I think that the protection of critical facilities and information to be there, will never lose its relevance. The information was appreciated at all times, nowadays it is no less valuable. This value can be determined not only by the amount of labor expended in its creation, but the amount of profits derived from its implementation, as well as all sorts of implications due to its leakage. Technological developments do not stand still and the pace of their development, sometimes startling. Development of computer networks, sometimes contributes to leak information. But there is also a human factor, and he does not play very important role in the theft of information. P>
Before proceeding to protect the information itself, I think, is to determine the object itself, which we will defend. After consulting with his supervisor, we decided that it will create a protection program for long-haul facilities such as airport, factory or warehouse.
Organization of extensive areas of land difficult and time - consuming work that requires a skilled approach and the availability of relevant experience. When her organization considered: specificity of terrain, climatic conditions and limitations of engineering structures. The choice of an alarm system for perimeter protection is carried out based on the expected nature of Entry: dig, climb, destruction of fences, as well as take into account the terrain, the length of the perimeter, the presence of vegetation. P>
Proper combination of detection of different physical principles of operation allows for a guaranteed ringing alarms on the system of information collection and processing complex (for trying to enter the offending object).
In our time, with a choice of security equipment is no problem. The only criterion that limits the choice - the financing. But, even with limited budget will still have plenty to choose from. The most popular signal obstruction detection capabilities are vibrating, capacitive, inductive, electromechanical. P>
Capacitive detection tools installed on the fences, which are located above the grass and snow. Inductive detection tools based on the use of wire fences may be used in a virtually unlimited levels of grass and snow.
to block the top of the gates and fences, as well as to block the approaches to them can be used by radio-wave and active opto-electronic detectors. Control of leaf gates and gates in the fence can be provided with limit switches and magnetic contacts. P>
Since types of security equipment, still quite a lot in the research paper will be considered the most popular and demanded of them. P>
To protect the object of long (perimeter length from ten to thousands of meters) to use a system of photoelectric sensors, which will run simultaneously with video surveillance system. System of these sensors can be installed on the fence, and without them. Photoelectric sensors are designed to provide accurate detection of objects without physical contact. They are distinguished by their technical characteristics and purpose, but the principle of all these devices is the same: they consist of two parts - a transmitter and receiver, the sensor emits light and the reflected light detector takes a delayed object beam of light. Occupancy sensors virtually no limited to: radiation barrier need not be linear, closed, and it is high. The user can configure the time of crossing the area sensor, if this time is exceeded, the sensor will work. Since such systems often are installed on open ground, then at very low values of this parameter greatly increases the likelihood of false positives: rays frequently cross the birds, insects, rodents, etc. Many sensors have a built-in logic and networking opportunities, as well as automatically adapt to external conditions, and therefore continue to operate reliably, regardless of changing weather conditions.
But for the most effective operation of such a system should be combined with video surveillance systems. To protect, if necessary, could see an object that has crossed the perimeter. It is possible that this may be some large animal, because of which triggered the alarm.
One of the advantages of video surveillance systems that they can operate in low light conditions and any other person unfit for work environment. But the number of simultaneously displayed objects on the screen should be limited. Since the operator is difficult to keep track of all changes occurring on the monitor. But here, technological progress does not stand still, a multi-systems use additional devices that facilitate the work of the operator. P>
At large facilities, the number of cameras can be several dozen. To enhance operator efficiency using matrix switchers. They allow you to create a flexible and extensible security system, which may include not only components of the television systems, and alarm systems and access control.
Systems IP-based cameras are considered to be the last word in video surveillance. They are, quite still, greater competition analogue systems. Number of installed IP-based system gradually reaches the level of analog video surveillance systems. The main difference from classical systems - is that in these systems, the signal is transmitted from the camera is digitized directly via the Internet. The use of such systems leads to a reduction of labor costs for installation of the entire security system, no need to wrestle with how to connect the camera to pull hundreds of meters of wire, placing them where necessary, as the standard cable for network Enhernet; connect cameras and change their location in IP-system requires less effort than in the non-network system, the possibility of unlimited copying of data without loss of quality. p>
I think it is worth noting that the potential of video surveillance systems based on IP, will gradually grow with the performance of computer systems. The more powerful computers are, the more clear and natural images to be obtained for more accurate identification. P>
Installing IP-camera is simple and boils down to assigning her IP-address. For such cameras tend image quality obtained using an image compression format M-JPEG, MPEG-4 or H.264. P>
Unlike analog security cameras, IP-camera leaves the possibility open for the formation of an architectural scheme in which you can view the camera image in real time and manage via web-browser from a PC remotely. The digital signal does not lose its quality. Cable network is IP-based cameras is simple as one standard cable can be transmitted to the image with hundreds of cameras simultaneously. P>
most appropriate to use ip-megapixel camera for monitoring production processes in manufacturing and other places where it is imperative to obtain high picture detail. P>
Thus, the main advantages of IP-cameras is:
With many advantages, IP-CCTV systems have some drawbacks.
First drawback - the quality of the image. Bandwidth limitations of communication channels lead to the use of algorithms for image compression with the irreparable loss of quality or a reduced rate video (up to 1 - 3 fps), while maintaining quality. The image loses its suitability for systems of face recognition or license plate numbers. P>
Second drawback - the quality of the matrix, and optics in the very IP-cameras. Manufacturers, seeking to make IP-cameras are cheaper and more versatile, put the average for all parameters of the matrix, which lead to "blind" the camera by night and an overload in the daylight. P>
Third drawback - the complexity of the integration of devices from different manufacturers in a system with a software third party. All variety of analog cameras is at least one interface - composite video, which is supported by any of the equipment. In the digital world is more complicated. Many manufacturers support all protocols of data transmission, but carefully concealed image coding algorithm, forcing customers to use only their utilities viewing or archiving images. Case headway in recent years, such systems VideoNet (Pentakon) and Intellect (ITV) have integrated the IP-Camera Axis, but to a wide cross-compatibility is still far. P>
Each year, the market appears a number of new or modified systems for perimeter security issued by recognized world leaders in this field. P>
general trend of development of these devices is the increasing use of digital technologies, which allow you to implement many useful functions to facilitate the adjustment procedure, diagnosis and control security systems. P>
Almost all newly developed perimeter security sensors include their integration into the communication network for the organization of extended security systems with the centralized or distributed control. P>