United Kingdom
Catalog   /   Home & Renovation   /   Smart Home & Security   /   Alarms & Hubs

Comparison Dinsafer Nova 01B vs Ajax StarterKit Plus

Add to comparison
Dinsafer Nova 01B
Ajax StarterKit Plus
Dinsafer Nova 01BAjax StarterKit Plus
Outdated ProductOutdated Product
TOP sellers
Typealarm systemalarm system
Connecting sensorswirelesswireless
Wireless zones150
Backup power8 h16 h
Communication protocol with sensorsfrequency 433–434 MHzJeweller
Features
Security functions
partial protection
 
Control panel features
keyboard /remote/
SOS button
 
 
Connection to control panel
Max. wireless sensors150
Sensor communication range200 m
2000 m /in open space/
Max. key fobs (RFID)99
Key fobs communication range
800 m /in open space/
Users (numbers to call)99
Complete with central
Motion sensors11
Opening sensors11
Control fobs21
Siren
 /1 key fob and 1 RFID tag/
Sensor characteristics
Motion sensorDinsafer DWCA4Ajax MotionProtect
Opening sensorDinsafer DPMH1Ajax DoorProtect
Horizontal angle of coverage110 °88.5 °
Vertical coverage angle80 °
Motion sensor range9 m12 m
Opening sensor threshold20 mm
Tamper
animal immunity
General
Control
control panel keypad
control fob
phone (GSM)
mobile app (Wi-Fi)
 
control fob
phone (GSM) /2G: 850/900/1800/1900 МГц, 3G/WCDMA: 900/2100 МГц/
mobile app (Wi-Fi)
Siren volume110 dB
Operating temperature0 °C ~ +40 °C0 °C ~ +50 °C
Max. humidity96 %80 %
Control panel dimensions (HxWxD)145x145x30 mm163x163x36 mm
Motion sensor dimensions (HxWxD)100x60x48 mm110x65x50 mm
Opening sensor dimensions (HxWxD)80x15x13 mm90х20х20 mm
Key fob dimensions (HxWxD)58x33x11 mm65x37x10 mm
Added to E-Catalogjanuary 2021january 2019

Wireless zones

The number of security zones that can be covered by this kit when using wireless sensors.

In this case, a security zone means a separate protected area for which you can separately set the operating mode — for example, "Protection", "Protection disarmed" or a special tracking format. On many models, the number of zones corresponds to the maximum number of wireless sensors that can be connected to the device (see "Wireless Sensors"). However, there are exceptions: for example, a model for several dozen sensors can have 6-10 protection zones, in the expectation that one zone will be served simultaneously by several sensors.

Backup power

The time that the alarm is able to work on its own built-in power supply, in case of failure of an external power source.

Backup power allows the security system to remain operational during power outages (including during deliberate shutdown). The longer the time of operation on backup power, the more reliable the alarm, the lower the likelihood that due to power outages, the security will be completely disabled. At the same time, note that the specifications usually indicate an “perfect” battery life, with minimal power consumption; in fact, this period may be less — depending on the specific mode of operation, the frequency of operations and the quality of the batteries used (if replaceable batteries play the role of an autonomous source). So it is worth choosing according to this indicator with a certain margin — at least 15 – 20%.

Communication protocol with sensors

This parameter directly affects the compatibility of additionally connected devices, including supplied sensors. Such devices must have the same protocol, otherwise normal operation will be impossible. As for specific options, modern alarm kits can use both common standards Wi-Fi and Bluetooth, as well as specialized protocols - most often Z-Wave, Zigbee or Jeweler. Here is a more detailed description of each of these standards:

- Wi-Fi. A technology used primarily for building wireless computer networks, and more recently also for direct communication between individual devices. For communications, the 2.4 GHz or 5 GHz band is most often used. In the case of wireless sensors, one of the advantages of Wi-Fi is that it is a widely accepted standard; thanks to this, many sensors with this type of communication can work without special equipment - they are able to connect to ordinary wireless routers or even individual devices such as laptops and tablets (some models even allow sending notifications via the Internet, through the same router). However, this versatility also has a downside: Wi-Fi does not have additional optimization for working with wireless sensors. As a result, such communication is inferior to specialized protocols in terms of overall reliability, special functionality and energy e...fficiency. So this type of communication is typical mainly for devices designed for simple conditions of use - such as climate temperature/humidity sensors for smart home systems.

— Bluetooth. Another commonly used wireless communication standard. Operates in the 2.4 GHz band; Unlike Wi-Fi, it is used only for direct communication between devices. It is also poorly suited for professional use (in particular, the response delay can reach 2–3 seconds), and therefore is found mainly in household sensors designed for communication to smartphones/tablets or smart home systems. The most commonly used protocol for communication is Bluetooth LE, supported by Bluetooth modules version 4.0 and higher: it is specially designed for miniature devices with small built-in batteries, allows data transfer with very low energy costs and at the same time provides a range of up to 100 m.

