1. Trang chủ
  2. » Kỹ Thuật - Công Nghệ

integrated security systems design concepts specifications and implementation jan 2007 ebook ling

471 317 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Integrated Security Systems Design Concepts, Specifications, and Implementation
Tác giả Thomas Norman
Trường học Unknown
Chuyên ngành Security Systems Design
Thể loại Book
Năm xuất bản 2007
Thành phố Amsterdam
Định dạng
Số trang 471
Dung lượng 9,14 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

compo-• Convergence-based integrated security systems are grated security systems that utilize TCP/IP Ethernet infras-tructure as the basic communications media.. This is theresult of a

Trang 2

SYSTEMS DESIGN

Trang 5

Project Manager: Melinda Ritchie

Cover Designer: Eric DeCicco

Butterworth-Heinemann is an imprint of Elsevier

30 Corporate Drive, Suite 400, Burlington, MA 01803, USA

Linacre House, Jordan Hill, Oxford OX2 8DP, UK

Copyright © 2007, Elsevier Inc All rights reserved.

No part of this publication may be reproduced, stored in a retrieval system,

or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher Permissions may be sought directly from Elsevier’s Science & Technology Rights Department in Oxford, UK: phone: (+44) 1865 843830, fax: (+44) 1865 853333,

E-mail: permissions@elsevier.com You may also complete your request on-line via the Elsevier homepage (http://elsevier.com), by selecting “Support & Contact” then “Copyright and Permission” and then “Obtaining Permissions.”

Recognizing the importance of preserving what has been written, Elsevier prints its books on acid-free paper whenever possible.

Library of Congress Cataloging-in-Publication Data

ISBN-13: 978-0-7506-7909-1 (alk paper)

ISBN-10: 0-7506-7909-3 (alk paper)

1 Computer networks-Security measures 2 Information storage and retrieval systems-Security measures 3 Computers-Access control 1 Title.

TK5105.59 N45 2005

005.8–dc22

2006038020

British Library Cataloguing-in-Publication Data

A catalogue record for this book is available from the British Library.

ISBN 13: 978-0-7506-7909-1

ISBN 10: 0-7506-7909-3

For information on all Butterworth-Heinemann publications

visit our Web site at www.books.elsevier.com

Printed in the United States of America

07 08 09 10 11 10 9 8 7 6 5 4 3 2 1

Trang 6

This book is dedicated to the memory of Former Lebanese PrimeMinister Rafik al-Hariri Mr Hariri was tragically assassinated

by the enemies of freedom on February 14, 2005 in Beirut,Lebanon Rafik Hariri was a visionary leader with a program

to unite Lebanese of all religions together under a commonLebanese flag, independent of outside influences

Rafik al-Hariri was a hero to all who knew and loved him

He saw the future, and the future was peace and prosperity,not conflict and failure He was a champion of democracy anddid much to further the cause of the Lebanese people whom heloved so much

We miss him every day

Trang 8

SECTION ONE INTRODUCTION TO INTEGRATED

SECURITY SYSTEMS 1

2 Integrated Security System Design Benefits and

SECTION TWO SECURITY SYSTEM DESIGN 35

SECTION THREE SPECIAL DESIGN SECTIONS 251

13 Interfacing to Legacy Systems and Emerging Technologies 329

Trang 9

15 Delaying Technologies and Response Technologies 357

16 Alarm Detection and Emerging Video Technologies 379

Trang 10

The leap from traditional proprietary alarm/access control tem infrastructures and analog intercom and video infrastruc-tures to newer Ethernet based system infrastructures is a difficultone for many security practitioners Clients, consultants, integra-tors, technicians and even those in security sales have found thechange to be mysterious, daunting and intimidating.

sys-I was an early advocate of sys-Information Technology (sys-IT)based infrastructure because it offered something that oldersecurity system infrastructures could not: true enterprise capa-bility Ethernet infrastructures permit the distribution of a secu-rity system across the organization’s facilities all over the world.That just isn’t possible with older infrastructures

While I was delighted to see the security manufacturingindustry adopt Ethernet infrastructures, I was distressed to seethat the industry was not seriously addressing the need to pro-vide for the security of the security system itself on the newEthernet infrastructure When I asked manufacturers why theywere not addressing network security, I received answers like:

“Oh, that is the IT Department’s responsibility,” or “Securityintegrators have their hands full just learning how to deal withEthernet based systems; we’ll get to network security later.”

