Security System Installation Notes
Security System Installation Notes
Page 1 of 60
1. DESIGN SECURITY SYSTEM
Definition of terms used in security system
CCTV:- stands for closed circuit television
CCTV camera:- an electronic device that produces video signals from an optical
image
DVR:- stands for Digital Video Recorder
It is a device used for recording and processing the video captured by the
analogue CCTV camera
NVR:- stands for Network Video Recorder
It is a device used for recording and processing the video captured by the
IP CCTV camera
HDMI:- stands for High Definition Multimedia Interface.
It is a cable used to connect a monitor to the NVR or DVR
LAN:- stands for Local Area Network
It is a cable used to connect network cameras to the NVR or routers
VGA:- stands for Video Graphics Array
It is a cable used to connect a monitor to the NVR or DVR
POE:- stands for Power Over Ethernet.
It is used to provide both power and data in the CCTV system via LAN
cables
Focal length:- is the distance from the center of camera lens to the imaging
sensor
Blind spot/Dead zone:- is the area which is not visible to the CCTV camera (not
covered by the CCTV camera)
Angle of view/Field of view:- is the area (range of angles) the CCTV camera
can capture clear images
Resolution:- refers to the quality of the video and is measured in pixels (p) e.g
1080p, 720p, etc.
Router/switch:- is a network device that distributes and manages the connection
in the CCTV system network
Cloud storage:- is a remote storage of data over the internet
Frame rate:- is the number of frames per second (fps) in a video footage
Bandwidth:- is the amount of data that can be transferred from the CCTV
camera to a network per second. Measured in bits per second (bps), kilobits per
second (kbps), megabits per second (Mbps) or gigabits per second (Gbps).
The bandwidth increases with the camera resolution, frame rate, number of
cameras connected to the network, recording and streaming settings (continuous
or live), audio streaming and amount of activity recorded (dynamic or static).
VPN (Virtual Private Network):- is a secure way to remotely access CCTV
footage
Aspect ratio:- is the ratio of width to height of a video frame
Page 2 of 60
Retention period:- is the length of time that a video footage is stored before
being overwritten
Types of security systems
(i). CCTV security system
(ii). Fire alarm security system
(iii). Electric fence security system
(iv). Biometric security system
(v). Access control systems
(vi). Intrusion detection system (burglar alarm system)
CCTV security system
Introduction
CCTV system provides surveillance capabilities used in the protection of people,
assets and systems.
A CCTV system serves as a security force booster as it provides surveillance for
a large area than human security personnel.
CCTV systems are often used to support comprehensive security systems by
incorporating video coverage and security alarms for barriers, intrusion detection,
and access control.
Unlike broadcast TV which broadcasts system over air and viewed on a TV tuned
to a specific frequency, a CCTV system links camera to a video monitor using
direct transmission system.
Components of CCTV security system
(i). CCTV camera
(ii). DVR/NVR
(iii). Monitor
(iv). Memory
(v). Cables
(vi). Power supply
(vii). Router
(viii). Switch
Block diagram of CCTV camera security system
Page 3 of 60
(i). CCTV camera:- used to capture the images, video and audio signals
(ii). POE Switch:- used to connect CCTV cameras to the NVR/DVR and also provide
power to the cameras over LAN cables
(iii). DVR/NVR:- used to record and process images and videos captured by CCTV
cameras
(iv). Monitor:- displays the images and videos captured by the CCTV cameras
(v). Power supply:- used to provide electrical power/energy needed to operate the
CCTV system
(vi). Cable:- used to transmit image, video and audio signals in the CCTV system
(vii). Memory unit:- used to store the captured footage (videos, images and audio) for
future reference
(viii). Router:- used to connect remote devices to the CCTV system for remote viewing
Working of a CCTV system
The lenses of the CCTV camera focuses the object to the imaging sensor where it will
get converted to images and video signals. The signal is then transmitted via the system
cables or wirelessly to the DVR/NVR which processes and stores the footage in the
memory for future reference. The footage can then be viewed through a monitor which
is connected to the DVR/NVR through VGA or HDMI cables.
CCTV memory/storage capacity requirement calculation
𝑁 × 𝐵 × 𝐻 × 𝑇 × 3600
𝑆𝑡𝑜𝑟𝑎𝑔𝑒 𝑟𝑒𝑞𝑢𝑖𝑟𝑒𝑑 (𝐺𝐵) =
8 × 1024
Where:
N: Number of cameras
B: Bitrate per camera (in Mbps)
H: Hours of recording per day (24 for continuous recording)
T: Recording duration (in days)
3600: Seconds in an hour
8: Converts bits to bytes
1024: Converts MB to GB
For example:
If 4 CCTV cameras whose maximum bitrate is 2 Mbps are installed to run for one week
(7 days) nonstop, what will be the minimum storage capacity needed for this system
assuming no compression was applied?
Solution
Page 4 of 60
4 × 2 × 24 × 7 × 3600
𝑆𝑡𝑜𝑟𝑎𝑔𝑒 𝑟𝑒𝑞𝑢𝑖𝑟𝑒𝑚𝑒𝑛𝑡 (𝐺𝐵) = = 590.625 𝐺𝐵
8 × 1024
Therefore, 590.625 GB of memory will be required.
1 kB = 1024 Bytes
1 MB = 1024 kB
1 GB = 1024 MB
1 TB = 1024 GB
Video quality resolution refers to the number of pixels displayed in each dimension, which
determines the clarity and detail of the video.
(i). Standard Definition (SD); 480p (720x480):- often used for DVDs and older television
broadcasting. Uses less memory space
(ii). High Definition (HD); 720p (1280x720):- mostly used in online streaming
(iii). Full High Definition (Full HD, FHD); 1080p (1920x1080):- used in modern TVs and
streaming platforms. Offers better clarity and detail compared to 720p but takes up more
memory space.
(iv). Ultra High Definition (UHD); 4K (3840x2160):- used in premium content, high-end
TVs, and streaming services and requires a large storage space.
(v). Ultra High Definition Premium (UHDP); 8K (7680x4320):- Offers extremely high
clarity and detail. Ideal for large displays and professional use cases but requires larger
storage space than the 4K resolution.
