Blue Access Technologies

Slides:



Advertisements
Similar presentations
Wi-Fi Structures.
Advertisements

Principles of Information Technology
Training.
System Components Hardware overview for Apollo ACS.
Networking Components
Network Done by: Athra sultan.
Cyprus Conference 2007 Simplex PoE Clocks. 2 Simplex PoE Clocks.
How to Build a CAN Last Update Copyright Kenneth M. Chipps PhD 1.
Installing Virtualisation Software and Virtual Servers.
2N® Access Commander Product presentation.
And how they are used. Hubs send data to all of the devices that are plugged into them. They have no ability to send packets to the correct ports. Cost~$35.
Basic Network Training. Cable/DSL Modem The modem is the first link in the chain It is usually provided by the ISP and often has a coax cable connector.
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
NETWORKING COMPONENTS By Scott H. Bowers. HUB A hub can be easily mistaken for a switch, physically there are no defining characteristics, both have power.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
System Overview The Perfect Solution For Small ‘Entry Level’ Access Control Applications August 2014.
NETWORK COMPONENTS Assignment #3. Hub A hub is used in a wired network to connect Ethernet cables from a number of devices together. The hub allows each.
Understanding and Building Basic Networks Chapter 6 Creating a Network.
Networks.
Connectivity Devices. Network Interface Card (NIC) Allow user to connect to networks via Ethernet cable or Wi-Fi Nowadays integrally fitted into the.
Summary - Part 2 - Objectives The purpose of this basic IP technology training is to explain video over IP network. This training describes how video can.
Advanced Eligible Services Helping You Succeed Schools and Libraries Division Washington, DC Newark Atlanta Chicago Orlando Los Angeles Portland.
Copyright © 2008 FingerTec Worldwide Limited. All rights reserved
NETWORKING COMPONENTS lLTEC 4550 JGuadalupe. HUB -THIS IS A HARDWARE DEVICE THAT IS USED TO NETWORK MULTIPLE COMPUTERS TOGETHER. IT IS A CENTRAL CONNECTION.
NETWORKS (2) Mr Conti Lesson 2. Learning Objectives  By the end of this presentation we will have learned:  what a network is  the advantages and disadvantages.
Assignment # 3 Networking Components By: Jeff Long.
Brandon Halleran.  The power supply for your personal computer gives your machine all the different voltages it needs to operate properly. It is able.
Access Portal LITE. Access Portal Lite “Access in a BOX” IPS with no screenIPS with screen.
 Introduction to Wide Area Networks 2 nd semester
U-PROX SMART HANDLE Fully incorporated Wireless Handle and Furniture Locking Set.
Chapter 1: Wireless Networking/Technology. Wireless Networking Definition: –the technologies that enable computers to communicate using standard network.
WHAT’S A WIRELESS AP? AND WHY DO I NEED ONE? Network Components & How They Work.
NETWORK AND COMMUNICATIONS
BUILDING AND IMPLEMENT A EMBEDDED WEB SERVER BASE ON TCP/IP STACK WITH A SoC PLATFORM Professor : CHI-JO WANG Name : Bui Quang Hoa (M982b211)
SIMPLE & MODULAR PC BASED DOOR ACCESS CONTROL v1.00
Blue Access Technologies
Computer network Ch.5.
Blue Access Technologies
Module 1: Understanding Local Area Networks
COSEC ARC IP based Access Control Panel.
WHAT IS A NETWORK TYPES OF NETWORK NETWORK HARDWARE
Components of information systems
What is the Internet? © EIT, Author Gay Robertson, 2016.
2N® Access Unit.
2N® Access Unit Bluetooth
2N® Access Unit Touch Keypad
UNIT 19 Data Security 2.
Connections Topology of Apollo ACS.
Merging Security and Convenience with Seos® Credential Technology
Wireless Technology.
How does IT enable our business?
Introduction to Computers
Introduction To Computers
CHAPTER 1 INTRODUCTION NETWORKING
Reseller Option Kit (ROK)
Wired Networks CIT 1100 Chapter4.
The Internet of Things (IoT)
VERSATILE NETWORK ATTACHED DOOR ACCESS CONTROL SYSTEMS
Guide to Access Control Systems
2N® Access Unit Touch Keypad
Topic 5: Communication and the Internet
2N® Access Unit RFID (125kHz or 13.56MHz).
Network Models, Hardware, Protocols and number systems
Computer Networks.
2N® Access Unit Bluetooth
Communications & Computer Networks Resource Notes - Network Hardware
AbbottLink™ - IP Address Overview
2N Access Unit 2.0 Multi-technology access control readers.
Principles of Information Technology
2N® Access Unit Bluetooth
Presentation transcript:

