Showing posts with label Fire Detection. Show all posts
Showing posts with label Fire Detection. Show all posts

Friday, January 1, 2021

Upcoming Trends in security & surveillance for 2021

Upcoming Trends in Security & Surveillance for 2021 

It’s fair to say 2020 has not been the year any of us were expecting. It has been challenging, we have all made sacrifices, and there are still further obstacles in our path as we try to get back to “normal”. SARS-CoV-2, the coronavirus strain that causes COVID-19, is a highly contagious respiratory illness that is affecting lives worldwide. Epidemics and pandemics have been threatening the human race time and again. SARS, H1N1, Ebola, and more have shown their teeth in the past, but with each such outbreak, we are learning new ways of fighting and managing such unexpected diseases that can potentially kill millions of people. Technology cannot prevent the onset of the pandemics; however, it can help prevent the spread, educate, warn, and empower those on the ground to be aware of the situation, and noticeably lessen the impact. The pandemic of 2020 has certainly changed the landscape for us all, not just the security industry. It has made us a lot more aware of touch points, crowded gatherings and personal space. It is inevitable that technology will adapt as our lives do. We have already seen manufacturers race to bring us solutions such as body temperature management, face mask detection and crowd control etc. It’s time to change. It’s time to get better. It’s time to learn more and sharpen our skills.’

During pandemic Webinar is boom through Zoom. Google meet, Gotowebiner etc in security safety automation industry. System Integrator, End Users, professionals are learn many things through OEM direct Webinar. US already ban China made surveillance product. In india Atmanirbhar Bharat (self-reliant India) is the vision of the Prime Minister of India Narendra Modi of making India a self-reliant nation. The first mention of this came in the form of the 'Atmanirbhar Bharat Abhiyan' or 'Self-Reliant India Mission' during the announcement of the coronavirus pandemic related economic package on 12 May 2020. Known china CCTV OEM are thrown out. Yes, it’s true, India don’t have much infrastructure to generate Camera manufacturing plant, it will take time at list 5 year. Within this time, we can follow BIS website to get information about selected camera / NVR model are china factory make or not. Low cost and high cost both option camera you can found. If you found that model belongs to china factory immediately change with Closest or Alternative Substitute. Now we check what will be next in 2021 for Security Safety & Automation.

OSHA new Policy:

The COVID-19 outbreak has caused almost all firms to deploy the work from home practice for employees. While some may be used to this, others may feel lost in the exercise. While not all Indian are able or fortunate enough to work from home, many have transitioned to telecommuting and virtual work over the last week or two.

While employers’ responsibilities for the safety and health of their at-home workers is less than those in the office or onsite, some do still exist. OSHA distinguishes between home offices and other home workplaces.
OSHA’s compliance directive on home offices is pretty clear:
·     “OSHA will not conduct inspections of employees’ home offices.
·     “OSHA will not hold employers liable for employees’ home offices, and does not expect employers to inspect the home offices of their employees.
·   “If OSHA receives a complaint about a home office, the complainant will be advised of OSHA’s policy. If an employee makes a specific request, OSHA may informally let employers know of complaints about home office conditions, but will not follow-up with the employer or employee.”
What about recording injuries while working at home? If an employee is working at home, when could the injury be considered work-related? OSHA answers the question:
How do I decide if a case is work-related when the employee is working at home? Injuries and illnesses that occur while an employee is working at home, including work in a home office, will be considered work-related if the injury or illness occurs while the employee is performing work for pay or compensation in the home, and the injury or illness is directly related to the performance of work rather than to the general home environment or setting.

Video Intercoms:

One of the newer phenomena we’ve faced in the world has been the concept of physical distancing, brought to light by the global coronavirus pandemic. This has created challenges not only socially, but for technologies that were not designed to accommodate what may be the new norm. Video intercoms are really going to be playing a bigger part in the way facilities are organized and processes are organized. We’re seeing some customers that are using this to limit having to actually go inside a room in a healthcare facility, for example, to limit the chances of transmitting something all while maintaining that frequency of checking. One of the main benefits of door intercoms is, simply put, the ability to limit — or even eliminate — human contact at the door. In this pandemic, an immediate need is providing [the customer with] a way to create physical distancing upon entry. This can also be applied to healthcare workers. Integrators have to understand this greater demand for security at the door and deliver solutions to their customers. Everybody is having food, groceries and other things delivered to their door. Demand for that is very high right now. Additional security at the door or the gate is something people want and need.

