integrated security systems design concepts specifications and implementation jan 2007 ebook ling

471 315 0
integrated security systems design concepts specifications and implementation jan 2007 ebook ling

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

TEAM LinG INTEGRATED SECURITY SYSTEMS DESIGN TEAM LinG This page intentionally left blank TEAM LinG INTEGRATED SECURITY SYSTEMS DESIGN Concepts, Specifications, and Implementation Thomas Norman, CPP, PSP, CSC AMSTERDAM • BOSTON • HEIDELBERG • LONDON NEW YORK • OXFORD • PARIS • SAN DIEGO SAN FRANCISCO • SINGAPORE • SYDNEY • TOKYO Butterworth-Heinemann is an imprint of Elsevier TEAM LinG Acquisitions Editor: Pamela Chester Acquisitions Editor: Jennifer Soucy Assistant Editor: Kelly Weaver Project Manager: Melinda Ritchie Cover Designer: Eric DeCicco Butterworth-Heinemann is an imprint of Elsevier 30 Corporate Drive, Suite 400, Burlington, MA 01803, USA Linacre House, Jordan Hill, Oxford OX2 8DP, UK Copyright © 2007, Elsevier Inc All rights reserved No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher Permissions may be sought directly from Elsevier’s Science & Technology Rights Department in Oxford, UK: phone: (+44) 1865 843830, fax: (+44) 1865 853333, E-mail: permissions@elsevier.com You may also complete your request on-line via the Elsevier homepage (http://elsevier.com), by selecting “Support & Contact” then “Copyright and Permission” and then “Obtaining Permissions.” Recognizing the importance of preserving what has been written, Elsevier prints its books on acid-free paper whenever possible Library of Congress Cataloging-in-Publication Data Norman, Thomas Integrated security systems design : concepts, specifications, and implementation / By Thomas Norman p cm Includes index ISBN-13: 978-0-7506-7909-1 (alk paper) ISBN-10: 0-7506-7909-3 (alk paper) Computer networks-Security measures Information storage and retrieval systems-Security measures Computers-Access control Title TK5105.59 N45 2005 005.8–dc22 2006038020 British Library Cataloguing-in-Publication Data A catalogue record for this book is available from the British Library ISBN 13: 978-0-7506-7909-1 ISBN 10: 0-7506-7909-3 For information on all Butterworth-Heinemann publications visit our Web site at www.books.elsevier.com Printed in the United States of America 07 08 09 10 11 10 TEAM LinG Dedication This book is dedicated to the memory of Former Lebanese Prime Minister Rafik al-Hariri Mr Hariri was tragically assassinated by the enemies of freedom on February 14, 2005 in Beirut, Lebanon Rafik Hariri was a visionary leader with a program to unite Lebanese of all religions together under a common Lebanese flag, independent of outside influences Rafik al-Hariri was a hero to all who knew and loved him He saw the future, and the future was peace and prosperity, not conflict and failure He was a champion of democracy and did much to further the cause of the Lebanese people whom he loved so much We miss him every day TEAM LinG This page intentionally left blank TEAM LinG Table of Contents SECTION ONE 3 13 21 SECURITY SYSTEM DESIGN 35 Security System Design Elements Electronics Elements (High-Level Discussion) Electronics Elements (Detailed Discussion) Physical Security Elements The Security Design Process Preliminary Design Process Steps Getting Down to the Actual Design SECTION THREE 11 12 13 14 Introduction and Organization of the Book Integrated Security System Design Benefits and Philosophy History of Electronic Security SECTION TWO 10 INTRODUCTION TO INTEGRATED SECURITY SYSTEMS 37 57 65 139 179 191 219 SPECIAL DESIGN SECTIONS 251 Information Technology Systems Infrastructure Radio Frequency Systems Interfacing to Legacy Systems and Emerging Technologies Interfacing to Related Systems 253 307 329 345 vii TEAM LinG viii 15 16 17 18 19 Contents Delaying Technologies and Response Technologies Alarm Detection and Emerging Video Technologies Design Standards Development Finalizing the Installation System Implementation 357 379 397 407 433 TEAM LinG Preface The leap from traditional proprietary alarm/access control system infrastructures and analog intercom and video infrastructures to newer Ethernet based system infrastructures is a difficult one for many security practitioners Clients, consultants, integrators, technicians and even those in security sales have found the change to be mysterious, daunting and intimidating I was an early advocate of Information Technology (IT) based infrastructure because it offered something that older security system infrastructures could not: true enterprise capability