Access Control System Installations
Access Systems Control
Access Control Systems utilize technology and procedures to maintain access for whom is able to go where and when they may enter that area. An Access Control System is made of: input/output devices to manipulate ingress/egress (doors, windows, and related equipment) systems. In order, to maintain and manipulate information regarding a known risk system and to manage information regarding personnel there is a central database. An Access Control System has multiple components: (Doors) entryways, locking devices (Locks), sensors to monitor if the door is open or closed. Verification devices are used to properly identify authorized users, and devices to allow exiting from the secure area to the outside. Notification Protocols contained in an external system to control devices within the system such as a PC.
Call Mr Security Camera (916) 672-2660 to assist you with the complete installation and facilitation of your custom access control system.
Access Control Systems benefit using technology within accordance in clearly defined and carefully built security procedures allow an organization to create a highly effective means of managing risk. Risk management is when an organization is able to minimize their vulnerability to losses. Companies without effective means to manage risk, and associated costs often see a severe impact in short-term profits and a rise in costs to offset losses.
Access Control Systems require four basic technologies in order to function adequately; PC (personal computer) to manage overall system control of all input devices (devices that detect conditions or events not specifically a door) Access Control doors and the related peripherals, including card readers, keypads, etc. Output Devices are items that respond directly to the input devices. (How they interact is explained below.)
Before we examine specific Access Control components, we will discuss briefly the architecture involved in an Access Control System. The systems architecture has three basic levels: field controllers, entry/exit devices, and the head end. The “head end” provides the system management capability for all the devices in the network and related information. The “Head End” is typically a personal computer (PC) that receives input information and initiates a signal at the appropriate locations with Basic Access Control Technologies devices. Operator interfacing takes place at the head end (PC).
In most systems now, field controllers, reside between the PC and the entry/exit devices; field controllers provide most of the moment-to-moment controls for the Access Control System. In older systems without the use of intelligent field controllers the PC almost exclusively provided these controls, and when a fault occurs and the (PC) head end goes offline, the entire system became unresponsive. Thankfully today this is not the case. In today’s systems, when the head end is offline, the field controllers ensure the system continues to operate in an effective manner.
Entry/Exit Devices are the “end-of-the-line” components. Working with field controllers, these low level components are able to provide minimal decision making capability independent (PC), to ensure a basic usage of Access Control functionality in case of a fault.
Head End (PC)
The PC functions as a control unit for the system. The PC receives processes and relays data to other devices within the Access Control network. It provides the operator a display to monitor system and day to day operations. In addition, the PC provides the operator a means to “interrogate” the system thoroughly, meaning the operator is able to request specific information about the status of the system and any of the devices within the system. They can also initiate specific actions at any specified location within the system from the Head End.
The PC also stores data and allows the operator to retrieve information, create reports, and back-up any data. In the larger applications requiring advanced systems there may be multiple control units (PC)s located throughout the system. It also should be noted that as we design security systems we prefer to have Access Control systems built on a its own Local Area Network (LAN). This provides significant advantages over the systems which exist on an organization’s main LAN.
These days, security/surveillance systems are networked together. More importantly, they feature “distributed architectures.” This basically means that instead of having all processing capabilities residing at the head end (PC), processing is “distributed” at many points throughout the network. Field controllers provide this additional processing.
A field controller contains: a CPU (central processing unit), Network communications capability, I/O (input/output) modules (printed circuit boards), card reader modules (printed circuit boards).
Field controllers allow the system to continue to function when the head end (PC) is temporarily unavailable or if another section in the system is down. If this happens, the field controllers store all event activity in order to upload later to the head end (PC) once the system is functional again. If a field controller has requirement for additional information to process a command, it can request information from the head end (PC). Additionally, scheduled exchanges of required data between the head end (PC) and the field controllers allow tracking for events to be logged into history and the current information made available to the field controllers. Also note, our security networks are custom designed to use the industry standard communications protocols. This ensures high level of reliability and minimum down time in the event of component failures.
Input devices are connected to Access Control Systems and any detector which reports their status to a PC electronically. The purpose is to provide data to the processor in regards to the current conditions at any given location. Typically they include a wide range of detector types, including: glass break detectors, motion detectors, panic buttons, temperature monitors, ETC.
In addition, to the devices listed above there are additional functioning items that physically reside near or on a door. These devices provide data specifically related to if the door’s open or closed.
Each of these devices provides data directly to the head end (PC) The Head end (PC) can perform a variety of analysis, the modern user interfaces and a wide range of output options.
Access Doors and Related Peripherals
There are many intricate devices designed in order to control the status of a door. These devices include; door contact switches place requests with exit devices, card readers and/or keypad devices. Door position indicators show the current status of a door and reveal whether it’s open or closed. They are basic electrical devices, by completing a circuit when the door is closed.
Request exit devices are simple electrical switches. These devices are used to indicate someone inside the secured side of the Access Control Door wants to have the door unlocked. This action is typically reported to the PC.
Keypads and Card Readers are perhaps they are the most sophisticated door peripherals used in operation of a Control System. These particular devices, usually exist as a integrated or single unit
Finally, each Access Control door is equipped with a locking mechanism. Either an magnetic lock or electric door strike which can be manipulated by a field controller.
Card Readers and Keypads Card
Keypad Card Readers and Card Readers are devices that read data from the users supplied card. There are a wide variety of distinct media used for these cards: proximity (active or passive), magnetic stripe, bar code, Passive proximity cards, all contain electronic circuitry (including an antennas) which stores the ID data. Each time these cards pass near a reader, then electrical energy radiating from the reader charges the circuitry in the card. Then the circuitry transmits the data (ID information) on the card to the reader. Each card proximity card maintains its own power source. This “on-board” power supply their by increases the range. Proximity card technology is easy-to use and provides a high level of security. Each card stores information in a unique fashion.