Millennium

How to wire Power

How to wire Power, Grounding, EIA-485, and Ethernet

Power and Grounding (ESCU / Net DCD-n and EDCD)

The PS1 Power Supply includes a line conditioner for the EIA-485 (RS-485) chain that is important to get optimal distance and baud rate for the EDCDs.

The ESCU / Net DCD-n and EDCDs must share standard Power GNDs.

If the number of devices connected to the power supply is ten or fewer, may use a smaller cable.

Local electrical codes may require plenum-rated cable or conduit.

Always check local codes before running any cable.

For UL Listed systems, the power supply shall wire through a conduit.

EIA-485 (RS-485) (ESCU and EDCD)

The ESCU and EDCD use Half Duplex EIA-485 (RS-485). Connect to J1, as shown in Figure 3-2. Use shielded twisted pair cable with the shield grounded to chassis ground at one end only. (Recommended to use equivalent to Belden 3106A.

 

The ESCU / Net DCD-n and EDCDs must share common EIA-485 GNDs.

EIA-485 Specifications

The maximum Speed, Cable Length, and Number of EIA-485 nodes are dependent upon each other and

many other factors.

less than 5-10 feet, preferably about 3 feet. More extended stubs will attenuate the signals if the node’s connection point (stub) is excessively long. A long stub causes a significant impedance mismatch and signal reflections. Should keep all stubs as short as possible.

  • The maximum cable length is 4000 feet (1200 M).

 The baud rate is a function of the quality of the EIA-485 (RS-485) wiring:

  • Distance
  • Cable type (twisted pair, shielded)
  • Wire gauge
  • Number of T-taps
  • Number of EDCDs.

 Possible need for termination. A termination resistor of 120 ohms on each end across the Data+ and Data- pins on long cable runs can improve the signal distortion.

Ethernet (ESCU and Net DCD-n Only)

Network Adapter in J13 supports:

  • 10/100 bits/sec. Use minimum CAT 5, CAT 5E preferred.
  • Auto Speed detect
  • Auto Crossover detect
  • Half duplex.
  • Yellow LED indicates Carrier connection. No communication will occur unless the YEL LED is lit.
  • Green LED indicates TCP/IP activity over Ethernet.

ESCU, EDCD, and Net DCD-n Install Guide 3–5

How to Wire Readers, Inputs, Outputs

This section describes how to wire the following supported Reader interfaces:

 Wiegand Signaling (Data 1 and Data 0)

 Magnetic ABA Signaling (Clock and Data)

 MARLOK Signaling (Clock with two Data tracks)

Readers - Wiegand signaling

J6 has the Power, Data One, and Data Zero signals. Power can be either 12VDC or 5VDC. For UL compliance, the recorded range for compatibility on the outputs is 5 – 13VDC.

J1 has Red and Green LED drives. (GND when true)

J7 provides for the REX input if required.

Readers - Magnetic signaling (ABA Track 2)

  • J6 has the Power, Clock, and Data signals. Power can be either 12 VDC or 5 VDC. Reader Power has PTC short circuit protection at 200mA.
  • J1 has Red and Green LED drives. (GND when true)
  • J7 provides for the REX input if required.

Readers - MARLOK Signaling

UL DID NOT EVALUATE the MARLOK wiring setup and shall not be enabled in a UL 294 compliant system.

J6 has the Clock and Data signals.

J5 has Power (MAR VSOL), the VSOL signal and the Green MAR VLED drive.

Connect access control System reader device to Door Control Device (DCD) board.

Use six-conductor Leader Cable, supplied by Millennium access control Group for Keyloks and Keyreaders (unshielded).

May also use the unshielded Millennium access control Group leader cable with specific Wiegand devices and card readers that do not require SHIELDED cable.

Recommended cable length for Keyreaders and Keyloks is 15 feet–maximum.

Length MUST NOT exceed 35 feet. To avoid interference at this higher limit, must run the cable. Separately—not bundled with other wires.

Inputs

  • Inputs 1 through 4 are supervising with 1K ohm resistors, a
  • Inputs 5, 6, and 7 are non-supervised, Normally Closed circuits. Input 7 is used for the Door State Monitor (DSM) and can use inputs 5 or 6 for a UPS battery low signal. There is a particular input for the External Tamper. Use any one of the GND Returns for the External Tamper Return.

Relays (Outputs)

J2 and J3 provide the Common (C), Normally Closed (NC), and Normally Open (NO) pins for the two relays.

These Dry relays (Dry = requires external power) are typically used for the Door Latch and possibly an

automatic door opener.

For UL 294compliance, the relays are to be loaded to a maximum of 24VDC, 4 Amps. (Suitable for inductive loads.)

Relays are rated at 10 Amps with PTC thermistor over current protection at 4 Amps.

Use the Suppression Kit supplied with EDCDs to provide strike protection.

Install a diode across the door lock if the power supply is DC to suppress the energy surge. The cathode must be on the positive side of the strike.

If the power supply is AC, install a varistor across the door electric strike.

MILLENNIUM MOBILE CONNECT

MILLENNIUM MOBILE CONNECT

MILLENNIUM MOBILE

The Millennium mobile connects access control system credentials offers access to secured buildings, rooms, and common areas with one click from any internet-connected smartphone.

