Xtrails ADPRO PRO-18 Technical manual

ADPRO
®
PRO Series
PIR PIDS — Passive Infrared
Perimeter Intrusion Detection Systems
Planning and
Commissioning
Manual
July, 2012
Doc. 20780_03


Doc. 20780_03 i
A
DPRO Passive-Infrared (PIR) PRO Series by Xtralis Planning and Commissioning Manual
Disclaimer
The content of this document is provided on an "as is" basis. No representation or warranty (either express or implied) is made as to the
completeness, accuracy or reliability of the contents of this document. The manufacturer reserves the right to change designs or
specifications without obligation and without further notice. Except as otherwise provided, all warranties, express or implied, including
without limitation any implied warranties of merchantability and fitness for a particular purpose are expressly excluded.
Intellectual Property and Copyright
This document includes registered and unregistered trademarks. All trademarks displayed are the trademarks of their respective owners.
Your use of this document does not constitute or create a licence or any other right to use the name and/or trademark and/or label. This
document is subject to copyright owned by Xtralis AG ("Xtralis"). You agree not to copy, communicate to the public, adapt, distribute,
transfer, sell, modify or publish any contents of this document without the express prior written consent of Xtralis.
General Warning
This product must only be installed, configured and used strictly in accordance with the General Terms and Conditions, User Manual and
product documents available from Xtralis. All proper health and safety precautions must be taken during the installation, commissioning
and maintenance of the product. The system should not be connected to a power source until all the components have been installed.
Proper safety precautions must be taken during tests and maintenance of the products when these are still connected to the power
source. Failure to do so or tampering with the electronics inside the products can result in an electric shock causing injury or death and
may cause equipment damage. Xtralis is not responsible and cannot be held accountable for any liability that may arise due to improper
use of the equipment and/or failure to take proper precautions. Only persons trained through an Xtralis accredited training course can
install test and maintain the system.
Liability
You agree to install, configure and use the products strictly in accordance with the User Manual and product documents available from
Xtralis.
Xtralis is not liable to you or any other person for incidental, indirect, or consequential loss, expense or damages of any kind including
without limitation, loss of business, loss of profits or loss of data arising out of your use of the products. Without limiting this general
disclaimer the following specific warnings and disclaimers also apply:
Fitness for Purpose
You agree that you have been provided with a reasonable opportunity to appraise the products and have made your own independent
assessment of the fitness or suitability of the products for your purpose. You acknowledge that you have not relied on any oral or written
information, representation or advice given by or on behalf of Xtralis or its representatives.
Total Liability
To the fullest extent permitted by law that any limitation or exclusion cannot apply, the total liability of Xtralis in relation to the products is
limited to:
(i) in the case of services, the cost of having the services supplied again; or
(ii) in the case of goods, the lowest cost of replacing the goods, acquiring equivalent goods or having the goods repaired.
Indemnification
You agree to fully indemnify and hold Xtralis harmless for any claim, cost, demand or damage (including legal costs on a full indemnity
basis) incurred or which may be incurred arising from your use of the products.
Miscellaneous
If any provision outlined above is found to be invalid or unenforceable by a court of law, such invalidity or unenforceability will not affect
the remainder which will continue in full force and effect. All rights not expressly granted are reserved.
Document Conventions
The following typographic conventions are used in this document.
Convention Description
Bold Used to denote: emphasis
Used for names of menus, menu options, toolbar buttons
Italics Used to denote: references to other parts of this document or other documents. Used for the result of an
action
The following abbreviations are used in this document.
Abbreviation Description
AA Aperture Angle
CZ Creep Zone
DR Detection Rate
ESD Electrostatic Sensitive Device
FAR False Alarm Rate
GND Ground
QSG Quick Setup Guide
PID Perimeter Intrusion Detector

ii Doc. 20780_03
Planning and Commissioning Manual ADPRO Passive-Infrared (PIR) PRO Series by Xtralis
PIDS Perimeter Intrusion Detection System
PIR Passive Infrared
The following icons conventions are used in this document.
Convention Description
CAUTION!
This icon is used to indicate that there is a danger to equipment. The danger could be loss of data, physical
damage, or permanent corruption of configuration details.
WARNING!
This icon is used to indicate that there is a danger of electric shock. This may lead to death or permanent
injury.
WARNING!
This icon is used to indicate that there is a danger of inhaling dangerous substances. This may lead to
death or permanent injury.
DANGER!
This icon is used to indicate that there is a danger of falling down! There is acute danger, when working with
unsecured ladders. Unsecured ladders can slip and cause a fall that can lead to serious injuries.
Additional information: refer to local „Safety at Work Act“.
NOTE!
This icon is used to highlight useful advice and recommendations as well as information for an efficient and
trouble-free operation.
Tradename statement
ADPRO is a registered trademark of Xtralis AG Pty Ltd.
Contact Us
The Americas +1 781 740 2223 Asia +852 2916 8876 Australia and New Zealand +61 3 9936 7000
UK and Europe +44 1442 242 330 Middle East +962 6 588 5622
www.xtralis.com

