0% found this document useful (0 votes)
154 views

Security System Installation Notes

The document outlines a Level 6 Electrical Engineering course focused on Security System Installation, detailing competencies such as designing, marking, laying cables, mounting accessories, terminating cables, and testing security systems. It includes definitions of key terms, types of security systems, components of CCTV systems, and factors affecting storage requirements for CCTV footage. Additionally, it discusses the differences between DVR and NVR systems, types of CCTV cameras, and their applications in various settings.

Uploaded by

samtino152
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
154 views

Security System Installation Notes

The document outlines a Level 6 Electrical Engineering course focused on Security System Installation, detailing competencies such as designing, marking, laying cables, mounting accessories, terminating cables, and testing security systems. It includes definitions of key terms, types of security systems, components of CCTV systems, and factors affecting storage requirements for CCTV footage. Additionally, it discusses the differences between DVR and NVR systems, types of CCTV cameras, and their applications in various settings.

Uploaded by

samtino152
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 78

ELECTRICAL ENGINEERING (POWER OPTION) LEVEL 6

Unit of Competency: SECURITY SYSTEM INSTALLATION


Trainer: Julius Mukoma
Course Outline
1. Design security system  Accessories used in
 Definition of terms security system
 Types of security  Security system control
systems panels
e.g CCTV, alarms,  Insulation classes of
electric fence, enclosures; e.g IP44, IP55,
biometric IP65, IP66, IP67
 Components of
security system
 Factors to consider in
design o security
system
 Wiring security system
 Security system
integration with other
components
2. Mark out security system
zones and call points
 Definition of
zones in security
system
 Marking, piping and
fixing tools
 Importance of marking
3. Lay system cables
 Types of cables in
security system
 Factors to consider
in security system
cable laying
 Segregation in cable
laying
 Importance of
cable
segregation
4. Mount accessories
 Definition of terms

Page 1 of 78
5. Terminate system cables
 Definition of
termination
 Importance of
termination
 Cable lugging
 Tools used
in cable
termination
6. Test and inspect security
system
 Definition of testing
 Types of tests in
security system;
Insulation test,
short circuit test,
continuity test,
arming and
disarming test

Page 2 of 78
TOPIC 1: DESIGN SECURITY SYSTEM
Definition of terms used in security system
 CCTV:- stands for closed circuit television
 CCTV camera:- an electronic device that produces video signals from
an optical image
 DVR:- stands for Digital Video Recorder
It is a device used for recording and processing the video captured by the
analogue CCTV camera
 NVR:- stands for Network Video Recorder
It is a device used for recording and processing the video captured
by the IP CCTV camera
 HDMI:- stands for High Definition Multimedia Interface.
It is a cable used to connect a monitor to the NVR or DVR
 LAN:- stands for Local Area Network
It is a cable used to connect network cameras to the NVR or routers
 VGA:- stands for Video Graphics Array
It is a cable used to connect a monitor to the NVR or DVR
 POE:- stands for Power Over Ethernet.
It is used to provide both power and data in the CCTV system via LAN
cables
 Focal length:- is the distance from the center of camera lens to the
imaging sensor
 Blind spot/Dead zone:- is the area which is not visible to the CCTV
camera (not covered by the CCTV camera)
 Angle of view/Field of view:- is the area (range of angles) the CCTV
camera can capture clear images
 Resolution:- refers to the quality of the video and is measured in
pixels (p) e.g 1080p, 720p, etc.
 Router/switch:- is a network device that distributes and manages the
connection in the CCTV system network
 Cloud storage:- is a remote storage of data over the internet
 Frame rate:- is the number of frames per second (fps) in a video footage
 Bandwidth:- is the amount of data that can be transferred from the
CCTV camera to a network per second. Measured in bits per second
(bps), kilobits per second (kbps), megabits per second (Mbps) or
gigabits per second (Gbps).
The bandwidth increases with the camera resolution, frame rate, number of
cameras connected to the network, recording and streaming settings (continuous
or live), audio streaming and amount of activity recorded (dynamic or static).
 VPN (Virtual Private Network):- is a secure way to remotely access
CCTV footage
 Aspect ratio:- is the ratio of width to height of a video frame

Page 3 of 78
 Retention period:- is the length of time that a video footage is
stored before being overwritten
Types of security systems
(i). CCTV security system
(ii). Fire alarm security system
(iii). Electric fence security system
(iv). Biometric security system
(v). Access control systems
(vi). Intrusion detection system (burglar alarm system)
CCTV security system
Introduction
 CCTV system provides surveillance capabilities used in the protection
of people, assets and systems.
 A CCTV system serves as a security force booster as it provides
surveillance for a large area than human security personnel.
 CCTV systems are often used to support comprehensive security
systems by incorporating video coverage and security alarms for
barriers, intrusion detection, and access control.
 Unlike broadcast TV which broadcasts system over air and viewed on a
TV tuned to a specific frequency, a CCTV system links camera to a
video monitor using direct transmission system.
Components of CCTV security system
(i). CCTV camera
(ii). DVR/NVR
(iii). Monitor
(iv). Memory
(v). Cables
(vi). Power supply
(vii). Router
(viii).Switch
Block diagram of CCTV camera security system

Page 4 of 78
(i). CCTV camera:- used to capture the images, video and audio signals
(ii). POE Switch:- used to connect CCTV cameras to the NVR/DVR and also
provide power to the cameras over LAN cables
(iii). DVR/NVR:- used to record and process images and videos captured
by CCTV cameras
(iv). Monitor:- displays the images and videos captured by the CCTV cameras
(v). Power supply:- used to provide electrical power/energy needed to
operate the CCTV system
(vi). Cable:- used to transmit image, video and audio signals in the CCTV system
(vii). Memory unit:- used to store the captured footage (videos, images and
audio) for future reference
(viii).Router:- used to connect remote devices to the CCTV system for remote
viewing
Working of a CCTV system
The lenses of the CCTV camera focuses the object to the imaging sensor
where it will get converted to images and video signals. The signal is then
transmitted via the system cables or wirelessly to the DVR/NVR which
processes and stores the footage in the memory for future reference. The
footage can then be viewed through a monitor which is connected to the
DVR/NVR through VGA or HDMI cables.
CCTV memory/storage capacity requirement calculation
𝑁 × 𝐵 × 𝐻 × 𝑇 × 3600
𝑆𝑡𝑜𝑟𝑎𝑔𝑒 𝑟𝑒𝑞𝑢𝑖𝑟𝑒𝑑 (𝐺𝐵)
= 8 × 1024

Where:
N: Number of
cameras
B: Bitrate per camera (in Mbps)
H: Hours of recording per day (24 for continuous
recording) T: Recording duration (in days)
3600: Seconds in an
hour 8: Converts bits to
bytes 1024: Converts
MB to GB
For example:
If 4 CCTV cameras whose maximum bitrate is 2 Mbps are installed to run for
Page 5 of 78
one week (7 days) nonstop, what will be the minimum storage capacity
needed for this system assuming no compression was applied?
Solution

Page 6 of 78
𝑆𝑡𝑜𝑟𝑎𝑔𝑒 𝑟𝑒𝑞𝑢𝑖𝑟𝑒𝑚𝑒𝑛𝑡 4 × 2 × 24 × 7 ×
(𝐺𝐵) = 3600 = 590.625 𝐺𝐵
8 × 1024
Therefore, 590.625 GB of memory will be required.

Binary System (Base 210=1024) of conversion between kilobytes (kB), megabytes


(MB), gigabyte (GB) and terabyte (TB) is:

1 kB = 1024 Bytes
1 MB = 1024 kB
1 GB = 1024 MB
1 TB = 1024 GB

Types of standard resolutions in video quality

Video quality resolution refers to the number of pixels displayed in each dimension, which
determines the clarity and detail of the video.

(i). Standard Definition (SD); 480p (720x480):- often used for DVDs and older television
broadcasting. Uses less memory space
(ii). High Definition (HD); 720p (1280x720):- mostly used in online streaming
(iii). Full High Definition (Full HD, FHD); 1080p (1920x1080):- used in modern TVs and
streaming platforms. Offers better clarity and detail compared to 720p but takes up more
memory space.
(iv). Ultra High Definition (UHD); 4K (3840x2160):- used in premium content, high-end
TVs, and streaming services and requires a large storage space.
(v). Ultra High Definition Premium (UHDP); 8K (7680x4320):- Offers extremely high
clarity and detail. Ideal for large displays and professional use cases but requires larger
storage space than the 4K resolution.
Factors that determine the storage requirement in CCTV security system
(i). Bitrate of the cameras:- cameras with high bitrate requires higher
storage space than those with low bitrate
(ii). Resolution of the cameras:- cameras with high resolution requires
higher storage space than those with low resolution
(iii). Number of cameras:- more cameras will require more storage space
(iv). Number of days of recording/retention period:- long retention
period requires large storage space
(v). Hours of recording per day:- continuous recording will require
more storage space than non-continuous recording
(vi). Compression codec:- modern codec H.265 significantly reduce
storage compared to H.264
Video compression is a technique that reduces the size of original video file
while maintaining its quality and thus making it to occupy less space than the
Page 7 of 78
original files. The popular video compression formats include H.264, MJPEG
and MPEG4 etc.

Page 8 of 78
Need for/Importance/Advantages of CCTV security system
(i). It keeps record of an event
(ii). It helps reduce costs and risks
(iii). It helps prevent crime/discourage theft
(iv). It helps collect data for research analysis
(v). It assists in law enforcement
(vi). It helps in traffic and crowd control
(vii). It helps improve emergency response
(viii).Remote monitoring provides peace of mind to property owners
(ix). It helps improve productivity at work as it makes the employees
follow company protocols
Types of CCTV systems
(i). Analogue CCTV system:- uses analogue CCTV cameras to capture
analogue footage and transit it over coaxial cables to DVR for
recording
(ii). Digital/IP CCTV system:- uses digital/IP CCTV cameras to capture
digital footage and transit it over LAN cables to NVR for
recording
(iii). Wireless CCTV system:- uses wireless CCTV cameras to capture
digital footage and transit it wirelessly to NVR for recording
Types of CCTV cameras
(i). Dome camera:- used for indoor surveillance
(ii). Bullet camera:- used for outdoor surveillance
(iii).IP (Network) camera:- transmits signals over LAN cables
(iv). PTZ (Pan Tilt Zoom) camera:- allows left/right (Pan), up/down (Tilt) and
In/Out (Zoom) movement to capture footages
(v). Wireless camera:- transmits signals wirelessly
(vi). Thermal imaging camera:- used in high risk areas that are not well lit or
behind barriers
(vii). Varifocal camera:- allows zooming in/out of the object
(viii).C-mount camera:- it has a detachable lens which allows lens to be
changed for different applications/use
(ix). Day/Night camera:- are cameras that have both day and night vision
capabilities making them applicable for poorly lit areas

Page 9 of 78
Page 10 of 78
Factors to consider when choosing a type of CCTV camera
(i). Location of the camera:- consider whether the camera is for indoor
or outdoor use
(ii). Power supply demands:- consider a camera that can operate with the
available power supply
(iii). Lighting condition of the area:- choose cameras that can work with
the lighting condition of the area
(iv). Budget/cost of materials:- choose cameras that the client can afford
(v). Availability of spare parts:- choose cameras whose spare parts can
easily be accessed
(vi). Type of transmission:- consider whether to use a wired or wireless camera
(vii). Technical support requirements:- do they need any special skill to
install and maintain?
(viii).Resolution of the camera:- choose cameras that provide clear images
(ix). Audio capabilities of the camera:- if audio record is needed, choose
a camera that can capture both video and audio signals
Applications of CCTV security system
(i). Used in street monitoring
(ii). Used in crime management/law enforcement
(iii). Used in disaster management such as assisting in rescue operations
(iv). Used in behavioral research

Page 11 of 78
(v). Used in supermarkets to prevent shoplifting
(vi). Used in banks to prevent robbery and fraud
(vii). Used in office buildings to monitor employee activities
(viii).Used in examination halls to prevent cheating
(ix). Used in hospitals to monitor patients
(x). Used in airports to monitor passengers, luggage and access points
(xi). Used in prisons to monitor activities of prisoners
DVR based CCTV system installation wiring diagram
This type of CCTV system uses analogue (non-IP) cameras which are connected
to the DVR through coaxial or Siamese cable.

Page 12 of 78
NVR based CCTV system installation wiring diagram
This type of CCTV uses IP (network) cameras which are connected to the
NVR through LAN cables or wirelessly through a router.

POE (Power Over Ethernet) switch is used to transmit both data/signal and
power in the same cable (LAN cable)
IP (Internet Protocol) cameras can connect to the internet
Difference between DVR and NVR based CCTV system
DVR based system NVR based system
(i). Uses analogue cameras (i). Uses IP/network cameras
(ii). Cameras are connected (ii). Cameras are connected
using coaxial cables using LAN/Ethernet cables
(iii). Offers lower resolution of (iii). Offers high resolution
upto 1080p videos of upto HD or 4K
(iv). The cameras require (iv). The cameras can be powered
separate power supply from power from the PoE of
Page 13 of 78
and cable for the power the NVR through the same
from that of data LAN cables
(v). It has limited number of (v). It is easy to add more
channels available for the cameras by using PoE switch
cameras (vi). Requires high initial cost
(vi). Requires low initial cost (relatively expensive)
(relatively cheap) (vii). Can easily be accessed
(vii). Requires additional remotely over the internet or
setup for remote access network
(viii).Suitable for smaller (viii).Suitable for large scale
standalone installations and modern
installations
Note that DVR-based CCTV systems are ideal for smaller, budget friendly and
standalone/localized setups while NVR-based CCTV systems are better suited
for modern and large scale installations that require high video quality, cloud
storage and easy scalability.
Types of cables used in CCTV system installation
(i). Coaxial cable
 They are used for non-IP (analogue) cameras and DVR
 RG-59 or RG-6 are the recommended coaxial cables for use in
analogue camera-based CCTV systems
 BNC connectors are used to terminate coaxial cables to the DVR and
cameras
 They are similar to the antenna cables in TVs

 Conductor/centre core:- carries the signals


 Dielectric insulator:- protects the inner core from short-
circuiting with the shield
 Shield:- used to protect the signal in the inner core from
electromagnetic interference (EMI)
 Outer coat/Jacket:- used to protect inner parts of the cable
from physical damage
The figure below show BNC connectors used in coaxial cables

