You are on page 1of 111

IE Headquarter DCF and SCS Implementation LLD

IE HEAD QUARTER
DCF AND SCS IMPLEMENTATION
Low Level Design (LLD)

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD

Type of Document:

DCF LLD
Client Name:

IE HEAD QUARTER OFFFICE


Prepared by:

IE NETWORK SOLUTIONS PLC

Date: November 2020

“WE SERVE BEST YOUR IT INFRASTRUCTURE NEEDS WITH EXPERT SOLUTIONS!”

Contents

1. Introduction........................................................................................................3

1.1 Document Purpose.................................................................................................................4


1.2 Intended Audience.................................................................................................................4
1.3 Scope......................................................................................................................................4
1.4 Related Documents................................................................................................................5

2. Datacenter Overview...........................................................................................6

2.1 Datacenter Physical design....................................................................................................6


Document Purpose.......................................................................................................................6

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
3 Containment System............................................................................................7

3.1 Cold & Hot Aisle Containment System.................................................................................8


3.2 Rack and Active Device Placement.......................................................................................9
3.3 Air Conditioner....................................................................................................................14
3.4 Cold Aisle Containment + In-Row Cooler..........................................................................15
3.4.1 Front Cooler DX (Direct Expansion).......................................................................................16

4. Electrical and Power Distribution System..........................................................24

4.1. Power Distribution..............................................................................................................27


4.2 UPS......................................................................................................................................29

5 Physical security system.....................................................................................30


5.1 ACCESS CONTROL SYSTEM.....................................................................................................30
5.1.1 Glass door Access Control Device...........................................................................................30
5.1.2. NON-GLASS DOORS ACCESS CONTROL SYSTEM.............................................................60
5.1.3 TIME ATTENDANCE MACHINE............................................................................................69
5.1.4 Automatic Sliding Door............................................................................................................71
5.1.5 CARD PRINTER......................................................................................................................73
5.2 Security Camera Design.......................................................................................................76
5.2.1 Network Video Recorder (NVR)......................................................................................77
Panel Description..............................................................................................................................78
Start up and shut down......................................................................................................................82
Activating the Device........................................................................................................................83
User Login........................................................................................................................................84
Using the Setup Wizard.....................................................................................................................84
Network Settings................................................................................................................................85
Adding IP Cameras...........................................................................................................................86
Live View...........................................................................................................................................87
Recording Settings............................................................................................................................90
Playback............................................................................................................................................91
Accessing by Web Browser................................................................................................................91

6 Ceiling Speakers.................................................................................................93
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
6.1 Type of speaker....................................................................................................................93
6.2 How to mount the speakers..................................................................................................94
6.3 Camera installation process...............................................................................................103

7. Access Point Placement.................................................................................109

8. SCS and Node Installation..............................................................................110

8.1 UTP Patch Panel and Wall outlet Labeling.................................................................110


8.2 UTP Node locations.....................................................................................................110

Document Acceptance Certificate........................................................................112

1. Introduction

1.1 Document Purpose


The main purpose of this document is to provide the low-level detailed design for IE head quarter office
DCF design and implementation. This new infrastructure will be deployed in IE head quarter office new
Datacenter located in Addis Ababa.
This document outlines the placement of different DCF products and their design flow. The information
contained in this document provides, among others, detailed design templates for the new DCF devices
that will be deployed. As such, this document will be used as the foundation for the DCF implementation
plan and ATP test plan that will be crafted in the next phases of the project.

1.2 Intended Audience


For security and intellectual reasons, this document is prepared to be reviewed only by members of the
technical and management teams IE Head quarter office managerial Department and IE Network
Solutions plc. Any other party should get formal permissions IE, before viewing the contents of this
document.

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
1.3 Scope
The scope of this document is limited to providing low level design information related to the following
DCF product as listed in the Bill of Materials (BOM) and based on the request of Site preparation guide
(SPG) for the new infrastructure:

 Racks
 Air conditioner
 Power distribution
 Uninterrupted Power supply (UPS)
 Access control
 Video Servilaince Camera
 Access point
 Speakers
 Smart light and controller

1.4 Related Documents


https://www.zkteco.com/en/
https://www.autodoorleader.com
http://www.hiti.com
http://www.tripplite.com
http://www.Suprma.com
https://www.hikvision.com/content/dam/hikvision/en/support/regional-materials/pakistan

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

2. Datacenter Overview

2.1 Datacenter Physical design

Document Purpose
The main purpose of this document is to provide the low-level detailed design for IE HQ DCF
design and implementation. This new DCF infrastructure will be deployed in IE head quarter
office located in Addis Ababa, Ethiopia.
This document outlines the placement of different DCF products and their design flow. The
information contained in this document provides, among others, detailed design templates for the
new DCF devices that will be deployed. As such, this document will be used as the foundation
for the DCF implementation and ATP test plan will be crafted in the next phases of the project.

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
3 Containment System
A standard Datacentre is a room to house IT Racks, AC, Fire suppression, UPS and other
electrical and decoration components. Based on the availability of these items IE HQ Data
Centres are classified as Tier II Datacentre based on Uptime Institute standard. There are
redundant UPSs & assuming the possibility of having a second generator to the building the
Datacentre standard is classified to be at Tier II.

A cold-aisle containment system will be constructed which will include all six racks, two
ACs and all sensors. This containment system will have an access controlled automatic
door which controls access to the inside of the containment on both front and backsides. A
standard Datacentre is a room to house IT Racks, AC, Fire suppression, UPS, AVR and
other electrical and decoration components. Based on the availability of these items IE HQ
Data Centres are classified as Tier II Datacentre based on Uptime Institute standard. There
are redundant UPSs & assuming the possibility of having a generator to the building the
Datacentre standard is classified to be at Tier II.

A cold-aisle containment system will be constructed which will include all six racks, two
ACs and all sensors. This containment system will have an access controlled automatic
door which controls access to the inside of the containment on both front and backsides

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

Figure 1: IE-HQ 3D DESIGN

3.1 Cold & Hot Aisle Containment System


Enables isolation of hot and cold aisles to maximize cooling system efficiency and minimize
cooling energy requirement,

 Highly modular, scalable, expandable, and retrofit able


 Optimum cooling solution for big and medium scale Data Centers coupled
 with CRAC units to increase efficiency of cooling system
 Provides moderate efficiency, energy saving and free cooling capabilities
Advantages:
 More efficient than traditional central CRAC cooling technologies up to 50% energy
savings
 Modular, scalable, expandable, retrofit able.

