You are on page 1of 79

UNIT 3

PORTABLE FIRE EXTINGUISHER


1. Fire Extinguishers should be appropriately matched to work environment.
2. Use the symbols to quickly identify the Type of Fire Extinguisher.
3. 6 Types of Fire Extinguishers
a. Class A – Wood, Paper, Plastics
b. Class AB – Wood, Paper and Flammable Liquid
c. Class BC (flammable liquid and electrical)
d. Class ABC Multipurpose
e. Class K – Kitchen Fire
f. Class D – Metal Fires
Type: Class A Fire Extinguisher

Pressure Gauge: Yes

Agent: Water

Method: Water Cools fire by removing heat.

Designated for: Class A (wood, paper, cloth, rubber, and certain plastics.

Placement: 75 feet or less

Safety and Health 1. Never use water to extinguish flammable liquid fires.
Precautions:
2. Never use on Metal Fire (water reactive).

3. Water is a good conductor and may lead to electrocution if used


to extinguish an electrical fire.
Type: BC Fire Extinguisher

Pressure Gauge: No (Must be weighed to determine leakage)

Agent: Carbon dioxide is discharged as a white cloud of “snow”

Method: Removes oxygen from fire

Designated for: Class B and C (flammable liquid and electrical) fires only

Placement: 50 feet or less

Health and Safety 1. Carbon Dioxide is a clean, non-contaminating, odorless gas.


Precautions:
2. After the CO2 dissipates, Class A fire may reignite.

3. Never use CO2 extinguishers in a confined space


Type: Multipurpose / ABC Dry Chemical

Pressure Gauge Yes

Agent: Mono ammonium phosphate, non-conductive, mildly corrosive

Method: Fire retardant powder separates the fuel from the oxygen.

Designated for: Wood, paper, Flammable Liquid, & Electrical Fire

Placement: < 50 feet (based on B or C fire)

Safety and Health 1. Mildly Corrosive – Sensitive to Electronic Equipment


Precautions:
Type: Class D – Metal Fires

Pressure Gauge Yes

Agent: Sodium Chloride, copper, Graphite…many types.

Method: Heat causes agent to cake and form a crust which excludes air and
dissipates heat from burning metal.

Designated for: Metal powders, flakes, shavings or chips (sodium, lithium)

Placement: < 75 feet

Safety and Health Most Class D extinguishers will have a special low velocity nozzle or
Precautions: discharge wand to gently apply the agent in large volumes to avoid
disrupting any finely divided burning materials.
Type: K – Kitchen Fire

Pressure Gauge: Yes

Agent: Mixture of dry and wet chemicals (Conductive)

Method: Fires burn at extremely high temperatures

Designated for: Vegetable or Animal Fat (not listed in OSHA)

Placement: < 30 feet to cooking area

Safety and Health 1. Whether or not under a hood, required for all solid fuel cooking
Precautions: appliances with a fire box of 5 cubic feet volume.

2. Class K extinguishers are electrically conductive

3. Electrical power to the kitchen appliance has been shut off.


GENERAL GUIDELINES

FIRE ESCAPES OR EXTERNAL STAIRS:

a) Fire escape shall not be taken into account while calculating the number of staircases for a
building.

b) All fire escapes shall be directly connected to the ground.

c) Entrance to the fire escape shall be separate and remote from internal staircase.

d) The route to fire escape shall be free of obstructions at all times except the doorway leading to
the fire escape which shall have the required fire resistance.

e) Fire escape shall be constructed of non-combustible materials.

f) Fire escape stairs shall have straight flight not less than 125 cm wide with 25 cm treads and
risers not more than 19 cm.

g) Handrails shall be at a height not less than 100 cm.

h) Fire escape staircase in the mercantile, business, assembly, hotel buildings above 24 m. height
shall be a fire tower and in such a case width of the same shall not be less than the width of the
main staircase. No combustible material shall be allowed in the fire tower.

SPIRAL STAIRS

a) The use of spiral staircase shall be limited to low occupant load and to a building height 9 m.

b) A spiral stair shall not be less than 150 cm in diameter and shall be designed to give the
adequate headroom.

STAIRCASE ENCLOSURES

a) The external enclosing walls of the staircase shall be of the brick or the R.C.C. construction
having fire resistance of not less than two hours. All enclosed staircases shall have access
through self-closing door of one-hour fire resistance. These shall be single swing doors opening
in the direction of the escape. The door shall be fitted with the check action door closers.
b) The staircase enclosures on the external wall of the building shall be ventilated to the
atmosphere at each landing.

c) Permanent vent at the top equal to the 5% of the cross sectional area of the enclosure and
operable sashes at each floor level with area equal to 1 to 15% of the cross sectional area of the
enclosure on external shall be provided. The roof of the shaft shall be at least 1 m. above the
surrounding roof. There shall be no glazing or the glass bricks in any internal closing wall of
staircase. If the staircase is in the core of the building and cannot be ventilated at each landing, a
positive of 5-mm. w.g. by an electrically operated blower/blowers shall be maintained.

d) The mechanism for pressurizing the staircase shaft shall be so installed that the same shall
operate automatically on fire alarm system/sprinkler system and be provided with manual
operation facilities.

FIRE LIFT

a) To enable fire service personnel to reach the upper floors with the minimum delay, one or
more of the lifts shall be so designed so as to be available for the exclusive use of the fireman in
an emergency and be directly accessible to every dwelling/lettable floor space on each floor.

b) The lift shall have a floor area of not less than 1.4 sq.mt. It shall have a loading capacity of not
less than 545 kg. (8 persons lift) with automatic closing doors.

c) The electric supply shall be on a separate service from electric supply mains in a building and
the cables run in a route safe from fire that is within a lift shaft. Lights and fans in the elevator
having wooden paneling or sheet steel construction shall be operated on 24-volt supply.

d) In case of failure of normal electric supply, it shall automatically switch over to the alternate
supply. For apartment houses, this changeover of supply could be done through manually
operated changeover switch. Alternatively, the lift should be so wired that in case of power
failure, it comes down at the ground level and comes to stand still with door open.

e) The operation of a fire lift shall by a single toggle of two-button switch situated in a glass-
fronted box adjacent to the lift at the entrance level. When the switch is on landing; call points
will become inoperative and the lift will be on car control only or on a priority control device.
When the switch is off, the lift will return to normal working. This lift can be used by the
occupants in normal times.

f) The words 'F1RE LIFT' shall be conspicuously displayed in fluorescent paint on the lift
landing doors at each floor level.

g) The speed of the fire lift shall be such that it can reach to the top floor from ground level
within one minute.

Provision of fire safety arrangement for different occupancy are

 Wet Riser
 Down Comer
 Hose Reel
 Automatic Sprinkler System
 Yard Hydrant
 U.G. Tank with Draw off Connection
 Fire Pump
 Terrace Pump
 First Aid Fire Fighting Appliances
 Auto Detection System
 Manual operated Electrical Fire Alarm System
 P.A System with talk back facility
 Emergency Light
 Hose Boxes with Delivery Hoses and Branch
 Pipes Refuge Area
 Emergency Light
 Auto D.G. Set
 Illuminated Exit Sign
 Means of Escape
 Compartimentation
WET RISER PUMPING SYSTEM
When fire breaks out, the greatest saving to life and property depends upon fast effective action.
For buildings over 60 meters in height this primary
fire-fighting requires, in addition to first-aid hose
reels, a wet riser pumping system to give the
necessary lift needed to reach the higher floors.

Primary Fire-Fighting in Tall Buildings:

 Wet Riser Requirements


 Wet Riser installations serving 2" landing
valves should be provided in addition to
first-aid hose reels in buildings taller than 60 meters.
 The output of the pumps used in conjunction with these installations should be not less
than 25 l/sec. and should be able to maintain a maximum of 5 bar pressure at the top
landing valve.
 A minimum running pressure of 4 bar and maximum of 5 bar is maintained at each
landing valve when up to three valves are fully opened.
 The landing valves used must be of the type incorporating a device to limit the outlet
pressure to a maximum of 7 bar.
 A suction tank of 45,000 liters is required to supply the pumps, with two alternative
mains water connections to the ball valves of the tank.
 Duplicate pumps are necessary with two separate sources of power supply. If both pumps
are electric motor driven then two sources of supply are required.
 Standby generator or dual power supplies will be required in case of grid failure. If dual
power supplies are utilized, a selector (provided by others) is necessary.
 Alternatively, one pump may be electric motor driven and the other coupled to a diesel
engine with the necessary controls to start the engine in the event of a mains power
supply failure included.
 Operation

 Operation of the set is effected by a fall in system pressure. The pressure vessel provides
a positive energy source to the system and a small supply of water to prevent operation of
the pumps in the event of small leakage within the system.
 A jockey pump is used to
keep the system
pressurized.
 Control is effected by a
pressure switch and
minimum run timer.
 If the jockey pump fails to
maintain pressure, the
selected duty pump will
be activated by its
pressure switch. While a flow of more than 4.5 l/s is detected by the flow switch the duty
pump will remain in operation.
 The control panel provides for automatic changeover to the standby pump in any event
where the selected pump cannot maintain the required pressure.
 The set is provided with an integral test line and is fitted with the test valves that are
required by the Fire Authorities.
 When two electrically-driven pumps are supplied, only one supply to the control panel
on the set is provided for.
 Automatic changeover of the electric supplies must be dealt with elsewhere. Where a
diesel-engine driven pump forms part of the set, an additional pressure switch and flow
switch provide automatic control in conjunction with the DC supply from the engine
batteries.
Wet Riser Pumping Set - Typical Dimensions

Wet Riser Scheme

Fire service set with 2 main pumps and jockey

SPRINKLER SYSTEM
A fire sprinkler system is an active fire protection measure, consisting of a water supply
system, providing adequate pressure and flow rate to a water distribution piping system, onto
which fire sprinklers are connected. Sprinkler systems provide early fire control or
extinguishment, helping to mitigate the hazards for occupants and firefighters alike.