Page 14 of 78
(ii). Siamese coaxial cable
Similar to coaxial cable but has additional power cable for powering the

cameras
(iii). LAN cable (Twisted pair cable)
 Used to connect IP cameras to NVR and also connect the
NVR/DVR to a router for remote viewing
 The cables are twisted in pairs to reduce electromagnetic interference
(EMI)
 Cat 5, Cat 6 or Cat 7 are the recommended LAN cables for use in IP
camera- based CCTV systems
 RJ45 connectors are used to terminate LAN cables to the NVR and
cameras

Page 15 of 78
 Jacket:- protects inner layers from physical damage
 Conductor:- carries the data signal

Page 16 of 78
 Rip cord:- helps in stripping the cable
 Shield:- protects the data signal from electromagnetic
interference The figure below shows RJ45 connectors

(iv). Optical fibre cable (Fiber optics cable)


Helps transmit data signal inform of light waves

 Core:- carried the data signal in form of light


 Cladding:- reflects the light signals back to the core
 Buffer/Coating:- protects the cladding and core from moisture and
shock
 Strengthening layer/material:- provides mechanical strength
needed for the cable against tensions and crushing
 Outer jacket/coat:- protects inner layers from physical damage
(v). HDMI cable
Mostly used for digital video signals to connect monitor to DVR/NVR

Page 17 of 78
(vi). VGA cable
Mostly used for digital video signals to connect monitor to DVR/NVR

(vii). RCA cable (Radio Corporation of America)


 Transmits analogue signals and can be used to connect DVR/NVR to
monitor
 The red and white connectors are used for (right and left) audio
signals while the yellow connector is used for data signal

Fire alarm security system


 This is a system that uses sensors and alarms to detect and warn
users about a possible fire outbreak in a given area.
 All premises which come under the factories act must have
installation to give warning of fire.
Need/importance of fire alarm system

Page 18 of 78
(i). It helps save lives by warning occupants in case of fire outbreak

Page 19 of 78
(ii). It helps reduce loss of property by providing early warning
(iii). It helps shorten recovery time by providing early warning
(iv). It minimizes risks to the public who attend unfamiliar property
(v). It provides fire department with early notification of fire outbreak
Components of a fire alarm system
(i). Fire alarm control panel
(ii). Initiating devices
(iii). Notification devices
(iv). Power supply
(v). Communication devices
Block diagram of a fire alarm system

 Fire alarm control panel:- is the brain of the fire alarm system that
controls all the operations of the system
 Initiating devices:- these are devices that monitors the
invironment and send signals to the control panel in case of
smoke, fire, heat etc.
 Notification devices:- these are devices that provide warning to the
people when there is fire outbreak
 Power supply:- it provides electrical power/energy needed to operate the
system
 Communication devices:- allows communication between the fire
alarm system and other remote devices or fire departments
Working of fire alarm system
When fire breaks out in a given area, the initiating devices senses that and
send signal to the control panel. The control panel analyzes the signal and
activates the appropriate notification devices to alert the occupants that
there is fire outbreak in the given location. It can also send notification to
the fire department for faster response.
Types of initiating devices
Page 20 of 78
(i). Smoke detectors
(ii). Heat detectors

Page 21 of 78
(iii). Carbon monoxide detectors
(iv). Manual call points/Break glass detector
(v). Muti-sensor detectors
(vi). Flame detectors
Types of notification devices
(i). Horn/siren
(ii). Bell
(iii). Strobe light
(iv). Strobe sounder
(v). Speaker
(vi). Message boards
It is recommended that both audible and visual notification devices to be used to
cater for the people who have visual or hearing impairment.
Always use fire resistant cables when installing fire alarm systems

Types of smoke detectors


(i). Ionization smoke detectors

Page 22 of 78
(ii). Light scattering smoke detectors
(iii). Light blocking smoke detectors
(i) Ionization smoke detectors

Working principles
It uses a small radioactive source which emits alpha particles. These particles
ionize the air molecules between the positive and negative plates thus
helping in completing the circuit and current starts flowing. When smoke
enters into the chamber, the smoke particles collide with the charged air
particles thus deviating them away from the charged plates which causes a
decrease in current. This change in current activates the smoke detector and
a signal is produced to indicate the presence of fire.
(ii) Light scattering smoke detector

Working principle
In this device, an infrared (IR) LED transmitter emits light rays into the detector
chamber. However, the light does not reach the photo diode receiver
because of a barrier between the transmitter and receiver. When smoke
enters the chamber of the detector, the smoke particles scatters the light
enabling it to reach the photo diode (receiver) which then activates the
detector and a signal is produced to indicate the presence of fire.
(iii) Light blocking smoke detector

Page 23 of 78
Working principle
The detector has an IR transmitter which emits IR rays to the photo diode
receiver. The rays reach the receiver when there is no smoke in the
chamber. When smoke enters the chamber, the smoke particles block the
light rays thus preventing them from reaching the receiver. This makes the
detector generate a signal to indicate the presence of fire.
Types of fire alarm systems
(i). Conventional fire alarm system
(ii). Addressable fire alarm system
(iii). Wireless fire alarm system
(iv). Intelligent fire alarm system

(i) Conventional fire alarm system


In this type of fire alarm system, the detectors send signals of fire outbreak
to the control panel but do not provide the address of the exact location of
the fire. Therefore, one must physically go check the location of the fire.

(ii) Addressable fire alarm system


In this type of fire alarm system, the detectors send signals of fire outbreak
to the control panel with the address of the exact location of the fire.
Therefore, one can easily tell the location of the fire.
(iii) Wireless fire alarm system
In this type of fire alarm system, the detectors send signals wirelessly to the
control panel through radio frequency communication system.

Page 24 of 78
(iv) Intelligent fire alarm system
In this type, the devices can analyze their environment and send signals to
the control panel to take actions in case of fire, fault or when the devices
need cleaning or maintenance.
Wiring diagram of a conventional fire alarm system

Page 25 of 78
Page 26 of 78
Page 27 of 78
Applications of fire alarm system
(i). Used in residential homes for early fire detection
(ii). Used in commercial buildings to ensure safety of employees and customers
(iii). Used in factories and warehouses for early fire detection from
machines and other flammable materials
(iv). Used in schools and colleges to ensure safety of students and staff
(v). Used in high-risk facilities such as power plant and gas centers for
early fire detection
(vi). Used in airports, bus terminals and other areas with high human
traffic for public safety
Electric fence security system
An electric fence is a physical and psychological barrier that deters people
and animals from crossing a restricted area by causing a high voltage
electric shock in pulses.
Importance of using electric fence over conventional/traditional barrier fences
(i). They have low maintenance costs because they don’t require
frequent maintenance
(ii). They are easy to construct
(iii). They provide better security than traditional fences
(iv). They don’t cause harm/injury to the victim
(v). They are highly effective compared to traditional fences
(vi). They have universal application making them useful in almost all the areas
(vii). They can be installed in an already existing wall/fence
(viii).They have long life span because of less disturbance
(ix). They are portable and flexible to be moved
Applications of electric fence
(i). Used in homes to provide security to the premises
(ii). Used on prison walls to prevent the prisoners from escaping
(iii). Used in high security areas such as airports and petroleum deports
to protect valuable assets
(iv). Used in national parks to prevent wild animals from escaping to residential
areas
(v). Used in agriculture to segment/divide grazing land into paddocks
(vi). Used in protecting commercial properties such as warehouses and
factories from intruders
(vii). Used in protecting national borders or restricted zones from illegal crossings
Terms used in electric fence system
(i). Posts:- used to support the electric fence wire
(ii). Insulators:- used to offset the fence wire from the fence post
Page 28 of 78
(iii). Live wire:- the conductor that curries the electric shock current