Factors that determine the storage requirement in CCTV security system
(i). Bitrate of the cameras:- cameras with high bitrate requires higher storage space
than those with low bitrate
(ii). Resolution of the cameras:- cameras with high resolution requires higher storage
space than those with low resolution
(iii). Number of cameras:- more cameras will require more storage space
(iv). Number of days of recording/retention period:- long retention period requires
large storage space
(v). Hours of recording per day:- continuous recording will require more storage
space than non-continuous recording
(vi). Compression codec:- modern codec H.265 significantly reduce storage
compared to H.264
Video compression is a technique that reduces the size of original video file while
maintaining its quality and thus making it to occupy less space than the original files.
The popular video compression formats include H.264, MJPEG and MPEG4 etc.
Page 5 of 60
Need for/Importance/Advantages of CCTV security system
(i). It keeps record of an event
(ii). It helps reduce costs and risks
(iii). It helps prevent crime/discourage theft
(iv). It helps collect data for research analysis
(v). It assists in law enforcement
(vi). It helps in traffic and crowd control
(vii). It helps improve emergency response
(viii). Remote monitoring provides peace of mind to property owners
(ix). It helps improve productivity at work as it makes the employees follow company
protocols
Types of CCTV systems
(i). Analogue CCTV system:- uses analogue CCTV cameras to capture analogue
footage and transit it over coaxial cables to DVR for recording
(ii). Digital/IP CCTV system:- uses digital/IP CCTV cameras to capture digital
footage and transit it over LAN cables to NVR for recording
(iii). Wireless CCTV system:- uses wireless CCTV cameras to capture digital
footage and transit it wirelessly to NVR for recording
Types of CCTV cameras
(i). Dome camera:- used for indoor surveillance
(ii). Bullet camera:- used for outdoor surveillance
(iii). IP (Network) camera:- transmits signals over LAN cables
(iv). PTZ (Pan Tilt Zoom) camera:- allows left/right (Pan), up/down (Tilt) and In/Out
(Zoom) movement to capture footages
(v). Wireless camera:- transmits signals wirelessly
(vi). Thermal imaging camera:- used in high risk areas that are not well lit or behind
barriers
(vii). Varifocal camera:- allows zooming in/out of the object
(viii). C-mount camera:- it has a detachable lens which allows lens to be changed for
different applications/use
(ix). Day/Night camera:- are cameras that have both day and night vision capabilities
making them applicable for poorly lit areas
Page 6 of 60
Page 7 of 60
Factors to consider when choosing a type of CCTV camera
(i). Location of the camera:- consider whether the camera is for indoor or outdoor
use
(ii). Power supply demands:- consider a camera that can operate with the available
power supply
(iii). Lighting condition of the area:- choose cameras that can work with the lighting
condition of the area
(iv). Budget/cost of materials:- choose cameras that the client can afford
(v). Availability of spare parts:- choose cameras whose spare parts can easily be
accessed
(vi). Type of transmission:- consider whether to use a wired or wireless camera
(vii). Technical support requirements:- do they need any special skill to install and
maintain?
(viii). Resolution of the camera:- choose cameras that provide clear images
(ix). Audio capabilities of the camera:- if audio record is needed, choose a camera
that can capture both video and audio signals
Applications of CCTV security system
(i). Used in street monitoring
(ii). Used in crime management/law enforcement
(iii). Used in disaster management such as assisting in rescue operations
(iv). Used in behavioral research
Page 8 of 60
(v). Used in supermarkets to prevent shoplifting
(vi). Used in banks to prevent robbery and fraud
(vii). Used in office buildings to monitor employee activities
(viii). Used in examination halls to prevent cheating
(ix). Used in hospitals to monitor patients
(x). Used in airports to monitor passengers, luggage and access points
(xi). Used in prisons to monitor activities of prisoners
DVR based CCTV system installation wiring diagram
This type of CCTV system uses analogue (non-IP) cameras which are connected to the
DVR through coaxial or Siamese cable.
Page 9 of 60
NVR based CCTV system installation wiring diagram
This type of CCTV uses IP (network) cameras which are connected to the NVR through
LAN cables or wirelessly through a router.
POE (Power Over Ethernet) switch is used to transmit both data/signal and power in the
same cable (LAN cable)
IP (Internet Protocol) cameras can connect to the internet
Difference between DVR and NVR based CCTV system
DVR based system NVR based system
(i). Uses analogue cameras (i). Uses IP/network cameras
(ii). Cameras are connected using (ii). Cameras are connected using
coaxial cables LAN/Ethernet cables
(iii). Offers lower resolution of upto (iii). Offers high resolution videos of
1080p upto HD or 4K
Page 10 of 60
(iv). The cameras require separate (iv). The cameras can be powered from
power supply and cable for the power from the PoE of the NVR
power from that of data through the same LAN cables
(v). It has limited number of channels (v). It is easy to add more cameras by
available for the cameras using PoE switch
(vi). Requires low initial cost (relatively (vi). Requires high initial cost (relatively
cheap) expensive)
(vii). Requires additional setup for (vii). Can easily be accessed remotely
remote access over the internet or network
(viii). Suitable for smaller standalone (viii). Suitable for large scale and
installations modern installations
Note that DVR-based CCTV systems are ideal for smaller, budget friendly and
standalone/localized setups while NVR-based CCTV systems are better suited for
modern and large scale installations that require high video quality, cloud storage and
easy scalability.
Types of cables used in CCTV system installation
(i). Coaxial cable
They are used for non-IP (analogue) cameras and DVR
RG-59 or RG-6 are the recommended coaxial cables for use in analogue
camera-based CCTV systems
BNC connectors are used to terminate coaxial cables to the DVR and cameras
They are similar to the antenna cables in TVs
Page 11 of 60
(ii). Siamese coaxial cable
Similar to coaxial cable but has additional power cable for powering the cameras
Page 12 of 60
Rip cord:- helps in stripping the cable
Shield:- protects the data signal from electromagnetic interference
The figure below shows RJ45 connectors
Page 13 of 60
(vi). VGA cable
Mostly used for digital video signals to connect monitor to DVR/NVR
Fire alarm control panel:- is the brain of the fire alarm system that controls all the
operations of the system
Initiating devices:- these are devices that monitors the invironment and send
signals to the control panel in case of smoke, fire, heat etc.
Notification devices:- these are devices that provide warning to the people when
there is fire outbreak
Power supply:- it provides electrical power/energy needed to operate the system
Communication devices:- allows communication between the fire alarm system
and other remote devices or fire departments
Working of fire alarm system
When fire breaks out in a given area, the initiating devices senses that and send signal
to the control panel. The control panel analyzes the signal and activates the appropriate
notification devices to alert the occupants that there is fire outbreak in the given
location. It can also send notification to the fire department for faster response.
Types of initiating devices
(i). Smoke detectors
(ii). Heat detectors
Page 15 of 60
(iii). Carbon monoxide detectors
(iv). Manual call points/Break glass detector
(v). Muti-sensor detectors
(vi). Flame detectors
Types of notification devices
(i). Horn/siren
(ii). Bell
(iii). Strobe light
(iv). Strobe sounder
(v). Speaker
(vi). Message boards
It is recommended that both audible and visual notification devices to be used to cater
for the people who have visual or hearing impairment.
Always use fire resistant cables when installing fire alarm systems
Page 16 of 60
(ii). Light scattering smoke detectors
(iii). Light blocking smoke detectors
(i) Ionization smoke detectors
Working principles
It uses a small radioactive source which emits alpha particles. These particles ionize the
air molecules between the positive and negative plates thus helping in completing the
circuit and current starts flowing. When smoke enters into the chamber, the smoke
particles collide with the charged air particles thus deviating them away from the
charged plates which causes a decrease in current. This change in current activates the
smoke detector and a signal is produced to indicate the presence of fire.
(ii) Light scattering smoke detector
Working principle
In this device, an infrared (IR) LED transmitter emits light rays into the detector
chamber. However, the light does not reach the photo diode receiver because of a
barrier between the transmitter and receiver. When smoke enters the chamber of the
detector, the smoke particles scatters the light enabling it to reach the photo diode
(receiver) which then activates the detector and a signal is produced to indicate the
presence of fire.
(iii) Light blocking smoke detector
Page 17 of 60
Working principle
The detector has an IR transmitter which emits IR rays to the photo diode receiver. The
rays reach the receiver when there is no smoke in the chamber. When smoke enters
the chamber, the smoke particles block the light rays thus preventing them from
reaching the receiver. This makes the detector generate a signal to indicate the
presence of fire.
Types of fire alarm systems
(i). Conventional fire alarm system
(ii). Addressable fire alarm system
(iii). Wireless fire alarm system
(iv). Intelligent fire alarm system
Page 18 of 60
(iv) Intelligent fire alarm system
In this type, the devices can analyze their environment and send signals to the control
panel to take actions in case of fire, fault or when the devices need cleaning or
maintenance.
Wiring diagram of a conventional fire alarm system
Page 19 of 60
Page 20 of 60
Page 21 of 60
Applications of fire alarm system
(i). Used in residential homes for early fire detection
(ii). Used in commercial buildings to ensure safety of employees and customers
(iii). Used in factories and warehouses for early fire detection from machines and
other flammable materials
(iv). Used in schools and colleges to ensure safety of students and staff
(v). Used in high-risk facilities such as power plant and gas centers for early fire
detection
(vi). Used in airports, bus terminals and other areas with high human traffic for public
safety
Electric fence security system
An electric fence is a physical and psychological barrier that deters people and animals
from crossing a restricted area by causing a high voltage electric shock in pulses.
Importance of using electric fence over conventional/traditional barrier fences
(i). They have low maintenance costs because they don’t require frequent
maintenance
(ii). They are easy to construct
(iii). They provide better security than traditional fences
(iv). They don’t cause harm/injury to the victim
(v). They are highly effective compared to traditional fences
(vi). They have universal application making them useful in almost all the areas
(vii). They can be installed in an already existing wall/fence
(viii). They have long life span because of less disturbance
(ix). They are portable and flexible to be moved
Applications of electric fence
(i). Used in homes to provide security to the premises
(ii). Used on prison walls to prevent the prisoners from escaping
(iii). Used in high security areas such as airports and petroleum deports to protect
valuable assets
(iv). Used in national parks to prevent wild animals from escaping to residential areas
(v). Used in agriculture to segment/divide grazing land into paddocks
(vi). Used in protecting commercial properties such as warehouses and factories from
intruders
(vii). Used in protecting national borders or restricted zones from illegal crossings
Terms used in electric fence system
(i). Posts:- used to support the electric fence wire
(ii). Insulators:- used to offset the fence wire from the fence post
(iii). Live wire:- the conductor that curries the electric shock current
Page 22 of 60
(iv). Ground wire:- the conductor that takes the electric shock current back to the
energizer
(v). Energizer:- the device that powers the electric fence
(vi). Earth rod/spikes:- they connect the energizer to ground/earth for proper
operation of the fence
(vii). Pulse/shock:- a brief current emitted by the energizer after every few seconds
(viii). Short circuit:- the low resistance leakage caused when live wire touches the
ground wire
Components of an electric fence system
(i). Energizer:- is the device that powers the electric fence
(ii). Power supply:- provides the electrical power needed to operate the fence system
(iii). Conductors:- carries the current from the energizer to the fence and back to the
energizer
(iv). Fencing posts:- used to support the fence wires
(v). Earth rodes/spikes:- used to complete the circuit by connecting the live to ground
when one touches the fence line
(vi). Insulators:- used to offset/separate the fence wires from the posts
(vii). End strainers:- used to increase the tension of the fence wire at the end posts
(viii). Warning signs:- used to warn the people on the danger of touching the electric
fence
(ix). Lightning diverter:- used to divert lighting and prevent it from destroying the
energizer
(x). Notification devices:- notifies the owner when the fence has been touched or
interfered with
Page 23 of 60
Page 24 of 60
Page 25 of 60
Electric fence wiring diagram
Fence line can be wired in parallel or in series depending on the application of
the fence.
