Professional Documents
Culture Documents
Table of Content Access Control System: Installation
Table of Content Access Control System: Installation
Table of Content Access Control System: Installation
Page
PART 1 INTRODUCTION 2
1.1 Scope 2
1.2 System Description 2
1.3 System lntegrator 4
1.4 References And Compliance 5
1.5 Abbreviations & Definitions : 5
1.6 Quality Assuranœ 5
1.7 Delivery ,Storage And Handling 6
1.8 Contractor Responsibility & Submittals 7
1.9 Software Service Agreement 11
1.10 Extra Materials 11
PART 2 PRODUCTS 12
2.1 General 12
2.2 System Software 12
2.3 Door Controller 21
2.4 Proximity Card Reader 23
2.5 Magnetic Door Lock 23
2.6 Push-Button/Request To Exit Switches 24
2.7 Door Sensor (Contact) 24
2.8 Raising Arm Barriers 24
2.9 Underground Loop Vehide Detector System 26
2.10 Long Range Radio Frequency Readers (Rfid) 26
2.11 System Workstation 27
2.12 System Servers 27
PART 3 INSTALLATION 27
3.1 Installation Of Basic Wiring System Materials 27
3.2 Grounding: 28
3.3 Field Quality Control 28
3.4 Coordination With Other Divisions 29
PART 1 INTRODUCTION
1.1 SCOPE
A This document provides the minimum technical specifications/ requirements for the
Access control System that shall be installed in the project as indicated in drawings
and relevant documents.
A The Access Control systems, which shall control access to apartment’s areas and give
alarm in case of unauthorized in order to achieve maximum-security in the selected
project areas. Alarm shall set also in case of leaving the door open more than an
adjustable time.
C The system shall be also used to provide Electronic Interlock between doors as
indicated on the drawings.
D The system will achieve maximum security in the project and allow monitoring the
activities in the covered areas through the Central Control Equipment.
E The LAN shall be used for communication between Server and door Controllers.
H The access control system shall be provided to manage and control access of
personnel to areas and monitoring the emergency doors.
Push buttons shall be used to activate the door controllers to give command to door
locks to open.
This shall release the locking mechanism (Electric or Magnetic) and allow entry.
K Whenever a door, equipped with the system, is closed, it shall also be locked.
Automatic door closer shall be used to close the door after the person passing. The
main server shall constantly monitor the data concerning all door events and status
of all secured doors such as (open/close) and the status of all locks
(locked/unlocked). If the door is not closed or the door lock is not locked for any
reason, the control panels shall set the alarm.
L The unlocking of all doors can be activated manually from the main server or
automatically whenever receiving a signal from the fire alarm system in such a way
that the locking mechanisms are released in case of a fire.
M The system shall be supplied via the UPS. The door locks shall be released in case of
system power failure.
N All data (time of entering and exit, etc) corresponding to access activities and
emergency release shall be recorded. Main access control server shall be used to
program, operate, control and produce reports using a dedicated printer.
0 Special operating software under windows shall be used execute all functions of the
system for security purpose.
Alarm shall be set in several cases, in case of trial from unauthorized person to open
a door, trial from a person to open a door not the authorization time or days. Fault in
any of the system component, power failure, etc. shall report fault alarm. The system
should be self-diagnostic.
Q This means using networked type door controllers that work together as one system
(standalone), having sustained operation in case of failure of the main server.
Programming and monitoring shall be done using a dedicated workstation. Full
time/date, number based access control continues, using the intelligence in the local
controllers even if the main server is off line.
R Any unauthorized attempt shall trigger alarm on the WORKSTATION of the system.
T The Access Control systems shall control access to the site in order to achieve
maximum-security in the selected project gates.
The system will achieve maximum security in the project and allow monitoring the
activities in the covered areas through the Central Control Equipment.
V For all outdoor installations all related system components must be Outdoor type IP
66
D System installer shall coordinate with system integrator to perform all system
integration requirements.