Doc. 20780_03
A
DPRO Passive-Infrared (PIR) PRO Series by Xtralis Planning and Commissioning Manual
Contents
1General.........................................................................................................................................1
1.1Information about this Manual.........................................................................................1
1.2Warranty............................................................................................................................1
1.3Customer Service and Product Monitoring Service......................................................1
2Safety...........................................................................................................................................2
2.1User’s Responsibility .......................................................................................................2
2.2Personal Requirements and Qualifications....................................................................2
2.3Intended Use .....................................................................................................................2
3Description and Introduction.....................................................................................................3
4Transportation, Packaging and Storage...................................................................................4
4.1Transportation ..................................................................................................................4
4.2Packaging..........................................................................................................................4
5Planning – Notes.........................................................................................................................5
5.1Fundamental Analysis......................................................................................................5
5.1.1Perimeter – Definition.............................................................................................5
5.1.2Applications not Covered........................................................................................6
5.1.3Performance Capabilities of Perimeter Security Systems ......................................6
5.1.4Interoperability with other Security and Safety Systems.........................................6
5.1.5Object Location (Site Position) and Environment – Analysis..................................7
5.2Planning – Key Points......................................................................................................9
5.2.1Nature (Grass, Trees, Animals)..............................................................................9
5.2.2Traffic (Vehicles, Equipment, Persons) ..................................................................9
5.2.3Climatic Conditions (Sun, Wind, Storms, Rain, Hail, Fog)......................................9
5.2.4Geographical Position ..........................................................................................11
5.2.5Special Areas of Application (such as Hazardous Areas) ....................................11
5.3Design and Choice of Detector......................................................................................11
5.3.1A coherent design raises the cost to the intruder and puts him at greater risk of
discovery..............................................................................................................11
5.3.2Saving Time .........................................................................................................12
5.3.3Advantages of PRO PIR Detectors over other Technology..................................12
5.3.4Different Principles for Detectors..........................................................................13
5.3.5Barrier or Curtain Detector ...................................................................................13
5.3.6Surface or Volumetric Detector ............................................................................14
5.3.7Directional Detection ............................................................................................15
5.3.8Special Detectors .................................................................................................15
5.4Detector Placement (Typical Design Recommendation).............................................16
5.4.1Simple Monitoring of an Enclosure with a Simple Boundary ................................16
5.4.2Monitoring of an enclosure with particularly careful monitoring of the corners .....17
5.4.3Continuous Monitoring of an Area ........................................................................18
5.4.4Extensive Monitoring, or Monitoring of Borders, such as of a Country.................19
5.4.5Monitoring of a Building with Dedicated Camera Surveillance .............................20
5.5False Alarms (according to DIN European Standard 0833-1).....................................21
5.5.1Causes of False Alarms .......................................................................................21
5.5.2No Alarm ..............................................................................................................22
6Installation.................................................................................................................................24
6.1Detector Installation .......................................................................................................24
6.1.1Safety Instructions for Installation.........................................................................24

