1 / 32

Next Generation Controllers January 2013

Next Generation Controllers January 2013. Next Generation Security Solutions. Stand Alone Systems All in one Host Based Systems Distributed Intelligence Architecture Transactions are processed locally Reader (s) and Door (s) Connections Alarm and Output Connections

vielka-buck
Download Presentation

Next Generation Controllers January 2013

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Next Generation ControllersJanuary 2013 Next Generation Security Solutions

  2. Stand Alone Systems All in one Host Based Systems Distributed Intelligence Architecture Transactions are processed locally Reader (s) and Door (s) Connections Alarm and Output Connections Master Controller Architecture Communicates to “sub” controllers Sub Controllers Reader Connection (s) Door Connection (s) Alarm and Output Connections Background:Current Security System Architectures

  3. Background:Distributed Intelligence System Architecture

  4. Background:Typical Master Controller Architecture

  5. Distributed Intelligence ArchitectureTypical Security Architecture Partial Failure

  6. Background:Typical Master Controller Total Failure

  7. Background:Typical Master Controller Total Failure

  8. Summary • Current Systems have a vulnerability • Partial or Total Depending on the Architecture • Controller Failure • Everything within the controls are affected • Distributed Intelligence has the least impact • Master Controller Architecture has Total Failure • Communication is a point of Vulnerability

  9. Introducing:The Next Logical Evolution of Systems…

  10. Virtual Point Architecturewith Fault Tolerance Capabilities

  11. Fault Tolerance Architecture Is a means of System Recovery utilizing “Automated System Reconfiguration” provided through Dynamic Network Architecture (DNA) with little or no impact on system security or operations upon a failure within any of the components of the system.

  12. Fault Tolerant Architecture • Eliminates “Single Point of Failure” • Ability to Automatically“Recover” upon failure due to: • Primary or Secondary Communication Failure • Hardware Failure of a FTC (s) • Firmware Failure • Real-time Dynamic Network Architecture • Automatically “takes” over the duties of a failed FTC • Provide 100% Distributed Intelligence • Real-time decisions are made by the FTC • Hydra Protocol • FTC Network Administrator • Peer to Peer • Database Management • Eliminates System Failure!!! • Eliminates “Emergency Calls”

  13. FT Architecture Components • Host System (LiNC-NXG, Plus, XS, EBI*) • Fault Tolerant Controller (FTC) • Supports 16-32 DIM (Door Interface Modules) • 100% Distributed Intelligence • Global I/O • Global Entry-Exit • Door Interface Modules • DDM – 2 Reader Controller • SDM – 1 Reader Controller

  14. Fault Tolerant ArchitecturePowered by Hydra

  15. Fault Tolerant (FT) Architecture powered by Hydra

  16. Fault Tolerant (FT) Architecture with Hydra Protocol Dual Door Module REX Door Status Door Lock FTC 1 FTC 2 Host PoE Switch to “n” numberof Door Controllers Door Readers

  17. Fault Tolerant (FT) Architecture with Hydra Protocol DDM Command and Control routed from FTC 1 to FTC 2 REX Door Status FTC 1 (Fails) FTC 2 Host PoE Switch to “n” numberof Door Controllers Door Readers

  18. Fault Tolerant (FT) Architecture with Hydra Protocol Command and Control Automatically routed to FTC “n” Dual Door Module FTC 1 (Fails) FTC 2 (Fails) FTC 3 FTC 4 Door Readers to “n” numberof Doors

  19. Communication Routing Architecture Utilizing Secondary or Tertiary Paths

  20. FT Architecture with XBee PRO DigiMesh

  21. XBee Pro DigiMesh • Wireless Communication • Approved for use in “All Countries” • 100 meters within buildings • Over 1K meters line of site communication • Auto setup of Mesh Network • Uses other XBee Pro devices as relay points • More XBee Pro Devices, more Robust

  22. FT Architecture with XBee PRO DigiMesh Command and Control routed from FTC 1 to FTC 2 on Primary Communication Port DDM REX Door Status Comm. Fails FTC 2 Host PoE Switch to “n” numberof Door Controllers Door Readers

  23. FT Architecture with XBee PRO DigiMesh Command and Control via XBee Pro DigiMesh DDM REX Door Status Primary Ethernet Communication Failure Host PoE Switch to “n” numberof Door Controllers Door Readers

  24. FT Architecture with XBee PRO DigiMesh Command and Control via XBee PRO DigiMesh DDM REX Door Status Ethernet and FTC 1 Failure Host PoE Switch to “n” numberof Door Controllers Door Readers

  25. Fault Tolerant Controller (FTC) • 32 Bit RISC Technology • Open Systems Operating System • Linux • Communication • Ethernet (Primary) • Ethernet or PoE (Primary or Secondary) • Wireless - XBee PRO DigiMesh (Tertiary) • 7 Segment Real-Time Status Display • VFD Status Display (optional FTC only) • Clique Communication and Status Information

  26. Fault Tolerant Controller Capabilities • FTC • 100% Distributed Intelligence • All Real-time Decisions • All Card Database • Global Anti-Passback (No Host) • Global Input/Output Linking (No Host) • “Hydra” Protocol • Peer to Peer • Host to FTC, FTC to FTC, FTC to DDM and SDM • FTC Network Administrator • Database Management and Synchronization • Communication Path Management • Firmware Administrator • Supervised Tamper protection • CEPAS Card Support • 100% TWIC, PIV and FIPS Capable (HSPD Government Regulations)

  27. FTC Capacities • Cardholders • 20,000 – 250,000+ • 12 or 24 Digit Card Numbers • Compatible with any card standards • CEPAS, PIV,TWIC, etc. • History Transactions • 20,000 – 250,000+ History Transactions • 1 Year of Holidays

  28. Dual Door Module (DDM) • 32 Bit RISC Technology • Open Systems Operating System • Linux • Communication • Ethernet (Primary) • Ethernet or PoE (Secondary) • Wireless - XBee PRO DigiMesh (Tertiary) • 5 State Supervised Monitoring • A/D Sense Input Technology • Supervised Readers • Automatic Calibration for Cable Distance and Size • Hydra Protocol

  29. Single Door Module (SDM) • SDM • All in One (Controller and Reader, shown) • Controller Only • Power over Ethernet (PoE) • Single Communication Port • Supports - One Reader • REX, Door Status, Lock Output for 1 door • Hydra Protocol SDM -ERP40

  30. Advantages to “FT Architecture” • World’s Most Reliable Security System • Active/Active and Active/Passive Topologies • No Degradation of system performance • No Degradation during routine maintenance • “Failures” are not an immediate Emergency • Automated Firmware Authentication and Updates • Authentication Protocol • PCSC is the Only Provider of FT systems • Patented • Competitive Edge

  31. Fault Tolerant Controller Features • All the Features of IQ/SIM/ULT series Controllers • Increase Authorization Groups per Cardholder to 12 (4) • Global Entry/Exit • Timed Anti-Passback • Global I/O • Card Activation and De-Activation • Date and Time • “Stale Cards” Access Denial • “Short” and “Long Term” Values • Enterprise Cards, Vacation, etc.. • Escort Definition by Cardholder and Reader • Security Threat Levels (4) • 24 (8 X 8) Authorizations Groups per Cardholder

  32. Questions?

More Related