perimeter intrusion detection system

37
Perimeter Intrusion Detection System

Upload: bowie

Post on 01-Feb-2016

339 views

Category:

Documents


36 download

DESCRIPTION

Perimeter Intrusion Detection System. Perimeter Intrusion Detection System. Features & Advantages. H 2. 1. Hardware Zone - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Perimeter Intrusion Detection System

Perimeter Intrusion Detection System

Page 2: Perimeter Intrusion Detection System

Features & AdvantagesH 2

Perimeter Intrusion Detection System

1. Hardware ZoneIn hardware zone application, a perimeter is segregated into different detection zones deployed with several sets of sensing fibers. On the other hand, software zone-based systems have basically single sensing line that run the entire perimeter.

2. Plug & Play InstallationThe plug and play design with SC connectors facilitates swifter installation by using only simple hand tools. There is no need for expensive and fragile splicer to connect the fiber cables to their respective junctions/terminal boxes.

3. Full PassiveFull passive components are the design that requires no outdoor processors and electrical power to the outdoor components. In this case, the system is immune to electromagnetic interference (EMI), radio frequency interference (RFI), and lightning.

4. Easy to RepairAt Nxtar, each detection zone comes with two arms of sensing fiber. When one arm of fiber is cut, it is easy and efficient to repair by replacing the damaged part with one new arm. The restoration can be completed in two hours without use of expensive splicer. After the system installation, less or no maintenance is required to remain optimal performance.

Page 3: Perimeter Intrusion Detection System

Features & AdvantagesH 3

Perimeter Intrusion Detection System

5. InvisibilityWhen buried underground or installed on wall-top with gravels covering on it, the sensing fiber is completely invisible, thus leaving landscapes unchanged. This prevents tampering and intruder by-pass of the detection area.

6. Intelligent Identification AlgorithmThe system with built-in Intelligent Identification Algorithm can reduce the false/nuisance alarm to the lowest level by differentiating actual intrusions from global noises (rain, snow, wind, hail storms and small animals).

7. Integrate with CCTV Surveillance Inspectors can remotely monitor their premise and double confirm if it is a

genuine intrusion prior to alerting guards. Nxtar has its own Fiber Optic Converter for signal transmission . By integrating with our PIDS, their signals can share the same cable, thus reduce material and deployment laboring cost.

8. Application Scale Classification

The solution is designed to fulfil different scale of users. it has been categorized into 3 different scales: Large Scale, Medium Scale, and Small Scale. The large scale solution is customized to accommodate an individual customer’s requirements and special needs on the most cost effective manner; the small scale solution is designed to achieve DIY installation for the consumer market.

Page 4: Perimeter Intrusion Detection System

1. Hardware Zone

H 4

Each Nxtar controller comes with 1, 2, 4 or 6 zone(s) of detection and multiple systems can be linked for virtually unlimited distances. All our zones are hardware based and are advantageous against software zone in numerous ways. Detection zones that are hardware-based enable each zone to function independently, and therefore can be individually calibrated in accordance with various environments in the same perimeter. It is almost impossible to demand that a perimeter, especially a large one, is of the same landscapes. Consequently, our systems can accept individual zone settings for finer monitoring solutions.

Perimeter Intrusion Detection System

Page 5: Perimeter Intrusion Detection System

2. Plug & Play Installation

H 5

The connection between Sensing Junction Box (SJB), Terminal Junction Box (TJB) and Controller are designed to use Plug & Play installation. SC connector plugs directly into the port, making installation straightforward by using only a screwdriver. The installation can be completed in an easy and swift way.

Perimeter Intrusion Detection System

SJB TJB

Controller

Page 6: Perimeter Intrusion Detection System

3. Full Passive

H 6

At Nxtar, our system is one of the few who is able to achieve a 100% passive components outfield. Our system does not require any electrical powering once installed outfield. This is a very strong feat as it requires no deployment of electrical cables for powering and signal amplification for long distance transmission. Equipped with full passive components, our system is immune to electronic-magnetic interference (EMI), radio frequency interference (RFI), and lightening.

Perimeter Intrusion Detection System

ImmuneNo need

Page 7: Perimeter Intrusion Detection System

Replace

4. Easy to Repair

H 7

Hardware zoning enables each zone functions independently, preserving the operation of the rest of the system when one zone is damaged. By simply replacing that piece of damaged fiber cable, the reparation doesn’t need to shut down the whole system , and can be rapidly done within two hours. In other words, the remaining zones still function to secure the perimeter during the repairing process. P.I.D.S is virtually maintenance-free after installation, thus lowering the maintenance cost.

Perimeter Intrusion Detection System

Page 8: Perimeter Intrusion Detection System

H 8

5. Invisibility

Perimeter Intrusion Detection System

The system can be used to secure Fence, Wall and Field. The system smoothly integrates with the perimeter environment without affecting its aesthetics. Covert deployment allows sensing devices to be hidden from damage and awareness by intruders. The system is invisible and undetectable to intruders, thus increasing the rate of detection.

Page 9: Perimeter Intrusion Detection System

H 9

6. Intelligent Identification Algorithm

True Intrusion Signal RecognitionInstead of just “On/Off” status report from indoor conventional devices, Nxtar Fiber Optics

P.I.D.S. uses intelligent signal identification to define an Human Intrusion signal from all other

environmental disturbance to give you the lowest level of false alarm in the industry. The use

of parameters setting from the software can customize the system’s detection ability within

that specific environment, thus reduce false alarm rate.

Perimeter Intrusion Detection System

!

Page 10: Perimeter Intrusion Detection System

H 10

7. Integrate with CCTV Surveillance

IP Camera DeploymentBy integrate P.I.D.S with CCTV Surveillance together, when intrusion occurs, PTZ cameras will be triggered to turn to the specific zone to observe. Inspectors can remotely monitor their premise and double confirm if it is a genuine intrusion prior to alerting guards.

Perimeter Intrusion Detection System

Page 11: Perimeter Intrusion Detection System

H 11

7. Integrate with CCTV Surveillance

IP Camera Deployment

Perimeter Intrusion Detection System

Powered Mast

Fiber Ethernet Converter

NC-300 (3 ports)Speed Dome

IP PTZ Camera

Camera Junction Box

UTP Ethernet Cable

100m 100m

Powered Mast Powered Mast

Page 13: Perimeter Intrusion Detection System

H 13

7. Integrate with CCTV Surveillance

Perimeter Intrusion Detection System

PIDS + CCTV Technical & Control Room

Page 14: Perimeter Intrusion Detection System

H 14

Small ScaleThe small scale solution is mainly designed to cover 1 to 2 detection zones in a perimeter within 1km. The installation only requires two workers to complete within one day, saving time and labour cost. Military/industrial performance security system is utilized for household use and any small unit applications.

2 Zones of Detection managed by one NSB-200M controller.

Perimeter Intrusion Detection System8. Application Scale Classification

Page 15: Perimeter Intrusion Detection System

H 15

8. Application Scale Classification

Medium ScaleThe medium scale application targets a wide variety of markets such as military base, prison, warehouse, factory, power plant, and logistic facility. The standard application for medium scale is suitable for both 4-12 zones of detection and a perimeter ranging from 1-3 km.

12 Zones of Detection managed by two NSB-600R controllers

Perimeter Intrusion Detection System

Page 16: Perimeter Intrusion Detection System

H 16

Large ScaleThe large scale solution is utilized to secure large areas: airports, national borders, oil refineries,military bases, pipe lines are only just few common examples. This application is suitable formore than 18 zones of detection and a perimeter beyond 9km in length. In fact, the large scalesolution can be applied to virtually unlimited distances through connecting multiple systems.

