You are on page 1of 51

SECTION 16783 SECURITY SYSTEM

PART 1 - GENERAL 1.1 DESCRIPTION: A. This Section includes furnishing and installation of complete total integrated security system as shown on the drawings and as specified herein. The system shall be IP based and shall be fully integrated for all buildings and site.

B.

1.2

REFERENCES: A. NFPA - National Fire Protection Association: NFPA 70 Art. 800 Art. 810 Art. 820 B. National Electrical Code Communication Circuits Radio and Television Equipment Community Antenna Television and Radio Distribution System

UL - Underwriter's Laboratories Inc.: UL 813 UL 983 UL 1410 Commercial Audio Equipment Surveillance Cameras Television Receivers and Video Products

C.

ANSI - American National Standards Institute: ANSI 208 ANSI 287 Measurement of Resolution of Camera System Precision Coaxial Connectors

D.

BS - BRITISH STANDARDS BS 7042/4737 Security system NACOSS National Accreditation Committee on Security System

E.

Other references shall include: Electronic Industries Association - EIA International Electro technical Commission - IEC

ITCC in Riyadh Residential Complex J10-13300

16783-1

Security System

Institute of Electrical & Electronic Engineers-IEEE International Organization for standardization - ISO International Radio consultative Committee - CCIR F. 1.3 All equipment shall be manufactured by ISO 9000 certified companies.

ENVIRONMENTAL REQUIREMENTS A. All equipment installed shall not require readjustments of controls, realignment, software reloading or reconfiguring when operating under the following conditions: 1. 2. The security control room will be air conditioned. Equipment installed outside shall be capable to operate at their nominal performances under the following environmental conditions: Maximum ambient temperature Minimum ambient temperature Average maximum temperature Average minimum temperature Temperature due to direct sun exposure Maximum relative humidity Maximum wind speed Maximum rainfall : 55C : 5C : 43C : 15C : 85C : 95% : 60 km/H : 100 mm

3. 4. 5. 6. 7. 8. 9. 10. 1.4

SUBMITTALS: A. B. C. Product Data: Submit manufacturer's data for all items of security system. Shop Drawings: Submit layout drawings for all systems of security. Wiring Diagrams: Submit wiring diagrams for all systems of security and electrical power connections to equipment and components. Complete Installation, Operation and maintenance Manual.

D. 1.5

QUALITY ASSURANCE: A. The following association and organization shall be referred to with respect to standards as they apply to the materials and equipment provided under this Section. Electronics Industries Association (EIA): Publications and JEDEC Standards and Engineering Publications.

ITCC in Riyadh Residential Complex J10-13300

16783-2

Security System

EN 60950/55022 IEC Standard 1000 Underwriter's Laboratories (UL). National Accreditation Committee on Security System (NACOSS) B. Due to the rapid changes and development in the security technologies, the specification and BOQ of all security system components shall be considered as a guideline for the basic requirement and function of the system. The contractor is free to propose alternative solution which fulfills the basic requirements and function by using the latest and more advanced technologies. The proposed new system shall offer more features, reliability, ease of operation and use and cost advantage. However, proposed alternate shall be subject to approval of Engineer. All the components of the system shall use open protocols for ease of integration. All controllers shall have built in interface to connect to integration system using the site TCP/IP LAN and open protocol. C. Single Source Responsibility: Components and accessories shall be product of single manufacturer to the maximum extent.

1.6

WARRANTY: A. Submit written guarantee signed by the contractor, manufacturer for the period of 1 year from the date of substantial completion. The guarantee shall cover the repair and replacement of defective materials and workmanship as directed by the Engineer.

PART 2 - PRODUCTS 2.1 GENERAL A. The security system shall be a total integrated, IP based system. All the system components shall seamlessly integrated with one database. The security system of the hotel shall be part of the total security system of the complex. The project consist of several buildings, which shall have its own integrated system and will be connected to a command and control center in the main control room of the complex. The integration shall be for each building and the site together so that the same card used for access at the external site gate can be used for the building entrance. All the integration shall be at the software integration. The security management software shall be capable to integrate all security system and any other IP based system.
16783-3 Security System

B.

C.

D.

E.

ITCC in Riyadh Residential Complex J10-13300

F.

Due to rapid changes in the technology supplier can propose more updated alternatives which fulfill and exceed the minimum functional requirements of this specification. The Security Management System shall include the following: a. b. c. d. Modular Security Management Software Access control Software and Hardware CCTV Video Management Software and Hardware And other related systems

G.

2.2

SECURITY MANAGEMENT SOFTWARE A. SYSTEM OVERVIEW 1. The Security Management Solution (SYSTEM) shall provide a number of functions including the ability to regulate access through specific doors and gates to secured areas of the CUSTOMER facility and provide computer generated color employee and visitor credentials for that use. The SYSTEM shall also record and store digital video of activities occurring in the facility as well as manage and track corporate assets. The SYSTEM must utilize a single seamlessly integrated relational database for all functionality. This integration shall be provided with one operating environment. The SYSTEMs operating environment shall be the fully multi-tasking multi-threading Microsoft Windows 2000 / Windows XP Operating System. The SYSTEM's web enabled client applications shall be capable of running on independent client operating systems including Windows 2000, Windows XP, Windows NT, Windows 98, Windows 95, Macintosh, UNIX, Linux, and Solaris. The web-enabled applications shall utilize the same common database as the other SYSTEM modules. The SYSTEM shall be written so that all SYSTEM modules (access control, alarm monitoring, digital video, visitor management, intrusion detection, etc.) are developed and built from a unified 32-bit source code set. There absolutely shall not be separate source code bases for the individual modules of the SYSTEM. The Security Management Solution shall allow the configuration of an enrollment & badging client workstation, an alarm monitoring client workstation, an administrative client workstation, an asset management client workstation, a digital video management client workstation, an intrusion detection client workstation, a visitor enrollment client workstation, a remote access level management client workstation, and an integrated client workstation (which shall include any combination of the above client workstations). The SYSTEM shall be expandable to support an unlimited number of individual module or integrated client workstations. All access control field hardware, including Intelligent System Controllers (ISCs), shall be connected to every / any Windows 2000 / XP based access control SYSTEM workstation on the network.

2.

ITCC in Riyadh Residential Complex J10-13300

16783-4

Security System

3.

The alarm monitoring client workstation must be able to connect to, and monitor, field hardware devices, such as card readers and ISCs. Administrative tasks including defining asset information, access groups, time zones, intrusion detection devices, configuring digital video devices, generating reports, creating maps, etc. shall be provided from any client workstation on the network that is licensed to do so. The enrollment & badging client workstation shall serve as both the credential creation and data input client workstation for the credential management module of the SYSTEM. The visitor management client workstation shall allow for the enrollment of visitors and the scheduling of visits. The integrated client workstation shall allow for any combination of functions of the SYSTEM to be available from the single client workstation. All SYSTEM data must reside on a single database on the network and must be accessible in real time to every / any SYSTEM workstation connected to the network. This shall allow for automatic change propagation to all client workstations on the SYSTEM as well as a common database to consolidate all information and allow for better disaster recovery. The SYSTEM must be designed to perform a wide variety of feature rich functions as part of a Security Management Solution. These SYSTEM functions are categorized into nineteen primary "system modules" which shall include: a. b. c. d. e. f. g. h. i. j. k. Access Control Alarm Monitoring Digital Video Remote Access Level Management System Administration Graphical Map Creation Application Programming Interfaces Data Import Server Redundancy. Doors Locking system Interfaces to other systems including 1. Fire Alarm

4.

5.

Access Control a. One of the SYSTEM's primary purposes shall be to provide access control. The SYSTEM shall be able to make access granted or denied decisions, define access levels, and set time zones and holidays. An input/output linkage feature shall allow linking of
16783-5 Security System

ITCC in Riyadh Residential Complex J10-13300

monitor zone points to output control points within Intelligent System Controllers (ISCs). The SYSTEM shall support features such as area control (two man control, hard, soft, and timed antipassback), database segmentation, and time zone/holiday overrides. 6. Alarm Monitoring a. The SYSTEM shall be used for alarm monitoring. Alarms are to be prioritized. The Main Alarm Monitoring Window shall provide information about the time and location of the alarm, along with its priority. The Main Alarm Monitoring Window must be able to sort pending and/or insert new alarms based on any of the following attributes: priority, date/time, alarm description, Intelligent System Controller, Card Reader, Input Control Module, asset name, or cardholder. Date/time sorts must be System Operator selectable to be either ascending or descending and must have the option of displaying the seconds of the minute in which the alarm arrived into the SYSTEM. All columns of information in the Main Alarm Monitoring Window shall be able to be arranged in any order by the System Operator. The SYSTEM must allow unique emergency instructions to be specified for each type of alarm. It shall also allow for the automatic sending of alphanumeric pages or e-mail messages upon alarm arrival. A real-time graphical system status tree on the screen shall indicate if card readers, alarm panels, digital video servers, video cameras, intrusion detection panels, or Intelligent System Controllers are secured, unsecured, in alarm, or off-line. Output control operations must be available to lock, unlock or pulse control points as a standard feature. An automatic cardholder callup feature shall allow the quick search and display of images in the database. A System Operator journal shall be available to log important daily events. A trace function shall be available for System Operators to locate and track activity on specific cardholders, assets, video cameras, or card readers. An image comparison feature must be provided for use in conjunction with a CCTV interface. All alarms and hardware icons MUST have the ability to control the associated hardware via right-mouse clicks.

b.

7.

Digital Video Management a. The SYSTEM shall include a seamlessly integrated digital video management module. It shall support real time linkage of digital video clips to their associated alarms from the access control & alarm monitoring system. System Administrators shall configure video segments by specifying pre- and post-alarm time marks, then link those defined video segments to specific alarms. Each camera shall be configured to have its own unique set of pre- and postalarm time marks. The SYSTEM shall allow for the central administration, monitoring, and archiving of digital video and the associated cameras. The SYSTEM shall support digital video servers from multiple manufacturers. The SYSTEM shall also
16783-6 Security System

ITCC in Riyadh Residential Complex J10-13300

support IP based Digital Cameras from multiple manufacturers for advanced video surveillance. 8. System Administration a. System Administrative tasks such as defining client workstation & System Operator permissions set-up, access groups, time zones, reports, maps, etc. shall be provided from any client workstation on the network. Initial setup of the cardholder screen layout shall occur on the database server. The SYSTEM shall support the use of strong passwords.

9.

Screens/Forms Creation a. Should the SYSTEM standard fields not be suitable, the SYSTEM shall provide a Forms Designing and Editing Module that gives System Administrators the ability to modify any standard field to customize the cardholder, asset, and /or visitor forms as desired. The SYSTEM shall also allow System Administrators to add custom fields in addition to any standard fields on a minimum of 32 pages each of information for cardholder, visitor, and visit related data. User defined fields absolutely shall not be pre-defined, meaning only the labels can change while the properties cannot. System Administrators shall have a minimum of 96 pages of which to design their cardholder, visitor, and visit screens with standard and custom fields.

10.

Graphical Map Creation a. The SYSTEM shall provide Graphical Map Creation and Editing Software that must allow System Administrators to import customized map backgrounds of their facility and to attach custom icons to those maps.

11.

Application Programming Interfaces a. The SYSTEM shall provide a set of standard Application Programming Interfaces (API's) and supporting documentation that allows hardware manufacturers and software application developers to integrate their products into the SYSTEM. The Application Programming Interfaces shall allow requests from CUSTOMER to integrate a third party hardware or software solution based on SYSTEM open architecture and SYSTEM device independence.

