PM-ENG-089 FD7104 User Manual Rev H
PM-ENG-089 FD7104 User Manual Rev H
Rev H
1 Introduction 1
2 Safety information 3
2.1 Safety Terms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
2.2 Electrical Safety . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
2.3 Covers and Panels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
2.4 Inspection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
2.5 Laser Radiation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
2.6 Fiber Handling Precautions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
2.7 FCC rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
3 Principles of Operation 5
3.1 Optical Fiber . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
3.2 FD7104 and Reflective System Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
3.3 A Note on Measurements in dB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
3.4 Types of Fiber Optic Connectors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
3.5 Fusion Splicing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
3.6 Cleaning Fiber Optics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
6 User Interface 23
6.1 Connecting to Your APU and Login . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
6.2 Dashboard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
6.3 Cable Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
6.4 Networking and Relays . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
7 System Calibration 47
7.1 Goals and Outline . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
7.2 Calibration Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
9 Installation 57
9.1 Installing the cable assembly . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
9.2 Converting a FD3xx installation to a FD7104 installation . . . . . . . . . . . . . . . . . . . . . . . . 69
11 Maintenance 77
13 Troubleshooting 83
13.1 Backup and Restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
13.2 Cable Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
13.3 Test Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
13.4 Final Scan Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
13.5 Repairs and Modifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
13.6 Zone Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
13.7 Detection Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
13.8 Make Recordings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
14 Specifications 89
15 Parts list 91
16 Glossary 95
Index 99
ONE
INTRODUCTION
The FD7104 alarm processing unit (APU) is a fiber optic sensor designed to detect potential intruders that are trying to
breach a perimeter. The APU is capable of detecting multiple simultaneous disturbances along a protected perimeter.
One APU can monitor up to 4 different sensing cables (zones), with a maximum total cable length of 3200m (800m per
zone).
The FD7104 detects intruders using a fiber optic sensor that is deployed on the perimeter. For perimeters with chain-link
fencing, the fiber is installed inside conduit that is tied to the fence with stainless steel wire ties. The sensing fiber can also
be deployed on decorative metal fences, cement walls, etc. The fiber optic sensor works by measuring modulated laser
radiation that results from intruders who vibrate the structure to which the fiber is attached. When the FD7104 detects
intruders, it sends alarm messages to a head end, and can also switch relay contacts that can be used to manage lights,
cameras, audible alarms, etc.
Because the APU relies only on laser light for sensing, which is intrinsically inert, the FD7104 sensing cable can be
installed safely at chemical or ammunition depots, or any location where the use of electricity is a concern. In addition,
fiber optic technology is immune to EMI/RFI. The remote capability of the FD7104 APU allows it to be installed up to
five kilometers away from the sensing zones.
Figure 1.1 shows the front of the FD7104. The front of the APU has indicator lights that provide information about the
APU’s status. See Alarm Processing Unit Front Panel for more information.
TWO
SAFETY INFORMATION
This section contains information to help ensure safety and the proper operation of the equipment. Please follow these
instructions carefully, and keep them accessible, for future reference. Whenever using the FD7104 use only attachments
and accessories that have been specified by Fiber SenSys and refer all servicing to qualified personnel.
Warning: Denotes an important piece of information that can prevent injury by user.
Caution: Denotes and important piece of information that can prevent product damage.
Note: Denotes an important piece of information that will be crucial in properly operating the product but may not
damage the product or pose any safety hazards.
If the FD7104 is damaged or malfunctions, disconnect power to the APU. Do not use the APU if any of the following
conditions exist:
The APU is damaged. The APU does not operate as expected. The APU has been subjected to prolonged storage under
adverse conditions.
Do not put the APU into service until qualified service personnel have verified its safety.
There are no user serviceable parts inside the APU. To avoid personal injury, do not remove any of the APU’s covers or
panels. The product warranty is void if the factory seal is broken. Do not operate the product unless the covers and panels
are installed and seals intact.
2.4 Inspection
The APU should be inspected for shipping damage. If any damage is found notify Fiber SenSys and file a claim with the
carrier. Save the shipping container for possible inspection by the carrier.
The FD7104 APU is a Class I laser product, as defined by IEC 60825-1 and CRF 231 subchapter J. A Class I laser emits
insufficient light to constitute a hazard. However, avoid direct eye exposure to the output of this product or to the open
end of any optical-fiber connected to this product.
Warning: Optical fibers are made of glass, and the ends of broken fibers can be sharp and may become lodged in
the skin. Take appropriate handling precautions.
Note: This equipment has been tested and complies with the limits for a Class B digital device, pursuant to Part 15 of
the FCC rules. These limits are designed to provide reasonable protection against harmful interference in a residential
installation. This equipment generates, uses, and can radiate radio-frequency energy. If the equipment is not installed and
used in accordance with the instructions, it may cause harmful interference to radio communications. However, there is
no guarantee that interference to radio or television reception, which can be determined by turning the equipment off and
on, the user is encouraged to try to correct the interference by one or more of the following measures:
• Reorient or relocate the receiving antenna.
• Increase the separation between the equipment and receiver.
• Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
THREE
PRINCIPLES OF OPERATION
This section is meant to be a primer of the basics of fiber optics and fiber optics sensors. It should help the reader
understand how the product functions. Fiber SenSys products use lasers that are outside of the visible spectrum; they
cannot be seen with the human eye.
Warning: Never look into the end of the fiber if the APU is powered on.
Optical fiber is a thin, typically 125-250 micron, strand of silicone used to transmit light very long distances. It is com-
prised of the core, the inner portion of the fiber where light is transmitted, the cladding, the outer portion of the fiber,
and acrylate, the outermost protective layer.
There are two basic types of optical fibers, multimode and single-mode, and the distinguishing factor between these
two types is the diameter of their cores. For single-mode fibers the core diameter is approximately 9 microns, and for
multimode fibers the core diameter is either 50 microns or 62.5 microns.
The core and cladding are distinguishable by their index of refraction, which defines the speed of light in the fiber. Single-
mode fibers often have a simple, sharp (step), change in index between the core and the cladding, but in multimode fibers
the index of the core changes gradually between the axis (highest index) and the cladding (lowest index). These are called
“graded index” fibers.
The most important specifications that define a fiber’s performance and uses are:
• Whether the fiber is single-mode or multimode
– Single-mode fibers are used with lasers, and typically operate at wavelengths of 1310 nm and 1550 nm.
– Multimode fibers are typically used with LEDs (though they can be used with lasers) and typically operate at
wavelengths of 850 nm and 1310 nm.
– For FSI, the multimode fiber is the sensing fiber and the single mode fiber is insensitive
• Optical loss (attenuation)
– Loss is measured in dB/km.
– Loss is higher at short wavelengths, lower at longer wavelengths (until the wavelength reaches about 1550 nm,
at which point the loss begins to increase with wavelength).
– Loss is higher with multimode fibers, lower with single-mode fibers.
• Dispersion
– Optical dispersion limits the data bandwidth on the fiber, and results in pulses of light spreading out (dispers-
ing) as they travel along the fiber.
The FD7104 is a pulsed reflective system. The laser sends out a pulse of light (a short burst), which travels down the fiber
where it internally encounters a 2x4 optical splitter figure 3.3. The light is split equally along each path figure 3.4. The 4
pulses then travel down the cable figure 3.5, reflect off of the end of line terminator, figure 3.6, return to the splitter and
then to the detector figure 3.7. Because the pulse travels at the speed of light, if all path lengths were the same, all pulses
would reach the splitter at the same time. To avoid this problem delay coils, or extra long pieces of fiber, are added to
each leg of the splitter, spreading out the arrival of the pulses coming from different zones. The process is shown below.
This assembly requires that the APU measure the length of each zone before determining the port that each zone should
be connected to. This process, called the Cable Configuration, is described in the User Interface chapter. It involves
measuring each zone individually through the test port then following a diagram and connecting each zone to the proper
port.
Figure 3.4: The pulse is split evenly into 4 pulses at the 2x4 splitter.
Figure 3.6: Each pulse is reflected off the EOLT, and travels back down the fiber getting further separated in time by
traveling through the delay coils a second time.
Figure 3.7: Each pulse reaches the detector at a different time and the processor is able to determine which signal belongs
to each zone.
Fiber loss and transmission are typically reported in dBs which is a unitless way to describe a power ratio (note that
electrical power is described in dBs but with a small but important difference). The equation that describes dB loss in
optical fiber is:
Where P0 is the optical input power, P1 is the transmitted optical power on the other end. With this equation, if half of
the power is lost in transmission through an optical assembly (for example if 100mW is input and 50mW is output) the
result is 3dB of loss. The use of dB as a measurement is then independent of the units of power, or of the input power,
only the ratio of the light lost.
Optical fibers can be connected by either fusion splicing (melting the fibers together) or with fiber-optic connectors. Over
a dozen types of fiber optic connectors have been developed by various manufacturers since the 1980s. Although the
outer mechanical design varies from one type to the next, most connectors have several parts in common, namely a sleeve
that is used to align two ferrules, each containing the optical fiber. Two standard ferrule diameters are in common use
today; 2.5 mm and 1.25 mm.
The two most important optical specifications for connectors are the transmission loss and the reflection loss. Transmission
loss is important because it limits the range over which a fiber-optic network can operate. Reflection loss is important
because it defines how much light reflects off the connector, and goes back to the transmitter. Many transmitters are
highly sensitive to connectors that are highly reflective (have low return loss).
Transmission and reflection loss both occur at the interface between the two fibers, and the amount of loss depends on the
way this interface is designed, especially the way the fibers are polished. A simple flat polish on the ferrules, with a slight
gap between them, results in the highest return loss (most light reflected). This design is improved upon by removing the
air gap. Even when the ferrules are pushed solidly together, however, microscopic fluctuations in flatness mean there is
still a slight gap, so the return loss is still relatively low. A hemispherical polish means there is less surface area for contact,
and better contact over the parts of the ferrule that touch – greatly improving the connector’s return loss characteristics.
