What’s the acceptance standard for an access control projects?

After your system integrator finishing your access control project, do you know how to check your access control project work well and What’s the acceptance standard for an access control projects?


This article is written to Party A(Access control project customer), especially someone is not very well versed in the access control system. Of course, this article can also give an important reference to the construction personnel.

1, Check the equipment quantity.
According to the types of equipment list acceptance quantity, the main acceptance: the number and type of access controller, the number of the card reader, the number of electric locks. Spot check part of the model, see whether the goods are not the right board.

2, If it is 485 controller, the main acceptance is checking communication wiring specification.
This is very important if the wiring is not standard, even now the communication is normal, does not guarantee you to pay off the end. There are a lot of problems with this and that. 485 communication specification has the all or part of the paragraphs with parallel lines (ordinary wires) are not allowed, not because the distance is short. You can use parallel lines. After using must exist after the communication will not be on the source of interference hidden trouble. With the network should also pay attention to, do not be clever will be two and one to communicate. Instead of improving the quality of communication, the thickened lines have the effect of parallel lines so a pair of twists can be used for the network lines.

B, Communication lines cannot be forked or parallel in any place, they must be strung hand in hand from one to the other. Do not think that two lines can be connected in parallel because of the short distance. This will bury the hidden trouble of communication interference.

C, Firmly prohibit the use of passive 485 converters. Passive 485 converters, the cost is only 1.5$, there is no anti-jamming, lightning protection, and other design. Desktop testing can also be used. It is strongly prohibited to use in the practical application engineering of access control because the access control system pursues the stability for a long time. Otherwise, it will pay a heavy maintenance cost because of the unstable communication. It is recommended that the active converter is used. It is better to have a designated or well-known brand.
If the TCP controller wants to implement the RJ45 crystal head specification, do not shake the loose end.

3, If it is the mode of the controller connect to the power lock directly.(instead of the controller connecting the PUSH and the GND of the external access power supply, and then through the way of the external access power supply to connect the lock).
Power lines with a 1.0 square millimeter sectional area must be used within 50 meters, or two strands must be thickened if they exceed 50 meters. If a door has two locks, it should be routed separately. Collinear is equivalent to reducing the thickness of the line. Many people to save trouble, directly connected to the power lock network, is quite wrong, not even a short distance.

4. The connector of a card reader and card reader line must be welded and wrapped with insulating tape (heat shrink tube is better than heat shrink pipe).
It must not be twisted together by hand because it is easy to loosen after holding it in hand. Easy oxidation makes contact bad, card information cannot be transmitted to the controller, cannot open the door trouble. Do not use cheap poor quality tape, the poor quality tape is easy to lose, it is recommended to use heat shrink pipe insulation.

5, The line must go through the pipe.
At least take the PVC tube. Because the wire is new without the pipe, the mouse likes the smell and bites easily, especially when some lines are capped and it is very difficult to rewire.

6, ALL the line should go as far as the possible dark line, do not affect the beauty. Really can not go dark line place must inform Party A in advance.

7, whether the power load is sufficient.
The load of the power supply mainly depends on the power lock. Conventional card reader and controller with very small power consumption. 5A linear power supply can only take up to 4 conventional electric locks. 4 card readers. 1 controller. 5A switch power supply can only take up to 8 conventional electrical locks. 8 card readers 1 controller. Power load is not enough. Even if there is no problem now, there will be problems in use, such as the equipment due to lack of electricity and so on. It is best to choose the standard source of power and under the guidance of the manufacturer. Determine the load size (how many locks can be brought to you). If an outsourced switching power supply is purchased, it is also recommended that you choose under the guidance of the manufacturer Buy, preferably a well-known brand of switching power supply. (many miscellaneous switching power supply will be a virtual elevation of their own power and load capacity.)

8. If external access is not commonly used the equipment.
For example automatic door electric gate 500 kg high power magnetic lock electric bell fingerprint iris palm type instrument and other biometric equipment such as high-power long-distance card reader and other equipment. It is necessary to make sure whether the contractor is under the guidance of the manufacturer's theory.

Pay attention to the above points, not most of them are qualified, but each must be qualified.

Whether the appearance of the card reader is broken, the function of the access control software and the operation of the card reader must be regular things such as tightening of the wiring terminals inside the controller in order to tighten the wiring terminals in the controller, and it is relatively simple and not very important , and I will not speak in detail here .


For more information about access control system, please visit my "ShineACS Access Control Security" main website--It is a FREE website that you can download access control system knowledge and find right suitable access control products and solutions for your access control project.

Comments

Popular posts from this blog

Door Access Control Entry Devices--How will you get in?

How To Build Your Door Access Control System

What'S Access Controller?