FIG. 14 is a block diagram showing communications among IP devices of the private network environment, under an embodiment.
FIG. 15 is a flow diagram of a method of integrating an external control and management application system with an existing security system, under an embodiment.
FIG. 16 is a block diagram of an integrated security system wirelessly interfacing to proprietary security systems, under an embodiment.
FIG. 17 is a flow diagram for wirelessly ‘learning’ the gateway into an existing security system and discovering extant sensors, under an embodiment.
FIG. 18 is a block diagram of a security system in which the legacy panel is replaced with a wireless security panel wirelessly coupled to a gateway, under an embodiment.
FIG. 19 is a block diagram of a security system in which the legacy panel is replaced with a wireless security panel wirelessly coupled to a gateway, and a touchscreen, under an alternative embodiment.
FIG. 20 is a block diagram of a security system in which the legacy panel is replaced with a wireless security panel connected to a gateway via an Ethernet coupling, under another alternative embodiment.
FIG. 21 is a flow diagram for automatic takeover of a security system, under an embodiment.
FIG. 22 is a flow diagram for automatic takeover of a security system, under an alternative embodiment.
DETAILED DESCRIPTION