The lowest (best) return loss is achieved with an angled hemispherical polish, or APC. For this reason, reflective systems,
such as the FD7104, operate best when using only APC connectors.
Optical connectors have the advantage of allowing the optical fiber to be repeatedly connected and disconnected. Their
convenience is countered by relatively high loss and reflectivity. If it is desired to permanently connect two optical fibers,
with low transmission loss and high return loss, the most effective way is to fuse the two fibers together.
Fusion splicing involves precision melting of the two optical fibers into a single unbroken piece of fiber. To accomplish
this, one uses a fusion splicing machine like the one illustrated in figure 3.10
Figure 3.9: Definitions of loss and return loss. Pin is the input power, Ptx is the output power, and Pre is the reflected
power.
It is extremely important that fiber optic connectors be cleaned prior to inserting into the APU. Tiny bits of dirt, when
ground between the ends of the connectors, can cause permanent damage, resulting in connectors with high reflectivity
and/or high loss. It is difficult and often impossible to clean the internal connectors on an APU and if damaged the entire
unit will need to be sent into the factory for repair. Furthermore, the tolerances in fiber-optic connectors are very small,
often less than a millionth of a millimeter. Because these tolerances are so small, even microscopic bits of dust can cause
the fibers to be misaligned. When the fibers in an optical connector are misaligned, the loss and the reflectivity (return
loss) can be out of specification. Proper cleaning and maintenance techniques will greatly extend the life of connectors,
and improve the overall performance of the optical systems in which the connectors are used.
Figure 3.11: An example of a mechanical cleaner (left), used for cleaning the ends of the ferrules on connectors. Also,
an example of swabs (right) used to clean the insides of feed-through couplers.
FOUR
This section is intended to be a brief review on setting up the Alarm Processing Unit (APU). It is not a substitute for
attending product training or reading all of the detailed relevant manual sections.
The APU may be mounted outdoors in a weatherproof field distribution box or indoors. The APU can be powered by a
12-24VDC power supply or by PoE.
Install sensing cable on fence according to the installation manual. For a fence, route the lead in cable from the APU to
the beginning of the closest zones. At the APU end of the fiber, splice on SC-APC pigtails. The other end of the lead in
will be spliced at the beginning of each zone, typically one or two SM to MM splices per breakout box. The other end of
the sensing cable will have an end of line terminator spliced on figure 4.1.
Connect to the APU using an Ethernet cable through the LAN port or using a USB A to B cable. If using a USB
connection, first download the Fiber SenSys IP Utility from the supplied Fiber SenSys Materials USB or from https:
//www.fibersensys.com.
Once the IP Utility figure 4.2 has been downloaded to the PC being used for communication, run the .exe file. Within
10s the utility will locate any FD7104s connected to that PC via USB.
Select the unit from the list and click connect. This will navigate to the default web browser and open the web UI without
requiring a password, and you can skip to the next section.
If using a network cable, open a web browser (Mozilla Firefox, Microsoft Edge or Google Chrome) and enter a URL that
incorporates the APU’s default IPv4 address of 192.168.0.1:
http://192.168.0.1
This should lead you to the login page. The default password is printed on the unit and should be changed immediately
on the network page and stored in an external, secure location.
Figure 4.1: Outline of basic fence installation with APU mounted outside in a field distribution box
Note: DISCONNECT ALL FIBER OPTIC CABLES FROM THE UNIT BEFORE BEGINNING THE CABLE
CONFIGURATION PROCESS
Navigate to the Cable Configuration page. Verify that all fiber optic cables are disconnected from the APU. Click the
button to put the system in cable maintenance mode. Starting with zone 1, connect to the Test Port/Optical Port A, scan
the cable, click save, then disconnect the cable. Repeat steps for remaining zones. If a zone is not ready to be tested, or
has a problem that can’t be remedied, you can reserve zone’s position in the configuration with the “Reserve” button.
Once you’ve added or reserved one or more zones, click Next at the bottom of the page. Following the table and graphic
at the top of the page, connect each zone to the port described, click Test then Apply at the bottom of the page. Take
the unit out of cable maintenance mode. figure 4.3
If using relays, navigate to the Networking and Relays page. Adjust the latch time and mask time if necessary.
If using TCP/IP alarm reporting visit the Network page and configure the network settings to communicate with the
appropriate head end software. In general, changing network settings should not be done by someone not familiar with
the area and at a minimum your network administrator should be consulted.
Leave the system to run over a period sufficient to gather the types of expected nuisance alarms (e.g. for a fence, wait
for a wind or rain event). View recordings generated from nuisance alarms on the Detection Settings page. Mark each
nuisance alarm as “nuisance” on the table at the bottom of the page.
Adjust the threshold and noise reject so that the nuisance files no longer generate an alarm and the intrusion files still
generate an alarm. Use the “model all” button to again observe the effect that changing a parameter has on all files.
FIVE
The section describes the features on the system front panel shown in figure 5.1
There is a physical Factory Reset button on the front of the APU under the system LEDs (Power, Status and Tamper/Aux).
Enabling the factory reset will revert all changes made on the system back to factory settings. This includes:
• Password changes back to factory set password printed on APU
• Cable configuration is deleted
• Relay settings return to default
• Network settings return to default
• Zone detection settings return to default
• Time/Date settings return to default
• Recorded files are all deleted
• System history is deleted
This is intended for use if unknown changes have been made to the system. To perform a factory reset it is necessary to
have physical access to the unit. Locate the factory reset button under the Power, Status, and Tamper/AUX LEDs. Power
cycle the unit. While the system is powering on, shown by a blinking in the Power LED, using a thin, nonconducting rod,
press the factory reset button and hold until the Power LED begins to blink yellow rapidly. This will take approximately
30s. Note that pressing the factory reset button while the system is in run mode and the Power LED is not blinking will
have no effect on the system.
The fiber test button allows a zone to be tested without logging on to the machine or using a PC. Pressing the fiber test
button on the front panel will send a pulse of light out the test port, and if sufficient light returns from a single zone it will
indicate success.
Note this action disrupts normal APU function so it is not available when the APU is in the armed state. It is available
only in “cable maintenance” mode. If the APU has never been configured before, it will power on in cable maintenance
mode. If the APU has been configured before, it must be explicitly placed into cable maintenance mode using the user
interface.
To use the fiber test button, connect a single zone to the Test Port/Optical port A. Then press the fiber test button. A
green LED will indicate the zone has been successfully installed. A red light indicates no zones were detected. Make
sure only one zone is connected at a time. If you are certain only one zone is connected and the LED is red, there is a
problem somewhere in that zone resulting in excess loss. See the fiber test LED table for a complete description of the
LED behavior.
5.3 Relays
Each zone has an individual dry contact form C relays. They can be wired in either the normally closed or normally
opened configuration as displayed on the APU cover label. As a default the latch time is set to 1s and the mask time is
set to 0s. Both can be changed in the web User Interface (WUI).
The FD7104 auxiliary alarm input allows the APU to report the state of auxiliary devices, such as microwave sensors or
gate sensors to the head end. The auxiliary alarm input can be configured for secure open or secure closed operation.
Additionally, use of the auxiliary alarm input is optional. The mapping between the user settings, physical state, and
reported state of the auxiliary alarm input is shown in table 5.1.
Table 5.1: Auxiliary alarm input’s physical state to reporting state mapping
User setting Physical State Reporting State
<disabled> N/A secure (disabled)
open open secure
open closed insecure
closed open insecure
closed closed secure
The tamper input is used to detect when the enclosure containing the APU is opened. A switch connected to the door is
wired to the APU’s tamper input. When the door opens the switch flips states allowing the APU to detect and report the
tamper condition. Table 5.2 shows how the tamper switches physical state maps to the reported tamper state.
Use of the tamper input is optional, thus the no tamper state assumed in this case. To enable the tamper input, see the
Relay Setup page.
Four optical ports for configuring up to 4 sensing zones are available on the FD7104. The first port (A) is used as a test
port to determine if the attached sensing cable is in working order (see Fiber Test Button). It is also used to determine
which physical zone to connect to which optical port using the zone configuration tool in the user interface (see Cable
Configuration). Always clean and inspect any connectors before inserting into optical ports and listen/feel for the click to
be sure the connectors are properly seated.
Power LED
Green System up with no problems
Yellow Cable maintenance mode enabled
Slow green blink Booting
Fast yellow blink Firmware update/rollback or factory reset
Fast red blink System error
Off No power or insufficient power supplied to the unit
Status LED
Green All configured zones are sensing and armed
Red One or more zones are not sensing or armed
Off Unit not operational yet
Tamper/Aux LED
Red Auxiliary alarm
Fast red blink Tamper alarm
Off Tamper/Aux secure
Relay LEDs
Green Relay in secure state
Red Relay in insecure state
Off Zone not configured
SIX
USER INTERFACE
The FD7104 web user interface (WUI) is conveniently located on the alarm processing unit and accessible through a
modern web browser such Mozilla Firefox, Microsoft Edge, or Google Chrome.
Connect to the APU using an Ethernet cable through the LAN port or using a USB A to B cable.
If using a USB connection, first download the Fiber SenSys IP Utility from the supplied Fiber SenSys Materials USB or
from https://www.fibersensys.com.
Once the IP Utility figure 6.1 has been downloaded to the PC being used for communication, run the .exe file. Within
10s the utility will locate any FD7104s connected to that PC via USB.
Select the unit from the list and click connect. This will navigate to the default web browser and open the web UI without
requiring a password, and you can skip to the next section.
The APU is manufactured with a default IPv4 address on the Ethernet port to make initially locating the unit on the
network easier. This can be changed described in the Networking section of this manual. The default IPv4 address is
192.168.0.1.
To connect to the APU on the network, open a web browser and enter the URL like the following:
http://192.168.0.1
If the unit’s IPv4 address has been changed from the default, then replace 192.168.0.1 with the appropriate address. This
will bring you to a login page figure 6.2. The APU requires a password to login any time it is reached through a network
cable. Each alarm processing unit is manufactured with a unique default password programmed into the unit. This default
password is printed on the product label.
