Security and fire systems: modern solutions for device integration. Features of the organization of security using technical means of security and fire alarms Substation threshold system

Employees of the Research Center "Okhrana" of the GUVO of the Ministry of Internal Affairs of Russia have developed recommendations on the selection and use of security and fire alarms and means of technical reinforcement for equipping facilities. These recommendations were approved by the GUVO of the Ministry of Internal Affairs of Russia on June 27, 1998.

The main role in ensuring the complex security of the facility is played by the technical means of security and fire alarms (TS OPS) and means of technical strengthening. The correct choice and use of the TS OPS and means of technical strengthening at the facility allows to ensure a sufficiently high reliability of the facility protection from all possible internal and external types of threats and dangerous situations.

The choice of the equipment option for the TS OPS facility and means of technical strengthening is determined by the characteristics of the importance of the premises of the facility, its construction and architectural planning solutions, operating and maintenance conditions, operating mode, interference arising at the facility, and many other factors that must be taken into account when designing an integrated system security.

The higher the level (or efficiency) of security, the higher the likelihood of preserving all values \u200b\u200bof the object from theft or destruction. The level of security, in turn, mainly depends on the response time of the TSO to an emerging threat and on the time it takes to overcome physical barriers: bars, locks, safes, latches on windows and doors, specially reinforced doors, walls, floors, ceilings, etc. etc., that is, means of technical strengthening on the path of the possible movement of the offender.

The sooner you can detect a threat to an object, the more effectively it can be stopped. This is achieved through the correct selection and use of TS OPS and their optimal placement in protected areas. The use of means of technical strengthening increases the time required for the offender to overcome them, which makes it more likely to be detained. Means of technical strengthening, in addition to the functions of a physical obstacle, also perform the functions of a psychological obstacle, preventing the possibility of an intruder from entering the protected object.

The design phase of the security system is the most important period during which all the main functions and structures of the security system are laid. At this stage, the object is surveyed, the goals of which are:

On-site study of the characteristics of the object that determine its resistance to alleged criminal encroachments and possible emergencies;

Determination of a set of measures and development of technical proposals for organizing the security of an object, taking into account the formed standard solutions that ensure sufficient safety.


Based on the results of the survey, a technical assignment is developed for the design of a complex of technical security equipment. Inspection of the facility is carried out by an interdepartmental commission (IAC consisting of representatives of the administration (or security service) of the facility, a subdivision of non-departmental security, state supervision and, if necessary, other interested organizations. Design, preparation and execution of work must be carried out strictly in accordance with regulatory and technical documents.

The choice of the equipment option for the TS OPS facility and means of technical strengthening is determined by the importance of the premises of the object, the type and placement of valuables in these premises. All premises of any object can be conditionally divided (according to the type and placement of valuables in them) into four categories:

first category - premises where goods, items and products of special value and importance are located, the loss of which can lead to especially large or irreparable material and financial damage, endanger the health and life of a large number of people on and off the facility, and lead to other serious consequences.

Typically, such premises include: storages (pantries) of valuables, warehouses for storing weapons and ammunition, premises with permanent storage of narcotic and toxic substances, as well as secret documents and other especially valuable and especially important inventory items;

second category - premises where valuable and important goods, items and products are located, the loss of which can lead to significant material and financial damage, pose a threat to the health and life of people at the facility.

These premises include: special archives and special libraries, safe rooms, storage rooms for service firearms, radioisotope substances and drugs, jewelry, antiques, art and culture, money, currency and securities (main cash desks of objects);

Such premises include: office, office premises, trading floors and premises for industrial goods, household appliances, food products, etc .;

Such premises include: utility and auxiliary premises, premises with permanent or temporary storage of technological and utility equipment, technical and design documentation, etc.

The selected group of protection against burglary of structural elements must correspond to the value and significance of the property (values) located in the room, that is, the corresponding category of the room. In addition, it is necessary to take into account the location of the object and the availability of penetration into its premises. At the same time, increased requirements should be imposed on places where an attacker can operate in relative safety.

To increase the reliability of the protection of the premises of the facility, technical strength, which is the basis for building a technical security system, should be used in combination with the TS OPS. In case of inconsistency or insufficient technical strengthening of structural elements with the categories of premises, it is recommended to strengthen these elements or premises with additional means (lines) of the security alarm.

Load-bearing and internal walls and partitions, floors and ceilings of the premises of the facility, where the valuables are located, must have a sufficient degree of protection against possible unauthorized entry.

Doors (mostly entrance) premises, as well as walls, must have a sufficient degree of protection against possible unauthorized entry.

Additional lattice doors, used to enhance the protection of the room, are installed from the inside. Doors can be hinged or sliding and locked with locks.

All windows, transoms and vents the premises of the facility must be glazed and have reliable and serviceable locks. Glasses must be intact and securely fixed in the grooves.

If all window openings of the premises of the object located on the same floor of the building are equipped with bars, then one of them is made opening with the possibility of closing it with a lock (built-in or hinged).

When installing stationary metal gratings on the window openings of a room, the ends of the rods of these gratings must be sealed into the wall of the building to a depth of at least 80 mm and filled with cement mortar or welded to existing structures.

Ventilation shafts, ducts and chimneys with a diameter of more than 200 mm, having an exit to the roof (or to adjacent rooms) and with their cross-section entering the room in which the valuables are located, should be equipped (at the entrance to it) with metal gratings made from a corner with a cross section not less than 35x35x4 mm, reinforcement with a diameter of at least 16 mm, with a cell size of no more than 150 × 150 mm. The grilles in ventilation ducts on the side of the room should be no more than 100 mm from the inner surface of the wall (ceiling).

To protect ventilation shafts, ducts and chimneys, it is allowed to use false gratings made of a metal tube with an opening diameter of 6 mm or more and with a cell measuring 100x100 mm (for laying the alarm loop wire).

Mortise, overhead non-self-locking and padlocks, latches, bolts, latches, etc. are used as locking devices installed on doors and windows.

Padlocks should be used mainly for additional locking of doors, grilles, shutters, blinds, etc. These locks are quite effective (from the point of view of protection) only if they have hardened steel arms and massive robust cases (barn lock), as well as if there are protective covers, plates and other devices in the places of their installation on lockable structures, which can prevent the possibility of rolling or sawing of the ears and bows of the locks.

Typically, the following types of locks are used to lock doors:

Pin cylinder;

Disc cylinder;

Lamellar cylinder;

Suvaldny;

Electromechanical;

Electromagnetic.

Recently, electromechanical and electromagnetic locks and latches have been widely used.

To increase the reliability of the protection of the object and its premises, the structure of the FSA complex is determined based on:

The operating mode of this object;

The procedure for conducting transactions with valuables;

Features of the location of premises with valuables inside the building;

Selecting the number of protected zones.

At the facility, all premises with permanent or temporary storage of material assets, as well as adjacent other premises and all vulnerable places (windows, doors, hatches, ventilation shafts and ducts), located on the first and last floors of the building along the perimeter of the object.

In rooms of the third and fourth categories, located on the second and higher floors of the building, as well as inside the facility, it is not required to install the OS TS if the building is guarded along the entire perimeter (first and last floors and all vulnerable spots).

Window openings of premises of the first and second categories, located on the second and higher floors of a building guarded along the entire perimeter (first and last floors and all vulnerable spots), it is allowed not to equip the TS OS.

The first line of protection is protected by:

Building structures around the perimeter of the building or premises of the facility, that is, all window and door openings;

Places of entry of communications, ventilation ducts;

Exits to fire escapes;

Non-capital and main walls (if protection is needed).

The building structures of the building (premises) of the facility block:

Doorways, loading hatches - for "opening" and "breach" (only for wooden ones);

Glazed structures - for "opening" and "breaking glass;

Places of entry of communications, non-capital and main walls (if protection is needed) - on the "break";

Ventilation ducts, chimneys - for "destruction".

Instead of blocking glazed structures for "opening" and "destruction", internal non-capital walls for "break", doors for "opening" and "break", it is allowed to block these structures only for "penetration" using volumetric and linear detectors. It should be borne in mind that passive optoelectronic detectors used for these purposes (such as "Photon", etc., whose operation is based on the same principle of action) provide protection of premises only from direct penetration of the intruder.

Blocking of building structures (doors, glazed structures) to "open" it is recommended to carry out the simplest magnetic contact detectors, and blocking of gates, loading hatches, storage doors, elevator shafts - limit switches.

Blocking of glazed structures for "destruction" glass is recommended to be carried by ohmic detectors ("foil" type), surface shock-contact or sound detectors.

Blocking walls for a break should be carried out by surface piezoelectric or ohmic ("wire" type) detectors.

Second frontier guards protect the volume of premises with passive optical-electronic detectors with a volumetric detection zone, ultrasonic, combined or radio wave detectors.

Third frontierguards protect safes and individual objects or approaches to them with capacitive, piezoelectric, passive and active optoelectronic or radio wave detectors.

Choice specific types detectorsin the premises of the object is determined based on:

Comparison of the structural and construction characteristics of the object to be equipped, and the tactical and technical characteristics of the detectors;

The nature and placement of valuables in the premises;

Number of storeys of the building;

Interference conditions at the facility;

Probable ways of intruder penetration;

Security regime and tactics;

Requirements of secrecy of installation, design;

The criminogenic significance of the object, etc.

When windows and doors are blocked for opening (depending on their designs), magnets and reed switches of magnetic contact detectors can be installed both on movable and fixed parts of structures.

Active and passive optoelectronic detectors with a linear or superficial narrowly targeted detection zone ("curtain" type) is recommended for blocking windows, doors, walls, ceilings, floors, corridors and approaches to protected objects for penetration or approach.

Radio wave and combined (optoelectronic + radio wave) detectors can be used to protect the volumes of enclosed spaces, internal and external perimeters of premises, individual items and building structures, open areas.

Ultrasonic detectors are intended for the protection of enclosed spaces.

Capacitive detectors designed to block metal cabinets, safes, individual items, as well as to create protective barriers.

Piezoelectric and shock-contact detectors are designed to block building structures for destruction or pressure and generate a notification of penetration by converting the energy of elastic waves of the ultrasonic or sound range that occurs when an intruder attempts to destroy the blocked structure.

Sound detectors designed to block glazed structures against destruction. The principle of operation of these detectors is based on the non-contact method of acoustic control of the destruction of the glass sheet.

