You are on page 1of 35

RAKKA SCHOOL

SECTION 16725

IP ACCESS CONTROL AND SECURITY MANAGEMENT SYSTEMS

PART 1 – GENERAL

1.1 RELATED DOCUMENTS

A. Drawings and general provisions of Contract, including General and special Conditions
and Division-1 (General requirements) will apply to the work of this section.

B. General Provisions for Electrical Work, Section 16010, apply to work of this section.

C. Raceways, Boxes, and Fittings, Section 16110, applies to work of this section.

D. Cable Trunking, Section 16116, applies to work of this section.

E. Fire Alarm and Detection System, Section 16722, applies to work of this section.

F. IP Closed Circuit Television System, Section 16723, applies to work of this section.

G. Structured Cabling System. Section 16750, applies to work of this section.

1.2 DESCRIPTION OF WORK

A. Work includes providing all materials, equipment, accessories, services, hardware,


software, tests and operation and maintenance documentation necessary to complete
and make ready for operation, a complete IP based Access Control and Security
Management Systems for the project utility building and the university building in
accordance with Drawings and Specifications.

B. The Access Control and Security Management Systems shall be an IP based system
utilizing the project Local Area Network (LAN). The IP Access Control and Security
Management Systems shall be capable of monitoring, and controlling all access field
devices located at different areas. Installation shall comply with local code
requirements as applicable.

C. IP Access Control and Security Management Systems shall be designed to provide a


centralized location with the ability to monitor and control from secure location(s)
within a facility.

D. The system shall be user friendly, providing a monitoring station that allows for
training of non- technical personnel to effectively operate and administrate the system.

E. Any cables distance restriction is the contractor responsibility.

IP Access Control And Security Management Systems


Issued For Tender Section 16725
Page 1 of 35
RAKKA SCHOOL

F. The contractor has full responsibility for performing complete site survey before
bidding in order to confirm system compatibility with actual site conditions.

G. IP Access Control System should include complete integration with the following
security systems as indicated in the design drawings;

1. Fire Alarm and Detection System.

2. Closed Circuit Television System (CCTV).

1.3 QUALITY ASSURANCE

A. Manufacturer's Qualifications: Firms regularly engaged in the manufacturer of IP


Access Control and Security Management Systems of types, data required, whose
products have been in satisfactory use in similar service for not less than TEN years.

B. Standard Compliance: provide IP Access Control and Security Management Systems’


equipment which Comply with requirements of applicable codes & standards as listed
below:

1. BS EN 50131 Alarm and Intrusion systems.

2. BS EN 50132 CCTV surveillance systems for use in security applications

3. BS EN 50133 Access control systems for use in security applications

4. BS EN 1711 Building Hardware.

5. BS 4737 Intruder Alarm Systems in Buildings.

6. BS 6360 – Specification for conductors in insulated cables and conductors.

7. BS 7671 - The 16th Edition of the Institute of Electrical Engineers (IEE)


Regulations.

8. ISO/IEC 7816.

9. ISO/IEC 14443.
10. ISO 15693.

11. National Electrical Safety Code, current edition.

12. National Fire Protection Association National Fire Codes, current edition.

13. NACOSS/NCP 30 - The National Approved Council for Security System.


IP Access Control And Security Management Systems
Issued For Tender Section 16725
Page 2 of 35
RAKKA SCHOOL

14. EIA/TIA–568 Commercial Building Telecommunications Wiring Standard.

15. EIA/TIA–569 Commercial Building Standard for Telecommunications


Pathways and Spaces.

16. EIA/TIA–606 Administrative Standards for the Telecommunications


Infrastructure of Commercial Buildings.

17. IEEE, 802.3 digital data network standard.

C. When more than one code / regulation are applicable, the most stringent shall apply.

D. Service: Manufacturer / Supplier must have a warehouse in Egypt at which spare parts
are stocked and where a field service engineer who is a permanent, full-time employee
of the Manufacturer / supplier, factory trained and qualified individual whose primary
duty is field service resides.

1.4 SUBMITTALS

Provide technical submittal for the phase prior to commencement of installation and
training, which is to include but not limited to the following;

A. Detailed breakdown Bill of material indicating the model numbers and quantities for all
of the proposed equipment in addition to fulfilled tender BOQ match the latest project
design drawings and riser diagrams.
All quantities and items listed in the detailed breakdown BOQ should cover all required
features, functions and operation of security systems mentioned in the tender
documents, any missing items are the contractor responsibility.

B. Product Data: Submit manufacturer's complete, detailed, and original technical


datasheets for the manufacturer and marked up for all of the proposed equipment. The
contractor should highlight the technical evidences in submitted datasheets for all
complied items in the specification. Moreover, the contractor should mention the
specification items for the highlighted evidences.

A. Submit a detailed point by point compliance statement with this specification. For each
item, the statement shall clearly indicate Full / Partial / Non compliance with the related
specifications item, for instructions in this document the supplier must indicate
Understood / Not. In case of partial compliance the supplier shall clearly indicates the
deviation of the required specifications and the effect of that deviation on the whole
system. In case of non compliance the supplier shall propose an alternative(s) and
clearly indicate the difference with the original requirement. If clear compliance
indication is not provided it shall be assumed that the proposed system does not comply
with the requirement in the specification. The contractor should refer in the same list to
the technical evidences corresponding to all compliance statements.
IP Access Control And Security Management Systems
Issued For Tender Section 16725
Page 3 of 35
RAKKA SCHOOL

B. Submit detail technical description for the Access Control system including but not
limited to the followings,

1. System description showing system features and functions.

2. System equipment representing the function of each unit.

3. System software(s) and licenses needed for proper operation as specified.

4. Complete system description for video analytical analysis, features and


functions should be submitted.

5. System interfaces and protocols.

C. Submit dedicated and detailed section for Security Management System (SMS)
demonstrating all system functions, features, protocols, and integration capabilities with
any third party.

D. The contractor has full responsibility for providing complete opened protocols system
to be integrated with any third party in the future.

E. Submit detailed layout design drawings for the project security rooms indicating the
locations and sizes of all system equipment (needed to achieve project specification)
including but not limited to the followings;

1. System racks.

2. System panels.

3. System workstations complete with card encoders, card printers, digital


cameras, card readers, etc.

4. Cable trunk routing.

5. Earthing System.

6. Data and power outlets locations.

7. All MEP requirements.

F. Submit detailed drawings for system racks and panels configurations showing the
arrangement of all system equipment inside with size.

G. Submit detailed single line diagrams indicating all system equipment (with part
numbers), interconnection between these components, interface with all other systems
IP Access Control And Security Management Systems
Issued For Tender Section 16725
Page 4 of 35
RAKKA SCHOOL

and the types of cables needed, complying with the multimedia network single line
diagram.

H. Contractor should perform comprehensive site survey and coordinate with other trades
(e.g. electric) and submit complete installation details and method of statements for all
types of cameras.

