acsys iot rms integartion for the passive ......the software dashboard is populated by the...
Post on 26-May-2020
3 Views
Preview:
TRANSCRIPT
ACSYS IOT RMS INTEGARTION FOR THE PASSIVE INFRASTRUCTURE INDUSTRY
www.acsys.com info@acsys.com
COMPANY PROFILE
Acsys is a global leader in the emerging field of mechatronics access control. With technology originating from two famous French defense contractors in 1999, Acsys products and solutions provide a powerful means to control who goes where and when, indoors and outdoors, without wiring and without reliance on a power supply. A highly specialized international team delivers world-unique, patented solutions. From the Code Generation System (CGS) and Keypad Key to remote staff management via the AcsysMobile App, the modular, and solution-oriented approach sets Acsys apart from other security competitors. With top-tier clients in the public and private sectors extending across telecommunications, banking, power, mining, logistics, luxury shops, aviation and more. Acsys proves why it’s all about security & productivity!
OFFICES : CHINA/INDIA/UGANDA/MEXICO/UAE/SAO PAULO/LAGOS CLIENT BASE IN 48 COUNTRIES
INTRODUCTION
The Telecom Industry has become an integral part of humans daily life, and therefore mobile network dependency has significantly increased in the last years and the Telecom industry at large is now classified by many countries as “Critical Infrastructure”
In order to increase customer reach, increase quality of service and reduce costs, the Mobile Network Operators (MNO) have in the past years decided to work together and share parts of each other’s networks
This process has created an infrastructure principle called “co-location” whereby several operators (mostly up to 4) are located on the same cell tower and share the cost; in practice, MNO’s who entered in such agreements quickly realized that ‘managing’ these sites with the added tenants is not simple.
The co-location also brings with it a new set of operational requirements, such as itemized billing for Power and other services, but also a requirement for adapted access solutions to safeguard the integrity of the site and assets
The creation of Tower Companies in the past 10-15 years, was essentially driven by the Telecom industry’s need to free up capital tied up in the sites that it owned, but also to bring a new management approach to managing co-located sites with as purpose to reduce site Opex
As one of the biggest expenditure on Telecom sites is Power, whether AC or DC, it became a requirement for MNO’s and Tower companies to deploy remote monitoring solutions (RMS) to monitor the availability and quality of Power but also to provide a remote overview of power consumption for each tenant individually, on co-located sites. The RMS solutions were also deployed to capture other site information such as refuelling and fuel tank status, battery status, rectifier status, grid power status, generator status, solar/wind power status, Temperature control and various other ‘value-add’ data creating solutions such as Access control and Time & Attendance control with as purpose to increase site operational visibility and control
For most MNO’s and Tower companies, the industry adoption of the co-location principle, brought with it a number of challenges and this regarding access to sites and assets which was for most, and until this day, managed with antiquated mechanical solutions which proved totally un-adapted to the new operational requirements.
The Acsys solutions were designed based on the requirements of both MNO and Tower companies and the solution allows them to remotely manage access to sites and assets through the now well-established “REAL TIME KEY CONTROL” CGS+ solution
Acsys wire-free solutions are a true complement to any RMS solutions as it adds another layer of operational control and visibility at NOC level which has now proven to be critical to control sites, users and reduce costs.
