Professional Documents
Culture Documents
IE HEAD QUARTER
DCF AND SCS IMPLEMENTATION
Low Level Design (LLD)
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
Type of Document:
DCF LLD
Client Name:
Contents
1. Introduction........................................................................................................3
2. Datacenter Overview...........................................................................................6
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
3 Containment System............................................................................................7
6 Ceiling Speakers.................................................................................................93
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
6.1 Type of speaker....................................................................................................................93
6.2 How to mount the speakers..................................................................................................94
6.3 Camera installation process...............................................................................................103
1. Introduction
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
1.3 Scope
The scope of this document is limited to providing low level design information related to the following
DCF product as listed in the Bill of Materials (BOM) and based on the request of Site preparation guide
(SPG) for the new infrastructure:
Racks
Air conditioner
Power distribution
Uninterrupted Power supply (UPS)
Access control
Video Servilaince Camera
Access point
Speakers
Smart light and controller
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
2. Datacenter Overview
Document Purpose
The main purpose of this document is to provide the low-level detailed design for IE HQ DCF
design and implementation. This new DCF infrastructure will be deployed in IE head quarter
office located in Addis Ababa, Ethiopia.
This document outlines the placement of different DCF products and their design flow. The
information contained in this document provides, among others, detailed design templates for the
new DCF devices that will be deployed. As such, this document will be used as the foundation
for the DCF implementation and ATP test plan will be crafted in the next phases of the project.
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
3 Containment System
A standard Datacentre is a room to house IT Racks, AC, Fire suppression, UPS and other
electrical and decoration components. Based on the availability of these items IE HQ Data
Centres are classified as Tier II Datacentre based on Uptime Institute standard. There are
redundant UPSs & assuming the possibility of having a second generator to the building the
Datacentre standard is classified to be at Tier II.
A cold-aisle containment system will be constructed which will include all six racks, two
ACs and all sensors. This containment system will have an access controlled automatic
door which controls access to the inside of the containment on both front and backsides. A
standard Datacentre is a room to house IT Racks, AC, Fire suppression, UPS, AVR and
other electrical and decoration components. Based on the availability of these items IE HQ
Data Centres are classified as Tier II Datacentre based on Uptime Institute standard. There
are redundant UPSs & assuming the possibility of having a generator to the building the
Datacentre standard is classified to be at Tier II.
A cold-aisle containment system will be constructed which will include all six racks, two
ACs and all sensors. This containment system will have an access controlled automatic
door which controls access to the inside of the containment on both front and backsides
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
IE-HQ-MINI DC FLOOR DESIGN
PROJECT: MINI DATA CENTER TITLE:HQ FLOOR RACK PLACEMENT 2D DESIGN DRAWN BY: Daniel G.
BUILDING:5Kilo CHECKED BY:Zelalem B.
Owner: IE NETWORKS SOLUTIONS PLC APPROVED BY: Biruk M.
ADDRESS: KASANCHIS, ADDIS ABABA, ETHIOPIA August, 2020
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Figure 5: IE HQ Rack 2 item placement
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Figure 6: IE HQ Rack 2 item placement
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
cooling ACs are expected to be included for the datacentre in the future design updates to
have a backup for the containments in case of in row AC failure.
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
These cooling products improve energy efficiency and cooling ability in a number of ways. First,
the Refrigerant based Front Cooler draws air directly from the hot aisle, allowing the Front
Cooler unit to take advantage of higher heat transfer efficiency due to higher temperature
differences. It can then discharge room-temperature air directly in front of the servers it is
cooling. Placing the cooling unit in the containments enables the unit to operate at higher return
and supply air temperatures yielding 100% sensible capacity, which significantly reduces the
need for humidification.
The predictable performance of the row-based architecture makes it well-suited for high density
applications. The focus on heat removal instead of cold air delivery is the key to making this
approach scalable. The design of the unit allows it to be easily added in the row of the data center
containments as the demand for cooling increases.
The additional benefit of the row-based architecture is the ability to add hot air containment.
Containing the hot air further reduces any chance of hot and cold air streams mixing. This
provides ultimate predictability and allows the cooling capacity to be matched to the IT heat
load.
