Thesis: Designing a security alarm system. Security and fire systems: modern solutions for device integration Development of laboratory work on alarm systems

Copyright JSC "Central Design Bureau "BIBCOM" & LLC "Agency Book-Service" Ministry of Education and Science of the Russian Federation Federal State Budgetary Educational Institution of Higher Professional Education "Orenburg State University" Department of Computer Science and Information Security E.V. Burkova SECURITY AND FIRE ALARM SYSTEMS Recommended for publication by the Editorial and Publishing Council of the Federal State Budgetary Educational Institution of Higher Professional Education "Orenburg State University" as guidelines for students enrolled in the program of higher professional education in the direction of training 090900.62 Information security Orenburg 2014 Copyright JSC " Central Design Bureau "BIBKOM" & LLC "Agency Book-Service" UDC 004.56.53(076.5) BBK 32.973-04 y7 B 91 Reviewer - candidate of technical sciences, associate professor A.V. Khludenev B 91 Burkova E.V. Security and fire alarm systems: guidelines for laboratory work / E.V. Burkova; - Orenburg state. un-t. - Orenburg: OGU, 2014. - 62 p. The guidelines provide theoretical information about the composition, main modules and design stages of security and fire alarm systems. The guidelines contain materials for conducting laboratory work on the course "Security and fire alarm systems", examples of structural and functional diagrams are given, tasks are given, questions for self-testing are given. Methodical instructions are intended for students of the direction of preparation 090900.62 Information security. UDC 004.56.53(076.5) BBK 32.973-04 y7 Burkova E.V., 2014 OSU, 2014 2 Copyright OJSC “Central Design Bureau “BIBCOM” & LLC “Agency Book-Service” Content Introduction………………………… ………………………………………. 5 1 Basic concepts and definitions …………………........................................... 6 1.1 Functions and tasks of security systems -fire alarm………... 7 1.2 The structure of the fire alarm……………………….. 8 1.3 Basic terms and definitions…………………………………….. 10 2 Laboratory work No. 1. Categorization of objects of protection. The choice of the structure of controlled areas……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………. 13 2.2 Estimation of probable damage…………………………………………….. 15 2.3 Description of the situation around the object…………………………………. 16 2.4 Determining the category of the protected object……………………….. 17 2.5 Selecting the structure of controlled zones………………………………….. 18 2.6 Options for physical protection objects………………… …………… 20 2.7 Task…………………………………………………………………. 20 2.8 Control questions…………………………………………………. 21 3 Laboratory work No. 2. Means of protecting the perimeter…………….. 22 3.1 Development of a model of the perimeter of the object………………………………. 22 3.2 Means of engineering and technical strengthening of the facility………….. 24 3.3 Selection of security detectors………………………………………….. 25 3.4 Task…………………………… …………………………………….. 28 3.5 Test questions……………………………………………………... 29 4 Laboratory work No. 3. Evaluation fire threats. Selection of fire detectors………………………………………………………………… 30 fire……………………….. 31 4.3 Characteristics of fire extinguishing media……………………………….. 33 4.4 Selecting the type of fire detector……………………………………. 34 Copyright JSC "TsKB "BIBCOM" & LLC "Agency Book-Service" 4.5 Assignment……………………………………………………………………. 37 4.6 Control questions……………………………………………………………………………………………………………………………………………………………. ………………………………………….. 38 5.1 Purpose of the control panel of the security and fire…… 39 5.2 Structure of the control panel of the security and fire…… 5.3 Task………………… …………………………………………………. 42 5.4 Test questions………………………………………………….. 6 Laboratory work No. 5. Warning systems……………………… 43 6.1 Purpose of the warning system……… ……………………………… 43 6.2 Types of fire alarms……………………………………………………………………………… 44 6.3 Classification of fire alarms…………………… . 45 6.4 Types of intruder alarms……………………………………………………………………………………………… 47 6.5 Task……………………………………………………………………… 49 6.6 Control questions…………………………………………………... 49 7 Laboratory work No. 6. Development of security and fire 7.1 40 42 object alarms…………………… ………………………………… 50 Analysis of object vulnerability………………………………………………. 50 7.1.1 Assessing threats at the site…………………………………………………………………………………………………………………………………… 50 7.1.2 Intruder penetration routes…………………………………….. 53 7.2 Development of recommendations to reduce the level of risk……………….. 7.3 Development of a block diagram of the fire and security system 54 Alarms………………………………………………………………. 56 7.4 Selection of equipment and development of specifications for fire alarm systems……………………………………………………………………………………………. 58 7.6 Development of a functional scheme of the OPS…………………………………………………………………………………………………………………………………………………………………………………………………………………………………………/……………………………………/ 58/ 58 7.7 Task…………………………/……………………………………………………………………………………………………………………… 60 7.8 Control questions………………………………………………….. 60 List of sources used…………………………………….. 62 4 Copyright OJSC “CKB “BIBCOM” & OOO "Agency Kniga-Service" Introduction The problems of organizing information security are becoming more complex and practically significant due to the active transition of information technology to an automated basis. Information security is systemic in nature and involves the creation of an integrated security system, including legal, organizational, engineering, cryptographic and software and hardware methods and means of protecting information. Engineering and technical means of the information security system are designed to passively and actively counteract the means of technical reconnaissance and the formation of boundaries for the protection of the territory, building, premises and equipment, as well as for fire protection using complexes of technical means. The security and fire alarm system (OPS) is a basic element in the security system of any enterprise, as well as residential and cultural buildings. The security and fire alarm system is a complex set of technical means used for the timely detection of fire and unauthorized entry into the protected area. The effectiveness of any fire alarm system largely depends on the parameters of intruder detection devices (fire) and, in particular, on the probability of detecting unauthorized entry. In a number of development tasks both for indoors and for open areas, it is important to analyze the characteristics of detection by security sensors. Obviously, this probability depends on a number of factors that characterize both the intruder himself (speed and direction of movement, clothing, etc.) and environmental conditions (temperature, the presence of interference sources, etc.). Especially the influence of the mentioned factors will affect the use of sensors outdoors. Another important issue affecting the probability of detection is the skill of the intruder. A highly skilled intruder, who knows the principles of operation of sensors, their weak points, has a priori information about the object and the alarm system, will use this information to overcome the alarm system without detection. For example, choose a penetration route, taking into account the lower sensitivity of sensors in the radial direction of movement. Therefore, such knowledge, combined with information about the topology of the object and the location of sensors, which a skilled intruder may have, can play a decisive role in overcoming the LFA without detection. For the training of future engineers in the profile "Integrated protection of informatization objects", knowledge of the principles of building security and fire alarm systems, skills in modeling protection objects, analyzing sources of threats, building a model of an intruder, choosing equipment, designing structural and functional diagrams of fire alarm systems are required. These guidelines are intended for laboratory work on the course "Intruder and fire alarm systems" for students of the direction of preparation 090900.62 Information security. The guidelines contain seven sections, which provide materials for laboratory work on the course "Security and fire alarm systems", examples of structural and functional diagrams, tasks, questions for self-examination. 6 Copyright JSC "Central Design Bureau "BIBCOM" & LLC "Agency Kniga-Service" 1 Basic concepts and definitions 1.1 Functions and tasks of fire and security alarm systems protected objects and about the fire on them. Tasks of the FPS system: 1) determination of the fact of unauthorized entry into the protected object or the appearance of fire signs; 2) issuing an alarm signal and turning on actuators (light and sound annunciators, relays, etc.). The security, alarm and fire alarm systems are very close to each other in terms of construction ideology and are combined at small facilities on the basis of a single control unit - a control panel or control panel. Technical means of the OPS: 1) technical means of detection - detectors; 2) technical means of collecting and processing information - control panels, control panels, notification transmission systems, etc.; 3) technical means of notification - sound and light annunciators, modems, etc. Requirements for the security and fire alarm system:  round-the-clock monitoring of the state of the territory of the facility;  quick detection of fire;  accurate determination of the place of ignition;  ignition must be determined reliably (exclude the absence of false alarms);  the place of penetration must be determined exactly, indicating the specific area of ​​penetration into the protected premises and territory; 7 Copyright OJSC “TsKB “BIBKOM” & LLC “Agency Kniga-Service”  information about the fact of fire and its location should be presented in a simple and convenient form;  continuous monitoring of sensor malfunctions (security, fire), monitoring attempts to open the system. Complex integrated fire and security alarm systems include:  security alarm hardware and software,  fire alarm hardware and software,  access control and management,  security television. All these subsystems must have technical, informational, software and operational compatibility and are designed to solve the problems of protecting objects. 1.2 The structure of the fire and security alarm The fire and security alarm system is a system for collecting and analyzing data on the state of an object. Information about the state of the object, taken with the help of various sensors-analyzers, is continuously processed by the receiving and control panel - the central point of the alarm system. The security alarm subsystem processes the following parameters:  the state of contacts of magnetic contact sensors (open-closed);  signals about violation of the volume of the room;  signals about crossing the perimeter. Signals received by the fire alarm subsystem:  indoor temperature;  smoke level;  open flame radiation. The structure of the OPS is shown in Figure 1.1. 8 Copyright OJSC "Central Design Bureau "BIBCOM" & LLC "Agency Kniga-Service" Fire Alarm Burglar alarm Smoke content Contact integrity Temperature Volume IR flame radiation Glass break sensor 1 2 Control panel 3 Operator workstation 5 4 Warning system Announcement transmission system Figure 1.1 – Structure OPS The information transmission channel is a signaling loop - a two-wire or four-wire communication line. In Figure 1.1, the number 1 marks the fire loop, and the number 2 - the security loop. The loop is also a measure of grouping information and allows you to divide the protected object into zones. Information about the value of the above parameters is processed by the control panel, which is the central node for collecting information. Depending on the settings and the operation algorithm, if the loop is violated or the threshold value of one of the parameters is exceeded, the control panel generates signals to start the actuators. In Figure 1.1, number 3 marks the signal to start the fire alarm system, and number 4 marks the start of the system for transmitting notifications to the centralized monitoring console. 9 Copyright JSC "TsKB "BIBCOM" & OOO "Agency Kniga-Service" 1.3 Basic terms and definitions Alarm - a warning about the presence of danger or threat to life, property or the environment. Notification - a message about controlled changes in the state of a protected object or technical means of an alarm system and transmitted using electromagnetic, electrical, light, and sound signals. Notifications are divided into alarm and service. An alarm contains information about an intrusion or a fire, while an official notification contains information about the object being armed, disarmed, equipment malfunctioning, etc. User - a person (or organization) using the services of a company (non-departmental security under the internal affairs bodies of the Russian Federation, private security companies or associations) for the installation of alarm systems and (or) their maintenance. Violator - a person who tries to enter or entered a room (territory) protected by a security or fire alarm system without the permission of the responsible person, user, owner. Fire alarm - receiving, processing, transmitting and presenting to consumers in a given form with the help of technical means of information about a fire at protected facilities. Security and fire alarm complex - a set of jointly operating technical means of security, fire and (or) security fire alarms installed at a protected facility and united by a system of engineering networks and communications. Security and fire alarm system - a set of jointly operating technical means for detecting the appearance of signs of an intruder at protected objects and (or) a fire at them, transmitting, collecting, processing and presenting information in a given form. Addressable fire alarm system (AFS) - a set of fire alarm technical means designed (in the event of a fire) for automatic or manual activation of the “Fire” signal at the address reception control device by means of automatic or manual addressable fire detectors of protected premises. Security (fire, security and fire) alarm loop - an electrical circuit connecting the output circuits of security (fire, security and fire) detectors, including auxiliary (remote) elements (diodes, resistors, capacitors, etc.) and connecting wires designed for transmitting notifications of intrusion, intrusion attempt, fire and malfunction to the control panel, and in some cases for supplying power to the detectors. Protected object (OO) - an object guarded by security units and equipped with operating technical means of security, fire or security and fire alarms. Protected zone - a part of a protected object controlled by one OPS loop or a set of loops. Alarm line - a loop or a set of loops that control protected areas on the way of the intruder's movement to the material values ​​​​of the protected object and have access to a separate number of the centralized monitoring console (CMS). Guard line - a set of protected zones controlled by the signal line. Security detector (fire) - a fire alarm technical tool for detecting intrusion, fire, intrusion attempt or physical impact exceeding the normalized value, as well as generating an intrusion (fire) notification. The device reception and control security (security and fire) (PPKO, PPKOP) - a technical means of security or security and fire alarms for receiving notifications from detectors (alarm loops) or other receiving and control devices, converting signals, issuing notices for 11 Copyright JSC " Central Design Bureau "BIBKOM" & LLC "Agency Book-Service" direct perception by a person, further transmission of notifications and activation of annunciators. Security and fire annunciator - a technical means of security, fire or security and fire alarms, designed to notify people who are at a distance from the protected object about penetration (attempt of penetration) or fire. Notification transmission system (STS) - a set of jointly operating technical means for transmitting via communication channels and receiving at the centralized security point notifications of penetration into protected objects and (or) fire on them, service and control and diagnostic notifications, as well as for transmission and reception telecontrol commands. Information protection objects include: a protected area, a building (structure), a dedicated room, information and (or) information resources of an informatization object. The result of information protection may be to prevent damage to the owner of information due to possible leakage of information and (or) unauthorized and unintentional impact on information. Reliability of information protection involves ensuring the required level of its security, regardless of external and internal factors affecting the security of information. Continuity of information protection characterizes the constant readiness of the protection system to repel information threats. The cost of changing the protection system is minimized in the case of secrecy of information protection. The higher the secrecy, the greater the uncertainty of the initial data of the attacker and the less he has the ability to obtain information. The secrecy of information protection is achieved by covert measures to protect information and limit the access of employees of an organization (enterprise, institution) to information about specific methods and means of engineering and technical protection of information in an organization. 12 Copyright JSC "Central Design Bureau "BIBCOM" & LLC "Agency Book-Service" 2 Laboratory work No. 1. Categorization of objects of protection. Choice of structure of controlled zones Purpose. Definition of the category of the protected object. The choice of methods and means of security and fire alarms. Tasks. 1) Characteristics of the object of protection. 2) Description of the environment around the object. 3) Estimation of probable damage. 4) Definition of the category of the protected object. 5) Choice of structure of controlled zones. 2.1 Characteristics of the object of protection Objects erected to meet the material and cultural needs of society are called structures. To design a fire and security alarm system, it is necessary to characterize the protected object, determine which class it belongs to. Classification of buildings is carried out according to many different features (listed below). According to building codes, all buildings and structures are classified according to the features listed in Table 2.1. [Sinilov]. All premises, depending on the environmental conditions, the conductivity of the floors, as well as the placement of electrical equipment and metal structures connected to the ground, are divided into three classes according to the degree of danger of electric shock:  with increased danger;  especially dangerous;  no increased risk. 13 Copyright OJSC “Central Design Bureau “BIBCOM” & LLC “Agency Kniga-Service” Table 2.1 - Classification of buildings according to building features Feature Type 1 Type 2 Type 3 Geometrically Purpose Volumetric Site Linear Residential Public: children's institutions, educational, commercial, medical, cultural, sports Low-rise (2 or 3 floors) Production Floors One-story External wall materials Fire resistance Stone Wooden Fireproof Flame-retardant Type 4 Type 5 Agricultural Warehouses Multi-high-rise (more than 10 floors) (up to 10 floors) Mixed - - Combustible Combustible, washed, unprotected - - Classification of premises according to the nature of the environment: normal, dry, humid, damp, especially damp, hot, dusty, with a chemically active environment. Classification of explosive zones. Zones located in rooms where flammable gases or vapors of flammable liquids (FLL) are emitted in such quantity and with such properties that they can form explosive mixtures with air under normal operating conditions. Classification of fire hazardous zones. A fire hazardous zone is a space inside and outside the premises, within which combustible (combustible) substances constantly or periodically circulate and in which they can be located during a normal technological process or during its violations. Requirements for the reliability of power supply of objects (categories). Receivers of electric energy in relation to ensuring the reliability of power supply are divided into several categories. Among the power receivers of the first category, a special group of power receivers stands out, the uninterrupted operation of which is necessary for an accident-free shutdown of production in order to prevent a threat to human life, explosions, fires and damage to expensive equipment. For example, electrical receivers of a special group include hospital operating rooms, emergency lighting, fire and burglar alarms, etc. 2.2 Assessment of probable damage For an approximate assessment of damage, it is necessary to identify the main risks arising from the penetration of intruders into a protected area or in the event of a fire. Due to the manifestation of various threats, the risks associated with the implementation of the main activities of the organization significantly increase:  the risk of loss of reputation,  the risk of liquidity,  the risks of loss of property,  the risk of losing important assets of the organization,  the risk to people's lives. These risks are associated with the possibility of occurrence of situations of manifestation of threats that require additional, often significant costs of material, human, time, financial and other resources to eliminate the consequences of the manifestation of threats. An increase in risks leads to an increase in costs and a corresponding decrease in the efficiency of the organization's activities, a decrease in its competitiveness. Material damage is understood as objective damage caused to property, which is directly assessed in monetary terms. It can manifest itself in an attack on property or in an attack on an individual, it can be purely material or monetary, expressed in actual loss or loss of profit. 15 Copyright JSC "Central Design Bureau "BIBCOM" & LLC "Agency Kniga-Service" Moral damage is a subjective damage that does not encroach on property, but encroaches on forms of human feelings, such as honor, reputation, image. This adds aesthetic harm and damage. A special place is occupied by physical damage, which has a material component (medical costs, economic consequences, the degree of disability) and a moral component (pretium doloris - suffering, the cost of pain, damage to consent and aesthetic damage). Table 2.2 provides an example of a potential damage analysis. Table 2.2 - Analysis of possible damage No. Type of threat 1 2 Theft of design and technological documentation Theft of products 3 Theft of funds 4 5 Familiarization, copying, destruction, modification of protected information Damage to equipment 6 Fire Consequences Damage Liquidity risk Material Risk of loss of property Loss of property Material, moral material Loss reputation Material, moral Stopping production Risk to people's lives, loss of equipment, products Material Physical, material, environmental, moral 2. 3 Description of the situation around the object For a qualitative choice of detection tools and means of physical protection, it is necessary to analyze the location of the object (in which part of the city the object is located), which objects are in the immediate environment. It is necessary to compile a spatial model of the object, taking into account the probability of observing the object, listening, creating electromagnetic and other interference for detection tools. Spatial model of the object 16 Copyright JSC "TsKB "BIBCOM" & LLC "Agency Kniga-Service" can be presented in the form of a diagram or a table indicating the objects in the nearest location from the protected object. 2.4 Determining the category of the protected object The objects of physical protection are material assets, including sources of protected information, as well as controlled areas in which these material assets are located. In accordance with the governing document RD 78.36.006-2005, the objects of protection (protection) are divided into three categories indicated in table 2.3. Table 2.3 - Categories of importance of protected objects Category Name of category A1, A2 Particularly important objects B1, B2 Important objects C Simple (ordinary) objects Purpose or ownership of the object Consequences from the implementation of threats Vaults and depositories of banks; enterprises for the production or storage of chemically hazardous, narcotic, explosives, ammunition, nuclear materials; defense profile enterprises; government agencies; energy complexes. Bank teller halls; entrances of cash collection vehicles; rooms for storing important information; shopping centers for the sale of valuable goods; production facilities for the manufacture of valuable products. Trading floors of shops; offices of institutions; offices of medium and small businesses; industrial premises; Living spaces. Particularly large or irreparable material damage, environmental disaster at the facility or in the region, death or threat to the lives of a large number of people, political consequences, other particularly serious consequences. Significant material or financial damage, threat to the health or life of people, loss of government or important commercial sectors. Material damage; information damage of a commercial or official nature; violation of the comfort of life or work. 17 Copyright JSC "Central Design Bureau "BIBCOM" & LLC "Agency Book-Service" All security objects can be divided into stationary and mobile. Stationary objects include territory, buildings, structures, premises, stretching boundaries. Mobile objects differ in that they are mobile. These are temporary parking lots, vehicles, small-sized objects. Objects are described by a set of administrative, legal, engineering, organizational, and special characteristics. Special characteristics describe an object from the point of view of its security. 2.5 Choice of the structure of controlled zones One of the most important principles for the protection of objects is multi-zone. Multi-zone provides for the division into separate controlled zones, each of which provides a level of security corresponding to the value of the information contained in it. In this regard, multi-zone allows you to reduce the cost of engineering and technical protection of information. The more zones, the more rationally the system resource is used, but at the same time, the organization of information protection becomes more complicated. Zones can be independent, intersecting and nested (figure 2.1). Figure 2.1 - Structure of controlled zones 18 Copyright JSC Central Design Bureau "BIBCOM" & LLC "Agency Kniga-Service" Nested zones are the most common, as they allow to provide the required level of object security more economically. The information security of the 1st nested zone is determined not only by its protection level, but also by the levels of protection in the previous zones, which an attacker must overcome to penetrate the 1st zone. Each zone is characterized by the level of security of the information contained in it. The security of information in the zone depends on:  the distance from the source of information to the intruder or his means of obtaining information;  the number and level of protection of the boundaries on the way of the attacker's movement or the spread of another information carrier;  effectiveness of methods and means of managing the admission of people and vehicles to the zone;  measures to protect information within the zone. A variant of the classification of zones according to access conditions is given in Table. 2.4. Table 2.4 - Classification of zones according to access conditions Zone category 0 I II III IV V employees Free By identification card with registration Security secretariat, compo ID by one-time computer rooms, archives by fictitious launches Enhanced cards negotiation stones, special storages 19 Copyright JSC Central Design Bureau BIBCOM & LLC Agency Book-Service 2. 6 Options for physical protection objects Table 2.5 shows options for informatization objects (all buildings are considered one-story). Table 2.5 - Variants of objects of protection Variant No. Protected object 1 Warehouse for food products 2 Warehouse for medicines 3 Warehouse for wood 4 Warehouse for electronic equipment 5 Factory workshop with valuable equipment 6 Tourist office 7 Cinema premises 8 Kindergarten with adjacent territory 9 Notary office 10 Bank teller hall 11 City government office 12 Residential cottage 13 Jewelery shop 14 Small business office 15 Explosives store 16 Meeting room in the administration building of a commercial company 2.7 Task Complete the tasks according to the object option. 1) Build a plan of the protected object with an indication of the area. 2) Determine the class of the object according to construction features, according to the nature of the environment, according to explosion hazard, fire hazard, power supply requirements. Make a table. 20 Copyright JSC "Central Design Bureau "BIBCOM" & LLC "Agency Book-Service" 3) Describe the situation around the object. Provide a diagram of the location of the territories around the protected object. Make a table. 4) Determine the threats to the protected object. Assess the possible damage, put it in the table. 5) Determine the category of the protected object. 6) Select the category and structure of controlled areas. Build a scheme of controlled zones. 2.8 Control questions 1 Define the object of protection. Name examples. 2 By what building features are protected objects classified? Give their description. 3 How are electrical installations and premises classified according to electrical safety conditions? 4 Name the classes of hazardous areas. 5 Define and name the classes of fire hazardous areas. 6 Which power receivers belong to the first category in terms of power supply reliability? List all categories. 7 Define the threat to the security of the protected object and give the main types of threats. Describe the types of possible damage. 8 Describe the categories of protected objects. 9 What is a controlled area? What are the zone structures? List the advantages of multi-zone protection. 10 Describe the classes of zones according to access conditions. 11 What are the basic principles of security systems. Explain the essence of the principle of continuity. 12 Explain the principle of flexibility, secrecy, rationality of the security system. 13 What subsystems are included in the integrated security systems? Name their functions. 21 Copyright OJSC "Central Design Bureau" BIBCOM " & LLC "Agency Book-Service" 3 Laboratory work No. 2. Means of protecting the perimeter Purpose. Study and selection of perimeter protection means for a given object. Tasks. 1) Development of an object perimeter model, vulnerability analysis. 2) The choice of boundaries of protection. 3) The choice of physical means of protecting the perimeter. 4) Choice of perimeter detectors. 3.1 Development of a perimeter model of an object Perimeter is the outer boundary (contour) of the protected territory of an object, unauthorized crossing of which should trigger an alarm signal indicating the place of its overcoming. To effectively solve the problem, it is important to optimally combine mechanical barriers, primarily a passive perimeter fence (fence), with technical means of detection (signaling). The main task of any perimeter security system is to ensure the maximum probability of detecting an intruder with an accurate indication of the place of penetration in order to organize effective countermeasures. Depending on the features of the object (its purpose, design and configuration of the fence, climatic, geological factors, etc.), the perimeter line can be equipped with one or several security lines, either entirely, or only in certain especially important areas. A one-line security system, in turn, can be created on the basis of one detection tool that is most suitable for the given conditions, or it can consist of a combination of detectors of various operating principles. For example, the lower and middle parts of the mesh fence are protected by a cable sensing element, and the visor is protected by beam detectors. A multi-line perimeter security system with two or more lines located at a distance from each other makes it possible to determine the direction of the intruder's movement and allows you to maintain the system's operability in case of failure of one of the detection tools. In Russia, natural conditions are very diverse. Large seasonal fluctuations in temperature, in some areas reaching up to 80 ... 90 ° C, heavy snowfalls, snowstorms, sleet, ice, hoarfrost, fog, hurricane winds, heavy rains cause great difficulties in choosing the appropriate equipment for perimeter protection. When equipping the perimeter with protective equipment, it is necessary to take into account the factors influencing the construction of the protection system. Variant factors are listed in Table 3.1. Types of vegetation: H - low (shrub), C - medium (high bushes of acacia, lilac, etc. ), B - high (trees). Table 3.1 - Factors influencing the choice of means of protection by options Option number 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 + _ _ _ _ _ _ _ _ _ _ + _ _ + _ _ + _ + _ + _ + _ + _ + _ + _ + + _ _ + _ _ + _ + _ _ + + _ + _ factor Presence of right-of-way _ _ _ _ + + + + N N L M M H _ + _ _ _ Perimeter gap for the passage of vehicles, passage of people - + + + _ _ + + + + + N H L M H H L L H M _ + _ + _ _ + _ _ _ + + - + - + + - + + + - 23 Copyright OJSC "Central Design Bureau "BIBCOM" & LLC "Agency Kniga-Service" If necessary, along the main perimeter fence between the main and internal warning fences they arrange a rejection zone, in which they place:  means of security and alarm signaling;  security lighting;  means of security television;  security posts (post "fungi", observation towers);  means of communication of posts and guards;  indication and warning signs. For a building, the first line of defense should be protected:  window and door openings along the perimeter of the building or object;  places of input of communications, ventilation ducts;  exits to fire escapes; The volume of the room should be protected by the second line of protection with the help of passive optical-electronic detectors with a volumetric detection zone, ultrasonic, radio wave or combined detectors. The third line of protection should be protected by safes and individual items or approaches to them with the help of capacitive, vibration, passive and active optoelectronic or radio wave detectors. 3.2 Means of engineering and technical fortification of an object Means of engineering and technical fortification, which are the basis for building a security system, should be used to increase the reliability of the protection of objects. Such a tool is a fence. The protection is subdivided into the main, additional and preventive. The fence should exclude the accidental passage of people (animals), the entry of vehicles or make it difficult for an intruder to enter the protected area, bypassing the checkpoint. The fence should be made in the form of straight sections with a minimum number of bends and turns that limit observation and impede the use of technical means of security and alarm signaling. The windows of the first floors of these buildings, overlooking the unguarded territory, must be equipped with metal bars, and, if necessary, with metal mesh. The fence should not have manholes, breaks, damage, as well as non-lockable doors, gates and gates. The height of the main fence must be at least 2.5 m. An additional fence can be installed to reinforce the main fence. The upper additional fence is installed on the main fence, if the height of the latter is at least 2.5 m. As a rule, the additional fence is a canopy of 3, 4 rows of barbed wire. The lower additional fence for protection against undermining should be installed under the main fence with a penetration into the ground of at least 0.5 m and made in the form of a concrete plinth or a welded steel grating. A warning fence is recommended to be installed on objects of the AI ​​subgroup. It can be located on the outer and (or) inner side of the main fence. On the warning fence, the height of which must be at least 1.5 m, signs such as: "Do not approach! Forbidden zone" and other indicative and warning signs should be placed. 3.3 Selection of security detectors Technical means of detection are detectors built on various physical principles of operation. A detector is a device that generates a certain signal when one or another controlled parameter of an object changes. According to the field of application, the detectors are divided into security, security and fire and fire. Security detectors according to the type of controlled area are divided into point, linear, surface and volume. According to the principle of operation, they are divided into electric contact, magnetic contact, shock contact, piezoelectric, optoelectronic, capacitive, sound, ultrasonic, radio wave, combined, combined, etc. The scheme for choosing security detectors is shown in Figure 3.1. 25 Copyright OJSC "Central Design Bureau "BIBCOM" & LLC "Agency Kniga-Service" Active optical-electronic Passive IR corridor, curtain Linear radio wave Wired radio wave Outer perimeter Glazed openings Doors Perimeter blocking Combined IR + microwave Electrocontact Shock-contact Acoustic (sound) Magneto-contact Building structures Piezoelectric Vibrating volume blocking Protection of buildings, premises Corridors Passive IR corridor, curtain Rooms Active optoelectronic Passive IR volume Blocking of valuables Outside the building Radio wave volumetric Combined IR + AK Showcase blocking Alarm signaling Safe blocking Combined IR + microwave Passive IR volume Radio wave volumetric Stationary Ultrasonic volumetric Piezoelectric Mobile Vibrating Capacitive Magnetic Contact Radio Channel Figure 3. 1 - Scheme for selecting security detectors The choice of a particular type of detector is determined depending on:  comparison of the structural characteristics of the object to be protected and the tactical and technical characteristics of the detector; 26 Copyright JSC "Central Design Bureau "BIBCOM" & OOO "Agency Book-Service"  the nature and placement of valuables in the premises;  interference situation at the facility;  probable ways of penetration of the violator;  security regime and tactics; The interference situation in the area of ​​its placement has a significant influence on the choice of the detector. The interference situation may change. For example, construction work using heavy equipment may begin near a building, which will create acoustic interference. The average effect of various types of interference on detectors is characterized by the data in Table 3.2. Table 3.2 - Average effect of interference on detectors No. Type of interference Acoustic optoelectronic Radio wave Capacitive Vibration noise of water in pipes, etc.) + - - - - 3 External light (headlights, sun glare) - + - - - 4 Air movement in the room (drafts, fans, radiators) - + - - - 5 Movement of objects ( curtains, fan blades, water on windows, leaves, etc.) + + + - - 6 Electromagnetic interference (welding machines, discharges of high-voltage lines, trams, trolleybuses, fluorescent lamps, etc.) - - - + - 7 Small animals , large insects + + + + + 27 Copyright JSC "Central Design Bureau "BIBCOM" & LLC "Agency Book-Service" 3.4 Task In accordance with the option of the object (in laboratory work No. 1), complete the tasks. 1) Build a model of the protected object in accordance with the factors of the surrounding area indicated in Table 3.1. The model can be presented in the form of a diagram with explanations of symbols, or in the form of a table. 2) Conduct an analysis of possible ways for the intruder to penetrate the object. Show access routes and vulnerabilities on the site plan. Use the plan built in the first work. 3) Determine the boundaries of the protection of the object (by options in accordance with the controlled zones defined in the previous work). Select the type of fence for the given object. Present an object with boundaries schematically with explanations. 4) Select, taking into account all the conditions specified in Table 3.1, perimeter detectors at all security lines of the facility. 5) Fill in table 3. 2 results of the selection of perimeter aids. Table 3.2 - Selection of perimeter facilities Subsystem Functions Equipment composition and location Fencing, other Physical protection of the perimeter Physical barriers Specify the type and zone Lighting Creation of conditions for the operation of video cameras, security services, scaring off intruders Specify the type and location Security detectors (perimeter, volume, glass breaking) Early detection of non-sanctions Indicate the type and location of penetration into the territory 28 Copyright JSC "Central Design Bureau "BIBCOM" & LLC "Agency Book-Service" 3.5 Control questions 1 Define the perimeter of the object of protection. Name the main tasks of perimeter protection. 2 What is a guard line? Define single-line and multi-line systems. Give examples. 3 What factors and how do they influence the choice of technical means of perimeter protection? 4 Describe the means of engineering and technical strengthening of the facility. In what cases are additional barriers used? 5 Name all types of the main fence and explain their design. 6 What is a rejection zone? What are the main tasks of this zone? What technical means are placed in it? 7 Detectors of what principle of operation is rational to use to protect the mesh fence? 8 What are the advantages of capacitive detectors. On what objects is it most effective to use capacitive detectors? 9 Define active and passive technical means of detection. Name the types of active detectors. 10 Explain the principle of operation of vibration detectors. Give examples of their application. 11 What detectors are used to detect movement in a volume? 12 What technical means are used to protect window systems? What tools are used to detect glass breakage? 13 In what cases is it advisable to use magnetoelectric detectors? 14 What functions does the security lighting of the protected object perform? 15 List all perimeter security subsystems and explain their main tasks. 29 Copyright JSC "Central Design Bureau" BIBCOM " & LLC "Agency Book-Service" 4 Laboratory work No. 3. Fire threat assessment. Selection of fire detectors Purpose. Studying the types of fire detectors, the principles of choosing and placing them on a given object. Tasks. 1) Fire threat assessment and object class determination. 2) Determination of fire protection measures, characteristics of fire extinguishing means, smoke removal. 3) The choice of the type of fire detector, taking into account the specifics of the object. 4) Development of a scheme for the placement of fire detectors at the facility. 4.1 Fire threat assessment and object class determination The fire alarm system is designed for timely detection of a fire site and generation of control signals for fire warning and automatic fire extinguishing systems. The main functions of the fire alarm system are provided by various technical means. Detectors are used to detect a fire, for processing and logging information and generating control alarms - receiving and control equipment and peripheral devices. The purpose of the fire alarm system: 1) timely detection of a fire; 2) data collection from fire detectors; 3) generation of fire warning control signals; 4) automatic fire extinguishing, smoke removal. To successfully extinguish a fire, it is necessary to use the most suitable extinguishing agent, the choice of which should be resolved almost instantly. This task is greatly facilitated by the introduction of the classification of fires and their division into four types, or classes, denoted by Latin letters A, B, C, D, E, F. Each The class includes fires associated with the ignition of materials that have the same properties during combustion and require the use of the same fire extinguishing agents. Classification of fires is given in Table 4.1. Table 4.1 - Classification of fires Class "A" - combustion of solid substances "B" - combustion of liquid substances Category A1 A2 B1 B2 "C" - combustion of gaseous substances C D1 "D" - combustion of metals D2 D3 "E" - combustion of electrical installations "F" » - combustion of radioactive materials and wastes Description Combustion of solid substances accompanied by smoldering (for example, coal, textiles) Combustion of solid substances not accompanied by smoldering (for example, plastic) Combustion of liquid substances insoluble in water (for example, gasoline, ether, petroleum products). Also, burning of liquefiable solids (paraffin, stearin) Burning of liquid substances soluble in water (e.g. alcohol, glycerin) alkali metals (for example, sodium, potassium) Combustion of metal-containing compounds (for example, organometallic compounds, metal hydrides) E Combustion of electrically powered devices F Combustion of radioactive materials and waste 4.2 Determination of measures to protect an object from fire Fire prevention measures are divided into organizational, technical, regime and operational. 31 Copyright OJSC Central Design Bureau BIBCOM & LLC Agency Kniga-Service Organizational measures: provide for the correct operation of machines and intra-factory transport, the correct maintenance of buildings, territories, fire-fighting briefing. Organization of ways of evacuation of people in case of fire. Technical measures: compliance with fire rules and regulations in the design of buildings, in the installation of electrical wires and equipment, heating, ventilation, lighting, proper placement of equipment. Regime activities. In each organization, an administrative document must establish a fire regime corresponding to their fire hazard, including:  designated and equipped smoking areas;  the places and the allowable amount of raw materials, semi-finished products and finished products located in the premises at a time are determined;  established the procedure for cleaning combustible waste and dust, storing oiled overalls;  the procedure for de-energizing electrical equipment in case of fire and at the end of the working day is determined;  the procedure for conducting temporary fire hazardous work;  the order of inspection and closing of premises after completion of work;  actions of employees upon detection of a fire;  the procedure and terms for passing fire-fighting briefings and classes on the fire-technical minimum are determined, as well as those responsible for their conduct are appointed. Operational measures - timely preventive maintenance, inspections, repairs and testing of process equipment. Depending on the type of object, purpose and operating conditions, various fire safety measures are selected. 32 Copyright OJSC Central Design Bureau BIBCOM & LLC Agency Kniga-Service 4.3 Characteristics of fire extinguishing agents A wide range of different substances are used as fire extinguishing agents: water, air-mechanical foam, powder, inert gases, gas aerosols, as well as their combinations. The most widespread, both in Russia and abroad, are water and foam fire extinguishing installations. Their share in the total volume of automatic fire extinguishing installations exceeds 80%. Modern water fire extinguishing installations make it possible to prevent large fires, which significantly reduces material losses. These installations are used in various sectors of the national economy, are used to protect facilities where substances and materials such as cotton, linen, wood, fabrics, plastics, rubber, combustible and bulk substances, as well as a number of flammable liquids are used and processed. These installations are also used to protect technological equipment, cable structures, cultural facilities (theaters, cultural centers and other similar structures). Foam fire extinguishing installations are used to protect technological equipment of chemical and petrochemical industries, warehouses and depots of oil and oil products, as well as other facilities where flammable and combustible liquids are used in large quantities. The classification of fire extinguishing installations is shown in Figure 4.1. Automatic gas and aerosol fire extinguishing installations are designed to protect premises in which flammable liquids are stored and processed, ship holds, halls and storage facilities of art galleries, museum premises, archives, various electrical installations under voltage, computer centers, and in all cases, when the use of water or air-mechanical foam (VMP) is not possible. Powder fire extinguishing installations, depending on the type of fire extinguishing powder, are used to extinguish fires of classes A, B, C, D and electrical installations with open current-carrying parts under voltage up to 1000 V. The most effective use of these installations is to extinguish flammable and burning fires. & OOO "Agency Kniga-Service" for liquids of the hydrocarbon series, alcohols, ethers and other products, as well as combustible gases (including in a liquefied state), alkali, alkaline earth metals and organometallic compounds. Figure 4.1 - Classification of fire extinguishing installations 4.4 Selecting the type of fire detector Fire detector - a device for generating a fire signal. Addressable fire detector (API) - a technical means of ASPS, which transmits its address code along with a fire notice to the addressable control panel. 34 Copyright OJSC Central Design Bureau BIBCOM & LLC Agency Kniga-Service Depending on the purpose of the building where the fire safety system is installed, certain sensors are also used. For example, beam sensors are used to install a fire alarm in a large warehouse. To install a fire alarm in rooms with a large number of people in it (cinemas, theaters, libraries, etc.), it is best to use smoke detectors. If we are dealing with a warehouse in which, for example, wood or other flammable natural materials are stored, it is recommended to use sensors that react to open fire. The smallest details of the room in which the fire alarm is installed must be taken into account. Because thermal sensors are somewhat inert when triggered, smoke sensors are preferred. There are also combined sensors on the fire equipment market. They are designed to alert you about a fire when two parameters (temperature and smoke) change. Installing a fire alarm allows not only to notify people about a fire, but also to localize a fire in time and thereby avoid material losses along the way, which is also important. The classification of automatic fire detectors is shown in Figure 4.2. Classification of automatic fire detectors According to the type of controlled fire sign According to the nature of the reaction to the controlled sign Thermal Maximum Smoke Differential Flames Maximum - differential Gas Combined Figure 4.2 - Classification of automatic fire detectors In operation, fire detectors are divided into manual and automatic. Manual call points do not have the function of detecting a fire source, their action is reduced to transmitting an alarm notification to the electrical circuit of the alarm loop after a person detects a fire and activates the detector by pressing the corresponding start button. Automatic fire detectors operate without human intervention. With their help, a fire is detected by one or more analyzed signs and a fire notification is generated when the controlled physical parameter reaches the set value. The area controlled by one point smoke detector, as well as the maximum distance between the detectors and the detector and the wall, must be determined according to Table 6.3, but not exceeding the values ​​\u200b\u200bspecified in the technical specifications and passports for the detectors. Table 4.2 - Characteristics for the placement of point fire detectors Placement of fire detectors is carried out in accordance with the Fire Safety Standards "Systems for warning and managing the evacuation of people in case of fires in buildings and structures" (NPB 104-03). 36 Copyright JSC "TsKB "BIBCOM" & LLC "Agency Kniga-Service" 4.5 Task 1) Assess the fire threat at a given object and determine the class of the object according to table 4.1. 2) Determine the organizational fire protection measures at the facility. Arrange in the form of a table. 3) Determine and justify the means of fire extinguishing, smoke removal. 4) Select the type of fire detector, taking into account the conditions at the facility. 5) Develop a scheme for the placement of fire detectors at the facility. 4.6 Control questions 1 Define the fire alarm system, name the main functions and composition. 2 Name the types of fire alarm systems. Explain the difference between threshold and address systems. 3 Name the classes of objects according to the type of fires. Give a description of each class. 