Installation and commissioning

Vendors

It is recommended that the access control system’s equipment to be installed in accordance with the manufacturer’s instructions and only by trained technical staff.
The access control system components must be installed in safe locations in terms of security operation and that allow easy access for service and maintenance.
Depending on the security level of the system to be installed, attention must be given to the sabotage protection for the enclosures in wich the equipment will be mounted.
The power supplies and the central power equipments will be installed in protected areas in terms of security.

Also, special attention will be given to wiring: the cable types should be chosen considering the equipment manufacturer’s specifications and wiring routes will cross, as much as possible, controlled spaces in terms of security and with low fire risk.
The commissioning of the access control system will be made considering the requirements of the system’s owner and other stakeholders.
The procedure for commissioning and system testing will always be completed by the delivery of documents to the system’s owner.


The components of an access control system

The access control station (or controller) is the central device that connects all field equipments ( card readers , buttons , electromagnets or bolts / electromagnetic locks , extension modules , keypads , sirens , etc.). Also the controller is the device that manages information from the readers (proximity , biometrics, barcode etc.) and commands the mechanical locking elements (electromagnets , locks / electromagnetic locks , turnstiles , gates etc.).

The readers ( of cards , biometrics,of barcodes etc.) are field elements that are accessed by users for them to be checked. They transmit data to the controller that will compare whether the user is registered in the database and can access the objective. If the controller decides that the user is registered in the database with access in that objective, that will activate the mechanical locking element ( electromagnet, locks / electromagnetic locks , turnstile, gate , etc.) , and access will be allowed.

Proximity card readers

are the most commonly used access readers used at this moment. The proximity reader is composed of an antenna and a control unit which converts the signals recieved from the proximity card into the specific communication protocol( Wiegand , RS232, RS485 etc.).

Advantages: the proximity readers are easy to use, the user is only required the proximity card. It provides high speed data transfer to the controller.
Disadvantages: the proximity readers can be easily fooled by a user who stole a valid card .

Biometric Readers - ( fingerprint, hand geometry , face recognition , iris recognition , etc.)

it recognizes the unique biological characteristics of users. The need to install a biometric reader in general appears to objectives that require a high degree of security

Advantages: it can not be fooled by unauthorized persons ( as can happen by finding a code or finding a proximity card ) .
Disadvantages: higher implementation costs compared to other technologies, longer time for verification and recognition.

The mechanic locking elements ( locks / electromagnetic locks , electromagnets , turnstiles , gates etc. ) - provides the mechanical blocking of access roads until thei receive the order of release from the controller after user authentication . The mechanical locking elements can be comanded to open the fire detection systems when it signals a fire alarm .

Electromagnets

They are " fail safe " locks that need fueling in order to produce the electromagnetic field and lock the door.

Turnstiles

Provides the mechanical blocking of access roads .

Emergency buttons are installed inside a controlled space and can be used during the time when the access control systems are not in service , or they have technical problems .

The buttons are mandatory installed on every controlled door .

Centralization and management equipments are personal computers / servers with access control softwares that manages the access control system, the users and the system functions .

Some programs have also a timekeeping software.