compo-• Convergence-based integrated security systems are grated security systems that utilize TCP/IP Ethernet infras-tructure as the basic communications media.. This is theresult of a
Trang 2SYSTEMS DESIGN
Trang 5Project Manager: Melinda Ritchie
Cover Designer: Eric DeCicco
Butterworth-Heinemann is an imprint of Elsevier
30 Corporate Drive, Suite 400, Burlington, MA 01803, USA
Linacre House, Jordan Hill, Oxford OX2 8DP, UK
Copyright © 2007, Elsevier Inc All rights reserved.
No part of this publication may be reproduced, stored in a retrieval system,
or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher Permissions may be sought directly from Elsevier’s Science & Technology Rights Department in Oxford, UK: phone: (+44) 1865 843830, fax: (+44) 1865 853333,
E-mail: permissions@elsevier.com You may also complete your request on-line via the Elsevier homepage (http://elsevier.com), by selecting “Support & Contact” then “Copyright and Permission” and then “Obtaining Permissions.”
Recognizing the importance of preserving what has been written, Elsevier prints its books on acid-free paper whenever possible.
Library of Congress Cataloging-in-Publication Data
ISBN-13: 978-0-7506-7909-1 (alk paper)
ISBN-10: 0-7506-7909-3 (alk paper)
1 Computer networks-Security measures 2 Information storage and retrieval systems-Security measures 3 Computers-Access control 1 Title.
TK5105.59 N45 2005
005.8–dc22
2006038020
British Library Cataloguing-in-Publication Data
A catalogue record for this book is available from the British Library.
ISBN 13: 978-0-7506-7909-1
ISBN 10: 0-7506-7909-3
For information on all Butterworth-Heinemann publications
visit our Web site at www.books.elsevier.com
Printed in the United States of America
07 08 09 10 11 10 9 8 7 6 5 4 3 2 1
Trang 6This book is dedicated to the memory of Former Lebanese PrimeMinister Rafik al-Hariri Mr Hariri was tragically assassinated
by the enemies of freedom on February 14, 2005 in Beirut,Lebanon Rafik Hariri was a visionary leader with a program
to unite Lebanese of all religions together under a commonLebanese flag, independent of outside influences
Rafik al-Hariri was a hero to all who knew and loved him
He saw the future, and the future was peace and prosperity,not conflict and failure He was a champion of democracy anddid much to further the cause of the Lebanese people whom heloved so much
We miss him every day
Trang 8SECTION ONE INTRODUCTION TO INTEGRATED
SECURITY SYSTEMS 1
2 Integrated Security System Design Benefits and
SECTION TWO SECURITY SYSTEM DESIGN 35
SECTION THREE SPECIAL DESIGN SECTIONS 251
13 Interfacing to Legacy Systems and Emerging Technologies 329
Trang 915 Delaying Technologies and Response Technologies 357
16 Alarm Detection and Emerging Video Technologies 379
Trang 10The leap from traditional proprietary alarm/access control tem infrastructures and analog intercom and video infrastruc-tures to newer Ethernet based system infrastructures is a difficultone for many security practitioners Clients, consultants, integra-tors, technicians and even those in security sales have found thechange to be mysterious, daunting and intimidating.
sys-I was an early advocate of sys-Information Technology (sys-IT)based infrastructure because it offered something that oldersecurity system infrastructures could not: true enterprise capa-bility Ethernet infrastructures permit the distribution of a secu-rity system across the organization’s facilities all over the world.That just isn’t possible with older infrastructures
While I was delighted to see the security manufacturingindustry adopt Ethernet infrastructures, I was distressed to seethat the industry was not seriously addressing the need to pro-vide for the security of the security system itself on the newEthernet infrastructure When I asked manufacturers why theywere not addressing network security, I received answers like:
“Oh, that is the IT Department’s responsibility,” or “Securityintegrators have their hands full just learning how to deal withEthernet based systems; we’ll get to network security later.”
So here now was an industry that was responsible for ing the entire organization’s assets, and the security system itself
Trang 11secur-was often not secure The idea that such a startling bility should itself be so vulnerable was unacceptable to me.
vulnera-So it was clear that it was important for security professionals
to understand IT theory in order to efficiently design networksand practical network security
Soon the security industry will move to systems in whichthere are no analog or proprietary wired devices at all; whereall devices connect directly to the Ethernet infrastructure Theknowledge of how to design efficient network systems andhow to secure those systems is paramount to successful securitysystems This is the future of security technology
In this book, I also bring the reader insight into some ofthe most sophisticated design concepts anywhere in the securityindustry We’ll be discussing design concepts that are able tomake ordinary systems perform extraordinary functions This
is the one and only book you will need for all security designconcepts
Trang 12a Most of all, I thank my longsuffering and pure-heartedwife, Cynthia Kamalo-Norman, who has traveled aroundthe world to be my partner I can never enough repay herkindness, her support, her warmth and affection.
b I am thankful for the help and support of my confidant andbusiness associate, Michael Crocker, CPP, CSC, President ofMichael Crocker, CPP & Associates, Inc and Vice-President
of ASIS International Region 6, as he patiently encouraged
me in the writing of this book, and whose comments andsuggestions have been invaluable
c I am grateful for the diligent review of the manuscript by:
• John R Dew, CPP, Northeast Regional Director of tion Partners International (PPI)
Protec-• Harvey M Stevens, PhD, CPP, President of StevensAssociates, Inc
• Mr John Brady, ConocoPhillips
• Mr Kevin Henson, Asier Technology
• Mr Paul Williams, Gray Hat Research
• Mr Nabil el Khazen, Engineered Systems International,Beirut, Lebanon
• and my protégés Mr David Skusek and Mr AdelMardelli
Trang 13d I am lucky to have had the help of two of the top minds
in Information Technology today to assist in Chapters 10and 11
• Paul Williams is one of the leading minds in tion Technology Security today Paul is President of GrayHat Research, which is a member of Protection PartnersInternational
Informa-• Dr Jack Nisson holds some remarkable patents in WiFiAntenna Applications Dr Nisson has designed anten-nas that are significantly more immune to out-of-phasesignals, resulting in far better performance Dr Nissoncontributed to the section on Wireless Data Dr Nisson isPresident and Founder of WiFi-Plus, Inc
e I am enormously grateful to my publisher and friends, Ms.Jennifer Soucy, Ms Pamela Chester, Ms Kelly Weaver, and
Ms Melinda Ritchie, for their encouragement and uous support, and to Butterworth-Heinemann/Elsevier fortheir continued support of the Security Community
contin-f I am also especially grateful to ASIS International for theirimportant and foundational support of the Security Industryand of this small book
g And I am also thankful for the support of all of the readers
of my articles and previous book, who constantly encourage
me to keep writing, despite having actually read what I havewritten
h For each above, I am humbled by their knowledge andkindness Their contributions have been invaluable
Trang 14Introduction to
Integrated
Security Systems
Trang 16We can change that.
This book is about designing convergence-based integratedsecurity systems and enterprise integrated security systems(which are also convergence based) These are security systemsthat have three major defining attributes:
• Integrated security systems comprise numerous tems together into one complete, highly coordinated, high-functioning system Typical subsystems include alarm, access
Trang 17subsys-control, closed-circuit video, two-way voice communication,parking control, and other related systems System integra-tion is the basic concept for all that follows.
