Professional Documents
Culture Documents
SECTION 16725
PART 1 – GENERAL
A. Drawings and general provisions of Contract, including General and special Conditions
and Division-1 (General requirements) will apply to the work of this section.
B. General Provisions for Electrical Work, Section 16010, apply to work of this section.
C. Raceways, Boxes, and Fittings, Section 16110, applies to work of this section.
E. Fire Alarm and Detection System, Section 16722, applies to work of this section.
F. IP Closed Circuit Television System, Section 16723, applies to work of this section.
B. The Access Control and Security Management Systems shall be an IP based system
utilizing the project Local Area Network (LAN). The IP Access Control and Security
Management Systems shall be capable of monitoring, and controlling all access field
devices located at different areas. Installation shall comply with local code
requirements as applicable.
D. The system shall be user friendly, providing a monitoring station that allows for
training of non- technical personnel to effectively operate and administrate the system.
F. The contractor has full responsibility for performing complete site survey before
bidding in order to confirm system compatibility with actual site conditions.
G. IP Access Control System should include complete integration with the following
security systems as indicated in the design drawings;
8. ISO/IEC 7816.
9. ISO/IEC 14443.
10. ISO 15693.
12. National Fire Protection Association National Fire Codes, current edition.
C. When more than one code / regulation are applicable, the most stringent shall apply.
D. Service: Manufacturer / Supplier must have a warehouse in Egypt at which spare parts
are stocked and where a field service engineer who is a permanent, full-time employee
of the Manufacturer / supplier, factory trained and qualified individual whose primary
duty is field service resides.
1.4 SUBMITTALS
Provide technical submittal for the phase prior to commencement of installation and
training, which is to include but not limited to the following;
A. Detailed breakdown Bill of material indicating the model numbers and quantities for all
of the proposed equipment in addition to fulfilled tender BOQ match the latest project
design drawings and riser diagrams.
All quantities and items listed in the detailed breakdown BOQ should cover all required
features, functions and operation of security systems mentioned in the tender
documents, any missing items are the contractor responsibility.
A. Submit a detailed point by point compliance statement with this specification. For each
item, the statement shall clearly indicate Full / Partial / Non compliance with the related
specifications item, for instructions in this document the supplier must indicate
Understood / Not. In case of partial compliance the supplier shall clearly indicates the
deviation of the required specifications and the effect of that deviation on the whole
system. In case of non compliance the supplier shall propose an alternative(s) and
clearly indicate the difference with the original requirement. If clear compliance
indication is not provided it shall be assumed that the proposed system does not comply
with the requirement in the specification. The contractor should refer in the same list to
the technical evidences corresponding to all compliance statements.
IP Access Control And Security Management Systems
Issued For Tender Section 16725
Page 3 of 35
RAKKA SCHOOL
B. Submit detail technical description for the Access Control system including but not
limited to the followings,
C. Submit dedicated and detailed section for Security Management System (SMS)
demonstrating all system functions, features, protocols, and integration capabilities with
any third party.
D. The contractor has full responsibility for providing complete opened protocols system
to be integrated with any third party in the future.
E. Submit detailed layout design drawings for the project security rooms indicating the
locations and sizes of all system equipment (needed to achieve project specification)
including but not limited to the followings;
1. System racks.
2. System panels.
5. Earthing System.
F. Submit detailed drawings for system racks and panels configurations showing the
arrangement of all system equipment inside with size.
G. Submit detailed single line diagrams indicating all system equipment (with part
numbers), interconnection between these components, interface with all other systems
IP Access Control And Security Management Systems
Issued For Tender Section 16725
Page 4 of 35
RAKKA SCHOOL
and the types of cables needed, complying with the multimedia network single line
diagram.
H. Contractor should perform comprehensive site survey and coordinate with other trades
(e.g. electric) and submit complete installation details and method of statements for all
types of cameras.
J. Submit Manufacturer guarantee for providing new free of charge system software
release up to TEN years after the completion of the project in addition to the warranty
period specified elsewhere. Systems that are factory programmed are unacceptable.
K. The supplier and his vendor(s) should present a commitment that a complete support
should be provided to the supplier during and after the project implementation.
L. Submit list of manufacturer recommended spare parts enough for two year of system
operation.
M. Submit complete reference list of the proposed products for similar projects in Egypt
indicating works description, dates and places.
