Você está na página 1de 105

Access Control System and CCTV 1

Project Report on

Access Control System(ACoS) and


Closed Circuit Television(CCTV)

Submitted By

Mayank Kumar
Reg. No. : 200312056

In partial fulfillment of requirements for the award of degree in


Bachelor of Electronics & Communication Engineering
(2006-07)

Under the Project Guidance of

Mr. Inderjeet Singh


Regional Service Manager (North), HBS
Honeywell Automation India Limited
86,1st Floor,Okhla Phase -І І І
New Delhi-110020

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 2

Certificate

This is to certify that Mayank Kumar (200312056) worked in our


organization from 15.01.2007 to 15.05.2007 and has successfully
completed the project on “Access Control System & CCTV” of the
requirements for the award of the degree of Bachelor of Electronics
& Communication Engineering of Sikkim Manipal Institute of
Technology under our supervision and guidance.

Project Guide

Address with Seal and Date

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 3

ELECTRONICS & COMMUNICATION ENGINEERING


DEPARTMENT
SIKKIM MANIPAL INSTITUTE OF TECHNOLOGY
MAJITAR, RANGPO, EAST SIKKIM – 737132

Organization and Personnel Certificate

This is to certify that Mayank Kumar (200312056) worked in our


organization from 15.01.2007 to 15.05.2007 and has successfully
completed the project on “Access Control System & CCTV” in
partial fulfillment of the requirements for the award of the degree of
Bachelor of Electronics & Communication Engineering of Sikkim
Manipal Institute of Technology under our supervision and
guidance.

Departments of E&C Project Head


of Sikkim Manipal Institute of Technology
Majitar, Rangpo Address with Seal and
Date
Sikkim – 737132.

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 4

ACKNOWLEDGEMENT

I would like to express my deepest appreciation to Honeywell


Automation India Limited, New Delhi for providing me with
such a wonderful opportunity to do my major project. My
special gratitude goes to the Dean sir without whom I would
have never been able to do this project and I would also like to
thank my project guides Er. Md. Mosharraf Jamal, Er. Vaibhab
Agarwal for being a constant support all through and helping
me in a number of ways. And also, I would like to thank all the
staffs of Honeywell Automation India Limited, who were so
amiable and helpful.

I would also like to extend my heart felt thanks to my


supervisor and reader from SMIT my college, Mrs. Radhika
Purandare of Electronics & Communication Engineering
Department. Last but not the least the whole Electronics &
Communication Engineering Department for giving me the
opportunity to work in such a wonderful organization like this
and providing me with such a good platform to gain
experiences.

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 5

ABSTRACT

As a part of our B.Tech course, we need to undergo an


industrial training of minimum four months duration in our
final semester.

The Head of Electronics and Communication engineering


department, Dr. R.N.Bera suggested me to work on the design
and implementation of Building Management System. He
explained me about the growing trend of Life Safety
Management and Security Systems. I found it very interesting
and gladly accepted it as the subject of my project. It was a
very exciting and learning experience of working on “Access
Control System and CCTV ” and I came to know a no. of useful
and interesting concepts related to the Building Management
System.

I have followed the IEEE standard to document the working


experience.

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 6

Contents
1. Introduction
1.1 Building Management System ……………….. 11
1.2 What is a BMS? .……………….. 13
1.3 Advantages of BMS ………………… 15
2. Modbus Protocol
2.1 Introduction ………………… 16
2.2 RS 232 ………………… 17
2.3 RS 485 ………………… 18
3. IQ-Series Intelligent Access Control System
3.1 Board Diagrams
3.1.1 The IQ-200 Printed Circuit Board Wiring Diagram …...... 20
3.1.2 The IQ-400 Printed Circuit Board Wiring Diagram …….. 21
3.1.3 Four-Door Expansion Board ………….. 22
3.1.4 Eight-Door Expansion Board ………….. 23
3.2 Jumpers Specifications of IQ-200
3.2.1 Jumper W1 ……………………….. 24
3.2.2 Jumper W2 ……………………….. 24
3.2.3 Jumper W3 ……………………….. 24
3.2.4 Jumper W4 ……………………….. 25
3.2.5 Jumper W5 ……………………….. 26
3.2.6 Jumper W6 ……………………….. 26

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 7

3.3 IQ with Expansion Board ...................................... 27


3.4 Installing Power ……………………….. 28
3.4.1 Installing Power- 3.0 Amp …………… 29
3.4.2 Installing Power- 6.0 Amp …………… 30
3.5 Resetting the IQ-200 to Default Values ........... 31
3.6 Description of LED Arrays
3.6.1 Using the Ten-Segment LED Array ……… 32
3.6.2 Expansion Board LED Arrays ……… 33
3.7.1 Communicating with the IQ-200 ............ 34
3.7.2 Reset the IQ Panel ............ 34

3.8 Addressing Individual IQs through the Dipswitches .......... 35


3.9 Setting MODEM or Direct Connect Configurations
3.9.1 MODEM communication ……………
36
3.9.2 Direct connect communication ……………
36
4.1.0 Changing the Baud Rate ……………
37
4.1.1 Baud Rate Settings ……………
38
4.2 Status Lights and Dealing with Communication Errors
4.2.1 Status Lights ……………
39
4.2.2 Communication Errors ……………
40
4.2.3 Error Codes ……………
40
4.3 Controller Specifications
4.3.1 Microprocessor
……………………………… 42
4.3.2 LEDs and Dipswitches
……………………………… 42

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 8

4.3.3 Two Seven-Segment LED Display


………………….. 42
4.3.4 Real Time Clock
……………………………… 42
4.3.5 Serial Communication
……………………………… 43
4.3.6 Power Supply
……………………………… 43
4.3.7 Battery Back-up Requirements
………………………... 43
4.3.8 Factory Settings
……………………………… 44
4.4 Proximity Card Reader
4.4.1 Reader Description
………………………… 45
4.5 IQ 4-Reader Expansion Module
4.5.1 Power Supply
………………………… 46
4.5.2 Door Sense LEDs
………………………… 46
4.5.3 Active LEDs
………………………… 47
4.6 IQ 8-Reader Expansion Module
4.6.1 Power Supply
………………………… 48
4.6.2 Door Sense LEDs
………………………… 48
4.6.3 Active LEDs
………………………… 49
4.7 TCP/IP Configuration of Host
………………………… 50
4.8 RS 232 to RS 422/485 Converter

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 9

4.8.1 Introduction
………………………… 51
4.8.2 Advantages of ACON-01
………………………… 51
4.8.3 ACON D-01 Specifications
………………………… 52

4.9 Switch Configuration


4.9.1 Full Duplex Point to Point …………………
53
4.9.2 Full Duplex Multidrop …………………
53
4.9.3 Half Duplex Multidrop …………………
53
5.1.0 Enterprise Buildings Integrator(EBI)
5.1.1 Versatility of EBI …………………
54
5.1.2 EBI and Security Management …………………
56
5.1.3 EBI and Building Management …………………
56
5.1.4 EBI and Fire Management
5.2.0 Honeywell EBI Server
5.2.1 Classification ………………………..
57
5.2.2 EBI Hardware components ………………………..
57
5.2.3 Server Redundancy ………………………..
58
5.2.4 Distributed System Architecture ………………….
59

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 10

5.2.5 Controller Interfaces ………………….


59
5.3.0 Controller-to-Server Connections
5.3.1 Direct Connections
………………………… 60
5.3.2 Indirect Serial Connections
………………………… 60
5.3.3 Direct Serial Connections
………………………… 61
5.3.4 Terminal Servers
………………………… 62
5.3.5 Modems
………………………… 62
5.4.0 Stations
5.4.1 Displays
………………………… 63
5.4.2 System Displays
………………………… 63
5.4.3 Mobile Stations
………………………… 64
5.4.4 Electronic Signatures
………………………… 65
5.5.0 Operator Security
5.5.1 Area
………………………… 65
5.6.0 Station Security
5.6.1 Operator-based Security
………………………… 66
5.6.2 Station-based Security
………………………… 66
5.6.3 Duress Login
………………………… 67

