just like we agreed on change ever single word and send the report front turnit. i attached the answear and you gonna change evry single word
Building an Access Control System 14
Building an Access Control System
CSI 210 Systems Analysis and Design
Strayer University
Dr. Wesley Phillips
11/01/2015
Abstract
The following is a report on the design of an access control system (ACS) for the college. The project report describes the tasks performed in each stage. Also, the requirements of the new system are analyzed. This report provides the documentation of all the activities and procedures that pertinent to the design of this new system.
Building an Access Control System
Project Scope Statement
The college will perform an upgrade in the dormitories building. This project aims at buffering security of hotels through an access control system (ACS) besides the current safety of the cameras. This system, integrated with the dormitories’ current camera system, will implement an electronic proximity reader to unlock the doors automatically. (See Figure 5). A central control system where an administrator shall manage the system will be set up. There is also a concerned in the method of system change-over. Phased change-over strategy is the recommended one when implementing the new system. The change-over shall involve implementing the subsystems in stages. Therefore, the project shall not grind to a halt due to immediate and prompt next changeover. The estimated time scope of completing the project is one months (See Figure 2, Table 1).
Project Tasks
1. Collecting Data
1.1 Students Awareness,
Students are the primary stakeholders involved in the run of the system. They are the targets of the system since they provide the data and inputs for processing to the system. Such data required by the system includes unique ID number for access to the dormitories. Thus, the first initiative is bringing awareness to the students about the new system. The administration office should inform the students that they should confirm their ID number in the school database.
1.2 Recording and Assigning ID,
After taking the initiative to aware the students, the next step would be collecting pertinent data of students such as ID number from the administration database. Each student in the school who has registered as a resident of the college’s accommodation facility should be assigned an ID number used in programming the proximity cards.
1.3 Data Storage,
The collected data on students such as ID number should be transferred and stored in another computerized storage system for future reference during the progress of this project.
2. Building Infrastructure
After the awareness and the pertinent data has been collected and stored, the next step would be setting the infrastructure for the implementation of the new system. (See Figure 1). The physical and architectural infrastructure that required are;
2.1 Building the Access Gates,
The access control system requires the installation of specialized doors and gates. Therefore, the dormitories should be installed with such doors, each with one door. Meaning that students of the same dormitory block would have access to one door.
2.2 Building the Closet,
An electrically-installed small room required at a strategic position, preferably near the main door of the hostel apartment to accommodate the electronic access system that would be used to administer the system. In the closet would be a server computer configured with a control panel. The closet preferred will be a concrete building of at least 8.5 m by 7.5 m in dimension. The closet would have one entry door and a window as well as armatures for transmitting the Wigand interface cables.
3. Installing Electronic Access System
After the setting up of the architectural structure of the buildings and doors, the next phase of the project would be equipping the closet with the electronic access systems. These are;
3.1 Access Control Panel,
Access Control Panel constitutes a server computer system; monitor, system unit and other pertinent peripheral devices. Most importantly, the computer system shall be configured with the software necessary to implement an access control panel
3.2 Wigand Interface,
Following the installation of an access control panel, a Wigand interface shall be incorporated into the system for connecting the card-swiping mechanism. The recommended protocol for Wigand interface is the 32-bit format for cables transmitting data signals between the proximity readers and the closet.
3.3 Cabling infrastructure,
Cables should be passed underground to the doors of the dormitories. Protective PVC pipes should be used to connect the two sections. These cables should not exceed a maximum of 500 feet from the closet so as to maintain the electric data signal from the proximity reader and the access control panel. The right cable should be one that supports 5.0 V DC power transmission that is the required for the transmission of the electric signals between the two terminals.
4. Programming the electrical systems
After the physical infrastructure is set up, then the other immediate task would be implementing programmed proximity cards and readers.
4.1 Proximity Cards,
The next step would be purchasing proximity cards according to the number of students present in the college and who are registered residents of the dormitories. Then the cards should be programmed to contain the identity of each student through implanting the cards with the unique ID numbers of each student (Figure 4).
4.2 Proximity Reader,
The proximity reader should provide a copy of the same ID numbers for the proximity cards. It should be programmed to retrieve students’ details the closet access control panel. The recommended proximity reader is the XceedID® reader (Figure 3)since it occupies less space can interface with the access control system with the cameras inclusive.
4.3 Cameras,
The existing camera systems is then configured and programmed with the access system as well as the proximity reader. The activity will involve cable connections from the cameras to the closet. The cameras should then be able to record live data during student access in the doors and stored in the closet’s computer systems which would be used for monitoring of the students activities while accessing the gates.
5. Implementation
5.1 Training System Administrators,
The administrative staff will undergo training on how to use the systems. These would be necessary when updating on student’s information shall be required by the control system. Also, one to three staffs should be intensely trained in controlling and monitoring the system at the closet who shall be present on a daily basis.
5.2 Training Students,
Training Students shall involve the issuing of programmed proximity cards to the respective students. These students should then undergo training on how to access the doors. The training of the students would involve hiring experts in these systems to show the students on how to use the cards. The trainers would even be the system administrators in the closet.
5.3 Testing,
After the implementation of the system, several test shall be performed to ensure that the system is free from defaults.
5.3.1 Power supply,
Tests should be taken to analyze the power efficiency of the closet and the access doors. The supply should be checked to ensure that the required output voltage will deliver out to a consistent state. Also test should be taken to ensure that there is a power reliability.
5.3.2 Access Doors,
All the card readers should be tested to ensure that they work properly. Each student should try to access the several doors to check if there was any data error in programming the card readers and the proximity cards.
5.3.3 Cables,
Testing cables will comprise searching for any openness and incompleteness. Cables will then be tested to confirm that the correct signal bandwidth transmitted through the wires is reliable. Any defaults or vulnerability observed in the cables will then get rectified.
5.3.4 Closet system,
The access control system in the closet would be tested for several days to make sure that the system runs properly. In the process, the computer system's connections are tested and confirmed to run smoothly.
5.3.5 Review and maintenance,
Regular review of the system should be performed to maintain the status quo of the access control system through setting schedules on dates of study such as thrice in a year.
References
Allegion US. (n.d.). Retrieved November 2, 2015, from http://us.allegion.com/Products/readers/proximity/Pages/default.aspx
Eberhardt, N. H. (1995). U.S. Patent No. 5,378,880. Washington, DC: U.S. Patent and Trademark Office.
Sandhu, R. S., Coyne, E. J., Feinstein, H. L., &Youman, C. E. (1996). Role-based access control models. Computer, (2), 38-47.
Tables
TASK | START DATE | DURATION |
Making Awareness | 4-Mar | |
Collecting Data | 6-Mar | |
Building Access Gates and doors | 8-Mar | 14 |
Installing the ACS | 10-Mar | |
Programming card and reader | 11-Mar | |
Configuring camera | 11-Mar | |
Training System Users | 13-Mar | 14 |
Testing | 14-Mar | 10 |
Table 1: Task schedule
Figures
Figure 1: System boundary
Figure 2: Gantt Cart
Figure 3: proximity reader
Figure 4: Proximity card
Figure 5: Activity diagram Student Access Control System