I. Submit dimensional layout shop drawings on architectural background drawings


indicating all proposed system equipment, part numbers, cables, raceways, etc.

J. Submit Manufacturer guarantee for providing new free of charge system software
release up to TEN years after the completion of the project in addition to the warranty
period specified elsewhere. Systems that are factory programmed are unacceptable.

K. The supplier and his vendor(s) should present a commitment that a complete support
should be provided to the supplier during and after the project implementation.

L. Submit list of manufacturer recommended spare parts enough for two year of system
operation.

M. Submit complete reference list of the proposed products for similar projects in Egypt
indicating works description, dates and places.

N. Submit product support statement for all proposed software and hardware for at least
TEN years of system operation date. Submit manufacturer warranty policy document.

O. Submit the list of country of origin for all the proposed items, and list of all OEM
(Original Equipment Manufacturer) programs with their partners.

P. The contractor should submit complete technical material transmittal arranged into
sections with page numbers including all required materials.

1.5 MATERIALS

A. The specified system components are to provide completely operational Access


Control and Security Management Systems. The following list of main items of the
installation shall not be considered to be all inclusive;

1. Security management Servers.

2. Security Management Workstations.

3. Access Control Servers.

4. Access Control Workstations.

IP Access Control And Security Management Systems


Issued For Tender Section 16725
Page 5 of 35
RAKKA SCHOOL

5. Access Control Panels.

6. Input / Output modules.

7. ID Badging and Card Printer.

8. Proximity Contactless smart Card Readers.

9. Read/Write Smart Cards.

10. Request to Exit Devices.

11. Emergency Break Glass Units.

12. Electromagnetic Door Locks.

13. Magnetic Door Contact.

14. Alarm relays.

15. Miscellaneous cable, wire, associated connectors, and hardware

16. Power supplies.

B. Complete Integrated Security Management System (SMS).

C. All outdoor components should operate on a high temperature up to 50C.

D. All materials and equipment shall be standard and regularly manufactured equipment.

E. All systems and components shall be thoroughly tested and proven in actual field use.

F. All system main control components shall be from one manufacturer.

1.6 SYSTEM DESCRIPTION

The Access Control System (ACS) specified shall be fully integrated and installed as
a complete package.

A. Access Control System shall provide but not limited to the following functions;

1. Door Control.

2. Car Barrier Control.

3. Alarm Monitoring.
IP Access Control And Security Management Systems
Issued For Tender Section 16725
Page 6 of 35
RAKKA SCHOOL

4. Alarm/Facility Graphics Display.

5. Multiple Language Operation.

6. Multiple Tenant Operation.

7. Access Initiated and Event Initiated Control.

8. Database Reports.

9. Maps Displaying Alarm Points.

10. Time Scheduled Events.

11. Windows Based, Mouse oriented operations.

12. Processing of Access Control for remote locations via LAN/WAN


connections.

13. External data interface to import initial cardholder database.

14. Ability to Export cardholder data.


15. Ability to Export transactions, alarms, messages.

16. Support for IEEE 802.3, 10/100 Base-T-Autosensing.

17. Support for TCP/IP protocol.

B. The Access Control System shall be integrated with;

1. Fire Alarm and Detection System to unlock all of the Egress Doors in case of
fire.

2. IP CCTV System to track pre-determined locations to view intrusions.

3. Car Barrier System to open the gate barrier to the allowed vehicles.

C. A number of Card readers, Request to Exit switches, Door Monitoring switches and
Door Locks are connected to each Access Control Panel. All Access Control Panels
are reporting all transactions back to related Access Control System workstation(s)
located in university building(s) security room(s) and centralized security room
located in the university utility building via TCP/IP LAN. A centralized Access
Control Server shall be located in the centralized security room. The centralized
Server shall communicate with all system workstations via the same TCP/IP LAN.

IP Access Control And Security Management Systems


Issued For Tender Section 16725
Page 7 of 35
RAKKA SCHOOL

D. All Access Control Panels should be configured through System Servers or any
workstation via the same TCP/IP LAN. The operator workstations shall be used to
control and monitor the System equipment.

E. The ACS shall be capable of monitoring, recording, and displaying card access
activity and supervised alarm inputs/outputs on a continuous, real time basis. Each
installation shall comply with local code requirements as applicable.

F. The ACS shall be capable of providing access control and alarm monitoring
capabilities for the project areas. The system shall be user friendly, providing a user
interface that allows for training of non-technical personnel to effectively operate and
administer the system.

G. SYSTEM CAPACITIES

1. Total number of Servers: 1 Server.

2. Total number of Workstations: Up to 40.


3. Support for up to 1,000 readers using contactless smart, Proximity, Biometric
technologies.

4. Support for up to 1,000 unique ID records.

5. Support alarm monitoring of up to 1,000 supervised digital input points.

6. Support for up to 1,000 output control points.

7. Support for 10,000 on-line transaction history records with ability to archive
history limited only to hard disk space.

8. Support for up to 100 system passwords.

9. System expansion capability: Minimum 100% over specified requirements.

1.7 EQUIPMENT WARRANTY

A. Guarantee equipment furnished under these specifications against defective parts and
workmanship under terms of the manufacturer's and dealer's standard warranties for a
period of not less than one year from date of initial start-up and Owner acceptance of
the system and include labor and travel time for necessary repairs at the job site.

B. Provide maintenance of the system during the warranty period with the following
minimum provisions;

IP Access Control And Security Management Systems


Issued For Tender Section 16725
Page 8 of 35
RAKKA SCHOOL

1. Notify project owner's representative prior to performing any maintenance


work.

2. The designated representative to monitor and report on equipment performance


and service history, and to be a liaison with the project owner.

3. Conditions: The warranty shall cover any defects in materials and


workmanship including installation and programming which shall be found
during the term. This shall include any deficiencies in installation standards or
the specifications.

4. Response: The contractor shall respond to calls for warranty service within
eight working hours. Emergency service shall be obtainable within four hours
of notification by the Owner. Emergency service shall be obtainable on a 24
hours basis, seven days per week.

C. Extended service agreement


Provide a renewable annual maintenance agreement. The agreement shall provide for
periodic inspections and maintenance of repair items. The agreement shall at a
minimum provide for all of the terms and conditions of the warranty.

1.8 SYSTEM SUPPORT

System support: Provide a guarantee of system support for a minimum period of TEN
years after final completion, including provision for technical support, hardware, and
spare parts. Demonstrate that the manufacturer’s previous systems have not been made
obsolete and that the manufacturer is committed to total and complete backward
compatibility.

1.9 OPERATION AND MAINTENANCE DATA

The contractor shall deliver three composite “Systems Operation and Maintenance”
manuals in three-ring binder form or bound hand book form, sized to hold the material
below. Each manual shall contain, but not be limited to;

A. A Statement of Guarantee including date of termination and the name and phone
number of the person to be called in the event of equipment failure.

