Skip to main content

Working Principle of Gate Barrier System


Gate Barrier is also called parking barrier system. Generally used in allow or block the vehicular in parking area of residential or commercial building. Generally used this system installed in parking areas, checkpoints, entrance to restrict areas and control passage through toll booths.

Components of Gate System                 

1)Barrier Beam or Arm



4)Keypad or Remote

5)Gear Unit

1)Barrier Beam or Arm

Maximum we can fix 6 meters. Normally used in 3 meters beam are used. Beams are made by Aluminum, because of low weight.

Now a days Gate Barrier comes with LED Strips, it will be very useful to know the moment of beam on night time.


Now a days gate barrier comes with two kinds of motors. (AC & DC Motors)

Ac motors operated by Ac power supply with 230V. Ac motor should has capacitor to run.

Dc motors operated by Dc power supply with 24V or 34V. Doesn’t need capacitor to run.


There are two types of sensors used in Gate Barrier System. Which is Receiver and Transmitted sensor.  

How this sensor working..., transmitted always sent infrared signal to receiver through LED

Receiver will receives the IR signal with help of photo diode

4)Keypad or Remote

Normally barrier will get open signal by key pad or by the remote

Some of the Gate Barrier Companies







For more details

Mail to:

Website :



Popular posts from this blog

Time attendance system in dubai (ICLOCK700) | Time Vision Security Systems

Overview iClock700 is compatible with various types of USB flash disks, ADMS and former SDK. Moreover, RS232/485, TCP/IP and USB client ensure a smooth data transmission between device and PC. It also has GPRS, Wi-Fi and 3G connectivity and access control connectivity with Wiegand out and in, electric lock, door sensor, exit button, alarm and Door Bell. Function Intuitive and stunning UI designed with the most popular and internationalized element. Interface operation adopts modularized hierarchical design. Faster matching speed: Less than 1second. Multi-languages Data backup and retrieve. Advanced User ID consisting of letters and numbers. Chip encryption for firmware protection. Easy to extend functions and customize customers’ requirements.   For Wiegand in and out, door lock connection, alarm and bell. Specification Fingerprint Capacity 8000 ID Card Capacity 10,000 (Optional) Record Capacity 200,000 Display 3.5-inch TFT Screen Commu

Best Access Control and ID Card Printer in Dubai

Best Access Control and ID Card Printer in Dubai In the fields of physical security and information security,  access control  ( AC ) is the selective restriction of access to a place or other resource. The act of  accessing  may mean consuming, entering, or using. Permission to access a resource is called  authorization . Locks and login credentials are two analogous mechanisms of access control. There are three types (factors) of authenticating information something the user knows, e.g. a password, pass-phrase or PIN something the user has, such as smart card or a key something the user is, such as fingerprint, verified by biometric measurement

Time attendance systems in dubai(IFACE850) | Time Vision Security Systems

Overview ZKTeco has released the iFace850 Multi-Biometric T&A and Access Control Terminal which supports 3,000 face templates, 4,000 fingerprint templates, and 10,000 cards. It is equipped with ZKTeco latest hardware platform and algorithm, which provide clients with a brand new UI and user-friendly operating interface, bringing them a smooth user experience. With the advanced face algorithm and multi-biometric verification technology, the terminal’s security level of verification is greatly enhanced. Function 3,000 face and 4,000fingerprint templates Multi-languages High verification speed Advanced and user-friendly UI Chip encryption for firmware protection Optional built-in battery backup providing approximately 4 hours of continuous operation Easy to extend functions and customize client's requirements One face template is registered for one user only Able to detect whether the face is an actual face or a photo, enhancing the thesecurity level of verificati