Optex Fiber SenSys Terrain Defender TD 100 User manual

PM-ENG-090 Rev A Confidential Limited Distribution
Terrain Defender™
TD100™
Installation Manual

Page 2 Confidential Limited Distribution
© Copyright 2021, Fiber SenSys®, Inc. all rights reserved. No part of this
publication may be reproduced or transmitted in any form or by any means,
electronic or mechanical, including photocopy, recording, or any information
storage and retrieval system, without permission in writing from Fiber SenSys, Inc.
This manual is provided by Fiber SenSys, Inc. While reasonable efforts have been
taken in the preparation of this material to ensure its accuracy, Fiber SenSys, Inc.
makes no express or implied warranties of any kind with regard to the
documentation provided herein. Fiber SenSys, Inc. reserves the right to revise this
publication and to make changes from time to time in the content hereof without
obligation of Fiber SenSys, Inc. to notify any person or organization of such
revision or changes.
TD100™is a trademark of Fiber SenSys, Inc. Fiber SenSys®is a registered
trademark of Fiber SenSys, Inc.
Fiber SenSys, Inc.
6175 NE Century Blvd
Hillsboro, OR 97124
USA
Tel: 1-503-692-4430
Fax: 1-503-692-4410
info@fibersensys.com
www.fibersensys.com

Page 3 Confidential Limited Distribution
FCC Interference Statement (Part 15.105 (b))
This equipment has been tested and found to comply with the limits for a Class B digital device,
pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable
protection against harmful interference in a residential installation. This equipment generates,
uses, and can radiate radio frequency energy and, if not installed and used in accordance with
the instructions, may cause harmful interference to radio communications. However, there is no
guarantee that interference will not occur in a particular installation. If this equipment does
cause harmful interference to radio or television reception, which can be determined by turning
the equipment off and on, the user is encouraged to try to correct the interference by one of the
following measures:
-Reorient or relocate the receiving antenna.
-Increase the separation between the equipment and receiver.
-Connect the equipment into an outlet on a circuit different from that to
which the receiver is connected.
-Consult the dealer or an experienced radio/TV technician for help.
FCC Part 15 Clause 15.21:
ly approved by the party responsible for compliance
could void the user's authority to operate the equipment.
conditions: (1) this device may not cause harmful interference, and (2) this device must accept

Page 4 Confidential Limited Distribution
ISED Compliance Statement –Canada
Fiber SenSys Inc. has not approved any changes or modifications to this device by the user.
soit la nature. Tout changement ou toute modific
Industry Canada (IC) regulatory information
This device complies with Industry Canada licence-exempt RSS standard(s). Operation is
subject to the following two conditions: (1) this device may not cause interference, and (2) this
device must accept any interference, including interference that may cause undesired operation
of the device.
Avis de conformité à la réglementation d’Industrie Canada
Le présent appareil est conforme aux
doit pas produire de brouillage
radi
fonctionnement.
Class B digital device notice
This Class B digital apparatus complies with Canadian ICES-003, RSS-Gen and RSS-210.
Cet appareil numérique de la classe B est conforme à la norme NMB-003, CNR-Gen et CNR-
210 du Canada.

Page 5 Confidential Limited Distribution
Table of Contents
1. Introduction .........................................................................................................8
Theory of Operation........................................................................................9
Site Overview................................................................................................11
2. Safety................................................................................................................20
Restricted Access.........................................................................................20
Electrical Safety............................................................................................20
Covers and Panels .......................................................................................20
Inspection.....................................................................................................21
3. System Planning ...............................................................................................22
4. Installing Sensor Cable......................................................................................24
Cable installation overview............................................................................24
Cable Plow/Trenchers...................................................................................24
Planning the Cable Installation......................................................................25
•Width of sensor cable trenches........................................................26
•Soil...................................................................................................27
•Asphalt.............................................................................................27
•Crushed Stone.................................................................................28
•Concrete..........................................................................................29
5. Start-Up Module Assembly (SUMA) / Start-Up Modules (SUM).........................32
Preparing Installation of Start-Up Module Assembly (SUMA) to TD100 Processor
Connection ...................................................................................................34
Start-Up Module Assembly (SUMA), Start-Up Module (SUM), and Sensor Cable
Preparation and Installation ..........................................................................37
•Step 1 ..............................................................................................37
•Step 2 ..............................................................................................37
•Step 3 ..............................................................................................38
•Step 4 ..............................................................................................38
•Step 5 ..............................................................................................39
•Step 6 ..............................................................................................40
•Step 7 ..............................................................................................41
•Step 8 ..............................................................................................41
•Step 9 ..............................................................................................43
•Step 10 ............................................................................................43
•Step 11 ............................................................................................44
•Step 12 ............................................................................................45
•Step 13 ............................................................................................46
•Step 14 ............................................................................................46
•Step 15 ............................................................................................47
•Step 16 ............................................................................................47
•Step 17 ............................................................................................47
•Step 18 ............................................................................................48
•Step 19 ............................................................................................49

