July/August 2019 I 27
fundamental principles and applications commonly
deployed in today’s perimeter intrusion
detection applications:
• Photoelectric beams
• Microwave detection (bi-static/mono-static)
• Fence vibration sensors
• Linear detection system (strain sensitive cable)
• Fiber optic fence detection (vibration detection
using optical time-domain reflectometry)
• Video motion detection (analytics)
• Ground-based radar
• Electric field detection
• Capacitance detection sensors
• Taut wire
• Buried fiber optic acoustic and seismic detection
• Ported coax buried seismic detection
• Balance buried pressure sensors
• Buried geophone
• Acoustic detection (air turbulence)
While not all of these technologies utilize sensors that
are IP-based, most perimeter detection systems span large
distances. Therefore, much of the data connectivity is
accomplished by employing outside plant (OSP) optical
fiber cabling, which is why the ICT professional needs
to understand the fundamental principles
sensitive data centers in desert or sparsely populated
areas, ICT professionals must incorporate security-indepth
to ensure cybersecurity measures are accompanied
by the appropriate physical security for their
enterprise customers.
BIOGRAPHY: Anthony is a security and technology specialist
with Burns’ Aviation Group. He has devoted his entire
40+ year career to project planning and design for security
and technology applications for airports, transportation,
and other building occupancies. His expertise covers a broad
range of applications in physical security, life safety, and ICT.
Anthony is a BICSI Registered Communications Distribution
Designer (RCDD) and a board-certified Physical Security
Professional (PSP) by ASIS International. He can be reached
at afrassetta@burns-group.com.
of security-in-depth.
As with any technology system,
understanding the design and appli-
cation of various technologies informs
the ICT designer of how to deploy
the appropriate connectivity. Most
of these systems require some manner
of ICT connectivity, and in some
cases, the actual technology is directly
based on ICT, such as fiber-based
fence detection and buried fiber optic
acoustic or seismic detection systems.
These ICT applications are vitally
important for the deter and detect
phases of the 5D methodology, which
in turn helps to ensure that the most
efficient delay and defend strategies
are met. Additionally, as companies
increasingly construct security-
link
/www.snaketray.com