laitimes

Design scheme of comprehensive perimeter prevention system such as infrared radiation, electronic fence, vibration optical fiber, etc

author:Intelligent weak current engineering

Hello everyone, I'm Brother Xue. The perimeter prevention system includes infrared radiation system, electronic fence system, vibration optical fiber system, warning monitoring system, etc., the perimeter system contains so many systems, how to design it? Share a set of such a plan, you can refer to it.

1.1 System Overview

Perimeter prevention is mainly in the perimeter of the park, such as fences, fences, forests, boundaries, rivers and other scenes, through a variety of technical means once the abnormal situation in the arming area is found, the system can send out an alarm and provide useful information in the fastest and best way, so as to more effectively assist the security personnel to deal with the crisis, minimize false alarms and false negatives, and effectively improve the security prevention capabilities of the deployment area, which is the first line of defense of the park security system.

1.2 System design

1.2.1 System architecture

The perimeter prevention subsystem consists of a front-end alarm, a transmission network, and a management center. The front-end alarm part comprises a perimeter intrusion detector and a zone defense pulse host and an alarm host. The transmission network from the alarm host to the management center can be a public switched telephone network (PSTN), a wireless channel (CDMA/GSM), an Internet network, etc. The management center consists of a management computer and corresponding software.

The overall architecture is shown in the following figure:

Design scheme of comprehensive perimeter prevention system such as infrared radiation, electronic fence, vibration optical fiber, etc

Figure 1: Perimeter prevention system architecture diagram

1.2.2 Business processes

The business process of perimeter prevention is divided into: when an active target enters the arming area, the detection device begins to detect the active target, generates a perimeter prevention alarm event, and reports the event to the rear center platform; After receiving the event, the alarm system of the integrated security management platform can view the event and configure different linkage modes through the linkage module of the platform. Among them, the video perimeter prevention will send the alarm event to the intelligent analysis device for analysis, determine whether there is a person, and then report it to the platform.

Design scheme of comprehensive perimeter prevention system such as infrared radiation, electronic fence, vibration optical fiber, etc

Figure 2: Perimeter prevention business process diagram

1.2.3 Front-end detector design

Perimeter prevention products are mainly deployed in the outdoor perimeter, the outermost protective ring given by the entire alarm system, when there are personnel intruding from the outside, the perimeter prevention detector will upload the alarm signal to the monitoring center through the alarm host, which is convenient for the center management personnel to quickly deal with the alarm. At present, the main types of perimeter products are infrared through-beam, pulsed electronic fence, vibrating optical fiber, visible video perimeter camera, thermal imaging camera, intrusion security radar, laser scanning detector, etc.

Ø Infrared radiation

Infrared radiation is one of the most mature and widely used perimeter detection technologies. A pair of cross-beam consists of an infrared transmitter and an infrared receiver, and an alarm signal is generated when the infrared beam between the transmitter and receiver is completely or partially blocked. In order to reduce false alarms caused by external interference such as fallen leaves and small birds, dual-beam, three-beam, and four-beam cross-beam detectors are generally used to reduce false alarms.

The product has low price, low construction cost and high cost performance, and is suitable for use scenarios with clear demarcation lines and straight perimeters, but due to the bottleneck of infrared technology itself, it is easy to be disturbed by the environment (fog, snow, rainy weather, strong light, tree branches and leaves), and causes false alarms, which need to be reviewed and judged by the video system.

Ø Laser cross-beaming

Same as infrared radiation, a pair of laser radiation is composed of a laser transmitter and a laser receiver, because the laser itself is very penetrating, it is difficult to be disturbed by haze, rain and snow weather, so the environmental adaptability of this perimeter technology is very strong, and the false alarm rate is low.

o Pulse electronic fence

The pulse electronic fence is the perfect combination of the traditional ordinary fence and the alarm system, on the basis of the blocking effect of the ordinary fence, the alarm function is increased, and the pulse high-voltage signal sent by the pulse host has the effect of deterring intruders. The pulse electronic fence has the characteristics of physical barrier, active counterattack, delayed intrusion, accurate alarm, safety protection, etc., but its disadvantage is that the appearance is not hidden, and the aesthetics depends on the construction control.

The following diagram shows the networking architecture:

Design scheme of comprehensive perimeter prevention system such as infrared radiation, electronic fence, vibration optical fiber, etc

Figure 3: Schematic diagram of pulsed electronic fence networking

o Vibrating optical fiber

Vibrating optical fiber is a new type of intelligent perimeter alarm prevention product. The main principle is to achieve the purpose of alarm by the phase change of the optical signal caused by the interference of the optical fiber form caused by vibration and pressure, which provides an early warning for the perimeter intrusion and is designed to effectively detect the intrusion attempt of the perimeter fence protective net being cut and the fence being climbed, which is an efficient method for detecting the perimeter intrusion.

Since it detects the change in the propagation trajectory of the laser beam in the optical fiber, it is not affected by any radiation or electromagnetic interference, and is ideal for installation in high-risk applications such as flammable and explosive.

The vibrating optical fiber has multiple installation methods such as buried, wall-mounted, and hanging network in the perimeter, which can adapt to a variety of perimeter environments and can be well combined with the environment, with concealment effect, and its networking architecture diagram is shown in the figure.

Design scheme of comprehensive perimeter prevention system such as infrared radiation, electronic fence, vibration optical fiber, etc

Figure 4: Schematic diagram of vibrating optical fiber networking

o Visible light video perimeter camera

The video perimeter camera is a perimeter prevention detection through the front-end camera, or the back-end intelligent device analyzes the video collected by the front-end to realize the alarm function of perimeter prevention. Video perimeter prevention has the advantages of low cost and convenient deployment, but it also has many false alarms, such as due to the influence of factors such as shaking leaves, light exposure, animal crossing, vehicles, etc., resulting in too many false alarms and it is difficult for security personnel to deal with them.

By connecting the perimeter prevention front-end equipment to the "Superbrain" NVR, the "SuperBrain" NVR realizes the secondary identification of human targets on the alarm pictures pushed by the front-end, effectively filters most of the alarms triggered by non-human beings, improves the accuracy of perimeter prevention alarms, and solves the problems of inaccurate alarms, high false alarm rates, and general prevention effects in actual use.

Design scheme of comprehensive perimeter prevention system such as infrared radiation, electronic fence, vibration optical fiber, etc

Figure 5: Schematic diagram of visualized video networking

o Thermal imaging camera

The thermal imaging camera detects the thermal radiation of the target object to form thermal imaging, and combines intelligent analysis to realize the alarm function of perimeter prevention. The detection distance of the thermal imaging camera is long, and the effective detection distance of the 25mm lens focal length is 182 meters; At the same time, it is not affected in harsh environments such as strong light and backlight, and can effectively filter interference behaviors such as vibration, vehicles, and tree touches. In addition, the system should be able to effectively detect hidden objects and prevent intrusions by detecting hidden dangerous objects in the surrounding areas such as grass and woods that are not deep in depth but cannot be penetrated by visible light, and can detect hidden dangerous objects.

However, thermal imaging cameras are more expensive and are mainly used for projects with sufficient budgets and a high focus on the accuracy of perimeter alarms.

Ø Laser scanning detector

Laser scanning detector is an innovative product that can detect the size, speed and distance of a moving object, and use a unique algorithm to process the information to obtain a high-reliability detection result with a minimum false alarm rate. With intelligent detection and analysis function and unique parameter detection algorithm, it expands the application range and improves the efficiency of video surveillance.

Design scheme of comprehensive perimeter prevention system such as infrared radiation, electronic fence, vibration optical fiber, etc

Figure 6: Schematic diagram of laser scanning detection

The comparison of the functional characteristics of various perimeter protection products is shown in the following table, and when selecting the single in the actual project, it should be considered in combination with factors such as terrain, customer needs, protection level, and budget.

type Terrain influence False positive rate Blocking effect Climate impacts

cost

(relative)

Pulse electronic fence Fence class perimeter low Yes low moderate
Vibrating optical fibers All-terrain adaptation Extremely low not low high
Infrared radiation The boundaries are clear and the perimeter is straight high not high low
Laser radiation The boundaries are clear and the perimeter is straight low not low Higher
Visible video Fences, open spaces low not high low
Thermal imaging Shaded by woods Extremely low not middle high
Laser scanning detection The boundaries are clear and the perimeter is straight Extremely low not low high

1.2.4 Transmission network design

In principle, the signal transmission of the alarm input module adopts the bus type structure, and each terminal detector is connected to the system through the alarm input module attached to the bus, and the above-mentioned structure is easy to expand, and the wiring is simple.

The host signal bus adopts RVVP2*1.5 sheathed line; Due to the low transmission rate of the detector alarm signal and the small power supply current, the alarm input module to the detector signal line adopts RVVP4*0.75 type sheathed line, and the alarm signal and 12V detector power supply are transmitted at the same time, and the alarm input module to the alarm button signal line adopts RVVP2*1.0 type sheathed line.

Networks for visible and thermal video perimeter protection cameras can be found in the Transport Network Design section of the video standard scheme.

1.3 Deployment Scheme

1.3.1 Bus alarm host

Schematic diagram of the topology

Design scheme of comprehensive perimeter prevention system such as infrared radiation, electronic fence, vibration optical fiber, etc

Figure 7: Schematic diagram of the topology of the bus alarm host

Construction wiring specifications

1. The bus must be made of high-quality unshielded non-twisted pair sheathed wire (RVVP) and be separated from other lines

2. The thickness of the bus determines the transmission distance and quality of the signal, and the general trunk line adopts RVVP 2×1.5mm cable

3. The bus weak current bridge needs to keep a distance from other lines according to the weak current standard

4. The host supports two buses, and the maximum distance of each bus is controlled within 2.4km

5. If the bus repeater DS-19M01-BR is added over 2.4km, when the extended bus is extended to 4800 meters through the bus repeater, no more than 80 modules can be loaded on the bus with a length of more than 2400 meters (no more than 50 if it is all single-defense zone triggers).

6. All kinds of detectors to the defense area expansion module or motherboard defense area interface, the transmission distance can be within 100 meters can use 4x1.0mm cable, within 50 meters can use 4x0.5mm cable.

1.3.2 Pulse electronic fence

The physical perimeter of the simple fence type, which is side-mounted and the members are fixed to the fence in a welded manner, as follows:

Design scheme of comprehensive perimeter prevention system such as infrared radiation, electronic fence, vibration optical fiber, etc

The physical perimeter of the wavy solid wall type, considering the curvature of the wall, sets up members at the lowest and highest positions of each semicircle to form a blind zone protection

Design scheme of comprehensive perimeter prevention system such as infrared radiation, electronic fence, vibration optical fiber, etc

The physical perimeter of the fence + iron barbed rolling net form, the perimeter of the form, fully considering the problem of line isolation, adopts two ways of side installation and vertical installation as follows:

Design scheme of comprehensive perimeter prevention system such as infrared radiation, electronic fence, vibration optical fiber, etc

1.3.3 Vibrating optical fiber

It is generally recommended that the length of a defense zone be 100 meters. In the case of high alarm accuracy requirements, the length of the defense zone can also be set to 75 meters or 50 meters; Vibrating fibers support three installation methods: hanging net, buckle net, and buried.

Design scheme of comprehensive perimeter prevention system such as infrared radiation, electronic fence, vibration optical fiber, etc

Figure 8: Hanging net installation

Design scheme of comprehensive perimeter prevention system such as infrared radiation, electronic fence, vibration optical fiber, etc

Figure 9.Buckle net installation

Design scheme of comprehensive perimeter prevention system such as infrared radiation, electronic fence, vibration optical fiber, etc

Figure 10.Buried installation

Number of sound and light alarms: The number of sound and light alarm devices can be configured according to the actual number of defense zones, and a sound and light alarm can be configured for each defense area.

Zone Processor: According to the actual needs of the project, you can choose 2 zone processors, 4 zone processors and 16 zone processors. Usually the 2-zone processor is deployed on the front end, and the 4/16 zone processor is deployed in the center.

1.4 System Functions

1.4.1 Alarm management

The platform provides a convenient and fast alarm management interface, which can not only display the current alarm information, user operation records, but also display the past alarm entries in the recent period, and clearly identify the alarm acceptance status into unprocessed and processed, and the personnel on duty manage according to the different identifications to improve the efficiency of the police. On the BS interface, it can also be convenient to query, count, edit, modify and other operations of alarm information.

1.4.2 Perimeter to false positives

Due to the problem of many false alarms, the perimeter prevention front-end equipment can be connected to the "Superbrain" NVR, and the "Superbrain" NVR can realize the secondary identification of human targets on the alarm pictures pushed by the front-end, effectively filter most of the alarms triggered by the human body, improve the accuracy of the perimeter prevention alarm, solve the problems of inaccurate alarms, high false alarm rate, and general prevention effect in actual use, and realize the perimeter prevention and false alarm removal function.

1.4.3 Remote control

When the alarm host is connected to the platform, the platform can remotely control it, and carry out centralized return control operations on the status of the subsystem and defense area of the alarm host, including the arming and disarming of the subsystem, the bypass, bypass recovery, and alarm elimination of the alarm defense area. The powerful remote control function can easily set the working status of the alarm system according to the actual needs of the user.

For the emergency alarm column, the platform can realize the remote unpacking function. After the alarm occurs at the front end and the emergency alarm button is activated, the center management personnel confirm the situation with the front-end personnel through audio and video, and can remotely control it if necessary, open the storage box on the alarm column, and provide the protective tools or medical supplies stored inside to the help-seeking personnel.

1.4.4 Alarm linkage

Ø Linkage video review

After the platform receives the user's alarm information, the alarm is displayed at the same time, and the on-site image of the area where the alarm occurs can be automatically popped up through the platform configuration for video review, and the sound can be turned on to monitor the on-site environment during the review, and the intercom can be turned on to talk to the on-site personnel, so that the personnel on duty can view it more comprehensively and in detail, verify the alarm, and help the center management personnel correctly and quickly judge whether the police need to be dispatched and how to deal with the police.

Ø Linkage video for target tracking

The user can set the linkage video according to the alarm in advance, set the linkage of the 4 monitoring points around the defense area, and when the alarm occurs, the linkage to view the associated 4 monitoring points, effectively monitor the alarm target through video surveillance, view the travel route of the target after the alarm, partially realize the real-time tracking of the target, and quickly mobilize security personnel to intercept.

Ø Sound alarm linkage

The system supports local voice output, that is, when an alarm occurs, the monitoring center can be triggered to output a variety of different alarm sounds or alarm bells, and the sound file can be set or recorded by itself.

Ø Video and capture linkage

The platform supports the video linkage and capture linkage function of the alarm, that is, after the alarm is triggered at the front end, the system will link the monitoring point to record and capture the police scene, and the scene can be restored by viewing the video files and pictures afterwards.

Ø Video wall linkage

The platform supports the linkage wall function, that is, after the alarm is triggered at the front end, the associated monitoring point video can be projected to the TV wall for preview, and the front-end on-site situation can be displayed more intuitively.

Ø SMS and email linkage

After the alarm is triggered by the front-end, the relevant personnel who can quickly send the alarm information by SMS or email are configured through the linkage of the platform to ensure that all parties understand the alarm situation in time and respond quickly.

Ø Access control linkage

Through the platform resource sharing mechanism and linkage setting, when the alarm occurs, the access control can be linked to open the door, which is convenient for personnel to evacuate and escape in an emergency.

Ø Plan linkage

You can configure the handling steps when an alarm occurs through the plan configuration. When the platform receives the alarm signal, the management personnel of the monitoring center can operate and deal with it according to the plan associated with the alarm.

1.4.5 Electronic maps

The electronic map of the platform is mainly used to configure and control the resources of each subsystem and display the geographical location of these resources. The alarm defense area and emergency alarm equipment can be added to the electronic map, and when the alarm occurs, the alarm point will be automatically located on the map, and the alarm status will be displayed in the form of an icon flashing. At the same time, the platform supports the display of the real-time status of the defense area in the store map, the historical alarm events associated with the defense area, and the counter-control operations such as bypass and bypass recovery of the defense area.

1.4.6 Mobile APP Applications

The platform provides a mobile client APP application that has been matching, mainly including login module, video, access control, message center, visitor, intrusion alarm and vehicle query and other functions, which provides great convenience for users to use the iSecure Center platform. Among them, the intrusion alarm module of the mobile client can realize alarm push, remote arming and disarming, alarm elimination and alarm processing. At the same time, with the electronic map configuration and event center linkage configuration on the BS side, the electronic map application, alarm video review, image capture and video linkage viewing can be realized in the APP.

1.5 System advantages

1.5.1 All-round protection design

The system realizes all-round security protection through the design of multi-layer alarm protection system, the organic combination of alarm and video, and the reasonable layout of the defense area of the intrusion alarm system.

The organic combination of video and alarm realizes the detection of intrusion behavior and emergency and timely reporting of alarms, while video surveillance reflects the on-site situation and records the alarm process to the center management personnel in an intuitive way, which can quickly locate accurately, reduce false alarms, and improve management efficiency.

1.5.2 Comprehensive system linkage

Based on the integrated security management platform, the system integrates the business of multiple security subsystems defined by the traditional definition, realizes a rich functional linkage mechanism, avoids security omissions through the complementary functions of video surveillance and alarm, improves the business automation degree of security management, prevents alarm events before they occur, and responds to the alarm in a timely manner.

The linkage characteristics of the system are summarized as follows:

Ø Comprehensive linkage trigger event design;

Ø Can be configured with a variety of linkage results to respond to the alarm;

Support SMS, email and other remote alarms;

Ø The software and hardware linkage output can be set, and the peripheral equipment can be linked when the alarm is generated.

Introduction to the latest boutique information

There are more than 5,000 documents in total, and it is recommended to get a set, which is definitely helpful!

The PPT scheme in the article was all gifted, a total of 400 PPT, 6 sets of complete drawings, 316 industry standard specifications and construction drawing sets, 60 word schemes, 20 construction organization designs, 20 bills of quantities (with reference prices), 162 drawings and materials, 120 VISIO tiles and topology diagrams, project management and construction plans, 68 practical excel sheets, bidding plans and construction organization design, etc.

Read on