N. Submit product support statement for all proposed software and hardware for at least
TEN years of system operation date. Submit manufacturer warranty policy document.
O. Submit the list of country of origin for all the proposed items, and list of all OEM
(Original Equipment Manufacturer) programs with their partners.
P. The contractor should submit complete technical material transmittal arranged into
sections with page numbers including all required materials.
1.5 MATERIALS
D. All materials and equipment shall be standard and regularly manufactured equipment.
E. All systems and components shall be thoroughly tested and proven in actual field use.
The Access Control System (ACS) specified shall be fully integrated and installed as
a complete package.
A. Access Control System shall provide but not limited to the following functions;
1. Door Control.
3. Alarm Monitoring.
IP Access Control And Security Management Systems
Issued For Tender Section 16725
Page 6 of 35
RAKKA SCHOOL
8. Database Reports.
1. Fire Alarm and Detection System to unlock all of the Egress Doors in case of
fire.
3. Car Barrier System to open the gate barrier to the allowed vehicles.
C. A number of Card readers, Request to Exit switches, Door Monitoring switches and
Door Locks are connected to each Access Control Panel. All Access Control Panels
are reporting all transactions back to related Access Control System workstation(s)
located in university building(s) security room(s) and centralized security room
located in the university utility building via TCP/IP LAN. A centralized Access
Control Server shall be located in the centralized security room. The centralized
Server shall communicate with all system workstations via the same TCP/IP LAN.
D. All Access Control Panels should be configured through System Servers or any
workstation via the same TCP/IP LAN. The operator workstations shall be used to
control and monitor the System equipment.
E. The ACS shall be capable of monitoring, recording, and displaying card access
activity and supervised alarm inputs/outputs on a continuous, real time basis. Each
installation shall comply with local code requirements as applicable.
F. The ACS shall be capable of providing access control and alarm monitoring
capabilities for the project areas. The system shall be user friendly, providing a user
interface that allows for training of non-technical personnel to effectively operate and
administer the system.
G. SYSTEM CAPACITIES
7. Support for 10,000 on-line transaction history records with ability to archive
history limited only to hard disk space.
A. Guarantee equipment furnished under these specifications against defective parts and
workmanship under terms of the manufacturer's and dealer's standard warranties for a
period of not less than one year from date of initial start-up and Owner acceptance of
the system and include labor and travel time for necessary repairs at the job site.
B. Provide maintenance of the system during the warranty period with the following
minimum provisions;
4. Response: The contractor shall respond to calls for warranty service within
eight working hours. Emergency service shall be obtainable within four hours
of notification by the Owner. Emergency service shall be obtainable on a 24
hours basis, seven days per week.
System support: Provide a guarantee of system support for a minimum period of TEN
years after final completion, including provision for technical support, hardware, and
spare parts. Demonstrate that the manufacturer’s previous systems have not been made
obsolete and that the manufacturer is committed to total and complete backward
compatibility.
The contractor shall deliver three composite “Systems Operation and Maintenance”
manuals in three-ring binder form or bound hand book form, sized to hold the material
below. Each manual shall contain, but not be limited to;
A. A Statement of Guarantee including date of termination and the name and phone
number of the person to be called in the event of equipment failure.
B. A set of operational procedures for the overall system that includes all required
customer activities that allow for customer operation of all system capabilities. This
procedure shall fully address all customer- established system operating objectives.
required technical manuals and information. All manuals shall be printed to ensure
their permanence. No “blue line” type of reproduction is acceptable.
5. Programmer's manual.
6. Operator's manual.
7. Drawings.
8. Commissioning data.
1.10 TRAINING
The contractor shall supply personnel to train key customer personnel in the operation
and maintenance of the installed system. The training program shall be designed to
provide a comprehensive understanding and basic level of competence with the system.
It shall be sufficiently detailed to allow customer personnel to operate the system
independent of any outside assistance.
On-line context-sensitive HELP screens shall be incorporated into the system to further
facilitate training and operation.
The training plan shall include detailed session outlines and related reference materials.
The customer personnel shall be able to utilize these materials in the subsequent
training of their co-workers.
Training time shall not be less than a total of 48 hours, and shall consist of;
A. 24 hours during normal day shift periods for system operators. Specific schedules
shall be established at the convenience of the customer.
C. The specified training schedule shall be coordinated with the customer and will
follow the training outline submitted by the contractor as part of the submittal
process.
Based upon the contractor’s and the manufacturer’s experience with the equipment’s
performance history, the contractor shall submit a final spare parts list for all functions
for this system. This list shall be based upon a philosophy of maintaining a central
system operation with a simple remove/replace capability. The final spares list shall be
developed as a result of a joint customer/contractor review of the recommended list
during the installation phase. Submit this final recommended spare parts list for
approval prior to system completion, so that spares are available upon activation.
PART 2 - PRODUCTS
2.2 GENERAL
D. System administration shall be available from any workstation in the system via
facility LAN or WAN network. The system specifically must have the capability to
support not less than 4 workstations connected on the network at the same time. The
Access Control System shall allow all connected workstations to function in a true
multi-user, multi-tasking environment.
E. The system architecture shall be capable of supporting single sites and/or campuses as
well as multiple sites located in different geographical locations.
F. The Operating System shall be based on a Microsoft operating system and / or Linux.
H. The system shall provide maximum operational simplicity to enable quick and
effective use in an emergency.
I. The contractor has full responsibility to provide and install all power supplies
necessary for correct operation to the Access Control System. The Contractor will
liaise with the Client’s MEP team to ensure that the power source provided for the
entire system is the same, single phase at 220V/50Hz,
J. Backup power shall be provided for the IP Access Control Equipment installed in the
university centralized and buildings’ security rooms.
K. All equipment and materials used will be standard, regularly manufactured and
regularly utilized in the manufacturer’s system. All materials will have been
thoroughly tested and proven in actual use.
L. Accessibility through secure areas should be via Card Readers or push button
mounted on the secure side of the door, this button should be clearly labeled “Press to
Exit”.
M. The System shall incorporate facilities for forced door entry alarm signals.
N. All security management and archiving servers should have level of redundancy to
allow redirection of data when a disk fails and provide managed shutdown function
when UPS system batteries indicate less 20 minutes battery life is left.
2.3.1 HARDWARE
A. The Contractor shall provide all software required for efficient operation of all the
automatic system functions required by this specification. Software shall be modular
in design for flexibility in expansion or revision of the system. It is the intent of this
specification to require provisions of a system that can be fully utilized by individuals
with no, or limited, previous exposure to PC's and programming techniques and
languages. If the system to be provided requires the use of any modified BASIC, C,
PASCAL, or DRUM language program, or writing "line" programming statements to
modify operation or strategy in the system; the vendor shall provide unlimited, no
charge, software modification and support for a period of five years after the
completion of the project in addition to the warranty period specified elsewhere.
Systems that are factory programmed are unacceptable.
B. The software shall include a general purpose operating system, as well as ACS
application software. All available vendor workstation application software shall be
provided with the system, and shall reside in each and every PC. Unbundled software
packages where the vendor can charge the user extra fees, or require dedicated
workstations, or require system rebooting for access are unacceptable.
C. The software in the system shall consist of both "firmware" resident in the controllers
and "software" resident in the operator workstations. The architecture of the system
and the application software/firmware shall be distributed with no single-system
component responsible for a control function for the entire LAN. Each controller
resident on the LAN shall contain the necessary firmware and I/O capability to
function independently in case of a network failure. No active control sequences
shall be resident in the PC workstations. All workstations shall be removable from
the system without loss of control function. Alarm monitoring as well as Access
Control transactions should be buffered at controllers, for future collections when the
workstation is reconnected to the System.
D. The primary operator interface to the system shall be through a graphical, “object
oriented”, interactive presentation, using a mouse and cursor for object selection and
commands.
E. The system software shall support "pop-up" windows for point commands. On
selecting an object with the cursor, a window shall open up to present the operator
with choices corresponding to the operator's password authorizations. These point
commands shall include state changes, manual override of application software and
test mode activation. This window shall include, for reference, the point's descriptor
(name), the point's hardware address, and alarm status.
F. The system software shall support "pop-up" windows for point editing. On selecting
an object with the cursor, a window shall open up to present the operator with a list of
active point database editors, if permitted by the operator’s password level. Selecting
one of these editors shall allow the operator to modify the basic parameters associated
with a point, as well as access any programs assigned to the point (such as time
schedules, events, etc.).
G. The system software shall be based upon interactive prompts and choices using
"dialog boxes," as opposed to memorization of commands, "syntax", exact spellings,
etc. This interactive prompt and choices approach shall be used in monitoring,
issuing commands, and editing. Command choices shall be as simple as "clicking"
the cursor over the correct word choice prompts (i.e., SECURE, UNLOCK), without
having to type in the letters.
H. The system software shall support a “zoom” function. It shall be possible for an
operator to locate any system point to monitor status, issue commands, or edit
associated database without knowledge of the point's name, address, or associated
controller, and without having to refer to a "tree" directory; e.g. the operator shall be
IP Access Control And Security Management Systems
Issued For Tender Section 16725
Page 13 of 35
RAKKA SCHOOL
I. The system software shall be compiled for a faster execution speed and shall offer all
of the following features and capabilities;
2. Obtain a summary of all access control doors with status (under access control,
access control disabled, or access control ignored) and allow issuing
commands to the access control doors to manually force the door to one of the
above states, or provide a momentary release (act as a valid key/card access),
or return to automatic control (remove manual state).
4. Change point I/O descriptors, status, and alarm descriptors while the system is
on-line.
The intent of this specification is to provide an ACS system that will allow the
operator to independently perform his own modifications to the system from any
operator workstation. All changes shall be carried out while utilizing standard
procedures, and must be capable of being done while the system is on-line and
operational. The Access Control Panel on the LAN shall automatically check a PC
workstation's database files upon connection to verify a current database match. A
utility shall inform the operator if the Access Control Panel’s database files do not
match the backup files stored on the PC workstation, along with the date of the last
Access Control Panel modification and date of the last backup. The operator must
have, as a minimum, the on-line capability to;
8. The database shall be an open format or provide a means to export data for use
in other third party programs.
Provide a door parameters editor which shall include the following options;
2. If the reader is used for “exit” (pushbutton exit being the default), and if so,
whether the exit reader is used for continuous egress or is linked to the Mode
Schedule of an “entry” reader.
3. The minimum time (in seconds) allowed between successive “reads
7. Whether the door sense switch is used, and if so whether it is a normally open
(NO) or normally closed (NC) contact.
10. Whether the door locking device (e.g., an electric strike) is used, and if so,
whether it is activated for entry requests, exit requests, or both.
IP Access Control And Security Management Systems
Issued For Tender Section 16725
Page 15 of 35
RAKKA SCHOOL
11. How long the locking device will be unlocked after an authorized read or
Request to Exit push-button operation. The unlock interval shall adjustable
from 1 to 255 seconds.
12. “Door Prop” alarm timer setting. This setting shall ignore the door monitor
switch input for alarming during the timer interval. The timer shall be
adjustable (operator selectable) from 1 to 1,800 seconds.
To limit control by the system operators, the ACS shall support system passwords at
the Workstation level. The Workstation passwords shall limit user access and
privileges to provide system level security. A password shall be required to “log on”
to the system. The ACS Workstation shall support up to 100 passwords. It shall be
possible to enable or disable each and every individual function of the ACS on a
password by password basis using a simple point and click operation. Each password
shall allow a 30-character operator name, a 10-character alpha numeric password.
1. Change of State: Time for a change of state or value of a field point to register
an alarm or update at the workstation: 3-5 seconds.
5. Global Data Transfer: Time for data to travel between standalone controllers: 3
seconds.
6. Local Control Event: Time for standalone controller to initiate an output action
after a change of input: 2 seconds.
A. ALARMS
1. The ACS shall provide alarm summary screens. The alarms summary screens
shall display points that are, or have been, in alarm and provide three status
indicators of the alarms in the form of selectable status colors. The status
colors shall indicate the following:
a. Alarm – The point is currently in alarm, and the alarm has not yet been
acknowledged.
b. Alarm Acknowledged – The point is currently in alarm, and has already been
acknowledged.
c. Return to normal – The point went into alarm, but has since returned to
normal without being acknowledged.
2. The summary screens will display the date/time that each alarm occurred, the
point address, the name assigned to the point, the current status of the point,
and the system graphic page the point can be found on. The ACS shall provide
a means for storing all alarms, messages, and events for an indefinite period
and allow for quick retrieval at any time. The Alarms database shall be an open
format or provide a means to export the Alarms information for use in other
third party programs. The ACS shall maintain as, a minimum, the latest 128
alarms for quick review or display. In the event of an alarm condition
occurring, the ACS shall display a message on the operator workstation, print
on the printer, sound an audible alarm, optionally display the graphic page the
alarm point has been assigned, and optionally set off a visual annunciation (i.e.
flashing lights).
a. Exception reporting.
b. Priority allocation.
c. Consequential alarm suppression.
d. Graphical representation of alarms.
4. The ACS shall have the following alarm processing features, all of which shall
be operator definable through the input keyboard;
a. Each off normal condition shall cause an alarm and an appropriate message,
including the time of the alarm, system and point descriptor, alarm condition.
The operator shall have the capability to select, at any time, which state/value
shall be considered alarms and which alarms shall cause automatic dial-out to
occur.
c. An Alarm Summary shall show all new alarms, while indicating which
graphic page would be the most suitable to select, in order to act upon the
alarm condition. Each alarm shall have “prioritized” listing and all alarms
shall be displayed with the highest priority first, then in reverse chronological
order while still following the prioritization mechanism.
d. Provide an automatic page selection option for alarms. This feature (operator
activated) automatically selects and displays the designated “best” graphic
page for each alarm, even when the operator is signed off. In the event of
multiple alarms, the page associated with the most recent highest priority
alarm is displayed.
f. The operator shall have the capability to route specific alarms to specific
workstations.
g. Unacknowledged alarms will continue to blink even if they have "returned to
normal". Only operator acknowledgment can remove the blinking alarm
indication. Red will signify points in alarm while green will signify points in
normal condition.
k. Operator selectable audible alarm indication. The audible alarm may sound
once, constant or not at all, at operator's option.
B. EVENTS
1. The ACS software shall have the ability to automatically initiate commands,
user-defined messages, take specific control actions, or change control strategy
and application programs as a result of an event condition.
C. MESSAGES
2.3.8 TRANSACTIONS
B. The operator shall be able to establish an unlimited quantity of custom “filters”, on-
line. In addition to providing an “all transactions” filter, provide an operator
definable custom filter template with the following entries;
1. Tenant - Provide two Tenant numbers which define the low and high end of a
range of Tenants
2. Key/Card - Provide two ID numbers which define the low and high end of a
range of ID
5. Group Name
6. Last Name
7. First Name
8. Transaction Selection: Operator shall be able to select from any or all of the
following: Reader entry, Reader exit, Denied–schedule, Denied-tenant,
Denied-Issue, Denied-selection
C. Provide a print utility for the transactions summary, which includes the following
statistics:
D. Provide a Roll Call Report that shall produce a list of all entries without a
corresponding exit. This report shall prompt for the earliest date and the earliest time,
with a default of “today”.
A. Provide a personnel database that shall reside in the PC workstation, and have access
control functions downloaded to the Controller for remote, standalone operation.
Where the system consists of multiple PCs on a Commercial LAN, changes to the
Personnel Database in one PC workstation shall be equalized among all ACS
workstations, automatically.
B. All changes shall be done utilizing standard procedures and must be capable of being
done while the system is on-line and operational. The operator must have (as a
minimum) the on-line capability to:
1. Add, delete, modify and copy new ID devices (keys, cards, etc.) and link these
to the Personnel Database.
C. Provide a means for the user to define the content and order of data presented in the
Personnel Database editor specifically, provide the ability to set the sort order on any
field and filter and sort the data within any field. The following options shall be
available to the operator:
4. Display Order - allows the operator to select from key/card #, Last name, First
name, or Group. For
5. Key/card range - Displays only ID #’s between the low and high values
entered.
E. Provide a means to assign Schedules to doors, that determine when the door is under
access control, when the door is unlocked, and when the door is locked (even against
authorized access control devices). Also, an Anti-Pass back reset trigger may be
assigned to the door schedule to cancel and purge anti-pass back “flags” set
previously (i.e. the previous day).
F. Provide a means to assign Personnel Schedules to doors, that determine when (date
and time) authorized personnel are permitted access to designated doors. Each
personnel schedule shall support seven access intervals, each with a start and stop
time (time slice). Provide a seven day week plus seven “special” days and two
temporary days for each personnel schedule. Provide the ability to assign up to 31
personnel schedules per door.
H. The database shall be an open format or provide a means to export data for use in
other third party programs.
2.3.10 REPORTS
A. Provide facility to extract data from archived files and generate custom reports.
D. Provide facility to export (as a whole or individually) the following data to be used in
common database software package:
1. Tenants.
2. Floors.
3. Doors.
4. Transactions.
5. Messages.
6. Passwords.
7. Individuals.
8. Groups.
9. Field Names.
10. Alarms (sorted by priority).
E. Prepared Historical Report: Provide an on-line, historical, database sort report utility,
with the following features:
F. Prompts to select database sort by time, by date, by point (or range of points) with
system supplied default values of 24 hours.
H. Provide audit trail messages of operator edits of access control, specifically editing
the databases for individuals, groups, tenants, transactions, doors, personnel
schedules, and access initiated control. Also, include door prop alarms, forced door
alarms, and failure of the database to download to field controllers.
I. Single keystroke retrieval resulting in a report listing the most recent condition first,
along with the time, date, address, name, condition type, and value.
Workstation shall be graphical user interface and installed at Security Control Center.
The Workstation Hardware shall be as per the system manufacturer requirements for
proper system operation, however, the contractor to ensure the following minimum
hardware requirements
C. GENERAL
The ACS shall allow all connected workstations to function in a true multi-user,
multi-tasking environment such that;
1. All terminals can access the same network at the same time.
2. All terminals can access and/or control the same control unit at the same time.
3. All terminals can access and/or modify the same control unit database at the
same time.
4. All terminals shall be able to archive data, alarms, access transactions, and
network actions to hard disk regardless of what application programs are being
currently executed (i.e., LAN operating system, spreadsheets, word processing,
IP Access Control And Security Management Systems
Issued For Tender Section 16725
Page 23 of 35
RAKKA SCHOOL
etc.). All archiving disk traffic shall be accomplished on-line without affecting
the operation of the current programs.
D. APPLICATION PACKAGE
The primary operator interface to the system shall be through a graphical, "object
oriented", interactive presentation using a mouse and cursor for object selection and
commands. Features;
9. Alarm management.
10. Graphics.
14. Ability to integrate with CCTV, Public Address System or any other system
available within the facility.
E. GRAPHICS
1. The system shall support an operator definable “default” system page. The
default system page shall be displayed upon system start-up, operator activity
time-outs, and when the system is not in use. This default system page may be
any one of the standard dynamic graphic pages, or may be a custom display
developed for this purpose. The operator shall be able to display their
corporate logo, emergency information, an index of all graphic pages, etc. as
the default system page.
b. The operator shall have the ability to construct "dynamic" graphics pages
for monitoring and system control. This graphics utility shall be usable
both for on-line control such as override and alarm acknowledgment, and
for display of system status and alarm activity.
A. The ID Badging and Card Printer System shall be installed at Security Control
Center. The system shall be user friendly system for card production. The software
will feature a utility wizard to assist in data base creation or integration where
multiple levels / location of data, access and photographs reside. The system will be
designed for the building environment with enhanced security features to allow
controlling several levels of access. System Server is to store all card holder's
information and design elements.
C. System shall include Digital, 10MP Camera, Design Software and PVC Card Printer.
All points in the system shall be monitored and/or controlled through "intelligent"
Access Control Panels. Each control panel in the system shall contain its own
microprocessor and memory with a minimum 300 hours battery backup. Each
control unit shall be a completely independent stand-alone with its own hardware
clock calendar and all firmware and software to maintain complete control on an
independent basis. Access Control Panel generally shall;
B. Allow access to both database and control functions by multiple workstations at the
same time.
C. Record, evaluate, and report the changes of state and/or value that occur among
points associated with the control panel. If any operator workstation or transmission
network fails, but the power to the control unit does not, the control unit shall
continue to perform all control functions associated with the points connected to that
control unit.
E. The system controllers must provide an integral time clock and have the capability to
synchronize time with operator workstation or other ACS panels at least weekly.
I. Zoning of different doors located in the campus and connected to different Access
Control Panels.
J. The panel shall be configured with IP address and gateway address in order to be
reachable through the LAN and WAN.
A. Final quantities and types of Access Control Panels shall be determined by the
contractor based upon the requirement to provide a fully operational system, as per
the intent of the specification, as shown on the drawings and recommended by the
manufacturer. As a minimum, the following features shall be supported in each
Access Control Panel;
A. Distributed Access Control downloads all “local” access control parameters from the
Host PC to the Access Control Panels, so that it may operate in a standalone basis.
This ensures rapid access processing and minimal dependence on a single point of
failure.
reader may be used for door exiting. When the door is controlled by two readers for
entrance and exit, anti-passback operation is available. As a distributed network
controller the Access Control Panel allows centralized alarm monitoring, historical
data collection, and zoned anti-passback.
G. BATTERY STATUS: Battery level monitoring should be available for low battery
indication.
A. The card reader shall read 13.56 MHz contactless smart card and 125 kHz proximity
card.
B. The reader shall read the ID number of the card when presented to the surface of the
reader without physical contact.
D. The following reader styles shall be available and may be used interchangeably
throughout the system;
IP Access Control And Security Management Systems
Issued For Tender Section 16725
Page 28 of 35
RAKKA SCHOOL
1. A unitized outdoor reader with a read antenna, and necessary electronics for
transmission of the card code to the system; all contained in a single package.
1. Read range shall be nominally 9 - 11 cm, from the rear surface when used with
a card. The reader may be mounted directly on any material including metal
without the use of standoffs, or concealed behind any building material except
metal.
2. The card shall be read when presented in any orientation or at any angle to the
front surface of the reader. An LED on the front surface of the reader shall
indicate to the user that the card presented to the reader has been read. An
audio beep tone to indicate that the card has been read shall be available.
3. The card reader shall communicate in Wigand and Mifare protocol interfaces,
and be compatible with all standard access control systems.
4. The card reader shall be made from a weatherproof material to meet the
outdoor installation.
7. The card reader shall have a hold line that will buffer a card read until the
panel has asserted that the information can be sent up line.
8. The card reader shall be listed under UL 294 as an access control system unit
accessory, and shall be FCC and DTI certified.
10. For certain locations (Water Tank, Security Control Center, ..), the reader will
be equipped with PIN Keypad.
1. ISO/IEC 7816.
2. ISO/IEC 14443.
3. ISO 15693.
B. Card combines 13.56 MHz contactless read/write smart card and 125 kHz proximity
technology on a single card with the ability to add magnetic stripe, barcode, and other
features such as photo identification.
C. An ISO Standard PVC credit card size having a punched slot for a strap or clip.
D. The presence of small metal objects such as keys or coins near the card shall not alter
the code read by the reader or prevent the code form being read by the reader.
E. The individual card shall be derived from a population of at least 134 million unique
codes.
F. Cards shall be sequentially numbered. The user may specify codes or numbers. Exact
replacements for cards which may be lost, damaged, or stolen shall be available upon
request. Cards having the same number shall also be available upon request.
G. Cards may be used interchangeably and shall be compatible with all readers in the
system, regardless of the reader’s physical size or style, and without any code
matching or memory devices in the reader.
1. UL Listed.
3. Self-lock mounting.
5. Where field conditions prohibit the use of a recessed magnetic contact, surface
mounted switch shall be used.
All locking devices providing access are to be of the electromagnetic type to meet the
following requirements as outlined below;
2. UL listed.
5. Provide with an integral door status switch and magnetic bond sensor.
1. Power supply rated for the total load of the control station for all input and
output modules energized, without diversity.
4. Spare fuses.
Provide dedicated high level interface devices to directly connect the following
equipment to the LAN communication network so that such equipment becomes an
extension of the ACS.
1. CCTV system.
All wiring for Access Control Panel communications shall be UTP CAT-6. All other
cables are to meet the following requirements as outlined below;
1. UL Listed.
2. NEC approved.
2. Communication Server used for routing user interface request and to send
information to the database server.
3. User Interface which helps the SMS operators to communicate with the
integrated security systems servers.
A. All security systems will be integrated through SMS, also the operator will have
complete capability for monitoring and controlling all security systems’ components
through dedicated modules e.g.
1. Multi-User/Network Capabilities.
2. Multiple Servers.
5. Database Partitioning.
7. Alarm Events.
PART 3 – EXECUTION
A. GENERAL
Provide a program for the testing and commissioning procedure. Use a qualified
representative of the ACS supplier to co-ordinate testing and present all tests and
training courses and remain on-site until the ACS is fully operational.
2. Attendance at the testing of all equipment that interfaces to the ACS and
confirmation of the operation of such equipment from the ACS interface
terminals.
3. Testing of all field wiring from terminals to field interface terminal strips.
6. Testing of the operation of each control point from the operator's workstation
and verification of the status of all points and alarm functions on graphic
displays.
3.2 GROUNDING
Pay particular attention to the grounding of equipment cases and shielded cables to
eliminate noise interference and avoid electrical loops. Correctly terminate shields at
ground bars and connect to the IT Services dedicated grounding.
1. Insulate all incoming or outgoing shielded cables from control cabinet casings.