You are on page 1of 8

private branch exchange (PBX) is a telephone exchange that serves a


particular business or office, as opposed to one that a common
carrier or telephone company operates for many businesses or for the general
public. PBXs are also referred to as:
PABX - private automatic branch exchange
EPABX - electronic private automatic branch exchange

EPABX
A private branch exchange (PBX) is a telephone exchange that serves a
particular business or office, as opposed to one that a common or telephone
company operates for many businesses or for the general public. PBXs are
also referred to as:
* PABX - private automatic branch exchange 
* EPABX - electronic private automatic branch exchange
PBXs make connections among the internal telephones of a private
organization — usually a business — and also connect them to the public
switched telephone network (PSTN) via trunk lines. Because they
incorporate telephones, fax machines, modems, and more, the general term
"extension" is used to refer to any end point on the branch.
PBXs are differentiated from "key systems" in that users of key systems
manually select their own outgoing lines, while PBXs select the outgoing
line automatically. Hybrid systems combine features of both.

PBX functions
Functionally, the PBX performs four main call processing duties:
Establishing connections (circuits) between the telephone sets of two users
(e.g. mapping a dialled number to a physical phone, ensuring the phone isn't
already busy)
Maintaining such connections as long as the users require them (i.e.
channelling voice signals between the users)
Disconnecting those connections as per the user's requirement
Providing information for accounting purposes (e.g. metering calls)
In addition to these basic functions, PBXs offer many other calling
features and capabilities, with different manufacturers providing different
features in an effort to differentiate their products

System components
A PBX will often include:
The PBX’s internal switching network.
Microcontroller or microcomputer for arbitrary data processing, control and
logic.
Logic cards, switching and control cards, power cards and related devices
that facilitate PBX operation.
Stations or telephone sets, sometimes called lines.
Outside Telco trunks that deliver signals to (and carry them from) the PBX.
Console or switchboard allows the operator to control incoming calls.
Uninterruptible Power Supply (UPS) consisting of sensors, power switches
and batteries.
Interconnecting wiring.
Cabinets, closets, vaults and other housings.

Investigate the principles of describe the methods by which signals convey


information transmission
Information systems using analogue and analyse an information system
digital techniques as related
• analyse transfer functions for various control to control loops and systems.

Burglar alarms
Burglar (or intrusion), fire, and safety alarms are electronic alarms designed
to alert the user to a specific danger. Sensors are connected to a control unit
via low-voltage wiring or a narrowband RF signal which is used to interact
with a response device. The most common security sensors are used to
indicate the opening of a door or window or detect motion via passive
infrared (PIR). New construction systems are predominately hardwired for
economy. Retrofit installations often use wireless systems for a faster, more
economical installation. Some systems serve a single purpose of burglar or
fire protection. Combination systems provide both fire and intrusion
protection. Systems range from small, self-contained noisemakers, to
complicated, multi-zoned systems with color-coded computer monitor
outputs. Many of these concepts also apply to portable alarms for protecting
cars, trucks or other vehicles and their contents (i.e., "car alarms"). See
also fire alarm control panel for specific fire system issues. Burglar alarms
are sometimes referred to as alarm systems, see burglar alarm control
panel for a discussion of hard-wired burglar alarm system design.
Burglar alarms (or perimeter detection systems, Perimeter
protection, intrusion detection systems and many more terms for the same
thing) are divided to two main fields: home burglar alarms and industrial
burglar and perimeter intrusion detection.

Main types of burglar alarms


As you have already understood that there are mainly two kinds of burglar
alarms. To know more about these alarms you can learn the details below:

Electric Circuit - These are the most simple alarm systems that use electrical
circuits. Generally, you can employ them to protect the borders of your
house, that is the probably the entrypoints to your house that the burglar
might use. These security systems are further divided into two types:
a) Closed-circuit systems - In this system as long as your door is closed the
electric circuit remains closed and whenever somebody opens the door, the
circuit becomes discontinuous, and the alarm is set off.
b) Open-circuit systems - In an open circuit what happens is when somebody
opens the door the open-circuit is completed and electricity starts flowing so
the alarm is prompted.

Motion Detectors - These are the other type of security systems. They can
detect burglars who have already entered your house. Their principle of
working is to send out radio energy and observing the reflection pattern.
Now when someone walking into the room obstructs the reflection pattern,
the alarm gets active and sends a signal to the control box.
If you are looking for a full proof security system to protect your house, you
can use the combination of the motion detectors and open or closed circuit
alarms.

How does a Burglar Alarm work?


Now-a-days you would find that most of the Burglar alarms are available in
electronic form. Lets see how they work: the control unit of the system is
connected with the sensors through either narrowband RF signal or low-
voltage hardwire and these in turn are joined to a means, which announces
the alarm, to extract response.
The opening of a door or movement of a body sensed through passive
infrared (PIR) is detected by these security sensors. In the new construction
systems the hardwire is prime, as its economic. Where as the retrofits
wireless systems are economically more viable and can be installed faster.
There are various ways in which the modern burglars alarm functions. The
alarms can even snoop the variation in temperature or activities in any part
of the house where it has been installed. There are sufficient choices of
home burglar alarms available, just decide which one fits you the best.

Video Surveillance System


Video Surveillance System is an important security requirement to be
provided at waiting hall, railway yards, workshops, reservation counter,
parking area, main entrance/ exit, platforms, foot over bridges etc. of railway
station and others railway establishments to capture images of commuters &
public and to carry out analysis.

Types of cameras available for video surveillance


You have a broad range of video surveillance cameras available to you.
Understanding the different kinds will make it easier to determine which one
suits you best.
Fake security cameras – These are not actual cameras. They are a very
inexpensive alternative to purchasing an actual system. While these cameras
can act as a deterrent, should something happen, you will not have a record
of it.
 
Covert surveillance cameras – These cameras look like regular items. A wall
clock in a small store, a teddy bear in a baby’s room, a potted plant by the
front door—each one of these could very easily be a surveillance camera.
You can record without anyone knowing it.
 
Wireless security cameras – These offer more flexibility in set up. They are
easy to install, can be moved easily, are often small, have no tell-tale wires,
and are very discreet.
 
Wired surveillance cameras – These cameras are appropriate for permanent
setup. If you have one location that you would like to constantly monitor and
will not need it to be changed, a wired camera is an option. Some may have
to be professionally installed.
 
Night vision security cameras – These are ideal for any low-light areas, not
just for the night time. The camera records in black and white in order to
capture images best.
 
Home surveillance cameras – When you buy a setup for home, you get a
helpful system that often includes such bonuses as timers for your lamps and
motion sensors to go with the wireless camera
Access control is a system which enables an authority to control access to
areas and resources in a given physical facility or computer-based
information system. An access control system, within the field of physical
security, is generally seen as the second layer in the security of a physical
structure.
Access control is, in reality, an everyday phenomenon. A lock on a car door
is essentially a form of access control. A PIN on an ATM system at a bank is
another means of access control. Bouncers standing in front of a night
club is perhaps a more primitive mode of access control (given the evident
lack of information technology involved). The possession of access control
is of prime importance when persons seek to secure important, confidential,
or sensitive information and equipment.

Item control or electronic key management is an area within (and possibly


integrated with) an access control system which concerns the managing of
possession and location of small assets or physical (mechanical) keys.

Access control system operation


When a credential is presented to a reader, the reader sends the credential’s
information, usually a number, to a control panel, a highly reliable
processor. The control panel compares the credential's number to an access
control list, grants or denies the presented request, and sends a transaction
log to a database. When access is denied based on the access control list, the
door remains locked. If there is a match between the credential and the
access control list, the control panel operates a relay that in turn unlocks the
door. The control panel also ignores a door open signal to prevent an alarm.
Often the reader provides feedback, such as a flashing red LED for an access
denied and a flashing green LED for an access granted.

The above description illustrates a single factor transaction. Credentials can


be passed around, thus subverting the access control list. For example, Alice
has access rights to the server room but Bob does not. Alice either gives Bob
her credential or Bob takes it; he now has access to the server room. To
prevent this, two-factor authentication can be used. In a two factor
transaction, the presented credential and a second factor are needed for
access to be granted. another factor can be a PIN, a second credential,
operator intervention, or a biometric input.
There are three types (factors) of authenticating information:
something the user knows, usually password or any passphrase
something the user has, such as smart card
something the user is,such as fingerprint, verified by biometric measurement
passwords are a common means of verifying user's identity before access is
given to information system electronic access control system, start by
considering what other applications it would have to connect with. The two
most common are monitored alarms and time and attendance.

Decide if you want a free exit or controlled exit system. In a free


exit system, there is no requirement for passing out of the secure area. The
electronic access control system either detects someone approaching an exit
(usually through motion sensors) and unlocks the door, or has a release
button or bar that allows people to leave.

Controlled exit systems use the same security for travel in both directions:
employees have to enter the code or wave their card to get in or out of the
secure area. By law they have to be set up to allow people to exit if the
system fails or power goes out. Controlled exit systems increase both
security and your overall costs.

Finally, think about the number of doors you need to secure. Smaller
installations may include just one: a server room, or the main entrance. Not
every door has to have electronic access control – you can simply leave
some locked and only give keys to appropriate personnel.

Electronic access control features


In smaller systems, you simply connect a PC to the keypad or reader to
configure the system. Larger electronic access control systems may need a
dedicated computer to manage multiple doors. Some features to look for:
Timing – lets you set specified times when the door should lock and unlock.

Tracking – reports who opened the door and when.

Battery backup – keeps your premises secure even during a power failure.

A server room is a room that houses mainly computer servers.


In information technology circles, the term is generally used for smaller
arrangements of servers; larger groups of servers are housed indata centers.

Server rooms usually contain headless computers connected remotely


via KVM switch, ssh, VNC, or remote desktop.[1][2][3][4][5]

In many cases, servers are located separately from a company's wiring


closet. In such instances tie cables, either copper or fiber, must be installed
to provide connectivity between the network equipment, which provides the
pipe to the end user, and the company's servers, which store the important
information.

You might also like