Next Generation Security Solutions Next Generation Controllers January 2013.

Slides:



Advertisements
Similar presentations
Integrating Opengear console servers into SolarWinds Orion NPM
Advertisements

Express5800/ft series servers Product Information Fault-Tolerant General Purpose Servers.
Motorola General Business Use MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other product or service names are.
Yokogawa Network Solutions Presents:
Data Communications and Networking
What we do Larotecs Web2M is an off-the shelf, end-to-end, web-based solution designed to manage multiple widely distributed devices.
Chapter 1: Introduction to Scaling Networks
Chapter 3: Planning a Network Upgrade
POC Security System High security system combining PIN-on-Card, information security, physical access, control and alarm – all in one system.
Company LOGO. 2 DELTATEE INNOVATION What is Wireless Wire? What is Wireless Wire?  The Wireless Wire is able to achieve these benefits by using the Zigbee.
© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0— © 2003, Cisco Systems, Inc. All rights reserved.
Presents The Silver Family An Integrated Approach to Processors, Data Communication and Head End Integration.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Applying Wireless in Legacy Systems
Training.
 A system consisting of a number of remote terminal units (or RTUs) collecting field data connected back to a master station via a communications system.
Hardware & Software Needed For LAN and WAN
© ELPRO Technologies NORCAL ISA Think Wireless…Think ELRPO Wireless Gateways Smart Wireless Gateways The 21 st Century modem Frank Williams May 1, 2007.
System Configuration An in-depth guide. Overview Main module for configuring system – Hardware – Access Levels – Maps – IF/THEN Functions – Operators/Permissions.
Industrial Ethernet Solution. 2 PoE Fiber Gigabit Harden Total Industrial Ethernet Solution PoEMetro SwitchMedia ConverterExtenderWirelessSurveillanceSolar.
ADAM-5000/TCP- Distributed Ethernet I/O
Network Topologies.
NETWORKING CONCEPTS. Data Communication Communication is for sharing information Sharing can be local or remote Local communication between individuals.
1 © 2004, Cisco Systems, Inc. All rights reserved. Chapter 5 WANs and Routers/ Introduction to Routers.
G650 Generator Protection & Control System
Chapter 6 High-Speed LANs Chapter 6 High-Speed LANs.
Introduction To DSX WinDSX DSS (Dallas Security Systems)
Profile Series v.S1 Intelligent Power over Ethernet Access Control Solution With the power of iCLASS.
Network Design Essentials
LECTURE 9 CT1303 LAN. LAN DEVICES Network: Nodes: Service units: PC Interface processing Modules: it doesn’t generate data, but just it process it and.
1 Sales Academy Training Inner Range Product Advantages, Competitors & The Future.
1 PAC530 | Output Controller. 2 The Output Controller (PAC530) provides the local connection on an RS-485 network between an Access and Alarm Server (PAC500)
ACCESS CONTROL ExpansE - Distributed Access Control.
Repeaters and Hubs Repeaters: simplest type of connectivity devices that regenerate a digital signal Operate in Physical layer Cannot improve or correct.
Chapter 6 Wide Area Networking Concepts, Architectures, & Services.
Cisco S2 C4 Router Components. Configure a Router You can configure a router from –from the console terminal (a computer connected to the router –through.
Supplementary to Presentation on Kiosk Services ATM System Overview TrigMax Enterprise Solutions Mason Liu, Ph.D.
LAN Switching and Wireless – Chapter 1
Intro to Network Design
Fault Tolerant Configuration
Networks.
10 1 Chapter 10 Distributed Database Management Systems Database Systems: Design, Implementation, and Management, Sixth Edition, Rob and Coronel.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
Clustering In A SAN For High Availability Steve Dalton, President and CEO Gadzoox Networks September 2002.
Information Technology Needs and Trends in the Electric Power Business Mladen Kezunovic Texas A&M University PS ERC Industrial Advisory Board Meeting December.
Net Optics Confidential and Proprietary 1 Bypass Switches Intelligent Access and Monitoring Architecture Solutions.
 High-Availability Cluster with Linux-HA Matt Varnell Cameron Adkins Jeremy Landes.
Chapter2 Networking Fundamentals
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 ver.2 Module 8 City College.
Next Generation Security Solutions Fault Tolerant powered by Hydra January 2013.
Lecture-2: Idea of Network LAN - Local Area Network WAN - Wide Area Network.
New product introduction:
CONTENTS: 1.Abstract. 2.Objective. 3.Block diagram. 4.Methodology. 5.Advantages and Disadvantages. 6.Applications. 7.Conclusion.
Local Area Networks: Monil Adhikari. Primary Function of a LAN File serving – large storage disk drive acts as a central storage repository Print serving.
Introduction to Active Directory
1 Version 3.0 Module 8 Virtual LANs. 2 Version 3.0.
Software House iSTAR Edge August iSTAR Edge “Bringing the Power of C  CURE to the Edge” A full-featured, two-reader IP device based on the iSTAR.
CompactLogix Controllers Portfolio
Lecture 11. Switch Hardware Nowadays switches are very high performance computers with high hardware specifications Switches usually consist of a chassis.
OSIsoft High Availability PI Replication Colin Breck, PI Server Team Dave Oda, PI SDK Team.
Artificial Intelligence In Power System Author Doshi Pratik H.Darakh Bharat P.
Chapter 1: Explore the Network
Instructor Materials Chapter 1: LAN Design
COSEC ARC IP based Access Control Panel.
Industrial Ethernet Solution
Connections Topology of Apollo ACS.
IS3120 Network Communications Infrastructure
© 2003, Cisco Systems, Inc. All rights reserved.
Presentation transcript:

