Académique Documents
Professionnel Documents
Culture Documents
128 Chapter 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
A home security and surveillance system is an essential part of any modern automated home. The basic design of a security system begins with analyzing the needs of the inhabitants, surveying existing technology and hardware, reviewing system costs, considering monitoring choices, and finally planning the installation. In addition to perimeter and interior protection offered by a security system, surveillance monitoring includes features that enable the inhabitants to observe environmental conditions inside and outside the home when at home or away. In a home surveillance system, video cameras and display systems are considered by most contractors to be optional items. Subject to the homeowners choice, surveillance equipment can function independently from the basic features included in home security monitoring. This chapter provides the information you will need to know as a home integrator for designing, integrating, and installing a home security and surveillance system.
Design Considerations
The design of a security and surveillance system should provide for the protection of the entire perimeter of a home as well as visual- and audio-based surveillance monitoring. Security system sensors are available that are designed to detect sound, window and door intrusion, air movement, body heat, motion, and other conditions that indicate an intruder is present. A good security system design should consider the best plan for existing homes as well as new construction. It should also consider the lifestyle of all the inhabitants, the location of valuables or any items to be protected, how the system is to be controlled, adequate smoke and fire alerting sensors, and the type of emergency response required. The design choices are numerous and varied due to advances in home security technology and the wide availability of compact, low-cost video surveillance systems.
129
for do-it-yourself installation. The basic advantages of wireless security systems are
Wireless systems are easy to installThey avoid the expensive and time-
new location.
Wireless sensors are designed to transmit a unique identification code to a
controllerThe controller learns the identity of each sensor and links it to an appropriate zone. Each sensor also transmits status information such as battery voltage, condition of the sensor switch, and other diagnostic messages.
Some homeowner-installed wireless security systems can be set up to record a
voice message and to call programmed numbers in the event of an alarm This saves the cost of a professional monitoring service.
Wireless sensors, motion detectors, and video cameras can often be installed in
locations that are not accessible for wired equipment. The basic disadvantages of wireless security systems are
Wireless system design specifications can limit the distance between sen-
130 Chapter 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
detectors, smoke and fire sensors, cameras, camera switchers, video displays, and sirens. The advantages for a hard-wired security system are
Hard-wired security systems are considered by most contractors to be
the system. Unlike a wireless system, the hard-wired system remains an integral part of the home. The components are not capable of being moved to another home when the owner relocates.
Problems can arise in the installation of sensors in existing homes where
some areas are not accessible for pulling wires inside the walls.
. . . . . . . . . . . . . . . . . . . . . . . 3.0Home .Security and .Surveillance Systems . . . . . . . . . . . . . . . . . . . . . . . Reporting on the date and time of any alarm conditions that existed Monitoring loud noises that exceed a set time interval using a built-in
131
132 Chapter 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Modern home design should include at least one of each type. Smoke and heat detectors should be located in each sleeping area and on each story of the home and placed on the ceiling or on the wall 6''12'' from the ceiling.
Remember that heat and smoke detectors operate on different types of technology. Heat detectors react to abrupt changes and go into an alarm condition when a temperature changes rapidly or reaches a fixed value. Smoke alarms do not react to heat but go into an alarm condition when smoke enters the sensor area. The two main types of smoke detectors are ionization and photoelectric.
Environmental Monitoring
Environmental monitoring can be incorporated into the design of a home security and surveillance system to monitor the status of specific conditions. This might be applicable to rural homes, vineyard owners, farmers, fruit growers, and ranchers. Environment monitoring includes the tracking and measurement of external as well as internal parameters. The following are examples of the types of environmental data that can be monitored with existing sensor systems:
Inside and outside temperatures Barometric pressure Frost alarm Minimum and maximum temperature memory Temperature trend indicator Humidity
miniature wireless radio transmitter with a built-in help button carried or worn as a pendant by the user. Transmitters are lightweight, batterypowered devices activated by pressing one or two buttons.
. . . . . . . . . . . . . . . . . . . . . . . 3.0Home .Security and .Surveillance Systems . . . . . . . . . . . . . . . . . . . . . . . A receiver console connected to the telephoneThis receives radio signals from
133
ice except the personnel in an emergency response center are experienced medical response personnel.
Temperature Sensors
Temperature sensors are used as one component of an environmental monitoring and security system mentioned earlier. They are normally used to monitor high and low temperature values in vacation homes, water pipes, furnace and heating vents, outside farm buildings, computer equipment, utility rooms, or areas that might sustain damage with extreme temperature swings. Temperature sensors are often integrated with a central controller that includes a display, a keypad, and an automatic telephone dialer that can alert the homeowner or monitoring center when temperature limits are exceeded. Temperature sensors use a variety of electronic designs and components to measure temperature, including both analog and digital signal outputs that change value with a change in temperature and operate remote switches or active alarms.
134 Chapter 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
opportunity to install structured wiring outlets in all rooms of the home. This includes 120v AC power outlets, Category 5 UTP cable outlets, #22-gauge two-pair wiring for sensors, and RG-6 coaxial cable outlets.
135
136 Chapter 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
137
and acoustical. The vibration system is mounted on the glass or on a nearby wall and detects movement of the glass. Acoustical systems, or sound discriminators, sense the sound of breaking glass. The unit can be tuned to react only to the specific frequency of glass breaking, typically 4KHz6KHz, or it can react to any loud noise. Some manufacturers have combined vibration and sound detectors into one unit that does not activate unless both are detected. These units can be used where the normal conditions would cause a single technology detector to generate false alarms.
Each sensor receives power and is managed from the control panel. It monitors the health and operating status of the total system and sends a signal to the siren when an alarm condition exists. The panel should be mounted in a location that is out of plain view and near a 120v AC outlet where a plug-in transformer can be used to supply low-voltage power to the total system. If a phone line is planned for connection to an external monitoring facility, access to the location where the phone line enters the home must be considered when locating the control panel. Preferred locations are utility rooms, basements, and closets.
138 Chapter 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Physical Devices
The six major physical components of a home security and surveillance system are described in this section. Although some designs include additional components for enhanced performance or custom installations, the physical devices described here are considered the basic building blocks for a security and surveillance system that will provide adequate protection from intrusion. The essential physical assemblies include
Keypads Sensors Security panels Cameras Monitors Switchers
Keypads
The keypad is the device used by the home residents to initiate commands for control options and observe the status of the security system. As shown in Figure 3.3, it usually contains an alphanumeric keypad and LED displays that indicate the status of the alarm system.
The keypad is used to arm and disarm the system and often includes a panic switch by which the alarm can be triggered instantly in an emergency situation. The alarm can be silenced by the owner by entering the correct coded sequence of numbers on the numerical keypad. The keypad is typically installed inside the home near a door that is most frequently used by the residents. A programmed delay is included as a feature of most systems to enable the users to enter and disarm the system within a fixed delay period (normally 3045 seconds). The same fixed delay is also used to allow the user to arm the system and exit the home within the fixed delay period. Keypads can also be used to bypass certain areas.
The bypass function is used to arm the system but disable selected zones or motion detectors inside the home when the family is present. Residents often desire to secure the perimeter area of doors and windows after retiring for the evening but need to bypass interior area motion detection sensors that are activated only when the home is not occupied.
139
Sensors
Sensors are designed to protect both the perimeter and the open spaces inside the home. As mentioned earlier, perimeter devices primarily protect doors and windows. The most common perimeter sensors are magnetic door switches, window vibration detectors, and window acoustical detectors. Space protection sensors called motion detectors cover interior rooms and hallways and can detect an intruder who has been able to defeat a perimeter device. Exterior motion detectors and motion-activated security lights are also used. The following paragraphs describe the types of sensors required in basic home security and surveillance systems.
Door Switches
Door switches work on a basic principle of a two-part magnetic switch. A switch that is sensitive to a magnetic field is mounted on the fixed structure (frame), and wires from the switch are routed through the wall to the control panel. A magnet is mounted on the door in a position where it is in close proximity to the switch when the door is closed; this also keeps the switch closed. Opening the door moves the magnet away from the switch and causes the switch to open, which is sensed by the central control panel and activates an alarm. Magnetic switches are available as normally open (NO) or normally closed (NC) to accommodate different wiring designs and controller options.
140 Chapter 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Motion Detectors
Motion detectors work by detecting the changes in the infrared energy in an area. Because these devices do not emit any energy, they are called passive infrared (PIR) detectors. PIR detectors use a lens mechanism in the sensor housing to detect a change in infrared energy across the horizontal sectors covered by the sensor. This type of detector is insensitive to stationary objects but reacts to rapid changes that occur laterally across the field of view. They are the most common and economical type of motion detectors and are available in standard, pet-friendly, and harsh-environment (outdoor) models. An example of a motion detector for interior use is shown in Figure 3.4.
