Wireless zones
The number of security zones that can be covered by this kit when using wireless sensors.
In this case, a security zone means a separate protected area for which you can separately set the operating mode — for example, "Protection", "Protection disarmed" or a special tracking format. On many models, the number of zones corresponds to the maximum number of wireless sensors that can be connected to the device (see "Wireless Sensors"). However, there are exceptions: for example, a model for several dozen sensors can have 6-10 protection zones, in the expectation that one zone will be served simultaneously by several sensors.
Backup power
The time that the alarm is able to work on its own built-in power supply, in case of failure of an external power source.
Backup power allows the security system to remain operational during power outages (including during deliberate shutdown). The longer the time of operation on backup power, the more reliable the alarm, the lower the likelihood that due to power outages, the security will be completely disabled. At the same time, note that the specifications usually indicate an “perfect” battery life, with minimal power consumption; in fact, this period may be less — depending on the specific mode of operation, the frequency of operations and the quality of the batteries used (if replaceable batteries play the role of an autonomous source). So it is worth choosing according to this indicator with a certain margin — at least 15 – 20%.
Communication protocol with sensors
This parameter directly affects the compatibility of additionally connected devices, including complete sensors. Such devices must have the same protocol, otherwise normal operation will be impossible. As for specific options, modern alarm kits can use both common
Wi-Fi and
Bluetooth standards, as well as specialized protocols - most often
Z-Wave,
Zigbee or
Jeweller. Here is a more detailed description of each of these standards:
— Wi-Fi. A technology used mainly for building wireless computer networks, and more recently — also for direct communication between individual devices. The 2.4 GHz or 5 GHz range is most often used for communication. In the case of wireless sensors, one of the advantages of Wi-Fi is that it is a generally accepted standard; due to this, many sensors with this type of communication can work without special equipment — they are able to connect to regular wireless routers or even individual devices such as laptops and tablets (some models even allow sending notifications via the Internet, through the same router). However, such versatility has a downside: Wi-Fi has no additional optimization for working with wireless sensors. As a result, such communication is inferior to specialized protocols in terms of overall reliability, special functionality and energy efficiency. So
...this type of communication is typical mainly for devices designed for simple conditions of use — such as climate temperature/humidity sensors for smart home systems.
— Bluetooth. Another common wireless communication standard. It operates in the 2.4 GHz range; unlike Wi-Fi, it is used only for direct communication between devices. It is also poorly suited for professional use (in particular, the response delay can reach 2-3 seconds), and therefore is mainly found in household-specific sensors designed for communication to smartphones/tablets or smart home systems. The Bluetooth LE protocol, supported by Bluetooth modules of version 4.0 and higher, is most often used for communication: it is specially designed for miniature devices with small capacity of built-in batteries, allows data transmission with very low energy costs and at the same time provides a range of up to 100 m.
— Z-Wave. A wireless communication standard specifically designed for automation and control systems, including alarms and smart homes. Along with the one described below, Zigbee is one of the generally accepted protocols used in such systems. Such communication is simple and inexpensive to implement, while being quite functional and practical. It provides for the transmission of the simplest and shortest control commands, which helps save energy, and operates in the range of up to 1 GHz, due to which it is not susceptible to interference from Wi-Fi and Bluetooth devices. In addition, in Z-Wave-based networks, it is possible to use a MESH-type topology - when each individual device is also a full-fledged repeater of signals from other components of the system. Devices in networks of this type can choose any signal route, through any number of intermediate nodes, depending on the situation. For example, if direct communication between two nodes for some reason turned out to be impossible, the data will be sent "bypassing" through other network devices, and the system will automatically determine the most optimal route. This makes it easy to organize large networks with a large number of devices and a large coverage area.
— Zigbee. Another communication protocol created for automation systems (including smart home), alarms, industrial control, etc. In many ways, it is similar to the Z-Wave described above: it allows you to transmit control signals with low energy costs, as well as create MESH networks with signal direction through several nodes and automatic selection of the optimal route taking into account the current situation in the network. The main differences between Zigbee and Z-Wave are high protection of communication channels from hacking, as well as the ability to ensure high response speed. The downside of these advantages is the higher cost of implementing this protocol. Therefore, there are slightly fewer devices for this communication standard than for Z-Wave.
— Jeweller. A proprietary communication protocol developed by Ajax Systems. The company specializes in alarms, and this protocol was originally created specifically for such systems — this is what determines its advanced characteristics. In particular, Jeweller provides a communication range of up to 2 km with very low energy costs, has high-class protection against hacking, allows you to change frequencies when trying to jam the operating range and supports the simultaneous communication of up to 150 devices per gateway. However, the main disadvantage of this protocol is that its use is limited to devices from one manufacturer. So it makes sense to purchase models with Jeweller support if the house uses (or plans to use) an alarm system from Ajax Systems.
— Own frequency. In the context of alarms and HUBs, this parameter refers to the own frequency at which wireless data exchange between the protection system links is ensured. Its specific value is determined by the device manufacturer, but the most common options are 433–434 MHz and 868 MHz. Using the own frequency improves the reliability and safety of the protection system, since it reduces the likelihood of interference from other wireless devices operating at close frequencies. When choosing based on this parameter, it is important to consider equipment compatibility, standards, and licensing requirements (in order to avoid potential violations of the law).Control panel features
Functions and capabilities of the central signaling unit.
—
Display. Own display, which the control panel is equipped with, can have a different size and functionality — from the simplest indicator matrix with several characters to a full-fledged colour screen. Anyway, this function makes working with the alarm more convenient and visual. The display can show various data about the system operation: the current mode of operation, the status of security zones and sensors, the arming and disarming log, battery charge, etc. At the same time, it should be noted that the absence of a display does not mean that it is impossible to receive such information — some models are able to display data on an external display, for example, on a smartphone or tablet via the Internet (see "Control").
