None
N/A
This invention relates to the design and installation of alarm systems including fire alarm and security systems in facilities such as office buildings, factories, and warehouses, and more particularly to a method of bidding for the construction and installation of the system.
There are several steps or stages involved in the design and installation of fire alarm and security systems. These typically include:
It will be appreciated that current fire alarm and security control systems are complex. There are manifested in a myriad of configurations and are uniquely implemented based upon the particular demands imposed by the installation site; i.e., the type of facility and its use, requirements of a building's owners and management, federal and state laws and regulations, and local ordinances and restrictions. Other design factors include how much on-site programming is required to bring the system into operation, and the support, maintenance, and updating or upgrading necessary to keep the system functioning properly once it is in use. The result is a substantial investment in both time and money to design the layout of the system, identify the components incorporated in it and their operational requirements, determine the cost to install the system and bring it “on-line”, and the on-going costs of day-to-day operation, maintenance, and support.
Manufacturers and suppliers of sensors, and control and ancillary equipment usually only provide training and technical support for the products they make and/or sell, making it necessary for dealers and installers to provide the other services required. Moreover, most manufacturers and installers are only concerned with initial sale of their product or service and do not focus on potential recurring revenues from the products and services they provide; i.e., those occurring after the system is up and operating. This is reflected in the system's design. Those skilled in the art will appreciate that current technologies provide a great potential for improving the information and quality of information needed to design, install, and operate of a system; and in particular, the information provided by the system. This means there is a substantial potential for additional income which will be generated by utilizing new technologies to provide this information in an accurate and timely manner.
As one example, a drawback with current systems is the use of separate databases one of which is maintained at the installation site of the system, and another of which is maintained at a monitoring site that is usually remote from the premises where the system is installed. Both databases should include the same information about the system, its layout, the location of each sensor in the system, and system operation. This information, and information about the building and its condition, is vital to responding authorities (fire, police, medical, hazardous materials (hazmat)) when an alarm occurs. Unfortunately, it is often found that the data maintained in the one database is inconsistent with that maintained in the other. In a typical situation, a sensor has failed and been replaced. In doing so, a different type sensor, or newer model of the original sensor has been installed in its place. Or, the system has been expanded with a new branch added to the system that required new sensors to be installed. In either instance, the address of the new sensor (used in polling the sensor and identifying the location of the sensor when it goes into alarm), and operational information concerning the sensor, has not been entered into all the databases. Most often, the replacement or addition is so recent that while one database has been updated, the other has not. When that sensor now goes into alarm, the monitoring station will not necessarily know which sensor went off, the location of the sensor, or why it went off. All of this is important to identify whether an alarm is false, and if not false, what information to provide responders.
Another problem occurring during the initial stage of system design is the significant number of changes which usually take place. As the building layout is developed, the floor plan is re-arranged, then re-arranged, then re-arranged again. Offices and work areas are moved about, or made larger or smaller. Areas requiring access control are added, deleted, or moved. Entrances, exits, and the locations of hazardous materials or repositories for important items such as corporate records, works of art, precious metals, etc. are shifted from one place to another. As these changes occur, so does the configuration of the alarm system. Sensors need to be moved from here to there, more sensors are added or subtracted, new types of sensors are incorporated into the system.
A number of things flow from these changes. One is the cost of components. As sensors, control panels, ancillary equipment is added or changed, so do component costs. Specialized sensors for particular monitoring functions will especially add to the cost. A system installer bidding on the project needs to know how of many items are being installed, what goes where, each components' operational requirements, and what type of cabling, connectors, fixtures, etc. will be needed since all of these impact his estimate and his bid. He must also factor in labor costs (installers, management and support personnel), and overhead and profit, in order to develop a realistic proposal to submit for the project. If changes are continually being made, and these are not timely provided to the contractor, his proposal will not be realistic causing him to lose the bid; or if it is awarded to him, subsequent disputes when he starts to go over budget or finds that he cannot complete the job within his bid. In either instance, problems will result that are unnecessary.
The Present Invention is Directed to a Method
A method for bidding upon the construction of an alarm or security system first includes establishing a single database in which is stored all information relevant to the bidding process, and using the database to provide a centralized bidding program for component dealers and equipment installers. The database is used to provide an automated process for device selection, system power requirements, power supplies, battery and panel networks for use in the system, and internal and external system's communications. The database further is used to provide bid assistance to equipment installers including information relating to the system's configuration and to provide a bid submittal formats to be used by anyone bidding on construction or installation of the system. In this regard, bid proposals are prepared in a standardized response format, including standard exceptions with respect to parts of the system.
Other objects and features will be in part apparent and in part pointed out hereinafter.
The objects of the invention are achieved as set forth in the illustrative embodiments shown in the drawings which form a part of the specification.
Corresponding reference characters indicate corresponding parts throughout the several views of the drawings.
The following detailed description illustrates the invention by way of example and not by way of limitation. This description will clearly enable one skilled in the art to make and use the invention, and describes several embodiments, adaptations, variations, alternatives and uses of the invention, including what I presently believe is the best mode of carrying out the invention. As various changes could be made in the above constructions without departing from the scope of the invention, it is intended that all matter contained in the above description or shown in the accompanying drawings shall be interpreted as illustrative and not in a limiting sense.
In accordance with the method of the invention, a fire alarm or security system indicated generally 10 is installed in a building, or the floor of a building, as shown in
Information flow through the system is indicated in
In utilizing system data, as shown in
As an example of the advantages of using a common database, in the bidding process, database DB is used to:
At an initial or design stage of the process, drawing information related to the floor plan of the building, layout of the system, sensor location, information for each sensor at each location, and zone/text information about the system is entered into database DB. Once system 10 is initially laid out, if changes are made to the building or floor in which the system is installed which affect the system's layout, or changes are made to the system, or both, this new information is also stored in the database. This is particularly important because, as the design of system 10 and its installation progresses, additional layers of information are now readily combined with the background information to provide additional data to a user (designer, installer, general contractor) without having to recreate all the data previously created. And, all of the data is now accessible from a single database.
Next, as shown in
During the layout of system 10, the method of the invention enables a number of design steps to be automatically performed. First, if it is known that the same type sensor is going to be repeatedly used, and that there is a uniform spacing between sensors, then, the placement of the first sensor results in automatic placement of additional sensors of the same type. Thus, in
In
In
As further shown in
At the next level (Layer 5), input/output information for the system is incorporated into the database. This will include such matters as what reports are generated in the normal course of operation, as well as what happens when the system goes into alarm. In an alarm situation, the information entered into the database includes contact information for who gets notified, in what order they are notified (e.g., responders first, then facility management, then the insurance carrier), what information about the current alarm is each contact to be provided, what historical information about the facility and any previous alarms is to be provided, etc.
Referring to
As is apparent from the drawing, loop L1 includes all of the same sensors of one type (e.g., a fire sensor) and Loop L2 all of the sensors of the same sensors of another type (e.g., door sensor). Those skilled in the art will appreciate that all of the same sensors do not have to be on the same loop, and that there could be two or more separate loops for the fire sensors, for example. Regardless, each loop originates and terminates at control panel CP. Further the control panel is, in turn, connected to database DB and provides information about the operational status of the system. When a periodic sensor status test is performed, the control panel provides information of each sensor's current status to the database. This allows a failing sensor to be identified and replaced before it fails. If a sensor goes into alarm, the control panel triggers the system that an alarm has occurred so the system can begin to respond as described above.
Finally, as shown in
Within alarm system 10, communications are routed from a digital alarm communications transmitter (DACT) to designated servers. The DACT combines alarm reporting, system test, and system programming capabilities, and these are provided without use of onsite personnel. Signal routing is based upon message type. The vast majority of such messages fall into either an “alarm”, “supervisory” or “trouble” category. In addition to conventional messages sent through the communications channel, maintenance messages (e.g., faulty sensor) can also be sent. These messages are routed to an automatic signal dispatcher 18, 20 and do not require end user involvement.
Referring to
When a sensor goes into alarm, an output from the DACT is routed through an alarm receiver 22 to an alarm server 24. As shown in
In addition to the alarm processing workstations 30, other workstations 32-38 are provided for various users who perform administrative functions, testing, drawings, and system configuration. All of these workstations can be located at separate sites, and all may include backup workstations (not shown). All of these other workstations have access to common database DB through communications hub 26. Thus, all the data used in the system is common throughout the system, and the information displayed on any workstation monitor can include both text and graphics.
Referring to
The floor plan FP graphics shown in
An important feature of the method of the invention thus is that it relates spatial device data with event data to determine whether other devices in an area are experiencing like changes in analog information. As previously described, all of these devices are identified in the X,Y,Z coordinate system. Further, another important feature of the invention is that no longer is there the possibility of different data being resident in different databases with the possibility that erroneous or incomplete information will be available depending upon which database is accessed. Rather, all of the information is resident in the single database DB so there is no likelihood of out-of-date, or incorrect or erroneous information being provided.
Referring again to
It will be understood that the various users do not need a permanent connection into the system. Rather, certain users or authorized individuals may be granted conditional access based on the occurrence, or lack of occurrence, of an event. Access may be granted only during the event and for a specified period thereafter. The user may have access to some information, but not other information, if an event has not taken place. In addition, users or authorized individuals may be defined and be granted access to the system only during an active event. The user may access the system without a password or other authorization only during the event, but is restricted to access with a password or other authorization at all other times.
The communications system shown in
During system installation, control panel CP of the system is programmed. As part of the method of the invention, back-ups of images of the panel configuration are made and stored at configuration workstation 38 for recovery by maintenance personnel should a situation arise where the panel must be reconfigured. During system programming, both when the system initially goes on-line, and subsequently, an auto-synchronization protocol is carried to both upload information from database DB and download information to the database. Information entered into database DB during the design phase of the system is also utilized at this time. To simplify system programming, defaults are programmed into the control panel. This does not, however, preclude the ability of complex logic to be executed within the panel. The programming steps also include entering structured ID descriptions for the respective sensing devices. Device type and serial numbers are reviewed at all the work sites, and any mismatches, missing numbers, or duplicate numbers are identified and corrected.
The resulting database configuration is shown in
Standard information about each location or point within the facility stored in database DB includes:
This database structure is used throughout the system. In addition to the above, panel network information is also stored in the database. This information includes panel name and serial number, information sharing status, and alarm reporting to a monitoring site.
Testing of the sensing devices is done on a periodic basis and the results are stored in database DB. Algorithms determine a sample rate of individual devices based on a rate of change in the device output and the proximity of the output to preset thresholds. Historic incident, and current data determine the validity of an alarm state of a device. This is done at the monitoring station or other remote site. This remote verification is independent of any local logic which may indicate an alarm condition. In addition, algorithms stored in database DB, or at a testing site using the information stored in the database, acts on data from each device to predict future device performance. Changes in preset levels transmitted from the monitoring site to the local device are based on calculated results. Maintenance of the system can be scheduled based upon calculation results or absolute data values.
Finally, any device in the system is programmable through a single network connection point to a remote facility. The connection point to the remote facility does not share the same network as does those devices locally. All data sent to and from the remote facility passes through a common access device.
In view of the above, it will be seen that the several objects and advantages of the present invention have been achieved and other advantageous results have been obtained.