You are on page 1of 7

Building an Access Control System

Case Study 1: Building an Access Control System

(Student’s Name)

(Professor’s Name)

(Course Title)

(Date of Submission)
Building an Access Control System

Scope

This project will be focusing on the installation of an Access Control System. This will

be to control access to the dormitory of a small college. The system is intended to include a

smart card reader component and a camera system. There will be need to grant smart

identification cards to those authorized to access the dormitory. At the entrance to the dormitory

will be an electronic proximity reader. A camera system at the entrance apart from recording all

movements in and out of the dormitory will also record every individual that uses a card to gain

entry. This system will also have a control center capable of monitoring the activity that will be

manned by college security. There will also be a backup system to ensure that all the footage and

access information is saved. This will be very important should they be referenced in future.

(Bowers, 2013).

Major Tasks for the Project

Preparation

This task will be for preparing the various aspects of the project before it can begin.

Some of it will involve working to finalize the requirements of the project.

Putting together a team – there will need to be a team to be involved in the project. The members

will be of varying expertise needed to complete the project.

Decide on the locations – the positioning of the camera, the smart card reader and the control

room will then be decided.

Developing a design for the system - this will include a virtual representation of both the exterior

and the interior of the college dorm. (Norman, 2011).


Building an Access Control System

Proposal

This will a task that lays out the resources required for the project. As the design has

already being developed, it will be much clear to know what’s needed at this point.

Creating costs estimates – these estimates will be for all the materials required for the project.

They will include hardware and software requirements.

Labor costs – once the team has been decided upon, the proposal will state will provide the costs

for their expertise on the project.

Timelines for the project – at this point, a rough estimate will be put forward of the time it will

take to successfully complete the project. (Bowers, 2013).

Installation

This task will involve the actual physical installation of the system. The team will put up

the physical infrastructure that is meant to support the system.

Setting up the control room – this will be where the system will be monitored and controlled

from by the security team.

Wiring – the wiring for the reader, cameras and so forth will be set up at this point. The project

team will be using R456 communication lines.

Installing the readers - these will be placed at various strategic points of entry both within and

outside of the dorms.

Installing the cameras – these cameras will be placed together with the readers and will be

positioned for an optimal point of view. For privacy purposes, the cameras are to be placed

together with the external card readers. (Bowers, 2013).


Building an Access Control System

Configuration

Configuring the system will involve setting up the logical aspect of the Access Control

System which will include the software.

Setting up the ACS server – this server will hold software that includes the database. The

database will hold all the smart card user information that will be used by the reader to allow

access.

Configuring the smart cards - the smart cards will be assigned with information on the students

available with the administration. The access control list to be used by the system will be as

according to that information. (Norman, 2011).

Deployment and Testing

This will be the final task to be done on the system. All the previous tasks will have been

completed to satisfaction before this.

Soft deployment – this will be a test of the system within a limited group of people. It could

include select students or staff. The purpose is to gauge the system within these controlled

parameters and evaluate its performance. The tests at this point will be thorough to cover all

bases.

Full deployment – after the soft deployment, the full deployment will be done to include all

users. Users will have to get their cards otherwise they won’t be able to access the dorms.

(Bowers, 2013).
Building an Access Control System

Project Gantt chart

ID Task Task Name Duration Start Finish Predecessors Resource Names


Mode Oct 26, '14 Nov 9, '14 Nov 23, '14 Dec 7, '14 Dec 21, '14
S T M F T S W S T M F T S W S T
1 Select an ACS Team 1 day Mon 10/27/14 Mon 10/27/14

2 Survey College 1 day Mon 10/27/14 Mon 10/27/14


Dorm
3 Create an ACS 5 days Mon 10/27/14 Mon 11/3/14 1
Design
4 Visual Diagram 2 days Mon 10/27/14 Wed 10/29/14
of College
Exterior Dorm
5 Visual Diagram 3 days Thu 10/30/14 Mon 11/3/14
of College
Interior Dorm
6 Investigated 1 day Mon 11/3/14 Mon 11/3/14
Security System

7 Check Cameras 1 day Mon 11/3/14 Mon 11/3/14


for
damages/wear
and tear
8 Compatibillity 1 day Mon 11/3/14 Mon 11/3/14
with new ACS
9 Create Proposal for 15 days Mon 11/3/14 Fri 11/21/14 3
Management
10 Purchase Materials 5 days Mon 12/1/14 Fri 12/5/14 9

11 Installation of ACS 6 days Mon 12/8/14 Mon 12/15/14

ID Task Task Name Duration Start Finish Predecessors Resource Names


Mode Nov 23, '14 Dec 7, '14 Dec 21, '14 Jan 4, '15 Jan 18, '15
S T M F T S W S T M F T S W S T
10 Purchase Materials 5 days Mon 12/1/14 Fri 12/5/14 9

11 Installation of ACS 6 days Mon 12/8/14 Mon 12/15/14

12 Control Panel 1 day? Mon 12/8/14 Mon 12/8/14

15 Readers on Walls 3 days Mon 12/8/14 Wed 12/10/14

16 Re-position Cameras
3 days Thu 12/11/14 Mon 12/15/14

17 Configuration of 4 days Tue 12/16/14 Fri 12/19/14


ACS Server
18 Configuring Access 1 day Fri 12/19/14 Fri 12/19/14
Cards
19 Testing of ACS 6 days Fri 12/26/14 Fri 1/2/15 11

20 ACS Team Test 2 days Fri 12/26/14 Mon 12/29/14

21 Staff Test 3 days Mon 12/29/14 Wed 12/31/14

22 Deployment of ACS 1 day Mon 1/5/15 Mon 1/5/15 19


Building an Access Control System

System Diagram
Building an Access Control System

References

Bowers, D. M. (2013). Access control and personal identification systems. Butterworth-

Heinemann.

Norman, T. L. (2011). Electronic access control. Elsevier.

You might also like