Test device for verifying operation of an optical fiber monitoring system by injection of longitudinal strain

11631308 · 2023-04-18

Assignee

Inventors

Cpc classification

International classification

Abstract

In an optical fiber monitoring system which detects physical disturbance or other parameters such as temperature or strain of a fiber where a monitor signal is transmitted along the optical fiber and analyzed to detect changes which are indicative of an event, a method is provided for periodically checking proper operation of the optical fiber monitoring system. :A fiber disturbance actuator periodically causes a pattern of disturbances of a portion of the fiber at a predetermined location thereon where the disturbance is characteristic of the event to be monitored. The monitor signal is analyzed to detect the pattern of changes and in the event that expected changes are not detected, a warning is issued that the intrusion detection system is not properly operating.

Claims

1. A method for verifying operation of an optical fiber monitoring system comprising: using a detection system to detect changes in an optical fiber caused by an event to be monitored by: transmitting from a source of light at a transmit location a monitor signal along the optical fiber; receiving the monitor signal after transmission along the optical fiber; analyzing the monitor signal after transmission along the optical fiber to detect changes therein caused by disturbances on the optical fiber; and generating an alarm in response to said detected changes which are indicative of the event to be monitored; and verifying proper operation of the detection system by periodically generating at least one fiber disturbance in the optical fiber by generating longitudinal forces in the optical fiber at a first location along a length of the optical fiber relative to a second location along the length so as to cause movement of a portion of the optical fiber spanning between the first and second locations; wherein the longitudinal forces in the optical fiber are generated by wrapping the optical fiber around a body having the first and second location defined by first and second parts of the body separated by a space with the optical fiber bridging the space between the first and second parts; and causing relative movement between the first and second parts.

2. The method according to claim 1 wherein said body has a generally cylindrical peripheral surface around which the optical fiber is wrapped.

3. The method according to claim 1 wherein the optical fiber is wrapped around the body in at least two turns so as to form in said space at least two adjacent lengths of the optical fiber and so as to commonly generate said longitudinal forces in said adjacent lengths.

4. The method according to claim 1 wherein the space between the first and second parts forms a slit between two edges of the body and wherein the longitudinal forces in the optical fiber are generated by causing relative movement of the two parts.

5. The method according to claim 1 wherein the first part of the body is anchored and the second part of the body is moved by an actuator.

6. The method according to claim 1 wherein said verifying proper operation of the optical fiber monitoring includes: analyzing the monitor signal to detect changes therein caused by said at least one fiber disturbance; and in the event that expected changes in response to said at least one fiber disturbance are not detected, actuating a warning that the intrusion detection system is not properly operating.

7. The method according to claim 1 wherein said at least one fiber disturbance comprises a pattern of disturbances defining a required signature for detection.

8. The method according to claim 1 wherein the fiber is used for monitoring a perimeter security system where the fiber extends along at least a part of the perimeter security system and said disturbances of the optical fiber are caused in response to intrusion events on the perimeter security system.

9. The method according to claim 1 wherein the fiber is part of a cable is used for transmitting data and said disturbances of the optical fiber are caused in response to intended intrusion events on the data in the cable.

10. A method for verifying operation of an optical fiber monitoring system comprising: using a detection system to detect changes in an optical fiber caused by an event to be monitored by: transmitting from a source of light at a transmit location a monitor signal along the optical fiber; receiving the monitor signal after transmission along the optical fiber; analyzing the monitor signal after transmission along the optical fiber to detect changes therein caused by disturbances on the optical fiber; and generating an alarm in response to said detected changes which are indicative of the event to be monitored; and verifying proper operation of the detection system by periodically generating at least one fiber disturbance in the optical fiber by generating longitudinal forces in the optical fiber at a first location along a length of the optical fiber relative to a second location along the length so as to cause movement of a portion of the optical fiber spanning between the first and second locations; wherein said at least one fiber disturbance is generated by a longitudinally moving anchor holding the optical fiber at the first location for longitudinal movement and located between two stationary anchors one of which holds the optical fiber in fixed position at the second location.

11. The method according to claim 10 wherein said at least one fiber disturbance is generated by forming at least two adjacent lengths of the optical fiber between said moving anchor and said two stationary anchors so as to commonly generate said longitudinal forces in said adjacent lengths.

12. The method according to claim 10 wherein said verifying proper operation of the optical fiber monitoring includes: analyzing the monitor signal to detect changes therein caused by said at least one fiber disturbance; and in the event that expected changes in response to said at least one fiber disturbance are not detected, actuating a warning that the intrusion detection system is not properly operating.

13. The method according to claim 10 wherein said at least one fiber disturbance comprises a pattern of disturbances defining a required signature for detection.