Home Over IP:

Amazon, Apple, Google and the Zigbee Alliance announced a new working group that plans to develop and promote the adoption of a new, royalty-free connectivity standard to increase compatibility among smart home products, with security as a fundamental design tenet. Zigbee Alliance board member companies such as IKEA, Legrand, NXP Semiconductors, Resideo, Samsung SmartThings, Schneider Electric, Signify (formerly Philips Lighting), Silicon Labs, Somfy and Wulian are also on board to join the working group and contribute to the project. The goal of the Connected Home over IP project is to simplify development for manufacturers and increase compatibility for consumers. The project is built around a shared belief that smart home devices should be secure, reliable and seamless to use. By building upon IP, the project aims to enable communication across smart home devices, mobile apps and cloud services, and to define a specific set of IP-based networking technologies for device certification.

Video Surveillance:

The global CCTV camera market is anticipated to generate substantial revenue of more than to USD 38 billion till 2021. Asia Pacific and America holds the largest share of the global market and act as one of the main driver for the market. According to “India CCTV Camera Market Outlook, 2021”, the India CCTV Camera market is expected to grow with a CAGR of more than 26 % in the period from 2016 to 2021. Technology wise non-IP dominates the Indian market but in the coming years IP is expected to take the lead soon. Non -IP technology constitutes of analog and HD CCTV cameras. Analog is technology which is in a depleting stage and it share is expected to be taken by the IP technology and the HD type CCTV camera. Dome typed cameras are the most widely used cameras in any sectors. Commercial segment is the driver of the CCTV market in India with the increasing count of SOHO’s and SME’s. With the increasing security concerns, residential sector would also be one of the factors for the increasing market. As criminal activities are more in the northern region of India, North dominates the market in terms of revenue.

Facial Recognition:

Facial recognition is the common theme of the week’s top digital identity news with retail applications, new edge servers, and biometric border control deployments around the world. A new software partnership on biometric cryptography has also been announced, a report shows the importance of selfie biometrics in fraud reduction published, and the industry, as well as society more broadly, continues to contend with the issue of algorithmic bias. Facial recognition solutions identify a person by forming a unique code built on algorithms from multiple points on a person’s face, including nose, chin, lips, eyes and jaw. However, when a person wears a mask, many of these key points are not visible. Faces were often completely missed, and unsuccessful or false identifications were high. Those are know this wearing masks can reduce the accuracy they avoid to take Facial recognition

Video Verification:

The city currently has over 1,000 video surveillance cameras deployed across the metropolitan area and is expected to reach over 1,700 security devices. Now it’s very difficult to watch every moment on comment control center. It’s very important to see what camera saw. Through Video Auditing software the task are easy. Day by day its increase.

Rise of Mobile Credentials:

There has been a tremendous uptick in the popularity of mobile credentials. Research firm IHS Markit has reported that mobile-based credentials are the fastest-growing access control product. Globally they have experienced nearly a 150 percent growth between 2017 and 2018. Estimates show that more than 120 million mobile credentials will be downloaded in 2023 by end users. A 2019 survey by HID estimated that 54% of businesses had upgraded or would upgrade to a mobile access control system in the next three years. Though access cards still play a powerful role in the access control market, we are seeing a strong shift towards mobile access control like various companies. The use of mobile-based credentials is the logical next step for the physical security and access control industry. The fact that people are always with their smartphone helps popularise this trend. Phones aren’t just phones anymore. They play a bigger role in day-to-day life and this also includes access control. Mobile credentials can revolutionise the industry, eliminating the need to carry and wipe a card. Instead, a phone’s technology can be used to authenticate identity and grant entry. This gives greater flexibility, improves privacy and can also lower the maintenance costs of credential management for end users. Additionally, a clear advantage is that employees are more likely to carry their smartphone with them and less likely to lose them compared to NFC transponders.

