Secure Video Surveillance System (SVSS) for Unannounced Safeguards Inspections
|
|
- Giles Fowler
- 8 years ago
- Views:
Transcription
1 1 IAEA-CN-184/124 Secure Video Surveillance System (SVSS) for Unannounced Safeguards Inspections M. Pinkalla a, E. Galdoz b a Sandia National Laboratories Albuquerque, New Mexico USA b Brazilian-Argentine Agency for Accounting and Control of Nuclear Materials (ABACC) Rio de Janeiro, Brazil mnpinka@sandia.gov Abstract. The Secure Video Surveillance System (SVSS) is a collaborative effort between the U.S. Department of Energy (DOE), Sandia National Laboratories (SNL), and the Brazilian-Argentine Agency for Accounting and Control of Nuclear Materials (ABACC). The joint project addresses specific requirements of redundant surveillance systems installed in two South American nuclear facilities as a tool to support unannounced inspections conducted by ABACC and the International Atomic Energy Agency (IAEA). The surveillance covers the critical time (as much as a few hours) between the notification of an inspection and the access of inspectors to the location in facility where surveillance equipment is installed. ABACC and the IAEA currently use the EURATOM Multiple Optical Surveillance System (EMOSS). This outdated system is no longer available or supported by the manufacturer. The current EMOSS system has met the project objective; however, the lack of available replacement parts and system support has made this system unsustainable and has increased the risk of an inoperable system. A new system that utilizes current technology and is maintainable is required to replace the aging EMOSS system. ABACC intends to replace one of the existing ABACC EMOSS systems by the Secure Video Surveillance System. SVSS utilizes commercial off-the shelf (COTS) technologies for all individual components. Sandia National Laboratories supported the system design for SVSS to meet Safeguards requirements, i.e. tamper indication, data authentication, etc. The SVSS consists of two video surveillance cameras linked securely to a data collection unit. The collection unit is capable of retaining historical surveillance data for at least three hours with picture intervals as short as 1sec. Images in.jpg format are available to inspectors using various software review tools. SNL has delivered two SVSS systems for test and evaluation at the ABACC Safeguards Laboratory. An additional proto-type system remains at SNL for software and hardware testing. This paper will describe the capabilities of the new surveillance system, application and requirements, and the design approach. 1. Introduction The Brazilian-Argentine Agency for Accounting and Control of Nuclear Materials (ABACC) and the International Atomic Energy Agency (IAEA) perform safeguards verification activities at nuclear installations in Brazil and Argentina. In particular, ABACC and IAEA require surveillance measures to support unannounced inspections. Currently, the EMOSS (EURATOM Multi-camera Optical Surveillance System), developed by EURATOM for the IAEA, is the surveillance technology employed. The EMOSS is out-of-date and no longer manufactured, which has presented difficulties in purchasing spare parts and performing system maintenance. It is increasingly prone to failure. The ABACC therefore desires a replacement system, specifically designed to fulfill unannounced inspections requirements. The IAEA has been developing its next-generation surveillance system ( XCAM ), which eventually will replace existing safeguards surveillance systems. However, XCAM is not yet in production, and it is not known when new units would replace the EMOSS in South American facilities.
2 The ABACC and the U.S. Department of Energy (DOE) therefore agreed to develop a system suitable to replace the ABACC EMOSS units with current commercial off-the-shelf (COTS) technology customized to comply with the specific requirements for the unannounced inspection application. The solution would ensure data redundancy, confidence, and system reliability, with a relatively low cost for development, construction, operation, and maintenance. 2. Application Requirements The safeguards approach for unannounced inspections requires that a specific field of view be kept under surveillance from the time inspectors request access to the time they finally arrive at the area of interest. Any surveillance collected before the unannounced inspection request may not be disclosed to the inspectorate. The facility operator must ensure that inspectors can reach the inspection location within two hours after the inspection request; thus, the surveillance system should never retain more than the previous few hours of images. Whenever inspectors are able to gain access more quickly, all images acquired prior to the inspection request must not be visible to the inspector. The goal of the video surveillance system is to collect images in rapid succession to ensure the video detection of short-duration activities. ABACC requires a Picture Taking Interval (PTI) of one second between successive surveillance frames. The ABACC and IAEA inspectors may review the surveillance record either jointly or independently during unannounced inspections. All review activities must take place on site and no images may be removed from the facility. The surveillance system must therefore provide the inspector with all software tools necessary to obtain a safeguards conclusion prior to leaving the facility. In case of inconclusiveness or doubt, it must be possible to store the images on external media, kept under joint seal (ABACC, IAEA, and operator). SVSS acquires images from two independently-positioned cameras that transmit via wire links of arbitrary length to a collection unit for storage and review. The links must be protected using authentication measures to ensure that the inspector can trust the image data. In addition, the camera housings and collection unit must include tamper indication. To increase system reliability, images must also be retained as backup within the camera s flash memory. The backup images would only be needed to recover surveillance in the event of a collection unit or transmission failure. Administrative procedures would be necessary in this case so that the inspector was able to access only the images required. The system must operate on mains power provided by a secured facility electrical line. An uninterruptable power supply (UPS) within the tamper-indicating enclosure is required to protect against short-term loss of power. The UPS will further ensure that the cameras have priority to operate autonomously. 3. Design Approach The design utilizes commercial, off-the-shelf (COTS) components suitably integrated in a system that complies with the stated requirements. A number of cameras with different features could be used for the intended purpose. A Sony network camera was selected for this application because of its availability, reliability, performance characteristics, and operational experience. The camera is capable of acquiring and collecting images via Ethernet at a one second or shorter PTI. It is also capable of storing images locally on removable flash memory. The images acquired by the camera modules are transmitted (pushed) to a collection computer or server. The data transmission is handled by an Ethernet connection between each camera and the server. To ensure that the images stored in the server for review are authentic and generated by the actual and originally configured camera, the transmission is encapsulated inside a VPN (Virtual Private Network) tunnel, implemented with VPN hardware devices already approved for safeguards purposes. To confirm that no tampering has occurred in the system, the camera enclosures and server cabinet are
3 sealed using Agency approved seals to permit independent access of only one agency (IAEA or ABACC) during inspections. The cabinet selected to enclose the server computer is a two compartment Hoffman enclosure, accessed by independent doors. The bottom door is sealed with a passive metallic seal intended for access to the main system components for maintenance purposes only. The top door is sealed with an electronic seal (VACOSS or EOSS), which allows the inspector to access the server computer during a surveillance review by using the supplied keyboard and monitor. The collection computer is an industrial PC running standard software for storage and review of the images, based on the storage requirements. Specific software operates on the server to maintain at least three hours of data, yet permits an inspector to review at most two hours of the most recently recorded data. The software also downloads the jpeg-format images from the camera(s) and converts the images into an AVI file for playback review during the inspection activities. In the event of a system failure, it is possible for an inspector to retrieve the images directly from the local removable flash memory in the camera for manual safeguards review. Safeguards technical data are also recorded on the system. System logs are continuously updated with information about any abnormality that may have occurred during the period between two consecutive inspections, e.g., dropped images, camera or server housing tamper events, high temperature alerts, etc. Inspectors can review these events in the system logs to assess the reliability and performance of the system. A UPS provides uninterruptable power to the system to ensure that a power outage does not cause an interruption of the surveillance process. The UPS is designed to provide power to the system continuously. If the power outage persists, the UPS will initiate shutdown of all hardware components except for the cameras, which will use the remaining battery power for image collection. Critical components are powered in a redundant configuration. Multiple DC power supplies provide power to the components. The cameras operate from parallel power sources; a DC power supply and a DC power converter. The DC power supply is powered directly from the facility mains power. If that fails, the DC power converter begins tapping power directly from the batteries of the UPS system. This will maximize camera operation during a power outage by utilizing the available battery power after UPS system switches off. The photograph in figure 1 shows the prototype cabinet with the inspector door opened and the closed cameras housings on top. The diagrams in figures 2 and 3 show the main components of the system and their interconnection. 4. Software Approach The system is designed using a client server model, where the cameras act as clients producing images and the server receives and stores the images pushed periodically by the client s cameras. A two-layer software platform operates in the server computer: -based layer receives and stores the images in the server hard disk. Images older than the time limit are removed at this level. System status events are also processed and recorded in this layer. -based layer operates as an interface to the inspector, and allows the image review. Both operating systems run on the same computer, by using virtualization software to share resources. The Linux operating system hosts the applications that comprise the SVSS software. Linux was chosen due to the availability of quality open-source software tools. These tools allowed the SVSS software to integrate off the shelf capabilities to meet the design and application requirements. State of health, event logging, construction of the dual image AVI file, and ftp server for camera image collection were capabilities obtained by the addition of open-source software. Custom Perl scripts were used as the integration glue code to allow the separate applications to act together as a system. All the software tools are accessible through the Windows side web browser. The Windows operating system is the user interface used by the inspector to access the SVSS software and
4 run the video review application. Currently, a standard utility is used to play AVI video files. An AVI file is created upon the receipt of a request for inspection. The inspection must fall within appropriate time constraints and is restricted to the period under surveillance only. The software will take the images stored and generate the AVI file. The Windows operating system also offers flexibility to run future applications. It is foreseen that software specifically designed for safeguards review of surveillance will be used, such as GARS, which can be modified to handle the images generated by SVSS cameras. Figure 1: Picture of SVSS Figure 2: Functional diagram of the camera modules
5 Tamper-protected enclosure Air Vent Flat Screen Monitor S1 Door Switch (Operations) Panel mounted to separate Inspector Review from Equipment & Service functions Keyboard/Mouse Inspector Review Fan Equipment and Service 12VDC to Cameras Data Collection Unit Hard Drive Fan Temp Sensor S1 S2 220VAC IN Diodes VPN I/O Device All external DC power and network cables to be inside flexible conduit DC to DC Converter To VPN, I/O and Switch To Fan and Camera VPN To Fan and Camera VPN Ethernet Switch To Monitor 220VAC S2 Door Switch (Maintenance) To Camera VPN devices ~ 5 minutes back-up ~ 6 hours back-up ~ 5 minutes back-up Battery UPS (220VAC) 220VAC IN Air Vent Figure 3: Functional diagram of cabinet
6 5. Conclusions The joint DOE/SNL-ABACC project has successfully assembled two SVSS units that have been delivered to ABACC, as well as an initial prototype unit kept at SNL. The systems have been set up for ongoing testing and evaluation. ABACC will decide if, when and where to deploy each of the delivered units. SNL will continue working with ABACC as required to support the system application. Utilizing commercially available, industrial grade components succeeded in producing a particular solution for this specific Safeguards application. The main advantage to the commercial equipment is availability and sustainability. Employing modular commercial components that are available worldwide allows for efficient maintenance necessitated by failures or upgrades. The software development and testing cycles of the project dealt successfully with various unforeseen challenges to the system integration. Software interdependencies, performance of individual components, and communications protocols presented occasional difficulties requiring special development attention. The extensive testing was therefore a critically important aspect of the project, and ultimately provides the necessary confidence in the system to both acquire and report safeguards information reliably. Acknowledgments Sandia is a multi-program laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy under contract DE-AC04-94AL85000.
Secure Video Surveillance System (SVSS) for Unannounced Safeguards Inspections
Secure Video Surveillance System (SVSS) for Unannounced Safeguards Inspections Abstract Richard L. Lucero, Jack C. Bartberger, Diana Eichert 1, Mark Pinkalla, George Baldwin Sandia National Laboratories
More informationNGSS. Evolutionary Safeguards Surveillance. Nuclear measurement solutions for safety and security. NUCLEAR MEASUREMENTS BUSINESS UNIT OF AREVA NAS
Nuclear measurement solutions for safety and security. NAS DCM-C5 Camera NAS Reader UPS NGSS Evolutionary Safeguards Surveillance NUCLEAR MEASUREMENTS BUSINESS UNIT OF AREVA NGSS The NGSS is a modular,
More informationF2F Storage Facility Monitoring System and Software Integration
F2F Storage Facility Monitoring System and Software Integration Igor Bondar, Mikhail Osipov, Egor Terushev, Dmitry Pazhin, Boris Barkanov, Anatoly Amelichev All-Russian Scientific Research Institute of
More informationNGSS Data Consolidator (DC)
NGSS Data Consolidator (DC) The Data Consolidator (DC) facilitates system configuration, monitors network status, and supervises long-term data storage and remote data transmission. The DC consists of
More informationAN INFORMATION MANAGEMENT SYSTEM FOR A SPENT NUCLEAR FUEL INTERIM STORAGE FACILITY
AN INFORMATION MANAGEMENT SYSTEM FOR A SPENT NUCLEAR FUEL INTERIM STORAGE FACILITY Karl Horak 1, Todd Giles 1, Hong-Nian Jow 2, Robert Finch 1, Hsien-Lang Chiu 3 1 Sandia National Laboratories, P.O. Box
More informationImpact of Power-over-Ethernet (PoE) on Industrial-based Networking
Ethernet-based communication, Transmission Control Protocol/Internet Protocol (TCP/IP), is emerging at all levels of the mass communications market. The introduction of Power-over- Ethernet (PoE) is poised
More informationFire Alarm System Monitoring - CAN/ULC-S561-03
Fire Alarm System Monitoring - CAN/ULC-S561-03 Brian McBain ULC Regulatory Services May 4, 2011 Copyright 1995-2007 Underwriters' Laboratories of Canada. All rights reserved. No portion of this material
More informationTemperature & Humidity SMS Alert Controller
Temperature & Humidity Alert Controller METERS 3 simple steps starting the unit: Insert the SIM card Plug in the sensors connectors Connect the AC power cord. Specifications: AC 90~260V Auto Select Internal
More informationUse of electronic seals and remote data transmission to increase the efficiency of safeguards applied in a static Plutonium store
Use of electronic seals and remote data transmission to increase the efficiency of safeguards applied in a static Plutonium store L. Persson 1, S. Synetos 1, A. Ozols 1, K. Ruuska 1, R. Leslie 2, H. Du
More informationElements of Physical Security Systems II: Intrusion Detection, Alarm Communication and Assessment, Delay, and Response
Elements of Physical Security Systems II: Intrusion Detection, Alarm Communication and Assessment, Delay, and Response International Biological Threat Reduction Department Sandia National Laboratories
More informationAmcrest 960H DVR Quick Start Guide
Amcrest 960H DVR Quick Start Guide Welcome Thank you for purchasing our Amcrest 960H DVR! This quick start guide will help you become familiar with our DVR in a very short time. Before installation and
More informationTechnical Overview CM-16 Climate Monitor. Get yours direct at: 01491 410913 www.theclimate.co.uk
Technical Overview CM-16 Climate Monitor Get yours direct at: 01491 410913 www.theclimate.co.uk Need a lot of remote sensors in a rack mount? The CM-16 has web access, graphing, and alarm alerts sent by
More informationSecurity & Surveillance Cabling Systems
Security & Surveillance Cabling Systems Security and Surveillance Cabling Systems The video security industry is growing and ever-changing, offering a wealth of opportunity for today s security professionals.
More informationTemperature@lert WiFi Edition
Temperature@lert WiFi Edition Affordable WiFi temperature and humidity monitoring to protect your most critical assets Single or Dual Sensor Configurations available Overview Temperature@lert WiFi Edition
More informationBosch Access Professional Edition 3.0 Access Control Module Certification Evaluation Made by Milestone 12-15-2014
Bosch Access Professional Edition 3.0 Access Control Module Certification Evaluation Made by Milestone 12-15-2014 Bosch - Milestone Certified Solution Summary document 1 Table of Contents Products Tested
More informationExecutive Summary. Technical Description
Executive Summary The Cellwatch system is built using modules. The majority of the system is constructed with Data Collection Modules (DCMs). The DCMs are optically linked to Control Units (CUs) that in
More informationWired / Wireless / PoE. CMOS Internet Camera ICA-107 / ICA-107W / ICA-107P. Quick Installation Guide
Wired / Wireless / PoE CMOS Internet Camera ICA-107 / ICA-107W / ICA-107P Quick Installation Guide Table of Contents 1. Package Contents... 3 2. System Requirements... 4 3. Outlook... 5 Front panel of
More informationAddendum #2 Contract UK-11-13
Addendum #2 Contract UK-11-13 Utilities Kingston Purchase and Replacement of Switchgear at Kingston Hydro Substation MS11 March 25, 2011 Delivered to: All RFP recipients Total number of pages: Nine (9)
More informationSCADA and Monitoring for Solar Energy Plant
SCADA and Monitoring for Solar Energy Plant Segment: Industry Country: Thailand Author: Ranon Satitpanyapan Products: NI LabVIEW with LabVIEW Real-Time Module crio Real-Time controller 8 slot with 16 current
More informationDIVISION 28 ELECTRONIC SAFETY AND SECURITY SECTION 28 13 00 SECURITY AND ACCESS CONTROL SYSTEM
DIVISION 28 ELECTRONIC SAFETY AND SECURITY PART 1 GENERAL 1.01 DESCRIPTION A. Division 28 Contractor shall extend a complete Matrix Systems Access Control System as shown on the Drawings and as specified
More informationReadyNAS OS 6 Desktop Storage Systems
ReadyNAS OS 6 Desktop Storage Systems Hardware Manual Models: ReadyNAS 102 ReadyNAS 104 ReadyNAS 312 ReadyNAS 314 ReadyNAS 316 ReadyNAS 516 ReadyNAS 716X EDA 500 October 2013 202-11206-04 350 East Plumeria
More informationAccess control designed simply for you
TruPortal Access control designed simply for you QUICK START GUIDE Introduction TruPortal access control solutions have been engineered and designed to install quickly and easily right out of the box.
More informationA&E Specifications RoadRunner Video Surveillance Systems for School Transportation Applications
RoadRunner Video Surveillance Systems for School Transportation Applications A. Digital Video Recorder (DVR) System: 1. The system shall be provided in compatible and interchangeable formats that support
More informationSecurity Systems Intrusion Alarm
Dufferin-Peel Catholic District School Board STANDARD TEXT GUIDELINE FOR Security Systems for SECONDARY AND ELEMENTARY SCHOOLS Prepared by the Plant Department With Assistance from Vision Dynamics Formatted
More informationData Sheet Fujitsu CELVIN NAS Server QR802 Storage
Data Sheet Fujitsu CELVIN NAS Server QR802 Storage Powerful 4-Drive NAS Rack Solution Ì» Ú««ÝÛÔÊ Ò backup options and SAN (Storage Area Network) integration for SMB customers - enabling centralized data
More informationController 5000GL Controller 5000GL provides flexible system architecture with options of GBUS and LOCAL BUS communications to field devices, to meet a wide range of site requirements. GGBUS L LOCAL BUS
More informationSystem i and System p. Customer service, support, and troubleshooting
System i and System p Customer service, support, and troubleshooting System i and System p Customer service, support, and troubleshooting Note Before using this information and the product it supports,
More informationHosted Testing and Grading
Hosted Testing and Grading Technical White Paper July 2014 www.lexmark.com Lexmark and Lexmark with diamond design are trademarks of Lexmark International, Inc., registered in the United States and/or
More informationintegrated lights-out in the ProLiant BL p-class system
hp industry standard servers august 2002 integrated lights-out in the ProLiant BL p-class system technology brief table of contents executive summary 2 introduction 2 management processor architectures
More informationSmart Anytime, Safe Anywhere. Climax Home Portal Platform. Envisage and Enable a Connected Future
Smart Anytime, Safe Anywhere Climax Home Portal Platform Envisage and Enable a Connected Future Climax Home Portal Platform An IP/GPRS-Based Solution to Deliver Smart Home and Mobile Control Services Reliable
More informationCalMod Design-Build Electrification Services
SECTION 28 16 00 INTRUSION DETECTION SYSTEM PART 1 - GENERAL 1.1 DESCRIPTION A. This section describes the detailed technical requirements for the Intrusion Detection System (IDS), where the Contractor
More informationUsing RAID Admin and Disk Utility
Using RAID Admin and Disk Utility Xserve RAID Includes instructions for creating RAID arrays and monitoring Xserve RAID systems K Apple Computer, Inc. 2003 Apple Computer, Inc. All rights reserved. Under
More informationQuick Start Guide. RV 120W Wireless-N VPN Firewall. Cisco Small Business
Quick Start Guide Cisco Small Business RV 120W Wireless-N VPN Firewall Package Contents Wireless-N VPN Firewall Ethernet Cable Power Adapter Quick Start Guide Documentation and Software on CD-ROM Welcome
More information- Monitoring Array: a seismic or infrasound array, including from 1(4) to 20 Remote Elements (RE) and one Central Recording Facility (CRF).
Page 1 of 30 Page 2 of 30 1. Basic terminology - Monitoring Array: a seismic or infrasound array, including from 1(4) to 20 Remote Elements (RE) and one Central Recording Facility (CRF). - Remote Element:
More informationVess. Architectural & Engineering Specifications For Video Surveillance. A2200 Series. www.promise.com. Version: 1.2 Feb, 2013
Vess A2200 Series Architectural & Engineering Specifications Version: 1.2 Feb, 2013 www.promise.com Copyright 2013 Promise Technology, Inc. All Rights Reserved. No part of this document may be reproduced
More informationUniversal Network Access Policy
Universal Network Access Policy Purpose Poynton Workmens Club makes extensive use of network ed Information Technology resources to support its research and administration functions and provides a variety
More informationChapter 1 Introduction
Chapter 1 Introduction The ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN connects your local area network (LAN) to the Internet through one or two external broadband access devices such as cable
More informationRedundant Gigabit Backbone Adds Speed and Reliability to Industrial Networks
Adds Speed and Reliability to Industrial Networks by Harry Hsiao, MOXA Product Manager harry.hsiao@moxa.com Introduction Gigabit network applications are becoming more and more popular in the modern networking
More informationIntel Server Component Extended Warranty: Selling Guide
Intel Server Component Extended Warranty: Selling Guide Platform Collaboration and Systems Division Data Center Group Intel Corporation January 2015 Contents Extended Warranty overview Ordering and Registering
More informationsecurityprobe 5E Standard
securityprobe 5E Standard securityprobe 5E Standard Monitor the physical environment and receive alerts of any disturbances, such as unauthorized intruders, security breaches, high temperatures, smoke,
More informationMiddleborough Police Electronic Security Narrative
Middleborough Police Electronic Security Narrative 1. PURPOSE The purpose of this document is to define specific security, access control and surveillance requirements for the exterior and interior of
More informationAdvanced Transportation Management Systems
Advanced Transportation Management Systems Summary Many Department of Transportation agencies are looking for cost-saving ways to improve the efficiencies of roadways without making actual surface improvements
More informationThe All-in-One Support Solution. Easy & Secure. Secure Advisor
The All-in-One Support Solution. Easy & Secure. Secure Advisor Secure Advisor - A Perfect Solution for Online Support Fast and easy remote support from anywhere Problems that often sound complicated on
More information2. DESIGN REQUIREMENTS
2. DESIGN REQUIREMENTS The Smart Lock Security system will give the user the ability to control his or her door lock from the convenience of texting from the user s cell phone. The device can be controlled
More informationCisco Physical Access Manager
Data Sheet Cisco Physical Access Manager 1.4.1 Cisco Physical Access Manager is the management application for the Cisco Physical Access Control solution. Cisco Physical Access Manager (Figure 1) is used
More informationNETWORK ENABLED EQUIPMENT MONITOR
NETWORK ENABLED EQUIPMENT MONITOR Remotely Monitor Sensors over the Internet Connect Sensors to the Web to Remotely Monitor Equipment, Processes or Other Applications A Complete, Easy to Deploy, Stand-Alone
More informationSNMP Web card. User s Manual. Management Software for Uninterruptible Power Supply Systems
SNMP Web card User s Manual Management Software for Uninterruptible Power Supply Systems Table of Contents 1. Overview... 3 1.1 Introduction... 3 1.2 Features... 3 1.3 Overlook... 3 1.4 Installation and
More informationMAXIMIZING YOUR DATA CENTER INFRASTRUCTURE: CENTRALIZED MANAGEMENT AND WIRE-FREE ENVIRONMENTAL MONITORING
MAXIMIZING YOUR DATA CENTER INFRASTRUCTURE: CENTRALIZED MANAGEMENT AND WIRE-FREE Chris C. Gaskins Vice President of Product Development RF Code, Inc. AUGUST 2010 Shawn Griggs Director of Product Management
More informationFVSU-33201301 REPAIR & UPGRADE FIBER OPTIC 280000-1 SECTION 280000 FIRE ALARM SYSTEM CONNECTIVITY
FVSU-33201301 REPAIR & UPGRADE FIBER OPTIC 280000-1 SECTION 280000 FIRE ALARM SYSTEM CONNECTIVITY PART 1 - GENERAL 1.1 SUMMARY A. Section Includes: 1. Fire-alarm control unit. 2. Addressable interface
More informationRecommended Tools and Supplies: Small Flat Blade Screwdriver, 35mm x 7.5mm DIN Rail. Qwik Install
TPDIN-Monitor-WEB Web Based Monitor and Control Remote Power Stations Backup Power Systems Solar Systems Wind Powered Systems Industrial Sense & Control Process Automation Congratulations! on your purchase
More informationWIRELESS INSTRUMENTATION TECHNOLOGY
BS&B WIRELESS, L.L.C. BS&B WIRELESS, L.L.C. WIRELESS INSTRUMENTATION TECHNOLOGY Printed February 2004 BS&B WIRELESS, L.L.C. 7422-B East 46th Place, Tulsa, OK74145 Phone: 918-622-5950 Fax: 918-665-3904
More information112 Linton House 164-180 Union Street London SE1 0LH T: 020 7960 5111 F: 020 7960 5100
112 Linton House 164-180 Union Street London SE1 0LH T: 020 7960 5111 F: 020 7960 5100 Our dedicated servers offer outstanding performance for even the most demanding of websites with the low monthly fee.
More informationTrueAlarm Fire Alarm Systems
TrueAlarm Systems UL, ULC, CSFM Listed; FM Approved* Network Annunciators; es Features Provides a dedicated local area network (LAN) for connection of a TrueSite workstation server to remote clients: es
More informationDORMA MODEL PS-406BB POWER SUPPLY INSTALLATION INSTRUCTIONS
Features: INSTALLATION Install in accordance with NFPA 70. DORMA MODEL PS-406BB POWER SUPPLY INSTALLATION INSTRUCTIONS Up to 1.95 Amps Load Capacity Class 2 Rated Outputs Overload, Over Voltage, and Short
More information38. ACCESS CONTROL AND ELECTRONIC SECURITY SYSTEM
38. ACCESS CONTROL AND ELECTRONIC SECURITY SYSTEM 38.1 GENERAL Scope Modification and extension of the existing CDU Cardax security system and CCTV System including: Cardax (FT 3000 series) Access control
More informationABB PSPS Erich Steinmann; Generator control-2013
ABB PSPS Erich Steinmann; Generator control-2013 GENERATOR CONTROL THE MODULAR SOLUTION FOR GENERATORS To make sure that power is efficiently converted into electric energy, it is necessary to supervise
More informationAKCess Pro Server Management Software
Management Software v.100.00x takes the best from IP Video Monitoring Software and is the first to combine it with Environmental / Security Sensor and Access Control equipment in one centralized management
More informationIntegrated Building Management and Security System. Building Automation & Security. www.coba-group.com
Integrated Building Management and Security System Building Automation & Security www.coba-group.com INTEGRATED BUILDING MANAGEMENT AND SECURITY SYSTEM INDEX 1 GENERAL... 3 1.1 SYSTEM INTEGRATION... 3
More informationPowerful Dedicated Servers
Powerful Dedicated Servers Our dedicated servers offer outstanding performance for even the most demanding of websites with the latest Intel & Dell technology combining unparalleled server specification,
More informationTk20 Network Infrastructure
Tk20 Network Infrastructure Tk20 Network Infrastructure Table of Contents Overview... 4 Physical Layout... 4 Air Conditioning:... 4 Backup Power:... 4 Personnel Security:... 4 Fire Prevention and Suppression:...
More informationSAN Conceptual and Design Basics
TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer
More informationIP Video Surveillance
IP Video Surveillance Solutions and Services Wireless IP PDA Administration Wireless Access Point Viewer Remote Control IP Video Server IP Network Alarm Management Video Recording Analog Video Server Access
More informationGeneric Procurement Specification for a. Video Vehicle Detection System. For Road Traffic Applications
Generic Procurement Specification for a Video Vehicle Detection System For Road Traffic Applications The Autoscope ENCORE video vehicle detection system meets the attached specifications. 1 of 7 683-10493M-0311
More informationDomonial, le Sucre. Easy to Use Intruder Detection Systems
Domonial, le Sucre Easy to Use Intruder Detection Systems Domonial Brief description With over a million installed sites, Domonial is one of the most popular remotely monitored wireless security systems
More informationPRI (T1/E1) Call Recorder User Manual Rev 1.0 (December 2013)
PRI (T1/E1) Call Recorder User Manual Rev 1.0 (December 2013) 1. Call Recording Architecture Overview PRI Call recording solution consists of two major components: Passive T1/E1 Tap Adapter and server
More informationsecurityserver Unparalleled management and detection of security, environmental, and disaster control resources.
securityserver Unparalleled management and detection of security, environmental, and disaster control resources. Map cameras & sensors in server rooms or buildings in cities AKCP securityserver puts you
More informationDISASTER RECOVERY. Omniture Disaster Plan. June 2, 2008 Version 2.0
DISASTER RECOVERY Omniture Disaster Plan June 2, 2008 Version 2.0 CHAPTER 1 1 Disaster Recovery Plan Overview In the event that one of our data collection environments are unavailable due to an event,
More informationDS-9500NI-ST Series NVR. Technical Specification
DS-9500NI-ST Series NVR Technical Specification Notices The information in this documentation is subject to change without notice and does not represent any commitment on behalf of HIKVISION. HIKVISION
More informationTerms of Reference Microsoft Exchange and Domain Controller/ AD implementation
Terms of Reference Microsoft Exchange and Domain Controller/ AD implementation Overview Maldivian Red Crescent will implement it s first Microsoft Exchange server and replace it s current Domain Controller
More informationDomus, the connected home
Domus, the connected home Amazouz Ali, Bar Alexandre, Benoist Hugues, Gwinner Charles, Hamidi Nassim, Mahboub Mohamed, Mounsif Badr, Plane Benjamin {aamazouz, abar, hbenoist, cgwinner, nhamidi, mmahboub,
More informationOverview. Alarm console supports simultaneous viewing of both live and recorded video when alarm events are selected
Niagara Security Overview Niagara Security by Tridium, is an open, web-based security management solution that allows you to manage and monitor your facility anytime, anywhere. Built on Tridium s Niagara
More informationRedundancy in enterprise storage networks using dual-domain SAS configurations
Redundancy in enterprise storage networks using dual-domain SAS configurations technology brief Abstract... 2 Introduction... 2 Why dual-domain SAS is important... 2 Single SAS domain... 3 Dual-domain
More informationout of this world guide to: POWERFUL DEDICATED SERVERS
out of this world guide to: POWERFUL DEDICATED SERVERS Our dedicated servers offer outstanding performance for even the most demanding of websites with the latest Intel & Dell technology combining unparalleled
More informationWho is Watching You? Video Conferencing Security
Who is Watching You? Video Conferencing Security Navid Jam Member of Technical Staff March 1, 2007 SAND# 2007-1115C Computer and Network Security Security Systems and Technology Video Conference and Collaborative
More informationTemperature Alert. LAN-based Temperature and Humidity Data Logger
Temperature Alert LAN-based Temperature and Humidity Data Logger LAN-based Temperature and Humidity Monitoring - Supports Simultaneous WiFi and Hardwired Interfaces -20 C to +60 C (-4 F to +140 F) Standard
More informationVess A2000 Series HA Surveillance with Milestone XProtect VMS Version 1.0
Vess A2000 Series HA Surveillance with Milestone XProtect VMS Version 1.0 2014 PROMISE Technology, Inc. All Rights Reserved. Contents Introduction 1 Purpose 1 Scope 1 Audience 1 What is High Availability?
More informationQuestion Shall the Tender include installation of the central server application on a redundant server?
s and answers regarding the Invitation for Tender for a national gamma monitoring system in Sweden s and answers published 2008-07-07 Will alternative tenders from the same Tenderer be considered? No,
More informationWISE-4000 Series. WISE IoT Wireless I/O Modules
WISE-4000 Series WISE IoT Wireless I/O Modules Bring Everything into World of the IoT WISE IoT Ethernet I/O Architecture Public Cloud App Big Data New WISE DNA Data Center Smart Configure File-based Cloud
More informationSOLARCARE SERIES PRODUCT AND APPLICATION GUIDE
SOLARCARE SERIES PRODUCT AND APPLICATION GUIDE for solar energy management LEATEC Delivering Solutions for Energy Management SOLAR ENERGY DATA CENTER BUILDING 4 to8 String Monitoring with 0.% Accuracy
More informationPower over Ethernet technology for industrial Ethernet networks
Power over Ethernet technology for industrial Ethernet networks Introduction Ethernet networking has grown beyond office and home usage to become a very successful protocol suite used in many industrial
More informationRAS Associates, Inc. Systems Development Proposal. Scott Klarman. March 15, 2009
Systems Development Proposal Scott Klarman March 15, 2009 Systems Development Proposal Page 2 Planning Objective: RAS Associates will be working to acquire a second location in Detroit to add to their
More information4-CH Hybrid Digital Video Recorder
4-CH Hybrid Digital Video Recorder Key Features Hardware Embedded, highly-reliable standalone HDVR Supports 4-ch BNC connectors Supports dual local display (VGA and HDMI) Supports 3.5" SATA x 1 HDD Supports
More informationCenterMind G+ Smart and Proactive Environment Monitoring
CenterMind G+ Smart and Proactive Environment Monitoring Smart and Proactive Environment Monitoring real-time visibility into the state of your computer room or data center environment, 24/7 RiT CenterMind
More informationNETWORK MANAGEMENT SOLUTIONS
N E T S M A R T NETWORK MANAGEMENT SOLUTIONS UNIFY YOUR NETWORK As new and legacy services coexist to support a widening variety of customers, network support presents more technical challenges. This complex,
More informationFoglight Experience Monitor and Foglight Experience Viewer
Foglight Experience Monitor and Foglight Experience Viewer Quest Software, Inc. April 2008 Using the Dell Remote Access Controller Copyright Quest Software, Inc. 2008. All rights reserved. This guide contains
More informationWeb: www.stp.hu; www.logipix.eu; www.walkdvr.com
StP Technical Development Ltd. version: 1 Contact: Address: 11-13. Késmárk st., 1158 Budapest, Hungary Phone: +36 1 410-0556; +36 20 480-5933 Fax: +36 1 414-0913 E-mail: info@stp.hu Technical support:
More informationReducing operating costs of telecom base stations with remote management
Reducing operating costs of telecom base stations with remote management Whitepaper How remote management can be used to cut operating expenses of existing telecom infrastructure. HMS Industrial Networks
More informationBlackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security
Overview Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Blackboard Collaborate web conferencing is available in a hosted environment and this document
More informationAmbient Temperature In Range Probe X
List of Events This section lists all events that are written to the Event Log. Some of these events can be configured through the Configuring Events to Take Actions page, and these are listed in the first
More informationSynology Disaster Recovery Deployment Guide Document ID
Document ID Syno_UsersGuide_DisasterRecovery_20111114 Table of Contents Chapter 1: Dual Server Disaster Recovery Plan Back up Primary Server's Configurations... 5 Synchronize Data between Primary and Backup
More informationRemote Services. Managing Open Systems with Remote Services
Remote Services Managing Open Systems with Remote Services Reduce costs and mitigate risk with secure remote services As control systems move from proprietary technology to open systems, there is greater
More informationHardware and Software Upgrade for the Solution Measurement and Monitor System at Rokkasho Reprocessing
Hardware and Software Upgrade for the Solution Measurement and Monitor System at Rokkasho Reprocessing R. Plenteda a, A. Alessandrello a, M. Frankl a, W. Deringer a, M. Lang a, M. Cronholm a, K. Baird
More informationLAB FORWARD. WITH PROService REMOTE SERVICE APPLICATION. Frequently Asked Questions
LAB FORWARD WITH PROService REMOTE SERVICE APPLICATION Frequently Asked Questions MORE WAYS TO INCREASE UPTIME AND IMPROVE PRODUCTIVITY. GENERAL INFORMATION Q: What is PROService? A: PROService is Beckman
More informationHow To Backup Your Hard Drive With Pros 4 Technology Online Backup
Pros 4 Technology Online Backup Features Introduction Computers are the default storage medium for most businesses and virtually all home users. Because portable media is quickly becoming an outdated and
More informationUnderstanding the Pros and Cons of Combination Networks 7. Acknowledgments Introduction. Establishing the Numbers of Clients and Servers 4
Mac OS X System Administration GUY HART-DAVIS Mc Graw Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto Acknowledgments Introduction,
More informationCompact Monitoring Technology your environmental monitoring solution
Compact Monitoring Technology your environmental monitoring solution Monitor your GxP environmental parameters and cut your validation costs. Solutions for Life Science and Hospitals www.siemens.com/cmt
More informationStratusphere Solutions
Stratusphere Solutions Deployment Best Practices Guide Introduction This guide has been authored by experts at Liquidware Labs in order to provide a baseline as well as recommendations for a best practices
More informationKANGAROO MOBILE DESKTOP USER GUIDE
KANGAROO MOBILE DESKTOP USER GUIDE Copyright InFocus Corporation., 2015. All rights reserved. This document contains information proprietary to InFocus Corporation, hereinafter InFocus. Use or disclosure
More informationHow To Secure Your Computer With Libreware Libreroview 2.5.2.2 (Windows) And Libreros (Windows 2) (Windows 3.5) (For Windows) (Powerpoint) (Networking)
Addressing Embedded Security in LabVIEW RIO Systems Carlos Pazos Product Marketing Manager Embedded Software Why Care About Security? 3 Why care about Security? Why Care About Industrial Security? 4 Stuxnet
More informationGuest Room Controls & Monitoring System. Integrated Solution for Hotels Southern Countries. www.lonix.com
Guest Room Controls & Monitoring System Integrated Solution for Hotels Southern Countries www.lonix.com GUEST ROOM CONTROLS & MONITORING SYSTEM INDEX 1 GENERAL... 3 1.1 SYSTEM INTEGRATION... 3 1.2 USER
More information