The power supply should have a backup. For instance, if the main power supply
is a.c mains, then a battery can be used as a backup in case there is power
blackout to keep the fence energized all the time.
Parallel electric fence wiring
This is effective for wide perimeter fencing such as game parks and grazing
areas.
Because of the parallel connection of the fence wires, the resistance is relatively
low compared to the series wiring.
1 1 1 1 1
= + + + ⋯+
𝑅𝑒𝑞 𝑅1 𝑅2 𝑅3 𝑅𝑛
1
𝑅𝑒𝑞 = 𝑅𝑒𝑐𝑖𝑝𝑟𝑜𝑐𝑎𝑙 𝑜𝑓
𝑅𝑒𝑞
Page 26 of 60
Series electric fence wiring
In this type, the conductors are connected at the alternating ends to form
continuous wire which makes this type of system have a high resistance than
that of parallel wiring.
𝑅𝑒𝑞 = 𝑅1 + 𝑅2 + 𝑅3 + ⋯ + 𝑅𝑛
Mostly used for domestic wiring or in small perimeter fences.
A sounder can be connected to the energizer to warn when the fence is
interfered with.
Page 27 of 60
Page 28 of 60
Minimum standards to consider when installing electric fence
A minimum wall height of 1.5m is required for wall-top electric fence installation
Wall top brackets/posts should be at most 3m apart
Stays/end posts should be installed at every end and corner of the fence and not
more than 50m apart
A lightning diverter should be installed to both the output and return terminals to
protect the energizer and the fence from lightning surges
Use high voltage insulated cable from the energizer to the fence and at all high
voltage insulated transmissions such as under the gate
The high voltage underground cable must be at least 30cm into the ground or at
least 50cm under a driveway
High voltage and low voltage cables should not be installed in the same conduit
Install at least 3 earth rods at the beginning of the fence near the energizer at
least 1.5 meters deep and additional earth spikes/rods every 20-30 meters
Fence earthing system and the mains (electricity supply) earthing system must
be at least 10 meters apart and the two earthing systems must not be linked
together
To reduce resistance of earthing connection, it is recommended that the ground
wires to be connected in parallel unless where the energizer is monitoring the
fence through both the live and ground wires
Warning signs must be installed at every 10m apart, at all entry points and at the
corners or where there is change in direction of the fence line. The first warning
sign must not be more than 2m from the start of the fence
General procedure for electric fence installation
(i). Plan the fence layout:- this involves defining the perimeter, purpose of the fence
and checking the local laws and guidelines for electric fence
(ii). Gather the appropriate materials and tools:- this step involves collecting all the
components needed for the electric fence and the tools that you will need to
install the fence
(iii). Clear the surrounding vegetation and install the fence posts:- this step involves
clearing the grass and vegetation around where the fence line would pass and
installing the fence posts on the dug holes. For wall top mounting, the posts are
cemented (or fixed with nuts and bolts or steel nails) on the top of the wall and
support mechanism welded on them.
(iv). Attach insulators and end strainers:- involves fixing the insulators on the posts
and end strainers on the end or corner posts for proper tensioning
(v). String the electric fence wire:- starting from a corner/end post, attach the wire to
the end strainer and run the wire through the insulators on the other posts to the
other end posts. Use a tensioner to keep the wire taut. Repeat the step to add all
the other strands of wires.
Page 29 of 60
(vi). Install grounding system and warning signs:- drive earth rods at least 1.5 meters
deep and every 20-30 meters in a most soil and attach the ground wire from the
energizer to the earth rods using clamps. Also, install the warning signs on the
fence line at least every 10-30 meters.
(vii). Connect the energizer:- connect the live wire from the energizer to the fence live
wire through a lightning diverter/inhibitor. Also connect the ground wire from the
energizer to the ground wire of the fence.
(viii). Test the fence:- power the fence from 240V mains or any other appropriate
power source and test to check for proper voltage along the entire fence line and
ensure there are not short circuits.
(ix). Maintain the fence by regularly inspecting the wires for sagging, breaks,
effectiveness of the grounding/earthing system and replacing the backup battery
when need arises.
Electric fence wiring for sliding gate
In this case, a gate contact and under-gate cable is used to connect the two sections of
the wall-top fence. A sounder can be connected to the energizer to warn when the fence
is interfered with.
Page 30 of 60
For open gate
Page 31 of 60
Electric fence wiring for non-sliding gate
In this case, no gate contact is used. However, an under-gate cable is used to connect
the two sections of the wall-top fence as shown below. A sounder can be connected to
the energizer to warn when the fence is interfered with.
Page 32 of 60
Operating principle of electric fence energizer
The energizer is powered from a 12V battery or A.C mains which is first converted to d.c
using rectifier circuit. The d.c voltage is then fed to an oscillator circuits that generates
pulses after 1 to 2 seconds. This pulses are used to charge the large capacitors. The
capacitor then releases the stored energy to the step-up transformer in pulses. These
pulses are then steped-up by step-up transformer to produce a brief high voltage pulses
(as high as 9kV or more) which are then fed to the fence live wire.
Types of cables used in electric fence installation
(i). High tensile steel wire:- durable and good conductor but heavy
(ii). Polywire/Polytape:- lightweight and high visibility. Mostly used for paddocking
(iii). Aluminium wire:- lightweight and good conductor but less durable than steel
wire
(iv). Woven wire:- these are wires woven together for improved strength
(v). Underground/Under-gate cable:- used to connect energizer to fence and carry
current beneath gates or obstacles.
The underground cable sizes are 1.6mm2, 2.5mm2, 4.0mm2 and 6.0mm2 where 6.0mm2
is used for longer distances although 2.5mm2 and 4.0mm2 are used in most standard
installations.
The fence wire sizes are 1.6mm2 or 2.5mm2.
A razor wire may be added to an existing electric fence to provide added security by
deterring intruders from interfering with the fence. When uses, the razor wire should not
touch the live wire but should be connected to the ground wire.