Ethernet infrastructures permit the distribution of a security system across the organization’s facilities all over the world That just isn’t possible with older infrastructures While I was delighted to see the security manufacturing industry adopt Ethernet infrastructures, I was distressed to see that the industry was not seriously addressing the need to provide for the security of the security system itself on the new Ethernet infrastructure When I asked manufacturers why they were not addressing network security, I received answers like: “Oh, that is the IT Department’s responsibility,” or “Security integrators have their hands full just learning how to deal with Ethernet based systems; we’ll get to network security later.” So here now was an industry that was responsible for securing the entire organization’s assets, and the security system itself ix TEAM LinG This page intentionally left blank TEAM LinG Index Access control card readers, 69–71 door and gate operators, 84–86 electronic processing components, 86–88 emerging technologies, 341–342 field devices, 79–84 identification devices, 65–72 interfacing to other information technology systems, 295–296 keypads, 65–68 multitechnology cards, 72–79 overview, 58 photo identification elements, 72 placement of equipment, 209–210 scheduling, 244 specifications, 237, 241 survey of property in security system design emergency egress, 196 high-security area access, 195–196 operational conditions, 197 physical environment, 197 positive access control, 196–197 public access, 194 public lobby access, 194 semipublic space access, 194–195 vehicular access, 193–194 Acoustic weapons, 370–373 Administrator, access privileges, 429 Alarm, see also Detection assessment and verification, 60–61 controller placement, 210 electronic processing components, 86–88 elevator, 206 emerging technologies, 341–342 guard console vetting, 128–129 processors, 59, 86–88 reporting, 60 scheduling, 244 sensors, 59 specifications, 237, 241 transmission, 59–60 Antenna bandwidth, 312 functions, 311 gain, 312 impedance and coupling, 315 interference, 315 line-of-sight signal, 315–316, 319 loss/gain, 318 multipath, 315–316, 320–321 omni antennas, 311–312 patterns, 319 Applied Research Programs Agency, history, 100–101 Architect door selection factors, 141 landscape architect, 201 security system design role, 199 Archiving backups and recovery, 428–429 445 TEAM LinG 446 Index Archiving (Cont’d) business continuity management servers, 429 principles, 428 ARPA, see Applied Research Programs Agency Ashtray keypad, features, 67 Backhaul network, architecture, 269–270, 272 Balanced door, features, 148–149 Barcode card, features, 70–71, 136 Barium ferrite card, features, 71 Barriers, see Marine vessel barriers; Pedestrian barriers; Vehicle barriers BAS, see Building automation system Basis for Design document, contents, 191–192 BCM servers, see Business continuity management servers Bid estimator, functions and use of drawings, 38 Bidding bid analysis, 188–189 guidelines, 186–187 review bid analysis form, 188 reference checking form, 188 reply to request for information form, 187 submittal process in specifications, 229, 239 Biometrics, identification devices, 136 Bitmap image, digital video, 280 Blast door features, 150–151 frame, 155 Blumcraft lock, features, 171 Boolean algebra logic cell “and” gate alarms, 419–420 lighted paths, 421 local alarms, 420–421 Budgeting Basis for Design document, 191–192 countermeasures phasing, 183–184 prioritization, 183 selection, 181–183 cuts and equipment layout, 209 scheduling, 247–248 Building automation system consultant, 201 history, 31 interfacing to other information technology systems, 295, 349–351 Building system interfaces control outputs, 346 deluge fire sprinkler control, 351 elevators/escalators access control, 348 emergency operation, 349 floor-by-floor control, 348 hall call control, 348 remote operation from console, 349 scheduled operation, 348 fire alarm systems, 346–347 fire/life safety interfaces, 347–348 fuel management systems, 354 heating, ventilation, and air conditioning, 349–350 information inputs, 345–346 irrigation, 351 lighting, 350 parking control systems, 299, 354 private automatic branch exchange, 296–297, 351–352 public address systems, 298, 353 signage, 350–351 voice over Internet protocol systems, 297, 352–353 Business continuity management servers, data archiving, 429 Cabling fiber optic, 293 multimode fiber, 262–263, 293 single-mode fiber, 262–264, 294 wire, 262, 293 Camera, see Closed-circuit television; Digital video Card readers barcode card, 