- Z-Wave. A wireless communication standard specifically created for automation and control systems, including alarms and smart home. Along with what is described below, Zigbee is one of the generally accepted protocols used in such systems. Such a communication is simple and inexpensive to implement, while being quite functional and practical. It provides for the transmission of the simplest and shortest control commands, which helps save energy, and operates in the range up to 1 GHz, making it not susceptible to interference from Wi-Fi and Bluetooth devices. In addition, in networks based on Z-Wave, it is possible to use a MESH type topology - when each individual device is also a full-fledged repeater of signals from other system components. Devices in networks of this type can choose any route for the signal, through any number of intermediate nodes, depending on the situation. For example, if direct communication between two nodes for some reason turns out to be impossible, the data will be sent “bypass”, through other network devices, and the system will automatically determine the most optimal route. This makes it easy to organize large networks with a large number of devices and a large coverage area.

- Zigbee. Another communication protocol created for automation systems (including smart home), alarms, industrial control, etc. In many ways it is similar to the Z-Wave described above: it allows you to transmit control signals with low energy costs, as well as create networks MESH with signal routing through several nodes and automatic selection of the optimal route taking into account the current situation in the network. The main differences between Zigbee and Z-Wave are the high protection of communication channels from hacking, as well as the ability to provide high response speed. The downside of these advantages is the higher cost of implementing this protocol. Therefore, slightly fewer devices are produced for this communication standard than for Z-Wave.

— Jeweler. A proprietary communication protocol developed by Ajax Systems. The company's specialty is signaling, and this protocol was originally created specifically for such systems - this is the reason for its advanced characteristics. In particular, Jeweler provides a communication range of up to 2 km at very low energy costs, has high-quality hacking protection, allows you to change frequencies when trying to jam the operating range, and supports simultaneous communication of up to 150 devices per gateway. However, the main disadvantage of this protocol is that its use is limited to devices from a single manufacturer. So it makes sense to purchase models with Jeweler support if your home uses (or plans to use) an alarm system from Ajax Systems.

— Natural frequency. In the context of alarms and HUBs, this parameter refers to the natural frequency at which wireless data exchange is ensured between the links of the protection system. Its specific value is determined by the device manufacturer, but the most common options are 433 – 434 MHz and 868 MHz. Using a natural frequency improves the reliability and protection of the protection system because it reduces the likelihood of interference from other wireless devices operating at similar frequencies. When choosing based on this parameter, it is important to consider equipment compatibility, standards and licensing requirements (in order to avoid potential violations of the law).

Security functions

Partial security. Possibility of work of a set in the mode of partial protection. In this mode, the alarm does not arm the entire protected space, but only a part of it — for example, individual rooms, or only sensors of a certain type (opening, movement). Specific features of the partial protection format may be different, they should be specified separately in each model. However, anyway, this function expands the capabilities of the signaling and may be useful in some specific situations. For example, in a residential building at night, you can turn on the perimeter sensors without using motion sensors — in this way, the alarm will only turn on when you try to enter the house and will not respond to people inside.

Alarm on pressing the button. Possibility to turn on the alarm signal manually by pressing a special button. This function will be indispensable in extreme situations in which automatic sensors are useless — for example, during an open robbery or attack. Specific alarm functions, of course, may be different: some models include a siren, others are able to send a signal to the dispatcher's console, etc.; these details should be specified separately.

Auto arming. Possibility of automatic arming of the alarm system. Most often, in this case, the inclusion of protection is implied by the schedule of hours and days of the week specified b...y the user; some models allow you to store several schedules in memory at once. This feature ensures that the protected zone "out of hours" will not be left without an alarm, even if the user forgets to turn it on manually. In addition, other methods of auto-arming may be provided — for example, when all key fobs are removed from the communication zone; the presence of such functions should be clarified separately.

Control panel features

Functions and capabilities of the central signaling unit.

Display. Own display, which the control panel is equipped with, can have a different size and functionality — from the simplest indicator matrix with several characters to a full-fledged colour screen. Anyway, this function makes working with the alarm more convenient and visual. The display can show various data about the system operation: the current mode of operation, the status of security zones and sensors, the arming and disarming log, battery charge, etc. At the same time, it should be noted that the absence of a display does not mean that it is impossible to receive such information — some models are able to display data on an external display, for example, on a smartphone or tablet via the Internet (see "Control").

Keyboard. Own keyboard that allows you to control the functions of the central unit directly from its body. For more information about this feature, see "Control"; here we note that the keyboard in most cases is combined with the display described above.