12.

Data Import a. The SYSTEM shall support an import utility that will allow the CUSTOMER or RESELLER to import cardholder information into the SYSTEM database. This shall allow the CUSTOMER or RESELLER to pre-populate the SYSTEM database with existing cardholder data and/or add new records to the existing SYSTEM database.
16783-7 Security System

ITCC in Riyadh Residential Complex J10-13300

B.

APPLICATION DESIGN 1. Single, Unified Source Code Set a. All SYSTEM application modules, features, and functions MUST be generated from a single source code set. In addition, the source code must be designed using object-oriented software development techniques and compile into native 32-bit applications. The access control, alarm monitoring, credential management, digital video management asset management, intrusion detection management, visitor management, and remote access level management modules of the software shall be created from this single source code set. There absolutely shall not be separate source code bases for separate modules. Thus, a single manufacturer must develop all SYSTEM modules. This shall allow for the ease of maintaining the SYSTEM and allow for the ease of future upgrades and enhancements. All SYSTEM features and functionality listed in the proceeding pages shall ship with each SYSTEM. Features and functionality available to CUSTOMER shall be determined through licensing and shall be controlled by a hardware/software license key.

b.

2.

Microsoft Gold Certified Partner a. A Microsoft Gold Certified Partner must develop the SYSTEM.

3.

Microsoft Windows 2000 Certification a. The SYSTEM shall have passed Microsoft Windows 2000 certification testing and shall be officially Microsoft Windows 2000 Certified. The Microsoft Windows 2000 Certification Program for applications shall help CUSTOMER identify reliable and manageable applications. The SYSTEM, that shall meet the specifications for Windows 2000 certification, shall provide a robust, self-repairing installation that shall help minimize conflicts among shared components. This shall enable better co-existence of applications, facilitate easier software deployment, and reduce support and training costs.

4.

Microsoft Windows XP Certification a. The SYSTEM shall have passed Microsoft Windows XP certification testing and shall be officially Microsoft Windows XP Certified. The Microsoft Windows XP Certification Program for applications shall help CUSTOMER identify reliable and manageable applications. The SYSTEM, that shall meet the specifications for Windows XP certification, shall provide a robust, self-repairing installation that shall help minimize conflicts among shared components. This shall enable better co-existence of applications, facilitate easier software deployment, and reduce support and training costs.
16783-8 Security System

ITCC in Riyadh Residential Complex J10-13300

5.

Single License Key Systems a. The SYSTEM shall only require a single hardware / software license key to be present on the database server for the SYSTEM to operate. Hardware / software keys shall not be required at the client workstations. The hardware / software license key on the database server shall determine the number of client workstations that shall be able to connect to the SYSTEM as well as all SYSTEM functionality.

6.

Concurrent Licensing a. The SYSTEM shall support concurrent licensing with respect to client licenses. CUSTOMER shall purchase a fixed number of client workstation licenses (or connections) that shall be programmed into the database server license file. The SYSTEM shall be installed on any number of client workstations in the CUSTOMER facility. Then, any of the client workstations that have the SYSTEM software installed shall have the ability to connect to the database server as long as the maximum number of concurrent connections purchased has not been reached. Connections shall be licensed on a per module basis. This shall provide CUSTOMER with great flexibility in system design and layout.

7.

Single Sign On Support a. The SYSTEM shall provide support for single sign on capability. Single sign-on shall allow System Administrators / System Operators to authenticate into SYSTEM applications using their Windows domain account. Sign sign-on shall support the following scenarios: 1.) Allow System Administrators / System Operators to interactively run SYSTEM applications without having to enter a username or password. This shall make administration of the SYSTEM easier since maintenance of separate SYSTEM usernames and passwords is not required. Allow SYSTEM API scripts to authenticate. These scripts shall be run using a Windows account allowing a seamless and secure way to authenticate the account and restricting the script to those actions that the user is permitted to perform.

b.

2.)

8.

Unicode Support a. The SYSTEM shall be designed to support Unicode allowing for easier translation into specific languages. The SYSTEM shall be available in a minimum of the following languages:

ITCC in Riyadh Residential Complex J10-13300

16783-9

Security System

1.) 2.) 9.

Arabic English

Second Manufacturing Source for Access Control Field Hardware a. The SYSTEM manufacturer shall be able to provide a second manufacturing source for access control field hardware.

10.

Open Architecture a. The SYSTEM shall have an open architecture design. It shall be a true open architecture design and support industry standards for databases, networks, credential printers, and video cameras. No customized or proprietary PC or credential creation software or hardware shall be required to operate the SYSTEM. The SYSTEM shall be both scalable and portable to give CUSTOMER the ability to increase performance based on CUSTOMER requirements. This shall give CUSTOMER maximum flexibility and room for unlimited growth. 1.) Open Database Connectivity Compliance a.) The SYSTEM shall be Open Database Connectivity (ODBC) compliant. The SYSTEM shall support a relational database management system with the proper 32-bit ODBC drivers. Examples of these databases include, but are not limited to, Microsoft SQL Server 2000, Oracle Server 8i / 9i, or IBM DB2 Universal Server 7.2. The SYSTEM shall be designed so that two methods of integrating these aforementioned relational database management systems are possible. The first method shall be to use one of these databases as the SYSTEMs dedicated database server, meaning only the SYSTEMs information is stored in the database. The other method is to use one of these databases as a non-dedicated database server and attach SYSTEM database tables to the existing database that shall be used by one or many systems. The SYSTEM must be installed and operational on at least three (3) relational database management systems in the field. For example, the SYSTEM must have at least one customer that is running Microsoft SQL Server 2000, at least one other customer that is running Oracle Server 8i / 9i, AND at least one customer running IBM DB2 Universal Server 7.2. All three customers MUST be using the SAME VERSION AND MODEL SOFTWARE.
16783-10 Security System

b.)

c.)

d.)

ITCC in Riyadh Residential Complex J10-13300

2.)

Open Application Architecture a.) The SYSTEM shall support an Open Application Architecture. It shall provide a set of standard Application Programming Interfaces (API's) and supporting documentation that allows hardware manufacturers and software application developers to integrate their products into the SYSTEM. The Application Programming Interfaces shall allow requests from CUSTOMER to integrate a third party hardware or software solution based on SYSTEM open architecture and SYSTEM device independence. Examples of hardware interfaces include fire alarm panels, intercom systems, central station alarm receivers, and personal safety & asset devices. Examples of software interfaces include time and attendance systems, human resource databases, and risk management systems.

3.)

Scalability a.) The SYSTEM shall be scalable to support Symmetric Multi-Processing (SMP) machines. The Relational Database Management System (RDBMS) within the SYSTEM shall use a single-process, multi-threaded architecture known as Symmetric Server Architecture, which provides scalable, high system performance with very efficient use of SYSTEM resources. The SYSTEM shall provide Symmetric Multiprocessor Support, allowing it to execute threads in parallel on multiple CPUs. The RDBMS shall use native Windows 2000 / XP threads and it shall automatically scale to multiprocessor hardware with no special configuration or programming required.

b.)

4.)

Portability a.) The SYSTEM shall be portable across multiple platforms to take full advantage of multiple hardware architectures, without changing SYSTEM software. The SYSTEM software shall work on platform architectures including Intel x86, Digital Alpha AXP, and Symmetric Multi-Processing machines.

5.)

Network Support a.) The SYSTEM shall be designed to support any industry standard network protocol and topology listed below:
16783-11 Security System

ITCC in Riyadh Residential Complex J10-13300

i ii iii iv v vi vii viii ix

TCP/IP Novell Netware (IPX/SPX) Digital PATHWORKS Banyan VINES IBM LAN Server (NetBEUI) IBM SNA Networks Microsoft LAN Manager (NetBEUI) NFS Networks Remote Access Service (RAS) via ISDN, x.25, and standard phone lines

6.)

Video Input Support a.) The SYSTEM shall support any industry standard video input source that utilizes a Red/Green/Blue (RGB), Composite, or S-Video signal. The SYSTEM shall allow cardholder, visitor, and asset photos to be taken from any one of the live video signals listed above or to be scanned in using any industry standard scanning device that utilizes an industry standard TWAIN interface. SYSTEM support for other methods of inputting a cardholders, visitors, and assets photo, such as through the use of an industry standard digital camera with an industry standard TWAIN interface, or by importing a photo from any industry standard image file format, shall also be available.

b.)

11.

Application Partitioning a. The SYSTEM shall employ an application partitioning design so that applications are broken into separate distinct programs capable of running independent of other SYSTEM applications. Applications shall include, but not be limited to, alarm monitoring, system administration & access panel drivers, asset management, import modules, digital video management, credential designing modules, visitor management, remote access level management, and cardholder forms designing modules. Each client workstation shall have the ability to be installed with any combination of the above listed modular applications. A system written as a single monolithic code base shall not be acceptable.

12.

Easy to Use, Graphical User Interface a. The SYSTEM shall support a user friendly, Windows graphical user interface that shall be intuitive. All messages and interface text shall support localization. Selection and use of any language supported by MANUFACTURER other than English shall be accomplished with the installation of the SYSTEM language pack in addition to the core SYSTEM. The SYSTEM shall support English, Arabic, French, Chinese (SYSTEM version 2002 only),
16783-12 Security System

ITCC in Riyadh Residential Complex J10-13300

German, Hebrew, Italian (SYSTEM version 2002 only), Korean (SYSTEM version 2002 only), Spanish, and Swedish language packs. All functions shall be either keyboard or mouse driven to allow the System Operators to choose the method of navigating through the screens. In the alarm monitoring module of the SYSTEM software, all major functions (opening a door, acknowledging alarms, launching video, etc.) shall be accomplished in one or two mouse clicks. This shall allow for ease of operation, especially in emergency situations. 13. Support for Microsoft Windows Installer a. The SYSTEM shall support Microsofts Windows Installer that shall allow efficient system deployment. This means that the SYSTEM shall be loaded onto a server running Windows Installer and all client workstations and any future upgrades shall be installed from the server utilizing network communications.

14.

Distributed Local Decision Making a. The SYSTEM shall employ a distributed architecture so that all cardholder, visitor, and asset access decisions are made locally at the Intelligent System Controller (ISC).

15.

Application Installation a. The SYSTEM shall support a simplified installation procedure using Installation Wizards that guide System Administrators through the installation of the database server and any client workstations. The SYSTEM shall automatically detect previous versions installed on the client workstations for fast and efficient upgrade installations.

16.

Multimedia Integration a. The SYSTEM shall extensively integrate and utilize multimedia throughout the SYSTEM software. Real-time, dynamic graphical maps mean that the map screen does not have to re-paint or refresh each time a new alarm or event condition occurs. Map device icons shall also dynamically change shape based on the state of the device. The SYSTEM shall support a CUSTOMER customizable voice alarm annunciation and a flashing colored system icon for each alarm in the SYSTEM. The SYSTEM shall also support customizable voice instructions so that each alarm or event in the SYSTEM can have both sets of text instructions and pre-recorded audio voice instructions. Real-time live user video verification seamlessly integrated into alarm monitoring shall also be available to view cardholder activity in high priority areas.

17.

