Sensor determination of the direction of people's passage. Electronic protection systems. Private case of a wireless security system

The accuracy of the results of the control of the box nodes is achieved both due to the high accuracy of measuring the surface temperature of the controlled assembly, and due to the high accuracy of determining the boundaries of the controlled zone. The high accuracy of determining the boundaries of the controlled zone is ensured specifically designed for the ADK-B system of the DPD-01 differential sensor (Fig. 5). The main parameters of the sensor are shown in Table. one.

Fig. 5. Appearance of a point track sensor for wheel passage

Table 1. Basic specifications of the sensor DPD-01

Parameter

Value

Operating range of train speeds, km / h

0 ... 300

Wheel action zone length relative to the sensor axis, cm

± (20 ... 25)

Accuracy of determining the position of the axis, not worse, mm

Supply voltage, in

+12 (± 0.36)

Maximum consumption current, no more, ma

Load resistance, not less com

Power consumption, no more, W

Depth of the installation from the head of the rail, mm

45 (± 2)

Installation from the side wall of the rail head, mm

6 (± 1)

Sensor output - three-wire cable, length, m

Operating temperature range, 0 FROM

minus 40 ... + 60

Electric isolation from rail - in accordance with RD 32 CH05.30-90

Sensitive sensor elements are two coils wound on ferrite core rods. The resonant contour was assembled on each coil. The contours receive power from the built-in variable voltage generator with a frequency of 30 ... 40 kHz. The outputs of the contours are connected to the inputs of amplitude detectors, the outputs of which are differentially included on the inlet of the summing amplifier. The output of the amplifier is the output signal of the sensor.

Coils and electronic components of the sensor are placed in a plastic body from polyamide and chopped with a silicone compound. The sensor is attached to the clamp of the slab rail, which ensures reliable fastening of the sensor and its protection against shocks and vibrations.

When the sensor is installed on the rail sensor elements of the sensor - the coils are located along the rail. In the absence of a wheel in the sensitivity zone, the voltage sensor on the contours is equal, and the output voltage at the output of the summing amplifier is zero. When the wheels in the sensor is inserted into the sensor zone, it approaches the first trains of the sensor coil, the electromagnetic field of which is induced in the metal mass of the vortex currents, causing a decrease in the equivalent contour resistance of the first coil and, accordingly, reducing the voltage at the output of the summing amplifier. As the wheel moves relative to the sensor, this voltage decreases, reaches a minimum and increases to zero at the moment when the wheel axis is above the middle of the sensor (Fig. 6). At this point, the wheel is located symmetrically relative to two sensor coils and equivalent resistance to their contours are equal. With a further movement of the wheel, it is removed from the first coil and approaches the second, which leads to a change in the voltage polarity at the output of the summing amplifier, which reaches the maximum when the wheel axis is above the second coil, and becomes zero when the wheel comes out of the sensor zone. Thus, the DPD-01 sensor reacts to the passage of the wheel by a pulse consisting of two semi-fellows - negative and positive polarity. The moment of transition from the negative half-wave to the positive corresponds to the passage of the wheel axis above the middle of the sensor.

Fig. 6. Temporary DCP Signal Chart

The output voltage of the sensor does not depend on the speed of the train, but is determined only by the position of the wheel relative to the sensor and the height of its reservation.

The differential inclusion of sensitive elements of the sensor protects it from the effect of external electromagnetic fields, including from fields created by reverse traction currents.

Features of the DKP-01 sensor used in ASDK-B:

1) The sensor reacts at the time of the passage of the wheel axis above the axis of the sensor symmetry. Its reaction does not depend on the train rate (in the range of from 0 to 300 km / h), the diameter of the wheel and the distance from the surface of the sensor to the surface of the rail riding.

2) the accuracy of fixing the moment of passing the axis of the wheel pair over the axis of the symmetry of the sensor is not more than 10 mm.

3) The sensor provides a high-precision measurement of the speed of each axis of the train and the error-free recognition of the automation of each movable unit according to the calculated inter-axis distances.

4) The design of the sensor mounting node provides a reliable fastening of the sensor to the rail sole with the provision of junction from exposure to impacts and vibrations.

4.3 Relief control rack

The residual control equipment of the ASDK-B system (Fig. 7) ensures the continuous operation of the locked equipment in the main mode - automatic control of the input nodes and auxiliary, service mode, the maintenance of the equipment of the complex.

The composition of the control rack of distillation equipment (Fig. 8) includes:

    block of secondary signal converters;

    IPC with a modem 1200 (ISA);

    uninterruptible power supply with battery pack;

    the heating unit of the input windows of the camera cameras;

    the alarm board is an indicator board for visual control of the state of distillation equipment.

In the automatic control of the inxial nodes, the control rack of the locked equipment ensures the implementation of the following functions.

1) Self-testing of the client equipment with malfunction diagnostics.

2) Automatic calibration of measurement channels with testing of equipment for the equipment when powering for distillation equipment and periodically during operation. During operation, automatic calibration can be carried out immediately before the passage of each train, in the presence of an notice signal of the train approximation (on the train entry into the approximation site), or after the train pass, according to a special algorithm (in this case, the train approximation signal is not required).

3) Measurement of the parameters of the passing train - the rate, the number of mobile units, indicating the type of mobile unit and the number of axes in it, own (absolute) the temperatures of the containers of the bugs and the sective parts of the wheels in degrees Celsius with reference to the side of the train, the ordinal number of the movable unit from the head Trains and axis number in the car.

Fig. 7. Exterior view of distillation control rack

Fig. 8. Diagram of placement of the hardware control equipment of the distillation equipment.

4) Processing the data obtained in the train pass mode to detect the emergency and approaching the alarm of the beam nodes.

5) Formation and transfer to the station control panel and registration of the results of the time analysis of the train in a quasi-layer time scale.

6) software and controlled control of the performance of distillation equipment using the train passage embedded in the IPC.

Control of working capacity of outdoor equipment is carried out at all stages of train passage. In case of malfunctional failure, the fault list is displayed in the final information about the traveled train at the station control and alarm and alarm and on the signaling board indicators of the distillation rack.

The IPC is bonded in the Ras-700 chassis (Fig. 9) and contains the following modules:

    aCE-916C power supply

    board processor ICOP-6033;

    discrete I / O board ISO-P32C32;

    board ADC L-264A;

    modem 1200 (ISA).

Fig. 9. Placement of the controller modules

The controller power supply is provided by the supply voltage + 24 V to the appropriate contacts placed on the chassis, from the uninterruptible power supply, which is part of the resistant equipment. The power on or off of the power supply voltage of the IPC is performed by a toggle switch installed on the front panel of the chassis.

On the rear panels of the MPC modules are connectors designed to connect cables connecting the IPC with sensors and the executive bodies of the locked equipment through the UPU unit.

The UPS unit is placed in the frame (Fig. 10) and includes the modules of the following devices.

1) Outdoor power supply voltage switch - KP, providing the ability to manually or automatically turn on-disconnecting the chambers of the floor (Table 2).

Fig. 10. Placement of the PRS block modules

Table 2. Authorities and indication of voltage switch (KP)

Organ Name

Position

Function

Dumplings "Avt Rule" bl, bp, cl, joint

Installing the KP into automatic mode (by the MPC command) on the power of the camera outdoor. In this position, the Tumbler "Hands On" is blocked.

Translation of the CP into the manual mode of the camera by the Outdoor Tumbler "Hand-On". In this position, the IPC command on the power on the camera is blocked.

Tublings "Hands on" BL, BP, SL, SP

Top

Food Camera Outdoor included.Tumbler functions when the team The IPC on the power on the power is blocked (Automobiles "Auto High" in the lower position).

The camera outdoor is disabled.

Light indicators bl, bp, sl, joint

Switched on

Camera supply voltage outdoor included.

2) Four stabilized current sources - IT, designed to heat the calibration emitters of the chambers of the floor when they are calibrated. For each camera, an individual current source. The order is the following (left to right): Boxing left, buxal right, nubcous left, wheel right. Turning on the current source is automatically performed by the controller command or manually (Table 3).

Table 3. Controls, indications and control of the current source (IT)

Organ Name

Position

Function

Tumbler

"Run. Incl

Top (holding)

Manual activation of the current source to heat the camera calibrator outdoor. When manually turning on the current source it is necessary to control Calibrator heating temperature bysensor output voltage measurements The temperature of the curtains on the contacts of the PTOS control connector.

Average

Manual current supply to heating the calibrator is turned off.

Light indicator

Switched on

The current source is turned on in manual or automatic mode.

Socket "Current"

Connecting an external voltmeter to control the output current using the AACR.685611.018 cord. The large-scale coefficient is 0.2 V / a. The value of the output current is not more (2 0.2) A.