Sensors such as motion (PIR) sensors, laser sensors, vibration sensors, IR sensors,
and tension sensors can be added to an electric fence system to improve its reliability
Electric fence wire splicing
Wire splicing is the process of joining two or more wires together to create a
connection.
Figure 8 knot and reef knot are the two most commonly used types of knots in
electric fence wire splicing as they provide maximum contact at the joint.
Page 33 of 60
Access control system
It is a type of security system designed to manage and monitor the entry and exit of
individuals in a secured area.
Types of access control system
(i). Biometric-based access control system:- uses biometrics such as fingerprints,
face, eye or voice recognition system to allow or deny access
(ii). Card-based access control system:- uses electronic cards and card readers to
allow or deny access
(iii). Pin/Password based access control system:- uses user defined PIN or password
to allow or deny access
(iv). Mobile access control system:- uses defined mobile phones or devices to allow
or deny access
(v). Radio Frequency Identification (RFID) access control system:- uses radio signals
to authenticate users by use of RFID cards or tags with embedded chips
(vi). Cloud-based access control system:- allows for centralized access control over
the internet
Biometric access control security system
This is a type of security system that controls the entry to a premise by use of
biometrics such as face, fingerprint, palm print, iris/eye scan, or voice recognition.
Biometric doors can also use additional features such as access codes/passwords and
card readers.
Components of biometric access control system
(i). Control panel:- is the heart of the system as it processes input data and controls
locking and unlocking of the doors.
(ii). Input devices:- used to collect input data to authenticate uses. E.g card readers,
fingerprint scanners, facial recognition cameras, keypads, and voice recorders.
Page 34 of 60
(iii). Output devices:- they allow access or produce audible sound based on
authentication results. E.g electric locks, magnetic locks, and alarms
(iv). Power supply:- used to provide the electrical power needed to operate the
system
Working of biometric access control system
The system captures user biometric data using the input devices and converts it into
digital template. The data is then compared to the pre-stored template in the database.
If the two templates match, then access is granted but if they do not match, access is
denied and after multiple failed attempts, an alarm can be triggered.
Benefits of biometric access control system
(i). Provides increased security to a premise
(ii). The user does not need to memorize passwords or carry cards when biometrics
are used
(iii). The system records all logs of access attempts thus enabling audit
(iv). They are difficult to bypass thus reducing changes of unauthorized access
(v). The system can be integrated to an already existing security system such as
CCTV and alarms
Page 35 of 60
Page 36 of 60
Page 37 of 60
Security considerations of ensuring secure access control system
(i). Set authentication measures such as multi-factor authentication methods and
store passwords and PINs in encrypted format
(ii). Use strong encryption for all remote communications
(iii). Secure all access control panels with physical security and tamper-proof
measures
(iv). Regularly update software to reduce risks of attacks
(v). Disable unnecessary services such as email connections to the system to
minimize attacks
(vi). Implement role-based access control to the system to be accessed by only
authorized personnel
(vii). Regularly audit logging to track all access events
(viii). Set out physical security measures such as CCTV cameras to monitor critical
access points
(ix). Ensure the access control system has a backup power supply for operation
during power outages and tampering of power sources
(x). Ensure remote monitoring is secured through encryption to minimize hacking into
the system/data
Intruder alarm security system and home automation security system
Intrusion detection security system is a type of security system that protects secured
area from unauthorized access or breach of security in the secured area.
Home automation system is a type of security system that uses sensors and alarms to
monitor the security around residential areas and warn in case of danger such as
intrusion and fire.
Components of home/intruder detection security system
(i). Control panel:- is the brain of the system that activates and deactivates other
components of the system/controls all the operations of the system.
(ii). Door and window contact detectors:- detects when the door/window is opened
(iii). Glass break detector:- detects sound of breaking glass
(iv). Motion/PIR sensors/detectors:- detects motion of human beings
(v). CCTV cameras:- captures images and videos of activities around the home
(vi). Alarms:- notifies home owners and neighbours of intruders
(vii). Vibration sensors:- detects vibrations caused by attempted break-in
(viii). Smoke detectors:- detect presence of fire using smoke
(ix). Keypads:- used to arm or disarm the system
(x). Security lights:- used to enhance visibility when motion is detected
(xi). Panic button:- placed at strategic places in the house and is used to alert
emergency services such as the police
Page 38 of 60
Working principle of PIR (Passive InfraRed) motion sensor
A PIR sensor detects motion by receiving infrared (IR) radiation from human beings or
animals. The sensor has two materials sensitive to IR radiations. When a person moves
within the sensor’s field of vies (detection area) and then exit, the sensor detects a
differential change between the two slots as a change in temperature thus generating
an signal to indicate the presence of a moving person or animal.
Method 2
In this method, one resistor R = 3.3kΩ is
connected between the tamper and
alarm switches as shown. This was, the
sensor is not able to differentiate
between alarms and tamper events.
Page 39 of 60
Installation of A.C PIR motion sensors to control security light
A PIR motion sensor can be installed to control security light when it detects
motion around the house or at the entrance without using a control panel.
The diagrams below illustrates how the PIR motion detector can be wired to
control a security light without using a control panel.
In the first diagram, the light is controlled by the sensor only but in the second
diagram, the light can be controlled by both the sensor and the two way switch
independently.
Intruder alarm is installaed in a closed circuit system with a tamper loop and
panic attack button as shown in the cicuit below.
Page 40 of 60
Factors to consider when choosing a type of sensor in a security system
(i). Type of threats to be detected:- motion, intrusion, glass breakage, fire, smoke
etc.
(ii). Environment of installation:- consider lighting, temperature and humidity
conditions
(iii). Range of coverage area:- choose a sensor whose detection range matches the
desired detection area
(iv). Integration/compatibility with existing system:- choose a sensor that is compatible
with the other components in the system
(v). Power supply:- choose a sensor that can be powered by the available power
supply
(vi). Ease of installation and maintenance:- choose a sensor that is easy to install and
requires less maintenance
(vii). Cost and budget:- choose a sensor whose cost meets the budget of the client
(viii). Response time:- choose sensor that has fast detection response time for timely
action
(ix). Tamper protection:- choose a sensor that is tamper-proof to prevent disabling by
intruders
Examples of sensors used in security systems:- PIR motion sensors, ultrasonic
sensors, glass break sensors, vibration sensors, gas detectors, fire detectors, heat
detectors, infrared (IR) sensors and laser sensors etc.