Security Panels
Security panels provide several functions to coordinate the operation and management of a security system. They can include an integrated keypad or LED indicators. Most designs include a power transformer for converting the AC voltage to a DC voltage for the sensor loop and contain a rechargeable battery for backup if the commercial power fails. A terminal strip provides for the connection of the wiring that connects all the sensors to the controller as well as the external telephone line. Most designs include a printed circuit board containing all the electronics and a microprocessor. It also connects to and controls the siren that is activated when an alarm condition exists.
Security panels are known by numerous names, such as central control box, control panel, alarm panel, and interface panel. They all perform similar functions including controlling and monitoring sensor status, providing power to the system, connecting the telephone line to the monitoring station, and handling the programmable options for the system.
141
Cameras
Surveillance systems for the home use video cameras that convert the image into a video composite or S-video signal for display on a video monitor. The best type of camera for home systems uses charged coupled device (CCD) technology. These cameras have high resolutions, low operating light, less temperature dependence, and high reliability. A typical CCD camera used in video surveillance systems is illustrated in Figure 3.5.
Monitors
Monitors are cathode-ray tube display systems similar to computer display systems. They are used to display video information processed by the camera. Coaxial cable is used to connect the camera to the monitor that can be located in any area selected by the user. Monitors do not have a TV tuner and usually have better video resolution than standard television receivers. They can also be connected to programmable switchers that receive input from several cameras and show multiple images on a single monitor. Closed circuit TV (CCTV) monitors are available for black-and-white or color display depending on the resolution and camera selection. Black-andwhite monitors have resolutions in the range of 7001000 lines, whereas color monitors are available with 350400 lines. CCTV monitors are designed for extended 24-hour-per-day operation.
142 Chapter 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Video surveillance systems for both home and commercial business use are referred to as closed circuit TV (CCTV) systems. The name is derived from the type of the system used for transmission over a closed circuit or private transmission circuit rather than a standard television broadcast system. CCTV is also used in a wide variety of applications for schools, business video conferencing, retail store surveillance, and gambling casinos.
Switchers
Switchers are devices used with multiple camera systems. Although primarily used in commercial building security and surveillance systems, they can be scaled to fit the needs of a home security system. They enable several cameras to be used with a single monitor. The switcher can be programmed to cycle through all the cameras in a surveillance system or dwell on each camera for a specified length of time, usually in the range of 160 seconds. Exterior sensors can detect movement and cause cameras to start recording the image on a VCR. Quads are special devices that enable the viewer to simultaneously record and monitor four cameras. It does this by splitting your screen into four sections. The normal configuration for connecting a quad switcher with a sensor and a VCR is shown in Figure 3.6, which illustrates the connections between a quad, a monitor, and four surveillance cameras. The monitor can view all four images at the same time.
Video Monitor Sensor Video Cameras
VCR
143
Zone Layout
Home security and surveillance systems are usually designed with certain areas of the home designated as zones. A zone can include interior motion detectors or certain rooms or hallways. The use of zones has several purposes. It enables the user to arm only portions of the system, such as the perimeter doors and windows, while bypassing the interior motion detectors when retiring for the night. When leaving the home, all zones, including the interior, can be armed as required. A zoned security system layout is also used by the external monitoring service to know which sensor in a designated zone is causing the alarm. If a sensor were to be reported as just sensor 3 zone 5, this could mean just about anywhere at first. But if the sensor were reported as sensor 3 zone 5 perimeter, this would give the operator a better understanding that the violated area is on the outside of the premises. Another reason for using a zoned security system layout is the ease of troubleshooting if a sensor is reported as a bad sensor. For example, if a bad sensor is reported as being in zone 3 perimeter, there is no need to troubleshoot sensors that are located in the interior of the system.
Passwords
Passwords are used as a confirmation tool by most professional alarm monitoring service companies. They are used to avoid a police response when a false alarm situation has been triggered accidentally while still ensuring that the homeowner is safe. The passwords are known only by the residents and the monitoring station personnel. When an alarm condition is received from the home at the monitoring center, the person on duty calls for a police response to the home. However, this occurs only if the alarm is not reset in a predefined length of time. If the alarm is reset at the keypad with the correct code by the owner prior to the time limit, the monitoring station simply calls the subscriber and asks for a password. The password response has two agreed upon formats: One password is used by the homeowner to indicate the alarm condition was accidental and no action need be taken by the monitoring station.
