Access control card solution for rail transit industry

SaveSavedRemoved 0
Deal Score0
Deal Score0

[ad_1]

This article is mainly based on the implementation experience of Shenzhen Dashi Company’s intelligent projects in rail transit security projects: such as Nanjing Metro, Chongqing Light Rail, Shenzhen Metro No. 3, Shenzhen Metro Line 5 Phase I and other security system projects in the construction of the case, Analyze how the security and access control card in the rail transit industry promotes the construction of rail transit informatization by using smart card technology in the construction of rail transit informatization, and the important role of security and access control in rail transit informatization.

1. Demand analysis of rail transit security construction

According to the urban rail transit network plans of 15 cities approved by the state, 22 urban rail transit lines have been opened and operated in 10 cities across the country, and the rail transit network plans of several cities are in the process of being submitted for approval. The three cities of Beijing, Shanghai and Guangzhou have exceeded 100 kilometers. my country’s urban rail transit construction is currently in a stage of rapid development. The security and access control card system has become an organic and important part of the intelligent, informatized, and digitalized construction of the rail transit industry.

For example, Shenzhen Metro Line 3 starts at Hongling Station and ends at Shuanglong Station. The length of the main line is about 33 kilometers (double line). Shenzhen Metro Line 3 has 22 stations, 21 sections and 1 depot, including 7 underground stations and 15 elevated stations on the ground. There are a total of 340 Type A access points and 58 Type B access points. The cardholder information and access control strategies of these access points need to be centralized in the control center of the access control system. This requires the selected access control product to have a very high communication capability, otherwise , The system cannot operate stably.

There are many access control points and management substations in subway security. Therefore, station-level access control system management workstations and central-level access control system authorized management workstations must be set up in stations and control centers. Access control data can be backed up and synchronized in two workstations at the station and central levels to achieve data security. At the same time, the access control system can meet the system structure of “one center, multiple sub-controls”. The access control system has a long running distance and a large scale, which requires high system stability and rationality of design.

The access control and security integrated management system is based on the principle of centralized management and decentralized control, and follows a humanized working mode. It adopts a topological structure of management, control and operation at three levels, which overcomes the communication bottleneck of large-scale systems and improves response speed and products. The stability. The system is divided into a three-tier structure from the management function: central management level, station management level, and field equipment level. The central management level access control system is installed in the subway control center; the station management level access control system is installed in each station control center; the access control equipment of the main substation is connected to the adjacent station management level as field equipment; the central management level and the station management center pass through the Ethernet The network channel connection, the station management center and the field equipment are connected through the Ethernet channel, the field equipment access control main controller and the local controller are connected in the field bus mode.

2. The overall structure of the security system

The entire access control system is composed of electronic card readers, electronic control locks, door status sensors, access control controllers, integrated monitoring system workstations, and integrated monitoring network and field equipment provided by ACS for stations, main substations and depots. The ACS system is responsible for monitoring the state of doors with high/medium security level, the alarm state of the alarm button, and remotely open the designated dedicated doors.

The ACS system is set up in a two-level management mode. The first level is the central level (that is, the OCC control center). As the ACS system authorization center, it is set in the general control center to achieve centralized management of the entire line of ACS systems; according to the requirements of the monitoring point table, the central AIS The system provides ACS system monitoring function, which can remotely open designated dedicated doors and monitor the status of high/medium security doors.

The central AIS only monitors the ACS access control equipment in the OCC building. The monitoring information includes: access control opening/closing status/alarm; access control opening command; access control system status/alarm; controller status/alarm. The central-level AIS workstation monitors the alarm status of the employee alarm buttons in the station control room.

The second level is the station level (that is, ACS workstations and AIS workstations). As the local ACS system control room, it is set up in the fire control center of each station and depot. The full-line ACS system authorization center is the central ACS workstation. According to the requirements of the monitoring point table, the ACS system monitoring function is provided in the station-level AIS system, which can remotely open the designated dedicated doors and monitor the status of the doors with high/medium security levels. The AIS workstation of the axis station can monitor the ACS system of the station and the satellite station under its jurisdiction, and the AIS workstation of the satellite station only monitors the ACS system of the satellite station. The station-level AIS system workstation and IBP monitor the alarm status of the employee alarm buttons in the ticketing information desk and the ticket office, but the employee alarm buttons in the station control room do not send out alarm messages at the station’s AIS system workstation or IBP.

Each ACS computer and ACS controller are connected to the switch network provided by the AIS system through an Ethernet interface. The AIS system provides the ACS system with data transmission channels from the station to the control center and from the axis station to the satellite station, and provides services such as VLAN division, IP address allocation, network management, and network security for the ACS system.

Each ACS computer and ACS main controller are connected to the switch network provided by the AIS system through an Ethernet interface; the ACS main controller uses a TCP/IP network or RS485 network to communicate with nearby equipment. The AIS system provides the ACS system with data transmission channels from the station to the control center and from the axis station to the satellite station, and provides the ACS system with services such as VLAN division, IP address allocation, network management and network security.

3. Operation mode in subway access control system

(1) Online operation mode

Online mode is the normal operation mode of the system. The parameters and instructions are transmitted in the order of the management workstation, ACS controller, and front-end equipment (card reader, input point, output point). Front-end collection information (card reader, input point), execution result information (ACS controller), equipment, network status information, etc., are transmitted in the order of front-end equipment, ACS controller, and workstation.

The system has set up fault tolerance and redundancy functions for workstations, communication lines, power supplies, etc., to ensure that the system can work online to the greatest extent.

In this mode, the system can realize the wide-area linkage of the whole system. For example, when a train is destroyed by terror on the underground track between two stations, the system can automatically open the relevant access control channel of the associated station.

(2) Offline operation mode

Offline operation mode means that when communication interruption occurs in the main access control controller, station management workstation, network communication equipment, and central authorized workstation, each controller, workstation, enters the preset offline management mode to work, and maximizes the effect of the system .

The system adopts distributed processing mode, and most of the work will be done automatically by the controller. In offline mode, the controller can automatically run according to the parameters downloaded in advance and store related information. After the main controller communicates with the workstation, the information is automatically uploaded to the workstation. The main controller has the ability to operate in a network, and in this mode, the linkage of all equipment in the station can still be realized.

(3) Disaster operation mode

When a fire occurs, the AIS system transmits the regional fire alarm information to the access control system through the system data interface, and the access control system executes the corresponding regional door opening action through the pre-preset fire alarm linkage information to open the evacuation access door.

When the system is offline, the event is automatically stored to the controller, and after the communication is restored, it is automatically uploaded to the station workstation or the central workstation, and the data is synchronized for future query.

The access control system is equipped with an emergency button in the IBP panel of the station control room. The emergency button is provided by the AIS system. The access control system connects the control cable to the IBP panel to control the power supply of all electric locks. When the fire escalates, the staff can take extraordinary measures, press the emergency button, cut off the power supply of all electric locks, open all door locks, and bypass the control of the access control system.

12

[ad_2]

We will be happy to hear your thoughts

Leave a reply

RFID made in China
Logo
Enable registration in settings - general
Compare items
  • Cameras (0)
  • Phones (0)
Compare