Design and Installation of Second-generation Identity Card Access Control Management System
First, the program design:
1. The design goal of the plan is designed according to the first-level risk prevention standards, and the advanced and mature technologies and equipment are used to ensure the safe, reliable and stable operation of the system in strict accordance with relevant standards and the requirements of the building management system; Contact ID application management system, in the implementation area, to achieve intelligent access control system management, using new modern technology means to upgrade the management level from the hardware platform to improve the soft environment of enterprises.
2. The design of the project is based on the "Provisional Regulations on the Management of Architectural Intelligent System Engineering Design" Ministry of Construction 1997
JGJ/T16-92) Ministry of Construction 1997
1997
UD/T926) Ministry of Posts and Telecommunications 1997
GA/T75-94
GA/70-94
3, the principle of program design, stand the test of time; at the same time the entire system must be at the cutting edge of technology, but also meet the actual needs. Therefore, the design of the access control system should follow the following principles:
, powerful and practical and easy to use. Therefore, the practicality of the system is the first principle that should be followed first.
Therefore, all subsystems of the access control system should belong to the Non-stop system as much as possible to ensure normal operation.
, Well-equipped, convenient management is a factor that design should consider.
It should also comply with relevant Chinese or international safety standards and can work effectively in a non-ideal environment. In addition, system security should also be reflected in the process of information transmission and use, and it is not easy to be hijacked and stolen.
User needs are changing as well. Therefore, the design and implementation of access control systems should take into account the need for future expansion. That is, they can flexibly increase or decrease or update individual subsystems, meet the needs of different periods, and maintain a long-term position. A model of smart architecture.
, And there is no need to use excessive dedicated maintenance tools during maintenance.
First, the intelligent system must be advanced to meet the needs of future development. Therefore, the design idea must be advanced. The system equipment and software selected must be relatively advanced internationally.
Second, the introduction of access control system
The ID card access control system basically constitutes the function of the access control system. The controller authenticates the information. After the verification is legal, the electronic door lock is automatically opened. At the same time, the controller records the date, time, ID number, name, and avatar of the door opening. Cardholder access information.
Access Control System Parts Introduction Access Controller TCP/IP Communication, Perfect Attendance Function Permission Capacity 500,000 500,000 Reading Time: Less than 1 second.
Electric lock (select according to the actual situation)
The EC-235 electrical plug lock is used as an example to briefly describe its performance parameters:
â— Locking method: magnetic induction 12VDC
650mA continuous state 250mA
0-9 seconds (can be adjusted)
LED prompt: Show door lock switch status +15)°C
235mm×35mm×38mm
Power box 220V50Hz
12VDC
5A
RS-232 data transmission (TXD) and data reception (RXD) signals are converted into TCP/IP signals;
Performance parameters TCP/IP
0-9600Kbps
100m
-50°C to 70°C, relative humidity 5% to 95%
Exit button 100,000 times without failure. Select one door for each one-way card reader, and select it if it is two-way card reader.
Third, after sales service
, consulting services, maintenance services 1) equipment free warranty for one year;
2) Failure or damage caused by man-made or natural disasters during the free maintenance period, only charge for maintenance costs;
3) Maintenance services other than free maintenance period only charge maintenance cost.
3, the following conditions are not included in the scope of free warranty 1) damage caused by abnormal operation and man-made or natural disasters;
2) Demolition of any part (such as: circuit, parts) of the machine after its own removal;
3) Faults caused by the installation of a technician other than our designated professional technician.
First, the program design:
1. The design goal of the plan is designed according to the first-level risk prevention standards, and the advanced and mature technologies and equipment are used to ensure the safe, reliable and stable operation of the system in strict accordance with relevant standards and the requirements of the building management system; Contact ID application management system, in the implementation area, to achieve intelligent access control system management, using new modern technology means to upgrade the management level from the hardware platform to improve the soft environment of enterprises.
2. The design of the project is based on the "Provisional Regulations on the Management of Architectural Intelligent System Engineering Design" Ministry of Construction 1997
JGJ/T16-92) Ministry of Construction 1997
1997
UD/T926) Ministry of Posts and Telecommunications 1997
GA/T75-94
GA/70-94
3, the principle of program design, stand the test of time; at the same time the entire system must be at the cutting edge of technology, but also meet the actual needs. Therefore, the design of the access control system should follow the following principles:
, powerful and practical and easy to use. Therefore, the practicality of the system is the first principle that should be followed first.
Therefore, all subsystems of the access control system should belong to the Non-stop system as much as possible to ensure normal operation.
, Well-equipped, convenient management is a factor that design should consider.
It should also comply with relevant Chinese or international safety standards and can work effectively in a non-ideal environment. In addition, system security should also be reflected in the process of information transmission and use, and it is not easy to be hijacked and stolen.
User needs are changing as well. Therefore, the design and implementation of access control systems should take into account the need for future expansion. That is, they can flexibly increase or decrease or update individual subsystems, meet the needs of different periods, and maintain a long-term position. A model of smart architecture.
, And there is no need to use excessive dedicated maintenance tools during maintenance.
First, the intelligent system must be advanced to meet the needs of future development. Therefore, the design idea must be advanced. The system equipment and software selected must be relatively advanced internationally.
Second, the introduction of access control system
The ID card access control system basically constitutes the function of the access control system. The controller authenticates the information. After the verification is legal, the electronic door lock is automatically opened. At the same time, the controller records the date, time, ID number, name, and avatar of the door opening. Cardholder access information.
Access Control System Parts Introduction Access Controller TCP/IP Communication, Perfect Attendance Function Permission Capacity 500,000 500,000 Reading Time: Less than 1 second.
Electric lock (select according to the actual situation)
The EC-235 electrical plug lock is used as an example to briefly describe its performance parameters:
â— Locking method: magnetic induction 12VDC
650mA continuous state 250mA
0-9 seconds (can be adjusted)
LED prompt: Show door lock switch status +15)°C
235mm×35mm×38mm
Power box 220V50Hz
12VDC
5A
RS-232 data transmission (TXD) and data reception (RXD) signals are converted into TCP/IP signals;
Performance parameters TCP/IP
0-9600Kbps
100m
-50°C to 70°C, relative humidity 5% to 95%
Exit button 100,000 times without failure. Select one door for each one-way card reader, and select it if it is two-way card reader.
Third, after sales service
, consulting services, maintenance services 1) equipment free warranty for one year;
2) Failure or damage caused by man-made or natural disasters during the free maintenance period, only charge for maintenance costs;
3) Maintenance services other than free maintenance period only charge maintenance cost.
3, the following conditions are not included in the scope of free warranty 1) damage caused by abnormal operation and man-made or natural disasters;
2) Demolition of any part (such as: circuit, parts) of the machine after its own removal;
3) Faults caused by the installation of a technician other than our designated professional technician.
Steel Props
Steel prop is a vertical support system widely used in construction.
Based on different Markets with different types
There are two types with Light duty steel props and Heavy duty steel props
Also,can be painted,Galvanized and HDGCharacteristics:
Simple & flexible structure.
Easy for asembling
Here comes our 5 types of Scaffolding systems:- Cup lock Scaffolding(C-Lock Scaffolding)
- Ring lock Scaffolding
-Kwistage Scaffolding
-H-frame Scaffolding
-ID15 Scaffolding Tower, this type Scaffolding is the most widely used in construction, such like bridge.
-Whole Aluminum Scaffolding
Steel Props,Stainless Steel Props,Mercury Stainless Steel Props,Adjustable Steel Props
HENGSHUI PIONEER IMP & EXP TRADING CO ., LTD , https://www.hspioneer.com