Professional Documents
Culture Documents
Tendernotice 1-2
Tendernotice 1-2
Instructions to Tenderer
Specifications
Make List
Drawings
Chandrapur Cancer Care Foundation,
New Government Medical College Campus,
Ballarshah Bypass Road Chandrapur, Maharashtra, India,442401
CIN: U85100MH2018NPL313419
Email: procurementcccf@tatatrusts.org
1.2 Accordingly, under Section 8 of the Company Act, 2013 a non-profit SPV by name “Chandrapur
Cancer Care Foundation - CCCF” was incorporated on September 4, 2018 and on October 29,
2018, Directorate of Medical Education & Research, District Mineral Foundation and Tata Trust
entered into a Memorandum of Understanding (MOU).
1.3 In the development of the hospital, CCCF has engaged Main Contractor for Civil & Site
Development, Electrical, HVAC, Fire Fighting, Public Health Engineering who is presently working
at Site. Now for procurement of Packages listed herein below the Head Commissioning and
Implementation, Chandrapur Cancer Care Foundation invites interested contractors & vendors
to submit online Tenders on Mahatenders.
Period of
Bid Security Completion
Package No Item Tender Fee
value in weeks
(W)
A - CIVIL WORKS
A1 Signage ₹ 17,000 ₹ 1,90,000 6W
A2 Blinds ₹ 5,100 ₹ 1,00,000 6W
A3 Loose Furniture ₹ 25,000 ₹ 7,80,000 16 W
₹ 5,40,000 20 W
A5 Landscape ₹ 25,000
________________________________________________________________________________
New Government Medical College Campus,
Ballarshah Bypass Road Chandrapur, Maharashtra, India,442401
CIN: U85100MH2018NPL313419
or collect Tender Booklets from the designated office upon payment of non-refundable Tender
Fee as specified in the table above.
Tender shall valid for 180 days from the date of submission and the date CCCCF may deem fit.
The dully completed Tender in accordance with the Instruction to Tenderer must be submitted
not later than 17:00 hours on 29-11-2023.
All the dates in the tendering process shall be as per Calendar of Events.
Pre-Bid Meeting and Site visit -The dates for Pre-Bid meeting and other important dates shall
be announced on the Mahatenders portal. Therefore, all interested parties are advised to
regularly check the updates on the portal. CCCF endeavours not to change the schedule as
Calendar of Events, however, in circumstances beyond the control of CCCF dates may change.
CCCF shall not be responsible for any deficiency in the provided documents. Bidder can request
clarification or submit queries via email before the Pre-bid meeting. CCCF will endeavour to
address all the matters raised. CCCF invites all the participants to have a visit at Site to be
acquainted with the site conditions and the requirements and purpose of the works.
Date Time
1 Notice Inviting Tender 26-10-2023 17.00
Prospective Tenderer can download
2 Tender Document 27-10-2023 11.00
3 Submission of Pre-Bid Queries 30-10-2023 15.00
4 Site Visit 30-10-2023 10.00
5 Pre-Bid Meeting 01-11-2023 11.00
Publication of Clarification on Pre-Bid
6 queries 08-11-2023 15.00
7 Submission of Tender 29-11-2023 17.00
Prospective applicants are requested to monitor and proactively see the updates on
Mahatenders portal no separate or individual communication will be possible for CCCF on any
matter whatsoever with regard to the tendering process.
All the tendering process shall be conducted through District Mineral Foundation and the Office of District Collector,
Chandrapur.
________________________________________________________________________________
New Government Medical College Campus,
Ballarshah Bypass Road Chandrapur, Maharashtra, India,442401
CIN: U85100MH2018NPL313419
INSTRUCTIONS TO TENDERERS
General Instructions:
Prospective Bidder shall obtain Tender Booklet for each package along with other documents from
the Mahatenders (Maharashtra Government e tendering). Requirement of registration in the
portal shall be as per the Mahatenders. CCCF does not provide any assistance for registration at
and operations of Mahatenders. Prospective bidders are expected to manage these aspects by
their own. However, on receipt of significant numbers of applications for a workshop, CCCF may
request a workshop of use of Mahatenders portal from Mahatenders officials. Whether, workshop
is conducted or no is purview of the Mahatenders office and they have sole discretion.
The Tender Booklet contains:
Client has the right to summarily reject the Bids not submitted as per the instructions to the
tenderer.
No Joint Ventures - pursuant to the terms and conditions outlined in the bidding process, no joint
ventures, collaborations, or joint bids will be accepted. Any bid submitted by a bidder as part of a
joint venture, collaboration, or joint bid shall be summarily rejected and will not be considered for
technical evaluation and/or further tendering process.
All costs for the preparation and submission of the Tender is to be borne by the prospective bidder.
1.2 The information contained in this Tender document or information that may be subsequently
provided to the interested bidder (“Bidder” or “Tenderer”), whether verbally or in documentary
or any other form by or on behalf of Client or any of their authorized employees or advisors or
representatives, would be subject to the terms and conditions set out in this Tender and such
other terms and conditions subject to which such information is provided.
1.3 This Tender is neither an agreement nor an offer by the Client to the prospective Bidder or any
other person. The purpose of this Tender is to provide interested parties with information that
may be useful to them in the formulation and submission of their Bids pursuant to this Tender.
1.4 This Tender includes statements, which reflect various assumptions and assessments made by
the Client in relation to the Technical Specifications and scope of work contemplated in relation
to the Project. Such assumptions, assessments and statements do not purport to contain all the
information that each Bidder may require.
1.5 This Tender may not be appropriate for all persons, and it is not possible for the Client and its
employees, advisor or consultant to consider the objectives, technical expertise and particular
needs of each party who needs or uses this Tender.
1.6 The assumptions, assessments, statements and information contained in this Tender may not
be complete, accurate, adequate or entirely correct. Each prospective Bidder should, therefore,
conduct its own enquiries and analysis to check the accuracy, adequacy, correctness, reliability
and completeness of the assumptions, assessments and information contained in this Tender
and obtain independent advice from appropriate sources.
1.7 The Technical Specification and scope of WORK, which form part of this Tender is indicative and
the Client is not responsible for their completeness and accuracy. Bidder shall acquaint itself
with the Tender conditions; Tender drawings and specifications; Political and Social conditions
and Site conditions.
1.8 Information provided in this Tender to the Bidder is on a wide range of matters, some of which
depend upon interpretation of law. The information given is not an exhaustive account of
__________________________________________________________________________________________
Chandrapur Cancer Care Foundation, New Government Medical College Campus, , Ballarshah Bypass Road
Chandrapur, Maharashtra, India,442401
CIN: U85100MH2018NPL313419
statutory requirements and should not be regarded as a complete or authoritative statement
of law. The Client accepts no responsibility for the accuracy or otherwise for any interpretation
or opinion on law expressed herein.
1.9 The Client, its employees, advisors, and representatives make no representation or warranty
and shall have no liability to any person including any Bidder under any law, statute, rules or
regulations or tort, principles of restitution or unjust enrichment or otherwise for any loss,
damages, cost or expense which may arise from or be incurred or suffered on account of
anything contained in this Tender or otherwise, including the accuracy, adequacy, correctness,
reliability or completeness of this Tender and any assessment, assumption, statement or
information contained herein or deemed to form part of this Tender or arising in any way in this
pre-qualification/shortlisting process.
1.10 This Tender and the information contained herein is to be used only by the person to whom it
is issued and it is not transferable. It shall not be copied or distributed by the recipient to third
parties (other than in confidence to the recipient’s professional advisors). Even in the event the
recipient does not continue with its involvement in the Project in accordance with this Tender,
the confidentiality obligations under this Tender or subsequent tender or contract shall continue
to be binding on and adhered to by the Bidder.
1.11 The Client also accepts no liability of any nature whether resulting from negligence or otherwise
however caused arising from reliance of any Bidder upon the statements contained in this
Tender.
1.12 Client may in its absolute discretion, but without being under any obligation to do so, update,
amend or supplement the information, assessment or assumption contained in this Tender.
1.13 The issue of this Tender does not imply that the Client is bound to select an applicant or to
appoint the selected applicant, as the case may be, and client reserves the right to reject all or
any of the proposals without assigning any reasons whatsoever.
__________________________________________________________________________________________
Chandrapur Cancer Care Foundation, New Government Medical College Campus, , Ballarshah Bypass Road
Chandrapur, Maharashtra, India,442401
CIN: U85100MH2018NPL313419
2. Introduction
2.1 Government of Maharashtra in GR No. GHC-2018/418/P N 167/Admin-1 approved 140 bedded
cancer hospital. A Private Partnership joint ventured among the District Medical Education &
Research, Department of Medical Education, Govt of Maharashtra, District Mineral Foundation
and Tata Trust was formed for the development of the cancer hospital. For the purpose a Special
Purpose Vehicle (SPV - a company) was formed.
2.2 Accordingly, under Section 8 of the Company Act, 2013 a non-profit SPV by name “Chandrapur
Cancer Care Foundation - CCCF” was incorporated on September 4, 2018 and on October 29,
2018, District Medical Education Research, District Mineral Foundation and Tata Trust entered
into a Memorandum of Understanding (MOU).
2.3 In the development of the hospital, CCCF has engaged Main Contractor for Civil & Site
Development, Electrical, HVAC, Fire Fighting, Public Health Engineering who is presently working
at Site. The certain Packages including IT Equipment that are excluded from the Main Contractor’s
Scope of the Works and are proposed for the procurement through a separate tendering
process.
__________________________________________________________________________________________
Chandrapur Cancer Care Foundation, New Government Medical College Campus, , Ballarshah Bypass Road
Chandrapur, Maharashtra, India,442401
CIN: U85100MH2018NPL313419
3. Scope of Bid
3.1 Tenders are invited for WORKs of “Supply, Installation, Testing and Commissioning of IT
Equipment”, the details of which are mentioned in henceforth, needed for the Programme.
Note: Timeline mentioned above is for completion of IT Equipment from the date of Contract.
3.3 The detailed Technical Specifications for the above IT Equipment are given in this Tender Volume
VI.
3.4 The Client reserves the right to change the estimated quantities of the Works related to IT
Equipment and timelines for supply and fixing of described scope of IT Equipment at its discretion
without assigning any explanation whatsoever.
3.5 The quantity mentioned is based on the orders estimated by the Client. The Bidders are
expected to quote their best rates in the forms provided in this Tender. However, there is no
commitment whatsoever, to place orders for the estimated quantities shall be as per Bill of
Quantities (refer Volume V).
__________________________________________________________________________________________
Chandrapur Cancer Care Foundation, New Government Medical College Campus, , Ballarshah Bypass Road
Chandrapur, Maharashtra, India,442401
CIN: U85100MH2018NPL313419
4. Bidding Process:
4.1 Participation in the Tender:
(a) This Invitation for Tender is open to a bidder who fulfils the Eligibility Criteria
specified in these documents.
(b) Bid document fee: Bidder who is interested to participate, needs to pay Bid Document Fee
as stipulated in the Notice Inviting Tender (NIT) online as per the instruction given in the
Mahatenders Portal. The receipt of the payments should be submitted along with the
Tender documents.
4.2 Eligibility Criteria for participation in the Tender:
5 OEM should have average sales turnover of Rs. Financial Statement of OEM for past
5,000 lakhs in past three years. three years (as applicable)
________________________________________________________________________________
Room Number 2, Ground Floor, Niyojan Bhawan, Office of the District Collector
Chandrapur, Maharashtra, 442 401 - India
CIN: U85100MH2018NPL313419
9. Bidder should not be insolvent, in receivership, Declaration as part of letter of
bankrupt or being wound up, not having its application given in Annexure 2.
affairs administered by a court or, a judicial
officer, not have its business activities
suspended and must not be subject
of legal proceedings for any of the foregoing
reason.
10 Particulars complying with the Technical Bidder should provide details of the
Specification and Make list. Technical Specifications of Materials
proposed for supplies and installation at
Site as per the Annexure 3: Technical
Proposal.
# WORK means in this documents all works of significantly similar nature as far as the technical
specifications are concerned in the Package.
4.3.1. Bidder shall furnish, as part of his Bid, a Bid Security for the amount mentioned in the Notice Inviting
Tender.
4.3.2. The Bid Security shall be in favour of Chandrapur Cancer Care Foundation in one of the following
forms:
(a) Demand Draft in beneficiary name “Chandrapur Cancer Care Foundation”.
(b) Fixed Deposit Receipt in favour of ‘Chandrapur Cancer Care Foundation’ issued by any
Nationalized /Scheduled Bank in India.
(c) Payment receipt of online payment made to “Chandrapur Cancer Care Foundation A/c:
961220110000636 ; Bank: Bank of India; Branch: Jatpura, Chandrapur and IFSC No:
BKID0009612 :
4.3.3. The Bid Security of the successful Bidder will be released only when the successful bidder has
signed the Contract.
4.3.4. Bid Security is required to protect the Client’s right against the risk of the Bidder’s conduct, which
would warrant the forfeiture of the Bid Security. The Bid Security may be forfeited in following
conditions :
a) If the Bidder withdraws the Bid or amends the Bid or impairs or derogates the Bid in any
manner after Bid opening and within period of Bid Validity.
b) If the Bidder does not accept the correction of the Bid Price, pursuant to correction of errors;
________________________________________________________________________________
Room Number 2, Ground Floor, Niyojan Bhawan, Office of the District Collector
Chandrapur, Maharashtra, 442 401 - India
CIN: U85100MH2018NPL313419
or
c) In case of a successful Bidder, if the Bidder fails within the specified time limit to:
i) Sign the contract/ Framework Agreement or
ii) Accept the purchase orders raised pursuant to the Framework Agreement
iii) Furnish the required Performance Guarantee.
4.3.5. Any Bid not accompanied by an acceptable Bid Security and not secured as indicated in the Tender,
the Client retains the right to reject the Bid at its discretion.
Each bidder shall submit only one bid separately for each package for the Request For Proposal. A
bidder who submits more than one Bid for the same package will cause all the proposals with the
Bidder’s participation to be disqualified.
The bidder shall bear all costs associated (direct and indirect) with the preparation and submission
of this Bid. Client will in no case be responsible and liable for these costs.
4.6.1. The set of bidding documents comprises the documents listed below:
4.6.2. The Bidder is expected to examine carefully all instructions, Draft Contract Agreement, forms, terms and
conditions, Technical Specifications, and Annexures in the Tender Document. Failure to comply with the
requirements of Bid Document shall be at the Bidder’s own risk. Bids, which are not substantially
responsive to the requirements of the Bid Documents, shall be rejected.
4.6.3. Looking at the numerous Packages CCCF expecting lot of applications and no separate communication in
the regards will be possible for CCCF.
________________________________________________________________________________
Room Number 2, Ground Floor, Niyojan Bhawan, Office of the District Collector
Chandrapur, Maharashtra, 442 401 - India
CIN: U85100MH2018NPL313419
4.7 Amendment of Bidding Documents
(a) Before the deadline for submission of Bids, Client may modify the bidding documents
by issuing addendum.
(b) Any addendum thus issued shall be a part of the Bidding Documents and shall be
communicated to the Bidders in such form and manner as may be decided by Client.
(c) To give prospective Bidders reasonable time in which to take an addendum into
account in preparing their Bids, Client at its discretion, may extend as necessary the
deadline for submission of Bids.
4.8 Language of the Bid: All documents relating to the bid shall be in the English Language.
4.9.1. The Bidder shall prepare and submit scan copies of all documents related to the Tender online and Bid
Security in hard copy only in the manner stated in the Instruction to Bid. The hard copies shall be
submitted on and before the date of submission of tender (refer Calendar of Event for dates) at the official
address of the client given below.
Please note that only the bid security is to be submitted in hard copies, and no other documents
shall be accepted in hard copies. Failure to comply with this requirement will result in the bid
being deemed non-responsive.
________________________________________________________________________________
Room Number 2, Ground Floor, Niyojan Bhawan, Office of the District Collector
Chandrapur, Maharashtra, 442 401 - India
CIN: U85100MH2018NPL313419
4.9.3. Envelope 2 (Financial Bid): Only online submission
4.9.4. The hard copies should be addressed as under and submitted to the below-mentioned location:
(Ref: Tender for Supply and installation of described scope of WORK)
4.10.1. Bids shall be submitted by the Bidders within the due date mentioned for submission of Online
Bids and hardcopy of Bids as mentioned in the Calendar of events.
4.10.2. Client may extend the deadline for submission of Bids, in which case all rights and obligations of
the Client and the Bidders previously subject to original deadline will then be subject to the new
deadline.
Any Bid received late after the deadline prescribed in NIT or the extended as per Clause 4.10 of this
document will not be considered and summarily rejected No communication in this regard shall be
made.
4.12.1. Client at its discretion may add or omit any of the works at the time of bidding and accordingly, may issue
modification in the BOQ and Tender Documents.
4.12.2. Bidders may modify or withdraw their bids prior to the deadline prescribed in Clause 4.12.
4.12.1. Each Bidder’s withdrawal notice shall be prepared, sealed, marked, and delivered in accordance to Clause
4.12, with the outer and inner envelopes additionally marked “WITHDRAWAL”, as appropriate.
4.12.2. Deleted
4.12.3. Withdrawal or modification of a Bid during the period after the deadline for submission of bids may result
in the forfeiture of Bid Security pursuant to this Tender. Bidder is responsible for maintaining validity of the
Bid Security until such period or the period communicated by the client whatsoever later and in no case
shall be later than the date of the Contract as a result of this tendering process.
________________________________________________________________________________
Room Number 2, Ground Floor, Niyojan Bhawan, Office of the District Collector
Chandrapur, Maharashtra, 442 401 - India
CIN: U85100MH2018NPL313419
4.13 Bid Opening
4.13.1. Client will use Bidders submission for evaluation and bidders are requested to be informed themself
accordingly and keep watch on the Mahatenders portal for any updates and information.
4.13.2. In no case modifications and/or alterations and/or amendments in Financial Bid shall be permitted after
the opening of the Bid.
4.13.3. The Financial Bid shall be subject to public opening. The date for the opening of the Financial Bid is
specified in the Calendar of Events with respect to the Tendering. All shortlisted Bidders, without
exception, are cordially invited and encouraged to be present at the Bid Opening.
4.13.4. The Tendering process operates under a two-stage Bid system. In the first stage, Technical Evaluation is
conducted in accordance with the Eligibility Criteria and based on the merits acquired through higher
technical and financial qualifications. A list of shortlisted Bidders, resulting from the Technical Evaluation,
shall be published on the Maharashtra Government e-Marketplace (Mahatenders) portal. Only these
shortlisted Bidders will be eligible to submit the Financial Bid.
4.13.5. In the event that not more than three tender submissions have been received and have qualified
technically, the tender may be recalled for a second time, with an additional grace period of 7 days for
participants to submit their proposals. It is important to note that CCCF (Central Contract Clearinghouse
Facility) does not guarantee separate invitations to prospective parties in such cases.
4.13.6. Following the second tender call and the expiration of 7 days from the second call, or whichever is later,
if not more than three submissions that meet the technical qualifications have been received, the Tender
may be called for a third time, allowing a submission window of 14 days. In the event it is reported that
there are fewer than three participants in the tender, CCCF, in the interest of expediting the process, may
proceed with a single Bid, provided the Bidder meets the technical qualification criteria.
Information relating to the examination, clarification, evaluation and comparison of Bids and
recommendations for the award of a contract shall not be disclosed to Bidders or any other person
officially concerned with such process until the award to the successful Bidder has been
announced. Any effort by a Bidder to influence Client’s processing of Bids or award decision may
result in the rejection of his Bid.
4.15 Terms and Conditions: Rest Terms and conditions will be as per draft contract agreement
________________________________________________________________________________
Room Number 2, Ground Floor, Niyojan Bhawan, Office of the District Collector
Chandrapur, Maharashtra, 442 401 - India
CIN: U85100MH2018NPL313419
Annexure 1
1.1 Order of Works completed
Financial Year Work Order Date of Work Description of Work Order Date of
No Order work issuing completion
Agency
2018-19
2019-20
2020-21
2021-22
2022-23
1.2 Order of Works in hand (in current Financial Year)
________________________________________________________________________________
Room Number 2, Ground Floor, Niyojan Bhawan, Office of the District Collector
Chandrapur, Maharashtra, 442 401 - India
CIN: U85100MH2018NPL313419
Annexure 2
(On non-judicial stamp paper of Rs 500/-)
To,
Date:_____
Chandrapur Cancer Care Foundation,
New Government Medical College Campus,
Ballarshah Bypass Road
Chandrapur, Maharashtra, India, 442401
Dear Sir(s),
In response to the Notice Inviting Tender (NIT) referenced above, we [Bidder] having it
registered office [full registered address] and [MSME/CIN number] and in the capacity of the
Authorised Signatory duly authorised, we hereby declare that –
(i) We are suppliers, makers and manufacturers of items in connection with the Scope of
WORK.
(ii) We are willing to provide the Warranty and after sales service during the period of
Warranty Period /Defect Liability Period as per requirements of the Agreement.
(iii) We confirm that the IT Equipment supplied by us under the Work Order shall confirm all
the Technical Specifications and Quality Parameters set out in the Agreement, and is top
of the line latest technology.
(iv) We have not been blacklisted/ debarred by any Governmental Authority (as defined in the
Agreement).
(v) We have never been convicted for any criminal or economic offences by any Court in India
or abroad.
(vi) We are neither insolvent, in receivership, bankrupt or being wound up, nor having our
affairs administered by a court or a judicial officer, nor have our business activities
suspended and are not subjected to any legal proceedings for any of the foregoing reasons.
(vii) We have the capability to service and provide comprehensive maintenance for the WORK
across India with ability to keep uptime commitment as per the requirements of the
Agreement.
All the information provided in the tender submission is accurate, complete, and to the best of our
________________________________________________________________________________
Room Number 2, Ground Floor, Niyojan Bhawan, Office of the District Collector
Chandrapur, Maharashtra, 442 401 - India
CIN: U85100MH2018NPL313419
knowledge, true. We acknowledge and are well aware that any instance where CCCF observes or
is reported or it is discovered that any information provided is false or misrepresented or
incomplete our submission is subject to rejection along with forfeiture of Bid Security.
For and on behalf of [FULL NAME OF SUPPLIER].
Authorized Signatory
________________________________________________________________________________
Room Number 2, Ground Floor, Niyojan Bhawan, Office of the District Collector
Chandrapur, Maharashtra, 442 401 - India
CIN: U85100MH2018NPL313419
Annexure 3: Technical Proposal
Name of the Project: Chandrapur Cancer Care Hospital
Proposed Work Methodology (describe your proposed work methodology in 250 words):
Proposed Resource Plan (present in level 1 your work planning with resource planning such that you proposed
completion in the stipulated time period):
Describe resource planning in all phases of Re-Designing/ Value engineering, procurement, installation, testing ,
commissioning and handing over (start dates, manpower, end dates, remarks etc).
Special Manpower should have to proposed for the works, this may incudes relocation of persons from your
ongoing project.
Describe Machineries and Equipment proposed for mobilization. Provide complete comprehensive machinery
and equipment list duly signed stamped.
List out similar nature of work you have furnished/ongoing. As per aneexure-1, Describe the similarities and
completion time.
