Building Services Discussion Assignment Topic 5
Building Services Discussion Assignment Topic 5
SESSION 1 : 2024/2025
C) Perimeter Security:
Perimeter security focuses on controlling and securing the outer
boundaries of the building property. This can involve physical
barriers like fences, gates, and bollards to prevent unauthorized
vehicles or individuals from entering. Additionally, perimeter
security may include motion detectors, infrared sensors, and
alarm systems to detect any breaches or suspicious activity near
1
the property line. Security personnel, either on-site or through
patrol services, can further enhance this layer of protection by
conducting regular checks and responding to any alarms or alerts
triggered by the perimeter systems.
Delay: Physical barriers (like fences and locks) are used to delay
potential intruders, providing time for a response.
1
3. Components of a Security System
The following sections describe the key components of a building
security system:
i. Lighting
Concept: Lighting plays a crucial role in maintaining security by
improving visibility and deterring criminal activity, particularly
at night or in low-traffic areas. Effective lighting eliminates
hiding spots and helps both security personnel and surveillance
systems monitor key areas of the building.
Components:
Exterior Lighting: Illuminates the perimeter, entrances, and
pathways to deter unauthorized access and facilitate monitoring
by CCTV cameras.
Interior Lighting: Ensures visibility in hallways, lobbies, and
critical areas such as vaults or server rooms.
Motion-Activated Lights: These lights activate when movement
is detected, serving as an energy-efficient deterrent and alerting
security personnel to unusual activity.
Emergency Lighting: Provides visibility during power outages,
guiding occupants to exits and allowing security measures to
function.
2
ii. Perimeter Control
Concept: Perimeter control focuses on securing the outer
boundaries of a property, serving as the first line of defense
against unauthorized entry. Effective perimeter control uses a
combination of physical barriers and electronic systems to
monitor and control access to the property.
Components:
Fences and Walls: Physical barriers such as fences, walls, or gates
that limit access to the property. These may be reinforced with
anti-climb measures or electric fencing.
Secure Gates: Controlled access points for both vehicles and
pedestrians, which may include keypads, biometric readers, or
security personnel checking credentials.
Surveillance Cameras: Monitors the perimeter for signs of
intrusions or suspicious activities.
Motion Detectors: Sensors placed along the perimeter that detect
unauthorized movement and trigger alarms.
3
iii. Access Control
Concept: Access control systems manage who can enter or exit a
building or specific areas within the facility. These systems are
designed to ensure that only authorized personnel have access to
restricted areas, thus safeguarding sensitive information, valuable
property, or high-risk zones.
Components:
Keycards and Biometric Readers: Employees and visitors are
required to scan a card or provide biometric data (fingerprint or
facial recognition) to gain access to restricted areas.
Security Checkpoints: Physical checkpoints where security
personnel verify identities and credentials before granting access.
Smart Locks: Electronically controlled locks that can be
monitored and managed remotely to grant or revoke access as
needed.
Audit Logs: Record entry and exit events to track who accessed
specific areas and when, providing data for security reviews.
iv. Pedestrian Traffic Control
Concept: Pedestrian traffic control is the regulation of foot traffic
in and around a building to prevent overcrowding, maintain
orderly movement, and ensure that only authorized individuals
access secure areas.
Components:
Turnstiles and Gates: Automated barriers that control entry points
and ensure that only one person can enter at a time after identity
verification.
Barrier Systems: Physical barriers that channel people toward
specific entry and exit points, making it easier for security
personnel to monitor.
4
Flow Control: Signage, barriers, and paths that guide pedestrians
through the facility, preventing unauthorized entry into restricted
zones.
v. Monitoring and Surveillance
Concept: Monitoring and surveillance systems are critical for
providing real-time observation of the building’s interior and
exterior areas. These systems help detect, assess, and respond to
potential threats or incidents.
Components:
CCTV Cameras: Strategically placed cameras provide continuous
video surveillance, recording footage for later review and
allowing security personnel to monitor critical areas in real-time.
Video Analytics: Advanced systems equipped with motion
detection, facial recognition, and other analytics to identify
potential threats automatically.
Central Monitoring Systems: A control center where security
personnel can view live video feeds, receive alerts, and coordinate
responses.
Sensors and Alarms: Motion detectors, door sensors, and glass-
break alarms that notify security teams when suspicious activity
occurs.
Conclusion
A comprehensive security system for a building integrates
multiple physical and technological components. Lighting,
perimeter control, access control, pedestrian traffic control, and
monitoring/surveillance work together to provide a secure
environment. Each component plays a specific role in deterring,
detecting, and responding to threats, ultimately ensuring the
safety of the building and its occupants.
5
Question 2
A domestic security system protects homes from various threats such
as burglary, intrusion, fire, and environmental hazards. It consists of
interconnected devices designed to monitor, detect, and respond to
security breaches. These systems range from basic alarm setups to
advanced, smart-home integrated solutions.
6
2.Types of Domestic Security Systems
1. Monitored Systems:
- These systems are connected to a professional monitoring service
that tracks alerts 24/7 and notifies authorities if necessary.
