United Kingdom
Catalog   /   Home & Renovation   /   Smart Home & Security   /   Alarms & Hubs

Comparison Atis Kit GSM120 vs Atis Kit GSM100

Add to comparison
Atis Kit GSM120
Atis Kit GSM100
Atis Kit GSM120Atis Kit GSM100
Outdated ProductOutdated Product
TOP sellers
Main
Uninterrupted operation is ensured by the built-in battery.
Uninterrupted operation is ensured by a built-in battery (350mAh).
Typealarm systemalarm system
Connecting sensorswireless and wiredwireless and wired
Wireless zones9999
Wired zones22
Communication protocol with sensorsfrequency 433–434 MHz
Features
Security functions
partial protection
push button alarm
auto arming
partial protection
push button alarm
auto arming
Control panel features
display
keyboard
SOS button
siren output
display
keyboard
 
siren output
Connection to control panel
Max. wireless sensors15099
Max. key fobs1508
Users (numbers to call)66
Numbers for SMS33
Complete with central
Motion sensors11
Opening sensors11
Control fobs22
Siren
Sensor characteristics
Motion sensorATIS-803WATIS-804DW
Opening sensorATIS-19BWATIS-19DW
Horizontal angle of coverage110 °110 °
Motion sensor range8 m8 m
Opening sensor threshold10 mm10 mm
General
Control
control panel keypad
control fob
phone (GSM)
control panel keypad
control fob
phone (GSM)
Siren volume110 dB120 dB
Motion sensor dimensions (HxWxD)52x29x27 mm110x55x35 mm
Opening sensor dimensions (HxWxD)70x36x15 mm65x24x15 mm
Key fob dimensions (HxWxD)55x30x13 mm
Added to E-Catalogmay 2018may 2018

Communication protocol with sensors

This parameter directly affects the compatibility of additionally connected devices, including supplied sensors. Such devices must have the same protocol, otherwise normal operation will be impossible. As for specific options, modern alarm kits can use both common standards Wi-Fi and Bluetooth, as well as specialized protocols - most often Z-Wave, Zigbee or Jeweler. Here is a more detailed description of each of these standards:

- Wi-Fi. A technology used primarily for building wireless computer networks, and more recently also for direct communication between individual devices. For communications, the 2.4 GHz or 5 GHz band is most often used. In the case of wireless sensors, one of the advantages of Wi-Fi is that it is a widely accepted standard; thanks to this, many sensors with this type of communication can work without special equipment - they are able to connect to ordinary wireless routers or even individual devices such as laptops and tablets (some models even allow sending notifications via the Internet, through the same router). However, this versatility also has a downside: Wi-Fi does not have additional optimization for working with wireless sensors. As a result, such communication is inferior to specialized protocols in terms of overall reliability, special functionality and energy e...fficiency. So this type of communication is typical mainly for devices designed for simple conditions of use - such as climate temperature/humidity sensors for smart home systems.

— Bluetooth. Another commonly used wireless communication standard. Operates in the 2.4 GHz band; Unlike Wi-Fi, it is used only for direct communication between devices. It is also poorly suited for professional use (in particular, the response delay can reach 2–3 seconds), and therefore is found mainly in household sensors designed for communication to smartphones/tablets or smart home systems. The most commonly used protocol for communication is Bluetooth LE, supported by Bluetooth modules version 4.0 and higher: it is specially designed for miniature devices with small built-in batteries, allows data transfer with very low energy costs and at the same time provides a range of up to 100 m.

- Z-Wave. A wireless communication standard specifically created for automation and control systems, including alarms and smart home. Along with what is described below, Zigbee is one of the generally accepted protocols used in such systems. Such a communication is simple and inexpensive to implement, while being quite functional and practical. It provides for the transmission of the simplest and shortest control commands, which helps save energy, and operates in the range up to 1 GHz, making it not susceptible to interference from Wi-Fi and Bluetooth devices. In addition, in networks based on Z-Wave, it is possible to use a MESH type topology - when each individual device is also a full-fledged repeater of signals from other system components. Devices in networks of this type can choose any route for the signal, through any number of intermediate nodes, depending on the situation. For example, if direct communication between two nodes for some reason turns out to be impossible, the data will be sent “bypass”, through other network devices, and the system will automatically determine the most optimal route. This makes it easy to organize large networks with a large number of devices and a large coverage area.

- Zigbee. Another communication protocol created for automation systems (including smart home), alarms, industrial control, etc. In many ways it is similar to the Z-Wave described above: it allows you to transmit control signals with low energy costs, as well as create networks MESH with signal routing through several nodes and automatic selection of the optimal route taking into account the current situation in the network. The main differences between Zigbee and Z-Wave are the high protection of communication channels from hacking, as well as the ability to provide high response speed. The downside of these advantages is the higher cost of implementing this protocol. Therefore, slightly fewer devices are produced for this communication standard than for Z-Wave.

— Jeweler. A proprietary communication protocol developed by Ajax Systems. The company's specialty is signaling, and this protocol was originally created specifically for such systems - this is the reason for its advanced characteristics. In particular, Jeweler provides a communication range of up to 2 km at very low energy costs, has high-quality hacking protection, allows you to change frequencies when trying to jam the operating range, and supports simultaneous communication of up to 150 devices per gateway. However, the main disadvantage of this protocol is that its use is limited to devices from a single manufacturer. So it makes sense to purchase models with Jeweler support if your home uses (or plans to use) an alarm system from Ajax Systems.

