Connections Topology of Apollo ACS.

Slides:



Advertisements
Similar presentations
Chapter 3: Planning a Network Upgrade
Advertisements

22 March Controller Diagnostics. 22 March Topics Covered: Diagnostics that allows you to check basic controller and reader functionality through.

Trouble - Shooting ELR - Electric Latch Retraction.
Marwan Al-Namari Week 2. ADSL : Asymmetric Digital Subscriber Line Ethernet networks - 10BASE-T - 100BASE-TX BASE-T BASE-TX (Cat5e.
EUT 1040 Lecture 10: Programmable Logic Controllers.
Presents The Silver Family An Integrated Approach to Processors, Data Communication and Head End Integration.
Proposed Design and the Operation of a Disconnecting Device for Small EG Installations Prepared by Hendri Geldenhuys.
Training.
Copyright © 2013 FingerTec Worldwide Sdn.Bhd. All rights reserved.
1 INTRUSION ALARM TECHNOLOGY WIRELESS SYSTEMS. 2 INTRUSION ALARM TECHNOLOGY Wireless systems use radio frequencies (RF) to connect sensors to the control.
SF-3000 Installation Manual. 2 Back of SF CON400) USB connector - User can use USB memory stick after connect USB connector of key PCB. CON500)
System Components Hardware overview for Apollo ACS.
SCADA and Telemetry Presented By:.
Basic Concepts of Computer Networks
1 PAC530 | Output Controller. 2 The Output Controller (PAC530) provides the local connection on an RS-485 network between an Access and Alarm Server (PAC500)
Server is ‘host’ Clients do not communicate with each other.
Definitions What is a network? A series of interconnected computers, linked together either via cabling or wirelessly. Often linked via a central server.
BOOT MODE 1 BOOT MODE 2 BIOS COMMUNICATION DEFAULT CONTROLLER INVERT RELAY OPERATION ENABLE COMM FAIL RELAY CONTROL RELAY OFF / ON COMM.
Mr C Johnston ICT Teacher BTEC IT Unit 05 - Lesson 03 Network Topologies.
Mr C Johnston ICT Teacher
Chapter2 Networking Fundamentals
NETWORKS.
New product introduction:
Prepared by:Ronnel P. Agulto, CpE Objectives Different types of topologies; Their advantages & disadvantages How to choose an appropriate topologies in.
Introduction to Networks Mr. Grimming. Types of Networks Wide Area Network (WAN) Cover large geographic area Nodes connected by coaxial cable, microwave.
Door Controller Device. 2 Door Controller Device (DCD) The DCD is the “Remote Brains” of the system. It is the controller device located at each access.
Network Concepts.
SIMPLE & MODULAR PC BASED DOOR ACCESS CONTROL v1.00
LAN, WAN, and Network Topologies
Lecture 10: Programmable Logic Controllers
Hearty Welcome!.
CMV-NET Chigo VRF Network Centralized Control System
Network Topology and LAN Technologies
Industrial communication networks
Introduction What is a Network?
Featrues of Compputer Networks
COSEC ARC IP based Access Control Panel.
Maintain, Manage And Monitor Outdoor Systems Remotely
Architectures of Digital Information Systems Part 1: Interrupts and DMA dr.ir. A.C. Verschueren Eindhoven University of Technology Section of Digital.
Project Target Develop a Web Based Management software suit that will enable users to control Hardware using standard HTTP & Java Applet compatible web.
I/O SYSTEMS MANAGEMENT Krishna Kumar Ahirwar ( )
Eclipse EHX System Logic Maestro
Hardware, Installation & maintenance
Site Controller Unit and Trunk Interface Unit
Computer Network Collection of computers and devices connected by communications channels that facilitates communications among users and allows users.
Chapter 2: Network Design Essentials
I-Station Hardware, Installation & maintenance
Power Supply.
2N® Access Unit Bluetooth
2N® Access Unit Touch Keypad
NETWORK TOPOLOGIES There are three basic configurations used to connect computers they are the Bus Ring Star.
Redundancy Switching Components
Network Configurations
Basics of Communications
NETWORKING TECHNOLOGIES
Basic Concepts of Computer Networks and Communications
Feature Benefit Feature Benefit Feature Benefit Feature Benefit
Programmable Logic Controllers (PLCs) An Overview.
Network Topologies CS 1202.
PLC’s Are ... Similar to a Microcontroller: Microprocessor Based
2N® Access Unit Bluetooth
Your Solution for: Energy Smart Management Real Time Power Monitoring Fuel Theft Prevention Technical presentation.
Network Topologies CS 1202.
 What is Topology  Categories of Topology  Definition, structure, advantage and disadvantage of all of the following topologies: o Mesh o Bus o Ring.
2N Access Unit 2.0 Multi-technology access control readers.
EUT 1040 Lecture 10: Programmable Logic Controllers Unrestricted.
2N® Access Unit Bluetooth
Fluid Power System Electrical Control
Presentation transcript:

Connections Topology of Apollo ACS

Traditional – RS-485 Serial Access Control systems often use serial data communication between devices and the host. This is generally RS-485 wiring which is simple, fast and highly reliable. RS-485 operates by measuring the voltage differential on the line and translates this to 1s and 0s that make up the data stream. Typically there are four wires, two for transmitting and two for receiving. Only the ‘Master’ transmits on the transmit line, and the ‘slave’ devices only listen on this line. The opposite is true for the receive line. RS-485 has the following specs: Max Distance: 4000ft Devices: 32 Data Rate: 10Mbps (max) Since each line is limited to 32 devices, the AAN-100 controller uses 4 RS-485 loops to be able to support 96 readers. Many sites use RS-485 for device wiring and network for host connection. Remember you’ll need a serial port on the computer. Problems on an RS-485 line can usually be diagnosed using a multi-meter, making it much more simple that detecting problems on a complicated Ethernet network. When working with RS-485 remember: -Use quality cable! This is perhaps the cause of most problems. CAT5 is NOT SUPPORTED! -Beware of ground faults -Use proper termination (ATM-48), especially for long runs -Use bus configuration, not star (unless using the APM-10 star wiring converter)

Serial with Network Host Probably the most common type of installation today uses traditional RS-485 wiring for controller-device communication, but uses network connection between host and controller. This allows for flexible placement of the host computer and controllers can be easily located near devices, the only requirement is to have a network connection between them.

Network based DB Server The new trend is connecting all devices directly to the network. This can be a great cost savings if network wiring is already in place. This is also very flexible because with proper network hardware, distance is not an issue. To connect to the host via network, AAN-32/100 controllers need ANI-100 network interface. To connect devices to controller on the network, there must be an ENI at the device port on the controller and also on the field device. When working with ACS on the network remember: -No delays! If the network is slow, doors will open slow in normal configuration (can be overcome with local access grant) -Make sure the ports you are using are open on the network. Many routers will block or give lower priority to unknown ports -Check the route. Make sure that devices have a valid route between them.

hybrid DB Server Sometimes also useful is to have a combination of network and serial, for example when a system setup on serial is expanded using network. By using the ENI-110, a serial line can be started at any point on the network. The device ports on the AAN-100 can also be mixed, some can use network communication while others use serial at the same time.

Reader connections The ‘end of the line’ is where the ACS actually connects to readers and doors which happens at the reader interface. At a minimum usually connected are a reader and a lock. Other typical devices are exit push button (used when there is only one reader at the door) and a door contact switch . Reader connection: Lines for power and data (required), LED control, Beeper control. Door contact: Simple contact closure input that checks if the door is closed or not. Exit push button: Simple contact closure that allows the door to open without an alarm being reported when not using a card. Auxiliary input: Can be used for any other type of alarm including reader tamper (loop wire running with reader wire to detect if cable is cut), monitoring nearby doors that are not equipped with a reader, or connecting any kind of alarm sensor. (normally closed)

locks Fail Secure Fail Safe The ultimate ‘goal’ of ACS is to open the door, and of course there must be a lock (or gate, turnstile, barrier) to achieve this. In general, there are two types of locks: Electric Strike – Uses a break away strike surface to allow the latch to pass. Electromagnetic – An electromagnet that stays energized to keep a metal plate attached to the door secure thus preventing it being opened. For purposes of wiring, these are further qualified by the type of locking action: Fail-secure – When there is a (power) failure, the lock will remained closed (i.e. ‘secure’). This means that power must be applied to open the lock. Fail secure locks are wired to the ‘C’ and ‘NC’ poles of the strike relay. Fail-safe – When there is a failure, the lock will open (so people can ‘safely’ exit). This means that power must be removed to open the lock. All magnetic locks are in this category. Fail safe locks are wired to the ‘C’ and ‘NO’ poles of the strike relay. Don’t forget: -Regulatory restrictions may have a say in what type of locks you use -Use suppressors or you will burn locks and/or equipment Fail Safe

Locks – High security relays For more secure installations or for flexible installation options, Apollo offers secure, remote door strike relays: ADA-10 – A weather-proof potted module with 1 relay ADA-11 – Indoor version with 1 relay These relay devices are connected to AIM-XSL reader interfaces via a secure communication loop and can be located in very close proximity to the actual door strike. With this configuration, an intruder cannot tamper with extended strike wiring to open the door. The only unprotected wiring is located between the ADA and the lock (very short). The ADA modules can also be used for Auxiliary Relay outputs, either for adding an additional relay (AUX 2) or duplicating the function of an onboard relay. The strike relay can also be used as a duplicate—in all cases the onboard relay of the AIM-XSL will continue to function normally when an external relay is also used. The ADA has the following function options: Strike Relay – Identical function to onboard strike relay Local Alarm – Activates on any alarm on the reader (tamper, aux input, door forced/held open) Aux Relay 1 – Auxiliary Relay Aux Relay 2 – Auxiliary Relay