Integrated Security Systems Design
eBook - ePub

Integrated Security Systems Design

A Complete Reference for Building Enterprise-Wide Digital Security Systems

Thomas L. Norman

  1. 400 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Integrated Security Systems Design

A Complete Reference for Building Enterprise-Wide Digital Security Systems

Thomas L. Norman

Book details
Book preview
Table of contents
Citations

About This Book

Integrated Security Systems Design, 2nd Edition, is recognized as the industry-leading book on the subject of security systems design. It explains how to design a fully integrated security system that ties together numerous subsystems into one complete, highly coordinated, and highly functional system. With a flexible and scalable enterprise-level system, security decision makers can make better informed decisions when incidents occur and improve their operational efficiencies in ways never before possible. The revised edition covers why designing an integrated security system is essential and how to lead the project to success. With new and expanded coverage of network architecture, physical security information management (PSIM) systems, camera technologies, and integration with the Business Information Management Network, Integrated Security Systems Design, 2nd Edition, shows how to improve a security program's overall effectiveness while avoiding pitfalls and potential lawsuits.

  • Guides the reader through the strategic, technical, and tactical aspects of the design process for a complete understanding of integrated digital security system design.
  • Covers the fundamentals as well as special design considerations such as radio frequency systems and interfacing with legacy systems or emerging technologies.
  • Demonstrates how to maximize safety while reducing liability and operating costs.

Frequently asked questions

How do I cancel my subscription?
Simply head over to the account section in settings and click on “Cancel Subscription” - it’s as simple as that. After you cancel, your membership will stay active for the remainder of the time you’ve paid for. Learn more here.
Can/how do I download books?
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
What is the difference between the pricing plans?
Both plans give you full access to the library and all of Perlego’s features. The only differences are the price and subscription period: With the annual plan you’ll save around 30% compared to 12 months on the monthly plan.
What is Perlego?
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Do you support text-to-speech?
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Is Integrated Security Systems Design an online PDF/ePUB?
Yes, you can access Integrated Security Systems Design by Thomas L. Norman in PDF and/or ePUB format, as well as other popular books in Computer Science & Cyber Security. We have over one million books available in our catalogue for you to explore.

Information

Year
2014
ISBN
9780128001936
Edition
2
Section II
Security System Design
4

Security System Design Elements

Abstract

Chapter 4 includes a brief description of security system design tools and the processes, which are elaborated on in Chapters 59.
This chapter contains information on the tools of security system design, the place of electronics in the overall security system process, how to establish electronic security program objectives, types of design efforts, and project drivers.
The tools of security system design include drawings, specifications, interdiscipline coordination, product selection, project management, and client management.
Drawings should show the relationship of the devices to their physical environment, the relationship of devices to the conduit system and power, the relationship of devices to each other, and the relationship of devices to the user. Drawings should be designed to serve the bid estimator, the installer, the project manager, the maintenance technician, and the engineer who will later expand the system.
Specifications describe what the system is, what products are acceptable, and how it should be installed. The specifications detail the requirements for interdiscipline coordination and project management.
The design process should begin with the establishment of a security program based on a comprehensive risk assessment. No part of a system should be designed without knowing what role it serves in the security policy.
Keywords
AutoCAD
Bid estimator
Client management
Conduit system
Integrator
Project Management Institute
Project Management Professional

Introduction

When it comes to integrated security systems designs, I do not recommend napkins as a design medium. This is especially true for enterprise security systems. These systems are highly integrated into their environments and often highly integrated into other systems. Knowledge is required. Skill is needed. Integrators who work from the “seat-of-the-pants” often leave the project with their pants on fire. Enterprise security systems design involves a set of tools and a process. The following is a brief description of the tools and the process, which will be elaborated on in Chapters 59.
This chapter contains information on the tools of security system design, the place of electronics in the overall security system process, how to establish electronic security program objectives, types of design efforts, and project drivers.

The Tools

The tools of design include drawings, specifications, interdiscipline coordination, product selection, project management, and client management.

Drawings

Drawings are the heart of the design. Drawings are discussed in detail in Chapter 10, but it is important to understand their strategic role in the process, which is described here. Drawings should show the following:
The relationship of devices to their physical environment (plans, elevations, and physical details)
The relationship of devices to the conduit system and to power (plans and risers)
The relationship of devices to each other (single line diagrams)
The relationship of devices to the user (programming schedules)
Drawings must serve five distinct types of users:
The bid estimator: The bid estimator must determine what materials are needed. Helpful drawing tools include device schedules (spreadsheets listing devices and their attributes) and plans showing device locations and conduit lengths, sizes, and wire fills. Other drawings useful to the bid estimator include single line diagrams, riser diagrams, and system interfacing diagrams.
The installer: The installer needs drawings that show both the big picture and the smallest details. Therefore, it is helpful if the drawings are formatted in a hierarchical fashion. Single lines show the big picture. Plans show device locations and their relationship to the building and conduit system. Physical details and interface details show the smaller details.
The project manager: The project manager needs to manage the progress of the installation, including coordinating the ordering and arrival of parts and supplies and coordinating manpower to the project at the correct time, in the correct place, and in coordination with other trades to get all devices mounted and all connections made. He or she will primarily rely on schedules for provisioning logistics, plans to measure installation progress, and single-line diagrams to gauge how close the system is to start-up.
The maintenance technician: After the system is installed, it is the maintenance tech’s turf. He or she will need single-line diagrams to determine how the system interconnects, plans to determine where devices are located and how they connect in the physical space, and risers and power schedules to know where to go from floor to floor and the source of power for each device. The integrator should be required to provide maintenance manuals that have all these drawings. I also recommend that the integrator be required to place a pocket on the inside door of each electronics assembly with an envelope containing the system single-line diagram, riser, and plans appropriate to service the equipment in that rack. Also, he or she should be required to install a field intercom station at each service location to communicate with the console to facilitate communications with another technician or console operator.
The next engineer expanding the system: Many systems undergo expansion on an irregular basis. You may not be the next engineer, but someone will be. He or she will need all of your drawings in order to understand how to expand the system. The client should receive all your drawings in AutoCAD® form and specifications in Adobe PDF form.

Specifications

Specifications are discussed in detail in Chapter 10, but it is important to understand their strategic role in the process, which is described here.
If drawings are the heart of the design, specifications are the head. Specifications generally take precedent in legal disputes. Drawings are just there to illustrate the standards and practices written into the specifications. If you are very long in your career, you will see some pretty bad specs. We used to joke in our office about someday seeing a set of specifications that simply says “Make it work real good.” Some come pretty close to that. We have seen security system specifications that are only five pages long. There is a lot of room there for serious mistakes by a well-meaning contractor. Many security system contracting problems are the result of incomplete or wrong specifications.
With possibly very few exceptions, most integrators I have met sincerely want to do well for their clients. It is the designer’s job to provide the integrator with enough information to do well. To the extent that drawings and specifications are incomplete, inaccurate, or misleading, the contractor can make unintended errors that will be costly and aggravating to the installer, the integrator for whom he or she works, and most certainly the system’s owner.
Specifications should include a description of what the project entails; descriptions of the whole integrated system and each subsystem; a description of the services the contractor will provide; and a list of acceptable products and acceptable installation, testing, acceptance, training, and warranty practices. Different specification formats prevail in different areas of the world, and occasionally these may change as building code authorities evolve in their preferences. This will all be covered in detail in Chapter 10.

Product Selection

Specifying the correct products for the job can result in a wonderful system that can easily exceed the owner’s expectations. The wrong products can leave the owner upset with the installer, the manufacturer, and the designer. Here is where the designer has to have free reign to do what is in the best interest of the client. To the extent that the designer is placed under pressure to specify one brand or another due to market forces, I assure you that the owner will suffer. If the owner suffers, everyone suffers. The operator suffers, the maintenance tech suffers, the integrator who has to listen to an unhappy client suffers, the manufacturer suffers, and the industry suffers. Countless manufacturers and integrators have lost repeat work (and lost client referrals) due to expediencies in ...

Table of contents

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright
  5. About the Author
  6. Dedication
  7. Preface
  8. Section I: Introduction to Integrated Security Systems
  9. Section II: Security System Design
  10. Section III: Special Design Sections
  11. Index
Citation styles for Integrated Security Systems Design

APA 6 Citation

Norman, T. (2014). Integrated Security Systems Design (2nd ed.). Elsevier Science. Retrieved from https://www.perlego.com/book/1828229/integrated-security-systems-design-a-complete-reference-for-building-enterprisewide-digital-security-systems-pdf (Original work published 2014)

Chicago Citation

Norman, Thomas. (2014) 2014. Integrated Security Systems Design. 2nd ed. Elsevier Science. https://www.perlego.com/book/1828229/integrated-security-systems-design-a-complete-reference-for-building-enterprisewide-digital-security-systems-pdf.

Harvard Citation

Norman, T. (2014) Integrated Security Systems Design. 2nd edn. Elsevier Science. Available at: https://www.perlego.com/book/1828229/integrated-security-systems-design-a-complete-reference-for-building-enterprisewide-digital-security-systems-pdf (Accessed: 15 October 2022).

MLA 7 Citation

Norman, Thomas. Integrated Security Systems Design. 2nd ed. Elsevier Science, 2014. Web. 15 Oct. 2022.