3
3.0—Home Security and
Surveillance Systems
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
128 Chapter 3
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Design Considerations
The design of a security and surveillance system should provide for the pro-
tection of the entire perimeter of a home as well as visual- and audio-based
surveillance monitoring. Security system sensors are available that are
designed to detect sound, window and door intrusion, air movement, body
heat, motion, and other conditions that indicate an intruder is present. A
good security system design should consider the best plan for existing homes
as well as new construction. It should also consider the lifestyle of all the
inhabitants, the location of valuables or any items to be protected, how the
system is to be controlled, adequate smoke and fire alerting sensors, and the
type of emergency response required. The design choices are numerous and
varied due to advances in home security technology and the wide availabili-
ty of compact, low-cost video surveillance systems.
. . . . . . . . . . . . . . . . . . . . . . . 3.0—Home
. . . . . . .Security
. . . . and
. . .Surveillance
. . . . . . Systems
129
. . . . .
130 Chapter 3
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
detectors, smoke and fire sensors, cameras, camera switchers, video displays,
and sirens. The advantages for a hard-wired security system are
➤ Hard-wired security systems are considered by most contractors to be
more reliable than wireless systems.
➤ Hard-wired systems are usually installed by a professional security sys-
tem contractor with warranties and maintenance support.
➤ Hard-wired systems avoid the problem of EMI and radio range limita-
tions inherent in some wireless security systems.
➤ The hard-wired components are usually less visible and more aestheti-
cally pleasing than wireless components.
➤ Hard-wired systems do not depend on batteries except for power failure
backup protection.
➤ Hard-wired systems are usually leased from the company that installs
the system. Unlike a wireless system, the hard-wired system remains an
integral part of the home. The components are not capable of being
moved to another home when the owner relocates.
➤ Problems can arise in the installation of sensors in existing homes where
some areas are not accessible for pulling wires inside the walls.
. . . . . . . . . . . . . . . . . . . . . . . 3.0—Home
. . . . . . .Security
. . . . and
. . .Surveillance
. . . . . . Systems
131
. . . . .
➤ Reporting on the date and time of any alarm conditions that existed
➤ Monitoring loud noises that exceed a set time interval using a built-in
microphone in the home security system
➤ Reporting the status of smoke alarms or heat sensors
132 Chapter 3
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Modern home design should include at least one of each type. Smoke and
heat detectors should be located in each sleeping area and on each story of
the home and placed on the ceiling or on the wall 6''–12'' from the ceiling.
Remember that heat and smoke detectors operate on different types of technology.
Heat detectors react to abrupt changes and go into an alarm condition when a tem-
perature changes rapidly or reaches a fixed value. Smoke alarms do not react to heat
but go into an alarm condition when smoke enters the sensor area. The two main
types of smoke detectors are ionization and photoelectric.
Environmental Monitoring
Environmental monitoring can be incorporated into the design of a home
security and surveillance system to monitor the status of specific conditions.
This might be applicable to rural homes, vineyard owners, farmers, fruit
growers, and ranchers. Environment monitoring includes the tracking and
measurement of external as well as internal parameters. The following are
examples of the types of environmental data that can be monitored with
existing sensor systems:
➤ Inside and outside temperatures
➤ Barometric pressure
➤ Frost alarm
➤ Humidity
. . . . . . . . . . . . . . . . . . . . . . . 3.0—Home
. . . . . . .Security
. . . . and
. . .Surveillance
. . . . . . Systems
133
. . . . .
Temperature Sensors
Temperature sensors are used as one component of an environmental moni-
toring and security system mentioned earlier. They are normally used to
monitor high and low temperature values in vacation homes, water pipes, fur-
nace and heating vents, outside farm buildings, computer equipment, utility
rooms, or areas that might sustain damage with extreme temperature swings.
Temperature sensors are often integrated with a central controller that includes
a display, a keypad, and an automatic telephone dialer that can alert the home-
owner or monitoring center when temperature limits are exceeded. Temperature
sensors use a variety of electronic designs and components to measure tempera-
ture, including both analog and digital signal outputs that change value with a
change in temperature and operate remote switches or active alarms.
