1 / 49

www.blazeautomation.com

www.blazeautomation.com. Security And Surveillance Requirements of BITS Pilani – Hyderabad Campus. Sridhar Ponugupati Chief Executive Officer Blaze Automation. Presentation Outline: Back Ground / Introduction Areas of mutual interest

kaethe
Download Presentation

www.blazeautomation.com

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. www.blazeautomation.com Security And Surveillance Requirements of BITS Pilani – Hyderabad Campus Sridhar Ponugupati Chief Executive Officer Blaze Automation

  2. Presentation Outline: • Back Ground / Introduction • Areas of mutual interest • a. Perimeter Solar Fencing (Basic, Mid Range, High security ) • b. IP CCTV Surveillance system • c. RFID based Access Control system for student monitoring • d. Central Monitoring Station Equipment • System Architecture , Specifications and Budget • Detailed Quotations (will be submitted after this meeting) • Conclusion

  3. Fences are “first line of de’fence’” mechanisms Why Solar Fencing ? • Crime and disruption protection through deterrence. • Reduction of damages through the use of delaying mechanisms such as fences.

  4. Perimeter Solar Fencing -- Attributes • Safety • Durable • Convenience to operate • Weather resistant • Durable • Low maintenance • Spot Alarming • Multi Sector Monitoring • Open ended for Expansion • Flood Lighting control • Intrusion Detection and Alerting • through PC application Software.

  5. Solar power fencing -- Principle of Operation An electric fence is a barrier that uses electric shocks to deter animals or people from crossing a boundary. The voltage of the shock may have effects ranging from uncomfortable to painful but not lethal. The charge of pulse 0.3 milli sec is sent through the fence in 1- to 2-second intervals and gets energized to 4000 to 9000 volts. Advantages of Solar Power Fencing • Advanced Perimeter protection device • Non-lethal system • Does not require any approval from any Government Department. • System meets ISI and IEC standards of safety. • Creates a Psychological fear in the mind of intruder. • System shall not only detect but also deny the intrusion.

  6. Categories of Solar Power Fencing systems • Basic Security Power Fencing • Mid range Security Fencing with CMS facility and Flood Light Control • Advanced Perimeter Security System with CCTV integration

  7. Basic Security Power Fencing

  8. Components of a Solar Power Fencing System --- Basic Version

  9. Main Components of Solar Fencing System - contd • Fence Energizer • Fence Voltage Alarm • LMLA Battery • Solar Module • External Alarm • Fence accessories • Earthing mechanism • Monitoring and Reporting Unit

  10. Limitation of this model • No source Detection • No Flood Light Control • Requires Lot of manual Intervention • User need to monitor the health on daily basis • No much intelligence is incorporated Conclusion • Easy to install • Absolutely low cost • Provides same level of security when compared to other models • Requires lot of Manual intervention every day

  11. Mid range Security Fencing with CMS facility and Flood Light Control

  12. Mid Range System Features • Includes all basic Solar Fencing system Attributes • User can control the operation of the entire system from the central unit through CMS software • Identification of the alarm Zone is possible in this. • Provides the real time health status of the Fence • Flood Light Control through CMS software • Provides Reports of Communication and intrusion

  13. Perimeter Length : 6.0 KM (Approximately) Difficulties in operating Perimeter Equipment – Fencing, Lighting etc What if a security alarm is Triggered ?

  14. Zone 12 Zone 3 Zone 11 12 Zones Identified by BLAZE Zone 2 Zone 4 Zone 1 Zone 10 Zone 5 Zone 9 Zone 8 Zone 7 Zone 6

  15. Central Monitoring Unit Features • It provides a digital control over the System. • The zone of intrusion will be indicated on the LCD screen. • Speech dialer and SMS messenger is incorporated in the system and shall call the stored number automatically, upon intrusion. • Access to the System shall be through Password only. • The System parameters (Fence Voltage, Battery status, Communication status, Alarm status etc..) can be monitored and changed with the help of a communication Link with the Monitoring Node kept at each Energizer by Authorized Administrator

  16. Central Monitoring Unit – Operation Diagram

  17. Real Time Communication Status of CMS GUI

  18. Real Time Intrusion Detection System

  19. Conclusion • Easy to install • Absolutely low cost • Provides same level of security when compared to other models • Requires very less manual intervention • Provides efficient Flood Light controlling based on intrusion. Manual control is also possible. • User can monitor the Health of the Fence in Real Time. • User can Control the ON and OFF of the System in Real Time through CMS software.

  20. Advanced Perimeter Security System with CCTV integration Wireless IP Surveillance Solution

  21. Advanced System Specifications • Includes all basic Solar Fencing system Attributes • User can control the operation of the entire system from the central unit through CMS software • Identification of the alarm Zone is possible in this. • Provides the real time health status of the Fence • Flood Light Control through CMS software • Provides Reports of Communication and intrusion • PTZ enabled CCTV camera can help in monitoring the intrusion areas in less than 5 sec. • Ethernet equipment at each Node can help for further extension of the system.

  22. Typical Equipment at Each Zone: • PTZ high Resolution camera • Solar Fencing Equipment • CMS software • When Alarm Triggers: • Central unit will get intimation about the Intrusion zone and the same will be indicated in the MIMIC Panel • PTZ cameras will be directed towards the Zone and user can zoom into the source of intrusion with high end optical Zoom cameras.

