there can be two options for issuing an alarm notification - the alarm notification is issued constantly, the device is not restored to standby mode, regardless of the alarm state; an alarm notification is issued within 3.5 minutes. regardless of the state of the AL.

Single-loop reception and control device"WITHSignal-VK» has a tactic of placing an object under guard “with the door open.” The device provides: redundancy of the main power supply circuit; providing power supply to active detectors via ±12 V output; setting a delay for turning on the sounder (up to 30 s) after issuing an alarm; alarm notifications when turned on for 1 - 4 minutes. not fixed; maintaining operability when the mains and backup supply voltages are reduced to 140 V and 12 V, respectively; control of the device status using a built-in indicator when operating from a backup power source. It is allowed to include security and fire current-consuming detectors in the AL with a total current consumption of no more than 1.2 mA and a current limitation of no more than 20 mA.

Single-loop reception and control device"WITHSignal-VK-R" similar in its characteristics to the Signal-VK PPK. A distinctive feature of the Signal-VK-R PPK is the ability to control the device via a radio channel (up to 30 m) using a key fob transmitter. At the same time, the device provides: remote arming and disarming from outside the protected object; remote re-taking of an object from the outside without opening it; transmitting an alarm signal to the device using a radio key fob; installing the device in a hidden, inaccessible place.

"WITHSignal-VK-4" used to replace up to four single-loop devices or organize multi-line security at a facility. The device has an additional input for connecting an encryption device or a remote switch for remote arming and disarming; this also allows you to install the device in hidden, inaccessible places. The placement of an object under protection is carried out using both “open door” and “closed door” tactics. The device provides: redundancy of the main power supply circuit; providing power supply to active detectors via ±12 V output; alarm notifications when turned on for 14 minutes. not fixed; maintaining operability when the mains supply voltage drops to 140 V; selection of input signal by duration; monitoring slow changes in the resistance of the loop and fixing the “Alarm” signal in case of a rapid change in the resistance of the loop; control of the device status using built-in indicators; four independent outputs to the monitoring station. It is allowed to include security and fire current-consuming detectors in the AL with a total current consumption of no more than 1.2 mA and a current limitation of no more than 20 mA. With the “ShS3” and “ShS4” jumpers installed, the device controls all four alarm loops only in the “Security” mode; with the jumpers removed, ShS3 and ShS4 are set to the “without the right to remove” mode, i.e. control of these ALs also in the “Removal” mode.

Single-loop reception and control device"WITHsignal-SPI» has a tactic of placing an object under guard “with the door open.” The device provides: redundancy of the main power supply circuit; providing power supply to active detectors via ±12 V output; setting a delay for turning on the sounder (up to 30 s) after issuing an alarm; alarm notifications when turned on for 14 minutes. not fixed; maintaining operability when the mains and backup supply voltages are reduced to 140 V and 12 V, respectively; monitoring the status of the device using the built-in indicator, including when operating from a backup power source; two outputs to the monitoring station (normally closed and normally open relay contacts). In the AL it is allowed to turn on security and fire current-consuming detectors with a total current consumption of no more than 1.2 mA and a current limitation of no more than 20 mA in autonomous operation mode.

The device operates in two modes: centralized security (joint monitoring of the state of alarm system PPK and SPI); autonomous security (monitoring the state of the alarm system only PPK).

Five-line control panel"TOSCREW» used to replace up to five single-loop devices or organize multi-line security at a facility. The placement of an object under protection is carried out using the “closed door” tactic. The device provides: redundancy of the main power supply circuit; in the event of a loss of mains and backup power, the control panel switches ShS1 and ShS5 to direct control of the monitoring station and back without issuing an alarm (monitoring station outputs 1 and monitoring station 2, respectively); alarm notifications when turned on for 1.52 minutes. not fixed; maintaining operability when the mains supply voltage drops to 140 V; monitoring the status of the device using a remote display panel, including when operating from a backup power source; two switched independent outputs to the monitoring station; indication that the object is under protection; setting the mode “without the right to switch off” for ShS1, ShS2 and ShS5. It is allowed to include security and fire current-consuming detectors in the AL.

Four-line receiving and control device"AKCORD» used to replace up to four single-loop devices or organize multi-line security at a facility with variable operating algorithms. The device has an additional input for connecting an encryption device or a remote switch. The placement of an object under protection is carried out using both “open door” and “closed door” tactics. The device provides: redundancy of the main power circuit using a built-in 12 V battery or external power supplies of 12 V and 24 V; providing power to active detectors via two ±12 V outputs, one output being switchable; maintaining operability when the mains supply voltage drops to 160 V; monitoring the status of the alarm system using built-in indicators; two relay outputs to the monitoring station (normally closed contact) and two high-frequency outputs organized according to the type of Atlas-3 and Atlas-6 devices; for transmitting notifications over busy telephone lines, storing alarm violations. It is allowed to include security and fire current-consuming detectors in the AL. The device operates in three modes: standby (“Removal”) - control of alarm and fire alarm systems; “Security” (“Capture”) - control of all alarm systems; "Anxiety."

Changes in the device operating algorithms and AL operating modes are set using technological jumpers installed on the MPK, MPA and MVU boards.

Single-loop reception and control device"ANDinterval» Designed for technical control of the performance of duty by facility security personnel. The device provides: redundancy of the main power supply circuit; including a built-in power supply (battery type 3336) to power the memory of the counters for operating hours and the number of route passes; indication of operating time (up to 31 hours) and number of missed routes (up to 7); ability to set patrol time (15, 30, 45, 60 min) and pause time between patrols (30, 60, 90, 120 min); relay output to the monitoring station; transmission of an alarm notification when a route is missed or when any “MI” button or the “Call the police” button is pressed three times.

Installation of the control panel and power supply is carried out on the wall of the room, excluding direct contact sun rays to the front panel. The distance between the power supply and the control panel should not exceed 10 m. The MI is installed in a place convenient for operation.

PPC of medium information capacity

Control and reception device"Rubin-3" designed for organizing autonomous security of large objects with the ability to transmit a generalized “Alarm” signal to the monitoring station. The device consists of a 10-number base and 10-number linear units, allowing the capacity to be increased to 50 numbers. The control panel provides redundancy of the main power supply.

Control and reception device"Rubin-6" designed for organizing autonomous security of large objects with the ability to transmit generalized signals “Alarm”, “Fire”, “Fault” to the monitoring station. The maximum number of loops is 20. The device provides: main power backup; maintaining operability when the mains supply voltage drops to 140; “self-protection” mode along the 20th Highway with surrender under guard using “open door” tactics; diagnostic mode for both the device itself and the AL; indication that the control panel is armed from the monitoring station; four outputs to the monitoring station, with three outputs for transmitting alarm notifications and one for transmitting a signal about an alarm system malfunction; changes in the signal processing algorithm for each alarm loop, and the alarm loops can be grouped into different outputs of the device, set to the “without the right to turn off” mode (alarm and fire alarms). PPK has a modular design. In this case, the modules that control the AL (selection modules) are interchangeable.

Fire selection module"MJV» allows you to organize two fire alarm loops in the Rubin-6 control panel with the ability to connect current-consuming fire detectors. The SME module is installed instead of any Rubin-6 selection module.

The maximum number of current-consuming fire detectors N for each loop is determined by the formula: N = 5/Iп, where Iп is the current consumption of one detector in standby mode.

It is allowed to include up to five SME modules in the Rubin-6 control panel.

Control and reception device"Rubin-8 P» designed for organizing autonomous security of medium-sized objects with the ability to transmit a generalized “Alarm” signal to the monitoring station. The maximum number of fire alarms is 8, of which two are fire alarms and six are security alarms. It is allowed to include active current-consuming detectors in fire loops; fire loops can be converted into security loops (cancellation of the “without the right to remove” mode). The device provides: main power backup; “self-protection” mode at the 8th ShS with surrender under guard according to the “open door” tactics; diagnostic mode for both the device itself and the AL; indication that the control panel is armed from the monitoring station; one output to the monitoring station.

Control and reception device"Pulsar" designed for organizing autonomous security of large objects with the ability to transmit a generalized “Alarm” signal to the monitoring station. The maximum number of loops is 40. The device provides: main power backup; maintaining operability when the mains supply voltage drops to 140; “self-protection” mode along the 40th Highway with surrender under guard using “open door” tactics; diagnostic mode for both the device itself and the AL; indication that the control panel is armed from the monitoring station; four outputs to the monitoring station, with three outputs for transmitting alarm notifications and one for transmitting a signal about an alarm system malfunction; changes in the signal processing algorithm for each loop, and loops can be grouped into different outputs of the device, set to the “without the right to turn off” mode » (alarm and fire alarm). PPK has a modular design. In this case, the modules that control the AL (selection modules) are interchangeable.

PPC of large information capacity

Control and reception device"BUG" Designed for organizing autonomous security of large objects (especially important ones). The maximum number of loops is 60. The device provides: main power backup; automated handing over of objects under protection and disarming using an encryption device; automatic registration of messages about the state of objects and service information on a digital printing device; anti-sabotage protection of device blocks; majority signal processing logic; the decision on the correctness of the received information is recorded after three times confirmation; diagnostic mode for both the device itself and the AL; five outputs to the monitoring station; software change of the signal processing algorithm for each alarm zone, alarm zones can be grouped into security zones with access to different monitoring station lines, set to the “without the right to turn off” mode » (alarm and fire alarm); software change of entry/exit delay time for each alarm zone.

The maximum length of a four-wire communication line with a wire diameter of 0.5 mm, depending on the number of object blocks connected to it: 150 m - 10 pcs., 300 m - 5 pcs., 600 m - 1 pc. Provided that the supply voltage on the last block of the facility is not lower than 18 V, otherwise an additional four-wire line is required. The BUG device consists of a signal processing and control unit (SCU), a digital printing device (CPU) and up to 30 CUs.

Control and reception device"Aaddress» designed for organizing autonomous security of geographically concentrated objects via a two-wire communication line. The maximum number of loops is 96. The device provides: main power backup; manually placing objects under protection and disarming them; automatic registration of messages about the state of objects and service information on a digital printing device; anti-sabotage protection; the decision on the correctness of the received information is recorded after three times confirmation; diagnostic mode; two outputs to the monitoring station; software change of the signal processing algorithm for each alarm zone, alarm zones can be grouped into security zones with access to different monitoring station lines, and set to the “without the right to switch off” mode; non-polar inclusion of object blocks (OB) in the communication line; two options for connecting the BO to the communication line. According to the first option, it is allowed to connect up to 32 CBs to the communication line, according to the second - up to 96. In the AL it is allowed to include security and fire current-consuming detectors with a total current consumption of no more than 0.5 mA. The maximum length of a two-wire communication line with a wire diameter of 0.5 mm, with 96 (32) CBs connected to it is 200 m. The supply voltage at the last CB must be at least 24 V. The “Address” device consists of a control unit (CU), power supply unit (PSU), digital printing device (CPU) and up to 96 CU.

Conclusion

Thus, to summarize, we come to the following conclusion - technical means of security and fire alarm systems, designed to obtain information about the state of controlled parameters at a protected facility, receive, convert, transmit, store, display this information in the form of sound and light alarms, in accordance with GOST 25 829-78, it is classified according to two criteria: area of ​​application and functional purpose.

Technical means of perimeter security alarms should be selected depending on the type of alleged threat to the facility, the interference situation, the terrain, the length and technical strength of the perimeter, the type of fencing, the presence of roads along the perimeter, the exclusion zone, its width. The security alarm system for the perimeter of an object is designed, as a rule, to be single-line. To strengthen security, determine the direction of movement of the intruder, and block vulnerable spots, multi-directional security should be used.

T All premises with permanent or temporary storage of material assets, as well as all vulnerable areas of the building (windows, doors, hatches, ventilation shafts, ducts, etc.) through which unauthorized entry into the premises of the facility is possible, must be equipped with technical security alarm systems.

The transmission of notifications about the activation of a security alarm from the facility to the central monitoring station can be carried out from a small-capacity control panel, an internal security console or end-of-line devices.

Bibliography

Resolution of the Council of Ministers of the Russian Federation No. 455 of 09/03/91 “On approval of the rules for the use of special means in service with the Department of Internal Affairs of the Russian Federation.”

Order of the Ministry of Internal Affairs of the Russian Federation No. 170 - 1991 “On measures to implement the resolution of the Council of Ministers of the Russian Federation dated 09/03/91 “On approval of the rules for the use of special means in service with the Internal Affairs Directorate of the Russian Federation.”

Technical descriptions and operating instructions for monitoring stations, control panels, detectors.

Information and technical magazine “Security Technology”, M., Scientific Research Center “Security” VNIIIPO Ministry of Internal Affairs of Russia, 1994-1997.

Similar documents

    Composition and purpose of fire alarm systems. Threshold alarm systems with radial loops and a modular structure. Classification of notification transmission systems. Setting up the control and security fire alarm device "KODOS A-20".

    thesis, added 06/29/2011

    Review of existing security and fire alarm systems. Characteristics of the practical application of fire detectors, a description of their design, independent solutions for sensors. Commissioning and commissioning of the alarm system, troubleshooting installation problems.

    thesis, added 06/16/2012

    Installation and commissioning of a fire alarm system and voice notification in a non-residential building shopping center. Technical characteristics of a digital combined passive infrared optical-electronic detector with an acoustic sensor.

    course work, added 08/21/2015

    Structural and functional diagram security and fire alarm systems of the facility. Development of a fire detector, modeling of its components in the Micro Cap package. System analysis operability and safety of the fire alarm system.

    thesis, added 01/27/2016

    Development of a modern security and fire alarm system. Integrated security system "Orion". Digital addressable security and fire system "Grif-2000". Design of an alarm system based on a system with analog loops, calculation of the cost of installation work.

    thesis, added 06/08/2013

    Goals and objectives of fire automatics when ensuring fire safety. Three components of the system and their functions. Integration of security and fire alarms into a single security and fire system. Selection of design scheme for fire development in the protected premises.

    course work, added 04/27/2009

    Familiarization with the office equipment service center of Monteko LLP; organization of office communication systems, access control; selection and justification of a fire alarm system: threshold systems with radial loops, with a modular structure; fire detectors.

    practice report, added 01/18/2013

    Structure and functions of security and fire alarm systems. Reception and control equipment, detectors. Control and notification functions. Peripheral devices: control panel, short circuit isolation module, non-address line connections. Powering devices.

    laboratory work, added 09/13/2013

    Security system and technical means of objects (property). Types of detectors that generate alarm signals and a control panel. Calculation of economic efficiency from the introduction of security alarm systems. Safety precautions during operation.

    thesis, added 04/27/2009

    Modern fire alarm systems. Autonomous and centralized security of objects located in explosive zones. Design of an intrinsically safe electrical circuit. Centralized fire warning systems. Security alarm system.

Security and fire alarm systems (FS) in one form or another are used today in almost all facilities. This is because using electronics is always more profitable in the long run than using security guards.

Security and fire alarm systems are designed to determine the fact of unauthorized entry into a protected object or the appearance of signs of fire, issue an alarm signal and turn on actuators (light and sound alarms, relays, etc.). Security and fire alarm systems are very similar in design ideology and at small facilities, as a rule, they are combined on the basis of a single control unit - a control panel (RPK) or a control panel (CP). In general, these systems include:

  • technical means of detection (detectors);
  • technical means of collecting and processing information (reception and control devices, notification transmission systems, etc.);
  • technical means of warning (sound and light alarms, modems, etc.).

Technical means of detection

Technical means of detection- These are detectors built on various physical principles of operation. A detector is a device that generates a specific signal when a particular controlled environmental parameter changes. Based on their area of ​​application, detectors are divided into security, security-fire and fire detectors. Currently, security and fire detectors are practically not produced and are not used. Security detectors, based on the type of controlled area, are divided into point, linear, surface and volumetric. According to the principle of action - electric contact, magnetic contact, shock contact, piezoelectric, optical-electronic, capacitive, sound, ultrasonic, radio wave, combined, combined, etc.

Fire detectors are divided into manual and automatic detectors. Automatic fire detectors are divided into thermal detectors, which respond to an increase in temperature, smoke detectors, which respond to the appearance of smoke, and flame detectors, which respond to the optical radiation of an open flame.

Security detectors

Electric contact detectors- the simplest type of security detectors. They are a thin metal conductor (foil, wire), specially fixed to the protected object or structure. Designed to protect building structures (glass, doors, hatches, gates, non-permanent partitions, walls, etc.) from unauthorized penetration through them by destruction.

Magnetic contact (contact) detectors designed to block various building structures from opening (doors, windows, hatches, gates, etc.). A magnetic contact detector consists of a sealed magnetically controlled contact (reed switch) and a magnet in a plastic or metal non-magnetic housing. The magnet is installed on the moving (opening) part of the building structure (door leaf, window sash, etc.), and the magnetically controlled contact is installed on the stationary part (door frame, window frame, etc.). To block large opening structures (sliding and swing gates) that have significant backlash, electric contact detectors such as travel limit switches are used.

Impact detectors are designed to block various glazed structures (windows, showcases, stained glass, etc.) from breaking. The detectors consist of a signal processing unit (SPU) and from 5 to 15 glass break sensors (GBS). The location of the components of the detectors (BOS and DRS) is determined by the number, relative position and the area of ​​blocked glass panels.

Piezoelectric detectors are designed to block building structures (walls, floors, ceilings, etc.) and individual objects (safes, metal cabinets, ATMs, etc.) from destruction. When determining the number of detectors of this type and their installation location on the protected structure, it is necessary to take into account that it is possible to use them with 100% or 75% coverage of the blocked area. The area of ​​each unprotected section of the blocked surface should not exceed 0.1 m2.

Optical-electronic detectors are divided into active and passive. Active optical-electronic detectors generate an alarm when the reflected flow (single-position detectors) changes or the received flow (two-position detectors) of infrared radiation energy stops (changes) caused by the movement of an intruder in the detection zone. The detection zone of such detectors has the form of a “beam barrier” formed by one or more parallel narrowly directed beams located in a vertical plane. The detection zones of different detectors differ, as a rule, in the length and number of beams. Structurally, active optical-electronic detectors, as a rule, consist of two separate blocks - an emission unit (RU) and a receiver unit (RU), separated by a working distance (range).

Active optical-electronic detectors are used to protect internal and external perimeters, windows, showcases and approaches to individual objects (safes, museum exhibits, etc.).

Passive optical-electronic detectors are the most widely used because, with the help of optical systems specially designed for them (Fresnel lenses), detection zones of various shapes and sizes can be easily and quickly obtained and used to protect premises of any configuration, building structures and individual objects .

The operating principle of the detectors is based on recording the difference between the intensity of infrared radiation emanating from the human body and the background ambient temperature. The sensitive element of the detectors is a pyroelectric converter (pyroelectric receiver), on which infrared radiation is focused using a mirror or lens optical system (the latter are the most widely used).

The detection zone of the detector is a spatial discrete system consisting of elementary sensitive zones in the form of rays located in one or several tiers or in the form of thin wide plates located in a vertical plane ("curtain" type). Conventionally, detector detection zones can be divided into seven the following types: wide-angle single-tier "fan" type; wide-angle multi-tiered; narrowly directed "curtain" type, narrowly directed "beam barrier" type; panoramic single-tier; panoramic multi-tiered; multi-tiered conical.

Due to the possibility of forming detection zones of various configurations, passive infrared optical-electronic detectors have universal application and can be used to block volumes of premises, places where valuables are concentrated, corridors, internal perimeters, passages between racks, window and door openings, floors, ceilings, rooms with small animals, storage facilities, etc.

Capacitive detectors designed for blocking metal cabinets, safes, individual items, and creating protective barriers. The operating principle of detectors is based on a change in the electrical capacitance of the sensitive element (antenna) when a person approaches or touches a protected object. In this case, the protected item must be installed on a floor with a good insulating coating or on an insulating pad.

It is allowed to connect several metal safes or cabinets to one detector in a room. The number of connected items depends on their capacity, design features premises and is specified when setting up the detector.

Sound (acoustic) detectors designed to block glazed structures (windows, shop windows, stained glass windows, etc.) from breaking. The operating principle of these detectors is based on a non-contact method of acoustic monitoring of the destruction of a glass sheet by vibrations that arise during its destruction in the audio frequency range and propagating through the air.

