The integrated Perimeter Control System provides a multi-technological environment to survey and manage alarms and violations. The aim is to obtain an electronic signal, in case of intrusion in a perimeter delimited by iron grating, gates or palisades.
An intruder, entering a perimeter delimited by iron grating, must establish a physical contact with the structure either by climbing or by cutting or breaking it.
It is necessary to apply a sensor able to survey the attack attempts and to generate an electric signal.
The Perimeter Protection subsystem is entirely integrated with the other subsystems and in particular with the centralized supervisor. It monitors the peripheral condition by a polling request to the Ethernet Repeater Devices (ER) working as gateways among the central system and local specialised sensors, belonging to several technologies and installed in dedicated racks, aimed at controlling perimeter conditions. The alarms signals coming from the field through the sensors, are sent by the ER to the central system.
In turn, the central system is able to connect to the ER and to perform the following operations:
- Connect the rack
- Disconnect the rack
- Cut out the rack
- Set up the safety level
- Set up the signals acquisition server
- Set up the deliveries of the rack
- Set up the password
- Receive signals by the rack
“Signal” means an asynchronous piece of information that requires prompt attention by the staff in charge. The signals are divided into two groups: alarm and service signals.
The alarms signals generated by the single rack are substantially divided into 4 different categories:
- Onset and Warning Resetting
- Onset and Alarms Resetting
- Violation and unit Resetting
- Violation and box Resetting
- Violation and Resetting of communication with cards
- Lack/Resetting of Electric Power
- Low battery and battery Resetting
- Update of the I/O state
All alarms are shown on the supervisor map to get at a glance active criticalities and schedule security interventions.
The use of Site Controller offers many advantages:
“Maximization of the security levels through anti-intrusion alert functions”
“Minimum staff employment, both for the management and the maintenance”
“Total respect of the privacy rules”
The Site Controller system consists of Client / Server components with 3-level architecture in a web environment. In particular, the architecture of the software system is as follows:
The Site controller is an integrated perimeter protection system that allows the detection and management of alarms and tampering. The aim is to obtain a reliable electronic signal that detects human intruders in an invisible manner by ignoring the small animals and environmental factors that can cause false alarms for other systems. An intruder who intends to enter a perimeter bounded by metal railings is forced to establish physical contact with the structure or for an attempt to climb or to attempt a cut or break through the fence. For these reasons, the system provides for the placement on the metal grating of sensors able to detect attempts to attack the structure and consequently generate an electrical signal.
The alarm signals from the sensors are recognized by the Serir cards and conveyed to the Site Controller system via the Ethernet repeat cards. Both boards are housed inside cabinets, with “cabinets” positioned at a distance of 300 meters along the perimeter fence. The cabinets are tamper-proof and any attempted tampering is immediately recognized and transmitted to the system.
THE SYSTEM ENVIRONMENTS
Site Controller consists of three basic components: Config and Panel for the client side, Site Controller Server for the management of the devices and the interface with the DB for the server.
The Site Controller Config is the configuration interface of the system and in particular through it it is possible to configure the equipment arias of the system.
Instead, the Site Controller Panel is actually the control panel of the intrusion system, through which it is possible not only to monitor the various configured devices, but also to send commands and therefore interact with them.
The Site Controller Server takes care of monitoring the status of the sensors through a request to polling to specialized devices called Ehternet Repeater Devices that manage the network interface between the central software and the intrusion protection hardware infrastructure.