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Remarkable Features and Benefits:
DX heat exchanger is installed in the front section of the Front Cooler between both of the
front wall plates. The heat exchanger is covered with a spray eliminator on the air outlet
side that catches any occurring condensate and directs it to the condensate collecting tray in
the Front Cooler. 2 temperature sensors are mounted on the front side of the spray
eliminator at the level of the fan modules. The sensors record the temperature of the cold air
that is blown in (Cold aisle inlet temperature) and transfer it to the control.
Fan module
Front-Side cooler consists of three fan modules which is mounted in front of the heat
exchanger. The fan module can be changed during operation with help by rail system. The
fan modules are installed on rack-mounted shelves in the rear section of the Front Cooler
with the control unit in between. Each shelf has slide rails on the longitudinal sides. The
angle brackets with the fans are inserted into and held in the rails.
Component Identification
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Operation
Control Interface
This cooling unit has a user interface which allows customer to control the unit and have
information’s about the running status. The user interface mainly has two parts, that one is
control unit and the other one is digital control panel. Control unit is an electronic device
that has already loaded PLC program at the factory. It is placed at the electrical panel
compartment inside the unit. The control panel is a digital panel mounted on the front
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
perforated door of the unit. These both parts are connected via cable. Customer is able to
define parameters and limits according to cooling system
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
When the main power is supplied to the cooling unit, the display interface initializes. As
soon as power is supplied to the cooling unit, two fans start to run for about 60 seconds and
“self-test please wait…” message is displayed in the control panel.
The start-up inspection ensures that the equipment is operating properly after the initial
start-up. This that all mode operations are inspections verifies working correctly and that
the cooling unit is ready for normal operation.
After the initial menu, main screen like the one below appears.
Main Menus
This cooling unit has following main menus.
Network Menu: Involves information about the network service number, operational program
version and program date. To view Network Menu, press Prg key. Select Network by pressing
Up and Down Arrow keys. Then press Enter key.
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
repeater
Repeater expand the range of your network by repeating the signals from gateway to all
smart devices like switch and socket.
We use two repeater to regenerate signal from all smart devices to gateway and the revers.
We put the repeater between the gateway and other smart device in which the distance is
more than 10 meters.
Specification:
Smart switches can be Turn them on/off using a smart phone or by creating scenarios.
Energy Saver.
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
The two main power sources (EEPCO & Generator) will be connected to the Automatic
transfer switch (ATS) at the basement
The ATS will switch between the two sources. When the utility power is out the
Generator will serve as the main source until power returns to normal function.
The output from the ATS will be fed to the MDB in the datacenter via change over
switch/isolator.
To protect the critical load, they will be given power from the UPS through the MDB to
the Rack power.
Each rack will get power from the single-phase UPS output power ports. This will create
the required power.
The SBD from the Contractor side will feed all lighting fixture and socket outlets.
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
4.2 UPS
The UPSs will be placed in the power room. UPS has 20KVA capacity considering future
expansion. These UPSs are going to be connected to the power source and will protect the
critical load by providing uninterrupted power supply. UPS comes with its own battery
bank which is a failsafe to supply power to the critical load in the case that both main power
sources fail
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
The main function of an Access Control which is installed in our IE headquarter is to provide
security to entrances into certain rooms or area. This will allow only authorised personnel with
valid credentials can have access to that specific area.
We use three types of access control devices for our new IE headquarter. The first one is access
control for the glass door, which is GL-300, the other one is FL21, which is applicable for non-
glass doors and there will be a time attendance machine for the main gate. Access Control
Devices will be configured with an IP Address in order to be discoverable in the network. thus
the assigned static ip address for each access control device will be:-
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Random Password
Users may enter any number of random digits before or after the correct password as long as the
maximum number of digits entered is 30 or less. For example: If the correct password is 123456,
the random password can be 89123456807, 1234562363, 389123456, etc.
Initialization
Initializing the lock means all data will be deleted and restored to factory default setting.
Operation steps: Press the reset button on the back body of the lock or enter the menu to operate,
the lock prompts the voice of “succeed”, and then the initialization is finished completely.
Normal open mode is to keep lock always unlocked. Rotate thum-turn knob to enable or disable
the mode. Or press 2 and 8 after unlocking the door with administrator verification. Press * to
cancel.
If the battery is low, the lock will prompt a low battery sound. Access to operation is not allowed
in low battery status.
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Others
Without any operation, the lock will power off automatically within 10 seconds
Verify Administrator
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
First verify administrator before operating the lock. The default administrator password is
0123456789.