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 11

5.7.0 Exchanging Data with other Applications


5.7.1 Microsoft Excel Data Exchange
………………….. 67
5.7.2 ODBC Data Exchange
………………….. 67
5.8.0 Alarms and Events
5.8.1 Responding to Alarms and Events
…………….. 68
5.8.2 Response to Alarms
…………….. 70
5.9.0 Analysing System Data
5.9.1 Reports
………………………………. 70
5.9.2 Point History Archiving
………………………… 70
5.9.3 Event Archiving
………………………………. 71
6.0 Cardholder Management Concept
6.1 Cardholder Information in Server Database
………. 71
6.2 Integrated PhotoID
………………………… 73
6.3 Visitor Management
………………………… 73
6.4 Understanding Supervisory Control
…………….. 74
6.5 Server Control of Access
………………………… 75
6.6 Downloading Information to Field Devices
………. 75
7.1.0 Access Control Concepts

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 12

7.1.1 Card Readers


………………………………. 76
7.1.2 Access Points
………………………………. 76
7.1.3 Floor Points
………………………………. 76
7.1.4 Zones
………………………………. 77
7.1.5 Time Periods
………………………………. 78
7.1.6 Access Levels
………………………………. 79
7.1.7 Occupancy Reporting
………………………………. 79
7.1.8 Cardholder Reporting
………………………………. 79
7.1.9 IQ-200 System Capacities
………………………… 80
8.0 Closed Circuit Television(CCTV)
8.1.0 Types of Camera
………………………… 81
8.1.1 Camera Specification
………………………… 81
8.1.2 Bandwidth dependency of Resolution of Camera
…. 82
8.1.3 Typical Resolutions of Camera
……………. 82

8.2.0 Camera Installation


8.2.1 Power Supply
………………………………. 82

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 13

8.2.2 Select switch description


………………………… 83
8.2.3 Connections
………………………………. 83

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 14

Introduction
My project mainly deals with the installation and
commissioning of the Building Management System of
Sapient Corporation Private Limited, Gurgaon. The key
objective of this project is to substantially reduce the
Operation, Maintenance, Consumables, Spares and Energy
Consumption costs and to achieve significantly higher
savings than the minimum.

Building Utilities are used primarily to provide a hospitable


environment for occupants and equipment within the space.
Significant building utilities are: Access Control System, Fire
Alarm System, Close Circuit Television (CCTV), Heating
Ventilation and Air-Conditioning (HVAC), Lighting Control,
electric power systems, water management systems, etc. Each
one of these is affected by energy efficiency considerations,
but is also greatly affected by intelligent building design
concerns. Generally, any Building Management System
comprises of the following main functional components
(devices) :

 Sensing devices: (temperature sensors, smoke detectors,


etc) to sense conditions and control devices (valves, on-off
relays, etc).

 Digital controllers: for point processing,


implementation of designed control strategies &
incorporation of energy management.

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 15

 Central Operator Station(s): for centralized


monitoring, controls, reporting and information
management for all employed sub systems.

The Building Management system at Sapient Corporation


Private Ltd.,Gurgaon consists of twenty Access Controllers
(Direct Digital Controller) distributed at eighteen floors and
the EBI server located at the Control room in the second
floor. The RS232/RS485 converter is used to provide
communication through all the twenty IQ-Series Controllers
and furthermore integrate them to the EBI server. All sensors
and controlling equipment are located at field for sensing and
controlling different parameters of the building. These are
again connected directly to the DDC Controllers. All DDC
controllers are hooked up to the central EBI (Enterprise
Building Integrator) Server via serial communication bus.
DDC Controller collects parameter value from its sensors and
passes to the EBI server. Similarly any command issued by
EBI server goes to DDC via communication bus and DDC
then passes that command to the controlling devices such as
actuator, relay, etc. That is how BMS monitors and controls
the different parameters.

BUILDING MANAGEMENT SYSTEM

1.1 Introduction

The common purpose of building management system is to


create an artificial environment protecting the activities
taking place in the building against any outside influences

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 16

or just the opposite, protecting the outside world against


activities taking place in the building.

A building may be conceived as a shell around all the


activities taking place inside (the processes). The shell is
not completely closed, for processes demand input and
output facilities (Fig 1.1).

Disturbances

Facility processes

Input systems Main process Output systems

Fig.1.1. Processes in a building

1.2 What is a Building Management System?

The technical installations in a building incorporates a


large number of measuring, control and regulating
functions which annunciate deviations from desired values
and standards, and if possible, take corrective actions.
Moreover the conditions under which these systems have
to operate vary constantly as result of changing climatic
conditions, wear and alterations of the buildings’ layout
and change of usage.

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 17

In larger housing estates/ office buildings, Building


Management Systems (BMS) are used just for measuring
and recording energy consumption. Nowadays there is a
growing trend towards integration of automation systems
in office buildings. In this case, functions such as the
control of heating, lighting, communication and security
are combined in a single automation system: the so called
“SMART HOUSE”.
Building management comprises of the creation of such an
environment for the processes taking place within the
building that provides optimal functionally and integration
of the processes concerned.

The concept of management may be imagined as a control


loop. In this case the building constitutes the process. The
input to this process is formed by the goods, energy and
services needed to keep the process going. The services
provided by the building by way of accommodation,
comfort, security and the like constitute the output of the
process. To be able to keep this output at the qualitative
and quantitative levels, the following conditions have to be
met:

 Methods are required for measuring the quantity


and quality of the output.
 Set points and standards are needed with which the
desired quality and quantity of the output can be
compared unambiguously.
 Means are needed for controlling the process or its
input in order to be able to adjust the output.(Fig 1.2).

As building management system is in fact an


information processing system, it should provide functions

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 18

for data input, processing this data into information and


output the results to the operator.

Input Processes to be managed Output

Corrective Control Measurement


Action Algorithm

Fig.1.2. Block diagram of a control loop

1.3 Advantages of a Building Management


System/Automation System

The objective of a BMS is to centralize the


monitoring, operation and management of a building to
achieve more efficient building operation at reduced labour
and operating cost thereby providing a safe and
comfortable working environment for building occupants.
In the process of meeting these objectives, the BMS has
evolved from supervisory control to totally integrated
computerized control.

Some of the advantages of BMS are:

 Simpler operation with routine and repetitive


functions programmed for automatic operations.

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 19

 Reduced operator training time through onscreen


instructions and supporting graphic displays.
 Faster and better response to occupant needs and
trouble conditions.
 Reduced energy cost through centralize control
and management programs.
 Better management at the facility through
historical records, maintenance management
programs and automatic alarm reporting.
 Flexibility of programming for facility needs,
size, organization and expansion requirements.
 Improved operating-cost record keeping for
allocating to cost centers and/or charging individual
occupants.
 Improved operation through software and
hardware integration of multiple subsystems such as
direct digital control (DDC), fire alarm, security,
access control or lighting control.
 Automatic interventions in the event of a failure
or emergency, minimizing consequential damage.
In addition to the above mentioned savings, a BMS also offers
an improvement in the quality of the services rendered to the
users of the building by providing:

 Continuous control of comfort levels;


 Faster signaling and localization of failures;
 Increased safety by means of immediate warnings
and systematic action in the event of an emergency;
 Accurate charging for services supplied.

Building services include heating, ventilation and air


conditioning of plant, electrical systems, lighting systems, fire
systems and security systems. In industrial buildings, they may

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 20

also include the compressed air, steam and hot water systems
used for the manufacturing process. A BMS may be used to
monitor and control all or some of these services.