4 Name the types of fire protection measures. Formulate fire protection measures for an industrial plant. 5 Formulate fire protection measures for cultural facilities. 6 Give a description of fire extinguishing agents and installations. Name the types of objects on which automatic fire extinguishing is used. 7 Define a fire detector. List the requirements for fire detectors. 8 Describe the principles of operation of fire detectors. List the types of interference for fire detectors. 9 Name the factors influencing the choice of the type of fire detector. 10 What types of detectors are divided into according to the nature of the reaction to the controlled sign? Give a description of each class. 37 Copyright JSC "Central Design Bureau" BIBCOM " & LLC "Agency Book-Service" 5 Laboratory work No. 4. Devices for receiving and control fire and security Purpose. To study the principle of operation of devices for receiving and control fire protection (PPKOP). Tasks. 1) Description of Control Panel, its structure and purpose. 2) Characteristics of the main parameters of the control panel. 3) Study the existing modes of equipment. 4) Study the typical connection diagram of the control panel, detectors and sirens. 5.1 Purpose of the fire and security control panel Devices control panels and control panels belong to the technical means of monitoring and recording information. They are designed to continuously collect information from the detectors included in the alarm loop, analyze the alarm situation at the facility, generate and transmit notifications about the condition of the facility to the centralized monitoring console, as well as control local light and sound alarms and indicators. In addition, the devices provide the delivery and disarming of the object according to the adopted tactics, and in some cases - the power supply of the detectors. Devices are the main elements that form an information-analytical system of a security or fire alarm system at the facility. Such a system can be autonomous or centralized. In case of autonomous protection, devices are installed in the premises (point) of protection, located on the protected object or in close proximity to it. In the case of centralized protection, the object complex of technical means, formed by one or several devices, forms an object subsystem of the security and fire alarm system, which, using the notification transmission system, transmits information about condition of the object to the centralized monitoring console, located in the center for receiving alarm notifications (central security point). The information generated by the device, both for autonomous and centralized protection, is transmitted to employees of special services for ensuring the protection of the object, which are entrusted with the functions of responding to alarm notifications coming from the object. The alarm loop is one of the necessary components of the object fire and security alarm system. It is a wire line that electrically connects the remote element, the output circuits of security, fire and security fire detectors with the input of the control panel. A fire and security alarm loop is an electrical circuit designed to transmit alarm and service notifications from detectors to the control panel, and also (if necessary) to supply power to the detectors. The alarm loop is usually two-wire; it includes remote (auxiliary) elements installed at the end of the electrical circuit. 5.2 The structure of the fire and security control panel To select the control panel, you first need to determine the type of alarm system used (threshold, addressable analog, combined). 1. Analogue (non-address) systems are built according to the following principle. The protected object is divided into areas by laying separate loops that unite a certain number of detectors. When any sensor is triggered, an alarm is generated throughout the loop. The decision on the occurrence of an event is “taken” only by the detector, the operability of which can only be checked during the maintenance of the alarm system. The disadvantages of such systems are the high probability of false alarms, localization of the signal with an accuracy to the loop, and limitation of the controlled area. The cost of such a system is relatively low, although a large number of loops must be laid. The tasks of centralized control are performed by the security and fire panel. The use of analog systems is possible on all types of objects. But with a large number of alarm areas, there is a need for a large amount of work on the installation of wired communications. 2. Addressable systems involve installation of addressable sensors on one alarm loop. Such systems make it possible to replace the multi-core cables connecting the detectors with the alarm control panel (PKP) with one pair of data bus wires. 3. Address non-interrogation systems are, in fact, threshold systems, supplemented only by the possibility of transmitting the address code of a triggered detector. These systems have all the shortcomings of analog systems - the impossibility of automatic control of the fire detectors performance (in case of any failure of the electronics, the detector's connection with the control panel is terminated). 4. Address interrogating systems carry out periodic interrogation of detectors, provide control of their performance in case of any type of failure, which allows you to install one detector in each room instead of two. In addressable polling OPS, complex information processing algorithms can be implemented, for example, auto-compensation for changes in the sensitivity of detectors over time. Reduces the likelihood of false positives. For example, an addressable glass break sensor, unlike a non-addressable one, will indicate which window was broken. 5. The most promising direction in the field of building signaling systems are combined (address-analogue) systems. Analogue addressable detectors measure the amount of smoke or temperature on the object, and the signal is formed on the basis of mathematical processing of the received data in the control panel (specialized computer). It is possible to connect any sensors, the system is able to determine their type and the required algorithm for working with them, even if all these devices are included in one security alarm loop. These systems provide maximum speed of decision-making and control. For the correct operation of the addressable analog equipment, it is necessary to take into account the language of communication unique for each system of its components (protocol). The use of these systems makes it possible to quickly, without high costs, make changes to an existing system when changing and expanding the zones of an object. The cost of such systems is higher than the previous two. The number of alarm loops is the most important parameter of the control panel. Devices are produced with the number of loops from 1 to 40. If there are not enough loops of one control panel to protect the facility, then it is necessary to design a modular alarm system, which is characterized by the fact that alarm instruments are connected by a network interface (RS-485, and for communication with a computer - RS-232 , Ethernet). Light and sound annunciators are connected to the receiving and control panel for notification functions. They can be either built into the control panel or external (remote). Also, any control panel contains a relay block that can be programmed to trigger any alarm loop or group of alarm loops. Types of relay contacts can be for closing, switching. Through the relay circuits, devices for transmitting fire / alarm notifications to the fire station control panel or centralized monitoring console via telephone line or radio channel can be connected. The structure of the control panel is shown in Figure 5.1. Figure 5.1 - Structure of the control panel 41 Copyright JSC Central Design Bureau "BIBCOM" & LLC "Agency Kniga-Service" 5.3 Task 1) Give a description of the control panel according to the variant, give its block diagram, formulate functions. 2) Provide the technical characteristics of the control panel. 3) Describe the existing operating modes of the equipment. 4) Present and describe a typical scheme for using the device. 5) Present and describe a typical loop diagram for signaling the device. PKP options are shown in Table 5.1. Table 5.1 - Task options PKP option PKP option PKP option 1 Astra-812-M 6 Kodos A-20 11 Tandem -2M 2 Signal 20 7 Granit-16/24 12 BShS8-I 3 Signal 10 8 Astra -713 13 Note -2 4 S2000 9 Quartz 14 Astra-712/2 5 A16-512 10 Signal-VK6 15 Granite-12 USB 5.4. Control questions 1 Describe the functions of the control panel. 2 What is the difference between control panels designed for targeted and threshold TSOs? 3 Name the main technical characteristics of the control panel. 4 Describe the block diagram and explain the purpose of each control panel node. 5 What is an alarm loop? How many loops are included in one control panel? 6 Name and describe the main operating modes of the control panel. 7 Give examples of types of control panel power supply. 8 How is the control panel powered? From what sources are the loops powered in case of power failures? 42 Copyright OJSC Central Design Bureau BIBCOM & LLC Agency Book-Service 6 Laboratory work No. 5. Warning systems Purpose. To study the classification of fire and security alarms, their structure, principle of operation and factors influencing their choice. Tasks. 1) Study the purpose and functions of the warning system. 2) Study the classes of security and fire alarms. 3) To study the factors influencing the choice of the type of annunciator. 4) Select annunciators taking into account the conditions at the protected object. 5) Build a scheme for the placement of annunciators at the facility. 6.1 Purpose of the warning system Warning systems can be part of security, fire and security fire systems. Accordingly, the main functions of such systems are the issuance of a signal about the penetration of the intruder or the occurrence of a fire at the facility. The main way to ensure the safety of people in case of fires in public buildings and structures is their evacuation to a safe area. A safe zone is considered to be the premises (areas) inside buildings and the space outside the building, where the impact of fire hazards on people is excluded. Warning and evacuation management system (SOUE) is a set of organizational measures and technical means designed to timely inform people about the occurrence of a fire and (or) the need and ways of evacuation. A fire warning zone is a part of a building where people are notified about a fire simultaneously and in the same way. Technical warning means - sound, speech, light and combined fire alarms, their control devices, as well as fire safety evacuation signs. 43 Copyright OJSC Central Design Bureau BIBCOM & LLC Agency Kniga-Service Static indicator is a fire safety evacuation sign with a constant semantic meaning. Dynamic pointer is an evacuation fire safety sign with a changeable semantic meaning. Automatic control - actuation of the SOUE by a command impulse of automatic fire alarm or fire extinguishing installations. Semi-automatic control - activation of the control system by the dispatcher upon receipt of a command impulse from automatic fire alarm or fire extinguishing installations. Evacuation is provided in accordance with GOST 12.1.004 - 91 by arranging the required number of evacuation routes and observing their required parameters, as well as organizing timely notification of people and managing their movement. The purpose of warning and evacuation management systems is: - to transmit information about the occurrence of a fire in a timely manner, - to contribute to the implementation of the plan for evacuating people from the facility. At small facilities, control panels or fire alarm control panels are used as control devices for these types of control systems, but, as a rule, most control panels have limited power to power warning devices. To solve this problem, when implementing notification functions at small facilities, PPK executive relays are used (as control circuits) and uninterruptible power supplies for systems (as devices that feed the alarm loops). It is necessary to remember that the mandatory requirements of the airbag are fulfilled: the implementation of the functions of hardware monitoring of the integrity of the lines (loopbacks) of annunciators, as well as the controlled performance of control and power devices. 6.2 Types of fire warnings When determining the type of fire warning system and choosing equipment for its design, it is necessary to be guided by regulatory documents approved in the manner prescribed by law. First of all, these are NPB 77-98 (Norms on 44 Copyright JSC "Central Design Bureau" BIBCOM" & OOO "Agency Kniga-Service" fire safety), establishing general technical requirements for technical means of warning and evacuation control, and NPB 104-03, establishing fire safety requirements for SOUE, as well as their types with the definition of a list of objects to be equipped with such systems. The requirements of these standards when choosing equipment and designing warning systems are mandatory. For most small and medium-sized objects, fire safety standards define the installation of SOUE of the 1st and 2nd types. Depending on the functional characteristics, SOUE are divided into five types, indicated in Table 6.1. Table 6.1 - Types of fire alerts Description of alert signals No. of alert type Sound alert (bells, toned signal, etc.). 1 Sound notification and light indicators "Exit". Notification should be made in all rooms at the same time. 2 Voice notification and the presence of "Exit" light indicators. The order of notification is regulated: first, the service personnel, and then all the rest according to the developed order. Voice notification, the presence of light indicators for the direction of movement and "Exit". Communication between the warning zone and the control room must be provided. The order of notification is regulated. Voice notification, the presence of light indicators for the direction of movement and "Exit". Light indicators of the direction of movement must be with separate inclusion for each zone. Communication between the warning zone and the control room must be provided. The order of notification is regulated. 3 4 5 6.3 Classification of security and fire sirens A security sirens is a technical means of security signaling designed to notify of a criminal threat at a protected facility. The fire annunciator is designed for timely transmission of information about the occurrence of a fire and the implementation of a plan for evacuating people from an object. The classification of fire and security alarm annunciators is shown in Figure 6.1. The main difficulty in the design of warning systems is the correct selection of the number, switching power and the optimal location of the sirens in the premises. Locations for the installation of annunciators should be selected based on achieving maximum audibility and intelligibility of the transmitted information. Figure 6.1 - Classification of security and fire annunciators As an example, let's take the combined security and fire annunciator MAYAK-12-KP. It is designed for light and sound notification of the state of the object, protected with the help of fire alarm devices. Characteristics are presented in table 6.2. Table 6.2 - Characteristics of the MAYAK-12-KP annunciator Parameter Value Operating temperature range, °С -30 ... +55 Overall dimensions, mm 80x80x42 DC supply voltage, V 10.8 … 13.2 Light annunciator consumption current, mA 25 Sound annunciator consumption current, mA 50 Sound signal volume level, dB 100 Nominal time of continuous operation of the annunciator in the "Alarm" mode, min. 60 Placement of fire alarms is implemented in accordance with the fire safety standards "Systems for warning and managing the evacuation of people in case of fires in buildings and structures" NPB 104-03. 6.4 Types of security alarms Classification, general technical requirements and test methods for security alarms are specified in GOST R 54126-2010. All annunciators are used to give a sound or light signal to attract the attention of the guards and psychological impact on the offender. Light annunciators use incandescent lamps, LEDs or pulsed light sources. Electromagnetic sirens and bells, electrodynamic loudspeakers and sirens, piezoelectric sirens are used as sound. Loudspeakers are used as speech. Combined - these are two different annunciators in one housing. Annunciators are classified depending on the nature of the generated signals, the presence of a built-in backup power source, and also according to the conditions of use. Classification of annunciators is given in Table 6.3. Table 6.3 - Classification of annunciators Purpose According to the nature of the generated signal, X1 According to the conditions of use, X2 According to the presence of a built-in power supply, X3 premises 1 For unheated premises (including under sheds) 2 For outdoor placement 3 Without built-in backup power supply a With built-in power supply b annunciator registered by the relevant state body responsible for the implementation of technical policy in this area; X5 - modification designation (the first modification is A, the second is B, etc. ); X6 - modernization designation (first modernization - 1, second - 2, etc.) An example of a symbol: OO "Sova" K3a-5 / A1. Combined security annunciator, for outdoor placement, without a built-in power supply, development serial number 5, modification A, with the name "Owl", the first modernization. in addition to an alarm signal, they should issue information signals for indicating the state of the control panel, for example: "Arming", "Disarming", "Marking the order", etc. The appearance of these signals must be different from the "Alarm" signal. The parameters of sound annunciator signals must comply with GOST 21786. The requirements for resistance to mechanical factors are established in the technical specifications for annunciators of a particular type in accordance with the operating conditions and product groups in accordance with GOST 16962. 6.5 Task 1) For a given object, select fire alarm means, taking into account specific conditions at the facility. (The objects are indicated in work No. 1). 2) Provide a technical description of the selected means of notification. 3) Select the type of security alarms for the given object. 4) Build a scheme for the placement of fire and security alerts at a given facility. Use the plan built in the first work. 6.6 Test questions 1 Define a security alarm. How are alerts classified? Give an explanation of each class. 2 What information signals should security alarms give out? Give examples of the use of various types of security alarms. 3 Define a fire alarm. How are fire alarms classified? Give an explanation of each class. 4 What information signals should fire alarms give out? Give examples of the use of various types of security alarms. 5 What are the rules for placing annunciators? 6 What specific conditions at the protected object should be taken into account when choosing annunciators? 7 How is the warning system powered? 49 Copyright JSC "Central Design Bureau "BIBCOM" & LLC "Agency Book-Service" 7 Laboratory work No. 6. Development of a security and fire alarm system Purpose. Obtain skills in designing a fire and security alarm for a given object. Tasks. 1. Vulnerability analysis of a given object. 2. Determination of recommendations for risk reduction. 3. Choice of the structure of the fire alarm system. 4. Selection and justification of fire and security alarm equipment. 5. Development of a scheme for the placement of engineering and technical means of fire alarm. 6. Development of a functional diagram of a security and fire alarm. 7.1 Vulnerability analysis of the facility 7.1.1 Assessment of threats at the facility One of the main tasks of the initial stage of designing a fire alarm system is to assess the threats of the facility and the existing physical security (protection) system. Based on the results of the assessment of security threats, an object and general basic recommendations are developed for the task of the system to provide fire and security alarms. The goals and objectives of conducting a threat assessment are: 1) determining the items of protection that are important for the life of the object (the most likely targets of intruders); 2) identification of possible threats and models of likely perpetrators of threats; 3) assessment of possible damage from the implementation of predicted security threats; 50 Copyright JSC "TsKB "BIBCOM" & LLC "Agency Kniga-Service" 4) assessment of the vulnerability of the object and the existing security system; 5) development of general recommendations for ensuring the safety of the facility. Protection items. The implementation of the vital interests of any enterprise is provided by its corporate resources. These resources must be securely protected from foreseeable security threats. For a protected object, the most important resources for life, and, consequently, the objects of protection are: 1) People (enterprise personnel); 2) Property: - important or scarce technological equipment; - secret and confidential documentation; - material and financial values; - finished products; - intellectual property (know-how); - computer facilities; - instrumentation, etc.; 3) Confidential information: on physical media, as well as circulating in internal communication channels and information, in the offices of the enterprise's management, at meetings and meetings; 4) Financial and economic resources that ensure the effective and sustainable development of the enterprise (capital, commercial interests, business plans, contractual documents and obligations, etc.). The listed items of protection are placed at the relevant production facilities (sub-objects) of the enterprise in buildings and premises. These sub-objects are the most vulnerable places, which are identified during the survey of the object. Security Threats. The main security threats that can lead to the loss of corporate resources of the enterprise are:  emergency (fire, destruction, flooding, accident, etc.); 51 Copyright JSC "Central Design Bureau "BIBCOM" & LLC "Agency Book-Service"  theft or damage to property;  unauthorized removal of confidential information;  deterioration in the efficiency of functioning, sustainability of development. The most dangerous threat to the safety of an industrial enterprise is an emergency that can lead to great material damage, threaten life and health of people, and at potentially hazardous facilities - catastrophic consequences for the environment and the population. An example of a threat assessment is shown in Table 7.1. Table 7.1 - Threat assessment of the enterprise No. Source of information 1 Design documentation 2 People, documents, technical equipment 3 Technological process 4 Voice information 6 Raw materials and production waste 52 Location Type of threat source and type of controlled area Intentional Shelving, exposure cabinets. Viya Zloumysh Regime Lennikov to the zone. sources of information All zones. Fire Threat perpetrator Degree of damage Competitors, industrial spies, employees High Terrorists, High Competitors, employees, electrical equipment failure Workshop. Zone Surveillance Competitors, Highly reinforced industrial protection. Spies Office Overheard Competitors, High Executive, and Industrial Meeting Room. spies Top protection zone. Warehouse. Collection and analysis Competitors, High Regime zone of waste industrial production spies Copyright OJSC Central Design Bureau BIBCOM & LLC Agency Book-Service In modern conditions, unauthorized actions of individuals: saboteurs, terrorists, criminals, extremists are of particular danger, can lead to most of the foreseeable threats. At the stage of threat analysis, together with the security service, during a preliminary examination of the object, a model of probable perpetrators of threats (violators) is formed, i.e. their quantitative and qualitative characteristics (equipment, tactics of actions, etc.). 7.1.2 Ways of intruder penetration Unauthorized penetration to the object is carried out mainly through windows, doors, balconies; on the perimeter - through the checkpoint, manholes in the fence and directly through the fence. Possible ways of intruder penetration are shown in Figure 7.1. Figure 7.1 - Possible ways of intruder's penetration 53 Copyright JSC "Central Design Bureau "BIBKOM" & LLC "Agency Kniga-Service" Traffic routes are indicated on the corresponding plans of security objects. Since the simulation is based on random events, it is advisable to outline several penetration options. The main elements of entry routes can be:  natural (gates, checkpoint doors);  auxiliary (windows, hatches, communication channels, tunnels, fire escapes);  specially created (breaks, tunnels, manholes). Possible intruder penetration paths are marked with lines on the plans (diagrams) of the territory, floors and premises of buildings, and the results of the analysis of the intruder penetration paths are entered in a table, a variant of which is indicated in Table 7.2. Given that the attacker will choose the path with the best parameters for solving his problem - with a higher probability and less penetration time, then the threats are ranked according to these parameters. Table 7.2 - Results of the analysis of the intruder's penetration paths No. source Price source Penetration path of the information source 1 2 3 Threat characteristics It is expedient to divide information protection into two groups: organizational and technical. The basis of organizational measures is regulation and access control. Organizational measures of engineering and technical protection of information determine the order and modes of operation of technical means of information protection. Regulation is the establishment of temporary, territorial and regime restrictions on the activities of employees of the organization and the work of technical means aimed at ensuring the security of information. The regulation provides for:  establishing the boundaries of controlled and protected areas;  determination of information protection levels in zones;  regulation of the activities of employees and visitors (development of the daily routine, rules of conduct for employees in the organization and outside it, etc.);  determination of the modes of operation of technical means, including the collection, processing and storage of protected information on a PC, the transfer of documents, the procedure for storing products, etc. Technical measures include measures implemented by installing new or upgrading used engineering structures and technical means of protecting information . A typical list is given in Table 7.3. Table 7.3 - List of methods and means of protection No. Type of threat 1 2 3 Method of protection Engineering and technical protection Penetration 1) Strengthening the mechanical 1) Engineering structures: 1) Beneficiaries to the strength of 1-ton fences, barbed wire, sources of in-boundaries. thick walls, gratings and films on the formation. 2) Discovery. windows, metal doors, safes. 3) Neutralization 2) Security detectors, television and deliberate airborne surveillance equipment. actions. 3) Alarm means, weapons, fire extinguishing means, backup power supply. Fire. 1) Detection at- 1) Fire detectors. fire signs. 2) Fire extinguishers, automatic. 2) Neutralization of the fire extinguishing system. fire. 3) Fireproof room safes. 3) fire protection. observation. 1) Spatial 1) Caches. hiding objects. 2) Covers, natural and artificial 2) Temporary covert masks while objects are running. means of observation. 3) Masking of the object; 3) Natural and artificial objects of observation. masks, camouflage paints, decoys, foams, fumes. 55 Copyright JSC "Central Design Bureau "BIBCOM" & LLC "Agency Kniga-Service" Development of 7.3 block diagram of the fire and security alarm system Typical composition of the fire and security system includes the following elements:  security and fire detectors;  receiving and control device;  uninterruptible power supply;  warning devices (light and sound);  control room;  lighting system;  ACS;  data transmission network. Depending on the value of the protected object, probable threats, conditions around the object, the choice of the structure of the security and fire system is made. An example of a block diagram of the OPS is shown in Figure 7.2. Peripheral devices Hardware part of the object Light annunciator Siren Fire loop PI PI PI PI OI IO Burglar loop OI UPS Key reader TM PKP OI BRO Light panel ST Converter RS485-RS232 ST PC Dispatching console Figure 7.2 - An example of a block diagram 56 ST BIBCOM" & LLC "Agency Kniga-Service" 7.4 Selection of equipment and development of specifications for fire alarm system The selection of equipment for the designed security and fire system is carried out after a comparative description of the equipment and an analysis of the applicability of devices depending on the interference situation at the facility. An example of a hardware specification is shown in Table 7.4. Table 7.4 - Specification of materials and equipment used PPKOP "Astra-Z8945" 1 pc. Magnetic contact security detectors IO 102-20 and IO 102-14 6 pcs. 315-1) 7 pcs. 18048.00 Fire detector IP 212-64 8 pcs. OPTO FLEX 4 pcs 20000.00 Sounder MAYAK-12ZM1 NI 2 pcs 658.00 Wire KSPVG 4x0.22 54 m 540.00 Wire ShVVP 3x0.5 8m 120.00 Total: 3 678.00 52813.00 57 Copyright JSC « Central Design Bureau "BIBKOM" & LLC "Agency Book-Service" 7. 5 Development of the layout of the alarm system equipment When developing the layout of the alarm system equipment, it is necessary to take into account the requirements for the geometric characteristics of premises and territories, as well as the technical characteristics of the devices. Designations of security and fire equipment in accordance with the requirements of the recommendations of RD 78.36.002-99 of the GUVO of the Ministry of Internal Affairs of Russia. Technical means of object security systems. Conditional graphic designations. An example of the layout of the fire alarm equipment is shown in Figure 7.3. First floor Second floor W W S S W W S S W S W W S S W W W S S S An example of a functional diagram is shown in Figure 7.4. 58 Copyright JSC "Central Design Bureau "BIBCOM" & LLC "Agency Book-Service" Figure 7.4 - Functional diagram of the FPS 59 Copyright JSC "CCB "BIBCOM" & LLC "Agency Book-Service" 7.7 Task 1) Compile a complete list of sources of protected information indicating location, security classification and type of information carrier. Record the results in a table according to the model of table 7.1. 2) Compile a list of threats for the listed sources of information on the protected object, indicating the likely damage and the rank of threats. Record the results in a table according to the model of table 7.2. 3) Make a model of a probable intruder. Define classes of offenders. The model is presented in the form of a table. 4) Develop a plan of the protected object and indicate the ways of penetration of the intruder and channels of information leakage. Modeled on Figure 7.1. 5) Develop recommendations for risk reduction. Build a table of methods and means of ensuring the security of the object according to the model of table 7.3. 6) Select equipment for the protection of the perimeter of the object. Make a table according to the model of table 7.4. 7) Select fire alarm equipment. Make a table according to the model of table 7.4. 8) Develop an equipment layout and a structural diagram of a security and fire alarm at the protected facility according to the samples of Figures 7.2 and 7.3. 9) Develop a functional diagram of the connections of the security and fire alarm according to the model of Figure 7.4. 7.8 Control questions 1 Describe the items included in the vulnerability analysis of the protected object? 2 60 Name examples of sources of information and types of threats at the facility. Copyright JSC "Central Design Bureau" BIBCOM " & LLC "Agency Book-Service" 3 Name typical methods and means of preventing threats. 4 Describe the main procedures for the physical protection of information sources. 5 Name recommendations for increasing the strength of fences. 6 Name the organizational measures to reduce threats at the facility. 7 Describe the perimeter means of protecting objects. 8 Describe the factors influencing the choice of detectors and loops. 9 Name the functions of security lighting. List the types of security lighting, the rules for placing sources of security lighting. 10 List typical measures to protect information from surveillance. 11 List typical measures to protect information from eavesdropping. 12 Describe the classes of detectors by purpose, principles of operation and type of detection zone. 13 Name the types of contact detectors, describe the principles of operation of magnetic contact detectors. 14 Name the types of acoustic detectors. Ways to improve the noise immunity of ultrasonic detectors. 15 Name the types of optical-electronic detectors. Principles of improving the noise immunity of passive and active optical-electronic detectors. 16 Name and describe the types and principles of operation of vibration detectors. 17 Explain the principles of operation of fire detectors. 18 List the advantages and disadvantages of heat detectors. 19 Explain the functions of control panels and centralized security panels. 20 What factors are taken into account when placing security and fire detectors at the facility? 61 Copyright JSC "Central Design Bureau "BIBCOM" & LLC "Agency Book-Service" List of references 1 Volkhonsky, V.V. Security alarm systems / V.V. Volkhonsky. - St. Petersburg: Ecopolis and Culture, - 2005. - 208 p. 2 Vorona, V.A. Engineering and fire protection of objects / V.A. Crow, V.A. Tikhonov. - - M.: Hotline - Telecom, 2012. - 512 p. 3 GOST R 54126-2010 Security annunciators. Classification. General technical requirements and test methods. 4 GOST 26342-84 Means of security, fire and security fire alarms. Types, basic parameters and sizes. 5 GOST R 50775-95 Alarm systems. Part 1. General requirements. Section 1. General Provisions. 6 Kornyushin, P.N. Information security: textbook / P.N. Kornyushin, S.S. Kosterin. - Vladivostok: FEGU, 2005. - 345 p. 7 Magauenov, R. G. Burglar alarm systems: fundamentals of theory and principles of construction: study guide / R. G. Magauenov. - M.: Hotline - Telecom, 2004. - 367 p. 8 Menshakov, Yu.K. Protection of objects and information from technical means of reconnaissance: textbook. allowance / Yu. K. Menshakov - M .: RGGU, 2002. - 296.p. 9 RD 25.953-90 Automatic fire extinguishing systems, fire, security and fire alarm systems. Notation conditional graphic elements of systems. 10 Sinilov, V.G. Security, fire and fire alarm systems / V. G. Sinilov. - M.: Publishing Center "Academy", 2010. - 512 p. 11 Streltsov, A.A. Organizational and legal support of information security: study guide / A.A. Streltsov, V.S. Gorbatov, T.A. Polyakov. - M .: Publishing Center "Academy", 2008. - 256 p. 12 Torokin, A.A. Engineering and technical protection of information: textbook / A.A. Torokin. - M.: Helios ARV, 2005. - 960s. 62

