网站标志
购物车
购物车  有 0件商品  总价 ¥0.00
商品搜索

 

点评详情
发布于:2019-3-13 19:55:16  访问:780 次 回复:0 篇
版主管理 | 推荐 | 删除 | 删除并扣分
Entry Management System Fundamentals
HubPages»
Technology»
Consumer Electronics by controlling who can enter (or exit) and when they`ll achieve this; and by monitoring the situation of doors and locking hardware.
Right here is some access control vocabulary:
Consumer - someone who makes use of the access management system to get in and/or out.
Credential - the id of the person from the system`s standpoint. Forms of credentials embody pin code, magazine stripe card, prox playing cards and prox keys, and a human characteristic, such because the retina of the eye or fingerprints.
Pin Code - \"PIN\" stands for Private Identification Quantity - a sequence of numbers distinctive to a specific user.
Mag Stripe Card - (magnetic stripe card) - plastic card with a magnetic strip utilized to one aspect. The magnetic strip contains a code that can be learn by a magnetic stripe card reader.
Prox Card - (proximity card) - plastic card with a transponder chip embedded inside. The transponder communicates with a proximity reader to impact entry control. A Prox Key (or Prox Fob) is a plastic object containing a transponder chip that may by connected to the consumer`s key ring.
Time Zones - (schedules) - operate of an entry control system that controls when sure users` credentials might be accepted by the system and when they won`t.
Audit Trail - historical past of occasions recorded by the system, comparable to time when a credential is introduced, instances of when a door was forced or propped open, or time when a door is opened for egress.
Entrance End - system person interface on the door that reads the credential and transmits the information to the entry management panel.
Panel - brains of the entry management system - receives the knowledge from the front and and decides, based mostly on its programming, whether or not to permit access.
How It works
Full featured entry management systems work like this:
The system supervisor uses access management software installed on their pc to set the parameters of the system, that`s, to tell the access control panel what to do and when. Entry control software program is database software. The records in the database will be users, credentials, doors, and times. Using the software, the supervisor can grant or deny people or teams of users access to particular doorways between sure hours and on sure days. The software program can usually report which user accesses which door at what time and other events it what they call an audit path.
In operation:
The consumer presents their credential.
The reader sends the information to the access management panel.
The panel compares the knowledge to its programming, \"decides\" whether or not to grant or deny the person entry, and data the event in reminiscence.
A low voltage power provide powers the system and electric locking devices.
This system will be made up of parts primarily based on the constructing`s electrical system, can be part of the pc community both as devices connected on to the network or connected wirelessly by way of an interface, or they are often small, self-contained gadgets that accomplish entry management on one door at a time.
Easy programs that control only some doorways and serve a small numbers of users may provide solely the ability to add and delete users. These items have the same form of \"brains\" that a more advanced system does, but with less functionality. These methods are excellent for functions the place audit trail and time zones are unnecessary, but the necessity to be able to deny access to a single door access control kit person is required.
Considerations
How many users? How many people will use the system now, and what number of may use it sooner or later? Number of users is the first criteria for choosing an access management system.
How many doors? Once more, how many doorways will have entry management now, and what number of may have entry control sooner or later?
Do you want audit trail functionality? Would you like time zones? Audit path capability allows the administrator to keep monitor of users as they enter the secured house. The system ‘remembers` when a user presents their credential to the system. We`ll talk about credentials shortly. Usually by way of a pc interface, the administrator can access and/or print out a list of ‘events` including authorized entry, pressured entry, and door propped open events.
Time zones are blocks of time assigned to users. If Bob Smith works from 9am to 5pm and you do not need him to are available any other time, time zones let you make Bob`s credential work solely when Bob is authorized to work.
Audit path and time zone capabilities often mean that your access control system will interface with a computer using proprietary software program supplied by the access control system manufacturer. It is possible to have these features with out software, however that often means that the administrator should punch in commands on a keypad and obtain audit trail info on to a printer. A keypad could be a complicated if not irritating person interface, and the direct print idea is very time consuming, not to mention a waste of paper.
What sort of credential do you want to make use of? The credential is the factor that the person presents to the access management system. The access control system permits or denies entry to the credential when offered. These are the commonest sorts of credentials that are used at this time:
Pin code - a series of numbers. The user sequentially presses numbered keys on a keypad. Advantage: numbers are free. Drawback: numbers will be shared over the phone. If the thing is to easily eliminate the necessity to have a key, then a keypad is ideal. All of the users can use the identical quantity. Just remember to vary the code a number of occasions a year so that the numbers don`t get worn off.
Magazine stripe card - like an ATM or bank card, a plastic card with a black magnetic strip across the again. Advantage: common and broadly used in addition to inexpensive. Disadvantage: they put on out.
