Table of Content Access Control System: Installation

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 30

TABLE OF CONTENT

ACCESS CONTROL SYSTEM

Page
PART 1 INTRODUCTION 2
1.1 Scope 2
1.2 System Description 2
1.3 System lntegrator 4
1.4 References And Compliance 5
1.5 Abbreviations & Definitions : 5
1.6 Quality Assuranœ 5
1.7 Delivery ,Storage And Handling 6
1.8 Contractor Responsibility & Submittals 7
1.9 Software Service Agreement 11
1.10 Extra Materials 11
PART 2 PRODUCTS 12
2.1 General 12
2.2 System Software 12
2.3 Door Controller 21
2.4 Proximity Card Reader 23
2.5 Magnetic Door Lock 23
2.6 Push-Button/Request To Exit Switches 24
2.7 Door Sensor (Contact) 24
2.8 Raising Arm Barriers 24
2.9 Underground Loop Vehide Detector System 26
2.10 Long Range Radio Frequency Readers (Rfid) 26
2.11 System Workstation 27
2.12 System Servers 27
PART 3 INSTALLATION 27
3.1 Installation Of Basic Wiring System Materials 27
3.2 Grounding: 28
3.3 Field Quality Control 28
3.4 Coordination With Other Divisions 29

Access Control System Section 2813ŒI


Integrated Security Systems At Porto October Residential Compound (Prj. 2482) Page 1 of 29
SECTION 281300— ACCESS CONTROL SYSTEM

PART 1 INTRODUCTION

1.1 SCOPE

A This document provides the minimum technical specifications/ requirements for the
Access control System that shall be installed in the project as indicated in drawings
and relevant documents.

B Contractor is fully responsible for supplying, installing, testing, commissioning, put


into operation a complete Access control system as indicated in the drawings to
achieve system requirements indicated in related plans, risers, BOQ specifications
and all related contract documents including all necessary accessories to construct
fully functional end-to-end integrated system including-but not limited to-the
following:

1. Access Control Server


2. Printers
3. Workstation
4. Door controller
5. Request to exit button
6. Magnetic door locks
7. Door sensors
8. Proximity card readers
9. Barriers
10. Cable and conduits network
11. Integration with all other related systems as indicated in riser diagrams

1.2 system description

A The Access Control systems, which shall control access to apartment’s areas and give
alarm in case of unauthorized in order to achieve maximum-security in the selected
project areas. Alarm shall set also in case of leaving the door open more than an
adjustable time.

B The system shall be based on distributed architecture and TCP/IP protocols


connectivity using the project LAN network to link the main server with the field
controllers and workstations.

C The system shall be also used to provide Electronic Interlock between doors as
indicated on the drawings.

D The system will achieve maximum security in the project and allow monitoring the
activities in the covered areas through the Central Control Equipment.

E The LAN shall be used for communication between Server and door Controllers.

Access Control System Page 2 of 29


Integrated Security Systems At Porto October Residential Compound
F Door controllers shall be dedicated to each group of doors and shall be connected
with the magnetic door locks, request to exit and the door sensors.

G Communication of door controllers shall be done through the project LAN as


indicated on drawings.

H The access control system shall be provided to manage and control access of
personnel to areas and monitoring the emergency doors.

Push buttons shall be used to activate the door controllers to give command to door
locks to open.

This shall release the locking mechanism (Electric or Magnetic) and allow entry.

K Whenever a door, equipped with the system, is closed, it shall also be locked.
Automatic door closer shall be used to close the door after the person passing. The
main server shall constantly monitor the data concerning all door events and status
of all secured doors such as (open/close) and the status of all locks
(locked/unlocked). If the door is not closed or the door lock is not locked for any
reason, the control panels shall set the alarm.

L The unlocking of all doors can be activated manually from the main server or
automatically whenever receiving a signal from the fire alarm system in such a way
that the locking mechanisms are released in case of a fire.

M The system shall be supplied via the UPS. The door locks shall be released in case of
system power failure.

N All data (time of entering and exit, etc) corresponding to access activities and
emergency release shall be recorded. Main access control server shall be used to
program, operate, control and produce reports using a dedicated printer.

0 Special operating software under windows shall be used execute all functions of the
system for security purpose.

Alarm shall be set in several cases, in case of trial from unauthorized person to open
a door, trial from a person to open a door not the authorization time or days. Fault in
any of the system component, power failure, etc. shall report fault alarm. The system
should be self-diagnostic.

Q This means using networked type door controllers that work together as one system
(standalone), having sustained operation in case of failure of the main server.
Programming and monitoring shall be done using a dedicated workstation. Full
time/date, number based access control continues, using the intelligence in the local
controllers even if the main server is off line.

R Any unauthorized attempt shall trigger alarm on the WORKSTATION of the system.

S The main features of the system are as follows:

Access Control System Page 3 of 29


Integrated Security Systems At Porto October Residential Compound
1. PC-based programming
2. Ability to monitor multiple locations
3. Remote upload/download control
4. Stand-alone controllers

T The Access Control systems shall control access to the site in order to achieve
maximum-security in the selected project gates.

The system will achieve maximum security in the project and allow monitoring the
activities in the covered areas through the Central Control Equipment.

V For all outdoor installations all related system components must be Outdoor type IP
66

1.3 SYSTEM INTEGRATOR

A Contractor is responsible for assigning (at no extra cost) a system integrator


approved by the Engineer to integrate all ELV/ICT(Extra low voltage/lnformation and
Communication Technology) systems as required (which are referred to as light
current systems or low current systems).

B Integration should address the project integration requirements indicated in all


related documents including specifications, drawings, BOQ etc.

C Contractor/System integrator is responsible for providing all necessary Application


program interfaces and software development kits necessary to perform project
integration requirements.

D System installer shall coordinate with system integrator to perform all system
integration requirements.

E Project systems integrator should be nominated for the whole project to perform all
required interfaces between all ELV/ICT and related MEP , life safety and security
systems in terms of software and hardware.

F The systems integrator should approve all systems contractors technical material
submittals prior to submitting to the engineer for system approval

G The Engineer has the right to approve or reject the documents after assessing the
integration procedures followed in addition to the system compliance with this
specification.

H The Contractor / system Integrator is responsible for achieving all integration


requirements mentioned throughout the documents (specs and drawings) for the
project

Access Control System Page 4 of 29


Integrated Security Systems At Porto October Residential Compound
1.4 REFERENCES AND COMPLIANCE

A All works shall be performed in strict accordance with the drawings, specifications
and stipulations of the Local Building and safety Codes, TIA/EIA the National Fire
Protection Association (NFPA), International Electrical Commission (IEC) and other
related international standards

B Relevant Local Building Codes.

C Local Safety Standard

Standards of Local Authorities having jurisdiction

1. Electrical Component Standard: Provide work complying with applicable


requirements of NFPA70 "National Electrical Code"

E UL Compliance: Comply with requirements of UL50 and UL486A.

