Wednesday, February 1, 2023

Access Control Commissioning Checklist

Access Control Commissioning Checklist 

All customers are not knowledgeable to understand Access control system. When we are getting order it’s our responsibility to commissioned in proper way. In India maximum system integrator do not follow their own check list and as a result after few month call logging is started. Some call forward to OEM and System Integrator with customer’s blame on products are not good. But no one drilldown about commissioning report. Ultimately system integrator don’t know commissioning also a part of BOQ, yes they put importance only installation. I hope this checklist helps end users, integrators and consultants verify that access control installation and commissioning is complete. Take print edit as per your projects and fill all point. After that attached this with handover documents.

It covers the following sections:

  • Door Hardware Checks
  • Reader Checks
  • Controller Checks
  • Fire Alarm Loop Confirmation
  • Backup Power Compliance
  • RTE and 'Free Egress' Confirmation
  • Door Timing Checks
  • Turnstiles or Gate/Door Operator Checks
  • Credential Enrolment
  • Credential Issuance
  • Database Migration
  • Management Software User Creation
  • Access Levels and Schedules
  • Access Event Notifications
  • Door Held Open / Forced Open Troubleshooting
  • Anti-Passback Troubleshooting
  • Mapping and Custom Reporting Creation
  • Viewing Clients Installation 
  • Integration with VMS and Other Systems
  • Workstation Setup
  • Network Setup
  • Cable Verification

We recommend each person using this customize the list for their own needs / situations. There is no 'one size fits all' checklist but this list is meant to serve as a starting point to make it easier and quicker to build your own.

Door Locks and Hardware

This section covers commissioning of doors and opening locks, strikes, or other electro-mechanical hardware, including mounting and physical considerations.

Physical Operation, For every controlled opening:

  • Check all lock / hardware fasteners or mounts are secure and without play, slack, or gaps exceeding tolerances on installation instructions.
  • Ensure operation of lock is free of binding, grinding, or interference for door or frame features or other components.
  • Close and open door, or operate several cycles, the opening to ensure that no binding or warping is affecting operation. 
  • If Exit Devices are used, confirm appropriate 'Push to Exit' signage is displayed.
  • If Door Closers or Operators are used, confirm electronic access devices do not interfere with operation.
  • Confirm secure installation and function of Door Position Switches/ Contacts/ DPS.
  • Weatherproof and lightly apply grease per specification to mechanical hardware like hinges
  • Ensure any cabling or system wiring is hidden, tucked behind raceway or frames, and is not being pinched or cut by features like hinges.
  • Confirm that accessibility clearances are satisfied and any additional access control devices comply with codes.
  • If standalone, battery powered locks are used, confirm remaining battery life is strong and document commission date of batteries for future reference.

Door Controller Install Checks

  • Confirm that all terminated wiring at controller is secured and terminated without short for each device.
  • If kept in a metal enclosure, ensure panel tamper contacts and panel locks are used.  Gather panel keys for central, secure management.
  • If controllers are located at the door, confirm they are installed on the secure/locked side of the opening and located behind a tamper-resistant or semi-obscured location, such as above tiles at the door.
  • For wireless locks, confirm that all hubs or repeaters are clearly labeled as companions to the separate system readers or controllers.

Free Egress and Fire Alarm Loop Check

  • Confirm that upon fire alarm activation, all door maglocks release and are not powered.
  • Confirm that upon fire alarm activation, all emergency exit doors and openings can be freely opened and are not locked for any reason.
  • Confirm that during normal operating conditions, all 'Request To Exit' devices are located in code compliant arrangements and function properly.
  • Check that any delayed egress openings have specifically been approved by the AHJ, and delays do not exceed 15 seconds, unless specifically excepted by AHJ.
  • Confirm that all Pushbutton style RTE switches are properly labeled and displayed per local code requirements, and directly interrupt power to locks and not controller, unless specifically excepted by AHJ.

