The assessment of exploitation process of power for access control system

The safety of public utility facilities is a function not only of effectiveness of the electronic safety systems, used for protection of property and persons, but it also depends on the proper functioning of their power supply systems. The authors of the research paper analysed the power supply systems, which are used in buildings for the access control system that is integrated with the closed-circuit TV. The Access Control System is a set of electronic, electromechanical and electrical devices and the computer software controlling the operation of the above-mentioned elements, which is aimed at identification of people, vehicles allowed to cross the boundary of the reserved area, to prevent from crossing the reserved area and to generate the alarm signal informing about the attempt of crossing by an unauthorised entity. The industrial electricity with appropriate technical parameters is a basis of proper functioning of safety systems. Only the electricity supply to the systems is not equivalent to the operation continuity provision. In practice, redundant power supply systems are used. In the carried out reliability analysis of the power supply system, various power circuits of the system were taken into account. The reliability and operation requirements for this type of system were also included.


Introduction
The basic criterion providing the power supply continuity for the access control system includes high reliability of all power supply devices forming the power grid [1][2][3].The quality of the supplied electricity, which the proper functioning of a number of receivers depends on, does not remain irrelevant [2,4,5].The quality parameters of electricitysupplying the electric receivers, including the biometric access control system, were determined in the relevant standardse.g.PN-EN 50160 or regulations of the Journal of Laws No. 93/2007 [6].The standards and regulations strictly define the electricity parameters, however, there is a lack of executive regulations, which would constitute a basis for enforcement against the receivers of interference introduced to the grid [7][8][9].For the purposes of the devices forming the access control system, the most dangerous are short power interruptions and their specific cases defined as voltage dips [10,2,11].In order to continue the access control system operation, in case of voltage losses longer than 10 ms, it is important to use the emergency source of electricity, e.g.accumulators' batteries or UPS devices [12,13].The Access Control System is a set of electronic, electromechanical and electrical devices and the computer software controlling the operation of the above-mentioned elements, which is aimed at: • identification of people or vehicles allowed to cross the boundary of the reserved area [14,15]; • prevention from crossing the boundary of the reserved area by unauthorised people or vehicles [16]; • generation of an alarm signal informing about an attempt of crossing by an unauthorised entity.In Fig. 1, a simplified diagram of the access control system used in the large facility was presented.Currently, in the controlled facilities, where the access control system was applied, a technique of verifying the user, which uses biometrics, is applied [17,18,19].This technique allows for precise identification of individuals with the use of their unique characteristics.Initially (due to high costs), the biometric readers were installed only in the systems designed for special-purpose facilities, e.g.secret offices.The rapid development of microprocessor technologies and electronic programmable systems resulted in the situation that the price of biometric readers decreased, however, the E3S Web of Conferences 19, 01034 (2017) operation precision and reliability increased [20][21][22].In order to control the processes of passenger and transport traffic in large areas and facilities, the distributed access control systems are used [23][24][25] -Fig.2. The integration of safety systems with access control systems makes it possible to introduce new functionalitiese.g.control over a moving object within the zone, possibility of blocking specific premises, creation of interactive documentation of the users' stay in a given facility, remote monitoring, archiving, overview and diagnosing of the system with the use of TCP/IP network, counting the number of objects at the entrance and exit, blocking the entrances to the zones in case of a breach of e.g.perimeter protection of the facility, etc. [25,26].

