Case analysis of integration of network access control system in Fudan University

SaveSavedRemoved 0
Deal Score0
Deal Score0

[ad_1]

  
Case overview

The Guanghua Building of Fudan University was built on the North Campus of Handan Road, Fudan University. The whole building is divided into two underground floors and 30 floors above ground, with a total construction area of ​​about 110,000 square meters. It is a comprehensive building integrating office, scientific research, teaching, public reception and other functions.

The Guanghua Building of Fudan University consists of two high-rise conjoined main buildings and east and west auxiliary buildings. The main building has 30 floors, and the rest are scientific research offices except for the data reading area in the intermediate connector. The east and west podiums are 6 and 8 floors respectively, the west podium is the teaching area, and the east podium is the reception, conference and scientific research area. The ground floor of the east and west podium buildings are both garages and wartime 6-level civil air defense bunkers, and the first and second basement floors of the main building are equipment rooms and garages.

Guanghua Building, Fudan Universitya cartoonThe main service object of the system is internal staff, and the system mainly realizes comprehensive management functions such as access control, attendance, patrol, parking lot, and meeting check-in. The whole system has 1087 access points, 186 online patrol points, and 4 in and 4 out of the parking lot. The system needs to be linked and integrated with IBMS, firefighting, and CCTV.

After nearly three years of operation, the whole system has received good response from customers, and the cooperative operation with the building’s IBMS system is also stable and reliable.

System composition

a cartoonThe system is developed on the basis of large or super large access control system, and the network controller of important equipment of the system works based on TCP/IP network. The system is only in one network segment (such as the network segment whose IP address is: 172.10.10.1?172.10.10.254), and the access control management can reach 7620 doors (254×30). If each door can be controlled by two-way card reading, it can be installed 15240 card readers.

The system adopts a distributed two-layer structure, and the upper-layer communication, that is, the communication between each network controller and the access control workstation/server is completely based on the TCP/IP network. The lower layer, that is, the network controller and the access controller I/O linkage controller MCU and other controllers communicate based on RS485.

Each network controller is set with an IP address, which can be modularly connected to 15 controller devices, such as: 15 access controllers (two-door controllers), I/O linkage controllers, etc. The RS485 communication between the lower-level controllers and the network controller adopts an efficient event trigger mechanism, and one network controller can control 30 nodes (gates).

The system follows industrial standards, and the control and judgment are all completed by the network controller. The failure of one or more network controllers will not affect the normal work of other network controllers. The network controller adopts stable and efficient industrial-grade embedded RSIC

32BitCPU, the system has also added a self-diagnosis mechanism of the equipment, which can be intelligent and timely in the discovery and elimination of faults.

In case of emergency, the network controller access control controller and card reader are equipped with emergency card function. Even if the system is disconnected in many places, each controller can still operate normally offline, and each controlled door can still be controlled normally.

The network controller completes the judgment and logic control of the system, and its operating system does not use the popular Windows or Linux platform, which makes it able to effectively keep out hackers and computer viruses.

The system also adopts the data encryption technology in the whole process, and the communication between the card reader and the access control controller and between the access control controller and the network controller is encrypted in the whole process.

In order to adapt to the trend of intelligent system integration, the system has designed an I/O controller, which can be randomly connected to any location of the network to complete complex multi-system linkage, such as with CCTV, fire protection, alarm, equipment management, etc. linkage of the system (see Figure 1).

system integration

1. Data exchange with campus network system

In the project, it is necessary to exchange personnel data with the Fudan University campus network system, but considering the security of the campus network, the communication between the two systems can only be carried out at a relatively independent physical network level, not directly connected to the Fudan campus network, so This also brings certain difficulties to the data exchange of the system.

During the implementation of the system, the XML method was adopted to import all the school department and personnel data into the system at one time.a cartoonsystem database. When the school personnel data changes, write the basic information of the personnel into the corresponding personnel card, and then take the card to the special data card reader of the system for swiping and reading, and the software will read the personnel read by the card reader. Information is automatically updated to the database, thus completing data exchange and updating (see Figure 2).

2. Linkage with video surveillance system

When an emergency occurs at a certain access point, the system has the function of alarm linkage. In addition to linking video recording and monitoring the real-time recording of the image of the event point, the access control system can also switch the corresponding camera signal to the designated monitor to realize the linkage function. . The system provides a SOCKET network interface for third-party integrators. Through this interface, the status information of each device in the system can be obtained in real time.In this project, since the system runs on an independent physical network, in order to send information to the monitoring system through the network, a server is specially set up as an integrated server, which is connected to thea cartoonSystem network and monitoring system network. The real-time information of all equipment in the system is sent to the monitoring system integration software through SOCKET. After the monitoring system integration software compares and filters the information, the corresponding video linkage processing is performed (see Figure 3).

3. Integration with IBMS system

IBMS is the core of the building’s intelligent system and belongs to the highest monitoring and management of the entire IB system. It integrates various subsystems into the same management platform through a distributed network, and establishes a central monitoring and management interface for the entire building. Through a visual and unified graphical window interface, the system administrator can easily and quickly realize the functions of monitoring, control and management of the integrated functional subsystems in the building and the corresponding lower-level functional systems.

Due to the extremely high level of intelligence of Fudan Guanghua Building, the IBMS system is required to obtain the status signals of each subsystem in real time.The all-in-one card system can provide OPCSERVER, and the IBMS system can obtain real-time access through the standard OPC interface.a cartoonStatus of all devices in the system.

In Fudan’s project, due to the large number of points and the corresponding equipment, all equipment is grouped in OPCSERVER, divided by area as a large range, then divided by floor, and then divided by equipment type, and in OPCSERVER The name of the point is directly expressed in Chinese, which facilitates the integration designers of the IBMS system and accelerates the integration progress of the system.

The entire Fudan Guanghua Building has access control management of more than 1000 doors, each door has 4 detection points: door magnetic detection, relay output, alarm output, door opening button, in addition there are about 1100 card readers and about 4000 hardware linkage input and output points. There are about 600 equipment status points, and there are about 13,000 various points that need to be reflected on the OPCSERVER. The status of these 13,000 points can be provided to the IBMS system in real time.

The system can work in 100M network, and adopts advanced event monitoring and response mechanism. The network controller NCU can automatically convert the state of each device into an event message and send it to the OPCSERVER in real time. The OPCSERVER only needs to open several ports to listen and respond to messages. In this project, there are more than 90 kinds of events corresponding to various state changes of all field devices. After all these events occur, they can be reflected in the IBMS system within 1 second, which truly achieves real-time response.

A single OPCSERVER standard server can support 20480 points of real-time status detection, and the server adopts intelligent execution scheduling strategy, so that with the cooperation of multi-port communication, the IBMS system can quickly obtain the status of each device.

The OPCSERVER server also adopts advanced memory caching technology and memory index table technology in software processing to update the equipment status changes to OPCCLIENT in time, which ensures the real-time performance of equipment status changes reflected in the IBMS system from the software.

Epilogue

The early access control system emphasized the stability of the system, and generally only had basic access control functions. With the continuous maturity of access control technology, the access control system has become very strong in terms of stability, and has continued to expand on this basis, resulting in subsystems such as attendance, consumption, parking, elevator control, patrol, and meeting check-in, forming today’s “a cartoon“, and also launched a complete software and hardware interface for integration with other systems, which is also one of the important trends for the future development of access control systems.

1

[ad_2]

We will be happy to hear your thoughts

Leave a reply

RFID made in China
Logo
Enable registration in settings - general
Compare items
  • Cameras (0)
  • Phones (0)
Compare