The head of the enterprise or the owner of any real estate must take care of protecting his property from the negative impact of man-made disasters and intruders. To ensure the safety of the premises and all the objects that are in it, not only specially trained people standing near the doors can. Modern technologies make it possible to ensure the safety of the premises thanks to specially designed connected subsystems into one system. Many are familiar with fire response systems and burglar alarm systems.

Security and fire alarms: the concept and its tasks

An integrated system that includes fire and security alarm systems is called a fire and security system. This system is becoming very popular today. Most often, the system is part of an integrated security complex. The main function of the fire and security alarm system is provided for by GOST 2642-84. Its main task is to receive, process and transmit, in the prescribed manner, information about a fire that has occurred at a protected facility or a fire or penetration of unauthorized people into it.

The main functions of the security and fire system are:

  • monitoring the state of the territory throughout the day;
  • detection of even the slightest fire at the facility;
  • determining the exact location of a fire or penetration of intruders;
  • information must be provided in an understandable form;
  • response to hacking attempts and system breakdowns;
  • response to malfunctions of the detection device.

The fire and security alarm is a complex system, has a rather high cost, but according to consumer reviews and experiments, it is the only reliable electronic protection device.

Modern security equipment includes several subsystems that depend on executive functions:

  • security - the device responds to any external penetration;
  • fire - the device reacts to the occurrence of any signs of a fire;
  • alarm - the device calls for the necessary help if a signal of an unexpected attack appears;
  • emergency - the device gives a signal in the event of some emergency situations: gas leakage, water breakthrough, water overflow, etc.

Each subsystem has its own strictly defined goals. All subsystems are combined into one security system by integrating with each other.

What is an alarm system that provides protection against fires and theft

The components of a fire and intruder control system are:

  • sensors that are danger signal receivers;
  • equipment that receives a danger signal;
  • elements that notify of a danger
  • communication settings;
  • autonomous battery (generator, battery);
  • programs that ensure the correct operation of the device.

The principle of operation of the alarm

The principle of operation of the fire alarm system is very simple. Sensors become the main receivers of information about a fire, the penetration of thieves or ill-wishers. About a fire or an attack, sensory mechanisms transmit information to the control panel, which is responsible for collecting data, and in more complex integrated systems, information is transmitted to the control panel. Once the information reaches its destination, the software triggers the system to respond.

The response itself depends on the hardware of the system. If the alarm is supplemented with an access control system, then due to the transmission of information, locks, gates, turnstiles begin to respond to the signal. During a fire, additional evacuation doors are opened to avoid an obstacle for people to leave the danger zone.

If the system is equipped with an automatic extinguishing program, then in case of danger it will necessarily work in conjunction with the smoke removal function. It is important when operating a fire alarm to block the operation of the power supply, which protects against additional danger.

When thieves enter and receive a signal about this, the system launches its own protection program, depending on the type of alarm.

Variety of security and fire systems

The modern equipment market represents a variety of choices for fire and security alarms. Consumers can choose from systems with a simplified security program, systems with additional sensors for monitoring environmental standards that respond to excess gas, water leakage, temperature or humidity levels.

The main signaling distribution occurs on:

  • Non-address;
  • Address;
  • Address questionnaires;
  • Non-polling address;
  • Combined.

This classification occurs on the basis of differences in the principle of operation of the alarm.

According to the principle of operation of the detectors, dangers are divided into:

  • ultrasonic;
  • light detectors;
  • vibration detectors;
  • radio wave;
  • acoustic;
  • infrared;
  • combined.

The following types of sensors are installed in the fire system:

  • reacting to smoke;
  • reacting to the temperature in the room;
  • reacting to flame;
  • gas responsive;
  • multisensory, which include a response to 4 signs of a fire;

All sensors are different from each other, have a different degree of sensitivity and reaction speed.

The following types of detectors are known in the security system:

  • sensors that respond to changes in the distance between the magnet on the doors (windows) and the reed switch;
  • detectors that respond to impact or surface damage;
  • sensors that respond to any movement inside the object of protection;
  • detectors that react to approaching or touching the object of protection.

According to the way they react to a particular problem, sensors are divided into active and passive.

According to the location of the alarm, there are:

  • internal;
  • External;
  • Combined.

There is a division of the system depending on the equipped sensors:

  1. According to the method of obtaining information, there are: analog and threshold;
  2. According to the location of the sensors relative to the room: internal and external;
  3. According to the way of responding to changes in space: linear, surface, volumetric;
  4. Depending on the response to individual objects: local and point;
  5. By the action factor: thermal, light, manual, combined, ionization;
  6. Depending on the physical impact: closing, capacitive, radio beam, seismic.

The result of the system

Thanks to the activity of the security and fire alarm, many objects are protected from sudden attack, penetration, accidents and fires. According to the statistics of unauthorized intrusion on objects in our country, this system is the most secure. It is enough to analyze the statistics to understand the importance of signaling:

  • 50% or more of unauthorized entry into facilities that have free access to working personnel and incoming customers;
  • About 25% of the territories were the objects of illegal penetration, while they were equipped with mechanical protection elements;
  • 20% of the objects protected by the access system were subject to illegal entry;
  • 5% of territories equipped with complex electronic security systems were subject to illegal actions of intruders.

Managers must be concerned about protecting their facilities and ensuring a high level of reliability through the organization of a multi-level security system.

Alarm sensors are installed in this case at several levels:

  • along the outer perimeter of the territory;
  • on windows and doors;
  • indoors;
  • on objects that are considered the most important in the protected area: safes, cabinets, boxes.

Each sensor installation point must be connected to its own separate cell of the device, which controls the signal from the sensor and responds to it. This avoids an intruder bypassing a separate point, as well as receiving a timely signal about the very first signs of a fire, attack or emergency.

Introduction


The relevance of research.

Fire and security alarm system - a set of technical means designed to detect a fire, process, transmit a fire notice in a given form, special information and issue commands to turn on automatic fire extinguishing installations, turn on the executive settings of systems against smoke protection, process and engineering equipment, and as well as other fire protection devices.

The theme of the work is "System of the security and fire alarm system" (OPS), within which the technical side of the fire alarm system was considered.

Object of study: security and fire alarms.

Subject of study: fire alarm system.

Objectives of the study: the fire alarm system consists in the timely detection, processing and transmission of the received signal about the onset of a fire, violation of access to the room, the submission of certain commands to the central console.

The scientific and theoretical significance of the study lies in the fact that the material of modern fire and security alarm systems has been analyzed, generalized and systematized.

The practical significance of the work is the development of an educational and methodological complex for studying the fire and security alarm system.


General part of the alarm system


The security alarm system (OS) is a set of interrelated technical means for detecting signs of an intruder being at protected facilities, collecting, processing, transmitting and presenting information to consumers in a given form. The functions of the fire and security alarm system (OPS) include the detection of both penetration and signs of fire at the facility. Technical means (TS) OPS in accordance with GOST 26 342-84 are classified according to two criteria: scope and functionality.

According to the field of application, vehicles are divided into security and security-fire. According to their functional purpose, vehicles are divided into two groups:

a) TC detection (detectors), designed to generate and transmit information about the status of monitored parameters;

b) TS alerts designed to receive, convert, transmit, store, process and display information (notification transmission systems, PPC, annunciators).

A detector is a primary technical means for detecting a change in the environment (intrusion, fire) and formatting a notice: security, fire, or both - security and fire.

A notification in the OPS technique is a message that carries information about the state of a protected object, transmitted using electrical, light and (or) sound signals. Notifications are divided into alarm and service. The alarm notification carries information about penetration or fire. The service notice contains information about arming, disarming, equipment malfunction, etc.

The security alarm loop (AL) is an electrical circuit connecting the output circuits of security detectors, including auxiliary (remote) elements (diodes, resistors) and connecting devices designed to issue notifications of intrusion, fire or malfunction to the control panel. In some cases, power supply to the detectors is provided through the loop.

The control panel (PPK) is used to receive a signal from the detectors, process it and transfer it in a convenient form either to the central console or further to another control panel.

A security and fire alarm is a technical means of an alarm system designed to notify people of an intrusion, an attempted intrusion and (or) a fire.

The autonomous security system consists of OPS complexes with access to annunciators and (or) another control panel installed at the autonomous security point.

Autonomous security point (PAS) is a point located at a protected facility or in close proximity to it, serviced by the security service of the facility and equipped with technical means for displaying information about penetration and (or) fire in each of the controlled premises (zones) of the facility for direct perception man.

A notification transmission system (STS) is a set of jointly operating technical means for transmitting via communication channels and receiving at a centralized security point notifications about penetration into protected objects and (or) a fire at them, service and control and diagnostic notifications, as well as for transmitting and receiving telecontrol commands (if there is a reverse channel).

SPI provides for the installation of terminal devices (UO) at facilities, repeaters (R) at ATS cross-countries, in residential buildings and other intermediate points and centralized monitoring consoles (CMS) at centralized security points.

The centralized protection point (CPS) is a dispatching center for the centralized protection of a number of dispersed objects from penetration and fire using the SPI.

Depending on the characteristics of the OO (length, number of rooms, number of storeys, etc.) and the value of the material assets located at the facility, its protection can be implemented through one or more alarm loops. In the event that the security structure of the object includes several loops placed in such a way that when an intruder enters the OO and moves to material values, he needs to overcome several protected zones controlled by various loops with exits to individual monitoring station numbers, security should be considered as multi-line .Thus, a loop or a set of loops that control protected areas on the way of the intruder to the material assets of the OO and have access to a separate monitoring station number is called the signaling boundary ,and the set of protected zones controlled by the signaling boundary is the guard boundary.


Description of the design of the OPS system


The OPS complex for the protection of buildings includes:

a) primary sensors that directly monitor the assigned territory;

b) a controller (control panel) that collects and analyzes sensor readings, as well as controls the entire security system and develops its response to possible emergency situations;

c) a control panel (keyboard) designed to arm and disarm the premises.

There are several types of primary sensors of the alarm system - depending on the specific situation, certain devices can be used, as well as groups of devices that control the same territory according to different parameters. Let's start with the most common ones.

Volumetric infrared motion sensor.

As the name implies, the device controls the change in the thermal field of the room. At the same time, the system setup and the installation location of the sensor must take into account the presence of animals in the house. Cats and small dogs can be ignored at the hardware or software level, but large dog breeds comparable in size to a human on all fours will cause a false positive.

Magnetic contact sensor.

Installed on doors and windows, it reacts to their opening. The device consists of two parts: one of them, equipped with a permanent magnet, is placed on the movable element of the door or window. The second is connected to the corresponding circuit of the controller and is a reed switch soldered into the housing. When both parts of the sensor are aligned, the magnet acts on the reed switch, the circuit is closed. When you try to open the window, the magnet moves away from the reed switch, the circuit opens, and an alarm is sent from the controller. It remains to add that such devices can be both overhead, that is, fixed on doors and windows from the side of the room, and built-in (hidden), cut into the movable and fixed parts of the structure. In the latter case, access to the sensor elements themselves and the wiring for an intruder is much more difficult.

Mechanical disconnect.

It can be considered a kind of magnetic contact sensor - of course, not by design, but by the principle of operation. A device consisting of a housing with a button is installed on the fixed part of the door or window, and the movable part presses on the sensor button, thereby closing the contact. The rest of the mechanical circuit breaker works similarly to the magnetic contact. By and large, this technology is outdated, but many manufacturers still continue to produce such devices.

acoustic sensor.

It reacts to the sound of breaking window glass, and therefore is installed in close proximity to the window. By itself, this sensor is useless if, for example, an attacker does not break glass, but uses a glass cutter. For this reason, such sensors cannot be the main or the only ones and are used as an addition to other devices.

vibration sensor.

The device is mounted on the wall and captures the vibration at the stage of creating a breach. It is also not recommended for use as the main or sole control sensor. The most widespread scope - protection of especially important rooms.

Smoke sensor.

This device belongs to the fire department of the OPS and reacts to the appearance of smoke in a controlled room. The smoke rises to the ceiling and spreads over its surface, and this is where the smoke sensor is installed. Obviously, it cannot be used, for example, in a garage or kitchen, where the formation of smoke is quite normal, otherwise false alarms of a fire alarm may occur when cooking or warming up a car engine.

Temperature sensor.

Also related to the fire department of the OPS, this sensor is triggered by a significant increase in the temperature in the room, and on condition that it increases for at least 10-30 seconds. The device is used either in tandem with a smoke sensor, or separately - for garages and kitchens.

Technical means of security and fire alarms designed to obtain information about the state of monitored parameters at a protected facility, receive, convert, transmit, store, display this information in the form of sound and light alarms, in accordance with GOST 25 829-78 is classified into two features: scope and functionality.

According to the field of application, vehicles are divided into security, fire and security-fire; according to their functional purpose - to technical means of detection (detectors) designed to obtain information about the state of controlled parameters and notification vehicles, intended for receiving, converting, transmitting, storing, processing and displaying information (SPI, PPC and annunciators).

In accordance with GOST 26342-84, security and fire detectors are classified according to the following parameters.

By appointment: for enclosed spaces, for open areas and perimeters of objects.

By the type of zone controlled by the detector: point, linear, surface, volumetric.

According to the principle of operation, security detectors are divided into: volumetric, magnetic contact, shock contact, piezoelectric, capacitive, ultrasonic, optoelectronic, radio wave, combined.

By the number of detection zones: single-zone, multi-zone.

According to the range of action, ultrasonic, optoelectronic and radio wave security detectors for enclosed spaces are divided into: short range - up to 12 m, medium range - from 12 to 30 m, long range - over 30 m.

According to the range of action, optoelectronic and radio wave security detectors for open areas and perimeters of objects are divided into: short range - up to 50 m, medium range - from 50 to 200 m, long range - over 200 m.

According to their design, ultrasonic, optoelectronic and radio wave security detectors are divided into: single-position transmitter (emitter) and receiver are combined in one block (there may be several transmitters and receivers in one block) two-position transmitter (emitter) and receiver are made in the form of separate blocks, multi-position - more than two blocks in any combination. According to the method of power supply, they are divided into: current-consuming (dry contact is used); powered by AL, from an internal autonomous power source, from an external DC source with a voltage of 12-24 V, from an AC network with a voltage of 220 V; According to the principle of operation, security and fire detectors are divided into: magnetic contact, ultrasonic and optoelectronic. According to the number of detection zones, range and design, security and fire detectors are classified similarly to security detectors.

sensor alarm security protection

Calculation of the placement of sensors in real room conditions


The calculation is carried out according to the tables of the set of rules 5.13130.2009 "Fire protection systems.

The area controlled by one point smoke detector, as well as the maximum distance between the detectors and the detector and the wall, must be determined according to Table 1, but not exceeding the values ​​\u200b\u200bspecified in the technical specifications and passports for the detectors.


