Download as pdf or txt
Download as pdf or txt
You are on page 1of 20

SECTION 16785 – ACCESS CONTROL AND INTRUSION MARINA 101 – MARSA DUBAI

SECTION 16785 - ACCESS CONTROL & INTRUSION

PART 1- GENERAL

1.1 OVERVIEW

The work as detailed in this Specification shall comprise the whole materials and labor and
necessary interface to form a complete security system.
The main system components are:
a) Access Control System (ACS)
c) Intruder Detection System (IDS).

1.2 STANDARDS AND REGULATIONS

A. Electrical Wiring:

The electrical system shall be installed in accordance with BS 7671 (The 16th Edition of the
IEE Wiring Regulations for Electrical Installations).

B. Electromagnetic Interference/Lightning Suppression:

All equipment shall be supplied in accordance with the requirements of the European
Community Directive on Electromagnetic Compatibility (EMC) 89/336/EEC in conjunction
with all related and product specific harmonized documents covering equipment to be
installed. Proof of compliance shall be submitted.

Equipment offered shall also comply with and bear confirmatory "CE" markings for the
following:

- European Low Power Directive (all Mains powered items) - EN 60950.


- Electro Magnetic Compatibility - Generic Emissions Part I - EN 50081-1.
- Electro Magnetic Compatibility - Generic Emissions Part II - EN 50081-2.
- Electro Magnetic Compatibility Generic Immunity Standard - EN 50082.
- Limits and Methods of Measurement of Radio Interference Characteristics of Information
Technology Equipment - EN 55022.

Jun 2007 SDT International page 1of 20


SECTION 16785 – ACCESS CONTROL AND INTRUSION MARINA 101 – MARSA DUBAI

Lightning/Surge protection shall be provided by means of surge suppresser to both signal and
power networks serving any equipment that may be vulnerable to voltage transients. This shall
include interconnecting cables to external devices. All surge suppression devices shall be
located as close as is practicable to the point of entry to the building, or, if applicable,
adjacent/within the enclosure at which transmission media change from copper to fiber optic.

The equipment manufacturers' instructions and recommendations shall be observed in


applying the protection.

C. Security Industry and Quality Standards:

The installation shall generally comply where applicable with the recommendations and
requirements of BS 4737, BS 7807, BS 5979, NACOSS NACP 1, 2, 3, 4, 5, 11, 20 and 30
(together with other documents referenced by them), unless more onerous requirements are
specified herein, in which case the requirements of this specification shall take precedence.

These standards shall only apply where local equivalent standards are not in existence, if local
standards are in place then they shall take precedence.

In addition, the Security Contractor shall, where appropriate, comply with:

- BS EN 50132-7:1996 "Alarm Systems - CCTV Surveillance Systems for Use in Security


Applications – Part 7 Application Guidelines".

- BS 7958:1999 "Closed Circuit Television (CCTV) Management and Operations - Code of


Practice".

1.3 DESIGN AIM

Risk mitigation will be accomplished using a combination of physical, electronic and active
security resources. As far as possible and practicable, the purpose of the security systems is to
provide:

- General and particular surveillance of designated internal and external areas to assist in
alarm verification and in the overall management of the building and areas immediately
adjacent to it.

- Vehicle entry control to the service and parking areas.

- A safe and secure environment for people living and working in or visiting the
development.

Jun 2007 SDT International page 2of 20


SECTION 16785 – ACCESS CONTROL AND INTRUSION MARINA 101 – MARSA DUBAI

- An effective response to any incident detected within the development.

- An effective 24 hour security installation to monitor and control vehicle and pedestrian
movements within the development.

- Access control on specified doors (internal and external) to segregate public from private
areas.

- The capability for later expansion of the systems used, such that other internal and external
areas may be monitored.

- A security system that is discreet, low profile and effective, and one which will have
minimal impact on day to day operations within the development.

- Provision for future landlord monitoring of individual tenant alarm systems.

PART 2 PRODUCTS

2.1 ACCESS CONTROL & ALARM MANAGEMENT REQUIREMENTS

A. Requirements

The Access Control System (ACS) requirement is for an on-line system that has intelligent
field units for the local processing of controlled door (or shutter/barrier) transactions, together
with monitoring and control capability via alarm input/control output circuits. The local
intelligent units report to a ‘head end’ server that provides alarm handling and display of ACS
and IDS warnings and which is the means by which the system is administered and
programmed.

