Security and fire systems: modern solutions for device integration. Features of the organization of security with the use of technical means of security and fire alarms Threshold system PS

Employees of the Research Center "Protection" of the Main Department of Defense of the Ministry of Internal Affairs of Russia developed recommendations for the selection and use of fire and security alarms and technical reinforcement for the equipment of facilities. These recommendations were approved by the GUVO of the Ministry of Internal Affairs of Russia on June 27, 1998.

The main role in ensuring the complex security of the facility is played by the technical means of the security and fire alarm system (TS FSO) and the means of technical reinforcement. Right choice and the use of TS OPS and means of technical strengthening at the facility makes it possible to ensure a sufficiently high reliability of protecting the facility from all possible internal and external types of threats and dangerous situations.

The choice of equipment option for the TS of the fire protection facility and the means of technical strengthening is determined by the characteristics of the significance of the premises of the facility, its construction and architectural and planning solutions, operating and maintenance conditions, operating mode, interference that occurs at the facility, and many other factors that must be taken into account when designing integrated system security.

The higher the level (or efficiency) of security, the higher the probability of preserving all the values ​​of the object from theft or destruction. The level of security, in turn, mainly depends on the response time of the security system to an emerging threat and on the time it takes to overcome physical barriers: bars, locks, safes, latches on windows and doors, specially reinforced doors, walls, floors, ceilings, etc. etc., that is, means of technical fortification in the way of the possible movement of the intruder.

The sooner a threat to an object can be detected, the more effectively it can be stopped. This is achieved through the correct selection and use of TS of the FSO and their optimal placement in protected areas. The use of technical fortification means increases the time required for the violator to overcome them, which makes it more likely that he will be detained. Technical Strengths Beyond Functions physical obstacle perform the functions of a psychological obstacle that prevents the possibility of an intruder entering the protected object.

The design phase of the security system is the most important period during which all the basic functions and structures of the security system are laid down. At this stage, an inspection of the object is carried out, the objectives of which are:

On-site study of the characteristics of the object that determine its resistance to alleged criminal encroachments and possible emergency situations;

Determination of a set of measures and development of technical proposals for the organization of the protection of the object, taking into account the generated standard solutions that provide sufficient security.


Based on the results of the survey, the terms of reference for the design of a complex of technical security equipment are being developed. The inspection of the object is carried out by an interdepartmental commission (MVK) consisting of representatives of the administration (or security service) of the object, private security units, state fire supervision and, if necessary, other interested organizations. Design, preparation and execution of work must be carried out strictly in accordance with regulatory and technical documents.

The choice of the option of equipping the TS FSS facility and the means of technical strengthening is determined by the importance of the premises of the facility, the type and placement of valuables in these premises. All premises of any object can be conditionally divided (according to the type and placement of valuables in them) into four categories:

first category - premises where goods, objects and products of special value and importance are placed, the loss of which can lead to particularly large or irreparable material and financial damage, create a threat to health and life a large number people inside and outside the facility, lead to other serious consequences.

Typically, such premises include: storage (pantries) of valuables, warehouses for storing weapons and ammunition, premises with permanent storage of narcotic and poisonous substances, as well as secret documentation and other especially valuable and especially important inventory items;

second category - premises where valuable and important goods, items and products are located, the loss of which can lead to significant material and financial damage, pose a threat to the health and life of people at the facility.

Such premises include: special archives and special libraries, safe rooms, storage rooms for service firearms, radioisotope substances and preparations, jewelry, antiquities, art and culture, Money, currency and securities (main cash desk facilities);

Such premises include: service, office premises, trading floors and premises for industrial goods, household appliances, food products, etc.;

Such premises include: auxiliary and auxiliary premises, premises with permanent or temporary storage of technological and household equipment, technical and design documentation, etc.

Selectable anti-tamper group structural elements must correspond to the value and significance of the property (values) located in the premises, that is, the corresponding category of the premises. In addition, it is necessary to take into account the location of the object and the accessibility of penetration into its premises. At the same time, increased requirements should be imposed on places where an attacker can operate in relative safety.

To increase the reliability of the protection of the premises of the facility, technical strength, which is the basis for building a technical security system, should be used in combination with the TS of the FPS. In case of non-compliance or insufficient technical strength of structural elements with the categories of premises, it is recommended to strengthen these elements or premises additional funds(frontiers) security alarm.

Bearing and internal walls and partitions, floor and ceiling coverings of the premises of the facility where the valuables are located, must have a sufficient degree of protection against possible unauthorized entry.

Doors (mainly entrance) premises, as well as walls, must have a sufficient degree of protection against possible unauthorized entry.

Additional lattice doors, used to enhance the protection of the premises, are installed from the inside. Doors can be hinged or sliding and lockable.

All windows, transoms and vents in the premises of the facility must be glazed and have reliable and serviceable locks. Glass must be intact and securely fixed in the grooves.

If all window openings of the premises of the facility located on the same floor of the building are equipped with bars, then one of them is made opening with the possibility of closing it with a lock (built-in or hinged).

When installing stationary metal gratings on the window openings of the premises, the ends of the bars of these gratings must be embedded in the wall of the building to a depth of at least 80 mm and poured cement mortar or welded to existing structures.

Ventilation shafts, ducts and chimneys with a diameter of more than 200 mm, having access to the roof (or to adjacent rooms) and with their section entering the room in which the valuables are located, must be equipped (at the entrance to it) with metal gratings made of a corner with a section not less than 35x35x4 mm, reinforcement with a diameter of at least 16 mm, with a cell size of not more than 150 × 150 mm. Lattices in ventilation ducts from the side of the room should be separated from the inner surface of the wall (ceiling) by no more than 100 mm.

To protect ventilation shafts, ducts and chimneys, it is allowed to use false gratings made of a metal tube with a hole diameter of 6 mm or more and with a cell measuring 100x100 mm (for laying the wire of the alarm loop).

As locking devices installed on doors and windows, mortise, overhead non-self-latching and padlocks, latches, bolts, latches, etc. are used.

padlocks should be used mainly for additional locking of doors, grilles, shutters, blinds, etc. These locks are sufficiently effective (in terms of protection) only if they have hardened steel shackles and massive strong cases (barn lock), and also if there are protective covers, plates and other devices that can prevent the possibility of folding or sawing of the lugs and shackles.

Typically, the following types of locks are used to lock doors:

Pin cylinder;

Disk cylinder;

Lamellar cylinder;

Level;

Electromechanical;

Electromagnetic.

Recently, electromechanical and electromagnetic locks, as well as latches, have been widely used.

To improve the reliability of the protection of the facility and its premises, the structure of the FPS complex is determined based on:

The mode of operation of this object;

Procedure for carrying out transactions with valuables;

Features of the location of premises with values ​​inside the building;

Selecting the number of protected zones.

At the facility, all premises with permanent or temporary storage of material assets, as well as other premises adjacent to them and all vulnerabilities (windows, doors, hatches, ventilation shafts and ducts) located on the first and last floors of the building along the perimeter of the object.

In the premises of the third and fourth categories, located on the second and higher floors of the building, as well as inside the facility, it is not required to install OS TC if the building is guarded around the entire perimeter (first and top floors and all vulnerabilities).

Window openings of the premises of the first and second categories, located on the second and higher floors of the building, protected along the entire perimeter (first and last floors and all vulnerabilities), it is allowed not to equip the OS OS.

The first line of defense is protected by:

Building structures along the perimeter of the building or premises of the facility, that is, all window and door openings;

Places for entering communications, ventilation ducts;

exits to fire escapes;

Non-capital and capital walls (if protection is needed).

The building structures of the building (premises) of the facility block:

Doorways, loading and unloading hatches - for "opening" and "breaking" (only for wooden);

Glazed structures - for "opening" and "breaking glass;

Places for entering communications, non-capital and capital walls (if protection is needed) - to the "break";

Ventilation ducts, chimneys - for "destruction".

Instead of blocking glazed structures for "opening" and "destruction", internal non-permanent walls for "breaking", doors for "opening" and "breaking", it is allowed to use volumetric and linear detectors to block these structures only for "penetration". At the same time, it should be borne in mind that passive optoelectronic detectors used for these purposes (such as "Photon" and others, whose operation is based on the same principle of operation) provide protection for premises only from direct penetration of the intruder.

Blocking of building structures(doors, glazed structures) to "opening" it is recommended to carry out the simplest magnetic contact detectors, and blocking of gates, loading hatches, storage doors, elevator shafts - with limit switches.

Blocking of glazed structures for "destruction" glasses are recommended to be carried out with ohmic detectors (of the "foil" type), surface shock-contact or sound detectors.

Blocking walls on the "breach" should be carried out with surface piezoelectric or ohmic (type "wire") detectors.

Second Frontier guards protect the volumes of the premises with passive optical-electronic detectors with a volumetric detection zone, ultrasonic, combined or radio wave detectors.

third frontier guards protect safes and individual objects or approaches to them with capacitive, piezoelectric, passive and active optical-electronic or radio wave detectors.

Choice specific types detectors in the premises of the facility is determined based on:

Comparison of the structural and construction characteristics of the object to be equipped, and the tactical and technical characteristics of the detectors;

The nature and placement of valuables in the premises;

Floors of the building;

Interference situation at the facility;

Probable routes of penetration of the intruder;

Security regime and tactics;

Requirements for the secrecy of installation, design;

Criminogenic significance of the object, etc.

When blocking windows and doors for opening (depending on their designs), magnets and reed switches of magnetic contact detectors can be installed on both moving and stationary parts of structures.

Active and passive optoelectronic detectors with a linear or surface narrowly targeted detection zone (of the "curtain" type) is recommended to be used to block windows, doors, walls, ceilings, floors, corridors and approaches to protected objects for penetration or approach.

Radio wave and combined (opto-electronic + radio wave) detectors can be used to protect the volumes of enclosed spaces, internal and external perimeters of premises, individual items and building structures, open areas.

Ultrasonic detectors are intended for protection of volumes of the closed rooms.

Capacitive detectors designed to block metal cabinets, safes, individual items, as well as to create protective barriers.

Piezoelectric and shock-contact detectors are designed to block building structures for destruction or pressure and generate an intrusion notification by converting the energy of elastic waves in the ultrasonic or sound range that occur when an intruder attempts to destroy a blocked structure.

Sound detectors are intended for blocking of the glazed designs on destruction. The principle of operation of these detectors is based on the non-contact method of acoustic monitoring of the destruction of the glass sheet.

Aluminum foil (ohmic detectors) used to block against breaking glass structures exposed to vibration and shock interference. Recommended use: blocking glass structures where there are no increased requirements for the interior (warehouses, industrial and utility rooms).

Reception and control devices (PPK), which are an intermediate link between detectors and notification transmission systems (STS), should be installed in places protected from mechanical damage and interference in their work by unauthorized persons:

On the walls at a height of at least 2.2 m from the floor level;

In the absence of a specially allocated room;

At a height of at least 1.5 m from the level - in the presence of a special room.

One of the most important elements of security is a burglar and fire alarm. These two systems have much in common with each other - communication channels, similar algorithms for receiving and processing information, giving alarm signals, etc. Therefore, they are often (for economic reasons) combined into a single security and fire alarm (OPS). Security and fire alarm belongs to the oldest technical means of protection. And so far this system is one of the most effective security systems.

Modern protection systems are built on several signaling subsystems (the totality of their application allows you to track any threats):

security - fixes an attempt to penetrate;

alarm - an emergency call system for help in case of a sudden attack;

fire department - registers the appearance of the first signs of a fire;

emergency - notifies of a gas leak, water leaks, etc.

task fire alarm are the receipt, processing, transmission and presentation in a given form to consumers with the help of technical means of information about a fire at protected facilities (detection of a fire source, determination of the place of its occurrence, signaling for automatic fire extinguishing and smoke removal systems). Task burglar alarm- timely notification of intrusion or attempted intrusion into a protected facility, with fixation of the fact, place and time of violation of the security line. The common goal of both alarm systems is to provide instant response with accurate information about the nature of the event.

An analysis of domestic and foreign statistics of unauthorized intrusions into various objects shows that more than 50% of intrusions are made into objects with free access for personnel and clients; about 25% - for objects with unguarded elements of mechanical protection such as fences, gratings; about 20% - for objects with a throughput system and only 5% - for objects with an enhanced security regime, using complex technical systems and specially trained personnel. From the practice of security services in the protection of objects, six main zones of protected areas are distinguished:

zone I - the perimeter of the territory in front of the building;

zone II - the perimeter of the building itself;

zone III - premises for receiving visitors;

zone IV - employees' offices and corridors;

zones V and VI - management offices, meeting rooms with partners, storage of valuables and information.

In order to ensure the necessary level of reliability of protection of critical facilities (banks, cash desks, weapons storage areas), it is necessary to organize multi-layered protection of the facility. The first line signaling sensors are installed on the outer perimeter. The second frontier is represented by sensors installed in places of possible penetration into the object (doors, windows, vents, etc.). The third frontier is volumetric sensors in indoor areas, the fourth - directly guarded items (safes, cabinets, boxes, etc.). At the same time, each boundary must be connected to an independent cell of the control panel so that, if an intruder bypasses one of the security boundaries, an alarm signal is given from the other.

Modern alarm systems are often integrated with other security systems into single complexes.

2.2. The structure of the fire and security alarm

V general view the fire alarm system includes:

sensors- alarm detectors that respond to an alarm event (fire, an attempt to enter an object, etc.), the characteristics of the sensors determine the main parameters of the entire alarm system;

control panels (PKP) - devices that receive an alarm signal from detectors and control actuators according to a given algorithm (in the simplest case, control over the operation of a fire and security alarm consists of turning sensors on and off, fixing alarms, in complex, branched alarm systems, control and controlled by computers).

executive devices- units that ensure the implementation of a given algorithm of the system's actions in response to a particular alarm event (alert signal, activation of fire extinguishing mechanisms, auto-dial to specified phone numbers, etc.).

Typically, fire and security alarm systems are created in two versions - fire alarm system with local or closed protection of the facility or fire alarm system with transfer under protection to non-departmental security units (or a private security company) and the fire service of the Russian Emergencies Ministry.

The whole variety of fire and security alarm systems, with a certain degree of conventionality, is divided into addressable, analog and combined systems.

1. Analogue (conventional) systems built according to following principle. The protected object is divided into areas by laying separate loops that combine a certain number of sensors (detectors). When any sensor is triggered, an alarm is generated throughout the loop. The decision on the occurrence of an event here is “taken” only by the detector, the performance of which can only be checked during the maintenance of the alarm system. Also, the disadvantages of such systems are the high probability of false alarms, signal localization accurate to the loop, and limited controlled area. The cost of such a system is relatively low, although a large number of loops must be laid. The tasks of centralized control are performed by the security and fire panel. The use of analog systems is possible on all types of objects. But with a large number of alarm areas, there is a need for a large amount of work on the installation of wired communications.

2. Address systems assume installation on one loop of the alarm system of addressable sensors. Such systems make it possible to replace the multi-core cables connecting the detectors with the alarm control panel (PKP) with one pair of data bus wires.

3. Address non-interrogation systems are, in fact, threshold, supplemented only by the possibility of transmitting the address code of the triggered detector. These systems have all the shortcomings of analog systems - the impossibility of automatic control of the fire detectors performance (in case of any failure of the electronics, the detector's connection with the control panel is terminated).

4. Address polling systems carry out periodic interrogation of the detectors, provide control of their performance in case of any type of failure, which allows you to install one detector in each room instead of two. In addressable polling OPS, complex information processing algorithms can be implemented, for example, auto-compensation for changes in the sensitivity of detectors over time. Reduces the likelihood of false positives. For example, an addressable glass break sensor, unlike a non-addressable one, will indicate which window was broken. The decision about the event that has occurred is also “taken” by the detector.

5. Most promising direction in the field of building signaling systems are combined (address-analogue) systems. Addressable analog detectors measure the amount of smoke or temperature on the object, and the signal is formed on the basis of mathematical processing of the received data in the control panel (specialized computer). It is possible to connect any sensors, the system is able to determine their type and the required algorithm for working with them, even if all these devices are included in one security alarm loop. These systems provide maximum speed of decision-making and management. For the correct operation of addressable analog equipment, it is necessary to take into account the language of communication of its components (protocol) that is unique for each system. The use of these systems makes it possible to quickly, without high costs, make changes to existing existing system when changing and expanding the zones of the object. The cost of such systems is higher than the previous two.

Now there is a huge variety of detectors, control panels and sirens with different characteristics and capabilities. It should be recognized that the defining elements of the security and fire alarm are sensors. The parameters of the sensors determine the main characteristics of the entire alarm system. In any of the detectors, the processing of controlled alarm factors is, to one degree or another, an analog process, and the division of detectors into threshold and analog refers to the method of transmitting information from them.

According to the place of installation on the object, sensors can be divided into domestic and external installed respectively inside and outside the protected objects. They have the same principle of operation, the differences lie in the design and technological characteristics. The installation location may be the most important factor influencing the choice of detector type.

Announcers (sensors) OPS act on the principle of registration of changes environment. These are devices designed to determine the presence of a threat to the security of a protected object and transmit an alarm message for timely response. Conventionally, they can be divided into three-dimensional (allowing to control space), linear, or surface, - to control the perimeters of territories and buildings, local, or point, - to control individual objects.

Detectors can be classified according to the type of controlled physical parameter, the principle of operation of the sensitive element, the method of transmitting information to the central alarm control panel.

According to the principle of generating an information signal about penetration into an object or a fire, fire alarm detectors are divided into active(the alarm generates a signal in the protected area and reacts to changes in its parameters) and passive(react to changes in environmental parameters). Such types of security detectors as passive infrared, magnetic glass break detectors, perimeter active detectors, combined active detectors are widely used. In fire alarm systems, heat, smoke, light, ionization, combined and manual call points are used.

The type of alarm system sensors is determined by the physical principle of operation. Depending on the type of sensors, security alarm systems can be capacitive, radio beam, seismic, responding to the closing or opening of an electrical circuit, etc.

The possibilities of installing security systems, depending on the sensors used, their advantages and disadvantages are given in Table. 2.


table 2

Perimeter security systems

2.3. Types of security detectors

Contact detectors serve to detect unauthorized opening of doors, windows, gates, etc. Magnetic detectors consist of a magnetically controlled reed switch mounted on the fixed part, and a master element (magnet) mounted on the opening module. When the magnet is near the reed switch, its contacts are in a closed state. These detectors differ from each other in the type of installation and the material from which they are made. The disadvantage is the possibility of neutralizing them with a powerful external magnet. Reed shielded sensors are protected from foreign magnetic field special plates and are equipped with signal reed contacts that operate in the presence of an extraneous field and warn about it. When installing magnetic contacts in metal doors it is very important to shield the field of the main magnet from the induced field of the entire door.

Electrocontact devices- sensors that sharply change the voltage in the circuit with a certain impact on them. They can either be uniquely “open” (current flows through them) or “closed” (no current flows). The simplest way to build such an alarm is thin wires or foil strips, connected to a door or window. Wire, foil or conductive compound "Paste" are connected to the alarm through door hinges, shutters, as well as through special contact blocks. When they try to penetrate, they are easily destroyed and form an alarm signal. Electrocontact devices provide reliable protection from false alarms.

V mechanical door electrocontact devices the moving contact protrudes from the sensor housing and closes the circuit when pressed (door closed). The installation location of such mechanical devices is difficult to hide, they can be easily disabled by securing the lever in the closed position (for example, with chewing gum).

contact mats are made of two decorated sheets of metal foil and a layer of foamed plastic between them. Under the weight of the body, the foil sags, and this provides an electrical contact that generates an alarm signal. Contact mats operate on the "normally open" principle, and a signal is given when the electrocontact device closes the circuit. Therefore, if you cut the wire leading to the rug, the alarm will not work in the future. A flat cable is used to connect the mats.

Passive infrared detectors (PIR) serve to detect the intrusion of an intruder into a controlled volume. This is one of the most common types of security detectors. The principle of operation is based on registering changes in the flow of thermal radiation and converting infrared radiation into an electrical signal using a pyroelectric element. Currently, two- and four-area pyroelements are used. This can significantly reduce the likelihood of false alarms. In simple PIRs, signal processing is performed by analog methods, in more complex ones - digitally, using a built-in processor. The detection zone is formed by a Fresnel lens or mirrors. There are three-dimensional, linear and surface detection zones. It is not recommended to install infrared detectors in close proximity to ventilation holes, windows and doors that create convection air currents, as well as heating radiators and sources of thermal noise. It is also undesirable to directly hit the light radiation of incandescent lamps, car headlights, the sun on entrance window detector. It is possible to use a thermal compensation circuit to ensure operability in the area high temperatures(33–37 °C), when the magnitude of the signal from human movement sharply decreases due to a decrease in the thermal contrast between the human body and the background.

Active detectors They are an optical system of an LED emitting infrared radiation in the direction of the receiver lens. The beam of light is modulated in brightness and acts at a distance of up to 125 m and allows you to form a line of protection invisible to the eye. These emitters are both single-beam and multi-beam. If the number of beams is more than two, the possibility of false alarm is reduced, since the alarm signal is generated only when all beams cross simultaneously. The configuration of the zones is different - "curtain" (intersection of the surface), "beam" (linear movement), "volume" (movement in space). The detectors may not work in rain or heavy fog.

Radio wave volumetric detectors are used to detect penetration into the protected object by registering the Doppler shift in the frequency of the reflected microwave signal that occurs when an intruder moves in the electromagnetic field generated by the microwave module. It is possible to covertly install them on an object behind materials that transmit radio waves (fabrics, wood boards, etc.). Linear radio wave detectors consist of a transmitting and receiving unit. They generate an alarm when a person crosses their zone of action. The transmitting unit emits electromagnetic oscillations, the receiving unit receives these oscillations, analyzes the amplitude and time characteristics of the received signal, and if they correspond to the “intruder” model embedded in the processing algorithm, generates an alarm.

Microwave sensors have lost their former popularity, although they are still in demand. In relatively new developments, a significant reduction in their dimensions and energy consumption has been achieved.

Volumetric ultrasonic detectors serve to detect movement in the protected volume. Ultrasonic sensors are designed to protect premises by volume and give an alarm signal both when an intruder appears and when a fire occurs. The radiating element of the detector is a piezoelectric ultrasonic transducer that emits acoustic vibrations of the air in the protected area under the influence of electrical voltage. The sensitive element of the detector, located in the receiver, is a piezoelectric ultrasonic receiving converter of acoustic vibrations into an alternating electrical signal. The signal from the receiver is processed in the control circuit, depending on the algorithm embedded in it, and generates one or another notification.

Acoustic detectors are equipped with a highly sensitive miniature microphone that captures the sound emitted during the destruction of sheet glass. The sensitive element of such detectors is a condenser electret microphone with a built-in FET preamplifier. When glass breaks, two types of sound vibrations occur in a strictly defined sequence: first, a shock wave from vibrations of the entire glass mass with a frequency of about 100 Hz, and then a glass breaking wave with a frequency of about 5 kHz. The microphone converts the sound vibrations of the air into electrical signals. The detector processes these signals and makes a decision about the presence of penetration. When installing the detector, all sections of the protected glass must be within its direct line of sight.

Capacitive system sensor represents one or more metal electrodes placed on the structure of the protected opening. The principle of operation of capacitive security detectors is based on registering the value, speed and duration of the change in the capacitance of the sensitive element, which is used as metal objects connected to the detector or specially laid wires. The detector generates an alarm signal when the electrical capacitance of a security item (safe, metal cabinet) changes relative to the "ground", caused by a person approaching this item. Can be used to protect the perimeter of the building through stretched wires.

Vibration detectors serve to protect against penetration into a protected object by destroying various building structures, as well as protecting safes, ATMs, etc. The principle of operation of vibration sensors is based on the piezoelectric effect (piezoelectrics generate electric current when the crystal is pressed or released), which consists in changing the electric signal when the piezoelectric element vibrates. An electrical signal proportional to the level of vibration is amplified and processed by the detector circuit according to a special algorithm in order to separate the damaging effect from the interference signal. The principle of operation of vibration systems with sensor cables is based on the triboelectric effect. When such a cable is deformed, electrization occurs in the dielectric located between the central conductor and the conductive braid, which is recorded as a potential difference between the cable conductors. The sensing element is a sensor cable that converts mechanical vibrations into an electrical signal. There are also better electromagnetic microphone cables.

A relatively new principle of premises protection is to use the change in air pressure when opening a closed room ( barometric sensors) has not yet met the expectations placed on it and is almost never used in the equipment of multifunctional and large facilities. These sensors have a high false alarm rate and rather severe application restrictions.

It is necessary to dwell separately on distributed fiber optic systems to secure the perimeter. Modern fiber optic sensors can measure pressure, temperature, distance, position in space, accelerations, vibrations, mass of sound waves, liquid level, strain, refractive index, electric field, electric current, magnetic field, gas concentration, radiation dose and etc. Optical fiber is both a communication line and a sensitive element. Laser light with a high output power and a short radiation pulse is fed into the optical fiber, then the parameters of Rayleigh backscattering, as well as Fresnel reflection from the joints and ends of the fiber, are measured. Under the influence of various factors (deformation, acoustic vibrations, temperature, and with an appropriate coating of the fiber - an electric or magnetic field), the phase difference between the applied and reflected light pulses changes. The location of the inhomogeneity is determined from the time delay between the moment of pulse emission and the moment of arrival of the backscattering signal, and the losses in the line section are determined from the intensity of the backscattered radiation.

To separate the signals generated by the intruder from noise and interference, a signal analyzer based on the principle of a neural network is used. The signal to the input of the neural network analyzer is supplied in the form of a spectral vector generated by the DSP processor (Digital Signal Processing), the principle of which is based on the fast Fourier transform algorithms.

The advantages of distributed fiber-optic systems are the ability to determine the place of violation of the object's border, use these systems to protect perimeters up to 100 km long, low level false positives and a relatively low price per linear meter.

The leader among burglar alarm equipment is currently combined sensor, built on the use of two channels of human detection simultaneously - IR-passive and microwave. It is currently replacing all other devices and many alarm installers use it as the only sensor for volumetric room protection. The average operating time for a false alarm is 3-5 thousand hours, and in some conditions reaches a year. It allows you to block rooms where IR-passive or microwave sensors are not applicable at all (the first - in rooms with drafts and thermal interference, the second - with thin non-metallic walls). But the detection probability of such sensors is always less than that of any of its two constituent channels. The same success can be achieved by using both sensors (IR and microwave) separately in the same room, and an alarm is generated only when both detectors are triggered in a given time interval (usually a few seconds), using for this purpose the capabilities of the control equipment.

2.4. Types of fire detectors

The following basic activation principles can be used for fire detection fire detectors:

smoke detectors - based on ionization or photoelectric principle;

heat detectors - based on fixing the level of temperature rise or some specific indicator of it;

flame detectors - based on the use of ultraviolet or infrared radiation;

gas detectors.

Manual call points necessary to force the system to switch to the fire alarm mode by a person. They can be implemented as levers or buttons covered with transparent materials (easily broken in case of fire). Most often they are installed in easily accessible public places.

Heat detectors respond to changes in ambient temperature. Some materials burn with little to no smoke (e.g. wood), or the spread of smoke is difficult due to the small space (behind false ceilings). They are used in cases where there is a high concentration of aerosol particles in the air that have nothing to do with combustion processes (water vapor, flour in a mill, etc.). Thermal threshold fire detectors give a “fire” signal when the threshold temperature is reached, differential- fix a fire hazardous situation by the rate of temperature increase.

Contact threshold heat detector generates an alarm when the pre-set temperature limit is exceeded. When heated, the contact plate melts, the electrical circuit breaks and an alarm is generated. These are the simplest detectors. Typically, the threshold temperature is 75 °C.

A semiconductor element can also be used as a sensitive element. As the temperature rises, the resistance of the circuit decreases, and more current flows through it. When the threshold value of the electric current is exceeded, an alarm signal is generated. Semiconductor sensitive elements have a higher response speed, the threshold temperature can be set arbitrarily, and when the sensor is triggered, the device is not destroyed.

Differential heat detectors usually consist of two thermoelements, one of which is located inside the detector housing, and the second is placed outside. The currents flowing through these two circuits are fed into the inputs of a differential amplifier. As the temperature rises, the current flowing through the external circuit changes dramatically. In the internal circuit, it almost does not change, which leads to an imbalance of currents and the formation of an alarm signal. The use of a thermocouple eliminates the influence of gradual temperature changes caused by natural causes. These sensors are the fastest in response and stable in operation.

Linear heat detectors. The design consists of four copper conductors with sheaths made of a special material with a negative temperature coefficient. The conductors are packed in a common casing so that they are in close contact with their shells. The wires are connected at the end of the line in pairs with each other, forming two loops that are in contact with the shells. Operating principle: as the temperature increases, the shells change their resistance, also changing the total resistance between the loops, which is measured by a special results processing unit. According to the magnitude of this resistance, a decision is made about the presence of ignition. The longer the cable length (up to 1.5 km), the higher the sensitivity of the device.

Smoke detectors designed to detect the presence of a given concentration of smoke particles in the air. The composition of the smoke particles can be different. Therefore, according to the principle of operation, smoke detectors are divided into two main types - optoelectronic and ionization.

Ionization smoke detector. The stream of radioactive particles (usually americium-241 is used) enters two separate chambers. When smoke particles (smoke color is not important) enter the measuring (external) chamber, the current flowing through it decreases, since this leads to a decrease in the path length of α-particles and an increase in ion recombination. For processing, the difference between the currents in the measuring and control chambers is used. Ionization detectors do not harm human health (a source of radioactive radiation is about 0.9 μCi). These sensors provide real fire protection in hazardous areas. They also have a record low current consumption. The disadvantages are the complexity of burial after the end of the service life (at least 5 years) and vulnerability to changes in humidity, pressure, temperature, air velocity.

Optical smoke detector. The measuring chamber of this device contains an optoelectronic pair. An LED or a laser (aspiration sensor) is used as a driving element. The radiation of the master element of the infrared spectrum under normal conditions does not fall on the photodetector. When smoke particles enter the optical chamber, radiation from the LED is scattered. Due to the optical effect of scattering of infrared radiation on smoke particles, light enters the photodetector, providing an electrical signal. The greater the concentration of scattering smoke particles in the air, the higher the signal level. For the correct operation of the optical detector, the design of the optical chamber is very important.

Comparative characteristics of ionization and optical types of detectors are given in Table. 3.


Table 3

Comparison of the effectiveness of smoke detection methods

Laser detector provides smoke detection at specific optical density levels approximately 100 times lower than current LED sensors. There are more expensive systems with forced air suction. To maintain sensitivity and prevent false alarms, both types of detectors (ionization or photoelectric) require periodic cleaning.

