As the project manager for the installation of an access control system (ACS) in the college dormitory, my team will develop a project scope statement project covering all tasks needed to be completed, along with a timeline for completing all tasks, upon which the work for each task will be written. Say no to plagiarism. Get a tailor-made essay on "Why Violent Video Games Shouldn't Be Banned"? Get an original essayInstall an access control system (ACS) in this small college dormitory. The ACS will automatically unlock dormitory doors using an electronic proximity reader that has been integrated into the existing security camera system. Conduct a review of the current installed camera system configuration. Determine the cost/benefit of adding facial recognition software to incorporate into your current security camera system. Identify electronic proximity readers and system software that meet school security standards and work with the installed security camera system. Load and configure the operating software for the ACS Gather all student information and building access information authorized by staff into the server, to include current images. A system is active, you will need to set parameters for the system, for example: authorized users, the times when all users will and will not be allowed to access the dormitory, to include daily and weekly logs of events and users . Create identification cards for use with electronic proximity readers for all students and authorized staff. Conduct tests to ensure the ACS is functioning properly. Conduct training and issue ID cards to all users. Implementing the ACS We will provide ongoing support, maintenance, and review of the ACS. Work Breakdown Structure: The first step involves using your college dorm's existing designs so you can precisely position readers at door entrances, so they are easily accessible for connecting cables and other associated hardware. In step 1a we need to measure from the port inputs to the equipment, so we know how much cable we will need, plus some extra for maintenance purposes. In phase 1b we do all the cabling from the readers to the server switch, then to the server, to the main computer and rewire the cameras to ensure operability with the new system. Step two requires using RJ45 crimpers to terminate all the connectors to the CAT6 cabling, then connect the cables to the server switch, then connect the switch to the server and the server to the main computer. Step 2a requires a network tester to test connections from players to servers and cameras to ensure full connectivity and good signal strength. Step three involves turning on the server, then loading the Windows Server 2010 software onto the server; load software for proximity readers, facial recognition software for cameras. In phase 3a we will configure server roles, proximity readers and facial recognition software. Phase four involves uploading all initial student information and authorized personnel information. Step 4a, we upload all photos of students and authorized staff to the database. Step Five: We run a comprehensive system to test proximity readers and security cameras to ensure they are calibrated to turn towards the person entering the building, then to.
tags