Welcome To b2b168.com, Join Free | Sign In
中文(简体) |
中文(繁體) |
Francés |Español |Deutsch |Pусский |
| No.13702897

- Product Categories
- Friendly Links
Information Name: | Intelligent Access |
Published: | 2015-04-17 |
Validity: | 30 |
Specifications: | |
Quantity: | 100.00 |
Price Description: | |
Detailed Product Description: | Access control system is a subsystem of import and export management system, usually it uses credit cards, biometric identification technologies such as under the control of management software for import and export management, so that there is free movement of qualified people out, who should not have access to the others interfere. ??? Because of the access control system can quickly identify the person's identity, it quickly over a decade out from the film come into the office office building, large multinational companies, but also guard at the door garage, subway and residential buildings, even before the use of desktop computers, you can use it to confirm the user's identity. We can say that in many places need to check the identity of almost all access control systems installed. ??? Access control system works as follows: ??? access to the main gate at the top of the door and the door inside and outside of the control, equipped with a variety of access control equipment: When the cardholder intends to door ??? When he would swipe the card reader at the door with a proximity card, enter the password in the password keyboard, it could be to use the fingerprint reader, palm reader, retina recognition device, etc. biometric identity verification. ??? When the cardholder credit card, the information is transmitted to the gate near the north controller, through the computer to recognize the controller, and confirm that the cardholder is eligible to enter, send a control signal above the door (or door side) to The electric lock, open the door to let the cardholder to enter. ??? Cardholder after the door, the door will automatically shut down (using the floor spring, door closers and other devices). In the electric locks often also equipped with sensing devices (lock status sensor), once the door or electric lock is turned on, it will return the signal to the controller, when the door is open too long, the controller or the bell will sound informing and quickly closed the door-opener (this phenomenon often seen in the hotel room door). ??? Transfer controller will also open the door cardholder information onto computer room access management within. Computer after receiving information, the information will be stored and displayed on the screen, while the information will be transferred to the relevant software (such as: attendance software, etc.) to go. After ??? When the cardholder intends to go after finishing post, he can go inside of the door by pressing button (when a one-way card. If it is bi-directional swipe the card on the inside of the door also need to), the door opens automatically. ??? If the cardholder information is not registered, the controller will not open the door, only the card information input to the management software and downloaded to the controller memory, the controller only when the card door. ??? When the access control system is powered down, the system will automatically lock in the open state power, people can freely access. Unable to prevent escape in the event of fire. ??? Access control systems and industrial control systems (automatic control systems), substantially similar to the building automation system (BA) of the various principles, it can be divided into the sensing operation, management and implementation of the three links, but it is relatively compact, relatively simple only. Sensing ???: ??? reader, keyboard password, various biometric readers, exit button, lock status sensors are sensors, their task is to accept the command, after checking the signal upload or upload (Bio identifier). ? ??? Management:? ??? Controllers and access control management software system bear management functions, they sent after receiving the sensor information, based on the time, card number and other information to make a judgment on whether or not to open the door, if the door , issue commands to the electric door lock. And when you receive the lock status sensor, then start the timer expires, the alarm. ??? Execute: ??? power locks open or closed at the time of receipt of order (powered on or off), it "execute" command will be adjusted to be consistent with the work of the state command. Power locks and lock status sensors within the feedback and supervision played a role. ??? Some controllers can use the relay (or other contact switch, commonly known as hard-contact) outputs a control signal to control the linkage of the camera and lighting. Second, the transmission line access control system works ??? seen from the above, there is access control system in the following transmission lines: the power supply cord ??? ??? access control system, mostly from the engine room of the UPS, so as not to burst on the scene open the door when a malfunction caused power outages. Power cord is usually 220V AC transfer mode, the purpose is to reduce the power line voltage drop. ??? Beside the controller, equipped with a power supply, AC 220V power converted into DC 12V power supply controller and power locks, respectively. ???? Cabling systems belong to any intelligent system physical layer, in the original definition, "integrated" the word was defined as: alternative to various weak systems (ie intelligent systems). However, due to price and awareness on a large number of integrated wiring system has long been used for telephone and computer network system, integrated wiring system as the technology