70–71, 136 barium ferrite card, 71 card overview, 69 electronic processing components, 86–88 history, 23, 25, 73 Hollerith card, 71 TEAM LinG Index magnetic stripe card, 69–70 placement, 209 proximity card readers, 73, 75, 77 rare-earth key, 71 Transportation Worker Identification Credential card, 78–79 Wiegand card/key, 70 CCTV, see Closed-circuit television Cell phone, communications, 115 Client management owner motives for security system, 53–54 relationship management tips, 45 Closed-circuit television analog systems capture and display, 97 principles, 94–95 quad, 95 video matrix switch, 95 videotape, 95–97 archiving video, 98–99 camera placement, 210–211 decision tree for analog versus digital cost, 216 functions, 216–217 longevity, 215–216 scalability, 214 digital video, see Digital video elevator, 204–206 frame grabbers, 137 guard console video surveillance guard tours, 131 uses, 130–131 video pursuit, 131–132 history, 23, 25, 27–28, 31–32 scheduling, 245 specifications, 237–238 wireless video, see Wireless video Codec, types, 279–280 Codes, see Regulations Commercial project, design, 52 Commissioning, see Finalization Communications cell phone, 115 consoles, see Consoles consolidated communications system and integration, 119 design, 213–214 enterprise integrated security system advantages, 17 447 intercom analog versus digital, 117–118 emergency phones, 116, 132–133 field station placements, 211–212 paging systems, 116–117 types, 115–116, 132 wireless digital, 118–119 pagers, 134 purposes, 114 radio frequency communications paths, 223 telecommunications consultant/contractor, 207 two-way radio, 114–115, 133–134 types, 114 Conduit path plans, 221–222 scheduling, 246 Consoles command, control, and communications consoles camera display number, 124–125 ergonomics, 124 public agency settings, 125 rationale, 121–122 workstation requirements, 122–124 dispatch consoles, 125–126 guard console alarm vetting, 128–129 functional overview, 128 remote access granting delivery lobby, 130 visitor lobby, 129 video surveillance guard tours, 131 uses, 130–131 video pursuit, 131–132 identification badging consoles, 126–127 lobby desk consoles, 125 monitoring consoles enterprise-class systems, 121 medium-sized systems, 120–121 small systems, 120 wireless headsets, 134 workstation, see Workstation Consultant/contractor coordination, 199 door hardware, 200 electrical, 200–201 TEAM LinG 448 Index Consultant/contractor (Cont’d ) elevator/escalator, 201–207 heating, ventilation, and air conditioning, 201 information technology, 208–209 landscaping, 201 parking, 201 specifications, 199–200 telecommunications, 207 Contractor, see Consultant/contractor Convergence-based integrated security system, definition, 3–4 Countermeasures budgeting phasing, 183–184 prioritization, 183 selection, 181–183 defining, 180 security policy establishment, 180 Data infrastructure, protocols, 90–91 Data interface, versus hardware interface, 93–94 Delayed egress hardware, features, 162–163 Design standards drawing standards, 405 environmental issues, 397–400 mounting devices, 403–404 power issues, 400–402 wiring practices, 402–403 Detection alarm, see also Alarm assessment and verification, 60–61 processors, 59 reporting, 60 sensors, 59 transmission, 59–60 follow-on action, 60 overview, 58–59 perimeter detection systems, line detectors capacitance detector, 392 common-mode wire detector, 393–394 fiber-optic detector, 393 leaky coax detector, 391–392 microwave detector, 305 pneumatic weight detector, 394 seismic detector, 392–393 video detector, 395 point detectors duress switches bill traps, 382 design factors, 381 elegant implementations, 382–383 footswitches, 382 pull and plunger switches, 381–382 resets, 382 two-finger switches, 381 magnetic switches balanced bias switches, 380–381 simple switches, 380 volumetric detectors acoustic glass-break detectors, 387–388 active infrared detectors beam detector, 385 reflection detector, 384–385 dual technologies, 388 intelligent video detectors, 389–390 microwave detectors bistatic detector, 386–387 monostatic detector, 386 passive infrared field detectors, 383–384 triangulation detectors, 390–391 ultrasonic detectors, 387 video motion detectors, 388–389 Digital video cameras, 279 capture and display, 97–98 codec types, 279–280 commissioning of system, 410–411 compression schemes, 280–281 decision tree for analog versus digital cost, 216 functions, 216–217 longevity, 215–216 scalability, 214 display parity, 284–285 emerging technologies digital signal processing cameras, 343 extreme low light color cameras, 343 light