Wireless technology grows in popularity

September 2014 Fire & Safety

Wireless-based fire and security has been around for some years and like many technologies, there were some issues at the very early stages of development and deployment.

As stability of wireless technology increases, more customers are attracted to this alternative to hardwired security technology. While there will always be a place for hardwired technology, underlined by wireless technology’s unsuitability in certain geographic environments, wireless will continue to grow in popularity.

Ingo Mutinelli, sales director at Elvey.
Ingo Mutinelli, sales director at Elvey.

According to Ingo Mutinelli, sales director at Elvey, the company has seen an increase in the uptake of wireless security technology sales to both installers and end users over the past two years, with a larger acceleration experienced in the past 12 months. He believes that this is mainly due to the increased features and stability apparent in products.

While he acknowledges the growing popularity of wireless technology, he says that the market is still dominated by hardwired technology, with wireless capturing approximately 20 to 30% of market share.

Brian Wynberger, national technical manager at Reditron.
Brian Wynberger, national technical manager at Reditron.

Brian Wynberger, national technical manager at Reditron, believes that the reliability of wireless products over the past 18 months, their cost effectiveness due to the elimination of cables, the reduction in theft (no copper cables), increased security due to superior encryption techniques, and the fact that they can be used cost effectively over long distances, have resulted in wireless technology gaining serious ground.

He is of the opinion, however, that wireless products are still not as reliable as their hardwired counterparts as they are prone to interference from weather conditions. Nevertheless, he says that they can be placed in a mesh grid variety of links to increase stability and flexibility.

Mutinelli points out that the perception in the market is that a wired solution, with a definite cable link between control panel and detector device, is more reliable than its wireless counterpart. However, he adds, this is set to change, as wireless technology is enhanced through anti-jamming features and spread spectrum technology. He says that most high-end brands now offer two-way communication between the control panel and the detector/device, which allows the product to talk to the control panel on the state and effectivity of its operation.

Intrusion detection uses the 433, 403 and 868 MHz bandwidths, which are still fairly limited and largely influenced by high traffic volumes, due to their use in for instance TV remote controllers and wireless telephones. Coupled with this, other wireless technologies, such as police radios and handheld two-way radios, will affect the efficiency and efficacy of these bandwidths.

Mutinelli adds that wireless is not suited to every environment, since the topography plays a large role in enabling or disabling line of sight communication. This one element plays a critical role in the success of a wireless installation.

A major concern in the past with wireless products was the aggravation of batteries running flat during operation. Mutinelli says that Lithium batteries alleviate this concern with their longer lifespan of up to between three and five years. He explains that many of the wireless products have a feature that allows two-way communication with the control panel that includes alerts on the state of the battery in terms of its health and remaining life. This allows users to exchange batteries before they reach a critically low charge state.

Wynberger says that some projects are now using solar energy as an alternative to batteries. This virtually free form of energy is more reliable than DC power and its popularity is evident by the building of an R80-million photovoltaic solar module factory in Cape Town by a Chinese company.

Wireless jamming remains a pressing concern for users of wireless technology but Mutinelli claims that this can be made more difficult by using spread spectrum transmission and frequency hopping. Additionally, some products have a panel with an anti-jamming feature that places the device into a tamper condition and alerts the user.

Wynberger adds that by implementing the correct decryption techniques and putting strong passwords in place, the likelihood of a system being hacked and jammed are greatly minimised. Both interviewees caution that users need to be aware that there are devices on the market that make anti-jamming a real challenge.

Wynberger says that alarms, perimeter security, intrusion detection and CCTV are all suited to wireless technology, since any product with a link to an Ethernet network can feasibly operate as a wireless device. He stresses that users need to calculate the throughput correctly for surveillance systems, with 150 Mbps being the commonly accepted volume of devices. In instances where the required throughput is larger, the bandwidth can be split over multiple access points.

He says that while there is definitely a place for wireless technology, his advice to companies considering an installation is that only if there is no other option, then select wireless. He continues that the success of a wireless system will depend on what you wish to gain from it in terms of the data throughput required and the size of the installation (distance of links). Antennas play a large role in the operability of the installation and are particularly important where multiple links occur. Users need to remember that links are dynamic and will be slowed down when other third-party users choose to use them.

He adds that training of installation teams is important and it is advisable to use the services of a company that has previous, documented experience in wireless installations.

Hardwired solutions will continue to dominate the market but there are definitely instances where wireless can play a role. A number of companies are employing hybrid systems which incorporate the best of both technologies and offer system redundancy by using wireless in conjunction with hardwired in the event of copper cable theft.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The role of safe storage in mitigating burglary and fire risk
Smart Home Automation Fire & Safety
Household burglary and fire remain amongst the most common threats to household assets in South Africa. Statistics South Africa’s 2024 Victims of Crime Survey reported approximately 1,5 million incidents of housebreaking in a single year.

Read more...
Risks of fire safety in residential environments
Fire & Safety Residential Estate (Industry)
ASP Fire is highlighting the significant fire risks in residential environments and stressing the importance of proactive fire-safety management at the household level.

Read more...
From the editor's desk: The beginning of the end
Technews Publishing News & Events
            As we come to the final issue of SMART Security Solutions, we can look back on a tough year: long decision-making cycles, squeezed budgets and the expectation of miracles on a shoestring. SMART Security ...

Read more...
HMA takes on Africa’s fire market
Fire & Safety
HMA South Africa is positioning itself as a trusted partner in fire detection, suppression, and explosion-proof safety solutions across the continent, offering clients regulatory compliance as well as long-term protection for mission-critical operations.

Read more...
AI and automation are rewriting the cloud security playbook
Technews Publishing AI & Data Analytics
Old-school security relied on rules-based systems that flagged only what was already known. AI flips the script: it analyses massive volumes of data in real-time, spotting anomalies that humans or static rules would miss.

Read more...
How secure is your fire protection system?
Fire & Safety
Modern fire protection systems are no longer just stand-alone panels that make a noise when a detector senses smoke. Many are now connected to building control systems, IoT devices and centralised management platforms. With that connectivity comes new risk.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Cybersecurity operations done right
LanDynamix SMART Security Solutions Technews Publishing Information Security
For smaller companies, the costs associated with acquiring the necessary skills and tools can be very high. So, how can these organisations establish and maintain their security profile amid constant attacks and evolving technology?

Read more...
Fire safety cannot be ignored
Fire & Safety
Fire safety is a combination of technology, product certifications, and experience that ensures that every project is planned correctly at inception according to client requirements, while meeting SANS standards.

Read more...
Is your entrance security secure?
SMART Security Solutions Centurion Systems Technews Publishing News & Events Access Control & Identity Management Smart Home Automation
While Centurion Systems may be known as a leader in gate and door motors in 72 countries, the company has developed more than hardware and now offers an automation ecosystem for access control security.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.