14. The method according to claim 10 wherein the fiber is used for monitoring a perimeter security system where the fiber extends along at least a part of the perimeter security system and said disturbances of the optical fiber are caused in response to intrusion events on the perimeter security system.

15. The method according to claim 10 wherein the fiber is part of a cable is used for transmitting data and said disturbances of the optical fiber are caused in response to intended intrusion events on the data in the cable.

16. A method for verifying operation of an optical fiber monitoring system comprising: using a detection system to detect changes in an optical fiber caused by an event to be monitored by: transmitting from a source of light at a transmit location a monitor signal along the optical fiber; receiving the monitor signal after transmission along the optical fiber; analyzing the monitor signal after transmission along the optical fiber to detect changes therein caused by disturbances on the optical fiber; and generating an alarm in response to said detected changes which are indicative of the event to be monitored; and verifying proper operation of the detection system by periodically generating at least one fiber disturbance in the optical fiber by generating longitudinal forces in the optical fiber at a first location along a length of the optical fiber relative to a second location along the length so as to cause movement of a portion of the optical fiber spanning between the first and second locations; wherein said at least one fiber disturbance is generated by wrapping the optical fiber around a support to form at least two adjacent lengths of the optical fiber and commonly generating said longitudinal forces in said adjacent lengths.

17. The method according to claim 16 wherein said-support has a generally cylindrical peripheral surface around which the optical fiber is wrapped to form said at least two adjacent lengths.

18. The method according to claim 16 wherein said verifying proper operation of the optical fiber monitoring includes: analyzing the monitor signal to detect changes therein caused by said at least one fiber disturbance; and in the event that expected changes in response to said at least one fiber disturbance are not detected, actuating a warning that the intrusion detection system is not properly operating.

19. The method according to claim 16 wherein said at least one fiber disturbance comprises a pattern of disturbances defining a required signature for detection.

20. The method according to claim 16 wherein the fiber is used for monitoring a perimeter security system where the fiber extends along at least a part of the perimeter security system and said disturbances of the optical fiber are caused in response to intrusion events on the perimeter security system.

21. The method according to claim 16 wherein the fiber is part of a cable is used for transmitting data and said disturbances of the optical fiber are caused in response to intended intrusion events on the data in the cable.

Description

BRIEF DESCRIPTION OF THE DRAWINGS

(1) FIG. 1 is a block diagram showing a system of the present invention installed in a fiber to be monitored by inlet and exit isolation fibers.

(2) FIG. 2 is a block diagram showing a system of the present invention installed as a far end connection in a data transmission fiber to be monitored using inlet and exit isolation fibers.

(3) FIG. 3 is a block diagram showing a system of the present invention installed as a near end connection in a data transmission fiber to be monitored using inlet and exit isolation fibers.

(4) FIG. 4 is a block diagram showing a system of the present invention installed as a near end implementation using a separate dedicated monitoring fiber in a data transmission cable.

(5) FIG. 5 is a block diagram showing a system of the present invention installed as a far end implementation using a separate dedicated monitoring fiber in a data transmission cable.

(6) FIGS. 6 and 7 show sample bursts of cyclical disturbances arranged in envelopes which provide a specified signature of period and frequency which allows the monitoring device to identify the applied disturbances from the fiber actuator.

(7) FIG. 8 shows schematically one example of a fiber disturbance actuator using a motor for physically moving one part of the fiber relative to another.

(8) FIGS. 9A and 9B show schematically in side and end view respectively one example of a fiber disturbance actuator using an electromagnetic field to physically move a fiber portion which is coated with a material responsive to the field.

(9) FIG. 10 shows schematically one example of a fiber disturbance actuator which uses a motor to bend one portion of the fiber relative to another.

(10) FIG. 11 is a schematic illustration of the operating components which form the elements of the invention for attachment to the fiber to be monitored.

(11) FIG. 12 is a schematic illustration of the operating components which form the elements of the invention for attachment to the fiber to be monitored where the signal in the fiber is disturbed by an optical shutter at the far end of the fiber.

(12) FIG. 13 is a schematic illustration of the operating components which form the elements of the invention for attachment to the fiber to be monitored where the signal in the fiber is generated as a waveform related to or corresponding to a waveform detected from an actual event.

(13) FIG. 14 is a schematic illustration of the operating components which form the elements of the invention for attachment to the fiber to be monitored where the actuator which applies the test signal to the fiber is controlled by a communication system along the same fiber which uses a coupler to extract the control signal.

(14) FIG. 15 is a schematic illustration of the operating components which form the elements of the invention for attachment to the fiber to be monitored where the fiber optic system includes two fibers and the method includes transmitting from at least one source of light at the transmit location into the first and second ends of each of the first and second fibers monitor signals so as to travel along the optical fiber.

