Академический Документы
Профессиональный Документы
Культура Документы
BUILDING AUTOMATION-I
By
Nikam Satish D.
Assistant Professor
Contents
1 Fire Alarm System-Fundamentals
1.1
1.2
1.3
1.4
Intruduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.1.1
What is Fire? . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.1.2
Fire Modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.1.3
Components of Fire . . . . . . . . . . . . . . . . . . . . . . . . .
1.2.1
Principles of Operation . . . . . . . . . . . . . . . . . . . . . . .
FAS Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.3.1
Field Components
. . . . . . . . . . . . . . . . . . . . . . . . .
1.3.2
Panel Components . . . . . . . . . . . . . . . . . . . . . . . . .
13
1.3.3
Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
15
FAS Architectures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
16
1.4.1
Types of Architectures . . . . . . . . . . . . . . . . . . . . . . .
16
1.4.2
17
2.2
23
FAS loops . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
23
2.1.1
Classication of loops . . . . . . . . . . . . . . . . . . . . . . . .
23
2.1.2
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
23
23
2.2.1
23
25
3.1
25
3.2
Fire Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
25
3.2.1
NFPA 72A
. . . . . . . . . . . . . . . . . . . . . . . . . . . . .
25
3.2.2
BS 5839 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
25
3.2.3
IS Standard . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
25
4 Security Systems-Fundamentals
4.1 Introduction to Security Systems . . . . .
4.1.1 Concepts to Security Systems . . .
4.2 Access Control System . . . . . . . . . . .
4.2.1 Access Control System Components
4.2.2 Access control system Design . . .
4.3 University Questions . . . . . . . . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
5 Security Systems-CCTV
5.1 Introduction . . . . . . . . . . . . . . . . . . . .
5.2 Components of CCTV system . . . . . . . . . .
5.3 Cameras . . . . . . . . . . . . . . . . . . . . . .
5.3.1 Operation and types of Cameras . . . . .
5.3.2 Camera Selection Criteria . . . . . . . .
5.3.3 Camera Enclosures . . . . . . . . . . . .
5.3.4 Webcam . . . . . . . . . . . . . . . . . .
5.4 Lenses . . . . . . . . . . . . . . . . . . . . . . .
5.4.1 Type of Camera Lenses . . . . . . . . . .
5.4.2 How to Choose a Camera Lens? . . . . .
5.5 Video switchers/Quad/Mux . . . . . . . . . . .
5.5.1 Types . . . . . . . . . . . . . . . . . . .
5.5.2 Functions . . . . . . . . . . . . . . . . .
5.5.3 Limitations . . . . . . . . . . . . . . . .
5.5.4 Benets . . . . . . . . . . . . . . . . . .
5.6 DVR Based system . . . . . . . . . . . . . . . .
5.7 Network design . . . . . . . . . . . . . . . . . .
5.8 Storage design . . . . . . . . . . . . . . . . . . .
5.9 CCTV Applications . . . . . . . . . . . . . . . .
5.9.1 Building advanced cctv security systems
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
ii
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
27
27
27
28
28
28
28
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
31
31
31
34
34
38
38
39
41
41
41
45
45
45
46
46
46
47
47
47
47
.
.
.
.
.
.
.
51
51
52
52
53
57
57
57
List of Figures
1.1
Fire Triangle
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2
Modes of Fire . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.3
Components of re . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.4
1.5
1.6
1.7
Heat Detector.
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
10
1.8
14
1.9
Architecture of FAS . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
17
5.1
32
5.2
34
5.3
. . . . . . . . . . . . . . . .
35
5.4
36
5.5
Bullet Camera . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
36
5.6
37
5.7
IP Camera . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
37
5.8
Camera Enclosures . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
38
5.9
Lens . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
42
45
45
46
49
6.1
52
6.2
53
6.3
53
6.4
54
iii
6.5
6.6
iv
54
55
Chapter 1
Fire Alarm System-Fundamentals
1.1
Intruduction
Before the discussion of Fire Alarm System we must know the basics of FIRE.
1.1.1
What is Fire?