Doc. 20780_03
Planning and Commissioning Manual ADPRO Passive-Infrared (PIR) PRO Series by Xtralis
6.1.2Wiring .................................................................................................................. 24
6.1.3Mounting.............................................................................................................. 24
6.1.4Alignment ............................................................................................................ 26
7Operating Modes...................................................................................................................... 28
7.1Selectable Operating Modes......................................................................................... 28
7.1.1Modes.................................................................................................................. 28
8Commissioning........................................................................................................................ 30
8.1Walk Test........................................................................................................................ 30
8.1.1Walk Test – Hardware Mode ............................................................................... 30
8.1.2Walk Test – Hardware Operation with CT-PRO Wireless Walk Tester ............... 31
8.1.3Receiver .............................................................................................................. 31
8.1.4Transmitter .......................................................................................................... 31
8.1.5Walk Test – Software Operation.......................................................................... 34
9Functions.................................................................................................................................. 36
9.1Sensitivity Settings........................................................................................................ 36
9.1.1Sensitivity Settings – Hardware Operation (PRO-18(H), 18W(H), 30, 40, 45(H),
45D(H) only)........................................................................................................ 36
9.1.2Sensitivity Settings – Software Operation ........................................................... 36
9.2Adaptive Threshold Discrimination (ATD)................................................................... 37
9.3Vandalism Protection.................................................................................................... 38
9.4Intelligent Digital Signal Processing............................................................................ 39
9.5Internal Temperature Compensation ........................................................................... 39
9.6Pulse Count.................................................................................................................... 39
9.7Directional Detection..................................................................................................... 40
9.8Mounting Height Adjustment........................................................................................ 40
9.9Internal Heating Device................................................................................................. 41
10Software Installation................................................................................................................ 42
10.1System Requirements................................................................................................... 42
10.2Install Software .............................................................................................................. 42
10.2.1Install on Windows 7 Platform ............................................................................. 42
10.2.2Install on XP Platform .......................................................................................... 45
10.2.3Configure Communication Port ........................................................................... 48
10.3Use Software.................................................................................................................. 51
10.3.1Select Detector .................................................................................................... 53
10.3.2Select Communication Port ................................................................................. 55
10.3.3File....................................................................................................................... 55
10.3.4Option.................................................................................................................. 55
10.3.5Scope .................................................................................................................. 62
10.3.6Tool ..................................................................................................................... 64
10.4Uninstall Software.......................................................................................................... 70
11Normal Operation..................................................................................................................... 71
11.1Connection Options....................................................................................................... 71
11.1.1Contacts .............................................................................................................. 71
11.1.2Permanent Links.................................................................................................. 71
12Accessories.............................................................................................................................. 72
12.1IFM-485-ST - Interface Module RS-485......................................................................... 72
12.2AD 851 - Alignment Telescope ..................................................................................... 72

Doc. 20780_03
A
DPRO Passive-Infrared (PIR) PRO Series by Xtralis Planning and Commissioning Manual
12.3CT PRO2 - Wireless Walk Tester...................................................................................72
12.4ZA P-L1 – Pole-mount Attachment................................................................................73
12.5AD653 - Pole-Mount for PRO-250H................................................................................73
12.6PRO-CMB-W - Cable Managed Bracket ........................................................................73
12.6.1PRO-CMB-S — Tamper-Switch (PRO-CMB-S) ...................................................74
13Diagram......................................................................................................................................76
13.1Terminal – Top view (all models except PRO-250H)....................................................76
13.2Terminal – Side view (all models except PRO-250H)...................................................76
14Electrical Connections .............................................................................................................77
14.1Electrical Pin Assignment for Detectors ......................................................................77
14.1.1All Models (except PRO-250H) ............................................................................77
14.1.2PRO-250H............................................................................................................77
14.2Connection of the interface module IFM-485-ST .........................................................77
14.2.1A single detector to the interface module IFM-485-ST .........................................77
14.2.2Several detectors to the interface module IFM-485-ST........................................78
15Dimensions................................................................................................................................80
16Model Specifications ................................................................................................................81
16.1Volumetric Detectors......................................................................................................83
16.1.1ADPRO Passive-IR-Detector PRO-18 and PRO-18H ..........................................83
16.1.2ADPRO Passive-IR-Detector (PIR) PRO-18W and PRO-18WH ..........................84
16.1.3ADPRO Passive-IR-Detector (PIR) PRO-30 ........................................................85
16.1.4ADPRO Passive-IR-Detector (PIR) PRO-40 ........................................................85
16.1.5ADPRO Passive-IR-Detector (PIR) PRO-51 ........................................................86
16.1.6ADPRO Passive-IR-Detector (PIR) PRO-85 and PRO-85H.................................87
16.2Curtain Detectors (Barrier Detectors)...........................................................................88
16.2.1ADPRO Passive-IR-Detector (PIR) PRO-45, PRO-45H and PRO-45H-IP65.......88
16.2.2ADPRO Passive-IR-Detector (PIR) PRO-45D, PRO-45DH and PRO-45DH-IP6589
16.2.3ADPRO Passive-IR-Detector (PIR) PRO-100 and PRO-100H.............................89
16.2.4ADPRO Passive-IR-Detector (PIR) PRO-250H....................................................90
17Maintenance and Service.........................................................................................................92
17.1Safety...............................................................................................................................92
17.2Environmental Protection..............................................................................................92
17.3Recommendations..........................................................................................................92
18Troubleshooting........................................................................................................................93
18.1False Alarms ...................................................................................................................93
19Disassembly and Disposal.......................................................................................................94
19.1Safety...............................................................................................................................94
19.2Environmental Protection..............................................................................................94
19.3Measures before Disassembly ......................................................................................94
20Product Overview .....................................................................................................................95


