You are on page 1of 62

Notes for

BUILDING AUTOMATION-I

By

Nikam Satish D.
Assistant Professor

Department of Instrumentation Engineering


Maratha Vidya Prasarak Samajs
Karmveer Adv. Baburao Ganpatrao Thakre College of
Engineering, Nasik

Contents
1 Fire Alarm System-Fundamentals
1.1

1.2
1.3

1.4

Intruduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1.1.1

What is Fire? . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1.1.2

Fire Modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1.1.3

Components of Fire . . . . . . . . . . . . . . . . . . . . . . . . .

History of Fire Alarm System (FAS) . . . . . . . . . . . . . . . . . . .

1.2.1

Principles of Operation . . . . . . . . . . . . . . . . . . . . . . .

FAS Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1.3.1

Field Components

. . . . . . . . . . . . . . . . . . . . . . . . .

1.3.2

Panel Components . . . . . . . . . . . . . . . . . . . . . . . . .

13

1.3.3

Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

15

FAS Architectures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

16

1.4.1

Types of Architectures . . . . . . . . . . . . . . . . . . . . . . .

16

1.4.2

Architecture of Fire Alarm System (FAS) . . . . . . . . . . . . .

17

2 Fire Alarm System-FAS loops


2.1

2.2

23

FAS loops . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

23

2.1.1

Classication of loops . . . . . . . . . . . . . . . . . . . . . . . .

23

2.1.2

Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

23

Power Supply design for FAS . . . . . . . . . . . . . . . . . . . . . . .

23

2.2.1

23

Cause and eect matrix . . . . . . . . . . . . . . . . . . . . . .

3 Fire Alarm System-Fire Standards

25

3.1

FAS Design procedure . . . . . . . . . . . . . . . . . . . . . . . . . . .

25

3.2

Fire Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

25

3.2.1

NFPA 72A

. . . . . . . . . . . . . . . . . . . . . . . . . . . . .

25

3.2.2

BS 5839 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

25

3.2.3

IS Standard . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

25

4 Security Systems-Fundamentals
4.1 Introduction to Security Systems . . . . .
4.1.1 Concepts to Security Systems . . .
4.2 Access Control System . . . . . . . . . . .
4.2.1 Access Control System Components
4.2.2 Access control system Design . . .
4.3 University Questions . . . . . . . . . . . .

.
.
.
.
.
.

.
.
.
.
.
.

.
.
.
.
.
.

5 Security Systems-CCTV
5.1 Introduction . . . . . . . . . . . . . . . . . . . .
5.2 Components of CCTV system . . . . . . . . . .
5.3 Cameras . . . . . . . . . . . . . . . . . . . . . .
5.3.1 Operation and types of Cameras . . . . .
5.3.2 Camera Selection Criteria . . . . . . . .
5.3.3 Camera Enclosures . . . . . . . . . . . .
5.3.4 Webcam . . . . . . . . . . . . . . . . . .
5.4 Lenses . . . . . . . . . . . . . . . . . . . . . . .
5.4.1 Type of Camera Lenses . . . . . . . . . .
5.4.2 How to Choose a Camera Lens? . . . . .
5.5 Video switchers/Quad/Mux . . . . . . . . . . .
5.5.1 Types . . . . . . . . . . . . . . . . . . .
5.5.2 Functions . . . . . . . . . . . . . . . . .
5.5.3 Limitations . . . . . . . . . . . . . . . .
5.5.4 Benets . . . . . . . . . . . . . . . . . .
5.6 DVR Based system . . . . . . . . . . . . . . . .
5.7 Network design . . . . . . . . . . . . . . . . . .
5.8 Storage design . . . . . . . . . . . . . . . . . . .
5.9 CCTV Applications . . . . . . . . . . . . . . . .
5.9.1 Building advanced cctv security systems

.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.

6 Security Systems-Perimeter Intrusion


6.1 What is Perimeter Intrusion? . . . . . . . . . . . . . . . . . .
6.2 Perimeter Intrusion Detection Systems . . . . . . . . . . . . .
6.2.1 Components of Perimeter Intrusion Detection Systems
6.2.2 Architecture of Perimeter Intrusion Detection Systems
6.3 Advanced Applications Security Design . . . . . . . . . . . . .
6.3.1 Security system design for verticals . . . . . . . . . . .
6.4 University Questions . . . . . . . . . . . . . . . . . . . . . . .

ii

.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.

.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.

.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.

.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.

.
.
.
.
.
.

27
27
27
28
28
28
28

.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.

31
31
31
34
34
38
38
39
41
41
41
45
45
45
46
46
46
47
47
47
47

.
.
.
.
.
.
.

51
51
52
52
53
57
57
57

List of Figures
1.1

Fire Triangle

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1.2

Modes of Fire . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1.3

Components of re . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1.4

Light scattering Principle. . . . . . . . . . . . . . . . . . . . . . . . . .

1.5

Projected Beam Principle. . . . . . . . . . . . . . . . . . . . . . . . . .

1.6

Ionization smoke detector. . . . . . . . . . . . . . . . . . . . . . . . . .

1.7

Heat Detector.

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

10

1.8

Fire Alarm Control Panel . . . . . . . . . . . . . . . . . . . . . . . . .

14

1.9

Architecture of FAS . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

17

5.1

A Typical CCTV Setup . . . . . . . . . . . . . . . . . . . . . . . . . .

32

5.2

Camera capture the Image . . . . . . . . . . . . . . . . . . . . . . . . .

34

5.3

Charge Coupled Device to Capture image

. . . . . . . . . . . . . . . .

35

5.4

Fixed Dome Camera . . . . . . . . . . . . . . . . . . . . . . . . . . . .

36

5.5

Bullet Camera . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

36

5.6

PTZ Dome Camera . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

37

5.7

IP Camera . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

37

5.8

Camera Enclosures . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

38

5.9

Lens . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

42

5.10 Video Streamer Device . . . . . . . . . . . . . . . . . . . . . . . . . . .

45

5.11 Video Streamer Technology . . . . . . . . . . . . . . . . . . . . . . . .

45

5.12 Digital Video Recorder . . . . . . . . . . . . . . . . . . . . . . . . . . .

46

5.13 CCTV Control Room . . . . . . . . . . . . . . . . . . . . . . . . . . . .

49

6.1

Airport perimeter full coverage security is provided by a combination


of integrated sensor technologies fused through a command and control
suite, and augmented by secure, wireless, wide area communications. .

52

6.2

Wide Area Ground Surveillance Detection Suite . . . . . . . . . . . . .

53

6.3

Smart Fencing With VMD cameras . . . . . . . . . . . . . . . . . . . .

53

6.4

Buried Fiber Optic Cable . . . . . . . . . . . . . . . . . . . . . . . . .

54

iii

6.5
6.6

Command, Control, and Communications (C3) Center Integrated with


Airport . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Technical Architecture. Sensor Suites To Countermeasure Potential Intrusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

iv

54
55

Chapter 1
Fire Alarm System-Fundamentals
1.1

Intruduction

Before the discussion of Fire Alarm System we must know the basics of FIRE.

1.1.1

What is Fire?

Q. What is Fire? Explain Fire modes.


Fire is a generic term that refers to aming, combustion, smoldering combustion or
pyrolysis.
According to NFPA72:
Flame: A body or stream of gaseous material involved in the combustion process and
emitting radiant energy at specic wavelength bands determined by the combustion
chemistry of the fuel. In most cases,some portion of the the emitted radiant energy is
visible to the human eye. Fire is a combination of three components: Oxygen, Fuel,
Heat,which is known as re triangle.

1.1.2

Fire Modes

There are four dierent modes/stages of the re as follows:


1. Incipient
2. Smoldering
3. Flame
4. Heat
Below gure shows dierent modes of re
Prof. Nikam Satish D.

NDMVPSs KBTCOE Nashik

Fire Alarm System-Fundamentals

Figure 1.1: Fire Triangle

1. Incipient
It is beginning of the re stage
In this mode products of combustion particles are produced which are less
than 0.3 microns(<0.3 microns)
No visible smoke is generated
No detectable heat is produces
This type of re may occur for milliseconds or days
It is formed by the reaction of ions
Detector usd in this mode:Ionization Detectors
2. Smoldering
In this mode visible smoke particles are produced which are greater than
0.3 microns
Little visible ame is produced or noticeable heat is produced.
Visible particles are produced.
Detectors used in this stage are photoelectric detectors.
3. Flame
In this mode rapid combustion produces radiant energy in the visible and
invisible (IR,UV) spectrums.
Prof. Nikam Satish D.

