Action cameras are small, rugged devices designed to capture high-quality video and images in extreme conditions. They are often used for sports and adventure photography, featuring wide-angle lenses and robust waterproof and shockproof casings. Their compact size and durability make them ideal for capturing fast-paced and immersive footage.
Smartphone cameras: Modern smartphones are equipped with highly advanced camera systems that rival dedicated cameras in many aspects. Smartphone cameras are convenient and always accessible, enabling users to capture high-quality images and videos on the go. They offer features like multiple lenses.
Dome cameras are named for their dome-shaped housing, making them discreet and less noticeable. These cameras are typically mounted on ceilings or walls and offer a wide-angle view, ideal for monitoring large areas such as retail stores, offices, and warehouses.
Bullet cameras, also known as cylindrical cameras, are characterized by their long and tapered shape. They are often used outdoors due to their weatherproof design.
Pan-Tilt-Zoom (PTZ) cameras are highly versatile and capable of covering large areas with a single device. These cameras can pan, tilt, and zoom, allowing for comprehensive surveillance.
Wireless cameras transmit video signals over Wi-Fi, eliminating the need for extensive cabling. They are easy to install and offer flexibility in placement.
Internet Protocol (IP) cameras send and receive data over a network, enabling remote viewing and monitoring from anywhere with an internet connection. They offer high-resolution video and advanced features such as motion detection, video analytics, and cloud storage.
Each type serves distinct security needs, ranging from home monitoring to business surveillance.
Basic operations such as powering on/off, using the viewfinder, and the LCD screen.
ISO stands for International Organization for Standardization, indicating the camera's sensitivity to light. Utilize a low ISO in bright conditions and a high ISO in dim lighting.
Aperture refers to the opening in the camera lens through which light passes, measured in F-stops. A lower F-stop means more light is let in, while a higher F-stop is ideal for bright conditions and sharper focus.
A practical, step-by-step guide for camera installation teams working with Camect, ExacqVision and Avycon Systems. This manual covers essential procedures including system re-imaging, camera integration, remote viewing setup, troubleshooting, and advanced software features. Designed for technicians with hands-on experience, it delivers clear instructions, best practices, and quick-reference workflows to ensure reliable, professional surveillance deployments in any environment.
The Internet of Things (IoT) refers to the way everyday devices—like smart thermostats, security cameras, and even printers—are connected and able to communicate with each other. These smart devices collect and share data to make our lives easier, from automating routine tasks to personalizing our experiences, often without us having to lift a finger.
Whether wired or wireless, think of the network as the backbone of IoT—a channel that lets devices talk to each other. In a typical office, for example, you'll find a WiFi network connecting laptops and computers, a separate network for printers, and remote connections that link different office locations together, making it feel like everyone's in the same room, even if they're miles apart.
Thanks to these networks, you can send a document from your computer to the printer with a click, or cast a presentation from your laptop to the conference room TV via Bluetooth, allowing everyone to share information instantly. Networks also act as a security barrier: people inside the office can access resources from the outside world, but outsiders can't easily reach sensitive information inside—much like looking through a one-way mirror.
IoT and the networks that support it are what make our modern, connected lives possible, seamlessly linking people, devices, and information. Networks in IoT systems are designed with security in mind, using encryption and authentication to protect data and devices from unauthorized access. They also allow for centralized management, making it easier to monitor device health, update software, and enforce security policies.
