USA
Catalog   /   Home & Renovation   /   Security Systems   /   Security Systems & Smart Hubs

Comparison Ajax Hub 2 (2G) vs Ajax Hub

Add to comparison
Ajax Hub 2 (2G)
Ajax Hub
Ajax Hub 2 (2G)Ajax Hub
Outdated ProductOutdated Product
TOP sellers
Main
“Geofence” function (setting up security system reminders when crossing a certain zone. The location is determined by the GPS of the smartphone.). Connects up to 100 sensors.
Typehub (control unit)hub (control unit)
Connecting sensorswirelesswireless
Wireless zones950
Backup power16 h15 h
Communication protocol with sensorsJewellerJeweller
Features
Security functions
partial protection
push button alarm
 
 
Connection to control panel
Max. wireless sensors100100
Sensor communication range
2000 m /in open space/
2000 m /in open space/
Key fobs communication range
800 m /in open space/
Users (numbers to call)5050
Sensor characteristics
Tamper
General
Control
control fob
phone (GSM) /2G: 850/900/1800/1900 MHz (2 SIM cards)/
mobile app (Wi-Fi)
control fob
phone (GSM)
 
Operating temperature-10 °C ~ +40 °C0 °C ~ +50 °C
Max. humidity75 %80 %
Control panel dimensions (HxWxD)163x163x36 mm163x163x36 mm
Added to E-Catalogfebruary 2020april 2018

Wireless zones

The number of security zones that can be covered by this kit when using wireless sensors.

In this case, a security zone means a separate protected area for which you can separately set the operating mode — for example, "Protection", "Protection disarmed" or a special tracking format. On many models, the number of zones corresponds to the maximum number of wireless sensors that can be connected to the device (see "Wireless Sensors"). However, there are exceptions: for example, a model for several dozen sensors can have 6-10 protection zones, in the expectation that one zone will be served simultaneously by several sensors.

Backup power

The time that the alarm is able to work on its own built-in power supply, in case of failure of an external power source.

Backup power allows the security system to remain operational during power outages (including during deliberate shutdown). The longer the time of operation on backup power, the more reliable the alarm, the lower the likelihood that due to power outages, the security will be completely disabled. At the same time, note that the specifications usually indicate an “perfect” battery life, with minimal power consumption; in fact, this period may be less — depending on the specific mode of operation, the frequency of operations and the quality of the batteries used (if replaceable batteries play the role of an autonomous source). So it is worth choosing according to this indicator with a certain margin — at least 15 – 20%.

Security functions

Partial security. Possibility of work of a set in the mode of partial protection. In this mode, the alarm does not arm the entire protected space, but only a part of it — for example, individual rooms, or only sensors of a certain type (opening, movement). Specific features of the partial protection format may be different, they should be specified separately in each model. However, anyway, this function expands the capabilities of the signaling and may be useful in some specific situations. For example, in a residential building at night, you can turn on the perimeter sensors without using motion sensors — in this way, the alarm will only turn on when you try to enter the house and will not respond to people inside.

Alarm on pressing the button. Possibility to turn on the alarm signal manually by pressing a special button. This function will be indispensable in extreme situations in which automatic sensors are useless — for example, during an open robbery or attack. Specific alarm functions, of course, may be different: some models include a siren, others are able to send a signal to the dispatcher's console, etc.; these details should be specified separately.

Auto arming. Possibility of automatic arming of the alarm system. Most often, in this case, the inclusion of protection is implied by the schedule of hours and days of the week specified b...y the user; some models allow you to store several schedules in memory at once. This feature ensures that the protected zone "out of hours" will not be left without an alarm, even if the user forgets to turn it on manually. In addition, other methods of auto-arming may be provided — for example, when all key fobs are removed from the communication zone; the presence of such functions should be clarified separately.

Key fobs communication range

The distance at which the connection of the control key fobs with the central alarm unit is maintained. This is a rather approximate, moreover, a very conditional indicator: the characteristics usually indicate the distance in perfect conditions — with line of sight, without interference and obstacles between the key fob and the control panel. In fact, the communication range may be less than stated, especially if the key fob has to work through walls. So it is worth choosing according to this indicator with a certain margin.