The on-line equipment utilized shall be flexible and capable of upgrade to meet potential
changing deployment requirements. To help achieve this aim, the ACS system shall utilize
an IP network provided by the client. The properties of the network, and the network route.
Based on distributed intelligence, the system shall ensure that if communications between
server and Door Controllers (DCs) fail, then events are stored in the field units and are
automatically sent to the central server on resumption of communications.
During communications failures, the individual DCs shall operate autonomously, providing all
normal functions of card verification and door control.

The ACS software package shall cater initially for the minimum number of readers specified,
such that only additional field equipment and cabling is required to extend the ACS capability.

The following functions and facilities refer to the ACS/IDS requirement except where
specifically noted otherwise.

B. Servers, Workstations and Software Package (On-line System)

Jun 2007 SDT International page 3of 20


SECTION 16785 – ACCESS CONTROL AND INTRUSION MARINA 101 – MARSA DUBAI

1) Hardware

The server, and the PCs chosen for the Operator interface, shall be suitable for
24 hours/day, 365 days/year operation. The specification of the machines shall be chosen
according to the requirements of the system and software packages proposed.
Each PC display shall be a desk mounted TFT 17" (minimum) screen.

2) Software

ACS applications software shall be hosted on the ACS hardware and shall utilize a
Windows environment for the user interface. The overall package shall run a combined
Access Control/Alarm Management package which itself shall be a Windows program,
and which shall be easy to use and require minimal training for Operators for the
ACS administration and programming.

The system software shall support multiple PC workstations and multiple operators.
System administration and alarm handling shall be carried out from any workstation
required, the level of access to the system features and facilities being determined by the
users log on password.

An audible warning shall be provided on each workstation to supplement the visual


warning provided by text and graphical representation in the event of alarm sensor or
sensor tamper activation.

3) Security Control Room (SCR/BMS) ACS operator Workstation and Badging facility

One Operator workstation shall be provided here for the prime purpose of ACS operations,
and for the maintenance/administration of the ACS system as a whole. This workstation
shall also be used for system administration functions, including photo-ID functions and
the creation of photo-ID badges.

This workstation shall be used for ACS control and shall have the capability of functioning
at ‘administrator’ level via an appropriate password.

All reader and control functions and system parameters shall be programmed and stored
via the Operator workstation, and a system printer supplied to provide hard copy audits
and reports.

The receipt and display of alarm information shall have priority over any other activity on
the Operator workstation.

Alarms displayed shall show the time and date of activation, the nature of the alert, the
circuit description, circuit number and the associated priority level. The display shall at all
times show the current time and date, the local format being provided when a foreign
language is selected.

Graphics displays and instructions shall be associated with each alarm and brought up on
alarm activation. The level of detail of the graphics shall be sufficient to determine which
device has created the alarm i.e. an overview of each floor.

Jun 2007 SDT International page 4of 20


SECTION 16785 – ACCESS CONTROL AND INTRUSION MARINA 101 – MARSA DUBAI

A dedicated badge production facility is NOT required, though relevant hardware (badge
printer and camera, etc.) and the necessary software packages shall be provided onto the
operator workstation. The workstation shall produce staff photo-ID badges, and for the
validation of staff and residents’ ACS tokens. The badge function shall provide for the
creation of Staff, Visitors’ and Contractors’ temporary access cards/badges that shall be
validated locally at the SCR ACS workstation.

C. Card Requirements

The access control system shall be used to control a number of different vehicle and
pedestrian control devices, i.e. pedestrian doors and vehicle barriers. The objective is to
provide a single card to operate all types of devices.

The preferred card technology shall be a passive proximity technology.

The card shall meet the dimensional requirements of ISO norms 7810, 7811 and 7816.

The card shall be issued to residents, staff for ID purposes and non-residential
visitors/contractors as necessary with a different design, each card being programmed for
acceptance at designated doors, and during designated time periods only.

1) Camera and Badge Printer

The production of ACS cards shall be undertaken by security staff in the


SCR/BMS room. Cards shall be printed on a dye sublimation printer with a resolution of
300 dpi or greater. Pictures shall be taken using a digital camera with a minimum
resolution of 470x350. The camera shall have a direct link via a USB or Fire Wire
connection to the ACS/Badge production PC.

D. General Door Requirements

All locks and contact sets shall be supplied and fitted by the suppliers of the relevant
doors/barriers/shutter. The Security Contractor shall be responsible for liaising with the door
suppliers to ensure the locks supplied are compatible with the access control system supplied
and suitable for the doors and frames.

Readers shall be provided at those positions marked on the provided drawings to provide
control and management information on door status to the SCR/BMS.

All controlled doors shall have entry readers only and free exit via Request To Exit (RTE)
switches.

Each leaf of a controlled door set shall have its own lock, i.e. two locks for a double or leaf
and a half door. In all instances the ACS shall control both locks. Dedicated contact sets per
leaf shall be provided for door position monitoring to be connected to the ACS.

