Electronic Security Solutions - ESSolution

Electronic Security Solutions

When we talk about electronic security we think about cameras, ring, and access control, and that's it. No, this idea is far away from reality, at ED&TD® we take the concept further, and we include in the design of the solution engineering that provides real time control and a high level of cyber security, creating two concepts, viz:

  1. Electronic Security in Passive Mode (ESPM®)
  2. Electronic Security in Active Mode (ESAM®)

Before we explain these concepts to you, we need to talk about what the components of an Electronic Security solution (ESSolution) are.

We also need to talk about how our engineers design an ESSolution.

After reading them you will understand why ED&TD® is your best option when you decide to implement an electronic security solution for the SoHo environment. Residential sector, don't worry, these concepts apply to you too.

Okay, let's start with the journey »

Our Customers Comments


Components of an Electronic Security System

Components of an Electronic Security System

A well-designed ESSolution, regardless of the vendor, has 8 components or called too subsystems. These are:

  1. Subsystem 0 - Power Supply and Cabling Infrastructure
  2. Subsystem 1 - Network Infrastructure
  3. Subsystem 2 - Data Storage Infrastructure
  4. Subsystem 3 - Monitoring Infrastructure
  5. Subsystem 4 - Real-time control capabilities and high-level cybersecurity layer
  6. Subsystem 5 - Display Mode
  7. Subsystem 6 - Network Operation Center (NOC)
  8. Subsystem 7 - Telecommunication Room (TR)

ESSolution

Our Customers Comments


Subsystem 0 - Power Supply and Cabling Infrastructure

Subsystem 0 - Power Supply and Cabling Infrastructure

The ESSolution is a dedicated service, such as a fire alarm system that can never fail, where the branch circuit shall not supply other loads. NEC - Article 760.121 (B).

The above article, along with the articles 800, 805, 810, 820, 830, and 840 of the NEC, was our starting point when we designed the ESSolution, and per se it's the definition of the first subsystem, which we called Subsystem 0 - Power Supply and Cabling Infrastructure.

This subsystem is integrated for the following elements:

  • Dedicated Branch Circuit from Main Panel.
  • Grounding Electrode System.
  • Rack.
  • Raceway.
  • Cabling.
  • Junction and Connection Boxes.
  • Final Junction Boxes.

The Subsystem 0 is designed and implemented in accordance with the NEC, the Structured Cabling Methodology, and the Telecommunications Industry Association ANSI/TIA-568 standards for telecommunications cabling in commercial buildings.

Components of an Electronic Security System


Subsystem 1 - Network Infrastructure

Subsystem 1 - Network Infrastructure

All of the devices and equipment needed to connect the monitoring devices to the data storage devices, such as the router, switch, access point, radios, and other specific equipment, integrated the Subsystem 1 - Network Infrastructure.

This subsystem includes all tasks required for network design and the implementation of the high-level cybersecurity layer.

Components of an Electronic Security System


Subsystem 2 - Data Storage Infrastructure

Subsystem 2 - Data Storage Infrastructure

There are three information storage technologies, namely:

  1. NVR - Network Video Recorder, works with surveillance equipment.
  2. SVR - Server Video Recorder, works with whole spectre of Monitoring Infrastructure.
  3. CVR - Cloud Video Recorder, it's a service provided by third party vendor, and usually works only with surveillance equipment.

The above mentioned technologies are designed to communicate over a network.

Also, you may have heard about DVR - Digital Video Recorder, our Monitoring Infrastructure doesn't work with this technology because it is very old.

Components of an Electronic Security System


Subsystem 3 - Monitoring Infrastructure

Subsystem 3 - Monitoring Infrastructure

Monitoring Infrastructure is all the devices and equipments needed to surveillance, monitoring and control the requirements of our customers.

  • The surveillance equipment are: Cameras, Doorbell, and Ring.
  • The monitoring devices are: Access Control.
  • The control devices are: Sensors, Transducers, and Actuators.

Each devices and equipmets have differents features that integration when our engineers design specific ESSolution.

The ability to communicate over a network is the most important feature of these devices and equipments.

Components of an Electronic Security System


Subsystem 4 - Real-time control capabilities and high-level cybersecurity layer

Subsystem 4 - Real-time control capabilities and high-level cybersecurity layer

We have arrived at the core of our journey.

Depending on the customer needs when our engineers design a specific ESSolution they take the features of each spectre of Monitoring Infrastructure and integrate & make hardware, firmware and software in the specific ESSolution that will provide the perfect solution to our customer requirements.

Based on the features of the Monitoring Infrastructure, our engineers can to do something like turn on a flood light array when something crosses the intrusion area, play a message when something crosses the set tripwire line, and other specific actions. The 'something' can be an animal, a person, a vehicle or anything else.

When we talked above about of other specific actions or what our engineers can do, we were referring to triggering an event or being alerted anytime whenever a specific action occurs that we need to control.

So if you need to control certain events, you need to be able to do it in real time.This is it. And that premise is called Real-time control capability.
Subsystem 4 - Real-time control capabilities and high-level cybersecurity layer

Now, the Monitoring Infrastructure has the ability to communicate over a network. This feature is a strength of our ESSolution but it is also our Achilles' heel. Let me explain:

When you connect any device or equipment to a network, you have a cyber breach. Why is that? Your device or equipment can be hacked, in the best cases it will generate fake alerts, but in the worst case it will not generate alerts to facilitate a robbery, or the hacker can download files like videos and photos and sell them on the dark web. This Achilles' heel is the reason why our engineers implement a High-level Cybersecurity Layer in the design of an ESSolution.

When we started this journey, we talked to you about two concepts, remember?.

These concepts are the result of this Subsystem 4 - Real-time control capabilities and high-level cybersecurity layer, because each concept have High-level Cybersecurity Layer and based on the Real-time control capability, our engineers implement one or another concept when designing the ESSolution.

All right, the concepts:

  1. Electronic Security in Passive Mode (ESPM®)
  2. Electronic Security in Active Mode (ESAM®)

Components of an Electronic Security System


Electronic Security in Passive Mode (ESPM®)

Subsystem 4 - Real-time control capabilities and high-level cybersecurity layer

Based on video surveillance, motion detection, access control, and smoke sensors, the ESPM® concept is the integration of these elements into a single control application.

We have an ESPM® solution. Read more about it …

Subsystem 4 - Real-time control capabilities and high-level cybersecurity layer


Components of an Electronic Security System


Electronic Security in Active Mode (ESAM®)

Subsystem 4 - Real-time control capabilities and high-level cybersecurity layer

The ESAM® concept implements the EAR™ principle. This means:

Event -> It is defined as the action that disturbs the security of the area, sector, or zone under surveillance. In other words, it is the condition that triggers a final response. i. e: When a person, animal, vehicle or anything else crosses the set tripwire line or intrusion area.
Analatics -> It is the process of considering the impact level over the monitored area. Each event versus impact has a value called weighting, which is a stochastic process that provides a specific response. This process translates into an algorithm that must be encoded and encrypted using the same logic as the Monitoring Infrastructure it is being applied to. This algorithm implements several techniques, namely:
  1. Digital image processing for facial recognition.
  2. Comparison patterns from digital speech processing.
  3. Biometric recognition algorithms.
  4. Matching patterns from digital input.
  5. Among others...
Response -> It is the action that is taken in response to the event.
Subsystem 4 - Real-time control capabilities and high-level cybersecurity layer

In essence, the EAR™ principle is an algorithm that our engineers design and codify according to customer needs.

For example, in this case (image on the right), when the camera sensor detected one or more people at the pool edge, the algorithm triggered three alarms, one on the loudspeakers in the pool area, the second on the monitor in the NOC, and the last in the app.

Let us show you in detail how the EAR™ principle works in this case:

Event: One or more people at the pool edge.
Analitics: The pool edge is defined as a tripwire line. In this context, when the tripwire line is triggered, a comparison process determines the distance between the pool edge and the each person, assigning a unique value to each distance, this value is called weight. This weight is used by a risk scale to make a decision about the specific situation.
Response: In this case, the risk is higher, so the response triggered three alarms, one on the loudspeakers in the pool area, the second on the monitor in the NOC, and the last in the app.

In the example above, the camera has an AI feature, so the algorithm was coded and encrypted using AI.

We have an ESAM® solution. Read more about it …

Subsystem 4 - Real-time control capabilities and high-level cybersecurity layer


Components of an Electronic Security System


Subsystem 5 - Display Mode

Subsystem 5 - Display Mode

Ability for multiple devices and multiple user accounts to view the area, sector, or zone being monitored and the surveillance, is called Subsystem 5 - Display Mode.

  • Devices from which you can view monitoring or surveillance:
    1. TV
    2. Screen monitor
    3. Cell Phone
    4. Tablet
  • Each ESSolution supports from 1 to 15 user accounts.
  • Each user account can easily be logged on to any device at the same time.

Devices, user accounts, and logon capabilities are the hallmarks of this subsystem.

Components of an Electronic Security System


Subsystem 6 - Network Operation Center (NOC)

Subsystem 6 - Network Operation Center (NOC)

Network Operation Center - NOC, such as Subsystem 6, is the heart of the solution once implemented.

The NOC complies with Subsystem 0 - Power Supply and Cabling Infrastructure, Subsystem 1 - Network Infrastructure, Subsystem 2 - Data Storage Infrastructure, and Subsystem 5 - Display Mode.

We identify each subsystem in the image at right:

Once ESSolution is deployed, you can monitor the entire solution from the NOC.

Components of an Electronic Security System


Subsystem 7 - Telecommunication Room (TR)

Subsystem 7 - Telecommunication Room (TR)

Subsystem 7 - Telecommunication Room (TR) is a helper subsystem for Subsystem 0 - Power Supply and Cabling Infrastructure, implemented when the Subsystem 0 - Power Supply and Cabling Infrastructure requires backbone cabling in your implementation.

Subsystem 7 - Telecommunication Room (TR) complies with Subsystem 1 - Network Infrastructure and Subsystem 0 - Power Supply and Cabling Infrastructure.

The image on the left shows the rack containing the switch, surge protector, path panel, and other network devices, power and cabling infrastructure.

Components of an Electronic Security System


Our Customers Comments

  • By Jacqueline Lopez

    One of the best investments in my life is the home system cameras. I travel a lot so I can monitor my house from different countries anytime. In November 2021 I had visitors from NYC and they parked their car on the street instead of my driveway. So when they were leaving the car disappeared, they thought their car was stolen but I doubt it. I went to see the recording in the cameras and noticed the tow truck took the car at 2:30 am and I could pause and zoom in to see the name of the company. I googled it and found out the company info. They recuperate the car in less than 2 hours. I am so glad to have cameras and see what's going on anytime.

Write A Comment or Request An Appointment For Check Your Next Smart Home Project...

ESSolution