Simply more efficient
by Dr Matthias Döring
Security Management Software - what is it and what does it offer?
Banks, airports, museums, police and government buildings, industrial plants, power stations, as well as casinos and sports stadiums all represent establishments with diverse and complex security requirements. Over the years security manufacturers have risen to the various challenges they present by devising extensive ranges of technical solutions.
However, when they are applied side by side to counter a given mix of threats, their different proprietary communication standards and operating philosophies, introduce complications and limitations into the overall system. And these may be further compounded with subsequent expansion and upgrading, resulting in heterogeneous structures within the security system, which are unable to communicate with each another. This is not only a headache for designers and planners, but it compels security staff to learn different configuration and operating methods for each sub-system, and limits the systems efficiency.
Unifying software
Accepting the existence of equipment and the diversity of protocols as facts of life no-one is in a position to start again from scratch - software developers approached this situation from another angle. Although they could not standardise systems and protocols, they could use digital technology to change the way they relate to each other and to humans. Their solution was to introduce a new universal environment for all security system components with a new unified interface for humans security management software (SMS), Geutebrücks GeViSoft for example.
Security management software uses standard TCP/IP protocols and runs on conventional computer infrastructure, but it works together with security solutions of all kinds, treating each element, be it CCTV, access control or a fire alarm system, as a sub-system within an overarching management philosophy. Its many interfaces enable communication with all sub-systems irrespective of manufacturer, protocol or standard, so it provides a common, simplified configuration and operating environment for installers and operators alike.
To integrate lots of different kinds of peripherals into a unified system they all need to be able to communicate with a programmable logic controller (PLC), the systems routine decision-maker. PLCs are used extensively in industry for controlling automated processes but they themselves cannot interpret the diverse proprietary outputs from security devices and systems, or create understandable commands for a security environment. The SMS therefore takes on the role of interpreter, converting the outputs from sensors, actors and subsystems into a form, which is recognised by the PLC, and translating the commands issued by the PLC back into the relevant peripheral system protocols.
Working with other management systems
SMS can be structured to be a sub-system in an over-arching facility or building management system. As far as automatic functions are concerned, the boundaries between the building management and the security management systems are blurred. So for example it may be desirable that the SMS takes control of some building automation functions such as lighting. However, whereas facility management software may support commercial components such as energy cost monitoring or space utilisation planning, security management software does not.
Figure 1
Functions and capabilities
Security management software can manage the execution of complex, automatic procedures involving a large number of different sub-systems and interfaces. An example illustrated schematically in Figure 2 shows how an access control card terminal can control recording at a digital video recorder (DVR), move dome cameras automatically to pre-set positions, while at the same time switching the light on, activating a door contact, and ensuring that all these events are recorded in an activity database. A summary of the events together with the relevant pictures and their pre-history are instantly presented to security staff on a site plan screen display. Such a system may be set up to send emails or mobile phone messages as well. And, in addition the SMS may be used to manage individual user rights or time-related activities with day/night switching.
Figure 2
As well as providing automatic handling procedures across the whole site, with all system activities logged in a database for future analysis, security management software also selects which information is to be presented to the security staff. This intelligent filtering process ensures that staff always has the important information in front of them, but are not over-burdened or confused with irrelevant data.
SMS can support an almost unlimited number of users and workstations. The large number of interfaces makes it easy to expand existing installations with new sensors and actors or sub-systems. Thanks to GeViSofts computer aided security design (CASD) function, it acts as a specialized expert system, providing software-aided direct configuration of security scenarios, for speedier installation and set-up.
Software architecture
Flexible and easily expanded security management software can be created using the client/server architecture common in the IT world. The term client/server describes the relationship between two computer programs in which one program, the client, makes a service request from another program, the server, which fulfils the request. These programs can run on the same computer or on different computers in different locations within a network, the latter being described as distributed architecture.
Figure 3
The schematic drawing in Figure 3 shows the client/server structure used by Geutebrücks GeViSoft security management software. This has a PLC server at the centre and four main clients carrying out the following functions:
- Configuration
- Detection and control of activity within the peripherals
- System integration through data exchange with for example FMS, BMS or DVR which themselves may also be complex client/server systems
- Providing user interfaces
Since the structure uses TCP/IP, the same communication standard as the Internet, it is not restricted to a particular physical network such as Ethernet or Token Ring but is network independent.
Clients and server communicate via a multi-client communications applications programming interface (API) this publicly available API offers programmers complete access to the functionality of the SMS so that they can develop their own new clients with specialized functions to enhance the systems capabilities without changing the core software.
The PLC server carries out the central processing of all the activities provided by the clients. Its logical resources are events, alarms, logical relationships and timers and the output activity it produces is forwarded via the peripheral clients to the sub-systems. It also has an important address mapping function, which enables the system to present the operator with a global view of all sensors and actors, irrespective of the original addressing method used by the sub-systems. - Vital for big systems with thousands of sensors and actors. The PLC server also manages an activity database for reconstructing and analysing the causes of a system reaction and the behaviour of the system itself after alarm situations.
The integration clients and the peripheral clients with their multiplicity of interfaces register the activities of the sub-systems but mask their individual properties. The peripheral clients receive activity outputs from the peripherals and translate them from the proprietary formats into messages, which are understood by the PLC server. The PLC processes these into system responses, which are sent back to the peripherals video matrices, operating devices or cash dispensers for example.
Whether an installation is small or large, the systems distributed architecture allows the user to choose where to position the sub-systems, and enables him to reduce cabling costs by locating the client near the activity source.
The GUI clients in the figure are graphical user interface clients - the systems operating interfaces, the PC workstations. GUIs usually take the form of ground plans with active elements embedded in them, which may display current system status or allow manual control. Traditional operating devices designed by or for specific manufacturers are increasingly being replaced by GUI solutions since they offer significantly greater flexibility and allow tailor-made interfaces to be designed and created very quickly.
More effective
Security management software like Geutebrücks GeViSoft turns complex, restrictive structures into open flexible environments. It lengthens the useful life of existing devices and systems, and it supports the introduction of new systems and developments as they come along. SMS avoids compatibility problems. It allows planners and designers to choose sub-systems solely on the basis of best performance, and even offers them CASD assistance with configuration. With both system and GUI tailored to the specific situation, operation is easier, more understandable and intuitive, so both system and security staff can be more effective.
For product information please contact:
Pieter van der Burg
Geutebrueck GmbH
Im Nassen 7-9
Postfach
Windhagen
Tel:
Fax:
E-mail:
Press enquiries to:
Jan Burnell
27 Inchbrook Road
Kenilworth
Warwickshire
CV8 2EW
UK
Tel:
E-mail:
|