B. A set of operational procedures for the overall system that includes all required
customer activities that allow for customer operation of all system capabilities. This
procedure shall fully address all customer- established system operating objectives.

C. Individual factory-issued manuals, containing all technical information on each piece


of equipment installed. In the event such manuals cannot be obtained from a
manufacturer, it shall be the responsibility of the contractor to compile and include
them. Advertising brochures or operational instructions shall not be used in lieu of the
IP Access Control And Security Management Systems
Issued For Tender Section 16725
Page 9 of 35
RAKKA SCHOOL

required technical manuals and information. All manuals shall be printed to ensure
their permanence. No “blue line” type of reproduction is acceptable.

D. The sets of manuals should include the following;

1. Updated functional specification.

2. Specification sheets and technical brochures on all equipment.

3. Fault finding literature.

4. Listings and description of application programs.

5. Programmer's manual.
6. Operator's manual.

7. Drawings.

8. Commissioning data.

1.10 TRAINING

The contractor shall supply personnel to train key customer personnel in the operation
and maintenance of the installed system. The training program shall be designed to
provide a comprehensive understanding and basic level of competence with the system.
It shall be sufficiently detailed to allow customer personnel to operate the system
independent of any outside assistance.

On-line context-sensitive HELP screens shall be incorporated into the system to further
facilitate training and operation.

The training plan shall include detailed session outlines and related reference materials.
The customer personnel shall be able to utilize these materials in the subsequent
training of their co-workers.
Training time shall not be less than a total of 48 hours, and shall consist of;

A. 24 hours during normal day shift periods for system operators. Specific schedules
shall be established at the convenience of the customer.

B. 24 hours of system training shall be provided to customer supervisory personnel so


that they are familiar with system operation.

C. The specified training schedule shall be coordinated with the customer and will
follow the training outline submitted by the contractor as part of the submittal
process.

IP Access Control And Security Management Systems


Issued For Tender Section 16725
Page 10 of 35
RAKKA SCHOOL

1.11 EXTRA MATERIALS

Based upon the contractor’s and the manufacturer’s experience with the equipment’s
performance history, the contractor shall submit a final spare parts list for all functions
for this system. This list shall be based upon a philosophy of maintaining a central
system operation with a simple remove/replace capability. The final spares list shall be
developed as a result of a joint customer/contractor review of the recommended list
during the installation phase. Submit this final recommended spare parts list for
approval prior to system completion, so that spares are available upon activation.

PART 2 - PRODUCTS

2.1 ACCEPTABLE MANUFACTURERS

Refer To The "List of Recommended Manufacturers".

2.2 GENERAL

D. System administration shall be available from any workstation in the system via
facility LAN or WAN network. The system specifically must have the capability to
support not less than 4 workstations connected on the network at the same time. The
Access Control System shall allow all connected workstations to function in a true
multi-user, multi-tasking environment.

E. The system architecture shall be capable of supporting single sites and/or campuses as
well as multiple sites located in different geographical locations.

F. The Operating System shall be based on a Microsoft operating system and / or Linux.

G. The system shall be capable of modular expansion without software upgrades or


wiring revisions.

H. The system shall provide maximum operational simplicity to enable quick and
effective use in an emergency.

I. The contractor has full responsibility to provide and install all power supplies
necessary for correct operation to the Access Control System. The Contractor will
liaise with the Client’s MEP team to ensure that the power source provided for the
entire system is the same, single phase at 220V/50Hz,

J. Backup power shall be provided for the IP Access Control Equipment installed in the
university centralized and buildings’ security rooms.

IP Access Control And Security Management Systems


Issued For Tender Section 16725
Page 11 of 35
RAKKA SCHOOL

K. All equipment and materials used will be standard, regularly manufactured and
regularly utilized in the manufacturer’s system. All materials will have been
thoroughly tested and proven in actual use.

L. Accessibility through secure areas should be via Card Readers or push button
mounted on the secure side of the door, this button should be clearly labeled “Press to
Exit”.

M. The System shall incorporate facilities for forced door entry alarm signals.

N. All security management and archiving servers should have level of redundancy to
allow redirection of data when a disk fails and provide managed shutdown function
when UPS system batteries indicate less 20 minutes battery life is left.

2.3 ACCESS CONTROL SERVERS

2.3.1 HARDWARE

The Access Control System Servers should be rack-mounted and to be installed in


centralized security room; The Server Hardware shall be as per the system manufacturer
recommendations for proper system operation, however, the contractor to ensure the
following minimum hardware requirements,

Processor Intel® Xeon® E5-2430 2.20GHz, 15M Cache.


Memory 4GB UDIMM, 1333MHz, LV, Dual Bank x 8
Storage 500 GB, 7.2K RPM SATA
Video Card Intel HD Integrated Graphics (VGA, HDMI)
Optical Drive DVD +/- RW
Network 2 x 10/100/1000 NIC

2.3.2 SYSTEM SOFTWARE

A. The Contractor shall provide all software required for efficient operation of all the
automatic system functions required by this specification. Software shall be modular
in design for flexibility in expansion or revision of the system. It is the intent of this
specification to require provisions of a system that can be fully utilized by individuals
with no, or limited, previous exposure to PC's and programming techniques and
languages. If the system to be provided requires the use of any modified BASIC, C,
PASCAL, or DRUM language program, or writing "line" programming statements to
modify operation or strategy in the system; the vendor shall provide unlimited, no
charge, software modification and support for a period of five years after the
completion of the project in addition to the warranty period specified elsewhere.
Systems that are factory programmed are unacceptable.

IP Access Control And Security Management Systems


Issued For Tender Section 16725
Page 12 of 35
RAKKA SCHOOL

B. The software shall include a general purpose operating system, as well as ACS
application software. All available vendor workstation application software shall be
provided with the system, and shall reside in each and every PC. Unbundled software
packages where the vendor can charge the user extra fees, or require dedicated
workstations, or require system rebooting for access are unacceptable.

C. The software in the system shall consist of both "firmware" resident in the controllers
and "software" resident in the operator workstations. The architecture of the system
and the application software/firmware shall be distributed with no single-system
component responsible for a control function for the entire LAN. Each controller
resident on the LAN shall contain the necessary firmware and I/O capability to
function independently in case of a network failure. No active control sequences
shall be resident in the PC workstations. All workstations shall be removable from
the system without loss of control function. Alarm monitoring as well as Access
Control transactions should be buffered at controllers, for future collections when the
workstation is reconnected to the System.

D. The primary operator interface to the system shall be through a graphical, “object
oriented”, interactive presentation, using a mouse and cursor for object selection and
commands.

E. The system software shall support "pop-up" windows for point commands. On
selecting an object with the cursor, a window shall open up to present the operator
with choices corresponding to the operator's password authorizations. These point
commands shall include state changes, manual override of application software and
test mode activation. This window shall include, for reference, the point's descriptor
(name), the point's hardware address, and alarm status.