1.1.2
Fire Modes
1. Incipient
It is beginning of the re stage
In this mode products of combustion particles are produced which are less
than 0.3 microns(<0.3 microns)
No visible smoke is generated
No detectable heat is produces
This type of re may occur for milliseconds or days
It is formed by the reaction of ions
Detector usd in this mode:Ionization Detectors
2. Smoldering
In this mode visible smoke particles are produced which are greater than
0.3 microns
Little visible ame is produced or noticeable heat is produced.
Visible particles are produced.
Detectors used in this stage are photoelectric detectors.
3. Flame
In this mode rapid combustion produces radiant energy in the visible and
invisible (IR,UV) spectrums.
Prof. Nikam Satish D.
1.1 Intruduction
4. Heat
Heat is dened as thermal energy in transit
The energy transferred from a high temperature object to a lower temperature object is called heat.
In thermodynamic sense,heat is never regarded as being stored within a
body like work,it exists only as energy in transit from one body to another
or between a system and its surrounding.
The SI unit of heat is Joule.
The unit for the rate of heat transfer is Watt(W=J/sec).
Heat transfer rate or heat ow per unit re is denoted by Q=dq/dt(Watts).
1.1.3
Components of Fire
Thermal Products
1. Flame
A ame is the visible (light emitting) gaseous part of a re
It is caused by a highly exothermic reaction (e g: combustion) taking place
in a thin zone.
Color and temperature of a ame are dependent on the type of fuel involved
in the combustion.
Flame color depends on several factors, the most important typically being
black body radiation and spectral band emission ,with both spectral line
emission and spectral line absorption playing smaller roles.
Flame temperature is determined by following factors:
Prof. Nikam Satish D.
1.1 Intruduction
1.2
1.2.1
1.3
FAS Components
1.3.1
Field Components
of a re.
A heat detector is a re alarm device designed to respond when the connected
thermal energy of a re temperature of a heat sensitive element.
The thermal mass and conductivity of the element regulate the rate ow of heat
into the element.
Heat detectors have two main classications of operations, rate of rise and xed
temp.
Fixed temperature heat detectors:
This is the most common type of heat detector
These are operated when the heat sensitive element reaches a set operating temperatures
The most common xed temp point for electrically connected heat detectors is 136.4F.
Rate of rise heat detectors
Rate of rise heat detectors operates on a rapid rise in element temp of
12 to 15 degree F increase per min, irrespective of the starting temp.
Prof. Nikam Satish D.
10
3. Duct Detectors
11
(c) Infrared: IR ame detectors work within the infrared spectral band. Hot
gases emit a specic spectral pattern in the infrared region, be sensed with
a thermal imaging camera a type of thermographic camera. A typical frequency where signal frequency IR ame detector is sensitive is in the 4.4
mm range.
(d) UV/IR: UV/IR ame detectors compose the threshold in two ranges in
AND conguration and their ratio to each other to conrm the re signal
and minimize false alarms.
(e) IR/IR ame detection: Dual IR ame detectors compose the threshold signal in two infrared ranges. In this case one sensor looks at the 4.4 mm range
and the other sensor at a reference frequency.
(f) IR/IR/IR ame detection: Dual IR ame detectors compose three specic
wavelength bands within the IR spectral region and their ratio to each other
to reliably detect ames while to reduce false alarms. In this case one sensor
looks at 4.4 mm range and the other sensors at a reference frequencies.
Operational Features Initiating Devices
12
Notication Appliances
These component uses energy supplied from the re alarm system or other stored
energy source to inform the proximate persons of the need to take action usually to
evacuate.
Notication appliances are re alarm system components such as a bell, horn, speaker,
light or text display that provides audible, tactile or visible output or any combination.
The device which produce audible, visual or both alarm signals in response to a re
emergency is known as notication appliances.
Classication of notication appliances:
1. Audible
(a) Horns: Loud and distinctive output often used in high noise environments
such as manufacturing plants.
(b) Bells: Only used if they are only for re, or have a distinctive sound from
other bell signaling devices.
Often used as an external going to indicate the ow of water in the sprinkler
system.
(c) Sounders: Electronic or mechanical audible devices, which are capable of
producing a variety of tones often, the tone is selectable during installation
of the device.
