View
346
Download
36
Category
Preview:
DESCRIPTION
Perimeter Intrusion Detection System. Perimeter Intrusion Detection System. Features & Advantages. H 2. 1. Hardware Zone - PowerPoint PPT Presentation
Citation preview
Perimeter Intrusion Detection System
Features & AdvantagesH 2
Perimeter Intrusion Detection System
1. Hardware ZoneIn hardware zone application, a perimeter is segregated into different detection zones deployed with several sets of sensing fibers. On the other hand, software zone-based systems have basically single sensing line that run the entire perimeter.
2. Plug & Play InstallationThe plug and play design with SC connectors facilitates swifter installation by using only simple hand tools. There is no need for expensive and fragile splicer to connect the fiber cables to their respective junctions/terminal boxes.
3. Full PassiveFull passive components are the design that requires no outdoor processors and electrical power to the outdoor components. In this case, the system is immune to electromagnetic interference (EMI), radio frequency interference (RFI), and lightning.
4. Easy to RepairAt Nxtar, each detection zone comes with two arms of sensing fiber. When one arm of fiber is cut, it is easy and efficient to repair by replacing the damaged part with one new arm. The restoration can be completed in two hours without use of expensive splicer. After the system installation, less or no maintenance is required to remain optimal performance.
Features & AdvantagesH 3
Perimeter Intrusion Detection System
5. InvisibilityWhen buried underground or installed on wall-top with gravels covering on it, the sensing fiber is completely invisible, thus leaving landscapes unchanged. This prevents tampering and intruder by-pass of the detection area.
6. Intelligent Identification AlgorithmThe system with built-in Intelligent Identification Algorithm can reduce the false/nuisance alarm to the lowest level by differentiating actual intrusions from global noises (rain, snow, wind, hail storms and small animals).
7. Integrate with CCTV Surveillance Inspectors can remotely monitor their premise and double confirm if it is a
genuine intrusion prior to alerting guards. Nxtar has its own Fiber Optic Converter for signal transmission . By integrating with our PIDS, their signals can share the same cable, thus reduce material and deployment laboring cost.
8. Application Scale Classification
The solution is designed to fulfil different scale of users. it has been categorized into 3 different scales: Large Scale, Medium Scale, and Small Scale. The large scale solution is customized to accommodate an individual customer’s requirements and special needs on the most cost effective manner; the small scale solution is designed to achieve DIY installation for the consumer market.
1. Hardware Zone
H 4
Each Nxtar controller comes with 1, 2, 4 or 6 zone(s) of detection and multiple systems can be linked for virtually unlimited distances. All our zones are hardware based and are advantageous against software zone in numerous ways. Detection zones that are hardware-based enable each zone to function independently, and therefore can be individually calibrated in accordance with various environments in the same perimeter. It is almost impossible to demand that a perimeter, especially a large one, is of the same landscapes. Consequently, our systems can accept individual zone settings for finer monitoring solutions.
Perimeter Intrusion Detection System
2. Plug & Play Installation
H 5
The connection between Sensing Junction Box (SJB), Terminal Junction Box (TJB) and Controller are designed to use Plug & Play installation. SC connector plugs directly into the port, making installation straightforward by using only a screwdriver. The installation can be completed in an easy and swift way.
Perimeter Intrusion Detection System
SJB TJB
Controller
3. Full Passive
H 6
At Nxtar, our system is one of the few who is able to achieve a 100% passive components outfield. Our system does not require any electrical powering once installed outfield. This is a very strong feat as it requires no deployment of electrical cables for powering and signal amplification for long distance transmission. Equipped with full passive components, our system is immune to electronic-magnetic interference (EMI), radio frequency interference (RFI), and lightening.
Perimeter Intrusion Detection System
ImmuneNo need
Replace
4. Easy to Repair
H 7
Hardware zoning enables each zone functions independently, preserving the operation of the rest of the system when one zone is damaged. By simply replacing that piece of damaged fiber cable, the reparation doesn’t need to shut down the whole system , and can be rapidly done within two hours. In other words, the remaining zones still function to secure the perimeter during the repairing process. P.I.D.S is virtually maintenance-free after installation, thus lowering the maintenance cost.
Perimeter Intrusion Detection System
H 8
5. Invisibility
Perimeter Intrusion Detection System
The system can be used to secure Fence, Wall and Field. The system smoothly integrates with the perimeter environment without affecting its aesthetics. Covert deployment allows sensing devices to be hidden from damage and awareness by intruders. The system is invisible and undetectable to intruders, thus increasing the rate of detection.
H 9
6. Intelligent Identification Algorithm
True Intrusion Signal RecognitionInstead of just “On/Off” status report from indoor conventional devices, Nxtar Fiber Optics
P.I.D.S. uses intelligent signal identification to define an Human Intrusion signal from all other
environmental disturbance to give you the lowest level of false alarm in the industry. The use
of parameters setting from the software can customize the system’s detection ability within
that specific environment, thus reduce false alarm rate.
Perimeter Intrusion Detection System
!