Aluminum foil (ohmic detectors) used to block glass structures from breaking, subject to vibration and shock interference. Recommended use: blocking glass structures, where no increased requirements are imposed on the interior (warehouses, industrial and utility rooms).

Reception and control devices (PPK), which are an intermediate link between the detectors and notification transmission systems (SPI), should be installed in places protected from mechanical damage and interference in their work by unauthorized persons:

On walls at a height of at least 2.2 m from floor level;

In the absence of a dedicated room;

At a height of at least 1.5 m from the level - if there is a special room.

One of the most important security elements is burglar and fire alarms. These two systems have a lot in common - communication channels, similar algorithms for receiving and processing information, sending alarms, etc. Therefore, they are often (for economic reasons) combined into a single security and fire alarm (OPS). The security and fire alarm is one of the oldest technical means of protection. And so far this system is one of the most effective security systems.

Modern protection systems are built on several signaling subsystems (the combination of their application allows you to monitor any threats):

burglar - records an attempt to enter;

alarming - an emergency call system in case of a sudden attack;

fire department - registers the appearance of the first signs of fire;

emergency - notifies of gas leaks, water leaks, etc.

The task fire alarm receiving, processing, transferring and presenting in a given form to consumers with the help of technical means of information about a fire at protected facilities (detecting a fire center, determining its place of origin, giving signals for automatic fire extinguishing and smoke removal systems). A task burglar alarm - timely notification of penetration or attempted penetration of the guarded object, with the fixation of the fact, place and time of violation of the guard line. The common goal of both alarm systems is to provide instant response with accurate information about the nature of the event.

Analysis of domestic and foreign statistics of unauthorized intrusions into various objects shows that more than 50% of intrusions are made on objects with free access to personnel and clients; about 25% - for objects with unguarded elements of mechanical protection such as fences, gratings; about 20% - for objects with a pass system and only 5% - for objects with an enhanced security regime, using complex technical systems and specially trained personnel. From the practice of security services when protecting objects, six main zones of protected areas are distinguished:

zone I - the perimeter of the territory in front of the building;

zone II - the perimeter of the building itself;

zone III - a room for receiving visitors;

zone IV - staff offices and corridors;

zones V and VI - management offices, meeting rooms with partners, storage of values \u200b\u200band information.

In order to ensure the required level of security of especially important facilities (banks, cash desks, weapons storage sites), it is necessary to organize multi-border protection of the facility. First line alarm sensors are installed on the outer perimeter. The second line is represented by sensors installed in places of possible penetration into an object (doors, windows, vents, etc.). The third line - volumetric sensors in the interior, the fourth - directly protected objects (safes, cabinets, boxes, etc.). At the same time, each line must be connected to an independent cell of the control panel so that, if an intruder may bypass one of the security lines, an alarm signal is sent from the other.

Modern fire alarm systems are often integrated with other security systems into unified complexes.

2.2. The structure of the security and fire alarm system

In general, the security and fire alarm system includes:

sensors- alarm detectors reacting to an alarm event (fire, attempted entry into an object, etc.), sensor characteristics determine the main parameters of the entire alarm system;

control panels (Control panel) - devices that receive an alarm signal from detectors and control the executive devices according to a given algorithm (in the simplest case, control over the operation of the security and fire alarm consists of turning on and off sensors, fixing alarm signals, in complex, branched alarm systems, control and control is carried out using computers);

executive devices - units that ensure the execution of a given algorithm of the system's actions in response to one or another alarming event (giving an alert signal, activating fire extinguishing mechanisms, auto-dialing specified phone numbers, etc.).

Usually, security and fire alarm systems are created in two versions - an OPS with local or closed security of an object or an OPS with transfer under protection to subdivisions of non-departmental security (or a private security company) and the fire service of the Russian Emergencies Ministry.

The whole variety of security and fire alarm systems, with a certain degree of convention, is subdivided into address, analog and combined systems.

1. Analog (conventional) systems are built according to the following principle. The protected object is divided into areas by laying separate loops that combine a number of sensors (detectors). When any sensor is triggered, an alarm is generated throughout the loop. The decision about the occurrence of an event here is "made" only by the detector, the operability of which can be checked only during the maintenance of the fire alarm. Also, the disadvantages of such systems are the high probability of false alarms, localization of the signal with an accuracy of the loop, limitation of the controlled area. The cost of such a system is relatively low, although a large number of loops must be installed. The tasks of centralized control are performed by the security and fire panel. The use of analog systems is possible on all types of objects. But with a large number of alarm areas, a large amount of work on the installation of wired communications arises.

2. Address systems assume installation on one alarm loop of address sensors. Such systems make it possible to replace the multi-core cables connecting the detectors with the control panel (control panel) with one pair of data bus wires.

3. Address non-interrogation systems are, in fact, threshold, supplemented only by the possibility of transmitting the address code of the triggered detector. These systems have all the disadvantages of analog ones - the impossibility of automatic control of the operability of fire detectors (in case of any failure of the electronics, the connection between the detector and the control panel is terminated).

4. Address polling systems carry out periodic polling of detectors, ensure control of their performance in any type of failure, which allows installing one detector in each room instead of two. In the address interrogative FSA, complex algorithms for information processing can be implemented, for example, autocompensation for changes in the sensitivity of detectors over time. Reduces the likelihood of false positives. For example, an addressable glass break sensor, unlike an addressless one, will indicate which window was broken. The decision about an event that has occurred is also "made" by the detector.

5. The most promising direction in the field of building alarm systems are combined (addressable analog) systems... Analogue addressable detectors measure the amount of smoke or temperature at the facility, and the signal is generated on the basis of mathematical processing of the received data in the control panel (specialized computer). It is possible to connect any sensors, the system is able to determine their type and the required algorithm for working with them, even if all these devices are included in one burglar alarm loop. These systems provide the fastest decision-making and management speed. For the correct operation of the analogue addressable equipment, it is necessary to take into account the communication language of its components (protocol), unique for each system. The use of these systems makes it possible to quickly, without high costs, make changes to an existing system when changing and expanding the zones of the object. The cost of such systems is higher than the previous two.

Now there is a huge variety of detectors, control panels and sirens with different characteristics and capabilities. It should be recognized that the defining elements of the security and fire alarm are sensors... The parameters of the sensors determine the main characteristics of the entire alarm system. In any of the detectors, the processing of controlled alarming factors is to one degree or another an analog process, and the division of detectors into threshold and analog refers to the method of transmitting information from them.

Sensors can be subdivided into internal and external, installed respectively inside and outside the protected objects. They have the same principle of operation, the differences are in design and technological characteristics. The installation location can be the most important factor in choosing the type of detector.

OPS detectors (sensors) act on the principle of registration of environmental changes. These are devices designed to determine the presence of a threat to the security of a protected facility and transmit an alarm message for a timely response. Conventionally, they can be subdivided into volumetric (allowing you to control the space), linear, or surface, - to control the perimeters of territories and buildings, local, or point, - to control individual items.

The detectors can be classified according to the type of controlled physical parameter, the principle of operation of the sensitive element, the method of transmitting information to the central alarm control panel.

According to the principle of generating an information signal about the penetration of an object or a fire, the detectors of the security and fire alarm systems are divided into active (the alarm generates a signal in the protected area and reacts to changes in its parameters) and passive (react to changes in environmental parameters). Such types of security detectors are widely used as infrared passive, magnetic contact detectors of glass breakage, perimeter active detectors, combined active detectors. In fire alarm systems, heat, smoke, light, ionization, combined and manual detectors are used.

The type of sensors in the alarm system is determined by the physical principle of operation. Depending on the type of sensors, the security alarm systems can be capacitive, radio-beam, seismic, reacting to a short or open circuit, etc.

Possibilities of installing security systems, depending on the sensors used, their advantages and disadvantages are given in table. 2.


table 2

Perimeter security systems

2.3. Types of security detectors

Contact detectors serve to detect unauthorized opening of doors, windows, gates, etc. Magnetic detectors consist of a magnetically controlled reed switch installed on a stationary part, and a setting element (magnet) installed on the opening module. When the magnet is close to the reed switch, its contacts are in a closed state. These detectors differ from each other in the type of installation and material from which they are made. The disadvantage is the ability to neutralize them with a powerful external magnet. Shielded reed sensors are protected from extraneous magnetic field by special plates and are equipped with signaling reed contacts that work in the presence of an extraneous field and warn about it. When installing magnetic contacts in metal doors, it is very important to shield the field of the main magnet from the induced field of the entire door.

Electrical contact devices - sensors that sharply change the voltage in the circuit with a certain impact on them. They can be either unambiguously “open” (current flows through them), or “closed” (no current flows). The simplest way to build such an alarm is thin wires or foil strips connected to a door or window. Wire, foil or conductive compound "Pasta" are connected to the alarm system through door hinges, locks, and also through special contact blocks. When trying to penetrate, they are easily destroyed and form an alarm signal. Electrical contact devices provide reliable protection against false alarms.

IN mechanical door contact devices the movable contact protrudes from the sensor housing and closes the circuit when pressed (door closed). The installation location of such mechanical devices is difficult to hide, and it is easy to disable them by securing the lever in a closed position (for example, with chewing gum).

Contact mats are made of two decorated sheets of metal foil and a layer of foamed plastic between them. Under the weight of the body, the foil bends, and this provides an electrical contact that generates an alarm. Contact mats operate on the normally open principle and a signal is generated when an electrical contact device closes the circuit. Therefore, if you cut the wire leading to the mat, the alarm will not go off in the future. A flat cable is used to connect the rugs.

Passive infrared detectors (PIR) serve to detect intruder intrusion into a controlled area. This is one of the most common types of security detectors. The principle of operation is based on the registration of changes in the flux of thermal radiation and conversion of infrared radiation into an electrical signal using a pyroelectric element. Currently, two- and four-area pyroelements are used. This can significantly reduce the likelihood of false alarms. In simple PIC, signal processing is performed by analog methods, in more complex ones - by digital, using an integrated processor. The detection area is formed by a Fresnel lens or mirrors. Distinguish between volumetric, linear and surface detection zones. It is not recommended to install infrared detectors in the immediate vicinity of ventilation openings, windows and doors that create convection air flows, as well as heating radiators and sources of thermal interference. It is also undesirable to directly hit the light radiation of incandescent lamps, car headlights, the sun on the entrance window of the detector. It is possible to use a thermal compensation circuit to ensure operability in the high temperature region (33–37 ° C), when the signal from human movement decreases sharply due to a decrease in the thermal contrast between the human body and the background.