field camera, 342–343 frame rates, 283–284 TEAM LinG Index recorder-based system advantages and limitations, 333–334 resolution, 282–283 specifications, 240 storage, 286 transmission protocols, 99–105 wireless video, see Wireless video Directory service, server, 267, 287 Disk storage network attached storage, 289 operating systems and programs, 288 storage area network, 289 tape or disk, 289 Display parity, digital video, 284–285 Door frames blast frame, 155 extruded aluminum frame, 154–155 forced aluminum frame, 154 frameless glass opening, 155 hollow metal, 154 soundproof frame, 155 wood frame, 155 hardware automatic operators, 153 closer, 152 consultant/contractor, 200 coordinator, 152 handles, push bars, and paddles, 152 hinge, 151–152 pivot, 151 ventilator, 153 occupancy rating considerations, 156–157 survey in security system design, 198 types architect factors in selection, 141 balanced door, 148–149 blast door, 150–151 glass storefront door, 143–144 Herculite door, 144 historical doors, 149–150 hollow metal door, 142 revolving door, 85–86, 146 solid core door, 142–143 soundproof door, 151 Total Door, 147–148 449 Door and gate position switch principles, 81 types, 81–83 Door operator, options, 84–86 DPS, see Door and gate position switch Drawings changes, 217 conduit paths, 221–222 construction drawings, device schedules by system alarm/access control system, 244 cable, 245 complete specification, 247–248 conduit and fill, 246 configuration schedules, 247 control and monitoring system, 244 device wiring, 246–247 general network device configuration, 246 intercom system, 245 power, 245 review and revision, 248 revised budget, 247 shop and field drawings, 246 system infrastructure, 244 system interfaces, 245, 247 video system, 245 content, 38 floor plan, 220–221 radio frequency communications paths, 223 reflected ceiling plan, 220 riser, 222–223 single-line diagram, 223–224 site plan, 220–221 standards, 405 title block, 225 title sheet, 224 user types, 38–39 Duress switches, see Point detectors Earthquake, device mounting considerations, 404 Edge devices, overview, 261, 291 Electrical consultant/contractor, functions, 200–201 Electrified cylinder lock, caveats, 175–176 Electrified mortise lock features, 80, 157–158 panic hardware, 168 TEAM LinG 450 Index Electrified rim lock, features, 167 Electrified strike, principles, 79, 166–167 Electronic security program countermeasures, see Countermeasures objectives, 47–49, 179–180 overview, 46 strategic design overview, 13–14 phases bidding/negotiation phase, 185–189 construction review phase, 189 contract documents phase, 185 design development phase, 184–185 predesign phase, 184 schematic phase, 184 Elevator alarm, 206 consultant/contractor, 201–203 intercoms, 132 interfacing to other information technology systems, 295 remote control, 206–207 security system interfacing with elevators/escalators access control, 348 emergency operation, 349 floor-by-floor control, 348 hall call control, 348 overview, 91, 93 remote operation from console, 349 scheduled operation, 348 video cameras, 204–206 Emergency phones, intercom features, 116, 132–133 Encryption definition, 137 principles, 425–426 wide area network, 104 Enterprise integrated security system definition, 3–4 design challenges, integration strategies, 19 training requirements, 17 uniform application of security policies, 14–15 Environmental requirements, equipment matching, 213 EPROM, see Erasable programmable read-only memory Erasable programmable read-only memory, history, 28–30 Escalator, see Elevator Ethernet classification by speed, 262, 293 definition, 261 distance limitations, 264 multimode fiber, 262–263 single-mode fiber, 262–264 wiring, 262 Exit push button, lock override, 161 Explosive and flammable environments, ratings, 398–400 Facilities-driven project, design, 52 Finalization, security system installation alarm/access control system digital video system integration, 414 field connection configuration, 410 field device commissioning, 411–412 software loading, 410 backup server implementation, 415–416 Boolean algebra logic cell integration “and” gate alarms, 419–420 lighted paths, 421 local alarms, 420–421 building system integration, 418–419 commissioning checklist, 407–408 custom system reports implementation exclusion reports, 422 nesting reports, 423 digital video system connection configuration, 410–411 software loading, 410 Homeland Security threat level implementation, 414–415 information technology system integration, 417–418 network infrastructure set up, 409 operating system loading, 409 power and