(d) Chimes: Soft-tones appliances used where loud noises could be disruptive to
other operations. Generally used where qualied personnel are continuously
in attendance.
(e) Sirens: Extremely loud devices generally limited in use to outdoor or heavy
industrial areas.
(f) Speakers: Audible devices used in conjunction with voice evacuation messages. Life is not generally associated with music systems.
2. Visual
Visual signaling appliances are used in high noise environments, in areas occupied
by hearing impaired individuals or in areas where audible devices may not be
desired.
e.g. strobe.
3. Physical
Bed shakers are nothing but vibrators, which gives physical indication.
e.g. Bed shakers
Prof. Nikam Satish D.
13
4. Olfactory
The olfactory system is the sensory system used for olfaction or the sense of smell.
e.g. smell
Notication Appliance Circuit (NAC):
A circuit or path directly connected to a notication appliances. This circuit consist
components such as which produce audible, visual or both alarm signals in response
to re emergency.
1.3.2
Panel Components
14
1. FACP
2. Primary power supply
3. Secondary backup power supplies
4. Initiating devices
5. Notication appliances.
6. Building safety interface.
FACP is responsible for:
Monitoring the status of devices connected to the signalling line circuits associated with FACP.
Analyzing information from the devices to determine alarm or trouble events.
Responding to alarm events by activating controlled devices
Maintaining a history of alarm and trouble events
Providing requested information from any device connected to the backbone communications network.
Prof. Nikam Satish D.
15
1.3.3
Applications
16
1.4
1.4.1
FAS Architectures
Types of Architectures
17
The system should automatically dial out to the bridge as a matter of course.
Again there are various sub categories form P1 to P5, where the type of protection
from the sensor used may be varied.
The object of the automatic re detection system is to raise the alarm at the
earliest possible moments to allow an escape.
4. Radio re alarms [Wireless FAS]:
Wireless FAS are similar to a standard analogue addressable re alarm system
but with the advantage of having no wire to interlink the detection and sounders.
1.4.2
FAS is divided into two main parts Fire Detection and Fire Suppression/Fighting.
Fire detection is again divided into conventional system and addressable system.
Addressable system is further divided into analog addressable and intelligent
addressable system.
Prof. Nikam Satish D.
18
19
20
21
22
23
Chapter 2
Fire Alarm System-FAS loops
2.1
FAS loops
2.1.1
Classication of loops
2.1.2
Examples
2.2
2.2.1
Examples
24
25
Chapter 3
Fire Alarm System-Fire Standards
3.1
3.2
Fire Standards
3.2.1
NFPA 72A
3.2.2
BS 5839
3.2.3
IS Standard
26
27
Chapter 4
Security Systems-Fundamentals
4.1
In the corporate world, various aspects of security were historically addressed separately
-notably by distinct and often non communicating department for IT security, physical
security and fraud prevention. Today there is greater recognition of the interconnected
nature of the security requirement, an approach variously known as holistic security ,
all hazards management and other terms.
Inciting factors in the convergence of security disciplines include the development of
digital video surveillance technologies and the digitization and networking of physical
control system.
Greater interdisciplinary cooperation is further evidenced by the Feb 2005 creation of
the alliance for enterprise security risk management, a joint venture including leading
association in security, information security and IT audit.
4.1.1
28
Security Systems-Fundamentals
Threat- a threat is a method of triggering a risk event that is dangerous
Vulnerability- a weakness in a target that can potentially be exploited by a security threat
4.2
4.2.1
4.2.2
4.3
University Questions
1. Draw and Explain the block diagram of access control systems. [10]
2. Discuss communication between card and card reader technology. [8]
3. Explain biometrics for security systems. [8]
Prof. Nikam Satish D.
29
4. Describe the installation process of access control systems with suitable example.
[10]
5. Explain communication between RFID card reader and TEMA server [8]
6. discuss the access control system components selection factors.[10]
7. Draw and explain block diagram of security system [10]
8. explain working of magnetic lock with suitable diagram [8]
30
Security Systems-Fundamentals
31
Chapter 5
Security Systems-CCTV
5.1
Introduction
5.2
Cameras: Security cameras are the starting point of the most CCTV systems. There
are endless possibilities when choosing CCTV cameras and lens - everything
from xed models designed for monitoring very specic locations, to day/night
cameras, and powerful PTZ domes for patrolling large areas.