  23. Zone 12 Zone 3 Zone 11 12 Zones Identified by BLAZE with CCTV integration Zone 2 Zone 4 Zone 1 Zone 10 Zone 5 Zone 9 Zone 8 Zone 7 Zone 6

  24. Budget Requirements for Solar Power Fencing system • Basic System: Per KM : 5.20 Lakh Total Cost: 33 ~ 36 Lakh including installation • Mid Range System with CMS and Lighting control: Per Zone: 4.9 Lakh approx Total Cost: 58.8 ~ 62 Lakh with installation • Advanced system with CCTV surveillance: Per Zone: 11.2 Lakh approx Total Cost : 134 ~ 140 Lakh with installation

  25. Safety requirements of Solar Power Fencing System • Fence lines should not lie within 2 m of telephone lines or within 15 m of power cables. • Fence earthing systems should be positioned at least 10 m away from any electricity supply earth pit. • Where the general public has access to the fenced area, warning notices should be attached to the fence at intervals no greater than 100 m. • If a fence is in the vicinity of over head power lines, no fence wire should be higher than 6'6" above the ground. • An electric fence ground system should not be connected to any plumbing system, including disused water pipes or old bore casings, nor should it be connected to any other grounding device. • Each energizer should be connected to its own ground system and this should not be connected to any other ground system.

  26. IP Video Surveillance for Campus activity monitoring

  27. Traditional DVR System Coax Cat 5e Network Switch Cat 5e DVR

  28. Analog Cameras IP Video System IP Cameras Coax Encoder Cat 5e Network Switch Cat 5e Storage Client Workstation NVR

  29. IP Cameras • Connect directly to Ethernet network • Wide variety of models available for all applications Fixed Bullet Mini-Dome Pan/Tilt/Zoom

  30. Most cameras have high resolution available • 640 X 480 (4 CIF) • 720 X 480 (D1 ) • MegaPixel IP Cameras are available • Up to 5 MegaPixels

  31. IP cameras with megapixel resolution allow for highly effective digital zoom capability and virtual pan and tilt functionality 640 X 480 Image 1900 X 1200 Image

  32. Power Over Ethernet (IEEE 802.3af) • Less cabling • Can be added using injectors (mid-spans) • Use existing IP switches

  33. Various video compression methods are available • Motion JPEG • MPEG4 • H.264 • Wavelet • Most cameras only have one or two types of compression available

  34. The camera can be used as connection device for other types of data: • Alarm Inputs • Alarm Outputs • Audio (Bi-Directional) • RS-232

  35. Many models have card slots available for wireless Ethernet adaptors or local storage • Many options are available for wireless connection to cameras

  36. Most models have built-in motion detection • Some have built-in video analytics • Intelligent motion detection • Abandoned object

  37. NVR • Software Solution • Installed on a non-proprietary server • Advantages: • Customers can source their own servers, workstations, and storage devices • Can be less expensive in cases where there are a large number of cameras being recorded at a low frame rate • Virtually all IP cameras are supported • Virtual matrix switch software is available

  38. Disadvantages of software NVR • Can be more difficult to install and service • Higher total cost in most cases • Limited integration with access control • Customers can buy their own servers and storage

  39. NVR on proprietary hardware • Software is pre-installed on hardware provided by the CCTV manufacturer • Internal or external storage is also usually provided by the CCTV manufacturer • Advantages • Easy to design the system • Easy to install and service • Many of these types of NVRs can be integrated with access control systems • User interface may be similar or identical to DVRs • Well developed suite of features inherited from DVR technology

  40. Disadvantages of proprietary NVR • Usually support a very limited variety of cameras • Customers that desire IP surveillance systems may not want to be locked into proprietary server and storage hardware

  41. Large facilities or campus environments • Server pulls video over network backbone • Long distance “home-run” cabling is not required.

  42. Cameras are widely distributed • Locations are connected via a WAN • Recording is done at a central location

  43. More Applications • Customer needs high resolution images • Most surveillance grade IP cameras can provide higher resolution images than DVR • MegaPixel cameras can provide very high quality images • Remember that they will require at least 20 times more storage space than a standard camera • Customers with the future in mind • Customers with a strong IT department

  44. Budget for CCTV surveillance along with Recording hardware – Excluding network infrastructure Fixed 29.5K 13.0 Lakh Bullet 23.0K 11.0 Lakh Mini-Dome 94.5K 36 – 42 Lakh Pan/Tilt/Zoom 143.0K 55 – 60 Lakh For 32 Cameras

  45. Long Range RFID access control system for Student activity tracking at the main gate • System Requirements: Long Range RFID readers – 2 in number RFID tags: As per the requirement Application software – Customized as per the requirements • Budget requirements: Long Range Reader – 65.0 K *2 = 130.0 K Cards : 50 ~ 60 rupee per tag Software cost : around 100.0 K Estimated total cost for 1000 students : 3.0 Lakh rupee

  46. Central Monitoring Station Equipment • For Solar Power Fencing Monitoring and Commanding Control of the same. • For Perimeter Lighting control and Perimeter camera monitoring • For CCTV surveillance of the campus • For Student activity monitoring Estimate of the Budget can be prepared if the above three system configurations are finalized.

  47. Thank youceo@blazeautomation.com Tel: +91 40 6457 2220

More Related