Page 6 Confidential Limited Distribution
•Step 20 ............................................................................................50
•Step 21 ............................................................................................50
•Step 22 ............................................................................................51
SUMA Flash Testing.....................................................................................52
•Step 1 ..............................................................................................52
•Step 2 ..............................................................................................52
•Step 3 ..............................................................................................53
•Step 4 ..............................................................................................53
6. TDR8 Relay Module..........................................................................................54
7. TD100 Power Supply Units................................................................................55
TD24PSU .....................................................................................................55
•Battery Backup (Optional)................................................................56
TD24PSU Test Procedure ............................................................................59
•Step 1 ..............................................................................................59
•Step 2 ..............................................................................................59
•Step 3 ..............................................................................................60
•Step 4 (Optional)..............................................................................61
TD48PSU .....................................................................................................64
TD48PSU Test Procedure ............................................................................66
•Step 1 ..............................................................................................66
•Step 2 ..............................................................................................67
•Step 3 ..............................................................................................67
8. Intrusion Testing................................................................................................69
Basic Tests...................................................................................................69
•Walk Testing:...................................................................................69
•Run Testing:.....................................................................................69
•Basic Testing Reference Table: .......................................................69
Advanced Tests............................................................................................70
•Crawl Testing:..................................................................................70
•Crawl Testing Reference Table:.......................................................71
•Run and Jump Testing:....................................................................71
•Run and Jump Testing Reference Table:.........................................71
9. Maintenance, Troubleshooting, and Repair.......................................................73
Maintenance.................................................................................................73
•Visual Inspection Every 90 Days:..................................................73
•TD100 Processor Status Check Every 180 Days: .........................73
•Performance Testing Every 180 Days:..........................................74
•Maintenance and Test Log:..............................................................74
Troubleshooting............................................................................................75
•Cut/Broken Sensor Cable:................................................................75
•Password Reset:..............................................................................77
•TD100 LED Status Table: ................................................................78
•Elevated Nuisance Alarms:..............................................................78

Page 7 Confidential Limited Distribution
10. Grounding .........................................................................................................79
11. Product Specifications.......................................................................................80
......................................................................................80
le..................................................................................80
TD24PSU .....................................................................................................81
TD48PSU .....................................................................................................82
Terrain Defender Sensing Cable (TDSC) and Lead-in Cable........................83
TD Enclosure................................................................................................83
12. Glossary of Technical Terms.............................................................................84

Page 8 Confidential Limited Distribution
1. Introduction
TD100™is a covert buried line intrusion detection sensor. It utilizes two parallel leaky coaxial
cables to create an invisible electromagnetic field that follows the cables around corners and up
and down hills. The transmit (TX) cable creates a field that couples into the parallel receiver
(RX) cable. An intruder moving in proximity to the cables disturbs the coupled signal. Measuring
the time delay between the onset of the coded pulse transmission and the receipt of the change
due to the intruder allows the system to detect and pinpoint cation.
Figure 1. TD100 Processing Unit
TD100 is unique in its use of Multiple Input and Multiple Output (MIMO) Digital Signal Processor
(DSP) to detect and locate intruders using End-to-End , a patented Fiber
SenSys technology. When fully operational to generate an alarm, the intruder must be detected
at the same time and same location by both connected processors. The product provides high
Probability of Detection (PD) and low Nuisance Alarm Rate and False Alarm Rate (NAR/FAR)
detection with unprecedented fail-safe features.
This brief introduction to the technology provides a starting point for those who wish to install the
TD100. It introduces the product components and the way that they can be interconnected to
address various applications.
The information presented herein provides background for the more detailed and subject-
focused manuals that describe the inner workings of TD100.
•Installation Manual
•Web User Interface (WUI) Manual
•Master Controller Manual