Add User
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
These are the steps to add user:
Delete User
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Volume adjustment
Time Setting
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
5.1.1.1 ZKBioAccess
ZKBioAccess is the management software installed on a remote computer to monitor activities,
add personnel, setup access levels and revoke access. It is the backbone of the Access control
system which centralize MultiBio 800-H and Speedface-V5L.
Personnel Module
This module is used to set Person details and their department. It primarily consists of two parts:
Department Management settings, which is used to set the Company’s organizational chart;
Personnel Management settings, which is used to input person information, assign departments,
maintain and manage personnel.
This module is a web-based management system which enables normal access control functions,
management of networked access control panel via computer, and unified personnel access
management. The access control system sets door opening time and levels for registered users.
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
System Management is primarily used to assign system users and configure the roles of
corresponding modules, manage databases such as backup, initialization, and recovery, and set
system parameters and manage system operation logs.
The following are the basic steps to use the system, the user just needs to follow the steps below
and skip the items that are not displayed on their interface.
Step 3: Add Access Control, includes Time Zones, Holidays, Door Setting, and Access Levels.
The username of the super user is [admin], and the password is [admin], then click [Login].
You can modify the login password in [Personal Information] as shown in the figure below:
Select [Reset Password] check box to modify the password.
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Personnel
Main functions of Personnel Management include Add, Edit, Delete, Export and Import
personnel, and Adjust Department.
Add Personnel
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Click [Personnel] > [Person], then select a person, and click [Edit].
Delete Personnel
Click [Personnel] > [Person], then select a person, and click [Delete] > [OK] to delete.
Adjust Department
1. Click [Personnel] > [Person], then select a person, and click [Adjust Department]:
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Statistics
Click [Personnel] > [Person] > [Statistics]. View the number of personnel, the number of
fingerprints, face templates, finger vein enrolled, card numbers, gender and other statistical
information.
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Export
Click [Personnel] > [Person] > [Import] to import personnel information and personnel biometric
templates. It only supports personnel information templates for importing.
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Department
Before managing company personnel, it is required to set a departmental organization chart of
the company. Upon the first use of the system, by default it has a primary department named
[General] and numbered [1]. This department can be modified but can’t be deleted.
Main functions of Department Management include Add, Edit, Delete, Export and Import
Department.
Add a Department
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
2. After filling the details, you can click [OK] to complete adding; or click [Cancel] to cancel it,
or click [Save and new] to save and continue adding new department
Edit a Department
Delete a Department
Click [Personnel] > [Personnel] > [Department] > [Delete]: then click ok to delete
Import
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
1) Click [Personnel] > [Department] > [Import], the import interface is as follows:
3) After importing the file, the system will match the imported report field and the data segment
field automatically.
Custom Attributes
Some personal attributes can be customized or deleted to meet different customers' requirements.
When the system is used for the first time, the system will initialize some personal attributes by
default.
Click [Personnel] > [Personnel Management] > [Custom Attributes] > [New], then edit the
parameters and click [OK] to save and exit.
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Click [Delete] to delete an unused attribute. If the attribute is in use, the system will pop up
confirmation before confirming to delete.
Parameters
1. Click [Personnel] > [Personnel Management] > [Parameters]:
3. Set the maximum length (binary number) of the card number that the current system will
support.
4. Set the card format currently used in the system. The card format cannot be switched once it is
set up.
Card Management
There are three modules in card management: Card, Wiegand Format and Issue Card Record
Card
It shows the cards issued in the system with their status.
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Adding Device
Add Device
A. Click [Access] > [Device] > [New] on the Action Menu, the following interface will be
shown:
2. Add Device by Searching Access Controllers: Search the access controllers in the Ethernet.
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
(3) After the search is complete, the list and total number of access controllers will be displayed.
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
(4). Click on [Add] in the search list. If the device is a pull device, you may input a device
name, and click [OK] to complete device adding.
Device Operation
For the communication between the system and device; data uploading, configuration
downloading, device and system parameters shall be set. Users can edit access controllers within
relevant levels in the current system; users can only add or delete devices in Device Management
if needed.
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Disable/Enable
Select device, click [Disable/ Enable] to stop/ start using the device. When communication
between the device and the system is interrupted or device fails, the device may automatically
appear in disabled status. After adjusting local network or device, click [Enable] to reconnect the
device and restore device communication.