NDMVPSs KBTCOE Nashik

1.1 Intruduction

Heat begins to build up at this stage .


Detectors used in this stage are: Spark ,Flame Detectors

Figure 1.2: Modes of Fire

4. Heat
Heat is dened as thermal energy in transit
The energy transferred from a high temperature object to a lower temperature object is called heat.
In thermodynamic sense,heat is never regarded as being stored within a
body like work,it exists only as energy in transit from one body to another
or between a system and its surrounding.
The SI unit of heat is Joule.
The unit for the rate of heat transfer is Watt(W=J/sec).
Heat transfer rate or heat ow per unit re is denoted by Q=dq/dt(Watts).

1.1.3

Components of Fire

Q What are the components of re?

Prof. Nikam Satish D.

NDMVPSs KBTCOE Nashik

Fire Alarm System-Fundamentals

Fire is a generic term that refers to aming combustion, smoldering combustion or


pyrolysis.

Fire is mainly divided into 2 components


1. Thermal products
2. Chemical products
Thermal products are further divided into ame, heat and Chemical products
are divided into smoke and gas
The gure shows the dierent components of re

Figure 1.3: Components of re

Thermal Products
1. Flame
A ame is the visible (light emitting) gaseous part of a re
It is caused by a highly exothermic reaction (e g: combustion) taking place
in a thin zone.
Color and temperature of a ame are dependent on the type of fuel involved
in the combustion.
Flame color depends on several factors, the most important typically being
black body radiation and spectral band emission ,with both spectral line
emission and spectral line absorption playing smaller roles.
Flame temperature is determined by following factors:
Prof. Nikam Satish D.

NDMVPSs KBTCOE Nashik

1.1 Intruduction

(a) Adiabatic ame(no loss of heat to the atmosphere)


(b) Atmospheric pressure
(c) Percentage of oxygen content of the atmosphere.
(d) The fuel being burned.
(e) Any oxidation of fuel.etc
2. Heat
Chemical Products
1. Smoke
Smoke is colloid and comprises a collection of airborne solid and liquid
particles and gasses emitted. when a material undergoes combustion or
pyrolysis, together with the quantity of air which is present in atmosphere
or otherwise mixed into the mass
It is commonly an unwanted byproduct of re (including stores, candles, all
lamps and re places)
Smoke may also be used for :
(a) Pest control (fumigation)
(b) Combustion (smoke signals)
(c) Defensive and oensive capabilities in the military
(d) Cooking (smoked salmon).
Smoke inhalation is the primary cause of death in victims of indoor res. The
smoke kills by a combination of thermal damage poisioning and pulmonary
irritation. Smoke particles are aerosol of solid particles or liquid droplets
that are close to the ideal range of sizes for minimum scattering of visible
light.
2. Gas
Gas is one of the four classical states of matter.
If heat is added to any solid substance it melts into a liquid at its melting
point, boils into a gas at its boiling point, and heated high enough would
enter a plasma state in which the elements are so energized that they leave
their parent atoms from within the gas.
A pure gas may be made up of individual atoms (a noble gas or atomic gas
like neon)
Prof. Nikam Satish D.

NDMVPSs KBTCOE Nashik

Fire Alarm System-Fundamentals


A gas mixture would contain a variety of pure gases much like the air.
The gaseous state of matter is found between the liquid and plasma states,
the matter of which provides the upper temperature boundary of gases.

1.2
1.2.1

1.3

History of Fire Alarm System (FAS)


Principles of Operation

FAS Components

Q What are the components of FAS? State their applications.


Q State application areas of FAS.
Components of Fire Alarm Systems are basically divided into two:
Field Components
1. Initiating Devices
(a) Smoke detectors
i. Photoelectric smoke detectors
A. Light scattering (reective type)
B. Light obscuring(beam)type
ii. Ionization smoke detectors
(b) Heat detectors
(c) Duct detectors
(d) Flame detectors
2. Notication Appliances
(a) Audible: Horns, Bells, Sounders, Sirens, Chimes, Speakers
(b) Visual: strobes
(c) Physical: bed shakers
(d) Olfactory: smell
Panel Components (FACP)
1. Control Panel
2. Fire Alarm Pull Station
3. Battery Alarm
4. Replacement glass rod
5. Multi signaling device
Prof. Nikam Satish D.

NDMVPSs KBTCOE Nashik

1.3 FAS Components

1.3.1

Field Components

Components of Fire Alarm System in the eld are as below


Initiating Devices
Denition: Initiating devices are the components which acts as an input to the re
alarm control unit and are either manually or automatically actuated.
Manually actuated devices such as break glass stations, buttons and manual pull station are constructed to be radially located (near the exits), identied and operated.
Automatically actuated devices can take many forms intended to respond to any number of detectable physical changes associated with re.
Converted thermal energy: Heat detectors
Products of combustion: Smoke detector
Radiant energy: Flame detector
Combustion gases: carbon trioxide detector and release of extinguishing agents, waterow detectors.
Examples of initiating devices:
1. Smoke detectors
A smoke detector is a device that detects smoke, typically as an indicator of re.
Smoke detectors are typically housed in a disk shaped plastic enclosures about
150 mm in diameter and 25 mm thick,but the shape can vary by manufacturer
or product line.
Smoke detectors are classied as Photoelectric and Ionization.
Photoelectric smoke detectors: Photoelectric smoke detectors are further
classied into
(a) Light scattering type:- These detectors use a light emitting diode that
sends a beam of light into a dark chamber. A photodiode sits on the
other side of a partition within the chamber.Smoke particles entering
the chamber deect some of the light into the photocell. The photocell
generates a current reaches a certain level, the smoke detector alarms.
(b) Light obscuring type(beam):-In this type of detector, alarms are generated by diusing the projected light beam by a specied percentage
of obscuration. Total beam blockage generally results in a trouble signal. The receiver unit as a 4-wire detector (separate power and sensing
connections to the control panel.)
Ionization smoke detector:- These detectors contain a small amount of radioactive material encapsulated in a metal chamber. Ionizing radiation deProf. Nikam Satish D.

NDMVPSs KBTCOE Nashik

Fire Alarm System-Fundamentals

Figure 1.4: Light scattering Principle.

Figure 1.5: Projected Beam Principle.


velops a low, but steady electrical current. Smoke particles entering the
chamber disrupts the current and trigger the detectors alarms. Ion detectors react more quickly to fast aming res that give o little smoke. Spot
type detectors are ionization detectors.
2. Heat detectors
Heat detectors are the oldest types of automatic re detection device. Not considered direct life safety devices, these detectors do contribute to the detection
Prof. Nikam Satish D.

NDMVPSs KBTCOE Nashik

1.3 FAS Components

Figure 1.6: Ionization smoke detector.

of a re.
A heat detector is a re alarm device designed to respond when the connected
thermal energy of a re temperature of a heat sensitive element.
The thermal mass and conductivity of the element regulate the rate ow of heat
into the element.
Heat detectors have two main classications of operations, rate of rise and xed
temp.
Fixed temperature heat detectors:
This is the most common type of heat detector
These are operated when the heat sensitive element reaches a set operating temperatures
The most common xed temp point for electrically connected heat detectors is 136.4F.
Rate of rise heat detectors
Rate of rise heat detectors operates on a rapid rise in element temp of
12 to 15 degree F increase per min, irrespective of the starting temp.
Prof. Nikam Satish D.

NDMVPSs KBTCOE Nashik

10

Fire Alarm System-Fundamentals


This type of heat detector can opperate at a lower temp. re condition
than would be possible if the threshold were xed
Rate of rise detectors may not respond to low energy release rates of
slowly developing res.

Figure 1.7: Heat Detector.

3. Duct Detectors

This is one of the application of smoke detector.


These detectors are mounted in housing outside the duet work that has
probes that extend into the duet to sample the air inside the duct
Primarily used as a smoke control device to control the ow of air in duet
work.
4. Flame Detectors
Denition: A ame detector is a detector that uses optical sensors to detect
ames.
Types of Flame detectors are as below
(a) Ultraviolet: UV Detectors work with wavelength shorter than 300nm. These
detectors detect re and explosion within 3-4 milliseconds due to the UV
radiation emitted at the instant of their ignition.
(b) Near IR Array: Also known as visual ame detectors employ ame recognition technology to conrm re by analyzing near IR radiation via the pixel
array of charged coupled device.
Prof. Nikam Satish D.

NDMVPSs KBTCOE Nashik

1.3 FAS Components

11

(c) Infrared: IR ame detectors work within the infrared spectral band. Hot
gases emit a specic spectral pattern in the infrared region, be sensed with
a thermal imaging camera a type of thermographic camera. A typical frequency where signal frequency IR ame detector is sensitive is in the 4.4
mm range.
(d) UV/IR: UV/IR ame detectors compose the threshold in two ranges in
AND conguration and their ratio to each other to conrm the re signal
and minimize false alarms.
(e) IR/IR ame detection: Dual IR ame detectors compose the threshold signal in two infrared ranges. In this case one sensor looks at the 4.4 mm range
and the other sensor at a reference frequency.
(f) IR/IR/IR ame detection: Dual IR ame detectors compose three specic
wavelength bands within the IR spectral region and their ratio to each other
to reliably detect ames while to reduce false alarms. In this case one sensor
looks at 4.4 mm range and the other sensors at a reference frequencies.
Operational Features Initiating Devices

With and without key locks or key locks.


Weather proof models with special black-boxes.
With auxiliary contacts.
Multiple languages, even dual languages.
With a pre-signal feature.
With screw thermal or Digital connections.
Conventional and addressable.
Metal or polycarbonate
Initiating Device Circuit (IDC):
A circuit to which automatic or manual initiating devices are connected where the
signal received does not identify the individual device operated.
Prof. Nikam Satish D.

NDMVPSs KBTCOE Nashik

12

Fire Alarm System-Fundamentals

Notication Appliances
These component uses energy supplied from the re alarm system or other stored
energy source to inform the proximate persons of the need to take action usually to
evacuate.
Notication appliances are re alarm system components such as a bell, horn, speaker,
light or text display that provides audible, tactile or visible output or any combination.
The device which produce audible, visual or both alarm signals in response to a re
emergency is known as notication appliances.
Classication of notication appliances:
1. Audible
(a) Horns: Loud and distinctive output often used in high noise environments
such as manufacturing plants.
(b) Bells: Only used if they are only for re, or have a distinctive sound from
other bell signaling devices.
Often used as an external going to indicate the ow of water in the sprinkler
system.
(c) Sounders: Electronic or mechanical audible devices, which are capable of
producing a variety of tones often, the tone is selectable during installation
of the device.
(d) Chimes: Soft-tones appliances used where loud noises could be disruptive to
other operations. Generally used where qualied personnel are continuously
in attendance.
(e) Sirens: Extremely loud devices generally limited in use to outdoor or heavy
industrial areas.
(f) Speakers: Audible devices used in conjunction with voice evacuation messages. Life is not generally associated with music systems.
2. Visual
Visual signaling appliances are used in high noise environments, in areas occupied
by hearing impaired individuals or in areas where audible devices may not be
desired.
e.g. strobe.
3. Physical
Bed shakers are nothing but vibrators, which gives physical indication.
e.g. Bed shakers
Prof. Nikam Satish D.

NDMVPSs KBTCOE Nashik

1.3 FAS Components

13

4. Olfactory
The olfactory system is the sensory system used for olfaction or the sense of smell.
e.g. smell
Notication Appliance Circuit (NAC):
A circuit or path directly connected to a notication appliances. This circuit consist
components such as which produce audible, visual or both alarm signals in response
to re emergency.

1.3.2

Panel Components

Components of Fire Alarm System in the panel are as below


Control Panel
This component, the hub of the systems monitors inputs and system integrity,
outputs and relays information.
A re alarm control panel (FACP) or (FACO) is an electric panel that is the
controlling component of a re alarm system.
The panel receive information from environmental sensors designed to direct
changes associated with re, monitors there operational integrity and provides
for automatic control of equipment and transmission of information necessary to
prepare the facility for re based on a predetermined sequence
The panel may also supply electrical energy to operate any associated sensor,
control, transmitter or relay
There are four types of panels:
1. Coded panels
2. Conventional panels
3. Addressable panels
4. Multiples systems.
A FACP is required under the building code for a majority of new commercial
building construction in most countries.
Fig shows the re alarm control panel
It consists of:
Prof. Nikam Satish D.

NDMVPSs KBTCOE Nashik

14

Fire Alarm System-Fundamentals

Figure 1.8: Fire Alarm Control Panel

1. FACP
2. Primary power supply
3. Secondary backup power supplies
4. Initiating devices
5. Notication appliances.
6. Building safety interface.
FACP is responsible for:
Monitoring the status of devices connected to the signalling line circuits associated with FACP.
Analyzing information from the devices to determine alarm or trouble events.
Responding to alarm events by activating controlled devices
Maintaining a history of alarm and trouble events
Providing requested information from any device connected to the backbone communications network.
Prof. Nikam Satish D.

NDMVPSs KBTCOE Nashik

1.3 FAS Components

15

Fire Alarm Pull Station


This device is used to initiate an alarm signal.
Signal action stations require a signal operation to activate it. Generally a pulling
down action.
Dual action stations require two distinct operations. A set up and activating
action.
Break-glass stations have an inhibit device that must be damaged to activate the
station.
Battery
The dierent batteries are used in FAS.
The batteries used are carbon zink batteries.
These batteries are used for smoke detectors.
When these batteries are used for smoke detector becomes inactive.
Most smoke detectors will signal a low-battery condition
Replacement glass rod
Multi signaling device

1.3.3

Applications

Applications of Fire Alarm Systems in dierent industries are given below:


1. Chemical plants.
2. Oil reneries.
3. Fertilizer industries
4. Petrochemical industries.
5. Sugar industries.
6. Hazardous areas where a fast developing re could occur.
7. In houses.
8. Building security, etc
Prof. Nikam Satish D.

NDMVPSs KBTCOE Nashik

16

Fire Alarm System-Fundamentals

The dierent areas in dierent industries are,


Mechanical rooms.
Boiler rooms.
Electrical rooms.
Areas under stairs.
Location having dirty or dusty environment.
Elevator machine rooms.

1.4
1.4.1

FAS Architectures
Types of Architectures

Q Explain types of FAS architecture?


There are several types of re system and they are designated by letters as follows:
1. M re alarm system:
These comprise manual call points where recommended and raise the alarm
throughout the building usually found on escape routes staircases etc. There
are no automatic re detection built in and is operated by someone raising the
alarm.
2. L re alarm system:
These are concerned primarily with preserving life and enabling all occupants
other than those immediately aected by the re to make good their escape from
the building.
There are several categories within the L system identied as L1 to L5.
The sub categories denotes the type of automatic sensors, sirens and beacons to
be tted and where [location].
As these system are designed primarily to evacuate the building prevent loss of
life/ injury then system may not automatically call for the bridge and protection
of property is dealt with it.
3. P re alarm system:
These denotes an automatic re detection system install to take on the additional
taste on not only preserving life but also protect the building and contents as
well when the building is quite and unoccupied.
Prof. Nikam Satish D.

NDMVPSs KBTCOE Nashik

1.4 FAS Architectures

17

The system should automatically dial out to the bridge as a matter of course.
Again there are various sub categories form P1 to P5, where the type of protection
from the sensor used may be varied.
The object of the automatic re detection system is to raise the alarm at the
earliest possible moments to allow an escape.
4. Radio re alarms [Wireless FAS]:
Wireless FAS are similar to a standard analogue addressable re alarm system
but with the advantage of having no wire to interlink the detection and sounders.

1.4.2

Architecture of Fire Alarm System (FAS)

Q. Explain Building life safety system.


Q. Draw and explain architecture of FAS
Figure shows the architecture of FAS

Figure 1.9: Architecture of FAS

FAS is divided into two main parts Fire Detection and Fire Suppression/Fighting.
Fire detection is again divided into conventional system and addressable system.
Addressable system is further divided into analog addressable and intelligent
addressable system.
Prof. Nikam Satish D.

NDMVPSs KBTCOE Nashik

18

Fire Alarm System-Fundamentals


Addressable system is interfaced with the other building system for safety purpose.
Fire suppression/ghting system consists re extinguisher, hydrant system and
gas based system.

Fire Alarm System is mainly divided into two parts


1. Fire Detection
Fire detection system is designed to detect the unwanted presence of re by
monitoring environmental changes associated with combustion.
An uncontrolled re can obliterate entire rooms contents within a few minutes and completely burn out the building in a couple of hours.
The rst step towards minimizing re is to properly identify the incident
raise the occupant alarm and then notify emergency response professional.
This is often the function of re detection and alarm system.
Automatic sprinklers represent one of the single most signicant aspects of
re management program.
Properly designed, installed and maintained these system can overcome deciencies in the risk management, building construction and emergency response. They may also increase overall re safety.
The function of re detection is the transmission of an alarm notication
signal to the re department or other emergency response organization.
They may also shut down electrical, air handling equipment or special process operations and they may be used to initiate automatic suppression
systems.
Fire detection is divided into two types:
(a) Conventional system.
Conventional or point wired re detection and alarm system were for
many years the standard method for providing emergency signaling.
In conventional system one or more circuits are routed through the
protected space or building.
Along each circuit one or more detection devices are placed. Selection and placement of these detectors is dependent upon a variety and
factors including the need for automatic or manual initiation, ambient
temperature and environmental conditions, the anticipated types of re
and desired speed of response.
Prof. Nikam Satish D.

NDMVPSs KBTCOE Nashik

1.4 FAS Architectures

19

Upon re occurrence one or more detectors will operate. This action


closes the circuit, which the re control panel recognizes as an emergency condition.
The panel will then activates one or more signaling circuits to sound
building alarms and give alert to emergency help.
In order to help insure that the system is functioning properly, this
system monitors the condition on each circuit by sending a small current
through the wire.
Should a fault occur, such as due to wiring brake, this current cannot
proceed and is registered as a trouble condition.
In conventional alarm system, all alarm initiating and signaling is accomplished by the system hardware which includes multiple sets of wire,
various closing and opening relays and assorted diodes. Because of this
arrangement, these system are actually monitoring and controlling circuits and not individual devices.
Advantages of conventional system
They are relatively simple for small to intermediate size buildings.
Servicing does not require a large amount of specialized training.
Disadvantages of conventional system
For large buildings, they can be expensive to install because of the extensive amount of wire that are necessary to accurately monitor initiating
devices.
Conventional system may be inherently labor intensive and expensive
to maintain.
Periodically servicing of detectors is necessary hence time is consumed in
servicing of faults occurs, the trouble indication states that the circuit
has failed but not specically state where the problem is occurring.
Subsequently, technicians must survey the entire circuit to identify the
problem.
(b) Addressable system.
Addressable systems represent the current state of the art in the re
detection and alarm technology.
These systems monitor and control the capabilities of each alarm initiating and signaling device through microprocessors and system software.
In eect, each intelligent re alarm system is a small computer overseeing the series of input and output devices.
Prof. Nikam Satish D.

NDMVPSs KBTCOE Nashik

20

Fire Alarm System-Fundamentals


The address system consists of one or more circuits that radiate throughout the space or building
One or more alarm initiating devices may be located along these circuits.
In an addressable system, each initiating device (automatic detector,
manual station, sprinkler water ow switch etc) is given a specic identication or address.
This address is correspondingly programmed into the control panels
memory with information such as the type of device, its location and
specic response details such as which alarm devices are to b activated.
The control panels microprocessor sends a constant interrogation signal
over each circuit, in which each initiating device is contacted to enquire
its status (normal or emergency) this center monitoring process occurs
in rapid succession, providing system updates every 5 to 10 seconds.
The addressable system also monitors the condition of each circuit,
identifying any faults which may occur.
One of the advancements oered by these systems is their ability to
specically identify where a fault has developed. Therefore instead of
merely showing a fault along a wire, they will indicate the location of
the problem. This permits faster diagnosis of the trouble and allows a
quicker repair and return to normal.
Advantages of Addressable system
Stability
Enhance maintenance
Ease of modication
Disadvantages of Addressable system
The main disadvantage of the system has its own unique operating
characteristics. Therefore, service technicians must be trained for the
respective system.
There are two main types of addressable systems Analog addressable systems
and Intelligent addressable systems.
i. Analog addressable systems.
ii. Intelligent addressable systems. These systems oer benets in terms
of speed of detection, identication of the location of re and easier
maintenance.
Intelligent systems also oer tolerance to faults in the systems wiring,
which allows a single pair of wires to be used to connect up to 200 devices

Prof. Nikam Satish D.

NDMVPSs KBTCOE Nashik

1.4 FAS Architectures

21

to the system allowing cost savings in the wiring of large systems.


Benets of Intelligent addressable systems
Lower wiring cost
Shortened installation schedule
Greater device supervision
Integrated network ability
Superior troubleshooting capability
Rapid and direct identication of the re thread.
2. Fire Suppression/Fighting

Prof. Nikam Satish D.

NDMVPSs KBTCOE Nashik

22

Prof. Nikam Satish D.

Fire Alarm System-Fundamentals

NDMVPSs KBTCOE Nashik

23

Chapter 2
Fire Alarm System-FAS loops
2.1

FAS loops

2.1.1

Classication of loops

2.1.2

Examples

2.2
2.2.1

Power Supply design for FAS


Cause and eect matrix

Examples

Prof. Nikam Satish D.

NDMVPSs KBTCOE Nashik

24

Fire Alarm System-FAS loops

Prof. Nikam Satish D.

NDMVPSs KBTCOE Nashik

25

Chapter 3
Fire Alarm System-Fire Standards
3.1

FAS Design procedure

3.2

Fire Standards

3.2.1

NFPA 72A

3.2.2

BS 5839

3.2.3

IS Standard

Prof. Nikam Satish D.

NDMVPSs KBTCOE Nashik

26

Prof. Nikam Satish D.

Fire Alarm System-Fire Standards

NDMVPSs KBTCOE Nashik

27

Chapter 4
Security Systems-Fundamentals
4.1

Introduction to Security Systems

In the corporate world, various aspects of security were historically addressed separately
-notably by distinct and often non communicating department for IT security, physical
security and fraud prevention. Today there is greater recognition of the interconnected
nature of the security requirement, an approach variously known as holistic security ,
all hazards management and other terms.
Inciting factors in the convergence of security disciplines include the development of
digital video surveillance technologies and the digitization and networking of physical
control system.
Greater interdisciplinary cooperation is further evidenced by the Feb 2005 creation of
the alliance for enterprise security risk management, a joint venture including leading
association in security, information security and IT audit.

4.1.1

Concepts to Security Systems

Certain concepts recur throughout dierent elds of security:


Assurance - assurance is a level of guarantee that a security system will behave
as expected
Countermeasure- a countermeasure is a way to stop a threat from triggering a
risk event
Defense in depth - never rely on one single security measure alone
Exploit- a vulnerability that has been triggered by a threat - a risk of 1.0(100%)
Risk- a risk is a possible event which could cause a loss
Prof. Nikam Satish D.

NDMVPSs KBTCOE Nashik

28

Security Systems-Fundamentals
Threat- a threat is a method of triggering a risk event that is dangerous
Vulnerability- a weakness in a target that can potentially be exploited by a security threat

4.2

Access Control System

What is Access Control System?


Enforcing a specied policy to Q Why Access Control is required?
Information and resources needed to be protected.
Humans are sometime (often ?)
1. Inquisitive
2. Dishonest
3. Corruptible
4. Careless
Systems / programs are sometime
1. Buggy
2. Untrustworthy
There are two entities that
The Resource Necessary to determine what resource(s) is/are protected.
The Accessors Necessary to determine who/what is allowed to access the resource,
and in what manner.

4.2.1

Access Control System Components

4.2.2

Access control system Design

4.3

University Questions

1. Draw and Explain the block diagram of access control systems. [10]
2. Discuss communication between card and card reader technology. [8]
3. Explain biometrics for security systems. [8]
Prof. Nikam Satish D.

NDMVPSs KBTCOE Nashik

4.3 University Questions

29

4. Describe the installation process of access control systems with suitable example.
[10]
5. Explain communication between RFID card reader and TEMA server [8]
6. discuss the access control system components selection factors.[10]
7. Draw and explain block diagram of security system [10]
8. explain working of magnetic lock with suitable diagram [8]

Prof. Nikam Satish D.