F. The system software shall support "pop-up" windows for point editing. On selecting
an object with the cursor, a window shall open up to present the operator with a list of
active point database editors, if permitted by the operator’s password level. Selecting
one of these editors shall allow the operator to modify the basic parameters associated
with a point, as well as access any programs assigned to the point (such as time
schedules, events, etc.).

G. The system software shall be based upon interactive prompts and choices using
"dialog boxes," as opposed to memorization of commands, "syntax", exact spellings,
etc. This interactive prompt and choices approach shall be used in monitoring,
issuing commands, and editing. Command choices shall be as simple as "clicking"
the cursor over the correct word choice prompts (i.e., SECURE, UNLOCK), without
having to type in the letters.

H. The system software shall support a “zoom” function. It shall be possible for an
operator to locate any system point to monitor status, issue commands, or edit
associated database without knowledge of the point's name, address, or associated
controller, and without having to refer to a "tree" directory; e.g. the operator shall be
IP Access Control And Security Management Systems
Issued For Tender Section 16725
Page 13 of 35
RAKKA SCHOOL

able to zoom in on a building in a campus graphic, zoom in on a floor in a building


graphic, zoom in on a door in a floor plan graphic, etc.

I. The system software shall be compiled for a faster execution speed and shall offer all
of the following features and capabilities;

1. Input / Output Capabilities: From any local PC workstation or any remotely


connected PC workstation, the system operator shall have the capabilities
through the keyboard/mouse to request dynamic displays of current values or
status using a tabular or graphic format. A global database sort utility shall
allow an expanded tabular display of only the points on the current graphic
display. This expanded tabular display shall list point name, hardware address,
alarm status, override status, and test mode status.

2. Obtain a summary of all access control doors with status (under access control,
access control disabled, or access control ignored) and allow issuing
commands to the access control doors to manually force the door to one of the
above states, or provide a momentary release (act as a valid key/card access),
or return to automatic control (remove manual state).

3. Add, delete, or change points within each Controller or application routine


while on-line.

4. Change point I/O descriptors, status, and alarm descriptors while the system is
on-line.

5. Add new Controllers to the system while the system is on-line.

6. Develop, modify, delete or display full range of color graphic displays


providing dynamic, animated displays. All development, editing and display
work shall be capable of being performed with the system fully on-line and in
full communication with the Controllers.

2.3.3 DATABASE CREATION AND SUPPORT

The intent of this specification is to provide an ACS system that will allow the
operator to independently perform his own modifications to the system from any
operator workstation. All changes shall be carried out while utilizing standard
procedures, and must be capable of being done while the system is on-line and
operational. The Access Control Panel on the LAN shall automatically check a PC
workstation's database files upon connection to verify a current database match. A
utility shall inform the operator if the Access Control Panel’s database files do not
match the backup files stored on the PC workstation, along with the date of the last
Access Control Panel modification and date of the last backup. The operator must
have, as a minimum, the on-line capability to;

IP Access Control And Security Management Systems


Issued For Tender Section 16725
Page 14 of 35
RAKKA SCHOOL

1. Add and delete points.

2. Modify any point parameter.

3. Determine which PC workstation(s) will receive alarms, messages &


transactions on a point by point / door by door basis.

4. Add, modify, or delete alarm limits.

5. Obtain an "audit trail" of which application programs are controlling an


individual point, on a point by point basis.

6. Create and/or modify override parameters.

7. Add, modify, and delete any applications program.

8. The database shall be an open format or provide a means to export data for use
in other third party programs.

2.3.4 DOOR PARAMETERS

Provide a door parameters editor which shall include the following options;

1. Reader technology selected.

2. If the reader is used for “exit” (pushbutton exit being the default), and if so,
whether the exit reader is used for continuous egress or is linked to the Mode
Schedule of an “entry” reader.
3. The minimum time (in seconds) allowed between successive “reads

4. Whether anti-pass back (APB) is implemented or not.

5. What the entry zone number is (APB).

6. What the exit zone number is (APB).

7. Whether the door sense switch is used, and if so whether it is a normally open
(NO) or normally closed (NC) contact.

8. Whether the Request to Exit is used, and if so whether it is a normally open


(NO) or normally closed (NC) contact.

9. Whether a shunt function is used.

10. Whether the door locking device (e.g., an electric strike) is used, and if so,
whether it is activated for entry requests, exit requests, or both.
IP Access Control And Security Management Systems
Issued For Tender Section 16725
Page 15 of 35
RAKKA SCHOOL

11. How long the locking device will be unlocked after an authorized read or
Request to Exit push-button operation. The unlock interval shall adjustable
from 1 to 255 seconds.

12. “Door Prop” alarm timer setting. This setting shall ignore the door monitor
switch input for alarming during the timer interval. The timer shall be
adjustable (operator selectable) from 1 to 1,800 seconds.

2.3.5 SYSTEM PASSWORDS

To limit control by the system operators, the ACS shall support system passwords at
the Workstation level. The Workstation passwords shall limit user access and
privileges to provide system level security. A password shall be required to “log on”
to the system. The ACS Workstation shall support up to 100 passwords. It shall be
possible to enable or disable each and every individual function of the ACS on a
password by password basis using a simple point and click operation. Each password
shall allow a 30-character operator name, a 10-character alpha numeric password.

2.3.6 SYSTEM RESPONSE TIMES

Maximum response times;

1. Change of State: Time for a change of state or value of a field point to register
an alarm or update at the workstation: 3-5 seconds.

2. Manual Command: Time for a manual command from the workstation to


override a field device: 3 seconds.

3. Graphics Display: Time to display a full graphic with current parameter


values: 8 seconds.

4. System Logs: Time to display a system log or report: 8 seconds.

5. Global Data Transfer: Time for data to travel between standalone controllers: 3
seconds.

6. Local Control Event: Time for standalone controller to initiate an output action
after a change of input: 2 seconds.

2.3.7 ALARM /MESSAGES/EVENT SIGNALLING

A. ALARMS

IP Access Control And Security Management Systems


Issued For Tender Section 16725
Page 16 of 35
RAKKA SCHOOL

1. The ACS shall provide alarm summary screens. The alarms summary screens
shall display points that are, or have been, in alarm and provide three status
indicators of the alarms in the form of selectable status colors. The status
colors shall indicate the following:
a. Alarm – The point is currently in alarm, and the alarm has not yet been
acknowledged.
b. Alarm Acknowledged – The point is currently in alarm, and has already been
acknowledged.
c. Return to normal – The point went into alarm, but has since returned to
normal without being acknowledged.

2. The summary screens will display the date/time that each alarm occurred, the
point address, the name assigned to the point, the current status of the point,
and the system graphic page the point can be found on. The ACS shall provide
a means for storing all alarms, messages, and events for an indefinite period
and allow for quick retrieval at any time. The Alarms database shall be an open
format or provide a means to export the Alarms information for use in other
third party programs. The ACS shall maintain as, a minimum, the latest 128
alarms for quick review or display. In the event of an alarm condition
occurring, the ACS shall display a message on the operator workstation, print
on the printer, sound an audible alarm, optionally display the graphic page the
alarm point has been assigned, and optionally set off a visual annunciation (i.e.
flashing lights).

