Access Control System

AccessControl System

Thispaper presents a project scope, work breakdown structure and Ganttchart of a project to install (ACS) forsecurity cameras of a college dormitory. According to the designinstructions, the ACS is required to unlock the doors via electronicproximity reader, as well as enhance integration with existing camerasystem.


Thisproject will involve the following:

  • Performing a thorough review of security camera set-up that is available

  • Conduct a cost-benefit analysis of facial recognition software that is to be installed in the proposed security system

  • Search for the electronic proximity readers and system software that are compatible with the existing camera system and other security standards.

  • Loading and configuring the operating ACS software

  • Collecting the personal data for all the students to help in personalizing the authorization to building access. This will include taking the pictures of the students.

  • After setting up the system, the system parameters will be configured concerning authorized number of users, the hours that a user can be allowed/not allowed into the dormitory, and logs on weekly or daily basis to know the users and other related events

  • Processing of ID cards having electronic proximity readers for each student and any other authorized personnel.

  • Testing the system

  • Training the users and issuing the cards

Myteam will maintain the system and offer any other support regardingthe ACS installed.

WorkBreakdown Structure

Thistask will involve five primary tasks. These will be completed asfollows.

  1. Installation of proximity readers at entry points

    1. Determination of the size of cables

    2. Running the wires to all the connections such as central computer, cameras, server and switches

  2. Terminating the cabling connections and connecting the equipment

    1. Testing the connectivity for the connections

    2. Recalibrating security cameras

  3. Load the application software on the primary/central server

    1. Configuration of software for the cameras, readers and servers

  4. Loading personal data about the students and any other authorized personnel in the software database

    1. Uploading pictures for students and all authorized personnel

  5. System testing and training

    1. Compare working of the installed system with the requirements of the college

    2. Back-up the files and entire system

    3. User training on system operation


Thefirst step will entail reviewing the current blueprints of thedormitory to understand their specifications. This will help indetermining the specifications for the proposed systems that will becompatible with the existing system. This step will involve two majorsubtasks. The first subtask will involve measuring the distances fromthe place where the equipment is to be put to the door to helpdetermine the cable sizes. The second subtask will include runningthe cabling towards the server switch from readers, cameras, and thecentral computer. Also, the rewiring of existing cameras will bedetermined to facilitate compatibility with the proposed system.

Thesecond step will involve terminating the cabling connections andconnecting the equipment using RJ45 crimpers. These will help interminating all CAT6 cabling connections, connecting the cables toserver switches, and server switches to a central computer. This stepwill be done in two stages. The first phase will involve testing theconnectivity for the connections. The second stage will involverecalibrating the security cameras.

Thethird step will involve loading the application software on themain/central server. This will involve switching on the server andloading the operating system server software (Windows Server 2008).Other software that should be installed includes those of camerafacial recognition and proximity readers. The central subtask in thisstep will involve configuration of all software for the cameras,readers and servers.

Thefourth step will include loading personal data about the students andany other authorized personnel in the software database. This willentail taking the recent pictures for all the students and authorizedpersonnel and uploading them into the database.

Thefifth and final step will entail system testing and user training. Acomplete system run will be performed to test the operability of thesecurity camera and proximity readers. This step will involvecalibrating the cameras and ensuring that all the system componentsare working appropriately. Any modifications or changes will be madeduring this step. The three top subtasks will comprise of comparingthe working of the installed system with the requirements of thecollege, backing up the files and entire system and training theusers on how to use the system.

Thetraining will be done for all the security personnel on systemoperation and response processes in case of unusual events. Also,students and all the other authorized personnel will be trained onsystem operations of the new ACS as well as the system processes.During this step, all authorized users will be allowed to use thesystem and give feedback on easiness of operation.




Zagami,A. (2002).&nbspU.S.Patent No. 6,394,356.Washington, DC: U.S. Patent and Trademark Office.