Object based architecture the cornerstone of successful system integration

May 2000 Access Control & Identity Management

Object orientation is not just an abstract concept that applies to software development; it is a design approach that can be applied at all levels of a system to facilitate seamless integration with other systems. A leading Johannesburg-based security systems developer ascribes the success of its products in part to object-oriented design.

ControlSoft Managing Director Russell Wagstaff says his company's long-term investment in object-based architecture has paid handsome dividends. "Thanks to the architecture of our system, we have been able to develop new products rapidly and use existing hardware in new applications. It has also been relatively easy for us to integrate KeyMaster Pro [the company's flagship access control and building monitoring system] with other security subsystems."

ControlSoft has been developing object-oriented, event-driven applications since the days of Windows 2.0 (an operating system which not too many people will remember). According to Wagstaff, ControlSoft learnt early on that programming in an object/event oriented environment such as Windows is very different from traditional functional programming. "We still see people trying to apply functional programming techniques in the Windows environment, and they are very surprised when their applications don't work properly."

Message-based, event-driven operating system

At ControlSoft, object-orientation is a culture that extends beyond software development and pervades every aspect of the company's security systems. "We have applied the object/event model across our systems, from the server and client software, through the PC/system controller interface to the card reader controller."

ControlSoft's research and development teams used their experience in industrial networking and data acquisition to develop a message-based, event-driven operating system for use with the company's range of system controllers and card reader controllers.

ControlSoft engineers also designed CS-NET, a high-speed peer-to-peer networking system that is a standard feature on all ControlSoft system controllers. The Discovery software module was developed specifically to provide ControlSoft's Windows based security applications with an object-based view of devices connected to CS-NET interface adapters.

The power of object orientation

As an example of the power of object orientation, Wagstaff cites the installation at Vodacom Corporate Park, where KeyMaster Pro's built-in event/action programming functionality was used to communicate intelligently with the CCTV matrix. When the access control system detects an event such as an attempted forced entry or unauthorised access to a restricted area, KeyMaster Pro sends a signal that activates the appropriate cameras.

"With some systems, this kind of integration would require the hardwiring of scores of digital inputs and outputs. However, with KeyMaster Pro it was relatively easy, because the application is designed to treat hardware devices as objects. So it doesn't really matter what you have connected to the digital inputs and outputs on our system controllers," explains Wagstaff.

ControlSoft's European distributor came up with another innovative application for the object-oriented event/action functionality in KeyMaster Pro. At a flour mill in the UK, they connected the output from a sensor on the grain hopper to one of the digital inputs on a ControlSoft system controller.

When the level of grain in the hopper drops below a certain threshold, the sensor triggers the input on the system controller. KeyMaster Pro detects the change in the state of the object representing that specific digital input, and automatically sends a pager message to the plant manager. "This may seem like a trivial example of integration, but it does illustrate how sound system architecture can enable you to meet the most specific customer requirements," says Wagstaff.

For details contact Russell Wagstaff, Managing Director of ControlSoft on tel: (011) 477 4760, fax: (011) 477 5789 or e-mail: [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

New State of Physical Access Control Report from HID
HID Global Editor's Choice Access Control & Identity Management News & Events
HID released the 2024 State of Physical Access Control Report, identifying five key trends shaping access control's future and painting a picture of an industry that has been undergoing considerable transformation.

Read more...
Smart intercoms are transforming access control
Access Control & Identity Management Products & Solutions
Smart intercoms have emerged as a pivotal tool in modern access control. They provide a seamless and secure way to manage entry points without the need for traditional security guards to validate visitors before granting them access.

Read more...
Easy, secure access for student apartments
Paxton Access Control & Identity Management Surveillance
Enhancing Security and Convenience at Beau Vie II Student Accommodation, a student apartment block located at Banghoek Road, Stellenbosch, with Paxton's access control and video management solution

Read more...
Invixium acquires Triax Technologies
News & Events Access Control & Identity Management
Invixium has announced it has acquired Triax Technologies to expand its biometric solutions with AI-based RTLS (Real-Time Location Systems) offering for improved safety and productivity at industrial sites and critical infrastructure.

Read more...
ControliD's iDFace receives ICASA certification
Impro Technologies News & Events Access Control & Identity Management
The introduction of Control iD's iDFace facial biometric reader, backed by mandatory ICASA certification, underscores the commitment to quality, compliance, and innovation.

Read more...
The future of workplace access
HID Global Access Control & Identity Management
Mobile credentials are considerably more secure than physical access control, because they eliminate the need for physical cards or badges, support multiple security protocols, and add layers of protection on top of basic card encryption.

Read more...
Integrated, mobile access control
SA Technologies Entry Pro Technews Publishing Access Control & Identity Management
SMART Security Solutions spoke to SA Technologies to learn more about what is happening in the estate access world and what the company offers the residential estate market.

Read more...
Bespoke access for prime office space
Paxton Access Control & Identity Management Residential Estate (Industry)
Nicol Corner is home to a six-star fitness club, prime office space, and an award-winning rooftop restaurant. It is also the first building in South Africa to have its glass façade fully incorporate fritted glazing, saving 35% on energy consumption.

Read more...
Next-generation facial recognition access control system
Enkulu Technologies Products & Solutions Access Control & Identity Management Residential Estate (Industry)
With a modern and innovative design, iDFace is the ideal device for monitoring and controlling people entering and exiting a building using facial recognition technology, including liveness detection, for enhanced security.

Read more...
Long-distance vehicle identification
STid Security Products & Solutions Access Control & Identity Management Residential Estate (Industry)
The STid SPECTRE reader can identify vehicles up to 14 metres away, across four traffic lanes, ensuring secure access to an estate without disrupting the traffic flow.

Read more...