26. Access Control System Installation and Commissioning
Chapter objectives
1. Learn the Basics in the Chapter Overview
2. Understand Jobsite Considerations
3. Discover how Conduit and Cabling make or Eliminate Long-term Problems
4. Discover Device Installation Considerations
5. Learn how to do Device Setup Correctly
6. Learn how to Set Up the Access User Database Correctly
7. Learn how Access Schedules to make Future System Operation and Maintenance Easy or Hard
8. Learn how using Access Groups can Reduce Work for Everyone
9. Answer Questions about Access Control System Installation and Commissioning
CHAPTER OVERVIEW
In this chapter a number of issues related to system installation and commissioning will be explored. System installation is pretty obvious, and commissioning is the process of making the system ready for use, including programming the servers and workstations to operate as desired.
Under installation, jobsite-specific considerations like safety rules and coordination will be discussed. Also looked at will be the issue of conduit and when to know if it makes sense to simply run cable without conduit. Device installation considerations related to making the system work reliably for many years will also be discussed.
Finally, system commissioning will be reviewed. This will include setting up all devices and verifying their good operation, and programming the system databases for optimal operation.
This chapter explores a number of issues related to system installation and commissioning. System installation is pretty obvious, and commissioning is the process of making the system ready for use, including programming the servers and workstations to operate as desired.
Under installation, jobsite-specific considerations like safety rules and coordination are discussed. Also reviewed is the issue of conduit and when to know if it makes sense to simply run cable without conduit. Device installation considerations related to making the system work reliably for many years are also reviewed.
At the end of the chapter system commissioning is discussed. This includes setting up all devices and verifying their good operation, and programming the system databases for optimal operation.
Keywords: Cable, Commissioning, Conduit, Coordination, Databases, Installation, Programming, Rules, Safety
Author Information:
Thomas L. Norman, CPP, PSP, CSC, Executive Vice President, Protection Partners International

Jobsite Considerations

Surprisingly, the jobsite has a significant bearing on the conditions of installation. The main issues include:
• Jobsite Safety Rules
• Coordination with Other Trades
• Installation Product Storage Arrangements
• Clean Area Rules
Most important of all are Jobsite Safety Rules. Construction areas are accident prone. Hard hats, steel toed shoes, and careful behavior all contribute to a safe workplace. Maintenance of headroom in work areas, tying off belts when working above, and other safety considerations also help to prevent accidents. Each jobsite has its own rules. It is best to observe them all.
Operationally, it is astonishing how many points of coordination are required to successfully complete a security system project. No other system has as many points of coordination with other trades as an integrated security system. Trades to coordinate with may include:
• Electrical
• Door Hardware
• Elevators
• Parking
• Signage
• Concrete
• Finish
• HVAC
• Fire Alarm System
• And many more.
Additionally, as the project nears completion and it begins to be occupied, any work that requires access may need access permissions. It is important to place high consideration on coordination to complete a successful installation.
Many new installers forget that they must have a safe place to store their goods on site. You will have to provide one or more lockboxes to keep tools and materials stored safely. These in turn will need to be stored in a secure location.
Keeping work areas clean goes a long way in maintaining a safe and secure work area as well as enhancing the reputation of the integrator on the jobsite and with the client.

Conduit versus Open Cabling

Conduit is expensive, so it would seem to make a lot of sense to eliminate it whenever possible, right? But that is not always the case. Generally, security system cabling should be contained within conduit. Why? Because in most cases, integrated security systems are mission-critical systems, and cables that are not within conduit are frequently damaged by workmen working on other systems. Conduit prevents damage to security system cables.
When running bare cables above a ceiling, in most cases these must be plenum rated cables in order to comply with fire codes. These cables are much more expensive than standard cables. So yes, you can save some money by not using conduit, but you run the risk of reducing system reliability in the process.

Device Installation Considerations

We have already discussed the need to observe the way security devices interact with their environment, such as mounting card readers to a steel building in a way that will not cause them to overheat. This is one of many device installation considerations that are “not in the manual.” Here are some other examples:
• Make sure that you are using the correct lock for the type of door. This is particularly important if the door is fire rated or is a fire-egress door.
• Be sure to use proper End-of-Line Resistors on all alarm devices.
• Be aware that when using a magnetic lock's integral door position switch function, it does not tell you that the door is closed, only that it is locked.
• When using Pneumatic Push Button Exit Switches with magnetic locks, it is advisable to use two sets of contacts: one to notify the Access Control Panel to bypass the alarm and the other to cut power to the door lock.
• When using Pneumatic Push Button Exit Switches in the above manner, it is inadvisable to use the magnetic lock as a door position switch, because cutting power will cause a forced door nuisance alarm each time exit is requested.
• When installing video cameras be sure to verify correct line-of-sight no matter what the drawings show.
• Be certain that mounting heights conform to local codes.
• In earthquake-prone areas, be sure to mount all equipment in conformance with OSHPD1 standards and with a minimum torsional load factor of five times the weight of the mounted device.
1Office of Statewide Health Planning and Development — California standard for seismic compliance.
• Do not use custom circuitry. Virtually anything you want to do can be done with off-the-shelf circuitry or a Programmable Logic Controller. This will be much easier to maintain than trying to find the installer who jerry-rigged a custom circuit out of bread-board and wire-wrap.
These are just a few cautions about device installations. As you talk with “old timers” who have been installing systems for many years, you will learn even more.

The Importance of Documentation

Proper documentation is essential to a good quality installation and to the installer's profitability. Every single decision about where and how to mount wire devices throughout the entire facility is an engineering decision, and they will be made either by a qualified engineer or by a guy with a screwdriver in his hand. You cannot buy a more expensive engineer than a guy with a screwdriver!
I have been to sites where the same circuit was wired four different ways on different floors of the building, because there were no design drawings and each installer used his own ideas about how to implement the idea. In that case they used different parts, which they each left the jobsite to go to buy on their own (four times the cost for acquisition), and different wiring, making the same circuit much more difficult to troubleshoot when failures occur.
Additionally, no matter what the situation, good as-built documentation is critical to be able to maintain a successful working system. Pity the poor technician who arrives at a complex facility to troubleshoot a problem with no system drawings available.

Device Setup and Initial Testing

After installing and wiring devices system testing begins. The first step is to test connectivity. Does every device show up on the computer or monitoring panel to which it is connected? Do all alarm-sensing devices show all four alarm states? Do all locks work? Do all Request-to-Exit devices unlock the doors? Do all card readers work with a sample card?
Additionally, the following work should be performed:
• Verify proper powering and grounding of all devices
• Verify the integrity of all insulation, shield terminations, and connections
• Verify the integrity of soldered connections
• Verify that all cables are properly dressed
• Verify all circuitry for continuity and operation
• Verify the mechanical integrity and aesthetic acceptability of all mounted devices
• Verify that any devices that must be powered up or down in a specific sequence are set up to do so
• Adjust all devices for best operation and document the adjustments
To do this type of testing, send a worker around to every alarm sensor and door and have him exercise the device while observing its operation on the Alarm/Access Control System workstation. Once the operation of every device in the system is confirmed, you can move on to Database Setup.

Alarm and Reader Device Database Setup

Most alarm-sensing devices should be set up on a schedule such that they are armed at some times and bypassed at other times. The schedule should be set up in close coordination with the system owner/operator.
Many access control readers also operate on a schedule providing for the door to be under access control some times and unlocked at others.

User Access Database Setup

The primary database is the User Access Database. This includes a record on all access users in the system (everyone who will have an access credential). Each record in the User Access Database will include fields for Name (First/Middle Initial/Last), Title (Mr./Ms./Mrs./Jr./PhD/MD, etc.), address, city, state, zip, organization the user is related to, department, access level, and other pertinent data.

Access Schedules and Areas

Most users are not granted unlimited access everywhere 24/7/365. They are usually granted access to a limited number of doors and only during certain hours. There are two ways to program access privileges for users. The first way is to program each user individually to specific doors and to specific times. The second way is much more effective — assign individual users to one or more User Groups. For example:
• Janitors
• Upper Management
• Department X Office Workers
Then, assign individual doors to the Access Area groups corresponding to their areas and functions, for example, Building 1, Department X. After that, you simply assign User Groups to Access Area groups.

Chapter Summary

1. The jobsite has a significant bearing on the conditions of installation. The main issues include:
• Jobsite Safety Rules
• Coordination with Other Trades
• Installation Product Storage Arrangements
• Clean Area Rules
2. Many new installers forget that they must have a safe place to store their goods on site.
3. Generally, security system cabling should be contained within conduit.
4. Proper documentation is essential to a good quality installation and to the installer's profitability.
5. After installing and wiring devices system testing begins.
6. Additionally, the following work should be performed:
• Verify proper powering and grounding of all devices
• Verify the integrity of all insulation, shield terminations, and connections
• Verify the integrity of soldered connections
• Verify that all cables are properly dressed
• Verify all circuitry for continuity and operation
• Verify the mechanical integrity and aesthetic acceptability of all mounted devices
• Verify that any devices that must be powered up or down in a specific sequence are set up to do so
• Adjust all devices for best operation and document the adjustments
7. Most alarm-sensing devices should be set up on a schedule such that they are armed at some times and bypassed at others. The schedule should be set up in close coordination with the system owner/operator.
8. The primary database is the User Access Database.
9. Assign portals to Access Area Groups.
10. Assign individual users to one or more User Groups. For example:
• Janitors
• Upper Management
• Department X Office Workers
11. Then assign User Groups to Access Area groups.
Q&A
1) Which is not a main issue at a jobsite?
a. Jobsite Safety Rules
b. Coordination with Other Trades
c. Installation Product Storage Arrangements
d. Keeping the area available for the Project Manager
2) Which is the most important at a jobsite?
a. Jobsite Safety Rules
b. Coordination with Other Trades
c. Installation Product Storage Arrangements
d. Keeping the area available for the Project Manager
3) When running bare cables above a ceiling, in most cases these must be _______ cables in order to comply with fire codes.
a. PVC
b. Fiber-optic
c. Plenum rated
d. None of the above
4) Which is not an installation consideration?
a. Make sure you are using the correct lock for the type of door. This is particularly important if the door is fire rated or is a fire-egress door
b. Be sure to use proper End-of-Line Resistors on all alarm devices
c. Be aware that when using a magnetic lock's integral door position switch function, it does not tell you that the door is closed, only that it is locked
d. Make sure you are using solid core cables
5) Proper documentation is not a plus
a. It is essential for users to know that the installation is on schedule
b. It is essential to a good quality installation and to the installer's profitability
c. Both a and b
d. Neither a nor b
6) After installing and wiring devices system testing begins. The first step is to test
a. Connectivity
b. If all locks work
c. If all cards work
d. If all users work
7) Most alarm-sensing devices should be set up on a schedule such that
a. They are armed at all times
b. They are never armed unless dangerous
c. They are armed at some times and bypassed at other times
d. None of the above
8) Most users are not granted unlimited access everywhere 24/7/365.
a. They are granted access to all doors at all hours
b. They are granted access to some doors at all hours
c. They are usually granted access to a limited number of doors and during only certain hours
d. They are granted access to a limited number of doors at all hours
Answers: 1) d, 2) a, 3) c, 4) d, 5) b, 6) a, 7) c, 8) c
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
13.58.168.80