1. What Is a Network?
2. Network Types & Scale
3. The OSI 7-Layer Model
The OSI (Open Systems Interconnection) 7-Layer Model is a framework that standardizes how devices communicate over a network by breaking the process into seven distinct layers. Each layer has a specific role, working with the layers above and below to ensure data flows smoothly from sender to receiver. Here's a simplified breakdown:
The 7 Layers Explained (From Bottom to Top)
| Layer | Key Role | Example Protocols/Technologies |
|---|---|---|
| 1. Physical | Transmits raw bit streams (0s/1s) over physical media (cables, Wi-Fi) | Ethernet cables, Fiber optics, Wi-Fi |
| 2. Data Link | Manages direct communication between devices on the same network. Adds MAC addresses and error checking. | Ethernet, MAC addresses, Switches |
| 3. Network | Routes data between different networks using IP addresses. | IP (Internet Protocol), Routers |
| 4. Transport | Ensures reliable end-to-end data delivery (error-checking, flow control). | TCP (reliable), UDP (fast/unreliable) |
| 5. Session | Establishes, maintains, and terminates connections between applications. | NetBIOS, RPC |
| 6. Presentation | Translates data into formats applications understand (encryption, compression). | SSL/TLS, JPEG, ASCII |
| 7. Application | Provides interfaces for end-user applications (web browsers, email). | HTTP, FTP, SMTP |
Memorizing all the layers isn't important; understanding their existence is. A layer is a setup partition often discussed by IT, useful for detailed planning. Think of it like a biological environment: microscopic life at the smallest level, trees and flowers at the macroscopic level, and mountains and oceans at the largest level. "High-level" refers to non-technical explanations.
How Layers Work Together
Key Concepts
Why This Matters
4. IPv4 Addressing Basics
5. Subnetting, VLSM & Private Space
6. TCP/IP Model (4-Layer)
7. TCP vs UDP
| TCP | UDP | |
|---|---|---|
| Connection | Oriented (three-way handshake) | Connectionless |
| Reliability | Sequencing, ACKs, retransmits | "Best effort" |
| Overhead | Higher | Minimal |
| Typical uses | File transfer, e-mail, web | Voice/video, DNS, games |
8. TCP Handshakes & Flow Control
9. More TCP Internals
10. Cisco CLI Primer
11. Ethernet & Switching
12. VLAN Fundamentals
13. VLAN Trunking
14. Access Control Lists (ACLs)
15. ARP Essentials
16. DHCP in a Nutshell
17. DNS Basics
18. Static Routing (ip route)
19. RIP v2 Overview
20. Network Address Translation (NAT)
21. Time Synchronization (NTP)
22. Syslog Fundamentals
How to Use These Notes
Imagine transforming your ExacqVision NVR back to its pristine factory state, ready to tackle new challenges or resolve stubborn software issues. Re-imaging your NVR is like hitting the reset button, giving it a fresh start. But remember, this process wipes out all existing data, so make sure to back up your important files before diving in. Let's get started on this exciting journey to restart your NVR!
Step-by-Step Process
When performing a fresh installation we will add new cameras. The process is analogous to adding new controllers to an Xbox. This includes both the physical site and through the ExacqVision MAP. This setup allows for real-time monitoring, alarms, and AI detection provided by ExacqVision. Maintaining a consistent method for adding new devices will ensure a clean and easy-to-navigate final setup.
Adding New Camera and Replacing Camera on ExacqVision Map
Overview
Re-imaging an Avycon NVR is used to restore factory settings or recover from system corruption. This process deletes all data.
How to Use the Avycon CVMS Manual Alarm Triggers
The Avycon CVMS 2.0 software enables manual control of alarm relay outputs for managing external devices such as lights and sirens, enhancing security and enabling real-time monitoring.
Key Functions
Playback Footage in Sync
Backup Footage
Time Slice by Event and by Tag
Step-by-Step: Searching by Date, Camera, and Event
How to Set Up an ExacqVision NVR for Remote Viewing
How to Set Up an Avycon NVR for Remote Viewing
How to Troubleshoot an Avycon Camera Not Showing Up in NVR
How to Set the IP Address in an Avycon Camera
This guide standardizes the installation and commissioning of Camect Smart Camera Hubs across Integrated Security Consultants (ISC) customer sites—ranging from K-12 campuses to high-throughput facilities such as the Coca-Cola bottling plant. It is written for field technicians who physically install cameras and bring new sites online. Follow these steps exactly to ensure reliable video capture, alerting, and Central Station integration.
Important: ISC's reputation rests on zero-downtime security coverage. Deviations from this playbook require written approval from the Project Engineer of Record (PER).
Trouble Tip: A flashing red ring indicates the hub cannot reach the internet—check VLAN ACLs.