—
Keyboard. Own keyboard that allows you to control the functions of the central unit directly from its body. For more information about this feature, see "Control"; here we note that the keyboard in most cases is combined with the display described above.
—
SOS button. The presence of its own SOS button (panic button) on the body of the central unit. This button allows you to quickly raise an alarm in an emergency; it is usually made large and clearly visible, and the alarm can be triggered in a way that reduces the likelihood of false alarms — for example, by l
...ong or repeated pressing.
— Intercom. The possibility of using the system for two-way communication — between a remote subscriber and a person located near the central unit. This function is found only in models with the possibility of remote control via GSM (see "Control"). It allows you to use the control panel as an impromptu landline phone — to communicate with phones stored in memory. In some cases, this possibility is useful: for example, if there is a person on duty at the protected facility, when the alarm is triggered, he can report the details of the incident via the intercom. Often this function is combined with listening (see below); in fact, intercom differs from listening only in that the remote user can not only hear what is happening in the room, but also fully speak with the people who are there.
— Listening. The ability to use the system to listen to the room in which the central unit is installed. This function is found only in models with the possibility of remote control — via GSM or Wi-Fi (see "Control"). At the same time, in some models, listening is activated only when the system is triggered, in others it can be turned on at the request of the user by calling the control panel through the telephone network or through an Internet application.
— Voice guidance. The presence in the system of the function of voice accompaniment — "sounding" by voice messages of various actions and events. This function is found only in models with the possibility of remote control via GSM or Wi-Fi (see "Management") and mainly concerns communication with a remote user. When the system is triggered, a call is received to the specified phone number, and when the user answers it, the system announces the data on the trigger (sensor type, time, security zone, etc.). This makes it possible to obtain detailed information on the incident, and not just an alarm; in addition, in many models, after informing, a voice menu is activated, which allows you to control the security from your phone.
— Relay output. Availability of a relay output in the central unit — an output whose contacts are connected to the built-in relay and can be closed and opened on command from the control panel. The ways of using such an output can be different: in some models, the contacts are triggered when the guard is turned on / off, in others they are closed on an alarm signal, some systems allow you to control the line output from the phone or via the Internet; these details should be clarified separately. However, anyway, this function allows you to connect various additional equipment to the device. For example, in a control room where the relay is triggered by an alarm, an additional siren or spotlight can be connected to the relay output.
— Exit to the siren. Availability of a separate output in the control panel for connecting an additional external siren. In this case, both a hardware connector for a wired siren and the ability to connect a wireless siren may be implied, depending on the model (these details should be specified separately). However, anyway, if you are going to use a "non-native" siren, you should choose a model with this feature.Max. wireless sensors
The number of wireless sensors that can be simultaneously connected to the central unit (if this connection format is supported — see "Connecting sensors"). This number, by definition, is not less than the number of wireless zones (see the relevant paragraph).
Note that even the most modest modern systems support 6 – 8 wireless sensors, in the most advanced models this number can exceed 100. So you have to pay attention to this parameter mainly in cases where you need to organize a very extensive alarm system.
Sensor communication range
Communication range with wireless sensors (see "Connecting sensors") provided by the system. Note that this parameter is quite approximate, it is given for perfect conditions — communication within the line of sight without sources of interference; if there are obstacles in the signal path (for example, walls), the actual range may be noticeably lower than the claimed one. In addition, information is provided for "native" sensors — supplied with the system or recommended for it by the manufacturer; when using "non-native" sensors, the communication range may also decrease. Nevertheless, according to this indicator, it is quite possible to evaluate the "range" of various kits and compare them with each other. In addition, we note that even in the most modest systems, the communication range is about 100 m, which is quite enough for locations like an office or a medium-sized private house. In the most "long-range" models, this figure can
exceed 1.5 km.
Key fobs communication range
The distance at which the connection of the control key fobs with the central alarm unit is maintained. This is a rather approximate, moreover, a very conditional indicator: the characteristics usually indicate the distance in perfect conditions — with line of sight, without interference and obstacles between the key fob and the control panel. In fact, the communication range may be less than stated, especially if the key fob has to work through walls. So it is worth choosing according to this indicator with a certain margin.
Also note that this parameter is indicated in the specifications for regular key fobs — complete or recommended by the manufacturer; when using "non-native" accessories, the communication range may be reduced.
Users (numbers to call)
The number of users or voice call numbers that can be stored in the device's memory.
The very possibility of a call, of course, is found only in models with support for remote control — via GSM or Wi-Fi (see "Control"). Systems with this function, when triggered, send a voice call to specified users via the mobile network to a phone or via the Internet to an application on a smartphone / tablet. Having accepted the call, the user receives voice information about the details of the alarm, and also, in most cases, gets access to additional functions: control via the voice menu, intercom, listening (see "Control panel capabilities"), etc. Many modern alarm systems allow set not one recipient of such calls, but a whole list: if there is no connection with one user, the system will try to call the second, if he does not answer, the third, etc. This will be useful in cases where several people are responsible for signaling.
Numbers for SMS
The number of numbers for sending SMS, which can be stored in the control panel's memory.
Many models that support managed control via GSM (see "Management") are able to send SMS notifications about various events to specified numbers. In some situations, such notifications are more preferable than voice calls (see "Users (numbers to call)"). One of the conveniences is that the SMS message is automatically stored in the phone, unlike voice calls. In addition, if both functions are available, you can “share responsibility”: set up voice calls for emergencies, and SMS messages for various “on-duty notifications” that are not a cause for alarm (for example, the alarm was disarmed, external power was lost from switching to backup, the sensor warns of low battery, etc.). Many alarm models allow you to store several numbers in memory and send SMS messages to them almost simultaneously.