Perimeter protection system
- Oct 29, 2018
- 3 min read
Updated: Jan 12

Purpose:
Large plant, power plants, life support, chemical, oil, military industry, which is equipped with a perimeter fence with security systems and CCTV.
Purpose:
Increasing the security of the enterprise by automatically detecting illegally entering the territory of criminals;
Remote video surveillance of the area near the fence, video recording of events;
Demonstrating a high level of protection of the object, creating the impression of potential security among violators of an insurmountable nature.
Objectives:
Detection of intruders, overcoming the external fence of the enterprise by the like, or a break, the formation of the alarm;
Detection of intrusion and the formation of alarm when approaching the fence on its inner side;
Automatically displaying on the operator's screen images from the central mail of the alarm site from the camera and the adjacent protection zones;
Automatic activation of alarm lamps in the conflict zone (at night);
Automatic activation of video on the call station after the alarm means are activated.
Solution
1. The main barrier
It limits the territory of the company and at the same time is a physical obstacle to the intruder. On the inner side of the fence to install technical security equipment - sensors, electronic components, cameras. All equipment is grouped into security zones length of 200-400 m.
2. Vibro sensor cable - the first line of protection
Special cable is sensitive to vibrations, forms the first line of protection, connected directly to the fence. The cable is laid on top of the fence and fixed to the visor of the barbed tape. When trying to style or destroy fences MicroStrain cable leads to the activation of the alarm system.
3. The electronic module
microprocessor unit that analyzes the received cable signal and generates an alarm if signal components are found, typical of an intrusion event. Information about the perimeter of the area where the operation was carried out is displayed on the security post by the equipment running on the "isegtronic 3D" software. The accuracy of penetration of the
4. Radio wave sensors - the second line of protection
They form a second line of protection and protect the perimeter from the approach of the offender from the inside, for example, for the purpose of exchanging values over the fence. The operation is carried out at the intersection of the antenna beam.
5. Camera
It provides an overview of the protected area and is logically connected to the sensors of the first and second lines. When the sensor is triggered, the message operator protection automatically receives the image from all cameras, which are located in the control zone of the detector. Mutual pressure cameras and sensors is carried out through the scenario mechanism in the "isegtronic 3D" software
6. Perimeter lighting security
With flashlights organized perimeter lighting security (house, and anxiety) in the dark. In standby mode, only the part of the lamps, which provides minimum illumination necessary for the camera, is on. When an alarm sensor is activated, full coverage of the monitored area is automatically provided.
7. Communication
All communication lines required for the perimeter security system are laid in the ground or laid in the building enclosure. The terminal equipment of the system (alarm control devices, video servers, computers, power supplies) is located in the central office.
8. The protected area of the inner fence
The area of the fence where the perimeter security system equipment is placed is separated from the inner fence by additional fencing, the mission of which is to indicate the boundaries of the protected area. A lockable fence additionally provides passage for security guards and technical means of field service.
























Comments