digital switch connection, 408–409 remote monitoring, 416–417 securing security system archived data, 428–430 TEAM LinG Index device and transmission security, 424–425 encryption, 425–426 Internet Protocol security, 426 login/logout, 430 overview, 417, 423 radio frequency security, 426–428 Situational Analysis Software implementation, 413 system cutover day, 431 video guard tour implementation, 412–413 Fire alarm, security system integration, 91, 164, 298, 346–347 Fire exit, design, 157, 196 Fire sprinkler, interfacing, 351 Firewall definition, 137 features, 266, 292 managed, 432 stateful, 432 Floor plan, contents, 220–221 Force multipliers, integrated security system design, 15 Four-point lock, features, 174–175 Frame, see Door Fresnel zone, transmission losses, 320 Fuel management systems, interfacing, 354 Gate, pedestrian chain-link, 156 estate type, 156 reinforced frame, 156 Gate operator, options, 84–86 Glass storefront door, features, 143–144 Government-driven project, design, 50–51 Guard, access privileges, 429–430 Guard console alarm vetting, 128–129 functional overview, 128 remote access granting delivery lobby, 130 visitor lobby, 129 video surveillance guard tours, 131 uses, 130–131 video pursuit, 131–132 451 Hall effect switch, door and gate position switch, 83 Hardware interface, versus data interface, 93–94 Heating, ventilation, and air conditioning consultant/contractor, 201 interfacing, 349–350 Herculite door Blumcraft lock, 171 features, 144 Hidden agendas, security measure induction, 54 High-abuse electrified lock, features, 173–174 Hirsch keypad, features, 67–68 Historical perspective, integrated security systems first generation, 22–23 second generation, 23–24 third generation, 24–25 fourth generation, 26–28 fifth generation, 30–32 stalled progress era, 28–30 HiTower lock, features, 171–172 Hollerith card, features, 71 Hollow metal door, features, 142 Homeland Security, threat level implementation, 414–415 Hub definition, 137, 265 features, 265 HVAC, see Heating, ventilation, and air conditioning IDS, see Intrusion detection system Implantable chip, access control, 77–78 Implementation schedule, planning, 48 Information technology consultant/contractor, 208–209 security system trends, Ingress protection, ratings, 398 Installer, functions and use of drawings, 38 Insurance, security measure induction, 54 Intercom field station placements, 211–212 history of systems, 23, 27–28 scheduling, 245 specifications, 238 TEAM LinG 452 Index Intercom (Cont’d ) analog versus digital, 117–118 direct ring-down intercoms, 133 elevator and parking system, 132 emergency phones, 116, 132–133 legacy system interfacing direct ring-down systems, 338–339 four-wire systems, 338 matrix switches, 339, 341 switched intercom buss systems, 339 two-wire systems, 338 paging systems, 116–117 pedestrian barriers, 366 reactive electronic automated protection systems, 358 types, 115–116, 132 wireless digital, 118–119 Interdiscipline coordination, overview, 41 Internet Protocol security, overview, 426 Intrusion detection system, features, 266–267 IP, see TCP/IP Irrigation system interfacing, 351 pedestrian barriers, 368 IT, see Information technology Joint Photographic Experts Group advantages and limitations, 281 resolution, 282–283 video compression, 280–281 JPEG, see Joint Photographic Experts Group Keypad ashtray keypad, 67 Hirsch keypad, 67–68 identification readers, 65–68 placement, 209 Labor efficiency, enterprise integrated security systems, 17–18 LAN, see Local area network Landscaping architect/contractor, 201 physical security, 140 Legacy systems access card legacies, 330 digital video recorder-based systems, 333–334 interfacing access control systems, 331–332 analog switch, 337 challenges, 329–330 emerging technologies, 341–343 intercom systems direct ring-down systems, 338–339 four-wire systems, 338 matrix switches, 339, 341 switched intercom buss systems, 339 two-wire systems, 338 multiplexer, 337 overview, 91–93 proprietary hardware-based server-type system advantages and limitations, 334–335 software-based server-type system advantages and limitations, 335–336 video systems, 332–333 Lightweight strike, caveats, 176 Local area network, interfacing to other information technology systems, 294 Locks Blumcraft lock, 171 electrified cylinder lock caveats, 175–176 electrified mortise lock, 80, 157–158 electrified strike, 166–167 fire safety, 163–166 four-point lock, 174–175 high-abuse electrified lock, 173–174 HiTower lock, 171–172 lightweight strike caveats, 176 magnetic lock, 80, 158–160 monitor strike, 169, 171 panic hardware, 