Installation Manual

advertisement
1
REVISION HISTORY ............................................................................................................................ 4
2
ABBREVIATIONS ................................................................................................................................. 5
3
OVERVIEW ........................................................................................................................................... 6
4
5
6
7
3.1
INTRODUCTION .............................................................................................................................................................. 6
3.2
THEORY OF OPERATION................................................................................................................................................ 6
3.3
SPECIFICATION ............................................................................................................................................................... 6
3.4
FEATURES AND BENEFITS .............................................................................................................................................. 7
DETECTION CHARACTERISTICS ........................................................................................................ 8
4.1
DETECTION REQUIREMENTS ......................................................................................................................................... 8
4.2
TYPICAL DETECTION PATTERNS ................................................................................................................................... 9
4.2.1
Microwave .............................................................................................................................................................. 9
4.2.2
Deadzone ................................................................................................................................................................ 9
SYSTEM COMPONENTS ................................................................................................................... 11
5.1
HARDWARE COMPONENTS ........................................................................................................................................11
5.2
SOFTWARE COMPONENTS ..........................................................................................................................................11
SYSTEM DESIGN ................................................................................................................................ 12
6.1
SITE PLANNING ............................................................................................................................................................12
6.2
FOLIAGE MANAGEMENT .............................................................................................................................................12
6.3
UNEVEN TERRAIN ........................................................................................................................................................12
6.4
RAIN, STANDING WATER AND FROST .......................................................................................................................12
INSTALLATION PROCEDURE ........................................................................................................... 13
7.1
POLE MOUNTING ........................................................................................................................................................13
7.2
ALIGNMENT ..................................................................................................................................................................13
7.3
VIGIL WIRING .............................................................................................................................................................14
7.4
VIGIL CONFIGURATION..............................................................................................................................................15
7.4.1
Installing the VIGIL Configuration Utility ..................................................................................................15
7.4.2
Adding users to the OSDP Hub.....................................................................................................................15
7.4.3
Starting the VIGIL Configuration Utility ....................................................................................................16
7.4.4
Installing a VIGIL Device .................................................................................................................................17
7.4.5
Configuring a VIGIL Device ............................................................................................................................20
7.4.6
VIGIL Configuration Utility Tabs ..................................................................................................................24
Revision History
8
VERIFICATION AND TEST ................................................................................................................ 27
9
MAINTENANCE ................................................................................................................................. 29
Installation Manual
3
VIGIL
Revision History
1
Revision History
Date
Version
Signed
Comments
05/08/2015
1
Maria Heneghan
Document Created
20/10/2015
1.1
Maria Heneghan
3.4 Added Feature
7.4.4 Updated diagrams of Configuration
Utility and description
7.4.5 Updated diagrams of configuration
utility and altered text regarding device
configuration. Added section on Algorithms
Table 1: Revision History
Installation Manual
4
VIGIL
Abbreviations
2
Abbreviations
CP
Control Panel
DSP
Digital Signal Processing
FSK
Frequency Shift Keying
OSDP
Installation Manual
Open Supervised Device Protocol
PDs
Peripheral Devices
PIDS
Perimeter Intrusion Detection System
POE
Power Of Ethernet
RSSI
Received Signal Strength Indicator
RX
Receiver
SCS
Secure Channel Session
TX
Transmitter
5
VIGIL
Overview
3
Overview
3.1
Introduction
VIGIL is a bistatic radar, Perimeter Intrusion Detection System (PIDS). The system is comprised of VIGIL
Transmitter (TX) and VIGIL Receiver (RX) pairs. The VIGIL is a platform based system which operates at
distances ranging from 3 – 200M.
The VIGIL has Ethernet connectivity as standard (RS485 optional) for configuration and integration. Each
VIGIL is pre-configured as a TX or RX unit.
VIGIL brackets (part code VIGIL-BRK) are supplied with VIGIL units as standard.
3.2
Theory of Operation
The VIGIL system consists of pairs of TX’s and RX’s. The system detects the presence of objects moving
through the detection zone created by each TX / RX pair. On detection of an object an alarm is generated
which can activate any of the following:
3.3
1.
Relay Closure / Open – user configurable
2.
Alarm notification via Ethernet (or RS485)
Specification
Parameter
Value
Frequency
5.785-5.815 GHz.
Modulation
Full-duplex bidirectional FSK
Channels
30 +
Range
3 – 200 m
Probability of Detection
99%
Temperature
-40°C to 65°C.
Humidity
0 – 95% Non – Condensing
Power Requirements
12-48V / POE
Current Consumption
450mA
Housing
IP67 rated
Installation Manual
6
VIGIL
Overview
3.4
Features and Benefits

