Friday, December 2, 2016

Guide to High Security SpeedGate

A guide to High Security SpeedGate/Flap Barrier 
As per Form No. 209 Issue 1.1

1. Introduction
A turnstile or entrance control system is designed to deter or completely stop unauthorised entrants, whilst enforcing the use of an access control system to ensure the one token one person rule applies. Security levels vary depending on style and type of the products.

2. Scope
This guide provides details of the different style and type of turnstile systems, along with an indication of installation, interconnectivity and interoperability of available systems. Comparisons between styles and types are included to help in the specification of the correct product.

3. Terms and Abbreviations
Anti-pass back: Where the turnstile provides a return signal to the Access Control System to signal that user A has entered or exited the building. If user A then passes his proximity card to user B the access control system will know that this entry is potentially fraudulent and prevent access/egress.

Anti-piggybacking: Where methods have been put in place to avoid unauthorised people gaining access to a secured area by passing through in collusion with another person who does have authorisation.

Anti-tailgating: Where measures have been taken to avoid an unauthorised person following another through a secured entrance way, therefore achieving access without the authorised persons knowledge or consent.

Biometric Control: The use of biological features i.e. Fingerprints, eyes, voice etc to ensure that the user is carrying their access control card and that fraudulent entry is not being gained by a 3rd party.

Breakaway force: The level of force, required by the turnstile user, to collapse the turnstile barrier or barriers to allow emergency escape.

DDA Compliance: Indicates whether a particular product is capable of allowing use by a disabled person. Previously this related to The Disability Discrimination Act, 1995. The applicable Act (except in Northern Ireland) is now The Equality Act 2010. For further information refer to BSIA Form 173, An Access Control Guide to Disability Discrimination.

DDA Disability Discrimination Act (see DDA Compliance)

Egress: The exit of a user from a building through a turnstile.

Fail safe: The turnstile will collapse or release all locking to allow non-secure egress during an emergency situation. Used in the majority of situations as part of a cohesive fire strategy.

Fail secure: During an emergency situation the turnstile will ensure that any user is not `trapped’ within the unit before locking to ensure that security is maintained in all situations.

Ingress: The entry of a user into a building through a turnstile.


Optical turnstiles: Turnstiles that monitor the number of transactions, and detect unauthorized entry and signal this through an alarm of some form rather than a physical barrier.

Return signal: A signal or pulse from a turnstile to signify that a user has activated/used/or carried out an unauthorised passage through the units.

Volumetric security: A security measure (normally used to prevent piggy-backing) where the physical volume of the turnstiles user is measured rather than purely the weight.

Weight sensing: A method of preventing piggy-backing by the turnstile weighing the occupant(s) of the turnstile during operation. If the weight exceeds the permissible weight of user, access will be denied.


4. Types

5. Security levels

The majority of waist height turnstiles are reliant on the user responsibility to prevent collusion between users enabling unauthorised ingress/egress.
Key:

1 Indicates whether a product of this type is typically DDA compliant. Products vary and compliance can be dependent on other circumstances 
2 Level of physical security in comparison with other types
3 Speed measured in persons per minute
4 Level of emergency access for this type of product 
5 DDA access possible depending on diameter

6. Typical Locations & Example Use
7. Systems Integration
Security turnstiles can be integrated with the following peripherals, with many physically integrated within the body of the units:

Card readers; proximity and swipe, smart cards etc.
Key pads
Biometric systems
Cameras
Lift destination control
Card collection systems
People counters
Coin/token collection
Building Management systems
Fire/intruder
Asset protection
Metal/explosive detection
TCP/IP Ethernet networks
Care must be taken to ensure the access control reader choice is compatible with the usage and speed of the chosen turnstile. Proximity readers will provide higher flow of traffic, whilst bio-metric readers may be deemed inappropriate for an optical type turnstile.

8. Interconnection
Most turnstile manufacturers are fully compatible with the majority of access control systems in the market today, purely requiring a two door controller to control ingress and egress through the units.

Two separate inputs are required, per barrier, to operate the unit in each direction, in the majority of cases being a normally open, going closed connection.

Other inputs may include visitor access and override + modes and operation controls. The majority of units provide a fire alarm input to allow emergency egress, either allowing break-out or providing unhindered egress if required.

Outputs will give passage confirmation in each direction for accurate occupancy counting and appropriate use of the chosen security method. Alarm state outputs are provided, either remotely or within the unit, to indicate a security breach or misuse.


All newer products are capable of direct connection, control and monitoring over existing Ethernet networks ensuring full compatibility with IP Access Control, CCTV and Building Management Systems with no need for further connection.

9. Installation Requirements
Units will require a structurally sound, level surface to allow their installation and to ensure reliable operation, but specialist fixings can be used to allow installation on raised access floor and soft screed finishes.

All units will require a number of input and outputs which are facilitated by conduits located within the floor, the design of which should always be referred to the manufacturer for details.

In existing locations, where the user does not wish to damage the existing floor, the majority of turnstile types can be installed on raised plinths which allow the units to be easily removed, and does not necessitate the adaptation of floor finishes.

Full height units can be cabled from above which make the installation easier with less disruption being required to the floor.


10. Configuration
As a rough guide when calculating the number of turnstiles required the following formula (based upon 15% of the building population entering/exiting the building in a five minute period) can be used. However, it is highly recommend that all users consult with a reputable turnstile manufacturer for an accurate recommendation.

Total Installation Capacity (per Minute) = (Building Population x 15%) / 5

Standard Width Lanes: 500 660mm
This dimension is critical to ensure that two users cannot enter through the turnstiles `side by side’ thereby gaining unauthorised access.

Wheelchair Accessible Lanes: 900 940mm
Allows passage for wheelchair users and those with other impairments or who are in need of assistance.

Side Pass Gate:
Consideration may be given to the provision of alternative, supervised access for visitors, couriers and those with large luggage or parcels.

Barriers:
Most turnstile manufacturers will provide a variety of turnstile designs to suit the individual clients’ requirements, and to provide an aesthetically seamless appearance.

Standard configurations
11. Environmental Benefits
In conjunction with an access control system and connection to buliding management system turnstiles can facilitate savings on energy loss by detecting when certain building areas are unoccupied.

Most products use steel, stainless steel and glass along with recyclable plastics so can be recycled at end of life.
  

12. Insurance requirements
Many installations will benefit from high security turnstile systems in reducing premiums against loss or damages.


13. Service and Maintenance
It is recommended that a minimum of 1-2 preventative maintenance visits per annum are carried out on all turnstiles but in areas of high traffic flow or abuse additional maintenance visits may be appropriate.



14. Standards & legislations
For European Countries all products should comply with the requirements of the appropriate European Directives and be marked with a CE mark.

For America UL 325/3295 apply.
  
15. Summary
Security management plays an increasingly important role in todays society, and ensuring you offer your customer the perfect access control solutions to meet their security needs is vital.

With the extensive range of security turnstiles available in the market today, each designed to suit different levels of security, you are sure to find the perfect solution that fits your requirements.


Seeking professional advice from a BSIA registered turnstile manufacturer prior to specifying a turnstile system is highly advised. Not only will they will be able to advise you on the best type of product suited to your required level of security, they can also provide recommendations on installation and access control integration.

Access control provides the ability to control, monitor and restrict the movement of people, assets or vehicles in, out and around a building or site. Products range from token based systems and digital keypads, through to biometric identification systems and the associated hardware.

Access control products are subject to fast-moving technological development. A major focus of the is to raise awareness amongst end-users and specifiers of the different types of equipment that is available and the most appropriate environments for using them.

Artical published on  Safe Secure Magazine - Dec 2017 issue.

Saturday, November 19, 2016

How do I uninstall the HDCVI browser plugin

How do I uninstall the HDCVI browser plugin?
FOR WINDOWS:
Firstly, navigate to the Downloads folder and ensure that webplugins.exe isn’t already in theDownloads folder. If webplugins.exe is already in the Downloads folder, move it to the trash or delete that executable file.

Secondly, navigate to the C:\ Drive and, depending on the computer (whether the operating system is Windows XP, Vista, 7, 8 or 10), you may need to search two locations to verify the old plugins aren’t currently installed:

C:\Program Files (x86)\webrec\WEB30\WebPlugin
or
C:\Program Files\webrec\WEB30\WebPlugin

If you were able to navigate to the webrec folder, navigate further to find uninst or uninstall.exe. Make sure all internet browsers are closed, Internet Explorer, Chrome, FireFox, etc. Open the Task Manager and make sure they’re not running any processes in the background.

Now run the uninstaller and make sure all the files are deleted by navigating back to the links provided above. If the folders aren’t empty, you will need to ensure you've closed out any browser that is still running. From here, you can go ahead and delete the webrec folder.

FOR MAC:
Firstly, navigate to your Downloads folder and clarify that webplugins.pkg isn’t already in theDownloads folder. If webplugins.pkg is already in the Downloads folder, move it to trash or delete that file.

Secondly, navigate to the Mac’s Library and find Installed Plug-ins. Use the file path provided below to navigate to:

Macintosh HD\Library\Internet Plug-Ins

If you were able to navigate to the Internet Plug-Ins folder, navigate further to find the files npmedia.bundleand npTimeGrid.bundle. Make sure all internet browsers are closed (Safari, Chrome, FireFox, etc).

Next, move these two listed files to the trash, npmedia.bundle and npTimeGrid.bundle.

Saturday, November 12, 2016

What happens during a fingerprints scan

What happens during a fingerprints scan?


What is a Fingerprint?
The skin surface of the fingers, palms and soles of the feet is different to the rest of the body surface. If you look at the inner surface of your hands and soles of the feet you will see a series of lines made up of elevations which we call 'ridges' and depressions which we call 'furrows'.
These ridges and furrows can be recorded in many ways. For example, the ridges can be inked and placed on to a piece of paper. This would leave a fingerprint like below. The black lines represent the ridges and the white lines represent the furrows.

Within these patterns the ridges can split or end creating ridge characteristics. There are 6 types of ridge characteristics.
Everyone has a unique and different distribution of these characteristics that develop in the womb and are persistent throughout life.

It is the coincidence sequence of these characteristics that allow me to make identifications. The coincidence sequence is whereby I will find the same characteristics, in the same order with the same relationship to each other in both the crime scene fingerprint and the fingerprint on the form I am using.

Fingerprints unique:
It's pretty obvious why we have fingerprints—the tiny friction ridges on the ends of our fingers and thumbs make it easier to grip things. By making our fingers rougher, these ridges increase the force of friction between our hands and the objects we hold, making it harder to drop things. You have fingerprints even before you're born. In fact, fingerprints are completely formed by the time you're seven months old in the womb. Unless you have accidents with your hands, your fingerprints remain the same throughout your life.

Enrollment and verification
Suppose you're in charge of security for a large bank and you want to put a fingerprint scanning system on the main entry turnstile where your employees come in each morning. How exactly would it work?
There are two separate stages involved in using a system like this. First you have to go through a process called enrollment, where the system learns about all the people it will have to recognize each day. During enrollment, each person's fingerprints are scanned, analyzed, and then stored in a coded form on a secure database. Typically it takes less than a half second to store a person's prints and the system works for over 99% of typical users (the failure rate is higher for manual workers than for office workers).
Once enrollment is complete, the system is ready to use—and this is the second stage, known as verification. Anyone who wants to gain access has to put their finger on a scanner. The scanner takes their fingerprint, checks it against all the prints in the database stored during enrollment, and decides whether the person is entitled to gain access or not. Sophisticated fingerprint systems can verify and match up to 40,000 prints per second!

How fingerprint scanners work
a computer has to scan the surface of your finger very quickly and then turn the scanned representation into a code it can check against its database. How does this happen?
There are two main ways of scanning fingers. An optical scanner works by shining a bright light over your fingerprint and taking what is effectively a digital photograph. If you've ever photocopied your hand, you'll know exactly how this works. Instead of producing a dirty black photocopy, the image feeds into a computer scanner. The scanner uses a light-sensitive microchip (either a CCD, charge-coupled device, or a CMOS image sensor) to produce a digital image. The computer analyzes the image automatically, selecting just the fingerprint, and then uses sophisticated pattern-matching software to turn it into a code.
Another type of scanner, known as a capacitive scanner, measures your finger electrically. When your finger rests on a surface, the ridges in your fingerprints touch the surface while the hollows between the ridges stand slightly clear of it. In other words, there are varying distances between each part of your finger and the surface below. A capacitive scanner builds up a picture of your fingerprint by measuring these distances. Scanners like this are a bit like the touchscreens on things like iPhones and iPads.

Unlike ordinary digital photos, scans have to capture exactly the right amount of detail—brightness and contrast—so that the individual ridges and other details in the fingerprint can be accurately matched to scans taken previously. Remember that fingerprints might be used as evidence in criminal trials, where a conviction could result in a long jail sentence or even the death penalty. That's why "quality control" is such an important part of the fingerprint scanning process.


Here's how the process works with a simple optical scanner:
1.    A row of LEDs scans bright light onto the glass (or plastic) surface on which your finger is pressing (sometimes called the platen).
2.    The quality of the image will vary according to how you're pressing, how clean or greasy your fingers are, how clean the scanning surface is, the light level in the room, and so on.
3.    Reflected light bounces back from your finger, through the glass, onto a CCD or CMOS image sensor.
4.    The longer this image-capture process takes, the brighter the image formed on the image sensor.
5.    If the image is too bright, areas of the fingerprint (including important details) may be washed out completely—like an indoor digital photo where the flash is too close or too bright. If it's too dark, the whole image will look black and details will be invisible for the opposite reason.
6.    An algorithm tests whether the image is too light or too dark; if so, an audible beep or LED indicator alerts the operator and we go back to step 1 to try again.
7.    If the image is roughly acceptable, another algorithm tests the level of detail, typically by counting the number of ridges and making sure there are alternate light and dark areas (as you'd expect to find in a decent fingerprint image). If the image fails this test, we go back to step 1 and try again.
8.    Providing the image passes these two tests, the scanner signals that the image is OK to the operator (again, either by beeping or with a different LED indicator). The image is stored as an acceptable scan in flash memory, ready to be transmitted (by USB cable, wireless, Bluetooth, or some similar method) to a "host" computer where it can be processed further. Typically, images captured this way are 512×512 pixels (the dimensions used by the FBI), and the standard image is 2.5cm (1 inch) square, 500 dots per inch, and 256 shades of gray.
9.    The host computer can either store the image on a database (temporarily or indefinitely) or automatically compare it against one or many other fingerprints to find a match.
The matching algorithm finds out whether there is a match by comparing two templates extracted by the characteristic point extraction algorithm, specifically by comparing the positions of each characteristic point and the structure.

Friday, November 4, 2016

British and European Intruder Alarm Standards

British and European Intruder Alarm Standards

DD243
Code of Practice for installation and configuration of intruder alarm systems designed to generate confirmed alarm conditions.
BS 8473:2006
Code of Practice for Intruder and hold-up alarm systems - Management of false alarms
BS EN 50131 Series
European Standards on Intruder Alarms
(Originally due to commence October 2005)
PD6662:2004
Guideline for the implementation of BS EN 50131-1:2004

Introduction
To help ensure that alarms are designed, installed and maintained reliably, suppliers and installers make reference to a series of British Standards and Codes of Practice. Some of these have been withdrawn and replaced by the ‘European Standards for Intruder and Hold Up Alarm Systems' - usually referred to as the Euro Standards.
The Euro Standards only apply to new systems.  Existing systems remain subject to the British Standards and Codes of Practice applying at the time of their installation; but exceptionally may need to comply with the new Euro Standards if they require such extensive re-design/equipment replacement that they effectively become a ‘new system'.

Means of Introduction
Because some of the Euro Standards relating to components are not yet published, and the Euro Standards do not cover some issues that alarms may be required to meet in the UK to satisfy the police or insurers, an enabling ‘standard' has been prepared.  This outlines retained/additional UK requirements that apply alongside the Euro Standards and was published in August 2004 titled ‘PD6662:2004 - Scheme for the application of European Standards for Intruder and Hold up Alarm Systems'.
Timescale for Introduction of PD6662
A transition period operated until 1st December 2005, during which new alarms could be installed to previous British Standards or the PD6662 scheme.  Now PD6662 must be used.

Overview of EN 50131
The major differences between EN 50131 and the old BS 4737 are:
· Structured standards
· Grading of systems
· Classification of equipment
· Risk based
This provides a structured approach to:
· Assessment of risk
· Technical survey
· System design
· Installation of the system in accordance with agreed specification
· Installation of equipment in accordance with manufacturers' recommendations.
A significant advantage for insurers and surveyors applying European Standards to systems is the specification of grades appropriate to the associated Risk. One of the major differences in the European Standards is the grading of systems, which is not a feature of BS 4737.   

Security Grading
Under BS EN 50131-1:2004, intruder alarm systems will need to be Security Graded according to the kind of intruder considered likely to try to defeat the system.

Insurers are understood to support the Grading approach and it is expected that they will, in due course, recommend particular Grades of system in relation to particular premises risks.  Where this turns out to be the case, installers and customers may take the lead given by insurers, as regards the minimum Grade of system they require, and discuss whether to go for a higher Grade of system.

The grading of a system based on a structured risk analysis will determine the:
· Extent of the system
· Signaling
· Tamper security
Within the new European Standards there are four security grades:
· Grade 1 - low risk
· Grade 2 - low to medium risk
· Grade 3 - medium to high risk
· Grade 4 - high risk
Who Decides the Grade of Alarm? 
Installers
Installers are required to carry out a formal assessment of the theft risk to determine a suitable Grade of alarm.
To do so they will consider the items at risk, existing security arrangements and any previous thefts, etc.  Before they proceed they will seek the customer's formal approval, and may also suggest that any interested insurer be consulted. 

Insurers
Depending on the risk exposure, insurers may require an intruder alarm before providing certain insurance covers, eg theft.  As the Grade of an alarm cannot be readily changed after installation, it makes sense to check a proposed alarm with any interested insurer before proceeding.
Insurers may respond to a request to approve an alarm by visiting the premises, making a decision based on information already held by them, or by agreeing the outcome of the installer's risk assessment.
Insurers will make their own decisions, but as a general guide the following is likely: 
Detection and Control System
Grade 2 - Lower risk premises.
Grade 3 - Normal risk premises, ie all except those suitable for Grade 2 or 4
Grade 4 - Very high risk premises, eg cash handling centres, banks, museums.
A further inclusion in the European Standards is the classification of components that are used for the intruder alarm system installations. These will be classified, which in turn will determine where they are installed.
Detection and Control System - Grading
Apart from increasing control panel event memories and levels of recommended detection; the key difference between Grades 2, 3 and 4 is that movement sensors at Grade 3 must be able to detect ‘masking', ie something has been placed over the sensor lens and at Grade 4 ‘range reduction', ie something has blocked part of the detectors' field of view.

Key Action Steps 
When having a new alarm installed:
·        Use a reputable installer, eg one inspected by the NSI (NACOSS) or SSAIB.
·        Co-operate with the installer's risk assessment procedures.
·        Check any interested insurer agrees with the proposed alarm Grade, Detection, Signaling and Response.
·        Where police response necessitates a ‘Confirmation System' check that the installer designs a system that has:
·        Dual Path Signaling
·        Confirmation from each ‘at risk' area
·        A ‘Means of Unsetting' that does not prevent the police being called should an intruder force open the designated alarm entry/exit door.


 BS 8473:2006 European Standards for Intruder Alarm Systems

Code of Practice for intruder and hold-up alarms – Management of false alarms.

BS 8473 has been drawn up to assist all parties in the management of false alarms, to reduce the disproportionate level of resources being absorbed by the police, the alarm industry, customers and operators as a direct result of false activations.

Preventing false alarms: points to remember;
The intruder alarm system (IAS) is to be operated only by persons who have been correctly trained. If there is uncertainty about the correct operational procedures the alarm company should be contacted.
Before leaving the premises check that all doors and windows are physically secured. A walk around the supervised area is the only effective way of doing this properly.
Ensure that detection devices are not obstructed. In particular be careful that infra red beams and movement detectors are not obstructed by stock or other items.
If movement detectors are used do not introduce sources of heat, movement or sound into the area supervised by these detectors without informing the alarm company.
Always follow the entry/exit procedure agreed with the alarm company. Entry through any door other than the one designated should be physically prevented. Switching off the IAS is always the first task on entry.
Before entry, ensure that the means necessary to enter the premises and unset the IAS are known and available in a secure manner to the operator.
Inform the alarm company of any alterations to the premises which could affect the IAS. Do not permit people other than employees of the alarm company to make changes to the IAS. Place system on test when building immediately.
Treat the IAS with care. Wiring and detection devices can be accidentally damaged or moved. If this occurs inform the alarm company immediately.
After a false alarm, check the system carefully, and if possible, note the cause of activation. Inform the alarm company of the believed cause of the activation immediately.
Make sure regular maintenance checks are carried out by the alarm company and that you have the correct contact details for the alarm company and ARC. Remember that excessive false alarms can result in police response being withdrawn.
Most IAS require a mains electricity supply. If the electricity supply to your system is disconnected for more than 4 h contact the alarm company.
EN 50131 European Standards for Intruder Alarm Systems

EN 50131 was phased in to replace British Standards BS4737, BS7042 and BS 6799 and was adopted in October 2005 utilizing PD 6662:2004, an enabling document which facilitated the introduction of EN 50131 into the UK.

The difference between PD6662 / EN 50131and the old British Standards
PD6662 differs from former British Standards in the following ways:
It determines not only the system but also the component design requirements for Intruder and Hold-up Alarm systems.
A comprehensive Risk Assessment is required to determine the design criteria of the system.
Applicable to both hard-wired and wire-less installations.
Grading of systems is required to reflect "the risk". I.E. Grade 1 - Low Risk, Grade 4 - High Risk.

Does my existing system need to be upgraded to comply with PD6662
If your current system complies with the old British Standards and is working effectively changes are not required.
If any upgrade to your system is undertaken your insurance company will require the system to comply with PD6662.
If  you lose Police Response and the URN is withdrawn it can only be reinstated if the system is upgraded to comply with PD6662.

RISK ASSESSMENT
One of the most significant issues within the new EN standards will be evaluating the risk associated with the premises and determining a grade of system. This is because once the grade of a system is determined it will define the extent of the system, its signalling and tamper security requirements.

SECURITY GRADES
One of the most important aspects of the EN 50131 requirements is the concept of a security grade. For each installation the grade of system has to be chosen according to various factors. In the EN the grade is described in terms of the type of intruder and how much effort they would put into a burglary.
What are the Grades?
Grade 1 is for an installation with a low risk of theft. The property is not likely to attract intruders. It is assumed that a thief is likely to be opportunistic rather than bothering to plan things in advance. In the application guide (DD CLC/TS 50131-7) it assumes that an intruder is simply going to break open a door.
Grade 2 is for a slightly higher risk of theft. The property is likely to have something of interest to an experienced thief. In this case the intruder is expected to have some knowledge of how alarm systems work and possibly carry some tools to allow him to overcome a simple alarm system. The thief is likely to check the building for ease of access through doors, windows and other openings.
Grade 3 is for a reasonably substantial risk property. There is good reason to assume it may be broken into and might well contain objects of high value. An intruder is likely to gain access by penetrating doors, windows or other openings. The thief could be very experienced with intruder alarm systems and possess a number of tools and equipment to overcome the system
Grade 4 is for very high-risk properties. Intruders could be expected to plan a burglary in advance and have the knowledge and equipment to alter parts of the intruder alarm system to prevent detection. It is assumed that the intruder could gain access by penetration of floors, walls and ceilings. The intruder is unlikely to be working alone.

What Grade of System does my installation need?
This is difficult to say at the moment and opinion on this matter varies from country to country. The view in the UK tends to require grades that are higher than other countries (e.g. a shop in Belgium at grade 2 could be grade 3 in the UK). To a large degree the choice of grade would be guided by insurance companies. A typical view though could be:
· Grade 1 would only be of interest in domestic properties (without an insurance requirement for an alarm system).
· Grade 2 would be most domestic properties and low risk commercial (e.g. florists)
· Grade 3 would be for high-risk domestics and most commercial properties (e.g. Newsagent with cigarette sales)
· Grade 4 would be for extremely high-risk domestic and higher risk commercial properties (e.g. bullion stores).

Mixing Components of Different Grade
The EN standard says that it is not necessary to use the same grade of component throughout an intruder system.
If the installation is a grade 2 then there is no problem using, for example, a grade 3 power supply.
If however an installer fits a grade 2 component (such as a detector) in a system then that system is limited to grade 2 at best.
It is possible to have a defined part of a system at a higher grade so long as all associated parts are at the same (or higher) grade. For example a system combining intruder and hold-up (PA) functionality could have a grade 4 hold-up system whilst the intruder parts were limited to grade 3. But this example is only valid if the power supply, alarm transmission system and warning devices used by the hold-up (PA) parts are all grade 4. This would still allow intruder parts such as PIR's to be grade 3. The system as a whole is, of course, only grade 3. 

Friday, October 21, 2016

Power Line Communication Camera

Power Line Communication (PLC) Camera

Power-line communication (PLC) or Ethernet over Power (EoP).carries data on a conductor that is also used simultaneously for AC electric power. Transmission or electric power distribution to consumers. It is also known as power-line carrier, power-line digital. Subscriber line (PDSL), mains communication, power-line telecommunications, or power-line networking (PLN). As we know, WiFi IP Cameras was developed to reduce the cabling costs.
However, WiFi technology has its shortage. Such as low stability, limited transmission distance, Interference problem, big bandwidth consumption etc. All these shortage are no longer exists on our PLC Security Systems. With PLC technology applied in our IP Cameras and NVR, we have cracked the main pain points for Home Security Surveillance Systems.

The PLC Cam uses the house‘s power line like a long video cable, ensuring that no connections other than the power outlet are needed. Thus installation is particularly easy: plug the PLC Cam into the power outlet, connect the provided PLC adapter to the DSL router - you‘re done! Even while on holiday or at work: the direct Internet connection and app for Apple iPhone/iPad and Android devices makes individual monitoring possible anywhere in the world.
Power-line communication (PLC) carries data on a conductor that is also used simultaneously for AC electric power transmission or electric power distribution to consumers. It is also known as power-line carrier, power-line digital subscriber line (PDSL), mains communication, power-line telecommunications, or power-line networking (PLN).
A wide range of power-line communication technologies are needed for different applications, ranging from home automation to Internet access which is often called broadband over power lines (BPL). Most PLC technologies limit themselves to one type of wires (such as premises wiring within a single building), but some can cross between two levels (for example, both the distribution network and premises wiring). Typically transformers prevent propagating the signal, which requires multiple technologies to form very large networks. Various data rates and frequencies are used in different situations.'

A number of difficult technical problems are common between wireless and power-line communication, notably those of spread spectrum radio signals operating in a crowded environment. Radio interference, for example, has long been a concern of amateur radio groups.
Power line can be used to shorten the wiring so that safety cameras, speed up data transfer and recording to Nas and makes mounting the camera becomes easier. If it requires more than one then the connection can power-line connected to the access point in setting exudes wifi and emit a signal with a full bar to obtain the camera so that the camera is always a constant ping without breaking or disturbance barrier wall or conflicting signals.

Advanteges:
1. PLC signal is stable and relible. Siganl is much better than Wi-Fi. No consumtion of bandwidth, no interference.
2. Transmit distance is over 300meter over powerlines. No need dedicated cabling.
3. Plug and Play, super easy operation. We changed the professional CCTV system to easy handling consumer electronics.
4. PLC signal speed is over 200Mbps, 4-ch 1080p video streams flow without 
delay.

Disadvantages:
If your home electrical wiring isn't
up to date, you might not get optimal performance from a powerline networking solution. It's not as fast as Gigabit Ethernet speeds (the fastest networking solution for home or office), but it is on par with current Wireless-N Wi-Fi networking.

Powerline networking is often touted as one of the easiest and most affordable whole-home networking solutions because you don't have to lay a lot of cable or install more wiring in your walls. However, you will still need to purchase adapters that will plug into your electrical outlets. Compared to buying multiple adapters, the price of a single wireless router might make more sense depending on what you'll be networking.

You also have to be careful to choose powerline networking adapters and accessories that use the same standard. There are three standards available from a variety of manufacturers:
HomePlug AV (available from manufacturers like Belkin, Linksys, Netgear, and ZyXEL)
UPA, which stands for Universal Powerline Association (available from D-Link, Netgear, and others)
HD-PLC, which stands for High Definition Power Line Communication (available from Panasonic)