
K2200 Series | Installation Guide | 2.0 K2200 Series Controllers EN | 7
Bosch Security Systems | 7/03 | 17375 1.3 / 46513C
2.0 K2200 Series Controllers
This section provides a brief introduction to the
Readykey K2200 Series Controllers. In it, the user is
shown:
• The different controllers in the series and what
each does.
• Compatibility with older Readykey products.
• What features are provided on each controller.
Please read this document even if you are
familiar with previous Readykey products.
There is a great deal of new information
contained in this document that should
make installation and testing a lot easier.
You are also advised to attend a
Readykey Training Course before
attempting installation
2.1 What is the Readykey K2200 Series
of Controllers?
2.1.1 Introduction
The Readykey K2200 Series Controllers are the
successors to the Readykey K2100 Series Controllers.
Although all the controllers can operate in standalone
mode they are primarily designed to be a part of a
larger system administered by Readykey for
Windows. This provides easy access to all the new
features with configuration carried out mainly at the
administration PC.
The controllers will form part of a Readykey Access
Control System and it is important that, when
installing these controllers, you are aware of the
whole system and how it is to be administered.
2.1.2 Controllers in the Series
There are two main variants of the Readykey K2200
series. These are described in detail later in this
section but briefly they are:
1. Readykey K2200 Multi-Function Door
Controller. This is a replacement for the
Readykey K2100 with support for four alarm
event managers and four doors. It is available
with or without a faceplate.
2. Readykey K1200 Multi-Function Door
Controller. This is a replacement for the
Readykey K1100 with support for two alarm
event managers and two doors. It is available
with or without a faceplate.
2.2 Multi-Function Door Controller
2.2.1 Background
Most Readykey access control systems, very simply,
consist of eight distinct parts:
1. The ID Device is presented to (or swiped
through) the reader to open a door. This has a
unique code which identifies it to the system.
2. The Reader, usually fitted close to the door,
detects the unique code in the ID device and
sends it to the door controller for verification.
There are several types of reader available,
suitable for different purposes and environments.
It is usually situated close to the door.
3. The Request to Exit (RTE) Switch is used to
open a door from the secure side (sometimes a
reader is used on each side of the door). When
the switch is pressed a signal is sent to the
controller to release the lock and open the door.
4. The Controller is the heart of the access control
system. It compares the unique code in the ID
Device with the information stored in its memory
and, if the ID Device is valid, it activates the lock
to open the door.
5. The PSU(s) powers the controller and locks.
6. The Lock secures the door and is released when
a valid ID Device is presented to the reader.
Locks can be divided into two main types:
• Fail Safe - continuously powered with power
removed to unlock. If power fails the door
will open.
• Fail Secure - Power supplied to unlock.
7. The Administration System is used to administer
the system - program into the system who goes
where and when. This may be built into the
controller or be on a separate PC.
8. The wiring between the various components
(above 1-7).
Comentarios a estos manuales