Bloodhound RMS Product Overview

Similar documents
VisorTrac A Tracking System for Mining

Introduction to IS-95 CDMA p. 1 What is CDMA p. 1 History of CDMA p. 2 Forms of CDMA p MHz CDMA p MHz CDMA (PCS) p. 6 CDMA Parts p.

Wireless systems. includes issues of

Installation and connection of Galileosky v4.0 tracking devices

Session Number: 13 Application of Wireless Communication for Monitoring of Critical Infrastructure

Intersystem Operation and Mobility Management. First Generation Systems

Networks of any size and topology. System infrastructure monitoring and control. Bridging for different radio networks

Chapter 14. Cellular Wireless Networks

Data and Computer Communications

TRX-300. GPS/GSM/GPRS Unit for fleet management PRELIMINARY PHOTO

DATE: 17/08/2006 Issue No 2 e-plate Operation Overview

Wireless and mobile communication

Chapter 7 GSM: Pan-European Digital Cellular System. Prof. Jang-Ping Sheu

An Introduction to Wireless Technologies Part 2. F. Ricci

WHITEPAPER. A comparison of TETRA and GSM-R for railway communications

Above All. The most sophisticated unit for tracking containers in real time for security and management.

IS-95 /CdmaOne Standard. By Mrs.M.R.Kuveskar.

Digital Surveillance Devices?

TRBOnet 5.1 New Features

MOBILE COMPUTING 4/8/18. Basic Call. Public Switched Telephone Network - PSTN. CSE 40814/60814 Spring Transit. switch. Transit. Transit.

Digital surveillance devices?

Development of a Real Time Trains Monitoring System:Case Study of Tanzania Zambia Railway Authority

[Kumar, 5(12): December2018] ISSN DOI /zenodo Impact Factor

Mobile Communication and Mobile Computing

Wildlife Tracking Systems

SMS Based Kids Tracking and Safety System by Using RFID and GSM

Chapter- 5. Performance Evaluation of Conventional Handoff

SETTOPSURVEY, S.L. Bofarull 14, Barcelona (Spain) Phone: (+34) Fax: (+34)

APPLICATION PROGRAMMING: MOBILE COMPUTING [ INEA00112W ] Marek Piasecki PhD Wireless Telecommunication

How to Choose a Phase Identification System

SEN366 (SEN374) (Introduction to) Computer Networks

Digital Patrol Radio PD415

Wireless and Mobile Network Architecture. Outline. Introduction. Cont. Chapter 1: Introduction

UNIVERSAL NET SERVICES

Wireless and Mobile Network Architecture

2.4 OPERATION OF CELLULAR SYSTEMS

Chapter 5 3G Wireless Systems. Mrs.M.R.Kuveskar.

TRBOnet Enterprise/PLUS

GSM. 84 Theoretical and general applications

ATB200. Datasheet. ATB200 GPRS / GPS based Fleet Management Terminal. 1


WHY italkptt? Our team of in-house software developers customize solutions to meet the specific needs of our end users.

Communication Systems GSM

ORBCOMM Machine-To-Machine (M2M)

RavTrack PC. RavTrack PC Features: RavTrack PC AVL/Tracking Software Application

ECE 476/ECE 501C/CS Wireless Communication Systems Winter Lecture 9: Multiple Access, GSM, and IS-95

Intellectual Bank Safekeeping System

Chapter 4. TETRA and GSM over satellite

Internet of Things Application Practice and Information and Communication Technology

Demonstration Experiment on Information Services Using Active RFID Reader Attached to Mobile Terminals

WIRELESS COMMUNICATION STUDY NOTES

GTBIT ECE Department Wireless Communication

ROAM System Specification Guideline Division 16520

Chapter 5 Acknowledgment:

Introduction to GSM. Introduction to GSM, page Development of GSM. History of GSM. Market situation. GSM s future development

Digital Patrol Radio PD412 Compliant with DMR standard Dual Mode Analog & Digital. Embedded RFID reader

Chapter 1 INTRODUCTION

Digital P atrol Radio PD415

Engr 1202 ECE. Clean Room Project

AFRICA WILDLIFE TRACKING TAG USER MANUAL VERSION 02

Unit 0: Brief history, present and future of the wireless communications

Becker Mining Systems

Problem. How we solve the problem.

First Generation Systems

Simoco Xd Professional Digital Mobile Radio System. The complete end-to-end DMR solution supporting both Tier II conventional and Tier III trunked

TRBOnet Guard Tour Configuration and Operation Guide

Data and Computer Communications. Tenth Edition by William Stallings

Cellular Network Interface (CNI) Models GSM18, GSM20 and CDMA18

Personal Communication System

Location Tracking. Current Technologies 1/19/2011. Not one, single technology Convergence of several technologies. Systems for

CS 218 Fall 2003 October 23, 2003

An Introduction to Wireless Technologies Part 2. F. Ricci 2008/2009

A MULTIFUNCTION SATELLITE BACKHAUL SYSTEM FOR AIRCRAFT FLIGHT TEST APPLICATIONS

Thank you for purchasing one of our Autotracking devices, this manual will show you how

10EC81-Wireless Communication UNIT-6

RED TACTON.

Wireless Cellular Networks. Base Station - Mobile Network

Free space loss: transmitting antenna: signal power P snd receiving antenna: signal power P rcv distance: d frequency: f.

UNIT- 3. Introduction. The cellular advantage. Cellular hierarchy

Chapter 11. Mobile Telephony History. Mikael Olofsson 2004

SATELLITE MONITORING OF REMOTE PV-SYSTEMS

3.1. Historical Overview. Citizens` Band Radio Cordless Telephones Improved Mobile Telephone Service (IMTS)

GSM and Similar Architectures Lesson 04 GSM Base station system and Base Station Controller

RFID- GSM- GPS Imparted School Bus Transportation Management System

3 User Equipment. UMTS Basics, Version 3.0 T.O.P. BusinessInteractive GmbH Page 1 of 15

Development of Ultimate Seamless Positioning System for Global Cellular Phone Platform based on QZSS IMES

Lecture 1 Introduction

INSTRUCTION MANUAL R.C. SYSTEMS CO. INC. WaveNet Site Survey Tool

TRMC-19 GSM/GPRS DATALOGGER. Applications. Product description. Measure and remote monitoring

Safety System For Fishing Boats To Prevent From International Border Crossing

CS6956: Wireless and Mobile Networks Lecture Notes: 3/23/2015

HF Transceiver Codan NGT SR. HF Transceiver Codan NGT SR

SAPLING WIRELESS SYSTEM

Location Planning and Verification

JSC Scientific Innovation Engineering Center Radius

Introduction to Digital Mobile Radio (DMR)

Appendix S2. Technical description of EDAPHOLOG LOGGER - Communication unit of the EDAPHOLOG System

GPS TECHNOLOGY IN COMMUNITY SERVICES

JOINT STOCK COMPANY. MULTICHANNEL RECEIVER RI-4010M (version RM ) User guide

TMR880i technical details

Transcription:

Page 2 of 10 What is Guard Monitoring? The concept of personnel monitoring in the security industry is not new. Being able to accurately account for the movement and activity of personnel is not only important from an operational point of view, but also serves to provide confidence to clients making use of the service. For the purpose of this document we will deal specifically with the use of personnel monitoring systems in the guarding industry. There are various systems available that can be used to determine whether guards are performing their patrols in a regular and timeous manner. This is done by installing check points at key locations on a site. The guard is issued with some kind of device that can gather information from these checkpoints. On his return from the patrol this information is downloaded and if any exceptions (e.g. missed a checkpoint, taking to long with a patrol etc.) occurred an alarm is raised. The checkpoints can be as simple as a box containing a key. The guard starts a timer when starting his patrol and has a key that opens the first checkpoints lock. Inside the checkpoint box is the key for the next checkpoint. The guard unlocks the box, and leaves the previous key in the box. He repeats this pattern until he reaches the end of his patrol and he stops the timer again. If he did not finish the patrol sequence in the predetermined time an alarm is raised. The next patrol is done in the opposite direction. A slightly more advanced system uses an intelligent electronic checkpoint that is identified with a unique electronic identification number. The guard is issued with a reader that can read the checkpoint information and this data is stored on the device carried by the guard. On completion of his patrol the guard can download this information to a computer and this allows for reporting and alarms on exceptions. Both system described above relies on the fact that the guard returns to his post within a prescribed amount of time. A need has been identified for the development of a cost effective real-time personnel monitoring system that can give an indication in real time as to the last known position of a guard as well as being able to raise an alarm during a patrol if something is wrong.

Page 3 of 10 Bloodhound RMS Real-time Resource Management The Bloodhound RMS system uses the combination of established existing technologies to create a real-time personnel monitoring environment. Key Technologies Used We will briefly look at the key technologies used to give a better understanding of how the system works. GSM / GPRS What is GSM? Global System for Mobile communications (GSM) is the most widely used digital mobile phone system and the de facto wireless telephone standard in Europe. Originally defined as a pan-european open standard for a digital cellular telephone network to support voice, data, text messaging and cross-border roaming. GSM is now one of the world's main 2G (second generation) digital wireless standards. GSM is present in more than 160 countries and according to the GSM Association, accounts for approximately 70 percent of the total digital cellular wireless market. GSM is a time division multiplex (TDM) system. Implemented on 800, 900, 1800 and 1900 MHz What is GPRS? General Packet Radio Service (GPRS) is a mobile data service available to users of GSM mobile phones. It is often described as "2.5G", that is, a technology between the second (2G) and third (3G) generations of mobile telephony. It provides moderate speed data transfer, by using unused TDMA channels in the GSM network.

