Bird
0
0
LLDsystem_design~12 mins

Entry and exit flow in LLD - Architecture Diagram

Choose your learning style9 modes available
System Overview - Entry and exit flow

This system manages how users enter and exit a secure facility or application. It ensures that only authorized users can enter and that their exit is properly recorded. Key requirements include authentication at entry, logging of entry and exit times, and real-time status updates.

Architecture Diagram
User
  |
  v
Entry Point Scanner
  |
  v
Authentication Service
  |
  v
Access Control System
  |
  v
Entry/Exit Logger
  |
  v
Status Dashboard

Exit Point Scanner
  |
  v
Authentication Service
  |
  v
Access Control System
  |
  v
Entry/Exit Logger
  |
  v
Status Dashboard
Components
User
actor
Person entering or exiting the facility
Entry Point Scanner
hardware_interface
Scans user credentials at entry
Exit Point Scanner
hardware_interface
Scans user credentials at exit
Authentication Service
service
Verifies user credentials
Access Control System
service
Grants or denies physical access
Entry/Exit Logger
database
Records entry and exit times
Status Dashboard
service
Displays real-time user presence status
Request Flow - 10 Hops
UserEntry Point Scanner
Entry Point ScannerAuthentication Service
Authentication ServiceAccess Control System
Access Control SystemEntry/Exit Logger
Entry/Exit LoggerStatus Dashboard
UserExit Point Scanner
Exit Point ScannerAuthentication Service
Authentication ServiceAccess Control System
Access Control SystemEntry/Exit Logger
Entry/Exit LoggerStatus Dashboard
Failure Scenario
Component Fails:Authentication Service
Impact:Users cannot be verified, so no entry or exit is allowed, blocking access.
Mitigation:Use a backup authentication service or cached credentials for temporary offline verification.
Architecture Quiz - 3 Questions
Test your understanding
Which component verifies user credentials during entry and exit?
AAccess Control System
BAuthentication Service
CEntry/Exit Logger
DStatus Dashboard
Design Principle
This architecture separates concerns by using dedicated components for scanning, authentication, access control, logging, and status display. It ensures secure and auditable entry and exit flows with real-time updates, improving security and monitoring.