Connecting sensors
Way of connecting sensors, allowed by the central unit of the set. The sensors themselves may or may not be included in the scope of delivery.
—
Wireless. Systems to which sensors are connected only wirelessly. This option is convenient due to the fact that there are no wires, which greatly simplifies installation: you do not need to pull the cable to each sensor, just make sure that they are located within the range of communication with the control panel. In addition, the advantages of wireless alarms include the fact that it is quite difficult to interrupt the connection of sensors with the main unit: this requires special equipment for jamming, which is unlikely to be available to the average burglar. On the other hand, wireless devices are noticeably more expensive than wired ones, and sensors require their own power sources (batteries or accumulators) that need to be changed periodically.
— Wired. Systems with wired connection only. Such kits are cheaper than wireless ones, moreover, the sensors are usually powered through a connection cable — in fact, this means that the user does not need to monitor the condition of the batteries and periodically change them. On the other hand, the connection requires wiring, which can be quite a hassle. Therefore, purely wired solutions are extremely rare today, combined kits are more common (see below).
—
Wireless and wired. Syste
...ms that allow connection of both wired and wireless sensors. Each of the options is detailed above; and such versatility allows the user to choose the types of sensors at his discretion, depending on the characteristics of the installation. For example, if the control panel is installed at the entrance door, a wired method can be used for the opening sensor, and it is more convenient to connect motion sensors from distant rooms via a wireless channel.
— Built -in. Systems in which the sensor is built directly into the central alarm unit. In fact, most of these devices are self-contained sensors with additional functions such as telephone control (see "Control"), connection of additional sensors is usually not provided. Such a kit can be a good option for cases where an extensive security system is not required — for example, if you only need to "cover" a separate office.Wireless zones
The number of security zones that can be covered by this kit when using wireless sensors.
In this case, a security zone means a separate protected area for which you can separately set the operating mode — for example, "Protection", "Protection disarmed" or a special tracking format. On many models, the number of zones corresponds to the maximum number of wireless sensors that can be connected to the device (see "Wireless Sensors"). However, there are exceptions: for example, a model for several dozen sensors can have 6-10 protection zones, in the expectation that one zone will be served simultaneously by several sensors.
Wired zones
The number of security zones that can be covered by this set when using wired sensors.
In this case, a security zone means a separate protected area for which you can separately set the operating mode — for example, "Protection", "Protection disarmed" or a special tracking format. In many models, the number of zones corresponds to the maximum number of wired sensors that can be connected to the device (see "Wireless sensors"). However, there are exceptions: one zone can be served by several sensors at once, and based on this number of zones, there may be less than the number of sensors.
Communication protocol with sensors
This parameter directly affects the compatibility of additionally connected devices, including complete sensors. Such devices must have the same protocol, otherwise normal operation will be impossible. As for specific options, modern alarm kits can use both common
Wi-Fi and
Bluetooth standards, as well as specialized protocols - most often
Z-Wave,
Zigbee or
Jeweller. Here is a more detailed description of each of these standards:
— Wi-Fi. A technology used mainly for building wireless computer networks, and more recently — also for direct communication between individual devices. The 2.4 GHz or 5 GHz range is most often used for communication. In the case of wireless sensors, one of the advantages of Wi-Fi is that it is a generally accepted standard; due to this, many sensors with this type of communication can work without special equipment — they are able to connect to regular wireless routers or even individual devices such as laptops and tablets (some models even allow sending notifications via the Internet, through the same router). However, such versatility has a downside: Wi-Fi has no additional optimization for working with wireless sensors. As a result, such communication is inferior to specialized protocols in terms of overall reliability, special functionality and energy efficiency. So
...this type of communication is typical mainly for devices designed for simple conditions of use — such as climate temperature/humidity sensors for smart home systems.
— Bluetooth. Another common wireless communication standard. It operates in the 2.4 GHz range; unlike Wi-Fi, it is used only for direct communication between devices. It is also poorly suited for professional use (in particular, the response delay can reach 2-3 seconds), and therefore is mainly found in household-specific sensors designed for communication to smartphones/tablets or smart home systems. The Bluetooth LE protocol, supported by Bluetooth modules of version 4.0 and higher, is most often used for communication: it is specially designed for miniature devices with small capacity of built-in batteries, allows data transmission with very low energy costs and at the same time provides a range of up to 100 m.
— Z-Wave. A wireless communication standard specifically designed for automation and control systems, including alarms and smart homes. Along with the one described below, Zigbee is one of the generally accepted protocols used in such systems. Such communication is simple and inexpensive to implement, while being quite functional and practical. It provides for the transmission of the simplest and shortest control commands, which helps save energy, and operates in the range of up to 1 GHz, due to which it is not susceptible to interference from Wi-Fi and Bluetooth devices. In addition, in Z-Wave-based networks, it is possible to use a MESH-type topology - when each individual device is also a full-fledged repeater of signals from other components of the system. Devices in networks of this type can choose any signal route, through any number of intermediate nodes, depending on the situation. For example, if direct communication between two nodes for some reason turned out to be impossible, the data will be sent "bypassing" through other network devices, and the system will automatically determine the most optimal route. This makes it easy to organize large networks with a large number of devices and a large coverage area.
— Zigbee. Another communication protocol created for automation systems (including smart home), alarms, industrial control, etc. In many ways, it is similar to the Z-Wave described above: it allows you to transmit control signals with low energy costs, as well as create MESH networks with signal direction through several nodes and automatic selection of the optimal route taking into account the current situation in the network. The main differences between Zigbee and Z-Wave are high protection of communication channels from hacking, as well as the ability to ensure high response speed. The downside of these advantages is the higher cost of implementing this protocol. Therefore, there are slightly fewer devices for this communication standard than for Z-Wave.
— Jeweller. A proprietary communication protocol developed by Ajax Systems. The company specializes in alarms, and this protocol was originally created specifically for such systems — this is what determines its advanced characteristics. In particular, Jeweller provides a communication range of up to 2 km with very low energy costs, has high-class protection against hacking, allows you to change frequencies when trying to jam the operating range and supports the simultaneous communication of up to 150 devices per gateway. However, the main disadvantage of this protocol is that its use is limited to devices from one manufacturer. So it makes sense to purchase models with Jeweller support if the house uses (or plans to use) an alarm system from Ajax Systems.
— Own frequency. In the context of alarms and HUBs, this parameter refers to the own frequency at which wireless data exchange between the protection system links is ensured. Its specific value is determined by the device manufacturer, but the most common options are 433–434 MHz and 868 MHz. Using the own frequency improves the reliability and safety of the protection system, since it reduces the likelihood of interference from other wireless devices operating at close frequencies. When choosing based on this parameter, it is important to consider equipment compatibility, standards, and licensing requirements (in order to avoid potential violations of the law).Security functions
—
Partial security. Possibility of work of a set in the mode of partial protection. In this mode, the alarm does not arm the entire protected space, but only a part of it — for example, individual rooms, or only sensors of a certain type (opening, movement). Specific features of the partial protection format may be different, they should be specified separately in each model. However, anyway, this function expands the capabilities of the signaling and may be useful in some specific situations. For example, in a residential building at night, you can turn on the perimeter sensors without using motion sensors — in this way, the alarm will only turn on when you try to enter the house and will not respond to people inside.
—
Alarm on pressing the button. Possibility to turn on the alarm signal manually by pressing a special button. This function will be indispensable in extreme situations in which automatic sensors are useless — for example, during an open robbery or attack. Specific alarm functions, of course, may be different: some models include a siren, others are able to send a signal to the dispatcher's console, etc.; these details should be specified separately.
—
Auto arming. Possibility of automatic arming of the alarm system. Most often, in this case, the inclusion of protection is implied by the schedule of hours and days of the week specified b
...y the user; some models allow you to store several schedules in memory at once. This feature ensures that the protected zone "out of hours" will not be left without an alarm, even if the user forgets to turn it on manually. In addition, other methods of auto-arming may be provided — for example, when all key fobs are removed from the communication zone; the presence of such functions should be clarified separately.Control panel features
Functions and capabilities of the central signaling unit.
—
Display. Own display, which the control panel is equipped with, can have a different size and functionality — from the simplest indicator matrix with several characters to a full-fledged colour screen. Anyway, this function makes working with the alarm more convenient and visual. The display can show various data about the system operation: the current mode of operation, the status of security zones and sensors, the arming and disarming log, battery charge, etc. At the same time, it should be noted that the absence of a display does not mean that it is impossible to receive such information — some models are able to display data on an external display, for example, on a smartphone or tablet via the Internet (see "Control").
