Traditional Culture Encyclopedia - Hotel franchise - Hotel weak current system construction scheme?

Hotel weak current system construction scheme?

Hotel weak current system construction is complex, with many contents and high requirements. Therefore, before writing the construction plan, you should be clear about the design content and requirements, and you should be quite familiar with the drawings and related specifications.

In addition to the safety, quality and schedule assurance measures, organizational setup and personnel input arrangements and tools, the contents generally need to be written in the following table:

Excerpts from some major chapters are as follows:

The first section preparation work

The project implementation and quality control of 1. 1 should include handover with the previous project, preparation of project implementation conditions, acceptance of equipment and materials entering the site, inspection and acceptance of concealed works and processes, quality inspection of project installation, system self-inspection and trial operation, etc.

1.2 Before the implementation of the project, the process handover shall be carried out, and the interfaces with sub-projects such as building structure, building decoration, building water supply and drainage, heating, building electricity, ventilation and air conditioning, elevators, etc. shall be confirmed.

1.3 before installation, the integrity of engineering design documents and construction drawings must be checked, and the intelligent building project must be implemented in accordance with the approved construction drawing design documents; In case of design change of the project, the design change audit form shall be filled in according to the requirements of Table B.0.3 in Appendix B of Code for Quality Acceptance of Intelligent Building Engineering (GB50339-2003).

1.4 equipment, materials and software must be checked and accepted according to the requirements of technical documents and engineering design documents in the contract. There should be a written record for the entry acceptance, which should be signed by the participants and signed by the supervision engineer or the construction acceptance personnel. Equipment, materials and software that have not passed the acceptance inspection shall not be used and installed in the project. Qualified equipment and materials shall be properly kept according to product technical requirements.

1.5 The entry acceptance of equipment and materials shall be completed in Appendix B, Table B.0. 1 of Code for Quality Acceptance of Intelligent Building Engineering (GB50339-2003). The specific requirements are as follows:

1.5. 1 Ensure that the appearance is intact, the products are free from damage and defects, and the variety, quantity and origin meet the requirements;

1.5.2 new materials and products approved for use according to the prescribed procedures shall not only conform to the provisions of this article, but also provide relevant certification documents stipulated by the competent department;

1.5.3 In addition to the provisions of this specification, imported products shall also provide certificates of origin and commodity inspection, and the quality certificates, test reports, installation, use and maintenance certificates and other supporting documents shall be in Chinese (or attached with Chinese translation).

1.6 Improve the quality management inspection system and construction technical measures on the construction site.

Section 2 Communication network system

2. 1 Communication network system shall include communication system, satellite digital TV and cable TV system, public broadcasting and emergency broadcasting system and other subsystems and related facilities. The communication system includes telephone exchange system, conference television system and access network equipment.

2.2 The computer room environment of communication network system shall comply with the relevant provisions of relevant chapters, and the safety, power supply and grounding of computer room shall comply with the Code for Acceptance of Communication Power Equipment Installation Engineering YD5079 and the relevant provisions of relevant chapters.

2.3 The laying of communication network system cables (optical cables and stranded cables) shall comply with relevant specifications; Telephone cables shall comply with the relevant provisions of Code for Acceptance of Telephone Communication Facilities in Urban Residential Areas and Office Buildings YD5048; Coaxial cable shall comply with the provisions of Technical Specification for CATV System GY/ 106.

2.4 Communication system engineering shall be implemented in accordance with the specified installation, handover and acceptance procedures. Communication system inspection includes three stages: system inspection test, initial inspection test and commissioning acceptance test.

Flow chart of installation, handover and acceptance of communication system:

2.5 The test of communication system may include system inspection test; Hardware power-on test; System function test.

2.6 The initial test is reliability; Connection rate; Basic functions (such as business call and connection, billing, signaling, system load capacity, transmission index, maintenance and management, fault diagnosis, adaptability to environmental conditions, etc.). ).

2.7 Commissioning acceptance test: networking operation (access to users and circuits); Failure rate.

2.8 The test of communication system shall be conducted according to the current national standards and specifications, engineering design documents and product technical requirements, and its test methods, operating procedures and steps shall be determined by the construction unit and the manufacturer through consultation according to the relevant provisions of the current national standards.

