acsys iot rms integartion for the passive ......the software dashboard is populated by the...

Post on 26-May-2020

3 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

ACSYS IOT RMS INTEGARTION FOR THE PASSIVE INFRASTRUCTURE INDUSTRY

www.acsys.com info@acsys.com

COMPANY PROFILE

Acsys is a global leader in the emerging field of mechatronics access control. With technology originating from two famous French defense contractors in 1999, Acsys products and solutions provide a powerful means to control who goes where and when, indoors and outdoors, without wiring and without reliance on a power supply. A highly specialized international team delivers world-unique, patented solutions. From the Code Generation System (CGS) and Keypad Key to remote staff management via the AcsysMobile App, the modular, and solution-oriented approach sets Acsys apart from other security competitors. With top-tier clients in the public and private sectors extending across telecommunications, banking, power, mining, logistics, luxury shops, aviation and more. Acsys proves why it’s all about security & productivity!

OFFICES : CHINA/INDIA/UGANDA/MEXICO/UAE/SAO PAULO/LAGOS CLIENT BASE IN 48 COUNTRIES

INTRODUCTION

The Telecom Industry has become an integral part of humans daily life, and therefore mobile network dependency has significantly increased in the last years and the Telecom industry at large is now classified by many countries as “Critical Infrastructure”

In order to increase customer reach, increase quality of service and reduce costs, the Mobile Network Operators (MNO) have in the past years decided to work together and share parts of each other’s networks

This process has created an infrastructure principle called “co-location” whereby several operators (mostly up to 4) are located on the same cell tower and share the cost; in practice, MNO’s who entered in such agreements quickly realized that ‘managing’ these sites with the added tenants is not simple.

The co-location also brings with it a new set of operational requirements, such as itemized billing for Power and other services, but also a requirement for adapted access solutions to safeguard the integrity of the site and assets

The creation of Tower Companies in the past 10-15 years, was essentially driven by the Telecom industry’s need to free up capital tied up in the sites that it owned, but also to bring a new management approach to managing co-located sites with as purpose to reduce site Opex

As one of the biggest expenditure on Telecom sites is Power, whether AC or DC, it became a requirement for MNO’s and Tower companies to deploy remote monitoring solutions (RMS) to monitor the availability and quality of Power but also to provide a remote overview of power consumption for each tenant individually, on co-located sites. The RMS solutions were also deployed to capture other site information such as refuelling and fuel tank status, battery status, rectifier status, grid power status, generator status, solar/wind power status, Temperature control and various other ‘value-add’ data creating solutions such as Access control and Time & Attendance control with as purpose to increase site operational visibility and control

For most MNO’s and Tower companies, the industry adoption of the co-location principle, brought with it a number of challenges and this regarding access to sites and assets which was for most, and until this day, managed with antiquated mechanical solutions which proved totally un-adapted to the new operational requirements.

The Acsys solutions were designed based on the requirements of both MNO and Tower companies and the solution allows them to remotely manage access to sites and assets through the now well-established “REAL TIME KEY CONTROL” CGS+ solution

Acsys wire-free solutions are a true complement to any RMS solutions as it adds another layer of operational control and visibility at NOC level which has now proven to be critical to control sites, users and reduce costs.

Front Gate BTS Shelter Generator Batteries Fuel Tank Cabinet Tower Users/Vendors

TELECOM SITE PROBLEMS

TOWERCO PASSIVE INFRA PROBLEMS TENANT/MNO ACTIVE INFRA PROBLEMS

MNO EQUIPMENT INSTALLATION

VANDALISM

NON ATTENDANCE

UNDER PERFORMANCE

OVER BILLING THEFT

SITE ACCESS SITE CONTROL

FINANCIAL IMPACT

PROCEDURAL IMPACT

NON ADHERENCE TO SLA

VANDALISM

NON ATTENDANCE

UNDER PERFORMANCE

OVER BILLING THEFT

SITE ACCESS ASSET CONTROL

FINANCIAL IMPACT

PROCEDURAL IMPACT

THE VALUE OF INTEGRATION

Acsys is a technology/solution and when it comes to RMS we will co-operate with any RMS vendor which shares the same level of competencies and desire to provide lasting and durable field solutions

