34 Staking out Metro Stations
Detect Blind Spots
and Mitigate Threats
In the face of challenges such as traffic congestion and greenhouse gas emissions, public transportation offers a range of benefits over private automobile travel. As global ridership on intercity rail and transit continues to grow, many systems around the world are being expanded or newly constructed.
42 Next Stop: Unified Control of Disparate Systems 46 Keeping Metro Safe and Secure
28 Small Devices at the Heart of Major
Streaming Video Through the Air 94
62 Building Successful Leadership
The current wireless market for video surveillance is estimated to be around US$500 million. As wireless applications become more ubiquitous,a&s looks into how wireless networks handle megapixel cameras, some hurdles to watch out for, and the road ahead for wireless surveillance.
48 The U.S. Rebounds
Innovation and Simplicity to Quench the Thirst As the US security market continues to recover, driven by backlogged demand and “good guy” applications, security solution providers are focused on making life easier for system integrators, installers and end users with disruptive innovations, while tailoring solutions for specific applications.
56 Preparing for Inevitable Change 58 Developing Technology Road Map
74 Secutech International 2012:
A Taiwan Perspective
Secutech Excellence AwardS 2012
78 Secutech 2012 Recognizes the Best of the
Best in HD Surveillance 90 Special Thanks to Equipment Supporters Secutech Review
Some SDI, Sir?
98 Eye-Catching Product Pickss
Within two years, HD-SDI has established substantial awareness in the marketplace, as tangible products materialize from an earlier TV transmission concept.
14 18 20 20
70 Product Showcase
Contents Editor’s Note Corporate News Market Observer
110 Show Calendar 112 New Products 118 Companies in This Issue
EDITOR'S NOTE a&s International, published by Messe Frankfurt New Era Business Media Ltd., is a monthly professional publication for channel players in the worldwide electronic security industry since 1997. It updates importers, distributors, OEM/ODM searchers, system integrators and other product purchasers on product sources and identifies developments in CCTV, Digital Surveillance, Access Control,
Biometrics, Intrusion Alarm, Intercom/Video Doorphone, Home Automation and other fields relevant to electronic security.
ISSN 1997-6267 ˁൢඵ͔̻ݭϫ୷༚੮ທച৪ᕻგΠ
After a six-year marathon at a&s International and Asia, yours truly will be making his way to asmag.com, the virtual equivalent of these two highly regarded trade publications. Your continued support and constant feedback over the years are greatly appreciated, and I hope your generosity can be extended to my successor and my new post at asmag.com. I am looking to expand my content generation and management role, to include more social-media initiatives and be more inclusive and real-time with all issues related to security and automation. On behalf of my old team and my new team, thank you, and we wish to take this business rapport to the next level and continue to grow with you.
Parson Lee Joseph Lee John Shih Regina Tsai
Publisher & Managing Director General Manager General Manager General Manager
General Press Hayden Hsu Alf Chang Gary Tang Tevin Wang Jessica Kao Sally Tsui
Editor in Chief Senior Consultant Reporter Reporter Reporter Coordinator
email@example.com firstname.lastname@example.org email@example.com firstname.lastname@example.org email@example.com firstname.lastname@example.org email@example.com
Executive Designer Designer Designer
firstname.lastname@example.org email@example.com firstname.lastname@example.org
Gaven Lee Mao Chang Arthur Wu
Circulation & Subscription
Our cover story this month focuses on light-rail/metro/subway stations, addressing the challenges and advances in deploying and integrating security, safety and building systems for large-scale transit projects. Product Exploration discusses HD-SDI cameras, highlighting breakthroughs, differentiating features, real-life practical issues and purchasing selection criteria (the July issue will look at HD-SDI transmission and storage management). Also in this issue are Market Update on the U.S., Special Feature on wireless design and installation considerations, Network Management on switches and routers, and Industry Report on some very interesting findings and discussions from Secutech 2012. Enjoy!
Collins Yuan Michelle Shih
Group Manager Coordinator
Vivien Hsiu Juihui Lin Chihung Lee
Project Manager Assistant to Managing Director IT Manager
email@example.com firstname.lastname@example.org email@example.com
Web Editor in Chief
Secutech & Events (Overseas)
Sandra Chen Iris Pan Tina Chang
Project Manager Assistant Manager Assistant Manager
firstname.lastname@example.org email@example.com firstname.lastname@example.org
Secutech & Events (Domestic)
International Advertising [Headquarters]
Hayden Hsu email@example.com
Echo Lin Joanne Wu Kay Yang Audrey Fang Helen Chen Winnie Ho Jessica Lee
Manager Officer Operation Officer Coordinator Coordinator Coordinator Assistant
firstname.lastname@example.org email@example.com firstname.lastname@example.org email@example.com firstname.lastname@example.org email@example.com firstname.lastname@example.org
[Branches & Representatives]
Bobbie Ferraro Carolina Pattuelli Cemre Ilkan Evris Consolos Muris Hadzic Manish Gandhi Tim Shen Y. C. Suh Takashi Komori Nguyen Thu Ha
USA/Canada Europe (Italy) Europe (Turkey) Europe (U.K.) Southeast Europe India China Korea Japan Vietnam
email@example.com firstname.lastname@example.org email@example.com firstname.lastname@example.org email@example.com firstname.lastname@example.org email@example.com firstname.lastname@example.org email@example.com firstname.lastname@example.org
Messe Frankfurt New Era Business Media Ltd. Taiwan Branch: 2F, No. 8, Lane 360, Sec. 1, Nei-Hu Rd.,Taipei 114, Taiwan Phone/886 2 2659 9080 Fax/886 2 2659 9069 Website/www.mfnewera.com Messe Frankfurt New Era Business Media Ltd., a company formed by Messe Frankfurt (HK) Ltd. and former A&S Group in 2009, is an integrated media service provider in the security industry. Our service covers magazines, Web sites, events and trade shows. The portfolio of a&s magazines includes a&s International, a&s International China Best Buys, a&s Asia (above published in English), a&s China, a&s Installer, a&s Taiwan, a&s Solution, Fire & Safety and Info Security (above published in Chinese). a&s Turkiye, a&s Adria, a&s Italy, a&s India, a&s Japan and a&s Vietnam are licensed editions. For changes of address or subscription problems, contact us at email@example.com Copyright© 2012 Messe Frankfurt New Era Business Media Ltd. All rights reserved. No part of this magazine may be republished, reprinted or redistributed in any forms, including electronic, without written consent from the publisher.
Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, image, patent or trademark disputes from advertisements or among advertisers. Legal consultant: Julia S.H. Yu, Attorney at Law, First Law & IP Offices
CORPORATE NEWS French Airport Improves Service Quality With Axis IP Video Saint Exupery Airport is the third largest in France. With more than eight million passengers in 2011, it can accommodate up to 32,000 travelers per day. In an effort to constantly improve its service quality, the airport wanted to set up an intelligent video surveillance system to give passengers more information as they move around, including information about wait times between security checkpoints and in departure lounges. The airport closely studied a number of equipment and software solutions for three months. Foxstream recommended a solution based on Axis network cameras, with software developed by Foxstream's own engineer that analyzes and
processes images automatically and in real time. Close to 50 Axis network cameras were installed, and it took three months to test and adapt the installation from a technical and architectural standpoint. The airport is very satisfied with the solution. “This solution based on IP video and image analysis has allowed us to flesh out the details of our project and to perfect operations at the airport. Beyond the satisfaction of the passengers that we achieve, we can see that it is a daily work tool that allows us to enhance our organization and assist our development,” said Frederic Besson, Project Leader of Information Systems at Saint Exupery Airport.
IMS: BRICs Bolster Global Video Surveillance Market Growth in 2012 IMS Research has just published the new edition of World Market for CCTV and Video Surveillance Equipment report. The report forecasted that despite the weak and uncertain economic climate, the world market for video surveillance equipment will grow in excess of 12 percent in 2012. Gary Wong, Senior Analyst and report author, said, “Western Europe is projected to be the largest drag factor impacting global market growth in 2012. The Eurozone debt crisis is expected to depress growth in Western Europe as austerity measures continue to be implemented and a lack of end-user confidence limits video surveillance equipment spend.” Despite the dampening effect of the Eurozone debt crisis, strong growth is forecast for the global video surveillance equipment market in 2012. Wong stated, “The global market will be driven by strong demand for video surveillance equipment in the BRIC (Brazil, Russia, India and China) countries.” Infrastructure development in advance of major sporting events in Brazil and a heavy focus on city surveillance in China, India and Russia will be key drivers for growth in these countries. Currently the BRIC market is Global Video estimated to represent approxiSurveillance Market mately 30 percent of global video surveillance spend. This is projected to increase to more than 40 percent of global spend in 2016.” Rapidly increasing traction for network video surveillance equipment in the BRIC countries is forecast to lead to an acceleration to the tipping point, when network video sales will overtake analog surveillance sales. IMS BRICs, More than 40% of Research forecasted that the world market for video surveilGlobal Spend in 2016 lance equipment will tip in favor of Source: IMS Research network video in 2013.
Infinova Completes March Networks Acquisition Infinova has completed the acquisition of Canadabased March Networks, a provider of intelligent IP video solutions. The deal was first announced in December 2011. With the addition of March Networks, Infinova becomes one of the 10 largest global companies in the video surveillance market. March Networks will continue to operate under its own identity and its customers should expect no change in the high level of product quality and customer support. It will benefit from the additional R&D and operations resources Infinova provides, ensuring a wider range of solutions to its customers. The addition of March Networks will enhance Infinova's product portfolio and market position. "We are excited about the opportunity to expand our business by leveraging the tremendous assets that March Networks brings to us," said Jeffrey Liu, President and CEO, Infinova. "We are adding world class IP video solutions that have been widely accepted in both retail and banking markets. And also a highly talented R&D staff with exceptional software development expertise. Moreover, a proven management team is committed to helping us expand our global presence."
CORPORATE NEWS Russian Mineral Fertilizers Install Axxonsoft Security System Voskresensk Mineral Fertilizers is one of the top four Russian producers of mineral fertilizers. In 2010 the volume of production amounted to 773 thousand tonnes of marketable products. The main industrial area is more than 200 hectares and six kilometers in perimeter. There are pedestrian, automobile and railway entry checkpoints as well as local safety areas. Prior to the digital system installation, an analog video surveillance system had been employed at the enterprise which proved to be inadequate for the company's needs. The Axxonsoft platform was chosen for the new system because of features like multitask capability, support for a wide range of
devices, reliability, and well-developed technical support. At the moment, the system comprises more than 10 video servers, 20 work stations and 130 cameras. The installed system provides video surveillance of all entry checkpoints and along the enterprise's perimeter, identification of the plate numbers of automobile transport and railway cars as well as video control of local security zones. The introduction of the system has made it possible to achieve a more efficient video monitoring from the control center, and to implement better control of the turning cameras and the video archive viewing of all cameras from a single work station.
ABI Research: 90 Million Homes Worldwide to Employ Home Automation Systems by 2017 New subscription-based home automation (HA) offerings are rapidly transforming the way consumers will monitor, secure and control their homes. Long the preserve of more expensive, custom-installed technology, HA is moving into the mainstream, with companies such as ADT, Comcast, Verizon, Lowe's and many others all adding HA to their customer services. A number of factors are driving the new entrants into the market. Connectivity is one key factor. Not only are there currently high home broadband penetration rates, but also smartphone applications that allow consumers to control and check their homes from wherever they are. As connectivity options make the HA systems more useful, market changes are also making it more affordable. â€œThe US market has long been the dominant region for HA systems and now it is leading the way with managed HA subscription services. In the past two years, service providers, including telecoms, cable, security and energy, have all launched additional HA services for managing energy use or security monitoring to their suites of monthly billed services,â€? said Jonathan Collins, Principal Analyst of Wireless Healthcare and M2M. Over the next five years the managed HA market will grow Managed Home installments at a CAGR of 60 Automation Market percent between 2012 and 2017, outstripping the 31 percent growth across the total market comprising luxury, mainstream and DIY HA deployments. The evolution of the HA market into the mainstream From 2012 to 2017 requires a raft of new partnerships. No company is able to provide all the parts, so telecom, cable, security and utility providers are all looking to smart devices vendors, managed software providers, local installation specialists and others to support the Source: ABI Research broad rollout of HA services.
Australia's Largest Department Store Fights Shoplifters With Geutebruck IP Video Myer, Australia's largest department store group, has targetted shoplifters with new security technology operating in its 68 stores. The use of radio frequency tags and Geutebruck digital surveillance system operated by well-trained staff is proving extremely successful in enabling security staff to identify and report known shoplifters, suspicious behavior and coordinated activity among groups of individuals on its premises. As a result most shoplifting suspects are now apprehended before leaving the premises. Myer is delighted with the results. It chose the Geutebruck IP-video system, after several pilot installations and a number of technical shootouts. With the Geutebruck platforms and around 6,000 Sony 1.3-megapixel cameras, the system has a fast and responsive video management and its strong user functionality. In store its functionality makes spotting abnormal behavior easy so that this can be reported to store guards who then shadow at close quarters, making their presence felt before offences are committed. Besides loss prevention, the video system is delivering other benefits too. Its video evidence can be crucial in rebutting unjustified accident claims, and live footage from each store now enables marketing staff to check display compliance from head office, avoiding travelling time and costs.
CORPORATE NEWS New York Real Estate Firm Strengthens Access Management With HID Global HID Global announced its visitor management software is being used by Trinity Real Estate at commercial real estate properties in Lower Manhattan, New York City. The software provides tenants with a reliable, secure and easy-to-use system for approving or denying visitor access, and streamlines tenant control of visitor access. Trinity Real Estate's tenants include modeling and film agencies and photography service providers who can receive an average of up to 400 visitors a day during special events such as casting calls. Managing visitors has been a complicated and trouble-
AT&T to Launch Home Security and Automation Services AT&T announced plans for a new portfolio of all-digital, IP-based home security monitoring and automation services. The services will give users unparalleled control and security of their homes using any Web-enabled device, including PCs, tablets and smartphones, regardless of the wireless carrier. AT&T plans to begin trials in Atlanta and Dallas this summer. The remote monitoring and automation por tfolio will feature Web-based access to automation, energy and water controls, as well as professionally monitored security services. "The AT&T service has the potential to take home monitoring and home security solutions to another level," said Larry Hettick, Research Director, Consumer Services for Current Analysis. "The service promises to be as robust as anything in the marketplace today backed by the trusted AT&T brand. I am particularly impressed with its IP-based wireless platform, plans for a nationwide offering, and a wide range of devices that can be monitored and viewed from any carrier's wireless or wireline Internet connection. These consumer-friendly capabilities will help grow this industry."
prone task with Trinity Real Estate's prior system. With the HID solution, employees now simply fill out a one-page entry form on the computer, including the visitor’s name, who they will be seeing, where they will be going, and their arrival and departure dates and times. The visitor's driver's license is then scanned upon arrival and matched to the visitor request form by the software. Trinity also plans to add passport scanning in the near future. After identification is validated, the system prints a badge with a bar code including standard guest access information that the visitor presents to a card reader in the lobby to gain entry.
Italian Solar Farm Protected by Videotec and Milestone Systems After completing the construction of a 9.4 megawatt solar farm in Turin, Italy, the company turned to address the problem of guaranteeing the highest possible levels of protection. "The client asked us to design a solution in which the network infrastructure was both sturdy and scalable so that it could be used simultaneously by the security system, the video surveillance system and the other equipment used to monitor the production of electricity,” said Claudio Toaldo, owner of Sicurtel, the company that built the plant. “Moreover, the video surveillance system had to have low luminous impact at night and had to be able to operate satisfactorily without any lights on, except in exceptional circumstances" The Videotec cameras guarantee the lowest environmental impact during nighttime monitoring and are also fitted with a powerful optical zoom for close-up inspection. Sicurtel considered Milestone’s system to be the only fully integrated platform that could manage all the field equipment on an IP platform, hence satisfying its client's requirements. "We decided to use the Milestone video management and recording system", said Toaldo. "Because it allows you to record video images and transmit them to the security company control room. This enables the control room to handle emergencies and collect information on any alarms detected and recorded by one of at least three pre-set cameras, which the Milestone VMS immediately positions on the security barrier section that triggered the alarm."
Canon Cameras Protect Official Home of Turkish Parliamentary Speaker Canon network cameras have been installed at the official residence of the Speaker of the Turkish Parliament as part of a surveillance upgrade. A total of 20 Canon cameras will monitor the outdoor area surrounding the historic building. Canon cameras were chosen by local security experts Fides Technology and Security Systems to meet the need for high performance in all lighting conditions, from intense sunlight during the day to street lighting at night. Murat Hayri, Sales Manager from Fides Technology, said, “We chose Canon cameras because they deliver outstanding image quality. This is an important and high risk site, very close to the house of the President and Prime Minister, and adjacent to the Japanese Ambassador — it’s essential that video surveillance is detailed and crisp 24 hours a day, 365 days a year.”
CORPORATE NEWS Bosch Provides Security Systems to Prestigious Thai University Internationally known and recognized for high caliber of research, teaching and outstanding achievements, Mahidol University in Bangkok contains 17 faculties, six colleges, seven research institutes, and nine centers. Recently, the university added a new building to its campus consisting of classrooms, seminar rooms, a library, a meeting hall, and an auditorium that accommodates an audience of 200. The main challenge was to install a total security solution consisting of a professional communication system as well as a comprehensive security system. After discussion among the consultants, designers and the university management, it was decided that Bosch Security Systems provided the best solution to this challenge. Bosch audio solution was installed in the auditorium and seminar
Arecont Vision Megapixel Technology Deployed at Upscale Mexican Jewelry Store Mallor Joyeria, an upscale jewelry store in México, was a constant target of thieves. With the low-quality resolution of the store's previous video surveillance system, none of the suspects were ever definitively identified or caught. It was clear that a higher quality system was needed, and Arecont Vision’s megapixel camera technology provided the solution that Mallor Joyeria needed. Eight of Arecont Vision’s cameras were installed at the jewelry store, including six specifically positioned to cover jewelry showcases. The system is monitored locally by store management and can also be monitored remotely via the Internet. As a result, store management reports a lower rate of theft attempts and an increase in security for customers. “Arecont Vision cameras provide wider views and higher resolution coverage,” said Rodrigo Cervantes, Product Engineering Manager, Sermex, the systems integrator for the project. “Greater image clarity translates into better information to be used as evidence and the picture quality and digital zoom capabilities of the cameras far exceed the previously used analog technology.” The cameras enable the jewelry store to gather, analyze and interpret any evidence of theft, which helps them achieve their primary goal of greater security.
rooms. As the rooms accommodate large audiences, it is essential that the system can project clearly across vast areas. The auditorium was equipped with Bosch equipment which could match their standards and meet their requirements to cater for various events. Conference systems were installed in the seminar rooms which fit to the changing demands of either conferences or meetings. To monitor the ongoing activities of the university and ensure safety of all students and staff, Bosch video systems were installed. Surveillance cameras were placed in classrooms, the library entrance and the meeting hall. In addition, to operate all cameras, the Bosch video management system was also used.
Irish Hostel Secured With Salto Access Control Solution To ensure guest security, the Kinlay Hostel in Galway, Ireland, has chosen a hospitality access solution from Salto to provide 24/7 control of who can access what, where and when. More than 55 battery-operated stand-alone electronic smart locks were installed into all the bedrooms, as well as a DIN glass door lock on a frameless glass back office door, and a hardwired smart card wall reader and online control unit on a back office double door. The installation of the Salto access platform needed no hardwiring and is ‘wire-free’. This enables Kinlay Hostel's wire-free locks to be networked to their PC server without wires, infrared, or Wi-Fi. The link that enables this communication is carried by the ‘intelligent' smart card used by guests and staff which is a two-way data transporter that grants access to bedrooms, back office doors, and other access points.
Hard Rock Hotel and Casino Albuquerque Enhanced Guest Safety With Avigilon Surveillance System Avigilon announced that the Hard Rock Hotel and Casino Albuquerque will deploy the Avigilon high-definition surveillance system to ensure the security of guests at their hotel and 100,000 square-foot casino. “To ensure that our guests have the safest possible experience and that we're getting the best ROI, we chose Avigilon,” said Michelle Jojola-Barwick, Surveillance Director at Hard Rock Hotel and Casino Albuquerque. “Not only will the system provide our security personnel with the best image quality to prevent potential security and liability issues, but with Avigilon, we can also leverage our existing assets and minimize investigation time,” added David Schmidt, CCTV Supervisor. The hotel and casino has begun the migration path to full HD with an Avigilon end-to-end solution that provides a 70 percent annual reduction in power consumption. With the clarity of the Avigilon HD cameras, the casino can capture unsurpassed real-time and recorded detail at 30 fps that meet regulatory standards.
Small Devices at the Heart of Major
Enterprise Networks Todayâ€™s major corporations have multiple sites, each with hundreds or thousands of systems that manage security, a host of other building functions (such as HVAC and lighting), and data for human resources, legal, marketing and other departments. Ensuring that they work seamlessly requires comprehensive planning, dedicated team efforts and reliable network gear. SUBMITTED BY JOHNSON CONTROLS
other connected devices, including the one that sent it. ost often, corporate officials prefer to converge Also, hubs split total network speed by the number of their security, building and other operational connected devices. As a result, hubs are rarely used in systems onto one large enterprise computer modern enterprise network-based security systems. A hub network. That creates a challenge for the IT department, operates on Layer 1 of the open-system interconnection to marry disparate systems with varying degrees (OSI) model. and requirements of access, bandwidth and security. Established by the International Organization for That challenge is typically met through the creation of Standardization, the OSI model consists of seven layers, sub-networks known as LANs and WANs. with Layer 1 at the bottom. Layer 1, known as the physical A LAN is a computer network encompassing a layer, defines the relationship between a device and a relatively small area — usually a single building or transmission medium, such as copper or group of adjacent facilities. Typically, IT optical fiber. professionals create separate LANs for Switches work in the same manner as systems that are bandwidth hogs, such as hubs, but offer many more capabilities video surveillance and hospital medical for sorting and distributing network data records. Most IT professionals want some packets sent between devices on a LAN segregation of these large data packets or WAN. A packet not only includes from other building functions. However, data, but also its destination address. For less data-intense systems such as lighting instance, switches identify the intended controls and access may coexist very well destination(s) of received data, such as on the same LAN. video, sending that information only to In most cases, a WAN will consist of those devices that require it. two or more LANs that span a larger ▲ Ralph Staffiere, Senior Account Executive of Switches can receive and transmit data geographical area. Security Solutions, Johnson Controls more quickly (at the same time), guaranImagine all of the data that is required to teeing the rated network speed for each be moved, shared and stored to operate, connected device. A single switch can maintain and secure a project, such as two handle hundreds, even thousands, of adjacent high-rise towers that serve as a devices on a large enterprise network. More luxury hotel and prime office building, expensive than hubs, switches operate joined by a five-level retail complex. on Layer 2 of the OSI model; Layer-2 Behind all of the workstations, surveildevices can send communications between lance cameras, access control panels, different network devices, but cannot direct intercoms, building management systems traffic to another network. and their networks are two relatively A router, simply put, has two major jobs. inexpensive pieces of equipment — the The first is to ensure that information is switch and the router — that create and ▲Darryl Da Silva, Security Integration Specialist, Johnson Controls successfully delivered from one network link all of the LANs and WANs into the to another. The second is to see that enterprise network. The enterprise network other connected networks do not receive unnecessary as we know it would not be possible without these information. Otherwise, overloaded LANs and WANs devices. Oftentimes, the terms switch and router are used could crash. Routers are located at gateways where two interchangeably, but they have different uses even if they or more networks are connected; they use built-in tables may at times be integrated into the same, single device. to determine the best path for packet distribution. Like The feature looks at how each is used and when. switches, routers can be operated in either a wired or But first, let’s take a quick look at a close relative — wireless mode. More expensive than switches, routers the hub, once a critical part of basic networks. Hubs are operate on OSI’s Layer 3, which provides the means of used to connect and share information between network transferring data sequences from a source host on one devices. However, hubs have several major limitations. network to a destination host on a different network. They cannot simultaneously send and receive information. So, how do these devices all fit into a modern, enterprise Data sent from one connected device is shared with all
NETWORK MANAGEMENT security/building automation system? For one thing, switches can play a major role in helping organizations still employing analog equipment, such as surveillance cameras, make the transition to a totally IP system. A switch-based LAN moves the video through converters that digitize the data for recording and viewing across the enterprise network. As analog cameras fail, they can be replaced with IP-based models until the system is fully digital. This helps protect legacy investments and allows for a planned upgrade that fits corporate budgets. The larger and more complex a network becomes, many IT professionals look to virtual LANs (VLANs) to provide added structure. A VLAN may provide extra security for sensitive data, such as surveillance footage. It may link project work or other special jobs. VLANs can be easily created on most switches by entering parameters (name, domain and port assignments). A VLAN may contain multiple switches, and a single switch may be part of more than one VLAN. However, communications between VLANs requires a router. Routers are not only necessary within an organization’s networks — they also connect to the tens of thousands of other networks worldwide to create the Internet. That makes routers absolutely critical for logging in and remotely viewing security video or reviewing access logs from across a city or from another continent. In some cases, IT may also employ switches and routers to create stand-alone, dedicated networks for bandwidth hogs, such as video surveillance or medical records, to limit their impact on other corporate or organizational Routers ensure cross-network communications and act as gatekeepers.