E Project systems integrator should be nominated for the whole project to perform all
required interfaces between all ELV/ICT and related MEP , life safety and security
systems in terms of software and hardware.
F The systems integrator should approve all systems contractors technical material
submittals prior to submitting to the engineer for system approval
G The Engineer has the right to approve or reject the documents after assessing the
integration procedures followed in addition to the system compliance with this
specification.
A All works shall be performed in strict accordance with the drawings, specifications
and stipulations of the Local Building and safety Codes, TIA/EIA the National Fire
Protection Association (NFPA), International Electrical Commission (IEC) and other
related international standards
C Training:
Warranty: Provide warranty for the system for at least 2 years starting from the first
day of system handing over to the operation team.
E Licenses: The systems shall be provided with all necessary licenses and allow for any
future upgrade software /firmware. Online notifications should be included to allow
for any software versions upgrades according to service levelagreement with project
operator
F Source Limitations for the System and Components: Obtain all system components
from single source from single manufacturer. Any deviation must be supported with
documented reasons which shall be assessed and approved by the Engineer.
A Deliver products in factory containers. Store in clean, dry, closed space in original
containers. Protect products from fumes. Handle very carefully to avoid shocks or
damage.
C Inspection shall be performed in two stages, first time upon receiving the equipment,
devices and cables on site before storing and second time after installation according
to installation phases.
A General: Submit the necessary complete sets of documentation indicating type, size,
rating, style, catalogue number, Manufacturers names, and/or catalogue data sheets
for all items to ensure compliance with specifications. This documentation shall be
subject to the approval of the Engineer and no equipment shall be ordered without
his approval for all equipment and devices, which are shown on documents
(drawings, specs ...etc). Any document submitted by the Contractor during the tender
stage shall not be considered as technical submittal, it shall be used only to approve
the manufacturer name. During technical submittalstage, Contractor shall submit all
required technical document for study and approval.
B Shop Drawings: Submit shop drawings & Composite drawings showing equipment,
device locations, labeling, part number and connecting wiring of the systems,
including riser diagrams. Shop drawings shall include, but not be limited to the
following:
C Material Submittal: shall include, but not be limited to, the following:
1. System integrator shall stamp and approve the system material submittal prior
to submitting to the Engineer.
2. Pin to pin connection diagram
3. Complete one-line riser diagram(s) showing all equipment and the size,
connections, type and number of all equipment
4. Include programming and installation manuals
5. Complete sequence of operations and functions of the system
6. Complete system wiring diagrams for components and interfaces to
equipment supplied by others
7. A listing of the manufacturer's authorized, local representative responsible for
installation, coordination and service
8. Compliance sheet item by item providing a comparison between each item
specifies each item submitted. Contractor must indicate clearly any deviations
from design & items specifications-if exists-indicating the reason of deviation.
Such deviations must be approved by the Design Engineer.
9. Detailed Technical Data sheets with highlighted part numbers must be
submitted.
10. BOQ in ECG Format complete with quantities and products part numbers.
11. Compliance sheet with project approved vendor list .Any deviations from the
project approved vendor list must be approved by the Design Engineer.
E Maintenance Data: Submit maintenance data and parts lists for each type of the
installed system including furnished specialties and accessories. Include this data,
product data, and shop drawings in maintenance manual; in accordance with
requirements of other relevant documentation.
F Instruction Manuals: The Contractor shall provide with the assistance of the
equipment manufacturer and its authorized, local representative. In addition, one
approved copy of the system submittal, complete operating instructions; pertinent
system orientation documents and system service.
System supplier & Installer qualifications documents: System supplier & Installer
should submit the required certifications indicating that the system supplier and
installer company is certified from system manufacturer to perform all system
supplying, installations, testing and commissioning supported by system installers
CVs and related manufacturer certifications. The system supplier should be involved
in a strong relationship with system manufacturer with proven reference of similar
projects. The system supplier & installer should submit reference of similar projects
L Finalized Reflected ceiling drawings: illustrating all works in the ceilings after
finalizing the coordination process.
