A revolution at the door

October 2013 Access Control & Identity Management

It is no exaggeration to say that network video has revolutionised the world of CCTV. Now the access control industry is on the verge of a similar, groundbreaking development. Once again, the driving force is the transition to TCP/IP-based systems.

Since the introduction of the first network camera by Axis Communications in 1996, digital network video surveillance systems have developed fast and now deliver a wide variety of advanced features that never could have been be attained by solely relying on analogue technology. Today, distributors, integrators and, not the least, end users have come to expect a wide range of useful functionalities, such as remote accessibility, high image quality, event management and intelligent video capabilities along with easy integration, better scalability, greater flexibility and cost-effectiveness.

IP versus traditional access control

The migration of access control systems to a digital environment is sure to bring many comparable benefits, i.e. lowering installation costs, facilitating configuration and management, while simultaneously enhancing the versatility of the systems and opening up for integration with other security products. Of course, IP-technology is not totally unknown to or unused in the access control industry. But existing systems have not been able to fully exploit the advantages of IP.

Figure 1.
Figure 1.

Typically, a legacy access control system is dependent on having each device – card reader, handle, door lock, door position switch, etc. – hard wired with RS-485 cable into one central unit or central server. Besides being proprietary systems, which confines the end user to one single provider of hardware and software, these solutions often tend to be very complex and require expert personnel to handle installation and configuration.

Figure 2a. Traditional installation with one central unit and proprietary cabling to the accessories at the door.<br>
Figure 2b. IP solution with network switch. AXIS A1001 Network Door controllers are placed at each door with cabling to door accessories.
Figure 2a. Traditional installation with one central unit and proprietary cabling to the accessories at the door.
Figure 2b. IP solution with network switch. AXIS A1001 Network Door controllers are placed at each door with cabling to door accessories.

Furthermore, when expanding traditional analogue systems the process is complicated by the need to consider that a typical central controller is built to accommodate a certain maximum number of doors, normally 4, 8, 16 or 32. Not only does this limitation make the system inflexible but also makes it difficult for the end user to match his requirements with products available, e. g. if there is a want for access control at, say, 9 or 17 doors. The lack of flexibility also brings high marginal costs, which can make the addition of one extra door unjustifiably expensive.

Small basic systems

All in all, conventional access control products and systems are normally designed and optimised for large installations with a lot of doors and maybe thousands of credentials (cardholders). The actual market looks very different. According to Sales & Security Integrator gold report (2013), the average installation consists of 10 doors and have about 128 credentials. Only about 20% of the installations have more than 10 doors.

Without the need for hard wiring to a central control unit or central server, IP-based systems enable installations that are non-proprietary, flexible and scalable. This means not only a more versatile solution, but also a more cost efficient one. Freed from the constraints of enlarging the system in certain multiples, a network-based system can – should it be necessary – be enlarged by one door, and one reader, at the time.

Furthermore, TCP/IP enables edge solutions. An edge solution has one controller for each door, which then is connected to the existing local Ethernet through a regular network switch. Since IP networks now are ubiquitous in offices, stores, factory plants and similar facilities the cost of adding an IP-based door controller would be minimal, as opposed to multiple serial connections wired back to a central server.

Cabling work can be even further facilitated. By employing a PoE (Power over Ethernet) supported controller at each door, the need for separate power cables for door equipment such as locks and readers can be eliminated. This reduces the total installation cost. In addition, support for Uninterruptible Power Supply (UPS) makes it possible to avoid having battery back-up for door equipment.

Large and more advanced systems

The transition to IP-based solutions will make implementation of access control systems far more attractive. It will also resolve many of limitations of existing traditional systems, and bring additional functionalities that go far beyond conventional door control. Integration with video is one example of a very common requirement which will be much easier to meet with IP-based solutions. In fact, a common, standardised digital environment has the potential to create countless opportunities to integrate other systems such as intrusion detection, fire detection, and so on into uniform, manageable and user-friendly systems.

Figure 3. A schematic view of possible integrations between an access control system and a network video surveillance system and 
other IP-based third-party applications. Note that management functions can be distributed.
Figure 3. A schematic view of possible integrations between an access control system and a network video surveillance system and other IP-based third-party applications. Note that management functions can be distributed.

High security requirements do not make the system less manageable. On the contrary, IP-based access control systems enable remote management, which clearly is an advantage on very large or dispersed sites. This ability also makes it easier and simpler to configure, test and verify a whole new or partly new system, as adjustments can be made from the closest network connection.

Figure 4. An example of a non-proprietary access control system.
Figure 4. An example of a non-proprietary access control system.

Deploying systems – regardless of their size – is therefore quicker and less labour-intensive than installing a corresponding analogue system. The distributed intelligence of such a system makes it less vulnerable to power shortages and network failures. Uninterruptible Power Supply (UPS) and local buffering of events in combination with encrypted communication contribute to the highest degree of reliability and security.

Benefits of standards

Very much like in the video surveillance market a shift into IP in the access control industry will surely also mean a transition from proprietary systems to open solutions. And these solutions will most likely be based on international industry standards.

Open solutions and standardised interfaces are a prerequisite in any industry that want to establish their own equivalent of 'plug-and-play'. There are many gains from such development also in access control. It will allow end users to freely pick and choose between components – reader, door controller and software – that best satisfy their needs and preferences. This freedom of choice makes the system future proof and means the end user no longer has to rely on a single brand or supplier. Equally important, it can also enable integration with other security related systems and third party applications, without the need for costly hardware boxes to make the bridge between the different systems.

In the network security systems market there is already a clear trend to develop open or standardised application platform interfaces (APIs), which can be used by all competing market participants on fair, reasonable and non-discriminatory terms. Naturally, this will increase supply and promote competition and bring a new level of innovation to the industry, while simultaneously making it even easier for end users, system integrators, consultants, manufacturers and others to take advantage of the different possibilities offered by network solutions.

For example, the Open Network Video Interface Forum (ONVIF), which is a global and open industry standards body with the goal to facilitate the development and use of IP-based security products, announced in 2010 an extension of the organization’s scope of standardization to cover physical access control. Ideally, access control devices from manufacturers that comply with the ONVIF standards will in the near future interoperate effortlessly and seamlessly with each other, as well as with other video surveillance products and systems conformant with the standard.

New business opportunities

Making access control systems based on TCP/IP will bring new and exciting business opportunities. Integrators will, for instance, appreciate the easy installation and the possibility to integrate access control with other systems. Distributors will find new markets and new customers when they are free to bundle different components from different manufacturers to create useful and attractive business offers. And end customers, finally, can take advantage of an affordable, yet flexible, future-proof and adaptable technology that can help to secure and protect valuable assets.

For more information contact Axis Communications, +27 (0)11 548 6780, roy.alves@axis.com, www.axis.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Paxton set to launch game-changing new system
Paxton Access Control & Identity Management News & Events
Access control is evolving fast. Installers and end users are looking for systems that are simple to install, easy to manage remotely, and flexible enough to scale. In response, Paxton is exploring how emerging technologies can reshape access control.

Read more...
NEC XON secures mobile provider’s hybrid identities
NEC XON Access Control & Identity Management Information Security Commercial (Industry)
For a leading South African telecommunications operator, identity protection has become a strategic priority as identity-centric attacks proliferate across the industry. The company faced mounting pressure to secure both human and non-human identities across complex hybrid environments.

Read more...
Cloud security in visitor management and access control
SA Technologies Access Control & Identity Management Infrastructure Residential Estate (Industry) Commercial (Industry)
Cloud has become the default platform for modern security operations, from visitor management portals and remote access control to incident logging, reporting, analytics, and integrations. But “in the cloud” does not mean “someone else is securing it for us”.

Read more...
Centurion raises the bar at HomeSec Expo
Centurion Systems News & Events Access Control & Identity Management Residential Estate (Industry) Smart Home Automation Commercial (Industry)
Centurion Systems unveiled its latest product lines at HomeSec Expo 2026, introducing SMART+, a simpler way for installers and end users to manage their Centurion installations - as well as a few new products.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
Protecting citizens’ identities: a shared responsibility
Access Control & Identity Management
A blind spot in identity authentication today is still physical identity documents. Identity cards, passports, and driver’s licences, biometric or not, are broken, forged, or misused, fueling global trafficking networks and undermining public trust in institutions.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.