1 of 15

Lecture 9. System controllers for monitoring the use of management

2 of 15

Controllers

Controllers are an intelligent element of the access control system and are divided into autonomous, networked and integrated. There can be several controllers in the system, and in large systems they can also be multi-level will be . Low-level controllers are usually installed near the reader and solve the task themselves, if they encounter an unknown card, they request a higher-level controller, which will coordinate them. In more complex cases, the request goes to the central computer, which stores the entire database. In the minimum version, the controller can be installed in the reader case. Sometimes all the problems are on a standard computer. Good controllers, of course, support the communication mode with a remote computer via a telephone line. This allows you to centrally coordinate the database in all branches of one organization and, in addition, receive prompt reports on all emergency situations.

3 of 15

Autonomous (local ) controlled by a microcomputer , as a rule, serves one control point (e.g., it may have several transition lines and, accordingly, control terminals). possible ). Identification information about users and their permissions is stored in a local database. This type of access control system is the simplest in terms of configuration, but the least reliable in terms of the possibility of their failure. They can be used mainly in facilities where a high level of security is not required.

Autonomous controllers

4 of 15

There are single-door systems similar to those described above, but in them the reader and the controller are combined into one housing, that is, the unit that decides to open the lock is located in the reader module. This, on the one hand, reduces the cost of the system, but on the other hand, reduces functionality and, most importantly, increases the likelihood of damaging the reader housing and closing the contacts to which the lock is connected.

Autonomous controllers

5 of 15

In facilities with high security requirements, controllers with digital control are used in the locking relay. Remote locking The module is installed directly next to the lock and is controlled by a special digital code. An example of such systems is Apollo (USA) can be cited as examples of controller-based access control systems .

Often in autonomous systems : magnetic card , “ Touch memory “ from students uses, as well as in some biometrics, Wiegand IDs or other readers is applied .

Autonomous controllers

6 of 15

Controllers in such systems must have their own memory buffer of card numbers (identifiers) and events occurring in the system. They can usually use a local printer to print an event log. These controllers are programmable , as a rule, allowing new cards to be entered into the controller's memory and old ones to be deleted from any keyboard or using master cards. One controller in such systems usually controls access to one (maximum two) doors.

Autonomous controllers

7 of 15

Often the controller itself is systematically combined with the reader in one housing. The simplest autonomous systems (often called "hotel systems") usually combine the decision controller, reader / keyboard and electric lock in one housing. However, it should be noted that this measure, which allows to reduce the cost of the system, leads to a decrease in security, increases the likelihood of hacking the system.

Autonomous controllers

8 of 15

In systems with more than three doors autonomous from controllers use can take a long time (especially with a large number of users ) there is in systems ). In this case, the network controllers application acceptable road is considered .

Network controllers monochrome and multi-faceted to be possible .

Network controllers

9 of 15

Distributed ACS architecture ( Single )

10 of 15

Advantages:

  • ease of configuration;
  • One device in the ZIP ;
  • is restored , not the entire database . impact will reach .

Distributed ACS architecture ( Single )

11 of 15

Disadvantages:

  • controllers do not interact directly with each other, the interaction logic within the system is provided at the software level and does not work in case of failure or communication with the controller;
  • losing part of the database of the failed controller ;
  • the controller 's power by the number of supported readers/doors leads to a sharp increase in the consumption of cable products and their laying;
  • since there is only one controller, its functionality and cost increase possible (there is no flexibility and variability in solving various ACS tasks when organizing different access points).

Distributed ACS architecture ( Single )

12 of 15

Centralized ACS architecture (multi-tier)

13 of 15

Advantages:

  • reducing the cost of large systems (the cost of a powerful and expensive central controller affects the cost of the entire system) will come );
  • failure of the door module does not lead to the loss of part of the database, since the entire database is stored in the central controller;
  • there is no need to pull all the cables from the access point to the central controller, which simplifies installation and reduces the consumption of the cables themselves;
  • support for complex hardware modes and interactions in the ACS segment connected to the central controller.

Centralized ACS architecture (multi-tier)

14 of 15

Disadvantages:

  • for small systems the price is high;
  • Failure of the central controller or communication failure with the door modules will lead to system shutdown and loss of base at the hardware level.

Centralized ACS architecture (multi-tier)

15 of 15

FOR YOUR ATTENTION !!!