N Submit testing and commissioning procedures including required test equipment for
all of the system components as well as the overall system performance.
Testing results shall be submitted in both soft and hard copies for 100% of the system
components. testing shall take place in the engineer presence .
Q Testing shall be performed under normal operation conditions for the building i.e in
the presence of ambient Electromagnetic interference sources.
R System components factory tests certificates should be submitted with field testing
S Close out documents :Required documents shall include but not limited to the
following :
1. As built drawings: During the construction of the system, the Contractor shall
put in writing all his remarks, during the progress of work, concerning any
suggested alterations from the shop drawings in wiring routes, locations of
equipment or devices which arise from coordination between the system and
other activities on related shop drawing plans. As built drawings and
documents shall include updating for all of the drawings, documents,
calculations, data sheets..etc previously submitted in shop drawing stage to
reflect what is exactly executed on site.
2. During executing the work and preparing the drawings, no execution of
alterations shall be allowed before receiving a written approval from the
Engineer.
3. All alterations shall be registered and filled by the Contractor and extra copies
shall be submitted to the involved parties (Engineer, Project Manager, Site,
etc.).
B Upgrade Service: Update software to the latest version available at the Project
completion. Install and program software upgrades that become available within 2
years from date of Substantial Completion. Upgrading software shall include
operating system. Upgrade shall include new or revised licenses for using of
software.
C Provide 30 days' notice to Owner to allow scheduling and access to system and to
allow Owner to upgrade computer equipment if necessary.
System manufacturer must provide all necessary software development kits (SDKs)
necessary to perform all integration requirements.
A Furnish extra materials that match products installed —if-necessary-and that are
packaged with protective covering for storage and identified with labels describing
contents.
B The Contractor shall provide the suggested spare parts list for 2 years for operator &
Engineer approval and supply the approved spare parts as part of this contract.
C Spare parts lists shall be submitted within the technical submittal, at the shop
drawings stage and close out documents. The spare part list should be agreed with
project operator according to SLA (Service Level Agreement)
2.1 GENERAL
B The above components shall be provided with the appropriate numbers and
capacities to serve the whole project and achieve the design intent. The locations of
various system components are shown on the drawings. Other components and
accessories deemed necessary and essential for system operation and integration
which are not shown on drawings are deemed essential and integral part of the
design intent which should be included in the contractor submitted solution to
achieve end to end fully functional integrated system.
C All notes on the drawings are integral part of the contract document and must be
read in conjunction with all design package documents (specification ,BOQs...etc)
The following general requirements shall be fulfilled in the provided system. Bidders
shall state clearly any deviations/omissions or additions from the desired
specifications, drawings and BOQs. Such deviations-If Exist- must be assessed and
approved by the Design Engineer.
A Workstation Software:
B Controller software:
a. Monitoring inputs.
b. Controlling outputs.
c. Automatically reporting alarms to the Central Station.
d. Reporting of sensor and output status to Central Station on request.
e. Maintaining real time, automatically updated by the Central Station at
least once a day.
f. Communicating with the Central Station.
g. Executing Controller resident programs.
h. Diagnosing.
i. Downloading and uploading data to and from the Central Station.
1. Controllers shall transmit alarms, status changes, and other data to the System
Servers/Central Station when communications circuits are operable. If
communications are not available, Controllers shall function in a stand-alone
mode and operational data, including the status and alarm data normally
transmitted to the Central Station, shall be stored for later transmission to the
Central Station. Storage capacity for the latest 1000 events shall be provided
at each Controller.
2. Card-reader ports ofa Controller shall be custom configurable for at least 120
different card-reader. Multiple readerformats may be used simultaneously at
different Controllers or within the same Controller.
3. Controllers shall provide a response to card-readers in less than 0.25 seconds,
regardless of system size.
4. Initial Startup: When Controllers are brought on-line, database parameters
shall be automatically downloaded to them. After initial download is
completed, only database changes shall be downloaded to each Controller.
