1 / 43

EAT 311 BUILDING SERVICES ENGINEERING

EAT 311 BUILDING SERVICES ENGINEERING. (Umar Bin Hj.Kassim) sem 1 2010&11. LECTURE CONTENT. 1. Security Systems: (week 8 - 9).

sjason
Download Presentation

EAT 311 BUILDING SERVICES ENGINEERING

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. EAT 311 BUILDING SERVICES ENGINEERING (Umar Bin Hj.Kassim) sem 1 2010&11 www.themegallery.com

  2. LECTURE CONTENT 1. Security Systems: (week 8 - 9). • Introduction, Access Control – Concept, Generic Model, Components, Types, Features, Card Technologies, Controllers, Biometrics, Issues With Biometrics, Cabling, Video Door phone, Intrusion Detection System – Sensors, Working Principle, Access 2. Video Management:(week 10 - 11). • Introduction, CCTV Cameras, CCD Camera Basics, Traditional CCTV System, Video Recording, Drawbacks, Digital Video Recording, Features, Functionalities. 3. Integrated Systems: (week 12 - 14). • Introduction, Integration of Building Management System, Energy Management System, Safety System, Security Systems & Video Management, Benefits of Integrated Systems, Challenges, Future Prospects of Integrated Systems

  3. Chapter 1-Security Systems: • Introduction, Access Control – • Concept, • Generic Model, Components, • Types, Features, • Card Technologies, • Controllers, • Biometrics, Issues With Biometrics, • Cabling, Video Door phone, • Intrusion Detection System – Sensors, Working Principle, Access

  4. Introduction • The best-performing security sensor is a highly trained, dedicated human being. • Human senses cover the necessary operations: sight, hearing, smell, touch, taste, feeling, and a voice to sound an alarm and remain vigilant. • The human brain can process input from all senses simultaneously and make decisions based on inferences and subtle environmental changes. • Security technology programs have become an essential and cost-effective strategy for many owners.

  5. Security Concept • Security is the degree of protection against danger, damage, loss, and criminal activity. • Security as a form of protection are structures and processes that provide or improve security as a condition. • Security has to be compared to related concepts: safety, continuity, reliability. The key difference between security and reliability is that security must take into account the actions of people attempting to cause destruction.

  6. Access Control • Access control is a system which enables an authority to control access to areas and resources in a given physical facility or computer-based information system. An access control system, within the field of physical security, is generally seen as the second layer in the security of a physical structure. • Access control is, in reality, an everyday phenomenon. A lock on a car door is essentially a form of access control. • A PIN on an ATM system at a bank is another means of access control. • The possession of access control is of prime importance when persons seek to secure important, confidential, or sensitive information and equipment. • Item control or electronic key management is an area within (and possibly integrated with) an access control system which concerns the managing of possession and location of small assets or physical (mechanical) keys.

  7. Access controlComponents • An access control point, which can be : • a door, turnstile, parking gate, elevator, or other physical barrier where granting access can be electrically controlled. • Typically the access point is a door. An electronic access control door can contain several elements: • At its most basic there is a stand-alone electric lock. The lock is unlocked by an operator with a switch. • To automate this, operator intervention is replaced by a reader. • The reader could be a keypad where a code is entered, it could be a card reader, or it could be a biometric reader.

  8. Access controlComponents • Readers do not usually make an access decision but send a card number to an access control panel that verifies the number against an access list. • To monitor the door position a magnetic door switch is used. In concept the door switch is not unlike those on refrigerators or car doors. Generally only entry is controlled and exit is uncontrolled.

  9. Access controlComponents • In cases where exit is also controlled a second reader is used on the opposite side of the door. In cases where exit is not controlled, free exit, a device called a request-to-exit (REX) is used. Request-to-exit devices can be a pushbutton or a motion detector. • When the button is pushed or the motion detector detects motion at the door, the door alarm is temporarily ignored while the door is opened. Exiting a door without having to electrically unlock the door is called mechanical free egress. • This is an important safety feature. In cases where the lock must be electrically unlocked on exit, the request-to-exit device also unlocks the door.

  10. EXAMPLE BUILDING SECURITY EQUIPMENT BUILDING INTEGRETED SYSTEM www.themegallery.com

  11. Guard House

  12. Access & Security Panel

  13. Entrance Desk Building Security System

  14. Security Camera

  15. Security Building Plan Security Lighting

  16. Gate Equipment

  17. Security Door Access Control

  18. Alarm System Security

  19. Building Security Room System Wireless Smart Home System

  20. Card reader • A card reader is anything, usually an electronic device, that reads 'cards'. • There is a wide variety of things called cards and hence there are many things called 'card readers'. • For instance, paper punched card readers were used throughout the first several decades of the computer industry to store information and write programs for computer systems. • This article refers to modern, electronic devices that read or communicate with plastic cards with barcodes, magnetic strips, computer chips or other facilities on the card. • A memory card reader is a device used for communication with a smart card or a flash memory card. • A business card reader is a scanning device used to scan and electronically save printed business cards. • A magnetic card reader is a device used to scan cards containing magnetic data strips, such as credit cards.

  21. Smart card readers • A smart card reader is an electronic device that reads smart cards. Some keyboards have a built-in card reader. • There are external devices and internal drive bay card reader devices for PC. Some laptops have built-in smart card reader. • Some have a flash upgradeable firmware. The card reader supplies the integrated circuit on the smart card with electricity. • Communication is done via protocols and you can read and write to a fixed address on the card.

  22. Video Door Phone • Add an additional layer of security to your home or business by visually monitoring and identifying visitors in safety before permitting entrance. Children can screen visitors in complete safety. • High risk business such as jewelry stores, can identify individuals prior to opening a door. When combined with Electric Door Strike, opening a door is accomplished in relative safety.

  23. Biometric • There are several forms of biometric identification employed in access control: fingerprint, hand geometry, iris and face recognition. • The use of biometric technology significantly increases security level of systems because it eliminates such problems as lost, stolen or loaned ID cards, and forgotten or guessed PINs.

  24. BIOMETRICS? • Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic.  • Among the features measured are; face, fingerprints, hand geometry, handwriting, iris, retinal, vein, and voice. • Biometric technologies are becoming the foundation of an extensive array of highly secure identification and personal verification solutions. • As the level of security breaches and transaction fraud increases, the need for highly secure identification and personal verification technologies is becoming apparent. • Biometric-based solutions are able to provide for confidential financial transactions and personal data privacy. • The need for biometrics can be found in federal, state and local governments, in the military, and in commercial applications. Enterprise-wide network security infrastructures, government IDs, secure electronic banking, investing and other financial transactions, retail sales, law enforcement, and health and social services are already benefiting from these technologies.

  25. BIOMETRICS? • Biometric-based authentication applications include workstation, network, and domain access, single sign-on, application logon, data protection, remote access to resources, transaction security and Web security. • Trust in these electronic transactions is essential to the healthy growth of the global economy. • Utilized alone or integrated with other technologies such as smart cards, encryption keys and digital signatures, biometrics are set to pervade nearly all aspects of the economy and our daily lives. • Utilizing biometrics for personal authentication is becoming convenient and considerably more accurate than current methods (such as the utilization of passwords or PINs). • This is because biometrics links the event to a particular individual (a password or token may be used by someone other than the authorized user), is convenient (nothing to carry or remember), accurate (it provides for positive authentication), can provide an audit trail and is becoming socially acceptable and cost effective. http://www.biometrics.org/html/introduction.html

  26. The basic block diagram of a biometric system

  27. Biometric • The operation of all biometric readers is alike: they compare the template stored in memory to the scan obtained during the process of identification. • If the probability that the template in the memory and the live scan belong to the same person is high enough, the ID number of that person is sent to a control panel. • The control panel then checks permissions of the user and makes the decision whether to grant access or not. • The communication between the reader and the control panel is usually done in the industry standard Wiegand protocol. • The only exception is intelligent biometric readers that do not require any panels and directly control all door hardware.

  28. Biometric • Biometric templates may be stored in the memory of readers, in which case the number of users is limited by reader memory size. • Readers currently available in the market may store up to 50,000 templates. Template of each user may also be stored in the memory of his/her smart card. This option removes all limits to the number of system users, but it requires each user to have a card and makes finger-only identification impossible. • Biometric templates may also be stored in the memory of a central server PC. This option is called "server-based verification". Readers simply read biometric data of users and forward it to the main computer for processing. • Such systems support large number of users, but they are very much dependent on the reliability of the central server and communication lines.

  29. Biometric Products • Fingerprint Reader • Fingerprint Enclosure • Fingerprint Pen Drive • Fingerprint Module • Fingerprint Door Access • Finger tec Time Attendance

  30. Intrusion detection system • An Intrusion Detection System (IDS) is a device or software application that monitors network and/or system activities for malicious activities or policy violations and produces reports to a Management Station. • Intrusion prevention is the process of performing intrusion detection and attempting to stop detected possible incidents. • Intrusion detection and prevention systems (IDPS) are primarily focused on identifying possible incidents, logging information about them, attempting to stop them, and reporting them to security administrators. • In addition, organizations use IDPSs for other purposes, such as identifying problems with security policies, documenting existing threats, and deterring individuals from violating security policies.

