SurveyAccessControl
www.fingertec.com
Breakdown
Surveying
An electronic access control system is the collection of various components that work together to control access to a building or site.
There must be a clearly identified purpose for
installing the system and what role it is to play.
The client must also understand the benefits
and appreciate the demands that are made
and will be achieved after installation.
The access control system must rely on users, but surveyors must
understand their customer and needs to ensure that the proposed
system has a correct purpose. There is an important need to get the
correct balance in the system as a whole. Several factors must be
taken into consideration in order for electronic access control engineering to influence in the ways all properties are to be secured,
including perimeter protection and door protection.
System Design
Prior to the breakdown, centralized systems will
have all operations terminated and perimeter devices will remain in their state. Distributed systems will be degraded and rendered offline, but
certain functions that can be performed will
remain depending on the system and component sophistication. Some
examples include granting access using a site code and storing events in
a memory buffer.
Emergency Access
In order to gain entry to the site, high security
manual overrides are used and the location of
the site should be specified on the working drawings. The use of firebreak relays will enable release
of locking devices from the fire alarm signal, but reset separately from the
fire detection system.This will avoid accidental reset during an emergency.
Number of Staff and Turnover
Consider the design of the access control system as it is the practice to hold the data on information sheets and drawings for reference.
Finalize a drawing or floor plan of the full site,
then identify the individual areas that require
protection.
A crucial influence on the system is tallying the
number of staff and the turnover rate for an office.
This is usually recorded at peak periods, such as
start and finish times, when large numbers of staff must pass through
the readers at the same time, as well as if all events are to be recorded.
For a quicker mode of verification, contactless recognition systems such
as facial recognition and RFID card readers are recommended over passwords key-ins and card insertion systems.
Cabling
A high staff turnover or temporary labor can introduce additional complexities. Therefore, a budget must be introduced in order to solve issues
involving new credentials and system programming.
Consider voltage drops in large installations,
as this is a vital part of the cabling system
design. Additionally, there is a need to determine the standby capacity of power supplies
and if there is a requirement for any additional
remote power supplies to support ancillary
equipment or distant equipment current
loads.
It is important that the cables carrying power circuits must not have
a quoted resistance that creates a problem for supplying distant
loads. It is not always an option to double up the supply cores to reduce the resistance of the supply conductors. Judgment to distance
must be made in order to fix the voltage at the terminals of the supply, for example, measuring the distance or the size of the cable.
Software
Most operators increasingly use the PC, an essential component in the operation of any business,
and software to control elements used in the access
control and security industries. Through a range of
iconized menus will commands be accessed and
the administration will provide access to the overall system control and
programming. Real-time monitoring can be achieved to interface with
most reader types and the use of a PC-based system or the future introduction of one should be catered for at the design stage.
Integration and Upgrading
Security Level
Interlock accessories that are used to make the
installation of security door systems must be
identified on the data sheets. Whether they are
used with monitored or unmonitored releases,
provision will be made to detail. In line with
the needs of the client, the security level can
be established and classed as high, medium
or low.
The location of all readers should always be included
on the design information chart together with the
number of units employed at the controlled point.
Two readers are needed in the event of a roll call, anti-passback or
time registration. Certain settings can also be specified, for example, using the right hand to address the reader and adjusting the
height of the reader as a user-friendly device for all types of employees. For system controllers, the location of these devices is important along with the positioning of power supplies as there may
be multiple units sited in areas that are not normally accessible.
©2000-2013 Finger Te c Wo r l dw i d e S d n . B h d. Al l r i g ht s re s e r ve d.
Was this manual useful for you? yes no
Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Download PDF

advertisement