CLC TS 50131-9-2014 Alarm systems - Intrusion and hold-up systems - Part 9 Alarm verification - Methods and principles.pdf

上传人:sofeeling205 文档编号:629574 上传时间:2018-12-22 格式:PDF 页数:32 大小:1.53MB
下载 相关 举报
CLC TS 50131-9-2014 Alarm systems - Intrusion and hold-up systems - Part 9 Alarm verification - Methods and principles.pdf_第1页
第1页 / 共32页
CLC TS 50131-9-2014 Alarm systems - Intrusion and hold-up systems - Part 9 Alarm verification - Methods and principles.pdf_第2页
第2页 / 共32页
CLC TS 50131-9-2014 Alarm systems - Intrusion and hold-up systems - Part 9 Alarm verification - Methods and principles.pdf_第3页
第3页 / 共32页
CLC TS 50131-9-2014 Alarm systems - Intrusion and hold-up systems - Part 9 Alarm verification - Methods and principles.pdf_第4页
第4页 / 共32页
CLC TS 50131-9-2014 Alarm systems - Intrusion and hold-up systems - Part 9 Alarm verification - Methods and principles.pdf_第5页
第5页 / 共32页
点击查看更多>>
资源描述

1、BSI Standards PublicationAlarm systems Intrusion and hold-up systemsPart 9: Alarm verification Methods and principlesPD CLC/TS 50131-9:2014National forewordThis Published Document is the UK implementation of CLC/TS50131-9:2014.The UK participation in its preparation was entrusted by TechnicalCommitt

2、ee GW/1, Electronic security systems, to Subcommittee GW/1/2,Installed alarm systems.A list of organizations represented on this committee can be obtained onrequest to its secretary.This publication does not purport to include all the necessary provisions ofa contract. Users are responsible for its

3、correct application. The British Standards Institution 2014.Published by BSI Standards Limited 2014ISBN 978 0 580 71373 6ICS 13.320Compliance with a British Standard cannot confer immunity fromlegal obligations.This British Standard was published under the authority of theStandards Policy and Strate

4、gy Committee on 31 July 2014.Amendments/corrigenda issued since publicationDate Text affectedPUBLISHED DOCUMENTPD CLC/TS 50131-9:2014TECHNICAL SPECIFICATION SPCIFICATION TECHNIQUE TECHNISCHE SPEZIFIKATION CLC/TS 50131-9 June 2014 ICS 13.320 English Version Alarm systems - Intrusion and hold-up syste

5、ms - Part 9: Alarm verification - Methods and principles Systmes dalarme - Systmes dalarme contre lintrusion et les hold-up - Partie 9: Vrification dalarme - Mthodes et principes Alarmanlagen - Einbruch- und berfallmeldeanlagen - Teil 9: Alarmvorprfung - Verfahren und Grundstze This Technical Specif

6、ication was approved by CENELEC on 2014-04-11. CENELEC members are required to announce the existence of this TS in the same way as for an EN and to make the TS available promptly at national level in an appropriate form. It is permissible to keep conflicting national standards in force. CENELEC mem

7、bers are the national electrotechnical committees of Austria, Belgium, Bulgaria, Croatia, Cyprus, the Czech Republic, Denmark, Estonia, Finland, Former Yugoslav Republic of Macedonia, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, the Netherlands, No

8、rway, Poland, Portugal, Romania, Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and the United Kingdom. European Committee for Electrotechnical Standardization Comit Europen de Normalisation Electrotechnique Europisches Komitee fr Elektrotechnische Normung CEN-CENELEC Management Centre: Aven

9、ue Marnix 17, B-1000 Brussels 2014 CENELEC All rights of exploitation in any form and by any means reserved worldwide for CENELEC Members. Ref. No. CLC/TS 50131-9:2014 EPD CLC/TS 50131-9:2014CLC/TS 50131-9:2014 (E) - 2 - Contents page Foreword 4 Introduction . - 5 - 1 Scope . - 6 - 2 Normative refer

10、ences . - 6 - 3 Terms, definitions and abbreviations . - 6 - 3.1 Terms and definitions . - 6 - 3.2 Abbreviations . . - 9 - 4 Overview . . - 9 - 5 Parameter variation . . - 10 - 6 General recommendations for I to allow alarm verification to be tested before review and eventual incorporation into Euro

11、pean Standards; to recommend the additional product requirements necessary to provide the additionalfunctionality for an installed I it should also be noted that some aspects of alarm verification do not have a related standard(e.g. audible and visual methods and related equipment). Methods of reduc

12、ing unwanted alarms specific to entry and exit procedures will be detailed in a futurestandard. PD CLC/TS 50131-9:2014CLC/TS 50131-9:2014 (E) - 6 - 1 Scope This European Technical Specification is available for use where alarm verification methods areconsidered necessary. It provides recommendations

13、 for the addition and use of alarm verificationtechnology in Intrusion and Hold-up Alarm Systems (I sequentially verified alarm; automatic reinstatement; detector inhibited at automatic reinstatement (including, at grades 3 and 4, identification ofdetector). If the unverified alarm or sequentially v

14、erified alarm is generated by a tamper condition, this should beseparately identified, as required by EN 50131-1, for I sequentially verified alarm; automatic reinstatement; automatic reinstatement with detector inhibited. If the unverified or sequentially verified alarm is generated by a tamper con

15、dition, the tamper condition should be separately notified, as required by EN 50131-1:2006, Table 8, for I sequentially verified alarm; automatic reinstatement; detector inhibited at automatic reinstatement (including, at grades 3 and 4, identification of detector). NOTE 1 The recording of events is

16、 optional at grade 1 NOTE 2 The requirement of EN 50131-1:2006, Table 22, for an “intruder alarm” event is met by the “unverifiedalarm.” If an unverified alarm or sequentially verified alarm is generated by a tamper condition, this should beidentified accordingly, as required by EN 50131-1:2006, Tab

17、le 22. NOTE 3 For a sequentially verified I the number of events recorded could therefore exceed ten during asingle set period. PD CLC/TS 50131-9:2014CLC/TS 50131-9:2014 (E) - 12 - 6.6 Restore Reference EN 50131-1:2006, Table 6, the permitted access level to restore an unverified alarm shouldbe as s

18、pecified for “hold-up,” “intruder” or “tamper” as applicable. Restoration of an I cautions for the client with regard to response limitations imposed by the system design choicesmade; the location of each HUA device, which information should be available to the ARC (see 8.1.1). 6.8 Hold-up alarms Ve

19、rification of hold-up alarms should be applied only where considered necessary or is specified(EXAMPLE: by response authority) It is recommended that a telephone call-back procedure should be available for the ARC to follow ifthe results of any method of alarm verification are inconclusive. Where th

20、is method is used, onlycorrect use of an identity code or password should be acceptable to cancel response to a hold-upalarm. NOTE A single identification code / password may be shared by all users at the supervised premises. 7 Sequential verification of intruder alarms 7.1 General IAS set Alarm = v

21、erified alarmVerification timeAlarm = unverified alarmIAS unset IAS restoreNotificationto ARC:Events:SET UNVERIFIEDALARMVERIFIEDALARMUNSET RESTOREFigure 1 Time line of completed sequentially verified alarm sequence PD CLC/TS 50131-9:2014 CLC/TS 50131-9:2014 (E) - 13 - IAS setVerification timeAlarm =

22、unverified alarmNotificationto ARC:Events:SET UNVERIFIED ALARMREINSTATEMENTReady foradditionaleventsFigure 2 Time line of unverified alarm sequence 7.2 Recommendations for system requirements 7.2.1 General These recommendations are additional to the requirements of EN 50131-1. The following recommen

23、dations are applicable to all IAS using sequential alarm verification, at allsecurity grades (except where stated). 7.2.2 Types of alarm An alarm should be designated as sequentially verified when a minimum of two of the conditionsidentified in Table 1 are present in any combination. Table 1 Types o

24、f alarm permitted to contribute to a sequentially verified intruder alarm Type of alarm Notes a Intruder Meeting the recommendations of 7.3.2 b Intruder during entry time (detector not part of entry route) Subject to special conditions ofEN 50131-1:2006, 8.3.8.2 c Expiry of entry timed TamperTamper

25、identifiable as applicable to asingle device or failure of interconnectionto a single device It is optionally permitted for a single tamperalarm to be designated as a verified alarm. Tamper applicable to interconnectioncarrying signals or messages relevant tomultiple devices Designated as sequential

26、ly verifiedimmediately (unverified plus verified alarmnotifications). e ATS path fault Designation made at ARC (see Clause 11) The combination of a tamper alarm or ATS path fault with a hold-up alarm should be interpreted as averified hold-up alarm (see 8.1.2). PD CLC/TS 50131-9:2014CLC/TS 50131-9:2

27、014 (E) - 14 - 7.2.3 Alarm verification time To be designated as a sequentially verified alarm, the sequential alarm should be generated within amaximum of 60 min after the unverified alarm. In the event that a sequentially verified alarm does not take place within this time, automaticreinstatement

28、of the IAS should take place (see 7.2.4). NOTE The time intervals when an ATS path fault is valid as one of the alarm verification conditions (see Table 1) are specified in Clause 11. 7.2.4 Automatic reinstatement If a sequentially verified alarm has not been notified before the expiry of alarm veri

29、fication time, theI b) an intrusion, tamper or hold-up alarm signal or message followed by an ATS path fault during thesame set period; c) two ATS path faults, relevant to different paths, during the same set period. The two paths shouldbe of different technologies (see EN 50518-3:2013, 5.7); typica

30、lly land-line and wireless. The time permitted during the set period may be varied independently for intrusion and hold-upalarms. The sequential alarm sequence of a hold-up alarm combined with an ATS path fault should beinterpreted as a verified hold-up alarm (see 8.1.2). 11.2 Installation guideline

31、s These recommendations are additional to those included in CLC/TS 50131-7 and the requirements ofEN 50136-1. NOTE 1 The provision of a dual-path ATS does not, of itself, constitute a method of alarm verification. NOTE 2 Consideration should be given to the use of dual-path ATS to prevent notificati

32、on of alarm verification being disabled by a single path fault. 11.3 ARC responses ARC responses are specified in EN 50518-3. PD CLC/TS 50131-9:2014 CLC/TS 50131-9:2014 (E) - 19 - Annex A (informative) Equipment specifications A.1 General The recommendations of this annex should be applied when comp

33、onents are intended to permitI b) the processed intrusion outputs from the sensors should be communicated independently to theCIE; c) the processing of the status of any sensor should not influence, or be influenced by, theprocessing of the status of any other sensor; NOTE This does NOT require that

34、 the device use separate means of processing (EXAMPLE: separatemicroprocessors) to deal with the outputs from each sensor. d) masking and fault signals may be processed individually for each sensor, or as single maskingand fault signals or messages (where relevant) for the overall device. A.3.3 Docu

35、mentation The manufacturers documentation should include a) details of monitored coverage area of the independent sensors, including any gaps between, b) identification of outputs to CIE relative to the independent sensors. A.4 Multi-action hold-up device A.4.1 General These recommendations are addi

36、tional to the requirements of CLC/TS 50131-11. A.4.2 Recommendations Where a multi-action Hold-Up Device is designed with two (or more) actions in order to fulfil therecommendations of 8.1.2, the following should apply: a) the actions should be of different methods or an intended order of the same o

37、r different methods; b) the processed hold-up output(s) from the hold-up device should be communicated independentlyto the CIE in the order they are generated; PD CLC/TS 50131-9:2014 CLC/TS 50131-9:2014 (E) - 21 - c) the processing of the output of any action should not influence, or be influenced b

38、y theprocessing of the output of any other action; NOTE This does NOT require that the device use separate means of processing (EXAMPLE: separatemicroprocessors) to deal with the output(s) from each action or operating part. d) masking and fault signals may be processed individually for each output,

39、 or as single maskingand fault signals or messages (where relevant) for the overall device. A.4.3 Documentation The manufacturers documentation should include a) details of the operating method(s) and action(s) b) identification of output(s) to CIE relative to the independent operating method(s), if

40、 required A.5 Audible alarm verification equipment A.5.1 Recommendations A.5.1.1 Audible alarm verification control equipment Equipment used to control the means of audible alarm verification should have means to receivesignals or messages from the I c) verify that the sensor responses are processed

41、 independently and communicated separately tothe CIE. B.2.3 Documentation The manufacturers documentation should be checked for compliance with A.3.3. B.3 Audible alarm verification equipment B.3.1 General The following tests apply to all audible alarm verification equipment intended to meet thereco

42、mmendations of this specification: B.3.2 Audio alarm Verification control equipment The manufacturer of audio alarm verification control equipment should provide sufficient informationand equipment to verify compliance with A.5.1.1, with specific emphasis on a) the recommendations for storage and tr

43、ansmission of audio information of 9.1.2, b) the correct correspondence between ALD and the intrusion detector triggered (See 9.1.2), c) correct interfacing with I b) the correct correspondence between imaging device and the intrusion detector triggered (A.6.1). B.4.2 Other visual alarm verification

44、 equipment Visual surveillance (or CCTV) equipment to be used in visual alarm verification systems should betested to ensure compliance with the standard relevant to the equipment, or evidence presented ofprior compliance testing. B.4.3 The tamper protection and detection recommendations (A.6.3) sho

45、uld be tested in accordancewith the product standard for the equivalent component (as per table A.2). B.4.4 The environmental recommendations of A.6.4 should be tested in accordance with the productstandard for the equivalent component (as per Table A.2). B.4.5 The manufacturers documentation should

46、 be checked for compliance with A.6.5. PD CLC/TS 50131-9:2014CLC/TS 50131-9:2014 (E) - 28 - Bibliography EN 50131-2 (all parts), Alarm systems Intrusion and hold-up systems CLC/TS 50131-2-7-1, Alarm systems Intrusion and hold-up systems Part 2-7-1: Intrusiondetectors - Glass break detectors (acousti

47、c) EN 50131-3:2009 2), Alarm systems Intrusion and hold-up systems Part 3: Control and indicatingequipment EN 50131-10:2010, Alarm systems Intrusion and hold-up systems Part 10: Application specificrequirements for Supervised Premises Transceiver (SPT) CLC/TS 50131-11, Alarm systems Intrusion and ho

48、ld-up systems Part 11: Hold-up devices EN 50132-1:2010, Alarm systems CCTV surveillance systems for use in security applications Part 1: System requirements EN 50132-7:2012, Alarm systems CCTV surveillance systems for use in security applications Part 7: Application guidelines 2)A corrigendum is in preparation PD CLC/TS 50131-9:2014

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 标准规范 > 国际标准 > 其他

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1