NDMVPSs KBTCOE Nashik

30

Prof. Nikam Satish D.

Security Systems-Fundamentals

NDMVPSs KBTCOE Nashik

31

Chapter 5
Security Systems-CCTV
5.1

Introduction

Why install CCTV?


Statistics show that there is a major reduction in the amount of undesired activities
where CCTV cameras are installed and this is why CCTV is seen by many as the best
system for deterrent and detection. For corporate users, CCTV system helps to protect
valuable goods and properties against theft, abuse and damage. CCTV recordings can
be used as important evidence or proof when required. When connected to the internet,
user can also perform a remote login to view their premises using a PC/Laptop or even
a mobile phone. For residential use, home owners can rely on CCTV to check and
ensure that their loved ones are safe and sound at home.

5.2

Components of CCTV system

Cameras: Security cameras are the starting point of the most CCTV systems. There
are endless possibilities when choosing CCTV cameras and lens - everything
from xed models designed for monitoring very specic locations, to day/night
cameras, and powerful PTZ domes for patrolling large areas.
Monitor: In a traditional CCTV setup, operators view footage from a central location
on a monitor, very much like a TV, but with higher lines of resolution for better
picture quality. Monitors can be dedicated(meaning they display video from a
single camera), or call-up (meaning operators can access multiple camera at the
same time).
Cable: With a analog system, coaxial cable is required for transmitting video footage
from the camera. This is one of the drawback of analog CCTV, as the cable can
Prof. Nikam Satish D.

NDMVPSs KBTCOE Nashik

32

Security Systems-CCTV
be expensive and dicult to install especially for a large camera network, and
those where cameras must be positioned in dicult locations.

DVR: Most modern CCTV system incorporate DVRs (Digital Video Recorders) which
enable operators to reap some of the benets of network-based surveillance setup.
DVRs convert the analog footage to digital, which help to extend storage capacity,
makes it much easier to search archived footage, and also allows users to stream
video a network for remote viewing from multiple locations.
Typical CCTV Setup
A typical CCTV system consists of following components: Digital Video Recorder

Figure 5.1: A Typical CCTV Setup

(DVR), Cameras, Microphone (optional), Sensors (optional) and Relay outputs (optional).
The Digital Video Recorder commonly known as DVR is the brain of the entire CCTV
system, all input/output devices such as camera, sensors etc. are connected to the
DVR. The DVR is programmed to record video and audio signals from the devices,
recording can be scheduled, activated on motion detect or even turned on 24 hrs. The
DVR also process inputs from sensors such as smoke detectors and turn on warnings
as programmed in the CCTV system software.
A major function of the CCTV system is the ability to remote access the monitored
site. This is achieved through a remote login via the Internet to the CCTV system,
no special software is required on the remote side, users can login just by using the
Internet Explorer. For remote access to work, the CCTV system must be permanently
linked to the internet by broadband connection such as ADSL or Cable Line. The
Prof. Nikam Satish D.

NDMVPSs KBTCOE Nashik

5.2 Components of CCTV system

33

CCTV system can work behind corporate router and rewall and it is not necessary
to have a static IP broadband connection.
Planning a CCTV system It is important that careful planning and consideration are done before xing up a CCTV system. The following are some tips to help
you plan your desired CCTV system.
CCTV Cameras
When choosing your CCTV cameras, consider the following factors: angle of
view, night viewing capability, indoor or outdoor use, location of camera.
The location of the camera is an important factor that aects the eectiveness
of the CCTV system. Cameras located at high position give a better overall
view but might be ineective in capturing human faces. Cameras positioned
too low are prone to vandalism. Wide-angle cameras give a good overview but
compromise on image details, narrow angle camera gives good image details and
are suitable for long corridors. For outdoor, weatherproof cameras are required,
surge protection devices might be required if the area is prone to voltage surge
or lightning. IR cameras are more eective for short distanceand enclosed area
(typically less than 20-30m), IR cameras are not very eective for viewing vast
outdoor area at night. If surveillance of outdoor area at night is important,
use good quality Day and Night camera which has low lux rating and install
additional lightings at area of importance. Finally, never position a camera to
view directly onto a light source
CCTV DVR (Digital Video Recorder)
The CCTV DVR is the brain of the system, all signal cables will be connected
to the DVR. Locate your DVR at a place where the cables can be neatly covered or concealed, ensure that at least one power socket is available at the area.
For network CCTV DVR, the unit must also be connected to your Internet
Modem/Router, a network cable is used to connect the CCTV DVR to you Modem/Router.
Some CCTV DVR (especially PC based system) require a display screen to perform conguration and maintenance work, make sure that enough space is allocated for the display screen when planning the CCTV system. The display screen
can also be located away from the CCTV DVR (for example, in another room)
if it is mainly used for monitoring purpose. In such cases, the additional cabling
for the display screen must be taken into consideration.
Prof. Nikam Satish D.

NDMVPSs KBTCOE Nashik

34

Security Systems-CCTV
It is important that adequate ventilation is provided for the CCTV DVR, insufcient cooling of the DVR will result in premature failure of the DVRs internal
components especially the Hard Disk. Never place the CCTV DVR in an enclosed
cabinet. If possible, locate the CCTV DVR in air-conditioned environment such
as a server room. Do not place object on top or in any way that will block the
DVRs ventilation holes or louvers.
For a comparison between Standalone and PC based CCTV DVR, visit our product page.

5.3

Cameras

Q How does the Camera capture the Image?

Figure 5.2: Camera capture the Image

5.3.1

Operation and types of Cameras

There are dierent types of CCTV cameras as follows


Indoor Camera: Indoor camera as the name suggests, are used for indoor security
mechanism. Depending upon your security needs, you can mount it at any suitable location inside the building. These are suitable for security in homes, schools,
oces, hotels, etc.
Outdoor Camera: Outdoor CCTV Camera is used for outdoor places. They are
mostly used for entry and exit points with limited night lighting. Outdoor cameras typically have hard shell vandal-proof casings and a variety of lens options.
IR Day/Night Camera: IR Day/Night camera are used for high-alert security areas
where surveillance needs to happen throughout day and night. In the daytime
Prof. Nikam Satish D.

NDMVPSs KBTCOE Nashik

5.3 Cameras

35

Figure 5.3: Charge Coupled Device to Capture image

the camera functions like a normal camera with standard colors and at night it
switches to low-lux black and white mode. When visibility decreases due to nolight at night, Infrared LEDs are automatically illuminated providing full security.
These cameras are used by military personals, in parking lots, and high security
zones.
Dome Camera: Dome cameras are installed inside a dark dome and are designed in
a way that they go unnoticed by visitors. They come in compact design for a
discrete appearance. The thief does not know if the camera is recording. These
cameras can also be rotated and tilted manually. Dome type cameras are used
in public places like railway station, bus terminals and other areas where there
is a huge gathering of people.
Bullet Camera: Bullet cameras are placed inside a bullet shaped housing, and they
are used in residential places as well as commercial places. They are small in size,
have an integrated design, and are really eective. They oer illuminate viewing
even in darkness and are weatherproof as well.
Vandal Proof Camera: Vandal proof cameras are used as outdoor security cameras.
These cameras are sheltered within solid material and are covered by a hub of
Prof. Nikam Satish D.

NDMVPSs KBTCOE Nashik

36

Security Systems-CCTV

Figure 5.4: Fixed Dome Camera

Figure 5.5: Bullet Camera

break-proof glass which doesnt hinder the quality of the video-camera streams.
It is dicult to break these cameras which makes them perfect for high security.
They are suitable for wall or ceiling mounting and are rain and fog resistant.
Hidden Camera: Hidden cameras are compact in size and are used for secret monitoring. They are usually installed in public places like department stores, theatres, clubs, etc. Hidden cameras have a built-in recorder that records and broadcasts simultaneously. By using a large number of security cameras and networking
them various strategic views of the place are obtained.
Prof. Nikam Satish D.

NDMVPSs KBTCOE Nashik

5.3 Cameras

37

Pan Tilt Zoom (PTZ) Camera: Pan-tilt-zoom camera oers the ability to view
and zoom in all directions. You can even set the camera to automatically rotate
to dierent elds of vision. To gather more information on CCTV cameras,
cables, monitors and connectors.