One software configurable relay

Installation and Integration via Ethernet (or RS485)

Self-calibrating, adaptable DSP using 3 distinct signal paths

Software Adjustable Sensitivity

12 – 48V or POE powered

Five distinct software activated alarm types: Environmental, Error, Tamper, Intruder and Power

Three distinct algorithms suitable for varying environments with eight sensitivity levels for each.
Installation Manual
7
VIGIL
Detection Characteristics
4
4.1
Detection Characteristics
Detection Requirements
The VIGIL will detect any object with a mass > 35Kg moving through the detection zone created by each
TX/RX pair. Figure 1 depicts a side view of the detection zone of the VIGIL.
Figure 1: VIGIL Detection Zone side view
The VIGIL has eight software configurable sensitivity settings which make the VIGIL suitable for
installations in multiple environments and locations. The height and width of the detection zone varies
due to software configurable sensitivity level assigned to the RX. The sensitivity level effect on the beam
width is depicted in Figure 21.
1
Figure 2 is not to scale. The beamwidths for each sensitivity level are exaggerated in order to demonstrate the
effect. The data is based on a 100M link.
Installation Manual
8
VIGIL
Detection Characteristics
Figure 2: Sensitivity Effect on Beam Width - Ariel View
4.2
4.2.1
Typical Detection Patterns
Microwave
Microwave bistatic radar links have a detection zone which is ellipsoid in shape, i.e. the detection zone
is widest at the middle of the link and narrowest at either side of the link. The width of the detection
zone of the VIGIL is no greater than 5m.
4.2.2
Deadzone
Traditional Microwave systems have a ‘dead zone’ within which intruder movement may remain
undetected by the system, as the forward scattered multipath signals generated by the movement of
the intruder may be at a level lower than that which may be discerned from noise at the receiver. The
dead zone is located (i) on the ground directly below and in front of their transmit/receive antennas, (ii)
above the transmit/receive antennas. The deadzone is covered by “crosshatching” the units as shown in
Figure 3.
Installation Manual
9
VIGIL
Detection Characteristics
Figure 3: Crosshatched pairs
The deadzone length l in Figure 3 is < 2m with a VIGIL mounting height of 1.1m.
Installation Manual
10
VIGIL
System Components
5
System Components
5.1
Hardware Components
The VIGIL TX and RX units are physically identical. However there are hardware differences and thus the
modules are pre-configured as either a TX or RX unit.
Each VIGIL unit consist of the following components:
1.
Antenna
2.
Motherboard
3.
VIGIL Front Cover
4.
VIGIL Rear Cover
5.
Bracket
270mm x 270mm x 75mm
Figure 4: VIGIL Hardware Components
5.2
Software Components
Sensurity provides a VIGIL configuration utility in order for users to install and configure VIGIL units. The
executable installs the following components:
1.
VIGIL Configuration Utility - a UI for the user to configure a network of Peripheral Devises (PDs).
2.
OSDP Hub - a communications application used to network a mixture of RS485 and TCP/IP PDs
with a Control Panel application connected over TCP/IP. This application simply acts to relay
data packets between the attached Control Panel and all PDs.
Installation Manual
11
VIGIL
System Design
6 System Design
6.1
Site Planning
Ensuring the suitability of a site for installation of the VIGIL system is imperative. A site survey prior to
install should be carried out to ensure that nodes are located in such a manner as to be most beneficial
to the site.
6.2
Foliage Management
It is recommended to keep foliage within the detection zone to a minimum. Foliage encroaching on the
detection zone may result in false alarms due to movement caused by wind. It is not advised to have
trees directly within the detection field as their movement due to wind may cause alarms.
6.3
Uneven Terrain
The operation of a VIGIL link requires transmission of energy from the transmitter to the receiver it is
therefore recommended that there is line of sight between the transmitter and receiver units. To ensure
a clear line of sight between the units the ground must be flat across the detection zone. A slope is
permissible however troughs or hills may shadow the beam and thus allow crawl spaces (dead zones)
for an intruder. See Figure 5. The protected area can be made up of any surface such as tar, concrete,
grass, tilled earth or gravel
Figure 5: Uneven Terrain
6.4
Rain, Standing Water and Frost
The VIGIL is unaffected by rain, frost and snow. Fast flowing water in the detection zone (such as streams
etc.) may cause alarms and it is thus recommended that the detection zone be free from streams or
large pools of water.
Installation Manual
12
VIGIL
Installation Procedure
7
7.1
Installation Procedure
Pole Mounting
The VIGIL should be mounted on a pole of diameter no less than 40mm. A mounting height of 1.1m is
recommended. The mounting height given is relative to ground level, of the midpoint of each TX/RX
enclosure.
Figure 6: VIGIL Mounting
7.2
Alignment
TX/RX enclosures for each link should be mounted at the same height and be facing each other with
clear line of sight. The maximum offset of the devices should be no greater than 6° to ensure maximum
operational capability.
Installation Manual
13
VIGIL
Installation Procedure
Figure 7: VIGIL Mounting and Alignment
7.3
VIGIL Wiring
The vigil comes with ethernet connectivity by standard, a DC input and one Relay output. The pin out
for the DC connector and the Relay connector are in Table 1 and Table 2.
PIN NUMBER
1
2
3
CONNECTION
NO1
COM1
NC1
Table 1: Relay Connector
PIN NUMBER
1
2
CONNECTION
12V
0V
Table 2: DC Connector
All connnectors are provided with each VIGIL unit.
Installation Manual
14
VIGIL
Installation Procedure
7.4
VIGIL Configuration
7.4.1
Installing the VIGIL Configuration Utility

