Sunteți pe pagina 1din 17

PROJECT REPORT ON SECURITY SYSTEM AT NEW

DELHI RAILWAY STATION


Acknowledgement

I would like to extend my heartfelt thanks and regards to our


mentor, Mr. Yograj, SSE/ Tele/ P/ SW, for his valuable time
and guidance.

I am also grateful to the Indian Railways for providing me


with a platform and infrastructure to carry out the required
research work.

I would like to convey my best wishes and regards to fellow


trainees.

I also acknowledge the constant motivation and support of


my family and friends.

INDEX

S.No. Contents Page Remarks


No.
1. Integrated Security
System at Indian
Railways
2. CCTV: Closed Circuit
Television
i) Purpose
ii) Advantages
iii) Types of Camera
3. Server Room and
Control Room
4. OFC, Cat-6, Switch,
RAID
5. Internal and External
Storage
6. CCTV System at New
Delhi Railway Station
7. Software Systems

Integrated Security System at Indian Railways


Purpose: According to Zonal Railways, 202 stations have been identified as sensitive for
the purpose of installation of an Integrated Security System (ISS) to strengthen
surveillance mechanism at these stations. ISS comprises of Close Circuit Television
(CCTV) Cameras, access control, personal and baggage screening system and bomb
detection and disposal system.
Following are the four key components of a successful integrated security system:
1. Video surveillance: Surveillance is the priority for any integrated solution. For most of
the customers, IP cameras will be one of the core aspects of their overall system, with
other devices, such as access control and intruder alarms, acting as a complement to the
power of video surveillance.

2. Access control: Access control is also vital in most facilities. In a fully integrated
system, each subsystem helps the others work even more effectively, increasing the
overall level of security. For example, access control and video surveillance can be used
together in order to record video of every failed or suspicious access attempt, providing
greater insight than either system could on its own.

3. Vendor-neutral standards and protocols: True integration can only be achieved using
technology that follows established standards and protocols. The industry-wide push for
greater integration and the influx of IP technology have heralded a growing acceptance of
standards such as ONVIF.

4. Centralized control: In order to tie each component of a security system together,


centralized control software is a must-have. These platforms enable the customers to
manage and view all aspects of their security system through one user interface.
For customers with both video surveillance and access control, centralized command-
and-control software provides a higher level of control and visibility. For example, end
users can view live and recorded video and entry/exit logs, all through one user interface.

CCTV: Closed-circuit television


Purpose: CCTV equipment may be used to observe parts of a process from a central
control room, for example when the environment is not suitable for humans. CCTV
systems may operate continuously or only as required to monitor a particular event. A
more advanced form of CCTV, utilizing digital video recorders (DVRs), provides
recording for possibly many years, with a variety of quality and performance options and
extra features (such as motion detection and alarm alerts). More recently, decentralized IP
cameras, some equipped with megapixel sensors, support recording directly to network-
attached storage devices, or internal flash for completely stand-alone operation.
At present, Close Circuit Television Cameras (CCTV) have been installed at 344 railway
stations over Indian Railways.
Objective: Prevention and detection of crime, registration of cases and their investigation
over Railways is the statutory responsibility of States which is being discharged by using
CCTVs through the Government Railway Police (GRP).

Closed-circuit television (CCTV), also known as video surveillance, is the use of video
cameras to transmit a signal to a specific place, on a limited set of monitors. It differs
from broadcast television in that the signal is not openly transmitted, though it may
employ point to point, point to multipoint, or mesh wired or wireless links.

Advantages
Following are the advantages of using CCTVs at Railway Stations:
 Crime Prevention
 Timely registration of cases
 Speedy investigation
 Inter-State coordination among GRPs of respective States
:

Security Cameras:
The security cameras of a CCTV system are a vital component. There are many different
security cameras that are designed to support different applications and mounting option,
and it is up to us to choose the security camera that best supports our installation
requirements

Following are the different types of security cameras:

1. Box Camera: It is a standalone camera. The name is derived from the shape of the
camera.
Features:
Functions like any other camera.
Can be used in Outdoor Environmental Housings or for Indoor mountings.
Benefits:
Allows for customization of the lens, camera and housing to fit the needs of the
installation; offers many lens options, including vari-focal and fixed
.
2. Dome Security Camera: It is a combination of camera, lens and ceiling mount
packaged in a single dome.
Features:
Functions like any other camera but comes in a dome-shaped housing.
Is well-suited for environments that tend to get dirty, like kitchens and warehouses.
Typically available in indoor or outdoor housings.
Benefits:
Aesthetically pleasing / compact in appearance.
Available in vandal-resistant housings

Dome Security Camera

3. PTZ Security Camera: A PTZ camera contains mechanical controls that allow the
operator to remotely pan, tilt, and zoom the camera.
Features:
Pan, Tilt and Zoom features.
Control movement via joystick or software.
Can automatically run patterns or turn to a preset position.
Benefits:
Focuses on areas of interest.
Auto Track movement.
Survey a wide area of interest and zoom in to detail

4. Bullet Security Camera: A bullet camera is a combination of camera, lens, and


housing packaged in a bullet-style body.
Features:
Commonly includes IR illuminators.
Sealed enclosure decreases need for servicing.
Small footprint.
Benefits:
Requires no separate housing or lens.
Good for low-light situations

5. IP Security Camera: An IP camera transmits a digital signal using Internet Protocol


over a network.
Features:
Increased resolution and scalability
Many have built-in video analytic software.
Benefits:
Better system management than analog cameras.
Resolutions from VGA to 29 Megapixel.

6. Day/Night Security Camera: A camera used indoor and outdoor for environments
with low light conditions.
Features:
IR filter that is lifted as lighting levels decrease.
Benefits:
Handles both day and night-time lighting situations.

7. Thermal Security Camera: A thermal camera uses thermal imaging to produce


surveillance footage in dark or harsh environments. It uses heat to differentiate
objects.
Features:
Uses heat sensing to distinguish objects and people.
Benefits:
Detect people and objects in smoke, dust, light fog; Works in complete darkness.

8. Wide Dynamic Security Camera: Wide Dynamic Cameras have the ability to
balance light-levels on a pixel-by-pixel basis.
Features:
Capable of handling a wide range of lighting levels in the same scene.
Benefits:
Capture clear face shots when a people are entering with bright light behind them
and with dark shadows on their faces.
Used in areas with too much sunshine or where headlights are used, such as
parking lots.

9. Wireless IP Camera: Wireless IP security cameras offers ease of installation and


eliminates the cost of network cabling when adding this camera to your video
surveillance system.
Features:
Wi-Fi enabled for easy installation and setup.
Tilting and swivel options to maximize viewing.
Benefits:
Motion detection for instant alerts of intruders.
Crystal clear images, even in low light conditions.

Security DVR:
The security DVR is the heart of a CCTV system. This is where the video captured by
the security cameras is recorded, stored, and managed. The security DVR will come with
software pre-loaded that gives the freedom to manage and configure each security
camera individually. Every security camera will have to be cabled back to the security
DVR. Security DVR’s are available in 4, 8, and 16 channel configurations, and each
security camera will attach to its own channel.

Server Room: A server room is a room used to store, power and operate computer servers
and their associated components. This room is part of a data center, which typical houses
several physical servers lined up together in different form factors, such as rack mounted,
or in tower or blade enclosures.
A server room provides the operational and environmental components and services to
operate enterprise class servers. Generally, a server room might include 10 to several
hundred servers. The servers housed in a server room usually include basic CPU
components and lack any display or input device. They can all be centrally accessed and
managed through a server administrator system, which is typically found outside the
server room.

Server rooms are primarily used for executing enterprise applications that require
massive computing resources at run-time, such as banking software, search engines or
social networking applications. A server room is designed to provide a continuous and
redundant supply of electrical power, backup/alternate power, lighting and air
conditioning, and is monitored by one or more server administrators. Moreover, server
rooms tend to include protections against earthquakes, fires and other natural disasters,
and should be designed to accommodate expansion.
Block diagram of Server Room and Control Room

Control Room: New technology is now allowing operators to oversee larger areas and
also supervise multiple systems for their business. This includes CCTV, access control,
and vehicle tracking all from one workspace. These rooms can be fast paced
environments, often used for long shifts at both day and night.
OFC: An Optical Fiber is a long, thin flexible fiber with a glass core through which light
signals can be sent with very little loss of strength.
OFC consists of core, cladding, buffers and jacket:

Specifications of Optical Fiber Cable used in Indian Railways:


OFC Network diagram

CAT-6 Cable: Category 6 is an Ethernet cable standard defined by the Electronic


Industries Association and Telecommunications Industry Association ((EIA/TIA). CAT
6 is the sixth generation of twisted pair Ethernet cabling, which is used in home and
business networks. CAT 6 cabling is backward compatible with the CAT 5 and CAT 5e
standards that preceded it.
Category 6 cables support Gigabit Ethernet data rates of 1 gigabit per second. They can
accommodate 10 Gigabit Ethernet connections over a limited distance—164 feet for a
single cable. CAT 6 cable contains four pairs of copper wire and utilizes all the pairs for
signaling in order to obtain its high level of performance.

Other basic facts about CAT 6 cables:


 Ends of a CAT 6 cable use the same RJ-45 standard connector as previous
generations of Ethernet cables.
 Printing along the length of the cable sheath identifies it as CAT 6.
 An enhanced version of CAT 6 called CAT 6a supports up to 10 Gbps speeds.

Switch: Layer 2 switches are frequently installed in the enterprise for high-speed
connectivity between end stations at the data link layer. Layer 3 switches are a relatively
new phenomenon.

