Download presentation
Presentation is loading. Please wait.
1
Blue Access Technologies
Requirements of an access control system There are 5 requirements for an access control system (ACS)… Credentials Readers Software Wiring And of course power We will explore each requirement in more detail Blue Access Technologies
2
Blue Access Technologies
The first requirement is for some form of Credential. A credential is something that uniquely identifies the holder and it could be… A physical piece of plastic Or an electronic identifier available on a Smartphone Physical credentials come in different form factors such as… Keyfob Electronic Thin card Clamshell Adhesive Cap Tags Physical credentials run at 2 frequencies… Low Frequency (LF) commonly called PROX And High Frequency (HF) commonly called Smart cards LF, or PROX, are more popular today but are considered less secure than their HF counterpart; however, for most users the difference is not substantial The up-and-coming electronic credentials on a smartphones typically use Bluetooth technology, but this only works with a small portion of available systems. Blue Access Technologies
3
Blue Access Technologies
The second requirement is some sort of Reader Readers … Process the credential Decide whether or not the holder is authorized to gain access to the secured area, typically a door Readers come in two basic varieties… the all-in-one variety is in a single enclosure that gets mounted on the outside of the secure area and a two piece variety comprised of a controller and separate reader An example of an all-in-one reader is the Isonas RC-03 The RC-03 comes with a keypad Or without a keypad as seen here Blue Access Technologies
4
Blue Access Technologies
An example of the two component variety is the ISONAS IPBridge With the IPBridge, there are two components: One component, typically called a controller gets mounted inside of the secure area and communicates with the LAN. And the other component is mounted on the outside of the secure area and performs the reading of the credential function (typically called a Wiegand-reader). In the IPBridge, the controller is always directly wired to a Wiegand reader. Just as with credentials, readers can operate at a LF, HF, or both (often called multi-tech). Blue Access Technologies
5
Blue Access Technologies
The third requirement is some form of Electronic lock. The lock physically secures a location and only permits entry if instructed to do so by an attached reader. Electronic locks come in two main varieties… Strikes Magnetic strikes get built into Or bolt on to a doorframe magnetic get mounted on a doorframe Blue Access Technologies
6
Blue Access Technologies
The fourth requirement is Software. The software is used to program the readers to enforce the user’s security rules Software can be installed… On the customer’s site (on-premise) Or hosted anywhere on the World Wide Web Isonas’s DBCrystal is an on-premise solution which has two products… A set-up program named DBCrystal Admin And a browser based user interface named EasyWeb 2015 Isonas’s Pure Access is an example of a hosted solution In the hosted solution, there is no need to install any software on the customer’s site. Blue Access Technologies
7
Blue Access Technologies
The fifth requirement is Wiring The wiring connects everything together and powers the equipment. Will connect the reader A CAT5 cable To the customer’s LAN Will connect a reader And a wiring bundle, commonly called a Pigtail To an electronic lock Blue Access Technologies
8
Blue Access Technologies
The fifth and final requirement is DC Power Power will run the readers and electrify the locks All of the necessary DC power is supplied over the CAT5 cable that we talked about in the wiring section. This form of power is known as PoE, Power Over Ethernet, and is pervasive throughout the world today. If you don’t have PoE enabled hardware already, you will have 2 choices… You can buy a piece of network equipment that has multiple LAN connections, commonly called a PoE enabled switch Or you can buy one single piece of equipment for each reader that you want to power and REUSE your existing networking equipment. These single units are called injectors Blue Access Technologies
9
Blue Access Technologies
Let’s look at the difference between the PoE enabled switch and single injectors. The PoE enabled switch diagram looks like this… Is plugged into an AC outlet The PoE enabled switch And then all of the readers are plugged into the switch Now let’s look at the injector diagram which reuses your existing networking equipment… Is plugged into an AC outlet And then you plug a cable from your existing network equipment into one end of the injector Then you plug your reader into the other end of the injector The injector Existing Network Blue Access Technologies
10
Blue Access Technologies
You might be wondering where the power for the electronic lock comes from, well let’s take a look. The power comes from the same PoE device that powers the reader. The power from the PoE device Goes out a CAT5 cable Passes through the reader Goes out the pigtail To the electronic lock Blue Access Technologies
11
Blue Access Technologies
Let’s review the hardware/software requirements A credential Is read by a reader Which has been configured by software To open a lock Blue Access Technologies
12
Blue Access Technologies
Now let’s review the wiring A reader is connected to the customer’s LAN With a CAT5 cable So it can be configured by the software And the reader is connected by a Pigtail To an electronic lock so it can secure a location All of which is powered via PoE Blue Access Technologies
13
Blue Access Technologies
Here are some complete wiring and power view of one possible solution PoE switch connected to multiple doors and locks PoE single injector connected to a single door and lock Blue Access Technologies
14
Blue Access Technologies
The End Blue Access Technologies
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.