Active detectors are an optical system of an LED that emits infrared radiation in the direction of the receiver lens. The light beam is modulated in brightness and acts at a distance of up to 125 m and allows you to form an invisible security line. These emitters can be either single-beam or multi-beam. When the number of beams is more than two, the possibility of false triggering is reduced, since the alarm signal is generated only when all beams are simultaneously crossed. The configuration of the zones is different - "curtain" (intersection of the surface), "beam" (linear movement), "volume" (movement in space). The detectors may not work in rain or heavy fog.

Radio wave volumetric detectors serve to detect penetration of the protected object by registering the Doppler frequency shift of the reflected ultra-high-frequency (microwave) signal that occurs when an intruder moves in the electromagnetic field created by the microwave module. They can be covertly installed on site behind materials that transmit radio waves (fabrics, wood-based panels, etc.). Linear radio wave detectors consist of a transmitting and receiving unit. They form an alarm notification when a person crosses their zone of action. The transmitting unit emits electromagnetic oscillations, the receiving unit receives these oscillations, analyzes the amplitude and time characteristics of the received signal and, if they match the “intruder's” model embedded in the processing algorithm, generates an alarm notification.

Microwave sensors have lost their former popularity, although they are still in demand. In relatively new developments, a significant reduction in their dimensions and energy consumption has been achieved.

Volumetric ultrasonic detectors serve to detect movement in the protected area. Ultrasonic sensors are designed to protect premises in terms of volume and give an alarm both when an intruder appears and when a fire occurs. The emitting element of the detector is a piezoelectric ultrasonic transducer that produces acoustic vibrations of air in the protected volume under the influence of an electric voltage. The sensitive element of the detector located in the receiver is a piezoelectric ultrasonic receiving transducer of acoustic vibrations into an alternating electrical signal. The signal from the receiver is processed in the control circuit, depending on the algorithm incorporated in it, and generates one or another notification.

Acoustic detectors are equipped with a highly sensitive miniature microphone that picks up the sound emitted when sheet glass breaks. The sensing element of such detectors is a condenser electret microphone with a built-in preamplifier on a field-effect transistor. When glass is broken, two types of sound vibrations occur in a strictly defined sequence: first, a shock wave from the vibration of the entire glass array with a frequency of about 100 Hz, and then a wave of glass destruction with a frequency of about 5 kHz. The microphone converts sound vibrations in the air into electrical signals. The detector processes these signals and makes a decision about intrusion. When installing the detector, all areas of the protected glass must be within its line of sight.

Capacitive system sensor represents one or more metal electrodes placed on the structure of the protected opening. The principle of operation of capacitive security detectors is based on recording the value, speed and duration of the change in the capacitance of the sensitive element, which is used as metal objects connected to the detector or specially laid wires. The detector generates an alarm signal when the electrical capacity of a security item (safe, metal cabinet) changes relative to "ground" caused by a person's approach to this item. Can be used to guard the perimeter of a building through stretched wires.

Vibration detectors serve to protect against penetration into the protected object by destroying various building structures, as well as protecting safes, ATMs, etc. The principle of operation of vibration sensors is based on the piezoelectric effect (piezoelectrics generate an electric current when the crystal is pressed or released), which consists in changing the electrical signal during vibration of the piezoelectric element. The electrical signal proportional to the vibration level is amplified and processed by the detector circuit according to a special algorithm to separate the destructive effect from the interference signal. The operating principle of vibration systems with sensor cables is based on the triboelectric effect. When such a cable deforms, electrification occurs in the dielectric located between the central conductor and the conductive braid, which is recorded as a potential difference between the cable conductors. The sensing element is a sensor cable that converts mechanical vibrations into an electrical signal. There are also more advanced electromagnetic microphone cables.

A relatively new principle of protecting premises is to use a change in air pressure when opening a closed room ( barometric sensors) has still not met the expectations placed on it and is almost never used when equipping multifunctional and large facilities. These sensors have a high false alarm rate and rather severe application restrictions.

It is necessary to dwell separately on distributed fiber optic systems for perimeter protection. Modern fiber optic sensors can measure pressure, temperature, distance, position in space, acceleration, vibration, mass of sound waves, liquid level, deformation, refractive index, electric field, electric current, magnetic field, gas concentration, radiation dose, and etc. Optical fiber is both a communication line and a sensitive element. The optical fiber is fed with laser light with a high output power and a short radiation pulse, then the parameters of Rayleigh backscattering, as well as Fresnel reflection from the joints and ends of the fiber, are measured. Under the influence of various factors (deformation, acoustic vibrations, temperature, and with the appropriate fiber coating - electric or magnetic field), the phase difference between the supplied and reflected light pulse changes. The location of the inhomogeneity is determined from the time delay between the instant of emission of the pulse and the instant of arrival of the backscattered signal, and the loss in the line section is determined from the intensity of the backscattered radiation.

A signal analyzer based on the principle of a neural network is used to separate the signals generated by the intruder from the noise and interference. The signal to the input of the neural network analyzer is supplied in the form of a spectral vector formed by the DSP processor (Digital Signal Processing), the principle of operation of which is based on algorithms for the fast Fourier transform.

The advantages of distributed fiber-optic systems are the ability to determine the location of the violation of the boundary of an object, use these systems to protect perimeters up to 100 km long, a low level of false alarms and a relatively low price per linear meter.

The leader among security alarm equipment is currently combined sensor, built on the use of simultaneously two channels of human detection - passive IR and microwave. Nowadays it is replacing all other devices and many alarm installers use it as the only sensor for volumetric protection of premises. The average operating time for a false alarm is 3-5 thousand hours, and in some conditions it reaches a year. It allows you to block such rooms where passive IR or microwave sensors are generally not applicable (the first - in rooms with drafts and thermal interference, the second - with thin non-metallic walls). But the probability of detection for such sensors is always less than that of any of the components of its two channels. The same success can be achieved by using separately both sensors (infrared and microwave) in the same room, and an alarm can be generated only when both detectors are triggered in a given time interval (usually a few seconds), using the capabilities of the control equipment for this purpose.

2.4. Types of fire detectors

The following basic activation principles can be used to detect a fire fire detectors:

smoke detectors - based on ionization or photoelectric principle;

heat detectors - based on fixing the level of temperature rise or some of its specific indicators;

flame detectors - based on the use of ultraviolet or infrared radiation;

gas detectors.

Manual call points are necessary for the forced transfer of the system to the fire alarm mode by a person. They can be realized in the form of levers or buttons covered with transparent materials (easily broken in case of fire). Most often they are installed in easily accessible public areas.

Heat detectors react to changes in ambient temperature. Some materials burn with little or no smoke (eg wood), or smoke diffusion is difficult due to the small space (behind false ceilings). They are used in cases where the air contains a high concentration of aerosol particles that have nothing to do with combustion processes (water vapor, flour in a mill, etc.). Thermal threshold fire detectors give a "fire" signal when the threshold temperature is reached, differential - fix a fire hazardous situation by the rate of temperature rise.

Contact threshold heat detector issues an alarm when a predetermined maximum allowable temperature is exceeded. When heated, the contact plate is melted, the electrical circuit is broken and an alarm is generated. These are the simplest detectors. Typically the threshold temperature is 75 ° C.

A semiconductor element can also be used as a sensitive element. As the temperature rises, the resistance of the circuit drops, and more current flows through it. If the threshold value of the electric current is exceeded, an alarm signal is generated. Semiconductor sensitive elements have a higher response rate, the threshold temperature value can be set arbitrarily, and when the sensor is triggered, the device is not destroyed.

Differential heat detectors usually consist of two thermoelements, one of which is located inside the detector housing, and the other is located outside. The currents flowing through these two circuits are fed to the inputs of the differential amplifier. As the temperature rises, the current flowing through the external circuit changes sharply. In the internal circuit, it hardly changes, which leads to an imbalance of currents and the formation of an alarm signal. The use of a thermocouple eliminates the influence of smooth temperature changes caused by natural causes. These sensors are the fastest in response speed and stable in operation.

Linear heat detectors. The construction consists of four copper conductors with sheaths of a special material with a negative temperature coefficient. The conductors are packed in a common casing so that they are in close contact with their shells. The wires are connected in pairs at the end of the line, forming two loops, touching the shells. Principle of operation: as the temperature increases, the shells change their resistance, also changing the total resistance between the loops, which is measured by a special processing unit. By the magnitude of this resistance, a decision is made about the presence of fire. The longer the cable length (up to 1.5 km), the higher the sensitivity of the device.

Smoke detectors are designed to detect the presence of a given concentration of smoke particles in the air. The composition of the smoke particles varies. Therefore, according to the principle of operation, smoke detectors are divided into two main types - optoelectronic and ionization.

Ionization smoke detector. The stream of radioactive particles (usually americium-241 is used) enters two separate chambers. When smoke particles (the color of the smoke is not important) enter the measuring (external) chamber, the current flowing through it decreases, since this leads to a decrease in the path length of α particles and an increase in ion recombination. For processing, the difference between the currents in the measuring and control chambers is used. Ionization detectors do not harm human health (a source of radioactive radiation of the order of 0.9 μCi). These sensors provide real fire protection in hazardous areas. They also have a record low current consumption. The disadvantages are the complexity of disposal after the end of its service life (at least 5 years) and vulnerability to changes in humidity, pressure, temperature, and air velocity.

Optical smoke detector. The measuring chamber of this device contains an optoelectronic pair. An LED or a laser (aspiration sensor) is used as a reference element. Radiation of the driving element of the infrared spectrum under normal conditions does not fall on the photodetector. When smoke particles enter the optical chamber, radiation from the LED is scattered. Due to the optical effect of scattering infrared radiation on smoke particles, light enters the photodetector, providing an electrical signal. The higher the concentration of scattering smoke particles in the air, the higher the signal level. For the correct operation of the optical detector, the design of the optical camera is very important.

Comparative characteristics of ionization and optical types of detectors are given in table. 3.


Table 3

Comparison of the effectiveness of smoke detection methods

Laser detector provides smoke detection at specific optical density levels approximately 100 times lower than modern LED sensors. There are more expensive systems with forced air intake. To maintain sensitivity and prevent false alarms, both types of detectors (ionization or photoelectric) require periodic cleaning.