Front Gate BTS Shelter Generator Batteries Fuel Tank Cabinet Tower Users/Vendors
TELECOM SITE PROBLEMS
TOWERCO PASSIVE INFRA PROBLEMS TENANT/MNO ACTIVE INFRA PROBLEMS
MNO EQUIPMENT INSTALLATION
VANDALISM
NON ATTENDANCE
UNDER PERFORMANCE
OVER BILLING THEFT
SITE ACCESS SITE CONTROL
FINANCIAL IMPACT
PROCEDURAL IMPACT
NON ADHERENCE TO SLA
VANDALISM
NON ATTENDANCE
UNDER PERFORMANCE
OVER BILLING THEFT
SITE ACCESS ASSET CONTROL
FINANCIAL IMPACT
PROCEDURAL IMPACT
THE VALUE OF INTEGRATION
Acsys is a technology/solution and when it comes to RMS we will co-operate with any RMS vendor which shares the same level of competencies and desire to provide lasting and durable field solutions
Based on our experience, we can see that there is real demand and logical product offering in combining access control and remote monitoring of sites and assets as these are closely inter-related
The ability to monitor and capture site data and correlate that data with access to an asset is a very valuable proposal as it directly links Site Event with Site Opex
The creation of a site/asset event and related remote access control is critical in evaluating adherence to SLA’s
Moreover, by creating an additional information layer that makes access to a site/asset CONDITIONAL upon the creation of a site/asset Event, the NOC will be able to manage its resources more efficiently and have the ability to pro-actively prioritize site maintenances
The single SOFTWARE PLATFORM is of course the strongest joint offering as it consolidates all the DATA STREAMS on one database and gives the NOC or Management a clear overview of what is going on, and going wrong with the sites/assets
The ability to monitor, capture and relay data from the site remotely, and through the same platform control the access required to that site/asset creates an efficient and flexible site management solution
The ability to combine the joint offering with ERP/MRP/OSS and Trouble-ticketing platforms gives the highest possible form of site access control but will also reconcile all site Opex productive data giving the customer a clear, real-time cost per site overview, and the ability to set “Reliability Benchmarks” on items such as Generators, Batteries, Rectifiers and other active infra assets
ACCESS CONTROL IS AN INTEGRAL PART OF REMOTE SITE OPERATIONS
Enterprise Resource Planning
Trouble Tickets System
Remote Monitoring
Systems
Operations Support System
Material Requirement
Planning
REQU
IRES ACCESS
REQU
IRES ACCESS
REQU
IRES ACCESS
REQU
IRES ACCESS
REQU
IRES ACCESS
ACCESS CONTROL
RMS
THE VALUE OF INTEGRATION
By using advanced mechatronic solutions, every access point on a cell tower can be DATA GENERATING
The data is usually “Productive Data” as it contains elements such as Arrival and departure time which are directly connected to Billing, ERP and SLA’s
The Productive data is also real-time remote key control and the ability to remotely control who can go where, when, why and how and for how long, which transforms into pro-active remote worker Productivity control
Every asset that is monitored by an RMS solution also needs to be secured and access to it controlled, so integration of both platforms is of great added value to the customer
RMS ACCESS
BTS
MAIN GATE
GENSET
FUEL TANK
BATTERY
RMS ACCESS
RMS ACCESS
RMS ACCESS
RMS ACCESS
REPORTS
ACCESS & MONITORING POINTS RMS ACCESS
REAL-TIME KEY CONTROL = PRODUCTIVITY CONTROL
Who is on the site? Why are they on the site? Who do they work for? What are they doing there? Was the job done? When was it done? Was it done well? How long did it take?
? TOWERCO & MNO COMMON PROBLEMS
VALUE-ADD DATA FOR MNO/TENANT
COMPATIBLE ON ALL SITES & ASSETS
Front Gate BTS Shelter Generator Batteries Fuel Tank Cabinet
COST/OPEX REDUCTION Clear real-time wire-free control over what can be accessed by whom and when (Security) Clear record of what was accessed, by whom, for what reason and for how long (Productivity) Access records correlated with OSS/ERP to set KPI’s for preventive/corrective/emergency maintenance (Efficiency) One key & password for every lock, visit more sites per day (Flexibility)
THE ACSYS OTP PASSWORD KEY – WIRE-FREE REAL-TIME KEY CONTROL
The Acsys OTP (One Time Password) key applies the concept of online banking tokens to 21st century locking solutions and is unique and patented worldwide by Acsys Technologies and affiliated companies WORKING PRINCIPLE A key is programmed and assigned to a user, and can technically open all the locks on the
system where it was created making it operationally very flexible The key doesn’t use any Access Rights, instead it uses Access Codes which are random, 6-
10 digit codes which are created by the software and sent to the user by SMS or Smartphone App or communicated orally by phone; the code is punched in on the key’s keypad making it temporarily active and only on the locks that the NOC wants to be opened
The Access codes solution allows the NOC to control WHICH Site(s) can be accessed, by WHOM, WHEN, and for HOW LONG.