The advantages of using virtual access control cards, which are stored on smartphones, are obvious: less logistics when distributing, revoking or replacing cards and many more ways to integrate with technology on the phone or other hosts and devices in the network. Often also the user experience of mentioned as a benefit of mobile access: users do not have to fill up their wallets with a pile of RFID cards but can conveniently carry them around in their phone. The networking capacity of smartphones would even be a great way to overcome the limitations of offline access control installations where access rights would be stored on smartphones instead of cards.

Security in the cloud:

After the entrance of IP-networking in security around twenty years ago, it is one of the major current trends in our industry: cloud based security systems. In the context of physical security one could define cloud based systems as those systems with a topology that looks like this:
·       A server that is ‘in the cloud’ and can be accessed from virtually anywhere;
·       Devices that connect over an IP-network to that central server;
·       Web based administration of the system;
·       Commercially based on a service or transaction model with recurring fees.
Variations exist. But in general this pretty much sums up what to expect when reviewing a cloud based system.
We see this set-up currently already in several categories:
·               Video Intercom Systems, like the systems from Akuvox, which are based on video intercom stations that connect to a cloud based server, which also enables use of apps as virtual door phones.
·   Mobile access systems that enable the use of virtual credentials on smartphones. and that are managed from a cloud based server.
·               Video management software now also is offered by several vendors as a cloud service, for example: 3dEYE, Open Eye, and VIVOTEK.

IoT security topologies:

The Internet of Things idea has been around for ages. It was predicted over a decade ago that billions of device will connect to the Internet. Sensors all around us will deliver data to the cloud. Feeding data into ‘big data’ processing applications that will give us access to a wealth of information. Devices also connect the cloud. To be part of applications that can be used and managed from virtually any location. For security it would mean that it very much is related to cloud based security applications. The additional step here would be that camera’s, readers, intercoms, intrusion detection sensors and biometric stations would connect directly to the cloud based service. Installations would be easier and more scalable. Access control systems could be deployed at any door and still be real online access control systems. Video surveillance would be available at any location that would require security monitoring. Security sensors and devices can be rolled out everywhere.

Smartphones and wearables

Using smartphones or other wearable devices in security has been a popular idea for many years. Smartphones and tablets often can be used to access the administration Interface (GUI) of the access control, video management or PSIM systems. That hardly is considered an innovation. Smartphones can also be used as virtual access control and identity cards in mobile acess systems. In addition it appears that also biometrics like facial recognition and fingerprint identification are now available on smartphones. It appears logical that smartphones with their native connectivity features are an interesting extension of security systems.
Mobile credentials enable both multimodal and multi-factor authentication. Multimodal means proving identity and/or gaining access using at least two separate biometrics, or permitting access through any one of various credentials, such as a smartcard or PIN. Multi-factor authentication involves proving identity and/or obtaining access via at least two methods or credentials. Multi-factor authentication is widely used in digital access. For example, when an employee logs onto a company’s system, he or she must use a secondary method to verify identity via a one-time token via SMS or other app. It is also burgeoning in physical access applications. Although two-factor authentication has been mandated in regulated industries, it is emerging in unregulated verticals as well. The development of multimodal readers will continue to fuel this trend.
Believers say that people prefer carrying around their smartphone over additional cards. They refer to the technical possibilities that smartphones offer in areas like user convenience and integration of systems.

Identity analytics and AI

A relatively new field in security is identity analytics. Seeing through identity and security related data in an automated way. To monitor use of access priviliges and consequently alter those access rights. The idea comes from the IT industry and that is where you will see it deployed mostly now. Recent research indicates that this is an emerging market with high anticipated growth potential. It would make sense to include physical security into these applications.
Believers will say that, like with video analytics, many more security related events can be actively monitored, more incidents can be detected and a tighter security regime can be implemented without hindering users unnecessarily.
It remains to be seen what the future will bring exactly. But intelligent security related data analytics certainly will have a place in modern enterprise security management applications.

Centralized Control of Fire Detection:

The principle of networking involves connecting several panels together to form a system. Inputs on one panel may activate outputs on another, for example, or the network may allow monitoring of many systems. Networking is often used in situations where one panel is not large enough, or in multiple-building situations. Networking is also an effective way to decouple systems to reduce the risk of a large portion of a facility going offline at any time due to system failure or maintenance requirements. Sub-Networks can be created using either hardware or software architectures. Networked systems normally are more costly and involve additional training and system configuration for successful implementation.


