Design

The design of an access control system has the role to determine the extent of the system, selecting the components that meet the criteria of operation and performance of the system, setting the security level and class environment in wich it will work and to provide a specification of equipments and a list of materials in order to draw up an estimate.

In designing an access control system it will be taken into account the constructive structure and functional organization of the protected space and of the physical elements necessary to achieve access control.

The main functions this system can perform are: restricting access, identification / authentication, monitoring users, making reports (including timekeeping). The designing of the access control system is drawn being aware of the beneficiary’s requirements, the beneficiary being the one that constitutes the document based on wich the installation of the system will be performed.

Roelsystems, by authorized technical staff, has an extensive experience in designing access control systems, experience which is reflected by the ability to choose, considering the beneficiary’s requirements, the most suitable solutions.


The components of an access control system

The access control station (or controller) is the central device that connects all field equipments ( card readers , buttons , electromagnets or bolts / electromagnetic locks , extension modules , keypads , sirens , etc.). Also the controller is the device that manages information from the readers (proximity , biometrics, barcode etc.) and commands the mechanical locking elements (electromagnets , locks / electromagnetic locks , turnstiles , gates etc.).

The readers ( of cards , biometrics,of barcodes etc.) are field elements that are accessed by users for them to be checked. They transmit data to the controller that will compare whether the user is registered in the database and can access the objective. If the controller decides that the user is registered in the database with access in that objective, that will activate the mechanical locking element ( electromagnet, locks / electromagnetic locks , turnstile, gate , etc.) , and access will be allowed.

Proximity card readers

are the most commonly used access readers used at this moment. The proximity reader is composed of an antenna and a control unit which converts the signals recieved from the proximity card into the specific communication protocol( Wiegand , RS232, RS485 etc.).

Advantages: the proximity readers are easy to use, the user is only required the proximity card. It provides high speed data transfer to the controller.
Disadvantages: the proximity readers can be easily fooled by a user who stole a valid card .

Biometric Readers - ( fingerprint, hand geometry , face recognition , iris recognition , etc.)

it recognizes the unique biological characteristics of users. The need to install a biometric reader in general appears to objectives that require a high degree of security

Advantages: it can not be fooled by unauthorized persons ( as can happen by finding a code or finding a proximity card ) .
Disadvantages: higher implementation costs compared to other technologies, longer time for verification and recognition.

The mechanic locking elements ( locks / electromagnetic locks , electromagnets , turnstiles , gates etc. ) - provides the mechanical blocking of access roads until thei receive the order of release from the controller after user authentication . The mechanical locking elements can be comanded to open the fire detection systems when it signals a fire alarm .

Electromagnets

They are " fail safe " locks that need fueling in order to produce the electromagnetic field and lock the door.

Turnstiles

Provides the mechanical blocking of access roads .

Emergency buttons are installed inside a controlled space and can be used during the time when the access control systems are not in service , or they have technical problems .

The buttons are mandatory installed on every controlled door .

Centralization and management equipments are personal computers / servers with access control softwares that manages the access control system, the users and the system functions .

Some programs have also a timekeeping software.