SlideShare a Scribd company logo
1 of 62
Download to read offline
Prepared for NDSU Department of Residence Life
By Martin McNichols
Electronic Access Control in
the NDSU Residence Halls
A proposal for the use of Electronic Access Enabled locks
on the Residence Hall rooms at NDSU
Table of Contents
The Proposal 1.......................................................................................................
Case Studies 4.......................................................................................................
University of Hawai’i at Mānoa 5.........................................................................................
University of Alaska Anchorage 6........................................................................................
Northeastern University 7.....................................................................................................
University of Missouri 8.........................................................................................................
Hardware 9............................................................................................................
Lockset 9.................................................................................................................................
Supporting Hardware 10......................................................................................................
Squadron 10...................................................................................................................................
PIM 10..............................................................................................................................................
Power Supply and Batteries 10.....................................................................................................
Other Supporting Hardware 10....................................................................................................
NDSU Hall Breakdowns 11.................................................................................
Thompson Hall 11..................................................................................................................
Burgum Hall 12.......................................................................................................................
The Survey 13........................................................................................................
Results 13................................................................................................................................
Those in Agreement 14.........................................................................................................
Those in Disagreement 14....................................................................................................
Those Undecided 14.............................................................................................................
Bottom Line 14.......................................................................................................................
Appendices 15......................................................................................................
Appendix A: Hardware Costs 17.........................................................................................
Appendix B: Hall Hardware Requirements 18...................................................................
Thompson Hall 18..........................................................................................................................
Burgum Hall 19...............................................................................................................................
Appendix C: cBord Releases 20..........................................................................................
Appendix D: AD-400 Options 22........................................................................................
Appendix E: AD-400 Info Sheet 34.....................................................................................
Appendix F: Squadron Info Sheet 37..................................................................................
Appendix G: Panel Interface Module Info Sheet 39.........................................................
Appendix H: Altronix eFlow 6NX16 41..............................................................................
Appendix I: Maximal75E Power Supply 42........................................................................
Appendix J: cBord Quote 44...............................................................................................
Appendix K: Campus Policies 50.........................................................................................
Section 703: Bison Card Terms and Conditions 50....................................................................
Section 707: Access Control and Building Security 53..............................................................
Appendix L: Contact Information 55...................................................................................
The Proposal
There are many different institutions of higher education throughout the country and the
world. Every university takes a different approach to deliver a quality education to each student.
One department at NDSU that is integral to this delivery is Residence Life and it is tasked with
providing students a place to live, learn, and have fun while obtaining a quality education on
campus. There are many benefits ascribed to living on campus including a higher GPA, a shorter
commute, and an ability to congregate with like minded people.
The Residence Life department at NDSU has successfully welcomed and hosted students
on campus for many years and has done so innovatively and effectively during that time. There
are many ways to improve the delivery of services to the students that rely on Residence Life.
The purpose of this document is to inform the readers of the potential to improve the quality of
life to the students the department serves with the implementation of electronic access on every
door in its halls.
The implementation of electronic access on every door in the halls provides a decrease in
service calls to facilities management, saves time when responding to residents and staff needs,
provides centralized management of access credentials, and increased security throughout the
entire system.
Reduces calls to facilities management
Electronic access to each room in the buildings will eliminate the need for physical keys
to be distributed to each resident. Not only is tracking each individual key a time consuming
process, but issuing new keys is costly and takes time. NDSU’s current use of RFID technology
to access buildings and services allows the extension of this capability to accessing individual
rooms. Each time a resident or staff member loses their keys, it is necessary to issue a work order
to replace their keys, as well as their roommate’s and to rekey at least one lock. This accrues
costs not only in hardware but labor. With the RFID technology already used to provide access to
buildings, if a ID is lost or stolen, it is a simple manner of calling campus police or the Bison
card office to deactivate the access rights for that card, and visiting the bison card office to issue
a new ID for a cost of only $20 to the resident. Finally carrying only one ID for all the access
needs on campus reduces the likelihood of losing keys because there is only one item to keep
track of and it fits with the campus one card and the access policies (appendix K).
Saves time when responding to student and staff needs
The ability for electronic credentials to be dynamic allows for more fluid response to
needs that may arise. With NDSU’s current CS Access software, multiple functionalities can be
leveraged to allow for more tailored responses to individual needs. The software, in combination
with the electronic locks, allows for students to setup text messaging to allow them back into
their rooms when they have locked themselves out. The software also allows for staff members
to request master key access to rooms with the same text messaging system, removing the need
to spend time retrieving keys, and can instead help the residents on the spot. Also, professional
staff members do not need to share a set of keys for the duty schedule, the duty schedule could
1
be put in the computer to allow each staff member the necessary access rights when needed, or
each staff member could have those rights automatically without issuing dozens of new keys for
each of them.
Provides centralized management of access credentials
With the current system of physical keys implemented at NDSU, each hall must keep
track of, and issue keys to its residents. With the housing software and CS Access integration, it
would be possible to have a resident’s room assignment automatically assign them access rights
to their room just like the building is already automatically assigned to their ID. This prevents
keys from being given to other residents or exchanged. This would also help to alleviate
unauthorized room switches where they currently can just exchange keys with another resident
and tailgate into their “new” building if they switched halls.
Increase security throughout the entire system
Electronic locks provide increased security for two reasons. The first is that there are
detailed audit logs describing who accessed what room and when. There is no wondering if the
master key has been used for access that it shouldn’t have been or who used it. Also, physical
keys and locks not only have no reliable auditing system, each lost key puts another limited
access keyway out there for someone to reengineer the system. This eats away at the security
provided by BEST™ keyways and their inability to be duplicated except by an authorized user or
dealer. Finally, each key that can access a lock reduces the security of that lock. In a seven pin
lock, if there are five keys that can access it, and they all have two different pins, that creates five
authorized keys that can open the lock but another 20 keys that can access the lock
unintentionally. This problem can be seen in the high rises where the foyer doors could have
three different keys (one for each room in the suite) as well as a building master, and a campus
master. These numbers do not take into account any Maximum Adjacent Cut Specification or1
bump keys . These numbers may seem relatively small when it is taken into account that a seven2
pin system with five possible pin depths has a possibility of 78,125 keys (again not taking into
account any Maximum Adjacent Cut Specification or bump keys) but this does provide a
measure of pause and thought that must be put into the consideration of the integrity of the
access control to each area. These concerns can be alleviated by the use of electronic access to
the rooms for all but facilities management (via the campus grand master key) and residence life
professional staff (via a residence life master key).
The Maximum Adjacent Cut Specification (or MACS) of a lock is the maximum variance of1
component sizes between two adjacent components. On the key, it refers to how many pin
depths must be between each cut. You cannot have two pins of no difference or just one depth
difference in a row in certain systems. Failure to abide by the MACS can make keys difficult to
insert or remove from a lock, potentially even causing back cutting. Back cutting describes a
situation in which the slopes between the cuts on a key are too steep, causing the key to
become stuck in the lock.
A key capable of “bumping a lock” so that it can be opened without an authorized key.2
2
Added means of access
Students today always have one thing with them, their phone. Many devices are
used by students but it seems that none is more used than the smart phone. With this computer in
their pockets, students have access to a whole myriad of information, services, and entertainment
at the click of a button. Implementing an online access system for the Residence Hall rooms
could also add desired functionality for the students. cBord leverages the proliferation of cellular
technology to offer two other vectors of access to rooms. The first is the use of their mobile app
to store a student’s identity and access information. In the event that a student is locked out of
their room but has their phone in hand, they can use this app to send a request to the door, then
only requiring that they enter their PIN. The second is an SMS (text messaging) service by which
a student’s phone number is registered with the system, when they are locked out, they can text
the system and achieve the same results as the app, allowing those with older or less capable
phones the same conveniences as those with the app. Also, the SMS system is how RAs can
request short term elevated privileges for either a specific door or set of doors to assist residents.
Other considerations
Other things to consider is the future and how this technology will fit in with advances in
the industry. The campus cBord representative talked of the future of the technology and the
newest thing being Bluetooth. He said “for universities this technology is still years away and not
ready for deployment.”
The AD-400 lockset provides many options that make it a great product for both now and
the future. The current series of readers are available in multi-technology formats, allowing for
the use of both 125KHz proximity cards and 13.56 MHz smart cards. The lock sets are also
available with NFC readers for use with modern smart phones. Finally, the keypads on these
devices are field replaceable, allowing for the upgrade of the locks to use newer technology
without needing to replace the whole device. All these aspects allow NDSU to consider
implementation of these devices without placing too much concern into when they will become
obsolete.
All that being said, upgrading to an electronic access system using two stage verification3
and NDSU's CS Gold software, NDSU can provide a more secure and efficient environment to
promote student learning. The addition of AD-400 lock sets with a multi-technology keypad will
allow for the Bison Card to be utilized in conjunction with a private four digit PIN unique to
each resident.

Two stage verification refers to an access setup that utilizes both the student or staff3
member’s ID and a personal PIN of chosen length.
3
Case Studies
Several campuses have already made the switch to electronic access control to manage
the access to their rooms and have used various implementations. These campuses were kind
enough to share information about their systems as well as their reasons for making the switch.
Also included for some, is how the switch was justified financially and how the new
implementation increased security functions at those campuses. The correspondence that led to
these descriptions is available upon request. Four different campuses are highlighted below and
press releases supplied by cBord are available in appendix C.

4
University of Hawai’i at Mānoa
The University of Hawai’i at Mānoa changed their locks out of a need to replace
an antiquated system. UH employs two different access systems in their halls. The
system that grants access to the buildings is centralized and works off of the students’ ID cards.
This system is run via Lenel®, a system similar to cBord, and is connected to their blackboard
and dining center accounts. The system to access the rooms themselves as well as the stairwells
and elevators is like that found in hotels, a simple swipe to enter, however this system is separate
from Lenel® and is not centrally managed. For the Hawai’i residence halls, you therefore had to
carry two cards, something that could be considered detrimental, but their campus software was
unable to handle it at the time of implementation. This separate system did allow though, for
RAs to issue new keys on the spot as the system was separate and the keys were easily coded.
UH added electronic access control to each of their buildings in phases, spreading the cost over
time as different maintenance projects were done in the buildings. Only their newest hall, Frear,
had the locks installed from the start. UH believes that the addition of electronic access control is
an incredible benefit, but they do note some cons. First and foremost, training personnel to use
the locks takes time and there may be a significant amount of problems right at the beginning,
and secondly, a preventative maintenance cycle is required to replace batteries and keep the
readers working optimally.
5
University of Alaska Anchorage
The University of Alaska Anchorage updated an old electronic access system when
installing their current system. The old system was an offline system and had to be manually
updated at the door. UAA also needed to switch companies because their original provider would
not work with them to keep their system up and running. After the switch, the University had a
true one card system as the campus ID that is used for all campus services and the Anchorage bus
system, is also used to access the rooms. Because of this one card nature, and the IDs having the
owner’s picture, UAA implemented a 2 stage verification system. Not only do residents need to
swipe their IDs to get into the room, they also need to enter their unique four-digit PIN code.
This was to prevent others from gaining entry to a room if they found an ID and knew where the
owner lived.
The University of Alaska employed a Wi-Fi lock solution with Assa Abloy as the
hardware provider. This requires a separate IP address for each lock, which may require the
addition of extra routers and network subnets and could also figure into the performance of
NDSU’s already overtaxed Wi-Fi network. This may also slow down an already over taxed Wi-Fi
network in the residence halls. This aside, the Wi-Fi lock solution gave UAA some much desired
functionality. These new functions included online audit trails that are accessible from the central
office as well as remote resets and reloading of new credentials.
The cons that the Associate Director for Facilities, and Operations Manager from UAA
mentioned was one, these locks have a short battery life (about 6 to 8 months) and therefore they
had the locks connect to Wi-Fi only twice a day unless a connection was needed sooner to update
credentials, in which case the staff would assist the student in forcing it through. Secondly, some
of the keypads for the locks failed in warranty (under 2 years) but this was less than one percent
of their entire installation.
6
Northeastern University
Northeastern University in Boston recently made the switch to all online electronic access
locks. Their motivations for switching included consolidating several systems and increased
security. After evaluating their needs, they contacted cBord and with their help, implemented a
system comprised of the Schlage® AD-400 series locksets and the supporting hardware. NEU
sites “want[ing] to switch to a reliable online locks solution” as the reason for these selections
and they informed me that they believe this system fits their needs well. Some of the other
reasons for switching included the long hours invested by staff on the old systems and the
security concerns of lost keys and unreliable or lack of auditing. These reasons made the cost of
the transition easy to justify to the upper management. With their support they were able to move
forward financially and secure the necessary funding for the project. After the upgrade Warren
Lord, Director, Student Affairs Technology and Husky Card Services, said that NEU gained
added security from the various online lock functions, such as an audit trail, easier and remote
troubleshooting, as well as multiple ways to issue credentials to a room [whether it be electronic,
in the case of an ID card or phone, or a physical key]. In the NEU implementation, only facilities
management has access to a physical key to access the rooms. All others must have valid
electronic credentials to enter the rooms.
7
University of Missouri
The University of Missouri has been using electronic access on their rooms for years. In
2004, with the building of a few new residence halls, Mizzou installed their first set of electronic
locks. As an early adopter there were many bugs associated with the system that they run into
much less frequently now. Their first few years saw only the installation of singe technology
locks in the form of magnetic stripe card readers. Later installations saw the use of locks capable
of not only the magnetic stripe but the contactless and NFC technology readers too. This allows4
for the implementation of newer technology as it becomes available to the school.
As Mizzou looks to upgrade cards, they must now go and retrofit the older locks with
new readers, a task that will cost about $3.7 million. This highlights the importance of looking to
the future no matter what technology is chosen.
The current lock employed by the University of Missouri is the Sargent Passport 1000
P2. As card based access trends towards becoming an industry standard, much like the BEST
lock cores, this lock, like the AD-400 proposed, can adapt to the needs of ever improving
technology. The Passport 1000 is the Assa Abloy Wi-Fi lock that serves the same consumer
category as the AD-400 by Schlage (and Allegion company). Also, the doors on the residents’
rooms are not centrally monitored or recorded on video.5
In regards to access privileges, Mizzou utilizes master cards stored in the building offices,
however the do employ the OpenMyDoor software function of the locks for residents to assist
themselves with lock-outs.
Director of Residence Life Frankie Minor stated that the use of card keys is more convent
for students and fits in with the campus one card policies. Despite the higher initial cost of
implementation Director Minor believes that the online lock system has helped his staff to
provide a better campus life experience to the students they serve.
NFC stands for Near Field Communication. NFC is a transmission protocol built into modern4
smartphones and cards to provide data transfer between devices. These technologies could be
employed to provide secure credential storage on an employee or student’s phone.
Refers to the monitoring of the door state as opened or closed and usually used to trigger5
alarms.
8
Hardware
cBord has provided the following information to aid in the consideration of this proposal.
The following numbers were provided out of courtesy and do not represent a valid quote from
cBord or any of its affiliates.
Lockset
The lockset being proposed by this document is the AD-400 by Schalge. This lockset is
capable of being configured in a number of different ways. The suggestion is that you order the
lock configured as follows:
AD400-CY-60-MTK-SPA-626-BD-S123-RH-4B-13-049-10-013-1-3/4”.
CY – Cylindrical lock (MS – Mortise will be needed in some buildings)
60 – Apartment function (70 – classroom function will be needed on some locks)
MTK – Multi Technology + Keypad
SPA – Sparta style door handle
626 – Satin Chrome finish
BD – Less cylinder, cylinder style is SFIC (compatible with current BEST™ cylinders)
S123 – Keyway type (not applicable since providing cylinder on campus)
RH – Right Handed door lock (field switchable if needed)
4B – 4 battery option
13-049 – 2-3/4” backset, deadlatch, square corner, 1-1/8” by 2-1/4”
10-013 – 1-1/8” lip, square corner, t-strike, box 1-1/8” by 2-3/4”
For more detailed descriptions of the options please see appendix D.
There is a numerous amount of hardware required to support the operation of the AD-400
series. This lock is wireless but operates on its own spectrum (900 MHz) so it doesn’t require or
interfere with Wi-Fi. To interface with the central management server, these locks require a Panel
Interface Module (PIM) and a cBord squadron to interface with the
network. To support this hardware items like enclosures, power
supplies and battery backups are required. After all of this is taken
into account, each lock averages about $1318.97 with the quoted
hardware. Please see the table in appendix A for a full breakdown of
the different hardware and cost. These numbers came from a quote
provided by Robert Cudney, the cBord sales representative for the
NDSU campus. This quote can be found as appendix J, but please
note that it includes no volume pricing or options that support a
higher number of devices at a lower average cost when spread across
the number of doors. Also these prices take into account only
hardware and do not include fees for training, installation, or delivery.
9
SCHLAGE AD-400 LOCK SET
Supporting Hardware
Squadron
The Squadron V1000 EVO Access Control Panel 32 Doors is the interface between the
network/access control server and the locks. Each squadron can support 32 doors making only
one IP address needed for each set of 32 doors. The interface between the squadrons and the
wireless locks is the PIM and each squadron can support 2. The Squadron Information sheet is
available as appendix F.
PIM
The AD-400 Series Panel Interface Module is the link between the Squadron module and
the actual wireless locks. The PIM is a wireless interface to the locks and is hardwired to the
Squadron. The PIM operates on the 900MHz wireless frequency and does not interfere with
other existing IT wireless infrastructure. The PIM information sheet can be found as appendix G.
Power Supply and Batteries
There are a number of options for powering both the Squadrons and the PIMs. For
smaller installations these devices are powered by the Altronix eFlow power supply. It is capable
of powering 1 Squadron and 2 PIMs and is housed in a separate enclosure included in the
pricing. The power supply is also connected to two backup batteries capable of keeping the
system up for 6-8 hours in the event of a power failure. The info sheets for the power supply is
available as appendix H.
As installations get larger, there is a modular power supply available to offer a significant
amount more energy to spread across the devices. The power supply used in these installations is
the Altronix Maximal75E Expandable power system. The data sheet for this power supply can be
found as appendix I.
Other Supporting Hardware
There are several other pieces of equipment required for a successful installation. These
include an enclosure to house the backend equipment as well as to prevent unauthorized access
and tampering. The equipment to mount and access these enclosures are listed at the end of the
table in appendix A. 

