Wiring and safety specifications of the access control system

Updated on technology 2024-03-08
7 answers
  1. Anonymous users2024-02-06

    That's all I have to say.

  2. Anonymous users2024-02-05

    1. Wheel light switch button connection. One end of the two switch buttons is connected to the ground port of the JP1 interface, the switch button 1 is connected to the OP1 port of the JP1 interface, and the switch button 2 is connected to the OP2 port of the JP1 interface.

    2. Power wiring. The 6 ports of a power box, the 2 ports NC of the 2 ports are connected with the positive and negative poles of the electric lock 1 respectively, the 4 ports +12V are connected with the positive terminal of the power supply + V port in the JP1 interface, and the power ports 5 GND and 6 Push are connected with the relay output ports LS1 and LS1 of the JP1 interface respectively'Connect. The other power box 4 port deprecation ports are with JP1 interface relay output ports LS2, LS2 respectively'Connect.

    3. Electric lock connection. Two electric lock positive and negative poles are connected with the ports of two power supplies respectively, and the electric lock magnetic port is connected to the JP1 interface GND port, and the electric lock door port is connected with the JP1 interface door magnetic port MC1, MC2 respectively.

    4. Connect the card reader. The wiring of the two card readers is the same, which is connected to the +V, GND, Data0, and Data1 ports in the JP2 and JP3 interfaces, including two power cables and two W26 data cables.

    5. Communicator connection. The GND+ port of the communicator is connected with the ground port GND, RS485 communication negative mulet, and RS485 communication positive interface in the JP4 interface.

    6. Doorbell wiring. The doorbell is mainly connected to the BPA and BPB ports of the JP5 interface.

    7. This completes the wiring.

  3. Anonymous users2024-02-04

    1. Install a card reader at the entrance, install a door button at the door, and install the electromagnetic lock on the upper edge of the door and door frame.

    2. The controller is installed on site or installed in the weak current well, which is convenient for the future maintenance of the system and the safety of the system.

    3. It can also be installed above the card reader, near the electromagnetic lock.

    4. The control host and keyboard are installed on the façade wall or workbench.

    5. The alarm device is placed in a place with good alarm effect, and the power supply to the system is required to be good.

    6. UPS power supply is used to centralize the power supply to the access control system.

    7. After installation, the access control card reader is connected to the host for detection, and after confirming that it is correct, all are connected and authorized.

  4. Anonymous users2024-02-03

    The use of different access control systems has different requirements for wiring, and the author takes a metal fingerprint machine as an example. Let's take a look at the basic wiring diagram of access control wiring.

    1 External card reader.

    The wiring is shown in Figure 1, this machine is equipped with a built-in EM card reader, and it can also be connected to an external Wigan 26 card reader such as EM, IC, HID, etc., and the use method is the same as the built-in card reader. When adding a card, the EM card can be operated either locally or on an external card reader, and other types of cards must be read on the corresponding external card reader.

    Figure 1: Wiring diagram of an external card reader.

    2. Single-door dual-machine interconnection.

    When a single door and two machines are interconnected, it has the following characteristics compared with a single door and a single machine:

    Card users can be added to any machine, and the total number of users can be expanded from 2,160 to 4,160, and all users can use cards or fingerprints to enter and exit the door. Note that this connection method requires the fingerprints of both machines to be the same, so that the door can be opened in both directions.

    The settings of the two controllers must be exactly the same, and when the administrator password settings are different, the machine outside the door cannot use its own saved user data to open the door.

    The machine can also be used as a stand-alone card reader for use with any controller with the Vegan 26 protocol.

  5. Anonymous users2024-02-02

    The positive termination of the electric lock is connected to the NO or NC end of the access control power supply (depending on the normally open lock and normally closed lock); Usually connected to the NC terminal (power on unlocking, power off lock). The negative termination of the electronically controlled lock is connected to the GND end of the access control power supply.

    The push end (door opening signal) on the access control host is connected to the push end of the access control power supply. (The door opening signal on the access control host is NO, NC, usually connected to the NO end to the push end of the access control power supply).

    If the other end is connected to the door button, the 2 wires of the door button are connected to the door button end and the GND end of the access control host;

  6. Anonymous users2024-02-01

    To put it simply: the access controller needs an 8-core network cable and a 220V power cord to communicate with the computer, and 6* shielded wires are needed from the access controller to the card reader, 2* to the door lock, 2* to the door magnet, and 2* to the door opening button

  7. Anonymous users2024-01-31

    Access control is divided into 485 and network communication.

    The access control controller is controlled at 80m from the access control reader, because it is the Wiegand 26 signal access controller to the lock and door opening button, which is controlled within 100 meters as much as possible, and the general controller is placed in the weak current room.

Related questions
3 answers2024-03-08

ECOS access control reminds you that it can be used in communities, enterprises, schools, buildings, banks and other places!

14 answers2024-03-08

Hello, such a problem should find a product supplier or engineering company, to provide you with software and hardware manuals, different manufacturers of its operation methods are different!! You can check the employee's card number and other information, and if it has indeed been authorized, then see if other employees have the same problem! Otherwise, there is a problem with the controller and it has to be repaired. >>>More

2 answers2024-03-08

Many people don't know what the integrated wiring system is, so let's introduce it below. >>>More

7 answers2024-03-08

How is Chinese culture classified? Let's take a closer look:Four-library mode >>>More

11 answers2024-03-08

The Nokia N9's system is pretty smooth to use, which is not bad, but compared to Android, Android is still better. >>>More