Note: Large campuses may use multiple hubs—record Asset ID sticker in ServiceNow.
| Setting | Value | Notes |
|---|---|---|
| Hostname | Matches Hub name | Visible in DHCP & NMS. |
| Full Network Scan | Disabled | Prevents discovery of non-security IoT devices. Navigate ⚙️ Gear → Advanced → Scan local network — uncheck both boxes. |
| Static IP | Yes | Assign per cut-sheet; set DNS to customer internal resolver. |
Use when cameras are on separate subnets or require sub-stream selection.
rtsp://<username>:<password>@<IP>:554/1 # mainstreamrtsp://<username>:<password>@<IP>:554/2 # sub-stream
Steps: ⚙️ Gear → Cameras → Add Camera → Stream URL. Paste URL → Save. Test live view.
Tip: Click the ⚙️ icon under a camera name → Edit URL to switch streams without re-adding.
| Feature | Configuration | Navigation |
|---|---|---|
| Object Detection | Limit alerts to person, vehicle, animal as required by SOW. | ⚙️ Gear → Alerts → Object List |
| Notification Channels | Email (installer), messaging (client), Camect App. | ⚙️ Gear → Alerts → Send alerts by... |
| Disable Auto-Suppression | Required for 24 × 7 monitoring sites (schools). | Alerts → Advanced → Do not auto-suppress similar events |
| Areas of Interest & Ratings | Exclude sidewalks; enforce no-loiter zones. | Camera View → Draw Box → Rating |
| Time Constraints | Detect package trucks 07:00–18:00 only. | Alerts → Time Constraints |
| Loitering | Alert if person stationary > 20 s near entrance. | Create Thumbs-Down rating (loitering=20 s) |
| Line Crossing | Trigger when vehicle crosses perimeter line → gate opens. | Camera View → Draw Red Line (double-click to flip) |
| Sensitivity Mode | Improve thermal/night cameras; expect more false positives. | Alerts → Sensitivity Mode (per camera) |
| Long-Distance Mode | Sporting fields, parking lots. Requires 4K camera & added CPU. | Alerts → Long Distance Mode |
| Task | Frequency | Action |
|---|---|---|
| Review resource usage bar | After adding each camera | Hub Dashboard |
| Submit bug report | As needed | ⚙️ Gear → System → Report Bug (attach logs) |
| Firmware update | Quarterly release | ISC Change Control SOP 16-Q |
| Verify alert delivery to NOC | Post-install & monthly | Immix event log |
| Issue | Cause | Solution |
|---|---|---|
| Blue ring absent | No power or bad adapter | Check UPS outlet, press power button. |
| Hub not discovered | VLAN mismatch | Use laptop on same subnet; manually browse to Hub IP. |
| Excess false alerts | Sensitivity mode on | Disable per camera; review lighting. |
| Immix not receiving alarms | Port 443/554 blocked | Confirm NAT/ACL; test with telnet. |
| Talk-down one-way | Mic muted in Immix | Check PC audio permissions; verify Hub FW ≥ x.x. |
Mobile Access Setup
🔑 EntraPass GoPass enables mobile credentials by requiring users to enter a passcode, select sites, and add doors to favorites for quick access.
Card Holder Management
👤 Adding new card holders in EntraPass GoPass involves inputting essential details like name, email, card type/number, end date, and assigning the appropriate access level.
Application Activation
📱 Activating EntraPass GoPass requires users to check for an activation email, download the app via the provided link, and use mobile credentials to complete the setup process.
Battery Replacement Procedure
🔧 To replace the lithium battery on a KT-1 controller, first remove it from the faceplate by gently pulling, then pinch the clamp at the end and gently push it out, repeating for all four clamps.
Integration and Cost Savings
🔗 Kantech EntraPass Corporate Edition integrates access control with video recording on exacqVision recorders, providing hardware, power, and cooling cost savings.
Installation and Configuration
🔑 To install, log into the restricted user account, then the administrator account (password: admin256) on the exacqVision recorder and follow the installation walkthrough.
🎯 Configure backup targets by launching the Workstation application, logging in with admin admin256, clicking Options > Backup Scheduler, and changing the default location to a removable media or network share.
Registration and Cleanup
📋 Kantech certified technicians must perform the registration process by providing the system serial number to Kantech.
🗑️ After installation, delete the Interpass web icon and Interpass folder to free up over 1 GB of space on the exacqVision server.
Integration and Control
🔐 2 integrates with Kantech Entrapass access control system, enabling users to control doors and locks directly from the live view page.
🕹️ Users can perform access control functions like arming, unlocking, disabling, bypassing, and activating through the live view page and camera links feature.
Event Management and Visualization
🔗 The event linking page allows users to associate access control inputs with events, triggering actions like video recording or notifications when device status changes.
🗺️ exacqVision's mapping function provides a clear visual representation of access control status, showing which entryways are triggered, unlocked, or armed.
Configuration
🔧 The add access control section in the configuration tree displays available functions, including relays, door locks, and readers, based on the connected access control device.
Card Encoding and Compatibility
🔐 ioProx cards are dual encoded with a 26-bit number and an extended family code for 32-bit compatibility, enabling flexible usage across different systems.
Conversion Process
🔄 To convert all cards to a specific 32-bit extended family code, navigate to Options > Display Format, select 32-bit global card format, and choose Yes to create a backup and perform the conversion.
🔁 For auto-converting ioProx cards from 24-bit to 32-bit, select 32-bit global card format in Options > Display Format, choose No to convert all cards, then Yes for auto-conversion, requiring an initial access denied swipe for each card.
System Flexibility
🔓 The dual encoding feature of ioProx cards allows for seamless transition between 26-bit and 32-bit systems without replacing existing cards.
User Experience
👤 During the auto-conversion process, users will experience a one-time access denied message, which is automatically corrected on the subsequent card swipe.
Configuration
Functionality
Troubleshooting Process
Technical Checks
Advanced Features
Efficiency Tools
Maintenance and Support
🔢 Driver Builder requires entering the exact card number, clicking "scan to match", and swiping the card to create a driver for a standard card or legacy controller.
🧮 The raw data from the card must be matched with its binary representation in Notepad, obtained by converting the card number and site code using the Windows calculator.
🃏 In the Wiegand format standard, the 8-bit site code (hexadecimal for alpha characters) is displayed on the left, while the 16-bit card number (binary) is on the right.
🏛️ Driver Builder supports creating drivers for legacy controllers by selecting the appropriate option and following a similar process to standard card driver creation.
Reader Capabilities
🔖 ioSmart card readers can read 6 card types, while multi-technology readers support 9 card types, including additional 125 kHz formats.
Connectivity and Installation
🔌 ioSmart readers connect to controller's D0 and D1 terminals and can be wired in daisy chain or star pattern configurations.
Configuration and Management
🖥️ Reader serial numbers can be retrieved through the operation controller or devices controller interfaces, enabling easy identification and management.
Input/Output Flexibility
🔧 ioSmart readers offer configurable inputs and outputs, including LED inputs, lock outputs, and open collector relay outputs, with up to 750 mA capacity for relay/lock outputs.
Advanced Features
⌨️ ioSmart readers can include an optional keypad, with the ability to define inputs and outputs directly from the reader interface.
Security and Configuration
🔐 The KT-1 requires firmware version 2.0.14 or above for standalone mode and demands encrypted installer or operator login creation, which cannot be reset, emphasizing the importance of password retention.
🛠️ Standalone mode allows selection of two card formats from 31 built-in drivers, adjustment of PIN digits (4-6), and entry of I/O smart serial number for communication setup.
Functionality and Integration
🚪 Users can configure doors, set specific daily/weekly/monthly/annual actions, and integrate with alarm systems using keys exclusive to the door tab.
Data Management
💾 The system prompts for automatic backup of card and schedule information, which is strongly recommended for data preservation and programming purposes.
Activation Process
📋 Customer and installer information must be entered to activate the KT-1, either through the web configuration page, Kantech website, or by contacting technical support.