10
NDSU Hall Breakdowns
At NDSU there are several different residence halls all with unique access considerations.
There are a number of different doors all with different access requirements. The following
sections detail different halls, the amount of doors in each, and what type of access requirements
each set of doors have. For a description of the access styles please see the third page of
appendix D.
Thompson Hall
Thompson hall has a total of 9 floors and a basement. Each floor has a different
amount of locks and what they require.
There are 8 residential floors in Thompson with an identical layout. These residential
floors all sport 8 suites of rooms, a laundry room, a study room, a custodial closet and an
electrical room. In the suites of rooms there are up to 3 individual rooms and a bathroom. The
lock on the bathrooms is a courtesy lock and therefore would not be necessary to include in the
upgrade to electronic locks. Of the remaining doors on the floors, there are 8 foyer doors, 18
individual room doors, 1 custodial closet door, 1 study room door, 1 mechanical room door, and
one laundry room door. The access types of these rooms are as follows, the foyer doors are most
closely resembled by the office style of access. The mechanical room door, the custodial room
door and the laundry room door are most closely resembled by the classroom style of access.
And finally the individual rooms and the study room have access credentials most closely
resembling the apartment style of access.
On the first floor there is the hall director office, RA office, custodial office, two lounges,
two custodial closets, two bathrooms, and two hall director apartment doors. The hall director,
RA, and custodial offices all have locks using the office access style. The lounges, custodial
closets, and bathrooms all have classroom style access. Finally, the hall director apartment doors
have the apartment style access.
The last level is the basement which has 8 doors in total. One door for the kitchen, one
for the electrical room, one for a closet, one for student storage, one for the generator room, one
for the elevator room, and two for the mechanical room. All eight of these doors have the
classroom style of access. There is also one miscellaneous door in the roof access. This door has
both a standard lockset and a deadbolt on it. There is no deadbolt function with the AD-400 but
the lockset could be replaced with a classroom style access.
In total there are 261 doors in Thompson hall. That comes to a total of 260 AD-400s, 9
Squadrons, 17 PIMs, 3 power supplies, 6 batteries, and 3 sets of supporting hardware (sans one 2
panel insert). This comes to a total hardware cost, for Thompson hall, of $345,581. Tables
breaking down all the hardware, doors, and access styles for Thompson can be found in the
tables included as part of appendix B.
11
Something of note with the locks in the high rise residence halls, as these doors use
cylindrical style locks, the cost of the lock is different. These locks tend to cost about $50 dollars
less. Factoring this into the equation, the total cost of equipment in Thompson Hall would be
$333,131. Note though, that all the tables have been constructed with the $1220 per lock cost
despite this difference.
Burgum Hall
Burgum Hall is a low rise hall that has three floors. The top two floors are identical while
the bottom floor has a few less residence rooms and some offices. There is also a basement with
different rooms as well.
On the top two floors there are 30 residents’ rooms. There is also a supply room, trash
room, custodial closet, elevator room and one unknown room. On the top floor there is also a
door to the roof.
On the main floor there is 25 residents’ rooms, a hall director apartment with one door, a
supply room, trash room, custodial closet, elevator room, hall office, storage closet, hall director
office, a gender neutral bathroom, and a door to the basement, and an unknown room.
In the basement there is a custodial office and 7 unknown locked doors. All these doors
make for a total of 115 doors. Putting the room doors and the HD apartment door as the
apartment access style, the three offices and gender neutral bathroom as the office access style
(bathroom normally safe ) and the rest as classroom access. Using these totals all 115 lock sets6
could be supported by four Squadrons, eight PIMS, a single power supply with two backup
batteries, and a single set of supporting hardware making the total cost for hardware $152,160.
Tables breaking down all the hardware, doors, and access styles for Burgum can be found
included as part of appendix B.
*(Please note, due to limited access to halls other than Thompson, the breakdowns for other halls may not be 100% accurate but are as close as possible.)*
In the terms of locks, safe and fail safe refer to being in the unlocked state; when there is a6
system failure, the lock will automatically fail to a safe state. This is in contrast to secure and fail
secure. The operation of choice is selectable on an individual lock basis.
12
The Survey
After the preparation of this proposal, a survey was distributed to all the students living in
the NDSU residence halls as well as the Residence Life run apartments. The survey consisted of
a multiple choice questions asking if students were in favor of the proposed upgrade, against it,
or undecided. After answering, the respondents were able to provide additional feedback as to
why they made the choice that they did. The survey was open for five days and garnered 910
responses.
Results
After the survey was closed, the results showed the following of the 910 respondents:
• 893 are students
• of those 893, 57 were student staff members
• 528 students are in favor of the upgrade
• 88 students are against
• 177 students are undecided
• The remaining 17 respondents are professional staff
• 6 professional staff members are in favor
• 4 professional staff members are against
• 7 professional staff members are undecided
13
Students Student Staff Professional Staff
Those in Agreement
The students in favor of the upgrade cite very simple reasons: Efficiency, Simplicity, and
Integration. Students at NDSU are accustomed to using their ID to access many different services
from the dining centers to the wellness center. Checking out books at the library to accessing
their residence hall. Students are looking forward to the possibility of integrating the current
system with a sophisticated form of room entry, allowing the students to truly use one card for
everything on campus. Students also like the idea of not needing one set of credentials to get into
the building and yet another set to enter their rooms. Many students are intrigued and excited
about the potential of this upgrade.
Those in Disagreement
Of the students who responded to the open ended questions in disagreement, certain
concerns were raised. The chief concern, brought up by many of the respondents is cost. Many
students are wondering where the capitol for this project would come from and how it will affect
their housing costs at NDSU. Nearly as concerning to this category of students is technology
issues and how fast a response to a failed lock will be. Other universities have managed a
balance of customer service and cost effectiveness but how NDSU can strike this balance will
only be known once a serious discussion about this upgrade is taking place. Other concerns are
in the matter of security, privacy, and convenience.
Those Undecided
Many of the undecided students are hesitant because of the lack of information
surrounding the potential upgrade. These students want to know more about how the system will
benefit them versus the potential risks and the exorbitant cost. These students are diligently
asking questions in desire of more information.
Bottom Line
Many students are in favor of the idea that their lives could be made simpler while NDSU
could rest assured that the halls are even more secure. Overall 70% of students are in favor of
such an upgrade with only 10% against it. Students staff are 74% in favor with 7% dissenting
and professional staff is 35% in favor and 24% against. These numbers lead to a promising
embrace of the potential technology by the campus population. The full survey and its results are
available upon request.

14
Appendices
Appendix A: Hardware Costs 17
Appendix B: Hall Hardware Requirements 18
Thompson Hall 18
Burgum Hall 19
Appendix C: cBord Releases 20
Appendix D: AD-400 Options 22
Appendix E: AD-400 Info Sheet 34
Appendix F: Squadron Info Sheet 37
Appendix G: Panel Interface Module Info Sheet 39
Appendix H: Altronix eFlow 6NX16 41
Appendix I: Maximal75E Power Supply 42
Appendix J: cBord Quote 44
Appendix K: Campus Policies 50
Section 703: Bison Card Terms and Conditions 50
Section 707: Access Control and Building Security 53
Appendix L: Contact Information 55
15
16
Appendix A: Hardware Costs
There are several pieces of equipment that could be used in larger installations to make
them more cost effective.
• The power supply used in this table is the Altronix eFlox 16NX6 but the Altronix
Maximal75E Expandable Power System is available as well at a cost of $931.00
per device and is capable of powering 5 Squadrons and 10 PIMs .7
• There are several different enclosures available for the squadrons.
- The four board enclosure is used in the tables presented in this document.
- An 8 board enclosure is also available. it is priced at $513.00, The four
board insert for this enclosure costs $75.00 and the mounting kit for this
enclosure is $254.00.
- There is also a 12 board enclosure priced at $535.00. The 6 panel insert
costs $70.00 and the mounting kit is $234.00.
The table is designed to make use of the equipment to its fullest extent so that the cost per
door is as low as possible. These numbers are also only for the hardware and do not take into
account service, installation, delivery, travel, or other charges that may be incurred in purchasing
and implementing the system.