Modbus Protocol
2.1 Introduction

The Modbus protocol is an open, published and widely


implemented protocol designed to transfer digital and analog
I/O and register data between control devices. The Modbus
protocol has already been implemented in thousands of
different devices. Although the Modbus protocol is a trademark
and owned by Schneider Automation, there are no license fees
or royalties for the license to use the Modbus protocol. The
protocol specification is also freely available. This makes the
Modbus protocol an open interface protocol.

Modbus supports a several different transport mechanisms. It


was initially developed for RS232 communication, but the
latest Modbus TCP specification gives Modbus Ethernet
TCP/IP support.
Here the Modbus interface supports the following
communication architectures to a Modbus device:

• Serial RS-232
• Serial RS 485 through a Stallion Easy
Connection serial adapter.

2.2 RS 232

RS 232 is well known due to popularity of today's PCs. These


are used in industry for control systems and data transfers. The

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 21

RS 232 signals are represented by voltage levels with respect


to ground. There is a wire for each signal, together with the
ground signal (reference for voltage levels). This interface is
useful for point-to-point communication at slow speeds. For
example, port COM1 in a PC can be used for a mouse, port
COM2 for a modem, etc. This is an example of point-to-point
communication: one port, one device. Due to the way the
signals are connected, a common ground is required. This
implies limited cable length - about 30 to 60 meters maximum.
Main problems are interference and resistance of the cable.
Shortly, RS 232 was designed for communication of local
devices, and supports one transmitter and one receiver.

In a RS 232 unbalanced data transmission system, each signal


is represented by a voltage level with respect to ground. For
example, the transmitted signal of a PC COMx port is negative
when idle, and switches between positive and negative level
when transmitting data. Amplitude ranges between -15 to -5V
in negative state, and between +5 to +15V in positive state.

2.3 RS 485

In RS 485 each signal uses one twisted pair (TP) line - two
wires twisted around them. This is ‘Balanced data
transmission', or 'Differential voltage transmission'. If one of
the TP wires is labeled
'A' and the other one 'B', then, the signal is inactive when the
voltage at A is negative and the voltage at B is positive.
Otherwise, the signal is active, A is positive and B is negative.
Of course, the difference between the wires A and B matters.
For RS 485 the cable can be up to 1200 meters (4000 feet)
long, and commonly available circuits work at 2.5 MB/s
transfer rate.

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 22

RS 485 is used for multipoint communications, that is, more


devices may be connected to a single signal cable. Most RS
485 systems use Master/Slave architecture, where each slave
unit has its unique address and responds only to packets
addressed to this unit. These packets are generated by Master
(e.g. PC), which periodically polls all connected slave units.

In special cases (security systems), an improved version of


multiprocessor communication is used. This system uses only a
single line for bidirectional communication; however, there is
no Master. All units announce a packet transmission of a
specified length, and at the same time listen whether the data
has been successfully transmitted. If it's not the case, they stop
communicating and listen for what has happened. At this time,
urgent packets can be transmitted over the line. This system is
ideal for devices that need to immediately transfer some very
important and up-to-date data, without waiting for Master to
give them a chance to do so.

In single twisted pair RS 485, all devices are connected to a


single twisted pair. Thus, all of them must have drivers with
tri-state outputs (including the Master). Communication goes
over the single line in both directions. It is important to prevent
more devices from transmitting at once (software problem).

For a basic RS 485 system, we need an I/O driver with


differential outputs and an I/O receiver with differential inputs.
Noise and interference is introduced into the line; however,
since the signal is transferred via a twisted pair of wires, the
voltage difference (between A and B) of this interference is
almost zero. Due to the differential function of the RS485 input
amplifier of the receiver, this interference is eliminated. The
same is true for crosstalk from neighboring lines, as well as for
any other source of interference, as long as the absolute

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 23

maximum voltage ratings of the receiver circuits are not


exceeded.

Differential inputs ignore different earth potentials of the


transmitter and the receiver. This is very important for
communications of diverse systems, where great problems
would otherwise arise - e.g. different power sources, etc.
Twisted Pair cables, together with correct terminations (to
eliminate reflections), allow data transfer rate of over 10Mbit/s
with cables up to 1 km long. However, all of these advantages
come at a cost. RS485 circuits are more complex, and thus
more expensive. Higher data transfer speeds require correctly
connected and matched terminations, which can be a problem
in systems where the number of connected devices changes.
And, of course, Twisted Pair cables are required.

IQ - Series Intelligent Access Control


Systems

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 24

3.1 Board Diagrams

3.1.1 The IQ-200 Printed Circuit Board Wiring Diagram

3.1.2 The IQ-400 Printed Circuit Board Wiring Diagram

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 25

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 26

3.1.3 Four-Door Expansion Board

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 27

3.1.4 Eight-Door Expansion Board

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 28

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 29

3.2 Jumpers Specifications of IQ-200

3.2.1 Jumper W1 is located in the UPPER LEFT side of the


board and is set for 12 volt-4-wire, 12 volt-5-wire, or 5-volt-5-
wire readers.

• Across Pins #1 and #2 = 5 Volt Card Reader


• Across Pins #2 and #3 = 12 Volt Card Reader
• Across Pins #4 and #5, #7 and #8, #10 and #11 =
5-wire Wiegand Data (Data0, Data1) Format
• Across Pins #5 and #6, #8 and #9, #11 and #12 =
4-wire PCSC Data Format

3.2.2 Jumper W2 is located in the LOWER LEFT side of the


board between Plug P9 and P10 and is set for 4 or 5 wire
readers. (Must be set consistently with Data format set on W1).

• Across Pins #1 and #2 = 5-wire Wiegand Data (Data0,


Data1) format
• Across Pins #2 and #3 = 4-wire PCSC Data format

3.2.3 Jumper W3 is located in the UPPER LEFT side of the


board between Plug P6 and P7 and is set for 4 or 5 wire
readers.

• Across Pins #1 and #2 = 5-wire Wiegand Data (Data0,


Data1) format
• Across Pins #2 and #3 = 4-wire PCSC Data format

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 30

3.2.4 Jumper W4 is located in the LEFT CENTER side of


the board and is factory set and should not be altered.
• PCSC Factory Set across Pins #1 and #2

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 31

3.2.5 Jumper W5 is located in the TOP CENTER of the board


and is set for RS232 or RS485 communications.

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 32

• Across Pins #1 and #2 = No Termination (when IQ-


200 is not the last panel on the RS-485 channel or it is
the last panel in a system where the RS-485 data-line
is less than 2000 ft., or when using RS-232/modem
connections)
• Across Pins #2 and #3 = 120 Ω End of Line
termination (when IQ-200 is the last panel on the RS-
485 channel where the RS-485 data-line is 2000 ft. or
greater)

3.2.6 Jumper W6 is located in the RIGHT CENTER of the


board. It is set across pins 2 and 3.
• PCSC Factory Set across Pins #1 and #2

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 33

3.3 IQ with Expansion Board

• The 50-pin Expansion Bus Ribbon Cable is


connected to the IQ-200 at Plug J1.
The RED stripe on the edge of the ribbon cable
should be connected to pin #1 of Plug P1.

• The opposite end of the 50-pin Expansion Bus


Ribbon Cable is connected to a Peripheral Expansion
Board at Plug P1.
The possible expansion boards are the new 4-door
expansion PCB, 8-door PCB, OUT PCB, ALM
PCB, SAM PCBs.

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 34

3.4 Installing Power


Shown below are the 3.0A and 6.0A PCSC power supplies.
Both power supplies are shown in enclosures connected to an
IQ in a small enclosure.

3.4.1 Installing Power- 3.0 Amp


See Figure 1 on page 26.

12VDC power is connected to the circuit board at P1 in the


upper left corner. Disconnect power mains from the supply
until the wiring is secured.

3.4.2 Installing Power- 6.0 Amp

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 35

See Figure 2 on page 27.