Credential Reader Checks

  • Confirm that reader device is securely anchored without gaps to the wall, frame, post, or bollard.  Seal or install trim guards where needed.
  • Confirm 'normal operation' status lights are displayed per intended behavior. (On/Off/Red/Green/Blue, etc.)
  • Confirm audible beep or siren registers when credential is read.
  • Check that reader tamper device is connected and configured.
  • If contactless type reader, present test card to confirm read range meets spec.  
  • If biometric type reader, confirm unit positioning will not be interfered with by environmental features (ie: sun movement, HVAC downdrafts, etc)
  • Confirm that accessibility clearances are satisfied and any additional access control devices comply with codes.

Credential Enrolment

  • Confirm that the only credentials to be immediately carried/used by cardholders are activated, and no batched activation of unissued/ stored credentials is done.
  • Check that each user issued a credential is accurately classified and identified in the access control software.  Include Picture ID images if possible.
  • If credentials are being renewed or exchanged, confirm physical possession, disposal, and deactivation of old credential in system.
  • If biometric credentials are enrolled, confirm multiple digits or templates are enrolled.
  • If multi-factor credentials are issued, confirm that all factors are recorded, active, and valid in the system.

Access Management Software Servers

This section covers commissioning of Management Software servers and appliances, including both hardware/network setup as well as OS and software. Some of these items may not be used depending on OS and access platform. For example, appliances typically do not require OS updates. OEM to OEM process are slight different.

Access Management Software Configuration

  • Configure Unlock, Extended unlock, Door Hold Open, and Relock event periods, as appropriate.
  • Configure user access schedules (e.g., 24/7, 8am-5pm, off-hours, holidays, etc.)
  • Configure user access levels (e.g., Managers, Workers, Visitors, Temporaries, etc.)
  • Confirm Polling Interval, or settings update push duration as prompt and as close to real-time to be accurate as recorded in system.
  • Configure any Maps or floorplans used to display and manage system control points.
  • Confirm successful integration and configuration of features like 'Video Verification', or integration with video surveillance, intrusion, fire alarm, and intercom systems.
  • Configure alarm or event notifications (email, text, etc.)
  • Download and retain copies of all door/controller configurations
  • Confirm any imported databases are clean and without problems if populating access management system.
  • For 'Anti-Passback' rules, ensure that users will not unwittingly or inadvertently cause alarms if they use atypical or uncontrolled openings.

Hardware/Security

  • Document MAC address(es) (often more than one if using multiple network cards), or if hosted/cloud access is used, document hostnames of all remote servers.
  • Assign and document IP address(es) of every networked device, endpoint, or server.
  • Apply latest OS updates (unless not recommended by manufacturer);
  • Create secure admin password
  • Create additional users as specified
  • Test UPS operation and runtime (if supplied);

Network/Security Settings

  • Document Controller and other ethernet-based devices MAC address;
  • Assign and document Controller and other ethernet-based device IP address
  • Update firmware to latest version (or manufacturer recommended/tested if different)
  • Change Controller admin password from default
  • Create multiple users if required (by specification or manufacturer recommendation)
  • Set NTP server and verify time and date;
  • Disable unused services/close unused ports (FTP, telnet, SSH, etc.);

General Server Settings

  • Confirm any requisite services or policies are free to operate and will restore automatically after reboot events.
  • Change access management admin password from default
  • Create operator/user logins
  • If LDAP or Active Directory is used, confirm valid implementation and provisioning of service.
  • Confirm and document any external database connections or dependencies by the access software.

Workstations

This list involves client workstations, including hardware, OS, and access client setup and commissioning. Some of these steps may be omitted if appliances are used. OEM to OEM process are slight different.

  • Document MAC address(es) of each workstation
  • Assign and document IP address(es)
  • Apply latest OS updates (unless not recommended by manufacturer)
  • Create secure admin password
  • Create additional users as specified
  • If dongles or hardware keys are required for client access, document location of key on workstation (e.g., Port Location, Key Serial Number)

Network

This section outlines commissioning of network hardware, including switches, routers, firewalls, etc. Some of these devices may not be used in all systems, or managed by the installing integrator.