Monitor: In a traditional CCTV setup, operators view footage from a central location
on a monitor, very much like a TV, but with higher lines of resolution for better
picture quality. Monitors can be dedicated(meaning they display video from a
single camera), or call-up (meaning operators can access multiple camera at the
same time).
Cable: With a analog system, coaxial cable is required for transmitting video footage
from the camera. This is one of the drawback of analog CCTV, as the cable can
Prof. Nikam Satish D.
32
Security Systems-CCTV
be expensive and dicult to install especially for a large camera network, and
those where cameras must be positioned in dicult locations.
DVR: Most modern CCTV system incorporate DVRs (Digital Video Recorders) which
enable operators to reap some of the benets of network-based surveillance setup.
DVRs convert the analog footage to digital, which help to extend storage capacity,
makes it much easier to search archived footage, and also allows users to stream
video a network for remote viewing from multiple locations.
Typical CCTV Setup
A typical CCTV system consists of following components: Digital Video Recorder
(DVR), Cameras, Microphone (optional), Sensors (optional) and Relay outputs (optional).
The Digital Video Recorder commonly known as DVR is the brain of the entire CCTV
system, all input/output devices such as camera, sensors etc. are connected to the
DVR. The DVR is programmed to record video and audio signals from the devices,
recording can be scheduled, activated on motion detect or even turned on 24 hrs. The
DVR also process inputs from sensors such as smoke detectors and turn on warnings
as programmed in the CCTV system software.
A major function of the CCTV system is the ability to remote access the monitored
site. This is achieved through a remote login via the Internet to the CCTV system,
no special software is required on the remote side, users can login just by using the
Internet Explorer. For remote access to work, the CCTV system must be permanently
linked to the internet by broadband connection such as ADSL or Cable Line. The
Prof. Nikam Satish D.
33
CCTV system can work behind corporate router and rewall and it is not necessary
to have a static IP broadband connection.
Planning a CCTV system It is important that careful planning and consideration are done before xing up a CCTV system. The following are some tips to help
you plan your desired CCTV system.
CCTV Cameras
When choosing your CCTV cameras, consider the following factors: angle of
view, night viewing capability, indoor or outdoor use, location of camera.
The location of the camera is an important factor that aects the eectiveness
of the CCTV system. Cameras located at high position give a better overall
view but might be ineective in capturing human faces. Cameras positioned
too low are prone to vandalism. Wide-angle cameras give a good overview but
compromise on image details, narrow angle camera gives good image details and
are suitable for long corridors. For outdoor, weatherproof cameras are required,
surge protection devices might be required if the area is prone to voltage surge
or lightning. IR cameras are more eective for short distanceand enclosed area
(typically less than 20-30m), IR cameras are not very eective for viewing vast
outdoor area at night. If surveillance of outdoor area at night is important,
use good quality Day and Night camera which has low lux rating and install
additional lightings at area of importance. Finally, never position a camera to
view directly onto a light source
CCTV DVR (Digital Video Recorder)
The CCTV DVR is the brain of the system, all signal cables will be connected
to the DVR. Locate your DVR at a place where the cables can be neatly covered or concealed, ensure that at least one power socket is available at the area.
For network CCTV DVR, the unit must also be connected to your Internet
Modem/Router, a network cable is used to connect the CCTV DVR to you Modem/Router.
Some CCTV DVR (especially PC based system) require a display screen to perform conguration and maintenance work, make sure that enough space is allocated for the display screen when planning the CCTV system. The display screen
can also be located away from the CCTV DVR (for example, in another room)
if it is mainly used for monitoring purpose. In such cases, the additional cabling
for the display screen must be taken into consideration.
Prof. Nikam Satish D.
34
Security Systems-CCTV
It is important that adequate ventilation is provided for the CCTV DVR, insufcient cooling of the DVR will result in premature failure of the DVRs internal
components especially the Hard Disk. Never place the CCTV DVR in an enclosed
cabinet. If possible, locate the CCTV DVR in air-conditioned environment such
as a server room. Do not place object on top or in any way that will block the
DVRs ventilation holes or louvers.
