Main classification of access control system
Communication method
According to the communication mode between the controller and the management computer, it can be divided into RS485 networked access control, TCP/IP networked access control and non-networked access control.
1. Off-line access control, that is, single-machine control access control, is a door managed by one machine, which cannot be controlled by computer software or records, and is directly controlled by the controller. Its characteristics are low price, simple installation and maintenance, unable to check records, not suitable for places with more than 50 people or frequent personnel (referring to frequent access), and not suitable for projects with more than 5 doors.
2.485 Networked access control is an access control that can communicate with computers. It is directly managed by software, including card and event control.
Therefore, management is convenient, control is centralized, and records can be viewed and analyzed for other purposes. It is characterized by high price, difficult installation and maintenance, but simple training, and can provide value-added services such as attendance. Suitable for projects with many people, large mobility and many doors. 3.TCP/IP network access control, also known as Ethernet network access control, is also an access control system that can be networked, but computers and controllers are networked through network cables. In addition to all the advantages of 485 access control networking, it also has the advantages of faster speed, simpler installation and more networking, and can be networked across regions or cities. But the equipment is expensive and requires computer network knowledge. Suitable for installation in large-scale projects, large number of people, high speed requirements and cross-regional projects.
controller
1) According to the number of doors controlled by each controller, it can be divided into single-door controller, double-door controller, four-door controller and multi-door controller.
2) According to the technology, it is divided into 8-bit single board controller and access controller based on 32-bit technology.
3) The controller is divided into 485 communication, 422 communication, dual-channel 485 communication, 485-to-IP communication and TCP/IP communication according to the communication mode.
card reader
1) controllers are divided into one-way controllers and two-way controllers according to the number of card readers that can be connected to each door.
Note: If a door swipes the card when entering the door and presses the key when leaving the door, the controller can only connect one card reader to each door, which is called a one-way controller.
If a door swipes its card when it enters the door and swipes it when it leaves the door (the door button can also be connected), each controller can connect two card readers for each door, one for entering the door.
Card reader, one is outdoor card reader, called bidirectional controller.
2) According to the security level of the card reader, it is divided into ID card reader (read-only), IC card encryption card reader, CPU card reader and national secret CPU card reader.
Note: Due to the low security level of the read-only card reader, the card can be easily copied. At present, the card reader with the highest security level in China belongs to the national secret CPU card reader with SM 1 algorithm issued by the State Cryptography Administration.
The controller installation should pay attention to:
1. The controller should not be installed near the high-voltage power box or in the environment of high voltage, strong current field, high temperature, high humidity, strong magnetic field and corrosive gas.
2. In order to facilitate debugging and maintenance, the installation height of the controller should not exceed 1.45m, and please reserve enough installation space.
Ensure that the controller chassis can be easily opened. 3. The controller must be grounded separately to ensure that there is grounding equipment near the installation site.
4. The controller chassis must be installed firmly.
5. The wiring of the system belongs to weak current wiring. In addition to the power cord, other equipment wires should not be strong troughs or strong conduits. If it is necessary to walk because of the limitation of the installation environment, it is necessary to walk parallel lines, try to separate them by more than 0.5 meters, and try to keep the distance.
6. Avoid direct sunlight or getting wet by rain.
7. If it is really unavoidable, corresponding protective measures should be taken.
The access controller can be widely used in various operating environments, but in order to ensure the safe and stable operation of the system, the above principles should be kept in mind and strictly observed.
The above is my introduction to access control related knowledge. Please pay attention to the information for more practical knowledge.
What, decorate with your own money? ! The renovation is carried out in stages, with an ultra-low annual interest rate of 3.55% and a maximum loan of 1 ten thousand. Apply for a discount now.