The Intrusion Detection and Panic Alarm System (IDS) is one of the fundamental electronic security systems. Its primary tasks are to detect unauthorized intrusion attempts into a facility and to signal panic or duress situations involving personnel.
The system enables rapid threat detection, immediate alerting, and the activation of pre-programmed responses, such as acoustic and optical signaling or the locking of designated access points.
System Architecture
A typical IDS system consists of the following components:
- Alarm Control Panel: The “brain” of the system that processes all signals.
- Expansion Modules: Connected via a communication bus to increase the number of supported inputs and outputs.
- Keypads: User interfaces for supervising and operating the system.
- Buffer Power Supplies: Ensuring operational continuity in the event of an external power failure.
This modular architecture allows for flexible expansion and customization to fit the size and specific requirements of the protected facility.
Detectors and Actuators
Various types of sensors can be connected to the alarm inputs of the control panel and expansion modules, including:
- Motion Detectors: Passive Infrared (PIR), microwave, or dual-technology sensors.
- Magnetic Contacts (Reed Switches): For monitoring doors and windows.
- Vibration and Seismic Sensors: To detect forced entry attempts through walls or safes.
- Panic Buttons: For immediate manual alarm triggering by staff.
- Specialized Detectors: Tailored to the specific needs of the site.
The system’s control outputs are used to trigger:
- Acoustic and Optical Sirens: For local alerting.
- Logic Devices: To perform specific functions, such as locking doors or interfacing with other security systems.
Communication and Supervisory Integration
IDS control panels are equipped with communication interfaces that allow connection to supervisory systems or configuration software. Communication typically occurs via:
- RS232 Interface
- Ethernet Network
This connectivity allows the SSWiN system to be fully integrated with the IFTER EQU2 platform. Integration enables centralized visualization of events, streamlined alarm handling, and the execution of joint security scenarios across different building systems.
The Access Control System (ACS) is used to manage the movement of individuals to selected rooms, zones, and equipment within a facility. Its purpose is to ensure that access to protected areas is granted exclusively to authorized personnel in accordance with the established security policy.
The system allows for the precise definition of access rules, event logging, and the execution of automated reactions in the event of unauthorized entry attempts.
System Architecture
The core component of an access control system is the controller, which stores the full system configuration in its internal memory, including:
- User Permissions: Specific authorization levels for individual rooms and zones.
- Point Configuration: Logical settings for each physical entry point.
- Event Log: A record of the most recent events generated at controlled passages.
By storing configuration and events locally, the system maintains full operational autonomy, continuing to function correctly even during a temporary loss of communication with the management software.
User Identification
Readers are connected to the controller to uniquely identify individuals attempting to pass through a protected point. Depending on the technology used, identification can be performed via:
- Proximity Credentials: RFID cards and key fobs.
- PIN Keypads: Numeric code entry.
- Biometric Solutions:
– Fingerprint scanning.
– Iris identification.
– Facial recognition.
The choice of identification method depends on the specific security level required for the facility.
Actuators and Point Security
The controller also manages various hardware components responsible for the physical operation of the access point, including:
- Door Status Sensors: Monitoring whether a door is open or closed.
- Exit Buttons: For request-to-exit (REX) functionality.
- Emergency Buttons: Manual override for immediate evacuation.
- Locking Devices:
– Electric strikes.
– Electromagnetic locks (maglocks).
– Other specialized access control mechanisms.
This setup ensures complete oversight of every passage and enables rapid responses during alarm situations.
Communication and Management Integration
SKD controllers are typically equipped with an Ethernet interface, facilitating communication with management systems or configuration software.
Integrating the SKD system with the IFTER EQU2 platform enables:
– Centralized Visualization: Real-time monitoring of all access points on graphical maps.
– Event Handling: Streamlined management of alarms and system logs.
– Security Scenarios: Automated cross-system actions (e.g., unlocking doors during a fire alarm).
– System Interoperability: Linking access control events with CCTV or intrusion detection systems.
