Case Study - Alarm System
Case Study - Alarm System
Case Study - Alarm System
Version 1.0
20/11/2016
Revision Page
a. Overview
Describe the content of the current version.
b. Target Audience
State the targeted audience.
c. Project Team Members
Noorzool Hilmi Bin Noormuin SX132522CSJF03
Jaafar Bin Sulaiman SX130129CSJS03
Saankarganesh A/L Krishnasamy SX132525CSJF03
Mohamad Shukri Bin Bahari SX132520CSJF03
1.0
Primary
Author(s)
Description of
Version
Date
Completed
Initail Document
19 nov 2016
Note:
This Case Study Documentation template is based on guideline from (Runeson et al.2012),and customized
to meet the need of SCSJ3403 course at Faculty of Computing, UTM. Compiled and checked by Shahliza
Abd Halim, PhD on 9th October 2016. Examples of case study are from GoPhone case study
by Satzinger (2011). The template is also based on the original template by Dr Shahida Sulaiman.
Table of Contents
1
Introduction
1.1
Purpose
1.2
Scope
1.3
1.4
References
1.5
Overview
Rationale
2.2
Objective
2.3
Unit of Analysis
2.4
Theoretical Framework
Data Collection
3.1
3.2
3.3
Product portfolio
Data Analysis
4.1
4.2
5.2
Reports produced
Lesson Learned
6.1
6.2
6.3
1. Introduction
When we look at our family, and our home, we want them to be safe, always out of harms way.
When we leave for work, we expect to come back to a smiling family, and to a home that is secure.
But as they say, hope is not a strategy. The growing crime rates across cities reflect the bitter
reality. Many people overlook, ignore, and underestimate the need of taking appropriate home
security measures. A burglary or theft can lead to devastating consequences, both emotionally and
financially. While the financial loss may be recoverable, the trauma inflicted on our family may
last forever. Security system is take a main part to secure our home and our family in safe.
1.1 Purpose
The purpose of the case study to identify the features of embedded security system:
Create comparison features table of embedded security system differentiate between
basic and nonbasic features.
Purpose method to build the system with using product line method.
1.2 Scope
The software product is about
1.
RTOS - real-time operating system ,is an operating system (OS) intended to serve real-time
applications which process data as it comes in, typically without buffering delays. Processing
time requirements (including any OS delay) are measured in tenths of seconds or shorter
increments of time. They either are event driven or time sharing. Event driven system switches
between task based on their priorities while time sharing switch the task based on clock
interrupts.
Sensor - device that detects and responds to some type of input from the physical environment.
Actuator - component of a machine that is responsible for moving or controlling a mechanism
or system. An actuator requires a control signal and a source of energy. The control signal is
relatively low energy and may be electric voltage or current, pneumatic or hydraulic pressure,
or even human power.
1.4 References
1.5 Overview
The reports sections reflect the main activities case study documentation.. The first is The Overall
Description and the second is `the Specific Requirements. The Overall Description will describe
the requirements of the embedded security system. The Specific Requirements section will
describe in detail the requirements of the system.
2. Case Study Design
Nowadays there are many security systems .The product in the market today do not have a specific
standard. To improve the security embedded systems is a step to prepare the necessary standards.
With this the development and manufacture of their products can be standardized to make it more
convenient and flexible for customers to choose the system that suits their needs.
2.1 Rationale
Most manufacturers of security alarm system has its own Advanced Features. There are
characteristics that can be considered as the basis for the system. To identify the basic features of
the system, we can classify into two parts, namely the common and optional feature. Almost all
manufacturers use the basic features but in a different way.
2.2 Objectives
Unit of analysis section we are choose multiple case study to complete our case study
documentation. Reason of choosing multiple case study analysis because we analyse about the one
of the embedded system which is embedded security system. In our case study we find 5 similar
features of embedded security system. We analyse each system and collect the data from their own
website which is we stated in references site. From the data we collected we compare the features
of the system, functions, advantages and disadvantages of system. Thus why we are choosing the
multiple case study.
cord, connecting you and the outside world. In most cases, your monitoring and communication
system is the element that minimizes (or even eliminates) the possibility of a disaster.
Secure Data - Cryptographic data transfer between part eg , sensor smart device etc
Secure Storage - kebanyakkan sistem yang menggunakan storage yg besar contohnya sistem yg
mempunyai kamera. Storage dalaman atau cloud akan di encrypted
Network GSM/Direct line- for systems that can be used to call other station for example to a police
station, fire department or to the phone owner.