- They typically require a subscription fee and offer faster response
times during emergencies.
2. Unmonitored Systems:
- These systems are self-monitored by the homeowner. They rely on
sirens and notifications (like smartphone alerts) to warn of intrusions.
- They are often less expensive but rely on the homeowner's
availability to respond.
3. Wired Systems:
- These systems use physical wires to connect sensors, cameras, and
other components to the central control panel.
- They are typically more reliable but harder to install and maintain.
4. Wireless Systems:
- Wireless systems use radio frequencies to communicate between
devices and the control panel.
- They are easier to install, often portable, and more scalable, though
potentially prone to signal interference.
5. Smart Home Security Systems:
- These systems integrate with smart home technology, allowing
homeowners to control and monitor their security through apps, voice
commands, and automation systems.
- They are customizable, and devices like cameras, smart locks, and
thermostats can work together for enhanced security.
7
3. Components of a Burglar/Robbery Alarm System
A burglar or robbery alarm system consists of several key
components that work together to detect and respond to security
threats.
i. Input Devices
Input devices are sensors and detectors that monitor the home for
signs of intrusion or emergency. They include:
- Door/Window Sensors: Detect when doors or windows are opened
or broken.
- Motion Detectors: Sense movement in key areas of the house when
the system is armed.
- Glass Break Sensors: Detect the sound or vibration of breaking
glass.
- Smoke and Heat Detectors: Monitor the home for signs of fire or
excessive heat.
- Panic Buttons: Allow homeowners to manually trigger an alarm in
case of immediate danger.
- Pressure Mats: Placed under rugs or near doors to detect footsteps.
ii. Output Devices
Output devices are responsible for notifying the homeowner or
authorities once the system detects an intrusion. These include:
- Sirens/Alarms: Emit loud noises to alert the occupants and scare off
intruders.
- Strobe Lights: Flashing lights that provide a visual alert, often used
for exterior signalling.
- Phone Alerts/Notifications: Sends alerts via phone apps, text
messages, or emails to notify the homeowner of any events.
8
- Remote Monitoring Services: If the system is monitored, it sends
alerts to a professional service that can contact emergency responders.
iii. Alarm Panel
The alarm panel is the central control unit of the system. It manages
the system’s communication with input and output devices and
typically provides the following:
- Control Interface: Where the system can be armed or disarmed.
- Power Supply: Powers all components of the system, sometimes
with battery backup.
- Monitoring Hub: Acts as the primary point of connection for all
sensors, detectors, and devices in the home.
iv. Keypads
Keypads allow users to interact with the system by entering codes to
arm or disarm it. They can include features like:
- Touchscreen/Buttons: Traditional keypads use buttons, while newer
systems often feature touchscreens for easier navigation.
- Programmable Codes: Users can create unique passcodes for
different family members or service workers.
- Panic Button: Some keypads include an emergency panic button that
triggers the alarm immediately without entering a code.
9
Question 3
A. Control point of access control system
Introduction:
Main Body:
Conclusion:
Conclusion:
11
C. Control panel of access control system.
Introduction:
Main Body:
Control panels receive data from various readers and check credentials against a database of
authorized users. When credentials are verified, the control panel sends a signal to unlock
doors or gates. Key functionalities include:
Conclusion:
The control panel is essential for managing security in access control
systems, efficiently processing authentication requests and integrating
with other security measures to maintain a safe environment.
12
Question 4
A.Introduction To Monitor
The monitor is a display device that shows live footage or recordings
captured by the camera. It allows users to view monitored areas in
real-time or review recorded footage. Monitors come in various sizes
and resolutions and can be either analog or digital, depending on the
system used.
Conclusions
The monitor is a display device that allows users to view live or
recorded video footage. It can be either analog or digital, depending
on the CCTV system used, and can display footage from multiple
cameras simultaneously.
13
B. Introduction To Camera
The camera is the primary component responsible for capturing video
footage in a CCTV system. There are various types of cameras,
including analog, IP (Internet Protocol), dome, bullet, and PTZ
(Pan-Tilt-Zoom), which are tailored to different surveillance needs.
Cameras often come equipped with additional features like night
vision and motion detection to enhance their capabilities.
14
C. Introduction To Coaxial Cable
Coaxial cable is the main transmission medium in analog systems,
connecting the camera to the recording device (DVR) or monitor. It
ensures high-quality video signal transmission without interference,
even over long distances.
Conclusions
Coaxial cable is used in analog CCTV systems to transmit video
signals from the camera to the recording device or monitor. It ensures
high-quality video transmission even over long distances, but it is
often replaced by network cables in modern systems.
15
D.Introduction To Digital Video Recorder (DVR)
The DVR is a device that converts analog video signals into digital
format, compresses the recordings, and stores them on a hard drive.
Additionally, the DVR allows for playback, remote access, and
backup features. In more advanced systems, the DVR is replaced by a
Network Video Recorder (NVR), which is used in IP-based CCTV
systems to record video from digital cameras.
16