Home
Download PDF
Order CD-ROM
Order in Print
Home
>
United Facilities Criteria CD 2
>
> Security Engineering Electronic Security Systems - index
Security Engineering Electronic Security Systems - index
Security Engineering Electronic Security Systems - ufc_4_021_02nf0001
Unified Facilities Criteria (UFC) - ufc_4_021_02nf0002
Foreword - ufc_4_021_02nf0003
New Document Summary Sheet - ufc_4_021_02nf0004
Impact - ufc_4_021_02nf0005
Contents - ufc_4_021_02nf0006
Contents - Cont'd - ufc_4_021_02nf0007
Contents - Cont'd - ufc_4_021_02nf0008
Table of Figures and Tables
Table of Figures and Tables - Cont'd - ufc_4_021_02nf0010
Table of Figures and Tables - Cont'd - ufc_4_021_02nf0011
Table of Figures and Tables - Cont'd
Chapter 1 Introduction - ufc_4_021_02nf0013
Glossary - ufc_4_021_02nf0014
Organization of the UFC
Chapter 5, Intrusion Detection Systems
Chapter2 Electronic Security System Overview
Figure 2-1. ESS as a Part of a Physical Security System
Figure 2-2. Example Detect and Delay Options
Figure 2-3. Timeline Showing Two Cases of Breach and Detection
Establish Requirements
Figure 2-4. Project Process
Figure 2-5. A Simple ESS System
Figure 2-7. Complex System With Separate ACS, IDS, and CCTV Subsystems
Figure 2-8. Networked System
Figure 2-9. Local Alarm Monitoring
Figure 2-11. Police Connection Monitoring
Table 2-3 Pros and Cons of Monitoring Methods
Chapter 3 Access Control Systems
Figure 3-1. Example Access Control System (ACS)
Figure 3-2. Advantages and Disadvantages of Using Credential Devices
Figure 3-3. Advantages and Disadvantages of Using Coded Devices
Figure 3-4. Advantages and Disadvantages of Using Biometric Devices
Life Safety Code Compliance
Table 3-1 Exit Technologies (Pros and Cons)
Event tracking/event logs
ACS Central Processing Unit (CPU)
Figure 3-5. Basic Access Control Sequence
Figure 3-6. PCU In A SCIF
Types of Card Readers
Figure 3-7. Sample Card Reader Door Configuration
Magnetic Stripe Cards
Common Access Card (CAC)
Keypads and PIN Codes
Handwriting
ACS Design Guidance
Coordination with Building or Project Architect
Figure 3-8. ACS Design Process
Chapter 4 Closed Circuit Television Systems
Figure 4-1. Example CCTV System
Digital Video Recorded (DVR)
Figure 4-2. Dimensions of a "9-inch" ESS Display
Display Setups
Figure 4-3. Example of a "Quad-Screen" Display
Figure 4-4. "Switching" Two Camera Images on a Single Display
Table 4-1. CCTV-Display Component Application Guidance
Figure 4-5. Simple Two Display Monitor Configuration
Video Matrix Switchers
Outdoor Cameras
Fixed Position Cameras
Figure 4-8. PTZ Sweep Range
Cost Considerations
Figure 4-9. Calculation for Storage of Frame Size of 25 kbytes
Illumination
Table 4-3. Light-to-Dark Ratios
Black/White Switching
Table 4-4. Characteristics of Thermal Imagers
Figure 4-10. Relative Magnification of an Object
Figure 4-11. Field-of-view and Focal Length
Figure 4-12. Calculation For a Camera in Nonalarm Mode at 2 FPS
Figure 4-13. Calculation For a Camera in Alarm Mode at 10 fps
White Balance
Video Motion Detection
CCTV Equipment Considerations
Understand the service plan
CCTV System Design Guidance
Table 4-5. CCTV Design Guidance and Recommendations
Table 4-5. CCTV Design Guidance and Recommendations - Cont'd - ufc_4_021_02nf0078
Table 4-5. CCTV Design Guidance and Recommendations - Cont'd - ufc_4_021_02nf0079
Chapter 5 Intrusion Detection System
Figure 5-1. Example Intrusion Detection System (IDS)
Figure 5-2. Separate ACS and IDS CPUs
Figure 5-3. Sample Door Configuration
Figure 5-5. Sample Roof Hatch Configuration
Motion Activated Cameras
Passive Infrared (PIR) Sensors
Table 5-1. Application Notes Interior IDS Sensors
Figure 5-6. Active Infrared IDS
Figure 5-7. Monostatic Microwave Sensor and Associated Footprints
Figure 5-8. Bistatic Microwave Sensor Operation
Figure 5-9. Typical Bistatic Microwave Layout and Guidance
Figure 5-10 Video Intrusion Detection System
Table 5-2. Video IDS Design Guidance and Recommendations
Taut wire systems.
Other Exterior Sensors
Figure 5-12. Fence Example
Table 5-3. False Alarm Causes--Exterior IDS Sensors
Table 5-4. Advantages and Disadvantages of "AND" and "OR" Configurations
Figure 5-13. Zoned Detection System
Table 5-6. IDS Design Guidance
Table 5-7 Exterior IDS Applications Table
Chapter 6. Data Transmission Media (DTM)
Table 6-1. Example Bandwidth Calculations
Fully Meshed.
Figure 6-1 Star Topographies
Figure 6-2. Ring Topographies
Figure 6-3. Fully-Meshed Topographies
Communication Redundancy
Direct Subscriber Lines (T-1 Lines).
Technology Comparision
Table 6-2. DTM Technologies for ESS
Chapter 7. Dispatch Center
Figure 7-2. Example RDC
Lighting - ufc_4_021_02nf0114
Figure 7-3. Sample Simple Dispatch Center Console Layout
Monitors
Support Rooms
Chapter 8. ESS Subsystem Intergration
Communication From The CCTV System to the ACS
Bandwidth Analysis
Bandwidth Analysis - Continued
Chapter 9. General Requirements and Cross-Discipline Coordination
Operation and Maintenance - ufc_4_021_02nf0123
Balance of Security With Convenience
Door Coordination
Magnetic locks
Backup Power
Electromagnetic Interference (EMI) - ufc_4_021_02nf0128
Physical Protection of Interior ESS.
Voltage Drop Considerations.
Figure 9-1. Attempts 1 and 2
Fire Alarm System Interface
Intercom System - ufc_4_021_02nf0133
Material Entry Control
Chapter 10. Model Design Approach
Coordination of DTM transmission lines.
Figure 10-2. Sample Cable Schedule
Figure 10-3. Functional Matrix
Schematic Design Phase
Appendix A: References - ufc_4_021_02nf0140
Appendix A: References - Continued - ufc_4_021_02nf0141
Appendix A: References - Continued - ufc_4_021_02nf0142
Appendix B: Glossary
Appendix B: Glossary - Continued - ufc_4_021_02nf0144
Appendix B: Glossary - Continued - ufc_4_021_02nf0145
Definitions of Terms
Central Processing Unit (CPU)
ElectroMagnetic Interference (EMI) - ufc_4_021_02nf0148
Personal Identification Number (PIN)
Sensitive Compartmented Information (SCI).