Figure 6.2: FD7104 Login page accessed through the IP address located on the unit
The password can and should be changed on the network configuration page. Once changed, there is no way to recover
the password through the network port. It must be done by connecting to the APU via USB cable. See Fiber SenSys IP
Utility for instructions.
6.2 Dashboard
The dashboard figure 6.3 provides the user with a system overview and is a first stop when performing any troubleshooting.
6.2.1 System
6.2.2 Network
The network section contains basic information about the network communication. It is useful as a first glance if the unit
needs to be located on the network or to verify it’s communication status.
Contains a link to the Fiber SenSys website and a link to the table of contents of the manual. Also contains third party
license information.
The cable assembly portion of the user interface is intended to set up new zones and to help trouble shoot problems in the
field should they turn up. The section contains the Zone Setup, which will tell you where to connect the cables and the
Zone Status page that gives a summary of the health of each zone.
The first step in configuring the APU is determining which port to connect your zones. Four delays coils with different
lengths separate the returning pulses to prevent pulses interfering. Click the “Cable Configuration” tab on the left menu
bar, then select the “Zone Setup” figure 6.4. Before beginning, all zone connectors should be clearly labeled. Dirty
connectors will introduce loss or intermediary reflections, and can damage the internal connectors which can prevent your
APU from functioning properly and will require a Fiber SenSys factory RMA. Before inserting any connectors into the
APU optical ports, clean and inspect the connector ferule to ensure you are not introducing any dirt or debris to the interior
connectors.
Step 1: Ensure that no cables are connected to the alarm processing, then click next to begin the process.
Step 2: Insert a clean zone 1 connector into the test port of the APU. Click test. If the cable, connectors, and splices
have no excess loss, Zone 1 will return “Good”, as shown in figure 6.5
Figure 6.6: Problem zone. Two cables are connected here and only one should be added at a time
Step 3: If the zone is returned “Good” click “Save”. If it returns “Problem” status, the zone can be reserved and addressed
later. Disconnect the fiber, reserve the zone and proceed with zone 2, or attempt a second time.
Step 4: Make sure zone 1 is disconnected with the dust cap replaced, then repeat steps 1-3 with zones 2-4. Each time
you hit test be sure there is only one zone connected at a time and that dust caps have been replaced on unused zones.
Step 5: When finished with all zones (there may be less than 4 but at least one must be saved or reserved) click “Next”
at the bottom of the page figure 6.7. This navigates to the final scan page. Clicking “Cancel” will delete all scans along
with save/reserved information and return you to the “Cable Configuration” page. Alternately, clicking “Previous” will
take you to the previous page while saving scan data.
Step 6: Connect the zone cables to the ports as shown in the table and diagram shown at the top of the page figure 6.8.
Then click the “Test” button above the graph.
Step 7: If no problems are displayed on the Final Scan graph, click “Apply”. If problems are displayed on the graph
proceed to the trouble shooting section.
The zone status page shows a view on system health. All peak heights should be between 50% and 80%, with a minimum
recommended height of 30%. However the system will continue to operate, until the peak height drops below 10% at
which point that zone will go into fault. The peaks will move a little bit up and down as small amounts of signal are
generated on the cable.
The laser and attenuation listed below the table describe how much loss is in the cable. The laser value goes from 0 - 100%
and describes the range of the laser. The attenuation ranges 0 - 6dB. A high laser current and low attenuation mean there
is large attenuation in the field, although this is not problematic unless the result is peaks below 30%.
Figure 6.8: After connecting zones as shown, testing shows a good final scan
Figure 6.9: Zone status displayed for three good zones and one zone in fault
This page provides the means to establish the network configuration for the APU. Input values should be obtained from
your network administrator and should not be changed without networking expertise. This page can also be used to
establish the administration password.
Contact the site’s network administrator to determine whether your APU should be configured to automatically obtain an
IP address or assigned a specific address.
Selecting “Assign a specific IP address” is the recommended method of establishing communication with the FD7104
and helps reduce the risk of an IP conflict. Selecting this tells the APU that it is to use the IP address, subnet and Gateway
defined by the user. An appropriate IP address, Subnet, and Gateway are specific to your network and can be defined by
your network administrator.
Selecting Obtain IP address automatically tells the APU to use DHCP to configure the network related settings automat-
ically. The DHCP hostname can optionally be set along with a flag indicator telling the APU to ignore the NDS servers
provided by the DHCP server and instead use the ones explicitly set by the user (see other settings).
The site’s network administrator must provide domain and DNS server values.
XML reporting
These values refer to the PC running the “head end” software. The APU can listen for incoming connections and can
establish up to two outgoing connections. Locate the IP address of the PC running your head end software and enter it
into the Host field. Port should be left at default value unless otherwise instructed by your network administrator.
Once the preferred network settings have been set, use the “Apply Network Settings” button to have the network settings
transferred to the APU.
Admin Password
A password is required to login to the APU if you are connected to the user interface via the Ethernet LAN. You can
change the password using this section of the page. The two fields must match in order to change the password. Once
the two fields match, use the “Change Password” button to apply the new password. Use the “Show Password” checkbox
if you want visual confirmation of the entry before applying. If the password is later lost, you can recover the login by
connecting to the APU via USB port using the Fiber SenSys IP Utility. Once connected via the USB port, you can reset
the password.
All alarm relays are form C dry contact relays. Zone alarms and the Fault input have three pins and can be wired as
normally open or normally closed depending on user requirements. Relays are connected to zone numbers, regardless of
fiber placement in connection ports as directed through the setup wizard. For example, if zone 1 is connected to Optical
port B or D, Zone 1 alarms are still always reported through relay 1. In addition to zone relay outputs, there are two relay
inputs: tamper and auxiliary.
Relays
Latch time defines the amount of time the relay remains in the insecure position after an alarm is generated. This parameter
is set in seconds. Setting latch time to 0s effective turns off relay reporting.
Mask time defines a minimum amount of time between alarms. For example, if Mask time is set to 5s, and an alarm is
generated 3s after the latch time of another alarm has expired, only the initial alarm will be reported. In this case if the
second alarm is 6s after the first alarm it will be reported as usual. Mask time is set to 0s as default and is typically not
activated.
Tamper
Tamper is disabled by default. The tamper relay is set in a normally closed configuration only.
The FD7104 has a single auxiliary alarm input. The user may use a relay input, for example from a microwave, which can
then be reported through the TCP/IP communication and is then available through a monitoring or head end software.
The auxiliary alarm input can be set for normally open or closed. Refer to Aux Input section for a description of how the
auxiliary input can be used.
The Detection Settings page, along with the Make Recording page, is used to calibrate each zone individually. Zone tabs
are located at the top of the page. It is possible to look at multiple zones at the same time by utilizing two browser windows
or tabs.
Threshold:
Valid range 1 - 100
Default value 10
Function Raises and lowers the threshold (orange line in the graph).
Response Low threshold value makes it very easier alarm and a high threshold value makes an alarm
less likely.
Wind reject:
Valid range 0 - 1000
Default value 15
Function Reject nuisance alarms by causing the threshold to follow the noise floor more or less aggres-
sively.
Response Low wind reject value keeps the threshold more stationary and is less likely to reject wind
alarms. High wind reject value causes the threshold to follow the signal more closely, making
nuisance alarms less likely.
Low frequency:
Valid range 10 - 640 Hz (10 Hz increments and must be less than high frequency)
Default value 200 Hz
Function Allows users to maximize signal to noise ratio. System ignores sensor signal frequencies below
user set value.
Response Setting the low frequency very low will have the effect of raising the cumulative noise floor.
Setting the low frequency very high will reduce the size of the signal by rejecting additional
low frequency.
High frequency:
Valid range 10 - 640 Hz (10 Hz increment and must be greater than low frequency)
Default value 600 Hz
Function Allows users to maximize signal to noise ratio. System ignores sensor signal frequencies above
user set value.
continues on next page
Event count:
Valid range 1 - 10
Default value 3
Function Tell the system how long or how many times the signal must exceed the threshold to generate
an alarm.
Response Setting the event count low (1 or 2) will cause the system to alarm too easily making nuisance
alarms more likely. Setting the event count high (above 5) will make it unlikely that a climb
will consistently generate an alarm.
Window:
Valid range 1 - 10 seconds (0.1 second increment)
Default value 5 seconds
Function Defines the maximum time between two events before determining that the events are unre-
lated.
Response Setting the window very high might link two unrelated intrusions or disturbances generating
nuisance alarms or causing an alarm to appear before the apparent requisite number of events.
Setting the window lower will prevent this.
Mask:
Valid range 0.1 - 10 seconds (0.1 second increment)
Default value 0.5 seconds
Function Prevent a single event from causing excess alarms.
Response Low mask allows a new event to be generated soon after an alarm. A high mask means there
will be a longer time between two alarms even if there is a lot of signal generated.
Zone tabs:
Select a zone on the tabs at the top of the page to view the recordings and detection settings for that zone. An asterisk
will appear next to the zone name if changes have been made and not saved. Changing detection settings on one zone
does not change settings on the other zones as the signal response is different for different sections of fence.
Save button:
Saves the parameters. Note that changing the parameters without hitting “save” will have no effect.
Default button:
Returns all parameters to default values.
Apply parameters to all recordings that have been marked as nuisance or alarm. Below the graph PD and NAR percent
is calculated. PD of 100% means all recordings classified as alarms generated an alarm within the area of interest. NAR
of 0% means no recordings classified a nuisance generated an alarm within the area of interest. The goal when tuning is
100% PD and 0% NAR.
Graph:
Green line is the signal. When nothing is happening on the fence you are looking at the noise floor. When the line
increases you are seeing a signal. The orange line is the threshold. If the green line exceeds the orange line an event is
generated. Events are marked above the graph with a yellow dot, alarms are marked above the graph with a red square.
