Before initiating any project, several attributes are taken
into consideration. Therefore, I did some online research to understand the
flowchart and the steps followed in the execution of projects by the organisations
related to CCTV (IP) Security. Below is the hierarchy of the steps involved
followed by a flow chart for lay man understanding:
Steps
of Project Planning
|
Description
|
Understanding the requirement
|
As
every individual have their own requirement and purposes behind installing
cameras, the first stage is to understand it by communicating with the end
users and then creating a blue print of how things will be implemented and
the project will be executed.
|
Assigning a visit (If required)
|
A supervisor or a technician is
then sent to the project site where he, based upon his experience can
suggests the critical points where chances of trespassing is maximum and also
suggest the locations for the cameras to be installed, to provide maximum
coverage and hence, barring any possible theft.
|
Designing Solution
|
After site visit the supervisor then
designs all the possible solutions and choose the best among them by cross
checking if the requirement of the customer is being fulfilled. And finally,
create a quotation for the end user by briefing them about the estimated cost
for the whole project
|
Negotiations
|
The customer then checks his budget
and do certain negotiations with the vendor to bring the cost of the project
into his reach and finally give green signal to execute the project.
|
Execution
|
In this phase, the vendor allocate a
team of technicians for project realisation and then send them over to the
site with all the products specified in the solution and installation and
commission of the cameras gets started, while complying with the guidelines
given by both supervisor and client.
|
Site handover
|
Finally, brief overview of all the
installed system is given to the customer. Along with this, he is explained
how to check the views of the cameras on local or remote network via
different software or mobile applications. He is also asked to setup a
password of the whole system and advice him not to share it with any outsider
by assuring 100% safety of the consumer.
|
Flow Chart |
No comments:
Post a Comment