Doorbell installation system
An electric bell is an audible device that converts magnetic effect of an electric
current into sound.
If a lower voltage is to be used say 12V, the bell is powered through a step-down
transformer.
Most bells are made from electromagnets instead of permanent magnets because
the magnetic field can be turned ON or OFF at will and the strength of the magnetic
field can be varied by varying the amount of current.
Factors that affect the strength of electromagnet in an electric bell
(i). Amount of current through the coil:- increases with increase in current
(ii). The type of core material:- soft iron core is easy to magnetize
(iii). The number of turns of the coil:- increases with more turns
Page 41 of 60
Operation of simple bell circuit
1. Single-stroke bell type
When a push button/switch is pressed,
current passes through the coil thus
generating electromagnetic field on the
u-shaped soft iron core which then
attracts the armature. Since the
armature is attached to a striker at it
ends, it strikes on a gong thus producing
sound when the armature is attracted by
the u-shaped electromagnet. When the
button is released, current stops flowing
and the u-shaped core gets
demagnetized thus releasing the
armature and the return spring pulls the
armature back and the striker stops
hitting the gong.
2. Trembler bell type
When the push button/switch is pressed,
current flows through the circuit thus
generating electromagnetic field on the
u-shaped soft iron core which then
attracts the armature to hit the gong and
produce sound. As the armature is
pulled towards the u-shaped core, the
contact is broken and current is cut off
thus demagnetizing the iron core. The
return spring then pulls the armature
back to make the contact and the above
process of make and break is repeated
providing continuous ringing provided
that the push button/switch is pressed.
Page 42 of 60
3. Continuous ringing bell type
When the push button/switch is pressed,
current flows through the circuit thus
generating electromagnetic field on the
u-shaped soft iron core which then
attracts the armature to hit the gong and
produce sound. As the armature is
pulled towards the u-shaped core, the
contact is broken and the lever drops to
make the lower contact which short
circuits/bypasses the push button. At the
same time, the current is cut off thus
demagnetizing the iron core. The return
spring then pulls the armature back to
make the contact and the above process
of make and break is repeated thus
providing continuous ringing like the
trembler bell until the reset pull switch is
operated.
An electric bell circuit consists of a bell push button/switch, a power source and
sometimes a relay.
Bell relay
Pinout diagram of types of relays used during doorbell installation
Page 43 of 60
Bell transformer
There are two types of bell transformers: class A transformer which provides 4V, 8V
and 12V outputs and class B transformer which outputs 6V only.
IEE regulations on Bell transformer
(i). The transformer shall be double wound
(ii). The transformer shall be connected to a separate sub-circuit of the supply
(iii). One point of the secondary winding and the metal case of the transformer shall
be earthed
(iv). The low voltage bell wiring shall be segregated from the normal power and
lighting cables
Indicator board
When a single bell is to be rung from a different number of push buttons/switches in
separate rooms, it is necessary to use indicator board to show the origin of the call.
An example of this application is in hotel and hospital rooms.
The indicator board consists of a number of indicator elements each of which is
connected to one of the contact circuits and are given the respective room names or
numbers.
Figures 1 and 2 below shows simple wiring diagram of controlling a bell using push
buttons through indicator board.
Page 44 of 60
Figure 1 Figure 2
Solution
Page 45 of 60
Consider the bell layout circuit shown below. Draw the wiring diagram such that push
buttons: A controls bell 2; C and D controls bell 1 through the indicator board; B is the
reset button.
Solution
Page 46 of 60
Steps/phases followed when creating a security system
(i). Phase 1: Needs assessment and planning:- This step involved site visit, taking
measurements, and analyzing the requirements.
(ii). Phase 2: System design:- Involves performing all calculations, drawing plan
and estimating the costs/budgeting.
(iii). Phase 3: Selection and supply:- involves identifying and selecting reliable
supplier for the materials needed and having them delivered.
(iv). Phase 4: Installation:- involves connecting all the components of the system
according to the wiring diagrams and installing appropriate software.
(v). Phase 5: Commissioning:- involves checking for proper operation, performing
all tests and training the security personnel on system operation before handing
over to the client.
Essential checks (activities done) when commissioning a security system
(i). Check that all cable connections are complete, firm and safe
(ii). Check that the power supply matches the power rating of the system
(iii). Check that all protective devices are set to the correct trip settings
(iv). Check that all appropriate signage are in place
(v). Power and test the system for proper operation
(vi). Train the security personnel on how the system works and hand over the
appropriate documentation to the client.
Page 47 of 60
Documents needed when installing a security system
(i). Site survey report:- provides details on the mapping of areas requiring
coverage, potential security risks and recommended system to be installed.
(ii). System design document:- describes overall design of the system and outlines
technical specifications and requirements
(iii). Budget:- outlines the materials needed and costs to be incurred
(iv). Wiring diagram and electrical plan:- outlines how the components are
connected and cable routing
(v). Risk assessment and mitigation plan:- outlines potential security and safety
risks and how the system will address them
(vi). Compliance and regulatory documents:- these are given by the regulating
bodies to ensure that the installation adheres to local laws and building codes.
(vii). Testing and commissioning report:- used to verify that the system was
installed correctly and met performance standards.
(viii). User manual:- provides guidelines or instructions on how to operate the system
(ix). Handover report:- used to show that the installation has been completed and
that the system is fully operational.
