4.28.2009

IP at the Door.

source: securitymagazine.com

When security leaders think about IP-based security systems, often they reach for video. But it’s access control that can make a faster bottom line kick. Charles Bailey knows.

The director of human resources, safety and security for Goodwill Industries of Eastern North Carolina, he has standardized on an access control Web service for 29 retail program centers. “Before, we had a standard lock and key system,” said Bailey. “Each manager had to manually open the store and then turn off the alarm. The problem was we didn’t know who had entered a store and we would have to do a lot research to answer some pretty simple questions on access.”


All employee entrance doors are monitored by the Web-based service. “The great part about it,” commented Bailey, “is when 9:00 comes around and we know the status of every one of our stores. If an area manager sees one of his or her stores isn’t open, they’re on the phone solving the problem. We’re spread out over half of the state. The system gives us the accurate, instantaneous information we need. About a month ago, we had a big snowstorm here. On that day, we could sit and monitor the e-mails coming in to know that all our stores opened on time, we didn’t have employees sitting in the parking lot waiting for a manager, and our customers were being served.”

There are business uses of Web-based access beyond security.

For example, Goodwill uses it to monitor cleaning operations. Cleaning staff have access cards. Not only can manager confirm that their stores are being cleaned, the organization can analyze access control data when paying cleaning service invoices.

Another source, StandGuard has a Web-hosted service offering end-user management of security, access control, and HVAC systems. Through one secure login by the end-user, the service allows for management of locations, systems, and personnel from any Web-enabled device.

Just like IP-based video, on the access control side there are numerous ways to skin the IP cat.

In one way, panels make the decision themselves in a decentralized fashion whether or not to admit a person. Many times, these systems are connected to the enterprise’s computer network. With another generation of Web-based access control, the control panels not only make the opening decisions themselves, but are complete computers that can be accessed over the Internet.

Of course, the next logical step is making access control a third-party Web-based service.

The access control market is on the verge of a technological revolution. As IP networking technology matures and computer processors attain new levels of performance and reliability, the industry is shifting from older technology based on hardware panels and proprietary protocols to new high-technology systems consisting of innovative software, PCs, and IP-enabled edge devices. This trend is simply a migration from controller-based access towards server- or host-based access control.

IP-based communication with IP door controllers also facilitates the setup process. The end-to-end IP architecture represents a true rebirth of access control technology.

4.09.2009

Power over Ethernet questions.

powerfromethernet.com

Why use PoE ?

There are a number of reason why you would use PoE, but in most cases the overriding reason is cost.

It can cost between $100 and $200 to run an ethernet cable to a wireless access point. But it can cost a further $400 to run an electrical conduit to power that access point.

The alternative is to install Power Sourcing Equipment (PSE) called Endspan Equipment into the ethernet switch, or by adding Midspan Power Insertion Equipment after the ethernet switch. This will combine the data and power at the source to be sent through the ethernet cable. The power from the cable can then be extracted at the endpoint with a Powered Device (PD) to operate the access point.

This solution removes the need to run expensive electrical conduit and will cost considerably less than $400.

Is there a PoE Standard ?

Yes, the Institute of Electrical Electronics Engineers (IEEE) 802.3af Task Force has ratified the technology into the Ethernet standard. The IEEE 802.3af standard covers the interoperability of using PoE products and covers the PSE - Endspan or Midspan, the Powered Device (PD) and the cabling requirements. It is endorsed by all network players that power IP-connected devices, such as voice-over-IP (VoIP) phones, wireless LAN (WLAN) access points (APs) and advanced security devices, over the existing Ethernet cabling infrastructure.

How is the power put onto the ethernet cable ?

The power can be added to the ethernet cable if the switch has a built-in power source in the form of PSE is called Endspan Equipment. Alternatively the power can be added to the cable after the switch by using a PSE called Midspan Equipment.

How is the power extracted from the cable ?

To extract the power from the cable the connected device needs to be a Powered Device (PD) such as the Isonas IP reader.

4.07.2009

A little about us. A little about Isonas PoE access control.

At Kondor Security it is our goal to provide top of the line security products to the often ignored end-user at a reasonable price. From access control and video recording to fire systems and wireless solutions, we're your online security solution. Because of the sheer volume of products, you may not find what you're looking for at first glance, that's when we encourage you to contact us with your questions. We're here to help.

Come check out our line of panel free Isonas power over ethernet readers. Keep reading to find out more about PoE infrastructure in access control solutions.

Security system designers, facility managers and building owners have all been dreaming of the day when a single cable can replace the multitude of cables currently needed for card reader communications, request to exit, door position, and lock power.

One of the biggest advantages offered by an Isonas PoE infrastructure is the inherent ability to facilitate system wide power back-up. If your system is PoE based, then backing up power for the entire system is simplified. Employing an emergency generator or a network UPS will ensure that the access control system continues to be fully functional during a power outage. Legacy systems typically employ battery back-up techniques that fail to provide sufficient power for critical components such as door locks or request to exit devices.

An important concept to recognize when considering the deployment of a PoE network is that of power sharing. This concept has largely been ignored by PoE marketeers. Simply stated, power sharing is when the total power available from power sourcing equipment is shared across all of the available ports. So if the power sourcing equipment delivers 12.95W of power and 9 or 10 watts are required on each port, your equipment will only power one port. The slight of hand that the industry marketing fails to acknowledge is that yes, while you can power your access control system with older IEEE P802.3af power sourcing equipment, they don't tell you that you'll need a switch for every access control door in the system. This is not an economically feasible solution. Not every pre-IEEE P802.3at switch employs the power sharing principle, but it is something that any potential PoE system user needs to be wary of.

Today's newer switches do not utilize this methodology. Each port can be configured by the operator to deliver a specific class of power. This ensures that your purchase of an 8 port switch will enable you to power the devices required at eight different doors if needed.

PoE is quickly becoming a viable alternative for access control system designs. Network switch manufacturers are producing power sourcing equipment designed specifically for the security industry and access control manufacturers offer PoE capable powered devices for their access control systems.

Well designed PoE based access control systems will:

1.) Utilize power sourcing equipment that avoids power sharing across the various PoE ports of the device.

2.) Comply with the new IEEE P802.3at standard including CAT 5 or better cable and Hi PoE power availability.

3.) Incorporate a cascading technique that employs smaller switches in a distributed architecture.

4.) Consist of powered devices that have been designed and tested to meet the PoE Plus standard.

5.) Incorporate power back-up systems that keep the access control functioning during a power failure.

6.) Have built-in protection features that help your security system stay secure.