Intercom Systems Tutorial

Author: Brian Rhodes, Published on Jun 17, 2012

While intercoms are an important component of security systems, little fundamental training exists to explain the options and their tradeoffs. In this note, we do so, examining:

Analog or IP?

  • ****** ** **
  • **** ** **** ** ******* ********
  • ******** ******* *********** *** *******
  • ******** ****** ********
  • ******** *********** ******* - *****, ******-*******, ******** ********** *** ****

*** ********* ******** ** ***** **** ** ********* ** ******** systems. *** **** *****, ******** ********** *** ***** ** ****** transmission, *** ************* * *********** ******** ** *** *******. *******, like *****, *** ********** ** ******* *********** *** ****** ** development.

** *******, ****** ******** ************ *** **** ********* **** ** for *****, ******** **** ******* ******** *** ******* ** **** stations. *******, ** ******* ******* ****** **** ****-********* *** ****** distributed ******* ********** ****** ***********. *** **** ********* ** ***** existing *** ******* ******* * *********** ****** ** ******* ******** to ******* *********** '***** *****' ******* *** ****** *******.

******** *********

******** ******** *** ***** *** *** ** * ******* ** situations. ***** *** ***** ********** ******* ***** *********, ********* ******* are ********* ** ***** **** *** ********. ***** *** ******** of *** ***** **** ****** **** *******:

**** ********:******* ******** *** ***** ******** ** ***** *********, **** ******** are *** **** ****** **** ********. **** ******** ***** ******* a *******-*******, ****** ********* ********* **** *** ** ********* *******. Ambient ******* ***** ***** ******** *** ******* *** ** ****** volumes **** **** ******** '**** ********'. **** ******** ***** ******* additional ******** **** **** ******* *** ******* ** **** ** basic **** ****** ******** ** ******* ************ **** ****** ******* or ********* *******. ****** *** **** ******** ***** *******$****$************ ** ************ ******, ********* ****, *** *******/**********/********* *******.

**** ********:***** *** *** **** *****, *** ***** ***** *********, **** of ******** ********. **** ******** *** ********* ******* *******, *** they *** ********* ******** ********** ******* ******** ** ***** ** single **** ********** *****. ******* **** ****** ***** ***-********* ** line ******* ********, *** ******** *** ******* ** * ****** 'call ******'. ***** ***** *** ********* ** ********** ***** ************* from *** ****** **** ** *******. *** *******, **** ******** are ******** ******** ** *** ********* **** ** * ******* door, *** *** ** * ***-*** ********.

******* ********:***** *** **** ******** ******** ** '******' ********, ***** *********** to ******* **** ******** **** **** *** ********. ****** * door ** **** ******* **** *** ******* **** *******, * desktop ******* ** **** ** ******* ***** **** * ***** number ** ********. ** * *********** '****** ********' ****, *** human ********* *** **** ******** ** ******** ***** **** ******* stations. ***** ***** *** ***** ********** **** ***** ******* ** other ************ ********* ** **** *****, ******* ***** *********, ** cue ** ****** ***** *********.

********* ********:******** ******** ******** *** *********-***** ************, ******* *** **** *****, and ********* **** ***** ** ******** **** *** ******** ** application ******** **** *****. *** ***** ***** ******* ****** '*********' units:

******** ******

** ******** ** ******** *********, **** ******* ******* *** ******** of * ******* ******. ********** ******* * ****** ** ****** or **, * ******* **** *** **** ** ********* ** administrate ***** *******. ****** ***** ************, ***** ** *** ********* nor ********* *********. ** * ******, ******** ****** ****** *** handle ******** ** ******** *********.

****** ******* ******** *********** *** ***** ****** ********* *** *** typically ****-******* ***** ***** *******, ***** ** ******* **** ********* are ***** ********* ** ****** ***** *** ********** **** ****** LAN ********.

****** ** '**** ***' ****** ***** **** $*** *** ***** system ***** ((>550 *******) *******. *** **** *******, ******* ** *** **** a ******** ** ****** **** *** **** *********** ********.

**** ************ *******, ******** ******** *** ******** ** * '*** device' *****. *** ***** ****** ** ********* ********* ****** ****. In **** *****, ******** ************ *** ************ ********. *** *******, if * ******* '******' ******* ********** ******** ******* **** * phone ******, ********** ****** ********* *** ** ********.