Smoke line detectors indispensable in rooms with high ceilings and large areas. They are widely used in fire alarm systems, since it becomes possible to record a fire hazard situation at very early stages. The ease of installation, configuration and operation of modern linear detectors allows them to compete in price with point detectors, even in medium-sized rooms.

Combined smoke detector (ionization and optical types of detectors are collected in one housing) operates at two angles of light reflection, which allows you to measure and analyze the ratio of the characteristics of forward and backward scattering of light, determining the types of smoke and reducing the number of false alarms. This is done through the use of bi-angle light scattering technology. It is known that the ratio of forward scattered light to backscattered light for dark smoke (soot) is higher than for light types of smoke (smoldering wood), and even higher for dry substances (cement dust).

It should be noted that the most effective is a detector that combines photoelectric and thermal sensing elements. Today are produced and three-dimensional combined detectors, they combine smoke optical, smoke ionization and thermal detection principles. In practice, they are rarely used.

Flame detectors. Open fire has characteristic radiation in both the ultraviolet and infrared parts of the spectrum. Accordingly, there are two types of devices available:

ultraviolet - a high-voltage gas-discharge indicator constantly monitors the radiation power in the ultraviolet range. When an open fire appears, the intensity of the discharges between the electrodes of the indicator greatly increases and an alarm signal is issued. A similar sensor can monitor an area of \u200b\u200bup to 200 m 2 at an installation height of up to 20 m. The response time does not exceed 5 s;

infrared - with the help of an IR sensitive element and an optical focusing system, characteristic bursts of IR radiation are recorded when a fire occurs. This device allows to detect within 3 s the presence of a flame with a size of 10 cm at a distance of 20 m at a viewing angle of 90 °.

Now there are sensors of a new class - analog detectors with external addressing... The sensors are analog, but are addressed by the alarm loop in which they are installed. The sensor performs a self-test of all its components, checks the dustiness of the smoke chamber, transmits the test results to the control panel. Compensation of dustiness in the smoke chamber allows to increase the detector's operating time until the next service, self-testing eliminates false alarms. Such detectors retain all the advantages of analogue addressable detectors, are low-cost and can work with inexpensive conventional control panels. When placing several detectors in the alarm loop, each of which will be installed in the room alone, it is necessary to install remote optical indication devices in the common corridor.

The criterion for the efficiency of the fire alarm equipment is to minimize the number of errors and false alarms. It is considered an excellent work result if there is one false alarm from one zone per month. The false alarm rate is the main characteristic by which one can judge the noise immunity of the detector. Immunity Is an indicator of the quality of the sensor, which characterizes its ability to operate stably in various conditions.

The control of the security and fire alarm system is carried out from the control panel (concentrator). The composition and characteristics of this equipment depend on the importance of the object, the complexity and branching of the alarm system. In the simplest case, control over the operation of the FSA consists of turning on and off sensors, fixing alarm signals. In complex, branched signaling systems, monitoring and control is carried out using computers.

Modern security alarm systems are based on the use of microprocessor control panels connected to the monitoring station via wired lines or a radio channel. The system can have several hundred security zones, for ease of management the zones are grouped into sections. This allows you to arm and disarm not only each sensor separately, but also a floor, a building, etc. Usually, a section reflects some logical part of an object, for example, a room or a group of rooms, united by some essential logical feature. Control and monitoring devices allow: control and monitoring of the state of both the entire fire alarm system and each sensor (on / off, alarm, failure, failure on the communication channel, attempts to open sensors or communication channel); analysis of alarm signals from various types of sensors; performance check of all system nodes; alarm recording; interaction of signaling with other technical means; integration with other security systems (CCTV, security lighting, fire extinguishing systems, etc.). The characteristics of conventional, addressable and analogue addressable fire alarm systems are given in table. 4.

Table 4

Characteristics of conventional, addressable and analogue addressable fire alarm systems

2.5. Processing and logging information, generating alarm control signals

For processing and logging information and generating control alarm signals, various control and monitoring equipment can be used - central stations, control panels, control panels.

Alarm control panel (PKP) supplies power to security and fire detectors via security and fire alarm loops, receives alarm notifications from sensors, generates alarm messages, and also transmits them to a centralized monitoring station and generates alarms for triggering other systems. Such equipment differs in information capacity - the number of monitored alarm loops and the degree of development of control and notification functions.

To ensure the compliance of the device with the chosen tactics of use, control panels of the security and fire alarm systems are distinguished for small, medium and large objects.

Usually, small objects are equipped with conventional systems that control several loops of the security and fire alarm system, and at medium and large objects, address and address-analog systems are used.

Small information capacity control panel. Usually, these systems use security and fire alarm control devices, where the maximum permissible number of sensors is included in one loop. These control panels allow you to solve a maximum of tasks at a relatively low cost of completing the system. Small control panels have the versatility of loops according to their purpose, that is, the transmission of signal and control commands (alarm, security, fire modes of operation) is possible. They have a sufficient number of outputs to the central monitoring station, they allow you to record events. The output circuits of small control panels have outputs with sufficient current to power the detectors from the built-in power supply, and can control fire or technological equipment.

Currently, there is a tendency to use instead of a small information capacity control panel a medium data capacity control panel. With this replacement, one-time costs almost do not increase, but labor costs when eliminating faults in the linear part are significantly reduced due to the exact determination of the place of failure.

Control panel of medium and large information capacity. For centralized reception, processing and reproduction of information from a large number of security objects, consoles and centralized surveillance systems are used. When using a device with a common central processor with a concentrated or tree-like structure for laying loops (both addressable and non-addressable FSA), the incomplete use of the control panel information capacity leads to a certain increase in the cost of the system.

IN address systems one address must correspond to one addressable device (detector). When using a computer, due to the absence of a central control panel with limited monitoring and control functions in the control panel units themselves, there are difficulties in power backup and the impossibility of full functioning of the alarm system if the computer itself fails.

IN analog addressable fire alarm control panels the price of equipment for one address (control panel and sensor) is twice as high as for analog systems. But the number of analogue addressable sensors in separate rooms in comparison with threshold (maximum) detectors can be reduced from two to one. Increased adaptability, information content, self-diagnostics of the system minimize operating costs. The use of addressable, distributed or tree-like structures minimizes the costs of cables and their laying, as well as the costs of maintenance up to 30-50%.

The use of the control panel for fire alarm systems has some specific features. The system structures used are classified as follows:

1) control panel with a concentrated structure (in the form of a single unit, with unaddressed radial loops) for fire alarm systems of medium and large information capacity. Such control panels are used less and less; it can be recommended to use them in systems with up to 10–20 loops;

2) control panel for analogue addressable fire alarm systems. Analogue addressable control panels are much more expensive than addressable threshold ones, but they have no particular advantages. They are easier to install, maintain and repair. They have significantly increased information content;

3) control panel of addressable fire alarm systems. Groups of threshold sensors form addressable control zones. The control panels are structurally and programmatically composed of complete functional blocks. The system is combined with detectors of any design and principle of operation, turning them into addressable ones. All devices in the system are usually addressed automatically. They allow combining most of the advantages of analogue addressable systems with the low cost of maximum (threshold) sensors.

To date, a digital-to-analog signaling loop has been developed that combines the advantages of analog and digital loops. It has more information content (in addition to ordinary signals, additional ones can be transmitted). The ability to transmit additional signals allows you to abandon the configuration and programming of alarm loops, to use several types of detectors in one loop at once when automatically setting up to work with any of them. This reduces the number of alarm loops required for each facility. In this case, the control panel can simulate the operation of the alarm loop at the command of its detector in order to transmit information to another control panel of the same central monitoring station (Monitoring station).

The monitoring station can not only receive information, but also transmit basic commands. This security and fire device does not need to be specially programmed (the setting is automatic, similar to the function in the "Plug & Plau" computer). Therefore, no highly qualified specialists are required for maintenance. In one fire loop, the device receives signals from heat, smoke, manual detectors, engineering systems control sensors, distinguishes between the operation of one or two detectors, and can even work with analog fire detectors. The alarm loop address becomes the address of the room, and without programming the parameters of the control panel or detectors.

2.6. OPS actuators

OPS actuators must ensure that the specified response of the system to an alarm event is fulfilled. The use of intelligent systems makes it possible to carry out a set of measures related to the elimination of a fire (fire detection, alert special services, informing and evacuating personnel, activating the fire extinguishing system), and to carry them out in a fully automatic mode. For a long time, automatic fire extinguishing systems have been used, releasing a fire-suppressing agent into the protected room. They can localize and eliminate fires before they develop into a real fire, and act directly on the fires. Now there are a number of systems that can be used without prejudice to technology (including those with electronic filling).

It should be noted that connecting automatic fire extinguishing installations to security and fire control panels is somewhat ineffective. Therefore, experts recommend using a separate fire control panel with the ability to control automatic fire extinguishing installations and voice notification.

Autonomous fire extinguishing systems it is most effective to install in places where fire is especially dangerous and can cause irreparable damage. Autonomous installations necessarily include devices for storing and supplying fire extinguishing agents, devices for detecting fire centers, automatic start devices, means for signaling a fire or triggering an installation. By the type of fire-suppressing agent, the systems are subdivided into water, foam, gas, powder, aerosol.

Sprinkler and deluge automatic fire extinguishing systems They are used to extinguish fires with water on large areas with finely sprayed water streams. In this case, it is necessary to take into account the possibility of indirect damage associated with the loss of consumer properties of equipment and (or) goods when wet.

Foam fire extinguishing systems use air-mechanical foam for extinguishing and are used without restrictions. The set of the system includes a foam mixer complete with a strapping and a bladder tank with an elastic container for storing and dosing foam concentrate.

Gas fire extinguishing systems used to protect libraries, computing centers, bank depositories, small offices. In this case, additional costs may be required to ensure proper tightness of the protected object and to carry out organizational and technical measures for the preventive evacuation of personnel.

Powder fire extinguishing systems are used where it is necessary to localize the fire source and ensure the safety of material values \u200b\u200band equipment not damaged by fire. Compared to other types of self-contained fire extinguishers, powder modules are distinguished by their low price, ease of maintenance, and environmental safety. Most of the powder fire extinguishing modules can operate both in the electric start mode (by signals from fire sensors) and in the self-start mode (when the critical temperature is exceeded). In addition to autonomous operation, as a rule, they provide for the possibility of manual start. These systems are used to localize and extinguish fire centers in confined spaces and in the open air.

Aerosol fire extinguishing systems - systems that use fine solid particles for extinguishing. The only difference between an aerosol fire extinguishing system and a powder one is that at the moment of operation, an aerosol is released, and not a powder (larger than an aerosol). These two fire extinguishing systems are similar in function and in principle of operation.

The advantages of such a fire extinguishing system (such as ease of installation and installation, versatility, high extinguishing capacity, efficiency, use at low temperatures and the ability to extinguish materials under stress) are primarily economic, technical and operational.

The disadvantage of such a fire extinguishing system is the danger to human health. The service life is limited to 10 years, after which it must be dismantled and replaced with a new one.

Another important element of the FSA is alert notification. Alarm alert can be carried out by manual, semi-automatic or automatic control. The main purpose of the warning system is to alert people in the building about a fire or other emergency and to control their movement to a safe area. Alerting about a fire or other emergency should be significantly different from alerting a burglar alarm. The clarity and uniformity of the information presented in the voice announcement is critical.

Warning systems differ in composition and principle of operation. Block operation control analog warning system is carried out using a matrix control unit. Control digital warning system usually implemented using a computer. Local warning systems a previously recorded text message is broadcast in a limited number of rooms. Usually, such systems do not allow for prompt evacuation control, for example, from a microphone console. Centralized systems automatically broadcasts the recorded emergency message to predefined zones. If necessary, the dispatcher can transmit messages from the microphone console ( semi-automatic broadcast mode).

Most fire alarm systems are modular. The procedure for organizing the warning system depends on the characteristics of the protected object - the architecture of the object, the nature of production activities, the number of personnel, visitors, etc. For most small and medium-sized objects, fire safety standards define the installation of warning systems of the 1st and 2nd type (sound and light signals to all rooms of the building). In notification systems of the 3rd, 4th and 5th types, one of the main methods of notification is speech. The choice of the number and power of switching on the sirens in a particular room directly depends on such fundamental parameters as the noise level in the room, the size of the room and the sound pressure of the installed sirens.

As a source of sound alarms, loud bells, sirens, speakers, etc. are used. The most often used as light ones are “Exit” light boards, “Direction of movement” light indicators, and flashing light annunciators (strobe flashes).

Typically, alarms control other security features. For example, in the event of a non-standard situation, advertisements that seem ordinary at first glance may be transmitted between advertisements, which inform the security service and company personnel about incidents with conventional phrases. For example: "Security guard on duty, call 112". The number 112 could mean a potential attempt to carry unpaid clothing out of the store. In emergency situations, the warning system should provide control over the evacuation of people from premises and buildings. In normal mode, the notification system can also be used to transmit background music or advertisements.

Also, the warning system can be hardware or software integrated with the access control system, and when an alarm pulse is received from the sensors, the warning system will issue a command to open the doors of additional emergency exits. For example, in the event of a fire, an alarm triggers the automatic fire extinguishing system, turns on the smoke exhaust system, turns off the forced ventilation of the premises, turns off the power supply, dials the specified phone numbers (including emergency services), turns on emergency lighting, etc. And when an unauthorized entry into the premises is detected, the automatic door blocking system is triggered, SMS messages are sent to the cell phone, messages are sent by pager, etc.

Communication channels in the FSA system can be specially laid wired lines or telephone lines, telegraph lines and radio channels already available at the facility.

The most common communication systems are multicore shielded cables, which are placed in metal or plastic pipes, metal hoses to increase the reliability and safety of the alarm. The transmission lines that carry the signals from the detectors are physical loops.

In addition to traditional lines of wire communication, fire alarm systems today offer security and fire alarms that work with the use of a radio communication channel. They have high mobility, commissioning is minimized, quick installation and dismantling of the fire alarm is provided. Setting up radio channel systems is very simple, since each radio button has its own individual code. Such systems are used in situations where it is impossible to stretch a cable or it is not financially justified. The stealthiness of these systems is combined with the ability to easily build up or reconfigure them.

Also, we must not forget that there is always a danger of deliberate damage to the electrical circuit by an intruder or a power outage due to an accident. Yet security systems must remain functional. All security and fire alarm devices must be provided with uninterruptible power supply. The power supply of the security alarm system must be redundant. In the absence of voltage in the network, the system must automatically switch to backup power.

In the event of a power outage, the functioning of the alarm does not stop due to the automatic connection of the backup (emergency) power source. To ensure uninterrupted and protected power supply of the system, uninterruptible power supplies, batteries, backup power supply lines, etc. are used. The use of a centralized backup power source leads to losses in the used capacity of backup batteries, to additional costs for wires of increased cross-section, etc. on the object of backup power supplies does not allow monitoring their status. To implement their control, the power supply is included in the address system of the FSA with an independent address.

It is necessary to provide for the possibility of duplicating power supply using various electrical substations. It is also possible to implement backup power line from your generator. Fire safety standards require that the security and fire alarm system can remain operational in the event of a power failure during the day in standby mode and at least three hours in alarm mode.

Currently, a complex application of fire alarm systems is used to ensure the security of an object with a high degree of integration with other security systems such as access control systems, video surveillance, etc. When building integrated security systems, problems of compatibility with other systems appear. To combine security and fire alarm systems, notification, control and management of access, CCTV, automatic fire extinguishing installations, etc., software, hardware (which is the most preferable) and the development of a single finished product are used.

Separately, it should be mentioned that the Russian SNiP 2.01.02-85 also requires that the evacuation doors of buildings do not have locks that cannot be opened from the inside without a key. In such conditions, special handles are used for emergency exits. Anti-panic handle ( Push-Bar) is a horizontal bar, pressing at any point will open the door.

MINISTRY OF THE INTERIOR OF THE RUSSIAN FEDERATION

GENERAL DEPARTMENT OF DEPARTMENTAL SECURITY

SELECTION AND APPLICATION OF PRODUCTS
SECURITY AND FIRE SIGNALS
AND MEANS OF TECHNICAL STRENGTHENING FOR
EQUIPMENT OF OBJECTS


DEVELOPED by the staff of the Research Center "Protection" of the GUVO of the Ministry of Internal Affairs of Russia N.N. Kotov, L.I. Savchuk, E.P. Tyurin under the leadership of V.G. Sinilov

APPROVED by the GUVO of the Ministry of Internal Affairs of Russia on June 27, 1998.

INTRODUCTION

INTRODUCTION


The main role in ensuring the complex security of the facility is played by the technical means of security and fire alarms (TS OPS) and means of technical strengthening. The correct choice and use of the TS OPS and means of technical strengthening at the facility allows to ensure a sufficiently high reliability of the facility's protection from all possible internal and external types of threats and dangerous situations. At the same time, the lack of a proper approach to the process of choosing and using TS OPS and means of technical strengthening lowers the level (or effectiveness) of security and leads to prohibitively high costs to ensure the required security.

The choice of the equipment option for the TS OPS facility and the means of technical strengthening is determined by the characteristics of the importance of the premises of the facility, its construction and architectural planning solutions, operating and maintenance conditions, operating mode, interference arising at the facility, and many other factors that must be taken into account when designing an integrated system security.

In this work, recommendations are given and requirements are set forth, which must first of all be taken into account by organizations conducting design and installation work on equipping TS OPS facilities and means of technical strengthening.

1. GENERAL PROVISIONS


The higher the level (or efficiency) of security, the higher the likelihood of preserving all values \u200b\u200bof the object from theft or destruction. The level of security, in turn, mainly depends on the response time of the TS OPS to the emerging threat and on the time to overcome physical barriers: bars, locks, safes, latches on windows and doors, specially reinforced doors, walls, floors, ceilings, etc. etc., that is, means of technical strengthening on the path of the possible movement of the offender. The sooner an emerging threat to an object can be detected, the more effectively it can be stopped. This is achieved through the correct selection and use of TS OPS and their optimal placement in protected areas. The use of means of technical strengthening increases the time required for the offender to overcome them, which makes it more likely to be detained. This is especially evident when using these funds in combination with the TS OPS. Means of technical strengthening, in addition to the functions of a physical obstacle, also perform the functions of a psychological obstacle, preventing the possibility of an intruder from entering the protected object.

The design phase of the security system is the most important period during which all the main functions and structures of the security system are laid. At this stage, the object is surveyed, the goals of which are:

- on-site study of the characteristics of the object, which determine its resistance to alleged criminal attacks and possible emergencies;

- determination of a set of measures and development of technical proposals for organizing the security of an object, taking into account the formed standard solutions that ensure sufficient safety.

Based on the results of the survey, a technical assignment is developed for the design of a complex of technical security equipment. The inspection of the facility is carried out by an interdepartmental commission (IAC) consisting of representatives of the administration (or security service) of the facility, a subdivision of private security, state supervision and, if necessary, other interested organizations.

Design, preparation and execution of work should be carried out in accordance with the regulatory and technical documents:

- RD 78.143-92 Security alarm systems and complexes. Elements of technical fortification of facilities. Design standards;

- RD 78.145-93 Systems and complexes of security, fire and security and fire alarm systems. Rules for production and acceptance of works;

- RD 78.146-93 Instructions on technical supervision over the implementation of design and installation work on equipping facilities with security alarm devices;

- RD 78.147-93 Uniform requirements for technical strength and equipment with signaling facilities;

- RD 78.148-94 Protective glazing. Classification, test methods. Application;

- GOST R 50862-96 Safes and valuables. Requirements and test methods for burglary resistance and fire resistance;

- GOST R 50941-96 Safety cabin. General technical requirements and test methods;

- GOST R 51072-97 Safety doors. Requirements and test methods for burglary resistance;

- Electrical Installation Rules (PUE);

- Typical requirements for technical strength and signaling equipment for trade enterprises;

- SNiP 2.04.09-84, SNiP 3.05.06-85 and other current regulatory and technical documents approved in the prescribed manner, in particular, technological maps and instructions for the installation of fire alarm systems and devices, as well as technical documentation for products.

2 CATEGORATION OF ROOMS


The choice of the equipment option for the TS OPS object and means of technical strengthening is determined by the importance of the premises of the object, the type and placement of valuables in these premises. All premises of any object can be conditionally divided (according to the type and placement of valuables in them) into four categories:

the first category - premises where goods, objects, and products of special value and importance are located, the loss of which can lead to especially large or irreparable material and financial damage, pose a threat to the health and life of a large number of people inside and outside the facility, lead to other grave consequences.

