1 expanding access in an academic environment john rotunni, lisa rotunni & edward hohmann...
TRANSCRIPT
![Page 1: 1 Expanding Access in an Academic Environment John Rotunni, Lisa Rotunni & Edward Hohmann California State Polytechnic University, Pomona](https://reader035.vdocument.in/reader035/viewer/2022070306/5516bc60550346a25b8b5ecb/html5/thumbnails/1.jpg)
1
Expanding Access in an Academic Environment
John Rotunni, Lisa Rotunni & Edward HohmannCalifornia State Polytechnic University, Pomona
![Page 2: 1 Expanding Access in an Academic Environment John Rotunni, Lisa Rotunni & Edward Hohmann California State Polytechnic University, Pomona](https://reader035.vdocument.in/reader035/viewer/2022070306/5516bc60550346a25b8b5ecb/html5/thumbnails/2.jpg)
2
Copyright Edward C. Hohmann, John J. Rotunni, Lisa M. Rotunni 2003.
This work is the intellectual property of the authors. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the authors. To disseminate otherwise or to republish requires written permission from the authors.
![Page 3: 1 Expanding Access in an Academic Environment John Rotunni, Lisa Rotunni & Edward Hohmann California State Polytechnic University, Pomona](https://reader035.vdocument.in/reader035/viewer/2022070306/5516bc60550346a25b8b5ecb/html5/thumbnails/3.jpg)
3
Getting the Most from aCard Access System
• Increase space sharing
• Reduce loss & damage
• Ensure safety after hours
• Allow use anytime, 24 x 7
• Encourage use by more people
• Establish user responsibility
4,200 Students - 63 Lab Suites - 253,000 ft2
College of Engineering, Cal Poly Pomona
![Page 4: 1 Expanding Access in an Academic Environment John Rotunni, Lisa Rotunni & Edward Hohmann California State Polytechnic University, Pomona](https://reader035.vdocument.in/reader035/viewer/2022070306/5516bc60550346a25b8b5ecb/html5/thumbnails/4.jpg)
4
What Can an Access System Do?• Lock and unlock doors on a schedule• Provide card-swipe access for individuals• Grant different types of access – pass/toggle• Allow time-of-day-based and calendar-based
access controls and alarm conditions• Monitor door status• Issue alarms• Control special equipment and systems• Record access activity
![Page 5: 1 Expanding Access in an Academic Environment John Rotunni, Lisa Rotunni & Edward Hohmann California State Polytechnic University, Pomona](https://reader035.vdocument.in/reader035/viewer/2022070306/5516bc60550346a25b8b5ecb/html5/thumbnails/5.jpg)
5
Designing Spaces
• Typical elements• Single card-swiped entry door
• Other non-swiped exit only doors
• Emergency exit only door
• Roll-up door
• Monitoring & tracking requirements• Cover all doors
• Do not issue keys• Doors locked or unlocked by key may not
respond to system locks & unlocks
• Uncontrolled door leaves space uncontrolled
![Page 6: 1 Expanding Access in an Academic Environment John Rotunni, Lisa Rotunni & Edward Hohmann California State Polytechnic University, Pomona](https://reader035.vdocument.in/reader035/viewer/2022070306/5516bc60550346a25b8b5ecb/html5/thumbnails/6.jpg)
6
Card Access Door Components
• Position sensor
• Sounder
• Request-to-exit sensor
• Electric lock
• Card swipe
We purchased a DSX Access System and components through Electro Specialty Systems
![Page 7: 1 Expanding Access in an Academic Environment John Rotunni, Lisa Rotunni & Edward Hohmann California State Polytechnic University, Pomona](https://reader035.vdocument.in/reader035/viewer/2022070306/5516bc60550346a25b8b5ecb/html5/thumbnails/7.jpg)
7
Time & Calendar-based Controls• Time Zones control weekly operations• Scheduled automatic lock/unlock &
Time determined card-reader response• Academic operations
• Vary by day of week• M – Th open for evening courses• Close early on Fridays• Closed on weekends
• Vary by day of year• Special open days – Hol 1• Business hours during
term breaks – Hol 2• Closed academic holidays – Hol 3
1 of 22 Time zonesLocks/unlocks outside doors