is increasingly popular, many intelligent systems cabling system gradually began to use as its transmission lines. ? ??? This article describes the initial access control system cabling applications. I. Introduction Access Control System Access control system is a subsystem ??? import and export management system, usually it uses credit cards, biometric identification technologies such as under the control of management software for import and export management, so that there are qualified people out of freedom access, for those who should not be out of the intervention. ??? Because of the access control system can quickly identify the person's identity, it quickly over a decade out from the film come into the office office building, large multinational companies, but also guard at the door garage, subway and residential buildings, even before the use of desktop computers, you can use it to confirm the user's identity. We can say that in many places need to check the identity of almost all access control systems installed. ??? Access control system works as follows: ??? access to the main gate at the top of the door and the door inside and outside of the control, equipped with a variety of access control equipment: When the cardholder intends to door ??? When he would swipe the card reader at the door with a proximity card, enter the password in the password keyboard, it could be to use the fingerprint reader, palm reader, retina recognition device, etc. biometric identity verification. ??? When the cardholder credit card, the information is transmitted to the gate near the north controller, through the computer to recognize the controller, and confirm that the cardholder is eligible to enter, send a control signal above the door (or door side) to The electric lock, open the door to let the cardholder to enter. ??? Cardholder after the door, the door will automatically shut down (using the floor spring, door closers and other devices). In the electric locks often also equipped with sensing devices (lock status sensor), once the door or electric lock is turned on, it will return the signal to the controller, when the door is open too long, the controller or the bell will sound informing and quickly closed the door-opener (this phenomenon often seen in the hotel room door). ??? Transfer controller will also open the door cardholder information onto computer room access management within. Computer after receiving information, the information will be stored and displayed on the screen, while the information will be transferred to the relevant software (such as: attendance software, etc.) to go. After ??? When the cardholder intends to go after finishing post, he can go inside of the door by pressing button (when a one-way card. If it is bi-directional swipe the card on the inside of the door also need to), the door opens automatically. ??? If the cardholder information is not registered, the controller will not open the door, only the card information input to the management software and downloaded to the controller memory, the controller only when the card door. ??? When the access control system is powered down, the system will automatically lock in the open state power, people can freely access. Unable to prevent escape in the event of fire. ??? Access control systems and industrial control systems (automatic control systems), substantially similar to the building automation system (BA) of the various principles, it can be divided into the sensing operation, management and implementation of the three links, but it is relatively compact, relatively simple only. Sensing ???: ??? reader, keyboard password, various biometric readers, exit button, lock status sensors are sensors, their task is to accept the command, after checking the signal upload or upload (Bio identifier). ? ??? Management:? ??? Controllers and access control management software system bear management functions, they sent after receiving the sensor information, based on the time, card number and other information to make a judgment on whether or not to open the door, if the door , issue commands to the electric door lock. And when you receive the lock status sensor, then start the timer expires, the alarm. ??? Execute: ??? power locks open or closed at the time of receipt of order (powered on or off), it "execute" command will be adjusted to be consistent with the work of the state command. Power locks and lock status sensors within the feedback and supervision played a role. ??? Some controllers can use the relay (or other contact switch, commonly known as hard-contact) outputs a control signal to control the linkage of the camera and lighting. Second, the transmission line access control system works ??? seen from the above, there is access control system in the following transmission lines: the power supply cord ??? ??? access control system, mostly from the engine room of the UPS, so as not to burst on the scene open the door when a malfunction caused power outages. Power cord is usually 220V AC transfer mode, the purpose is to reduce the power line voltage drop. ??? Beside the controller, equipped with a power supply, AC 220V power converted into DC 12V power supply controller and power locks, respectively. ??? Electric lock access control system with the vast majority belong to the 12V DC power supply. In the electric lock breaking moment, due to the midline lock bag (solenoid coils) the role of electricity, will produce a strong current in the power line, it is easy to cause power fluctuations, and this power fluctuations extremely stable operation of the controller unfavorable, so requiring high reliability access control system, controller and electric locks using