These numbers are based on the max current input for the squadron boards and the PIMs.7
These numbers are found on the PIM data sheet (appendix G page 39) and the VertX V1000
data sheet found at http://www.hidglobal.com/sites/hidglobal.com/files/resource_files/vertx-evo-
v1000-controller-ds-en.pdf
17
Cost per device Qty. Extended Cost
AD-400 $1220.00 128 $156160.00
Squadron $919.00 4 $3676.00
PIM $755.00 8 $6040.00
Power Supply $400.00 4 $1600.00
Battery $51.00 8 $408.00
Squadron Enclosure $362.00 1 $362.00
Squadron Enclosure Panel $71.00 1 $71.00
Squadron Enclosure Mounting Kit $87.00 1 $87.00
Tamper Switch $9.00 1 $9.00
Cam Lock $7.00 1 $7.00
Total $168420.00
Cost per Lock $1315.78
Appendix B: Hall Hardware Requirements
Thompson Hall

18
EQUIPMENT COST BREAKDOWN
Part Cost Qty. Extended Cost
AD-400 $1220.00 261 $318420.00
Squadron $919.00 9 $8271.00
PIM $755.00 17 $12835.00
Power Supply $400.00 9 $3600.00
Battery $51.00 18 $918.00
Squadron Enclosure $362.00 3 $1086.00
Squadron Enclosure Panel $71.00 2 $142.00
Squadron Enclosure Mounting Kit $87.00 3 $261.00
Tamper Switch $9.00 3 $27.00
Cam Lock $7.00 3 $21.00
Total $345581.00
# Needed Access Style
Foyer Doors 64 Office
Room Doors 144 Apartment
Study Room 8 Apartment
Custodial Closets 10 Classroom
Mechanical Rooms 12 Classroom
Laundry Rooms 8 Classroom
Lounges 2 Classroom
Offices 4 Office
Apartment 2 Apartment
Restrooms 2 Classroom
Elevator Room 1 Classroom
Kitchen 1 Classroom
Storage Closets 2 Classroom
Roof 1 Classroom
DOOR AND ACCESS STYLE BREAKDOWN
Apartment 154
Classroom 39
Office 68
TOTAL ACCESS STYLE BREAKDOWN
Burgum Hall

19
EQUIPMENT COST BREAKDOWN
Part Cost Qty. Extended Cost
AD-400 $1220.00 115 $140300.00
Squadron $919.00 4 $3676.00
PIM $755.00 8 $6040.00
Power Supply $400.00 4 $1600.00
Battery $51.00 8 $408.00
Squadron Enclosure $362.00 1 $362.00
Squadron Enclosure Panel $71.00 1 $71.00
Squadron Enclosure Mounting Kit $87.00 1 $87.00
Tamper Switch $9.00 1 $9.00
Cam Lock $7.00 1 $7.00
Total $152560.00
# Needed Access Style
Reident’s Rooms 85 Apartment
Supply Rooms 3 Classroom
Trash Rooms 3 Classroom
Custodial Closets 3 Classroom
Offices 3 Office
Apartment 1 Apartment
Restrooms 1 Office
Elevator Rooms 3 Classroom
Storage Closets 11 Classroom
Roof and Basement 2 Classroom
DOOR AND ACCESS STYLE BREAKDOWN
Apartment 86
Classroom 25
Office 4
TOTAL ACCESS STYLE BREAKDOWN
Appendix C: cBord Releases

20


21
Appendix D: AD-400 Options
22


23
24


25
26


27


28


29


30


31


32


33
Appendix E: AD-400 Info Sheet

34


35


36
Appendix F: Squadron Info Sheet

37
38
Appendix G: Panel Interface Module Info Sheet
39
40
Appendix H: Altronix eFlow 6NX16

41
Appendix I: Maximal75E Power Supply
42
43
Appendix J: cBord Quote

44
The above quote was provided out of courtesy and does not represent a valid quote from cBord or any of its affiliates.


45
The above quote was provided out of courtesy and does not represent a valid quote from cBord or any of its affiliates.


46
The above quote was provided out of courtesy and does not represent a valid quote from cBord or any of its affiliates.


47
The above quote was provided out of courtesy and does not represent a valid quote from cBord or any of its affiliates.


48
The above quote was provided out of courtesy and does not represent a valid quote from cBord or any of its affiliates.


49
The above quote was provided out of courtesy and does not represent a valid quote from cBord or any of its affiliates.
Appendix K: Campus Policies
Section 703: Bison Card Terms and Conditions
50


51


52
Section 707: Access Control and Building Security

53


54
Appendix L: Contact Information

55


56
57
58

More Related Content

What's hot

IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET Journal
 
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...IJNSA Journal
 
ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011prasanna9
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Graphical Password Authentication using Cued click point technique with zero ...
Graphical Password Authentication using Cued click point technique with zero ...Graphical Password Authentication using Cued click point technique with zero ...
Graphical Password Authentication using Cued click point technique with zero ...NurrulHafizza
 
Listening data collection concerns and ethics, rappaport, arf
Listening data collection concerns and ethics, rappaport, arfListening data collection concerns and ethics, rappaport, arf
Listening data collection concerns and ethics, rappaport, arfStephen Rappaport
 
Listening data collection concerns and ethics, rappaport, qi
Listening data collection concerns and ethics, rappaport, qiListening data collection concerns and ethics, rappaport, qi
Listening data collection concerns and ethics, rappaport, qiquestioninginstitute
 
Two Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordTwo Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordIOSR Journals
 
The Role of Digital Certificates in Contemporary Government Systems: the Case...
The Role of Digital Certificates in Contemporary Government Systems: the Case...The Role of Digital Certificates in Contemporary Government Systems: the Case...
The Role of Digital Certificates in Contemporary Government Systems: the Case...Arab Federation for Digital Economy
 
Privacy Preserving Biometrics-Based and User Centric Authentication Protocol
Privacy Preserving Biometrics-Based and User Centric Authentication ProtocolPrivacy Preserving Biometrics-Based and User Centric Authentication Protocol
Privacy Preserving Biometrics-Based and User Centric Authentication ProtocolHasiniG
 
3d password by suresh
3d password by suresh3d password by suresh
3d password by sureshsuresh5c2
 
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...IRJET Journal
 
Adapting singlet login in distributed systems
Adapting singlet login in distributed systemsAdapting singlet login in distributed systems
Adapting singlet login in distributed systemseSAT Publishing House
 
Adapting singlet login in distributed systems
Adapting singlet login in distributed systemsAdapting singlet login in distributed systems
Adapting singlet login in distributed systemseSAT Journals
 

What's hot (20)

IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
 
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...
 
Graphical authintication
Graphical authinticationGraphical authintication
Graphical authintication
 
ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
3 d
3 d3 d
3 d
 
Graphical Password Authentication using Cued click point technique with zero ...
Graphical Password Authentication using Cued click point technique with zero ...Graphical Password Authentication using Cued click point technique with zero ...
Graphical Password Authentication using Cued click point technique with zero ...
 
3d passwords
3d passwords 3d passwords
3d passwords
 
Social media ethics and concerns
Social media ethics and concernsSocial media ethics and concerns
Social media ethics and concerns
 
Listening data collection concerns and ethics, rappaport, arf
Listening data collection concerns and ethics, rappaport, arfListening data collection concerns and ethics, rappaport, arf
Listening data collection concerns and ethics, rappaport, arf
 
Listening data collection concerns and ethics, rappaport, qi
Listening data collection concerns and ethics, rappaport, qiListening data collection concerns and ethics, rappaport, qi
Listening data collection concerns and ethics, rappaport, qi
 
Two Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordTwo Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time Password
 
The Role of Digital Certificates in Contemporary Government Systems: the Case...
The Role of Digital Certificates in Contemporary Government Systems: the Case...The Role of Digital Certificates in Contemporary Government Systems: the Case...
The Role of Digital Certificates in Contemporary Government Systems: the Case...
 
3D PASSWORD SEMINAR
3D PASSWORD SEMINAR3D PASSWORD SEMINAR
3D PASSWORD SEMINAR
 
Privacy Preserving Biometrics-Based and User Centric Authentication Protocol
Privacy Preserving Biometrics-Based and User Centric Authentication ProtocolPrivacy Preserving Biometrics-Based and User Centric Authentication Protocol
Privacy Preserving Biometrics-Based and User Centric Authentication Protocol
 
3d password by suresh
3d password by suresh3d password by suresh
3d password by suresh
 
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
 
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...
 