******** ****** ********

*** ****** ******** ************* ****** ****** **** *******. **********-***** ******** systems ******* *** ********* ********:

  • ***-**-*** *************: *** *********** ********* ** ******** *******, ***** *** terminal ***** ******* ******** ********
  • ***-**-**** *************: ****** ******* ****** ************* **** *** ******** ** several ****** (*****) **************
  • ***** *********: ** **** *****, ****** ***** ********* ** ***** traffic ** ********* (**: ********* *****, ********* *****)
  • ***** ************: ***** ** ******** ** ***** (**: ******** ******* monitoring, ******* *******) ******* **** ************ *** *********** *********
  • **** *******: ******** ******* **** ** ***** *********** *** **** to ******* ****** ******** ** * ******** ** ********** ********

******** ***********

******** ******* ******* ** ******** **** ** '****** ********' * number ** ********* ******** *******. **** ****** ************ ***:

  • ***** *** ***** - ******** ******** ***** ******* *** ******** used ** ******* **** ***** ** ******* *****
  • ***** ************ - ******* ******** ******* *** ***** ***** ********* and ****** ***** ** *** ********. (*** ***** *****.)
  • ******-******* - ********** ** ************ ***** ****** ******** ******** *** not ******* **/*, ******** ****** *** ** ********** **** *** local ****** ***** ****** *** '****** **********'
  • ******** ********** - ******** ********* *** ** **** **** ********* telephone ****** *** ****** ******* ******* *** *** ******* ** mass ************
  • ****** - *********** ******** ******* **** ******* ***** ******* ****** for '*****-**-**********' ****** *** ********** ******** ** ******** *****. **** feature ** ****** ** ******* ***** ** ****** *********, ***** intercom ******* *** **** ** ** ****** ** ** ******* system *** ****** ***************.
Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

ShotSpotter To IPO, Facing Low Revenue and Losses on May 17, 2017
A rare event for North American security manufacturers is upcoming. ShotSpotter is planning to IPO on the NASDAQ, aiming to raise $34.5...
Selling and Valuing Security Integrators on May 12, 2017
This ia a tutorial in how to (1) determine your security integrator's value and (2) to sell your security integrator. If you own an integrator,...
Duress Codes For Alarms Systems on May 02, 2017
An alarm system can call for help in the event of an attempted break in, but only if it is armed. If an adversary forces an authorized user to...
Axis Network Horn Tested on Apr 18, 2017
We bought and tested the Axis network horn C3003-E, examining setup and calibration, event audio, VMS integration, and sound pressure levels...
Hanwha Lowest Cost WiseNet X Camera (XND-6010) Tested on Apr 13, 2017
IPVM bought and tested the lowest-cost WiseNet X model, the indoor 2MP fixed focal XND-6010 dome, continuing our testing of Hanwha's new WiseNet X...
Burglar Alarm Strobes Guide on Mar 31, 2017
Strobes provide visual notification of alarm incidents, as sirens are used to give audible notification. Using a strobe gives alarm users and alarm...
2Gig Intrusion Megatest (GC2 & GC3 Panels Tested) on Mar 28, 2017
2Gig is one of the most widely used intrusion systems, with two product lines that are the main offering of many alarm companies, huge national...
Burglar Alarm Sirens Guide on Mar 27, 2017
Sirens are used to alert users to an alarm condition. In this note, we examine how to choose, locate, and install alarm sirens, including Siren...
Glass Break Sensor Tutorial on Mar 21, 2017
Burglars often break glass windows to get into a house. Using glass break detectors in conjunction with alarm contacts is a good way to protect the...
Alarm Panic Switches Tutorial on Mar 16, 2017
Panic switches allow silently triggering an alarm system when it is otherwise disarmed. In this tutorial we explain and contrast the 7 most common...

Most Recent Industry Reports

Anti-Hack Access Card Shields Tested on May 26, 2017
Keeping your access control card information secure is becoming a big priority, especially since cheaper copiers can hack details easily. Multiple...
H.265 / HEVC Codec Tutorial 2017 on May 25, 2017
Since 2013, video surveillance professionals have talked about the potential for H.265. Now, in 2017, H.265 is starting to gain mainstream...
Camera Course Summer 2017 on May 25, 2017
Learn video surveillance and get certified. IPVM provides live online classes, recorded videos, personal help, cutting edge education and...
Most Respected Manufacturer Competitors on May 25, 2017
Manufacturers told IPVM what competitor they most respected. In terms of total revenue, Hikvision, Dahua and Axis are certainly tops but would...
CyPhy 'Unlimited' Flight Time Security Drone Examined on May 25, 2017
Drones face several issues as commercial security platforms - legal restrictions (e.g., in the US, the FAA), costs, and limited flight durations...
Milestone Entry Level Mobile Password Vulnerability Disclosed on May 24, 2017
While many manufacturers have only addressed cybersecurity vulnerabilities after public disclosures were made (or threatened), Milestone has...
How Integrators Use IPVM on May 24, 2017
150 integrators explained how they use IPVM and how it helps them stay informed and improve their business.  The 4 main uses integrators cited for...
Alarm Supervision Guide on May 24, 2017
Burglar alarms can constantly monitor the health of attached circuits, sensors, and devices to ensure that they remain operational. This is known...
Arlo Go Cellular Cloud Camera Tested on May 23, 2017
Totally wireless surveillance cameras are growing but almost all typically depend on a hub and local Internet access. However, many outdoor...
Avigilon New COO James Henderson Profile on May 23, 2017
It has been nearly 2 years since the infamous Bryan Schmode 'resigned' as Avigilon COO. Now, Avigilon once again has a COO, promoting James...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact