Understanding security system integrations

The integration of security technology is a definite trend which is applicable all over the world. The integration of security technology can be divided into the following two levels.

System Integration: This involves the integration of the various sub systems of a security management system. This paper will give an overview of the various components of a security system and then trace the history of how the various sub systems are being integrated.

Site Integration: This discusses the communication technology being used to integrate the security systems at different sites for the same organisation. The types of monitoring that are available for integrated system will also be discussed.

Components of a Security System

The following are the different types of electronic security systems available:

  • Alarms and Alarm monitoring
  • CCTV
  • Access Control Systems
  • Fence Detection System
  • Intercom Systems

There is a definite trend towards the integration of the above systems. It may be worthwhile to understand how and why this integration is taking place.

System Integration

First Generation
At the first generation stage, electronic systems were a new concept. Each of the systems had its own, independent control point. One can pity the role of the guard trying to master and control all the above systems.

Second Generation
To overcome the above problem and make the system more effective, there was a trend towards integration. Some of the advantages of integration are:

  • to make the best use of resources
  • to enable the most effective management of the site most effectively and keep the control room uncluttered
  • to allow the electronics to do most of the work
  • to integrate systems so that one system could respond to a particular activity on another system electronically consistently and without the requirement for human intervention or judgement.

The major problem over here is that each system is developed on different platforms by different manufacturers. The systems do not speak the same language. Stop-gap solutions were found to make these systems communicate.

The Next Generation
The next generation integration will be done in multimedia mode. Following are the different types of information sent by the different security systems:

  • Alarms Data
  • Access Control Systems: Data
  • CCTV: Video and Data
  • Intercom System: Video and Sound

As we know, a multimedia system can handle data, video and sound using the appropriate cards in a computer. Once this information is received by the computer, it then requires the skills of software engineers to display the information in formats which will meet the requirements of the customer.

Some of the advantages are:

  1. from a single keyboard, the entire security system can be controlled, including CCTV. Upon an alarm, the floor layout can pinpoint the exact location of the alarm with flashing lights and the image from the local camera can be displayed in a window in the same computer screen
  2. the use of Graphical Display (GUI) and mouse (point and click) makes the system operation very user-friendly
  3. the building management system and fire alarm system can even be controlled from the same terminal
  4. by using standard networking techniques, like LAN or WAN, the security system can be controlled by any terminal in the network.

Site Integration
In a local site, the cameras, alarms, readers etc. are easy to cable, and standard cabling styles can be used such as co-axial cable for CCTV and twisted pair cable for alarms and access control systems. If the site is remote (in the same town, same state or same country), or for a multi-site organisation the communication link plays a very important role. Therefore, multimedia technology is dependent upon communication technology. As expected a lot of changes are taking place in this area.

Integrated Services Digital Network (ISDN)
As the name implies, ISDN is a digital network using normal copper wires. The traditional network (PSTN) is an analogue network. It is very slow. In a PSTN network, using a modem, the maximum speed of transmission is 9.6Kb per sec. It may be adequate for data (used with alarms and access control) but is very slow for video pictures. In spite of using picture compression, it is only possible to send a video frame every 2 seconds.

In that respect, the base ISDN link comprises 3 channels

  • Channel A 56 Kb per sec
  • Channel B 56 Kb per sec
  • Channel C 16 Kb per sec

If channel A is used for video, then one can send 6 video frames per second. The other channels can then be used to send alarm information from motion detectors, heat sensors and other information such as access control etc. If the current copper telephone lines are upgraded to fibre optics, then the capacity to send information will be unlimited. Many countries are taking the step and changing all the telephone cables to fibre optics.
Fibre optics has a band width of 1000Mhz. Transmission of real time video pictures would be possible. ISDN networks and multimedia are going to change how organisations set-up their control rooms. Multi-site organisations are using these trends to set-up a central monitoring station. From this central station, watch is kept on all the sites, which may be spread throughout the city, state or country.

Types of Monitoring Stations

The functions of centralised monitoring stations may vary from organisation to organisation, but can be classified under the following three areas :

  1. After Hours Monitoring. During normal office hours a each site would monitors its own operation, but after normal hours it passes control to the central monitoring station. The central station accesses each site periodically by fast scan and views all cameras as a routine check. This is like a guard’s tour. An alarm from any site appears on the monitor and the operator can then take appropriate action. Saving manpower saving and continuous monitoring are the obvious benefits of this system.
  2. Simultaneous Monitoring. Both the local site and the central monitoring station would function simultaneously. The central station accesses any site by fast scan and operates the camera network through its own switching system. For fixed cameras, the camera can be operated by the two locations at the same time, while in the case of pan tilt cameras a priority system needs to be set up. In an alarm situation, both the local and remote systems would be activated by an interface and the operator of each system would handle the switching network independently and differently. Despite the duplication of efforts the benefits of risk reduction and joint action between local and central stations  produces a more effective action in combating security breaches. Such a system is valuable for high security organisations.
  3. Remote Monitoring. For small sites it may not be economical to have local monitoring. In such cases it is best to monitor the location from a central monitoring station. Saving manpower saving and security for small sites are the major advantages of such a strategy.

Speak Your Mind

*