Based on our experience, we can see that there is real demand and logical product offering in combining access control and remote monitoring of sites and assets as these are closely inter-related

The ability to monitor and capture site data and correlate that data with access to an asset is a very valuable proposal as it directly links Site Event with Site Opex

The creation of a site/asset event and related remote access control is critical in evaluating adherence to SLA’s

Moreover, by creating an additional information layer that makes access to a site/asset CONDITIONAL upon the creation of a site/asset Event, the NOC will be able to manage its resources more efficiently and have the ability to pro-actively prioritize site maintenances

The single SOFTWARE PLATFORM is of course the strongest joint offering as it consolidates all the DATA STREAMS on one database and gives the NOC or Management a clear overview of what is going on, and going wrong with the sites/assets

The ability to monitor, capture and relay data from the site remotely, and through the same platform control the access required to that site/asset creates an efficient and flexible site management solution

The ability to combine the joint offering with ERP/MRP/OSS and Trouble-ticketing platforms gives the highest possible form of site access control but will also reconcile all site Opex productive data giving the customer a clear, real-time cost per site overview, and the ability to set “Reliability Benchmarks” on items such as Generators, Batteries, Rectifiers and other active infra assets

ACCESS CONTROL IS AN INTEGRAL PART OF REMOTE SITE OPERATIONS

Enterprise Resource Planning

Trouble Tickets System

Remote Monitoring

Systems

Operations Support System

Material Requirement

Planning

REQU

IRES ACCESS

REQU

IRES ACCESS

REQU

IRES ACCESS

REQU

IRES ACCESS

REQU

IRES ACCESS

ACCESS CONTROL

RMS

THE VALUE OF INTEGRATION

By using advanced mechatronic solutions, every access point on a cell tower can be DATA GENERATING

The data is usually “Productive Data” as it contains elements such as Arrival and departure time which are directly connected to Billing, ERP and SLA’s

The Productive data is also real-time remote key control and the ability to remotely control who can go where, when, why and how and for how long, which transforms into pro-active remote worker Productivity control

Every asset that is monitored by an RMS solution also needs to be secured and access to it controlled, so integration of both platforms is of great added value to the customer

RMS ACCESS

BTS

MAIN GATE

GENSET

FUEL TANK

BATTERY

RMS ACCESS

RMS ACCESS

RMS ACCESS

RMS ACCESS

REPORTS

ACCESS & MONITORING POINTS RMS ACCESS

REAL-TIME KEY CONTROL = PRODUCTIVITY CONTROL

Who is on the site? Why are they on the site? Who do they work for? What are they doing there? Was the job done? When was it done? Was it done well? How long did it take?

? TOWERCO & MNO COMMON PROBLEMS

VALUE-ADD DATA FOR MNO/TENANT

COMPATIBLE ON ALL SITES & ASSETS

Front Gate BTS Shelter Generator Batteries Fuel Tank Cabinet

COST/OPEX REDUCTION Clear real-time wire-free control over what can be accessed by whom and when (Security) Clear record of what was accessed, by whom, for what reason and for how long (Productivity) Access records correlated with OSS/ERP to set KPI’s for preventive/corrective/emergency maintenance (Efficiency) One key & password for every lock, visit more sites per day (Flexibility)

THE ACSYS OTP PASSWORD KEY – WIRE-FREE REAL-TIME KEY CONTROL

The Acsys OTP (One Time Password) key applies the concept of online banking tokens to 21st century locking solutions and is unique and patented worldwide by Acsys Technologies and affiliated companies WORKING PRINCIPLE A key is programmed and assigned to a user, and can technically open all the locks on the

system where it was created making it operationally very flexible The key doesn’t use any Access Rights, instead it uses Access Codes which are random, 6-

10 digit codes which are created by the software and sent to the user by SMS or Smartphone App or communicated orally by phone; the code is punched in on the key’s keypad making it temporarily active and only on the locks that the NOC wants to be opened

The Access codes solution allows the NOC to control WHICH Site(s) can be accessed, by WHOM, WHEN, and for HOW LONG.