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

Figure 2: IE HQ Containment system

3.2 Rack and Active Device Placement


The mini-datacentre includes four IT racks, which are two 600mmx1200mm and two racks
800mmx1200mm as shown on Fig 12 below. Each rack has size of 42 U and all except one
will be configured with Power Distribution Units (PDU) IT devices.

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
IE-HQ-MINI DC FLOOR DESIGN

PROJECT: MINI DATA CENTER TITLE:HQ FLOOR RACK PLACEMENT 2D DESIGN DRAWN BY: Daniel G.
BUILDING:5Kilo CHECKED BY:Zelalem B.
Owner: IE NETWORKS SOLUTIONS PLC APPROVED BY: Biruk M.
ADDRESS: KASANCHIS, ADDIS ABABA, ETHIOPIA August, 2020

Figure 3: IE HQ Datacenter floor design

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

Figure 4: IE HQ Rack placement

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Figure 5: IE HQ Rack 2 item placement

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Figure 6: IE HQ Rack 2 item placement

Figure 7: IE HQ Rack and Active device placement 2D design

3.3 Air Conditioner


As shown on the below design we will use one in-row ACs for the Datacentre. This ACs
will create the necessary cooling required by the IT equipment in the containment. Room

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
cooling ACs are expected to be included for the datacentre in the future design updates to
have a backup for the containments in case of in row AC failure.

IE-HQ-AC PLACEMENT 2D DESGN

PROJECT: HQ-MINI DC TITLE:AC PLACEMENT 2D DESIGN DRAWN BY: Daniel G.


BUILDING: FISTIVAL MALL 7TH FLOOR CHECKED BY:Zelalem B.
Owner: IE NETWORKS SOLUTIONS PLC APPROVED BY: Biruk M.
ADDRESS: KASANCHIS, ADDIS ABABA, ETHIOPIA Augst, 2020

Figure 8: IE-HQ-MINI DC AC placement

3.4 Cold Aisle Containment + In-Row Cooler


Cold & Hot Aisle Containment System coupled with In-Row Cooler system ensures ultimate
cooling capacity enabling highest levels of energy efficiency.

 Optimum solution for medium to large scale Data Centers


 A chilled-water based technology bringing cold air right to the server racks where heat
dissipation is maximum, eliminating raised floor requirement in contrast to CRAC
cooling systems.

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

3.4.1 Front Cooler DX (Direct Expansion)

These cooling products improve energy efficiency and cooling ability in a number of ways. First,
the Refrigerant based Front Cooler draws air directly from the hot aisle, allowing the Front
Cooler unit to take advantage of higher heat transfer efficiency due to higher temperature
differences. It can then discharge room-temperature air directly in front of the servers it is
cooling. Placing the cooling unit in the containments enables the unit to operate at higher return
and supply air temperatures yielding 100% sensible capacity, which significantly reduces the
need for humidification.

The predictable performance of the row-based architecture makes it well-suited for high density
applications. The focus on heat removal instead of cold air delivery is the key to making this
approach scalable. The design of the unit allows it to be easily added in the row of the data center
containments as the demand for cooling increases.

The additional benefit of the row-based architecture is the ability to add hot air containment.
Containing the hot air further reduces any chance of hot and cold air streams mixing. This
provides ultimate predictability and allows the cooling capacity to be matched to the IT heat
load.

Figure 9: IE-HQ-DC front cooler DX

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Remarkable Features and Benefits:

 Strong aluminum frame structure


 Easy serviceable rail-mounted fan design (Hot-Swap module fans)
 Fast and easy installation
 High energy efficiency with variable speed EC fans and inverter Outdoor unit.
 Reduces initial investment costs eliminating raised floor application
 Easy controllable human interface and easy monitoring system
 Scalable and compatible dimensions according to customer’s requirements
 Modular design Safe operation due to the sensors and sufficient insulation
 Ability piping direction either from top or bottom through a raised floor or through a
cooler’s plinth
 Network interconnectivity and expandability
 Internationally approved and high quality components
 Flexible operation temperature ranges

Air/water heat exchanger

DX heat exchanger is installed in the front section of the Front Cooler between both of the
front wall plates. The heat exchanger is covered with a spray eliminator on the air outlet
side that catches any occurring condensate and directs it to the condensate collecting tray in
the Front Cooler. 2 temperature sensors are mounted on the front side of the spray
eliminator at the level of the fan modules. The sensors record the temperature of the cold air
that is blown in (Cold aisle inlet temperature) and transfer it to the control.

Fan module
Front-Side cooler consists of three fan modules which is mounted in front of the heat
exchanger. The fan module can be changed during operation with help by rail system. The
fan modules are installed on rack-mounted shelves in the rear section of the Front Cooler
with the control unit in between. Each shelf has slide rails on the longitudinal sides. The
angle brackets with the fans are inserted into and held in the rails.

Component Identification

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

Figure 10: IE HQ AC Component specification

 1-Removable side cover


 2- Removable front cover
 3- LCD Control Display
 4- Maintenance Covers
 5- Base
 6- Removable Back Cover
 7- Entrance
 8- Exit
 9- Door hinge
 10- Door lock 11-Collar Entrance 12-Collar Exit

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

Figure 11: IE HQ DX Ac Component


 1-Fan Modules
 2- Adjustable Foot
 3- Heat Exchanger
 4- Control Panel
 5- Condensation Plate
 6- Piping
 7- Fan Protection Sheets

Operation

Control Interface

This cooling unit has a user interface which allows customer to control the unit and have
information’s about the running status. The user interface mainly has two parts, that one is
control unit and the other one is digital control panel. Control unit is an electronic device
that has already loaded PLC program at the factory. It is placed at the electrical panel
compartment inside the unit. The control panel is a digital panel mounted on the front

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
perforated door of the unit. These both parts are connected via cable. Customer is able to
define parameters and limits according to cooling system

Figure 12: IE HQ AC Controller Interface

Figure 131: IE HQ AC Display Menu

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
When the main power is supplied to the cooling unit, the display interface initializes. As
soon as power is supplied to the cooling unit, two fans start to run for about 60 seconds and
“self-test please wait…” message is displayed in the control panel.

The start-up inspection ensures that the equipment is operating properly after the initial
start-up. This that all mode operations are inspections verifies working correctly and that
the cooling unit is ready for normal operation.

After the initial menu, main screen like the one below appears.

Main Menus
This cooling unit has following main menus.

Network Menu: Involves information about the network service number, operational program
version and program date. To view Network Menu, press Prg key. Select Network by pressing
Up and Down Arrow keys. Then press Enter key.

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

How to enter control loop menu?

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

4. Electrical and Power Distribution System

Figure 14: IE head quarter office gateway

repeater

 Repeater expand the range of your network by repeating the signals from gateway to all
smart devices like switch and socket.