Adapting singlet login in distributed systems
Adapting singlet login in distributed systemsAdapting singlet login in distributed systems
Adapting singlet login in distributed systems
 
Adapting singlet login in distributed systems
Adapting singlet login in distributed systemsAdapting singlet login in distributed systems
Adapting singlet login in distributed systems
 

Similar to EAC Proposal V2 032016 2125

Continuous and Transparent User Identity Verification for Secure Internet Ser...
Continuous and Transparent User Identity Verification for Secure Internet Ser...Continuous and Transparent User Identity Verification for Secure Internet Ser...
Continuous and Transparent User Identity Verification for Secure Internet Ser...1crore projects
 
IRJET- Digital Certification using Blockchain
IRJET- Digital Certification using BlockchainIRJET- Digital Certification using Blockchain
IRJET- Digital Certification using BlockchainIRJET Journal
 
IRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate SystemIRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate SystemIRJET Journal
 
Secure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication FrameworkSecure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication FrameworkIJCNCJournal
 
Secure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication FrameworkSecure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication FrameworkIJCNCJournal
 
Secure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication FrameworkSecure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication FrameworkIJCNCJournal
 
Mediated certificateless cryptosystem for the security of data in public cloud
Mediated certificateless cryptosystem for the security of data in public cloudMediated certificateless cryptosystem for the security of data in public cloud
Mediated certificateless cryptosystem for the security of data in public cloudeSAT Journals
 
DEVOPS SEMINAR INDEX (1) (10).docx
DEVOPS SEMINAR INDEX (1) (10).docxDEVOPS SEMINAR INDEX (1) (10).docx
DEVOPS SEMINAR INDEX (1) (10).docxmansooraliattar
 
Information security proposal for electronic door lock
Information security  proposal for electronic door lockInformation security  proposal for electronic door lock
Information security proposal for electronic door lockfiyameta habt
 
capstone project report.pdf
capstone project report.pdfcapstone project report.pdf
capstone project report.pdfOmBankar2
 
An interactive Study on secure data sharing in the IOT through Blockchain
An interactive Study on secure data sharing in the IOT through BlockchainAn interactive Study on secure data sharing in the IOT through Blockchain
An interactive Study on secure data sharing in the IOT through BlockchainIRJET Journal
 
Fake Certificate Detection by using Blockchain
Fake Certificate Detection by using BlockchainFake Certificate Detection by using Blockchain
Fake Certificate Detection by using BlockchainIRJET Journal
 
IRJET-Online Ticket Substantiation using QR Code based Android Application Sy...
IRJET-Online Ticket Substantiation using QR Code based Android Application Sy...IRJET-Online Ticket Substantiation using QR Code based Android Application Sy...
IRJET-Online Ticket Substantiation using QR Code based Android Application Sy...IRJET Journal
 
Online applications using strong authentication with OTP grid cards
Online applications using strong authentication with OTP grid cardsOnline applications using strong authentication with OTP grid cards
Online applications using strong authentication with OTP grid cardsBayalagmaa Davaanyam
 
Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior Editor IJCATR
 
An Efficient User VErification System via Mouse Movements
An Efficient User VErification System via Mouse MovementsAn Efficient User VErification System via Mouse Movements
An Efficient User VErification System via Mouse MovementsOuzza Brahim
 
An efficient approach for secured communication in wireless sensor networks
 An efficient approach for secured communication in wireless sensor networks  An efficient approach for secured communication in wireless sensor networks
An efficient approach for secured communication in wireless sensor networks IJECEIAES
 
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...Migrant Systems
 

Similar to EAC Proposal V2 032016 2125 (20)

Continuous and Transparent User Identity Verification for Secure Internet Ser...
Continuous and Transparent User Identity Verification for Secure Internet Ser...Continuous and Transparent User Identity Verification for Secure Internet Ser...
Continuous and Transparent User Identity Verification for Secure Internet Ser...
 
IRJET- Digital Certification using Blockchain
IRJET- Digital Certification using BlockchainIRJET- Digital Certification using Blockchain
IRJET- Digital Certification using Blockchain
 
IRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate SystemIRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate System
 
Secure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication FrameworkSecure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication Framework
 
Secure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication FrameworkSecure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication Framework
 
Secure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication FrameworkSecure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication Framework
 
Mediated certificateless cryptosystem for the security of data in public cloud
Mediated certificateless cryptosystem for the security of data in public cloudMediated certificateless cryptosystem for the security of data in public cloud
Mediated certificateless cryptosystem for the security of data in public cloud
 
DEVOPS SEMINAR INDEX (1) (10).docx
DEVOPS SEMINAR INDEX (1) (10).docxDEVOPS SEMINAR INDEX (1) (10).docx
DEVOPS SEMINAR INDEX (1) (10).docx
 
Information security proposal for electronic door lock
Information security  proposal for electronic door lockInformation security  proposal for electronic door lock
Information security proposal for electronic door lock
 
capstone project report.pdf
capstone project report.pdfcapstone project report.pdf
capstone project report.pdf
 
An interactive Study on secure data sharing in the IOT through Blockchain
An interactive Study on secure data sharing in the IOT through BlockchainAn interactive Study on secure data sharing in the IOT through Blockchain
An interactive Study on secure data sharing in the IOT through Blockchain
 
E0962833
E0962833E0962833
E0962833
 
Fake Certificate Detection by using Blockchain
Fake Certificate Detection by using BlockchainFake Certificate Detection by using Blockchain
Fake Certificate Detection by using Blockchain
 
IRJET-Online Ticket Substantiation using QR Code based Android Application Sy...
IRJET-Online Ticket Substantiation using QR Code based Android Application Sy...IRJET-Online Ticket Substantiation using QR Code based Android Application Sy...
IRJET-Online Ticket Substantiation using QR Code based Android Application Sy...
 
Online applications using strong authentication with OTP grid cards
Online applications using strong authentication with OTP grid cardsOnline applications using strong authentication with OTP grid cards
Online applications using strong authentication with OTP grid cards
 
Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior
 
An Efficient User VErification System via Mouse Movements
An Efficient User VErification System via Mouse MovementsAn Efficient User VErification System via Mouse Movements
An Efficient User VErification System via Mouse Movements
 
Smart surveillance using deep learning
Smart surveillance using deep learningSmart surveillance using deep learning
Smart surveillance using deep learning
 
An efficient approach for secured communication in wireless sensor networks
 An efficient approach for secured communication in wireless sensor networks  An efficient approach for secured communication in wireless sensor networks
An efficient approach for secured communication in wireless sensor networks
 