Advanced Network Architecture a. The SYSTEM shall be designed to support an advanced distributed network architecture, whereas Intelligent System Controllers do not need to be home-run wired back to the database server. Intelligent
16783-13 Security System

ITCC in Riyadh Residential Complex J10-13300

System Controllers shall be wired to any Windows 2000 / XP based PC that is licensed to run the SYSTEM software. Also, Intelligent System Controllers shall be connected to a Local Area Network / Wide Area Network via industry standard TCP/IP communication protocol. Network based Intelligent System Controllers shall be able to communicate back with the database server through industry standard network switches and routers and shall not have to be on the same subnet. The SYSTEM shall also support dual path upstream communications between the ISC and client workstations / database server. Secondary communications paths shall include direct connection (RS-232/485), network (TCP/IP) or dial up connections. As such, any alarm in the SYSTEM shall be routed to any client workstation(s) on the network, regardless of the Intelligent System Controller that generated the alarm. 18. Object Oriented Programming a. The SYSTEM shall be designed using the latest programming techniques and advanced 32-bit programming tools to optimize SYSTEM performance. Thus, the SYSTEM shall be designed utilizing object oriented programming. This shall give the SYSTEM a modular design and allow the CUSTOMER to pick and choose the desired functionality required. Object Oriented Programming shall allow for ease of SYSTEM maintenance and will allow the SYSTEM to be easily expanded and upgraded as the CUSTOMER needs grow.

b.

C.

OPERATING SYSTEM 1. The SYSTEM shall support the 32-bit Microsoft Windows 2000 / Windows XP multi-tasking, multi-threading operating system. The SYSTEM must meet the below requirements for a Windows 2000 / XP based system. Interface a. The operating system shall offer the look and feel of the Windows operating system to enhance usability and efficiency. The operating system shall come complete with administrative wizards and interactive help to guide System Administrators in the configuration of the SYSTEM.

2.

3.

Networking a. The operating system shall support a minimum of 15 networking protocols including, but not limited to, TCP/IP, IPX/SPX, RAS, and NetBEUI. The SYSTEM shall also support peer-to-peer and FTP server capabilities.

ITCC in Riyadh Residential Complex J10-13300

16783-14

Security System

4.

Remote Management a. The operating system shall utilize remote management utilities such as event viewers and performance monitors to fine tune and optimize the operating system that will in turn optimize the SYSTEM. It shall support both dial-out capabilities to remote servers as well as remote dial in capabilities.

5.

Remote Access Services (RAS) a. The operating system shall support full remote diagnostics abilities through its remote access services. Full network functionality shall be available over remote links using NetBEUI, IPX/SPX, and TCP/IP protocols. Dial in capability to remote Windows 2000 Servers using remote access service shall also be available.

6.

Security a. The operating system shall support multiple user profiles on the same client workstation so System Administrators can assign which programs shall be available to System Operators based on their operating system user log-on. Local desktop security shall be available through User ID and required password log-on. The operating system MUST also offer government C-2 level certifiable security. The SYSTEM shall support a data encryption utility. In utilizing encryption technologies, data communication shall be protected between workgroups, local area network computers, domain clients and servers, branch sites which may be physically remote, extranets, roving clients, and remote administration of computers. Encryption shall be achieved through either Windows Internet Protocol Security (IPSec), which is a part of Microsoft Windows 2000 Server/Professional, or through IRE SafeNet/Speed. IPSec shall support two encryption modes: transport and tunnel. Using transport mode, end-to-end security from client-to-server, server-to-server, and client-to-client shall be accomplished. Using Layer Two Tunneling Protocol secured by IPSec, secure remote access from client-to-gateway over the Internet shall be accomplished. IRE SafeNet/Speed shall automatically encrypt user data with the Triple-Data Encryption Standard (Triple-DES) for public key encryption. The encryption that occurs with the SYSTEM shall be broken down into two main segments: peer-to-peer (which occurs between a workstation within the secured area and a server outside the
16783-15 Security System

b.

c.

d.

e.

f.

g.

ITCC in Riyadh Residential Complex J10-13300

secured area) and peer-to-panel (which occurs between a workstation within the secured area and the panel via the IRE SafeNet/Speed device). These segments shall utilize different keys to encrypt or decrypt the data. D. CLIENT/SERVER RELATIONAL DATABASE MANAGEMENT SYSTEMS 1. The SYSTEM shall support industry standard Open Database Connectivity (ODBC) compliant relational database management systems. This shall include relational database management systems such as Microsoft SQL Server 2000, Oracle Server 8i / 9i, and IBM DB2 Universal Server 7.2. The SYSTEM must be installed and operational on at least three (3) relational database management systems in the field. For example, the SYSTEM must have at least one customer that is running Microsoft SQL Server 2000, at least one customer that is running Oracle Server 8i / 9i, AND at least one customer that is running IBM DB2 Universal Server 7.2. All three customers MUST be using the SAME VERSION AND MODEL SOFTWARE. A system that has been installed with only a single relational database is not acceptable. These databases, through ODBC, shall be true client/server, high performance, and ANSI standard capable of handling high transaction rates and multiple users concurrently accessing and modifying the database. Preservation of Data Integrity The SYSTEMs RDBMS shall preserve data integrity in the following ways: a. Transaction Processing 1.) Transaction processing guarantees the consistency and recoverability of the RDBMS. Transaction processing shall assure that all transactions are performed as a single unit of work, even in the presence of a hardware or general SYSTEM failure.

2.

3.

4.

b.

Enforced Data Integrity 1.) The SYSTEMs RDBMS shall enforce data integrity within the database itself, guaranteeing that complex business policies shall be followed. Referential Integrity maintains consistency between multiple tables of a database. For example, you do not want to delete an access level from the database without removing that access level from all cardholders that are assigned the access level. The SYSTEMs RDBMS shall use advanced data integrity features such as data types, defaults, and rules to enforce data integrity. Stored procedures and triggers shall also be used to insure the integrity and security of data.
16783-16 Security System

2.)

ITCC in Riyadh Residential Complex J10-13300

c.

User-Defined Data Types 1.) The SYSTEMs RDBMS shall utilize data types, which provide the simplest form of data integrity by restricting what kinds of information (for example: characters, numbers, or dates) may be stored in the columns of the database tables.

d.

Defaults 1.) The SYSTEMs RDBMS shall also utilize Defaults, which allow the SYSTEM to specify a value that the RDBMS inserts if no explicit field value is entered.

e.

Rules 1.) The SYSTEMs RDBMS shall enforce rules, which are integrity constraints that go beyond those implied by a fields data type. Whenever a user enters a value, the RDBMS shall check the value against any rule that has been created for the specified field. For example, rules can require that a value fall within a particular range, match a particular pattern, or match one of the entries in a specified list. The SYSTEMs RDBMS shall also provide two powerful and flexible features for enforcing programming integrity and business rule logic centrally at the server: stored procedures and triggers. Stored Procedures a.) The RDBMS shall incorporate stored procedures for increased data integrity. For example, whenever a SQL command is sent to the RDBMS for processing, the server shall parse the command, check its syntax to see if it makes sense, check to see if the requester has the permissions necessary to execute the command, and formulate an execution plan to process the request.

2.)

3.)

4.)

Triggers a.) Triggers are a special type of stored procedure. Triggers are associated with particular pieces of data and are automatically initiated whenever attempts to modify that data are made.

ITCC in Riyadh Residential Complex J10-13300

16783-17

Security System

5.

Mature Client/Server Architecture a. The SYSTEM shall support a two tier mature client/server architecture in which the central database server performs all of the data processing. The clients shall be one of many types of client workstations including administrative, alarm monitoring, access control, asset management, digital video management, visitor management, intrusion detection management, or enrollment & badging client workstations. The client workstation shall send all requests to the database server, which does all of the processing. The database server then sends only the results of the request back to the client workstation. This minimizes network traffic and ensures data integrity as a central database is performing all processing.

6.

Advanced Thin Client Architecture a. The SYSTEM shall also provide an advanced thin client architecture. This architecture shall provide CUSTOMER with complete access to configure and operate their SYSTEM software through a simple web browser interface. The need for installed SYSTEM desktop client software shall not be required. The SYSTEM thin client architecture shall allow for the installation of web server software and, once the web server is configured, shall allow an unlimited number of client workstations (based on SYSTEM licensing connections) to attach to the server and run any of the SYSTEM applications. Virtually any desktop operating system that supports a web browser shall be able to utilize the SYSTEM thin client architecture. This shall include Windows 98, Windows NT, Windows 2000, Windows ME, Macintosh, Unix, Solaris and Linux. The SYSTEM thin client architecture shall also support mobile computing environments, such as Windows CE. The interface shall display a minimum color depth of 8 bits (256 colors). The SYSTEM thin client architecture shall work in conjunction with Citrix MetaFrame 1.8 for Windows 2000 Servers and Citrix Metaframe XP. Such thin client architecture shall be achieved through Independent Computing Architecture (ICA ) technology. Use of the Citrix Metaframe shall be in a one- or two-server configuration, allowing the SYSTEM to be deployed as three tier applications. Each client workstation shall have an appropriate browser installed and shall consist of any combination of access control, system administration, asset management, alarm monitoring, digital video management, visitor management, or Credential Management functions.

b.

c.

ITCC in Riyadh Residential Complex J10-13300

16783-18

Security System

E.

NETWORK DESIGN 1. The SYSTEM shall be designed to allow it to work with any industry standard network protocol and topology listed below: a. b. c. d. e. f. g. h. i. TCP/IP Novell Netware (IPX/SPX) Digital PATHWORKS Banyan VINES IBM LAN Server (NetBEUI) IBM SNA Networks Microsoft LAN Manager (NetBEUI) NFS Networks Remote Access Service (RAS) via ISDN, x.25, and standard phone line

2.

There shall not be a limit to the number of client workstations that shall be attached to the database server. Each client workstation shall have the ability to consist of any combination of access control, system administration, asset management, alarm monitoring, digital video management, visitor management, intrusion detection management, or credential management functions. The SYSTEM shall be able to operate transparently in both a LAN and WAN environment, as long as one of the above protocols or network topologies are utilized. The SYSTEM shall be designed so that any Windows 2000 / XP based client workstation on the network that is licensed to operate the SYSTEM Software can have Intelligent System Controllers connected to them. This design shall save installation and wiring costs, as Intelligent System Controllers do not have to be home-run wired back to the database server. As such, any alarm in the SYSTEM, regardless of the Intelligent System Controller that generated the alarm, shall be routed to any client workstation on the network. Alarms shall also be routed to multiple client workstations on the network and shall have the ability to be routed to different client workstations during different hours of the day through time zone control.

3.

4.

5.

F.

GRAPHICAL USER INTERFACE 1. The SYSTEM shall have an easy to use Windows Graphical User Interface. It shall be intuitive and all messages and commands shall have the capability to support multiple languages. All functions shall be both
16783-19 Security System

ITCC in Riyadh Residential Complex J10-13300

keyboard and mouse driven. 2. Within the alarm monitoring module of the SYSTEM, all major functions (such as acknowledging alarms, opening doors, and viewing cardholder information, etc.) MUST be accomplished in one or two mouse clicks. Any more than two mouse clicks is not acceptable. The SYSTEM shall have the ability to have SYSTEM information that shall be viewed in the application windows to be in a user defined typeface and point size. The SYSTEM shall support a minimum of 55 Fonts. These fonts shall be available from a pick list to the System Administrators. This shall be especially important in the alarm monitoring module of the software. The SYSTEM shall integrate toolbars that shall be movable and sizable as shortcuts to different forms within the SYSTEM. A Help icon shall be available in all modules of the software giving System Operators / System Administrators the ability to obtain on-line help with a single click of the mouse. The help command shall also be keyboard driven. The SYSTEM shall utilize a tabular format within the software to group procedures and forms together to guide the System Administrator through SYSTEM configuration.

