Library
|
Your profile |
Software systems and computational methods
Reference:
Sharipov R.R., Yusupov B.Z., Martynov A.M., Zaripova R.S.
Developing the Methodology for the Effective Placement of Security and Fire Alarm Systems
// Software systems and computational methods.
2024. ¹ 2.
P. 15-29.
DOI: 10.7256/2454-0714.2024.2.41036 EDN: ZNJPJH URL: https://en.nbpublish.com/library_read_article.php?id=41036
Developing the Methodology for the Effective Placement of Security and Fire Alarm Systems
DOI: 10.7256/2454-0714.2024.2.41036EDN: ZNJPJHReceived: 18-06-2023Published: 17-04-2024Abstract: The article focuses on security and fire alarm systems (SFAS) as means of ensuring the safety of facilities, viewing them as integrated complexes for promptly detecting potential threats. The main emphasis is on detectors, including their classification and role within the system. The article examines various configurations of SFAS and ways of connecting and processing signals from detectors, allowing for an evaluation of how these factors affect the system's effectiveness. The lifecycle of SFAS is described, highlighting the importance of each stage from design to operation. The article provides an overview of regulatory documents, emphasizing the importance of compliance with standards and requirements when implementing SFAS. Recommended for security professionals and individuals interested in delving into this topic. Additionally, the article addresses issues related to the placement of SFAS and their impact on system effectiveness. It analyzes vulnerabilities arising from irrational placement of components and presents a methodology for optimizing placement to enhance security. The methodology is described step by step, considering input and output processes at each stage. The authors conduct practical testing of the methodology in an educational laboratory with an installed SFAS, identifying placement errors and formulating recommendations for correction. The article is beneficial for professionals in the design and installation of SFAS, as well as for those seeking to improve the level of protection of facilities, accentuating the critical importance of proper component placement. Keywords: Security systems, Fire alarm, Placement, Methodology, Effectiveness, Optimization, Components, Installation, Protection, DesignThis article is automatically translated. Introduction The security and fire alarm system occupies a central place in the structure of comprehensive measures aimed at ensuring the physical security of facilities. This is an integral element that creates barriers for possible intruders and reduces the risk of fires, which, in turn, contributes to the preservation of tangible assets and prevents losses among the population. Fires can have catastrophic consequences, resulting in significant material losses and, much worse, loss of life. Therefore, it is extremely important to develop a rational approach to fire safety. In addition, in today's world, which is becoming more and more technologically advanced, the importance of information security is undeniable. An analysis of current trends shows that special attention should be paid to protecting the infrastructure of companies. This may include the protection of various elements such as subsystems, workstations, servers, etc. It should be recognized that sometimes the importance of physical protection in the context of information security is overlooked. For example, the global Internet, which we often perceive as an abstract space, actually relies on physical components: switching equipment, wired and radio channel devices, data processing devices, data warehouses and servers. All these elements have a specific physical location and, therefore, can be threatened by intruders. In this context, fire alarm systems act as the first line of defense, preventing unauthorized access to critical infrastructure components and preventing possible fires. Thus, the importance of OPS systems cannot be overestimated. They play a crucial role in ensuring physical and information security, contributing to the protection of human life and well-being, as well as the preservation of valuable resources and assets of organizations. At the same time, it is important to emphasize that the effectiveness of the OPS system directly depends on the quality of its design, installation and regular maintenance. A responsible approach to the selection of equipment, taking into account the specifics of a particular facility and strict compliance with regulatory requirements is the key to high reliability and functionality of the system. In addition, attention should be paid to the integration of the OPS system with other security systems, such as video surveillance, access control and anti-terrorist protection systems. Such integration will provide an integrated approach to security, which will significantly enhance its effectiveness. In today's world, where technology is developing at a rapid pace, it is also necessary to take into account and adapt to new threats and challenges. This includes monitoring and applying the latest technological solutions in the field of safety, training personnel and creating emergency response plans.
It should be noted that OPS are complex complexes of technical means, the task of which is to ensure the safety of facilities by monitoring possible threats and notifying them. Sensors or detectors can be identified as the main components of a typical OPS system, which, as a rule, are sensors capable of registering various types of events, such as movement, door opening, temperature rise or smoke. These sensors are switched to a central device called a receiving and control device (control panel) [1]. The receiving and monitoring device plays a key role in the system, as it processes the signals received from the sensors and, if a possible threat is detected, activates appropriate response measures. Such measures may include, for example, the inclusion of light and sound alerts to alert facility personnel and/or to call the security service. ID readers can also be connected to the control panel, which allows you to control the system using special cards or key chains. This is especially convenient for removing and arming an object. In some cases, a separate control panel may be provided in the OPS system, which provides advanced control and monitoring capabilities of the system. This can be useful in large facilities where it is necessary to provide centralized control over the security system. In addition, additional components can be integrated into the system, such as manual launch consoles that allow facility personnel to immediately activate the emergency warning system, or expansion modules that provide additional interfaces and functions for integration with other systems. In general, the fire alarm system is a multifunctional tool capable of adapting to various conditions and safety requirements. The modular structure of the system allows you to customize it according to the characteristics of a particular object, taking into account its size, number of rooms, infrastructure features and potential risks. An important aspect is also the possibility of integrating the OPS system with other building security and management systems. Thus, modern OPS can be combined with video surveillance systems, access control, as well as automated building management systems to optimize energy consumption and ensure comfort. High-quality design, installation and configuration of a security and fire alarm system are key factors that ensure its effectiveness. At the same time, attention should be paid not only to the selection of suitable components, but also to their proper installation, as well as staff training in the basics of working with the system. Regular maintenance and health checks of all system elements are also important components of ensuring reliable operation of the OPS. There are many types of security and fire detectors and their classification according to several parameters is given [2]. However, some features should be taken into account when using them, depending on many factors that significantly depend on the object of protection. For example, production facilities with different environmental factors affecting the detectors. Among them: the state of air humidity, which causes corrosion, temperature and vibration effects, high electromagnetic background, causing false alarms or failure of security devices within the service life. For commercial office premises and educational institutions, several types of standard security and fire detectors are usually used. Among them [3,4]: – optoelectronic detectors; – acoustic (passive) detectors; – magnetic contact detectors; – fire detectors. Common types of fire detectors are smoke and heat detectors. In large rooms with high ceilings, linear fire protection systems are used, consisting of groups of co-directional receivers and transmitters. The classification of detectors according to the methods of connecting and processing signals from detectors with monitoring devices is also known. The following types of detectors are distinguished here [5,6]: – analog; – addressable; – addressable analog. In addition, radio channel detectors have been actively used in recent years [7,8], which simplify the deployment of OPS systems, since it does not require laying wire loops to connect the detectors to the control panel. There are several stages in the life cycle of OPS systems, starting from setting the task of protecting the facility, controlling access to the facility, delineating protection zones and making demands to the customer [9,10]. At the last stage, a technical specification is drawn up, which usually reflects the following points [11]: – the objectives of the work are indicated, – a list of regulatory and regulatory documents is indicated, – brief descriptions of the objects are given, – requirements are set for the contractor, for the equipment and execution of works and for the order of execution of works. After agreeing on the terms of reference, the implementing company proceeds to the study of the object of protection, studying its structure, design features and develops a working draft in accordance with the requirements of regulatory documentation. Problems when placing the components of the OPS Let's consider the main regulatory documents regulating the design and implementation of the OPS system at security facilities. The following basic regulatory documents are generally known [12,13,14]: Despite the requirements of the regulatory framework, at all stages of the life cycle of the OPS system, a lot of incorrect decisions appear, reflected both in projects and OPS systems located on real objects. One of the common problems is the incorrect placement of detectors on protection objects, which leads to incorrect logical operation of the OPS system. Subsequently, this leads to incidents in which an attacker can enter critical areas unnoticed, and can also deactivate sensors. Sometimes there are other cases when the number of detectors at the facility may be installed in excess and they are installed in violation of the placement requirements, for example, two detectors may be located close to each other, which may lead to mutual influence and overlap of detection zones. Development of the methodology In order to ensure maximum efficiency of security and fire alarm systems at the design stage, as well as to correct existing installations at protection facilities, a special technique has been developed aimed at optimizing the placement of OPS elements (see Fig. 1). This technique is based on an integrated approach that includes analysis and consideration of many factors. The main emphasis within the framework of the developed methodology is strict adherence to the requirements of regulatory documents governing the operation and installation of OPS systems. At the same time, the specific characteristics of the object of protection are also taken into account. Such characteristics include, for example, the geometry of the room, the location of windows, doors, walls and other elements, which plays an essential role in ensuring the effectiveness of the system. It should be noted that in practice, when installing OPS elements, various difficulties may arise related to the characteristics of a particular object or external circumstances. Unfortunately, installers often allow deviations from the original design for various reasons, such as the desire to save installation time, minimize cable consumption, or due to a frivolous attitude to the work. Such deviations can lead to a serious decrease in the efficiency of the system and increase potential security risks. The methodology developed taking into account all the mentioned factors is designed to ensure the competent and reasonable placement of OPS elements, minimizing possible errors and their negative consequences. It will become a valuable tool both at the design stage and during the subsequent operation of facilities equipped with security and fire alarm systems. Figure 1. The method of effective placement of security and fire systems Let's take a closer look at the developed methodology. The following table (Table 1) shows the input and output dependencies in blocks describing the processes. Table 1. Process – Input data – Output data
To verify the developed methodology for the effective placement of security and fire systems, tests were conducted on a real object in order to study the effectiveness of the developed methodology. Testing the methodology The educational laboratory P429 was chosen as the object of research (Fig. 2). The educational laboratory is located on the 4th floor of the educational building. The height of the auditorium is 3 meters 30 centimeters, the width is 5 meters 10 centimeters, the length is 8 meters, the auditorium area is 40.8 sq.m. The auditorium has one door and two windows. Figure 2. Diagram of the educational laboratory P429 with placed detectors The following detectors are located in the auditorium: – glass break detector, acoustic passive, – optoelectronic detector, passive, – fire detector, spot smoke detector, – the detector is fire-fighting, thermal. All these detectors are connected to a control panel located in another room. After analyzing the room and the test, recommendations were developed according to the developed methodology: Following these recommendations, Figure 3 shows the recommended placement of the following detectors: – optoelectronic detector, passive, – fire detector, spot smoke detector, – the detector is fire-fighting, thermal. Figure 3. Placement of the recommended detectors in the room P429 As a result, we received a new placement of security and fire detectors, the placement of which allows the detectors to effectively and timely detect intrusions into a protected object, fire protection and timely inform the security service to quickly neutralize threats. Conclusion In conclusion, I would like to emphasize that as a result of the research and development, a methodology has been created that promotes the rational placement of OPS elements. This applies both to the initial design stage and to already functioning protection facilities on which OPS elements are installed. The application of this technique becomes especially relevant in the light of the analysis conducted by the P429 laboratory. The analysis revealed a number of problems in the placement of detectors that limit their functionality. For example, it was found that some detectors were placed inefficiently due to their proximity to each other or the wrong choice of protection zones. Cases of the use of irrational detectors have also been identified, such as the placement of glass break sensors on the upper floors of buildings, where their operation is unlikely. It is worth noting that an additional security threat is the placement of control panels and switching cables in places accessible to unauthorized access. Such placement allows attackers to manipulate these elements, which, in turn, reduces the level of protection. The plans for the future include automation of the developed methodology by creating a software product. Such a solution will provide the ability to enter data from the object of protection and automatically receive recommendations based on the analysis. To implement this task, modern methods presented in the literature [18,19,20], as well as programming languages can be used. The following table (Table 1) shows the input and output dependencies in blocks describing the processes. References
1. Gavrishev, A.A. (2019). Evaluation of Stealth in Wireless Security and Fire Alarm Systems. In Achievements and Applications of Modern Informatics, Mathematics, and Physics: Proceedings of the VIII All-Russian Scientific-Practical Conference, Neftekamsk, November 15, 2019 (pp. 21-29). Neftekamsk: Bashkir State University.
2. Ryapolova, E.I. (2015). Development of an Automated Workplace for Security and Fire Alarm System Dispatcher. New Science: Current Status and Development Paths, 4-1, 81-85. 3. Yusupov, B.Z. (2021). Development of a Security and Fire Alarm System Laboratory Stand for Technical Security Equipment Course. In XXV Tupolev Readings (Young Scientists School): International Youth Scientific Conference dedicated to the 60th anniversary of the First Human Space Flight and the 90th anniversary of the Kazan National Research Technical University named after A.N. Tupolev-KAI. Conference Materials. Collection of Reports. In 6 Volumes, Kazan, November 10-11, 2021. Volume V (pp. 758-763). Kazan. 4. Kashpur, E.I. (2015). Study of Prospective Digital Modulation Technologies in Security and Fire Alarm Systems. Youth Scientific and Technical Bulletin, 8, 29. 5. Gizatullin, Z.M., Gizatullin, R.M., & Nuriev M.G. (2021). Methods and Models for Physical Modeling of Electromagnetic Interference, Exemplified by the Analysis of the Immunity of Electronic Vehicle Equipment. Radio Engineering and Electronics, 66(6), 609-613. 6. Bonch-Bruevich, A.M., & Kashpur, E.I. (2015). Investigation of Advanced Digital Modulation Technologies in Security and Fire Alarm Systems. Special Equipment and Communication, 3, 24-28. 7. Yusupov, B.Z., & Martynov, A.M. (2023). Development of a Security and Fire Alarm System Laboratory Stand for Technical Security Equipment Course. In Actual Problems of Science and Education in the Context of Modern Challenges: Proceedings of the XIX International Scientific-Practical Conference, Moscow, March 21, 2023 (pp. 80-91). Moscow: Print Yard. 8. Burykin, I.A., Petrov, D.A., & Luppa, D.S. (2015). Organization of a Secure Communication Channel in Security and Fire Alarm Systems. In Actual Issues in Scientific Work and Educational Activity: Collection of Scientific Papers from the International Scientific-Practical Conference in 10 Volumes, Tambov, May 30, 2015. Volume 6 (pp. 23-25). Tambov: Yukom Consulting Company LLC. 9. Berlev, S.V. (2015). Experimental Evaluation of the Efficiency of Technical Means of Security and Fire Alarm Systems. Modern Technologies for Civil Defense and Elimination of Emergency Situations, 1-1(6), 62-63. 10. Yusupov, B.Z. (2021). Development of Methodology for Conducting Laboratory Work on the “OPS Astra-713” Stand for Technical Security Equipment Course. In XXV Tupolev Readings (Young Scientists School): International Youth Scientific Conference dedicated to the 60th anniversary of the First Human Space Flight and the 90th anniversary of the Kazan National Research Technical University named after A.N. Tupolev-KAI. Conference Materials. Collection of Reports. In 6 Volumes, Kazan, November 10-11, 2021. Volume V (pp. 764-767). Kazan. 11. Sinilov, V.G. (2011). Security, Fire, and Security-Fire Alarm Systems: Textbook for Educational Institutions Implementing Programs of Initial Professional Education (6th ed.). Moscow: Academy. (Initial Professional Education. Radio Electronics Series). 12. Vershinin, I.S., Pystogov, S.V., Gibadullin, R.F., & Gashigullin, D.A. (2020). Associative Protection of Textual Characteristics of Objects. Bulletin of the Kazan State Technical University named after A.N. Tupolev, 76(1), 117-125. 13. Petik, N.S. (2018). Design of a Security and Fire Alarm System. In Youth. Intellect. Initiative: Proceedings of the VI International Scientific-Practical Conference for Students and Graduates, Vitebsk, April 19, 2018 (pp. 33-34). Vitebsk: Vitebsk State University named after P.M. Masherov. 14. Oreshina, Y.V. (2015). Business Reputation of Entrepreneurial Structures in the Security and Fire Alarm System Market. In Actual Issues in Scientific Work and Educational Activity: Collection of Scientific Papers from the International Scientific-Practical Conference in 10 Volumes, Tambov, May 30, 2015. Volume 4 (pp. 112-113). Tambov: Yukom Consulting Company LLC. 15. Government of the Russian Federation. (2008, February 16). Resolution No. 87 “On the Composition of Sections of Project Documentation and Requirements for Their Content” [Electronic resource]. Retrieved June 16, 2023, from GARANT system. Retrieved from https://base.garant.ru/ 16. State Standard GOST R 50776-95 (IEC 60839-1-4:1989) “Alarm System. Part 1. General Requirements” [Electronic resource]. Retrieved June 16, 2023, from GARANT system. Retrieved from https://base.garant.ru/ 17. SP 68.13330.2017 "SNiP 3.01.04-87 Acceptance of Facilities Completed by Construction into Operation. Basic Provisions" [Electronic resource]. Retrieved June 16, 2023, from GARANT system. Retrieved from https://base.garant.ru/ 18. Nuriev, M.G., Belashova, E.S., & Barabash, K.A. (2023). Converter of Markdown Files to LaTeX Documents. Software Systems and Computational Methods, 1, 1-12. 19. Gibadullin, R.F. (2022). Thread-Safe Control Element Calls in Rich Client Applications. Software Systems and Computational Methods, 4, 1-19. 20. Gibadullin, R.F., & Viktorov, I.V. (2023). Ambiguity of Results When Using Parallel Class Methods in the .NET Framework Execution Environment. Software Systems and Computational Methods, 2, 1-14.
Peer Review
Peer reviewers' evaluations remain confidential and are not disclosed to the public. Only external reviews, authorized for publication by the article's author(s), are made public. Typically, these final reviews are conducted after the manuscript's revision. Adhering to our double-blind review policy, the reviewer's identity is kept confidential.
|