IEEE regulations, standards and guidelines when installing security systems
A. Electric fence installation
(i). For electric fence, the pulse voltage must not exceed 10kV (or 5 joules)
(ii). Ensure proper grounding/earthing of the control panel/energizer and fence wire
(iii). Earth rods should be placed at least 1.5m deep and at most 30m apart
(iv). Earth rods should be made of corrosion-resistant materials such as galvanized
steel or copper
(v). Install warning signs at least after every 10m
(vi). The fence should be fed from its own MCB not shared to other circuits in the
facility
(vii). Maintain safe distance from public pathways and utility lines
(viii). Regularly clear the vegetation growing on the fence line
(ix). Provide backup power supply to the energizer
B. CCTV system installation
(i). Ensure proper earthing of the control panel
(ii). Ensure warning signs are placed at every major entrance of the facility
(iii). Provide backup power supply to the CCTV system
(iv). Ensure the CCTV system is operated from separate MCB from other circuits
(v). Ensure data protection by installing appropriate safety measures
(vi). Avoid placing cameras in areas that may violate privacy rights such as in
bathrooms or facing neighbours compound without their consent
(vii). Use shielded cables to reduce electromagnetic interference
(viii). Regularly clean cameras to remove dust
(ix). Use devices with the correct IP ratings for outdoor applications e.g IP65
Page 48 of 60
C. Fire alarm system installation
(i). Ensure proper earthing of the control panel
(ii). A break glass call point should be located on exit routes and floor landings of
staircase.
(iii). Break glass call point should be installed 1.4m above the floor for ease of
accessibility.
(iv). Large buildings must be divided into zones for ease of identifying the location of
fire.
(v). Use fire resistant cables and ensure that the fire circuit is segregated from the
other circuits.
(vi). Ensure the fire alarm system is operated from separate supply from other circuits
and that the supply is labelled “Fire Alarm, Do Not Switch Off”.
(vii). Use the correct fire alarm and signal code
(viii). Provide backup power supply to ensure operation during power outages
(ix). Heat detectors should be placed in kitchen or areas prone to false alarm due to
smoke while smoke detectors should be placed in the hallways and other
common areas.
(x). Regularly clean detectors to remove dust and debris
(xi). Use devices with the correct IP ratings for outdoor applications e.g IP65
D. Biometric and access control system installation
(i). Ensure proper earthing of control panel
(ii). Ensure that the system is secured against unauthorized access and cyber-
attacks
(iii). Provide backup power supply to ensure operation during power outages
(iv). Ensure the fire alarm system is operated from separate MCB from other circuits
(v). Ensure that personal biometric data such as fingerprints and facial recognition is
securely stored and protected
(vi). Ensure the biometric scanners and access control readers are placed at the
entrance of the secured area and at the appropriate height
Page 49 of 60
Importance of marking out security zones
(i). Ensures that materials fit together properly
(ii). Helps in guiding how the components will be laid on the work-piece
(iii). Helps minimize material wasteage
(iv). Helps in choosing the appropriate tools for the job
(v). Makes laying of the materials/components easy
Marking out tools commonly used during installation of security systems
(i). Tape measure
(ii). Pencil/chalk/marker
(iii). Engineers square/try square
(iv). Calipers
(v). Measuring compass
(vi). Steel rule
Piping and fixing/installation tools and equipment used during installation of
security systems
(i). Screw driver (vii). Spirit level
(ii). Drill machine (viii). Hacksaw blade
(iii). Pliers (ix). Network cable tester
(iv). Bending spring (x). Multimeter
(v). Crimping tools (xi). Utility knife
(vi). Fish tape/wire puller (xii). Wire stripper
Page 50 of 60
(vi). Application of the cable:- is it for power or communication
Data transmission media
It refers to the physical pathways through which data travels between the devices in a
security system.
It ensures reliable data transmission, connectivity between devices and signal
protection.
The types of data transmission media/infrastructure include:-
(i). Wired transmission media:- uses physical/hard wires/cables such as LAN cables,
coaxial cable, fiber optic cables, HDMI cable and VGA cables.
(ii). Wireless transmission media:- transmit data wirelessly between devices. E.g Wi-
Fi, and Bluetooth
(iii). Telephone line/Power line communication:- uses existing telephone lines to
transmit data
(iv). Satellite communication:- uses satellite network to transmit data over long
distances
(v). Microwave communication:- uses microwaves to transmit data over long
distances through the air using devices such as towers and relay stations
Page 51 of 60
(i). Reduces electromagnetic interference (EMI) interference
(ii). Makes troubleshoot easy
(iii). Makes maintenance easy
(iv). Prevents induction of high electrical energy into data cables
(v). Prevents data loss
(vi). Prevents interference of unintended circuits during installation and maintenance
(vii). Increases safety in case of short circuit
4. MOUNT ACCESSORIES
Definition of terms used
Mounting:- is the process of attaching or installing components to a surface/work piece
Accessories:- are the various components that enhance the functionality of a system
Security system:- is a framework of devices and controls that detect, monitor and
prevent unauthorized access
Page 52 of 60
Control panel:- is the central hub/brain of a security system which controls the
operations of the system
Enclosure:- is a protective housing for electrical and electronic equipment to safeguard
against environmental factors such as dust and water
Accessories used in security system
(i). Sensors and detectors
(ii). CCTV cameras
(iii). Alarms and sounders
(iv). Access control devices
(v). Cables
(vi). Communication modules
(vii). Power supply
(viii). Control panels
Security system control panels
They act as the brain of the security system by processing input signals from sensors
and triggering alarms when threats are detected
Types of control panels
(i). Wired control panel:- requires physical connection to the accessories. They are
less prone to signal interference and are more reliable
(ii). Wireless control panel:- communicates to the accessories wirelessly through
radion frequencies (RF). Although they are easy to install, they are more prone to
signal interference and less reliable.
(iii). Hybrid control panel:- combines both wired and wireless components for
greater flexibility and reliability
Factors to consider when mounting Control panel
Accessibility:- should be installed in a location that is easily accessible for maintenance,
troubleshooting and programming
Security:- should be placed in a secure location to prevent unauthorized tampering
Proximity to power sources:- should be near power outlet for ease of connection to the
power supply
Environmental conditions:- should be mounted in a location free from extreme weather
conditions such as too hot areas
Signal range:- wireless panels should be installed in a location with good signal strength
for ease of communication with sensors and other devices
Control panel mounting procedure
Page 53 of 60
(i). Determine the best location for the control panel
(ii). Prepare the surface where the panel will be mounted by ensuring that the
surface is solid and capable of supporting the panel
(iii). Drill holes based on the control panel mounting holes
(iv). Secure the control panel on the wall/surface using screws and tighten them
(v). Connect all the sensors/detectors, alarms and power supply to the control panel
(vi). Power the control panel and test for correct operation
Insulation classes of enclosures
The purpose of the enclosures is to protect sensitive components from environmental
factors like dust, water, and physical damage while ensuring electrical safety.