12VDC power is connected to the circuit board at P1 in the


upper left corner. Disconnect power mains from the supply
until the wiring is secured.

3.4.2 Firgure - PCSC 3.0 Amp Power Supply

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 36

3.4.3 Figure - PCSC 6.0 Amp Power Supply

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 37

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 38

3.5 Resetting the IQ-200 to Default Values

In the event that the 3-volt lithium battery is removed or


loses its electrical charge, the IQ must be reset. Follow the
procedures below to restore the controller to the default
values:

1. With power on, move all switches at dipswitch SW1 to


the right, OFF (as printed on the circuit board).

2. Press the Reset button at S1.

3. The 10-segment LED array (D1) will flash in waterfall


effect and then stop. The 7-segment LEDs (D34 and D35)
will show 8.8. while the reset process is underway. When
the reset process is complete, all 10 segments of the LED
Array (D1) will turn OFF, and the seven segment LEDs
will show a single line segment flashing in a circular
pattern clockwise.

4. Refer to section 3.8 and begin addressing the IQ-200 by


DIP switching the IQ number (1-111).

5. Set the communication protocol by following the


instructions in section 3.9 [Setting MODEM or Direct
Connect Configurations].

6. The system is now set to the default values.

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 39

3.6.1 Using the Ten-Segment LED Array

Two LED’s, located in the ten-segment array D1, indicate the


status of the supervised door circuits. Also the unsupervised
tamper, supervised egress inputs, and supervised alarm inputs
are annunciated in the LED array as listed below:

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 40

3.6.2 Expansion Board LED Arrays


4-Door Expansion Board (IQ-4) 8-Door Expansion Board
(IQ-8)

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 41

NOTE: Numbers in parentheses are the Sense Input Numbers.


The “D” Numbers are the corresponding LED’s assigned to
reflect the current status of each individual Sense Input.

3.7.1 Communicating with the IQ-200

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 42

The IQ-200 can communicate over a dialup MODEM, an


RS232 or an RS485 serial direct connection or LAN. In a
multi-drop IQ-200 configuration, the IQ-200 MUST
communicate via RS-485 protocol.

3.7.2 Reset the IQ Panel


Set dipswitches 1-8 (located at SW1) to OFF position as it is
etched on the IQ-200 PCB. Hit the reset switch at S1. This will
calibrate and reset data to default, all ten of the supervised
inputs on the IQ-200 PCB and the supervised Door Senses on
the 4/8-Door Cluster PCBs.

3.8 Addressing Individual IQs through the Dipswitches

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 43

The dipswitch is located at SW1, on the left of the board. There


are eight switches. For the binary number one (1), flip the
switch to the left. For zero (0), flip the switch to the right.

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 44

3.9 Setting MODEM or Direct Connect Configurations


PCSC supports the US Robotics 33.6/56K Sportster model for
MODEM communication. It is recommended that the
MODEM be powered up via an U.P.S. (Uninterruptible Power
Supply).

3.9.1 To set up the IQ for MODEM communication, configure


the
Dipswitch settings at SW1, as follows:

Example: MODEM connection (IQ-400, panel address is


#1)
SW1
On 1 Off 0
1 Set #1to ON Set theconfigurationandpress theReset buttonat S1. After the
2
3 (left), 2through sequenceof LEDs displays, set theIQ -400IDnumber (seeDIP
4 7toOFF SwitchingtheIQ -400Number). Ontheback of the USRobotics
5
6 (right). Set #8 modem, locatetheDIP switch. Set 1, 5and6inthe up position
7 to ON(left). and2, 3, 4, 7and8inthe down position.
8

NOTE: AT SW1, switch #8 must remain in the ON


position (left) for MODEM
communication.

3.9.2 To set up the IQ-400 for direct connect communication


(default), configure the Dipswitch settings at SW1, as
follows:

Example: Direct connection (IQ-400, Panel address is


#1)

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 45

SW1
On 1 Off 0
1 Set # 1 to Set the configuration and press the Reset button at S1. After the
2 ON (left), 2 reset, set the IQ-400 ID number (see DIP Switching the IQ-400
3
4
through 8 Number).
5 to OFF
6
7
(right).
8

NOTE: At SW1, switch #8 must remain in the OFF


position (right) for Direct Connect communication.

To communicate from an IQ-400 to the MODEM, two cables


must be fabricated: one from the MODEM to the IQ-400 and
another for the PC host to the MODEM.

NOTE: The ON/OFF designation is in reference to


the
labels printed on the IQ-400 PCB. Not the switch
itself!

4.1.0 Changing the Baud Rate


1. Set the switch (SW1) setting for the Baud rate and press
the
S1 Reset button. (Refer to next page).
2. Change the SW1 switch setting back to the IQ-200
number.
3. Request the IQ on-line in the Define Micro-LPM status
screen in the LiNC-NET software.

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 46

4.1.1 Baud Rate Settings

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 47

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 48

4.2 Status Lights and Dealing with Communication


Errors
4.2.1 Status Lights
The IQ-200 circuit board has 15 LEDs. The status of the LED
defines a certain activity or phase of IQ-200 functions. Card
processing and door sense status is indicated by the LEDs.

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 49

4.2.2 Communication Errors


Message at the PC What to Do

IQ-200 is not responsive Verify the following:

1. The red DC Power Indicator


LED (D2) is ON.

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 50

2. Verify that the ID number


corresponds to the IQ-200 at the
PC. (Check settings of switches
at SW1).
3. Check cabling.
(RS232/MODEM/RS485/Termina
l Server).
4. Remove the Battery for 5
minutes.
Reinsert battery and reset IQ panel.

4.2.3 Error Codes


The seven-segment LEDs, D34 and D35, will indicate certain
errors that can occur when processing cards. They also can
communicate “fatal” errors that could occur. The following
chart describes different error codes that are displayed by the
seven-segment LEDs:

D Warning Error Display Codes Possible What to Do


Problem
C0 Card Error: Parity check fail Bad Card or dirty Clean reader head
reader head and re-try
C1 Card Error: LRC check Bad Card or dirty Clean reader head
failed reader head and re-try
C5 Card Error: data length Check for correct Verify that the
mismatch format type correct reader
technology is
specified
CC Card Error: data conversion Check for correct Verify that the
format type correct reader
technology is
specified
CE Card Error: end-code not Bad card or dirty Clean reader head
found reader head and re-try
CF Card Error: facility code The site code is Load correct
invalid for this facility code or

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 51

site check cards


EC Hardware Configuration The IQ is not In LiNC-NET for
error configured Windows, select
correctly the Panel Setup
icon and the
Hardware file-tab
to verify that the
extension
adapters are
selected for this
IQ.

4.3 Controller Specifications

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 52

4.3.1 Microprocessor
The IQ-200 Controller is based on a
80C188EB microprocessor, operating at
16 MHz. The 80C188EB is a 16-bit
processor (internal operation) with an
eight-bit data bus. A 20-bit address bus
provides a 1M Byte addressing range.
Other features include three internal 16-
bit timers; interrupt controller (8529
equivalent), multiple programmable
chip select decoders with programmable
wait states, and two serial
communication channels.

4.3.2 LEDs and Dipswitches


Ten discrete LEDs are provided which
the microprocessor software can
individually control. Eight general-
purpose switches are provided for use
by the microprocessor software, and are
utilized for mode control, configuration
setting, ID selection, etc. In addition, a
Power ON LED and two “Reader
Active” LEDs are provided.

4.3.3 Two Seven-Segment LED Display

Error codes are displayed in


Hexadecimal format. Refer to the error
code section for listing of codes and
their meanings.

4.3.4 Real Time Clock


A real time clock (DS1302) with battery
backup is provided for time of day
information.

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 53

4.3.5 Serial Communication

Two serial communication ports are


provided by the IQ-200 controller.

