Control panels in security systems
The security system control panel is a device that determines the state of the sensors and generates the appropriate information and control signals, depending on the system.
Types of control panels for the security system
The operating modes of the security system devices can be controlled in one of the following ways:
- Using the buttons on the front panel of the device.
- From an automated workstation (AWP) via a communication interface or applications for a mobile phone or PC.
The second option is used for medium and large security systems, as well as in integrated systems. Arming and disarming of some control panels can be carried out using keypads, access cards to them and control fobs.
There are also two main types of object protection:
- Alarm system with connection to the security company’s monitoring panel.
- Autonomous system.
On the control panel of the security system, software is installed, with the help of which the device controls the operation of the entire system, configures and manages its operation. Also, its functions include remote monitoring of the health and status of all connected devices.
Installation of alarm control panels
The degree of security of the premises under protection depends on the correct installation of security system devices. Before starting the installation, it is necessary to develop a plan for placing all devices, determine the configuration, calculate the required number of sensors, sirens and other devices, as well as the optimal places for their placement.
It is important to avoid the influence of external factors (thermal and ultraviolet radiation, as well as all kinds of mechanical stresses) on the security system devices.
The installation engineer of the security company will take into account all these points, as well as the sensitivity of the system sensors, their response speed and coverage area. It must be remembered that only a professional can choose the necessary equipment for protecting the premises and correctly install it.
Security control panels from Ajax
The central (hub) of the Ajax security system is a key element for the operation of all devices. The control panel receives alarm signals from sensors and instantly informs alarm users and the security company about the alarm. Each control panel in the Ajax line of devices allows you to use up to four communication channels (depending on the model), which provide stable communication, even when the light is turned off or jammed.
Ajax security system centrals are equipped with third-party batteries that provide up to 60 hours of operation without mains power or have a built-in backup battery. The autonomy of the control panel can also be extended by weeks, months or years by connecting an additional battery and installing a low-voltage power supply.
The hub is managed, and the system is set up in Ajax applications for mobile phones and PCs. The user can also configure up to 64 automation scenarios. Scenarios allow you to reduce the execution of routine actions to a minimum, change security modes according to a schedule, and independently resist threats.
The control panel housings are protected by tampers, which report a threat if the device is damaged or dismantled.
Ajax control panels, depending on the model, support the connection of both wired and wireless Ajax devices.
Control panel with support for wired and wireless Ajax devices
Hub Hybrid is a hybrid central security system with support for photo verification of alarms. Thanks to Fibra technology, the control panel communicates with security devices at a distance of up to 2 km and is compatible with all types of devices. A system of 30 devices can operate for 60 hours on a backup battery. The control panel is protected from sabotage, supports photo confirmation of alarms, and is configured remotely in the application. Everything that is possible with Ajax wireless control panels is now available with wires.
More about Fibra technology
Control panels supporting Ajax wireless devices
Ajax control panels with wireless connection support use the Jeweller protocol for operation, which encrypts transmitted data, which prevents sabotage and forgery of the device. The range of wireless communication is up to 2 km, in the absence of obstacles.
More about the Jeweller Protocol
Ajax’s range of wireless control and receiving devices includes the following devices:
- Hub 2 Plus Jeweller is a security system central with support for photo-verification of alarms and communication via Ethernet, Wi-Fi, it is possible to connect two SIM cards (2G/3G/4G).
- Hub 2 Jeweller is a security system central with support for photo verification of alarms. Supports communication with devices via Ethernet and connection of two SIM cards.
- Hub Plus Jeweller — the security system central panel with four communication channels.
- Hub Jeweller is a security system central with support for Ethernet and one SIM card (2G).
Each control panel of this line supports the connection of video recorders and signal repeaters.
Features of Ajax control panels
Ajax security control panels have the following features:
Stable connection, notification of alarms and transfer of photos provides one of the available communication channels. Depending on the model, the central system can have up to 4 channels: Wi-Fi, Ethernet and two SIM cards with the LTE support. Available communication channels operate in parallel and can replace each other in emergency situations.
Thanks to the Jeweler and Wings protocols, when jamming or interference is attempted, the system changes the radio frequency and informs users and the security company about the incident. The control panels use the Fibra protocol to control communication with the system’s wired devices.
Ajax alarm control panels regularly receive new features thanks to software updates. Thus, the security system evolves, it becomes possible to support new devices. Updates are free and occur automatically when the system is not armed.
Protected operating system
Ajax security system centrals operate on their own real-time operating system OS Malevich. The software is resistant to viruses and cyberattacks.