Internet and network alarm communicators enhancing alarm communication technology

July 2008 Infrastructure

We are living in a time where technology is developing at a frenetic pace and communication systems are becoming increasingly sophisticated.

This technological reality makes all the difference to the average security end-user as it gives them an added advantage in their security application. It is an ideal application for banks and large retail chains where significant networks have already been established and are being used for various purposes.

The introduction of GSM (global system for mobile communications) and TCP/IP (Transmission Control Protocol and Internet Protocol) technology into the market made it possible for people to unlock unique strategic security solutions to fit their control rooms, businesses and homes. Internet and network alarm communicators provides the next level of alarm signal communication using this technology, these units can be seamlessly connected to alarm panels to provide services such as alarm reports to control rooms. Saving end-users money, the networked alarm communicators uses existing Internet connection to create an instant, always on IP alarm communication solution.

"GSM technology was introduced into South Africa about four years ago," says Elvey new business development manager, Michael Brett. "This has only recently filtered through to security industry implementations during the last year and a half. The primary benefit offered by this technology is that it fills the communication gap in business and homes that do not make use of a standard telephone line. Users are less reluctant to adapt to these security-enhanced systems because they are already familiar with the cellular phone/Internet technology," comments Brett.

Michael Brett
Michael Brett

The Internet and network alarm communicators provides customers with the next level of alarm signal delivery. These systems are en route to control panels enabling alarm communication to central monitoring stations over the Internet. IP network alarm communicators connect to the telephone output of any control panel that uses the Contact ID format, providing a TCP/IP connection that sends predefined Contact ID codes to a central monitoring station.

"This effectively means that end-users can access their unique system directly from the Internet Web browser, which is especially useful to companies with 24-hour Internet connections which do not use telephone landlines. The data transmissions created by the alarm communicators are small and require only a limited amount of network bandwidth," says Brett.

TCP/IP interface also provides access to central stations within seconds anywhere in the world ensuring timely and accurate delivery of the alarm signal. Even in the event the primary receiver IP address is inaccessible, the modules are capable of reporting to two different e-mail addresses, which can be associated with a personal computer, pager, enabled mobile phone or handheld PDA.

The Internet alarm communicators are great for installers as they are extremely fast in programming, easy to install and easy to use. The TCP/IP alarm communicators allow for fast emergency response due to reduced backlog at central monitoring station and increase the value of the alarm system. With system administrator software managing the system is easy as it allows clients to add and delete users and download events. The systems integration includes benefits such as account volume, signal processing capabilities and automatically switching redundancy in the event of failure. Unlike traditional telephone line alarm communication there is no fear of line cuts or line failures, ensures reliability and security is more supervised.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Pentagon appointed as Milestone distributor
Elvey Security Technologies News & Events Surveillance
Milestone Systems appointed Pentagon Distribution (an Elvey Group company within the Hudaco Group of Companies) as a distributor. XProtect’s open architecture means no lock-in and the ability to customise the connected video solution that will accomplish the job.

Read more...
Navigating the evolving tech landscape in 2024 and beyond
Residential Estate (Industry) Infrastructure
Progress in the fields of AI, VR and social media is to be expected, but what is not, is our fundamental relationship with how we deploy solutions in our business and how it integrates with greater organisational strategies and goals.

Read more...
iOCO collaboration protection secures Office 365
Information Security Infrastructure
The cloud, in general, and Office 365, in particular, have played a significant role in enabling collaboration, but it has also created a security headache as organisations store valuable information on the platform.

Read more...
Smart mining operations management
Mining (Industry) Infrastructure IoT & Automation
In his presentation at the recent MESA Africa conference, Neels van der Walt, Business Development Manager at Iritron, revealed the all-encompassing concept of SMOM (Smart Mining Operations Management) and why it is inextricably linked to the future of worldwide mining operations.

Read more...
Do you need a virtual CIO?
Editor's Choice News & Events Infrastructure
If you have a CIO, rest assured that your competitors have noticed and will come knocking on their door sooner or later. A Virtual CIO service is a compelling solution for businesses navigating tough economic conditions.

Read more...
The TCO of cloud surveillance
DeepAlert Verifier Technews Publishing Surveillance Infrastructure
SMART Security Solutions asked two successful, home-grown cloud surveillance operators for their take on the benefits of cloud surveillance to the local market. Does cloud do everything, or are there areas where onsite solutions are preferable?

Read more...
On-camera AI and storage create added benefits
Elvey Security Technologies AI & Data Analytics Surveillance IoT & Automation
The days of standalone security systems are long past, and the drive is now to educate system integrators, installers, and end users on the return on investment that can be derived from intelligent, integrated BMS, IoT and security systems.

Read more...
Cyber resilience – protect, defend, recover
Infrastructure
The challenge with AI is that threats are getting harder to detect. As a result, plans in 2024 are not just about detection and prevention, but about recovery.

Read more...
Powering business resilience and field operations
Infrastructure Products & Solutions
[Sponsored] The Anker 757 Portable Power Station emerges as a strategic asset for businesses looking to overcome power instability and the demand for operational efficiency in remote and field-based environments.

Read more...
Top bets for backup and business continuity
Infrastructure
Become your organisation’s data pioneer and spearhead data governance and protection of critical data. Challenge why best practices are not adopted or in place, while highlighting the inherent risks this poses.

Read more...