So here now was an industry that was responsible for ing the entire organization’s assets, and the security system itself

Trang 11

secur-was often not secure The idea that such a startling bility should itself be so vulnerable was unacceptable to me.

vulnera-So it was clear that it was important for security professionals

to understand IT theory in order to efficiently design networksand practical network security

Soon the security industry will move to systems in whichthere are no analog or proprietary wired devices at all; whereall devices connect directly to the Ethernet infrastructure Theknowledge of how to design efficient network systems andhow to secure those systems is paramount to successful securitysystems This is the future of security technology

In this book, I also bring the reader insight into some ofthe most sophisticated design concepts anywhere in the securityindustry We’ll be discussing design concepts that are able tomake ordinary systems perform extraordinary functions This

is the one and only book you will need for all security designconcepts

Trang 12

a Most of all, I thank my longsuffering and pure-heartedwife, Cynthia Kamalo-Norman, who has traveled aroundthe world to be my partner I can never enough repay herkindness, her support, her warmth and affection.

b I am thankful for the help and support of my confidant andbusiness associate, Michael Crocker, CPP, CSC, President ofMichael Crocker, CPP & Associates, Inc and Vice-President

of ASIS International Region 6, as he patiently encouraged

me in the writing of this book, and whose comments andsuggestions have been invaluable

c I am grateful for the diligent review of the manuscript by:

• John R Dew, CPP, Northeast Regional Director of tion Partners International (PPI)

Protec-• Harvey M Stevens, PhD, CPP, President of StevensAssociates, Inc

• Mr John Brady, ConocoPhillips

• Mr Kevin Henson, Asier Technology

• Mr Paul Williams, Gray Hat Research

• Mr Nabil el Khazen, Engineered Systems International,Beirut, Lebanon

• and my protégés Mr David Skusek and Mr AdelMardelli

Trang 13

d I am lucky to have had the help of two of the top minds

in Information Technology today to assist in Chapters 10and 11

• Paul Williams is one of the leading minds in tion Technology Security today Paul is President of GrayHat Research, which is a member of Protection PartnersInternational

Informa-• Dr Jack Nisson holds some remarkable patents in WiFiAntenna Applications Dr Nisson has designed anten-nas that are significantly more immune to out-of-phasesignals, resulting in far better performance Dr Nissoncontributed to the section on Wireless Data Dr Nisson isPresident and Founder of WiFi-Plus, Inc

e I am enormously grateful to my publisher and friends, Ms.Jennifer Soucy, Ms Pamela Chester, Ms Kelly Weaver, and

Ms Melinda Ritchie, for their encouragement and uous support, and to Butterworth-Heinemann/Elsevier fortheir continued support of the Security Community

contin-f I am also especially grateful to ASIS International for theirimportant and foundational support of the Security Industryand of this small book

g And I am also thankful for the support of all of the readers

of my articles and previous book, who constantly encourage

me to keep writing, despite having actually read what I havewritten

h For each above, I am humbled by their knowledge andkindness Their contributions have been invaluable

Trang 14

Introduction to

Integrated

Security Systems

Trang 16

We can change that.

This book is about designing convergence-based integratedsecurity systems and enterprise integrated security systems(which are also convergence based) These are security systemsthat have three major defining attributes:

• Integrated security systems comprise numerous tems together into one complete, highly coordinated, high-functioning system Typical subsystems include alarm, access

Trang 17

subsys-control, closed-circuit video, two-way voice communication,parking control, and other related systems System integra-tion is the basic concept for all that follows.