144 Chapter 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Another secret password is used if the owner is in peril or possibly held hostage by a burglar. This password, when passed after an alarm condition has been reset, results in a police response. This is the option used if the homeowner is asked to respond to the monitoring station phone call by an intruder who (hopefully) does not know the distinction between the two passwords. Passwords are used only if the monitoring station needs to authenticate the cause of an alarm condition when the residents are at home. Law enforcement agencies can penalize homeowners for excessive false alarms.
Common sense should guide the selection of a security system password used with a monitoring service. Never use family or pet names, birth dates, street names, or any word found in the dictionary. The preferred password should include both letters and numbers, and a password should be memorized and never be written down. Numeric keypad codes should also avoid the use of birth dates or home address numbers.
Keypad Locations
Keypads are located by most contractors on the inside wall near the door most often used by the occupants. They are also frequently located in the bedroom to provide easy access by the users when retiring or arising. Keypads used for home security perimeter protection are not recommended for outside mounting because this would allow tampering, vandalism, or attempts by an intruder to search for a correct code. Some exceptions to this rule are applications such as exterior security gates and gated community entrances.
Sensor Locations
Sensors perform all the functions required for detecting and reporting an intrusion in the area they are designed to protect. Window and door sensors are installed on the door or window frame. Window sensors can be protected by either a magnetic switch that detects an opening of the window frame or other types mounted on the window to detect the sound or vibration of broken glass. Interior surveillance cameras and motion detectors are usually wall mounted and are used to protect open areas where an intruder might be able to defeat the perimeter security system sensors. Exterior surveillance cameras and security lighting systems should be located in areas near the front, side, and rear entrances to detect intruders before they reach the perimeter security sensors.
145
146 Chapter 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Camera Locations
Surveillance cameras can be mounted outside the home to provide recognition of someone wishing to enter the security perimeter area, such as a front door or driveway gate. They should be located where no blind spots exist or where it is not practical to use other types of sensors. Cameras can be mounted on any surface area of the home or garage where coverage is required as long as the area is illuminated sufficiently at all times after dark. They are often used in the interior of the home to monitor a childs playroom or nursery. Although not usually a problem in a residential application, certain legal implications are involved in using video surveillance cameras. They are not to be used where there is a reasonable expectation of privacy by individuals who are not aware that they are in a location where a camera is installed. This obviously does not apply to a person breaking into a business or home.
Surveillance cameras can be used in most exterior residential locations; however, you should remember that a surveillance camera cannot be located where there is a reasonable expectation of privacy.
Figure 3.9 Motion detector light. Exterior security lighting should be used near landscaped areas around the home, such as shrubs, bushes, foliage, and trees. Security lighting systems used during dark hours avoid the problem of allowing an intruder to enter the area surrounding a home and attempt entry while unobserved in a dark area.
147
Device Connectivity
Connecting all components of a security system requires compliance with national and local building and fire codes. Each internal and external interface involves selecting and identifying the correct type of wire, coaxial cable, and termination points.
Telephone
The telephone line is used by a security system to automatically call a central monitoring facility when an alarm condition exists. The alarm system controller box must be connected to the phone line with an RJ-31x phone jack. This connector takes priority when an alarm is triggered, disconnects the home phones, and dials the number of the monitoring service. This prevents a burglar from taking the phone off the hook to prevent the system
148 Chapter 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
from dialing out. The proper wiring connection for an RJ-31x connector is described later in this chapter in the section Installation Plans.
Coaxial Cabling
Coaxial cable is used to transport video signals between video cameras and monitors in home video surveillance systems. The quality of the video signal is affected if poor-quality cable or the wrong type of cable is used. Structured wiring standards recommend the use of RG-6 coaxial cable and F-type connectors for connecting cameras and monitors.
Termination Points
The main termination points for a home security system are contained in the control panel. All the sensors installed throughout the home are connected with low-voltage wiring and routed through walls to the central controller termination strip. The telephone line also has a termination point where it enters the control panel enclosure. An RJ-11 telephone jack is retrofitted with a RJ-31x jack. The four telephone wires are then terminated on the controller main connection bus with the other external cabling harness.