• RS-485: Four wire (twisted pair)


interface which is optically isolated
from the controller.

-Provision for installing a


termination resistor is provided.

• RS-232: At P5 (RS232 DB9 –


MODEM). At P2 (RS232 Direct
Connect) – standard RS232
interface. A DB9 connector with AT
pinout is provided for an industry
standard RS-232 interface.

4.3.6 Power Supply


The IQ-200 controller requires +5VDC
for all logic. Relays, output drivers, etc.
require a +12VDC supply. An on-board
dc-dc converter accepts an external
voltage source of 10-26VDC, and
converts this unregulated source to the
required +5VDC. For an input voltage
range of 10-15 volts, the “+12VDC”
converts this voltage source to the
required +12VDC.

4.3.7 Battery Back-up Requirements

A 12 AH battery is recommended as a
back-up to the power supply, because it
is the largest battery that will fit in the
enclosure. The battery should be
connected to the power supply charger

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 54

in accordance with the manufacturer’s


instructions.

4.3.8 Factory Settings


At the factory the IQ is set as IQ #1,
communications as direct connect
(RS232/RS485) @ 9600 baud, with 120
Ohm resistor termination disabled (W5
jumper set at 1-2).

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 55

4.4 Proximity Card Reader


4.4.1 Reader Description

The proximity card reader is a radio frequency proximity


reader for Access Control Systems. The reader consists of a
transmit/receive antenna, associated electronics, and a
polycarbonate housing which encloses the antenna and the
electronics. The inside of the polycarbonate housing is plotted
with a two-part epoxy to protect the antenna and electronics
against the environment.

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 56

NOTE: The Reader is pre-compensated for mounting on a


metal doorframe; it can be mounted on any doorframe,
including aluminum and steel doorframes with
minimum loss in performance. However, the Reader
should not be framed with, or surrounded by, metal of
any kind.

4.5 IQ 4-Reader Expansion Module


The IQ-200 2-reader system can be expanded to a 6-reader
system by installing the 4-Reader Expansion Module. The
circuit board can be mounted below the circuit board in the
larger enclosures available from PCSC. Once mounted, the
circuit board is connected to the IQ-200 by installing a 50-pin
ribbon expansion cable from P1 on the 4-reader module to J1
on the IQ-200.

The 4-Reader Expansion Module allows the user to connect up


to 4 additional readers to the IQ-200. Each of the reader
interfaces support either a PCSC proprietary reader (4-wire
interface), or a Wiegand reader (5-wire interface). The
Expansion Module also provides an additional 4 interfaces for
each of the readers and the associated doors.

4.5.1 Power Supply

The 4-reader Expansion Module requires +5VDC for all logic.


Relays, output drivers, etc. require a +12VDC supply. The
+5VDC and +12VDC is provided to the module via the 50-pin
expansion cable, which connects plug P1 of the 4-door cluster
PCB to plug J1 of the IQ-200 board.

4.5.2 Door Sense LEDs

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 57

4 LEDs located at D21, D22, D23, and D24 indicate the status
of the Door circuits. Resistors must be installed at the door
contacts, the switches in place, door closed (normal state), in
order for the supervised inputs to function.

LED Status Chart:


• Sense Input #21 LED is D21
• Sense Input #23 LED is D22
• Sense Input #25 LED is D23
• Sense Input #27 LED is D24
NOTE: LEDs D17-D20 are not used in the IQ-600.

OFF Circuit is in normal/secure


state
ON Circuit is in an alarm
Condition state
Blinks once every 2 seconds Fault condition. Open
circuit
state
Blinks 1 time/second Fault condition. Short
circuit
state
Blinks 4 times/second Circuit is NOT calibrated and
NOT in a functional state

4.5.3 Four-Reader Expansion Board- Active LEDs

4 LEDs located at D61, D62, D67, D68 indicate the status of


the Reader circuits. When the LED blinks momentarily after a
card swipe, the system is processing the card data. The LED is
normally off.

Reader LED Status:

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 58

• Reader C LED is D61


• Reader D LED is D62
• Reader E LED is D67
• Reader F LED is D68

4.6 IQ 8-Reader Expansion Module


The IQ-200 2-reader system can be expanded to a 10-reader
system by installing the 8-Reader Expansion Module. The
circuit board can be mounted below the circuit board in the
larger enclosures available from PCSC. Once mounted, the
circuit board is connected to the IQ-200 by installing a 50-pin
ribbon expansion cable from P1 on the 8-reader module to J1
on the IQ-200.

The 8-Reader Expansion Module allows the user to connect up


to 8 additional readers to the IQ-200. Each of the reader
interfaces support either a PCSC proprietary reader (4-wire
interface), or a Wiegand reader (5-wire interface). The
Expansion Module also provides 8 additional interfaces for
each of the readers and the associated doors.

4.6.1 Power Supply

The 8-reader Expansion Module requires +5VDC for all logic.


Relays, output drivers, etc. require a +12VDC supply. The
+5VDC and +12VDC is provided to the module via the 50-pin

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 59

expansion cable, which connects plug P1 of the 8-door cluster


PCB to plug J1 of the IQ-200 board.

4.6.2 Door Sense LEDs

8 LEDs located at D17, D18, D19, D20, D21, D22, D23, and
D24 indicate the status of the Door circuits. Resistors must be
installed at the door contacts, the switches in place, door closed
(normal state), in order for the supervised inputs to function.

LED Status Chart:


• Sense Input #21 LED is D17
• Sense Input #23 LED is D18
• Sense Input #25 LED is D19
• Sense Input #27 LED is D20
• Sense Input #29 LED is D21
• Sense Input #31 LED is D22
• Sense Input #33 LED is D23
• Sense Input #35 LED is D24

4.6.3 Eight-Reader Expansion Board- Active LEDs

Eight LEDs located at D49, D50, D55, D56, D61, D62, D67,
D68 indicate the status of the Reader circuits. When the LED
blinks momentarily after a card swipe, the system is processing
the card data. The LED is normally off.

Reader LED Status:

• Reader C LED is D49


• Reader D LED is D50
• Reader E LED is D55

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 60

• Reader F LED is D56


• Reader G LED is D61
• Reader H LED is D62
• Reader I LED is D67
• Reader J LED is D68

4.7 Configuring your Host PC


1. Change host IP to be 192.168.168.3 in your computer’s
TCP/IP settings - This is the default Host IP address that
the IQ LAN uses for setup:
• Right mouse click on “My Network Places”
• Select: Properties
• Right mouse click on “Local Area Connection”
• Highlight Internet Protocol [TCP/IP] and Press
the Properties button.
• You will need to verify that you have “Use the
following IP address” selected.
See screen below:

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 61

• Enter 192.168.168.3 for the I.P. address


• Enter 255.255.255.0 for the Subnet mask
• Press the OK button
• Reboot the host computer if necessary.
Depending on you system you may or may not
have to do this.

4.8 RS 232 to RS 422/485 Converter

4.8.1 Introduction

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 62

The model ACON-01 is high speed RS 232 to RS 422/485


converter. It supports upto 115.2 Kbps baud rate over one or
two twisted pair. It allows RS 232 device to transmit data over
1.2 km distance to increase networking capability.

Figure 4.8.1 ACON D-01 RS 232 to RS 422/485 converter

4.8.2 Advantages of ACON-01

The advantage of the RS 232 to RS 422/485 converter over


other line drivers and modems is that it can also operate in
multipoint applications. Depending on the operating
environment, as many as 64 devices can be linked together
using twisted pair cable.

Inside the RS 232 to RS 422/485 converter optical isolation


circuitry converts electrical signal to light and back again. In
this way, the two electrical circuits are completely isolated
from each other, limiting the damage that could otherwise be
caused by power surges in the electrical signal.

