System hardware — devices, Devices — microprocessor units – Westinghouse SE 6000 User Manual

Page 10

Advertising
background image

S

ECTION

1: I

NTRODUCTION

1-3

Keyholder ID. Keyholder's ID number. The unique ID number is used by the computer to keep
track of all activity for that person. Once entered, the keyholder ID cannot be changed.

Location. Location of the office or branch of the company to which a keyholder is assigned.

Tenant. One of several distinct occupants of a facility with a single access control system. The
data for each tenant using the system appears separate from that of all other tenants.

Time Code. A definition of the time of day, and the days of the week, when events are to occur.
Used in assigning access privileges, performing scheduled tasks, and monitoring points.

Trace. A realtime (as it is happening) display of events for a specific keyholder or point.

Transactions. System responses to events are called transactions. The most frequently seen
is A

CCESS

G

RANTED

, which means a valid key was presented to a reader at an approved door, at

an approved time, and that the keyholder was granted entry.

Zones. Selected locations and device types may be grouped into zones to facilitate system
control. For reporting purposes, zones may be grouped into areas. If zones are created, anti-
passback instructions or controls may be assigned (see Access Control Functions in this section).

System Hardware — Devices

The principal device is the host computer. The host controls all data maintained in the database,
records all system activity, and is the central point for all reporting activity. The host communicates
with all system devices, or may communicate via an LC or RLC computer (see Optional Features
in this section).

Various other devices are included in access control systems. Simple systems may use only
contact switches and a single reader type. More complex systems may use several reader types
and many other devices. Devices are classified as input or output units depending on their
particular function. Input devices are detectors and identifiers; output devices are alarms and
control units.

Devices — Microprocessor Units

Access Control Units (ACUs). In conjunction with the host or local computer, the ACUs are used
to control door access and maintain status. Example ACUs are: WSE NexSentry, 422, 708P,
and 8xx-series. The WSE 708P units are called simple devices because they do not make access
decisions (decisions are made by host). The NexSentry, 422, and 8xx-series units are called
intelligent devices because they can make access decisions independent of the host.

Biometric Hand Readers. Devices such as fingerprint analyzers, hand geometry analyzers,
retina scanners, and other devices which check body characteristics.

Advertising