134 Chapter 3
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
opportunity to install structured wiring outlets in all rooms of the home. This
includes 120v AC power outlets, Category 5 UTP cable outlets, #22-gauge
two-pair wiring for sensors, and RG-6 coaxial cable outlets.
. . . . . . . . . . . . . . . . . . . . . . . 3.0—Home
. . . . . . .Security
. . . . and
. . .Surveillance
. . . . . . Systems
135
. . . . .
136 Chapter 3
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . 3.0—Home
. . . . . . .Security
. . . . and
. . .Surveillance
. . . . . . Systems
137
. . . . .
Each sensor receives power and is managed from the control panel. It mon-
itors the health and operating status of the total system and sends a signal to
the siren when an alarm condition exists. The panel should be mounted in a
location that is out of plain view and near a 120v AC outlet where a plug-in
transformer can be used to supply low-voltage power to the total system. If
a phone line is planned for connection to an external monitoring facility,
access to the location where the phone line enters the home must be consid-
ered when locating the control panel. Preferred locations are utility rooms,
basements, and closets.
138 Chapter 3
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Physical Devices
The six major physical components of a home security and surveillance sys-
tem are described in this section. Although some designs include additional
components for enhanced performance or custom installations, the physical
devices described here are considered the basic building blocks for a securi-
ty and surveillance system that will provide adequate protection from intru-
sion. The essential physical assemblies include
➤ Keypads ➤ Cameras
➤ Sensors ➤ Monitors
Keypads
The keypad is the device used by the home residents to initiate commands
for control options and observe the status of the security system. As shown
in Figure 3.3, it usually contains an alphanumeric keypad and LED displays
that indicate the status of the alarm system.
The keypad is used to arm and disarm the system and often includes a panic
switch by which the alarm can be triggered instantly in an emergency situa-
tion. The alarm can be silenced by the owner by entering the correct coded
sequence of numbers on the numerical keypad. The keypad is typically
installed inside the home near a door that is most frequently used by the res-
idents. A programmed delay is included as a feature of most systems to
enable the users to enter and disarm the system within a fixed delay period
(normally 30–45 seconds). The same fixed delay is also used to allow the user
to arm the system and exit the home within the fixed delay period. Keypads
can also be used to bypass certain areas.
The bypass function is used to arm the system but disable selected zones or motion
detectors inside the home when the family is present. Residents often desire to secure
the perimeter area of doors and windows after retiring for the evening but need to
bypass interior area motion detection sensors that are activated only when the home
is not occupied.
04 9377 chapter 3 11/21/03 11:29 AM Page 139
. . . . . . . . . . . . . . . . . . . . . . . 3.0—Home
. . . . . . .Security
. . . . and
. . .Surveillance
. . . . . . Systems
139
. . . . .
Sensors
Sensors are designed to protect both the perimeter and the open spaces
inside the home. As mentioned earlier, perimeter devices primarily protect
doors and windows. The most common perimeter sensors are magnetic door
switches, window vibration detectors, and window acoustical detectors.
Space protection sensors called motion detectors cover interior rooms and
hallways and can detect an intruder who has been able to defeat a perimeter
device. Exterior motion detectors and motion-activated security lights are
also used. The following paragraphs describe the types of sensors required in
basic home security and surveillance systems.
Door Switches
Door switches work on a basic principle of a two-part magnetic switch. A
switch that is sensitive to a magnetic field is mounted on the fixed structure
(frame), and wires from the switch are routed through the wall to the control
panel. A magnet is mounted on the door in a position where it is in close
proximity to the switch when the door is closed; this also keeps the switch
closed. Opening the door moves the magnet away from the switch and caus-
es the switch to “open,” which is sensed by the central control panel and acti-
vates an alarm. Magnetic switches are available as normally open (NO) or
normally closed (NC) to accommodate different wiring designs and con-
troller options.