—
Keyboard. Own keyboard that allows you to control the functions of the central unit directly from its body. For more information about this feature, see "Control"; here we note that the keyboard in most cases is combined with the display described above.
—
SOS button. The presence of its own SOS button (panic button) on the body of the central unit. This button allows you to quickly raise an alarm in an emergency; it is usually made large and clearly visible, and the alarm can be triggered in a way that reduces the likelihood of false alarms — for example, by l
...ong or repeated pressing.
— Intercom. The possibility of using the system for two-way communication — between a remote subscriber and a person located near the central unit. This function is found only in models with the possibility of remote control via GSM (see "Control"). It allows you to use the control panel as an impromptu landline phone — to communicate with phones stored in memory. In some cases, this possibility is useful: for example, if there is a person on duty at the protected facility, when the alarm is triggered, he can report the details of the incident via the intercom. Often this function is combined with listening (see below); in fact, intercom differs from listening only in that the remote user can not only hear what is happening in the room, but also fully speak with the people who are there.
— Listening. The ability to use the system to listen to the room in which the central unit is installed. This function is found only in models with the possibility of remote control — via GSM or Wi-Fi (see "Control"). At the same time, in some models, listening is activated only when the system is triggered, in others it can be turned on at the request of the user by calling the control panel through the telephone network or through an Internet application.
— Voice guidance. The presence in the system of the function of voice accompaniment — "sounding" by voice messages of various actions and events. This function is found only in models with the possibility of remote control via GSM or Wi-Fi (see "Management") and mainly concerns communication with a remote user. When the system is triggered, a call is received to the specified phone number, and when the user answers it, the system announces the data on the trigger (sensor type, time, security zone, etc.). This makes it possible to obtain detailed information on the incident, and not just an alarm; in addition, in many models, after informing, a voice menu is activated, which allows you to control the security from your phone.
— Relay output. Availability of a relay output in the central unit — an output whose contacts are connected to the built-in relay and can be closed and opened on command from the control panel. The ways of using such an output can be different: in some models, the contacts are triggered when the guard is turned on / off, in others they are closed on an alarm signal, some systems allow you to control the line output from the phone or via the Internet; these details should be clarified separately. However, anyway, this function allows you to connect various additional equipment to the device. For example, in a control room where the relay is triggered by an alarm, an additional siren or spotlight can be connected to the relay output.
— Exit to the siren. Availability of a separate output in the control panel for connecting an additional external siren. In this case, both a hardware connector for a wired siren and the ability to connect a wireless siren may be implied, depending on the model (these details should be specified separately). However, anyway, if you are going to use a "non-native" siren, you should choose a model with this feature.Max. wireless sensors
The number of wireless sensors that can be simultaneously connected to the central unit (if this connection format is supported — see "Connecting sensors"). This number, by definition, is not less than the number of wireless zones (see the relevant paragraph).
Note that even the most modest modern systems support 6 – 8 wireless sensors, in the most advanced models this number can exceed 100. So you have to pay attention to this parameter mainly in cases where you need to organize a very extensive alarm system.
Sensor communication range
Communication range with wireless sensors (see "Connecting sensors") provided by the system. Note that this parameter is quite approximate, it is given for perfect conditions — communication within the line of sight without sources of interference; if there are obstacles in the signal path (for example, walls), the actual range may be noticeably lower than the claimed one. In addition, information is provided for "native" sensors — supplied with the system or recommended for it by the manufacturer; when using "non-native" sensors, the communication range may also decrease. Nevertheless, according to this indicator, it is quite possible to evaluate the "range" of various kits and compare them with each other. In addition, we note that even in the most modest systems, the communication range is about 100 m, which is quite enough for locations like an office or a medium-sized private house. In the most "long-range" models, this figure can
exceed 1.5 km.
Key fobs communication range
The distance at which the connection of the control key fobs with the central alarm unit is maintained. This is a rather approximate, moreover, a very conditional indicator: the characteristics usually indicate the distance in perfect conditions — with line of sight, without interference and obstacles between the key fob and the control panel. In fact, the communication range may be less than stated, especially if the key fob has to work through walls. So it is worth choosing according to this indicator with a certain margin.
Also note that this parameter is indicated in the specifications for regular key fobs — complete or recommended by the manufacturer; when using "non-native" accessories, the communication range may be reduced.