▲ The Emirates Towers in Dubai house a five-star hotel, numerous corporations, shops and restau-
functions. Let’s take a look at how these various devices and networks combine in some very complex building installations. The first is a two-tower project known as the Emirates Towers in Dubai, United Arab Emirates. This office/hotel complex accommodates business and vacation travelers alike. The office tower is home to numerous MNCs requiring the latest fiber-optic technology and integrated systems. The five-star hotel tower offers 500 rooms, including 40 suites, and three main theme restaurants. A five-level podium building, with retails shops, restaurants and parking lots, connects the two. A goal during the project construction phase was the implementation of a scalable, technological infrastructure to handle future developments. The project was also designed to provide the latest available technologies and integrations to ensure the towers’ competitiveness, while guaranteeing a quality
â–˛ After a 10-year, $4.4-billion upgrade at the Toronto Pearson International Airport, a new terminal
will replace two existing terminals and include a gross floor area of 82 acres with 258 check-in counters, a baggage-handling system with nine miles of conveyor able to handle 18,000 bags per hour, and a 12,600-space parking garage.
building environment. A single building automation system, with four graphic workstations, manages and integrates 20 subsystems, including video surveillance, access control, fire alarm, telephone, paging, lighting, HVAC, elevators, video on demand, and hotel and property management systems via the IT network.
This portion of the project increased operator efficiency through single-seat operation of 23,000 data points; streamlined operations and maintenance costs due to the integrated systems; adopted scalable technology that ensured reductions in future retrofit and upgrade costs; and enhanced guest experiences through interactive technologies. Physical integration of all subsystems and applications was achieved through one common IT network based on asynchronous transfer mode (ATM) and Gigabit Ethernet technology. A network management system handles the high-speed network and its connected devices. The change from a stand-alone system approach to an integrated system leads to significant changes in the engineering and management processes. The basic platform for the integrated solution is the Ethernet technology and TCP/IP (Internet) compatibility of the building automation system. This provides the foundation for technology integration in the Emirates Towers. The use of open protocols and standards in the building automation system ensured that the owner
5-9 June 2012 booth no. L0020/4F
NETWORK MANAGEMENT and officials were able to operate an intelligent building without losing connectivity or features. Throughout the project, there are switches linking access control panels and locks over a LAN, and other LANs link the surveillance, fire panels and other building systems. Routers are installed to link the LANs, where appropriate, and then to the enterprise IT network. Here is a look at another major project depending upon switches and routers to move and share data with a number of disparate systems. The Toronto Pearson International Airport is nearing the end of a 10-year, US$4.4-billion program to provide higher levels of safety, efficiency and services for the more than 25 million passengers that pass through it each year. The new terminal’s security system uses IP video technology, providing full, flexible access to the facility’s 700 cameras in groups of up to 40. The security network can be expanded to meet growth or changes in government regulations and technology advances. Again, the security system is integrated with the building management system. That management system also controls the HVAC system throughout the terminal and ancillary facilities, including the parking structures. It provides a single-seat user interface for monitoring and regulating multiple functions. This system operates on a campus WAN configured as a dual-redundant, fiber-optic ring. Management and other authorized personnel can access the system from a central workstation or from their offices and from off-site, by way of the airport intranet. The Web-based building automation system (BAS) is programmed to integrate numerous functions, and airport officials are taking increasing advantage of the integration as the building program is completed. For example, integration with the air traffic information management system saves energy and enhances traveler comfort by controlling fresh air intake, heating, cooling and lighting automatically in accord with arrivals and departures. The BAS also integrates lighting management, an important function on a campus with annual electric bills totaling US$18 million. Lighting can be adjusted or switched off automatically based on natural lighting levels, building schedules, flight information and other factors. Other BAS integrations include: • The central utility plant: Communications between the boiler and chiller plant and the BAS helps staff manage the flow and distribution of energy throughout the campus.
▲ The Toronto Airport BAS serves 31 buildings, comprising more than 900,000 square meters; the
system monitors and controls some 60,000 points.
• Fire alarms: The HVAC system responds automatically to alarms, pressurizing stairwells, shutting off fans and evacuating smoke in appropriate areas. • Power management and control system: This system monitors power consumption and detects anomalies. • Vertical and horizontal transportation management systems: Integration with the BAS tells staff the status of power walks, escalators and elevators. The system also monitors and reports the status of pumps and variable-frequency fan drives, triggering alarms and identifying faults. Integrators can add value by helping their customers understand how security — and other building functions for that matter — can be networked in different manners to increase operational value and reduce costs. Each organization requires its own solutions that work seamlessly with the IT department to help create and maintain the required LANs and WANs that keep the enterprise network operating at its peak. And, remember, none of these grand, complex plans would be possible without the humble switch and router.
In the face of challenges such as traffic congestion and greenhouse gas emissions, public transportation offers a range of benefits over private automobile travel. As global ridership on intercity rail and transit continues to grow, many systems around the world are being expanded or newly constructed. According to Worldwatch Instituteâ€™s report, Europe has the highest rail density. Currently, the urban rail network in Europe encompassed more than 200 tram, light rail and subway systems with over 10,000 kms. An additional 800 kms were under construction while another 350 kms more were planned. The Americas, following Europeâ€™s lead, was ranked second due to its large freight rail market but lags far behind in passenger rail. The below average infrastructure investment rate in Latin America remains the biggest obstacle in metro development. Compared with these regions, Asia and the Pacific are showing the fastest growth. The emerging markets in APAC will continue with their above-average growth, resulting from the corresponding increase in regional trade with growing freight volumes, urbanization with its needs for efficient mass-transit systems and rising environmental awareness. China, for one, is eagerly extending its metro system mileage. If Chinaâ€™s investment in nationwide high-speed rail networks is considered massive, its spending on local rapid transit systems is equally impressive. The central government has committed roughly US$100 billion, by 2015, to urban public transportation, which is part of a nationwide, trillion-dollar investment in urban infrastructure. Shanghai, for instance, now boasts 282 stations
and 420 km of track, compared to 408 km in London and 368 km in New York City. The city has an additional 300 km planned to be operational by 2020, by which time the city alone will have more rapid-transit mileage than the entire country of Japan. Shanghai is not alone: 12 other Chinese municipalities currently have rapid transit; 19 more have systems under construction; and 17 new networks are being planned. Today, China offers around 600 km of metro track. By the end of this year, this number will reach 1,400 km and an estimated 3,000 km in five years' time. Keeping passengers secure and assets safe and operational is the ultimate goal of transit authorities/operators. In this first article of the three-part feature, a&s explores the risks, concerns and security measures at underground and open metro stations. BY TEVIN WANG
ass transit systems, by nature, are open to everyone. Multiple entrances and exits designed to move large quantities of riders, oftentimes in closed quarters, make metro stations particularly vulnerable. “It is important to understand the operational complexities of the environment when considering the security and safety of passengers and operations,” said Skip Dunnett, Threat, Vulnerability and Risk Consultant at Digital Barriers. A security system can only be reliable if it is comprehensive in design, with various inputs and perspectives from all stakeholders. “Multiple parties, including transit authorities, local municipalities and emergency responders, are typically involved throughout the planning and design process for metropolitan subways, making it crucial for a security integrator to communicate closely with each party,” said Jeremy Brecher, VP of Technology Services, Diebold Security. “A better and more productive approach is to include safety professionals such as health and safety representatives, public safety officers and fire control officers from the onset. While safety systems are not generally designed to provide physical protection, they can offer aspects of security such as threat identification and scene
▲ Harsh conditions can impact the effective operation of security equipment.
change awareness,” Dunnett added.
HARSH ENVIRONMENTS Subways can be harsh for security systems, in terms of high/low temperatures, heat, constant vibration and dust/debris. Such environmental challenges must be considered throughout all stages of security, life safety and risk mitigation planning and implementation. “In addition to potentially requiring more frequent maintenance, harsh conditions can also impact the effective operation of security equipment,” Brecher said. “The trains
Skip Dunnett, Threat, Vulnerability and Risk Consultant, Digital Barriers
Armine Beybutyan, Product Sales and Marketing Manager, Korenix Technology (Beijer Electronics Group)
and rail equipment can cause radio frequency/electromagnetic-field interference, for instance, and being underground makes connectivity through wireless technologies and security backhauls difficult as well. This is more the reason to ensure that technology is selected with careful consideration of all factors.” After identifying the risks, integrators must look to install technologies that have been proven to operate effectively in harsh conditions to prevent costly maintenance or even failure. “To ensure reliability, all electrical equipment must have ruggedized design,” said Armine Beybutyan, Product Sales and Marketing Manager, Korenix Technology (A Beijer Electronics Group Company). OPERATION VERSUS SECURITY In transportation, anything adversely affecting passenger flow
is regarded as negative. Compared to the aviation sector, there are no constant screenings at metro stations, if there are any, which illustrates the limited resources earmarked for transit authorities. According to USA Today, more than $30 billion has been allocated for aviation security since 9/11, compared to $1.7 billion for subway, passenger rail, cargo rail, bus and ferry security all combined. “Metro stations are open, and no one can really stop you if you have a load of weapons or explosives,” said Danny Peleg, Director of Market Development for Transportation at Genetec. “Unlike airport security where each passenger has to show up an hour before boarding for screening, the challenge for metros is to ensure security without disrupting operation or service. So you really need to think
about security measures that can actually be implemented.” The constant changes in metro stations also make it difficult to react or respond. “Unlike safety equipment and procedures that are normally seen as nuisances and dictated by regulations, security is an area where risk management can be applied,” Dunnett said. “Although there is usually some form of input into metro security from government departments, this is normally in the form of advice and guidance and relies on the operator to act proactively. In contrast, there is commonly a zero tolerance to unsafe practices. Given that protective security can often require a huge range of differing standards of protection based on the same threat scenario, it is not surprising that mass transportation security managers
and planners employ a great deal of risk tolerance when it comes to the implementation of security.” EFFECTIVE COVERAGE It is often difficult to have effective coverage over an entire station. “You’re dealing with a lot of equipment spread over an extensive area,” Brecher said. “Security managers can often achieve better results if they cover the most vulnerable areas, including entryways, critical areas and so on, instead of trying to cover the whole system, which has the downside of spreading resources too thin.” Roger Dong, Director, Product Marketing and Business Development China, Bosch Security Systems, agreed. “No matter how few or how many cameras a system uses,
monitoring everything effectively presents a serious challenge. Even observing just a single screen for long periods pushes concentration to the limit; after only 20 minutes, an operator can miss as much as 90 percent of the activity in a scene.” The best form of defense is thus “attack.” “It is better to identify a number of minor incidents that can be analyzed to give warnings and indications of potential problems than to wait for a major incident to unfold,” Dunnett said. “The proactive tracking of incidents of security interest can allow security staff and managers to detect areas of potential risk and to take preemptive action to reduce vulnerability." Through coordination and integration, safety systems can be better utilized to support security p ro c e s s e s a n d p ro c e d u re s . “ A safety system installed to control overcrowding on the metro platform can be utilized to monitor suspicious activity and thus add to the threat awareness picture. The use of passenger-counting analytics across the surveillance system can highlight not only unsafe overcrowding in ticket halls but can also draw attention to building disquiet in these areas during periods of tension such as the transiting of opposing football supporters,” Dunnett said. “Furthermore, the integration and utilization of safety equipment are not only cost-effective but also provide a subtle way by which security can be introduced without being intrusive. The general public can be uncomfortable with overt surveillance equipment but will feel at ease with the same amount of cameras being present for safety reasons.” To cope with compounded security and safety threats, a wide range
Danny Peleg, Director of Market Development for Transportation, Genetec
Roger Dong, Director, Product Marketing and Business Development China, Bosch Security Systems
of security and safety systems, including fire alarm, public address and evacuation, video surveillance, intrusion detection and access control, must be in place. “The implemented technology needs to be flexible enough to address different circumstances,” Dong said. WORK AS ONE Metro stations require numerous sensors to detect behavior in different areas. Processing the data from these sensors takes time and, in many cases, is done manually by operators. “Additionally, the operator then has to manually locate the video camera(s) nearest to the sensor location to verify what is going on,” said James Chong, CTO and Senior VP of Strategic Innovation, Vidsys. Information and the speed at which it is delivered are therefore critical, as seconds can save lives. “During critical events, it is essential that operators have fast and reliable access to relevant security assets, and pertinent information from the numerous and complex security systems,” said Adlan Hussain, Marketing Manager, CNL Software. “The challenge is the response to a sudden surge in this load, caused b y a c rit i cal event o r dis as t er scenario, comprised of multiple events happening at the same time. Designing a system to make the best use of the existing systems, such as
marrying the information from surveillance, detection systems and location data, can help reduce the number of false alarms, increase situational awareness and minimize the time taken to deal with incidents. This helps increase the efficiency of security operations and reduce any disruption caused to passengers and their journeys.” Peleg seconds it. “Fast access to recorded video is very essential if something happens and images/ video footage are recorded 24/7. Through a centralized platform and efficient data coordination, operators don’t need to memorize procedures by heart and can better respond by shortening the panicking time and taking appropriate actions quickly.”
INS AND OUTS DAMAGE CONTROL AND VULNERABILITY The complexity of metro environments directly affects evacuation strategies. When considering security risks and vulnerabilities of indoor and outdoor stations, it all comes down to the natures of threats. “In an indoor, confined area, threats such as explosives or fires can have significant effects. On the other hand, the threat within an outdoor station is more concerned with the relative freedom of access,” Dunnett said. “An outdoor station can be difficult to protect too, as the perimeter is generally easier
to access. Indoor stations are easier to protect in this regard, as the egress points are limited and create excellent canalization points at which security sensors and monitoring can be operated effectively.” Risk Assessment Aspects of the station’s profile, such as environment, passenger makeup, ease of access, ease of escape, overt security profile and prestigious value, would define the level of threat and dictate the type of attack. “Generally speaking, the safety and security requirements not only differ based on the ‘indoor’ or ‘outdoor’ factor, but
also on the size and the bustle of the station,” Dong said. “Noise levels, means of escape, fire prevention and fire detection all cause concerns which relate to the unique layout of and emergency response to the area. For instance, smoke detectors for metro stations with high ceilings need to be extremely sensitive.” Rugged and More “The performance of video analytics, especially in the outdoor environment, can be impacted by numerous environmental factors, such as flying objects like bugs or litter, rain, snow and fog can nuisance
▲ Safety and security requirements not only differ based on indoor or outdoor factors, but also on the size and regular flow of the station.
flase alarms” Peleg cautioned. Fair and poor lighting conditions should also put into consideration during camera setup. Ruggedized, vandal-resistant design of cameras is a must. In these high-traffic, harsh environments, cutting-edge technology is not necessarily a must. “Usually, the most appropriate technologies can save a lot more trouble, lives and lower TCO in the long run,” said Patrick Lim, Director of Sales and Marketing, Ademco Far East (an Ademco Security Group company).
Safe and Sound
In addition to safety and surveillance measures, voice alarm systems also play an important role. For example, they are used to guide people to the stairways, or to instruct them to take their baggage with them in the event of a bomb threat, or to leave everything in the event of a fire, Dong said. “From a technical perspective, a public address system is one of the most difficult parts because in each case, the system needs to be adjusted to individual premises and acoustic conditions. Announcements or warnings need to be easily understandable despite high noise levels or reverberation. Fully digital public address and emergency sound systems are suitable for these volatile environments, as they automatically adjust to match the ambient noise levels.” Communication systems are equally important as surveillance systems, but are often neglected, Lim warned. “Integration of all these systems to work intelligently as one helps greatly in providing accurate and life-saving information, should there be a terrorist attack or an emergency.”