• System integration involves both the integration of nents and the integration of functions High-level functionscan be obtained by integrating components into a compre-hensive working system, instead of individual disconnectedsubsystems

compo-• Convergence-based integrated security systems are grated security systems that utilize TCP/IP Ethernet infras-tructure as the basic communications media This is theresult of a convergence of industries (the security tech-nology industry and the information technology industry).Most new integrated security systems are convergence-basedsystems

inte-• We will also discuss enterprise integrated security systemsconcepts in depth Enterprise integrated security systemsare those security systems that have been integrated withother systems, including elevators, private automatic branchexchanges, human relations programs, and security videoand intercommunications systems, at the corporatewide (theenterprise) level to perform a wide variety of automatedsecurity-related tasks in a manner consistent with corporate

or agency policies and procedures and that do so uniformlyacross the entire enterprise For example, when an employee

is terminated, the act of pressing OK on the human resourcessoftware screen can cause the employee to also be terminatedfrom the access control system and information technologysystem and even shut down access to his or her telephoneand voice mail Such integration can prevent a hostile termi-nated employee from gaining outside access to valuable data

or leaving a forwarding or even antagonistic message on his

or her voice mail Virtually all but the very earliest prise integrated security systems are convergence based, andalmost all of the earliest systems utilize some convergenceconcepts

enter-Although you may not need to design enterprise-class grated security systems, understanding their design concepts

Trang 18

inte-will make you a better designer of any convergence-basedintegrated security system, so it is worthwhile to be atten-tive to the enterprise-class concepts when they are discussedherein.

WHO SHOULD READ THIS BOOK

This book is designed for new and experienced system designconsultants, designers, and project managers who build thesecomplex systems and for the building owners, security direc-tors, and facilities directors who operate them Each will benefitfrom the expansive array of issues covered Many of these sub-jects have only rarely or perhaps have never been discussedbefore in any book to my knowledge These include such aspects

as how to make your security system virtually disappear onthe information technology system infrastructure, as though itwere not there at all to anyone but the system administrator(Chapter 17); a complete discussion on how to use security tech-nology to delay, confound, and take down aggressors in veryhigh security environments (Chapter 4); and secrets on systemimplementation that help ensure a stable, reliable, and high-functioning system (Chapters 9 and 18) There is some discussionabout pitfalls out of which the potential for lawsuits have arisenfor well-meaning but unsuspecting project participants My goal

is to help you gain command of every aspect of the process essary to ensure your success, the success of the project team,and especially the success of your client

nec-Designing enterprise integrated security systems seemsdaunting to most who have only designed systems for singlebuildings or for small campus environments The challengehas become ever more important with the advent of terror-ism and the move toward using electronic security systems toaugment homeland security The challenge of helping to pro-tect our nation’s transportation, economic, and cultural infras-tructure raises the importance of designing what used to beesoteric systems Today, these systems are becoming more com-monplace However, many of them are being designed usingold skill sets and outdated techniques, resulting in outmodedand therefore unsuitable products

Trang 19

A BRIEF BACKGROUND

In 2003, the security technology industry crested a hill Behind

us, in the rearview mirror, is yesterday’s technology Ahead

of us toward the horizon is the technology of tomorrow It isdifferent from the past It is information technology (IT) based.Many in the security industry are afraid of it They will resistthe change They will lose

In the 1990s, large corporate and government clientsbegan to understand that they are better served by enterprise-class security systems Enterprise systems differ from olderapproaches in that they permit the uniform application of secu-rity policies and procedures across the entire organization Theypermit centralized monitoring of security, business processes,and adherence to policy They reduce liability and operatingcosts They permit a user from one facility to freely access anyother if his or her access level permits

Nearly every manufacturer has embraced the enterprisesecurity concept, but they are still trying to make it work in thecontext of older system architectures These will all be replaced

by pure IT infrastructures in the near future By reading thisbook, you will be ahead of the game and be able to make designdecisions that will save you and your client tens of thousands

of dollars and many headaches

These large-scale enterprise-level integration projects raisethe bar, and we must all train well enough to jump over it.This book presents everything you will need to know to achievesuccess on these complex projects

A FRAMEWORK FOR UNDERSTANDING THE

DESIGN PROCESS

I frequently receive calls from designers who are challenged withprojects beyond their experience, asking how to approach thetask I tell them the first question is not how, but why? Now,

do not misunderstand me: I do not mean why should I bother?

