HSS_info 30052016
-
Upload
ybbvvprasada-rao -
Category
Documents
-
view
214 -
download
0
Transcript of HSS_info 30052016
-
8/16/2019 HSS_info 30052016
1/9
http://www.safewise.com/home-security-faq/how-do-security-systems-work
What is a security system and how does it work?
All home security systems work on the same basic principle of securing entry
points, like doors and windows, as well as interior space containing valuables
like art, computers, guns, and coin collections. Regardless of the sie of your
home, or the number of doors and windows or interior rooms a homeowner
decides to protect, the only real di!erence is in the number of security
components deployed throughout the home and monitored by the control
panel.
What is a security system?
"he most basic de#nition of any security system is found in its name. $t is
literally a means or method by which something is secured through a system
of interworking components and devices.
$n this instance, we%re talking about home security systems, which are
networks of integrated electronic devices working together with a central
control panel to protect against burglars and other potential home intruders.
A typical home security system includes:
• A control panel, which is the primary controller of a home%s security system• &oor and window sensors• 'otion sensors, both interior and e(terior• )ired or wireless security cameras• A high-decibel siren or alarm• A yard sign and window stickers
How does a security system work?
*ome security systems work on the simple concept of securing entry pointsinto a home with sensors that communicate with a control panel or command
center installed in a convenient location somewhere in the home.
"he sensors are typically placed in doors that lead to and from a house as
well as easily accessible windows, particularly any that open, especially
http://www.safewise.com/home-security-faq/how-do-security-systems-workhttp://www.safewise.com/home-security-faq/how-do-security-systems-work
-
8/16/2019 HSS_info 30052016
2/9
those at ground level. +pen spaces inside of homes can be secured with
motion sensors.
Control Panel: "he control panel is the computer that arms and disarms the
security systems, communicates with each installed component, sounds the
alarm when a security one is breached, and communicates with an alarm
monitoring company.
"hey typically feature a touchpad for easy programming and interaction, is
where pass codes are entered to arm and disarm the system, can work on
voice commands, and can be programmed to work with wireless remote
controls called key fobs.
Door and Window Sensors: &oor and window sensors are comprised of
two parts installed adacent to each other. +ne part of the device is installed
on the door or window and the other on the door frame or window sill. )hen
a door or window is closed, the two parts of the sensor are oined together,
creating a security circuit.
)hen the security system is armed at the control panel, these sensors
communicate with it by reporting that the point of entry is secure. hould a
monitored door or window suddenly be opened, the security circuit is broken
and the control panel interprets this as a breach of a secured one. A high-
decibel alarm is sounded and in most instances the alarm monitoring
company is automatically noti#ed.
Motion Sensors: "hese security components, when armed, protect a given
space by creating an invisible one that cannot be breached without
sounding an alarm. "hese are typically used to protect rooms containing
valuables, as well as areas less frequented in larger homes.
Surveillance Cameras: Available in both wired and wireless con#gurations,
surveillance cameras can be used in several di!erent ways as part of an
overall security system.
"ypical uses include monitoring:
• *ard to see or distant areas of your property• Remote buildings like garages, barns, and workshops• ntry points, both e(terior and interior, like garage doors and front doors
-
8/16/2019 HSS_info 30052016
3/9
urveillance cameras can be accessed remotely on computers, smartphones,
and tablets. "hey are often used in this method when homeowners are out of
town, to watch for deliveries and other service personnel like caregivers and
landscapers, and to monitor the arrival of children after school. "hey can also
be used to record any security breaches, which could result in having footage
of a home invasion, including a good look at the burglars and perhaps even
the vehicle they drove.
High-decibel Alarm: oud enough for neighbors to hear, home security
alarms serve a few di!erent purposes. 0irst, they alert the people inside the
house that a problem occurred. "hey%re also shrill enough to send a burglar
running while also notifying nearby neighbors to the situation.
Yard Sign and Window Stickers: +n the surface, these items might seem
like nothing more than marketing tools for alarm companies, but they playimportant roles in home security. )hen you place a security company%s
sticker in a front window and plant their sign in your front yard, you are
telling burglars you home is professionally protected and not a wise choice
for an attempted burglary. "hey are e!ective at conveying this message and
should be used as recommended by the security company.
-
8/16/2019 HSS_info 30052016
4/9
What Happens when an intrusion occurs?ecurity systems are designed to perform certain tasks when a secured one
is breached. )hat your security systems does in the event of an intrusion
depends on the type of system you%re using.