Page 29 of 78
(iv). Ground wire:- the conductor that takes the electric shock current
back to the energizer
(v). Energizer:- the device that powers the electric fence
(vi). Earth rod/spikes:- they connect the energizer to ground/earth
for proper operation of the fence
(vii). Pulse/shock:- a brief current emitted by the energizer after every few
seconds
(viii).Short circuit:- the low resistance leakage caused when live wire
touches the ground wire
Components of an electric fence system
(i). Energizer:- is the device that powers the electric fence
(ii). Power supply:- provides the electrical power needed to operate the fence
system
(iii). Conductors:- carries the current from the energizer to the fence and
back to the energizer
(iv). Fencing posts:- used to support the fence wires
(v). Earth rodes/spikes:- used to complete the circuit by connecting the
live to ground when one touches the fence line
(vi). Insulators:- used to offset/separate the fence wires from the posts
(vii). End strainers:- used to increase the tension of the fence wire at the end
posts
(viii).Warning signs:- used to warn the people on the danger of touching
the electric fence
(ix). Lightning diverter:- used to divert lighting and prevent it from
destroying the energizer
(x). Notification devices:- notifies the owner when the fence has been
touched or interfered with

Page 30 of 78
Page 31 of 78
Page 32 of 78
Electric fence wiring diagram
 Fence line can be wired in parallel or in series depending on the
application of the fence.
 The power supply should have a backup. For instance, if the main
power supply is a.c mains, then a battery can be used as a backup in
case there is power blackout to keep the fence energized all the time.
Parallel electric fence wiring
 This is effective for wide perimeter fencing such as game parks
and grazing areas.
 Because of the parallel connection of the fence wires, the resistance

1 1 1 1 1
is relatively low compared to the series wiring.
= + + +⋯
𝑅𝑒𝑞 𝑅1 𝑅2 𝑅3 𝑅𝑛
+
1
𝑅𝑒𝑞 = 𝑅𝑒𝑐𝑖𝑝𝑟𝑜𝑐𝑎𝑙 𝑜𝑓
�𝑒𝑞

Page 33 of 78
Series electric fence wiring
 In this type, the conductors are connected at the alternating ends
to form continuous wire which makes this type of system have a

𝑅𝑒𝑞 = 𝑅1 + 𝑅2 + 𝑅3 + ⋯ + 𝑅𝑛
high resistance than that of parallel wiring.

 Mostly used for domestic wiring or in small perimeter fences.


 A sounder can be connected to the energizer to warn when
the fence is interfered with.

Page 34 of 78
Page 35 of 78
Minimum standards to consider when installing electric fence
 A minimum wall height of 1.5m is required for wall-top electric fence
installation
 Wall top brackets/posts should be at most 3m apart
 Stays/end posts should be installed at every end and corner of the
fence and not more than 50m apart
 A lightning diverter should be installed to both the output and return
terminals to protect the energizer and the fence from lightning
surges
 Use high voltage insulated cable from the energizer to the fence and
at all high voltage insulated transmissions such as under the gate
 The high voltage underground cable must be at least 30cm into the
ground or at least 50cm under a driveway
 High voltage and low voltage cables should not be installed in the same
conduit
 Install at least 3 earth rods at the beginning of the fence near the
energizer at least 1.5 meters deep and additional earth spikes/rods
every 20-30 meters
 Fence earthing system and the mains (electricity supply) earthing
system must be at least 10 meters apart and the two earthing
systems must not be linked together
 To reduce resistance of earthing connection, it is recommended that
the ground wires to be connected in parallel unless where the
energizer is monitoring the fence through both the live and ground
wires
 Warning signs must be installed at every 10m apart, at all entry points
and at the corners or where there is change in direction of the fence
line. The first warning sign must not be more than 2m from the start
of the fence
General procedure for electric fence installation
(i). Plan the fence layout:- this involves defining the perimeter, purpose
of the fence and checking the local laws and guidelines for electric
fence
(ii). Gather the appropriate materials and tools:- this step involves
collecting all the components needed for the electric fence and the
tools that you will need to install the fence
(iii). Clear the surrounding vegetation and install the fence posts:- this
step involves clearing the grass and vegetation around where the
fence line would pass and installing the fence posts on the dug holes.
For wall top mounting, the posts are cemented (or fixed with nuts
and bolts or steel nails) on the top of the wall and support
mechanism welded on them.
Page 36 of 78
(iv). Attach insulators and end strainers:- involves fixing the insulators
on the posts and end strainers on the end or corner posts for proper
tensioning
(v). String the electric fence wire:- starting from a corner/end post, attach
the wire to the end strainer and run the wire through the insulators on
the other posts to the other end posts. Use a tensioner to keep the
wire taut. Repeat the step to add all the other strands of wires.

Page 37 of 78
(vi). Install grounding system and warning signs:- drive earth rods at least
1.5 meters deep and every 20-30 meters in a most soil and attach the
ground wire from the energizer to the earth rods using clamps. Also,
install the warning signs on the fence line at least every 10-30 meters.
(vii). Connect the energizer:- connect the live wire from the energizer to
the fence live wire through a lightning diverter/inhibitor. Also connect
the ground wire from the energizer to the ground wire of the fence.
(viii).Test the fence:- power the fence from 240V mains or any other
appropriate power source and test to check for proper voltage along
the entire fence line and ensure there are not short circuits.
(ix). Maintain the fence by regularly inspecting the wires for sagging,
breaks, effectiveness of the grounding/earthing system and replacing
the backup battery when need arises.
Electric fence wiring for sliding gate
In this case, a gate contact and under-gate cable is used to connect the two
sections of the wall-top fence. A sounder can be connected to the energizer to
warn when the fence is interfered with.

Page 38 of 78
For open gate

For closed gate

Page 39 of 78
Electric fence wiring for non-sliding gate
In this case, no gate contact is used. However, an under-gate cable is used
to connect the two sections of the wall-top fence as shown below. A
sounder can be connected to the energizer to warn when the fence is
interfered with.

Page 40 of 78
Operating principle of electric fence energizer
The energizer is powered from a 12V battery or A.C mains which is first
converted to d.c using rectifier circuit. The d.c voltage is then fed to an
oscillator circuits that generates pulses after 1 to 2 seconds. This pulses are
used to charge the large capacitors. The capacitor then releases the stored
energy to the step-up transformer in pulses. These pulses are then steped-up
by step-up transformer to produce a brief high voltage pulses (as high as 9kV
or more) which are then fed to the fence live wire.
Types of cables used in electric fence installation
(i). High tensile steel wire:- durable and good conductor but heavy
(ii). Polywire/Polytape:- lightweight and high visibility. Mostly used for paddocking
(iii). Aluminium wire:- lightweight and good conductor but less durable
than steel wire
(iv). Woven wire:- these are wires woven together for improved strength
(v). Underground/Under-gate cable:- used to connect energizer to fence
and carry current beneath gates or obstacles.
The underground cable sizes are 1.6mm2, 2.5mm2, 4.0mm2 and 6.0mm2 where
6.0mm2 is used for longer distances although 2.5mm2 and 4.0mm2 are used in
most standard installations.
The fence wire sizes are 1.6mm2 or 2.5mm2.
A razor wire may be added to an existing electric fence to provide added security
by deterring intruders from interfering with the fence. When uses, the razor wire
should not touch the live wire but should be connected to the ground wire.
Sensors such as motion (PIR) sensors, laser sensors, vibration sensors, IR
sensors, and tension sensors can be added to an electric fence system to
improve its reliability
Electric fence wire splicing
 Wire splicing is the process of joining two or more wires together to
create a connection.
 Figure 8 knot and reef knot are the two most commonly used types
of knots in electric fence wire splicing as they provide maximum
contact at the joint.

