Beruflich Dokumente
Kultur Dokumente
CIS 210
Abstract
As the project manager to install an access control system (ACS) in the dormitory of the college,
my team will develop a project scope statement that cover all the necessary tasks to completed,
along with a timeline to complete all tasks, which the work for each task will be written out.
Also, a Gantt chart will be created, that will illustrate the project tasks. Lastly, we will create a
system diagram to illustrate all the equipment and connections that are required for this project.
ACCESS CONTROL SYSTEM 3
Project Scope:
Install an access control system (ACS) into this small college dormitory. The ACS will
automatically unlock the dormitory doors using an electronic proximity reader that has been
Conduct a review of the current setup for the camera system installed.
Determine the cost/benefit to add facial recognition software to be incorporated with the
Locate electronic proximity readers and system software that will adhere to the schools
security standards and that will operate with the security camera system installed.
Gather all students’ information and personnel authorized building access information
One system is up, configure the parameters for the system will need to be set, such as:
authorized users, hours that all users will be allowed and not allowed to gain access to
dormitory, to include daily and weekly logs of the events and users.
Have ID cards made to be used with electronic proximity reader for all students and
authorized personnel.
Next, are the five major tasks and subtasks that will need to be completed are as follows:
b. Run cabling from readers to switch, server, cameras and main computer.
3. Loading of all application software on the central host server, software for proximity
college’s requirements.
Now we will give a brief explanation of what will be accomplished with each task, then
display them in a Gantt chart, then create a system diagram to illustrate all the equipment and
Step one will involve using the existing blueprints of the college dormitory so that we can
precisely place the readers at the entrance of the doors, so that they will be easily accessible to
attach cabling and other associated hardware. In step 1a we need to measure from the door
entrances back to the equipment, so that we will know how cable will be needed, plus some extra
ACCESS CONTROL SYSTEM 5
for maintenance purposes. Step 1b is where we run all the cabling from the readers to the server
switch, then to the server, main computer and rewire the cameras to ensure operability with new
system.
Step two requires us to use RJ45 crimpers to terminate all the connectors to the CAT6
cabling, then connect cables to server switch, then connect switch to the server and the server to
the main computer. Step 2a requires a network tester to test the connections from the readers to
the servers and to the cameras to ensure that we have complete connectivity and good signal
strength.
Step three involves turning the server on, then loading Windows Server 2008 software on
the server; load the software for the proximity readers, facial recognition software for the
cameras. Step 3a is where we will configure the server roles, the proximity readers and the facial
recognition software.
Step four involves loading all the initial student information and authorized personnel
information. Step 4a, we upload all the pictures of students and authorized personnel into the
database.
Step five is where we do a complete system run to test the proximity readers, security
cameras to ensure they are calibrated to turn towards the person entering the building, then to
make sure the computers and facial recognition software is working and if needed, make any
adjustments that are required. Step 5a, we create a backup of entire operating system and
database.
Step six is the final phase of the project. Here we conduct training with the security
personnel on how the system operates and what they might need to do in the event something
should happen. Also, conduct training with the students and other authorized personnel on the
ACCESS CONTROL SYSTEM 6
new ACS, about how it operates, how to use their new ID card to access the dormitory and who
and what they should do in the event they lose or have their ID card stolen. Step 6a, the students
and authorized personnel have the chance to use their ID cards to see the system in operation.
References
(2006, January 01). PROFILES IN TECHNOLOGY. Access Control & Security Systems,
Klotz-Young, H. (2013). State of the Market: ACCESS CONTROL. SDM: Security Distributing
Richman, Larry L. (2012). Improving Your Project Management Skills. Retrieved from
Rosenblatt, Harry J., Shelly, Gary B. (2012). Systems Analysis and Design, 9th Edition. 2012