Access control system (ACS) -it is an indispensable element of an integrated security system and an integral part of a modern office, such as an electronic document management system or air-conditioning system.
It is often integrated into a common systemsecurity, and it interacts with video surveillance or burglar alarm. Also, the advanced ACS carries a system for the recording of working hours. This allows you to control the time of arrival of employees and their care. What can not but increase discipline in the enterprise.
Manufacturers, producing ACS equipment,great variety. However, its basic elements are unchanged: the control controller, the identifier reader and the personal identifiers themselves, the blocking device and the negotiation device.
Responsible for retrieving information from the code carrierand transferring it to the controller. The choice of the reader, in addition to technical parameters, is also determined by the interior of the room where the installation will be performed.
It connects the controller (or several) to the server or office computer. Sometimes this device is built into the access controller.
Locks, electromagnetic and electromechanical, turnstiles, barriers, locks, wickets. The choice of the device for blocking is based on the specific requirements and nature of the object.
Access control is carried out according to thisprinciple. At the entrance organization, at the entrance to the closed rooms, an access control device is mounted on the office door: an electromagnetic lock, a turnstile or other and a reader. These devices are connected to the controller. He receives and processes information received from personal identifiers, and manages executive devices.
Each employee has a personalan identifier, which is a contactless access card of a different type. In order to enter the territory of the enterprise, the employee must bring his card to the reader, and he will pass the code along the chain described earlier. The controller can be programmed to access at certain time intervals (from 8.00 to 17.00) or to pass employees to designated rooms. It can also connect security sensors.
The installation of the access control system will help to control the incoming vehicles. In this case, the driver should show his personal identifier at the entrance to open the barrier.
Conditionally they can be divided into autonomous systems and network.
Autonomous are great for small offices andsmall buildings. They are not connected to the computer, and control is performed using master cards or jumpers on the controller itself. At large and medium-sized protected facilities, this type of ACS is rarely used. An exception is the control over remote premises, or as a backup system. An independent ACS system is installed on the central doors and / or on emergency exits.
When implementing such a system, doors with a throughputthe capacity of about a thousand people is equipped with a code lock or a reader, maybe a turnstile or a barrier. In a modest office with a single door, everything can be limited to an autonomous controller connected to an electromechanical (electromagnetic) lock and combined with a reader
Network Access Control Systems The ACS has one or morecomputers as control elements. It is the PC that monitors what is happening on the site and manages their parameters. This construction is much more flexible and functional. It is network access control systems that are very popular on objects of any complexity. And integration with security and video systems allows for comprehensive protection without additional costs.
Connecting several computers at large facilities is due to the fact that one of them may fail. This ensures continuity of work.
The network access control system with a database allowsoutput detailed statistics on a specific identifier and its movement on a protected object. You can see what access rights each employee has.
The main function. It allows you to separate the access rights of employees and deny access to undesirable persons. It is possible to organize remote control of devices for blocking. You can prohibit employees from going on weekends and holidays to the company, as well as after a shift.
Collection of information system of control and managementaccess leads continuously. Who through what point has passed and how many times. For each employee, you can get information: time of arrival / departure, attempts to access restricted areas and premises, attempts to pass through a forbidden time. It is possible to track how an employee moves through the territory when ACS readers pass. All identified disciplinary violations can be entered in the personal file of the employee, and the leadership of the offender will be informed properly.
ACS allows you to keep track of working hours,based on the marks of the arrival and departure of people from their workplace. As a result, you can calculate the total working time of the employee, taking into account "breaks", lunches, etc. And at the beginning of the working day, she can create a report on employees who did not pass the control point at the specified time, which will identify latecomers who did not go to work. By analogy, you can create a report at the end of the work shift.
Equipped with uninterrupted power supply, ACS is notwill cease to operate under a centralized power outage. In addition, thanks to the functionality of the controller, it can continue to work even when the control computer is stopped.
Access Control Systemprovides an opportunity to shoot and place certain rooms under protection. And you can receive real-time information about emergency situations through an organized notification system through responsible persons. And also alarm events are fixed in the database, which will allow you to view this information later.
The security guard, thanks to the access control system,can, without leaving the workplace, manage turnstiles and doors, give alarm signals. It is enough to place floor plans of the building and layout of control points in his computer.
When connecting the ACS to the worldwide network, the administration can remotely control the system and monitor its operation.
Fire, burglar alarm, video surveillanceperfectly integrated with ACS. Integration with video surveillance provides visual control over the protected area. And it allows us to identify in the shortest possible time, if possible, identify and block the offender.
Combination with burglar alarm allowsset up a joint response to unauthorized penetration. So you can force the siren to fire in the office, light an alarm lamp, or simply block the doors in the right part of the plant.
Integration with fire alarm is vital. This will automatically unlock all control points in case of fire. That will significantly simplify the evacuation of workers in a critical period.
When designing an ACS project first of allIt is necessary to take into account the imposed restrictions on the number of card-passes. The number of the latter should be calculated taking into account the growth of the company, otherwise you can find yourself in a situation where the number of employees reaches the maximum value for the system and will have to be changed to a more capacious one. The optimal solution for the design is the installation of a modular system that allows for upgrading or expansion. If the budget is limited, it will be useful to consider the possibility of integrating access control systems with other systems responsible for security. The advantages of such a combination were described above. Clear those. the task will help the designers to create exactly such a system that the customer needs. A well-designed project, in turn, will greatly facilitate the work of the installation organization. And it's better when one firm is engaged in design and installation. She can take the service in the future.
</ p>