  31. Intrusion detection system • IDPSs have become a necessary addition to the security infrastructure of nearly every organization. • IDPSs typically record information related to observed events, notify security administrators of important observed events, and produce reports. • Many IDPSs can also respond to a detected threat by attempting to prevent it from succeeding. • They use several response techniques, which involve the IDPS stopping the attack itself, changing the security environment (e.g., reconfiguring a firewall), or changing the attack’s content.

  32. SECURITY MONITORING • All security desk functions can be mobilized by hand held two way radio and hand held video monitor eliminating the need to staff a security desk at every moment. A security officer is free to patrol or respond to events and emergencies. At all times he or she will be able to: • Hear a voice announcement over hand held two way radios of all alarms from security devices, fire alarm panels, and other monitoring applications. • Acknowledge alarms by hand held two way radio. • Control equipment such as pumps, lights, or elevators. • Receive all incoming telephone calls or elevator emergency calls. • Make an outgoing telephone call with all activity logged at the computer. • Respond to intercom stations and have a two way conversation with the person accessing the intercom station all via hand held two way radio. • See the output of the closed circuit television system and control any cameras equipped with pan/tilt/zoom/focus functions.

  33. SECURITY MONITORING • Security Monitoring • Monitor security points such as doors, motion detectors, and glass break detectors, all of which announce over hand held two way radios. A software scheduler will ignore alarms during user specified time windows. Use the scheduler to turn relays on and off in order to control lights, equipment, intercoms, or other applications. Integrate other facility security systems such as fire alarm panels to provide instant notification and description of location over hand held two way radios. • Wireless Duress Pendants • Wireless pendants may be issued to employees for security in the parking lots or to monitor maintenance personnel who are performing tasks in high risk areas. Locators will indicate the location of persons who have activated their pendants. • Asset Tracking • Wireless motion sensing devices may be attached to computers or other valuable assets so that any attempt to move them from a user defined area creates an alarm. Any movement within the defined area will not create an alarm.

  34. SECURITY MONITORING • Real Time Security Guard Tour System • The system will provide immediate notification if a guard tour station has not been posted (visited) within a user defined time period. All guard tour events are posted in real time as they happen. All events are posted with date and time, and touring guards may report and log circumstances such as finding an unlocked door, broken window, or hazardous material. • Personnel Tracking • This system locates key personnel on demand. Each staff person carries a wireless duress transmitter that constantly transmits a locating signal. Wireless locating devices placed according to need and design throughout the facility log the location of the person as they move from place to place. • View CCTV Cameras from Portable Monitors • Closed circuit television cameras that are positioned throughout the facility may be displayed in the roving staff person's vehicle or on a hand carried video receiver. Any camera may be called up for view automatically as the result of an alarm event or manually at the discretion of the roving staff person. Cameras equipped with pan/tilt/zoom/focus may be manipulated via the hand held two way radio.

  35. Emergency Notification with Two Way Radios • The CISCOR two way radio interface effectively duplicates all security desk functions thus eliminating the need to position a staff person at the security desk. • A roving security person can be making rounds, performing maintenance, or responding to alarms and still have all security desk functions available. This will greatly reduce labor cost for the facility resulting in tens of thousands of dollars saved annually... and this savings goes on year after year after year. • Even a portable video monitor displaying the output of the CCTV system can be carried by staff. In addition to two way radio dispatch, alarms can be sent to telephones, on site paging systems, wide area subscription pagers, fax, email and digital receivers. • From a hand held two way radio staff can: • Receive announcements of all alarms and events via a computer generated voice message. • Acknowledge an alarm event by entering a personal staff ID number into a hand held two way radio. • Answer the telephone or place a telephone call. • Talk to intercom stations and then release a door lock or open a parking gate.

  36. Emergency Notification with Two Way Radios • Last Alarm Auto Dial commands the computer to look up the phone number of the last location (e.g. an apartment) to send in an emergency alarm, automatically dial the number and then patch the call through to the hand held two way radio. • Control equipment - turn lights on or off, start and stop pumps - applications are endless. • Log events and tasks accomplished such as guard tour or housekeeping services. • Existing third party systems such as fire alarm systems, burglar alarm panels, and HVAC control and alarm systems can be funneled through the CISCOR computer to provide annunciation of alarms and events over hand held two way radios. Pagers are also supported. • Partitioning • Computer generated voice announcements may be sent to a selected group of radios if desired so that only designated staff personnel will hear the message. Also, voice announcements may be channeled to as many as 6 different radio groups. • High Security • Various methods are available for securing the radio transmissions. These include scrambling, which makes the voice messages unintelligible to outside listeners and ANI (Automatic Number Identification) which causes the radios to disregard any DTMF codes that do not come from your own radios. For most radios, these methods require a simple radio programming change. • Radios, Telephones, and Pagers