3. Alarm management shall provide:

a. Exception reporting.
b. Priority allocation.
c. Consequential alarm suppression.
d. Graphical representation of alarms.

4. The ACS shall have the following alarm processing features, all of which shall
be operator definable through the input keyboard;

a. Each off normal condition shall cause an alarm and an appropriate message,
including the time of the alarm, system and point descriptor, alarm condition.
The operator shall have the capability to select, at any time, which state/value
shall be considered alarms and which alarms shall cause automatic dial-out to
occur.

b. Each critical alarm or change-of-state message shall be displayed. All LAN


network alarm messages shall be stored on disk and may be reviewed on the
Work Station Monitor and/or printed on operator selected printers at any time.
It shall be possible to sort this alarm/change-of-state database by date, time
and/or item fields.

IP Access Control And Security Management Systems


Issued For Tender Section 16725
Page 17 of 35
RAKKA SCHOOL

c. An Alarm Summary shall show all new alarms, while indicating which
graphic page would be the most suitable to select, in order to act upon the
alarm condition. Each alarm shall have “prioritized” listing and all alarms
shall be displayed with the highest priority first, then in reverse chronological
order while still following the prioritization mechanism.

d. Provide an automatic page selection option for alarms. This feature (operator
activated) automatically selects and displays the designated “best” graphic
page for each alarm, even when the operator is signed off. In the event of
multiple alarms, the page associated with the most recent highest priority
alarm is displayed.

e. Automatic user defined time delay of alarms during equipment start-up or


shutdown shall be provided to prevent nuisance and false alarms.

f. The operator shall have the capability to route specific alarms to specific
workstations.
g. Unacknowledged alarms will continue to blink even if they have "returned to
normal". Only operator acknowledgment can remove the blinking alarm
indication. Red will signify points in alarm while green will signify points in
normal condition.

h. Each operator workstation will have the ability to notify an operator of an


alarm condition in one or more points or controllers anywhere in the system.
Alarm notification shall consist of:

i. Automatic print of the alarm condition as described above.

j. Display of an icon indicating an alarm condition, including while in a third


party program.

k. Operator selectable audible alarm indication. The audible alarm may sound
once, constant or not at all, at operator's option.

l. Automatic alarm/message redirection of unattended workstations connected


on a WAN.

B. EVENTS

1. The ACS software shall have the ability to automatically initiate commands,
user-defined messages, take specific control actions, or change control strategy
and application programs as a result of an event condition.

2. An event condition may be a change-of-state, a specified state, or alarm


occurrence, a return to normal. Events shall not be limited to alarm
occurrences only but shall also include time, dates, as specified system results.
IP Access Control And Security Management Systems
Issued For Tender Section 16725
Page 18 of 35
RAKKA SCHOOL

All event assignments or modifications shall be operator defined through the


input keyboard.

C. MESSAGES

1. The system shall be capable of automatically displaying or printing a user-


defined message subsequent to the occurrence of selected events. Events shall
not be limited to alarm occurrences. The operator shall be able to:

a. Compose, change, or delete any message.

b. Display or log any message at any time.

c. Assign any message to any event

2. The Message database shall be an open format or provide a means to export


the messages information for use in other third party programs.

2.3.8 TRANSACTIONS

A. Transactions Summary: Provide password protected access to historical files


containing Access Control related transactions. The Transactions Summaries shall be
based upon user defined “filters” to the Access Control database. The filters shall
operate over user defined time ranges for time and date, using a two entry (earliest ,
latest) selection for both time and date to support multiple days, each with a time
slice, versus a continuous duration between two days.

B. The operator shall be able to establish an unlimited quantity of custom “filters”, on-
line. In addition to providing an “all transactions” filter, provide an operator
definable custom filter template with the following entries;

1. Tenant - Provide two Tenant numbers which define the low and high end of a
range of Tenants

2. Key/Card - Provide two ID numbers which define the low and high end of a
range of ID

3. Records Display type: Permanent/Temporary/Both as defined in the


Individuals Editor

4. Device Name: 16 characters Door name

IP Access Control And Security Management Systems


Issued For Tender Section 16725
Page 19 of 35
RAKKA SCHOOL

5. Group Name

6. Last Name

7. First Name

8. Transaction Selection: Operator shall be able to select from any or all of the
following: Reader entry, Reader exit, Denied–schedule, Denied-tenant,
Denied-Issue, Denied-selection

C. Provide a print utility for the transactions summary, which includes the following
statistics:

1. Reader entries for selected readers

2. Reader exits for selected readers

3. Reader denials (based upon Tenant, issue, selection, schedule, or APB)

D. Provide a Roll Call Report that shall produce a list of all entries without a
corresponding exit. This report shall prompt for the earliest date and the earliest time,
with a default of “today”.

2.3.9 PERSONNEL DATABASE

A. Provide a personnel database that shall reside in the PC workstation, and have access
control functions downloaded to the Controller for remote, standalone operation.
Where the system consists of multiple PCs on a Commercial LAN, changes to the
Personnel Database in one PC workstation shall be equalized among all ACS
workstations, automatically.

B. All changes shall be done utilizing standard procedures and must be capable of being
done while the system is on-line and operational. The operator must have (as a
minimum) the on-line capability to:

1. Add, delete, modify and copy new ID devices (keys, cards, etc.) and link these
to the Personnel Database.

2. Assign information to the Personnel Database including the ID #, Last Name,


First name and Group Name. The user shall be able to define the Field Name
for the user defined fields and field database entries of 16 alphanumeric
characters. In a multi-tenant system, individual authorized tenants shall be
able to assign different field names to their respective Personnel Databases.

IP Access Control And Security Management Systems


Issued For Tender Section 16725
Page 20 of 35
RAKKA SCHOOL

3. Assign status to a card, which may be permanent (not a visitor), temporary (a


visitor), or disabled (entered into the database, but not enabled). For cards
designated as temporary, allow the operator to pre-determine the activation
schedule based upon the following entries:

a. Start date (MM/DD/YY).


b. Start time (HH:MM).
c. End date (MM/DD/YY).
d. End time (HH:MM).

C. Provide a means for the user to define the content and order of data presented in the
Personnel Database editor specifically, provide the ability to set the sort order on any
field and filter and sort the data within any field. The following options shall be
available to the operator:

1. Permanent records - include/exclude

2. Temporary records - include/exclude

3. Disabled records - include/exclude

4. Display Order - allows the operator to select from key/card #, Last name, First
name, or Group. For

5. Key/card range - Displays only ID #’s between the low and high values
entered.

D. Provide a means to assign doors to designated tenants. Assign individuals to doors


associated with the tenant that the individual is a part of.

