Architectural and Engineering Specification:
FiberPatrol-PR Fiber Optic Perimeter Intrusion Detection System

Architectural and Engineering Specification for a Fiber

Optic Perimeter Intrusion Detection System

FiberPatrol-PR™

This document is intended to provide performance specifications and operational requirements for the FiberPatrol-PR perimeter intrusion detection system. It is written in a generic format. These specifications may be copied verbatim to form a generic procurement specification.

Senstar and the Senstar logo are registered trademarks of Senstar Corporation. FiberPatrol and Silver Network are trademarks of Senstar Corporation. The information in this document is subject to change without notice. Senstar reserves the right to make changes to product design or manufacturing methods, as engineering progresses, or as other circumstances warrant.

Copyright 2017. Senstar Corporation. All rights reserved.

PART1GENERAL

1.1SystemSummary

1.2Submittals

1.3Qualifications

1.4Spares

1.5Warranty

1.6References

PART2PRODUCTS

2.1Fence-Mounted Perimeter Intrusion Detection System

2.2Manufacturers

2.3RegulatoryRequirements

2.4MechanicalRequirements

2.5EnvironmentalRequirements

2.6Reliability and MaintenanceRequirements

2.7ElectricalRequirements

2.8DetectionCapabilities

2.9Cable cutresponse

2.10Installation and ConfigurationCapabilities

2.11NetworkingCapabilities

2.12EventManagement

2.13AccessControl

PART3EXECUTION

3.1SiteAssessment

3.2SystemInstallation

3.3SystemCalibration

3.4Training

PART1GENERAL

1.1System Summary

The contractor shall install a ranging, fence-mounted perimeter intrusion detection system (PIDS). The system shall detect and locate intruders that attempt to cut, climb, or lift the fence fabric.

The detection sensors shall consist of fiber optic cables. The cables shall connect to a signal processing module that detects and locates attempted intrusions by analyzing the changes in reflected energy that occur as a result of minute vibrations in the sensor cables.

If a sensor cable is cut, the system shall retain detection and locating capabilities in the portion(s) of the sensor cable that remain connected to the sensor unit. When using a single sensor unit, it shall be possible to install the system in a cut-immune configuration such that the system remains fully operational after a single cable cut.

The system shall be capable of being integrated into the facility’s Security Management System.

1.2Submittals

A.Contractor submittals to the facility owner shall include the following as a minimum:

1.Site conditions report as per article 3.1
2.Configuration and calibration settings for the system after installation and calibration are complete as per article 3.3
3.All manufacturer-supplied software required for the calibration and operation of the system.
4.Documentationprovidingsystemoperationandmaintenanceprocedures.

1.3Qualifications

A.Themanufacturerofthesystemshallhaveaminimumoffive(5)years’experiencein the last 10 years of the manufacture and successful implementation of similar systems.

1.4Spares

A.Thecontractorshalldelivertothefacilityownersparesystemcomponents.

B.Foreachsystemcomponent,sparesconsistingofleastoneunitor10%ofthe number that comprise the system, whichever is greater, shall beprovided.

1.5Warranty

A.Theproductshallbeunderwarrantyforaminimumoftwoyearsfromthedateof purchase.

B.The supplier shall repair or make equivalent parts available for a minimum of 10 years from the date of purchase, based on a site’s original equipment ship date.

1.6References

A.Abbreviations and acronyms: The following acronyms and abbreviations are used in this document:

1.PIDS: Perimeter Intrusion DetectionSystem
2.MTBF: Mean Time BetweenFailures
3.MTTR: Mean Time ToReplace
4.OTDR: Optical Time-DomainReflectometer
5.Pd: Probability ofDetection

B.ReferenceStandards:Thefollowingregulatoryandindustrystandardsare referenced in thisdocument:

1.FederalCommunicationsCommission:FCCCFRPart15,SubpartBrequirements for Class Adevices.
2.ConformitéEuropéenne (CE)

PART2PRODUCTS

1.7Fence-Mounted Perimeter Intrusion Detection System

A.Thecontractorshallsupplyaranging,fence-mountedperimeterintrusiondetection system(PIDS).

B.Thefence-mountedPIDSshalldetectandlocateintrudersattemptingtobreachthe perimeter fence by cutting, climbing, or lifting the fencefabric.

C.The fence-mounted PIDS shall support a cut-immunedeployment configuration that enables the system’s detection and locating capabilities to remain fully operational in the event of a sensor cable cut.

