Shenzhen CXT Technology Co.,ltd
Shenzhen CXT Technology Co.,ltd
Contact us
A thorough introduction to the access control system at once, with access control system installatio
A thorough introduction to the access control system at once, with access control system installatio

A thorough introduction to the access control system at once, with access control system installatio

Contact us
+86-13510039892 /+86-13828772946
86-755-29787601
Room 201, Building 196, Tongfuyu Industrial Zone, Kukeng Community, Guanlan Street, Longhua District, Shenzhen
code
The weak current learning circle VIP group has been established. Everyone is welcome to join the group to discuss technical issues, design plans, bidding, construction, engineering cooperation, product docking, etc. Most of the people in the VIP group are engineers, construction subcontractors, design institute designers, company owners, technical directors, manufacturers, Party A, etc.

The access control system refers to the prohibited permissions of the "door" and is the guard against the "door". Usually includes controller, card reader, lock, door opening button, and management software.








1. Identification process of access control system

The process of identifying permissions by conventional access control systems is divided into five steps:

① Platform software editing permissions;

② Permissions are issued to the access control controller;

③ When the card is swiped, the card number information is uploaded to the access controller;

④ The access control controller determines the card swiping authority. If it is legal, the door will be opened, if it is illegal, the door will not be opened;

⑤ Upload card swiping events to the management platform;






2. What is the difference between IC card and ID card?

① The ID card is a non-writable proximity card. Common ones in life include time and attendance cards, access control cards, etc.






Access Card



② IC cards support reading and writing functions. Common ones include bus cards, employee cards, etc.






Staff Card



3. How does the card reader read card information?

At present, the common types of IC cards and ID cards are radio frequency cards, which use wireless radio frequency technology. When the card is close to the card reading area, the card will automatically send information. After the card reader reads and decodes the information, it will transmit the card information to the control host to determine the authority.






4. What is the Wiegand protocol?

The Wiegand protocol is an internationally unified communication protocol with many formats. In order to distinguish it from other manufacturers, Hikvision's access control products use private Wiegand 27 and Wiegand 35 protocols;

① Usually one signal line can only be connected to one card reader;

② The theoretical transmission distance is 110 meters, and the actual transmission distance is about 80 meters;






5. What is RS485 protocol?

The RS485 protocol is also a common communication protocol, but it is not universal among various manufacturers;

① Multiple card readers can be connected hand in hand through a signal bus;

② The transmission distance is relatively long. When the signal baud rate is 19200, the transmission distance can reach 600-800 meters;






6. Access control system installation and debugging

①Power supply

Make sure the power is sufficient, use linear power supply as much as possible, and the door lock and controller should be powered separately. Install the power supply as close as possible to the electrical equipment to avoid interference and transmission losses.



②Wiring

They are divided into power lines, communication lines, and signal lines. When wiring, pay attention to separate strong and weak current lines. The distance between the two tubes must be greater than 20cm.

Power cord: The wire diameter is thick enough and multi-stranded wires are used.

Signal lines and communication lines: Use shielded Category 5 twisted pairs. The 485 bus must be connected using a pair of twisted pairs. When purchasing wires, it is recommended to use 4*0.5 four-core shielded wire.



③Notes

(1). Shielded wires must not be used as 0V voltage (power ground) connection wires.

(2). Each shielding circuit can only have one grounding terminal.

(3) When the shielded circuit cannot be grounded, the shielded wire can be connected to another shielded circuit of the network.

(4) The signal grounds of each module must be connected together.

(5) If there is a breakpoint in the middle of the line, the breakpoint needs to be soldered with a soldering iron and insulated.

(6) Do not put the network cable and the AC power supply together.

(7) If the network connection exceeds 1,000 meters, a repeater must be added. After the repeater, it can be extended by another 1,000 meters.



④Location selection

(1) Card reader: Do not install it on a metal object. The distance between two card readers should not be less than 30 cm. It is best to be powered by the controller. If the card reader is powered from an external source alone, please use a linear regulated power supply (transformer) for the card reader's power supply, and do not connect the negative pole of the DC to the AC ground.

(2) Network adapter: The connection to the controller is hand-in-hand.

(3) Controller: For controllers without isolation, it is recommended to use the same power supply.

(4) Lock: When installing a magnetic lock, the lock body and the relay iron plate must be tightly combined, otherwise there will be insufficient suction. For electric mortise locks, if you need to open a socket when installing an electric mortise lock, please note that the hole diameter must be large enough and the depth must be deep enough to allow the lock tongue to be fully inserted. The lock tongue cannot be fully inserted. After locking the door, the lock tongue will keep beating or the working current will be very high and the lock body will become hot.

entrance control system,entrance control,turnstile gate,speed gate,cloud access control,turnstyle,baffle gate, barrier gateTurnstiles | Full Height | Automatic | Tripod | Wall Mount  |   Engineering,turnstile

Turnstiles | Full Height | Automatic | Tripod | Wall Mount  |  Optima EngineeringCheap Three roller gate,Cheap Shift gateCheap Speed gateCheap Speed gateCheap One word gateCheap TurnstileCheap Fence gateCheap TurnstileCheap Baffle door

Three roller gate,sliding gate turnstiles,speed gate turnstile,turnstile manufacturer,optical turnstile,tripod gate,Office|The company|Office Building|park|School|Government|library|Art gallery|Beauty salon |Airport|Bar|Club|Subway|Service|Center|Graduate


Leave a Message Email Us

we will contact you within 24 hours.