132
Access Control System and CCTV Project Report on Access Control System(ACoS) and Closed Circuit Television(CCTV) Submitted By Mayank Kumar Reg. No. : 200312056 In partial fulfillment of requirements for the award of degree in Bachelor of Electronics & Communication Engineering (2006-07) Under the Project Guidance of Honeywell Automation India Limited, New Delhi 1

Project Report

Embed Size (px)

Citation preview

Page 1: Project Report

Access Control System and CCTV

Project Report on

Access Control System(ACoS) and Closed Circuit Television(CCTV)

Submitted By

Mayank KumarReg. No. : 200312056

In partial fulfillment of requirements for the award of degree inBachelor of Electronics & Communication Engineering

(2006-07)

Under the Project Guidance of

Mr. Inderjeet SinghRegional Service Manager (North), HBS

Honeywell Automation India Limited86,1st Floor,Okhla Phase -І І І

New Delhi-110020

Honeywell Automation India Limited, New Delhi

1

Page 2: Project Report

Access Control System and CCTV

Certificate

This is to certify that Mayank Kumar (200312056) worked in our

organization from 15.01.2007 to 15.05.2007 and has successfully completed

the project on “Access Control System & CCTV” of the requirements for the

award of the degree of Bachelor of Electronics & Communication

Engineering of Sikkim Manipal Institute of Technology under our

supervision and guidance.

Project Guide

Address with Seal and Date

Honeywell Automation India Limited, New Delhi

2

Page 3: Project Report

Access Control System and CCTV

ELECTRONICS & COMMUNICATION ENGINEERING DEPARTMENT

SIKKIM MANIPAL INSTITUTE OF TECHNOLOGYMAJITAR, RANGPO, EAST SIKKIM – 737132

Organization and Personnel Certificate

This is to certify that Mayank Kumar (200312056) worked in our

organization from 15.01.2007 to 15.05.2007 and has successfully completed

the project on “Access Control System & CCTV” in partial fulfillment of the

requirements for the award of the degree of Bachelor of Electronics &

Communication Engineering of Sikkim Manipal Institute of Technology

under our supervision and guidance.

Departments of E&C Project Head

of Sikkim Manipal Institute of Technology

Majitar, Rangpo Address with Seal and Date

Sikkim – 737132.

Honeywell Automation India Limited, New Delhi

3

Page 4: Project Report

Access Control System and CCTV

ACKNOWLEDGEMENT

I would like to express my deepest appreciation to Honeywell Automation India Limited, New Delhi for providing me with such a wonderful opportunity to do my major project. My special gratitude goes to the Dean sir without whom I would have never been able to do this project and I would also like to thank my project guides Er. Md. Mosharraf Jamal, Er. Vaibhab Agarwal for being a constant support all through and helping me in a number of ways. And also, I would like to thank all the staffs of Honeywell Automation India Limited, who were so amiable and helpful.

I would also like to extend my heart felt thanks to my supervisor and reader from SMIT my college, Mrs. Radhika Purandare of Electronics & Communication Engineering Department. Last but not the least the whole Electronics & Communication Engineering Department for giving me the opportunity to work in such a wonderful organization like this and providing me with such a good platform to gain experiences.

Honeywell Automation India Limited, New Delhi

4

Page 5: Project Report

Access Control System and CCTV

ABSTRACT

As a part of our B.Tech course, we need to undergo an industrial training of minimum four months duration in our final semester.

The Head of Electronics and Communication engineering department, Dr. R.N.Bera suggested me to work on the design and implementation of Building Management System. He explained me about the growing trend of Life Safety Management and Security Systems. I found it very interesting and gladly accepted it as the subject of my project. It was a very exciting and learning experience of working on “Access Control System and CCTV ” and I came to know a no. of useful and interesting concepts related to the Building Management System.

I have followed the IEEE standard to document the working experience.

Honeywell Automation India Limited, New Delhi

5

Page 6: Project Report

Access Control System and CCTV

Contents

1. Introduction1.1 Building Management System ……………….. 111.2 What is a BMS? .……………….. 131.3 Advantages of BMS ………………… 15

2. Modbus Protocol2.1 Introduction ………………… 162.2 RS 232 ………………… 172.3 RS 485 ………………… 18

3. IQ-Series Intelligent Access Control System3.1 Board Diagrams3.1.1 The IQ-200 Printed Circuit Board Wiring Diagram …...... 203.1.2 The IQ-400 Printed Circuit Board Wiring Diagram …….. 213.1.3 Four-Door Expansion Board ………….. 223.1.4 Eight-Door Expansion Board ………….. 233.2 Jumpers Specifications of IQ-200

3.2.1 Jumper W1 ……………………….. 24 3.2.2 Jumper W2 ……………………….. 243.2.3 Jumper W3 ……………………….. 243.2.4 Jumper W4 ……………………….. 253.2.5 Jumper W5 ……………………….. 263.2.6 Jumper W6 ……………………….. 26

3.3 IQ with Expansion Board ...................................... 273.4 Installing Power ……………………….. 28

3.4.1 Installing Power- 3.0 Amp …………… 293.4.2 Installing Power- 6.0 Amp …………… 30

3.5 Resetting the IQ-200 to Default Values ........... 313.6 Description of LED Arrays

3.6.1 Using the Ten-Segment LED Array ……… 323.6.2 Expansion Board LED Arrays ……… 33

3.7.1 Communicating with the IQ-200 ............ 343.7.2 Reset the IQ Panel ............ 34

Honeywell Automation India Limited, New Delhi

6

Page 7: Project Report

Access Control System and CCTV

3.8 Addressing Individual IQs through the Dipswitches .......... 353.9 Setting MODEM or Direct Connect Configurations

3.9.1 MODEM communication …………… 363.9.2 Direct connect communication …………… 36

4.1.0 Changing the Baud Rate …………… 374.1.1 Baud Rate Settings …………… 384.2 Status Lights and Dealing with Communication Errors

4.2.1 Status Lights …………… 39 4.2.2 Communication Errors …………… 404.2.3 Error Codes …………… 40

4.3 Controller Specifications4.3.1 Microprocessor ……………………………… 424.3.2 LEDs and Dipswitches ……………………………… 424.3.3 Two Seven-Segment LED Display ………………….. 424.3.4 Real Time Clock ……………………………… 424.3.5 Serial Communication ……………………………… 434.3.6 Power Supply ……………………………… 434.3.7 Battery Back-up Requirements ………………………... 434.3.8 Factory Settings ……………………………… 444.4 Proximity Card Reader

4.4.1 Reader Description ………………………… 454.5 IQ 4-Reader Expansion Module

4.5.1 Power Supply ………………………… 46

4.5.2 Door Sense LEDs ………………………… 46

4.5.3 Active LEDs ………………………… 474.6 IQ 8-Reader Expansion Module

4.6.1 Power Supply ………………………… 48

4.6.2 Door Sense LEDs ………………………… 48

Honeywell Automation India Limited, New Delhi

7

Page 8: Project Report

Access Control System and CCTV

4.6.3 Active LEDs ………………………… 494.7 TCP/IP Configuration of Host ………………………… 504.8 RS 232 to RS 422/485 Converter

4.8.1 Introduction ………………………… 51

4.8.2 Advantages of ACON-01 ………………………… 51

4.8.3 ACON D-01 Specifications ………………………… 52

4.9 Switch Configuration4.9.1 Full Duplex Point to Point ………………… 534.9.2 Full Duplex Multidrop ………………… 534.9.3 Half Duplex Multidrop ………………… 53

5.1.0 Enterprise Buildings Integrator(EBI)5.1.1 Versatility of EBI ………………… 545.1.2 EBI and Security Management ………………… 565.1.3 EBI and Building Management ………………… 565.1.4 EBI and Fire Management

5.2.0 Honeywell EBI Server5.2.1 Classification ……………………….. 575.2.2 EBI Hardware components ……………………….. 575.2.3 Server Redundancy ……………………….. 585.2.4 Distributed System Architecture …………………. 595.2.5 Controller Interfaces …………………. 59

5.3.0 Controller-to-Server Connections5.3.1 Direct Connections …………………………

605.3.2 Indirect Serial Connections …………………………

605.3.3 Direct Serial Connections …………………………

61

Honeywell Automation India Limited, New Delhi

8

Page 9: Project Report

Access Control System and CCTV

5.3.4 Terminal Servers ………………………… 62

5.3.5 Modems ………………………… 625.4.0 Stations

5.4.1 Displays ………………………… 63

5.4.2 System Displays ………………………… 63

5.4.3 Mobile Stations ………………………… 64

5.4.4 Electronic Signatures ………………………… 655.5.0 Operator Security

5.5.1 Area ………………………… 655.6.0 Station Security

5.6.1 Operator-based Security ………………………… 66

5.6.2 Station-based Security ………………………… 66

5.6.3 Duress Login ………………………… 67

5.7.0 Exchanging Data with other Applications5.7.1 Microsoft Excel Data Exchange ………………….. 675.7.2 ODBC Data Exchange ………………….. 67

5.8.0 Alarms and Events5.8.1 Responding to Alarms and Events ……………..

685.8.2 Response to Alarms ……………..

705.9.0 Analysing System Data

Honeywell Automation India Limited, New Delhi

9

Page 10: Project Report

Access Control System and CCTV

5.9.1 Reports ………………………………. 70

5.9.2 Point History Archiving ………………………… 70

5.9.3 Event Archiving ………………………………. 716.0 Cardholder Management Concept

6.1 Cardholder Information in Server Database ………. 71

6.2 Integrated PhotoID ………………………… 73

6.3 Visitor Management ………………………… 73

6.4 Understanding Supervisory Control …………….. 74

6.5 Server Control of Access ………………………… 75

6.6 Downloading Information to Field Devices ………. 757.1.0 Access Control Concepts

7.1.1 Card Readers ………………………………. 76

7.1.2 Access Points ………………………………. 76

7.1.3 Floor Points ………………………………. 76

7.1.4 Zones ………………………………. 77

7.1.5 Time Periods ………………………………. 78

7.1.6 Access Levels ………………………………. 79

7.1.7 Occupancy Reporting ………………………………. 79

Honeywell Automation India Limited, New Delhi

10

Page 11: Project Report

Access Control System and CCTV

7.1.8 Cardholder Reporting ………………………………. 79

7.1.9 IQ-200 System Capacities ………………………… 808.0 Closed Circuit Television(CCTV)

8.1.0 Types of Camera ………………………… 81

8.1.1 Camera Specification ………………………… 81

8.1.2 Bandwidth dependency of Resolution of Camera …. 82 8.1.3 Typical Resolutions of Camera ……………. 82

8.2.0 Camera Installation8.2.1 Power Supply ……………………………….

82 8.2.2 Select switch description ………………………… 83

8.2.3 Connections ………………………………. 83

Honeywell Automation India Limited, New Delhi

11

Page 12: Project Report

Access Control System and CCTV

Introduction

My project mainly deals with the installation and commissioning of the Building Management System of Sapient Corporation Private Limited, Gurgaon. The key objective of this project is to substantially reduce the Operation, Maintenance, Consumables, Spares and Energy Consumption costs and to achieve significantly higher savings than the minimum.

Building Utilities are used primarily to provide a hospitable environment for occupants and equipment within the space. Significant building utilities are: Access Control System, Fire Alarm System, Close Circuit Television (CCTV), Heating Ventilation and Air-Conditioning (HVAC), Lighting Control, electric power systems, water management systems, etc. Each one of these is affected by energy efficiency considerations, but

Honeywell Automation India Limited, New Delhi

12

Page 13: Project Report

Access Control System and CCTV

is also greatly affected by intelligent building design concerns. Generally, any Building Management System comprises of the following main functional components (devices) :

Sensing devices: (temperature sensors, smoke detectors, etc) to sense conditions and control devices (valves, on-off relays, etc).

Digital controllers: for point processing, implementation of designed control strategies & incorporation of energy management.

Central Operator Station(s): for centralized monitoring, controls, reporting and information management for all employed sub systems.

The Building Management system at Sapient Corporation Private Ltd.,Gurgaon consists of twenty Access Controllers (Direct Digital Controller) distributed at eighteen floors and the EBI server located at the Control room in the second floor. The RS232/RS485 converter is used to provide communication through all the twenty IQ-Series Controllers and furthermore integrate them to the EBI server. All sensors and controlling equipment are located at field for sensing and controlling different parameters of the building. These are again connected directly to the DDC Controllers. All DDC controllers are hooked up to the central EBI (Enterprise Building Integrator) Server via serial communication bus. DDC Controller collects parameter value from its sensors and passes to the EBI server. Similarly any command issued by EBI server goes to DDC via communication bus and DDC then passes that command to the controlling devices such as actuator, relay, etc. That is how BMS monitors and controls the different parameters.

Honeywell Automation India Limited, New Delhi

13

Page 14: Project Report

Access Control System and CCTV

BUILDING MANAGEMENT SYSTEM

1.1 Introduction

The common purpose of building management system is to create an artificial environment protecting the activities taking place in the building against any outside influences or just the opposite, protecting the outside world against activities taking place in the building.

A building may be conceived as a shell around all the activities taking place inside (the processes). The shell is not completely closed, for processes demand input and output facilities (Fig 1.1).

Fig.1.1. Processes in a building

1.2 What is a Building Management System?

The technical installations in a building incorporates a large number of measuring, control and regulating functions which annunciate deviations from desired values and standards, and

Honeywell Automation India Limited, New Delhi

14

Main process Output systems Input systems

Disturbances

Facility processes

Page 15: Project Report

Access Control System and CCTV

if possible, take corrective actions. Moreover the conditions under which these systems have to operate vary constantly as result of changing climatic conditions, wear and alterations of the buildings’ layout and change of usage.

In larger housing estates/ office buildings, Building Management Systems (BMS) are used just for measuring and recording energy consumption. Nowadays there is a growing trend towards integration of automation systems in office buildings. In this case, functions such as the control of heating, lighting, communication and security are combined in a single automation system: the so called “SMART HOUSE”.Building management comprises of the creation of such an environment for the processes taking place within the building that provides optimal functionally and integration of the processes concerned.

The concept of management may be imagined as a control loop. In this case the building constitutes the process. The input to this process is formed by the goods, energy and services needed to keep the process going. The services provided by the building by way of accommodation, comfort, security and the like constitute the output of the process. To be able to keep this output at the qualitative and quantitative levels, the following conditions have to be met:

Methods are required for measuring the quantity and quality of the output.

Set points and standards are needed with which the desired quality and quantity of the output can be compared unambiguously.

Means are needed for controlling the process or its input in order to be able to adjust the output.(Fig 1.2).

Honeywell Automation India Limited, New Delhi

15

Page 16: Project Report

Access Control System and CCTV

As building management system is in fact an information processing system, it should provide functions for data input, processing this data into information and output the results to the operator.

Fig.1.2. Block diagram of a control loop

1.3 Advantages of a Building Management System/Automation System

The objective of a BMS is to centralize the monitoring, operation and management of a building to achieve more efficient building operation at reduced labour and operating cost thereby providing a safe and comfortable working environment for building occupants. In the process of meeting these objectives, the BMS has evolved from supervisory control to totally integrated computerized control. Some of the advantages of BMS are:

Simpler operation with routine and repetitive functions programmed for automatic operations.

Reduced operator training time through onscreen instructions and supporting graphic displays.

Honeywell Automation India Limited, New Delhi

16

Processes to be managed

Corrective Action

Control Algorithm

Measurement

Input Output

Page 17: Project Report

Access Control System and CCTV

Faster and better response to occupant needs and trouble conditions.

Reduced energy cost through centralize control and management programs.

Better management at the facility through historical records, maintenance management programs and automatic alarm reporting.

Flexibility of programming for facility needs, size, organization and expansion requirements.

Improved operating-cost record keeping for allocating to cost centers and/or charging individual occupants.

Improved operation through software and hardware integration of multiple subsystems such as direct digital control (DDC), fire alarm, security, access control or lighting control.

Automatic interventions in the event of a failure or emergency, minimizing consequential damage.

In addition to the above mentioned savings, a BMS also offers an improvement in the quality of the services rendered to the users of the building by providing:

Continuous control of comfort levels;Faster signaling and localization of failures; Increased safety by means of immediate warnings and

systematic action in the event of an emergency;Accurate charging for services supplied.

Building services include heating, ventilation and air conditioning of plant, electrical systems, lighting systems, fire systems and security systems. In industrial buildings, they may also include the compressed air, steam and hot water systems used for the manufacturing process. A BMS may be used to monitor and control all or some of these services.

Honeywell Automation India Limited, New Delhi

17

Page 18: Project Report

Access Control System and CCTV

Modbus Protocol

2.1 Introduction

The Modbus protocol is an open, published and widely implemented protocol designed to transfer digital and analog I/O and register data between control devices. The Modbus protocol has already been implemented in thousands of different devices. Although the Modbus protocol is a trademark and owned by Schneider Automation, there are no license fees or royalties for the license to use the Modbus protocol. The protocol specification is also freely available. This makes the Modbus protocol an open interface protocol.

Modbus supports a several different transport mechanisms. It was initially developed for RS232 communication, but the latest Modbus TCP specification gives Modbus Ethernet TCP/IP support.Here the Modbus interface supports the following communication architectures to a Modbus device:

Serial RS-232 Serial RS 485 through a Stallion Easy Connection serial

adapter.

2.2 RS 232

RS 232 is well known due to popularity of today's PCs. These are used in industry for control systems and data transfers. The RS 232 signals are represented by voltage levels with respect to ground. There is a wire for each signal, together with the ground signal (reference for voltage levels). This interface is useful for point-to-point communication at slow speeds. For example, port COM1 in a PC can be used for a mouse, port COM2 for a modem, etc. This is

Honeywell Automation India Limited, New Delhi

18

Page 19: Project Report

Access Control System and CCTV

an example of point-to-point communication: one port, one device. Due to the way the signals are connected, a common ground is required. This implies limited cable length - about 30 to 60 meters maximum. Main problems are interference and resistance of the cable. Shortly, RS 232 was designed for communication of local devices, and supports one transmitter and one receiver.

In a RS 232 unbalanced data transmission system, each signal is represented by a voltage level with respect to ground. For example, the transmitted signal of a PC COMx port is negative when idle, and switches between positive and negative level when transmitting data. Amplitude ranges between -15 to -5V in negative state, and between +5 to +15V in positive state.

2.3 RS 485

In RS 485 each signal uses one twisted pair (TP) line - two wires twisted around them. This is ‘Balanced data transmission', or 'Differential voltage transmission'. If one of the TP wires is labeled 'A' and the other one 'B', then, the signal is inactive when the voltage at A is negative and the voltage at B is positive. Otherwise, the signal is active, A is positive and B is negative. Of course, the difference between the wires A and B matters. For RS 485 the cable can be up to 1200 meters (4000 feet) long, and commonly available circuits work at 2.5 MB/s transfer rate.

RS 485 is used for multipoint communications, that is, more devices may be connected to a single signal cable. Most RS 485 systems use Master/Slave architecture, where each slave unit has its unique address and responds only to packets addressed to this unit. These packets are generated by Master (e.g. PC), which periodically polls all connected slave units. 

In special cases (security systems), an improved version of multiprocessor communication is used. This system uses only a

Honeywell Automation India Limited, New Delhi

19

Page 20: Project Report

Access Control System and CCTV

single line for bidirectional communication; however, there is no Master. All units announce a packet transmission of a specified length, and at the same time listen whether the data has been successfully transmitted. If it's not the case, they stop communicating and listen for what has happened. At this time, urgent packets can be transmitted over the line. This system is ideal for devices that need to immediately transfer some very important and up-to-date data, without waiting for Master to give them a chance to do so.

In single twisted pair RS 485, all devices are connected to a single twisted pair. Thus, all of them must have drivers with tri-state outputs (including the Master). Communication goes over the single line in both directions. It is important to prevent more devices from transmitting at once (software problem).

For a basic RS 485 system, we need an I/O driver with differential outputs and an I/O receiver with differential inputs. Noise and interference is introduced into the line; however, since the signal is transferred via a twisted pair of wires, the voltage difference (between A and B) of this interference is almost zero. Due to the differential function of the RS485 input amplifier of the receiver, this interference is eliminated. The same is true for crosstalk from neighboring lines, as well as for any other source of interference, as long as the absolute maximum voltage ratings of the receiver circuits are not exceeded.

Differential inputs ignore different earth potentials of the transmitter and the receiver. This is very important for communications of diverse systems, where great problems would otherwise arise - e.g. different power sources, etc. Twisted Pair cables, together with correct terminations (to eliminate reflections), allow data transfer rate of over 10Mbit/s with cables up to 1 km long. However, all of these advantages come at a cost. RS485 circuits are more complex, and thus more expensive.

Honeywell Automation India Limited, New Delhi

20

Page 21: Project Report

Access Control System and CCTV

Higher data transfer speeds require correctly connected and matched terminations, which can be a problem in systems where the number of connected devices changes. And, of course, Twisted Pair cables are required. 

IQ - Series Intelligent Access Control Systems

3.1 Board Diagrams

3.1.1 The IQ-200 Printed Circuit Board Wiring Diagram

Honeywell Automation India Limited, New Delhi

21

Page 22: Project Report

Access Control System and CCTV

3.1.2 The IQ-400 Printed Circuit Board Wiring Diagram

Honeywell Automation India Limited, New Delhi

22

Page 23: Project Report

Access Control System and CCTV

3.1.3 Four-Door Expansion Board

Honeywell Automation India Limited, New Delhi

23

Page 24: Project Report

Access Control System and CCTV

3.1.4 Eight-Door Expansion Board

Honeywell Automation India Limited, New Delhi

24

Page 25: Project Report

Access Control System and CCTV

3.2 Jumpers Specifications of IQ-200

Honeywell Automation India Limited, New Delhi

25

Page 26: Project Report

Access Control System and CCTV

3.2.1 Jumper W1 is located in the UPPER LEFT side of the board and is set for 12 volt-4-wire, 12 volt-5-wire, or 5-volt-5-wire readers.

Across Pins #1 and #2 = 5 Volt Card Reader

Across Pins #2 and #3 = 12 Volt Card Reader

Across Pins #4 and #5, #7 and #8, #10 and #11 =

5-wire Wiegand Data (Data0, Data1) Format Across Pins #5 and #6, #8 and #9, #11 and #12 =

4-wire PCSC Data Format

3.2.2 Jumper W2 is located in the LOWER LEFT side of the board between Plug P9 and P10 and is set for 4 or 5 wire readers. (Must be set consistently with Data format set on W1).

Across Pins #1 and #2 = 5-wire Wiegand Data (Data0, Data1) format

Across Pins #2 and #3 = 4-wire PCSC Data format

3.2.3 Jumper W3 is located in the UPPER LEFT side of the board between Plug P6 and P7 and is set for 4 or 5 wire readers.

Across Pins #1 and #2 = 5-wire Wiegand Data (Data0, Data1) format

Across Pins #2 and #3 = 4-wire PCSC Data format

3.2.4 Jumper W4 is located in the LEFT CENTER side of the board and is factory set and should not be altered.

PCSC Factory Set across Pins #1 and #2

Honeywell Automation India Limited, New Delhi

26

Page 27: Project Report

Access Control System and CCTV

3.2.5 Jumper W5 is located in the TOP CENTER of the board and is set for RS232 or RS485 communications.

Honeywell Automation India Limited, New Delhi

27

Page 28: Project Report

Access Control System and CCTV

Across Pins #1 and #2 = No Termination (when IQ-200 is not the last panel on the RS-485 channel or it is the last panel in a system where the RS-485 data-line is less than 2000 ft., or when using RS-232/modem connections)

Across Pins #2 and #3 = 120 Ω End of Line termination (when IQ-200 is the last panel on the RS-485 channel where the RS-485 data-line is 2000 ft. or greater)

3.2.6 Jumper W6 is located in the RIGHT CENTER of the board. It is set across pins 2 and 3.

PCSC Factory Set across Pins #1 and #2

3.3 IQ with Expansion Board

Honeywell Automation India Limited, New Delhi

28

Page 29: Project Report

Access Control System and CCTV

The 50-pin Expansion Bus Ribbon Cable is connected to the IQ-200 at Plug J1.

The RED stripe on the edge of the ribbon cable should be connected to pin #1 of Plug P1.

The opposite end of the 50-pin Expansion Bus Ribbon Cable is connected to a Peripheral Expansion Board at Plug P1.

The possible expansion boards are the new 4-door expansion PCB, 8-door PCB, OUT PCB, ALM PCB, SAM PCBs.

3.4 Installing Power

Honeywell Automation India Limited, New Delhi

29

Page 30: Project Report

Access Control System and CCTV

Shown below are the 3.0A and 6.0A PCSC power supplies. Both power supplies are shown in enclosures connected to an IQ in a small enclosure.

3.4.1 Installing Power- 3.0 AmpSee Figure 1 on page 26.

12VDC power is connected to the circuit board at P1 in the upper left corner. Disconnect power mains from the supply until the wiring is secured.

3.4.2 Installing Power- 6.0 AmpSee Figure 2 on page 27.

12VDC power is connected to the circuit board at P1 in the upper left corner. Disconnect power mains from the supply until the wiring is secured.

3.4.2 Firgure - PCSC 3.0 Amp Power Supply

Honeywell Automation India Limited, New Delhi

30

Page 31: Project Report

Access Control System and CCTV

3.4.3 Figure - PCSC 6.0 Amp Power Supply

Honeywell Automation India Limited, New Delhi

31

Page 32: Project Report

Access Control System and CCTV

3.5 Resetting the IQ-200 to Default Values

Honeywell Automation India Limited, New Delhi

32

Page 33: Project Report

Access Control System and CCTV

In the event that the 3-volt lithium battery is removed or loses its electrical charge, the IQ must be reset. Follow the procedures below to restore the controller to the default values:

1. With power on, move all switches at dipswitch SW1 to the right, OFF (as printed on the circuit board).

2. Press the Reset button at S1.

3. The 10-segment LED array (D1) will flash in waterfall effect and then stop. The 7-segment LEDs (D34 and D35) will show 8.8. while the reset process is underway. When the reset process is complete, all 10 segments of the LED Array (D1) will turn OFF, and the seven segment LEDs will show a single line segment flashing in a circular pattern clockwise.

4. Refer to section 3.8 and begin addressing the IQ-200 by DIP switching the IQ number (1-111).

5. Set the communication protocol by following the instructions in section 3.9 [Setting MODEM or Direct Connect Configurations].

6. The system is now set to the default values.

Honeywell Automation India Limited, New Delhi

33

Page 34: Project Report

Access Control System and CCTV

3.6.1 Using the Ten-Segment LED Array

Two LED’s, located in the ten-segment array D1, indicate the status of the supervised door circuits. Also the unsupervised tamper, supervised egress inputs, and supervised alarm inputs are annunciated in the LED array as listed below:

Honeywell Automation India Limited, New Delhi

34

Page 35: Project Report

Access Control System and CCTV

3.6.2 Expansion Board LED Arrays

4-Door Expansion Board (IQ-4) 8-Door Expansion Board (IQ-8)

NOTE: Numbers in parentheses are the Sense Input Numbers. The “D” Numbers are the corresponding LED’s assigned to reflect the current status of each individual Sense Input.

Honeywell Automation India Limited, New Delhi

35

Page 36: Project Report

Access Control System and CCTV

3.7.1 Communicating with the IQ-200

The IQ-200 can communicate over a dialup MODEM, an RS232 or an RS485 serial direct connection or LAN. In a multi-drop IQ-200 configuration, the IQ-200 MUST communicate via RS-485 protocol.

3.7.2 Reset the IQ Panel

Set dipswitches 1-8 (located at SW1) to OFF position as it is etched on the IQ-200 PCB. Hit the reset switch at S1. This will calibrate and reset data to default, all ten of the supervised inputs

Honeywell Automation India Limited, New Delhi

36

Page 37: Project Report

Access Control System and CCTV

on the IQ-200 PCB and the supervised Door Senses on the 4/8-Door Cluster PCBs. 3.8 Addressing Individual IQs through the Dipswitches

The dipswitch is located at SW1, on the left of the board. There are eight switches. For the binary number one (1), flip the switch to the left. For zero (0), flip the switch to the right.

Honeywell Automation India Limited, New Delhi

37

Page 38: Project Report

Access Control System and CCTV

3.9 Setting MODEM or Direct Connect Configurations

PCSC supports the US Robotics 33.6/56K Sportster model for MODEM communication. It is recommended that the MODEM be powered up via an U.P.S. (Uninterruptible Power Supply).

3.9.1 To set up the IQ for MODEM communication, configure the Dipswitch settings at SW1, as follows:

Example: MODEM connection (IQ-400, panel address is #1)

NOTE: AT SW1, switch #8 must remain in the ON position (left) for MODEM communication.

3.9.2 To set up the IQ-400 for direct connect communication (default), configure the Dipswitch settings at SW1, as follows:

Example: Direct connection (IQ-400, Panel address is #1)

Honeywell Automation India Limited, New Delhi

38

Page 39: Project Report

Access Control System and CCTV

NOTE: At SW1, switch #8 must remain in the OFF position (right) for Direct Connect communication.

To communicate from an IQ-400 to the MODEM, two cables must be fabricated: one from the MODEM to the IQ-400 and another for the PC host to the MODEM.

NOTE: The ON/OFF designation is in reference to the labels printed on the IQ-400 PCB. Not the switch itself!

4.1.0 Changing the Baud Rate

1. Set the switch (SW1) setting for the Baud rate and press the S1 Reset button. (Refer to next page).2. Change the SW1 switch setting back to the IQ-200 number.3. Request the IQ on-line in the Define Micro-LPM status screen in the LiNC-NET software.

Honeywell Automation India Limited, New Delhi

39

Page 40: Project Report

Access Control System and CCTV

4.1.1 Baud Rate Settings

Honeywell Automation India Limited, New Delhi

40

Page 41: Project Report

Access Control System and CCTV

4.2 Status Lights and Dealing with Communication Errors

Honeywell Automation India Limited, New Delhi

41

Page 42: Project Report

Access Control System and CCTV

4.2.1 Status LightsThe IQ-200 circuit board has 15 LEDs. The status of the LED defines a certain activity or phase of IQ-200 functions. Card processing and door sense status is indicated by the LEDs.

Honeywell Automation India Limited, New Delhi

42

Page 43: Project Report

Access Control System and CCTV

4.2.2 Communication Errors

Message at the PC What to Do

IQ-200 is not responsive Verify the following:

1. The red DC Power Indicator LED (D2) is ON.

2. Verify that the ID number corresponds to the IQ-200 at the PC. (Check settings of switches at SW1).

3. Check cabling. (RS232/MODEM/RS485/Terminal Server).

4. Remove the Battery for 5 minutes. Reinsert battery and reset IQ panel.

4.2.3 Error Codes

The seven-segment LEDs, D34 and D35, will indicate certain errors that can occur when processing cards. They also can communicate “fatal” errors that could occur. The following chart describes different error codes that are displayed by the seven-segment LEDs:

D Warning Error Display Codes Possible Problem

What to Do

C0 Card Error: Parity check fail Bad Card or dirty reader head

Clean reader head and re-try

C1 Card Error: LRC check failed

Bad Card or dirty reader head

Clean reader head and re-try

C5 Card Error: data length mismatch

Check for correct format type

Verify that the correct reader technology is specified

CC Card Error: data conversion Check for correct format type

Verify that the correct reader technology is

Honeywell Automation India Limited, New Delhi

43

Page 44: Project Report

Access Control System and CCTV

specifiedCE Card Error: end-code not

foundBad card or dirty reader head

Clean reader head and re-try

CF Card Error: facility code The site code is invalid for this site

Load correct facility code or check cards

EC Hardware Configuration error

The IQ is not configured correctly

In LiNC-NET for Windows, select the Panel Setup icon and the Hardware file-tab to verify that the extension adapters are selected for this IQ.

Honeywell Automation India Limited, New Delhi

44

Page 45: Project Report

Access Control System and CCTV

4.3 Controller Specifications

4.3.1 MicroprocessorThe IQ-200 Controller is based on a 80C188EB microprocessor, operating at 16 MHz. The 80C188EB is a 16-bit processor (internal operation) with an eight-bit data bus. A 20-bit address bus provides a 1M Byte addressing range. Other features include three internal 16-bit timers; interrupt controller (8529 equivalent), multiple programmable chip select decoders with programmable wait states, and two serial communication channels.

4.3.2 LEDs and DipswitchesTen discrete LEDs are provided which the microprocessor software can individually control. Eight general-purpose switches are provided for use by the microprocessor software, and are utilized for mode control, configuration setting, ID selection, etc. In addition, a Power ON LED and two “Reader Active” LEDs are provided.

4.3.3 Two Seven-Segment LED Display

Error codes are displayed in Hexadecimal format. Refer to the error code section for listing of codes and their meanings.

4.3.4 Real Time ClockA real time clock (DS1302) with battery backup is provided for time of day information.

Honeywell Automation India Limited, New Delhi

45

Page 46: Project Report

Access Control System and CCTV

4.3.5 Serial Communication

Two serial communication ports are provided by the IQ-200 controller.

RS-485: Four wire (twisted pair) interface which is optically isolated from the controller.

-Provision for installing a termination resistor is provided.

RS-232: At P5 (RS232 DB9 – MODEM). At P2 (RS232 Direct Connect) – standard RS232 interface. A DB9 connector with AT pinout is provided for an industry standard RS-232 interface.

