Dark mode
United Kingdom
Catalog   /   Home & Renovation   /   Security Systems   /   Security Systems & Smart Hubs

Comparison Ajax Hub 2 Plus vs Ajax Hub

Add to comparison
Ajax Hub 2 Plus
Ajax Hub
Ajax Hub 2 PlusAjax Hub
Compare prices 2Compare prices 1
TOP sellers
Main
The main difference from Ajax Hub 2 is the increased number of connected sensors to 200, support for Wi-Fi and 3G/4G (LTE).
Typehub (control unit)hub (control unit)
Connecting sensorswirelesswireless
Wireless zones5050
Backup power15 h15 h
Communication protocol with sensorsJewellerJeweller
Features
Security functions
push button alarm
 
Connection to control panel
Max. wireless sensors200100
Sensor communication range2000 m2000 m
Key fobs communication range1300 m800 m
Users (numbers to call)20050
Sensor characteristics
Tamper
General
Control
control fob
phone (GSM)
mobile app (Wi-Fi)
control fob
phone (GSM)
 
Operating temperature-10 °C ~ +40 °C0 °C ~ +50 °C
Max. humidity80 %
Control panel dimensions (HxWxD)163x163x36 mm163x163x36 mm
Added to E-Catalogseptember 2020april 2018

Security functions

Partial security. Possibility of work of a set in the mode of partial protection. In this mode, the alarm does not arm the entire protected space, but only a part of it — for example, individual rooms, or only sensors of a certain type (opening, movement). Specific features of the partial protection format may be different, they should be specified separately in each model. However, anyway, this function expands the capabilities of the signaling and may be useful in some specific situations. For example, in a residential building at night, you can turn on the perimeter sensors without using motion sensors — in this way, the alarm will only turn on when you try to enter the house and will not respond to people inside.

Alarm on pressing the button. Possibility to turn on the alarm signal manually by pressing a special button. This function will be indispensable in extreme situations in which automatic sensors are useless — for example, during an open robbery or attack. Specific alarm functions, of course, may be different: some models include a siren, others are able to send a signal to the dispatcher's console, etc.; these details should be specified separately.

Auto arming. Possibility of automatic arming of the alarm system. Most often, in this case, the inclusion of protection is implied by the schedule of hours and days of the week specified b...y the user; some models allow you to store several schedules in memory at once. This feature ensures that the protected zone "out of hours" will not be left without an alarm, even if the user forgets to turn it on manually. In addition, other methods of auto-arming may be provided — for example, when all key fobs are removed from the communication zone; the presence of such functions should be clarified separately.

Max. wireless sensors

The number of wireless sensors that can be simultaneously connected to the central unit (if this connection format is supported — see "Connecting sensors"). This number, by definition, is not less than the number of wireless zones (see the relevant paragraph).

Note that even the most modest modern systems support 6 – 8 wireless sensors, in the most advanced models this number can exceed 100. So you have to pay attention to this parameter mainly in cases where you need to organize a very extensive alarm system.

Key fobs communication range

The distance at which the connection of the control key fobs with the central alarm unit is maintained. This is a rather approximate, moreover, a very conditional indicator: the characteristics usually indicate the distance in perfect conditions — with line of sight, without interference and obstacles between the key fob and the control panel. In fact, the communication range may be less than stated, especially if the key fob has to work through walls. So it is worth choosing according to this indicator with a certain margin.

Also note that this parameter is indicated in the specifications for regular key fobs — complete or recommended by the manufacturer; when using "non-native" accessories, the communication range may be reduced.

Users (numbers to call)

The number of users or voice call numbers that can be stored in the device's memory.

The very possibility of a call, of course, is found only in models with support for remote control — via GSM or Wi-Fi (see "Control"). Systems with this function, when triggered, send a voice call to specified users via the mobile network to a phone or via the Internet to an application on a smartphone / tablet. Having accepted the call, the user receives voice information about the details of the alarm, and also, in most cases, gets access to additional functions: control via the voice menu, intercom, listening (see "Control panel capabilities"), etc. Many modern alarm systems allow set not one recipient of such calls, but a whole list: if there is no connection with one user, the system will try to call the second, if he does not answer, the third, etc. This will be useful in cases where several people are responsible for signaling.

Tamper

The presence of a tamper in the devices included in the set.

A tamper is a device that protects the body of the device from unauthorized opening and interference with work. The simplest tamper is a microswitch that is triggered when the case is opened and sends an alarm signal to the alarm. In addition to this, advanced equipment can be provided — for example, a switch that reacts to an attempt to tear the sensor away from the wall. The tamper is usually equipped with at least complete sensors, and in some cases — the control panel; these points should be clarified separately. Of course, such equipment does not provide absolute protection against interference, but it noticeably “makes life difficult” for an attacker who decides to spoil the alarm.

Control

Control methods provided in the set.

Keypad of the control panel. Keyboard control on the central unit. The simplest and most inexpensive method, which has long been used in alarms and is suitable for even the simplest low-cost-level kits. To access the controls, you need to be directly near the central unit — this can be both a disadvantage and an advantage, depending on the situation. So, it is not always convenient to approach the control panel every time; on the other hand, if remote control methods are not provided for in the design, the alarm system turns out to be as resistant to hacking as possible: it cannot be hacked remotely, and in order to physically get to the central unit, you usually need to overcome the protected perimeter.

Keychain. Controlled by a wireless remote control, similar to those used in car alarms. This method is quite convenient from a practical point of view: you can give alarm commands from a distance, and it is convenient to carry the key fob with you — for example, by attaching it to the same key ring that opens the protected room. The range of key fobs (see above) in modern alarms ranges from 40 – 50 m to 1.5 km or even more. The disadvantage of this option is the actual dependence on the key fob, which can be lost or stolen; and the batteries in the key fob also need to be monitored so as not to be left without a remote control at the most inopportune moment.

From the phone (GSM). Phone control via GSM networks. Note that you do not need a smartphone to use this function: control is carried out via SMS and/or voice menu and is available from any mobile phone, and in some models from a stationary phone with tone dialing. In addition to the ability to access the alarm from almost anywhere in the world where there is a mobile connection, this type of control has another important advantage: the design often provides for feedback, namely the ability to send voice calls and/or SMS messages to the user's phone (see Fig. "Users (numbers to call)", "Numbers to SMS"). However here it is worth considering that in order to use GSM control, it is necessary to buy and install a SIM card of a mobile operator in the central signaling unit; and for calls and SMS from the central office, the mobile operator will charge on a general basis.

From the Internet (Wi-Fi).... Management via the Internet — through an application on a computer or mobile gadget or through a special page in any browser; via Wi-Fi, in this case, the alarm is connected to the Internet. Like the mobile communication described above, this method makes it possible to control the alarm from anywhere in the world (if there is access to the World Wide Web), and receive various notifications from the alarm. Specific features of such management should be clarified separately. Among other things, this method is especially convenient for those who often travel abroad: mobile roaming on such trips is not cheap, it can be easier to find Internet access.

Operating temperature

The air temperature range in which the alarm components maintain normal operation.

This parameter is important first of all in cases where the alarm is planned to be used outdoors or in unheated rooms. Particular attention in such cases should be paid to whether the system can work at sub-zero temperatures. If we are talking about room temperatures (plus or minus), then you can’t really look at the claimed temperature range — almost any alarm is suitable for such conditions.

Max. humidity

The highest relative humidity at which the alarm is able to operate normally.

Excessive humidity leads to water settling on the system components, which can affect their performance and even lead to breakage. Therefore, modern electronics, including alarms, usually have limits on permissible humidity. However, you need to pay attention to this indicator mainly in cases where the kit is planned to be used outdoors or in rooms with initially high humidity, such as swimming pools or water parks — for such cases, it is desirable that the humidity limit be at least 90%. But in residential and office premises, humidity rarely exceeds 80%, and such conditions can endure almost all modern alarm systems.
Ajax Hub 2 Plus often compared
Ajax Hub often compared