3.3 Product Portfolio
a)
Door and Window Sensors: Door and window sensors are comprised of two parts installed
adjacent to each other. One part of the device is installed on the door or window and the other
on the door frame or window sill. When a door or window is closed, the two parts of the sensor
are joined together, creating a security circuit. When the security system is armed at the control
panel, these sensors communicate with it by reporting that the point of entry is secure. Should
a monitored door or window suddenly be opened, the security circuit is broken and the control
panel interprets this as a breach of a secured zone. A high-decibel alarm is sounded and in most
instances the alarm monitoring company is automatically notified.
Motion Sensors: These security components, when armed, protect a given space by creating
an invisible zone that cannot be breached without sounding an alarm. These are typically used
to protect rooms containing valuables, as well as areas less frequented in larger homes.
High-decibel Alarm: Loud enough for neighbours to hear, home security alarms serve a few
different purposes. First, they alert the people inside the house that a problem occurred. They're
also shrill enough to send a burglar running while also notifying nearby neighbours to the
situation.
Yard Sign and Window Stickers: On the surface, these items might seem like nothing more
than marketing tools for alarm companies, but they play important roles in home security.
When you place a security company's sticker in a front window and plant their sign in your
front yard, you are telling burglars you home is professionally protected and not a wise choice
for an attempted burglary. They are effective at conveying this message and should be used as
recommended by the security company.
Nowadays, house alarms or home security systems are preferably needed to ensure the house
security from burglars and criminals. Installing a home security system can improve the safety of
your family and property. Another efficient device that is in demand nowadays is the burglar
alarm system. These safety alarms are featured as electronic devices that have sensors. They are
connected to a main control panel through either a low voltage narrowband RF signal or hardwire.
When a connection is made between the unit and the signal, it can create an announcing alarm
leading for an elicit response.
The most common burglar alarm sensors can indicate the opening of a window or door. The new
designed systems are predominantly hardwired for economic purposes. While the retrofit wireless
systems can also be more economical and are quicker to set up. As for burglar alarm systems, you
can find systems that are dedicated to a particular purpose only. Others also handle intrusion,
handle fire, and are for safety alarms simultaneously. Designs and features may range from small
to built-in noisemakers. There are also those complicated hi-tech designs with multi-zoned
computer based systems and monitoring outputs. Many of these conceptualized designs may apply
to portable alarms for protecting your house and vehicles.
Efficiency of burglar alarms depends on the zone triggered, number of zones, time of the day and
other aspects installed within the monitoring system. These systems can initiate various actions or
can be instructed to call the police department, fire department and ambulances immediately.
Others can also call the property supervisor to try to determine if the alarm is true and genuine.
Other functions may also include calling a list of telephone numbers provided by the owner to
contact listed persons to go and check the secured premises. Some zones can make calls to the
local oil heating company to go to inspect the system or to contact the owner with specific details
of which area are getting flooded. You may also find burglar alarm systems that are attached to a
video surveillance system so that monitoring can be instantly played on a remote monitor.
The desired result you seek from a burglar alarm system is to cause a specific alarm output and
response quickly when the sensors identify a valid condition that may have triggered the alarm.
The ability of the unit to communicate back to the monitoring system is one crucial aspect to the
monitoring efficiency of the alarm made. Some insurance companies and local government
agencies may require alarm systems be installed with codes. They should also acquire certification
from a third party organization that inspects the efficiency and quality of these alarm systems.
Those with independent certifications should ensure that their system meets the level of
qualifications beyond what the dealer promotes and offers. This will only ensure that you have an
alarm system that is reliable, efficient and made of high quality.
Premises control unit (PCU), Alarm Control Panel (ACP), or simply panel: The "brain" of the
system, it reads sensor inputs, tracks arm/disarm status, and signals intrusions. In modern systems,
this is typically one or more computer circuit boards inside a metal enclosure, along with a power
supply.
Sensors: Devices which detect intrusions. Sensors may be placed at the perimeter of
the protected area, within it, or both. Sensors can detect intruders by a variety of
methods, such as monitoring doors and windows for opening, or by monitoring
unoccupied interiors for motions, sound, vibration, or other disturbances.