Reader Compatibility
🔑 IoSmart reader supports multiple card technologies including io smart, Mifare plus, SSF, can tech, and Mifare classic, while Multi tech reader adds compatibility for HID 125 kHz and Tak io procs cards.
Configuration
🔧 When connecting a reader for the first time, select the output format using beep codes: 3 beeps for SSF, 2 for XSF, 1 for 26 bit, and 34 bits for 34 bit format.
Data Processing
🔒 Multi tech readers send raw HID data to the controller for decryption, requiring the correct reader type to be selected under devices controller for proper functionality.
Factory Default Process
System Configuration
Post-Default Steps
Core Components
🔐 Access control systems comprise five key elements: an access controller, reader/keypad, door contact, door strike/magnetic lock, and request to exit unit.
🧠 The access controller acts as the system's brain, continuously monitoring door status and granting access based on programmed credentials.
Functionality
🚪 Door strikes or magnetic locks physically secure entrances, releasing only when the controller grants access.
👋 Request to exit units, utilizing motion infrared detectors or manual buttons, allow credential-free egress from controlled areas.
Security Mechanism
🔢 Access controllers use decryption templates to translate binary reader data into card numbers, granting entry if the decryption matches the card's encryption.
Database Management
Troubleshooting
Software Specifics
Post-Reset Procedure
🔧 Minimum firmware versions required: KT-400 (1.17 rev 1 or 1.23+), KT-1 (1.03+), Neo panel (1.10+), and TL-28R module (4.10+) for successful integration.
🔌 Hardware connection involves linking the Neo panel to TL-28R module via Ethernet, which then communicates with KT-400/KT-1 over Ethernet network.
🖥️ Program Neo panel by accessing subsection 382, selecting option 5 for alternate communications, and ensuring "yes" is selected.
🌐 Configure TL-28R module's IP address in Neo panel by activating numbers 3 and 5 in subsection 851 and 663, then entering KT-400/KT-1's static IP in subsection 693.
🔐 Enable arm/disarm from door by selecting door in Entrapass, enabling multi-swipe, choosing double-swipe action for arm/disarm, and selecting partition to control.
Factory Default Process
Post-Reset Configuration
LED Indicators
Reset vs. Factory Default
🔑 Create new access levels by selecting schedules for each door, allowing granular control over user access rights across different areas of a facility.
🔄 Modify access level schedules in the "definition schedule" section to update access rights for all associated doors simultaneously, streamlining security management.
💳 Add new cards to the system by assigning them names, card numbers, and specific access levels, enabling customized user permissions.
🚪 Swipe cards at readers to test functionality and receive status messages, including "access denied card unknown" for unregistered cards.
👤 Quickly add new users by right-clicking on access denial events and selecting "edit" then "card," automatically populating the card number field for streamlined onboarding.
Holiday Management
Schedule Integration
System Indicators
Backup Management
Restoration Process
System Features
Network Configuration
🌐 KT-400 IP site setup requires selecting a corporate Gateway, specifying the number of controllers, and choosing between "secure IP kt4 100" for KT-400 or "secure IP IP Link" for IP Link as the connection type.
🖧 For non-DHCP configurations, enter a private IP address with subnet, mask, and gateway, then select either TCP or UDP protocol and specify the communication port.
Installation Requirements
🔑 Remote workstations require additional licenses beyond the 2 included in Global Edition and 4 in Corporate Edition of KC Entropass software.
🖥️ The remote workstation must be the exact same version as the server, with firewall exceptions for TCP ports 18000, 18112, and 18101 on both machines.
Setup Process
🔢 Before installation, select the workstation in the registration window and note the workstation installation code for use during setup.
🔗 After installation, register the workstation to the server using the server's TCP/IP address or domain name, authentication password (default: canch), and workstation installation code.
Access and Operation
🔐 To access the remote workstation, click the login button and enter username and password when the workstation is running.
Hardware Reset Procedures
🔧 Hard resetting a KT-400 requires removing JP2 and JP3, pressing reset for 2 seconds, waiting for heartbeat blinking, replacing AP2, and repeating reset process.