Security system magnetic switches are designed for both normally closed (NC) and
normally open (NO) options. An NC switch opens when the magnet is moved near
the switch, and an NO switch closes when the magnet is moved in close proximity
to the switch. This enables magnetic sensor-type switches to be used with various
types of security system designs. Sensor door switches wired in parallel use NO con-
tacts so that any closure of the contacts in the circuit activate an alarm condition.
Series circuits use NC magnetic switches where any opening of a switch results in
an open condition for the circuit, which triggers an alarm condition by the controller.
04 9377 chapter 3 11/21/03 11:29 AM Page 140
140 Chapter 3
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Motion Detectors
Motion detectors work by detecting the changes in the infrared energy in
an area. Because these devices do not emit any energy, they are called
passive infrared (PIR) detectors. PIR detectors use a lens mechanism in the
sensor housing to detect a change in infrared energy across the horizontal
sectors covered by the sensor. This type of detector is insensitive to sta-
tionary objects but reacts to rapid changes that occur laterally across the
field of view. They are the most common and economical type of motion
detectors and are available in standard, pet-friendly, and harsh-environment
(outdoor) models. An example of a motion detector for interior use is
shown in Figure 3.4.
Security Panels
Security panels provide several functions to coordinate the operation and
management of a security system. They can include an integrated keypad or
LED indicators. Most designs include a power transformer for converting
the AC voltage to a DC voltage for the sensor loop and contain a recharge-
able battery for backup if the commercial power fails. A terminal strip pro-
vides for the connection of the wiring that connects all the sensors to the
controller as well as the external telephone line. Most designs include a
printed circuit board containing all the electronics and a microprocessor. It
also connects to and controls the siren that is activated when an alarm con-
dition exists.
Security panels are known by numerous names, such as central control box, control panel,
alarm panel, and interface panel. They all perform similar functions including controlling and
monitoring sensor status, providing power to the system, connecting the telephone line to the
monitoring station, and handling the programmable options for the system.
04 9377 chapter 3 11/21/03 11:29 AM Page 141
. . . . . . . . . . . . . . . . . . . . . . . 3.0—Home
. . . . . . .Security
. . . . and
. . .Surveillance
. . . . . . Systems
141
. . . . .
Cameras
Surveillance systems for the home use video cameras that convert the image
into a video composite or S-video signal for display on a video monitor. The
best type of camera for home systems uses charged coupled device (CCD)
technology. These cameras have high resolutions, low operating light, less
temperature dependence, and high reliability. A typical CCD camera used in
video surveillance systems is illustrated in Figure 3.5.
Monitors
Monitors are cathode-ray tube display systems similar to computer display
systems. They are used to display video information processed by the cam-
era. Coaxial cable is used to connect the camera to the monitor that can be
located in any area selected by the user. Monitors do not have a TV tuner
and usually have better video resolution than standard television receivers.
They can also be connected to programmable switchers that receive input
from several cameras and show multiple images on a single monitor.
Closed circuit TV (CCTV) monitors are available for black-and-white or
color display depending on the resolution and camera selection. Black-and-
white monitors have resolutions in the range of 700–1000 lines, whereas
color monitors are available with 350–400 lines. CCTV monitors are
designed for extended 24-hour-per-day operation.
04 9377 chapter 3 11/21/03 11:29 AM Page 142
142 Chapter 3
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Video surveillance systems for both home and commercial business use are referred
to as closed circuit TV (CCTV) systems. The name is derived from the type of the sys-
tem used for transmission over a closed circuit or private transmission circuit rather
than a standard television broadcast system. CCTV is also used in a wide variety of
applications for schools, business video conferencing, retail store surveillance, and
gambling casinos.
Switchers
Switchers are devices used with multiple camera systems. Although primari-
ly used in commercial building security and surveillance systems, they can be
scaled to fit the needs of a home security system. They enable several cam-
eras to be used with a single monitor. The switcher can be programmed to
cycle through all the cameras in a surveillance system or dwell on each cam-
era for a specified length of time, usually in the range of 1–60 seconds.