Recordings for each zone are listed in the recordings table. The FD7104 can hold up to 150 recordings per zone. You
can mark 100 of these recordings as either “alarm” or “nuisance”. Marking a recording as “alarm” or “nuisance” means
the recording will be used to estimate PD and NAR during modeling. This will also mark the recording as saved and it
will not be deleted unless done so manually.
The recordings that are marked as “not classified” will be stored but not modeled unless selected. Although you can model
“not classified” recordings, they never contribute to the PD/NAR estimates. The oldest “not classified” recording will be
deleted when a new recording is generated if there are already 150 recordings.
You can manually delete recordings using the recording table. Mark the recording you wish to delete by checking the
checkbox on the far right. You may mark more than one at a time. Once you’ve marked all the recordings you want to
delete, you can click on the “Delete…” button found below the table.
A variation of the recording table is also shown on the Make Recording page, and the behavior is largely the same.
Figure 6.13: Detection settings page with some recordings labeled as nuisance, some as intrusion and some not classified
Every recording has two areas of interest: one selected by the APU when a recording is made and one selected by the
user for use during modeling. The area of interest shown on the detection settings page is the one selected by the user.
The area of interest is shown on the graph as a shaded area. Initially this area will be identical to the one selected by the
APU, but it can be changed as desired.
The purpose of the user adjustable area of interest is to mark the part of the recording that contains the intrusion signal of
interest. Only alarms that occur within the area of interest are counted when estimating PD/NAR. You’ll probably want
to keep the area of interest tight around intrusion signal for “alarm” recordings, and as broad as reasonable for “nuisance”
recordings.
The area of interest is adjusted by using the two input boxes that are just above the graph. There is one input for the left
side and another input for the right side. As adjustments are made to the area, PD/NAR estimates will be updated. The
area adjustments are saved automatically. The area can also be reset to the area that was determined by the APU when
the recording was made by using the “Reset…” button just to the right of the input boxes.
Note: It might be tempting to discard multiple recordings of adjacent intrusion signals in favor of a single recording that
contains all the signals of interest and then adjust the area of interest to cover the entire area. However, the decision to do
this will depend on whether you are working with “alarm” recordings or “nuisance” recordings.
Let’s expand on the note above with an example. We’ll use two recordings that were captured within a short time of each
other. The recording with ID 389 (figure 6.15) was captured a little before recording with ID 390 (figure 6.15). As can
be seen, the 390 recording captured its intrusion signal along with 389’s.
At this point, it would be possible to take 390’s recording and expand the area of interest to cover both intrusion signals
in a single recording as seen in figure 6.17.
Figure 6.17: Adjusting 390’s area of interest to cover 389’s and 390’s intrusion signal.
You could then classify 390 as an “alarm” or “nuisance” and either leave 389 unclassified or discard it by deleting.
Now let’s say we make a small change to the threshold as we are tuning. The adjustment is such that 389’s intrusion does
not generate an alarm, but 390’s still does (see figure 6.18).
Figure 6.18: A threshold change generates a single alarm within the area of interest, but only on 390’s signal. This is okay
for a “nuisance” signal, but not ideal for separate “alarm” signals.
If you have marked 390 as an “alarm” and expect an alarm on both intrusion signals, you would have to explicitly view
390’s recording to know that it didn’t do what you wanted. Your PD estimates will also be misleading and the recording
will be considered to have passed even though it failed your expectations.
However, if you marked 390 as a “nuisance”, this would work okay because your NAR estimate would indicate you still
have some work to do to tune out both signals. The recording will be considered to have failed until both alarms are
eliminated.
You can add unique notes to every recording. This is useful to provide additional information about the recording.
Example: “This recording was caused from tree branch striking in the middle of Zone 1”. The full notes of the selected
recording can be seen by clicking on the “Notes” button that is on the far right just above the graph. Once you click that
you’ll see a view like shown in figure 6.19.
Figure 6.19: Detection settings graph with the notes of the selected recording visible.
To hide the notes again, you can click on the “Hide Notes” button. The field where the notes appear is read only. You
can edit the notes by clicking on the “Edit…” button. This will bring up a dialog box as seen in figure 6.20.
As can be seen, the first line of the notes will be used as a summary. This summary will appear in the recordings table.
Once you are done editing notes, click the “Save” button. See figure 6.21.
Selecting “Make Recording” on the navigation side bar or clicking the “Record New” button on the Detection Settings page
will navigate to the Make Recording page. Use this page to view live signal and to manually record intrusions or nuisance
data.
On the Make Recording page you can use the tabs at the top to select a zone to work with. Just below the tabs is a plot
showing a live signal from the selected zone with a buffer of recent history. Just beneath the live plot in a table are the
current settings being used by the APU. Below the live plot is a second plot and a table of recordings. The second plot is
used to view recordings.
Any alarm automatically triggers a new recording. A new recording may also be initiated manually by clicking the “Start
Recording” button. Manually starting a recording can be useful in situations where there is an anomalous signal you want
to capture that isn’t triggering an alarm.
When using the recordings table on this page to view recordings, the plot will show the recording as it was captured,
including the APU’s idea of the area of interest. The table below the plot will show the settings that were active when
the recording was made. This is different from the Detection Settings page, which shows plots as modeled with whatever
settings you have selected. In short, the Make Recording page always shows the original recording and associated settings.
This can be a useful reference when tuning to see how the APU originally responded to a signal.
Figure 6.20: This dialog allows editing the notes associated with a recording.
Figure 6.21: The same recording as in figure 6.19 with updated notes.
Figure 6.22: The live plot showing an alarm that was automatically recorded. The shaded area shows the extent of the
recording that was just captured.
Figure 6.23: Here we have used the recordings table to select the recording that was just captured in figure 6.22. The
shaded area indicates the area of interest as selected by the APU.
Just like with the Detection Settings page, the Make Recording page provides the ability to add or update notes for a
recording.
Figure 6.24: Same recording as before, but now we can see the full notes and edit them if desired.
The FD7104 is field upgradable. The update is in the form of a single file that is provided by Fiber SenSys. To successfully
perform an upgrade the APU must be in Cable Maintenance mode. If the APU is not already in that mode, the firmware
update page will show a link to navigate to the cable configuration page to make the switch to cable maintenance mode.
(You can hit the browser’s back button to get back to the upgrade page.)
In cable maintenance mode the unit is temporarily not acting as an alarm processor. All relays will switch to insecure and
LEDs to red. If the network page is configured to Fiber Commander compatibility mode all zones will send out Fault
messages. For all other network communications the system will send out “maintenance.”
Figure 6.26: Firmware update page after user has put APU into cable maintenance mode
It is a good idea to make a backup of the APU’s configuration before performing an upgrade. The upgrade process will
attempt to maintain the configuration through the upgrade, so you shouldn’t need to perform a restore operation afterwords.
However, upgrades are a good opportunity to ensure you have a backup of the latest configuration.
The firmware update file should be downloaded to the PC before beginning as you will need to upload it to the APU. The
update process proceeds through a few steps.
1. Select the firmware upgrade file on your PC.
2. Click the “Upload” button.
3. The APU will begin to verify the file after the upload is complete.
4. Once the file is verified, the page will show the version detected by the APU, and the “Apply” button will be active.
Make sure the version of the uploaded file matches your expectations.
5. At this point you can still cancel the update. Once “Apply” is clicked, the update cannot be canceled. Click “Apply”
to proceed with the update.
6. The APU will apply the update and reboot. The reboot process can take more time than a usual boot process due
to migrating user configuration etc. Please be patient.
Once the APU reboots, the page will eventually refresh. If you are connected over the Ethernet interface, you will have
to login again. If you are connected over the USB, you will be automatically redirected to the Dashboard.
6.9.1 Rollback
Whenever an upgrade is performed, the currently active firmware on the APU is preserved. After an upgrade, it is possible
to “rollback” to this preserved version. Rollbacks are intended to provide a way to return an APU to a previous working
state in a situation that an upgrade (or downgrade) does not work as intended.
Note: The rollback feature is there if needed as it is difficult to anticipate all situations that will be encountered in the
field. Rollbacks should be exceedingly rare, and should only be performed on the advice of Fiber SenSys support.
Due to the purpose of rollbacks and how they work, rollbacks do not preserve the current configuration. The configuration
will be restored to whatever was the current configuration when that firmware was active (e.g. the network configuration).
A backup of the configuration can be made, and a restore attempted after the rollback. However, keep in mind that old
versions of firmware may not be compatible with a newer version’s configuration. An attempt to restore a backup of a
newer firmware’s configuration against an older firmware may be rejected by the older firmware.
The backup and restore page allows the user to keep a file containing all product configuration downloadable to a PC as a
zip file. This can be very helpful for sending information to Fiber SenSys Technical Support group for product assistance.
It is also good practice to keep a backup file because if unintended system changes are made it is easy to revert to the
previous state. Information stored in the backup file includes the following:
• Zone configuration
• Detection settings
• Signal recordings
• Network settings
• Relay settings
• System history
6.10.1 Backup
To backup the system, click the “Prepare Backup” button to generate the backup file. Then click “Download Backup”
which will save the prepared file to your downloads folder. The backup file can be generated at any time and will save the
time and date in the file name. These files can be emailed or sent to other APUs to export settings.
6.10.2 Restore
To use the backup file, click “Restore” to navigate to a page where you can click “chose file” to search for the previously
generated file. Then click restore to upload that file to the alarm processing unit.
Warning: The restore operation disrupts the APU’s normal operation. Until the restore is completed, no signal data
will be processed and the whole system will report as insecure.
SEVEN
SYSTEM CALIBRATION
The goal of system calibration is to set the APU parameters to alarm on signals generated from intrusions such as a
climbs or cuts, and to reject, or not alarm, from signal generated from nuisance sources, such as wind, rain and animals.
Accomplishing this goal requires recorded signals generated from intrusions and nuisance sources.
