The access control system is a safe security system that is used more often in modern commercial buildings, communities, schools, and businesses. The access control system is to first wash a modern safety management system and integrate the automatic identification technology of the microcomputer and the modern safety management measures. The access control system is used in our daily life and work, but how much do you know about the installation of the access control system? The following Xiao Bian will share with you the contents of the installation and troubleshooting of the access control system.



Access Control System Installation 1: Equipment Installation

1. Front-end device A. Install a card reader at the door. Do not approach or touch high-frequency or strong magnetic fields (such as heavy-duty motors, monitors, etc.) in the reader's sensing range, and the control box must be grounded.

B. Install the exit button at the exit.

C. The electromagnetic lock is installed on the top edge of the door and door frame.

D. To ensure safety and aesthetics, the controller and power box can be installed on-site or installed in weak electric wells. The advantage of installing the controller in the field is to save the use of wire rods. The controller is installed in the weak electric well to facilitate the system's future maintenance and system safety. The controller box can also be installed above the card reader near the electromagnetic lock. The specific situation can be selected according to the customer's installation.




2. The central control room equipment A, control panel and keyboard are installed on the facade wall or placed on the workbench.

B. The alarm device is placed in a place where the alarm effect is better.

C. Due to the special nature of the access control system, it is required to provide good power supply to the system. It is recommended to use UPS power to centrally supply power to the access control system.

Access control system installation II: equipment debugging 1, the system is installed, the first access control reader signal access to the host, and then individually detect the access control card reader, whether there is no report, false positives occur. After this way, there is no problem and then it is connected to another way. In this way, each path is detected separately and all lines are connected after confirmation.



2. The management personnel can authorize according to the authority of the user. For example, some personnel can enter or leave an arbitrary place at any time. The ordinary person can only enter and leave the authorization scope within the authorized time. When all access points are normally turned on and turned on illegally, check whether the control center computer has a record.

3, try center computer can not be connected to the controller due to fault or other reasons, the controller can independently record the relevant information of the control point, when the central computer is connected, all the information can be automatically uploaded, whether it can ensure the integrity of the information record Sex.

4, make a good debugging record.

5. Finally fill in the completion report.

Access Control System Installation III: Installation of the pipeline 1. The wiring of the installation project shall comply with the national regulations; the specifications for the construction and acceptance of electrical installations; and the relevant regulations and regulations issued by the state. The threading in the pipe or in the trunk shall be carried out after the construction plastering and ground works are completed. Prior to threading, the water and debris in the tube or in the conduit should be removed. Lines of different systems, different voltage levels, and different current categories should not be worn in the same tube or in the same slot in the wire duct. There should be no joints or kinks in the pipe or in the raceway. Wire connectors should be soldered in the terminal box or connected by terminals. Small-section system connections can be hinged, the number of twisted turns should be more than five feet, then tinned and taped with insulating tape. Pipes passing through the deformation joints of buildings (including settlement joints, expansion joints, seismic joints, etc.) shall be provided with compensation measures. The two sides of the conductors crossing the deformation joints shall be fixed with appropriate allowances. Terminals in the terminal box should be crimped or soldered with terminal strips. The terminals should have a suitable marking.

2. The access controller should be firmly installed, not tilted, and should have obvious signs. Installed on a lightweight partition wall, reinforcement measures should be taken. The cables or wires of access controllers shall be introduced. The wiring shall be neat and avoid crossover. The parts that should be fixed and fixed to the core wire and the conductors shall be marked with numbers, and shall not fade with the drawings; the terminal board and each terminal shall be connected. Must not exceed two; cable cores and conductors should be left with not less than 20cm margin; the conductors should be bundled into bundles; after the lead-in conductors are threaded, they should be plugged at the inlet conduits.

3. The main power lead-in of the access controller should be directly connected with the power supply. It is forbidden to use the power plug. The main power supply should have obvious signs; the grounding of the access controller is solid and has obvious signs.

