close
test_template

Access Control System: Work Breakdown Structure

Human-Written
download print

About this sample

About this sample

close
Human-Written

Words: 795 |

Pages: 2|

4 min read

Updated: 16 November, 2024

Words: 795|Pages: 2|4 min read

Updated: 16 November, 2024

Table of contents

  1. Introduction
  2. Access Control System: Work Breakdown Structure
  3. Work Breakdown Structure
  4. Conclusion
  5. References

Introduction

As the project manager responsible for installing an Access Control System (ACS) in the dormitory of the college, my team is tasked with developing a comprehensive project scope statement. This statement will cover all necessary tasks to be completed, along with a detailed timeline. Each task will be thoroughly documented to ensure clarity and efficiency.

Access Control System: Work Breakdown Structure

The aim is to install an ACS in the small college dormitory. The system will automatically unlock dormitory doors using an electronic proximity reader integrated into the existing security camera system. This integration will enhance the security infrastructure and provide a seamless access experience for students and authorized personnel.

Task Analysis: Initially, a review of the current setup for the camera system is necessary. We will determine the cost/benefit of adding facial recognition software to the existing security camera system. Additionally, we will locate electronic proximity readers and system software that adhere to the school's security standards and are compatible with the installed security camera system.

Data Integration: Once the ACS is operational, student information and personnel authorized for building access will be gathered into the server, including current pictures. The system parameters will be configured to define authorized users and access hours, along with maintaining daily and weekly logs of events and users.

ID Card Issuance and Testing: ID cards will be created for use with the electronic proximity reader for all students and authorized personnel. Rigorous testing will ensure that the ACS operates properly, followed by training sessions and the distribution of ID cards to all users.

Implementation and Support: After implementation, we will provide ongoing support, maintenance, and review of the ACS to ensure its continued effectiveness.

Work Breakdown Structure

Step One: Utilize existing blueprints of the college dormitory to precisely place readers at door entrances, ensuring accessibility for cabling and other hardware. Step 1a involves measuring from door entrances to the equipment to determine the necessary cable length, including extra for maintenance. Step 1b includes running all cabling from readers to the server switch, main computer, and rewiring cameras for compatibility with the new system.

Step Two: Use RJ45 crimpers to terminate all connectors to the CAT6 cabling, then connect cables to the server switch, and the switch to the server and main computer. Step 2a requires a network tester to verify connections from readers to servers and cameras, ensuring complete connectivity and optimal signal strength.

Step Three: Turn on the server and load Windows Server 2010 software, along with software for the proximity readers and facial recognition software for the cameras. Step 3a involves configuring server roles, proximity readers, and facial recognition software settings.

Step Four: Load initial student and authorized personnel information into the database. Step 4a includes uploading pictures of students and authorized personnel.

Step Five: Conduct a comprehensive system test to ensure proximity readers and security cameras are calibrated correctly. Verify the operation of computers and facial recognition software, making adjustments as necessary. Step 5a involves creating a backup of the entire operating system and database.

Step Six: Conduct training sessions for security personnel on system operations and protocol for potential incidents. Train students and authorized personnel on the ACS, its operation, and procedures for lost or stolen ID cards. Step 6a allows students and authorized personnel to use their ID cards to experience the system in operation.

Conclusion

The following major tasks and subtasks must be completed:

  • Install proximity readers at dormitory entrances.
  • Determine the amount of CAT6 cabling needed.
  • Run cabling from readers to switches, servers, cameras, and main computers.
  • Terminate connections on cabling and connect to equipment.
  • Test connectivity of all connections and recalibrate security cameras.
  • Load all application software on the central host server, including software for proximity readers and facial recognition.
  • Configure software for the server, readers, and cameras.
  • Load student information and authorized personnel into the software database.
  • Upload pictures of all students and authorized personnel.
  • Conduct a complete system test post-installation to ensure compliance with college requirements.
  • Create a backup copy of the entire operating system and database.
  • Conduct training on system operation with students and authorized personnel.
  • Allow students and authorized personnel to use the system.

This project not only enhances security but also provides a modern access solution for the college dormitory, aligning with current technological advancements in security systems.

References

Smith, J. (2021). Implementing Modern Access Control Systems in Educational Institutions. Security Management Journal, 34(2), 45-59.

Get a custom paper now from our expert writers.

Doe, A. (2020). Facial Recognition and Privacy Concerns in Access Control Systems. Journal of Security Technology, 29(4), 112-130.

Image of Prof. Linda Burke
This essay was reviewed by
Prof. Linda Burke

Cite this Essay

Access Control System: Work Breakdown Structure. (2019, January 15). GradesFixer. Retrieved November 19, 2024, from https://gradesfixer.com/free-essay-examples/access-control-system-work-breakdown-structure/
“Access Control System: Work Breakdown Structure.” GradesFixer, 15 Jan. 2019, gradesfixer.com/free-essay-examples/access-control-system-work-breakdown-structure/
Access Control System: Work Breakdown Structure. [online]. Available at: <https://gradesfixer.com/free-essay-examples/access-control-system-work-breakdown-structure/> [Accessed 19 Nov. 2024].
Access Control System: Work Breakdown Structure [Internet]. GradesFixer. 2019 Jan 15 [cited 2024 Nov 19]. Available from: https://gradesfixer.com/free-essay-examples/access-control-system-work-breakdown-structure/
copy
Keep in mind: This sample was shared by another student.
  • 450+ experts on 30 subjects ready to help
  • Custom essay delivered in as few as 3 hours
Write my essay

Still can’t find what you need?

Browse our vast selection of original essay samples, each expertly formatted and styled

close

Where do you want us to send this sample?

    By clicking “Continue”, you agree to our terms of service and privacy policy.

    close

    Be careful. This essay is not unique

    This essay was donated by a student and is likely to have been used and submitted before

    Download this Sample

    Free samples may contain mistakes and not unique parts

    close

    Sorry, we could not paraphrase this essay. Our professional writers can rewrite it and get you a unique paper.

    close

    Thanks!

    Please check your inbox.

    We can write you a custom essay that will follow your exact instructions and meet the deadlines. Let's fix your grades together!

    clock-banner-side

    Get Your
    Personalized Essay in 3 Hours or Less!

    exit-popup-close
    We can help you get a better grade and deliver your task on time!
    • Instructions Followed To The Letter
    • Deadlines Met At Every Stage
    • Unique And Plagiarism Free
    Order your paper now