(916)672-2660 PCs are a very important part of every Access Control System it is also referred to as the Head Unit. PC’s are also used with surveillance systems by allowing the user to monitor the system remotely. Computers have become very intricate part of residential and commercial security.


Wireless IP Camera

Remote Monitoring with Wireless IP Camera

What is a Wireless IP Camera?

IP cameras go by many different names. You may hear them referred to as “Internet Camera or “network cameras”, “internet protocol” cam, or “webcam.” Whatever you decide to call it, an IP camera is a cam that sends and receives data over a local area network (LAN) and/or the internet.

For more information and a free consultation on IP Camera’s call Mr Security Camera (916) 672-2660

Commercial Security Camera

Commercial Security Camera

How Can I See What’s Happening in My Home or Office When I’m Away?

It has become very easy to check in on your children or their nanny from your desk at work. To be able monitor your business from home on your laptop, all in real time. Wireless IP Cameras allow you to connect through to the internet and remotely view streaming video from just about web browser around the world. Once your home security system is set up, the only requirement for its functionality is Internet access. You can monitor multiple video Webcams or DVRs from a single tablet or smartphone.

Some IP cameras require a physical connection via cable, while others are wireless and transmit their data via radio frequency (RF) signals or over your Wi-Fi network.

IP cameras are basically mini computers with sophisticated optics built in to them. Internet Cameras come with their own built in software and just need to be configured to your network in order to function. The network configuration is fairly simple process for most devices; generally the set up is no more complex than configuring your Wi-Fi network. While some models do require a good knowledge of Internet technology to get them running. Many cameras now also come with their own apps, which make viewing and recording video on the internet even easier.

Many internet cameras look like traditional security cams, but consumers these days demand hidden cameras (nanny cams) with webcam capabilities. IP cameras are now hidden in a wide array of forms, from a book to a clock radio to a DVD player.

IP Camera Installation

Does My Computer Need to be Turned On To Use an Internet Camera?

Generally no, but it depends on the type of camera and it is set up. When you are using a Personal Computer as a network access point, instead of connecting directly to the network from the camera then the PC will need to remain on.

What is the Difference Between a Standard Webcam and a PTZ Internet Camera?

PTZ is an abbreviation for Pan, Tilt and Zoom. PTZ cameras can be controlled and viewed by various users. Just like a standard network camera, but it has the ability to be moved remotely. Unlike a traditional fixed camera a PTZ allows a user to adjust the camera’s view as needed.


Do I Need to Purchase Additional Software to Use An Internet Camera?

This can vary by the camera. Most IP Cameras will come with necessary software required to configure and operate your camera. Most of the time they include recording software. Some also include more advanced features, like the ability to view multiple camera viewing and send text/email motion alerts.

If your camera does not include the features you need, there are many NVR (Network Video Recorder) programs are available for purchase to add other capabilities.

Remote Monitoring with Wireless IP Camera

How Does an IP Camera Work?

Instead of transmitting data over a cable to a DVR or Monitor, a Webcam transmits digital video over a wired or wireless data connection. Everything that is required to transfer images and/or sound over your network is built into the unit. The Internet camera is connected directly to the network, just like other network devices. Depending on the type of camera you have it may save video to an attached memory card or drive, stream captured video to the internet, connect to another device on your network for storage.

An IP camera captures images just like any digital camera. Its different because of its ability to compress files and transmit them to a network. If your building is equipped with a network, the required infrastructure is in place to install Internet Cameras. If you are adding one or a multiple cameras, you may use a decentralized network camera, that has its own control interface and storage built in. When Mr Security Camera is installing multiple network cameras we usually use a centralized network camera which requires a (NVR) Network Video Recorder .

A Network Video Recorder is a program that stores video and/or audio from network cameras and allow you to view multiple cameras at the same time. It is similar to a DVR, but NVR needs the cameras to encode the video. The NVR simply stores data allowing for centralized remote viewing. Network Video Recording software is installed on an existing device and sometimes a dedicated device with its own operating system. Hybrid systems exist which are available that can accept both analog and IP inputs. These systems will usually allow analog cameras to be viewed remotely as well as network cameras.

What’s a Static IP Address and Why Do I Need It?

