Wireless-based fire and security has been around for some years and like many technologies, there were some issues at the very early stages of development and deployment.
As stability of wireless technology increases, more customers are attracted to this alternative to hardwired security technology. While there will always be a place for hardwired technology, underlined by wireless technology’s unsuitability in certain geographic environments, wireless will continue to grow in popularity.
According to Ingo Mutinelli, sales director at Elvey, the company has seen an increase in the uptake of wireless security technology sales to both installers and end users over the past two years, with a larger acceleration experienced in the past 12 months. He believes that this is mainly due to the increased features and stability apparent in products.
While he acknowledges the growing popularity of wireless technology, he says that the market is still dominated by hardwired technology, with wireless capturing approximately 20 to 30% of market share.
Brian Wynberger, national technical manager at Reditron, believes that the reliability of wireless products over the past 18 months, their cost effectiveness due to the elimination of cables, the reduction in theft (no copper cables), increased security due to superior encryption techniques, and the fact that they can be used cost effectively over long distances, have resulted in wireless technology gaining serious ground.
He is of the opinion, however, that wireless products are still not as reliable as their hardwired counterparts as they are prone to interference from weather conditions. Nevertheless, he says that they can be placed in a mesh grid variety of links to increase stability and flexibility.
Mutinelli points out that the perception in the market is that a wired solution, with a definite cable link between control panel and detector device, is more reliable than its wireless counterpart. However, he adds, this is set to change, as wireless technology is enhanced through anti-jamming features and spread spectrum technology. He says that most high-end brands now offer two-way communication between the control panel and the detector/device, which allows the product to talk to the control panel on the state and effectivity of its operation.
Intrusion detection uses the 433, 403 and 868 MHz bandwidths, which are still fairly limited and largely influenced by high traffic volumes, due to their use in for instance TV remote controllers and wireless telephones. Coupled with this, other wireless technologies, such as police radios and handheld two-way radios, will affect the efficiency and efficacy of these bandwidths.
Mutinelli adds that wireless is not suited to every environment, since the topography plays a large role in enabling or disabling line of sight communication. This one element plays a critical role in the success of a wireless installation.
A major concern in the past with wireless products was the aggravation of batteries running flat during operation. Mutinelli says that Lithium batteries alleviate this concern with their longer lifespan of up to between three and five years. He explains that many of the wireless products have a feature that allows two-way communication with the control panel that includes alerts on the state of the battery in terms of its health and remaining life. This allows users to exchange batteries before they reach a critically low charge state.
Wynberger says that some projects are now using solar energy as an alternative to batteries. This virtually free form of energy is more reliable than DC power and its popularity is evident by the building of an R80-million photovoltaic solar module factory in Cape Town by a Chinese company.
Wireless jamming remains a pressing concern for users of wireless technology but Mutinelli claims that this can be made more difficult by using spread spectrum transmission and frequency hopping. Additionally, some products have a panel with an anti-jamming feature that places the device into a tamper condition and alerts the user.
Wynberger adds that by implementing the correct decryption techniques and putting strong passwords in place, the likelihood of a system being hacked and jammed are greatly minimised. Both interviewees caution that users need to be aware that there are devices on the market that make anti-jamming a real challenge.
Wynberger says that alarms, perimeter security, intrusion detection and CCTV are all suited to wireless technology, since any product with a link to an Ethernet network can feasibly operate as a wireless device. He stresses that users need to calculate the throughput correctly for surveillance systems, with 150 Mbps being the commonly accepted volume of devices. In instances where the required throughput is larger, the bandwidth can be split over multiple access points.
He says that while there is definitely a place for wireless technology, his advice to companies considering an installation is that only if there is no other option, then select wireless. He continues that the success of a wireless system will depend on what you wish to gain from it in terms of the data throughput required and the size of the installation (distance of links). Antennas play a large role in the operability of the installation and are particularly important where multiple links occur. Users need to remember that links are dynamic and will be slowed down when other third-party users choose to use them.
He adds that training of installation teams is important and it is advisable to use the services of a company that has previous, documented experience in wireless installations.
Hardwired solutions will continue to dominate the market but there are definitely instances where wireless can play a role. A number of companies are employing hybrid systems which incorporate the best of both technologies and offer system redundancy by using wireless in conjunction with hardwired in the event of copper cable theft.
Tel: | +27 11 543 5800 |
Email: | [email protected] |
www: | www.technews.co.za |
Articles: | More information and articles about Technews Publishing |
© Technews Publishing (Pty) Ltd. | All Rights Reserved.