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 63

4.8.3 ACON D-01 Specifications

Optical Isolation : 1.5 KV


Operation : Point to Point (RS422)
: Multi-Drop Full Duplex
: Multi-Drop Half Duplex
Speed : 1200 to 115 Kbps
Indications (LEDs) : Power, Tx, Rx
Power : 115VAC/230VAC/24VDC/SMPS

4.9 Switch Configuration

4.9.1 Dip Switch Settings for : Full Duplex Point to


Point

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 64

4.9.2 Dip Switch Settings for : Full Duplex Multidrop

4.9.3 Dip Switch Settings for : Half Duplex Multidrop

5.1.0 Enterprise Buildings Integrator (EBI)

5.1.1 The Versatility of EBI

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 65

An EBI system takes care of a building's security management,


building management, and fire monitoring. It is a one-window,
web-enabled system that allows you to control everything from
HVAC, lighting, and energy, to life-safety and security
subsystems, to financial and personnel records, environmental
controls, and supply chain databases.

EBI is used in a wide range of applications including:

• Large commercial buildings


• Telecommunications
• Industrial sites
• Casinos
• Education
• Healthcare
• Government
• Prisons
• Airports

Of course, EBI can also be tailored to suit other specialized


applications, and it is compatible with controllers from all the
major providers. The philosophy behind EBI is to provide an
open standard for integration and to embrace open technology.

It is fully integrated with Microsoft Windows 2000, with


industry networking standards. Standard TCP/IP network
topologies include LAN, WAN, serial, and dial-up access.

EBI is based around client-server architecture. A high-


performance real-time database is maintained by the server
(which can be redundant). This provides real-time information

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 66

to local or network-based (LAN or WAN) clients such as


Stations, or other applications such as spreadsheets or
relational databases. And because it is modular in design, EBI
is an extremely cost-effective and scalable solution.
Configurations can range from small single-node systems to
multi-server integrated systems, as shown in the following
figures:

Figure 2.1 Redundant-Server System with Security, Building and


Fire
Management

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 67

5.1.2 EBI and Security Management

The Security Manager option provides an affordable way of


ensuring the security of people, assets, and intellectual
property. Its comprehensive approach to access control and
security accommodates all of your security requirements
including:

• Efficient management of cardholder details


• Access card design and creation, including PhotoID
• Comprehensive control and monitoring of all cardholders
at your site, including shift management, guard tour, and
visitor management
• Prompt, intelligent alarms, including operator response
instructions and deadman timer

5.1.3 EBI and Building Management


The Building Manager option provides tools and data to better
manage the environment, resulting in energy efficiency and
significant cost savings. Maintenance staffs have, at their
fingertips, the functionality and information they need to
minimize maintenance costs, including:
• Scheduling
• Detailed HVAC information
• Alarm Pager
• Phone Control
• HVAC reports

5.1.4 EBI and Fire Management

The Life Safety option allows a Station (EBI's operator


interface) to monitor and test the building's fire panels. The
operator is provided with continuous information about the

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 68

building's fire protection systems and can actuate a fire alarm


or building evacuation from Station.
5.2.0 Honeywell EBI Server

5.2.1 Classification

The Honeywell EBI Server can be classified as follows:

1. Life Safety Manager


• Fire Controller
• Smoke Management Controller
2. Security Manager
• Access Controller
• Security Controller
• CCTV Switcher
3. HVAC
• EMS Control System
• Remote Systems
• N/w Control

5.2.2 EBI Hardware Components

• A PC configured as an EBI Server


• A no. of PCs configured as Stations
• A wide range of controllers, both Honeywell and third
party
• Communication Hardwares (Cable, Modems, and so on)
to connect our systems
• Printers to provide report

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 69

5.2.3 Server Redundancy

You can improve system availability with server redundancy.


In a redundant server system, EBI is installed on two
identically configured servers.

EBI uses software arbitration to determine which server acts as


primary. (With software arbitration, each server polls the other
over the network to determine whether the other server has
failed.)

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 70

Figure 5.2.1 Typical Redundant Server System

5.2.4 Distributed System Architecture

Distributed System Architecture (DSA) allows you to integrate


up to 10 servers into a single system. DSA is appropriate for:

• Logically separate EBI systems located in different parts


of a facility
• Geographically-dispersed systems, as shown in the
following figure, in which the servers are connected
through a WAN

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 71

Figure 5.2.2 Typical Geographically-dispersed System

5.2.5 Controller Interfaces

Controller interfaces enable EBI exchange data with


controllers by individually mapping memory locations in the
controllers to standard points in EBI. (EBI provides interfaces
for most types of controllers used in security and building
management.)
5.3.0 Controller-to-Server Connections

The way in which you connect a controller to the server


depends on several factors, such as the physical layout of your
site and the controller's communication ports.

5.3.1 Network Connections

If a controller has a network port, we can connect it directly to


the network, as shown in the following figure:

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 72

Figure 5.3.1 Controllers Connected Directly to the Network

5.3.2 Indirect Serial (Terminal Server) Connections

We can connect controllers to the network through a terminal


server. (A terminal server allows you to connect several
controllers to the network even though they only have serial or
parallel ports.) Most terminal servers also provide a range of
serial connection options, such as RS-232, RS-422 and RS-
485.

Terminal servers are particularly useful if we have a:

• Site-wide network, and you want to connect controllers to


the LAN- as shown in the following figure
• Geographically-dispersed controllers on a WAN

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 73

Figure 5.3.2 Typical System with Terminal Servers

5.3.3 Direct Serial Connections

If we have a small system, you can connect controllers to the


server's serial ports.

Note: We can add more serial ports to the server with a serial
adapter. An advantage of serial adapters is that they provide a
choice of interfaces, such as RS-422 and RS-485, which are
suitable for medium-distance links.

5.3.4 Terminal Servers and Server Redundancy

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 74

If we have redundant servers, we must use terminal servers to


connect controllers that only have serial ports. (Unlike the
controllers, terminal servers can automatically switch
communications to whichever server is running as primary.)

Figure 5.3.3 A Terminal Server in a Redundant Server


System

5.3.5 Modems

We can use modems to connect controllers located at remote


sites.
5.4.0 Stations

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 75

Station is EBI's user interface that presents information in a


graphical, user-friendly manner.

In general, Station runs on standard computers that are


connected to the server through the network. However, Station
supports most Windows-compliant peripherals such as touch-
screens and membrane keyboards with dedicated function
keys. (If you have an entry-level system, you can even use
Station on the server computer.)

5.4.1 Displays

Station uses displays to present information. Each display is, in


effect, a control panel that shows information about a particular
part of the system, and contains appropriate controls such as
buttons and scrollbars.

5.4.2 System Displays

EBI is supplied with a comprehensive set of system displays


that present information in a standardized manner.

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 76

Figure 2.8 A Typical System Display

5.4.3 Mobile Stations

If we have a wireless network we can use handheld devices


(mobile Stations) to access your EBI system.

Mobile Stations provide users with full Station capabilities —


they provide the same level of control as Station on a desktop
computer.

Mobile Stations connect to a Mobile Station Server which, in


turn, connects to the EBI server. (A Mobile Station Server is
loaded with both Station and Microsoft Terminal Services.)

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 77

Up to five mobile Stations can connect to a Mobile Station


Server.

5.4.4 Electronic Signatures

EBI's Electronic Signature option enables us to implement


electronic signatures for specified operator actions, such as
controlling particular points and acknowledging certain
messages. (Electronic signatures are the legally binding
equivalent of an operator's handwritten signature.)

For critical actions, we can configure them to require two


signatures.

Details about each action, including the operator name(s), date


and time are stored in the events database.

5.5.0 Operator Security

5.5.1 Areas

We can restrict access to your site by dividing it into areas, and


then assigning operators (and, if appropriate) Stations to
specific areas.

Areas are particularly useful in buildings that have several


tenants, and in large facilities where different operators have
responsibility for different parts of a facility.

