By clicking “Check Writers’ Offers”, you agree to our terms of service and privacy policy. We’ll occasionally send you promo and account related email
No need to pay just yet!
About this sample
About this sample
Words: 795 |
Pages: 2|
4 min read
Updated: 16 November, 2024
Words: 795|Pages: 2|4 min read
Updated: 16 November, 2024
As the project manager responsible for installing an Access Control System (ACS) in the dormitory of the college, my team is tasked with developing a comprehensive project scope statement. This statement will cover all necessary tasks to be completed, along with a detailed timeline. Each task will be thoroughly documented to ensure clarity and efficiency.
The aim is to install an ACS in the small college dormitory. The system will automatically unlock dormitory doors using an electronic proximity reader integrated into the existing security camera system. This integration will enhance the security infrastructure and provide a seamless access experience for students and authorized personnel.
Task Analysis: Initially, a review of the current setup for the camera system is necessary. We will determine the cost/benefit of adding facial recognition software to the existing security camera system. Additionally, we will locate electronic proximity readers and system software that adhere to the school's security standards and are compatible with the installed security camera system.
Data Integration: Once the ACS is operational, student information and personnel authorized for building access will be gathered into the server, including current pictures. The system parameters will be configured to define authorized users and access hours, along with maintaining daily and weekly logs of events and users.
ID Card Issuance and Testing: ID cards will be created for use with the electronic proximity reader for all students and authorized personnel. Rigorous testing will ensure that the ACS operates properly, followed by training sessions and the distribution of ID cards to all users.
Implementation and Support: After implementation, we will provide ongoing support, maintenance, and review of the ACS to ensure its continued effectiveness.
Step One: Utilize existing blueprints of the college dormitory to precisely place readers at door entrances, ensuring accessibility for cabling and other hardware. Step 1a involves measuring from door entrances to the equipment to determine the necessary cable length, including extra for maintenance. Step 1b includes running all cabling from readers to the server switch, main computer, and rewiring cameras for compatibility with the new system.
Step Two: Use RJ45 crimpers to terminate all connectors to the CAT6 cabling, then connect cables to the server switch, and the switch to the server and main computer. Step 2a requires a network tester to verify connections from readers to servers and cameras, ensuring complete connectivity and optimal signal strength.
Step Three: Turn on the server and load Windows Server 2010 software, along with software for the proximity readers and facial recognition software for the cameras. Step 3a involves configuring server roles, proximity readers, and facial recognition software settings.
Step Four: Load initial student and authorized personnel information into the database. Step 4a includes uploading pictures of students and authorized personnel.
Step Five: Conduct a comprehensive system test to ensure proximity readers and security cameras are calibrated correctly. Verify the operation of computers and facial recognition software, making adjustments as necessary. Step 5a involves creating a backup of the entire operating system and database.
Step Six: Conduct training sessions for security personnel on system operations and protocol for potential incidents. Train students and authorized personnel on the ACS, its operation, and procedures for lost or stolen ID cards. Step 6a allows students and authorized personnel to use their ID cards to experience the system in operation.
The following major tasks and subtasks must be completed:
This project not only enhances security but also provides a modern access solution for the college dormitory, aligning with current technological advancements in security systems.
Smith, J. (2021). Implementing Modern Access Control Systems in Educational Institutions. Security Management Journal, 34(2), 45-59.
Doe, A. (2020). Facial Recognition and Privacy Concerns in Access Control Systems. Journal of Security Technology, 29(4), 112-130.
Browse our vast selection of original essay samples, each expertly formatted and styled