Cut the wire for easy access

Access & Identity Management Handbook 2018 Access Control & Identity Management, Infrastructure

The great debate about hardwired versus wireless systems will no doubt continue for some years to come, but it’s clear that wireless access control is coming into its own. Hi-Tech Security Solutions asked a couple of industry specialists for their take on the benefits of wireless technology.

Wendy Dodd of Axxess Digital Systems says that the case for wireless access control is overwhelming when you consider the benefits offered. There is a reduction in cabling and installation costs, leading to an overall reduction in cost of ownership, which allows for more installations in more locations than with wired systems. Added to this is the fact that not only do users have remote control capability, but handheld mobile readers can be used in applications where a wired system is not suitable.

From a practicality perspective, installation procedures are faster and more simplified, and there is enhanced versatility in installations. “Wireless allows users to consider controlling access areas that would otherwise be considered cost prohibitive. Wireless technology allows for retrofit convenience, especially in very old buildings. Some of the results of adopting wireless are a higher profit margin for installers and improved aesthetic control in high end properties,” says Dodd.

“In most instances, wireless is far easier to install as systems can be pre-configured before taking them to site. Installation time can thereby be reduced by up to 90%, depending on the project. With all wireless devices being ‘online’, the system itself performs real-time diagnostics and is able to tell you which device is faulty or has gone offline, as well as indicating radio interference levels and alarms. The problem can then be dealt with and repaired very quickly whereas with an RS-485 cabling system, a whole series of devices might be shut down, involving a process of elimination to find where the fault lies. This can be very time consuming and complex, especially if there are hundreds of cables within a system.”

Equivalent reliability

System reliability is obviously important and there are benefits and disadvantages to both wired and wireless technologies. Dodd points out that digital packet radio technology, together with SMART intelligent transmission of data, means that the wireless system is as reliable as a hardwired system.

“Certainly, a wireless system can be jammed by a high-powered broad spectrum jammer. However, these are illegal and not freely available. An intelligent system such as Axxess-E can detect jamming and can raise an alarm as well as email the condition to relevant people who can take corrective action. If jammed, this system does not become unreliable or unsafe, but rather it locks down everything and remains locked. Jamming cannot open doors,” she adds.

A further concern with hardwired systems is that the cabling can be eaten by rats or moles, can become corroded, flooded and even shorted. Third-party contractors can also negatively affect the system by inadvertently damaging cables in a large building whilst, for example, undertaking unrelated civil work.

“There are some hardwired readers in the field that can be easily opened, allowing for tampering with wires, effectively bypassing the access control system. Conversely, since all data in wireless systems like Axxess-E is encrypted with AES-128 encryption and a rolling code, there is no risk of external interference and destruction,” says Dodd.

Is a move to wireless access control not just a case of throwing the baby out with the bathwater? Gavin de Kock from MiRO says that IP technology has been around for some time now and wireless technology, in the form of Wi-Fi, has advanced to a point where it can provide communication between devices over far greater distances than with traditional cabling. This delivers a stable platform to not only efficiently offer excellent video footage and sound quality, but also allows one to prioritise between the two feeds.

Dodd says that UTP cabling is far more flexible in the very nature of its topography within a site and it can offer multiple communication routes back to the server. Likewise, wireless technology offers even more flexibility and can make use of IP technology as part of its infrastructure. “RS-485 is old daisy chain technology whereby a single break in the line can affect dozens of access points and bring the entire system to a crashing halt. Why not embrace modern technology which has far more flexibility and reliability than 30+ year-old legacy technology?”

IP integration benefits

Another win with wireless systems is that all new systems embrace and employ IP protocols in one form or another. IP is essential for integrating disparate systems. “IP is a global standard on which all Internet communications are based. Any IP-based system will allow communication over the Internet, making it very easy to centrally monitor different IP devices, whereas with traditional RS-485 and other protocols this was not possible,” says Marco de Ru, MiRO’s CTO.

“IP-based systems also offer a more future-proof solution and allow companies to use their existing LAN or WLAN infrastructure to connect and integrate their IP access control or time and attendance system without having to roll out new cabling. Due to the rapid development of the technology, prices are also being driven down through economies of scale,” he continues.

So you are considering a move or partial move to wireless. Should you simply add some wireless functionality onto your existing wired access system or do you need to replace your wired system with wireless to ensure a seamless transition?

Dodd believes that the global trend is a rapid move towards wireless technology. Retrofitting high-profile openings with wired access control devices has always been costly and labour intensive. Additional challenges, such as retrofitting a fire-rated door, can also be troublesome. Modern buildings make ever more use of glass and solid concrete as opposed to dry wall structures. Aesthetics is also viewed with increasing importance in modern buildings, thereby making it increasingly difficult to run cabled devices.

“Wireless systems such as AXXESS-E E have various interface devices that enable the use of older wired devices by incorporating them within a new upgraded solution. This integration, as with the installation of a new wireless system, is easier than having to change an entire hardwired RS-485 system to a newer hardwired IP system,” she says.

Wireless will continue to grow in popularity, especially on large sites and in remote areas where infrastructure is not properly developed or where retrofitting is not an option in existing applications. Wireless is here to stay but it is often not necessary to completely ditch your legacy wired system. The bottom line is that the two technologies can coexist very synergistically for the foreseeable future and each application needs to be assessed on its own merit.

For more information contact MiRO distribution, 086 123 MIRO, lerize@miro.co.za, www.miro.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Smarter access, stronger defence
Secutel Technologies Security Services & Risk Management Access Control & Identity Management Retail (Industry)
The holiday season brings excitement, increased foot traffic and, unfortunately, a spike in criminal activity targeting retail environments. Taking a proactive approach to security is essential in ensuring staff and assets remain safe.

Read more...
Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Short-range indoor LiDAR sensor
OPTEX Perimeter Security, Alarms & Intruder Detection Infrastructure Products & Solutions
The REDSCAN Lite RLS-1010L has been developed to provide comprehensive coverage and protect high-risk security zones and vulnerable, narrow indoor spaces that are difficult to protect with traditional sensors.

Read more...
Who has access to your face?
Access Control & Identity Management AI & Data Analytics
While you may be adjusting your privacy settings on social media or thinking twice about who is recording you at public events, the reality is that your facial features may be used in other contexts.

Read more...
Direct-to-cloud surveillance platform
Surveillance Infrastructure
Oncam has announced a forthcoming end-to-end, direct-to-cloud video platform that combines AI-enabled cameras, intelligent IoT devices, and cloud-integrated video management software to deliver smarter performance with reduced complexity.

Read more...
Is your entrance security secure?
SMART Security Solutions Centurion Systems Technews Publishing News & Events Access Control & Identity Management Smart Home Automation
While Centurion Systems may be known as a leader in gate and door motors in 72 countries, the company has developed more than hardware and now offers an automation ecosystem for access control security.

Read more...
Continuum launches centralised access and identity management
Editor's Choice Access Control & Identity Management Integrated Solutions Facilities & Building Management
Continuum Identity is a newly launched company in the identity management and access control sector, targeting the complexity of managing various Access and Identity Management (AIM) systems.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.