Page 41 of 78
Access control system
It is a type of security system designed to manage and monitor the entry
and exit of individuals in a secured area.
Types of access control system
(i). Biometric-based access control system:- uses biometrics such as
fingerprints, face, eye or voice recognition system to allow or deny
access
(ii). Card-based access control system:- uses electronic cards and card
readers to allow or deny access
(iii). Pin/Password based access control system:- uses user defined PIN or
password to allow or deny access
(iv). Mobile access control system:- uses defined mobile phones or
devices to allow or deny access
(v). Radio Frequency Identification (RFID) access control system:- uses
radio signals to authenticate users by use of RFID cards or tags with
embedded chips
(vi). Cloud-based access control system:- allows for centralized access
control over the internet
Biometric access control security system
This is a type of security system that controls the entry to a premise by
use of biometrics such as face, fingerprint, palm print, iris/eye scan, or
voice recognition.
Biometric doors can also use additional features such as access
codes/passwords and card readers.
Components of biometric access control system
(i). Control panel:- is the heart of the system as it processes input data and
controls locking and unlocking of the doors.

Page 42 of 78
(ii). Input devices:- used to collect input data to authenticate uses. E.g
card readers, fingerprint scanners, facial recognition cameras,
keypads, and voice recorders.

Page 43 of 78
(iii). Output devices:- they allow access or produce audible sound
based on authentication results. E.g electric locks, magnetic
locks, and alarms
(iv). Power supply:- used to provide the electrical power needed to
operate the system
Working of biometric access control system
The system captures user biometric data using the input devices and converts
it into digital template. The data is then compared to the pre-stored
template in the database. If the two templates match, then access is
granted but if they do not match, access is denied and after multiple failed
attempts, an alarm can be triggered.
Benefits of biometric access control system
(i). Provides increased security to a premise
(ii). The user does not need to memorize passwords or carry cards when
biometrics are used
(iii). The system records all logs of access attempts thus enabling audit
(iv). They are difficult to bypass thus reducing changes of unauthorized access
(v). The system can be integrated to an already existing security
system such as CCTV and alarms

Page 44 of 78
Page 45 of 78
Page 46 of 78
Security considerations of ensuring secure access control system
(i). Set authentication measures such as multi-factor authentication
methods and store passwords and PINs in encrypted format
(ii). Use strong encryption for all remote communications
(iii). Secure all access control panels with physical security and
tamper-proof measures
(iv). Regularly update software to reduce risks of attacks
(v). Disable unnecessary services such as email connections to the
system to minimize attacks
(vi). Implement role-based access control to the system to be
accessed by only authorized personnel
(vii). Regularly audit logging to track all access events
(viii).Set out physical security measures such as CCTV cameras to
monitor critical access points
(ix). Ensure the access control system has a backup power supply for
operation during power outages and tampering of power sources
(x). Ensure remote monitoring is secured through encryption to minimize
hacking into the system/data
Intruder alarm security system and home automation security system
Intrusion detection security system is a type of security system that protects
secured area from unauthorized access or breach of security in the secured
area.
Home automation system is a type of security system that uses sensors and
alarms to monitor the security around residential areas and warn in case of
danger such as intrusion and fire.
Components of home/intruder detection security system
(i). Control panel:- is the brain of the system that activates and
deactivates other components of the system/controls all the
operations of the system.
(ii). Door and window contact detectors:- detects when the door/window is
opened
(iii). Glass break detector:- detects sound of breaking glass
(iv). Motion/PIR sensors/detectors:- detects motion of human beings
(v). CCTV cameras:- captures images and videos of activities around the home
(vi). Alarms:- notifies home owners and neighbours of intruders
(vii). Vibration sensors:- detects vibrations caused by attempted break-in
(viii).Smoke detectors:- detect presence of fire using smoke
(ix). Keypads:- used to arm or disarm the system
(x). Security lights:- used to enhance visibility when motion is detected

Page 47 of 78
(xi). Panic button:- placed at strategic places in the house and is
used to alert emergency services such as the police

Page 48 of 78
Working principle of PIR (Passive InfraRed) motion sensor
A PIR sensor detects motion by receiving infrared (IR) radiation from human
beings or animals. The sensor has two materials sensitive to IR radiations.
When a person moves within the sensor’s field of vies (detection area) and
then exit, the sensor detects a differential change between the two slots as
a change in temperature thus generating an signal to indicate the presence
of a moving person or animal.

Wiring diagram of a PIR sensor to control panel


Method 1
In this method, two resistors R1 =
12kΩ and R2 = 4.7kΩ are
connected between the tamper and
alarm switches as shown. This was,
the sensor is able to differentiate
between alarms and tamper
events.

Method 2

In this method, one resistor R =


3.3kΩ is connected between the
tamper and alarm switches as
shown. This was, the sensor is not
able to differentiate between
alarms and tamper events.

Page 49 of 78
Installation of A.C PIR motion sensors to control security light
 A PIR motion sensor can be installed to control security light when
it detects motion around the house or at the entrance without
using a control panel.
 The diagrams below illustrates how the PIR motion detector can
be wired to control a security light without using a control panel.
 In the first diagram, the light is controlled by the sensor only but in
the second diagram, the light can be controlled by both the sensor
and the two way switch independently.

 Intruder alarm is installaed in a closed circuit system with a


tamper loop and panic attack button as shown in the cicuit below.

Page 50 of 78
Factors to consider when choosing a type of sensor in a security system
(i). Type of threats to be detected:- motion, intrusion, glass breakage,
fire, smoke etc.
(ii). Environment of installation:- consider lighting, temperature
and humidity conditions
(iii). Range of coverage area:- choose a sensor whose detection range
matches the desired detection area
(iv). Integration/compatibility with existing system:- choose a sensor that is
compatible with the other components in the system
(v). Power supply:- choose a sensor that can be powered by the
available power supply
(vi). Ease of installation and maintenance:- choose a sensor that is easy to
install and requires less maintenance
(vii). Cost and budget:- choose a sensor whose cost meets the budget of the client
(viii).Response time:- choose sensor that has fast detection response time
for timely action
(ix). Tamper protection:- choose a sensor that is tamper-proof to prevent
disabling by intruders
Examples of sensors used in security systems:- PIR motion sensors,
ultrasonic sensors, glass break sensors, vibration sensors, gas detectors,
fire detectors, heat detectors, infrared (IR) sensors and laser sensors etc.
Doorbell installation system
 An electric bell is an audible device that converts magnetic effect of
an electric current into sound.
 If a lower voltage is to be used say 12V, the bell is powered through a
step-down transformer.
 Most bells are made from electromagnets instead of permanent magnets
because the magnetic field can be turned ON or OFF at will and the
strength of the magnetic field can be varied by varying the amount of
current.
Factors that affect the strength of electromagnet in an electric bell
(i). Amount of current through the coil:- increases with increase in current
(ii). The type of core material:- soft iron core is easy to magnetize
(iii). The number of turns of the coil:- increases with more turns

Page 51 of 78
Operation of simple bell circuit
1. Single-stroke bell type

When a push button/switch is pressed,


current passes through the coil
thus generating electromagnetic
field on the u-shaped soft iron core
which then attracts the armature.
Since the armature is attached to a
striker at it ends, it strikes on a
gong thus producing sound when
the armature is attracted by the u-
shaped electromagnet. When the
button is released, current stops
flowing and the u-shaped core gets
demagnetized thus releasing the
armature and the return spring
pulls the armature back and the
2. Trembler bell type striker stops hitting the gong.