4.3.6 Power SupplyThe IQ-200 controller requires +5VDC for all logic. Relays, output drivers, etc. require a +12VDC supply. An on-board dc-dc converter accepts an external voltage source of 10-26VDC, and converts this unregulated source to the required +5VDC. For an input voltage range of 10-15 volts, the “+12VDC” converts this voltage source to the required +12VDC.

4.3.7 Battery Back-up Requirements

A 12 AH battery is recommended as a back-up to the power supply, because it is the largest battery that will fit in the enclosure. The battery should be connected to the power supply charger in accordance with the manufacturer’s instructions.

Honeywell Automation India Limited, New Delhi

46

Page 47: Project Report

Access Control System and CCTV

4.3.8 Factory SettingsAt the factory the IQ is set as IQ #1, communications as direct connect (RS232/RS485) @ 9600 baud, with 120 Ohm resistor termination disabled (W5 jumper set at 1-2).

Honeywell Automation India Limited, New Delhi

47

Page 48: Project Report

Access Control System and CCTV

4.4 Proximity Card Reader

4.4.1 Reader Description

The proximity card reader is a radio frequency proximity reader for Access Control Systems. The reader consists of a transmit/receive antenna, associated electronics, and a polycarbonate housing which encloses the antenna and the electronics. The inside of the polycarbonate housing is plotted with a two-part epoxy to protect the antenna and electronics against the environment.

NOTE: The Reader is pre-compensated for mounting on a metal doorframe; it can be mounted on any doorframe, including aluminum and steel doorframes with minimum loss in

Honeywell Automation India Limited, New Delhi

48

Page 49: Project Report

Access Control System and CCTV

performance. However, the Reader should not be framed with, or surrounded by, metal of any kind.

4.5 IQ 4-Reader Expansion Module

The IQ-200 2-reader system can be expanded to a 6-reader system by installing the 4-Reader Expansion Module. The circuit board can be mounted below the circuit board in the larger enclosures available from PCSC. Once mounted, the circuit board is connected to the IQ-200 by installing a 50-pin ribbon expansion cable from P1 on the 4-reader module to J1 on the IQ-200.

The 4-Reader Expansion Module allows the user to connect up to 4 additional readers to the IQ-200. Each of the reader interfaces support either a PCSC proprietary reader (4-wire interface), or a Wiegand reader (5-wire interface). The Expansion Module also provides an additional 4 interfaces for each of the readers and the associated doors.

4.5.1 Power Supply

The 4-reader Expansion Module requires +5VDC for all logic. Relays, output drivers, etc. require a +12VDC supply. The +5VDC and +12VDC is provided to the module via the 50-pin expansion cable, which connects plug P1 of the 4-door cluster PCB to plug J1 of the IQ-200 board.

4.5.2 Door Sense LEDs

4 LEDs located at D21, D22, D23, and D24 indicate the status of the Door circuits. Resistors must be installed at the door contacts, the switches in place, door closed (normal state), in order for the supervised inputs to function.

Honeywell Automation India Limited, New Delhi

49

Page 50: Project Report

Access Control System and CCTV

LED Status Chart:

Sense Input #21 LED is D21 Sense Input #23 LED is D22 Sense Input #25 LED is D23 Sense Input #27 LED is D24

NOTE: LEDs D17-D20 are not used in the IQ-600.

OFF Circuit is in normal/secure state

ON Circuit is in an alarm Condition state

Blinks once every 2 seconds Fault condition. Open circuit state

Blinks 1 time/second Fault condition. Short circuit state

Blinks 4 times/second Circuit is NOT calibrated and NOT in a functional state

4.5.3 Four-Reader Expansion Board- Active LEDs

4 LEDs located at D61, D62, D67, D68 indicate the status of the Reader circuits. When the LED blinks momentarily after a card swipe, the system is processing the card data. The LED is normally off.

Reader LED Status:

Reader C LED is D61 Reader D LED is D62 Reader E LED is D67 Reader F LED is D68

Honeywell Automation India Limited, New Delhi

50

Page 51: Project Report

Access Control System and CCTV

4.6 IQ 8-Reader Expansion Module

The IQ-200 2-reader system can be expanded to a 10-reader system by installing the 8-Reader Expansion Module. The circuit board can be mounted below the circuit board in the larger enclosures available from PCSC. Once mounted, the circuit board is connected to the IQ-200 by installing a 50-pin ribbon expansion cable from P1 on the 8-reader module to J1 on the IQ-200.

The 8-Reader Expansion Module allows the user to connect up to 8 additional readers to the IQ-200. Each of the reader interfaces support either a PCSC proprietary reader (4-wire interface), or a Wiegand reader (5-wire interface). The Expansion Module also provides 8 additional interfaces for each of the readers and the associated doors.

4.6.1 Power Supply

The 8-reader Expansion Module requires +5VDC for all logic. Relays, output drivers, etc. require a +12VDC supply. The +5VDC and +12VDC is provided to the module via the 50-pin expansion cable, which connects plug P1 of the 8-door cluster PCB to plug J1 of the IQ-200 board.

4.6.2 Door Sense LEDs

8 LEDs located at D17, D18, D19, D20, D21, D22, D23, and D24 indicate the status of the Door circuits. Resistors must be installed at the door contacts, the switches in place, door closed (normal state), in order for the supervised inputs to function.

Honeywell Automation India Limited, New Delhi

51

Page 52: Project Report

Access Control System and CCTV

LED Status Chart:

Sense Input #21 LED is D17 Sense Input #23 LED is D18 Sense Input #25 LED is D19 Sense Input #27 LED is D20 Sense Input #29 LED is D21 Sense Input #31 LED is D22 Sense Input #33 LED is D23 Sense Input #35 LED is D24

4.6.3 Eight-Reader Expansion Board- Active LEDs

Eight LEDs located at D49, D50, D55, D56, D61, D62, D67, D68 indicate the status of the Reader circuits. When the LED blinks momentarily after a card swipe, the system is processing the card data. The LED is normally off.

Reader LED Status:

Reader C LED is D49 Reader D LED is D50 Reader E LED is D55 Reader F LED is D56 Reader G LED is D61 Reader H LED is D62 Reader I LED is D67 Reader J LED is D68

Honeywell Automation India Limited, New Delhi

52

Page 53: Project Report

Access Control System and CCTV

4.7 Configuring your Host PC

1. Change host IP to be 192.168.168.3 in your computer’s TCP/IP settings - This is the default Host IP address that the IQ LAN uses for setup:

Right mouse click on “My Network Places” Select: Properties Right mouse click on “Local Area Connection” Highlight Internet Protocol [TCP/IP] and Press the

Properties button. You will need to verify that you have “Use the

following IP address” selected.

See screen below:

Honeywell Automation India Limited, New Delhi

53

Page 54: Project Report

Access Control System and CCTV

Enter 192.168.168.3 for the I.P. address Enter 255.255.255.0 for the Subnet mask Press the OK button Reboot the host computer if necessary. Depending

on you system you may or may not have to do this.

4.8 RS 232 to RS 422/485 Converter

4.8.1 Introduction

Honeywell Automation India Limited, New Delhi

54

Page 55: Project Report

Access Control System and CCTV

The model ACON-01 is high speed RS 232 to RS 422/485 converter. It supports upto 115.2 Kbps baud rate over one or two twisted pair. It allows RS 232 device to transmit data over 1.2 km distance to increase networking capability.

Figure 4.8.1 ACON D-01 RS 232 to RS 422/485 converter

4.8.2 Advantages of ACON-01

The advantage of the RS 232 to RS 422/485 converter over other line drivers and modems is that it can also operate in multipoint applications. Depending on the operating environment, as many as 64 devices can be linked together using twisted pair cable.

Inside the RS 232 to RS 422/485 converter optical isolation circuitry converts electrical signal to light and back again. In this way, the two electrical circuits are completely isolated from each other, limiting the damage that could otherwise be caused by power surges in the electrical signal.