From this year many customer implement centralised monitoring & controlling of Fire Panel through creating WLAN communication with Graphic software. Due to cost effective graphical monitoring control software only industrial & Enterprise business implement the same. Also it will possible if same brand panel is there in all location.

BMS Workforce:

The growth of IBMS market is observing hindrance due to lack of availability of skilled workforce. The Intelligent building management systems are usually complex and require skilled personals to operate. The cost of training operators to handle complex equipment such as HVAC control, outdoor controls, security and access control, energy management systems and smart meters is quite high. Owing to which, small scale companies cannot afford to invest large capital to train their operators. This factor is likely to affect the growth of the IBMS market in the country.
But due to COVID-19 many OEM & society presence webinar program to educate more. This will be effect in this 2021-22. The region segmentation for the IBMS market has been done by South IndiaWest IndiaNorth IndiaEast India. Which include general lighting controls, communication systems, security controls, HVAC controls, access controls, outdoor controls entertainment controls and others. The India IBMS market is segmented by application into: hospitality, residential and retail, life science, office space, manufacturing, and energy and infrastructure. All these segments have also been estimated on the basis of geography in terms of revenue (USD Million).

The goal of building management systems was—and still is—to help optimize building performance by

·       Providing data on core building operational systems, specifically HVAC. 

·       Enabling the automatic control of a building’s main operating functions. 

IoT for buildings has the same goal of performance optimization (and by extension, saving money) through data and automatic control, but advanced technology takes these aspects many steps further than a traditional BMS system can. 

We wish you all the very best for 2021 and we look forward to working with you for many years to come.


Wednesday, July 10, 2019

System Integration for High-rise Buildings

System Integration for High-rise Buildings

Integrated systems, or systems integration (SSA – Security Safety Automation), is the process of bringing together component sub-systems into one functional system. It provides a system with coherence by making the parts or components work together, or 'building or creating a whole from parts.

A component means HVAC / VRV, Plumbing, Fire Fighting with Detection, Electrical Systems, Lifts, elevators, Intrusion Alarm, Access Control, UPS & Lighting Automation etc. The result of integration creates BMS.  The powerful combination of open systems protocols and a scalable platform means the BMS can help support growth and expansion of the system in the future. So Building Automation System (BAS) or Building Management System (BMS) is the automatic centralized control of a building's heating, ventilation and air conditioning, lighting and other systems through a building management system or building automation system. The objectives of building automation are improved occupant comfort, efficient operation of building systems, and reduction in energy consumption and operating costs, and improve life cycle of utilities. The Building Automation System (BAS) core functionality is to keep building climate within a specified range, light rooms based on an occupancy schedule, monitor performance and device failures in all systems and provide malfunction alarms. Automation systems reduce building energy and maintenance costs compared to a non-controlled building.
Now we consider a building having 62 floors height is 268 meters (The 42 is a residential skyscraper in Kolkata in the state of West Bengal in India.) tower that is technically advanced, sustainable, and forward-looking. Designed by Hafeez Contractor Architect. Excerpts from the mechanical, electrical, plumbing (MEP), communications, security, and sustainable design specification sections for that building are provided below. For our reader this is just an examples, we are not confirm reality of System integration at “The 42”.

Mechanical
Chilled water:
The building’s cooling will be provided by offsite district chilled-water production plants via pipe connections from street distribution to the energy-transfer room located at the lower level.

Heating systems:

  •        Electric-resistance heating coils will be provided with each dedicated outside air handling unit, as well as each amenity and lobby air handling unit.
  •          Electric-resistance baseboard heaters will be provided along perimeter windows and walls for the ground-floor lobby and at all floors with perimeter glazing higher than 9-ft 6-in.
  •      Baseboard heaters will be interlocked with the fan-powered box serving the respective perimeter area.
  •       Electric-resistance baseboard heaters along perimeter windows and walls for ground-floor retail areas will be provided by the tenants. Baseboard heaters shall be interlocked with the respective air conditioning units provided by the tenants.
Air conditioning
·    Four factory-packaged dedicated outside-air units will be provided in the Level 20 mechanical room to provide minimum code-required ventilation air to all of the typical office floors.
  •         Conference center and fitness area: Variable-volume factory package units will be provided in the mezzanine space above the Level 2 locker room and toilet space to serve the conference center and fitness areas.
  •         Ground-floor lobby: A variable-volume factory package unit will be provided in the basement level to serve the entrance lobby and lounge.