Also note that this parameter is indicated in the specifications for regular key fobs — complete or recommended by the manufacturer; when using "non-native" accessories, the communication range may be reduced.

Tamper

The presence of a tamper in the devices included in the set.

A tamper is a device that protects the body of the device from unauthorized opening and interference with work. The simplest tamper is a microswitch that is triggered when the case is opened and sends an alarm signal to the alarm. In addition to this, advanced equipment can be provided — for example, a switch that reacts to an attempt to tear the sensor away from the wall. The tamper is usually equipped with at least complete sensors, and in some cases — the control panel; these points should be clarified separately. Of course, such equipment does not provide absolute protection against interference, but it noticeably “makes life difficult” for an attacker who decides to spoil the alarm.

Control

Control methods provided in the set.

Keypad of the control panel. Keyboard control on the central unit. The simplest and most inexpensive method, which has long been used in alarms and is suitable for even the simplest low-cost-level kits. To access the controls, you need to be directly near the central unit — this can be both a disadvantage and an advantage, depending on the situation. So, it is not always convenient to approach the control panel every time; on the other hand, if remote control methods are not provided for in the design, the alarm system turns out to be as resistant to hacking as possible: it cannot be hacked remotely, and in order to physically get to the central unit, you usually need to overcome the protected perimeter.

Keychain. Controlled by a wireless remote control, similar to those used in car alarms. This method is quite convenient from a practical point of view: you can give alarm commands from a distance, and it is convenient to carry the key fob with you — for example, by attaching it to the same key ring that opens the protected room. The range of key fobs (see above) in modern alarms ranges from 40 – 50 m to 1.5 km or even more. The disadvantage of this option is the actual dependence on the key fob, which can be lost or stolen; and the batteries in the key fob also need to be monitored so as not to be left without a remote control at the most inopportune moment.

From the phone (GSM). Phone control via GSM networks. Note that you do not need a smartphone to use this function: control is carried out via SMS and/or voice menu and is available from any mobile phone, and in some models from a stationary phone with tone dialing. In addition to the ability to access the alarm from almost anywhere in the world where there is a mobile connection, this type of control has another important advantage: the design often provides for feedback, namely the ability to send voice calls and/or SMS messages to the user's phone (see Fig. "Users (numbers to call)", "Numbers to SMS"). However here it is worth considering that in order to use GSM control, it is necessary to buy and install a SIM card of a mobile operator in the central signaling unit; and for calls and SMS from the central office, the mobile operator will charge on a general basis.

From the Internet (Wi-Fi).... Management via the Internet — through an application on a computer or mobile gadget or through a special page in any browser; via Wi-Fi, in this case, the alarm is connected to the Internet. Like the mobile communication described above, this method makes it possible to control the alarm from anywhere in the world (if there is access to the World Wide Web), and receive various notifications from the alarm. Specific features of such management should be clarified separately. Among other things, this method is especially convenient for those who often travel abroad: mobile roaming on such trips is not cheap, it can be easier to find Internet access.

Operating temperature

The air temperature range in which the alarm components maintain normal operation.

This parameter is important first of all in cases where the alarm is planned to be used outdoors or in unheated rooms. Particular attention in such cases should be paid to whether the system can work at sub-zero temperatures. If we are talking about room temperatures (plus or minus), then you can’t really look at the claimed temperature range — almost any alarm is suitable for such conditions.

Max. humidity

The highest relative humidity at which the alarm is able to operate normally.

Excessive humidity leads to water settling on the system components, which can affect their performance and even lead to breakage. Therefore, modern electronics, including alarms, usually have limits on permissible humidity. However, you need to pay attention to this indicator mainly in cases where the kit is planned to be used outdoors or in rooms with initially high humidity, such as swimming pools or water parks — for such cases, it is desirable that the humidity limit be at least 90%. But in residential and office premises, humidity rarely exceeds 80%, and such conditions can endure almost all modern alarm systems.
Ajax Hub 2 (2G) often compared
Ajax Hub often compared