TYPES OF SPRINKLER SYSTEMS:


1. Standpipe system
2. Automatic
3. External Fire Hydrant
1. Standpipe - A standpipe is a type of rigid water piping which is built into multi-story
buildings in a vertical position, to which fire hoses can be connected. Standpipes classes
are as follows:

• Class I system. A system providing 2 1/2-inch (64mm) hose connections to supply water for
use by fire departments and in handling heavy fire steams.
• Class II system. A system providing 11/2-inch (38mm) hose connection to supply water for use
by the fire department during initial response.
• Class III system. A system providing both 11/2-inch (38mm) and 21/2-inch (64mm) hose
connections.

Many high-rise or other large buildings have an internal system of water mains (standpipes)
connected to fire-hose stations and landing valves. Trained occupants or employees of the
building management operate the hoses until the fire department arrives. Fire fighters can also
connect their hoses to outlets near the fire.
Types:
There are two types of standpipes/ riser: “Wet Risers" and “Dry Risers"
 WET RISER
 Wet risers are a form of internal hydrant for the fireman to use and are always charged
with water. Wet risers are only required for building where the topmost floor is higher
than 30.5 meters above the fire appliance access level.
 Wet riser system comprises duty fire pumps with standby pump discharging into riser
pipe with landing valves at each level and to jet at the fire. A jockey pump is usually
provided to maintain system pressure.

A typical wet riser installation is shown.

 DRY RISER
 Dry risers are a form of internal hydrant for the fireman to use and are always charged
with water.
 Wet risers are only required for building where the topmost floor is higher than 18.3
meters and less than 30.5 meters above the fire appliance access level.
 Dry risers are normally dry and depend on the fire engine to pump water into the system.
Dry riser system comprises a riser pipe with landing valves at each floor and to which
rubber-lined hose with nozzles can be connected to direct the water jet at the fire.
Breeching inlet into which the firemen pump water are provided at ground level and
connected to the bottom of the dry risers.
 A typical dry riser installation is shown.

2. AUTOMATIC SPRINKLER SYSTEM – An automatic sprinkler system is


intended to detect, control and extinguish a fire, and warn the occupants of occurrence of
fire.
 The installation comprises fire pumps, water storage tanks, control valve sets, sprinkler
heads, flow switches, pressure switches, pipe work and valves.
 The system operates automatically without human intervention.
 The sprinkler head has a liquid filled glass bulb that breaks due to the heat of the fire and
release water that sprays over fire.
 The installation is the most common type and a typical sprinkler is shown.
3. EXTERNAL FIRE HYDRANT
 Fire hydrant installation consists of a system of pip work connected directly to the water
supply main to provide water to each and every hydrant outlet and is intended to provide
water for the firemen to fight a fire.
 The water is discharged into the fire engine form which it is then pumped and sprayed
over fire.
 Where the water supply is not reliable or inadequate, hydrant pumps should be provided
to pressurize the fire mains.
A typical hydrant installation fed directly from JBA water main and pressurized by fire
pumps is shown as below.
CASE STUDY
INDU FORTUNE FIELDS (APARTMENTS)
• Total area of the apartment community: 10acres

• Number of apartments: 6

• Number of floors/apartment: 10

• Total number of houses in the indu apartment community: 640


FIRE SAFETY

• 10 acres of site with 6 motors for fire


system

• 1 jockey pump – 4.5 pressure

• Main -7 pressure

• DJ pump -Automatic mode.

• Fire extinguisher / floor minimum 4,


maximum 6

• Fire extinguishers :463

• Fire pump room : 3.7 X 6.2 mts

• Positive suction motors

FIRE TANK

• 365 days filled

• number of tanks - 36

• Capacity - 75,000 tank l.

• Below each staircase one carbon- di -oxide and one water extinguisher have
been provided.
GAS SUPPLY

• Ventriculated system was used for the gas supply.

• There are meters near the gas bank and also near individual block of
apartments and also for individual apartment

• The meters are all provided with a fire cut off switch which cuts off the fire
in case of an accident so it’s necessary to provide meters for every apartment
and block of apartments.

• There are 640 units for which 5 gas banks are provided in the whole
apartment complex.

PRESSURE REGULATING SYSTEM

• These valves are provided to cut off the fire that may occur either from
outside or inside the gas bank.

• There is no way in which the fire can spread to the entire system.

• Meters are provided at various junctions of the roads, at every distribution


board and for every individual house.

• Each meter is connected with a pressure regulating valve that can stop the
supply at any point of time.
• All the valves are fitted with a fire cut off system that immediately cuts of
the fire at the initial point itself without spreading it.
ADVANCED SERVICES

UNIT 2

What are the components of an EPABX system? Differentiate between telephone exchange and
EPABX systems. 2012

Explain how a EPABX network system works. 2012

EPABX - Electronic Private Automatic Branch Exchange

A private branch exchange (PBX) is a telephone exchange that serves a particular business or
office, as opposed to one that a common carrier or telephone company operates for many
businesses or for the general public. PBXs are also referred to as:

 PABX – private automatic branch exchange


 EPABX – electronic private automatic branch exchange
 ""CBX"" – computerized branch exchange

PBXs make connections among the internal telephones of a private organization—usually a


business—and also connect them to the public switched telephone network (PSTN) via trunk
lines. Because they incorporate telephones, fax machines,modems, and more, the general term
"extension" is used to refer to any end point on the branch.

Initially, the primary advantage of PBXs was cost savings on internal phone calls: handling the
circuit switching locally reduced charges for local phone service. As PBXs gained popularity,
they started offering services that were not available in the operator network, such as hunt
groups, call forwarding, and extension dialing. In the 1960s a simulated PBX known
asCentrex provided similar features from the central telephone exchange.

System components
A PBX often includes:

 The PBX’s internal switching network.


 Microcontroller or microcomputer for arbitrary data processing, control and logic.
 Logic cards, switching and control cards, power cards and related devices that facilitate PBX
operation.
 Stations or telephone sets, sometimes called lines.
 Outside telco trunks that deliver signals to (and carry them from) the PBX.
 Console or switchboard allows the operator to control incoming calls.
 Uninterruptible power supply (UPS) consisting of sensors, power switches and batteries.
 Interconnecting wiring.
 Cabinets, closets, vaults and other housings.

PBX functions
Functionally, the PBX performs four main call processing duties:

 Establishing connections (circuits) between the telephone sets of two users (e.g. mapping a
dialed number to a physical phone, ensuring the phone isn't already busy)
 Maintaining such connections as long as the users require them (i.e. channelling voice
signals between the users)
 Disconnecting those connections as per the user's requirement
 Providing information for accounting purposes (e.g. metering calls)

Q. What are the issues to be addressed while planning a communication network system for a
corporate office? With the help of a diagram describe the functioning of the system, its
components and controls. 2010
COMMUNICATIONS NETWORK
Network architecture is the design of a communications network. It is a framework for the
specification of a network's physical components and their functional organization and
configuration, its operational principles and procedures, as well as data formats used in its
operation.
In telecommunication, the specification of a network architecture may also include a detailed
description of products and services delivered via a communications network, as well as
detailed rate and billing structures under which services are compensated.
The network architecture of the Internet is predominantly expressed by its use of the Internet
Protocol Suite, rather than a specific model for interconnecting networks or nodes in the
network, or the usage of specific types of hardware links.

Q. What is access flooring? Explain the installation method for access flooring through
explanatory drawings. 2012
Q. An IT company server room needs false flooring. Explain in detail with neat sketches about
the various components involved in false flooring, its loading details and the various materials
used in it. 2011

Q. Write short notes on elevated flooring for computer applications. 2012


ACCESS FLOOR
Floor Support For Raised Floor

A raised access floor comprises of load bearing floor panels laid in a horizontal grid supported
by adjustable vertical pedestals to provide an underfloor space for the housing and distribution
of services. The floor panels are readily removable to allow quick access to the underfloor
services.

A raised floor (also raised flooring, access floor(ing), or raised access computer floor) provides
an elevated structural floor above a solid substrate (often a concrete slab) to create a hidden
void for the passage of mechanical and electrical services. Raised floors are widely used in
modern office buildings, and in specialized areas such as command centers, IT data centers and
computer rooms, where there is a requirement to route mechanical services and cables, wiring,
and electrical supply. Such flooring can be installed at varying heights from 2 inches (51 mm) to
heights above 4 feet (1,200 mm) to suit services that may be accommodated beneath.
Additional structural support and lighting are often provided when a floor is raised enough for a
person to crawl or even walk beneath.
The access floor system (floor panels and support pedestals) creates a space between the floor
slab and the underside of the access floor. This space is where you can cost-effectively run any
of your building services. These services consist of electric power, data, telecom/voice,
environmental control and air conditioning, fire detection and suppression, security, etc.

The access floor panels are designed to be removable from their support so that ‘access’ to
underfloor services is fast and easy. Access holes are made in the floor to allow services to
terminate at floor level using hinged lid termination boxes, or ‘pass-thru’ the floor panels into
the working space of the building area.

Design

This type of floor consists of a gridded metal framework or substructure of adjustable-height


supports (called "pedestals") that provide support for removable (liftable) floor panels, which
are usually 2×2 feet or 60×60 cm in size. The height of the legs/pedestals is dictated by the
volume of cables and other services provided beneath, but typically arranged for a clearance of
at least six inches or 15 cm.
The panels are normally made of steel-clad particleboard or a steel panel with
a cementitious internal core, although some tiles have hollow cores. Panels may be covered
with a variety of flooring finishes to suit the application, such as carpet tiles, high-pressure
laminates, marble, stone, and antistatic finishes for use in computer rooms and laboratories.
When using a panel with a cement top surface the panels are sometimes left bare and sealed or
stained and sealed to create a tile appearance and save the customer money. This bare
application is used most often in office atria, hallways, lobbies, museums, casinos, etc.
Many modern computer and equipment rooms employ an underfloor air distribution to ensure
even cooling of the room with minimal wasted energy. Conditioned air is provided under the
floor and dispersed upward into the room through regularly spaced diffuser tiles, blowers or
through ducts directed into specific equipment. Automatic fire protection shutoffs may be
required for underfloor ventilation, and additional suppression systems may be installed in case
of underfloor fires.

Server cabinet aisle on raised floor with cooling


panels

If the room is ventilated through the access floor using ventilation inserts, drilled holes or the
like, this will be evident on the top side of the floor covering. This is where seepage ventilation
access flooring differs from standard systems. The structure of the floor covering allows air to
flow through without any visible perforation. Make certain that the floor covering is specially
suited for this purpose.
Note:
To prevent the formation of the perforation pattern in the floor covering (due to soiling), be
sure to replace the ventilation filters often; the structural subfloor must be suitable and
competent maintenance of the system must be carried out.

INSTALLATION PROCESS
step 1

step 2
step3

Q. An engineering college intends to provide computer labs on three consecutive floors and
also plans to connect all the labs from a server room located in the ground floor. Propose a
suitable raceway system/s for function of labs. Distinguish between cellular metal floor raceway
and cellular concrete floor raceway. 2010
Q. A cyber library with 200 computer installations is proposed in a university library. The height
of the building is 4m and the existing flooring is cement concrete flooring. Suggest a cost
effective raceway system and with the help of neat sketches describe briefly the laying of the
raceway. 2010
Q. Write short notes with supporting sketches: Raceways in buildings. 2011
Q. Write short notes with supporting sketches: Network Cabling. 2011
Q. Write short notes with supporting sketches: conduit ducts and trenches in buildings. 2011

Cellular floor raceways are electrical wiring ducts or cells made from steel floor deck that serve
as wire and cable raceways within the concrete floor slab.
Cellular-concrete-floor raceways provide a complete underfloor electrical distribution system.
For this system the floor is constructed of precast reinforced-concrete members. These precast
members are provided with hollow voids which form smooth, round cells. The cells form
raceways for the electrical wires. Connections to the cells from a distribution center are made
by means of metal header ducts which are run horizontally across the precast slabs and
embedded in the concrete fill over the slabs. Connection from these headers to the cells is
made through handhole metal junction boxes.

Server Room Location

In many buildings, the most practical place to locate servers is in the main telecommunications
room, now called the telecommunications equipment room (formerly called the main
terminal/equipment room). Access to this room is often from a Public Access Zone. This room
can be used as long as the minimum safeguards described herein are applied. The
telecommunications equipment room should not be confused with the entrance room. The
entrance room is used as a terminal for cables owned by various telecommunications common
carriers to enter the building from the street. Equipment owned by the telecommunications
common carriers serving the building can also be stored in this room. Consequently, the
telephone companies and other telecom service providers require access to the entrance room.
In order for servers to be kept in the telecommunications equipment room (or any other room)
access to the room must be controlled by the Crown. In other words, such a room must
essentially be an Operations Zone or higher.
1Q. Enumerate the various categories of security systems that can be considered in a building.
Elaborate on their merits and demerits and the selection criteria one would adopt when
choosing such systems. 2012

2Q. List the various detectors that can be used in intruder alarms of a security installation, with
the help of neat diagram distinguish closed circuit and open wiring system. 2010

3Q. Write short notes on intruder alarm detectors. 2010

I. Barbed wire is a type of steel fencing wire constructed with sharp edges or points arranged at
intervals along the strand(s). It is used atop walls surrounding secured property.
A person or animal trying to pass through or over barbed wire will suffer discomfort and
possibly injury.

II. Digital Surveillance is the use of video cameras to transmit a signal to a specific place,
on a limited set of monitors. Survey in the Indian city of New Delhi reports that digital
surveillance systems were most effective in
• parking lots, where their use resulted in a 51% decrease in crime;
• Public transportation areas saw a 23% decrease in crimes;
• Systems in public settings were the least effective, with just a 7% decrease in crimes
overall.
There are various factors to be considered while installing this system:
• Coverage of security cameras—Adequate number of cameras based on
neighborhood area
• Distances for viewing: e.g. for full sighting of license plate –cameras to be at a
distance of no more than 75’ (20m)
• Control Room—location centralized for near immediate response maximize
public safety
• Mobility and Network Coverage Area: Equally important are size of coverage
area, potential terrain issues and optimization response vehicular motion.

III. A security alarm or intruder alarm is a system designed to detect intrusion –


unauthorized entry – into a building or area. Security alarms are used in residential,
commercial, industrial, and military properties for protection

Intruder alarm detectors are designed to provide the electronic detection of persons within
their detection field.

Types of intruder alarm detectors:

1. Sensor types

The passive infrared detector (PIR) is one of the most common detectors found in household and
small business environments because it offers affordable and reliable functionality. The term passive
means the detector is able to function without the need to generate and radiate its own energy
(unlike ultrasonic and microwave volumetric intrusion detectors that are “active” in operation). PIRs
are able to distinguish if an infrared emitting object is present by first learning the ambient
temperature of the monitored space and then detecting a change in the temperature caused by the
presence of an object. Using the principle of differentiation, which is a check of presence or non-
presence, PIRs verify if an intruder or object is actually there. Creating individual zones of detection
where each zone comprises one or more layers can achieve differentiation. Between the zones there
are areas of no sensitivity (dead zones) that are used by the sensor for comparison. Ask us if you
want to see examples of our installations in Essex and Hertfordshire.

2. Microwave detectors

This device emits microwaves from a transmitter and detects any reflected microwaves or reduction
in beam intensity using a receiver. The transmitter and receiver are usually combined inside a single
housing (monostatic) for indoor applications, and separate housings (bistatic) for outdoor
applications. To reduce false alarms this type of detector is usually combined with a passive infrared
detector or “Dualtec” alarm.

3. Glass break detectors

The glass break detector Burglar Alarm System may be used for internal perimeter building
protection. When glass breaks it generates sound in a wide band of frequencies. These can range
from infrasonic, which is below 20 hertz (Hz) and cannot be heard by the human ear, through the
audio band from 20 Hz to 20 kHz, which humans can hear, right up to ultrasonic, which is above 20
kHz and again cannot be heard.

Glass break acoustic detectors are mounted in close proximity to the glass panes and listen for sound
frequencies associated with glass breaking. Seismic glass break detectors are different in that they
are installed on the glass pane. When glass breaks it produces specific shock frequencies which travel
through the glass and often through the window frame and the surrounding walls and ceiling.
Typically, the most intense frequencies generated are between 3 and 5 kHz, depending on the type
of glass and the presence of a plastic interlayer. Seismic glass break detectors “feel” these shock
frequencies and in turn generate an alarm condition.

4. Smoke, heat, and carbon monoxide detectors

Most systems may also be equipped with smoke, heat, and/or carbon monoxide detectors. These are
also known as 24 hour zones (which are on at all times). Smoke detectors and heat detectors protect
from the risk of fire and carbon monoxide detectors protect from the risk of carbon monoxide.
Although an intruder alarm panel may also have these detectors connected, it may not meet all the
local fire code requirements of a fire alarm system

Vibration (shaker) or inertia sensors

These Burglar Alarm systems are mounted on barriers and are used primarily to detect an attack on
the structure itself. The technology relies on an unstable mechanical configuration that forms part of
the electrical circuit. When movement or vibration occurs, the unstable portion of the circuit moves
and breaks the current flow, which produces an alarm. The technology of the devices varies and can
be sensitive to different levels of vibration. The medium transmitting the vibration must be correctly
selected for the specific sensor as they are best suited to different types of structures and
configurations.
5. Door / Window Contacts

These Burglar Alarm devices are mounted on the frame of the door with a magnet on the door itself,
and detect the door being opened typically more than 10mm. They can be used on a door in order to
start an entry timer on the system to allow unsetting, or to cause a system to set when leaving a
property. Alternatively there can be an instant alarm on a door or window if it opened when the
system is set.

MAINTENANCE
Because these devices are continually powered and operating, their performance degrades over time.

All detectors need to be regularly maintained to ensure they are operating to their full ability and their
environment needs to be regularly examined to ensure that any changes are not detrimental to the
reliable and optimal operation of any intruder detection device.

All detectors have a limited life expectancy and must be considered as consumable items. Since, the
cost for the replacement of these devices is borne by schools under their maintenance budget, schools
should prepare for the necessary replacement of these items when it is required.

The life expectancy of a detector will depend highly on its location and environment.
Detectors which are exposed to direct sunlight have a severely reduced life expectancy. Other factors
such as dust, humidity, insect infiltration and power supply voltage level and fluctuations can and do
impact on the life expectancy of intruder detectors.

A typical intruder detector, properly installed and maintained, can be expected to last between 8 and
10 years before degradation of operation reaches a level where replacement is necessary.

The service maintenance carried out on your alarm system should identify any detector which is not
providing adequate protection and if adjustment or calibration cannot provide an improvement.

Q. Write short notes on CCTV provision in buildings. 2012

Benefits of CCTV include its permanent presence, acting both as a deterrent and an accurate
source of evidence in the case of any incident, as well as its capacity to act as an active alarm,
alerting operators to unexpected movements and sounds.

Video surveillance allows you to monitor or record activity in and around an area for many
different reasons. For example, parents might want to watch over a sleeping child and lessen
the risk of a dangerous fall from the crib. But a security camera system around the house can
see people who approach the front door and maybe even catch a criminal in the act of breaking
in.
Digital Surveillance is the use of video cameras to transmit a signal to a specific place, on a
limited set of monitors. Survey in the Indian city of New Delhi reports that digital surveillance
systems were most effective in
• parking lots, where their use resulted in a 51% decrease in crime;
• Public transportation areas saw a 23% decrease in crimes;
• Systems in public settings were the least effective, with just a 7% decrease in crimes
overall.
There are various factors to be considered while installing this system:
• Coverage of security cameras—Adequate number of cameras based on
neighborhood area
• Distances for viewing: e.g. for full sighting of license plate –cameras to be at a
distance of no more than 75’ (20m)
• Control Room—location centralized for near immediate response maximize
public safety
• Mobility and Network Coverage Area: Equally important are size of coverage
area, potential terrain issues and optimization response vehicular motion.

There's a wide variety of security cameras available. Some are large and out in the open, and
might serve simply to deter criminals from even approaching a home, while others are tiny and
meant to stay hidden from view.

Security cameras are either wired or wireless, and which setup you'll need depends on where
you'll want to put the cameras and how visible you want them to be. Wired cameras might be
trickier to install, and stray wires can hamper your attempts to be discreet. They do, however,
have a typically higher-quality picture than wireless cameras, since their signals aren't travelling
through the air.

Wireless cameras have more flexibility, but broadcasts from other devices such as wireless
Internet, cordless phones and baby monitors -- can interrupt a wireless camera's signal.

Where you place the camera lens is important. The distance of the camera from its subject
should be carefully considered, making sure the right areas are in focus and clearly visible. If
you mount a camera to a wall or structure, make sure it's mounted properly so the camera
won't shake and distort the picture. Outdoor cameras can deter criminals from ever attempting
a break-in, and they can cover large areas, but a camera placed outside should have an
appropriate weatherproof casing to protect it from the elements. Tough casings can also
prevent tampering or vandalism.
Some people use VCRs to record video, while others run the whole system via a computer and
save information digitally. To avoid wasting video, some surveillance systems have motion
detectors that only begin recording once the device picks up movement within the area.

Q. Write short notes on security features to be considered in banks. 2011

Q. Explain in detail various security systems used in buildings against intrusion. A very busy
branch of a multinational bank wants to install such system, what would you propose and why?
Explain the strategic points in a branch where control of these systems are to be installed. 2009

The first line of security which is important is at the gates. a bank is a public building; there is
likely to be unlimited traffic either vehicular or human. Automated gates are important first line
barriers; people are unable to roam freely, and with a human patrol and/or additional CCTV
deterrents, the perimeter is secured.

Door entry is a second line of defense; preventing unfettered access to the inside. Door entry
design can be fitted and operated alongside a monitored CCTV facility (where remote operation
can be used) or next to a reception area with staff.

Public areas both indoors and outside can be monitored by CCTV both day and night.

A building’s weak spots, like back entrances or fire exits can be monitored in a central control
centre; and alarms can be fitted at specific entrance points outside of usual hours. Corridors
can be monitored remotely or simple recordings used in the event of an incident and provide
valuable clarification or evidence.

There should have a proper strong room as per RBI specifications. There should be good quality
tamper proof AC/DC electronic burglar alarm system. The control panel of the system should be
fitted hidden from public view. Magnetic sensors of the system should be fitted on the top
portion of the strong room door.

A Bank Security Alarm System is one in which the protective devices of a bank safe, vault, ATM,
or night depository are connected to an enclosed and tamper-protected alarm sounding device
attached to the outside or the inside of the building in which the protected item is located.
Disturbance of the protective devices or unauthorized penetration through protected portions
of the protected item automatically causes the sounding device to operate until it is stopped by
key control or by the entry of a code in the possession of the alarm system user.
UNIT 2
ELECTRONIC SYSTEMS
IN BUILDINGS
UNIT-2

ELECTRONIC SYSTEMS IN BUILDINGS

Comprehensive and efficient facility management functions characterize the smart


buildings that are a vital part of smart grids. These buildings use a digital network to
connect and control a wide variety of equipment—including elevators, solar panels, and
an extensive set of sensors that detect temperature, lighting, human presence, and other
parameters. Electronic real-time control systems deliver enhanced operational efficiency
and reduced carbon emissions, while lowering management costs. In particular, electrical
usage efficiency is greatly improved by precisely controlling lighting, air conditioning,
and other electrical systems, and by allowing flexible operation of power supplies. The
'whole-building' control systems are essential for enabling smart grids to realize efficient
energy generation, energy savings, and energy storage.

Security Systems
Control of grounds: Fencing can be a very effective means of limiting access to
secondary exits and to vulnerable ground-level dwellings Fencing functions as a control
by requiring entry through a single, limited, highly visible area. The fencing surrounding
most single-family homes does not have locked gates. It is intended primarily to protect
children, pets, and gardens, and to define the area immediately around the home as the
private outdoor space of that household.

As a security measure, such fencing, used symbolically, is of minimal value against


premeditated crime, but it does make criminal intent visible and so is an important
deterrent.

A conventional use of fencing in multifamily complexes is to limit access to backyards


and windows of a housing cluster On conventional city blocks, backyards of row housing
are accessible only through one of the houses.

Control of interior public spaces of multifamily dwellings. The most vulnerable locations
in multifamily buildings are the interior public spaces lobbies, elevators, stairwells, and
corridors. These are areas open to the public but without the attending surveillance given
a public street by passersby and police. The crimes that occur in these interior public
spaces are the most fearful types of crimes, involving acts of personal confrontation such
as robbery, assault, and rape . Limiting access to these spaces through the use of a
doorman or intercom/door lock system can be of substantial benefit.

Window Bars, Grilles, and Gates

Where tighter security is desired, metal bars, grilles, and gates have proven most reliable.
If a wire mesh grille is used, the metal should be at least one eighth of an inch in diameter
and the openings should not exceed 2 inches The grille should be attached to the window
frame with machine or roundhead bolts which cannot be removed from the outside. If
bars are used, they should be placed not more than 5 inches apart. The bars should have a
diameter of at least three-quarters of an inch and be set at least 3 inches into the masonry.
Mesh window grille Wire mesh dimensions

Sliding gates afford excellent protection and can be pushed aside or opened for
emergency exit . The gates should be set in tracks on the top and bottom to prevent them
from being pulled or pried away from the window. Protect-A Guard gates are highly
recommended for residential and commercial use. All of these devices should be installed
inside the window for maximum security

Window guard

Electronic Systems

Electronic security equipment includes alarms designed to detect unauthorized entrance


closed-circuit television systems, apartment-to-lobby intercom locks, and various audio
equipment. While the initial cost of many of these systems is high, each could reasonably
be installed in moderate-income residential complexes and could prevent future need for
more costly measures.

Alarms

An alarm performs two functions: it detects the presence of an intruder, and it reports the
intrusion. The quality of an alarm mechanism is measured by its ability to perform these
two functions. A wide range of devices detect intrusion of a criminal into a building.
These fall roughly into two categories: contact devices and motion-detection devices.

Ultrasonic detector

Closed – Circuit Television

The purpose is to create an environment in which residents know that normal restraints of
surveillance by citizens and their authorized agents exist, albeit aided by electronics.
While initially costly, CCTV often reduces security personnel requirements or obviates
the need for expensive redesign of existing structures.

Camera Locations

Locations of a CCTV camera and the light level at that point are key cost-effectiveness
factors .

A camera's location defines the area to be observed by the camera, and the nature of the
location greatly influences the camera's vulnerability to theft and vandalism
Intercom systems

Most urban multifamily dwellings are equipped with buzzer-reply systems to limit access
to the building to tenants and to people who have been interviewed by tenants on an
intercom system.

Elevator audio systems

Use of audio systems in elevators is rapidly increasing. An elevator audio system is an


uncomplicated sound-transmission installation consisting of a microphone and speaker
located in the elevator cab and connected to similar devices near the elevator doors on
each floor.
BURGLAR ALARMS

A security alarm is a system designed to detect intrusion – unauthorized entry – into a


building or area. Security alarms are used in residential, commercial, industrial, and
military properties for protection against burglary (theft) or property damage, as well as
personal protection against intruders.

Some alarm systems serve a single purpose of burglary protection; combination systems
provide both fire and intrusion protection. Intrusion alarm systems may also be combined
with closed-circuit television surveillance systems to automatically record the activities
of intruders, and may interface to access control systems for electrically locked doors.
Systems range from small, self-contained noisemakers, to complicated, multi-area
systems with computer monitoring and control.

Passive infrared detectors

The passive infrared (PIR) motion detector is one of the most common sensors
found in household and small business environments. It offers affordable and reliable
functionality. The term passive refers to the fact that the detector does not generate or
radiate its own energy; it works entirely by detecting the heat energy given off by other
objects.
Strictly speaking, PIR sensors do not detect motion; rather, they detect abrupt changes in
temperature at a given point. As an intruder walks in front of the sensor, the temperature
at that point will rise from room temperature to body temperature, and then back again.
This quick change triggers the detection.
PIR sensors may be designed to be wall or ceiling mounted, and come in various fields of
view, from narrow "point" detectors to 360 degree fields. PIRs require a power supply in
addition to the detection signaling circuit.

Ultrasonic detectors

Using frequencies between 15 kHz and 75 kHz, these active detectors transmit
ultrasonic sound waves that are inaudible to humans. The Doppler shift principle is the
underlying method of operation, in which a change in frequency is detected due to object
motion. This is caused when a moving object changes the frequency of sound waves
around it. Two conditions must occur to successfully detect a Doppler shift event:

 There must be motion of an object either towards or away from the receiver.
 The motion of the object must cause a change in the ultrasonic frequency to the
receiver relative to the transmitting frequency.

The ultrasonic detector operates by the transmitter emitting an ultrasonic signal into the
area to be protected. The sound waves are reflected by solid objects (such as the
surrounding floor, walls and ceiling) and then detected by the receiver. Because
ultrasonic waves are transmitted through air, then hard-surfaced objects tend to reflect
most of the ultrasonic energy, while soft surfaces tend to absorb most energy.
When the surfaces are stationary, the frequency of the waves detected by the receiver will
be equal to the transmitted frequency. However, a change in frequency will occur as a
result of the Doppler principle, when a person or object is moving towards or away from
the detector. Such an event initiates an alarm signal. This technology is considered
obsolete by many alarm professionals, and is not actively installed.

Glass break detection


The glass break detector may be used for internal perimeter building protection.
Glass break acoustic detectors are mounted in close proximity to the glass panes and
listen for sound frequencies associated with glass breaking.

Seismic glass break detectors, generally referred to as "shock sensors" are different in
that they are installed on the glass pane. When glass breaks it produces specific shock
frequencies which travel through the glass and often through the window frame and the
surrounding walls and ceiling. Typically, the most intense frequencies generated are
between 3 and 5 kHz, depending on the type of glass and the presence of a plastic
interlayer. Seismic glass break detectors “feel” these shock frequencies and in turn
generate an alarm condition.

Window foil is a less sophisticated, mostly outdated, detection method that involves
gluing a thin strip of conducting foil on the inside of the glass and putting low-power
electrical current through it. Breaking the glass is practically guaranteed to tear the foil
and break the circuit.

Smoke, heat, and carbon monoxide detectors


Most systems may also be equipped with smoke, heat, and/or carbon
monoxide detectors. These are also known as 24 hour zones (which are on at all times).
Smoke detectors and heat detectors protect from the risk of fire and carbon monoxide
detectors protect from the risk of carbon monoxide. Although an intruder alarm panel
may also have these detectors connected, it may not meet all the local fire
code requirements of a fire alarm system.

Microwave detectors
This device emits microwaves from a transmitter and detects any reflected
microwaves or reduction in beam intensity using a receiver. The transmitter and receiver
are usually combined inside a single housing (monostatic) for indoor applications, and
separate housings (bistatic) for outdoor
applications. To reduce false alarms this type of
detector is usually combined with a passive
infrared detector or "Dualtec" alarm.

Microwave detectors respond to a Doppler shift in


the frequency of the reflected energy, by a phase
shift, or by a sudden reduction of the level of
received energy. Any of these effects may indicate
motion of an intruder.

Photo-electric beams

Photoelectric beam systems detect the


presence of an intruder by transmitting visible or
infrared light beams across an area, where these
beams may be obstructed. To improve the detection surface area, the beams are often
employed in stacks of two or more. However, if an intruder is aware of the technology's
presence, it can be avoided. The technology can be an effective long-range detection
system, if installed in stacks of three or more where the transmitters and receivers are
staggered to create a fence-like barrier. Systems are available for both internal and
external applications. To prevent a clandestine attack using a secondary light source
being used to hold the detector in a 'sealed' condition whilst an intruder passes through,
most systems use and detect a modulated light source.

ACCESS CONTROL

In the fields of physical security and information security, access control is the
selective restriction of access to a place or other resource. The act of accessing may mean
consuming, entering, or using. Permission to access a resource is called authorization

Physical security

Geographical access control may be enforced by personnel (e.g., border guard,


bouncer, ticket checker), or with a device such as a turnstile. There may be fences to
avoid circumventing this access control. An alternative of access control in the strict
sense (physically controlling access itself) is a system of checking authorized presence,
see e.g. Ticket controller (transportation). A variant is exit control, e.g. of a shop
(checkout) or a country.

The term access control refers to the practice of restricting entrance to a property, a
building, or a room to authorized persons. Physical access control can be achieved by a
human (a guard, bouncer, or receptionist), through mechanical means such as locks and
keys, or through technological means such as access control systems like the mantrap.
Within these environments, physical key management may also be employed as a means
of further managing and monitoring access to mechanically keyed areas or access to
certain small assets.

Physical access control is a matter of who, where, and when. An access control system
determines who is allowed to enter or exit, where they are allowed to exit or enter, and
when they are allowed to enter or exit. Historically, this was partially accomplished
through keys and locks. When a door is locked, only someone with a key can enter
through the door, depending on how the lock is configured. Mechanical locks and keys
do not allow restriction of the key holder to specific times or dates. Mechanical locks and
keys do not provide records of the key used on any specific door, and the keys can be
easily copied or transferred to an unauthorized person. When a mechanical key is lost or
the key holder is no longer authorized to use the protected area, the locks must be re-
keyed.

Electronic access control uses computers to solve the limitations of mechanical


locks and keys. A wide range of credentials can be used to replace mechanical keys. The
electronic access control system grants access based on the credential presented. When
access is granted, the door is unlocked for a predetermined time and the transaction is
recorded. When access is refused, the door remains locked and the attempted access is
recorded. The system will also monitor the door and alarm if the door is forced open or
held open too long after being unlocked

Access control system operation

When a credential is presented to a reader, the reader sends the credential’s


information, usually a number, to a control panel, a highly reliable processor. The control
panel compares the credential's number to an access control list, grants or denies the
presented request, and sends a transaction log to a database. When access is denied based
on the access control list, the door remains locked. If there is a match between the
credential and the access control list, the control panel operates a relay that in turn
unlocks the door. The control panel also ignores a door open signal to prevent an alarm.
Often the reader provides feedback, such as a flashing red LED for an access denied and
a flashing green LED for an access granted

There are three types (factors) of authenticating information:

 something the user knows, e.g. a password, pass-phrase or PIN


 something the user has, such as smart card
 something the user is, such as fingerprint, verified by biometric measurement

Credential

A credential is a physical/tangible object, a piece of knowledge, or a facet of a


person's physical being, that enables an individual access to a given physical facility or
computer-based information system. Typically, credentials can be something you know
(such as number or PIN), something you have (such as an access badge), something you
are (such as a biometric feature) or some combination of these items. The typical
credential is an access card, key-fob, or other key. There are many card technologies
including magnetic stripe, bar code, Wiegand, 125 kHz proximity, 26-bit card-swipe,
contact smart cards, and contactless smart cards. Also available are key-fobs, which are
more compact than ID cards, and attach to a key ring. Typical biometric technologies
include fingerprint, facial recognition, iris recognition, retinal scan, voice, and hand
geometry.

Access control system components

An access control point, which can be a door, turnstile, parking gate, elevator, or other
physical barrier, where granting access can be electronically controlled. Typically, the
access point is a door. An electronic access control door can contain several elements. At
its most basic, there is a stand-alone electric lock. The lock is unlocked by an operator
with a switch. To automate this, operator intervention is replaced by a reader. The reader
could be a keypad where a code is entered, it could be a card reader, or it could be a
biometric reader. Readers do not usually make an access decision, but send a card
number to an access control panel that verifies the number against an access list. To
monitor the door position a magnetic door switch can be used. In concept, the door
switch is not unlike those on refrigerators or car doors. Generally only entry is controlled,
and exit is uncontrolled. In cases where exit is also controlled, a second reader is used on
the opposite side of the door. In cases where exit is not controlled, free exit, a device
called a request-to-exit (REX) is used. Request-to-exit devices can be a push-button or a
motion detector. When the button is pushed, or the motion detector detects motion at the
door, the door alarm is temporarily ignored while the door is opened. Exiting a door
without having to electrically unlock the door is called mechanical free egress. This is an
important safety feature. In cases where the lock must be electrically unlocked on exit,
the request-to-exit device also unlocks the door

Access control topology

Typical access control door wiring

Access control decisions are made by comparing the credential to an access control list.
This look-up can be done by a host or server, by an access control panel, or by a reader.
The development of access control systems has seen a steady push of the look-up out
from a central host to the edge of the system, or the reader. The predominant topology
circa 2009 is hub and spoke with a control panel as the hub, and the readers as the spokes.
The look-up and control functions are by the control panel. The spokes communicate
through a serial connection; usually RS-485. Some manufactures are pushing the decision
making to the edge by placing a controller at the door. The controllers are IP enabled, and
connect to a host and database using standard networks.
Security risks
The most common security risk of intrusion through an access control system is by
simply following a legitimate user through a door, and this is referred to as "tailgating".
Often the legitimate user will hold the door for the intruder. This risk can be minimized
through security awareness training of the user population, or more active means such as
turnstiles. In very high security applications this risk is minimized by using a sally port,
sometimes called a security vestibule or mantrap, where operator intervention is required
presumably to assure valid identification.

Access control door wiring when using intelligent readers and IO module

The second most common risk is from levering a door open. This is surprisingly simple
and effective on most doors. The lever could be as small as a screwdriver or big as a crow
bar. Fully implemented access control systems include forced door monitoring alarms.
These vary in effectiveness, usually failing from high false positive alarms, poor database
configuration, or lack of active intrusion monitoring.
Similar to levering is crashing through cheap partition walls. In shared tenant spaces the
divisional wall is vulnerability. Vulnerability along the same lines is the breaking of
sidelights.
Spoofing locking hardware is fairly simple and more elegant than levering. A strong
magnet can operate the solenoid controlling bolts in electric locking hardware. Motor
locks, more prevalent in Europe than in the US, are also susceptible to this attack using a
doughnut shaped magnet. It is also possible to manipulate the power to the lock either by
removing or adding current.
Access cards themselves have proven vulnerable to sophisticated attacks. Enterprising
hackers have built portable readers that capture the card number from a user’s proximity
card. The hacker simply walks by the user, reads the card, and then presents the number
to a reader securing the door. This is possible because card numbers are sent in the clear,
no encryption being used.
Finally, most electric locking hardware still have mechanical keys as a fail-over.
Mechanical key locks are vulnerable to bumping.

COMPUTER SECURITY
Computer security, general access control includes authorization, authentication,
access approval, and audit. A more narrow definition of access control is to only cover
access approval, whereby the system makes a decision to grant or reject an access request
from an already authenticated subject, based on what the subject is authorized to access.
Authentication and access control are often combined into a single operation, so that
access is approved based on successful authentication, or based on an anonymous access
token. Authentication methods and tokens include passwords, biometric scans, physical
keys, electronic keys and devices, hidden paths, social barriers, and monitoring by
humans and automated systems.
In any access control model, the entities that can perform actions on the system are
called subjects, and the entities representing resources to which access may need to be
controlled are called objects (see also Access Control Matrix). Subjects and objects
should both be considered as software entities, rather than as human users: any human
user can only have an effect on the system via the software entities that they control.
Although some systems equate subjects with user IDs, so that all processes started by a
user by default have the same authority, this level of control is not fine-grained enough to
satisfy the Principle of least privilege, and arguably is responsible for the prevalence
of malware in such systems.
In some models, for example the object-capability model, any software entity can
potentially act as both subject and object. Access control models, used by current
systems, tend to fall into one of two classes: those based on capabilities and those based
on access control lists (ACLs). In a capability-based model, holding an unforgettable
reference or capability to an object provides access to the object (roughly analogous to
how possession of your house key grants you access to your house); access is conveyed
to another party by transmitting such a capability over a secure channel. In an ACL-based
model, a subject's access to an object depends on whether its identity is on a list
associated with the object (roughly analogous to how a bouncer at a private party would
check your ID to see if your name is on the guest list); access is conveyed by editing the
list. (Different ACL systems have a variety of different conventions regarding who or
what is responsible for editing the list and how it is edited.)
Both capability-based and ACL-based models have mechanisms to allow access rights to
be granted to all members of a group of subjects (often the group is itself modeled as a
subject)
Access control systems provide the essential services of authorization, identification and
authentication (I&A), access approval, and accountability where

 authorization is to specify what a subject can do;


 identification and authentication enforces that only legitimate subjects can log on to a
system;
 access approval is to grant access during operations, by association of users with the
resources that they are allowed to access, based on the authorization policy;
 Accountability identifies what a subject (or all subjects associated with a user) did.

SERVER ROOM

A server room is a room, usually air-conditioned, devoted to the continuous


operation of computer servers. An entire building or station devoted to this purpose is a
data center.The computers in a server rooms are usually headless systems that can be
operated remotely via KVM switch or remote administration software, such as Secure
Shell (ssh), VNC, and remote desktop. Climate is one of the factors that affects the
energy consumption and environmental impact of a server room. In areas where climate
favors cooling and an abundance of renewable electricity, the environmental effects will
be more moderate

Design considerations

Building a server or computer room requires detailed attention to six main design
considerations: [

-Location

Computer or server room location is the first consideration, before even


considering the layout of the room’s contents. Most designers agree that, where possible,
the computer room should not be built where one of its walls is an exterior wall of the
building. Exterior walls can often be quite damp and can contain water pipes that could
burst and drench the equipment. Certainly avoid exterior windows that will not only be a
security risk, but also be susceptible to breakages. Also, try to avoid both the top floors
and basements that may be prone to flooding or leaks in the case of roofs. If a centralized
computer room is not feasible, server closets on each floor may be an option. This is
where computer, network and phone equipment are housed in closets and each closet is
stacked above each other on the floor that they service.

In addition to the hazards of exterior walls, designers need to evaluate any potential
sources of interference in close proximity to the computer room. Check if there are radio
transmitters in close proximity and also consider electrical interference from power plants
or lift rooms, etc.

Other physical design considerations range from room size, door sizes and access ramps
(to get equipment in and out) to cable organization, physical security and maintenance
access.

-Air conditioning
Computer equipment generates heat, and is sensitive to heat, humidity, and dust,
but also the need for very high resilience and failover requirements. Maintaining a stable
temperature and humidity within tight tolerances is critical to IT system reliability.

In most server rooms “close control air conditioning” systems, also known as PAC
(precision air conditioning) systems are installed. These systems control temperature,
humidity and particle filtration within tight tolerances 24 hours a day and can be remotely
monitored. They can have built-in automatic alerts when conditions within the server
room move outside defined tolerances.Air conditioning designs for most computer or
server rooms will vary depending on various design considerations, but they are generally
one of two types: “up-flow” and “down-flow” configurations.

-Up-flow air conditioning

This type of air conditioning draws air into the front of the air handler unit (AHU),
cools the air over the heat exchanger, and then distributes the cooled air out through the
top or through duct work. This air conditioning configuration is well suited to retro-fitted
computer rooms when raised floors are either of inadequate depth or do not exist at all.

-Down-flow air conditioning

Typically, this type of air conditioning unit draws the air into the top of the air
handling unit, cools the air over the heat exchanger, then distributes the air out of the
bottom into the floor void. This conditioned air is then discharged into the server room
via strategically placed floor grilles and onwards to equipment racks. These systems are
well suited to new office buildings where the design can encompass raised floors suitable
for ducting to computer racks.

-Fire protection

The fire protection system's main goal should be to detect and alert of fire in the
early stages, then bring fire under control without disrupting the flow of business and
without threatening the personnel in the facility. Server room fire suppression technology
has been around for as long as there have been server rooms. Traditionally, most
computer rooms used Halo gas, but this has been shown to be environmentally unfriendly
(ozone depleting) and unsafe for humans. Modern computer room use combinations of
inert gases such as Nitrogen, Argon and CO2. Other solutions include clean chemical
agents such as FM200 and also hypoxic air solutions that keep oxygen levels down.

-Future-proofing

The demands of server rooms are constantly changing as organizations evolve and
grow and as technology changes. An essential part of computer room design is future
proofing so that new requirements can be accommodated with minimal effort. As the
computing requirements grow, so will a server room's power and cooling requirements.
As a rough guide, for every additional 100kW of equipment installed, a further 30kW of
energy is required to cool it. As a result, air conditioning designs will need to have
scalability designed in from the outset.The choice of racks in a server room is usually the
prime factor when determining space. Many organizations use Telco racks or enclosed
cabinets to make the most of the space they have. Today, with servers that are one-rack-
unit (1U) high and new blade servers, a single 19- or 23-inch rack can accommodate
anywhere from 42 to hundreds of servers.

-Redundancy

If the computer systems in a server room are mission critical, removing single
points of failure may be of high importance. The level of redundancy is determined by
factors such as whether the organization can tolerate interruption whilst failover systems
are activated, or must they be seamless without any business impacts. Other than
computer hardware redundancy, the main consideration here is the provisioning of
failover power supplies and cooling.

SURVEILLANCE

Surveillance System refers to a video, physical or other mechanical, electronic,


digital or wireless2 surveillance system or device that enables continuous or periodic
video recording, observing or monitoring of personal information about individuals in
open, public spaces (including streets, highways, parks). In these Guidelines, the term
video surveillance system includes an audio device, thermal imaging technology or any
other component associated with capturing the image of an individual.

Surveillance is the monitoring of the behavior, activities, or other changing information,


usually of people for the purpose of influencing, managing, directing, or protecting
them.[2] This can include observation from a distance by means of electronic equipment
(such as CCTV cameras), or interception of electronically transmitted information (such
as Internet traffic or phone calls); and it can refer to simple, relatively no- or low-
technology methods such as human intelligence agents and postal interception. The
word surveillance comes from a French phrase for "watching over" ("sur" means "from
above" and "veiller" means "to watch")

Surveillance is very useful to governments and law enforcement to maintain social


control, recognize and monitor threats, and prevent/investigate criminal activity. With the
advent of programs such as the Total Information Awareness program and ADVICE,
technologies such as high speed surveillance computers and biometrics software, and
laws such as the Communications Assistance for Law Enforcement Act, governments
now possess an unprecedented ability to monitor the activities of their subject.

Why Video Surveillance?


Improve public safety

Mitigate risks of crime and terrorism

Protect assets

Prevent fraud

Improve efficiency

Automate more processes

- Train dispatch

- Self-checking counters

Provide better healthcare

System Components

 Camera

 Analog (continuous signaling)

 Fixed or PTZ (Pan, Tilt, Zoom)

 Standard or High definition

 Encoder

 Typically consists of a modular analog to IP video converter


 Supports different encoding formats

• MJPEG, MPEG2, MPEG4 (part2), H.264 (MOVIE PICTRE

EXPERT GROUP)

 DVR/NVR

 Digital or Networked Video Recorder

 Video Management System

 Control Center

 Display Wall

 Storage

Video Surveillance Network Topology

Local Monitoring

Central Monitoring

Backbone

Core Router

video traffic
Local Monitoring
Remote Recording Backbone and Recording
and Storage

Receivers Receivers Sources

16 | Video Surveillance | Sept. 2008 All Rights Reserved © Alcatel-Lucent 2008


Cameras
Surveillance cameras are video cameras used for the purpose of observing an area. They
are often connected to a recording device or IP network, and may be watched by
a security guard or law enforcement officer. Cameras and recording equipment used to be
relatively expensive and required human personnel to monitor camera footage, but
analysis of footage has been made easier by automated software that organizes digital
video footage into a searchable database, and by video analysis software (such
as VIRAT and Human ID). The amount of footage is also drastically reduced by motion
sensors which only record when motion is detected. With cheaper production techniques,
surveillance cameras are simple and inexpensive enough to be used in home security
systems, and for everyday surveillance.

EPABX
A private branch exchange (PBX) is a telephone exchange that serves a particular
business or office, as opposed to one that common carrier or telephone company operates
for many businesses or for the general public. PBXs are also referred to as:

PABX – private automatic branch exchange

EPABX – electronic private automatic branch exchange

CBX– computerized branch exchange

PBXs make connections among the internal telephones of a private organization—


usually a business—and also connect them to the public (PSTN) via trunk lines. Because
they incorporate telephones, fax machines, moderns, and more, the general term
"extension" is used to refer to any end point on the branch. PBXs are differentiated from
"key systems" in that users of key systems manually select their own outgoing lines,
while PBXs select the outgoing line automatically. Hybrid systems combine features of
both.

Initially, the primary advantage of PBXs was cost savings on internal phone calls:
handling the circuit switching locally reduced charges for local phone service. As PBXs
gained popularity, they started offering services that were not available in the operator
network, such as hunt groups, call forwarding, and extension dialing. In the 1960s a
simulated PBX known as Centrex provided similar features from the central telephone
exchange.Two significant developments during the 1990s led to new types of PBX
systems. One was the massive growth of data networks and increased public
understanding of packet switching. Companies needed packet switched networks for data,
so using them for telephone calls was tempting, and the availability of the Internet as a
global delivery system made packet switched communications even more attractive.
These factors led to the development of the VoIP PBX. (Technically, nothing was being
"exchanged" any more, but the abbreviation PBX was so widely understood that it
remained in use.)The other trend was the idea of focusing on core competence. PBX
services had always been hard to arrange for smaller companies, and many companies
realized that handling their own telephony was not their core competence. These
considerations gave rise to the concept of hosted PBX. In a hosted setup, the PBX is
located at and managed by the telephone service provider, and features and calls are
delivered via the Internet. The customer just signs up for a service, rather than buying and
maintaining expensive hardware. This essentially removes the branch from
the private premises, moving it to a central location.

RAISED FLOOR
A suction-cup tile lifter has been used to remove a tile.

Beneath a raised floor


A raised floor (also raised flooring, access floor), or raised access computer floor)
provides an elevated structural floor above a solid substrate (often a concrete slab) to
create a hidden void for the passage of mechanical and electrical services. Raised floors
are widely used in modern office buildings, and in specialized areas such as command
centers, IT data centers and computer rooms, where there is a requirement to route
mechanical services and cables, wiring, and electrical supply. Such flooring can be
installed at varying heights from 2 inches (51 mm) to heights above 4 feet (1,200 mm) to
suit services that may be accommodated beneath. Additional structural support
and lighting are often provided when a floor is raised enough for a person to crawl or
even walk beneath.

In the U.S., under floor air distribution is becoming a more common way to cool a
building by using the void below the raised floor as a plenum chamber to distribute
conditioned air, as has been done in Europe since the 1970s. [1] In data centers, isolated
air-conditioning zones are often associated with raised floors. Perforated tiles are
traditionally placed beneath computer systems to direct conditioned air directly to them.
In turn, the computing equipment is often designed to draw cooling air from below and
exhaust into the room. An air conditioning unit then draws air from the room, cools it,
and forces it beneath the raised floor, completing the cycle.

Design

This type of floor consists of a gridded metal framework or substructure of


adjustable-height supports (called "pedestals") that provide support for removable (lift
able) floor panels, which are usually 2×2 feet or 60×60 cm in size. The height of the
legs/pedestals is dictated by the volume of cables and other services provided beneath,
but typically arranged for a clearance of at least six inches or 15 cm.The panels are
normally made of steel-clad particleboard or a steel panel with a cementitious internal
core, although some tiles have hollow cores. Panels may be covered with a variety
of flooring finishes to suit the application, such as carpet tiles, high-
pressure laminates, marble, stone, and antistatic finishes for use in computer rooms
and laboratories. When using a panel with a cement top surface the panels are sometimes
left bare and sealed or stained and sealed to create a tile appearance and save the
customer money. This bare application is used most often in office atria, hallways,
lobbies, museums, casinos, etc. Many modern computer and equipment rooms employ
an underfloor air distribution to ensure even cooling of the room with minimal wasted
energy.

Conditioned air is provided under the floor and dispersed upward into the room
through regularly spaced diffuser tiles, blowers or through ducts directed into specific
equipment. Automatic fire protection shutoffs may be required for underfloor ventilation,
and additional suppression systems may be installed in case of underfloor fires. Many
office buildings now use access flooring to create more flexible and sustainable spaces.
When underfloor air is designed into a building from the start of the project, the building
can be less expensive to build and less expensive to operate over the life of the building.
Underfloor air requires less space per floor, thereby reducing the overall height of the
building, which in turn reduces the cost of the building facade. The blowers and air
handlers required for underfloor air are much smaller and require less energy, since hot
air rises naturally through the space as it comes in contact with people and equipment that
warm the air and it rises to the ceiling. Additionally, when buildings are designed to
combine modular electrical, modular walls, and access floor, the space within the
building can be reconfigured in a few hours, as compared to historical means of
demolishing walls and drilling holes in the floor to route electrical and other services. As
more companies construct or renovate buildings to meet LEED (Leadership in Energy &
Environmental Design) underfloor air and access floor usage will continue to grow. The
USGBC (United States Green Building Council) states that approximately 25% of all
new buildings are built to meet the LEED requirements today.

Because the flooring tiles are rarely removed once equipment has been installed,
the space below them is seldom cleaned, and fluff and other debris settles, making
working on cabling underneath the flooring a dirty job. Smoke detectors under the raised
floor can be triggered by workers disturbing the dust, resulting in false alarms.
Panel lifter

One-cup suction lifter

To remove panels, a tool with a suction cup on the end (referred to as a "floor puller",
"tile lifter", or "suction lifter") is used. A hook-and-loop lifter may be used on carpeted
panels.
Structural problems

Structural problems, such as rocking panels and gaps between panels, can cause
significant damage to equipment and injury to personnel. Regular inspections for
the structural integrity of a raised floor system can help to identify and mitigate problems.

Many such problems can be attributed to sub-par installation. During installation,


attention should be paid to the condition of the subfloor, which should be clean of debris
and should be as level as possible.

The walls surrounding the raised floor should be as square as possible to minimize the
need for cutting raised floor panels and to minimize rocking panels and gaps.

Cooling load implications

The installation of a raised floor system can change the thermal behavior of the building
by reducing the interaction between the heat gains and the thermally massive concrete
slab.The raised floor serves as a separation between the room and the slab. Energy
simulations of an office building located in San Francisco showed that the mere presence
of the raised floor affects the zone cooling load profile and tends to increase the peak
cooling load. When carpeting is present the negative impact of the raised floor on zone
peak cooling load may be reduced.

Telecommunications data center applications


Raised floors available for general purpose use typically do not address the special
requirements needed for telecommunications applications.
The general types of raised floors in telecommunications data centers include: stringer
less, stringered, and structural platforms; and, truss assemblies.

 Stringer less raised floors — an array of pedestals that provide the necessary height
for routing cables and also serve to support each corner of the floor panels.
 Stringered raised floors — a vertical array of steel pedestal assemblies (steel base
plate, tubular upright, and a head) uniformly spaced on 2-foot centers and
mechanically fastened to the concrete floor.
 Structural platforms — members constructed of steel angles or channels that are
welded or bolted together to form an integrated platform for supporting equipment.
 Truss assemblies — utilizing attachment points to the subfloor to support a truss
network on which the floor panels rest. The truss has high lateral strength and
transfers lateral loads to the subfloor with less strain than possible with a vertical
pedestal assembly.
A telecommunications facility may contain continuous lineups of equipment cabinets.
The most densely populated installation configuration would consist of rows of
continuous 2-foot-wide equipment cabinets with aisles that separate 2-foot-wide adjacent
rows. This lineup configuration is considered to be the most densely populated in terms
of square foot area and, therefore, the largest floor load anticipated for a raised floor
system. Considering prorated aisle space, a single equipment cabinet will then occupy an
8-square foot (0.74-m2) floor area (4 square feet for the cabinet and 4 square feet of
aisle).
The data center can be located in remote locations, and is subject to physical and
electrical stresses from sources such as fires and from electrical faults.
The environment drives the installation methods for raised floors, including site
preparation, cable and cable racking, bonding and grounding, and fire resistance. The
actual installation should be in accordance with the customer’s practices.

DESIGN OF COMPUTER LABS

Purpose

The purpose of a computing facility will greatly impact most design aspects including
room layout, computer hardware, printing systems, projection/presentation systems, etc.
Consider what the primary use of this facility will be:

 Open computer use - students come and go to use the computers for assignments
or projects
 Instructional computing facility - facility is used for instruction lead by a single
person
 Collaborative work - facility is used by students in a group project setting
 Laboratory work - computers are used for data collection or in a laboratory setting
Specific application The greatest influence on the computer hardware itself is the
intended application and operating system. These will drive the need for more powerful
computers, larger monitors, specific printing needs, and other technical decisions.

Budget - If everyone could afford to build the perfect lab they would, but there are
always budget limitations. Find the limits and project priorities (these priorities should be
influenced by the above factors) and decide on trade-offs. Is new furniture sacrificed for
more powerful computers? Is advanced printing left behind in favor of a projection
system?

Staffing/Maintenance - A computing facility requires staffing to install, configure, and


maintain hardware and software. The size, complexity, and purpose of a computing
facility will determine the staffing needs. The lack of proper staffing and maintenance
may limit a facilities availability or usefulness.

Aspects for consideration

Special note - For all of the following hardware items, one should consider the reliability,
serviceability, and warranty of the specific items. This can greatly impact the
maintenance costs and headaches down the road. We recommend at least a three-year
warranty on all computer hardware if available.

Workstation hardware - This central aspect of the facility is influenced by all of the
previously mentioned factors. Consider the needs in the following areas

 CPU - What level of processing power is required by the applications?


 Memory - What amount of RAM is required by the applications?
 Primary storage space - How much storage space is required to install the local
applications? Will users be storing documents on the local machines? Do
applications require a great deal of swap space?
 Sub-systems - evaluate your needs for:
o Networking - generally only a 10/100 Ethernet card is required
o Audio - Sound card, speakers, headphones, microphones
o Video - Video card speed and memory
o Secondary storage - CD, CD-R, DVD, Zip, etc.
o Input - Keyboard and mouse variations
 Monitor - Is a large monitor needed for graphics or engineering work?
 Form factor - Is a small computer required due to furniture or space limitations? Is
a small form factor monitor required for students to see the instructor or each
other?

Server hardware - Most computing facilities rely on a server for application serving,
print serving, or storage. This hardware can vary greatly depending on the specific use of
the server.

Networking - Networking is a core component of computing facilities; it allows access


to Internet resources, access to e-mail, and the ability to collaborate remotely. Potential
networking costs include installation/activation of Ethernet jacks (B-jacks), monthly B-
jack fees, hubs/switches for networking within the room (not needed if each computer has
a B-jack), and cabling. Networking may represent a good portion of the cost of the
facility.

Printing - Most computing facilities require some form of printing to be available. For
most applications this simply means the ability to print black and white text documents,
but there are a variety of printing needs. Another consideration is the quantity of printing
expected in the facility. This greatly influences the specific model of printer within a type
of printer. The following are the most popular forms of printing in campus computing
facilities:

 Black and white laser printing


 Color printing (laser or inkjet) * Plotting
Other peripherals - The purpose and specific application of a facility may require
additional hardware not in a traditional computing lab. These are some common
peripherals used in special applications:

 Scanning
 Special storage (CD-R, Jaz, DVD-R, etc.)
 Special input (tablets, mapping, data acquisition, etc.)

Audio/Video systems (projector, sound, etc.) - Many computing facilities, especially


instructional ones, benefit from the ability to display information for the entire room.
This may include the ability to project computer screens, project television/video
tapes/DVDs, play audio tapes/CDs, and amplify input from microphones. More advanced
systems even allow instructors to project any of the workstation screens to a projector or
to other computer screens on the fly.

Upgrade path - Any computer hardware and software will eventually have to be
replaced as it becomes obsolete. Computing facilities should have an upgrade plan and
budget for both hardware and software. In general, ITS uses a three-year replacement
cycle for hardware in computing facilities. Software is replaced more frequently, usually
as new, more useful, versions are released. Budgeting for new software is difficult due to
the unpredictable nature of software development, but plan on spending about a third of
your original software costs each year in upgrades.

Furniture - The purpose of a facility is the strongest influence on the furniture and
layout of the facility. An open computer lab may simply be rows of computers on basic
tables. An instructional facility may have rows all facing the front of the room for
instruction. A collaborative facility may have single computers (or groups of computers)
at large tables designed to seat many students. At least one workstation in each facility
should be placed on an adjustable height table for accessibility by people using
wheelchairs. In an instructional facility, the instructor’s workstation should also be placed
on an adjustable height table.

Accessibility - In addition to placing accessible tables in the lab (see the above section on
furniture), one should also consider the accessibility of the computer applications (using
special input/output hardware or software), other systems (printing, A/V equipment, etc.),
and the accessibility of the room layout. More detailed information about accessibility is
available from the CU-Boulder Assistive Technology Lab.

Power - Often the existing power circuit(s) in a room are not sufficient for a computing
facility. Examine your power needs and resources, and contact facilities management
regarding power system upgrades.

Telecommunication and other miscellaneous services

Common Antenna System for TV Receivers

In multistoried apartments, houses and hotels where many TV receivers are located, a
common master antenna system may preferably be used to avoid mushrooming of
individual antennas.

Master antenna is generally provided at the top most convenient point in any building and
a suitable on the top most floor or terrace for housing the amplifier unit, etc,

Inverter
• Adequate rating of protective devices such as MCB, MCCB, fuses, ELCB, etc,
shall be provided at both incoming and outgoing sides.

• Earthing shall be done properly.

• Adequate ventilation space shall be provided around the battery section of the
inverter.

Care in circuit design to keep the connected load in such a manner that the demand at the
time of mains failure is within the capability of the inverter
UPS System

• An electrical device providing an interface between the mains power supply and
sensitive loads.

• It is generally made up of a rectifier/charger and an inverter together with a battery


for backup power in the event of a mains failure with virtually no time lag.

• Provisions of isolation transformers shall be provided where the capacity exceeds


5 kVA.

• b) UPS shall have dedicated neutral earthing system.

• c) Adequate rating of protective devices such as MCB, MCCB, fuses, ELCB, etc,
shall be provided at both incoming and outgoing sides.

• d) UPS room shall be provided with adequate ventilation and/or air conditioning
as per requirement.

You might also like