LSNs - local security networks

February 2005 Information Security

Conceptually, a local security network (or LSN) offers the foundation for a security architecture, with flexiblity being the operative word. LSNs can be applied to a wide variety of fire and intrusion detectors, and can be complemented by a vast range of peripheral equipment. Security with LSNs is simply more reliable and more cost-effective.

Bosch Security Systems lie at the heart of the LSN. They cover a wide variety of detectors and also permit combinations of fire and intrusion alarm systems. Existing components can be incorporated into a LSN, as well as existing peripheral equipment from other manufacturers. The LSN offers you the latest generation of detectors with active self-monitoring features.

Conventional detectors, indicator panels or fixed extinguisher systems can be connected to the systems using coupling interfaces elements. Equipment for monitored control and feedback such as smoke hatches, automatic door controls and sounders/strobes can also be incorporated into the system.

Flexible network topology

With an LSN you can set up your network exactly as you need it; in loop form, tee offs, or a combination of the two. This is made possible by a bi-directional digital transmission procedure, which allows constant a data dialogue between the sensor and the control panel. A single double-wire primary line transfers information from the control panel to the LSN elements and back while supplying power to the detectors.

High security, low outlay

LSN offers cost-effective security:

* Minimal assembly required.

* Expanding the network does not require expensive cabling adjustments.

* The cost of calling the police, fire brigade and security companies is reduced by precise and clear alarm and fault reports.

* Faulty detectors can be precisely located and easily replaced.

Each individual sensor is initialised, controlled and identified from the control panel. If necessary, the sensor can also be disconnected from the LSN. All status changes at the sensor can be identified from the control panel. Uniform transmission technology is used throughout the network, which means that it is suitable for any type detector. For you this means low-cost installation of the cable network, fast start-up and simple maintenance of the LSN elements.

The SIC 200 LSN chip

In developing the SIC 200 LSN, Bosch has produced a chip that is revolutionising intrusion alarm technology. By reducing the number of components from 40 to three and cut the space requirement to a fifth, LSN bus technology can now be integrated into even the smallest detector.

The LSN is used not only by Bosch, but also by many other manufacturers, and has become the standard in Germany. LSN is also growing quickly throughout other European countries. Today, customers can choose from a range of over 70 fire, intrusion and malfunction detectors, control units and arming equipment that use LSN technology.

* Supports of all types of detectors (fire, intrusion, malfunction, etc).

* Automatic isolation of line malfunctions.

* Transmits detector information.

For more information contact Shane Nefdt, Bosch Security Systems, 011 651 9699, [email protected], www.boschsecuritysystems.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The impact of AI on security
Technews Publishing Information Security AI & Data Analytics
Today’s threat actors have moved away from signature-based attacks that legacy antivirus software can detect, to ‘living-off-the-land’ using legitimate system tools to move laterally through networks. This is where AI has a critical role to play.

Read more...
Managed security solutions for organisations of all sizes
Information Security
Cyberattackers have become significantly more sophisticated and determined, targeting businesses of all sizes. PwC’s Global Digital Trust Insights Survey 2025 Africa and South Africa highlights the urgent need for organisations to implement robust cyber risk mitigation strategies.

Read more...
Multiple IoT devices targeted
Information Security Residential Estate (Industry)
Mirai remains one of the top threats to IoT in 2025 due to widespread exploitation of weak login credentials and unpatched vulnerabilities, enabling large-scale botnets for DDoS attacks, data theft and other malicious activities.

Read more...
Local-first data security is South Africa's new digital fortress
Infrastructure Information Security
With many global conversations taking place about data security and privacy, a distinct and powerful message is emerging from South Africa: the critical importance of a 'local first' approach to data security.

Read more...
Sophos launches advisory services to deliver proactive cybersecurity resilience
Information Security News & Events
Sophos has launched a suite of penetration testing and application security services, designed to identify gaps in organisations’ security programs, which is informed by Sophos X-Ops Threat Intelligence and delivered by world-class experts.

Read more...
Kaspersky highlights biometric and signature risks
Information Security News & Events
AI has elevated phishing into a highly personalised threat. Large language models enable attackers to craft convincing emails, messages and websites that mimic legitimate sources, eliminating grammatical errors that once exposed scams.

Read more...
Software security is a team sport
Information Security Infrastructure
Building and maintaining secure software is not a one-team effort; it requires the collective strength and collaboration of security, engineering, and operations teams.

Read more...
Stronger cloud protection
Kaspersky Information Security Products & Solutions
Kaspersky has announced the release of an enhanced version of its Kaspersky Cloud Workload Security, delivering advanced protection for hybrid and multi-cloud environments.

Read more...
AttackIQ enters South Africa with key appointment
Information Security News & Events
AttackIQ, a provider of continuous security validation and exposure management, has announced its entry into the South African market with the appointment of Luke Cifarelli as its country manager.

Read more...
Managed security solutions for organisations of all sizes
Information Security News & Events
Cyber attackers have become significantly more sophisticated and determined, targeting businesses of all sizes. PwC’s Global Digital Trust Insights Survey 2025 Africa and South Africa highlights the urgent need for organisations to implement robust cyber risk mitigation strategies.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.