Index
Note: Page numbers followed by f indicate figures.
A
Access control interfaces
237
Access-controlled door
357
Access verification workstations
233–234
Administrative workstations
233
design elements for
49–50
interfacing to building systems
76
photo identification elements
62
Alarm detection technologies
audio/video verification
313
second alarm sensor assessment
52
Analog switcher interfacing
272
videotape recorders
80–81
Artificial intelligence learning algorithms
94
Automatic device addressing
208
B
Bid review, construction/design project
reference checking form
153
request for information form
153
Boolean algebra logic cell, implementation
344–346
Building automation systems (BASs)
237
Building shell/core and interior architects
163
Building system interfaces
building automation systems
284–285
deluge fire sprinkler control
285
fire/life safety interfaces
282–283
fuel management systems
287
parking control systems
287
public address systems
287
C
Cancellation losses, multipath signal
262
Capacitance detectors
320
Caption microwave tower
88,
89f
Card controls operating system
352–353
Cascade losses, multipath signal
262
Central processing unit (CPU)
232
Checklist, finalization and commissioning
335–344
alarm/access control system
339–340
boolean algebra logic cell implementation
344–346
connecting to power source and digital edge switch
336
primary server, loading
337
homeland security threat level policies and rules
340
to information technology system
342–343
lights/HVAC after-hours system billing
346
loading alarm/access control system primary server
337
organization’s system policies and rules
340–341
PSIM software implementation
339
schedules and time zones
338
network infrastructure
336
server and workstation operating systems, loading
336
set up access control groups
338
video guard tour implementations
338–339
Circuiting, RF systems
258
Circuit-switched network
98
Client/server configuration
222–223
Client-to-client intrusion
351
Client-to-network intrusion
351
Closed-circuit television (CCTV)
Command, control, and communications (C3) consoles
administrative workstations
104
identity verification workstation
105
photo identification badges
104–105
enterprise-class system
101
workstation processing power
102
Common Intermediate Format (CIF)
227,
243
Common-mode wire detectors
321
Concealed door position switch
69,
70f
Consolidated communications system (CCS)
99–100
Construction/design project
reference checking form
153
request for information form
153
contract documents phase
151
design development phase
151
Construction Specifications Institute (CSI) specification
monitoring and control system
193
system infrastructure
193
voice communications system
193
field devices contract
183
hospital-grade grounding and powering practices
194
integrated security system
183
MasterFormat title practice
184
wire and cable installation practices
194–195
integrated security system overview
190–192
interdiscipline coordination
185–186
precedence of documents
189
project engineering and provisioning
186–187
project planning and management
187
shop and field submittal
192
subsystem/system descriptions
189–190
Custom system reports implementation
346
Cutting-edge system security
353
D
business continuity management servers
352
card controls operating system
352–353
cutting-edge system security
353
user classes and authorities
352
Deauthentication attacks
350
Delay losses, multipath signal
261–262
Deluge fire sprinkler control
285
Denial of service (DoS) attacks
350
reactive electronic automated protection systems
53
Design standards development
dirty power conditions
330
NEMA and ingress protection
327–328
explosion-proof apparatus
328
earthquake considerations
332
grounding and powering
329
follow-on action response
51–52
Digital signal processing cameras
277
Digital video recorders (DVRs)
270–271
capturing and displaying of
81
digital transmission systems
adroit switch programming
86–87
line communications systems
84–85
Direct-burial coaxial cable
319
Directory service server
213,
231
Direct ring-down intercoms
109
Distributed controller systems
23
Door and gate position switches (DPS)
69
Door hardware consultant/contractor, coordination with
163
and gate operators
71,
72
with magnetic locks
71–72
Dynamic Host Configuration Protocol (DHCP)
208
E
Electrical consultant/contractor, coordination with
163–164
electrified mortise locks
128
Electronic processing components
73–75
API/NPRA risk calculation
150f
effectiveness calculation
149
fifth-generation technology
26–28
McCulloh loop telegraph-type alarm system
19–20,
20f
single-door hotel card systems
20–21,
21f
multiple business units
13
phases of construction project
150
contract documents phase
151
design development phase
151
of access control systems
21,
22f
third-generation alarm/access control system
22–23,
23f
unplanned obsolescence
28
floor-by-floor control
283
remote operation from console
283
consultant/contractor, coordination with
floor-by-floor access control
165
hall call button control
164
remote elevator control
168
parking system intercoms
109
Emerging video technologies
capacitance detectors
320
common-mode wire detectors
321
fiber-optic detectors
321
ground and short-range radar
323
intelligent video detectors
318–319
perimeter microwave detectors
319–323
pneumatic weight detectors
322
ported/leaky coax detectors
319–320
thermal video cameras
322
triangulation detectors
319
video motion detectors
317
Enterprise-class security systems
improved system performance
13
lower maintenance costs
14–15
multiple sites, monitoring of
13
uniform application, of security policies
12
Enterprise information technology systems
Erasable programmable read-only memory (EPROM)
25–26
Extreme low light cameras
277
F
Facial recognition systems
94
Facilities-driven projects
43
Fail-over servers
75,
352
Firefighting equipment
299
Fire/life safety interfaces
282–283
Fixed algorithm analytics
93–94
Four-wire intercom systems
273
Fuel management systems
287
Full-duplex intercoms
171
Full-duplex wireless mesh
92–93
G
Glass storefront doors
118
Government-driven projects
42–43
Ground and short-range radar
323
vetting alarms, for appropriate response
106
Guard/lobby desk workstations
233
Guard response assessment
52
Gunshot recognition software
285
H
Half-duplex intercoms
171
Hall effect switches
69–70
Hardware configurations
232
Homeland security, threat level
340
I
Identity verification workstation
105
Information technology consultant/contractor, coordination with
168–169
Information technology systems infrastructure
digital video, cameras and codecs
225–227
enterprise information technology systems
managing data systems throughput
230
configuring multiple image streams
245
whole system calculation
246
client/server configuration
222–223
network efficiencies, creating
223–224
Infrastructure devices
234
Integrated security systems
interdiscipline coordination
35–36
schedule management
37–38
facilities-driven projects
43
government-driven projects
42–43
new construction projects
42
renovation/retrofit projects
42
user-driven projects
43–44
Intelligent video detectors
318–319
Interference, antenna
257
Internet Protocol Security (IPSec)
350
Intrusion detection systems (IDSs)
213
IP-based integrated security systems
J
L
Landscape architect/contractor, coordination with
164
Laser transmitters and receivers
87
Leaky/ported coax detectors
319–320
alarm/access control system
268–269
analog switcher interfacing
272
multiplexer interfacing
273
server-type configurations
proprietary hardware-based
271
Legacy systems integration
77–78
back-focused in camera
95
Local area network (LAN)
236
Logic-driven decision engine
289
Long Range Acoustic Device (LRAD)™
303–304
M
field devices contract
183
hospital-grade grounding and powering practices
194
integrated security system
183
MasterFormat title practice
184
wire and cable installation practices
194–195
radio frequency communications paths
180
Magnetic stripe cards
61f
barium ferrite cards
61–62
high and low coercivity
60
Manual device addressing
208
configuring multiple image streams
245
whole system calculation
246
McCulloh loop telegraph-type alarm system
19–20,
20f
Memory hardware configurations
232
alarm/access control system
196
complete specification
198
conduit and fill schedules
197
configuration schedules
198
control and monitoring system
196
device wiring schedule
198
digital/analog video system
196
interdiscipline coordination review
198
network device configurations
197
revised construction budget
198
security intercom system
196
shop and field drawings
197
system infrastructure schedule
196
Microwave wireless systems
88
Mirrored backup servers
75
Multi-phased omnidirectional antenna
93
Multiple image streams, configuring
245
Multiplexer interfacing
273
Multi-polarized omnidirectional antenna
257–258
N
National Electrical Manufacturers Association (NEMA)
327–328
National Fire Protection Association (NFPA) Section 101
143
National Television Standards Committee (NTSC)
88
advanced network architecture
215–221
to limit network traffic
219
to segregate network traffic
219–220
Network attached storage (NAS)
232
Network communications speeds
235
New construction projects
42
O
Omnidirectional antenna
93
Open Systems Interconnection (OSI)
Operating systems and programs
232
P
Pager notification service
231
Parking consultant/contractor, coordination with
164
Passive infrared (PIR) field detectors
314
rolling grilles and operable walls
300
Perimeter microwave detectors
319–323
Phase-alternating line (PAL)
88
Phase-shift keying (PSK)
253
Photo ID workstations
233
architectural occupancy ratings
127
extruded aluminum frames
126
frameless glass opening
126
glass storefront doors
118
push bars and paddles
124
electrified cylinder locks
142
and electronic security
115
reinforced frame gates
127
physical architecture and landscaping, of facility
115
high-abuse tolerant locks
140
Physical Security Information Management (PSIM) systems
13–14,
287–289,
339
Pneumatic weight detectors
322
Point-to-multipoint connections
92
Point-to-point wireless networks
91
Power stability and reliability
262–263
high-voltage weaponry
305
usable acoustic security devices
304–305
analog
vs. digital video systems
coordinating interfaces to other systems
162
building shell/core and interiors architects
163
door hardware consultant/contractor
163
electrical consultant/contractor
163–164
elevator consultant/contractor
164–168
HVAC/building automation consultant/contractor
164
information technology consultant/contractor
168–169
landscape architect/contractor
164
parking consultant/contractor
164
specifications consultant
163
telecommunications consultant/contractor
168
drawing and specification resources
access beyond public lobby
159
camera placements and fields of view
158
codes and regulations
162
high-security area acess
160
operational environment
161
positive access control
160
public access to buildings
159
vehicular access control
158
functional and environmental needs
162
access control system placements
169–170
intercom field station placements
171
means of communication
172
Private automatic branch exchange (PABX) systems
237–238,
286
Probing/network discovery
350
Project Management Professional (PMP) process
36–37
Proprietary hardware-based server-type configurations
271
Proximity card reader
64f
long-range proximity reader
63,
67f
Mullion proximity reader
63,
66f
one-gang proximity reader
63,
65f
Public address systems
239,
287
Q
R
differ from cabled systems
258
spread spectrum systems
252
Reactive electronic automated protection systems (REAPS)
communications elements
52
electronic safety systems
307
mechanical safety systems
307
procedural safety systems
308
Reflected ceiling plan
177
Remote access services
231
Request-to-exit (REX) sensors
71,
119
S
Satellite dish transmission
91
Schedule management
37–38
Second generation electronic security systems
access control systems
21,
22f
Security monitoring/command workstations
233
access control systems
49–50
assessment and verification elements
52
direct ring-down intercoms
109
elevator and parking system intercoms
109
emergency call stations
109
network infrastructure
336
device and transmission security
348–349
Internet Protocol Security
350
directory service server
213
Single-door hotel card systems
20–21,
21f
Situational awareness software (SAS)
339
Software-based server-type configurations
271–272
Specifications consultant, coordination with
163
Spread spectrum systems
252
Standing wave ratio (SWR)
257
to limit network traffic
219
to segregate network traffic
219–220
Surface-mounted door position switch
69,
70f
Swipe card reader
63,
64f
hardware configurations
232
infrastructure devices
234
network communications speeds
235
remote access services
231
dealing with offenders
363
lessons learned session
362
operational implementations
360–362
redundant monitoring console
359
safety policy compliance
361
using archive video system
363
System resets and restores
264
T
Tagged image file format (TIFF)
225
Tape/disk, disk storage
232
Telecommunications consultant/contractor, coordination with
168
Thermal video cameras
322
Third-generation alarm/access control system
22–23,
23f
power stability and reliability
262–263
system resets and restores
264
Transportation Worker Identification Credential (TWIC) cards
66–67
operates on OSI levels 3 (IP) and 4 (TCP)
204–205
Triangulation detectors
319
Two-wire intercom systems
273
U
Uninterruptible power supply (UPS)
330
Unplanned obsolescence
28
User Datagram Protocol (UDP)
207–208
User-driven projects
43–44
V
Vending access management systems
240
Veri-Chip implantable access control credential
65,
67f
artificial intelligence learning algorithms
94
facial recognition systems
94
fixed algorithm analytics
93–94
Video guard tour implementations
338–339
Video motion detectors
317
Virtual local area networks (VLANS)
220–221
Virtual private network (VPN)
224
acoustic/glass-break detectors
316–317
W
Wide area network (WAN)
236
Wiegand wiring scheme, for card readers
61
Wireless digital communication
99
analog transmitter/receiver
88
approaches and frequencies
laser transmitters and receivers
87
microwave wireless systems
88
digital radio frequency system
89
transmission through satellite
90–91
point-to-multipoint connections
92
point-to-point wireless networks
91
wireless mesh systems
92–93
administrative workstations
104
enterprise-class system
101
workstation processing power
102
identity verification workstation
105