Lecture 9. System controllers for monitoring the use of management
Controllers
Controllers are an intelligent element of the access control system and are divided into autonomous, networked and integrated. There can be several controllers in the system, and in large systems they can also be multi-level will be . Low-level controllers are usually installed near the reader and solve the task themselves, if they encounter an unknown card, they request a higher-level controller, which will coordinate them. In more complex cases, the request goes to the central computer, which stores the entire database. In the minimum version, the controller can be installed in the reader case. Sometimes all the problems are on a standard computer. Good controllers, of course, support the communication mode with a remote computer via a telephone line. This allows you to centrally coordinate the database in all branches of one organization and, in addition, receive prompt reports on all emergency situations.
Autonomous (local ) controlled by a microcomputer , as a rule, serves one control point (e.g., it may have several transition lines and, accordingly, control terminals). possible ). Identification information about users and their permissions is stored in a local database. This type of access control system is the simplest in terms of configuration, but the least reliable in terms of the possibility of their failure. They can be used mainly in facilities where a high level of security is not required.
Autonomous controllers
There are single-door systems similar to those described above, but in them the reader and the controller are combined into one housing, that is, the unit that decides to open the lock is located in the reader module. This, on the one hand, reduces the cost of the system, but on the other hand, reduces functionality and, most importantly, increases the likelihood of damaging the reader housing and closing the contacts to which the lock is connected.
Autonomous controllers
In facilities with high security requirements, controllers with digital control are used in the locking relay. Remote locking The module is installed directly next to the lock and is controlled by a special digital code. An example of such systems is Apollo (USA) can be cited as examples of controller-based access control systems .
Often in autonomous systems : magnetic card , “ Touch memory “ from students uses, as well as in some biometrics, Wiegand IDs or other readers is applied .
Autonomous controllers
Controllers in such systems must have their own memory buffer of card numbers (identifiers) and events occurring in the system. They can usually use a local printer to print an event log. These controllers are programmable , as a rule, allowing new cards to be entered into the controller's memory and old ones to be deleted from any keyboard or using master cards. One controller in such systems usually controls access to one (maximum two) doors.
Autonomous controllers
Often the controller itself is systematically combined with the reader in one housing. The simplest autonomous systems (often called "hotel systems") usually combine the decision controller, reader / keyboard and electric lock in one housing. However, it should be noted that this measure, which allows to reduce the cost of the system, leads to a decrease in security, increases the likelihood of hacking the system.
Autonomous controllers
In systems with more than three doors autonomous from controllers use can take a long time (especially with a large number of users ) there is in systems ). In this case, the network controllers application acceptable road is considered .
Network controllers monochrome and multi-faceted to be possible .
Network controllers
Distributed ACS architecture ( Single )
Advantages:
Distributed ACS architecture ( Single )
Disadvantages:
Distributed ACS architecture ( Single )
Centralized ACS architecture (multi-tier)
Advantages:
Centralized ACS architecture (multi-tier)
Disadvantages:
Centralized ACS architecture (multi-tier)
FOR YOUR ATTENTION !!!