Download and install the latest version of the VIGIL control panel: VIGIL_cp-installer.exe

Double click on the installer to start installation

The Microsoft Visual C++ redistributable is required to run the configuration utility. If not
already installed the VIGIL executable will install it.
If the PC has the redistributable previously
installed the dialog box in Figure 8 will
appear. Click on close to continue with the
configuration utility installation.
Figure 8: Microsoft Visual C++ Redistributable Installed
Dialog Box
If the Microsoft Visual C++ redistributable has
not been previously installed on the PC the
dialog box in Figure 9 will appear. The user
must agree to the license terms and
conditions and install the redistributable in
order to install the VIGIL Configuration Utility.
Figure 9: Microsoft Visual C++ Redistributable Install Dialog
Box
7.4.2
Adding users to the OSDP Hub
The OSDP Hub allows multiple users to be supported in connections from a Control Panel (CP) on the
Master TCP/IP port. Access to this port requires access using a username and password. The Secure
Remote Password (SRP) protocol (a patent free IETF standard) is used to store username/password
credentials on the OSDP Hub server machine and to perform a 2-way handshake initiated by the CP
(client).
The software installer will automatically configure the following default username and password:
Username:
admin
Password:
1234
Installation Manual
15
VIGIL
Installation Procedure
7.4.3
Starting the VIGIL Configuration Utility
NOTE: When installing the VIGIL over IP the computer the VIGIL hub utility is running on should be set
to static IP address 192.168.2.10.
Run the utility Start -> All Programs -> Sensurity -> HALO Control Panel
The user will be prompted for a password. This
password is used to encrypt the OSDP master key
stored in the osdp_map.xml. See Figure 10. If
running the CP for the first time insert the default
password 1234.
Figure 10: Enter Password Prompt
Following the login process the user will then be presented with the User Interface (UI) Status Page in
Figure 11. To connect to a network, the user should select the Connect button in the top left corner of
the UI.
Figure 11: VIGIL Configuration Utility UI
The user will then be prompted to enter the IP address and port of the OSDP Hub executable. The
default IP address is localhost (i.e. 127.0.0.1) meaning that the OSDP Hub is running on the local machine.
See Figure 12. If OSDP Hub is running on another computer the UI can connect to it using that
Installation Manual
16
VIGIL
Installation Procedure
computer's IP address. The default port of 27043 should only be changed it the default master port on
OSDP Hub has been changed.
The username and password is required to
authenticate the connection to the hub. The
details should be inserted in the dialog box in
Figure 12. If the user is logging in for the first time
– the default username and password should be
used.
Username:
admin
Password:
1234
Figure 12: Connection Authentication
7.4.4
Installing a VIGIL Device
If the device is connecting to the CP for the first time then it must be installed. To install the device click
on File -> Install Device. See Figure 13.
Figure 13: Install Device
Installation Manual
17
VIGIL
Installation Procedure
If an uninstalled device is found the Install dialog box will
be displayed – See Figure 142.
Choose an OSDP address for the device (0-126) and click
OK.
Once a device is connected and installed it will be
displayed on the configuration panel with the list columns
indicating the status, OSDP address and connection status
of each device.
Figure 14: Install Dialog Box
Each device on the network must be assigned a unique
OSDP address ranging from 0-126.
The VIGIL Configuration Utility consists of two main panels. On the left hand panel the installed devices
are displayed. The right hand panels displays status and other information relating to each device. To
see the status of a device the user must click and select the device from the left hand panel see Figure
15. The user can then navigate through the tabs in the right hand panel to view information pertaining
to the device selected in the left hand panel.
The status tab displays information on the device such as its serial number, the operating mode, IP