Typically, such premises include: storages (pantries) of valuables, warehouses for storing weapons and ammunition, premises with permanent storage of narcotic and toxic substances, as well as secret documents and other especially valuable and especially important inventory items;

the second category - premises where valuable and important goods, items and products are located, the loss of which can lead to significant material and financial damage, pose a threat to the health and life of people at the facility.

Such premises include: special archives and special libraries, safe rooms, storage rooms for service firearms, radioisotope substances and drugs, jewelry, antiques, art and culture, money, currency and securities (main cash desks of objects);

the third category is the premises where goods, items and articles of everyday demand and use are located.

Such premises include: office, office premises, trading halls and premises for industrial goods, household appliances, food products, etc .;

the fourth category - premises where goods, objects and products of technological and economic purpose are located.

Such premises include: utility and auxiliary premises, premises with permanent or temporary storage of technological and utility equipment, technical and design documentation, etc.

3 TECHNICAL STRENGTHENING OF THE FACILITIES


Technical strength - a set of measures aimed at strengthening the structural elements of buildings, premises and protected areas that provide the necessary resistance to unauthorized entry into the protected area, burglary and other criminal encroachments.

The classification of structural elements (walls, doors, window openings) is given in Appendices A - B. The selected group of protection against burglary of structural elements must correspond to the value and importance of the property (values) in the room, that is, the corresponding category of the room. In addition, it is necessary to take into account the location of the object and the availability of penetration into its premises. At the same time, increased requirements should be imposed on places where an attacker can operate in relative safety.

To increase the reliability of the protection of the premises of the facility, technical strength, which is the basis for building a technical security system, should be used in combination with the TS OPS. In case of inconsistency or insufficient technical strengthening of structural elements with the categories of premises, it is recommended to strengthen these elements or premises with additional means (lines) of the security alarm in accordance with Appendix G.

3.1 Walls and ceilings

Load-bearing and internal walls and partitions, floor and ceiling ceilings of the premises of the object where the valuables are located, must have a sufficient degree of protection against possible unauthorized entry. Appendix A shows the classification of building structures in terms of burglary resistance. Depending on the category of the room, its location in the building, the choice of structure or its reinforcement is carried out.

Reinforcement of walls, ceilings and partitions is usually performed over the entire area with metal gratings and nets (Appendix A), installed from the inside of the room. Lattices or nets are welded to steel anchors with a diameter of 12 mm or more, firmly embedded in the wall (overlap) to a depth of 80 mm (to embedded parts made of a steel strip with dimensions of 100x50x6 mm) with a pitch of not more than 500x500 mm. After installation, the gratings or meshes should be masked with plaster (cladding panels).

If it is impossible to install a lattice or net from the inside, it is allowed (in agreement with the security units) to install them from the outside of the room.

3.2 Doors

Doors (mainly entrance) of rooms, as well as walls, must have a sufficient degree of protection against possible unauthorized entry. Appendix B shows the classification of door building structures in terms of resistance to burglary. Depending on the category of the room, its location in the building, the choice of the design of the doors or their reinforcement is carried out.

Additional lattice doors used to enhance the protection of the room are installed from the inside. Doors can be hinged or sliding and locked with locks.

For reinforcement, it is recommended to frame a wooden door frame with a steel corner with dimensions of at least 45x28x4 mm, and also fix the box in the wall with steel "ruffs" (crutches) with a diameter of 10 mm and more and a length of at least 120 mm.

It is recommended to equip the entrance doors to the facility with at least two mortise non-self-locking electromechanical and / or mechanical locks, installed at a distance of 300 mm or more from each other.

3.3 Window openings

All windows, transoms and vents in the premises of the facility must be glazed and have reliable and serviceable locks. Glasses must be intact and securely fixed in the grooves. Appendix B provides a classification of window openings and their structures for burglary resistance. Depending on the category of the room, its location in the building, the choice of window openings or their reinforcement structure is made.

Window openings of rooms of the first and third categories, located on the first floor of the building, as well as window openings of these rooms (regardless of the number of storeys), overlooking fire escapes, roofs of different-height buildings and canopies, through which you can enter the premises, are equipped with protective structures: gratings, shutters, blinds, screens, etc.) or protective glazing in accordance with Appendix B.

If all window openings of the premises of the object located on the same floor of the building are equipped with gratings, then one of them is made opening with the possibility of closing it with a lock (built-in or hinged).

When installing stationary metal gratings on the window openings of a room, the ends of the bars of these gratings must be sealed into the wall of the building to a depth of at least 80 mm and filled with cement mortar or welded to existing structures. If it is impossible to do this, the lattice is framed with a corner with dimensions of at least 35x35x4 mm and welded along the perimeter to steel anchors firmly embedded in the wall of the building to a depth of 80 mm with a diameter of 10 mm or more and a length of at least 120 mm.

Grilles can be installed both from the inside of the room and between the window frames. In some cases, it is allowed to install stationary and decorative metal grilles from the outside of the room.

The cash register room of an enterprise, organization, institution must be equipped with a special window with dimensions of no more than 200x300 mm with a door for operations with customers. If the dimensions of the window exceed the above, then outside it should be reinforced with protective structures (in accordance with RD 78.147-93).

A special cash register window can be made in the form of a transfer unit in accordance with GOST R 50941-96.

3.4 Ventilation and flues

Ventilation shafts, ducts and chimneys with a diameter of more than 200 mm, having an exit to the roof (or to adjacent rooms) and with their cross-section entering the room in which the valuables are located, should be equipped (at the entrance to it) with metal gratings made from a corner with a cross-section not less than 35x35x4 mm, reinforcement with a diameter of at least 16 mm, with a cell size of no more than 150x150 mm. Grilles in ventilation ducts on the side of the room should be no more than 100 mm from the inner surface of the wall (ceiling).

The walls of rooms of the first and second categories (if ventilation shafts, ducts or chimneys with a diameter of 200 mm and more pass through them) from the inside must be reinforced with a lattice along the entire area bordering them. The lattice is made of reinforcement with a diameter of 10 mm and more and a cell size of not more than 150x150 mm, which is then plastered. Installation of grilles is similar to their installation when strengthening the walls of the room.

Ventilation ducts and chimneys with a diameter of more than 200 mm, passing through rooms of the first and second categories, must be equipped at the entrance to these rooms (exit from them) with metal gratings made of a rod with a diameter of 10 mm or more or with a strong metal mesh, followed by wrapping them with wire to connect to a burglar alarm.

To protect ventilation shafts, ducts and chimneys, it is allowed to use false gratings made of a metal tube with an opening diameter of 6 mm or more and with a cell measuring 100x100 mm (for laying the alarm loop wire).

3.5 Locks and locking devices

Mortise, overhead non-self-locking and padlocks, latches, bolts, latches, etc. are used as locking devices installed on doors and windows.

Padlocks should be used mainly for additional locking of doors, grilles, shutters, blinds, etc. These locks are effective enough (from the point of view of protection) only if they have hardened steel bows and massive robust cases (barn lock), as well as if there are protective covers, plates and other devices in the places of their installation on lockable structures, which can prevent the possibility of rolling or sawing of the ears and temples of the locks.

Typically, the following types of locks are used to lock doors:

- pin cylinder;

- disk cylinder;

- plate cylinders;

- levers;

- electromechanical;

- electromagnetic.

In accordance with the draft of the developed GOST R "Mechanical and electromechanical locks for protective structures of door and window openings. Requirements and test methods for resistance to criminal opening and burglary", the proposed introduction of which on 01.01.1999, all locks supplied to the Russian market and suitable for use on objects taken under protection must be certified and have an appropriate class of resistance to criminal opening and burglary.

For the entrance doors of the premises and objects in which these premises are located, it is recommended to use locks (mortise and overhead) with resistance classes to criminal opening and burglary not lower than those indicated:

- premises of the fourth category - U2 class locks;

- premises of the third category - U3 class locks;

- premises of the first and second categories - U4 class locks, with the exception of storerooms and safes, the doors of which must be equipped with locking devices ensuring secrecy and burglary resistance in accordance with GOST R 50862-96 and GOST R 51053-97.

U1 class locks are recommended to be used mainly for additional door locking.

3.5.1 Cylinder pin locks

The overwhelming majority of pin cylinder locks produced in our country have a secrecy mechanism with five pairs of pins arranged in one row (the usual "English lock"), which determines their low secrecy (up to 2500 combinations). The production of secrecy mechanisms with large tolerances and from soft materials (TsAM 4-1 or aluminum alloys), as well as the absence of pins with a groove, reduce the resistance of the secrecy mechanism to criminal opening. Locks with the same security mechanisms, made of brass and with smaller tolerances, are more resistant (approximately twice) to criminal opening.

Locks with a secrecy mechanism with 8 - 12 pairs of pins, located in 2, 3 or 4 rows, have much higher secrecy (from 6,000 to 50,000 combinations).

A significant design drawback of the mortise pin lock is the presence of a projection of the secrecy mechanism by 10 - 12 mm relative to the door leaf. This can lead to the possibility of grasping the protruding part of the secrecy mechanism with a mechanical tool and destroying it by rolling it up, thereby opening access to the mechanism for moving the bolt. The required effort to roll up a security mechanism made of brass is twice that of a security mechanism made of TsAM 4-1 or aluminum alloy. The opening time of the lock largely depends on the fastening (with screws or screws) of the outer cover, which prevents the capture of the security mechanism. Fastening with screws greatly increases the break-in time.

An increase in the lock's resistance to burglary by drilling is achieved by using a security mechanism with a pressed-in insert made of hard alloy material, which protects the body of the security mechanism, cylinder and pins.

3.5.2 Disk cylinder locks

Locks with a disc secret mechanism (like "Abloy") are among the most reliable in terms of resistance to criminal opening. This is due to the design of the secrecy mechanism, which allows achieving the secrecy of 1,000,000 or more combinations. A small key hole in the secrecy mechanism severely limits the ability to manipulate the pick.

The design disadvantage of most mortise disk locks is the presence of a projection of the secrecy mechanism by 20 mm or more (relative to the door leaf), which makes it easy to break these locks by folding the secrecy mechanism.

An increase in the lock's resistance to burglary by drilling is achieved by using a secrecy mechanism with a pressed-in hardened washer installed in the front of the secrecy mechanism.

3.5.3 Lamellar cylinder locks

Most of the lamellar secrecy mechanisms have six code elements (plates), therefore their secrecy is higher than that of five pin secrecy mechanisms and is about 5000 combinations. Resistance to opening them with master keys, breaking and drilling is the same as that of pin mechanisms.