E. Provide a means to assign Schedules to doors, that determine when the door is under
access control, when the door is unlocked, and when the door is locked (even against
authorized access control devices). Also, an Anti-Pass back reset trigger may be
assigned to the door schedule to cancel and purge anti-pass back “flags” set
previously (i.e. the previous day).

F. Provide a means to assign Personnel Schedules to doors, that determine when (date
and time) authorized personnel are permitted access to designated doors. Each
personnel schedule shall support seven access intervals, each with a start and stop
time (time slice). Provide a seven day week plus seven “special” days and two
temporary days for each personnel schedule. Provide the ability to assign up to 31
personnel schedules per door.

G. Provide a means to assign personnel to "Groups" which consist of a combination of


doors and associated personnel schedules. The user shall be able to assign individuals

IP Access Control And Security Management Systems


Issued For Tender Section 16725
Page 21 of 35
RAKKA SCHOOL

to groups to save keystrokes and manages organizational changes. Different tenants


shall be able to assign different groups to their respective access control databases.

H. The database shall be an open format or provide a means to export data for use in
other third party programs.

2.3.10 REPORTS

A. Provide facility to extract data from archived files and generate custom reports.

B. Automatically generate reports through user or fixed time schedules, or on demand.

C. Provide facility to generate reports in a user-defined format.

D. Provide facility to export (as a whole or individually) the following data to be used in
common database software package:

1. Tenants.
2. Floors.
3. Doors.
4. Transactions.
5. Messages.
6. Passwords.
7. Individuals.
8. Groups.
9. Field Names.
10. Alarms (sorted by priority).

E. Prepared Historical Report: Provide an on-line, historical, database sort report utility,
with the following features:

F. Prompts to select database sort by time, by date, by point (or range of points) with
system supplied default values of 24 hours.

G. Prompts for activating conditional sorts, including: changes-of-state, alarms, returns


to normal, operator sign on/off, operator acknowledgments, command errors,
program control of a point, test on/off, manual on/off, program control override,
power restore, LAN reconfiguration, controller off-line, time/date modifications, and
archive disk memory 90% full, 95% full, and full.

H. Provide audit trail messages of operator edits of access control, specifically editing
the databases for individuals, groups, tenants, transactions, doors, personnel
schedules, and access initiated control. Also, include door prop alarms, forced door
alarms, and failure of the database to download to field controllers.

IP Access Control And Security Management Systems


Issued For Tender Section 16725
Page 22 of 35
RAKKA SCHOOL

I. Single keystroke retrieval resulting in a report listing the most recent condition first,
along with the time, date, address, name, condition type, and value.

2.4 ACCESS CONTROL WORKSTATION

2.4.1 WORKSTATION HARDWARE

Workstation shall be graphical user interface and installed at Security Control Center.
The Workstation Hardware shall be as per the system manufacturer requirements for
proper system operation, however, the contractor to ensure the following minimum
hardware requirements

CPU 2nd Generation, Intel Core i5, 3GHz, 6MB cache


Memory 8GB Dual Channel, DDR3
Storage HDD , 1TB
Video Card Intel HD Integrated Graphics (VGA, HDMI)
Screen 22" LED screen
Optical Drive DVD +/- RW
Network 10/100/1000 NIC

2.4.2 WORKSTATION SOFTWARE

A. Provide an on-site operator workstation to provide user friendly, operator interface


with the complete system.

B. If required, provide an off-site operator workstation to provide user friendly, operator


interface with the complete system. Provide all operator interface software and
commissioning.

C. GENERAL

The ACS shall allow all connected workstations to function in a true multi-user,
multi-tasking environment such that;

1. All terminals can access the same network at the same time.

2. All terminals can access and/or control the same control unit at the same time.

3. All terminals can access and/or modify the same control unit database at the
same time.

4. All terminals shall be able to archive data, alarms, access transactions, and
network actions to hard disk regardless of what application programs are being
currently executed (i.e., LAN operating system, spreadsheets, word processing,
IP Access Control And Security Management Systems
Issued For Tender Section 16725
Page 23 of 35
RAKKA SCHOOL

etc.). All archiving disk traffic shall be accomplished on-line without affecting
the operation of the current programs.

5. Latest revisions of all programs at time of practical completion.

6. Licensing of software at time of practical completion.

7. The software shall include support for fully integrated Security/Access


Control.

D. APPLICATION PACKAGE

The primary operator interface to the system shall be through a graphical, "object
oriented", interactive presentation using a mouse and cursor for object selection and
commands. Features;

1. Microsoft Windows OR Linux.

2. Input commands through keyboard or mouse.

3. Extensive context sensitive help facilities.

4. Incorporate password access to various levels of the system.

5. Time schedules including holidays.

6. Maintenance of a daily log.

7. Control programming using English/Arabic language.

8. Database management, Data Exporter/Reporter using 3rd party packages.

9. Alarm management.

10. Graphics.

11. Historical data file for all points.

12. User initiated logging and reports.

13. Support of multiple operator workstations.

14. Ability to integrate with CCTV, Public Address System or any other system
available within the facility.

15. ODBC support.


IP Access Control And Security Management Systems
Issued For Tender Section 16725
Page 24 of 35
RAKKA SCHOOL

16. Remote workstation: Provide facility so that data stored on an on-site


workstation may be downloaded to a remote workstation.

E. GRAPHICS

1. The system shall support an operator definable “default” system page. The
default system page shall be displayed upon system start-up, operator activity
time-outs, and when the system is not in use. This default system page may be
any one of the standard dynamic graphic pages, or may be a custom display
developed for this purpose. The operator shall be able to display their
corporate logo, emergency information, an index of all graphic pages, etc. as
the default system page.

2. Dynamic graphic programming

a. Shall be part of the ACS system, which is not to be considered as an add-


on feature.

b. The operator shall have the ability to construct "dynamic" graphics pages
for monitoring and system control. This graphics utility shall be usable
both for on-line control such as override and alarm acknowledgment, and
for display of system status and alarm activity.

2.5 ID BADGING AND CARD PRINTER

A. The ID Badging and Card Printer System shall be installed at Security Control
Center. The system shall be user friendly system for card production. The software
will feature a utility wizard to assist in data base creation or integration where
multiple levels / location of data, access and photographs reside. The system will be
designed for the building environment with enhanced security features to allow
controlling several levels of access. System Server is to store all card holder's
information and design elements.

B. The Card Printer / Encoder shall have the following specifications:

Dual Sided Printing Provided


Magnetic Stripe encoding
Smart Card encoding
Encoding
125 KHz Prox Card encoding
13.56 MHz read / write
Connections USB & Ethernet
Rewrite Technology Included
Print Speed 24 Seconds/Card – 150 Cards / hours
IP Access Control And Security Management Systems
Issued For Tender Section 16725
Page 25 of 35
RAKKA SCHOOL

Color Capability Full Color & Monochrome

C. System shall include Digital, 10MP Camera, Design Software and PVC Card Printer.

2.6 ACCESS CONTROL PANEL

All points in the system shall be monitored and/or controlled through "intelligent"
Access Control Panels. Each control panel in the system shall contain its own
microprocessor and memory with a minimum 300 hours battery backup. Each
control unit shall be a completely independent stand-alone with its own hardware
clock calendar and all firmware and software to maintain complete control on an
independent basis. Access Control Panel generally shall;

A. Acquire, process, and transfer information to the PC operator workstations or other


control units on the network.

B. Allow access to both database and control functions by multiple workstations at the
same time.

C. Record, evaluate, and report the changes of state and/or value that occur among
points associated with the control panel. If any operator workstation or transmission
network fails, but the power to the control unit does not, the control unit shall
continue to perform all control functions associated with the points connected to that
control unit.

D. Control panel Upload/Download Capability: Each control panel shall be able to


download from or upload to any PC operator's workstation. All point data shall be
modifiable from any authorized PC operator's workstation and downloaded to the
control panel over the Control Panel LAN. This upload/download shall be readily
performed on a regular basis without interrupting the control functions in the control
panel. All upload/downloads shall be performed without the operator workstation
being taken "off-line. Additionally, all Control Panel upgrading shall be performed
via a download from any workstation on the system; i.e. it shall not be necessary to
replace e-proms to perform a system revision upgrade.

E. The system controllers must provide an integral time clock and have the capability to
synchronize time with operator workstation or other ACS panels at least weekly.

F. Portable operator's terminal (laptop PC and/or a hand held controlling device).

G. Provide sufficient input/output modules to achieve the required control functions,


including the required spare points.

H. Modules: Removable without having to disconnect field cabling.

IP Access Control And Security Management Systems


Issued For Tender Section 16725
Page 26 of 35
RAKKA SCHOOL

I. Zoning of different doors located in the campus and connected to different Access
Control Panels.

J. The panel shall be configured with IP address and gateway address in order to be
reachable through the LAN and WAN.

2.6.1 HARDWARE SPECIFICATIONS

A. Final quantities and types of Access Control Panels shall be determined by the
contractor based upon the requirement to provide a fully operational system, as per
the intent of the specification, as shown on the drawings and recommended by the
manufacturer. As a minimum, the following features shall be supported in each
Access Control Panel;

1. 24000 users per Door.


2. Support for 255 tenants.
3. Support for 4, 8, 16, etc supervised inputs.
4. Supports 4, 8, 16, etc Card Readers.
5. Standalone Access Control Logic.
6. Real Time Clock/Calendar.
7. Resident Day & Date Based Logic.
8. Central Control and Monitoring.
9. Zoned Anti-Pass back.
10. Multi-Tenant Support.
11. TCP/IP Communications (RJ45 interface).
12. On-Board battery charger.
13. One dedicated tamper input.

B. Supported reader’s technologies:

1. Magnetic Key & Card


2. ABA (Track 2)
3. Wiegand (26 & 32 bit)
4. Proximity
5. Biometrics

2.6.2 CONTROLLER OPERATION

A. Distributed Access Control downloads all “local” access control parameters from the
Host PC to the Access Control Panels, so that it may operate in a standalone basis.
This ensures rapid access processing and minimal dependence on a single point of
failure.

B. As a standalone controller, the Access Control Panel provides access to up to 8 doors.


Support for a door monitor input, locking mechanism output, secondary alarm bypass
output, and a request to exit input is provided for each door. On each door a second
IP Access Control And Security Management Systems
Issued For Tender Section 16725
Page 27 of 35
RAKKA SCHOOL

reader may be used for door exiting. When the door is controlled by two readers for
entrance and exit, anti-passback operation is available. As a distributed network
controller the Access Control Panel allows centralized alarm monitoring, historical
data collection, and zoned anti-passback.

2.6.3 ELECTRICAL SPECIFICATIONS

A. BUFFER: 1000 messages, nominal

A. RAM BATTERY BACKUP: On-board Ni-cad, rechargeable. Maintains RAM for 30


days.

B. CLOCK/CALENDAR: Crystal controlled, real time

C. BATTERY CHARGER: On-Board Battery Charger

D. POWER SUPPLY: 220Vac transformer (50/60 Hz ±10%).

E. POWER FAILURE NOTIFICATION: Standard, using internal detection logic.

F. CONTROLLER BATTERY BACKUP: maintenance free, rechargeable, 4 AH,


12Vdc for up of normal operation.

G. BATTERY STATUS: Battery level monitoring should be available for low battery
indication.

2.6.4 ENVIRONMENTAL SPECIFICATIONS

A. OPERATING TEMPERATURE: 0°C to 50°C

B. OPERATING HUMIDITY: 10% to 80% RH, non-condensing.

2.7 PROXIMITY CONTACTLESS SMART CARD READERS

A. The card reader shall read 13.56 MHz contactless smart card and 125 kHz proximity
card.

B. The reader shall read the ID number of the card when presented to the surface of the
reader without physical contact.

C. When installed according to the manufacturer’s instructions, primary operation of the


reader shall be unidirectional; that is, having its greatest read range from the front
surface with the minimum reading range at its back surface.

D. The following reader styles shall be available and may be used interchangeably
throughout the system;
IP Access Control And Security Management Systems
Issued For Tender Section 16725
Page 28 of 35
RAKKA SCHOOL

1. A unitized outdoor reader with a read antenna, and necessary electronics for
transmission of the card code to the system; all contained in a single package.

1. Read range shall be nominally 9 - 11 cm, from the rear surface when used with
a card. The reader may be mounted directly on any material including metal
without the use of standoffs, or concealed behind any building material except
metal.

2. The card shall be read when presented in any orientation or at any angle to the
front surface of the reader. An LED on the front surface of the reader shall
indicate to the user that the card presented to the reader has been read. An
audio beep tone to indicate that the card has been read shall be available.

3. The card reader shall communicate in Wigand and Mifare protocol interfaces,
and be compatible with all standard access control systems.

4. The card reader shall be made from a weatherproof material to meet the
outdoor installation.

5. Read head operating temperature ranges shall be:

a. Indoor: 0°C to +45°C.


b. Outdoor: 0°C to +50°C.
c. Operating humidity of 5-95% non-condensing.
d. Damage to the reader shall not damage any other part of the access control
system.

6. The reader shall be weather proof with Ingress Protection IP 65.

7. The card reader shall have a hold line that will buffer a card read until the
panel has asserted that the information can be sent up line.

8. The card reader shall be listed under UL 294 as an access control system unit
accessory, and shall be FCC and DTI certified.

9. The card reader shall be made from polycarbonate material.

10. For certain locations (Water Tank, Security Control Center, ..), the reader will
be equipped with PIN Keypad.

2.8 READ/WRITE SMART CARDS

The features of access cards shall not be limited to the followings;

A. The contactless card shall be compatible with;


IP Access Control And Security Management Systems
Issued For Tender Section 16725
Page 29 of 35
RAKKA SCHOOL

1. ISO/IEC 7816.
2. ISO/IEC 14443.
3. ISO 15693.

B. Card combines 13.56 MHz contactless read/write smart card and 125 kHz proximity
technology on a single card with the ability to add magnetic stripe, barcode, and other
features such as photo identification.

C. An ISO Standard PVC credit card size having a punched slot for a strap or clip.

D. The presence of small metal objects such as keys or coins near the card shall not alter
the code read by the reader or prevent the code form being read by the reader.

E. The individual card shall be derived from a population of at least 134 million unique
codes.

F. Cards shall be sequentially numbered. The user may specify codes or numbers. Exact
replacements for cards which may be lost, damaged, or stolen shall be available upon
request. Cards having the same number shall also be available upon request.

G. Cards may be used interchangeably and shall be compatible with all readers in the
system, regardless of the reader’s physical size or style, and without any code
matching or memory devices in the reader.

2.9 MAGNETIC DOOR CONTACT

1. UL Listed.

2. ¾” diameter recessed magnetic contacts with factory installed wire leads,


minimum 1 ft. long – 22AWG.

3. Self-lock mounting.

4. Installation shall include the application of mounting compound for added


adhesive strength.

5. Where field conditions prohibit the use of a recessed magnetic contact, surface
mounted switch shall be used.

6. Operation: N.O. and N.C. Magnetic contacts.

2.10 REQUEST TO EXIT SWITCH

1. 1" diameter red colored, mushroom cap Push button.

IP Access Control And Security Management Systems


Issued For Tender Section 16725
Page 30 of 35
RAKKA SCHOOL

2. Operation: Momentary N.O. and N.C. DPDT Circuits.

2.11 EMERGENCY BREAK GLASS

1. Switch contact rating: 1 Amp @ 125VAC.

2. Assembly mounts in 3 gang electrical box.

2.12 ELECTROMAGNETIC DOOR LOCK

All locking devices providing access are to be of the electromagnetic type to meet the
following requirements as outlined below;

1. Approved by the authority having jurisdiction, including local fire authorities.

2. UL listed.

3. Field adaptable for internal-swinging/external-swinging doors.

4. Provide a minimum holding force of 1200-1600 lb.

5. Provide with an integral door status switch and magnetic bond sensor.

2.13 POWER SUPPLIES

1. Power supply rated for the total load of the control station for all input and
output modules energized, without diversity.

2. Protection against power surges and over voltages.

3. Battery backup to support panel memory for a minimum of 72 hours.

4. Spare fuses.

5. 24 volt AC/DC control circuits throughout.

A. High level interface(s)

Provide dedicated high level interface devices to directly connect the following
equipment to the LAN communication network so that such equipment becomes an
extension of the ACS.

All interfaces should be through software application interface. If hardware or


hardware accessories are needed, it should be clearly indicated with detailed
installation and specification requirements.

IP Access Control And Security Management Systems


Issued For Tender Section 16725
Page 31 of 35
RAKKA SCHOOL

1. CCTV system.

2. Fire Alarm and detection system.

2.14 SYSTEM WIRING AND CABLES

All wiring for Access Control Panel communications shall be UTP CAT-6. All other
cables are to meet the following requirements as outlined below;

1. UL Listed.

2. NEC approved.

3. Plenum rated where required.

4. All cabling shall be shielded unless specified otherwise by a card access


manufacturer.

5. As a minimum, standard 18 AWG cable shall be installed unless in direct


conflict with manufacturers specifications.

6. All cabling used in the implementation of systems integration shall be in


accordance with the recommendations of the manufacturer.

2.15 SECURITY MANAGEMENT SYSTEM (SMS)

A. Security management system shall be modular and network enabled architecture


providing integration between all security systems’ servers (alarm monitoring,
CCTV, Access Control, digital video, ID badging, etc) and database management into
a single platform. Moreover, the modular architecture allows for easy expansion or
modification of inputs and remote control stations. SMS shall provide integration to
any third party (i.e. open protocols).

B. SMS could include three components running on single or multiple computers


providing flexibility in network configuration,

1. Database Server used for storing the database tables.

2. Communication Server used for routing user interface request and to send
information to the database server.

3. User Interface which helps the SMS operators to communicate with the
integrated security systems servers.

IP Access Control And Security Management Systems


Issued For Tender Section 16725
Page 32 of 35
RAKKA SCHOOL

A. All security systems will be integrated through SMS, also the operator will have
complete capability for monitoring and controlling all security systems’ components
through dedicated modules e.g.

1. Access Control Functions Module.

2. CCTV, Video Recorders and Monitoring Module.

3. Fire Alarm and Detection Module.

B. SMS shall include and not limited to the following features;

1. Multi-User/Network Capabilities.

2. Multiple Servers.

3. Multi-level Password Protection.

4. Concurrent workstations licensing.

5. Database Partitioning.

6. Multiple levels of data encryption.

7. Alarm Events.

8. Live Video Display.

9. User Friendly Quick Start Wizard.

10. Levels of System Operation.

PART 3 – EXECUTION

3.1 TESTING AND COMMISSIONING

A. GENERAL

Provide a program for the testing and commissioning procedure. Use a qualified
representative of the ACS supplier to co-ordinate testing and present all tests and
training courses and remain on-site until the ACS is fully operational.

B. SITE TESTING AND COMMISSIONING

IP Access Control And Security Management Systems


Issued For Tender Section 16725
Page 33 of 35
RAKKA SCHOOL

1. Testing and commissioning of all ACS panels separately before connecting to


the network.

2. Attendance at the testing of all equipment that interfaces to the ACS and
confirmation of the operation of such equipment from the ACS interface
terminals.

3. Testing of all field wiring from terminals to field interface terminal strips.

4. Testing and commissioning of all power supplies and batteries.

5. Verification of communication through remote systems.

6. Testing of the operation of each control point from the operator's workstation
and verification of the status of all points and alarm functions on graphic
displays.

C. DEMONSTRATE the following:

1. Globally transferred information such as alarms

2. Detection and action of all alarm conditions

3. Communications with PC workstations and ACS Server.

4. Time schedules and after-hours operation

5. Mapping of system points to operator's workstation (s)

6. Operator's workstation software

7. Power fail re-start. And battery status

8. Essential power mode operation

9. Fire mode of operation

3.2 GROUNDING

Pay particular attention to the grounding of equipment cases and shielded cables to
eliminate noise interference and avoid electrical loops. Correctly terminate shields at
ground bars and connect to the IT Services dedicated grounding.

1. Insulate all incoming or outgoing shielded cables from control cabinet casings.

IP Access Control And Security Management Systems


Issued For Tender Section 16725
Page 34 of 35
RAKKA SCHOOL

2. Provide suitable terminals, where grounding of cable shields is required.

3. Make provision of a through connection of cable shields for through connected


communications cables.

END OF SECTIN 16725

IP Access Control And Security Management Systems


Issued For Tender Section 16725
Page 35 of 35

You might also like