🔌 To default an IP-Link, place jumpers between PGM1-I1 and PGM2-I2, wait for rapid heartbeat flash followed by solid light, then remove jumpers.
Network Configuration
🌐 KT-400's default IP is 192.168.1.2, with laptop configured to 192.168.1.3 for setup.
⚙️ Configuring KT-400 involves entering server IP/domain, disabling DHCP if unused, setting local IP, subnet mask, gateway IP, DNS, and selecting UDP/TCP protocol and port.
Card Management
🔑 Special Edition software allows adding new cards via the "user card" menu by entering a card number or swiping the card to generate an "access denied" event.
📸 Right-clicking on a card enables adding a picture from file, which will display when the card accesses a door.
Access Control
🔐 The "access level" setting determines card privileges, ranging from "none" (no access) to "always valid" (24/7 access to all doors).
🗓️ Setting a "card expiration date" automatically deletes the card on the specified date, while changing the "card state" to "expired" deletes it immediately.
Email Notification Setup
🔧 Ensure Smart Link is running and communicating with the server, and the email server doesn't require authentication or face antivirus blocking.
📧 Create an email task in the Definition Task Builder for Smart Link, specifying from address, subject, and body with event text, date, and time in a specific format.
Event Triggering
🔔 Configure the event trigger by linking it to a specific event, selecting the door component, and specifying either a single door or trigger group.
Troubleshooting
🔍 Check system and operator logs for concurrent login and Smart Link transactions to verify successful email sending.
📊 Validate email sending by reviewing the Smart Link transaction list for successful sends and confirming receipt in the recipient's email account.
Alarm Configuration Process
Alarm Desktop Setup
Alarm Settings and Behavior
Card Management Techniques
Access Control Features
System Management and Auditing
CSV Import Process
Data Validation and Formatting
File Preparation
🛗 KT-400 requires either two KT module RL8 or one KT module output 16 for elevator control, with additional 12V 1A power supply needed if SPI module draws over 500mA.
🏢 Maximum cab flow is 64 floors with module RL8 and 4 connected with output 16, while max cabs per controller are 32 (RL8) or 16 (output 16).
🖥️ In EntraPass software, define modules as elevator equipment under Devices Controller > Gateway > Controller > Kit Number > Package 400 tab, specifying door numbers and relay outputs for each cab.
🔓 Unlock schedules for floor groups are set in the Elevator tab, allowing access to specific floors based on predefined time periods.
🔑 User access to floor groups is managed by creating new access levels in the Users > Edit Card section, enabling controlled elevator usage based on individual permissions and schedules.
Installation and Configuration
Software Setup
Testing and Functionality
Overview of Gentec
Gentec is a leading provider of advanced security and surveillance solutions, recognized for its innovative products in video surveillance, access control, and alarm management. Gentec's product suite is widely used in commercial, industrial, and institutional environments, offering scalable and integrated security platforms designed to protect people, property, and data.
Key Gentec Product Lines
Omnicast -- Video Management System
Omnicast is Gentec's flagship VMS, supporting a wide range of IP cameras from various manufacturers. Key features include:
Synergis -- IP-Based Access Control
Synergis offers a flexible and scalable access control solution:
Gentec's Security Center platform allows for unified alarm management:
AutoVu -- ALPR Solution
AutoVu enables automated detection and logging of vehicle license plates:
Genetec Security Center brings together all Gentec systems into a single interface:
| Product Name | Function | Key Features |
|---|---|---|
| Security Center | Unified security platform | Video, access, ALPR, alarms integration |
| Omnicast | Video management system (VMS) | Multi-brand IP camera support, analytics |
| Synergis | IP access control | Real-time monitoring, credential management |
| AutoVu | ALPR system | Fixed/mobile cameras, watchlist integration |
| Streamvault | Security appliances/servers | Optimized for Genetec software |
| Mission Control | Incident management | Automated workflows, response coordination |
| Clearance | Digital evidence management | Secure sharing, case management |
Overview of Avigilon
Avigilon, a Motorola Solutions company, is renowned for its advanced security and surveillance technologies. The company focuses on delivering high-definition video, AI-powered analytics, and unified security platforms for enterprise, commercial, and public sector environments.
Newest Avigilon Product Lines
H6A and H6X Camera Series
Avigilon Alta (Cloud Platform)
Avigilon Unity Platform
Avigilon Appearance Search™ and AI Analytics
Avigilon Video Intercom
| Product Name | Function | Key Features |
|---|---|---|
| H6A/H6X Camera Series | AI-enabled surveillance cameras | 4K/8K video, advanced analytics, WDR |
| Avigilon Unity Platform | Unified security management | Video, access, analytics integration |
| Avigilon Alta | Cloud-native security | Remote management, AI analytics, mobile app |
| Avigilon Control Center 8 | Video management software | Advanced analytics, Appearance Search™ |
| Avigilon Video Intercom | Access control & visitor management | Touchscreen, camera, AI analytics |
| Avigilon Radio Alert | Instant notifications | Radio integration, real-time alerts |
In physical security and network infrastructure, a "runoff" is the critical process of estimating the total length of cabling required for a project before physical installation begins. Accurate runoffs ensure that teams order the correct amount of CAT6 for IP cameras, fiber optic cable for network uplinks, and electrical wiring for power supplies, minimizing both material waste and project delays.
Technicians and estimators typically calculate runoffs using digital blueprints. This involves mapping the exact path a cable will take from the IDF/MDF (telecom room) to the edge device (like a camera or card reader). Calculations must account for horizontal distances across the floor plan, vertical drops through walls or conduits, and "service loops" (extra cable left at the ends for future maintenance).
Digital estimation tools, such as the measuring features in Adobe Acrobat or specialized CAD software, allow technicians to set a scale (e.g., ¼ inch = 1 foot) and trace the wire paths directly on the digital floor plan.
[ELECTRICAL PANEL]
│
├───[POWER]──────Office 1 (Outlet)
│ │
│ ├──────Office 2 (Outlet)
│ │
│ └──────Conference Room (Outlet)
│
├───[DATA]───────Server Room (Ethernet Switch)
│ │
│ ├──────Access Point 1 (CAT6)
│ │
│ └──────Security Cameras (Coaxial/PoE)
│
└───[COMMS]──────Telecom Room (Fiber Optic)
│
└──────Front Desk (Phone Line)
Have made significant progress in automating parts of the runoff process. What about preventing miscalculations from the AI? The method uses source documents which I provide from the training manual, which grounds the AI in truth. Then I set guardrails to be factual. This uses Perplexity AI Pro.
"For the building blueprint, count the number of smoke alarms, the number of rooms, the number of manual pull stations, the number of strobes"
Perplexity AI: Here are the counts based on the provided building blueprints:
SMOKE ALARMS; 82
- FIRST FLOOR: 18 rooms
- SECOND FLOOR: 32 rooms
- THIRD FLOOR: 32 rooms
| Room Labels | Wire (ft) | Detectors | Area (sqft) | # Rooms | Total Building Wire (ft) | Total Building Area |
|---|---|---|---|---|---|---|
| A1 | 118 | 2 | > 939 | 44 | 5,192 | 41,316 |
| A2 | 93 | 2 | > 911 | 10 | 930 | 9,110 |
| A3 | 109 | 2 | > 822 | 1 | 109 | 822 |
| B1 | 63 | 3 | > 900 | 92 | 5,796 | 82,800 |
| B2 | 40 | 3 | > 902 | 9 | 360 | 8,118 |
| B3 | 69 | 3 | > 1027 | 10 | 690 | 10,270 |
| B4 | 118 | 3 | > 939 | 9 | 1,062 | 8,451 |
| B5 | 93 | 3 | > 911 | 10 | 930 | 9,110 |
| B6 | 109 | 3 | > 822 | 20 | 2,180 | 16,440 |
| C1 | 68 | 3 | > 1178 | 20 | 1,360 | 23,560 |
| C2 | 83 | 4 | > 1166 | 2 | 166 | 2,332 |
| Total | > 963 | 31 | > 10,517 | 227 | 18,775 | 212,329 |