1.8Manufacturers

A.TheFiberPatrol-PR™systemfromSenstarCorporation( the requirements stated in thisdocument.

1.9RegulatoryRequirements

A.The system shall comply with the followingregulations:

1.FCC 47 CFR Part 15, Subpart B requirements for Class Adevices
2.CE

1.10MechanicalRequirements

A.Sensorcable:

1.Thesensorcableshallhavetheoptiontobeencasedinanarmorjacket,foruse inareasthathaveahighpotentialofphysicaldamagetothecable.
2.Thesensorcableshallhaveaminimumbendradiusnogreaterthan15cm(6.0 inches).

3.Thesensorcableshallbeaffixedtothefacility’sfencethroughtheuseofUV- resistant plastic or metal cableties.

4.Thesensorcableshallnotrequireacableconduittobeinstalledalongthefence perimeter to protect thecable.

5.Thesensorcableshallbeabletoincludeadditional,unusedfibersforuseby other equipment (such as for data or videocommunications).

6.The sensor cable shall include no conductiveelements.

7.Thesensorcableshallbeintrinsicallysafewithinexplosiveatmospheres.

8.The sensor cable shall be completely immune to all forms ofelectromagnetic energy from radio communications, radar, electrical power transmission equipment andlightning.

9.The fence-mounted PIDS shall be capable of being used with standard commercially-availablefiberopticcablethatmeetstherequirementsidentified above.

B.Sensor unitequipment:

1.Thesystemshallnotrequireanyactivedevicesorprocessormodulestobe installedoutdoors.

2.Allactivecomponentsshallberack-mountableinanindoor,equipmentroom environment

3.Theindoorsystemcomponentsshallbedesignedfora standard19-inchwide rack.

4.Thesystemshallprovidetheoptionforaslide-outmonitorandkeyboardthat enables local console access to thesystem.

5.Thesystemshallincludeafiberopticpatchpanelforinterfacingthesensor cable to the processor and controllermodules.

1.11EnvironmentalRequirements

A.Thesensorcablesshallbe able to operate intemperaturesfrom–40°Cto70°C (–40°F to 158°F) and a relative humidity of 0 to 100% (condensing) without performancedegradation.

B.Thesensorunitcomponentsshallbedesignedforindooruseandmeetthe followingrequirements:

1.Temperature:

a.Operating: 10 to 35 °C (50 to 95 °F)
b.Storage: –20 to 70 °C (–4 to 158°F)

2.Humidity:

a.Operating: 20% to 80% (relative,non-condensing)
b.Shipping and storage: 5% to 85% (relative,non-condensing)

1.12Reliability and MaintenanceRequirements

A.Sensorcables:Thesensorcablesshallhaveanominalservicelifeof20years, excluding damage caused by non-environmentalforces.

B.Sensorunit:

1.Thesensorunitmodulesshallhaveapredictedmeantimebetweenfailures (MTBF) of greater than 87,000hours.

2.Thesensorunitshallbecapableofperforminginternalself-diagnostictestsof theinternalcircuitry,cablecontinuity,anddetectionprocessing.

3.The sensor unit software shall befield-upgradeable.

1.13ElectricalRequirements

A.Eachsensorunitshallmeetthefollowingelectricalrequirements:

1.Input power: 100 to 240 VAC, 50/60Hz

2.Power consumption: Less than400W

B.Backuppower:Thesensorunitshallbecapableofbeingpoweredfromathird-party Uninterruptable Power Supply (UPS) or standbygenerator.

C.Thesystemshallnotrequireanyoutdoorpowerorgroundingconnections.

1.14DetectionCapabilities

A.Thesensorshallconsistoffiberopticcablethatisattachedtothefencealongthe full length to beprotected.

B.The system shall provide two independent sensing channels.

C.Thesystemshallbeabletodetectandlocateintrusionsoveracabledistanceofup to 50 km (31mi) when the two sensing channels are used independently.

D.The system shall be able to detect and locate intrusions over a cable distance of up to 25 km (15.5 mi) when the system is deployed in the cut-immune configuration.

E.Thesensorunitshallhavethefollowingdetectioncapabilities:

1.Processthesignalfromthesensorcabletodetectintrudersattemptingto breach the perimeter fence by cutting, climbing, or lifting the fencefabric

2.Locatethepositionofadetectedintrusionwithin8.0m(25feet)orlessatleast 95% of thetime.

