Fault tolerant systems have become a necessity
The principals of fault-tolerant access control are designed to limit the chances of system catastrophe by hardware failure
Today, fault-tolerant security systems are becoming a necessity in several high-security environments as they ensure that security is not compromised in the event of some malfunction. The availability of competitively priced fault-tolerant access control systems also make them attractive for security installers as well as end-users. In this article, Greg Hetrick, Marketing Manager at PCSC, explains fault-tolerant systems in detail, including its architecture and benefits.

Imagine a Security Director receives a call at home in the middle of the night. He’s awakened by a member of his security staff who frantically informs him the high-rise’s night shift employees cannot enter their offices when returning from break. The office door access readers are ignoring the employees’ access credentials when presented. The guard is further puzzled because his system appears to be offline for that segment, no reports are being generated and even his video monitoring has been interrupted. In a panic, the Security Director now makes numerous late night calls to the building’s Maintenance and IT Departments to assess the situation. Meanwhile, chaos builds at the scene, employees loiter the halls and lobby while the elevator reader’s floor control remains ineffective. The reader that controlled parking arms in the garage will not respond either. In this hypothetical situation, these results stemmed from a failed access controller component of the building’s security system.

Fault-tolerance is the property that enables a system to continue operating in the event of a failure of one or more of its components

Understanding fault-tolerance

Paraphrasing from Wikipedia, fault-tolerance is the property that enables a system to continue operating in the event of a failure of one or more of its components. Fault-tolerant computer systems have been around for many years- the concept is not new. For example, redundant network servers are common place in data centres. Often set up so that any single device or connection can fail, and without user intervention, a backup system or connection will step in without user intervention, and take over the job of the failed device or connection. The result: no data is lost, computers and networks continue to function while system users experience a brief hiccup lasting just seconds.

Normally, fault-tolerant systems can be characterised in terms of both planned service outages and unplanned service outages. These are usually measured at the application level and not just at a hardware level. The figure of merit is called availability and is expressed as a percentage. A “five nines” system would statistically provide 99.999% availability. A forward thinking security systems designer might pair today’s fault-tolerant servers with fault-tolerant access controllers to achieve this type of system.

Fault-tolerance has now been applied to the components of access control, namely the access control panel or controller. The principals of the fault-tolerant architecture are designed into the security hardware and software alleviating the chances of system catastrophe by hardware failure. The result: the system and its components remain “online”, and any malfunctioning hardware can be inspected at leisure (ideally this setup would have prevented the scenario described earlier).

Distributed versus subservient access controller architecture

Often, two common hardware architectures are deployed in the access control industry. First, the “distributed” architecture; as its name suggests, the intelligence (database storage and decision making ability) of the system is distributed to an array of control panels on the system. Each card reader and its associated input and output points are connected directly to an intelligent controller.

The second architecture is the “master controller-to-door controller” style, also known as master/slave. With this configuration, the master controllers are the only intelligent component of the system and each door is connected to a lesser intelligent door interface module near the systems edge.

The advantage of the first type of system described here is that since the intelligence is distributed to each controller and the number of doors connected to each controller is limited (usually 12 to 16 doors), the risk of losing more than a few doors within the system due to any one hardware failure is low, however still a loss. In contrast, the master controller-to-door controller configuration could conceivably put up to 128 doors in a degraded state if one master controller fails. The advantage of the master controller-to-door controller schema is the low cost associated with having fewer intelligent controllers on the system.

Many service providers in the security industry have had to evaluate the pros and cons of these two types of architectures upon the application’s access control requirements. Both are valid architectures, and depending on how critical it is that the system stays up and operating or the size of the end-user’s budget, either architecture could be more appropriate. In large part, manufacturers of access control hardware default to either one or the other of these two architectural philosophies and will forcefully defend it.

