Integrated technology protects oil pipeline

May 2003 Integrated Solutions

The Caspian Pipeline Consortium has installed an integrated security system using the Honeywell Enterprise Building Integrator (EBI) suite of applications to protect a 1500 km pipeline.

In addition to increasing security, it provides improved productivity, better asset utilisation and, over time, lower lifecycle costs.

The Caspian Pipeline Consortium (CPC) is comprised of the governments of the Russian Federation, the Republic of Kazakhstan, the Sultanate of Oman, along with a consortium of oil producers. CPC has built a 1500 km unitary pipeline exporting crude oil from the Tengiz oil field in Kazakhstan, across Russia, to a deep-water terminal on the Black Sea.

The pipeline is the first in the world to install an integrated security system using the Honeywell Enterprise Building Integrator (EBI) suite of applications. Managed by local Honeywell project management, the project provides access control, intruder detection, CCTV surveillance and audio communication subsystems, all of which work in tandem - through EBI - for improved security along the entire length of the pipeline.

Whilst each subsystem enables better protection and management of a particular aspect of pipeline operations, linked together they provide a complete picture of enterprise security. Through one single control point, it facilitates total day-to-day security while providing CPC management with detailed insight as to the physical security of their sites.

Video surveillance

Key points along the pipeline are monitored by the Honeywell Digital Video Manager (DVM), a digital CCTV surveillance system. This facilitates alarm-activated recording, by capturing the footage required, when it is needed. Footage can be viewed in realtime and historically. For a better overall picture of the incident, recordings can be programmed to provide images leading up to and following an incident.

A primary feature of the solution is the utilisation of the fibre-optic network, which runs the length of the pipeline - pumping stations, and the marine terminal included. Cameras can be installed where they are needed, and the configuration can be modified to meet requirements for tighter security or additional monitoring on the network.

Operators, working out of security stations, can 'see' what is happening and control video cameras along the entire 1500 km pipeline. The system can also be monitored and controlled from the main controller centre in Novorossiysk.

This solution supports productivity improvement. Through the integration of fire detection systems with video surveillance, alarms trigger the DVM to provide operators with images of a remote location. Operators can then take the necessary action, acknowledge remote alarms, command points, and reset the system from their workstation. The EBI's three-stage alarm handling helps guide them through emergency situations and in-built reporting tools document compliance, device testing, inspections and maintenance activities.

Personnel safety is further enhanced by a voice intercom subsystem enabling two-way communication. If need be, the station operator can call up the DVM cameras for backup, at the same time triggering a video record of the remote caller.

Access control and intrusion alarm

Access control and intruder detection operates on several different levels. A fence with in-built perimeter microphonic sensors protects all CPC facilities: the marine terminal, tank farm, five pumping stations, and more than 100 remote facilities located along the pipeline - including mainline block valves, radio towers, launcher/receivers, and future pump stations. It picks up any untoward vibration for immediate analysis and response. Any disruption automatically triggers a CCTV/DVM response.

Inside the fence, the access control system provides an effective security protection, stopping unauthorised entry to sites and buildings along the pipeline as well as the control and communications centres. Entry to restricted areas is governed down to the finest detail, such as a particular person at a particular time in a particular room. Specific programmable events (eg, a door open for too long or a reader failure) trigger an alarm and/or the locking of doors pending further investigation.

An integrated Photo ID system manages all cardholder data and provides quick access to cardholder pictures for an additional layer of security. Details of all visitors to sensitive areas are logged in a special database.

EBI integrates with Honeywell systems such as TPS, PlantScape, and Experion PKS. This ability to access and bridge core building subsystems with key business processes such as process automation, financial and personnel records, and environmental controls ultimately leads to better decision-making. This is made possible by Honeywell's patented Distributed Server Architecture (DSA) technology which facilitates sharing of the same hardware and base software.

For more information contact Frank Fowles, Honeywell, 011 695 8010.

Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Building a nervous system for smart cities
Issue 1 2020, Pinnacle Instruments SA , Integrated Solutions
Build a central nervous system for smart cities, by employing real-time situation reporting and analysis that unites the powers of cloud computing, AI, IoT and big data.

The secret to 5G security? Turn the network into a sensor
Issue 1 2020 , Integrated Solutions
We are about to make the leap from being a civilisation that uses networks to one that runs on them in a fundamental and inextricable way.

The move to services and RMR
Issue 1 2020, Merchant West, G4S South Africa, Technews Publishing , Integrated Solutions
Project work used to be the staple diet for system integrators, but that was before the services model changed the way businesses buy and use their security systems.

Global security industry adopts servistisation models
Issue 1 2020 , Integrated Solutions
New as-a-service business models are gaining traction because they reduce capital expenditure and cost of ownership, finds Frost & Sullivan.

Looking ahead with mobile access technologies
Access & Identity Management Handbook 2020, Technews Publishing, HID Global, dormakaba South Africa, Salto Systems Africa, Suprema, Gallagher , Access Control & Identity Management, Integrated Solutions
Given the broad use of smartphones around the world and the numerous technologies packed into these devices, it was only a matter of time before the access control industry developed technology that would ...

Scalable access solution
Access & Identity Management Handbook 2020 , Access Control & Identity Management, Integrated Solutions
Bosch Building Technologies makes access management simple, scalable and always available with Access Management System 2.0.

Securing perimeters of secure locations
November 2019, Axis Communications SA, Modular Communications, Hikvision South Africa, Nemtek Electric Fencing Products, Technews Publishing, Stafix , Government and Parastatal (Industry), Perimeter Security, Alarms & Intruder Detection, Integrated Solutions
Hi-Tech Security Solutions asked a number of companies offering perimeter security solutions for their insights into protecting the boundaries of national key points.

The safe city and its need for interoperability
November 2019 , Integrated Solutions, CCTV, Surveillance & Remote Monitoring
Interoperability continues to present one of the greatest challenges, particularly with video management systems, video recording devices and cameras.

Analytics-driven solutions for smart infrastructure
November 2019, Bosch Building Technologies , Integrated Solutions
Video analytics technology can bring intelligence to infrastructure by delivering solutions for traffic flow, improved safety, smart parking, and data collection.

A platform approach to innovation and value
CCTV Handbook 2019, Technews Publishing , Editor's Choice, CCTV, Surveillance & Remote Monitoring, Integrated Solutions, IT infrastructure
Moving to the platform model of doing business holds tremendous advantages for end users and smaller developers, but also for the whole technology supply chain.