Duct distribution systems
Perimeter offices and interior offices will be supplied from separate variable air volume series flow-fan-powered boxes, system pressure-independent direct digital control (DDC) by the building automation system (BAS) or Building Management System (BMS), low leakage and low-pressure drop for space-temperature control. Perimeter fan-powered boxes will include electric heating coils for envelope heat.

DDC/BAS network, communication, and software
  •   The DDCs and BAS shall provide central control and monitoring of major HVAC equipment. The DDC/BAS will consist of two tiers or levels of networks.
  •    The first-tier network shall provide connectivity between all DDC network controllers (B-BC), the BAS server, and dedicated BMS operator workstations. It shall be Ethernet-based and shall serve as a backbone for all base building technology systems. A virtual local area network (VLAN) may be portioned by the owner and dedicated for BMS communications.
  •    The second-tier networks shall provide communications from each DDC network controller (B-BC) to all DDC controllers, variable-speed drives, equipment-mounted controllers, and other smart field devices.
  •    The BAS shall have custom graphical displays to monitor the operation of HVAC equipment connected to the BAS. User displays shall also include floor plans. Graphical displays shall be submitted electronically to the client and the engineer for review.
  •    Each DDC shall connect to a communication network for central monitoring, remote override, setpoint adjustment, history collection to archive, and alarm annunciation. The BAS shall be capable of generating both advisory and critical alarm-notification messages via email to the designated recipients as determined by the client. Each DDC shall monitor and control the associated HVAC unit in a stand-alone configuration, independent of any other DDC.

BMS hardware features 
All BMS network communications shall use a physical layer of Ethernet and EIA-485. Ethernet cabling will be provided by structured cabling. EIA-485/twisted pair cabling shall be provided by the DDC contractor.

Electrical Systems
Electric service
  •          Primary distribution: Service feeders, originating from separate networks, to the project via underground concrete-encased duct banks. These duct banks shall enter into a utility-owned main-line switching station and transformer vault located in the basement level.
  •          Secondary distribution: The building shall be provided with service entrance switchboard rooms and vertically aligned branch electrical closets strategically located to provide an efficient and economical distribution of wiring systems throughout the facility.
Lighting
  •          Provide lighting systems for base building lobbies; electrical, telephone, mechanical, and elevator equipment rooms; parking; service areas; corridors; stairways; toilets; storage rooms; dock area; elevator pits; supply and recirculation fan plenums; roof hatches; exit signs; etc. The lighting system shall be complete with fixtures, ballasts, drivers, lamps, branch circuits, and controls to interface with BMS and accessories.
  •          Daylighting and shade controls.
Plumbing
Domestic cold water
  •          Provide dual domestic water services connected to the water main in the street per the local water department’s requirements and route into the building’s dedicated pump room.
  •       Provide and install domestic-water service, water meters, and all associated valves on the water services as required by the City and a branch with water line with a double-detector check-valve assembly for continuation by the fire protection contractor.

Storm water system
  •         Furnish and install roof drains at all roofs along with the interior drainage system and downspouts for a complete operable storm water system.
  •          All storm/waste piping, above grade level, shall be connected to a gravity storm sewer. Collect all storm piping and route to the storm detention structure included with overflow. The civil engineer will continue the sewer from that point.

Fire Protection
NFPA 13 apply for High rise building,
Standpipe system
  •          A standpipe system shall be provided for the new proposed high-rise building.
  •      The water supply for the combination sprinkler and standpipe riser shall be hydraulically calculated to supply a residual pressure of 65 psi at the top most outlets, with a flow rate equal to 250 gpm plus actual sprinkler system demand but not less than 500 gpm approx. Through the flow switch BMS get data.