 We use two repeater to regenerate signal from all smart devices to gateway and the revers.

 We put the repeater between the gateway and other smart device in which the distance is
more than 10 meters.

Specification:

 Power Parameter: 100-240V AC.


Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
 Distance: 500M (Visible)

Figure 15: IE head quarter office repeater

Smart light switch (1-gang and 2-gang)

 Smart switches can be Turn them on/off using a smart phone or by creating scenarios.

 Control lighting or brigantines through RGB controller

 Energy Saver.

 Link to other devices such as motion sensor and lights sensor.

 Metallic cover easily fit into diverse decoration designs.

 Capable of time setting and scenario management.

Waterproof floor socket

 MODI waterproof Double Socket UK Standard,

 Double CAT6, keystone jack with Floor Box 250X250X80

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

Figure 16: IE head quarter office floor socket

Equipment placement for smart lighting

Figure 17 IE-head quarter office smart lighting equipment placement

4.1. Power Distribution


The power distribution design is:

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
 The two main power sources (EEPCO & Generator) will be connected to the Automatic
transfer switch (ATS) at the basement

 The ATS will switch between the two sources. When the utility power is out the
Generator will serve as the main source until power returns to normal function.

 The output from the ATS will be fed to the MDB in the datacenter via change over
switch/isolator.

 UPS, AC & SDB will be connected to the main distribution board.

 To protect the critical load, they will be given power from the UPS through the MDB to
the Rack power.

 Each rack will get power from the single-phase UPS output power ports. This will create
the required power.

 The SBD from the Contractor side will feed all lighting fixture and socket outlets.

Below is the flow diagram and detail LLD of power in IE HQ Datacenter.

Figure 18: IE HQ DC Electrical power distribution LLD

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

Figure 192: IE-HQ-Electrical Distribution LLD

4.2 UPS
The UPSs will be placed in the power room. UPS has 20KVA capacity considering future
expansion. These UPSs are going to be connected to the power source and will protect the
critical load by providing uninterrupted power supply. UPS comes with its own battery
bank which is a failsafe to supply power to the critical load in the case that both main power
sources fail

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

Figure 20: IE-HQ UPS

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

5 Physical security system

5.1 ACCESS CONTROL SYSTEM

The main function of an Access Control which is installed in our IE headquarter is to provide
security to entrances into certain rooms or area. This will allow only authorised personnel with
valid credentials can have access to that specific area.

We use three types of access control devices for our new IE headquarter. The first one is access
control for the glass door, which is GL-300, the other one is FL21, which is applicable for non-
glass doors and there will be a time attendance machine for the main gate. Access Control
Devices will be configured with an IP Address in order to be discoverable in the network. thus
the assigned static ip address for each access control device will be:-

 For F21device telephone room 1 ……………… 172.16.60.11


 For F21device telephone room 2 ……………… 172.16.60.12
 For F21device bed room 1 ……………………. 172.16.60.13
 For F21device bed room 1 ……………………. 172.16.60.14
 For Speedface- V5L …………………………… 172.16.60.15
 For MultiBio-800H time attendance ……. ……..172.16.60.16

5.1.1 Glass door Access Control Device


The type of Access control we use for the glass doors is GL-300 Hybrid verification glass door
lock. Basically, it will be mounted in all Glass doors to avoid unauthorized entrance of people
other than IE staff. The location of the access controls is shown in the figure below:

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

Figure 21- IE-HQ Access Control location

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

Figure 22- IE-HQ Glass Door Access Control device parts

Random Password

Users may enter any number of random digits before or after the correct password as long as the
maximum number of digits entered is 30 or less. For example: If the correct password is 123456,
the random password can be 89123456807, 1234562363, 389123456, etc.

Initialization

Initializing the lock means all data will be deleted and restored to factory default setting.
Operation steps: Press the reset button on the back body of the lock or enter the menu to operate,
the lock prompts the voice of “succeed”, and then the initialization is finished completely.

Normal Open Mode

Normal open mode is to keep lock always unlocked. Rotate thum-turn knob to enable or disable
the mode. Or press 2 and 8 after unlocking the door with administrator verification. Press * to
cancel.

Low Battery Warning

If the battery is low, the lock will prompt a low battery sound. Access to operation is not allowed
in low battery status.
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Others

Without any operation, the lock will power off automatically within 10 seconds

Figure 23- IE-HQ Keys of the Access Control

Verify Administrator

These are the steps to verify administrator:

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

First verify administrator before operating the lock. The default administrator password is
0123456789.

Modify Administrator Password/Card/Fingerprint

These are the steps to modify administrator:

Add User

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
These are the steps to add user:

Delete User

Steps to delete user are as follows:

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

Volume adjustment

Steps for volume adjustment are as follows:

Time Setting

Steps for setting time are as follows:

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

5.1.1.1 ZKBioAccess
ZKBioAccess is the management software installed on a remote computer to monitor activities,
add personnel, setup access levels and revoke access. It is the backbone of the Access control
system which centralize MultiBio 800-H and Speedface-V5L.

Personnel Module

This module is used to set Person details and their department. It primarily consists of two parts:
Department Management settings, which is used to set the Company’s organizational chart;
Personnel Management settings, which is used to input person information, assign departments,
maintain and manage personnel.

Access Control Module

This module is a web-based management system which enables normal access control functions,
management of networked access control panel via computer, and unified personnel access
management. The access control system sets door opening time and levels for registered users.

System Management Module

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
System Management is primarily used to assign system users and configure the roles of
corresponding modules, manage databases such as backup, initialization, and recovery, and set
system parameters and manage system operation logs.

The following are the basic steps to use the system, the user just needs to follow the steps below
and skip the items that are not displayed on their interface.

Step 1: Add Device.

Step 2: Add Personnel.

Step 3: Add Access Control, includes Time Zones, Holidays, Door Setting, and Access Levels.

Step 4: View Real-time Monitoring and Reports.

Log in to the System


After installing the software, double-click the ZKBioAccess icon to enter the system. You may
also open the recommended browser and input the IP address and server port in the address bar.
The IP address is set as: http://127.0.0.1:8088 by default.

Figure 24: System Login page

The username of the super user is [admin], and the password is [admin], then click [Login].

You can modify the login password in [Personal Information] as shown in the figure below:
Select [Reset Password] check box to modify the password.

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

Figure 25: Personal Information page

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Personnel

Figure 26: Personnel system setting


Personnel system includes these modules: Personnel, Department, Custom Attributes, and
Parameters.

Main functions of Personnel Management include Add, Edit, Delete, Export and Import
personnel, and Adjust Department.