• System integration involves both the integration of nents and the integration of functions High-level functionscan be obtained by integrating components into a compre-hensive working system, instead of individual disconnectedsubsystems
compo-• Convergence-based integrated security systems are grated security systems that utilize TCP/IP Ethernet infras-tructure as the basic communications media This is theresult of a convergence of industries (the security tech-nology industry and the information technology industry).Most new integrated security systems are convergence-basedsystems
inte-• We will also discuss enterprise integrated security systemsconcepts in depth Enterprise integrated security systemsare those security systems that have been integrated withother systems, including elevators, private automatic branchexchanges, human relations programs, and security videoand intercommunications systems, at the corporatewide (theenterprise) level to perform a wide variety of automatedsecurity-related tasks in a manner consistent with corporate
or agency policies and procedures and that do so uniformlyacross the entire enterprise For example, when an employee
is terminated, the act of pressing OK on the human resourcessoftware screen can cause the employee to also be terminatedfrom the access control system and information technologysystem and even shut down access to his or her telephoneand voice mail Such integration can prevent a hostile termi-nated employee from gaining outside access to valuable data
or leaving a forwarding or even antagonistic message on his
or her voice mail Virtually all but the very earliest prise integrated security systems are convergence based, andalmost all of the earliest systems utilize some convergenceconcepts
enter-Although you may not need to design enterprise-class grated security systems, understanding their design concepts
Trang 18inte-will make you a better designer of any convergence-basedintegrated security system, so it is worthwhile to be atten-tive to the enterprise-class concepts when they are discussedherein.
WHO SHOULD READ THIS BOOK
This book is designed for new and experienced system designconsultants, designers, and project managers who build thesecomplex systems and for the building owners, security direc-tors, and facilities directors who operate them Each will benefitfrom the expansive array of issues covered Many of these sub-jects have only rarely or perhaps have never been discussedbefore in any book to my knowledge These include such aspects
as how to make your security system virtually disappear onthe information technology system infrastructure, as though itwere not there at all to anyone but the system administrator(Chapter 17); a complete discussion on how to use security tech-nology to delay, confound, and take down aggressors in veryhigh security environments (Chapter 4); and secrets on systemimplementation that help ensure a stable, reliable, and high-functioning system (Chapters 9 and 18) There is some discussionabout pitfalls out of which the potential for lawsuits have arisenfor well-meaning but unsuspecting project participants My goal
is to help you gain command of every aspect of the process essary to ensure your success, the success of the project team,and especially the success of your client
nec-Designing enterprise integrated security systems seemsdaunting to most who have only designed systems for singlebuildings or for small campus environments The challengehas become ever more important with the advent of terror-ism and the move toward using electronic security systems toaugment homeland security The challenge of helping to pro-tect our nation’s transportation, economic, and cultural infras-tructure raises the importance of designing what used to beesoteric systems Today, these systems are becoming more com-monplace However, many of them are being designed usingold skill sets and outdated techniques, resulting in outmodedand therefore unsuitable products
Trang 19A BRIEF BACKGROUND
In 2003, the security technology industry crested a hill Behind
us, in the rearview mirror, is yesterday’s technology Ahead
of us toward the horizon is the technology of tomorrow It isdifferent from the past It is information technology (IT) based.Many in the security industry are afraid of it They will resistthe change They will lose
In the 1990s, large corporate and government clientsbegan to understand that they are better served by enterprise-class security systems Enterprise systems differ from olderapproaches in that they permit the uniform application of secu-rity policies and procedures across the entire organization Theypermit centralized monitoring of security, business processes,and adherence to policy They reduce liability and operatingcosts They permit a user from one facility to freely access anyother if his or her access level permits
Nearly every manufacturer has embraced the enterprisesecurity concept, but they are still trying to make it work in thecontext of older system architectures These will all be replaced
by pure IT infrastructures in the near future By reading thisbook, you will be ahead of the game and be able to make designdecisions that will save you and your client tens of thousands
of dollars and many headaches
These large-scale enterprise-level integration projects raisethe bar, and we must all train well enough to jump over it.This book presents everything you will need to know to achievesuccess on these complex projects
A FRAMEWORK FOR UNDERSTANDING THE
DESIGN PROCESS
I frequently receive calls from designers who are challenged withprojects beyond their experience, asking how to approach thetask I tell them the first question is not how, but why? Now,
do not misunderstand me: I do not mean why should I bother?