The Fire Alarm System (FAS) is responsible for the early detection of fire hazards and the initiation of actions aimed at mitigating the consequences of a fire, focusing on both life safety and the protection of technical infrastructure.
The system enables rapid fire detection, alerts building occupants, and triggers pre-programmed scenarios, such as smoke extraction, aeration, and the automatic unlocking of evacuation routes.
System Architecture
The core component of an SSP system is the Fire Alarm Control Panel (FACP), to which detectors and actuators are connected via fire loops.
The following devices are typically installed on these fire loops:
- Smoke Detectors: For early detection of visible or invisible combustion products.
- Thermal (Heat) Detectors: Responding to a specific temperature threshold or rate of rise.
- Manual Call Points (MCP): Enabling occupants to trigger an alarm manually upon discovering a fire.
- Input/Output (I/O) Modules: Interfacing with external hardware.
Automatic sensors detect the first signs of fire, while MCPs provide a critical human interface for immediate alarm activation.
Fire Control and System Interoperability
I/O modules connected to the fire loops are used to execute key fire safety controls, such as:
- Activating Smoke Extraction Systems: Clearing escape routes of toxic fumes.
- Controlling Aeration: Managing air pressure to prevent smoke from entering stairwells.
- Unlocking Access Control Points: Ensuring all doors on evacuation routes are fail-safe.
- Initiating Evacuation Procedures: Triggering Voice Alarm Systems (DSO) or sirens.
By managing these functions, the SSP system acts as the overarching fire safety authority within the facility, coordinating with various other technical systems.
Communication and Supervisory Integration
Fire alarm control panels are equipped with communication interfaces that allow integration with supervisory systems and configuration software. Communication typically occurs via:
- RS232
- RS485,
- Ethernet.
Integrating the SSP system with the IFTER EQU2 platform or an FSI-class system enables centralized visualization of fire alarms, their location on building floor plans, and the implementation of advanced control scenarios across various safety systems.
Closed-Circuit Television (CCTV) systems are used for the visual surveillance of a facility, event recording, and supporting operators in assessing security situations. The fundamental components of the system are cameras and devices responsible for recording, archiving, and managing video footage.
Video monitoring is a key pillar of modern security systems, enabling both real-time observation of the facility and the analysis of historical events.
Video Recording and Management – VMS
In the past, video recording was primarily handled by dedicated hardware devices with limited functionality. Today, this role is increasingly filled by VMS (Video Management System) solutions, which are computer-based systems running on standard operating languages.
Modern VMS solutions offer:
- High flexibility and ease of scalability.
- Support for numerous cameras and multiple video streams.
- Advanced archiving functions for long-term data storage.
- Integration with video analytics systems.
- Interoperability with other security systems.
Cameras – Task-Specific Selection
A wide range of specialized cameras is available on the market, designed for various applications, including:
- Small room monitoring: Compact units for indoor use.
- Large open spaces: High-resolution or PTZ (Pan-Tilt-Zoom) cameras.
- License Plate Recognition (LPR): Specialized sensors for identifying vehicle plates.
- Standard lighting: Cameras optimized for well-lit environments.
- Low-light/No-light: Infrared (IR) or thermal cameras for nighttime surveillance.
The correct selection of a camera for a specific task is crucial for the effectiveness of the facility’s protection and the quality of the resulting video material.
Communication and Video Transmission
CCTV cameras typically communicate via Ethernet networks and can simultaneously provide several video streams using protocols such as:
- RTSP (Real Time Streaming Protocol)
- ONVIF (Open Network Video Interface Forum)
This allows for the parallel transmission of images to different systems and flexible management of the quality and purpose of individual video streams.
Integration with Supervisory Systems
A supervisory system, such as IFTER EQU2, can communicate with the CCTV system in two ways:
- Directly with the cameras: Pulling video streams, utilizing built-in motion detection, or reading license plate data.
- Via the VMS system: Gaining access to live video, archived recordings, and analytical functions implemented within the VMS.
This integration enables coherent event handling, such as the automatic display of video feeds in response to alarms, and links video monitoring with other building security systems for a comprehensive safety overview.