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Reboot Device
It will reboot the selected device.
Synchronize Time
It will synchronize device time with server’s current time.
Modify IP Address
Select a device and click [Modify IP address] to open the modification interface. It will obtain a
real-time network gateway and subnet mask from the device. (Failed to do so, you cannot modify
the IP address). Then enter a new IP address, gateway, and subnet mask. Click [OK] to save and
quit.
Doors
1. Click [Access] > [Device] > [Door] to enter Door Management interface (click “Area Name”
in the left, system will automatically filter and display all access devices in this area).
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Select the door to be modified, and click Door Name or [Edit] button below operations tab to
open the Edit interface:
Auxiliary Input
It is mainly used to connect devices like infrared sensors, smog sensors, smoke detector, etc. 1.
Click [Access Device] [Auxiliary Input] on the Action Menu, to access below shown
interface:
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Event Type
It will display the event types of the access devices.
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Device Monitoring
By default, it monitors all
devices within the current user’s
level. You may click [Access Device] >
[Device Monitoring] to view a list of
operation information of
devices: Device Name, Serial No.,
Area, Operation Status, Current status, Commands List, and Related Operation
Real-Time Monitoring
Click [Access Device] > [Real-Time Monitoring]. It will monitor the status and real-time events
of doors under the access control panels in the system. In real-time, including normal events and
abnormal events (including alarm events). The Real-Time Monitoring interface is shown as
follows:
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Remote Opening/Closing:
It can control one door or all doors. To control a single door, right click over it, and click
[Remote Opening/ Closing] in the pop-up dialog box. To control all doors, directly click
[Remote Opening/ Closing] behind Current All. In remote opening, user can define the door
opening duration (The default is 15s). You can select [Enable Intraday Passage Mode Time
Zone] to enable the intraday door passage mode time zones, or set the door to Normal Open, then
the door will not be limited to any time zones (can be opened at any time). To close a door, select
[Disable Intraday Passage Mode Time Zone] first, to avoid enabling other normal open time
zones to open the door, and then select [Remote Closing].
Once an alarming door pops-up over the interface, the alarm sound will be played. Alarm
cancellation can be done for single door and all doors. To control a single door, move the cursor
over the door icon, a menu will pop-up, then click [Remote Opening/ Closing] in the menu. To
control all doors, directly click [Remote Opening/ Closing] behind Current All.
In our IE headquarter we also use magnetic lock doors, which are controlled by using fingerprint.
These access controls will be implemented to doors that are not made of glass. The type of
access control used here is known as F21. It is an attendance and access control terminal
applying the most advanced SilkID technology. It not only possesses outstandingly high
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
identification rate towards dry, wet and rough finger, but also provides the utmost security by its
live finger detecting capability as well as photo taking function which enables attendance photo
and Photo ID(optional).
The Access Control Devices will be configured with an IP Address in order to be discoverable in
the network. So, we will have overall four Access control devices in which all of them will have
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
a connection with their own magnetic lock, exit sign, and exit button. So, this four access control
devices are managed by their unique IPv4 addresses.
The access control devices will be placed on the gates of the two bed rooms and the two
telephone rooms based on the design below:
All five doors are equipped with access control system with magnetic lock and sliding motor as per the
specifications. Software installed in the Management computer in the NOC room monitors access to these
doors.
Step 1: Double click and run ZKAccess 3.5 Security System shortcut on the Desktop
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Step 2: Logging in
Username: admin
Password: admin
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Step 3: After successfully logging in the following window will be displayed
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Step 4: Since all devices have been configured, it will be shown in the Devices window as shown
Step 5: On the Personnel window, new personnel can be added by clicking New and entering the information
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Step 6: On the Access control Window, Real time monitoring of the existing doors is available, including
opening the doors remotely.
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Step 8: On System Window Database backup and restore can be done
Magnetic Lock
An Electromagnet that is installed at four doors will definitely reinforces doors not to be open. It
has a capability to withstand up to 600lb of force. It is directly connected to the access control
device and its power adapter.
Exit Button
An exit button is used to open the door from the inside. Personnel inside the access restricted
area can exit using the exit button to unlock the magnetic lock. This button is directly connected
to both the Magnetic lock and the Access Control Device.
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Door Closer/ Returner
A hydraulic door closer is installed at all doors to enable the automatic closing of the door after
entry or exit. All doors need to be closed right away upon entry or exit otherwise it will be
vulnerable to unauthorized entry. The Door closer will be installed at the door hinges and will be
able to return the door back to closing.
In order to control the entry and exit time of the employee, we will also implement time
attendance machine in our IE headquarter building. It is called MultiBio 800-H.
MultiBio 800-H is a time attendance and access control terminal for face and fingerprint
verification. Using ZK latest ZKFACE 7.0 high-speed face recognition algorithm, it has
extremely high verification speed and low error rate. With its high-resolution infrared night
vision light and professional color duo camera, the terminal can carry out quick verification in
any environment. What is more, it supports face, fingerprint, user ID, password, RFID card
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
(optional) and various combination methods, in order to satisfy the demands of different users.
Moreover, the TCP/IP communication supports connection across internet segments. Its auxiliary
input function can be used for linking to Fire Alarm. We will locate the time attendance
machines in the following manner:
There are different verification modes for the MultiBio 800-H. These include fingerprint
verification, Password verification and facial verification.
Fingerprint Verification
There are also two different ways of fingerprint Verification.
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
1:1 Fingerprint Verification
Under this fingerprint verification method, a fingerprint collected by the sensor is verified with
the fingerprint corresponding to the entered User ID. This verification method is preferred when
the 1:N verification encountered difficulty.
Password Verification
Under this verification method, the entered password is verified with the password of the entered
ID.
Facial Verification
An Automatic sliding glass door will be constructed in IE HQ main entrance area. This sliding
door will be integrated to access control device that do support fingerprint, ID card or pin
numbers features as desired.
When the access control device authorizes a moving object close to the door, the door will
automatically opens or close. This is So-called automatic door. The control device of sliding
automatic door contains basic function and extensional function, automatic operation/hold-
open/closed/half-open to meet customer needs. Control device has multiple interfaces for
choosing various connectors such as: safety beam photocell, electric locks, etc. Its drive devices
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
adopts European technology to integrate motor with gear box, which offers strong driving and
reliable operation and increased power output , it can adapt to a large door
With high silicon rubber aluminum wheel hanger roller a highly intelligent multi-CPU control
system provides easy adjustable function and high security performance with Low noise design
(<45db) Energy saving and soundproofing. When the power is off it can choose the backup
batteries to keep the door in normal operation. Powerful 24V DC reared motor provides excellent
thermal equipped and quiet operator.
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
As soon as the access control acknowledges autorized entry it will send a pulsating signal to controller of the door to
actuate the motor for specific time and returns back as it reaches end point.
Hiti CS-200e plastic card printers are proposed for IE HQ. With HiTi CS card printer, you will
be able to enjoy easy operating, high quality plastic cards printing conveniently for personalized
ID card, credit cards, membership cards and badges from various level of thickness and color
style.
The printer is equipped with a LCD display with four buttons to give the access to printer menu
and two LED lights to show conditional status. All printing status and warning/error messages
will be displayed in this LCD screen.
The card printer will use PVC cards with different thickness size ranging from 0.3mm-1mm with
both color and monochrome printing features.
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
HiTi CardDésirée CS for designing and printing cards must be installed onto the PC
Print Settings
Before start using your HiTi card printer, it is very important to double check and/or change the
default print driver settings. Those settings includes in the following list:
From the Start button (located bottom-left on the Windows task bar), select “Printers and Faxes”
Select your HiTi card printer and then follow by a click on right button of the mouse
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
From the Printer menu, select “Printing Preference”
The main menu tabs include Device Option, Printing Area, Color, Tools, Heating Energy,
Magnetic Encoding, Import/Export & About
CS-220e has a new feature to print transparent card. To enable this feature, you have to check on
"Transparent Card". Once checked, "Flip" checkbox will also become available to click on.
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
5.2 Security Camera Design
As a modern IT office, our IE headquarter features surveillance cameras, which are mainly
intended to assure the safety and security of the company and its staff. The basic function of the
surveillance system is to provide a tamper proof record for post event analysis and viewing the
entire movement in and around the office. A Network Video Recorder (NVR) will monitor the
video feed from the surveillance cameras and the data will be recorded into the hard drives for
playback and evidence. These cameras also provide different advantages, which includes:
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Figure 70 NVR
Panel Description
The front panel of the NVR has the following components as shown in the figure below
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
The rear side includes the following components as shown in the figure below
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Step 1 Check the power supply is plugged into an electrical outlet. It is HIGHLY recommended
that an Uninterruptible Power Supply (UPS) be used in conjunction with the device. The Power
indicator LED on the front panel should be red, indicating the device gets the power supply.