1. IEC Compliance: Comply with applicable requirement standards pertaining to


system and wiring
2. BICSI TDMM Manual Latest edition
3. Equal codes and standard could be accepted, which should be listed in detail
as an alternative. Such alternative standards shall be indicated in detail
together with their equivalent IEC, NFPA and UL. A copy of the approved
alternative standard shall be available for submittal upon request, free of
charge.

1.5 ABBREVIATIONS & DEFINITIONS :

A TGB: telecommunication grounding busbars

B TMGB: telecommunication main grounding busbar

C LSZH: Low smokes zero halogen

ELV/ICT: Extra Low Voltage /lnformation and Communication Technology


(systems (which are referred to as light current systems or low current systems).

E SDK : Software Development Kit

F API : Application Program Interface

1.6 QUALITY ASSURANCE

A Manufacturer Qualifications: Manufacturing firms of Access control system shall be


regularly engaged in manufacturing of the systems of type, size and characteristics

Access Control System Page 5 of 29


Integrated Security Systems At Porto October Residential Compound
similar to those required by the Contract for this project and whose products have
been in satisfactory service in similar projects for not less than five (5) years.

B Installer & contractor Qualifications: Engage an experienced contractor who is a


factory-authorized sales and service representative to perform the work of this
section. The contractor firm shall have at least five (5) years of successful installation
experience of related systems similar to that required for this project.

C Training:

1. Engage a Manufacturer-authorized and trained service representative to train


the Employer's maintenance and operational personnel on procedures and
schedules for operating, adjusting, troubleshooting and servicing the system.
2. Local representative shall provide, in depth, equipment service and
programming on site training to selected Employer’s personnel for one week.
3. Training of maintenance, support and hardware teams including engineers,
supervisors and technician shall be in scope to ensure that all trainees who
completed the program shall be capable of operating and/or maintaining the
equipment, systems, software/hardwareand facilities furnished and installed
under this contract and to ensure a smooth transition between construction
and operations activities.
4. Maintenance training shall cover all on-site routine, preventive, and remedial
maintenance of the system/ subsystem.
5. Training manuals and technology training for all systems shall be in English
only, except operator familiarization training, which shall be provided in
English and Arabic.

Warranty: Provide warranty for the system for at least 2 years starting from the first
day of system handing over to the operation team.

E Licenses: The systems shall be provided with all necessary licenses and allow for any
future upgrade software /firmware. Online notifications should be included to allow
for any software versions upgrades according to service levelagreement with project
operator

F Source Limitations for the System and Components: Obtain all system components
from single source from single manufacturer. Any deviation must be supported with
documented reasons which shall be assessed and approved by the Engineer.

Electrical Components, Devices, and Accessories: Listed and labeled as defined in


related international codes and standards, by a qualified testing agency approved by
the Engineer, and marked for intended location and application.

1.7 DELIVERY,STORAGE AND HANDLING

A Deliver products in factory containers. Store in clean, dry, closed space in original
containers. Protect products from fumes. Handle very carefully to avoid shocks or
damage.

Access Control System Page 6 of 29


Integrated Security Systems At Porto October Residential Compound
B Software packages should be supplied in manufacturer sealed standard packages

C Inspection shall be performed in two stages, first time upon receiving the equipment,
devices and cables on site before storing and second time after installation according
to installation phases.

D Environmental Limitations: Do not deliver or install cables, devices and equipment


until wet work in spaces is complete and dry, and temporary HVAC system is
operating and maintaining ambient temperature and humidity conditions during the
remainder of the construction period.

E Do not install any software programs unless all necessary hardware


(servers/workstations) have been installed , tested and ready for any required
software installations.

1.8 CONTRACTOR RESPONSIBILITY & SUBMITTALS

A General: Submit the necessary complete sets of documentation indicating type, size,
rating, style, catalogue number, Manufacturers names, and/or catalogue data sheets
for all items to ensure compliance with specifications. This documentation shall be
subject to the approval of the Engineer and no equipment shall be ordered without
his approval for all equipment and devices, which are shown on documents
(drawings, specs ...etc). Any document submitted by the Contractor during the tender
stage shall not be considered as technical submittal, it shall be used only to approve
the manufacturer name. During technical submittalstage, Contractor shall submit all
required technical document for study and approval.

B Shop Drawings: Submit shop drawings & Composite drawings showing equipment,
device locations, labeling, part number and connecting wiring of the systems,
including riser diagrams. Shop drawings shall include, but not be limited to the
following:

1. Complete pin to pin one-line riserdiagram(s)showing all approved equipment,


size, type and number of all conductors, interconnection between the system
and all other related systems.
2. Installation details for all system components. Installation details drawings
shall show all accessories used in installation such as back boxes, glands,
washers, etc.
3. Complete Grounding details as per system manufacturer requirements.
Indicating connections with dedicated grounding system including connections
with telecommunication grounding bus bars as part of overall grounding and
bonding system including telecom main grounding bus bar.
4. Exact location of every single component of the system in coordination with all
other works (Electromechanical, Arch., and Civil).
5. Colored Composite drawings for all MEP systems showing all coordinated MEP
works

Access Control System Page 7 of 29


Integrated Security Systems At Porto October Residential Compound
6. Signature of all involved contractor engineers representing different disciplines
(Electromechanical, Arch, and Civil etc.) to confirm their approval of such
locations, installations and coordination.
7. Complete sequence of operations and functions of the system.
8. All drawings and technical material submittals should be submitted in both
softcopy and hardcopy formats .No of copies shall be according to contract
documents requirements (at least three copies shall be submitted)

C Material Submittal: shall include, but not be limited to, the following:

1. System integrator shall stamp and approve the system material submittal prior
to submitting to the Engineer.
2. Pin to pin connection diagram
3. Complete one-line riser diagram(s) showing all equipment and the size,
connections, type and number of all equipment
4. Include programming and installation manuals
5. Complete sequence of operations and functions of the system
6. Complete system wiring diagrams for components and interfaces to
equipment supplied by others
7. A listing of the manufacturer's authorized, local representative responsible for
installation, coordination and service
8. Compliance sheet item by item providing a comparison between each item
specifies each item submitted. Contractor must indicate clearly any deviations
from design & items specifications-if exists-indicating the reason of deviation.
Such deviations must be approved by the Design Engineer.
9. Detailed Technical Data sheets with highlighted part numbers must be
submitted.
10. BOQ in ECG Format complete with quantities and products part numbers.
11. Compliance sheet with project approved vendor list .Any deviations from the
project approved vendor list must be approved by the Design Engineer.

D Product Data: Submit Manufacturer's technical product data, including specifications


and installations foreach type of the system equipment. Include standard or typical
riser and wiring diagrams, operation and maintenance instructions for inclusion in
maintenance manuals.

1. Compliance sheet to the specification with cross reference to related items in


data sheet, point by point, indicating deviations — if any — reasons for such
deviations, also indicate any extra features / specifications.
2. Complete description data including UL listing or any equivalent standards for
all system components
3. Provide all system related calculations supported by manufacturer specific
software and perform all necessary calculations validating the shop drawing
system distribution and related installations.
4. Complete description of system operations and functions of each system
component.
5. Manufacturer's technical product data sheets, including quantities and
specifications of every item, specification of every device, system component,
quantities, software and installations for each unit of equipment.

Access Control System Page 8 of 29


Integrated Security Systems At Porto October Residential Compound
6. Contractor shall submit a list of the Manufacturer's authorized, local
representative responsible for installation coordination and service, pre
qualification for the system provider and installer.
7. Complete description and data including related standards for all system
components.
8. Documents indicating system expandability options included in the submitted
products and system included redundancy features.
9. Documents indicating that the supplied system components are the latest and
most updated products from the system manufacturer and software versions
are the latest produced by the system manufacturer.
10. Integration documents approved and stamped by overall project systems
integrator. Such documents should illustrate that the system will satisfy the
project system integrator requirements in terms of software interface
protocols and hardware interfaces to achieve fully interoperable systems.
11. All technical material submittals must be provided in both hard copy and soft
copy. The softcopy must allow for searching capabilities. The technical material
submittal will be rejected if the softcopy was not included.
12. Testing & commissioning procedures according to system manufacturer
requirements and calibration certificate for testing equipment
13. Contractor shall verify distance limitations imposed by communication
protocols prior to installations and submit this in a dedicated document with
the submittal

E Maintenance Data: Submit maintenance data and parts lists for each type of the
installed system including furnished specialties and accessories. Include this data,
product data, and shop drawings in maintenance manual; in accordance with
requirements of other relevant documentation.

F Instruction Manuals: The Contractor shall provide with the assistance of the
equipment manufacturer and its authorized, local representative. In addition, one
approved copy of the system submittal, complete operating instructions; pertinent
system orientation documents and system service.

G Delivery, Storage and Handling: Deliver products in factory original, unopened


containers. Store in clean, dry and shaded space in original containers. Handle
carefully to avoid damage.

H System Calculations: Provide all system related calculations supported by


manufacturer specific software and perform all necessary calculations validating the
shop drawing system distribution and related installations.

System supplier & Installer qualifications documents: System supplier & Installer
should submit the required certifications indicating that the system supplier and
installer company is certified from system manufacturer to perform all system
supplying, installations, testing and commissioning supported by system installers
CVs and related manufacturer certifications. The system supplier should be involved
in a strong relationship with system manufacturer with proven reference of similar
projects. The system supplier & installer should submit reference of similar projects

Access Control System Page 9 of 29


Integrated Security Systems At Porto October Residential Compound
and abide by all requirements in project documents (specifications, drawings ,BOQ
and method of measurements)

Composite Coordinated drawings : illustrating all MEP devices and equipment


.Contractor shall validate all system components power requirements and indicate
on drawings that all system power requirements have been coordinated with
electrical team.

K Working environment documents: indicating the working environment according to


system manufacturer regarding temperature and humidity are achieved and
coordinated with HVAC team.

L Finalized Reflected ceiling drawings: illustrating all works in the ceilings after
finalizing the coordination process.

M Testing & commissioning plan:

1. All testing procedures must be submitted for Engineer approval according to


manufacturer testing procedures

N Submit testing and commissioning procedures including required test equipment for
all of the system components as well as the overall system performance.

0 Testing devices calibration certificates.

Testing results shall be submitted in both soft and hard copies for 100% of the system
components. testing shall take place in the engineer presence .

Q Testing shall be performed under normal operation conditions for the building i.e in
the presence of ambient Electromagnetic interference sources.

R System components factory tests certificates should be submitted with field testing

S Close out documents :Required documents shall include but not limited to the
following :

1. As built drawings: During the construction of the system, the Contractor shall
put in writing all his remarks, during the progress of work, concerning any
suggested alterations from the shop drawings in wiring routes, locations of
equipment or devices which arise from coordination between the system and
other activities on related shop drawing plans. As built drawings and
documents shall include updating for all of the drawings, documents,
calculations, data sheets..etc previously submitted in shop drawing stage to
reflect what is exactly executed on site.
2. During executing the work and preparing the drawings, no execution of
alterations shall be allowed before receiving a written approval from the
Engineer.
3. All alterations shall be registered and filled by the Contractor and extra copies
shall be submitted to the involved parties (Engineer, Project Manager, Site,
etc.).

Access Control System Page 11 of 29


Integrated Security Systems At Porto October Residential Compound
4. Complete as-built draft set of Drawings and equipment schedules shall be
prepared fifteen (15) days after completion of work for the engineer’s
approval. The as built draft shall include all previously approved alterations
and technical data sheets of installed equipment, devices. etc. Final originals
and copies of the as-built Drawings shall be submitted in accordance with
Contract documents.
5. As built documents shall also include: Operation and maintenance manuals
including; updated data sheets for installed equipments, operation
instructions, programming procedures Electronic circuits for every device and
equipment, troubleshooting repair guide, and the required spare parts list for
5 years of operation, along with the circuit diagram. Selected spare parts shall
be provided without any extra cost.

1.9 Software Service Agreement

A Technical Support: Beginning with SubstantialCompletion, provide software support


for 2 years

B Upgrade Service: Update software to the latest version available at the Project
completion. Install and program software upgrades that become available within 2
years from date of Substantial Completion. Upgrading software shall include
operating system. Upgrade shall include new or revised licenses for using of
software.

C Provide 30 days' notice to Owner to allow scheduling and access to system and to
allow Owner to upgrade computer equipment if necessary.

System manufacturer must provide all necessary software development kits (SDKs)
necessary to perform all integration requirements.

E Contractor/System integrator must coordinate to handle all necessary SDKs ,APls to


achieve all necessary integration requirements.

1.10 EXTRA MATERIALS

A Furnish extra materials that match products installed —if-necessary-and that are
packaged with protective covering for storage and identified with labels describing
contents.

B The Contractor shall provide the suggested spare parts list for 2 years for operator &
Engineer approval and supply the approved spare parts as part of this contract.

C Spare parts lists shall be submitted within the technical submittal, at the shop
drawings stage and close out documents. The spare part list should be agreed with
project operator according to SLA (Service Level Agreement)

Access Control System Page 12 of 29


Integrated Security Systems At Porto October Residential Compound
PART 2 PRODUCTS

2.1 GENERAL

A The Access control system will be composed of the following items :

1. Access Control Server


2. Printers
3. Workstation
4. Door controller
5. Push Button
6. Magnetic door locks
7. Door sensors
8. Proximity card readers
9. Barriers
10. Cable and conduits network
11. Integration with all other related systems as indicated in riser diagrams

B The above components shall be provided with the appropriate numbers and
capacities to serve the whole project and achieve the design intent. The locations of
various system components are shown on the drawings. Other components and
accessories deemed necessary and essential for system operation and integration
which are not shown on drawings are deemed essential and integral part of the
design intent which should be included in the contractor submitted solution to
achieve end to end fully functional integrated system.

C All notes on the drawings are integral part of the contract document and must be
read in conjunction with all design package documents (specification ,BOQs...etc)

The following general requirements shall be fulfilled in the provided system. Bidders
shall state clearly any deviations/omissions or additions from the desired
specifications, drawings and BOQs. Such deviations-If Exist- must be assessed and
approved by the Design Engineer.

2.2 System software

A Workstation Software:

1. Password levels shall be individually customized at each workstation to allow


or disallow operator access to program functions for each Location.
2. Workstation event filtering shall allow user to define events and alarms that
will be displayed at each workstation. If an alarm is unacknowledged (not
handled by another workstation) for a preset amount of time, the alarm will
automatically appear on the filtered workstation.

B Controller software:

Access Control System Page 13 of 29


Integrated Security Systems At Porto October Residential Compound
1. Controllers shall operate as an autonomous intelligent processing unit.
Controllers shall make decisions about access control, alarm monitoring,
linking functions, and door locking schedules for its operation, independent of
other system components. Controllers shall be part of a fully distributed
processing control network. The portion of the database associated with a
Controller and consisting of parameters, constraints, and the latest value or
status of points connected to that Controller, shall be maintained in the
Controller.
2. Functions: The following functions shall be fully implemented and operational
within each Controller:

a. Monitoring inputs.
b. Controlling outputs.
c. Automatically reporting alarms to the Central Station.
d. Reporting of sensor and output status to Central Station on request.
e. Maintaining real time, automatically updated by the Central Station at
least once a day.
f. Communicating with the Central Station.
g. Executing Controller resident programs.
h. Diagnosing.
i. Downloading and uploading data to and from the Central Station.

C Individual Controller Operation:

1. Controllers shall transmit alarms, status changes, and other data to the System
Servers/Central Station when communications circuits are operable. If
communications are not available, Controllers shall function in a stand-alone
mode and operational data, including the status and alarm data normally
transmitted to the Central Station, shall be stored for later transmission to the
Central Station. Storage capacity for the latest 1000 events shall be provided
at each Controller.
2. Card-reader ports ofa Controller shall be custom configurable for at least 120
different card-reader. Multiple readerformats may be used simultaneously at
different Controllers or within the same Controller.
3. Controllers shall provide a response to card-readers in less than 0.25 seconds,
regardless of system size.
4. Initial Startup: When Controllers are brought on-line, database parameters
shall be automatically downloaded to them. After initial download is
completed, only database changes shall be downloaded to each Controller.
5. Failure Mode: On failure for any reason, Controllers shall perform an orderly
shutdown and force Controlleroutputs to a predetermined failure mode state,
consistent with the failure modes shown and the associated control device.
6. Startup after Power Failure: After power is restored, startup software shall
initiate self-test diagnostic routines, after which Controllers shall resume
normal operation.
7. Startup after Controller Failure: On failure, if the database and application
software are no longer resident, Controllers shall not restart, but shall remain
in the failure mode until repaired. If database and application programs are

Access Control System Page 14 of 29


Integrated Security Systems At Porto October Residential Compound
resident, Controllers shall immediately resume operation. If not, software
shall be restored automatically from the Central Station.

D Communications Monitoring:

1. System shall monitor and report status of RS-485 communications loop of each
Location.
2. Communication status window shall display which Controllers are currently
communicating, a total count of missed polls since midnight, and which
Controller last missed a poll.
3. Communication status window shall show the type of CPU, the type of l/O
board, and the amount of RAM memory for each Control ler.

a. Operating systems shall include areal-time clock function that maintains


seconds, minutes, hours, day, date, and month. The real-time clock shall
be automatically synchronized with the Central Station at least once a
day to plus or minus 10 seconds. The time synchronization shall be
automatic, without operator action and without requiring system
shutdown.

E PC-to-Controller Communications:

1. Central-station or workstation communications shall use the following:


2. TCP/IP LAN network interface cards.
3. TCP/IP network interface card shall have an option to set the poll frequency
and message response time-out settings.
4. PC-to-Controller and Controller-to-Controller communications (TCP/IP) shall
use a polled-communication protocol that checks sum and acknowledges each
message. All communications shall be verified and buffered and retransmitted
if not acknowledged.

F Direct Serial or TCP/IP PC-to-Controller Communications:

1. Communication software on the PC shall supervise the PC-to-Controller


communications link.
2. Loss of communications to any Controller shall result in an alarm at all PCs
running the communications software.
3. When communications are restored, all buffered events shall automatically
upload to the PC, and any database changes shall be automatically sent to the
Controller.

G Database Downloads:

1. All data transmissions from PCs to a Location, and between Controllers at a


Location, shall include a complete database checksum to check the integrity of
the transmission. If the data checksum does not match, a full data download
shall be automatically retransmitted.
2. Ifa Controller is reset for any reason, it shall automatically request and receive
a database download from the PC. The download shall restore data stored at

Access Control System Page 15 of 29


Integrated Security Systems At Porto October Residential Compound
the Controller to their normal working state and shall take place with no
operator intervention.
3. Software shall provide for setting downloads via dial-up connection to once
per 24-hour period, with time selected by the operator.

H Operator Interface:

1. Inputs in system shall have two icon representations, one for the normal state
and one for the abnormal state.
2. When viewing and controlling inputs, displayed icons shall automatically
change to the proper icon to display the current system state in real time.
Icons shall also display the input's state, whether armed or bypassed, and if the
input is in the armed or bypassed state due to a time zone or a manual
command.
3. Outputs in system shall have two icon representations, one for the secure
(locked) state and one for the open (unlocked) state.
4. Icons displaying status of the l/O points shall be constantly updated to show
their current real-time condition without prompting by the operator.
5. The operator shall be able to scroll the list of I/0s and press the appropriate
toolbar button, or right click, to command the system to perform the desired
function.
6. Graphic maps or drawings containing inputs, outputs, and override groups
shall include the following:

a. Database to import and store full-color maps or drawings and allow for
input, output, and override group icons to be placed on maps.
b. Maps to provide real-time display animation and allow for control of
points assigned to them.
c. System to allow inputs, outputs, and override groups to be placed on
different maps.
d. Software to allow changing the order or priority in which maps will be
displayed.

Copy command in database shall allow for like data to be copied and then edited for
specific requirements, to reduce redundant data entry.

Operator Access Control:

1. Control operator access to system controls through three password-protected


operator levels. System operators and managers with appropriate password
clearances shall be able to change operator levels for operators.
2. Three successive attempts by an operator to execute functions beyond their
defined level during a 24-hour period shall initiate a software tamper alarm.
3. A minimum of 32 passwords shall be available with the system software.
System shall display the operator's name or initials in the console's first field.
System shall print the operator's name or initials, action, date, and time on the
system printer at login and logoff.
4. The password shall not be displayed or printed.
5. Each password shall be definable and assignable for the following:

Access Control System Page 16 of 29


Integrated Security Systems At Porto October Residential Compound
a. Commands usable.
b. Access to system software.
c. Access to application software.
d. Individual zones that are to be accessed.
e. Access to database.

K Operator Commands:

1. Command Input: Plain-language words and acronyms shall allow operators to


use the system without extensive training or data-processing backgrounds.
System prompts shall be a word, a phrase, or an acronym.
2. Command inputs shall be acknowledged and processing shall start in not less
than 1 second(s).
3. Tasks that are executed by operator's commands shall include the following:

a. Acknowledge Alarms: Used to acknowledge that the operator has


observed the alarm message.
b. Place Zone in Access: Used to remotely disable intrusion alarm circuits
emanating from a specific zone. System shall be structured so that
console operator cannot disable tamper circuits.
c. Place Zone in Secure: Used to remotely activate intrusion alarm circuits
emanating from a specific zone.
d. System Test: Allows the operator to initiate a system-wide operational
test.
e. Zone Test: Allows the operator to initiate an operational test for a
specific zone.
f. Print reports.
g. Change Operator: Used for changing operators.
h. Security Lighting Controls: Allows the operator to remotely turn on/off
security lights.
i. Display Graphics: Used to display any graphic displays implemented in
the system. Graphic displays shall be completed within 20 seconds from
time of operator command.
j. Run system tests.
k. Generate and format reports.
I. Request help with the system operation.

i. Include in main menus.


ii. Provide unique, descriptive, context-sensitive help for selections
and functions with the press of one function key.
iii. Provide navigation to specific topic from within the first help win-
dow.
iv. Help shall be accessible outside the applications program.

m. Entry-Control Commands:

Access Control System Page 17 of 29


Integrated Security Systems At Porto October Residential Compound
v. Lock (secure) or unlock(open) each controlled entry and exit upto
four times a day through time-zone programming.

vi. Arm or disarm each monitored input up to four times a day


through time-zone programming.

vii. Enable or disable readers or keypads up to twice a day through


time-zone programming.

viii.Enable or disable cards or codes up to four times per day per en-
try point through access-level programming.

4. Command Input Errors: Show operator input assistance when a command


cannot be executed because of operator input errors. Assistance screen shall
use plain-language words and phrases to explain why the command cannot be
executed. Error responses that require an operator to look up a code in a
manual or other document are not acceptable. Conditions causing operator
assistance messages include the following:

a. Command entered is incorrect or incomplete.


b. Operator is restricted from using that command.
c. Command addresses a point that is disabled or out of service.
d. Command addresses a point that does not exist.
e. Command is outside the system’s capacity.

L Alarms:

1. System Setup:

a. Assign manual and automatic responses to incoming point status change


or alarms.
b. Automatically respond to input with a link to other inputs, outputs,
operator-response plans, unique sound with use of WAV files, and maps
or images that graphically represent the point location.
c. 60-character message field for each alarm.
d. Operator-response-action messages shall allow message length of at
least 65,000 characters, with database storage capacity of up to 32,000
messages. Setup shall assign messages to access point, zone,
sensor,...etc
e. Secondary messages shall be assignable by the operator for printing to
provide further information and shall be editable by the operator.
f. Allow 25 secondary messages with a field of 4 lines of 60 characters
each.
g. Store the most recent 1000 alarms for recall by the operator using the
report generator.

2. Software Tamper:

Access Control System Page 18 of 29


Integrated Security Systems At Porto October Residential Compound
a. Annunciate a tamper alarm when unauthorized changes to system
database files are attempted. Three consecutive unsuccessful attempts
to log onto system shall generate a software tamper alarm.
b. Annunciate a software tamper alarm when an operator or other
individual makes three consecutive unsuccessful attempts to invoke
functions beyond their authorization level.
c. Maintain a transcript file of the last 5000 commands entered at the each
Central Station to serve as an audit trail. System shall not allow write
access to system transcript files by any person, regardless of their
authorization level.
d. Allow only acknowledgment of software tamper alarms.

3. Read access to system transcript files shall be reserved for operators with the
highest password authorization level available in system.
4. Animated Response Graphics: Highlight alarms with flashing icons on graphic
maps; display and constantly update the current status of alarm inputs and
outputs in real time through animated icons.
5. Alarm Handling: Each input may be configured so that an alarm cannot be
cleared unless it has returned to normal, with options of requiring the operator
to enter a comment about disposition of alarm. Allow operator to silence
alarm sound when alarm is acknowledged.

6. Alarm Automation Interface: High-level interface to Central Station alarm


automation software systems. Allows input alarms to be passed to and
handled by automation systems in the same manner as burglar alarms, using
an RS-232 ASCII interface.
7. Alarm Monitoring: Monitor sensors, Controllers, and DTS circuits and notify
the operators of an alarm condition. Display higher-priority alarms first and,
within alarm priorities, display the oldest unacknowledged alarm first.
Operator acknowledgment of one alarm shall not be considered
acknowledgment of other alarms nor shall it inhibit reporting of subsequent
alarms.

a. Displayed alarm data shall include type of alarm, location of alarm, and
secondary alarm messages.
b. Printed alarm data shall include type of alarm, location of alarm, date
and time (to nearest second) of occurrence, and operator responses.
c. Maps shall automatically display the alarm condition for each input
assigned to that map, if that option is selected for that input location.
d. Alarms initiate a status of "pending" and require the following two
handling steps by operators:

Access Control System Page 19 of 29


Integrated Security Systems At Porto October Residential Compound
i. First Operator Step: "Acknowledged." This action shall silence
sounds associated with the alarm. The alarm remains in the sys-
tem "Acknowledged" but "Un-Resolved."

ii. Second Operator Step: Operators enter the resolution or opera-


tor comment, giving the disposition of the alarm event. The alarm
shall then clear.

e. Each workstation shall display the total pending alarms and totaI
unresolved alarms.
f. Each alarm point shall be programmable to disallow the resolution of
alarms until the alarm point has returned to its normal state.
g. Alarms shall transmit to Central Station in real time, except for allowing
connection time for dial-up locations.
h. Once an alarm is acknowledged, the operator shall be prompted to
enter comments about the nature of the alarm and actions taken.
Operator's comments may be manually entered or selected from a
programmed predefined list, or a combination of both.
i. For locations where there are regular alarm occurrences, provide
programmed comments. Selecting that comment shall clear the alarm.
j. The time and name of the operator who acknowledged and resolved the
alarm shall be recorded in the database.
k. Identical alarms from same alarm point shall be acknowledged at same
time the operator acknowledges the first alarm. Identical alarms shall
be resolved when the first alarm is resolved.
I. Alarm functions shall have priority over downloading, retrieving, and
updating database from workstations and Controllers.
m. When a reader-controlled output (relay) is opened, the corresponding
alarm point shall be automatically bypassed.

8. Monitor Display: Display text and graphic maps that include zone status
integrated into the display. Colors are used for the various components and
current data.
9. Graphics:
a. Support 32,000 graphic display maps and allow import of maps from a
minimum of 16 standard formats from another drawing or graphics
program.
b. Allow I/O to be placed on graphic maps by the drag-and-drop method.
c. Operators shall be able to view the inputs, outputs, and the point's
name by moving the mouse cursor over the point on graphic map.
d. Inputs or outputs may be placed on multiple graphic maps. The
operator shall be able to toggle to view graphic map associated with
inputs or outputs.
e. Each graphic map shall have a display-order sequence number
associated with it to provide a predetermined order when toggled to
different views.

10. Report Generator Software: Include commands to generate reports for


displaying, printing, and storing on disk and tape. Reports shall be stored by

Access Control System Page 20 of 29


Integrated Security Systems At Porto October Residential Compound
type, date, and time. Report printing shall be the lowest priority activity.
Report generation mode shall be operator selectable but set up initially as
periodic, automatic, or on request. Include time and date printed and the
name of operatorgenerating the report. Report formats may be configured by
operators.

11. Anti-Passback:
a. System shall have global and local anti-passback features, selectable by
Location. System shall support hard and soft anti-passback.
b. Hard Anti-Passback: Once a credential holder is granted access through
a reader with one type of designation (IN or OUT), the credential holder
may not pass through that type of reader designation until the
credential holder passes through a reader of opposite designation.
c. Soft Anti-Passback: Should a violation of the proper IN or OUT sequence
occur, access shall be granted, but a unique alarm shall be transmitted
to the control station, reporting the credential holder and the door
involved in the violation. A separate report may be run on this event.
d. Timed Anti-Passback: A Controller capability that prevents an access
code from being used twice at the same device (door) within a user-
defined amount of time.
e. Provide four separate zones per Location that can operate without
requiring interaction with the host PC (done at Controller). Each reader
shall be assignable to one or all four anti-passback zones. In addition,
each anti-passback reader can be further designated as "Hard," "Soft,"
or "Timed" in each of the four anti-passback zones. The four anti-
passback zones shall operate independently.
f. The anti-passback schemes shall be definable for each individual door.
g. The Master Access Level shall override anti-passback.
h. System shall have the ability to forgive (or reset)an individual credential
holderorthe entire credential holder population anti-passback status to
a neutral status.

12. Visitor Assignment:


a. Provide for and allow an operator to be restricted to only working with
visitors. The visitor badging subsystem shall assign credentials and
enroll visitors. Allow only access levels that have been designated as
approved for visitors.
b. Provide an automated log of visitor name, time and doors accessed, and
whom visitor contacted.
c. Allow a visitor designation to be assigned to a credential holder.
d. Security access system shall be able to restrict the access levels that may
be assigned to credentials that are issued to visitors.
e. Allow operator to recall visitors' credential holder file, once a visitor is
enrolled in the system.
f. The operator may designate any reader as one that deactivates the
credential after use at that reader. The history log shall show the return
of the credential.
g. System shall have the ability to use the visitor designation in searches
and reports. Reports shall be able to print all or any visitor activity.

Access Control System Page 21 of 30


Integrated Security Systems At Porto October Residential Compound
2.3 DOOR CONTROLLER

A The door controller shall be a fully standalone processor capable of making all access
control decisions without any involvement of host computer.

B The Contractor shall ensure that there is no loss of functionality in the event of
communications interruption. The relationship of door contact inputs, auxiliary
inputs and system alarms to relay outputs must be maintained at all times.

C Door control equipment shall be used to communicate with the computer digitally in
order to relay the captured data and to control the door lock.

Every door controller shall be securely mounted and shall have its own battery and
power supply to feed the internal electronics and the electronic lock as well. Door
controllers shall have the capacity to control and monitor the connected doors as
indicated on drawings.

E Each door controllers shall have power supply with sufficient capability to deliver
power to the devices including magnetic locks for each door connected to it. The
power supply shall in addition provide sufficient charge for two (approx.), standby
back-up batteries, which are to be included to provide a minimum of 60 minutes
operation. Additional power supplies shall be provided with the door interface
module for any locks which require an operational current in excess of that provided
by the standard door interface module power supply, and additional battery backup
shall be provided.

F To ensure the integrity of the system the Contractor shall ensure that if power to the
door controller is lost(both mains supply and back-up battery) then the controller’s
data must be maintained in non-volatile memory. If communications are interrupted
before power failure then all events must be maintained.

Intelligent Door control equipment shall be used to communicate with the computer
digitally in order to relay the captured data and to control the door lock. Every d oor
controller shall have its own battery and power supply to feed the internal
electronics and the electronic lock as well. Door controllers shall achieve the door
capacities shown in the drawings.

H The door controller must me provide with all necessary I/O Extension modules to
provide all necessary hardwired interfaces with other devices/systems.

The Door controller shall be supplied to incorporate all of the circuits required to
interface at doors location. Input circuits shall be provided to monitor door position,
status of door lock, command from the fire alarm system and reader and enclosure
tamper conditions. Outputs shall be provided to control the door lock and control
visual indicators associated with card readers.

Each Door controller shall have Input / output modules directly controlled by the
door controllers and shall be similar to the door interface modules, but shall have
only relay modules to accept input from external devices and to provide output to
external devices.

Access Control System Page 22 of 30


Integrated Security Systems At Porto October Residential Compound
K Each Door controller should have a hardwire link (volt-free contact) from the fire
alarm system. The door controller should have a minimum of four auxiliary output
relays. These relays shall be programmed via the workstation administration system
to respond to auxiliary inputs or door controller alarms. Each relay may be operated
according to a time profile.

L All inputs shall be supervised. Each controller shall have supervised Tamper switch.
The contractor can use different controllers with different capacities to achieve the
required interlock function without any extra cost.

M Door controllers AC system shall be supplied through an emergency power supply.


Emergency power supply shall be capable to keep the system fully operating for 24
hours. Batteries and battery chargers shall be supplied with the system. The unit shall
be linked to the system through data network to import the printing data from the
database saved on the WORKSTATION.

N The door controller shall report the following information to the management access
control server. These are:

1. Access granted.
2. Access denied.
3. Locked out.
4. Time open. Alarms after set time expired, time software-adjustable for each
door.
5. Unknown ID.
6. Visit time.
7. No Entry - Pass back.
8. No Exit - Pass back.
9. PIN reader duress; Incorrect PIN.
10. Entry/Exit out of hours.
11. Repeated key use.
12. Request for exit.
13. Request for entry.
14. Break-glass activation.
15. Door remaining open for too long a period
16. Power supply failed.
17. Power supply restored.

0 The door controller shall have features but not limited to the following:

1. On-board Ethernet 10/100Base-T port.


2. 6 MB of available on-board, non-volatile flash memory.
3. I/O modules according to controlled doors.
4. Battery-backed, non-volatile storage of 10,000 events.
5. Status LEDs.
6. 2 dedicated inputs for tamper and power failure status.
7. 12 or 24 VDC input power.
8. 4 Form-C relay outputs, 5 A at 30VDC.

Access Control System Page 23 of 30


Integrated Security Systems At Porto October Residential Compound
9. Door contact supervision (open/closed) and push-button monitor for each
door.
10. Strike control and auxiliary output for each door.
11. Bicolor reader status LED support plus beeper control, or 2-wire LED support.
12. On-board regulator.

2.4 PROXIMITY CARD READER

A Supply and Install Proximity type Card Readers as shown on the drawings and as
described here. The card reader shall read the encoded data from the access card
and transmit the data back to the host panel, giving an audible and visual indication
of a properly read card.

B The card reader shall have a typical read range of 4" to 5.5" (10 - 14 cm), when used
with a proximity card.

C The card reader shall be a single piece unit, thin enough to be mounted onto a door
frame.

The card reader shall have built in green LED, red LED, and the audible indicator.

E The card reader shall have a hold line that will buffer a card read until the panel has
asserted that the information can be sent up line.

F The card reader shall have a re-present mode in which the card must be taken from
the reader field before being read again. This feature is required to eliminate
multiple reads from a single card presentation.

G The card reader shall be fully weatherized, and shall have an operating temperature
of (Oto 55 degrees Celsius), and an operating humidity of 5-95% non-condensing.

H The material and color of the card readers shall be approved by the arch.

The card reader shall transmit at a 125 kHz frequency.

The cable requirements of the card reader shall be as per manufacturer


recommendation.

K The card reader shall communicate in a Wiegand protocol interface, and be


compatible with all standard access control systems.

L The voltage requirements of the card reader shall be 12 VDC feed from door
controller.

2.5 MAGNETIC DOOR LOCK

A Shall be used for double door type and take its power from door controller.

B It shall have holding force 300Kg and high protection degree(IP) not less than IP44.
Access Control System Page 24 of 30
Integrated Security Systems At Porto October Residential Compound
2.6 PUSH-BUTTON/REQUEST TO EXIT SWITCHES

A Push-Button Switches: Momentary-contact back-lighted push buttons, with


stainless-steel switch enclosures.

1. Enclosures: Flush or surface mounting. Push buttons shall be suitableforflush


mounting in the switch enclosures.
2. Enclosures shall additionally be suitable for installation in the following
locations:

a. Indoors, controlled environment.


b. Indoors, uncontrolled environment.
c. Outdoors.

3. Power: Push-button switches shall be powered from their associated


Controller, using dc control.

2.7 DOOR SENSOR (CONTACT)

A The door sensor (contact) shall consist of a reed contact switch and a permanent
magnet. The reed switch shall be activated by the permanent magnet.

B The reed switch shall be mounted in the door frame, and the permanent magnet
shall be mounted in the door itself.

C All door contacts shall be concealed such that the body of the contact shall be within
the fabric of the door and frame, and a flanged front plate shall be flush with the
door/frame edge.

D The door sensor(contact) shall have the following specifications but not limited to:

1. Activation range (switching distance) 10 mm


2. Current rating not more than 75 mA at 24Vdc
3. Recessed mount suits the doors types
4. Two wire connection with min 3.5 m long cable.
5. All door contacts shall provide N/O and N/C clean contact alarm outputs plus
tamper alarm.
6. Door sensors will be supervised with end-of-line (EOL) resistors to indicate
alarm status.
7. The supervised input shall sense contact conditions of SAFE, ALARM, and
FAULT.

2.8 Raising Arm Barriers

A The Contractor shall ensure that raising arm barriers are located at the positions
shown on the layout drawings to restrict entrance/exit from the facility site.

Access Control System Page 25 of 30


Integrated Security Systems At Porto October Residential Compound
B The Access control equipment for the barriers shall be locate d as indicated on
drawings.

C The Contractor shall ensure that control of the barriers is via RFID readers (long range
type) located as indicated on drawings.

D RFID tag shall be provided for each car/bus, when a certain car/bus entire the
detection range for the reader, the tag will be detected and the access will be
allowed. Specified RFID tags will be provided for buses in order to raise both barriers
at the same time.

E All the raising arm barriers shall be backed up with cameras to capture events and
alarms.

F All power supplies feeding the barriers shall be the responsibility of the MEP Sub-
contractor and shall terminate in the main barrier housing.

The cabinet shall be of heavy duty all weather steel minimum 14 AWG with
polyethylene cover. The cover and door shall be removable to access the electrical
connection and control box.

H The mechanism to raise and lower arm by instant reversing electric motor, enclosed
speed reducer operated by self contained, plug in replaceable controller. The
mechanism shall be provided with slip clutch to prevent breakage if arm is forced,
and to permit manual operation if required.

Raising arm barriers shall comply with the following requirements as listed below:

1. Aluminum extrusion oval arm 100 mm height x 53 mm width.


2. Arm length 4-6 meters, The contractor shall be responsible to select the
suitable arm length according to lane width.
3. A rapid action torque motor c/w frequency converter ensuring progressive
accelerations and controlled decelerations, fora vibration-free movement and
enhanced protection of the mechanism.
4. Arm color white with red stripes.
5. Service cycle <6 sec opening - 6 sec closing.
6. Raise/lower console with power; up and down indicator lights in gate room.
7. Manual override pushbuttons for Raise/Lower functions located in the gate
room as indicated on drawings.
8. 240VAC 50Hz single phase operation.
9. Suitable for the outdoor environments with minimum Ingress Protection (IP
559).
10. Control via Access Control System (RFID readers).
11. Buried loop sensor for vehicle clear/gate close and lower blocker operation.

The Contractor shall also supply and install conduit routes/ducting required to route
cabling from the readers to the barrier housing.

K Fixing frame with anchors to be casted in the concrete base provided with the
equipment.

Access Control System Page 26 of 30


Integrated Security Systems At Porto October Residential Compound
2.9 Underground Loop Vehicle Detector System

A The loop vehicle detector system shall provide self-tuning electronic detector with
adjustable detection patterns, adjustable sensitivity and frequency sittings and panel
indicator light shall be able to detect presence or transit of a vehicle over an
embedded loop of wire. Provide number of loops consisting of multiple strands of
wire, number of turns, loop size, and method of placement at locations shown on
drawings, as recommended in writing by detection system manufacturerforfunction
indicated.

B The detection system shall consist of three components: a loop, loop extension cable
and a detector.

C The system shall be capable of the following:

1. Recognize two vehicles within 150mm of each other on standard sized loop.
2. Recognize vehicle direction.
3. Generate reverse count if vehicle backs up after generating directional count
in forward direction.
4. Continuous diagnostic monitoring for intermittently operating and failed
loops.
5. The detection system shall be fully compatible with the raising arm barrier
system.
6. The Contractor shall provide safety loop vehicle detector system at each
barrier location as shown on the drawings. This shall include the cutting of the
road surface and repairs following the installation of the cabling.

2.10 Long Range Radio Frequency Readers (RFID)

A The radio frequency readers shall receive the transmissions from the communication
tags located on authorized car/bus windshield.

B The RFID reader detection range should be 6 meters (min). The contractor has to
ensure full coverage of the required areas.

The RFID readers shall time—stamp the messages received from the communication
tags & forward the information to the controller via the wired communication
network which shall use an industry standard communication network protocol.

D The RFID reader shall have unique ID on the communication network & their status
must be continuously supervised via the main computer to ensure high level of
security & equipment operation. Any failure of receiver operations shall be
instantaneously reported & generate alarm to the system.

E The receivers shall be microprocessor.

F The readers shall be long range readers with proper shields to avoid multiple reader
activation which are installed in close proximity.

Access Control System Page 27 of 30


Integrated Security Systems At Porto October Residential Compound
G The Contractor shall ensure that the readers are mounted on all barriers as indicated
on drawings and interfaced with the Access Control System. The raising arm barrier
shall open with remote control or RFID tag attached on the car/bus approaches the
barrier.

H The Final number and type of the RFID tags shall be as per client requirements.

2.11 SYSTEM WORKSTATION

A The Contractor shall provide-according to system manufacturer requirements-


system operation and configuration workstations to operate the system locally and
remotely from any location on the network.The workstations hardware and software
specifications shall be according to the system manufacturer requirements to run
and operate the system management and configuration software and all equipment
to be the latest updated products at the time of system installation.

2.12 SYSTEM SERVERS

A The Contractor shall provide-according to system manufacturer requirements- server


complete with operating systems and required database interfaces software
according to project system integrator requirements .The software shall provide all
required system management, configuration and operation for the whole system
components .Server hardware and software specifications shall be according to the
system manufacturer requirements to run and operate the system management and
configuration software and all equipment to be the latest updated products at the
time of system installation

PART 3 INSTALLATION

3.1 INSTALLATION OF BASIC WIRING SYSTEM MATERIALS

A Install the system as indicated, in accordance with equipment manufacturer's written


instructions (official installation manuals) and complying with applicable local
standards of installation. Installation of equipment and devices that pertain to other
Works of the Contract shall be closely coordinated with the appropriate trades.

B Pulling Cable: Do not exceed manufacturer's recommended pulling tensions. Do not


install bruised, kinked, scored, deformed, or abraded cable. Do not splice cable
between normal termination points. Remove and discard cable where damaged
during installation and replace it with new cable.

C Identify system components, wiring, cabling, boxes, panels and terminals. Comply
with requirements for system identification according to project operator
requirements.

Access Control System Page 28 of 30


Integrated Security Systems At Porto October Residential Compound
D System Labeling scheme must be submitted to the End user project operator for
approval. Operator teams labeling requirements should be considered.

E Install framed operation instructions in visible locations as required.

F As recommended by manufacturers & any specific Operator standards, unless more


stringent requirements are indicated. Ground equipment and conductors to
eliminateshock hazard and to minimize ground loops, common-mode returns, noise
pickup, cross talk, and other impairments. Install Grounding system in complete
accordance with system manufacturer requirements and BICSI TDMM manual
instructions.

G All System Cables should be LSZH produce no toxic gases in case of fire.

H Cables should be listed for the system specific application and installation
requirements

All wires and cables shall be listed and/or approved by a recognized testing agency &
System manufacturer through official letter supported with all necessary calculations,
documentations and testing certificates.

Embedded conduits shall be PVC and all exposed conduits shall be EMT conduit

K All wiring shall be color coded and cabled. Junction boxes shall be color coded and
include wiring identification numbering.

L Wires and cables shall provide sufficient resistance to the spread of fire and generate
no hazardous smoke to human life.

M Wiring System shall include all indoor and outdoor cables necessary for complete
system installations.

3.2 GROUNDING:

A All grounding and bonding requirements mentioned in ANSI-J-STD-607-A/B for all


installations using TGBS and TGBMS Should be followed in complete accordance with
system manufacturergrounding requirements documents that should be included in
the technical material submittal.

1.2 SYSTEM LABELLING

B System labelling scheme must be submitted to the End user for approval. Operator
teams labelling requirements should be considered.

3.3 FIELD QUALITY CONTROL

A Contractor shall submit proposed required testing and commissioning procedures


according to Manufacturers requirements. For parameters and features that are
Access Control System Page 29 of 30
Integrated Security Systems At Porto October Residential Compound
factory tested all related certificates from the manufacturers and third party
organizations must be submitted for the End user Representative approval.

B Manufacturer's Field Service: Engage a factory-authorized service representative to


inspect, test, and adjust components, assemblies, and equipment installations,
including connections.

C Visual Inspection: Conduct visual inspection prior to testing.

Reacceptance Testing: Perform reacceptance testing to verify the proper operation


of added or replaced devices and appliances.

E The system will be considered defective if it does not pass tests and inspections.

F Prepare test and inspection reports.

Maintenance Test and Inspection: Perform tests and inspections listed for weekly,
monthly, quarterly, and semi-annual periods. Use forms developed for initial tests
and inspections.

H Annual Test and Inspection: One year after date of Substantial Completion, test the
system complying with visual and testing inspection requirements. Use forms
developed for initial tests and inspections.

Engage a factory-authorized service representative to train end user maintenance


personnel to adjust, operate, and maintain the system.

System manufacturer and his authorized, local representative shall provide, in depth,
system service on site training to selected Employer’s personnel for two weeks.

3.4 COORDINATION WITH OTHER DIVISIONS

A Contractor shall coordinate to provide the necessary required power(DC &AC) for all
equipment after determining the manufacturer equipment exact part number and
hence submit any necessary modifications (if needed) according to selected
equipment manufacturer instructions.

B The System supplier shall be responsible for coordination and exchange information
with the Suppliers of other systems and equipment which shall communicate with, in
order to achieve the required specified functions and achieve the AHJ re quirements,
operator requirements and related international codes and standards. Contractor
must coordinate with all other MEP disciplines to perform all manual override and
systems reset and return to normal operation, a detailed document shall be
submitted for the engineer’s approval. This process is valid in all stages of the project.

C A detailed integration document —approved and stamped by project system


integrator-must be submitted illustrating all integration issues and how they are
addressed in the submittal to achieve all interfacing requirements.

Access Control System Page 30 of 30


Integrated Security Systems At Porto October Residential Compound
Access Control System Page 31 of 30
Integrated Security Systems At Porto October Residential Compound

You might also like