LSNs - local security networks

February 2005 Information Security

Conceptually, a local security network (or LSN) offers the foundation for a security architecture, with flexiblity being the operative word. LSNs can be applied to a wide variety of fire and intrusion detectors, and can be complemented by a vast range of peripheral equipment. Security with LSNs is simply more reliable and more cost-effective.

Bosch Security Systems lie at the heart of the LSN. They cover a wide variety of detectors and also permit combinations of fire and intrusion alarm systems. Existing components can be incorporated into a LSN, as well as existing peripheral equipment from other manufacturers. The LSN offers you the latest generation of detectors with active self-monitoring features.

Conventional detectors, indicator panels or fixed extinguisher systems can be connected to the systems using coupling interfaces elements. Equipment for monitored control and feedback such as smoke hatches, automatic door controls and sounders/strobes can also be incorporated into the system.

Flexible network topology

With an LSN you can set up your network exactly as you need it; in loop form, tee offs, or a combination of the two. This is made possible by a bi-directional digital transmission procedure, which allows constant a data dialogue between the sensor and the control panel. A single double-wire primary line transfers information from the control panel to the LSN elements and back while supplying power to the detectors.

High security, low outlay

LSN offers cost-effective security:

* Minimal assembly required.

* Expanding the network does not require expensive cabling adjustments.

* The cost of calling the police, fire brigade and security companies is reduced by precise and clear alarm and fault reports.

* Faulty detectors can be precisely located and easily replaced.

Each individual sensor is initialised, controlled and identified from the control panel. If necessary, the sensor can also be disconnected from the LSN. All status changes at the sensor can be identified from the control panel. Uniform transmission technology is used throughout the network, which means that it is suitable for any type detector. For you this means low-cost installation of the cable network, fast start-up and simple maintenance of the LSN elements.

The SIC 200 LSN chip

In developing the SIC 200 LSN, Bosch has produced a chip that is revolutionising intrusion alarm technology. By reducing the number of components from 40 to three and cut the space requirement to a fifth, LSN bus technology can now be integrated into even the smallest detector.

The LSN is used not only by Bosch, but also by many other manufacturers, and has become the standard in Germany. LSN is also growing quickly throughout other European countries. Today, customers can choose from a range of over 70 fire, intrusion and malfunction detectors, control units and arming equipment that use LSN technology.

* Supports of all types of detectors (fire, intrusion, malfunction, etc).

* Automatic isolation of line malfunctions.

* Transmits detector information.

For more information contact Shane Nefdt, Bosch Security Systems, 011 651 9699, [email protected], www.boschsecuritysystems.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
There is a SaaS for everything, but at what cost, especially to SMEs?
Editor's Choice Information Security Security Services & Risk Management
Relying on SaaS platforms presents significant cybersecurity risks as the number of providers in your landscape increases, expanding your attack surface. It is important to assess the strength of the SaaS providers in your chain.

Read more...
Addressing today’s mining challenges: cyber risks beyond IT
Editor's Choice Information Security Mining (Industry)
Despite the mining industry’s operational technology systems being vulnerable to cyberattacks, many decision-makers still see these threats as purely an IT issue, even though a breach could potentially disrupt mining operations.

Read more...
Get proactive with cybersecurity
Information Security
The ability to respond effectively to a cybersecurity breach is critical, but the missing piece of the puzzle is a thorough, proactive evaluation to ascertain weaknesses and identify any hidden threats.

Read more...
How to effectively share household devices
Smart Home Automation Information Security
Sharing electronic devices within a household is unavoidable. South African teens spend over eight hours per day online, making device sharing among family members commonplace. Fortunately, there are methods to guarantee safe usage for everyone.

Read more...
How to securely manage your digital footprint
Information Security Training & Education
Managing your online presence is critical to safeguarding your privacy and security. It is imperative to take a proactive approach, including using robust cybersecurity best practices.

Read more...
The state of code security in 2024
Information Security
The 2024 State of Code Security survey reveals that organisations have continued to shore up application security defences over the last year, according to OpenText Premier Partner iOCO Application Management.

Read more...
What is the level of safety and integrity of the software supply chain?
Information Security IoT & Automation
Organisations are embracing AppSec practices and focusing on their software security posture. However, they highlight that insufficient funding and security resources, plus a disconnect between developers and security teams, remain major roadblocks.

Read more...
Cybercriminals target financial service providers to get at sensitive client data
Information Security
According to Ryan van de Coolwijk, Product Head for cyber at iTOO Special Risks, hackers target financial service providers because they hold sensitive client information that unauthorised individuals could use for fraudulent activities.

Read more...
Fortinet establishes new point-of-presence in South Africa
News & Events Information Security
Fortinet has announced the launch of a new dedicated point-of-presence (POP) in Isando, Johannesburg, to expand the reach and availability of Fortinet Unified SASE for customers across South Africa and southern African countries.

Read more...