Step 2 Press the POWER button on the front panel. The Power indicator LED should turn blue
indicating that the unit begins to start up.
Step 3 After startup, the Power indicator LED remains blue. A splash screen with the status of
the HDD appears on the monitor. The row of icons at the bottom of the screen shows the HDD
status. ‘X’ means that the HDD is not installed or cannot be detected.
To shut down the NVR:
Step 1 Enter the Shutdown menu.
Menu > Shutdown
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Step 2 Click OK to save the password and activate the device.
Step 3: When the device is activated, the system pops up the message box to remind you to
remember the password. And you can click Yes to continue to export the GUID file for the
future password resetting.
Step 4: Insert the U flash disk to your device, and export the GUID file to the U flash disk in the
Reset Password interface.
User Login
If NVR has logged out, you must login the device before operating the menu and other functions.
Step 1: Select the User Name in the dropdown list
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Network Settings
Network settings must be properly configured before operating NVR over network.
Step 1 Enter the Network Settings interface.
Menu > Configuration > Network
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Step 3: In the General Settings interface, you can configure the following settings: NIC Type,
IPv4 Address, IPv4 Gateway, MTU and DNS Server.
Step 4: If the DHCP server is available, you can check the checkbox of DHCP to automatically
obtain an IP address and other network settings from that server.
The NVR and IP cameras are in the same VLAN which is the IOT VLAN (VLAN 60)
The NVR will have a static IP address of 172.16.60.10
The core switch will provide IP addresses for the camera devices automatically as below.
//VLAN Configuration
!
VLAN 60
Name IOT-VLAN
Int Vlan60
Ip address 172.16.60.1 255.255.255.0
!
Adding IP Cameras
Ensure the network connection is valid and correct, and the IP camera to add has already been
activated. Then add the network cameras to the connection list of the device.
Step 1: Click to select an idle window in the live view mode.
Step 2: Click the + icon in the center of the window to pop up the Add IP Camera interface.
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Step 3: Select the detected IP camera and click the Add button to add it directly, and you can
click the Search button to refresh the online IP camera manually or you can choose to custom
add the IP camera by editing the parameters in the corresponding text field and then click the
Add button to add it.
Live View
Live view shows you the video image getting from each camera in real time. The NVR
automatically enters Live View mode when powered on. It is also at the very top of the menu
hierarchy, thus pressing the ESC many times (depending on which menu you are on) brings you
to the Live View mode.
In live view mode, there are many functions provided. The functions are listed below
Auto-switch: the screen is auto switched to the next one and you must set the dwell time for
each screen on the configuration menu before enabling the auto-switch.
Menu>Configuration>Live View>Dwell Time
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Start Recording: continuous record and motion detection record are supported.
Aux Monitor: the NVR checks the connection of the output interfaces to define the main and
auxiliary output interfaces. When both the HDMI and VGA are connected, the HDMI is used as
main output and the VGA is used as the aux output. When the aux output is enabled, the main
output cannot perform any operation, and you can do some basic operation on the live view
mode for the Aux output.
Live View settings can be customized according to different needs. You can configure the output
interface, dwell time for screen to be shown, mute or turning on the audio, the screen number for
each channel, etc.
Step 1 Enter the Live View Settings interface. Menu> Configuration> Live View
Video Output Interface: Designates the output to configure the settings. Our NVR provide the
HDMI and VGA video outputs.
Live View Mode: Designates the display mode to be used for Live View.
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Dwell Time: The time in seconds to dwell between switching of channels when enabling auto-
switch in Live View.
Enable Audio Output: Enables/disables audio output for the selected video output.
Volume: Adjust the volume of live view, playback and two-way audio for the selected output
interface.
Channel-zero Encoding
Sometimes you need to get a remote view of many channels in real time from web browser in
order to decrease the bandwidth requirement without affecting the image quality, channel-zero
encoding is supported as an option.
Step 1 Enter the Live View Settings interface. Menu > Configuration> Live View
Step 4 Configure the Frame Rate, Max. Bitrate Mode and Max. Bitrate.
After setting the Channel-Zero encoding, you can get a view in web browser of 16 channels in
one screen.
