13 Jun

How does home monitoring work

How does home monitoring work


The hottest trend in home security right now is something known as "remote monitoring." However, make no mistake, remote technology is not new. It is just being utilized by the home security industry today in a way that it never has before, thanks to wireless technology and the Internet.

Remote monitoring opens up a whole new door of possibilities in home security because it allows both homeowners and alarm companies to pay even closer attention. Adding home monitoring to an existing alarm system enhances security, increases confidence in the system, and decreases the chances of unfortunate circumstances affecting you and your family.

Remote Monitoring in a Nutshell

The idea behind remote monitoring is to allow homeowners access to their security systems even when they are not home. In order to do that some sort of electronic connection must be made between a home's alarm system and the owner. Thanks to the Internet age, that has now been made easier than ever.

Home monitoring relies on Internet-based equipment that allows access with a laptop, smartphone, or tablet. That is accomplished by establishing an Internet connection with a home security system and managing that connection through a home security company's secure servers.

Once that connection is established, a homeowner can control his or her security system anywhere he or she can establish an Internet connection. It enables them to arm and disarm the system, see video feeds, and do just about anything else they could do if they were standing in front of his control center at home.

How It All Works

For any Internet-based connection to work all of the devices involved in a given connection must have what is known as an IP address. This address is simply a numerical designation identifying various devices on a network. It is an electronic version of the house numbers on a given street. The postman knows what mail belongs with what house simply by matching the numbers. Internet communications work the same way.

For home a security system to be available for remote monitoring it must connect to the security company's servers and be assigned a static IP address. When the homeowner logs onto the servers with his laptop or mobile device, that device is also assigned an IP address. Once that is done, the mobile device and the alarm system can communicate via their shared Internet connection.

To keep things secure the alarm company does not allow the two devices to communicate outside of a prescribed software "mediator." The user sees this software as a digital control panel while the security system simply sees it as the source of its instructions. Requiring a software mediator prevents outsiders from breaching the secure communications between the two.

Remote Monitoring Wirelessly

Remote monitoring is entirely possible with a wired system but it is really designed to be used with wireless systems. With a wireless system, the homeowner is not counting on power and phone lines to be intact in order to communicate with the security system. This is important in times of bad weather or when clever burglars cut utility lines before entering a home.

A wireless system relies on cellular technology for communications. Moreover, with backup batteries installed the equipment will still operate even if power and phone lines are not working.


Peter Styles

Peter is an entrepreneur over 25 years. He enjoys spends relaxing weekends with his family.

Related Pages

Sidebar Menu