Designing a security system that works

April 2003 Integrated Solutions

Despite the technology innovations that have occurred within the past 20 years, there are occasions when a security system may not actually meet the needs of customers.

Unfortunately, many customers discover this only after they have purchased and installed an inadequate system. At that point it is too late, because they have already made a substantial investment in hardware, software, labour, and training. Too often, customers are drawn in by what they see in a product demonstration, without understanding or focusing on the system's underlying architecture or design. The system looks good on a superficial level. Quite often a small system is installed and seems to perform well initially. But as the customer's needs change and the system grows, there are greater stresses placed on the system. It is then that hidden design flaws and limitations become much more apparent.

This article identifies the requirements for designing a modern security management system.

Distributed network design and the role of the access controller

Distributed network architecture means that each hardware component of the system is designed with its own processing and decision-making capabilities. Additionally, these intelligent system controllers are designed as a plug compatible network module. The access panel (access controller) is such a device and is the fundamental piece of hardware in a security management system.

In a well-designed security management system, the access controller is a self-contained, intelligent device, with its own local processing power and sufficient capacity to store a full database of cardholder and other information required to make realtime access decisions. Furthermore, the controllers should be good 'network citizens' and not add additional superfluous traffic onto a customers existing network.

The controller is the most reliable piece of hardware in a security management system, with a dedicated communication channel to its downstream devices (readers, alarm input and output points). There are potentially a very large number of downstream events generated in a system. If communication between the controller and the upstream devices (host computer for example) is unavailable (off-line), the controller needs to be able to store all the downstream events received, whilst offline, without losing or overwriting them, until communication has been restored. The controller must be intelligent enough to not only store such information, but to prioritise it as well. For example, events generated at certain critical alarm points might be of an extremely high priority, and would have to be transmitted to the host computer and displayed in the central station monitoring facility ahead of other alarms and events.

Host-controller communications

When the host computer communicates with the controller, it can send information either in single data record transaction or in a block of data as a single transaction. A well-designed communication protocol between the controller and the host system uses asynchronous, full-duplex communication, and sends and receives data to/from the controller in large data blocks optimised for network packet size. Using an asynchronous, full-duplex protocol, the host and controller can exchange blocks of data simultaneously without waiting for each other's responses.

Hardware-based design philosophy

Most security management system vendors were for many years involved in the manufacture of their own hardware. Along the way, they developed a culture in which their system design continued to emphasise hardware functionality and features. Those companies viewed software as a necessary evil, something they had to provide - for a nominal fee - in addition to the 'box.' This mentality was appropriate years ago, when systems were fairly simple and non-integrated. But modern systems are much more complex. They are more likely to be sold as either 'integration-ready' or integrated solutions, incorporating access control, credential management, visitor management, digital video, biometrics, smartcards and other diverse functionality (Figure 1).

Figure 1. The real innovation in a security management system must come from the application software
Figure 1. The real innovation in a security management system must come from the application software

It is the software

The basic functionality of an access control system is very simple. On a fundamental hardware level, all systems do pretty much the same thing. They have one central host computer (one or many communication servers), one or many access controllers, and many downstream devices with hundreds or even thousands of input and output alarm points. The host computer stores information for system administration, and downloads device configurations, cardholder records, etc. The controller makes access decisions, and uploads event information from the downstream readers and alarm points for monitoring of alarms and events. This basic functionality of hardware/firmware is the same for every manufacturer, and there is very little room for innovation or breakthroughs in new development. For this reason, a number of forward-thinking companies today have outsourced the manufacture of their controllers. What differentiates these controllers? The application software each uses.

The application software is the glue that holds a complex system together and makes it work. This has been true in all other realms of computing and electronics. Once a hardware technology is in place, it is the application of that technology, through software, that realises the potential and delivers the benefits.

Well-written application software is designed using modern object-oriented technology. This means that many lines of repetitive code are replaced with a reusable software object which becomes the building block of the application. Programs are smaller in size due to re-usability of objects. Well written application also use off the shelf libraries of standard objects and the latest technologies and tools available.

Open architecture and seamless integration

Open architecture is one of the most important requirements in designing a system that works for the customer.