I mean that the process should begin with a clear and completeunderstanding of the following:
• What assets are we trying to protect?
Trang 20• From whom are we protecting them?
• And against what kinds of attack or misuse?
• How can I use integration to improve the operations of myclient and disrupt the operations of criminals and terrorists?Only after these questions are understood and answered can webegin to consider what to design and how to approach it Thisbook will help you learn how to design large integrated securitysystems, beginning with how to approach the project with thequestion, why?
GOALS OF THE BOOK
After finishing this book, you will have a new command of thefollowing:
• Strategic issues
The importance of integrating electronics and physical rity with a solid foundation of good security management.How to work with the client’s best interests in mind
secu-How to know when to integrate systems and when it doesnot benefit the client
The difference between strategic integration and haphazardintegration
The difference between component integration and tion of functions
integra-How to dramatically improve security at a facility using goodintegration strategies
How to lower system and staffing costs and improveemployee productivity using good system integrationpractices
How to create a solid basis for design, including
What is security and what is not
How to determine the appropriate level of security
We will examine why you need to know more about ITsystems and cover issues most designers did not knowwere important (to their ultimate peril and that of theirclients)
Trang 21We will discuss the esoteric side of integration, including how
to design deployable delaying barriers and when and how
to use reactive electronic automated protection systemsthat can actively intervene in a security event, stopping itimmediately, from the security command center
• Technical issues
How to budget systems and plan phased implementation
We will fully explore the system design elements, includingdrawings of each type, and how to write quality specifi-cations that stand up to challenges and clearly state theclient’s needs We will examine what can be achieved byintegrating with other building systems and explore themany ways to interface with them
We will also examine the foundation of how to design,including
Drawing hierarchies
Specification hierarchies
How to completely integrate drawings and fication into a single, thorough, and perfectlyunderstandable set of construction documents
speci-We will explore in great detail how to design each type ofdrawing required, including
Single line diagrams
System interface diagrams
System schedules
We will cover every typical aspect of security systemspecifications, including how to make them actuallycommunicate the client’s best interests in a way that the
Trang 22contractor understands what to do, how to do it, and how
to know he or she has succeeded
We will explore how to select the best technologies to use foreach project with considerations to the client’s best long-term interests, short-term budget concerns, installationcost factors, visual aesthetics, long-term maintenance andreliability considerations, the ability to expand the systemflexibility, and the ability to scale the system size
We will discuss how to secure the security system fromvarious kinds of attacks, including insider attacks
• Tactical issues
We will discuss how to manage client relations so that ourdesign work is always in his or her best interest and he orshe understands that and has constant confidence in us
We will examine the differences between what needs to be
in bid documents, construction documents, and as-builtdocuments
We will examine each type of technology and explore its efits and limitations, including alarm and access controlsystems, analog and digital security video elements andsystems, security communications systems, system infras-tructure options, system integration options, and securitycommand center options
ben-We will also discuss how to provide bidding support toclients that gives them a truly empirical standard ofevaluation for which bidder to select
We will explore the important and delicate matter of how toreview system installation to help ensure the success ofthe consultant, the contractor, and the client
We will also examine legal considerations and how goodsystem design coupled with quality construction man-agement and good relationship management can worktogether to the success of all project participants, avoidingproblems, confrontations, and lawsuits
Designing enterprise integrated security systems is exciting,challenging, and highly rewarding A well-designed system can
Trang 23save a client millions of dollars over its life in improved tions efficiency, improved safety, and avoided security losses.The best enterprise integrated security system designers arehighly prized for this reason.