5. Failure Mode: On failure for any reason, Controllers shall perform an orderly
shutdown and force Controlleroutputs to a predetermined failure mode state,
consistent with the failure modes shown and the associated control device.
6. Startup after Power Failure: After power is restored, startup software shall
initiate self-test diagnostic routines, after which Controllers shall resume
normal operation.
7. Startup after Controller Failure: On failure, if the database and application
software are no longer resident, Controllers shall not restart, but shall remain
in the failure mode until repaired. If database and application programs are
D Communications Monitoring:
1. System shall monitor and report status of RS-485 communications loop of each
Location.
2. Communication status window shall display which Controllers are currently
communicating, a total count of missed polls since midnight, and which
Controller last missed a poll.
3. Communication status window shall show the type of CPU, the type of l/O
board, and the amount of RAM memory for each Control ler.
E PC-to-Controller Communications:
G Database Downloads:
H Operator Interface:
1. Inputs in system shall have two icon representations, one for the normal state
and one for the abnormal state.
2. When viewing and controlling inputs, displayed icons shall automatically
change to the proper icon to display the current system state in real time.
Icons shall also display the input's state, whether armed or bypassed, and if the
input is in the armed or bypassed state due to a time zone or a manual
command.
3. Outputs in system shall have two icon representations, one for the secure
(locked) state and one for the open (unlocked) state.
4. Icons displaying status of the l/O points shall be constantly updated to show
their current real-time condition without prompting by the operator.
5. The operator shall be able to scroll the list of I/0s and press the appropriate
toolbar button, or right click, to command the system to perform the desired
function.
6. Graphic maps or drawings containing inputs, outputs, and override groups
shall include the following:
a. Database to import and store full-color maps or drawings and allow for
input, output, and override group icons to be placed on maps.
b. Maps to provide real-time display animation and allow for control of
points assigned to them.
c. System to allow inputs, outputs, and override groups to be placed on
different maps.
d. Software to allow changing the order or priority in which maps will be
displayed.
Copy command in database shall allow for like data to be copied and then edited for
specific requirements, to reduce redundant data entry.
K Operator Commands:
m. Entry-Control Commands:
viii.Enable or disable cards or codes up to four times per day per en-
try point through access-level programming.
L Alarms:
1. System Setup:
2. Software Tamper:
3. Read access to system transcript files shall be reserved for operators with the
highest password authorization level available in system.
4. Animated Response Graphics: Highlight alarms with flashing icons on graphic
maps; display and constantly update the current status of alarm inputs and
outputs in real time through animated icons.
5. Alarm Handling: Each input may be configured so that an alarm cannot be
cleared unless it has returned to normal, with options of requiring the operator
to enter a comment about disposition of alarm. Allow operator to silence
alarm sound when alarm is acknowledged.
a. Displayed alarm data shall include type of alarm, location of alarm, and
secondary alarm messages.
b. Printed alarm data shall include type of alarm, location of alarm, date
and time (to nearest second) of occurrence, and operator responses.
c. Maps shall automatically display the alarm condition for each input
assigned to that map, if that option is selected for that input location.
d. Alarms initiate a status of "pending" and require the following two
handling steps by operators:
e. Each workstation shall display the total pending alarms and totaI
unresolved alarms.
f. Each alarm point shall be programmable to disallow the resolution of
alarms until the alarm point has returned to its normal state.
g. Alarms shall transmit to Central Station in real time, except for allowing
connection time for dial-up locations.
h. Once an alarm is acknowledged, the operator shall be prompted to
enter comments about the nature of the alarm and actions taken.
Operator's comments may be manually entered or selected from a
programmed predefined list, or a combination of both.
i. For locations where there are regular alarm occurrences, provide
programmed comments. Selecting that comment shall clear the alarm.
j. The time and name of the operator who acknowledged and resolved the
alarm shall be recorded in the database.
k. Identical alarms from same alarm point shall be acknowledged at same
time the operator acknowledges the first alarm. Identical alarms shall
be resolved when the first alarm is resolved.