  • Document MAC address(es) of each device
  • Assign IP address and document
  • Update switch/firewall/router firmware to latest version
  • Change admin password from default
  • Configure VLAN(s) as required; 
  • Configure QoS as required;
  • Disable unused switch ports as specified
  • Configure SNMP monitoring if required;
  • Configure MAC filtering if required
  • Download and retain configuration for each switch
  • Test UPS operation and runtime for each endpoint, if supplied

Cabling

This section covers commissioning of the access control cabling system, including labeling, supports, aesthetic concerns, and testing. OEM to OEM process are slight different.

  • Label all cables, patch panels, wall outlets, etc., as specified
  • Ensure cables are secured to supports (J-hooks, ceiling truss, etc.)
  • Conceal cables where possible/required
  • Leave properly coiled and dressed service loops at Controller or Switch location and head end as required;
  • Test all terminations and document results as specified
  • Document cable test results as specified (if certification is required)


 If need any expert comment on your projects we can help you free of cost over voice or text.


Sunday, January 15, 2023

Network Video Recorder cum Network Switch

Network Video Recorder "Built-in" Network Switch 

The introduction of a Network Video Recorder (NVR) with a built in network switch confused a good portion of the professional market.  It very much seemed to be something that was geared towards catering to a side of the market that was completely unfamiliar with how an IP camera system is setup and installed.   Not a lot has changed since their original release dates.  Most installers still scratch their heads at the thought of using them, but the fact remains that there is an audience.  For those who aren't looking to educate/teach themselves the way of "proper IP installation," these simple to adapt to NVRs are very appealing.  Having said that, it's equally important to understand what you're getting yourself into with a built in switch.

Cost Comparison

There are two ways to look at cost, but we're going to start with your initial purchase for getting this system up and running.  There's no way to conceal the fact that purchasing an NVR with a built in switch is going to be cheaper.  A standard NVR purchased together with a dedicated PoE switch will probably cost you about 25% more than the alternative.  Because of the somewhat basic nature of network switches, you probably won't notice any difference in performance between the two options.  It really comes down to quality in this case, and you're just going to pay more money for the more proven brands; your built in switches are generally built by an unnamed Chinese manufacturer.

The other way to look at cost is to look towards the future.  Network switches are just as imperfect as everything else.  The most common occurrence is that a network port burns out and is no longer able to be used.  If your warranty has expired, you're now in a position where you're going to need to start spending money to get to a solution.  Depending on how much that damaged switch effects your system, you're left with a couple options.  In the case of a dedicated switch, you can replace the switch entirely or you can purchase another smaller switch as an add-on to make up for malfunctioning port(s).  These can be purchased for as little as $50.  An NVR with a built in switch is not going to have such an easy time.  You can try using a dedicated switch as an add-on, but you're now just setting up your system via the alternate method.  If you still have a demand for the same type of "camera hardwired to NVR" setup and your NVR is out of warranty, you'll now find yourself needing to replace the entire NVR instead of the much cheaper network switch.P

Cable Runs

A built in switch is going to require that you run your cable the same way you would with an analog system.  In this scenario, you're going to be running a cable for each camera all the way back to the NVR to create your hardwired connection. Your cable length is limited, in this case, to the standard 328 feet.

A dedicated switch can potentially have some major advantages here. Thinking that a dedicated switch needs to be placed anywhere near your NVR or router would be a mistake.  It makes the most sense to place your switch as close to the biggest cluster of cameras as possible.  This can make for a lot of short cable runs from IP cameras to switch.  From there, it's just a matter of running a single cable from that switch back to your router.  The end result is that you simultaneously put all of your IP cameras on your network by running that one cable.

This is a rough example of what an installation might look like with a dedicated switch.  Of course your own personal hardware situation might be different, but you should get the concept we're going for.  Installing your IP camera system like this will also double the potential distance you can run your cable.  In addition to your cable length being able to be run as far as 328 feet from cameras to switch, you can also run up to another 328 feet from switch to router.  You can revert back to cost as much as you want, but a dedicated switch is going to give you more capabilities and versatility for your money than a built in PoE switch will.

Reliability

This is mostly a matter of opinion and how much you trust individual manufacturers to begin with.  Dedicated switches are usually going to be found with a name brand printed on them.  You've heard of certain brands like Linksys, Netgear, and D-Link because they have an established reputation.  It's not hard to go online and find out how well these companies are performing.  The internet will contain a plethora of reviews and discussions related to these company's products.  This is all to say that transparency is much easier to find with big brands; the general public doesn't let them keep any secrets.  This makes selecting and purchasing a product a very straight forward and simple task; it just takes a bit of research.

