Professional Documents
Culture Documents
No : /MA/LIVIA-BAT/III/2023
ARCHITECHTURE ELECTRONIC
ELECTRICAL HVAC
( ) ( ) ( )
BATI – Bulk Liquid Project
TECHNICAL SPECIFICATION
ELECTRICAL MATERIAL LIST
ELECTRICAL
1 Low Voltage Panel & Component :
E FIRE FIGHTNG
Indoor Hydrant Box, Stainless steel
1 plate hair line SS 304 with size 1.250 Local made, 2 mm thickness
x 750 x 180 mm
with hoser rack, hose reel, hydrant
valve, Van Der Heyden valves
diameter
Indoor Hydrant Box, Size 1.250 x
2 750 x 180mm complete with hoser Local made, 2 mm thickness
rack, hose reel
hydrant valve, Van Der Heyden valves dia
2,5 ", dia 1,5 " and nozzle
3 Out door Hydrant Box Local made
4 Pillar Hydrant Iwa, Ozeki, Gunebo
5 Portable Fire Extinguisher 3 kg ABC Chubb, Gunebo, Servo
6 Portable Fire Extinguisher 6 kg ABC Chubb, Gunebo, Servo
7 Portable Fire Extinguisher 25 kg CO2 Trolley Chubb, Gunebo, Servo
8 Fire Hydrant Pipe Black Steel Pipe ASTM Bakrie
A-53 Sch. 40
9 Automatic Air Vent Yoshitake
E 19 ACCESS CONTROL SOFTWARE AND DATABASE MANAGEMENT
PART 1 - GENERAL
1.1 SUMMARY
A. Section Includes:
1. Cloud-based security access central-control system.
2. Web-based administrative portal.
3. Security access controllers connected to high-speed electronic-data transmission network.
B. Related Requirements:
1. Section 281500 "Access Control System Hardware Devices" for access control system hardware,
such as keypads, card readers, and biometric identity devices.
1.2 DEFINITIONS
A. ACS: Access control system.
B. ACU: Access control unit.
C. Anti-Passback: Feature that lets users define a sequence in which entries must be accessed in order to gain
entry.
D. Cloud Key Credential: Credential that lets users generate links to provide temporary access through a
mobile app or online portal.
. Control Center: Online portal that lets administrators manage users, set up entries and permissions, and
troubleshoot hardware.
F. Credential: Key presented to a reader to gain access to an entry to include cards, key fobs, and mobile
credentials.
G. DTS: Digital Termination Service. A microwave-based, line-of-sight communication provided directly to
the end user.
H. Entrance: Door, gate, turnstile, or elevator floor secured with a reader.
I. Identifier: A credential card; keypad personal identification number; or code, biometric characteristic, or
other unique identification entered as data into the entry-control database for the purpose of identifying an
individual. Where this term is presented with an initial capital letter, this definition applies.
J. LAN: Local area network.
K. Location: A Location on the network having a workstation-to-controller communications link, with
additional controllers at the Location connected to the workstation-to-controller link with a TIA 485-A
communications loop. Where this term is presented with an initial capital letter, this definition
applies.Magic Link: Authenticated URL that lets a user log into the ACS mobile app.
L. Mobile Credential: Access method tied to a user's smartphone through the use of a mobile app.
M. Mobile App: Smartphone application used for providing mobile credentials and remote unlock for users.
N. RAS: Remote access services.
O. Remote Unlock: Feature that lets users unlock an entry without needing to be in range.
P. REST API: Representational State Transfer Application Programming Interface.
Q. RF: Radio frequency.
R. ROM: Read-only memory. ROM data are maintained through losses of power.
S. Smart Hub ACU: Cloud-based control panel that manages access to a secured area.
T. SSO: Single sign-on.
U. TCP/IP: Transport control protocol/Internet protocol.
V. TLS: Transport layer security.
W. User: Person defined in the control center with credentials.
X. VPN: Virtual private network.
B. Source Limitations: Obtain controllers, Identifier readers, and all software through one source from single
manufacturer.
1. Indoor, Controlled Environment: NEMA 250, Type 1 enclosure. System components, except the
central-station control unit, installed in [air-conditioned] [temperature-controlled] indoor
environments shall be rated for continuous operation in ambient conditions of 36 to 122 deg F (2
to 50 deg C) dry bulb and 20 to 90 percent relative humidity, noncondensing.
PART 2 - PRODUCTS
2.2 DESCRIPTION
A. Security Access System: Cloud-based ACS that includes an online administrative portal and field-installed
access control panels and credential readers, connected by a high-speed electronic-data transmission
network.
B. Compliance: UL 294.
C. Administrative Portal: Provide an online administrative portal that can be accessed via any web-enabled
device through an Internet browser.