I mean that the process should begin with a clear and completeunderstanding of the following:

• What assets are we trying to protect?

Trang 20

• From whom are we protecting them?

• And against what kinds of attack or misuse?

• How can I use integration to improve the operations of myclient and disrupt the operations of criminals and terrorists?Only after these questions are understood and answered can webegin to consider what to design and how to approach it Thisbook will help you learn how to design large integrated securitysystems, beginning with how to approach the project with thequestion, why?

GOALS OF THE BOOK

After finishing this book, you will have a new command of thefollowing:

• Strategic issues

The importance of integrating electronics and physical rity with a solid foundation of good security management.How to work with the client’s best interests in mind

secu-How to know when to integrate systems and when it doesnot benefit the client

The difference between strategic integration and haphazardintegration

The difference between component integration and tion of functions

integra-How to dramatically improve security at a facility using goodintegration strategies

How to lower system and staffing costs and improveemployee productivity using good system integrationpractices

How to create a solid basis for design, including

What is security and what is not

How to determine the appropriate level of security

We will examine why you need to know more about ITsystems and cover issues most designers did not knowwere important (to their ultimate peril and that of theirclients)

Trang 21

We will discuss the esoteric side of integration, including how

to design deployable delaying barriers and when and how

to use reactive electronic automated protection systemsthat can actively intervene in a security event, stopping itimmediately, from the security command center

• Technical issues

How to budget systems and plan phased implementation

We will fully explore the system design elements, includingdrawings of each type, and how to write quality specifi-cations that stand up to challenges and clearly state theclient’s needs We will examine what can be achieved byintegrating with other building systems and explore themany ways to interface with them

We will also examine the foundation of how to design,including

Drawing hierarchies

Specification hierarchies

How to completely integrate drawings and fication into a single, thorough, and perfectlyunderstandable set of construction documents

speci-We will explore in great detail how to design each type ofdrawing required, including

Single line diagrams

System interface diagrams

System schedules

We will cover every typical aspect of security systemspecifications, including how to make them actuallycommunicate the client’s best interests in a way that the

Trang 22

contractor understands what to do, how to do it, and how

to know he or she has succeeded

We will explore how to select the best technologies to use foreach project with considerations to the client’s best long-term interests, short-term budget concerns, installationcost factors, visual aesthetics, long-term maintenance andreliability considerations, the ability to expand the systemflexibility, and the ability to scale the system size

We will discuss how to secure the security system fromvarious kinds of attacks, including insider attacks

• Tactical issues

We will discuss how to manage client relations so that ourdesign work is always in his or her best interest and he orshe understands that and has constant confidence in us

We will examine the differences between what needs to be

in bid documents, construction documents, and as-builtdocuments

We will examine each type of technology and explore its efits and limitations, including alarm and access controlsystems, analog and digital security video elements andsystems, security communications systems, system infras-tructure options, system integration options, and securitycommand center options

ben-We will also discuss how to provide bidding support toclients that gives them a truly empirical standard ofevaluation for which bidder to select

We will explore the important and delicate matter of how toreview system installation to help ensure the success ofthe consultant, the contractor, and the client

We will also examine legal considerations and how goodsystem design coupled with quality construction man-agement and good relationship management can worktogether to the success of all project participants, avoidingproblems, confrontations, and lawsuits

Designing enterprise integrated security systems is exciting,challenging, and highly rewarding A well-designed system can

Trang 23

save a client millions of dollars over its life in improved tions efficiency, improved safety, and avoided security losses.The best enterprise integrated security system designers arehighly prized for this reason.

opera-ARRANGEMENT OF THE BOOK

This book is arranged to go from the strategic to the nical to the tactical Strategic subjects are covered primarily

tech-in Chapters 1–3, technical subjects are covered primarily tech-inChapters 4–10, and tactical subjects are covered primarily inChapters 11–19 The strategic section covers the “why” of design,including some important history that provides insight into how

to stay in the path of industry development and not be tracked as it goes by, the technical section explains how it isdone, and the tactical section provides the cultural knowledgethat leads to project success If at any time (especially in thetechnical section) it gets to be a little too much at once, it is ok

side-to jump around a bit If you are not interested in the hisside-tory ofelectronic systems, or any other specific section, feel free to skipthat section; however, each section provides important insight

to the total process For example, the section on history vides important insight into how to spot industry trends beforethey occur I have provided advice and consulted with manufac-turers on important industry developments many years beforethey were thought to be important by the manufacturers Thosewho listened and modified their designs accordingly moved out

pro-in front of the pro-industry Those who did not were left behpro-ind.How did I know where the industry was going? The seeds ofthe future are in the past Understanding how the founders ofthe industry dealt with the technical problems they faced pro-vides us with insight into why things work the way they dotoday Understanding what we want to achieve and how otherindustries have dealt with similar problems provides us withinsight into how to manipulate technology to achieve it Thegreat body of knowledge is always out there We only have tosee and not just look Understanding the industry from strate-gic, technical, and tactical viewpoints gives us the ability to solveproblems in a way that endures as technology develops and as

Trang 24

the organization grows It is helpful to understand strategic andtactical aspects first to help understand why the technical detailsare so important Although the challenge is considerable, theinformation is easily digestible if you take it in small bites.The book is also arranged in a way that is useful as a learn-ing tool and then can be used for years as a reference guide Youwill find that some information is repeated That is intentional.All the information herein is organized in a way that guides theuser from the simple to the complex So you will find a con-cept presented first, then a discussion of its strategic value, thentactical applications, and, finally, a discussion on the technicalimplementations of the technology.

Welcome to convergence-based integrated security systemsdesign and thank you for reading

Trang 26

Integrated Security

System Design Benefits and Philosophy

WHY INTEGRATE SYSTEMS?

Why a Strategic Approach to Security

Design Is Necessary

Everything operates within a hierarchy, and security is noexception When an organization is founded, it establishes amission For Detroit automakers, that mission is to make money

by building cars; for a chain of home hardware centers, it is toearn profits by selling hardware; for a hospital, it is to providehealth care; for some nonprofit organizations, it is to assist devel-oping countries; and for the United Nations, it is the pursuit ofworld peace Each of these missions requires the establishment

Trang 27

of business programs and organizational structures to supportthe mission For a corporation, those programs could includemanufacturing, distribution, and sales; for a health care organi-zation, programs could include hospitals, clinics, and outreachprograms; and for a nonprofit organization, the programs couldinclude fund-raising and assistance programs Almost all orga-nizations also have accounting, information technology, filing,and administrative support programs Once the programs areestablished, the organization must acquire assets to support theprograms Assets could include factories, warehouses, depots,shelved products, networks, furniture, and office buildings.

In fact, each business program has a mission, subprograms,and assets All assets need protection from misuse and harm.Enter the security program The security program also has a mis-sion, subprograms, and assets, like any other business program.One of those programs is the electronic component (high-techsystems, of which there may be several, including electronicsecurity systems and information technology security systems)

Uniform Application of Security Policies

In order to get consistent results, it is imperative to use tent processes and procedures Imagine how chaotic it would

consis-be for a multinational corporation to allow every department ateach site in each business unit to perform their accounting usingtheir own choice of different software programs and differentaccounting techniques It would be very difficult for the orga-nization’s management to consolidate all these different reportsinto a single cohesive picture of the organization’s finances, andthat could easily result in corporate losses and intense scrutiny

by regulatory bodies and shareholders It is also unwise forany organization to allow its business units and individual sites

to establish their own individual security policies and dures, guard-force standards, etc., which results in the potentialfor legal liability where different standards are applied at dif-ferent business units Enterprise-class security systems providethe platform for the uniform application of enterprise securitypolicies across the entire organization Enterprise-class secu-rity systems can also provide visibility regarding how other

Trang 28

proce-company policies are being applied and followed What follows,then, can be better management when that information is madeavailable to management in a cohesive way.

Force Multipliers

Integrated security systems are force multipliers That is, theycan expand the reach of a security staff by extending the eyes,ears, and voice of the console officer into the depths of the facil-ity where he could not otherwise reach The use of video guardtours enhances the role of patrol officers because many moreguard tours can be made with video than with patrol staff alone.Detection and surveillance systems alert security staff of inap-propriate or suspicious behaviors, and voice communicationssystems allow console officers to talk with subjects at a build-ing in another state or nation while their behavior is observedon-screen

Multiple Systems

The integration of alarm, access control, security video, andsecurity voice communications into a single hardware/softwareplatform permits much more efficient use of security manpower.Enterprise-class security systems are force multipliers The betterthe system integration, the better the organization will be able

to use its security force

Multiple Buildings

When security systems span multiple buildings across a campus,the use of a single security system to monitor multiple buildingsfurther expands the force multiplication factor of the system Themore buildings monitored, the higher is the value of the system

Trang 29

required because monitoring multiple sites requires the use ofnetwork or Internet resources Monitoring multiple sites can betricky due to network bandwidth We discuss how to get themost out of network bandwidth later in the book.

Multiple Business Units

Some large organizations also have multiple business units Forexample, a petrochemical company may have drilling, trans-portation, refining, terminaling, and retailing units Each ofthese can benefit by inclusion in an enterprise-wide securityprogram

Improved System Performance

Enterprise-class systems also provide significantly improvedsystem performance The integration of multiple systems

at multiple sites into a cohesive user interface allows forsimple, straightforward command and control Gigantic systemsbecome manageable

Improved Monitoring

System monitoring is usually dramatically improved overnonenterprise systems The integration of alarms, access control,video, and voice communications across the platform providesthe console officer with coherent and timely information aboutongoing events and trends This is especially true of systemsthat utilize situational awareness software that put the alarmsand alerts into a dynamically updating context of the site andfloor plans so that the console officer can clearly see evolvingsuspicious activity in relation not only to the surroundings, butalso to security response assets In elegantly designed systems,when a visitor at a remote site presses an intercom call buttonand identifies himself or herself as an authorized user who hasforgotten his or her access card, the console officer can pull upthe record for that user quickly and confirm both the identity

of the person at the intercom and that person’s validity for thatdoor In this design, the system knows the user, the door, andthe date and time As the console officer drops the person’s icon

Trang 30

onto the door icon, the system either grants or denies access tothe door based on the person’s authorization for that door forthat time (This application requires custom software.)

Reduced Training

Enterprise-class security systems also require less training Themost basic console operator functions for a truly well-designedenterprise-class system can be learned in just a few minutes(answering alarms, viewing associated video, and answering theintercom) Because the interface is standardized across the enter-prise, cross-training between buildings and facilities is practical.Also, operators from one site can provide support for a consoleofficer or guard at another

Better Communications

The system also provides for better communications Imagine

a single software platform that integrates security intercoms,telephone, cell phones with integral walkie-talkie functions,two-way radios, and paging into one easy-to-manage platform.Imagine a console officer who can wear a wireless headset, wear

a wired headset, or use the computer’s microphone and ers and trigger the push-to-talk button with a footswitch or amouse press Efficiency of the system is further improved whenthe system queues the appropriate intercom automatically eachtime a camera is selected The more the system presents the con-sole operator with the tools to act as though he or she werethere at the scene, the better the system serves the security pur-pose (This function is best performed by situational awarenesssoftware in addition to conventional integrated security systemsoftware.)

speak-COST BENEFITS

Improved Labor Efficiency

For many of the reasons stated previously, enterprise-class rity systems enhance labor efficiencies There are fewer consoles,fewer guards, no redundant monitoring, no nighttime live