![Page 8: 1 Expanding Access in an Academic Environment John Rotunni, Lisa Rotunni & Edward Hohmann California State Polytechnic University, Pomona](https://reader035.vdocument.in/reader035/viewer/2022070306/5516bc60550346a25b8b5ecb/html5/thumbnails/8.jpg)
8
Granting Card Access
• Establish identity – ID card with photo
• Assign Access Level – define which readers grant access & during what Time Zone
• Determine special access needs – toggle, return to schedule
• Set expiration – automatic or manual
Access response can be changed from Toggle to Pass for a particular card based on Time Zone
![Page 9: 1 Expanding Access in an Academic Environment John Rotunni, Lisa Rotunni & Edward Hohmann California State Polytechnic University, Pomona](https://reader035.vdocument.in/reader035/viewer/2022070306/5516bc60550346a25b8b5ecb/html5/thumbnails/9.jpg)
9
Who Needs Access?• Faculty & Staff – year-round users• Students – frequently changing needs
• Request form requires approval by advisor, chair• Standard Access Levels for ease of assignment• Expiration date required – end of term or year
• Others – frequently changing population• VIP visitors• Vendors/contractors• Workshop & seminar participants• Faculty & Staff who have misplaced their campus ID
Guest cards needed to provide temporary access
![Page 10: 1 Expanding Access in an Academic Environment John Rotunni, Lisa Rotunni & Edward Hohmann California State Polytechnic University, Pomona](https://reader035.vdocument.in/reader035/viewer/2022070306/5516bc60550346a25b8b5ecb/html5/thumbnails/10.jpg)
10
School HoursAfter HoursClassrooms & Labs
Work Rooms Dept Offices
Pass
Pass
Tech Staff
Pass
Pass
Pass
Pass Pass
StudentsPassToggle
Toggle
Flexible by Room, Person, Time
Pass Only
Pass Only
Faculty
Office Staff
![Page 11: 1 Expanding Access in an Academic Environment John Rotunni, Lisa Rotunni & Edward Hohmann California State Polytechnic University, Pomona](https://reader035.vdocument.in/reader035/viewer/2022070306/5516bc60550346a25b8b5ecb/html5/thumbnails/11.jpg)
11
Two Years Experience165 Control Points
1,000+ Users
![Page 12: 1 Expanding Access in an Academic Environment John Rotunni, Lisa Rotunni & Edward Hohmann California State Polytechnic University, Pomona](https://reader035.vdocument.in/reader035/viewer/2022070306/5516bc60550346a25b8b5ecb/html5/thumbnails/12.jpg)
12
Behind The Scenes Hardware
• Real-time database interface
• Distributed door controllers
• Master / slave networked
Server &SQL Database
Two Door Slave Module& Battery Backup
Master Module& Battery Backup
Workstation
Memory in each module contains authorized access info & user data
Workstation
Location 1 Location 2
![Page 13: 1 Expanding Access in an Academic Environment John Rotunni, Lisa Rotunni & Edward Hohmann California State Polytechnic University, Pomona](https://reader035.vdocument.in/reader035/viewer/2022070306/5516bc60550346a25b8b5ecb/html5/thumbnails/13.jpg)
13
Behind The Scenes Software
• System interfaces & actions – DSX Database• Establishing configuration
• Authorizing card access
• Operator interfaces – DSX Workstation• Monitoring & ad hoc remote control
• Displaying real-time status
• Management reports – MS Access• Showing configuration
• Tracking usage
• Use campus systems for card data
![Page 14: 1 Expanding Access in an Academic Environment John Rotunni, Lisa Rotunni & Edward Hohmann California State Polytechnic University, Pomona](https://reader035.vdocument.in/reader035/viewer/2022070306/5516bc60550346a25b8b5ecb/html5/thumbnails/14.jpg)
14
![Page 15: 1 Expanding Access in an Academic Environment John Rotunni, Lisa Rotunni & Edward Hohmann California State Polytechnic University, Pomona](https://reader035.vdocument.in/reader035/viewer/2022070306/5516bc60550346a25b8b5ecb/html5/thumbnails/15.jpg)
15
Why Cards or Metal Keys?• Cards permit instant updating & flexibility
• Immediate withdrawal of use
• Time & calendar specific access
• Keys have lower cost & management workload• Individual “unused” keys are often shared
• Keys become less secure over time through loss
• Mix systems appropriately & synchronize• Consider number of users & security requirements
• Use card access groups to mimic master key levels
• Restrict master & sub-master key distribution to minimize loss
• Weigh total cost – install, maintenance, effectiveness
![Page 16: 1 Expanding Access in an Academic Environment John Rotunni, Lisa Rotunni & Edward Hohmann California State Polytechnic University, Pomona](https://reader035.vdocument.in/reader035/viewer/2022070306/5516bc60550346a25b8b5ecb/html5/thumbnails/16.jpg)
16
Controlling Special Devices• Unique requirements
• Elevator – activate buttons & rear doors
• Gates
• Equipment (projectors) – theft protection
• Beyond access toward building operations• Lights – hallway & display areas
• Air conditioning
• External inputs trigger system response• Fire alarm – opens gates
![Page 17: 1 Expanding Access in an Academic Environment John Rotunni, Lisa Rotunni & Edward Hohmann California State Polytechnic University, Pomona](https://reader035.vdocument.in/reader035/viewer/2022070306/5516bc60550346a25b8b5ecb/html5/thumbnails/17.jpg)
17
Security, Not Surveillance• Philosophy of encouraging access
• More use by more people
• People working will help maintain facility
• Operator/police response to alarms• Expected only during off-hours
• Security weaknesses – reduce with cameras• Open air spaces
• Attractive nuisance areas
• Card-swipes recorded but not monitored• Data accessible when losses occur
![Page 18: 1 Expanding Access in an Academic Environment John Rotunni, Lisa Rotunni & Edward Hohmann California State Polytechnic University, Pomona](https://reader035.vdocument.in/reader035/viewer/2022070306/5516bc60550346a25b8b5ecb/html5/thumbnails/18.jpg)
18
Tips & Tricks• Use dual-swipes – two control points for a gate• Place card swipe near main configuration station• Give two cards to the same person – normal pass
access plus special “toggle card”• Install doors with no outside handles – no card or
key, sounder discourages all but emergency exit• Have a “portable control station” – laptop with
software and network connectivity• Assure network connectivity adjacent to hardware
– facilitates troubleshooting and emergency control
![Page 19: 1 Expanding Access in an Academic Environment John Rotunni, Lisa Rotunni & Edward Hohmann California State Polytechnic University, Pomona](https://reader035.vdocument.in/reader035/viewer/2022070306/5516bc60550346a25b8b5ecb/html5/thumbnails/19.jpg)
19
What’s Happening Now?• Struggles
• Doors propped open – adding sounders
• Workload from frequently changing users –standardizing access assignments, developing tools
• Building system synchronizations limited by only on-off control
• Expansion• Rapidly adding additional swipes in older buildings
• Installing vehicle gate control for surrounding areas
• Working with building engineers for control options
![Page 20: 1 Expanding Access in an Academic Environment John Rotunni, Lisa Rotunni & Edward Hohmann California State Polytechnic University, Pomona](https://reader035.vdocument.in/reader035/viewer/2022070306/5516bc60550346a25b8b5ecb/html5/thumbnails/20.jpg)
20
Why Do Users Like It?• Quick changes give flexibility
• Remote control allows ad hoc adjustments
• Building lockdown promotes peace of mind
• Calendar-based controls automate schedules
Students enjoy working on their own time schedules
![Page 21: 1 Expanding Access in an Academic Environment John Rotunni, Lisa Rotunni & Edward Hohmann California State Polytechnic University, Pomona](https://reader035.vdocument.in/reader035/viewer/2022070306/5516bc60550346a25b8b5ecb/html5/thumbnails/21.jpg)
21
Access Us at Cal Poly Pomona
Web: www.csupomona.edu/engineering
Contact: [email protected]
909-869-2474
•John Rotunni
•Lisa Rotunni
•Edward Hohmann