You are on page 1of 14

Electrical Layout

Electrical Layout is a type of technical drawing that shows information about


power, lighting, and communication for an engineering or architectural project.
Electrical Layout in residentials composed of two (2 )drawings: Lighting Layout
and Power Layout.
Lighting layout coordinates the fixture locations with switches/diffusers, and
other elements, while Power Layout is the source of its power to generate
electricity on a lighting fixture or any appliances.
Plan for Lighting. Layout and wiring plans for general lighting on floor plans
drawn, shall show:

1. Location of lighting fixtures in each room or area. In residences, hotels,


apartment houses, and churches, the illumination level in each room or area
need not be shown nor computed;
2. Location of switches for each fixtures or group of fixtures;
3. Complete wiring of emergency lighting system, if any;
4. A combination drawing showing layout of receptacle outlets may be made at
the discretion of the design Engineer or an Architect

Plan for Lighting. Location of outlets in each room or area. In residences, hotels,
apartment houses, and churches should illustrated.
Sample Power Layout
Symbols
Electrical symbols are required to do the electrical drawing or layout. Without the
help of electrical symbols, we won't be able to do the electrical drawing. Electrical
circuits are represented by electrical drawings. Symbols and number combinations
are used to represent electrical circuits
Illustrations made by Ar. Elcano
Sample Lighting Layout

Illustrations made by Ar. Elcano


How Electricity Travels Throughout Our Home

1. Electricity is made at a generating station by huge generators. Generating


stations can use wind, coal, natural gas, or water.
2. The current is sent through transformers to increase the voltage to push the
power long distances.
3. The electrical charge goes through high-voltage transmission lines that stretch
across the country.
4. It reaches a substation, where the voltage is lowered so it can be sent on
smaller power lines.
5. It travels through distribution lines to your neighborhood. Smaller
transformers reduce the voltage again to make the power safe to use in our
homes. These smaller transformers may be mounted on the poles, or sitting on
the ground (they’re the big green boxes, called pad mount transformers).
6. It connects to your house and passes through a meter that measures how much
your family uses.
7. The electricity goes to the service panel in your basement or garage, where
breakers or fuses protect the wires inside your house from being overloaded.
(Never touch a service panel! It is only to be operated by your parents or a
professional.)
8. The electricity travels through wires inside the walls to the outlets and
switches all over your house.
Fire Detection and Alarm System (FDAS) Detection and Alarm System may also incorporate a remote signal system which
could then alert the fire brigade via a central station.
Fire alarm systems are important in providing occupants of buildings prompt
warning if a fire occurs. Systems that are not properly installed or maintained may This video shows the principle behind FDAS
cause unwanted alarm activations. This has a negative effect on occupants'
responses to genuine alarms and as a result downgrades their effectiveness Different Parts of Fire Detection and Alarm System (FDAS)


FDAS lecture ● Detectors
● Control Panel/Unit
Automated Building Security System ● Alarm Devices
The most basic definition of any Automated Building Security System is found in ● Wiring or Circuitry
its name. It is literally a means or method by which something is secured through a
system of interworking components and devices.
Control Panels
In this instance, we’re talking about security systems, which are networks of
The control panel is the "brain" of the fire detection and alarm system. It is
integrated electronic devices working together with a central control panel to
responsible for monitoring the various alarm "input" devices such as manual and
protect against burglars and other potential intruders.
automatic detection components, and then activating alarm "output" devices such
Fire Detection and Alarm System (FDAS) as horns, bells, warning lights, emergency telephone dialers, and building controls.
It is the central hub for all of the detector signals to be wired to and provides a
Fire Detection and Alarm System (FDAS) status indication to the users. The unit can also be set up to simulate an alarm for
A key aspect of fire protection is to identify a developing fire emergency in a use in routine Fire and evacuation drills, so all staff knows what action to take in
timely manner, and to alert the building's occupants and fire emergency the event of a real fire.
organizations. This is the role of Fire Detection and Alarm System. Depending on
the anticipated fire scenario, building and use type, number and type of occupants,
and criticality of contents and mission, these systems can provide several main
functions.
Fire Detection and Alarm System is designed to alert us to an emergency so that
we can take action to protect ourselves, staff and the general public.These systems
are found in Offices, Factories, and public buildings, they are a part of our
everyday routine but are often overlooked until there is an emergency at which
point, they might just save our lives.
Whatever the method of detection is, if the alarm is triggered, sounders will
operate to warn people in the building that there may be a fire and to evacuate. Fire
Fire Alarm Detectors
At the core of a fire alarm system are the detection devices, from sophisticated
intelligent smoke detectors to simple manually operated break glass units, there are
a wide array of different types, but we can divide them into groups including:

● Heat detectors
● Smoke detectors
● Carbon Monoxide detectors
● Multi-sensor detectors
● Manual Call Points

Commonly Heat detectors work in a similar way to an electrical fuse, the detectors
contain a eutectic alloy which is heat sensitive when a certain temperature is
reached the alloy turns from a solid to a liquid which in turn triggers the alarm.
Smoke Detectors
There are three basic types of smoke detectors including:

● Ionization
● Light Scattering
● Light Obscuring

Heat Detectors Ionization Smoke Detector


Heat detector can either work on a fixed temperature basis, where it will trigger an Ionization Smoke detector generally contains two chambers. The first is used as a
alarm if the temperature exceeds a pre-set value or they can work on the rate of reference to compensate for changes in ambient temperature, humidity or pressure.
change in temperature. The second chamber contains a radioactive source, usually alpha particle, which
ionizes the air passing through the chamber where a current flows between two
electrodes. When smoke enters the chamber the current flow decreases. This drop
in current flow is used to initiate an alarm.
The variation in photocell output, is being used to initiate an alarm. This type of
detection can be used to protect large areas with the light source and photocell
positioned some distance apart.

Light Scattering Smoke Detector


The light scattering smoke detector operates on the Tyndall effect; a photocell and Carbon Monoxide
light source are separated from each other by a darkened chamber such that the
light source does not fall on the photocell. Carbon monoxide detectors are known also as CO fire detectors are electronic
detectors used to indicate the outbreak of fire by sensing the level of carbon
The passage of smoke into the chamber causes the light from the source to be monoxide in the air.
scattered and fall on the photocell. The photocell output is being used to initiate an
alarm. Carbon monoxide is a poisonous gas produced by combustion.
In this instance, these detectors are not the same as Carbon monoxide detectors
used in the home for protecting residents against carbon monoxide produced by
incomplete combustion in appliances such as gas fires or boilers.
Carbon Monoxide fire detectors use the same type of sensor as those in the home
but are more sensitive and respond more quickly. Carbon monoxide detectors have
an electrochemical cell, which senses carbon monoxide, but not smoke or any
other combustion products.

Light Obscuring Smoke Detector


In the Light obscuring smoke detector, smoke interferes with a light beam between
a light source and photocell. The photocell measures the amount of light it
receives.
Multi-Sensor Detectors
The Multi-sensor detectors combine inputs from both optical and heat sensors and
process them using a sophisticated algorithm built into the detector circuitry.
When polled by the control panel the detector returns a value based on the
combined responses from both the optical and heat sensors. They are designed to
be sensitive to a wide range of fires.

Different Types of Fire Alarm Systems


Fire Alarm Systems can be broken down into four main types;

● Conventional
● Addressable
● Intelligent
Manual Call Points ● Wireless
A Manual Call Point or Break Glass Call Point is a device which enables personnel
to raise the alarm by breaking the frangible element on the fascia; this then triggers Conventional Fire Alarm Systems
the alarm.
In a Conventional Fire Alarm System, physical cabling is used to interconnect
several call points and detectors, the signals from which are wired back to the main
control unit.
Addressable Fire Alarm Systems
The detection principle of an Addressable System is the same as a Conventional
System except that each detector is given a set Address (usually by means of a dip-
switch) and the Control Panel can then determine exactly which detector or call
point has initiated the alarm.
Intelligent Fire Alarm Systems
However, in our next type of System, which is an Intelligent Fire Alarm system,
each detector effectively incorporates its own computer which evaluates the
environment around it and communicates to the Control Panel whether there is a
fire, fault or the detector head needs cleaning.
Essentially Intelligent Systems are far more complex and incorporate far more
facilities than Conventional or Addressable Systems. Their primary purpose is to
help prevent the occurrence of false alarms.
Wireless Fire Alarm Systems
The final type of system we will consider is the Wireless Fire Alarm System.
These are an effective alternative to traditional wired fire alarm systems for all
applications. They utilize secure, license-free radio communications to
interconnect the sensors and devices with the controllers.
It is a simple concept, which provides many unique benefits and is a full intelligent
fire detection system without the need for cabling.
We have learned that Fire Alarm systems are fitted in many buildings we
encounter every day and that they are used to warn people within the building of
an emergency fire-related situation.
Wiring or Cable
The two types of cables used for the installation of Security Cameras and Digital
Video Recorders (DVRs) are Plug and Play Cables
Automated Building Security System Sensors
Devices which detect intrusions. Sensors may be placed at the perimeter of the
● protected area, within it, or both. Sensors can detect intruders by a variety of
● Intruder Alarm System methods, such as monitoring doors and windows for opening, or by monitoring
unoccupied interiors for motions, sound, vibration, or other disturbances.
● Electronic Building Access System
Alerting devices
● Closed Circuit Television (CCTV)
These indicate an alarm condition. Most commonly, these are bells, sirens, and/or
flashing lights. Alerting devices serve the dual purposes of warning occupants of
1. Intruder Alarm System intrusion, and potentially scaring off burglars. These devices may also be used to
warn occupants of a fire or smoke condition.
Intruder/burglar alarm system is a set of interconnected devices that is aimed to
protect an object, usually a facility, against intruders and to notify the owner Keypads
or/and the monitoring station/center of any violation of the protected zones.
Depending on the requirements and financial possibilities, it can be a simple alarm Small devices, typically wall-mounted, which function as the human-machine
system suitable for a basic protection of a home/apartment, or a more advanced interface to the system. In addition to buttons, keypads typically feature indicator
structure, which in addition to the basic functions will greatly improve the life lights, a small multi-character display, or both.etc.
comforts of the users. Interconnections between components. This may consist of direct wiring to the
The designer of the system, usually the installation company or simply the control unit, or wireless links with local power supplies
installer, can greatly help the investor/user (customer) to choose an optimal Different Sensors
solution, depending on the characteristics of the facility and the customer needs,
also taking into account expansion options for the future. More advanced alarm Passive Infrared Detectors
systems can perform functions like access control (motorized gates, electric strikes
in wickets/doors), lighting and heating control, and many other tasks of A passive infrared sensor used to detect motion. The passive infrared (PIR) motion
home/building automation. detector is one of the most common sensors found in household and small business
environments. It offers affordable and reliable functionality. The
The interface devices (manipulators) are modern keypads and touch panels, which term passive refers to the fact that the detector does not generate or radiate its own
beyond the aesthetic appearance and intuitive operation have the ability to store energy; it works entirely by detecting the heat energy given off by other objects.
maps of the facility on memory cards for easier control of the entire system, as
well as (optionally) mobile phones or handhelds and PCs with dedicated Infrasound Detectors
applications and Internet connection.
The infrasound detector works by detecting infrasound, or sound waves at
Typical Components: frequencies below 20 hertz. Sounds at those frequencies are inaudible to the human
ear. Due to its inherent properties, infrasound can travel distances of many
Premises control unit (PCU), Alarm Control Panel (ACP), or simply panel hundreds of kilometers. Infrasound signals can result from volcanic eruptions,
earthquakes, gravity waves, opening and closing of doors, forcing windows to
The "brain" of the system, it reads sensor inputs, tracks arm/disarm status, and name a few.
signals intrusions. In modern system, this is typically one or more computer circuit
boards inside a metal enclosure, along with a power supply. The entire infrasound detection system consists of the following components:
a speaker (infrasound sensor) as a microphone input, Window foil is a less sophisticated, mostly outdated detection method that
involves gluing a thin strip of conducting foil on the inside of the glass and putting
an order-frequency filter, an analog to digital (A/D) converter, low-power electric current through it. Breaking the glass is practically guaranteed
and finally an MCU, which is used to analyse the recorded signal. to tear the foil and break the circuit.

Microwave Detectors Smoke, Heat, And Carbon Monoxide Detectors

This device emits microwaves from a transmitter and detects any reflected These are also known as 24-hour zones (which are on at all times). Smoke and heat
microwaves or reduction in beam intensity using a receiver. The transmitter and detectors protect from the risk of fire using different detection methods. Carbon
receiver are usually combined inside a single housing (monostatic) for indoor monoxide detectors help protect from the risk of carbon monoxide poisoning.
applications, and separate housings (bistatic) for outdoor applications. To reduce Although an intruder alarm panel may also have these detectors connected, it may
false alarms this type of detector is usually combined with a passive infrared not meet all the local fire code requirements of a fire alarm system. – SEE FDAS
detector, or Dual Tec brand or similar alarm. Motion Sensors
Microwave detectors respond to a Doppler shift in the frequency of the reflected Motion sensors are devices that use various forms of technology to detect
energy, by a phase shift, or by a sudden reduction of the level of received energy. movement. The technology typically found in motion sensors to trigger an alarm
Any of these effects may indicate motion of an intruder. includes infrared, ultrasonic, vibration and contact. Dual technology sensors
Photoelectric Beams combine two or more forms of detection in order to reduce false alarms as each
method has its advantages and disadvantages.
Photoelectric beam system detect the presence of an intruder by transmitting
visible or infrared light beams across an area, where these beams may be Traditionally motion sensors are an integral part of a home security system. These
obstructed. To improve the detection surface area, the beams are often employed in devices are typically installed to cover a large area as they commonly cover up to
stacks of two or more. However, if an intruder is aware of the technology's 40 ft with a 135° field of vision.
presence, it can be avoided. Security Electric Fence
The technology can be an effective long-range detection system, if installed in Security electric fences consist of wires that carry pulses of electric current to
stacks of three or more where the transmitters and receivers are staggered to create provide a non-lethal shock to deter potential intruders. Tampering with the fence
a fence-like barrier. Systems are available for both internal and external also results in an alarm that is logged by the security electric fence energiser, and
applications. To prevent a clandestine attack using a secondary light source being can also trigger a siren, strobe, and/or notifications to a control room or directly to
used to hold the detector in a sealed condition whilst an intruder passes through, the owner via email or phone.
most systems use and detect a modulated light source
In practical terms, security electric fences are a type of sensor array that acts as a
Glass-Break Detection (or part of a) physical barrier, a psychological deterrent to potential intruders, and
The glass-break detector may be used for internal perimeter building protection. as part of a security alarm system.
Glass-break acoustic detectors are mounted in close proximity to the glass panes
and listen for sound frequencies associated with glass breaking. ●

Seismic glass-break detectors, generally referred to as shock sensors, are different


in that they are installed on the glass pane. When glass breaks it produces specific ●
shock frequencies which travel through the glass and often through the window
frame and the surrounding walls and ceiling.
● Advantages: less expensive than many other methods, less likely to ● Disadvantages: Must be fence-mounted. Being mechanical in nature,
give false alarms than many other alternative perimeter security the system is unable to analyze differences in the pattern of vibrations
methods, and highest psychological deterrent of all methods. (for example, the difference between gusts of wind and a person
● Disadvantage: potential for unintended shock. climbing the fence

1. Electronic Building Access System

Large companies use this system to control employee by identifying an authorized


individual and allowing that person access to a restricted area. It also improves
employee productivity by preventing unrestricted traffic to different areas. It can
also track and recall the employee information at a later time through its
information data base.
Keycard Lock/Electronic Cardkey
Keycard Lock/Electronic Keycard is a lock operated by a keycard, a flat,
rectangular plastic card with identical dimensions to that of a credit card or
http://www.acceso-ph.com/electric-fences.html (Links to an external site.) American and EU driver's license. The card stores a physical or digital pattern that
the door mechanism accepts before disengaging the lock.
Electro-Mechanical (Shaker) Sensors
There are several common types of keycards in use, including the mechanical
These electro-mechanical devices are mounted on barriers and are used primarily holecard, barcode, magnetic stripe, Wiegand wire embedded cards, smart card
to detect an attack on the structure itself. (embedded with a read/write electronic microchip), and RFID proximity cards.
Keycards are frequently used in hotels as an alternative to mechanical keys.
The technology relies on an unstable mechanical configuration that forms part of
the electrical circuit. When movement or vibration occurs, the unstable portion of Keypad
the circuit moves and breaks the current flow, which produces an alarm. The
medium transmitting the vibration must be correctly selected for the specific Wall or door mounted, this type of lock system requires a numerical code to grant
sensor as they are best suited to different types of structures and configurations. entry to a facility or property. The code is punched in by users via a numerical pad,
similar to those on a basic calculator. If the correct code is entered, the door lock
or deadbolt should release. Some mechanisms require batteries or a small electrical
● current in order to unlock.
Some keypad locks have an integrated security feature that keeps the door locked
● for a set amount of time (usually 10 to5 minutes) after several incorrect attempts to
enter the code.
● Advantages: Low-cost and easily installed on existing fences. Benefits of Keypad Locks
There are many benefits to choosing this type of keyless lock over conventional
locking mechanisms.
Convenience of a Keyless System
The biggest advantage is convenience. It eliminates the necessity of keys. There’s
no need to carry them around, keep track of copies and spares, or change locks
when a key is stolen or misplaced. Children, guests and service providers can be
given their own code or a temporary code, rather than a key.

Facial Recognition
Facial Recognition is a modern analytics program that identifies and authenticates
a specific person by their facial features. The software uses biometrics to map the
geometry of the face. It notes more than sixty facial landmarks, measuring and
then calculating a number to represent the combined relative distances. The result
is called a ‘faceprint.’ Cross-referencing the result of this mathematical formula
with known databases quickly confirms identity.
Face identifiers offer advantages in safety, security, retail, customer loyalty and
law enforcement.
Biometric Access Control
Biometric Access Control is a system that holds the door for intruders and prevents
them from accessing the resources by verifying them as unauthorized persons on
the basis of biometrics authentication. In Biometric Access Control system,
biometric authentication refers to the recognition of human beings by their
physical uniqueness (like thumbmark, eyes).
Biometric Access Control system scans the person and matches his/her biometric
data with the previously stored information in the database before he/she can
access the secured zone or resources.

1. Closed Circuit Television (CCTV)


Closed Circuit Television is a system in which all elements – from the cameras to drive recklessly, and to penalize those drivers while preventing more serious crime
the recording devices – are directly connected in order to keep the video from elsewhere.
being broadcast over public airwaves and on a closed circuit (hence the name).
Types of Systems Available
CCTV was first used by the Germans to observe the launch of the V2 rockets.
Since then, it has evolved into the comprehensive security camera technology we There are several different CCTV systems available to the public, but each falls
know and use it as today. From public buildings to private offices, residential into one of the following three categories:
homes to major thoroughfare and streets, strategically placed security cameras are Simple CCTV Systems, which consist of a camera (or cameras) connected to a
used to view events as they occur, as well as to capture footage for monitoring at a monitor by a single coax cable. In a simple system, the cameras gain their power
later time. Some common uses for CCTV technology include: from the monitor.
Home Security Mains Powered CCTV Systems, which work in the same way as simple
Homes with security camera surveillance are far less likely to be burglarized or arrangement, except instead of the camera gaining its power from the monitor,
vandalized than those without. Though security cameras don’t do anything to both camera and monitor are powered separately through the mains. This type of
physically prevent crime from happening, homeowners today use them to deter setup allows for more scalability, as it’s easier to add more cameras to the system
criminals from trespassing and to keep their families safe. without worrying about the lack of power.

Another residential use for CCTV technology is as a “nanny-cam.” Nanny-cam Systems with Recording Capabilities, which incorporate video recorders that
recordings serve as great resources for those who are curious as to how their allow for data preservation and the ability to monitor footage at a later time. A
household staff spends their time. Parents also use nanny-cams to ensure that their DVR can be added to this system as well for additional storage and video retrieval
children are left in good hands when they are gone for any length of time or transmission

Business Types CCTV Available in the Market

Businesses use CCTV technology for a number of reasons, including as a crime *PTZ means Pan–tilt–zoom
deterrent. Banks, offices, museums, restaurants, retail stores, and other businesses Components of CCTV
are a hotbed for crime, as most always have cash on hand. To protect the money,
business owners strategically place security cameras at registers, in back offices, The four components of all CCTV security systems are the camera, the monitor,
near safes, and at the entrances. Retail stores use security cameras on the sales DVR and the cable. While other supplemental components may be added into
floors to deter shoplifting and vandalism. more complex systems.
Much like with the nanny-cam, businesses also use security cameras to monitor Camera
employees and to make sure that they are making the best use of their time. This is
especially handy when a business employees night crews, such as cleaning and The camera is the eye of the system. Its only function is to provide a view of the
maintenance crews, call center staff, and inventory management teams. site under surveillance by sending an electronic signal along a video cable. It is
passive, it only views the scene similar to the human eye.
Traffic Monitoring
Monitor
Law enforcement agencies use security cameras to monitor traffic at intersections
and on busy roads. The footage, which can be viewed by an officer at any time, The monitor receives the signal sent by the camera and converts the signal into a
allows law enforcement to identify drivers that run red lights, speed, or otherwise picture on a television screen. At least one monitor must be provided at each
viewing station in the CCTV system in order to see the view provided by the
camera(s).
DVR or Digital Video Recorder ● Interconnections
The DVR is the “heart” of the CCTV system. It takes all the camera inputs,
arranges them on screen for live viewing and also stores footage onto a hard drive Different Sensors
for viewing at a later date.
DVRs record all the cameras regardless of what you are viewing live on your ● Passive Infrared Detectors
monitor. It is possible to view 1 camera at a time or several camera in various ● Infrasound Detectors
combinations depending on how many channels the DVR supports.
● Microwave Detectors
DVR recorders also support remote access over the internet. You need to connect
the DVR to your internet router. This can be done either with a cable, a power ● photoelectric Beams
bridge adapter which uses your electrical wiring or a wireless network point. Then
● Glass-Break Detection
wherever you are in the world you can view live footage from your cameras, see
previously recorded footage, make back ups of important events and even make ● Smoke, Heat, And Carbon Monoxide Detectors
settings changes to the DVR.
● Motion Sensors
Cable
● Security Electric Fence
The cable required for a basic system is 75 ohm coax cable. RG59U is the normal
coaxial cable used, this cable must be copper center conductor and 95% shield. ● Electro-Mechanical (Shaker) Sensors

1. Electronic Building Access System


File Copy of Lecture
● Keycard Lock/Electronic Cardkey
Bldg_Security_System.pdf download
● Keypad
● Benefits of Keypad Locks
● Convenience of a Keyless System
Building Security System:
● Biometric Access Control
1. Intruder Alarm System ● Facial Recognition

Typical Components:
1. Closed Circuit Television (CCTV)

● Premises control unit (PCU), Alarm Control Panel (ACP), or simply panel
● Home Security
● Sensors
● Business
● Alerting devices
● Traffic Monitoring
Types of Systems Available

● Simple CCTV Systems


● Mains Powered CCTV Systems

Components of CCTV

● Camera
● Monitor
● DVR or Digital Video Recorder
● Cable

You might also like