80–81, 160–162, 167–169 special knowledge concerns, 177 specialty locks, 81, 169, 171–175 Long Range Acoustic Device, pedestrian barriers, 371 Longevity, enterprise integrated security systems, 18 LRAD, see Long Range Acoustic Device TEAM LinG Index Magnetic lock features, 80, , 158–160 panic hardware, 160–163, 169 Magnetic stripe access control cards, see also Card readers history, 23, 25 types, 69–70 Magnetic switches, see Point detectors Maintenance, security system, 433–435 Maintenance costs, enterprise integrated security systems, 18 Maintenance technician, functions and use of drawings, 39 Man-trap, principles, 164, 166 Management, see Security management team Manager, access privileges, 429 Marine vessel barriers antiboat barriers, 365 safety systems, 376–377 water monitors, 366 McCulloh loop telegraph-type alarm system, history, 22–23 Mercury switch, door and gate position switch, 83 Microprocessors, history, 26–27, 29 Monitored systems full-time monitoring, 436 hybrid system, 437 part-time monitoring, 436–437 Monitor strike, features, 169, 171 Mounting devices aesthetics, 404 earthquake considerations, 404 mechanical strength, 403 physical details, 404 Moving Pictures Experts Group advantages and limitations, 281 resolution, 282–283 video compression, 280–281 MPEG, see Moving Pictures Experts Group Multicast protocols anomalies, 301–302 features, 300–301 Multiple sites, monitoring, 15–16 Multiple systems, integration, 15 Multiplexer, interfacing, 337 453 National Electrical Manufacturers Association, enclosure ratings, 398 NEMA, see National Electrical Manufacturers Association Network architecture backhaul networks, 269–270, 272 simple networks, 269 subnets network traffic limiting, 271 network traffic segregation, 273–274 virtual local area network, 275 Network configurations client/server configuration, 275–277 creating network efficiencies, 277–279 peer-to-peer, 275 Network throughput, management, 286 Node, definition, 137 Obsolescence, avoidance, 32 planned, 33 unplanned, 33 Occupancy rating, door considerations, 156–157 Offenders archived video system to detect improper behavior, 442 tactics and management, 441 Open Systems Interconnection, layers, 255–257, 424–425 OSI, see Open Systems Interconnection PABX, see Private automatic branch exchange Pager, functions in security system, 134 Panic bar, lock override, 161–162 Panic hardware, features, 80–81 Parking consultant/contractor, function, 201 Parking control system, interfacing to other information technology systems, 299, 354 Pedestrian barriers acoustic weaponry, 370–373 deluge systems, 374–375 deployable doors, 367 drop chains, 369–370 fog barriers, 368–369 high-voltage weaponry, 373 TEAM LinG 454 Index Pedestrian barriers (Cont’d ) intercoms, 366 irrigation systems, 368 lighting, 366–367 quick setup foam barriers, 369 remotely operated weaponry, 373–374 revolving doors, 368 rolling grilles and operable walls, 367 safety systems, 376–377 Perimeter detection systems, line detectors capacitance detector, 392 common-mode wire detector, 393–394 fiber-optic detector, 393 leaky coax detector, 391–392 microwave detector, 305 pneumatic weight detector, 394 seismic detector, 392–393 video detector, 395 Photo identification card, features, 72 Physical security architecture and landscaping, 140 definition, 139 doors frames, 154–156 hardware, 151–153, 169–173 types, 140–151 gates, 156–157 locks, see Locks PLC, see Programmable logic controller Plunger switch, door and gate position switch, 83 Point detectors duress switches bill traps, 382 design factors, 83, 381 elegant implementations, 382–383 footswitches, 382 pull and plunger switches, 381–382 resets, 382 two-finger switches, 381 magnetic switches balanced bias switches, 380–381 simple switches, 380 Power design standards ground isolation, 401 grounding and powering, 400 hospital ground, 401 panels and breakers, 401 phasing, 400–401 uninterruptible power supplies, 401–402 radio frequency systems grounding and powering, 323–326 stability and reliability, 323, 327 system resets and restores, 325 Private automatic branch exchange, interfacing to other information technology systems, 296–297, 351–352 Product selection, overview, 40–41 Programmable logic controller, history, 30–31 Project management design management, 43–44 phases, 42 schedule management, 44 specifications, 232–233 Project manager certification, 42, 44 functions and use of drawings, 38–39 Property survey, see Survey of property Proximity card readers, features, 73, 75, 77 Public address system, interfacing to other information technology systems, 298, 353 Radio frequency systems antennas bandwidth, 312 functions, 311 gain, 312 impedance and coupling, 315 interference, 315 line-of-sight signal, 315–316, 319 loss/gain, 318 multipath, 315–316, 320–321 omni antennas, 311–312 patterns, 319 cabled system comparison, 316–317 communications paths, 223 components, 309, 311 frequencies, 307–308 grounding and powering, 323–326 power stability and reliability, 323, 327 securing, 426–428 system resets and restores, 325 TEAM LinG Index transmission losses cancellation losses, 322–323 cascade losses, 323 delay losses, 321–322 Fresnel zone, 320 line-of-sight signal, 319 transmission schemes analog, 308 digital spread spectrum systems, 308 wireless security, 309 transmitter power, 317–318 Rare-earth key, features, 71 Reactive electronic automated protection systems deluge fire sprinkler control, 351 integration factors appropriateness, 375 operationally, 375–376 safety systems, 376–377 intercom, 358 lighting, 350 marine vessel barriers, 365–366 pedestrian barriers, 366–375 types, 61–63, 357 vehicle barriers, 358–365, 378 Real-Time Protocol, overview, 259 REAPS, see Reactive electronic automated protection systems Regulations fire safety, 163–164, 196 power locations, 198 resource gathering, 198–199 safety on access control systems, 198 security program considerations, 49, 53 Renovation project, design, 50 Request-to-exit sensor function, 83, 160 Herculite door coupling, 145 types, 83–84 Research, products for security system installation, 192 Revolving door features, 146 system design options, 85–86 REX sensor, see Request-to-exit sensor Riser, contents, 222–223 Router definition, 137, 266 features, 266, 292 455 Roving guard, access privileges, 430 RTP, see Real-Time Protocol SAN, see Storage area network Satellite, video transmission dish, 110–111 latency problems, 111 phone, 111 Schedule management device schedules by system alarm/access control system, 244 cable, 245 complete specification, 247–248 conduit and fill, 246 configuration schedules, 247 control and monitoring system, 244 device wiring, 246–247 general network device configuration, 246 intercom system, 245 power, 245 review and revision, 248 revised budget, 247 shop and field drawings, 246 system infrastructure, 244 system interfaces, 245, 247 video system, 245 specifications, 243–244 tips, 44 Security management team C-level executive, 439 security command center manager, 439–440 shift supervisors, 440 Security program, see Electronic security program Security risk assessment, features, 47–48 Server archive service, 267, 287 backup servers, 89, 415–416 broadcast service, 267 computers and memory, 288 directory service server, 267, 287 disk storage network attached storage, 289 operating systems and programs, 288 storage area network, 289 tape or disk, 289 TEAM LinG 456 Index Server (Cont’d ) e-mail service, 267 mass storage, 268 printers, 268 program service, 267 proprietary hardware-based system advantages and limitations, 334–335 remote access services, 287–288 software-based server-type system advantages and limitations, 335–336 system architecture, 286–287 workstations, 268 Single-line diagram, contents, 223–224 Site plan, contents, 220–221 Smokecloak, pedestrian barrier, 368–369 Solenoid-released vertical rods, panic hardware, 168–169 Solid core door, features, 142–143 Soundproof door features, 151 frame, 155 Specifications addenda, 217 consultant, 199–200 formats, 225 overview, 39–40, 225–226 scheduling, 247–248 sections guidelines, 226–228 section integrated security system overview, 236–239 introduction, 228 precedence, 235 project engineering and provisioning, 231–232 project planning and management, 232 scope of work, 228 services, 229–235 submittals, 229, 239 system descriptions, 235–236 testing, 234 time management, 232–233 training, 234 warranty, 234–235 section alarm/access control system, 241 digital video system, 240 introduction, 240 monitoring and control system, 240 system infrastructure, 240 voice communications system, 241 section commissioning system setup and configurations, 242–243 Notice of Completion, 243 overview, 241–242 testing, 243 wire and cable installation, 242 Staffing, command center attribute and skills, 437–438 hours of operation, 438 security command center manager, 439–440 supervision, 438–440 Storage area network, features, 289 Subnet network traffic limiting, 271 network traffic segregation, 273–274 virtual local area network, 275 Success, measures for security systems, 440–441 Supervisor, access privileges, 429 Surveillance, security system utilization, 441–442 Survey of