For a comparison between Standalone and PC based CCTV DVR, visit our product page.
5.3
Cameras
5.3.1
5.3 Cameras
35
the camera functions like a normal camera with standard colors and at night it
switches to low-lux black and white mode. When visibility decreases due to nolight at night, Infrared LEDs are automatically illuminated providing full security.
These cameras are used by military personals, in parking lots, and high security
zones.
Dome Camera: Dome cameras are installed inside a dark dome and are designed in
a way that they go unnoticed by visitors. They come in compact design for a
discrete appearance. The thief does not know if the camera is recording. These
cameras can also be rotated and tilted manually. Dome type cameras are used
in public places like railway station, bus terminals and other areas where there
is a huge gathering of people.
Bullet Camera: Bullet cameras are placed inside a bullet shaped housing, and they
are used in residential places as well as commercial places. They are small in size,
have an integrated design, and are really eective. They oer illuminate viewing
even in darkness and are weatherproof as well.
Vandal Proof Camera: Vandal proof cameras are used as outdoor security cameras.
These cameras are sheltered within solid material and are covered by a hub of
Prof. Nikam Satish D.
36
Security Systems-CCTV
break-proof glass which doesnt hinder the quality of the video-camera streams.
It is dicult to break these cameras which makes them perfect for high security.
They are suitable for wall or ceiling mounting and are rain and fog resistant.
Hidden Camera: Hidden cameras are compact in size and are used for secret monitoring. They are usually installed in public places like department stores, theatres, clubs, etc. Hidden cameras have a built-in recorder that records and broadcasts simultaneously. By using a large number of security cameras and networking
them various strategic views of the place are obtained.
Prof. Nikam Satish D.
5.3 Cameras
37
Pan Tilt Zoom (PTZ) Camera: Pan-tilt-zoom camera oers the ability to view
and zoom in all directions. You can even set the camera to automatically rotate
to dierent elds of vision. To gather more information on CCTV cameras,
cables, monitors and connectors.
38
Security Systems-CCTV
5.3.2
The selection criteria should take into account the following: The camera equipment
should satisfy the operational requirement under all specied environmental conditions.
Safety regulations relating to the site. Points to be take into consideration:
1. White balance of color cameras.
2. Electronic iris in relation to picture degrading for highlights.
3. Long exposure times in relation to movement blur.
4. Spectral sensitivity in relation to the type of illumination.
5. External synchronization.
6. Back-up power supply.
5.3.3
Camera Enclosures
5.3 Cameras
39
5.3.4
Webcam
40
Security Systems-CCTV
5.4 Lenses
41
lenses, which have no provision for adjustment, are also available. as a camera systems
depth of eld is greater for small imager formats and is greater for lenses with a large
f-number(small aperture), the system used in webcam have suciently large depth of
eld that the used of a xed focus lens does not impact image sharpness much. Image
sensor can be CMOS or CCD, the former being dominant for low-cost cameras, but
CCD camera do not necessarily outperform CMOS-based camera in the low cost price
range. Most consumer webcams are capable of providing VGA-resolution video at a
frame rate of 30 frames per second. many newer devices can produce video in miltimegapixel resolution, and a few can run at higher frame rates such as the playstation
eye, which can produce 320x240 video at 120 frames per second.
support electronics are present to read the image from the sensor and transmit it to the
host computer. the camera pictured to the right, for example, uses a sonix SN9C101
to transmit its image over USB. some cameras, such as mobile phone camera, use
a CMOS sensor with supporting electronics on die,i.e. the sensor and the support
electronic are built on a single silicon chip to save space and manufacturing costs. most
webcams feature built-in microphones to make video calling and videoconferencing
more convenient.
the USB video device class(UVC) specication allow for interconnectivity of webcams
to computers even without proprietary drivers installed. Microsoft Windows XP SP2,
Linux and Mac OS X (since October 2005) have UVC driver built in and do not require
extra drivers, although they are often installed in order to add additional features.
5.4
Lenses
5.4.1
5.4.2
1. Sharpness is mostly about contrast. Old timers might say, that sure is a nice
contrasty lens. They mean its sharp.