The Security Contractor shall thus base his offer on such liaison, and include for any
drawings, templates or written instructions and relevant testing/commissioning times as may
be necessary.

Jun 2007 SDT International page 5of 20


SECTION 16785 – ACCESS CONTROL AND INTRUSION MARINA 101 – MARSA DUBAI

1) IP Addressable Door Controllers

IP addressable door controllers shall be provided in locations where network access is


available and in close proximity to the controlled doors and shall comprise integral power
supply and lock outputs as may be necessary for the successful operation of the system.

These controllers will store access information to be updated periodically or on demand


by the ACS server. Updates will be required when access privileges are added or
removed.

Entrance will be granted or denied on a request from the card reader when a card is
presented, this will be a verification process between the card and the door controller, if
the card is permitted entry the door controller will signal for the door lock to release or
not if the card is denied.

Transactions will be reported to the ACS server. In the event of a break down of
communication between the door controller and the server all local transactions will
continue until communication is reinstated.

Unit characteristics;

a) Local battery back up for each controller shall be provided to maintain the system for
a minimum of 1 hour in the event of a power failure.

b) The battery sizing shall be based on quiescent currents, plus average daytime use of
the associated readers and hence the lock currents.

c) Each controller shall be provided with a fire alarm interface for others to connect to.

d) The controller shall incorporate general purpose alarm inputs and outputs, which shall
be used for door control functions, such as position monitoring.

e) The controller shall have the ability to store up to 4,000 transactions locally in the
event of a communication breakdown with the server and relay these transactions
back to the server when communication is reinstated.

f) All input circuits to the Door Controllers (or dedicated input units) shall be fully
supervised.

2) Card Readers

Card readers shall be provided on all controlled doors and barriers to allow entry into the
building and parking facility as shown on the deployment drawings.

The readers shall be surface mounted and have clear indication of an accepted or declined
card.

Jun 2007 SDT International page 6of 20


SECTION 16785 – ACCESS CONTROL AND INTRUSION MARINA 101 – MARSA DUBAI

The final location of the readers shall be determined by the Construction


Manager/Architect.

Card readers shall be based on proximity technology achieving a read range


of 10 - 100mm.

3) BGU

Monitored emergency Break Glass Units (BGUs) shall be provided where necessary on
the secure side of controlled doors only for emergency escape purposes as required by
Building Control.

It shall be flush-mounted where possible, colored according to local requirements and


engraved “EMERGENCY DOOR RELEASE” or similar wording to be agreed with the
Construction Manager/Architect.

Operation of the unit shall release the associated door lock such that the door may be
freely used. The BGU shall operate directly on the lock power supply line to ensure
fail-safe exit capability.

If emergency escape is in the direction of a secured door then a BGU shall be installed on
the non-secure side in addition to the BGU on the secure side. As the escape routes are
not yet verified, the Tenderer shall cost for 20 such extra BGUs, the requirement to be
determined with the architect if on site.

Activation of any emergency break glass unit shall activate an alarm in the SCR/BMS
room and may be either monitored by the landlords panel or the ACS, whichever is most
cost effective.

4) RTE

Push button Request To Exit local releases (RTEs) shall be installed on the secure side of
those controlled doors that utilize electro-magnetic locking, and shall suppress the door
alarm for normal exit.

The RTE button shall be mounted in a position for convenient use by persons leaving the
area, and near to the BGU (where fitted). The device shall be engraved “DOOR
RELEASE” or similar and be subject to the approval of the Construction Manager.
Where possible, the RTE button shall be flush mounted, surface mounting being agreed
with the Construction Manager.

The RTE facility, when activated, shall trigger a timer within the system, and bridge the
alarm circuit for a specified time period. This shall be the normal time period for
personnel to exit via the controlled door, and for the door closer to shut the door.

Jun 2007 SDT International page 7of 20


SECTION 16785 – ACCESS CONTROL AND INTRUSION MARINA 101 – MARSA DUBAI

5) Drop-Arm Barriers

Drop-arm barriers as shown on the deployment drawings shall be installed to provide


vehicle management of residents’ vehicles and restrict access to the lower levels of the
parking facility.

Barriers shall be located across each of the entry and exit lanes for the roadways as
shown on the drawings. These barriers shall afford controlled vehicular access and egress
to/from parking areas reserved for residents’.

Under normal conditions, the vehicle entry lane drop-arm barrier shall be controlled by
means of the card access system such that people arriving with a valid card can enter or
leave without intervention or assistance from security personnel. In the event that a
problem is encountered by a person/car trying to enter or leave then contact with the
guard shall be made via an intercom station at the card reader location.

