menu
Power requirements and options for access control systems – Access Control
Power requirements and options for access control systems – Access Control
Power supply systems are a determining factor in the proper functioning of any access control system and choosing the right power system to meet specific requirements is important. In this article,…

Access Control

Best Access Control System in BD

Posted bytechytanvirPosted inAccess ControlTags:,

<img width="1568" height="1045" src="https://accesscontrolsystem353057821.files.wordpress.com/2021/09/pexels-photo-5999936.jpeg?w=1568" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" loading="lazy" srcset="https://accesscontrolsystem353057821.files.wordpress.com/2021/09/pexels-photo-5999936.jpeg?w=1568 1568w, https://accesscontrolsystem353057821.files.wordpress.com/2021/09/pexels-photo-5999936.jpeg?w=150 150w, https://accesscontrolsystem353057821.files.wordpress.com/2021/09/pexels-photo-5999936.jpeg?w=300 300w, https://accesscontrolsystem353057821.files.wordpress.com/2021/09/pexels-photo-5999936.jpeg?w=768 768w, https://accesscontrolsystem353057821.files.wordpress.com/2021/09/pexels-photo-5999936.jpeg?w=1024 1024w, https://accesscontrolsystem353057821.files.wordpress.com/2021/09/pexels-photo-5999936.jpeg 1880w" sizes="(max-width: 1568px) 100vw, 1568px" data-attachment-id="30" data-permalink="https://accesscontrolsystem353057821.wordpress.com/2021/09/25/power-requirements-and-options-for-access-control-systems/pexels-photo-5999936/" data-orig-file="https://accesscontrolsystem353057821.files.wordpress.com/2021/09/pexels-photo-5999936.jpeg" data-orig-size="1880,1253" data-comments-opened="1" data-image-meta="{"aperture":"0","credit":"","camera":"","caption":"","created_timestamp":"0","copyright":"","focal_length":"0","iso":"0","shutter_speed":"0","title":"","orientation":"0"}" data-image-title="faceless woman inserting credit card into subway ticket machine" data-image-description="" data-image-caption="

Photo by Ono Kosuki on Pexels.com

" data-medium-file="https://accesscontrolsystem353057821.files.wordpress.com/2021/09/pexels-photo-5999936.jpeg?w=300" data-large-file="https://accesscontrolsystem353057821.files.wordpress.com/2021/09/pexels-photo-5999936.jpeg?w=750" />

Power supply systems are a determining factor in the proper functioning of any access control system and choosing the right power system to meet specific requirements is important. In this article, Ronnie Pennington, National Account Manager for GCTL explains several ways to determine and meet power requirements for access control systems.

 Typically, an access control system itself acts as the main source of power supply for readers. However, depending on the need, the power requirements are different for the various elements of a typical access control system – card readers, biometric readers, turnstiles, etc. Consequently, there is a need for other external power supplies that must be evaluated and selected with specific power requirements in mind.

An installer needs to calculate the total load of the installed access control readers as well as the control modules in order to ensure that there is an adequate supply of clean and efficient power.

Criteria for selecting additional power supplies include:

·         The type of power supplies for the system infrastructure (PoE or analog)

·         The type of operating voltage of the access readers (AC or DC)

·         The total power requirement of the readers in the entire system

·         The locations of power supplies throughout the system

·         The number of power supply outlets required to drive all devices

·         Backup battery requirements especially for readers, and if a backup UPS has been specified for the system

·         Cable thickness and length, as voltage drop is always an important consideration

In addition to the readers and keypads, the other components of the access control system, such as electromagnets, latches, and exit devices also have their special power requirements. The variety of access control system power needs – for single or double door systems or up to hundreds of doors – requires a variety of power supply solutions. Also, it is important to mention that some IP access control systems use PoE injectors to ensure adequate power delivery to the IP network components of the system.

For analog infrastructure, one option is expandable power supply systems that are custom configurable. For example, some access controllers provide distributed power and are expandable with the addition of special UL certified modules for access control systems. This allows installers to customize the units to provide maximum power when and where they need it for their specific access control devices. These solutions include modules that allow power distribution and power access controllers that allow the disconnection of outputs and other additional features in the event of a fire alarm system.

The global market for access control cards or credentials will reach $ 400 million, driven by smart cards and near field communication (NFC), according to a new study published by IMS Research. 

Smart cards represent approximately 40 percent of the global credential market and are expected to lead to the next generation of cards that are used for physical access control and secondary applications such as electronic payment, identity management and access-in. -a card.

The next generation of access control cards is expected to do more than provide door access. Users often have to ask themselves three key questions:

·        For what purpose or purposes will the card be used? The credential environment is changing significantly with many end users wanting to use the same credential not only for access control, but also to access health records, hold electronic funds, and gain access to workstations.

·       How are access permissions handled? Being able to use the credential to update the access permissions to different electronic door readers and locks is becoming increasingly popular. Known in the industry as access-on-a-card, the smart card chip uses its read / write function to receive the most up-to-date information on access permissions from an online lock or reader, as well the card in turn. update the other readers located in the building. By having access permissions on the card rather than on the reader, security administrators can install more nearby readers online within a building at a lower price compared to a fully online system.

·       Are there technologies that are a competition? Amid the evolving role of credentials, the industry is expected to become even more complicated with the rise of near field communication (NFC) used in mobile phones. Although still in its infancy, the number of NFC-enabled phones is expected to increase in the next five years. IMS Research estimates that 2.3 percent of cell phones, or 35.4 million, delivered NFC.  NFC could reach 20% and 44%. This equates to the shipment of 377 million NFC-enabled phones 918 million.

Last year several pilot programs were implemented in which smart NFC phones were used by faculty members and students to access university buildings. There were also a small number of projects in the hospitality sector. The rate at which NFC is adopted for the purpose of physical access control is anticipated to vary by region due to factors such as the number of smartphones that are NFC-enabled, the involvement of local mobile phone operators, and the involvement of security companies. For physical access control, the use of NFC on smartphones has the potential to redefine the concept of the credential and revolutionize the access control industry.

Posted bytechytanvirPosted inAccess ControlTags:,

Published by techytanvir

I am a tech lover.

Fill in your details below or click an icon to log in:

Gravatar Email (required) (Address never made public) Name (required) Website WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

You are commenting using your Google account. Log Out /  Change )

You are commenting using your Twitter account. Log Out /  Change )

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

Notify me of new comments via email.

Notify me of new posts via email.

 

 

Δdocument.getElementById( "ak_js_1" ).setAttribute( "value", ( new Date() ).getTime() );