Fire, Security Monitoring System, Process Architectural Design
The fire and security monitoring system is meant to manage, and to monitor the fire security alarms in a building. In order to best understand how this system works, it is only prudent to define its design both in terms of the software and the hardware components that it is made up of; we have to know how the systems components relate to each other and functions of every component involved in the working of the whole system that is controlled from the central point of security monitoring(Robinson 2009).
This document covers the definition of the fire monitoring system as well as the fire security equipment. The software described by the software requirements specification runs on the fire security equipment and control the equipment too. When designing the system, we assumed that the system acts in real time and does not respond on false alarms. It is also assumed that the system is self-diagnostic and does not fail when in use(Bukowski 2009).
[...] These none—functional units like flexibility, reliability, ease of use, and so on are veryimportant when thinking of the user. The system should respond in real time and within the given set of time without of failure. The need for such a system; a system that is timely and is reliable makes the design process easy as we know what requirements we need from the system(Grosshangler 1992). The system should be able to reboot in a period of not more than 5 minutes. [...]
[...] The system also receives signals from the movement detectors so as to be able to confirm whether there are people in the lifts and other specific zones. The system also sends signal s to activate also to deactivate the various appropriate fire protection systems. The interaction of the system's components is based on various true or false statements of the software. Communications Interface specification system is able to use the phone line in order to be able to alert the emergency services when necessary. Modular decomposition, control and data The system is made up of various modules and objects. Among them, we have: 1. [...]
[...] Fire and Security Monitoring System - Process Architectural Design The fire and security monitoring system is meant to manage, and to monitor the fire security alarms in a building. In order to best understand how this system works, it is only prudent to define its design both in terms of the software and the hardware components that it is made up of; we have to know how the systems components relate to each other and functions of every component involved in the working of the whole system that is controlled from the central point of security monitoring(Robinson 2009).This document covers the definition of the fire monitoring system as well as the fire security equipment. [...]
[...] Works Cited BFPE International, Fire Alarm Systems, viewed 25 February 2012, < HYPERLINK "http://www.bfpe.com/al_system2.htm" http://www.bfpe.com/al_system2.htm Brandenburg, L 2009, How to create a user interface specification, viewed 25 february 2012, < HYPERLINK "http://www.bridging-the-gap.com/how-to- create-a-user-interface-specification/" http://www.bridging-the- gap.com/how-to-create-a-user-interface-specification/ Bukowski, R 2009, The History of Fire Alarm Systems, Hamptons Press, New York. Chan, S 1991, Computer Vision Based Power Plant Monitoring', Power System Control, Operation and, November 1991. Cholin, JM 2006, 'Investigation into the Application of Duct Smoke Detectors in Heating, Ventilating and Air', Thesis, Fire Detection Institute, Cambridge. [...]
[...] All the embedded devices that require time service in the entire fire and security alarm system can use the reusable element. Given this fact that the systems work in real time, the users do not need to put in any form of input apart from the time the system is turned on and the time it reboots after a crash or a breakdown. Information hiding is achieved through the fact that the system is able to work on its own without the need for explanations of how it works to the users and the other operators. [...]
using our reader.