www.blazeautomation.com Security And Surveillance Requirements of BITS Pilani – Hyderabad CampusSridhar PonugupatiChief Executive OfficerBlaze Automation
Presentation Outline: Back Ground / Introduction Areas of mutual interest a. Perimeter Solar Fencing (Basic, Mid Range, High security ) b. IP CCTV Surveillance system c. RFID based Access Control system for student monitoring d. Central Monitoring Station Equipment System Architecture , Specifications and Budget Detailed Quotations (will be submitted after this meeting) Conclusion
Fences are “first line of de’fence’” mechanisms Why Solar Fencing ?• Crime and disruption protection through deterrence.• Reduction of damages through the use of delaying mechanisms such as fences.
Perimeter Solar Fencing -- Attributes • Safety • Durable • Convenience to operate • Weather resistant • Durable • Low maintenance • Spot Alarming • Multi Sector Monitoring • Open ended for Expansion • Flood Lighting control • Intrusion Detection and Alerting through PC application Software.
Solar power fencing -- Principle of Operation An electric fence is a barrier that uses electric shocks to deter animals or peoplefrom crossing a boundary. The voltage of the shock may have effects rangingfrom uncomfortable to painful but not lethal. The charge of pulse 0.3 milli secis sent through the fence in 1- to 2-second intervals and gets energized to 4000to 9000 volts.Advantages of Solar Power Fencing Advanced Perimeter protection device Non-lethal system Does not require any approval from any Government Department. System meets ISI and IEC standards of safety. Creates a Psychological fear in the mind of intruder. System shall not only detect but also deny the intrusion.
Categories of Solar Power Fencing systems Basic Security Power Fencing Mid range Security Fencing with CMS facility and Flood Light Control Advanced Perimeter Security System with CCTV integration
Components of a Solar Power Fencing System --- Basic Version
Main Components of Solar Fencing System - contd Fence Energizer Fence Voltage Alarm LMLA Battery Solar Module External Alarm Fence accessories Earthing mechanism Monitoring and Reporting Unit
Limitation of this model No source Detection No Flood Light Control Requires Lot of manual Intervention User need to monitor the health on daily basis No much intelligence is incorporatedConclusion Easy to install Absolutely low cost Provides same level of security when compared to other models Requires lot of Manual intervention every day
Mid range Security Fencing withCMS facility and Flood Light Control
Mid Range System Features Includes all basic Solar Fencing system Attributes User can control the operation of the entire system from the central unit through CMS software Identification of the alarm Zone is possible in this. Provides the real time health status of the Fence Flood Light Control through CMS software Provides Reports of Communication and intrusion
Perimeter Length : 6.0 KM (Approximately)Difficulties in operating Perimeter Equipment – Fencing, Lighting etcWhat if a security alarm is Triggered ?
12 Zones Identified by BLAZE Zone 3 Zone 1Zone9 Zone 8 Zone 7 Zone 6
Central Monitoring Unit Features It provides a digital control over the System. The zone of intrusion will be indicated on the LCD screen. Speech dialer and SMS messenger is incorporated in the system and shall call the stored number automatically, upon intrusion. Access to the System shall be through Password only. The System parameters (Fence Voltage, Battery status, Communication status, Alarm status etc..) can be monitored and changed with the help of a communication Link with the Monitoring Node kept at each Energizer by Authorized Administrator
Conclusion Easy to install Absolutely low cost Provides same level of security when compared to other models Requires very less manual intervention Provides efficient Flood Light controlling based on intrusion. Manual control is also possible. User can monitor the Health of the Fence in Real Time. User can Control the ON and OFF of the System in Real Time through CMS software.
Advanced Perimeter Security System with CCTV integration Wireless IP Surveillance Solution
Advanced System Specifications Includes all basic Solar Fencing system Attributes User can control the operation of the entire system from the central unit through CMS software Identification of the alarm Zone is possible in this. Provides the real time health status of the Fence Flood Light Control through CMS software Provides Reports of Communication and intrusion PTZ enabled CCTV camera can help in monitoring the intrusion areas in less than 5 sec. Ethernet equipment at each Node can help for further extension of the system.
Typical Equipment at Each Zone: PTZ high Resolution camera Solar Fencing Equipment CMS softwareWhen Alarm Triggers: Central unit will get intimationabout the Intrusion zone and thesame will be indicated in theMIMIC Panel PTZ cameras will be directedtowards the Zone and user canzoom into the source of intrusionwith high end optical Zoomcameras.
12 Zones Identified by BLAZE with CCTV integration Zone 3 Zone 1Zone9 Zone 8 Zone 7 Zone 6
Budget Requirements for Solar Power Fencing system Basic System: Per KM : 5.20 Lakh Total Cost: 33 ~ 36 Lakh including installation Mid Range System with CMS and Lighting control: Per Zone: 4.9 Lakh approx Total Cost: 58.8 ~ 62 Lakh with installation Advanced system with CCTV surveillance: Per Zone: 11.2 Lakh approx Total Cost : 134 ~ 140 Lakh with installation
Safety requirements of Solar Power Fencing System Fence lines should not lie within 2 m of telephone lines or within 15 m of power cables. Fence earthing systems should be positioned at least 10 m away from any electricity supply earth pit. Where the general public has access to the fenced area, warning notices should be attached to the fence at intervals no greater than 100 m. If a fence is in the vicinity of over head power lines, no fence wire should be higher than 66" above the ground. An electric fence ground system should not be connected to any plumbing system, including disused water pipes or old bore casings, nor should it be connected to any other grounding device. Each energizer should be connected to its own ground system and this should not be connected to any other ground system.
Traditional DVR System Coax Cat 5e Cat 5e Network Switch DVR
Analog CamerasIP Video System IP Cameras Coax Encoder Cat 5e Network Switch Cat 5e Storage NVR Client Workstation
IP Cameras Connect directly to Ethernet network Wide variety of models available for all applications Fixed Bullet Mini-Dome Pan/Tilt/Zoom
Most cameras have high resolution available 640 X 480 (4 CIF) 720 X 480 (D1 ) MegaPixel IP Cameras are available Up to 5 MegaPixels
IP cameras with megapixel resolution allow for highly effectivedigital zoom capability and virtual pan and tilt functionality 640 X 480 Image 1900 X 1200 Image
• Power Over Ethernet (IEEE 802.3af) Less cabling Can be added using injectors (mid-spans) Use existing IP switches
Various video compression methods are available Motion JPEG MPEG4 H.264 Wavelet Most cameras only have one or two types of compression available
The camera can be used as connection device for other types of data: Alarm Inputs Alarm Outputs Audio (Bi-Directional) RS-232
Many models have card slots available for wireless Ethernet adaptors or local storage Many options are available for wireless connection to cameras
Most models have built-in motion detection Some have built-in video analytics Intelligent motion detection Abandoned object
NVR Software Solution Installed on a non-proprietary server Advantages: Customers can source their own servers, workstations, and storage devices Can be less expensive in cases where there are a large number of cameras being recorded at a low frame rate Virtually all IP cameras are supported Virtual matrix switch software is available
Disadvantages of software NVR Can be more difficult to install and service Higher total cost in most cases Limited integration with access control Customers can buy their own servers and storage
NVR on proprietary hardware Software is pre-installed on hardware provided by the CCTV manufacturer Internal or external storage is also usually provided by the CCTV manufacturer Advantages Easy to design the system Easy to install and service Many of these types of NVRs can be integrated with access control systems User interface may be similar or identical to DVRs Well developed suite of features inherited from DVR technology
Disadvantages of proprietary NVR Usually support a very limited variety of cameras Customers that desire IP surveillance systems may not want to be locked into proprietary server and storage hardware
Large facilities or campus environments Server pulls video over network backbone Long distance “home-run” cabling is not required.
Cameras are widely distributed Locations are connected via a WAN Recording is done at a central location
More Applications Customer needs high resolution images Most surveillance grade IP cameras can provide higher resolution images than DVR MegaPixel cameras can provide very high quality images Remember that they will require at least 20 times more storage space than a standard camera Customers with the future in mind Customers with a strong IT department
Budget for CCTV surveillance along with Recording hardware – Excluding network infrastructure Fixed Bullet Mini-Dome Pan/Tilt/Zoom 29.5K 23.0K 94.5K 143.0KCameras For 32 13.0 11.0 36 – 42 55 – 60 Lakh Lakh Lakh Lakh
Long Range RFID access control system forStudent activity tracking at the main gate System Requirements: Long Range RFID readers – 2 in number RFID tags: As per the requirement Application software – Customized as per the requirements Budget requirements: Long Range Reader – 65.0 K *2 = 130.0 K Cards : 50 ~ 60 rupee per tag Software cost : around 100.0 K Estimated total cost for 1000 students : 3.0 Lakh rupee
Central Monitoring Station Equipment For Solar Power Fencing Monitoring and Commanding Control of the same. For Perimeter Lighting control and Perimeter camera monitoring For CCTV surveillance of the campus For Student activity monitoring Estimate of the Budget can be prepared if the above three system configurations are finalized.