Table 1 - Calculation of the placement of smoke fire detectors

Height of the protected premises, m Average area controlled by one detector, m2 Maximum distance between detectors from the detector to the wall Up to 3.5 Up to 859.04.5 St. 3.5 to 6.0 to 708.54.0 St. 6.0 to 10.0 to 658.04.0 St. 10.5 to 12.0 to 557.53.5 Table 2 - Calculation of the placement of thermal fire detectors

Height of the protected premises, m Average area controlled by one detector, m2 Maximum distance between detectors from the detector to the wall Up to 3.5 Up to 255.02.5 St. 3.5 to 6.0 to 204.52.0 St. 6.0 to 9.0 to 154.02.0

The area controlled by one point thermal fire detector, as well as the maximum distance between the detectors and the detector and the wall, will be determined from table 2.

The calculation of the number of fire detectors per area is calculated by the formula: PI \u003d Spom. / hp.p.

Where Spom is the area of ​​the room; hp.p is the average area controlled by one detector.


Organization of the protection of objects with the help of security alarms


Protection of the perimeter of the territory and open areas.

Technical means of perimeter security alarms should be selected depending on the type of perceived threat to the object, interference conditions, terrain, the length and technical strength of the perimeter, the type of fence, the presence of roads along the perimeter, the exclusion zone, its width. The security alarm of the perimeter of the object is designed, as a rule, as a one-line one. To strengthen security, determine the direction of movement of the intruder, block vulnerabilities, multi-line security should be used.

Perimeter security alarm technical means can be placed on the fence, buildings, structures, structures or in the exclusion zone. Security detectors should be installed on walls, special poles or racks, ensuring the absence of oscillations, vibrations.

The perimeter, with the gates and wickets entering it, should be divided into separate protected areas (zones) with their connection by separate alarm loops to the low-capacity control panel or to the internal security console installed at the checkpoint or in a specially designated security room of the facility. The length of the section is determined based on security tactics, technical characteristics of the equipment, the configuration of the external fence, line-of-sight conditions and the terrain, but not more than 200 m for ease of technical operation and prompt response.

The main gate should stand out in an independent section of the perimeter. Spare gates, wickets must enter the section of the perimeter on which they are located. Medium and large-capacity control panels (hubs), SPI, automated notification transmission systems (ASPI) and radio notification transmission systems (RSPI) can be used as internal security consoles. Internal security consoles can operate both with direct round-the-clock duty of personnel on them, and autonomously in the "Self-protection" mode.

Installation of security detectors on the top of the fence should be carried out only if the fence has a height of at least 2 m.

At the checkpoint, in the security room, technical devices for graphic display of the protected perimeter (computer, light panel with a mnemonic diagram of the protected perimeter and other devices) should be installed. All equipment included in the perimeter alarm system must be tamper-proof. Open areas with material assets on the territory of the facility must have a warning fence and be equipped with volumetric, surface or linear detectors of various operating principles.

Protection of the building, premises, individual items


All premises with permanent or temporary storage of material assets, as well as all vulnerable areas of the building (windows, doors, hatches, ventilation shafts, ducts, etc.), through which unauthorized entry into the premises of the facility is possible, should be equipped with technical means of security alarms.

Objects of subgroups A1, A2 and B2 are equipped with a multi-line alarm system, objects of subgroup B1 - single-line.

The first line of the security alarm, depending on the type of alleged threats to the object, is blocked by: wooden entrance doors, loading and unloading hatches, gates - for "opening" and "destruction" ("break"); glazed structures - for "opening" and "destruction" ("breaking") of glass; metal doors, gates - for "opening" and "destruction", walls, ceilings and partitions that do not meet the requirements of this Guiding Document or behind which premises of other owners are located, allowing for hidden work to destroy the wall - for "destruction" ("breach" ), shells of storages of values ​​- for “destruction” (“break”) and “impact”; grilles, blinds and other protective structures installed on the outside of the window opening - for "opening" and "destruction"; ventilation ducts, chimneys, places of input / output of communications with a cross section of more than 200x200 mm - for “destruction” (“break”);

Instead of blocking glazed structures for "destruction", walls, doors and gates for "breach" and "impact", it is allowed, in justified cases, to block these structures only for "penetration" using volumetric, surface or linear detectors of various operating principles . At the same time, it should be borne in mind that the use of passive optoelectronic detectors for this purpose ensures the protection of the premises only from the direct penetration of the intruder.

If it is impossible to block the entrance doors of openings (vestibules) by technical means of early detection, it is necessary to install security detectors in the doorway between the main and additional doors that detect the intruder's penetration. These detectors should be included in one loop of the door lock burglar alarm. To exclude possible false alarms when the object is armed, the specified alarm loop must be output to the control panel, which has a delay in arming the object.

Detectors that block entrance doors and non-openable windows of the premises should be included in different alarm loops in order to be able to block windows in the daytime when the door security alarm is turned off. Detectors that block entrance doors and openable windows can be included in one alarm loop.

The second frontier of the burglar alarm protects the volume of premises for "penetration" with the help of volumetric detectors of various principles of operation. In large rooms with a complex configuration that require the use of a large number of detectors to protect the entire volume, it is allowed to block only local zones (vestibules between doors, corridors, approaches to valuables and other vulnerabilities)

The third line of the security alarm in the premises is blocked by individual items, safes, metal cabinets, in which valuables are concentrated. The technical means of protection installed in buildings should fit into the interior of the premises and, if possible, be installed hidden or masked.

In different areas, it is necessary to use security detectors operating on different physical principles of operation. The main types of detectors that protect the premises of the object and its structures from the alleged method of criminal influence.

The number of burglar alarm loops should be determined by security tactics, the size of buildings, structures, structures, number of storeys, the number of vulnerabilities, as well as the accuracy of localization of the penetration site for prompt response to alarms.

The perimeter of a protected building, as a rule, should be divided into protected zones (facade, rear, sides of the building, central entrance and other areas) with their allocation into independent alarm loops and the issuance of separate signals to the control panel or the internal control panel of the facility.

To enhance security and increase its reliability, additional detectors - traps should be installed at the facilities. Trap signals are output via independent or, in the absence of technical feasibility, via existing security alarm loops. Each room of subgroups A1 and A2 must be equipped with independent security alarm loops. The premises of subgroups B1 and B2, assigned to one financially responsible person, owner or combined for any other reason, should also be equipped with independent security alarm loops, and, for ease of operation, no more than five adjacent rooms located on the same floor should be blocked with one loop .

In premises where personnel must be around the clock, separate sections of the perimeter of the premises, as well as safes and metal cabinets for storing valuables and documents, should be equipped with a burglar alarm.

Organization of the transmission of information about the alarm. The transfer of notifications about the operation of the security alarm from the object to the ARC can be carried out from the small-capacity control panel, the internal security console or terminal devices.

The number of security alarm lines displayed on the ARC by separate numbers is determined by a joint decision of the management of the facility and the private security unit based on the category of the facility, risk analysis and potential threats to the facility, the possibilities of integrating and documenting the control panel (internal security console or terminal device) of incoming information, as well as the procedure for organizing the duty of security personnel at the facility.

The minimum required number of security alarm lines displayed on the ARC from the entire protected facility should be for a subgroup.

B1 - one united frontier (the first is the perimeter); BII - two combined frontiers (the first is the perimeter and the second is the volume) *.

In addition, if there are special premises at the facility (subgroup A2, safes, weapons rooms and other premises requiring increased security measures), the boundaries of the security alarm of these premises are also subject to the ARC.

If there is an internal security console at the facility with round-the-clock duty of its own security service or a private security company, the ARC displays: one common signal that unites all the boundaries of the security alarm of the facility, with the exception of the boundaries of special premises of the facility; security alarm boundaries (perimeter and volume) of special premises. At the same time, registration of all incoming information from each security line of premises on the internal security console should be ensured.

If there is an internal security console at the facility with round-the-clock duty of private security officers (Micro-PCO), all the boundaries of the security alarm of all premises of the facility (including special rooms) are connected to the internal security console, which provides automatic registration of all incoming information, and one general signal to the ARC.

At facilities where only special premises are guarded, all security alarm lines of these premises are subject to output to the PSC.

When protecting only individual devices (ATMs, slot machines, distribution cabinets and other similar devices), one line of the security alarm is displayed on the ARC (blocking for "destruction" and "opening").

If there is no technical possibility at the protected facility to fulfill the requirements, the issues of removing the boundaries of the security alarm are decided by the private security unit in each specific case. The boundaries of the security alarm should be displayed on the ARC from the internal security console, control panel or terminal device, which ensures that the alarm condition is memorized and fixed on a remote light (sound) annunciator or indicator. For objects of the residential sector, it is allowed to use terminal devices and object blocks without corresponding storage of the alarm state and its fixation.

Notifications from the alarm loops are output by one combined signal to the ARC and / or to the duty department of the internal affairs bodies directly or through the control panel, the SPI terminal device, the internal security console.

Security and alarm notifications can be transmitted to the ARC via specially laid communication lines, free or switched telephone lines for the period of protection, a radio channel, busy telephone lines using compaction equipment or informant SPI via a dial-up telephone connection (“auto-dialing” method) with mandatory channel control between the protected object and ARC. From protected objects, "auto redial" should be carried out by two or more telephone numbers.

In order to exclude access of unauthorized persons to detectors, control panels, splitting boxes, and other security equipment installed at the facility, measures must be taken to mask and covertly install them. The covers of the terminal blocks of these devices must be sealed (sealed) by an electrician of the security guard or an engineering and technical worker of the private security unit indicating the name and date in the technical documentation of the facility.

Distribution cabinets intended for crossing alarm loops must be lockable, sealed and have blocking (anti-tamper) buttons connected to individual numbers of the internal security console “without the right to turn off”, and in the absence of an internal security console - to the ARC as part of the alarm system .


Safety during installation and operation of the product


When connecting, installing and operating devices that are part of the fire alarm system, you must be guided by the "Rules for the technical operation of consumer electrical installations" and "Safety regulations for the operation of consumer electrical installations".

Persons who have studied this manual, as well as those who have passed safety attestation for the 3rd group of admission during the operation of electrical installations, have been instructed in safety at the workplace, are allowed to work with the System.

Carrying out all work on connection and installation of the System devices does not require the use of special protective equipment.

It is not allowed to use abrasive and chemically active substances when cleaning contaminated surfaces.

It is forbidden to install the System devices on current-carrying surfaces and in damp rooms (with humidity above 80%).

It is recommended to install the System devices in the places most suitable for their functional purpose and meeting additional requirements (for example, ensuring the confidentiality of the information entered, exclusion of unauthorized access by unauthorized persons, etc.), while their maintenance should not be hindered. Before connecting the System devices, it is necessary to study the technical characteristics, principles of operation and connection features of these devices.

a) When connecting the equipment, it is necessary to strictly observe the polarity of the connection of the System devices.

b) The choice of wires and cables, methods of their laying should be made in accordance with the requirements of SNiP 3.05.06-85

c) When connecting the connecting wires to the terminals of the devices, do not use excessive force when tightening the screws in order to avoid the failure of the terminals.

d) When setting the hardware addresses of devices that have DIP switches for this purpose, do not use excessive force when changing the position of the switches in order to avoid their failure.

e) In order to avoid failure of the blocks that provide communication between the System devices via the RS-485 protocol, when several devices are powered from different sources, the negative power leads of these devices must be combined.

Installation and adjustment work should be started only after the implementation of safety measures in accordance with SNiP III-4-80.

During installation, transportation, storage, decommissioning and disposal of radioisotope fire detectors, the requirements of the Basic Sanitary Rules for Working with Radioactive Substances and Other Sources of Ionizing Radiation OSP-72/87 must be met.

When working with hand power tools, it is necessary to comply with the requirements of GOST 12.2.013-87.

When working with adhesives, precautions and safety rules should be observed in accordance with the requirements of GOST 12.1.007-76.

In this chapter, safety precautions were considered during the operation of the alarm system. On the basis of the chapter, the following conclusions can be drawn: if the operating conditions of the alarm systems are properly observed, there is no particular threat to life and health, the percentage of injuries is reduced to a minimum.


Conclusion


Thus, to sum up, we come to the following conclusion - technical means of security and fire alarm systems designed to obtain information about the state of controlled parameters at a protected facility, receive, convert, transmit, store, display this information in the form of sound and light alarms.

In this graduation project, the main devices of the fire alarm system were considered, a scheme of the fire alarm system was developed for a training stand in fire safety engineering.

The existing alarm systems and their characteristics, as well as the characteristics of sensors and structures of the alarm system, methods of installation and commissioning of the alarm system are considered.

Measures have been developed to ensure safe working conditions and requirements for the operation of the OPS system.


List of used literature


1. GOST 12.1 004 - 91 SSBT. Fire safety. General requirements.

Korolev S.G. Rules for the installation of electrical installations. Energoatomizdat.-M.: Ekskmo, 2008.-256 p.

Ordinary F.A. Security and fire alarm systems. - St. Petersburg: Peter, 2002.- 360s.

Sinilov V.G. Security, fire and fire alarm systems: textbook. for the beginning prof. education. - M.: IRPO; ProfObrIzdat, 2001.-267 p.

Starshinov B.P. Fire safety systems - M .: Moscow Publishing House, 2003.-164 p.


Tutoring

Need help learning a topic?

Our experts will advise or provide tutoring services on topics of interest to you.
Submit an application indicating the topic right now to find out about the possibility of obtaining a consultation.

Laboratory work on the topic: Modern office and building security and fire alarms: purpose, description, classification and characteristics of the alarm

As a rule, fire and security alarms are integrated into a complex that combines security systems and building engineering systems, providing reliable address information for access control, warning, fire extinguishing, smoke removal systems, etc.

The structure of the fire and security alarm

Depending on the scale of the tasks that the security and fire alarm system solves, it includes equipment of three main categories:

equipment for centralized control of fire and security alarms (for example, a central computer with software installed on it for managing fire and security alarms; in small fire and security alarm systems, centralized control tasks are performed by the security and fire panel);

equipment for collecting and processing information from sensors of the security and fire alarm: control devices for security and fire (panels);

sensor devices - sensors and announcers of the security and fire alarm system.

The integration of security and fire alarms as part of a unified security and fire alarm system is carried out at the level of centralized monitoring and control. At the same time, the security and fire alarm systems are administered by control posts independent of each other, maintaining autonomy as part of the fire and security alarm system. At small facilities, fire and security alarms are controlled by control panels.

