Access control is the entrance and exit control, which manages who can enter and exit at any time and which door, and can automatically generate various reports, provide post-record information and so on. When an access control device is installed in the access channel, when a person needs to pass, an appropriate level of authority authentication must be performed to distinguish whether or not the person can pass. Cards, fingerprints, and irises (eyes) can generally be used to represent the permissions of passers-by and to identify the passers-by.
The access control system is also called ACCESS CONTROL SYSTEM, which is an intelligent management system for managers to enter and exit. It integrates modern security management measures and microcomputer automatic identification technology. It is the product of many advanced technologies such as machinery, communication technology, computer technology, electronics, optics, and biotechnology in the field of entrance control management. It is an effective measure for important entrances and exits to realize safety prevention management. The access control system has developed rapidly in recent years and is widely used in management control systems.
1. What functions does the access control system have:
The access control system plays an irreplaceable role in the construction of the data center. With the continuous progress of science and technology and the continuous improvement of the information technology, the functions of the access control system are also continuously improved. Although the proportion of the access control system during the construction of the computer room system is not large, it is an indispensable part.
The access control system generally consists of a controller, a card reader, a proximity card, an electric lock, an integrated management server, a system management workstation, and a card-making system. It can implement hierarchical management and computer networking control.
At present, the relatively complete setting of the data center's access control system is that you may only need to swipe your card to enter the building, you need to swipe your card and password to enter the computer room, and you may need your password plus biometric scanning in the core area, and two-way swipe.
So what are the functions of the access control system?
1. Entry and exit and access control: prevent entry and exit for cardless and illegal cardholders.
2. Statistics function: Statistics based on employee department, category, and different entry and exit times and locations.
3. Prevent illegal entry: The access control system can manage at least 100,000 black and white lists. If an unauthorized card or a card in the system blacklist is used, the system will refuse to open the door lock and automatically alarm through the reservation process and device.
4, prevent illegal time entry function: can set a schedule, such as certain time periods can be regarded as illegal time, cardholders can not enter; you can check the entrance and exit stations at any time, personnel entry and exit situation.
5. Anti-removal function: Each front sensor is integrated with the wall of the installation place when it is installed, and cannot be removed at will.
6. Anti-theft function: When an illegal element sneaks into the crime, the access control system will automatically close all access control after receiving an alarm.
7, anti-theft function: the access control system is equipped with a rear power supply to prevent power failure.
8. Anti-involvement function: The access control system can prevent the damage of one access control from affecting the normal work of other access control.
9: Put card stolen function: In the case of using a password keyboard, the cardholder must enter the password after swiping the card to perform two-factor authentication to prevent the adverse consequences caused by card loss.
10, anti-return function: key access control, all cards must be swiped to enter the card before going out, and vice versa.
11. Query function: It can query the records of anyone entering or leaving at any time.
12. Two-door linkage function: The access control system can set permissions, forcing a certain door to be opened, the other doors cannot be opened, and a certain door can only be opened or closed when the next door is opened.
The reasonable use of the access control system improves the security and reliability of the data center's computer room and avoids losses caused by chaotic entry of personnel. It can be said that the access control system is an important barrier to data center security.
2. Types of access control systems, their respective advantages and disadvantages, and scope of application
1. Non-networked access control: One host controls and manages one door, which is controlled directly by the controller. It cannot be controlled by computer software. Advantages: cheap, simple installation and maintenance. Cons: No entry or exit record. Scope of application: It is not suitable for places with more than 5 doors, more than 50 people, or a large number of personnel, and frequent personnel entry and departure.
2. 485 network access control: directly use computer software for management control, including card and event control. This access control can communicate with the computer. Advantages: centralized control, convenient management, viewing records, and analyzing and processing records for other purposes. The training is simple, and value-added services such as attendance can be performed. Disadvantages: higher price, more difficult to install and maintain. Scope of application: Suitable for places with a large number of doors, a large number of people, and frequent personnel movements.
3. TCP / IP access control: It is also called Ethernet access control. It is a kind of access control system that can connect the computer and the controller through the network cable. Advantages: In addition to all the advantages of 485 network access control, it also has the advantages of faster speed, easier installation, larger number of networks, and cross-regional or cross-city networking. Disadvantages: high price and professional network knowledge required. Scope of application: Suitable for installation in large projects, large numbers of people, speed requirements, and cross-regional projects.
4. Fingerprint access control system: Access control managed by fingerprint instead of card. Advantages: Same features as 485 networked access control, but with higher security. Disadvantages: Fewer people can be managed and the speed of passing is slow.
2. 485 network access control: directly use computer software for management control, including card and event control. This access control can communicate with the computer. Advantages: centralized control, convenient management, viewing records, and analyzing and processing records for other purposes. The training is simple, and value-added services such as attendance can be performed. Disadvantages: higher price, more difficult to install and maintain. Scope of application: Suitable for places with a large number of doors, a large number of people, and frequent personnel movements.
3. TCP / IP access control: It is also called Ethernet access control. It is a kind of access control system that can connect the computer and the controller through the network cable. Advantages: In addition to all the advantages of 485 network access control, it also has the advantages of faster speed, easier installation, larger number of networks, and cross-regional or cross-city networking. Disadvantages: high price and professional network knowledge required. Scope of application: Suitable for installation in large projects, large numbers of people, speed requirements, and cross-regional projects.
4. Fingerprint access control system: Access control managed by fingerprint instead of card. Advantages: Same features as 485 networked access control, but with higher security. Disadvantages: Fewer people can be managed and the speed of passing is slow.
Isostatic Graphite Mold,Round Isostatic Graphite,Isostatic Molded Round Graphite,Isostatic Pressing Graphite Round
CARBONS TECH&CREATION(HENAN) INDUSTRY CO.,LTD , https://www.kyisostaticgraphites.com