There are those among us who are completely against the idea of owning anything that's "unbranded" under the pretense that they believe it's all junk and lacks in longevity.  The fact remains that a good number of the unbranded devices that people have come to feel uncomfortable with are actually performing, and in some cases outperforming, a lot of the big brand names.  If something like this bothers you, you're going to have a hard time feeling comfortable with an NVR that has a built in switch.  The lower costs of these switches makes them attractive but getting passed the uncertainty of knowing whether or not they're going to perform as needed is not as simple.  Researching an NVR with a built in switch can gain you a general public opinion, but those opinions don't usually cover things like speed tests or information regarding longevity of the product.  This is one of those things you'll likely just have to try for yourself in order to know for sure.

All in all, you have good options for both dedicated switches and built in switches. Doing a little bit of homework/research into the product you’re considering should shed enough light on the subject where you can feel confident with your decision either way.

Compatibility

A dedicated switch, no matter who it may be manufacturer by, is compatible with any IP camera from any manufacturer across the board; no questions about it.  A built in switch relies on information it receives from the NVR to determine compatibility.  This can quickly turn into a problem absent any solution.  If you hard wire your IP camera to your built in switch on your NVR and you find that the camera isn't being detected, you're almost guaranteed to be the owner of an NVR and IP cameras that are probably never going to play nicely with each other, and likely not at all.  There is seldom anything you can do to fix a problem like this. On rare occasions, there's a setting that needs to be toggled somewhere, but don't plan on being this lucky.

You can still have compatibility issues with a dedicated switch, but those problems are usually limited to specific features and not the complete inability to bring up the camera whatsoever.  For example, a HikVision IP camera cannot be accessed by a Dahua NVR if you attach that camera to a built in switch on the NVR.  However, if you connect that same camera to a dedicated switch, you'll very easily be able to add that camera to the NVRs device list, but you'll be missing the motion detection feature without a lot of tampering.  We should mention again that any compatibility issues you encounter with a dedicated switch aren't cause by the switch, but by the manufacturers of the cameras and recorders. We are not promote HikVision / Dahua as both “High" level vulnerabilities. No participation in ONVIF committees for both brands. No access to new ONVIF software. Below media statement.


Sunday, January 1, 2023

Security Trends in 2023

Security Trends in 2023 

Wishing you a very Happy New Year – 2023. Although some of the worst disruption caused by the global Covid-19 pandemic is hopefully behind us, 2023 is shaping up to be another challenging year for business and society. But this year few states going through partial lockdown case to case basis.

Cyber security in physical security:

Adoption of digital technology and internet have also led to increase in cybercrime incidents. It can be controlled or minimized with care, precaution, awareness and with the use of appropriate tools to secure the information. Indian Cyber Crime Coordination Centre (I4C) under Cyber & Information Security (CIS) Division of the Ministry of Home Affairs, has prepared one manual to disseminate Cyber Hygiene Best Practices for the benefit of Industrial Bodies/General Public/Government Officials.

Many large buyers now provide a cybersecurity questionnaire that integrators and solution vendors must complete, leading to creation of new roles in some companies just to respond to such questionnaires that are required in bid processes. Vendors, integrators and the practitioners themselves are simultaneously chasing cybersecurity talent to add to their employee teams, a challenging proposition given the overall difficulty to hire technically skilled workers of any type. Cybersecurity has to be managed on multiple levels, requiring constantly expanding investments in:

·        Device-level cybersecurity (e.g., cameras, readers, panels)

·        Infrastructure cybersecurity (wiring, networks, switches, etc.)

·        Software and Server cybersecurity

·        Configuration cybersecurity (correct implementation of cybersecurity features)

·        Cloud cybersecurity

·        Mobile device cybersecurity (particularly as security and employee bases become more mobile or remote)

·        User cybersecurity (e.g., social engineering attacks, insider threats, etc.)