Moreover the access codes solution also allows the NOC to control which Asset(s) on the site(s) can be accessed by whom, when and for how long, offering a radically new way to control access on remote sites and assets
When integrated with a Trouble-ticketing, Enterprise Resource planning, Operations Software or RMS the access codes are only issued ‘on demand’, and only when a request is in the system, then an associated opening code can be obtained and only by the authorized user(s)
With the Acsys Smartphone App, the code is only issued when the user has reached the preset location, this is also known as ‘location-based access control’ and provides a real-time control and verification of site access
If a Key is lost or stolen, only the phone number associated with it needs to be deleted from the system, no further updates are required
ANY PHONE
SMARTPHONE
SMARTPHONE
ACSYS TELECOM SOFTWARE PLATFORM
The Acsys Telecom software is the Control Platform where all site/asset Entry/Exit requests and access records are centralized and processed All scheduled and known maintenance access requests will be processed automatically by the system and associated OTP (One time password)
codes issued to the users; for all other access requests, the NOC has the option to handle them by email, SMS, App or other mediums available and always by using Acsys patented OTP CGS+ solution making the Access to a site/asset controlled and secured
The software dashboard is populated by the site/asset access requests and any 1/3 party integration (such as ERP/OSS/TTS) to give the NOC a clear view of who is going where, when, why, for how long and in real-time
Under-performance (i.e. less time than planned) or Over-performance (i.e. more time than planned) is carefully correlated with existing KPI’s Maintenances can be categorized by type/vendor/gravity to efficiently allocate the resources where they are the most needed, and escalation
alarms can be included to alert when SLA requirements are not met Integration with Acsys App solution(s) allows for real-time tracking of users, real-time view of site pictures before and after the works, and visual
follow up of trouble tickets as well as ‘Time2site’ evaluation
MARKET APPROACH & DRIVERS O
PEX
REDU
CTIO
N
Secured and controlled access
Predictive maintenance
KPI/SLA adherence
ERP/MRP Integration & Loopback
Site visit and billing integration
Site attendance integration
Trouble ticketing Integration
Time to site integration
Flexibility of Access
SITE DATA SITE DATA
Was the Job done?
When was it done?
When did they arrive?
How long did they stay?
How well did they do the job?
Reduction in Down-time
Ease of Access
Theft prevention & control
What did they fix and why?
PRIMARY DRIVERS EFFICIENCY - SECURITY
SECONDARY DRIVERS PRODUCTIVITY - FLEXIBILITY
PRO
DU
CTIV
ITY/
PRO
FITA
BILI
TY IN
CREA
SE
ACSYS MODULAR SOFTWARE APPROACH
The Acsys Telecom software adopts a module architecture, allowing the customer to select and only pay for what they really need, and the stack approach enables easy upgrade/downgrade without affecting operations
ACSYS RM
ACSYS ERP/MRP
ACSYS TICKETING ACSYS CGS+
ACSYS CLOUD ACSYS MOBILE
ACSYS RMS
Remote Management Cloud Hosting Module
ERP/MRP/OSS Integration
SOFTWARE PLATFORM
Smartphone App module
Remedy & Footprint module
Real-time Remote Key Control
Remote Monitoring
ACSYSWATCHDOG Customized Alerts & Alarms
ACSYS TELECOM AND RMS INTEGRATION
FULL OR PARTIAL INTEGRATION ?
When it comes to integrations there are various ways to execute them and each will provide different type/kind of results hence the importance of a clearly defined specifications and requirements document which is usually drafted together with the end-user
Traditionally RMS manufacturers had been proposing Access control solutions as part of their offering. The access control part is mostly wired, power and data dependent and therefore not really scale-able as it can require a lengthy and complicated installation . Moreover wired systems are hard to install on gates, fences enclosures or even 3G/4G cabinets and in the absence of power or data, an override mechanism needs to be available making the solution limited in scope of applications on a cell site
The wire-free, power-free and maintenance-free solutions from Acsys can SECURE ANY ACCESS POINT on a site making it flexible, scale-able and a complete solution for all sites and assets
When integrating, there are two possible customer approaches regarding the combined software offering and that is making either Acsys the front-end application that manages Access and RMS, or making the RMS software the front-end application to manage RMS and Access
We define Partial Integration as a solution to combine the offering of Acsys and the RMS supplier but without therefore fully integrating the software; in fact a Middle-Ware is created to specifically “Push” data from the Acsys database to the RMS database and display the results on the RMS User Interface
We define full integration as a joint-offering that completely integrates both software and business logic into a single platform, creates a single database instance and is managed from one UI only
Both Partial and Full Integration may or not be combined with Hardware integration depending on the customer requirements Both Partial and Full Integration may or not be combined with other integrations with ERP/MRP/OSS/Ticketing software to
provide an even more complete control solution Because of the Acsys Modular software structure, there is a lot of flexibility in designing integration modules and their
deployment can then be done seamlessly and without affecting any operations Another major advantage of the module structure is its FLEXIBILITY as different solutions can be deployed for different
countries/regions but all managed from one central location The App services offered by Acsys are all customer driven developments and are therefore always value-added, so whether it
be the GPS position of user or the picture taking function, all have as target to reduce site Opex
INTEGRATION MODELS
PARTIAL INTEGRATION
FULL INTEGRATION
CONTROL CENTER/NOC
RMS SOFTWARE RMS
XYZ
CONTROL CENTER/NOC
RMS SOFTWARE
XYZ
RMS
AUTOMATING ACCESS CONTROL = ACCESS ON DEMAND
One of the critical points when managing remote sites and users is the management of the productive data emanating from the sites and users
The purpose of advanced mechatronic locking solutions is to bring flexibility as well as usability to the day to day operations; so by automating the Requests, Validations and Issuance of codes, the workload is reduced, the chance of making mistakes is removed and operational productivity will be increased
Whether it is an ERP work order, a Trouble Ticket or any other form of operational tasks that also requires an access, these can be transformed as CODE TRIGGERS to automate the access control part and leave the manual code generation to special cases only.
So as explained in the above slide, if user XYZ is requested by a work order to visit site ABC, and user XYZ uses his registered phone number to get access to site ABC, then it is but normal that the software immediately and automatically generates a code for user XYZ to access site ABC, this is also illustrated in the next slide
As also explained above, this integration also allows for software to SELECTIVELY provide access only to the assets that user ABC is required to access
By also adding the “location-based access control” feature, the system will be able to add another CODE TRIGGER which is the actual user GPS position; this feature gives a clear and irrefutable record of site attendance and can therefore also be used to Validate the access request
As software is the only limit, there are an infinite number of possible combinations that can be created to allow the NOC to get the control they want, and get the information they want
In the case of RMS it is of course evident that if a fault was reported by the RMS for a certain asset, that this fault needs to be attended to, and therefore logical to grant the dispatched user(s) access on those assets which require the maintenance
This principle is called ACCESS ON DEMAND and is becoming an integral part of “Site Access Policy” for most leading MNO and Towercos as it simplifies, streamlines and renders access management more efficient and flexible and allows NOC operators to focus on ad-hoc access requests knowing very well that all other requests are automated
This solution can be further enhanced by using tools such as the Acsys App which allows the key user to capture real-time pictures of the execution and quality of works associated with his access; this information is stored centrally and will give the NOC Operator a clear overview report which may include : Ticket Nr, Time/Date, Assignation time, On-site arrival time, Code Request time, Code Verification basis, Code Issuance time etc..
