Internet and network alarm communicators enhancing alarm communication technology

July 2008 Infrastructure

We are living in a time where technology is developing at a frenetic pace and communication systems are becoming increasingly sophisticated.

This technological reality makes all the difference to the average security end-user as it gives them an added advantage in their security application. It is an ideal application for banks and large retail chains where significant networks have already been established and are being used for various purposes.

The introduction of GSM (global system for mobile communications) and TCP/IP (Transmission Control Protocol and Internet Protocol) technology into the market made it possible for people to unlock unique strategic security solutions to fit their control rooms, businesses and homes. Internet and network alarm communicators provides the next level of alarm signal communication using this technology, these units can be seamlessly connected to alarm panels to provide services such as alarm reports to control rooms. Saving end-users money, the networked alarm communicators uses existing Internet connection to create an instant, always on IP alarm communication solution.

"GSM technology was introduced into South Africa about four years ago," says Elvey new business development manager, Michael Brett. "This has only recently filtered through to security industry implementations during the last year and a half. The primary benefit offered by this technology is that it fills the communication gap in business and homes that do not make use of a standard telephone line. Users are less reluctant to adapt to these security-enhanced systems because they are already familiar with the cellular phone/Internet technology," comments Brett.

Michael Brett
Michael Brett

The Internet and network alarm communicators provides customers with the next level of alarm signal delivery. These systems are en route to control panels enabling alarm communication to central monitoring stations over the Internet. IP network alarm communicators connect to the telephone output of any control panel that uses the Contact ID format, providing a TCP/IP connection that sends predefined Contact ID codes to a central monitoring station.

"This effectively means that end-users can access their unique system directly from the Internet Web browser, which is especially useful to companies with 24-hour Internet connections which do not use telephone landlines. The data transmissions created by the alarm communicators are small and require only a limited amount of network bandwidth," says Brett.

TCP/IP interface also provides access to central stations within seconds anywhere in the world ensuring timely and accurate delivery of the alarm signal. Even in the event the primary receiver IP address is inaccessible, the modules are capable of reporting to two different e-mail addresses, which can be associated with a personal computer, pager, enabled mobile phone or handheld PDA.

The Internet alarm communicators are great for installers as they are extremely fast in programming, easy to install and easy to use. The TCP/IP alarm communicators allow for fast emergency response due to reduced backlog at central monitoring station and increase the value of the alarm system. With system administrator software managing the system is easy as it allows clients to add and delete users and download events. The systems integration includes benefits such as account volume, signal processing capabilities and automatically switching redundancy in the event of failure. Unlike traditional telephone line alarm communication there is no fear of line cuts or line failures, ensures reliability and security is more supervised.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

A passport to offline backups
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure Smart Home Automation
SMART Security Solutions tested a 6 TB WD My Passport and found it is much more than simply another portable hard drive when considering the free security software the company includes with the device.

Read more...
Five tech trends shaping business in 2025
Information Security Infrastructure
From runaway IT costs to the urgent need for comprehensive AI strategies that drive sustainable business impact, executives must be prepared to navigate a complex and evolving technology environment to extract maximum value from their investments.

Read more...
Threats, opportunities and the need for post-quantum cryptography
AI & Data Analytics Infrastructure
The opportunities offered by quantum computing are equalled by the threats this advanced computer science introduces. The evolution of quantum computing jeopardises the security of any data available in the digital space.

Read more...
Navigating today’s cloud security challenges
Information Security Infrastructure
While the cloud certainly enables enterprises to quickly adapt to today’s evolving demands, it also introduces unique challenges that security teams must recognise and manage. Vincent Hwang offers insights from the 2025 State of Cloud Security Report.

Read more...
Smarter ways to secure your space
Elvey Security Technologies Access Control & Identity Management Products & Solutions
Ensuring the safety of people and assets has become more crucial than ever, and access control systems provide essential tools to regulate and monitor who can enter specific areas or access sensitive resources.

Read more...
The rise of autonomous data recovery
Information Security Infrastructure
Escalating cyberthreats and attacks constantly put businesses under pressure, increasingly prompting organisations to shift their mindsets towards ensuring continuous operations and thus avoiding downtime and revenue loss.

Read more...
Can we really fight AI cybersecurity threats with more AI?
Information Security Infrastructure
In a world where artificial intelligence (AI) is increasingly being weaponised by cybercriminals, the question of whether we can effectively combat AI threats with more AI is not just a technical inquiry but a pressing global concern

Read more...
Partnership delivers 40% storage savings for surveillance
Surveillance Infrastructure
Large-scale video surveillance users and applications demanding extended storage periods will benefit from up to 40% savings on video storage hardware stacks thanks to a new partnership between IDIS and Secure Logiq.

Read more...
How smart video is transforming storage at the edge
Infrastructure Surveillance
As these technologies come together, they are impacting the architecture of the edge and what we require from data storage. More specifically, they are driving a demand for specialised storage.

Read more...
VPS hosting set to dominate in 2025
Infrastructure
SME market growth and the increasing need for a digital footprint are pushing VPS growth in South Africa, especially since it is now perceived as a viable business tool, scalable by nature, with improved performance.

Read more...