4.8.3 ACON D-01 Specifications

Optical Isolation : 1.5 KV

Honeywell Automation India Limited, New Delhi

55

Page 56: Project Report

Access Control System and CCTV

Operation : Point to Point (RS422): Multi-Drop Full Duplex: Multi-Drop Half Duplex

Speed : 1200 to 115 KbpsIndications (LEDs) : Power, Tx, RxPower : 115VAC/230VAC/24VDC/SMPS

4.9 Switch Configuration

4.9.1 Dip Switch Settings for : Full Duplex Point to Point

4.9.2 Dip Switch Settings for : Full Duplex Multidrop

Honeywell Automation India Limited, New Delhi

56

Page 57: Project Report

Access Control System and CCTV

4.9.3 Dip Switch Settings for : Half Duplex Multidrop

5.1.0 Enterprise Buildings Integrator (EBI)

5.1.1 The Versatility of EBI

An EBI system takes care of a building's security management, building management, and fire monitoring. It is a one-window, web-enabled system that allows you to control everything from HVAC, lighting, and energy, to life-safety and security

Honeywell Automation India Limited, New Delhi

57

Page 58: Project Report

Access Control System and CCTV

subsystems, to financial and personnel records, environmental controls, and supply chain databases.

EBI is used in a wide range of applications including: Large commercial buildings Telecommunications Industrial sites Casinos Education Healthcare Government Prisons Airports

Of course, EBI can also be tailored to suit other specialized applications, and it is compatible with controllers from all the major providers. The philosophy behind EBI is to provide an open standard for integration and to embrace open technology.

It is fully integrated with Microsoft Windows 2000, with industry networking standards. Standard TCP/IP network topologies include LAN, WAN, serial, and dial-up access.

EBI is based around client-server architecture. A high-performance real-time database is maintained by the server (which can be redundant). This provides real-time information to local or network-based (LAN or WAN) clients such as Stations, or other applications such as spreadsheets or relational databases. And because it is modular in design, EBI is an extremely cost-effective and scalable solution. Configurations can range from small single-

Honeywell Automation India Limited, New Delhi

58

Page 59: Project Report

Access Control System and CCTV

node systems to multi-server integrated systems, as shown in the following figures:

Figure 2.1 Redundant-Server System with Security, Building and Fire Management

5.1.2 EBI and Security Management

The Security Manager option provides an affordable way of ensuring the security of people, assets, and intellectual property. Its comprehensive approach to access control and security accommodates all of your security requirements including:

Honeywell Automation India Limited, New Delhi

59

Page 60: Project Report

Access Control System and CCTV

Efficient management of cardholder details Access card design and creation, including PhotoID Comprehensive control and monitoring of all cardholders at

your site, including shift management, guard tour, and visitor management

Prompt, intelligent alarms, including operator response instructions and deadman timer

5.1.3 EBI and Building ManagementThe Building Manager option provides tools and data to better manage the environment, resulting in energy efficiency and significant cost savings. Maintenance staffs have, at their fingertips, the functionality and information they need to minimize maintenance costs, including:

Scheduling Detailed HVAC information Alarm Pager Phone Control HVAC reports

5.1.4 EBI and Fire Management

The Life Safety option allows a Station (EBI's operator interface) to monitor and test the building's fire panels. The operator is provided with continuous information about the building's fire protection systems and can actuate a fire alarm or building evacuation from Station.

5.2.0 Honeywell EBI Server

5.2.1 Classification

The Honeywell EBI Server can be classified as follows:

1. Life Safety Manager

Honeywell Automation India Limited, New Delhi

60

Page 61: Project Report

Access Control System and CCTV

Fire Controller Smoke Management Controller

2. Security Manager Access Controller Security Controller CCTV Switcher

3. HVAC EMS Control System Remote Systems N/w Control

5.2.2 EBI Hardware Components

A PC configured as an EBI Server A no. of PCs configured as Stations A wide range of controllers, both Honeywell and third party Communication Hardwares (Cable, Modems, and so on) to

connect our systems Printers to provide report

5.2.3 Server Redundancy

You can improve system availability with server redundancy. In a redundant server system, EBI is installed on two identically configured servers.

Honeywell Automation India Limited, New Delhi

61

Page 62: Project Report

Access Control System and CCTV

EBI uses software arbitration to determine which server acts as primary. (With software arbitration, each server polls the other over the network to determine whether the other server has failed.)

Figure 5.2.1 Typical Redundant Server System

5.2.4 Distributed System Architecture

Distributed System Architecture (DSA) allows you to integrate up to 10 servers into a single system. DSA is appropriate for:

Logically separate EBI systems located in different parts of a facility

Geographically-dispersed systems, as shown in the following figure, in which the servers are connected through a WAN

Honeywell Automation India Limited, New Delhi

62

Page 63: Project Report

Access Control System and CCTV

Figure 5.2.2 Typical Geographically-dispersed System

5.2.5 Controller Interfaces

Controller interfaces enable EBI exchange data with controllers by individually mapping memory locations in the controllers to standard points in EBI. (EBI provides interfaces for most types of controllers used in security and building management.) 5.3.0 Controller-to-Server Connections

The way in which you connect a controller to the server depends on several factors, such as the physical layout of your site and the controller's communication ports.

Honeywell Automation India Limited, New Delhi

63

Page 64: Project Report

Access Control System and CCTV

5.3.1 Network Connections

If a controller has a network port, we can connect it directly to the network, as shown in the following figure:

Figure 5.3.1 Controllers Connected Directly to the Network

5.3.2 Indirect Serial (Terminal Server) Connections

We can connect controllers to the network through a terminal server. (A terminal server allows you to connect several controllers to the network even though they only have serial or parallel ports.) Most terminal servers also provide a range of serial connection options, such as RS-232, RS-422 and RS-485.

Terminal servers are particularly useful if we have a:

Site-wide network, and you want to connect controllers to the LAN- as shown in the following figure

Honeywell Automation India Limited, New Delhi

64

Page 65: Project Report

Access Control System and CCTV

Geographically-dispersed controllers on a WAN

Figure 5.3.2 Typical System with Terminal Servers

5.3.3 Direct Serial Connections

If we have a small system, you can connect controllers to the server's serial ports.

Note: We can add more serial ports to the server with a serial adapter. An advantage of serial adapters is that they provide a choice of interfaces, such as RS-422 and RS-485, which are suitable for medium-distance links.

5.3.4 Terminal Servers and Server Redundancy

Honeywell Automation India Limited, New Delhi

65

Page 66: Project Report

Access Control System and CCTV

If we have redundant servers, we must use terminal servers to connect controllers that only have serial ports. (Unlike the controllers, terminal servers can automatically switch communications to whichever server is running as primary.)

Figure 5.3.3 A Terminal Server in a Redundant Server System

5.3.5 Modems

We can use modems to connect controllers located at remote sites.

5.4.0 Stations

Station is EBI's user interface that presents information in a graphical, user-friendly manner.

Honeywell Automation India Limited, New Delhi

66

Page 67: Project Report

Access Control System and CCTV

In general, Station runs on standard computers that are connected to the server through the network. However, Station supports most Windows-compliant peripherals such as touch-screens and membrane keyboards with dedicated function keys. (If you have an entry-level system, you can even use Station on the server computer.)

5.4.1 Displays

Station uses displays to present information. Each display is, in effect, a control panel that shows information about a particular part of the system, and contains appropriate controls such as buttons and scrollbars. 5.4.2 System Displays

EBI is supplied with a comprehensive set of system displays that present information in a standardized manner.

Honeywell Automation India Limited, New Delhi

67

Page 68: Project Report

Access Control System and CCTV

Figure 2.8 A Typical System Display

5.4.3 Mobile Stations

If we have a wireless network we can use handheld devices (mobile Stations) to access your EBI system.

Mobile Stations provide users with full Station capabilities — they provide the same level of control as Station on a desktop computer.

Mobile Stations connect to a Mobile Station Server which, in turn, connects to the EBI server. (A Mobile Station Server is loaded with both Station and Microsoft Terminal Services.)

Up to five mobile Stations can connect to a Mobile Station Server.

Honeywell Automation India Limited, New Delhi

68

Page 69: Project Report

Access Control System and CCTV

5.4.4 Electronic Signatures

EBI's Electronic Signature option enables us to implement electronic signatures for specified operator actions, such as controlling particular points and acknowledging certain messages. (Electronic signatures are the legally binding equivalent of an operator's handwritten signature.)

For critical actions, we can configure them to require two signatures.

Details about each action, including the operator name(s), date and time are stored in the events database.

5.5.0 Operator Security

5.5.1 Areas

We can restrict access to your site by dividing it into areas, and then assigning operators (and, if appropriate) Stations to specific areas.

Areas are particularly useful in buildings that have several tenants, and in large facilities where different operators have responsibility for different parts of a facility.

Areas allow you to restrict operator/Station access to: Alarms Points Custom and cardholder detail displays Access levels Zones

Honeywell Automation India Limited, New Delhi

69

Page 70: Project Report

Access Control System and CCTV

5.6.0 Station Security

We can restrict access to Station using either operator-based or Station-based security.

