Please activate JavaScript!
Please install Adobe Flash Player, click here for download

Pipeline Technology Journal 2-2015

Latest developments and news from the pipeline industry

RESEARCH / DEVELOPMENT / TECHNOLOGY COMMUNICATIONS AND NETWORKING COMPONENTS SELECTION Voice communications and data transfer are the nerves of the secu- rity system. The quicker the information is collected and transferred, the faster the intervention team can react. A high-bandwidth redun- dant network architecture is the foundation of an efficient commu- nications system, allowing all sensor data to be transferred to every control center. Not only does it allow field personnel to connect with the security operators, but it also allows a multi-level command center architecture using local, regional, and national command centers that all have access to a common set of shared data flows. With the infor- mation already shared and distributed locally or remotely in a timely manner, the decision-making cycle is therefore greatly reduced. In the current example, the data network relies on the available fibre optic network. A well-trained liaison officer has direct radio commu- nication access to its armed forces counterpart. The various security operators in the control centers communicate by VoIP systems and chat sessions. A legacy voice communication system that was used by the security personnel (analog walky-talkies and trunking radio re- peaters) has been integrated into the new security solution and is now controlled by the security operating center. All communications are re- corded and stored on a time basis in the common operating database. SOFTWARE INTEGRATION – DATA CORRELATION Information coming from sensors need to be filtered, correlated, and processed so that the security operators are fed with a comprehen- sive common operating picture. Stovepipe architectures have a huge lack of data processing with the risk that operators are overwhelmed with raw data coming from several sensors. In a non-integrated sys- tem, a radar operator would need to verbally cue the camera operator toward a detected entity instead of having this process automated. This manual process is time-consuming, error-prone, and definitely reduces the chances of successful criminal activity prevention. Data correlation is paramount to the efficiency of the security solu- tion. Many sensors, especially detection sensors, will return similar data types. For example, radars, AIS, air traffic transponders, Global Positioning System (GPS) trackers, and distributed acoustic sensors all return similar threat information: a position, possibly a speed, and a bearing. As a result, more than one sensor will return the same de- tected threat to the security operator. Without data correlation, the operator potentially receives as many entities as there are sensors, for the same real-life entity. Data correlation and entity fusion provide the security operator with a single entity containing the information of all sensors. Furthermore, advanced processing should be made in order to raise an alert if a detected threat is not associated with a known tracking device-equipped entity. Depending on the compo- nent performance, paired entities can be automatically classified as friendly or pacific, so the operator can concentrate on unknown en- tities. Data layering allow the security operators to create their own common operating picture. Having access to all sensor data, the user can select which sensor data to display by drawing areas of interest, to see only the information relevant to the areas under his responsi- bility and to prevent cluttering his geographical map display. Figure 5: Mobile Tower Surveillance System “FULLY INTEGRATED SYSTEMS SLOW DOWN THE THREATS SUFFI- CIENTLY SO THAT CRIMINAL ACTIVITIES, SUCH AS SABOTAGE AND THIEVERY, ARE PREVENTED.” >LouisHarnois,RheinmetallCanada 56 PIPELINE TECHNOLOGY JOURNAL

Pages Overview