2.9 The test stage, test content, test method and performance index requirements of the communication system installation project of intelligent building should meet the requirements of the current national standards such as Code for Acceptance of Program-controlled Telephone Switching Equipment Installation Project YD5077.

2. 10 The transmission rate, signal mode, physical interface and interface protocol of the communication system accessing the public communication network channel shall meet the design requirements.

2. 1 1 The contents of engineering implementation, quality control and system testing of communication system shall meet the requirements in the following table.

List of communication system engineering inspection items

……

2. 12 The system monitoring of satellite digital TV limited TV system shall meet the following requirements:

2. 12. 1 The installation quality inspection of satellite digital TV and cable TV system shall comply with the relevant provisions of the current national standards.

2. 12.2 in the project implementation and quality control stage, the installation quality of satellite antenna, the line distance from high-cost indoor unit, the position of power amplifier and receiving station, and the reliability of cable connection should be checked. Conforming to the design requirements is qualified.

2. 12.3 The output level of satellite digital TV shall comply with the relevant provisions of the current national standards.

2.12.6 The modulation bit error rate and phase jitter of HFC network and two-way digital TV system in forward test, intrusion noise, impulse noise, reverse isolation and other parameters in reverse test should meet the design requirements; And test its data communication, video on demand, graphic playback and other functions; HFC user distribution network should adopt centralized distribution structure, which has the functions of addressable road right control and uplink signal acquisition and equalization. The frequency configuration and anti-interference performance of the system should be tested, and its user output level should be 62 ~ 68 dB μ V. ..

2. 13 The test of public broadcasting and emergency broadcasting system shall meet the following requirements:

2. 13. 1 The input and output of the system are unbalanced, the audio cable laying, grounding form and installation quality should meet the design requirements, and the impedance matching between devices is reasonable;

2. 13.2 The sound reproduction system should be distributed reasonably and meet the design requirements;

2. 13.3 Technical indicators such as maximum output level, output signal-to-noise ratio, sound pressure level and bandwidth shall meet the design requirements;

2. 13.4 Evaluate the acoustic effect of the system through subjective evaluation of loudness, timbre and sound quality;

5. Functional test should include: business promotion, background music and public paging; When emergency broadcasting and public broadcasting * * * use equipment, the emergency broadcasting is controlled by the fire-fighting extension, which has the highest priority. In case of fire and sudden accident, the emergency broadcast is controlled by the fire extension, which has the highest priority. In case of fire and sudden accident, you should be able to switch to emergency broadcast forcibly and play it at the maximum volume; The detection of emergency broadcast function shall be implemented according to relevant regulations; The power amplifier should be configured redundantly. When the main engine fails, the standby machine will be put into operation automatically according to the design requirements. The public address system should be controlled by zones, and the zones should not conflict with the fire zones.

Section 3 Information Network System

3. 1 Information network system should include computer network, application software and network security.

3.2 The necessary conditions for the construction of information network system are: after the construction of integrated wiring system is completed, it has passed the system acceptance and has the conditions for completion acceptance; After the construction of the computer room is completed, the installation of the environment, power supply and grounding of the computer room has been completed, and the installation conditions are met.

3.3 In addition to complying with relevant regulations, the acceptance requirements of equipment and materials in the information network system should also pay attention to: numbered equipment must register the equipment number; After unpacking, the network equipment is powered on for self-inspection, to check whether the equipment status indicator light is normal and whether the equipment is started normally; Computer systems, network management workstations, UPS power supplies, servers, data storage devices, routers, firewalls, switches and other products shall be implemented in accordance with the provisions of relevant chapters.

3.4 network equipment should be installed neatly and safely, which is convenient for maintenance and management; The information module and related components of high-end equipment should be installed correctly, and the blank board should be installed in the spare slot; The label on the equipment shall indicate the name and network address of the equipment; Jumper connection should be firm, the direction should be clear and definite, and the cable label should be correct.