Note: Similar nature of works means significantly of similar nature and from similar industry and of to the
equivalent cost at completion.
Material/Equipment as per approved make-list volume-C4 - 7, Your confirmation statement with respect to
Items proposed in Volume-C4 - 7 are us under.
________________________________________________________________________________
Room Number 2, Ground Floor, Niyojan Bhawan, Office of the District Collector
Chandrapur, Maharashtra, 442 401 - India
CIN: U85100MH2018NPL313419
SN Approved Make as per Vol VII Proposed Make Authority Letter Supporting
submitted (Yes/No) documents (eg.
Product
broacher(s),
MTC(s), OEM
Credentials
# If Bidder proposed to use more than one product, he should submit details for all products.
Only approved make(s) will be accepted and deviation therein is not acceptable.
________________________________________________________________________________
Room Number 2, Ground Floor, Niyojan Bhawan, Office of the District Collector
Chandrapur, Maharashtra, 442 401 - India
CIN: U85100MH2018NPL313419
Draft Contract Agreement
SELECTION OF VENDOR FOR SUPPLY & INSTALLATION OF
C4. IT EQUIPMENT CHANDRAPUR CANCER CARE HOSPITALS
1
DATED
AGREEMENT
BETWEEN
AND
2
Table of Contents
1.0 Definitions 5
2.0 Interpretation 8
3.0 Effective Date 9
4.0 The “Client/Employer”, “Engineer” and “Main Contractor” 9
5.0 Obligations of the Contractor 10
6.0 Scope of Work 13
7.0 Contract Price 15
8.0 Payment Terms 15
9.0 Time for Completion 17
10.0 Insurance 17
11.0 Inspection, Testing and Quality Control 18
12.0 Installation and Acceptance 18
13.0 Intellectual property 19
14.0 Liquidated Damages 19
15.0 Change in Works 19
16.0 Confidentiality 20
17.0 Compliance with Applicable Law 20
18.0 Indemnity 21
19.0 Termination 22
20.0 Payment upon Termination 22
21.0 Governing Language 23
22.0 Notices 24
22.0 Dispute Resolution Mechanism 24
23.0 Assignment 26
24.0 Costs 26
25.0 Severability 26
3
This Agreement (“Agreement”) is made on this _ day of
by and between:
The Chandrapur Cancer Care Foundation (CCCF) and contractor are individually referred
to as a“Party” and collectively to as the “Parties”.
WHEREAS:
(A) CCCF is a non-profit organisation supported jointly by Government of Maharashtra and Tata
Trusts. CCCF is a company registered under Companies Act, 2013 with license under
section 8(1) of the Act.
(B) Accordingly, under Section 8 of the Company Act, 2013 a non-profit SPV by name
“Chandrapur Cancer Care Foundation - CCCF” was incorporated on September 4, 2018 and
on October 29, 2018, District Medical Education Research, District Mineral Foundation and
Tata Trust entered into a Memorandum of Understanding (MOU).
(C) In the development of the hospital, CCCF has engaged Main Contractor for Civil & Site
Development, Electrical, HVAC, Fire Fighting, Public Health Engineering who is presently
Room Number 2, Ground Floor, Niyojan Bhawan, Office of the District Collector,
Chandrapur, Maharashtra, India, 442401
CIN: U85100MH2018NPL313419
working at Site. The certain Packages including IT Equipment that are excluded from the
Main Contractor’s Scope of the Works and are proposed for the procurement through a
separate tendering process.
(D) [ABC] has experience, expertise and financial capacity for WORKs of “the design, supply,
installation, testing and commissioning and also includes redesigning of the IT
Equipment” [ brief about the supplier and its products/services]
(E) CCCF had invited open online bids for the Package [C4 –IT Equipment] and published
Notice Inviting Tender (NIT) in newspaper(s) for participation from the competence and
qualified vendors and the Vendor [ABC] has participated in the bidding process.
(F) Site visit was conducted by CCCF allowing all the participants to be acquainted with the
Site geography, hydrology, financial and political conditions and participants before the
bid submission has reviewed conditions and progress at Site. Clarification sought by the
participants have been addressed and recorded which are forming part of the
Agreement.
(G) After evaluation of the bids received, and based on [ABC]’s financial bid dated [●]
(“Financial Bid”) and pursuant to the mutual discussion between the Parties, Chandrapur
Cancer Care Foundation had, on satisfactory verification of the vendor eligibility criteria
(as specified in the Tender), accepted the Financial Bid and Technical Bid and issued
its Letter of Intent dated (“Letter of Intent” or “LOI”);
(H) Chandrapur Cancer Care Foundation and [ABC] are now desirous of entering into this
Agreement and recording the broad understanding and framework regarding the
preferred customer/supplier relationship between the Parties. The Parties herein under
agreed for the price of WORK for supply and fixing/installation of the WORK, needed for
the Programme. On the basis of the principles agreed in this Agreement, Chandrapur
Cancer Care Foundation or the Consignees (as the case may be) shall issue Purchase
Orders (as defined hereinafter) to [ABC], as may be required for the purposes of the
Programme.
NOW, THEREFORE, in consideration of the foregoing and the respective covenants and
agreements set forth in this Agreement and the receipt and sufficiency of which is hereby
acknowledged, and intending to be legally bound hereby, the Parties agree as follows.
1.0 DEFINITIONS
(a) with respect to any Person other than a natural person, any other Person,
including a natural person that is directly or indirectly, through one or more
intermediate Persons, controlling, controlled by, or under common control with,
such Person; and
Page 5 of 26
________________________________________________________________________________
Near New Government Medical College and Hospital, Chandrapur on Ballarsha, By-pass Road,
Chandrapur, Maharashtra, 442 401 - India
CIN: U85100MH2018NPL313419
(b) with respect to any natural person: (i) any other Person that is a relative of such
natural person; or (ii) any entity that is directly or indirectly controlled by such
natural person and/or the relative of such natural person;
1.2. “Applicable Laws” shall mean any statute, law, regulation, ordinance, rule, judgement,
order, decree, bye-law, approval, directive, guideline, policy, requirement or other
governmental restriction or any similar form of decision of, or determination by, or any
interpretation or administrative order having the force of law of any of the foregoing, by
any Governmental Authority having jurisdiction over the matter in question;
1.3. “Business Day” means any day other than (a) a Saturday or a Sunday or (b) a day on
which banking institutions are closed in India;
1.4. “Contract Price” shall have the meaning ascribed to such terms in Clause 7.0: Contract
Price and Contractor after careful assessment of the tender documents and draft contract
agreement acknowledged and ascertain that the Contract Price constitutes full and
comprehensive compensation to undertake performance of all the obligations in
accordance with the stipulated terms and conditions set forth in this agreement;
1.5. “Contractor” is a Party to the contract and shall be referred as stated in the recital;
1.6. “Design” shall have the meaning ascribed to such term in Clause 6;
1.7. “Dispute” shall have the meaning ascribed to such term in Clause 21;
1.8. “Defect Liability Period” shall The Defects Liability Period shall be for 12 (twelve) months
after Final Acceptance Certificate, unless extended in accordance with the Contract.
1.9. “Effective Date” shall have the meaning ascribed to such term in Clause 3;
1.10. “Bill of Quantity” shall have meaning the Items quantity required to complete the WORK;
1.11. “Final Acceptance Certificate or FAC” means the certificate issued by CCCF after Fixing in the
manner acceptable to CCCF;
1.12. “Force Majeure Event” means an exceptional event or circumstance or a combination thereof: (a)
which is beyond the affected Party’s reasonable control, (b) which the affected Party could not
reasonably have anticipated and provided against before entering into the Contract, (c) which,
having arisen, the affected Party could not reasonably have avoided or overcome with the exercise
of reasonable degree of skill and care, and (d) which has not resulted from the negligence of the
affected Party or the failure of such Party to perform its obligations under the Contract. Without
Page 6 of 26
________________________________________________________________________________
Near New Government Medical College and Hospital, Chandrapur on Ballarsha, By-pass Road,
Chandrapur, Maharashtra, 442 401 - India
CIN: U85100MH2018NPL313419
limiting the generality of the foregoing, Force Majeure events shall include the following: (a) War,
hostilities (whether war be declared or not). Invasion. Act of foreign enemies. (b) Rebellion,
terrorism. Revolution, insurrection. military or usurped power, or civil war, (c) Riot, commotion,
disorder, strike or lockout by persons other than the Contractor's Personnel and other employees
of the Contractor and Sub- contractors. (d) War, explosive materials, ionizing radiation or
contamination by radio-activity, except as may be attributable to the Contractor’s use of such
munitions, explosives. Radiation or radioactivity and (e) Natural catastrophes such as earthquake,
hurricane or volcanic activity.
For avoidance of doubt, the following shall not constitute Force Majeure events: (a) shortage or
unavailability of labour, materials, equipment, plant and machinery, fuel or other consumables
unless such shortage or unavailability is a direct result of a Force Majeure event; (b) any increase in
cost, prices, rates, wages, commissions, fees, duties or other levies; and (c) any strikes, lockouts or
other stoppage of work or labour dispute by the Contractor’s Personnel or any employees or staff
of the Sub-Contractor.
1.13. “Governmental Authority” shall mean any country or government, any state, province or other
political subdivision thereof and any entity exercising executive, legislative, judicial, regulatory or
administrative functions of or pertaining to government, including any national, regional or local
government, any subdivision, agency, commission or authority thereof, including any port authority,
regulatory authority, or any quasi-governmental organization;
1.14. “Information” shall have the meaning ascribed to such term in Clause 16;
1.15. “Inspection” means activities such as measuring, examining, testing, gauging one or more
characteristics of the WORK or Service and comparing the same with the specified requirement to
determine conformity;
1.16. “Intellectual Property” means recognized protectable intellectual property of a Party such as
patents, utility models, copyrights, corporate names, trade names, trademarks, trade dress, service
marks, applications for any of the foregoing, software, firmware, trade secrets, mask works,
industrial design rights, rights of priority, know how, design flows, met homologies and any and all
other intangible protectable proprietary information that is legally recognized;
1.17. “Liquidated Damages” shall have the meaning ascribed to such term in Clause 14;
1.18. “Main Contractor” shall have the meaning ascribed to such term in Clause 4.6. Contractor shall
work, in coordination with Main Contractor and other contractor(s) in manner shall not hinder or
affect any or all their works. He shall be responsible for working in co-ordination and in no case he
shall be excused for the delays occurred to him;
1.19. “Project Management Consultant” shall have the same meaning ascribed in such terms in Clause
Page 7 of 26
________________________________________________________________________________
Near New Government Medical College and Hospital, Chandrapur on Ballarsha, By-pass Road,
Chandrapur, Maharashtra, 442 401 - India
CIN: U85100MH2018NPL313419
4.4 and shall also be referred as “Engineer” for the purpose of this Contract.
1.20. “Person” shall mean any individual or other entity, whether a corporation, firm, company, joint
venture, trust, association, organization, partnership or proprietorship, including any Governmental
Authority or regulatory body;
1.21. “Rupee/INR/Rs.” shall mean the lawful currency of the Republic of India;
1.24. “Site” shall mean the site where the relevant CCCF shall have the WORK is going to installed and
commissioned by [ABC];
1.25. “Sub-contractor” means any person engaged by [ ABC] for the purposes of this Agreement and
fulfilment of this Contract;
1.26. “Taxes” shall include income tax, applicable goods and service tax, customs duties (if applicable),
fees, service and sales duties, levies, wharfage charges, stevedoring charges (if applicable), port
charges or any other taxes, levied from time to time;
1.27. “WORK” shall include detail design, supply, installation, testing and commissioning of the IT
Equipment for the Cancer Hospital being developed near New Government Medical College and
Hospital in the manner fit for the purpose of successful operation of the Hospital in compliance
with the requirements of Atomic Energy Regulation Board (AERB) and/or National Health Authority
(NHA) and/or requirement of other authorities. The WORK includes all necessary and adequate
temporary works, works broadly specified in Clause 6: Scope of Work; Part V: Bill of Quantities
(BoQ) Part VI: Specifications and outlined in this agreement;
2.0 INTERPRETATION
(d) heading, sub-heading and bold typeface are only for convenience and shall be
ignored for the purposes of interpretation;
Page 8 of 26
________________________________________________________________________________
Near New Government Medical College and Hospital, Chandrapur on Ballarsha, By-pass Road,
Chandrapur, Maharashtra, 442 401 - India
CIN: U85100MH2018NPL313419
(e) any term or expression used but not defined herein shall have the same meaning
attributable to it under Applicable Law;
This Agreement shall come into force and effect from the date on which it is signed and executed by the
Parties (“Effective Date” or the “Commencement Date”).
5.1. The Contractor shall, subject to the provisions of the Contract, and with due care and
diligence, execute complete and maintain the Works, rectify any defects therein in
accordance with provisions of the Contract and provide all labour including the
supervision thereof, materials, constructional plant and all other things, whether of a
temporary or of a permanent nature, required in and for such execution, completion,
rectification of any defects and maintenance. The works shall be carried out by the
Contractor in strict accordance with the Contract to the satisfaction of the Engineer
and shall comply with and adhere strictly to the Engineer's instruction and directions
on any and all matters whether mentioned in the Contract or not.
5.2. The Contractor shall promptly notify the Engineer immediately on receipt of
information/drawings of any error, omission, fault or any other defect in the design
or specifications/drawings for the works which he discovers at post contract stage
only when reviewing the documents or in the process of execution of the works.
5.3. The Contractor shall afford the Engineer and to his authorized representative every
facility and assistance for examining the works and materials and checking and
measuring works and materials.
5.4. The Contractor shall carry out and complete the works in accordance with Good
Engineering Practices and using materials and workmanship of the best quality and
standards provided that where and to the extent the approval of the quality of
materials or of the standards of workmanship is a matter of opinion, such quality and
standards shall be to the satisfaction of the Engineer. Dissatisfaction of quality,
standard and workmanship by the Engineer shall not be disputed by the Contractor.
5.5. The Contractor shall provide at his cost everything necessary for the proper execution
Page 10 of 26
________________________________________________________________________________
Near New Government Medical College and Hospital, Chandrapur on Ballarsha, By-pass Road,
Chandrapur, Maharashtra, 442 401 - India
CIN: U85100MH2018NPL313419
of the works according to the intent and meaning of the Drawings, Schedule and
Specifications taken together with whether the same may or may not be particularly
shown or described therein provided that the same can reasonably be inferred there
from, and if the Contractor finds any discrepancy in the Drawings or between the
Drawings, Schedule and Specifications, he shall well in advance to commencement of
work refer the same in writing to the Engineer who shall decide and communicate to
the Contractor and the Contractor shall follow the same.
5.6. The Contractor is bound to carry out all the works necessary for the completion of the
job even though such items are not included in the Schedule/ Technical Specifications.
Engineer with the prior consent in writing from the Employer shall issue written
instructions to the Contractor in respect of any additional items and their quantities.
5.7. The Contractor must co-operate with the Main Contractor, other contractors,
consultants, parties appointed by the Employer so that the work shall proceed
smoothly to the satisfaction of the Engineer.
5.8. The Contractor must bear in mind that all the work shall be carried out strictly in
accordance with the Contract documents and drawings and in compliance of the
requirements of the local public authorities and to the
requirements/satisfaction/direction of the Engineer and no deviation on any account
will be permitted.
5.9. The Contractor shall have to use materials of the makes/manufacturers specified in
the list of materials of approved brand and/or manufacture contained in Contract
documents. Subject to the terms of the Contract with respect to Clause 15 [Change in
Works], Employer has the right to change the standards, makes/manufacturers of any
items and any changes in the Contract Price shall be determined as per Clause 15.2.
5.10. There may be at any time hindrances to the work of the Contractor due to the on-
going activities of other agencies which Contractor has to bear without any demur
and no claim for time extension or claim for any payment on that account shall be
entertained. The Contractor shall, in accordance with the requirements of the
Engineer, cooperate with and afford all reasonable opportunities for carrying out
work by such other Contractors and their workmen as might be engaged by the
Employer, who may be employed in execution on or near the Site, of any work not
included in the Contract or of any contract which the Employer may enter into in
connection with or ancillary to the Works.
Page 11 of 26
________________________________________________________________________________
Near New Government Medical College and Hospital, Chandrapur on Ballarsha, By-pass Road,
Chandrapur, Maharashtra, 442 401 - India
CIN: U85100MH2018NPL313419
5.11. The access to the Site is not exclusive, Contractor shall coordinate with Main
Contractor and other agencies appointed by Employer for smooth operations of the
Site works.
5.12. The approach access to the Site and works shall be used by any other agency engaged
by the Employer for other jobs.
5.13. If any part of the Contractor’s work depends, for proper execution or result, upon the
work of any other contractor or vendor, the Contractor shall promptly report in
writing to the Engineer any defects in such work that render it unsuitable for such
proper execution and result. Contractor’s failure to report shall constitute acceptance
of other Contractor’s work as fit and proper for the reception of his own work, except
as to defect, which may develop in the other Contractor’s work after the proper
execution of his own work.
5.14. The contractor shall not assign or Sub-Contract any work without the written approval
of the Engineer/ Engineer-in-Charge.
5.15. The contractor shall take full responsibility for the adequacy, stability and safety of all
Site operations and methods of construction, provided that the contractor shall not
be responsible, except as may be expressly provided in the contract, for the design or
specification of the permanent works, or for the design or specification of any
temporary works prepared by the Architects.
5.16. WAIVER ON LIENS: To the full extent permitted by law, the Contractor (1) waives and
releases any rights to construction or mechanics’ liens or similar liens that it may have
on any of the Project, or Project assets, or the property constituting the Project site,
and (2) agrees that it will not (and it will require that no consultant or Sub Contractor
or supplier shall) have any such liens on any part of the Project or Project assets, or
the property constituting the Project site. At the Client’s request, the Contractor shall
execute, and cause the consultant, or subcontractors or suppliers to execute,
appropriate additional documents to give effect to this waiver. If, despite the waiver,
any such liens are asserted, the Contractor will promptly take whatever reasonable
action is necessary to remove them. If the Contractor fails to do so promptly, the
Client may do so, and charge all resulting costs, including attorneys’ fees actually
incurred, to the Contractor.
5.17. The Contractor shall be responsible for management of construction power and
water resources at Site. In the event the Main Contractor possess construction power
Page 12 of 26
________________________________________________________________________________
Near New Government Medical College and Hospital, Chandrapur on Ballarsha, By-pass Road,
Chandrapur, Maharashtra, 442 401 - India
CIN: U85100MH2018NPL313419
and water facility at Site, the Contractor may seek assistance form the Main
Contractor in this regard and CCCF bears no obligations and responsibilities to
facilitate for such provisioning.
5.18. The Contractor shall assume full responsible for maintenance and operation ensuring
hygiene conditions of accommodation provided for its staff and labourers. CCCF
reserve rights to conduct regular inspection of the condition of the accommodation
provided by the Contractor and failure to do so shall be construed as breach of the
Health, Safety and Environment. The Contractor shall provide regular reports on such
conditions has been maintained.
5.19. The Contractor shall provide report of compliance of labour laws and all applicable
laws in connection to the construction and installation of the services.
6.1. The Contractor shall execute and complete the Scope of Work for the relevant Site
in accordance with the Bill of Quantities and the Specifications. If any services,
functions or responsibilities which are not specifically described in the Scope of
Work or in the Contract but are either inherent, necessary or customarily part of
such Scope of Work, or are necessary for the proper performance of the Scope of
Work in accordance with the Contract, then the same shall be deemed to be
included within the Scope of Work to be delivered for the Contract Price, as if such
services, functions or responsibilities were specifically described in the Contract
unless, such services, functions or responsibilities were mutually agreed to be
specifically excluded in writing.
6.2. CCCF has provided preliminary drawings to aid the construction process. However,
it is the Contractor’s responsibility for further development of the design and
drawings necessitate proper performance of the Scope of Work. The design and
drawing shall be submitted for the Engineer and/or Employer approval for the
execution purpose.
6.3. All Work provided by or for the Client to the Contractor shall comply with the
applicable Laws, Permits, Standards, Specifications, the Contract and Good
Engineering Practices.
6.4. The Works to be provided by the Contractor under the Contract shall, without
prejudice to the generality of the foregoing include but not be limited to the
following:
(a). Provision of all necessary superintendence, labour, goods, construction
materials and Contractor’s Equipment, chemicals, utilities, tools, supplies and
other consumables and services and Works;
i) Rectification of Defects and deficiencies and / or remedying of Defects and
Page 13 of 26
________________________________________________________________________________
Near New Government Medical College and Hospital, Chandrapur on Ballarsha, By-pass Road,
Chandrapur, Maharashtra, 442 401 - India
CIN: U85100MH2018NPL313419
deficiencies discovered or occurring during the Defects Liability Period;
ii) Further, notwithstanding any sub-contracting by the Contractor, the
Contractor agrees and confirms that the Contractor shall be solely
responsible to the Employer for successful execution and completion of all
the Works as specified in the Contract.
6.5. On successful Testing on Completion and in any event prior to the issue of the Final
Acceptance Certificate, the Contractor shall submit to the Engineer, Four [4] copies
of the “As Built” documents. Such part shall not be considered to be completed for
the purposes of taking-over under Clause [Employer’s Taking Over] until these
documents has been submitted to the Engineer. The Employer shall have the right
to make as many copies of such documents as may be required. The Works shall not
be considered to be completed for the purposes of taking over until the Engineer
has received these documents.
6.6. In order to obtain Final Acceptance Certificate, the Contractor is mandated, without
limitation, to submit followings “As Built” documents in Four [4] copies:
i. Red Line Mark-up drawings
ii. “As build” drawings
iii. Warrantees and Guarantee subrogated under the name of CCCF
iv. Spares (10%)
v. Operations and Maintenance manuals
vi. Periodic and precautionary repair and maintenance schedule
6.7. If the Contractor becomes aware of an error or defect of a technical nature in a
document which was prepared for use in executing the Works, the Contractor shall
promptly give notice to the Employer of such error or defect.
6.8. Notwithstanding anything, the Time for Completion shall not be extended, and the
Contract Price shall not be adjusted for any such error specified in the Specifications
which the Contractor being an experienced contractor exercising due care should
have discovered when examining the Site and the Specifications, before acceptance
of the Letter of Award.
6.9. Quantities in the Bill of Quantities are fair estimate of the Scope of Work. The
Contractor has himself acquainted with the requirements of the Scope of Works to
the extent required for the completion & delivery of the works in accordance with
the Technical Specifications. The Client reserves the right to change the estimated
quantity of WORK and timelines for supply and fixing of WORK at its discretion
without assigning any explanation whatsoever.
6.10. Contractor shall be paid on actual quantities based on measurement for each line of
item in the BOQ for variation made as per Clause 6.7.
Page 14 of 26
________________________________________________________________________________
Near New Government Medical College and Hospital, Chandrapur on Ballarsha, By-pass Road,
Chandrapur, Maharashtra, 442 401 - India
CIN: U85100MH2018NPL313419
7.0 CONTRACT PRICE
7.1. Contract Price shall be Rs XXXX (Rupees XXXXX Only) calculated based on the Item
Rates and Bill of Quantities as per Volume III. The Contract Price shall be considered
to include, Main Contractor’s Overhead and Profit, GST, Cess, royalty and other
taxes applicable as of Base Date.
