A.2 Control and indicating equipment

A.2.1 General

These recommendations are additional to the requirements of EN 50131-3.

A.2.2 Alarm types

The CIE should recognise the combinations of alarm types identified in 7.2.2 as valid for generation of a sequentially verified intruder alarm, and those identified in 8.1.2 as valid for a sequentially verified hold-up alarm.

A.2.3 Alarm verification time

The CIE should have the facility to programme the alarm verification time between the limits defined at 7.2.3 for intruder alarms and at 8.1.3 for hold-up alarms.

A.2.4 Automatic reinstatement

The CIE should have the facility to terminate an unverified alarm at the end of alarm verification time and be prepared for further alarm events, as defined at 7.2.4.

A.2.5 Restore

The CIE should have means to be restored at the access level specified for the l&HAS in 6.6.

A.2.6 Processing and notification

The CIE should have the means to provide the notification signals or messages defined in 6.4.

The CIE should have means to delay the notification to a warning device, either for a fixed period or until an alarm is designated as verified.

NOTE This designation may be the generation of a sequentially verified alarm by the CIE, or by a signal or message received from the ARC, whether direct or via audio or visual control equipment.

A.2.7 Indication

The CIE should have the means to provide the indications defined in 6.3.

A.2.8 Event recording

The CIE should have the means to record the events defined in 6.5.

A.2.9 Interface to audible alarm verification equipment

The CIE should provide the means to interface with audio alarm verification equipment in order to

  1. convey status of the l&HAS to enable transmission of audio information associated with the triggered detector,

control the inhibit of warning device(s).A.2.10 Interface to visual alarm verification equipment

The CIE should provide the means to interface with video alarm verification equipment in order to convey the status of the l&HAS to enable transmission of visual information associated with the triggered detector.

A.2.11 Documentation

The manufacturer’s documentation should include

  1. details of options specified in this annex that are provided in the product

  2. limits of programming of relevant options,

  3. details of interfaces to audible and visual alarm verification equipment (A.2.9 and A.2.10) including identification of signal or message protocol used,

A.3 Multi-output combined detectors

A.3.1 General

These recommendations are additional to the requirements of EN 50131-2 (all parts).

NOTE a detector may be capable of being configured internally as either a “single-output combined detector” or a “multi-output combined detector”.

A.3.2 Recommendations

Where a multi-output combined detection device is designed with two (or more) sensors in the same housing in order to fulfil the recommendations of 7.3.2, the following should apply:

  1. the sensors should be of different technologies or have non-overlapping monitoring coverage;

  2. the processed intrusion outputs from the sensors should be communicated independently to the CIE;

  3. the processing of the status of any sensor should not influence, or be influenced by, the processing of the status of any other sensor;

NOTE This does NOT require that the device use separate means of processing (EXAMPLE: separate microprocessors) to deal with the outputs from each sensor.

  1. masking and fault signals may be processed individually for each sensor, or as single masking and fault signals or messages (where relevant) for the overall device.

A.3.3 Documentation

The manufacturer’s documentation should include

  1. details of monitored coverage area of the independent sensors, including any gaps between,

  2. identification of outputs to CIE relative to the independent sensors.

A.4 Multi-action hold-up device

A.4.1 General

These recommendations are additional to the requirements of CLC/TS 50131-11.

A.4.2 Recommendations

Where a multi-action Hold-Up Device is designed with two (or more) actions in order to fulfil the recommendations of 8.1.2, the following should apply:

  1. the actions should be of different methods or an intended order of the same or different methods;

  2. the processed hold-up output(s) from the hold-up device should be communicated independently to the CIE in the order they are generated;

  3. the processing of the output of any action should not influence, or be influenced by the processing of the output of any other action;

NOTE This does NOT require that the device use separate means of processing (EXAMPLE: separate microprocessors) to deal with the output(s) from each action or operating part.

  1. masking and fault signals may be processed individually for each output, or as single masking and fault signals or messages (where relevant) for the overall device.

A.4.3 Documentation

The manufacturer’s documentation should include

  1. details of the operating method(s) and action(s)

  2. identification of output(s) to CIE relative to the independent operating method(s), if required

A.5 Audible alarm verification equipment

A.5.1 Recommendations

A.5.1.1 Audible alarm verification control equipment

Equipment used to control the means of audible alarm verification should have means to receive signals or messages from the l&HAS to identify alarm information.

This information should be processed to receive sound from the ALD associated with the alarm event. This sound should be recorded and transmitted to the ARC in accordance with the recommendations of 9.1.2 and 9.1.3.

The equipment should also have means to interface with CIE as required by A.2.9.

NOTE 1 Part or all of this functionality may be integrated into the CIE or SPT, or into ALD(s) or AMD(s).).

NOTE 2 Provision may additionally be made for the transmission of live audio messages to the site, or for the playback of pre-recorded messages.

A.5.1.2 Audio listening device

Audio listening devices used should be activated by the audio alarm verification control equipment and then pass audio information to the audible alarm verification control equipment in real time

A.5.1.3 Audio monitoring device

The audio monitoring device should detect sounds above a preset threshold and present this output to the l&HAS to generate an alarm.

The audio monitoring device should then perform the functionality of an audio listening device (see 3.1.4), presenting its output to the audio alarm verification control equipment to enable sounds at the supervised premises to be monitored to permit the alarm to be designated as verified when appropriate.

A.5.2 Tamper protection and detection recommendations

Audible alarm verification equipment should meet the tamper protection and detection requirements of EN 50131-1, according to the nature of the equivalent component, as specified in Table A.1, at the system grade specified for the equipment.

A.5.3 Environmental recommendations

Audible alarm verification equipment should meet the environmental requirements of the equivalent device, as identified in Table A.1

.Table А.1 - Tamper protection, tamper detection and environmental recommendations
for audible alarm verification equipment

Type of component

Equivalent component

Audio listening device

Acoustic break-glass detector (CLC/TS 50131-2-7-1)

Audio monitoring device

Acoustic break-glass detector (CLCTS 50131-2-7-1)

Audio control equipment

CIE (EN 50131-3)

ALD / AMD expansion equipment

CIE (EN 50131-3)

Audio transmission device

SPT (EN 50131-10)



A.5.4 Documentation

The manufacturer’s documentation should include

  1. installation instructions,

  2. (for control equipment) details of interface to l&HAS CIE (A.2.9) including identification of signal or message protocol used,

  3. (for audio monitoring devices) sound level threshold adjustment,

  4. any special settings required on audio alarm verification control equipment or on l&HAS CIE to comply with the recommendations of this document.

A.6 Visual alarm verification equipment

A.6.1 Visual alarm verification control equipment

Equipment used to control the means of visual alarm verification should have means to receive signals or messages from the l&HAS to identify alarm information.

This information should be processed to receive images from the imaging device associated with the alarm event. These images should be recorded and transmitted to the ARC in accordance with the recommendations of 10.1.2.

This equipment should also have the means to interface with CIE as required by A.2.10.

NOTE Part or all of this functionality may be integrated into the CIE or SPT, or into imaging devices or VMD(s).

A.6.2 Other visual alarm verification equipment

Visual surveillance (or CCTV) equipment used in visual alarm verification systems should comply with the recommendations of this clause, in addition to those of the standard relevant to the equipment.

A.6.3 Tamper protection and detection recommendations

Equipment used in visual alarm verification systems should meet the tamper protection and detection requirements of equivalent standards identified in Table A.2 at the system grade specified for the equipment.

A.6.4 Environmental recommendations

Equipment used in visual alarm verification systems should meet the environmental requirements of EN 50132-1:2010, Clause 7. For test purposes, the specific requirements for the equivalent device, as identified in Table A.2 should be used

:



Table A.2 - Tamper protection, tamper detection and environmental recommendations
for visual alarm verification equipment

Type of component

Equivalent component

Imaging device

Camera (EN 50132-1:2010, 6.3.2.3, Table 5)

Video monitoring device

Camera (EN 50132-1:2010, 6.3.2.3, Table 5)

Visual alarm verification control equipment

CIE(EN 50131-3)

Imaging device expansion equipment

CIE(EN 50131-3)

Video transmission device

Video Transmission devices (EN 50132-1)



A.6.5 Documentation

The manufacturer's documentation for visual alarm verification control equipment should include:

  1. details of interface to l&HAS CIE (A.2.10) including identification of signal or message protocol used,

  2. any special settings required on visual equipment or on l&HAS CIE to comply with the recommendations of this document.Annex В
    (informative)

Equipment test procedures

  1. CIE

The following tests are additional to EN 50131-3 and apply to all CIE providing relevant options intended to meet the recommendations of this specification:

Table B.1 - CIE tests for alarm verification functions (1 of 3)

Step

Test condition

(c)

Action

(d)

Measurement

(e)

Pass/fail criteria (in addition to requirements of EN 50131-3) (f)

Alarm types (A.2.2), Restore (A.2.5), Processing and notification (A.2.6), Indication (A.2.7) and Event recording (A.2.8).

1a

IAS portion of alarm system set, Absence of “intruder, tamper, fault signals and messages”

No indication active

Generate an intruder alarm

Check indications, notification and event recording

Indication, notification, and event recording should comply with 6.3, 6.4 & 6.5

1b


Generate a second intruder alarm

Check indications, notification and event recording

Indication, notification and event recording should comply with 6.3, 6.4 & 6.5

1c

Restore IAS



Restore should only be possible at the access level defined in EN 50131-1 for the type of alarm

1d

Repeat Steps 1a to 1c using combinations of alarm signals or messages as defined in Table 1 (7.2.2), except ATS path faults

See Steps 1e - 1f


Check indications, notification and event recording

Indication, notification and event recording should comply with 6.3, 6.4 & 6.5 Restore should only be possible at the access level defined in EN 50131-1 for the type of alarm

2a

Adjust programming for restore access level to be level 3




2b

For one suitable combination of Step 1d


Check access level at which restore is possible

Restore should only be possible at access level 3.

3a

HAS portion of CIE set, Absence of “hold-up signals and messages” No indication active

Generate a hold-up alarm

Check indications, notification and event recording

Indication, notification and event recording should comply with 6.3, 6.4 & 6.5

3b


Generate a second hold-up alarm

Check indications, notification and event recording

Indication, notification and event recording should comply with 6.3, 6.4 & 6.5

3c

Cancel alarm and Restore HAS (as described by manufacturer)



Restore should be possible at the access level defined in EN 50131-1 for the type of alarm

Table В.1 (2of3)

Step

Test condition

(C)

Action

(d)

Measurement

(e)

Pass/fail criteria (in addition to requirements of EN 50131-3) (f)

4

Repeat Steps 3a to 3b using combinations of alarm signals or messages as defined in 8.1.2, except ATS path faults

See Steps 5a - 5b


Check indications, notification and event recording

Indication, notification and event recording should comply with 6.3, 6.4 & 6.5 Restore should be possible at the access level defined in EN 50131-1 for the type of alarm

5a

Adjust programming for restore access level to be level 3




5b

For one suitable combination of Step 4


Check access level at which restore is possible

Restore should only be possible at access level 3.

5c

Repeat Steps 1a and 1b using combinations of alarm signals or messages NOT defined in 7.2.2 or 8.1.2


Check indications, notification and event recording

Indication, notification and event recording should NOT include verified hold-up alarm

Alarm verification time (A.2.3) and Automatic reinstatement (A.2.4)

6a

IAS portion of alarm system set

Generate an intruder alarm, leaving the trigger signal or message present until Step 6d completed

Check indications, notification and event recording

Indication, notification and event recording should comply with 6.3, 6.4 & 6.5

6b


Allow alarm verification time to expire

Check indications, notification and event recording

Indication, notification and event recording should comply with 6.3, 6.4 & 6.5

6c


Generate a different intruder alarm

Check indications, notification and event recording

Indication, notification and event recording should comply with 6.3, 6.4 & 6.5

6d

Unset IAS


Check indications, notification and event recording

System in normal unset condition

7

Verify range of programming available for alarm verification time


Record range of programming available

Range of times covers limits required by 7.2.3

8a

HAS portion of alarm system set

Generate a hold-up alarm, leaving the signal or message present until Step 8d completed

Check indications, notification and event recording

Indication, notification and event recording should comply with 6.3, 6.4 & 6.5

8b


Allow alarm verification time to expire

Check indications, notification and event recording

Indication, notification and event recording should comply with 6.3, 6.4 & 6.5

8c


Generate a different hold-up alarm

Check indications, notification and event recording

Indication, notification and event recording should comply with 6.3, 6.4 & 6.5

8d

Unset HAS


Check indications, notification and event recording

System in normal unset condition

Table В.1 (3of3)

Step

Test condition

(c)

Action

(d)

Measurement

(e)

Pass/fail criteria (in addition to requirements of EN 50131-3) (f)

8e

Verify range of programming available for alarm verification time


Record range of programming available

Range of times covers limits required by 8.1.3

Interface to audio control equipment (A.2.9) and Interface to visual control equipment (A.2.10)

9

The manufacturer should provide sufficient information, and means to verify correct operation of the interface at the CIE for a test laboratory to evaluate compliance with the recommendations of A.2.9 and A.2.10,

NOTE It is not mandatory that this is tested with audio / visual control equipment connected, though this is permitted.

The interface should comply with A.2.9 / A.2.10 for at least one of each type of equipment

Manufacturer’s documentation (A.2.11)

10

Check manufacturer’s documentation



Documentation should comply with the recommendations of A.2.11