Access Control
How to distinguish the performance of theTcp Ip door access controller
The appearance of the tcp ip door access controller with stable performance can also be seen. Many so-called brand controllers like to use the shell frame tightly, leaving only a few interfaces on the outside. Some customers were confused when they saw the beautiful appearance and the bragging about the sales staff. They did not know that to ensure the stability of the controller, work must be done on the board. First of all, weigh the weight of the board. I believe anyone who knows a little about this line can know the mystery. The number of layers of the PCB (circuit board) must be four or more layers to maximize the immunity from various sources. Interference, I believe that people who have used security equipment for a long time have had the experience of being burnt by such inexplicable small faults. The importance of eliminating the possibility of various interferences to the maximum extent cannot be ignored. The second is the main chip. Generally speaking, to meet the current high-efficiency and fast requirements, 32-bit microcontrollers such as the ARM series are the mainstream configurations. Again, look at the various components above. What kind of relay capacity, detonator and various port protection components are necessary, and they must also show high performance. Although access control controllers are mostly used in civilian facilities, But the standards must be industrial grade. Many manufacturers’ products look very delicate, and they also call it fine craftsmanship. They don’t know that industrial grade standards are as large as the chip and the terminal block must be able to withstand the cruel test of various extreme conditions. , Many manufacturers just say that their products are industrial-grade standards if only a certain two components or functions meet the industrial standard will only attract the ridicule of insiders.
This is mainly to remind buyers that they must first understand their needs and the actual functions of the product. Although some access controller company products have been in the market for a relatively long time, their own development capabilities are limited, and a few simple functions. It has been selling like a day for several years, and customers cannot meet their new needs, and they have a long-standing reputation. Regardless of the special requirements of special occasions, the basic functions of an access control controller can be summarized as follows:
1. There are no less than 12 door opening methods, such as normally open, normally closed, password, card + password, first card, multiple cards, remote control, etc.
2. Regional anti-following, anti-sneak return, and regional population control.
3. At least ten thousand cardholders and credit card records.
4. Support any grouping and division of cardholders. The same cardholder belongs to multiple departments.
5. Powerful calendar management function, support any number of schedule groups and holidays, any number of time groups, and any day time period.
6. A variety of alarms, and respectively set whether to enable, such as door open timeout, illegal intrusion, duress entry, effective swiping without entry, tamper proof, tamper proof, etc.
7. Event records and alarm records are actively uploaded in real time.
8. Support system's multi-door interlocking, and support arbitrary grouping of regions.
9. The power-off data is stored for more than ten years.
10. It can support various wiegand and RS485 card readers, and the wiegand interface provides sound and light response output.