5.6.1 Operator-based Security

With operator-based security each operator has an operator ID and a security level, and logs on to Station using the operator ID and password.

Operator-based security provides six security levels, each with different privileges: Lvl1, Lvl2, Oper, Supv, Engr, and Mngr (shown in order of increasing security level).

We can use operator-based security to restrict: Control of points Access to specific areas Access based on day and time Access to specific Stations

We can also specify an "inactivity time", which, if exceeded, automatically logs off the operator.

5.6.2 Station-based Security

Station-based security does not require an operator ID or password to log on to Station with Oper security level. However, passwords are required to change to higher security levels in order to perform configuration and administration tasks.

Security is managed on a Station-by-Station basis, enabling a particular Station to access designated parts of the database.

Honeywell Automation India Limited, New Delhi

70

Page 71: Project Report

Access Control System and CCTV

5.6.3 Duress Login

As an added security precaution, an operator, under hostile circumstances, can log on using a duress login and set off a silent alarm in order to alert other operators.

5.7.0 Exchanging Data with Other Applications

EBI includes a number of options for exchanging data with other applications.

5.7.1 Microsoft Excel Data Exchange

Microsoft Excel Data Exchange allows us to capture real-time point parameter and history data, and display it in a Microsoft Excel spreadsheet. The captured data can be static or dynamically updating.

We can capture the data using either the Microsoft Excel Data Exchange Wizard, or through cell formulas. After capturing the data, we can create charts to display and analyze data with Microsoft Excel's toolset. We can also link the values into other OLE-enabled applications.

Microsoft Excel Data Exchange provides: Read/write access to point parameter values Read access to history data Read/write access to server database files (user files)

5.7.2 ODBC Data Exchange

ODBC Data Exchange enables two-way exchange of data between the EBI database and an ODBC-compliant database (either local or

Honeywell Automation India Limited, New Delhi

71

Page 72: Project Report

Access Control System and CCTV

remote). It is typically used to periodically transfer data for billing customers.

5.8.1 Responding to Alarms and Events

EBI generates alarms and events when it detects specified changes in the field.

Alarms indicate unusual conditions, such as an unexpected change in temperature or movement in a secure area, that require operator action. The alarm remains until the condition that triggered the alarm returns to normal and someone acknowledges the alarm.

All changes in the system, for example, alarm changes, operator changes, and security level changes, are logged as events.

The following figure shows how EBI responds to a typical event (in this case, a card being presented to a card reader).

Figure 3.1 Alarm/Event Generation

Honeywell Automation India Limited, New Delhi

72

Page 73: Project Report

Access Control System and CCTV

All alarm conditions are recorded in the event log, including when an alarm is generated, when it returns to normal, and when it is acknowledged.

Alarms are generally assigned different priorities to help you view critical alarms first. The priorities are: Urgent, High, Low, and Journal. Journal alarms are not shown on the Alarm Summary but are recorded as events.

Operators can:

View events and alarms on Stations. The Status Zone, beneath the display, always shows the most recent (or oldest) and highest priority alarm that has not been acknowledged.

Print a summary of alarms and events to an alarm/event printer. All alarms and events are recorded in an alarm/event journal.

Figure 3.2 A Typical Alarm Summary Display

Honeywell Automation India Limited, New Delhi

73

Page 74: Project Report

Access Control System and CCTV

5.8.2 Managing Operator Response to Alarms

The Advanced Alarm Management option is used to provide operators with a series of steps to follow for a particular alarm. When an operator acknowledges an alarm, an alarm instruction display appears. In order to close the alarm, the operator must complete an alarm response display.

5.9.0 Analyzing System Data

We can use reports and trends to analyze system data.

5.9.1 Reports

EBI includes a comprehensive set of standard reports that are useful for analyzing and monitoring alarms, events, points, cards, and so on. If necessary, we can create our own custom reports using tools such as Microsoft Access or Crystal Reports.

We can request reports when we need them, or produce them automatically at pre-defined times. We can also specify a report's destination: either a printer or display.

Archiving Point History and Events

5.9.2 Point History Archiving

EBI stores point history data in the server for a limited time, which is determined by the default retention periods for the history interval being used.

If we want to keep point history data for longer periods, we must archive the data to off-line media, such as tape or removable disk.

Honeywell Automation India Limited, New Delhi

74

Page 75: Project Report

Access Control System and CCTV

5.9.3 Event Archiving

EBI stores every event, such as point status changes or operator actions, in an event database for a specified time.

Event archiving enables us to archive these events to disk or tape, where they can be stored for future retrieval. For example, we can restore event archives so that they can be included in standard reports.

Event archiving can be scheduled automatically, or an alarm can be generated to alert the operator to archive the events.

6.0 Cardholder Management Concepts

Access to a site or installation is usually controlled using access cards. Anyone who requires access has a card that is imprinted with identification details. When they use the card (at a door, for example), the access controller that has been downloaded with the EBI cardholder database checks their access permissions, and grants or denies access. Cardholders can only access an area if they have the required permissions (and are seeking access during the appropriate shifts).

In EBI, access rights are easy to allocate and easy to maintain, and you can define your own fields for cardholder information. You can even design and print your own access cards (with photos, signatures, logos, and so on).

6.1 Cardholder Information in the Server Database

There are two kinds of information required for a cardholder: personal and access.

Honeywell Automation India Limited, New Delhi

75

Page 76: Project Report

Access Control System and CCTV

− Personal information includes the cardholder name, card identification number, and other optional information such as employee number, department, phone number, photographic images, and so on.

− Access information for a cardholder includes the access levels assigned which indicates the sections of the facility that can be accessed by that individual. The current state of the card (active, lost, stolen, or inactive) is also entered.

Cardholder information is entered into the server database using special card configuration displays on Station. The following figure shows the card details display for an SE card assigned to a cardholder:

Figure 4.1 Card Details Display

Honeywell Automation India Limited, New Delhi

76

Page 77: Project Report

Access Control System and CCTV

6.2 Integrated PhotoID

The Integrated PhotoID feature is used to create site's access cards. We can design the layout of the card (including the cardholder's photograph, signature, and other personal details) and then encode information onto the card using magnetic stripes or barcodes.

The details of all access cards created using Integrated PhotoID are saved as part of the cardholder database. In addition to the convenience of only having to enter information once, we have a central location from which we can create reports on cardholder information. This is particularly useful if we are using Integrated PhotoID from a remote Station.

Integrated PhotoID can be used with a wide range of cameras, both digital and video.

6.3 Visitor Management

The Visitor Management feature enables us to track and report on visitors to the facility. The visitors can be given a temporary access card.

The information and permissions associated with visitor cards is much the same as regular access cards. The major difference is that visitor cards have a limited life span. We can set up the card so that it is automatically valid for a particular period — for example, enabled when the visitor is due to arrive, and disabled when they are due to leave. And because cardholder details are saved independently of the card, we don't have to re-enter the details of regular visitors at each visit. Instead, we can simply assign a new card based on the existing details.

Honeywell Automation India Limited, New Delhi

77

Page 78: Project Report

Access Control System and CCTV

6.4 Understanding Supervisory Control

The term "supervisory control" means control that originates from EBI (whether by an operator or a program).

Supervisory control works by changing the values in controllers that are associated with field devices. Usually control is performed by the internal logic of controllers. An example of this is the remote locking of a door.

Supervisory control works as follows:1. A new value is entered by an operator (manual mode) or an

EBI program (automatic mode). 2. The server relays the new value to the controller. 3. The controller outputs the control value to the field device.

Honeywell Automation India Limited, New Delhi

78

Page 79: Project Report

Access Control System and CCTV

Figure 4.2 The Process of Supervisory Control

6.5 Server Control of Access

We can configure the server so that it automatically controls the commencement and expiry of access card validity. Using the current system date, the server checks to see if there are existing cardholders whose cards have reached either their commencement date or their expiry date. When found, the server changes the status to one of "active" or "inactive" and the modified card data is downloaded to the controllers.

6.6 Downloading Access Information to the Field Device

Access information is configured on displays and then downloaded to the access controllers providing the controllers with up-to-date information. You can choose to download only single components, such as a new or deleted card, or all access information. Downloading all information may take some time and, as access to various locations in the site may be denied during the download, should only be performed during off-peak times and when necessary.

Honeywell Automation India Limited, New Delhi

79

Page 80: Project Report

Access Control System and CCTV

7.1.0 Access Control Concepts

7.1.1 Card Readers

A card reader is a hardware device that decodes the encrypted information stored on an access card. A card reader connects to an Access Controller.