Alerting devices: These indicate an alarm condition. Most commonly, these are bells,
sirens, and/or flashing lights. Alerting devices serve the dual purposes of warning
occupants of intrusion, and potentially scaring off burglars. These devices may also be
used to warn occupants of a fire or smoke condition.
Keypads: Small devices, typically wall-mounted, which function as the humanmachine interface to the system. In addition to buttons, keypads typically feature
indicator lights, a small multi-character display, or both.
Interconnections between components. This may consist of direct wiring to the control
unit, or wireless links with local power supplies.
Security devices: Devices to detect thieves such as spotlights, cameras & lasers
4. Data Analysis
4.1 Data Analysis Technique
The instruments used to collect the data ware questionnaire. A set of questionnaire containing 25
questions divided into four section was developed based on a questionnaire. Different questiontypes, such as multiple choice, short answer, linear scale, multiple choice grid and yes-no were
used in the questionnaire. The different sections of the questionnaire were:
i)
Background information,
ii)
The causes,
iii)
The effects,
iv)
The solutions. The questionnaire was distributed at Bayan Baru, Kulim, Baling and
Seberang Jaya on 12 November 2016, 8.00AM to 3.00PM.
The in survey was utilised to confirm the findings from the questionnaire as well as to triangulate
the data collection methods. 51 respondents were involved in the survey.
4.2 Domain Analysis Result
FEATURE
Simon XTi
ADEMCO
Canary
IJRASET
GE
Interlogix
RTOS
User Identification
Smartphone
Apps,
Touch Screen soft
button
Keypad
Keypad
SMS, Call
Remote
Handheld
Touchpads
,
Dialog
Touchtalk
2-Way RF
Touchpads
,
Keychain
Touchpads
Secure Connection
Wired Sensing
Loop
no
no
no
Cryptogra
phic , RF
Secure Storage
Build In Flash
Internal
ROM
Encrypted
cloud
storage
Secure
database
Cryptogra
phic
Storage
Sensor
Door/Window
Sensors,
PIR motion
detector,
Image sensor,
Glassbreak sensor,
Smoke and heat
Detector,
Carbon Monoxide
detector
Motion,
Smoke,
Door/Win
dows,
3-axis
accelerom
eter,
Ambient
light,
Capacitive
touch,
Motion
detection
Camera
Motion
sensor,PIR
,Ultrasonic
sensor,,Mi
crowave
detector,
Inertia
sensor,vibr
ation
Motion
Sensors,
Door/Win
dow
Sensors,
Freeze
Sensors,
Carbon
Monoxide
Sensors,
Actuator
Siren, Auxiliary
power
Alarm
Sirens
Siren
Alarm ,
Lamp
Servo
motor
Alarm
Sirens and
Lamp
Modules
no
2.4GHz
Wi-Fi
(802.11
b/g/n),
Wired
Ethernet,
Bluetooth
Low
Energy
(BLE)
no
6 - Preset
Tel
number
GSM
1000-ft. open-air
receiving range
no
no
Triggered
Center
( eg.
Police)
no
Backup Battery
LCD Display,
LCD BW
PC,mobile
7-segment
Handheld
Info Display
display
phone,web
-based
monitorin
g
display
Display
Reports about data security methods that can be agreed upon by many manufacturers
Study other embedded systems that are modular.
Proposals for those who want to study this further information to continue the case study.
6. Lesson Learned
6.1 Design and Planning Lesson
The lesson we have been learned while we design and planning our case study is what are the
feature they used and how its worked and solve the problem for human kind. Nowadays crime
become conquer the world. How much the features is work to solve the problem. Many of the
manufacture system is working under the network such as wifi connectivity. While we planning
the design our case study first of all we find their features and how it works this is the lesson we
learned from this part.
Most manufacturers are hiding certain parts, for example rtos, the encrypted data, sensor and
electronic component used. The user manuals supplied less technical, this may prevent the system
to emulate. Some manufacturers do not supply the info to an system but need to contact them to
get more info.
From our analysis , most the system does not allow customers to customize the system according
to the requirements of their home. If there is a system that allows customers to customize is better.
Appropriate methods such as modular systems need to be considered, this line of products conform
to the rules. We envision a system that has two parts, a core that provides the basic framework and
can be connected to the module according to customer preferences, for example, sensors and
actuators which optional and easy to connect. With these customers are more satisfied than
package existing in the market now.