The control panel supplies power to security and fire detectors via the security and fire alarm loops, receives alarm notifications from the detectors, generates alarm messages, and also transmits them to the centralized monitoring station and generates alarm signals for triggering other systems.

The security alarm system as part of the security and fire alarm system performs the tasks of timely notification of the security service about the fact of unauthorized entry or attempted entry of people into the building or its individual premises, fixing the date, place and time of violation of the security line.

The fire alarm system is designed for timely detection of a fire and the formation of control signals for fire alarm systems and automatic fire extinguishing.

Domestic regulatory documents on fire safety strictly regulate the list of buildings and structures to be equipped with automatic fire alarms. Currently, the entire list of organizational and technical measures at the facility during a fire has one main goal - saving people's lives. Therefore, the tasks of early fire detection and alerting personnel come to the fore. The solution of these problems is assigned to the fire alarm, the main functions of which are formulated in the following definition.

Fire alarm (according to GOST 26342-84) - receipt, processing, transmission and presentation in a given form to consumers using technical means of information about a fire at protected facilities.

The main functions of the fire alarm system are provided by various technical means. Detectors are used to detect a fire, for processing and logging information and generating control alarms - receiving and control equipment and peripheral devices.

In addition to these functions, the fire alarm should generate commands to turn on automatic fire extinguishing and smoke removal systems, fire alarm systems, technological, electrical and other engineering equipment of objects. Modern fire and security alarm equipment has its own advanced warning function. Despite the fact that fire warning systems are singled out as an independent class of equipment, on the basis of fire alarm technical means of quite a few manufacturers, it is possible to implement warning systems of categories 1 and 2 (according to NPB 104-03).

Fire alarm detectors

To obtain information about the alarm situation at the facility, the fire and security alarm system includes detectors that differ from each other in the type of controlled physical parameter, the principle of operation of the sensitive element, and the method of transmitting information to the central alarm control panel.

According to the principle of generating an information signal about penetration into an object or a fire, fire alarm detectors are divided into active and passive.

Active fire and security alarm detectors generate a signal in the protected area and respond to changes in its parameters.

Passive detectors respond to changes in environmental parameters caused by an intruder or fire.

Depending on the methods for detecting alarms and generating signals, detectors and fire alarm systems are divided into conventional, addressable and addressable analog.

In non-address systems, detectors have a fixed sensitivity threshold, while a group of detectors is included in a common fire and security alarm loop, in which, in the event that one of the fire and security alarm devices is triggered, a generalized alarm signal is generated.

Address systems are distinguished by the presence in the notice of information about the address of the fire alarm device, which allows you to determine the fire zone with an accuracy of the location of the detector.

The address-analogue security and fire alarm system is the most informative and developed. In such a system, “intelligent” fire and security alarm detectors are used, in which the current values ​​of the controlled parameter, together with the address, are transmitted by the device via the security and fire alarm loop. This monitoring method is used for early detection of an alarm situation, obtaining data on the need for maintenance of devices due to pollution or other factors. In addition, analog addressable systems make it possible, without interrupting the operation of the fire and security alarm, to programmatically change the fixed sensitivity threshold of the detectors if it is necessary to adapt them to the operating conditions at the facility.

Each type of detector has its own list of basic technical characteristics determined by the relevant standards. At the same time, even detectors of the same type have differences in the design features of their components, ease of use, reliability, design level, which is taken into account when choosing a particular device or manufacturer.

Reception and control equipment for fire and security alarms

To receive and process notifications, the security and fire alarm system uses various types of receiving and control equipment: central stations, control panels, receiving and control devices (the name is determined by the standards of the country of origin, hereinafter we will use the term "control panel"). This equipment is distinguished by information capacity - the number of controlled alarm loops and the degree of development of control and notification functions. There are control panels for fire and security alarms for small, medium and large objects. As a rule, small objects are equipped with conventional systems that control several loops of the security and fire alarm, and at medium and large objects, addressable and addressable analog systems are used.

A distinctive design feature of the addressable and addressable-analogue fire and security alarms is the use of a ring alarm loop, which has increased protection against violation of communication lines with detectors. As a rule, the ring loop of control panels from different manufacturers is hardware-compatible with detectors developed by the same companies. Some control panels support multiple loop topology options, making it easier to design a fire alarm on site.

For compatibility of addressable or addressable-analogue fire and security alarms with non-address detectors (including those of other manufacturers), control panels can additionally support control of non-addressed security and fire alarm loops.

fire burglar alarm detector

Control and notification functions are implemented in control panels using specialized input and output interfaces. To display information, the security and fire alarm system widely uses built-in light and alphanumeric indicators, sound signaling devices. The output interface in fire alarm control panels for small facilities is usually a set of relay outputs. At large facilities, fire and security alarm systems are built using network technologies, so fire control panels are equipped with external RS422 or RS48 interfaces, and are also capable of interacting via Ethernet or using a dial-up modem connection. Structurally, interface nodes can be included in the control panel (located on a common printed circuit board). A more preferable option is their implementation in the form of separate printed circuit boards, mounted, if necessary, inside the control panel housing.

Peripheral devices for fire and security alarms

Peripheral devices are considered to be all fire and security alarm devices (except detectors) that have an independent design and are connected to the fire and security alarm control panel via external communication lines. The following types of fire alarm peripherals are most commonly used:

control panel - used to control fire and security alarm devices from a local point of the object;

short circuit isolation module - used in fire and security alarm loops to ensure their operability in case of a short circuit;

non-address line connection module - for control of non-address fire alarm detectors;

input / output module - for monitoring and controlling external devices (for example, automatic fire extinguishing and smoke removal installations, technological, electrical and other engineering equipment);

sound annunciator - for notification of a fire or alarm at the required point of the object using an audible alarm;

light annunciator - for notification of a fire or alarm at the required point of the object using light signaling;

message printer - for printing alarm and service system messages.

Integration of fire and security alarms with integrated building security systems

When installed at large facilities, to ensure the required level of building security, the fire alarm system is integrated with other security and life support systems of the facility. This is necessary for a quick response to a message about a fire or an alarm received from the sensors of the security and fire alarm systems, and to provide optimal conditions for eliminating the emergency situation that has arisen. For example, in response to a fire message generated by a fire and security alarm, the following actions are performed in the alarm zone:

Turn off ventilation.

Switching on the smoke exhaust system.

Shutdown of power supply (except for special equipment).

Conclusion from the disturbing zone of elevators.

Turn on emergency lighting and light indication of ways and exits for evacuation of people.

Unblocking emergency exits on evacuation routes.

Turn on the notification system with information for the alarm zone.

Thus, the security and fire alarm becomes part of the overall security system, while not only the issues of general monitoring from the main guard post, but also the interaction of all subsystems are solved. In the latter case, one of the most important requirements for the fire and security alarm system must be met - the possibility of its integration into the overall security system. Integration may be required both at the simplest (relay) level and at the software level, when compatibility of data exchange protocols in information buses and communication lines of various subsystems is necessary. An important role in this is played by the support of one or more network technologies from the security and fire alarm equipment: Ethernet, Arcnet, Lonwork, Internet, etc.

Power supply for fire alarm devices

All fire and security alarm devices must be provided with uninterrupted power supply. As a rule, the mains power supply of the control panels of the fire and security alarm is used as the main one, the rest of the devices are powered by low-voltage secondary DC sources or from the security and fire alarm loop. In accordance with domestic fire safety standards, the fire alarm system must function uninterruptedly in the event of a power failure at the facility during the day in standby mode and at least 3 hours in alarm mode. To fulfill this requirement, the fire alarm system must use a backup power supply system - additional sources or built-in batteries.

To create an appropriate level of security at the facility, it is necessary to install security and fire alarms. The fire alarm system is a combination of technical means for detecting a fire and detecting attempts of illegal access to a protected perimeter. Two subsystems have common communication channels, similar algorithms for receiving, processing and transmitting information, alarm signals. In order to save money, it is best to combine them.

OPS systems are by far the most common. These protective lines allow you to create an appropriate level of security for the protected object.

Thanks to the combination of technological means, the operation of this kind of subsystems is based on several types of alarms: security, fire and emergency. Security detects attempts of illegal entry, fire - the presence of fire, emergency warns of emergency situations (gas leak, rupture of water supply, etc.).

What are the main tasks of security and fire systems?

OPS systems are built on combinations that are integrated with each other. However, the goals set are individual for each subsystem. The following fire alarm tasks are distinguished:

  • Reception, processing, transmission of information about the occurrence of a fire;
  • Determining the location of the fire;
  • Sending a command to the automatic fire extinguishing mechanism;
  • Starting the operation of the smoke removal subsystem.

The tasks of the security alarm are:

  • Detection of all attempts of illegal access to the protected area;
  • Fixing the place and time of violation of access rules;
  • Transfer of information to a computerized control panel.

Despite the fact that individual goals are distinguished for both subsystems, the installation of fire alarm systems in an enterprise is designed to fulfill one common task: to ensure a timely response to a conditioned factor and the transmission of relevant information about an ongoing event.

On the video - about how the fire alarm system works:

Complex composition of integrated security and fire systems

OPS systems in their complex composition may differ from each other. First of all, it depends on the tasks that the fire alarm system performs. As a rule, this complex includes three main categories of equipment:

  • A device for centralized control and management of the operation of fire alarm systems (a computer equipped with specialized software, a central control panel, a receiving and control mechanism);
  • Devices for receiving, collecting and analyzing information coming from OPS sensors;
  • Signaling and sensory mechanisms (various types of sensors and notification devices).

Management of the operation of the FPS system and control over its implementation is carried out by a centralized device. Despite this, each alarm can be managed by separate enterprise security services. When installing such protective circuits, the autonomy of the operation of each subsystem as part of an integral complex is preserved.

Fire and security alarm systems are equipped with sensors that allow you to detect the occurrence of an alarm. As a rule, the technical characteristic of the sensor determines the parameters of the entire protection circuit. Mechanisms for receiving, collecting and analyzing information coming from sensors of the alarm system are actuating devices. They allow you to perform a programmed algorithm of actions in response to an alarm signal.

A feature of the fire and security alarm system is the possibility of its installation in two ways. The first is an alarm system with closed (local) protection, i.e. arming is carried out inside the facility with the transfer of relevant information to the security service of the institution. The second is arming in special units (private or non-departmental) and the fire service of the Ministry of Emergency Situations.

Classification of OPS system complexes

At the protected object, system complexes of security and fire alarms of various types can be installed:

  • Conventional (analogue);
  • Address (poll and non-poll);
  • Combined (address-analog).

The non-address fire and security alarm system works according to a simple principle. The perimeter of the protected object is divided into several parts, in each of which a loop is laid. It combines several notification mechanisms. The loop receives information from the detector immediately after it is triggered. The disadvantage of this type of protective circuit is the possibility of false operation of the device. The operability of the loop and detectors can only be checked during a technical inspection. The control zone is limited by the limits of one loop, and it is impossible to determine the exact location of the emergency. Centralized control is performed by security and fire panel mechanisms. At large facilities, when installing such systems, it is necessary to perform a large amount of work on laying connecting wires.

The address system of the security and fire alarm system can be polling and not polling. When installing this type of protective line, addressable sensors are installed on the loop. When triggered, the code of a particular sensor is indicated. Non-interrogated lines by the principle of operation are threshold. If any notification device fails, there is no connection with the receiving and control mechanism. A feature of polling systems is the periodic submission of a request for the performance of the notification mechanism. In polling schemes, the level of false alarms is reduced.

To date, the most common and effective are the combined fire and security systems. In practice, they are called addressable analog.

It is possible to connect various types of sensors to this system. All information is processed by specialized electronic computers. The system independently determines the type of sensor and sets the algorithm for its operation. The combined line allows you to quickly process information and make an appropriate decision. The expansion of such a subsystem with additional protective lines is possible without much effort and expense.

Varieties of fire and security notification devices

The fire and security system must be equipped with sensors. Fire detectors are divided into:

  • According to the method of transmission of the received information (analogue and threshold);
  • According to the location on the protected perimeter (external and internal);
  • According to the principle of fixing changes in space (volumetric, linear, surface);
  • By the method of control of individual items (local or point);
  • According to the method of signal formation (active, passive);
  • According to the current factor (thermal, light, smoke, ionization, manual, combined);
  • According to the principle of physical impact (capacitive, seismic, radio beam, closing).

Among the security sensors, the following subspecies are distinguished (according to the type of notification mechanisms used):

  • Contact;
  • Magnetic;
  • Electrocontact;
  • Infrared passive;
  • Active;
  • Volumetric radio wave;
  • Volumetric ultrasonic;
  • Microwave;
  • Acoustic;
  • capacitive;
  • Vibrating;
  • Barometric.

On the video - more information about the fire alarm:

Video surveillance and alarm systems - effective integration of devices

Video surveillance systems installed at the facility allow monitoring the protected area around the clock in real time. A modern solution is a combination of OPS and video monitoring. The installation of such integrated systems will allow you to quickly and better detect the presence of a flame in a room or an attempt to illegally enter a protected area. To date, there are video cameras that can recognize smoke caught in the lens, the presence of fire, or other indicators of risk.

Thanks to the integration of a video surveillance device into the fire alarm system, the work of security and fire installations is greatly facilitated. Video cameras allow you to timely identify the location of smoke or the presence of a flame. Also, this combination helps to notify people about the danger in time and carry out evacuation measures. Video cameras allow you to continuously monitor the events taking place both inside the building and in the surrounding area.

All data in the installed video surveillance subsystem is archived. Access to the archive is open at any time.

When introducing such a system into the operation of an existing fire alarm system, cameras from various leading manufacturers are used. Video surveillance at the facility has a number of possibilities:

  • Lighting control;
  • Sending text messages to persons responsible for ensuring safety, including fire safety, about the state of the facility or the occurrence of an emergency;
  • Immediate notification of building security personnel;
  • In the event of an emergency, it is possible to turn off engineering, communication and air conditioning subsystems;
  • Recording and playback of video files;
  • Mode setting;
  • Setting the storage time for files in the archive;
  • Performing scaling of individual frames;
  • Search, view and analyze images according to the required parameters (by camera number, date, time, event, room).