Exterior sensors can detect movement and cause cameras to start recording
the image on a VCR.
Quads are special devices that enable the viewer to simultaneously record
and monitor four cameras. It does this by splitting your screen into four sec-
tions. The normal configuration for connecting a quad switcher with a sen-
sor and a VCR is shown in Figure 3.6, which illustrates the connections
between a quad, a monitor, and four surveillance cameras. The monitor can
view all four images at the same time.
VCR
. . . . . . . . . . . . . . . . . . . . . . . 3.0—Home
. . . . . . .Security
. . . . and
. . .Surveillance
. . . . . . Systems
143
. . . . .
Zone Layout
Home security and surveillance systems are usually designed with certain
areas of the home designated as zones. A zone can include interior motion
detectors or certain rooms or hallways. The use of zones has several purpos-
es. It enables the user to arm only portions of the system, such as the perime-
ter doors and windows, while bypassing the interior motion detectors when
retiring for the night. When leaving the home, all zones, including the inte-
rior, can be armed as required.
A zoned security system layout is also used by the external monitoring serv-
ice to know which sensor in a designated zone is causing the alarm.
If a sensor were to be reported as just sensor 3 zone 5, this could mean just
about anywhere at first. But if the sensor were reported as sensor 3 zone 5
perimeter, this would give the operator a better understanding that the vio-
lated area is on the outside of the premises. Another reason for using a zoned
security system layout is the ease of troubleshooting if a sensor is reported as
a bad sensor. For example, if a bad sensor is reported as being in zone 3
perimeter, there is no need to troubleshoot sensors that are located in the
interior of the system.
Passwords
Passwords are used as a confirmation tool by most professional alarm moni-
toring service companies. They are used to avoid a police response when a false
alarm situation has been triggered accidentally while still ensuring that
the homeowner is safe. The passwords are known only by the residents and the
monitoring station personnel. When an alarm condition is received from
the home at the monitoring center, the person on duty calls for a police
response to the home. However, this occurs only if the alarm is not reset in a
predefined length of time. If the alarm is reset at the keypad with the correct
code by the owner prior to the time limit, the monitoring station simply calls
the subscriber and asks for a password. The password response has two agreed
upon formats: One password is used by the homeowner to indicate the alarm
condition was accidental and no action need be taken by the monitoring station.
04 9377 chapter 3 11/21/03 11:29 AM Page 144
144 Chapter 3
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Another secret password is used if the owner is in peril or possibly held hostage
by a burglar. This password, when passed after an alarm condition has been
reset, results in a police response. This is the option used if the homeowner is
asked to respond to the monitoring station phone call by an intruder who
(hopefully) does not know the distinction between the two passwords.
Passwords are used only if the monitoring station needs to authenticate the
cause of an alarm condition when the residents are at home. Law enforcement
agencies can penalize homeowners for excessive false alarms.
Common sense should guide the selection of a security system password used with a
monitoring service. Never use family or pet names, birth dates, street names, or any
word found in the dictionary. The preferred password should include both letters and
numbers, and a password should be memorized and never be written down. Numeric
keypad codes should also avoid the use of birth dates or home address numbers.
Keypad Locations
Keypads are located by most contractors on the inside wall near the door most
often used by the occupants. They are also frequently located in the bedroom
to provide easy access by the users when retiring or arising. Keypads used for
home security perimeter protection are not recommended for outside mount-
ing because this would allow tampering, vandalism, or attempts by an intrud-
er to search for a correct code. Some exceptions to this rule are applications
such as exterior security gates and gated community entrances.
Sensor Locations
Sensors perform all the functions required for detecting and reporting an intru-
sion in the area they are designed to protect. Window and door sensors are
installed on the door or window frame. Window sensors can be protected by
either a magnetic switch that detects an opening of the window frame or other
types mounted on the window to detect the sound or vibration of broken glass.
Interior surveillance cameras and motion detectors are usually wall mounted
and are used to protect open areas where an intruder might be able to defeat
the perimeter security system sensors.