Doc. 20780_03 1
A
DPRO Passive-Infrared (PIR) PRO Series by Xtralis Planning and Commissioning Manual
1General
1.1 Information about this Manual
Use of the Manual This manual allows the safe and efficient installation and
handling of the device. A prerequisite for proper function of the
device is to comply with all the information and the instructions
in this manual.
Obligation to read This manual must be read carefully before the installation of the
device.
Images in this
Manual Images in this manual are provided for basic understanding
only and can vary depending on the version of the device.
Loss of the Manual In the event of loss of this manual, a replacement can be
ordered from Xtralis. See page ii for contact details.
Information in this
Manual The information and safety instructions in this manual have
been compiled in accordance with current standards,
guidelines and rules, using the latest technology and they are
based on many years of experience.
The scope of delivery or the performance of the device may
vary depending on optional order items, production of special
versions or the latest technical modifications to the
descriptions and representations given here.
1.2 Warranty
Location The terms of warranty are set out in the purchase agreement
and the general terms and conditions of the manufacturer.
In Principle The manufacturer will make the final decision with respect to a
warranty claim relating to the return of any defective parts,
possibly after visiting the site.
The warranty period of the device is not extended through the
replacement of defective parts.
Any changes or major repairs by the user or a third party
without the written consent of the manufacturer will nullify the
warranty.
1.3 Customer Service and Product Monitoring Service
Customer Service In case of problems and issues that cannot be solved by using
this manual and for technical information, contact our
customer service. See page ii for contact details.
Product Monitoring With the aim of continuously improving our products, we are
interested in learning about experience gained from using the
device.
We welcome information about experiences in dealing with
device malfunctions during operation.
Please always inform the manufacturer in the event of
accidents or near misses.

2 Doc. 20780_03
Planning and Commissioning Manual ADPRO Passive-Infrared (PIR) PRO Series by Xtralis
2Safety
This chapter gives an overview of all important aspects of safe and trouble-free use. Failure
to observe the instructions and warnings in this handbook can lead to injury or death.
2.1 User’s Responsibility
General The instructions in this handbook are for the safety of the user
and the prevention of accidents. Environmental regulations
that may apply to the location of the unit must also be
observed.
Perfect technical
condition To guarantee perfect technical condition the advice on
maintenance in this handbook should be followed.
2.2 Personal Requirements and Qualifications
In this handbook the following qualifications for various tasks will be assumed:
Electricians Electricians have the training, experience and knowledge of
standards, regulations and procedures that qualify them to
work on electrical systems knowing the relevant risks.
System Integrators Qualified system integrators have the training, experience and
knowledge of standards, regulations and procedures that
qualify them to work on IT systems knowing the relevant risks.
2.3 Intended Use
The unit should not be used in areas where there is a danger of explosions or where
dangerous substances are used.

Doc. 20780_03 3
A
DPRO Passive-Infrared (PIR) PRO Series by Xtralis Planning and Commissioning Manual
3Description and Introduction
The detector enables motion detection based on infra-red technology and high-precision
mirror optics. The unit registers differences in temperature between mobile objects and a
stationary background. The alarm threshold of the detector can be adjusted to external
factors such as ambient conditions. Interference can be filtered out by sophisticated signal
analysis.
The detector is available in models with nominal ranges up to 150 m in length and 30 m in
width. Curtain detectors, for use in narrow areas over long and medium ranges give
uninterrupted coverage of detection. Volumetric detectors monitor the whole of a field of
vision. Full technical information on all available models is given in chapter 16.

4 Doc. 20780_03
Planning and Commissioning Manual ADPRO Passive-Infrared (PIR) PRO Series by Xtralis
4Transportation, Packaging and Storage
4.1 Transportation
NOTE!
To avoid damage, the unit should be transported in its original
packaging.
4.2 Packaging
Packaging
The unit is packaged for normal transportation and storage conditions. All the material used
in the packaging is environmentally friendly. The packaging protects the unit from damage in
transit, corrosion and other damage. The packaging should therefore not be destroyed but
simply removed before installation.
Handling of the packaging
If the packaging is no longer needed, it must be disposed of properly in accordance with
applicable laws and local regulations.
WARNING!
Environmental damage can be caused by improper disposal!
Packaging materials are valuable raw materials that can often be
reused or recycled, so dispose of them in an environmentally friendly
way, and comply with local disposal regulations.
Unpackaging
The detector is typically delivered as a standalone product together with a Quick Setup
Guide (QSG); no further documentation is included. Documentation and utilities such as the
latest version of this ADPRO PRO PIR Planning and Commissioning Manual, the ADPRO
PRO PIR data sheets, ADPRO PRO PIR brochures are available for download from the
www.xtralissecurity.com Xtralis Security Solutions Support Site.
Please unpack the detector heeding customary Electrical, Electrostatic Sensitive Device
(ESD) and safety precautions and proper grounding.
CAUTION!
Disassembling the detector can cause permanent damage and will
void the warranty.
Operating the detector outside of the specified input voltage range or
the specified operating temperature range can cause permanent
damage.
A detector contains electrostatic discharge sensitive electronics and
should be handled appropriately.