Recording Settings
Make sure that the disk has already been installed. If not, please install a disk and initialize it.
There are two kinds of record types, including Instant Record and All-day Record.
Step 1: On the live view window, right click the window and move the cursor to the Start
Recording option, and select Continuous Record or Motion Detection Record on your demand.
Step 2: Click the Yes button in the pop-up Attention message box to confirm the settings. All the
channels will start to record in the selected mode.
Playback
The recorded video files on the hard disk can be played back in the following modes: instant
playback, all-day playback for the specified channel, and playback by
normal/event/smart/tag/sub-periods/external file search.
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Step 2: Check the checkbox of channel(s) in the channel list and then double-click to select a
date on the calendar.
Step 3: You can use the toolbar in the bottom part of Playback interface to control playing
progress.
Step 2: Login to the device. If the device has not been activated, you need to activate the device
first before login.
If the device is already activated, enter the user name and password in the login interface, and
click the Login button.
Step 3: Install the plug-in before viewing the live video and managing the camera. Please follow
the installation prompts to install the plug-in.
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
6 Ceiling Speakers
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
In IE headquarter there will be TEN (10) AXIS C2005 Speakers that will be mounted in the main
hall, management office, around the lobby, café, CEO office and conference hall. The location of
the speakers is illustrated in the design below:
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
To find Axis devices on the network and assign them IP addresses in Windows®, use AXIS IP
Utility or AXIS Device Manager. Both applications are free and can be downloaded from
axis.com/support.
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Search the network for devices
Assign IP addresses
Set passwords
See connection status
Perform operations on multiple devices at once
Manage firmware upgrades
Configure device parameters
Axis speaker devices are designed to be used on an Ethernet network. To access the device’s
webpage you need an IP address. Most networks have a DHCP server that automatically assigns
IP addresses to connected devices. However, since we need a specific IP address for the
speakers, we will give every speaker a single static IP address.
If we are using Axis IP utility, here are the procedures to change IP address of each device (if
needed)
If we are using Axis device manager, the following will be the procedures to change the IP
address of each device (if needed)
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
We will give static IP address for the speakers that will be from 172.16.60.30 up to 172.16.60.40.
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
To access the device, open a browser and enter the IP address or host name of the Axis device.
Enter the username and password. If you access the device for the first time, you must set the
root password.
To set a new password for the root account, first type a password and retype the password to
confirm the spelling and click save.
To change the root password, log in to the product’s webpage and go to System > Users. For the
root user, click Edit. Enter a new password and Save.
Our speakers
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
We will have three basic zones for IE headquarter. The first one will be ‘All stuffs zone’ that
includes all the speakers except for the CEO and Conference room. This zone is used to make
announcements and other information from the CEO to all people in the compound. The other
zone is ‘Reception zone’, which includes speakers located around the main and CEO’s
reception. It will be intended to deliver messages for guests and the reception. The third zone is
‘Stuff zone’. It will combine the three (3) speakers located in the main hall.
We can make announcements and other messages for a specific speaker through its own IP
address. We can also add other zones if necessary.
To Add an AXIS network audio device to AXIS Camera Station in AXIS Camera Station, first click +
and select Configuration. Go to Devices > Add devices. Select the network audio device from the list
and click Add. Go to Other devices to check that the audio device has been added to the list.
To associate the audio device with a camera first go to Devices > Streaming profiles and select the
camera that you want to associate the audio device with. In the device’s streaming profile, select the audio
device from the Speaker drop-down. Click Apply. To test the association, go to the camera’s Live view in
AXIS Camera Station and click the Speak button. When you speak into the computer’s microphone, the
audio device plays the audio.
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
The prerequisites for this procedure is the Axis audio device and Axis network camera are located on
the same network. The general workflow will be a follows:
N.B- We cannot confirm that the ACS CORE DEVICE E-LICENSE can be integrated with Hikvision
surveillance cameras.
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Staff Ap1
Staff Ap2
Staff AP3
M-Office AP
Mini.Conf AP
Conference AP
Lobby AP
Café AP
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
CEO AP
CEO Reception AP
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Name Name
Title Title
Company Company
Signature Signature
Date Date
Name Name
Title Title
Company Company
Signature Signature
Date Date
Name Name
Title Title
Company Company
Signature Signature
Date Date
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Confidential© 2020