How do you test this? Put a piece of newspaper on the wall and illuminate it
with two high power lights, one on each side. Mount your camera on a tripod
and make an exposure of the newspaper based on the distance scale on the lens
or using the lens or auto-focus.
Use as fast a shutter speed as you can for the light conditions and open the lens
all the way to its widest aperture (The smaller number). Then make on exposure
at each aperture and look at the results.
You want to see how sharp the text in the newspaper appears at a 100 percent
Prof. Nikam Satish D.
42
Security Systems-CCTV
enlargement. Pay particular attention to the sharpness at the center of the frame
versus the edge of the frame. Even bad lenses are typically somewhat sharp at
the center but perform poorly at the edges. They will be dierent.
While a less than scientic, it will help you to evaluate sharpness in a meaningful
way.
2. Lens speed is relevant only insofar as you need good low light performance. But
it can also be an indicator of a high quality lens. Most manufacturers put their
best glass into their fastest lens. If you have the money and want the best, buy
fast lenses.
Also, note that zoom lenses with constant apertures (say a Sigma 300-800 zoom
which is set at F/5.6 regardless of focal length) tend to outperform variable
aperture zooms where the lens speed changes with the focal length.
3. Minimum focus distance is important but because only you know how close
you will be to your subjects, only you know how much or how little minimum
focus distance you need. Higher quality lenses tend to have a closer minimum
focus distances, but not always.
To test a lens minimum focus distance, use a tape measure between the focal
plane and the subject. Usually the manufacturers estimates are close but not
always.
4. Lens element quality is critical to lens performance. I try to use only lenses
with low dispersion glass. These typically eliminate chromatic aberrations that
can denigrate image contrast and sharpness.
Generally, I also look for lenses with Apochromatic and Aspherical elements
Prof. Nikam Satish D.
5.4 Lenses
43
which reduce distortion, and add contrast and sharpness. The more of these
types of elements in your lens, the better. Of course you will have to trust the
manufacturer on this point since you cant take the lens apart to see for yourself.
5. Digital lenses dont work on the lm cameras and dont even work on all digital
cameras. Make sure the lens you are buying will work on your cameras. Some
lenses will only work with digital cameras featuring an APS sized sensor. On lm
cameras, these lenses are eectively worthless. Likewise, they dont work on full
frame digital single lens reex cameras. So if you shoot both digital and lm,
stay away from special digital lenses.
6. Lens are is more than little star-shaped rectangles appearing in backlit pictures. Lens are is often unseen or unnoticed in the viewnder. Its impact is to
reduce contrast. Even when you dont see a starburst, you may be the victim of
lens are if you use inexpensive lenses.
Pro lenses have coatings to reduce lens are and may even include special lens
hoods also designed to reduce are.
Test your lens by shooting backlit subjects and then look for washed out contrast
in the picture.
7. Chromatic aberration is color fringing or halos around high contrast objects.
It makes pictures look soft and is more prevalent in lenses without LD glass. Its
also easier to spot at wide apertures than small apertures.
To test your lens for CA, shoot images wide open in high sunlight focusing on
high contrast edges. The CA will show on the edges if you magnify the print.
All lenses have some CA. What amount is acceptable is up to you. Note that
you can correct CA in Photoshop but with most pro lenses, the correction is so
minimal as to be unnoticeable.
8. Bokeh is the rendition of out of focus points of light. Shoot any shot with a forest
or greenery atleast 15 feet from the camera, wide open. Look at the background.
If you see well dened edges in the out of focus circles of light, you have a bad
Bokeh. This is mostly subjective and like everything else, the faster and better
the lens, the better the bokeh.
9. Light fall o can be simply measured by shooting any photo wide open that
contains the sky. The illumination should be the same from corner to corner in
a lens that has good light fall o characteristics.
Lens weight is the easiest criteria to measure. Weigh the lens and decide if it is
lighter than other lenses in its category. You usually want the highest lens you
can nd, assuming it meets your other criteria.
Prof. Nikam Satish D.
