Access-Control-System.pdf-mohamed abd el samiea

abdsamea761 6 views 39 slides Jul 26, 2024
Slide 1
Slide 1 of 39
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39

About This Presentation

Access-Control-System.pdf


Slide Content

Electronic Card Access
System
Compiled by
Prasanna Narangoda

Anaccesscontrolsystemisasystemwhichenables
anauthoritytocontrolaccesstoareasandresourcesin
agivenphysicalfacilityorcomputer-basedinformation
system.Anaccesscontrolsystem,withinthefieldof
PhysicalSecurityisgenerallyseenasthesecondlayer
inthesecurityofaphysicalstructure.
Access Control System

System Components
Access Controller
Card Reader
Electromagnetic locks, Door holders & Electric drop bolts
Door Contacts
Access Cards
Emergency Push Button
Exit Push Button

Access Controller
ThisisthemaincomponentorHubofthesystem.Thecontroller
canworkasastandalonecontrollerornetworknode. The
controllercapacitycanbespecifiedasthenoofdoorsitcan
control.
The decision making process in an access control
Controller checks,
The card encoding & verifies current authorization
Number is allowed to enter the access point
Time for entry is valid
Day of the week is valid
The controller only grants access if the conditions are met.

Specifications of Door
Controllers……….
No. of Doors it can control
No. of Records/employees and
no of events it can store (memory
capacity)
Type of Readers it can handle
(proximity, biometric, magnetic
stripe, barcode etc)
Type & no. of Inputs / Outputs
available
Communication protocol, distance
& media
Power supply voltage

Card Reader
Thecardreaderisadeviceusetoinputaccessrequesttothe
controller.Thereadercommunicateswiththecontroller&gives
thefeedbackonitsdisplayunit.ie.Whethertheentryisaccepted
ordenied.
Types of Readers,
Proximity Card Readers
Barcode readers
Wiegand Readers
Biometric readers
Smart Card readers
Magnetic Stripe readers (magstripe)
Keypads

Proximity Card Readers
A Contactless integrated circuit
device.
Have a range of 0-3 inches in
most instances
ISO / IEC 14443 & ISO/IEC
15693

Bar Code Readers
Simple to create & Easy to Use
Low Cost

Wiegand Readers
Swipe Reader
Insertion Reader
oUsually maintenance free
oNo encoding or programming required
oReaders are weather resistant and can operate in very high
or low temperatures.
oNot effected by radio frequency
oAvailable as swipe, insertion, turnstile, or card/key systems
oCost is reasonable

Biometric readers
Eye recognition Palm Reader
o
An electronic devise used to determine person’s identity by
detecting and matching person’s physical features such as
fingerprints, eyes or voice
oFingerprint type is the most common
oCompare the template stored in memory to the scan obtained
during the process of identification
oExpensive and used in very high security applications
Finger Reader

Door Holders
Electromagnetic Door Locks
oThis is the device used to lock Doors. Once the signal is
received from Controller power supply to the lock or holder is
de-energized. Hence the door will release.
oTwo parts, main component with electro- magnet and
metal plate
Electromagnetic Door Locks & Door Holders

Electromagnetic Door Locks mounting..

Electromagnetic Door Locks……….

Electric Drop Bolts
An Electric Drop Bolt is a motor or solenoid actuated symmetrical
dead- bolt mechanism.
used for specific applications where Electric Strikes and
Electromagnetic Locks cannot be used, such as double action 180
degree swing through or sliding doors.
Recommend for frameless glass doors
In many cases Electric Drop Bolts are used as additional or
secondary locking device. The locking status and door status of the
drop bolt can be remotely monitored.

oDoor contacts are used to check whether the door has actually
open / close base on the signal received from controller.
oDoor contacts are only dry contacts, no power required
oConsists with two components.
Door Contacts

Access Cards

Emergency Push buttons
Emergency Push Buttons are used to override the access
control system controls.