Security practitioners today seem to have three general choices when it comes to convergence:-

1. Ignore: Disregard the need to converge—a wholly unwise choice, by most accounts.

2. Strongly Interrelated Teams: Continue to manage security in two, separate but equal channels, but strongly define team relationships such that constant open dialogue and cross-investigation exist between the two specialized teams.

2. Fully Converged: Fully merge security leadership and tactical security management to link cybersecurity protections and physical security protections, given converged threat vectors that impact information, data, people and assets.

Artificial Intelligence (AI):

In 2018, a NITI Aayog report stated that India will hold a late-mover advantage in real world application of artificial intelligence (AI). Worldwide, spending by governments and business on AI technology will top $500 billion in 2023, according to IDC research. Moreover AI applications on top of security solutions helps break the boundaries of our industry’s value to practitioners, by embedding non-security applications that take data from the proliferation of sensors of all types to correlate data points or find trends that can save businesses money or enable them to act more swiftly.

In a pre-event discussion with panel lists from an AI panel held at SNG 2022, the expert panel lists (reflecting integrators, vendors and practitioners) indicated they see sweeping AI frameworks coming, but admitted the industry is not yet prepared to define a framework for AI, noting that the technology’s rate of change is likely outpacing our ability to construct implementation frameworks, particularly ethical frameworks.

 

“IN 2023, ARTIFICIAL INTELLIGENCE WILL BECOME REAL IN ORGANIZATIONS. NO-CODE AI, WITH ITS EASY DRAG-AND-DROP INTERFACES, WILL ENABLE ANY BUSINESS TO LEVERAGE ITS POWER TO CREATE MORE INTELLIGENT PRODUCTS AND SERVICES.”

—TRENDS FUTURIST BERNARD MARR, WRITING FOR FORBES IN NOVEMBER 2022

 

Autonomous Devices:

Autonomous devices are a physical form of autonomous technology. Robots, both functional and humanoids, drones and vehicles are a few examples of autonomous devices. Autonomous devices learn from their surroundings and complete tasks without continued human input.

Automation of repetitive security tasks in lower-risk environments (think robots doing automated patrols in unstaffed facilities) and partly about highly responsive situational awareness (flying a drone to a remote or dangerous location for visual input back to the command post), but the real opportunity being seen for 2023 is connecting improved robotics with AI-embedded intelligence to finally put more “autonomous” in “autonomous devices,” some of which required an operator to previously drive the robot. Notably the International Standards Organization narrowly defines robots to not include remote-controlled solutions such as remote-controlled drones and ground vehicles.

Over half a million industrial robots were installed in 2021 according to the International Federation of Robotics (IFR), and that doesn’t even include robots for security applications, which are outside of the scope of the IFR’s annual World Robotics research.

Workforce development:

Workforce development from the societal centric perspective is defined as initiatives that educate and train individuals to meet the needs of current and future business and industry in order to maintain a sustainable competitive economic environment.

In a survey they found attracting skilled labor is a top concern, and there’s only one solution in today’s hyper-competitive labor market: “We must train our own.” Long established as a factor limiting companies’ growth (especially that of the systems integrators), expanding the workforce has become a key focus of organizations like SIA, which partnered with the Electronic Security Association to cofound the Foundation for Advancing Security Talent (FAST) to drive awareness of security industry employment opportunities.

Smart practitioners, particularly larger corporations with extensive security teams, are also hiring talent from their integrators and vendors in some cases, recognizing that they need internal personnel with the skillsets that they once could wholly outsource. Others are instead outsourcing or embedding integrator talent into their organization.

70% of employees work through mobile devices, with 200 million worldwide using mobile business apps. What’s more, 84% of decision makers plan to increase spending on mobile applications that drive employee productivity, reduce costs and enhance customer satisfaction.

The mobile workplace is a place that offers a host of benefits. Its core objective is to make employees as productive as possible, whether they are at their desks, in the field or working remotely. It’s all about equipping staff with the tools they need to do their jobs more efficiently, putting those tools conveniently at their fingertips, and connecting processes so that everything within a business works more cohesively.
 
Smartphone applications will increasingly be employed in 2023 to control physical security systems. Managers will have fingertip control over who has access to certain zones and facilities, and will be able to set those controls from wherever they happen to be working.
 
Security analytics will collate rich data insights from a suite of IoT connected devices, delivering them into the hands of decision makers via their smart devices, helping to inform security and operational strategies.

Data privacy:

Data privacy is the right of a citizen to have control over how their personal information is collected and used. Data protection is a subset of privacy. This is because protecting user data and sensitive information is a first step to keeping user data private. US data privacy laws are regulated at the federal level. Data privacy is typically applied to personal health information (PHI) and personally identifiable information (PII). This includes financial information, medical records, video footage security, social security or ID numbers, names, birthdates, and contact information. You might be surprised to learn that CCTV footage is subject to the GDPR (General Data Protection Regulation).

By 2024, 75% of the Global Population Will Have Its Personal Data Covered Under Privacy Regulations. Ultimately, the practitioner is responsible for ensuring that their data is protected and that systems are used ethically. This had led to pullback from many practitioners on their pace of adoption for some technologies like facial recognition to ensure that they have not only justifiable use cases but the procedures in place to ensure that advanced systems are used responsibly, and that data is only collected when it is needed.

Contactless security:

Contactless technology has become hugely important post-Covid, due to the strong reaction against physical contact. It’s also about the user experience, with people increasingly wanting things to be instant and simple.


Contactless security is therefore, unsurprisingly, becoming more commonplace. Biometric access, using the likes of fingerprints, iris scans and facial recognition to identify authorised personnel for physical access into a building or specific part of it, is already becoming the norm, whilst other contactless entry technologies that are set to be even more widely adopted during 2023 and beyond include Bluetooth Low Energy (BLE), and smartphone NFC (Near Field Communication) keyless entry, as well as QR code entry for temporary access.


For added security, multi-factor authentication (MFA), the use of more than one method of identification, is likely to become more widely adopted, as organisations batten down the hatches, making it harder for would-be unauthorised entrants to gain access.


Thursday, December 15, 2022

Internet of Things and the Cloud Ecosystem

Internet of Things and the Cloud Ecosystem

Internet of Things or IoT refers to an ecosystem of devices/things that are connected to each other over a network enabling communication among them. These connected devices are equipped with UIDs (Unique Identifiers). Once a device or gadget is represented digitally, it can be controlled or managed from anywhere. This helps to capture and transfer data from different places with minimal human intervention, increasing efficiency and improving decision making.

Broadly, Internet of Things can be classified into Consumer IoT (CIOT)) and Industrial or Enterprise IoT (IIoT). The key difference between CIoT and IIoT mainly lies in the type of devices, application and the technologies that power them.

Consumer IoT

Home Security and Smart Homes is one of the major areas where Consumer IoT is becoming very important.  Monitoring intrusions, authorizing entries, controlling appliances remotely, all these are examples of Consumer IoT applications.  Personal Healthcare is another area, which has benefitted extensively from Consumer Internet of Things. Personal wearable healthcare devices like fitness bands, track and monitor performance over time, providing information on progress and improvement. Blood pressure and heart rate bands powered by IoT can connect us directly to the healthcare system and provide timely assistance and alerts when needed. Other areas in the healthcare industry wherein IoT can play a crucial role include patient surveillance, care of the elderly and the disabled.

Industrial IoT

Enterprise and Industrial IoT applications can automate business processes that depend on contextual information provided by embedded devices such as machines, vehicles and other equipment. In recent years, Internet of Things has been gaining wide applicability, notably in Industrial and Enterprise environment as it provides a convenient mechanism to connect devices, people and processes. Organizations are looking at upgrading their existing resources to bring all their legacy systems under the IoT ecosystem. The key here is to ensure seamless interoperability, connectivity, scalability, and stability among various components in the ecosystem.  Some of the areas where organizations can bring in easy, yet beneficial changes with IoT are,

o   Asset tracking

o   Resource Management

o   Inventory management

o   Job/Task distribution

Cloud Ecosystem

The cloud ecosystem offers a platform to connect, collaborate and innovate. While IoT generates data from various physical systems in the ecosystem, cloud enables a seamless data flow and quick communication among these devices. It’s a complex system of connected devices that work together to create an efficient platform. The resources that can be delivered through cloud ecosystem include computing power, computing infrastructure (servers and storage), applications, business processes and more. Cloud infrastructure has the following characteristics, which differentiate it from similar distributed computing technologies:

o   Scalability

o   Automatic provisioning and de-provisioning of resources

o   Cloud services accessible through APIs

o   Billing and metering in a pay-per-use model

o   Performance monitoring and measuring

o   Security to safeguard critical data

How do IoT and the Cloud go hand in hand?