When the push button/switch is


pressed, current flows through the
circuit thus generating
electromagnetic field on the u-
shaped soft iron core which then
attracts the armature to hit the
gong and produce sound. As the
armature is pulled towards the u-
shaped core, the contact is broken
and current is cut off thus
demagnetizing the iron core. The
return spring then pulls the
armature back to make the contact
and the above process of make
and break is repeated providing
continuous ringing provided that
the push button/switch is pressed.

Page 52 of 78
3. Continuous ringing bell type

When the push button/switch is


pressed, current flows through the
circuit thus generating
electromagnetic field on the u-
shaped soft iron core which then
attracts the armature to hit the
gong and produce sound. As the
armature is pulled towards the u-
shaped core, the contact is broken
and the lever drops to make the
lower contact which short
circuits/bypasses the push button.
At the same time, the current is cut
off thus demagnetizing the iron
core. The return spring then pulls
the armature back to make the
contact and the above process of
make and break is repeated thus
providing continuous ringing like
the trembler bell until the reset pull
switch is operated.
 An electric bell circuit consists of a bell push button/switch, a power
source and sometimes a relay.
Bell relay
 Pinout diagram of types of relays used during doorbell installation

Page 53 of 78
Bell transformer
There are two types of bell transformers: class A transformer which provides
4V, 8V and 12V outputs and class B transformer which outputs 6V only.
IEE regulations on Bell transformer
(i). The transformer shall be double wound
(ii). The transformer shall be connected to a separate sub-circuit of the supply
(iii). One point of the secondary winding and the metal case of the
transformer shall be earthed
(iv). The low voltage bell wiring shall be segregated from the normal
power and lighting cables

Indicator board
 When a single bell is to be rung from a different number of push
buttons/switches in separate rooms, it is necessary to use indicator
board to show the origin of the call. An example of this application is in
hotel and hospital rooms.
 The indicator board consists of a number of indicator elements each of
which is connected to one of the contact circuits and are given the
respective room names or numbers.
Figures 1 and 2 below shows simple wiring diagram of controlling a bell

Page 54 of 78
using push buttons through indicator board.

Page 55 of 78
Figure 1 Figure 2

Solution

Page 56 of 78
Consider the bell layout circuit shown below. Draw the wiring diagram
such that push buttons: A controls bell 2; C and D controls bell 1 through
the indicator board; B is the reset button.

Solution

Page 57 of 78
Steps/phases followed when creating a security system
(i). Phase 1: Needs assessment and planning:- This step involved site visit,
taking measurements, and analyzing the requirements.
(ii). Phase 2: System design:- Involves performing all calculations,
drawing plan and estimating the costs/budgeting.
(iii). Phase 3: Selection and supply:- involves identifying and selecting
reliable supplier for the materials needed and having them
delivered.
(iv). Phase 4: Installation:- involves connecting all the components of the
system according to the wiring diagrams and installing appropriate
software.
(v). Phase 5: Commissioning:- involves checking for proper operation,
performing all tests and training the security personnel on system
operation before handing over to the client.
Essential checks (activities done) when commissioning a security system
(i). Check that all cable connections are complete, firm and safe
(ii). Check that the power supply matches the power rating of the system
(iii). Check that all protective devices are set to the correct trip settings
(iv). Check that all appropriate signage are in place
(v). Power and test the system for proper operation
(vi). Train the security personnel on how the system works and
hand over the appropriate documentation to the client.
Page 58 of 78
Documents needed when installing a security system
(i). Site survey report:- provides details on the mapping of areas
requiring coverage, potential security risks and recommended
system to be installed.
(ii). System design document:- describes overall design of the system and
outlines technical specifications and requirements
(iii). Budget:- outlines the materials needed and costs to be incurred
(iv). Wiring diagram and electrical plan:- outlines how the
components are connected and cable routing
(v). Risk assessment and mitigation plan:- outlines potential security and
safety risks and how the system will address them
(vi). Compliance and regulatory documents:- these are given by the
regulating bodies to ensure that the installation adheres to local
laws and building codes.
(vii). Testing and commissioning report:- used to verify that the
system was installed correctly and met performance standards.
(viii). User manual:- provides guidelines or instructions on how to operate the
system
(ix). Handover report:- used to show that the installation has been
completed and that the system is fully operational.
IEEE regulations, standards and guidelines when installing security systems
A. Electric fence installation
(i). For electric fence, the pulse voltage must not exceed 10kV (or 5 joules)
(ii). Ensure proper grounding/earthing of the control panel/energizer and fence
wire
(iii). Earth rods should be placed at least 1.5m deep and at most 30m apart
(iv). Earth rods should be made of corrosion-resistant materials such as
galvanized steel or copper
(v). Install warning signs at least after every 10m
(vi). The fence should be fed from its own MCB not shared to other
circuits in the facility
(vii). Maintain safe distance from public pathways and utility lines
(viii).Regularly clear the vegetation growing on the fence line
(ix). Provide backup power supply to the energizer
B. CCTV system installation
(i). Ensure proper earthing of the control panel
(ii). Ensure warning signs are placed at every major entrance of the facility
(iii). Provide backup power supply to the CCTV system
(iv). Ensure the CCTV system is operated from separate MCB from other circuits
(v). Ensure data protection by installing appropriate safety measures
(vi). Avoid placing cameras in areas that may violate privacy rights
such as in bathrooms or facing neighbours compound without
Page 59 of 78
their consent
(vii). Use shielded cables to reduce electromagnetic interference
(viii).Regularly clean cameras to remove dust
(ix). Use devices with the correct IP ratings for outdoor applications e.g IP65

Page 60 of 78
C. Fire alarm system installation
(i). Ensure proper earthing of the control panel
(ii). A break glass call point should be located on exit routes and floor
landings of staircase.
(iii). Break glass call point should be installed 1.4m above the floor
for ease of accessibility.
(iv). Large buildings must be divided into zones for ease of identifying the
location of fire.
(v). Use fire resistant cables and ensure that the fire circuit is
segregated from the other circuits.
(vi). Ensure the fire alarm system is operated from separate supply from
other circuits and that the supply is labelled “Fire Alarm, Do Not Switch
Off”.
(vii). Use the correct fire alarm and signal code
(viii).Provide backup power supply to ensure operation during power outages
(ix). Heat detectors should be placed in kitchen or areas prone to false
alarm due to smoke while smoke detectors should be placed in the
hallways and other common areas.
(x). Regularly clean detectors to remove dust and debris
(xi). Use devices with the correct IP ratings for outdoor applications e.g IP65
D. Biometric and access control system installation
(i). Ensure proper earthing of control panel
(ii). Ensure that the system is secured against unauthorized access
and cyber- attacks
(iii). Provide backup power supply to ensure operation during power outages
(iv). Ensure the fire alarm system is operated from separate MCB from other
circuits
(v). Ensure that personal biometric data such as fingerprints and facial
recognition is securely stored and protected
(vi). Ensure the biometric scanners and access control readers are
placed at the entrance of the secured area and at the appropriate
height

Page 61 of 78
1. MARK OUT SECURITY SYSTEM ZONES AND CALL POINTS
 Security system zones/call points are areas within the property
that are covered/protected by a particular detector or sensor of
a security system.
e.g The front door to a house can have a detector or an access control
device and CCTV camera to warn you of an intruder. Therefore, we term
the front door area as a security zone.
 Each zone/call point can have more than one detector connected in
such a way to give one signal to the control panel when triggered.
 Marking out is the process of transferring the dimensions from a
plan/drawing to the work-piece in preparation for the actual installation of
the system.
 Marking out gives guidelines on how the system will be arranged on the
work-piece and ensures that the materials fit together properly.

