Plug & play perimeters

November 2001 Perimeter Security, Alarms & Intruder Detection

"Have you ever thought about the possibility that a perimeter detection system can be similar to what we are used to in our everyday life when it comes to our office PCs on our local office networks?" asks Gary van Staden of Sensor Security Technologies, specialists in perimeter security.

"Most of the time when we cannot use our PCs or cellphone we blame the network because it is giving trouble," states van Staden. "Networks are the basis of getting information transferred whether it is to our cellphones, PCs or even satellite TV. When someone intrudes our perimeter we want the information passed on to us - in order to achieve this we have to depend on some network. It does not matter how tiny and expensive the equipment is; if the network fails, the equipment is virtually useless for its intended task. For the same reason the most effective intrusion detection methods and devices will become useless if we cannot get the information through to the protectors of the perimeter to enable rapid reaction."

According to van Staden, a perimeter detection system should be based on a sound, reliable and redundant network as the starting point. This type of network can operate on any medium, whether it is local on optical fibre, a local area radio network, a SMS cell network or maybe the Internet. Perimeter designs and threats differ from client to client, but all will require a reliable network in some simple or very complex form. The efficiency of any perimeter system will therefore in the first instance depend on the design of a network before any specific detection devices are decided on.

"Another analogy we find in our everyday PC and cellphone world is that we want it to be flexible," adds van Staden. "For instance I want to change my mind about my new software requirement without buying a new PC. You want to be able to configure and install any addition yourself. In the PC world we call it plug & play. Now, if perimeter detection requirements may change and differ from application to application, does it not make sense to have it based on the plug & play approach?"

When applying the above to a perimeter detection system, there are important issues to consider besides the features of the detection devices such as:

* Reliable and redundant network with sufficient speeds and error checking to fit the specific perimeter application.

* A flexible system that may accommodate the specific requirement of the perimeter detection and allow future upgrades and changes.

* Irrespective of how complicated the design and technology used may be, it must allow the user to operate and maintain it without calling the designer.

* Systems must be installed and commissioned without the designer being on site and there must definitely not be any fiddling and tuning required to get it started.

Moduteq

One such system, mentions van Staden, is Moduteq from Teqcon. Moduteq is a perimeter network backbone that normally communicates on a multimode fibre network. "Field nodes are distributed along the perimeter that almost acts as guards. They communicate to central control and record on an event log," explains van Staden.

To enable the field nodes to carry out the surveillance, they are equipped with tautwire detection, short circuit detection or any other detection linked to digital input and output cards. These field nodes also feature non-lethal energisers called dual loop energisers, which allow all wires to be energised with alternative wires having positive and negative voltages.

"Tautwire is a detection platform that is regarded as being the best with the least amount of nuisance alarms. It has been used in all the recently built hi-tech prisons in South Africa," explains van Staden. "The principle has been implemented by for example the Federal Bureau of Operation of Prisons in the USA. They have also opted to implement the Moduteq range of products that is currently installed in a new prison facility in Kentucky USA. This is the real fairy tale."

"Sensor Security Technologies offers innovative finance solution options for clients for the above technologies such as rentals with full or preventative maintenance plans to suit individual needs. This philosophy allows clients to vastly extend the operational lifetime of their perimeter systems," concludes van Staden.

For details contact Gary van Staden, Sensor Security Technologies at e-mail: [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Amendments to the Private Security Industry Regulations
Technews Publishing Agriculture (Industry) Surveillance Access Control & Identity Management Fire & Safety Perimeter Security, Alarms & Intruder Detection Information Security Asset Management News & Events Integrated Solutions Infrastructure Security Services & Risk Management Education (Industry) Entertainment and Hospitality (Industry) Financial (Industry) Government and Parastatal (Industry) Healthcare (Industry) Industrial (Industry) Mining (Industry) Residential Estate (Industry) Retail (Industry) Transport (Industry) Conferences & Events Associations Videos Training & Education Smart Home Automation Commercial (Industry) Logistics (Industry) AI & Data Analytics Facilities & Building Management IoT & Automation Power Management
SANSEA, SASA, National Security Forum, CEO, TAPSOSA, and LASA oppose recently published Amendments to the Private Security Industry Regulations regarding firearms.

Read more...
JVA 4-line LCD keypad
Perimeter Security, Alarms & Intruder Detection
The JVA 4-line LCD keypad is integral to the JVA Security Electric Fence product range and provides a centralised interface between the customer and their perimeter security solution.

Read more...
Gallagher’s Integrate 360 event in Durban
Gallagher News & Events Perimeter Security, Alarms & Intruder Detection
Gallagher Security held its Integrate 360 event in Durban, South Africa. The event attracted 65 channel partners, end users, and consultants from across KwaZulu-Natal and broader South Africa to showcase the latest in Gallagher’s technology suite.

Read more...
Nice launches DC Blue Astute garage door motor
Nice Group South Africa Technews Publishing News & Events Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Nice Systems SA has launched the Nice DC Blue Astute, a garage door motor for the South African market featuring a pre-installed lithium-ion battery instead of traditional lead-acid batteries.

Read more...
Wireless security makes its mark
Perimeter Security, Alarms & Intruder Detection
Alarms have always had a wireless component since the first monitoring control room was launched, but internally, homes and companies used to install cables to connect various sensors and devices to the control panel.

Read more...
Lock it down
OPTEX Perimeter Security, Alarms & Intruder Detection
Securing wide outdoor areas presents several challenges that differ significantly from those faced in smaller, more confined environments, and choosing the right intrusion detection technology is the key to safeguarding these spaces.

Read more...
Smart, reliable detection in any conditions
OPTEX Perimeter Security, Alarms & Intruder Detection
In its discussions with companies operating in South and Southern Africa’s detection and alerting technologies market, SMART Security Solutions spoke to OPTEX for more information on its solutions and technologies.

Read more...
The unseen barrier: AI and perimeter monitoring
Verifier Perimeter Security, Alarms & Intruder Detection Surveillance AI & Data Analytics
Perimeters have been one of the most important security aspects since antiquity, but what does perimeter monitoring look like in the age of AI, CCTV, thermal detection and modern off-site surveillance?

Read more...
Surveillance on the perimeter
Axis Communications SA Hikvision South Africa Technews Publishing Editor's Choice Perimeter Security, Alarms & Intruder Detection
Cameras have long been a feature in perimeter security, with varying reports of success and failure, often dependent on the cameras’ planning, installation and configuration, as well as their integration with other perimeter solutions and centralised management platforms.

Read more...
Directory of suppliers
Perimeter Security, Alarms & Intruder Detection
The Directory of Product and Solution Suppliers for the alarm, intrusion, and perimeter markets includes details of companies that provide security and risk mitigation products, advice, and services to these verticals.

Read more...