close
test_template

Access Control System: Work Breakdown Structure

About this sample

About this sample

close

Words: 795 |

Pages: 2|

4 min read

Published: Jan 15, 2019

Words: 795|Pages: 2|4 min read

Published: Jan 15, 2019

As the project manager to install an access control system (ACS) in the dormitory of the college, my team will develop a project scope statement that cover all the necessary tasks to be completed, along with a timeline to complete all tasks, which the work for each task will be written out.

'Why Violent Video Games Shouldn't Be Banned'?

Install an access control system (ACS) into this small college dormitory. The ACS will automatically unlock the dormitory doors using an electronic proximity reader that has been integrated into the existing security camera system.

Conduct a review of the current setup for the camera system installed. Determine the cost/benefit to add facial recognition software to be incorporated with the current security camera system. Locate electronic proximity readers and system software that will adhere to the school’s security standards and that will operate with the security camera system installed. Load and configure operating software for the ACS Gather all students’ information and personnel authorized building access information into the server, to include current pictures.

One system is up, configure the parameters for the system will need to be set, such as: authorized users, hours that all users will be allowed and not allowed to gain access to dormitory, to include daily and weekly logs of the events and users. Have ID cards made to be used with electronic proximity reader for all students and authorized personnel.

Conduct tests to make sure the ACS is operating properly.

Conduct training and issue ID cards out to all users.

Implement the ACS

We will provide ongoing support, maintenance, and review of ACS.

Work Breakdown Structure:

Step one will involve using the existing blueprints of the college dormitory so that we can precisely place the readers at the entrance of the doors, so that they will be easily accessible to attach cabling and other associated hardware. In step 1a we need to measure from the door entrances back to the equipment, so that we will know how cable will be needed, plus some extra for maintenance purposes. Step 1b is where we run all the cabling from the readers to the server switch, then to the server, main computer and rewire the cameras to ensure operability with new system.

Step two requires us to use RJ45 crimpers to terminate all the connectors to the CAT6 cabling, then connect cables to server switch, then connect switch to the server and the server to the main computer. Step 2a requires a network tester to test the connections from the readers to the servers and to the cameras to ensure that we have complete connectivity and good signal strength.

Step three involves turning the server on, then loading Windows Server 2010 software on the server; load the software for the proximity readers, facial recognition software for the cameras. Step 3a is where we will configure the server roles, the proximity readers and the facial recognition software.

Step four involves loading all the initial student information and authorized personnel information. Step 4a, we upload all the pictures of students and authorized personnel into the database.

Step five is where we do a complete system run to test the proximity readers, security cameras to ensure they are calibrated to turn towards the person entering the building, then to make sure the computers and facial recognition software is working and if needed, make any adjustments that are required. Step 5a, we create a backup of entire operating system and database.

Step six is the final phase of the project. Here we conduct training with the security personnel on how the system operates and what they might need to do in the event something should happen. Also, conduct training with the students and other authorized personnel on the new ACS, about how it operates, how to use their new ID card to access the dormitory and who and what they should do in the event they lose or have their ID card stolen. Step 6a, the students and authorized personnel have the chance to use their ID cards to see the system in operation.

Next, are the five major tasks and subtasks that will need to be completed are as follows:

Install proximity readers at entrances to dormitory.

Determine amount of CAT 6 cabling needed.

Run cabling from readers to switch, server, cameras and main computer.

Terminate connections on cabling and connect to equipment

Test connectivity of all connections and recalibrate security cameras.

Loading of all application software on the central host server, software for proximity readers and facial recognition software.

Configure software for the server, readers and cameras.

Load student information, and authorized personnel into database of software.

Load pictures of all students and authorized personnel.

Complete testing of system after installation to ensure system is working according to college’s requirements.

Create backup copy of entire operating system and database.

Conduct training on operation of system with students and authorized personnel.

Get a custom paper now from our expert writers.

Let students and authorized personnel use the system.

Image of Prof. Linda Burke
This essay was reviewed by
Prof. Linda Burke

Cite this Essay

Access Control System: Work Breakdown Structure. (2019, January 15). GradesFixer. Retrieved April 26, 2024, from https://gradesfixer.com/free-essay-examples/access-control-system-work-breakdown-structure/
“Access Control System: Work Breakdown Structure.” GradesFixer, 15 Jan. 2019, gradesfixer.com/free-essay-examples/access-control-system-work-breakdown-structure/
Access Control System: Work Breakdown Structure. [online]. Available at: <https://gradesfixer.com/free-essay-examples/access-control-system-work-breakdown-structure/> [Accessed 26 Apr. 2024].
Access Control System: Work Breakdown Structure [Internet]. GradesFixer. 2019 Jan 15 [cited 2024 Apr 26]. Available from: https://gradesfixer.com/free-essay-examples/access-control-system-work-breakdown-structure/
copy
Keep in mind: This sample was shared by another student.
  • 450+ experts on 30 subjects ready to help
  • Custom essay delivered in as few as 3 hours
Write my essay

Still can’t find what you need?

Browse our vast selection of original essay samples, each expertly formatted and styled

close

Where do you want us to send this sample?

    By clicking “Continue”, you agree to our terms of service and privacy policy.

    close

    Be careful. This essay is not unique

    This essay was donated by a student and is likely to have been used and submitted before

    Download this Sample

    Free samples may contain mistakes and not unique parts

    close

    Sorry, we could not paraphrase this essay. Our professional writers can rewrite it and get you a unique paper.

    close

    Thanks!

    Please check your inbox.

    We can write you a custom essay that will follow your exact instructions and meet the deadlines. Let's fix your grades together!

    clock-banner-side

    Get Your
    Personalized Essay in 3 Hours or Less!

    exit-popup-close
    We can help you get a better grade and deliver your task on time!
    • Instructions Followed To The Letter
    • Deadlines Met At Every Stage
    • Unique And Plagiarism Free
    Order your paper now