Search icone
Search and publish your papers

Fire and Security Monitoring System - Process Architectural Design

Or download with : a doc exchange

About the author

General public
criminal law

About the document

Published date
documents in English
case study
6 pages
General public
0 times
Validated by
0 Comment
Rate this document
  1. Introduction
  2. Fire and Security Monitoring System
  3. Process Architectural Design
  4. Analysis
  5. Conclusion

The fire and security monitoring system is meant to manage, and to monitor the fire security alarms in a building. In order to best understand how this system works, it is only prudent to define its design both in terms of the software and the hardware components that it is made up of; we have to know how the systems components relate to each other and functions of every component involved in the working of the whole system that is controlled from the central point of security monitoring(Robinson 2009).

This document covers the definition of the fire monitoring system as well as the fire security equipment. The software described by the software requirements specification runs on the fire security equipment and control the equipment too. When designing the system, we assumed that the system acts in real time and does not respond on false alarms. It is also assumed that the system is self-diagnostic and does not fail when in use(Bukowski 2009).

[...] These none?functional units like flexibility, reliability, ease of use, and so on are veryimportant when thinking of the user. The system should respond in real time and within the given set of time without of failure. The need for such a system; a system that is timely and is reliable makes the design process easy as we know what requirements we need from the system(Grosshangler 1992). The system should be able to reboot in a period of not more than 5 minutes. [...]

[...] The system also receives signals from the movement detectors so as to be able to confirm whether there are people in the lifts and other specific zones. The system also sends signal s to activate also to deactivate the various appropriate fire protection systems. The interaction of the system's components is based on various true or false statements of the software. Communications Interface specification system is able to use the phone line in order to be able to alert the emergency services when necessary. Modular decomposition, control and data The system is made up of various modules and objects. Among them, we have: 1. [...]

[...] Law, T 1999, 'Options within Intelligent Fire Detection Systems', Fire Safety, June 1999. Robinson, JN 2009, Solving the System: Integrated Fire Alarm Monitoring, viewed 25 February 2012, < HYPERLINK " 449" Shepard, L 2010, Commercial Fire Alarm Systems, viewed 25 February 2012, < HYPERLINK " technologies/commercial-fire-alarm-systems?print=1&tmpl=component" technologies/commercial-fire-alarm-systems?print=1&tmpl=component Top Surveillance 2012, Security Surveillance System - Top Surveillance, viewed 24 February 2012, < HYPERLINK " fire-alarm-basic-components.html" fire-alarm-basic-components.html Z. Liu, JMAAKK 2001, 'Development of Fire Detection Systems in the Intelligent Building', Research, Institute for Research in Construction, Ottawa. [...]

[...] The software components of the fire and security alarm system include: 1. The status reporter interface this shows what the status of the system is. Used at the central point of fire and security alarm monitoring system The input component used by the administrator to turn the system on, andshut down the alarm in case of a false alarm The heat and smoke response components these receive the stimuli and respond in case there is a fire or if there is smoke and send the necessary notifications to the other components of the system to start the alarm. [...]

[...] Threat mode: The system identifies a threat and follows a set procedure. The system also takes into account that if a security threat has been detected it must make sure there is no current fire threat happening in the same zone. If a fire threat has been detected in the same zone, the security threat is cancelled until the fire threat has been completed. Update mode: The system is still running in activated mode while the update is in motion, but when the update is ready to be installed, the system is de-activated until the new software update has been installed, thus enabling the system again. [...]

Similar documents you may be interested in reading.

Internet banking

 Economics & finance   |  Finance   |  Term papers   |  03/05/2009   |   .doc   |   24 pages

Security using firewalls

 Science & technology   |  Computer science   |  Term papers   |  06/16/2009   |   .doc   |   6 pages

Top sold for criminal law

State v. Ulvinen 313 N.W.2d 425 (Minn. 1981)

 Law & contracts   |  Criminal   |  Term papers   |  07/28/2010   |   .doc   |   2 pages