Using both fiber optic and radar technology fiber sensys provides the best solution.
Fiber optic cable intrusion detection.
Fiber optic perimeter intrusion detection system fo pids fo pids is designed and developed using the cutting edge sensing technology which utilizes optical fiber cable ofc as the major field sensing component.
A fiber optic intrusion detection system also known as optical fiber perimeter intrusion detection system can be used to protect sensitive and valuable sites of any kind.
A fiber optic intrusion detection system can be considered one of the best solutions for sites and targets for both theft and terrorism these spaces usually protected with perimeter fencing can be further implemented in.
Using its two sensor channels fp1150 supports a cut immune configuration.
The system is conceived to protect the perimeter of an.
Cost effective and flexible.
Connecting by network additional controllers provide unlimited cover.
If fiber optic cable is being installed with the pipeline using some of the fibers to provide leak and intrusion detection is done at minimal additional cost.
Consider a facility where one or more portions of a perimeter border an area of dense vegetation such as a forest.
In this paper we report the in field demonstration of an intrusion detection system implemented using fiber bragg grating fbg sensors.
Physical layer 1 data security.
The fiber optic sensor is immune to lightning and emi and requires no conductive components or grounding points in the field.
The use of optical fiber makes fo pids distributed and passive in nature which is a significant advantage in the security and.
Fiberpatrol fp1150 is a perimeter intrusion detection system that can be fence mounted buried or deployed in a wall top configuration.
A fiber optic cable for ground movement detection is more specialized.
Using fiber optic cable for intrusion detection is not inexpensive so when might it be appropriate.
By co locating our sensor with data fibers we can detect disturbances created when an intruder tries to tap or compromise the data cables with malicious intent or by accident.