Internet of Things and cloud computing are complementary in nature. IoT benefits from the scalability, performance and pay-per-use model of cloud infrastructure. The cloud reduces the computational power needed by organizations and makes data processing less energy-intensive. These facilitate business analytics and collaborative capabilities which help organizations in rapid development of new products and services. The benefits of combining IoT and the cloud are:

o   Quicker deployment of data and thus, quicker decision making

o   Easy navigation through data

o   Flexible payment options

o   Decreased costs on hardware and software

o   High degree of scalability

Conclusion

According to SoftBank, by 2025 about 1.0 trillion devices are expected to be connected over Internet of Things. The rapid development in the field of IoT technology and the fast-paced business environment has made IoT an inevitable choice for organizations. IoT is bridging the gap between physical systems and digital world, hence increasing productivity in both consumer and industrial environment.

IoT service providers assist organizations to transform their infrastructure by providing IoT sensor nodes and IoT Gateway Devices, integrating the communication Frameworks and protocols and providing the Applications [Web/Cloud Applications and Client Applications], to bridge the legacy systems to the IoT infrastructure. IoT Service Providers identify congestions in the enterprise functioning and help the organization to achieve increased efficiency by enabling systematic and intelligent tracking, monitoring, communication and decision-making system. Mistral, as a technology service provider can help you realize your IoT strategy by providing IoT Device Designs and IoT Gateway Designs based on powerful processors from Intel, Texas Instruments, Qualcomm, NXP/Freescale and open source platforms. We can help you through IoT Protocol Development, Web/Cloud/PC Applications integrating with the legacy system to provide a seamless IoT enabled solution for enterprise and industrial automation.

Ref:


Thursday, December 1, 2022

Fundamentals of Printed Circuit Board

Fundamentals of Printed Circuit Board 

We live in a world driven by technology and use them in nearly every aspect of our daily lives. We tend to depend on smart electronic devices to make our lives easier, organised and better connected. Needless to say, all these electronic devices are designed over a Printed Circuit Board (PCB). PCB Design Services is a product design process involving high-level engineering tools for board design.

PCB Design is the point in a design stage at which all the design decisions made earlier come together and where unforeseen problems related to performance, power distribution analysis, signal integrity, thermal analysis and noise mismatching make themselves known and have to be resolved.

What is a PCB or printed circuit board?

Printed Circuit Board is a critical component in electronics that enables and integrates all the electronic circuits/components of a design. These boards are used in various electronic products – from Smartphones, Smart Tabs, Reader, Camera Devices, Access Controller, Infotainment Systems to Medical devices, Industrial equipment, Automotive Electronics, Radars, Defense, Military and Aerospace equipment and all other computing systems.

Printed circuit boards were initially developed during World War II for military applications. Over the years, this technology was adopted by electronic manufacturers enabling them to offer cost-effective, compact, and power-efficient solutions.

The printed circuit board is made up of a thin layer of conducting material, usually copper films printed over a non-conducting layer known as substrate. These substrates are made up of special materials which do not conduct electricity. The most commonly used substrates are Resins, Fiberglass, Epoxy Glass, Metal Board, Flame retardant (UL94-V0, UL94-V1) and Polyimides.

Fundamentally PCBs are single layer, double layer, and multi-layer. The layer classification of Printed Circuit Boards is based on the number of conductive layers present in the PCB. The below figure shows the cross-section of various types of PCBs.

Typically, there are two different methods for mounting components on a Printed Circuit Board – through-hole and surface-mount. In the through-hole method, the components consist of thin leads that are pressed through tiny holes in the board on one side and soldered on the other side. The through-hole method is mostly used because of the mechanical stability it provides to the components. In the surface-mount method, the terminals of every component are soldered to the same surface of the Printed Circuit Board directly. Mostly surface-mounted components are small and have a tiny set of solderable pins or Ball Grid Array (BGA) on the component.