When installing the detector, all areas of the protected glazed structure must be within its direct vision.

Ultrasonic detectors are designed to block volumes of enclosed spaces. The operating principle of the detectors is based on recording disturbances in the field of elastic waves in the ultrasonic range, created by special emitters, when moving in the human detection zone. The detection zone of the detector has the shape of an ellipsoid of rotation or teardrop shape.

Due to low noise immunity, they are currently practically not used.

Radio wave detectors designed to protect the volumes of enclosed spaces, internal and external perimeters, individual objects and building structures, and open areas. The operating principle of radio wave detectors is based on recording disturbances of electromagnetic waves in the microwave range emitted by the transmitter and registered by the detector receiver when a person moves in the detection zone. The detection zone of the detector (as with ultrasonic detectors) has the shape of an ellipsoid of rotation or a teardrop shape. The detection zones of different detectors differ only in size.

Radio wave detectors come in one- and two-position types. Single-position detectors are used to protect the volumes of enclosed spaces and open areas. Two-position - for protecting perimeters.

When choosing, installing and operating radio wave detectors, you should remember one of their features. For electromagnetic waves in the microwave range, some building materials and structures are not an obstacle (screen) and they freely, with some attenuation, penetrate through them. Therefore, the detection zone of a radio wave detector may, in some cases, extend beyond the protected premises, which can cause false alarms. Such materials and structures include, for example, thin plasterboard partitions, windows, wooden and plastic doors, etc. Therefore, radio wave detectors should not be oriented towards window openings, thin walls and partitions, behind which the movement of large objects and people is possible during the security period. It is not recommended to use them at facilities near which powerful radio transmitting equipment is located.

Combined detectors are a combination of two detectors, built on different physical detection principles, combined structurally and circuitously in one housing. Moreover, they are schematically combined according to the “and” scheme, i.e. only when both detectors are triggered, an alarm notification is generated. The most widely used combination is passive infrared and radio wave detectors.

Combined security detectors have very high noise immunity and are used to protect the premises of objects with complex noise conditions, where the use of other types of detectors is impossible or ineffective.

Combined detectors are two detectors built on different physical detection principles, combined structurally in one housing. Each detector operates independently of the other and has its own detection zone and its own output for connection to the alarm loop. The most common combination of infrared passive and audible detectors. There are other combinations as well.

Alarm Detectors are intended for manual or automatic submission of an alarm notification to the internal security console of a facility or to internal affairs bodies in cases of a possible criminal attack on employees, clients or visitors to the facility.

Various manual and foot operated buttons and pedals based on magnetic and electric contact detectors are used as alarm detectors. As a rule, such detectors are locked in the pressed state and return to the original position is possible only with the help of a key.

For the same purposes, special mini-alarm systems operating over a radio channel have been developed and are used. They include a receiver connected to a receiving control device or control panel, and several wearable key fobs-transmitters for wireless transmission of alarm notifications. Some key fobs include a fall sensor. The range of such systems ranges from several tens to several hundred meters.

Trap detectors occupy a special place among alarm detectors. They are designed to provide an alarm when there is an attempt to steal money or rob a protected object, regardless of the actions of personnel. They are an imitation of a pack of money in a bank package with a volume of 100 bills, in which a magnet is mounted, and in a special stand on which the pack is located, a magnetic sensor (reed switch).

When removing (moving) an imitation bundle of money from the stand, the contacts of the magnetic sensor open and an alarm notification is sent to the facility’s security console. There are similar trap detectors, in which, together with a magnet, a special cartridge containing colored (orange) smoke with a volume of 5 m is built in. 2 The smoke composition is sprayed with a time delay (3 minutes) after the magnetic sensor is triggered.

Types of interference and their possible sources

During operation, detectors are exposed to various interfering factors, among which the main ones are: acoustic interference and noise, vibrations of building structures, air movement, electromagnetic interference, changes in temperature and humidity of the environment, technical weakness of the protected object.

The degree of impact of interference depends on its power, as well as on the operating principle of the detector.

Acoustic interference and noise are created by industrial installations, vehicles, household radio equipment, lightning discharges and other sources. Examples of acoustic interference are given in table 1.

Table 1. Examples of acoustic interference

Sound intensity, dBExamples of sounds of indicated strength
0 Sensitivity limit of the human ear.
10 The rustling of leaves. Faint whisper at a distance of 1 m.
20 Quiet garden.
30 Quiet room. Average noise level in the auditorium.
40 Quiet music. Noise in the living area.
50 Poor speaker performance. Noise in an establishment with open windows.
60 Loud radio. Noise in the store. Average level in conversational speech at a distance of 1 m.
70 Engine noise truck. Noise inside the tram.
80 Noisy street. Typewriting Bureau.
90 Car horn.
100 Car siren. Jackhammer.
120 Strong clap of thunder. Jet engine.
130 Pain limit. The sound is no longer heard.

This type of interference causes the appearance of inhomogeneities in the air environment, vibrations of non-rigidly fixed glazed structures and can cause false alarms of ultrasonic, sound, shock contact and piezoelectric detectors. In addition, the operation of ultrasonic detectors is influenced by high-frequency components of acoustic noise.

Vibrations of building structures caused by railway and subway trains, powerful compressor units, etc. Shock contact and piezoelectric detectors are especially sensitive to vibration interference; therefore, these detectors are not recommended for use in objects subject to such interference.

Air movement in a protected area is caused mainly by heat flows nearby heating devices, drafts, fans, etc. Ultrasonic and passive optical-electronic detectors are most susceptible to the influence of air flows. Therefore, these detectors should not be installed in places with noticeable air movement (in window openings, near batteries central heating, near ventilation holes and so on.).

Electromagnetic interference are created by lightning discharges, powerful radio transmitting facilities, high-voltage power lines, power distribution networks, contact networks of electric transport, installations for scientific research, technological purposes, etc.

Radio wave detectors are most susceptible to electromagnetic interference. Moreover, they are more susceptible to radio interference. The most dangerous electromagnetic interference is interference from the power supply. They arise when switching powerful loads and can penetrate into the input circuits of the equipment through the power supply inputs, causing false alarms. A significant reduction in their number is achieved by the use and timely maintenance of backup power sources.

To eliminate the impact of electromagnetic interference from AC networks on the operation of detectors, compliance with the basic requirement for the installation of low-voltage connecting lines: the laying of the power lines of the detector and AL must be parallel to the power networks at a distance of at least 50 cm between them, and their intersection must be at right angles.

Changes in ambient temperature and humidity at a protected facility may affect the operation of ultrasonic detectors. This is due to the fact that the absorption of ultrasonic vibrations in the air is highly dependent on its temperature and humidity. For example, when the ambient temperature increases from +10 to +30 °C, the absorption coefficient increases by 2.5-3 times, and when the humidity increases from 20-30% to 98% and decreases to 10%, the absorption coefficient changes by 3-4 times times.

A decrease in the temperature at an object at night compared to daytime leads to a decrease in the absorption coefficient of ultrasonic vibrations and, as a consequence, to an increase in the sensitivity of the detector. Therefore, if the detector was adjusted during the day, at night, interference sources that were outside this zone during the adjustment period may enter the detection zone, which can cause the detector to operate.

Technical weakness of objects has a significant impact on the stability of the operation of magnetic contact detectors used to block elements of building structures (doors, windows, transoms, etc.) from opening. In addition, poor technical strength can cause false alarms of other detectors due to drafts, vibrations of glazed structures, etc.

It should be noted that there are a number of specific factors that cause false alarms of detectors of only a certain category. These include: the movement of small animals and insects, fluorescent lighting, radio permeability of building structure elements, exposure of detectors to direct sunlight and car headlights.

Movement of small animals and insects can be perceived as the movement of an intruder by detectors whose operating principle is based on the Doppler effect. These include ultrasonic and radio wave detectors. The influence of crawling insects on detectors can be eliminated by treating their installation sites with special chemicals.

When fluorescent lighting is used at an object protected by radio wave detectors, the source of interference is the column of ionized gas of the lamp flashing at a frequency of 100 Hz and the vibration of the lamp fittings at a frequency of 50 Hz.

In addition, fluorescent and neon lamps create continuous fluctuation interference, and mercury and sodium lamps create pulsed interference with a wide range of frequencies. For example, fluorescent lamps can create significant radio interference in the frequency range 10 -100 MHz or more.

The detection range of such light sources is only 3-5 times less than the detection range of a person, so during the period of protection they must be turned off, and incandescent lamps must be used as emergency lighting.

Radio permeability of building structure elements It can also cause false activation of a radio wave detector if the walls are thin or there are thin-walled openings, windows, and doors of significant size.

The energy emitted by the detector can extend outside the room, and the detector detects people passing outside, as well as passing vehicles. Examples of radio permeability of building structures are given in table 2.

Table 2. Examples of radio permeability of building structures

Thermal radiation from lighting fixtures may cause false alarms of passive optical-electronic detectors. This radiation is comparable in power to human thermal radiation and can trigger detectors.

In order to eliminate the impact of this interference on passive optical-electronic detectors, it can be recommended to isolate the detection zone from the effects of radiation from lighting devices. Reducing the influence of interfering factors, and, consequently, reducing the number of false alarms of detectors, is mainly achieved by complying with the requirements for the placement of detectors and their optimal configuration at the installation site.

IN table 3 types and sources of interference are given and ways to eliminate them are given.

Table 3. Sources of interference and methods for eliminating them

Types and sources of interference Detectors
shock contact, magnetic contact ultrasonic acoustic radio wave optical-electronic capacitive piezoelectric Combined IR+microwave
passive active
External acoustic interference and noise: vehicles, construction machines and units, aircraft, loading and unloading operations, etc. near the object No influence No influence Use at room noise levels up to 60 dB No influence
Internal acoustic interference and noise: refrigeration units, fans, telephone and electric bells, fluorescent lamp chokes, hydraulic noise in pipes No influence No influence No influence
Joint operation of detectors of the same operating principle in one room No influence No influence Install the detector correctly. Use detectors with different letters No influence Correctly install and configure detectors No influence
Vibration of building structures In the presence of constant vibrations of large amplitude, it is impossible to use
Air movement: drafts, heat flows from radiators No influence Correctly install and configure the detector No influence Correctly install and configure the detector No influence Correctly install and configure detectors
Moving objects and people behind non-permanent walls, wooden doors No influenceCorrectly install and configure detectors No influenceCorrectly install and configure the detector No influenceCorrectly install and configure detectors
Moving objects in the protected area: swaying curtains, plants, rotation of fan blades No influence Do not install near a source of interference. Configure the detector correctly No influence Correctly install and configure the detector No influence Correctly install and configure the detector No influence Correctly install and configure the detector
Small animals (mice, rats) No influence Correctly install and configure the detector No influence Correctly install and configure the detector No influence
Movement of water in plastic pipes Does not affect Do not install near a source of interference. Configure the detector correctly Screen the pipes Does not affect Do not install near a source of interference. Configure the detector correctly Configure the detector correctly
Changing the free space of a protected area due to the introduction and removal of large-sized objects that have an increased ability to absorb or reflect Does not affect Reconfigure the detector Does not affect Reconfigure the detector
AC voltage fluctuations Use DC backup power supply
Electromagnetic interference: vehicles with electric motors, high-power radio transmitters, electric welding machines, power lines, electrical installations with a power of more than 15 kVA Does not affect If the field strength is more than 10 V/m and VHF radiation is more than 40 W at a distance of less than 3 m from the detector, it cannot be used.
Fluorescent lighting Does not affect Turn off lighting during security period Eliminate the influence of direct light. Install the detector correctly Does not affect
Illumination from the sun and vehicle headlights No influence Install the detector correctly No influence
Changing the background temperature Does not affect The rate of background temperature change is no more than 1°/min Does not affect Does not affect

Fire detectors

Fire detectors are the main elements of automatic fire and security fire alarm systems.

Based on the method of actuation, fire detectors are divided into manual and automatic. Manual call points do not have the function of detecting a fire source; their action is reduced to transmitting an alarm message to the electrical circuit of the alarm loop after a person detects a fire and activates the detector by pressing the corresponding start button.

Automatic fire detectors operate without human intervention. With their help, a fire is detected using one or more analyzed signs and a fire notification is generated when a controlled physical parameter reaches a set value. The controlled parameters can be increased air temperature, the release of combustion products, turbulent flows of hot gases, electromagnetic radiation, etc. In accordance with the detected primary signs of fire, detectors, as mentioned earlier, are divided into thermal, smoke, flame, gas and combined. It is also possible to use other signs of fire. Combined detectors respond to two or more parameters that characterize the appearance of a fire.

Heat detectors can use a method for generating an analyzed signal, allowing them to respond not only to an increase in the absolute temperature value above the maximum set threshold, but also to the excess of the rate of increase of its limit value. Therefore, in accordance with the nature of the reaction to a change in the controlled sign, they are divided into maximum, differential and maximum-differential. Smoke fire detectors, based on their operating principle, are divided into optical-electronic and ionization.

According to the method of power supply, fire detectors are divided into:

  • powered by an alarm loop from a control panel or control panel;
  • powered by a separate external power source;
  • powered by a built-in internal power source (autonomous fire detectors).

The detector detection zone is the space near the detector, within which its operation is guaranteed when a fire occurs. Most often, this parameter is expressed in units of area (m2) controlled by the detector with the required reliability. As the detector installation height increases, the area controlled by one detector decreases. If the installation height is higher than the specified maximum, effective detection of a fire source by the detector is not guaranteed.

For light detectors, the protected area is determined by the maximum detection range of an open test fire and the viewing angle, which depends on the design of the optical system.

Fire detectors must provide reliable detection of a fire in specific protected premises. To do this, when choosing a detector, it is necessary to take into account the probable nature of the fire and the process of development over time of the main factors of the fire: increased temperature, smoke concentration, light radiation at different points in the room. Depending on the type and quantity of combustible materials in a fire, one or more detectable signs may predominate.

More often than not, a fire is accompanied by the release of smoke in the initial stage, so in most cases it is most advisable to use smoke detectors. When choosing a smoke detector, it should be taken into account that ionization (radioisotope) and optical-electronic smoke detectors have different sensitivity to combustion products, the smoke particles of which have different colors and sizes. Optical-electronic point detectors respond better to light smoke, typical of cellulose-containing materials, as well as smoke consisting of fine particles aerosol. Ionization detectors have a relatively higher sensitivity to combustion products that emit black smoke with larger particles (for example, when burning rubber).

Premises in which the rapid appearance of an open flame in the event of a fire are most likely to be equipped with light detectors.

It is advisable to install heat detectors, first of all, in cases where a significant fire source is provided and, therefore, during a fire there will be intense heat release.

When choosing a detector, it is also necessary to take into account special additional requirements for their design and operating principle. For example, radioisotope detectors are not recommended for installation in residential premises and children's institutions. In explosive areas, detectors with a special design must be installed.

Calculation of the total number of detectors and determination of their installation locations should be carried out taking into account the characteristics of the premises, as well as the requirements of regulatory and technical documentation. The latter includes relevant documents regulating general issues design and installation of fire automatic systems, fire and security alarm systems and complexes, as well as operational documentation for the corresponding type of detector.

Fire detectors created using the fourth generation element base: specialized controllers and microprocessors are becoming increasingly widespread.

A common feature of such detectors with expanded tactical and technical capabilities is the use of only special devices(control panels) that are part of the fire alarm system of the corresponding company.

The use of computer technology makes it possible to create addressable fire detectors that transmit information about their location to the central processor of the control panel, which ensures an accurate reconstruction of the picture and analysis of the process of occurrence and development of a fire. They carry out automatic or upon request from the center performance monitoring and digital transmission of data on the parameters of their functioning. In such detectors, if necessary, it is possible to adjust the sensitivity when environmental conditions change. Analogue type detectors can also transmit information about the level of the controlled parameter. The range of detectors is being expanded through the use of new technologies. For example, modern foreign linear heat detectors(cable type) detect the difference between normal and elevated temperatures, which makes it possible to generate an alarm signal even before the start of a fire (smoke or fire) if the controlled object overheats. The signal is transmitted in analog form from the detector to a special control panel, which allows you to determine the distance to the overheated area. Such detectors can be effectively used to monitor objects with electrical equipment, rooms with false ceilings, cable routes and channels.

Technical means of collecting and processing information

Technical means for collecting and processing information include reception and control devices, control panels, alarm and trigger devices, notification transmission systems, etc. They are designed for continuous collection of information from technical detection devices (detectors) included in alarm loops, analysis of the alarm situation at the facility and its display, control of local light and sound annunciators, indicators and other devices (relays, modem, transmitter, etc. ), as well as the generation and transmission of notifications about the state of the object to the central post or central monitoring console. They also ensure the arming and disarming of the object (premises) according to the accepted tactics, as well as, in some cases, power supply to the detectors.

Reception and control devices are classified according to information capacity (the number of signals controlled by the alarm loop) into devices of small (up to 5 alarm loops), medium (from 6 to 50 alarm loops) and large (over 50 alarm loops) information capacity. In terms of information content, devices can be small (up to 2 types of notifications), medium (3 to 5 types) and large (over 5 types) information content.

Notification transmission systems are classified according to information capacity (the number of protected objects) into systems with constant information capacity and with the possibility of increasing information capacity.

Based on information content, systems are divided into systems of small (up to 2 types of notifications), medium (from 3 to 5 types) and large (over 5) information content.

Based on the type of communication lines (channels) used, systems are divided into systems using telephone network lines (including switched ones), special communication lines, radio channels, combined communication lines, etc.

Based on the number of directions of information transmission, they are divided into systems with one- and bidirectional information transmission (with the presence of a return channel).

According to the algorithm for servicing objects, message transmission systems are divided into non-automated systems with manual tactics of arming (disarming) objects under protection (disarming) after telephone conversations with the control panel attendant and automated systems with automatic arming and disarming (without telephone conversations).

According to the method of displaying information received at the centralized monitoring console, notification transmission systems are divided into systems with individual or group display of information in the form of light and sound signals, with information displayed on the display using devices for processing and storing a database.

Control panels correspond to domestic control panels for the main tasks they solve. Let us also clarify the concepts of a security zone (a term used in foreign literature) and an alarm loop used in domestic literature. Let us immediately note that these concepts are different.

Alarm loop- this is an electrical circuit connecting the output circuits of detectors, including auxiliary elements (diodes, resistors, etc.), connecting wires and boxes and designed to issue notifications of intrusion, attempted intrusion, fire, malfunction, and in some cases for supplying power to detectors.

Thus, the alarm loop is designed to monitor the state of a certain protected area.

Zone- this is a part of a protected object, controlled by one or more alarm loops. Therefore, the term “zone” used in descriptions of foreign equipment is in this case synonymous with the term "alarm loop".

Modern multifunctional control rooms have ample capabilities for organizing security, fire and security-fire alarm systems. Knowledge of these capabilities will allow you to make the right choice of command post, the characteristics and parameters of which most fully satisfy the tasks set for the protection of a particular object.

The structure of the alarm system organized on the basis of the control center will be largely determined by the way the alarm loops are connected, which affects the functional characteristics of the organized security system and largely determines the cost of installation work. Based on the method of connecting the loops, the following types of CP can be distinguished:

  • with radial structure trains;
  • with a tree structure;
  • address.

In a control panel with radial structure cables, each cable is connected directly to the panel itself. This structure is justified with a small number of loops (usually up to 16) and on objects that do not require the organization of remote loops. They are usually used for small and medium-sized objects.

CPs with a tree structure have a special information bus consisting of several wires (usually 4). Expanders are connected to this bus. In turn, radial cables are connected to the expanders. Several basic radial loops can also be connected to the CP itself. The total number of loops is usually in the range of 24-128. The expanders monitor the status of the loops connected to them, encode information about their status and transmit it via the information bus to the control panel, which has an indication of the status of all loops. Such control points are used to build security systems for medium and large objects.

Addressable control panels using loops with addressable detectors stand somewhat apart from the rest and are usually used to create fairly complex integrated security systems for large and critical objects. It is obvious that addressable detectors are more complex and more expensive than conventional ones, and their application and advantages are fully manifested in complex and large objects.