Doc. 20780_03 5
A
DPRO Passive-Infrared (PIR) PRO Series by Xtralis Planning and Commissioning Manual
5Planning – Notes
Perimeter (‘peri’, from the Greek for ‘round about’) security measures have been in use for
centuries, if not for millennia. Spears, palisades, walls and moats have all been used as
effective defensive measures.
These generally very effective perimeter security mechanisms were intended not to let
potential attackers get close to the actual physical barriers (such as drawbridges or castle
walls), or at least to make this difficult for them. From very early on, then, measures were
taken and defensive force was used.
Current, modern perimeter security measures differ only in the measures (fences) and
devices (detectors) used from a historical castle moat. Not in the basic principle of a
concept of protection.
In addition to mechanical security systems, a variety of electronic detection and verification
measures are now available. Together with well-planned organisational measures, it is
therefore possible to make a real contribution to protection from unauthorised access, theft,
robbery, burglary and sabotage attacks such as arson.
But such systems can also be used for the protection of life and limb. An example of this
might be a deer crossing warning system which, in conjunction with electronic traffic lights,
prevents accidents. Or a monitoring system for platforms at transit stations, so that no one is
endangered by the suction of air from passing trains.
These non-binding planning notes are intended as a guide for insurance companies,
consultants, specifiers, layout engineers, judges, integrators, and of course users, to show
how through carefully planned perimeter security systems a reduction in risk in anticipation
of any possible threat can be achieved, as part of a wholistic plan for property security.
Because of the diversity and uniqueness of the sites and objects to be secured, and their
individual environments, the following can only go into the fundamentals. Possible solutions
and concepts will be presented by means of typical and commonly occurring cases.
5.1 Fundamental Analysis
5.1.1 Perimeter – Definition
For the purpose of these planning notes, a perimeter is an environment, generally of a
building, area or an industrial plant (such as oil wells, water tanks, solar power facilities,
transmission masts, logistic or distribution center, car dealer); the borders of this
environment; or focal points within this environment. Extending in the horizontal plane, the
legal boundary of the site is the furthest limit of the perimeter. An inner boundary (which
there necessarily need not be) can be formed by a building, a facility or similar, that is
situated within the range of the legal boundary. External walls of buildings within the
perimeter can also stand for inner boundaries; parts of the interior of buildings can also count
for the perimeter range. The perimeter also has vertical, legal boundaries. Depending on the
risk situation, it may be necessary to have perimeter surveillance in the vertical plane
(extending up or down).
These diagrams show the arrangements of the boundaries.

6 Doc. 20780_03
Planning and Commissioning Manual ADPRO Passive-Infrared (PIR) PRO Series by Xtralis
Schematic based on “VdS Security Guideline Perimeter VdS3143 (on the authority of VdS, Cologne)”
5.1.2 Applications not Covered
These planning notes describe options that can offer security against hostile outsiders, and
refer to industrial or infrastructure facilities, depending on the risk situation. They do not refer
to the most at-risk facilities such as power stations, including nuclear power stations, military
installations or prisons.
Personal protection measures are not discussed in the course of this policy.
NOTE!
For this, we advise you to call us personally.
5.1.3 Performance Capabilities of Perimeter Security Systems
Because of technology, no perimeter security system can give 100% reliable protection.
Therefore, the operator of the facility must be informed of the performance limits of the
chosen measures.
Since the electronic devices of the perimeter security system are permanently set to the
surrounding environmental conditions, it can sometimes lead to limitations in the
performance capability of the facility if no corresponding countermeasures are taken.
Basically, it can be stated that higher detection sensitivity leads, as a rule, on the one hand
to a very high detection rate (DR), but on the other hand to a high probability of false alarms
with a large false alarm rate (FAR).
One significant value for the quality of perimeter security is the DR/FAR ratio; the closer the
value to 1, the better the quality of the system.
5.1.4 Interoperability with other Security and Safety Systems
Perimeter security systems must be included from the start as part of a comprehensive plan,
to ensure as seamless as possible an interaction of security systems.
If, for instance, intrusion detectors and/or video surveillance cameras are planned or are
already in place, ADPRO detectors can be integrated without difficulty.

