LSNs - local security networks

February 2005 Information Security

Conceptually, a local security network (or LSN) offers the foundation for a security architecture, with flexiblity being the operative word. LSNs can be applied to a wide variety of fire and intrusion detectors, and can be complemented by a vast range of peripheral equipment. Security with LSNs is simply more reliable and more cost-effective.

Bosch Security Systems lie at the heart of the LSN. They cover a wide variety of detectors and also permit combinations of fire and intrusion alarm systems. Existing components can be incorporated into a LSN, as well as existing peripheral equipment from other manufacturers. The LSN offers you the latest generation of detectors with active self-monitoring features.

Conventional detectors, indicator panels or fixed extinguisher systems can be connected to the systems using coupling interfaces elements. Equipment for monitored control and feedback such as smoke hatches, automatic door controls and sounders/strobes can also be incorporated into the system.

Flexible network topology

With an LSN you can set up your network exactly as you need it; in loop form, tee offs, or a combination of the two. This is made possible by a bi-directional digital transmission procedure, which allows constant a data dialogue between the sensor and the control panel. A single double-wire primary line transfers information from the control panel to the LSN elements and back while supplying power to the detectors.

High security, low outlay

LSN offers cost-effective security:

* Minimal assembly required.

* Expanding the network does not require expensive cabling adjustments.

* The cost of calling the police, fire brigade and security companies is reduced by precise and clear alarm and fault reports.

* Faulty detectors can be precisely located and easily replaced.

Each individual sensor is initialised, controlled and identified from the control panel. If necessary, the sensor can also be disconnected from the LSN. All status changes at the sensor can be identified from the control panel. Uniform transmission technology is used throughout the network, which means that it is suitable for any type detector. For you this means low-cost installation of the cable network, fast start-up and simple maintenance of the LSN elements.

The SIC 200 LSN chip

In developing the SIC 200 LSN, Bosch has produced a chip that is revolutionising intrusion alarm technology. By reducing the number of components from 40 to three and cut the space requirement to a fifth, LSN bus technology can now be integrated into even the smallest detector.

The LSN is used not only by Bosch, but also by many other manufacturers, and has become the standard in Germany. LSN is also growing quickly throughout other European countries. Today, customers can choose from a range of over 70 fire, intrusion and malfunction detectors, control units and arming equipment that use LSN technology.

* Supports of all types of detectors (fire, intrusion, malfunction, etc).

* Automatic isolation of line malfunctions.

* Transmits detector information.

For more information contact Shane Nefdt, Bosch Security Systems, 011 651 9699, [email protected], www.boschsecuritysystems.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Managed security solutions for organisations of all sizes
Information Security News & Events
Cyber attackers have become significantly more sophisticated and determined, targeting businesses of all sizes. PwC’s Global Digital Trust Insights Survey 2025 Africa and South Africa highlights the urgent need for organisations to implement robust cyber risk mitigation strategies.

Read more...
Data resilience at VeeamON
Technews Publishing SMART Security Solutions Infrastructure Information Security
SMART Security Solutions attended the VeeamON Tour in Johannesburg in August to learn more about data resilience and Veeam’s initiatives to enhance data protection, both on-site and in the cloud.

Read more...
Troye exposes the Entra ID backup blind spot
Information Security Infrastructure
If you trust Microsoft to protect your identity, think again. Many organisations naively believe that Microsoft’s shared responsibility model covers Microsoft Entra?ID – formerly Azure AD – but it does not.

Read more...
Secure data protection without hardware lock-in
Infrastructure Information Security News & Events
New Veeam Software Appliance empowers IT teams to achieve instant protection with Veeam’s fully preconfigured, software-only appliance, delivering enterprise-ready simplified deployment and operational efficiency, robust cyber resilience.

Read more...
Check Point launches open, vendor-neutral MDR services
Information Security News & Events Products & Solutions
New Check Point MDR 360° and MXDR 360° offerings deliver 24/7 managed continuous threat monitoring protection across endpoints, cloud and network environments with built-in identity threat detection and 160+ integrations across hybrid, multi-vendor environments.

Read more...
Credential theft surges in South Africa
NEC XON Information Security
NEC XON issues a critical cybersecurity warning about the dual threat of massive credential theft and AI-powered cyberattacks sweeping across the region, with an increasing number of incidents and evolving threat tactics.

Read more...
Want effective Attack Surface Management? Think like an attacker.
Information Security
Effective ASM requires companies to think like attackers, anticipate risks, and act decisively to reduce exposure by knowing their environment, deploying a structured approach, leveraging capable tools, and addressing both internal and external risks.

Read more...
The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
POPIA non-compliance puts municipalities at risk
Information Security Government and Parastatal (Industry)
Digital responsibility must go beyond POPIA compliance to recognising that privacy and service delivery are fundamentally linked. Despite this, only 51 out of 257 municipalities submitted their mandatory data protection and access to information reports in 2024.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.