There are addressable CPs that have different configurations of their loops:

  • radial;
  • ring;
  • circular with radial branches.

The ring loop has a fairly serious advantage. If it is damaged (broken), it retains its functionality, since the information exchange line is maintained. When the loop is short-circuited, special devices, loop separators, disconnect the shorted section, and the rest of the loop continues to function.

Reception and control devices (RPK) and control panels (CP) are the main elements that form the information and analytical system of security, fire or security-fire alarm systems at the facility. Such systems can be autonomous or centralized. In the first case, the control panel or control panel is installed in the security room (point) located at the protected facility. With centralized security, an object complex of technical means, formed by one or several control panels (CP), forms an object subsystem of security and fire alarms, which, using a notification transmission system (NTS), transmits in a given form information about the state of the object to the central monitoring console (MSC), located in the center for receiving alarm notifications (centralized security point - ARC). Information generated by the control panel or control center during autonomous and centralized security is transmitted to employees of special security services for the facility, who are entrusted with the functions of responding to alarm notifications coming from the facility.

Technical means of notification are described in detail in Section 5 of this catalogue.

This section of the catalog presents security and fire alarm systems and equipment.

Key terms used in this section

  1. Detector detection area- part of the space of the protected object in which the detector issues an alarm when the controlled parameter exceeds the threshold value.
  2. Detector sensitivity- numerical value of the controlled parameter, when exceeded, the detector should be triggered.
  3. Optical density of the medium- the decimal logarithm of the ratio of the radiation flux passing through a smoke-free environment to the radiation flux weakened by the environment when it is partially or completely smoked.

reference Information

Requirements for the placement of fire detectors in accordance with NPB 88-2001 “Fire extinguishing and alarm installations. Design norms and rules"

In accordance with NPB 88-2001 “Fire extinguishing and alarm installations. Design Codes and Rules", the area controlled by one point smoke detector, as well as maximum distance between the detectors and the wall, must be determined by table 5

Table 5. Requirements for placement of smoke detectors

When monitoring a protected area with two or more linear smoke detectors (LSDS), the maximum distance between their parallel optical axes, the optical axis and the wall, depending on the installation height of the fire detector blocks, should be determined by table 6.

Table 6. Requirements for placement of linear smoke detectors

In rooms with a height of over 12 m and up to 18 m, detectors should be installed in two tiers, in accordance with table 7.

Table 7. Requirements for the placement of linear smoke detectors for two-tier placement

The area controlled by one point heat detector, as well as the maximum distance between the detector and the wall, must be determined by table 8, but not exceeding the values ​​specified in the technical specifications and passports for detectors.

Table 8 Requirements for the placement of heat detectors

Classes of thermal fire detectors, in accordance with NPB 85-200 “Thermal fire detectors. Technical requirements for fire safety. Test methods"

In accordance with NPB 85-200 “Thermal fire detectors. Technical requirements for fire safety. Test methods", maximum, maximum-differential detectors and detectors with differential characteristics, depending on temperature and response time, are divided into ten classes: A1, A2, A3, B, C, D, E, F, G, H (see . table 9).

Table 9. Classes of maximum differential detectors

Detector classAmbient temperature, °C Operation temperature, °C
conditionally normalmaximum normal minimummaximum
A125 50 54 65
A225 50 54 70
A335 60 64 76
B40 65 69 85
C55 80 84 100
D70 95 99 115
E85 110 114 130
F100 125 129 145
G115 140 144 160
HIndicated in the TD for specific types of detectors

Fire alarm (FS) is a set of technical means, the purpose of which is to detect fire, smoke or fire and promptly notify a person about it. Its main task is to save lives, minimize damage and preserve property.

It may consist of the following elements:

  • Fire alarm control device (FPKP)– the brain of the entire system, exercises control over loops and sensors, turns on and off automation (fire extinguishing, smoke removal), controls sirens and transmits signals to the remote control of a security company or a local dispatcher (for example, a security guard);
  • Various types of sensors, which can react to factors such as smoke, open flame and heat;
  • Fire alarm loop (SHS)– this is the communication line between sensors (detectors) and the control panel. It also supplies power to the sensors;
  • Annunciator- a device designed to attract attention, there are light - strobe lamps, and sound - sirens.

According to the method of control over loops, fire alarms are divided into the following types:

PS threshold system

It is also often called traditional. The operating principle of this type is based on changing the resistance in the fire alarm system loop. Sensors can only be in two physical states "norm" And "fire" If a fire factor is detected, the sensor changes its internal resistance and the control panel issues an alarm signal on the loop in which this sensor is installed. It is not always possible to visually determine the location of the trigger, because in threshold systems, an average of 10-20 fire detectors are installed on one loop.

To determine the fault of the loop (and not the state of the sensors), an end-of-line resistor is used. It is always installed at the end of the loop. When using fire tactics “PS triggered by two detectors”, to receive a signal "attention" or "possibility of fire" An additional resistance is installed in each sensor. This allows the use of automatic fire extinguishing systems at the facility and eliminates possible false alarms and property damage. The automatic fire extinguishing system is activated only in the event of simultaneous activation of two or more detectors.

PPKP “Granit-5”

The following PPCPs can be classified as threshold type:

  • "Nota" series, produced by Argus-Spectrum
  • VERS-PK, manufacturer VERS
  • devices of the “Granit” series, manufactured by NPO “Sibirsky Arsenal”
  • Signal-20P, Signal-20M, S2000-4, manufacturer of NPB Bolid and other fire-fighting devices.

The advantages of traditional systems include ease of installation and low cost of equipment. The most significant disadvantages are the inconvenience of servicing fire alarms and the high probability of false alarms (resistance can vary from many factors, sensors cannot transmit information about dust levels), the number of which can only be reduced by using a different type of substation and equipment.

Address-threshold PS system

A more advanced system is capable of automatically periodically checking the status of sensors. Unlike threshold signaling, the operating principle is based on a different algorithm for polling sensors. Each detector is assigned its own unique address, which allows the control panel to distinguish them and understand the specific cause and location of the malfunction.

The Code of Rules SP5.13130 ​​allows the installation of only one addressable detector, provided that:

  • The PS does not control fire alarm and fire extinguishing installations or type 5 fire warning systems, or other equipment that, as a result of startup, can lead to material losses and reduced human safety;
  • the area of ​​the room where the fire detector is installed is not larger than the area for which this type of sensor is designed (you can check it using the technical documentation for it);
  • the performance of the sensor is monitored and in case of a malfunction a “fault” signal is generated;
  • It is possible to replace a faulty detector, as well as detect it by external indication.

Sensors in addressable threshold signaling may already be in several physical states – "norm", "fire", "malfunction", "attention", "dusty" and others. In this case, the sensor automatically switches to another state, which allows you to determine the location of a malfunction or fire with the accuracy of the detector.

PPKP “Dozor-1M”

The address-threshold type of fire alarm includes the following control panels:

  • Signal-10, manufacturer of airbag Bolid;
  • Signal-99, produced by PromServis-99;
  • Dozor-1M, manufactured by Nita, and other firefighting devices.

Addressable analog system PS

The most advanced type of fire alarm to date. It has the same functionality as addressable threshold systems, but differs in the way it processes signals from sensors. The decision to switch to "fire" or any other condition, it is the control panel that accepts it, and not the detector. This allows you to customize the operation of the fire alarm according to external factors. The control panel simultaneously monitors the status of the parameters of installed devices and analyzes the received values, which can significantly reduce the likelihood of false alarms.

In addition, such systems have an undeniable advantage - the ability to use any address line topology - tire, ring And star. For example, if the ring line is broken, it will split into two independent wire loops, which will fully retain their functionality. In star-type lines, you can use special short-circuit insulators, which will determine the location of the line break or short circuit.

Such systems are very convenient to maintain, because Detectors that require purging or replacement can be identified in real time.

The addressable analogue type of fire alarm includes the following control panels:

  • Two-wire communication line controller S2000-KDL, manufactured by NPB Bolid;
  • Series of addressable devices “Rubezh”, manufactured by Rubezh;
  • RROP 2 and RROP-I (depending on the sensors used), manufactured by Argus-Spectrum;
  • and many other devices and manufacturers.

Scheme of an addressable analogue fire alarm system based on PPKP S2000-KDL

When choosing a system, designers take into account all the requirements of the customer’s technical specifications and pay attention to the reliability of operation, the cost of installation work and the requirements for routine maintenance. When the reliability criterion for a simpler system begins to decrease, designers move to using a higher level.

Radio channel options are used in cases where laying cables becomes economically unprofitable. But this option requires more money for maintenance and maintaining devices in working condition due to periodic replacement of batteries.

Classification of fire alarm systems according to GOST R 53325–2012

Types and types of fire alarm systems, as well as their classification are presented in GOST R 53325–2012 “Fire fighting equipment. Fire automatic equipment. General technical requirements and test methods".

We have already discussed addressable and non-addressable systems above. Here we can add that the former allow the installation of non-addressed fire detectors through special extenders. Up to eight sensors can be connected to one address.

Based on the type of information transmitted from the control panel to the sensors, they are divided into:

  • analog;
  • threshold;
  • combined.

According to the total information capacity, i.e. The total number of connected devices and loops are divided into devices:

  • low information capacity (up to 5 shs);
  • average information capacity (from 5 to 20 shs);
  • large information capacity (more than 20 shs).

According to information content, otherwise according to the possible number of notifications issued (fire, malfunction, dust, etc.) they are divided into devices:

  • low information content (up to 3 notices);
  • medium information content (from 3 to 5 notices);
  • high information content (from 3 to 5 notices);

In addition to these parameters, systems are classified according to:

  • Physical implementation of communication lines: radio channel, wire, combined and fiber optic;
  • In terms of composition and functionality: without the use of computer technology, with the use of computer technology and the possibility of its use;
  • Control object. Control various settings fire extinguishing means, smoke removal means, warning means and combined ones;
  • Expansion possibilities. Non-expandable or expandable, allowing installation in a housing or separate connection of additional components.

Types of fire warning systems

The main task of the warning and evacuation control system (WEC) is to timely notify people about a fire in order to ensure safety and prompt evacuation from smoke-filled rooms and buildings to a safe area. According to Federal Law-123 “Technical Regulations on Fire Safety Requirements” and SP 3.13130.2009, they are divided into five types.