Moreover the access codes solution also allows the NOC to control which Asset(s) on the site(s) can be accessed by whom, when and for how long, offering a radically new way to control access on remote sites and assets

When integrated with a Trouble-ticketing, Enterprise Resource planning, Operations Software or RMS the access codes are only issued ‘on demand’, and only when a request is in the system, then an associated opening code can be obtained and only by the authorized user(s)

With the Acsys Smartphone App, the code is only issued when the user has reached the preset location, this is also known as ‘location-based access control’ and provides a real-time control and verification of site access

If a Key is lost or stolen, only the phone number associated with it needs to be deleted from the system, no further updates are required

ANY PHONE

SMARTPHONE

SMARTPHONE

ACSYS TELECOM SOFTWARE PLATFORM

The Acsys Telecom software is the Control Platform where all site/asset Entry/Exit requests and access records are centralized and processed All scheduled and known maintenance access requests will be processed automatically by the system and associated OTP (One time password)

codes issued to the users; for all other access requests, the NOC has the option to handle them by email, SMS, App or other mediums available and always by using Acsys patented OTP CGS+ solution making the Access to a site/asset controlled and secured

The software dashboard is populated by the site/asset access requests and any 1/3 party integration (such as ERP/OSS/TTS) to give the NOC a clear view of who is going where, when, why, for how long and in real-time

Under-performance (i.e. less time than planned) or Over-performance (i.e. more time than planned) is carefully correlated with existing KPI’s Maintenances can be categorized by type/vendor/gravity to efficiently allocate the resources where they are the most needed, and escalation

alarms can be included to alert when SLA requirements are not met Integration with Acsys App solution(s) allows for real-time tracking of users, real-time view of site pictures before and after the works, and visual

follow up of trouble tickets as well as ‘Time2site’ evaluation

MARKET APPROACH & DRIVERS O

PEX

REDU

CTIO

N

Secured and controlled access

Predictive maintenance

KPI/SLA adherence

ERP/MRP Integration & Loopback

Site visit and billing integration

Site attendance integration

Trouble ticketing Integration

Time to site integration

Flexibility of Access

SITE DATA SITE DATA

Was the Job done?

When was it done?

When did they arrive?

How long did they stay?

How well did they do the job?

Reduction in Down-time

Ease of Access

Theft prevention & control

What did they fix and why?

PRIMARY DRIVERS EFFICIENCY - SECURITY

SECONDARY DRIVERS PRODUCTIVITY - FLEXIBILITY

PRO

DU

CTIV

ITY/

PRO

FITA

BILI

TY IN

CREA

SE

ACSYS MODULAR SOFTWARE APPROACH

The Acsys Telecom software adopts a module architecture, allowing the customer to select and only pay for what they really need, and the stack approach enables easy upgrade/downgrade without affecting operations

ACSYS RM

ACSYS ERP/MRP

ACSYS TICKETING ACSYS CGS+

ACSYS CLOUD ACSYS MOBILE

ACSYS RMS

Remote Management Cloud Hosting Module

ERP/MRP/OSS Integration

SOFTWARE PLATFORM

Smartphone App module

Remedy & Footprint module

Real-time Remote Key Control

Remote Monitoring

ACSYSWATCHDOG Customized Alerts & Alarms

ACSYS TELECOM AND RMS INTEGRATION

FULL OR PARTIAL INTEGRATION ?

When it comes to integrations there are various ways to execute them and each will provide different type/kind of results hence the importance of a clearly defined specifications and requirements document which is usually drafted together with the end-user

Traditionally RMS manufacturers had been proposing Access control solutions as part of their offering. The access control part is mostly wired, power and data dependent and therefore not really scale-able as it can require a lengthy and complicated installation . Moreover wired systems are hard to install on gates, fences enclosures or even 3G/4G cabinets and in the absence of power or data, an override mechanism needs to be available making the solution limited in scope of applications on a cell site

The wire-free, power-free and maintenance-free solutions from Acsys can SECURE ANY ACCESS POINT on a site making it flexible, scale-able and a complete solution for all sites and assets

When integrating, there are two possible customer approaches regarding the combined software offering and that is making either Acsys the front-end application that manages Access and RMS, or making the RMS software the front-end application to manage RMS and Access

We define Partial Integration as a solution to combine the offering of Acsys and the RMS supplier but without therefore fully integrating the software; in fact a Middle-Ware is created to specifically “Push” data from the Acsys database to the RMS database and display the results on the RMS User Interface

We define full integration as a joint-offering that completely integrates both software and business logic into a single platform, creates a single database instance and is managed from one UI only

Both Partial and Full Integration may or not be combined with Hardware integration depending on the customer requirements Both Partial and Full Integration may or not be combined with other integrations with ERP/MRP/OSS/Ticketing software to

provide an even more complete control solution Because of the Acsys Modular software structure, there is a lot of flexibility in designing integration modules and their

deployment can then be done seamlessly and without affecting any operations Another major advantage of the module structure is its FLEXIBILITY as different solutions can be deployed for different

countries/regions but all managed from one central location The App services offered by Acsys are all customer driven developments and are therefore always value-added, so whether it

be the GPS position of user or the picture taking function, all have as target to reduce site Opex

INTEGRATION MODELS

PARTIAL INTEGRATION

FULL INTEGRATION

CONTROL CENTER/NOC

RMS SOFTWARE RMS

XYZ

CONTROL CENTER/NOC

RMS SOFTWARE

XYZ

RMS

AUTOMATING ACCESS CONTROL = ACCESS ON DEMAND

One of the critical points when managing remote sites and users is the management of the productive data emanating from the sites and users

The purpose of advanced mechatronic locking solutions is to bring flexibility as well as usability to the day to day operations; so by automating the Requests, Validations and Issuance of codes, the workload is reduced, the chance of making mistakes is removed and operational productivity will be increased

Whether it is an ERP work order, a Trouble Ticket or any other form of operational tasks that also requires an access, these can be transformed as CODE TRIGGERS to automate the access control part and leave the manual code generation to special cases only.

So as explained in the above slide, if user XYZ is requested by a work order to visit site ABC, and user XYZ uses his registered phone number to get access to site ABC, then it is but normal that the software immediately and automatically generates a code for user XYZ to access site ABC, this is also illustrated in the next slide

As also explained above, this integration also allows for software to SELECTIVELY provide access only to the assets that user ABC is required to access

By also adding the “location-based access control” feature, the system will be able to add another CODE TRIGGER which is the actual user GPS position; this feature gives a clear and irrefutable record of site attendance and can therefore also be used to Validate the access request

As software is the only limit, there are an infinite number of possible combinations that can be created to allow the NOC to get the control they want, and get the information they want

In the case of RMS it is of course evident that if a fault was reported by the RMS for a certain asset, that this fault needs to be attended to, and therefore logical to grant the dispatched user(s) access on those assets which require the maintenance

This principle is called ACCESS ON DEMAND and is becoming an integral part of “Site Access Policy” for most leading MNO and Towercos as it simplifies, streamlines and renders access management more efficient and flexible and allows NOC operators to focus on ad-hoc access requests knowing very well that all other requests are automated

This solution can be further enhanced by using tools such as the Acsys App which allows the key user to capture real-time pictures of the execution and quality of works associated with his access; this information is stored centrally and will give the NOC Operator a clear overview report which may include : Ticket Nr, Time/Date, Assignation time, On-site arrival time, Code Request time, Code Verification basis, Code Issuance time etc..