3.5 The operation inspection of the information network system shall include:

3.5. 1 Installation quality inspection: whether the environment of the computer room meets the requirements; Equipment inventory inspection; Equipment cabinet reinforcement inspection; Equipment module configuration check; Cable layout in equipment room and rack; Check the grounding resistance value; Check the lead-in wire and grounding device for sweeping the floor; Fire prevention measures in computer room; Security measures of computer room, etc.

3.5.2 Equipment inspection before power-on test: check the equipment installation according to the requirements of construction drawing design documents; Equipment grounding should be good; Power supply voltage and polarity meet the requirements.

3.5.3 Power-on test of equipment: the power supply of the equipment is normal; The alarm indication works normally; Normal operation and fault inspection of equipment after power-on.

3.6 After the information network system is installed and debugged, it shall be put into trial operation for at least 1 month.

3.7 The detection of computer network system should include connectivity detection, routing detection, fault-tolerant function detection and network management function detection.

3.8 The connectivity detection method can be tested by using related test commands or network tester according to the design requirements.

3.9 The connectivity test shall meet the following requirements:

3.9. 1 According to the network equipment connection diagram, the network management workstation should be able to communicate with any network equipment;

3.9.2 Detect the communication function between users in each subnet (virtual private network); According to the requirements of the network configuration scheme, computers that allow communication can enjoy resources and exchange information, while computers that do not allow communication cannot communicate; And ensure that the network tangent point conforms to the communication protocol and applicable standards specified in the design.

3.9.3 According to the requirements of the configuration scheme, test the communication ability between public networks of users in the local area network.

3. 10 carries out route detection on the computer network. According to the design requirements, the route detection method can test the correctness of network route setting by using related test commands or using the network.

3. 1 1 The detection method of fault-tolerant function should adopt the functions of manually setting network faults, correctly judging faults by the detection system, and automatically recovering the system after troubleshooting; The switching time should meet the design requirements. The test content should include the following two aspects:

3. 1 1. 1 For a network system with fault tolerance, it should have error recovery and fault separation functions, and the main components should be redundant and can be automatically switched when faults occur;

3. 1 1.2 For the network system with redundant links, when one of the links is disconnected or fails, the whole system should still work normally, and it should be able to automatically switch back to the main system after the failure recovery.

3. 12 The network management function test shall meet the following requirements:

3. 12. 1 The air duct system should be able to search the topology diagram and network equipment connection diagram of the whole network system;

3. 12.2 network system should have good diagnostic function. When the network equipment line fails, the network management system should be able to give an alarm in time and locate the fault point.

3. 12.3 high-temperature pump can remotely configure network equipment and detect network performance, and provide parameters such as network tangent flow, broadcast rate and bit error rate.

3. 13 intelligent building application software should include intelligent building office automation software, property management software and intelligent system integration. The detection of application software should be carried out from its basic functions, interface operation standards, system scalability and management functions, and its industrial application functions should be detected according to the design requirements. If it meets the design requirements, it is qualified, otherwise it is unqualified. The unqualified application software must pass the regression test after modification.

3. 14? Check the hardware and software configuration first, and then test the system.

3. The quality inspection of15 software products shall be carried out in accordance with the relevant provisions in this specification. The actual data of the system and practical application cases should be used for testing.

3. 16 When testing application software, black box method should be adopted to confirm the function and performance of the tested software, and the main test contents should include:

3. 16. 1 function test: run all the functions of the software system within the specified time to verify whether the system meets the functional requirements;

3. 16.2 performance test: check whether the software meets the performance specified in the design document, and test the corresponding time, throughput, auxiliary storage area and processing accuracy of the software;

3. 16.3 document testing: in order to test the clarity and accuracy of user documents, all application cases listed in user documents must be tested;

3. 16.4 reliability test: compare the reliability evaluation in the software test report with the problems in the actual trial to verify the reliability;

3. 16.5 interconnection test: interconnection between two or more different systems shall be verified;

3. 16.6 regression test: after the software is modified, it should be verified by regression test whether the modified software still meets the design requirements of the system.

3. The operation command interface of17 application software should be a standard drawing interactive interface, which requires a unified style and concise hierarchy, and the naming of operation commands cannot be ambiguous. The application software should be extensible, the system should reserve upgradeable space to incorporate new functions, and the family should adopt an information platform that can adapt to the latest version and changes in the management function of the information system.

