Wednesday, December 16, 2020

Intrusion Alarm Circuits Guide

Intrusion Alarm Circuits Guide 

Intrusion alarm circuits are a fundamental element of wired intrusion / burglar systems. Designing the intrusion alarm circuit greatly affects its performance. In particular, more efficient circuit designs introduce less resistance and cause fewer false alarms.

Alarm Circuits Overviewed

Intrusion alarm circuits use wires between an Intrusion alarm panel and various sensors. When the circuit / connection of those wires is broken (e.g., an alarmed window opens), the alarm is triggered if the system is armed / enabled.

How an Alarm Circuit Works

An intrusion alarm circuit consists of a pair of wires running from an intrusion alarm panel to a sensor, such as a magnetic contact. Electrical charge flows from the positive terminal, down one wire, and into the sensor. When something causes the sensor to close, it completes the circuit, allowing the charge to flow down the other wire and back to the negative terminal on the panel.

In the case of the contact, the circuit is complete because the magnet causes the reeds to touch, allowing current to flow from the reed on the positive side of the circuit to the reed on the negative side.

Using a pair of wires to connect both sides of the sensor to both terminals on the panel creates a large circle, which is where the word circuit comes from. The electrons flow freely all around this circuit, from the positive terminal on the panel, through the sensor, and back to the negative terminal. Opening the window will cause the reed to separate, which will break the circle and stop the flow of electrons. In other words, opening a window will create an open circuit. It is this open circuit that causes an alarm condition.

Loops vs Splices

The two most common ways to add multiple sensors to circuits is to use loops or splices.

Loops are preferred because it creates a short pathway, which means less resistance, fewer points of failure and faster to install. However, loops can only typically be used in new construction where the technician has the ability to run wires and loops through the window frames before the drywall is installed. Prewiring requires coordination with the general contractor or the carpenter. The alarm company needs to be able to schedule a technician to complete the wiring before the drywall crew is scheduled to begin installing drywall, and the carpenter should be told where to drill holes on the moulding or window frame.

Splices should be minimized because they add resistance and are more time consuming to install. However, adding alarms to exiting homes or businesses typically require this since it is not feasible to open the drywalls to run a looped circuit.

Two types of splicing exists: field splice and ITB (in-the-box) splice. The benefits of field splices are lower total circuit resistance and using less wire, but it requires a more skilled technician to hide the splice. By contrast, ITB splices are easier to troubleshoot, have fewer potential points of failure and they can be done by a less experienced installer, but they have higher total circuit resistance and require an installer to home run a wire to each individual window.

Loops Explained

The image below shows an example of a loop that allows two windows to share a circuit. Opening either the top sash or the bottom sash of either the right window or left window will cause the same zone to open. To accomplish this, a technician runs a single wire from one contact to another, allowing the current to travel around the windows in a circle. The technician leaves a loop at every window, which will bring the circuit in one side of the contact and out the other.

One wire of the pair runs to the window on the right, and the other runs to the window on the left. The technician has run loops of wires from one side of the contact to the other. One side of the contact on the top right window has a loop running to one side of the contact on the left (shown in black below). The loop between the top left contact and the bottom left contact (shown in RED) completes the circle, as long as all the windows are closed.

Field Splices

A field splice is one that is made at the device end of the wire, usually at the device itself. A skilled technician can make a field splice if the conditions are right. Splices must be accessible for future troubleshooting, so a field splice can only be made if there is someplace to hide them away from casual view. For example, when wiring windows, a technician can staple the wire to the underside of the frame or moulding, out of sight but easily found by an experienced / certified intrusion alarm troubleshooter. Intrusion alarm installers commonly wire all sirens and strobes in a location to a single circuit, and make field splices inside the siren box.


In this example, a pair of wires (green) is running to the alarm panel. Red wires are running to magnetic contacts on the bottom sash and the top sash of the right window, and blue wires are running to the top sash and the bottom sash of the left window. One red wire is spliced to one blue wire, leaving one red wire and one blue wire to be spliced to the green wires.

ITB Splices

ITB splices, or in-the-box splices, are those made inside the alarm can. Separate wires are run to each individual contact, and they are then joined up at the panel using a splice.

ITB splices are much easier for inexperienced technicians, and much faster to wire up. Making ten splices, one after another, to add ten devices to five zones, is faster than making a splice at every entranceway and then figuring out how to tuck them away. They are also much easier to troubleshoot if properly labeled in the can, because a troubleshooter can quickly isolate the circuit branch causing the issue, and does not have to first find and identify the splice. However, running individual wires is more more labor intensive, and uses more wire.