Normally card readers control doors, but they can also control turnstiles, lifts, gates, or any other physical devices designed to control access. EBI includes interfaces to a wide range of makes and models of card reader and access controller.

The decision to enable or deny access to a given card is made locally by the access controller itself, using the configuration data EBI downloads to it.

7.1.2 Access Points

An access point represents a card reader which defines an entry or exit point to a physical space. Access points are used to monitor card traffic at the card reader by recording the card number and cardholder name, and whether or not access was granted.

If two card readers were associated with one physical door — one to control entry and one to control exit — two access points would be used to represent these two card readers.

7.1.3 Floor Points

Honeywell Automation India Limited, New Delhi

80

Page 81: Project Report

Access Control System and CCTV

A floor point represents a particular floor in a building served by elevators. Floor points restrict access to certain floors of a building through control of the elevators. A floor point is a specialized status point. A floor is either in the "access" state, allowing anyone to stop at the floor, or in the "secure" state, where only cardholders with the required privileges can access the floor.

7.1.4 Zones

A zone represents a physical space which is totally enclosed by card readers. That is, in order to enter a physical space, one must use an access card at a card reader which allows entry to that space. It should not be possible to enter this physical space without using a card reader.

A zone consists of a list of access points which represent the card readers which allow entry to the physical space. An access point can only be included in one zone, because a card reader can define the entry into only one physical space.

We can assign up to 128 access points to a single zone. The points can be those associated with physical doors or with elevator floors. Zones are paired with time periods to create access level definitions for site entry and exit control.

Access points are assigned to the same zones if they define entry into the same physical space. In the following figure, for example, doors C, D, and F define entry into the Payroll zone.

Honeywell Automation India Limited, New Delhi

81

Page 82: Project Report

Access Control System and CCTV

Figure 4.4 Zones and Zone Doors

7.1.5 Time Periods

A time period represents a period during which a person may have access to a physical space. For example, the time period Working Hours might be made up of days Monday to Friday and times 9:00am to 5:00pm, excluding holidays.

Time periods are configured and modified on Time Period Configuration displays. The time period details depend on the type of access controller we use: all controllers of the same type store the same time period definitions.

Honeywell Automation India Limited, New Delhi

82

Page 83: Project Report

Access Control System and CCTV

7.1.6 Access levels

An access level represents a particular set of access control criteria.

Up to eight access levels are assigned to cards in order to specify where and when the cardholder is granted access. The access level is made up of a number of pairs of zones and time periods, where the zone defines the physical space and the time period defines the times at which that physical space may be accessed.

For example, cards belonging to Managers might be assigned an access level which allows access to all zones during working hours but cards belonging to Senior Managers might be assigned an access level which allows access to all zones for 24 hours per day.

7.1.7 Occupancy Reporting

Once the facility is divided into zones, we can report on which people are currently in a particular zone.

This works best if both entry and exit points to the zone are controlled by card readers. This enables EBI to determine when people have entered a zone and when they have exited it, either by entering another zone or by exiting the whole facility. Without dual readers, you can tell only which zone a person last entered; until they present their card to enter another zone, you cannot tell if they have left.

7.1.8 Cardholder Reporting

Using EBI's pre-configured reports, you can produce a number of cardholder reports, including:

Card Usage

Honeywell Automation India Limited, New Delhi

83

Page 84: Project Report

Access Control System and CCTV

Cardholder Details Cardholder List Cardholder Zone Summary

7.1.9 IQ-200 System Capacities

Cardholder Capacity: 8,000 (20,000 w/Memory Expansion)Time Periods: 32Holiday Time Periods: 32Holiday List: 365 DaysHistory Transactions: 4,000 regardless of memory size

Honeywell Automation India Limited, New Delhi

84

Page 85: Project Report

Access Control System and CCTV

8.0 Closed Circuit Television (CCTV)

8.1.0 Cameras

There are three different types of cameras that are most commonly used now a days:

1. Film Camera2. Photographic3. Video Camera

8.1.1 Camera Specification

Following are the important features of a Camera:1. Resolution2. Sensitivity3. S/N Ratio4. Chip Type5. Camera Voltage6. Operating Temperature

Among all the above, the first two features, i.e. Resolution and Sensitivity are very important.

Note: Resolution generally depends on the no. of pixels in CCD Chip.

More be the no. of pixels, higher will be the Resolution and hence better picture quality. The lines may be Vertical and Horizontal.

Vertical Resolution = No. of Horizontal LinesHorizontal Resolution = No. of Vertical Lines

Honeywell Automation India Limited, New Delhi

85

Page 86: Project Report

Access Control System and CCTV

8.1.2 Bandwidth Dependency of Resolution of a Camera

e.g. - If the bandwidth is 5MHz, the Camera resolution will be 5*80 = 400 lines.

8.1.3 Typical Resolutions of Cameras

Mono Chrome Cameras

Color Cameras

Low Resolution 380-420 Lines 330 Lines

High Resolution 570 Lines 470 Lines

Note: Resolution and Sensitivity are inversely related, i.e. if Resolution is increased Sensitivity decreases and vice-versa.

8.2.0 Camera Installation(Dome Shaped Stationary/Fixed Camera)

8.2.1 Power Supply

An Adapter (SMPS) with a very constant 12V, 500mA supply is used to power the Camera. This specific adapter is used to minimize the ripple factor (ac in dc) and to avoid the voltage fluctuations. It also provides us the better camera reception.

Honeywell Automation India Limited, New Delhi

86

Page 87: Project Report

Access Control System and CCTV

8.2.2 Select switch description

Honeywell Automation India Limited, New Delhi

87

Page 88: Project Report

Access Control System and CCTV

FLS/OFF : Flickerless ON, OFFAWB/HOLD : White Balance AUTO, HOLDAGC/ON : Auto max gain control ON, OFFBLC/OFF : Backlight compensation ON, OFFELC/DC : Electronic Light Control lens/DC Iris lens

8.2.3 Connections

Honeywell Automation India Limited, New Delhi

88

Page 89: Project Report

Access Control System and CCTV

8.3.0 Digital Video Recorder(DVR)

Honeywell Automation India Limited, New Delhi

89

Page 90: Project Report

Access Control System and CCTV

Honeywell Automation India Limited, New Delhi

90

Page 91: Project Report

Access Control System and CCTV

Main Difficulties Encountered

The various difficulties encountered were as follows:

Limitations

Honeywell Automation India Limited, New Delhi

91

Page 92: Project Report

Access Control System and CCTV

Future Scope and Improvement

Honeywell Automation India Limited, New Delhi

92

Page 93: Project Report

Access Control System and CCTV

Epilogue

It gives me immense pleasure and a sense of satisfaction at having accomplished what I set out to do at the beginning of the semester. This has been an enlightening and enriching experience to be associated with this project under the guidance of Mr. Inderjeet Singh, RSM(North), Honeywell Automation India Limited, New Delhi. During the course of this work we made a number of achievements and learnt a lot of lessons.

Some of our achievements are as follows:

Learning about the basics of BMS, i.e. Building Management System

Learning about the IQ-Series Controllers, i.e. Access Control System

Learning about the CCTV, i.e. Closed Circuit Television Learning to work efficiently with EBI, i.e. Enterprise

Buildings Integrator Learning about the installation of Cameras and DVR

Commissioning

Some of the lessons learnt are:

Choose a platform that you are familiar with Plan your steps carefully

Honeywell Automation India Limited, New Delhi

93

Page 94: Project Report

Access Control System and CCTV

Assigning priorities to various tasks of the project Deadline should be followed strictly Working together in and as a team

BIBLIOGRAPHY

The following books and manuals have been referred during the course of the development of my project:

Manuals Referred:-

1. IQ-200 Intelligent Access Control SystemInstallation Manual33-10036-001

2. IQ-400 Intelligent Access Control System Installation Manual 33-10057-0013. Enterprise Buildings Integrator (EBI) Overview4. Enterprise Buildings Integrator (EBI) Operators Guide5. Digital Video Recorder (DVR) HNDR Series User’s Guide

Books Referred:-

1. Logic and Computer Design Fundamentals- M. Morris Mano, Chrles R. Kime

2. Advanced Microprocessors and Peripherals- A K Ray, K M Bhurchandi

Honeywell Automation India Limited, New Delhi

94

Page 95: Project Report

Access Control System and CCTV

3. An Introduction to Analog & Digital Communication- Simon Haykin

Honeywell Automation India Limited, New Delhi

95