AUTOMATED EVENT AND GPS BASED ACCESS

REJECTION = ALARM

SITE ABC USER

1. USER XYZ NEED ACCESS SITE ABC

2. USER XYZ REQUESTS ACCESS FOR SITE ABC BY CALL/SMS/APP

VERIFICATION 1

VERIFICATION2

3.1 WORK ORDER YES/NO?

3.2 GPS LOCATION OK?

VALIDATION

4. WORK ORDER + LOCATION = CODE CAN BE ISSUED

WORK ORDER GPS POSITION

REJECTION

GPS POSITION CONTROL CENTER

WORK ORDER

CODE SITE ABC

USER

5. CODE WILL BE ISSUED TO USER BY CALL/SMS OR APP

SEGMENTED EVENT BASED ACCESS CONTROL

One of the strong attributes of the Acsys solution is the “segmentation” of access rights to users Based on the CGS+ platform, the system is able to generate code(s) that will only allow the user to have access to specific equipment and

not others This ‘segmentation’ prevents theft, deterioration and channels the users to the right assets and allows the NOC to really control where

the users can go When integrated with the RMS the segmentation goes to another level and allows the system to AUTOMATICALLY generate codes based

on specific RMS data so for example : USER XYZ Ticket 123 was generated for a battery failure for site 123ABC Ticket 123 is assigned to user XYZ from battery vendor User XYZ arrives at site 123ABC and requests code Software will generate code for Front Gate and Battery cabinet only USER FKG Ticket 456 was generated for a Generator failure for site 123ABC Ticket 456 is assigned to user FKG from Cummins User FKG arrives at site 123ABC and requests code Software will generate code for Front Gate and Generator only

The segmented access control is only one of the main features to control access and eradicate theft caused by people accessing assets to which they don’t have access

The segmented access control feature is also an important element to collect, analyse, correlate and use access records to set KPI’s or productivity benchmarks as the data is TARGETTED

So if for example 25 tickets were created for a Generator failure of the same brand/type and this maintenance takes on average 30 minutes, then the time spent on site/asset by each and every user can be used as a benchmark

Equally if the user(s) for these maintenances spend only 20 minutes or 60 minutes on site, this information can be collected and used to determine under-performance or even non-execution of works on one hand but also allow the NOC to detect over-time spent on site/asset which might be caused by lack of skills/competencies/training etc..

RMS EVENT-BASED ACCESS CONTROL

STEP 2: TICKET NR ABC123 FOR USER XYZ 12/04/2016 11:55AM

STEP 4: USER XYZ CLOSE SITE

12/04/2016 17:34PM

STEP 3: User XYZ OPEN SITE

12/04/2016 16:25PM

STEP 1: TICKET NR ABC123 BATTERY FAILURE 12/04/2016 11:41AM

SYSTEM DATABASE

NOC

RMS

STEP 5: TICKET ACCEPTED 11:55AM ARRIVED ON SITE 16:25 PM

LEFT SITE AT 17:34PM TIME ON SITE 4HRS 9 MINS

KPI : OK SLA : OK

TICKET NR ABC123 FOR USER XYZ

XYZ

SITE ABC

ACSYSTELECOM AND RMS SOFTWARE ARCHITECTURAL INTEGRATION

PARTIAL INTEGRATION APPROACH

WAN/INTERNET

Integration Architecture All integration is performed through

web services in IIS The 3rd Party RMS/Ticketing platform

sends HTTP request to the integration platform through port 80

3rd Party RMS/Ticketing platform server

MS SQL Server 2008 R2 - Acsys Telecom DB &

Stored Procedures - Acsys CGS+ DB &

Stored Procedures Integration Web Services

ACSYS SERVER

WEB SERVICE RMS INTEGRATION FUNCTIONS: GetAllActiveKeyUsers Gets all active key users information including first name and last name. GetAllLocks Synchronize all the locks in Acsys system with RMS system GetCGSPlusDynamicPassword Get CGS plus code using mobile number, operation type and pin code for a specific site. The sms format is ‘[O|C],[Site ID],[PIN Code]’ GetCGSCodeRequestLogs Get all the request logs filtered by specific key user and date/time (if successful, return all the logs, otherwise, return null). startDate and endDate format like’yyyy-MM-dd HH:mm:ss’ ModifyClusters Synchronize the Clusters in the RMS system with Acsys system ModifyCountries Synchronize the Countries in the RMS system with Acsys system ModifyRegions Synchronize the Regions in the RMS system with Acsys system ModifySites Synchronize the Sites in the RMS system with Acsys system ModifyUserKeys Synchronize the Employee information in the RMS system with activate user keys with Acsys system UpdateSyncLockResult Check if all locks are synchronized properly with Acsys system.