Page 4 of 10 Active RFID What is Active RFID? Radio Frequency Identification (RFID) technology is used to automatically identify objects or people using RFID tags. A RFID tag is a small electronic device that can be attached to or incorporated into a product. RFID tags include a chip that stores an ID and an antenna that enables the chip to transmit the stored ID to a reader. Typically RFID tags are classified in 2 categories: Passive RFID tags do not have a power source. When the tag comes within range of the reader, the tag is powered by the reader s RF Field and transmits its ID to the reader. Active RFID tags have a battery and constantly transmit its ID at pre-programmed intervals. This increases the read range of active tags. Typically active tags can also hold more data and be reprogrammed for different uses.

Page 5 of 10 GPS What is GPS? An acronym for: Global Positioning System. It is a method to determine geographical coordinates and local time coordinate on Earth using calibrating signals from a network of satellites. It is based on the knowledge of the orbits of the satellites and the measured phase shifts of their signals at the receiver. The precision of this measure is of ~100m in position and ~1µs in time. Detailed system description The Bloodhound RMS, personnel monitoring system uses a combination of the above technologies to track the movements of personnel in real-time. This system consists of the following components: Checkpoints Active RFID Tags are used as checkpoints in this system. Tags are distributed in strategic locations on a site. The tags have their own power source and transmit their unique identification code at pre-programmed intervals. The system software links the tags identification number to a physical location. Tags are also carried by personnel. This allows the system to link a person to a specific location.

Page 6 of 10 Handheld The Bloodhound handheld is a mobile device that can be worn on a belt clip. The device contains the following components A RFID reader enabling it to read the tag information A GSM Transceiver enabling it to transmit the tag information via the internet using TCP/IP as well as receiving data from the host server. A microprocessor for processing tag and other information Rechargeable batteries Belt clip and holster

Page 7 of 10 System Software The system software provides a visual representation of guard movements and identity in real time. It also provides a means of managing sites to be monitored; patrol schedules and provides management reports on real-time and historical data. The information is available from anywhere in the world via the internet. Tags are placed at strategic locations around a site (as indicated on the adjacent map). These tags are linked location icons on the software mapping interface to show the physical location of the tag. A Tag is also assigned to a specific guard. The Bloodhound reader will be carried (on the belt) by individual guards. The moment the Bloodhound reader enters a tag location area, the reader identifies the location tag and simultaneously searches for guard tags in-range. This information gets sent through to the central database. On the user interface side, a guard icon appears at a specific location on the mapping screen, indicating that the guard(s) is at present location. The system software (client application) is an executable program that is installed on the user s computer. This program gives the user access to the on-line web server from anywhere in the world via the internet. The security structure of the software ensures that user s only have access to the information defined for their security profile. That means that a site manager might only be able to view live and historic information for his particular site. A regional manager could for example have access to information from all the sites in his region. All system setup and support functions can be performed remotely.

Page 8 of 10 Network and Communication Infrastructure The system uses established network infrastructure and protocols making it a very cost effective system that can be monitored in real-time from anywhere in the world. As a person walks around on a particular site the handheld will read the tag information of the person and the checkpoints. Basic processing on the handheld ensures that only the necessary information is transmitted via the internet using the GSM transceiver on the handheld. This information is stored in a database located on a web server that is accessible from anywhere in the world. This information accurately represent personnel movement on a site in real-time. It is also possible to send specific instructions to anybody that will be displayed on the handheld. If the handheld is equipped with a GPS this information will also be transmitted with the personnel and checkpoint information. By using the existing GSM network (data is sent using GPRS) and the internet it is possible to deploy and control this system anywhere in the world where there is GSM coverage. Provision has been made for a tri-band unit to allow for operation in the United States of America.

Page 9 of 10

Page 10 of 10 Advantages of Bloodhound RMS Information relating to personnel movements are transmitted in real-time as they occur Real-time information is available from anywhere in the world No limitations to the size of a particular site to be monitored No specific start and end point is required for a patrol (although the system provides for scheduled patrols) No base unit or infrastructure is needed and the system can therefore be installed easily in remote locations without any power etc. System can determine the amount of time that a person spends in a particular area Checkpoint does not need to be visible and therefore personnel will never know when or where they are being monitored System allows for messages to be sent to any user out on patrol Locations (tags) and personnel (readers) can be mobile. This allows the system to report on locations and any other personnel carrying identification tags No specific action is required from personnel System is able to monitor more than just security gaurds (e.g. cleaners, maintenance personnel etc.)