SOS button. The presence of its own SOS button (panic button) on the body of the central unit. This button allows you to quickly raise an alarm in an emergency; it is usually made large and clearly visible, and the alarm can be triggered in a way that reduces the likelihood of false alarms — for example, by l...ong or repeated pressing.

Intercom. The possibility of using the system for two-way communication — between a remote subscriber and a person located near the central unit. This function is found only in models with the possibility of remote control via GSM (see "Control"). It allows you to use the control panel as an impromptu landline phone — to communicate with phones stored in memory. In some cases, this possibility is useful: for example, if there is a person on duty at the protected facility, when the alarm is triggered, he can report the details of the incident via the intercom. Often this function is combined with listening (see below); in fact, intercom differs from listening only in that the remote user can not only hear what is happening in the room, but also fully speak with the people who are there.

Listening. The ability to use the system to listen to the room in which the central unit is installed. This function is found only in models with the possibility of remote control — via GSM or Wi-Fi (see "Control"). At the same time, in some models, listening is activated only when the system is triggered, in others it can be turned on at the request of the user by calling the control panel through the telephone network or through an Internet application.

— Voice guidance. The presence in the system of the function of voice accompaniment — "sounding" by voice messages of various actions and events. This function is found only in models with the possibility of remote control via GSM or Wi-Fi (see "Management") and mainly concerns communication with a remote user. When the system is triggered, a call is received to the specified phone number, and when the user answers it, the system announces the data on the trigger (sensor type, time, security zone, etc.). This makes it possible to obtain detailed information on the incident, and not just an alarm; in addition, in many models, after informing, a voice menu is activated, which allows you to control the security from your phone.

— Relay output. Availability of a relay output in the central unit — an output whose contacts are connected to the built-in relay and can be closed and opened on command from the control panel. The ways of using such an output can be different: in some models, the contacts are triggered when the guard is turned on / off, in others they are closed on an alarm signal, some systems allow you to control the line output from the phone or via the Internet; these details should be clarified separately. However, anyway, this function allows you to connect various additional equipment to the device. For example, in a control room where the relay is triggered by an alarm, an additional siren or spotlight can be connected to the relay output.

Exit to the siren. Availability of a separate output in the control panel for connecting an additional external siren. In this case, both a hardware connector for a wired siren and the ability to connect a wireless siren may be implied, depending on the model (these details should be specified separately). However, anyway, if you are going to use a "non-native" siren, you should choose a model with this feature.

Max. wireless sensors

The number of wireless sensors that can be simultaneously connected to the central unit (if this connection format is supported — see "Connecting sensors"). This number, by definition, is not less than the number of wireless zones (see the relevant paragraph).

Note that even the most modest modern systems support 6 – 8 wireless sensors, in the most advanced models this number can exceed 100. So you have to pay attention to this parameter mainly in cases where you need to organize a very extensive alarm system.

Sensor communication range

Communication range with wireless sensors (see "Connecting sensors") provided by the system. Note that this parameter is quite approximate, it is given for perfect conditions — communication within the line of sight without sources of interference; if there are obstacles in the signal path (for example, walls), the actual range may be noticeably lower than the claimed one. In addition, information is provided for "native" sensors — supplied with the system or recommended for it by the manufacturer; when using "non-native" sensors, the communication range may also decrease. Nevertheless, according to this indicator, it is quite possible to evaluate the "range" of various kits and compare them with each other. In addition, we note that even in the most modest systems, the communication range is about 100 m, which is quite enough for locations like an office or a medium-sized private house. In the most "long-range" models, this figure can exceed 1.5 km.

Max. key fobs (RFID)

The number of key fobs that can be entered into the system memory at the same time.

Key fob, in fact, plays the role of a contactless key. At the same time, such keys give access to the protected area without triggering an alarm, but do not allow you to control the alarm settings. This allows you to “share responsibility”: for example, in an office, RFID tags can be distributed to ordinary employees, and control key fobs can only be issued to security guards or persons responsible for signaling.

Note that modern alarms with support for RFID tags are usually capable of not only triggering on a key fob stored in memory, but also fixing whose key fob the system was turned off.

Key fobs communication range

The distance at which the connection of the control key fobs with the central alarm unit is maintained. This is a rather approximate, moreover, a very conditional indicator: the characteristics usually indicate the distance in perfect conditions — with line of sight, without interference and obstacles between the key fob and the control panel. In fact, the communication range may be less than stated, especially if the key fob has to work through walls. So it is worth choosing according to this indicator with a certain margin.

Also note that this parameter is indicated in the specifications for regular key fobs — complete or recommended by the manufacturer; when using "non-native" accessories, the communication range may be reduced.
Ajax StarterKit Plus often compared