–
Perimeter security systems complement standard alarm systems by providing early detection of unauthorized intrusion attempts onto the grounds of a protected facility. Serving as the first line of defense, they identify threats before an intruder can even reach the building or internal zones.
By detecting threats at the property boundary, these systems significantly increase the response time for security personnel and improve the overall effectiveness of incident prevention.
Types of Perimeter Systems
Various detection technologies are used depending on the nature of the facility, the terrain, and the required security level.
Commonly used solutions include:
- Ground-buried detection cables: These provide a high level of detection and are virtually impossible to sabotage as they are invisible to the intruder.
- Fence-mounted detection cables
- Sensors mounted directly on the fence: Devices mounted directly on fences to detect vibrations, cutting, or climbing.
- Microwave barriers: Create an invisible detection zone using electromagnetic waves between a transmitter and receiver.
- Infrared (IR) barriers: Utilize multiple active IR beams; an alarm is triggered when the beams are interrupted.
- Advanced Video Analytics: Cameras equipped with infrared and AI algorithms to detect specific movements or behaviors (e.g., loitering or line crossing).
Such a wide range of technologies allows the perimeter security system to be precisely tailored to the specific characteristics of the protected facility.
Alarm Verification and CCTV Integration
To maximize effectiveness and minimize false alarms, perimeter systems are frequently integrated with video monitoring (CCTV).
Cameras supervise the space between the perimeter fence and the building, allowing for:
- Visual verification: Instantly confirming whether an alarm was triggered by a human or an environmental factor (like an animal or wind).
- Threat assessment: Quickly evaluating the severity and nature of the intrusion.
- Automated display: The supervisory system can automatically “pop up” the relevant camera feed the moment a perimeter sensor is breached.
Communication and Integration
Perimeter systems utilize various interfaces to work in tandem with the broader security ecosystem:
- Digital Interfaces: For direct communication with management software and configuration tools.
- Relay Contacts: Allowing the perimeter system to send alarm signals directly to Intrusion Detection (SSWiN) control panels.
Integrating perimeter security with the IFTER EQU2 platform enables centralized alarm handling, visualization of events on interactive site maps, and the execution of coordinated safety scenarios involving all building systems.
A Building Management System (BMS) is used to supervise and manage the technical installations within a building. Its task is to ensure the proper functioning of systems responsible for the comfort, energy efficiency, and operational safety of the facility.
The system enables the monitoring of installation operating parameters, the analysis of utility consumption, and the execution of automated responses based on defined conditions and scenarios.
Scope of the BMS System
Building automation systems typically include the management of:
- Heating
- Cooling (Air Conditioning)
- Ventilation control (HVAC)
- Lighting management
- Utility consumption measurement systems, such as:
◦ Electricity,
◦ Water,
◦ Heat,
◦ Cooling energy.
The system provides ongoing supervision over the operation of these installations and allows for their optimization in terms of energy consumption and operational costs.
Operational Logic and Automation
The BMS allows for the definition of relationships between variables and the operating states of devices. It is possible to create action scenarios based on:
- Schedules: Time-based automation.
- Value thresholds: Triggers based on temperature, pressure, or usage levels.
- Event triggers: Specific incidents that spark a pre-defined reaction.
- Logical dependencies: Interactions between different technical installations.
This allows the system to automatically react to parameter changes, environmental conditions, or the state of the facility, while also enabling manual control of installations from the supervisory system level.
Integration with the Management System
The BMS can be integrated with the IFTER EQU2 platform, which acts as the central supervisory system. This integration enables the visualization of operating parameters, event handling, and the execution of scenarios that combine building automation with other systems functioning in the facility.
Linking automation with security systems allows for:
- Lighting control: Automatically turning off lights when no people are detected in the building (via access control or motion sensors).
- Energy savings: Reducing heating or cooling intensity once the alarm system is armed (indicating an empty building).
- Emergency safety: Safely shutting down specific installations (such as ventilation or gas valves) in the event of a fire alarm.
This approach creates a cohesive building management environment, integrating automation and security within a single, unified system.