CCNA 200-125, Cisco CCNA Cisco Certified Network Associate CCNA (v3.0) Dump 100-105 Answer, Cisco ICND1 Answer, 100-105 Cisco Interconnecting Cisco Networking Devices Part 1 (ICND1 v3.0) Answer Cisco 200-310, CCDA 200-310 Designing for Cisco Internetwork Solutions, Cisco 200-310 PDF Cisco CCDP 300-101, 300-101 Implementing Cisco IP Routing (ROUTE v2.0) Exam 300-075, CCNP Collaboration 300-075 Exam Dump, Implementing Cisco IP Telephony & Video, Part 2(CIPTV2) Exam Dump 810-403 Questions, Cisco Business Value Specialist 810-403 Selling Business Outcomes Questions CCNA Collaboration 210-060, Cisco Implementing Cisco Collaboration Devices (CICD) Practice 210-260 Dump, Cisco CCNA Security Dump, 210-260 Implementing Cisco Network Security Dump PMI PMP, PMP PMP Project Management Professional, PMI PMP Answer ISC ISC Certification CISSP, CISSP Certified Information Systems Security Professional PDF 70-534, Microsoft Specialist: Microsoft Azure 70-534 Exam, Architecting Microsoft Azure Solutions Exam 101 Dumps, F5 Certification 101 Application Delivery Fundamentals Dumps Microsoft Office 365 70-346, Microsoft Managing Office 365 Identities and Requirements Questions 2V0-621D Practice, VMware VCP6-DCV Practice, 2V0-621D VMware Certified Professional 6 ¨C Data Center Virtualization Delta Beta Practice Cisco 300-206, CCNP Security 300-206 Implementing Cisco Edge Network Security Solutions, Cisco 300-206 Dump Cisco CCNP Collaboration 300-070, 300-070 Implementing Cisco IP Telephony & Video, Part 1(CIPTV1) Answer 300-207, CCNP Security 300-207 PDF, Implementing Cisco Threat Control Solutions PDF 1Z0-062 Exam, Oracle Database 1Z0-062 Oracle Database 12c: Installation and Administration Exam CompTIA Network+ N10-006, CompTIA CompTIA Network+ Dumps 300-115 Questions, Cisco CCDP Questions, 300-115 Implementing Cisco IP Switched Networks (SWITCH v2.0)Questions Microsoft 070-346, Microsoft Office 365 070-346 Managing Office 365 Identities and Requirements, Microsoft 070-346 Practice Cisco CCDP 300-320, 300-320 Designing Cisco Network Service Architectures Dump 640-916, CCNA Data Center 640-916 Answer, Introducing Cisco Data Center Technologies Answer 648-232 PDF, APE 648-232 Cisco WebEx Solutions Design and Implementation PDF CCNA Wireless 200-355, Cisco Implementing Cisco Wireless Network Fundamentals Exam CCNA 200-125, Cisco CCNA Cisco Certified Network Associate CCNA (v3.0) Dump 100-105 Answer, Cisco ICND1 Answer, 100-105 Cisco Interconnecting Cisco Networking Devices Part 1 (ICND1 v3.0) Answer Cisco 200-310, CCDA 200-310 Designing for Cisco Internetwork Solutions, Cisco 200-310 PDF Cisco CCDP 300-101, 300-101 Implementing Cisco IP Routing (ROUTE v2.0) Exam 300-075, CCNP Collaboration 300-075 Exam Dump, Implementing Cisco IP Telephony & Video, Part 2(CIPTV2) Exam Dump 810-403 Questions, Cisco Business Value Specialist 810-403 Selling Business Outcomes Questions CCNA Collaboration 210-060, Cisco Implementing Cisco Collaboration Devices (CICD) Practice 210-260 Dump, Cisco CCNA Security Dump, 210-260 Implementing Cisco Network Security Dump PMI PMP, PMP PMP Project Management Professional, PMI PMP Answer ISC ISC Certification CISSP, CISSP Certified Information Systems Security Professional PDF 70-534, Microsoft Specialist: Microsoft Azure 70-534 Exam, Architecting Microsoft Azure Solutions Exam 101 Dumps, F5 Certification 101 Application Delivery Fundamentals Dumps Microsoft Office 365 70-346, Microsoft Managing Office 365 Identities and Requirements Questions 2V0-621D Practice, VMware VCP6-DCV Practice, 2V0-621D VMware Certified Professional 6 ¨C Data Center Virtualization Delta Beta Practice Cisco 300-206, CCNP Security 300-206 Implementing Cisco Edge Network Security Solutions, Cisco 300-206 Dump Cisco CCNP Collaboration 300-070, 300-070 Implementing Cisco IP Telephony & Video, Part 1(CIPTV1) Answer 300-207, CCNP Security 300-207 PDF, Implementing Cisco Threat Control Solutions PDF 1Z0-062 Exam, Oracle Database 1Z0-062 Oracle Database 12c: Installation and Administration Exam CompTIA Network+ N10-006, CompTIA CompTIA Network+ Dumps 300-115 Questions, Cisco CCDP Questions, 300-115 Implementing Cisco IP Switched Networks (SWITCH v2.0)Questions Microsoft 070-346, Microsoft Office 365 070-346 Managing Office 365 Identities and Requirements, Microsoft 070-346 Practice Cisco CCDP 300-320, 300-320 Designing Cisco Network Service Architectures Dump 640-916, CCNA Data Center 640-916 Answer, Introducing Cisco Data Center Technologies Answer 648-232 PDF, APE 648-232 Cisco WebEx Solutions Design and Implementation PDF CCNA Wireless 200-355, Cisco Implementing Cisco Wireless Network Fundamentals Exam