Circuit Electrical Specifications

All devices in an alarm, including unpowered devices such as contacts, require a specific amount of charge flowing through the wires at a specific speed and pressure or it will not work.

Every circuit has a voltage, current, and resistance value:

  • Voltage is measured in volts (V).
  • Current is measured in amps (A).
  • Resistance is measured in ohms (Ω).

Voltage is a measurement of how much electricity is available for use. Every device lists the amount of voltage it requires to operate.

  • If given too few volts, the device will either not power up or will work erratically.
  • If given too many volts, it will either shut down or overheat.

Current is the pressure at which the charge flows. All devices consume, or draw, electricity at a predetermined rate.

  • Not enough amps may cause the device to work harder to draw voltage, which could cause it to either shut down, overheat, or work erratically.
  • Too many amps is not harmful as the device cannot draw more current than it can use.

Resistance is anything that slows the current. Factors that increase resistance are

  • Number of connected devices
  • Wire length
  • Splices
  • Time
  • Copper oxidization

Too much resistance on a circuit will lower the current, making it more difficult for the alarm to monitor the zone properly. Since resistance increases in all circuits as time goes on, improperly designed circuits have a high probability of causing false alarms years after being installed. Therefore, every effort should be made to keep the resistance as low as possible.

Parallel Versus Series

The two methods of joining multiple sections to a single circuit are parallel and series. Devices can either be wired in parallel or in series with each other. Circuits using parallel splices are called parallel circuits, and circuits using series splices are called series circuits.

In a series splice, one of the pair of wires is spliced to one the next pair of. This way, no matter how many pairs of wires are added, the end result is two wires that are simple to connect to two screw terminals. In between, lots of wires are spliced to each other. This makes troubleshooting simpler, because a technician can simply test a single branch of the circuit at a time. Series is typically best for connecting a small number of devices to a circuit. It is faster and easier to wire up. The downside is that series introduces a lot more resistance if too many devices are connected.

In a series circuit, the wires from each branch of the circuit will be spliced together until two wires not spliced to anything are left. These single conductors will be connected to the screw terminals, while the splices 'hang' in the air, not connected to anything but each other. No matter how many devices and wires are connected to the circuit, there will always be only one wire to connect to the positive and one to connect to the negative.

Parallel splices are typically best for connecting a large number of devices to a single circuit, or for circuits that draw lots of power. It greatly reduces the amount of resistance, allowing those large numbers of devices to be connected. However, it is harder / more complicated to implement, will not work if done incorrectly, and is more difficult to troubleshoot later on.

In a parallel circuit, all the matching sides of the wire pairs are simply spliced together, with the end result being two thick wire twists. This can be a challenge to connect to screw terminals. In order to troubleshoot the wire going to a branch of the circuit, a technician must first undo the entire splice.

Experienced alarm technicians develop a 'feel' for when to splice devices in parallel and when to splice in series. However, the key determinate is this: when a series splice will result in too much resistance, a parallel splice must be used. Before splicing anything, technicians can test a circuit in order to determine the amount of resistance present.

Measuring Resistance

Resistance is measured using a digital multimeter, or DMM. To measure resistance, turn the function dial of meter to the Ω (ohms) symbol, and touch the leads to the bare wires of the circuit. Technicians measure resistance in order to

  • Test that all devices on a circuit are functioning normally
  • Decide whether to keep devices on a zone or to split them up among multiple zones
  • Decide whether a circuit should be wired in series or in parallel
  • Record a baseline resistance at the time of installation
  • Troubleshoot, as a zone with a resistance reading well over baseline can indicate a broken wire or defective sensor

How Much Resistance Is Too Much?

There is no clear answer to the precise amount of devices, and consequently the precise amount of resistance, that should be allowable on a single detection circuit. As a general rule of thumb, many installers try to keep the baseline resistance on a single circuit to ~40Ω. Remember that the resistance will inevitably creep up over time, depending on the number and nature of sensors connected to the circuit, the number and nature of splices on the wire, the exact composition of the wire, and even the environment, which could cause the wire to oxidize faster or slower. The following animation shows the current slowing the more devices are added to the circuit:

Different alarm panel manufacturers have different standards for what constitutes an alarm condition, but all those standards are based on the panel reading the resistance on a zone circuit. If a circuit has a reading significantly higher than 40Ω, consider either using a parallel splice or splitting the zone, removing some devices from one zone and wiring them to a new zone.