Prox card - proximity card, a PVC card with a pc chip embedded inside. At the moment this is the most well-liked form of credential. Advantages: it is feasible to get a proximity reader that will read the card through the users pants and wallet or inside a handbag. Additionally since prox playing cards don`t really need to contact the reader normally, they last a really long time. Disadvantage: more expensive than pin codes or magazine stripe playing cards. A slightly costlier different to the prox card is the prox tag or prox key. The prox key is a small, teardrop-shaped credential that can be placed on the consumer`s key ring.
Biometrics - precise physique parts. Biometric readers use a dwell fingerprint, handprint, or the retina of the attention because the credential. Advantages: extraordinarily secure and no credentials to purchase. Drawback: at the moment in July, 2008, this is still comparatively new technology to the sector of economic access management, so the variety of decisions is fairly small and price tags might be typically fairly hefty.
5. Do you want emergency lock-down functionality?
Emergency lock-down capability is changing into extra in demand. Under emergency situations, reminiscent of an armed intruder, it can be an urgently needed perform.
Hardwired, PoE, or Wireless?
Hardwired Access Management
This is the model proven in the illustration above. A low voltage power supply is wired to the panel and the panel is wired to the readers. Generally a separate power provide could also be required for sure sorts of locking locking gadgets, however the panel will in all instances be wired into the electric locking system. The computer is linked to the entry management panel through a cable.
Hardwired methods are the tried-and-true traditional approach of attaining access control. Ideally they`re installed throughout construction in order that their wiring may be completed at the same time as all the opposite wiring. Including hardwired access management after the very fact can be troublesome, notably, for example, if the area has marble partitions and floors and no drop ceiling.
PoE
Power Over Ethernet techniques are gaining reputation. These presuppose that there`s (or will be) a computer network in place, and require the participation of the system administrator. These methods typically use server-based software, so can be managed from any Computer on the network. This is a comfort, but also poses extra security dangers. Since the system uses the same sort of cable as the pc community, the identical people who run the community cable will run it to the doors to effect access control.
As these kinds of methods have taken hold, electric locking devices that run on PoE have appeared. PoE systems offer a plug-and-play performance that many discover enticing.
Wireless
Wireless access control techniques can go the place hardwired programs worry to tread. Marble walls, concrete floors, concrete-crammed door frames and textured plaster ceilings are instantly no downside. These systems are made up of battery-operated locks and exit machine trims with onboard electronics and transponders. The locks communicate wirelessly over wi-fi through the facility’s computer network with server-based mostly entry management software, or through direct RF connection with an interface panel which in flip communicates with the entry management panel.
Wireless elements could be built-in into present or new hardwired methods, but licensing fees and particular interface panels could also be required. Examine with your skilled security integrator or entry control system seller for more data.
Wireless systems have a tendency not to have the instant lockdown capabilities of hardwired techniques. If that feature is necessary to your utility, you should definitely query your entry management vendor or manufacturer’s consultant for more data.
Standalone Access Management
The time period \"standalone\" refers to an entry control system that is self-contained as an alternative of connected to a bigger system. Such units can supply superior options resembling time zones, audit trail and programming by way of private computer, or they can be easy techniques that solely permit including and deleting users. Standalone entry management units may be battery operated or hardwired.
When a standalone entry management system is programmed through laptop, the computer could should be delivered to the door to do the programming, though some manufacturers offer a hand-held programmer to handle communication between the computer and the machine.
Standalone systems that serve a small variety of users the place no superior options are required can typically be programmed by coming into codes on a keypad. For a system with lower than 50 customers and one or two doors this can be a high quality choice. The system manager will want to keep monitor of the users on paper.
Associated
Computers peak:75px\" class=\"thumbphoto\">Safety peak:75px\" class=\"thumbphoto\">Networking TechnologiesComputer Network Topology
by Patrick Kamau6
Simulation top:75px\" class=\"thumbphoto\">Safety height:75px\" class=\"thumbphoto\">Safety top:75px\" class=\"thumbphoto\">Security \" id=\"comText_1431849\" name=\"comText_1431849\" autocomplete=\"off\" rows=\"6\">zero of 8192 characters usedPost CommentNo HTML is allowed in feedback, but URLs will be hyperlinked. Comments usually are not for promoting your articles or other websites.
sendingNo comments but.
共0篇回复 每页10篇 页次:1/1
共0篇回复 每页10篇 页次:1/1
我要回复
回复内容
验 证 码
看不清?更换一张
匿名发表 
脚注信息
天天同城网站管理系统
服务时间:周一至周日 08:30 — 20:00  
联系地址:焦作市站前路中央尚都1幢1单元20楼2001室   邮政编码:454150