Access Control System: Also known as the Access Control System, it is based on traditional door locks. The access controller is the core of the system. It uses a combination of modern computer technology and various identification technologies to embody an intelligent management method.

Overview <br> <br> alert to prevent the entrance. In the Northern Wei Dynasty, Tao Yuanyuan wrote: “Cao Tzu’s visit to the imperial palace was a crime and he was guilty of access control. As a result, he found himself in thin.†No dare to look up.†Ming Ye Sheng “Diary of Shuidong, remember to kill Ma Shun and other thingsâ€: “I do not know that after a big drive, the entrance is quite strict.â€
Traditional mechanical door locks are simply mechanical devices. No matter how rational the design of the structure is and how strong the material is, people can always open it by various means. The management of keys in and out of frequent passages (such as offices, hotel rooms) is cumbersome, and the keys are lost or replaced. In order to solve these problems, there are electronic magnetic card locks and electronic code locks. The emergence of these two kinds of locks has improved people's degree of management of entrance and exit passages to a certain extent, so that channel management has entered the electronic age, but with these two With the continuous application of electronic locks, their own defects are gradually exposed. The problem with magnetic card locks is that information is easily copied, wear between cards and readers is large, the failure rate is high, and the safety factor is low. The problem with password locks is that passwords are easily leaked and cannot be checked. The safety factor is very low. At the same time, since most of the products in this period were assembled with the reader part (password input) and the control part and installed outside the door, it was easy for people to open the lock outdoors. The access control system of this period still remained in the early immature stage, so the access control system at that time was often called an electronic lock, and its application was not extensive.

communication method
According to the communication method of the controller and the management computer, it is divided into: RS485 networked access controller, TCP/IP network access controller and no network access control.
1. Non-network access control, that is, stand-alone control access control, is a machine management a door, can not use computer software to control, can not see the record, directly through the controller to control. It is characterized by low prices, simple installation and maintenance, inability to view records, unsuitable for more than 50 persons or frequent movement of personnel (indicating frequent entry and departure), and not suitable for projects with more than 5 doors.
2.485 network access control is the type of access that can communicate with the computer. It can be managed directly using software, including card and event control. Therefore, it is easy to manage, control is centralized, records can be viewed, and records can be analyzed and processed for other purposes. The feature is that the price is relatively high and the installation and maintenance are more difficult. However, the training is simple, and value-added services such as time and attendance can be performed. Suitable for many people, large mobility, and many projects.
3. TCP/IP network access control, also called Ethernet networking access control, is also a network access control system, but the computer and the controller are networked through a network cable. In addition to having all the advantages of the 485 access control network, it also has the advantages of faster speed, simpler installation, and larger number of networks, and can be networked across regions or across cities. However, there are high equipment prices and require computer network knowledge. Suitable for installation in large projects, large numbers of people, speed requirements, cross-regional projects.

Configuration system
The configuration of the access control system is mainly based on the principles of the reader distance from the card reader to the controller and from the controller to the main control computer. One principle: The distance from the card reader to the controller is less than 100 meters. It is recommended to be within 60 meters.
Principle 2: The length of the bus connecting the computer and other controllers is less than 1200 meters. It is recommended that the length of the bus is less than 800 meters. If the distance needs to be further increased, the repeater can reach a communication distance of up to 3,000 meters. It can also be converted using TCP/IP-485. The device is integrated into the LAN or the Internet for networking.
Principle 3: The glass door should be connected to the electric plug lock, and the wooden door fire door should be connected to the magnetic lock (electromagnetic lock).
Principle 4: The communication hub can be connected to 128 access controllers.

Overview <br> <br> alert to prevent the entrance. In the Northern Wei Dynasty, Tao Yuanyuan wrote: “Cao Tzu’s visit to the imperial palace was a crime and he was guilty of access control. As a result, he found himself in thin.†No dare to look up.†Ming Ye Sheng “Diary of Shuidong, remember to kill Ma Shun and other thingsâ€: “I do not know that after a big drive, the entrance is quite strict.â€
Traditional mechanical door locks are simply mechanical devices. No matter how rational the design of the structure is and how strong the material is, people can always open it by various means. The management of keys in and out of frequent passages (such as offices, hotel rooms) is cumbersome, and the keys are lost or replaced. In order to solve these problems, there are electronic magnetic card locks and electronic code locks. The emergence of these two kinds of locks has improved people's degree of management of entrance and exit passages to a certain extent, so that channel management has entered the electronic age, but with these two With the continuous application of electronic locks, their own defects are gradually exposed. The problem with magnetic card locks is that information is easily copied, wear between cards and readers is large, the failure rate is high, and the safety factor is low. The problem with password locks is that passwords are easily leaked and cannot be checked. The safety factor is very low. At the same time, since most of the products in this period were assembled with the reader part (password input) and the control part and installed outside the door, it was easy for people to open the lock outdoors. The access control system of this period still remained in the early immature stage, so the access control system at that time was often called an electronic lock, and its application was not extensive.

communication method
According to the communication method of the controller and the management computer, it is divided into: RS485 networked access controller, TCP/IP network access controller and no network access control.
1. Non-network access control, that is, stand-alone control access control, is a machine management a door, can not use computer software to control, can not see the record, directly through the controller to control. It is characterized by low prices, simple installation and maintenance, inability to view records, unsuitable for more than 50 persons or frequent movement of personnel (indicating frequent entry and departure), and not suitable for projects with more than 5 doors.
2.485 network access control is the type of access that can communicate with the computer. It can be managed directly using software, including card and event control. Therefore, it is easy to manage, control is centralized, records can be viewed, and records can be analyzed and processed for other purposes. The feature is that the price is relatively high and the installation and maintenance are more difficult. However, the training is simple, and value-added services such as time and attendance can be performed. Suitable for many people, large mobility, and many projects.
3. TCP/IP network access control, also called Ethernet networking access control, is also a network access control system, but the computer and the controller are networked through a network cable. In addition to having all the advantages of the 485 access control network, it also has the advantages of faster speed, simpler installation, and larger number of networks, and can be networked across regions or across cities. However, there are high equipment prices and require computer network knowledge. Suitable for installation in large projects, large numbers of people, speed requirements, cross-regional projects.

Configuration system
The configuration of the access control system is mainly based on the principles of the reader distance from the card reader to the controller and from the controller to the main control computer. One principle: The distance from the card reader to the controller is less than 100 meters. It is recommended to be within 60 meters.
Principle 2: The length of the bus connecting the computer and other controllers is less than 1200 meters. It is recommended that the length of the bus is less than 800 meters. If the distance needs to be further increased, the repeater can reach a communication distance of up to 3,000 meters. It can also be converted using TCP/IP-485. The device is integrated into the LAN or the Internet for networking.
Principle 3: The glass door should be connected to the electric plug lock, and the wooden door fire door should be connected to the magnetic lock (electromagnetic lock).
Principle 4: The communication hub can be connected to 128 access controllers.
Fire Elevator,Fireman Elevator,Fireproof Elevator,Fire Service Elevator
Homefriend&FUJI Elevator Co.,Ltd , https://www.jfujilift.com