Doc. 20780_03 7
A
DPRO Passive-Infrared (PIR) PRO Series by Xtralis Planning and Commissioning Manual
For this purpose, the wiring (number of wires, cable length, cable channels, cable lengths,
interfaces) must match exactly. What information is needed for what system should be
specified.
5.1.5 Object Location (Site Position) and Environment – Analysis
5.1.5.1 Threats – Risk – Scenarios – Probabilities
Many commercial sites and industrial buildings, and related open spaces like distribution
centres and garages with large open spaces, goods and equipment storage areas, or scrap
yards, do not present too great a challenge to potential criminals.
In times of economic crisis, these outlying places present a particular incentive for criminal
enterprises, and can lead to risks if unauthorised and unnoticed access takes place. Due to
the increasing interdependency of modern business processes even small disruptions can
lead to considerable financial damage.
As part of a comprehensive security plan, building security focuses on the protection of the
contents. The use of mechanical perimeter security measures in combination with an
electronic security system is now well known and widely accepted. So a comprehensive
security plan begins right at the boundary of the property.
The concept of comprehensive security must now be analysed in detail.
1. Threat Analysis
This includes the identification of possible threats and offender profiles, the assessment of
possible damage, and the estimation of the probability of an accident. Owners themselves,
landlords, lenders, police, the fire brigade and future insurers must be included in the
planning.
2. Threat Scenarios
As part of these planning notes, the following scenarios are conceivable:
Theft of existing goods from the premises
Breaking into buildings
Sabotage or vandalism of operational facilities
Espionage
Arson
NOTE!
Risks to people’s lives and hostage takings are not discussed in these
planning notes.
3. Offender Profiles
With regard to the previously mentioned threats the following different offender profiles can
be assumed:
Opportunistic Offender
Who seizes an opportunity to gain something as a means of payment, or of value in
itself (drug-related crime), or who commits vandalism, such as spraying graffiti, setting
fires, or sabotage.
Professional Criminal
An individual, or gangs, which are characterised by their targeted approach (such as
the purchase of specialised car parts according to serial number, targeted theft of
recycling, sabotage or espionage).
4. Offenders’ “qualifications”, or level of performance of a security system,
according to European Standard EN 50131-1
Grade 1: Low Risk
An intruder or robber has little admitted knowledge of the security system; he has a
limited number of readily available tools.

8 Doc. 20780_03
Planning and Commissioning Manual ADPRO Passive-Infrared (PIR) PRO Series by Xtralis
Grade 2: Low to Medium Risk
An intruder or robber has little admitted knowledge of the security system; he has
generally available tools and portable instruments such as a multimeter.
Grade 3: Medium to High Risk
An intruder or robber has admitted that he is familiar with security systems, and has
an extensive inventory of tools and portable electronic devices.
Grade 4: High Risk
This level is used when security takes priority over all other factors. An intruder or
robber has admitted having the ability to plan a burglary or robbery in detail, and has a
complete kit including the means of substituting one component of a security system
for another.
NOTE!
In these levels, the word ‘intruder’ is used to include all types of threat,
such as robbery or the threat of physical violence, which could affect
the planning of a security system.
5. Types of attack on a perimeter security system
Walking, running or jumping:
An intruder tries to cross a boundary by walking or running. This usually occurs in
case of systems where there is no barrier or fence.
Climbing:
An intruder tries to get over the system by climbing directly over it. This applies only to
systems with barriers. The areas under surveillance of these systems cannot be
climbed into without assistance. A deferred detection system ‘assumes’ that an
intruder has entered by climbing, but entry might have been effected by cutting.
Cutting:
As with climbing, a barrier is required for this occurrence to be recognised. The
explanation is similar to ‘climbing’. Because of technology, PIR detectors cannot
detect cutting of the perimeter. However, the system can be planned so that
manipulation of fences, and above all subsequent penetration, can be securely
detected. The right choice of detector output is particularly important here.
Ladders:
‘Ladders’ is used here to mean all aids to elevation (such as a tall lorry parked near a
barrier). Two ways of surmounting a barrier with a ladder are to be distinguished:
- Use of a ladder that makes contact with a barrier (leaning ladders)
- Use of a ladder that makes no contact (a stepladder)
Because of technology, the PIR detector cannot detect the actual surmounting of a
barrier. Nevertheless, a system can be planned so that this type of attack and
subsequent invasions can be safely detected, provided the right detector has been
chosen. Again, careful planning of the system has a significant effect on the detection
of events and the false alarm rate. In contrast to other detection technologies, both
leaning ladders and stepladders are well known as aids to elevation.
Tunneling underground:
It is generally assumed that tunnelling under a barrier can in principle only be detected
by a ground detection system, because these are the only systems installed directly
into the ground. Because of technology, the PIR detector cannot detect tunnelling
under a barrier. But since the intruder has to come up to the surface to accomplish his
purpose, the system can be planned so that this type of attack, and subsequent
passage through the monitored area, can be safely detected. Here, too, the right
choice of detector is particularly important.
Driving through:
This is comparable to walking or running, but it involves greater speed and greater
mass. Because of this higher energy, in contrast to walking or running, a barrier can
be broken down. In some cases, because of technology the PIR detector cannot

