Sei sulla pagina 1di 2

FP_AUGUST.

INTELLIGENT 21/7/04 7:58 AM Page 32

F OCUS: DETECTION

Intelligence network
Peter Freestone explains how intelligent technology is helping to
combat false alarms in industrial and commercial premises
AJOR ADVANCES have been made microprocessor technology has enabled the

M in terms of the intelligence of alarm


control systems over the last 30 years.
At one stage, virtually all smoke detectors used
intelligence in such systems to be distributed
around the protected environment, instead of
having the decision-making process confined to
to be of the ionisation chamber variety, but this one point. Having decisions made by intelligent
technology has gradually changed over the detectors also reduces the amount of electronic
years in favour of the optical kind. These days, traffic on the systems control cable. This form
besides smoke, other phenomena can be of analogue addressable system is currently
detected, such as carbon monoxide, flame and regarded as state-of-the-art.
heat. Also, the multi-sensor (a combination of
The intelligent features that are available in
optical and heat detection) is becoming
modern detectors are many-fold. The prime
commonly used.
factor is that they should be able to filter out
However, despite these technological advances, transient alarm signals (such as a passing cloud
every type of detection technology is prone to of dust, for example), thus enhancing the ability
false alarms in one way or another. This to determine whether or not a real fire is present
problem can only be overcome by introducing and eliminating many false or unwanted
an element of intelligence into the control of alarms.
fire detection and alarm systems whether
Intelligent detectors should also be able to
human or electronic.
detect slow-burning fires. These may take an
The conventional type of control system, most hour or more to develop. In this instance, even
typically seen in smaller premises, is known as a slow build-up of smoke should be sufficient
non-addressable. Such systems have little or no intelligence in for the detector to sense that there may be a problem and
terms of avoiding false alarms. This is mainly due to the whole respond by automatically lowering its level of sensitivity or
decision-making process, for determining whether or not speeding up the response.
there is a fire, being vested in the individual detectors. Also,
being non-addressable, these systems do not have the ability Automatic optimisation of individual detector sensitivity is
to pinpoint the exact location of an incident if one of the another possibility of intelligent detectors, whereby each
detectors triggers an alarm. detector can optimise the best sensitivity for the environment
in which it is fitted. Adjustments can also be made to allow for
Analogue addressable systems pollution of the detector chamber. Intelligent systems also have
detectors that automatically self-test to calibrated levels on a
By contrast, early analogue addressable systems changed this daily basis. This results not only in huge increases in the
completely. These systems took the decision-making process reliability and availability of the protection, but also gives major
from the detector and put it into the control panel. This had lifecycle reductions to maintenance and downtime costs.
the effect of transforming the detectors into sensors that
merely reported their status for evaluation by the control Putting the intelligence back into detectors does not mean
equipment. Due to the addressability of the devices, it is also that there is none in the system control panel. The latest
possible to pinpoint the exact location of the alarm source. distributed systems include many intelligent features, such as
the ability to isolate specific detection areas at different times
Even with quite simple intelligence, such as verifying the of the day or night, to increase or reduce the sensitivity of
presence of an alarm signal for two or three consecutive scans, particular detectors and to measure pollution levels in the
these systems have been shown to produce up to 65% less protected environment. There is also the pre-alarm facility,
false alarms than those of non-addressable systems of a similar whereby staff can be alerted to the possibility of a fire incident
size. Yet, despite this, there has since been a move to create a following activation of an addressable detector, giving them
new type of addressable system in which the decision factor time to investigate and/or deal with the incident before
has been put back into the detectors once again. implementing a full-scale building evacuation. Other
This is not quite the retrograde step that one might be features, such as alarm organisation, can be implemented.
forgiven for first thinking. The miniaturisation of This is where a single smoke detector operating will not cause

FEJ & FP August 2004


32
FP_AUGUST.INTELLIGENT 21/7/04 7:58 AM Page 33

F OCUS: DETECTION
a full evacuation signal, but instead gives staff a chance to
investigate the incident. Timers and other safeguards ensure
that any delays can be overridden.
All these intelligent detector and control panel features are
now available using current technology. When purchasing a
new system, it is vital to check with the supplier that it
includes all the features required and at least some form of
anti-false alarm features.

The ideal protocol


Addressable systems with distributed intelligence fall into
various categories, depending on the type of protocol that
applies to them. There are two options available to users: open
or closed protocol. A closed protocol system is one where the
same manufacturer produces both the control panel and
detection equipment, delivering the certainty of 100%
compatibility and with full technical features being
implemented between the two. By contrast, the various
elements of an open protocol system may be supplied and
maintained by different manufacturers, offering a greater
degree of flexibility. When purchasing such an open system,
however, it is vitally important to ensure that the control
equipment selected is capable of using all of the intelligent
features available from the detectors to their fullest extent.
There is a third option available, which perhaps may be the
ideal option, and this is known as managed protocol: that is,
a closed protocol with managed flexibility. This is where the
manufacturer is responsible for ensuring full compatibility
between the control equipment and detectors, but will make
available to the user the necessary software package and
training to ensure he has full control of any of the
configuration changes.
Whichever type of protocol is chosen, the choice of system
supplier and service provider is extremely important. These
systems can be complex; untrained staff can render systems
completely inoperative if not properly trained or backed-up.
To establish whether or not a company is worth dealing with,
it is essential to ask searching questions about their technical
support facilities, spares availability and the techniques which
are employed to combat false alarms. Any company that
cannot answer these questions satisfactorily should
immediately be ruled out. It is also vital to ensure that the
chosen supplier is competent to specify, install and maintain
the system for which you will, in future, be legally
responsible. This is easy to accomplish by dealing with a
company that has received independent third-party
accreditation.
In future, every aspect of fire safety will be based on risk
assessment. By applying a degree of intelligence to the
equation, both in terms of system technology and choice of
supplier, the burden of responsibility may not be as onerous
as it first appears

Peter Freestone is marketing manager of


Kidde Fire Protection Services

August 2004 FEJ & FP

33

Potrebbero piacerti anche