property access control and alarm placement emergency egress, 196 high-security area access, 195–196 operational conditions, 197 physical environment, 197 positive access control, 196–197 public access, 194 public lobby access, 194 semipublic space access, 194–195 vehicular access, 193–194 camera placements and fields of view, 193 door survey, 198 Switch definition, 137, 266 door and gate position switch principles, 81 types, 81–83 duress switch, 83 networks, 266, 291–292 TEAM LinG Index TCP/IP, see Transport Control Protocol/Internet Protocol Temperature, design standards, 397 Testing, specifications, 234, 243 Time management, specifications, 232–233 Title block, plans, 225 Title sheet, plans, 224 Total Door, features, 147–148 Training enterprise integrated security system requirements, 17 specifications, 234 Transport Control Protocol/Internet Protocol address schemes, 259–261 digital video transmission, 99–100, 109 importance of understanding, 253 latency problems, 109–110 lost packet reconstruction, 257–258 Open Systems Interconnection levels, 255–257 origins, 100, 102, 254 transmission, 265 Transportation Worker Identification Credential card, features, 78–79 Turnstile, electronic, 85–86 TWIC card, see Transportation Worker Identification Credential card Two-way radio, communications, 114–115, 133–134 UDP, see User Datagram Protocol Unmonitored system features, 437 hybrid system, 437 User Datagram Protocol digital video transmission, 99–100, 109 overview, 258–259 User project, design, 52–53 Vehicle barriers air bags, 364 box beam barriers, 361, 363 cable beams, 361 grab barriers, 363 inventive systems, 365 parking gates, 360 ratings, 358–359 rising bollards, 359–360 457 rising wedges, 360 rolling doors and gates, 364 safety systems, 376–377 swing gates, 363 Vending access management system, interfacing to other information technology systems, 299–300 Vestibule, see Man-trap Video, see Closed-circuit television; Digital video; Guard console; Wireless video Video detectors intelligent video detectors, 389–390 perimeter detection systems, 395 triangulation detectors, 390–391 video motion detectors, 388–389 Virtual local area network interfacing to other information technology systems, 294 subnets, 275 Virtual private network, features, 278–279 VLAN, see Virtual local area network Voice over Internet Protocol systems, interfacing to other information technology systems, 297, 352–353 VoIP systems, see Voice over Internet Protocol systems Volumetric detectors acoustic glass-break detectors, 387–388 active infrared detectors beam detector, 385 reflection detector, 384–385 dual technologies, 388 intelligent video detectors, 389–390 microwave detectors bistatic detector, 386–387 monostatic detector, 386 passive infrared field detectors, 383–384 triangulation detectors, 390–391 ultrasonic detectors, 387 video motion detectors, 388–389 VPN, see Virtual private network WAN, see Wide area network Warranty, specifications, 234–235 Waveguide, applications, 305 Wide area network encryption, 104 interfacing to other information technology systems, 294 TEAM LinG 458 Index Wiegand card/key, features, 70 Wireless headset, console officer use, 134 Wireless node, definition, 292–293 Wireless video analog video, 108 digital video, 108 network architecture full-duplex wireless mesh, 112–114 point-to-multipoint, 112 point-to-point, 112 wireless mesh, 112 rationale, 105 transmission digital protocols, 109–110 frequencies, 108 laser, 105 microwave, 105–106 radio, 106, 108 satellite, 110–111 Wiring classes, 402–403 dressing, 403 Ethernet, 262 scheduling, 246–247 Workstation access verification, 290–291 administrative workstations, 126, 290 command, control, and communications console requirements, 122–124, 290 design options, 89–90 functions, 268 guard or lobby desk workstations, 290 identity verification workstations, 127, 290 World Wide Web, history, 100–101 TEAM LinG .. .INTEGRATED SECURITY SYSTEMS DESIGN TEAM LinG This page intentionally left blank TEAM LinG INTEGRATED SECURITY SYSTEMS DESIGN Concepts, Specifications, and Implementation Thomas... confrontations, and lawsuits Designing enterprise integrated security systems is exciting, challenging, and highly rewarding A well-designed system can TEAM LinG 10 Introduction to Integrated Security Systems. .. TEAM LinG SECTION ONE Introduction to Integrated Security Systems TEAM LinG This page intentionally left blank TEAM LinG Introduction and Organization of the Book Most integrated security systems

Ngày đăng: 04/06/2014, 13:16

Từ khóa liên quan

Tài liệu cùng người dùng

Tài liệu liên quan