The first and second types of SOUE

Most small and medium-sized facilities, according to fire safety standards, must install the first and second types of warning.

At the same time, the first type is characterized by the mandatory presence of an audible siren. For the second type, “exit” light signs are added. A fire alarm must be triggered simultaneously in all premises with permanent or temporary occupancy.

The third, fourth and fifth types of SOUE

These types refer to automated systems, the triggering of an alert is completely assigned to automation, and the role of a person in managing the system is reduced to a minimum.

For the third, fourth and fifth types of SOUE, the main method of notification is speech. Pre-developed and recorded texts are transmitted that allow evacuation to be carried out as efficiently as possible.

In the 3rd type additionally, illuminated “exit” signs are used and the order of notification is regulated - first to service personnel, and then to everyone else according to a specially designed order.

In the 4th type there is a requirement for communication with the control room inside the warning zone, as well as additional light indicators for the direction of movement. Fifth type, includes everything that is listed in the first four, plus the requirement for separate inclusion of light signs for each evacuation zone is added, full automation of control of the warning system is provided and the organization of multiple evacuation routes from each warning zone is provided.

MINISTRY OF INTERNAL AFFAIRS OF THE RUSSIAN FEDERATION

MAIN DIRECTORATE OF NON-DEPARTMENTAL SECURITY

SELECTION AND APPLICATION OF MEANS
SECURITY AND FIRE ALARM
AND MEANS OF TECHNICAL STRENGTHEN FOR
FACILITIES EQUIPMENT


DEVELOPED by employees of the Research Center "Security" of the Main Military District of the Ministry of Internal Affairs of Russia N.N. Kotov, L.I. Savchuk, E.P. Tyurin under the leadership of V. G. Sinilov

APPROVED by the Main Military Directorate of the Ministry of Internal Affairs of Russia on June 27, 1998.

INTRODUCTION

INTRODUCTION


The main role in ensuring the comprehensive security of a facility is played by technical means of security and fire alarm (TS FSA) and means of technical strengthening. Right choice and the use of fire protection equipment and means of technical strengthening at the facility allows us to ensure a sufficiently high reliability of protecting the facility from all possible internal and external views threats and dangerous situations. At the same time, the lack of a proper approach to the process of selecting and using safety equipment and means of technical strengthening reduces the level (or effectiveness) of safety and leads to prohibitively high costs for ensuring the required safety.

The choice of equipment option for a vehicle facility with fire alarm system and means of technical strengthening is determined by the characteristics of the significance of the premises of the facility, its construction and architectural planning solutions, operating and maintenance conditions, operating mode, interference occurring at the facility, and many other factors that must be taken into account when designing a complex system security.

This work provides recommendations and sets out requirements that must first of all be taken into account by organizations conducting design and installation work on equipping TS facilities with fire alarm systems and means of technical strengthening.

1. GENERAL PROVISIONS


The higher the level (or effectiveness) of security, the higher the likelihood of preserving all the valuables of the object from theft or destruction. The level of security, in turn, mainly depends on the response time of the security system to an emerging threat and on the time it takes to overcome physical barriers: bars, locks, safes, latches on windows and doors, specially reinforced doors, walls, floors, ceilings, etc. etc., that is, means of technical strengthening in the path of the possible movement of the intruder. The sooner a threat to an object can be detected, the more effectively it can be stopped. This is achieved through the correct selection and use of OPS vehicles and their optimal placement in protected areas. The use of technical means of reinforcement increases the time required for the offender to overcome them, which makes the possibility of his detention more likely. This is especially evident when using these funds in combination with TS OPS. In addition to the functions of a physical obstacle, means of technical fortification also perform the functions of a psychological obstacle that prevents the possibility of an intruder from entering a protected object.

The security system design stage is the most important period during which all the basic functions and structures of the security system are laid out. At this stage, an inspection of the object is carried out, the goals of which are:

- on-site study of the characteristics of the object that determine its resistance to alleged criminal attacks and possible emergency situations;

- determination of a set of measures and development of technical proposals for organizing the security of the facility, taking into account the generated standard solutions that ensure sufficient security.

Based on the results of the survey, a technical specification for the design of a set of technical security equipment is being developed. The inspection of the facility is carried out by an interdepartmental commission (IMC) consisting of representatives of the administration (or security service) of the facility, private security units, state supervision and, if necessary, other interested organizations.

Design, preparation and execution of work must be carried out in accordance with regulatory and technical documents:

- RD 78.143-92 Security alarm systems and complexes. Elements of technical strengthening of objects. Design standards;

- RD 78.145-93 Security, fire and security-fire alarm systems and complexes. Rules for production and acceptance of work;

- RD 78.146-93 Instructions on technical supervision of design and installation work on equipping facilities with security alarms;

- RD 78.147-93 Unified requirements for technical strengthening and alarm equipment of facilities;

- RD 78.148-94 Protective glazing. Classification, test methods. Application;

- GOST R 50862-96 Safes and storage of valuables. Requirements and test methods for burglar resistance and fire resistance;

- GOST R 50941-96 Protective cabin. General technical requirements and test methods;

- GOST R 51072-97 Safety doors. Requirements and test methods for burglary resistance;

- Rules for the construction of electrical installations (PUE);

- Standard requirements for technical strength and alarm equipment for trade enterprises;

- SNiP 2.04.09-84, SNiP 3.05.06-85 and other current regulatory and technical documents approved in the prescribed manner, in particular, technological maps and instructions for the installation of fire alarm systems and devices, as well as technical documentation for products.

2 CATEGORING PREMISES


The choice of equipment for the facility with security guards and means of technical strengthening is determined by the importance of the premises of the facility, the type and placement of valuables in these premises. All premises of any object can be divided conditionally (by type and placement of valuables in them) into four categories:

first category - premises where goods, objects, and products of special value and importance are located, the loss of which can lead to particularly large or irreparable material and financial damage, create a threat to the health and life of a large number of people located on and outside the facility, lead to other serious consequences.

Typically, such premises include: storage facilities (storerooms) for valuables, warehouses for storing weapons and ammunition, premises with permanent storage of narcotic and toxic substances, as well as secret documentation and other particularly valuable and particularly important inventory items;

the second category is premises where valuable and important goods, objects and products are located, the loss of which can lead to significant material and financial damage and pose a threat to the health and life of people at the facility.

Such premises include: special archives and special libraries, safe rooms, storage rooms for service firearms, radioisotope substances and preparations, jewelry, antiques, art and culture, cash, currency and securities (main cash desks of objects);

the third category is premises where goods, objects and products of everyday demand and use are located.

Such premises include: service, office premises, trading floors and premises of industrial goods, household appliances, food products, etc.;

fourth category - premises where goods, objects and products for technological and economic purposes are located.

Such premises include: utility and auxiliary premises, premises with permanent or temporary storage of technological and utility equipment, technical and design documentation, etc.

3 TECHNICAL STRENGTHENESS OF THE FACILITY PREMISES


Technical strengthening is a set of measures aimed at strengthening the structural elements of buildings, premises and protected areas, providing the necessary resistance to unauthorized entry into the protected area, burglary and other criminal attacks.

The classification of structural elements (walls, doors, window openings) is given in Appendices A - B. The selected group of protection against burglary of structural elements must correspond to the cost and significance of the property (valuables) located in the premises, that is, the corresponding category of the premises. In addition, it is necessary to take into account the location of the facility and the accessibility of entry into its premises. At the same time, increased requirements must be placed on places where an attacker can act in relative safety.

To increase the reliability of security of the premises of the facility, technical strength, which is the basis for building the system technical safety, must be used in combination with TS OPS. If the technical strength of structural elements does not correspond or is insufficient to the categories of premises, it is recommended that these elements or premises be reinforced with additional means (borders) of security alarms in accordance with Appendix D.

3.1 Walls and ceilings

Load-bearing and internal walls and partitions, floors and ceilings of the premises of the facility where valuables are located must have a sufficient degree of protection from possible unauthorized entry. Appendix A provides a classification of building structures based on their resistance to burglary. Depending on the category of the room and its location in the building, the choice of structure or its reinforcement is made.

Reinforcement of walls, ceilings and partitions is usually carried out over the entire area with metal gratings and nets (Appendix A), installed on the inside of the room. Grids or meshes are welded to steel anchors with a diameter of 12 mm or more firmly embedded in the wall (ceiling) to a depth of 80 mm (to embedded parts made of steel strip measuring 100x50x6 mm, shot with four dowels) with a pitch of no more than 500x500 mm. After installation, the gratings or mesh must be masked with plaster (cladding panels).

If it is impossible to install a grille or mesh from the inside, it is allowed (in agreement with the security departments) to install them from the outside of the room.

3.2 Doors

Doors (mainly entrances) of premises, as well as walls, must have a sufficient degree of protection against possible unauthorized entry. Appendix B provides a classification of door building structures based on their resistance to burglary. Depending on the category of the room and its location in the building, the design of the doors or their reinforcement is selected.

Additional lattice doors, used to enhance the protection of the room, are installed on the inside. Doors can be hinged or sliding and can be locked.

To strengthen the wooden door frame, it is recommended to frame it with a steel corner measuring at least 45x28x4 mm, and also to secure the frame in the wall with steel “ruffs” (crutches) with a diameter of 10 mm or more and a length of at least 120 mm.

It is recommended to equip entrance doors to the facility with at least two mortise, non-self-latching electromechanical and/or mechanical locks installed at a distance of 300 mm or more from each other.

3.3 Window openings

All windows, transoms and vents in the premises of the facility must be glazed and have reliable and serviceable locks. The glass must be intact and securely fastened in the grooves. Appendix B provides a classification of window openings and their structures according to their resistance to burglary. Depending on the category of the room and its location in the building, the choice of window openings or the design of their reinforcement is made.

Window openings of premises of the first and third categories located on the ground floor of a building, as well as window openings of these premises (regardless of the number of floors), opening to fire escapes, roofs of buildings of different heights and canopies through which one can enter the premises, are equipped with security structures: bars, shutters, blinds, screens, etc.) or protective glazing in accordance with Appendix B.

