Internet and network alarm communicators enhancing alarm communication technology

July 2008 Infrastructure

We are living in a time where technology is developing at a frenetic pace and communication systems are becoming increasingly sophisticated.

This technological reality makes all the difference to the average security end-user as it gives them an added advantage in their security application. It is an ideal application for banks and large retail chains where significant networks have already been established and are being used for various purposes.

The introduction of GSM (global system for mobile communications) and TCP/IP (Transmission Control Protocol and Internet Protocol) technology into the market made it possible for people to unlock unique strategic security solutions to fit their control rooms, businesses and homes. Internet and network alarm communicators provides the next level of alarm signal communication using this technology, these units can be seamlessly connected to alarm panels to provide services such as alarm reports to control rooms. Saving end-users money, the networked alarm communicators uses existing Internet connection to create an instant, always on IP alarm communication solution.

"GSM technology was introduced into South Africa about four years ago," says Elvey new business development manager, Michael Brett. "This has only recently filtered through to security industry implementations during the last year and a half. The primary benefit offered by this technology is that it fills the communication gap in business and homes that do not make use of a standard telephone line. Users are less reluctant to adapt to these security-enhanced systems because they are already familiar with the cellular phone/Internet technology," comments Brett.

Michael Brett
Michael Brett

The Internet and network alarm communicators provides customers with the next level of alarm signal delivery. These systems are en route to control panels enabling alarm communication to central monitoring stations over the Internet. IP network alarm communicators connect to the telephone output of any control panel that uses the Contact ID format, providing a TCP/IP connection that sends predefined Contact ID codes to a central monitoring station.

"This effectively means that end-users can access their unique system directly from the Internet Web browser, which is especially useful to companies with 24-hour Internet connections which do not use telephone landlines. The data transmissions created by the alarm communicators are small and require only a limited amount of network bandwidth," says Brett.

TCP/IP interface also provides access to central stations within seconds anywhere in the world ensuring timely and accurate delivery of the alarm signal. Even in the event the primary receiver IP address is inaccessible, the modules are capable of reporting to two different e-mail addresses, which can be associated with a personal computer, pager, enabled mobile phone or handheld PDA.

The Internet alarm communicators are great for installers as they are extremely fast in programming, easy to install and easy to use. The TCP/IP alarm communicators allow for fast emergency response due to reduced backlog at central monitoring station and increase the value of the alarm system. With system administrator software managing the system is easy as it allows clients to add and delete users and download events. The systems integration includes benefits such as account volume, signal processing capabilities and automatically switching redundancy in the event of failure. Unlike traditional telephone line alarm communication there is no fear of line cuts or line failures, ensures reliability and security is more supervised.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Suprema unveils BioStar Air
Suprema neaMetrics News & Events Access Control & Identity Management Infrastructure
Suprema launches BioStar Air, the first cloud-based access control platform designed to natively support biometric authentication and feature true zero-on-premise architecture. BioStar Air simplifies deployment and scales effortlessly to secure SMBs, multi-branch companies, and mixed-use buildings.

Read more...
Back-up securely and restore in seconds
Betatrac Telematic Solutions Editor's Choice Information Security Infrastructure
Betatrac has a solution that enables companies to back-up up to 8 TB of data onto a device and restore it in 30 seconds in an emergency, called Rapid Access Data Recovery (RADR).

Read more...
Advanced surveillance storage from ASBIS
Infrastructure Surveillance Products & Solutions
From a video storage solutions perspective, SkyHawk drives, designed for DVRs and NVRs, offer high capacity, optimised firmware, and a reliability workload rating of hundreds of terabytes per year.

Read more...
Power surges are killing our networks
Duxbury Networking Infrastructure
With power surges and lightning strikes becoming an all-too-familiar threat to South African infrastructure, Duxbury Networking is calling on local installers and network integrators to follow proper grounding protocols.

Read more...
The future of the surveillance channel
Duxbury Networking Technews Publishing Elvey Security Technologies SMART Security Solutions Surveillance
The video surveillance market has evolved from camera-based specifications to integrated solutions that solve customers’ problems. Moreover, the growth of AI and cloud has changed the channel even more, with more to come.

Read more...
A passport to offline backups
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure Smart Home Automation
SMART Security Solutions tested a 6 TB WD My Passport and found it is much more than simply another portable hard drive when considering the free security software the company includes with the device.

Read more...
Five tech trends shaping business in 2025
Information Security Infrastructure
From runaway IT costs to the urgent need for comprehensive AI strategies that drive sustainable business impact, executives must be prepared to navigate a complex and evolving technology environment to extract maximum value from their investments.

Read more...
Threats, opportunities and the need for post-quantum cryptography
AI & Data Analytics Infrastructure
The opportunities offered by quantum computing are equalled by the threats this advanced computer science introduces. The evolution of quantum computing jeopardises the security of any data available in the digital space.

Read more...
Navigating today’s cloud security challenges
Information Security Infrastructure
While the cloud certainly enables enterprises to quickly adapt to today’s evolving demands, it also introduces unique challenges that security teams must recognise and manage. Vincent Hwang offers insights from the 2025 State of Cloud Security Report.

Read more...
Smarter ways to secure your space
Elvey Security Technologies Access Control & Identity Management Products & Solutions
Ensuring the safety of people and assets has become more crucial than ever, and access control systems provide essential tools to regulate and monitor who can enter specific areas or access sensitive resources.

Read more...