Add Personnel

Click [Personnel Management] > [Personnel] > [New]:

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

Figure 27: Adding Personnel


Edit Personnel

Click [Personnel] > [Person], then select a person, and click [Edit].

Delete Personnel

Click [Personnel] > [Person], then select a person, and click [Delete] > [OK] to delete.

Adjust Department

1. Click [Personnel] > [Person], then select a person, and click [Adjust Department]:

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

Figure 28: Department adjustment page

2. Select from the dropdown list of “New Department”.

3. Click “OK” to save and exit.

Statistics

Click [Personnel] > [Person] > [Statistics]. View the number of personnel, the number of
fingerprints, face templates, finger vein enrolled, card numbers, gender and other statistical
information.

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

Figure 29: statistical information page

Export

Click [Personnel]> [Person]> [Export] to export personnel information, personnel biometric


templates and personnel photo.

Figure 30: personnel information export


Import

Click [Personnel] > [Person] > [Import] to import personnel information and personnel biometric
templates. It only supports personnel information templates for importing.

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

Figure 31: personnel information import page

Department
Before managing company personnel, it is required to set a departmental organization chart of
the company. Upon the first use of the system, by default it has a primary department named
[General] and numbered [1]. This department can be modified but can’t be deleted.

Main functions of Department Management include Add, Edit, Delete, Export and Import
Department.

Add a Department

1. Click [Personnel] > [Personnel Management] > [Department] > [New]:

Figure 32: Adding Department

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
2. After filling the details, you can click [OK] to complete adding; or click [Cancel] to cancel it,
or click [Save and new] to save and continue adding new department

Edit a Department

Click [Personnel] > [Personnel] > [Department] > [Edit].

Delete a Department

Click [Personnel] > [Personnel] > [Department] > [Delete]: then click ok to delete

Figure 333: Delete a Department


Export

a) It can be exported in EXCEL, PDF, CSV file format

Figure 34: Data Export

Import
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
1) Click [Personnel] > [Department] > [Import], the import interface is as follows:

Figure 35: Data Import


2) Import department information: can import EXCEL, CSV format files.

3) After importing the file, the system will match the imported report field and the data segment
field automatically.

Custom Attributes
Some personal attributes can be customized or deleted to meet different customers' requirements.
When the system is used for the first time, the system will initialize some personal attributes by
default.

New a Custom Attribute

Click [Personnel] > [Personnel Management] > [Custom Attributes] > [New], then edit the
parameters and click [OK] to save and exit.

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

Figure 36 : New Custom Attribute

Editing a Custom Attribute

Click [Edit] to modify the corresponding attributes.

Deleting a Custom Attribute

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Click [Delete] to delete an unused attribute. If the attribute is in use, the system will pop up
confirmation before confirming to delete.

Parameters
1. Click [Personnel] > [Personnel Management] > [Parameters]:

Figure 37: Parameters


2. You can set the maximum length for a Personnel ID and whether it will support letters or not.
If Personnel ID Auto increment is selected as Yes, then while adding personnel, the ID in field
automatically updates to the next succeeding new number.

3. Set the maximum length (binary number) of the card number that the current system will
support.

4. Set the card format currently used in the system. The card format cannot be switched once it is
set up.

5. Click [OK] to save the settings and exit.

Card Management
There are three modules in card management: Card, Wiegand Format and Issue Card Record

Card
It shows the cards issued in the system with their status.

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

Figure 38: cards issued in the system


Wiegand Format
Wiegand Format is the card format that can be identified by the Wiegand reader. The software is
embedded with 9 Wiegand formats. You may set the Wiegand card format as needed.

Figure 39: Wiegand Format


Issue Card Record
It records the life cycle of a card and will display the operations performed on the card.

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

Figure 404: Issued card record

Adding Device
Add Device

There are two ways to add Access Devices.

1. Add Device manually

A. Click [Access] > [Device] > [New] on the Action Menu, the following interface will be
shown:

Figure 41 manually adding device page


B. After editing, click [OK], and the system will try to connect the current device. If it is
successfully connected, it will read the corresponding extended parameters of the device.

2. Add Device by Searching Access Controllers: Search the access controllers in the Ethernet.

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

Figure 425: Adding Device by Searching page


(1) Click [Access] > [Device] > [Search Device], to open the Search interface.

(2) Click [Search], and it will prompt [Searching……].

(3) After the search is complete, the list and total number of access controllers will be displayed.

Figure 436: list and total number of access controllers page

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
(4). Click on [Add] in the search list. If the device is a pull device, you may input a device
name, and click [OK] to complete device adding.

Device Operation
For the communication between the system and device; data uploading, configuration
downloading, device and system parameters shall be set. Users can edit access controllers within
relevant levels in the current system; users can only add or delete devices in Device Management
if needed.

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

Figure 44: Device operation

Edit or Delete a Device


Edit: Click Device Name or click [Edit] to access the edit interface. Delete: Select device, click
[Delete], and click [OK] to delete the device.

Figure 45: edit or delete a device page


Export
Device information can be exported in EXCEL, PDF, CSV file format.

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

Figure 467: Export device information

Disable/Enable
Select device, click [Disable/ Enable] to stop/ start using the device. When communication
between the device and the system is interrupted or device fails, the device may automatically
appear in disabled status. After adjusting local network or device, click [Enable] to reconnect the
device and restore device communication.

Synchronize All Data to Devices


Synchronize data of the system to the device. Select device, click [Synchronize All Data to
Devices]

Figure 47: synchronizing all data to devices


Upgrade Firmware
Select the required device that needs to be upgraded, click [Upgrade firmware] to enter edit
interface, then click [Choose File] to select firmware upgrade file (named emfw.cfg) provided by
Access software, and click [OK] to start upgrading.

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

Reboot Device
It will reboot the selected device.

Synchronize Time
It will synchronize device time with server’s current time.

Set Device Time Zone


If the device supports the time zone settings and is not in the same time zone with the server, you
need to set the time zone of the device. After setting the time zone, the device will automatically
synchronize the time according to the time zone and server time.

Get Personnel Information


Renew the current number of personnel, fingerprints, finger vein and face templates in the
device. The final value will be displayed in the device list.

Modify IP Address
Select a device and click [Modify IP address] to open the modification interface. It will obtain a
real-time network gateway and subnet mask from the device. (Failed to do so, you cannot modify
the IP address). Then enter a new IP address, gateway, and subnet mask. Click [OK] to save and
quit.

Doors
1. Click [Access] > [Device] > [Door] to enter Door Management interface (click “Area Name”
in the left, system will automatically filter and display all access devices in this area).