1. Deployment: Cloud-based with no requirement for a dedicated local server and not resident on a
LAN or VPN.
2. Online Portal Access: Configurable by System Administrators to selected authorized users, either
within the company or outside.
3. Scalability: Support an unlimited number of users, entry events, zones, sites, readers, and ACUs.
4. Supported Administrator Functions:
a. Monitor via real-time dashboards user activity, entry activity, and hardware states,
including:
1) Access control panel cloud and LAN connection status, hardware version, and
software version.
2) Credential reader connection status, hardware version, software version, and
temperature.
2.3 OPERATION
A. Security access system shall use a single cloud-based database for access-control and credential-creation
functions.
B. Distributed Processing: A fully distributed processing system.
1. Access-control information, including time, date, valid codes, access levels, and similar data, shall
be downloaded to controllers so each controller can make access-control decisions.
2. Intermediate controllers for access control are prohibited.
3. In the event that communications with the access control cloud service are lost, controllers shall
automatically buffer event transactions until communications are restored, at which time buffered
events shall be uploaded to the cloud service.
C. Number of Locations:
1. Support unlimited separate Locations using one or more access control panels with TCP/IP LAN
connections to the access control cloud service.
2. All Locations combined in a common database.
E. Location Capacity:
1. Unlimited reader-controlled doors.
2. Unlimited total-access credentials.
3. Unlimited supervised alarm inputs.
4. Unlimited programmable outputs.
G. Administrative portal shall provide operator interface, interaction, display, control, and dynamic and real-
time monitoring. Administrative portal shall control system networks to interconnect all system
components, including credential readers and field-installed controllers.
I. Error Detection:
1. Use a cyclic code method to detect single- and double-bit errors, burst errors of eight bits or fewer,
and at least 99 percent of all other multibit and burst errors between controllers and the access
control cloud service.
2. Interactive or product error-detection codes alone will not be acceptable.
3. A message shall be in error if one bit is received incorrectly.
4. Retransmit messages with detected errors.
5. Access control cloud service shall publish a communication failure alarm message when the
number of consecutive retransmission attempts equals the assigned quantity.
6. Monitor the frequency of data transmission failure for display and logging.
D. Controller Software:
1. Controllers shall operate as autonomous, intelligent processing units.
a. Controllers shall make decisions about access control, alarm monitoring, linking
functions, and door-locking schedules for their operation as determined in the system
software.
b. Controllers shall be part of a fully distributed processing-control network.
c. The portion of the database associated with a controller, and consisting of parameters,
constraints, and the latest value or status of points connected to that controller, shall be
maintained in the controller.
6. Operating systems shall include a real-time clock function that maintains seconds, minutes, hours,
day, date, and month. The real-time clock shall be automatically synchronized with the access
control cloud service at least once a day to plus or minus 10 seconds. The time synchronization
shall be automatic, without operator action and without requiring system shutdown.
F. Controller-to-Controller Communications:
1. TCP/IP LAN network.
G. Database Downloads:
1. All data transmissions from the access control cloud service to a Location, and between controllers
at a Location, shall include a complete database checksum to check the integrity of the
transmission. If the data checksum does not match, a full data download shall be automatically
retransmitted.
2. If a controller is reset for any reason, it shall automatically request and receive a database
download from the access control cloud service. The download shall restore data stored at the
controller to their normal working state and shall take place with no operator intervention.
H. Report-Generator Software: Include interface to generate reports for displaying and exporting to CSV.
Report formats may be configured by operators. Include time and date generated.
1. Entry Activity by User Reports: Filter by entry, user, date, and unlock attempts.
2. User Activity by Entry Reports: Filter by user, entry, credential, controller, location, and result.
3. Portal Audit Report: Generate reports of access control software usage and filter by user, time, and
IP address.
4. Reports shall have the following options:
a. View on screen.
b. Export to CSV.
5. The reports of system database shall allow options so that every data field may be printed.
6. The reports of system database shall be constructed so that the actual position of the printed data
shall closely match the position of the data on the data-entry windows.
J. Visitor Assignment: Allow a visitor designation to be assigned to a credential holder via a third-party
visitor management integration.
K. Third-Party Integration: The ACS shall include an open, documented REST API framework for the online
portal to support customized automation of access control-related tasks and third-party integrations.
B. Group:
1. Group names may be used to sort cardholders into groups that allow the operator to determine the
tenant, vendor, contractor, department, division, or any other designation of a group to which the
person belongs.
2. System software shall have the capacity to assign custom group names.
3. Make provision in software to deactivate and reactivate all access authorizations assigned to a
particular group.
C. Schedules:
1. Each schedule consists of events, which include start and stop time for seven days of the week. A
schedule can be assigned to users and user groups to limit access to specific people or assigned to
entries to apply to all users.
