Wireless technology grows in popularity

September 2014 Fire & Safety

Wireless-based fire and security has been around for some years and like many technologies, there were some issues at the very early stages of development and deployment.

As stability of wireless technology increases, more customers are attracted to this alternative to hardwired security technology. While there will always be a place for hardwired technology, underlined by wireless technology’s unsuitability in certain geographic environments, wireless will continue to grow in popularity.

Ingo Mutinelli, sales director at Elvey.
Ingo Mutinelli, sales director at Elvey.

According to Ingo Mutinelli, sales director at Elvey, the company has seen an increase in the uptake of wireless security technology sales to both installers and end users over the past two years, with a larger acceleration experienced in the past 12 months. He believes that this is mainly due to the increased features and stability apparent in products.

While he acknowledges the growing popularity of wireless technology, he says that the market is still dominated by hardwired technology, with wireless capturing approximately 20 to 30% of market share.

Brian Wynberger, national technical manager at Reditron.
Brian Wynberger, national technical manager at Reditron.

Brian Wynberger, national technical manager at Reditron, believes that the reliability of wireless products over the past 18 months, their cost effectiveness due to the elimination of cables, the reduction in theft (no copper cables), increased security due to superior encryption techniques, and the fact that they can be used cost effectively over long distances, have resulted in wireless technology gaining serious ground.

He is of the opinion, however, that wireless products are still not as reliable as their hardwired counterparts as they are prone to interference from weather conditions. Nevertheless, he says that they can be placed in a mesh grid variety of links to increase stability and flexibility.

Mutinelli points out that the perception in the market is that a wired solution, with a definite cable link between control panel and detector device, is more reliable than its wireless counterpart. However, he adds, this is set to change, as wireless technology is enhanced through anti-jamming features and spread spectrum technology. He says that most high-end brands now offer two-way communication between the control panel and the detector/device, which allows the product to talk to the control panel on the state and effectivity of its operation.

Intrusion detection uses the 433, 403 and 868 MHz bandwidths, which are still fairly limited and largely influenced by high traffic volumes, due to their use in for instance TV remote controllers and wireless telephones. Coupled with this, other wireless technologies, such as police radios and handheld two-way radios, will affect the efficiency and efficacy of these bandwidths.

Mutinelli adds that wireless is not suited to every environment, since the topography plays a large role in enabling or disabling line of sight communication. This one element plays a critical role in the success of a wireless installation.

A major concern in the past with wireless products was the aggravation of batteries running flat during operation. Mutinelli says that Lithium batteries alleviate this concern with their longer lifespan of up to between three and five years. He explains that many of the wireless products have a feature that allows two-way communication with the control panel that includes alerts on the state of the battery in terms of its health and remaining life. This allows users to exchange batteries before they reach a critically low charge state.

Wynberger says that some projects are now using solar energy as an alternative to batteries. This virtually free form of energy is more reliable than DC power and its popularity is evident by the building of an R80-million photovoltaic solar module factory in Cape Town by a Chinese company.

Wireless jamming remains a pressing concern for users of wireless technology but Mutinelli claims that this can be made more difficult by using spread spectrum transmission and frequency hopping. Additionally, some products have a panel with an anti-jamming feature that places the device into a tamper condition and alerts the user.

Wynberger adds that by implementing the correct decryption techniques and putting strong passwords in place, the likelihood of a system being hacked and jammed are greatly minimised. Both interviewees caution that users need to be aware that there are devices on the market that make anti-jamming a real challenge.

Wynberger says that alarms, perimeter security, intrusion detection and CCTV are all suited to wireless technology, since any product with a link to an Ethernet network can feasibly operate as a wireless device. He stresses that users need to calculate the throughput correctly for surveillance systems, with 150 Mbps being the commonly accepted volume of devices. In instances where the required throughput is larger, the bandwidth can be split over multiple access points.

He says that while there is definitely a place for wireless technology, his advice to companies considering an installation is that only if there is no other option, then select wireless. He continues that the success of a wireless system will depend on what you wish to gain from it in terms of the data throughput required and the size of the installation (distance of links). Antennas play a large role in the operability of the installation and are particularly important where multiple links occur. Users need to remember that links are dynamic and will be slowed down when other third-party users choose to use them.

He adds that training of installation teams is important and it is advisable to use the services of a company that has previous, documented experience in wireless installations.

Hardwired solutions will continue to dominate the market but there are definitely instances where wireless can play a role. A number of companies are employing hybrid systems which incorporate the best of both technologies and offer system redundancy by using wireless in conjunction with hardwired in the event of copper cable theft.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Digital transformation in mines
NEC XON Technews Publishing Mining (Industry)
Digital transformation has been hyped to death, but is a reality all companies in all industries need to address, including the mining sector. BCX and NEC XON weigh in on the challenges mines face.

Read more...
Fire safety in mining
Technews Publishing Mining (Industry)
Clinton Hodgson, Head of the Industrial Fire & Life Safety Division at FS Systems International, provides SMART Security Solutions with his insights into fire safety risks and solutions as they pertain to the mining industry.

Read more...
Cybersecurity in mining
Technews Publishing Mining (Industry)
One does not usually associate mining with cybersecurity, but as big technology users (including some legacy technology that was not designed for cyber risks), mines are at risk from cyber threats in several areas.

Read more...
Mines require proof of performance
Technews Publishing Mining (Industry)
The relatively hostile environment and remote locations of mining establishments mean that any electronic/technical implementations have to be easily installed, require little or no maintenance and, once commissioned, require no adjustment.

Read more...
How to prevent and survive fires
Fire & Safety Security Services & Risk Management
Since its launch in August 2023, Fidelity SecureFire, a division of the Fidelity Services Group, has been making significant strides in revolutionising fire response services in South Africa.

Read more...
From the Editor's Desk: Something old and something new
Technews Publishing News & Events
      Welcome to the 2024 edition of SMART Security Solutions’ Mining Handbook. Mining is a challenging industry for security professionals, although security is a challenge on this continent, no matter your ...

Read more...
A long career in mining security
Technews Publishing Editor's Choice Security Services & Risk Management Mining (Industry)
Nash Lutchman recently retired from a security and law enforcement career, initially as a police officer, and for the past 16 years as a leader of risk and security operations in the mining industry.

Read more...
A constant armed struggle
Technews Publishing XtraVision Editor's Choice Integrated Solutions Mining (Industry) IoT & Automation
SMART Security Solutions asked a few people involved in servicing mines to join us for a virtual round table and give us their insights into mine security today. A podcast of the discussion will be released shortly-stay tuned.

Read more...
Entries to southern Africa OSPA Awards now open
Technews Publishing Securex South Africa Editor's Choice News & Events
The southern Africa OSPAs are part of a global awards scheme that recognises and rewards teams, individuals and organisations for their commitment and outstanding performance within the security sector.

Read more...
Securex has moved to June
Technews Publishing Editor's Choice News & Events
Following the formal announcement of the date for South Africa’s national election, 29 May 2024 , which happened to be in the middle of the planned dates for Securex South Africa, Securex will now take place from 11 – 13 June 2024 at Gallagher Estate in Midrand.

Read more...