— Natural frequency. In the context of alarms and HUBs, this parameter refers to the natural frequency at which wireless data exchange is ensured between the links of the protection system. Its specific value is determined by the device manufacturer, but the most common options are 433 – 434 MHz and 868 MHz. Using a natural frequency improves the reliability and protection of the protection system because it reduces the likelihood of interference from other wireless devices operating at similar frequencies. When choosing based on this parameter, it is important to consider equipment compatibility, standards and licensing requirements (in order to avoid potential violations of the law).

Control panel features

Functions and capabilities of the central signaling unit.

Display. Own display, which the control panel is equipped with, can have a different size and functionality — from the simplest indicator matrix with several characters to a full-fledged colour screen. Anyway, this function makes working with the alarm more convenient and visual. The display can show various data about the system operation: the current mode of operation, the status of security zones and sensors, the arming and disarming log, battery charge, etc. At the same time, it should be noted that the absence of a display does not mean that it is impossible to receive such information — some models are able to display data on an external display, for example, on a smartphone or tablet via the Internet (see "Control").

Keyboard. Own keyboard that allows you to control the functions of the central unit directly from its body. For more information about this feature, see "Control"; here we note that the keyboard in most cases is combined with the display described above.

SOS button. The presence of its own SOS button (panic button) on the body of the central unit. This button allows you to quickly raise an alarm in an emergency; it is usually made large and clearly visible, and the alarm can be triggered in a way that reduces the likelihood of false alarms — for example, by l...ong or repeated pressing.

Intercom. The possibility of using the system for two-way communication — between a remote subscriber and a person located near the central unit. This function is found only in models with the possibility of remote control via GSM (see "Control"). It allows you to use the control panel as an impromptu landline phone — to communicate with phones stored in memory. In some cases, this possibility is useful: for example, if there is a person on duty at the protected facility, when the alarm is triggered, he can report the details of the incident via the intercom. Often this function is combined with listening (see below); in fact, intercom differs from listening only in that the remote user can not only hear what is happening in the room, but also fully speak with the people who are there.

Listening. The ability to use the system to listen to the room in which the central unit is installed. This function is found only in models with the possibility of remote control — via GSM or Wi-Fi (see "Control"). At the same time, in some models, listening is activated only when the system is triggered, in others it can be turned on at the request of the user by calling the control panel through the telephone network or through an Internet application.

— Voice guidance. The presence in the system of the function of voice accompaniment — "sounding" by voice messages of various actions and events. This function is found only in models with the possibility of remote control via GSM or Wi-Fi (see "Management") and mainly concerns communication with a remote user. When the system is triggered, a call is received to the specified phone number, and when the user answers it, the system announces the data on the trigger (sensor type, time, security zone, etc.). This makes it possible to obtain detailed information on the incident, and not just an alarm; in addition, in many models, after informing, a voice menu is activated, which allows you to control the security from your phone.

— Relay output. Availability of a relay output in the central unit — an output whose contacts are connected to the built-in relay and can be closed and opened on command from the control panel. The ways of using such an output can be different: in some models, the contacts are triggered when the guard is turned on / off, in others they are closed on an alarm signal, some systems allow you to control the line output from the phone or via the Internet; these details should be clarified separately. However, anyway, this function allows you to connect various additional equipment to the device. For example, in a control room where the relay is triggered by an alarm, an additional siren or spotlight can be connected to the relay output.

Exit to the siren. Availability of a separate output in the control panel for connecting an additional external siren. In this case, both a hardware connector for a wired siren and the ability to connect a wireless siren may be implied, depending on the model (these details should be specified separately). However, anyway, if you are going to use a "non-native" siren, you should choose a model with this feature.

Max. wireless sensors

The number of wireless sensors that can be simultaneously connected to the central unit (if this connection format is supported — see "Connecting sensors"). This number, by definition, is not less than the number of wireless zones (see the relevant paragraph).

Note that even the most modest modern systems support 6 – 8 wireless sensors, in the most advanced models this number can exceed 100. So you have to pay attention to this parameter mainly in cases where you need to organize a very extensive alarm system.

Max. key fobs

The number of control fobs that can be simultaneously connected to a system that supports such accessories (see "Control").

At least one key fob is usually supplied with such a system, but this may not be enough. If several people should have access to the alarm through key fobs, it is worth making sure that the appropriate number of key fobs is supported by the selected set.

Motion sensor

Model of the motion sensor(s) supplied with the alarm.

The main data on the motion sensor — coverage angles, range — are usually given in the characteristics of the kit (for more details about this data, see below). However, knowing the name of the model, you can find more detailed information about it — up to practical reviews. In addition, the model name will be useful when looking for spare or additional sensors, in addition to the complete ones.

Opening sensor

Model of the opening sensor(s) supplied with the alarm.

The operating characteristics of the opening sensor — primarily the threshold (see below) — are usually given in the general specifications of the kit. However, some may need more detailed information — to find it, the name of the model will come in handy. In addition, it is useful to know this name if there are not enough complete sensors and they are supposed to be purchased additionally: instead of searching and selecting compatible components, it is enough to purchase sensors of the same type.

Siren volume

The volume of the siren, which comes standard with the set.

The louder the siren, the higher the likelihood that a triggered alarm will attract the nearest police patrol or at least random citizens. In addition, a loud sound can have a psychological, disorienting effect on an intruder. Thus, the alarm sirens become quite noisy. So, in the most "quiet" volume level is about 70 – 80 dB, this can be compared with a noisy city street, the ringing of an alarm clock or a scream at a distance of about 1 m. And in the loudest, this value reaches 130 dB, which is comparable to the sound of a working perforator , the pain threshold is approximately at the same level. More detailed comparisons of different volume values with real sound sources can be found in special tables.