2. System shall have the capacity for unlimited schedules for each Location.
D. Events:
1. System shall have the capacity for unlimited recurring and one-time events.
2. Events not designated as recurring shall be automatically purged from the database after the date
expires.
E. Access Levels:
1. System shall allow for access to be restricted to any area by reader and by time. User/group
schedules and entry schedules shall determine when and where an Identifier is authorized.
2. System shall be able to create multiple door and schedule combinations so that an Identifier may
be valid during different time periods at different readers even if the readers are on the same
F. User-Defined Fields:
1. System shall support a minimum of 100 user-defined fields, each with up to 255 characters, for
specific information about each credential holder.
2. Types of user-defined fields supported include text, date, checkbox, and dropdown.
3. System shall accommodate a title for each field; field length shall be 100 characters.
4. A search function shall allow any one user-defined field or combination of user-defined fields to
be searched to find the appropriate cardholder. The search function shall include a search for a
character string.
5. System shall have the ability to export to CSV cardholders based on and organized by the user-
defined fields.
B. Tamper Protection: Tamper switches on enclosures, control units, pull boxes, junction boxes, cabinets, and
other system components shall initiate a tamper-alarm signal when unit is opened or partially disassembled.
Control-station control-unit alarm display shall identify tamper alarms and indicate locations.
C. Subject to compliance with requirements in this article, manufacturers may use multipurpose controllers.
D. Battery Backup: Sealed, lead acid; sized to provide run time during a power outage of 90 minutes,
complying with UL 924.
E. Controller Power: NFPA 70, Class II power-supply transformer, with 12- or 24-V ac secondary, backup
battery and charger.
A. ACS shall support mobile credentials via a mobile app with end-to-end encryption to administrative portal.
B. Mobile app shall run in the background on a device with minimal battery usage.
1. Devices Supported: Mobile devices with Android and IOS operating systems, including Apple
Watch.
C. Functions Supported:
1. Touch entry.
2. Hand wave.
3. App unlock.
4. Auto proximity unlock.
5. Remote unlock.
6. Last-to-leave locking, allowing users to lock an entrance regardless of schedule.
7. 24-hour activity log.
8. Send diagnostic feedback.
9. Activate lockdown plan.
10. Share guest access link.
D. Logging into the mobile app shall not require a password but will employ magic links.
2.12 TRANSFORMERS
A. NFPA 70, Class II control transformers, NRTL listed. Transformers for security access-control system shall
not be shared with any other system.
B. Computer-based cable and asset management system, with fully integrated database and graphic
capabilities, complying with requirements in TIA 606-B.
1. Document physical characteristics by recording the network, asset, user, TIA details, device
configurations, and exact connections between equipment and cabling.
a. Manage the physical layer of security system.
b. List device configurations.
c. List and display circuit connections.
d. Record firestopping data.
e. Record grounding and bonding connections and test data.
3. System shall interface with the following testing and recording devices:
a. Direct-upload tests from circuit testing instrument into the workstation.
b. Direct-download circuit labeling into labeling printer.
3.1 EXAMINATION
A. Examine pathway elements intended for cables. Check raceways, cable trays, and other elements for
compliance with space allocations, installation tolerances, hazards to cable installation, and other
conditions affecting installation.
B. Examine roughing-in for LAN and control cable conduit systems to controllers, credential readers, and
other cable-connected devices to verify actual locations of conduit and back boxes before device
installation.
C. Proceed with installation only after unsatisfactory conditions have been corrected.
3.2 PREPARATION
A. Comply with recommendations in SIA CP-01.
B. Comply with TIA 606-B, "Administration Standard for Commercial Telecommunications Infrastructure."
C. Product Schedules: Obtain detailed product schedules from manufacturer of access-control system or
develop product schedules to suit Project. Fill in all data available from Project plans and specifications and
publish as Product Schedules for review and approval.
1. Record setup data for access control software.
2. For each Location, record setup of controller features and access requirements.
3. Propose start and stop times for schedules, and assign entry schedules to entries.
4. Enable and configure alert settings. Establish interlocks between alarms, intruder detection, and
video surveillance integrations.
5. Develop user-defined fields.
6. Create lockdown plans.
7. Discuss badge layout options; design badges.
8. Complete system diagnostics and operation verification.
9. Prepare a specific plan for system testing, startup, and demonstration.
10. Develop acceptance test concept and, on approval, develop specifics of the test.
11. Develop cable and asset-management system details; input data from construction documents.
Include system schematics and Visio Technical Drawings in electronic format <Insert software>.
D. In meetings with Architect and Owner, present Product Schedules and review, adjust, and prepare final
setup documents. Use approved, final Product Schedules to set up system software.
3.3 IDENTIFICATION
A. In addition to requirements in this article, comply with applicable requirements in Section 270553
"Identification for Communications Systems" and with TIA 606-B.
B. Using software specified in "Cable and Asset Management Software" Article, develop cable administration
drawings for system identification, testing, and management. Use unique, alphanumeric designation for
each cable, and label cable and jacks, connectors, and terminals to which it connects with the same
designation. Use logical and systematic designations for facility's architectural arrangement.
C. Label each terminal strip and screw terminal in each cabinet, rack, or panel.
1. All wiring conductors connected to terminal strips shall be individually numbered, and each cable
or wiring group being extended from a panel or cabinet to a building-mounted device shall be
identified with the name and number of the particular device as shown.
2. Each wire connected to building-mounted devices is not required to be numbered at the device if
the color of the wire is consistent with the associated wire connected and numbered within the
panel or cabinet.
D. At completion, cable and asset management software shall reflect as-built conditions.
3.6 DEMONSTRATION
A. [Engage a factory-authorized service representative to train] [Train] Owner's maintenance personnel to
adjust, operate, and maintain security access system. See Section 017900 "Demonstration and Training."
B. Develop separate training modules for the following:
1. Operators who prepare and input credentials to use the access control software and to enroll
personnel.
2. Security personnel.
3. Hardware maintenance personnel.
4. Corporate management.
END OF SECTION
2.4-inch LCD Display Fingerprint Access Control Terminal, Built-in Mifare card reading module
Communication: TCP/IP, ISUP5.0; 1000 users, 1000 fingerprints, 1000 card and Max. 100,000 event records
Support Access Control and Time Attendance Function, Optical Fingerprint Module
Remotely opens door via Hik-Connect mobile client; Tamper alarm.
Specification
Display
Screen size 2.4-inch
Type LCD-TFT display screen
Audio
Audio output 1 loudspeaker, 1 buzzer
Network
Wired network TCP/IP, 10/100Mbps, self-adaptive
Communication protocol TCP/IP, ISUP
Interface
Network interface 1
Lock control 1
Exit button 1
Door contact input 1
TAMPER 1
USB 1
Capacity
Card capacity 1000
Fingerprint capacity 1000
Event capacity 100,000
Authentication
Card type Mifare 1 card
Card reading distance 0 to 5 cm
Fingerprint module Optical fingerprint module
Fingerprint comparing mode 1:1 and 1:N
Fingerprint recognition duration < 1s
General
Power supply 12 VDC/1 A
Working temperature -10 °C to +55 °C (14 °F to +131 °F)
Working humidity 10% to 90% (no condensing)
Color Silver
Dimensions 140 mm × 155 mm × 30 mm (5.51" × 6.01" × 1.18")
Self Service Reports (SSR) Stand-alone operation, calculate attendance data and export reports via USB interface
Installation Wall mounting
Gross weight: 0.78 kg (1.72 lbs)
Weight
Net weight: 0.22 kg (0.48 lbs)
Available Model
DS-K1T8003MF
Dimension
Accessory
Optional
IC S50
Mifare Card
Spec of IC S50 Mifare 1 Non-contacting IC Card www.hikvision.com
IC S50
Mifare 1 Non-contacting IC Card
MIFARE 1 S50 is a serial of non-contacting smart card that meets the standard of ISO/IEC 14443A.
The communication layer (MIFARE RF interface) meets part2 and 3 of the ISO/IEC 14443A standard.
The security layer supports CRYPTO1 data stream encryption of domain authentication.
MAIN FEATURES
DS-K4H258S
One-Door Magnetic Lock
AVAILABLE MODEL
DS-K4H258S
MAIN FEATURES
SPECIFICATIONS
Model DS-K4H258S
Dimension of Lock Body
238×45×25mm (9.4×1.8×1.0")
(L×W×H)
Dimension of Armature Plate
182×38×12.5mm (7.2×1.5×0.5")
(L×W×H)
Unlock Method Current Interruption
1
Spec of DS-K4H258S One-Door Magnetic Lock www.hikvision.com
Model DS-K4H258S
Maximum Thrust 280kg(550Lbs) Linear Thrust
Input Voltage 12 VDC
Working Current 340mAx2
LED Indicator Green (Work Status)
Suitable Door Wooden Door, Glass Door, Metal Door, Fireproof Door
Surface Temperature ≤ Ambient Temperature +20°C (68°F)
Working Temperature -10°C~+55°C (14°F~131°F)
Working Humidity 0~95% (Relative Humidity)
Shell Hard Anodizing Electroplating Operated
Lock Body Eco-friendly Nickel Electroplating Operated
Armature Plate Eco-friendly Zinc Electroplating Operated
Weight 2.1kg