Introduction To Access Control
Introduction To Access Control
Benefits Include:
•No Moving Parts
26bit format
üCompatible with most access control panels on the market.
To come back through the door there are the following options:
Use a Request to Exit button.
Use another reader, on the same door. Known as read IN, read OUT.
Use a mechanical handle (dependant upon the device securing the door).
Break Glass Unit (BGU) Door Contact (DC)
Double pole break glass Monitoring the door
units should be always status is essential to
installed on the egress allow the user to know
side of the door as this will if the door has been left
provide immediate local open or forced open.
release of the door in case Without it the access
of fire. BGU should be control system is
monitored so breakage running in low security
can
Exitbe reported. mode.
Button (RTE) Maglock
Exit buttons are used to Electronic locking
release the locking mechanism is required
hardware for all FREE to lock and release the
EGRESS doors. door, many versions and
types are available
depending on the door
and application.
Controlled Door:
Outside View
This is an illustration of the non-secured side of
an access controlled door.
Check List :
•Reader
•Keypad (optional)
locked/disabled
Controlled Door: Inside View – Free
Egress
This illustration is the most common. It allows
users to exit the protected area freely. It is called
FREE EGRESS
Check List :
•Maglock
•Door Contact
Check List :
•Maglock
•Door Contact
•Reader
TCP/IP
The access control software can send
and receive information to the
controllers using an existing Ethernet
Network known as either:
Considerations Co-operation of IT
Communication Methods –
RS-485
RS-485
The access control software can send
and receive information to the
controllers using a dedicated cable
running from controller to controller
and back to the PC.
Considerations; Limited to a
distance of 1000 m per loop and the
cable run must not be mixed with
power cables and ideally running
along side low voltage cables on own
Communication Methods –
Wireless
Wireless
The access control software can send
and receive information to the
controllers using wireless technology
to transmit the data in either TCP/IP
or RS-485 protocols.
Options:
WIFI, GSM allows the use of
different wireless technologies for
transmitting TCP/IP protocols.
Wireless RS-485 Specifically
transmits RS-485 signal.
Workstation
Server
The system can be managed
The access control software
from other locations and for
works with a database that
this a workstation is required,
manages all the records,
The data is still based at
transaction etc. This can be
Server.
MS Access or SQL. All this data
is stored in the main server.
Intelligent Controller
Certain parts of the database
are loaded from the server to
the controller. Controller will
continue to work even if server
is not connected. Some
functions may be effected if
such loss takes place.
Basic Access Control Types
Stand Alone
This method of controlling access to the
door does not utilise software, all
programming, deleting, adding is done
from the device itself. No reporting or
networking is available at that level. If
multiple doors are required to be
controlled, then programming needs to be
done separately at each door.
PC Based
This method allows the user to control the
whole system using software. Multiple
doors and sites can be controlled
centrally, with full reporting and
scheduling available. With this version
you can have the software installed in a
PC locally or have the software hosted
Basic Access Terminology
Access Groups/Time Schedules
Time Schedules
In order to create restrictions for the
times when certain doors can be used, it
is essential to create daily schedules and
weekly which defines the times when
certain doors are intended to be used.
This must be the first consideration for
the system before programming the
system starts. Example for office staff (9-
6 Monday to Friday)
Access Groups
Anti-Passback A
Anti-Passback is used to increase the
level of security in a building by not
allowing users to tailgate (Follow person D
in front without presenting a valid card).
Example if someone tailgated and ended A B
up in area C, then they try and exit using C
exit reader C, the system will not allow
this transaction.
Considerations
Questions
ü You will need to have readers on both
sides of the door. What is Global Anti-Passback or (Local)
ü It is recommend that this feature is used
hand on hand with physical barriers, like What is soft Anti-Passback (Hard)?
turnstiles.
ü If not used correctly, it can cause serious
Questions
1. If you were to advice a school requiring access control for 10 doors, what type
of system, technology would you recommend and why?
3. Customer asks question about the PC based system that you are looking to
offer; Will the system still work if the PC goes down?
4. End user wants to have a new system installed, but insist to use Magnetic
Stripe Technology. What is your advice?
5. Sport Club have 5 doors to control for use of members and staff, they have
about 2,000 members and 30 staff. They want you to install 5 stand alone
systems to keep the costs down! What are your thoughts and
recommendations.?