Integrated security systems at large facilities

Integrated Security Systems


Good day, dear reader. I will talk about the design of networks and, in general, the concept of the operation of integrated security systems. Saying "integrated security systems" (hereinafter - KSB), I mean a set of equipment, software and engineering structures. What are they needed for? KSB are created to protect against terrorist threats, from unauthorized penetration, to control the entire territory, buildings and perimeter of the object of protection, and of the “fool”, of course. Currently, these systems are mainly equipped with energy facilities, large plants and other “critical” elements.

image1
Fig. 1. The perimeter in one enclosure without any additional means of detection.


image2
Fig. 2. The perimeter in one enclosure with a spiral barbed barrier and (possibly) a triboelectric sensing element at the bottom of the enclosure from the cabinet.

Isn't it better to let the dogs guard? It is difficult to unequivocally answer this question, especially since there is a government decree on the mandatory equipment of certain categories of facilities. The resolution is a document of special use, therefore, it will not be discussed in the article, just as the nuances from this resolution will not be discussed. In order not to disturb anything and not offend anyone, we restrict ourselves to the basic principles of object protection and describe individual examples of the functioning of such systems.

In order to determine whether this is interesting to you or not, I will describe the picture of what is happening:

An intruder, making his way through a barbed wire mesh fence, will climb over it or have a snack (sawed) in any case. At this moment, a vibrational detection means (or a variant thereof) will work, capable of perceiving different frequency ranges. The cameras will turn to the place of penetration and on the security control panel this section will be displayed in close-up. Behind the fence there is a security zone (without mines), but with radio beam sensors installed on it. Once in the field of radio-beam sensors, the intruder will intensify the alarm mode, the illumination intensity of this area will increase, an additional notification will appear with the penetration area number on the plan and with video information. At this point, a quick response team will arrive, which is enough for the first warning and video recording from the camera. Next, the intruder will approach the second,

Technical part. General information


In simple terms, the system has a single data center, usually one 19 "server rack and a couple of servers in it are enough. Naturally, when I say" data center "I mean a small hardware room, equipped with everything for normal equipment operation. The server receives data from peripheral switches that collect information directly from sensors, processes, analyzes, archives and reacts. Any temperature-resistant, moisture-proof industrial switches can act as switches. the switches usually have ports for SFP and several Ethernet ports.The data on the switch come from video cameras (usually powered by POE) and from security equipment units that have ethernet ports or are connected through a port converter.

Information comes to the blocks of security equipment via (there are already many options):
- dry contact;
- industrial interface RS485;
- the same ethernet.

But more often than not, these are analog non-addressable sensors.

Technical part. Perimeter


Now about the principle of work in more detail. The conditional object has a perimeter. Let our object be a huge plant or power plant, the length of the perimeter of which is slightly more than 3 kilometers, or maybe five. Usually for ease of perception, the perimeter is divided into sections from 100 to 250 meters. Speaking of simplicity of perception, I was a little disingenuous, in addition to simplicity of perception, detection sensors - no matter which - tribroelectric, radio beam, on accelerometers or others - usually work up to 200 meters (however, they exist on the basis of an optical cable, they are much more long-range). The gates are usually considered a separate section, a separate stationary camera is installed on the gates to help a heap of perimeter rotary. We look at our perimeter in the context and see this:


Fig. 3. A perimeter with an existing external concrete enclosure equipped with a visor.

The perimeter fence is double and each with barbed wire, in addition, the external is equipped with triboelectric sensors. This means that if we shake it, shake it, or try to climb it, it will work. Between the fences there are supports and illuminate the entire obstacle course, so that the cameras can see everything perfectly. Also in the obstacle course we see small columns - these are radio-beam sensors, they are triggered when an object enters their magnetic field and changes the resistance in the field. Following the electromagnetic field of the sensors, the last frontier is the internal fence, all the passages through which are also equipped with magnetocontact sensors.

Thus, all perimeter security systems work together and are based on different physical principles. There are still a lot of nuances in this business - such as the undermining grille, also equipped with vibration sensors and more.

Unfortunately, there is a lot of information and detailed consideration of each part is very voluminous. However, you can grab specific layers and describe them in technical details. I would like to find out what aspects, it would be interesting to write an already less "general" article on a specific topic.

A. What I would like to continue in the next article:
Technical part. Types of sensors.
In case of successful joining the community, I undertake to talk about the types of sensors used (in most cases), they are all from different manufacturers and are based on different principles of exposure and information.

B. Technical part. Information transfer.
Here, most and many more than me know about the transfer of information, there have also been a number of rather detailed articles on the use of optics, but I can approach this problem from other perspectives and describe the other aspects of the problems and solutions.

Also popular now: