motion Options

Set your layout

Now using the default layout.

Test Vertical Rhythm?

You are here: Home Security Access Control
24 November 2017

Access Control

An IP Access Controller is an electronic security device designed to identify users as well as control entry to or exit from protected areas. A typical IP access controller supports two or four basic access control readers. It may have an internal web server and support configuration via a browser or via software installed on a host PC.

The main features that distinguish IP controllers from older generation serial controllers are (i) that IP controllers connect directly to LAN/WAN and have all the inputs and outputs necessary for controlling readers, monitoring door inputs and controlling locks; and (ii) that IP controllers have an on-board network interface and do no require the use of a terminal server.

Advantages of IP Access Controllers

  • An existing network infrastructure is fully utilized; there is no need to install new communication lines.
  • There are no limitations regarding the number of IP controllers in a system (the limit of 32 controllers per line is typical for systems using an RS-485 communication interface).
  • Special knowledge of installation, termination, grounding and troubleshooting of RS-485 communication lines is not required.
  • Communication with IP controllers may be done at the full network speed, which is important when transferring a lot of data (databases with thousands of users, possibly including biometric records).
  • In case of an alarm, IP controllers may initiate connection to the host PC. This ability is important in large systems as it allows reduced network traffic generated by frequent polling.
  • Simplifies installation of systems consisting of multiple locations separated by large distances; a basic Internet link is sufficient to establish connections to remote locations.
  • A wide selection of standard network equipment is available to provide connectivity in different situations (fibre, wireless, VPN, dual path, PoE).
  • No special hardware is required for building fail-over systems; in case the primary host PC fails, the secondary host PC may start polling IP controllers.
More in this category: « CCTV Intrusion Detection »