Your SlideShare is downloading. ×
Bits pilani solar power fencing by blaze automation
Upcoming SlideShare
Loading in...5

Thanks for flagging this SlideShare!

Oops! An error has occurred.


Introducing the official SlideShare app

Stunning, full-screen experience for iPhone and Android

Text the download link to your phone

Standard text messaging rates apply

Bits pilani solar power fencing by blaze automation


Published on

Published in: Design

  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

No notes for slide


  • 1. Security And Surveillance Requirements of BITS Pilani – Hyderabad CampusSridhar PonugupatiChief Executive OfficerBlaze Automation
  • 2. Presentation Outline: Back Ground / Introduction Areas of mutual interest a. Perimeter Solar Fencing (Basic, Mid Range, High security ) b. IP CCTV Surveillance system c. RFID based Access Control system for student monitoring d. Central Monitoring Station Equipment System Architecture , Specifications and Budget Detailed Quotations (will be submitted after this meeting) Conclusion
  • 3. Fences are “first line of de’fence’” mechanisms Why Solar Fencing ?• Crime and disruption protection through deterrence.• Reduction of damages through the use of delaying mechanisms such as fences.
  • 4. Perimeter Solar Fencing -- Attributes • Safety • Durable • Convenience to operate • Weather resistant • Durable • Low maintenance • Spot Alarming • Multi Sector Monitoring • Open ended for Expansion • Flood Lighting control • Intrusion Detection and Alerting through PC application Software.
  • 5. Solar power fencing -- Principle of Operation An electric fence is a barrier that uses electric shocks to deter animals or peoplefrom crossing a boundary. The voltage of the shock may have effects rangingfrom uncomfortable to painful but not lethal. The charge of pulse 0.3 milli secis sent through the fence in 1- to 2-second intervals and gets energized to 4000to 9000 volts.Advantages of Solar Power Fencing Advanced Perimeter protection device Non-lethal system Does not require any approval from any Government Department. System meets ISI and IEC standards of safety. Creates a Psychological fear in the mind of intruder. System shall not only detect but also deny the intrusion.
  • 6. Categories of Solar Power Fencing systems Basic Security Power Fencing Mid range Security Fencing with CMS facility and Flood Light Control Advanced Perimeter Security System with CCTV integration
  • 7. Basic Security Power Fencing
  • 8. Components of a Solar Power Fencing System --- Basic Version
  • 9. Main Components of Solar Fencing System - contd  Fence Energizer  Fence Voltage Alarm  LMLA Battery  Solar Module  External Alarm  Fence accessories  Earthing mechanism  Monitoring and Reporting Unit
  • 10. Limitation of this model  No source Detection  No Flood Light Control  Requires Lot of manual Intervention  User need to monitor the health on daily basis  No much intelligence is incorporatedConclusion  Easy to install  Absolutely low cost  Provides same level of security when compared to other models  Requires lot of Manual intervention every day
  • 11. Mid range Security Fencing withCMS facility and Flood Light Control
  • 12. Mid Range System Features  Includes all basic Solar Fencing system Attributes  User can control the operation of the entire system from the central unit through CMS software  Identification of the alarm Zone is possible in this.  Provides the real time health status of the Fence  Flood Light Control through CMS software  Provides Reports of Communication and intrusion
  • 13. Perimeter Length : 6.0 KM (Approximately)Difficulties in operating Perimeter Equipment – Fencing, Lighting etcWhat if a security alarm is Triggered ?
  • 14. 12 Zones Identified by BLAZE Zone 3 Zone 1Zone9 Zone 8 Zone 7 Zone 6
  • 15. Central Monitoring Unit Features It provides a digital control over the System. The zone of intrusion will be indicated on the LCD screen. Speech dialer and SMS messenger is incorporated in the system and shall call the stored number automatically, upon intrusion. Access to the System shall be through Password only. The System parameters (Fence Voltage, Battery status, Communication status, Alarm status etc..) can be monitored and changed with the help of a communication Link with the Monitoring Node kept at each Energizer by Authorized Administrator
  • 16. Central Monitoring Unit – Operation Diagram
  • 17. Real Time Communication Status of CMS GUI
  • 18. Real Time Intrusion Detection System
  • 19. Conclusion Easy to install Absolutely low cost Provides same level of security when compared to other models Requires very less manual intervention Provides efficient Flood Light controlling based on intrusion. Manual control is also possible. User can monitor the Health of the Fence in Real Time. User can Control the ON and OFF of the System in Real Time through CMS software.
  • 20. Advanced Perimeter Security System with CCTV integration Wireless IP Surveillance Solution
  • 21. Advanced System Specifications  Includes all basic Solar Fencing system Attributes  User can control the operation of the entire system from the central unit through CMS software  Identification of the alarm Zone is possible in this.  Provides the real time health status of the Fence  Flood Light Control through CMS software  Provides Reports of Communication and intrusion  PTZ enabled CCTV camera can help in monitoring the intrusion areas in less than 5 sec.  Ethernet equipment at each Node can help for further extension of the system.