Access Control System Function
Anaccesscontrolpoint,whichcanbeadoor,turnstile,parkinggate,
elevator,orotherphysicalbarrierwheregrantingaccesscanbe
electricallycontrolled. Typicallytheaccesspointisadoor.Anelectronic
accesscontroldoorcancontainseveralelements.Atitsmostbasic,
thereisastand-alone electriclock.Thelockisunlockedbyanoperator
withaswitch.Toautomatethis,operatorinterventionisreplacedbya
reader.Thereadercouldbeakeypadwhereacodeisentered,itcould
beacardreader,oritcouldbeabiometricreader.Readersdonot
usuallymakeanaccessdecisionbutsendacardnumbertoanaccess
controlpanelthatverifiesthenumberagainstanaccesslist.Tomonitor
thedoorpositionamagneticdoorswitchisused. Inconceptthedoor
switchisnotunlikethoseonrefrigeratorsorcardoors.Generallyonly
entryiscontrolledandexitisuncontrolled. Incaseswhereexitisalso
controlledasecondreaderisusedontheoppositesideofthedoor.In
caseswhereexitisnotcontrolled,freeexit,adevicecalledarequest-to-
exit(REX)isused. Request-to-exitdevicescanbeapushbuttonora
motiondetector.Whenthebuttonispushedorthemotiondetector
detectsmotionatthedoor,thedooralarmistemporarily

Access Control Topology
Typical Access Control Door Wiring

1. Serial Controllers
Controllers are connected to a host PC via a serial RS-485
communication line.

Advantages:
RS-485 standard allows long cable runs, up to 4000 feet (1200 m)
Relatively short response time. The maximum number of devices on an
RS-485 line is limited to 32, which means that the host can
frequently request status updates from each device and display
events almost in real time.
High reliability and security as the communication line is not shared with
any other systems.
Disadvantages:
RS-485 does not allows Star-type wiring unless splitters are used
RS-485 is not well suited for transferring large amounts of data (i.e.
configuration and users). The highest possible throughput is
115.2 kbit/s, but in most system it is downgraded to 56.2 kbit/s or
less to increase reliability.

RS-485doesnotallowhostPCtocommunicatewithseveralcontrollers
connectedtothesameportsimultaneously.Thereforeinlarge
systemstransfersofconfigurationanduserstocontrollersmay
takeaverylongtimeandinterferewithnormaloperations.
Controllerscannotinitiatecommunicationincaseofanalarm.Thehost
PCactsasamasterontheRS-485communicationlineand
controllershavetowaittilltheyarepolled.
Specialserialswitchesarerequiredinordertobuildaredundanthost
PCsetup.
SeparateRS-485lineshavetobeinstalledinsteadofusinganalready
existingnetworkinfrastructure.
CablethatmeetsRS-485standardsissignificantlymoreexpensive
thantheregularCategory5UTPnetworkcable.
OperationofthesystemishighlydependentonthehostPC.Incase
thehostPCfails,eventsfromcontrollersarenotretrievedand
functionsthatrequiredinteractionbetweencontrollers(i.e.anti-
passback)stopworking.

2. Serial Main and Sub-Controllers
Alldoorhardwareisconnectedtosub-controllers(doorcontrollersordoor
interfaces).Sub-controllersusuallydonotmakeaccessdecisions,and
forwardallrequeststothemaincontrollers.Maincontrollersusually
supportfrom16to32sub-controllers.
Advantages:
Work load on the host PC is significantly reduced, because it only needs
to communicate with a few main controllers.
The overall cost of the system is lower, as sub-controllers are usually
simple and inexpensive devices.
All other advantages listed in the serial controller is applicable.

Disadvantages:
Operationofthesystemishighlydependentonmaincontrollers.In
caseoneofthemaincontrollersfails,eventsfromitssub-
controllersarenotretrievedandfunctionsthatrequireinteraction
betweensubcontrollers(i.e.anti-passback)stopworking.
Somemodelsofsub-controllers(usuallylowercost)havenomemory
andprocessingpowertomakeaccessdecisionsindependently.
Ifthemaincontrollerfails,sub-controllerschangetodegraded
modeinwhichdoorsareeithercompletelylockedorunlocked
andnoeventsarerecorded. Suchsub-controllersshouldbe
avoidedorusedonlyinareasthatdonotrequirehighsecurity.
Main controllers tend to be expensive, therefore such topology is not
very well suited for systems with multiple remote locations that
have only a few doors.
All other RS-485-related disadvantages listed in the serial controller is
applicable apply.

3. Serial main controllers & intelligent
readers
Alldoorhardwareisconnecteddirectlytointelligentorsemi-
intelligentreaders.Readersusuallydonotmakeaccess
decisions,andforwardallrequeststothemaincontroller.Onlyif
theconnectiontothemaincontrollerisunavailable,thereaders
usetheirinternaldatabasetomakeaccessdecisionsandrecord
events.Semi-intelligentreaderthathavenodatabaseandcannot
functionwithoutthemaincontrollershouldbeusedonlyinareas
thatdonotrequirehighsecurity.Maincontrollersusuallysupport
from16to64readers.
All advantages and disadvantages are the same as the ones listed
in the Serial main Sub Controllers.

Inspiteoftherapiddevelopmentandincreasinguseof
computernetworks,accesscontrolmanufacturers
remainedconservativeanddidnotrushtointroduce
network-enabledproducts.Whenpressedforsolutions
withnetworkconnectivity,manychosetheoption
requiringlessefforts:additionofaterminalserver,a
devicethatconvertsserialdatafortransmissionviaLAN
orWAN.
4. Serial controllers with terminal servers.

4. Serial controllers with terminal servers…..

Advantages:
Allows utilizing existing network infrastructure for connecting separate
segments of the system.
Provides convenient solution in cases when installation of an RS-485 line
would be difficult or impossible.
Disadvantages:
Increases complexity of the system.
Creates additional work for installers: usually terminal servers have to
be configured independently, not through the interface of the
access control software.
Serial communication link between the controller and the terminal server
acts as a bottleneck: even though the data between the host PC
and the terminal server travels at the 10/100/1000Mbit/s network
speed it then slows down to the serial speed of 112.5 kbit/s or
less. There are also additional delays introduced in the process of
conversion between serial and network data.

4. Network-enabled main controllers.
Transmission of
configurationandusersto
themaincontrollersisfaster
andmaybedoneinparallel.
Thismakesthesystemmore
responsiveanddoesnot
interruptnormaloperations.
Nospecialhardwareis
requiredinordertoachieve
redundanthostPCsetup: in
casetheprimaryhostPC
fails,thesecondaryhostPC
maystartpollingnetwork
controllers.

5. IP controllers.
Controllers are connected to a host PC via Ethernet LAN or WAN

Advantages:
Anexistingnetworkinfrastructureisfullyutilized,thereisnoneedto
installnewcommunicationlines.
Therearenolimitationsregardingthenumberofcontrollers(32perline
incaseofRS-485).
SpecialRS-485installation,termination,groundingandtroubleshooting
knowledgeisnotrequired.
Communicationwithcontrollersmaybedoneatthefullnetworkspeed,
whichisimportantiftransferringalotofdata(databaseswith
thousandsofusers,possiblyincludingbiometricrecords).
Incaseofanalarm,controllersmayinitiateconnectiontothehostPC.
Thisabilityisimportantinlargesystemsbecauseitallowsto
reducenetworktrafficcausedbyunnecessarypolling.

Advantages:
Simplifiesinstallationofsystemsconsistingofmultiplesitesseparated
bylargedistances.BasicInternetlinkissufficienttoestablish
connectionstoremotelocations.
Wideselectionofstandardnetworkequipmentisavailabletoprovide
connectivityindifferentsituations(fiber,wireless,VPN,dualpath,
PoE)
Disadvantages:
The system becomes susceptible to network related problems, such as
delays in case of heavy traffic and network equipment failures.
Access controllers and workstations may become accessible to hackers
if the network of the organization is not well protected. This threat
may be eliminated by physically separating the access control
network from the network of the organization. Also it should be
noted that most IP controllers utilize either Linux platform or
proprietary operating systems, which makes them more difficult
to hack. Industry standard data encryption is also used.

Disadvantages:
Maximum distance from a hub or a switch to the controller is 100 meters
(330ft).
Operation of the system is dependent on the host PC. In case the host
PC fails, events from controllers are not retrieved and functions
that required interaction between controllers (i.e. anti-passback)
stop working. Some controllers, however, have peer-to-peer
communication option in order to reduce dependency on the host
PC.

What is Anti –Pass Back ??
The main purpose of anti pass back system is to prevent a card holder
passing from their card back to a second person to gain entry into the
same control area.
Cables
Type of cables depend on the manufacturer standards.

THANK YOU
Tags