(15) FIG. 16 is a schematic illustration of the operating components which form the elements of the invention for attachment to the fiber to be monitored where the fiber is disturbed by a first arrangement for applying longitudinal forces on the fiber.

(16) FIG. 17 is a schematic illustration of the operating components which form the elements of the invention for attachment to the fiber to be monitored where the fiber is disturbed by a second arrangement for applying longitudinal forces on the fiber.

(17) FIG. 18 is a side elevational view of the operating components which form the elements of the invention for attachment to the fiber to be monitored where the fiber is disturbed by a third arrangement for applying longitudinal forces on the fiber.

(18) FIG. 19 is a top plan view of the arrangement of FIG. 18.

(19) FIG. 20 is a schematic illustration of the operating components which form the elements of the invention for attachment to the fiber to be monitored where the signal in the fiber is applied by optically injecting the signal into the fiber using a first arrangement where the signal is injected using an optical coupler.

(20) FIG. 21 is a schematic illustration of the operating components which form the elements of the invention for attachment to the fiber to be monitored where the signal in the fiber is applied by optically injecting the signal into the fiber using a second arrangement where the signal is directly injected and inline attenuation components are used to control an amplitude of the required signal.

(21) FIG. 22 is a schematic illustration of the operating components which form the elements of the invention for attachment to the fiber to be monitored where the signal in the fiber is applied by optically injecting the signal into the fiber using a third arrangement where an optical shutter is used to control the injected signal.

(22) FIG. 23 is a schematic illustration of the operating components which form the elements of the invention for attachment to the fiber to be monitored where the signal in the fiber is applied by optically injecting the signal into the fiber using a third arrangement where an optical shutter, variable attenuator, or combination of the two are used to control the injected signal.

(23) FIG. 24 is a schematic illustration of the operating components which form the elements of the invention for attachment to the fiber to be monitored where the signal in the fiber is applied by optically injecting the signal into the fiber using an optical coupler which combines the monitor signal with the injected signal. This holds true for closed loop systems which are non-locating in regard to the location of the event as well as systems which act to locate the event along the fiber.

DETAILED DESCRIPTION

(24) As shown in FIG. 1 there is provided a fiber 10 including connector 10A which provides an input from a monitoring device such as a fiber optic security system. An isolating fiber portion 11 including inlet and exit portions 11A, 11B is connected into the fiber 10 and acts to displace the main monitored section of the fiber from the monitoring device. A fiber disturbance generator 12 is mounted in the isolating fiber portion and is controlled by a controller 14. This causes an input disturbance of a predetermined signature and magnitude, as discussed hereinafter, on the portion of the fiber 10 which is being monitored by the monitoring device.

(25) The controller 14, which can be actuated by a switch 15 or by a communications interface 16, from the monitoring system acts for causing the fiber disturbance generator to generate the characteristic disturbance signature with the required magnitude of disturbance.

(26) The communications interface acts to allow the monitor system to initiate a test. The mechanical switch can be used by a system operating person for generating an autonomous test

(27) In FIG. 3 an installation is provided of the fiber disturbance actuator system including the actuator and the isolation fiber portions at the near end of the fiber is shown. This consists of the system monitor, such as a Distributed Acoustic Sensor interrogator as discussed above. This detects the characteristic disturbance signature introduced by the fiber disturbance generator. As this type of monitoring system is very sensitive to reflections, the isolating fiber isolates the fiber disturbance generator from the reflections caused by the connection to the monitor. Also the isolation fiber portions act to allow recovery from any deadzone effect of the monitor. For example, any monitor utilizing optical time domain reflectometry (OTDR) exhibits a “deadzone” at the front panel, causing it to be blind to events immediately after the connection. The internal isolating fiber eliminates that issue since in effect the dead zone is moved into the isolation fiber area.

(28) The output isolating fiber portion 11B, like the input isolating fiber portion 11A, allows for isolation from the front connector. It also allows the system to be connected bidirectionally. The output of this output fiber portion is connected to the fiber 10 to be protected. The controller section causes the fiber disturbance generator 12 to generate the required signature and amplitude for detection.

(29) The optional external switch 15 can be activated to cause the controller to cause a test to be performed under control of the system operating personnel, that is, without prior instruction from other equipment in the control system.

(30) FIG. 2 shows a version of the invention which is similar to the FIG. 3 with the differentiation that it is intended to be installed at the far end of the fiber, or at any location remote from the near end where power is available. The addition of a communication device 17 connected to a communication medium such as the shown fiber is used to send instructions such as a request for test to the controller and a feedback from the monitor system concerning the amplitude of the disturbances. This has the added benefit of testing the far end of the cable or at a location remote from the near end, which enhances assurance of security.

