The Intrusion Detection System Includes a management application that is used to set up:
- Discrete zones, as required
- Configure alarm detection criteria
- Assign alarm detection threshold
- Configure measurement range
- Set up system alarms (system operation, fibre break)
Alarms are managed through the surveillance management application with a graphical interface showing the schematic layout of the pipeline network on a customised screen. On receipt of a warning, a message will alert the operator, and a marker will indicate the type of event and highlight its location on the pipeline network map.
The operator will be presented with further information in the alarm window that includes the, time label and location. Every alarm will receive a unique alarm ID and all data associated with the alarm (including the signature data and operator notes) are stored locally on a database.
The Intrusion Detection System’s user interface is fully configurable and it provides system operators the means to display the monitored pipelines and process the alarms.