Doc. 20780_03 9
A
DPRO Passive-Infrared (PIR) PRO Series by Xtralis Planning and Commissioning Manual
detect a barrier’s being driven through, precisely because of too high a speed. But
since the invader has to come to a standstill to accomplish his purpose, the system
can be planned so that this type of attack, and in particular subsequent passage
through the monitored area, can, again, be safely detected. Here, too, the right choice
of detector, and the number and strategic placement of the detectors, is especially
important.
5.2 Planning – Key Points
5.2.1 Nature (Grass, Trees, Animals)
In planning perimeter monitoring with ADPRO detectors, take note of the following points:
The area to be covered should have no moveable objects such as trees, branches,
shrubs, lawns with long grass, fences or bodies of water.
When you inspect the property, look out for animal holes such as foxholes, badgers’
setts, rabbit warrens, etc., in the vicinity of the barrier. Ask the user of the property
about this.
5.2.2 Traffic (Vehicles, Equipment, Persons)
It must be noted here that the nominal range stated is such that a person or object of height
1.5 m can be detected. This necessarily means monitoring of more than the area to be
covered, so long as it is not artificially limited.
Do not set up one single detector on a wire or metal fence, and especially not beyond
a fence.
In order to avoid false alarms caused by passers-by, the range of coverage should be
limited by a natural or artificial background (such as a wall).
Vehicles, in particular large ones that produce a lot of heat (lorries, tractors,
harvesters, etc.) and other equipment (diesel generators for power systems,
refrigerated containers, etc.) are strong sources of heat. Take care in planning that
such sources of heat are not operating in the range of a detector. If there is a car park
outside the fence, make the operator aware of it. If this is unavoidable, several
connected detectors should be used.
5.2.3 Climatic Conditions (Sun, Wind, Storms, Rain, Hail, Fog)
Depending on the climatic condition, the perimeter monitoring system is, in part, permanently
exposed to extreme environmental conditions. Because of technology PIR detectors can
sometimes perform badly. These natural factors are unavoidable, but with precise planning,
they can be to a large extent compensated for, or even eliminated entirely.
The following points should be noted:
PIR detectors are to be configured so that they are not exposed to heat radiation,
especially that of the sun. Note that the sun can be very low at some seasons.
ADPRO PRO detectors, thanks to a very complex signalling process and subsequent
validation check, offer a modern compensation system. Nevertheless, if a detector
directly faces the rising or setting sun, nuisance alarms can be triggered.
Do not set up a single detector directly on a wire fence, as in a sunny environment this
can cause significant movement in the warm air currents above the barrier.
Check whether prolonged and intense fog is to be expected at the planned site.
Because fog consists of tiny droplets of water in the micrometre range (20-40 µm), the
radiation emitted by a body might only be received dampened by a PIR detector, since
the infrared radiation is reflected and partially absorbed by the droplets of water.
Experience has shown that the distance between individual detectors should be no
greater than 45-50 metres. This makes safe operation with a good detection rate
possible.