Trang 31

secu-monitoring where it was not cost-effective before, and mutualaid between sites and buildings All these factors free up guards

to be on patrol and in live communication with the centralconsole

Reduced Maintenance Costs

Enterprise-class security systems are generally built on the use

of a common technology across the entire platform intuitively, they are also generally built on simpler technologythan less sophisticated systems The key to success is often theelegant combination of simple technologies into a highly refinedsystem This inherent architectural simplicity often also results

Counter-in lower maCounter-intenance costs Although the results are elegantand sophisticated, the underlying technology is actually sim-pler than in times past The key is to combine simple Booleanalgebra logical functions (and, or, not, counting, timing, etc.) inelegant ways

Improved System Longevity

Security systems are notoriously short lived Contemporarysecurity systems are composed of numerous delicate compo-nents that either fail mechanically or are unable to upgrade

as the system scales Thus, when upgrades are necessary,

it is often necessary to throw out components that are only

a few years old because they are not compatible with newertechnologies This inbuilt obsolescence has a long tradition insecurity systems, much to the consternation of building ownersand consultants Most building systems are expected to last

15 to 20 years Some building systems, including the basicelectrical infrastructure, are expected to last the life of thebuilding However, most electronic security systems made bymajor manufacturers and installed by major integrators lastless than 7 years A well-designed enterprise-class security sys-tem should last 10 to 15 years between major architecturalupgrades This is achievable using the principles taught in thisbook

Trang 32

HOW INTEGRATION IS ACHIEVED

System integration involves both the integration of nents and the integration of functions High-level functions can

compo-be obtained by integrating components into a comprehensiveworking system instead of individual disconnected subsystems.Systems integration is not a challenge of electronics; it is ofcourse a technical challenge, but more importantly, it is a chal-lenge of imagination Sometimes, investigation, exploration, andinvention are required Consider it a puzzle to be solved Look atthe pieces and the objective Do not accept at face value what youare told by the manufacturers about the capabilities and limita-tions of their systems As a systems designer, you should knowmore than the manufacturers about how to integrate systems.This book will help guide the designer along the path ofunderstanding the technology and perhaps how to stimulate theimagination toward the goal

SUMMARY

Each organization has a mission It develops programs in port of that mission and acquires assets to support the programs.Those assets need protection to avoid their misuse, theft, ordestruction

sup-Security system integration provides the following benefits:

• Uniform application of security policies

• Integrates multiple systems into one for operational plicity

sim-• Can integrate systems from multiple buildings and multiplesites for operational simplicity

• Can integrate the services for multiple business units forconsistency

System integration can also provide the following:

• Improved monitoring

• Reduced training

Trang 34

THE HISTORY OF INTEGRATED SECURITY SYSTEMS

Most industry folks believe that security systems are pretty wellevolved today Well, if that is true, many of them are deformedmutants Early in the evolution of the systems, a particularthing happened that has served well the manufacturing com-munity and not so well the integrators, designers, and clients.The good news is that the convergence of information tech-nology infrastructure with security systems is changing that

Trang 35

First, let’s discuss the five generations of the technology andhow it evolved.

THE FIRST GENERATION

As we travel through the history of electronic security systems,pay special attention to the evolution of alarm and access controlsystems, for in the failure of that industry to adapt to emergingtechnology were the seeds of today’s and tomorrow’s systems

In the beginning, there were alarm systems In 1851 inBoston, the first McCulloh loop telegraph-type alarm systemwas installed (Fig 3-1) These systems involved sending a