Smoke detectors indispensable in rooms with high ceilings and large areas. They are widely used in fire alarm systems, as it becomes possible to fix a fire hazardous situation at an extremely early stage. The ease of installation, configuration and operation of modern linear sensors allow them to compete in price with point detectors even in medium-sized rooms.

Combined smoke detector(ionization and optical types of detectors are assembled in one housing) operates at two light reflection angles, which allows you to measure and analyze the ratio of forward and back light scattering characteristics, identifying smoke types and reducing the number of false alarms. This is done through the use of two-angle light scattering technology. It is known that the ratio of direct scattered light to the reverse for dark smoke (soot) is greater than for light types of smoke (smoldering wood), and even higher for dry substances (cement dust).

It should be noted that the most effective is a detector that combines photoelectric and thermal sensing elements. Today they are producing 3D combined detectors, they combine the smoke optical, smoke ionization and thermal detection principles. In practice, they are rarely used.

Flame detectors. An open fire has characteristic radiation in both the ultraviolet and infrared parts of the spectrum. Accordingly, two types of devices are produced:

ultraviolet– a high-voltage gas-discharge indicator constantly monitors the radiation power in the ultraviolet range. When an open fire appears, the intensity of the discharges between the indicator electrodes increases greatly and an alarm signal is issued. Such a sensor can control an area up to 200 m 2 at installation height up to 20 m. response time does not exceed 5 s;

infrared- with the help of an IR-sensitive element and an optical focusing system, characteristic bursts of IR radiation are recorded when a fire occurs. This device allows you to determine within 3 s the presence of a flame with a size of 10 cm at a distance of up to 20 m at a viewing angle of 90 °.

Now there are sensors of a new class - analog detectors with external addressing. The sensors are analog, but are addressed by the alarm loop in which they are installed. The sensor performs self-testing of all its components, checks the dust content of the smoke chamber, and transmits the test results to the control panel. Smoke chamber dust compensation allows you to increase the detector's operating time until the next service, self-testing eliminates false alarms. Such detectors retain all the advantages of analogue addressable detectors, have a low cost and are able to work with inexpensive non-address control panels. When placing several detectors in the alarm loop, each of which will be installed alone in the room, it is necessary to install remote optical indication devices in the common corridor.

The criterion for the effectiveness of the OPS equipment is to minimize the number of errors and false positives. It is considered an excellent result of the work the presence of one false alarm from one zone per month. The frequency of false alarms is the main characteristic by which one can judge the noise immunity of the detector. Noise immunity- This is a quality indicator of the sensor, characterizing its ability to work stably in various conditions.

The fire and security alarm system is controlled from the control panel (concentrator). The composition and characteristics of this equipment depend on the importance of the object, the complexity and branching of the signaling system. In the simplest case, the control over the operation of the alarm system consists of turning sensors on and off, fixing alarms. In complex, branched signaling systems, control and management are carried out using computers.

Modern security alarm systems are based on the use of microprocessor control panels connected to the monitoring station via wired lines or radio channels. There can be several hundreds of security zones in the system, for ease of management, the zones are grouped into sections. This allows you to arm and disarm not only each sensor individually, but also the floor, building, etc. Usually, a section reflects some logical part of the object, for example, a room or a group of rooms, united by some essential logical feature. Control and reception devices allow to carry out: control and monitoring of the state of both the entire alarm system and each sensor (on-off, alarm, failure, failure on the communication channel, attempts to open sensors or communication channel); analysis of alarm signals from various types of sensors; checking the performance of all nodes of the system; alarm recording; interaction of the signaling with other technical means; integration with other security systems (CCTV, security lighting, fire extinguishing system, etc.). Characteristics of conventional, addressable and addressable-analog fire alarm systems are given in Table. 4.

Table 4

Characteristics of conventional, addressable and addressable analog fire alarm systems

2.5. Processing and logging of information, formation of control alarms of the fire alarm system

For processing and logging information and generating control alarms, various control equipment can be used - central stations, control panels, control panels.

Reception and control device (PKP) supplies power to security and fire detectors via security and fire alarm loops, receives alarm notifications from sensors, generates alarm messages, and also transmits them to a centralized monitoring station and generates alarm signals for triggering other systems. Such equipment is distinguished by information capacity - the number of controlled alarm loops and the degree of development of control and warning functions.

To ensure that the device complies with the chosen tactics of use, fire alarm control panels are allocated for small, medium and large objects.

Typically, small objects are equipped with non-address systems that control several loops of the security and fire alarm, and at medium and large objects, addressable and addressable analog systems are used.

PKP of small information capacity. Typically, these systems use security and fire control panels, where the maximum allowable number of sensors is included in one loop. These control panels allow solving a maximum of tasks at a relatively low cost for completing the system. Small control panels have the universality of loops according to their purpose, i.e. it is possible to transmit signal and control commands (alarm, security, fire modes of operation). They have a sufficient number of outputs to the central monitoring console, allow you to keep a record of events. The output circuits of small control panels have outputs with sufficient current to power the detectors from the built-in power supply, they can control fire or technological equipment.

At present, there is a tendency to use instead of PKP of small information capacity PKP of medium information capacity. With this replacement, the one-time costs almost do not increase, but the labor costs for eliminating faults in the linear part are significantly reduced due to exact definition failure points.

PKP medium and large information capacity. For centralized reception, processing and playback of information from a large number of security objects, consoles and centralized monitoring systems are used. When using a device with a common central processor with a lumped or tree-like structure for laying loops (both addressable and non-addressable FSOs), incomplete use of the information capacity of the control panel leads to some increase in the cost of the system.

V address systems one address must correspond to one addressable device (detector). When using a computer, due to the lack of a central control panel with limited monitoring and control functions in the control panel units themselves, there are difficulties in backing up the power supply and the impossibility of the full functioning of the alarm system if the computer itself fails.

V addressable analog fire control panels the price of equipment per address (control panel and sensor) is twice as high as that of analogue systems. But the number of addressable analog sensors in separate rooms, compared with threshold (maximum) detectors, can be reduced from two to one. Increased adaptability, informativeness, self-diagnostics of the system minimize operating costs. The use of addressable, distributed or tree-like structures minimizes the cost of cables and their laying, as well as the cost of maintenance by up to 30-50%.

The use of the control panel for fire alarm systems has some peculiarities. The system structures used are subdivided as follows:

1) Control panel with a concentrated structure (in the form of a single unit, with unaddressed radial loops) for fire alarm systems of medium and large information capacity. Such control panels are used less and less; it can be recommended to use them in systems with up to 10–20 loops;

2) control panel for analog addressable fire alarm systems. Addressable analog control panels are much more expensive than addressable threshold ones, but they do not have any special advantages. They are easier to install, maintain and repair. They have significantly increased information content;

3) Control panel for addressable fire alarm systems. Groups of threshold sensors form address control zones. Control panels structurally and programmatically consist of complete functional blocks. The system is compatible with detectors of any design and principle of operation, turning them into addressable ones. All devices in the system are usually addressed automatically. They allow to combine most of the advantages of addressable analog systems with the low cost of maximum (threshold) sensors.

To date, a digital-to-analogue signaling loop has been developed that combines the advantages of analog and digital loops. It has more information content (in addition to ordinary signals, additional ones can be transmitted). The ability to transmit additional signals allows you to refuse from setting up and programming alarm loops, to use several types of detectors in one loop at once with automatic configuration to work with any of them. This reduces the required number of signaling loops for each object. At the same time, the control panel can imitate the operation of the alarm loop at the command of its own detector in order to transmit information to another similar device that acts as central monitoring console (monitoring station).

The monitoring station can not only receive information, but also transmit basic commands. This fire and security device does not need to be specially programmed (the setting is automatic, similar to the function in the Plug & Play computer). Therefore, highly qualified specialists are not required for maintenance. In one fire loop, the device receives signals from heat, smoke, manual detectors, engineering systems control sensors, distinguishes between the operation of one or two detectors, and can even work with analog fire detectors. The address of the alarm loop becomes the address of the room, and without programming the parameters of the device or detectors.

2.6. Operating devices of the OPS

Operating devices of the OPS must ensure that the system responds to an alarm event as specified. The use of intelligent systems makes it possible to carry out a set of measures related to the elimination of a fire (detection of a fire, notification of special services, information and evacuation of personnel, activation of the fire extinguishing system), and to carry out them in full automatic mode. Automatic fire extinguishing systems have been used for a long time, releasing a fire suppressant into the protected room. They can localize and eliminate fires before they develop into a real fire, and act directly on the fires. Now there are a number of systems that can be used without damage to technology (including those with electronic filling).

It should be noted that the connection of automatic fire extinguishing installations to security and fire control panels is somewhat inefficient. Therefore, experts recommend using a separate fire control panel with the ability to control automatic fire extinguishing installations and voice notification.

Autonomous fire extinguishing systems it is most effective to install in places where a fire is especially dangerous and can cause irreparable damage. Part offline installations necessarily includes devices for storing and supplying a fire extinguishing agent, devices for detecting fires, automatic start-up devices, means for signaling a fire or an installation operation. According to the type of fire suppressant, the systems are divided into water, foam, gas, powder, aerosol.

sprinkler and deluge automatic fire extinguishing systems used to extinguish fires with water over large areas with finely sprayed streams of water. In this case, it is necessary to take into account the possibility of indirect damage associated with the loss of consumer properties of the equipment and (or) goods when wet.

Foam fire extinguishing systems use air-mechanical foam for extinguishing and are used without restrictions. The system kit includes a foam mixer complete with piping and a bladder tank with an elastic container for storing and dosing foam concentrate.

Gas extinguishing systems used to protect libraries, computer centers, bank depositories, small offices. In this case, additional costs may be required to ensure proper tightness of the protected object and to carry out organizational and technical measures for preventive evacuation of personnel.

Powder extinguishing systems are used where it is necessary to localize the source of the fire and ensure the safety of material assets and equipment not damaged by fire. Compared to other types of self-contained fire extinguishers, powder modules are distinguished by their low price, ease of maintenance, environmental safety. Most powder fire extinguishing modules can operate both in electric start mode (by signals from fire detectors) and in self-start mode (when the critical temperature is exceeded). In addition to the autonomous mode of operation, as a rule, they provide for the possibility of manual start. These systems are used to localize and extinguish fires in enclosed spaces and in the open air.