The unit can store 150 recordings per zone. Up to 100 recordings can be classified as either “alarm” or “nuisance”. These
classified recordings are protected from automatic deletion. This leaves a minimum of 50 recordings available as a rolling
collection of alarms. When there are 150 recordings and a new recording is generated, the oldest unclassified recording
will be overwritten.
Intrusion files at the hardened points of the protected medium should be generated with challenging nuisance alarms, then
marked as such to permanently save. If a situation comes up where the current parameters are not rejecting all of the
nuisance alarms, modify parameters and verify that the intrusions are being captured and the nuisance alarms are being
rejected.
The calibration process can be outlined in the steps below. The full process is described in the next section.
1. Generate intrusion data by performing physical intrusion simulations. For a fence this means performing climbs
and simulated cuts by tapping with a screw driver. For PDS applications, use a hammer and a tool to simulate
sawing.
2. Mark all intrusions as “alarm”, unless improperly performed, on the detection settings page table.
3. Allow system to run through a period of adverse weather or nuisance prone situation such as a nearby generator or
gate in operation and collect nuisance files.
4. Mark nuisance files as “nuisance” on the detection settings page table.
5. Adjust tuning parameters and model files so that all intrusions generate an alarm and nuisance files generate as few
alarms as possible, ideally none.
6. Save best performing parameters from step 5.
7. Over time, return to step 3 and repeat until sufficient PD and NAR are achieved.
See the User Interface section for more detailed information about the UI. More specifically the Detection Settings and
Make Recording sections will be of interest.
The tuning process is best accomplished with two people. Begin by gathering intrusion data. Navigate to the Make
Recording page. This page displays the real time signal, a plot for recorded files, and a table displaying all recorded files.
The zone number can be selected on the tabs at the top of the page. The first person will run the software and the second
person will be responsible for generating intrusion signals. For a fence system the intruder needs to perform physical
climbs and simulate cuts using a screwdriver.
The person running the software should observe the graph during the first intrusion. The green line, the signal, will increase
as the intrusion is generated and should cross the yellow line, the alarm threshold, and generate events and alarms.
Figure 7.1: Make recordings page to view live signal and to manually record intrusions or nuisance data. An example of
a test intrusion that was just captured by the system.
If the first intrusion does not generate an alarm, adjust the threshold down so that an intrusion easily generates 1 or more
alarms. Selecting “intrusion” classifies this file as an intrusion file which internally mark the files to be saved permanently.
Collect 10 files of each test type on each zone. For a fence, this means collect 10 climb and cut test files.
After the intrusion data has been collected, adjust the tuning parameters with the goal that each intrusion file generates
one alarm. Navigate to the detection settings page. Select the zone you want using the tabs at the top.
Go to the recordings table and sort by “Type” such that intrusion files are displayed first. The graph will appear below the
tuning parameters. Use the legend shown on the plot to identify the “signal”, “threshold”, “events”, and “alarms”. When
the signal exceeds the threshold an event is generated. When the number of events within the “Window” reaches “Event
Count” an alarm is generated figure 7.2.
As parameters are adjusted, the model of the selected recording will be automatically updated. You can model classified
recordings by clicking the “Model All” button. Any changes made to the settings will only be saved to the unit after
clicking the “Save” button
Start by adjusting the frequency range to maximize the signal to noise ratio. Next, adjust the threshold parameter which
is easily visible on the graphs below plotted as a yellow line. “Noise reject”, “Count”, “Window”, and “Mask” may not
need adjusting and likely should not be adjusted until acquiring nuisance data. Each graph will display “Alarm” or “No
Alarm” at the top of the graph. At the top of the page there is a message displaying the number of files that alarmed and
the number of files that did not alarm.
After setting tuning parameters for intrusions the system should be left to collect nuisance data. The length of time required
to collect sufficient data will vary greatly and is largely weather dependent. For an outdoor fence the most problematic
nuisance alarm sources will be wind and rain. To effectively tune these sources of alarms out you will need to acquire
data that has wind and rain conditions occurring. When the system is left armed, an alarm will trigger the APU to record
a file that is 20s long, starting 10s before the alarm and extending to 10s after the alarm.
Figure 7.2: Make recordings page to view live signal and to manually record intrusions or nuisance data
After the generation of nuisance alarms that you wish to tune out, return to the Detection Settings page. Search for
nuisance recordings by selecting a zone in the top left tabs and view the recordings table at the bottom of the window.
Select recording to be classified, review the signal data, and mark the recordings as “Nuisance”, then click the “Model
All” button. This will mark the zones as nuisance files that will not be deleted when the APU storage is “full”.
EIGHT
The successful installation and operation of a fiber optic security system is achieved by a thorough understanding of the
security needs of the site to be protected as well as the proper deployment of the sensor cable. This application note will
lead the reader through the site design and installation procedures for various safety and security applications.
Prior to installing the Alarm Processing Unit (APU) and deploying the sensor cable, the site to be protected must be
assessed carefully so that all security needs are met and all potential threats against it are accounted for. For example, if
there is a possibility that a potential intruder could cut the fabric of a perimeter fence, sensor cable should be deployed
along the fabric to detect the intrusion.
In addition to security needs and threat assessment, the system maintenance requirements and compatibility must also be
taken into account. For example, if the APU alarm relays are wired to activate remote video equipment, the maintenance
requirements and compatibility of the APU and third-party equipment should be considered.
Once the site to be protected has been thoroughly assessed for all security needs and the system maintenance requirements
and equipment compatibility have been examined, the sensor cable must be properly deployed.
Ultimately, the method by which the sensor cable is installed and deployed is up to the end user. Fiber SenSys does
not mandate one particular installation design over another; however, the general procedure for installing the fiber optic
perimeter security system is as follows:
1. Assess: Survey the site to be protected and record all information needed for the site design phase
2. Design: Create a strategy for protecting the site. This includes planning the level of security, choosing the location
of the APUs, provision of electrical power, and planning cable routing
3. Install: Proper deployment of the fiber optic sensor and correct installation of the Fiber SenSys system
Site assessment is used to evaluate the security needs of a site and to gather important information for the site design.
This process involves the following:
• Survey the perimeter, recording:
– Length of the fenced perimeter, excluding gates
– Fence type (chain link, palisade, decorative, etc.)
– Locations, lengths, and types of gates
– Presence of outriggers or top guard
– Security strengths and weaknesses
• Collect the system requirements:
– Zone resolution/length (the number of zones is a function of this)
As part of the assessment of the site, take into account possible non-threatening fence disturbance that could trigger an
alarm, such as animals, wind, and tree limbs.
Before system installation, take all steps necessary to eliminate nuisance causing elements by trimming or removing tree
branches and shrubs that encroach on the fence line, removing oversized signs hung on the fence fabric, and block wildlife
paths from traversing under the fence into the secure area.
Often some sections of fence may be more prone to nuisances than others. This can be due higher winds, nearby traffic or
trains, fence quality, or more heavily wooded areas. If all possible nuisances cannot be removed before system installation,
the affected zones can be tuned to resist potential nuisances.
To ensure the system successfully detects intrusions, the fence should meet following requirements prior to installation:
1. The fence should not generate excessive vibration and/or noise. For chain-link fences, re-tensioning the fence fabric
and adding additional fence ties to eliminate metal-to-metal banging of the fabric when the wind blows effectively
quiets the fence. Make sure the fabric is secured firmly to all fence posts.
2. The fence should be composed of the same material (similar gauge and construction) along the length of each zone.
Perimeters with multiple types of perimeter media should plan their zone breaks at these transition points.
3. Keep a clear area on both sides of the fence; all climbing aids such as tree limbs, large rocks, and structures should
be removed or secured. Also, there should be no spots along the fence where an intruder could easily crawl or dig
underneath without disturbing the sensor.
4. Buildings, structures, waterfronts, and other barriers used along the perimeter in place of the fence line should
provide adequate protection against intrusion. Ensure that there are no windows, doors, openings, or unguarded
means of access.
In order to ensure the highest performance of our sensors installed on chain-link fences, make sure the fence conforms to
the following specifications before installing the sensing cables:
Fabric. The fence fabric should be composed of steel chain mesh (9 gauge or less) with openings not larger than 3 inches
(7.62 cm). Additionally, tension the fabric consistently across its length throughout the protected zone.
Fence ties. Use steel ties (9 gauge or thicker). The ties should be electrolytically compatible with the fence fabric to
prevent corrosion. Attach the fence fabric to the posts using at least four evenly spaced ties. Ensure that all ties are tight
enough against the post to eliminate or significantly reduce mechanical noise.
Top guard outrigger. Outriggers, when used, should angle out in the direction of the unsecured area or be vertical.
Install at least three strands of barbed wire attached perpendicular to the top guard posts. Make sure the barbed wire is
well-tensioned and fastened to eliminate mechanical noise.
Height. The height of the fence should be a minimum of 7 feet (2.1 meters).
Fence posts, supports, and hardware. Pin or weld all posts, supports, and hardware to prevent disassembly of the
fencing or removal of gates. Locate all posts and structural supports on the inner side of the fencing. Secure posts in
the soil with cement to prevent shifting, sagging, or collapse. Additionally, place posts every ten feet or less to maintain
uniform tension.
Reinforcement. Install horizontal rails and/or taut reinforcing wires, interwoven or affixed with fence ties along the top
and bottom of the fence for stabilization of the fabric.
Ground clearance. Ensure that the bottom of the fence fabric is within 2 inches (5 cm) of ground level or buried
sufficiently in soft material such as sand or loose dirt.
Culverts and openings. Any culverts under or through a fence must consist of pipe 10 inches (25 cm) in diameter or
less; larger openings should be secured with protective grates and monitored with sensing fiber or third party sensing
technology.
For more information on these requirements, refer to the Fiber SenSys application note, Security Fence Construction
Recommendations, available at https://www.fibersensys.com.
