A.2 Control and indicating equipment
A.2.1 General
These recommendations are additional to the requirements of EN 50131-3.
A.2.2 Alarm types
The CIE should recognise the combinations of alarm types identified in 7.2.2 as valid for generation of a sequentially verified intruder alarm, and those identified in 8.1.2 as valid for a sequentially verified hold-up alarm.
A.2.3 Alarm verification time
The CIE should have the facility to programme the alarm verification time between the limits defined at 7.2.3 for intruder alarms and at 8.1.3 for hold-up alarms.
A.2.4 Automatic reinstatement
The CIE should have the facility to terminate an unverified alarm at the end of alarm verification time and be prepared for further alarm events, as defined at 7.2.4.
A.2.5 Restore
The CIE should have means to be restored at the access level specified for the l&HAS in 6.6.
A.2.6 Processing and notification
The CIE should have the means to provide the notification signals or messages defined in 6.4.
The CIE should have means to delay the notification to a warning device, either for a fixed period or until an alarm is designated as verified.
NOTE This designation may be the generation of a sequentially verified alarm by the CIE, or by a signal or message received from the ARC, whether direct or via audio or visual control equipment.
A.2.7 Indication
The CIE should have the means to provide the indications defined in 6.3.
A.2.8 Event recording
The CIE should have the means to record the events defined in 6.5.
A.2.9 Interface to audible alarm verification equipment
The CIE should provide the means to interface with audio alarm verification equipment in order to
convey status of the l&HAS to enable transmission of audio information associated with the triggered detector,
control the inhibit of warning device(s).A.2.10 Interface to visual alarm verification equipment
The CIE should provide the means to interface with video alarm verification equipment in order to convey the status of the l&HAS to enable transmission of visual information associated with the triggered detector.
A.2.11 Documentation
The manufacturer’s documentation should include
details of options specified in this annex that are provided in the product
limits of programming of relevant options,
details of interfaces to audible and visual alarm verification equipment (A.2.9 and A.2.10) including identification of signal or message protocol used,
A.3 Multi-output combined detectors
A.3.1 General
These recommendations are additional to the requirements of EN 50131-2 (all parts).
NOTE a detector may be capable of being configured internally as either a “single-output combined detector” or a “multi-output combined detector”.
A.3.2 Recommendations
Where a multi-output combined detection device is designed with two (or more) sensors in the same housing in order to fulfil the recommendations of 7.3.2, the following should apply:
the sensors should be of different technologies or have non-overlapping monitoring coverage;
the processed intrusion outputs from the sensors should be communicated independently to the CIE;
the processing of the status of any sensor should not influence, or be influenced by, the processing of the status of any other sensor;
NOTE This does NOT require that the device use separate means of processing (EXAMPLE: separate microprocessors) to deal with the outputs from each sensor.
masking and fault signals may be processed individually for each sensor, or as single masking and fault signals or messages (where relevant) for the overall device.
A.3.3 Documentation
The manufacturer’s documentation should include
details of monitored coverage area of the independent sensors, including any gaps between,
identification of outputs to CIE relative to the independent sensors.
A.4 Multi-action hold-up device
A.4.1 General
These recommendations are additional to the requirements of CLC/TS 50131-11.
A.4.2 Recommendations
Where a multi-action Hold-Up Device is designed with two (or more) actions in order to fulfil the recommendations of 8.1.2, the following should apply:
the actions should be of different methods or an intended order of the same or different methods;
the processed hold-up output(s) from the hold-up device should be communicated independently to the CIE in the order they are generated;
the processing of the output of any action should not influence, or be influenced by the processing of the output of any other action;
NOTE This does NOT require that the device use separate means of processing (EXAMPLE: separate microprocessors) to deal with the output(s) from each action or operating part.
masking and fault signals may be processed individually for each output, or as single masking and fault signals or messages (where relevant) for the overall device.
A.4.3 Documentation
The manufacturer’s documentation should include
details of the operating method(s) and action(s)
identification of output(s) to CIE relative to the independent operating method(s), if required
A.5 Audible alarm verification equipment
A.5.1 Recommendations
A.5.1.1 Audible alarm verification control equipment
Equipment used to control the means of audible alarm verification should have means to receive signals or messages from the l&HAS to identify alarm information.
This information should be processed to receive sound from the ALD associated with the alarm event. This sound should be recorded and transmitted to the ARC in accordance with the recommendations of 9.1.2 and 9.1.3.
The equipment should also have means to interface with CIE as required by A.2.9.
NOTE 1 Part or all of this functionality may be integrated into the CIE or SPT, or into ALD(s) or AMD(s).).
NOTE 2 Provision may additionally be made for the transmission of live audio messages to the site, or for the playback of pre-recorded messages.
A.5.1.2 Audio listening device
Audio listening devices used should be activated by the audio alarm verification control equipment and then pass audio information to the audible alarm verification control equipment in real time
A.5.1.3 Audio monitoring device
The audio monitoring device should detect sounds above a preset threshold and present this output to the l&HAS to generate an alarm.
The audio monitoring device should then perform the functionality of an audio listening device (see 3.1.4), presenting its output to the audio alarm verification control equipment to enable sounds at the supervised premises to be monitored to permit the alarm to be designated as verified when appropriate.
A.5.2 Tamper protection and detection recommendations
Audible alarm verification equipment should meet the tamper protection and detection requirements of EN 50131-1, according to the nature of the equivalent component, as specified in Table A.1, at the system grade specified for the equipment.
A.5.3 Environmental recommendations
Audible alarm verification equipment should meet the environmental requirements of the equivalent device, as identified in Table A.1
.Table А.1 - Tamper protection, tamper detection and environmental recommendations
for audible alarm verification equipment
Type of component |
Equivalent component |
Audio listening device |
Acoustic break-glass detector (CLC/TS 50131-2-7-1) |
Audio monitoring device |
Acoustic break-glass detector (CLCTS 50131-2-7-1) |
Audio control equipment |
CIE (EN 50131-3) |
ALD / AMD expansion equipment |
CIE (EN 50131-3) |
Audio transmission device |
SPT (EN 50131-10) |
A.5.4 Documentation
The manufacturer’s documentation should include
installation instructions,
(for control equipment) details of interface to l&HAS CIE (A.2.9) including identification of signal or message protocol used,
(for audio monitoring devices) sound level threshold adjustment,
any special settings required on audio alarm verification control equipment or on l&HAS CIE to comply with the recommendations of this document.
A.6 Visual alarm verification equipment
A.6.1 Visual alarm verification control equipment
Equipment used to control the means of visual alarm verification should have means to receive signals or messages from the l&HAS to identify alarm information.
This information should be processed to receive images from the imaging device associated with the alarm event. These images should be recorded and transmitted to the ARC in accordance with the recommendations of 10.1.2.
This equipment should also have the means to interface with CIE as required by A.2.10.
NOTE Part or all of this functionality may be integrated into the CIE or SPT, or into imaging devices or VMD(s).
A.6.2 Other visual alarm verification equipment
Visual surveillance (or CCTV) equipment used in visual alarm verification systems should comply with the recommendations of this clause, in addition to those of the standard relevant to the equipment.
A.6.3 Tamper protection and detection recommendations
Equipment used in visual alarm verification systems should meet the tamper protection and detection requirements of equivalent standards identified in Table A.2 at the system grade specified for the equipment.
A.6.4 Environmental recommendations
Equipment used in visual alarm verification systems should meet the environmental requirements of EN 50132-1:2010, Clause 7. For test purposes, the specific requirements for the equivalent device, as identified in Table A.2 should be used
:
Table A.2 - Tamper protection, tamper detection and environmental recommendations
for visual alarm verification equipment
Type of component |
Equivalent component |
Imaging device |
Camera (EN 50132-1:2010, 6.3.2.3, Table 5) |
Video monitoring device |
Camera (EN 50132-1:2010, 6.3.2.3, Table 5) |
Visual alarm verification control equipment |
CIE(EN 50131-3) |
Imaging device expansion equipment |
CIE(EN 50131-3) |
Video transmission device |
Video Transmission devices (EN 50132-1) |
A.6.5 Documentation
The manufacturer's documentation for visual alarm verification control equipment should include:
details of interface to l&HAS CIE (A.2.10) including identification of signal or message protocol used,
any special settings required on visual equipment or on l&HAS CIE to comply with the recommendations of this document.Annex В
(informative)
Equipment test procedures
CIE
The following tests are additional to EN 50131-3 and apply to all CIE providing relevant options intended to meet the recommendations of this specification:
Table B.1 - CIE tests for alarm verification functions (1 of 3)
Step |
Test condition (c) |
Action (d) |
Measurement (e) |
Pass/fail criteria (in addition to requirements of EN 50131-3) (f) |
Alarm types (A.2.2), Restore (A.2.5), Processing and notification (A.2.6), Indication (A.2.7) and Event recording (A.2.8). |
||||
1a |
IAS portion of alarm system set, Absence of “intruder, tamper, fault signals and messages” No indication active |
Generate an intruder alarm |
Check indications, notification and event recording |
Indication, notification, and event recording should comply with 6.3, 6.4 & 6.5 |
1b |
|
Generate a second intruder alarm |
Check indications, notification and event recording |
Indication, notification and event recording should comply with 6.3, 6.4 & 6.5 |
1c |
Restore IAS |
|
|
Restore should only be possible at the access level defined in EN 50131-1 for the type of alarm |
1d |
Repeat Steps 1a to 1c using combinations of alarm signals or messages as defined in Table 1 (7.2.2), except ATS path faults See Steps 1e - 1f |
|
Check indications, notification and event recording |
Indication, notification and event recording should comply with 6.3, 6.4 & 6.5 Restore should only be possible at the access level defined in EN 50131-1 for the type of alarm |
2a |
Adjust programming for restore access level to be level 3 |
|
|
|
2b |
For one suitable combination of Step 1d |
|
Check access level at which restore is possible |
Restore should only be possible at access level 3. |
3a |
HAS portion of CIE set, Absence of “hold-up signals and messages” No indication active |
Generate a hold-up alarm |
Check indications, notification and event recording |
Indication, notification and event recording should comply with 6.3, 6.4 & 6.5 |
3b |
|
Generate a second hold-up alarm |
Check indications, notification and event recording |
Indication, notification and event recording should comply with 6.3, 6.4 & 6.5 |
3c |
Cancel alarm and Restore HAS (as described by manufacturer) |
|
|
Restore should be possible at the access level defined in EN 50131-1 for the type of alarm |
Table В.1 (2of3)
Step |
Test condition (C) |
Action (d) |
Measurement (e) |
Pass/fail criteria (in addition to requirements of EN 50131-3) (f) |
4 |
Repeat Steps 3a to 3b using combinations of alarm signals or messages as defined in 8.1.2, except ATS path faults See Steps 5a - 5b |
|
Check indications, notification and event recording |
Indication, notification and event recording should comply with 6.3, 6.4 & 6.5 Restore should be possible at the access level defined in EN 50131-1 for the type of alarm |
5a |
Adjust programming for restore access level to be level 3 |
|
|
|
5b |
For one suitable combination of Step 4 |
|
Check access level at which restore is possible |
Restore should only be possible at access level 3. |
5c |
Repeat Steps 1a and 1b using combinations of alarm signals or messages NOT defined in 7.2.2 or 8.1.2 |
|
Check indications, notification and event recording |
Indication, notification and event recording should NOT include verified hold-up alarm |
Alarm verification time (A.2.3) and Automatic reinstatement (A.2.4) |
||||
6a |
IAS portion of alarm system set |
Generate an intruder alarm, leaving the trigger signal or message present until Step 6d completed |
Check indications, notification and event recording |
Indication, notification and event recording should comply with 6.3, 6.4 & 6.5 |
6b |
|
Allow alarm verification time to expire |
Check indications, notification and event recording |
Indication, notification and event recording should comply with 6.3, 6.4 & 6.5 |
6c |
|
Generate a different intruder alarm |
Check indications, notification and event recording |
Indication, notification and event recording should comply with 6.3, 6.4 & 6.5 |
6d |
Unset IAS |
|
Check indications, notification and event recording |
System in normal unset condition |
7 |
Verify range of programming available for alarm verification time |
|
Record range of programming available |
Range of times covers limits required by 7.2.3 |
8a |
HAS portion of alarm system set |
Generate a hold-up alarm, leaving the signal or message present until Step 8d completed |
Check indications, notification and event recording |
Indication, notification and event recording should comply with 6.3, 6.4 & 6.5 |
8b |
|
Allow alarm verification time to expire |
Check indications, notification and event recording |
Indication, notification and event recording should comply with 6.3, 6.4 & 6.5 |
8c |
|
Generate a different hold-up alarm |
Check indications, notification and event recording |
Indication, notification and event recording should comply with 6.3, 6.4 & 6.5 |
8d |
Unset HAS |
|
Check indications, notification and event recording |
System in normal unset condition |
Table В.1 (3of3)
Step |
Test condition (c) |
Action (d) |
Measurement (e) |
Pass/fail criteria (in addition to requirements of EN 50131-3) (f) |
|
8e |
Verify range of programming available for alarm verification time |
|
Record range of programming available |
Range of times covers limits required by 8.1.3 |
|
Interface to audio control equipment (A.2.9) and Interface to visual control equipment (A.2.10) |
|||||
9 |
The manufacturer should provide sufficient information, and means to verify correct operation of the interface at the CIE for a test laboratory to evaluate compliance with the recommendations of A.2.9 and A.2.10, NOTE It is not mandatory that this is tested with audio / visual control equipment connected, though this is permitted. |
The interface should comply with A.2.9 / A.2.10 for at least one of each type of equipment |
|||
Manufacturer’s documentation (A.2.11) |
|||||
10 |
Check manufacturer’s documentation |
|
|
Documentation should comply with the recommendations of A.2.11 |