10 Doc. 20780_03
Planning and Commissioning Manual ADPRO Passive-Infrared (PIR) PRO Series by Xtralis
During a walk test in thick fog (see below picture) the alarm went off clearly at a distance of
80 m. The oscilloscope ‘snapshots’ below the picture show the corresponding detector signal
values. Left, the value for 80 m; right, at a distance of a 100 m with the same detector
installed, the alarm threshold was nearly but not quite reached.
If the test subject had left a warm building and spent only a few moments in the cold,
fresh air, the alarm would have sounded at a distance of up to 120 m.
- Type of detector : 100H (without heating)
- Date and time : 21 November 2011, 8 a.m.
- Location : Xtralis, south side
- Type of ground : grazed pasture
- Height of mounting of detector : 4 m
- Visibility : c. 120 m (thick fog)
- Atmospheric pressure : 1021.3 mb
- Humidity : 94% (light dew, just forming ice)
- Air temperature : -1°C
- Ground temperature : -7° C
- Body temperature : -1° C. (The test subject wore a Gore-Tex (TM)
jacket)
- Head temperature : +19°C
The moisture of rain, hail and snow can affect the detection rate. However, since the
particles that form these are larger in diameter, sufficient radiation can penetrate
between them. Typically, these environmental conditions do not last a very long time.
In coastal areas, and near large lakes, this point of planning should be taken into
special consideration.

Doc. 20780_03 11
A
DPRO Passive-Infrared (PIR) PRO Series by Xtralis Planning and Commissioning Manual
In agricultural environments such as harvested fields, or deserts, there can be strong
winds, leading to drifts of pollen (from cereal crops), leaves (from forests) and
sandstorms. This too must be adequately taken into account when planning. In
particular, the barrier itself must be capable of withstanding these, and the mast for
the PIR detector must be free of torsion and vibration as far as possible. Because of
climate change, even more extreme weather is likely in continental Europe.
Walk Test in Winter
5.2.4 Geographical Position
The perimeter monitoring system is designed to project according to geographical location.
Installations on level ground are not critical for planning, but if there are structures on uneven
ground, care must be taken in case areas hidden by hills are not monitored; there may be
gaps in the detection area.
Modern tools such as Google Earth and Google Maps can be helpful in analyzing orientation
and environments.
5.2.5 Special Areas of Application (such as Hazardous Areas)
In sensitive areas, planning and execution of a perimeter monitoring system should take into
account any applicable laws, rules and regulations.
We are happy to help you with planning your system on request.
5.3 Design and Choice of Detector
5.3.1 A coherent design raises the cost to the intruder and puts
him at greater risk of discovery
The better the perimeter security is adapted to particular circumstances, the more effort is
required from a perpetrator. This is accompanied by the necessary criminal intent to commit
the deed; add to that the cost in terms of tools, know-how and time of overcoming a security

12 Doc. 20780_03
Planning and Commissioning Manual ADPRO Passive-Infrared (PIR) PRO Series by Xtralis
system. The greater the expenditure, in terms of time and in other ways, the more likely it
becomes, as a rule, that the perpetrator will be discovered.
5.3.2 Saving Time
Three periods of time are important as part of an effective perimeter security system:
Time until the alarm
Time needed to overcome perimeter security
Time from the alarm to intervention, either on the protected object, or directly at the
scene of the crime
Clearly, having an alarm at an outer boundary, rather than at the protected object itself,
saves a lot of time. When a detector has as high a detection rate as possible, whilst at the
same time avoiding false alarms, it enables the alarm to be swiftly verified, and confers an
advantage in terms of time. The time between the alarm, and the alarm sounding or ‘alert’,
becomes short. ‘Intervention time’ is the time it takes for assistance to reach the protected
object from the alarm. The intervention time can vary according to place, time, or other
circumstances. High levels of traffic, an increase in the frequency of extreme weather
conditions, and so on, can lead to a significant increase in intervention time. This time must
be taken into account when planning perimeter security. Precise local information about
points of entry leads to more efficient and effective intervention.
5.3.3 Advantages of PRO PIR Detectors over other Technology
ADPRO PRO PIR detectors are a versatile solution for a variety of terrains and surfaces –
whether asphalt, plaster, gravel, grass, flower beds or even roofs. PIR detectors also offer a
very good price-performance ratio in relation to monitored areas.
Volumetric ADPRO PRO PIR detectors cover large spaces.
Long distance detectors, on the other hand, cover a narrow range, and can also detect
objects at great distances.
The most common uses for PIR detectors are in perimeter and exterior protection.
However, the detectors can also be used for interior monitoring, for instance in large
factories.
The preparations that have to be made on the property itself are small in relation to
the area to be protected, as in most cases foundations for fences already there can be
used to put up masts.
This manual suits for next models
37
Table of contents
Popular Security System manuals by other brands

Safety Technology International
Safety Technology International Rex Plus II ED-55 instructions

Signet
Signet QV-3063 user manual

Dantel
Dantel 46022-30 Installation & operation manual

System Sensor
System Sensor SpectrAlert S900RLFIRE Installation and maintenance instructions

Honeywell
Honeywell ESSER IQ8Alarm Installation instruction

Red Arrow
Red Arrow SMAH-2 installation instructions