Blue Access Technologies Requirements of an access control system There are 5 requirements for an access control system (ACS)… Credentials Readers Software Wiring And of course power We will explore each requirement in more detail Blue Access Technologies

Blue Access Technologies The first requirement is for some form of Credential. A credential is something that uniquely identifies the holder and it could be… A physical piece of plastic Or an electronic identifier available on a Smartphone Physical credentials come in different form factors such as… Keyfob Electronic Thin card Clamshell Adhesive Cap Tags Physical credentials run at 2 frequencies… Low Frequency (LF) commonly called PROX And High Frequency (HF) commonly called Smart cards LF, or PROX, are more popular today but are considered less secure than their HF counterpart; however, for most users the difference is not substantial The up-and-coming electronic credentials on a smartphones typically use Bluetooth technology, but this only works with a small portion of available systems. Blue Access Technologies

Blue Access Technologies The second requirement is some sort of Reader Readers … Process the credential Decide whether or not the holder is authorized to gain access to the secured area, typically a door Readers come in two basic varieties… the all-in-one variety is in a single enclosure that gets mounted on the outside of the secure area and a two piece variety comprised of a controller and separate reader An example of an all-in-one reader is the Isonas RC-03 The RC-03 comes with a keypad Or without a keypad as seen here Blue Access Technologies

Blue Access Technologies An example of the two component variety is the ISONAS IPBridge With the IPBridge, there are two components: One component, typically called a controller gets mounted inside of the secure area and communicates with the LAN. And the other component is mounted on the outside of the secure area and performs the reading of the credential function (typically called a Wiegand-reader). In the IPBridge, the controller is always directly wired to a Wiegand reader. Just as with credentials, readers can operate at a LF, HF, or both (often called multi-tech). Blue Access Technologies

Blue Access Technologies The third requirement is some form of Electronic lock. The lock physically secures a location and only permits entry if instructed to do so by an attached reader. Electronic locks come in two main varieties… Strikes Magnetic strikes get built into Or bolt on to a doorframe magnetic get mounted on a doorframe Blue Access Technologies

Blue Access Technologies The fourth requirement is Software. The software is used to program the readers to enforce the user’s security rules Software can be installed… On the customer’s site (on-premise) Or hosted anywhere on the World Wide Web Isonas’s DBCrystal is an on-premise solution which has two products… A set-up program named DBCrystal Admin And a browser based user interface named EasyWeb 2015 Isonas’s Pure Access is an example of a hosted solution In the hosted solution, there is no need to install any software on the customer’s site. Blue Access Technologies

Blue Access Technologies The fifth requirement is Wiring The wiring connects everything together and powers the equipment. Will connect the reader A CAT5 cable To the customer’s LAN Will connect a reader And a wiring bundle, commonly called a Pigtail To an electronic lock Blue Access Technologies

Blue Access Technologies The fifth and final requirement is DC Power Power will run the readers and electrify the locks All of the necessary DC power is supplied over the CAT5 cable that we talked about in the wiring section. This form of power is known as PoE, Power Over Ethernet, and is pervasive throughout the world today. If you don’t have PoE enabled hardware already, you will have 2 choices… You can buy a piece of network equipment that has multiple LAN connections, commonly called a PoE enabled switch Or you can buy one single piece of equipment for each reader that you want to power and REUSE your existing networking equipment. These single units are called injectors Blue Access Technologies

Blue Access Technologies Let’s look at the difference between the PoE enabled switch and single injectors. The PoE enabled switch diagram looks like this… Is plugged into an AC outlet The PoE enabled switch And then all of the readers are plugged into the switch Now let’s look at the injector diagram which reuses your existing networking equipment… Is plugged into an AC outlet And then you plug a cable from your existing network equipment into one end of the injector Then you plug your reader into the other end of the injector The injector Existing Network Blue Access Technologies

Blue Access Technologies You might be wondering where the power for the electronic lock comes from, well let’s take a look. The power comes from the same PoE device that powers the reader. The power from the PoE device Goes out a CAT5 cable Passes through the reader Goes out the pigtail To the electronic lock Blue Access Technologies

Blue Access Technologies Let’s review the hardware/software requirements A credential Is read by a reader Which has been configured by software To open a lock Blue Access Technologies

Blue Access Technologies Now let’s review the wiring A reader is connected to the customer’s LAN With a CAT5 cable So it can be configured by the software And the reader is connected by a Pigtail To an electronic lock so it can secure a location All of which is powered via PoE Blue Access Technologies

Blue Access Technologies Here are some complete wiring and power view of one possible solution PoE switch connected to multiple doors and locks PoE single injector connected to a single door and lock Blue Access Technologies

Blue Access Technologies The End Blue Access Technologies