TechnologiesElectronics

Controller Z 5R: instruction, connection diagram

Access doorphones, office and station turnstiles, entrance barriers of parking lots - all these are access control systems (ACS). The main element in them is the controller. The Russian market has long and firmly established the manufacturer of such equipment - the company Iron Logic, which offers an inexpensive and reliable controller Z 5R.

The simplest access control system

These systems are created to limit access to outsiders to enterprises, offices, warehouse and garage zones, etc., as well as to establish the mode of movement of employees across protected areas and control their working time. The simplest ACS, which controls one door in a room, has an executive body in the form of an electromagnetic (or electromechanical) lock on it. To open such a door, the incoming one should have a special key or a card with the code written in it, which is read by the reader device (otherwise - the reader). The read code is sent to the controller, which compares it with the codes in its memory. If the key code is found in the memory, an open command is given to the lock.

All access control systems are divided into two types: stand-alone (or local) and network.

Standalone access control systems

This system is used in small offices and small enterprises that do not control their employees too hard. The simplest such system can look like a peculiar thing in itself, being constructively enclosed in one ACS block like a door phone, for example, Matrix II K from the same Iron Logic. It contains a door phone controller Z 5R and a reader for keys and cards of the EM Marine standard. This is the simplest and cheapest solution, since it assumes a minimum of electrical work: you only need to connect the ACS unit to the power supply and to the lock.

Sometimes an autonomous ACS is assembled from structurally separate devices. In this case, for example, the stand-alone controller Z 5R can work with a reader of the type you choose - for keys or for cards. The choice of the system's construction depends on the degree of crime hazard in the area. If you are afraid for the security of the ACS, it is better to install on the outside door is not a complete block of it, but only a reader. Its cost in case of theft will not be so noticeable.

Network access control systems

If the system should control access not in one or two rooms, but in several tens, then it is built on a network principle. In it, all door lock controllers have special contacts for connecting the external interface. This works, for example, the network access control system of the same Iron Logic, which uses a network controller Z 5R Net, which is connected to the RS-485 interface.

It has a control PC that connects to the common interface of all controllers through a special hardware converter RS-485 / USB. The PC installs specialized software for the development of the ACS manufacturer, which allows programming controllers, manage their operation, and download events.

If you put a regular (non-networked) electromagnetic lock controller Z 5R on each of the doors, you will have to program each one separately, and there's nothing to confuse with the admission to a particular room of different employees. And if you need to periodically make changes to the system of admissions to the premises? Obviously, this can only be done centrally from a PC manager.

Typical elements of the simplest access control system

So, the composition of the simplest system should include:

• controller;

• reader (reader) input;

• reader (reader) output (output button);

• electronic keys or cards;

• Castle.

The concrete controller of the lock Z 5R we will consider below, and start with the keys for ACS.

The most common are contact keys, "tablets" like Touch Memory from Iron Logic based on the Dallas iButton standard. This key contains inside the digital code, written to it once in the factory. When a person touches it to the reader's contact pad on the doors, it creates a 1-wire single-wire circuit to power it and exchange data with the reader.

In addition to contact "tablets", a lot of contactless pendants, bracelets and cards based on the standards of EM-Marine, Mifare, etc. are produced. However, the devices of different standards are not compatible with each other and require a reader of the same standard. This should be taken into account when selecting ACS elements.

All keys (keyholders, cards) with which the controller works are divided into admin keys (or master keys) used for its programming and maintenance, as well as simple and blocking keys for entering the room.

How do locks work in the ACS?

Since the logic of the output power stage of the controller circuit depends on the type of lock used in ACS, it is necessary to deal with these types, which are only two - electromagnetic and electromechanical. With the first of them, everything is extremely clear: in fact, it is a conventional electromagnet with a U-shaped core. As soon as the door closer closes the door to the doorpost on which the steel response part of the lock is installed, a current flows into the coil of the electromagnet. The magnetic flux of the electromagnet closes through the response part of the lock. At the same time, between the electromagnet and the reciprocal part there are forces of attraction, firmly pressing the door to the doorpost. As soon as the current in the coil is interrupted, these forces disappear and the door opens.

At the electromechanical lock, on the contrary, in the closed condition the coil of the electromagnet is de-energized. In this case, the spring, which drives the lock ("dog") of the lock into motion, is cocked and held by the locking device. When the current is fed into the electromagnet, the locking device under the action of the magnetic force of attraction shifts, frees the spring, and she pushes the bolt inside the lock.

Thus, if to open the electromagnetic lock it is necessary to interrupt the current in the coil of its electromagnet, then to open the electromechanical lock one must apply current to the coil.

Controller Z 5R: wiring diagram

The above figure shows all the devices that can be connected to the terminal block of the controller. At number 1, the "end" of the door opening is indicated. The controller will not turn on the lock until the door closer closes the door. Under number 2, a typical power source, such as IBPS-12-1, with a 220 V input and a 12 V output in hermetic design , is drawn. At number 3 there is a lock. At number 4, a LED is drawn, which is mounted near the reader and ignited for the time of opening the lock. The Z 5R controller can be connected to two types of locks (see below). Number 5 denotes a normally open output button, installed inside, number 6 - a buzzer (buzzer), which is also activated for the time of opening the lock. Finally, at number 7, a reader is drawn.

Logic and control circuit locks

How does the Z 5R perform this function? The manufacturer's instruction notes that it can operate both an electromagnetic and an electromechanical lock. For this purpose, one of its outputs is made in the form of an open collector of a MIS-transistor. To this output is connected the output of the lock solenoid coil. On the second output of the coil voltage from the power supply "+12 V" is applied.

The logic of the power MIS transistor is set by installing a special jumper on the controller board. How does this scheme work? Z 5R controller with an unstable jumper works according to the logic corresponding to the electromagnetic lock: when the lock is closed, the current through its coil goes. In this case, the output MIS transistor is open, and the output of the lock coil connected to the controller is connected to the common "minus", i.e. The current flows through the coil: the lock is turned on. When the key code is recognized, the output MIS transistor is closed, the current in the lock coil is interrupted and it opens.

When the jumper is in position 1, the connection of the Z 5R controller corresponds to the electromechanical lock. This lock is closed, on the contrary, in the absence of current in the coil of its electromagnet, i.e., when its circuit is broken by a closed output MIS transistor. When the key code is recognized, the transistor, on the contrary, opens, the current in the lock coil goes, and it also opens.

Well, if you want to enter a person without a key? After all, the reader in the ACS is one, and it is located on the doors outside. How does the Z 5R work in this case? The circuit of its connection provides for connection to one of the inputs of the output button, located inside. When you press it, the lock also opens.

Principles of controller programming

To program the k you need to connect to it a regular reader (the same type that will be installed in the ACS). Next, apply power to the Z 5R controller. Programming is further carried out by short (less than 1 second) and long (about 6 seconds) of the reader's touch by the admin or locking key in the order provided by the instruction.

At the first start-up (with empty memory), all the recorded keys become admin. They should be marked to be used for programming later.

Modes of operation

The manufacturer has provided for several such modes. How to install them in the controller Z 5R? The instruction for the user provides the following modes of operation:

1. In normal mode, the working state of the lock is "closed". Opening occurs when you touch (approach) to the reader written in memory of a simple key (key fob).

2. In the "Lock" mode, the transition to which occurs at one long (up to 6 seconds) of the reader's touch with the locking key, the lock is only opened with locking keys.

3. In the Accept mode, the transition to which occurs with five short (less than 1 second) reader touches of the master key, the controller restores the key database, allowing for several days to enter the room for any keys while simultaneously capturing their codes in their memory.

4. In the Trigger mode, which takes place when the jumper on the board is set to position 5, you can close the lock with one touch of the key (for example, when all employees leave for a break), and with the second touch open it (for clients to pass during working hours).

How to erase the controller memory?

Does the Z 5R controller allow full erasure of its memory? The instruction for the user from Iron Logic gives an affirmative answer to this question. To do this, first, set the jumper on the controller board to position 2 when the power is off, then apply power and wait for a series of short beeps from the internal buzzer. This will erase the codes of all keys and the opening time of the lock, which will be replaced by its factory setting in 3 seconds. Erasing memory is possible with the help of a master key.

How to add simple keys?

After writing the master key codes, you can also enter the simple key codes into the Z 5R controller. The instruction for the user provides the following order of this procedure:

1. Perform one long tap of the reader with the master key. The buzzer of the controller at intervals of 6 seconds twice briefly signals the readiness.

2. Remove the master key.

3. Touch the reader with a simple key. The buzzer will briefly signal in response.

4. Repeat step 3 at intervals of 16 seconds.

5. To exit the mode, tap the reader with the master key. The buzzer will briefly signal four times. If you just pause, the Z 5R itself exits the mode, signaling in the same way.

How to add locking keys?

Along with master and simple keys, there is a mode for writing codes and locking keys to the Z 5R controller. The instruction for the user suggests an algorithm for this procedure:

1. Enter the mode for writing simple key codes.

2. Lock the key to touch the reader and hold it for 9 seconds.

3. Get a short and then a long signal first.

4. Repeat step 3 with an interval of 16 seconds.

How to program the opening time?

The time of opening the door (more precisely, the time to turn off the lock) can be set in a wide range. What kind of order is provided for this Z 5R controller? The instruction for the user suggests the following:

1. Four times, briefly touch the master key to the reader. After each of the first three touches, the buzzer will briefly signal.

2. After the fourth touch, the buzzer will briefly signal four times.

6. Within 6 seconds after that, short-circuit the terminals 3 and 4 of the controller pad to the desired opening time (you can connect a conventional button to them).

7. Remove the jumper. Get a series of short response signals.

Service Equipment from Iron Logic

The Z 5R controller has a special Z-2 connector for connecting to a Z-2 Base type adapter for a PC. The adapter, also produced by Iron Logic, connects to the PC with a USB cable. When connected to the controller's connector, the latter perceives the adapter as a reader. Therefore, it is possible to organize with the help of specialized software both the direct programming mode of the controller from the PC and the mode of reading its memory.

It is possible to program both Z 5R and Matrix II K, which contains Z 5R internally. In general, any stand-alone third-party controllers can be programmed via Z-2 Base if they support Dallas Touch Memor and EM-Marine protocols.

In addition, when connected to a reader supporting these protocols, the Z-2 Base is presented to it as a controller and can transmit key numbers to the PC in transit. Practically this means that by assembling the "reader-Z-2 Base-PC" scheme, you can create a key database in the PC by providing each with a comment about its purpose (to which room it should fit) using special software. After this, instead of the reader, you can connect the controller and in one receive, fill in the whole created database. The benefits of this option for practitioners are obvious. After all, it allows you to easily restore a complete database of keys in the new controller when the former fails or when it is stolen.

Similar articles

 

 

 

 

Trending Now

 

 

 

 

Newest

Copyright © 2018 en.atomiyme.com. Theme powered by WordPress.