Some installers prefer ITB splices because it allows them to decide to split the zone later on. If devices have been wired together using wire loops or field splices, this is not possible.

How Many Devices Is Too Many?

In theory, an installer can connect all the doors on a single zone, all the windows on another zone, all the motion detectors on a third zone, and so forth. However, this is quite an inefficient way of using an alarm. The more devices are on a single zone, the harder it will be for the user to figure out which device is causing the zone to be open.

If all the windows in a room are on a single zone, the user will have to check all of them before being able to arm the system. If a user wants to keep a single window open while arming the rest of the system, they would have to bypass all the windows in the room, which is a higher security risk than simply bypassing a single window. If central station needs to dispatch police or fire to the user's site, they will only be able to give a vague description of the location of the problem, not a specific location.

Most panels can only handle a limited number of zones out of the box. Using additional zones requires purchasing and installing zone expanders, which add to the overall cost of the installation. Using multiple zone expanders may require adding a second can, which likewise adds to the cost. The question of when to combine devices on a single zone and when to separate devices into separate zones has no easy answer, but becomes clearer with experience.

Wiring Sirens

Wiring sirens is slightly different than wiring other alarm devices.

  • Sirens are rated in watts, not volts like all other alarm devices
  • Watts are a measure of how much a power a device outputs
  • Volts a measure of how much power a device uses
  • Most sirens are rated to 30 watts

Most panels only have a single siren output. However, many applications call for the volume to be lower on some sirens than on others. For example, a siren mounted indoors would cause hearing damage if sounding at a full 110dB, but 110dB is necessary for notification outdoors. In order to have different volumes from a single output, installers can choose to wire sirens in either parallel (for louder volume) or in series (for lower volume). They can even choose to wire some sirens in parallel and other sirens in series. The sirens in series have more resistance than the sirens in parallel, so that there is more resistance, and therefore fewer watts, forcing the siren to sound at a lower volume.

Intrusion alarm siren wiring is a perfect illustration of Ohm's Law.

Ohm's Law

Understanding Ohm's Law makes alarm troubleshooting much easier. Ohm's Law states that there is a direct relationship between volts, amps, and ohms, specifically that volts equals amps times ohms. Amps is ohms divided by volts, and ohms is volts divided by amps. Adding resistance (ohms) makes the current (amps) go down, and adding current (amps) makes the resistance (ohms) go down.

The simplest way of lowering or raising the power available to the siren is by raising or lowering the resistance. This raises or lowers the amount of available power, which in turn affects the operation of the siren.

Understanding Ohm's Law can help a technician diagnose and repair power supplies, sensors, circuits, and sensors. Changing a splice from series to parallel, replacing a power supply for one that outputs the same voltage at a higher amperage, or adding a resistor are all repair options that an installer has once they understand how Ohm's Law works.

Source: IPVM.com & circuitstoday.com

Tuesday, December 1, 2020

Hands-Free Upgrade of Access Control System

Hands-Free Upgrade of Access Control System 

Access control systems also let employers restrict the locations each employee can enter, setting levels of security to balance their workers' safety and convenience. When an employee leaves the company, their credentials can simply be deactivated to prevent them from gaining unauthorized access. With access control security, you know who enters your business, when they enter and what door they use. These systems also include analytics that allow you to track where your employees are. In addition, they allow you to section off rooms or areas to authorized employees and receive reports of suspicious activity, such as if someone tries to enter an area where they don't belong. 
Social Distancing is the new norm of life and need to be practiced across the daily paths. While the governing authorities work for developing solutions to take care of human life, it is essential for various establishments to work out their own precautionary measurements to create safe and risk-free environment. Wireless access control systems are fast and easy to install. They save time and money for sites that have hard-to-wire buildings, remote gates and elevator applications. Addressing COVID-19 Concerns by Upgrading Existing or Non-Existing Access Control System to Hands-Free Wireless access control with non-Chinese factory product. 
Several companies have entered the mobile access card market, but they have not set up a meaningful product solution stream until 2019. In 2020, forecasts show that the mobile access card market will grow far more rapidly. Reviewing new entries into the market allows identification of the latest products that provide improving solutions to compatibility and speed problems.