Next Generation Security Solutions Next Generation Controllers January 2013

Stand Alone Systems –All in one Host Based Systems –Distributed Intelligence Architecture Transactions are processed locally Reader (s) and Door (s) Connections Alarm and Output Connections –Master Controller Architecture Communicates to “sub” controllers Sub Controllers –Reader Connection (s) –Door Connection (s) –Alarm and Output Connections Background: Current Security System Architectures

Background: Distributed Intelligence System Architecture

Background: Typical Master Controller Architecture

Distributed Intelligence Architecture Typical Security Architecture Partial Failure

Background: Typical Master Controller Total Failure

Summary Current Systems have a vulnerability –Partial or Total Depending on the Architecture Controller Failure –Everything within the controls are affected Distributed Intelligence has the least impact Master Controller Architecture has Total Failure Communication is a point of Vulnerability

Introducing: The Next Logical Evolution of Systems…

Virtual Point Architecture with Fault Tolerance Capabilities

Fault Tolerance Architecture Is a means of System Recovery utilizing “Automated System Reconfiguration” provided through Dynamic Network Architecture (DNA) with little or no impact on system security or operations upon a failure within any of the components of the system.

Fault Tolerant Architecture Eliminates “Single Point of Failure” Ability to Automatically “Recover” upon failure due to: –Primary or Secondary Communication Failure –Hardware Failure of a FTC (s) –Firmware Failure Real-time Dynamic Network Architecture –Automatically “takes” over the duties of a failed FTC Provide 100% Distributed Intelligence –Real-time decisions are made by the FTC Hydra Protocol –FTC Network Administrator –Peer to Peer –Database Management Eliminates System Failure!!! Eliminates “Emergency Calls”

FT Architecture Components Host System (LiNC-NXG, Plus, XS, EBI*) Fault Tolerant Controller (FTC) –Supports DIM (Door Interface Modules) –100% Distributed Intelligence –Global I/O –Global Entry-Exit Door Interface Modules –DDM – 2 Reader Controller –SDM – 1 Reader Controller

Fault Tolerant Architecture Powered by Hydra

Fault Tolerant (FT) Architecture powered by Hydra

Fault Tolerant (FT) Architecture with Hydra Protocol FTC 1 FTC 2 Dual Door Module Host Door Readers PoE Switch REX Door Status to “n” number of Door Controllers Door Lock