Page 9 Confidential Limited Distribution
Theory of Operation
The basic concept behind E2EC is illustrated in Figure 2.
TD100 #1 TD100 #2
d1 d2
TX Cable
RX Cable
In-Line
Connections In-Line
Connections
Lead-in
Cable Lead-in
Cable
More
Sensor
Cables in
Networked
System
Figure 2. System E2EC
The leaky coaxial sensor cable is a standard coaxial cable with an aperture or a continuous slot
in the outer conductor to allow Radio Frequency (RF) energy to couple between the signal
traveling inside the cable to a surface wave traveling outside the cable but bound to the cable.
There are two transmitters and two receivers in each processor - one TX/RX pair looking left
BFigure 2 shows the TX 1 from
TD100 #1 propagating down the cable to illuminate the intruder.
A portion of the energy is reflected along the RX cable to the receiver. This is referred to as Out
and Bf energy as the contra-directional coupling. The time delay between the onset
of the coded pulse and the receipt of the change due to the intruder determines the
location. The same process is repeated by TD100 #2 from the other end of the cables
trace. E2EC requires that the intruder be detected at the same time and at the same location to
be declared as an alarm within one-meter accuracy.
As illustrated in Figure 3,the response measured in dB decays linearly due to cable attenuation.

Page 10 Confidential Limited Distribution
TD100 #2
TD100 #1
TX 1
RX 1
TX 2
RX 2
Uniform Sensitivity
Response in dB
Terrain Defender Sensing Cable (TDSC)
RX 1 Response RX 2 Response
Response in dB
Figure 3. End-to-End Correlation (E2EC)
The E2EC process takes into account the complex product of the signal seen from both ends of
the cables. The result is the uniform sensitivity shown in red on the above graph.
The detection zone created around the TX and RX cables is illustrated in Figure 4.
1 to 2 m (3.3 to 6.6 ft)
Typically
23 cm (9")
Sensor Cables
Detection Field
2 to 3 m (6.6 to 10 ft)
Up to 1 m (3.3 ft)
Figure 4. Detection Zone Cross Section

Page 11 Confidential Limited Distribution
The blue ovals depict contours of equal sensitivity. The thresholds are typically set to detect a
person up to 1 meter above ground and 0.5 meters on either side of the cable pair.
A TD100 system is composed of the following components:
•TD100 Processor Kit
oProcessor (Lead, Middle, or End) with SMA Terminators (SMAT)
•Lead-in Cable - pre-installed ferrite beads, 10 m (30 ft) pair (included in TD100 kit)
oAdditional lead-in lengths available, contact your Fiber SenSys sales rep for
details
•Start-Up Module Assembly (SUMA) in-line connections (included in TD100 kit)
oStart-Up Module (SUM)
•Sensor Cable
oTDSC 400M A 400 m (1312 ft) spool of sensing cable (P# 600-44558)
•Web User Interface (WUI) Calibration of the system through the TD100 TCP/IP
connection
•TD24PSU 24VDC Linear Power Supply w/ battery backup capability (P# 980-64560)
•TD48PSU 48VDC Linear Power Supply w/enclosure (P# 980-94233)
•TD Tool Kit Tools necessary for TDSC stripping and connecting lead-in and TD100
connections (P# 980-64263)
•TD Enclosure (Optional) Enclosure for mounting TD100 (P# 980-84232)
•TDR8 Relay Module (Optional) I/O module with 8 outputs and 4 inputs (P# 980-
64241)
•Master Controller (Optional) System management and monitoring (P# 980-04235)
Site Overview
Every site is unique. To properly plan for varying site conditions, aspects of the site such as soil
type and condition, water flow, and metal structures should be noted so that the proper TD100
components and installation method can be selected to optimize performance.
Almost every site that can utilize TD100 can be described using the following terminology:
•Single or Multi-Processor Site up to 400 meters of cable between processors
•Open or Closed Perimeters (Straight line or closed loop)
There are three possible processor positions:
•Lead the first processor in any system
•Middle a processor in a multi-processor site between the Lead and End
•End the last processor in a system with more than one unit
There are two basic ways that a processor can detect and locate an intruder:
•Dual-Ended - E2EC a processor on both ends of cables
•Single-Ended system with cut cable, failed processor, or by design (No E2EC)