Areas allow you to restrict operator/Station access to:


• Alarms
• Points
• Custom and cardholder detail displays

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 78

• Access levels
• Zones

5.6.0 Station Security


We can restrict access to Station using either operator-based or
Station-based security.

5.6.1 Operator-based Security

With operator-based security each operator has an operator ID


and a security level, and logs on to Station using the operator
ID and password.

Operator-based security provides six security levels, each with


different privileges: Lvl1, Lvl2, Oper, Supv, Engr, and Mngr
(shown in order of increasing security level).

We can use operator-based security to restrict:


• Control of points
• Access to specific areas
• Access based on day and time
• Access to specific Stations

We can also specify an "inactivity time", which, if exceeded,


automatically logs off the operator.

5.6.2 Station-based Security

Station-based security does not require an operator ID or


password to log on to Station with Oper security level.

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 79

However, passwords are required to change to higher security


levels in order to perform configuration and administration
tasks.

Security is managed on a Station-by-Station basis, enabling a


particular Station to access designated parts of the database.

5.6.3 Duress Login

As an added security precaution, an operator, under hostile


circumstances, can log on using a duress login and set off a
silent alarm in order to alert other operators.

5.7.0 Exchanging Data with Other Applications


EBI includes a number of options for exchanging data with
other applications.

5.7.1 Microsoft Excel Data Exchange

Microsoft Excel Data Exchange allows us to capture real-time


point parameter and history data, and display it in a Microsoft
Excel spreadsheet. The captured data can be static or
dynamically updating.

We can capture the data using either the Microsoft Excel Data
Exchange Wizard, or through cell formulas. After capturing the
data, we can create charts to display and analyze data with
Microsoft Excel's toolset. We can also link the values into
other OLE-enabled applications.

Microsoft Excel Data Exchange provides:

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 80

• Read/write access to point parameter values


• Read access to history data
• Read/write access to server database files (user files)

5.7.2 ODBC Data Exchange

ODBC Data Exchange enables two-way exchange of data


between the EBI database and an ODBC-compliant database
(either local or remote). It is typically used to periodically
transfer data for billing customers.

5.8.1 Responding to Alarms and Events


EBI generates alarms and events when it detects specified
changes in the field.

Alarms indicate unusual conditions, such as an unexpected


change in temperature or movement in a secure area, that
require operator action. The alarm remains until the condition
that triggered the alarm returns to normal and someone
acknowledges the alarm.

All changes in the system, for example, alarm changes,


operator changes, and security level changes, are logged as
events.

The following figure shows how EBI responds to a typical


event (in this case, a card being presented to a card reader).

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 81

Figure 3.1 Alarm/Event Generation


All alarm conditions are recorded in the event log, including
when an alarm is generated, when it returns to normal, and
when it is acknowledged.

Alarms are generally assigned different priorities to help you


view critical alarms first. The priorities are: Urgent, High,
Low, and Journal. Journal alarms are not shown on the Alarm
Summary but are recorded as events.

Operators can:

• View events and alarms on Stations. The Status Zone,


beneath the display, always shows the most recent (or
oldest) and highest priority alarm that has not been
acknowledged.
• Print a summary of alarms and events to an alarm/event
printer. All alarms and events are recorded in an
alarm/event journal.

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 82

Figure 3.2 A Typical Alarm Summary Display


5.8.2 Managing Operator Response to Alarms

The Advanced Alarm Management option is used to provide


operators with a series of steps to follow for a particular alarm.
When an operator acknowledges an alarm, an alarm instruction
display appears. In order to close the alarm, the operator must
complete an alarm response display.

5.9.0 Analyzing System Data


We can use reports and trends to analyze system data.

5.9.1 Reports

EBI includes a comprehensive set of standard reports that are


useful for analyzing and monitoring alarms, events, points,

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 83

cards, and so on. If necessary, we can create our own custom


reports using tools such as Microsoft Access or Crystal
Reports.

We can request reports when we need them, or produce them


automatically at pre-defined times. We can also specify a
report's destination: either a printer or display.

Archiving Point History and Events

5.9.2 Point History Archiving

EBI stores point history data in the server for a limited time,
which is determined by the default retention periods for the
history interval being used.

If we want to keep point history data for longer periods, we


must archive the data to off-line media, such as tape or
removable disk.

5.9.3 Event Archiving

EBI stores every event, such as point status changes or operator


actions, in an event database for a specified time.

Event archiving enables us to archive these events to disk or


tape, where they can be stored for future retrieval. For
example, we can restore event archives so that they can be
included in standard reports.

Event archiving can be scheduled automatically, or an alarm


can be generated to alert the operator to archive the events.

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 84

6.0 Cardholder Management Concepts


Access to a site or installation is usually controlled using
access cards. Anyone who requires access has a card that is
imprinted with identification details. When they use the card
(at a door, for example), the access controller that has been
downloaded with the EBI cardholder database checks their
access permissions, and grants or denies access. Cardholders
can only access an area if they have the required permissions
(and are seeking access during the appropriate shifts).

In EBI, access rights are easy to allocate and easy to maintain,


and you can define your own fields for cardholder information.
You can even design and print your own access cards (with
photos, signatures, logos, and so on).

6.1 Cardholder Information in the Server Database

There are two kinds of information required for a cardholder:


personal and access.
− Personal information includes the cardholder name, card
identification number, and other optional information
such as employee number, department, phone number,
photographic images, and so on.

− Access information for a cardholder includes the access


levels assigned which indicates the sections of the facility
that can be accessed by that individual. The current state
of the card (active, lost, stolen, or inactive) is also
entered.

Cardholder information is entered into the server database


using special card configuration displays on Station. The

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 85

following figure shows the card details display for an SE card


assigned to a cardholder:

Figure 4.1 Card Details Display


6.2 Integrated PhotoID
The Integrated PhotoID feature is used to create site's access
cards. We can design the layout of the card (including the
cardholder's photograph, signature, and other personal details)
and then encode information onto the card using magnetic
stripes or barcodes.

The details of all access cards created using Integrated PhotoID


are saved as part of the cardholder database. In addition to the
convenience of only having to enter information once, we have

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 86

a central location from which we can create reports on


cardholder information. This is particularly useful if we are
using Integrated PhotoID from a remote Station.

Integrated PhotoID can be used with a wide range of cameras,


both digital and video.

6.3 Visitor Management


The Visitor Management feature enables us to track and report
on visitors to the facility. The visitors can be given a temporary
access card.

The information and permissions associated with visitor cards


is much the same as regular access cards. The major difference
is that visitor cards have a limited life span. We can set up the
card so that it is automatically valid for a particular period —
for example, enabled when the visitor is due to arrive, and
disabled when they are due to leave. And because cardholder
details are saved independently of the card, we don't have to re-
enter the details of regular visitors at each visit. Instead, we can
simply assign a new card based on the existing details.

6.4 Understanding Supervisory Control


The term "supervisory control" means control that originates
from EBI (whether by an operator or a program).

Supervisory control works by changing the values in


controllers that are associated with field devices. Usually

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 87

control is performed by the internal logic of controllers. An


example of this is the remote locking of a door.

Supervisory control works as follows:

1. A new value is entered by an operator (manual mode) or


an EBI program (automatic mode).
2. The server relays the new value to the controller.
3. The controller outputs the control value to the field
device.

Figure 4.2 The Process of Supervisory Control


6.5 Server Control of Access
We can configure the server so that it automatically controls
the commencement and expiry of access card validity. Using

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 88

the current system date, the server checks to see if there are
existing cardholders whose cards have reached either their
commencement date or their expiry date. When found, the
server changes the status to one of "active" or "inactive" and
the modified card data is downloaded to the controllers.