3) Environmental Temperature Converter - PTOS, providing signals converting from three primary temperature sensors (environment, inside the distillation rack and backup) to a unified signal for feeding to the ADC inputs, and also provides a current source blocking (shutdown) in case of overheating Calibration emitter camera outdoor. The blocking threshold is common to all four cameras. The value of the blocking threshold is U PB \u003d 3.2 (± 0.05) B, which corresponds to the temperature of the curtain 95 (± 3) ° C.

4) The electroplating device is an UGR intended for electroplating the circuits of signals and commands that are exchanged by the IPC and a block of secondary signal converters. The electroplating device allows you to carry out the connection-shutdown of the modulator in the service mode and open-closing the protective curtain of any of the four cameras (Table 4).

Table 4. Controls and indication of electroplating devices (UGR)

Organ Name

Position

Function

Luminous indicator "Service"

Switched on

Indication of the transfer of the IPC to the service "Service" toggle switch on the front panel of the PU module.

Toggle "mod. Bl "," mod. BP "," mod. Sl "," mod. JV "

Top

Turning on the modulator of the corresponding Outdoor cameras if the service-work is in the "Service" position

Turning off the modulator appropriatecameras outdoor if the Tumbler "Service-Work "is in the" Service "position. When switching to the bedlightService-work "To the" Work "tamblers do not function.

Tumbler

Castle Bl "

Castle BP "

Castle SL "

Castle JV "

Top

Opening the protective curtain of the appropriate camera outdoor if the "service work" table on the front panel is in the "Service" position (if there is a light signal "Service").

Closing the protective curtain of the corresponding camera outdoor if the service "service work" on the PU front panel is in the "Service" position (if there is a link "Service" on the facial panel UGR). When switching the "Service-work" toggle on the front panel PU to the "Work" position (in the absence of a light signal "Service"), the tumblers do not function.

5) Peak signals - FPS, providing the formation and memorization of peak values \u200b\u200bof the output signals of the chambers floor at the time interval of the alert (hub) node in the field of view of the optical system of the camera outdoor. The gating interval of the formation of peak values \u200b\u200bis carried out:

    in calibration mode signals (strobe bl, strobe, strobe sl, strobe SP) formed by the IPC;

    in the measurement mode, the "Gate of the Gate", formed by the FIP block, for toupel cameras and a "hub strobe" signal formed by the IPC for hubes.

There are two possibilities for testing peak detectors of the FPS board. One when the external command "Test FPS" programmatically turns on the internal test signal with a frequency of 3 kHz and on the outputs of peak detectors is removed voltage 2 (± 0.2). Other, when an external test signal is fed by a frequency of 3 kHz to contact the control connector FPS (Table 5).

6) train pulse impetor - FIP, designed to form output signals of outdoor DPK sensors, RFC and a travel relay signal of the approximation (SCB signal) to a unified form and transmit them through electroplating elements to the inputs of the discrete I / O elements of the controller in order to synchronize The work of the complex in the process of monitoring the passing train. The FIP also performs the functions of the train passage simulator (IPP).

Table 5. Controls and indication of the submission of train pulses (FIP)

Organ Name

Position

Functions

Tumbler "On"

Top

Turning on the FIP (inclusion of the built-in secondary power supply)

Turning off FIP

Light indicator "On"

Switched on

Confirmation of the inclusion of the FIP.

Button "Start" without fixation

Press and let go

Running the mode imitation mode.

Light indicators: DPK-1, DPK-2, DPK-3

Wheel passage sensor response indication.

Light indicator "Strobe"

Indication of the presence of a "strobe-box" signal.

Light indicators: "SCB" RTSN "

Indication of the presence of signals SCB and RTSN.

Light indicator "IPP"

Indication of the mode imitation mode. Enable when starting IPP.

Light indicator "Failure"

Indication of failure (malfunction) FIP during the passage of the real train.

Digital indicator "mode code"

States:

In IPP mode - the speed of the simulated train - 250 km / h.

In FIP mode - indication of measuring the average voltage of DPK 1;

In IPP mode - the speed of the simulated train is 187 km / h.

In FIP mode - indication of measuring the average voltage of DPK 2;

In IPE mode - the speed of the simulated train is 150 km / h.

In FIP mode - indication of measuring the average voltage of DPK 3;

In IPP mode - the speed of the simulated train is 75 km / h.

In IPE mode - the speed of the simulated train is 30 km / h.

In IPE mode - the speed of the simulated train is 5 km / h.

Waiting for a train pass or launching IPP (flashing point with a frequency of 1 Hz)

Measurement of medium voltage DPK.

The measured value of the average DPK voltage is normal.

Measured medium voltage The DPK came out for the permissible limits.

DPK Signal Analysis Mode and Gator Pulse Development

"Reset" button

Press and let go

Reset (installation at the initial state) FIP.

7) The control panel (PU) contains primary SCB signals and signals of the position of protective curtains of cameras floor. Also on the front panel PU placed controls (Table 6), providing:

    the ability to install one of the eight thresholds of an emergency alarm at the axis neck temperature (70 ... 180 ° C);

    translation of the controller to the standard or service mode of operation;

    switching on modulation and opening protective curtains of one of the four cameras (only in service mode);

    disconnecting hubes outdoor.

Table 6. Control and indication controls (PU)

Organ Name

Position

Function

Tumbler

Job service "

WORK

Starting position when turning on the IPC

SERVICE

Service mode.

Switch "Threshold ° С"

An alarm threshold is set at a cervix temperature of the trance axis greater than or equal to 70 ° C.

Same at 80 ° C.

- "- at 90 ° C.

- "- at 100 ° C.

- "- at 120 ° C.

- "- at 140 ° C.

- "- at 160 ° C.

- "- at 180 ° C.

Switch "Camera"

Installing the appropriate chamber outdoor in the operating state (modulator included, openprotective curtain) in the "Service" mode.

Light indicator "Pit.Rtsn"

Included when submitting to the RF power supply voltage + 12 V.

Light indicator "Sq. Bl "," square BP "," sq. Sl "," square JV "

Switched on

Indication of the open state of the protective curtain of the input windowappropriate camera outdoor.

Tumbler

Off "

Starting position. The IPC processes Information coming from all chambers of floor (hub and beam).

Top

The output of the hub chambers of the floor from the working mode, the IPC information from the hub cameras does not proceed.

Tumbler

PETE. RTSN "

Top

(regular)

Turning on the secondary power source. On the RTSN servedpower supply voltage + 12 V .

Turning off the secondary power source of the RCN (with parallelworking with the system of Ponab or Disc).

8) The power unit of the control rack of the distillation equipment with an uninterruptible power supply in it - the UPS (Fig. 11, Table 7) provides:

    transformation of alternating voltage 220 V to stabilized voltage + 24 V;

    automatic search and connecting the converter to the feeder, the voltage of which is in the specified limits;

    the continuous operation of the base asdk-b subsystem in the case of switching operation from the main feeder to the backup, as well as for 4-5 hours, during the damage to both feeders, power from the battery with a voltage of +24 V, which is included in the control rack of the distillation equipment.

Fig. 11. Placement of management and indication of the UPS.

Table 7. Controls and indication of uninterruptible power supply (UPS)

Organ Name

Position

Functions

Light indicator

220V feeder1

Switched on

Indication of the presence of voltage 220 V at the input "Feeder 1".

Light indicator

220V feeder2.

Switched on

Indication of the presence of voltage 220 V at the input "Feeder 2".

Light indicator

24V battery

Switched on

Confirmation of the presence of a backup battery power supply voltage.

Switch machine

220V feeder1

Top

Voltage supply 220 V from the input "feeder 1".

Switch machine

220V feeder2.

Top

Voltage supply 220 V from the "feeder 2" input.

Switch machine

\u003d 24V battery

Top

Connecting the battery.

Switch-machine heating

Top

Power supply to the heating unit of the camera outdoor.

Socket 24V.

Output voltage control 24 V.

Sockets220V.

Voltage220V.

Light indicator "Feeder2"

Indication of the power mode of the UPS from "Fideer 2".

Light indicator "Capture"

Indication of the power mode of the UPS from one of the power sources.

Light indicator "Search"

The flashing indicator signals the search for the power supply.

Luminous indicator "Output OK"

Switched on

Indication of the presence of output voltage 24V.

Light indicator "Mains Fail"

Switched on

Lack of supply voltage 220 V at the entrances "feeder1" and "feeder2".

Light indicator "Battery Fail"

Switched on

Lack of reservepower Voltages 24V from the battery.

9) The heating unit (Fig. 12, Table 8) is designed to supply voltage to film heating elements mounted on protective covers of camera cameras, to ensure snowstorms of the input windows of the outdoor chambers. The heating unit is connected to the heating elements of individual cables.

Fig. 12. Placement of the controls and indication of the floor heating unit floor.

Table 8. Controls and display bodies

A "Heating" command is served on the heating unit from the station remote control and alarm. In this case, the heating elements are connected to the voltage source ~ 24 V and the heating of the input windows of all four cameras is turned on.

Removing the "Heating" command is also carried out by command from the station remote control and alarm, which turns off the heating of the input windows of all chambers floor. To control the execution of the Heating command in the heating control unit, threshold devices are provided in the heating chain of each camera outdoor, outstanding the controller controller controller 1 in the ADC< U пор < 5 В, если ток в цепи обогрева > 0.8 I NOM. To monitor the execution of the heating command, when the heating is turned off, the thresholds are issued to the appropriate inputs of ADC voltage< 0,2 В. Подтверждение включения обогрева каждой камеры напольной отображается на мониторе станционного пульта контроля и сигнализации пиктограммой.

The power consumed by the heating element of one camera outdoor is ≈ 80 W.

10) Alarm board (Fig. 13, Table 9) with display elements (LEDs), displayed on the front side of the control rack, serves to monitor the state of floor equipment, blocking control equipment (with a closed door of the rack).

Fig.13. LED locations on the signaling board.

Table 9. Alarm Board Indicators

Name indicator

Position

Functions

LED "MPK"

(green color)

Flashing (F \u003d 1 Hz)

The IPC is in working condition.

LED "KS"

(green color)

Switched on

Signals the reception of the request from the station.

Switched off

Signals the transfer of the response message to the station.

LED "Wed"

(green color)

Flashing (F \u003d 0.5 Hz)

Signals that the IPC is locatedin the "Automated service work on the post" mode.

Included continuous

Signals that during the main automatic work of the IPC included the "Service" toggle switch.

Switched off

Tumbler "Service" is disabled.

LED "SCB" (green)

Switched on

Begins to glow, from the moment of registration of the ICC station of the IPC and until the RTN signal is removed.

LED "AU"

(red color)

Switched on

A emergency checkpoint (with heating above the assigned threshold of the axis neck) is detected. The glow continues until the beginning of the next calibration.

OA LED

(red color)

Switched on

Signals a malfunction of one of the blocks of distillation equipment:

    it is inoperable one of the chambers of the floor (before, during or after the passage of the train). The glow continues until the beginning of the next calibration;

    outdoor camera is inoperable when it is orientation during "automated service work". The glow continues until the start of the orientation process of another camera.

LED "DPK"

(redcolor)

Switched on

After passing the train, the testimony of DPK1, DPK2, DPK3 does not coincide. The glow continues until the beginning of the next calibration.

BKO LED

(red color)

Switched on

One or both cameras outdoor beams are disabled remotely from the station console. The glow continues until the remote switching on both beam cameras.

LED "sk"

(red color)

Switched on

One or both cameras outdoor hubes are disabled remotely from the station console. The glow continues until remotely turn on both hubes. If the toggleler "Off St "On the front panel PU is in the upper position, the LED does not shine

It is the ability to catch the fact of unauthorized entry into the object and timely report about it in order to detention or scare the thieves. The electronic security system is designed to supplement the minimum set of mechanical protection. In addition, in case of your stay at home, this system can not work fully and safely implement, for example, only at night.

The security system used to prevent intrusion or theft consists of:

  • Access control equipmentwhich is appreciated to confirm the penetration into the protected area;
  • Invasion registration devicesdesigned to detect the invasion and process the obtained information received from the sensors;
  • Remote control equipment A security system serving to remotely shut down the security of people who are authorized to do it. Remote controls are telephone lines, radio communication or special channel;
  • Television systems The transmitting video signal to a specialized center of tracking. The operator that takes an alarm, following the instructions, adopts adequate solutions agreed with the head of the guarded premises;
  • Telebo Systems,. Since the beginning of the benefit of the organization, an access to the territory of a protected object must be allowed to access the territory of the protected object when the security system is triggered.

Detection sensors.

Assigning detection sensors - report to the console:

  • On the presence of persons who hid on a protected facility;
  • About the invasion of the protected zone;
  • On damage to obstacles to the invasion (shutters, windows, windows, doors, glazed openings, etc.);
  • On penetration through damaged roof, ceiling, walls or gender.

At placement places, the sensors can be classified on:

  • peripheralswhich are monitoring the external zone (fences, fences, alleys);
  • perimetricprotecting the walls of protected ownership. In residential premises, these detectors are placed, as follows from their name, around the perimeter: on walls, partitions, shutters, inputs, etc.;
  • internal Detectors designed to observe certain zones or especially valuable objects (corridors, rooms, stairs, safes, boxes with documents).

There are various types of detectors:

  • Detectors opening blur the security chain with ordinary penetration, namely through the door, window;
  • Destruction detectorsas a rule, mounted on partitions (impact detectors, vibration or glass breaking);
  • Motion detectors are usually used to monitor movements in zones that were not covered by the input control (infrared barriers in the corridors, IR rays in the alleys).

Opening sensors.

The task of opening sensors is to report any attempts to unauthorized invasion through doors, windows or shutters.

There are opening sensors intended for:

  • windows, doors;
  • shutter;
  • roller shutters (with manual or motor);
  • gate garages.

The opening sensor is often installed in the openings overlooking the staircase, and on the doors of protected rooms, unless the observation is performed by a device of some other type (for example, an infrared motion detector).

Some sensors use two pairs of conductors: one in the circuit of automatic observation or automatic protection, designed to continuously monitor the intentional disorders of the cable integrity (in the active state of the signal or not).

Advantage.

The opening sensor is very economical and reliable in operation.

The installation of the opening detector assumes the presence of a cable that should be harmonized with interior trim, with the exception of situations where the sensors are attached on door and window platbands. In this case, it is better to use devices embedded in the door or window frame.

Design.

Opening sensors are electrocontact (simple interrupters, such as end switches used in production) or magnetocontact (in this case, the magnet closes two thin metal plates).

The magnetocontact sensor is often called magnetically controlled, according to the nature of its electrical contact (switch with a magnetically controlled contact - GERCON). This type of contact is most often used in security systems.

The magnetocontact sensor consists of two parts:

  • one of them is the actual contact - the germ, fixed on the fixed element of the protected input (door or window box);
  • another contains a magnet that provides electrical contact. It is placed on the fixed part of the door, windows, etc.

When both parts of the sensor are a friend of a friend, the magnet attracts a movable plate of electrical contact that closes. On the contrary, if the door or window is open, then the release of the magnet leads to the termination of the contact and the inclusion of the alarm (there are also models with a normally closed contact type).

Destruction sensors.

The task of destruction sensors is to transmit information about the physical effect on any obstacle (the removal of glass, the destruction of the walls by reducing materials), transfers through the fence, etc.

Vibrator with mechanical contact.

This sensor is often used quite.

Distinguish two main types:

  1. A sensor having a thin spring metal plate. A movable inertial cargo is fixed on this metal plate, and the pressure screw passing through the cargo provides control of the elasticity of the contact. With an increase in the pressure of the screw to a fixed contact, the sensitivity of the sensor to shocks is reduced, with a decrease in the pressure of the screw, the sensitivity increases;
  2. Sensitivity is determined by the time of opening the contact when bounce apart from each other.

Glass break sensors.

The principle of operation of glass break sensors is to respond to oscillations with a frequency of approximately 15,000 Hz, or the high frequency oscillations produced during breaking or cutting.

The electromechanical sensor is placed in a hermetic flask, its contacts are made in the form of two electric threads, which are half immersed in mercury. Wipers arising from glass breaking, initiate short-term circuits of electrical contact.

The acoustic sensor is needed to capture oscillations with a frequency of about 1500 Hz, these oscillations appear if physical effects (destruction) on glass partitions are performed. The signal that is fixed by the microphone is enhanced and analyzes in the electronic circuit associated with the sensor.

Piezoelectric sensor- by virtue of its high selectivity is more accurate. It does not react to low frequencies that may occur when the glass has shock. But, since the glass has not broken, the signal from the sensor is not transmitted to the electronic circuit and this prevents the false response of the protection system. Even if a very heavy transport has passed or the plane flew, and all this caused a strong glass oscillation, the system will not work.

Sensors impact on the walls.

Piezocemic, or Seismic, Sensorsit is possible to fix unauthorized penetration through a partition or wall with mechanical or thermal instruments. These sensors are usually stationary to the capital walls of the premises or partitions, or fixed on the wall of the safe. The piezoceramic receiver transfers mechanical oscillations into a frequency signal into several kilohertz, which is processed by the electrical circuit, and it already determines the degree of anxiety.

Sensors with ribbon conductors are a mesh from electrical wires or tape conductors that are mounted in a protected partition or fixed on it. Violation of the integrity of one of the wires or ribbons of the loop causes alarm response.

Cable deformation sensors or partition destruction are used, as a rule, to protect the external circuit, for example, the fence. In case of violation of the integrity of the wire lattice, a change in the dielectric constant of the coaxial cable is recorded, which in this case is used as a sensor. Such a design makes it possible not only to understand what the integrity of the lattice or the fence occurred, but also to accurately determine the place where it happened.

Displacement sensors.

The purpose of the movement sensor is the registration of the movement of all persons with permission or violators, in places such as a corridor, a staircase, a balcony, near strategic objects, or where there is no usual protection of doors, windows, etc.

Pressure Sensors.

This is another type of electrocontact sensors.

Outdoor sensormaybe visible or under carpet. Human weight puts pressure on the contact rug, and it causes the operation of electrical contact. The signal comes to the security console.

Ribbon matsThe pressure sensitive, as a rule, is used to protect strategically important places, such as the upper part of the fence, balustrades, balcony parapet, inter-space window. When you click on the ribbon rug, electrical contact works.

Photoelectric passage sensors.

Sensors of this type make it possible to simultaneously protect multiple passes located in the same plane. Light rays focus on photocells and are used inside the space of the room. If the interruption of the light beam occurs, that is, the person crosses it, the security alarm is triggered.

Infrared active type sensorit consists of a radiator and receiver of infrared light, which human eye cannot see. They can be installed inside and outside the room, but when using indoors, artificial lighting can be interfered. Therefore, it is necessary to use passive and active filters appropriate on technical specifications. When using outdoor sensors, it is necessary to eliminate the possibility of the appearance of dew, and in the optics of sensors.

It is possible to form a difficult obstinate barrier to form from several infrared beams (for example, in front of a large glass of the store) or with the help of repeated reflection of one beam between two surfaces as between the walls of the corridor).

Microwave microwave barriersconsist of transmitters and receiver who are removed from each other for hundreds of meters. Microwave microwave barriersthe most logical to apply for industrial facilities. The electromagnetic signal is transmitted to the directional antenna in the direction of the receiver. If its in the electromagnetic field, an extraneous presence occurs, there is a wave of a signal received by the receiver, and this leads to alarm response. The frequency of oscillations of the emitter is about 10 GHz. This is exactly the compromise between the reliability of recognition and the security, which allows you to avoid false system workflows. Sometimes a signal with a frequency of 2.5 GHz is used, then there is an excessive penetration of radiation through partitions.

Infrared Passive Type Sensorsalso used to create barriers invisible by the human eye. In this case, special lenses are needed with a passive receiver of infrared rays, capable of taking the thermal radiation of the human body. These sensors are applied, as a rule, as motion detectors, but in our case the lenses system forms an infrared curtain - a trap that accepts IR rays from all directions of observation.

Volume tracking sensors.

Volume observation sensors are designed to detect foreign space in a closed space. They are most often called presence sensors or motion sensors and are divided into the following types:

  • Acoustic
  • Passive infrared sensors
  • Ultrasonic sensors
  • Microwave Radars microwave
  • Combined sensors (microwave and infrared).

Infrared sensorsequipped with a pyroelectric detector (PD) transforming thermal oscillations (we will remind that the human body always highlights heat and is a source of infrared heat radiation) to electrical. In addition, PD is combined constructively with various lenses in order to ensure scanning as much as possible

Ultrasound sensorscontain the ultrasonic emitter modules and the same receiver. The most popular frequency is 40 kHz, however, depending on the device manufacturer. This frequency can be made from 22 to 40 kHz. The operation of these sensors is based on the Doppler effect, which consists in measuring the frequency difference of the sound wave when it is reflected from any moving body. Due to the fact that ultrasound receivers are very selective, the frequency changes transmitted by the emitter leads to a weakening of the received signal. The loss of the signal passes the analysis of the electronic circuit serving modules that determine the conditions for switching on the alarm relay. The radius of the ultrasound sensors is approximately 9-15 m. By virtue of the physical properties, ultrasonic waves do not pass through the walls and partitions.

Operating principle microwave sensors Also based on the Doppler effect. These are active sensors with a radiator and a receiver mounted in one housing and the high frequency of the microwave 10 GHz. The main component of microwave sensors is a receiver / transmitter module. The angle of the control field of the sensors usually is 90 degrees and more to 150, and the radius of their action applies to several tens of meters. Microwave waves do not pass through thick concrete walls and iron partitions, but can penetrate the glass and the walls of a small thickness. Therefore, moving around the outskirts of the protected zone can cause a false workshop of the Site. In this case, it is worth limiting the power of the transmitter or make an opaque fence around the perimeter of the protected zone. From this inconvenience, you can benefit, namely: to implement an alarm signal informing about the approximation of the object to the protected zone. Basically, microwave sensors are protected from industrial electrical filing and radio interference, as well as from the possibility of lighting the microwave receiver to an external microwave source.

Detectors with combined sensors (infrared and microwave) were created to increase the reliability of determining the presence of any undesirable object in the controlled zone and exclude false alarm response. Detectors with combined sensors are allowed to weaken some defects characteristic of sensors individually (the problem of changing the ambient temperature for infrared sensors and opaque partitions for microwave). The disadvantage of such detectors is a high cost, as well as limiting the observation field with a zone common to both types of devices. However, this trend leads to the fact that combined ultrasound and infrared sensors are created. The inventive adjuster can combine the parameters of various alarms to increase the reliability of the entire system.

Central item.

The central console can be called the brain and the heart of the protection system. Its main tasks:

  • processing of information obtained by sensors;
  • power sensors if necessary (wired remote);
  • monitoring the proper functioning of sensors and compounds;
  • control sound, light and remote alarms.

Structure of the central console.

The central remote must include:

  • several zones or detection levels to be able to continuously observation, in particular the periphery when people are present in the room (for example, during the day). For security reasons, it is advisable to leave protection included at night. It is also possible to benefit from the time delay relating only to the entry / exit;
  • the entrance, named "24/24 hours". It is used for round-the-clock observation of the functioning of the sensors. While the security is in waiting mode, the input allows you to check the serviceability of the sensor or alarm (there is no cliff of the connecting wires, whether siren is littered with polyurethane foam). Thanks to this entry, it is also possible to implement a system of technical alert (about fire, water leakage, refusal of the freezer, etc.);
  • the delay period that corresponds to the exit time from the protected premises of a person including the system. This option is not always useful, since the input of the system in the security mode can be carried out through the radio control panel or from the outer electronic gatekeeper;
  • exit to the external siren with the shutdown timer (maximum duration 3 min);
  • an additional output to the inner siren with a restriction by duration 10 min, the outputs of a 1RT and 2RT relay to control various types of alarm (flashing light-migal, alert system by telephone, second siren, etc.);
  • additional output for the light indicator like a flashing light or stroboscope);
  • exit for issuing a command to an external alarm transmitter;
  • built-in or external telephone dialer;
  • powerful power supply capable of feeding detectors and signaling. In particular, it should ensure the work of Siren, the power consumption of which is quite large.

Energy batteries should be sufficient for long-term operation of the system. Often, for reasons of savings, the security system is not staffed by such a battery. Do not think, choose the largest tank battery.

Private case of a wireless security system.

The term "wireless security system" refers to the family of protective devices with electromagnetic connections between components, or radio communications. Each element of the observation system is isolated and communicates with the remote control via radio signals. Such a wireless connection may exist in the absence of 220 V power supply.

Advantage of a wireless security system:

  • setpoint installation;
  • quick installation;
  • if necessary, quick disassembly.

These features caused great interest in these systems of a large number of individuals. Fast installation and dismantling are very attractive to people who take apartments and people often change the location.

Differences from traditional wired security systems are as follows:

  • lack of cable connections;
  • ease of installation and installation;
  • wireless communication between the remote control and peripherals of the alarm (sirens and light signaling means);
  • autonomous power supply of sensors from batteries, and alarm system - from electrical network or batteries;
  • the need to periodically check radio communications and control of the lack of rebooting receivers as a result of their "stunning" under the influence of external sources;
  • poor compatibility between products of various manufacturers.

Turning on the system.

Entering the security console can be performed using the built-in hardware (mechanical key or electronic keyboard) or remotely (mechanical or electronic key). At the time of startup, the console must communicate with a light or sound signal about the presence of a faulty sensor or the existence of an alarm conditions (a loosely closed door, opened window).

Remote control.

The key remote control and its installation must match the high level of security. In fact, if the deft rose will have the opportunity to control the electronic gatekeeper, it will lead to the rapid disconnection of the entire protection complex. That is why the device of the device that runs the security system must have a power protection that serves as an alarm while trying to dismantle or open the casing.

The electronic lock must be shown using one or more indicators the status of the security system. In addition, the quality of the housing and its tightness should be high, since it is exposed to moisture and aging. Wired bond systems can also have a radio-controlled key.

Temporary delay at the entrance.

At first glance, such a system seems archaic, but with competent use it is very reliable because it is protected from outdoor shutdown.

Indeed, competent operation can combine a temporary entry delay in the input code. Indeed, competent operation can combine a temporary entry delay in the input code. For example, the opening door opening sensor is combined with the time delay of the system input, and access to the key input device is possible with an open door. You can place infrared motion sensors (starting from the door) by turning them on the direct launch circuit. Since you stay outside the door, displacement sensors will not detect you.

Looking for a hand in the gap between the door frame, you can turn off the observation. And finally, if a stranger hacks the door and tries to deal with the lock, the time delay system will work in a few seconds; If he passes through the door without a key, it will immediately be registered by the motion sensor. And then, if you take care of the placement of the inner siren over the door, the uninvited guest will be stunned by the alarm.

Automatic re-enable.

Automatic re-inclusion comes into effect from the moment of the alarm. If the alarm caused the reason to be eliminated, re-initialization of the entire system is necessary to resume observation.

And vice versa, if the reason for the shutdown is not eliminated, the re-inclusion is unacceptable. Internal siren is active for ten minutes, after which the sensor or zone with which it is connected will be disabled.

Automatic protection.

Automatic protection, whether self-defense, antisabotage is designed to identify intentional damage or internal malfunctions of the security device. The sensor housings, sirens, keys are equipped with microswitters (1 RT) used in the self-test chain. In the wired device, a multicore cable is applied to the connection. In this case, the connections are duplicated and pair of wires is used for the self-test chain. If the cable is cut, the circuit will break and turn on the signal.

Alarm devices.

Signal systems of security systems are applied to:

  • attract the attention of random passers-by, which turned out to be nearby (neighbors, patrol);
  • have a psychological impact on a criminal who, frightened to determine the legs.

Panic state of outsiders is also caused by the same influence:

  • the sound signal of high power from the inner or outdoor alarm;
  • noticeable light alarm that allows you to quickly determine the place where the robbery occurs.

Signal tools (sirens, light indicators) are constantly connected to the power source of the security system. However, they have a built-in battery to maintain the power at the moment when the corresponding cables are cut. However, the siren will immediately respond if a gap will occur in the automatic control circuit or the automatic protection will work.

Sirens.

Inner Sirena

Internal sirens, the task of a bunch of a criminal, cause panic from him and not to break the desire to escape. High power and piercing sound does not allow the violator to clearly think. The sound of the sirens is simply unbearable for the human ear.

Presented requirements for internal siren:

  • internal battery, which is charged from the power source of the security console, is obliged to provide autonomy of sirens;
  • siren must work when the wires break;
  • the autonomy of the sirens should be maintained for 3 minutes at the power of the 90 dBA sound signal at a distance of one meter;
  • large siren power, sound - shrill;
  • the siren installation site is inaccessible and should provide sound freely distributed, throughout the building (it is not worth hiding siren into the cabinet);
  • the device case must be protected from autopsy

In many cases, the installation of the access control system is important, to choose the best equipment option to help our specialists will help.

  • Access controller - This is a device designed to control access through the controlled access points by analyzing readers using user identifiers (rights verification). Access controllers may make decisions themselves to provide or not provide access if the user IDs are stored in the controller's memory (in this case, local access is used). User identifiers can also be recorded only in the network controller (in the software database). In this case, the access controller performs the functions of the repeater - sends the code to the network controller and receives a decision on the provision or not to provide access (in this case, they talk about centralized access). Access controllers are controlled by blocking devices using relay contacts;
  • Identifiers - Unique signs of user auch. The identifier can be an electronic key to the Touch Memory, a non-contact proxy card, a radio keychain, a PIN code, biometric data (fingerprint, palm, a picture of a rainbow shell or retina, geometric characteristics of the face, etc.). In a scot, each identifier is assigned certain powers, in accordance with which access controllers are allowed or prohibited passage;
  • Readers - devices designed to read the code of the user identifier and transmit it to the access controller;
  • Access point- The logical object is actually a physical barrier equipped with access controller and reader. The access point can be the door, gate, turnstile, barrier, gateway, and the like. Access points can operate in two modes: with control and without controlling the direction of passage. Access points with the control of the direction of the passage can be both bidirectional (equipped two readers) and unidirectional (with one reader, without the possibility of passing in the opposite direction). Exit through access points without controlling the direction of the passage is most often carried out by the button;
  • Accessory area - logical object. Access zones are areas for which the territory of the protected enterprise is broken. At the borders of access areas, access points are always located. Access zones are configured for access points if functions are used in the system as the working time calculation and the prohibition of the repetition (antipassback rule);
  • Access level - Individual access rights that determine the rules of passage through points and presence in the access areas assigned to the user ID. Based on these rights, access controllers (or network controllers) decide on granting or not providing access;
  • Time window - The set of time intervals during which the passage is allowed. Time intervals can be installed for each point or access zone individually;
  • Software - component of the control and access control system. Using the software, configuration of the SCHA controllers is configured, including prescribing user identifiers in them, access levels and time windows. Also, the software is used to implement additional functions such as transmission events relaying to implement the re-pass ban, monitoring real-time employees and visitors of the protected object, logging (and accumulate in the system database) of the SCSD events, accounting for spent time by employees of the object Building various reports on the events of SCORD.

Standard pass mode. Each access point at the enterprise to be controlled is the access controller and reading devices. In order for the staff to have the possibility of passing through access points, each of them is issued a unique user ID, biometric information can also act as an identifier. The identifier is submitted in memory of the access controllers or the network controller, where access levels are assigned to it. If the system is controlled by software (AWP), then part of the personal data of the employee is also entered into the Arma database. During the identifier, the device or network controller decide to provide or disaster access to the employee. All the facts of passages through access points, as well as the associated events are saved in the memory of access controllers, and also indulge in the PC and are entered into the ARMA database. Subsequently, on the basis of these events, you can get a variety of reports, to calculate the time-spent time and so on.

Prohibition of repeat pass (Rule antipassback) It is used so that one identifier cannot be reused to enter any access area, without coming out of it. Access Controller Reaction The AntiPassback rule depends on the set Antipassback mode for the access level of the identifier under consideration. One of the following modes can be used:

  • Strict - the system prohibits a restart to the access area up to the exit;
  • Temporary - during the specified time, the system prohibits a restart into the access area up to the exit;
  • Soft - the system will not disable access, but the event log will record the violation of the AntiPassback rule.

The re-pass prohibition rule can be used only for doors with the direction of passage. Supported only by the "C2000-2" controller.

Access to the rule of two (or more) persons.To control access to the access area with increased security requirements, the passage mode of two (three) persons, having consistent access levels, can be used. When submitting the first identifier, the access controller switches to the standby mode of the second identifier. If the key presented after this has an inconsistent access level, the controller will prohibit the passage. If the access level is consistent, access will be provided (in the case of access to the rule of three persons, this procedure will repeat for the third key). This pass mode is an access parameter for the identifier and is configured independently for each passage direction (for each reader) in the access level. This feature is supported only by the "C2000-2" controller.

Access with confirmation. If you are supposed to enter into a protected access area of \u200b\u200bnot all persons participating in the access procedure for the rule of two (three) persons "(for example, an employee of security confirms the access of another employee), then for the access level of such persons, the passage regime" confirming "is established. Independent access to the key with such a pass mode is not possible, and when the passage of two (three) persons, the "Access" and "pass" are not formed. This feature is supported only by the "C2000-2" controller. In the devices "C2000-2", starting with version 2.0x, the possibility of organizing confirmation is also supported by an additional identifier, but also a special button.

Double identification. Each of the controller readers can operate in mode when the identification requires the presentation of two identifiers (for example, Proxy card and PIN). This mode can be enabled independently for each reader. With double identification, the access procedure begins with the provision of basic code (first identifier). If the key is identified and there are no access mode disorders, the controller switches to the standby mode of the additional code. If an additional code is presented, the identification procedure is considered successfully completed. We recommend using "Proxy-KeyAh", Proxy-KeyAV (for Em-Marine cards), Proxy-Keymh, Proxy-KeyMV (for Mifare cards) for this access mode.
The device can also be temporarily translated into the "open" or "closed" access mode.

Access under coercion.It is possible to warn the security of the object that access or taking / removal management is carried out under duress. For this, the user instead of an ordinary identifier presents the "coercion code" on the reader. In this case, an alarm message is generated, but otherwise the use of such an identifier does not differ from the usual one. There are two ways to present the "coercion code". At the first method, the user instead of one identifier is issued two. In the usual mode, the first identifier is used, and under duress the second. If a dual identification is used, you can use the second way to present the "coercion code". For this, the main code of the user, in addition to the usual additional code, adds another special "Additional coercion code". Most often, when double identification, a PIN code is used as an additional key code. Therefore, the user is enough to have a single primary identifier and remember two PIN-code - the usual and coercion code.

Closed access mode.In this case, all types of access via a managed point are prohibited. The device can be translated into this mode of a centralized command over the RS-485 interface, upon presentation of a key having a "closing" type, or when taking securely blocking SC access. The mode can be used to temporarily block access by the access security service in certain objects of the object.

Open access mode.Through the controlled point, there is a free passage without presenting identifiers. In the "Access Open" mode, the controller displays the opening effect on the corresponding relay constantly (the relay of this direction is either continuously turned on, or continuously turned off), so this access mode in the general case cannot be used for some types of locking devices, for example, such as electromagnetic latches. The instrument can be translated into this mode of a centralized command over the RS-485 interface, upon presentation of the key having the type "opening". In the devices "C2000-2", starting with version 2.0x, the possibility of a full opening of free access when using electromechanical snacks, which are opened by a short pulse and switch to the "closed" state only after opening and subsequent door closing. In this case, when you turn on the "Access Open" mode, the relay will be switched on briefly (at the same time as the access to access) with each closing the door and the lock will be open all the time. Also, the new design of the devices "C2000-2" can be translated into open access mode along an external relay signal, fixed by the SC device.

The following important parameters are configured in the "C2000-2" instrument and block "C2000-4":

  • Type of interface connected readers - Touch Memory, Wiegand, ABA Track. This parameter is responsible for transmitting the code of a read identifier to the controller.
  • A pass sensor - the parameter indicates that the passage sensor is used in the controller. The main purpose of the sensor is to generate the "pass" message when this chain is triggered after the access is provided. Availability of an event "Passage" is necessary to implement the AntiPassback function and for the correct operation of the "Accounting Time Accounting" function in ACC;
  • Door lock control - when opened the door when the door is opened at a time exceeding the "Time-Out of the Lock", an alarm message "The door is blocked" is formed;
  • Control of hacking - when you turn on this parameter when you open the door without providing access, an alarm message "The door of hacker" is formed;
  • Access area number - from 0 to 65535. The access area number, the input to which is controlled by this reader (65535 - the number of the access zone is not defined - for passing doors);
  • Turn off when opening the door - the early interruption of the "opening" relay program when you open the door (the relay is turned off after the passage of the passage sensor). This feature is advisable to include when using electromechanical locks (which makes no sense to feed meals when the door has already been opened);
  • Turn off when closing the door - the early interruption of the "opening" relay program after closing the door (the relay is turned off after the passage of the passage sensor). It is advisable to include when using the turnstile when, after turning the turnstile, you can begin a new access procedure. When using the gateway, this parameter is considered to be enabled, since when you exit the gateway to it, it is impossible to go to it again without bringing the identifier, and you can exit from the inside after clicking on the output button;
  • The access controller relay can work both on the closure and opening. The tactics of the relay is chosen depending on the valued mechanism used.

To organize one or more autonomous access points on the object in ISO "Orion", you can use a specialized access controller "C2000-2", the receiving-control device "C2000-4" with the access control functionality and the biometric access controllers "C2000-BioAccess-MA300" , "C2000-BioAccess-F22", "C2000-BioAccess-PA10", "C2000-BioAccess-SB101TC", "C2000-BioAccess-W2". Access controller "C2000-2" can be used to organize bidirectional and unidirectional access points with control and without controlling the direction of passage. For access points, organized using the "C2000-2", you can apply the Antipassback rule, use access with confirmation or by the rule of two (or more) persons. The receiving-control unit with the C2000-4 access control functionality and the biometric access controllers allow you to organize a unidirectional access point with control or without controlling the direction of passage.


Access controller "C2000-2" has the ability to work in several modes: "Two door doors", "One door to input / output", "Turnstile", "Barrbum", "Gateway". 32768 user identifiers can be stored in the controller's memory; 32768 events in the absence of communication with a network controller, 100 time windows and 100 access levels. The logic of the controller depends on the selected mode of operation. Also, the "C2000-2" has two alarm loop to which contact security detectors can be connected, controller translation signals to open access mode, identifier reading resolution signals. In the controller, you can configure the door lock function in case any security loops are protected. You can control the taking and removing the loops from the same reader and the same identifier that is controlled by the SCD. To provide access to a wide range of persons whose identifiers are difficult or impossible to get into the controller's memory (for example, there are too many), provided that the code of all these identifiers satisfies some well-known Rule in the "C2000-2" implemented access templates.

Modes of work "C2000-2"
Two door doors

In this mode, the controller controls access through two independent access points, and the provision of access in one direction (input) requires the presentation of identifiers, and the "Exit" button is pressed to provide access in the opposite direction.
For each reader, you can configure dual identification, access to the rule of two (or more) persons, access to confirmation. Both readers in this instrument operation work independently of each other. Those. When opening free access (or, on the contrary, closing access) on one reader, the second will function in standby mode until the corresponding command is submitted to it. In general, in this mode of operation for doors, the antipassback rule cannot be activated (as the doors are not in this case by access points with the direction of passage direction). However, if the output button for one of the access points is not used, the Antipassback mode can be configured.

One door to input / out

This mode is designed to manage access through one door, which has only one locking device and which is controlled by one passage sensor. The provision of access in both directions requires the presentation of user IDs. To provide access, the output buttons can also be used (for example, to open the door from the protection post).
In this mode, the Antipassback rule can be used, access to the rule of two (or more) persons, access to confirmation, double identification. In the "One door to input / output" mode, when you open a free access, the controller readers work synchronously when the command is submitted to one instrument reader, the second reader will automatically be translated into the same mode.

Turnstile

In this mode of operation, the "C2000-2" controller controls the passage through the electromechanical turnstile. Turnstiles have two control circuits for each passage direction (usually these control circuits are in the remnal control unit, which completes the turnstile). Moreover, the provision of access in each of the directions requires the presentation of user IDs on the readers installed on both sides of the turnstile. To remote access, the Operator can use the Output buttons. If you need to authorize access and register a passage to the identifier, which would be denied access in normal mode (not active window of the time, expired, the valid of the antipassback or the identifier is not included in the controller's memory) to the controller, an additional "Resolution" button can be connected to the controller. . The "Resolution" button can be used for all device operation modes, in addition to the "Gateway" mode.
In the "Turnstile" mode, antipassback rule can be used, dual identification, access to the rule of two (or more) persons, access to confirmation. Both readers in this instrument operation work independently of each other. This means that when opening free access (or, on the contrary, closing access) on one reader, the second will function in standby mode until the corresponding command is supplied to it.

Barrier

In this mode, the controller manages bidirectional access through one access point with one blocking device - barrier. The first controller relay manages the discovery (approach) of the barrier, and the second relay manages the closure (lowering). Typically, the controller relays are connected to the barrier control unit. The provision of access in both directions requires the presentation of user IDs on the readers installed on both sides of the barrier. For remote (manual) barrier control, the "Entry" and "Departure" buttons can be used. Car travel sensors, in addition to registering travel, perform the protection function from lowering the barrier on the car. So far, at least one of the travel sensors is in the worked condition, the lowering of the barrier will not. For this reason, travel sensors (usually used optical beam sensors) are placed on both sides of the barrier with the calculation so that any car that is under the barrier led to the triggering of at least one sensor. To increase the imit resistance in the controller alarm loops, the sensors of the car's presence in the reader zone can be connected. In this case, the identifiers will be perceived by the controller only if there is a car near the reader. It is possible to control traffic lights through switching devices "UK-VK / 06". To turn on / off traffic lights, the outputs of control of readers LEDs are used. UK-VK / 06 devices can switch voltages up to 220 V (AC) and currents up to 10a, which allows you to control practical any traffic lights.
In the "Barrbum" mode, the AntiPassback rule can be used, dual identification, access to the rule of two (or more) persons, access to confirmation. In the "Barrbum" mode, when opening free access, the controller readers work synchronously - when the command is submitted to one instrument reader, the second reader will automatically be translated into the same mode.

Gateway

In this mode, the controller controls access through one access point representing two doors with a closed space between them (gateway), and both doors cannot be opened at the same time. At the entrance to the gateway on each side (outside the gateway), two readers are installed. In the post of protection that controls the operation of the gateway, two output buttons are installed so that the guard can be inserted into the man's gateway without presenting the identifier, the two "confirmation" buttons to release a person from the gateway, and the "Prohibition" button to fail. For passage through the first door (input to the gateway), you need to present an identifier. The second door opens either automatically, after closing the first door, or after pressing the "Confirmation" buttons by the security button (sets the access level). If the protection post is not provided and the gateway is functioning exclusively in automatic mode, the "Confirmation" buttons still need to connect so that a person has the opportunity to go through the door through which he came, if he changed his mind or delayed inside more of the allotted time. The permissible time of the person's stay in the gateway is set by the "Time Confirmation Time" parameter. During this time, any of the "Confirmation" buttons can be pressed and the corresponding door will open. If no "Confirmation" buttons have not been pressed during this time, then the access procedure is considered unfinished, and the gateway is free. You can only release a person from the gateway after the "time confirmation time" expiration only through the door through which it went by clicking the "Confirm" button of this door. On the one hand, "time for access confirmation" must be chosen sufficient to carry out additional identification, on the other hand, if a person presented an identifier, but did not enter the gateway, then during this time a new access procedure will not begin. When you click on the "Prohibition" button, the message "Prohibition" is formed, no door opens. You can only release a person from the gateway only through the door through which it went by pressing the corresponding "Confirmation" button. If you equip a gateway to the presence sensor and connect it to the "Busy" input of the controller, it will not be a harsh time frame - additional identification can be carried out as much as it takes. Doors must be equipped with opening sensors (the "pass sensor" parameter is always included). In this mode of operation, the Antipassback rule can be used, dual identification, access to confirmation. In the "Gateway" mode, when opening free access, the controller readers work synchronously - when the command is submitted to one instrument reader, the second reader will automatically be translated into the same mode.

Organization of complex access points

When organizing complex access points, if during access via the reader of one controller "C2000-2" ver.2.0x, it is necessary to block access through the readers of other such controllers, their work can be synchronized using the "Busy" signal. In this case, upon presentation of the identifier, the device analyzes the input "Busy" and provides access only if the input is not active. From this point on, the controller activates its exit "BUSY" to register the passage to block the readers of other controllers at this time. The contact "Busy" is both input and output of the device. To synchronize a few "C2000-2", it is enough to connect their contacts "Busy" with each other (as well as contacts "GND" if controllers are powered by different power sources). In addition, it is necessary to enable the "Take Busy" and "BUSY" in the reader so that access via this reader is blocked when accessing other controller readers, and vice versa, other controllers readers are blocked when accessing through this reader. At the same time, the "BUSY" signal can be used to connect the presence sensor if the following access procedure can be started only after the access point is released.

Such a scheme can be used, for example, in the equipment entry to two-level parking. One device controls the barrier from the street, and the other two controls the barriers at the entrance to the first and second level. Presence sensors control the presence of a car on a ramp. To block the simultaneous entry of the car on the ramp from different levels, it is necessary for one of the readers of each controller (the one that allows the entrance to the ramp) to set the parameters to "issue a busy" and "Take Busy". For those readers that control the departure from the ramp, these parameters must be turned off.


The "C2000-4" block can control access through one access point, and the access to the access in one direction requires the presentation of user IDs, and the "Exit" button is pressed in the opposite direction. When using the access control functional in the block to connect the output button and the passage sensor, the first loop is used, and the first relay is allocated to control the locking device. "C2000-4" has a functionality of blocking access if any (or all) is on the guard from the block signaling loop. You can control the taking and removing the loops from the same reader and the same identifier that is controlled by the SCD. Since using the unit, you can only organize a unidirectional access point without controlling the direction of passage, the AntiPassback rule cannot be configured for it. The unit supports the dual user identification mode.
The unit supports up to 4096 user identifiers, and the block event buffer is designed for 4088 events. Up to 16 times of time can be stored in memory.


When used as low-cost proximity cards (EM-Marine Standard) or Touch Memory Keys, the security service or operation of the object can face cloning (copying) user identifiers. The use of specialized readers with the "proxy-5msg" function, Proxy-5MSB and MIFARE cards (Mifarer Classic 1K (S50), Mifarer Classic 4K (S70), Mifarer Classic 4K (S70), Mifarer Classic 4K (S70), Mifarer Plus S 2K, Mifarer Plus s 4k, Mifarer Plus SE 1K, Mifarer Plus x 2k, Mifarer Plus x 4k).
In the first embodiment, when identifying a user will be used by the factory unique card number, but the reader will transmit it only in case of successful authorization. Authorization is carried out on a secret word recorded in the protected area of \u200b\u200bthe card memory that checks the reader.
In the second version, not a factory card code will be used as an identifier, and the code stored in its protected area of \u200b\u200bmemory will be used. This code is recorded on the card directly on the object.
The third option is similar to the second. The difference is that the map code stored in the protected area of \u200b\u200bmemory is additionally encrypted. This option is recommended to apply with less secure MIFARer Classic.
Selecting the "Proxy-5MSG" reader operation mode, "Proxy-5MSB" and setting up working parameters with protected sectors is carried out using a master card. To create master maps and custom cards, the "proxy-5ms-USB" reader and free by "SecurityCoder" are used.
Readers have a Dallas Touch Memory output interface and are compatible with all ISO Orion devices.


Just like the "C2000-4" block, the controllers "C2000-BioAccess-MA300", "C2000-BioAccess-F22", "C2000-BioAccess-SB101TC", "C2000-BioAccess-W2" can control access through one access point, Moreover, the provision of access in one direction requires the presentation of user IDs, and the "Exit" button is pressed to provide access in the opposite direction.
As the main user IDs when working with "C2000-BioAccess-Ma300", "C2000-BioAccess-F22", "C2000-BioAccess-W2", fingers typical are used. "C2000-BioAccess-PA10" Along with the fingerprint reader, the palm reader is equipped with a palm reader, and the "C2000-BioAccess-PA10" cameras for identifying on geometric person saving. Also, all controllers are equipped with an integrated proximity card reader and, with the exception of the "C2000-BioAccess-MA300", keyboard for entering a password to provide access to a combination of any identifiers (biometrics, proximity-card, password).
Controllers are connected to the Ethernet network system (TCP / IP). Since using instruments, you can only organize a unidirectional access point, set up the AntipassBack rule for it is impossible.

Attention!The "C2000-BioAccess-W2" uses a new biometric data storage algorithm that is incompatible with other controllers. It makes sense to apply only in new systems that are not planned to complement the controllers of other modifications.


On the basis of the readers of the contactless keyboard "Proxy-Key" of various modifications, you can implement the maximum budget decision to manage access through one point. Moreover, the provision of access in one direction requires the presentation of user IDs, and the "Exit" button is pressed to provide access in the opposite direction. Proximity cards or passwords are used as user identifiers. Products are not connected to the system interfaces and operate only offline.
Readers support up to 1000 key codes or 8 passwords.


Combining multiple access controllers RS-485 interface line into a single system can give a scot the following advantages and new features.

Network and zonal antipassback

In the presence of a network controller (C2000 panel / "C2000m" or ARMA), passages through access points will be automatically retransmitted by all access controllers. Thus, the AntiPassback rule will be triggered for all access points that encompass the identifier in the access area under consideration. The described system mode is called "Network AntiPassback".
The AntiPassback rule can be made more stringent if you install the "Zonal AntiPassback" parameter in the access level ("Route Control"). In this case, the passages to any access zone are taken into account, and if an attempt is made to pass through one of the access controller readers, it is required to fulfill the Antipassback rule that the latter registered passage is in that zone where this reader is located. That is, it is possible to pass from the zone in the zone only in order - 0, 1, 2 and in the reverse order.

Integration with OPS systems

To unlock the evacuation paths during the fire, the "C2000-2" device and the C2000-4 unit can be translated into open access mode by centralized commands over the RS-485 interface coming from the C2000M or ARMA removes, controlling the fire alarm. The CCD readers can be used to remote centrally taking / removing the stumes of the alarm of other devices. In this case, the same identifier and reader can be used both for local access control and for centralized control of the OPS system.
The indication blocks "C2000-bi" and "C2000-BKA" allow you to display the state of access points and readers controlled by "C2000-2" and "C2000-4": "coercion", "The door of hacker", "The door is blocked", "Door Open "," Door is closed "," Access is open "," Access is closed "," access is normal ".
The C2000M console can control the exits of BOD and relay blocks related to the OPS, on the fact of hacking, blocking, opening and closing doors, as well as opening free access and its lock.

Centralized configuration. Event collection and processing

Often even on small objects with multiple access points there is a need to add new or editing the powers of existing identifiers simultaneously in many access controllers. Most convenient to perform these manipulations are centrally, when only once is required to perform the procedure for adding / editing, and then record new data into all the instruments. In addition, the functionality of building reports on the Events of the SCORD, the calculation of spent time is in demand. For these purposes, software is applied (ARMS).


In ISO "Orion" software is used to work: UPROG, BAPROG, ARM "Orion Pro". UPROG software allows you to set up the configuration parameters of C2000-2 access controllers and block "C2000-4", namely:

  • mode of operation, dual identification, access to the rule of two (three) persons, the number of the controlled access area, the type of the interface of the connected readers, turn on / off the use of the passage sensor, lock control, lock timeout, etc.;
  • record and edit in memory controllers of access levels, time windows and user identifiers.

Baprog software allows you to set up similar configuration parameters of biometric access controllers "C2000-BioAccess-MA300", "C2000-BioAccess-F22", "C2000-BioAccess-PA10", "C2000-BioAccess-SB101TC", "C2000-BioAccess- W2.
When using UPROG and BAPROG, there is no possibility to configure several devices simultaneously. Thus, these programs are applied only with primary setup of devices. When subsequent operation, the UPROG and BAPROG system is advisable to use only for small systems (no more than 5 devices).

Software ARM "Orion Pro" allows you to implement the following:

  • accumulation of the SCCOR events in the database (passages through access points; blocking and unlocking access points; unauthorized attempts of the passage, etc.);
  • creating a database for a protected object - Adding logical objects to it (points and access areas) into it. As well as their placement on the graphics plans of the premises to implement the possibility of a centralized provision of access and monitoring the state of these facilities;
  • formation of the user database - the enhancing of the details of employees and visitors, indicating for each person all the necessary attributes (FULL NAME, information about the company, division, working, and home address and telephone, etc.), as well as the task of access rights (pass powers through access points, staying in the access area). On the "scanner" allows you to automate the enhancing personal data of employees and visitors in the database by recognizing documents (passports, driver's license, etc.);
  • generating a database for working time accounting - creating work schedules, as well as rules for calculating for various employees;
  • survey and control of PC connected to controllers, as well as integration with keystore storage systems, minor items and electronic safes (by "electronic safe");
  • group configuration of access controllers - centralized recording to the memory of the time windows, access levels, user identifiers;
  • network AntiPassback work;
  • setting and working zone antipassback;
  • mapping on graphic plans of the premises of the state of the SCHAB objects;
  • displaying information about the place of finding an employee with an accuracy of the access zone;
  • mapping chamber of security television, as well as the management of the state of these cameras;
  • recording video on the command of the duty officer, when alert the motion detector or on the management scenario (for example, on an event providing access or an attempt to implement an unauthorized passage);
  • due to the integration in the ORION Pro video system, car numbers recognition module, it is possible to use a video surveillance system not only for photo and video cameraformation, but also as an additional identification tool in a SCS: provision of access through the barriers on the fact of the successful recognition of the car number (Orion Auto System ").

It is worth noting that physically devices are connected to the system of the system on which the "Operational Orion Pro problem" is installed. When organizing distributed systems, remote objects can be connected to a single "operational task" on the local network using the "C2000-Ethernet" converters. It is also possible to install "operational tasks" directly on remote objects. The second option will require large material costs, however, it will be more preferable if it is required to organize photo experiment on remote objects (this function will be available even in the event of a communication channel accident between objects).
One operational task is recommended to connect no more than 500 devices "C2000-2".
To enhance user IDs in the BD "Orion Pro" bd, you can use USB readers: "Proxy-USB-MA" (for Em-Marin, HID and MIFare cards), "proxy-5ms-USB" (for the implementation of the "Anticlon" function ) And "C2000-BioAccess-ZK9500" (for fingerprints of all biometric controllers, with the exception of "C2000-BioAccess-W2").
Software modules can be installed on computers arbitrarily - each module on a separate computer, a combination of any modules on a computer, or setting all modules to one computer. On the structural scheme of ISO "Orion" shows the number of jobs that can be involved in the system.



The C2000-2 controller, intended for the control and access control system in ISO Orion, is powered by a low-voltage power supply (IE) voltage from 10.2 to 15 V, the biometric controllers "C2000-BioAccess-MA300", "C2000- BioAccess-F22 "," C2000-BioAccess-PA10 "," C2000-BioAccess-SB101TC "," C2000-BioAccess-W2 "from IE voltage from 9.6 to 14.4 V, and block" C2000-4 "supporting The functions of the SUCH, has a supply voltage range from 10.2 to 28.4 V, which allows you to apply sources with a nominal output voltage 12 V or 24 V (Fig. 36-40). A special place in the SKUD can occupy a personal computer with armor operator or administrator. It, as a rule, feeds on the AC network and its power supply is provided by the sources of the UPS type.
To ensure continuous execution of the skid tasks, it is advisable to implement the redundant power system by means of built into the rip, or external low-voltage batteries. The current regulatory document - GOST R 51241-2008 "Means and Access Control and Access Control Systems" recommends that the battery discharge indication is indicated below the permissible limit. At the same time, for autonomous SCS systems, the discharge indication may be light or sound, and for network systems, the battery discharge signal can be transmitted to the operator's console. Distributed accommodation of equipment by a large object, which is easily implemented in ISO "Orion" by applying the RS-485 interface communication lines, requires nutritional ducts (controllers, electromagnetic locks and electrical latches) in places of their installation. Depending on the size of the object, it may be necessary from one IE to several tens. There is a broad nomenclature of the power supplies recommended for skid.
In small systems, you can apply Rip-12 copy.11 (Rip-12-1 / 7P2) (output current 1 A, the light indication of the presence, charge and discharge of the battery). For systems with a significant consumption current are used:

  • Rip-12 Used.02, Rip-12Asp.04 with output 2a.
  • Rip-12 isp. 01 with output 3a.

For network systems, with transferring power status messages to the operator console, you can use any rip for fire automation, having relay outputs, or rip with RS-485 interface.

For the "C2000-2" device and the "C2000-4" block, the following recommendations should be taken into account. The electromagnetic lock (latch) can be powered by the same power source as the controller, or from a separate power source. When powered from one source of the power supply circuit, the controller and power supply of the lock must be performed by various pairs of wires that are combined only on the power supply terminals. If the readers have a consumption current of more than 100 mA or they are removed from the controller for a long distance (100 m or more), then to power the reader, it is necessary to use a separate pair of wires directly to the power supply. If the reader is powered by a separate power source, then the "GND" contact (minus reader power circuit) must be connected to the "GND" pin (for "C2000-2") or "0V" (for C2000-4) instrument.
For separately standing controllers, it is convenient to use Rip-12 Cupq.20. At the nominal output current of the source equal to 1 A, the rip is able to give a long time to load and up to 1.5 A. A feature of the design of this rip is the presence of "two tiers": the power supply module is fixed to the rear of the case, and over it due to availability Special P-shaped corners - placed and fixed with screws The selected device (for example, "C2000-2" or "C2000-4"), the functionality of which is not limited to (see Fig.).

In the bottom of the case, the battery is installed 12 V, with a capacity of 7 a * h. Access within the access controller will save on the installation work and further maintenance.
In network scot, it may also be necessary for reliable power supply of communicators, modems, splitters. For these purposes, it is possible to effectively apply Rip-24 Used.06, MP Converter Modules Us.02 and Protection Block Switching BZK. The possibility of installing in Rip-24 Used 90 batteries with a capacity of 2x40 Ah allows you to repeatedly increase the system operation time in the absence of a power voltage compared to other power units. MP module Us.02 converts voltage 24 V to the required level: 3.3; five; 7.5; nine; 12 V. BZK protects each tire of the power supply separately, i.e. Faults in one of the devices will not affect the performance of the rest of the equipment.

In some areas of activity, such as trade, it is sometimes useful to know the statistics of customer visits for a certain amount of time. This article will describe in detail one of the solutions of this task.

Passage sensor is a device consisting of two parts - receiver and radiation source. The account and data record is carried out using Arduino Nano. The receiver uses a photoresistor module based on the LM393 microcircuit. Data will be transmitted by analog module output. The photoresistor should be in a special darkened case to eliminate the possibility of the response of the meter from foreign light sources. The radiation source is the simplest laser diode. This device used a laser from a simple laser pointer. The presence of a laser gives an advantage in the distance and stability compared to infrared LEDs. Also in this device there is an indicator - 7 - segment 4 - discharge indicator running the TM1637 driver. For reset, 2 buttons are used without fixing. Reset occurs only after entering the password. During the development process, the microcontroller's non-volatile memory will be involved in order for the data to be not lost in a random or intentional power outage.

The reset button and password entry button are connected through 10 com resistor. Arduino, the photoresistor module and the indicator are powered by 5 volt line, you can use the + 5V output from Arduino. Arduino itself can be powered by an external power supply (7-12 volts) using PIN VIN, USB or PIN + 5V.

Program

The principle of operation of the program is simple. The laser is constantly shining on the photoresistor. The program each time gets the value from the photoresistor 0-1023. During the radiation of the laser, the reading from the photoresistor does not exceed 50, when a certain object overlaps the laser beam, then its reading exceeds the threshold value in 50. When the value exceeds the threshold in 50, the program will wait 500 miles seconds (sufficient for the person to pass) then responds again And if the value again less than 50 means a person passed otherwise it will wait for a person will not pass if he suddenly stood on the spot. Closing the button for 3 seconds to start reset the program will switch to the password reset mode on the indicator will be displayed from the button entering the digital value (repeated pressing increases the value of the code by +1). Without difficult work, you can enter a 2-digit reset password. The program uses non-volatile EEPROM memory to which the meter value is recorded. Before starting work, the program refers to memory removes and displays the last stored value of the counter (the largest). To increase the resource of this device limited in the recording cycles, use with maximum efficiency. To do this, each next value obtained from the meter is written to subsequent memory cells, i.e. All memory cells are used in order. When reset is cleared, the counter value is not only in RAM but also in EEPROM.

The device is placed inside two buildings with dimensions of 45x65x20mm. In finished purchased cases, slits were made for buttons and indicator, as well as USB

Inside the second case, a power driver with stabilizers 5 and 3.3 volts was integrated where the laser diode was integrated. This driver feeds ARDUINO by USB using an external power supply 12 V

Photo of the finished device and testing

I hope this device will be useful to you, I wish good luck in the further assembly, thanks.

List of radio elements

Designation A type Nominal number NoteScoreMy notebook
Arduino board

Arduino Nano 3.0

1 In notebook
Resistor

10 com

2 In notebook
button 2 In notebook
indicator on Driver TM16377 segment 4 discharge1 In notebook
laser module 1