Comprehensive integration case of Chongqing rail transit subway access control system

SaveSavedRemoved 0
Deal Score0
Deal Score0

[ad_1]

In recent years, there has been a boom in the construction of subways in large cities in my country. At the same time, the subway access control system has also been rapidly developed and continuously improved. The subway access control system has been integrated from an independent system or a subsystem of a security system into a large system of integrated monitoring integration platform to realize true system integration management. In terms of implementation, it has also evolved from simple hard-wired connections to software interfaces at the computer level to integration at the hardware device level.

The integrated monitoring integration project of the first phase of Chongqing Rail Transit Line 3 and the integrated monitoring integration project of Chongqing Rail Transit Line 1. Its ISCS integrated monitoring system includes ACS access control system, PSCADA power monitoring system, BAS environment and equipment monitoring system, FAS Multiple professional systems such as automatic fire alarm system and comprehensive information platform.

The main operating principle of ISCS is to use a systematic method to connect the scattered automation systems into an organic whole, which helps to realize the information exchange and resource sharing between the various professional systems of rail transit, and to improve the coordination and cooperation capabilities of each system , To efficiently realize the linkage between systems, improve the overall automation level of the entire rail transit line, and establish an information highway connected to the Chongqing rail transit command center, so that the operation and management of the Chongqing rail transit line will be incorporated into the city’s rail transit operation management system .

ACS is integrated with ISCS. The ACS access control system adopts distributed control and centralized monitoring and management to realize the intelligent control and management of the access channels inside and outside the rail transit. It implements two levels of management at the center level and station level, and implements three levels of control at the center level, station level, and local level. Among them, the center level is mainly responsible for the daily equipment operation management of the ACS access control system, equipment operation statistics, fault alarm statistics, access control card authorization management, equipment control parameters and security parameter management, system data management, etc.; while the station level is mainly responsible for equipment monitoring and faults. Alarm, equipment control and other functions.

 Design Principles

The ACS system adopts centralized management and hierarchical control. Central and station centralized management, the central, station and site are divided into three levels of control.

The ACS system not only has three operation modes: online, offline, and disaster, but also can automatically switch, set up multiple modes and set up multiple emergency plans for access control management according to needs.

The central level is mainly responsible for the daily equipment operation management of the ACS access control system, equipment operation statistics, fault alarm statistics, authorization management of access control cards, equipment control parameters and security parameter management, system data management, etc.

There is no dedicated workstation for the ACS access control system in the station, and the station-level functions of the ACS access control system are completed by the ISCS station management workstation. The station level is mainly responsible for equipment monitoring, fault alarm, equipment control and other functions.

In an emergency, you can use the station as a unit, through the emergency button of the access control system on the IBP panel of the station vehicle control room, cut off the power supply of the corresponding access control point electric lock of the station to realize escape.

The ACS access control system uses rail transit employee cards as the access control card to enter the authorized area. The system can set different authorization levels for the access control card according to requirements and realize multi-level management. The system can also realize the staff attendance function.

The ACS access control system fully considers scalability and compatibility, and meets the requirements for the adjustment, expansion and compatibility of the access control subsystem while meeting the merger or adjustment of rail transit operators.

In terms of equipment installation, all controllers and interface modules are required to be installed in a metal enclosed box, and the box shell must be grounded. Only in this way can the equipment be in a relatively safe electromagnetic environment.

ACS access control system special equipment adopts modular design to meet the requirements of flexible networking of the system. All equipment of the ACS access control system has the ability to work 24 hours a day.

  System composition and realization function

The access control system is based on the station, and the ISCS system workstation in the station vehicle control room conducts unified monitoring and related linkage of the access control equipment in the station; the central access control management system is responsible for the configuration of equipment parameters, personnel authorization, and data storage for the access control system of the entire line. At the same time, It also has functions such as equipment status monitoring, alarm response, and report query. The ACS system structure is shown in Figure 1.

  Central-level system composition and realization functions

The access control server of the control center is responsible for the parameter configuration of the entire line of access control system equipment, data storage, control instructions from the management workstation to the terminal equipment, and user management. The server installs the access control management server-side software and database. The access control server receives the control signaling of the access control operation workstation, parses and sends it to the designated station access controller, and then transmits it to the access control terminal equipment.

The system is equipped with 2 card issuing authorized workstations and 2 client operating workstations, as follows.

Two workstations are used as authorized workstations of the access control system. The system uses a dedicated card issuer to directly connect to the authorized workstation through RS232. When the card issuance is authorized, the card issuer reads the card number into the authorized workstation, and the authorized workstation reads the card number information and becomes the employee card Set various parameters and record the cardholder’s personal information stored in the database of the access control application server through the network.