Methods for implementation of access control systems' power supply
The power supply of access control systems can be implemented in three different ways, which must take into account, among others, the areal extent, on which the system is placed, requirements specified in the standards and recommendations, and also the economic balance -Fig.3. The access control system's power supply can be implemented as follows: -concentrated (power supply is connected to the mainboardcontrol panel, all the system's elements and devices are supplied from surveillance lines or transmission buses); -distributed (in the system, there are many power supplies due to high power consumption by individual elements and devices, which are located at a considerable distance from the control panelvoltage drops in the surveillance lines and transmission buses from quiescent current and alarm current, all the power supplies occurring in the system should be monitored by the control panel due to sabotage and technical parameters of the output voltage -Fig.4); -mixed (system, due to the large areal extent, on which it is installed [27], uses at least two control panels, the concentrated system is supplied from the power supply with the use of surveillance and transmission lines, which are connected to the control panel -Fig.5, control subpanels are supplied from other power supplies, or modules 1,2,…,n can be supplied in the system by independent power sources, like in the distributed system, all the power supplies should be monitored by the control panel due to sabotage and technical parameters of the output voltage.The selection of a type and a method of power supply in the access control system should be preceded by drawing   up the power balance for two types of the system operationthe state of monitoring and alarming.Taking into account the alarm system classaccess control system (from 1 to 4), it is possible to determine the value of the capacity of backup power supply sourcesaccumulators' batteries are the most commonly found in the systems.
3 Reliability analysis of the power supply system used in the access control system in the vast area By analysing the operation of the power supply system used in the access control system, which is operated in the vast area, it can be stated, on the basis of the presented figures 3 -6, that it has a mixed reliability structure [22,28,29].The damage to the main power supply of the system supplying the control panel results in the transition to the backup power supply.It results in the transition of the access control system from the state of complete usability R O (t) to the state of unreliability of safety Q B (t).During the main power supply failure, some functions of the access control system may be suspended, however, it does not affect safety in the vast area.The system's operation time on the backup power supply is determined by the internal battery capacity, which is specified for given values of the quiescent and alarm currents of sensors and actuators.If the power supply from the electrical grid is not reactivated at that time (main power supply failure), the access control system changes to the state of unreliability of safety S B [30].The access control system is used in the vast area -Fig.5 has three control panels, mutually configured and monitored by the alarm centre.The power supply of individual control subpanels is implemented in a similar mannerthe main power supply, the accumulators' battery.However, in case of the main power supply failure, the connections that can be used for mutual electricity exchange were not foreseen in the system.Fig. 7 illustrates the relationships in the considered access control system in terms of safety.The system presented in Fig. 7 can be described by the following Chapman-Kolmogorov equations: (1) Assuming baseline conditions: (2) and using certain mathematical transformations [31] (including the Laplace transform), the following relationships are obtained: (3) The received relationships make it possible to determine the probabilities of the power supply system's staying n the state of complete usability R O , impendency over safety Q ZB and unreliability of safety Q B .By applying the relationships (3÷5), it is possible to determine the probability values of the power supply system's staying in the distinguished states.Such a procedure is shown in the following example.

Example
Assuming the following values describing the analysed system: -operation time - The obtained values allow for reliability assessment of the analysed power supply system.

Conclusions
The issue presented in the article concerned the reliability analysis of the power supply system of the access control systems, which are operated in a large facility.The power supply system, which consists of two dependent power supply systems, was analysed.The first system is the power supply, which implements its function by the control panel (subpanel).The second system includes the accumulators' batteries located in individual subsystems of the access control system -Fig.5.The technical parameters of the power supply and accumulators' batteries (current, output voltages, etc.) are controlled by individual control panels, and the information on its technical condition is transmitted to the alarm receiving centre.The individual subsystems of the access control system can be treated as independent due to the implemented power supply function.According to legal regulations, the power supply of individual subsystems should be implemented from separate electric circuits (main cable connector) appropriately protected by overvoltage and short-circuit.As a result of the adopted assumptions, the calculations, which allow to determine the probability values of the power supply system's staying in the distinguished states, were carried out.The calculations can be useful for assessing various types of power supply systems' solutions and rational selection, with assumed initial conditions and selection criteria.In the further studies, it is planned to conduct further reliability analyses that take into account other types of the power supply systemse.g.UPS.

Fig. 1 .
Fig. 1.Block diagram of the access control system.

Fig. 3 .
Fig. 3. Implementation of the access control systems' power supply.

Fig. 4 .
Fig. 4. Power supply implementation in the distributed access control system.

Fig. 5 .
Fig. 5. Power consumption by the distributed access control system's device.

Fig. 6 .
Fig. 6.Power supply implementation in the mixed access control system.

Fig. 7 .
Fig. 7. Relationships in the power supply system of electronic safety systems.Markings in Fig.: R O (t)probability function of the system's staying in the state of complete usability S PZ , Q ZB (t)probability function of the system's staying in the state of impendency over safety S ZB , Q B (t)probability function of the system's staying in the state of unreliability of safety S B , λ B1intensity of transitions of the automatic transfer switching equipment, λ ZB2 , λ ZB3intensity of transitions of external power lines and uninterruptible power supply.

-
transitions from the state of complete usability S PZ to the state of impendency over safety S ZB1 : intensity of transitions from the state of impendency over safety S ZB1 to the state of unreliability of safety S B : transitions from the state of complete usability S PZ to the state of unreliability of safety S B : input values using the equations (3÷5), it is possible to obtain: Conferences 19,01034 (2017)