Aerosol fire extinguishing systems- systems that use finely dispersed solid particles for extinguishing. The difference between an aerosol fire extinguishing system and a powder one is that at the moment of operation, an aerosol is released, and not a powder (larger than an aerosol). These two fire extinguishing systems are similar to each other both in function and in principle of operation.

The advantages of such a fire extinguishing system (such as ease of installation and installation, versatility, high extinguishing capacity, efficiency, use at low temperatures and the ability to extinguish live materials) are primarily economic, technical and operational.

The disadvantage of such a fire extinguishing system is the danger to human health. The service life is limited to 10 years, after which it must be dismantled and replaced with a new one.

Another important element of the OPS is the alarm notification. Alarm notification can be operated manually, semi-automatically or automatically. The main purpose of the warning system is to warn people in the building about a fire or other emergency and control their movement to a safe area. Notification of fire or other emergencies should be significantly different from the notification of a burglar alarm. Clarity and uniformity of the information provided in a voice announcement are crucial.

Warning systems differ in composition and principle of operation. Block operation management analog public address system carried out using a matrix control unit. Control digital public address system usually implemented using a computer. Local notification systems broadcast in a limited number of rooms a previously recorded text message. Typically, such systems do not allow you to quickly control the evacuation, for example, from a microphone console. Centralized systems automatically broadcasts a recorded emergency message to predetermined zones. If necessary, the dispatcher can transmit messages from the microphone console ( semi-automatic transmission mode).

Most fire alarm systems are built on a modular basis. The procedure for organizing a warning system depends on the characteristics of the protected object - the architecture of the object, the nature of production activities, the number of personnel, visitors, etc. For most small and medium-sized objects, fire safety standards define the installation of warning systems of the 1st and 2nd type and light signals to all areas of the building). In warning systems of the 3rd, 4th and 5th types, one of the main methods of notification is speech. The choice of the number and power of activation of sirens in a particular room directly depends on such fundamental parameters as the noise level in the room, the size of the room and the sound pressure of the installed sirens.

Loud bells, sirens, loudspeakers, etc. are used as sources of sound alarms. Light displays “Exit”, light indicators “Direction of movement”, light flashing annunciators (strobe flashes) are most often used as light sources.

Typically, an alert controls other security features. For example, in the case unusual situation between advertising messages, ordinary at first glance announcements can be transmitted, which, with conditional phrases, inform the security service and the personnel of the enterprise about incidents. For example: "Guard on duty, call 112." The number 112 could mean a potential attempt to carry unpaid clothing out of the store. Under emergency circumstances, the warning system should ensure the management of the evacuation of people from premises and buildings. In normal mode, the public address system can also be used to transmit background music or advertisements.

Also, the warning system can be hardware or software integrated with the access control system, and upon receipt of an alarm pulse from the sensors, the warning system will issue a command to open the doors of additional evacuation exits. For example, in the event of a fire, an alarm activates the automatic fire extinguishing system, turns on the smoke exhaust system, turns off the forced ventilation of the premises, turns off the power supply, dials automatically to the specified telephone numbers (including emergency services), turns on emergency lighting, etc. e. And when unauthorized access to the premises is detected, the automatic door lock system is triggered, SMS messages are sent to the cell phone, messages are sent to the pager, etc.

Communication channels in the fire alarm system can be specially laid wire lines or telephone lines, telegraph lines and radio channels already available at the facility.

The most common communication systems are stranded shielded cables, which, to increase the reliability and safety of the alarm, are placed in metal or plastic pipes, metal hoses. The transmission lines through which the signals from the detectors are received are physical loops.

Beyond traditional lines wired connection Fire and security alarms operating using a radio communication channel are now offered in OPS systems. They have high mobility, commissioning is minimized, and quick installation and dismantling of fire alarm systems is ensured. Setting up radio channel systems is very simple, because each radio button has its own individual code. Such systems are used in situations where it is impossible to stretch the cable or it is not financially justified. The secrecy of these systems is combined with the ability to easily expand or reconfigure them.

Also, we must not forget that there is always a risk of deliberate damage to the electrical circuit by an intruder or a power outage due to an accident. Still, security systems must remain operational. All fire and security alarm devices must be provided with uninterrupted power supply. The power supply of the security alarm system must necessarily have redundancy capabilities. In the absence of voltage in the network, the system must automatically switch to backup power.

In the event of a power outage, the alarm operation does not stop due to the automatic connection of a backup (emergency) power source. To ensure uninterrupted and protected power supply to the system, uninterruptible power supplies, batteries, backup power lines, etc. are used. The use of a centralized backup power source leads to losses in the used capacity of backup batteries, to additional costs on wires of increased cross section, etc. The use of backup power sources distributed throughout the facility does not allow monitoring their condition. To implement their control, the inclusion of a power source in the OPS address system with an independent address is used.

It is necessary to provide for the possibility of duplicating the power supply using various electrical substations. It is also possible to implement backup power line from your generator. Fire safety standards require that the burglar and fire alarm system be able to remain operational in the event of a mains power failure during the day in standby mode and at least three hours in alarm mode.

Currently, the complex application of fire alarm systems is used to ensure the safety of an object when high degree integration with other security systems such as access control systems, video surveillance systems, etc. When building integrated security systems, compatibility problems with other systems arise. To combine security and fire alarm systems, warning, access control and management, security television, automatic fire extinguishing installations, etc., software, hardware (which is the most preferable) and the development of a single finished product are used.

Separately, it should be mentioned that the Russian SNiP 2.01.02-85 also requires that the evacuation doors of buildings do not have locks that cannot be opened from the inside without a key. In such conditions, special handles for emergency exits are used. Anti-panic handle ( push bar) is a horizontal bar, pressing on which at any point causes the door to open.

MINISTRY OF INTERNAL AFFAIRS OF THE RUSSIAN FEDERATION

MAIN DEPARTMENT OF NON-DEPARTMENTAL SECURITY

SELECTION AND APPLICATION OF MEANS
SECURITY AND FIRE ALARMS
AND MEANS OF TECHNICAL STRENGTHENING FOR
FACILITIES EQUIPMENT


DEVELOPED by N.N. Kotov, L.I. Savchuk, E.P. Tyurin under the direction of V. G. Sinilov

APPROVED by the GUVO of the Ministry of Internal Affairs of Russia on June 27, 1998.

INTRODUCTION

INTRODUCTION


The main role in ensuring the complex security of the facility is played by the technical means of the security and fire alarm system (TS FSO) and the means of technical reinforcement. The correct choice and use of the TS of the FPS and the means of technical strengthening at the facility allows for a sufficiently high reliability of the protection of the facility from all possible internal and external types of threats and dangerous situations. At the same time, the lack of a proper approach to the process of selection and application of the TS OPS and technical strengthening tools reduces the level (or effectiveness) of security and leads to prohibitively high costs for ensuring the required security.

The choice of the equipment option for the TS FS facility and the means of technical strengthening is determined by the characteristics of the significance of the premises of the facility, its construction and architectural and planning solutions, operating and maintenance conditions, operating mode, interference that occurs at the facility, and many other factors that must be taken into account when designing an integrated system security.

This paper gives recommendations and sets out the requirements that, first of all, need to be taken into account by organizations that carry out design and installation work on equipping objects of the TS of the fire protection system and means of technical strengthening.

1. GENERAL PROVISIONS


The higher the level (or efficiency) of security, the higher the probability of preserving all the values ​​of the object from theft or destruction. The level of security, in turn, mainly depends on the response time of the security system to an emerging threat and on the time it takes to overcome physical barriers: bars, locks, safes, latches on windows and doors, specially reinforced doors, walls, floors, ceilings, etc. etc., that is, means of technical fortification in the way of the possible movement of the intruder. The sooner a threat to an object can be detected, the more effectively it can be stopped. This is achieved through the correct selection and use of TS of the FSO and their optimal placement in protected areas. The use of technical fortification means increases the time required for the violator to overcome them, which makes it more likely that he will be detained. This is especially evident when using these tools in combination with TS OPS. The means of technical fortification, in addition to the functions of a physical obstacle, also perform the functions of a psychological obstacle that prevents the intruder from entering the protected object.

The design phase of the security system is the most important period during which all the basic functions and structures of the security system are laid down. At this stage, an inspection of the object is carried out, the objectives of which are:

- on-site study of the characteristics of the object that determine its resistance to alleged criminal encroachments and possible emergency situations;

- determination of a set of measures and development of technical proposals for organizing the protection of an object, taking into account the generated standard solutions that provide sufficient security.

Based on the results of the survey, the terms of reference for the design of a complex of technical security equipment are being developed. The inspection of the object is carried out by an interdepartmental commission (MVK) consisting of representatives of the administration (or security service) of the object, private security units, state fire supervision and, if necessary, other interested organizations.

Design, preparation and performance of work must be carried out in accordance with regulatory and technical documents:

- RD 78.143-92 Security alarm systems and complexes. Elements of technical fortification of objects. Design standards;

- RD 78.145-93 Security, fire and security and fire alarm systems and complexes. Rules for the production and acceptance of work;

- RD 78.146-93 Instructions on technical supervision over the implementation of design and installation work for equipping facilities with security alarms;

- RD 78.147-93 Uniform requirements for technical reinforcement and equipment with alarm facilities;

- RD 78.148-94 Protective glazing. Classification, test methods. Application;

- GOST R 50862-96 Safes and storages of valuables. Requirements and test methods for resistance to burglary and fire resistance;

- GOST R 50941-96 Protective cabin. General technical requirements and test methods;

- GOST R 51072-97 Protective doors. Requirements and test methods for resistance to burglary;

- Rules for the installation of electrical installations (PUE);

- Standard requirements for technical strength and signaling equipment for trade enterprises;

- SNiP 2.04.09-84, SNiP 3.05.06-85 and other applicable regulatory and technical documents approved in in due course, in particular, technological maps and instructions for the installation of fire alarm systems and devices, as well as technical documentation for products.

2 CATEGORY OF ROOMS


The choice of the option of equipping the TS FSS facility and the means of technical strengthening is determined by the importance of the premises of the facility, the type and placement of valuables in these premises. All premises of any object can be conditionally divided (according to the type and placement of valuables in them) into four categories:

the first category - premises where goods, objects, and products of special value and importance are located, the loss of which can lead to particularly large or irreparable material and financial damage, pose a threat to the health and life of a large number of people located at the facility and outside it, lead to other serious consequences.