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

Modify Door Parameter:

Select the door to be modified, and click Door Name or [Edit] button below operations tab to
open the Edit interface:

Figure 488: modify door parameter page


Reader
Click [Device]  [Reader] on the Menu, then click on reader name or [Edit]:

Auxiliary Input
It is mainly used to connect devices like infrared sensors, smog sensors, smoke detector, etc. 1.
Click [Access Device]  [Auxiliary Input] on the Action Menu, to access below shown
interface:

2. Click on Name or [Edit] to modify the parameters as shown below:

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

Figure 49:Auxiliary input

Event Type
It will display the event types of the access devices.

1. Click [Device] > [Event] to access the following page:

Figure 9:Event Types

2. Click [Edit] or click on the event type name to edit:

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

Figure 50: event type edit page

Device Monitoring
By default, it monitors all
devices within the current user’s
level. You may click [Access Device] >
[Device Monitoring] to view a list of
operation information of
devices: Device Name, Serial No.,
Area, Operation Status, Current status, Commands List, and Related Operation

Figure 50: device monitoring page

Real-Time Monitoring
Click [Access Device] > [Real-Time Monitoring]. It will monitor the status and real-time events
of doors under the access control panels in the system. In real-time, including normal events and
abnormal events (including alarm events). The Real-Time Monitoring interface is shown as
follows:

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

Figure 51:Real-Time Monitoring page

Remote Opening/Closing:

It can control one door or all doors. To control a single door, right click over it, and click
[Remote Opening/ Closing] in the pop-up dialog box. To control all doors, directly click
[Remote Opening/ Closing] behind Current All. In remote opening, user can define the door
opening duration (The default is 15s). You can select [Enable Intraday Passage Mode Time
Zone] to enable the intraday door passage mode time zones, or set the door to Normal Open, then
the door will not be limited to any time zones (can be opened at any time). To close a door, select
[Disable Intraday Passage Mode Time Zone] first, to avoid enabling other normal open time
zones to open the door, and then select [Remote Closing].

Cancel the alarm:

Once an alarming door pops-up over the interface, the alarm sound will be played. Alarm
cancellation can be done for single door and all doors. To control a single door, move the cursor
over the door icon, a menu will pop-up, then click [Remote Opening/ Closing] in the menu. To
control all doors, directly click [Remote Opening/ Closing] behind Current All.

5.1.2. NON-GLASS DOORS ACCESS CONTROL SYSTEM

In our IE headquarter we also use magnetic lock doors, which are controlled by using fingerprint.
These access controls will be implemented to doors that are not made of glass. The type of
access control used here is known as F21. It is an attendance and access control terminal
applying the most advanced SilkID technology. It not only possesses outstandingly high

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
identification rate towards dry, wet and rough finger, but also provides the utmost security by its
live finger detecting capability as well as photo taking function which enables attendance photo
and Photo ID(optional).

There are four main components of the Access Control System

1. Access Control Device


2. Magnetic Lock
3. Exit Button
4. Door Returner
5. Management Software

Access Control Device


The main module allows entrance from the outside. It integrates a Numeric Keypad, Fingerprint
reader, Card Reader and built-in physical key. It is connected to both the Magnetic lock and Exit
Button and is connected to a management switch in order to be managed and configured
remotely via network using Access Software.

Figure 5210 Access Control Device

The Access Control Devices will be configured with an IP Address in order to be discoverable in
the network. So, we will have overall four Access control devices in which all of them will have

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
a connection with their own magnetic lock, exit sign, and exit button. So, this four access control
devices are managed by their unique IPv4 addresses.

The access control devices will be placed on the gates of the two bed rooms and the two
telephone rooms based on the design below:

Figure 53 Location of FL21 Access Control devices

5.1.2.1 ZKACCESS 3.5


HQ has 5 doors in total that will be controlled by ZKaccess 3.5 , 1 Main sliding door Entrance, 2 telephone
room Entrances, 2 bed room entrances.

All five doors are equipped with access control system with magnetic lock and sliding motor as per the
specifications. Software installed in the Management computer in the NOC room monitors access to these
doors.

Step 1: Double click and run ZKAccess 3.5 Security System shortcut on the Desktop

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

Step 2: Logging in

A login page will be displayed as shown in the diagram below

Use the below information to Login

Username: admin

Password: admin

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Step 3: After successfully logging in the following window will be displayed

Figure 54: ZKAccess 3.5 Main Interface

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Step 4: Since all devices have been configured, it will be shown in the Devices window as shown

Figure 55: ZKAccess 3.5 Devices Interface

Step 5: On the Personnel window, new personnel can be added by clicking New and entering the information

Figure56: ZKAccess 3.5 Personnel Window

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

Step 6: On the Access control Window, Real time monitoring of the existing doors is available, including
opening the doors remotely.

Figure 57: ZKAccess 3.5 Real-Time Monitoring Window


Step 7: On Report window, logs of every event can be viewed for monitoring

Figure 5811: ZKAccess 3.5 Report and Log Window

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Step 8: On System Window Database backup and restore can be done

Magnetic Lock
An Electromagnet that is installed at four doors will definitely reinforces doors not to be open. It
has a capability to withstand up to 600lb of force. It is directly connected to the access control
device and its power adapter.

Figure 59Magnetic Lock

Exit Button
An exit button is used to open the door from the inside. Personnel inside the access restricted
area can exit using the exit button to unlock the magnetic lock. This button is directly connected
to both the Magnetic lock and the Access Control Device.

Figure 60 Exit Button

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Door Closer/ Returner
A hydraulic door closer is installed at all doors to enable the automatic closing of the door after
entry or exit. All doors need to be closed right away upon entry or exit otherwise it will be
vulnerable to unauthorized entry. The Door closer will be installed at the door hinges and will be
able to return the door back to closing.

Figure 61 Door Returner

5.1.3 TIME ATTENDANCE MACHINE

In order to control the entry and exit time of the employee, we will also implement time
attendance machine in our IE headquarter building. It is called MultiBio 800-H.

MultiBio 800-H is a time attendance and access control terminal for face and fingerprint
verification. Using ZK latest ZKFACE 7.0 high-speed face recognition algorithm, it has
extremely high verification speed and low error rate. With its high-resolution infrared night
vision light and professional color duo camera, the terminal can carry out quick verification in
any environment. What is more, it supports face, fingerprint, user ID, password, RFID card

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
(optional) and various combination methods, in order to satisfy the demands of different users.
Moreover, the TCP/IP communication supports connection across internet segments. Its auxiliary
input function can be used for linking to Fire Alarm. We will locate the time attendance
machines in the following manner:

Figure 62 Location of MultiBio 800-H Time attendance

There are different verification modes for the MultiBio 800-H. These include fingerprint
verification, Password verification and facial verification.

Fingerprint Verification
There are also two different ways of fingerprint Verification.

1:N Fingerprint Verification


Under this fingerprint verification method, a fingerprint collected by the sensor is verified with
all fingerprints stored in the device.

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
1:1 Fingerprint Verification
Under this fingerprint verification method, a fingerprint collected by the sensor is verified with
the fingerprint corresponding to the entered User ID. This verification method is preferred when
the 1:N verification encountered difficulty.

Password Verification
Under this verification method, the entered password is verified with the password of the entered
ID.

Facial Verification

1:1 Face-based Attendance


Compare the captured facial image with the facial image associated with the entered user ID.

1:N Face-based Attendance


Compare the captured facial image captured by the camera with all facial data in the device.

5.1.4 Automatic Sliding Door

An Automatic sliding glass door will be constructed in IE HQ main entrance area. This sliding
door will be integrated to access control device that do support fingerprint, ID card or pin
numbers features as desired.

When the access control device authorizes a moving object close to the door, the door will
automatically opens or close. This is So-called automatic door. The control device of sliding
automatic door contains basic function and extensional function, automatic operation/hold-
open/closed/half-open to meet customer needs. Control device has multiple interfaces for
choosing various connectors such as: safety beam photocell, electric locks, etc. Its drive devices

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
adopts European technology to integrate motor with gear box, which offers strong driving and
reliable operation and increased power output , it can adapt to a large door

Automatic Sliding door operator features

With high silicon rubber aluminum wheel hanger roller a highly intelligent multi-CPU control
system provides easy adjustable function and high security performance with Low noise design
(<45db) Energy saving and soundproofing. When the power is off it can choose the backup
batteries to keep the door in normal operation. Powerful 24V DC reared motor provides excellent
thermal equipped and quiet operator.

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

Figure 6312 sliding door motor and belt control mechanisms

Figure 6413 elements of the door controller layout

As soon as the access control acknowledges autorized entry it will send a pulsating signal to controller of the door to
actuate the motor for specific time and returns back as it reaches end point.

5.1.5 CARD PRINTER

Hiti CS-200e plastic card printers are proposed for IE HQ. With HiTi CS card printer, you will
be able to enjoy easy operating, high quality plastic cards printing conveniently for personalized
ID card, credit cards, membership cards and badges from various level of thickness and color
style.

The printer is equipped with a LCD display with four buttons to give the access to printer menu
and two LED lights to show conditional status. All printing status and warning/error messages
will be displayed in this LCD screen.

The card printer will use PVC cards with different thickness size ranging from 0.3mm-1mm with
both color and monochrome printing features.

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

Figure 65 Cs-220e Card printer

Procedures for Starting printing activity

HiTi CardDésirée CS for designing and printing cards must be installed onto the PC

Print Settings

Before start using your HiTi card printer, it is very important to double check and/or change the
default print driver settings. Those settings includes in the following list:

- Ribbon types - Card types - Card thickness -Others

Driver’s settings can be accessed from the following instructions:

From the Start button (located bottom-left on the Windows task bar), select “Printers and Faxes”

Select your HiTi card printer and then follow by a click on right button of the mouse
Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
From the Printer menu, select “Printing Preference”

A pop up configuration screen for HiTi card printer appears

The main menu tabs include Device Option, Printing Area, Color, Tools, Heating Energy,
Magnetic Encoding, Import/Export & About

Figure 66 Frequently used print settings


Transparent card settings

CS-220e has a new feature to print transparent card. To enable this feature, you have to check on
"Transparent Card". Once checked, "Flip" checkbox will also become available to click on.

Figure 67 Transparent Card settings

4. Video Surveillance System

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
5.2 Security Camera Design
As a modern IT office, our IE headquarter features surveillance cameras, which are mainly
intended to assure the safety and security of the company and its staff. The basic function of the
surveillance system is to provide a tamper proof record for post event analysis and viewing the
entire movement in and around the office. A Network Video Recorder (NVR) will monitor the
video feed from the surveillance cameras and the data will be recorded into the hard drives for
playback and evidence. These cameras also provide different advantages, which includes:

 Monitor any actions in and around the office


 Control and manage the staff
 Create a safer work space
 Avoid frivolous lawsuit
The type of camera we used in IE headquarter is Hikvision DS-2CD1143G0-I which is a dome
shaped IP camera.

Figure 68 Hikvision Dome shaped Camera


Since we have different separated rooms in IE headquarter we will place eighteen (18) cameras
in and at the main gate of the office. The cameras will be placed so that there will be no left-
alone place in the office. The mounting location of the cameras is shown in the figure below.

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

Figure 6914 Location of Surveillance Cameras

5.2.1 Network Video Recorder (NVR)


NVR is the layback and storage medium that collects each video stream from its respective
camera and provides a management interface. The IE headquarter NVR is 32 channel having
2x6TB storage capability. It will be connected to PoE switch and configured with its own IP
Address.

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

Figure 70 NVR

Panel Description
The front panel of the NVR has the following components as shown in the figure below

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

Figure 71: NVR front panel

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

Figure 72 NVR Front Panel description

The rear side includes the following components as shown in the figure below

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

Figure 73: NVR rear panel

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

Figure 74 NVR Rear panel description

Start up and shut down


To start up the NVR:

Step 1 Check the power supply is plugged into an electrical outlet. It is HIGHLY recommended
that an Uninterruptible Power Supply (UPS) be used in conjunction with the device. The Power
indicator LED on the front panel should be red, indicating the device gets the power supply.
Step 2 Press the POWER button on the front panel. The Power indicator LED should turn blue
indicating that the unit begins to start up.
Step 3 After startup, the Power indicator LED remains blue. A splash screen with the status of
the HDD appears on the monitor. The row of icons at the bottom of the screen shows the HDD
status. ‘X’ means that the HDD is not installed or cannot be detected.
To shut down the NVR:
Step 1 Enter the Shutdown menu.
Menu > Shutdown

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

Figure 75: NVR Shutdown menu

Step 2: Select the Shutdown button


Step 3: Click the Yes button.

Activating the Device


For the first-time access, you need to activate the device by setting an admin password. No
operation is allowed before activation. You can also activate the device via Web Browser or
SADP.
Step 1: Input the same password in the text field of Create New Password and Confirm New
Password.
The user name is admin
The default password is %TGBnhy6

Figure 76: device activation

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Step 2 Click OK to save the password and activate the device.
Step 3: When the device is activated, the system pops up the message box to remind you to
remember the password. And you can click Yes to continue to export the GUID file for the
future password resetting.
Step 4: Insert the U flash disk to your device, and export the GUID file to the U flash disk in the
Reset Password interface.