I. Alarm functions shall have priority over downloading, retrieving, and
updating database from workstations and Controllers.
m. When a reader-controlled output (relay) is opened, the corresponding
alarm point shall be automatically bypassed.
8. Monitor Display: Display text and graphic maps that include zone status
integrated into the display. Colors are used for the various components and
current data.
9. Graphics:
a. Support 32,000 graphic display maps and allow import of maps from a
minimum of 16 standard formats from another drawing or graphics
program.
b. Allow I/O to be placed on graphic maps by the drag-and-drop method.
c. Operators shall be able to view the inputs, outputs, and the point's
name by moving the mouse cursor over the point on graphic map.
d. Inputs or outputs may be placed on multiple graphic maps. The
operator shall be able to toggle to view graphic map associated with
inputs or outputs.
e. Each graphic map shall have a display-order sequence number
associated with it to provide a predetermined order when toggled to
different views.
11. Anti-Passback:
a. System shall have global and local anti-passback features, selectable by
Location. System shall support hard and soft anti-passback.
b. Hard Anti-Passback: Once a credential holder is granted access through
a reader with one type of designation (IN or OUT), the credential holder
may not pass through that type of reader designation until the
credential holder passes through a reader of opposite designation.
c. Soft Anti-Passback: Should a violation of the proper IN or OUT sequence
occur, access shall be granted, but a unique alarm shall be transmitted
to the control station, reporting the credential holder and the door
involved in the violation. A separate report may be run on this event.
d. Timed Anti-Passback: A Controller capability that prevents an access
code from being used twice at the same device (door) within a user-
defined amount of time.
e. Provide four separate zones per Location that can operate without
requiring interaction with the host PC (done at Controller). Each reader
shall be assignable to one or all four anti-passback zones. In addition,
each anti-passback reader can be further designated as "Hard," "Soft,"
or "Timed" in each of the four anti-passback zones. The four anti-
passback zones shall operate independently.
f. The anti-passback schemes shall be definable for each individual door.
g. The Master Access Level shall override anti-passback.
h. System shall have the ability to forgive (or reset)an individual credential
holderorthe entire credential holder population anti-passback status to
a neutral status.
A The door controller shall be a fully standalone processor capable of making all access
control decisions without any involvement of host computer.
B The Contractor shall ensure that there is no loss of functionality in the event of
communications interruption. The relationship of door contact inputs, auxiliary
inputs and system alarms to relay outputs must be maintained at all times.
C Door control equipment shall be used to communicate with the computer digitally in
order to relay the captured data and to control the door lock.
Every door controller shall be securely mounted and shall have its own battery and
power supply to feed the internal electronics and the electronic lock as well. Door
controllers shall have the capacity to control and monitor the connected doors as
indicated on drawings.
E Each door controllers shall have power supply with sufficient capability to deliver
power to the devices including magnetic locks for each door connected to it. The
power supply shall in addition provide sufficient charge for two (approx.), standby
back-up batteries, which are to be included to provide a minimum of 60 minutes
operation. Additional power supplies shall be provided with the door interface
module for any locks which require an operational current in excess of that provided
by the standard door interface module power supply, and additional battery backup
shall be provided.
F To ensure the integrity of the system the Contractor shall ensure that if power to the
door controller is lost(both mains supply and back-up battery) then the controller’s
data must be maintained in non-volatile memory. If communications are interrupted
before power failure then all events must be maintained.
Intelligent Door control equipment shall be used to communicate with the computer
digitally in order to relay the captured data and to control the door lock. Every d oor
controller shall have its own battery and power supply to feed the internal
electronics and the electronic lock as well. Door controllers shall achieve the door
capacities shown in the drawings.
H The door controller must me provide with all necessary I/O Extension modules to
provide all necessary hardwired interfaces with other devices/systems.
The Door controller shall be supplied to incorporate all of the circuits required to
interface at doors location. Input circuits shall be provided to monitor door position,
status of door lock, command from the fire alarm system and reader and enclosure
tamper conditions. Outputs shall be provided to control the door lock and control
visual indicators associated with card readers.
Each Door controller shall have Input / output modules directly controlled by the
door controllers and shall be similar to the door interface modules, but shall have
only relay modules to accept input from external devices and to provide output to
external devices.
L All inputs shall be supervised. Each controller shall have supervised Tamper switch.
The contractor can use different controllers with different capacities to achieve the
required interlock function without any extra cost.
N The door controller shall report the following information to the management access
control server. These are:
1. Access granted.
2. Access denied.
3. Locked out.
4. Time open. Alarms after set time expired, time software-adjustable for each
door.
5. Unknown ID.
6. Visit time.
7. No Entry - Pass back.
8. No Exit - Pass back.
9. PIN reader duress; Incorrect PIN.
10. Entry/Exit out of hours.
11. Repeated key use.
12. Request for exit.
13. Request for entry.
14. Break-glass activation.
15. Door remaining open for too long a period
16. Power supply failed.
17. Power supply restored.
0 The door controller shall have features but not limited to the following:
A Supply and Install Proximity type Card Readers as shown on the drawings and as
described here. The card reader shall read the encoded data from the access card
and transmit the data back to the host panel, giving an audible and visual indication
of a properly read card.
B The card reader shall have a typical read range of 4" to 5.5" (10 - 14 cm), when used
with a proximity card.
C The card reader shall be a single piece unit, thin enough to be mounted onto a door
frame.
The card reader shall have built in green LED, red LED, and the audible indicator.
E The card reader shall have a hold line that will buffer a card read until the panel has
asserted that the information can be sent up line.
F The card reader shall have a re-present mode in which the card must be taken from
the reader field before being read again. This feature is required to eliminate
multiple reads from a single card presentation.
G The card reader shall be fully weatherized, and shall have an operating temperature
of (Oto 55 degrees Celsius), and an operating humidity of 5-95% non-condensing.
H The material and color of the card readers shall be approved by the arch.
L The voltage requirements of the card reader shall be 12 VDC feed from door
controller.
A Shall be used for double door type and take its power from door controller.
B It shall have holding force 300Kg and high protection degree(IP) not less than IP44.
Access Control System Page 24 of 30
Integrated Security Systems At Porto October Residential Compound
2.6 PUSH-BUTTON/REQUEST TO EXIT SWITCHES
A The door sensor (contact) shall consist of a reed contact switch and a permanent
magnet. The reed switch shall be activated by the permanent magnet.
B The reed switch shall be mounted in the door frame, and the permanent magnet
shall be mounted in the door itself.
C All door contacts shall be concealed such that the body of the contact shall be within
the fabric of the door and frame, and a flanged front plate shall be flush with the
door/frame edge.
D The door sensor(contact) shall have the following specifications but not limited to:
A The Contractor shall ensure that raising arm barriers are located at the positions
shown on the layout drawings to restrict entrance/exit from the facility site.
C The Contractor shall ensure that control of the barriers is via RFID readers (long range
type) located as indicated on drawings.
D RFID tag shall be provided for each car/bus, when a certain car/bus entire the
detection range for the reader, the tag will be detected and the access will be
allowed. Specified RFID tags will be provided for buses in order to raise both barriers
at the same time.
E All the raising arm barriers shall be backed up with cameras to capture events and
alarms.
F All power supplies feeding the barriers shall be the responsibility of the MEP Sub-
contractor and shall terminate in the main barrier housing.
The cabinet shall be of heavy duty all weather steel minimum 14 AWG with
polyethylene cover. The cover and door shall be removable to access the electrical
connection and control box.
H The mechanism to raise and lower arm by instant reversing electric motor, enclosed
speed reducer operated by self contained, plug in replaceable controller. The
mechanism shall be provided with slip clutch to prevent breakage if arm is forced,
and to permit manual operation if required.
Raising arm barriers shall comply with the following requirements as listed below:
The Contractor shall also supply and install conduit routes/ducting required to route
cabling from the readers to the barrier housing.
K Fixing frame with anchors to be casted in the concrete base provided with the
equipment.
A The loop vehicle detector system shall provide self-tuning electronic detector with
adjustable detection patterns, adjustable sensitivity and frequency sittings and panel
indicator light shall be able to detect presence or transit of a vehicle over an
embedded loop of wire. Provide number of loops consisting of multiple strands of
wire, number of turns, loop size, and method of placement at locations shown on
drawings, as recommended in writing by detection system manufacturerforfunction
indicated.
B The detection system shall consist of three components: a loop, loop extension cable
and a detector.
1. Recognize two vehicles within 150mm of each other on standard sized loop.
2. Recognize vehicle direction.
3. Generate reverse count if vehicle backs up after generating directional count
in forward direction.
4. Continuous diagnostic monitoring for intermittently operating and failed
loops.
5. The detection system shall be fully compatible with the raising arm barrier
system.
6. The Contractor shall provide safety loop vehicle detector system at each
barrier location as shown on the drawings. This shall include the cutting of the
road surface and repairs following the installation of the cabling.
A The radio frequency readers shall receive the transmissions from the communication
tags located on authorized car/bus windshield.
B The RFID reader detection range should be 6 meters (min). The contractor has to
ensure full coverage of the required areas.
The RFID readers shall time—stamp the messages received from the communication
tags & forward the information to the controller via the wired communication
network which shall use an industry standard communication network protocol.
D The RFID reader shall have unique ID on the communication network & their status
must be continuously supervised via the main computer to ensure high level of
security & equipment operation. Any failure of receiver operations shall be
instantaneously reported & generate alarm to the system.
F The readers shall be long range readers with proper shields to avoid multiple reader
activation which are installed in close proximity.
H The Final number and type of the RFID tags shall be as per client requirements.
PART 3 INSTALLATION
C Identify system components, wiring, cabling, boxes, panels and terminals. Comply
with requirements for system identification according to project operator
requirements.
G All System Cables should be LSZH produce no toxic gases in case of fire.
H Cables should be listed for the system specific application and installation
requirements
All wires and cables shall be listed and/or approved by a recognized testing agency &
System manufacturer through official letter supported with all necessary calculations,
documentations and testing certificates.
Embedded conduits shall be PVC and all exposed conduits shall be EMT conduit
K All wiring shall be color coded and cabled. Junction boxes shall be color coded and
include wiring identification numbering.
L Wires and cables shall provide sufficient resistance to the spread of fire and generate
no hazardous smoke to human life.
M Wiring System shall include all indoor and outdoor cables necessary for complete
system installations.
3.2 GROUNDING:
B System labelling scheme must be submitted to the End user for approval. Operator
teams labelling requirements should be considered.
E The system will be considered defective if it does not pass tests and inspections.
Maintenance Test and Inspection: Perform tests and inspections listed for weekly,
monthly, quarterly, and semi-annual periods. Use forms developed for initial tests
and inspections.
H Annual Test and Inspection: One year after date of Substantial Completion, test the
system complying with visual and testing inspection requirements. Use forms
developed for initial tests and inspections.
System manufacturer and his authorized, local representative shall provide, in depth,
system service on site training to selected Employer’s personnel for two weeks.
A Contractor shall coordinate to provide the necessary required power(DC &AC) for all
equipment after determining the manufacturer equipment exact part number and
hence submit any necessary modifications (if needed) according to selected
equipment manufacturer instructions.
B The System supplier shall be responsible for coordination and exchange information
with the Suppliers of other systems and equipment which shall communicate with, in
order to achieve the required specified functions and achieve the AHJ re quirements,
operator requirements and related international codes and standards. Contractor
must coordinate with all other MEP disciplines to perform all manual override and
systems reset and return to normal operation, a detailed document shall be
submitted for the engineer’s approval. This process is valid in all stages of the project.