(i). IEC protection classes (IP ratings)
IP (Ingress Protection) ratings define the protection level of enclosures and are written
in the format IPxx where xx are two digits number. The first digit (0-6) is the rating for
the protection against solid objects such as dust while the second digit (0-9) is the ration
for the protection against liquid substance such as water.
First Digit (Solid Protection):
0: No protection.
1: Protected against solid objects larger than 50 mm.
2: Protected against objects larger than 12.5 mm.
3: Protected against objects larger than 2.5 mm.
4: Protected against objects larger than 1 mm.
5: Dust-protected (limited ingress of dust).
6: Dust-tight (no ingress of dust).
Second Digit (Water Protection):
0: No protection.
1: Protected against vertically falling water droplets.
2: Protected against water droplets when tilted up to 15°.
3: Protected against water spray up to 60° from vertical.
4: Protected against water splashing from any direction.
5: Protected against water jets from any direction.
6: Protected against powerful water jets.
7: Protected against temporary immersion in water.
8: Protected against continuous immersion in water.
9: Protected against high-pressure, high-temperature water jets.
Examples:-
IP20: Protected against solid objects larger than 12.5 mm, no protection against
water.
IP54: Dust-protected and protected against water splashes from any direction.
IP67: Dust-tight and protected against temporary immersion in water.
Page 54 of 60
(ii). NEMA enclosure classes
They define enclosure protection classes based on environmental conditions.
Common types include:
Type 1: Indoor use; protection against light dust and accidental contact.
Type 4: Indoor or outdoor use; protection against windblown dust, rain, and
hose-directed water.
Type 6: Suitable for submersion under limited conditions.
Type 13: Protection against oil, dust, and non-corrosive coolants.
(iii). Thermal insulation classes
Shows the maximum operating temperature the insulation can withstand.
Examples are:
Class A: 105°C.
Class B: 130°C.
Class F: 155°C.
Class H: 180°C.
Page 55 of 60
(viii). Termination block:- involves inserting cable ends into the terminal block and
securing them with screws or clamps (widely used in control panels and
distribution boards)
Page 56 of 60
Importance of cable termination
(i). It prevents loose connections that may give rise to heat and fire
(ii). Prevents formation of a high resistance joint
(iii). Prevents possible electric shock or short-circuit incase cable gets loose
(iv). Prevents possible fire hazards due to short-circuit
(v). Makes the connection reliable by preventing connection failures
(vi). Makes maintenance easy
(vii). It makes installation neat and more organized (increases aesthetic value of the
installation)
Tools and equipment used in cable termination
A. Tools
(i). Crimping tool
(ii). Screw driver
(iii). Pliers
(iv). Soldering gun/iron
(v). Strip knife
(vi). Compression tools
(vii). Labelling tools
B. Equipment
(i). Multimeter
(ii). Ethernet/LAN cable tester
Cable lugging
It is the process of attaching cable lug at the end of a cable for ease of connection to a
terminal or bus bar.
Cable lugging/termination procedure
Page 57 of 60
(i). Prepare the cable by cutting or stripping it the right size where necessary
(ii). Choose the tug or termination type that matches the cable size and job
requirement
(iii). Crimp the lug or connector into the cable end (or screw it into place)
(iv). Inspect the cable terminal for firmness, short-circuit or any other fault
(v). Label the cable where necessary
Types of cable lugs
(i). Compression lugs:- requires crimping tool to compress them
(ii). Mechanical lugs:- have a screw or nut and bolt
(iii). Solder lugs:- require soldering to attach it to the cable
(iv). Ring terminal lugs:- have a ring end that fits screw or bolt
(v). Fork terminal lugs:- have an opening at its end making resemble a fork
Page 58 of 60
terminal while the black power cable enters the negative terminal of the
connector and screw them firmly while the braided shield is clamped on the BNC
connector base.
(vii). Slide the metallic ring up to the BNC connector and fix/crimp it firmly
(viii). Test the firmness and continuity of the connection
Page 59 of 60
6. TESTING AND INSPECTING SECURITY SYSTEM
Testing is the process of establishing the correctness of installation by use of
measuring instruments.
Inspecting is the process of checking the installation against a specified standard or job
requirement.
While testing and inspecting security system installation, the following should be
checked:
(i). Incoming service live connection:- check for proper termination, fuse rating, cable
size, proper earthing, etc.
(ii). Control panel installation:- check for proper earthing, well covered against rain
and dust, correct power supply, proper cable management, and firmness.
(iii). Proper working of components:- test all detectors, sensors, alarms etc.
Types of tests performed in a security system installation
(i). Insulation resistance test:- done to ensure no leakage current is flowing
through the insulation. It is performed using an instrument called “Megger”
(ii). Earth continuity test:- done to ensure proper earthing of the installation
(iii). Short-circuit test:- done to identify unintended electrical connections between
the conductors
(iv). Firmness test:- done to determine the firmness of an installation
(v). Arming and disarming test:- done to verify functionality of the system
Arming (activate) test procedure
(i). Ensure all occupants have left the premises and all doors and windows are
closed
(ii). Access the control panel and entre user code where applicable
(iii). Select the arming mode and activate the system
(iv). Select the exit delay and leave the premises through the exit door
(v). The system should be activated/armed after the delay is over
Disarming (deactivate) test procedure
(i). Return to the premises through the entry door
(ii). Access the control panel and entre user code where applicable
(iii). Select the disarming mode to deactivate the system
(iv). The system should be deactivated/disarmed after the delay is over
(v). Reset the system for normal operations to resume
Page 60 of 60