When determining a strategy for protecting the site, there are three important points to consider regarding the sensor
cable:
• The sensor cable detects motion, vibration, and pressure changes. Therefore, ideally, the sensor cable should be
deployed in such a way that it is free of these effects unless they are caused by an intruder.
• The sensitivity of the sensor cable is uniform, meaning it has the same level of sensitivity throughout the entire length
of the cable. Areas that are highly affected by vibrations may need only one sensor cable run, while areas where
vibration is inhibited (such as fence posts or reinforced fence sections) should have more sensor cable deployed to
compensate.
• The detection system is zone based, meaning the APU cannot pinpoint where an alarm occurs along the sensor cable.
In order to localize the point where an intrusion occurs, the APU deployment must be separated into multiple zones
at reasonable intervals so that an intruder can be located when an alarm is received.
The lengths and placements of the zones are determined by the site requirements. The zone lengths need to be set such
that the location of intruders can be determined accurately within the needed response time of the site. Other factors
might include requirements for gates, culverts, and other discrete structures to be individually alarmed with their own
zones or aligning zones to camera viewing angles. The length of sensing fiber required for a given zone depends on the
following:
1. Length of the zone
2. Security level for the zone
• High
• Medium
• Low
3. Fence construction
For example, a low-to-medium security application may require a single pass of the sensor cable down the middle of the
fence, in which case the length of the sensing cable will be approximately the length of the zone. On the other hand, a
high-security application may require two passes along the fence, as well as vertical loops up and down each outrigger.
In this sort of application, the length of the sensing cable may be more than 3 times as long as the physical length of the
zone.
The FD7104 has 4 zones capable of being installed in any configuration. Each site is different and will have different
zone layout and installation requirements, however there are typical designs that maximize efficiency and reduce cost.
Minimizing the number of zone boxes and cable will save money on components and installation. Some efficient, cost
effective, zone layout options are shown in this section.
For a typical fence mount or server mounted APU, a single mode cable will run from the APU to the fence and to each
break out box. The multi fiber cable will be chosen according to the number of zones, the layout and whether the sensor
is installed indoors or outdoors. Each zone requires its own single mode fiber. The most efficient installation is shown in
figure 8.1. It’s easy to scale up if using multiple units mounted in the same location by using a higher fiber count cable.
For installations mounting APUs at different locations the pattern can be repeated.
Figure 8.1: Linear zone installation using a single lead in cable and backbone cable
In this configuration, a total of 2 zone boxes are needed for the 4 zones and backbone cable is needed for only half of the
installation.
Another way to achieve the above results is by splitting the lead in bidirectionally as shown in figure 8.2. Two strand single
mode cable would be sufficient in this instance and the design would still require two zone boxes and lead in for half the
installation.
NINE
INSTALLATION
This section will instructs users on the proper methods for installing the entire cable assembly including: lead in cable,
trunk cable, sensing cable, and breakout boxes.
Prior to installing the Alarm Processing Unit (APU) and deploying the sensor cable, the site to be protected must be
assessed carefully so that all security needs are met and all potential threats against it are accounted for. Refer to Site
Assessment and Design for detailed information on how to properly assess a site, and how to design an FD7104 series
system.
Ultimately, the method by which the sensor cable is installed and deployed is up to the end user. Fiber SenSys does
not mandate one particular installation design over another; however, the general procedure for installing the fiber optic
perimeter security system is as follows:
1. Assess: Survey the site to be protected and record all information needed for the site design phase
2. Design: Create a strategy for protecting the site. This includes planning the level of security, choosing the location
of the APUs, provision of electrical power, and planning cable routing
3. Install: Proper deployment of the fiber optic sensor and correct installation of the Fiber SenSys system
4. The following instructions are for the FD7104. To install other Fiber SenSys Inc systems, refer to the associated
application notes available through https://www.fibersensys.com.
The cable assembly is built on site; that is, the components are assembled in place along the secure perimeter. Assemble
and install the cable assembly as follows.
Caution: Some components of the cable assembly are extremely fragile. Pulling on the sensor cables at any point
with greater than 60 lbs. force can break optical fibers.
The cable assembly should be installed only by Fiber SenSys personnel or technicians trained and certified by Fiber SenSys,
see https://www.fibersensys.com/support-and-training. The following pages describe the general procedure used to build
and install the cable assembly.
To install other Fiber SenSys Inc systems, refer to the associate application notes available through https://www.
fibersensys.com.
The FD7104 can be installed with an insensitive lead in cable with optional trunk cable or with MM sensing cable directly
connected to the APU. The product can be mounted near the fence, or remotely up to 5km from the start of the first
sensing zone.
If following the bidirectional zone layout method figure 9.1 use the following instructions.
Route the lead-in cable to the location along the perimeter where the distribution box, or first breakout box will be located,
box 1 from figure 9.1. Be sure to leave a minimum cable overlap of at least 36” at the distribution box location (see figure
2-1). Service loops and/or excess cable are recommended. In the event of damage to the system, this extra cable will be
used to facilitate repairs.
Route the backbone cable along the fence line. It is recommended to leave 3 meter service loops every 90 meters (~300
feet). Also leave 3 meter service loops at the locations of each breakout box to facilitate breakout box construction (see
figure 2-2).
Where and how the cable is attached depends upon the type of fence and the possible threats against it. Generally, the
sensor cable is attached in such a way that it detects movement or vibration from intruders but still remains as insulated
from nuisances as possible. In addition, the cable is also attached in a secure fashion to prevent granting intruders’ easy
access.
Stainless steel wire ties offer the highest security method for attaching our sensor to chain link fences because of their
extreme durability. A special tool is then used to twist the tie so that the conduit/cable assembly is secure on the fence
but isn’t so tight it inhibits proper operation of the sensor or excessively compresses the conduit. The simplest process for
attaching a wire tie is as follows:
1. Bend the tie at the midpoint so there is roughly a 45° fold
2. Route the tie through horizontally adjacent fence diamonds
3. Squeeze the circular ends together and insert the hook of the twist tool
4. Pull the tool towards your body for approximately 3½ pulls
5. Secure the tie so that it just begins to indent the conduit
Note: In areas that are exposed to salt spray, limit the number of pulls to 2 (so that there are approximately seven twists
in the tie). Ties in oceanic areas can be susceptible to “stress corrosion cracking” when high tension is applied and we
have found that the solution to this phenomenon is applying less stress to the tie.
Logically one would assume that the best way to apply wire ties to a horizontal run of conduit would be to route the ties
vertically between adjacent fence diamonds. However, the highest security method of routing ties on both vertical and
Figure 9.3: Backbone cable mounted on fence showing service loops. They should be left every 90m (300ft) to facilitate
repairs, and at every breakout box location to facilitate breakout box construction.
horizontal conduit runs is by routing the tie through horizontally adjacent fence diamonds. When ties are routed through
horizontally adjacent diamonds, the ties burrow tightly within the framework of the fence as shown in figure 9.4 If the ties
are strung through vertically they do not conform to the fence, which leaves small gaps that can be cut from the non-secure
side of the fence as shown in figure 9.5
The disadvantages associated with not adding the proper amount of ties include increased ease of sensor removal and
various aesthetic drawbacks. For the best results, add ties every 12 inches (30cm) and as close-fitting as possible on either
side of each fence post figure 9.6. Removing the sensor undetected becomes nearly impossible if enough ties are added
and attached in a high security fashion.
Additionally, adding the correct amount of ties and applying approximately 25lb (11Kg) of tension to the conduit during
install helps to prevent hot and cold expansion, which results from the conduit expanding during higher temperatures
figure 9.7. The tail end of the twist ties may either be left pointing horizontally or bent in a direction of the installer’s
choosing.
The sensor cable is also attached to wrought iron fences, barbed wire or razor wire using wire ties. In each case, it is
necessary to consider how best to attach the cable so it is less likely to be disturbed by minor nuisances without sacrificing
its receptivity to detect the movements or vibrations of an intruder. In the case of wrought iron fences, the cable is attached
to the top and bottom rail using wire ties every two vertical fence stakes.
Figure 9.7: Conduit that has become wavy from expansion and contraction
Figure 9.8: Sensor attached to a wrought iron fence with wire ties
Trim the sensing cable to the final installed length. Remove 24” of conduit and set aside. Remove 10” of fiber, and strip
6” of jacket, trimming off Kevlar. Slide 18” of 3/16” heat shrink over fiber and back slightly into the conduit.
Figure 9.9: End of sensing element with jacket removed and heat shrink, ready for termination.
Cut off the SC/APC connector from the factory provided MMEOL Terminator and trim to 8”. Fusion splice the MMEOL
Terminator to the end of the sensing cable. Slide the heat shrink to cover all the exposed fiber and heat both ends of the
heat shrink to seal (heating entire length is not necessary).
Replace the 24” of conduit that was set aside over the MMEOL Terminator and exposed sensing fiber. Use compression
fitting to connect the pieces of conduit, and an end cap to protect against moisture. Attach end assembly to fence at a
downward angle to prevent fiber migration.
Figure 9.10: MMEOL Terminator is fused to the end of the sensing cable and protectively covered by the heat shrink.
Begin by removing the cable loop from the fence. Hold the break out box base in the location that it will be mounted
when complete and lay the backbone cable in the breakout box and mark where it enters (see Figure 2-19). Next make
another mark on the cable 50” towards the other end of the breakout box.
Using a tool such as the Ideal 45-164 or a razor blade carefully ring cut the cable jacket at both marks. Starting on one
end carefully slit the jacket open several inches along the two ridges in the cable. Next use a pair of needle nose pliers
pull on the two halves of the cable jacket apart until all 50” of black cable jacket are removed.
Remove all wrappings and any material surrounding the buffer tubes. Remove all but 2” of fiberglass central strength
members at each end of sheath opening. Remove all black filler tubes to the base of the cable jacket. These tubes contain
no fibers and are only used for cable construction.
Place the backbone cable through the center of the grommet. It may be necessary to slice the side of the grommet. If you
are using 24-fiber or greater cable route the buffer tube(s) that will not be accessed at the bottom of the breakout box.
