Perimeter protection in Ghana

October 2019 Mining (Industry), Perimeter Security, Alarms & Intruder Detection

Protecting the perimeter of a mine is difficult, primarily because of the size of the property and subsequently the length of the perimeter. Due to these constraints and the difficulty associated in verifying alarm conditions, protecting large perimeters effectively is a difficult and expensive process.

On the other hand, it is more feasible and practical to protect strategic sites and process areas where perimeters are more manageable and security personnel can verify and respond to alarms in a reasonable time.

This concept has been implemented at a gold mine in Ghana where the client has erected a dual fence with AcoustAlert PIDS fence detection on both inner and outer fence lines. The fence has been split into eight zones of up to 300 metres each, affording detection of an intrusion into their critical processing plant area. The dual perimeter fence is approximately 2400 metres long and the AcoustAlert field processors are housed in specially manufactured steel kiosks around the perimeter, between the two fence lines in the dead-man’s zone.

One concern from the client was our initial proposal to use fibre-optic cable around the site in order to LAN link all AcoustAlert field processors. The difficulty in a place like Ghana is getting technical guys to splice and maintain the fibre LAN network infrastructure. To solve this problem, AcoustAlert used two-wire copper Ethernet extenders which can extend Ethernet over many hundreds of metres over a normal two core cable. This removed the difficulty around maintenance. Specific lightning protection was implemented for the two-wire copper connection along with lightning protection on the incoming mains.

All field processors are linked over the two-wire Ethernet infrastructure back to a central control room. All field processors are managed by the AcoustAlert site manager software, which besides handling and managing the AcoustAlert field processor can also monitor alarm input conditions and switch outputs which are mapped to inputs in the software.

The operator also has several soft outputs which can be controlled on the user interface to open or close gates, or switch lights on and off, manually or automatically. This I/O control makes linking alarm inputs (from AcoustAlert or other devices or conditions) to CCTV and other alarm/access systems to switch cameras, and so on.


Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

AI technology to empower vertical markets
Dahua Technology South Africa Mining (Industry) CCTV, Surveillance & Remote Monitoring Products
Dahua WizMind is a full portfolio of solutions comprising project-oriented products that use deep learning algorithms to provide more business value to its global customers and deliver reliable and comprehensive AI solutions for vertical markets.

Maximum fire protection for the most dangerous places
Securiton Fire & Safety Mining (Industry) Products
Africa’s heavy mining and resource processing industries are some of the continent’s leading economic lights. They also present some of its toughest fire safety challenges on the planet.

Matt De Araujo joins Ajax Systems
Ajax Systems News Perimeter Security, Alarms & Intruder Detection
Matt De Araujo has joined Ajax Systems as Head of Sales in sub-Saharan Africa with a goal to strengthen the local team and exceed expectations.

Directory of Product and Solution Suppliers
Mining (Industry)
The Directory of Product and Solution Suppliers for the mining industry includes the details of companies that provide products, advice and services to the mining sector, primarily, but not limited to the areas of security and risk.

The importance of the operator’s frame of reference
Leaderware Editor's Choice CCTV, Surveillance & Remote Monitoring Security Services & Risk Management Mining (Industry)
The better the operator’s frame of reference and situational awareness, and the more informed they are in dealing with CCTV surveillance in the mining industry, the more successful they are likely to be in surveillance.

The art of drive and focus
Technews Publishing Editor's Choice Mining (Industry)
Riette Smeda did not find security, security found her. In doing so, she found an environment where grit and determination make all the difference in a country where crime pays.

AI, risk management, and frameworks
Blacklight Group Technews Publishing Editor's Choice Security Services & Risk Management Mining (Industry)
A risk management framework is a basic necessity to meet the always-evolving criminal war against mines, perpetrated by ruthless organised crime gangs that often are better informed and resourced than their targets.

Complex, but critical partner in security
Technews Publishing Bidvest Protea Coin Editor's Choice Integrated Solutions IT infrastructure Mining (Industry)
Smart Security looks at how drones can be applied effectively in mine security operations. The ability to quickly gain a birds-eye view of a situation, whether security, safety or operational in nature, makes drones a significant value-add to mines.

The data must flow
Technews Publishing IT infrastructure Mining (Industry)
Amidst the dirt and dust, the data packets must always be moving in order for mines to remain on top of their environments, their people, their processes and equipment, and most importantly, the safety of everyone on site.

Underground/overground low latency communication
IT infrastructure Mining (Industry)
From 5G networks to secure and reliable underground and open cast (M2M) communications, the mining industry is embracing digital transformation to improve the flow of information across sites, streamline decision-making, and enable safe, secure remote operations.