Distributed Intelligence | Securefast plc - Access Control Systems
 

Distributed Intelligence

What is Distributed Intelligence?

Distributed Intelligence is the opposite to centrally processed intelligence.

Computer terminal equipment which is fully functional even when the central unit to which it is attached is not available is an example of a distributed intelligence system. A failure of centralised computing may be found in an airport check-in or when on the phone to the bank and we are told that there is a problem with the computer or the communication lines so that they are unable to check us in or give us the information we need.

Distributed Intelligence would in this case be attained by giving each of the parties involved a computer containing the full database, enabling the system to continue to work regardless of what the others were doing.

If this concept is applied to the security industry and in particular to access control, a fully distributed intelligence system is one where not only is the access control decision made at the point of entry but also where the entire system database is stored. This means that at no time does the system require help from a higher level unit or computer in order to make the correct access decisions speedily from its local database.

In the case of the IET networking access systems, the availability of this multiple copy database is taken one stage further. In the event that an Access Control Unit (ACU) loses part of its data due to power failure, maintenance or electrical disturbance, because every ACU on the system is a master (no slaves), any ACU will automatically restore the current database from other units on the system. This capability further enhances system reliability.

What is NOT Distributed Intelligence ?
This is when the full database is not available at each ACU.

Based on the above, let us suppose that you have a site to protect. You want the best for your client and you propose a system that has fully distributed intelligence. The site has 7 perimeter doors or barriers. The system that you have selected has controllers that each have the capacity to control 8 card readers and is ideally suited to the site layout. As a result one these controllers is designated to protect all the card readers at the perimeter access points.

This means that one ACU now controls all of the perimeter access points and you have in fact created a centrally processed system for the site perimeter! This means that you have provided your client with a system where full distributed intelligence has been removed. What you wanted was a system so designed that should any processing component fail, as few access points as possible would be affected. With this proposed system, if the ACU handling the perimeter access points fails, you have jeopardized the entire perimeter of the site.

This example begs the question of how many card readers a controller may handle and still be considered as a fully distributed intelligence system. The ideal situation would be of course, to have a controller containing the full database at each individual access point. Of course, in reality this is not very practical and would prove to be extremely expensive.

ACU’s with the ability to control a maximum of 4 doors are a good compromise, however great care should be taken when proposing a system where maximum security is required.

Be careful. Please note that some systems which purport to have distributed intelligence do so because the processing is not done by a host PC or the local ACU, but by another remote unit. These low budget systems invariably fail to provide sufficient security and reliability.