opera-ARRANGEMENT OF THE BOOK
This book is arranged to go from the strategic to the nical to the tactical Strategic subjects are covered primarily
tech-in Chapters 1–3, technical subjects are covered primarily tech-inChapters 4–10, and tactical subjects are covered primarily inChapters 11–19 The strategic section covers the “why” of design,including some important history that provides insight into how
to stay in the path of industry development and not be tracked as it goes by, the technical section explains how it isdone, and the tactical section provides the cultural knowledgethat leads to project success If at any time (especially in thetechnical section) it gets to be a little too much at once, it is ok
side-to jump around a bit If you are not interested in the hisside-tory ofelectronic systems, or any other specific section, feel free to skipthat section; however, each section provides important insight
to the total process For example, the section on history vides important insight into how to spot industry trends beforethey occur I have provided advice and consulted with manufac-turers on important industry developments many years beforethey were thought to be important by the manufacturers Thosewho listened and modified their designs accordingly moved out
pro-in front of the pro-industry Those who did not were left behpro-ind.How did I know where the industry was going? The seeds ofthe future are in the past Understanding how the founders ofthe industry dealt with the technical problems they faced pro-vides us with insight into why things work the way they dotoday Understanding what we want to achieve and how otherindustries have dealt with similar problems provides us withinsight into how to manipulate technology to achieve it Thegreat body of knowledge is always out there We only have tosee and not just look Understanding the industry from strate-gic, technical, and tactical viewpoints gives us the ability to solveproblems in a way that endures as technology develops and as
Trang 24the organization grows It is helpful to understand strategic andtactical aspects first to help understand why the technical detailsare so important Although the challenge is considerable, theinformation is easily digestible if you take it in small bites.The book is also arranged in a way that is useful as a learn-ing tool and then can be used for years as a reference guide Youwill find that some information is repeated That is intentional.All the information herein is organized in a way that guides theuser from the simple to the complex So you will find a con-cept presented first, then a discussion of its strategic value, thentactical applications, and, finally, a discussion on the technicalimplementations of the technology.
Welcome to convergence-based integrated security systemsdesign and thank you for reading
Trang 26Integrated Security
System Design Benefits and Philosophy
WHY INTEGRATE SYSTEMS?
Why a Strategic Approach to Security
Design Is Necessary
Everything operates within a hierarchy, and security is noexception When an organization is founded, it establishes amission For Detroit automakers, that mission is to make money
by building cars; for a chain of home hardware centers, it is toearn profits by selling hardware; for a hospital, it is to providehealth care; for some nonprofit organizations, it is to assist devel-oping countries; and for the United Nations, it is the pursuit ofworld peace Each of these missions requires the establishment
Trang 27of business programs and organizational structures to supportthe mission For a corporation, those programs could includemanufacturing, distribution, and sales; for a health care organi-zation, programs could include hospitals, clinics, and outreachprograms; and for a nonprofit organization, the programs couldinclude fund-raising and assistance programs Almost all orga-nizations also have accounting, information technology, filing,and administrative support programs Once the programs areestablished, the organization must acquire assets to support theprograms Assets could include factories, warehouses, depots,shelved products, networks, furniture, and office buildings.
In fact, each business program has a mission, subprograms,and assets All assets need protection from misuse and harm.Enter the security program The security program also has a mis-sion, subprograms, and assets, like any other business program.One of those programs is the electronic component (high-techsystems, of which there may be several, including electronicsecurity systems and information technology security systems)
Uniform Application of Security Policies
In order to get consistent results, it is imperative to use tent processes and procedures Imagine how chaotic it would
consis-be for a multinational corporation to allow every department ateach site in each business unit to perform their accounting usingtheir own choice of different software programs and differentaccounting techniques It would be very difficult for the orga-nization’s management to consolidate all these different reportsinto a single cohesive picture of the organization’s finances, andthat could easily result in corporate losses and intense scrutiny
by regulatory bodies and shareholders It is also unwise forany organization to allow its business units and individual sites
to establish their own individual security policies and dures, guard-force standards, etc., which results in the potentialfor legal liability where different standards are applied at dif-ferent business units Enterprise-class security systems providethe platform for the uniform application of enterprise securitypolicies across the entire organization Enterprise-class secu-rity systems can also provide visibility regarding how other
Trang 28proce-company policies are being applied and followed What follows,then, can be better management when that information is madeavailable to management in a cohesive way.