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
 

EAC Proposal V2 032016 2125

  • 1. Prepared for NDSU Department of Residence Life By Martin McNichols Electronic Access Control in the NDSU Residence Halls A proposal for the use of Electronic Access Enabled locks on the Residence Hall rooms at NDSU
  • 2.
  • 3. Table of Contents The Proposal 1....................................................................................................... Case Studies 4....................................................................................................... University of Hawai’i at Mānoa 5......................................................................................... University of Alaska Anchorage 6........................................................................................ Northeastern University 7..................................................................................................... University of Missouri 8......................................................................................................... Hardware 9............................................................................................................ Lockset 9................................................................................................................................. Supporting Hardware 10...................................................................................................... Squadron 10................................................................................................................................... PIM 10.............................................................................................................................................. Power Supply and Batteries 10..................................................................................................... Other Supporting Hardware 10.................................................................................................... NDSU Hall Breakdowns 11................................................................................. Thompson Hall 11.................................................................................................................. Burgum Hall 12....................................................................................................................... The Survey 13........................................................................................................ Results 13................................................................................................................................ Those in Agreement 14......................................................................................................... Those in Disagreement 14.................................................................................................... Those Undecided 14............................................................................................................. Bottom Line 14....................................................................................................................... Appendices 15...................................................................................................... Appendix A: Hardware Costs 17......................................................................................... Appendix B: Hall Hardware Requirements 18................................................................... Thompson Hall 18.......................................................................................................................... Burgum Hall 19............................................................................................................................... Appendix C: cBord Releases 20..........................................................................................
  • 4. Appendix D: AD-400 Options 22........................................................................................ Appendix E: AD-400 Info Sheet 34..................................................................................... Appendix F: Squadron Info Sheet 37.................................................................................. Appendix G: Panel Interface Module Info Sheet 39......................................................... Appendix H: Altronix eFlow 6NX16 41.............................................................................. Appendix I: Maximal75E Power Supply 42........................................................................ Appendix J: cBord Quote 44............................................................................................... Appendix K: Campus Policies 50......................................................................................... Section 703: Bison Card Terms and Conditions 50.................................................................... Section 707: Access Control and Building Security 53.............................................................. Appendix L: Contact Information 55...................................................................................
  • 5. The Proposal There are many different institutions of higher education throughout the country and the world. Every university takes a different approach to deliver a quality education to each student. One department at NDSU that is integral to this delivery is Residence Life and it is tasked with providing students a place to live, learn, and have fun while obtaining a quality education on campus. There are many benefits ascribed to living on campus including a higher GPA, a shorter commute, and an ability to congregate with like minded people. The Residence Life department at NDSU has successfully welcomed and hosted students on campus for many years and has done so innovatively and effectively during that time. There are many ways to improve the delivery of services to the students that rely on Residence Life. The purpose of this document is to inform the readers of the potential to improve the quality of life to the students the department serves with the implementation of electronic access on every door in its halls. The implementation of electronic access on every door in the halls provides a decrease in service calls to facilities management, saves time when responding to residents and staff needs, provides centralized management of access credentials, and increased security throughout the entire system. Reduces calls to facilities management Electronic access to each room in the buildings will eliminate the need for physical keys to be distributed to each resident. Not only is tracking each individual key a time consuming process, but issuing new keys is costly and takes time. NDSU’s current use of RFID technology to access buildings and services allows the extension of this capability to accessing individual rooms. Each time a resident or staff member loses their keys, it is necessary to issue a work order to replace their keys, as well as their roommate’s and to rekey at least one lock. This accrues costs not only in hardware but labor. With the RFID technology already used to provide access to buildings, if a ID is lost or stolen, it is a simple manner of calling campus police or the Bison card office to deactivate the access rights for that card, and visiting the bison card office to issue a new ID for a cost of only $20 to the resident. Finally carrying only one ID for all the access needs on campus reduces the likelihood of losing keys because there is only one item to keep track of and it fits with the campus one card and the access policies (appendix K). Saves time when responding to student and staff needs The ability for electronic credentials to be dynamic allows for more fluid response to needs that may arise. With NDSU’s current CS Access software, multiple functionalities can be leveraged to allow for more tailored responses to individual needs. The software, in combination with the electronic locks, allows for students to setup text messaging to allow them back into their rooms when they have locked themselves out. The software also allows for staff members to request master key access to rooms with the same text messaging system, removing the need to spend time retrieving keys, and can instead help the residents on the spot. Also, professional staff members do not need to share a set of keys for the duty schedule, the duty schedule could 1
  • 6. be put in the computer to allow each staff member the necessary access rights when needed, or each staff member could have those rights automatically without issuing dozens of new keys for each of them. Provides centralized management of access credentials With the current system of physical keys implemented at NDSU, each hall must keep track of, and issue keys to its residents. With the housing software and CS Access integration, it would be possible to have a resident’s room assignment automatically assign them access rights to their room just like the building is already automatically assigned to their ID. This prevents keys from being given to other residents or exchanged. This would also help to alleviate unauthorized room switches where they currently can just exchange keys with another resident and tailgate into their “new” building if they switched halls. Increase security throughout the entire system Electronic locks provide increased security for two reasons. The first is that there are detailed audit logs describing who accessed what room and when. There is no wondering if the master key has been used for access that it shouldn’t have been or who used it. Also, physical keys and locks not only have no reliable auditing system, each lost key puts another limited access keyway out there for someone to reengineer the system. This eats away at the security provided by BEST™ keyways and their inability to be duplicated except by an authorized user or dealer. Finally, each key that can access a lock reduces the security of that lock. In a seven pin lock, if there are five keys that can access it, and they all have two different pins, that creates five authorized keys that can open the lock but another 20 keys that can access the lock unintentionally. This problem can be seen in the high rises where the foyer doors could have three different keys (one for each room in the suite) as well as a building master, and a campus master. These numbers do not take into account any Maximum Adjacent Cut Specification or1 bump keys . These numbers may seem relatively small when it is taken into account that a seven2 pin system with five possible pin depths has a possibility of 78,125 keys (again not taking into account any Maximum Adjacent Cut Specification or bump keys) but this does provide a measure of pause and thought that must be put into the consideration of the integrity of the access control to each area. These concerns can be alleviated by the use of electronic access to the rooms for all but facilities management (via the campus grand master key) and residence life professional staff (via a residence life master key). The Maximum Adjacent Cut Specification (or MACS) of a lock is the maximum variance of1 component sizes between two adjacent components. On the key, it refers to how many pin depths must be between each cut. You cannot have two pins of no difference or just one depth difference in a row in certain systems. Failure to abide by the MACS can make keys difficult to insert or remove from a lock, potentially even causing back cutting. Back cutting describes a situation in which the slopes between the cuts on a key are too steep, causing the key to become stuck in the lock. A key capable of “bumping a lock” so that it can be opened without an authorized key.2 2
  • 7. Added means of access Students today always have one thing with them, their phone. Many devices are used by students but it seems that none is more used than the smart phone. With this computer in their pockets, students have access to a whole myriad of information, services, and entertainment at the click of a button. Implementing an online access system for the Residence Hall rooms could also add desired functionality for the students. cBord leverages the proliferation of cellular technology to offer two other vectors of access to rooms. The first is the use of their mobile app to store a student’s identity and access information. In the event that a student is locked out of their room but has their phone in hand, they can use this app to send a request to the door, then only requiring that they enter their PIN. The second is an SMS (text messaging) service by which a student’s phone number is registered with the system, when they are locked out, they can text the system and achieve the same results as the app, allowing those with older or less capable phones the same conveniences as those with the app. Also, the SMS system is how RAs can request short term elevated privileges for either a specific door or set of doors to assist residents. Other considerations Other things to consider is the future and how this technology will fit in with advances in the industry. The campus cBord representative talked of the future of the technology and the newest thing being Bluetooth. He said “for universities this technology is still years away and not ready for deployment.” The AD-400 lockset provides many options that make it a great product for both now and the future. The current series of readers are available in multi-technology formats, allowing for the use of both 125KHz proximity cards and 13.56 MHz smart cards. The lock sets are also available with NFC readers for use with modern smart phones. Finally, the keypads on these devices are field replaceable, allowing for the upgrade of the locks to use newer technology without needing to replace the whole device. All these aspects allow NDSU to consider implementation of these devices without placing too much concern into when they will become obsolete. All that being said, upgrading to an electronic access system using two stage verification3 and NDSU's CS Gold software, NDSU can provide a more secure and efficient environment to promote student learning. The addition of AD-400 lock sets with a multi-technology keypad will allow for the Bison Card to be utilized in conjunction with a private four digit PIN unique to each resident.
 Two stage verification refers to an access setup that utilizes both the student or staff3 member’s ID and a personal PIN of chosen length. 3
  • 8. Case Studies Several campuses have already made the switch to electronic access control to manage the access to their rooms and have used various implementations. These campuses were kind enough to share information about their systems as well as their reasons for making the switch. Also included for some, is how the switch was justified financially and how the new implementation increased security functions at those campuses. The correspondence that led to these descriptions is available upon request. Four different campuses are highlighted below and press releases supplied by cBord are available in appendix C.
 4
  • 9. University of Hawai’i at Mānoa The University of Hawai’i at Mānoa changed their locks out of a need to replace an antiquated system. UH employs two different access systems in their halls. The system that grants access to the buildings is centralized and works off of the students’ ID cards. This system is run via Lenel®, a system similar to cBord, and is connected to their blackboard and dining center accounts. The system to access the rooms themselves as well as the stairwells and elevators is like that found in hotels, a simple swipe to enter, however this system is separate from Lenel® and is not centrally managed. For the Hawai’i residence halls, you therefore had to carry two cards, something that could be considered detrimental, but their campus software was unable to handle it at the time of implementation. This separate system did allow though, for RAs to issue new keys on the spot as the system was separate and the keys were easily coded. UH added electronic access control to each of their buildings in phases, spreading the cost over time as different maintenance projects were done in the buildings. Only their newest hall, Frear, had the locks installed from the start. UH believes that the addition of electronic access control is an incredible benefit, but they do note some cons. First and foremost, training personnel to use the locks takes time and there may be a significant amount of problems right at the beginning, and secondly, a preventative maintenance cycle is required to replace batteries and keep the readers working optimally. 5
  • 10. University of Alaska Anchorage The University of Alaska Anchorage updated an old electronic access system when installing their current system. The old system was an offline system and had to be manually updated at the door. UAA also needed to switch companies because their original provider would not work with them to keep their system up and running. After the switch, the University had a true one card system as the campus ID that is used for all campus services and the Anchorage bus system, is also used to access the rooms. Because of this one card nature, and the IDs having the owner’s picture, UAA implemented a 2 stage verification system. Not only do residents need to swipe their IDs to get into the room, they also need to enter their unique four-digit PIN code. This was to prevent others from gaining entry to a room if they found an ID and knew where the owner lived. The University of Alaska employed a Wi-Fi lock solution with Assa Abloy as the hardware provider. This requires a separate IP address for each lock, which may require the addition of extra routers and network subnets and could also figure into the performance of NDSU’s already overtaxed Wi-Fi network. This may also slow down an already over taxed Wi-Fi network in the residence halls. This aside, the Wi-Fi lock solution gave UAA some much desired functionality. These new functions included online audit trails that are accessible from the central office as well as remote resets and reloading of new credentials. The cons that the Associate Director for Facilities, and Operations Manager from UAA mentioned was one, these locks have a short battery life (about 6 to 8 months) and therefore they had the locks connect to Wi-Fi only twice a day unless a connection was needed sooner to update credentials, in which case the staff would assist the student in forcing it through. Secondly, some of the keypads for the locks failed in warranty (under 2 years) but this was less than one percent of their entire installation. 6
  • 11. Northeastern University Northeastern University in Boston recently made the switch to all online electronic access locks. Their motivations for switching included consolidating several systems and increased security. After evaluating their needs, they contacted cBord and with their help, implemented a system comprised of the Schlage® AD-400 series locksets and the supporting hardware. NEU sites “want[ing] to switch to a reliable online locks solution” as the reason for these selections and they informed me that they believe this system fits their needs well. Some of the other reasons for switching included the long hours invested by staff on the old systems and the security concerns of lost keys and unreliable or lack of auditing. These reasons made the cost of the transition easy to justify to the upper management. With their support they were able to move forward financially and secure the necessary funding for the project. After the upgrade Warren Lord, Director, Student Affairs Technology and Husky Card Services, said that NEU gained added security from the various online lock functions, such as an audit trail, easier and remote troubleshooting, as well as multiple ways to issue credentials to a room [whether it be electronic, in the case of an ID card or phone, or a physical key]. In the NEU implementation, only facilities management has access to a physical key to access the rooms. All others must have valid electronic credentials to enter the rooms. 7
  • 12. University of Missouri The University of Missouri has been using electronic access on their rooms for years. In 2004, with the building of a few new residence halls, Mizzou installed their first set of electronic locks. As an early adopter there were many bugs associated with the system that they run into much less frequently now. Their first few years saw only the installation of singe technology locks in the form of magnetic stripe card readers. Later installations saw the use of locks capable of not only the magnetic stripe but the contactless and NFC technology readers too. This allows4 for the implementation of newer technology as it becomes available to the school. As Mizzou looks to upgrade cards, they must now go and retrofit the older locks with new readers, a task that will cost about $3.7 million. This highlights the importance of looking to the future no matter what technology is chosen. The current lock employed by the University of Missouri is the Sargent Passport 1000 P2. As card based access trends towards becoming an industry standard, much like the BEST lock cores, this lock, like the AD-400 proposed, can adapt to the needs of ever improving technology. The Passport 1000 is the Assa Abloy Wi-Fi lock that serves the same consumer category as the AD-400 by Schlage (and Allegion company). Also, the doors on the residents’ rooms are not centrally monitored or recorded on video.5 In regards to access privileges, Mizzou utilizes master cards stored in the building offices, however the do employ the OpenMyDoor software function of the locks for residents to assist themselves with lock-outs. Director of Residence Life Frankie Minor stated that the use of card keys is more convent for students and fits in with the campus one card policies. Despite the higher initial cost of implementation Director Minor believes that the online lock system has helped his staff to provide a better campus life experience to the students they serve. NFC stands for Near Field Communication. NFC is a transmission protocol built into modern4 smartphones and cards to provide data transfer between devices. These technologies could be employed to provide secure credential storage on an employee or student’s phone. Refers to the monitoring of the door state as opened or closed and usually used to trigger5 alarms. 8
  • 13. Hardware cBord has provided the following information to aid in the consideration of this proposal. The following numbers were provided out of courtesy and do not represent a valid quote from cBord or any of its affiliates. Lockset The lockset being proposed by this document is the AD-400 by Schalge. This lockset is capable of being configured in a number of different ways. The suggestion is that you order the lock configured as follows: AD400-CY-60-MTK-SPA-626-BD-S123-RH-4B-13-049-10-013-1-3/4”. CY – Cylindrical lock (MS – Mortise will be needed in some buildings) 60 – Apartment function (70 – classroom function will be needed on some locks) MTK – Multi Technology + Keypad SPA – Sparta style door handle 626 – Satin Chrome finish BD – Less cylinder, cylinder style is SFIC (compatible with current BEST™ cylinders) S123 – Keyway type (not applicable since providing cylinder on campus) RH – Right Handed door lock (field switchable if needed) 4B – 4 battery option 13-049 – 2-3/4” backset, deadlatch, square corner, 1-1/8” by 2-1/4” 10-013 – 1-1/8” lip, square corner, t-strike, box 1-1/8” by 2-3/4” For more detailed descriptions of the options please see appendix D. There is a numerous amount of hardware required to support the operation of the AD-400 series. This lock is wireless but operates on its own spectrum (900 MHz) so it doesn’t require or interfere with Wi-Fi. To interface with the central management server, these locks require a Panel Interface Module (PIM) and a cBord squadron to interface with the network. To support this hardware items like enclosures, power supplies and battery backups are required. After all of this is taken into account, each lock averages about $1318.97 with the quoted hardware. Please see the table in appendix A for a full breakdown of the different hardware and cost. These numbers came from a quote provided by Robert Cudney, the cBord sales representative for the NDSU campus. This quote can be found as appendix J, but please note that it includes no volume pricing or options that support a higher number of devices at a lower average cost when spread across the number of doors. Also these prices take into account only hardware and do not include fees for training, installation, or delivery. 9 SCHLAGE AD-400 LOCK SET
  • 14. Supporting Hardware Squadron The Squadron V1000 EVO Access Control Panel 32 Doors is the interface between the network/access control server and the locks. Each squadron can support 32 doors making only one IP address needed for each set of 32 doors. The interface between the squadrons and the wireless locks is the PIM and each squadron can support 2. The Squadron Information sheet is available as appendix F. PIM The AD-400 Series Panel Interface Module is the link between the Squadron module and the actual wireless locks. The PIM is a wireless interface to the locks and is hardwired to the Squadron. The PIM operates on the 900MHz wireless frequency and does not interfere with other existing IT wireless infrastructure. The PIM information sheet can be found as appendix G. Power Supply and Batteries There are a number of options for powering both the Squadrons and the PIMs. For smaller installations these devices are powered by the Altronix eFlow power supply. It is capable of powering 1 Squadron and 2 PIMs and is housed in a separate enclosure included in the pricing. The power supply is also connected to two backup batteries capable of keeping the system up for 6-8 hours in the event of a power failure. The info sheets for the power supply is available as appendix H. As installations get larger, there is a modular power supply available to offer a significant amount more energy to spread across the devices. The power supply used in these installations is the Altronix Maximal75E Expandable power system. The data sheet for this power supply can be found as appendix I. Other Supporting Hardware There are several other pieces of equipment required for a successful installation. These include an enclosure to house the backend equipment as well as to prevent unauthorized access and tampering. The equipment to mount and access these enclosures are listed at the end of the table in appendix A. 
 10