User Login
If NVR has logged out, you must login the device before operating the menu and other functions.
Step 1: Select the User Name in the dropdown list

Figure 77: User Login page

Step 2: Input Password.


Step 3: Click OK to log in.

Using the Setup Wizard


The Setup Wizard can walk you through some important settings of the device. By default, the
Setup Wizard starts once the device has loaded.
Check the checkbox to enable Setup Wizard when device starts. Click Next to continue the setup
wizard. Follow the guide of the Setup Wizard to configure the system resolution, system
date/time, network settings, HDD management, record settings, etc.

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

Figure 78: Setup Wizard

Network Settings
Network settings must be properly configured before operating NVR over network.
Step 1 Enter the Network Settings interface.
Menu > Configuration > Network

Figure 79: Network settings

Step 2: Select the General tab.

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Step 3: In the General Settings interface, you can configure the following settings: NIC Type,
IPv4 Address, IPv4 Gateway, MTU and DNS Server.
Step 4: If the DHCP server is available, you can check the checkbox of DHCP to automatically
obtain an IP address and other network settings from that server.
 The NVR and IP cameras are in the same VLAN which is the IOT VLAN (VLAN 60)
 The NVR will have a static IP address of 172.16.60.10
 The core switch will provide IP addresses for the camera devices automatically as below.
//VLAN Configuration

!
VLAN 60
Name IOT-VLAN
Int Vlan60
Ip address 172.16.60.1 255.255.255.0
!

//DHCP Pool Config


!
ip dhcp pool IOT
network 172.16.60.0 255.255.255.0
dns-server 172.16.50.14 8.8.8.8
default-router 172.16.60.1
!
Step 5: After having configured the general settings, click the Apply button to save the settings.

Adding IP Cameras
Ensure the network connection is valid and correct, and the IP camera to add has already been
activated. Then add the network cameras to the connection list of the device.
Step 1: Click to select an idle window in the live view mode.
Step 2: Click the + icon in the center of the window to pop up the Add IP Camera interface.

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

Figure 80: IP Camera interface.

Step 3: Select the detected IP camera and click the Add button to add it directly, and you can
click the Search button to refresh the online IP camera manually or you can choose to custom
add the IP camera by editing the parameters in the corresponding text field and then click the
Add button to add it.

Live View
Live view shows you the video image getting from each camera in real time. The NVR
automatically enters Live View mode when powered on. It is also at the very top of the menu
hierarchy, thus pressing the ESC many times (depending on which menu you are on) brings you
to the Live View mode.

Operations in Live View Mode

In live view mode, there are many functions provided. The functions are listed below

Single Screen: showing only one screen on the monitor.

Multi-screen: showing multiple screens on the monitor simultaneously.

Auto-switch: the screen is auto switched to the next one and you must set the dwell time for
each screen on the configuration menu before enabling the auto-switch.
Menu>Configuration>Live View>Dwell Time

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Start Recording: continuous record and motion detection record are supported.

Add IP Camera: the shortcut to the IP camera management interface.

Playback: playback the recorded videos for current day.

Aux Monitor: the NVR checks the connection of the output interfaces to define the main and
auxiliary output interfaces. When both the HDMI and VGA are connected, the HDMI is used as
main output and the VGA is used as the aux output. When the aux output is enabled, the main
output cannot perform any operation, and you can do some basic operation on the live view
mode for the Aux output.

Adjusting Live View Settings

Live View settings can be customized according to different needs. You can configure the output
interface, dwell time for screen to be shown, mute or turning on the audio, the screen number for
each channel, etc.

Step 1 Enter the Live View Settings interface. Menu> Configuration> Live View

Figure 81 Live View- General

The settings available in this menu include:

Video Output Interface: Designates the output to configure the settings. Our NVR provide the
HDMI and VGA video outputs.

Live View Mode: Designates the display mode to be used for Live View.

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Dwell Time: The time in seconds to dwell between switching of channels when enabling auto-
switch in Live View.

Enable Audio Output: Enables/disables audio output for the selected video output.

Volume: Adjust the volume of live view, playback and two-way audio for the selected output
interface.

Step 2 Set cameras order.

Figure 82 Live View- Camera Order

Channel-zero Encoding

Sometimes you need to get a remote view of many channels in real time from web browser in
order to decrease the bandwidth requirement without affecting the image quality, channel-zero
encoding is supported as an option.

Step 1 Enter the Live View Settings interface. Menu > Configuration> Live View

Step 2 Select the Channel-Zero Encoding tab.


Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Step 3 Check the checkbox after Enable Channel Zero Encoding.

Step 4 Configure the Frame Rate, Max. Bitrate Mode and Max. Bitrate.

After setting the Channel-Zero encoding, you can get a view in web browser of 16 channels in
one screen.

Recording Settings
Make sure that the disk has already been installed. If not, please install a disk and initialize it.
There are two kinds of record types, including Instant Record and All-day Record.
Step 1: On the live view window, right click the window and move the cursor to the Start
Recording option, and select Continuous Record or Motion Detection Record on your demand.

Figure 83: Recording Settings

Step 2: Click the Yes button in the pop-up Attention message box to confirm the settings. All the
channels will start to record in the selected mode.

Playback
The recorded video files on the hard disk can be played back in the following modes: instant
playback, all-day playback for the specified channel, and playback by
normal/event/smart/tag/sub-periods/external file search.

Step 1: Enter playback interface.

Click Menu>Playback or from the right-click menu

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
Step 2: Check the checkbox of channel(s) in the channel list and then double-click to select a
date on the calendar.

Step 3: You can use the toolbar in the bottom part of Playback interface to control playing
progress.

Step 4: Select the channel(s) to or execute simultaneous playback of multiple channels.

Accessing by Web Browser


Step 1: Open web browser, input the IP address of the device (172.16.60.10) and then press
Enter.

Step 2: Login to the device. If the device has not been activated, you need to activate the device
first before login.

Figure 8415 Accessing by web browser

Step 1: Set the password for the admin user account

Our default password is %TGBnhy6

Step 2: Click OK to login to the device.

If the device is already activated, enter the user name and password in the login interface, and
click the Login button.

Step 3: Install the plug-in before viewing the live video and managing the camera. Please follow
the installation prompts to install the plug-in.