Contacts from the intercom shall be connected to the barrier control system to enable the
barrier to raise and lower commands to be issued via the intercom system.

The exact location of all barriers, ground loops and entry control devices (e.g. readers,
intercoms, cameras) shall be agreed with the Architect prior to the production of
"shop drawings".

The structural/foundation and builder’s work requirements shall be notified in advance


such that the works may be integrated into the general construction program.

Works associated with these barriers shall include the supply, installation, testing and
commissioning and setting to work the barrier traffic control systems and their interfaces.

Under normal conditions the barriers will be closed (down) and raised for authorized
entry, or permissive entry as required.

In the event of a complete power failure to the barrier drive, a disengaging system shall
be provided to enable the barriers to be raised manually.

Barrier system attributes:

a) Speed

Operational speed from closed to open shall be less than 4 seconds.

b) Signage and Finishes

Appropriate signage shall be deployed at the discretion of the Client and Architect.

The color of the boom on the drop-arm barrier units shall, subject to approval of the
Architect, have reflective strips on the boom faces presented to oncoming vehicles to
aid visibility when it is dark.

Jun 2007 SDT International page 8of 20


SECTION 16785 – ACCESS CONTROL AND INTRUSION MARINA 101 – MARSA DUBAI

c) Dimensions

The length of the each boom shall be confirmed with the architect, but shall cover a
minimum of three quarters of the lane width. An articulated boom shall be considered
dependant on clearance available at the installed position.

d) Installation of the Drop Arm Barrier Drive Unit

The position of the drive unit shall be agreed with the Architect as part of his setting
out, and shall be located on a concrete plinth of the required depth.

e) Prior works to be completed

The following works shall be completed early to ensure the later satisfactory
installation of the drop-arm barriers:

- Provision of details to allow others to provide foundations and plinths work for the
barrier devices.

- Installation of embedded containment and, where required, draw wires for power,
control and indication cables.

- All connecting cables shall be concealed or otherwise protected against tampering.

- The control buttons/switches and interfaces to ACS, intercom and ground loops

f) Safety

A safety loop shall be provided below the barrier to detect a vehicles presence and
prevent the barrier closing on the vehicle.

6) Contact Sets (CS)

Contact sets shall be provided on all access controlled doors as marked on the drawings
to enable the ACS system to detect door open/closed status. Contact sets may be separate
or may be incorporated into the locking system. However, an output from a magnetic
bonding sensing contact shall not be used for door status monitoring. Separate contact
sets shall be flush mounted magnetic reed switches (or equivalent), except where the door
construction will not allow it, in which case surface mount devices shall be provided with
the agreement of the Construction Manager.

Contact sets shall be installed with an adjacent means of connecting end of line resistors
(series and parallel) to provide required four state monitoring. The resistors shall be
mounted in an adaptable box that is located on the secure side of the device being
monitored and shall be electrically as near to the contact set as is possible. Contact sets
shall be securely fixed to the item monitored, adhesive fixings are not acceptable.

Jun 2007 SDT International page 9of 20


SECTION 16785 – ACCESS CONTROL AND INTRUSION MARINA 101 – MARSA DUBAI

Where appropriate, such contacts shall be provided for each door leaf to ensure one half
of a double door cannot be left open without an alarm condition existing. The Security
Contractor shall note that some access controlled door sets shall also be monitored by the
Intruder Detection System, and a suitable dual reed device shall be fitted to each leaf of
this door set to enable independent supervised monitoring by the building Intruder
Detection System.

Contact sets shall also be installed on doors to be monitored but not operated by
the ACS as shown on the drawings.

E. Fire Interface Provisions

Depending upon the system chosen each local ACS Door Controller or grouped zone
controller shall be provided with an interface to the Fire Alarm system to afford automatic
release of designated access controlled doors in emergency situations.

F. ACS Alarm Sensor Monitoring

The ACS shall be capable of monitoring door status/position or other intruder detection
devices. The local door controllers shall be used where input capability exists, elsewhere,
dedicated Input/Output units shall be provided to act as data gathering units, this also being an
IP addressable unit.

Alarm sensors monitored by the ACS shall be independent of the monitoring included as part
of the access control of doors, and will generally be associated with designated vulnerable
doors or areas where warning of unauthorized presence is necessary to the building security
regime. The ACS systems shall be fully programmable to allow flexible time and zone
commands on controlled or monitored doors and areas.

All alarms will be capable of directly interfacing via serial or parallel means to the chosen
CCTV switch, such that alarm conditions from designated circuits automatically bring up
relevant CCTV pictures where available, and initiate real-time recording.