  • 15. NDSU Hall Breakdowns At NDSU there are several different residence halls all with unique access considerations. There are a number of different doors all with different access requirements. The following sections detail different halls, the amount of doors in each, and what type of access requirements each set of doors have. For a description of the access styles please see the third page of appendix D. Thompson Hall Thompson hall has a total of 9 floors and a basement. Each floor has a different amount of locks and what they require. There are 8 residential floors in Thompson with an identical layout. These residential floors all sport 8 suites of rooms, a laundry room, a study room, a custodial closet and an electrical room. In the suites of rooms there are up to 3 individual rooms and a bathroom. The lock on the bathrooms is a courtesy lock and therefore would not be necessary to include in the upgrade to electronic locks. Of the remaining doors on the floors, there are 8 foyer doors, 18 individual room doors, 1 custodial closet door, 1 study room door, 1 mechanical room door, and one laundry room door. The access types of these rooms are as follows, the foyer doors are most closely resembled by the office style of access. The mechanical room door, the custodial room door and the laundry room door are most closely resembled by the classroom style of access. And finally the individual rooms and the study room have access credentials most closely resembling the apartment style of access. On the first floor there is the hall director office, RA office, custodial office, two lounges, two custodial closets, two bathrooms, and two hall director apartment doors. The hall director, RA, and custodial offices all have locks using the office access style. The lounges, custodial closets, and bathrooms all have classroom style access. Finally, the hall director apartment doors have the apartment style access. The last level is the basement which has 8 doors in total. One door for the kitchen, one for the electrical room, one for a closet, one for student storage, one for the generator room, one for the elevator room, and two for the mechanical room. All eight of these doors have the classroom style of access. There is also one miscellaneous door in the roof access. This door has both a standard lockset and a deadbolt on it. There is no deadbolt function with the AD-400 but the lockset could be replaced with a classroom style access. In total there are 261 doors in Thompson hall. That comes to a total of 260 AD-400s, 9 Squadrons, 17 PIMs, 3 power supplies, 6 batteries, and 3 sets of supporting hardware (sans one 2 panel insert). This comes to a total hardware cost, for Thompson hall, of $345,581. Tables breaking down all the hardware, doors, and access styles for Thompson can be found in the tables included as part of appendix B. 11
  • 16. Something of note with the locks in the high rise residence halls, as these doors use cylindrical style locks, the cost of the lock is different. These locks tend to cost about $50 dollars less. Factoring this into the equation, the total cost of equipment in Thompson Hall would be $333,131. Note though, that all the tables have been constructed with the $1220 per lock cost despite this difference. Burgum Hall Burgum Hall is a low rise hall that has three floors. The top two floors are identical while the bottom floor has a few less residence rooms and some offices. There is also a basement with different rooms as well. On the top two floors there are 30 residents’ rooms. There is also a supply room, trash room, custodial closet, elevator room and one unknown room. On the top floor there is also a door to the roof. On the main floor there is 25 residents’ rooms, a hall director apartment with one door, a supply room, trash room, custodial closet, elevator room, hall office, storage closet, hall director office, a gender neutral bathroom, and a door to the basement, and an unknown room. In the basement there is a custodial office and 7 unknown locked doors. All these doors make for a total of 115 doors. Putting the room doors and the HD apartment door as the apartment access style, the three offices and gender neutral bathroom as the office access style (bathroom normally safe ) and the rest as classroom access. Using these totals all 115 lock sets6 could be supported by four Squadrons, eight PIMS, a single power supply with two backup batteries, and a single set of supporting hardware making the total cost for hardware $152,160. Tables breaking down all the hardware, doors, and access styles for Burgum can be found included as part of appendix B. *(Please note, due to limited access to halls other than Thompson, the breakdowns for other halls may not be 100% accurate but are as close as possible.)* In the terms of locks, safe and fail safe refer to being in the unlocked state; when there is a6 system failure, the lock will automatically fail to a safe state. This is in contrast to secure and fail secure. The operation of choice is selectable on an individual lock basis. 12
  • 17. The Survey After the preparation of this proposal, a survey was distributed to all the students living in the NDSU residence halls as well as the Residence Life run apartments. The survey consisted of a multiple choice questions asking if students were in favor of the proposed upgrade, against it, or undecided. After answering, the respondents were able to provide additional feedback as to why they made the choice that they did. The survey was open for five days and garnered 910 responses. Results After the survey was closed, the results showed the following of the 910 respondents: • 893 are students • of those 893, 57 were student staff members • 528 students are in favor of the upgrade • 88 students are against • 177 students are undecided • The remaining 17 respondents are professional staff • 6 professional staff members are in favor • 4 professional staff members are against • 7 professional staff members are undecided 13 Students Student Staff Professional Staff
  • 18. Those in Agreement The students in favor of the upgrade cite very simple reasons: Efficiency, Simplicity, and Integration. Students at NDSU are accustomed to using their ID to access many different services from the dining centers to the wellness center. Checking out books at the library to accessing their residence hall. Students are looking forward to the possibility of integrating the current system with a sophisticated form of room entry, allowing the students to truly use one card for everything on campus. Students also like the idea of not needing one set of credentials to get into the building and yet another set to enter their rooms. Many students are intrigued and excited about the potential of this upgrade. Those in Disagreement Of the students who responded to the open ended questions in disagreement, certain concerns were raised. The chief concern, brought up by many of the respondents is cost. Many students are wondering where the capitol for this project would come from and how it will affect their housing costs at NDSU. Nearly as concerning to this category of students is technology issues and how fast a response to a failed lock will be. Other universities have managed a balance of customer service and cost effectiveness but how NDSU can strike this balance will only be known once a serious discussion about this upgrade is taking place. Other concerns are in the matter of security, privacy, and convenience. Those Undecided Many of the undecided students are hesitant because of the lack of information surrounding the potential upgrade. These students want to know more about how the system will benefit them versus the potential risks and the exorbitant cost. These students are diligently asking questions in desire of more information. Bottom Line Many students are in favor of the idea that their lives could be made simpler while NDSU could rest assured that the halls are even more secure. Overall 70% of students are in favor of such an upgrade with only 10% against it. Students staff are 74% in favor with 7% dissenting and professional staff is 35% in favor and 24% against. These numbers lead to a promising embrace of the potential technology by the campus population. The full survey and its results are available upon request.
 14
  • 19. Appendices Appendix A: Hardware Costs 17 Appendix B: Hall Hardware Requirements 18 Thompson Hall 18 Burgum Hall 19 Appendix C: cBord Releases 20 Appendix D: AD-400 Options 22 Appendix E: AD-400 Info Sheet 34 Appendix F: Squadron Info Sheet 37 Appendix G: Panel Interface Module Info Sheet 39 Appendix H: Altronix eFlow 6NX16 41 Appendix I: Maximal75E Power Supply 42 Appendix J: cBord Quote 44 Appendix K: Campus Policies 50 Section 703: Bison Card Terms and Conditions 50 Section 707: Access Control and Building Security 53 Appendix L: Contact Information 55 15
  • 20. 16
  • 21. Appendix A: Hardware Costs There are several pieces of equipment that could be used in larger installations to make them more cost effective. • The power supply used in this table is the Altronix eFlox 16NX6 but the Altronix Maximal75E Expandable Power System is available as well at a cost of $931.00 per device and is capable of powering 5 Squadrons and 10 PIMs .7 • There are several different enclosures available for the squadrons. - The four board enclosure is used in the tables presented in this document. - An 8 board enclosure is also available. it is priced at $513.00, The four board insert for this enclosure costs $75.00 and the mounting kit for this enclosure is $254.00. - There is also a 12 board enclosure priced at $535.00. The 6 panel insert costs $70.00 and the mounting kit is $234.00. The table is designed to make use of the equipment to its fullest extent so that the cost per door is as low as possible. These numbers are also only for the hardware and do not take into account service, installation, delivery, travel, or other charges that may be incurred in purchasing and implementing the system.
 These numbers are based on the max current input for the squadron boards and the PIMs.7 These numbers are found on the PIM data sheet (appendix G page 39) and the VertX V1000 data sheet found at http://www.hidglobal.com/sites/hidglobal.com/files/resource_files/vertx-evo- v1000-controller-ds-en.pdf 17 Cost per device Qty. Extended Cost AD-400 $1220.00 128 $156160.00 Squadron $919.00 4 $3676.00 PIM $755.00 8 $6040.00 Power Supply $400.00 4 $1600.00 Battery $51.00 8 $408.00 Squadron Enclosure $362.00 1 $362.00 Squadron Enclosure Panel $71.00 1 $71.00 Squadron Enclosure Mounting Kit $87.00 1 $87.00 Tamper Switch $9.00 1 $9.00 Cam Lock $7.00 1 $7.00 Total $168420.00 Cost per Lock $1315.78
  • 22. Appendix B: Hall Hardware Requirements Thompson Hall
 18 EQUIPMENT COST BREAKDOWN Part Cost Qty. Extended Cost AD-400 $1220.00 261 $318420.00 Squadron $919.00 9 $8271.00 PIM $755.00 17 $12835.00 Power Supply $400.00 9 $3600.00 Battery $51.00 18 $918.00 Squadron Enclosure $362.00 3 $1086.00 Squadron Enclosure Panel $71.00 2 $142.00 Squadron Enclosure Mounting Kit $87.00 3 $261.00 Tamper Switch $9.00 3 $27.00 Cam Lock $7.00 3 $21.00 Total $345581.00 # Needed Access Style Foyer Doors 64 Office Room Doors 144 Apartment Study Room 8 Apartment Custodial Closets 10 Classroom Mechanical Rooms 12 Classroom Laundry Rooms 8 Classroom Lounges 2 Classroom Offices 4 Office Apartment 2 Apartment Restrooms 2 Classroom Elevator Room 1 Classroom Kitchen 1 Classroom Storage Closets 2 Classroom Roof 1 Classroom DOOR AND ACCESS STYLE BREAKDOWN Apartment 154 Classroom 39 Office 68 TOTAL ACCESS STYLE BREAKDOWN
  • 23. Burgum Hall
 19 EQUIPMENT COST BREAKDOWN Part Cost Qty. Extended Cost AD-400 $1220.00 115 $140300.00 Squadron $919.00 4 $3676.00 PIM $755.00 8 $6040.00 Power Supply $400.00 4 $1600.00 Battery $51.00 8 $408.00 Squadron Enclosure $362.00 1 $362.00 Squadron Enclosure Panel $71.00 1 $71.00 Squadron Enclosure Mounting Kit $87.00 1 $87.00 Tamper Switch $9.00 1 $9.00 Cam Lock $7.00 1 $7.00 Total $152560.00 # Needed Access Style Reident’s Rooms 85 Apartment Supply Rooms 3 Classroom Trash Rooms 3 Classroom Custodial Closets 3 Classroom Offices 3 Office Apartment 1 Apartment Restrooms 1 Office Elevator Rooms 3 Classroom Storage Closets 11 Classroom Roof and Basement 2 Classroom DOOR AND ACCESS STYLE BREAKDOWN Apartment 86 Classroom 25 Office 4 TOTAL ACCESS STYLE BREAKDOWN
  • 24. Appendix C: cBord Releases
 20
  • 26. Appendix D: AD-400 Options 22
  • 28. 24
  • 30. 26
  • 38. Appendix E: AD-400 Info Sheet
 34
  • 41. Appendix F: Squadron Info Sheet
 37
  • 42. 38
  • 43. Appendix G: Panel Interface Module Info Sheet 39
  • 44. 40
  • 45. Appendix H: Altronix eFlow 6NX16
 41
  • 46. Appendix I: Maximal75E Power Supply 42
  • 47. 43
  • 48. Appendix J: cBord Quote
 44 The above quote was provided out of courtesy and does not represent a valid quote from cBord or any of its affiliates.
  • 49. 
 45 The above quote was provided out of courtesy and does not represent a valid quote from cBord or any of its affiliates.
  • 50. 
 46 The above quote was provided out of courtesy and does not represent a valid quote from cBord or any of its affiliates.
  • 51. 
 47 The above quote was provided out of courtesy and does not represent a valid quote from cBord or any of its affiliates.
  • 52. 
 48 The above quote was provided out of courtesy and does not represent a valid quote from cBord or any of its affiliates.
  • 53. 
 49 The above quote was provided out of courtesy and does not represent a valid quote from cBord or any of its affiliates.
  • 54. Appendix K: Campus Policies Section 703: Bison Card Terms and Conditions 50
  • 57. Section 707: Access Control and Building Security
 53
  • 59. Appendix L: Contact Information
 55
  • 61. 57
  • 62. 58