When a device is on a network, you access it by entering the IP (Internet Protocol) address into any web browser. (ISPs) Internet service providers supply a dynamic IP address to almost everyone. A dynamic IP address is just like a phone number that adjusts every time a device disconnects, while a static IP address never changes.

Only a ISP can provide you with a Static or Dynamic IP address and they typically charge a monthly service fee for a Static IP. In order for you to obtain constant access to your Internet Cameras you will need a Static IP address. If your ISP is unable to give you a static IP, there are also third party services are able to provide a virtual Static IP address. Most are free to use, and a simple internet search will provide a multitude of options.

Biometric Scanners

Biometric Scanner

Biometric Scanners

Mr Security Camera is constantly staying up on the latest technology and we only provide each of our customers the best our industry has to provide. Biometric scanners are the most advanced input devices access control systems have to offer.

Each scanner has a custom database for authorized personnel. Keys and key cards can be stolen or lost which can leave gaps in security for hours or even days. While biometrics scanners provide complete protection against unauthorized access. Some scanners have a built in data base within the scanner while others link back to a PC or Head End.

For a custom estimate on Biometric scanners contact Mr Security Camera at (916) 672-2660 today.

Biometric Scanner

Biometric Scanner

Biometric systems can seem complicated, but they all use the same three steps:

  • Enrollment: The first time your employees use a biometric system, it records their basic information, like their name and an identification number. Then the system captures an image or recording of their specific trait.

  • Storage: Contrary to what you see in movies these days, all systems don’t store the complete recording or image. Instead they analyze your specific trait and translate that into a code or graph for the system to analyze. Some systems also record the data onto a smart card that they can carry with them.

  • Comparison: The next time your employees use the system, it compares the same trait they present to the information on file. Then, it either rejects or accepts that they are who they claim to be..

Some employers use biometric scanners to provide the most accurate time card management. This requires each employee to be present at the time of check in. This prevents other employees from punching a co workers time card or a employee from reporting the wrong time on your time management software.

Biometric scanners are an integral piece of every commercial security system from protecting confidential information to protecting your bottom line. 

Access Control System Installations

Access Control System Installations Sacramento ca.

Access Control System Installations

Access Systems Control

Access Control System Installations Sacramento ca.

Access Control Systems utilize technology and procedures to maintain access for whom is able to go where and when they may enter that area. An Access Control System is made of: input/output devices to manipulate ingress/egress (doors, windows, and related equipment) systems. In order, to maintain and manipulate information regarding a known risk system and to manage information regarding personnel there is a central database. An Access Control System has multiple components: (Doors) entryways, locking devices (Locks), sensors to monitor if the door is open or closed. Verification devices are used to properly identify authorized users, and devices to allow exiting from the secure area to the outside. Notification Protocols contained in an external system to control devices within the system such as a PC.

Call Mr Security Camera (916) 672-2660 to assist you with the complete installation and facilitation of your custom access control system.

Biometric Access Control System

Biometric Access Control System

Access Control Systems benefit using technology within accordance in clearly defined and carefully built security procedures allow an organization to create a highly effective means of managing risk. Risk management is when an organization is able to minimize their vulnerability to losses. Companies without effective means to manage risk, and associated costs often see a severe impact in short-term profits and a rise in costs to offset losses.

Access Control Systems require four basic technologies in order to function adequately; PC (personal computer) to manage overall system control of all input devices (devices that detect conditions or events not specifically a door) Access Control doors and the related peripherals, including card readers, keypads, etc. Output Devices are items that respond directly to the input devices. (How they interact is explained below.)

Bio-Metric Scanner

Bio-Metric Scanner

System Architecture

Before we examine specific Access Control components, we will discuss briefly the architecture involved in an Access Control System. The systems architecture has three basic levels: field controllers, entry/exit devices, and the head end. The “head end” provides the system management capability for all the devices in the network and related information. The “Head End” is typically a personal computer (PC) that receives input information and initiates a signal at the appropriate locations with Basic Access Control Technologies devices. Operator interfacing takes place at the head end (PC).

In most systems now, field controllers, reside between the PC and the entry/exit devices; field controllers provide most of the moment-to-moment controls for the Access Control System. In older systems without the use of intelligent field controllers the PC almost exclusively provided these controls, and when a fault occurs and the (PC) head end goes offline, the entire system became unresponsive. Thankfully today this is not the case. In today’s systems, when the head end is offline, the field controllers ensure the system continues to operate in an effective manner.

Entry/Exit Devices are the “end-of-the-line” components. Working with field controllers, these low level components are able to provide minimal decision making capability independent (PC), to ensure a basic usage of Access Control functionality in case of a fault.

Access Control System Installations Sacramento ca

Head End (PC)

The PC functions as a control unit for the system. The PC receives processes and relays data to other devices within the Access Control network. It provides the operator a display to monitor system and day to day operations. In addition, the PC provides the operator a means to “interrogate” the system thoroughly, meaning the operator is able to request specific information about the status of the system and any of the devices within the system. They can also initiate specific actions at any specified location within the system from the Head End.

The PC also stores data and allows the operator to retrieve information, create reports, and back-up any data. In the larger applications requiring advanced systems there may be multiple control units (PC)s located throughout the system. It also should be noted that as we design security systems we prefer to have Access Control systems built on a its own Local Area Network (LAN). This provides significant advantages over the systems which exist on an organization’s main LAN.

Access Control Systems

Access Control Systems

Field Controllers

These days, security/surveillance systems are networked together. More importantly, they feature “distributed architectures.” This basically means that instead of having all processing capabilities residing at the head end (PC), processing is “distributed” at many points throughout the network. Field controllers provide this additional processing.

A field controller contains:  a CPU (central processing unit), Network communications capability, I/O (input/output) modules (printed circuit boards), card reader modules (printed circuit boards).

Field controllers allow the system to continue to function when the head end (PC) is temporarily unavailable or if another section in the system is down. If this happens, the field controllers store all event activity in order to upload later to the head end (PC) once the system is functional again. If a field controller has requirement for additional information to process a command, it can request information from the head end (PC). Additionally, scheduled exchanges of required data between the head end (PC) and the field controllers allow tracking for events to be logged into history and the current information made available to the field controllers. Also note, our security networks are custom designed to use the industry standard communications protocols. This ensures high level of reliability and minimum down time in the event of component failures.

Access Control System Installations Sacramento california

Input Devices

Input devices are connected to Access Control Systems and any detector which reports their status to a PC electronically. The purpose is to provide data to the processor in regards to the current conditions at any given location.  Typically they include a wide range of detector types, including: glass break detectors, motion detectors, panic buttons, temperature monitors, ETC.

In addition, to the devices listed above there are additional functioning items that physically reside near or on a door. These devices provide data specifically related to if the door’s open or closed.

Each of these devices provides data directly to the head end (PC) The Head end (PC) can perform a variety of analysis, the modern user interfaces and a wide range of output options.

Access Control System Installations Sacramento

Access Doors and Related Peripherals

There are many intricate devices designed in order to control the status of a door. These devices include; door contact switches place requests with exit devices, card readers and/or keypad devices. Door position indicators show the current status of a door and reveal whether it’s open or closed. They are basic electrical devices, by completing a circuit when the door is closed.

Request exit devices are simple electrical switches. These devices are used to indicate someone inside the secured side of the Access Control Door wants to have the door unlocked. This action is typically reported to the PC.

Keypads and Card Readers are perhaps they are the most sophisticated door peripherals used in operation of a Control System. These particular devices, usually exist as a integrated or single unit

Finally, each Access Control door is equipped with a locking mechanism. Either an magnetic lock or electric door strike which can be manipulated by a field controller.

Card Readers and Keypads Card

Keypad Card Readers and Card Readers are devices that read data from the users supplied card. There are a wide variety of distinct media used for these cards: proximity (active or passive), magnetic stripe, bar code, Passive proximity cards, all contain electronic circuitry (including an antennas) which stores the ID data. Each time these cards pass near a reader, then electrical energy radiating from the reader charges the circuitry in the card. Then the circuitry transmits the data (ID information) on the card to the reader. Each card proximity card maintains its own power source. This “on-board” power supply their by increases the range.  Proximity card technology is easy-to use and provides a high level of security. Each card stores information in a unique fashion.