(31) FIG. 4 illustrates the monitor fiber which intrinsically protects all the fibers in the cable by utilizing a spare fiber in the cable.

(32) FIG. 5 illustrates an embodiment that utilizes a pair of available fibers in a cable: one for monitoring and one for communications between the monitoring device and the near end equipment. This is a preferred embodiment where a system can be installed on spare fibers in a cable adding connectivity assurance as well as health tests and periodic testing to the cable monitor.

(33) FIGS. 6 and 7 show typical patterns P1, P2 and P3 of fiber displacement where the fiber disturbance actuator generates a series of spaced envelopes of signal bursts each containing predetermined periodic displacements to the fiber. In FIG. 7, the frequency of the bursts in the pattern P2 is increased relative to that of FIG. 6 and the period of the bursts is decreased. It will be appreciated that various patterns can be generated to create a signature pattern to be detected by the monitoring system. Preferably the frequency of the pulses is chosen to be out of band with ambient disturbances. Preferably the modulation frequency provides a duty cycle defining the frequency bursts which is chosen to be dissimilar to natural occurrences which can be expected from machine learning so that the signature pattern can be readily determined during the test process. This can include repetitive duty cycle such as 50:50. The duty cycle defining the frequency bursts may be a complex keyed code for security. This can be changed periodically, randomly, on a scheduled basis, or triggered by a coded or uncoded message or by detectable amplitude changes to the envelope as shown in pattern P3.

(34) In FIG. 7 the last pulses in pattern P3 are shown at reduced amplitude which is determined by analysis of the received monitoring signals so that the amplitude matches a requirement to provide signals which are large enough to be identified and not so large that they interfere with the normal monitoring process by having changes which are beyond those which are expected and are measurable.

(35) When used for near end applications, system can be implemented with only the first isolation fiber, which is provided between the monitoring device and actuator device.

(36) When used for the far end application, system is implemented with both input and output fibers as a method for isolating the actuator signal from reflections.

(37) The system with input and output fiber spools can be used either near end or far end, and is bidirectional in that it can be optically connected in either direction.

(38) It will be appreciated that the type of disturbance used by the system actuator is selected to match the technology of the monitoring device; thus for example:

(39) In a modal metric detection system, the actuator typically uses a disturbance device which acts to bend or physical move a portion of the fiber.

(40) In an attenuation detection system, the actuator typically uses a disturbance device which acts to bend the fiber.

(41) In an Optical Time Domain Reflectometer detection system, the actuator typically uses a disturbance device which acts to bend the fiber.

(42) In a Distributed sensing (DAS/DSS/DTS) detection system, the actuator typically uses a disturbance device which acts to create changes in the monitor signal which can be detected by this type of monitoring system.

(43) In a Distributed Acoustic Sensing (DAS) detection system, the actuator typically uses a disturbance device which acts to move the fiber in a shaking or vibrating action, or by inducing strain such as by stretching the fiber.

(44) In a Strain monitoring system such as strain gauge detection system or a Distributed Strain Sensing system (DSS), the actuator 12 shown in FIG. 1 typically uses a disturbance device which acts to stretch or compress the fiber.

(45) In a Distributed Temperature Sensing (DTS) detection system, the actuator 12 in FIG. 1 typically uses a disturbance device which acts to heat or cool the fiber.

(46) In a Polarization detection system, the actuator typically uses a disturbance device which acts to bend or shake the fiber, or mechanically rotate the state of polarization such as by moving, shaking, or vibrating paddles which introduce birefringence by changing stress on the fiber by way of bending or rotating.

(47) In an Interferometery detection system, the actuator typically uses a disturbance device which acts to bend or shake the fiber.

(48) As an alternative an active area of actuator can contain a fiber Bragg grating, in which the actuator acts to heat, bend, or stretch the grating.

(49) The communications interface may contain a dual wavelength/single fiber ethernet connection. When used with a single fiber monitor, a two fiber solution will protect a cable. When installing optical cables, it is common practice to install cables with more fiber than is needed for the immediate or foreseeable future. As the bulk of the price of an installation is labor, and the price difference when upgrading the fiber count is incremental, unused (called “dark”) fiber are often available. As networks most often utilize 2 fibers each, one for transmit and one for receive, and as fiber count in cables is typically an even number, often a multiple of 6 or 12, there are often pairs of optical fibers that are available for use. Single fiber monitoring systems, such as DAS, will utilize one fiber in a pair while leaving the other available for communication. Single fiber communications standards, such as Ethernet, provide full duplex communication over a single fiber by transmitting one wavelength, such as 1310 nm, in one direction, and another wavelength such as 1550 nm in the opposite direction. Combining the single fiber monitoring with the single fiber communication provides a complete instance of this invention on a pair of fibers. Single fiber communications solutions can also be achieved by techniques such as differing modulation frequencies, states of polarizations, time division multiplexing, and others.

(50) Similarly, the communications might be realized by use of multiple fibers, such as two. Monitoring and communications functions can be performed over the same fiber pair(s) by use of wavelength division multiplexing, time division multiplexing, or other multiplexing schemes.

(51) Zone based non-locating monitoring methods are often implemented over two fibers, or a fiber loop. Use of multiplexing methods such as wavelength division multiplexing, time division multiplexing, or other multiplexing schemes can be utilized to share the fibers between the monitoring and the communication systems.

(52) CW detecting monitoring devices, such as zone type network or perimeter protection devices can detect the frequency with a frequency detecting method.

(53) This method can be a hardware phase locked loop within the receiver circuitry of the monitoring equipment. In this embodiment, a disturbance of known frequency is generated while frequency detection equipment such as a phase locked loop is used for detection, which registers a successful test.

(54) This method can be a software phase locked loop. Similar to the hardware phase locked loop within the receiver circuitry of the monitoring equipment, a detection algorithm is used within the signal processing software. In this embodiment, a disturbance of known frequency is generated while frequency detection algorithm emulating a phase locked loop is used for detection, which registers a successful test.

(55) This method can be bandpass filters. Similar to the hardware phase locked loop within the receiver circuitry of the monitoring equipment, a hardware or software frequency filter can suppress all frequencies except that of the disturbance generator. In this embodiment, a disturbance of known frequency is generated while detection equipment detects the signal passed through the bandpass filter, which registers a successful test.

(56) This method can be Fourier Transforms. The spectra of a received signal can be inspected for the presence of the disturbance frequency. In this embodiment, a disturbance of known frequency is generated while detection equipment detects the signal as a spectral spike of sufficient amplitude, which registers a successful test.

(57) This method can be correlation, including Wavelet Transforms. The spectra of a received signal can be inspected for the presence of the disturbance frequency. In this embodiment, a disturbance consisting of a pulse, chirp, wavelet, or other finite signal of known composition is generated while detection equipment detects the signal and applies correlation or Wavelet Transform to detect the presence of the disturbance, which registers a successful test.

(58) Zone based products may multiplex communication signal and monitor signal on the same fiber pair by using wavelength division multiplexers. Zone based systems may be configured for single mode or multimode fiber.

(59) A system as described, but used for zone-based non-location determining systems, can omit the internal isolations fiber portions as reflections and dead zones are not of concern.

(60) For vibration sensing monitoring sensors, the active device disturbing the fiber within the disturbance generator may be of several technologies, including but not limited to:

(61) Electromagnetic actuators which cause displacement by energizing a coil or other electromagnetic device. This might include attaching a fiber to a moving portion of a voice coil

(62) As Electromagnetic actuators which cause displacement by coating by depositing or other technique a sensitive material to the fiber and placing it within the field with no other moving parts.

(63) The fiber disturbance device 12 shown in FIG. 1 can use a Piezo-electric actuator attached to the fiber and causing the vibration

(64) The fiber disturbance device 12 shown in FIG. 1 can use a Haptic actuator such as the rotating motor type

(65) Mechanical such as rotating cam or sawtooth

(66) The fiber disturbance device 12 shown in FIG. 1 can use an arrangement where the fiber is displaced by placing it between stators within an electrostatic field, and varying the field to displace the fiber

(67) Variable optical attenuator: perturbation is a variation in optical signal amplitude

(68) Variable polarization controller: perturbation is variation in optical signal polarization

(69) Variable optical mode mixing: use a mode mixer to change modal fill of optical signal in MMF fiber, causing a perceived perturbation in our products

(70) In the described system, a fiber Bragg grating may be used within the disturbance generator. When perturbed, detectable wavelength shifts are detected.

(71) In systems that determine distance or location, the detection signature should occur at a predetermined location, representative of the installation. This precise location thwarts attempts to spoof the system by bypassing with a separate fiber. This attempted spoofing might, at the fiber patch panel or other convenient locations, replace the connections to the monitored cable with a fiber. Requiring a precise fiber length and event location significantly eliminates that ability.

(72) The disturbance repetition rate, frequency, or combination of these and other parameters may be arranged to be representative of a unique key.

(73) The system may be placed at the beginning, end, or any location along the path of the fiber where electrical power is available.

(74) The device is preferably arranged to produce a heartbeat at a configurable, identifiable frequency and cadence that the monitoring interrogator can reliably interpret as a unique event.