6.6 Downloading Access Information to the Field


Device
Access information is configured on displays and then
downloaded to the access controllers providing the controllers
with up-to-date information. You can choose to download only
single components, such as a new or deleted card, or all access
information. Downloading all information may take some time
and, as access to various locations in the site may be denied
during the download, should only be performed during off-
peak times and when necessary.

7.1.0 Access Control Concepts

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 89

7.1.1 Card Readers

A card reader is a hardware device that decodes the encrypted


information stored on an access card. A card reader connects to
an Access Controller.

Normally card readers control doors, but they can also control
turnstiles, lifts, gates, or any other physical devices designed to
control access. EBI includes interfaces to a wide range of
makes and models of card reader and access controller.

The decision to enable or deny access to a given card is made


locally by the access controller itself, using the configuration
data EBI downloads to it.

7.1.2 Access Points

An access point represents a card reader which defines an entry


or exit point to a physical space. Access points are used to
monitor card traffic at the card reader by recording the card
number and cardholder name, and whether or not access was
granted.

If two card readers were associated with one physical door —


one to control entry and one to control exit — two access
points would be used to represent these two card readers.

7.1.3 Floor Points

A floor point represents a particular floor in a building served


by elevators. Floor points restrict access to certain floors of a
building through control of the elevators.

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 90

A floor point is a specialized status point. A floor is either in


the "access" state, allowing anyone to stop at the floor, or in
the "secure" state, where only cardholders with the required
privileges can access the floor.

7.1.4 Zones

A zone represents a physical space which is totally enclosed by


card readers. That is, in order to enter a physical space, one
must use an access card at a card reader which allows entry to
that space. It should not be possible to enter this physical space
without using a card reader.

A zone consists of a list of access points which represent the


card readers which allow entry to the physical space. An access
point can only be included in one zone, because a card reader
can define the entry into only one physical space.

We can assign up to 128 access points to a single zone. The


points can be those associated with physical doors or with
elevator floors. Zones are paired with time periods to create
access level definitions for site entry and exit control.

Access points are assigned to the same zones if they define


entry into the same physical space. In the following figure, for
example, doors C, D, and F define entry into the Payroll zone.

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 91

Figure 4.4 Zones and Zone Doors

7.1.5 Time Periods

A time period represents a period during which a person may


have access to a physical space. For example, the time period
Working Hours might be made up of days Monday to Friday
and times 9:00am to 5:00pm, excluding holidays.

Time periods are configured and modified on Time Period


Configuration displays. The time period details depend on the
type of access controller we use: all controllers of the same
type store the same time period definitions.

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 92

7.1.6 Access levels

An access level represents a particular set of access control


criteria.

Up to eight access levels are assigned to cards in order to


specify where and when the cardholder is granted access. The
access level is made up of a number of pairs of zones and time
periods, where the zone defines the physical space and the time
period defines the times at which that physical space may be
accessed.

For example, cards belonging to Managers might be assigned


an access level which allows access to all zones during
working hours but cards belonging to Senior Managers might
be assigned an access level which allows access to all zones for
24 hours per day.

7.1.7 Occupancy Reporting

Once the facility is divided into zones, we can report on which


people are currently in a particular zone.

This works best if both entry and exit points to the zone are
controlled by card readers. This enables EBI to determine
when people have entered a zone and when they have exited it,
either by entering another zone or by exiting the whole facility.
Without dual readers, you can tell only which zone a person
last entered; until they present their card to enter another zone,
you cannot tell if they have left.

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 93

7.1.8 Cardholder Reporting

Using EBI's pre-configured reports, you can produce a number


of cardholder reports, including:

• Card Usage
• Cardholder Details
• Cardholder List
• Cardholder Zone Summary

7.1.9 IQ-200 System Capacities


Cardholder Capacity: 8,000 (20,000 w/Memory
Expansion)
Time Periods: 32
Holiday Time Periods: 32
Holiday List: 365 Days
History Transactions: 4,000 regardless of memory size

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 94

8.0 Closed Circuit Television (CCTV)


8.1.0 Cameras

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 95

There are three different types of cameras that are most


commonly used now a days:
1. Film Camera
2. Photographic
3. Video Camera

8.1.1 Camera Specification

Following are the important features of a Camera:


1. Resolution
2. Sensitivity
3. S/N Ratio
4. Chip Type
5. Camera Voltage
6. Operating Temperature

Among all the above, the first two features, i.e. Resolution and
Sensitivity are very important.

Note: Resolution generally depends on the no. of pixels in


CCD
Chip.

More be the no. of pixels, higher will be the Resolution and


hence better picture quality. The lines may be Vertical and
Horizontal.

Vertical Resolution = No. of Horizontal Lines


Horizontal Resolution = No. of Vertical Lines

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 96

8.1.2 Bandwidth Dependency of Resolution of a


Camera

e.g. - If the bandwidth is 5MHz, the Camera resolution will be


5*80 = 400 lines.

8.1.3 Typical Resolutions of Cameras

Mono Chrome Color Cameras


Cameras
Low Resolution 380-420 Lines 330 Lines
High Resolution 570 Lines 470 Lines

Note: Resolution and Sensitivity are inversely related, i.e. if


Resolution is increased Sensitivity decreases and vice-
versa.

8.2.0 Camera Installation


(Dome Shaped Stationary/Fixed Camera)

8.2.1 Power Supply

An Adapter (SMPS) with a very constant 12V, 500mA supply


is used to power the Camera. This specific adapter is used to
minimize the ripple factor (ac in dc) and to avoid the voltage
fluctuations. It also provides us the better camera reception.

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 97

8.2.2 Select switch description

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 98

FLS/OFF : Flickerless ON, OFF


AWB/HOLD : White Balance AUTO, HOLD
AGC/ON : Auto max gain control ON, OFF
BLC/OFF : Backlight compensation ON, OFF
ELC/DC : Electronic Light Control lens/DC Iris
lens

8.2.3 Connections

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 99

8.3.0 Digital Video Recorder(DVR)

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 100

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 101

Main Difficulties Encountered

The various difficulties encountered were as follows:

Limitations

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 102

Future Scope and Improvement

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 103

Epilogue

It gives me immense pleasure and a sense of satisfaction at


having accomplished what I set out to do at the beginning of
the semester. This has been an enlightening and enriching
experience to be associated with this project under the
guidance of Mr. Inderjeet Singh, RSM(North), Honeywell
Automation India Limited, New Delhi. During the course of
this work we made a number of achievements and learnt a lot
of lessons.

Some of our achievements are as follows:

• Learning about the basics of BMS, i.e. Building


Management System
• Learning about the IQ-Series Controllers, i.e. Access
Control System
• Learning about the CCTV, i.e. Closed Circuit Television

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 104

• Learning to work efficiently with EBI, i.e. Enterprise


Buildings Integrator
• Learning about the installation of Cameras and DVR
Commissioning

Some of the lessons learnt are:

• Choose a platform that you are familiar with


• Plan your steps carefully
• Assigning priorities to various tasks of the project
• Deadline should be followed strictly
• Working together in and as a team

BIBLIOGRAPHY

The following books and manuals have been referred during


the course of the development of my project:

Manuals Referred:-

1. IQ-200 Intelligent Access Control System


Installation Manual
33-10036-001
2. IQ-400 Intelligent Access Control System
Installation Manual
33-10057-001
3. Enterprise Buildings Integrator (EBI)
Overview
4. Enterprise Buildings Integrator (EBI)
Operators Guide

Honeywell Automation India Limited, New Delhi


Access Control System and CCTV 105

5. Digital Video Recorder (DVR)


HNDR Series
User’s Guide

Books Referred:-

1. Logic and Computer Design Fundamentals


- M. Morris Mano, Chrles R. Kime
2. Advanced Microprocessors and Peripherals
- A K Ray, K M Bhurchandi
3. An Introduction to Analog & Digital Communication
- Simon Haykin

Honeywell Automation India Limited, New Delhi

Você também pode gostar