Figure 9.13: Ring cutting the cable jacket and separating the halves
Figure 9.14: 36-Fiber trunk cable with empty buffer tubes removed and strength member trimmed
Figure 9.15: 36-fiber backbone cable with two spare buffer tubes routed along the bottom of the box.
After securing the fiberglass strength member to the retention brackets use a mid-span buffer removal tool such as the
Miller MSAT5 pictured below to carefully open up the buffer tube containing the fiber(s) you need to splice.
Figure 9.16: Using a mid-span entry tool to open appropriate buffer tube
Cut only the appropriate fibers for the zone(s) being spliced at the center of the loop. Store the unused uncut bare fibers
from the buffer tube at the bottom of the spice box.
Route the sensing cable(s) to the case edge and trim conduit to ½” away outside of the grommet. Insert 1” white conduit
plug into conduit end. This will protect the conduit from being crushed when clamped down.
Trim all fibers to proper splicing length and splice the sensing cable to the appropriate backbone fiber. Snap in the fusion
splice holding tray and secure the finished splices.
Secure any loose fibers by installing the small plastic clips and utilizing the adhesive tape that comes with the breakout
Figure 9.17: Spare fiber routed along bottom with appropriate zone fibers cut
Figure 9.18: Bringing the sensor cable into the breakout box
box.
Before installing the cover, remove the 2 end bolts and plastic retainers. Discard plastic retainers and install cover over
finished breakout box. Install sensing element retaining bracket with end bolts and tighten. Use stainless steel wire ties to
fix sensing element(s) to retainer.
Fiber SynSys fiber optic sensing cable has a long life even installed in the field. If an APU has outlived it’s shelf life and
needs to be replaced or updated it’s quite possible the cable is still capable of functioning as a sensor with the help of a
conversion kit. This decision should be made with the recommendations of the Fiber SenSys technical support and sales
teams and will require extensive site assessment and planning.
This section describes how to convert the installation for an older FD3xx installation into an installation that will be
suitable for the FD7104.
The FD3xx and FD2xx products are designed to work as loopback sensors, where light travels out the other end of the
cable into the detector. The FD5xx and FD7xx products use an OTDR style where light travels out the cable, reflects off
the end of the cable, and returns to the APU via the same port.
If upgrading the system from an older FD508 system and the cable has no degradation then no modifications need to be
made to support the FD7104.
Before using old cable for a new system the cable integrity needs to be verified. An FD3xx system is capable of measuring
the loss on the entire cable system. An RS232 to USB connector is required to communicate with the APU as well as the
SpectraView software, available on https://www.fibersensys.com or through the Fiber SenSys technical support group.
If the cable measures loss less than 5dB it can be converted with conversion cables and very little effort. Then you can
proceed with the installation without anymore testing or trouble shooting. If the loss is higher than that, even considerably,
it’s likely that the issue is only the connectors and the cable may still be in usable condition. The only method of truly
verifying the success of an older cable is by using an OTDR to scan the cable which shows small cable defects. If the
cable is broken, an OTDR can locate the damaged area which can be repaired using a repair kit.
9.2.3 Connectors
The FD3xx series uses ST UPC connectors while the FD7104 uses SC APC connectors.
Figure 9.24: SC-APC connectors are the proper connectors for the reflective FD7104
There are two differences between the two styles. First, the outside connector styles are different (ST vs SC) and are
incompatible. Second, UPC means the connectors are flat while the APC are angled which prevents small back reflections.
For this reason the APC style connectors are preferred. The old style connectors should be replaced with SC APC
connectors which should be installed using a fusion splicer. The system can accommodate UPC style connectors but they
should be avoided at all costs.
The FD33x series runs multimode sensing fiber directly to the APU while the FD34x series requires a single mode lead in
cable to connect directly to the APU with the other end spliced or connected to the multiple sensing fiber. The FD7104
is able to accommodate and adapt to both styles and will sense properly with the sensing fiber directly connected to the
APU or with an insensitive lead in or trunk cable. It is important that if you are converting an FD34x installation to an
FD7104 that the EOLT needs to be spliced directly onto SC3-C or other multimode sensing cable directly, without an
insensitive lead in.
TEN
The Fiber SenSys IP Utility is designed to allow the user to connect to the APU using a USB cable. Without the IP utility
installed the PC will not be able to locate the device. Using the utility bypasses any required password as the user must
have gained physical access to the device to connect using a USB cable. If the password has been changed under the
Network Settings tab and has been lost, the only way to recover the password is by using the IP utility to connect or by
performing a factory reset. The factory reset is not recommended as all settings will be lost and it may be difficult to bring
the system back to it’s previous state.
The Fiber SenSys IP utility can be downloaded at https://www.fibersensys.com or by contacting Fiber SenSys Technical
support group.
The IP Utility is a .exe file so once downloaded to a PC it needs to be opened and allowed to run.
In general, only one FD7104 should be connected to the PC while running the IP utility because it will not be possible
to readily distinguish units on the list. Connect the FD7104 to the PC via a USB A cable. The utility will automatically
search for all FD7104 units connected to the PC through a USB port. The search may take up to 10s to locate all units.
Select the unit from the list when it is displayed on the IP utility and click connect. This will use the PC’s default web
browser to open the web UI and navigate to the dashboard.
ELEVEN
MAINTENANCE
Maintenance consists of routine inspections and periodic testing to verify the performance of the tamper and fault alarms,
as well as the probability of detection for simulated intrusions. Visually inspect the FD7104 APU at least every 90 days:
1. Ensure the Power LED is illuminated and all alarm and fault LED indicators are normal.
2. Check the optical connectors at the sides of the APU, making sure they are not pinched or otherwise compromised.
On a periodic basis (once every 180 days at a minimum), perform the tests described in System Calibration :
• Fault
• Probability of detection.
• Relay function (if used).
There are no user-serviceable parts in the FD7104 APU. In case of an APU failure, corrective maintenance involves
replacing the APU. If you replace the APU, you must perform a complete system configuration and calibration. To
replace the APU, follow these steps:
1. Ensure all current APU calibration parameters have been saved using the “Backup” function.
2. Disconnect power to the APU and disconnect the optical fibers. Disconnect the Ethernet connection from the
TCP/IP port.
3. Remove the APU and replace it with a new unit.
4. Clean all the optical connectors per the procedures described in the fiber optics application note: AN-SM-007
Fiber Optics.
5. Connect power to the new APU and repeat the processes described in the chapters in this manual, on calibration,
tuning, integration, and testing.
For troubleshooting assistance, contact Fiber SenSys Technical Support Service: telephone, 1-503-726-4455; email,
support@fibersensys.com; or go to the Fiber SenSys website, https://www.fibersensys.com.
TWELVE
12.1 Repairs
During the life of our products, it is possible for the optical sensor fiber to become damaged. Through proper site planning,
provisions can be made to maintain the ability to repair the sensor cable and conduit. Service or maintenance loops should
be installed in the sensor cable and conduit at regular intervals as outlined in the product manual for your Alarm Processor
Unit (Figure 1). These loops provide extra material that can be moved to the area where the damage occurred and take
the place of the broken section which is removed.
If maintenance loops were not installed or if they are of insufficient length a segment of cable will need to be added to
the installation and the below process will need to take place on either end of that added section of cable.
After the slack cable is moved to the repair location (if necessary) and the damaged fiber and conduit has been removed,
the repairs can be completed. There are two options for repairing the optical fiber. The ends can be re-connected with arc
fusion splicing. If it is not possible to fusion splice the repair, both ends can be terminated with optical fiber connectors
and then mated together using a feed through coupler. This method will result in higher optical loss and a small back
reflection at the junction of the two terminated ends and should be avoided in favor of fusion splicing.
One of the important decisions in this process is choosing how to protect the repair location. After the conduit is cut,
and the optical fiber is exposed, it will need to be protected from the elements as well as from potential intruders. The
preferred method of protecting the repaired area is to use the Fiber SenSys Sensor Repair Kit, which consists of optical
cable, conduit and conduit couplers. In addition this kit includes two outside plant splice closures (as well as all associated
hardware). These can be mounted directly to the fence mesh and have the sensor conduits routed to each end (Figure
3). The optical fiber repair done internally is protected from the elements and can be strain relieved and tensioned
appropriately to ensure consistent sensitivity throughout the entire zone. The same can be accomplished using a wall
mount, hinged door, NEMA rated closure, which is beneficial for re-entry (for optical connector cleaning) and can be
secured against intrusion with an anti-tamper sensor switch.
In order to facilitate the sensor repair, cable and conduit must be relocated to replace the damaged section which needs to
be removed. The first step in this process is to inspect the cable and conduit, if possible measure the amount of damaged
product. Typically each storage or maintenance loop will contain 30 to 36 inches (76 to 91 cm) of spare conduit. This
measurement will help to determine whether or not there is sufficient conduit available within the zone to make the repair.
If there is not enough cable and conduit, a repair can still be made by cutting out the damage and adding a new section in
its place. This will require splicing at two locations within the zone rather than just one location.
If the FD7104 is originally configured with less than 4 zones, zones can be added at a later time if the site requires it.
To reduce confusion and complications, ensure that all zones are labeled at the SC-APC connectors coming into the APU.
A black Sharpie does this very well. Masking tape or labels can also be fixed to the fiber for each zone. To maintain zone
settings, the old zone number needs to match the new zone number.
Any time there are changes to the physical zone layout it is prudent to run through the Cable Configuration described in
the User Interface chapter.
Under rare circumstances it may be necessary to replace the Alarm Processing Unit. If the cable has not suffered catas-
trophic damage, write down or record which cable is connected to which optical port and simply backup the system to a
PC or external drive following the procedure described in the User Interface chapter. Disconnect all cables, relay wiring
and power supply. Remove the old APU and install the new unit. Reconnect all cables, relay wiring and power supply.
Connect fiber optic connectors back into the correct ports. Power on the unit and wait until the Power LED is solid green.
