Language: Chinese line English

Access control news

Tcp Ip door access controller is the core of the access control system

Access control system: also known as Access Control System (Access Control System), which is developed on the basis of traditional door locks.

The Tcp Ip door access controller is the core of the system, which uses the combination of modern computer technology and various identification technologies to reflect an intelligent management method.

Why Tcp Ip door access controller is important

The traditional mechanical door lock is just a simple mechanical device, no matter how reasonable the structural design and how strong the material is, people can always open it by various means. It is very troublesome to manage the keys in frequent passages (such as offices, hotel rooms). If the key is lost or the personnel are replaced, the lock and key must be replaced together. In order to solve these problems, electronic magnetic card locks and electronic cipher locks have appeared. The appearance of these two types of locks has improved people's management of entrances and exits to a certain extent, and brought the management of channels into the electronic age. With the continuous application of electronic locks, their own shortcomings are gradually exposed. The problem of magnetic card locks is that information is easy to copy, the wear between the card and the card reader is large, the failure rate is high, and the safety factor is low. The problem with the password lock is that the password is easy to leak, and it is impossible to find out, and the safety factor is very low. At the same time, most of the products in this period used the card reader part (password input) and the control part to be installed outside the door, so it was easy to be unlocked outdoors. The access control system of this period was still in the early immature stage, so the access control system at that time was usually called an electronic lock, and it was not widely used.

Classification of the access controller

communication method
According to the communication mode of the controller and the management computer, it is divided into: RS485 networked access controller, TCP/IP networked access controller and non-networked access controller.
1. Non-networked access control, that is, single-machine control access control, is that one machine manages one door, and it cannot be controlled by computer software, nor can it be viewed and recorded. It is directly controlled by the controller. It is characterized by cheap price, simple installation and maintenance, no records can be viewed, not suitable for places with more than 50 people or frequent turnover (referring to frequent entry and departure), and not suitable for projects with more than 5 doors.
2. 485 networked access control is a type of access control that can communicate with a computer, directly using software for management, including card and event control. Therefore, it has convenient management, centralized control, can view records, and analyze and process records for other purposes. The characteristic is that the price is relatively high, installation and maintenance are more difficult, but the training is simple, and value-added services such as attendance can be provided. It is suitable for projects with many people, high mobility and many doors.
3. Tcp Ip door access controller, also called Ethernet network access control, is also an access control system that can be networked. It connects the computer and the controller to the network through a network cable. In addition to all the advantages of 485 access control networking, it also has faster speed, simpler installation, larger number of networks, and can be connected across regions or cities. However, the high price of equipment requires knowledge of computer networks. It is suitable for installation in large projects, large numbers of people, speed requirements, and cross-regional projects.

Controller
1) According to the number of doors controlled by each controller, it can be divided into: single-door controller, double-door controller, four-door controller and multi-door controller
2) According to the technology, it is divided into 8-bit single-board model controllers and 32-bit technology-based access controllers
3) According to the communication division: 485 communication, 422 communication, dual 485 communication, 485 to IP communication, TCP/IP communication controller
Card reader
1) The controller is divided into one-way controller and two-way controller according to the number of card readers that can be connected to each door
Note: If you enter a door, swipe your card, and press the button when you go out, the controller can only connect to one card reader for each door, called a one-way controller.
If there is a door, swipe the card when entering the door and swiping the card when you go out (you can also connect to the exit button), each controller can be connected to two card readers for each door, one is the entrance card reader, the other is the exit card reader, called two-way Controller.
2) According to the security level of the card reader, it is divided into: ID number reader (read-only), IC card encryption reader, CPU card reader, national secret CPU card reader
Note: Due to the low security level of the read-only card reader, the card is easy to be copied. The current highest security card reader in China belongs to the national secret CPU card reader with SM1 algorithm issued by the National Cryptography Administration.

CONTACT US

Contact: Information Center

Phone: +8615813805304

Tel: whatSapp/Wechat

Email: infors@sintronictech.com

Add: 201,Plaza A,Qianwan 1st Rd,Nanshan,Shenzhen City,Guangdong Province,China

Wechat qr code scanClose
the qr code