3.

4.

5.

G.

WORK STATIONS AND SERVERS 1. PC DESKTOP WORKSTATION SPECIFICATION (MINIMUM) a. The system software shall operate on workstations of the following minimum specification. Number and location shall be as indicated in drawings and BOQ. 1.) 2.) 3.) 4.) 5.) 6.) 7.) 8.) 9.) 10.) 2. Hardware Platform CPU HDD Interface RAM OS Graphic card Ethernet Card Soundcard Software Keyboard, mouse PC desktop Intel core 2 due processor 3.0 GHz or better SATA Minimum 4 MB Windows VISTA NVIDIA GeForce 9800 GX2 or better 100/1000 Mbps Required Direct X 10 or better required; standard Microsoft

SERVER SPECIFICATION (MINIMUM) a. The server shall have the following minimum specification. Number and location shall be as indicated in drawings and BOQ 1.) 2.) 3.) Hardware Platform CPU HDD Interface
16783-20

PC server Intel Xeon dual core 3.0 GHz or better SATA and SCSI
Security System

ITCC in Riyadh Residential Complex J10-13300

4.) 5.) 6.) 7.) 8.) H.

RAM OS Graphic card Ethernet Card Keyboard, mouse

Minimum 4 MB Windows server 2008 or better VGA, XVGA 100/1000 Mbps required; standard Microsoft

MIGRATION & UPGRADES 1. The SYSTEM shall support a seamless upward and horizontal migration path from system to system. The SYSTEM shall ship to the customer with the ability to support the largest system in the product line complete with all the modules, features and functionality described above and below. The CUSTOMERs system size and feature set shall be controlled by a software /hardware license key and shall be programmed based on licensing. Upgrading from SYSTEM level to SYSTEM level shall be efficient, easy, and require only a change in the software / hardware license key code for the application portion of the SYSTEM. Adding new modules, activating features, increasing card reader capacity, and enabling additional functionality shall all be accomplished over the telephone without the vendor having to go to the CUSTOMER site.

2.

3.

4.

All systems shall be 100% upward compatible. Access control field hardware shall be compatible with all systems. Access control field hardware (Intelligent System Controllers, Input Control Modules, Card Readers, etc.) shall not have to be replaced or upgraded as the CUSTOMER migrates from one SYSTEM level to the next. Client workstations, cameras, printers, and data shall also be compatible from one SYSTEM level to the next. These devices shall not have to be replaced as the SYSTEM grows from small to large. The Graphical User Interface shall be IDENTICAL for all systems, regardless of the size, number of client workstations, or operating system that is being utilized. The SYSTEM shall be designed so that the average System Operator will not know that the SYSTEM was even upgraded or modified. This shall prevent the re-training of System Operators / System Administrators each time the SYSTEM migrates to the next level.

5.

6.

I.

SEAMLESS INTEGRATION 1. All SYSTEM application modules, features, and functions MUST be generated from a single source code set. The access control, alarm monitoring, asset management, digital video management, intrusion detection, remote access level management, and visitor management, and credential management modules of the software shall be created from this single source code set. There absolutely shall not be separate source code bases for different modules. Thus, a single manufacturer must develop all modules of software. All SYSTEM modules shall be seamlessly integrated to feature a single system, single code base, single graphical
16783-21 Security System

ITCC in Riyadh Residential Complex J10-13300

user interface, and single database.

2.

This shall allow for the ease of maintaining the SYSTEM and allow for the ease of future upgrades and enhancements. All SYSTEM features and functionality listed in the proceeding pages shall ship with each system. Features and functionality available to CUSTOMER shall be determined through licensing and shall be controlled by a hardware / software license key. All SYSTEM data must reside in a single database on the network and must be instantly accessible from every/any client workstation connected to the network that is licensed to do so. This shall provide automatic change propagation to all client workstations on the SYSTEM as well as a common database to consolidate all information and allow for better disaster recovery. As such, any modifications made to cardholders, time zones, assets, or access levels shall be downloaded in real-time to all related Intelligent System Controllers.

3.

2.3

ACCESS CONTROL FIELD HARDWARE DEVICES A. The Security Management System shall be equipped with the access control field hardware required to receive alarms and administer all access granted/denied decisions. All field hardware must be designed to meet UL 294 and ULC requirements. Depending upon the configuration, the Total Security Knowledge Management System field hardware must be able to include any or all of the following components: 1. 2. 3. 4. 5. 6. 7. 8. 9. B. Intelligent System Controller (ISC) Input Control Module (ICM) Output Control Module (OCM) Card Readers Single Reader Interface Module (RMI) Dual Reader Interface Module (DRIM) Biometric Reader Interface (ARI) Panel Power Supplies Star Configuration Splitters

INTELLIGENT SYSTEM CONTROLLER (ISC) 1. An Intelligent System Controller (ISC) shall link the Total Security Knowledge Management Solutions Software to all other field hardware components (Card Readers and Input Control Modules). The ISC shall provide full distributed processing of access control & alarm monitoring
16783-22 Security System

ITCC in Riyadh Residential Complex J10-13300

operations. Access levels, hardware configurations, and programmed alarm outputs assigned at the administration client workstation shall be downloaded to the ISC, which shall store this information and function using its high speed, local 32-bit microprocessor. All access granted/denied decisions must be made at the ISC to provide fast responses to card reader transactions. A fully configured ISC with 64 card readers shall require less than one-half (0.5) seconds to grant access to an authorized cardholder or deny access to an unauthorized cardholder. 2. The SYSTEM Access Control Field Hardware shall provide a network based ISC. The network ISC shall be a 10 MB Ethernet based panel that has the capability to reside on a local area network (LAN) or wide area network (WAN) without connectivity to a PC serial port. The ISC shall utilize an off the shelf network connectivity device to deliver this functionality. Network based Intelligent System Controllers shall be able to communicate back with the database server through industry standard switches and routers and shall not have to be on the same subnet. The ISC is required to continue to function normally (stand-alone) in the event that it loses communication with the SYSTEM software. While in this off-line state, the ISC is required to make access granted/denied decisions and maintain a log of the events that have occurred. Events shall be stored in local memory, and then uploaded automatically to the SYSTEM database after communication has been restored. The ISC must contain the following features: a. b. c. UL 294, ULC, and CE Certified Support for Host Communications Speed of 115,200 bps Support for Direct Connect, Remote Dial Up, or Local Area Network (LAN) Connection Support for Dual Path Host Communications - Secondary Path shall be either Direct Connect, Local Area Network (LAN) Connection, or Remote Dial Up Connection. Support for up to 8 MB of On-Board Memory LAN Support shall utilize RJ45 (10/100baseT) Ethernet Interface or Token Ring 4 MB connectivity Flash Memory for real time program updates and overall host communications Support for four 2 wire downstream ports, two 4 wire downstream ports, or combination one 4 wire downstream port and two 2 wire downstream ports Memory storage of up to 5,000 cardholders/100,000 events, with memory expansion of up to 350,000 cardholders/1,000,000 events

3.

4.

d.

e. f.

g.

h.

i.

ITCC in Riyadh Residential Complex J10-13300

16783-23

Security System

j.

Base ISC with standard memory download from the SYSTEM shall require no more than ten (10) minutes Downstream ports shall be for connecting card readers and data gathering panels via RS-485 multi-drop wiring configuration Support for up to 32 devices consisting of Reader Interface Modules, Input Control Modules, and Output Control Modules in any combination desired with a maximum of 16 ICMs per ISC Support of multiple card technologies Supervised Communications between ISC and SYSTEM Software Multi drop support for up to eight ISCs per SYSTEM communications port Support of up to eight card formats and facility codes RS-485 Full Duplex, UL 1076 Grade AA communication channel to the SYSTEM head-end Integration to other manufacturers card readers Uninterruptible Power Supply (UPS) with battery backup 32-bit Microprocessor Biometric Interface Support An ISC downstream serial port shall multi-drop 16 access control field hardware devices using an RS-485 UL 1076 Grade A communication format allowing a distance of 4,000 feet using Belden 9842 cable or equivalent VAC or 12 VDC input power Issue Code Support for both Magnetic and Wiegand Card Formats Individual Shunt Times (ADA Requirement) Up to Nine Digit PIN Codes Downstream serial RS-232 device support Status LEDs for normal component and communication status

k.

l.

m. n. o.

p. q.

r. s. t. u. v.

w. x. y. z. aa. bb. C.

INPUT CONTROL MODULE (ICM) 1. 2. The Input Control Module shall monitor all system alarm inputs. Grade B Inputs

ITCC in Riyadh Residential Complex J10-13300

16783-24

Security System

a.

The Input Control Module shall provide up to 16 UL 1076 Grade B analog unsupervised alarm input zones to monitor and report alarm conditions, power faults, and tampers as well as 2 output control relays. When an alarm input is activated, the associated alarm condition shall be reported to both the ISC and subsequently to the SYSTEM alarm monitoring client workstation. Status LEDs shall provide information about the sixteen alarm zone inputs, cabinet tamper, and power fault. For each status LED, a slow flash shall imply a "No Alarm" condition and a fast flash shall indicate an alarm condition.

b.

3.

Grade A Inputs a. The Input Control Module shall provide up to 16 UL 1076 Grade A analog supervised alarm input zones to monitor and report line fault conditions (open, short, ground, or circuit fault), alarm conditions, power faults and tampers. When an alarm input is activated, the associated alarm condition shall be reported to both the ISC and subsequently to the SYSTEM alarm monitoring client workstation. Status LEDs shall provide information about the sixteen alarm zone inputs, cabinet tamper, and power fault. For each status LED, a slow flash shall imply a "No Alarm" condition, a fast flash shall indicate an Alarm Condition, and a solid LED shall indicate a Zone Fault (open, short, ground, or circuit fault).

b.

4.

Grade AA Inputs a. The Input Control Module must provide up to 16 UL 1076 Grade AA alarm input zones to monitor and report line fault conditions, alarm conditions, power faults and tampers. When an alarm input is activated, the associated alarm condition shall be reported to the ISC and subsequently to a SYSTEM alarm monitoring client workstation. Status LEDs shall provide information about the sixteen alarm zone inputs, cabinet tamper, and power fault. For each status LED, a slow flash shall imply a "No Alarm" condition, a fast flash shall indicate an Alarm Condition, and a steady LED shall indicate a Circuit Fault (open, short, ground). The Input Control Modules must also be able to operate independently and in conjunction with Output Control Modules (OCM), which will send an output signal to a corresponding output device upon alarm input activation. Once an alarm has been received, the Input Control Module shall activate any or all alarm outputs within the Output Control Module. The Output Control Module shall provide 16 Form C outputs rated at 5A @ 30VDC. Upon an alarm input from the Input Control Module, the Output Control Module shall transmit an activating signal to a corresponding output device.
16783-25 Security System

b.

c.

ITCC in Riyadh Residential Complex J10-13300

5.

