b'expected to grow immensely in the followingcommunicator sends alarm signals from the years as people attempt to save on price of asecurity system to the central monitoring security system. With DIY security, you nostation without the need for a POTS line. Dual longer have to pay for expensive alarmpath monitoring is much more reliable than installations.phone line monitoring because it has two DIY Security System: A self-contained wirelessredundant alarm communication paths. security system that is so easy to install that youDual Path (Cellular/IP) Monitoring: A type of do not need a professional alarm technician toalarm monitoring that uses two redundant complete the installation.paths to send alarm signals to a central Door/Window Contact: Consists of an alarmmonitoring station. Typically, the internet transmitter and a magnet. The transmitterprotocol (IP) monitoring path is used as a should be installed on the door or windowprimary path because it allows for constant frame while the magnet should be installed onpolling of the signal. As soon as the connection the door or window. Installing them in theis lost, the cellular/IP communicator will opposite position would increase the chances ofautomatically switch over to cellular a broken alarm transmitter as the door maycommunication. This type of alarm monitoring slam and rattle the sensitive circuit board.is the most reliable path available. When the door or window is closed the magnetDual Technology (DTEC): A single alarm device is aligned with the transmitter and the zone isthat detects alarms using two different types of closed. If the window or door is opened thetechnology. Most commonly refers to a motion magnet becomes unaligned and you have andetector that utilizes passive infra-red (PIR) and open zone. When the security system is armedmicrowave detection. and a door/window contact has an open zone,Duress Code: A four-digit code chosen by the an alarm signal is generated.user and used to alert central station operators Door/window contacts are consideredthat an authorized person is under duress perimeter protection and FE Moranwithout alerting the intruder that emergency recommends installing a door/window contacthelp has been requested. Duress alarms are on every accessible door or window.treated as panic alarms and are dispatched Dual Interface Poll (DIP): Switches that allowupon immediately without the need for any you to change the configuration of the circuittype of alarm verification. board of an alarm device or alarm control panelIf a criminal were to break in while you were to activate/change different functionality.home and demand that you disarm your Dual Path (Cellular/IP) Digital Communicator:security system, enter your duress code and the A digital electronic device that provides both ansecurity system would act as if you did a normal internet protocol (IP) and cellular connectiondisarm. However, the central monitoring station for alarm monitoring. These alarmactually receives a duress code alarm. communicators typically use the IP path asEnhanced Call Verification (ECV): A type of primary because an IP signal can be constantlyalarm verification that requires a central station polled for connectivity. As soon as the IP signaloperator to place two phone calls before is lost, the alarm communicator automaticallydispatching the proper authorities. ECV is switches over to the cellular path, which uses aquickly being adopted by more jurisdictions built-in SIM card to communicate over anaround the country as it continues to prove to existing wireless network. A cellular/IPbe an effective way to reduce false alarms and 81'