Optex Fiber SenSys Terrain Defender TD 100 Installation Manual page 13

Table of Contents

Advertisement

or TD48PSUs along the perimeter to provide additional redundancy in a power supply failure
scenario. These redundancies would adapt for an open circuit or short circuit cable fault.
E2EC is unique to Terrain Defender products. E2EC describes a means of processing response
information from both ends of the cables in a process referred to as Dual-Ended operation. To
generate an alarm, the intruder(s) must be detected by the processors at both ends of the
cables at the same time and the same physical location(s) along the length of sensor cables.
An important benefit of E2EC is its "Fail-Safe" operation. If a lead-in, sensor cable, or processor
should fail, the two adjacent processors can revert to Single-Ended operation whereby each
processor detects and locates intruders on either side of any cable or processor fault. The
system will indicate the precise location of a cut or damaged cable.
The "Lead" processor on the perimeter is in the first position. The "End" processor is in the last
position along the perimeter. All other processors are referred to as "Middle" processors –
numbered from Lead to End.
Cables start at TX/RX 1 of a processor and terminate at TX/RX 2 of the following processor.
Range Bin numbering increases with distance from each processor. The Range Bins for TX/RX
1 and 2 bisect to create Correlated Bins (C-Bins). C-Bin numbering is the sequence of the
complementary TX/RX 1 and TX/RX 2 Range Bins. When the target location is annunciated in
meters or feet, it is measured at the processor first in line. TX/RX 1 distances are positive, and
TX/RX 2 distances are negative.
Figure 6. Graph showing C-Bins along the x-axis
The cut sensor cable in
Figure 5
illustrates Fail-Safe Mode based on Single-Ended operation.
Both TX/RX 1 and TX/RX 2 detect and locate intruders up to the cable cut. When a Cable Fault
is annunciated, the processor will automatically switch into Single-Ended operation in case of a
failure, or it may be done manually if preferred.
The different types of processor terminations are illustrated in
Figure
7.
Confidential – Limited Distribution
Page 13

Advertisement

Table of Contents
loading

Table of Contents