How long before your phone replaces your access credentials at work? Mobile devices are everywhere. Number of mobile phone users alone was forecast to reach over 4.7 billion this year, with more than 60% of the world’s population already owning a mobile phone.  Smartphones have already begun to replace traditional lock-and-key setups in the home, and with the business world continuing to move in a more smartphone focused direction, a world where you tap your phone to gain access to your office probably isn’t too far off. The technology already exists, but implementation is not without its hurdles. While generally outweighed by the benefits, there are several potential challenges when it comes to using your Smartphone as a credential. Smartphone have become ubiquitous, but cards and FOBs are still cheaper to produce. Even though users are likely to have their phone on them constantly, access badges usually include a picture and are always meant to be visible. Still, as the technology improves, it’s likely that Smartphone verification is going to become more prevalent. One application that we’re seeing growth in is for mobile-enabled workforces to use smartphones and mobile devices as keys to gain access to secured buildings, rooms and areas. As this trend becomes more commonplace, it’s worth weighing the pros and cons.

 

Mobile Benefits

Firstly, let’s look at the benefit of using your smart phone as access credentials for your building.

  • ·  Smartphones are more secure than traditional access cards or FOBs. With the introduction of biometrics in modern smart phones (fingerprint sensors and face ID), even though someone might be able to get their hands on someone else’s phone, it’s no guarantee that they’ll be able to unlock it.
  • ·     Smartphone-based credentials are very difficult to clone.
  • ·  Smartphone-based implementations can reduce installation costs by leveraging an asset that everyone is already carrying around with them.
  • ·    Smartphone credentials are capable of much more than traditional card-based systems. Smart phones are capable of Multi-Factor Authentication (MFA), location awareness, mass notifications, and revocation can be done remotely.
  • ·      HR should be thrilled with a smartphone app-based access control system, as much less time will be needed to set up and issue credentials than issuing new keys and cards or replacing them. 

Finally, if you choose a provider who has created a secure app with credential storage in a secure cloud or location other than the phone, the security is even greater. Biometrics (the use of fingerprints) can even be used to access the key, since smartphones now include that capability. 

Essentially, even if someone did manage to steal the phone and crack the pin to open it, they would still need the proper information (or fingertips) to open up the app and access the key. 

A strong app will also have deep levels of encryption that will prevent the Bluetooth signal from simply being copied and replayed to open the lock.

Potential Challenges

Of course, as new technology emerges, there will be pushback. This isn’t a bad thing as it forces developers to overcome roadblocks to make systems as secure as possible. The difficulty comes from separating valid objections from merely an aversion to change. Going forward, the biggest issues with mobile credentials are:
·       Physical return of credentials. When someone parts ways with an employer, a physical access card or FOB would be collected. With a smart phone-based system (especially in a case where employees are bringing their own devices) this is obviously problematic. You can’t ask an employee to turn in their. The only solution to this problem is to ensure that your protocol for remotely disabling credentials is foolproof. If it is, this issue becomes a benefit, as you can revoke credentials at any time. Forgetting to have a card turned in or encountering any resistance from an employee is no longer a factor.
·   
Lack of a picture ID. With many physical access cards, a photo of the employee will be added as a second form visual verification. These cards are often clipped to an employee’s shirt or belt making it visible at all times and allowing people to identify them immediately. Phones are generally kept in pockets and would only be brought out at an access point. This issue’s importance will vary based on your business’ level of sensitivity when it comes to your assets or people. Additionally, all modern access control systems allow for a head shot to appear when credentials are presented to a reader. If a picture has been taken of the employee, and someone is present to identify them, they can verify that the person who presented the card or phone is the proper individual. It’s even possible to speak with the person in video which will allow for facial recognition with CCTV integration with the access control software.

One reason for the high expected growth for usage of smartphones as digital access control keys is that mobile technology is already widely used for identification, authentication, authorization and accountability in computer information systems. Another reason is that using mobile devices as keys aligns perfectly with the mobile-first preferences of today’s workforces. Using mobile devices as keys not only delivers a convenient user-experience. It also helps boost operational efficiency and satisfaction of today’s mobile-enabled workforces. As important, it represents a more cost-effective, simpler way for companies to manage identification credentials as it eliminates numerous manual tasks related to handling, printing, distributing and disposing of physical identity badges.

When all is said and done, one of the biggest benefits that those who choose to implement mobile credentials will see is lower installation costs. The SIA points out that “A smartphone credential adds significant functionality over a traditional credential and is always upgradeable to add new capabilities – all for the same cost, or less…Also, users do not require a reader to enter a door, so enterprises can eliminate readers on most doors to keep the entrance looking clean and to reduce installation costs.” When you couple this with the other benefits of mobile credentials, it becomes clear that this will more than likely become the preferred method of access control for most workplaces in the near future.