(75) When operating in periodic mode the device can be configured with a cryptographic key to communicate time based one-time passwords (TOTP) during tests. This can be used to prove the identity of the test device to the sensing device. The password can be encoded by the content of the test signal. The password can be encoded by the timing of the test. In this way, devices operating in the above time based one-time password mode can be used not just for testing the sensing system, but for providing evidence that that sensing cable has not been bypassed. Devices operating in periodic mode only without network access may be battery powered.

(76) The disturbance Generator will have an adjustable magnitude which will allow perturbation to be adjusted to be appropriate to the magnitude of the monitor signal. The amplitude must be high enough to be detected, but not so high as to interfere with signal processing. This may be controlled from any of several locations, including over a network from the monitor end of the fiber, or controlled locally such as a local network, manual adjustment, or serial connection.

(77) FIG. 8 shows schematically one example of a fiber disturbance actuator using a motor 30 operating a rotating cam 31 for moving one part of the fiber relative to another part which is held fixed by an anchor 32.

(78) FIGS. 9A and 9B show schematically one example of a fiber disturbance actuator using an electromagnetic field generator 40 to physically move a fiber portion 41 which is coated with a material 42 responsive to the field.

(79) FIG. 10 shows schematically one example of a fiber disturbance actuator which uses a motor 50 to bend one portion of the fiber relative to another.

(80) FIG. 11 shows schematically the components herein. Switch 18 represents a mechanical input device which, when actuated, initiates a test or a sequence that leads to the performance of a test. This can also represent other types of interfaces such as contact closures and/or other interfaces to allow the test device to send notifications when certain activities happen in and around the device; i.e. door closures or equipment cabinet openings. Signatures generated by the test device can communicate notifications of inputs at the test device, and report to the monitoring device.

(81) As set forth above, various disturbance mechanisms are disclosed for causing a test to be performed using various arrangement for disturbance of the fiber.

(82) FIG. 1 describes a first embodiment which uses an actuator 12 for disturbing the fiber by mechanical movement. In FIG. 12 is shown an alternative arrangement using many of the same components of FIG. 1 where there is disclosed the concept where the disturbance is carried out by an an optical shutter or switch 12A which is actuated to break the path in the fiber. This provides compliance to Federal regulations for self-test, but rather than perform them directly after the monitor device, the test is performed at the far end of the fiber, certifying that the fiber being monitored is what is expected.

(83) As set forth above, the shutter 12A is operated to provide a disturbance of the fiber in a recognizable pattern to assure that the expected fiber is being monitored.

(84) The method of testing therefore includes the steps of periodically checking proper operation of the optical fiber monitoring system by providing the optical shutter 12A at the second end of the fiber remote from the monitoring system 10A, periodically operating the optical shutter by the controller 14 under operation from the communication system 16 to temporarily terminate transmission of light along the fiber 10 and analyzing the monitor signal at the monitoring system 10A to detect a termination in the monitor signal caused by the operation of the optical shutter 12A.

(85) Turning now to FIG. 13 there is shown a further modification where the testing system is improved by storing complex waveforms and recordings 14A in the controller 14 of the test device. These waveforms are representative of an event such as expected intrusions such as a fence climb or fence cut. That is in this method a simulation of an actual event is carried out at event 10C at a location along the fiber where events are expected to occur and the effect of that simulated event is detected by the signal analysis components of the monitoring system 10A so as to generate a waveform. Different events can be simulated at different locations to create a library of waveforms each representative of a respective event. Rather than recordings actual events, waveforms can be generated by modelling or simulation to create the library. Or the library can contain actual events and simulated events so as to be able to carry out a series of tests on the system.

(86) Thus, this system includes the steps of generating a waveform 14A which is representative of one event of the library of events, at a predetermined location on the fiber periodically operating the actuator 12 to cause a disturbance on the fiber which changes the monitor signal in the fiber; where the actuator 12 is operated by the control system 14 based on the waveform 14A.

(87) This is valuable for at least 2 reasons:

(88) The test device playing the recording simplifies a portion of the tuning during the initial installation. A library of intrusions or signals is played while the installation personnel adjusted the monitoring device without the need for a second person performing the intrusions. This allows for smaller work crews for the calibration process.

(89) The test device can play back a recording of an intrusion as part of the routine testing of the monitoring system. Rather than just verify the fiber is being monitored, this allows periodic verification that the monitoring system is performing correctly by detecting representative intrusions. These are not reported as actual intrusions at the monitoring system 10A as the location and timing of the test signal is known to the test device. This functionality adds a layer of protection in that, it not only assures the proper fiber is being monitored, it also assures that they detection calibration has not been altered or desensitized since the set up calibration.