Exterior surveillance cameras and security lighting systems should be locat-
ed in areas near the front, side, and rear entrances to detect intruders before
they reach the perimeter security sensors.
. . . . . . . . . . . . . . . . . . . . . . . 3.0—Home
. . . . . . .Security
. . . . and
. . .Surveillance
. . . . . . Systems
145
. . . . .
Sensor
146 Chapter 3
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Camera Locations
Surveillance cameras can be mounted outside the home to provide recogni-
tion of someone wishing to enter the security perimeter area, such as a front
door or driveway gate. They should be located where no blind spots exist or
where it is not practical to use other types of sensors. Cameras can be mount-
ed on any surface area of the home or garage where coverage is required as
long as the area is illuminated sufficiently at all times after dark. They are
often used in the interior of the home to monitor a child’s playroom or nurs-
ery. Although not usually a problem in a residential application, certain legal
implications are involved in using video surveillance cameras. They are not
to be used where there is a reasonable expectation of privacy by individuals
who are not aware that they are in a location where a camera is installed. This
obviously does not apply to a person breaking into a business or home.
Exterior security lighting should be used near landscaped areas around the home,
such as shrubs, bushes, foliage, and trees. Security lighting systems used during
dark hours avoid the problem of allowing an intruder to enter the area surrounding
a home and attempt entry while unobserved in a dark area.
04 9377 chapter 3 11/21/03 11:29 AM Page 147
. . . . . . . . . . . . . . . . . . . . . . . 3.0—Home
. . . . . . .Security
. . . . and
. . .Surveillance
. . . . . . Systems
147
. . . . .
Device Connectivity
Connecting all components of a security system requires compliance with
national and local building and fire codes. Each internal and external inter-
face involves selecting and identifying the correct type of wire, coaxial cable,
and termination points.
Although almost any gauge wire can be used for connecting sensors to the main
control panel, #22-gauge is the smallest gauge wire that should be used for wiring
home security systems.
Telephone
The telephone line is used by a security system to automatically call a cen-
tral monitoring facility when an alarm condition exists. The alarm system
controller box must be connected to the phone line with an RJ-31x phone
jack. This connector takes priority when an alarm is triggered, disconnects
the home phones, and dials the number of the monitoring service. This pre-
vents a burglar from taking the phone off the hook to prevent the system
04 9377 chapter 3 11/21/03 11:29 AM Page 148
148 Chapter 3
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
from dialing out. The proper wiring connection for an RJ-31x connector is
described later in this chapter in the section “Installation Plans.”
Coaxial Cabling
Coaxial cable is used to transport video signals between video cameras and
monitors in home video surveillance systems. The quality of the video signal
is affected if poor-quality cable or the wrong type of cable is used. Structured
wiring standards recommend the use of RG-6 coaxial cable and F-type con-
nectors for connecting cameras and monitors.
Termination Points
The main termination points for a home security system are contained in the
control panel. All the sensors installed throughout the home are connected
with low-voltage wiring and routed through walls to the central controller
termination strip.
The telephone line also has a termination point where it enters the control
panel enclosure. An RJ-11 telephone jack is retrofitted with a RJ-31x jack.
The four telephone wires are then terminated on the controller main con-
nection bus with the other external cabling harness.
In-house Services
Several types of security and surveillance services are available to residential
users that have been previously used only in larger commercial business sys-
tems. Smaller, scaled-down types of home video surveillance and monitoring
systems provide an economical option for homeowners. Two types of sys-
tems that provide internal services to residential users are discussed in the
following paragraphs.
. . . . . . . . . . . . . . . . . . . . . . . 3.0—Home
. . . . . . .Security
. . . . and
. . .Surveillance
. . . . . . Systems
149
. . . . .
Alarm Types
Alarm sounders not only attract the attention of others outside the home, but
also create a sufficiently high level of sound to discourage an intruder.