 Automatic sprinkler system
  •      A supervised automatic sprinkler system shall be installed throughout the entire premises, except in dedicated electrical transformer rooms, dedicated main-building switchboard rooms, dedicated electrical closets or rooms where voltage exceeds 600 V, base building life safety emergency generator rooms, elevator shafts, and elevator machine rooms.

Fire Detection
Most fire alarm systems on the market today have the capability to output fire alarm signals over BACnet protocols. This is accomplished via a BACnet gateway that allows the fire alarm system to output signals to third-party equipment as BACnet objects. The third-party equipment can be configured to read and react to data received from the gateway. In order to ensure life safety is not impacted by any integrated non-fire system, a listed barrier gateway, integral with or attached to each control unit or group of control units, as appropriate, must be provided to prevent the other systems from interfering with or controlling the fire alarm system.

The BACnet interface is a standalone piece of fire alarm equipment, so it is constantly online and goes offline only if it loses both primary and backup power, or if it is being serviced. Therefore, there is no downtime or signal restoration necessary when the fire alarm system is reset. If any of the fire alarm points that are being supervised by the gateway change state at any time, the BACnet gateway will automatically change the status of the BACnet objects associated with those points.

Communications
Spaces and Pathways
  •     Spaces—TEF: Two separate telecommunications entrance facilities will be located on the basement level. These are small rooms where the telecommunications service providers will transition their outside-plant cabling to indoor-rated cabling and shall bond the cable sheaths. Multiple service providers may enter the building via the same TEF. They will each be given proportioned wall space to place their splice equipment.
  •      Pathways—incoming services: conduits from the property line are specified for incoming serve to each of the two TEF rooms.

Structured Cabling
Backbone
  •      Vertical fiber backbone: One 12-strand OM4 multimode fiber-optic cable will be provided from telecommunications room to every 5 floors as well as the basement.
  •        This backbone is for the building’s network and other systems the building wishes to deploy. It will allow the IP devices (BAS controllers, lighting controllers, security-access control panels, security cameras, etc.) on each group of three floors to connect to the building LAN access switch.
  •          There may be a consideration for additional single-mode fiber-optic cabling if it is required to support a distributed antenna system implementation.

Data Network
The data network provides the delivery of information services throughout the building. The data network is a single, unified physical network that is comprised of several independent logical networks. A wide variety of network-enabled devices use the data network utility to send and receive information. A device’s ability to communicate with other devices is governed by the security policies that are implemented throughout the data network. By designing and implementing the data network to be flexible and adaptive, this reduces the management and operational expense of reconfiguration once the network is installed.
The systems/devices that will use the unified data network include the following:
  •        Security (access control, video surveillance, visitor management, intercom).
  •        Building control systems (integrated automation system (IAS), BAS, lighting/shade controls, elevator controls).
  •        Audio/video (digital signage, background music, control system).
  •         Wireless.
  •        User devices (PCs, phones, printers, multifunction devices).
  •        Servers.

Voice system
The main voice system will be completely Voice over Internet Protocol, with voice servers residing in the hosted offsite. The voice system shall have a redundant voice server with automatic failover capabilities.

Distributed antenna system
The building will deploy a DAS that will provide cellular enhancement for multiple wireless carriers over a common infrastructure. It also will allow for two-way radios used by building operations staff to utilize the same infrastructure.

Security system
General description
System purpose: The security system is designed to control authorized access and prohibit unauthorized access to private or restricted spaces and to record access events for later investigation or audit purposes. The security system will consist of card-reader access control, Boom barrier / Flap Gate, visitor management, intercom, and security camera subsystems. Duress- or panic-alarm systems and intrusion-alarm systems are not included.

Access Control System (ACS)
The purpose of the ACS is to control authorized access and prohibit unauthorized access to private or restricted spaces and to record access activity for later investigation or audit purposes. The ACS will consist of card readers, data-gathering panels, door controls/sensors, and door alarms.

Visitor Management System (VMS)
·         The purpose of the VMS is to register and log visitors, print badges, track visitors, and provide reports.
  •        The VMS will consist of a standard PC with a camera and badge printer for lobby reception desk use and a stand-alone kiosk for visitor self-registration.
  •          The system will be able to register and log visitor information.
  •          The VMS shall issue visitor credentials (“digital credentials”) to mobile devices to allow those devices to allow access via turnstiles and at elevators based on specific access-authorization rights per tenant.