PARTIAL INTEGRATION MODULES

MODULE CONNECTIVITY

SMS Gateway Outgoing: Port 80 (TCP)

Acsys Server: SMS Gateway Server Incoming: Port 80 (TCP)

Acsys Telecom Client Outgoing: Port 1433 (TCP), 1434 (UDP)

MSSQL Server 2008 R2 – Acsys DB Instance Incoming: Port 1433 (TCP), 1434 (UDP)

Acsysconnect Client Outgoing: Port 1433 (TCP), 1434 (UDP)

MSSQL Server 2008 R2 – Acsys DB Instance Incoming: Port 1433 (TCP), 1434 (UDP)

Acsys CGS Plus Client Outgoing: Port 1433 (TCP), 1434 (UDP)

MSSQL Server 2008 R2 – Acsys DB Instance Incoming: Port 1433 (TCP), 1434 (UDP)

Acsys App Relay Server Outgoing: Port 7732 (TCP), 9058 (TCP)

Acsys Mobile App Server Outgoing: Port 1433 (TCP), 1434 (UDP) Incoming: Port 7732 (TCP), 9058 (TCP)

3rd Party ERP System Outgoing: Port 80 (TCP)

3rd Party ERP Integration Platform Incoming: Port (80)

3rd Party RMS System Outgoing: Port 80 (TCP)

3rd Party RMS Integration Platform Incoming: Port (80)

Acsys Mobile App Server Outgoing: Port 1433 (TCP), 1434 (UDP) Incoming: Port 7732 (TCP), 9058 (TCP)

MSSQL Server 2008 R2 – Acsys DB Instance Incoming: Port 1433 (TCP), 1434 (UDP)

PARTIAL INTEGRATION SOLUTION OVERVIEW

Field Engineer

REGION 1 / CLUSTER 1

Programmer RMS Device (On Site)

INTERNET /WAN

Client 1 Acsys Telecom Client (optional) Acsysconnect (optional) Acsys CGS PLUS Client (optional) VPN Client

REGION 1 / CLUSTER 2

Acsys Primary Server -MS SQL SERVER 2008 R2 Standard Edition -Acsys Telecom DB instance-SMS Gateway Server -Acsys Backup Module -Acsys APP Server -VPN Server -Acsys Telecom Client (Optional) -Acsys CGS PLUS Client (Optional) -Acsys-3rd Party ERP Integration Platform -Acsys-3rd Party RMS Integration Platform

3rd Party ERP Server

3rd Party RMS Server

SMS Gateway

LAN (HQ)

Field Engineer NOC User USB Programmer

VPN

RMS HARDWARE INTEGRATION POSSIBILITIES

Short distance (point to point connection)

Long distance (multi device BUS connection)

WIRED SOLUTION

WIRELESS SOLUTION

Short distance (30 meters), low power consumption, short network join time, slow

network speed

Short distance (10 meters), low power consumption,

Long distance (100 meters), high power consumption, high network speed

Key User CGS+ User Key

RS-232 Programmer

RS-232

RMS Device (On- Site) RMS Server Acsys Server

Key User CGS+ User Key

RS-485 Programmer

RS-485

RMS Device (On- Site) RMS Server Acsys Server

Key User CGS+ User Key

Zigbee Programmer

Zigbee

RMS Device (On- Site) RMS Server Acsys Server

Key User CGS+ User Key

Bluetooth Programmer

Bluetooth

RMS Device (On- Site) RMS Server Acsys Server

Key User CGS+ User Key

Wifi Programmer

Wifi

RMS Device (On- Site) RMS Server Acsys Server

BUSINESS LOGIC AND ARCHITECTURE

SITE

NOC

SERVER

Acsys Telecom Client

Acsysconnect Client

Acsys CGS+ Client

RMS Client

Acsys Telecom DB Server

Acsys-RMS Remedy Integration Platform

RMS Server

RMS Device

Acsys Programmer

EXISTING RMS PARTNERS

SECURE IT CONTROL IT MONETIZE IT

www.acsys.com info@acsys.com

top related