Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

An Ideal Template: Total Integrated Design

May 1, 2009

Phase one of the 6,000-student campus near Naples, Florida, consists of 10 academic buildings, 750 housing units and a town center that will ultimately grow into Ave Maria Town.

If you could design an entire university campus for the 21st century from scratch, what would its technology look like? 
     
That was the challenge faced by Cannon Design when Ave Maria University (AMU) began planning a completely new 6,000-student campus near Naples. The first phase consisted of ten academic buildings, 750 units of housing, and a town center that will ultimately support an adjoining town, Ave Maria Town, with an expected long-range population of 40,000 residents. 
     
Cannon Design and AMU’s consultant on “smart buildings,” Sinopoli Associates, realized that creating the campus’s technology systems would require an integrated approach to design and construction.  As both firms quickly ascertained, traditional construction specifications for technology systems don’t address integrated technology systems adequately.


The primary data center is for backbone distribution to all buildings on campus. Photographer: Creative Sources Photography

EVOLVING TECHNOLOGY

The standard 16 division Construction Specifications Institute (CSI) MasterFormat has been in existence for decades, and has long been the standard in building design and construction.  However, as technology has evolved, it has become apparent that the standard doesn’t address the integrated systems that are increasingly a part of today’s building design.
     
The industry, recognizing the construction specifications needed to reflect current building practices, developed a de facto Division 17 for communications infrastructure. According to  the Web site, Division17.net , this initiative “began in 1998 with the objective of ensuring that telecommunication systems are ‘designed into’ a building during the design phase of the project versus the more traditional method of ‘retrofitting’ it into the building while it is being construction.”  For this project, this method was expanded with the team’s vision to allow all building systems to operate on an integrated structured cabling system to transport critical information.
 

TOTAL INTEGRATION APPROACH

Cannon Design and Sinopoli ultimately integrated more than a dozen systems into Ave Maria University. These include:
  • Fire alarm and life safety-based systems
  • Building automation system for temperature control and systems monitoring
  • Security door monitoring, card access, and security video systems
  • Low voltage lighting control systems
  • Electrical power and power quality digital metering systems
  • Smartcard campus security and debit card systems
  • VoIP and emergency telephone systems
  • Video distribution
  • Professional sound systems
  • Structured cabling system
  • Primary and backup data centers including packaged UPS and cooling systems
  • Vertical telecommunications rooms active components and UPS systems
  • LAN/WAN network electronics and wireless connectivity
  • Facility Maintenance and Management System (FMMS)
The Ave Maria University technology systems are fully integrated. This means that the control, security, maintenance, administrative and accounting systems throughout the campus utilize the same building structured cabling systems and are unified on the campus-wide fiber optic backbone, which is arranged in a loop-and-radial configuration to allow redundancy in network connections.  This system allows for single-point monitoring and supplies the client with an overall view of the growing campus development. 
     
Based on an open protocol platform (TCP/IP), all systems report to the campus network operations center (NOC).   The NOC monitors all systems including the building automation system (BAS), which centrally monitors and controls the expandable central chiller plant and operates each building’s HVAC system to maximize energy efficiency.


ENERGY MANAGEMENT

The campus low-voltage lighting control system, also operated from the NOC, provides for photocell and time management control of interior and exterior building lighting as well as roadway, walkway, and sports fields lighting systems.  Similarly, an electrical power management system, or electrical digital metering system, monitors normal and emergency building power services.
     
The only systems not carried on the backbone are the analog emergency phone system and the municipal fire department alarm notifications.  Both of these systems are carried on multi-paired copper wiring as a failsafe measure.  With increased ability to respond to security issues, student safety is tremendously enhanced.
     
Security systems include door monitoring, card access, and security video systems, which all report to central servers and digital video recorders.  Smartcards are used throughout the campus and town center for student and staff identification, building and dormitory room access, meal plans, vending machines, laundry and accounting and purchasing purposes, creating a “cash card” culture throughout the campus.  This high-capacity computerized control system includes photo identification, a magnetic stripe, barcode, and smart proximity technology.  The multifunctional card enables students and staff to access pre-authorized locations including campus buildings, computer labs, student lounges, and dorm rooms.  
     
The campus network also carries voice over IP telephone and educational video distribution systems.  Audio-visual and professional sound systems equipment are centrally controlled for broadcast and monitored for maintenance (i.e. video projector lamps) to optimize system performance.  Video transmission signaling is accomplished over UTP cabling with converters at local displays.  Individual instructors in classrooms are able to call up video, audio, computer presentations directly from the lectern; a student can pull up lecture notes in real-time directly on his or her laptop.


SINGLE SOURCE OF RESPONSIBILITY

Ave Maria University realizes significant benefits from combining structured cabling with an open protocol system and using Division 17 to structure a single technology bid package.  Specifying and bidding the technology in this way provides:
  • A single source of responsibility for the design and installation of cohesive systems, cabling, and pathways, including consistent and centralized servers and PC manufacturers.
  • Reduced systems engineering, construction labor time, and costs through reduced repetition of cabling and pathways.
  • Standardized cabling and pathway identification system.
  • Flexibility to easily accommodate future moves, additions, and changes.
  • An open protocol to allow communication with new products, components, or systems additions.
  • A single redundant database to manage the campus mechanical, electrical, plumbing, and telecommunications systems.
The results?  Fully integrated campus technology systems at the most advantageous cost and classrooms that deliver on the promise of high tech learning. 
     
Bundling the technology systems into a single Division 17 bid package does create challenges for the architect, engineer, and contractor, but only to the degree that it represents a new approach to bidding on and constructing technology systems.  The benefits, both in cost and the ability to expand in the future, far outweigh the adjustments to this project delivery approach.  Ave Maria University and Cannon Design are demonstrating that the future of technology on the university campus is achievable, affordable, and world class. 


About the Sources

Security Magazine thanks Theodore Fowler, tfowler@cannondesign.com, and Salvatore Bonetto, sbonetto@cannondesign.com for their contributions to this article.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Half open laptop in blue

    Pentesting accounts for an average of 13% of total IT security budgets

    See More

Related Products

See More Products
  • 9781498767118.jpg

    Intelligent Video Surveillance Systems: An Algorithmic Approach

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!