AUTOMATED EVENT AND GPS BASED ACCESS
REJECTION = ALARM
SITE ABC USER
1. USER XYZ NEED ACCESS SITE ABC
2. USER XYZ REQUESTS ACCESS FOR SITE ABC BY CALL/SMS/APP
VERIFICATION 1
VERIFICATION2
3.1 WORK ORDER YES/NO?
3.2 GPS LOCATION OK?
VALIDATION
4. WORK ORDER + LOCATION = CODE CAN BE ISSUED
WORK ORDER GPS POSITION
REJECTION
GPS POSITION CONTROL CENTER
WORK ORDER
CODE SITE ABC
USER
5. CODE WILL BE ISSUED TO USER BY CALL/SMS OR APP
SEGMENTED EVENT BASED ACCESS CONTROL
One of the strong attributes of the Acsys solution is the “segmentation” of access rights to users Based on the CGS+ platform, the system is able to generate code(s) that will only allow the user to have access to specific equipment and
not others This ‘segmentation’ prevents theft, deterioration and channels the users to the right assets and allows the NOC to really control where
the users can go When integrated with the RMS the segmentation goes to another level and allows the system to AUTOMATICALLY generate codes based
on specific RMS data so for example : USER XYZ Ticket 123 was generated for a battery failure for site 123ABC Ticket 123 is assigned to user XYZ from battery vendor User XYZ arrives at site 123ABC and requests code Software will generate code for Front Gate and Battery cabinet only USER FKG Ticket 456 was generated for a Generator failure for site 123ABC Ticket 456 is assigned to user FKG from Cummins User FKG arrives at site 123ABC and requests code Software will generate code for Front Gate and Generator only
The segmented access control is only one of the main features to control access and eradicate theft caused by people accessing assets to which they don’t have access
The segmented access control feature is also an important element to collect, analyse, correlate and use access records to set KPI’s or productivity benchmarks as the data is TARGETTED
So if for example 25 tickets were created for a Generator failure of the same brand/type and this maintenance takes on average 30 minutes, then the time spent on site/asset by each and every user can be used as a benchmark
Equally if the user(s) for these maintenances spend only 20 minutes or 60 minutes on site, this information can be collected and used to determine under-performance or even non-execution of works on one hand but also allow the NOC to detect over-time spent on site/asset which might be caused by lack of skills/competencies/training etc..
RMS EVENT-BASED ACCESS CONTROL
STEP 2: TICKET NR ABC123 FOR USER XYZ 12/04/2016 11:55AM
STEP 4: USER XYZ CLOSE SITE
12/04/2016 17:34PM
STEP 3: User XYZ OPEN SITE
12/04/2016 16:25PM
STEP 1: TICKET NR ABC123 BATTERY FAILURE 12/04/2016 11:41AM
SYSTEM DATABASE
NOC
RMS
STEP 5: TICKET ACCEPTED 11:55AM ARRIVED ON SITE 16:25 PM
LEFT SITE AT 17:34PM TIME ON SITE 4HRS 9 MINS
KPI : OK SLA : OK
TICKET NR ABC123 FOR USER XYZ
XYZ
SITE ABC
ACSYSTELECOM AND RMS SOFTWARE ARCHITECTURAL INTEGRATION
PARTIAL INTEGRATION APPROACH
WAN/INTERNET
Integration Architecture All integration is performed through
web services in IIS The 3rd Party RMS/Ticketing platform
sends HTTP request to the integration platform through port 80
3rd Party RMS/Ticketing platform server
MS SQL Server 2008 R2 - Acsys Telecom DB &
Stored Procedures - Acsys CGS+ DB &
Stored Procedures Integration Web Services
ACSYS SERVER
WEB SERVICE RMS INTEGRATION FUNCTIONS: GetAllActiveKeyUsers Gets all active key users information including first name and last name. GetAllLocks Synchronize all the locks in Acsys system with RMS system GetCGSPlusDynamicPassword Get CGS plus code using mobile number, operation type and pin code for a specific site. The sms format is ‘[O|C],[Site ID],[PIN Code]’ GetCGSCodeRequestLogs Get all the request logs filtered by specific key user and date/time (if successful, return all the logs, otherwise, return null). startDate and endDate format like’yyyy-MM-dd HH:mm:ss’ ModifyClusters Synchronize the Clusters in the RMS system with Acsys system ModifyCountries Synchronize the Countries in the RMS system with Acsys system ModifyRegions Synchronize the Regions in the RMS system with Acsys system ModifySites Synchronize the Sites in the RMS system with Acsys system ModifyUserKeys Synchronize the Employee information in the RMS system with activate user keys with Acsys system UpdateSyncLockResult Check if all locks are synchronized properly with Acsys system.
PARTIAL INTEGRATION MODULES
MODULE CONNECTIVITY
SMS Gateway Outgoing: Port 80 (TCP)
Acsys Server: SMS Gateway Server Incoming: Port 80 (TCP)
Acsys Telecom Client Outgoing: Port 1433 (TCP), 1434 (UDP)
MSSQL Server 2008 R2 – Acsys DB Instance Incoming: Port 1433 (TCP), 1434 (UDP)
Acsysconnect Client Outgoing: Port 1433 (TCP), 1434 (UDP)
MSSQL Server 2008 R2 – Acsys DB Instance Incoming: Port 1433 (TCP), 1434 (UDP)
Acsys CGS Plus Client Outgoing: Port 1433 (TCP), 1434 (UDP)
MSSQL Server 2008 R2 – Acsys DB Instance Incoming: Port 1433 (TCP), 1434 (UDP)
Acsys App Relay Server Outgoing: Port 7732 (TCP), 9058 (TCP)
Acsys Mobile App Server Outgoing: Port 1433 (TCP), 1434 (UDP) Incoming: Port 7732 (TCP), 9058 (TCP)
3rd Party ERP System Outgoing: Port 80 (TCP)
3rd Party ERP Integration Platform Incoming: Port (80)
3rd Party RMS System Outgoing: Port 80 (TCP)
3rd Party RMS Integration Platform Incoming: Port (80)
Acsys Mobile App Server Outgoing: Port 1433 (TCP), 1434 (UDP) Incoming: Port 7732 (TCP), 9058 (TCP)
MSSQL Server 2008 R2 – Acsys DB Instance Incoming: Port 1433 (TCP), 1434 (UDP)
PARTIAL INTEGRATION SOLUTION OVERVIEW
Field Engineer
REGION 1 / CLUSTER 1
Programmer RMS Device (On Site)
INTERNET /WAN
Client 1 Acsys Telecom Client (optional) Acsysconnect (optional) Acsys CGS PLUS Client (optional) VPN Client
REGION 1 / CLUSTER 2
Acsys Primary Server -MS SQL SERVER 2008 R2 Standard Edition -Acsys Telecom DB instance-SMS Gateway Server -Acsys Backup Module -Acsys APP Server -VPN Server -Acsys Telecom Client (Optional) -Acsys CGS PLUS Client (Optional) -Acsys-3rd Party ERP Integration Platform -Acsys-3rd Party RMS Integration Platform
3rd Party ERP Server
3rd Party RMS Server
SMS Gateway
LAN (HQ)
Field Engineer NOC User USB Programmer
VPN
RMS HARDWARE INTEGRATION POSSIBILITIES
Short distance (point to point connection)
Long distance (multi device BUS connection)
WIRED SOLUTION
WIRELESS SOLUTION
Short distance (30 meters), low power consumption, short network join time, slow
network speed
Short distance (10 meters), low power consumption,
Long distance (100 meters), high power consumption, high network speed
Key User CGS+ User Key
RS-232 Programmer
RS-232
RMS Device (On- Site) RMS Server Acsys Server
Key User CGS+ User Key
RS-485 Programmer
RS-485
RMS Device (On- Site) RMS Server Acsys Server
Key User CGS+ User Key
Zigbee Programmer
Zigbee
RMS Device (On- Site) RMS Server Acsys Server
Key User CGS+ User Key
Bluetooth Programmer
Bluetooth
RMS Device (On- Site) RMS Server Acsys Server
Key User CGS+ User Key
Wifi Programmer
Wifi
RMS Device (On- Site) RMS Server Acsys Server
BUSINESS LOGIC AND ARCHITECTURE
SITE
NOC
SERVER
Acsys Telecom Client
Acsysconnect Client
Acsys CGS+ Client
RMS Client
Acsys Telecom DB Server
Acsys-RMS Remedy Integration Platform
RMS Server
RMS Device
Acsys Programmer
EXISTING RMS PARTNERS
SECURE IT CONTROL IT MONETIZE IT
www.acsys.com info@acsys.com
top related