ASSA ABLOY, Suprema being a pioneer in multiple doors opening and access controlling technology, provides such critical solutions suitable for wide segments of commercial spaces. With easy and safe access for authorized personal, without compromising on the security needs of the organizations, the contactless access readers and exit switches for sliding and swinging door operators. 

Aperio is first Wireless Online Access Control technology that enables mechanical locks to be wirelessly linked to an existing access control system. In terms of formats, three common methods of mobile credentials are used in access:

  • BLE (Bluetooth Low Energy)
  • NFC (Near Field Communication)
  • App Based Credentials

‘Mobile access cards’ is one of the terminologies that everyone has been talking about. RF cards used for access security are being integrated into smartphones just as digital cameras and MP3s were in the past. While people might forget their access cards at home in the morning, they seldom forget their smartphones. Using smartphones for access control increases entry access reliability and convenience.

Structurally which method is used makes a big difference for overall mobile access performance. In general, access manufacturer data sheets will detail which/how many methods are available with their product, with each method having different limitations and benefits.

The breakdown below shows the major differences between types:

For example, notice the difference in Range between the three formats. While NFC range is short (typically less than 9 inches), the range for BLE is longer at ~150 feet, while App systems essentially have ranges only limited by Wi-Fi and cellular connectivity.
In other cases, which method is used impacts reliability too. For example, with HID Mobile, using BLE is less reliable for connecting to the reader than NFC, and because different phone types may limit which method is options used, overall user experience is often determined by which mobile access method they use.
Another valuable aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction. Under existing access security systems, cards must be issued in person. Since card issuance implies access rights, the recipient’s identification must be confirmed first before enabling the card and once the card has been issued, it cannot be retracted without another separate face-to-face interaction. In contrast, mobile access cards are designed to transfer authority safely to the user's smartphone based on TLS. In this way, credentials can be safely managed with authenticated users without face-to-face interaction.
Mobile cards can be used not only at the sites with a large number of visitors or when managing access for an unspecified number of visitors, but also at the places like shared offices, kitchens and gyms, currently used as smart access control systems in shared economy markets.
The market share of mobile access cards today is low even though the capability can offer real benefits to users and markets. While the access control market itself is slow-moving, there are also practical problems that limit the adoption of new technologies like mobile access cards.

The first problem is usability: compatibility and speed.
While NFC could be an important technology for mobile credential that is available today on virtually all smartphones, differences in implementation and data handling processes from various vendors prevents universal deployment of a single solution to all devices currently on the market.
 
Accordingly, Bluetooth Low Energy (BLE) has been considered as an alternative to NFC. Bluetooth is a technology that has been applied to smartphones for a long time, and its usage and interface are unified, so there are no compatibility problems however, speed becomes the main problem. The authentication speed of BLE mobile access card products provided by major companies is slower than that of existing cards.
The second problem is that mobile access cards must be accompanied by a supply of compatible card readers. In order to use mobile access cards, readers need to be updated but this is not a simple task in the access control market. For 13.56 MHz smart cards (which were designed to replace 125 kHz cards), it has taken 20 years since the standard was established but only about half of all 25 kHz cards have been replaced so far. Legacy compatibility and the need for equivalent performance, even with additional benefits, will drive adoption timing for the Access Control market.

While BLE technology helps resolve the compatibility problem of mobile access cards, we can identify some breakthroughs that can solve the speed problem. Authentication speed is being continuously improved using BLE's GAP layer and GATT layers, and new products with these improvements are now released in the market.

Making use of key improvements allows Suprema's mobile access card to exhibit an authentication speed of less than 0.5 seconds providing equivalent performance to that of card-based authentication.

MOCA System's AirFob Patch addresses the need for technological improvements in the access control market in a direct, cost effective, and reliable way – by offering the ability to add high-performance BLE to existing card readers – enabling them to read BLE smartphone data by applying a small adhesive patch approximately the size of a coin.
 
This innovative breakthrough applies energy harvesting technology, generating energy from the RF field emitted by the existing RF reader – then converting the data received via BLE back into RF – and delivering it to the reader.
 
By adding the ability to use BLE on virtually any existing RF card reading device, MOCA allows greater ability for partners and end users to deploy a technologically-stable, high performance access control mobile credential solution to their employees, using devices they already own and are familiar with. Adding MOCA AirFob Patch eliminates the need to buy and install updated readers simply to take advantage of mobile credential, lowering costs and risks, and increasing employee confidence and convenience.