PCB Material Classifications

A PCB is broadly classified into three different categories:

1.   Rigid PCB

2.   Flex PCB

3.   Rigid-Flex PCB

Let’s have a look at these categories in detail:

1. Rigid PCB

Rigid PCB, as the name suggests, is a solid, inflexible PCB which cannot be twisted or folded to fit into a specific mechanical enclosure. The Rigid PCB which is also known as the Standard PCB is made up of resin and glass along with copper foils which are generally known as Laminates. These laminates come with specific thicknesses to form a standard double-sided PCB, i.e., 0.4mm, 0.6mm, 0.8mm, 1.2mm, 1.6mm, 2.4mm, etc. Multiple sheets of these laminates are used along with pre-preg to form a multi-layer design.

Rigid PCBs are the cheapest PCBs. These are also known as the traditional PCBs and are more widely used in various electronic products. The best example of a rigid PCB is the computer motherboard. Some of the solid PCBs that we see in our daily lives are washing machine, refrigerator, telephones, and calculators.

A simple construction of the double-sided PCB and multi-layer PCB are shown below:

Benefits of Rigid Printed Circuit Boards:

o   Cost-Effective solution

o   Rugged and reliable

o   High-density circuits

2. Flex PCB

As the name suggests, the Flex PCB is a flexible PCB that can either be folded or twisted to form a specific shape. The flexible nature of these PCBs helps in accommodating a complex PCB in a smaller form factor thereby reducing the product size. The clutters within a given frame, replacing a wires/cables with a simple flex PCB. The substrate in the Flex PCBs is made up of thin insulating polymer films or polyimides similar to the Rigid PCBs. The key objective of Flex PCBs is to improve the bend and make the product compact and flexible with a lesser layer count. The thickness of the copper foils and the polyimides are made thinner to achieve the flexibility of the product. . “The thinner the copper foil, much reliable is the Flex PCBs.” A Stiffener/Backer is attached to the Flex PCBs to prevent plate buckling and support for components.

Ideally, Flex PCBs are a great choice for designing PCBs of high speed and controlled impedance. These PCBs are widely used in aerospace, military, mobile communications, computers, digital cameras and more.

Benefits of Flex PCBs:

o   Allows bending and folding to fit into an arbitrary shape

o   The thin and lightweight enables a substantial reduction in packaging size

o   Flexibility makes it easier for installation and service

o   Effectively reduce the volume of the product

o   Suitable for miniaturized and high-reliability electronic products.

3. Rigid-Flex PCBs

Rigid-flex PCBs are circuit boards that use a combination of both Rigid and Flexible board technologies in a given design. Typically, Rigid-Flex boards consist of multiple layers of Rigid and Flex on a PCB, that are interconnected within a 3D Space. This combination enables efficient space utilization as the flex part of the circuit can be bent or twisted to achieve the desired shape of the mechanical design.

Similar to the Rigid PCBs, standard FR4 layers merged along with polyimide layers, usually in the centre, are used to form a Rigid-Flex PCB. Rigid-Flex PCBs are most commonly found in devices were space/weight are major concerns, such as smartphones, digital cameras, USB, CT Scanners, Pacemakers, and automobiles.

Benefits of Rigid-flex PCBs:

o   Rigid-Flex PCBs enable design freedom, space minimization, weight reduction, that will eventually reduce the packaging requirements significantly

o   Integrates both rigid and flexible circuits to minimize interconnects

o   Dynamic and flexible and fits into smaller spaces

o   Suitable for high-density, miniaturized and high-reliability electronic products

o   Flex circuits eliminate wire routing errors

BACK SIDE CONTROLLER BOARD PCB

FRONT SIDE CONTROLLER BOARD PCB

So, there you have it. The basics of PCB and it’s classification.

Ref:-

1. Mistral Solutions Pvt. Ltd

2. https://www.tempoautomation.com/blog/

3. https://jayconsystems.com/circuit-board-design/