Just what is open architecture? Open architecture implies that every major software and hardware component of the system, every communication protocol, and every interface is designed according to industry standards that allow easy integration with other systems and components (see Figure 2).

Figure 2. Open architecture enables easy integration with other systems and components.
Figure 2. Open architecture enables easy integration with other systems and components.

A well-designed security management system is based on an open design that relies on current de facto industry standards in software design, operating systems, networking, and databases for seamless integration with the corporate infrastructure. In terms of software, the system must support multiple database standards, such as SQL Server, Oracle and DB2. It must support multiple protocols, such as TCP/IP for network communication, XML for data exchange between different applications, SSL for secure communication, and LDAP for interfacing to directories and directory services.

The system should also provide a standard way of integrating with the outside world with other systems and devices. For example, the system must provide standard application programming interfaces (APIs) for ease of integration with different devices such as access control panels, digital video recorders, IP cameras, fire panels, intrusion controllers, intercoms, etc.

Customers have enjoyed the benefits of open systems in the computing environment for years. They want their security management systems to also be designed around accepted technology standards, so that they will not become legacy systems.

For more information contact Phil Mailes, Lenel Systems International, 0944 148 381 5230.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Future trends for electronic safety and security in mining
Fang Fences & Guards Mining (Industry) Integrated Solutions AI & Data Analytics
The mining industry is ever evolving, driven by technological advancements and the growing need for enhanced safety and security measures, with significant innovation seen in turnkey electronic security for mining operations.

Read more...
Unlocking enhanced security for mining
Mining (Industry) Integrated Solutions
In the dynamic landscape of African mining, security remains of paramount concern as threats evolve and challenges persist, and mining companies seek innovative solutions to safeguard their operations, assets, and personnel.

Read more...
A constant armed struggle
Technews Publishing XtraVision Editor's Choice Integrated Solutions Mining (Industry) IoT & Automation
SMART Security Solutions asked a few people involved in servicing mines to join us for a virtual round table and give us their insights into mine security today. A podcast of the discussion will be released shortly-stay tuned.

Read more...
Access and identity in 2024
Technews Publishing Gallagher HID Global IDEMIA Ideco Biometrics Enkulu Technologies neaMetrics Editor's Choice Access Control & Identity Management Integrated Solutions
SMART Security Solutions hosted a round table discussion with various players in the access and identity market, to find out what they experienced in the last year, as well as their expectations for 2024.

Read more...
Advanced security solution for high-risk areas
Secutel Technologies Surveillance Integrated Solutions
The need for a sophisticated intrusion detection system is paramount when faced with persistent security challenges, particularly in isolated battery rooms or high-risk areas prone to vandalism, cable theft, and battery theft.

Read more...
Vumacam and NAVIC enhance SafeCity initiative
Integrated Solutions Security Services & Risk Management
Vumacam and NAVIC, two of South Africa's most respected surveillance technology and vehicle intelligence providers, are proud to announce an alliance that will greatly expand the coverage and impact of the SafeCity initiative across the country.

Read more...
Gallagher Security’s achieves SOC2 Type 2 recertification
Gallagher News & Events Integrated Solutions Infrastructure
Gallagher has achieved System and Organization Controls (SOC2 Type 2) recertification after a fresh audit of the cloud-hosted services of its integrated security solution, Command Centre. The recertification was achieved on 21 December 2023.

Read more...
Integrated transportation security
Guardian Eye AI & Data Analytics Integrated Solutions Logistics (Industry)
HG Travel installs an AI-powered camera system integrated across 115 vehicles throughout a fleet comprising 160 vehicles of different sizes, along with predictive and self-monitoring tools to track tyre condition, fuel consumption and theft, and overall vehicle maintenance.

Read more...
Embracing next-generation surveillance for safer cities
Surveillance Integrated Solutions AI & Data Analytics
With the South African government highlighting the importance of building smart cities by integrating advanced technologies to make them more resilient and liveable, the role of next-generation network video and surveillance technologies cannot be ignored.

Read more...
Gallagher Security releases Command Centre v9
Gallagher News & Events Access Control & Identity Management Integrated Solutions
Richer features, greater integrations, with the release of Gallagher Security’s Command Centre v9 security site management software designed to integrate seamlessly with various systems and hardware.

Read more...