(90) Turning now to FIG. 14 there is shown an arrangement in which the communication to the controller 14 of the actuator 12 is provided by adding a coupler 16B or other device within or attached to the test device. In this way a portion of the signal fed to an optical detector 16C allows the near end monitoring system 10A to send commands encoded in the test laser pulses through the same fiber 10. This eliminates the need for additional network connectivity to the far end which uses a second fiber as shown in FIG. 1. Thus, in this arrangement an instruction signal is communicated along the same fiber 10 to the actuator 12 to effect the operating of the actuator and there is provided a coupler 16B on the fiber to extract the instruction signal by the detector 16C from other signals in the fiber to communicate with the actuator 12 through the controller 14.

(91) Turning now to FIG. 15 is shown a pair of monitored fibers, each with a monitor system and with a termination in the same location. In a single fiber locating system, it is common practice to monitor two fibers, often within the same cable, with 2 channels of equipment, and the signals propagating in opposing directions: one traverses the cable clockwise, the other counter-clockwise. This is done for cut protection, if the cable is cut or damaged, one channel monitors CW up to the break, the other channel CCW to the break.

(92) This performs a full fiber monitoring scenario even in the instance of a fully severed fiber cable. In the implementation shown above, monitoring the end of the return cable performs the monitoring function on both cables as though it were a far end implementation. Furthermore, using a single test device eliminates some cost by two disturbance actuators disturbing both fibers together, or separate actuators for independent control. Other circuit components can also be shared including the power supply, controller, etc.

(93) A secondary implementation of-FIG. 15 shows a 2-fiber looped back monitoring system. Rather than open the optical test circuit at the near end, this acts to break the connection at the far end, assuring the correct fiber is being monitored. This holds true for closed loop systems which are non-locating in regard to the location of the event as well as systems which act to locate the event along the fiber.

(94) Thus, the system includes a first fiber 101 and a second fiber 102 where each of the first and second fibers extends from the transmit location at the monitoring system 10A to a remote location 103, 104 and returning along a continuous optical path to the transmit location. Each of the first and second fibers defines first and second ends at the transmit location 10A thus defining outward 104, 105 and return portions 106, 106 of the fiber. In this case the actuator 12 is located at the termination end of the fibers and arranged to operate on both fibers. The actuator can act on one leg or both legs of the fibers.

(95) Adding the disturbance actuator 12 at the termination end of the multiple fiber loops allows functionality as follows:

(96) Additional implementation of the single disturbance actuator design is the ability to simplify the test device design by the use of multistrand fiber, such as ribbon finer or bifilar fiber, with the multiple fibers passing through the actuator. The entire test device is the same except for the number of connectors and the internal multi-strand fiber.

(97) For near end implementations, the monitoring device and the test device could be built into the same mechanical chassis.

(98) Additionally, in two-fiber closed loop monitoring systems, this can perform the routine test as required by some federal guidelines for assurance of the fiber monitoring system. By either shared actuators or just shared control electronics, a single rack space device could monitor multiple channels, for example matching an industry standard 4-channel monitoring device.

(99) Turning now to FIGS. 16 to 19 there are shown arrangements in which an actuator for periodically generating disturbances in the fiber includes components generating longitudinal forces in the fiber at one location along the length relative to another location along the length so as to cause changes in length of the fiber between the first and second locations. That is, as shown in FIG. 17, the disturbances are generated by a longitudinally moving anchor 60 located between two stationary anchors 61 and 62. In this arrangement an electromagnetic actuator 12 provides movement of the anchor 60 longitudinally of the fiber so that the portions of the fiber between the stationary anchors and the floating support are stretched and released alternately to generate longitudinal strain in the fiber. This has been found to generate the necessary changes in fiber structure to introduce the signals.

(100) In FIG. 16 the disturbances are generated by wrapping the fiber around a cylindrical support body 65 to form two adjacent lengths 10X and 10Y and commonly generating the longitudinal forces in the adjacent lengths. That is the support comprises a stationary wrapped anchor 65 around which the fiber is wrapped and there is provided a longitudinally moving anchor 60 movable towards and away from the wrapped anchor as well as from stationary anchor 61.

(101) In FIGS. 18 and 19 is shown another arrangement for stretching the fiber where the longitudinal forces in the fiber are generated by wrapping the fiber around a cylindrical shell 70 having two parts 71 and 72 of the body separated by a slit 73 and moving the two parts relative to one another. Thus, the shell 70 is held fixed at anchors 74, 75, 76 and 77 and a free edge of the shell is moved radially inwardly and outwardly by an actuator 12. This causes the free edge 78 of the shell to move relative to the anchor 77 to cause stretching of the portions of the fiber bridging the slot 73.

(102) The cylindrical shell supporting the wrapped fiber is stably mounted at the fixed anchors and can be moved at high frequency with low forces at the actuator at the edge of the slot. In this way the required signal can be applied to the fiber at the required amplitude and frequencies without difficulty and effectively. In this implementation the actuator may be mounted only to the free edge 78 of the cylinder at the slit, causing the free edge to move under the influence of the vibrating mass of the actuator 12.

(103) Alternately, the body of the actuator 12 may be fastened to a support base connecting the stationary supports for example adjacent the support 77 and the portion of the actuator that is displaced is fastened to the free edge 78, causing vibration without influence of stiffness of the edge, mass of the actuator, or resonances thereof. This vibration stretches and releases tension on the fiber(s), thereby modulating the longitudinal strain.

(104) Turning now to FIGS. 20 to 23 there is shown an is a different way to introduce a signal that performs the test function, but absent are mechanical actuators. This signal can be any of those described above including envelopes of sine waves as well as complex waveforms.

(105) The concept is to introduce into the far end of the fiber a signal that is representative of either a test tone or signal or a signal representative of a nefarious event directly as an optical signal. There are several ways to accomplish this.

(106) The system uses as the monitoring system, for functionality of the locating vibration sensor, the arrangement described above as the Distributed Acoustic Sensor (DAS), which acts to measure variations in Rayleigh backscattered signal caused by the event to be detected. This backscatter is typically 5 orders of magnitude lower than the incident optical power, which requires any externally introduced signal to be of similar magnitude. Additionally, the DAS system is sensitive to reflection such as those caused by poorly mated, faulty, or missing connectors.

(107) When introducing a test signal therefore, a low reflection must be presented to the monitoring equipment. As DAS systems utilize very narrow spectrum lasers of tightly controlled wavelength, great care must be taken to select and control the laser.

(108) As shown in FIG. 20 in a first method there is a shown a secondary backscatter method. Rather than injecting a signal directly into the monitored fiber, an optical transmitter 91 injects the test signal into a length 92 of optical fiber which is connected to the fiber to be monitored through a coupler 90 which can also be a splitter, circulator, or other such device. The test signal passes through coupler 90, is launched into the terminated fiber, and is then backscattered into the fiber 10. The added fiber can be properly terminated in a low reflectance manner.

(109) As shown in FIG. 21 in a second method there is a shown a direct injection of a test signal from a laser 94 into far end 95 of the fiber 10. Angled connectors and low-reflectance optics are used to control any back reflection back into the monitoring device.

(110) As this system measures Rayleigh backscattering whose signal amplitude is roughly 5 orders of magnitude below incident power, it is important to not reflect signals back to the monitoring system. Any device that is put at the far end must be as non-reflective as possible. In a normal installation, and at the far end of an installation of the device as described above, the fiber is terminated for a very low reflection. A high reflection disturbs the detection system within the monitor.

(111) Additionally, amplitude should be lowered to correspond to a backscattered signal. This can be achieved by introduction of in-line attenuators 96.

(112) As shown in FIG. 22 in a third method there is a shown a modification of the direct injection method, differentiated by disabling, by an optical shutter 96 the laser at the transmit section of the monitoring device while continuing to monitor with receiver. Alternatively, timing could be such that the transmit signal is sent during off times that are normal to a pulsed laser device. The expression “pulsed laser” is meant to indicator a laser that caries in amplitude, turns on and off, or one whose optical path is interrupted as a function of time. This allows the monitor system receiver to detect an injected signal in the absence of a monitor signal, and allows more sophisticated messaging that is not obscured in monitor signal.

(113) That is, as the end of fiber reflection is problematic if not tamed, we can use this to our advantage as shown in FIG. 23 by controlling it as a signaling mechanism. A low internal reflectance variable attenuator 97, optical switch 98, or both are placed inline with a high reflectance termination 99. This termination might be a simple unterminated or air-gap connector, or it might be a greater reflection such as a reflective deposition on a connector face, such as gold. This reflection can be turned on or off, creating an effective end of line signal that does provide both several features as described above.

(114) Additionally, a variable attenuator may be modulated such as with a sine wave, causing the end reflection to vary at a pre-determined rate. This adds an additional layer of security as the monitoring device will watch for that frequency at that precise location.

(115) FIG. 24 is a schematic illustration of the operating components which form the elements of the invention for attachment to the fiber to be monitored where the signal in the fiber is applied by optically injecting the signal from a transmitter 16Y into the fiber using an optical coupler 16X which combines the monitor signal with the injected signal. This holds true for closed loop systems which are non-locating in regard to the location of the event as well as systems which act to locate the event along the fiber.

(116) In the closed loop system, the monitoring system transmitter injects a light signal into the fiber, which is typically looped back to the receiver. At the loopback point, an optical coupler enables a test signal to be superimposed on the monitor signal, simulating the fluctuation in signal representative of an intrusion or other disturbance.