H 10
7. Integrate with CCTV Surveillance
IP Camera DeploymentBy integrate P.I.D.S with CCTV Surveillance together, when intrusion occurs, PTZ cameras will be triggered to turn to the specific zone to observe. Inspectors can remotely monitor their premise and double confirm if it is a genuine intrusion prior to alerting guards.
Perimeter Intrusion Detection System
H 11
7. Integrate with CCTV Surveillance
IP Camera Deployment
Perimeter Intrusion Detection System
Powered Mast
Fiber Ethernet Converter
NC-300 (3 ports)Speed Dome
IP PTZ Camera
Camera Junction Box
UTP Ethernet Cable
100m 100m
Powered Mast Powered Mast
H 12
7. Integrate with CCTV Surveillance
Perimeter Intrusion Detection System
PIDS + CCTV Technical & Control Room System Structure
Control Room
Log*
RS
232
VGA
DVR / NVR*
Video Monitoring
VGAVideo
Player
Live Video*
Map*
PTZ Controller*
Camera controlling
Monitoring RoomVideo
Player
Monitor*
NSB-600R
PIDS Monitoring PC*
PIDS 6 Zones
NSB-600R
H 13
7. Integrate with CCTV Surveillance
Perimeter Intrusion Detection System
PIDS + CCTV Technical & Control Room
H 14
Small ScaleThe small scale solution is mainly designed to cover 1 to 2 detection zones in a perimeter within 1km. The installation only requires two workers to complete within one day, saving time and labour cost. Military/industrial performance security system is utilized for household use and any small unit applications.
2 Zones of Detection managed by one NSB-200M controller.
Perimeter Intrusion Detection System8. Application Scale Classification
H 15
8. Application Scale Classification
Medium ScaleThe medium scale application targets a wide variety of markets such as military base, prison, warehouse, factory, power plant, and logistic facility. The standard application for medium scale is suitable for both 4-12 zones of detection and a perimeter ranging from 1-3 km.
12 Zones of Detection managed by two NSB-600R controllers
Perimeter Intrusion Detection System
H 16
Large ScaleThe large scale solution is utilized to secure large areas: airports, national borders, oil refineries,military bases, pipe lines are only just few common examples. This application is suitable formore than 18 zones of detection and a perimeter beyond 9km in length. In fact, the large scalesolution can be applied to virtually unlimited distances through connecting multiple systems.
Perimeter Intrusion Detection System8. Application Scale Classification
18 Zones of Detection managed by three NSB-600R controllers.
H 17
System Structure
Perimeter Intrusion Detection System8. Application Scale Classification
Items of P.I.D.S Package
H 18
◢ Typical Items for P.I.D.S
Perimeter Intrusion Detection System
NSB-600R
NSB-400R
NSB-200R
Sensing Fiber
Leading Fiber
Sensing Junction Box
Terminal Junction Box
Leading Cable Cable Splitting Module
H 19
Specification of P.I.D.S. Controllers
Perimeter Intrusion Detection System
NSB-200R NSB-400R NSB-600R
Method of Detection Fiber optics sensor
Number of Detection Zones NSB 200R: 2 zonesNSB 400R: 4 zonesNSB 600R: 6 zones
Type of Sensing Fiber single mode fiber
Sensor Sensitivity uniform over entire fiber
Rated Voltage 100~260 V/AC; 12V/DC (optional)
Operating Temperature Range - 30°C ~ 70°C for the controller-30c~75c for fiber sensors
Output Alarm Sound/LED/LCD/Relay
Dimensions (W x H x L) 350mm x 100mm x 428mm
Fiber Connectors SC-APC Type
H 20
Specification-Host Module (Recommended)
Form Factor Nano-BTX Form Factor
Processor 1.8 GH3
Memory 512MB
Graphics SiS Mirage 1 Graphics
LAN Realtek 8201CL 10/100 LAN
Hard Disk 80GB SATA
Expansion Slots1 x 3.5" bay (Internal)1 x 3.5" bay 2 x 5.25" bay
Dimensions
310(L) x 188(W) x 310(H) mm
Power 250W PFC
Camera Input
BNC x 4 (2)
HIDS Port DB-9 (1) 12
Perimeter Intrusion Detection System
H 21
Deployment Methods
Nxtar Fiber Optics Home Intrusion Detection System
can be deployed on 3 different materials, making it one of the most versatile systems.
Perimeter Intrusion Detection System
H 22This airport application is an example of typical P.I.D.S deployment on fence with multiple detection zones. Possible deployment types are Fence, Wall, and Underground.
Typical P.I.D.S Deployment
Perimeter Intrusion Detection System
Sensing Fiber – 6mm
P.E. RESISTANCECable Ties – 15cm (6”)
◢ Detail B: Cable Ties
Fence Deployment #1
H 23
◢ Detail A: Tight Fixer
Sensing Fiber – 6mm
Rubber Tubing – 10mm
S/S HOSE CLIP – 25mm
3
Detail ADetail B
12
12
Sensing Fiber
Leading Fiber
1
2
3
1
2
Standard 100mMaximum 500m
Sensing Junction BoxTerminal Junction Box
Perimeter Intrusion Detection System
Sensing Fiber – 6mm
P.E. RESISTANCECable Ties – 15cm (6”)
◢ Detail B: Cable Ties
Fence Deployment #2
H 24
◢ Detail A: Tight Fixer
Sensing Fiber – 6mm
Rubber Tubing – 10mm
S/S HOSE CLIP – 25mm
3
Detail ADetail B
12
12
Sensing Fiber
Leading Fiber
1
2
3
1
2
Standard 100mMaximum 500m
Sensing Junction BoxTerminal Junction Box
Perimeter Intrusion Detection System
Sensing Fiber – 6mm
P.E. RESISTANCECable Ties – 15cm (6”)
◢ Detail B: Cable Ties
Fence (Barbed-Wire) Deployment #3
H 25
◢ Detail A: Tight Fixer
Sensing Fiber – 6mm
Rubber Tubing – 10mm
S/S HOSE CLIP – 25mm
3
Detail A Detail B
12 12
1
2
3
1
2
Standard 100mMaximum 500m
Sensing Fiber
Leading Fiber
Terminal Junction Box Sensing Junction Box
Perimeter Intrusion Detection System
Steel bar fence deployment
Fence Deployment
Barbed-wire fence deployment on wall
H 26
Wire mesh fence deployment
Perimeter Intrusion Detection System
H 27
Wall Deployment
Wall installation is possible either on the wall top as shown or on walls using fixer brackets.
L-Bracket for wall top mounting
7~9 cm
Sensing Junction BoxLeading Fiber
Smooth Gravels
PE Construction Mesh
Sensing Fiber
Terminal Junction Box
Smooth Gravels
L-shaped steel bracket(Height 7-9cm)
◢ Cable Clips can be used to fix Leading Fiber alone the wall.
Perimeter Intrusion Detection System
Wall Deployment
Stone wall with wire cage
H 28
Wall-top deployment with L-BracketWall-top deployment
Perimeter Intrusion Detection System
Wall Deployment
H 29
Three main ways for Sensing Junction Box Deployment
Inside Junction BoxOn wall side
On wall-top bed
On wall-top bed
The way for Terminal Junction Box Deployment
Perimeter Intrusion Detection System
◢ Many types of underground deployments are available depending on your current landscape. Top layers such as grass, rock, or soil can be used, allowing you to preserve your landscape.
Underground Deployment
H 30
Gravel Field StructureLawn Field Structure
Sensing Junction Box and Terminal Junction Boxes location
Sensing Junction Box and Terminal Junction Boxes location
Sensing Fiber
PE Construction Mesh
Smooth Gravels(Gravel size 2-3cmLayer thickness 5cm)
Smooth Gravels (Gravel size 2-3cm)
Soil
Grass Turf
Sensing Fiber
PE Construction Mesh
Perimeter Intrusion Detection System
31
Example of Underground Deployment (Japan)
H 31
Perimeter Intrusion Detection System
32
Example of Underground Deployment
H 32Lawn field deployment Alone the wall
Gravel field deployment
50cm gap between wall and Sensing Fiber
30cm gap between each Sensing Fiber
Landscape random deployment
Perimeter Intrusion Detection System
Example of Underground Deployment on Roof
Roof Top
Sun Deck
H 33
Fiber Cable is fixed onto PE mesh with cable ties.
Laying smooth gravels
Perimeter Intrusion Detection System
Remote Operation
H 34
Remote Maintenance & Online Troubleshooting
Data Analysis Software(DAS) and Nxtar Monitoring Software(NMS) allow the operator to remotely monitor and control the system through internet, and perform remote maintenance and online troubleshooting. These features can save money and time from transportation, and make things easy and convenient.
Internet
Remote Maintenance &
Online Troubleshooting
Remote Operator
PIDS Site
Perimeter Intrusion Detection System
Remote Maintenance
H 35
Environmental Study using Data Analysis Software
First, run Data Analysis Software to record environmental status data of the sensing zone for a certain period of time. Later, study the result and use as a reference for the system parameters setting from Nxtar Monitoring Software. This procedure can be done remotely through internet by the system operator for observation and examination purpose.
Data Analysis Software – Main Window Data Analysis Software – Analysis Chart
Perimeter Intrusion Detection System
Remote Control & Monitoring
H 36
Remote Operation using Nxtar Monitoring Software
The system has 3 main setting parameters, Level, Count and Period. Set them to the right value will reduce the nuisance alarm rate to minimum. The operator can remotely perform the setting using Nxtar Monitoring Software through internet. This software also supports advanced setting.
Period
Count
Level
Nxtar Monitoring Software – Monitoring Window Nxtar Monitoring Software – Event Log
Perimeter Intrusion Detection System
Thank you very much!
H 34Nxtar Technologies Incorporated
◢ http://www.nxtar.com
Perimeter Security Solution
- The End -
Recommended