Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Perimeter Intrusion Detection System

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 37

Perimeter Intrusion Detection System

Perimeter Intrusion Detection System


Features & Advantages
H2
1. Hardware Zone
In hardware zone application, a perimeter is segregated into different detection
zones deployed with several sets of sensing fibers. On the other hand, software
zone-based systems have basically single sensing line that run the entire
perimeter.

2. Plug & Play Installation


The plug and play design with SC connectors facilitates swifter installation by
using only simple hand tools. There is no need for expensive and fragile splicer
to connect the fiber cables to their respective junctions/terminal boxes.

3. Full Passive
Full passive components are the design that requires no outdoor processors
and electrical power to the outdoor components. In this case, the system is
immune to electromagnetic interference (EMI), radio frequency interference
(RFI), and lightning.

4. Easy to Repair
At Nxtar, each detection zone comes with two arms of sensing fiber. When one
arm of fiber is cut, it is easy and efficient to repair by replacing the damaged
part with one new arm. The restoration can be completed in two hours without
use of expensive splicer. After the system installation, less or no maintenance
is required to remain optimal performance.
Perimeter Intrusion Detection System
Features & Advantages
H3
5. Invisibility
When buried underground or installed on wall-top with gravels covering on it,
the sensing fiber is completely invisible, thus leaving landscapes unchanged.
This prevents tampering and intruder by-pass of the detection area.

6. Intelligent Identification Algorithm


The system with built-in Intelligent Identification Algorithm can reduce the
false/nuisance alarm to the lowest level by differentiating actual intrusions from
global noises (rain, snow, wind, hail storms and small animals).

7. Integrate with CCTV Surveillance


Inspectors can remotely monitor their premise and double confirm if it is a
genuine intrusion prior to alerting guards. Nxtar has its own Fiber Optic
Converter for signal transmission . By integrating with our PIDS, their signals
can share the same cable, thus reduce material and deployment laboring
cost.

8. Application Scale Classification


The solution is designed to fulfil different scale of users. it has been
categorized into 3 different scales: Large Scale, Medium Scale, and Small
Scale. The large scale solution is customized to accommodate an individual
customer’s requirements and special needs on the most cost effective manner;
the small scale solution is designed to achieve DIY installation for the
consumer market.
Perimeter Intrusion Detection System
1. Hardware Zone

Each Nxtar controller comes with 1, 2, 4 or 6 zone(s) of detection and multiple systems can be linked for
virtually unlimited distances. All our zones are hardware based and are advantageous against software H4
zone in numerous ways. Detection zones that are hardware-based enable each zone to function
independently, and therefore can be individually calibrated in accordance with various environments in
the same perimeter. It is almost impossible to demand that a perimeter, especially a large one, is of the
same landscapes. Consequently, our systems can accept individual zone settings for finer monitoring
solutions.
Perimeter Intrusion Detection System
2. Plug & Play Installation

The connection between Sensing Junction Box (SJB), Terminal Junction Box (TJB) and Controller
are designed to use Plug & Play installation. SC connector plugs directly into the port, making H5
installation straightforward by using only a screwdriver. The installation can be completed in an
easy and swift way.

Controller

SJB TJB
Perimeter Intrusion Detection System
3. Full Passive

At Nxtar, our system is one of the few who is able to achieve a 100% passive components outfield.
Our system does not require any electrical powering once installed outfield. This is a very strong H6
feat as it requires no deployment of electrical cables for powering and signal amplification for long
distance transmission. Equipped with full passive components, our system is immune to electronic-
magnetic interference (EMI), radio frequency interference (RFI), and lightening.

No need Immune
Perimeter Intrusion Detection System
4. Easy to Repair

Hardware zoning enables each zone functions independently, preserving the operation of the rest
of the system when one zone is damaged. By simply replacing that piece of damaged fiber cable, H7
the reparation doesn’t need to shut down the whole system , and can be rapidly done within two
hours. In other words, the remaining zones still function to secure the perimeter during the
repairing process. P.I.D.S is virtually maintenance-free after installation, thus lowering the
maintenance cost.

Replace
Perimeter Intrusion Detection System
5. Invisibility

The system can be used to secure Fence, Wall and Field. The system smoothly integrates with
the perimeter environment without affecting its aesthetics. Covert deployment allows sensing H8
devices to be hidden from damage and awareness by intruders. The system is invisible and
undetectable to intruders, thus increasing the rate of detection.
Perimeter Intrusion Detection System
6. Intelligent Identification Algorithm
True Intrusion Signal Recognition
Instead of just “On/Off” status report from indoor conventional devices, Nxtar Fiber Optics
H9
P.I.D.S. uses intelligent signal identification to define an Human Intrusion signal from all other
environmental disturbance to give you the lowest level of false alarm in the industry. The use
of parameters setting from the software can customize the system’s detection ability within
that specific environment, thus reduce false alarm rate.

!
Perimeter Intrusion Detection System
7. Integrate with CCTV Surveillance
IP Camera Deployment
By integrate P.I.D.S with CCTV Surveillance together, when intrusion occurs, PTZ cameras will
be triggered to turn to the specific zone to observe. Inspectors can remotely monitor their H 10
premise and double confirm if it is a genuine intrusion prior to alerting guards.
Perimeter Intrusion Detection System
7. Integrate with CCTV Surveillance

IP Camera Deployment

H 11

Camera Junction Box


Fiber Ethernet Converter Speed Dome
NC-300 (3 ports) IP PTZ Camera

UTP Ethernet Cable

100m 100m

Powered Mast Powered Mast Powered Mast


Perimeter Intrusion Detection System
7. Integrate with CCTV Surveillance
PIDS + CCTV Technical & Control Room System Structure
H 12
Control Room
Video
Player Monitoring Room

Monitor*

VGA

Log* Map*
PIDS Monitoring PC*
PIDS 6 Zones
VGA
Video

DVR / NVR* Player

Video Monitoring
RS232

PTZ Controller* Live Video*


Camera controlling
NSB-600R

NSB-600R
Perimeter Intrusion Detection System
7. Integrate with CCTV Surveillance
PIDS + CCTV Technical & Control Room
H 13
Perimeter Intrusion Detection System
8. Application Scale Classification
Small Scale
The small scale solution is mainly designed to cover 1 to 2 detection zones in a perimeter within
1km. The installation only requires two workers to complete within one day, saving time and
H 14
labour cost. Military/industrial performance security system is utilized for household use and
any small unit applications.

2 Zones of Detection managed by one NSB-200M controller.


Perimeter Intrusion Detection System
8. Application Scale Classification
Medium Scale
The medium scale application targets a wide variety of markets such as military base, prison,
warehouse, factory, power plant, and logistic facility. The standard application for medium scale
H 15
is suitable for both 4-12 zones of detection and a perimeter ranging from 1-3 km.

12 Zones of Detection managed by two NSB-600R controllers


Perimeter Intrusion Detection System
8. Application Scale Classification
Large Scale
The large scale solution is utilized to secure large areas: airports, national borders, oil
refineries,
H 16
military bases, pipe lines are only just few common examples. This application is suitable for
more than 18 zones of detection and a perimeter beyond 9km in length. In fact, the large scale
solution can be applied to virtually unlimited distances through connecting multiple systems.

18 Zones of Detection managed by three NSB-600R controllers.


Perimeter Intrusion Detection System
8. Application Scale Classification
System Structure

H 17
Perimeter Intrusion Detection System
Items of P.I.D.S Package

◢ Typical Items for P.I.D.S


H 18

NSB-600R
Sensing Fiber Sensing Junction Box

Terminal Junction Box


NSB-400R Leading Fiber

NSB-200R
Leading Cable Cable Splitting Module
Perimeter Intrusion Detection System
Specification of P.I.D.S. Controllers

H 19

NSB-200R NSB-400R NSB-600R

Method of Detection Fiber optics sensor


Number of Detection Zones NSB 200R: 2 zones
NSB 400R: 4 zones
NSB 600R: 6 zones
Type of Sensing Fiber single mode fiber
Sensor Sensitivity uniform over entire fiber
Rated Voltage 100~260 V/AC; 12V/DC (optional)
Operating Temperature Range - 30°C ~ 70°C for the controller
-30c~75c for fiber sensors
Output Alarm Sound/LED/LCD/Relay
Dimensions (W x H x L) 350mm x 100mm x 428mm
Fiber Connectors SC-APC Type
Perimeter Intrusion Detection System
Specification-Host Module (Recommended)

H 20

Form Factor Nano-BTX Form Factor


Processor 1.8 GH3

Memory 512MB
Graphics SiS Mirage 1 Graphics
LAN Realtek 8201CL 10/100 LAN

Hard Disk 80GB SATA


1 x 3.5" bay (Internal)
Expansion Slots 1 x 3.5" bay
2 x 5.25" bay
Dimensions 310(L) x 188(W) x 310(H) mm
Power 250W PFC

HIDS Port DB-9 (1) 1


Camera 2
BNC x 4 (2)
Input
Perimeter Intrusion Detection System
Deployment Methods

H 21

Nxtar Fiber Optics Home Intrusion Detection System


can be deployed on 3 different materials, making it one of the most versatile systems.
Perimeter Intrusion Detection System
Typical P.I.D.S Deployment

This airport application is an example of typical P.I.D.S deployment on fence with multiple
detection zones. Possible deployment types are Fence, Wall, and Underground. H 22
Perimeter Intrusion Detection System
Fence Deployment #1

H 23
Standard 100m
Maximum 500m
◢ Detail A: Tight
Fixer
2 1
3
Detail B Detail A
1 Sensing Fiber – 6mm
2 Rubber Tubing – 10mm
3 S/S HOSE CLIP – 25mm

◢ Detail B: Cable Ties

1
2
Sensing Fiber
Terminal Junction Box Sensing Junction Box 1 Sensing Fiber – 6mm
Leading Fiber
2 P.E. RESISTANCE
Cable Ties – 15cm (6”)
Perimeter Intrusion Detection System
Fence Deployment #2

H 24

Standard 100m
Maximum 500m
◢ Detail A: Tight
Fixer
2 1
3

Detail B Detail A 1 Sensing Fiber – 6mm


2 Rubber Tubing – 10mm
3 S/S HOSE CLIP – 25mm

◢ Detail B: Cable Ties

1
2
Sensing Fiber
Terminal Junction Box Sensing Junction Box 1 Sensing Fiber – 6mm
Leading Fiber
2 P.E. RESISTANCE
Cable Ties – 15cm (6”)
Perimeter Intrusion Detection System
Fence (Barbed-Wire) Deployment #3
◢ Detail A: Tight ◢ Detail B: Cable Ties
Fixer
Sensing Fiber H 25
2 1 1
2 Leading Fiber
3

1 Sensing Fiber – 6mm 1 Sensing Fiber – 6mm


2 Rubber Tubing – 10mm 2 P.E. RESISTANCE
3 S/S HOSE CLIP – 25mm Cable Ties – 15cm (6”)

Standard 100m
Maximum 500m
Detail A Detail B

Terminal Junction Box Sensing Junction Box


Perimeter Intrusion Detection System
Fence Deployment

H 26

Barbed-wire fence deployment on wall

Steel bar fence deployment Wire mesh fence deployment


Perimeter Intrusion Detection System
Wall Deployment

Wall installation is possible either on the wall top as shown or on walls using fixer
brackets. H 27

Leading Fiber Sensing Junction Box

Smooth Gravels

Sensing Fiber

Terminal Junction Box

PE Construction Mesh

Smooth Gravels

L-Bracket for wall top mounting L-shaped steel bracket


(Height 7-9cm)
7~9 cm

◢ Cable Clips can be used to


fix Leading Fiber alone the wall.
Perimeter Intrusion Detection System
Wall Deployment

H 28

Stone wall with wire cage

Wall-top deployment Wall-top deployment with L-Bracket


Perimeter Intrusion Detection System
Wall Deployment
Three main ways for Sensing Junction Box Deployment

On wall side Inside Junction Box H 29

On wall-top bed

The way for Terminal Junction Box Deployment

On wall-top bed
Perimeter Intrusion Detection System
Underground Deployment
◢ Many types of underground deployments are available depending on your
current landscape. Top layers such as grass, rock, or soil can be used,
allowing you to preserve your landscape. H 30
Lawn Field Structure Gravel Field Structure

Smooth Gravels
Grass Turf (Gravel size 2-3cm
Layer thickness 5cm)

Sensing Fiber
Sensing Fiber
PE Construction Mesh

PE Construction Mesh
Smooth Gravels
(Gravel size 2-3cm)
Soil

Sensing Junction Box and Sensing Junction Box and


Terminal Junction Boxes location Terminal Junction Boxes location
Perimeter Intrusion Detection System
Example of Underground Deployment (Japan)

H 31

31
Perimeter Intrusion Detection System
Example of Underground Deployment

Lawn field deployment Alone the wall H 32

50cm gap
between wall
and Sensing
Fiber

30cm gap
between each
Sensing Fiber

Landscape random Gravel field deployment


deployment

32
Perimeter Intrusion Detection System
Example of Underground Deployment on Roof

H 33

Roof Top

Fiber Cable is fixed onto Laying smooth gravels


Sun Deck PE mesh with cable ties.
Perimeter Intrusion Detection System
Remote Operation

Remote Maintenance & Online Troubleshooting


Data Analysis Software(DAS) and Nxtar Monitoring Software(NMS) allow the operator to remotely H 34
monitor and control the system through internet, and perform remote maintenance and online
troubleshooting. These features can save money and time from transportation, and make things easy
and convenient.

Internet
Remote Maintenance &
Online Troubleshooting

PIDS Site
Remote Operator
Perimeter Intrusion Detection System
Remote Maintenance

Environmental Study using Data Analysis Software


First, run Data Analysis Software to record environmental status data of the sensing zone for H 35
a certain period of time. Later, study the result and use as a reference for the system
parameters setting from Nxtar Monitoring Software. This procedure can be done remotely
through internet by the system operator for observation and examination purpose.

Data Analysis Software – Main Window Data Analysis Software – Analysis


Chart
Perimeter Intrusion Detection System
Remote Control & Monitoring

Remote Operation using Nxtar Monitoring Software


The system has 3 main setting parameters, Level, Count and Period. Set them to the right value H 36
will reduce the nuisance alarm rate to minimum. The operator can remotely perform the setting
using Nxtar Monitoring Software through internet. This software also supports advanced setting.

Level

Count

Period

Nxtar Monitoring Software – Monitoring Window Nxtar Monitoring Software – Event Log
Thank you very much!

H 34
Nxtar Technologies Incorporated

◢ http://www.nxtar.com

Perimeter Security Solution

- The End -

You might also like