different power modules, namely 220V AC power to the controller, use two 12V DC power supply modules each rectifier / regulator after the supply of electric locks and controls, respectively. ??? Selection of various power lines are essentially based Electrical Manual, a standard power cord. ??? ??? Control signal line Controller has three signal lines are connected to the card reader (4 to 9-pin), power locks in the lock status sensor (2 cores) and out buttons (2 core). This three-way signal line can use the twisted-pair cabling alternative. ? ??? To avoid electromagnetic interference space, readers should use shielded wire signal lines, and the other two signal lines, you can use shielded cable, unshielded cable can also be used. ~ ~ ~ ~ ~ ~ Between remote signal line from the controller to manage the computer, there is a signal line, which mostly transport protocol RS485, in the distance near the time may be RS232 (to reduce a RS232 / RS485 converter ), the requirements for fast transmission speed when using the TCP / IP protocol that uses Ethernet transmission. These three protocols can use twisted pair, RS485 or RS232 transmit only when the product is basically the access controller manuals require shielded cable. To avoid electromagnetic interference, this root should be shielded twisted pair signal lines. When the controller output Yingjie point need to use direct control DVR (synchronized recording when the card door), this control line (2-wire) shielded cable should be used to avoid because of the small hard disk recorders, when the input signal amplitude due to electromagnetic interference cause false triggering. But if it is transmitted directly by Yingjie point lights when the power is the power cord should be used. ??? Based on the above analysis, the transmission power (for power locks, power controllers and lighting), the power cord should be used, its cross-sectional area can be calculated based on the pressure drop and the heat generated by the current, you can also check the Electrical Manual get. ? ???? In the transmission of the sensor signals and control signals, should be based on reader and controller installation manual, select the shielded cable or unshielded cable. Third, access control system cabling applications ??? As the number of door access control system lock more and more demands on the system transmission rate also increasing (faster response time), and often engaged in the access control system construction units also conduct construction cabling system, the use of twisted pair transmission line access control system, has become one of the cable select access control system. ??? According to the analysis of the various access control cables between the reader, the controller, managing the computer signal and control lines can be used twisted pair. ? ??? At the same time access control systems and intelligent building cabling in less than 20 meters often have lost the use of twisted pair cabling project value, become engineering waste line. For a distributed installation of the controller (single or double door Double open door open single controller), the exit button signal line, the reader signal lines and signal lines are mostly locked state to use these waste lines. ??? Using TCP / IP protocol Remote signal lines must be twisted pair transmission, it is entirely possible to use standard cabling system for signal remote star structure. ??? RS485 cable and RS232 cable can also use twisted pair, according to the installation manual for access control, these cameras should use shielded twisted pair, to avoid electromagnetic interference caused by malfunction. Fourth, note the application of access control system cabling system ??? when when using the integrated wiring system as the access of transmission lines, should pay attention to the following factors: ??? wiring methods should be fully in accordance with the wiring rules on a variety of access control equipment, and retain detailed wiring diagrams, in order to avoid pain during maintenance when the line judge. ??? Shielded twisted pair shield should be grounded in accordance with the completion of the installation manual reader controller. ??? If shielded twisted pair transmission TCP / IP, can be completely shielded cabling system shield termination rules. ??? When using the TCP / IP protocol, it is best not shared with other intelligent systems (including office automation systems and other software systems) network switches, access control system that is equipped with a single network switch, so as to avoid accidental transmission protocol on conflict. ??? When using the TCP / IP protocol, you can access the system's management believes that access the network computer a server, using twisted pair or fiber optic cable connected to the patch panel. ??? Cabling system can be used for access control systems, it has been confirmed by suppliers and installers access control system, but should be a comprehensive assessment of the project cost, construction and performance, in order to achieve the best results |
Admin>>>
You are the 5221 visitor
Copyright © GuangDong ICP No. 10089450, Jinan sunset Automation Equipment Co., Ltd. All rights reserved.
Technical support: ShenZhen AllWays Technology Development Co., Ltd.
AllSources Network's Disclaimer: The legitimacy of the enterprise information does not undertake any guarantee responsibility
You are the 5221 visitor
Copyright © GuangDong ICP No. 10089450, Jinan sunset Automation Equipment Co., Ltd. All rights reserved.
Technical support: ShenZhen AllWays Technology Development Co., Ltd.
AllSources Network's Disclaimer: The legitimacy of the enterprise information does not undertake any guarantee responsibility