A
Troubleshooting:
The software of the card reader and the card issuer are inconsistent in the fetching method, and the fetching method of the card reader is changed by the controller after the card reader is connected to the controller.
Solution:
Return to the factory to modify the program fetching method or replace the card issuer of the latest version of Central Control Radius, and adjust and select the corresponding fetching method through the software.
A
Troubleshooting:
After the card reader is powered on, there is a long beep. Under normal circumstances, the buzzer is faulty. Check whether the wiring method is correct.
Reason:
The buzzer is faulty; the wiring is incorrect.
Solution:
Replace the buzzer.
AThe normal communication distance of the WG output card reader is 80-100 meters, and our company's access control products can work normally within about 130 meters when connected with shielded wires.
A
Troubleshooting:
Step 1. Change the card to see if it can be read
Step 2. Put the unreadable card on a different reader to see if it can be read
Reason:
If the card can be read after changing a card, it means that the card reader has no problem. The problem is on the card. If the card cannot be read after changing another card, it means that the card reader is faulty; this card cannot be read by other card readers, which means the card If it is damaged or demagnetized, and it can be read by other card readers, it means that the transmission frequency of the card has received external interference and the frequency has changed.
Solution:
If the card reader is broken, it will be guaranteed, and if the card is broken, you can replace the bad card.
A
Troubleshooting:
Step 1. check if the reader is installed on or near metal
Step 2. check if the card is swiped in or out, if it is, to see the distance between the two card readers
Reason:
If the card reader is mounted on metal, because the metal has a shielding function, part of the radio waves emitted by the card reader is shielded by the metal. In addition, the same problem will occur when the two card readers are installed too close to each other. The two card readers transmit radio waves at the same time, and the mutual interference of the radio waves will cause the card reader to be slow, the card reading distance is too close, or even the card will not be read.
Solution:
The installation environment of the card reader should be observed during installation. If the card reader is installed on a metal material, the installation environment should be explained to Central Control Ruidiyou when purchasing the card reader, and the card reading parameters of the card reader should be adjusted according to the installation environment; To swipe the card in and out, the two card readers should be staggered by 30CM. If conditions do not allow, a shielding board should be installed on one of the card readers.
A
Troubleshooting:
Step 1. check if the power supply is working
Step 2. check if the reader is broken
Step 3. check if the reader effected by strong magnetic around
If all the above steps are eliminated and the reader still does not read the card, it could be determined as the following reasons:
The reader will accumulate static electricity after use for a period time, the accumulation of static electricity for a long time causes excessive power consumption. The shorter the use time, this problem occurs, indicating that the card reader is aging too fast.
Solution:
Before installation, choose a high-quality, high-power special power supply for access control. If it happens after use, separate the power supply from the electric lock and the card reader, and add another power supply to the card reader separately.
AData collection is the cornerstone of big data, whether it is the current Internet companies, IoT companies or traditional IT companies, each business process link will generate a large amount of data, while the logs of user operations will also generate a large amount of data, in order to collect these structured and unstructured data, we must have a complete set of data collection program process, to provide the data basis for the subsequent data analysis applications.
AData collection is the cornerstone of big data, whether it is the current Internet companies, IoT companies or traditional IT companies, each business process link will generate a large amount of data, while the logs of user operations will also generate a large amount of data, in order to collect these structured and unstructured data, we must have a complete set of data collection program process, to provide the data basis for the subsequent data analysis applications.
AUsers can draw the flow chart screen of equipment operation online, and through the data connection, they can correlate the real-time data and historical data of the platform, and perform real-time online monitoring on the web screen. Users can draw the flow chart screen of equipment operation online, and through the data connection, they can correlate the real-time data and historical data of the platform, and perform real-time online monitoring on the web screen.
AData collection is the cornerstone of big data, whether it is the current Internet companies, IoT companies or traditional IT companies, each business process link will generate a large amount of data, while the logs of user operations will also generate a large amount of data, in order to collect these structured and unstructured data, we must have a complete set of data collection program process, to provide the data basis for the subsequent data analysis applications.