44
Security Systems-CCTV
10. Lens construction and build standards will help you decide whether or not
the lens seems likely to last under day-to-day use. Cheap plastic lenses are more
likely to fail than magnesium lenses. Lenses with solid metal lens mounts will
not warp as will plastic lens mounts. Sealed lenses will not be as likely to suer
damage from dust and moisture as unsealed lenses.
If a lens feels cheap, it probably is. You dont want a heavy lens, but you do
want one that is sturdy and well built. Fit and nish are also areas to consider
since they portend overall manufacturer quality.
11. Focusing speed can be critical to some types of photography. Since most 35mm
camera lenses are auto-focusing, you want one that acquires focus quickly and
accurately.
To test this, shoot the types of objects you normally photograph with the lens
you are testing. Have someone next to you with a stopwatch. Set your camera
to beep when focus is acquired. Ask them to watch you press the shutter and
start the stopwatch.
Stop the watch when you hear the beep. Measure time between the shutter press
and the beep and you now know the time it took to acquire auto-focus. The less
time the better.
12. Image stabilization is increasingly available on higher end lenses. If you use
long lenses in the 300mm plus range, stabilization can be very valuable. But
not all stabilization is created equally. Canon has three version of stabilization.
Nikon has two. Some work on tripods while others do not. Some work in panning
mode while others do not. Make sure you know what you are getting here before
you buy a stabilized lens.
13. Ergonomics refers to the usability of the lens. Do the focusing rings turn easily?
Are they well placed? Does the lens t your hand? Can you still turn a polarizing
lter when the lens hood is attached? Ask these questions when testing a lens.
The answers will impact you every time you use that lens to make a photograph.
14. Price is perhaps the most important factor for every photographer. If you cannot
aord a lens, it doesnt matter how good it is. Compare all the features and
criteria mentioned here and they mitigate each by its cost.
While its great to have a lens with three pieces of low dispersion glass, that costs
more than one with two. Maybe two pieces of LD glass are enough for your type
of photography.
Always evaluate price from the standpoint of knowing what you are paying for
and whether or not you need it.
Prof. Nikam Satish D.
5.5
45
Video switchers/Quad/Mux
5.5.1
Types
Quad-core processors are available in two dierent types. Multi-chip design was the
rst type of quad-core processor to debut. Each core is contained on a separate die in
a multi-chip design and then packaged as a single unit to create a quad-core processor.
Monolithic quad-core processors feature all four cores on a single die. Some quad-core
processors are created by packaging two monolithic dual-core processors together.
5.5.2
Functions
Processors that have quad cores can execute for dierent instructions simultaneously.
Computers that have a quad-core processor are expected to outperform those with
Prof. Nikam Satish D.
46
Security Systems-CCTV
dual or single-core processors. Quad-core processors are best suited for users that run
multiple applications at the same time. Software applications that work well in this
type of processing environment including re-walls, anti-virus, graphics tools, audio
and games.
5.5.3
Limitations
Not all software applications are designed to take advantage of quad-core processor
capabilities. If most of the software you use has been designed to function with singlecore processors, you may not notice much of a performance increase when switching
to a quad-core processor. Applications that are designed to run tasks simultaneously
will be able to execute these through the individual cores in the processor.
5.5.4
Benets
5.6
5.7
Network design
5.8
Storage design
5.9
CCTV Applications
47
We manage the CCTV camera network in the wycombe district from our control room
at the wycombe district council oces. Why do we need CCTV ?
A main aim of cctv is to act as a deterrent to crime and anti-social behaviour. If cctv
operates notice an incident , they can inform the police and direct them to it. Cctv
footage can also be used as evidence following an arrest.
WHAT DOES THE CCTV CONTROL ROOM DO?
Operates 24hrs a day , 365 days a year
Monitors a total of 211 cameras [ including automatic nos. plate recognition
cameras ] across the wycombe district and provides monitoring for chiltern district
council, south bucks district council and beaconseld town council
Monitors wycombe and marlow watch radio for sharing information about retail
and licenced premises crime
Answers calls from our out of hours stand by service
Answers call from car park emergency help points
Control car park bollards [ out of hours ]
5.9.1
48
Security Systems-CCTV
49
on.
Video wall
Within the control room , there will be high performance rack mount workstations
connected to a large screen LCD displays. These workstations will be powered by the
cware video wall application. Each workstation can display up to 16 or more video
streams from remote cameras on wither a predened or custom layout. The control
centre clients can manage the display of the cameras onto the video wall by simply
clicking a tab at the bottom of the screen and choosing which cameras they would like
to display. It is propose to utilise one or more of the screens as a dedicated alarm
display whereby all incoming alarms from cameras can be shown to highlight this to
the user.
50
Security Systems-CCTV
51
Chapter 6
Security Systems-Perimeter
Intrusion
6.1
Word intrusion means entering into a restricted area forcefully without permission or welcome.
Perimeter intrusion aects the security of important areas like airport, maximum
security detention centers, nuclear facilities, etc
To avoid perimeter intrusion, a perimeter intrusion detection system is created.
The principle purpose of this system is to improve situational awareness of onsite
security personnel and to report, record, detect, access and tract probable security
incidence.
The monitoring and recording capabilities also facilitate safety investigations.
Benets of this system:
1. Detection- Vehicles, Wild life or persons attempting to enter the protected
perimeter of airport.
2. Warning- Local and remote notications.
3. Incident prevention- Attempted intrusion detected easy enough and hence
action can be taken prior to the incidence.
4. Enforcement- Local security personnel and airport operations would use the
perimeter monitoring system to enforce the trac control laws.
Prof. Nikam Satish D.
52
6.2
6.2.1
53
The command and control center operators can quickly identify target of interest
and dispatch the proper response to minimize(neutralize) the threat.
6.2.2
54
Figure 6.5: Command, Control, and Communications (C3) Center Integrated with
Airport
1. Sensor
2. Video detection equipment
3. Threat assessment and alarm correlation system
4. Data communication system
Concept of operation:
1. Basic concept of perimeter protection is to detect instruction attempts even
though they are small.
Prof. Nikam Satish D.
55
2. This detection is done by using low cost, low power ground surveillance radar,
weather video surveillance camera with intelligent intrusion detection capability,
smart fencing capability optical detection and buried ber cable.
3. The detection information from these systems is fused together and superimposed
on a video picture of the monitored area to provide information on the precise
location.
4. System continuously and passively monitors the perimeter and other designated
area using rule based detection methods.
5. On detection of an intrusion attempt, alert warning in the form of radar surveillance, video display and audio warning signals are presented directly to security
personnel and to local security ocers.
6. Video cameras with digital zoom and PTZ capabilities allow operator to manipulate the video display.
7. Radar is used as primary sensor because of its superior performance in various
weather conditions.
8. Also, it has wide area detection capability.
9. FLIR (Forward Looking Infrared) technology is also used as a detection component.
10. Cameras have separate intelligent intrusion detection capability.
Prof. Nikam Satish D.
56
11. Camera provides simple, easily understood output showing what the radar detects.
12. Detection rules and system capabilities would be designed to resolve object size.
13. A local black box will be used for incident recording and for recording of the
environmental conditions at the trouble time of incidence.
14. Smart fences provide warning, detection and alerting with automatic camera
slaving and incident recording.
15. Optical detection system includes buried ber optic intrusion cable to provide
additional level of protection.
Intrusion detection system types
1. Network Intrusion Detection System [NIDS]
(a) Independent platform that identies intrusion by examining network trac
and monitors multiple hosts.
(b) It has network hub, network switch congured for port monitoring or network tap.
(c) Sensor captures all network trac and analyzes the content of individual
host.
2. Host-based Intrusion Detection System [HIDS]
(a) Consist of a agent on a host that identies intrusion by analyzing system
like calls, application logs, le system modication and other host activities
and state.
(b) Sensor consists of software agent.
(c) Application based IDS are part of category.
3. Perimeter Intrusion Detection System [PIDS]
(a) Detects and pinpoints the location of intrusion attempt on perimeter fences
of critical infrastructure.
(b) Uses ber optic cable which is tted to perimeter fence.
(c) Signal from ber optic cable is monitored and if intrusion is detected alarm
is triggered.
Prof. Nikam Satish D.
6.3
6.3.1
6.4
57
University Questions