The present invention generally relates to security systems that monitor conditions within a defined environment or area, and more particularly to a method and apparatus for using a wireless network controller in a wired security system.
Electronic security systems are becoming more common and important in residential and commercial environments. Individuals and families, in particular, desire a security system that monitors a defined premise and/or environment, to prevent or deter theft, burglary and robbery. In addition, there is a desire to monitor and detect other defined conditions and, in response to a detected condition, generate a warning. These other potentially hazardous conditions or threats include, for example, fire hazards, carbon monoxide and power failure and electricity outages.
A conventional security system for use in a home, for example, includes one or more keypads with displays and a central control panel, which in some cases is remotely located from the keypads and displays. A number of sensors are provided for detecting various conditions and are arranged in the home or premises. In legacy security systems, the sensors are most commonly connected to the control panel by wired means. The sensors may be of various types designed to detect a variety of conditions. The sensors are generally relatively simple devices having two operational states represented by a contact that is either in an open or closed state.
The keypad/display allows a user to control the system. The user can use the keypad/display to “arm” or “disarm” the system in addition to selecting amongst the sensors to control. In the event of a false alarm, the homeowner may use the keypad to reset the alarm. The typical control panel includes a central microprocessor or an equivalent, which receives messages from the sensors including, for example, motion sensors, infrared sensors, magnetic or glass break sensors, fire sensors and carbon monoxide sensors. These messages generally indicate which of the two states the sensors are in. If the system is “armed” and one or more sensor is triggered, a signal is generated and received by the control panel. The control panel circuitry activates a built-in telephone communicator to contact the proper authority, for example law enforcement, firefighting and/or health professionals, and conveys, for example, a pre-recorded message providing relevant information related to the triggered sensor. Alternatively, the telephone communicator may contact a security company monitoring the system, for example ADT, and provide information about the event which triggered the alarm condition. The security company, in turn, relays the information to the proper authority.
Recently in part to reduce the labor costs of installing wired systems into existing homes, wireless security systems have been developed. These systems use RF communications for at least some of the keypads and sensors. The functionality of wireless security systems and legacy wired systems are largely similar, except that a wireless central control panel, a wireless central transmitter, and wireless remote sensors are substituted for their wired counterparts. Wireless systems, however, often offer enhanced functionality over what is available from wired systems. For example, the sensors in wireless systems can be more sophisticated than the simple open or closed contacts often used in legacy wired systems (monitoring and status applications). Additionally, while legacy wired systems generally involve only one way communication between the sensors and the control panel, wireless security systems often employ bidirectional communication between the sensors and the control panel. Accordingly, residents and other users of legacy wired security systems have a number of reasons for desiring to upgrade their systems to a wireless system.
One impediment to upgrading that arises is that users are not inclined to outright replace their wired security systems with a wireless security system, given the relatively significant investment they have made in their legacy security systems. Because of the relatively large number of legacy wired security systems currently in use, there is a significant need to provide a method and apparatus for incrementally upgrading a legacy wired communication system with a wireless communication system without completely replacing it.
Currently available wireless security systems use any of a variety of different communication standards. For example, such systems may use, without limitation, IEEE 802.11 (e.g., 802.11a; 802.11b; 802.11g), IEEE 802.15 (e.g., 802.15.1; 802.15.3, 802.15.4), DECT, PWT, pager, PCS, Wi-Fi, Bluetooth™, cellular, and the like. While the wireless security systems, and hence wireless controllers employed in such systems, may encompass any of these standards, one particularly advantageous network protocol that is currently growing in use is ZigBee™, which is a software layer based on the IEEE standard 802.15.4. Unlike the IEEE 802.11 and Bluetooth standards, ZigBee offers long battery life (measured in months or even years), high reliability, small size, automatic or semi-automatic installation, and low cost. With a relatively low data rate, 802.15.4 compliant devices are expected to be targeted to such cost-sensitive, low data rate markets as industrial sensors, commercial metering, consumer electronics, toys and games, and home automation and security. For these reasons ZigBee may be particularly appropriate for use in wireless security systems.
ZigBee-compliant products operate in unlicensed bands worldwide, including 2.4 GHz (global), 902 to 928 MHz (Americas), and 868 MHz (Europe). Raw data throughput rates of 250 Kbps can be achieved at 2.4 GHz (16 channels), 40 Kbps at 915 MHz (10 channels), and 20 Kbps at 868MHz (1 channel). The transmission distance generally ranges from 10 to 75 m, depending on power output and environmental characteristics. Like Wi-Fi, Zigbee uses direct-sequence spread spectrum in the 2.4 GHz band, with offset-quadrature phase-shift keying modulation. Channel width is 2 MHz with a 5 MHz channel spacing. The 868 and 900 MHz bands also use direct-sequence spread spectrum but with binary-phase-shift keying modulation.
The IEEE 802.15.4 specification defines four basic frame types: data, acknowledgement (ACK), MAC command and beacon. The data frame provides payloads of up to 104 bytes. The ACK frame provides feedback from the receiver to the sender confirming that the packet was received without error. The MAC command frame provides the mechanism for remote control and configuration of the network devices. The centralized network controller uses MAC to configure individual network device's command frames no matter how large the network. Finally, the beacon frame wakes up client devices, which listen for their address and go back to sleep if they don't receive it.
ZigBee networks can use beacon or non-beacon environments. Beacons are used to synchronize the network devices, identify the network, and describe the structure of the superframe. The beacon intervals are set by the network controller and can vary from 15 ms to over 4 minutes. Sixteen equal time slots are allocated between beacons for message delivery. The channel access in each time slot is contention-based. However, the network coordinator can dedicate up to seven guaranteed time slots for noncontention based or low-latency delivery.
The non-beacon mode is a simple, traditional multiple-access system of the type used in simple peer and near-peer networks. It operates like a two-way radio network, where each device is autonomous and can initiate a conversation at will, but could interfere with others unintentionally. The recipient may not hear the call or the channel might already be in use. Beacon mode is a mechanism for controlling power consumption in extended networks such as cluster tree or mesh. It enables all the devices to know when to communicate with each other. In ZigBee, the two-way radio network has a central dispatcher that manages the channel and arranges the calls. A primary value of beacon mode is that it reduces the system's power consumption.
As previously mentioned, for a number of reasons it may be desirable to upgrade a legacy wired security system with wireless components. For example, the wired controller in a legacy system may fail and need replacing. More and more the availability of wireless controllers is increasing while the availability of legacy wired controllers is presumably decreasing. In addition, wireless sensors are often available that may operate in more than two states (e.g., open and closed). For instance, condition monitor sensors that may be desirable for use in a residence include temperature, moisture, power level and energy usage (e.g., natural gas, electricity). These sensors preferably provide information that cannot be readily embodied in two states, but rather provide information that can be in a continuum of states. Legacy wired security systems generally do not have the capability to perform such monitoring. Accordingly, the addition of wireless sensors to a legacy security system can provide enhanced monitoring functionality that is not otherwise available.
While a legacy security system in effect can be upgraded by the addition a separate wireless system to the premises that operate in parallel and independently of one another, it will often be preferable to have a single integrated system rather than two separate systems that each employ their own controllers. This can be most simply accomplished by replacing the wired controller in the legacy system with a wireless controller. As detailed below, in accordance with the present invention, a wired controller can be replaced with a wireless controller with the addition of a bridge or converter for transforming the signals from the wired legacy sensors to a wireless signal that conforms to the standards or protocols employed by the wireless controller.
In accordance with the present invention, the wired controller in a legacy wired security system may be replaced by a wireless network controller of the type depicted in
The translation process performed by the bridge 40 in converting the wired signal to a wireless signal may be accomplished in a variety of different ways. For example, the bridge 40 may have a database or lookup table (located, for example in a ROM associated with processor 44) that lists various wired signal message formats and the corresponding wireless signal message formats that are recognized by the wireless controller 80). Such a table may be provided for different manufacturers of the sensors in the legacy wired security system since presumably each manufacturer may have its own message format. The database may be incorporated into the bridge 40 at the time of purchase or it may be installed (if embodied in hardware) or downloaded (if embodied in software) by a technician at the time of installation, who can then download the correct table for the particular legacy system that is already in place. In some cases the bridge 40 will recognize the message format received from the wireless sensors and automatically select the correct table to use, thus avoiding the need for any manual provisioning at the time of installation.
As shown in
It will be understood that the particular functional elements set forth in the figures above are shown for purposes of clarity only and do not necessarily correspond to discrete physical elements. Moreover, the various functional elements may be performed in hardware, software, firmware, or any combination thereof.