  • 22. Typical Equipment at Each Zone: PTZ high Resolution camera Solar Fencing Equipment CMS softwareWhen Alarm Triggers: Central unit will get intimationabout the Intrusion zone and thesame will be indicated in theMIMIC Panel PTZ cameras will be directedtowards the Zone and user canzoom into the source of intrusionwith high end optical Zoomcameras.
  • 23. 12 Zones Identified by BLAZE with CCTV integration Zone 3 Zone 1Zone9 Zone 8 Zone 7 Zone 6
  • 24. Budget Requirements for Solar Power Fencing system Basic System: Per KM : 5.20 Lakh Total Cost: 33 ~ 36 Lakh including installation Mid Range System with CMS and Lighting control: Per Zone: 4.9 Lakh approx Total Cost: 58.8 ~ 62 Lakh with installation Advanced system with CCTV surveillance: Per Zone: 11.2 Lakh approx Total Cost : 134 ~ 140 Lakh with installation
  • 25. Safety requirements of Solar Power Fencing System Fence lines should not lie within 2 m of telephone lines or within 15 m of power cables. Fence earthing systems should be positioned at least 10 m away from any electricity supply earth pit. Where the general public has access to the fenced area, warning notices should be attached to the fence at intervals no greater than 100 m. If a fence is in the vicinity of over head power lines, no fence wire should be higher than 66" above the ground. An electric fence ground system should not be connected to any plumbing system, including disused water pipes or old bore casings, nor should it be connected to any other grounding device. Each energizer should be connected to its own ground system and this should not be connected to any other ground system.
  • 26. Traditional DVR System Coax Cat 5e Cat 5e Network Switch DVR
  • 27. Analog CamerasIP Video System IP Cameras Coax Encoder Cat 5e Network Switch Cat 5e Storage NVR Client Workstation
  • 28. IP Cameras Connect directly to Ethernet network Wide variety of models available for all applications Fixed Bullet Mini-Dome Pan/Tilt/Zoom
  • 29.  Most cameras have high resolution available  640 X 480 (4 CIF)  720 X 480 (D1 ) MegaPixel IP Cameras are available  Up to 5 MegaPixels
  • 30. IP cameras with megapixel resolution allow for highly effectivedigital zoom capability and virtual pan and tilt functionality 640 X 480 Image 1900 X 1200 Image
  • 31. • Power Over Ethernet (IEEE 802.3af)  Less cabling  Can be added using injectors (mid-spans)  Use existing IP switches
  • 32.  Various video compression methods are available  Motion JPEG  MPEG4  H.264  Wavelet Most cameras only have one or two types of compression available
  • 33.  The camera can be used as connection device for other types of data:  Alarm Inputs  Alarm Outputs  Audio (Bi-Directional)  RS-232
  • 34.  Many models have card slots available for wireless Ethernet adaptors or local storage Many options are available for wireless connection to cameras
  • 35.  Most models have built-in motion detection Some have built-in video analytics  Intelligent motion detection  Abandoned object
  • 36. NVR Software Solution  Installed on a non-proprietary server  Advantages:  Customers can source their own servers, workstations, and storage devices  Can be less expensive in cases where there are a large number of cameras being recorded at a low frame rate  Virtually all IP cameras are supported  Virtual matrix switch software is available
  • 37.  Disadvantages of software NVR  Can be more difficult to install and service  Higher total cost in most cases  Limited integration with access control  Customers can buy their own servers and storage
  • 38.  NVR on proprietary hardware  Software is pre-installed on hardware provided by the CCTV manufacturer  Internal or external storage is also usually provided by the CCTV manufacturer  Advantages  Easy to design the system  Easy to install and service  Many of these types of NVRs can be integrated with access control systems  User interface may be similar or identical to DVRs  Well developed suite of features inherited from DVR technology
  • 39.  Disadvantages of proprietary NVR  Usually support a very limited variety of cameras  Customers that desire IP surveillance systems may not want to be locked into proprietary server and storage hardware
  • 40. Large facilities or campus environments Server pulls video over network backbone Long distance “home-run” cabling is not required.
  • 41. Cameras are widely distributed Locations are connected via a WAN Recording is done at a central location
  • 42. More Applications Customer needs high resolution images  Most surveillance grade IP cameras can provide higher resolution images than DVR  MegaPixel cameras can provide very high quality images  Remember that they will require at least 20 times more storage space than a standard camera Customers with the future in mind Customers with a strong IT department
  • 43. Budget for CCTV surveillance along with Recording hardware – Excluding network infrastructure Fixed Bullet Mini-Dome Pan/Tilt/Zoom 29.5K 23.0K 94.5K 143.0KCameras For 32 13.0 11.0 36 – 42 55 – 60 Lakh Lakh Lakh Lakh
  • 44. Long Range RFID access control system forStudent activity tracking at the main gate System Requirements: Long Range RFID readers – 2 in number RFID tags: As per the requirement Application software – Customized as per the requirements Budget requirements: Long Range Reader – 65.0 K *2 = 130.0 K Cards : 50 ~ 60 rupee per tag Software cost : around 100.0 K Estimated total cost for 1000 students : 3.0 Lakh rupee
  • 45. Central Monitoring Station Equipment For Solar Power Fencing Monitoring and Commanding Control of the same. For Perimeter Lighting control and Perimeter camera monitoring For CCTV surveillance of the campus For Student activity monitoring Estimate of the Budget can be prepared if the above three system configurations are finalized.
  • 46. Thank Tel: +91 40 6457 2220