Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Central vs. Distributed

June 11, 2003
Access control architecture includes the data communication protocol to interface hardware with the software application, as well as the cable network to facilitate the data transmission. Of the two architectures – central and distributed – each has distinct advantages and disadvantages. It is important to understand these differences when implementing an access control system in your facility.

Centralized architecture means that the control panels, associated power supplies, input, output and reader control modules for each access device are located in a central location. Distributed architecture requires the associated power supplies, input, output and reader control modules be installed in close proximity to the access device. Assuming components are of equal quality, either system will provide the same performance capability and reliability.

Most access control system components connect to a door access control panel via a multidrop RS485 or 422 serial communication circuit. Due to the technical capabilities of this communication protocol, the access control device can locate several thousand feet away. This bridge is common to both centralized and distributed access control system architecture.

An example of a centralized architecture: an access panel in a locked and secure room – common practice in many typical commercial buildings. The advantage of the centralized approach includes the ability to monitor and/or control personnel who enter the room. This limits the accessibility to the critical data communication circuits between the door access control panels and control modules. It also enables a service technician to troubleshoot the electronic components at a single location.

The disadvantages of the centralized architecture include the routing of all circuits associated with the devices controlling the door. These circuits could include: card reader, door contact, request to exit device, lock power or any other input/output device specified to operate with the system. Depending on the number of reader locations, this could equate to a large quantity of cable required to manage a single location.

Advantages of remote or distributed architecture include the reduction of cable quantities required from the door access control panel to the remotely installed control modules. Minimal lengths of multiple-conductor large-gauge peripheral cable are needed. The reader control module would generally be installed in a locked, tamper switched enclosure above the finished ceiling on the secure side of the controlled door, which provides convenient troubleshooting and testing of the controlled door.

There are advantages and disadvantages of both central and distributed architecture that depend on where much of the access control system hardware is located.

Distributed Approach

Distributed architecture is also convenient for adding a remotely installed control module onto an available data communications circuit, to minimize the installation costs of potentially long cable runs back to the access control panel location.

As with the centralized method, the remote installation or distributed method also has its disadvantages. These disadvantages include the necessity of a device location plan, and the potential damage from construction trades or building maintenance. Each service person must know the exact location of the remotely installed control modules, eliminating the need to hunt through a customer’s ceiling and potentially damaging fragile finished ceiling components.

Construction trades or building maintenance staff performing work in an area adjacent to communication circuits could damage these components. Damage to the data communications or power circuits supplying the control modules could prohibit the control and monitoring of the peripheral devices from the point of damage. This would result in an interruption of security coverage in the affected area, requiring an emergency response from a service technician to repair the damage and restore the system to normal operation.

Both centralized and distributed access control systems have their advantages and disadvantages. The access control design professional can be a valuable asset in determining which system architecture is best suited for the operation and maintenance philosophy of the system owner.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Mobile device security at work

    Network vs. mobile device management in the age of remote work

    See More
  • Abstract swirls

    Analytics at the source: A distributed approach to network security

    See More
  • On the Road: IP Storage – Distributed RAID Architecture

    See More

Related Products

See More Products
  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

  • 150952519X.jpg

    Intelligence in An Insecure World, 3rd Edition

  • The Complete Guide to Physical Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing