1 / 37

Perimeter Intrusion Detection System

Perimeter Intrusion Detection System. Perimeter Intrusion Detection System. Features & Advantages. H 2. 1. Hardware Zone

bowie
Télécharger la présentation

Perimeter Intrusion Detection System

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Perimeter Intrusion Detection System

  2. Perimeter Intrusion Detection System Features & Advantages H 2 • 1. Hardware Zone • In hardware zone application, a perimeter is segregated into different detection zones deployed with several sets of sensing fibers. On the other hand, software zone-based systems have basically single sensing line that run the entire perimeter. • 2. Plug & Play Installation • The plug and play design with SC connectors facilitates swifter installation by using only simple hand tools. There is no need for expensive and fragile splicer to connect the fiber cables to their respective junctions/terminal boxes. • 3. Full Passive • Full passive components are the design that requires no outdoor processors and electrical power to the outdoor components. In this case, the system is immune to electromagnetic interference (EMI), radio frequency interference (RFI), and lightning. • 4. Easy to Repair • At Nxtar, each detection zone comes with two arms of sensing fiber. When one arm of fiber is cut, it is easy and efficient to repair by replacing the damaged part with one new arm. The restoration can be completed in two hours without use of expensive splicer. After the system installation, less or no maintenance is required to remain optimal performance.

  3. Perimeter Intrusion Detection System Features & Advantages H 3 • 5. Invisibility • When buried underground or installed on wall-top with gravels covering on it, the sensing fiber is completely invisible, thus leaving landscapes unchanged. This prevents tampering and intruder by-pass of the detection area. • 6. Intelligent Identification Algorithm • The system with built-in Intelligent Identification Algorithm can reduce the false/nuisance alarm to the lowest level by differentiating actual intrusions from global noises (rain, snow, wind, hail storms and small animals). • 7. Integrate with CCTV Surveillance • Inspectors can remotely monitor their premise and double confirm if it is a genuine intrusion prior to alerting guards. Nxtar has its own Fiber Optic Converter for signal transmission . By integrating with our PIDS, their signals can share the same cable, thus reduce material and deployment laboring cost. • 8. Application Scale Classification • The solution is designed to fulfil different scale of users. it has been categorized into 3 different scales: Large Scale, Medium Scale, and Small Scale. The large scale solution is customized to accommodate an individual customer’s requirements and special needs on the most cost effective manner; the small scale solution is designed to achieve DIY installation for the consumer market.

  4. Perimeter Intrusion Detection System 1. Hardware Zone Each Nxtar controller comes with 1, 2, 4 or 6 zone(s) of detection and multiple systems can be linked for virtually unlimited distances. All our zones are hardware based and are advantageous against software zone in numerous ways. Detection zones that are hardware-based enable each zone to function independently, and therefore can be individually calibrated in accordance with various environments in the same perimeter. It is almost impossible to demand that a perimeter, especially a large one, is of the same landscapes. Consequently, our systems can accept individual zone settings for finer monitoring solutions. H 4

  5. Perimeter Intrusion Detection System 2. Plug & Play Installation The connection between Sensing Junction Box (SJB), Terminal Junction Box (TJB) and Controller are designed to use Plug & Play installation. SC connector plugs directly into the port, making installation straightforward by using only a screwdriver. The installation can be completed in an easy and swift way. H 5 Controller SJB TJB

  6. Perimeter Intrusion Detection System 3. Full Passive At Nxtar, our system is one of the few who is able to achieve a 100% passive components outfield. Our system does not require any electrical powering once installed outfield. This is a very strong feat as it requires no deployment of electrical cables for powering and signal amplification for long distance transmission. Equipped with full passive components, our system is immune to electronic-magnetic interference (EMI), radio frequency interference (RFI), and lightening. H 6 No need Immune

  7. Perimeter Intrusion Detection System 4. Easy to Repair Hardware zoning enables each zone functions independently, preserving the operation of the rest of the system when one zone is damaged. By simply replacing that piece of damaged fiber cable, the reparation doesn’t need to shut down the whole system , and can be rapidly done within two hours. In other words, the remaining zones still function to secure the perimeter during the repairing process. P.I.D.S is virtually maintenance-free after installation, thus lowering the maintenance cost. H 7 Replace

  8. Perimeter Intrusion Detection System 5. Invisibility The system can be used to secure Fence, Wall and Field. The system smoothly integrates with the perimeter environment without affecting its aesthetics. Covert deployment allows sensing devices to be hidden from damage and awareness by intruders. The system is invisible and undetectable to intruders, thus increasing the rate of detection. H 8

  9. Perimeter Intrusion Detection System 6. Intelligent Identification Algorithm True Intrusion Signal Recognition Instead of just “On/Off” status report from indoor conventional devices, Nxtar Fiber Optics P.I.D.S. uses intelligent signal identification to define an Human Intrusion signal from all other environmental disturbance to give you the lowest level of false alarm in the industry. The use of parameters setting from the software can customize the system’s detection ability within that specific environment, thus reduce false alarm rate. H 9 !

  10. Perimeter Intrusion Detection System 7. Integrate with CCTV Surveillance IP Camera Deployment By integrate P.I.D.S with CCTV Surveillance together, when intrusion occurs, PTZ cameras will be triggered to turn to the specific zone to observe. Inspectors can remotely monitor their premise and double confirm if it is a genuine intrusion prior to alerting guards. H 10

  11. Perimeter Intrusion Detection System 7. Integrate with CCTV Surveillance IP Camera Deployment H 11 Camera Junction Box Fiber Ethernet Converter NC-300 (3 ports) Speed Dome IP PTZ Camera UTP Ethernet Cable 100m 100m Powered Mast Powered Mast Powered Mast

  12. Perimeter Intrusion Detection System Video Player Video Player 7. Integrate with CCTV Surveillance PIDS + CCTV Technical & Control Room System Structure H 12 Control Room Monitoring Room PIDS Monitoring PC* PIDS 6 Zones Map* Monitor* Log* VGA NSB-600R NSB-600R VGA DVR / NVR* Video Monitoring Live Video* RS232 PTZ Controller* Camera controlling

  13. Perimeter Intrusion Detection System 7. Integrate with CCTV Surveillance PIDS + CCTV Technical & Control Room H 13

  14. Perimeter Intrusion Detection System 8. Application Scale Classification Small Scale The small scale solution is mainly designed to cover 1 to 2 detection zones in a perimeter within 1km. The installation only requires two workers to complete within one day, saving time and labour cost. Military/industrial performance security system is utilized for household use and any small unit applications. H 14 2 Zones of Detection managed by one NSB-200M controller.

  15. Perimeter Intrusion Detection System 8. Application Scale Classification Medium Scale The medium scale application targets a wide variety of markets such as military base, prison, warehouse, factory, power plant, and logistic facility. The standard application for medium scale is suitable for both 4-12 zones of detection and a perimeter ranging from 1-3 km. H 15 12 Zones of Detection managed by two NSB-600R controllers

  16. Perimeter Intrusion Detection System 8. Application Scale Classification Large Scale The large scale solution is utilized to secure large areas: airports, national borders, oil refineries, military bases, pipe lines are only just few common examples. This application is suitable for more than 18 zones of detection and a perimeter beyond 9km in length. In fact, the large scale solution can be applied to virtually unlimited distances through connecting multiple systems. H 16 18 Zones of Detection managed by three NSB-600R controllers.

  17. Perimeter Intrusion Detection System 8. Application Scale Classification System Structure H 17

  18. Perimeter Intrusion Detection System Items of P.I.D.S Package ◢Typical Items for P.I.D.S H 18 NSB-600R Sensing Fiber Sensing Junction Box Terminal Junction Box NSB-400R Leading Fiber NSB-200R Leading Cable Cable Splitting Module

  19. Perimeter Intrusion Detection System Specification of P.I.D.S. Controllers H 19 NSB-200R NSB-600R NSB-400R

  20. Perimeter Intrusion Detection System Specification-Host Module (Recommended) H 20 1 2

  21. Perimeter Intrusion Detection System Deployment Methods H 21 Nxtar Fiber Optics Home Intrusion Detection System can be deployed on 3 different materials, making it one of the most versatile systems.

  22. Perimeter Intrusion Detection System Typical P.I.D.S Deployment This airport application is an example of typical P.I.D.S deployment on fence with multiple detection zones. Possible deployment types are Fence, Wall, and Underground. H 22

  23. Perimeter Intrusion Detection System 1 1 1 1 3 3 2 2 2 2 Fence Deployment #1 H 23 Standard 100m Maximum 500m ◢DetailA: Tight Fixer Detail B Detail A Sensing Fiber – 6mm Rubber Tubing – 10mm S/S HOSE CLIP – 25mm ◢ DetailB: Cable Ties Sensing Fiber Sensing Fiber – 6mm Sensing Junction Box Terminal Junction Box Leading Fiber P.E. RESISTANCE Cable Ties – 15cm(6”)

  24. Perimeter Intrusion Detection System 1 1 1 1 3 3 2 2 2 2 Fence Deployment #2 H 24 Standard 100m Maximum 500m ◢DetailA: Tight Fixer Detail B Detail A Sensing Fiber – 6mm Rubber Tubing – 10mm S/S HOSE CLIP – 25mm ◢ DetailB: Cable Ties Sensing Fiber Sensing Fiber – 6mm Sensing Junction Box Terminal Junction Box Leading Fiber P.E. RESISTANCE Cable Ties – 15cm(6”)

  25. Perimeter Intrusion Detection System 1 1 1 1 3 3 2 2 2 2 Fence (Barbed-Wire) Deployment #3 ◢ DetailB: Cable Ties ◢DetailA: Tight Fixer Sensing Fiber H 25 Leading Fiber Sensing Fiber – 6mm Sensing Fiber – 6mm Rubber Tubing – 10mm P.E. RESISTANCE Cable Ties – 15cm(6”) S/S HOSE CLIP – 25mm Standard 100m Maximum 500m Detail A Detail B Terminal Junction Box Sensing Junction Box

  26. Perimeter Intrusion Detection System Fence Deployment H 26 Barbed-wire fence deployment on wall Steel bar fence deployment Wire mesh fence deployment

  27. Perimeter Intrusion Detection System Wall Deployment Wall installation is possible either on the wall top as shown or on walls using fixer brackets. H 27 Leading Fiber Sensing Junction Box Smooth Gravels Sensing Fiber Terminal Junction Box PE Construction Mesh Smooth Gravels L-Bracket for wall top mounting L-shaped steel bracket (Height 7-9cm) 7~9 cm ◢ Cable Clips can be used to fix Leading Fiber alone the wall.

  28. Perimeter Intrusion Detection System Wall Deployment H 28 Stone wall with wire cage Wall-top deployment Wall-top deployment with L-Bracket

  29. Perimeter Intrusion Detection System Wall Deployment Three main ways for Sensing Junction Box Deployment H 29 On wall side Inside Junction Box On wall-top bed The way for Terminal Junction Box Deployment On wall-top bed

  30. Perimeter Intrusion Detection System Underground Deployment ◢ Many types of underground deployments are available depending on your current landscape. Top layers such as grass, rock, or soil can be used, allowing you to preserve your landscape. H 30 Lawn Field Structure Gravel Field Structure Smooth Gravels (Gravel size 2-3cm Layer thickness 5cm) Grass Turf Sensing Fiber Sensing Fiber PE Construction Mesh PE Construction Mesh Smooth Gravels (Gravel size 2-3cm) Soil Sensing Junction Box and Terminal Junction Boxes location Sensing Junction Box and Terminal Junction Boxes location

  31. Perimeter Intrusion Detection System Example of Underground Deployment (Japan) H 31

  32. Perimeter Intrusion Detection System Example of Underground Deployment Lawn field deployment Alone the wall H 32 50cm gap between wall and Sensing Fiber 30cm gap between each Sensing Fiber Landscape random deployment Gravel field deployment

  33. Perimeter Intrusion Detection System Example of Underground Deployment on Roof H 33 Roof Top Laying smooth gravels Fiber Cable is fixed onto PE mesh with cable ties. Sun Deck

  34. Perimeter Intrusion Detection System Remote Operation Remote Maintenance & Online Troubleshooting Data Analysis Software(DAS) and Nxtar Monitoring Software(NMS) allow the operator to remotely monitor and control the system through internet, and perform remote maintenance and online troubleshooting. These features can save money and time from transportation, and make things easy and convenient. H 34 Internet Remote Maintenance & Online Troubleshooting PIDS Site Remote Operator

  35. Perimeter Intrusion Detection System Remote Maintenance Environmental Study using Data Analysis Software First, run Data Analysis Software to record environmental status data of the sensing zone for a certain period of time. Later, study the result and use as a reference for the system parameters setting from Nxtar Monitoring Software. This procedure can be done remotely through internet by the system operator for observation and examination purpose. H 35 Data Analysis Software – Main Window Data Analysis Software – Analysis Chart

  36. Perimeter Intrusion Detection System Remote Control & Monitoring Remote Operation using Nxtar Monitoring Software The system has 3 main setting parameters, Level, Count and Period. Set them to the right value will reduce the nuisance alarm rate to minimum. The operator can remotely perform the setting using Nxtar Monitoring Software through internet. This software also supports advanced setting. H 36 Level Count Period Nxtar Monitoring Software – Monitoring Window Nxtar Monitoring Software – Event Log

  37. Thank you very much! H 34 Nxtar Technologies Incorporated ◢ http://www.nxtar.com Perimeter Security Solution - The End -

More Related