0% found this document useful (0 votes)
28 views

Bu Research No. 03 - Communication, Fdas, and Security System

security systems
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views

Bu Research No. 03 - Communication, Fdas, and Security System

security systems
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

I.

INTRODUCTION

Security is a form of protection that against the possible harm.


This study is all about considering the safeness of the users of the
building that’s why there are two systems will discuss to this. It will
inform us that those systems will help us to reduce the risk if there is
harm. Security really matter. In every building we occupy, the one its
purpose is to secure our safeness and privacy to avoid harm.

However, fire detection and building security systems are


essential components in modern architecture, providing a protection
for both occupants and to the building. Fire detection systems offer
early warning to prevent losing life and damage, while security
systems help protect against unauthorized access and other potential
threats. These systems are essential for all types of buildings. As
safety rules change and new technologies are developed,
understanding it how to fit these systems into buildings effectively can
make them secure and resilient. As an architecture student,
integrating these systems into design means balancing safety with
aesthetics and preserving the integrity of the built environment. This
research will discuss the function, durability and importance of this two
systems.

II. DISCUSSION

Fire Detection System

This systems

serves as an alert to the occupants of a bulging and the emergency


services for quick response action to avoid a possible risks and
property damages. It is commonly found in commercial buildings that
this system are essential and required. It can also found in residential
houses. It includes smoke detectors, heat detectors, and manual fire
alarm activation devices. Those components of this system are
connected to the to the fire alarm control panel, which are usually
found in an electrical or panel room. This system has an audio and
visual signalization to give us warn or to the occupants of the building.

Its designed for protection requirements in a location with a


referencing the levels of security mandated by the authorities. The
equipment has a standardized installation methods that are specially
manufactured.

Detection Technology of Fire Detection Systems

Smoke detectors

This is the indicator of fire that are usually housed in plastic


enclosures and typically shaped like a disk about 150mm in diameter
and a 25mm thk. It is sensitive alarm that can be used to detect and
deter smoke in banned areas. The usual type of detectors has a two
main categories, the ionization and photoelectric.

Ionization detectors work by sensing


changes in electrical current caused by smoke
particles. It is supported by two plates with
voltage between them. This is more sensitive
to fires.

Photoelectric detectors are ones use a


light beam to identify the disruptions caused by
smoke and it aims to directly into a sensing
chamber, away from sensor. Its light sensor when
this interrupted, it will scatter the light in many
direction that triggers the alarm.

There are modern fire detection systems


that these two detectors are in one to enhance
more its function, including the the manual call
points that people notice the fire.
Fire Sprinkler Systems

This is an active fire protection method. It has a water supply


system that are connected to the water distribution piping system with
sprinkler heads that release water when a fire is detected that helps to
prevent the spreading of the fire.

According to NFPA notes determined by the document of NFPA 1,


the standard for installation of sprinkler systems, there are four types
of fire sprinkler systems. These are:

Wet Pipe System

This is the most common type of


sprinkler system. It contains a water in the
pipes at all the time. Its is ready to discharge
an amount of water when the sprinkler head is
activated by heat. It constantly maintain the
pressurized water within the pipes.

Dry Pipe Systems

This systems are designed for the


environments where there are freezing
temperatures are a concern, for areas with
an ambient temperature that freeze the
water in a wet pipe system. Its pipe system
are filled of air or a nitrogen, when the
sprinkler head is activated, its air are
released that allows the water to flow to
extinguish the fire.

Pre-Action System

Is more complex but used commonly where an


accidental water discharge to protect the space
would be catastrophic to business and its
operation in data centers or in the museums.
This is designed to minimize the risk of false
alarms and water damage in the facility. It is a combination of water
and air pressures to activate the sprinkler system and supress the fire.
This sprinkler system has 3 sub types to control the function and
activation allowing the water. Non-interlock system, single interlock
system, and the double interlock system. The heat detector's
temperature rating is typically lower than the sprinkler heads for single
and double interlock pre-action systems. This is to make sure that
when the head's bulb breaks, the system is turned on and prepared to
discharge, causing a pressure drop. Additionally, non-interlock system
can not provide much protection from accidental activation.

Deluge Sprinkler Sytem

It is similar to pre-action system. It


system control the discharging of the
water by single interlock, which this
sytem was the detector. It will
discharge into complete space, from
every head and not the fire as per the
pre-action system, which uses sprinkler
heads with bulbs. Itsuses a large
number a sprinklers to extinguish
severe fuel hazards.

Design Standards Governing the Fire Detection and Alarm


Systems

 The National Fire Protection Association (NFPA) Standards

The outline of NFPA system is the installation, performance, and


the maintenance requirements. It establish the comprehensive
standards for the fire alarm system, which is the NFPA 72. The
standards of this design is widely adopted and serves as benchmark
for fire protection.

 The International Organization for Standardization

The ISO 7240 provides the guideline for fire detection and alarm
systems. ISO 7240 provides an early detection of fire and
notification within one or more specified indoor or outdoor areas for
the protection of lives. It specifies the requirements for FDAS that
provides a signals to audible warning systems to initiate the
operation of ancillary technical services. This standard focuses in
system components such as, smoke detectors and alarm signaling
devices that ensures a stable performance across different
environment.
 Local Building Codes

There are specific building codes in any region that mandate fire
detection systems with an essential for compliance and safety. The
codes are frequently detail the types of systems required,
installation protocols, maintenance practices.

Building Security System

A complete solutions, building security systems are designed to


protect structures and their occupants from a range of dangers, such
as theft, vandalism, and illegal entry that may can cause harm of
damage. To ensure safety and security, these systems make use of a
variety of gadgets and technologies. The goal of this system was to
deter, prevent, detect, and respond to physical security violations
effectively.

The importance of this system is to give a protection of the


building, usually the occupants. Everyone needs a privacy that’s why
the main objectives of this system is to ensure the security of the user
to avoid different risks and harm. It adds a comfort to the users to
have an assured place because of a building security.

Topics that are related to Security and Communication System

 Access Control Systems

This is the heart of the building security. it limits the access


individuals, including the electronic locks, keycards, biometrics, and
key fobs. The best practices for implementing access control system
was to conduct a security assessment, choose the right system, and a
regular updates and maintenance.

Types of access control system

1. Discretionary Access control

It allows the owner to restrict an access to a certain areas. It


needs a manual oversight.

2. Mandatory Access Control (MAC)

It always used in high security environment. This system classify


all end - user and provide access based on security clearance.

3. Role based Access Control (RBAC)

It is based on the user’s role within the organization, automating


the access permissions and simplifying the management.

 Surveillance Systems

It involves keeping an eye on


behavior, a variety of activities, or data
in order to collect, influence, manage, or
guide. This can involve using electronic
devices, like closed-circuit television
(CCTV), to observe from a distance or
intercepting information that is
transmitted electronically, like Internet
traffic. Governments are increasingly
able to acquire consumer data by
purchasing online information, thereby
increasing their capacity for surveillance
using commercially accessible digital records. Simple technical
techniques like postal interception and human intelligence collection
may also be included.
 Intrusion Detection System (IDS)

A security tool that observes the computer network or a system


for malicious transaction or policy violations and sends sudden
alerts. By the use of SIEM system or a notified to an administration,
it is often recorded the illegal activity or a violation. This system
protects the computer network from unauthorized access from the
users, such as the insiders.

Types of Intrusion Detection System

1. Network Intrusion Detection System (NIDS)

This type of system observes the passing traffic on the entire


subnet that matches the traffic is passed on the subnets to the
collection of the known attacks. An example of NIDS installation was
located on the firewalls on its subnet. It notify someone is trying to ruin
the firewall.

2. Host Intrusion Detection System (HIDS)

On separate hosts or network devices, host intrusion detection


systems (HIDS) operate. Only the device's incoming and outgoing
packets are monitored by a HIDS, which notifies the administrator of
any suspicious or malicious activity. It takes a snapshot of the system
files that are currently there and compares them to the last snapshot.
An alert is sent to the administrator so they can look into any changes
or deletions made to the analytical system files. The use of HIDS is
demonstrated on mission-critical computers, which are not anticipated
to alter their configuration.

3. Protocol - Based Instrusion Detection System (PIDS)

A system or agent that continuously sits at the front end of a


server and manages and interprets the protocol between a user or
device and the server is known as a protocol-based intrusion detection
system (PIDS). By accepting the associated HTTP protocol and
routinely monitoring the HTTPS protocol stream, it is attempting to
secure the web server. This system must reside in this interface in
order to use HTTPS because it is unencrypted and must first enter its
web presentation layer.

4. Application Protocol-Based Intrusion Detection System


(APIDS)

A system or agent that typically resides within a collection of


servers is known as an application protocol-based intrusion detection
system (APIDS). Through the monitoring and interpretation of
the communication on specific to the application protocols, it
notice malicious activity. One of example was when the application
software interacts with the database on the web server, it would
explicitly monitor the SQL protocol.

5. Hybrid Intrusion Detection System

Combining two or more intrusion detection system approaches


creates a hybrid intrusion detection system. To create a
comprehensive picture of the network system, the hybrid intrusion
detection system combines network information with host agent or
system data. When compared to other intrusion detection systems, the
hybrid intrusion detection system is more effective. One example of a
hybrid IDS is Prelude.

 Communication Systems

In summary, building security requires communication systems


to ensure efficient coordination and prompt emergency response.
Security alarms for breach detection, public address systems for
announcements, emergency notification systems for alerts, CCTV for
real-time monitoring, and intercoms for visitor verification are a few
examples. To provide a safe environment for residents, building
management systems centralize control over multiple operations, such
as fire safety and security, and access control systems oversee entry
points.

There are five categories of communication systems in


commercial building that needs a structured cabling systems. Each
system was defined by the National Electrical Code (NEC). These are:

1. Phone Systems
In order for employees to receive calls while other employees are
making calls, the majority of commercial businesses need multiple
phone lines. A phone switch supports this. Copper cables that are UTP
(Unshielded Twisted Pair) are used to connect each phone to the phone
switch. The following figure illustrates this.

2. Data Systems

A mainframe or minicomputer system is usually referred to as a


"data system." The widely used PC-Server LAN (Local Area Network)
systems of today are not referred to by this term.

Mainframe

Large, centralized computers that


handled all computing tasks are called
mainframes. The mainframe computer had
all of its programs installed, and its disk
drives held all of its data. Through
terminals that were linked to a port on the
mainframe's controller via a
communication cable, users interacted
with the mainframe computer. Hundreds of
terminals could be supported by a
mainframe computer. An entire company
could be supported by a mainframe
computer.

Minicomputers

A minicomputer is a
mainframe computer that is
smaller. The minicomputer's disk
drives housed all of the data, and
the centralized computer system
powered all of the applications. Through terminals that were wired via
copper to a port on the minicomputer, users interacted with the
device.

3. Local Area Networks (LAN)

The first personal computer (PC) was manufactured by IBM in


1980, and LANs (Local Area Networks) were created to connect and
allow communication between PCs. A LAN is a data communication
system that enables direct communication between several separate
devices within a moderately sized geographic area.

4. Building Automation and Control Systems (BACS)

Building Automation and Control Systems (BACS) are constructed


systems that monitor or control the environment of a building for
security or safety reasons. BACS systems make use of dispersed
sensors or devices and a centralized control unit. A cable connects
each sensor to a port on the central control unit. Additionally, the cable
might supply the sensor with power from the central unit.

Parts of BACS System

 HCAC
 Fire alarm
 Security, access control, and CCTV (closed-circuit television)

5. Sound Systems

Audio systems and overhead paging systems are examples of


sound systems. Many people use sound systems in places like
stadiums, department stores, and airports. Airports and sports
stadiums are two examples of buildings that use overhead paging
systems to broadcast messages. Department stores use audio systems
to play music and make the shopping experience enjoyable.

Components of a typical sound system

 Sound source
 Amplifier
 Communication cable
 Speakers
III. Conclusion

To sum it up, fire detection systems and building security system


has a significant role that protects the occupants to the possible harm
or any kinds of risk may they encounter. The importance of having this
two systems is ensuring the safeness of the occupies to maintain the
avoidance in any accidents. These two provides immediate warnings to
prevent loss of life and property damage. It provides a peace, secure,
risk free surrounding of these two. For maintaining the use of this
together, fire detection system and building security system creates a
comprehensive safety net to protect both environment and people that
sustain the integrity of it.

Reference

Afnan Tajuddin. “Fire Detection and Alarm Systems - Safety Notes.” Safety

Notes, 25 Aug. 2024, www.safetynotes.net/fire-detection-and-alarm-

systems/. Accessed 5 Nov. 2024.

Andrews, Lee. “Comprehensive Guide to Building Security.” Agsprotect.com,

AGS Protect, 13 Feb. 2024, www.agsprotect.com/blog/building-

security-guide. Accessed 5 Nov. 2024.

Fosco Connect. “Communication Systems–Voice, Data, Video, LAN, HVAC,

Fire Alarm, Security, and CCTV.” Fosco Connect, 2024,

www.fiberoptics4sale.com/blogs/archive-posts/95047110-

communication-systems-voice-data-video-lan-hvac-fire-alarm-security-

and-cctv.
GeeksforGeeks. “Intrusion Detection System (IDS) - GeeksforGeeks.”

GeeksforGeeks, 8 Apr. 2019, www.geeksforgeeks.org/intrusion-

detection-system-ids/.

Gonzalez, Zarina. “A Simple Guide to Building Security.” SafetyCulture, 21

Apr. 2023, safetyculture.com/topics/building-security/.

Sabur, Abdus. “Complete Guide to Fire Detection Systems: Types, Benefits,

and Installation Tips.” Https://Qdcipfire.com/What-Is-Fire-Detection-

System/, Abdus Sabur, 2024, qdcipfire.com/what-is-fire-detection-

system/. Accessed 2024.

Senstar. “What Is a Video Surveillance System?” Senstar, 13 Aug. 2021,

senstar.com/senstarpedia/what-is-a-video-surveillance-system/.

Wikipedia Contributors. “Fire Alarm System.” Wikipedia, Wikimedia

Foundation, 16 Apr. 2019, en.wikipedia.org/wiki/Fire_alarm_system.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy