Alarm transmission over IP networks

Slides:



Advertisements
Similar presentations
Computer Concepts – Illustrated 8th edition
Advertisements

1. XP 2 * The Web is a collection of files that reside on computers, called Web servers. * Web servers are connected to each other through the Internet.
1 Senn, Information Technology, 3 rd Edition © 2004 Pearson Prentice Hall James A. Senns Information Technology, 3 rd Edition Chapter 7 Enterprise Databases.
Computer Networks TCP/IP Protocol Suite.
1 UNIT I (Contd..) High-Speed LANs. 2 Introduction Fast Ethernet and Gigabit Ethernet Fast Ethernet and Gigabit Ethernet Fibre Channel Fibre Channel High-speed.
Zhongxing Telecom Pakistan (Pvt.) Ltd
Virtual Trunk Protocol
Advanced Piloting Cruise Plot.
Chapter 1 The Study of Body Function Image PowerPoint
OSPF 1.
Network Monitoring System In CSTNET Long Chun China Science & Technology Network.
1 Introducing Hardware and Software Required for Video Conference Using DV Camera TABARU Masayuki (Kyushu University, Japan)
1 Building a Fast, Virtualized Data Plane with Programmable Hardware Bilal Anwer Nick Feamster.
FACTORING ax2 + bx + c Think “unfoil” Work down, Show all steps.
Communicating over the Network
Orion Telecom Networks Inc Remote Alarm Reporting and Site Monitoring Equipment Slide 1 Updated : January 1st, , Avenue of Fountains, Suite.
Telecommunications & Networking
Welcome to the Radionet Monitoring Secure-Com Presentation.
ARC reporting ARC Cerny Verze
Networking at Home the Office and Globe
Block Cipher Modes of Operation and Stream Ciphers
CP2073 Networking Lecture 5.
The IP Revolution. Page 2 The IP Revolution IP Revolution Why now? The 3 Pillars of the IP Revolution How IP changes everything.
Chapter 1 Introduction to the Programmable Logic Controllers.
© Tally Solutions Pvt. Ltd. All Rights Reserved 1 Housekeeping in Shoper 9 POS February 2010.
Chapter 1: Introduction to Scaling Networks
Local Area Networks - Internetworking
Slide 5-1 Copyright © 2004 Pearson Education, Inc. Operating Systems: A Modern Perspective, Chapter 5 5 Device Management.
HWg-Juno HW group is a manufacturer of IP-based sensors from Prague, Czech republic. HWg delivers remote monitoring & control solutions.
Copyright © Open Text Corporation. All rights reserved. Slide 1 Automatic Routing With Captaris FaxPress and FaxPress Premier Darin McGinnes Sales Engineer.
REMOTE VIDEO GUARD SERVICES.. THE CURRENT GUARD SERVICES BUSINESS MODEL.
ATM Firewall Routers with Black Lists Hwajung LEE The George Washington University School of Engineering and Applied Science Electrical Engineering and.
Introduction to Network
1 Welcome Overview of DOCSIS. 2 Data Over Cable Service Interface Specification.
1 Chapter Overview Network Cables Network Interface Adapters Network Hubs.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 2 The OSI Model and the TCP/IP.
IP Multicast Information management 2 Groep T Leuven – Information department 2/14 Agenda •Why IP Multicast ? •Multicast fundamentals •Intradomain.
VOORBLAD.
Telemetry Modules Quick Start
1 SATEL IP-LINK Makes wireless static TCP/IP routing possible Is to be used with SATELLINE-3AS radio modem Has the stable Linux operating system and specific.
CONTROL VISION Set-up. Step 1 Step 2 Step 3 Step 5 Step 4.
© 2012 National Heart Foundation of Australia. Slide 2.
1 Introduction to Network Layer Lesson 09 NETS2150/2850 School of Information Technologies.
Network Fundamentals – Chapter 4 Sandra Coleman, CCNA, CCAI
Executional Architecture
The Internet–Illustrated Introductory, Fourth Edition
25 seconds left…...
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA TCP/IP Protocol Suite and IP Addressing Halmstad University Olga Torstensson
Chapter 10: The Traditional Approach to Design
Systems Analysis and Design in a Changing World, Fifth Edition
©Brooks/Cole, 2001 Chapter 12 Derived Types-- Enumerated, Structure and Union.
Network Operations & administration CS 4592 Lecture 15 Instructor: Ibrahim Tariq.
PSSA Preparation.
VPN AND REMOTE ACCESS Mohammad S. Hasan 1 VPN and Remote Access.
Modular – Flexible – Networked
TCP/IP Protocol Suite 1 Chapter 18 Upon completion you will be able to: Remote Login: Telnet Understand how TELNET works Understand the role of NVT in.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Link-State Routing Protocols Routing Protocols and Concepts – Chapter.
Presented by Serge Kpan LTEC Network Systems Administration 1.
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
TL250-Internet Communicator. Compatibility Specifications VDC current draw 12 VDC input voltage Size: 3.25” × 5.25” (8.3 × 13.3)cm Operating.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
T-Link II Secure Internet Alarm Communication. Product Goals… High level encryption Software upgrades via network Universal compatibility Non-Static IP.
How to Sell T-Link TL250/300. T-Link Internet & Network Alarm Communicators Internet alarm communications for multi-branch Financial Institutions, Governments,
GS3055-I Installation Process
Rohde & Schwarz Topex TOPEX IP Radio Gateway July 2011.
IPRS-7 IP/GPRS Receiver Software
Principles of Information Technology
Presentation transcript:

Alarm transmission over IP networks Teldat Security VisorALARM & MIP Alarm transmission over IP networks

Agenda Product description Installation Video storage options Recording access and management Tech specs

Product definition “The MIP is a simple communications device that allows the transmission of alarms, generated by a conventional control panel, through any kind of IP network (ADSL, cable, internet…) at the same time that keeps the standard telephone alarm transmission as a back-up mechanism” Central Station Alarm Panel MIP Internet Telephone

How does it work? “When the control panel dials the central station telephone number to send an alarm, the MIP will ‘capture’ the call, read the CONTACT-ID information from the control panel, put that information into an IP packet and send it to the Central Station via the internet (Cable, ADSL, T1,…)” Alarm Panel MIP Sends the alarm Telephone call Sends Contact-ID via the internet

And if the network is ‘down’? “The MIP will not acknowledge the alarm to the control panel until the central station has receive the IP alarm properly. If the IP transmission fails, no ACK will be given to the control panel and the control panel will then redial. This second time, the MIP will let the control panel make the phone call to the central station (pass-through mode)” Central Station Alarm Panel MIP Internet Telephone

Note: The SIA protocol will be available for version 2.0 of the MIP. With which control panels does the MIP work ? “The MIP supports any control panel that can be programmed to use the CONTACT-ID protocol and that uses a standard telephone line to send its alarms to the central station” Alarm Panel MIP CONTACT-ID Note: The SIA protocol will be available for version 2.0 of the MIP.

MIP installation “The MIP has been designed so that it can be mounted in the inner side of the control panel’s lid” Input telephone connection from panel 12Vdc (from panel) Alarm input From panel (optional) Relay output Ethernet connection to hub or router Connection to telephone network

Communication line for the MIP “The MIP can send alarms to the central station using any kind of always-on communication line, such as ADSL, cable or T1 lines” MIP ADSL HUB CABLE ROUTER T1 … … …

VisorALARM : Central station IP receiver

VisorAlarm : Central Station Receiver for MIP alarm reception VisorALARM : Central Station IP receiver “All the alarms sent by any MIP module will be sent to the VisorAlarm receiver located at the Central Station” VisorAlarm : Central Station Receiver for MIP alarm reception

Automation Software Server (IBS, MAS, Microkey, Dice, Bold…) IP receiver installation “The VisorAlarm IP receiver will send all received IP alarms to your automation software server via a serial connection, just as any other of your alarm receivers” Automation Software Server (IBS, MAS, Microkey, Dice, Bold…) HUB Ethernet To internet router Serial Connection AlarmNET

IP receiver protocols “The VisorAlarm receiver can be programmed to emulate some of the most common receiver protocols (Sur-Gard, Radionics,…)” Automation Software Server (IBS, MAS, Microkey, Dice, Bold…) Surgard or Radionics serial protocols HUB Ethernet To internet router Serial Connection AlarmNET

Automation Software Server (IBS, MAS, Microkey, Dice, Bold…) IP receiver scalability “Multiple VisorAlarm modules can be set-up at the central station, each of them using a different IP address and acting as independent receiver units” Automation Software Server (IBS, MAS, Microkey, Dice, Bold…) HUB Nx Ethernet To internet router N x Serial Connection AlarmNET

Main advantages of using the MIP system

Alarms are sent through the existing high speed internet access Main advantages of using the MIP system ( I ) 1. Saves the cost of each alarm phone call: By transmitting the alarm via a flat rate always-on network which the customer is probably using for Internet access. Alarms are sent through the existing high speed internet access Central Station Alarm Panel MIP Internet Telephone

Main advantages of using the MIP system ( II ) 2. Instant alarm transmission to the central station : Alarm transmission over most high speed networks will take less than a second. End-2-End delay usually less than 1 second Central Station Alarm Panel MIP

Fast and no-cost transmission of maintenance and general events Main advantages of using the MIP system ( III ) 3. Low alarm transmission cost and high speed allows fast and easy communication to the central station of almost any control panel event (secure arm/disarm, battery status, test signals …) Central Station Fast and no-cost transmission of maintenance and general events

Main advantages of using the MIP system ( IV ) 4. Allows for the “secure line” functionality with no extra costs: The MIP is periodically sending signals to the Central Station receiver acting as a line supervision mechanism. If a MIP does not communicate in time, the receiver will automatically generate a false alarm. This functionality allows line sabotage and line failure detection. Sabotage / technical alarm Alarm Panel + MIP Receiver Line Failure / Sabotage VisorAlarm Central Station

Main advantages of using the MIP system ( V ) 5. The MIP does not require a dedicated internet line and can be placed on the same network that is being used to surf the internet or for other broadband services Alarm Panel Internet High Speed Router PC#1 PC#2

Compatible with installed base of alarm panels Main advantages of using the MIP system ( VI ) 6. The MIP can be used with most of the installed base of control panels as most panel support the CONTACT-ID protocol : The MIP can be sold to your existing customer base as a way to improve their security and decrease their costs, or added to new alarm installations. Compatible with installed base of alarm panels Alarm Panel CONTACT-ID

Security on the MIP alarm transmission system

Security on the MIP system Alarm Encryption: All the information transmitted between the MIP and the central station receiver is encrypted using an RC4 code. Password protected: All the information transmitted between the MIP and the central station receiver is encrypted using an RC4 code. Anti-replication mechanism: Each communication to the central station receiver has a dynamic sequential password so any alteration on the encrypted sequence will be detected. Note: Dynamic sequential password is not supported in beta / evaluation versions of the MIP units.

Frequently Asked Questions

MIP Frequently Asked Questions ( I ) CID: The MIP module will have the same CID than the control panel to which it is attached. That will allow the central station to keep track of all the secure lines and associate each of them to the corresponding user account. Bandwidth: The MIP uses less than 64 bytes of information in each polling or alarm communication, thus using an insignificant bandwidth of a regular internet line. IP address: The MIP can be setup with private (non public) IP addresses.

MIP Frequently Asked Questions ( II ) Firewalls and proxies: The MIP uses UDP packets and can be programmed to work over any IP port. Most firewalls will allow outgoing UDP traffic. Polling period: The polling period can be set between 10 and 65000 seconds. Control Panel Programming: The MIP lets through all incoming calls to allow the central station access the panel for configuration and maintenance purposes.

IP receiver Frequently Asked Questions ( I ) Nº of MIP units : VisorAlarm receiver supports more than 3,000 MIP units simultaneously. IP address : The VisorAlarm receiver needs to be programmed with a static public IP address. Scalability : Several VisorAlarm receivers can be installed at the Central Station (each of them using a different IP address and serving a different group of MIP units).

IP receiver Frequently Asked Questions ( II ) Receiver backup: For high availability scenarios, the VisorAlarm receiver can be installed by pairs in a Master/Slave backup configuration. What happens if the central station internet access goes down? : The receiver is programmed to poll a well-known highly reliable external internet address. If that poll fails, the receiver will not generate false technical alarms and will wait for it’s connection to be re-established.

MIP and VisorALARM technical specifications

MIP Technical Specifications Size 120 x 92 x 30 mm Power 12 Vdc / 400mA Com. Interfaces Ethernet 10 Mbps Telephone (Twisted pair connector) Inputs / Outputs 1 input / 1 relay Configuration Local: DTMF tones through the telephone interface. Remote: Configuration download from the receiver Alarm Panel Protocols Contact-ID Encryption RC4 code Security Password protected Line polling Programmable 1- 65000 seconds IP address Public or private (DHCP under development) Com. Protocols UDP TCP port

VisorALARM : IP receiver Technical Specifications Size 205 x 415 x 44 mm Mechanization Desktop and Rack mounted Power 110 – 220 Vac / 100mA Com. Interfaces Ethernet 10 Mbps Serial V.24 connection (to the automation software server) Memory 2MB (holds up to 500 alarms in case the serial connection with the automation server drops) Configuration Through telnet application Receiver Protocols Radionics compatible Surgard compatible

THANK YOU !