top of page

Influence of fencing style accommodation and equipment for perimeter security systems

  • Oct 29, 2018
  • 4 min read

Updated: Feb 19


ree


Each type of fencing has its advantages, disadvantages and weaknesses. In combination with the individual parameters (presented above) of the object, as well as based on customer requirements and capabilities, a particular hardware system for perimeter protection is selected.

Reinforced concrete fences - are very common, consisting of foundation blocks (footings) and solid reinforced concrete slabs or pillars and working group boards. Step supports more than 2.5 m. This type of fence can be equipped with various detection means, with its equipment it is not necessary to take into account the possibility of exploitation of special agents in an attempt to penetrate the territory of the object (stairs, trees, roofs of neighboring buildings, poles, etc. ) and weak protections places:

the top of the fence - is most often used when trying to penetrate;

the bottom of the fence - from undermining protection is less common, since this type of penetration is difficult to implement quickly and quietly without any preparation or the use of specialized equipment. However, in a number of projects, especially with a large perimeter length, such protection is appropriate and even necessary. Such protection methods can be applied as penetration into the concrete base of the floor or welded steel construction by 40 cm or more, anti-skid cables, seismic or magnetometer detectors.;

Sharp turns of the fence, fence adjacent to buildings and facilities, communication systems (drainage, pipeline systems, etc.);

Gates and other access points.;

  • Fencing material - often very thin wall panels, especially if poor quality materials or faulty production technology are used, and can be pierced with a hammer. Therefore, in such cases, they are protected by means of detection and alarm systems, such as vibration, triboelectric, fiber optic detectors, as well as detectors, creating the inner part of the fence or in the form of the detection zone of the three-dimensional barrier along its height;

  • metal - are very diverse in design, height, density, durability and reliability, these include the fence - from grid (forged and cast) from hollow profile, reinforcing steel, sheet metal, etc. Metal fences (especially delicate) have a presentable appearance, but are very vulnerable to penetration, they can be easily climbed, cut grinder, taken by the elevator or by other improvised means and endanger the integrity in other ways. For perimeter protection from vibration, triboelectric, fiber optic detectors, as well as applied detectors, creating the inner part of the fence or in the form of a three-dimensional barrier detection zone along its height, CCTV equipment, lighting and other detection and warning means.

  • net - the most common and available, thanks to its low cost, flexibility, ease of installation. The design and material of the fence is very unreliable in terms of penetration into the territory of the object. The integrity of the enclosure can be broken by conventional cutters, as well as the net is easy to climb (height usually does not exceed 1.5 m.), to tunnel, climb or simply crush (complete back or forward), in what for this there is no hay necesidad de utilizar un equipo especial, lo Improvised means or physical strength are sufficient.

    To protect the welded type of fencing by overcoming "through" it, radioluchevye and high-caliber wire (creating a volumetric detection zone), or multi-beam infrared detection means (creating a narrow vertical detection zone in the form of curtains) are used, but for the creation of such systems it is not allowed to free twisted wire (mesh net), otherwise you will have to process all the contact wires at least at one point, but it is very expensive and laborious process. Due to the fact that the fabric mesh is very flexible and sharp gusts of wind, ice formation, rain, snow, etc. Natural factors can deform it, making noise, vary etc., such a barrier cannot be equipped with systems with cable sensors (vibration, tribo, voloknoopticheskimi etc.), as well as detectors operating on the effect of the microphone.


    To protect the fence from the "netting" network, it is necessary to use detection means that are not directly related to the network, for example, to equip the top with infrared rays or radio detectors, and multi-path radio-luchevymi canvas or infrared detectors.

    Wooden - the shortest-lived structures exposed to climatic factors, as well as can be easily destroyed by fire, improvised means and devices. This type of fence is widely used in connection with an affordable price and without complicated installation and is used as fencing for both private and industrial buildings. The web can be a solid fence (boards fitted side by side or solid wooden boards are used) or as a picket, etc. In order to protect the perimeter of wooden fences tools similar to concrete and metal structures are used.

ree
  • Monolithic - has the highest strength and reliability

    of the design, this includes concrete, stone, brick fences, reinforced secure base. Under these difficult to make or break means a tunnel intake woven by hand without the use of specialized equipment. To protect the top of the fence can be used libye, the means described above. If there are decorative elements (grid turrets and battlements to.) It is recommended to equip the volume of the system or convert a blind path radioluchevyh, multipath infrared meansojos y otros.

  • Combined - can consist of different combinations of types of barriers, such as metal and mesh, or wood, etc. In these cases, the system will be equipped with more difficult to tailor for each type of fence would have to pick up its equipment and change in order to ensure high reliability.



Comments


 Other posts
  • Facebook Basic Square
  • Twitter Basic Square
OUR PARTNERS
Monitiring without subscrabtions
Vibration sensor for all kind of fence
vibro sensor for fence
our partner
microvawe sensor for perimeter security
bottom of page