Layer 2 Switches (Single Broadcast Domain): Bridging technology involves


segmentation of local-area networks (LANs) at the Layer 2 level. A multiport bridge
typically learns about the Media Access Control (MAC) addresses on each of its ports
and transparently passes MAC frames destined to those ports. Layer 2 switches
effectively provide the same functionality. They are similar to multiport bridges in that
they learn and forward frames on each port.
The major difference is the involvement of hardware that ensures that multiple switching
paths inside the switch can be active at the same time.

Layer 3 Switches (Multiple Broadcast Domains): Layer 3 switches are superfast routers
(perform switching as well as routing) that do Layer 3 forwarding in hardware and
additional routing steps are avoided. It uses IP addressing. Unlike routers, Layer 3
switches don’t have WAN ports and can be used only within LANs.

Combined Layer2/Layer3 Switch connecting directly to the Internet

Internal Storage – DVR, SD Memory Cards, USB Flash Drives


While using an internal storage device, real-time analysis of surveillance footage can
be conducted. It is possible to respond promptly in case of a security breach. Internal
storage units are faster than external storage devices since once they are installed; they
become a part of the overall security system. Any captured footage can be downloaded
and uploaded quickly.
External Storage – External Hard Drive
An external storage device is typically connected to a security camera system and
computer through a USB cable and is easy to set up. Some of these devices may require
software installation or compatible drivers for them to work. Most users prefer using
external hard drives since they offer a larger storage capacity and are available in
different storage sizes. Video surveillance cameras record footage of larger sizes; thus,
requiring massive storage space. Considering the amount and size of captured media
files, external hard drives become the most viable storage option. They are also portable
and durable.

RAID (redundant array of independent disks; originally redundant array of inexpensive


disks) is a way of storing the same data in different places on multiple hard disks to
protect data in the case of a drive failure.
RAID works by placing data on multiple disks and allowing input/output (I/O) operations
to overlap in a balanced way, improving performance. Because the use of multiple disks
increases the mean time between failures (MTBF), storing data redundantly also
increases fault tolerance.
RAID arrays appear to the operating system (OS) as a single logical hard disk. RAID
employs the techniques of disk mirroring or disk striping. Mirroring copies identical data
onto more than one drive. Striping partitions each drive's storage space into units ranging
from a sector (512 bytes) up to several megabytes. The stripes of all the disks are
interleaved and addressed in order.

In a single-user system where large records, such as scientific images, are stored, the
stripes are typically set up to be small (perhaps 512 bytes) so that a single record spans all
the disks and can be accessed quickly by reading all the disks at the same time.
In a multiuser system, better performance requires that we establish a stripe wide enough
to hold the typical or maximum size record. This allows overlapped disk I/O across
drives.

PC Workstation: It is a computer designed for technical or scientific applications.


Workstations are more powerful and higher in performance than desktop computers,
especially with respect to CPU and Graphics, memory capacity and multitasking
capability.
CCTV System at New Delhi Railway Station

The details of Item installed at NEW DELHI station as given below:


Software Systems:
Depending on scale and complexity, the spectrum of software systems can span from
operating systems for devices to large networked systems that consist of thousands of
servers.
System quality such as reliability, performance and security, is the key to success of
modern software systems. As the system scale and complexity greatly increase, larger
amount of data, e.g., run-time traces and logs, is generated; and data has become a critical
media to monitor, analyze, understand and improve system quality.

Client/ Server: Client/server methodology and architecture offer a versatile approach to


the development and deployment of software for major computer applications critical to
strategic planning and enterprise operations. Maintenance information systems and
computerized maintenance management systems (CMMS) for larger plants fall into this
critical software category. Client/ Server architecture generally applies to a software
architecture in which functions are split into independent tiers of collections of “services”
and “requesters” on a single computer or several computers.

Analytic Software: Data analytics (DA) is the process of examining data sets in order to
draw conclusions about the information they contain, increasingly with the aid of
specialized systems and software. Data analytics technologies and techniques are widely
used in commercial industries.

Important Features of Analytics Software


 Mobile Access
Analytics software should allow you to access information from any device,
anytime, anywhere.
 Dashboards
A central dashboard that's customizable and automatically updated can keep
everyone in the organization informed and aware of how critical business areas are
performing in terms of specific figures and scorecards.
 Drill Down and Roll Up
It should also allow usto quickly and easily apply filters to view particular subsets
of data, such as only sales in the Midwest or purchase history from a particular
vendor.
 Flexible Data Sources
This could be payroll or accounting systems, CRM, ERP, and even desktop
databases or spreadsheets that can provide value to your analytics.
 Service Call Reporting
This ensures a level of transparency that can be used to train customer agents,
whether using full-time staff or volunteers.
 Versatility
With a well-rounded set of features, we can rely on our analytics software to make
informed decisions that will lead to a more streamlined business environment.

S-ar putea să vă placă și