Figure 5.6: PTZ Dome Camera

Figure 5.7: IP Camera

Prof. Nikam Satish D.

NDMVPSs KBTCOE Nashik

38

Security Systems-CCTV

5.3.2

Camera Selection Criteria

The selection criteria should take into account the following: The camera equipment
should satisfy the operational requirement under all specied environmental conditions.
Safety regulations relating to the site. Points to be take into consideration:
1. White balance of color cameras.
2. Electronic iris in relation to picture degrading for highlights.
3. Long exposure times in relation to movement blur.
4. Spectral sensitivity in relation to the type of illumination.
5. External synchronization.
6. Back-up power supply.

5.3.3

Camera Enclosures

Below are the dierent types of camera enclosures

Figure 5.8: Camera Enclosures

Prof. Nikam Satish D.

NDMVPSs KBTCOE Nashik

5.3 Cameras

39

1. Cooled camera enclosures BEH cooled series


This cooled camera housing blow the below sunshield area to eliminate the heat
generated from the sun rays before the heat enters the camera housing.
2. Stainless steel camera enclosure OHS-500 series
This stainless steel camera enclosure is very popular due to very high quality and
high nish. The stainless steel housing is covered with a clear coating to make it
extreme all weather resistant and suitable for used by sea water. Options: integral
wiper, washer, heater, tamper screws, pan tilt and stainless steel brackets.
3. Large pressurized nitrogen camera housings ph-870
This is very large IP68 pressurized camera enclosure is suitable for long range cctv
camera station and the very large window ts high sensitive cctv zoom lenses.
the housing can be delivered with heater,fan,wiper and washer. optional pan and
tilt
4. Pressurized nitrogen cctv camera enclosures PH-860
This stainless steel nitrogen pressurized camera housing con be delivered with
sunshield, fan, heater, wiper and washer.

5.3.4

Webcam

A webcam is a video capture device that is connected to a computer or computer


network, often using a USB port or, if connected to a network , ethernet or wi, or
build in for certain type of laptops.their most popular use are video links, permitting
computer to act as videophones or video-conferencing section. Webcams can also be
used with various computer video telecommunication program such as windows live
messenger, skype and yahoo! Messenger. other popular usees, which includes. the
security surveillance and the recording o video les or even still-images, are accessible
via numerous other software program, application and devices.
webcam are known for their low manufacturing cost and exibility, making them the
low cost form of videotelephony. they have also become the source of security and
privacy issues, as some built in webcams can be remotely activated via spyware.
Video calling and conferencing
As webcam capabilities have been added to instant messaging, text chat services such
as AOL instant Messenger, one-to-one live video communication over the internet has
now reached millions of mainstream PC users worldwide. Improved video quality has
helped webcam encroach on traditional video conferencing system. new features such
as automatic lighting controls, real-time enhancements (retouching, wrinkle smoothing
and vertical stretch), automatic face tracking and autofocus assist users by providing
Prof. Nikam Satish D.

NDMVPSs KBTCOE Nashik

40

Security Systems-CCTV

substantial ease-of-use, further increasing the popularity of webcams.


webcam features and performance can very by program, computer operating system,
and also by the computers process capabilities. for example, high-quality video is
principally available to users of certain logitech webcam if their computer have dualcore processors meeting certain specications. Video calling support has also been
added added to several popular instant messaging programs.
Some online video broadcasting sites have taken advantage of this technology to create
internet television programs cantered around two(or more) people diavlogging with
each other form dierent locations. among others, blogging heads.tv uses this technology to enable conversation between prominent journalists, scientists, bloggers, and
philosophers.
Video security
Webcam are also used as security cameras. software is available to allow pc-connected
cameras to watch for movement and sound, recording both when they are detected;
these recording can then be saved to the computer, e-mailed or uploaded to the internet.
in one well-publicised case, a computer e-mailed out image as the burglar stole it,
allowing the owner to given police a clear picture of the burglars face even after the
computer had been stolen.
Input control device
Special software can use the video-stream for a webcam to assist or enhance a users
control of applications and games. video features , including faces , shapes, models and
colors can be observed and tracked to produce corresponding from control .for example,
the position of a single light source can be tracked and used emulate a mouse pointer , a
head mounted light would allow hands-free computing and and would greatly improve
computer accessibility. this can also be applied to games, providing additional control,
improved interactivity and immersiveness.
The eyetoy for the play station 2 (the updated playstation 3 equivalent is the playstation eye) and similarly the Xbox live vision camera and kinect AKA project natal
for the Xbox 360 and Xbox live are color digital camera the have been used as control
input device by some games.
small webcam-based pc games are available as either standalone executables or inside
web browser window using Adobe Flash.
Technology
Webcams typically include a lens (shown at top ), an image sensor (Shown bottom ),
and supporting circuitry.
webcams typically include a lens, an image sensor , and some supports electronics.
Various lenses are available, the most common in consumer-grade webcam being a
plastic lens that can be screwed in and out to set the cameras focus. xed focus
Prof. Nikam Satish D.

NDMVPSs KBTCOE Nashik

5.4 Lenses

41

lenses, which have no provision for adjustment, are also available. as a camera systems
depth of eld is greater for small imager formats and is greater for lenses with a large
f-number(small aperture), the system used in webcam have suciently large depth of
eld that the used of a xed focus lens does not impact image sharpness much. Image
sensor can be CMOS or CCD, the former being dominant for low-cost cameras, but
CCD camera do not necessarily outperform CMOS-based camera in the low cost price
range. Most consumer webcams are capable of providing VGA-resolution video at a
frame rate of 30 frames per second. many newer devices can produce video in miltimegapixel resolution, and a few can run at higher frame rates such as the playstation
eye, which can produce 320x240 video at 120 frames per second.
support electronics are present to read the image from the sensor and transmit it to the
host computer. the camera pictured to the right, for example, uses a sonix SN9C101
to transmit its image over USB. some cameras, such as mobile phone camera, use
a CMOS sensor with supporting electronics on die,i.e. the sensor and the support
electronic are built on a single silicon chip to save space and manufacturing costs. most
webcams feature built-in microphones to make video calling and videoconferencing
more convenient.
the USB video device class(UVC) specication allow for interconnectivity of webcams
to computers even without proprietary drivers installed. Microsoft Windows XP SP2,
Linux and Mac OS X (since October 2005) have UVC driver built in and do not require
extra drivers, although they are often installed in order to add additional features.

5.4

Lenses

5.4.1

Type of Camera Lenses

5.4.2

How to Choose a Camera Lens?

1. Sharpness is mostly about contrast. Old timers might say, that sure is a nice
contrasty lens. They mean its sharp.
How do you test this? Put a piece of newspaper on the wall and illuminate it
with two high power lights, one on each side. Mount your camera on a tripod
and make an exposure of the newspaper based on the distance scale on the lens
or using the lens or auto-focus.
Use as fast a shutter speed as you can for the light conditions and open the lens
all the way to its widest aperture (The smaller number). Then make on exposure
at each aperture and look at the results.
You want to see how sharp the text in the newspaper appears at a 100 percent
Prof. Nikam Satish D.

NDMVPSs KBTCOE Nashik

42

Security Systems-CCTV

Figure 5.9: Lens

enlargement. Pay particular attention to the sharpness at the center of the frame
versus the edge of the frame. Even bad lenses are typically somewhat sharp at
the center but perform poorly at the edges. They will be dierent.
While a less than scientic, it will help you to evaluate sharpness in a meaningful
way.
2. Lens speed is relevant only insofar as you need good low light performance. But
it can also be an indicator of a high quality lens. Most manufacturers put their
best glass into their fastest lens. If you have the money and want the best, buy
fast lenses.
Also, note that zoom lenses with constant apertures (say a Sigma 300-800 zoom
which is set at F/5.6 regardless of focal length) tend to outperform variable
aperture zooms where the lens speed changes with the focal length.
3. Minimum focus distance is important but because only you know how close
you will be to your subjects, only you know how much or how little minimum
focus distance you need. Higher quality lenses tend to have a closer minimum
focus distances, but not always.
To test a lens minimum focus distance, use a tape measure between the focal
plane and the subject. Usually the manufacturers estimates are close but not
always.
4. Lens element quality is critical to lens performance. I try to use only lenses
with low dispersion glass. These typically eliminate chromatic aberrations that
can denigrate image contrast and sharpness.
Generally, I also look for lenses with Apochromatic and Aspherical elements
Prof. Nikam Satish D.

NDMVPSs KBTCOE Nashik

5.4 Lenses

43

which reduce distortion, and add contrast and sharpness. The more of these
types of elements in your lens, the better. Of course you will have to trust the
manufacturer on this point since you cant take the lens apart to see for yourself.
5. Digital lenses dont work on the lm cameras and dont even work on all digital
cameras. Make sure the lens you are buying will work on your cameras. Some
lenses will only work with digital cameras featuring an APS sized sensor. On lm
cameras, these lenses are eectively worthless. Likewise, they dont work on full
frame digital single lens reex cameras. So if you shoot both digital and lm,
stay away from special digital lenses.
6. Lens are is more than little star-shaped rectangles appearing in backlit pictures. Lens are is often unseen or unnoticed in the viewnder. Its impact is to
reduce contrast. Even when you dont see a starburst, you may be the victim of
lens are if you use inexpensive lenses.
Pro lenses have coatings to reduce lens are and may even include special lens
hoods also designed to reduce are.
Test your lens by shooting backlit subjects and then look for washed out contrast
in the picture.
7. Chromatic aberration is color fringing or halos around high contrast objects.
It makes pictures look soft and is more prevalent in lenses without LD glass. Its
also easier to spot at wide apertures than small apertures.
To test your lens for CA, shoot images wide open in high sunlight focusing on
high contrast edges. The CA will show on the edges if you magnify the print.
All lenses have some CA. What amount is acceptable is up to you. Note that
you can correct CA in Photoshop but with most pro lenses, the correction is so
minimal as to be unnoticeable.
8. Bokeh is the rendition of out of focus points of light. Shoot any shot with a forest
or greenery atleast 15 feet from the camera, wide open. Look at the background.
If you see well dened edges in the out of focus circles of light, you have a bad
Bokeh. This is mostly subjective and like everything else, the faster and better
the lens, the better the bokeh.
9. Light fall o can be simply measured by shooting any photo wide open that
contains the sky. The illumination should be the same from corner to corner in
a lens that has good light fall o characteristics.
Lens weight is the easiest criteria to measure. Weigh the lens and decide if it is
lighter than other lenses in its category. You usually want the highest lens you
can nd, assuming it meets your other criteria.
Prof. Nikam Satish D.

NDMVPSs KBTCOE Nashik

44

Security Systems-CCTV

10. Lens construction and build standards will help you decide whether or not
the lens seems likely to last under day-to-day use. Cheap plastic lenses are more
likely to fail than magnesium lenses. Lenses with solid metal lens mounts will
not warp as will plastic lens mounts. Sealed lenses will not be as likely to suer
damage from dust and moisture as unsealed lenses.
If a lens feels cheap, it probably is. You dont want a heavy lens, but you do
want one that is sturdy and well built. Fit and nish are also areas to consider
since they portend overall manufacturer quality.
11. Focusing speed can be critical to some types of photography. Since most 35mm
camera lenses are auto-focusing, you want one that acquires focus quickly and
accurately.
To test this, shoot the types of objects you normally photograph with the lens
you are testing. Have someone next to you with a stopwatch. Set your camera
to beep when focus is acquired. Ask them to watch you press the shutter and
start the stopwatch.
Stop the watch when you hear the beep. Measure time between the shutter press
and the beep and you now know the time it took to acquire auto-focus. The less
time the better.
12. Image stabilization is increasingly available on higher end lenses. If you use
long lenses in the 300mm plus range, stabilization can be very valuable. But
not all stabilization is created equally. Canon has three version of stabilization.
Nikon has two. Some work on tripods while others do not. Some work in panning
mode while others do not. Make sure you know what you are getting here before
you buy a stabilized lens.
13. Ergonomics refers to the usability of the lens. Do the focusing rings turn easily?
Are they well placed? Does the lens t your hand? Can you still turn a polarizing
lter when the lens hood is attached? Ask these questions when testing a lens.
The answers will impact you every time you use that lens to make a photograph.
14. Price is perhaps the most important factor for every photographer. If you cannot
aord a lens, it doesnt matter how good it is. Compare all the features and
criteria mentioned here and they mitigate each by its cost.
While its great to have a lens with three pieces of low dispersion glass, that costs
more than one with two. Maybe two pieces of LD glass are enough for your type
of photography.
Always evaluate price from the standpoint of knowing what you are paying for
and whether or not you need it.
Prof. Nikam Satish D.

NDMVPSs KBTCOE Nashik

5.5 Video switchers/Quad/Mux

5.5

45

Video switchers/Quad/Mux

Figure 5.10: Video Streamer Device

Figure 5.11: Video Streamer Technology


Quad Core refers to a type of computer processor that incorporates four individual
cores. Each core works independently to perform the instructions generated by software applications. Computers that contain a quad-core processor theoretically perform
faster than those with just a single-core processor.

5.5.1

Types

Quad-core processors are available in two dierent types. Multi-chip design was the
rst type of quad-core processor to debut. Each core is contained on a separate die in
a multi-chip design and then packaged as a single unit to create a quad-core processor.
Monolithic quad-core processors feature all four cores on a single die. Some quad-core
processors are created by packaging two monolithic dual-core processors together.

5.5.2

Functions

Processors that have quad cores can execute for dierent instructions simultaneously.
Computers that have a quad-core processor are expected to outperform those with
Prof. Nikam Satish D.

NDMVPSs KBTCOE Nashik

46

Security Systems-CCTV

dual or single-core processors. Quad-core processors are best suited for users that run
multiple applications at the same time. Software applications that work well in this
type of processing environment including re-walls, anti-virus, graphics tools, audio
and games.

5.5.3

Limitations

Not all software applications are designed to take advantage of quad-core processor
capabilities. If most of the software you use has been designed to function with singlecore processors, you may not notice much of a performance increase when switching
to a quad-core processor. Applications that are designed to run tasks simultaneously
will be able to execute these through the individual cores in the processor.

5.5.4

Benets

Computers that contain quad-core processors provide a number of benets to their


users. Quad-core processors consume less power when compared to the power consumption of four single-core processors. Monolithic quad-core processors are connected on
the same die, which means data has to travel a shorter distance before it is processed.
Users may notice a performance boost as a result of the monolithic design.

5.6

DVR Based system

Figure 5.12: Digital Video Recorder

Prof. Nikam Satish D.

NDMVPSs KBTCOE Nashik

5.7 Network design

5.7

Network design

5.8

Storage design

5.9

CCTV Applications

47

We manage the CCTV camera network in the wycombe district from our control room
at the wycombe district council oces. Why do we need CCTV ?
A main aim of cctv is to act as a deterrent to crime and anti-social behaviour. If cctv
operates notice an incident , they can inform the police and direct them to it. Cctv
footage can also be used as evidence following an arrest.
WHAT DOES THE CCTV CONTROL ROOM DO?
Operates 24hrs a day , 365 days a year
Monitors a total of 211 cameras [ including automatic nos. plate recognition
cameras ] across the wycombe district and provides monitoring for chiltern district
council, south bucks district council and beaconseld town council
Monitors wycombe and marlow watch radio for sharing information about retail
and licenced premises crime
Answers calls from our out of hours stand by service
Answers call from car park emergency help points
Control car park bollards [ out of hours ]

5.9.1

Building advanced cctv security systems

Control room components


Recording and management severs
Within the primary control room, there will be servers with sucient storage to captured video at full frame rate DVD resolution form the cameras located around the
site.
In addition to the recording servers , the primary management server will also reside
within this location.The management servers stores all user and system congurations
and enables the management of devices and alarms. Each of these servers will be protected from power loss by the inclusion of UPS battery backup devices.

Prof. Nikam Satish D.

NDMVPSs KBTCOE Nashik

48

Security Systems-CCTV

Viewing and replay


Each operator workstations has dual19 LCD displays and a joystick for PTZ camera
control. These workstation will be powered by the Cware Control Centre applications
that enables the operates to view live or recorded video, manage alarms and controls
cameras.
The control centre user interference is designed to be as simple as possible while still
providing advanced capabilities. The main screen can be utilised as the operators pots
monitor and facilitates viewing of multiple cameras in live or replay mode, exports
footage, viewing of alarms , management of the video wall and so on . To enables
simple navigation through the cameras and provides vital information cameras position
, the second monitors can be used as the map interface. The map interface can provide
users with a zoom overview of the site and highlight elements such as alarms triggers
and cameras position.
As well as the maps, the system can be licensed with the patented ICN features.
ICN stands for image content navigation and enables a a revolutionary method of
navigatation through the system. With ICN enabled, it is possible to seyup predened
invisible links within the video image from a camera that link to another camera . This
oers the operator the opportunity to click on an area of the image and the system will
automatically switch to the best view of that area. for example, if you have a cameras
our looking a door way and you see a suspicious individual enter though the door of
a building, ICN make it possible to click on the door and automatically switch to the
cameras inside quickly and easily without having to search through a list of cameras
to identify the correct one.
The cware server within the central location will constantly monitor each remote IP.
Camera and encoder (for existing analogue cameras ) device for alarm triggers, such
as motion detection. In the event of an alarm trigger from a remote location, the
alarm management and response conguration can allow for a variety of notication
methods, including simply presenting the user automatically with the video on their
spot monitor or presenting the alarm to the video wall displays.
In addition to the monitoring motion alarms, the system can also enable system health
monitoring. In the event of events such as loss of connectivity to a server or the failure
of a video feed to an encoder , an e-mail can be sent out to the system administrators
who are responsible for maintenance and upkeep. This ensures that the system can
proactively prevent and notify of potential performance issues.
The system also provides comprehensive logging including operator activity, alarms
and so on. The lock viewer tool then enable system managers to search and extract
valuable information as a CSV le. This can then we impoeted into third party system,
such as exel, to access performance such as response times, number of alarms and so
Prof. Nikam Satish D.

NDMVPSs KBTCOE Nashik

5.9 CCTV Applications

49

on.

Figure 5.13: CCTV Control Room

Video wall
Within the control room , there will be high performance rack mount workstations
connected to a large screen LCD displays. These workstations will be powered by the
cware video wall application. Each workstation can display up to 16 or more video
streams from remote cameras on wither a predened or custom layout. The control
centre clients can manage the display of the cameras onto the video wall by simply
clicking a tab at the bottom of the screen and choosing which cameras they would like
to display. It is propose to utilise one or more of the screens as a dedicated alarm
display whereby all incoming alarms from cameras can be shown to highlight this to
the user.

Prof. Nikam Satish D.

NDMVPSs KBTCOE Nashik

50

Prof. Nikam Satish D.

Security Systems-CCTV

NDMVPSs KBTCOE Nashik

51

Chapter 6
Security Systems-Perimeter
Intrusion
6.1

What is Perimeter Intrusion?

Word intrusion means entering into a restricted area forcefully without permission or welcome.
Perimeter intrusion aects the security of important areas like airport, maximum
security detention centers, nuclear facilities, etc
To avoid perimeter intrusion, a perimeter intrusion detection system is created.
The principle purpose of this system is to improve situational awareness of onsite
security personnel and to report, record, detect, access and tract probable security
incidence.
The monitoring and recording capabilities also facilitate safety investigations.
Benets of this system:
1. Detection- Vehicles, Wild life or persons attempting to enter the protected
perimeter of airport.
2. Warning- Local and remote notications.
3. Incident prevention- Attempted intrusion detected easy enough and hence
action can be taken prior to the incidence.
4. Enforcement- Local security personnel and airport operations would use the
perimeter monitoring system to enforce the trac control laws.
Prof. Nikam Satish D.

NDMVPSs KBTCOE Nashik

52

Security Systems-Perimeter Intrusion


5. Verication- Redundant direct observation of perimeter provide a continuous
verication of operations and safety of control equipments.
6. Reporting- Security personnel at the site and various agencies would be provided with all available information.
7. Documentation- Onsite and remote recording equipment will provide complete
information.
8. Surveillance- Would provide complete and continuous monitoring of situation
that might endanger the human safety.

6.2

Perimeter Intrusion Detection Systems

Figure 6.1: Airport perimeter full coverage security is provided by a combination of


integrated sensor technologies fused through a command and control suite, and augmented by secure, wireless, wide area communications.

6.2.1

Components of Perimeter Intrusion Detection Systems

PIDS is a complex integration of multiple systems.


It provides advanced warning and threat assessment within a secure perimeter.
It has correlation of multiple alarms and detection threat contacts
Prof. Nikam Satish D.

NDMVPSs KBTCOE Nashik

6.2 Perimeter Intrusion Detection Systems

53

The command and control center operators can quickly identify target of interest
and dispatch the proper response to minimize(neutralize) the threat.

Figure 6.2: Wide Area Ground Surveillance Detection Suite

Figure 6.3: Smart Fencing With VMD cameras

6.2.2

Architecture of Perimeter Intrusion Detection Systems

PIDS architecture includes:


Prof. Nikam Satish D.

NDMVPSs KBTCOE Nashik

54

Security Systems-Perimeter Intrusion

Figure 6.4: Buried Fiber Optic Cable

Figure 6.5: Command, Control, and Communications (C3) Center Integrated with
Airport

1. Sensor
2. Video detection equipment
3. Threat assessment and alarm correlation system
4. Data communication system
Concept of operation:
1. Basic concept of perimeter protection is to detect instruction attempts even
though they are small.
Prof. Nikam Satish D.

NDMVPSs KBTCOE Nashik

6.2 Perimeter Intrusion Detection Systems

55

Figure 6.6: Technical Architecture. Sensor Suites To Countermeasure Potential Intrusion

2. This detection is done by using low cost, low power ground surveillance radar,
weather video surveillance camera with intelligent intrusion detection capability,
smart fencing capability optical detection and buried ber cable.
3. The detection information from these systems is fused together and superimposed
on a video picture of the monitored area to provide information on the precise
location.
4. System continuously and passively monitors the perimeter and other designated
area using rule based detection methods.
5. On detection of an intrusion attempt, alert warning in the form of radar surveillance, video display and audio warning signals are presented directly to security
personnel and to local security ocers.
6. Video cameras with digital zoom and PTZ capabilities allow operator to manipulate the video display.
7. Radar is used as primary sensor because of its superior performance in various
weather conditions.
8. Also, it has wide area detection capability.
9. FLIR (Forward Looking Infrared) technology is also used as a detection component.
10. Cameras have separate intelligent intrusion detection capability.
Prof. Nikam Satish D.

NDMVPSs KBTCOE Nashik

56

Security Systems-Perimeter Intrusion

11. Camera provides simple, easily understood output showing what the radar detects.
12. Detection rules and system capabilities would be designed to resolve object size.
13. A local black box will be used for incident recording and for recording of the
environmental conditions at the trouble time of incidence.
14. Smart fences provide warning, detection and alerting with automatic camera
slaving and incident recording.
15. Optical detection system includes buried ber optic intrusion cable to provide
additional level of protection.
Intrusion detection system types
1. Network Intrusion Detection System [NIDS]
(a) Independent platform that identies intrusion by examining network trac
and monitors multiple hosts.
(b) It has network hub, network switch congured for port monitoring or network tap.
(c) Sensor captures all network trac and analyzes the content of individual
host.
2. Host-based Intrusion Detection System [HIDS]
(a) Consist of a agent on a host that identies intrusion by analyzing system
like calls, application logs, le system modication and other host activities
and state.
(b) Sensor consists of software agent.
(c) Application based IDS are part of category.
3. Perimeter Intrusion Detection System [PIDS]
(a) Detects and pinpoints the location of intrusion attempt on perimeter fences
of critical infrastructure.
(b) Uses ber optic cable which is tted to perimeter fence.
(c) Signal from ber optic cable is monitored and if intrusion is detected alarm
is triggered.
Prof. Nikam Satish D.

NDMVPSs KBTCOE Nashik

6.3 Advanced Applications Security Design

6.3
6.3.1

6.4

57

Advanced Applications Security Design


Security system design for verticals

University Questions

1. Explain block diagram of perimeter intrusion detection system.


2. Explain PIDS for commercial buildings.
3. Discuss the need of PIDS.
4. Explain technologies used for perimeter intrusion system.
5. What is perimeter intrusion? Explain importance of PIDS.
6. Explain architecture of PIDS.
7. Compare various perimeter intrusion detection system.
8. Explain PIDS for educational buildings.

Prof. Nikam Satish D.

NDMVPSs KBTCOE Nashik

You might also like