Typically, such premises include: storage (pantries) of valuables, warehouses for storing weapons and ammunition, premises with permanent storage of narcotic and poisonous substances, as well as secret documentation and other especially valuable and especially important inventory items;

the second category - premises where valuable and important goods, objects and products are located, the loss of which can lead to significant material and financial damage, pose a threat to the health and life of people at the facility.

Such premises include: special archives and special libraries, safe rooms, storage rooms for service firearms, radioisotope substances and preparations, jewelry, antiquities, art and culture, money, currency and securities (main cash desks of objects);

the third category - premises where goods, objects and articles of daily demand and use are located.

Such premises include: service, office premises, trading floors and premises for industrial goods, household appliances, food products, etc.;

the fourth category - premises where goods, objects and products of technological and economic purposes are located.

Such premises include: auxiliary and auxiliary premises, premises with permanent or temporary storage of technological and household equipment, technical and design documentation, etc.

3 TECHNICAL STRENGTHENING OF THE FACILITY'S PREMISES


Technical strength - a set of measures aimed at strengthening the structural elements of buildings, premises and protected areas, providing the necessary resistance to unauthorized entry into the protected area, hacking and other criminal encroachments.

The classification of structural elements (walls, doors, window openings) is given in Appendices A - B. The selected group of protection against burglary of structural elements must correspond to the value and significance of the property (values) located in the room, that is, the corresponding category of the room. In addition, it is necessary to take into account the location of the object and the accessibility of penetration into its premises. At the same time, increased requirements should be imposed on places where an attacker can operate in relative safety.

To increase the reliability of the protection of the premises of the facility, technical strength, which is the basis for building a technical security system, should be used in combination with the TS of the FPS. In case of non-compliance or insufficient technical strength of structural elements with the categories of premises, it is recommended to strengthen these elements or premises with additional means (boundaries) of the security alarm in accordance with Appendix D.

3.1 Walls and floors

Bearing and internal walls and partitions, floors and ceilings of the premises of the facility where the valuables are located, must have a sufficient degree of protection against possible unauthorized entry. Annex A provides a classification of building structures according to resistance to burglary. Depending on the category of the room, its location in the building, the choice of design or its strengthening is carried out.

Reinforcement of walls, ceilings and partitions is usually carried out over the entire area with metal gratings and nets (Appendix A) installed from the inside of the room. Lattices or grids are welded to steel anchors with a diameter of 12 mm or more firmly embedded in the wall (ceiling) to a depth of 80 mm (to embedded parts from a steel strip measuring 100x50x6 mm adjusted with four dowels) with a step of no more than 500x500 mm. After installation, gratings or meshes must be masked with plaster (cladding panels).

If it is not possible to install a grate or mesh from the inside, it is allowed (in agreement with the security units) to install them from the outside of the room.

3.2 Doors

Doors (mainly entrance doors) of premises, as well as walls, must have a sufficient degree of protection against possible unauthorized entry. Appendix B shows the classification of building structures of doors according to their resistance to burglary. Depending on the category of the room, its location in the building, the choice of door design or their reinforcement is carried out.

Additional lattice doors used to enhance the protection of the premises are installed from the inside. Doors can be hinged or sliding and lockable.

To strengthen a wooden door frame, it is recommended to frame it with a steel corner with dimensions of at least 45x28x4 mm, and also to fix the frame in the wall with steel "ruffs" (crutches) with a diameter of 10 mm or more and a length of at least 120 mm.

Entrance doors to the facility are recommended to be equipped with at least two mortise non-self-latching electromechanical and/or mechanical locks installed at a distance of 300 mm or more from each other.

3.3 Window openings

All windows, transoms and vents in the premises of the facility must be glazed and have reliable and serviceable locks. Glass must be intact and securely fixed in the grooves. Appendix B provides a classification of window openings and their structures according to resistance to burglary. Depending on the category of the room, its location in the building, the choice of window openings or the design of their reinforcement is made.

Window openings of the premises of the first or third categories located on the ground floor of the building, as well as window openings of these premises (regardless of the number of storeys) leading to fire escapes, roofs of buildings of different heights and canopies through which you can get into the premises, are equipped with security structures: bars, shutters, blinds, screens, etc.) or protective glazing in accordance with Annex B.

If all window openings of the premises of the facility located on the same floor of the building are equipped with bars, then one of them is made opening with the possibility of closing it with a lock (built-in or hinged).

When installing stationary metal gratings on the window openings of the premises, the ends of the bars of these gratings must be embedded in the wall of the building to a depth of at least 80 mm and poured with cement mortar or welded to existing structures. If this is not possible, the grate is framed with a corner with dimensions of at least 35x35x4 mm and welded along the perimeter to steel anchors firmly embedded in the wall of the building to a depth of 80 mm with a diameter of 10 mm or more and a length of at least 120 mm.

Lattices can be installed both from the inside of the room, and between window frames. In some cases, it is allowed to install stationary and decorative metal gratings from the outside of the room.

The cash desk of an enterprise, organization, institution must be equipped with a special window no larger than 200x300 mm with a door for operations with clients. If the dimensions of the window exceed those indicated above, then outside it should be reinforced with protective structures (in accordance with RD 78.147-93).

A special checkout window can be made in the form of a transfer unit in accordance with GOST R 50941-96.

3.4 Ventilation and chimneys

Ventilation shafts, ducts and chimneys with a diameter of more than 200 mm, having access to the roof (or to adjacent rooms) and with their section entering the room in which the valuables are located, must be equipped (at the entrance to it) with metal gratings made of a corner with a section not less than 35x35x4 mm, reinforcement with a diameter of at least 16 mm, with a cell size of not more than 150x150 mm. Lattices in ventilation ducts on the side of the room should be no more than 100 mm from the inner surface of the wall (ceiling).

The walls of the premises of the first and second categories (if they have ventilation shafts, ducts or chimneys with a diameter of 200 mm or more) from the inside must be reinforced with a grate over the entire area bordering them. The lattice is made of reinforcement with a diameter of 10 mm or more and a cell size of not more than 150x150 mm, which is then plastered. Installation of gratings is similar to their installation when strengthening the walls of the room.

Ventilation ducts and chimneys with a diameter of more than 200 mm, passing through the premises of the first and second categories, must be equipped at the entrance to these premises (exit from them) with metal gratings made of a bar with a diameter of 10 mm or more or with a strong metal mesh with their subsequent wrapping with wire to connect to a security alarm.

To protect ventilation shafts, ducts and chimneys, it is allowed to use false gratings made of a metal tube with a hole diameter of 6 mm or more and with a cell measuring 100x100 mm (for laying the wire of the alarm loop).

3.5 Locks and locking devices

As locking devices installed on doors and windows, mortise, overhead non-self-latching and padlocks, latches, bolts, latches, etc. are used.

Padlocks should be used mainly for additional locking of doors, bars, shutters, blinds, etc. These locks are sufficiently effective (in terms of protection) only if they have hardened steel shackles and massive strong cases (barn lock), and also if there are protective covers, plates and other devices at their installation sites on the locked structures, which can prevent the possibility of curling or sawing of the lugs and clasps.

Typically, the following types of locks are used to lock doors:

- pin cylinder;

- disk cylinder;

- lamellar cylinder;

- level;

- electromechanical;

- electromagnetic.

In accordance with the draft GOST R being developed "Mechanical and electromechanical locks for protective structures of door and window openings. Requirements and test methods for resistance to criminal opening and breaking", the proposed introduction of which is 01/01/1999, all locks supplied to the Russian market and suitable for use at objects to be taken under protection must be certified and have the appropriate class of resistance to criminal opening and burglary.

For the entrance doors of the premises and objects in which these premises are located, it is recommended to use locks (mortise and overhead) that have classes of resistance to criminal opening and burglary not lower than the following:

- premises of the fourth category - class U2 locks;

- premises of the third category - class U3 locks;

- premises of the first and second categories - class U4 locks, with the exception of storerooms and safes, the doors of which must be equipped with locking devices that ensure secrecy and resistance to breaking in accordance with GOST R 50862-96 and GOST R 51053-97.

Class U1 locks are recommended mainly for additional locking of doors.

3.5.1 Pin cylinder locks

The overwhelming majority of pin cylinder locks produced in our country have a secrecy mechanism with five pairs of pins arranged in one row (the usual "English lock"), which determines their low secrecy (up to 2500 combinations). The manufacture of security mechanisms with high tolerances and from soft materials (TsAM 4-1 or aluminum alloys), as well as the absence of pins with a groove, reduce the resistance of the security mechanism to criminal opening. Locks with the same secrecy mechanisms, made of brass and with lower tolerances, are more resistant (about twice) to criminal opening.

Locks with a security mechanism with 8 - 12 pairs of pins arranged in 2, 3 or 4 rows have significantly greater security (from 6,000 to 50,000 combinations).

A significant design disadvantage of a mortise pin lock is the presence of a protrusion of the security mechanism by 10 - 12 mm relative to the door leaf. This can lead to the possibility of capturing the protruding part of the security mechanism with a mechanical tool and destroying it by folding, thereby opening access to the mechanism for moving the deadbolt. The force required to roll up a security mechanism made of brass is twice that of a mechanism made of TsAM 4-1 or aluminum alloy. The time of opening the lock largely depends on the fastening (with screws or screws) of the outer lining, which prevents the secrecy mechanism from being captured. Fastening with screws significantly increases the time spent on breaking.

An increase in the resistance of the lock to breaking by drilling is achieved by using a security mechanism with a pressed-in insert made of carbide material that protects the body of the security mechanism, the cylinder and the pins.

3.5.2 Disc cylinder locks

Locks with a disc mechanism of secrecy (such as "Abloy") are among the most reliable in terms of resistance to criminal opening. This is due to the presence of the design of the secrecy mechanism, which makes it possible to achieve secrecy of 1,000,000 or more combinations. A small key hole in the mechanism of secrecy greatly limits the ability to manipulate the master keys.

The structural disadvantage of most mortise disc locks is the presence of a protrusion of the security mechanism by 20 mm or more (relative to the door leaf), which makes it easy to break these locks by folding the security mechanism.

An increase in the resistance of the lock to breaking by drilling is achieved by using a security mechanism with a pressed hardened washer installed in the front part of the security mechanism.

3.5.3 Lamellar cylinder locks

For the most part, plate-type security mechanisms have six code elements (plates), so their security is higher than that of five pin security mechanisms and is about 5000 combinations. Resistance to opening them with master keys, breaking and drilling is the same as that of pin mechanisms.