Two workstations are used as the operation client of the access control system, and the access control management client software is installed. The operator logs in to the access control system workstation according to different user names and passwords. According to different operation permissions, the entire line of access control systems or departmental access control system equipment can be controlled and managed As well as inquiries, and printing reports, it can monitor the opening and closing status and alarm information of the door of the whole line or department, and realize the functions of the central access control system and staff attendance required by this tender.

The ISCS integrated monitoring system communicates with the ACS server of the access control system through the ISCS server at the central level, and mainly completes functions such as historical data query. The central ISCS server and the station-level ISCS server (or ISCS station-level workstation) are the internal communication of the ISCS system.

  Station-level system composition and realization functions

The station-level access control system (see Figure 2) is mainly composed of an ISCS station workstation and a network switch. The station-level ISCS integrated monitoring application software is installed on the workstation. The station level does not set up a dedicated management workstation to run the ACS management workstation software, and the station-level functions of the access control system are implemented by the ISCS integrated monitoring application software.

The station-level ISCS integrated monitoring application software contains many system modules, including BAS, FAS, ACS, etc. The ACS access control system is one of the application modules, and the station-level ISCS workstation is connected to the ISCS LAN through the switch through the TCP/IP method, and the central-level ISCS server connect.

 Field-level system composition and realization functions

The field-level access control system is composed of an access control controller, interface modules and various terminal execution devices. The controller can manage up to 16 access control points (card reader interface modules). The card reader interface module is placed on site, responsible for the function execution of the equipment (card reader, electromechanical integrated lock, exit button, door sensor) of a single access control point; this structure separates the executive function and management function equipment, greatly reducing the controller usage amount.

The controller communicates with the card reader interface module through the RS485 serial bus. The interface module acts as a bridge between the access control terminal equipment and the controller, connecting the controller. The single-point failure of each interface module will not affect the normal operation of other access protection zones. The card reader interface module communicates with the card reader in Wiegand format; local devices such as door sensors provide dry contacts to the card reader interface module.

A TCP/IP port of the controller is connected to the access control server through the ISCS network to realize the connection between the access control server of the control center and the access control controller, and receive the operation parameter setting, authorization management and remote control of the access control server and management workstation of the control center. , Upload the event information of the access controller.

The controller is connected to the ISCS management workstation through another TCP/IP port to realize the ISCS system’s real-time monitoring of the operation status of the access control equipment, alarm event processing, remote control and other functions. The function division of the access control controller communication port is shown in Figure 3.

  System Features

The access controller opens the underlying communication protocol, and directly connects with the ISCS station-level management computer through the communication port, instead of communication based on the PC level. To achieve the maximum integration, the most flexible application, and to meet the offline working requirements of the access control system, this is impossible to achieve based on the integration of the PC level.

The access controller uses two communication routes to keep the ACS access control system and the ISCS system relatively independent. ACS is the management system of the access control equipment manufacturer, and the ISCS system is developed by the ISCS platform manufacturer according to the agreement provided by the access control equipment manufacturer.

At the station level, special access control workstations are cancelled, and the operations of the access control system and other systems are concentrated in the ISCS workstation to facilitate operation and strengthen the connection between the systems. In order to avoid multi-head management at the central and station levels, in addition to the necessary control functions, such as remote door opening in emergency situations, the station level is only responsible for daily operation functions such as equipment monitoring, alarm processing, and data query, while cardholder authorization and equipment operation Parameter equipment and other authority will not be delegated to the station ISCS, but will be implemented in the central ACS access control system.

Access control equipment, from the controller to the front-end electric control locks, uniformly adopt the products of one manufacturer. Incorporate electronics and hardware into the ACS access control system package. All the hardware equipment involved in the access control point, such as hinges, door closers, sequencers, etc., are provided by the ACS access control system, reducing the working interface, improving the interface efficiency, and facilitating the system maintain.

Improve

Improve the redundancy backup capability of the access control system. In addition to making improvements at the central server level, it is also necessary to strengthen equipment redundancy in the communication network, controller communication ports and other links to provide fault handling capabilities.

The communication protocol of the access controller can be developed in the direction of open interface and general protocol. The access controller communication protocol is different from the BAS and FAS systems. In addition to equipment communication status, door opening and closing status and other information, it also contains information such as card swiping events. Protocols such as MODBUS cannot be completely suitable for this type of information expression. The communication protocol of the access controller can be encapsulated and try to be in line with the general protocol.

Strengthen the coordination of access control system control rights. Improve the control rights transfer mechanism, realize the transfer of control rights at the central and station levels, and ensure the uniqueness of the equipment controller.

1

[ad_2]

We will be happy to hear your thoughts

Leave a reply

RFID made in China
Logo
Enable registration in settings - general
Compare items
  • Cameras (0)
  • Phones (0)
Compare