Security Alarms

dmp

fb_header_new_mobile_platforms_copy_0

Click on picture to view video and see what’s available.

 

DMP Network and Cellular Security Monitored Alarm Systems \ Commercial and Residential

Accel Communications is a proud factory authorized trained Digital Monitoring Products (DMP) dealer of industrial, commercial and residential security systems that are custom designed to meet your specific needs. DMP is the leader in the security industry including wireless cellular and network communications. In today’s world a lot of people are getting away from traditional phone lines for monitoring of fire and security systems. The new XTL and XT series control panels eliminate the need for phone lines as they communicate their data across the vast cellular networks. Not only is the more secure that copper phone lines but much faster communications to our Local Monitoring Central Station. Common alarm system components consist of door contacts, window contacts, infrared motion detectors, glass breaks, wireless panic and medical devices and remote access control devices including Android and IPhone Apps to arm and disarm you security system.

What is a Cellular or Internet Communicator Alarm System?

A Cellular or Internet Communicator is a Software Application or Hardware Device (also known as a SIM card) used to transmit Alarm and Supervisory signals from a monitored system to the Central Station via the Cell towers or Internet. Either you insert your SIM card into the DMP XT series panels or you plug the XT alarm panel into your network switch for communications to our local monitoring station. Our local Central Station receives the signal in less than 60 ms and processes the signals to the operator screen usually within 5 to 10 seconds.

DMP recommends using a DMP SCS-1R receiver with an iCOM-E line card to receive network transmissions. Accel Communications, Inc. along with AZ Security Control has developed their own Internet Receiver which can receive signals from un-encrypted iCOMs. We will supervise a Check-in signal up to once every five minutes (we require at least one Check-in every four hours) and we have the ability to restrict the reception of signals for an account to a pre-defined list of Allowed IP Addresses. Any signal received that is not from an IP Address on the Allowed IP list will be logged, but not acted upon. This can prevent Check-in Spoofing while a line is being cut, the SCS-1 does not provide this level of security. The Source IP Address of every event received is logged to permanent history (regardless of Allowed IP supervision). By supervising the Check-in at a shorter interval (every five minutes) and verifying the senders IP address, it is very difficult to “spoof” a signal. Encryption adds an additional level of security in case anyone is “sniffing” your network (watching the network traffic, looking for useful un-encrypted data). Since the Alarm communication isn’t typically confidential or damaging information, encryption isn’t usually necessary.