General information about the Mirage/Siberia monitoring systems.
General information about the Mirage/Siberia monitoring systems
Criterion 1. Information delivery time
The well-known axiom «Time is money» in security systems has a special, clearly expressed material meaning. The total response time to an alarm event consists of several components, the first of which is determined by the speed of the monitoring system. Ideally, the notification delivery time tends to zero, in practice — should not exceed 10-15 seconds.
The best time parameters are possessed by monitoring systems operating in real time (on-line), which do not waste precious time on access to the communication system. In the ISM «Mirage» and NSM «Siberia» priority is given to packet transmission of information based on IP protocols over the INTERNET, GSM/GPRS, CDMA networks. The information delivery time is 1-2 seconds.
Criterion 2. Reliability of information delivery
In monitoring systems, the reliability of information delivery is determined by two factors: the reliability of the notification transmission system as such and its resistance to counteraction. The counteraction factor is especially relevant in mobile object monitoring systems.
In the ISM «Mirage» and NSM «Siberia» reliability is ensured by the following technical solutions:
Multichannel notification transmission system using GSM/GPRS and CDMA radio networks, INTERNET and traditional telephone networks. The monitoring station receives information via any networks, communication channels are combined in the facility equipment;
Intensive monitoring of communication channels and equipment operability, failures in the notification transmission system are determined within 2 minutes;
Combined methods of notification transmission, each of which has its own advantages;
Spoofing resistance, two-way dynamic encryption eliminates the possibility of interception and substitution of notifications during their transmission via open communication channels.
Criterion 3. Two-way exchange of information
According to this criterion, monitoring systems are divided into two qualitatively different classes; one-way systems are fundamentally inferior to two-way systems in terms of capabilities, reliability, and ease of operation.
Using two-way exchange allows the following capabilities to be implemented in the Mirage ISM and Siberia NSM:
Cost reduction due to exchange acknowledgement;
High-quality encryption of packets implies the exchange of code parts;
Remote equipment setup — prompt change of notification methods, replacement of lost electronic keys, etc.;
Remote equipment control — requests for current status, execution of arming and re-arming commands, switching actuators on and off;
Remote download of new versions of software (firmware).
Criterion 4. Informativeness and integration
High information content allows for an accurate assessment of the nature of events at the facility and increases the efficiency of detecting detector failures. Full information content implies end-to-end transmission of notifications along the route: sensor — control and monitoring device — notification transmission system — monitoring station.
In the ISM «Mirage» full information content is achieved by using its own protocol, the information table of which exceeds standard protocols such as Contact ID and similar ones. Information from additional equipment (control panels, control modules, local radio systems) connected via RS-485/RS-232 interfaces is transmitted to the monitoring station without losses due to the use of integrated solutions at the protocol level.
Criterion 5. Availability of the technical solution
The liberalization of the security market and growing competition stimulate security companies to expand the range of services provided, primarily centralized security of stationary and mobile facilities. The most important criterion for choosing equipment is the availability of technical means with minimal organizational efforts and financial costs.
From the point of view of accessibility, the optimal technical solution seems to be the use of modern digital communication networks or radio frequencies on an unlicensed basis, and in many cases the first option is the only possible one.
Source: NPP «Stealth»