Page 62 of 78
Importance of marking out security zones
(i). Ensures that materials fit together properly
(ii). Helps in guiding how the components will be laid on the work-piece
(iii). Helps minimize material wasteage
(iv). Helps in choosing the appropriate tools for the job
(v). Makes laying of the materials/components easy
Marking out tools commonly used during installation of security systems
(i). Tape measure
(ii). Pencil/chalk/marker
(iii). Engineers square/try square
(iv). Calipers
(v). Measuring compass
(vi). Steel rule
Piping and fixing/installation tools and equipment used during
installation of security systems
(i). Screw driver
(vii). Spirit level
(ii). Drill machine
(viii).Hacksaw blade
(iii). Pliers
(ix). Network cable tester
(iv). Bending spring
(x). Multimeter
(v). Crimping tools
(xi). Utility knife
(vi). Fish tape/wire
(xii). Wire stripper
puller

2. LAY SYSTEM CABLES


 Types of cables used in security system was discussed in topic 1.
 Most of the cables used in installation of security system
comprises of three parts:- conductor which carries the data/signal,
insulation to prevent short circuit and a sheath/outer jacket to
protect against physical damage.
 To increase protection, all the system cables should be installed/fitted
in conduits (pipes), trunking or ducting.
 If a cable is to run underground, it should be armored or fitted in a
metallic or heavy gauge PPR pipes to increase safety.
Factors to consider when laying system cables
(i). Cable construction:- cover finishing
(ii). Cable size:- choose a cable size that can safely carry the current
(iii). Shielding requirement:- should be shielded from electromagnetic
interference and other physical interference or damage
(iv). Tensile rating:- the cable should withstand the tension needed
Page 63 of 78
(v). Cost of laying the cables:- should match your budget

Page 64 of 78
(vi). Application of the cable:- is it for power or communication
Data transmission media
It refers to the physical pathways through which data travels between the
devices in a security system.
It ensures reliable data transmission, connectivity between devices and signal
protection.
The types of data transmission media/infrastructure include:-
(i). Wired transmission media:- uses physical/hard wires/cables such as
LAN cables, coaxial cable, fiber optic cables, HDMI cable and VGA
cables.
(ii). Wireless transmission media:- transmit data wirelessly between devices. E.g
Wi-
Fi, and Bluetooth
(iii). Telephone line/Power line communication:- uses existing
telephone lines to transmit data
(iv). Satellite communication:- uses satellite network to transmit data
over long distances
(v). Microwave communication:- uses microwaves to transmit data
over long distances through the air using devices such as
towers and relay stations

Factors to consider when choosing transmission media


(i). Distance of transmission:- for long distances, consider using
wireless transmission to prevent data loss due to resistance
in cables
(ii). Bandwidth/Amount of data to be transmitted at one time:- choose a
media that can support the amount of data to be transmitted
(iii). Security:- choose transmission media that is not prone to attack by
both physical and electronic/cyber security threats
(iv). Environmental conditions:- choose a media that can withstand
the harsh environmental conditions in the work site
(v). Cost and budget:- choose a media whose cost meets your budget
(vi). Scalability:- choose a media that allows for future expansions when needed
(vii). Reliability:- choose a media which is stable when transmitting data
Segregation in cable laying
 Cable segregation involves separating cables based on differences in
voltages levels and functionalities.
 Cable segregations ensures that electromagnetic interference (EMI) or
Page 65 of 78
high level electrical energy does not get induced into the other cables
or make maintenance and troubleshooting easy.
Importance of cable segregation

Page 66 of 78
(i). Reduces electromagnetic interference (EMI) interference
(ii). Makes troubleshoot easy
(iii). Makes maintenance easy
(iv). Prevents induction of high electrical energy into data cables
(v). Prevents data loss
(vi). Prevents interference of unintended circuits during installation and
maintenance
(vii). Increases safety in case of short circuit

3. MOUNT ACCESSORIES
Definition of terms used
Mounting:- is the process of attaching or installing components to a
surface/work piece Accessories:- are the various components that enhance
the functionality of a system
Security system:- is a framework of devices and controls that detect,

Page 67 of 78
monitor and prevent unauthorized access

Page 68 of 78
Control panel:- is the central hub/brain of a security system which
controls the operations of the system
Enclosure:- is a protective housing for electrical and electronic equipment to
safeguard against environmental factors such as dust and water
Accessories used in security system
(i). Sensors and detectors
(ii). CCTV cameras
(iii). Alarms and sounders
(iv). Access control devices
(v). Cables
(vi). Communication modules
(vii). Power supply
(viii).Control panels
Security system control panels
They act as the brain of the security system by processing input signals from
sensors and triggering alarms when threats are detected
Types of control panels
(i). Wired control panel:- requires physical connection to the accessories.
They are less prone to signal interference and are more reliable
(ii). Wireless control panel:- communicates to the accessories wirelessly
through radion frequencies (RF). Although they are easy to install, they
are more prone to signal interference and less reliable.
(iii). Hybrid control panel:- combines both wired and wireless
components for greater flexibility and reliability
Factors to consider when mounting Control panel
Accessibility:- should be installed in a location that is easily accessible for
maintenance, troubleshooting and programming
Security:- should be placed in a secure location to prevent unauthorized tampering
Proximity to power sources:- should be near power outlet for ease of
connection to the power supply
Environmental conditions:- should be mounted in a location free from extreme
weather conditions such as too hot areas
Signal range:- wireless panels should be installed in a location with good
signal strength for ease of communication with sensors and other devices
Control panel mounting procedure

Page 69 of 78
(i). Determine the best location for the control panel
(ii). Prepare the surface where the panel will be mounted by
ensuring that the surface is solid and capable of supporting the
panel
(iii). Drill holes based on the control panel mounting holes
(iv). Secure the control panel on the wall/surface using screws and tighten them
(v). Connect all the sensors/detectors, alarms and power supply to the control
panel
(vi). Power the control panel and test for correct operation
Insulation classes of enclosures
The purpose of the enclosures is to protect sensitive components from
environmental factors like dust, water, and physical damage while ensuring
electrical safety.
(i). IEC protection classes (IP ratings)
IP (Ingress Protection) ratings define the protection level of enclosures and
are written in the format IPxx where xx are two digits number. The first digit
(0-6) is the rating for the protection against solid objects such as dust while
the second digit (0-9) is the ration for the protection against liquid substance
such as water.
First Digit (Solid Protection):
0: No protection.
1: Protected against solid objects larger than
50 mm. 2: Protected against objects larger
than 12.5 mm.
3: Protected against objects larger than
2.5 mm. 4: Protected against objects
larger than 1 mm. 5: Dust-protected
(limited ingress of dust).
6: Dust-tight (no ingress of dust).
Second Digit (Water Protection):
0: No protection.
1: Protected against vertically falling water droplets.
2: Protected against water droplets when tilted up
to 15°. 3: Protected against water spray up to 60°
from vertical. 4: Protected against water
splashing from any direction. 5: Protected against
water jets from any direction.
6: Protected against powerful water jets.
7: Protected against temporary immersion in
water. 8: Protected against continuous
Page 70 of 78
immersion in water.
9: Protected against high-pressure, high-temperature water jets.
Examples:-
 IP20: Protected against solid objects larger than 12.5 mm, no
protection against water.
 IP54: Dust-protected and protected against water splashes from any
direction.
 IP67: Dust-tight and protected against temporary immersion in water.