In-house Services
Several types of security and surveillance services are available to residential users that have been previously used only in larger commercial business systems. Smaller, scaled-down types of home video surveillance and monitoring systems provide an economical option for homeowners. Two types of systems that provide internal services to residential users are discussed in the following paragraphs.
149
Alarm Types
Alarm sounders not only attract the attention of others outside the home, but also create a sufficiently high level of sound to discourage an intruder. Various types of sirens, horns, buzzers, klaxons, and bells are used to attract attention when an alarm condition is activated. Different types have varying levels of volume for various locations. Older alarm systems used bells typically mounted on an outside wall. Today bells are rarely used except in commercial buildings for fire alarms. They have been replaced in home security systems by solid-state electronic sirens, such as those shown in Figure 3.10. These sirens provide a higher level of sound output as well as a variety of tones and sound pitch.
Figure 3.10 Electronic siren. Interior sounders installed in concealed areas in the home operating at maximum sound levels are designed to frighten an intruder into making a fast exit because the sound masks any opportunity to hear an outside approaching police siren. Interior sirens are available from several vendors that operate at sound levels in the 110dB120dB range, which is near the threshold of pain.
Smoke Alarms
A smoke alarm is designed to alert the residents of a home that a fire is either in progress or in the initial stage. Smoke alarms have built-in sounders designed to awaken the occupants of a home and alert them of the danger. Many areas now have building codes that require all smoke alarms installed in the home to sound the alarm if any single unit is activated. Most smoke alarms have a test button that checks the sounder as well as verifies that the battery is operational.
External Services
External security and surveillance services are available from private companies which are connected by dial-up phone service to the home security system. Another type of service is available for residents who want to check on the status of the security system when they are away.
150 Chapter 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Remote Access
External access to the home security system by means of telephone lines is called remote access. Remote access can be designed into a system that permits the user to call from a remote site and set system parameters or obtain voice-synthesized status messages concerning any sensor that has detected a value outside programmed values such as heat, cold, water leakage, loud noises, alarm history, or other custom features.
151
phone line and the alarm panel to provide priority for the alarm system.
Home run wiring is required from all sensors/detectors to the control panel. Passive sensors need only two wires, and active sensors require four wires. 22-gauge or larger wire should be used for connecting sensors to the con-
trol panel.
When security wires are crossed with power wiring, they must cross over
at a 90 angle.
Video surveillance systems require RG-59 or RG-6 coaxial cable with
the location of sensors and cabling devices must align with the requirements of the National Fire Protection Association, the National Electrical Code, and the National Fire Alarm Code.
The ANSI/TIA/EIA 570A standard requires at least 12'' of separation between parallel runs of security wire and AC power wiring. You should also remember that, when security wire and cabling is crossed with AC power wires, the crossover must be at a 90 angle.
152 Chapter 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Underwriters Laboratories
The Underwriters Laboratories (UL) is a nonprofit organization that has established standards for all components of security systems and their installation. If the product has the UL label, the device meets or exceeds ULs requirements.
Installation Plans
Installation planning should follow the guidelines mentioned earlier in ANSI/TIA/EIA-570A Amendment 1 and NEC articles 725 and 760. Important requirements are summarized in this section for RJ-31x jacks, motion detectors, and video surveillance systems.
RJ-31x Jack
Telephone
153
154 Chapter 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Answer C is correct. A quad switcher is designed to provide simultaneous viewing of four cameras on one monitor using a split-screen display. Answer A is incorrect because a video splitter is used with TV antenna systems and is not an active component required with four-camera surveillance systems. Answer B is incorrect because a modulator is not required for viewing images. Answer D is incorrect because a photoelectric sensor is used to monitor ambient light conditions for security systems and is not required as a component in a video surveillance system.
Question 2
Which type of jack is required to be installed to allow the security system to seize the line when an alarm condition exists? A. RJ-11x B. RJ-45 C. RJ-12 D. RJ-31x
Answer D is the correct answer. The RJ-31x jack is used to disconnect all the phones in the home when an alarm condition is initiated. This enables the alarm panel to have priority over all uses of the phone when it needs to call the outside monitoring facility. Answers A and C are incorrect because both types of RJ-11 jacks are used for standard telephone four-wire connections and are not applicable to security system connections. Answer B is incorrect because RJ-45 connectors are used for four-pair UTP cabling in local area network networks and are not required for security system applications.
155
Question 3
Which TIA/EIA standard describes the requirements for residential security system cabling? A. 568-A B. 568-B C. 570-A Addendum 1 D. 570-A Addendum 3
Answer C is correct. Addendum 1 to 570-A is the standard that references residential security system cabling. In 2002, Addendum 1 to the 570-A standard was released covering residential security system wiring. Answers A and B are incorrect because the 568-A and B standards cover commercial building telecommunications wiring standards. Answer D is incorrect because Addendum 3 to the 570-A standard is applicable to whole home audio cabling for residences and is not used to specify security system wiring.
Question 4
What is the term used to describe the amount of light required to obtain a reasonable image with a surveillance video camera? A. Lux rating B. Candlepower rating C. Resolution D. Pixels
Answer A is correct. Video surveillance cameras are usually designed to work in low-light conditions and are rated in lux. 1 lux is approximately the light from one candle measured from 1 meter. Typical camera ratings range between 0.5 and 1.0 lux. Answer B is incorrect because the candlepower rating is the measure of light intensity and is not a specification parameter used with video cameras. Answers C and D are incorrect because resolution and pixels are terms relating to video imagery quality and are not applicable to light measurement for a video surveillance camera.
156 Chapter 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Question 5
How many wires are normally required for connecting a passive sensor to the control panel? A. 1 B. 4 C. 2 D. 3
The correct answer is C. A passive sensor requires two wires because no power is applied to a passive security system sensor. An active sensor requires four wires because, by definition, an active sensor requires a power source. Answers A, B, and D are incorrect because they each represent the incorrect number of wires required to connect a passive sensor to a control panel.
Question 6
Which type of sensor is used for door installations? A. PIR B. Contact sensor C. Active D. Magnetic switch
Answer D is the correct answer. Magnetic switches are used for doors because of their low cost and capability to be hidden.
Question 7
Which types of cable are used when installing video surveillance components? A. RG-6 and RG-58 B. RG-8 and RG-59 C. RG-59 and RG-6 D. RG-59 and RG-58
Answer C is correct. RG-6 and RG-59 are both 75-ohm types of cable. RG-6 is a higher grade used for low loss applications, whereas RG-59 is satisfactory for short runs. RG-8 and RG-58 are rated at 50 ohms of impedance
157
and are not compatible with most CCTV equipment impedances of 75 ohms, making answers A, B, and D incorrect.
Question 8
What is the minimum separation required between security wiring and AC power wiring when they are installed in parallel wire runs? A. 18'' B. 2 feet C. 6'' D. 12''
Answer D is correct. The ANSI/TIA/EIA-570-A Amendment 1 standard indicates the minimum spacing for security and power wiring is 12'' when installed in parallel runs. Answers A and B are incorrect because any spacing between security wiring and power wiring in excess of 12'' would be in excess of the minimum requirement. Answer C is incorrect because the answer is less than the minimum spacing of 12'' required between power wiring and security wiring.
Question 9
Which type of residential location is typically classified as a perimeter security location when designing a security system? (Select two.) A. Windows B. Basements C. Driveways D. Doors
Answers A and D are correct. The sensors typically connected to a single monitoring circuit that surrounds the perimeter of a residence are placed on the doors and windows. This provides protection for any opening in the primary structure. Answer B is incorrect because the basement is not normally included as a perimeter protected area but would use interior motion detectors. Answer C is incorrect because driveways are normally protected by exterior surveillance monitors such as video surveillance or motion detector systems.
158 Chapter 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Question 10
Which of the following is true regarding the use and installation of smoke detectors? (Select all that apply.) A. For all new residential construction, battery-powered smoke detectors are acceptable for some locations. B. For all new home construction, fire alarm sensors must be powered by the home AC power electrical wiring. C. For homes built prior to 1979, battery-powered smoke alarms are permissible. D. Smoke detectors must be installed near windows and doors to provide alerts for escape routes in case of fire.
Answers B and C are correct. The NFPA rule 72 requires smoke detectors for new residential construction to be powered by AC wiring as the primary power source of power with battery power used only as a backup source in case of a power failure. Answer C is correct because battery-powered smoke detectors are permitted for homes built prior to 1979. Answer A is incorrect because the NFPA rules make no allowance for smoke detectors powered by batteries in specific locations in new residential construction. Answer D is incorrect because smoke detectors are designed to alert the residents of a potential fire condition. Smoke detectors are not designed to aid in locating an escape route from the home in case of fire.
159