Up to 16 ICMs shall be connected to an available ISC using RS-485 cabling. Diagnostic LEDs shall indicate ISC communication, input zone scanning, and Input Control Module heartbeat. The ICM must contain the following features: a. b. UL 294, ULC, and CE Certified Alarm contact status scanning at up to 180 times per second for each zone Eight configuration DIP switches to assign unit addresses and communications speed A low power CMOS microprocessor Filtered data for noise rejection to prevent false alarms Up to 16 Grade B, A, or AA Supervised Inputs in any Combination 12 VAC or 12 VDC Input Power 2 Form C Contacts for load switching 2 dedicated inputs for tamper and power status

c.

d. e. f. g. h. i. D.

OUTPUT CONTROL MODULE (OCM) 1. The Output Control Module shall incorporate 16 Output Relays that are capable of controlling a corresponding output device upon any input activation or on command from the SYSTEM. Output relays shall be capable of responding to: a. b. c. 3. Input alarms from a within the same ISC. Commands from a System Operator. Time zone control commands for automatic operation.

2.

Output relays shall be capable of: a. Pulsing for a predetermined duration. programmable for each relay individually. Duration shall be

b.

"Following" any input point an ICM attached to the same ISC (on with alarm, off when clear, or as required). Responding on command from the System Operator to pulse, command on, command off, or reset to normal state.

c.

ITCC in Riyadh Residential Complex J10-13300

16783-26

Security System

4.

Each OCM shall provide 16 Form C relays rated at 5A @ 30 VDC. The OCM shall control the relays by digital communication. Upon an input from the ICM or command from the System Operator, the ICM shall transmit an activating signal to a corresponding relay. The OCM shall be UL 294 and CE Certified.

E.

CARD READERS 1. The SYSTEM shall support a variety of card readers that must encompass a wide functional range. The SYSTEM may combine any of the card readers described below for installations requiring multiple types of card reader capability (i.e., card only, card and/or PIN, supervised inputs, etc.). These card readers, described below, shall be available in Magnetic Stripe and Wiegand output format, depending on the card reader. Reader Types: a. Proximity readers shall be short range or long range as required (passive type) with read range from to cover the application. No contact is required. It shall support Industry standard Wiegand. Readers shall support the following card type: 1.) 2.) 3.) 4.) 5.) 6.) c. iCLASS MIFARE SMARTCARD Proximity Biometric Magnetic Stribe

2.

b.

Biometric finger print readers shall. It shall support PIN pad and fingerprint authentication. The reader shall be able to communicate with the controller through the biometric reader interface gateway using RS-485. It shall support Wiegand DATA. It shall have LED indicators for reader status and audible indicator buzzer.

3.

Card Readers must be able to support a user defined downloadable offline mode of operation (locked, unlocked, or facility code), which will go in effect during loss of communication with the ISC. All card readers shall provide audible feedback to indicate access granted/denied decisions. Upon a card swipe, two beeps shall indicate access granted and three beeps shall indicate access denied. All keypad buttons shall provide tactile audible feedback. As many as 32 card readers of any type described below shall be able to be connect to a single ISC port.

4.

5.

ITCC in Riyadh Residential Complex J10-13300

16783-27

Security System

6.

All card readers may optionally include card reader back boxes for conduit installations. Standard Card Readers with Wiegand Communications and Clock/Data Output a. The standard card readers with Wiegand Communications and Clock/Data Output shall be provided with or without a keypad. These card readers with a keypad shall include a 12 character, raised membrane tactile keypad with audio feedback, enabling PINs to be used in conjunction with cards. The standard card reader with Wiegand Communications and Clock/Data Output must offer the following features: 1.) 2.) 3.) 4.) 5.) 6.) 7.) 8.) 9.) 10.) UL 294, ULC, and CE Certified Low Power/Surface Mount Card Reader 600,000 pass read head Small, rugged, die cast aluminum Bi-directional card swipe Weatherized Finishes LEDs for access and card reader status Card and PIN data shares same output lines 12VDC or 5VDC Input Power RJ-45 Jack for Quick Installation

7.

b.

F.

SINGLE READER INTERFACE MODULE (RIM) 1. The Single Reader Interface Module shall provide an interface between the ISC and card readers. The Single Reader Interface Module must operate with any card reader that produces a standard Wiegand (Data 1 / Data 0 or Clock and Data) communication output. As with other card reader types listed above, a single ISC shall be able to multi-drop as many as 32 Single Reader Interface Modules. Up to sixteen (16) RIMs shall be connected to each port on the ISC. The RIM shall monitor on a per door basis, door position, exit push button, and two auxiliary alarm inputs. It shall also control the electric strike and provide two auxiliary relay outputs. The RIM shall support up to eight unique card formats.

2.

3.

ITCC in Riyadh Residential Complex J10-13300

16783-28

Security System

4.

The RIM shall support an integrated card reader/keypad and shall support three access modes upon loss of communication with the ISC; locked, unlocked, and facility code. The RIM shall offer the following features: a. b. c. d. UL 294, ULC, and CE Certified 12VDC Power Support for up to eight Magnetic and Wiegand Card formats Support for Clock/Data Communications and Data1/Data0 Wiegand

5.

e.

2 Programmable Inputs and 2 Programmable Relay Outputs Per Reader

G.

DUAL READER INTERFACE MODULE (DRIM) 1. The Dual Reader Interface Module shall provide an interface between the ISC and card readers. The Dual Reader Interface Module must operate with any card reader that produces a standard Wiegand (Data 1 / Data 0 or Clock and Data) communication output. As with other card reader types listed above, a single ISC shall be able to multi-drop as many as 32 Dual Reader Interface Modules. Each DRIM shall support two card readers, each of which shall be up to 500 away from the DRIM. Up to sixteen (16) DRIMs shall be connected to each port on the ISC. The DRIM shall monitor per card reader - door position, exit push button, and 4 auxiliary alarm inputs. It shall also control the electric strike and provide four auxiliary relay outputs. The DRIM shall support up to eight unique card formats. The DRIM shall support an integrated card reader/keypad and shall support three access modes upon loss of communication with the ISC; locked, unlocked, and facility code. The DRIM shall offer the following features: a. b. c. d. UL 294, ULC, and CE Certified 12VDC or 12VAC Input Power Support for up to eight Magnetic and Wiegand Card formats Support for Clock/Data Communications and Data1/Data0 Wiegand

2.

3. 4.

5.

e.

4 Programmable Inputs and 4 Programmable Relay Outputs per Reader

ITCC in Riyadh Residential Complex J10-13300

16783-29

Security System

H.

BIOMETRIC READER INTERFACE (BRI) 1. The Biometric Reader Interface Module shall provide an interface between a designated ISC and biometric readers. One (1) BRI shall be connected to each downstream port on the ISC, which means that a maximum of four Biometric Reader Interface Modules shall be supported on one ISC. The BRI shall have the capability to monitor on a per door basis, door position, exit push button, and two auxiliary alarm inputs. It shall also control the electric strike and provide one auxiliary relay output. The BRI shall support three access modes upon loss of communication with the ISC; locked, unlocked, and facility code. The BRI shall offer the following features: a. b. c. d. 12VDC or 12VAC Power Support for up to eight Magnetic and Wiegand Card formats Support for RS-485 biometric reader protocol communications One Programmable Relay Output Per Reader

2.

3.

4.

I.

FIELD HARDWARE POWER SUPPLIES 1. Power Supplies for field hardware shall be designed specifically for the SYSTEM equipment installed. These power supplies shall be regulated, isolated versions for the ISC, ICM, Card Readers and other equipment. Each version shall be available in UPS with battery back-up and non-UPS models. All power supplies shall be housed in locked enclosures that also allow mounting space for the ISC, ICM, RIM, DRIM or other device/panel required.

J.

STAR CONFIGURATION SPLITTER 1. The SYSTEM shall support a star configuration splitter that shall expand a single ISC communications port into eight 2 wire or four 4 wire RS-485 communications ports to be used in a star configuration. All outgoing data shall be broadcast on all eight ports.

2.4

SURVEILLANCE CLOSED CIRCUIT TELEVISION SYSTEM A. This section of the specifications requires the complete installation of the Closed Circuit Television System (CCTV) as indicated on the drawings and/or specified herein. Provide all labor, materials, equipment and supervision to install, check out, adjust and calibrate total system. All pictures shall be clear and free of snow, ground loops, or other conditions that will degrade the picture. The work shall consist of the installation of a complete closed circuit television system (DIGITAL IP VIDEO) consisting essentially of, but not limited to, the following major components:

ITCC in Riyadh Residential Complex J10-13300

16783-30

Security System

1.

Remote cameras, including lens, housings, motion operators, and mounting devices Monitors with mounting devices for installation where indicated Signal conditioning equipment where required for rack mounting Network Video Recorder (NVR) Equipment mounting racks and cabinets System wiring and software RAID storage system

2. 3. 4. 5. 6. 7. B.

System Operation 1. The basic operation of this system shall be accomplished through the use of a microprocessor-based NVR. All camera and control signals shall use TCP/IP to interconnect with the NVR unit located in the central control equipment room, to be distributed among all remote monitor/control locations. See one-line diagram. One control keyboard will be provided in each of the Central Control room.

2.

The CCTV system shall be software based and shall be closely integrated with the security management software have several remote monitoring and control locations as shown on the one-line diagram and as shown on drawings. The TCP/IP LAN shall allow managing and browsing of the NVR from any point on the LAN

C.

CAMERAS 1. Fixed mini done digital IP Network Camera. a. Camera shall have the following minimum specification 1.) 2.) 3.) 4.) 5.) 6.) 7.) Discreet and compact desin Protect against tampering Varifocal lens with DC iris Power over Ethernet (IEEE802.3af) Progressive scan for sharper images Wide Dynamic Range Multiple H.264 streams and simultaneous Motion JPEG streams 30 frames per seconds in VGA 640x480 resolution
16783-31 Security System

8.)
ITCC in Riyadh Residential Complex J10-13300

9.)

Two-way audio support including builtin microphone and audio detection alarm One alarm input and one output for connecting external devices Active Tampering Alarm

10.)

11.) 2.

Fixed IP Camera a. Camera should have the following minimum specification 1.) Up to 30 frames per seconds in all resolution ranging up to 640x480 Varifocal lens with DC iris Progressive scan for sharper images Simultaneous Motion JPEG and MPEG-4 Power over Ethernet (IEEE802.3af) Replaceable CS mount lens One alarm input and one output for connecting external devices

2.) 3.) 4.) 5.) 6.) 7.)

D.

CAMERA HOUSING AND SUPPORTS 1. All cameras are to be installed in housings. Housings and support brackets shall be compatible with CCTV camera specified to be installed within housings and/or mounted on brackets. Housings shall be provided with all cable entrance facilities for camera control and shall be adaptable to mounting devices used with cameras. If fish eye lenses are required to be used on cameras the housing shall not block view of lens. Weatherproof-tamperproof housing shall be constructed of aluminum and finished with weatherproof heat-reflecting paint. Housing shall be internally insulated. Hinged cover shall be secured in place by tamperproof latch that can be locked. All camera housing installed outside of conditioned spaces such as recreation yards, or outside shall be weather proof. Housing shall be provided with the following features: a. b. Bottom air intake and filter. Thermostatically controlled blower, 10 Watts at 24 VAC, continuous duty Strip type heaters mounted on insulated radiator panels thermostatically controlled, 50 Watts at 24 VAC continuous duty.
16783-32 Security System

2.

c.

ITCC in Riyadh Residential Complex J10-13300

d. e. f.

Sunshield. Automatic or manual operated defroster. Transformer to provide 24 volt from 230 volt circuits connected to emergency power system. Control of blower and heater shall be automatic when camera power circuit is energized. Camera housing shall be as required by camera provided, with accessories specified.

g.

3.

Camera mounting brackets shall be heavy-duty; the product shall be for wall mounting and shall be suitable for outdoor use. a. Wall mounting brackets shall be suitable for camera and enclosures specified and shall be rated for support of not less than the total weight of the camera, enclosure with all accessories and motion control. Bracket extension from wall shall not exceed 610 mm. Brackets with extension of 610 mm or larger shall be provided with support strut. All screws and bolts shall be stainless steel.

4.

Interior camera enclosure shall be provided for interior cameras as indicated on the plans. Ceiling-mounted "wedge" enclosure shall have hinged bottom secured with tamper resistant screws, the housing shall be constructed of 14 gauge steel (upper section of 5052 H32 Aluminum and lower section of UL approved vacuum formed ABS plastic in non inmate areas only). All wall mounted cameras shall be provided with compatible enclosures. All cameras shall be placed in a location as to not be blocked by equipment installed by other trades. All camera housings and support for interior use shall be heavy duty and impact resistant. Mini Dome cameras are completely integrated with housing.

5. E.

TELEVISION MONITORS (LCD) 1. The flat panel LCD monitor shall have performance-enhancing features such as picture-in-picture, menu controls to adjust video features, and automatic detection of a PAL or an NTSC signal. The flat panel LCD monitor must have the following inputs: a. b. c. d. e. one analog RGB input. one looping Y/C (S-video) input. two looping composite video inputs. two looping audio inputs. one digital DVI input.
16783-33 Security System

2.

ITCC in Riyadh Residential Complex J10-13300

f. 3.

one digital HDMI input.

The flat panel LCD monitor shall provide a front panel that allows the user to adjust image quality, brightness, size, position, and geometry for optimal viewing. The flat panel LCD monitor shall provide a front panel control lockout feature so that only authorized users can adjust menu settings. The flat panel LCD monitor shall avoid luminance degradation by: a. b. Using long-life fluorescent backlights. Each fluorescent backlight shall have a rated life of at least 45,000 hours.

4.

5.

6.

The flat panel LCD monitor shall automatically adapt to the input resolution of the incoming video signal: a. [UML-172-90] [UML-192-90]: shall adapt to a maximum resolution of 1280 x 1024 pixels, 500 TVL typical. UML-202-90: shall adapt to a maximum resolution of 1600 x 1200 pixels, 500 TVL typical.

b.

7.

The flat panel LCD monitor shall automatically adapt to fluctuating electricity loads.

F.

VIDEO RECORDER & NETWORKED SERVER SYSTEM: 1. NVR shall be selected to be totally integrated with the security management software. The NVR software shall be an integrated module of the security management software. NVR shall be open architectural, support LAN/WAN TCP/IP with adjustable frame rate for each camera from 1 to 30 fps per camera as required. NVR software shall be windows 2000 based. The system shall support the following features: a. b. Auto Launch of Video on Specified Alarm Events Realtime Linkage of Video to Alarms or Events Generated by Third Party Field Devices Variable Frame Rates for each Camera Route Video from Multiple Video Recorders to a Central Archive Server Auto Launch of Video on Specified Alarm Events

c. d.

e.

ITCC in Riyadh Residential Complex J10-13300

16783-34

Security System

2.

Playback: a. 16 different recorded video sequences should be played back simultaneously. Each video stream could be decompressed and played back at the required speed. All video sequences should be time-synchronized on playback.

3.

Storage & Archival a. Each camera should be recorded for any length of time on a circular basis. Outdated video should be archived or overwritten or further compressed and stored. It should allow for intelligently further compression of the data without significantly reducing video quality. Records of up to one week on the building unit and one month on the RAID5 server in central control room should be kept on the hard disk for immediate accessibility. NVR shall allow archiving on net work central archive server. Capacity of the NVR hard disk shall be calculated to store all cameras connected for continuous recording at 6 FPS, 2 CFIS, 30 days. If the internal hard disk is not sufficient then RAID 5 drives shall be added externally.

b.

4.

Privileges & Security a. There should be 3 levels of privileges in the CCTV system; administrator, manager & user. Administrators should have access to all system resources including configuration. All actions should be logged and may only be viewed by administrators.

5.

Video Motion Detection (VMD) a. A sophisticated motion detection module should be used that could monitor up to 16 camera inputs in real time. Any number of regions may be selected for motion trigger in any one view. The motion detector should have three sensitivity levels. Different sensitivity levels should allow the user to select the required level of motion to generate triggers. Sensitivity level settings should also be used to ignore usual motion such as movement in the leaves, rain etc. Changes in light conditions should not affect the motion detection. The robust motion detection algorithm should be only sensitive to movement reducing false triggers.

6.

Networkability a. NVR to be fully networkable. Any number of units should be networked over private Ethernet TCP/IP serving a large number of camera groups in a very flexible way. Any unit on the network may be remotely accessed and configured using the CCTV software. Compressed images should be scaled & served on the network, reducing the demand on network bandwidth.

ITCC in Riyadh Residential Complex J10-13300

16783-35

Security System

7.

Image Export & Authentication a. Recorded video should be searched by date, time & events. Clips of interest from different cameras should be exported onto CD or DVD. Exported images should be played back on any Windows machine (98, 98SE, NT or 2000) without installing any software. All recorded and exported images should be authenticated. The NVR cum Networked Server should have high security authentication enabling tampered images being immediately identified.

8.

Time Zones a. Each time zone should divide the day into 96x15 minute slots or similar. In each slot, settings like record rate, quality, actions to be initiated by an ordinary alarm and/or VMD may be defined individually. Once defined and named, a Time Zone may be used for any number of cameras on any number of units.

9.

PTZ Software & Camera Patrols a. PTZ software should be provided & should be compatible with the PTZ cameras & NVR cum Networked Server. Scheduled camera patrols should not require user intervention. Patrols should not affect recording & playback.

10.

The camera image shall be achieved from each NVR to the RAID5 server in the central control room, the achieving can be scheduled for all NVR to reduce the load on the LAN. Remote Manager a. Remote Manager Software solution should connect to the NVR on a network. It should run on Windows 2000 platform. Review Manager should search and find the NVR cum Network Server on the network automatically, and connect to and display any camera from the server. To preserve valuable network bandwidth, Remote Manager should receive the images intelligently scaled. The innovative image scaling should allow the Remote Manager to achieve video display speeds of up to 25 full screen images per second (ips) over 100Mbps Ethernet.

11.

12.

CCTV INTEGRATION a. The whole CCTV system shall be managed from the control locations indicated on Drawings, & shall be integrated with all other security system.

G.

CAMERA LENSES 1. Camera lenses shall be compatible with camera construction and iris control circuit. The lenses shall be compatible with remote control devices as specified herein. The lenses shall be supplied by the camera manufacturer.
16783-36 Security System

ITCC in Riyadh Residential Complex J10-13300

2.

All lenses shall be auto iris type driven by the camera iris control circuit. Additionally, all exterior lenses shall be equipped with spot filters giving the lens a minimum effective aperture of f/360. The Systems Integrator must provide lens to cover area required by the specifications and drawings.

3.

2.5

MULTI-ZONE WALKTHROUGH METAL DETECTOR A. General Specifications. 1. The Multi-Zone Walkthrough Metal Detection system shall be with the following minimum features. a. Weapons location shall be made simple with the multi-zone engineered Walkthrough Metal Detection system. The system shall assist security personnel in the detection and location of metal weapons and contraband. The unit shall contain eight separate horizontal zones. When a person walks through the unit's portal, the vertical zone L.E.D. light bar shall provides a visual indication of where possible metal targets are concealed within the eight dedicated horizontal zones. Individual zone adjustments shall be reduce false alarms on personal items such as keys, coins and jewellery, providing maximum detection and maximum reliability. It shall be with extremely low false alarm rates on the highest throughput traffic flow. The unit shall be with true horizontal zones for accurate metal locations. The WMD shall have individual zone adjustments for sensitivity provides ultimate discrimination. The WMD unit shall be with true digital signal processing and state-of-the-art electronics. Individual zone sensitivity adjustment ranges from 0 99 from global baseline setting for all 8 zones. Metal cancellation effects between ferrous and non-ferrous metals are minimized through both antenna and software design. DSP circuitry eliminates spikes, noise, and two-way radio interference.

b.

c. d.

e.

f.

g.

h.

i.

j.

k.

l.

ITCC in Riyadh Residential Complex J10-13300

16783-37

Security System

m.

Bright, large LED indicators for power and individual 8-zone vertical alarm status column. 100 fully adjustable program settings to customize threat level conditions. True digital signal processing (DSP) with advanced electronics for greatest reliability and immunity from surrounding electronic interference

n.

o.

B.

ELECTRONICS. 1. Advanced high-speed digital signal processor brain with non-volatile, non-erasable memory, LCD display, large LED bar graph meter, bidirectional software with selectable vertical LED zone indicators and audio/visual alarm.

C.

ARCHWAY. 1. Robust, seamless architectural plastic housing secures the multi-field antennas and vertical zone detection and traffic control LED lighting. Standard Composite: Blue-grey Granite Custom housing construction shall be available for color and appearance.

2. 3. D.

PERFORMANCE STANDARDS. 1. Performs in accordance to the TSA enhanced metal detection target standards. Meets and exceed NIJ standard 0601.00 level 1-5 and F.A.A. Airport Security Regulations. Independently certified safe for pacemakers and defibrillators.

2.

3. E.

DIMENSIONS/WEIGHT. 1. 2. 3. Overall Loop Housing: Passage Clearance: Weight: 87"H x 24"D x 35"W 79.5"H x 28"W 140 lbs.

F.

CONTROL CONSOLE LCD DISPLAY. 1. The password protected console-mounted keypad shall allow the user to change the operational settings and self-prompting instructions are to be provided for all selections. The unit shall be with an exact sequence operational menu and that should be support easiest to operate and set-up the configurations.

2.

ITCC in Riyadh Residential Complex J10-13300

16783-38

Security System

3. G.

Large, color-coded LEDs and 64-character backlit LCD.

ELECTRICAL. 1. 2. 90 137 (1 Amp) or 180 259 (1 Amp) VAC 50 60 Hz =/ - 3 Hz.

2.6

HIGH CAPACITY PARCEL X-RAY MACHINE A. The Parcel X-Ray system shall be with the following minimum features: 1. The system shall be compact, lightweight and ergonomic conveyorized Xray scanner to inspect bags, briefcases, purses, cameras, laptops, backpacks, shoes, mailbags, bins and parcels. Ergonomic height and smaller footprint enhances security and fits in narrow doorways, elevators and spaces; conveyor folds for transport. Parcel contents shall be displayed at normal scale, wherever located, automatically and without distortion. A Real Clear function shall reveal components of dense items in real-time without lags or delays. The X-ray system shall be with Multi-Energy Color option with Organic/ Inorganic Stripping, TIP, Training and Image Archiving. Auto-Matalert, option shall highlights suspect materials using atomic number and density. The X-ray consists of Auto Tracking guided conveyor belt system that never needs adjustment and reversible conveyor direction. Auto Sensing shall be eliminates the need for troublesome photo sensors or footpad switch. The system shall assure 100% screening of thin blades or plastique in magazines or courier envelopes, or of bag already in tunnel at start-up. The X-ray Scanner shall have 160, 140 kV, 10mm penetration, (twice the penetration) available elsewhere, eliminating hand searches and improving image quality. Overall Dimensions: a. 9. 124.0 (317 cm) L x 51 (129.3 cm) W x 76 (192.9 cm) H.

2.

3.

4.

5.

6.

7.

8.

Tunnel Size: a. b. 39.4 wide (100 cm) 39.4 high (100 cm)

10. 11.
ITCC in Riyadh Residential Complex J10-13300

Material Penetration: 28-29 mm steel. Contrast Sensitivity: Over 2 million color tones standard.

16783-39

Security System

12. 13.

Resolution: 40 AWG wire. Conveyor Speed: 27 cm height of floor, 48 feet per minute; 24 cm per second. Fully reversible. Pulling Weight: 150 kg (331 lbs) standard; 403.2 kg (887 lbs) option Film Safety: Guaranteed for high-speed films up to ISO 1600 (33 DIN).

14. 15. B.

X-ray Generator. 1. 2. 3. 4. 5. X-ray tube head: Operating voltage: Duty cycle: Beam orientation: Dose rate per exam: Self-contained 160,140 kV standard 100% with sealed oil bath cooling. Diagonal 0.1 mR. Lower doses available.

C.

X-ray Detectors. 1. Surface mounted, multilayer, fully integrated, high frequency, solid state detectors using high speed processors, and Pentium 4 image processing with Single Energy or optional Multi-Energy (M) Color.

D.

Video 1. 2. The X-Ray system shall be monitored with color 17 SVGA monitor. That shall consist of High resolution, flicker-free, .28 dot pitch, low rad. monitor, 1280 x 1024. Single energy color is based on object density. Multi-Energy color shall be provided with second monitor or flat screen or larger monitor(s), displays organics in orange and inorganic in blue, both overlapping in green and very dense objects in black, and includes Organic and Inorganic Stripping.

3. 4.

E.

Environmental Conditions. 1. 2. 3. 4. Temperature range: 23to 131F (-5 to 55C) Humidity 20% - 95%, Non-condensing. Storage to 65C (149F). Requirements: 100, 120, 230 volts AC + 10%, < 6 amps. 200, 230, 240, 250 volts AC 10 %,< 3 amps All at 50 or 60 Hz

ITCC in Riyadh Residential Complex J10-13300

16783-40

Security System

F.

Compliance: 1. Complies with the U.S. Federal Aviation Administration Standards "Use of X-Ray Systems" (Federal Standards 14 CFR 108.17 and 14 CFR 129.26; the system conforms to the USBRH Performance Standards for Cabinet X-Ray Systems (21 CFR 1020.40). ISO 9001 compliant. Emergency Stop buttons. Cluster LED X-Ray "ON" indicators for lower maintenance. The electrical system conforms to applicable sections of IEC 348 for Electrical Safety and FCC Docket 20780 for Electromagnetic capability.

2.

3.

2.7

UNDER-VEHICLE INSPECTING SYSTEM A. General Specifications 1. 2. 3. 4. The under-vehicle inspection system shall consist of color, high-resolution 6 imaging sensor package. System may comprise from three modules; each having two imaging sensors and four high-intensity white LEDs. An included system control unit shall interface with an included image control unit to accommodate specific installation requirements. The standard configuration of the system shall allow the digital recording and playback of up to 8 cameras: Six cameras supplied as part of the under-vehicle inspection system, and an additional two cameras which will be used for driver imaging and license plate recording Integrated Automatic License Plate Reader (ALPR). Display shall be a 19-inch or larger high-resolution LCD monitor. A high-brightness monitor shall be supplied to enable use in a sunlit guard station. Touch Screen option is to be used. An integrated air-powered lens cleaning system consisting of vortex air nozzle shall be incorporated to remove dust, dirt, debris and water from the camera and light lenses. Mechanical systems with wipers or pop-up nozzles are not acceptable. System shall be engineered to operate on standard 15-amp electrical service. System shall operate from 95-265 volts, 50-60 Hz. The system shall be available as above or below ground (installed) and shall be load rated for a 100,000-pound wheeled vehicle. Under-vehicle lighting shall be high-intensity white LEDs, rated at up to 100,000 hours. Lights and imaging sensors shall be IP-68 rated, with lifetime guaranteed scratchproof lens covers and may be used in a condensing environment. Lighting and imaging sensors shall be field replaceable.

5. 6. 7. 8. 9.

10. 11. 12. 13. 14. 15. 16. B.

Under Vehicle Inspection Specifications 1. 2. 3. Capture Under Vehicle Images, correlate them with the License Plate Number and store in the Relational Database Database storage: 5000 recordings The user has the capability to look at the images frame by frame, enhance
16783-41 Security System

ITCC in Riyadh Residential Complex J10-13300

4. 5.

them for further detail, stop, pause, forward and rewind the images. The user can view every Nth frame, and enable or disable certain cameras as required to reduce image overlap. The system will record the License Plate image and the Driver image tagged with the Under Vehicle Image.

C.

ALPR Specifications: 1. 2. 3. 4. 5. Can recognize and read (OCR) Arabic and English characters (letters and numbers) File Types: BMP, JPEG File Format: Grayscale, RGB16, RGB24, RGB32, YUV Image Size: 768x288 pixels Output: a. Plate Number in ASCII b. Plate Position c. Positions of characters d. Tip list for each character e. Confidence levels for each tip f. ALPR Camera specification: g. 1/3" interline transfer Exview HAD CCD h. Picture elements: 795x576 i. Sensing area: 6.3mm (H) x 4.7mm (V) j. Scanning system: 625 lines, 2:1 interlaced k. Horizontal resolution: 570 TV lines l. S/N ratio: 48dB AGC OFF m. Synch system: Internal n. Output signal: NTSC 1Vp-p 75 Ohm o. Shutter time: 1:100 000 s for even fields 1:10 000 s for odd fields p. Infra wavelength: 850 nm q. Power: 20-40V DC or 15-28V AC (50-60Hz) 25W (including IR flash and heating), reverse polarity protection r. Operation Temp: -20C - +65C s. Class: IP65

2.8

CRASH RATED AUTOMATED BOLLARDS A. B. C. D. E. F. G. Mechanism: 1.1 kW motor per bollard. Immersed pump. Extra Heavy Duty solenoid valves for reliability and safety In operation. Running pressure 40 bar. Maximum running pressure 80 bar. Function: Passage in both directions electronically controllable via Mitsubishi PLC. Power failure: Bollard will remain in the raised position (with the option to lower in the event of power failure). Manual Release: Facility for manual release available.

H.

ITCC in Riyadh Residential Complex J10-13300

16783-42

Security System

I. J. K. L. M. N. O. P.

Interface: Can interface with all access systems. Duty Cycle: 100%. Operating speed: 3-4 seconds to raise, 2 seconds to lower. Accumulator speed: 1.5 seconds Power: 240V/1ph/50Hz, 415V/3ph/50Hz, or to suit country requirements. PLC Control Voltage: 110V/220V AC. PLC Logic Voltage: 24V DC. Delivery: The Bollard is delivered in two elements - Automated Bollard and cabinet. Axle Weight: Up to 90 Tone. Crash Test: 6.8 Tones (15,000lbs) @ 40mph/64kph. Equivalent to DOS K8 Safety/Security: Inductive loops. Removable cover giving access to control connections for easy installation and maintenance. Option of accumulator and push button for Emergency Fast Operation.

Q. R. S. T.

U. 2.9

CRASH RATED ROAD BLOCKER A. Specification shall be as the following: 1. 2. 3. Height: Total raised height 880 mm. Width: as required by site. Composition: 10mm Steel plate reinforced to evenly distribute any impact. Internal crash plate supported by sectional steel mid plates covered with sacrificial front radius plate, incorporating impact absorption bars. Plate shall be painted yellow and black stripes. Cabinet: 1200mm high x 900mm wide x 600mm deep, 3mm Zintec steel sheet finished in grey or otherwise indicated. Cabinet shall comply to NEMA 4 or IP 55. Mechanism: 4 kW motor Immersed pump Extra Heavy Duty solenoid valves for reliability and safety in operation Approximate running pressure 25 bar Approximate maximum running pressure 80 bar Power failure: Option of remaining raised or lowered in the event of power failure. Interface: Can interface with most access systems. Duty Cycle: 100%. Normal operating speed: 4-7 seconds. Accumulator speed: 1.5 seconds.
16783-43 Security System

4.

5.

6. 7. 8. 9. 10.
ITCC in Riyadh Residential Complex J10-13300

11. 12. 13. 14. 15. 16.

17.

18. 19. 20. 21.

22.

Power: 380v/3 ph/60 Hz. PLC Control Voltage: 220vAC. PLC Logic Voltage: 24vDC. Accessories: traffic lights, transponder, transmitter keypad, token/coin acceptors/ proximity card, push button etc. EFO (Emergency Fast Operation): 6 Litre Accumulator. Safety/Security: Inductive loops Security cover to prevent un-authorized access to hydraulic systems. Manufacture: All manufacturing exceeds BS 6571, all welding to BS 4872. Heavy duty steel durbar top plate 10mm thick. Hot Dip Galvanized to BS EN ISO 1461. Primed and painted black and yellow. Installation: Does not require pre-cast or reinforced concrete pit. Delivery: The Road blocker is delivered in two elements - Blocker and cabinet. Axle loadings: Will withstand any road going vehicle (in house certificate) Crash Rating: British Standard PAS 68: 2007 - 7.5 tonnes @ 80 kph/50 mph with nil penetration. American Department Of State K12 6.8 tonnes @ 80 kph/50 mph. Drainage system: Suitable for the application.

2.10 PERIMETER INTRUSION SYSTEMS A. Fiber Optic Intrusion Detection System 1. System Description a. The system shall be based on a multimode fiber optic sensor with dual-zone/channel, DSP-based Alarm Processing Unit (APU) designed and configured for fence line, wall, or buried zone intrusion detection. The system shall also incorporate the use of insensitive lead-in cables. The fiber optic intrusion detection system shall function as a perimeter intrusion detector. The multimode fiber optic sensor cable shall be designed for encasement in flexible conduit and mounting on a perimeter fence or wall. The basic system shall consist of the fiber optic sensor cable, insensitive lead-in cables, flexible conduit, and a dual-zone/channel alarm processing unit. The system shall provide intruder detection on various types of fencing such as chain link, expanded-metal, or welded-mesh fabric. The system shall detect intruders and generate an alarm based on changes created in the sensor cables optical signal by any intruder action that causes vibration, motion or pressure. These actions are characteristic of an egression of a fence barrier in any of the following manners: fence climbing, post climbing, cutting, digging at the base of a fence, lifting of fence fabric, ladder assisted vaulting, or other fence contact bridging methods. The system shall be capable of stand-alone operation. The system shall also be capable of integrating itself into a central control system by providing alarm relay contact outputs and/or an RS-232 interface, depending on requirements of the alarm monitoring system.
16783-44 Security System

b.

c.

d.

e.

ITCC in Riyadh Residential Complex J10-13300

2.

System Technology a. Alarm Processor 1.) The Alarm Processing Unit (APU) shall analyze the signals from the fiber optic sensor cable and shall detect vibration, motion, or pressure acting on the fence. The processor shall use adaptive algorithms to determine actual alarms versus false or nuisance alarms. The light source shall be a LASER or equivalent optical source providing sufficient coherent light to meet the systems performance requirements. Each available zone/channel of the APU shall support a total sensor cable length of up to 5000 meters (16,400 feet). Each available zone/channel of the APU shall support insensitive lead-in cable lengths of up to 20 kilometers meters (12.4 miles).

2.)

3.)

4.)

b.

Signal Processing Algorithms 1.) The system shall use digital signal processing and adaptive algorithms capable of adjusting the performance to specific fence types and environmental conditions. Each available zone/channel of the APU shall have two parallel internal processor channels - Processor 1 (Climb) and Processor 2 (Cut) - where a separate calibration is allowed for either processor providing detection for two distinctly different intrusion scenarios. Either processor may be turned ON or OFF. If they are both on, they are logically OR gated so that an ALARM will occur if the conditions for either Processor 1 or Processor 2 are satisfied.

c.

Fiber Optic Cable 1.) The fiber optic sensor shall be made of glass and not plastic. The fiber shall be compatible with LASER light sources and shall be a multimode fiber cable design. Jacketing shall be available in different diameters which shall be dependent on application. The jacketing shall be designed for use on or in: interior spaces, plenum chambers, direct burial applications, fences, non-metallic flexible or rigid conduits, under roof material, and in concrete or stucco finishes.

d.

Laser Monitoring 1.) Each APU zone/channel shall monitor the returning laser power and generate a Fault alarm if power falls below a pre-determined value.

ITCC in Riyadh Residential Complex J10-13300

16783-45

Security System

3.

System Parameters a. Processor Adjustments 1.) Both internal processors in each available APU zone/channel shall have the following adjustments, menus, or entries available for tuning and setting up the system.

b.

System: 1.) 2.) 3.) 4.) 5.) Gain (overall system sensitivity) Allow wind-dependent processing Alarm relay duration Tamper switch enable/disable Processor 1: (climb detection) a.) b.) c.) d.) e.) f.) g.) h.) i.) 6.) Enable/disable Level of signal Lowest frequency Highest frequency Duration of signal Low level tolerance Event count Event window Event mask time

Processor 2: (cut detection) a.) b.) c.) d.) e.) f.) g.) h.) i.) Enable/disable Level of signal Lowest frequency Highest frequency Duration of signal Low level tolerance Event count Event window Event mask time

7.)

Software-based Wind Dependent Processing a.) b.) Enable / disable Wind compensation variable adjustment

8.)

Perimeter Maximum Sensor Cable Length a.) Each APU zone/channel will be capable of supporting up to 5 km of sensing fiber optic cable. Multiple APUs shall be capable of protecting a perimeter of any length when used in tandem with sensor cable and deployed in a loopback configuration.

ITCC in Riyadh Residential Complex J10-13300

16783-46

Security System

4.

Detection Properties a. Detection Sensitivity 1.) Sensitivity shall be linear across the entire zone and shall be adjustable for each zones specific requirement.

b.

Probability of Detection 1.) A properly installed system shall be capable of achieving a Probability of Detection (PD) rate of not less than 0.95 at the 90 percent level of confidence. The PD and error rate is not fixed, and is a function of the parameter settings of the APU and sensor cable configuration. PD for an installed system cannot be stated without site and zone specific configuration testing to determine the PD. The more areas tested and the stricter the written test procedure used, the better the confidence level and more accurate the PD result will be. Testing procedures shall match the security level of the installation, which shall match the facilitys security level requirements. Stealthy or mechanically assisted climbing on low security installations would be inappropriate. Inappropriate testing for the security level or procedures, and test results not documented or approved by the manufacturer for the installation, shall be given no credence.

2.)

3.) 4.)

5.)

6.)

c.

False and Nuisance Alarms 1.) The system shall be set up to minimize both false and nuisance alarms by use of all the adjustments available. The fence shall be subsequently tested and inspected to determine if any problems exist that may cause these types of alarms. See section 1.05A.

d.

System Internally-Generated Alarms (False Alarms) 1.) False alarms are those alarms for which no cause can be immediately determined but later prove to be caused by something other than intrusion. In this case it will refer to those alarms generated by a properly functioning processor and attached sensor due to an internal processing error. The maximum allowable False Alarm Rate (FAR) for a processor due to internally generated alarms shall be less than one per zone per year, averaged over the total number of zones in the system.

2.)

e.

Environmental Alarm (Nuisance Alarms) 1.) Nuisance alarms are defined as those alarms generated by a properly functioning APU and attached sensor cable, where the cause is known or suspected, and is not an
16783-47 Security System

ITCC in Riyadh Residential Complex J10-13300

intentional intrusion attempt (e.g. animals, wind-blown debris, etc.). The system shall operate as specified when installed properly to the manufacturers recommendations in outdoor environments. The system shall be installed and the site and fence prepared before installation in such a manner as to minimize the Nuisance Alarm Rate (NAR) from the following possible causes and corrections: f. Precipitation 1.) Seismic activity acting on the fence: Ground vibration from nearby trains or heavy vehicle traffic near the fence line may cause nuisance alarms. These causes shall be filtered out through calibration of the system. Wind blown objects: Vegetation, including trees, shrubs, or extremely long ground cover striking the fence at intermittent intervals as the result of wind may cause nuisance alarms. These potential sources shall be trimmed, cut, or otherwise prevented from contacting the fence. Fence Vibration: Fence-mounted signs and other loose materials or fence hardware shall be secured in place or removed as needed to prevent banging against the fabric or moving it. The fence fabric shall be consistently taut throughout the perimeter. Any site specific concern, or any unusual application or condition that may lead to an unacceptable false or nuisance alarm rates or other system problems, shall be communicated to the factory for analysis before ordering or installing any system. Such concerns are best resolved by submitting photos and detailed synopses to the factory. Solutions to potential problems can usually be found through subsequent site work recommendations and selection of equipment designed to address concerns.

2.)

3.)

4.)

5.

Sensor Cable a. The sensor cable shall have a polyurethane outer jacket that is resistant to cuts, abrasions, UV radiation, and chemicals. The sensor cable shall be installed in non-metallic flexible conduit along its entire run on the fence. This sensor/conduit combination shall be attached to the fence by stainless steel wire ties, spaced approximately 12 to 14 inches apart. Sensor Cable Types 1.) 2.) Single-fiber sensor cable in a 3-millimeter (OD) cable used for applications such as fences, walls, or roofs. Single-fiber sensor cable in a 4-millimeter (OD) cable designed for direct burial applications.

b.

c.
ITCC in Riyadh Residential Complex J10-13300

Cable Lengths: Sensor cable is available in any length up to 2000 meters (6500 feet).
16783-48 Security System

d.

Zone Lengths: Zone lengths shall be determined by the physical shape of the perimeter and the security level required by the facility. Fence Material: The factory shall be consulted if fence materials other than chain link, expanded metal, welded-mesh fabric, or wrought iron decorative fence are to be used. The factory shall be consulted if the fence height is comprised of any material other than chain link, expanded metal, decorative wrought iron, or welded mesh.

e.

B.

Microwave Detection Barrier 1. General Specifications: a. b. Digital microwave barrier with digital signal analysis for ranges of 50, 80, 120, 200 and 250m The internal microprocessor uses fuzzy logic to analyse the received signal giving very high performance in detection probability and low false alarm rates. monitors the signal, comparing it with behaviour models using algorithms based on "Fuzzy" logic (Fuzzy Behaviour Models FBM) to decide if the signal was created by a real intruder or some other factor The size, shape and rate of change of the signal are continuously measured and compared with typical stored signals. The sensor is able to detect intruders walking, running, crawling or rolling Dynamic digital anti-masking Automatic environment adjustment

c.

d. e. f. g. 2.

Specifications: a. b. c. d. e. f. g. h. Range: 50, 80,120, 200, 250 m Frequency: K /X-Band conforming to CE, USA and Canadian standards. Output power: conforming to CE, USA and Canadian standards. Target Speed: From 0 cm/sec to 15 m/sec. Target Size: Medium size human target for all intrusion attempts (40Kg). Probability of Detection: 0.99 minimum Modulation Channels: 16 crystal controlled. False Alarm Rate: 1/unit/year

3.

Electrical Specifications: a. Power Supply: 1.) 2.) b. c. 19Vac 13.8Vdc, 24Vdc

Current Consumption: 120mA TX+RX Alarm Outputs: 3 Solid state relays for Alarm, Fault, Tamper.
16783-49 Security System

ITCC in Riyadh Residential Complex J10-13300

4.

Environmental Specifications: a. Temperature: 35 C / +65 C

C.

Microwave Detection Doppler 1. General Specifications: a. b. c. d. e. f. g. h. i. j. 2. Volumetric microwave detector operating on the Doppler principle, with both tx and rx units combined in the one head. Installed to create a protection field of 90 in the horizontal plane and 20 in the vertical plane Can be adjusted from 4m to 20m Protection field = horizontal 90- vertical 20 Power supply = 13,8 Vdc Current consumption = 100 mA Max range = 20 m Output = 3 solid state relays for Alarm, Tamper, Fault. Temperature = -35C / +65C Dimentions = 125 x 125 x 50 mm

Other Sensor Features a. b. c. Storage of historical files within armidor of the last 256 events, and last 100 graphic signal records. with the indication of the date, hour, and type of event and further possible values. Data can be downloaded, locally or from remote, using software and stored on the hard disk from where they can be viewed and printed. Default parameters used whenever armidor has not been set up or when a self-check finds a corrupted value. Connection on RS485 serial line up to 96 sensors. DIGITAL RANGE SETTING: to adjust both the range of the detector from 4m to 20m, and the pattern of the detection field. This can be achieved from within the detector, or using the test and calibration meter, or by means of software using a remote pc. Internal leds indicate the desired range settings and numeric values can be displayed on a remote pc. ENVIRONMENT AUTOMATIC STABILISATION: The environmental temperature is continuously checked to detect possible faults. the temperature gradient (change of temperature in a specific time) is also checked to compensate signal differences due to environmental changes. FUZZY LOGIC DIGITAL ANALYSIS: The digital signal analysis is based on fuzzy logic behavior models for detection of longitudinal and transverse movements, with uniform sensitivity to both. in addition, the unit incorporates a digital filter to eliminate noise due to environmental conditions such as falling rain. DYNAMIC DIGITAL ANTI-MASKING: Another standard feature is the anti-masking capability, which will detect deliberate or accidental attempts to cover the unit and prevent detection.
16783-50 Security System

d. e. f.

g.

h.

i.

ITCC in Riyadh Residential Complex J10-13300

2.4

RACEWAYS AND WIRING: A. Wiring shall be as recommended by system manufacturer. Raceways shall be as mentioned in Section 16050 - BASIC MATERIALS AND METHODS.

PART 3 - EXECUTION 3.1 INSTALLATION: A. The entire security system shall be installed by specialized sub-contractor approved by the Engineer. Installation of the system shall conform to the equipment manufacturer's written instructions, National Electric Code and approved drawings. All systems shall be interfaced with main computer (PC). Other electrical work requirements shall be as specified in Section 16050 - BASIC MATERIALS AND METHODS. Coaxial cable and power cable for each camera shall be shall be run in separate conduits. Testing: The completed installation shall be tested in accordance with the equipment manufacturer's written recommendation. Testing shall be conducted by manufacturer's authorized representative. The Engineer shall be notified in advance to witness the test. Certified copies of test procedure and results shall be forwarded to the Engineer. END OF SECTION

B.

C.

ITCC in Riyadh Residential Complex J10-13300

16783-51

Security System

You might also like