4. The route and specifications of the monitoring indoor grounding bus shall meet the design requirements. The following regulations shall be complied with during construction: The surface of the grounding busbar shall be complete, with no obvious damage and residual flux slag. The copper strip busbars shall be light and smooth with no burrs. The insulation layer shall not have the phenomenon of aging cracking; the grounding bus shall be laid on the ground trough or cable The center of the aisle is fixed on the outside of the trough, and the busbars should be flat and must not be skewed or bent. The connection between the busbar and the rack or roof should be firm; the copper strip bus on the cable walkway can be fixed with screws; the copper strand busbar on the cable walkway should be tied to the crosspiece; the system's engineering lightning protection grounding installation should be Strictly follow the design requirements. Grounding installation should be carried out simultaneously with civil construction.

Four kinds of exclusion methods of access control system failure 1. Software testing method 1. Detection method: Start the management software, enter the general console to select the door, click on the detection controller, and the software operation information will prompt relevant failures, then it can be processed according to relevant information.

2, real-time monitoring method: the total console - real-time monitoring, real-time monitoring corresponding to the corresponding credit card indicator to facilitate the detection of credit card does not open the door fault.

3, search. Net method: basic settings - controller - search. Net, help find the communication failure of the TCP / IP controller Corresponding communication indicator helps to find communication failures. Please turn off the firewall!


Four ways to eliminate the access control system failure Second, the hardware indicator method 1, power, we can see the power indicator POWER, CPU indicator flashes to determine whether the controller is in working condition.

2. When swiping the card, we can look at the card light to determine whether there is card reader data transmitted to the controller.

3, press the button to go out, we can see the relay indicator, whether it sounds, determine the controller relay output is normal.

4. When looking at the TX and RX lights during the communication operation, the TCP controller Rx (Link) light indicates that the wiring is generally OK. A flashing Tx light indicates that the communication is in progress.

5. The err flashing indicates that the controller is faulty. Obtain detailed information in the software test.

6, video controller can also see the power indicator, ping when Rj45 port indicator flashes alternately.

7,485 active converter with or without flicker can determine whether the computer sends data.

Four kinds of exclusion methods for access control system failure III. Replacement exclusion method 1. Equipment replacement method: This can only be referenced and cannot be completely determined, because if it is caused by an environment or a factor, it may not be immediately expressed, just like human beings. Chronic disease has an incubation period. Over time, the same problem can be caused. If the equipment in question is changed, there is no problem with separate detection. This may be a problem of environmental interference such as wiring, and we should actively look for the source of the problem.

2, computer replacement method: can determine whether it is the customer's computer or operating system environment, virus problems, serial output or settings are wrong.

3, database, software replacement method: such as the extraction of records or upload settings failed, the report fails, etc., you can use another new database or software to determine the scope of the problem.

Four kinds of exclusion methods for access control system faults 4. Separation elimination method 1. With the access controller as the core, many controlled devices can be connected externally, and the quality parameters of the external devices are all uneven, and compatibility may cause interference, leading to The phenomenon is also strange, such as controller reboot, ERR light flashes, abnormal opening and closing of the door, you can separate the external device to see if it is normal, and then load each external device one by one, and load a test to see what is loading caused This fault, such as tripod gates, barrier gates, electric bells, elevators, automatic doors, and various alarm devices externally connected to the expansion board, may be the source of interference, and the solution is to install weak isolators.

2,485 communication, a system has 8 controllers, you can consider the first to disconnect the next 4 units, and then disconnect the remaining 4 units to narrow the search, or disconnect from the first second station, One by one, link the back link to the communication line and see which one is added.

3, TCP controller uses the conventional method in the customer's network can not be normal network, can be independent from the customer network with independent switch test OK, seek the support of Party A network management to see if other network authentication restrictions are enabled.

Film Packaging Machine

shrink wrap machine packing machine is suitable for wrapping pop-cans, bottles etc.It works with PE shrink tunnels. If you want to know more about the products in Film Packaging Machine, please click the product details to view parameters, models, pictures, prices and other information about Shrink Wrap Machine,Shrink Packing Machine,Film Packaging Machine,Plastic Wrapping Machine.

Shrink Wrap Machine,Shrink Packing Machine,Film Packaging Machine,Plastic Wrapping Machine

WENZHOU WINIBER MACHINERY EQUIPMENT CO., LTD. , https://www.winiber-machinery.com