Various types of sirens, horns, buzzers, klaxons, and bells are used to attract
attention when an alarm condition is activated. Different types have varying
levels of volume for various locations. Older alarm systems used bells typi-
cally mounted on an outside wall. Today bells are rarely used except in com-
mercial buildings for fire alarms. They have been replaced in home security
systems by solid-state electronic sirens, such as those shown in Figure 3.10.
These sirens provide a higher level of sound output as well as a variety of
tones and sound pitch.
Smoke Alarms
A smoke alarm is designed to alert the residents of a home that a fire is either
in progress or in the initial stage.
Smoke alarms have built-in sounders designed to awaken the occupants of a
home and alert them of the danger. Many areas now have building codes that
require all smoke alarms installed in the home to sound the alarm if any sin-
gle unit is activated. Most smoke alarms have a test button that checks the
sounder as well as verifies that the battery is operational.
External Services
External security and surveillance services are available from private compa-
nies which are connected by dial-up phone service to the home security sys-
tem. Another type of service is available for residents who want to check on
the status of the security system when they are away.
04 9377 chapter 3 11/21/03 11:29 AM Page 150
150 Chapter 3
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Remote Access
External access to the home security system by means of telephone lines is
called remote access.
Remote access can be designed into a system that permits the user to call
from a remote site and set system parameters or obtain voice-synthesized sta-
tus messages concerning any sensor that has detected a value outside pro-
grammed values such as heat, cold, water leakage, loud noises, alarm history,
or other custom features.
. . . . . . . . . . . . . . . . . . . . . . . 3.0—Home
. . . . . . .Security
. . . . and
. . .Surveillance
. . . . . . Systems
151
. . . . .
The local building codes are the final authority for determining construction and
installation requirements for wiring, smoke detector location, and connectivity.
➤ Passive sensors need only two wires, and active sensors require four wires.
➤ 22-gauge or larger wire should be used for connecting sensors to the con-
trol panel.
➤ When security wires are crossed with power wiring, they must cross over
at a 90° angle.
➤ Video surveillance systems require RG-59 or RG-6 coaxial cable with
95% copper braid.
➤ The ANSI/TIA/EIA 570A addendum for security cabling, points out that
the location of sensors and cabling devices must align with the require-
ments of the National Fire Protection Association, the National
Electrical Code, and the National Fire Alarm Code.
The ANSI/TIA/EIA 570A standard requires at least 12'' of separation between paral-
lel runs of security wire and AC power wiring. You should also remember that, when
security wire and cabling is crossed with AC power wires, the crossover must be at
a 90° angle.
04 9377 chapter 3 11/21/03 11:29 AM Page 152
152 Chapter 3
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Underwriters Laboratories
The Underwriters Laboratories (UL) is a nonprofit organization that has estab-
lished standards for all components of security systems and their installation. If
the product has the UL label, the device meets or exceeds UL’s requirements.
Installation Plans
Installation planning should follow the guidelines mentioned earlier in
ANSI/TIA/EIA-570A Amendment 1 and NEC articles 725 and 760.
Important requirements are summarized in this section for RJ-31x jacks,
motion detectors, and video surveillance systems.
Alarm Dialing
Network RJ-31x
Equipment
Service Jack
Provider’s
Facilities Computer
Unused
RJ-11 Jack
Telephone
Line
Telephone
Unused
Answering RJ-11 Jack
Network
Demarcation System
Telephone
Point
Fax Machine
Telephone
. . . . . . . . . . . . . . . . . . . . . . . 3.0—Home
. . . . . . .Security
. . . . and
. . .Surveillance
. . . . . . Systems
153
. . . . .
All alarm systems that use the telephone lines in a home to aromatically dial a cen-
tral monitoring station must have an RJ-31x jack installed. This enables the alarm
system to seize the phone line when an alarm condition exists.
154 Chapter 3
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Question 2
Which type of jack is required to be installed to allow the security system to
seize the line when an alarm condition exists?