If all the window openings of the premises of the facility, located on the same floor of the building, are equipped with bars, then one of them is made to open with the possibility of closing it with a lock (built-in or padlocked).

When installing stationary metal grilles on the window openings of a room, the ends of the rods of these grilles must be embedded in the wall of the building to a depth of at least 80 mm and filled with cement mortar or welded to existing structures. If this is not possible, the grille is framed with a corner measuring at least 35x35x4 mm and welded around the perimeter to steel anchors with a diameter of 10 mm or more and a length of at least 120 mm firmly embedded in the wall of the building to a depth of 80 mm.

Grilles can be installed both on the inside of the room and between window frames. In some cases, it is allowed to install stationary and decorative metal grilles on the outside of the room.

The cash register premises of an enterprise, organization or institution must be equipped with a special window measuring no more than 200x300 mm with a door for transactions with clients. If the window dimensions exceed those indicated above, then it should be reinforced from the outside with protective structures (in accordance with RD 78.147-93).

A special cash register window can be made in the form of a transfer unit in accordance with GOST R 50941-96.

3.4 Ventilation and chimneys

Ventilation shafts, ducts and chimneys with a diameter of more than 200 mm, having access to the roof (or to adjacent rooms) and with their cross-section entering the room in which the valuables are placed, must be equipped (at the entrance to it) with metal gratings made from a corner with a cross-section not less than 35x35x4 mm, reinforcement with a diameter of at least 16 mm, with cell dimensions no more than 150x150 mm. The grilles in ventilation ducts on the room side should be no more than 100 mm from the inner surface of the wall (ceiling).

The walls of premises of the first and second categories (if they contain ventilation shafts, ducts or chimneys with a diameter of 200 mm or more) on the inside must be reinforced with bars over the entire area bordering them. The grating is made of reinforcement with a diameter of 10 mm or more and a cell size of no more than 150x150 mm, which is then plastered. The installation of gratings is similar to their installation when reinforcing the walls of a room.

Ventilation ducts and chimneys with a diameter of more than 200 mm, passing through rooms of the first and second categories, must be equipped at the entrance to (exit from) these rooms with metal grilles made of rods with a diameter of 10 mm or more or durable metal mesh followed by wrapping them with wire to connect to the security alarm.

To protect ventilation shafts, ducts and chimneys, it is allowed to use false grilles made of a metal tube with a hole diameter of 6 mm or more and with a cell measuring 100x100 mm (for laying the alarm loop wire).

3.5 Locks and locking devices

Mortise, overhead non-self-latching and padlocks, latches, bolts, latches, etc. are used as locking devices installed on doors and windows.

Padlocks should be used mainly for additional locking of doors, grilles, shutters, blinds, etc. These locks are quite effective (from the point of view of protection) only if they have hardened steel handles and massive durable bodies (barn lock), and also if there are protective covers, plates and other devices that can prevent the possibility of rolling or sawing the ears and shackles of locks.

Typically the following types of locks are used to lock doors:

- pin cylinder;

- disk cylinders;

- plate cylinder;

- level ones;

- electromechanical;

- electromagnetic.

In accordance with the draft GOST R being developed "Mechanical and electromechanical locks for protective structures of door and window openings. Requirements and test methods for resistance to criminal opening and burglary", the expected introduction of which is 01/01/1999, all locks supplied to the Russian market and suitable for use at facilities accepted for protection, must be certified and have an appropriate class of resistance to criminal opening and burglary.

For the entrance doors of premises and objects in which these premises are located, it is recommended to use locks (mortise and overhead) with resistance classes to criminal opening and burglary not lower than those indicated:

- premises of the fourth category - U2 class locks;

- premises of the third category - U3 class locks;

- premises of the first and second categories - U4 class locks, with the exception of storage rooms and safes, the doors of which must be equipped with locking devices that ensure secrecy and resistance to burglary in accordance with GOST R 50862-96 and GOST R 51053-97.

U1 class locks are recommended to be used mainly for additional door locking.

3.5.1 Pin cylinder locks

The vast majority of pin cylinder locks produced in our country have a security mechanism with five pairs of pins arranged in one row (the usual “English lock”), which determines their low security (up to 2500 combinations). The manufacture of security mechanisms with large tolerances and from soft materials (TsAM 4-1 or aluminum alloys), as well as the absence of grooved pins, reduces the resistance of the security mechanism to criminal opening. Locks with the same security mechanisms, made of brass and with smaller tolerances, are more resistant (about two times) to criminal opening.

Locks that have a security mechanism with 8 to 12 pairs of pins arranged in 2, 3 or 4 rows have significantly greater security (from 6,000 to 50,000 combinations).

A significant design disadvantage of a mortise pin lock is the presence of a protrusion of the security mechanism by 10 - 12 mm relative to the door leaf. This may lead to the possibility of the protruding part of the security mechanism being caught by a mechanical tool and destroyed by rolling it up, thereby opening access to the mechanism for moving the bolt. The required force to roll up a security mechanism made of brass is twice as much as that made of TsAM 4-1 or aluminum alloy. The time it takes to open the lock largely depends on the fastening (with screws or screws) of the outer lining that prevents the security mechanism from being caught. Fastening with screws significantly increases the time spent on breaking.

Increasing the lock's resistance to burglary by drilling is achieved by using a security mechanism that has a pressed-in insert made of carbide material, which protects the security mechanism body, cylinder and pins.

3.5.2 Cylinder disc locks

Locks with a disc security mechanism (Abloy type) are among the most reliable in terms of resistance to criminal opening. This is due to the presence of a security mechanism design that allows the security of 1,000,000 or more combinations to be achieved. The small key hole of the secrecy mechanism greatly limits the ability to manipulate the master keys.

A design disadvantage of most mortise disc locks is the presence of a protrusion of the security mechanism of 20 mm or more (relative to the door leaf), which makes it easy to break into these locks by rolling up the security mechanism.

Increasing the lock's resistance to burglary by drilling is achieved by using a security mechanism that has a pressed-in hardened washer installed in the front part of the security mechanism.

3.5.3 Plate cylinder locks

For the most part, plate security mechanisms have six code elements (plates), so their security is higher than that of five pin security mechanisms and amounts to about 5000 combinations. Resistance to opening them with master keys, hacking and drilling is the same as that of pin mechanisms.

3.5.4 Lever locks

The main criteria that determine the secrecy of lever mechanisms are: the number of levers in the mechanism, the size of the gap between the passage groove of the lever and the lever stand. Depending on these parameters, the secrecy of lever locks ranges from 80 to 2,500,000 combinations.

Increasing the lock's resistance to burglary by drilling is achieved by using a security mechanism in which the lever rack is protected by a plate made of hardened steel or carbide material.

To protect the entrance door of a room, it is recommended to use a lock with at least six levers (symmetrical or asymmetrical). The number of levers corresponds to the number of steps of the key bit, reduced by one step, which is intended to move the lock bolt.

3.5.5 Bolts and locking bars

The resistance of deadbolts to dynamic loads is determined by the following criteria:

- the material from which the bolt is made;

- cross-sectional area of ​​the bolt;

- length of the bolt head (according to GOST 5089-97, the length of the bolt head must be at least 40 mm, the bolt overhang must be at least 22 mm, the remaining part of the bolt in the lock body must be at least 18 mm);

- the strength of the fastening of the front plate to the lock body.

If the length of the bolt head is insufficient and the bolt extends significantly, the bolt bends (after striking the lock).

To protect the bolts from possible sawing, it is recommended to use locks with bolts that are made of carbide materials or have pressed inserts made of these materials.

The stability of striker plates is affected by: thickness, configuration and material of the striker plate. Reliable strikers must be made of steel and have a wall thickness of at least 3 mm.

The L-shaped locking plate has high resistance to burglary, which can be attached not only to the door frame, but also to the wall using anchors.

3.5.6 Electromechanical and electromagnetic locks

Recently, electromechanical and electromagnetic locks, as well as latches, have become widely used.

The electromechanical principle of operation of the lock actuator is based on the movement of closing elements (latches, lock bolts, etc.) by turning on an electric motor or electromagnet for the duration of their movement.

In actuators with an electromagnetic principle of operation, there are no moving mechanical closing elements, that is, blocking of barrier devices (for example, doors) is carried out using magnetic attraction forces created by a powerful magnet.

Mechanical locks often use electromagnetic locking (magnetic latches, latches, etc.) of closing elements with the ability to move them manually when opening or closing under extreme conditions.

It is recommended to install an electromechanical lock on wooden and/or metal doors weighing up to 100 kg under conditions of average load (100...200 passes per day). The use of this lock for doors with high loads is ineffective due to high mechanical wear and, as a result, reduced reliability and service life. Most often, an electromechanical lock is installed on a door (overhead or mortise lock), but sometimes it is also installed on the door frame.

It is recommended to install an electromagnetic lock on wooden and metal doors weighing up to 650 kg under conditions of high load (more than 200 passes per day). The absence of parts subject to friction and wear makes this lock almost eternal. A special feature of this lock is the need for a constant supply of current to the electromagnet winding, since when the voltage in the network is lost (for example, in the event of an accident or intentional wire break), the lock opens. In this regard, for reliable operation it is necessary to duplicate the electromagnetic lock with a mechanical one or use additional backup power.

It is recommended to install the electromagnetic latch in the jamb door frame. This setting allows you to block the bolt of the lock installed in the door (when it is closed) and unlock the lock when a control signal is sent to open the door. This installation of the latch allows you to completely preserve the lock and hardware of the door.

4 EQUIPING THE FACILITY PREMISES WITH TECHNICAL MEANS OF SECURITY AND FIRE ALARMS


The equipment of the premises of the TS OPS facility is carried out after the technical strengthening work has been carried out. Preparation and execution of work on equipping the fire safety equipment facility must be carried out in accordance with the regulatory documents specified in section 1 of these Recommendations.

At facilities (protected or subject to transfer under the protection of private security units), only fire alarm equipment should be installed that is included in the current List of technical means of private security approved for use, approved by the Main Directorate of Military District of the Ministry of Internal Affairs of Russia, with the corresponding annual changes and additions.

