欢迎来到麦多课文档分享! | 帮助中心 海量文档,免费浏览,给你所需,享你所想!
麦多课文档分享
全部分类
  • 标准规范>
  • 教学课件>
  • 考试资料>
  • 办公文档>
  • 学术论文>
  • 行业资料>
  • 易语言源码>
  • ImageVerifierCode 换一换
    首页 麦多课文档分享 > 资源分类 > PDF文档下载
    分享到微信 分享到微博 分享到QQ空间

    CLC TS 50131-2-10-2014 Alarm systems - Intrusion and hold-up systems - Part 2-10 Intrusion detectors - Lock state contacts (magnetic).pdf

    • 资源ID:629570       资源大小:1.16MB        全文页数:36页
    • 资源格式: PDF        下载积分:10000积分
    快捷下载 游客一键下载
    账号登录下载
    微信登录下载
    二维码
    微信扫一扫登录
    下载资源需要10000积分(如需开发票,请勿充值!)
    邮箱/手机:
    温馨提示:
    如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如需开发票,请勿充值!如填写123,账号就是123,密码也是123。
    支付方式: 支付宝扫码支付    微信扫码支付   
    验证码:   换一换

    加入VIP,交流精品资源
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    CLC TS 50131-2-10-2014 Alarm systems - Intrusion and hold-up systems - Part 2-10 Intrusion detectors - Lock state contacts (magnetic).pdf

    1、BSI Standards PublicationAlarm systems Intrusion and hold-up systemsPart 2-10: Intrusion detectors Lock state contacts (magnetic)PD CLC/TS 50131-2-10:2014National forewordThis Published Document is the UK implementation of CLC/TS 50131-2-10:2014.The UK participation in its preparation was entrusted

    2、by TechnicalCommittee GW/1, Electronic security systems, to Subcommittee GW/1/1,Alarm components.A list of organizations represented on this committee can be obtained onrequest to its secretary.This publication does not purport to include all the necessary provisions ofa contract. Users are responsi

    3、ble for its correct application. The British Standards Institution 2014.Published by BSI Standards Limited 2014ISBN 978 0 580 82745 7ICS 13.320Compliance with a British Standard cannot confer immunity fromlegal obligations.This Published Document was published under the authority of theStandards Pol

    4、icy and Strategy Committee on 31 May 2014.Amendments/corrigenda issued since publicationDate Text affectedPUBLISHED DOCUMENTPD CLC/TS 50131-2-10:2014TECHNICAL SPECIFICATION CLC/TS 50131-2-10 SPCIFICATION TECHNIQUE TECHNISCHE SPEZIFIKATION January 2014 CENELEC European Committee for Electrotechnical

    5、Standardization Comit Europen de Normalisation Electrotechnique Europisches Komitee fr Elektrotechnische Normung CEN-CENELEC Management Centre: Avenue Marnix 17, B - 1000 Brussels 2014 CENELEC - All rights of exploitation in any form and by any means reserved worldwide for CENELEC members. Ref. No.

    6、CLC/TS 50131-2-10:2014 E ICS 13.320 English version Alarm systems - Intrusion and hold-up systems - Part 2-10: Intrusion detectors - Lock state contacts (magnetic) Systmes dalarme - Systmes dalarme contre lintrusion et les hold-up - Partie 2-10: Dtecteurs dintrusion - Contact dtat de verrouillage (m

    7、agntique) Alarmanlagen - Einbruch- und berfallmeldeanlagen - Teil 2-10: Einbruchmelder - Verschluss- und ffnungsberwachungskontakte (magnetisch) This Technical Specification was approved by CENELEC on 2013-12-02. CENELEC members are required to announce the existence of this TS in the same way as fo

    8、r an EN and to make the TS available promptly at national level in an appropriate form. It is permissible to keep conflicting national standards in force. CENELEC members are the national electrotechnical committees of Austria, Belgium, Bulgaria, Croatia, Cyprus, the Czech Republic, Denmark, Estonia

    9、, Finland, Former Yugoslav Republic of Macedonia, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, the Netherlands, Norway, Poland, Portugal, Romania, Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and the United Kingdom. PD CLC/TS 50131-2-10:2

    10、014CLC/TS 50131-2-10:2014 2 Contents Page Foreword . 4 Introduction . 5 1 Scope 6 2 Normative references 6 3 Terms, definitions and abbreviations 7 3.1 Terms and definitions . 7 3.2 Abbreviations . 8 4 Functional requirements. 9 4.1 Events . 9 4.2 Signals or messages . 9 4.3 Detection 10 4.4 Operati

    11、onal requirements . 11 4.5 Tamper security . 11 4.6 Electrical requirements . 13 4.7 Environmental classification and conditions . 14 5 Marking, identification and documentation 15 5.1 Marking and/or identification . 15 5.2 Documentation 15 6 Testing 15 6.1 Generalities 15 6.2 General test condition

    12、s. 15 6.3 Basic test of detection capability 16 6.4 Verification of detection performance . 16 6.5 Switch-on delay, time interval between signals, and indication of detection . 17 6.6 Tamper security . 17 6.7 Electrical tests . 19 6.8 Environmental classification and conditions . 20 6.9 Marking, ide

    13、ntification and documentation 22 Annex A (normative) Dimensions EN 50131-2-3, Alarm systems Intrusion and hold-up systems Part 2-3: Requirements for microwave detectors; EN 50131-2-4, Alarm systems Intrusion and hold-up systems Part 2-4: Requirements for combined passive infrared and microwave detec

    14、tors; EN 50131-2-5, Alarm systems Intrusion and hold-up systems Part 2-5: Requirements for combined passive infrared and ultrasonic detectors; EN 50131-2-6, Alarm systems Intrusion and hold-up systems Part 2-6: Opening contacts (magnetic); CLC/TS 50131-2-8, Alarm systems Intrusion and hold-up system

    15、s Part 2-8: Intrusion detectors Shock detectors; CLC/FprTS 50131-2-9, Alarm systems Intrusion and hold-up systems Part 2-9: Intrusion detectors Active infrared beam detectors; CLC/TS 50131-2-10, Alarm systems Intrusion and hold-up systems Part 2-10: Intrusion detectors Lock state contacts (magnetic)

    16、 the present document; EN 50131-2-7-1, Alarm systems Intrusion and hold-up systems Part 2-7-1: Intrusion detectors Glass break detectors (acoustic); EN 50131-2-7-2, Alarm systems Intrusion and hold-up systems Part 2-7-2: Intrusion detectors Glass break detectors (passive); EN 50131-2-7-3, Alarm syst

    17、ems Intrusion and hold-up systems Part 2-7-3: Intrusion detectors Glass break detectors (active). Attention is drawn to the possibility that some of the elements of this document may be the subject of patent rights. CENELEC and/or CEN shall not be held responsible for identifying any or all such pat

    18、ent rights. PD CLC/TS 50131-2-10:2014CLC/TS 50131-2-10:2014 5 Introduction This Technical Specification applies to lock state contacts (magnetic) used as part of intrusion and hold-up alarm systems (I BTD Basic Test of Detection capability; PD CLC/TS 50131-2-10:2014CLC/TS 50131-2-10:2014 9 DC Direct

    19、 Current; EMC Electromagnetic Compatibility; RFID Radio Frequency Identification. 4 Functional requirements 4.1 Events The detector shall respond to events in accordance with Table 1 and as defined in this Clause 4. Table 1 Events to be processed and main functions to be provided by grade Event to b

    20、e processed and functions to be provided Grade 1 2 3 4 Break distance exceeded M M M M Inside make distance M M M M Remote enable of detection indication aOp Op M M Connecting field interference Op Op M M Prevention and detection of access to the inside of the detector OpbMcMcMcRemoval from the moun

    21、ting surfacedOp M M M Low power supply voltageeOp Op M M Total loss of external powerfM M M M Matched pairs, coding and encryptionOp Op M gM gKey M = Mandatory Op = Optional a Only required if detection indicator present. b Generation of a tamper signal for opening by normal means is not required. c

    22、 Not required for sealed lock state contacts according to 4.5.2. d Mandatory for wire-free at grades 2, 3 and 4; mandatory for all grade 4 types, optional for wired grades 1, 2 and 3. e See 4.6.7. f See 4.6.6. g See 4.5.5. 4.2 Signals or messages The response to the signals or messages generated by

    23、the detector is determined by the I at least one of these signals or messages (Intrusion or/and Tamper or/and Fault) shall be generated or an independent signal or message shall be generated. b Required only if the make and break distances are greater than twice the distances specified by the manufa

    24、cturer (see 6.6.4); either intrusion AND fault signals or messages, OR an independent signal or message shall be generated. c See 4.6.7. d See 4.6.6. 4.3 Detection 4.3.1 Detection performance 4.3.1.1 Generalities The operating parameters of the detector shall be verified as specified by the manufact

    25、urer for the axes of movement shown in Annex D. The operating parameters shall be defined under the condition that a successful locking position is ensured. The manufacturer shall clearly state in the product documentation all removal/break and approach/make distances including their tolerance range

    26、 for each distance in order to specify all potential variances due to product design and manufacturing. Furthermore, the manufacturer shall clearly state as well in the product documentation any special limitation concerning installation e.g. a prohibited area between a surface on the detector and t

    27、he minimum make distance. 4.3.1.2 Removal/break distance The detector shall generate an intrusion signal or message at the removal/break distance specified by the manufacturer. This distance shall be specified for all normal operating axes. If the detector is designed for installation on ferromagnet

    28、ic surfaces or in ferromagnetic material, the removal/break distance shall also be specified for all normal operating axes when the detector is mounted using the material as specified in Annex E. PD CLC/TS 50131-2-10:2014CLC/TS 50131-2-10:2014 11 4.3.1.3 Approach/make distance The detector shall gen

    29、erate a reverse signal or message at the minimum separation distance(s) specified by the manufacturer. This distance(s) shall be specified for all normal operating axes. If the detector is designed for installation on ferromagnetic surfaces or in ferromagnetic material, the approach/make distance sh

    30、all be specified for all normal operating axes when the detector is mounted using the material as specified in Annex E. 4.3.2 Indication of detection When a detection indicator is provided to show when an intrusion signal or message is generated and in normal operation visible (e.g. surface mounted

    31、contacts) when installed according to the manufacturers instructions, this indicator shall be capable of being enabled and disabled. The adjustment to enable or disable this indication locally within the detector shall only be accessible when the detector is opened by normal means, in case of openin

    32、g is required. A detector at grade 3 or grade 4 shall be capable of receiving indication enable and disable commands from the CIE when such an indicator is present, according to clause one of this paragraph. 4.4 Operational requirements 4.4.1 Time interval between intrusion signals or messages Detec

    33、tors using wired interconnections shall be able to provide an intrusion signal or message not more than 15 s after the end of the preceding intrusion signal or message. Detectors using wire free interconnections shall be able to provide an intrusion signal or message after the end of the preceding i

    34、ntrusion signal or message within the following times: Grade 1 300 s; Grade 2 180 s; Grade 3 30 s; Grade 4 15 s. 4.4.2 Switch on delay Where a detector requires an internal or external power supply in accordance with 4.6, the detector shall meet all functional requirements within 180 s of the power

    35、supply reaching its nominal voltage. 4.4.3 Fault condition signals A detector shall generate a fault signal or message in accordance with the manufacturers specification and the provisions of Table 2 in the presence of a fault condition, according to Table 1, or as a result of an internal self-test,

    36、 if this feature is provided. 4.5 Tamper security 4.5.1 Tamper security requirements All terminals and means of mechanical and electronic adjustments shall be located within the detectors housings. The tamper security requirements for each grade of detector are shown in Table 1. PD CLC/TS 50131-2-10

    37、:2014CLC/TS 50131-2-10:2014 12 4.5.2 Prevention and detection of access to the inside of the detector through covers and existing holes Access holes shall not allow interference with the operation of the detector by probing with commonly available tools. Damage shall not be caused that would prevent

    38、 normal operation. If the detector can be opened, a tool shall be required to open the unit. For grades 2, 3 and 4 detectors all covers giving access to components that could adversely affect the operation of the detector shall be fitted with a tamper detection device that shall generate signals or

    39、messages in accordance with Table 2. It shall not be possible to gain such access without generating a tamper signal or message or causing visible damage. Sealed contacts do not require the means to detect access to the inside of the detector. 4.5.3 Detection of removal from the mounting surface Mea

    40、ns shall be provided which generates a tamper signal or message in accordance with Table 2 if the detector is removed from the mounting surface. Operation of the tamper detection means shall not be compromised by deliberate tamper actions. The means shall activate before access can be gained to it.

    41、4.5.4 Magnetic or electromagnetic field interference When the detector is mounted in accordance with the manufacturers instructions and is subject to the presence of an external field, which is based on the same physical principal as the connecting field (e.g. magnetic or electromagnetic) generated

    42、by: the interference test unit as specified in Annex A and one interference test unit which is identical to the corresponding unit, each applied to the faces of the detector according to Annex F for purely magnetic field based products (one after one) to generate an external connecting field; an int

    43、erference test unit based on the same physical principal and digital identification means (e.g. tag number provided by a RFID field, if encryption is not provided) applied to the faces of the detector according to Annex F to generate an external connecting field; the detector shall either: a) be imm

    44、une to any influence by each of the interference test units and continue to operate normally with the make and break distances not exceeding twice those specified in accordance with 4.3.1, or b) generate an intrusion, and/or tamper, and/or fault, and/or other independent signal or message in accorda

    45、nce with Table 2 when the make or break distances exceed twice those specified in accordance with 4.3.1; these signals or messages may be generated either on application of the interference test unit or when the corresponding unit has returned to its original installed position. NOTE The signals or

    46、messages generated by a grade 4 detector are intended to be used by the I alternatively, for Grade 3 products, the process unit shall stay in the state that represents an intrusion event. PD CLC/TS 50131-2-10:2014CLC/TS 50131-2-10:2014 13 4.5.5 Matched pairs, coding and encryption If a grade 4 detec

    47、tor is a purely magnetic field based product, it shall consist of a matched pair of switch component and corresponding unit or similar means. The means of matching shall have a minimum of 8 differs. It shall not be possible to determine the specific pair identity by visual inspection of the detector

    48、. If the connection between the process and the corresponding unit relies purely on digital identification means (e.g. tag number provided by a RFID field), it shall not be easily possible to simply read out the digital identification information and to generate a copy of the unit that holds the dig

    49、ital identification information. This applies to grade 3 and grade 4 digital identification means based products. In such cases, encryption, rolling code or other protection mechanisms shall provide a certain level of security. 4.6 Electrical requirements 4.6.1 Grade dependencies The requirements of 4.6.2 to 4.6.5 only apply to detectors having external power to operate the components of the detector. Table 3 Electrical requirements Test Grade 1 Grade 2 Gra


    注意事项

    本文(CLC TS 50131-2-10-2014 Alarm systems - Intrusion and hold-up systems - Part 2-10 Intrusion detectors - Lock state contacts (magnetic).pdf)为本站会员(testyield361)主动上传,麦多课文档分享仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文档分享(点击联系客服),我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1 

    收起
    展开