Fault-tolerant systems are a more efficient way to manage access control
Fault-tolerant systems lend flexibility to the management of security systems and technologies

Fault-tolerant access control

New fault tolerant systems offer the service provider and the end-user the best of both worlds. They use the more cost-effective master controller-to-door controller architecture, yet offer system survivability that surpasses even the most conservatively designed distributed intelligence systems. Having the ability to fall back to any other master controller on the system is advantageous in eliminating an “offline” scenario.

A truly fault tolerant system offers redundant master controllers, redundant host computers, redundant communication paths and backup power. With today’s fault-tolerant access control systems, you can choose from several different backup or secondary communications protocols. You could opt to use an LAN as your primary communication path and then have an additional LAN connection, wireless network or hardwired RS485 to serve as a secondary or tertiary communication mode.

These fault-tolerant systems offer advanced features, such as automatic data propagation. When a new fault-tolerant master controller is added to an existing fault-tolerant system, the necessary information the new controller needs to operate as an integral part of the system can automatically be transferred from either the host computer or from another master controller in the system. No physical user intervention is needed to give the new controller the data and system parameters it requires to become a part of the existing system environment. Inputs and outputs are now global in their reach. Any input on the system can trigger any output and this can be based on any event, anywhere on the system—none of this is dependent on the host computer or even any specific master controller.

This flexibility is an inherent consequence of the system’s fault-tolerant characteristics. According to the specifications of one manufacturer, these systems naturally incorporate 32 bit CPUs and can take advantage of today’s advanced Power over Ethernet (PoE) technologies as well as additional high security features, such as: Automatic Hot Cutover, Fail Safe Operations, Anti-Passback Control, 5 State Alarm Monitoring, “Threat Level” Card Authorization Logic, 2 Stage Alarm Control, Alarm Latching, Two Person Minimum Occupancy Rule, AC Power Failure Notification, DC Low Power Notification, Supervised Readers and Tamper Switches, Supervised REX and FIPS 201 and TWIC Compliant.

Cost of using fault-tolerant access control

Fault-tolerance is often sought-after by the requirements of today’s high security environments. This technology is ideal for the following markets: military, government, campuses, healthcare, utility and industrial facilities. Currently, PCSC, a Torrance, California based access control manufacturer holds patent rights on the Fault Tolerant Security Architecture, the technology that is found within their product line of fault-tolerant controllers.

It is difficult to place a price on security, and priceless when it comes to life safety. These access control systems are competitively priced to compete with systems using standard designs, making these high-availability systems an attractive option for both end-users and access control installers. The days of frantic calls to dispatchers in the middle of the night to fix an access control and security system that has dropped offline could be no more. There is peace of mind in knowing that even if the controller and primary communications fail and the host computer goes offline, a facilities’ access control can remain “online” without serious interruption.

 
Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version

Author profile

Greg Hetrick Marketing Manager, PCSC

In case you missed it

Beyond video analytics, what are the benefits of AI and machine learning?
Beyond video analytics, what are the benefits of AI and machine learning?

Artificial intelligence (AI) and machine learning have made a big splash in the physical security market, transforming video analytics to a new level of accuracy. In fact, the terms have become common buzzwords throughout the industry. However, the potential for AI and machine learning to impact the physical security industry goes far beyond their ability to improve video analytics. We asked this week’s Expert Panel Roundtable: Beyond better video analytics, how can artificial intelligence (AI) and/or machine learning benefit the physical security market? 

Wireless technology is transforming motion detection
Wireless technology is transforming motion detection