settings and information on the current alarm status of the device. Also available on the status tab is
the ability to disable the link for 30 seconds. This function allows the user to disable the link without the
need to switch off the power supply. Click on the access control icon to disable the link for a duration
of 30 seconds. Device IP settings can be set by the user on the status tab. NOTE: Ensure that the correct
model is stated as depicted in Figure 15.
NOTE: Following power up communication with the device is available after 30s. The duration during
which a device can be installed is fixed at 120s following the initial 30s start up procedure. Once the
install duration has passed device will not allow a user to install. The timeout period can be altered by
changing the Secure Channel Session timeout Period in the Admin Tab. See Figure 16.
2
Installation Manual
18
VIGIL
Installation Procedure
Figure 15: VIGIL Configuration Utility Device Status
The VIGIL is a software upgradable device. The Admin Tab in Figure 16 allows the user to upgrade the
software, reset the device and change the OSDP Secure Channel Session Timeout Period.
NOTE: Upgrading firmware should only be performed if advised by your Sensurity representative.
To reset the device click on the Soft Reset button. The CP renegotiates a new Secure Channel Session
between the CP and the PD. The timeout duration can be changed by the user by altering the value in
the Secure Channel Session timeout Period textbox and clicking on Configure. The duration is given in
minutes. The minimum timeout period is 30 minutes and the maximum 1440 (24 hours).
Installation Manual
19
VIGIL
Installation Procedure
Figure 16: VIGIL Configuration Utility Admin
7.4.5
Configuring a VIGIL Device
To configure a VIGIL device select it from the status panel on the left. The selected device will be
highlighted in blue. See Figure 17.
Figure 17: Configuration Panel Settings
Click on the settings tab and change the device settings as required and click Apply to save new settings.
Installation Manual
20
VIGIL
Installation Procedure
To ensure the new settings have been applied click on the Refresh button. Ensure the device is
highlighted in blue on the left hand panel to see the correct settings for the chosen device.
Intruder Settings
NOTE: The configuration utility is used to configure settings for both the Sensurity HALO and Sensurity
VIGIL devices. The HALO has a richer feature set than the VIGIL device and thus some of the options
available to HALO are not available to the VIGIL and will not allow the user to alter these settings.
Operating Mode
Operating mode is not configurable in VIGIL devices and will be disabled.
Channel
37 channels are available. Any channel can be used for a pair of nodes. Each Transmitter and Receiver
pair must be configured to operate on the same channel i.e. both devices configured for operation on
channel 1. NOTE: configuring adjacent Node pairs with a channel separation of 11 is not advised
as it may cause interference.
Range
The range function alters gain settings depending on the range of units. The nearest range can be
chosen from the dropdown menu. The larger range should be chosen in the event of the range falling
between 2 values. For 100m range or above choose 100m.
Algorithm
The algorithm setting allows the user to choose which algorithm is best suited to their enviornment.
Three algorithms are currently available to users. The algorithms and their best use case are described
in this section. A drop down menu is available on the configuration utility to allow users to select the
algorithm they wish to use see Figure 18.
Installation Manual
21
VIGIL
Installation Procedure
Figure 18: Configuration Utility Algorithm Settings
Algorithm A
This algorithm uses a digital sensing technique and offers “detect all” capability. Using this algorithm it
is possible to configure the sensitivity to reject certain events such as small animals or parallel motion.
Using Algorithm A on a high sensitivity level it is possible that certain foliage movements and small
animals may result in an alarm event. This algorithm is suitable for those users who operate a sterile
environment and wish to be alerted to EVERY event.
Algorithm B
Algorithm B is based upon extensive research and data analysis and is designed to offer the optimum
rejection of fast moving objects such as small animals, thrown objects and birds. This algorithm works
by extracting certain frequency components of the signal which are known to occur during deliberate
intrusions but do not occur as a result of a fast moving small object. This algorithm offers the user the
ability to detect all walking and running intruders while not raising an alarm when someone throws an
object through the beam or when a bird flies through. This algorithm will also offer the user the ability
to raise an alarm if a person is walking parallel to the link within the beam. This algorithm is best used
in an environment where small animals result in false alarms.
Algorithm C
Algorithm C combines numerous digital signal analysis techniques to offer the highest degree of
intelligence. Algorithm C offers the user the ability to raise an alarm due to a crawling, walking or
Installation Manual
22
VIGIL
Installation Procedure
running intrusion while not raising an alarm due to foliage movement, small animals or parallel motion.
This algorithm is suited to environments where foliage encroaches on the detection zone.
Sensitivity
The sensitivity of the device is software adjustable. As each 100M zone of a site may vary this allows the
user to configure the system due to the unique conditions of the area. There are 8 sensitivity settings
available for each algorithm A, B and C. For devices configured as a Transmitter this function does not
change the operation of the device. For devices configured as a Receiver the sensitivity settings will
change the operation of the device. Sensitivity 0 is the least sensitive setting and Sensitivity 7 is the
most sensitive setting.
NOTE: Upper Deadzone Sensitivity and Lower Deadzone Sensitivity are not available when configuring
a VIGIL device.
Relay
There are two software configurable relays on the VIGIL board. Each relay can be configured in 4 unique
modes see Table 2.
Table 2: Relay Modes
Mode
Description
Disabled
Relay is set to the NC position
Normally OFF
Relay is set to the NC position, in the event of an alarm the relay is set to
the NO position for a defined duration
Normally ON
Relay is set to the NO position, in the event of an alarm the relay is set to
the NC position for a defined duration
Enabled
Relay is set to the NO position
Duration
The relays remain in an alarm state for a number of seconds depending on the duration setting. This
allows users the option to control the length of time a peripheral device is activated by triggering the
relay for a user defined duration. The duration can be chosen by the user. The duration ranges from 1
second to 30 seconds in 1 second increments. Relay 1 and Relay 2 are independent and can be set to
different durations.
Alarms
The VIGIL defines 6 different types of Alarm – Intruder, external, error, tamper, power and environmental.
Each of the 6 alarm types can be configured to activate Relay 1 or Relay 2 or both by clicking on the
Installation Manual
23
VIGIL
Installation Procedure
associated Relay checkbox. If neither Relay is checked, relays will not be activated in the event of an
intrusion but the alarm will still be transmitted via IP or RS485 if connected.
Intruder
To ensure that intruder alarms – microwave - trigger an alarm the Intruder checkbox MUST be ticked.
An Intruder alarm is activated when an intrusion of the detection zone occurs.
Tamper
The Tamper alarm is activated if the access panel on the device is removed from the device. The alarm
will trigger once and will not trigger again until the access panel is re-attached to the unit and removed
again. This prevents constant alarm triggering due to one event. Tamper alarms are only active if the
Tamper
checkbox is checked.
Environmental
Environmental alarms are caused by extreme temperature changes within the enclosure. The device is
rated to operate at temperature range of - 30° to + 65°. If the temperature exceeds these values an
Environmental alarm is triggered. An Environmental alarm will also be triggered if the temperature within
the enclosure varies by ±10°C within an 8 minute period. Environmental alarms are only active if the
Environmental checkbox is ticked.
Error
An Error alarm is generated if no SD card is present or has malfunctioned. The device will operate as
normal however a number of features will be unavailable as listed below.

Configuration settings backup

Alarm history log

Firmware upgrade
An error alarm is also caused if the device suffers an unexpected event and needs to reboot. Following
reboot the user will be notified via an error alarm.
Power
Power alarms are generated following device reconnection following a power outage.
7.4.6
VIGIL Configuration Utility Tabs
Status
See Section 7.4.4 Installing a VIGIL Device
Admin
Installation Manual
24
VIGIL
Installation Procedure
See Section 7.4.4 Installing a VIGIL Device
Settings
See Section 7.4.5 Configuring a VIGIL Device.
Graphs
The Graphs tab depicts one of the RSSI signal paths. This graph can be used to determine if the TX/RX
pair is functioning correctly. The RSSI (counts) should be approximately 2000 counts and will vary
considerably on a walkthrough event as depicted in Figure 19. To view the live Bistatic Radar graph the
Enable
checkbox must be checked and the receiver unit selected. NOTE: The graph does not depict any
filtering by chosen algorithm. Thus the graph should be used as a demonstration tool / graphical aid
only.
Figure 19: Configuration Utility Graphs
Test
The test Tab is used primarily as an internal Sensurity utility. It can be used as a diagnostics tool to
determine system performance.
Installation Manual
25
VIGIL
Installation Procedure
Figure 20: Configuration Utility Test
Trace
The trace tab is used primarily as an internal Sensurity diagnostics tool.
Figure 21: Configuration Utility Trace
Installation Manual
26
VIGIL
Verification and Test
8 Verification and Test
To verify and test the installed TX/RX pairs, it is advisable to conduct false alarm testing and a number
of penetration tests.
It is advised to leave the units to “stabilize” and monitor for any false alarms for a minimum period of
10 minutes. Following switch on of the units it is recommended that no movable objects are present
between the TX/RX pairs as this will interfere with initial system self-calibration. The detection zone
should mimic the “real environment” free from intruders during the initial system self-calibration. This
process should take no more than 1 minute.
If false alarms do occur during this period there are number of possible causes.
A possible cause in the absence of an actual intrusion or, conversely, the generation of no alarm in the
event of an actual intrusion may be crosstalk from a nearby TX node.
Below are a number of checks in order to diagnose the problem. Confirm the type of alarm generated:
1.
If the alarm was of type Intruder, Perform checks a, b and c. If the alarm is not of type Intruder
proceed to 2.
a.
Ensure that the TX/RX pair is configured correctly i.e. check that the paired devices are
configured as 1 Tx and 1 Rx.
b. Check that adjacent TX/RX pairs are not on the same channel or have a channel
separation of 11.
c.
Ensure that the area is free from movement.
2.
If alarm is of type Tamper ensure that the access panel is securely fastened. Reset the alarm.
3.
If alarm is of type Environmental confirm that temperature is not exceeding Spec +65°C/-30°C
or that a rapid changing in temperature has not occurred.
It is recommended to perform a number of Penetration tests at varying distances along each link. See
Table 3 as a guide.
Table 3: Penetration Tests
1M
25M
50M
75M
99M
From the RX
device (of crosshatched pairs)
From the RX
device
From the RX
device
From the RX
device
From the RX
device (of crosshatched pairs)
If any of the penetration tests do not result in an alarm the following checks should be performed:
Installation Manual
27
VIGIL
Verification and Test
1.
Ensure that the Intruder checkbox is ticked in the admin tab of the control panel
2.
If checking alarms using relays ensure that the relays are configured as Normally ON or
Normally OFF) and that they are wired correctly.
3.
If a 1M or 99M crawl test does not result in an alarm ensure that:
a.
The devices are cross-hatched sufficiently
Installation Manual
28
VIGIL
Maintenance
9
Maintenance
The VIGIL is designed for outdoor use and thus is subject to a constantly changing environment. To
ensure the continued proper functionality it is important to maintain the area surrounding the system.
Maintain natural features (grass, bushes, tree branches, etc.) within and at the edge of the detection
zone.
Following severe weather (storms, strong winds etc.) Ensure that no objects have entered the detection
zone which may result in false alarms. Also ensure that the position of nodes has not changed due to
the severe weather which may result in reduced system function due to improper alignment etc.
Ensure that all alarms of type Environment are investigated as this alarm type is indicative of a system
fault due to extreme temperature changes and may result in reduced system function
Neglect of maintenance could jeopardize the continued proper functioning of the system.
Installation Manual
29
VIGIL
Download