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

6 Ceiling Speakers

6.1 Type of speaker


The speaker used in IE headquarter is AXIS C2005 PoE based Network Ceiling Speaker. This
Axis C2005 network ceiling speaker is a professional ‘all-in-one’ speaker system, designed to
play background music and deliver live or scheduled audio announcements to indoor locations. It
delivers high-quality sound without any need for fine-tuning. Background music can be played
via the preinstalled AXIS Audio Player application. You can create and schedule your own
playlists from an onboard SD card or audio streaming services. AXIS C2005 is also perfect for
voice announcements (scheduled or live calls). The speakers can be zoned together. AXIS C2005
allows users to deliver instructions during an emergency or to make general voice messages.
Built-in memory supports pre-recorded messages. Security staff can respond to notifications with
live speak. AXIS C2005 is a standalone unit that can be placed almost anywhere, which supports
a flexible, scalable, and cost-effective system, which make it very applicable for the new IE
headquarter. It can easily be flush mounted, and its slim design makes it blend in with its
surroundings.

Figure 85 16 Axis C2005 Ceiling Speaker

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
In IE headquarter there will be TEN (10) AXIS C2005 Speakers that will be mounted in the main
hall, management office, around the lobby, café, CEO office and conference hall. The location of
the speakers is illustrated in the design below:

Figure 8617 Location of Speakers

6.2 How to mount the speakers


The following pictures illustrate the systematic installation procedure of AXIS C2005 Network
Ceiling speaker.

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

Figure 87 Opening the Speaker

Figure 19 Memory Insertion

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

Figure 20 Setting up mic On/Off

Figure 21 Different options on Speaker installation

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

Figure 22 Option 1 installation method

Figure 23 Option 1 installation method

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

Figure 24 Option 1 installation method

Figure 25 Option 1 installation method

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

Figure 26 Option 1 installation method

Figure 27 Option 1 installation method

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

Figure 28 Option 1 installation method

Figure 29 Option 2 installation method

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

Figure 30 Option 2 installation method

Figure 31 Option 2 installation method

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

Figure 32 Option 2 installation method

Figure 33 Option 2 installation method

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

Figure 34 Final Configuration

6.3 Camera installation process


How to assign an IP address and access your device

To find Axis devices on the network and assign them IP addresses in Windows®, use AXIS IP
Utility or AXIS Device Manager. Both applications are free and can be downloaded from
axis.com/support.

By using AXIS IP Utility, you can:

 Search the network for devices


 Change static IP addresses

By using AXIS Device Manager, you can:

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
 Search the network for devices
 Assign IP addresses
 Set passwords
 See connection status
 Perform operations on multiple devices at once
 Manage firmware upgrades
 Configure device parameters

Axis speaker devices are designed to be used on an Ethernet network. To access the device’s
webpage you need an IP address. Most networks have a DHCP server that automatically assigns
IP addresses to connected devices. However, since we need a specific IP address for the
speakers, we will give every speaker a single static IP address.

If we are using Axis IP utility, here are the procedures to change IP address of each device (if
needed)

If we are using Axis device manager, the following will be the procedures to change the IP
address of each device (if needed)

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

We will give static IP address for the speakers that will be from 172.16.60.30 up to 172.16.60.40.

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
To access the device, open a browser and enter the IP address or host name of the Axis device.
Enter the username and password. If you access the device for the first time, you must set the
root password.

To set a new password for the root account, first type a password and retype the password to
confirm the spelling and click save.

Our default Password will be: %TGBnhy6

To change the root password, log in to the product’s webpage and go to System > Users. For the
root user, click Edit. Enter a new password and Save.

Setting up a new zone

Our speakers

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
We will have three basic zones for IE headquarter. The first one will be ‘All stuffs zone’ that
includes all the speakers except for the CEO and Conference room. This zone is used to make
announcements and other information from the CEO to all people in the compound. The other
zone is ‘Reception zone’, which includes speakers located around the main and CEO’s
reception. It will be intended to deliver messages for guests and the reception. The third zone is
‘Stuff zone’. It will combine the three (3) speakers located in the main hall.

We can make announcements and other messages for a specific speaker through its own IP
address. We can also add other zones if necessary.

Set up audio in AXIS Camera Station

 This system has many limitations including:


 Audio sent from AXIS Camera Station to an AXIS network audio device cannot be recorded.
 An audio device must be associated with a camera in AXIS Camera Station.
 You can only associate one audio device per camera.
 There is no volume control for the audio device in AXIS Camera Station.

To Add an AXIS network audio device to AXIS Camera Station in AXIS Camera Station, first click +
and select Configuration. Go to Devices > Add devices. Select the network audio device from the list
and click Add. Go to Other devices to check that the audio device has been added to the list.

To associate the audio device with a camera first go to Devices > Streaming profiles and select the
camera that you want to associate the audio device with. In the device’s streaming profile, select the audio
device from the Speaker drop-down. Click Apply. To test the association, go to the camera’s Live view in
AXIS Camera Station and click the Speak button. When you speak into the computer’s microphone, the
audio device plays the audio.

Set up audio devices and make live announcements

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

The prerequisites for this procedure is the Axis audio device and Axis network camera are located on
the same network. The general workflow will be a follows:

 Install and add a camera and speaker to AXIS Camera Station.


 Associate the speaker with the camera.
 You can now make announcements using a button when viewing live video

N.B- We cannot confirm that the ACS CORE DEVICE E-LICENSE can be integrated with Hikvision
surveillance cameras.

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

7. Access Point Placement


We have placed 10 access points to give full coverage to HQ office.

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

Ap naming’s are as follows,

 Staff Ap1
 Staff Ap2
 Staff AP3
 M-Office AP
 Mini.Conf AP
 Conference AP
 Lobby AP
 Café AP

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________
 CEO AP
 CEO Reception AP

8. SCS and Node Installation


8.1 UTP Patch Panel and Wall outlet Labeling
For easy access and troubleshooting we will use the following labelling schema on the patch panels and
wall outlets. We used six 24 port UTP patch panel and one 6 port fibre patch panel in the data center side
to share the network with switch.

Patch Panel Labelling

 <Office Device name >< Office Device name >

Wall out Lets Labelling

 <Rack Number><Patch Panel Number><Node Number>

8.2 UTP Node locations


We install floor and wall mount single and double nodes out of this UTP cable with 35 Single node and
18 double nodes for HQ end user devices based on below designs.

Below are the designs for the node installation.

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

Figure 104:IE – Floor and wall Node Design

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

Document Acceptance Certificate

Name Name

Title Title

Company Company

Signature Signature

Date Date

Name Name

Title Title

Company Company

Signature Signature

Date Date

Name Name

Title Title

Company Company

Signature Signature

Date Date

Confidential© 2020
IE Headquarter DCF and SCS Implementation LLD
____________________________________________________________________________________

Confidential© 2020

You might also like