Professional Documents
Culture Documents
com/home-security-faq/how-do-security-systems-work
those at ground level. Open spaces inside of homes can be secured with
motion sensors.
Control Panel: The control panel is the computer that arms and disarms the
security systems, communicates with each installed component, sounds the
alarm when a security zone is breached, and communicates with an alarm
monitoring company.
They typically feature a touchpad for easy programming and interaction, is
where pass codes are entered to arm and disarm the system, can work on
voice commands, and can be programmed to work with wireless remote
controls called key fobs.
Door and Window Sensors: Door and window sensors are comprised of
two parts installed adjacent to each other. One part of the device is installed
on the door or window and the other on the door frame or window sill. When
a door or window is closed, the two parts of the sensor are joined together,
creating a security circuit.
When the security system is armed at the control panel, these sensors
communicate with it by reporting that the point of entry is secure. Should a
monitored door or window suddenly be opened, the security circuit is broken
and the control panel interprets this as a breach of a secured zone. A highdecibel alarm is sounded and in most instances the alarm monitoring
company is automatically notified.
Motion Sensors: These security components, when armed, protect a given
space by creating an invisible zone that cannot be breached without
sounding an alarm. These are typically used to protect rooms containing
valuables, as well as areas less frequented in larger homes.
Surveillance Cameras: Available in both wired and wireless configurations,
surveillance cameras can be used in several different ways as part of an
overall security system.
Typical uses include monitoring:
Over existing home phone lines, which continue to work during power
outages when battery backup is in use.
Wirelessly through cellular radio frequencies like cell phones use, which also
continue to work during power outages when battery backup is in use.
Voice over Internet Protocol (VoIP), which typically doesn't work in a power
outage.
Via the Internet, which also typically does not work in a power outage.
In the event of an actual emergency, the monitoring company will notify the
appropriate emergency response personnel in your area. This includes police,
firefighters, and paramedics. The monitoring company will also try to
maintain communication with you until emergency response teams arrive at
your home.
Monitored systems typically allow for the homeowners (or designees) to be
notified by text message and email when a security breach occurs.
Non-monitored Security Systems: There are plenty of DIY security
systems available today that don't include professionally monitored services.
In the event of a home intrusion when this type of security system is
installed, a high-decibel alarm sounds (provided one is installed). Contacting
police, fire, or other emergency response personnel must be initiated by the
homeowner by dialing the appropriate number, typically 911.
These types of systems may or may not allow for text messages or email
notifications to be sent to the homeowner in the event of a security breach,
depending on the provider and the system you opted for.
as well as use a panic button to elicit an instant response from your alarm
monitoring company.
Finally, most home insurance companies provide great discounts-up to 20
percent-when you have a home security system in your home.
If you'd like to know more about getting a security system in your home,
please contact any of our specially trained home security experts at 1-888330-8214. They'll be able to answer all of your questions, help you decide
which security companies and options will fit your particular needs, and help
you finalize your order.
********.
http://www.projectsof8051.com/home-security-system/
Project Photographs:
Description:
Home security system project consist of three basic modules. First is IR transmitter and receiver module which
works for the safety of doors at night or in case we are out of home. When the IR sensors are interrupted, a buzzer if
turned on indicating someone is entered into house. Second module is LPG gas sensor. It is provided to detect the
LPG Gas leakage. A buzzer is turned on when Gas is detected by the sensor. Third part of project serves the
functionality of a door-latch opening using a password entered through keypad. This module also turns on buzzer if
3 wrong passwords are entered consequently. Data from all modules is sent to a computer through serial port.
Block Diagram:
Description in detail:
It mainly consist of following blocks:
1. Infrared Transmitter: We are going to implement the theft detection module using 1 transmitter and 1 receiver. We
are going to use Infra-Red transmitters because infrared beams are not visible to human eyes. Transmitter used is IR
LEDs
2. Infrared Receiver: We are going to use an Infrared receiver. It is an active low device which means it gives low
output when it receives the Infrared rays.
3. LPG Gas sensor: We are going to use an LPG Gas sensor to detect the gas leakage.
4. Microcontroller: This is the CPU (central processing unit) of our project. We are going to use a microcontroller of
8051 family. The various functions of microcontroller are like:
I. Reading the digital input from infrared receiver II. Reading the LPG Gas sensor output to turn on the buzzer. III.
Sensing the password using keypad and to check whether it is a correct password or a wrong password and rotate the
stepper motor if the password entered is a correct password. IV. Sending the data to LCD and to the computer using
serial port.
5. LCD: We are going to use 162 alphanumeric Liquid Crystal Display (LCD) which means it can display
alphabets along with numbers on 2 lines each containing 16 characters.
6. PC Interfacing: We are going to use max 232 IC for pc interfacing, the values of number of persons inside the
room and the status of entered password (Correct/wrong) will be sent to pc.
7. Keypad: User will enter the password using the keypad. Various keys of keypad are as following, I. 0 to 9 II.
Enter III. Escape
8. EEPROM: External E2PROM memory is used to store the password. I2C bus protocol is used for communication
of EEPROM with 8051.
Future Development:
1. We can send this data to a remote location using mobile or internet
2. We can implement other related modules like fire sensor, wind sensor.
3. We can add the module of voice alarm system to indicate theft entry or gas leakage.