Perimeter Intrusion Detection System8. Application Scale Classification

18 Zones of Detection managed by three NSB-600R controllers.

Page 17: Perimeter Intrusion Detection System

H 17

System Structure

Perimeter Intrusion Detection System8. Application Scale Classification

Page 18: Perimeter Intrusion Detection System

Items of P.I.D.S Package

H 18

◢ Typical Items for P.I.D.S

Perimeter Intrusion Detection System

NSB-600R

NSB-400R

NSB-200R

Sensing Fiber

Leading Fiber

Sensing Junction Box

Terminal Junction Box

Leading Cable Cable Splitting Module

Page 19: Perimeter Intrusion Detection System

H 19

Specification of P.I.D.S. Controllers

Perimeter Intrusion Detection System

NSB-200R NSB-400R NSB-600R

Method of Detection Fiber optics sensor

Number of Detection Zones NSB 200R: 2 zonesNSB 400R: 4 zonesNSB 600R: 6 zones

Type of Sensing Fiber single mode fiber

Sensor Sensitivity uniform over entire fiber

Rated Voltage 100~260 V/AC; 12V/DC (optional)

Operating Temperature Range - 30°C ~ 70°C for the controller-30c~75c for fiber sensors

Output Alarm Sound/LED/LCD/Relay

Dimensions (W x H x L) 350mm x 100mm x 428mm

Fiber Connectors SC-APC Type

Page 20: Perimeter Intrusion Detection System

H 20

Specification-Host Module (Recommended)

Form Factor Nano-BTX Form Factor

Processor 1.8 GH3

Memory 512MB

Graphics SiS Mirage 1 Graphics

LAN Realtek 8201CL 10/100 LAN

Hard Disk 80GB SATA

Expansion Slots1 x 3.5" bay (Internal)1 x 3.5" bay 2 x 5.25" bay

Dimensions

310(L) x 188(W) x 310(H) mm

Power 250W PFC

Camera Input

BNC x 4 (2)

HIDS Port DB-9 (1) 12

Perimeter Intrusion Detection System

Page 21: Perimeter Intrusion Detection System

H 21

Deployment Methods

Nxtar Fiber Optics Home Intrusion Detection System

can be deployed on 3 different materials, making it one of the most versatile systems.

Perimeter Intrusion Detection System

Page 22: Perimeter Intrusion Detection System

H 22This airport application is an example of typical P.I.D.S deployment on fence with multiple detection zones. Possible deployment types are Fence, Wall, and Underground.

Typical P.I.D.S Deployment

Perimeter Intrusion Detection System

Page 23: Perimeter Intrusion Detection System

Sensing Fiber – 6mm

P.E. RESISTANCECable Ties – 15cm (6”)

◢ Detail B: Cable Ties

Fence Deployment #1

H 23

◢ Detail A: Tight Fixer

Sensing Fiber – 6mm

Rubber Tubing – 10mm

S/S HOSE CLIP – 25mm

3

Detail ADetail B

12

12

Sensing Fiber

Leading Fiber

1

2

3

1

2

Standard 100mMaximum 500m

Sensing Junction BoxTerminal Junction Box

Perimeter Intrusion Detection System

Page 24: Perimeter Intrusion Detection System

Sensing Fiber – 6mm

P.E. RESISTANCECable Ties – 15cm (6”)

◢ Detail B: Cable Ties

Fence Deployment #2

H 24

◢ Detail A: Tight Fixer

Sensing Fiber – 6mm

Rubber Tubing – 10mm

S/S HOSE CLIP – 25mm

3

Detail ADetail B

12

12

Sensing Fiber

Leading Fiber

1

2

3

1

2

Standard 100mMaximum 500m

Sensing Junction BoxTerminal Junction Box

Perimeter Intrusion Detection System

Page 25: Perimeter Intrusion Detection System

Sensing Fiber – 6mm

P.E. RESISTANCECable Ties – 15cm (6”)

◢ Detail B: Cable Ties

Fence (Barbed-Wire) Deployment #3

H 25

◢ Detail A: Tight Fixer

Sensing Fiber – 6mm

Rubber Tubing – 10mm

S/S HOSE CLIP – 25mm

3

Detail A Detail B

12 12

1

2

3

1

2

Standard 100mMaximum 500m

Sensing Fiber

Leading Fiber

Terminal Junction Box Sensing Junction Box

Perimeter Intrusion Detection System

Page 26: Perimeter Intrusion Detection System

Steel bar fence deployment

Fence Deployment

Barbed-wire fence deployment on wall

H 26

Wire mesh fence deployment

Perimeter Intrusion Detection System

Page 27: Perimeter Intrusion Detection System

H 27

Wall Deployment

Wall installation is possible either on the wall top as shown or on walls using fixer brackets.

L-Bracket for wall top mounting

7~9 cm

Sensing Junction BoxLeading Fiber

Smooth Gravels

PE Construction Mesh

Sensing Fiber

Terminal Junction Box

Smooth Gravels

L-shaped steel bracket(Height 7-9cm)

◢ Cable Clips can be used to fix Leading Fiber alone the wall.

Perimeter Intrusion Detection System

Page 28: Perimeter Intrusion Detection System

Wall Deployment

Stone wall with wire cage

H 28

Wall-top deployment with L-BracketWall-top deployment

Perimeter Intrusion Detection System

Page 29: Perimeter Intrusion Detection System

Wall Deployment

H 29

Three main ways for Sensing Junction Box Deployment

Inside Junction BoxOn wall side

On wall-top bed

On wall-top bed

The way for Terminal Junction Box Deployment

Perimeter Intrusion Detection System

Page 30: Perimeter Intrusion Detection System

◢ Many types of underground deployments are available depending on your current landscape. Top layers such as grass, rock, or soil can be used, allowing you to preserve your landscape.

Underground Deployment

H 30

Gravel Field StructureLawn Field Structure

Sensing Junction Box and Terminal Junction Boxes location

Sensing Junction Box and Terminal Junction Boxes location

Sensing Fiber

PE Construction Mesh

Smooth Gravels(Gravel size 2-3cmLayer thickness 5cm)

Smooth Gravels (Gravel size 2-3cm)

Soil

Grass Turf

Sensing Fiber

PE Construction Mesh

Perimeter Intrusion Detection System

Page 31: Perimeter Intrusion Detection System

31

Example of Underground Deployment (Japan)

H 31

Perimeter Intrusion Detection System

Page 32: Perimeter Intrusion Detection System

32

Example of Underground Deployment

H 32Lawn field deployment Alone the wall

Gravel field deployment

50cm gap between wall and Sensing Fiber

30cm gap between each Sensing Fiber

Landscape random deployment

Perimeter Intrusion Detection System

Page 33: Perimeter Intrusion Detection System

Example of Underground Deployment on Roof

Roof Top

Sun Deck

H 33

Fiber Cable is fixed onto PE mesh with cable ties.

Laying smooth gravels

Perimeter Intrusion Detection System

Page 34: Perimeter Intrusion Detection System

Remote Operation

H 34

Remote Maintenance & Online Troubleshooting

Data Analysis Software(DAS) and Nxtar Monitoring Software(NMS) allow the operator to remotely monitor and control the system through internet, and perform remote maintenance and online troubleshooting. These features can save money and time from transportation, and make things easy and convenient.

Internet

Remote Maintenance &

Online Troubleshooting

Remote Operator

PIDS Site

Perimeter Intrusion Detection System

Page 35: Perimeter Intrusion Detection System

Remote Maintenance

H 35

Environmental Study using Data Analysis Software

First, run Data Analysis Software to record environmental status data of the sensing zone for a certain period of time. Later, study the result and use as a reference for the system parameters setting from Nxtar Monitoring Software. This procedure can be done remotely through internet by the system operator for observation and examination purpose.

Data Analysis Software – Main Window Data Analysis Software – Analysis Chart

Perimeter Intrusion Detection System

Page 36: Perimeter Intrusion Detection System

Remote Control & Monitoring

H 36

Remote Operation using Nxtar Monitoring Software

The system has 3 main setting parameters, Level, Count and Period. Set them to the right value will reduce the nuisance alarm rate to minimum. The operator can remotely perform the setting using Nxtar Monitoring Software through internet. This software also supports advanced setting.

Period

Count

Level

Nxtar Monitoring Software – Monitoring Window Nxtar Monitoring Software – Event Log

Perimeter Intrusion Detection System

Page 37: Perimeter Intrusion Detection System

Thank you very much!

H 34Nxtar Technologies Incorporated

◢ http://www.nxtar.com

Perimeter Security Solution

- The End -