Connect to the new unit via PC following the instructions described in the Web UI chapter. Then back up the system
with the file saved from the old unit.
THIRTEEN
TROUBLESHOOTING
If there are problems uploading the backup file, make sure that you are selecting the correct file. The backup files generated
by the APU have names of the form FD7104-SERNUM-backup-YYYY-MM-DDTHHMMSS. Where:
• SERNUM is the serial number of the APU.
• YYYY-MM-DD is the year, month, and day the backup was generated.
• HHMMSS is the hour, minute, and second of the time when the backup was generated.
If problems persist, contact Fiber SenSys technical support.
Cable maintenance mode must be enabled to make an chances to the cable configuration. If no zones have been configured
it will be impossible to switch the unit out of cable maintenance mode. To configure zones move on to the Zone setup,
just below the cable maintenance mode toggle button.
The zone will be labeled “Problem” for the following reasons: no reflection, reflection too low, reflection too high, or
multiple reflections.
If the zone reflection is too low the test will return “Problem” possibly with “Low” labeled on a peak (see figure 13.1). If
this happens, first clean and inspect you connectors and ensure the connector has “clicked” when connecting to the APU.
If it persists then look for sources of loss in the cable. Likely sources are attenuation from small bends, poor splices, or
damaged EOLT. If all zones tested are appearing too low, then first inspect the lead in cable for sources of optical loss.
Contact Fiber SenSys technical support if you are unable to return the peak to an acceptable height.
If no reflection appears whatsoever, take the above steps. For there to be no reflection at all coming back to the APU the
cable needs to be very nearly broken. It is fairly easy to have SC-APC connectors not quite seated.
If the zone reflection is too high, the test will return “Problem” with “High” labeled on the peak. Ensure that only one
cable is connected to the APU in the test port. If it persists, contact Fiber SenSys technical support.
If there are more than one reflection present, the test will return “Problem” with “Multiple” labeled on both peaks (see
figure 13.2). In this instance ensure that only one cable is connected to the APU and that it is in the test port. If a
small secondary peak persists, you likely need to clean your connectors. If it persists after cleaning, contact Fiber SenSys
technical support.
Figure 13.2: A test where more than one peak was detected.
After you have tested all fibers and connected to ports listed on the final scan page, there are several problems that can
arise.
Missing zone: First check that your SC connectors are fully seated in all ports and that the connector makes a clicking
sound when inserted. If the connector is not inserted 100% then the light will not pass through the connector junction and
your reflection will not show up (or appear very small). After you have verified your connectors are properly seated verify
that zones are connected in the order displayed on the table and imaged shown above the graph. If your zone numbers
match correct ports then you may have made a mistake during the zone test portion by testing the zone in the wrong
port (any port other than the test port) or mistakenly measuring the wrong zone (for example, measuring zone 3 when
prompted to measure zone 2).
Unexpected zone: Connecting zones to the wrong ports will cause a reflection in an unexpected location. First, verify
that zones are connected in the order displayed on the table and imaged shown above the graph. If your zone numbers
match correct ports then you may have made a mistake during the zone test portion by testing the zone in the wrong
port (any port other than the test port) or mistakenly measuring the wrong zone (for example, measuring zone 3 when
prompted to measure zone 2).
Zone reflection too low: It is possible to have a zone pass the initial test, but then fail when scanned with all other zones.
If one ore more zone reflection are appearing significantly lower than other zones, first clean and inspect your connectors
and ensure the connectors have “clicked” when connecting to the APU. If it persists then look for sources of loss in the
cable. Likely sources are attenuation from small bends, poor splices, or damaged EOLT. Contact Fiber SenSys technical
support if you are unable to return the peak to an acceptable height.
Figure 13.3: Final scan where zones were incorrectly connected to APU.
For detailed descriptions of how to manage repairs and modifications read the repairs sections of the manual System
Repairs and Modifications. After any repairs or modifications the system should be reconfigured and tested. Run through
the cable configuration process. Adding a zone requires the same steps.
Cable status is located under the Cable Configuration tab at the left. This shows the height of the reflections coming back
from each configured zone. It is normal for the peaks to move up and down about 10%. If a single peak is significantly
lower than other peaks, this indicates there is loss on a zone. This could be the result of a damaged cable, EOLT, or
connector.
The relationship between system health, laser current and attenuation step is complicated but in general if the attention
is 0dB, and the laser current is near 100% this indicates large system losses. Fiber SenSys technical support should be
contacted if this is the case.
The only zones displayed on this page will be the zones that have been configured.
Tuning problems should typically be addressed by first contacting Fiber SenSys technical support.
Out of 150 total recordings per zone, you may classify up to 100 recordings. The unclassified recordings are available as
rolling storage. When full, the oldest unclassified recording will be deleted and replaced by the newest recording.
It’s possible to mix up zones which can cause a lot of confusion. It may appear one zone is nonsensitive or has a mystery
signal. To sort out which is which, view each zone in a different browser window. This can be accomplished by opening
the browser a second time and navigating to the make recordings page, or by duplicating the window, typically by right
clicking on your browser tab and selecting “duplicate tab”.
FOURTEEN
SPECIFICATIONS
FIFTEEN
PARTS LIST
SIXTEEN
GLOSSARY
alarm
A signal that is generated by our APUs that indicates the APU has detected an intrusion. The color red is associated
with an alarm.
alarm processing unit
Refers to the Fiber SenSys products used for security.
APU
Acronym for alarm processing unit.
area of interest
An area that identifies a portion of a recording that is important and is visible on a plot of a recording as a shaded
area. Every recording has two areas of interest: one selected by the APU and one selected by the user. When
a recording is first made by the APU, it identifies the portion of the recorded signal that caused the recording to
be made. This area of interest cannot be changed and is most easily seen by looking at a recording on the Make
Recording page.
When modeling a recording, there is a second area of interest that is used to identify the portion of the signal that
the user thinks is important for tuning purposes. Only the alarms that occur within an area of interest are counted
when estimating PD/NAR values. This area of interest is only visible on the Detection Settings page and can be
modified there. Initially this area of interest is the same as the APU’s selected area of interest.
backbone cable
A multi-strand cable made of single mode fiber that caries light along the fence and distributes it to each sensing
zone
cable assembly
A collection of fiber optic components. Components include fiber optic cables, connectors, splices, splitters, splice
trays, node boxes, and other associated hardware. The collection can be of any size from a few splitters to the entire
cable plant around a site. However, cable assembly usually pertains to a smaller cable structure.
end of line terminator (EOLT)
FSI product used to terminate the fiber on a zone.
event
A signal that is generated by our APUs that indicates when the fiber optic cable has been disturbed. APUs are
usually configured so it takes several events to trigger an alarm. The color yellow is often associated with events.
false alarm
An alarm for which there is no corresponding source. These can be caused by bugs or problems internal to the
APU. Not to be confused with nuisance alarm.
false alarm rate
The rate at which a sensor reports false alarms. This is expressed as the number of false alarms over a given time
period.
FAR
Acronym for false alarm rate.
fault
A condition of the system where is cannot guarantee that it can detect intrusions. Faults can be caused by insufficient
signal from the cable plant or internal software bugs.
head end
A head end is a piece of equipment or software that accepts alarm signals and other data from the APU taking
appropriate action when these signals occur. Fiber Commander is an example of a head end.
lead in cable
A multi-strand cable made of single mode fiber that caries light away from the alarm processing unit
NAR
Acronym for nuisance alarm rate.
normally insecure relay
A relay who’s state indicates insecure when deactivated.
normally secure relay
A relay who’s state indicates secure when deactivated.
nuisance alarm
An alarm due to some external nuisance source. Not to be confused with false alarm.
nuisance alarm rate
The rate at which a sensor reports nuisance alarms that are not due to actual intruders. This is expressed as the
number of nuisance alarms over a given time period. For example, a sensor with a NAR of 1 nuisance alarm per
week on average reports an alarm weekly due to some environmental source. You want the NAR to be as low as
possible.
When modeling, the APU software estimates a NAR value using the recordings that have been classified as a
nuisance. In this case, the NAR is a percentage: the number nuisance recordings that report an alarm versus the
total number of nuisance recordings. So if 1 nuisance recording out of 10 report an alarm while modeling, the
NAR will be shown as 10%. Ideally this will be 0%.
nuisance source
Nuisance sources are signals caused by non-intruders detected by the APU. These are usually environmental and
can include wind, rain, animals, equipment near the perimeter, or debris such as tumble weeds hitting the fence.
PD
Acronym for probability of detection.
probability of detection
The probability that a sensor will detect an intruder. This is expressed as a percentage. For example, a sensor with
a 95% PD will detect 19 out of 20 intrusions. You want your PD to be as high as possible.
When modeling, the APU software estimates PD using the recordings that have been classified as alarms.
relay
An electrically operated switch. Asserting the control signal activates the relay flipping its state. When the control
signal is not asserted the relay is said to be deactivated. There are several different types of relays. Form A relays
are open when deactivated. Form B relays are closed when deactivate. Form C relays have two contacts where one
side is open and the other side is closed when the relay is deactivated.
To avoid confusion FSI prefers to use the terms normally secure and normally insecure to describe the default state
of relays.
tamper
An input that allows the APUs to report tamper conditions. This input is often connected to a switch on the
enclosure the APU is mounted in.
A T
alarm, 95 tamper, 96
alarm processing unit, 95
APU, 95 W
area of interest, 95 warning, 97
B Z
backbone cable, 95 zone, 97
C
cable assembly, 95
E
end of line terminator (EOLT), 95
event, 95
F
false alarm, 95
false alarm rate, 95
FAR, 96
fault, 96
H
head end, 96
L
lead in cable, 96
N
NAR, 96
normally insecure relay, 96
normally secure relay, 96
nuisance alarm, 96
nuisance alarm rate, 96
nuisance source, 96
P
PD, 96
probability of detection, 96
R
relay, 96