Motion detection is a key feature of security systems in residential and commercial environments. Until recently, systems have relied heavily on closed circuit television (CCTV) and passive infrared (PIR) sensors, which both require significant investment and infrastructure to install and monitor. Developments in wireless technology are increasing home security possibilities. Few years ago, these developments led Cognitive Systems to discover that the wireless signals surrounding oneself can be used to detect motion. Known in the wireless industry as WiFi sensing, this technology brings many benefits that other motion detection solutions have not been able to provide. The working of WiFi sensing At Cognitive Systems, the company has used WiFi sensing technology to develop a motion detection solution called WiFi Motion™, which measures and interprets disruptions in RF signals transmitted between WiFi devices. When movement occurs in a space, ripples in the wireless signals are created. WiFi Motion interprets these ripples and determines if an action, such as sending a notification, is needed. Enabling this functionality in a space is incredibly simple. With a software upgrade to only one’s WiFi access point (or mesh router), motion sensing capabilities are layered into one’s WiFi network. Existing connected WiFi devices then become motion detectors without detracting from their original functions or slowing down the network. Using artificial intelligence (AI), WiFi Motion establishes a benchmark of the motionless environment and learns movement patterns over time, which could be used to predict trends. This allows unusual movement patterns to be detected with greater accuracy while decreasing the potential for costly false alerts. WiFi Motion requires no line-of-sight or installation WiFi sensing and other home monitoring solutions All of these capabilities are made possible by WiFi sensing and together create a motion detection system that provides unparalleled accuracy, coverage, privacy and affordability compared to other solutions on the market. PIR integration is far more complex and imposes electronic and physical design restrictions compared to WiFi sensing. In terms of placement, PIR systems are difficult to install, requiring line-of-sight and a device in every room for localisation. WiFi Motion requires no line-of-sight or installation and is also a scalable solution compared to PIR. Much like cameras, PIRs can only cover so much space, but WiFi Motion can cover the entire home and even detect motion in the dark and through walls, without adding additional devices to the home. WiFi Motion detects less distinguishing context than cameras and microphones, but more context than regular PIR sensors for the perfect balance of privacy and highly accurate motion detection. Privacy solution While cameras have been the security solution for years, WiFi Motion offers a more affordable solution that can rival the privacy and coverage capabilities of even the most high-end cameras. With such a wide coverage area, one might think that WiFi sensing infringes on privacy, but actually, the opposite is true. With WiFi Motion, the contextual information collected cannot be used to identify a specific individual, unlike cameras which can clearly identify a person’s face or microphones, which can identify a person’s voice. It is different from other smart home security options that use cameras and microphones because it only senses motion using WiFi signals - it doesn’t “see” or “listen” like a camera or microphone would. This provides opportunities for added security in spaces where privacy might be a concern and installing a camera may not be a comfortable solution, such as bathrooms and bedrooms. The data collected is also anonymised and highly encrypted according to stringent industry privacy standards. Existing connected WiFi devices then become motion detectors Additional WiFi sensing applications Since WiFi sensing technology requires no additional hardware or subscription fees, it is much more affordable than other motion detection solutions. It can be used as a standalone solution, or it can be easily layered into more complex systems. This ease of integration, scalability and relatively low cost brings a lot of potential for various applications. Motion detection can trigger other smart devices in the network to turn lights on or off In eldercare, for example, WiFi sensing can be used to help seniors live comfortably in their homes for as long as possible. With the increasing aging population and high costs associated with care homes, the market for this application is considerable. Caregivers can use an app to monitor movement in their loved one’s home and be alerted about unusual movement patterns that could indicate a concern. For smart homes and other environments that have a network of smart devices, the artificial intelligence (AI) component of the technology allows for improvements to automated features. Motion detection can trigger other smart devices in the network to turn lights on or off or make adjustments to the temperature in a room. Security for the commercial sector For office buildings and other commercial properties, it is easy to see how all of these features could be scaled up to offer a highly accurate and cost-effective motion sensing and smart device automation solution. Cognitive Systems is closely involved with the development of WiFi sensing technology, working with various industry groups to establish standards and help it reach its full potential. WiFi Motion is merely the tip of the iceberg in terms of motion sensing possibilities, but its applications in the world of security are undeniably compelling. It is an exciting time for the wireless industry, as one works with stakeholders in the security space to explore everything this technology can do.

The ins and outs of a successful security partnership
The ins and outs of a successful security partnership

The only constant theme for video technology is its constant evolution. Over the last 40 years, cameras have gone from limited view, constantly monitored rarities to being one of the most populous Internet of Things (IoT) devices with a global reach. Fixed cameras with limited fields of view have been augmented with panoramic cameras with 180- and 360-degree viewing capabilities at ultra-high resolutions in the 4K and 8K ranges, a far cry from the grainy, monochrome viewing of the past. Threats have also evolved in that time, leading to a necessary evolution in security posture, moving from a series of individual programmes and practices, to a comprehensive strategy designed around complex risk assessments. To ensure the successful implementation of your security stance in today’s world, you need technology to integrate seamlessly and vendors to work together to deliver coherent solutions rather than individual components. Since successful partnerships are always a two-way street, it’s important to take a look at some of the factors that vendors should offer and expect to receive when entering a beneficial partnership where technology seamlessly folds into the ecosystem of the partner’s technology offerings. Open technology standards If you ask any customer what the biggest negative is when it comes to new and emerging technologies, you’ll get a pretty rapid answer of “vendor lock-in.” You can have the best technology in the world, but if you don’t give a customer the opportunity to build multiple, “best-of-breed” products into a comprehensive strategy, you’re going to fall by the wayside pretty quickly. You need technology to integrate seamlessly and vendors to work together That’s not to say that you can’t have unique, proprietary or visionary technology; you absolutely can, and it is what innovation and progress thrives on. Building those technologies around open technology standards is vital if you are looking for wide-scale adoption. Using open technology standards also allows you to integrate with established industry players faster, more smoothly and with increased benefits to the customer. All of this leads to a faster time to revenue and a more rapid scaling of your presence in the market. Direct technology integrations Continuing the theme of open technology standards improving the ability to drive relationships with existing, complimentary technology partners, the directness and depth of integration also bears consideration. Using open technology standards also allows you to integrate with established industry players faster, more smoothly and with increased benefits to the customer One of the blights of building a security practice is getting all of your technologies to integrate together and feed information to each other. When you add the fact that each technology has its own user interface (UI) and management console, it can very quickly become overwhelming for the end user to keep tabs on each console, learn every interface and complicates building a workflow in the case of incidents or investigations. The administrators who manage the system also have to update each component individually, ensure that the integrations don’t break when an update is delivered and ensure that any new technologies don’t cause an existing piece of your solution to fail. As a technology vendor, if you have used open technology standards, and written your software with integrations in mind, you will find yourself becoming an easy solution to turn to. Camera manufacturers in particular can take advantage of this when integrating with a video management system (VMS). The deeper you integrate, and the easier you make it to manage, update, monitor and interact with your cameras for the VMS and subsequently the operator using the VMS, the more likely your technology will be designed into solutions. Open communication and equal joint development Successful partnerships are all about communication, and in my experience, having organisational alignment throughout both companies does wonders to improve the development processes. Executive support in particular is key, and a mutual understanding between leaders makes for a more successful go to market strategy. Equally as important is joint development, especially for engineering teams. Often, software engineers are just thrown the software from the larger of the two partners and told “make sure we integrate with this.”  It is then down to the engineering teams to figure out how the partner software works and figure out their integrations. This is less difficult if the partner is using open standards, but there is still a high degree of difficulty involved. It also takes longer to create, test, adjust and release software integrations in this way. Then you have to repeat the process whenever there is a software update on either side. Successful partnerships are all about communication If you work collaboratively as engineering teams with defined co-development plans and processes, this process is simplified, and a better solution is realised for the customer. Working as equals also allows you to drive technology advancement faster, especially for the longer established vendor. New technology companies are forced to innovate faster to stay alive and that is well worth remembering. Your mutual sales teams also have a large part to play here, since working together in front of customers with a connected message will deliver better feedback into the engineering teams for future developments and projects. If you build your technology partnerships on these foundations, then you are well positioned to deliver great solutions to your customers, real value when it comes to forming a major part of the wider security ecosystem and will be well on your way to becoming a mainstay in the physical security world.