❍ A. RJ-11x
❍ B. RJ-45
❍ C. RJ-12
❍ D. RJ-31x
Answer D is the correct answer. The RJ-31x jack is used to disconnect all the
phones in the home when an alarm condition is initiated. This enables the
alarm panel to have priority over all uses of the phone when it needs to call
the outside monitoring facility. Answers A and C are incorrect because both
types of RJ-11 jacks are used for standard telephone four-wire connections
and are not applicable to security system connections. Answer B is incorrect
because RJ-45 connectors are used for four-pair UTP cabling in local area
network networks and are not required for security system applications.
04 9377 chapter 3 11/21/03 11:29 AM Page 155
. . . . . . . . . . . . . . . . . . . . . . . 3.0—Home
. . . . . . .Security
. . . . and
. . .Surveillance
. . . . . . Systems
155
. . . . .
Question 3
Which TIA/EIA standard describes the requirements for residential security sys-
tem cabling?
❍ A. 568-A
❍ B. 568-B
❍ C. 570-A Addendum 1
❍ D. 570-A Addendum 3
Question 4
What is the term used to describe the amount of light required to obtain a rea-
sonable image with a surveillance video camera?
❍ A. Lux rating
❍ B. Candlepower rating
❍ C. Resolution
❍ D. Pixels
156 Chapter 3
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Question 5
How many wires are normally required for connecting a passive sensor to the
control panel?
❍ A. 1
❍ B. 4
❍ C. 2
❍ D. 3
Question 6
Which type of sensor is used for door installations?
❍ A. PIR
❍ B. Contact sensor
❍ C. Active
❍ D. Magnetic switch
Answer D is the correct answer. Magnetic switches are used for doors
because of their low cost and capability to be hidden.
Question 7
Which types of cable are used when installing video surveillance components?
❍ A. RG-6 and RG-58
❍ B. RG-8 and RG-59
❍ C. RG-59 and RG-6
❍ D. RG-59 and RG-58
Answer C is correct. RG-6 and RG-59 are both 75-ohm types of cable.
RG-6 is a higher grade used for low loss applications, whereas RG-59 is sat-
isfactory for short runs. RG-8 and RG-58 are rated at 50 ohms of impedance
04 9377 chapter 3 11/21/03 11:29 AM Page 157
. . . . . . . . . . . . . . . . . . . . . . . 3.0—Home
. . . . . . .Security
. . . . and
. . .Surveillance
. . . . . . Systems
157
. . . . .
Question 8
What is the minimum separation required between security wiring and AC
power wiring when they are installed in parallel wire runs?
❍ A. 18''
❍ B. 2 feet
❍ C. 6''
❍ D. 12''
Question 9
Which type of residential location is typically classified as a perimeter security
location when designing a security system? (Select two.)
❑ A. Windows
❑ B. Basements
❑ C. Driveways
❑ D. Doors
158 Chapter 3
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Question 10
Which of the following is true regarding the use and installation of smoke detec-
tors? (Select all that apply.)
❑ A. For all new residential construction, battery-powered smoke detectors
are acceptable for some locations.
❑ B. For all new home construction, fire alarm sensors must be powered by
the home AC power electrical wiring.
❑ C. For homes built prior to 1979, battery-powered smoke alarms are per-
missible.
❑ D. Smoke detectors must be installed near windows and doors to provide
alerts for escape routes in case of fire.
Answers B and C are correct. The NFPA rule 72 requires smoke detectors
for new residential construction to be powered by AC wiring as the primary
power source of power with battery power used only as a backup source in
case of a power failure. Answer C is correct because battery-powered smoke
detectors are permitted for homes built prior to 1979. Answer A is incorrect
because the NFPA rules make no allowance for smoke detectors powered by
batteries in specific locations in new residential construction. Answer D is
incorrect because smoke detectors are designed to alert the residents of a
potential fire condition. Smoke detectors are not designed to aid in locating
an escape route from the home in case of fire.
04 9377 chapter 3 11/21/03 11:29 AM Page 159
. . . . . . . . . . . . . . . . . . . . . . . 3.0—Home
. . . . . . .Security
. . . . and
. . .Surveillance
. . . . . . Systems
159
. . . . .