2.2 ACCESS CONTROL CONFIGURATION

A. Descriptions:

The ACS shall allow text description of configured doors and input points.

The ACS shall allow the renaming of an existing title description without removing the
sub-components of that configuration object. For example, rename a door from "Lobby"
to "East Lobby" without any other changes to the configuration to support that title change.

Jun 2007 SDT International page 10of


20
SECTION 16785 – ACCESS CONTROL AND INTRUSION MARINA 101 – MARSA DUBAI

B. Sequences:

The Security System Host shall allow the system administrator to define sequences of
proposed door operations as a template that may be used for the definition of similar points
with the same functionality.

C. Templates:

The ACS shall allow the system administrator to define templates for specific hardware
components that may be used for the definition of similar points with the same functionality.

The ACS shall allow templates to be defined within any of the following groups:

1) Readers
2) Input Points
3) Output Points

D. Object Tracing:

The ACS shall provide a means of tracing an object throughout the ACS network. The ACS
shall display all traced items on the Event Display Screen in a color other than black.
All traced items shall be printed to an event printer with a unique identifier to ensure the
operator is aware of a traced object. The ACS shall allow the following items to be traced at a
minimum:

1) Input Points
2) Output Points
3) Doors (readers)
4) Cardholders

E. Point Groups:

The ACS shall support unlimited point group definitions for the control of viewing and
database information. The ACS shall allow the following objects to be grouped:

1) Cardholders
2) Doors
3) Input Points
4) Output Points
5) Access Levels
6) CCTV System Control Points
7) Fire Alarm Points
8) Intelligent System Controllers

Jun 2007 SDT International page 11of


20
SECTION 16785 – ACCESS CONTROL AND INTRUSION MARINA 101 – MARSA DUBAI

F. Input / Output Linking:

The ACS shall allow the definition of automatic linkage between input points and output
points.

The system shall allow each input point to be defined to automatically activate a single or
group of outputs without operator intervention.

Controllers shall be able to communicate on a peer-to-peer basis so that Input to Output


linking within a loop of controllers shall not require host intervention.

The ACS shall provide a means for reviewing input to linking relationships without leaving
the configuration application.

G. Access Policies:

The ACS shall support the configuration of "policies" to provide specialized access control to
regions of the facility, personnel, or sequencing through doors. The ACS shall contain the
following policies as a minimum:

1) Occupancy Restrictions Policy


2) Entry / Exit Anti-Passback Policy
3) Timed Anti-Passback Policy
4) Pass-Through PolicyTailgate Policy
5) Escort Access Policyn-Man Rule Policy

The ACS shall support two types of policies.

1) Soft Policies:
Soft Policies shall grant access and issue a system event notification when a violation
occurs.

2) Hard Policies:
Hard Policies shall deny access and issue a system event notification when a violation
occurs.

H. Anti-Passback:

The ACS shall support the following two types of Anti-passback policies:

1) Entry / Exit Anti-Passback uses entry readers in conjunction with exit readers to monitor
and control cardholder passage between defined regions within a secured facility.

2) Timed Anti-passback is assignable to single readers to prevent re-entry into a secured


prior to the expiration of an assigned anti-passback time period.

The ACS shall permit configuration of multiple Entry / Exit Anti-Passback policies and
multiple Timed Anti-Passback Policies.

Jun 2007 SDT International page 12of


20
SECTION 16785 – ACCESS CONTROL AND INTRUSION MARINA 101 – MARSA DUBAI

I. Access Levels:

The ACS shall support around 1200 unique access levels.

The system shall be configurable to allow assignment of up to 10 access levels per cardholder.
The system shall support nested access levels.

Each access level shall be configurable to support one door, a group of doors, or all doors in
the system.

The system shall allow assignment of one of the 256 time periods to each door within an
access level.

The Cardholder application shall allow the user to right-click the mouse on any access level
and view (read-only) the details of the access level as would be shown in the configuration
application when the access level was configured.

J. Times Periods:

The system shall support 256 time periods.

Each time period shall consist of up to 8 time intervals.

Each time interval shall consist of one day, a group of days or all days of the week. Each
interval shall have definable start time and end time.

Each time interval shall have a holiday checkbox to designate that time period as valid for
declared system holidays.

K. Elevator Control:

The system shall support elevator access control for up to 30 elevator cabs with a maximum
of 24 controlled floors per elevator.

The system shall store the following information for each elevator controlled by the system:

1) Name of the elevator


2) Name of the controller
3) Name of the reader
4) Name of each accessible floor
5) List of available accessible floors for each system access level

L. Event Messages:

The ACS shall provide status of system activity based on the current configurations of the
ACS when the trigger point has been activated.

Jun 2007 SDT International page 13of


20
SECTION 16785 – ACCESS CONTROL AND INTRUSION MARINA 101 – MARSA DUBAI

M. Alarm Grouping:

The ACS shall allow alarms to organized into alarm display groups for ease of use and
management by type, location, priority, action message, or other system administrator defined
criteria. Up to 12 groups shall be supported.

The ACS shall allow the customization of titles and the order of display for each alarm group.

The ACS shall provide a numerical value located beneath each Alarm Group Button that
reflects the number of alarms pending in that group.

The ACS shall allow the system administrator to password protect the alarm grouping display
panel so that only authorized personnel have the ability to manage alarm conditions.

N. Alarm Linking:

The ACS shall allow any output point or CCTV video alarm within the ACS network to be
activated based on an alarm condition.

The ACS shall allow each output point or video alarm to be optionally reset when the alarm
condition is reset.

Each video alarm shall represent a combination of cameras and monitors automatically
activated when the alarm condition is active.

The ACS shall allow each output point or video alarm to require an operator to manually reset
it from the ACS workstation.

2.3 INTRUDER DETECTION SYSTEM (IDS)

Doors that are common with hotel and apartments will be monitored using contact sets and
shall be connected to the Intrusion Alarm Panel.

The alarm panel shall be located in the SCR where security staff can action/monitor any
alarms. This unit shall also be used to monitor for emergency signals from a fixed system of
Personal Attack Buttons (PABs) or panic push buttons.
The PABs or panic push buttons shall be installed in the following areas for the benefit of
personnel usually located there:

- One at each of the reception


- One in the SCR

The form of the button involved shall preclude accidental operation, and shall latch until reset
by a special key.

Jun 2007 SDT International page 14of


20
SECTION 16785 – ACCESS CONTROL AND INTRUSION MARINA 101 – MARSA DUBAI

PART 3 - EXECUTION

3.1 EXAMINATION

A. Examine pathway elements intended for cables. Check raceways, cable trays, and other
elements for compliance with space allocations, installation tolerances, hazards to cable
installation, and other conditions affecting installation.

B. Examine roughing-in for LAN and control cable conduit systems to PCs, Controllers, card
readers, and other cable-connected devices to verify actual locations of conduit and back
boxes before device installation.

C. Proceed with installation only after unsatisfactory conditions have been corrected.

3.2 PREPARATION

A. Comply with recommendations in SIA CP-01.

B. Comply with EIA/TIA-606, "Administration Standard for the Telecommunications


Infrastructure of Commercial Buildings."

C. Obtain detailed Project planning forms from manufacturer of access-control system; develop
custom forms to suit Project. Fill in all data available from Project plans and specifications
and publish as Project planning documents for review and approval.
1. Record setup data for control station and workstations.
2. For each Location, record setup of Controller features and access requirements.
3. Propose start and stop times for time zones and holidays, and match up access levels
for doors.
4. Set up groups, facility codes, linking, and list inputs and outputs for each Controller.
5. Assign action message names and compose messages.
6. Set up alarms. Establish interlocks between alarms, intruder detection, and Closed
Circuit TV features.
7. Prepare and install alarm graphic maps.
8. Develop user-defined fields.
9. Develop screen layout formats.
10. Propose setups for guard tours and key control.
11. Discuss badge layout options; design badges.
12. Complete system diagnostics and operation verification.
13. Prepare a specific plan for system testing, startup, and demonstration.
14. Develop acceptance test concept and, on approval, develop specifics of the test.
15. Develop cable and asset management system details; input data from construction
documents. Include system schematics and Visio Technical Drawings.

D. In meetings with Engineer and Owner, present Project planning documents and review,
adjust, and prepare final setup documents. Use final documents to set up system software.

Jun 2007 SDT International page 15of


20
SECTION 16785 – ACCESS CONTROL AND INTRUSION MARINA 101 – MARSA DUBAI

3.3 CABLING

A. Install cables and wiring according to requirements in Division 16 Section "Structured


Cabling"

B. Wiring Method: Install wiring in raceway and cable tray except within consoles, cabinets,
desks, and counters. Conceal raceway and wiring except in unfinished spaces.

C. Wiring Method: Install wiring in raceway and cable tray except within consoles, cabinets,
desks, and counters and except in accessible ceiling spaces and in gypsum board partitions
where unenclosed wiring method may be used. Use NRTL-listed plenum cable in
environmental air spaces, including plenum ceilings. Conceal raceway and cables except in
unfinished spaces.

D. Install LAN cables using techniques, practices, and methods that are consistent with
Category 6 rating of components and that ensure Category 6 performance of completed and
linked signal paths, end to end.

E. Install cables without damaging conductors, shield, or jacket.

F. Boxes and enclosures containing security system components or cabling, and which are
easily accessible to employees or to the public, shall be provided with a lock. Boxes above
ceiling level in occupied areas of the building shall not be considered to be accessible.
Junction boxes and small device enclosures below ceiling level and easily accessible to
employees or the public shall be covered with a suitable cover plate and secured with
tamperproof screws.

G. Install end-of-line resistors at the field device location and not at the Controller or panel
location.

3.4 CABLE APPLICATION

H. Comply with EIA/TIA-569, "Commercial Building Standard for Telecommunications


Pathways and Spaces."

I. Cable application requirements are minimum requirements and shall be exceeded if


recommended or required by manufacturer of system hardware.

J. RS-232 Cabling: Install at a maximum distance of 15 m.

K. RS-485 Cabling: Install at a maximum distance of 1220 m.

L. Card Readers and Keypads:


1. Install number of conductor pairs recommended by manufacturer for the functions
specified.
2. Unless manufacturer recommends larger conductors, install No. 22 AWG wire if
maximum distance from Controller to the reader is 75 m, and install No. 20 AWG
wire if maximum distance is 150 m.
3. Repeaters are generally not allowed. If inevitable and approved by the Engineer, than
install "extender" or "repeater" modules recommended by manufacturer of the
Controller.

Jun 2007 SDT International page 16of


20
SECTION 16785 – ACCESS CONTROL AND INTRUSION MARINA 101 – MARSA DUBAI

4. Install minimum No. 18 AWG shielded cable to readers and keypads that draw 50
mA or more.

M. Install minimum No. 16 AWG cable from Controller to electrically powered locks. Do not
exceed [75 m] [150 m] <Insert distance>.

N. Install minimum No. 18 AWG ac power wire from transformer to Controller, with a
maximum distance of [8 m] <Insert distance>.

3.5 GROUNDING

O. A clean earth system shall be provided. Comply with Division 16 Section "Grounding and
Bonding."

P. Comply with BS EN 50310 “Application of equipotent bonding and earthing in buildings


with information technology equipment”.

Q. Ground cable shields, drain conductors, and equipment to eliminate shock hazard and to
minimize ground loops, common-mode returns, noise pickup, cross talk, and other
impairments.

R. Bond shields and drain conductors to ground at only one point in each circuit.

S. Signal Ground:
1. Terminal: Locate in each equipment room and wiring closet; isolate from power
system and equipment grounding.
2. Bus: Mount on wall of main equipment room with standoff insulators.
3. Backbone Cable: Extend from signal ground bus to signal ground terminal in each
equipment room and wiring closet.

3.6 INSTALLATION

A. Push Buttons: Where multiple push buttons are housed within a single switch enclosure,
they shall be stacked vertically with each push-button switch labeled with 6.4-mm- high
text and symbols as required. Push-button switches shall be connected to the Controller
associated with the portal to which they are applied, and shall operate the appropriate
electric strike, electric bolt, or other facility release device.

B. Install card, and biometric readers.

C. Installation shall be supervised and tested by a representative of the manufacturer of the


system equipment. The work shall be performed by skilled technicians under the direction
of experienced engineers, all of whom shall be properly factory trained and qualified for this
work.

D. Wire and Cable:


1. All wiring and cable shall be installed in metal raceways or within equipment.
Conductors within equipment enclosures shall be carefully cabled and laced.
Individual conductors shall be tagged with markers indicating the function, source,
and destination of all cabling, wiring and terminals. All cables and wires shall be
identified, utilizing heat-shrink, pre-printed, wire markers.

Jun 2007 SDT International page 17of


20
SECTION 16785 – ACCESS CONTROL AND INTRUSION MARINA 101 – MARSA DUBAI

2. Number of Conductors: As recommended by system manufacturer for functions


indicated.
3. After installation, and before termination, all wiring and cabling shall be checked and
tested to ensure there are no grounds, opens, or shorts on any conductors or shields.
A V.O.M. shall be utilized to accomplish these tests and a reading of greater than 20
megohms shall be required to successfully complete the test.
4. Visually inspect wire and cable for faulty insulation prior to installation. Protect
cable ends at all times with acceptable end caps except during actual termination. At
no time shall any coaxial cable be subjected to a bend less than a 150 mm radius.
5. Protect wire and cable from kinks.
6. Provide grommets and strain relief material where necessary, to avoid abrasion of
wire and excess tension on wire and cable.
7. Splices, Taps, and Terminations: Make connections only on numbered terminal strips
in junction, pull, and outlet boxes; terminal cabinets; and equipment enclosures.

E. Identify components, conductors, and cables according to Division 16 Section "Basic


Electrical Materials and Methods." Color-code conductors, and apply wire and cable
marking tape to designate wires and cables so media are identified and in coordination with
system wiring diagrams.

F. Raceway: All raceway shall be installed in accordance with Division 16 Section "Raceways
and Boxes". Use communications cable tray wherever possible for low voltage cabling.
Exposed raceway below 2.4 meters and in dry locations shall be rigid steel conduit.

G. Install card access equipment in security console as shown on sheet design drawing.

H. Provide 20 mm, minimum, thick plywood backboard to support the controllers and
associated equipment mounted to the wall in each room. Coordinate location and size of
backboard with Engineer prior to installation.

3.7 IDENTIFICATION

A. In addition to requirements in this Article, comply with applicable requirements in


Division 16 Section "Basic Electrical Materials and Methods" and with TIA/EIA-606.

B. Label each terminal strip and screw terminal in each cabinet, rack, or panel.
1. All wiring conductors connected to terminal strips shall be individually numbered,
and each cable or wiring group being extended from a panel or cabinet to a building-
mounted device shall be identified with the name and number of the particular device
as shown.
2. Each wire connected to building-mounted devices is not required to be numbered at
the device if the color of the wire is consistent with the associated wire connected and
numbered within the panel or cabinet.

C. Label all controllers, card readers, and other devices to the approval of the Engineer.

3.8 FIELD QUALITY CONTROL

A. Manufacturer's Field Service: Engage a factory-authorized service representative to


inspect[, test, and adjust] field-assembled components and equipment installation,
including connections[, and to assist in field testing]. Report results in writing.

Jun 2007 SDT International page 18of


20
SECTION 16785 – ACCESS CONTROL AND INTRUSION MARINA 101 – MARSA DUBAI

B. Perform the following field tests and inspections and prepare test reports:
1. LAN Cable Procedures: Inspect for physical damage and test each conductor signal
path for continuity and shorts. Use Class 2, bidirectional, Category 5 tester. Test for
faulty connectors, splices, and terminations. Test according to TIA/EIA-568-1,
"Commercial Building Telecommunications Cabling Standards - Part 1 General
Requirements." Link performance for UTP cables must comply with minimum
criteria in TIA/EIA-568-B.
2. Test each circuit and component of each system. Tests shall include, but are not
limited to, measurements of power supply output under maximum load, signal loop
resistance, and leakage to ground where applicable. System components with battery
backup shall be operated on battery power for a period of not less than 10 percent of
the calculated battery operating time. Provide special equipment and software if
testing requires special or dedicated equipment.
3. Operational Test: After installation of cables and connectors, demonstrate product
capability and compliance with requirements. Test each signal path for end-to-end
performance from each end of all pairs installed. Remove temporary connections
when tests have been satisfactorily completed.

C. Remove and replace malfunctioning devices and circuits and retest as specified above.

D. Experimental period for all systems shall be three months, before substantial completion of
the project.

E. Contractor shall be responsible to replace and make operational all damaged


equipment/accessories, if any, which are part of existing, while connecting to existing
system.

3.9 STARTUP SERVICE

A. Engage a factory-trained and authorized service representative to supervise and assist with
startup service. Complete installation and startup checks according to approved procedures
that were developed in " Preparation" Article and with manufacturer's written instructions.

3.10 PROTECTION

A. Maintain strict security during the installation of equipment and software. Rooms housing
the control station, and workstations that have been powered up shall be locked and secured,
with access-control system reporting to a Server complying with UL 1610, "Central-Station
Burglar-Alarm Units," during periods when a qualified operator in the employ of Contractor
is not present.

3.11 DEMONSTRATION

A. Engage a factory-trained and authorized service representative to train Owner's maintenance


personnel to adjust, operate, and maintain security access system. Refer to Division 1
Section "[Closeout Procedures] [Demonstration and Training]."

B. Develop separate training modules for the following:


1. Computer system administration personnel to manage and repair the LAN and
databases and to update and maintain software.

Jun 2007 SDT International page 19of


20
SECTION 16785 – ACCESS CONTROL AND INTRUSION MARINA 101 – MARSA DUBAI

2. Operators who prepare and input credentials to man the control station and
workstations and to enroll personnel.
3. Security personnel.
4. Hardware maintenance personnel.
5. Corporate management.

END OF SECTION 16785

Jun 2007 SDT International page 20of


20

You might also like