Los Angeles Police Department

Trang 36

20-milli-amp current down a loop of wire and monitoring thecurrent on the wire If there were any change in current, it wouldcause a relay to change state or move a pen on a paper tape,sending a coded message These were also heavily used in policeand fire pull stations Early intercom systems date back to the1940s The first magnetic stripe access control cards appeared inthe 1960s In 1961, the London police began using closed-circuittelevision (CCTV) to monitor activities in train stations All ofthese were discrete, individual systems For example, there were

no camera switchers, but each camera reported to an ual monitor Taping video was not done because it was tooexpensive Alarm recording was done by hand notes The ideawas to be alerted to crime problems, to deter criminals, and tohelp those in need These were the first generation of electronicsecurity systems By today’s standards, these were very basicsystems

individ-The first generation of access control systems is still in use

In the first generation of security technology, CCTV and com systems were a rarity CCTV systems were primarilylimited to one camera displayed on a single monitor For thosefew systems that had more than one camera, typically a monitorwas used for each camera Where intercoms were used at all,they were typically either custom installations or an extension

inter-of a business intercom

THE SECOND GENERATION

The second generation of access control systems networkedeight card readers together to a dedicated computer that wasapproximately the size of a huge early electronic desk calcula-

tube display, and a 3-in paper tape When a person presented

a card to the front door of a facility, one would hear the papertape chatter and the nixie tubes would display something like1CO3-AG One would then refer to a book that would indicatethat card CO3 was granted access to door 1

The second generation of alarm systems replaced the ficult to read meters and paper tapes with colored lamps and

Trang 37

Figure 3-2 First-generation card reader.

lamps—green for secure, red for alarm, and yellow whenbypassed There was a switch to bypass the alarms The secondgeneration began in approximately 1945 and continues today.CCTV systems were still little used, but intercom systems werebecoming slightly less than obscure

THE THIRD GENERATION

The third generation began in 1968 and continued until imately 1978 Third-generation systems combined alarm and

Trang 38

approx-Figure 3-3 Second-generation card access system.

permission of Flair Electronics, Inc

access control into one system Up to 64 card readers and up

to 256 alarm points were wired individually back to a PDP-8 or

termi-nal, and a line printer A basic 16 card reader system could costmore than $100,000 During this time, CCTV began to be used bycorporations and there were a few instances of intercom systems(Fig 3-5)

Trang 39

Figure 3-5 Third-generation alarm/access control system.Image courtesy of Computer History Museum.

THE FOURTH GENERATION

In 1971, Intel introduced the first 4-bit microprocessor, the 4044,designed by Intel designer Ted Hoff for a Japanese calculatorcompany The processor boasted more than 2300 transistors—more switches than ENIAC had, which filled an entire room andrequired a dedicated air-conditioning system just for the com-puter (Fig 3-6) The 6502 and 8088 8-bit microprocessors soonfollowed These became the basis for a new breed of alarm andaccess control system technology called distributed controllersystems

Until 1974, each alarm and access control field device waswired individually back to the minicomputer, where a jumble

of wires fed into custom-made circuit boards All that wirewas costly and often cost-prohibitive for most organizations

In 1974, one of the first distributed controller based alarm and access control systems was christened (by

alarms and card readers into controller panels and network els together into a distributed system This was a radical change

Trang 40

pan-Figure 3-6 ENIAC computer Image courtesy of the UnitedStates Army.

Finally, the cost of wiring, which was a major cost of early tems, was dramatically reduced The earliest fourth-generationsystems still terminated all these controllers into a central mini-computer, computer terminal, and line printer (early Cardkey

sys-2000 system) The computers often had what I like to call a

“user-surly” interface When a person presented a card at thefront door, the terminal still dutifully displayed something like

“1CO3-AG” as the line printer chattered the same message Theconsole officer then looked that code up in a book

Corporations began using intercoms and CCTV more sively, although prices were still prohibitive for most users, with

in CCTV occurred during this period as well For the first time,

it was possible to use just a couple of video monitors to viewmany cameras because the cameras were finally being termi-nated into sequential switchers that switched the monitor view

As the industry progressed, costs decreased ically and the systems became much more user-friendly

Ngày đăng: 04/06/2014, 13:16

TỪ KHÓA LIÊN QUAN

TÀI LIỆU CÙNG NGƯỜI DÙNG

TÀI LIỆU LIÊN QUAN