Monitoring via GSM network

October 2001 Perimeter Security, Alarms & Intruder Detection

Established in 1995, to provide technical support and commissioning service to the fire, access, safety and security industries, Lark Street Investments has rapidly expanded to a position as a leader in maintenance and servicing of fire detection and firefighting, CCTV, public address, access control and mechanical systems.

The company offers a host of services and products such as CATE (cell activated terminal emulator).

The remote communicator

CATE is a 'terminal' installed at a remote site and is able to monitor, activate and control functions and collect data about the equipment installed at this remote site utilising GSM network as the communication medium.

The system uses SMS (short message service) as the means to issue commands and retrieve data.

CATE is able to monitor the status of eight digital inputs; monitor the status of four analog inputs and switch eight isolated relay contacts.

Further capabilities such as to connect remote RS232 equipment to a local terminal; down and upload data from a remote site, and image data transfer are in development.

CATE talks to you via your cellphone

The system is implemented by using a CATE-wire and connected to the equipment at the remote site to be monitored and controlled by a cellphone or other equipment to remotely issue the commands.

The commands are in the form of simple acronym-type messages, along with the prescribed five-digit access code that constitute the SMS, therefore any equipment that can implement these acronym-type SMS', and is able to dial into the GSM network can be used.

The system works on a 'handshake' basis, ie each command will get a reply from CATE at the remote site. CATE can also be controlled by a PC-based program and a GSM modem which is still under development.

Applications

* Guard control/patrol system: easy to control guards logging on and where normal radios can communicate.

* Remote access system: CATE can be linked up to basically any existing access control system. Monitor access system for any defects and report such defects to maintenance staff even before the client is aware of it.

* Remote fire system: CATE can be linked up to basically any existing system.

* Remote building management system.

* Remote container outstation: Monitor intrusion and industrial signals system for any defects and also monitor movement of containers if required.

* Remote vending machine control system: CATE can be linked up to vending machines to monitor stock and report on any low stock vandalism to the operator.

* Remote sprinkler control system.

For further details, contact Lark Street Investments, tel: (011) 744 2336, fax: (011) 740 6043, e-mail: [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

JVA 4-line LCD keypad
Perimeter Security, Alarms & Intruder Detection
The JVA 4-line LCD keypad is integral to the JVA Security Electric Fence product range and provides a centralised interface between the customer and their perimeter security solution.

Read more...
Gallagher’s Integrate 360 event in Durban
Gallagher News & Events Perimeter Security, Alarms & Intruder Detection
Gallagher Security held its Integrate 360 event in Durban, South Africa. The event attracted 65 channel partners, end users, and consultants from across KwaZulu-Natal and broader South Africa to showcase the latest in Gallagher’s technology suite.

Read more...
Nice launches DC Blue Astute garage door motor
Nice Group South Africa Technews Publishing News & Events Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Nice Systems SA has launched the Nice DC Blue Astute, a garage door motor for the South African market featuring a pre-installed lithium-ion battery instead of traditional lead-acid batteries.

Read more...
Wireless security makes its mark
Perimeter Security, Alarms & Intruder Detection
Alarms have always had a wireless component since the first monitoring control room was launched, but internally, homes and companies used to install cables to connect various sensors and devices to the control panel.

Read more...
Lock it down
OPTEX Perimeter Security, Alarms & Intruder Detection
Securing wide outdoor areas presents several challenges that differ significantly from those faced in smaller, more confined environments, and choosing the right intrusion detection technology is the key to safeguarding these spaces.

Read more...
Smart, reliable detection in any conditions
OPTEX Perimeter Security, Alarms & Intruder Detection
In its discussions with companies operating in South and Southern Africa’s detection and alerting technologies market, SMART Security Solutions spoke to OPTEX for more information on its solutions and technologies.

Read more...
The unseen barrier: AI and perimeter monitoring
Verifier Perimeter Security, Alarms & Intruder Detection Surveillance AI & Data Analytics
Perimeters have been one of the most important security aspects since antiquity, but what does perimeter monitoring look like in the age of AI, CCTV, thermal detection and modern off-site surveillance?

Read more...
Surveillance on the perimeter
Axis Communications SA Hikvision South Africa Technews Publishing Editor's Choice Perimeter Security, Alarms & Intruder Detection
Cameras have long been a feature in perimeter security, with varying reports of success and failure, often dependent on the cameras’ planning, installation and configuration, as well as their integration with other perimeter solutions and centralised management platforms.

Read more...
Directory of suppliers
Perimeter Security, Alarms & Intruder Detection
The Directory of Product and Solution Suppliers for the alarm, intrusion, and perimeter markets includes details of companies that provide security and risk mitigation products, advice, and services to these verticals.

Read more...
Visual verification raises the security game
Technews Publishing Inhep Electronics Holdings Videofied SA Editor's Choice Perimeter Security, Alarms & Intruder Detection
Incorporating alarm signals with live surveillance footage, visual verification enables a human observer in a control room (onsite or offsite) to gain a clear understanding of the situation, thereby facilitating informed decision-making.

Read more...