3. 18 network security system should be tested from four aspects: physical layer security, network layer security, system layer security and application layer security, to ensure that the information security performance such as confidentiality, authenticity, integrity, controllability and availability of information meets the design requirements.

3. 19 Special products for computer information system security must have the Sales License for Special Products for Computer Information System Security approved and issued by the computer management and supervision department of the Ministry of Public Security; Unless otherwise stipulated by the special industry, the relevant regulations of the industry shall also be observed.

3.20 If the network security system of an intelligent building is connected to the Internet, it must be equipped with a firewall and an anti-virus system.

3.2 1 The security detection of network layer security shall meet the following requirements:

3.2 1.65438+

3.2 1.2 internet access control: the information network should control the internet connection request and content of the internal terminal according to the requirements, and use the terminal to access different resources of the internet in different identities. If it meets the design requirements, it will be judged as qualified;

3.2 1.3 security isolation between information network and control network: those who meet this requirement are judged as qualified;

3.2 1.4 Effectiveness of anti-virus system: spread files (virus samples) containing currently known popular viruses to all points through file transmission, email attachments, online neighbors, etc. , and the anti-virus software of each point should be able to correctly detect the main file and virus-containing file and carry out anti-virus operation; Those who meet this requirement are judged as qualified;

3.2 1.5 Effectiveness of intrusion detection system: If an intrusion detection system is installed and popular means are used to simulate attacks (such as DOS denial of service attacks), these attacks should be discovered and stopped by the intrusion detection system; Those who meet this requirement are judged as qualified;

3.2 1.6 Effectiveness of content filtering system: If a content filtering system is installed, attempts to access some restricted websites or restricted content should be prevented; Then, visit a number of unrestricted websites or content, which should be accessible normally; Those who meet this requirement are qualified.

3.22 System layer security shall meet the following requirements:

3.22. 1 The operating system should be an operating system with certain security strength that has been tested in practice;

3.22.2 Use a file system with high security;

3.22.3 Strictly manage the user accounts of the operating system and require users to use passwords that meet the security requirements;

3.22.4 The server should only provide necessary services, other irrelevant services should be closed, and corresponding patches should be replaced or upgraded for services or operating systems that may have vulnerabilities; Scan the server and pass without loopholes;

3.22.5 Carefully set up and correctly select the audit system, and record some illegal intrusion attempts; Simulating illegal attempts can only be judged as qualified if there are correct records in the audit log.

3.23 Application layer security meets the following requirements:

3.23. 1 authentication: user passwords should be encrypted or prohibited from being transmitted on the network; Strictly manage user accounts and require users to use passwords that meet security requirements;

3.23.2 Access control: Access control must be implemented according to users and resource objects on the basis of identity authentication; Users can access their authorized object resources correctly, but they cannot access unauthorized resources at the same time. Those who meet this requirement are judged to be qualified.

3.24 Physical layer security shall meet the following requirements:

3.24. 1 The power supply, grounding and environmental requirements of the central computer room shall meet the specified requirements;

3.24.2 The information network projects of party and government organs, enterprises and institutions involving state secrets shall be tested and accepted in accordance with the relevant provisions of current national standards such as Requirements for Electromagnetic Leakage and Emission Protection in Places where Confidential Information Equipment is Used, Technical Requirements for Security of Computer Information Systems Involving State Secrets BMZ 1, and Guide for Security Assessment of Computer Information Systems Involving State Secrets BMB5.

3.25 Application layer security shall meet the following requirements:

3.25. 1 Integrity: Data shall not be tampered with or destroyed during storage, use and network transmission;

3.25.2 Confidentiality: Data shall not be obtained by illegal users during storage, use and network transmission;

3.25.3 Security Audit: Audit records of access to application systems.

3.26 In addition to the relevant regulations, the inspection of information security management system should also be regarded as a necessary condition for the completion acceptance. Completion acceptance documents include equipment entry acceptance report, product inspection report, equipment configuration scheme and documents, computer network system inspection records and inspection reports, application software inspection records and user use reports, safety system inspection records and inspection reports, and system debugging records.

..... (word limit)