Page 12 Confidential Limited Distribution
The RF Ports of each processor are terminated by one of the following:
•Sensor cable with a processor at both ends of cables
•SMA terminator on TD100 TX/RX ports
•Sensor cable with End of Line Terminators (EOLT)
There are many possible combinations of the above configurations to describe a perimeter and
the mode of operation when one considers the possible ways to terminate a processor.
the whole perimeter or only a part of the perimeter
enter the perimeter without passing over the sensor cables. There are some exceptions, such
as a perimeter that includes a building as part of the perimeter.
A four-Dual-E and Single-Endedoperation is
shown in Figure 5.
Four TD100 Dual Ended
E2EC System
RX2 RX1
TD100 Lead
TX2 TX1
TX (protected side)
(unprotected side) RX
X
Double Ended Operation (E2EC)
(Same Place & Time)
Up to the cut from each side
Cut Sensor Cable
Sensor Cable
RX2 RX1
TD100 Mid #1
TX2 TX1
TX1 TX2
TD100 Mid #2
RX1 RX2
RX2 RX1
TD100 End
TX2 TX1
TD24PSU
or
TD48PSU
TD24PSU
or
TD48PSU
Figure 5. Four Processor Closed Perimeter
The TD100 processors are powered over the sensor cables. DC power is supplied over the RX
and TX cables for redundancy. In high-security sites, it is common to install multiple TD24PSUs

Page 13 Confidential Limited Distribution
or TD48PSUs along the perimeter to provide additional redundancy in a power supply failure
scenario. These redundancies would adapt for an open circuit or short circuit cable fault.
E2EC is unique to Terrain Defender products. E2EC describes a means of processing response
information from both ends of the cables in a process referred to as Dual-Ended operation. To
generate an alarm, the intruder(s) must be detected by the processors at both ends of the
cables at the same time and the same physical location(s) along the length of sensor cables.
An important benefit of E2EC is its l-lead-in, sensor cable, or processor
should fail, the two adjacent processors can revert to Single-Ended operation whereby each
processor detects and locates intruders on either side of any cable or processor fault. The
system will indicate the precise location of a cut or damaged cable.
The processor on the perimeter is in the first position. The processor is in the last
position along the perimeter. All other processors are referred to as Middleprocessors
numbered from Lead to End.
Cables start at TX/RX 1 of a processor and terminate at TX/RX 2 of the following processor.
Range Bin numbering increases with distance from each processor. The Range Bins for TX/RX
1 and 2 bisect to create Correlated Bins (C-Bins). C-Bin numbering is the sequence of the
complementary TX/RX 1 and TX/RX 2 Range Bins. When the target location is annunciated in
meters or feet, it is measured at the processor first in line. TX/RX 1 distances are positive, and
TX/RX 2 distances are negative.
Figure 6. Graph showing C-Bins along the x-axis
The cut sensor cable in Figure 5 illustrates Fail-Safe Mode based on Single-Ended operation.
Both TX/RX 1 and TX/RX 2 detect and locate intruders up to the cable cut. When a Cable Fault
is annunciated, the processor will automatically switch into Single-Ended operation in case of a
failure, or it may be done manually if preferred.
The different types of processor terminations are illustrated in Figure 7.

Page 14 Confidential Limited Distribution
X2
Single-Ended
Dual-Ended - E2EC
SMA
Terminator
TX
RX
X2 RX1
TX1X2
X2 RX1
TX1
EOLT
Figure 7. Processor Termination
When only one TX/RX pair of a processor is being used, the other pair should have SMA
terminators installed.
As previously described Single-Ended operation allows TD100 to provide Fail-Safe operation.
Other leaky coaxial cable sensors on the market today all operate in Single-Ended Mode.
Figure 8. SMA Terminator (left), installed on TD100 (right)
The various connections on a TD100 processor are illustrated in Figure 9.