3.5.4 Lever locks

The main criteria that determine the secrecy of lever mechanisms are: the number of levers in the mechanism, the size of the gap between the through groove of the levers and the lever rack. Depending on these parameters, the secrecy of lever locks ranges from 80 to 2,500,000 combinations.

An increase in the resistance of the lock to breaking by drilling is achieved by using a secrecy mechanism in which the lever stand is protected by a plate of hardened steel or carbide material.

To protect the front door of the room, it is recommended to use a lock with at least six levers (symmetrical or asymmetrical). The number of levers corresponds to the number of steps of the key bit, reduced by one step, which is designed to move the bolt of the lock.

3.5.5 Bolts and strikers of locks

The resistance of bolts to dynamic loads is determined by the following criteria:

- the material from which the bolt is made;

- cross-sectional area of ​​the bolt;

- the length of the deadbolt head (according to GOST 5089-97, the length of the deadbolt head must be at least 40 mm, the deadbolt projection must be at least 22 mm, the remaining part of the deadbolt in the lock body must be at least 18 mm);

- the strength of fastening the front plate to the lock body.

With an insufficient length of the bolt head and a significant overhang of the bolt, the bolt bends (after striking the lock).

To protect bolts from possible sawing, it is recommended to use locks with bolts that are made of carbide materials or have pressed-in inserts of these materials.

The stability of strikers is affected by: the thickness, configuration and material of the striker. Reliable strike plates must be made of steel and have a wall thickness of at least 3 mm.

The L-shaped strike plate has a high resistance to burglary, which can be fastened not only to the door frame, but also to the wall using anchors.

3.5.6 Electromechanical and electromagnetic locks

Recently, electromechanical and electromagnetic locks, as well as latches, have been widely used.

The electromechanical principle of operation of the lock actuator is based on the movement of closing elements (locks, lock bolts, etc.) by turning on an electric motor or an electromagnet for the duration of their movement.

In actuators with an electromagnetic principle of operation, there are no moving mechanical closing elements, that is, blocking of barrier devices (for example, doors) is carried out using magnetic attraction forces created by a powerful magnet.

Often in mechanical locks, electromagnetic interlocking (magnetic latches, latches, etc.) is used for closing elements with the ability to move them manually when opening or closing in extreme conditions.

It is recommended to install an electromechanical lock on wooden and/or metal doors weighing up to 100 kg under the condition of average load (100...200 passes per day). The use of this lock for heavily loaded doors is inefficient due to high mechanical wear and, as a result, a decrease in reliability and service life. Most often, an electromechanical lock is installed on the door (consignment note or mortise lock), but sometimes it is also installed on the door frame.

It is recommended to install an electromagnetic lock on wooden and metal doors weighing up to 650 kg under high load conditions (more than 200 passes per day). The absence of parts subject to friction and wear make this lock almost eternal. A feature of this lock is the need for a constant supply of current to the electromagnet winding, since in the event of a power failure in the network (for example, in an accident or a deliberate wire break), the lock opens. In this regard, for reliable operation, it is necessary to duplicate the electromagnetic lock with a mechanical one or use additional backup power.

It is recommended to mount the electromagnetic latch in the jamb door frame. This setting allows you to block the bolt of the lock installed in the door (when it is closing), and unlock the lock when a control signal is given to open the door. This installation of the latch allows you to completely save the lock and hardware fittings of the door.

4 EQUIPMENT OF THE PREMISES OF THE FACILITY WITH TECHNICAL MEANS OF SECURITY AND FIRE ALARMS


The equipment of the premises of the facility of the TS of the fire protection system is carried out after the work on technical strengthening. Preparation and performance of work on equipping the facility of the TS of the FPS must be carried out in accordance with the regulatory documents specified in Section 1 of these Recommendations.

At objects (guarded or subject to transfer under protection to private security units), only the OPS equipment included in the current List of technical means of private security approved for use approved by the Main Directorate of Defense of the Ministry of Internal Affairs of Russia, with appropriate annual changes and additions, should be installed.

To improve the reliability of the protection of the facility and its premises, the structure of the FPS complex is determined based on:

- mode of operation of this object;

- procedure for carrying out transactions with valuables;

- features of the location of premises with valuables inside the building;

- selection of the number of protected zones.

4.1 Equipping the premises of the facility with technical means of security alarms

At the facility, all premises with permanent or temporary storage of material assets, as well as other premises adjacent to them and all vulnerabilities (windows, doors, hatches, ventilation shafts and ducts) located on the first and last floors of the building along the perimeter of the object.

Premises of the third and fourth categories are recommended to be equipped with one-line protection, premises of the first and second categories - with multi-line protection.

In the premises of the third and fourth categories, located on the second and higher floors of the building, as well as inside the facility, it is not required to install OS TS if the building is guarded around the entire perimeter (first and last floors and all vulnerabilities).

Window openings of the premises of the first and second categories, located on the second and higher floors of the building, protected along the entire perimeter (first and last floors and all vulnerabilities), it is allowed not to equip the OS OS.

The choice of the most optimal option for protecting the premises of the OS TS object is recommended to be carried out in accordance with Appendix D of these Recommendations. Depending on the category of valuables stored in the premises, the burglar alarm is divided into four groups (classes) of protection against penetration: the first protection group is insufficient (organization of an incomplete first line of protection in the premises), the fourth protection group is very high (organization of three-line protection of the premises).

The first line of defense is protected by:

Building structures along the perimeter of the building or premises of the facility, that is, all window and door openings;

- places of input of communications, ventilation ducts;

- exits to fire escapes;

- non-capital and capital walls (if protection is needed).

The building structures of the building (premises) of the facility block:

- doorways, loading and unloading hatches - for "opening" and "break" (only for wooden);

- glazed structures - for "opening" and "destruction" of glass;

- places of input of communications, non-capital and capital walls (if protection is necessary) - to the "break";

- ventilation ducts, chimneys - for "destruction".

Instead of blocking glazed structures for "opening" and "destruction", internal non-permanent walls for "breaking", doors for "opening" and "breaking", it is allowed to use volumetric and linear detectors to block these structures only for "penetration". At the same time, it should be borne in mind that passive optoelectronic detectors used for these purposes (such as "Photon" and others, whose operation is based on the same principle of operation) provide protection for premises only from direct penetration of the intruder.

Blocking of building structures (doors, glazed structures) for "opening" is recommended to be carried out with the simplest magnetic contact detectors, and blocking of gates, loading hatches, storage doors, elevator shafts - with limit switches.

Blocking of glazed structures for "destruction" of glass is recommended to be carried out with ohmic detectors (of the "foil" type), surface shock-contact or sound detectors.

Blocking of walls on a "breach" should be carried out with surface piezoelectric or ohmic (type "wire") detectors.

The second frontier of protection is protected by the volumes of the premises with passive optoelectronic detectors with a volumetric detection zone, ultrasonic, combined or radio wave detectors.

The third line of protection is protected by safes and individual items or approaches to them by capacitive, piezoelectric, passive and active optoelectronic or radio wave detectors.

4.2 Selection and placement of technical means of security alarms in the premises of the facility

In the premises of the object, such OS TS should be installed so that, on the one hand, the necessary level of reliability of the object’s protection is ensured, and on the other hand, the costs of purchasing, installing and operating the OS TS would be reduced (if possible).

The choice of specific types of detectors is determined based on:

- comparison of the structural and construction characteristics of the object to be equipped, and the tactical and technical characteristics of the detectors;

- the nature and placement of valuables in the premises;

- number of storeys of the building;

- interference situation at the facility;

- probable ways of penetration of the violator;

- security regime and tactics;

- requirements for the secrecy of the installation, design;

- criminogenic significance of the object, etc.

4.2.1 Magnetic contact detectors

When blocking windows and doors for opening (depending on their designs), magnets and reed switches of magnetic contact detectors can be installed on both moving and stationary parts of structures. Using metal frames, doors or frames and doors with metal trim, it is necessary to install magnetic contact detectors of the IO 102-6 type, specially designed for this purpose. The recommended placement of detectors is on the upper parts of window frames and doors. If this installation of magnetic contact detectors is impossible (due to structural or architectural features windows and doors) it is allowed to install them on the side parts (opposite hinges) of frames and doors. It is allowed to install such detectors on the lower parts of window frames.

To exclude the possibility of unlocking the magnetic contact detector installed on the front door using a powerful magnet, it is recommended to install an additional trap detector next to the main detector. (A trap detector is a conventional magnetic contact detector with a magnet removed from its housing.) The reed switch of the detector, which is connected to the alarm loop (AL), works in parallel to close the AL when it is exposed to a powerful magnet.

The main characteristics of magnetic contact detectors are shown in Table 1.


Table 1

Detectors

Characteristics
detector tick

SMK-1, IO 102-2

Installation method

Open

Hidden small size
ny

Open

Hidden
small-sized
ny

hidden metal-
designs

Distance between reed switch and magnet, mm:

For closing-
contacts

For blur-
contacts

Operating range
temperature, °С

From minus 40 to plus 50

From minus 50 to plus 50

Overall dimensions, mm:

reed switch

Magnet

4.2.2 Optoelectronic detectors

Active and passive optical-electronic detectors with a linear or surface narrowly targeted detection zone (curtain type) are recommended to be used to block windows, doors, walls, ceilings, floors, corridors and approaches to protected objects for penetration or approach.

Depending on the architectural features of the interlocked structures, the detectors can be installed both on the walls of the room and on the ceiling (to protect the floor - only on the walls). In this case, it is necessary to install the detector so that its detection zone is located no further than 1.0 m (0.5 m for the floor) along the entire width or height from the blocked surface.

It should be borne in mind that when blocking the floor or ceiling with passive detectors with a surface narrowly directed detection zone (the detector is rotated by 90 °), the detection range is halved.

Passive optical-electronic detectors with a volumetric detection zone are recommended for the protection of premises, as well as for the simultaneous blocking of windows, doors, walls, ceilings and the valuables themselves located in the room.

To ensure the stable operation of these detectors, the following rules must be observed:

- do not install the detector above heating appliances;

- do not point the detector at warm air fans, searchlights, incandescent lamps and other sources that cause rapid temperature changes;

- keep the detector away from direct sunlight;

- prevent animals and objects (curtains, partitions, cabinets, etc.) from being in the detection zone of the detector, which can create "dead" zones.