Fault Tolerant (FT) Architecture with Hydra Protocol FTC 1 (Fails) FTC 2 DDM Host Door Readers to “n” number of Door Controllers PoE Switch REX Door Status Command and Control routed from FTC 1 to FTC 2

Fault Tolerant (FT) Architecture with Hydra Protocol FTC 1 (Fails) FTC 2 (Fails) Dual Door Module Door Readers FTC 3 Command and Control Automatically routed to FTC “n” FTC 4 to “n” number of Doors

Communication Routing Architecture Utilizing Secondary or Tertiary Paths

FT Architecture with XBee PRO DigiMesh

XBee Pro DigiMesh Wireless Communication Approved for use in “All Countries” 100 meters within buildings –Over 1K meters line of site communication Auto setup of Mesh Network Uses other XBee Pro devices as relay points More XBee Pro Devices, more Robust

FT Architecture with XBee PRO DigiMesh Comm. Fails FTC 2 DDM Host Door Readers to “n” number of Door Controllers PoE Switch REX Door Status Command and Control routed from FTC 1 to FTC 2 on Primary Communication Port

FT Architecture with XBee PRO DigiMesh Primary Ethernet Communication Failure DDM Host Door Readers to “n” number of Door Controllers PoE Switch REX Door Status Command and Control via XBee Pro DigiMesh

FT Architecture with XBee PRO DigiMesh Ethernet and FTC 1 Failure DDM Host Door Readers to “n” number of Door Controllers PoE Switch REX Door Status Command and Control via XBee PRO DigiMesh

Fault Tolerant Controller (FTC) 32 Bit RISC Technology Open Systems Operating System –Linux Communication –Ethernet (Primary) –Ethernet or PoE (Primary or Secondary) –Wireless - XBee PRO DigiMesh (Tertiary) 7 Segment Real-Time Status Display VFD Status Display (optional FTC only) –Clique Communication and Status Information

Fault Tolerant Controller Capabilities FTC –100% Distributed Intelligence All Real-time Decisions All Card Database Global Anti-Passback (No Host) Global Input/Output Linking (No Host) –“Hydra” Protocol Peer to Peer –Host to FTC, FTC to FTC, FTC to DDM and SDM FTC Network Administrator Database Management and Synchronization Communication Path Management Firmware Administrator –Supervised Tamper protection –CEPAS Card Support –100% TWIC, PIV and FIPS Capable (HSPD Government Regulations)

FTC Capacities Cardholders –20,000 – 250,000+ –12 or 24 Digit Card Numbers Compatible with any card standards CEPAS, PIV,TWIC, etc. History Transactions –20,000 – 250,000+ History Transactions 1 Year of Holidays

Dual Door Module (DDM) 32 Bit RISC Technology Open Systems Operating System –Linux Communication –Ethernet (Primary) –Ethernet or PoE (Secondary) –Wireless - XBee PRO DigiMesh (Tertiary) 5 State Supervised Monitoring –A/D Sense Input Technology –Supervised Readers –Automatic Calibration for Cable Distance and Size Hydra Protocol

Single Door Module (SDM) SDM –All in One (Controller and Reader, shown) – Controller Only Power over Ethernet (PoE) –Single Communication Port Supports - One Reader REX, Door Status, Lock Output for 1 door Hydra Protocol SDM -ERP40

Advantages to “FT Architecture” World’s Most Reliable Security System Active/Active and Active/Passive Topologies No Degradation of system performance No Degradation during routine maintenance “Failures” are not an immediate Emergency Automated Firmware Authentication and Updates Authentication Protocol PCSC is the Only Provider of FT systems –Patented –Competitive Edge

Fault Tolerant Controller Features All the Features of IQ/SIM/ULT series Controllers Increase Authorization Groups per Cardholder to 12 (4) Global Entry/Exit –Timed Anti-Passback Global I/O Card Activation and De-Activation –Date and Time “Stale Cards” Access Denial –“Short” and “Long Term” Values Enterprise Cards, Vacation, etc.. Escort Definition by Cardholder and Reader Security Threat Levels (4) –24 (8 X 8) Authorizations Groups per Cardholder

Questions?