To increase the reliability of security of an object and its premises, the structure of the security system complex is determined based on:

- operating mode of this object;

- the procedure for conducting transactions with valuables;

- features of the location of premises with valuables inside the building;

- selecting the number of protected zones.

4.1 Equipment of the premises of the facility with technical means of security alarm

At the facility, all premises with permanent or temporary storage of material assets, as well as other adjacent premises and all vulnerable places (windows, doors, hatches, ventilation shafts and ducts) located on the first and last floors of the building along the perimeter of the facility.

It is recommended to equip premises of the third and fourth categories with single-district security, and premises of the first and second categories with multi-district security.

In premises of the third and fourth categories, located on the second and higher floors of the building, as well as inside the facility, it is not necessary to install an OS system if the building is guarded along the entire perimeter (first and last floors and all vulnerable places).

Window openings of premises of the first and second categories, located on the second and higher floors of a building protected along the entire perimeter (first and last floors and all vulnerable places), are allowed not to be equipped with OS.

It is recommended that the selection of the most optimal option for protecting the premises of a TS OS facility be carried out in accordance with Appendix D of these Recommendations. Depending on the category of valuables stored in the premises, security alarms are divided into four groups (classes) of protection against penetration: the first group of protection is insufficient (organization of an incomplete first line of security in the premises), the fourth group of protection is very high (organization of three-line security of the premises).

The first line of defense protects:

Building structures along the perimeter of the building or premises of the facility, that is, all window and door openings;

- points of entry of communications, ventilation ducts;

- exits to fire escapes;

- non-permanent and permanent walls (if protection is necessary).

The building structures of the building (premises) of the facility block:

- doorways, loading hatches - for “opening” and “breaking” (only for wooden ones);

- glazed structures - for “opening” and “destruction” of glass;

- places where communications enter, non-permanent and permanent walls (if protection is necessary) - for a “break”;

- ventilation ducts, chimneys - for “destruction”.

Instead of blocking glazed structures for “opening” and “destruction”, internal non-permanent walls for “breaking”, doors for “opening” and “breaking”, it is allowed to block these structures only for “penetration” using volumetric and linear detectors. It should be borne in mind that passive optical-electronic detectors used for these purposes (such as “Photon”, etc., the operation of which is based on the same principle of operation) provide protection of premises only from direct penetration of an intruder.

It is recommended to block building structures (doors, glazed structures) for “opening” with the simplest magnetic contact detectors, and block gates, loading hatches, storage doors, elevator shafts - with limit switches.

It is recommended to block glazed structures from glass “destruction” using ohmic detectors (of the “foil” type), surface impact-contact or sound detectors.

Blocking walls for a “break” should be carried out with surface piezoelectric or ohmic (“wire” type) detectors.

The second line of defense protects the volumes of premises with passive optical-electronic detectors with a volumetric detection zone, ultrasonic, combined or radio wave detectors.

The third line of security protects safes and individual objects or approaches to them with capacitive, piezoelectric, passive and active optical-electronic or radio wave detectors.

4.2 Selection and placement of technical security alarm systems in the premises of the facility

In the premises of the facility, such OS vehicles should be installed so that, on the one hand, the required level of reliability of security of the facility is ensured, and on the other hand, the costs of purchasing, installing and operating OS vehicles are reduced (if possible).

The choice of specific types of detectors is determined based on:

- comparison of the design and construction characteristics of the object to be equipped and the tactical and technical characteristics of detectors;

- the nature and placement of valuables on the premises;

- number of storeys of the building;

- interference situation at the facility;

- probable routes of entry for the intruder;

- security regime and tactics;

- requirements for concealment of installation, design;

- criminogenic significance of the object, etc.

4.2.1 Magnetic contact detectors

When blocking windows and doors from opening (depending on their designs), magnets and reed switches of magnetic contact detectors can be installed on both moving and fixed parts of structures. When using metal frames, doors or frames and doors with metal trim, it is necessary to install magnetic contact detectors of type IO 102-6, specially designed for these purposes. The recommended placement of detectors is on the upper parts of window frames and doors. If this installation of magnetic contact detectors is not possible (due to the design or architectural features of windows and doors), it is allowed to install them on the side parts (opposite hinges) of frames and doors. It is allowed to install such detectors on the lower parts of window frames.

To eliminate the possibility of unlocking a magnetic contact detector installed on the front door using a powerful magnet, it is recommended to install an additional detector-trap next to the main detector. (A detector-trap is a conventional magnetic contact detector, from the body of which a magnet has been removed.) The reed switch of the detector, which is connected to the alarm loop (AL), works in parallel to close the AL when exposed to a powerful magnet.

The main characteristics of magnetic contact detectors are given in Table 1.


Table 1

Detectors

Characteristics
detector tick

SMK-1, IO 102-2

Installation method

Open

Hidden small size -
ny

Open

Hidden
small-sized
ny

Hidden metal
designs

Distance between reed switch and magnet, mm:

For closing -
contacts

For blurring
Kaniya contacts

Working range
temperature, °C

From minus 40 to plus 50

From minus 50 to plus 50

Overall dimensions, mm:

Reed switch

Magnet

4.2.2 Optical-electronic detectors

Active and passive optical-electronic detectors with a linear or surface narrowly directed detection zone ("curtain" type) are recommended to be used for blocking windows, doors, walls, ceilings, floors, corridors and approaches to protected objects for penetration or approach.

Depending on the architectural features of the blocked structures, detectors can be installed both on the walls of the room and on the ceiling (to protect the floor - only on the walls). In this case, it is necessary to install the detector so that its detection zone is located no further than 1.0 m (for a floor 0.5 m) across the entire width or height from the blocked surface.

It should be borne in mind that when the floor or ceiling is blocked by passive detectors with a narrowly directed surface detection zone (the detector is rotated 90°), the detection range is reduced by half.

Passive optical-electronic detectors with a volumetric detection zone are recommended to be used to protect premises, as well as to simultaneously block windows, doors, walls, ceilings and the valuables themselves located in the premises.

To ensure stable operation of these detectors, the following rules must be observed:

- do not install the detector above heating appliances;

- do not point the detector at warm air fans, spotlights, incandescent lamps and other sources that cause rapid temperature changes;

- do not expose the detector to direct sunlight;

- do not allow animals and objects (curtains, partitions, cabinets, etc.) that can create “dead” zones to be in the detector detection zone.

The main characteristics of active optical-electronic detectors are given in Table 2, passive infrared detectors - in Table 3.

4.2.3 Radio wave and combined detectors

Radio wave and combined (optical-electronic + radio wave) detectors can be used to protect the volumes of enclosed spaces, internal and external perimeters of premises, individual objects and building structures, and open areas. To ensure stable operation of these detectors, the following rules must be observed:

- install detectors in such a way that their detection zones do not extend beyond the premises being blocked (window openings, thin wooden partitions);

- do not install detectors on conductive structures (metal beams, damp brickwork, etc.), since a double ground loop appears between the detector and the power source, which can cause false alarms of the detector;

- remove oscillating or moving objects that have a significant reflective surface, as well as large objects that can create “dead” zones, outside the detector detection zone, or form a detection zone in such a way that these objects do not fall into it.

If there are “dead” zones, it is necessary to ensure that they do not create a free path for the offender to access material assets;

- do not install detectors in areas where there are powerful radio transmitting devices;

- for the period of protection:

- lock doors, windows, vents, transoms, hatches, and also turn off ventilation and power switching units;

- do not allow plastic pipes through which water may move into the detection zone of the detector;

- turn off fluorescent and neon lamps.


table 2

Characteristic
detector

Detectors

"Vector-2"

"Vector-SPEC"

Purpose

Room perimeter protection

Protection of the perimeter of open areas and premises

Detection area

Linear (single beam barrier)

Range, m:

75, 150

Mode A

Mode B

Notice
"Penetration"

Opening relay contacts

DC supply voltage, V

10,2….13,2

10,2….30,0

Ripple amplitude, mV

Current consumption at supply voltage 12 V, mA;

Mode A

Mode B

Operating temperature range, °C

From minus 10 to plus 50

From minus 40 to plus 55

Overall dimensions, mm

102х91х90

75x95x145 (BI and BF)

Weight, kg

1.0 (BI and BF)


Table 3

Detectors

Characteristics
detector stick

"Photon - 6"

"Foton-6A"

"Foton-6B"

"Foton-SK"

"Foton-8"

"Foton-8B"

Purpose

Protection of extended premises (corridors)

Protection of the volume of a closed heated room

Protection of enclosed space volume

Protection of building structures and approaches to values

Detection area

Volumetric

Volumetric

Linear (beam barrier)

Surface
naya ("curtain")

Volumetric

Volumetric

Surface (“curtain”)

Maximum range, m

Viewing angle, degrees:

In vertical
plane

To the horizon
tal plane

Controls
managed area, m

Notice "Penetrating"
vening"

Opening relay contacts

Obr./KZ Shs

From ShS 10.0…72.0

Current consumption, mA

From minus 10
up to plus 50

From minus 30 to plus 50

From 0 to plus 50

From minus 10 to plus 50

Overall dimensions, mm

107x107x64

Weight, kg


Table 4

Detectors

Detector characteristics

"Argus-2"

"Argus-3"

"Tulip-3"

"Volna-5"

"Radium-2"

"Radium-2/1"

"Radium-2/2"

"Fon-1M"

"Storm 2"

Detection principle

Radio wave

Purpose

Protection of the internal volume of the room

Protection of the perimeter of open areas

Protecting the area and volume of open
sites and premises

Detection area

Volumetric solid

Volumetric barrier of ellipsoidal shape

Volumetric

Minimum controlled area, m

Maximum range, m

Notice
"Penetration"

Opening relay contacts

Break
/KZ ShS

Opening relay contacts

AC supply voltage, V

Backup power (DC source):

Voltage, V

Current consumption, A

DC supply voltage, V

From ShS
12…72

Current consumption, mA

Operating temperature range, °C

From minus 30
up to plus 50

From minus 10
up to plus 50

From minus 30
up to plus 50

From minus 30
up to plus 50

From minus 40
up to plus 50

From minus 40
up to plus 50

From minus 40
up to plus 50

From minus 45
up to plus 50

From minus 45
up to plus 50

Overall dimensions, mm

100x90x
x65

90х75х40 After confirmation of payment, the page will