The main characteristics of active optical-electronic detectors are given in table 2, passive infrared detectors - in table 3.

4.2.3 Radio wave and combined detectors

Radio wave and combined (optical-electronic + radio wave) detectors can be used to protect the volumes of enclosed spaces, internal and external perimeters of premises, individual objects and building structures, open areas. To ensure the stable operation of these detectors, the following rules must be observed:

- install detectors in such a way that their detection zones do not go beyond the blocked premises (window openings, thin wooden partitions);

- do not install detectors on conductive structures (metal beams, wet brickwork etc.), since a double ground loop appears between the detector and the power source, which can cause a false alarm of the detector;

- remove oscillating or moving objects with a significant reflective surface, as well as large objects that can create "dead" zones, outside the detection zone of the detector, or form the detection zone in such a way that these objects do not fall into it.

In the presence of "dead" zones, it is necessary to ensure that they do not create a free path for the offender to material values;

- do not install detectors in areas where there are powerful radio transmitting devices;

- for the period of protection:

- lock doors, windows, vents, transoms, hatches, and also turn off ventilation and power switching installations;

- do not allow plastic pipes, through which water can move, to enter the detection zone of the detector;

- turn off fluorescent and neon lamps.


table 2

Characteristic
detector

Detectors

"Vector-2"

"Vector-SPEK"

Purpose

Room perimeter protection

Protection of the perimeter of open areas and premises

Detection zone

Linear (single beam barrier)

Range, m:

75, 150

Mode A

Mode B

Notice
"Penetration"

Opening relay contacts

DC supply voltage, V

10,2….13,2

10,2….30,0

Pulsation amplitude, mV

Consumed current at supply voltage 12 V, mA;

Mode A

Mode B

Operating temperature range, °С

From minus 10 to plus 50

From minus 40 to plus 55

Overall dimensions, mm

102x91x90

75x95x145 (BI and BF)

Weight, kg

1.0 (BI and BF)


Table 3

Detectors

Characteristics
detector stick

"Photon - 6"

"Photon-6A"

"Photon-6B"

"Photon-SK"

"Photon-8"

"Photon-8B"

Purpose

Protection of extended premises (corridors)

Protection of the volume of a closed heated room

Enclosed volume protection

Protection of building structures and approaches to values

Detection zone

Volumetric

Volumetric

Linear (beam barrier)

Surface-
naya ("curtain")

Volumetric

Volumetric

Surface ("curtain")

Maximum range, m

Viewing angle, degrees:

In the vertical
noah plane

in the horizon-
tal plane

Control-
rumenable area, m

Notice "Penetrating
vision"

Opening relay contacts

Obr./KZ SHS

From AL 10.0…72.0

Consumed current, mA

From minus 10
up to plus 50

From minus 30 to plus 50

0 to plus 50

From minus 10 to plus 50

Overall dimensions, mm

107x107x64

Weight, kg


Table 4

Detectors

Detector characteristic

"Argus-2"

"Argus-3"

"Tulip-3"

"Wave-5"

"Radium-2"

"Radium-2/1"

"Radium-2/2"

"Fon-1M"

"Storm-2"

Detection principle

radio wave

Purpose

Protection of the interior space

Protecting the perimeter of open areas

Protection of the area and volume of open
sites and premises

Detection zone

Volumetric solid

Volumetric barrier ellipsoidal shape

Volumetric

Minimum controlled area, m

Maximum range, m

Notice
"Penetration"

Opening relay contacts

cliff
/KZ ShS

Opening relay contacts

Supply voltage alternating current, V

Redundant power supply (from a DC source):

Voltage, V

Consumed current, A

DC supply voltage, V

From ShS
12…72

Consumed current, mA

Operating temperature range, °С

From minus 30
up to plus 50

From minus 10
up to plus 50

From minus 30
up to plus 50

From minus 30
up to plus 50

From minus 40
up to plus 50

From minus 40
up to plus 50

From minus 40
up to plus 50

From minus 45
up to plus 50

From minus 45
up to plus 50

Overall dimensions, mm

100x90x
x65

90x75x40 After payment is confirmed, the page will be

To prevent unauthorized entry and identify sources of fire, fire alarm equipment is installed at the facilities, which is a whole range of special technical means. Thanks to the integration of this complex into the life support system of the facility, it becomes possible to form a multifunctional network that combines access systems, fire extinguishing systems and all kinds of engineering communications. This approach allows you to automate the process of operation and protection of the object.

Functionality

When combining a fire and security alarm system, a multifunctional complex is obtained, which simultaneously protects the object from fire and detects cases of unauthorized entry.

Implementation of integration is carried out at the level of management and centralized monitoring. All systems of the complex are used centrally, but they function and are managed separately. Simply put, they are autonomous in the overall system.

The fire alarm performs the following functions:

  1. Early fire detection.
  2. Sending an alarm to the relevant services.
  3. Informing people at the facility about what happened.
  4. Ensuring safe evacuation.

Security alarm features:

  1. Prevention of unauthorized entry.
  2. Organization of an access system (employees can only enter certain areas).
  3. Fixing the place and time of penetration.
  4. Determination of the method of entry.

Fire alarm equipment

The list of fire alarm devices used depends on the functionality of the system and the tasks that will be solved with its help.

Equipment used to provide fire alarms can be divided into 5 categories:

♦Equipment enabling centralized alarm control. This category includes a central computer with the necessary software. It is with its help that automation of alarm management is carried out. The security and fire panel can be used in those cases when installation of the fire alarm system of the simplified configuration is required.

♦To monitor certain areas of the object, touch sensors are used. Their job is to control certain parameters, in the event of a change in which an immediate reaction occurs. This category includes all kinds of detectors and sensors.

♦Executive equipment. Necessary to activate means of protection against fire or unauthorized entry. These devices are responsible for transmitting an alarm signal to the appropriate services and alerting people on the site of a potential hazard.

♦Cable equipment. It is used to connect all the above devices into a single complex. It is thanks to wired equipment that devices are switched, control impulses and alarms are transmitted.

Purpose of fire alarm devices

The fire system includes almost the same devices as the burglar alarm. The difference lies only in the actuators and sensors used. Below will be presented functionality each individual device.

Control panel

It is a small computer on which special software is installed. It controls the operation of each device in the system. The control panel allows you to configure the system and manage its operation. Also, its functions include remote monitoring of the health of all connected devices.

Control panel

With the help of this special device, data from alarm sensors is collected, followed by their analysis. These modules are installed separately or are part of the control panel. In systems with a simplified configuration, the control panel can be used as a control panel.

Sensors

This category of devices includes detectors and sensors of various types that control the necessary parameters in their area. The sensor will work only if the value of one of these parameters is out of range.

At the moment, a huge number of various sensors are presented on the market, which allow people to be warned of danger in a timely manner and, using the receiving and control module, send the corresponding signal to the control panel.

There are several types of sensors used in automatic fire alarms:

  1. Smoke detectors. Evaluate the smoke content of the room that occurs in the event of a fire.
  2. Thermal sensors. Capture changes in ambient temperature due to fire.
  3. Flame sensors. They give a signal when an open fire is detected.
  4. Gas sensors. They are triggered in the event of a change in the concentration of a certain gas in the composition of the air.
  5. Hand sensors. Used by facility personnel to turn on the fire extinguishing system when a fire is detected.
  6. multisensor sensors. Their peculiarity lies in the fact that they are able to analyze 4 signs of a fire at once.

All sensors used in fire alarm systems differ in their operating parameters (response speed, sensitivity, etc.). The sensor model should be chosen based on the tasks that need to be solved at the facility.

Types of sensors used in burglar alarm systems:

  1. Motion sensors. Determine the presence of movement in a certain area.
  2. Sensors for opening windows and doors. Allows you to detect cases of opening windows or doors.
  3. vibration sensors. They will give a signal if attempts are made to collapse the structural elements of the object, including walls.
  4. acoustic sensors. Activated when glass is broken.

Also, security systems can be equipped with devices that control the parameters of the object's environment. These include sensors for monitoring the leakage of water, gas, increasing humidity and temperature.

Installation of equipment

It is very important to correctly install the alarm. The degree of protection of the object depends on this. For achievement maximum level protection, it is necessary to develop a configuration and plan of the security and fire system before starting the installation of equipment.

At this stage, the calculation required amount detectors and determine their installation locations. The engineer needs to take into account the response speed of the sensors, their sensitivity and coverage area.

The sensors must be installed in such a way as to overlap each other's sensitive areas. This approach will eliminate the presence of "blind" zones. Simply put, absolutely the entire protected area should be under control. It is also very important to avoid affecting the sensors. external factors, which include thermal and ultraviolet radiation, as well as all kinds of mechanical loads.

Wired lines are used to interconnect fire and security alarm devices. Wireless devices are used to facilitate the installation process of the system. In this case, the signal to the central panel from the sensors will be transmitted not by wire, but by radio channels.

Upon completion of the installation, it is necessary to make sure that all sensors, control equipment and the central panel are operational.

Training video for alarm installation.

Conclusion

If you want your security and fire-fighting complex to work properly for many years and perform the functions assigned to it, then the installation of equipment should be entrusted to qualified specialists.

Today, many companies provide their services for the preparation and implementation of fire and security alarm projects. Some of them are additionally involved in the sale of the necessary equipment, as well as the maintenance and configuration of systems. Choose the right one necessary equipment and only a professional can perform its installation accurately. Fire and burglar alarms are the key to the safety of life and material values ​​of a person.

Classification of security and fire systems by types and types can be carried out according to a number of different parameters. The most obvious of these is purpose. There are three big groups here:

ALARM TYPES

As part of security systems, various types of sensors can also be used, which are wired and wireless, differ in the way intrusion detection, signal processing. The principles of building security systems may differ depending on their purpose: for a house and a summer residence, an apartment, objects of various organizational and legal forms.

An elementary option is an alarm system consisting of one motion sensor with a built-in GSM module. Despite the apparent simplicity, this type of protection is quite reliable and is well suited for protecting small country houses.

In general, the burglar alarm system uses several types of detectors, which are classified according to their purpose and principle of operation. To ensure reliable protection, sensors are used that control:

  • opening windows and doors;
  • breaking glazed surfaces;
  • breakage of walls, partitions and ceilings.

The listed equipment serves to protect the perimeter of the premises. In addition, there is a group of sensors that detect movement inside or on the outskirts of the object. The choice of specific types of detectors is made taking into account individual features object to be protected.