Proessionall! Monitored Securit! S!stems: $f your security system is
professionally monitored by an alarm company, they are alerted when a
security problem arises in your home. Along with the high-decibel alarm that
sounds, the monitoring company is alerted. A trained security e(pert might
attempt to communicate with the homeowner via the control panel if it%s
setup for 1-)ay 2oice communication, or will call the emergency contact
number listed on the account.
"hese types of security systems communicate with the monitoring company
in one of several ways, including:
-
8/16/2019 HSS_info 30052016
5/9
• +ver e(isting home phone lines, which continue to work during poweroutages when battery backup is in use.
• )irelessly through cellular radio frequencies like cell phones use, which alsocontinue to work during power outages when battery backup is in use.
• 2oice over $nternet 3rotocol 42o$35, which typically doesn%t work in a poweroutage.
• 2ia the $nternet, which also typically does not work in a power outage.$n the event of an actual emergency, the monitoring company will notify the
appropriate emergency response personnel in your area. "his includes police,
#re#ghters, and paramedics. "he monitoring company will also try to
maintain communication with you until emergency response teams arrive at
your home.
'onitored systems typically allow for the homeowners 4or designees5 to be
noti#ed by te(t message and email when a security breach occurs.
"on-monitored Securit! S!stems: "here are plenty of &$6 security
systems available today that don%t include professionally monitored services.
$n the event of a home intrusion when this type of security system is
installed, a high-decibel alarm sounds 4provided one is installed5. 7ontacting
police, #re, or other emergency response personnel must be initiated by the
homeowner by dialing the appropriate number, typically 899.
"hese types of systems may or may not allow for te(t messages or email
noti#cations to be sent to the homeowner in the event of a security breach,
depending on the provider and the system you opted for.
What are the advantages of having a home security system?
Numerous studies show homes without security systems, when compared to those
with professionally monitored systems, are up to three times more likely to be
burglarized because burglars are opportunistic by nature and are on the hunt for
easy targets.
*omes without security systems are high on their list.
)hen you have a home security system professionally monitored, and
advertise this by displaying window stickers and yard signs, you%re letting
burglars know the likelihood they%ll fail and be caught are very high.
Another advantage is the ability to remotely manage your house. )ith this,
you can typically arm and disarm your security system from anywhere in the
world via a web-enabled device, monitor who arrives and leaves your home,
-
8/16/2019 HSS_info 30052016
6/9
as well as use a panic button to elicit an instant response from your alarm
monitoring company.
0inally, most home insurance companies provide great discounts-up to 1
percent-when you have a home security system in your home.
$f you%d like to know more about getting a security system in your home,
please contact any of our specially trained home security e(perts at 9-;;;-
-
8/16/2019 HSS_info 30052016
7/9
-
8/16/2019 HSS_info 30052016
8/9
Description in detail:
It mainly consist of following blocks+
. Infrared &ransmitter+ We are going to implement the theft detection module using transmitter and receiver. We
are going to use Infra'Red transmitters because infrared beams are not visible to human eyes. &ransmitter used is IR
"-*s
. Infrared Receiver+ We are going to use an Infrared receiver. It is an active low device which means it gives low
output when it receives the Infrared rays.
(. "#$ $as sensor+ We are going to use an "#$ $as sensor to detect the gas leakage.
/. 0icrocontroller+ &his is the 1#2 3central processing unit4 of our project. We are going to use a microcontroller of
567 family. &he various functions of microcontroller are like+
I. Reading the digital input from infrared receiver II. Reading the "#$ $as sensor output to turn on the buer. III.
!ensing the password using keypad and to check whether it is a correct password or a wrong password and rotate the
-
8/16/2019 HSS_info 30052016
9/9
stepper motor if the password entered is a correct password. I8. !ending the data to "1* and to the computer using
serial port.
7. "1*+ We are going to use 9: alphanumeric "i)uid 1rystal *isplay 3"1*4 which means it can display
alphabets along with numbers on lines each containing 9 characters.
9. #1 Interfacing+ We are going to use ma; ( I1 for pc interfacing, the values of number of persons inside the
room and the status of entered password 31orrecteypad+ 2ser will enter the password using the keypad. 8arious keys of keypad are as following, I. 6 to ? II.
-nter III. -scape
5. --#R@0+ -;ternal -#R@0 memory is used to store the password. I1 bus protocol is used for communication
of --#R@0 with 567.
Applications and Advantages:
. 1an be used in house for security purpose.
. !ame project can be implemented in industry or educational institutes.
Future Development:
. We can send this data to a remote location using mobile or internet
. We can implement other related modules like fire sensor, wind sensor.
(. We can add the module of voice alarm system to indicate theft entry or gas leakage.
Video of the project: Home Security System