  37. Remote CCTV Monitoring • Staff Mobility • Portable video display allows staff to leave security consoles that are equipped with video display monitors. All security cameras may be monitored remotely by hand held or vehicle mounted display. This allows staff the mobility that is necessary to respond to situations or make facility tours all the while maintaining continuous access to the camera system. • Interface • Analog and/or digital matrix video switchers transmit their video output via radio to hand held video receivers and full size flat screen monitors mounted in vehicles. Display is full color and/or black and white. All video is real time. • Remote Control Pan/Tilt/Zoom/Focus • Cameras equipped with any motorized functions such as pan, tilt, zoom and focus, may be controlled by hand held two way radio. • Manual and Automatic Activation • Any camera attached to the video switcher may be selected for transmission and display by automatic or manual activation. Automatic activation is by any alarm event such as a video motion detector, door switch, or infrared motion detector. Upon activation, the central computer will announce the alarm or event over hand held two way radio so the staff person or officer will know to look at the portable video display. Manual activation is accessed from the hand held radio allowing any camera to be selected.

  38. Equipment Monitoring and Control • Any equipment or location may be monitored for a variety of indications such as on/off status, equipment failure, temperature, pressure, HVAC alarm, moisture presence, humidity, and presence of toxic gases. Critical manufacturing processes can be monitored to ensure that conveyor belts are operating and production is flowing. Powerful software with boolean logic commands allows ultimate customization and fine tuning of alarm or alert scenarios. For example, if air pressure is at least 120 psi and the punch press has not run for at least 60 seconds, then create an alert. • Hardwired or Wireless • Alarm input and control output can be either hardwired or wireless. Wireless transmitters use sophisticated spread spectrum technology to ensure the integrity of the signal. All devices are completely supervised by the system. • Automated Two Way Radio Dispatch • All alarms and events can be broadcast immediately to designated hand held two way radios and/or pagers to alert supervisors and maintenance personnel. Staff can make appropriate responses with hand held two way radio keypads.

  39. Wireless Security Systems • A complete array of fully supervised wireless transmitters and devices is available to provide maximum focus and efficiency for any project. Personal emergency call pendants can be worn with a neck lanyard, belt clip, or wrist band and are available in latching and water resistant models. • Universal transmitters attach to any device with a dry contact switch output. Wireless smoke detectors and infrared motion detectors are also offered. Range for all of these transmitters is one half mile true-line-of-site*. A single system will support up to 65,000 individual transmitters each with its own unique identifiable code. • A single computer controlled universal transmitter may be used to control any number of stand alone receivers attached to equipment such as gate operators, door locks, motors, pumps, or other devices.

  40. Wireless Security Systems • The range of any wireless transmitter will be reduced when the signal passes through solid materials. • Repeaters • Wireless signals may be distributed over very large campuses with wireless repeaters. These repeaters require only a 110 volt power connection or may be operated with a solar panel. These robust repeaters yield a 4 mile true-line-of-site range. • Locators • Locators identify the location of a mobile pendant allowing you to respond immediately to an emergency call. Locators are also used to track and find staff or to track the theft of valuable equipment. • Advanced Spread Spectrum Technology • Transmits multiple identical data signals each on a different frequency delivering maximum immunity to interference from radio noise generated by motors, computers, fluorescent lights, hair dryers, CB radios or any other electric/electronic equipment. If three frequencies are being interfered with, this leaves many more frequencies still communicating. This assures the greatest degree of reliability in the most demanding of environments. • 900 Megahertz Frequency • This small wavelength transmission weaves through small spaces with greater agility than other wireless products that operate at lower frequencies such as 300 or 50 megahertz. 900 megahertz goes where others can't. • More Powerful • Our transmitters torpedo through walls and barriers with 10 times more power than low frequency 300 and 50 megahertz products which are limited by the FCC. More power means greater reliability. • Fully Supervised • All wireless devices transmit a check in signal every 60 seconds. The central computer monitors these signals and will notify staff if any device stops working. In addition, all transmitters will send a low battery signal before the battery is too weak to function.

  41. Assignment (10%) • Question- Select two famous building in the world –in a different era (one classic building another one is modern building) ,please study and compare the special types of the engineering security and operation system in that buildings? • Student also can attach the related photos or chart about that system. • Dateline Submission: 8 October 2010 (4.00 pm). • Maximum 7pages(included content photos ,chart ,references). • Assignment Concept: Classic & Modern.

  42. Thank you

More Related