Saturday, February 15, 2020

Project Planning

Project Planning for CCTV Installation:

Before initiating any project, several attributes are taken into consideration. Therefore, I did some online research to understand the flowchart and the steps followed in the execution of projects by the organisations related to CCTV (IP) Security. Below is the hierarchy of the steps involved followed by a flow chart for lay man understanding:

Steps of Project Planning
Description
Understanding the requirement
As every individual have their own requirement and purposes behind installing cameras, the first stage is to understand it by communicating with the end users and then creating a blue print of how things will be implemented and the project will be executed.
Assigning a visit (If required)
A supervisor or a technician is then sent to the project site where he, based upon his experience can suggests the critical points where chances of trespassing is maximum and also suggest the locations for the cameras to be installed, to provide maximum coverage and hence, barring any possible theft.
Designing Solution
After site visit the supervisor then designs all the possible solutions and choose the best among them by cross checking if the requirement of the customer is being fulfilled. And finally, create a quotation for the end user by briefing them about the estimated cost for the whole project
Negotiations
The customer then checks his budget and do certain negotiations with the vendor to bring the cost of the project into his reach and finally give green signal to execute the project.
Execution
In this phase, the vendor allocate a team of technicians for project realisation and then send them over to the site with all the products specified in the solution and installation and commission of the cameras gets started, while complying with the guidelines given by both supervisor and client.
Site handover
Finally, brief overview of all the installed system is given to the customer. Along with this, he is explained how to check the views of the cameras on local or remote network via different software or mobile applications. He is also asked to setup a password of the whole system and advice him not to share it with any outsider by assuring 100% safety of the consumer.
Flow Chart






No comments:

Post a Comment