Select your constraint cellular gadgets correctly

When choosing a cellular restraint system, make certain it is supervised, on a devoted community, and designed for all times security so it really works if you want it.

Is it extra harmful to have an unattended cellular restraint system than no system in any respect? This can be a query that any safety supervisor should weigh when deciding between Constraint mobile options.

Regardless of the claims of a cellular constraint answer, it nearly goes with out saying that the primary requirement is that it really works. If a tool has a useless battery, has been disabled, or is solely inactive, it does not matter how correct the situation functionality is: no alarms will probably be despatched. The one approach to make sure that a cellular duress system is up and operating is to make use of a supervised system on a devoted community, designed with the aim of reliably offering alarm notifications.

“Mobile restraint is an essential part of school safety that has been a priority for me for years,” says Guy Grace, President of the Alliance of Companions for Safer Colleges. “Throughout my time as director of safety for Littleton Public Colleges, we used cellular duress, and it was improbable. However each wi-fi life security system has to satisfy the identical reliability necessities as its counterparts. and to the identical regulatory requirements Supervision is critical to satisfy these necessities and requirements.

What’s “surveillance?” »

Supervision refers back to the skill of a cellular restraint system to observe its personal well being. They need to be capable to inform you that you’ve full protection and the whole lot is working correctly. This requires a safe and supervised setting wireless community. As a result of the reliability of a life security system is usually a matter of life and loss of life, there isn’t a room for error. If any part of a cellular restraint system encounters an issue, it ought to ship an alert in order that it may be resolved instantly.

Meaning one thing so simple as alerting system directors when a tool’s battery is low, giving them loads of time to switch it. It additionally means the system ought to ship alerts to campus safety personnel if any of the gadgets have been tampered with, making certain {that a} dangerous actor can not deliberately disable it. In a completely supervised system, every gadget may also ship a continuing stream of verification messages. If the headend doesn’t obtain a registration message from a tool inside a predetermined interval, it should contemplate it as inactive and likewise ship an alert.

The interval between registration messages needs to be shut sufficient to make sure that inactive gadgets might be changed or repaired with out compromising safety.

“There needs to be not more than 200 seconds between logging intervals, and monitoring ought to embrace each gadget within the infrastructure,” says Grace.

Cellular constraint wants devoted community and integration functionality

Full supervision additionally requires a devoted community on your cellular restraint system. Since supervisory alerts and recording messages are despatched over the identical community as alarm messages, they should be delivered with the identical stage of reliability for all times security.

However, a dedicated network does not mean that a mobile duress system should be unable to integrate with the security system already in place. In fact, the opposite is true. It should be flexible enough to be used with virtually any existing security system, and integrable enough to allow for a variety of responses.

For example, when a mobile duress alarm button is pressed, it can be configured to initiate the school lockdown procedure. But the assurance that the system is operational and that the alarms pass must be the priority.

By necessity, every mobile restraint system relies on wireless protocols to transmit alarms. Mobile duress solutions that use wireless technology that was not designed for life safety, such as Wi-Fi and Bluetooth, can sometimes provide location, but not the reliability needed to ensure message delivery alarm. And if these systems are unsupervised, there is no way of knowing if alarms have been missed or if the system is even operational.

Duress mobile apps on cell phones are probably the least secure option. Not only are there the coverage challenges, which we’ve all encountered with our cell phones, but there’s usually a complete lack of supervision. If a phone’s battery dies or loses connection, or the app crashes, there’s no way to tell. These are combined with the logistical issues inherent in using a cell phone itself. Since any duress mobile device must be immediately available, a password or PIN-protected phone is of little use in an emergency.

The wireless protocol must be designed for personal safety

A mobile restraint system should be designed for life safety purposes and use an appropriate wireless protocol. We use Bluetooth to stream music from our phones to our headphones; Wi-Fi for media streaming; Zigbee and Z-Wave for home automation; and we’ve come to assume there’s cellular coverage wherever we are – though we’re often disappointed – but none of them were designed for life-safety applications. They are generally unsupervised and simply do not provide the required level of reliability.

This is not a flaw in any of these other wireless protocols. People’s safety is simply not their goal. Wi-Fi and Bluetooth were designed to move large amounts of data over relatively short distances, but as we all know from experience, neither handles obstacles very well and coverage can be spotty. Each is excellent at what it was designed to do, but not for life safety.

A life safety system requires a secure and supervised wireless network that is immune to the common outages and downtimes that other wireless connections suffer from.

A life safety system is designed to move small amounts of data – alarms and alerts – over moderate ranges in commercial environments, using frequency hopping and spread spectrum technology that sends redundant messages across multiple channels to avoid interference and obstacles. The system network must ensure that high priority alert and alarm messages are transmitted without interference and without interfering with other systems in place.

“A properly installed Dedicated Mobile Restraint System will not interfere with other wireless systems used by the school, nor with the school Wi-Fi, radio interoperability system or even other security technologies. wireless,” says Grace.

To ensure the delivery of supervisory and alarm messages, the wireless backbone of any mobile alarm system must also be designed to guarantee multiple paths between the alarm device and the receiver. Usually this is achieved by installing a network of devices, called repeaters, which listen for messages and then retransmit them to the headend.

“Every device that doesn’t transmit directly to the headend should have at least two paths to transmit its signals,” adds Grace. “That way, if one repeater fails, the signal is sent using a second repeater.”

Additionally, each of these repeaters must itself be supervised, so alerts can also be sent if any of them are tampered with or become inactive.

All strain moving components must be supervised

Whether it’s a repeater, one of the mobile restraint pendants, or even the gateway itself, every component of a mobile restraint system needs to be supervised. Without full supervision, there is no guarantee that any message sent will be delivered, rendering the system useless in an emergency.

There are a number of options for the mobile constraint on the market and it can be difficult to choose between them. But the most important consideration has to be the reliability that comes from a supervised and dedicated network.

Craig Dever is vice president of sales and marketing for Inovonics.

Observe: The views expressed by visitor bloggers and contributors are these of the authors and don’t essentially symbolize the views of, and shouldn’t be attributed to, Campus Security journal.

Leave a Reply

Your email address will not be published.