Page 15 Confidential Limited Distribution
TD100
TX 1
TX 2
RX 2
RX 1
Redundant Power
SUM SUM
SUM SUM
SUMA
Lead-in Cables
(TX/RX in separate conduits)
SUMA
Master
Controller
Ethernet PC/WUI
Network
Coil of excess Lead-in
Sensor Cables
Start-up Module
Assembly
Start-up Module
TD24/48PSU
(24 or 48VDC)
Figure 9. Connections to the TD100
The TD100 processor connects to the sensor cables using factory-made lead-in cables. The
lead-in cables are 10 m (30 ft) long, with connectors and ferrite beads attached. For a Middle
processor, two TX lead-in cables and two RX lead-in cables with the TX and RX cables are
installed in separate PVC conduit. Power is provided to the processor from the Start-Up Module
Assembly (SUMA) over the lead-in cables. Power cables may run inside the TX/RX conduits or
inside their own isolated conduit(s).
Excess lead-in cable is buried in a loop next to the respective TX or RX SUMA after the end of
the conduit leading to them. Install clamp-on ferrite beads to the spare lead-in coils. Lead-in
cable should maintain a bend radius of 9 cm (3.5 in) or greater, take note of this inside the
TD100 enclosure and coils at the SUMA location.
The processor should be mounted in an outdoor metal enclosure or inside a site facility on the
protected side of the perimeter. The TD100 enclosure can mount to a fence post or strut
structure. The cables connecting to the processor enter through the bottom of the enclosure via
conduit, as shown in Figure 10. The conduit is routed to the edge of the detection zone, about .5
m (1.6 ft) from the nearest cable. The conduit protects the cables from accidental cutting or
crushing.

Page 16 Confidential Limited Distribution
Figure 10. TD100 inside optional TD Outdoor Enclosure
Each lead-in cable connects to the sensor cable inside the SUMA, a waterproof enclosure. The
SUMAs -enclosures are
made utilizing a Start-Up Module (SUM). The SUM uses spring-loaded lever-action terminal
blocks to make the power and sensor connections, then an SMA bulkhead for the lead-in
connection.
Lightning protection circuitry is provided at the SUM. The ground connection is made from the
SUM stainless steel enclosures ground lug then routed to a ground rod or plate installed
midway between the sensor cables and SUMAs.

Page 17 Confidential Limited Distribution
TD100
TX 1
TX 2
RX 2
RX 1
Ground Rod/Plate
TD24/48PSU
(24 or 48VDC)
Ground Rod/Plate
SUM SUM
SUM SUM
SUMA
10Earth to
Ground resistance
Centered between SUMA
SUMA
Figure 11. System grounding
Power is provided to the sensor cables at the SUM. For Fail-Safe operation, DC power is
supplied independently to the TX and RX cables. Each processor collects its power over the
lead-in cables with a diode ORarrangement so that one can withstand either an open or
shorted sensor cable failure.
Figure 12. TX and RX Lead-In Cables
Heat shrink secured ferrite beads
Color-coded cable ends

Page 18 Confidential Limited Distribution
TD100
Lead
TD24PSU
or
TD48PSU
TD100
Middle TD100
End
TD100
Middle
TD100
Middle (48VDC)
End (24VDC)
TD100
Middle
400 m TDSC 400 m TDSC 400 m TDSC 400 m TDSC 400 m TDSC
Two or more power supply units are required for power redundancy.
Voltage drops as power passes down the Terrain Defender Sensor Cable (TDSC)
from each TD100
TD24PSU can power up to 3 units TD48PSU can power up to 6 units
Figure 13. System power with single TD24PSU or TD48PSU
The Lead Processor typically connects to the Master Controller via Ethernet cable. For
redundant operation, the End Processor can also connect to the same or a separate Master
Controller.
During installation, connect a computer to a TD100 processor via the RJ-45 connector using a
standard Ethernet cable and enter the TD100 default IP address 192.168.0.1. Enter username:
Admin password: Admin to connect to the Web User Interface (WUI). While the WUI has some
of the same displays as the Master Controller, it is more focused on setting up a processor.
TD100 Default Password Table:
System Level
Username
Password
User 1
oper
oper
User 2
oper2
oper2
Administrator
admin
admin
Please see the Web User Interface (WUI) Manual for more information on the TD100 user
interface, such as cable calibration, tuning for intrusion detection, and relay setup.