Page 71 of 78
(ii). NEMA enclosure classes
They define enclosure protection classes based on environmental
conditions. Common types include:
 Type 1: Indoor use; protection against light dust and accidental contact.
 Type 4: Indoor or outdoor use; protection against windblown dust,
rain, and hose-directed water.
 Type 6: Suitable for submersion under limited conditions.
 Type 13: Protection against oil, dust, and non-corrosive coolants.
(iii). Thermal insulation classes
Shows the maximum operating temperature the insulation can withstand.
Examples are:
 Class A: 105°C.
 Class B: 130°C.
 Class F: 155°C.
 Class H: 180°C.

4. TERMINATE SYSTEM CABLES


Termination describes the particular point where conductive device starts or ends.
Termination techniques/types
(i). Screw termination:- involves securing the end of a cable using screws
(ii). Crimp termination:- involves use of crimping tool to attach a
connected to the end of a cable
(iii). Solder termination:- involves melting a solder wire at the end of a
cable to create a firm joint/point
(iv). Compression termination:- uses compression fittings to secure cable
end to a connector
(v). Push-in/wire nut termination:- uses a spring-loaded connector or wire
nuts to secure cables
(vi). Lug termination:- involves attaching a lug at the end of the cable and
screwing or bolting it into place
(vii). Heat shrink termination:- involves use of heat shrink tube to cover
cable end and connector thus providing insulation and protection
(Highly used in overhead electricity cables at the transformer end or
when connecting an underground cable from the overhead cables)

Page 72 of 78
(viii).Termination block:- involves inserting cable ends into the terminal
block and securing them with screws or clamps (widely used in
control panels and distribution boards)

Page 73 of 78
Importance of cable termination
(i). It prevents loose connections that may give rise to heat and fire
(ii). Prevents formation of a high resistance joint
(iii). Prevents possible electric shock or short-circuit incase cable gets loose
(iv). Prevents possible fire hazards due to short-circuit
(v). Makes the connection reliable by preventing connection failures
(vi). Makes maintenance easy
(vii). It makes installation neat and more organized (increases aesthetic
value of the installation)
Tools and equipment used in cable termination
A. Tools
(i). Crimping tool
(ii). Screw driver
(iii). Pliers
(iv). Soldering gun/iron
(v). Strip knife
(vi). Compression tools
(vii). Labelling tools
B. Equipment
(i). Multimeter
(ii). Ethernet/LAN cable tester
Cable lugging
It is the process of attaching cable lug at the end of a cable for ease of
connection to a terminal or bus bar.
Cable lugging/termination procedure

Page 74 of 78
(i). Prepare the cable by cutting or stripping it the right size where necessary
(ii). Choose the tug or termination type that matches the cable
size and job requirement
(iii). Crimp the lug or connector into the cable end (or screw it into place)
(iv). Inspect the cable terminal for firmness, short-circuit or any other fault
(v). Label the cable where necessary
Types of cable lugs
(i). Compression lugs:- requires crimping tool to compress them
(ii). Mechanical lugs:- have a screw or nut and bolt
(iii). Solder lugs:- require soldering to attach it to the cable
(iv). Ring terminal lugs:- have a ring end that fits screw or bolt
(v). Fork terminal lugs:- have an opening at its end making resemble a fork

Procedure for terminating coaxial cable to a BNC and power connectors


(i). Measure and cut the cable to the desired length
(ii). Using a cable stripper or knife, remove about 1 inch of the outer jacket
to expose the braided shield of the coaxial cable and the red and
black power cables
(iii). Fold the braided shield back over the jacket neatly
(iv). Strip the dielectric insulation about ¼ inch to expose the inner core
(conductor) and also strip ¼ inch of the two power cables to expose
the conductors.
(v). Prepare the BNC and power connectors and slide the metal ring of
the BNC connector over the coaxial cable
(vi). Insert the stripped cable into the BNC and power connectors
Page 75 of 78
ensuring that the inner conductor enters the BNC pin, the red power
cable enters the positive

Page 76 of 78
terminal while the black power cable enters the negative terminal of the
connector and screw them firmly while the braided shield is clamped
on the BNC connector base.
(vii). Slide the metallic ring up to the BNC connector and fix/crimp it firmly
(viii).Test the firmness and continuity of the connection

Procedure for terminating Ethernet/LAN/Twisted pair cable to an RJ45 connector


(i). Measure and cut the desired length of the cable using a cable cutter/pliers
(ii). Using a cable striper or utility knife, strip about 1 inches of the
outer jacket to expose the inner cable pairs
(iii). Untwist the pairs and straighten them carefully
(iv). Arrange the wires in the correct order using the T568B standard
(v). While holding the wires together in the correct order, trip them evenly
to about ½ inch
(vi). While holding the RJ45 connector with the gold pins facing up, insert
the wires carefully into the RJ45 connector ensuring that they are in
the correct order and that they all reach the end of the connector.
(vii). Check that all the 8-wires are visible from the end of the connector
(viii).Crimp the connector using the crimping tool
(ix). Test the cable using a cable tester to verify connectivity and proper wiring

Page 77 of 78
5. TESTING AND INSPECTING SECURITY SYSTEM
Testing is the process of establishing the correctness of installation by
use of measuring instruments.
Inspecting is the process of checking the installation against a specified standard or
job requirement.
While testing and inspecting security system installation, the following
should be checked:
(i). Incoming service live connection:- check for proper termination, fuse
rating, cable size, proper earthing, etc.
(ii). Control panel installation:- check for proper earthing, well covered
against rain and dust, correct power supply, proper cable
management, and firmness.
(iii). Proper working of components:- test all detectors, sensors, alarms etc.
Types of tests performed in a security system installation
(i). Insulation resistance test:- done to ensure no leakage current is
flowing through the insulation. It is performed using an
instrument called “Megger”
(ii). Earth continuity test:- done to ensure proper earthing of the installation
(iii). Short-circuit test:- done to identify unintended electrical connections
between the conductors
(iv). Firmness test:- done to determine the firmness of an installation
(v). Arming and disarming test:- done to verify functionality of the system
Arming (activate) test procedure
(i). Ensure all occupants have left the premises and all doors and
windows are closed
(ii). Access the control panel and entre user code where applicable
(iii). Select the arming mode and activate the system
(iv). Select the exit delay and leave the premises through the exit door
(v). The system should be activated/armed after the delay is over
Disarming (deactivate) test procedure
(i). Return to the premises through the entry door
(ii). Access the control panel and entre user code where applicable
(iii). Select the disarming mode to deactivate the system
(iv). The system should be deactivated/disarmed after the delay is over
(v). Reset the system for normal operations to resume

Page 78 of 78

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy