Networking and Integrating Legacy Perimeter Security
Transcription
Networking and Integrating Legacy Perimeter Security
VIEWPOINT Networking and Integrating Legacy Perimeter Security Systems Perimeter intrusion detection systems (PIDS) have come a long way since it was developed some 40 years ago, from the basic point-to-point wiring to the current trend of IP networking, PIDS have matured considerably. SUBMfITED BY SENSTAR(MAGAL SECURITY SYSTEMS) owadays, perimeter security and intrusion detection products have become more multifaceted and more powerful than ever. Along with the development of IP networking, it is now possible to cover vast areas, even air and water. These advancements allow perimeter security detection systems to shift from using individual products to deploying a combination of different types of detectors and sensors, which are then controlled through a networked central control system. In this way; the cost of expensive wiring and manpower is significantly reduced. Network integration appears to be a straight forward and effective complete solution for legacy perimeter security systems; however, oftentimes different products from different manufacturers are used, and consequently there are incompatibility issues. N borders -Routine physical access of each field processor is required for scheduled tasks such as calibration and fault monitoring This solution is still commonly used, especially for small sites right now. DRY CONTACTS: TRIED, TESTED, AND TRUE? The original and basic solution, dry contacts, employs a simple and elementary method that uses the electrical wires (dry contacts) from each processor (node); the paired wires from each node are woven into a braid that "travels" directly to a control room. In the control room, a panel with many pairs of green and red lamps displays the status of each segment (segments are usually 50 to 200 meters/ISO to 600 feet in length.). This solution is not practical for large sites, but works for small sites. However, it has the following disadvantages: - Excessive and costly communication wiring is required, especially for long perimeter applications such as ..t. Dry Contacts Wiring 82 IU,;iIiTERNATlOHAI. SEPT 2012 TRANSITION TO NETWORK In response to the aforementioned disadvantages of the dry contacts method, almost all PIDS manufacturers have developed dedicated networks that collect and multiplex information to and from the various sensors, and as a result networked PIDS are able to offer the following valuable features: -Two-way communication between processors and the control room - Remote technical monitoring -Remote set-up and remote calibration (e.g. threshold changes) transmitted to the control center. For this reason, serial protocols (like RS485) have been adopted by most of the market leaders. A. SMS/Alarm Panel PIDS NETWORK REQUIREMENTS PIDS generally require the deployment of a large amount of wiring, sometimes in the ballpark of tens of kilometers, and they are usually situated in unmanned areas, which are often difficult to access and are scarce in power and communication resources. In spite of this, the network must provide 100 percent reliability since response time is almost always critical. Fortunately, the bandwidth requirement is usually low because most of the filtering is done locally and only the final results are TCPIIP LIMITATIONS In recent years, the trend of TCP /lP plus PoE installations has forced PIDS applications to adopt the same standards, even when there is no actual benefit to the application. The major drawbacks of installing TCP /lP plus PoE: -TCP /lP caters to IT applications rather than real time applications -TCP /lP it is not energy efficient since it was designed for high data transfer rates. INTEGRATION CHALLENGE Customers want the freedom and flexibility of being able to purchase their command and control systems and PID sensors from different companies. To ensure continuous communication with in-house manufactured perimeter sensors, nearly all perimeter security www.asmag.comI 83 VIEWPOINT compan ies d evelop th e ir own proprietary display panels; it is a real challenge to integrate these p roprietary sen so r s' systems with the command and control systems of third party manufacturers. INTEGRATION METHODS CONVENTIONAL INTEGRATION METHODS There are two main approaches to integrating PID systems w ith head-end / control systems: The traditional method .&. FtJII SW Integration with 3rd Party Thi s "good old -fas hion ed" non-network method is based on dry contacts where the wires from the processors connect directly to the third, party's control system. Full integration method - In this method, integration software is u sed to tr an s late informat ion from th e ne tworked senso rs to the co ntro l di s play. Leading PID sen sor m anufacturers usually provide integration modules (SDK or API) that allow programmers to create tools to allow control systems to "understand" the data. This metho d offers an easy and complete integ ration whilst minimizing hardware requirements. COMBINED METHODS A mishmash of methods or partial implemen tations: Network and dry contacts hybrid - In this method, the ne t work coll ects all th e inform a ti on from the processo rs and th us all the benefits as men tioned in ... Stewart Dewar, Global Product Manager, Senstar 84 "In:!MBlWDW. SEPT2012 th e Trans itio n to Ne two rk section, s u ch as remote access, two-way communi cation, e tc. are reali zed. However, Signals from the networked sensors are not "translated" via SDK / API tools - w hi ch allo w for direct communication with control display co mputers - this is beca use many system integ rato rs wa nt to save th e time and hassle of wor king toge th er w ith programmers to create SDK / API tools. To circumvent the need for program w riting, the netw ork signals are converted into simple d ry contacts. This is ach ieved through a software controlled hardware panel, w hich effecti vely takes network Signals and converts them to dry con tacts "0" or "1" outputs. These output Signals are input in to the control syste m th e old fas hioned way, through paired w ires, via the dry contacts method . Eve n t h ough t hi s tec hniqu e see m s aw k ward and pe rh a p s o utdated, it is s till in demand today, particularly becau se no time or money is s pent on programming e fforts, an d impl e m e ntation can be done in a re lative ly short am ount of time. The mai n drawback to thi s m ethod is the need for additional dedicated hardware, w hich acts as a go-between for the sensors' network and control system. Partial integration using software - In this method, the command and con trol system performs some of the functionality, such as full interface to real-time alarms; howeve r, none of the tec hnical funct io na lities are "translated," these functio nalities have to be performed via an application from the PIDS manufacturer. 1l1l~