Page 19 Confidential Limited Distribution
This Introduction to TD100 provides the background for the reader to be ready to understand
and appreciate the detailed information provided in the following manuals:
1. Installation Manual Describes how one should design and install TD100 at a specific
site. It addresses how to install the cables and other components to optimize the sensor
performance at that site.
2. Web User Interface (WUI) Manual The
connection with the processor using a web browser. While some of its features are in
common with those available using the Master Controller, the WUI is even more
detailed. The manual walks through the pages and tabs with example screen captures
and descriptions of how each feature can be used.
3. Master Controller Manual Most sites with more than a couple of processors will
benefit from a Master Controller. It provides the interface to the outside world. Often it is
via a custom software interface to a Head-End Display and Control system. On other
occasions, it drives a relay interface. Most importantly, it improves system performance
and provides maintenance and diagnostic tools addressing all the processors from the
Head-End location. The manual steps through all the pages and tabs, showing screen
captures and describes how each feature can be used.
This section contains information to help ensure safety and the proper operation of equipment.
Please follow these instructions carefully and keep them accessible for future reference. When
using the TD100, use only attachments and accessories that have been specified by Fiber
SenSys, and refer all servicing to qualified personnel.

Page 20 Confidential Limited Distribution
2. Safety
As comprehensive as these manuals are, TD100 is intended to be installed by trained
professionals having experience in security system construction and safety.
The following icons may appear throughout this manual:
CAUTION: Identifies conditions or practices that could result in damage to equipment
and/or loss/contamination of data.
WARNING: Identifies conditions or practices that could result in non-fatal personal
injury.
Restricted Access
The TD100 (and associated accessories such as TD24PSU, TD48PSU, and TDR8) is intended
only for installation in restricted access locations, where access is restricted using a lock and
key (or other means of security) controlled by the authority responsible for the location, and
where access can only be gained by service persons or other users who have been instructed
about the reasons for the restrictions applied to the location and about any precautions that
need to be taken.
Electrical Safety
If the TD100 is damaged or malfunctions, disconnect power to the APU. Do not use the APU if
any of the following conditions exist:
It is visibly damaged.
It does not operate as expected.
It has been subjected to prolonged storage under adverse conditions.
It has been damaged during shipment.
Do not put the TD100 into service until qualified service personnel have verified its safety.
Covers and Panels
There are no user-serviceable parts inside the TD100. To avoid personal injury, do not remove
any of the TD100 covers or panels without being instructed to by Fiber SenSys. The product
warranty is void if any factory seal is broken. Do not operate the product unless the covers and
panels are installed. The TD100 has an internal tamper switch that registers the removal of the
TD100 cover.
Table of contents
Other Optex Accessories manuals

Optex
Optex OA-FLEX T User manual

Optex
Optex OA-FLEX AIR T User manual

Optex
Optex X-Zone T User manual

Optex
Optex VIBRO User manual

Optex
Optex Accurance-3D A3001CB Manual

Optex
Optex RXC-DT-X5 User manual

Optex
Optex i-OneX T User manual

Optex
Optex OA-PRESENCE T Installation manual

Optex
Optex GEN-DC User manual

Optex
Optex ViiK Exposed Type OVS-02GT Series User manual

Optex
Optex CVS2 User manual

Optex
Optex OA-FLEX LITE User manual

Optex
Optex ProSafe OA-Presence User manual

Optex
Optex OAM-DUAL II User manual

Optex
Optex OA AXIS T User manual

Optex
Optex Elite OA-603 User manual

Optex
Optex Pro Swing PREMIER T User manual

Optex
Optex HX-80N User manual

Optex
Optex OVS-01CC User manual

Optex
Optex OA-4500S(E) User manual