Structured Cabling Solutions

Structured Cabling Solutions

Structured Cabling

STRUCTURED CABLING SOLUTIONS

“This lesson describes both physical and logical organization of networks. Topologies described include bus, ring, star, and hybrid. This unit also covers TIA/EIA 568 structured cabling standards, which govern the installation of local area networks. In order to design, install, troubleshoot, and maintain networks, administrators must have a solid understanding of these topologies and cabling standards.”

LEARN MORE

· Identify and describe the elements that are recommended for structured cabling networks.

· Diagram bus, star, ring, and hybrid topologies.

· Compare and contrast the advantages and disadvantages of bus, star, ring, and hybrid topologies.

· Select the appropriate topology for a particular set of network requirements.

· Create a questionnaire for an administrator to use when planning or expanding a network.

· Select and estimate the cost of cabling for a given network.

 

FIBER OPTIC SOLUTIONS“Optical fibers are widely used in fiber-optic communications, which permits transmission over longer distances and at higher bandwidths (data rates) than other forms of communication. Fibers are used instead of metal wires because signals travel along them with less loss and are also immune to electromagnetic interference.”

Read more…..

COPPER CABLE SOLUTIONS“We offer cabling solutions across the entire performance range, from entry level Category 5e UTP to Category 7 fully shielded (1200Mhz). Each design is guaranteed standards compliant thanks to our strict ISO 9001 quality procedures, this coupled with the performance of Siemon products offers you complete peace of mind.”

Read more…..

DVR / NVR SYSTEM

DVR / NVR SYSTEM

DVR / NVR SYSTEM

DVR | NVR SYSTEM

“A digital video recorder (DVR) from Dahua Technology, Sometimes referred to by the merchandising term personal video recorder (PVR), is a consumer electronics device or application software that records video in a digital format to a disk drive, USB flash drive, SD memory card or other local or networked mass storage device. The term includes set-top boxes (STB) with direct to disk recording facility, portable media players (PMP) with recording, recorders (PMR) as camcorders that record onto Secure Digital memory cards and software for personal computers which enables video capture and playback to and from a hard disk drive.

A network video recorder (NVR) is a software program that records video in a digital format to a disk drive, USB flash drive, SD memory card or other mass storage device. An NVR contains no dedicated video capture hardware. However, the software is typically run on a dedicated device, usually with an embedded operating system. Network video recorders are distinct from digital video recorders as their input is from a network rather than a direct connection to a video capture card or tuner. Video on a DVR is encoded and processed at the DVR, while video on an NVR is encoded and processed at the camera, then streamed to the NVR for storage or remote viewing.[citation needed] NVR is used in IP video surveillance systems. Hybrid NVR/DVR security systems exist which incorporate functions of both NVR and DVR; these are considered a form of NVR.[citation needed] NVR home security systems are wireless, tend to be easy to set up, can be accessed through a web browser, and allow the user to be notified by email if an alarm is triggered.”

DVR SYSTEM DH-DVR1604LF-AS

DVR SYSTEM DH-DVR1604LF-AS

DH-DVR1604LF-AS – 16 Channel video inputs. It can support all channel D1(4CIF) realtime recording. It can support HDMI, TV, VGA, 2USB2.0 Up to 4/8/16 cameras with 1080p realtime preview H.264 dual-stream video compression HDMI DH-DVR0404LF-AS – All channel D1(4CIF) HDMI / VGA / TV synchronous video output Live, recording, playback, backup & remote access All

NVR

NVR

Up to 16 channel with 1080p realtime live view H.264/MJPEG dual codec decoding Max 120fps@1080p, 240fps@720p,480fps@D1 preview & recording All channel simultaneous realtime playback, GRID interface & smart search Support Multi-brand network cameras: Dahua, Arecont Vision, AXIS, Bosch, Brickcom, Canon, CP Plus, Dynacolor, Honeywell, Panasonic, Pelco, Samsung, Sanyo, Sony, Videosec, Vivotech and etc. ONVIF Version

HD-SDI DVR (1080P)1604/HD-S

HD-SDI DVR (1080P)1604/HD-S

Up to 16 channel HD-SDI video 1080p realtime live view H.264 dual-stream video compression DVR0404HD-S: Max 100/120fps@1080p DVR0804/1604HD-S: Max 200/240fps@1080p HDMI / VGA / TV simultaneous video output 4 channel synchronous realtime playback, GRID interface & smart search 3D intelligent positioning with Dahua PTZ camera Support 8 SATA HDDs up to 32TB, 1 eSATA up

HYBRID DVR (IP ANALOG)3204HF-U-E

HYBRID DVR (IP ANALOG)3204HF-U-E

Up to 32 channel with 1080p realtime live view H.264/MJPEG decoding & H.264 dual-stream encoding IP: Max 120fps@1080p, 240fps@720p, 480fps@D1; Analog: 4/8/16 channel@960H(960×576/960×480) realtime recording HDMI / VGA / TV/ Spot simultaneous video output All channel synchronous realtime playback, GRID interface & smart search Support Multi-brand network cameras: Dahua, Arecont Vision, AXIS, Bosch, Brickcom, Canon,

Biometric & Access Control System

Biometric & Access Control System

Biometric & Access Control System

Biometrics

“Biometrics or biometric authentication refers to the identification of humans by their characteristics or traits. Biometrics is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance.Biometric identifiers are the distinctive, measurable characteristics used to label and describe individuals. Biometric identifiers are often categorized as physiological versus behavioral characteristics. Fingerprint Biometrics Among all the biometric techniques, fingerprint-based identification is the oldest method which has been successfully used in numerous applications. Everyone is known to have unique, immutable fingerprints. A fingerprint is made of a series of ridges and furrows on the surface of the finger. The uniqueness of a fingerprint can be determined by the pattern of ridges and furrows as well as the minutiae points.”

FACE TIME ATTENDANCE BSFace 602

FACE TIME ATTENDANCE BSFace 602

BSFace 602 series, Facial, Fingerprint & RFID T&A and Access Control Identification Terminal, adopts Biosecurity latest Bio600 platform with Biosecurity vx10.0 algorithm, large capacity memory and high definition. BSFace 600 adopts infrared camera which could be widely used, not influenced by outdoor light and it even enables user identification in the dark environment. BSFace introduced Biosecurity embedded

FINGERPRINT TIME ATTENDANCE BS101

FINGERPRINT TIME ATTENDANCE BS101

BS101 is an innovative biometric fingerprint reader for time attendance applications, Builtin 2000 mAh backup battery can eliminates the trouble of powerfailure. Support optional GPRS and Wi-Fi. The BS101 features the fastest commercialbased fingerprint matching algorithm and highperformance, highimage quality optical fingerprint sensor. The 3” TFT can display more information vividly, including fingerprint image quality

CARD READER

CARD READER

GV-MG236C Access Control Operating Voltage : 12VDC+10%; Current 1.2A Lock Relay : 12VDC/2A Environmental temperature : working:0℃~45℃; storage:-10℃~55℃ Relative humidity : working:40%~90%RH;storage:-20%~90%RH RFID Card Capacity : 10000 cards 4-digits public PIN Capacity : 1 Proximity Reader Frequency :125KHz Compatible Cards : EM or IC compatible cards Card Reading Distance :5—15CM The LED and Buzzer Status

PROXIMITY CARD ACCESS CONTROL EP100S

PROXIMITY CARD ACCESS CONTROL EP100S

Standalone – Up to 1000 card & 5 master PIN Codes; EM read format;5-8cm reading range; PIN,CARD, CARD+PIN Security Mode; Onboard Buzzer & Memory EEPROM

PABX / TELEPHONE SYSTEMS

PABX / TELEPHONE SYSTEMS

PABX / TELEPHONE SYSTEMS
Analog Telephone AT-45

Analog Telephone AT-45

3 Programmable Ringer Tones Set your favorite tones when you are bored with the normal tones. An added feature that will liven up any work environment. Ringer volume can also be adjusted to low, medium or high.  Mute Control Switch on to MUTE when you do not want the caller to hear your background discussions.

Digital Telephone – IP4WW-12TXH-A

Digital Telephone – IP4WW-12TXH-A

IP4WW-12TXH-A TEL The 12TXH-A TEL is a 4-wire multiline telephone featuring: • Programmable keys: 12 • LCD: 16 digits x 2 lines • Handsfree: Half-duplex • Backlit dial pad: No • Angle Adjustment: 2-steps • Wall-Mounting kit: Built-in

Voicemail – IP4WW-CFVMS-C1

Voicemail – IP4WW-CFVMS-C1

IP4WW-CFVMS-C1 is Compact Flash Card. This card has VRS/VM functionality, to be mounted in the PZ-VM21 card. There are two cards. Difference between the 2 cards is in the voicemail mailbox storage hours

Auto Attendant-IP4WW-CFVRS-C1

Auto Attendant-IP4WW-CFVRS-C1

IP4WW-CFVRS-C1 is  Compact Flash Card. This card only has VRS functionality, to be mounted in the PZ-VM21 card.

Anti-Theft Security Tagging Systems & Accessories

Anti-Theft Security Tagging Systems & Accessories

Anti-Theft Security Tagging Systems & Accessories

Welcome to Abiru Holdings.
We offer the lowest prices on new and refurbished retail loss prevention equipment. Get the best prices around on refurbished security tags from Checkpoint, Sensormatic and others.

Distributed exclusively by Abiru Holdings, Checkpoint RF security systems represent a complete selection of radio-frequency detection systems for libraries. From detection systems to theft-detection tags and detuning products to patron self-checkout stations, Checkpoint RF components are designed to work together to provide maximum detection and performance while integrating easily into library operations.
These turn-key solutions can be used alone or in conjunction with other Checkpoint products for unparalleled protection with a host of advantages like:

  • Proven-reliable security performance
  • Superior detection through advanced Digital Signal Processing (DSP) technology
  • Compatibility with print, digital and magnetic media
  • Comprehensive range of accessories
  • Excellent wide-aisle detection

 

 

 

 Anti Theft Towers  3′-4’

 

 

                           Anti Theft Towers  5’-6’  

 

 

 

Super Golf  Detacher

 

 

 

 

 

Mini Square Tag Detacher

 

 

 

 

Standard Golf Tag

 

 

 

Square Tag Plastic Pin

 

 

 

Square Tag Metal Pin

 

 

 

 

Standard Lenyard

 

 

Security Systems in Sri Lanka

Security Systems in Sri Lanka

SECURITY SYSTEMS

What is a security system and how does it work?

All home security systems work on the same basic principle of securing entry points, like doors and windows, as well as interior space containing valuables like art, computers, guns, and coin collections. Regardless of the size of your home, or the number of doors and windows or interior rooms a homeowner decides to protect, the only real difference is in the number of security components deployed throughout the home and monitored by the control panel.

What is a security system?

The most basic definition of any security system is found in its name. It is literally a means or method by which something is secured through a system of interworking components and devices.
In this instance, we’re talking about home security systems, which are networks of integrated electronic devices working together with a central control panel to protect against burglars and other potential home intruders.

A typical home security system includes:
• A control panel, which is the primary controller of a home’s security system
• Door and window sensors
• Motion sensors, both interior and exterior
• Wired or wireless security cameras
• A high-decibel siren or alarm
• A yard sign and window stickers

How does a security system work?

Home security systems work on the simple concept of securing entry points into a home with sensors that communicate with a control panel or command center installed in a convenient location somewhere in the home.

The sensors are typically placed in doors that lead to and from a house as well as easily accessible windows, particularly any that open, especially those at ground level. Open spaces inside of homes can be secured with motion sensors.

Control Panel: The control panel is the computer that arms and disarms the security systems, communicates with each installed component, sounds the alarm when a security zone is breached, and communicates with an alarm monitoring company.

They typically feature a touchpad for easy programming and interaction, is where pass codes are entered to arm and disarm the system, can work on voice commands, and can be programmed to work with wireless remote controls called key fobs.

Door and Window Sensors: Door and window sensors are comprised of two parts installed adjacent to each other. One part of the device is installed on the door or window and the other on the door frame or window sill. When a door or window is closed, the two parts of the sensor are joined together, creating a security circuit.

When the security system is armed at the control panel, these sensors communicate with it by reporting that the point of entry is secure. Should a monitored door or window suddenly be opened, the security circuit is broken and the control panel interprets this as a breach of a secured zone. A high-decibel alarm is sounded and in most instances the alarm monitoring company is automatically notified.

Motion Sensors: These security components, when armed, protect a given space by creating an invisible zone that cannot be breached without sounding an alarm. These are typically used to protect rooms containing valuables, as well as areas less frequented in larger homes.

Surveillance Cameras: Available in both wired and wireless configurations, surveillance cameras can be used in several different ways as part of an overall security system.

Typical uses include monitoring:

• Hard to see or distant areas of your property
• Remote buildings like garages, barns, and workshops
• Entry points, both exterior and interior, like garage doors and front doors

Surveillance cameras can be accessed remotely on computers, smartphones, and tablets. They are often used in this method when homeowners are out of town, to watch for deliveries and other service personnel like caregivers and landscapers, and to monitor the arrival of children after school. They can also be used to record any security breaches, which could result in having footage of a home invasion, including a good look at the burglars and perhaps even the vehicle they drove.

High-decibel Alarm: Loud enough for neighbors to hear, home security alarms serve a few different purposes. First, they alert the people inside the house that a problem occurred. They’re also shrill enough to send a burglar running while also notifying nearby neighbors to the situation.

Yard Sign and Window Stickers: On the surface, these items might seem like nothing more than marketing tools for alarm companies, but they play important roles in home security. When you place a security company’s sticker in a front window and plant their sign in your front yard, you are telling burglars you home is professionally protected and not a wise choice for an attempted burglary. They are effective at conveying this message and should be used as recommended by the security company.

 

What Happens when an intrusion occurs?

Security systems are designed to perform certain tasks when a secured zone is breached. What your security systems does in the event of an intrusion depends on the type of system you’re using.

Professionally Monitored Security Systems: If your security system is professionally monitored by an alarm company, they are alerted when a security problem arises in your home. Along with the high-decibel alarm that sounds, the monitoring company is alerted. A trained security expert might attempt to communicate with the homeowner via the control panel if it’s setup for 2-Way Voice communication, or will call the emergency contact number listed on the account.

These types of security systems communicate with the monitoring company in one of several ways, including:

• Over existing home phone lines, which continue to work during power outages when battery backup is in use.
• Wirelessly through cellular radio frequencies like cell phones use, which also continue to work during power outages when battery backup is in use.
• Voice over Internet Protocol (VoIP), which typically doesn’t work in a power outage.
• Via the Internet, which also typically does not work in a power outage.

In the event of an actual emergency, the monitoring company will notify the appropriate emergency response personnel in your area. This includes police, firefighters, and paramedics. The monitoring company will also try to maintain communication with you until emergency response teams arrive at your home.

Monitored systems typically allow for the homeowners (or designees) to be notified by text message and email when a security breach occurs.

Non-monitored Security Systems: There are plenty of DIY security systems available today that don’t include professionally monitored services. In the event of a home intrusion when this type of security system is installed, a high-decibel alarm sounds (provided one is installed). Contacting police, fire, or other emergency response personnel must be initiated by the homeowner by dialing the appropriate number, typically 911.

These types of systems may or may not allow for text messages or email notifications to be sent to the homeowner in the event of a security breach, depending on the provider and the system you opted for.

What are the advantages of having a home security system?

Numerous studies show homes without security systems, when compared to those with professionally monitored systems, are up to three times more likely to be burglarized because burglars are opportunistic by nature and are on the hunt for easy targets.

Homes without security systems are high on their list.

When you have a home security system professionally monitored, and advertise this by displaying window stickers and yard signs, you’re letting burglars know the likelihood they’ll fail and be caught are very high.

Another advantage is the ability to remotely manage your house. With this, you can typically arm and disarm your security system from anywhere in the world via a web-enabled device, monitor who arrives and leaves your home, as well as use a panic button to elicit an instant response from your alarm monitoring company.

Finally, most home insurance companies provide great discounts-up to 20 percent-when you have a home security system in your home.

If you’d like to know more about getting a security system in your home, please contact any of our specially trained home security experts at +94 71 7 694 694. They’ll be able to answer all of your questions, help you decide which security companies and options will fit your particular needs, and help you finalize your orde

Checkpoint RF Security Tag Systems

Checkpoint RF Security Tag Systems

RF SECURITY SYSTEMS

Distributed exclusively by Abiru Holdings, Checkpoint RF security systems represent a complete selection of radio-frequency detection systems for libraries. From detection systems to theft-detection tags and detuning products to patron self-checkout stations, Checkpoint RF components are designed to work together to provide maximum detection and performance while integrating easily into library operations.
These turn-key solutions can be used alone or in conjunction with other Checkpoint products for unparalleled protection with a host of advantages like:

  • Proven-reliable security performance
  • Superior detection through advanced Digital Signal Processing (DSP) technology
  • Compatibility with print, digital and magnetic media
  • Comprehensive range of accessories
  • Excellent wide-aisle detection