Video Surveillance System (VSS)
The purpose of the security camera system is to augment the ACS by providing a means to remotely assess activity at access points and to record video images of activity at those locations for later investigation or audit purposes. Not mandatory to use same display with BMS. The security camera system will consist of IP cameras and a network video recorder (NVR).
  •        NVRs will have a TCP/IP network interface for control and operation.
  •        All camera monitoring, playback, and control will be via standard web browser interface.
  •        Personnel with proper system authorization will be able to access live and/or recorded video from desktop PCs. Video verification; “see” what camera “saw” is most valuable part in high rise building. Not mandatory to install AI based Costly video analytics software.
  •        The cameras will be high-resolution color cameras. Additional camera features, such as low-light capability and wide dynamic range, will be provided with specific cameras where those features will be necessary to provide a quality image.

Smart buildings need to meet the expectations of the occupant and technologies must work together flawlessly to provide a personalized experience, now for the security integrator, the key is how do you create an integrated security framework that allows that customer to benefit from that data? To execute this doesn’t look back your cost, find good services, good OEM with quality product & good SI or SSA Integrate Company.

Ref:
http://bhadrafiresafety.blogspot.com/2019/02/nfpa-13-in-high-rise-buildings.html

If you found this artical is gain your knowledge then you can donate some amount through below bank details:-
A/C Name: Arindam Bhadra
A/C no: 19251050015468.
Name of Bank: HDFC BANK.
Branch: Belgharia.
RTGS/NEFT IFSE: HDFC0001925
Your support is highly appreciated to continue / maintain this blog.

Friday, September 4, 2015

About PSIM

What is PSIM?

PSIM stands for Physical Security Information Management, however it certainly requires further explanation about why it is important. Firstly, the future of all security systems is IP based, this means that CCTV, Access Control, Intruder and Fire Alarms will be computer based. Analogue and standalone systems are becoming more redundant and technology is moving rapidly towards converging all these IP based systems onto a single software management platform.
Assuming your security systems are IP based, then PSIM software packages will make an incredible difference to way you secure your school, business or public sector space. This means facility or building management staff can centralise all systems onto a single platform and remotely manage the building.
The key attributes of a PSIM system are:
1. Collection: Device management independent software collects data from any number of disparate security devices or systems
2. Analysis: The system analyses and correlates the data, events, and alarms, to identify the real situations and their priority
3. Verification: PSIM software presents the relevant situation information in a quick and easily-digestible format for an operator to verify the situation
4. Resolution: The system provides Standard Operating Procedures (SOPs), step-by-step instructions based on best practices and an organisation’s policies, and tools to resolve the situation
5. Reporting: The PSIM software tracks all the information and steps for compliance reporting, training and potentially, in-depth investigative analysis
6. Audit trail: The PSIM also monitors how each operator interacts with the system, tracks any manual changes to security systems and calculates reaction times for each event
PSIM is considered essential for Control Rooms or Command and Control Operations, as the software, provided all the systems are IP based, converge all the disparate systems onto a single platform to provide full management. Common security systems integrated onto a PSIM platform are:

- IP Access control systems
- IP CCTV systems
- Fire detection
- Video wall
- Intrusion detection systems
- Perimeter Intrusion detection systems
- Radar based detections
- GIS mapping systems
- Intercom or IP Phone systems
- Automated barriers & bollards
- Building management systems


The aggregated data, information and footage from the various systems provides the operator with intelligence to effectively manage situations (i.e fires, intruders etc) or day to day management of the building (i.e remote door locking etc). Ultimately, this means the need for large teams of facility staff can be reduce and the building managed centrally by key operators. A key reason for the development of PSIM has been the technology improvements of the systems listed above, which has meant software developers have been able to integrate and converge these systems onto single platforms. Technology in security systems is improving dramatically, prices are falling for systems and the software required to manage them is now available. It really makes sense to move forward and use PSIM to its full potential, let Sunstone help you embrace the future.