3.5.4 Lever locks

The main criteria that determine the secrecy of the lever mechanisms are: the number of levers in the mechanism, the size of the gap between the passage groove of the lever and the lever rack. Depending on these parameters, the secrecy of the lever locks ranges from 80 to 2,500,000 combinations.

An increase in the lock's resistance to burglary by drilling is achieved by using a secrecy mechanism, in which the lever arm is protected by a plate made of hardened steel or carbide material.

To protect the front door of the room, it is recommended to use a lock with at least six levers (symmetrical or asymmetrical). The number of levers corresponds to the number of key bit steps, reduced by one step, which is designed to move the bolt of the lock.

3.5.5 Locks and striker plates

The stability of the bars to dynamic loads is determined by the following criteria:

- the material from which the bolt is made;

- cross-sectional area of \u200b\u200bthe bolt;

- the length of the bolt head (according to GOST 5089-97, the length of the bolt head must be at least 40 mm, the bolt overhang - not less than 22 mm, the remaining part of the bolt in the lock body - not less than 18 mm);

- the strength of fastening the front plate to the lock body.

If the length of the bolt head is insufficient and the bolt protrudes significantly, the bolt bends (after striking the lock).

To protect the bolts from possible sawing, it is recommended to use bolt locks that are made of carbide materials or have pressed inserts made of these materials.

Strike plate stability is influenced by: strike plate thickness, configuration and material. Reliable striker plates must be made of steel and have a wall thickness of at least 3 mm.

The L-shaped striker plate possesses high indicators of burglary resistance, which can be fixed not only to the door frame, but also to the wall using anchors.

3.5.6 Electromechanical and electromagnetic locks

Recently, electromechanical and electromagnetic locks, as well as latches, have been widely used.

The electromechanical principle of operation of the actuator of the lock is based on the movement of the closing elements (locks, crossbars, etc.) by turning on an electric motor or an electromagnet during their movement.

In actuators with an electromagnetic operating principle, there are no moving mechanical closing elements, that is, the blocking of barriers (for example, doors) is carried out using the forces of magnetic attraction created by a powerful magnet.

Often in mechanical locks, electromagnetic interlocking (magnetic latches, latches, etc.) of closing elements is used with the ability to manually move them when opening or closing in extreme conditions.

It is recommended to install an electromechanical lock on wooden and / or metal doors weighing up to 100 kg under the condition of an average load (100 ... 200 passes per day). The use of this lock for doors with a high load is ineffective due to high mechanical wear and, as a consequence, a decrease in reliability and service life. Most often, an electromechanical lock is installed on the door (patch or mortise lock), but sometimes it is also installed on the door frame.

It is recommended to install the electromagnetic lock on wooden and metal doors weighing up to 650 kg under the condition of high load (more than 200 passes per day). The absence of parts subject to friction and wear makes this lock virtually permanent. A feature of this lock is the need for a constant current supply to the electromagnet winding, since when the voltage in the network fails (for example, in an accident or deliberate breakage of wires), the lock opens. In this regard, for reliable operation, it is necessary to duplicate the electromagnetic lock with a mechanical one or use an additional backup power supply.

It is recommended to install the electromagnetic latch in the jamb of the door frame. This setting allows you to block the deadbolt of the lock installed in the door (when it is closed), and unlock the lock when a control signal is given to open the door. Such installation of the latch allows you to completely preserve the door lock and hardware.

4 EQUIPMENT OF THE FACILITY SPACES WITH TECHNICAL EQUIPMENT OF SECURITY AND FIRE SIGNALING


The equipment of the premises of the TS OPS facility is performed after the work on technical strengthening. Preparation and execution of work on the equipment of the TS OPS facility should be carried out in accordance with the regulatory documents specified in section 1 of these Recommendations.

At facilities (guarded or subject to protection by private security units), only fire alarm equipment should be installed, included in the current List of non-departmental security technical equipment approved for use, approved by the Main Directorate of the Ministry of Internal Affairs of Russia, with appropriate annual changes and additions.

To increase the reliability of the protection of the object and its premises, the structure of the fire alarm complex is determined based on:

- the operating mode of this object;

- the procedure for conducting transactions with valuables;

- features of the location of premises with valuables inside the building;

- selection of the number of protected zones.

4.1 Equipment of the premises of the facility with technical means of security alarm

At the facility, all premises with permanent or temporary storage of material assets, as well as adjacent other premises and all vulnerable places (windows, doors, hatches, ventilation shafts and ducts), located on the first and last floors of the building along the perimeter of the object.

It is recommended to equip premises of the third and fourth categories with single-line security, premises of the first and second categories - multi-line security.

In rooms of the third and fourth categories, located on the second and higher floors of the building, as well as inside the facility, it is not required to install the OS TS if the building is guarded along the entire perimeter (first and last floors and all vulnerable spots).

Window openings of premises of the first and second categories, located on the second and higher floors of a building guarded along the entire perimeter (first and last floors and all vulnerable spots), it is allowed not to equip the TS OS.

It is recommended to select the most optimal option for protecting the premises of the TS OS facility in accordance with Appendix D of these Recommendations. Depending on the category of valuables stored in the premises, the burglar alarm is divided into four groups (classes) of protection against penetration: the first protection group is insufficient (organization of an incomplete first line of protection in the premises), the fourth protection group is very high (organization of three-line protection of the premises).

The first line of protection is protected by:

Building structures around the perimeter of the building or premises of the facility, that is, all window and door openings;

- places of entry of communications, ventilation ducts;

- exits to fire escapes;

- non-capital and main walls (if protection is needed).

The building structures of the building (premises) of the facility block:

- doorways, loading hatches - for "opening" and "break" (only for wooden ones);

- glazed structures - for "opening" and "breaking" glass;

- places of entry of communications, non-capital and main walls (if protection is needed) - on the "break";

- ventilation ducts, chimneys - for "destruction".

Instead of blocking glazed structures for "opening" and "destruction", internal non-capital walls for "break", doors for "opening" and "break", it is allowed to block these structures only for "penetration" using volumetric and linear detectors. It should be borne in mind that passive optoelectronic detectors used for these purposes (such as "Photon", etc., whose operation is based on the same principle of action) provide protection of premises only from direct penetration of the intruder.

Blocking of building structures (doors, glazed structures) for "opening" is recommended to be carried out with the simplest magnetic contact detectors, and blocking of gates, loading hatches, storage doors, elevator shafts - with limit switches.

It is recommended to block glazed structures against glass "destruction" by ohmic detectors ("foil" type), surface shock-contact or sound detectors.

Blocking of walls for a "break" should be carried out by surface piezoelectric or ohmic ("wire" type) detectors.

The second line of protection is protected by the volume of premises by passive optical-electronic detectors with a volumetric detection zone, ultrasonic, combined or radio wave detectors.

The third line of protection is protected by safes and individual items or approaches to them with capacitive, piezoelectric, passive and active optoelectronic or radio wave detectors.

4.2 Selection and placement of technical means of security alarms in the premises of the facility

In the premises of the facility, such OS TS should be installed so that, on the one hand, the required level of security of the facility is ensured, and on the other hand, the costs of purchasing, installation and operation of OS TS would be reduced (if possible).

The choice of specific types of detectors is determined based on:

- comparison of the structural and construction characteristics of the object to be equipped, and the tactical and technical characteristics of the detectors;

- the nature and placement of valuables in the premises;

- number of storeys of the building;

- jamming environment at the facility;

- probable ways of intruder penetration;

- security regime and tactics;

- requirements for the secrecy of installation, design;

- the criminogenic significance of the object, etc.

4.2.1 Magnetic detectors

When windows and doors are blocked for opening (depending on their design), magnets and reed switches of magnetic contact detectors can be installed both on movable and fixed parts of structures. When using metal frames, doors or frames and doors with a metal strap, it is necessary to install magnetic detectors of the IO 102-6 type, specially designed for these purposes. The recommended placement of detectors is on the tops of window frames and doors. If this installation of magnetic contact detectors is impossible (due to the structural or architectural features of windows and doors), it is allowed to install them on the side parts (opposite hinges) of frames and doors. Installation of such detectors on the lower parts of window frames is allowed.

To exclude the possibility of unblocking the magnetic contact installed on the front door using a powerful magnet, it is recommended to install an additional detector-trap next to the main detector. (A trap detector is a conventional magnetic contact with a magnet removed from its body.) The detector reed switch, which is connected to the alarm loop (AL), works in parallel to close the AL when a powerful magnet acts on it.

The main characteristics of magnetic contact detectors are shown in Table 1.


Table 1

Detectors

Characteristic
detector tick

SMK-1, IO 102-2

Installation method

Open

Hidden small size
ny

Open

Hidden
small-sized
ny

Hidden metal
constructions

Distance between reed switch and magnet, mm:

For closing-
contacts

For blurry
kania contacts

Working range
temperatures, ° С

From minus 40 to plus 50

From minus 50 to plus 50

Overall dimensions, mm:

Reed switch

Magnet

4.2.2 Optoelectronic detectors

Active and passive optoelectronic detectors with a linear or surface narrowly targeted detection zone ("curtain" type) are recommended to be used to block windows, doors, walls, ceilings, floors, corridors and approaches to protected objects for penetration or approach.

Depending on the architectural features of the blocked structures, the detectors can be installed both on the walls of the room and on the ceiling (to protect the floor - only on the walls). In this case, it is necessary to install the detector so that its detection zone is located no further than 1.0 m (for a floor of 0.5 m) across the entire width or height from the blocked surface.

It should be borne in mind that when the floor or ceiling is blocked by passive detectors with a surface narrowly targeted detection zone (the detector is rotated 90 °), the detection range is halved.

It is recommended to use passive optoelectronic detectors with a volumetric detection zone to protect premises, as well as to simultaneously block windows, doors, walls, ceilings and the valuables themselves located in the room.

To ensure the stable operation of these detectors, the following rules must be observed:

- do not install the detector above heating devices;

- do not point the detector at warm air fans, searchlights, incandescent lamps and other sources that cause rapid temperature changes;

- do not allow direct sunlight to hit the detector;

- do not allow animals and objects (curtains, partitions, cabinets, etc.) to be in the detection zone of the detector, which can create "dead" zones.

The main characteristics of active optoelectronic detectors are shown in Table 2, passive infrared detectors - in Table 3.

4.2.3 Radio wave and combined detectors

Radio wave and combined (optoelectronic + radio wave) detectors can be used to guard the volumes of closed rooms, internal and external perimeters of rooms, individual objects and building structures, open areas. To ensure the stable operation of these detectors, the following rules must be observed:

- install the detectors in such a way that their detection zones do not go beyond the blocked premises (window openings, thin wooden partitions);

- do not install the detectors on conductive structures (metal beams, raw brickwork, etc.), since a double ground loop arises between the detector and the power supply, which can cause false triggering of the detector;

- move out of the detection zone of the detector oscillating or moving objects with a significant reflective surface, as well as large objects that can create "dead" zones, or form the detection zone so that these objects do not fall into it.

In the presence of "dead" zones, it is necessary to ensure that they do not create a free path for the offender to material values;

- do not install detectors in areas where there are powerful radio transmitting devices;

- for the period of protection:

- close doors, windows, vents, transoms, hatches on locks, and also turn off ventilation and power switching installations;

- do not allow plastic pipes, through which water movement is possible, to enter the detection zone of the detector;

- turn off fluorescent and neon lamps.


table 2

Characteristic
detector

Detectors

"Vector-2"

"Vector-SPEK"

Appointment

Room perimeter protection

Protection of the perimeter of open areas and premises

Detection area

Linear (single beam barrier)

Range of action, m:

75, 150

Mode A

Mode B

Notice
"Penetration"

Opening relay contacts

DC supply voltage, V

10,2….13,2

10,2….30,0

Ripple amplitude, mV

Current consumption at supply voltage 12 V, mA;

Mode A

Mode B

Operating temperature range, ° С

From minus 10 to plus 50

From minus 40 to plus 55

Overall dimensions, mm

102x91x90

75x95x145 (BI and BF)

Weight, kg

1.0 (BI and BF)


Table 3

Detectors

Characteristic
detector stick

"Photon - 6"

"Foton-6A"

"Foton-6B"

"Foton-SK"

"Photon-8"

"Foton-8B"

Appointment

Protection of extended areas (corridors)

Protection of the volume of a closed heated room

Indoor volume protection

Protection of building structures and approaches to values

Detection area

Volumetric

Volumetric

Linear (beam barrier)

Surface
naya ("curtain")

Volumetric

Volumetric

Surface ("curtain")

Maximum range, m

Viewing angle, city .:

In vertical
noah plane

In the horizon
tal plane

Control-
area to be sold, m

Notification "Penetrated
vision "

Opening relay contacts

Obr. / KZ ShS

From loop 10.0 ... 72.0

Consumption current, mA

From minus 10
up to plus 50

From minus 30 to plus 50

0 to plus 50

From minus 10 to plus 50

Overall dimensions, mm

107x107x64

Weight, kg


Table 4

Detectors

Detector characteristics

"Argus-2"

"Argus-3"

"Tulip-3"

"Wave-5"

"Radium-2"

"Radium-2/1"

"Radium-2/2"

"Fon-1M"

"Storm-2"

Detection principle

Radio wave

Appointment

Protection of the internal volume of the room

Perimeter protection of open areas

Protection of the area and volume of open
sites and premises

Detection area

Volumetric solid

Ellipsoidal volume barrier

Volumetric

Minimum controlled area, m

Maximum operating range, m

Notice
"Penetration"

Opening relay contacts

Break
/ KZ SHS

Opening relay contacts

AC supply voltage, V

Backup power supply (from DC power supply):

Voltage, V

Consumption current, A

DC supply voltage, V

From SHS
12…72

Consumption current, mA

Operating temperature range, ° С

From minus 30
up to plus 50

From minus 10
up to plus 50

From minus 30
up to plus 50

From minus 30
up to plus 50

From minus 40
up to plus 50

From minus 40
up to plus 50

From minus 40
up to plus 50

From minus 45
up to plus 50

From minus 45
up to plus 50

Overall dimensions, mm

100x90x
x65

90x75x40 After confirmation of payment, the page will be

To prevent unauthorized entry and to identify fire sources, equipment for security and fire alarms is installed at the facilities, which is a whole complex of special technical means. Thanks to the integration of this complex into the facility's life support system, it becomes possible to form a multifunctional network that combines access systems, fire extinguishing systems and all kinds of engineering communications. This approach allows you to automate the operation and protection of the facility.

Functionality

When combining a fire and security alarm system, a multifunctional complex is obtained that simultaneously protects the object from fire and detects cases of unauthorized entry.

Integration is implemented at the level of management and centralized monitoring. All systems of the complex are used centrally, but they function and are controlled separately. In simple terms, they are autonomous in the overall system.

The fire alarm performs the following functions:

  1. Timely fire detection.
  2. Submitting an alarm to the appropriate services.
  3. Informing people at the facility about what happened.
  4. Ensuring safe evacuation.

Security alarm capabilities:

  1. Prevention of unauthorized entry.
  2. Organization of the access system (employees can only enter certain areas).
  3. Fixing the place and time of penetration.
  4. Determination of the method of penetration.

Fire alarm equipment

The list of used fire alarm devices depends on the functionality of the system and the tasks that will be solved with its help.

The equipment used to provide fire alarm can be roughly divided into 5 categories:

♦ Equipment allowing centralized alarm management. This category includes a central computer with the necessary software. It is with its help that the automation of alarm management is carried out. The intrusion and fire panel can be used in cases where the installation of a fire alarm with a simplified configuration is required.

♦ Touch sensors are used to track specific areas of the object. The essence of their work is to control certain parameters, in the event of a change in which an immediate reaction occurs. This category includes all kinds of detectors and sensors.

♦ Executive equipment. Necessary for activating fire protection or tampering protection. These devices are responsible for transmitting an alarm signal to the appropriate services and alerting people at the facility about potential danger.

♦ Cable equipment. Used to connect all the above devices into a single complex. It is thanks to the wired equipment that the devices are switched, control impulses and alarm signals are transmitted.

Purpose of fire alarm devices

The fire protection system includes practically the same devices as the burglar alarm. The only difference is in the used actuators and sensors. Below will be presented the functionality of each individual device.

Control panel

It is a small computer with special software installed. It controls the operation of each device in the system. The control panel allows you to configure the system and control its operation. Its functions also include remote monitoring of the health of all connected devices.

Control panel

With the help of this special device, data is collected from the alarm sensors, followed by their analysis. These modules are installed separately or are part of the control panel. In systems with a simplified configuration, the control panel can be used as a control panel.

Sensors

This category of devices includes detectors and sensors of various types that monitor the necessary parameters in the area reporting to them. The sensor will be triggered only if the value of one of these parameters is out of range.

At the moment, a huge number of all kinds of sensors are presented on the market, which allow you to warn people in a timely manner about the danger and, using the receiving and control module, send the corresponding signal to the control panel.

There are several types of sensors used in automatic fire alarms:

  1. Smoke detectors. Evaluate the smoke of the room that occurs in the event of a fire.
  2. Thermal sensors. Catch changes in ambient temperature caused by a fire.
  3. Flame detectors. They give a signal when an open flame is detected.
  4. Gas sensors. They are triggered when the concentration of a certain gas in the air changes.
  5. Hand sensors. Used by the site personnel to activate the fire extinguishing system when a fire is detected.
  6. Multisensor sensors. Their peculiarity lies in the fact that they are able to analyze 4 signs of a fire at once.

All sensors used in fire alarm systems differ in operating parameters (response speed, sensitivity, etc.). The sensor model should be selected based on the tasks that need to be solved at the facility.

Types of sensors used in security alarm systems:

  1. Motion sensors. Determine the presence of movement in a certain area.
  2. Sensors for opening windows and doors. Allows to identify cases of opening of windows or doors.
  3. Vibration sensors. They will give a signal if attempts are made to collapse the structural elements of the object, including walls.
  4. Acoustic sensors. They are triggered when glass is broken.

Also, security systems can be equipped with devices that control the parameters of the object's environment. These include sensors for monitoring the leakage of water, gas, increasing humidity and temperature.

Installation of equipment

It is very important to correctly install the alarm. The degree of protection of the object depends on this. To achieve the maximum level of protection, the configuration and plan of the security and fire system should be developed before starting the installation of equipment.

At this stage, the required number of detectors is calculated and the places of their installation are determined. The engineer needs to consider the speed of the sensors, their sensitivity and the coverage area.

Sensors should be installed so that they overlap each other's sensitive areas. This approach will eliminate the presence of "blind" areas. Simply put, absolutely the entire protected area should be under control. It is also very important to avoid exposure of the sensors to external factors, which include thermal and ultraviolet radiation, as well as all kinds of mechanical stress.

To interconnect fire and security alarm devices, wire lines are used. To facilitate the installation of the system, wireless devices are used. In this case, the signal to the central panel from the sensors will be transmitted not through wires, but using radio channels.

Upon completion of the installation, you must make sure that all sensors, control equipment and the central panel are operational.

Training video on alarm installation.

Conclusion

If you want your security and fire-fighting complex to work properly for many years and perform the functions assigned to it, then the installation of equipment should be entrusted to qualified specialists.

Today, many companies provide their services for the preparation and implementation of security and fire alarm projects. Some of them are additionally involved in the sale of the necessary equipment, as well as maintenance and configuration of systems. Only a professional can choose the right equipment and install it correctly. The fire and security alarm system is a guarantee of the safety of life and material values \u200b\u200bof a person.

The classification of security and fire systems by types and types can be made according to a number of different parameters. The most obvious of these is purpose. There are three large groups here:

TYPES OF ALARM SIGNALS

As part of security systems, various types of sensors can also be used, which are wired and wireless, differ in the method of intrusion detection, signal processing. The principles of building security systems may differ depending on their purpose: for a house and a summer residence, an apartment, objects of various organizational and legal forms.

An elementary option is an alarm system consisting of one motion sensor with a built-in GSM module. Despite the apparent simplicity, this type of security is quite reliable and well suited for the protection of small country houses.

In general, the security alarm system uses several types of detectors, which are classified according to their purpose and principle of operation. To ensure reliable protection, sensors are used that control:

  • opening windows and doors;
  • breaking glazed surfaces;
  • break of walls, partitions and ceilings.

The listed equipment serves to protect the perimeter of the premises. In addition, there is a group of sensors that detect movement inside or on the approaches to the object. The choice of specific types of detectors is made taking into account the individual characteristics of the object to be protected.