Mobile Connect provides increased security, enables ease of operation, and the flexibility to quickly access contron doors by approved users. All mobiles connect credentials are securely managing through the Millennium software platform. They are efficiently assigning through the administrator to all mobile-enabled employees, students, or assigned personnel.

The Millennium mobile connect is the most versatile mobile access system in the market as they work with any reader. One does not need to replace existing hardware to use the mobile credentials. Unlike the competition, the system is designing to work with any entry hardware linked through the Millennium access control software.

When using the mobile connect app, the system operator must first register mobile credentials within the Millennium software platform system and provide the users with the necessary software permission.

System operators have complete control over issuing and revoking credentials. Revoked credentials can be reassigned, allowing for continued flexibility.

Easy to set up

Easy to use

Flexible features

FEATURES

  1. Digital keys access control any pre-approved doors.
  2. The perfect blend of secure cloud based access control and mobile flexibility
  3. Customize the app to prioritize favorite doors for a simplified experience
  4. A secure system allows you to manage the software from any location.
  5. Available for free download from the Google Play and Apple app stores
  6. The system is online via the Millennium Ultra software platform.
  7. Free updates are available and are applied periodically.
  8. Full administrative access through the cloud-hosted solution or via local installs of access control software
  9. Grant guests’ temporary access through the app
  10. Save money on replacement cards with accessible credentials reassignment.
  11. No hidden costs, with simplistic free downloads
  12. Works with ALL readers. No need to replace existing hardware
  13. Available with client and cloud-hosted applications of Millennium Ultra

Install the app!

MILLENIUM SECURITY ALTERNATIVE

MILLENIUM SECURITY ALTERNATIVE

ONE-CARD ACCESS FOR MULTIPLE LOCATIONS ON SCHOOLS

One-Card system solution for free flow of movement between multiple buildings.

One-card system to allow teachers and students to move between buildings and schools as needed.

Integrated ID system ensures that only approved persons can gain entry and access control associated benefits

Get full reporting on all student and staff entries and exits via events recording.

Create partitions within a single access control system to allow each school to administer security and access levels separately.

The flexible design allows the addition of new doors anytime.

CONTROLLED ACCESS AND TRACKING

Secure all attached facilities with reliable access control systems

Secure connected facilities such as libraries, gyms, cafeterias to prevent unauthorized access control.

Track all entries and exits via events recording and notifications

Set timed open and lock periods for libraries and gyms for night athletics and restrict after-hours classroom access.

Integrate the system with RAVE notifications and fire alarms to protect against unauthorized entry.

PROTECT IMPORTANT ROOMS AND EQUIPMENT

Provide top-notch security for controlled spaces.

  • Keep laboratories, faculty offices, art studios, and inventory rooms secure to prevent unauthorized access control.
  • Keep private data, documents, transcripts, files, and special equipment secure.
  • Provide official entry to multiple buildings and facilities based on the administrative access level.
  • The ability to generate reports of all admissions into certain rooms allows for accountability and safety of equipment and people.
  • Customize ID and entry permissions for specific personnel and student access levels and schedules.

ACCESS CONTROL SECURITY THAT SAVES LIVES

Provide reliable access control that grows with your needs.

  • Lock down all doors in the event of threats and existential danger to lives and property.
  • Administer and control all entries remotely in the cloud based system from anywhere and at any time.
  • Connect all entryways to classrooms, common areas, labs, and gyms in one place with discreet hardware.
  • Scalable, reliable, with continuous software development to fit security needs for all facilities at every level.
  • Manage one security system for both access control and video surveillance.

Cloud-Based Access Control Boost Revenues: Outlook Positive 2027

This report deeply explains the Cloud-Based Access Control Market analysis
impending future opportunities, revenue growth, pricing and profitability of
the industry. This study is split in different parts such as market size,
applications, type regional outlook, market demand, latest trends, cloud-based access control industry share and
revenue manufacturers, company forecasts and company profiles.

Cloud-Based Access Control Market provides information regarding the number of
companies, products, and applications. It also covers the list of product range
and applications with SWOT analysis,
vital statistics, production, value, cost-profit, supply-demand, import-export,
further divided by company and country.

These are the major manufacturers covered in Cloud-Based Access Control Market:

Regional analysis
covers:

  • North America (United
    States, Canada and Mexico)
  • Europe (Germany,
    France, UK, Russia and Italy)
  • Asia-Pacific (China,
    Japan, Korea, India and Southeast Asia)
  • South America (Brazil,
    Argentina, Colombia etc.)
  • Middle East and Africa (Saudi Arabia, UAE, Egypt, Nigeria and South Africa)

In this study, the years considered estimating the market size
of Cloud-Based Access Control are:

  • History Year: 2015-2019
  • Base Year: 2019
  • Estimated Year: 2020
  • Forecast Year: 2020
    to 2027

You can click here to get more information of this report.

This report includes
the estimation of market size for value (million USD) and volume (M Units).
Top-down and bottom-up approaches have been used to estimate and validate the
market size of Cloud-Based Access Control market, to estimate the size of
various other dependent submarkets in the overall market.