3.Detectmultiplesimultaneousintrusions,wheneachintrusionattemptis separatedbyasensorcabledistancegreaterthan45m(150feet).

4.Support up to 1440 virtual detection zones.

5.Becapableofbeingcalibratedtofunctionondifferenttypesofmetalfencing.

6.Utilizeadaptivealgorithmsinthedetectionprocesstooptimallydiscriminate between actual intrusions and environmentalactivity.

F.Intrusion detectionperformance:

1.Theprobabilityofdetection(Pd)ofanintrudercuttingthefence,liftingthe fence fabric, or climbing unaided over the fence shall be 95% with a 95% confidence factor, when the system is installed in accordance with the manufacturer’s directions on a high-qualityfence.

2.False alarm rate: The maximum rate for alarms generated by the internal electronicprocessesoftheprocessors(cablesexcluded)shallbelessthanone perzoneperyear,averagedoverthetotalnumberofzonesinthesystem.

3.Nuisance (environmental)alarms:

a.Thesystemwhencalibratedaccordingtomanufacturer’sguidelinesshall not suffer nuisance alarms from any of the followingsources:
.1Temperature changes
.2Motion of nearby objects or vegetation that are not striking the fence
.3Motion of surface or ground water
.4Sunrise/sunset
.5Acoustic or magnetic effects
.6Snow
.7Fog
.8Seismic vibration caused by nearby vehicular traffic
.9Seismicvibrationcausedbynearbyrailtrafficwhenthefenceis further than 5 m (16 feet) from therails.
b.Thesystemshallutilizeadvancedprocessingandambientcompensationto minimizetheprobabilityofnuisancealarmsfromthefollowingsources:
.1Wind
.2Rain andhail

.3Sandstorms

G.Time todetection:

1.Thesystemshallbecapableofgeneratinganalarmwithinonesecondfrom the onset of an attempted breach that involves aggressive contact with the system (such as one attempted by quickclimbing).

2.Otherdetectedintrusionattemptsshallbereportednolaterthanone second after the breach iscompleted.

H.Fencecompatibility:

1.Thesystemshallsupportinstallationonthefollowingtypesofmetalfencing:

a.Chain-link

b.Expanded metalmesh

c.Weldedmesh

d.Concertina and/or razorwire

e.Vinyl-coatedchain-link

f.Palisade-stylefences

2.Itshallbepossibletousemultiplepassesofsensorcabletoobtainthespecified detection performance for fences of anyheight.

3.Themanufacturershallprovideinstallationguidelinesregardingthetypeand height of fences that can be protected with one, two, and multiple passes of sensorcable.

I.Gatecompatibility:Thesensorcableshallbecapableofbeinginstalledonswinging gates.

1.15Cable cutresponse

A.The system shall support a closed-loopcut-immuneconfiguration that enables the system’s detection and locating capabilities to remain fully operational in the event of a sensor cable cut.

B.Thesystemshallbecapableofdetectingandlocatingasensorcablecut.

C.Thecutlocationshallbedeterminedandreportedwithanabsoluteaccuracyof equal to or less than 30 m (100feet).

D.Intheeventofasensorcablecut,thesystemshallretaindetectionandlocatingcapabilitiesintheportion(s)ofthesensorcablethatremainconnectedtothesystem sensorunit.

1.16Installation and ConfigurationCapabilities

A.Thesystemshallhavethefollowingcharacteristics,asaminimum:

1.Thesensorcableshallbecapableofbeingattacheddirectlytothefencewithout needing to be put in aconduit.

2.Thesensorcableshallbecapableofbeingattachedtothefencewithstandard UV-resistant cable ties (plastic ormetal).

3.Thesystemshallsupporttheuseofnon-sensing,“leadin”cableaslongasthe total length of cable does not exceed 25 km (15.5miles) per sensor channel.

B.Thesystemshallsupportthefollowingconfigurationandcalibrationfeatures:

1.A Windows-based graphical user interface(GUI)

2.Configurationandcalibrationsettingsshallbecapableofbeingstoredina computer file for record keeping purposes and available for reuse when configuring additional or replacementprocessors.

1.17Networking Capabilities

A.Networkmanagertools:Thesystem’snetworkmanagementsoftwareshallprovide thefollowingtoolstofacilitatesystemcommissioningandtrouble-shooting:

1.Systemstatustoolthatprovidesavisualdisplayofthestatusofallprocessorsin thesystem

2.Systemeventlogtoolthatprovidesasearchablelogofsystemevents.

B.ThesystemshallsupportanEthernetRJ-45connectorasaphysicalmediaoption for communication with the integrated sensornetwork.

C.Networkmanagement:

1.The system shall include network management software to manage the communicationsoverthesensornetwork.Thenetworkmanagementsoftware shallbecapableofrunningonastandardWindowsPCaswellasonthesensor unit itself and be accessible via Windows RemoteDesktop.

2.The system’s network management software shall provide a TCP/IP-based interfaceforcommunicatingalarm,status,andconfigurationdatatoandfrom security management systems. The system supplier shall furnish complete documentation of this interface to facilitate integration with security managementsystems.

1.18EventManagement

A.ThesystemshallprovidealocalPC-basedoperatorinterfacewithgraphicalalarm annunciation at the sensorunit.

B.Thesystemshallprovideaccesstothefollowinginformationandfunctionalitywhen in a local or networkedconfiguration:

1.Auser-configurableimagedepictingtheprotectedsitewithaschematic perimeteroverlay

2.Hardware monitoring andcontrol

3.Event detection and alarm generation (including flashingnotification message, location marker, and audiblealert)

4.Basic alarmmanagement

5.Event and alarmlogging

6.Detection zone definition andconfiguration

7.Adjustment of detectionparameters

C.Thesystemshallsupportthefollowingalarmmanagementfunctions:

1.Maintaincompleteinformationonallalarmsfor24hoursoruntilthealarmis cleared.

2.Alarmsshallbeclearedbylocalorremoteoperatororautomaticallyin24hours after alarmgeneration.

3.Untilcleared,thealarminformationshallbecompiledinascrollablemulti- columntable.

4.The maintained information shallinclude:

a.Unique alarm IDnumber

b.Timelabel

c.Eventduration

d.Eventstatus

e.Eventstrength

f.Eventlocation

5.The operator shall be ableto:

a.Select any of the alarms from thelist.

b.Entertextnotesregardingthecauseofthealarmandthemitigation measures.

c.Clear thealarm.

6.Operatornotesaswellasthealarmclearingeventshallberecordedinthe eventlog.

7.Alarm locationformat:

a.Theprimaryformatofthealarmlocationshallbethelinearpositionalong the sensorcable

b.Itshallbepossibletoexpressthealarmlocationineithermetersorfeet

c.Secondarylocationformatsshallbederivedfromtheprimarymeasure using appropriate calibrationtables.

d.Secondarylocationformatsshallrequirecorrespondingmappingofthe perimeter fenceline.

e.Itshallbepossibletoprovidesecondaryalarmlocationformatsincluding:

.1Software-definedzones

.2Latitude and longitude (GPS)coordinates

8.Eventlogging:

a.Thesystemshallmaintainanddisplayaneventlog,includingalarms,system notifications, and useractions.

b.The logs shall be periodically saved to the harddrive.

c.Anewsetoflogfilesshallbegeneratedevery24hoursatmidnight

1.19AccessControl

A.Thesystemshallrequiretheentryofavalidpasswordatstart-upandshutdown.

B.Thesystemshalldivideuseraccessintothreesecuritylevels:

1.Operator level for routineoperation

2.Supervisorlevelforadvancedsystemmonitoring,configuration,and troubleshooting

3.Installerlevelforadvancedconfigurationandtroubleshooting

PART3EXECUTION

3.1SiteAssessment

A.Before installation begins, the installation contractor shall provide a report to the facility’sownerdocumentinganysiteconditionsthatmaypreventthesystemfrom operating satisfactorily. Examples of such conditions include loose fence fabric, loosegates,orobjectssuchassignsortreebrancheshittingthefence.

3.2SystemInstallation

A.Thesystemshallbeinstalledinaccordancewiththemanufacturer’srecommended proceduresasdefinedinthemanufacturer’sdocumentationforthesystem.

3.3SystemCalibration

A.The installation contractor shall calibrate the system in accordance with the manufacturer’srecommendedproceduresasdefinedinthemanufacturer’sProduct Guide.

B.Theinstallationcontractorshallsubmittotheownerthecalibrationand configuration settings for thesystem.

3.4Training

A.Theinstallationcontractororvendorshalltraintheowner’smaintenancepersonnel in the calibration and system maintenance procedures as given in the manufacturer’s productdocumentation.

April 2017Page 1 of 14AE-FP-001-IN-R4-E-04/17