Force Multipliers
Integrated security systems are force multipliers That is, theycan expand the reach of a security staff by extending the eyes,ears, and voice of the console officer into the depths of the facil-ity where he could not otherwise reach The use of video guardtours enhances the role of patrol officers because many moreguard tours can be made with video than with patrol staff alone.Detection and surveillance systems alert security staff of inap-propriate or suspicious behaviors, and voice communicationssystems allow console officers to talk with subjects at a build-ing in another state or nation while their behavior is observedon-screen
Multiple Systems
The integration of alarm, access control, security video, andsecurity voice communications into a single hardware/softwareplatform permits much more efficient use of security manpower.Enterprise-class security systems are force multipliers The betterthe system integration, the better the organization will be able
to use its security force
Multiple Buildings
When security systems span multiple buildings across a campus,the use of a single security system to monitor multiple buildingsfurther expands the force multiplication factor of the system Themore buildings monitored, the higher is the value of the system
Trang 29required because monitoring multiple sites requires the use ofnetwork or Internet resources Monitoring multiple sites can betricky due to network bandwidth We discuss how to get themost out of network bandwidth later in the book.
Multiple Business Units
Some large organizations also have multiple business units Forexample, a petrochemical company may have drilling, trans-portation, refining, terminaling, and retailing units Each ofthese can benefit by inclusion in an enterprise-wide securityprogram
Improved System Performance
Enterprise-class systems also provide significantly improvedsystem performance The integration of multiple systems
at multiple sites into a cohesive user interface allows forsimple, straightforward command and control Gigantic systemsbecome manageable
Improved Monitoring
System monitoring is usually dramatically improved overnonenterprise systems The integration of alarms, access control,video, and voice communications across the platform providesthe console officer with coherent and timely information aboutongoing events and trends This is especially true of systemsthat utilize situational awareness software that put the alarmsand alerts into a dynamically updating context of the site andfloor plans so that the console officer can clearly see evolvingsuspicious activity in relation not only to the surroundings, butalso to security response assets In elegantly designed systems,when a visitor at a remote site presses an intercom call buttonand identifies himself or herself as an authorized user who hasforgotten his or her access card, the console officer can pull upthe record for that user quickly and confirm both the identity
of the person at the intercom and that person’s validity for thatdoor In this design, the system knows the user, the door, andthe date and time As the console officer drops the person’s icon
Trang 30onto the door icon, the system either grants or denies access tothe door based on the person’s authorization for that door forthat time (This application requires custom software.)
Reduced Training
Enterprise-class security systems also require less training Themost basic console operator functions for a truly well-designedenterprise-class system can be learned in just a few minutes(answering alarms, viewing associated video, and answering theintercom) Because the interface is standardized across the enter-prise, cross-training between buildings and facilities is practical.Also, operators from one site can provide support for a consoleofficer or guard at another
Better Communications
The system also provides for better communications Imagine
a single software platform that integrates security intercoms,telephone, cell phones with integral walkie-talkie functions,two-way radios, and paging into one easy-to-manage platform.Imagine a console officer who can wear a wireless headset, wear
a wired headset, or use the computer’s microphone and ers and trigger the push-to-talk button with a footswitch or amouse press Efficiency of the system is further improved whenthe system queues the appropriate intercom automatically eachtime a camera is selected The more the system presents the con-sole operator with the tools to act as though he or she werethere at the scene, the better the system serves the security pur-pose (This function is best performed by situational awarenesssoftware in addition to conventional integrated security systemsoftware.)
speak-COST BENEFITS
Improved Labor Efficiency
For many of the reasons stated previously, enterprise-class rity systems enhance labor efficiencies There are fewer consoles,fewer guards, no redundant monitoring, no nighttime live
Trang 31secu-monitoring where it was not cost-effective before, and mutualaid between sites and buildings All these factors free up guards
to be on patrol and in live communication with the centralconsole
Reduced Maintenance Costs
Enterprise-class security systems are generally built on the use
of a common technology across the entire platform intuitively, they are also generally built on simpler technologythan less sophisticated systems The key to success is often theelegant combination of simple technologies into a highly refinedsystem This inherent architectural simplicity often also results
Counter-in lower maCounter-intenance costs Although the results are elegantand sophisticated, the underlying technology is actually sim-pler than in times past The key is to combine simple Booleanalgebra logical functions (and, or, not, counting, timing, etc.) inelegant ways
Improved System Longevity
Security systems are notoriously short lived Contemporarysecurity systems are composed of numerous delicate compo-nents that either fail mechanically or are unable to upgrade
as the system scales Thus, when upgrades are necessary,
it is often necessary to throw out components that are only
a few years old because they are not compatible with newertechnologies This inbuilt obsolescence has a long tradition insecurity systems, much to the consternation of building ownersand consultants Most building systems are expected to last
15 to 20 years Some building systems, including the basicelectrical infrastructure, are expected to last the life of thebuilding However, most electronic security systems made bymajor manufacturers and installed by major integrators lastless than 7 years A well-designed enterprise-class security sys-tem should last 10 to 15 years between major architecturalupgrades This is achievable using the principles taught in thisbook
Trang 32HOW INTEGRATION IS ACHIEVED
System integration involves both the integration of nents and the integration of functions High-level functions can
compo-be obtained by integrating components into a comprehensiveworking system instead of individual disconnected subsystems.Systems integration is not a challenge of electronics; it is ofcourse a technical challenge, but more importantly, it is a chal-lenge of imagination Sometimes, investigation, exploration, andinvention are required Consider it a puzzle to be solved Look atthe pieces and the objective Do not accept at face value what youare told by the manufacturers about the capabilities and limita-tions of their systems As a systems designer, you should knowmore than the manufacturers about how to integrate systems.This book will help guide the designer along the path ofunderstanding the technology and perhaps how to stimulate theimagination toward the goal
SUMMARY
Each organization has a mission It develops programs in port of that mission and acquires assets to support the programs.Those assets need protection to avoid their misuse, theft, ordestruction
sup-Security system integration provides the following benefits:
• Uniform application of security policies
• Integrates multiple systems into one for operational plicity
sim-• Can integrate systems from multiple buildings and multiplesites for operational simplicity
• Can integrate the services for multiple business units forconsistency
System integration can also provide the following:
• Improved monitoring
• Reduced training
Trang 34THE HISTORY OF INTEGRATED SECURITY SYSTEMS
Most industry folks believe that security systems are pretty wellevolved today Well, if that is true, many of them are deformedmutants Early in the evolution of the systems, a particularthing happened that has served well the manufacturing com-munity and not so well the integrators, designers, and clients.The good news is that the convergence of information tech-nology infrastructure with security systems is changing that
Trang 35First, let’s discuss the five generations of the technology andhow it evolved.
THE FIRST GENERATION
As we travel through the history of electronic security systems,pay special attention to the evolution of alarm and access controlsystems, for in the failure of that industry to adapt to emergingtechnology were the seeds of today’s and tomorrow’s systems
In the beginning, there were alarm systems In 1851 inBoston, the first McCulloh loop telegraph-type alarm systemwas installed (Fig 3-1) These systems involved sending a
Los Angeles Police Department
Trang 3620-milli-amp current down a loop of wire and monitoring thecurrent on the wire If there were any change in current, it wouldcause a relay to change state or move a pen on a paper tape,sending a coded message These were also heavily used in policeand fire pull stations Early intercom systems date back to the1940s The first magnetic stripe access control cards appeared inthe 1960s In 1961, the London police began using closed-circuittelevision (CCTV) to monitor activities in train stations All ofthese were discrete, individual systems For example, there were
no camera switchers, but each camera reported to an ual monitor Taping video was not done because it was tooexpensive Alarm recording was done by hand notes The ideawas to be alerted to crime problems, to deter criminals, and tohelp those in need These were the first generation of electronicsecurity systems By today’s standards, these were very basicsystems
individ-The first generation of access control systems is still in use
In the first generation of security technology, CCTV and com systems were a rarity CCTV systems were primarilylimited to one camera displayed on a single monitor For thosefew systems that had more than one camera, typically a monitorwas used for each camera Where intercoms were used at all,they were typically either custom installations or an extension
inter-of a business intercom
THE SECOND GENERATION
The second generation of access control systems networkedeight card readers together to a dedicated computer that wasapproximately the size of a huge early electronic desk calcula-
tube display, and a 3-in paper tape When a person presented
a card to the front door of a facility, one would hear the papertape chatter and the nixie tubes would display something like1CO3-AG One would then refer to a book that would indicatethat card CO3 was granted access to door 1
The second generation of alarm systems replaced the ficult to read meters and paper tapes with colored lamps and
Trang 37Figure 3-2 First-generation card reader.
lamps—green for secure, red for alarm, and yellow whenbypassed There was a switch to bypass the alarms The secondgeneration began in approximately 1945 and continues today.CCTV systems were still little used, but intercom systems werebecoming slightly less than obscure
THE THIRD GENERATION
The third generation began in 1968 and continued until imately 1978 Third-generation systems combined alarm and
Trang 38approx-Figure 3-3 Second-generation card access system.
permission of Flair Electronics, Inc
access control into one system Up to 64 card readers and up
to 256 alarm points were wired individually back to a PDP-8 or
termi-nal, and a line printer A basic 16 card reader system could costmore than $100,000 During this time, CCTV began to be used bycorporations and there were a few instances of intercom systems(Fig 3-5)
Trang 39Figure 3-5 Third-generation alarm/access control system.Image courtesy of Computer History Museum.
THE FOURTH GENERATION
In 1971, Intel introduced the first 4-bit microprocessor, the 4044,designed by Intel designer Ted Hoff for a Japanese calculatorcompany The processor boasted more than 2300 transistors—more switches than ENIAC had, which filled an entire room andrequired a dedicated air-conditioning system just for the com-puter (Fig 3-6) The 6502 and 8088 8-bit microprocessors soonfollowed These became the basis for a new breed of alarm andaccess control system technology called distributed controllersystems
Until 1974, each alarm and access control field device waswired individually back to the minicomputer, where a jumble
of wires fed into custom-made circuit boards All that wirewas costly and often cost-prohibitive for most organizations
In 1974, one of the first distributed controller based alarm and access control systems was christened (by
alarms and card readers into controller panels and network els together into a distributed system This was a radical change
Trang 40pan-Figure 3-6 ENIAC computer Image courtesy of the UnitedStates Army.
Finally, the cost of wiring, which was a major cost of early tems, was dramatically reduced The earliest fourth-generationsystems still terminated all these controllers into a central mini-computer, computer terminal, and line printer (early Cardkey
sys-2000 system) The computers often had what I like to call a
“user-surly” interface When a person presented a card at thefront door, the terminal still dutifully displayed something like
“1CO3-AG” as the line printer chattered the same message Theconsole officer then looked that code up in a book
Corporations began using intercoms and CCTV more sively, although prices were still prohibitive for most users, with
in CCTV occurred during this period as well For the first time,
it was possible to use just a couple of video monitors to viewmany cameras because the cameras were finally being termi-nated into sequential switchers that switched the monitor view
As the industry progressed, costs decreased ically and the systems became much more user-friendly