7.2. The Contract Price for the performance of the entire Scope of Work and obligation
of the Contractor shall be:
Package Amount as per BOQ
(in INR)
Package (__) Name of the Package
final price as per BoQ
GST – as applicable (
mention the % ____)
Subtotal
Labour Cess - as
applicable ( mention
the % ____)
Final Total
7.3. All taxes and cess are included in the Contract Price and as and when required by
CCCF/PMC the Contractor shall furnish details of payments of labour cess, PF
payments, GST compliances, whatsoever, or any statutory payments CCCF deem fit.
7.4. Main Contractor Overhead and Profit: Contractor shall compensate establishment
cost related to the cost of electricity, water, disposal of waste etc. to Main
Contractor verified by CCCF/PMC.
7.5. The applicable rate for GST and Labour Cess shall be 18% and 1% respectively.
7.6. In case Main Contractor competes in the Bid and selected as the lowest bidder, his
price shall include all overheads and profit, no extra payment shall be made on this
account, whatsoever.
7.7. The Contractor shall be deemed to have satisfied itself as to the sufficiency of the
Contract Price, which shall, except as otherwise provided for in the Contract, cover
all its obligations under the Contract.
8.3. No Idle, No Claims and No Liability Clause: No Idle, No Claims and No Liability shall
be payable in respect of the WORK Works for any consequences which may place
Contractor in a financial position other than what is projected at the time of tender.
8.4. Retention Money: An amount equal to 5% (five percent) of the Contract Price shall
be retained towards Retention Money Security such monies of the gross amount of
each Payment Certificate till the amount so retained by the Employer reaches 5%
(five percent) of the Contract Price. The Contractor is entitled to get release the
Retention Money after completion of Defect Liability Period subject to all defects
have been rectified to the satisfaction of Engineer.
8.5. Mode of Measurement: Unless and otherwise not mentioned in the Technical
Specification the mode of measurement shall conform to the standard industrial
practice and shall be as per the relevant items of the CPWD specification.
8.6. Performance Security: The Contractor shall furnish to the Client, at its own cost and
expense, as security against for the performance of the Contract, either (a) an
unconditional irrevocable bank guarantee as Performance Bank Guarantee and in the
format annexed hereto as Schedule 8 (“Performance Bank Guarantee”), or (b) a fixed
deposit receipt, both for an amount equal to the 5% (five per cent) of the Contract
Price ((a) and (b) collectively referred to as “Performance Security”) within 15
(Fifteen) days of the date of issuance of the Letter of Award and before entering into
the Agreement.
8.7. The Performance Security shall be issued by any Indian scheduled bank / nationalized
bank acceptable to the Employer having its branch office at Nagpur and Chandrapur,
Maharashtra.
8.8. The provision of the Performance Security shall be a condition precedent to the
Contractor being entitled to receive any payment under the Contract
notwithstanding:
(a) the passing of the Commencement Date or the Commencement Date for Pre-
Construction Works; or
(b) the issuance by the Engineer of any payment certificate.
8.9. The Contractor shall ensure that the Performance Security shall be valid and
enforceable up to 60 (Sixty) days from the date of expiry of the Defects Liability
Page 16 of 26
________________________________________________________________________________
Near New Government Medical College and Hospital, Chandrapur on Ballarsha, By-pass Road,
Chandrapur, Maharashtra, 442 401 - India
CIN: U85100MH2018NPL313419
Period.
8.10. Failure of the Contractor to so extend the validity of the Performance Security 28
(twenty-eight) days prior to its scheduled expiry, shall entitle the Employer to encash
the Performance Security. The Employer shall 28 (twenty-eight) days prior to the
scheduled expiry of the guarantee, issue a notice to the Contractor to renew the bank
guarantee. However, failure of the Employer to not issue such notice shall not
prejudice the right of the Employer to invoke the bank guarantee prior to its
scheduled expiry or absolve the Contractor from its responsibility and obligation to
renew the said bank guarantee.
8.11. Without prejudice to the above, should there be any increase in the Contract Price,
the Contractor shall promptly increase the value of the Performance Security by an
equal percentage. Failure to do so shall be a material breach of this Contract and shall
entitle the Employer, without prejudice to its other rights under the Contract, either
to withhold any and all payments to the Contractor or invoke forfeiture of the Bank
Guarantee.
9.1. Time is of the essence in the performance of the respective obligations of the
Parties. If any time period specified herein is extended, such extended time shall
also be of the essence;
9.3. The time and date of Delivery of the _________ as stipulated in the above Clause
9.2 shall be deemed to be the essence, and Delivery must be completed not later
than the date specified therein. In the event any extension of time is granted to
contractor, such extended time shall be deemed to be of essence.
9.4. Save for delays pursuant to occurrence of a Force Majeure Event, any delay by
contractor in Delivering the Work:______ in accordance with the Contract shall
entitle the Employer to any or all of the following remedies:
iii. termination of the relevant Full or Party of Work Order and procurement of
the relevant Work from any third party, at the cost and risk of [ABC]
10.0 INSURANCE
Page 17 of 26
________________________________________________________________________________
Near New Government Medical College and Hospital, Chandrapur on Ballarsha, By-pass Road,
Chandrapur, Maharashtra, 442 401 - India
CIN: U85100MH2018NPL313419
The Contractor shall at its expense take and maintain in effect, or cause the Sub-
Contractor to be take and maintained in effect, during the performance of the Contract,
the insurances, for such sums and with the deductibles and other conditions, as specified
below in accordance with the terms of this Contract. The identity of the insurers and the
form of the policies shall be subject to the approval of the Employer being co-insured.
These insurances shall be effective from the Commencement Date for Pre- Construction
Works, until the date of issue of the Performance Certificate for the Works.
The Employer shall be named as co-insured under all insurance policies taken out by the
Contractor pursuant to this Clause. All insurer’s rights of subrogation against such co-
insured for losses or claims arising out of the performance of the Contract shall be waived
under such policies
Inspection and Testing: contractor shall, if requested by the Employer, at the cost and
expense of such Contractor,have the WORK Inspected by recognized/ reputed agency,
such as SGS, Lloyd, Bureau Veritas, prior to Delivery of the Work, and furnish necessary
certificate from the said agency, certifying that the Work conforms to the Technical
Specifications and Quality Parameters as set out in this Agreement.
Remedy: Notwithstanding any previous test or certification, the Engineer may instruct the
Contractor to: (a) remove from the Site and replace any Equipment, Materials which is
not in accordance with the Contract, (b) remove and re-execute any other work which is
not in accordance with the Contract, and (c) execute any work which Urgent Work is
required for the safety of the Works, whether because of an accident, Unforeseeable
event or otherwise.
The Engineer under the instruction of Employer shall provide Final Acceptance
Certificate, confirming that all the works has been delivered and installed in terms of this
Page 18 of 26
________________________________________________________________________________
Near New Government Medical College and Hospital, Chandrapur on Ballarsha, By-pass Road,
Chandrapur, Maharashtra, 442 401 - India
CIN: U85100MH2018NPL313419
Agreement and fit for the purpose.
14.1. If [ABC] fails to Supply and Fix any or all of the WORK or fails to perform the Services
within the period mentioned in this Contract, the Employer shall , without prejudice
to other non-monetary rightsand remedies available to the Employer, be entitled to
levy liquidated damages at the rate of 1% per week of delay or part thereof on
delayed supply of WORK until actual Deliveryor performance, subject to a maximum
of 10% of the WORK Price specified in the Contract (“Liquidated Damages”). In the
event such delay continues and the Consignee has levied the maximum amount of
Liquidated Damages on [ABC], the Consignee shall be entitled to terminate the
relevant Purchase Order, and in such case:
(a) [ABC] agrees and undertakes that it shall reimburse all amounts paid by the
Employer to [ABC] for the purposes of procuring the WORK; and
(b) The Employer shall be entitled to procure the WORK similar to those cancelled,
with such terms and conditions and in such manner as it deems fit and [ABC] shall
be liable to the Employer for incremental expenditure, if any, incurred by the
Consignee for arranging such procurement.
14.2. [ABC] hereby agrees that the Liquidated Damages specified above are genuine pre-
estimate of the loss and that such Liquidated Damages are not in the nature of a
penalty.
15.1. Subject to Clause 15.2, the Employer shall have the right to propose, and
subsequently require, Contractor from time to time during the performance of the
Contract to make any changes, variations, modifications, additions or deletions to
Page 19 of 26
________________________________________________________________________________
Near New Government Medical College and Hospital, Chandrapur on Ballarsha, By-pass Road,
Chandrapur, Maharashtra, 442 401 - India
CIN: U85100MH2018NPL313419
the Works, including approved Drawings or Specifications or other requirements
(“Change in Work”).
15.2. If the Employer proposes a Change in Work pursuant to Clause 15.1, the Employer
shall submit to the Contractor a notice, detailing the change requested (“Request
for Change Proposal”), requiring the Contractor to prepare and furnish to the
Engineer as soon as reasonably practicable a proposal (“Change Proposal”) which
shall include Estimated Cost; Effect on Time for Completion; Effect on Securities and
Guarantees.
15.3. Increase and Decrease in BOQ quantities does not constitute Changes in Work.
15.4. Change in cost shall be determined on actual quantity of work executed and the
prevailing market item rate approved by Employer. The prevailing market item rates
shall be minimum of latest Maha-SSR, latest DSR or lowest of three quotes collected
from qualified vendors (NSR).
16.0 CONFIDENTIALITY
16.1. All information which [ABC] receives or acquires from CCCF either in writing, orally
or through observation of CCCF’s operation, or in the course of [ABC]’s fulfilling its
obligations under this Agreement (“Information”), shall be held by [ABC] in
confidence at all times and [ABC] undertakes that it shall not use the Information
unless required by the Contract. Accordingly, [ABC] shall ensure that all recipients
of the said Information, including the [ABC]’s own employees, Sub-contractors,
[ABC] India, agents, officers and directors assume obligations identical in principle
with those which [ABC] assumes under this Clause.
16.2. In the event [ABC] is required by any Applicable Law to make disclosure of any such
Information, [ABC] shall consult with CCCF in advance to the extent reasonably
practicable as to the contents and timing of such disclosure in order for the other
party to have the opportunity to prevent the disclosure of the Information or to
obtain a protective order or other remedy. If such protective order or other remedy
is not obtained, [ABC] shall produce only that portion of the Information that it is
ordered to be disclosed. In the event that any Information is disclosed pursuant to
the foregoing, it shall not lose its confidential status through such disclosure.
(a) [ABC] has complied, in connection with this Agreement, with the Applicable Laws,
including anti-bribery, anti-corruption, anti-money laundering, trade control laws
or corrupt payment laws of India or any similar law applicable to itself that applies
Page 20 of 26
________________________________________________________________________________
Near New Government Medical College and Hospital, Chandrapur on Ballarsha, By-pass Road,
Chandrapur, Maharashtra, 442 401 - India
CIN: U85100MH2018NPL313419
to the activities of [ABC].
(b) [ABC] has not engaged in any activity, practice or conduct which would
contravene or otherwise constitute an offence under any applicable Corrupt
Payment Laws.
(c) All licenses, permits, consents, authorisations, registrations required by [ABC] for
the business activities under this Agreement including for supply of IT Equipment
and provisions of Services are valid and subsisting.
18.0 INDEMNITY
Without limiting any other remedy of Chandrapur Cancer Care Foundation and / or the
Consignee, [ABC] shall at its own expense, defend, indemnify and hold harmless
Chandrapur Cancer Care Foundation its directors, officers, employees, agents and
customers from and against any and all loss, cost, expense, claims, proceedings, actions,
demands or liability, including legal counsel fees and expenses, incurred or suffered by
Chandrapur Cancer Care Foundation, at actuals(“Loss”) resulting from, or arising out of or
in connection with [ABC]’s failure to comply with the terms of the Agreement, including
but not limited to:
(e) Loss arising out of claims of infringement of any Intellectual Property any patent
rights, copyrights or other intellectual property, proprietary or confidentiality
rights with respect to WORK, designs, techniques, processes and information
designed or used by [ABC] in provision of IT Equipment / Spare Parts under the
Agreement/Purchase Orders; or
The indemnity in the Clause 18 above is a continuing indemnity and survives termination
or expiration of this Agreement including Defect liability period (12 month ) after final
acceptance certificate unless extended in accordance with the contract.
Page 21 of 26
________________________________________________________________________________
Near New Government Medical College and Hospital, Chandrapur on Ballarsha, By-pass Road,
Chandrapur, Maharashtra, 442 401 - India
CIN: U85100MH2018NPL313419
19.0 TERMINATION
The Consignee for the purpose of this agreement is CCCF for who’s benefit the WORK was
awarded.
The Contract is also subject to termination in the event of Contractor’s default i. fails to
Comply a Notice to correct or remedied the defect in the WORK, binding agreement and
determination, and a decision made under Clause 21; ii. abandon the WORK or has
demonstrated intention not to continue performance under the Contract; iii. fails to
furnished the Performance Security and commence the WORK and found reasonable
evidence that Contractor is indulge in corrupt, fraudulences, collusive and coercive
practice.
19.2. Notwithstanding any rights and remedies that Chandrapur Cancer Care Foundation may
have, if [ABC] takes any action that constitutes, or could constitute a violation of the
Applicable Laws related to corrupt practice, Chandrapur Cancer Care Foundation may
immediately serve a default notice on [ABC] leading to termination of this Agreement, with
no financial obligation on the Employer.
19.3. The Consignee may, without prejudice to any other contractual rights and remedies
available to it, by written notice of default sent to [ABC], terminate the Contract,in whole or
in part, if [ABC] fails to deliver any or all of the WORK or fails to perform any other
contractual obligation(s) within the time period specified in the Contract, or within any
extension thereof granted by the Employer. In the event the Employer terminates the
Contract, in whole or in part, under this Clause 19, it may procure the WORK similar to those
cancelled, with such terms and conditions and in such manneras it deems fit and [ABC]
shall be liable to the Employer for incremental expenditure,if any, incurred by the Employer
for arranging such procurement. Unless otherwise instructed by the Employer, [ABC] shall
continue to perform the obligations under this Agreement, to the extent not terminated.
After termination of the Contract under Sub-Clause 19.1, for Termination for Contractor’s
Default, the value of the Permanent Works, Goods and Contractor’s Documents, and any
Page 22 of 26
________________________________________________________________________________
Near New Government Medical College and Hospital, Chandrapur on Ballarsha, By-pass Road,
Chandrapur, Maharashtra, 442 401 - India
CIN: U85100MH2018NPL313419
other sums due to the Contractor for work executed in accordance with the Contract shall
be determined and the valuation shall not include the value of any Contractor’s
Documents, Materials, Plant and Permanent Works to the extent that they do not comply
with the Contract.
The Client reserves the right to retain payment to the Contractor for the agreed or
determined amounts under this clause until such time as all costs, losses, and damages (if
applicable) have been fully recovered. This includes the expenses associated with the
satisfactory clearance of the Site by the Contractor, as per the Client's standards.
The Contractor shall entitle for (a) the value of work done and certified by the Client or its
Engineer and (b) the amount of any loss of profit or other losses and damages suffered by
the Contractor as a result of this termination. Client shall promptly return Performance
Security and may retain Contractor’s Document or Contractor’s Equipment and
Machineries against invoice at par with purchased price adjusted for depreciation.
This Agreement and the Contract, shall be written in the English language. In case any
Contract is submitted in Hindi language, the same shall be accompanied by English
translation, in which case, for purpose of interpretation of this Agreement and/ or
Purchase Order, the English translation shall prevail.
Page 23 of 26
________________________________________________________________________________
Near New Government Medical College and Hospital, Chandrapur on Ballarsha, By-pass Road,
Chandrapur, Maharashtra, 442 401 - India
CIN: U85100MH2018NPL313419
22.0 NOTICES
Any notice required or permitted to be given hereunder shall be sufficient if in writing and
(a) delivered in person or by express delivery or courier service, (b) sent by facsimile or
email of a PDF document (with written confirmation of receipt), or (c) deposited in the
mail registered or certified first class, postage prepaid and return receipt requested. Each
notice shall be deemed given when so delivered personally, or sent by facsimile or email
transmission, or, if sent by express delivery or courier service 1 (one) Business Day after
being sent, or if mailed, 5 (five) Business Days after the date of deposit in the mail. A notice
of change of address or facsimile number shall be effectiveonly when done in accordance
with this Clause 21.
Email : vaibhavgautam@tatatrusts.org
at:
Address
To the attention of :
Email :
Page 24 of 26
________________________________________________________________________________
Near New Government Medical College and Hospital, Chandrapur on Ballarsha, By-pass Road,
Chandrapur, Maharashtra, 442 401 - India
CIN: U85100MH2018NPL313419
the Employer or the Employer in connection with ambiguity related to the construction
contract; or the approvals granted unilaterally; or disagreements between the Parties related
to the Contracts and its interpretation which involves amounts more than Ten [10] lakhs Indian
rupees.
22.2. Matters related to and involve any fraudulent practice and/or conducts misleading to make
any contractual discussion(s) and/or not defined in the Arbitration and Conciliation Act 1996
(amendment Act 2015) shall not be considered as “Dispute” for the determination under this
Section.
22.3. All the arbitration proceedings shall be conducted in English language and the seat of
the arbitration is Mumbai. The law governing arbitration proceeding is the Arbitration and
Conciliation Act 1996 (amendment Act 2015) (hereinafter shall be referred as “the Act”) and
all the proceedings shall be as per the Arbitration and Conciliation Act 1996 (amendment Act
2015).
22.4. The aggrieved party, affected by any or a certain Dispute, shall by Thirty [30] days’ written
notice informs the other Party about its disagreement on certain instruction or decision or
determination which are commercial in nature and involve amounts more than Ten [10] lakhs
giving details of its disagreements. The aggrieved party shall give detailed grounds on effect
of any of certain Dispute.
22.5. Amicable Dispute Settlement: Parties shall make all endeavours to settle the Dispute
amicably in the manner and prescribed in this Section. Each dispute shall be noticed
separately.
22.6. In the event, the dispute has not been resolved in Thirty [30] days, the Dispute shall then be
referred to the Sole Conciliator. The Parties to the Contract agree that a person holding a
position of the Director of Chandrapur Cancer Care Foundation (CCCF) is appointed as the
Sole Conciliator. Any Party by written notice of Thirty Days [30] from the date of Contract
Agreement i.e. Effect Date shall express its disagreement on this appointment. The Sole
Conciliator shall make efforts to deliver a decision on the dispute in Thirty [30] days.
22.7. Any Party does not consider that the Dispute that was referred to the Conciliation
proceedings is fully resolved to its satisfaction, the Party shall by Thirty [30] days’ notice may
refer to the subject Dispute matter to the Sole Arbitration. The Dispute shall be finally settled
by arbitration in accordance with the relevant Act and the procedure adopted and agreed by
the Parties.
22.8. All the arbitration proceedings shall be as per current governing law in force i.e.
the Arbitration and Conciliation Act 1996 (amendment Act 2015). The Sole Arbitrator defined
as in Section 2(1) (d) of the Act and shall be appointed in accordance with Section 10 of the
Act.
22.9. The decision of the Sole Arbitrator shall be final and binding upon the Parties.
22.10. The costs and expenses of the arbitration, including the fees of the arbitration shall be borne
equally by each Party to the Dispute and each Party shall pay its own fees, disbursements and
other charges, except as may be determined in the arbitral award.
Page 25 of 26
________________________________________________________________________________
Near New Government Medical College and Hospital, Chandrapur on Ballarsha, By-pass Road,
Chandrapur, Maharashtra, 442 401 - India
CIN: U85100MH2018NPL313419
23.0 ASSIGNMENT
A Party shall not assign, either in whole or in part, its duties, responsibilities and
obligations under this Agreement or any Purchase Order, except to any Affiliate of such
Party, without the other Party’s prior written consent.
24.0 COSTS
Each Party shall bear and is responsible for its own costs in connection with the
negotiation, preparation, execution, and performance of this Agreement.
25.0 SEVERABILITY
25.1. If any provision of this Agreement or the application thereof to any Person or
circumstance shall be invalid or unenforceable to any extent for any reason
including by reason of any law or regulation or government policy, the remainder of
this Agreement and the application of such provision to Persons or circumstances
other than those as to which it is held invalid or unenforceable shall not be affected
thereby, and each provision of this Agreement shall be valid and enforceable to the
fullest extent permitted by Applicable Law.
25.2. If any Party determines that one or more of the rights under the Agreement or the
application thereof may become or has become unenforceable or may not be or is
not permitted under Applicable Law, the Parties shall consult and discuss in good
faith forthe purposes of entering into alternative agreements or arrangements that
provide for effectively the same material rights granted to the Parties hereunder to
reflect and give effect to the agreed commercial understanding between the Parties
in this regard.
Page 26 of 26
________________________________________________________________________________
Near New Government Medical College and Hospital, Chandrapur on Ballarsha, By-pass Road,
Chandrapur, Maharashtra, 442 401 - India
CIN: U85100MH2018NPL313419
SCHEDULE - 1
UNDERTAKING BY CONTRACTOR
(On Non judicial stamp of Rs 500/-)
Date: ______
To,
Chandrapur Cancer Care Foundation,
New Government Medical College Campus,
Bypass Road Chandrapur, Maharashtra,
India,442401
CIN: U85100MH2018NPL313419
Dear Sir(s),
Pursuant to the Purchase Order No. ____, we have shipped _____ (Description of the IT
EQUIPMENTS and in respect of the same, we hereby declare that –
(i) We are the original IT Equipment’s manufacturers, having registered office at__________.
(ii) We are willing to provide the Warranty and after sales service during the period of Warranty Period
/CMC Period as per requirements of the Purchase Order.
(iii) We confirm that the IT Equipment’s supplied by us under the Purchase Order conforms to the
Technical Specifications and Quality Parameters set out in the Purchase Order, andis top of the line
latest technology.
(v) We have never been convicted for any criminal or economic offences by any Court in India or
abroad.
(vi) We are neither be insolvent, in receivership, bankrupt or being wound up, nor having our affairs
administered by a court or a judicial officer, nor have our business activities suspended and are not
subjected to any legal proceedings for any of the foregoing reasons.
(vii) We have the capability to service and provide comprehensive maintenance for IT Equipment’s
across India with ability to keep uptime commitment as per the requirements of thePurchase Order.
All the information provided in the tender submission is accurate, complete, and to the best of our
knowledge, true. We acknowledge and are well aware that any instance where CCCF observes or is
reported or it is discovered that any information provided is false or misrepresented or incomplete our
submission is subject to rejection along with forfeiture of Bid Security.
Authorized Signatory
SCHEDULE- 2
(If Applicable any)
1. Payment under the Outright Purchase Model shall be made by wire transfer:
(a) Upon delivery of IT Equipment’s to the site location, Contractor shall be eligible to claim
70% of amount of item delivered and verified to have been received at the site. The
following documents will be necessary to claim the payment:
(ii) The amount being claimed (70% of the total amount) shall be clearly indicated in the
invoice.
(vi) Insurance certificate, certifying that the IT Equipment’s have been insured as per
the terms of the Agreement and the Purchase Orders;
(vii) Certificate of origin by the Chamber of Commerce of the concerned country from
where the WORK is shipped.
(b) 20% on satisfactory Installation and Testing (based on Final Acceptance Certificate from a
Third Party Certifying agency appointed by the Client/Purchaser and PMC)
(c) The balance 10% (ten percent) of the WORK Price (“Balance IT Equipment’s Price”) shall
be payable to Contractor following the issuance of FAC for the relevant IT Equipment’s .
(d) In the event the purchaser/paying party makes any payment for any expense which the
Supplier is liable to bear, the paying party shall have the right to withhold or adjust such
amount before making the final payment under the Purchase Order. If the paying party has
paid the entire amount under the Purchase Order, then Contractor shall be liable to reimburse
an amount equal to the penalty paid by the Client/paying party pursuant to this Clause.
2
CHEDULE - 3
PRICE SCHEDULE
1. Price for IT Equipment’s procured under Outright Purchase Model as per Priced BOQ Annexure
10 of attachments
Core Switch
1.01 JL479AAruba 8320 48 10/6 40 X472 5 2 Bundle Set 2
1.02 JL479A ACJ INCLUDED: Power Cord - India Set 2
localization
1.03 H8XP1EAruba 5Y FC NBD Exch 8320 SVC [for Set 2
JL479A]
1.04 JH235AHPE X242 40G QSFP+ to QSFP+ 3m DAC Set 2
Cable
6200F 48 Non-PoE
1.05 JL726BAruba 6200F 48G 4SFP+ Switch Set 26
1.06 JL726B ACJ INCLUDED: Power Cord - India Set 26
localization
1.07 H74E7EAruba 5Y FC NBD Exch 6200F 48G 4SFP+ Set 26
SVC [for JL726B]
1.08 J9150DAruba 10G SFP+ LC SR 300m MMF Set 27
Transceiver
1.09 J9281DAruba 10G SFP+ to SFP+ 1m DAC Cable Set 26
6200F 48 PoE+ 740W
1.1 JL728BAruba 6200F 48G CL4 PoE 4SFP+ 740W Set 12
Switch
1.11 JL728B ACJ INCLUDED: Power Cord - India Set 12
localization
1.12 H82A9EAruba 5Y FC NBD Exch 6200F 48G CL4 Set 12
4SFP+ 740W SVC [for JL728B]
1.13 J9150DAruba 10G SFP+ LC SR 300m MMF Set 13
Transceiver
1.14 J9281DAruba 10G SFP+ to SFP+ 1m DAC Cable Set 12
Aruba AP 505
1.15 R2H38AAruba AP-505 (RW) TAA Unified AP Set 55
1.16 HQ0D1EAruba 5Y FC NBD Exch AP-505 TAA SVC Set 55
[for R2H38A]
1.17 R3J18AAP-MNT-D AP mount bracket individual D: Set 55
solid surface
BILL OF QUANTITY- C4. IT Equipment
Storage
1.81 HPE MSA 2060 10GBASE-T iSCSI LFF Storage Set 1
1.82 HPE MSA 6TB SAS 12G Midline 7.2K LFF (3.5in) Set 3
M2 1yr Wty HDD
BILL OF QUANTITY- C4. IT Equipment
Server Security
Product Description SITC & Design
1.93 Deep Security - Enterprise Perpetual - per Server No 10
(Physical/VM) for 3 Year
1.94 Deep Security - Enterprise Perpetual - per Server No 10
(Physical/VM) for 5 Years
Quote Total
Description SITC & Design Qty
BILL OF QUANTITY- C4. IT Equipment
INSURANCE
1. Contractor shall at its expense take and maintain in effect, or cause the Sub-Contractor to take and
maintain in effect, during the performance of its obligations under Purchase Orders, insurances in
terms of the Agreement and/ or the Purchase Orders.
2. Contractor shall insure the IT Equipment’s against loss or damage incidental to manufacture or
acquisition, transportation, storage, delivery or any other cause (All Risk basis) in the following
manner:
(i) Contractor shall get the IT Equipment’s duly insured for an amount equal to the Contract
Price from warehouse to the designated site specified in the Purchase Order on All Risk
basis (including but not limited to transit, local transportation and storage),
(ii) The insurance coverage shall be made for a sufficient duration that will insure the WORK
until the issuance of the FAC by the Client.
(iii) If the IT Equipment’s is not commissioned and handed over to the Client within the
specified delivery period, the insurance shall be extended by Contractor at its cost till the
successful installation, testing, commissioning and handing over of the IT Equipment’s to
the Client, notwithstanding that such delay in installation and commissioning is due to
handing over the site to Contractor by the Client.
(iv) The Client shall be named as co-insured under all insurance policies taken out by Contractor.
All insurer’s rights of subrogation against such co-insured for losses or claims arising out of
the performance of the Agreement/ Purchase Orders shall be waived under such policies.
86
SCHEDULE - 5
PRE-INSTALLATION REQUIREMENTS
Note: The supplier shall be responsible to satisfy/provide for/supply any requirement that is not mentioned
in the pre-installation requirements mentioned in this schedule including the associated costs.
87
SCHEDULE - 6
Training
Pursuant to Clause 11 of this Agreement, Chandrapur Cancer Care Foundation/ Clients shall have the
access to following training courses provided/arranged by Contractor.
(DELETED)
88
SCHEDULE - 7
SERVICE LEVEL AGREEMENT
In addition to the standard terms and conditions, the Service Level Agreement between Client and the
Purchaser shall be in compliance with the Clause 6.6 of the General Conditions of Contract:
1. Uptime Commitment,
2. Spare parts,
3. Warranty and
4. Comprehensive Maintenance Contract of the Agreement.
89
SCHEDULE - 8
Date: _______
To,
Chandrapur Cancer Care Foundation,
New Government Medical College Campus,
Bypass Road Chandrapur, Maharashtra,
India,442401
CIN: U85100MH2018NPL313419
AND WHEREAS it has been stipulated by you in the said Agreement/ Purchase Order that
Contractor shall furnish you with a Performance Guarantee by a recognized bank for the sum
specified therein as security for compliance with his obligation in accordance with the Agreement/
Purchase Order;
AND WHEREAS we have agreed to give the Client such a Performance Guarantee:
NOW THEREFORE we hereby affirm that we are the Guarantor and responsible to you on behalf
ofContractor, up to a total of [amount of guarantee shall be not less than 5%
of the Contract Agreement] (in words), such sum being payable in types
and proportions of currencies in which the Purchase Order is payable, and we undertake to pay you,
upon your first written demand and without cavil argument, any sum or sums within the limits of
[amount of guarantee] as aforesaid without your
needing to prove or to show grounds or reasons for your demand for the sum specified therein.
We hereby waive the necessity of your demanding the said debt from the contractor before
90
presenting uswith the demand.
We further agree that no change or addition to or other modification of the terms of the Agreement/
Purchase Order or of the obligations to be performed thereunder or of any of the documents which
may bemade between your hand and Contractor shall in any way release us from any liability under
this guarantee, and we hereby waive notice of any such change, addition or modification.
This guarantee shall be valid until [enter date which shall be 60 days from the date of completion of
the Warranty Period, as defined in the Agreement.
1. Our liability under this Bank Guarantee shall not exceed Rs. [BG VALUE shall be not less than
5% of the Contract Price].
2. This Bank Guarantee shall be valid up to (VALIDITY DATE 60 day later than Defect
Liability Period/ Warranty Period whichever is higher).
3. We are liable to pay the guarantee amount or any part thereof under this Bank Guarantee only if
you serve upon us a written claim or demand along with the original Bank Guarantee on or before
(VALIDITY DATE as stipulated herein above).
4. We undertake to pay you such Guaranteed amount upon receipt of your demand by us within a
period of 28 days of your demand which shall be in writing.
This guarantee shall be governed by the laws in force in India and any dispute under this guarantee
shall be settled by the Courts in Chandrapur/ Nagpur jurisdiction only.
WITNESS WHEREOF this deed is executed by the duly authorized officials of the Bank at on the
DATE
Name of Bank
Address
Date
91
SHEDULE - 9
(DELETED)
92
SCHEDULE - 10
(DELETED)
93
S.No
4
5
6
10
11
12
13
14
15
16
17
18
19
20
21
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
Fortigate firewall with support for 3 years
Features Description
General Specifications
The proposed firewall should be enterprise grade hardware based, reliable, purpose-built security appliance with
hardened
p p operating system that eliminates the security risks associated with general-purpose
p operating
y systems
Management System which includes the design, development and manufacturing of network security products
and the delivery of associated security services and support
inspection, VPN encryption/decryption by offloading it to different processors. Solution should also provide
acceleration for processing all packet sizes which include time sensitive applications such as VoIP, real-time
protocols, and multimedia applications.
The proposed firewall solution OEM should have integration with firewall analyzer tools like Tufin, Algosec from
day
The 1proposed solution OEM must not have been blacklisted for timeframe in any of the PSU published tender for
past 3 years
The proposed system must support:USGv6/IPv6, Common criteria EAL4
If required, Tata Cancer Hospital shall carry out demonstration / proof of concept (POC) / demo of the quoted
product to confirm the specification / criteria mention in OEM's technical data sheet
The proposed solution shall include technical brochures / papers / data sheets available on OEM’s website. All
specifications of product mentioned in this sheet must be available on OEM's authorized website
certifications
The proposed solution must be recognized as Leader in Gartner Magic Quadrant for Enterprise Firewalls since
last three years in a row.
Licensing should be on per device basis and not user or IP based.
The solution must support integration with open LDAP, AD and Radius, TACACS+
real-world threats and covers the threats found in the web threat vectors, endpoint, IoT devices, in emails,
applications,
p p and
y network. g y( )
component.
The proposed system shall provide the following systemSystem requirements
performance:
• Firewall throughput (large packet): 75Gbps or more
• Firewall throughput (small packet-64 byte): 40Gbps or more
• NGFW (FW, IPS, Application Control) throughput - measured with real world/enterprise mix traffic): 10Gbps or
more
• Application control throughput: 25Gbps or more
• IPS throughput measured with real-world/enterprise mix traffic: 11Gbps or more
• SSL Inspection throughput with IPS functionality: 8Gbps or more
• Threat Protection throughput (FW, IPS, Application Control & Antivirus) - measured with real-world/enterprise
mix traffic: 9Gbps or more
• Concurrent sessions: 7.5 million or more
• Sessions per second: 500K or more
• Firewall Latency: 4.5µs or less
• SSL-VPN Throughput: 3.5Gbps or more
Firewall appliance should be able to provide port/interface requirements as below:
16 x 1GE RJ45 Ports
8 x 1G SFP &
4 x 10 GE SFP+ slots
Separate HA & management port
4 Architecture
7 Cache
8 Raid Support
9 Point in time and clone copy
10 Replication
12 Data Tiering
16 Performance
17 Array Integration
Functionality
1. The storage array should support industry-leading Operating System platforms including: Windows 2016 /
2019 / 2022, VMware and Linux.
2. For efective power saving, Storage subystem shall be supplied with 2.5" Small form factor SFF drives however
storage subsystem shall also support LFF drives with the addition of required disk enclosures.
2. Offered storage array shall also have support for FIPS 140-2 validating self-encrypted drives.
1. Offerd Storage Array shall be given with Minimum of 12GB cache per controller in a single unit.
2. Cache shall be backed up in case of power failure for indefinite time either using batteries or capacitors or any
other equivalent technology.
3. Offered Storage shall also have optional support for Flash cache using SSD / Flash drives. Offered storage shall
support at-least 8TB Flash Cache.
4. Offered Flash cache shall be tuned for random read operations and shall remain activated even at less than
70% of random average read workload.
1. Offered Storage Subsystem shall support Raid 1 , 10, 5 and Raid 6
2. All Raid Sets shall support thin provisioning. Vendor shall offer the license of thin provisioning for complete
supported capacity of the array.
4. Raid processing shall be offloaded to a dedicated ASIC instead of CPU. In case vendor is not supporting it then
vendor shall ensure that additional 12GB cache per controller is configured to offset the raid processing
workload.
1. Offered Storage array shall be configured with array based Snapshot and clone functionlity and shall be
configured for minimum of 512 snapshot licenses.
2. Offered Storage array shall support at-least 512 point in time copies (Snapshots) and 128 volume / Clone
copies
1. Offered storage subsystem shall support storage based replication to DR location. License for maximum
supported capacity of the array shall be offered.
2. Offered storage subsystem shall support replication to multiple storage array of the same family in fan-out
mode. At least 1:4 mode shall be supported.
1. Offered storage shall be offered and configured with virtualization capability so that a given volume can be
striped across all spindles of given drive type within a given disk pool. Disk pool shall support all listed raid sets of
Raid 1, Raid 10, Raid 5 and Raid 6.
2. Offered Storage shall be offered and configured with Thin Provisioning capability.
Offered Storage shall also be configured for Sub-Lun Data tiering in real time fashion across different type of
drives within a given pool like SSD, SAS, NL-SAS etc. License shall be configured for maximum supported capacity
of the array.
1. Offered Storage Array shall support Global hot Spare for offered Disk drives.
2. Atleast 2 Global hot spare drive shall be configured for every 30 drives.
3. Offered storage array shall have the support for distributed hot spare
1. Storage Subsystem shall support minimum of 512 Logical Units. Storage Array shall also support creation of
more than 120TB volume at controller level.
2. Offered Storage shall have inbuilt performance management software. Configuration Dashboard shall show
overall IOPS and MB/sec performance.
1. Multi-path and load balancing software shall be provided, if vendor does not support MPIO functionlity of
Operating system.
Offered storage shall have listed benchmark for performance of more than 250,000 in Raid 5 using appropriate
drives at 8k block size. Vendor shall provide documentary proof for it.
Offered storage array shall have plug-in for VMware VCenter, Microsoft System center as well as vStorage APIs
(VAAI) for array integration.
Server:
Item
Chassis
CPU
Memory
Memory Protection
HDD Bays
Hard disk drive
Controller
Networking features
Interfaces
Bus Slots
Power Supply
Fans
Industry Standard
Compliance
System Security
Operating Systems
and Virtualization
Software Support
GPU support
System tuning for
performance
Secure encryption
Warranty
Provisioning
Firmware security
Embedded Remote
Management and
firmware security
Server Management
Cloud Enabled
Monitoring and
Analytics
DL380 Gen10
Description of Requirement
2 U Rack Mountable
Intel Xeon-Silver 4216 (2.1GHz/16-core/100W) FIO Processor Kit for HPE ProLiant DL380 Gen10 *2
HPE 32GB (1x32GB) Dual Rank x4 DDR4-2933 CAS-21-21-21 Registered Smart Memory Kit*8
Advanced ECC with multi-bit error protection, Online spare, mirrored memory and fast fault tolerance
DL380 Gen10 8SFF ; 8 bays
Hot Plug SFF SAS drives
HPE Smart Array P408i-a SR Gen10 (8 Internal Lanes/2GB Cache) 12G SAS Modular Controller
HPE FlexFabric 10Gb 4-port FLR-T 57840S Adapter
Serial - 1
Micro SD slot - 1
USB 3.0 support With Up to 5 total: 1 front, 2 rear, 2 internal (secure)
Eight PCI-Express 3.0 slots, atleast two x16 PCIe slots
HPE 1600W Flex Slot Platinum Hot Plug Low Halogen Power Supply Kit*2
Redundant hot-plug system fans ; HPE DL38X Gen10 High Performance Temperature Fan Kit
ACPI 6.1 Compliant
PCIe 3.0 Compliant
PXE Support
Energy Star
ASHRAE A3/A4
UEFI 2.6
SMBIOS
Redfish API
SNMP v3
TLS 1.2
DMTF Systems Management Architecture
UEFI Secure Boot and Secure Start support
Security feature to ensure servers do not execute compromised firmware code
FIPS 140-2 validation
Support for Commercial National Security Algorithms (CNSA)
Common Criteria certification
Configurable for PCI DSS compliance
Advanced Encryption Standard (AES) and Triple Data Encryption Standard (3DES) on browser
Tamper-free updates - components digitally signed and verified
Secure Recovery - recover critical firmware to known good state on detection of compromised firmware
Ability to rollback firmware
Secure erase of NAND/User data
TPM (Trusted Platform Module) 1.2
TPM (Trusted Platform Module) 2.0
Smart card (PIV/CAC) and Kerberos based 2-factor Authentication
Configurable for PCI DSS compliance
Secure erase of NAND
Chassis Intrusion detection
Microsoft Windows Server
Red Hat Enterprise Linux (RHEL)
SUSE Linux Enterprise Server (SLES)
VMware
ClearOS
System should support NVIDIA's latest computational accelerators and graphics accelerators
1. System should support feature for improved workload throughput for applications sensitive to frequency
fluctuations. This feature should allow processor operations in turbo mode without the frequency fluctuations
associated with running in turbo mode
2. System should support workload Profiles for simple performance optimization
System should support Encryption of the data (Data at rest) on both the internal storage and cache module of the
array controllers using encryption keys. Should support local key management for single server and remote key
management for central management for enterprise-wide data encyption deployment.
Server Warranty includes 3-Year Parts, 3-Year Labor, 3-Year Onsite support with next business day response.
1. Should support tool to provision server using RESTful API to discover and deploy servers at scale
2, Provision one to many servers using own scripts to discover and deploy with Scripting Tool (STK) for Windows
and Linux or Scripting Tools for Windows PowerShell
1. For firmware security, system should support remote management chip creating a fingerprint in the silicon,
preventing servers from booting up unless the firmware matches the fingerprint. This feature should be immutable
2. Should maintain repository for firmware and drivers recipes to aid rollback or patching of compromised firmware.
Should also store Factory Recovery recipe preloaded to rollback to factory tested secured firmware
3. Server Configuration Lock - Protecting Systems in Transit and when Deployed in remote Locations
4. Chassis Intrusion Detection.
5. One-Button Secure Erase - Making server retirement and redeployment simpler.
6. Secure NIC support.
7. Security Dashboard for Server to detect possible security vulnerabilities.
1. System remote management should support browser based graphical remote console along with Virtual Power
button, remote boot using USB/CD/DVD Drive. It should be capable of offering upgrade of software and patches
from a remote client using Media/image/folder; It should support server power capping and historical reporting and
should have support for multifactor authentication
2. Server should have dedicated 1Gbps remote management port
3. Remote management port should have storage space earmarked to be used as a repository for firmware,
drivers and software components. The components can be organized in to install sets and can be used to
rollback/patch faulty firmware
3. Server should support agentless management using the out-of-band remote management port
4. The server should support monitoring and recording changes in the server hardware and system configuration. It
assists in diagnosing problems and delivering rapid resolution when system failures occur
5. Applications to access the server remotely using popular handheld devices based on Android or Apple IOS
should be availabile
6. Remote console sharing upto 6 users simultaneously during pre-OS and OS runtime operation, Console replay -
Console Replay captures and stores for replay the console video during a server's last major fault or boot
sequence. Microsoft Terminal Services Integration, 128 bit SSL encryption and Secure Shell Version 2
support.Should provide support for AES and 3DES on browser.Should provide remote firmware update
functionality.Should provide support for Java free graphical remote console.
7. Should support managing multiple servers as one via
Group Power Control
Group Power Capping
Group Firmware Update
Group Configuration
Group Virtual Media and Encrypted Virtual Media
Group License Activation
8. Should support RESTful API integration
9. System should support embedded remote support to transmit hardware events directly to OEM or an authorized
partner for automated phone home support
Software should support dashboard view to quickly scan the managed resources to assess the overall health of the
data center. It should provide an at-a-glance visual health summary of the resources user is authorized to view.
The Dashboard minimum should display a health summary of the following:
• Server Profiles
• Server Hardware
• Appliance alerts
The Systems Management software should provide Role-based access control
Management software should support integration with popular virtualization platform management software like
vCenter, and SCVMM
Should help provide proactive notification of actual or impending component failure alerts on critical components
like CPU, Memory and HDD.
Should provide an online portal that can be accesible from anywhere. The portal should provide one stop, online
access to the product, support information and provide information to track warranties, support contrats and status.
The Portal should also provide a personalised dashboard to monitor device heath, hardware events, contract and
warranty status. Should provide a visual status of individual devices and device groups. The Portal should be
available on premise (at our location - console based) or off premise (in the cloud).
Should help to proactively identify out-of-date BIOS, drivers, and Server Management agents and enable the
remote update of system software/firmware components.
The Server Management Software should be of the same brand as of the server supplier.
1. Offered servers shall have cloud enabled monitoring and analytics engine for proactive management. All
required licenses for same shall be included in the offer.
2. Cloud Enabled Monitoring and analytics engine shall have capability to provide following:
a. Providing Firmware upgrade and patch upgrade recommendations proactively.
b. Providing power and support entitlement status.
c. Recommendations to eliminate performance bottlenecks and critical events, based on Analytics engine having
capability of proactive recommendation for arresting the issues / problems.
d. Automatic creation of support cases
e. Detection of the Service Pack for Server and notifications for any hotfixes that may be available for the particular
Configuration.
f. Customer advisories based on their relevance to server configuration.
g. Should have continuous, proactive health monitoring and recording of required system parameters as well as
diagnostic telemetry data on a 24x7 basis.
h. Should have monitoring & analytics feature for the offered server/chassis along with its sub-components to
predict, prevent, and auto-resolve problems and by providing automating case creation and log file submission for
the problems that can’t be autoresolved.
Compliance
Server: AD
Item
Chassis
CPU
Memory
Memory Protection
HDD Bays
Hard disk drive
Controller
Networking features
Interfaces
Bus Slots
Power Supply
Fans
System Security
GPU support
System tuning for performance
Secure encryption
Warranty
Provisioning
Firmware security
System should support Encryption of the data (Data at rest) on both the internal storage and cache module of the
array controllers using encryption keys. Should support local key management for single server and remote key
management for central management for enterprise-wide data encyption deployment.
Server Warranty includes 3-Year Parts, 3-Year Labor, 3-Year Onsite support with next business day response.
1. Should support tool to provision server using RESTful API to discover and deploy servers at scale
2, Provision one to many servers using own scripts to discover and deploy with Scripting Tool (STK) for Windows
and Linux or Scripting Tools for Windows PowerShell
1. For firmware security, system should support remote management chip creating a fingerprint in the silicon,
preventing servers from booting up unless the firmware matches the fingerprint. This feature should be immutable
2. Should maintain repository for firmware and drivers recipes to aid rollback or patching of compromised firmware.
Should also store Factory Recovery recipe preloaded to rollback to factory tested secured firmware
3. Server Configuration Lock - Protecting Systems in Transit and when Deployed in remote Locations
4. Chassis Intrusion Detection.
5. One-Button Secure Erase - Making server retirement and redeployment simpler.
6. Secure NIC support.
7. Security Dashboard for Server to detect possible security vulnerabilities.
1. System remote management should support browser based graphical remote console along with Virtual Power
button, remote boot using USB/CD/DVD Drive. It should be capable of offering upgrade of software and patches
from a remote client using Media/image/folder; It should support server power capping and historical reporting and
should have support for multifactor authentication
2. Server should have dedicated 1Gbps remote management port
3. Remote management port should have storage space earmarked to be used as a repository for firmware,
drivers and software components. The components can be organized in to install sets and can be used to
rollback/patch faulty firmware
3. Server should support agentless management using the out-of-band remote management port
4. The server should support monitoring and recording changes in the server hardware and system configuration. It
assists in diagnosing problems and delivering rapid resolution when system failures occur
5. Applications to access the server remotely using popular handheld devices based on Android or Apple IOS
should be availabile
6. Remote console sharing upto 6 users simultaneously during pre-OS and OS runtime operation, Console replay -
Console Replay captures and stores for replay the console video during a server's last major fault or boot
sequence. Microsoft Terminal Services Integration, 128 bit SSL encryption and Secure Shell Version 2
support.Should provide support for AES and 3DES on browser.Should provide remote firmware update
functionality.Should provide support for Java free graphical remote console.
7. Should support managing multiple servers as one via
Group Power Control
Group Power Capping
Group Firmware Update
Group Configuration
Group Virtual Media and Encrypted Virtual Media
Group License Activation
8. Should support RESTful API integration
9. System should support embedded remote support to transmit hardware events directly to OEM or an authorized
partner for automated phone home support
Software should support dashboard view to quickly scan the managed resources to assess the overall health of the
data center. It should provide an at-a-glance visual health summary of the resources user is authorized to view.
The Dashboard minimum should display a health summary of the following:
• Server Profiles
• Server Hardware
• Appliance alerts
The Systems Management software should provide Role-based access control
Management software should support integration with popular virtualization platform management software like
vCenter, and SCVMM
Should help provide proactive notification of actual or impending component failure alerts on critical components
like CPU, Memory and HDD.
Should provide an online portal that can be accesible from anywhere. The portal should provide one stop, online
access to the product, support information and provide information to track warranties, support contrats and
status. The Portal should also provide a Personalised dashboard to monitor device heath, hardware events,
contract and warranty status. Should provide a visual status of individual devices and device groups. The Portal
should be available on premise (at our location - console based) or off premise (in the cloud).
Should help to proactively identify out-of-date BIOS, drivers, and Server Management agents and enable the
remote update of system software/firmware components.
The Server Management Software should be of the same brand as of the server supplier.
1. Offered servers shall have cloud enabled monitoring and analytics engine for proactive management. All
required licenses for same shall be included in the offer.
2. Cloud Enabled Monitoring and analytics engine shall have capability to provide following:
a. Providing Firmware upgrade and patch upgrade recommendations proactively.
b. Providing power and support entitlement status.
c. Recommendations to eliminate performance bottlenecks and critical events, based on Analytics engine having
capability of proactive recommendation for arresting the issues / problems.
d. Automatic creation of support cases
e. Detection of the Service Pack for Server and notifications for any hotfixes that may be available for the particular
Configuration.
f. Customer advisories based on their relevance to server configuration.
g. Should have continuous, proactive health monitoring and recording of required system parameters as well as
diagnostic telemetry data on a 24x7 basis.
h. Should have monitoring & analytics feature for the offered server/chassis along with its sub-components to
predict, prevent, and auto-resolve problems and by providing automating case creation and log file submission for
the problems that can’t be autoresolved.
Compliance
Server: backup
Item
Chassis
CPU
Memory
Memory Protection
HDD Bays
Hard disk drive
Controller
Networking features
Interfaces
Bus Slots
Power Supply
Fans
Industry Standard
Compliance
System Security
Operating Systems
and Virtualization
Software Support
GPU support
System tuning for
performance
Secure encryption
Warranty
Provisioning
Firmware security
Embedded Remote
Management and
firmware security
Server Management
Cloud Enabled
Monitoring and
Analytics
DL360 Gen10
Description of Requirement
1U Rack Mountable
Intel Xeon-Silver 4216 (2.1GHz/16-core/100W) FIO Processor Kit for HPE ProLiant DL360 Gen10
HPE 16GB (1x16GB) Dual Rank x8 DDR4-2933 CAS-21-21-21 Registered Smart Memory Kit*4
Advanced ECC with multi-bit error protection, Online spare, mirrored memory and fast fault tolerance
DL360 Gen10 8SFF ; 8 Bays
Hot Plug SFF SAS SSD and HDD; 3.84TB SAS 12G Mixed Use SFF SC Value SAS Multi Vendor SSD*2; 1.2TB
SAS 12G Mission Critical 10K SFF SC 3-year Warranty Multi Vendor HDD*2
HPE Smart Array P408i-a SR Gen10 (8 Internal Lanes/2GB Cache) 12G SAS Modular Controller
HPE FlexFabric 10Gb 4-port FLR-T 57840S Adapter
Serial - 1
Micro SD slot - 1
USB 3.0 support With Up to 5 total: 1 front, 2 internal, 2 rear, 2 internal (secure)
Three PCI-Express 3.0 slots, atleast two x16 PCIe slots
HPE 800W Flex Slot Platinum Hot Plug Low Halogen Power Supply Kit*2
Redundant hot-plug system fans
ACPI 6.1 Compliant
PCIe 3.0 Compliant
PXE Support
Energy Star
ASHRAE A3/A4
UEFI 2.6
SMBIOS
Redfish API
SNMP v3
TLS 1.2
DMTF Systems Management Architecture
UEFI Secure Boot and Secure Start support
Security feature to ensure servers do not execute compromised firmware code
FIPS 140-2 validation
Support for Commercial National Security Algorithms (CNSA)
Common Criteria certification
Configurable for PCI DSS compliance
Advanced Encryption Standard (AES) and Triple Data Encryption Standard (3DES) on browser
Tamper-free updates - components digitally signed and verified
Secure Recovery - recover critical firmware to known good state on detection of compromised firmware
Ability to rollback firmware
Secure erase of NAND/User data
TPM (Trusted Platform Module) 1.2
TPM (Trusted Platform Module) 2.0
Smart card (PIV/CAC) and Kerberos based 2-factor Authentication
Configurable for PCI DSS compliance
Chassis Intrusion detection
Microsoft Windows Server
Red Hat Enterprise Linux (RHEL)
SUSE Linux Enterprise Server (SLES)
VMware
ClearOS
System should support NVIDIA's latest computational accelerators and graphics accelerators
1. System should support feature for improved workload throughput for applications sensitive to frequency
fluctuations. This feature should allow processor operations in turbo mode "ON" without the frequency fluctuations
associated with running in turbo mode
2. System should support workload Profiles for simple performance optimization
System should support Encryption of the data (Data at rest) on both the internal storage and cache module of the
array controllers using encryption keys. Should support local key management for single server and remote key
management for central management for enterprise-wide data encyption deployment.
Server Warranty includes 3-Year Parts, 3-Year Labor, 3-Year Onsite support with next business day response.
1. Should support tool to provision server using RESTful API to discover and deploy servers at scale
2, Provision one to many servers using own scripts to discover and deploy with Scripting Tool (STK) for Windows
and Linux or Scripting Tools for Windows PowerShell
1. For firmware security, system should support remote management chip creating a fingerprint in the silicon,
preventing servers from booting up unless the firmware matches the fingerprint. This feature should be immutable
2. Should maintain repository for firmware and drivers recipes to aid rollback or patching of compromised firmware.
Should also store Factory Recovery recipe preloaded to rollback to factory tested secured firmware
3. Server Configuration Lock - Protecting Systems in Transit and when Deployed in remote Locations
4. Chassis Intrusion Detection.
5. One-Button Secure Erase - Making server retirement and redeployment simpler.
6. Secure NIC support.
7. Security Dashboard for Server to detect possible security vulnerabilities.
1. System remote management should support browser based graphical remote console along with Virtual Power
button, remote boot using USB/CD/DVD Drive. It should be capable of offering upgrade of software and patches
from a remote client using Media/image/folder; It should support server power capping and historical reporting and
should have support for multifactor authentication
2. Server should have dedicated 1Gbps remote management port
3. Remote management port should have storage space earmarked to be used as a repository for firmware,
drivers and software components. The components can be organized in to install sets and can be used to
rollback/patch faulty firmware
3. Server should support agentless management using the out-of-band remote management port
4. The server should support monitoring and recording changes in the server hardware and system configuration. It
assists in diagnosing problems and delivering rapid resolution when system failures occur
5. Applications to access the server remotely using popular handheld devices based on Android or Apple IOS
should be availabile
6. Remote console sharing upto 6 users simultaneously during pre-OS and OS runtime operation, Console replay -
Console Replay captures and stores for replay the console video during a server's last major fault or boot
sequence. Microsoft Terminal Services Integration, 128 bit SSL encryption and Secure Shell Version 2
support.Should provide support for AES and 3DES on browser.Should provide remote firmware update
functionality.Should provide support for Java free graphical remote console.
7. Should support managing multiple servers as one via
Group Power Control
Group Power Capping
Group Firmware Update
Group Configuration
Group Virtual Media and Encrypted Virtual Media
Group License Activation
8. Should support RESTful API integration
9. System should support embedded remote support to transmit hardware events directly to OEM or an authorized
partner for automated phone home support
Software should support dashboard view to quickly scan the managed resources to assess the overall health of the
data center. It should provide an at-a-glance visual health summary of the resources user is authorized to view.
The Dashboard minimum should display a health summary of the following:
• Server Profiles
• Server Hardware
• Appliance alerts
The Systems Management software should provide Role-based access control
Management software should support integration with popular virtualization platform management software like
vCenter, and SCVMM
Should help provide proactive notification of actual or impending component failure alerts on critical components
like CPU, Memory and HDD.
Should provide an online portal that can be accesible from anywhere. The portal should provide one stop, online
access to the product, support information and provide information to track warranties, support contrats and
status. The Portal should also provide a Personalised dashboard to monitor device heath, hardware events,
contract and warranty status. Should provide a visual status of individual devices and device groups. The Portal
should be available on premise (at our location - console based) or off premise (in the cloud).
Should help to proactively identify out-of-date BIOS, drivers, and Server Management agents and enable the
remote update of system software/firmware components.
The Server Management Software should be of the same brand as of the server supplier.
1. Offered servers shall have cloud enabled monitoring and analytics engine for proactive management. All
required licenses for same shall be included in the offer.
2. Cloud Enabled Monitoring and analytics engine shall have capability to provide following:
a. Providing Firmware upgrade and patch upgrade recommendations proactively.
b. Providing power and support entitlement status.
c. Recommendations to eliminate performance bottlenecks and critical events, based on Analytics engine having
capability of proactive recommendation for arresting the issues / problems.
d. Automatic creation of support cases
e. Detection of the Service Pack for Server and notifications for any hotfixes that may be available for the particular
Configuration.
f. Customer advisories based on their relevance to server configuration.
g. Should have continuous, proactive health monitoring and recording of required system parameters as well as
diagnostic telemetry data on a 24x7 basis.
h. Should have monitoring & analytics feature for the offered server/chassis along with its sub-components to
predict, prevent, and auto-resolve problems and by providing automating case creation and log file submission for
the problems that can’t be autoresolved.
Compliance
Sr. No
1
3
4
7
8
Specifications
Architecture
The switch should have at least 48 fixed 1000/10000 SFP+ ports 6 x QSFP+ ports and Polulated with 10G SFP+ SR
Transceivers 20 qty
The switch Shall support 1000 Base-SX, LX, LH, 1000BASE-T
The switch Shall Support 10Gbase-SR,LR,ER
The switch shall have 1.4Tbps Gbps Gbps switching capacity
The switch shall have switching throughput upto 1607 million pps
The switch should have 32K ARP entries
The switch should support IPV4 80K IPv4 route and 56K IPv6 route
The switch should have Modular operating system with OVSDB to support a database-centric operating system.
The switch should have Distributed architecture with separation of data and control planes.
The switch should have independent monitoring and restart of individual software modules, and enhanced
software process serviceability functions.
The switch should have individual software modules to be upgraded for higher availability.
The switch should have built-in framework for monitoring, troubleshooting and capacity planning.
The switch should support Jumbo frames size of 9K bytes
The switch should support internal loopback testing for maintenance purposes and an increase in availability
The switch should support Redundant and load-sharing fans, and power supplies
The switch should support hot-swappable modules
The switch should protect against unknown broadcast, unknown multicast, or unicast storms with user-defined
thresholds
The switch should support internal Redundant power supplies
The switch should be loaded with 1 direct attached cable 3 meter QSFP+ supported
Resiliency and high availability
The switch should support MLAG
The switch should support Separate data and control paths
The switch should support VRRP
The switch should support Unidirectional Link Detection (UDLD)
The switch should support IEEE 802.3ad LACP with support up to 128 trunks and eight links per trunk
The switch should support Generic Routing Encapsulation (GRE)
Management
The switch should support full REST APIs
The switch should have built-in troubleshooting feature
The switch should have the capability to enable or disable console port, or reset button interfaces depending on
security preferences
The switch should support Industry-standard CLI
The switch should restricts access to critical configuration commands and support multiple privilege levels with
password protection
The switch provide ACL based SNMP access and support local and remote syslog capabilities allow logging of all
access
The switch should Provides SNMP read and trap support of industry standard Management Information Base
(MIB), and private extensions
The switch should support sFlow (RFC 3176)
The switch should support Remote monitoring (RMON)
The switch should support TFTP, and SFTP support
The switch should support Debug and sampler utility
The switch should support ping and traceroute for both IPv4 and IPv6
The switch should support Network Time Protocol (NTP)
The switch should support IEEE 802.1AB Link Layer Discovery Protocol (LLDP)
The switch should support Dual flash images
The switch should support Multiple configuration files
Same Switch Should support Local, On-Prim and Cloud Management functionality from Day 1
Layer 2 feature
The switch should support up to 4,096 port-based or IEEE 802.1Q-based VLANs and supports MAC-based VLANs,
protocol-based VLANs, and IP-subnet-based VLANs
The switch should support Bridge Protocol Data Unit (BPDU) tunneling
The switch should support Port mirroring
The switch should support IEEE 802.1D STP, IEEE 802.1w Rapid Spanning Tree Protocol (RSTP) for faster
convergence, and IEEE 802.1s Multiple Spanning Tree Protocol (MSTP)
The switch should support Internet Group Management Protocol (IGMP)
The switch should support Rapid Per-VLAN spanning tree plus (RPVST+)
The switch should support IGMPv1, v2, and v3 and support Any-Source Multicast (ASM)
The switch should support congestion actions and support strict priority (SP) queuing and weighted fair queuing
Layer 3 feature
The switch should support Address Resolution Protocol (ARP) and supports static ARPs, gratuitous ARP to allows
detection of duplicate IP addresses and proxy ARP
The switch should support UDP helper
The switch should support Dynamic Host Configuration Protocol (DHCP) and support DHCP Relay
The switch should support Domain Name System (DNS)
The switch should support Multicast VLAN
The switch should support Protocol Independent Multicast (PIM) and supports Sparse Mode (SM)
The switch should support Static ,Open shortest path first (OSPF),Border Gateway Protocol IPv4 routing
The switch should support directed broadcasts, customization of TCP parameters, support of ICMP error packets
and extensive display capabilities
The switch should support Static IPv6 routing,OSPFv3 and BGP-4
The switch should support Dual IP stack
The switch should support Equal-Cost Multipath (ECMP)
Security
The switch should support ACLs for both IPv4 and IPv6 based on a Layer 2 header or a Layer 3 protocol header
The switch should support Remote Authentication Dial-In User Service (RADIUS)
The switch should support Terminal Access Controller Access-Control System (TACACS+)
The switch should support Secure shell (SSHv2)
Environmental Features
Shall provide support for RoHS and WEEE regulations
Operating temperature of 0°C to 40°C
EN 60950
IEC 60950-1:2005 Ed.2; Am 1:2009+A2:2013
UL 60950-1, CSA 22.2 No 60950-1
EN 60825-1:2007 / IEC 60825-1:2007 Class 1
EN 55032:2015 / CISPR 32, Class A
VCCI Class A
CNS 13438
AS/NZS - CISPR 32 2015, Class A
ICES-003 Issue 5
FCC CFR 47 Part 15:2010, Class A
EN 50581:2012 (RoHS)
Warranty and Support
The below Warranty shall be offered directly from the switch OEM.
3 Years Warrenty with Next Buisness Day Replacement.
Compliance Yes / No Remarks
Wireless Controller
Sr. No Specifications
1 Wireless solution should support up to 512 Access points in high availability mode
2 Wireless solution should support minimum 15000 concurrent devices.
The wirless controller should support 802.11ax (Wi-Fi 6), WPA3, and Enhanced Open - and
3
existing standards
4 The Solution should have Built-in AI-powered Wireless/RF optimization
The wirless controller should support automate deployment with Zero-touch Provisioning
5
and Hierarchical Configuration
The wirless controller should support up to 10 controllers in a cluster to maximize
6
performance and availability
Wireless solution should support controllers clustering to enable seamless experience across
7
Wi-Fi zone in the event of failure or significant crowd density.
Wireless solution should support full set of northbound APIs to enable deep visibility into the
8 network. The northbound APIs should provide RF health metrics, app utilization, device type
and user data in an easy to integrate format.
Wireless solution should have the ability to dynamically update individual service modules
9
without requiring an entire system reboot.
The solution should Live Upgrades and multiple version support to upgraded alongside active
user sessions and eliminate the need for planned maintenance windows or downtime. Each
10
Controller Cluster or individual service modules can also be selectively upgraded without
impacting the rest of the network.
11 The controller should support Hitless Failover and automated load balancing
The solution should have the capability to use an AP infrastructure and terminate two
12 different SSIDs on two different controllers while maintaining complete separation and
security for all networks, policies, management and visibility.
Wireless solution should have the technology to eliminate sticky clients and boosts Wi-Fi
performance by ensuring that clients associate with the best access point. It also groups the
13
MU-MIMO clients together for simultaneous transmission to multiple devices, improving the
overall WLAN capacity.
Wireless solution should support application awareness to WLANs to prioritize applications
14
for each user
Should support an ability to dynamically adjust channel and power settings based on the RF
15
environment.
Wireless solution should support CCMP/AES ,WEP 64- and 128-bit,TKIP,SSL and TLS,RC4 128-
16 bit,RSA 1024-bit,RSA 2048-bit,L2TP/IPsec (RFC 3193), XAUTH/Ipsec and PPTP (RFC 2637)
Encryption protocols
Wireless solution should control all user traffic and flexibility to control exactly which users
17
can run what apps.
18 Wireless solution should control highly granular visibility and control over 1,000 applications
The wireless solution should support Active/Active (1:1) or Active/Standby (1+1) or N+1 High
19
Availability Deployment Modes
Permit non-essential traffic while preventing it from overwhelming mission critical
20
applications.
21 Should be able to classify different types of interference.
Should provide real-time charts/log showing interferers per access point, on a per- radio, per-
22
channel basis.
23 Should support 802.11e WMM
Support for configuring media streams with different priority to identify specific video
24
streams for preferential quality-of-service treatment.
To deliver optimal bandwidth usage, reliable multicast must use single session between AP
25
and Wireless Controller.
26 Should support IPv4 & IPv6.
Should support Internet Group Management Protocol (IGMP) snooping and access point
27 should transmits multicast packets only if a client associated to the access point is subscribed
to the multicast group.'
For smooth, seamless and easy manageability, operation, interoperability and maintenance,
28
the bidder should offer/quote WLC & WAPs of the same make (OEM).
Controller should support deep packet inspection for all user traffic across Layer 4-7 network
29 to analyses information about applications usage, peak network usage times for all access
points from day one
30 Same controller should support on-prim and Cloud Management from Day 1
Advance WIDS/WIPS Security
30 The WLAN solution should have the HW to implement advance WIDS & WIPS from day 1.
31 WIPS solution should Automatically blacklist clients when it attempt any attack.
WIPS solution should be capable of wireless intrusion detection & prevention .The WLAN
should be able to detect Rogue AP and take corrective action to prevent the rogue AP. The
32
system should detect and prevent an organization’s wireless client connecting to rogue AP
and also prevent an outside client trying to connect to organizational WLAN.
WIPS solution should detect & prevent an Ad-hoc connection (i.e. clients forming a network
33 amongst themselves without an AP) as well as windows bridge (client that is associated to AP
is also connected to wired network and enabled bridging between two interfaces)
The system should detect an invalid AP broadcasting valid SSID and should prevent valid
34
clients getting connected from these AP’s.
35 WIPS Solution should track the location of interferer objects.
For advance forensic WIPS solution should perform spectrum analysis to detect and classify
36 sources of interferences. System should provide chart displays and spectrograms for real-
time troubleshooting and visualization.
The WIPS solution should able to detect and locate the rogue access point on floor maps
37
once detected.
The WIPS solution should able to detect and prevent if a client use FATA-Jack 802.11 DoS
38 tool ( Available free on internet) and tries to disconnect other stations using spoofed
authentication frames that contain an invalid authentication algorithm number.
The WIPS solution should detect and protect if a client probe-request frame will be answered
39 by a probe response containing a null SSID to crash or lock up the firmware of any 802.11
NIC.
The WIPS solution should detect and protect if a client/tool try to flood an AP with 802.11
40 management frames like authenticate/associate frames which are designed to fill up the
association table of an AP.
The WIPS solution should detect and protect if a client/tool keep on sending disassociation
41 frames to the broadcast address (FF:FF:FF:FF:FF:FF) disconnect all stations on a network for a
widespread DoS.
The WIPS solution should detect and protect if somebody try to spoof mac address of client
42
or AP for unauthorized authentication.
The WIPS solution should detect and protect if a client/tool try de-authentication broadcast
43 attempts to disconnect all clients in range rather than sending a spoofed deauth to a specific
MAC address.
The WIPS solution should detect and protect if an attacker attempts to lure a client to a
malicious AP using SSID on fake AP in close proximity of the premises. It should detect When
44
the Valid Client probes for Valid SSID and these malicious APs respond and invite the client to
connect to them.
When client radio is in sleep mode to save battery and AP then begins buffering traffic bound
for that client until it indicates that it is awake. The WIPS solution should detect and protect
45 if intruder try sending spoofed frames to the AP on behalf of the original client to trick the AP
into believing the client is asleep to buffer the AP beyond limit. Controller should support
fatajact and Detect Wellenreiter
Compliance
Remarks
(Yes/No)
Compliance
Sr. No Specifications
(Yes/No)
Technical Specification
Access Point radio should be minimum 2x2 MIMO with 2 on 5ghz and 2x2
1 on 2.4 Ghz radio. The AP should have Dual Radio 802.11ax access point with
OFDMA and Multi-User MIMO (MU-MIMO)
AP should have one 10/100/1000 Mbps speed LAN port and Auto-sensing
2
link speed
Access Point should be 802.11ax ready from day one and support WPA3
3
and Enhanced Open security from day one
Access point should support Built-in technology that resolves sticky client
4
issues for Wi-Fi 6 and Wi-Fi 5 devices
Access point should support OFDMA and MU-MIMO for enhanced multi-
5
user efficiency
6 Access point should IoT-ready Bluetooth 5 and Zigbee support
Maximum data rates of 1.2Gbps in the 5GHz band and 570Mbps in the
7
2.4GHz band (for an aggregate peak data rate of 5.4Gbps).
8 Access Point can have integrated internal antenna
The Max transit power of the AP + Antenna should be as per WPC norms for
indoor Access Points. OEM to give a undertaking letter stating that the AP
9
will configured as per WPC guidelines for indoor AP and also submit the
WPC certificate showing approval.
Access point should have Interna/External Bluetooth Low energy beacon to
10 support advance location based serivces for Mobile engagement solutions
and Applications.
11 Should support 16x BSSID per AP radio.
The access point should be capable of performing security scanning and
12 serving clients on the same radio. It should be also capable of performing
spectrum analysis and security scanning using same radio.
Should support BPSK, QPSK, 16-QAM, 64-QAM, 256 QAM and 1024 QAM
13
modulation types
14 Access point should support 802.3af/at POE standard.
Intelligent Power Monitoring (IPM) to continuously monitor and report
hardware energy consumption. AP can also be configured to enable or
15
disable capabilities based on available PoE power – ideal when wired
switches have exhausted their power budget.
16 Access point should have option of external power adaptor as well.
17 Access point should have console port.
18 Must operate as a sensor for wireless IPS
AP model proposed must be able to be both a client-serving AP and a
19
monitor-only AP for Intrusion Prevention services
The Access Point should have the technology to improve downlink
20
performance to all mobile devices.
Access point must incorporate radio resource management for power,
21
channel, coverage hole detection and performance optimization
AP mounting kit should be with locking mechanism so that AP cannot be
22
removed without using special tools.
23 AP should have Kensington security slot
AP should support standalone mode/ Inbuilt Virtual controller mode for
24
specific requirements.
The AP should support Advanced Cellular Coexistence (ACC) to minimizes
25 interference from 3G/4G cellular networks, distributed antenna systems
and commercial small cell/femtocell equipment
The AP should support Supports priority handling and policy enforcement
26 for unified communication apps, including Skype for Business with
encrypted videoconferencing, voice, chat and desktop sharing
The AP should support deep packet inspection to classify and block,
27 prioritize, or limit bandwidth for thousands of applications in a range of
categories
Passpoint Wi-Fi (Hotspot 2.0) offers seamless cellular-to-Wi-Fi carryover for
28
guests
The Access point should support maximum ratio combining (MRC) for
29
improved receiver performance
The Access point should support cyclic delay/shift diversity (CDD/CSD) for
30
improved downlink RF performance
The Access point should support Space-time block coding (STBC) for
31
increased range and improved reception
The Access point should support Low-density parity check (LDPC) for high-
32
efficiency error correction and increased throughput
The Access point should support Transmit beam-forming (TxBF) for
33
increased signal reliability and range
The Access point should support 802.11ax Target Wait Time (TWT) to
34
support low-power client devices
35 AP should be UL 2043 certified.
Regulatory Compliance
FCC/ISED
CE Marked
RED Directive 2014/53/EU
36
EMC Directive 2014/30/EU
Low Voltage Directive 2014/35/EU
UL/IEC/EN 60950
EN 60601-1-1, EN60601-1-2
Certifications
UL2043 plenum rating
Wi-Fi Alliance:
- Wi-Fi CERTIFIED a, b, g, n, ac
- Wi-Fi CERTIFIED 6 (ax)
- WPA, WPA2 and WPA3 – Enterprise with CNSA option, Personal (SAE),
37
Enhanced Open ( OWE)
- WMM, WMM-PS, Wi-Fi Vantage, W-Fi Agile Multiband
- Wi-Fi Location
- Passpoint (release 2)
Bluetooth SIG
Ethernet Alliance (POE, PD device, class 4)
Same Access Point Should Support on-prim as well as Cloud Management
38
functionality from Day 1
Remarks
Complian
Sr. No Specifications ce
(Yes/No)
Technical Specification
Access Point radio should be minimum 2x2 MIMO with 2 special stream on 2.4Ghz
1 and minimum 4x4 MIMO with 4 special stream 5ghz . The AP should have Dual
Radio 802.11ax access point with OFDMA and Multi-User MIMO (MU-MIMO)
Access Point should be 802.11ax ready from day one and support WPA3 and
2
Enhanced Open security from day one
AP should have one SmartRate port (RJ-45, maximum negotiated speed 2.5Gbps)
3 Auto-sensing link speed (100/1000/2500BASE-T) and one 10/100/1000 Mbps
speed LAN port
Access point should support Built-in technology that resolves sticky client issues for
4
Wi-Fi 6 and Wi-Fi 5 devices
Access point should support OFDMA and MU-MIMO for enhanced multi-user
5
efficiency
6 Access point should IoT-ready Bluetooth 5 and Zigbee support
7 Minimum aggregate data rate of 3 Gbps (HE80/HE40)
8 Access Point can have integrated internal antenna
The Max transit power of the AP + Antenna should be as per WPC norms for indoor
Access Points. OEM to give a undertaking letter stating that the AP will configured
9
as per WPC guidelines for indoor AP and also submit the WPC certificate showing
approval.
Access point should have Interna/External Bluetooth Low energy beacon to support
10
advance location based serivces for Mobile engagement solutions and Applications.
11 Should support 16x BSSID per AP radio.
The access point should be capable of performing security scanning and serving
12 clients on the same radio. It should be also capable of performing spectrum analysis
and security scanning using same radio.
Should support BPSK, QPSK, 16-QAM, 64-QAM, 256 QAM and 1024 QAM
13
modulation types
14 Access point should support 802.3af/at POE standard.
Intelligent Power Monitoring (IPM) to continuously monitor and report hardware
energy consumption. AP can also be configured to enable or disable capabilities
15
based on available PoE power – ideal when wired switches have exhausted their
power budget.
16 Access point should have option of external power adaptor as well.
17 Access point should have console port.
18 Must operate as a sensor for wireless IPS
AP model proposed must be able to be both a client-serving AP and a monitor-only
19
AP for Intrusion Prevention services
The Access Point should have the technology to improve downlink performance to all
20
mobile devices.
Access point must incorporate radio resource management for power, channel,
21
coverage hole detection and performance optimization
AP mounting kit should be with locking mechanism so that AP cannot be removed
22
without using special tools.
23 AP should have Kensington security slot
AP should support standalone mode/ Inbuilt Virtual controller mode for specific
24
requirements.
The AP should support Advanced Cellular Coexistence (ACC) to minimizes
25 interference from 3G/4G cellular networks, distributed antenna systems and
commercial small cell/femtocell equipment
The AP should support Supports priority handling and policy enforcement for
26 unified communication apps, including Skype for Business with encrypted
videoconferencing, voice, chat and desktop sharing
The AP should support deep packet inspection to classify and block, prioritize, or
27
limit bandwidth for thousands of applications in a range of categories
28 Passpoint Wi-Fi (Hotspot 2.0) offers seamless cellular-to-Wi-Fi carryover for guests
The Access point should support maximum ratio combining (MRC) for improved
29
receiver performance
The Access point should support cyclic delay/shift diversity (CDD/CSD) for improved
30
downlink RF performance
The Access point should support Space-time block coding (STBC) for increased
31
range and improved reception
The Access point should support Low-density parity check (LDPC) for high-efficiency
32
error correction and increased throughput
The Access point should support Transmit beam-forming (TxBF) for increased signal
33
reliability and range
The Access point should support 802.11ax Target Wait Time (TWT) to support low-
34
power client devices
35 AP should be UL 2043 certified.
Regulatory Compliance
FCC/ISED
CE Marked
RED Directive 2014/53/EU
36
EMC Directive 2014/30/EU
Low Voltage Directive 2014/35/EU
UL/IEC/EN 60950
EN 60601-1-1, EN60601-1-2
Certifications
4
5
7
8
9
10
Specification
Architecture
Shall be 19" Rack Mountable
The switch should have 1x USB-C Console Port , 1x OOBM and 1x USB Type A Host port
8GB SDRAM and 16 MB flash and 8 MB Packet buffer size
The swith should support stacking on uplink port or dedicated stack moduke and should have Stacking
Performance of minimum 40 Gbps. The switch should suppot minimum 8 switch in stack
The Switch should support 16000 MAC address
The switch should have minimum 2K Ipv4 Unicast Routes ,1K Ipv6 Unicast Routes ,1K Igmp Groups ,1K
Mld Groups ,5K Ipv4 ingress Entries and 2K Ipv4 egress ACL Entries.
The should have 48x ports 10/100/1000 BASE-T ports and 4x 1/10 SFP+ ports
The switch should have 176 Gbps of Switching Capacity and 130.9 Mpps Throughput Capacity
The switch should be loaded with 1 direct attached cable 1 meter 10G supported
IPv6 feature
IPv6 host enables switches to be managed in an IPv6 network
Dual stack (IPv4 and IPv6) transitions from IPv4 to IPv6, supporting connectivity for both protocols
MLD snooping forwards IPv6 multicast traffic to the appropriate interface
IPv6 ACL/QoS supports ACL and QoS for IPv6 network traffic
IPv6 routing supports Static and OSPFv3 protocols
RA guard, DHCPv6 protection, dynamic IPv6 lockdown, and ND snooping
High Availability And Resiliency
The swith should support front plane stacking on uplink port or Backplane stacking and should have
Stacking Performance of minimum 40 Gbps. The switch should suppot minimum 8 switch in stack
The Switch should support Uni-directional Link Detection (UDLD) to monitor link connectivity and shut
down ports at both ends if uni- directional traffic is detected, preventing loops in STP- based networks
The Switch should support IEEE 802.3ad LACP supports up to 32 LAGs, each with up to 8 links per LAG
and provide support for static or dynamic groups and a user-selectable hashing algorithm
The Switch should support IEEE 802.1s Multiple Spanning Tree provides high link availability in VLAN
environments where multiple spanning trees are required and legacy support for IEEE 802.1d and IEEE
Management
The Switch should support Built-in programmable and easy to use REST API interface
The Switch should support On-premises and cloud- based management
The Switch should support Zero-Touch Provisioning (ZTP) simplifies installation of switching
The Switch should have Scalable ASIC-based wire speed network monitoring and accounting with no
impact on network performance.
The Switch should support Industry-standard CLI with a hierarchical structure
The Switch should support Management security restricts access to critical configuration commands,
provides multiple privilege levels with password protection, and local and remote syslog capabilities
The Switch should support SNMP v2c/v3 provides SNMP read and trap support of industry standard
Management Information Base (MIB), and private extensions sFlow (RFC 3176)
The Switch should support Remote monitoring (RMON) with standard SNMP to monitor essential
network functions. Supports events, alarms, history, and statistics groups as well as a private alarm
extension group; RMON, XRMON, and sFlow provide advanced monitoring and reporting capabilities
The Switch should support TFTP and SFTP support offers different mechanisms for configuration
The Switch should support Debug and sampler utility support ping and traceroute for IPv4 and IPv6
The Switch should support Network Time Protocol (NTP) synchronizes timekeeping among distributed
The Switch should support IEEE 802.1AB Link Layer Discovery Protocol (LLDP) advertises and receives
management information from adjacent devices on a network, facilitating easy mapping by network
The Switch should support Dual flash images provides independent primary and secondary operating
system files for backup while upgrading
The Switch should support Assignment of descriptive names to ports for easy identification
The Switch should support Multiple configuration files which can be stored to a flash image
The Switch should support Ingress and egress port monitoring enable more efficient network problem
The Switch should support Unidirectional link detection (UDLD) monitors the link between two
switches and blocks the ports on both ends of the link if the link goes down at any point between the
The Switch should support IP SLA for Voice monitors quality of voice traffic using the UDP Jitter and
Same Switch should support Local, On-Prim and Cloud Based management functionality from Day 1
Multicast
The Switch should support IGMP Snooping to allow multiple VLANs to receive the same IPv4 multicast
traffic, lessening network bandwidth demand by reducing multiple streams to each VLAN
The Switch should support Multicast Listener Discovery (MLD) enables discovery of IPv6 multicast
listeners; supports MLD v1 and v2
The Switch should support Internet Group Management Protocol (IGMP) and Any-Source Multicast
(ASM) to manage IPv4 multicast networks; supports IGMPv1, v2, and v3
Layer 2 Switching
The Switch should support 4094 VLAN IDs
The Switch should support Jumbo packet to improves the performance of large data transfers and
support frame size of up to 9198 bytes
The Switch should support IEEE 802.1v protocol VLANs to isolate select non-IPv4 protocols
The Switch should support Rapid Per-VLAN Spanning Tree (RPVST+) to allow each VLAN to build a
separate spanning tree to improve link bandwidth usage.
The Switch should support MVRP to allow automatic learning and dynamic assignment of VLANs
The Switch should support VXLAN encapsulation (tunnelling) protocol for overlay network that enables
a more scalable virtual network deployment
The Switch should support Bridge Protocol Data Unit (BPDU) tunnelling to Transmits STP BPDUs
The Switch should support Port mirroring duplicates port traffic (ingress and egress) to a monitoring
port and support minimum 4 mirroring groups
The Switch should support STP supports standard IEEE 802.1D STP, IEEE 802.1w Rapid Spanning Tree
Protocol (RSTP) for faster convergence, and IEEE 802.1s Multiple Spanning Tree Protocol (MSTP)
The Switch should support Internet Group Management Protocol (IGMP) Controls and manages the
flooding of multicast packets in a Layer 2 network
Layer 3 Routing
The Switch should support Open shortest path first (OSPF) to deliver faster convergence.
The Switch should support OSPFv2 for IPv4 routing and OSPFv3 for IPv6 routing
The Switch should support Static IP routing provides manually configured routing
The Switch should support Static IPv4 and IPv6 routing to provide simple manually configured IPv4 and
The Switch should support IP performance optimization to provide a set of tools to improve the
performance of IPv4 networks including directed broadcasts, customization of TCP parameters,
support of ICMP error packets, and extensive display capabilities
The Switch should support Dual IP stack to maintain separate stacks for IPv4 and IPv6 to ease the
transition from an IPv4-only network to an IPv6-only network design
Convergence
The Switch should support IP multicast snooping (data-driven IGMP) to prevent flooding of IP multicast
The Switch should support LLDP-MED (Media Endpoint Discovery) to define a standard extension of
LLDP that stores values for parameters such as QoS and VLAN to automatically configure network
The Switch should support Auto VLAN configuration for voice RADIUS VLAN uses a standard RADIUS
attribute and LLDP-MED to automatically configure a VLAN for IP phones
Security
The Switch should support integrated trusted platform module (TPM) for platform integrity. This
ensure the boot process started from a trusted combination of switches.
The Switch should supportAccess control list (ACL) support for both IPv4 and IPv6 to allow for filtering
traffic to prevent unauthorized users from accessing the network, or for controlling network traffic to
save resources. rules can either deny or permit traffic to be forwarded. rules can be based on a Layer 2
The Switch should supportACLs filtering based on the IP field, source/ destination IP address/subnet,
and source/ destination TCP/UDP port number on a per-VLAN or per-port basis
The switch should support Enrollment over Secure Transport (EST)and Remote Authentication Dial-In
The Switch should support Terminal Access Controller Access-Control System (TACACS+) delivers an
authentication tool using TCP with encryption of the full authentication request to provide additional
The Switch should support Control Plane Policing sets rate limit on control protocols to protect CPU
The Switch should support multiple user authentication methods. Uses an IEEE 802.1X supplicant on
the client in conjunction with a RADIUS server to authenticate in accordance with industry standards
The Switch should support Web-based authentication provides a browser-based environment, similar
to IEEE 802.1X, to authenticate clients that do not support IEEE 802.1X
The Switch should support MAC-based client authentication
The Switch should support Concurrent IEEE 802.1X, Web, and MAC authentication schemes per switch
port accepts up to 32 sessions of IEEE 802.1X, Web, and MAC authentications
The Switch should support Secure management access delivers secure encryption of all access methods
(CLI, GUI, or MIB) through SSHv2, SSL, and/or SNMPv3
The Switch should support Switch CPU protection to provide automatic protection against malicious
network traffic trying to shut down the switch
The Switch should support ICMP throttling defeats, ICMP denial-of-service attacks by enabling any
switch port to automatically throttle ICMP traffic
The Switch should support Identity-driven ACL to enable implementation of a highly granular and
flexible access security policy and VLAN assignment specific to each authenticated network user
The Switch should support STP BPDU port protection to block Bridge Protocol Data Units (BPDUs) on
ports that do not require BPDUs, preventing forged BPDU attacks
The Switch should support Dynamic IP lockdown with DHCP protection to block traffic from
unauthorized hosts, preventing IP source address spoofing
The Switch should support Dynamic ARP protection to blocks ARP broadcasts from unauthorized hosts,
preventing eavesdropping or theft of network data
The Switch should support STP root guard to protects the root bridge from malicious attacks or
The Switch should support Port security to allow access only to specified MAC addresses, which can be
learned or specified by the administrator
The Switch should support MAC address lockout to prevent particular configured MAC addresses from
connecting to the network
The Switch should support Source-port filtering to allow only specified ports to communicate with
The Switch should support Secure shell to encrypt all transmitted data for secure remote CLI access
The Switch should support Secure Sockets Layer (SSL) to encrypts all HTTP traffic, allowing secure
access to the browser-based management GUI in the switch
The Switch should support Secure FTP to allow secure file transfer to and from the switch and protect
against unwanted file downloads or unauthorized copying of a switch configuration file
The Switch should support Critical Authentication Role to ensure that important infrastructure devices
such as IP phones are allowed network access even in the absence of a RADIUS server
The Switch should support MAC Pinning to allows non-chatty legacy devices to stay authenticated by
pinning client MAC addresses to the port until the clients logoff or get disconnected
The Switch should support Management Interface Wizard to help secure management interfaces such
as SNMP, telnet/SSH, SSL, Web.
The Switch should support Security banner displays a customized security policy when users log in to
The Switch should support Green initiative for RoHS (EN 50581:2012) and WEEE regulations
Certification
EN 60950-1:2006
EN 62368-1
UL 60950-1
CAN/CSA-C22.2 No. 60950-1-07
IEC 60950-1:2005
IEC 62368-1:2014
CNS-14336-1
Compliance Yes/No
S.No
1
4
5
7
8
9
10
Specification
Architecture
Shall be 19" Rack Mountable
The switch should have 1x USB-C Console Port , 1x OOBM and 1x USB Type A Host port
8GB SDRAM and 16 MB flash and 8 MB Packet buffer size
The swith should support stacking on uplink port or dedicated stack moduke and should have Stacking
Performance of minimum 40 Gbps. The switch should suppot minimum 8 switch in stack
The Switch should support 16000 MAC address
The switch should have minimum 2K Ipv4 Unicast Routes ,1K Ipv6 Unicast Routes ,1K Igmp Groups ,1K
Mld Groups ,5K Ipv4 ingress Entries and 2K Ipv4 egress ACL Entries.
Switch -Option4
The should have 48x ports 10/100/1000 BASE-T ports and 4x 1/10 SFP+ ports with 370W POE power
The switch should have 176 Gbps of Switching Capacity and 130.9 Mpps Throughput Capacity
The switch should be loaded with 1 direct attached cable 1 meter 10G supported
The switch support High availability with always-on PoE.
IPv6 feature
IPv6 host enables switches to be managed in an IPv6 network
Dual stack (IPv4 and IPv6) transitions from IPv4 to IPv6, supporting connectivity for both protocols
MLD snooping forwards IPv6 multicast traffic to the appropriate interface
IPv6 ACL/QoS supports ACL and QoS for IPv6 network traffic
IPv6 routing supports Static and OSPFv3 protocols
RA guard, DHCPv6 protection, dynamic IPv6 lockdown, and ND snooping
High Availability And Resiliency
The swith should support front plane stacking on uplink port or Backplane stacking and should have
Stacking Performance of minimum 40 Gbps. The switch should suppot minimum 8 switch in stack
The Switch should support Uni-directional Link Detection (UDLD) to monitor link connectivity and shut
down ports at both ends if uni- directional traffic is detected, preventing loops in STP- based networks
The Switch should support IEEE 802.3ad LACP supports up to 32 LAGs, each with up to 8 links per LAG
and provide support for static or dynamic groups and a user-selectable hashing algorithm
The Switch should support IEEE 802.1s Multiple Spanning Tree provides high link availability in VLAN
environments where multiple spanning trees are required and legacy support for IEEE 802.1d and IEEE
Management
The Switch should support Built-in programmable and easy to use REST API interface
The Switch should support On-premises and cloud- based management
The Switch should support Zero-Touch Provisioning (ZTP) simplifies installation of switching
The Switch should have Scalable ASIC-based wire speed network monitoring and accounting with no
The Switch should support Industry-standard CLI with a hierarchical structure
The Switch should support Management security restricts access to critical configuration commands,
provides multiple privilege levels with password protection, and local and remote syslog capabilities
The Switch should support SNMP v2c/v3 provides SNMP read and trap support of industry standard
Management Information Base (MIB), and private extensions sFlow (RFC 3176)
The Switch should support Remote monitoring (RMON) with standard SNMP to monitor essential
network functions. Supports events, alarms, history, and statistics groups as well as a private alarm
extension group; RMON, XRMON, and sFlow provide advanced monitoring and reporting capabilities
The Switch should support TFTP and SFTP support offers different mechanisms for configuration
The Switch should support Debug and sampler utility support ping and traceroute for IPv4 and IPv6
The Switch should support Network Time Protocol (NTP) synchronizes timekeeping among distributed
The Switch should support IEEE 802.1AB Link Layer Discovery Protocol (LLDP) advertises and receives
management information from adjacent devices on a network, facilitating easy mapping by network
The Switch should support Dual flash images provides independent primary and secondary operating
The Switch should support Assignment of descriptive names to ports for easy identification
The Switch should support Multiple configuration files which can be stored to a flash image
The Switch should support Ingress and egress port monitoring enable more efficient network problem
The Switch should support Unidirectional link detection (UDLD) monitors the link between two
switches and blocks the ports on both ends of the link if the link goes down at any point between the
The Switch should support IP SLA for Voice monitors quality of voice traffic using the UDP Jitter and
Same Switch should support Local, On-Prim and Cloud Based management functionality from Day 1
Multicast
The Switch should support IGMP Snooping to allow multiple VLANs to receive the same IPv4 multicast
traffic, lessening network bandwidth demand by reducing multiple streams to each VLAN
The Switch should support Multicast Listener Discovery (MLD) enables discovery of IPv6 multicast
The Switch should support Internet Group Management Protocol (IGMP) and Any-Source Multicast
(ASM) to manage IPv4 multicast networks; supports IGMPv1, v2, and v3
Layer 2 Switching
The Switch should support 4094 VLAN IDs
The Switch should support Jumbo packet to improves the performance of large data transfers and
The Switch should support IEEE 802.1v protocol VLANs to isolate select non-IPv4 protocols
The Switch should support Rapid Per-VLAN Spanning Tree (RPVST+) to allow each VLAN to build a
separate spanning tree to improve link bandwidth usage.
The Switch should support MVRP to allow automatic learning and dynamic assignment of VLANs
The Switch should support VXLAN encapsulation (tunnelling) protocol for overlay network that enables
The Switch should support Bridge Protocol Data Unit (BPDU) tunnelling to Transmits STP BPDUs
The Switch should support Port mirroring duplicates port traffic (ingress and egress) to a monitoring
The Switch should support STP supports standard IEEE 802.1D STP, IEEE 802.1w Rapid Spanning Tree
Protocol (RSTP) for faster convergence, and IEEE 802.1s Multiple Spanning Tree Protocol (MSTP)
The Switch should support Internet Group Management Protocol (IGMP) Controls and manages the
flooding of multicast packets in a Layer 2 network
Layer 3 Routing
The Switch should support Open shortest path first (OSPF) to deliver faster convergence.
The Switch should support OSPFv2 for IPv4 routing and OSPFv3 for IPv6 routing
The Switch should support Static IP routing provides manually configured routing
The Switch should support Static IPv4 and IPv6 routing to provide simple manually configured IPv4 and
The Switch should support IP performance optimization to provide a set of tools to improve the
performance of IPv4 networks including directed broadcasts, customization of TCP parameters,
The Switch should support Dual IP stack to maintain separate stacks for IPv4 and IPv6 to ease the
transition from an IPv4-only network to an IPv6-only network design
Convergence
The Switch should support IP multicast snooping (data-driven IGMP) to prevent flooding of IP multicast
The Switch should support LLDP-MED (Media Endpoint Discovery) to define a standard extension of
LLDP that stores values for parameters such as QoS and VLAN to automatically configure network
The Switch should support Auto VLAN configuration for voice RADIUS VLAN uses a standard RADIUS
attribute and LLDP-MED to automatically configure a VLAN for IP phones
Security
The Switch should support integrated trusted platform module (TPM) for platform integrity. This
ensure the boot process started from a trusted combination of switches.
The Switch should supportAccess control list (ACL) support for both IPv4 and IPv6 to allow for filtering
traffic to prevent unauthorized users from accessing the network, or for controlling network traffic to
save resources. rules can either deny or permit traffic to be forwarded. rules can be based on a Layer 2
The Switch should supportACLs filtering based on the IP field, source/ destination IP address/subnet,
and source/ destination TCP/UDP port number on a per-VLAN or per-port basis
The switch should support Enrollment over Secure Transport (EST)and Remote Authentication Dial-In
The Switch should support Terminal Access Controller Access-Control System (TACACS+) delivers an
authentication tool using TCP with encryption of the full authentication request to provide additional
The Switch should support Control Plane Policing sets rate limit on control protocols to protect CPU
The Switch should support multiple user authentication methods. Uses an IEEE 802.1X supplicant on
the client in conjunction with a RADIUS server to authenticate in accordance with industry standards
The Switch should support Web-based authentication provides a browser-based environment, similar
to IEEE 802.1X, to authenticate clients that do not support IEEE 802.1X
The Switch should support MAC-based client authentication
The Switch should support Concurrent IEEE 802.1X, Web, and MAC authentication schemes per switch
port accepts up to 32 sessions of IEEE 802.1X, Web, and MAC authentications
The Switch should support Secure management access delivers secure encryption of all access methods
(CLI, GUI, or MIB) through SSHv2, SSL, and/or SNMPv3
The Switch should support Switch CPU protection to provide automatic protection against malicious
The Switch should support ICMP throttling defeats, ICMP denial-of-service attacks by enabling any
switch port to automatically throttle ICMP traffic
The Switch should support Identity-driven ACL to enable implementation of a highly granular and
flexible access security policy and VLAN assignment specific to each authenticated network user
The Switch should support STP BPDU port protection to block Bridge Protocol Data Units (BPDUs) on
ports that do not require BPDUs, preventing forged BPDU attacks
The Switch should support Dynamic IP lockdown with DHCP protection to block traffic from
unauthorized hosts, preventing IP source address spoofing
The Switch should support Dynamic ARP protection to blocks ARP broadcasts from unauthorized hosts,
preventing eavesdropping or theft of network data
The Switch should support STP root guard to protects the root bridge from malicious attacks or
The Switch should support Port security to allow access only to specified MAC addresses, which can be
The Switch should support MAC address lockout to prevent particular configured MAC addresses from
The Switch should support Source-port filtering to allow only specified ports to communicate with
The Switch should support Secure shell to encrypt all transmitted data for secure remote CLI access
The Switch should support Secure Sockets Layer (SSL) to encrypts all HTTP traffic, allowing secure
access to the browser-based management GUI in the switch
The Switch should support Secure FTP to allow secure file transfer to and from the switch and protect
against unwanted file downloads or unauthorized copying of a switch configuration file
The Switch should support Critical Authentication Role to ensure that important infrastructure devices
such as IP phones are allowed network access even in the absence of a RADIUS server
The Switch should support MAC Pinning to allows non-chatty legacy devices to stay authenticated by
pinning client MAC addresses to the port until the clients logoff or get disconnected
The Switch should support Management Interface Wizard to help secure management interfaces such
The Switch should support Security banner displays a customized security policy when users log in to
The Switch should support Green initiative for RoHS (EN 50581:2012) and WEEE regulations
Certification
EN 60950-1:2006
EN 62368-1
UL 60950-1
CAN/CSA-C22.2 No. 60950-1-07
IEC 60950-1:2005
IEC 62368-1:2014
CNS-14336-1
Compliance Yes/No
S.No
1
5
6
9
10
Specification
Architecture
The switch should have at least support 24 ports of 1GbE/10GbE (BaseT) , 4 Port 1GbE/10GbE
(SFP/SFP+)and 4 ports of 40GbE/100GbE (QSFP+/QSFP28) from day one
The switch Shall support1Gbase-T,SX,LX, 10Gbase-SR,LR,,QSFP SR4,LR4 and QSFP28-SR4,LR4,
The switch shall have 1.28 Tbps switching capacity
The switch should have 98K MAC address table size, 24K IPv4 Unicast Routes and 12K IPv6 Unicast
Routes
The switch should support 4000 Multicast Routes and 4000 IGMP Groups
The switch should support 32MB Packet buffer
The Switch should support Jumbo Frames and Loopback
The Switch should Protect against unknown broadcast, multicast, or unicast storms with user-defined thresholds
The switch should support 16GB RAM, 8GB Flash
Quality of Service (QoS)
The Switch should support Strict priority (SP) queuing and Deficit Weighted Round Robin (DWRR)
The Switch should support Data Center Bridging (DCB),Priority Flow Control (PFC),Enhanced Transmission
Service (ETS) and DCB Exchange Protocol
The Switch should Prevent accumulation of excessive congestion with periodic flushing. Avoids packets buffering
for an extended time period and support Flow-Control Guard
The Switch should able to Marks packets as ECN-CE (Congestion Experienced) to help TCP to reduce receive
window size during congestion Advanced Lossless Pool Configuration
Resiliency and High Availability
The proposed switch should support distributed and redundant architecture by deploying two switches with
each switch maintaining independent control and synchronized during upgrades or failover and should support
upgrades during live operation.
The switch should have modular operating system with micro-services or equivalent architecture providing
superior fault tolerance and high availability
The Switch should have Hot swappable power supply and fan modules from day one
The Switch should support Virtual Router Redundancy Protocol (VRRP) and Bidirectional Forward Detection
(BFD)
The Switch should support Unidirectional Link Detection (UDLD) and support IEEE 802.3ad LACP
Management
The Switch should support REST API interface and support Industry-standard CLI with a hierarchical structure
The Switch should provide Restricts access to critical configuration commands; offers multiple privilege levels
with password protection; ACLs provide SNMP access; local and remote Syslog capabilities allow logging of all
access.
The Switch should support IP SLA,SNMP v2c/v3 and sFlow and support TFTP and SFTP
The Switch should support ping and traceroute for IPv4 and IPv6 and support Network Time Protocol (NTP)
The Switch should IEEE 802.1AB Link Layer Discovery Protocol (LLDP) and Dual flash images
Layer 2 Switching
The Switch should up to 4000 port-based or IEEE 802.1Q-based VLANs, VLAN Translation,Bridge Protocol Data
Unit (BPDU) tunneling and Port mirroring
The Switch should support IEEE 802.1D STP, IEEE 802.1w Rapid Spanning Tree Protocol (RSTP) for faster
convergence, and IEEE 802.1s Multiple Spanning Tree Protocol (MSTP) and Rapid Per-VLAN spanning tree plus
(RPVST+) or equivalent
Same Switch should have Local, On-Prim and Cloud Management Functionality from Day 1
Layer 3 Services
The Switch should support Address Resolution Protocol (ARP)
The Switch should support directed broadcast on configured network subnets.
The Switch should support Dynamic Host Configuration Protocol (DHCP)
The Switch should support DHCP Relay enables DHCP operation across subnets.
The Switch should support DHCP Server
The Switch should support for DHCP smart relay.
Allows DHCP relay coexistence with DHCP server for both IPv4 and IPv6.
The Switch should support Domain Name System (DNS)
Layer 3 Routing
The Switch should support Static IPv4 and IPv6 routing and VRF
The Switch should support Sub-Interface
The Switch should support Open shortest path first (OSPF) and OSPFv3
The Switch should support Border Gateway Protocol 4 (BGP-4), Multiprotocol BGP (MP-BGP) and Dynamic BGP
Peering
The Switch should support Routing Information Protocol version 2 (RIPv2) and Routing Information Protocol
Next Generation (RIPng)
The Switch should support Policy Based Routing (PBR) and support the tunneling of IPv6 traffic in an IPv4
network.
The Switch should support Equal-Cost Multipath (ECMP),Generic Routing Encapsulation (GRE) and Dual IP stack
The Switch should support Dynamic VXLAN with BGP-EVPN
The Switch should support PIM-SM/IGMP snooping in the VXLAN Overlay
The Switch should support IPv6 VXLAN/EVPN Overlay Support
The Switch should support IPv6 traffic over the VXLAN overlay
The Switch should support VXLAN distributed anycast gateway,VXLAN ARP/ND suppression and support VXLAN
Group-Based Policy (GBP) and Role-based Policies
Security
The Switch should support Access control list (ACL) Features
The Switch should support ACLs that can also protect control plane services such as SSH, SNMP, NTP or web
servers.
The Switch should support 802.1x, Mac-auth, Port-Access Policy, Static Port Filtering.
The Switch should support Private VLAN
The Switch should support Remote Authentication Dial-In User Service (RADIUS) and Terminal Access Controller
Access-Control System (TACACS+)
The Switch should support RADIUS authentication and accounting data to be passed safely and reliably across
insecure networks such as the internet.
The Switch should support Secure shell (SSHv2)
Multicast
The Switch should support Internet Group Management Protocol (IGMP),IGMPv1, v2, and v3
The Switch should support PIM Multicast Boundary (v4)
The Switch should support Multicast Listener Discovery (MLD)
The Switch should support Protocol Independent Multicast (PIM), PIM-SSM,PIM-SM and PIM-Dense Mode,
The Switch should support Anycast Rendezvous Point (RP), Multicast Service Delivery Protocol (MSDP),MSDP
Mesh Groups
The Switch should support IGMP/MLD Snooping,support FastLeave (FL) and Forced-FastLeave (FFL)
Environmental Features
The Switch should support RoHS (EN 50581:2012) regulations.
The switch support Operating temperature of 0°C to 40°C
Safety : IEC 62368
EMC : EN 55032
Lasers :EN60825
Compliance Yes/No
SL No.
A
1
3
4
5
6
B
3
4
10
11
12
13
14
15
C
1
8
D
4
5
6
7
8
9
10
E
1
5
6
7
8
F
1
2
4
5
6
G
4
G
2
3
4
Specifications
The proposed solution shall meet the below specifications. Any hardware/software/licenses required to enable
the functionality shall be provided from Day 1
Device Profiling and Visibility
Provide automatic detection and categorization of endpoints for security and audit demands, regardless of
device type, using contextual data and use this data for optimizing access policies
Stored profiling data should identify device profile changes and dynamically modify authorization privileges. For
example, if a printer appears as a Windows laptop, the system can automatically deny access.should support
Load balancing for profile scans and Scheduled Subnet scans
Support passive device profiling methods such as DHCP, Span Ports, HTTP User-Agent, MAC OUI and TCP SYN-
ACK handshakes
Support active device profiling methods such as SNMP, Subnet Scan, SSH, Sflow, WMI and NMAP Scan
Internal device fingerprint dictionaries that provide a way to automatically or manually update periodically.
Capable to define custom fingerprints for wired and wireless devices
Offer a comprehensive dashboard to see the total number of endpoints, and the number by category, family
and device type.
Authentication, Authorization and Accounting (AAA)
Integrated scalable AAA services (authentication, authorization, and accounting) including access policy
management with a complete understanding of context, such as user’s role, device type, location, time of day
etc.
User and device authentication based on 802.1X, and Web Portal access methods across multi-vendor wired
networks , wireless networks, and VPNs
Usage of multiple authentication protocols concurrently, such as PEAP, EAP-FAST, EAP-TLS, EAP-TTLS, and EAP-
PEAP-Public
Must support RADSEC protocol to support RADIUS datagrams over TCP and TLS
Must be supplied with fine-grained control using attributes from multiple identity stores, such as Microsoft
Active Directory, Kerberos, LDAP-compliant directory, Open Database Connectivity (ODBC)-compliant SQL
database, token servers, and internal databases across domains within a single policy from day one
Non-802.1X devices (such as printers, IP phones, IP cameras and IOT devices) can be identified as known, based
on the presence of their MAC addresses in database, or unknown upon connecting to the network.
Integrated TACACS+ server for secure authentication of device administrators, operators etc. with varied
privilege levels. It should keep a track of the changes made by the logged-in user.
Customizable Reporting with manual or scheduled reports in PDF/CSV ormats, inventory dashboard showing
details of learned devices, real-time monitoring of access requests and events, proactive alerts through Email
HTTP/RESTful API’s, syslog messaging and Extensions capability to exchange endpoint attributes with firewalls,
SIEM, endpoint compliance suites and other solutions for enhanced policy management
Mobile Device Management Integration to fetch information such as device manufacturer, model, OS Version,
Jail-broken, presence of any black-listed application, MDM Agent installation status etc. and use this information
in access policies
API Integration with helpdesk software allowing dynamic creation of problem tickets of any network triggered
policy breaches
Inbuilt utilities for interactive policy simulation and monitor mode for assessing the policies before applying to
the production network
Process inbound threat-related events (which are Syslog events received
from any third-party vendor device, such as Firewall, SIEM) and perform enforcements and actions based on the
defined enforcement policies and services.
Must have Multi domain AD support
All the user machines must be evaluated before allowed on the network and thus must only deploy with a
secured IEEE 802.1X architecture
Guest Access Management
Easy-to-use guest management solution for visitors, contractors, partners, RBI Auditors etc. on wireless and
wired networks using any type of device.
Guest access through captive portal with extensive branding and customization including company logos, visual
imagery and optional advertisements with multimedia content to extend organization's messaging
Captive portal should have mobile device awareness to automatically size for smart phones, tablets and laptops
Guest self-registration through the web portal, delivering username and password directly to the visitor’s Web
browser, or sent via email or SMS.
Sponsor-based approval workflow to enable an internal employee to approve guest account before guest is
allowed to access the network
Customize guest access privileges to enforce bandwidth limits, access to specific resources, length of
connections and set automatic account expiry after a specified number of hours or days
Guest portal shall have an option to accept Social logins using Facebook, Twitter, Slack and other social media
credentials.
Third-party integration providing customizable workflows using rest-based API’s for delivering streamlined
registration and payment system integration
Personal Device (BYOD) Management
Automatically configure and provision mobile devices such as Windows, macOS, iOS, Android, Chromebook, and
Ubuntu, enabling them to securely connect to enterprise network. Support for atleast 1000 users on day one.
Each user can have upto two devices and support Sponsor approval required option for Onboarding.
Offer built-in certificate authority (CA) to secure device onboarding without requiring the implementation of an
external CA or make changes to an internal public key infrastructure (PKI). Incase for some reason any OEM
unable to provide inbuilt CA then can provide it externally, however from day one . should work as a Root or
Intermediate CA and support Self help portal for certificate management
Support the distribution of in-built CA generated certificates to third-party applications using SCEP and EST (RFC
7030) protocols.
Ensure rapid revocation and deletion of certificates for specific mobile devices if a user leaves the organization
or the mobile device is lost or stolen.
Support Online Certificate Status Protocol (OCSP)
Capable to define the number of devices that can be on-boarded per user and validity of their certificates
Automatic device certificate provisioning/installation with sponsor approval required option for onboarding
Certificate Provisioning must work even after failover of its nodes
Must support Oauth and SAML 2.0 Identity Provider, which allows seamless single sign-on (SSO) to the cloud or
on-premise applications.
Must support multiple multi-factor authenticatiors (MFA/2FA) such as Kasada, DUO, Imageware etc.
Should support Secure certificate based onboarding and Automatic device certificate provisioning / installation
Endpoint Posture Checking
Perform advanced endpoint posture assessments to ensure organization's compliance is met before devices
connect
Support the following operating systems and versions: Microsoft Windows 7 and above, Apple macOS 10.10 and
above
Users of unhealthy endpoints that do not meet compliance requirements,
should receive a message about the endpoint status and instructions on how to achieve compliance
Endpoint posture and health checks should include Installed Applications, AntiVirus, Firewall, Network
Connections, Processes, Patch Management, Peer to Peer applications, Virtual Machines, USB Devices etc
Provide persistent agent for operating system to provide nonstop monitoring of the end point with automatic
remediation and control
Offer web-based dissolvable agent for endpoint compliance check of personal and non IT-issued devices
Must be able to detect multiple network interfaces and Control it
Must be able to detect USB, disable it and remove it
Management and Reporting
Predefined templates for reporting must be available
A reporting option must be available to provide a method for delivering validated templates to unique
requirements in a timely manner.
Understanding trends, compliance and forensic analysis requires the ability to generate reports on data from
selectable time frames in the past as well as on current data i.e Specific date and time range
In order to provide the information needed to make decisions and minimize data overload reporting systems
must provide robust filtering options.
Must have support for notifications via Email
Web-based user interface that simplifies policy configuration, monitoring and troubleshooting
Requirement Summary
Hardware appliance or Virtual Appliance (Automatic HA failover) with 1:1 or N:1 redundancy . If Virtual
Appliance is proposed, it shall be offered with OEM recommended Hardware/VM Hypervisor. There must be
dedicated appliance for Reporting
The solution shall support minimum 200 authentications per second for 802.1x/RADIUS/TACACS+/Guest and
minimum 50 clients/second for endpoint posture checking
Licenses supporting minimum 25000 concurrent sessions for AAA, Endpoint posture check, Guest access and
TACACS+ on Day 1. Upgradeable to 50,000 concurrent sessions
5-Year 24x7 Hardware and Software Warranty with perpetual licenses. If it is not possible to offer perpetual
licenses, the solution must include atleast 10 years of licensing upfront
OEM and Product Eligibility/Compliance
The solution shall be Common Criteria certified for network access control (NAC) solution, under both the
Network Device collaborative Protection Profile (NDcPP) and the Extended Package for Authentication
Servers modules. The certificate shall be attached as reference
The solution shall be recognized as one of the leaders in network access control (NAC) by 3rd party research
firms like Gartner, Frost & Sullivan etc. The report shall be attached as reference
OEM shall have R&D facility in India; if required site visit shall be arranged
OEM shall be capable of providing direct onsite warranty service for the products procured. The warranty service
datasheet shall be attached with the proposal
Compliance
Remarks
(Yes/No)
1 CCCF Chandrapur Hospital LAN NETWORK Project
1.1. Objectives of the CCCF Chandrapur Hospital LAN NETWORK
The CCCF Chandrapur Hospital LAN NETWORK infrastructure/ facilities and a
handle increased volume of users. Implementation of multiple applications and oth
like e-Office etc. is mainly dependent on the network.
2 Scope of Work
This RFP is for the implementation of network Infrastructure for CCCF Chandrapu
Management The contract period shall be for a period of three years from the date
contract, however, the onsite O&M support is for period of 3 Years.
2.1 LAN at CCCF Chandrapur Hospital
The bidder is required to design, supply, install, operate and maintain the LAN Ne
Chandrapur Hospital .
2.1.1 Installation and Commissioning
The entire infrastructure shall be completed in phases for CCCF Chandrapur Hos
1.2.1.1 Reporting
The agency should submit monthly MIS report to CCCF on the performance of the
3 Schedule of Requirements
3.1 Indicative BOM
Total
SL FLOOR
Nodes
1 Ground Floor Main Building 400
Ground Floor Annex Building 78
2 1st Floor 329
1st Floor Annex Building 31
3 2nd Floor 300
4 3rd Floor 311
5 4th Floor 192
Total NDD 1641
The above mentioned quantities are indicative, upon issue of LoI, the final BOM s
same has to be approved by CCCF and issue PO. CCCF may increase and decre
bid.
Connection Module Cat. 6A, UTP, 1xRJ45/u, Snap-in (Jack Panel sid
Standards: IEC 60603-7-41: Electrical Characteristics of the Telecom
1.0 2017-11 EN 50173-1: May 2011
• Connector class - connection module
• Material: Halogen-free and heavy-metal free.
• Should be unshielded and support minimum frequency of 500
• Holder for connector / module – Snap in
• Should provide 10Gbast T performance upto 100 meter with 4
4 • Should have mating cycles of 900 or above and should have G
insulation displacement contact area
• Information Outlet should be Toolless.
• Termination should be without pair cross over
• Should have integrated production date and serial number (ea
• Should be verified by ETL or should have attestation of confor
(Certificate to be available online on Intertek or 3Ptest website)
12F- 19” 1U Rack Mount Fiber Shelf loaded with LC-PC MM OM3 DX
Fibre Shelf Specification:
• The 19” 1U Fiber Shelf is a shelf assembly for a fiber managem
environment.
• material Metal sliding style Loaded as per design for 12 Fiber
• ports 12
• Connector type LC Duplex
13 • Features. Should be Easily removable Top plate with push butt
• Should have Inner tray of patch panel can be easily slide front & b
• Should have Splice elements for up to 6dx LC-PC DX
• Should have Stress free and easy to handle fiber guidance
• Should have High degree of flexibility and modularity
• General Specs All Fiber and copper cabling should be from sam
years of application warranty
66
48F- 19” 1U Rack Mount Fiber Shelf loaded with LC-PC MM OM3 DX
Fibre Shelf Specification:
• The 19” 1U Fiber Shelf is a shelf assembly for a fiber managem
environment.
• material Metal sliding style Loaded as per design for 48 Fiber
• ports 48F
• Connector type LC Duplex
14
• Features. Should be Easily removable Top plate with push butt
• Should have Inner tray of patch panel can be easily slide front & b
• Should have Splice elements for up to 24dx LC-PC DX
• Should have Stress free and easy to handle fiber guidance
• Should have High degree of flexibility and modularity
• General Specs All Fiber and copper cabling should be from sam
years of application warranty
Technical data:
Technical data:
re than 99%
spital.
cabling and the cost of the same should be included in the overall bid.
ng the services as defined under this RFP.
ved or tampered with under any circumstances, without the approval of the
es.
ed by bidder without additional cost or expense, (i.e. shipping and delivery charges
ld liable for any damages to or theft of any components. It will therefore, be the
quired for the installation and configuration of the all proposed active/passive
ing both copper and fibre optic patch cables, to complete the installation. All cables
A 606 standards and must indicate connections at both ends.
loop” style wraps to provide proper support and management of cables. No plastic
ces above, below, and between stacks of devices at all the floors and wiring
hould not be any cross wiring of the two, in order to avoid any interference, or
of new cables.
es for all aspects of RFP compliance. The ATP shall be approved by the CCCF.
P specifications for structured cabling and all the conditions mentioned in above
tecture, Network layout Plan, Data Sheets for all Components and User manual
ts of LAN components,for Structured Cabling.
ddressed by the Bidder within 10 days of sharing the observation. After the
ovide the written approval of acceptance of network. At this time upon the CCCF’s
starts, this constitutes Date of Acceptance. The warranty begins with the date of
a period of 3 years from the date of Go-Live of the entire AG OFFICE LAN NETWOR
e network. The agency should submit SLA compliance to report to CCCF for all the SLA cond
shall be prepared by the selected agency based on the detailed site survey, the
ease the quantity of any item and bidder has to provide the same as per financial
Compliance Remarks/
Yes/No Deviation
ding clip
ng kit, labeling field, accepting the snap-
Compliance Remarks/
Yes/No Deviation
MHZ
connectors
Gold-plated contact area and tin-plated
Compliance Remarks/
Yes/No Deviation
de)
mmunication Outlets ISO/IEC 11801-1 Ed
MHZ
connectors
Gold-plated contact area and tin-plated
Compliance Remarks/
Yes/No Deviation
lock protection
Compliance Remarks/
Yes/No Deviation
DN 2xRJ45 and fiber optic connectors
Compliance Remarks/
Yes/No Deviation
DN
Compliance Remarks/
Yes/No Deviation
Compliance Remarks/
Yes/No Deviation
istics of the Telecommunication Outlets
s (RJ11, RJ12, RJ45), PCB-free and tool-
.5 mm - 0.65 mm) and flexible cables
in acc. with EIA/TIA 568-A/B,
MHZ
connectors
Gold-plated contact area and tin-plated
Compliance Remarks/
Yes/No Deviation
p-in (Jack Panel side)
ristics of the Telecommunication Outlets
s (RJ11, RJ12, RJ45), PCB-free and tool-
(0.5 mm - 0.65 mm) and flexible cables
sover in acc. with EIA/TIA 568-A/B,
module
y-metal free.
m frequency of 250 MHZ
– Snap in
00 meter with 4 connectors
Gold-plated contact area and tin-plated
t area
Toolless.
ir cross over
d
er (each module) for quality tracing
conformity by 3P in channel for Cat6
or 3Ptest website)
Compliance Remarks/
Yes/No Deviation
nt
ory 6 specifications of the IEC 60603-7-4
PoEP (IEEE 802.3at), 4PPoE (IEEE
ording to IEC 61935-2.
standard at 250 Mhz
standard at 250 Mhz
(IEEE 802.3at),
lock protection
Compliance Remarks/
Yes/No Deviation
d, LSZH, Indoor/Outdoor Cable
2; IEC 60794-1-2 E1; IEC 60794-1-2 E11;
-2 E10;
Nos.
793-1-21
Compliance Remarks/
Yes/No Deviation
X
tons
back
Compliance Remarks/
Yes/No Deviation
X
tons
back
Compliance Remarks/
Yes/No Deviation
Compliance Remarks/
Yes/No Deviation
80 81
Compliance Remarks/
Yes/No Deviation
angle, top & bottom cover with cable
cover with cable entry cut-outs-
Compliance Remarks/
Yes/No Deviation
ble type-on-request)
sion
Compliance Remarks/
Yes/No Deviation
B plastic housing
ditions defined in this RFP along with the attendance report of the resources for release o
of quarterly payments.
GOVERNMENT OF INDIA
CENTRAL PUBLIC WORKS DEPARTMENT
Handbook
on
“Data Connectivity Framework
in
Public Buildings”
Disclaimer
The world of network engineering is very complex and is full of new and ever growing
vocabulary. Nevertheless, it is very interesting.The basic concept of networking of computers
and other peripherals through the use of cables and other hardware including details of
various components of hardware and their basic specifications is guiding in preparing the bill
of quantities, forming of conditions and executing the work has been covered here.The
technology of this field is changing very fast and it is very difficult to keep up-to date with
changes. Hence basic framework only has been provided here which needs to be suitably
revised as per the requirement of individual Client/ Department.
CONTENTS
1 Introduction 1-1
7. Standards 36-37
8. Glossary 38-42
0
Section 1
Introduction
CPWD is into the construction of buildings for Central Government Departments, Institutions
funded by Central Government/State Government either partly or fully or by Central PSUs/State
PSUs. As time has progressed, the construction of Smart / Intelligent buildings besides being energy
efficient and renewable energy compliant has been expected by most of the organizations. In such
buildings, the various Equipments installed for fire safety, energy consumption, video surveillance,
building services management etc. communicate with each other, in addition to the occupants of the
building. Thus data networking together with dedicated communication network is the need of
every modern building.
Modern Government offices require data communicationfor file transfer, e-mails, e-Governance
initiatives, e-office applications, ERP applications etc. over secured network for their effective
functioning. In addition, various other systems like Video surveillance, Building Management,
voice communication and other systems like access control, lighting control, Video conferencing
etc. are also the requirement of modern and intelligent offices. Modern technology has provided
thecomprehensivesolution for not only faster data transfer but also integration of all communication
systems whether it is voice communication, human- machine or machine to machine
communication for the efficient operation and effective maintenance of building services including
safe functioning of the building from the point of view of fire, unauthorized entrants etc. So, many
systems can be integrated with one network only. This can ease the data and communication
infrastructure requirements of the building to a great extent. Many times, the building owner wants
to incorporate number of systems for meeting his objectives, but due to paucity of budget/fund, it
may not be feasible to include those systems at the time of original construction. In such situations,
providing networking framework in the building eases the situation considerably.However,
sometimes certain considerations like security restrictions for video surveillance etc. necessitate
separate network.In such cases, a separate sub network can be considered with the provision to
connect to the mainframe of the network system of the building. Therefore, it is quite reasonable to
conceive framework for data networking while planning different services for the building.This
framework should however have the flexibility to add any new system requiring data framework
within a reasonable time frame.
In addition to the normal office buildings, there are other type of buildings like Academic
Institutions,Court rooms, Hospitals, Hostels, Barracks, Sports complexes etc. where different
activities take place and accordingly requirements of these buildings take a different dimension over
and above a normal office building. For instance, in an academic institution, there are many class
rooms requiring smart black boards and computing devices for interactive discussions among
faculty and students with internet facility. In a hospital there are OPDs, ICUs, Labs, Surgery Rooms
etc. requiring integration of all services for the hospital management to review and record. All these
facilities necessitate different requirements on the centralized data network and therefore need
special focus for enabling these buildings to be intelligent, people friendly and efficient in their core
activity.All these specialized activities together with other miscellaneous facilities are possible
through proper data framework.
1
Section 2
Data network in a building can be conceptualized based on various factors. Prominent among
them are- Number of occupants in the building, types of business activity,features of building i.e.
number of floors, number of people working,type and number of control systems, computing and
other peripheral devices, redundancy to avoid disruption of connectivity of data as well as
communicationsetc.
Based on a typical high-riseofficebuilding,having different business activities being carried out at
different floors, following plan can be considered as a general layout ( however, there may be
variations possible due to availability of numerous options):
2
The above diagram depicts the schematic arrangement of Network Operating Centre
abbreviated as NOC. For the sake of redundancy, two such centers can be conceived in any
building at a location convenient for access by the team of network operation and maintenance
personnel as well as Equipments; without disturbing the business activities of the work space.
Note:- 1.Firewall can be a part of NOC or it can be provided in the Cloud2.Switching is
usually three layered.
The flow of data communication is a two-way process. Network service provider depending
upon the agreement between user and himself, provides the data at a speed based on its
capability and user’s requirement. This data is provided in the user’s premises through fiber
optic cable over leased telephone lines.
100% redundancy is normally conceived at the time of conceptualizing the NOC to provide
continuous flow of data in case of failure of one of the WAN links. The network service
provider has arrangements with its Data Centre to provide various services which different
clients’ demand and through WAN protocol and configuration, NSP provides them to its bulk
customers. Within the premises of the customer, data is further transmitted through
distribution switches which are in three layers namely Core layer which connects both the
NOCs, distribution layer which sends data to various floors and then access layer to various
offices in each floor. The computers and other devices in the floors are connected in star
formation for direct transmission of data without any loop or other device for fastest
communication.
Campus is a collection of buildings and grounds that belong to a given institution, either
academic or non-academic. Thus, the scheme of data networking is little different in a campus
as compared to a building. In fact, a campus consists of a conglomeration of buildings which
are built either adjacent to each other or are separated by a few meters. In such cases, the main
networking Equipments are kept in the main building which is normally the Administrative
building or block.
The distribution within that building and other buildings is done through CAT6 and fiber optic
cable depending upon the separation distance. The distinguishing features of the campus are
the networking through a dual ring network connected by optical fiber network besides
distribution and access layer in sub buildings. For providing redundancy BGP(Border
Gateway Protocol) Multihoming can be used. It is one of the key protocols to seek redundancy
in Internet connection. With Multihoming, it provides network optimization while offering
redundancy .
3
Figure 2: Schematic Diagram of Campus Area Network
4
Section 3
Elements of Data Network
There are various elements of the data networking framework and a reasonable understanding
of them is necessary in the visualizationand implementation of proper framework and
solutions.
Network service-
Network service provides data storage and manipulation, presentation, communication or other
capabilities which are implemented using a client-server or peer-to-peer architecture based on
application layer network protocols.
5
Figure 4: Examples of Network services
Cloud –
Storehouse of many resources related to data transmission, this term is generally used to describe
data centers available to multiple users over the internet. Large clouds are predominant today and
have functions distributed over multiple locations from central servers. Clouds limited to a single
organization are called Enterprise clouds and when to many organizations are called Public
Clouds.The word cloud is now used for the internet as a metaphor and a standard cloud shape is
used to denote storehouse of network resources.
Figure 5 : Cloud
The activities contained inside a cloud can be many. However, broadly there are 3 different types
of activities namely: Application, Platform and Infrastructure. The above diagram illustrates few
examples of these activities.
6
This cloud can then be connected to different users through different arrangements like ISPs i.e.
Internet Service Providers for general public via either mobile network or through broadband,
NSPs i.e. Network Service Providers for bulk institutional users etc.
WANLink
WAN Link is a communication circuit that joins two or more local area networks (LANs) into a
wide area network (WAN) through fiber optic cable.It is provided by Network Service Provider to
Institutional Client and controlled from the premises where it is physically located.
The Link or line is connected through fiber optic cable required for transfer of large amount of
data. Normally, minimum two links through fibre optic cables are taken which are the leased lines
from the telecom company.
WAN- WAN is the Wide Area Network for feeding data over a large network of devices. The
network in the context of network service provider covers wide area and hence is called WAN. It
normally feeds network to a large group of buildings over a large area.
Router- Routera networking device forwards data packets between different computer networks.
Thus, it performs traffic directing functions on Internet. Data sent through the internet, such as a
web page or email, is in the form of data packets which are exchanged between different networks
through Router.Routersare wired as well as wireless.
7
Routers can be distinguished based on their operating network. Hence, aRouter in local area
network (LAN) of a single organization is called an interior Router while aRouter operating in the
Internet backbone is called as exterior router. A router connecting a LAN with the Internet or a
wide area network (WAN) is called a border router, or gateway router.
Figure 7 : Router
Firewall – It acts as a protective shield of the network. There are all sorts of spurious data in a
network due to multiple entry points. Further hackers also endlessly attempt to misdirect or steal
many information.Thus, vulnerability of data network is covered by firewall. But Firewall makes
the flow of data slow.
A firewall is therefore a network security system for monitoring and controlling incoming and
outgoing network traffic on the basis of predetermined security rules. A firewall establishes a
barrier between a trusted internal network anduntrusted external network, such as Internet.
Firewalls are categorized as network firewalls or host-based firewalls. Network firewalls filter
traffic between two or more networks and run on network hardware. Host-based firewalls on the
other hand run on host computers and control network traffic in and out of those machines.
8
LAN
Within the building, various data exchanging devices are inter-connected. This connection within
the Office/Ministry/Department is known as LAN or Local Area Network. There are many
configurations possible and selection of any configuration depends upon many factors like type of
office, redundancy required, secrecy of the data etc. Configurations/topologies define the manner
in which network devices are organized.
Seven common LAN topologies exist: bus, ring, dual ring, star, tree, mesh and hybrid. Topologies
are driven fundamentally by types of connection:Point-to-Point and a Multi-Point
connection.Aconnection is a direct link between two devices. For example, when a computer is
attached to a printer, point-to-pointconnectionis created. In networking terms, pointto point
connections are associated with modems and PSTN (Public Switched Telephone Network)
communications. A multipoint connection on the other hand is a link between three or more
devices. Now-a-days, multipoint connections link many network devices in various
configurations.
Bus Topology
All nodes are connected to a single cable. The cable to which the nodes are connected is called
“Backbone”. So if the backbone is broken, entire segment fails. Bus topology is easy to install and
does not require much cabling as compared to other alternatives.
Ring Topology
Here, every device has two adjacent devices. As all data travels in the same direction through
a ring, failure in any cable or device breaks the loop and entire segment breaks down.
9
Dual Ring Topology
It is an improvement of ring topology. In this topology, two concentric rings connect each node on
a network instead of one network ring. The secondary ring is used as a backup in case the primary
ring fails.
Star Topology
In this topology, all nodes are individually connected to a central connection point. This
configuration consumes more cable than bus topology with the advantage that if one cable fails,
only one node is affected.
Tree Topology
A tree topology combines Bus and star topologies.It consists of groups of star-configured
workstations connected to a linear bus backbone cable.Tree topologies allow for the expansion of
an existing network.
10
Mesh Topology
In mesh topology, infrastructure nodes connect directly, dynamically and non-hierarchically to as
many nodes as possible and cooperate with one another to efficiently route data from/to clients.
Hybrid Topology
It combines two or more topologies in such a way that the resulting network does not exhibit any
of the standard topologies like bus, star, ring etc.A hybrid topology is always produced when two
different basic network topologies are connected.
11
3. Dual Ring 1. Two concentric rings connect Where data
each node on a network instead connectivity
of one network ring. requires
2. Used as a backup to primary redundancy in
ring. small offices.
VLAN
It is the abbreviation of Virtual LAN.In this local networking scheme, a group of devices are
connected wireless &configured to communicate. This gives a network ecosystemwhere it
appears as if they are attached to the same wire, while they are located on a number of different
segmentsconstitutingVirtual LAN. The flexibility is the gain point in this configuration, since
VLANs are based on logical rather than physical connections.Combining group of devices from
both wired & wireless networks(which could be many in number) into a single logical network is
a distinct advantage in this type of network scheme.
WLAN
An acronym for wireless LAN, it is a wireless computer network that links two or more devices
using wireless communication to form a local area network (LAN). This arrangement is mostly
used within a limited area such as a home, school, computer laboratory, campus, or office
building.Ituses Radio, Infrared orMicrowave transmission to transmit data from one point to
another without cables.
OSI Model
A reference model is a necessity to describe how information flows from a software application
in one computer to the software application in another computerthrough a physical medium.OSI
Model (Open Systems Interconnection Model) fulfills that need and is a conceptual framework
used to describe the functions of a networking system. OSI model was developed by the
International Organization for Standardization (ISO) in 1984, and it is now considered as an
architectural model for the inter-computer communications.
13
OSI Model comprises of seven layers and each layer is conceived to perform a particular
network function.Thus this model divides the whole task into seven smaller and manageable
tasks. Each layer is assigned a particular task and the task assigned to each layer can be
performed independently.Thus each layer is self-contained.
The above diagram is self-explanatory in so far as the functions of each layer are concerned.
Further, the OSI model is divided into two layers: upper layers and lower layers.The upper layer
mainly deals with the application related issuesand are implemented only in the software. The
application layer is closest to the end user. Both the end user and the application layer interact
with the software applications.
The lower layer of the OSI model deals with the data transport issues. The data link layer and the
physical layer are implemented in hardware and software. The physical layer is the lowest layer of
the OSI model and is closest to the physical medium. The physical layer is mainly responsible for
placing the information on the physical medium.
14
The above diagram illustrates the division of layers into upper and lower layers and their assigned
responsibilities.
Though OSI Model was elaborate but cumbersome, hence a concise version was required. Hence,
TCP/IP Model fulfils this requirement.
TCP/IP Model
It stands for Transmission Control Protocol/Internet Protocol. The TCP/IP model is a concise
version of the OSI model and contains four layers, unlike seven layers in OSI Model.This model is
used by the majority of internets because it encompasses a number of different protocols for
different purpose and needs.
a) HTTP (Hyper Text Transfer Protocol) for handling the communication between a web server
and a web browser.
b) HTTPS (Secure HTTP) for handling secure communication between a web server and a web
browser.
c) FTP (File Transfer Protocol) for handling transmission of files between computers.
Normally, there are three layers of switching for distribution of data namely core layer,
distribution layer and access layer.
15
Core layer
The core layer consists of high-speed Switches and Routers for optimization of performance.
Located at the core layer of enterprise network, a core layer switch functions as a
backbone switch for LAN access and centralizes multiple aggregation devices to the core.
Thus, core layer is a high-speed backbone that is designed to switch packets of information as fast
as possible to optimize communication within the network. The Core layer connects all
Distribution layer devices and switches and routes large amounts of trafficreliably as well as
quickly.
Distribution Layer
The distribution layer is the smart layer in the three-layer model of internetworking. Routing,
filtering, and QoS(Quality of Service) policies are managed at this layer. This layer is also called
the Workgroup layer.The distribution layer thus aggregates the data received from the
access layer switches before it is transmitted to the core layer for routing to its final destination.
Distribution layer is the boundary between the Layer 2 domains and the Layer 3 routed network.
Access Layer
The Access layer is the level where host computers are connected to the network. The
Distribution layer acts as an aggregation point for all the Access layer devices. The
Core layer connects all Distribution layer devices and reliably and quickly switches and routes
large amounts of traffic.
16
Network Switch
It is a multiport network link that uses MAC (Media Access Control) address to forward data at
the data link layer (layer 2) of the OSI model.
Core Switch
It is a high capacity switch.It serves as the gateway to a wide area network (WAN) or the Internet.
Generally positioned within the backbone or physical core of a network, it provides the final
summation point for the network.
Distribution Switch
It uplinks core switch and downlinks access/edge switch. Acting as an aggregation switch to
bridge between core layer switch and access layer switch, it collects data from all the access
switches and forwards to the core layer switches.
17
Access Switch/Edge Switch-
Function of this switch is to provide network access to the users.Access layer switches connect to
distribution layer switches to perform network foundation functions such as routing, quality of
service (QoS) and security.
Network Cables-
Used for connecting one network device to other networking devices. Different types of network
cables such as coaxial cable, twisted pair cables and optical fiber cableare invariably used
depending on the network's topology and distance between devices.
For short distancesin offices up-to 100 meters,twisted pair cables are used.For distances beyond
this, optical fiber cable is the automatic choice.
Co-axial cable
It is a type of electrical cable consisting of an inner conductor surrounded by a concentric
conducting shield separated by dielectric. Many coaxial cables also have a protective outer sheath
or jacket. Itis also used within a buildingbut primarily used for cable TV. It transmits radio
frequency signals and is used in all forms of transmission of entertainment data.
In this type of cabling, two conductors of a single circuit are twisted together for improving
electromagnetic compatibility. It consists of two separate insulated copper wires twisted together
and run in parallel,one for transmission of data and the other for ground reference purpose. The
copper wires are of typical diameter of 1 mm. Since all transmissions are prone to noise,
18
interferences and cross talks,so due to twisting, some part of the noise signal is in the direction of
data signals while the others are in opposite direction thuscancelingeach other out and data gets
rid of unwanted noise signals. These are generally used within a building for providing
connection in telephone, DSL(Digital Subscriber Line) and LAN lines.
UTP cables come in different categories and accordingly categorized as Cat 1 to Cat 7 cables. Cat
8 cables are the latest entrant into this segment. There are eight wires grouped in four pairs, each
composed of a solid-colored wire and a stripped wire.Each wire is twisted a certain number of
times to minimize interferences with the other pairs. A higher number of twists per inch results in
a higher data transmission.
TIA/EIA-568A stipulates the commercial cabling standards for LAN installations and is the
standard most commonly used in LAN cabling environments.
In the UTP segment, Cat 1 cable was introduced in 1985.Being an unshielded twisted pair (UTP),
it consisted of two insulated copper wires twisted around each other to eliminate crosstalk. Being
of low cost and easy in installation made it popular for connecting home and business computers
to a telephone companies’ equipment. UTP cable is more susceptible to radio and magnetic
interference than shielded cables. Typically used for telephone wiring, its data rate is 1 Mbps.
CAT 1 is typically used for telephone wire.This type is not capable of supporting computer
network traffic and is not twisted. CAT1is also used by telecom companies providing ISDN and
PSTN services.
An improvement, Cat 2 was released shortly thereafter with a data rate of 4 Mbps.CAT2 is used
mostly for token ring networks, supporting speeds up to 4 Mbps.
Category 3 reached its peak in the early 1990s and featured a data rate of 10 Mbps with a
bandwidth of 16 megahertz (MHz). Category 3 and its successors are made up of four pairs of
twisted wires, allowing the simultaneous transmission of voice, data and video over a single
cable.Category4 cable was an upgrade to Cat 2 and was primarily used for Token Ring networks.
It was also used in what are now antiquated telephone and data networks. The transmission speed
for Cat 4 is 16 Mbps.
19
Category 5 was introduced in 1995 and is the successor to Cat 3. This was the first cable to be
dual-rated at 10/100 Mbps with a bandwidth of 100 MHz It can distribute video and telephone
signals at distances of 100 meters, or 328 feet.CAT5 wire has more twists per inch and is suitable
upto the speed requirements of 100 Mbps. It is used for Ethernet, Fast Ethernet and Token Ring
Networks.
Category 5e is an enhanced version of Cat 5 and can support speeds up to 1 Gbps over a distance
of 55 meters, or 180 feet, with a bandwidth of 100 MHz This was accomplished by increasing the
number of twists, making the cable much more resistant to crosstalk. After its introduction in
2001, it quickly became the cable of choice for new and retrofit installations.CAT5e has replaced
more used Cat 5 cable due to its superior speed which is upto 1Gbps and provides improved cross
talk specification.
Category 6 raised the bandwidth of a UTP cable to 250 MHz at a speed of 1 Gbps over 55 meters.
Cat 6 is also available in a shielded version.Category6a was introduced in 2008 and supports
speeds up to 10 Gbps at a bandwidth of 500 Mhz. CAT 6 wire is similar to CAT 5e but contains a
physical separator between four pairs to further reduce electromagnetic interference. Today most
new installations use CAT 6. However, the limitation is thatall cabling componentslike jacks,
patch panels, patch cords etc. should be CAT6 certified and extra precaution must be taken for
proper termination of cable ends.Cat6a is only available as a fully shielded cable.
Category 7 came out in 2010 and still has a speed of 10 Gbps, but it has an increased bandwidth of
600 MHz This was accomplished by adding more shielding.Category 7a, introduced in 2013,
maintains the 10 Gbps speed while increasing the bandwidth to 1.2 GHz.CAT7 cable supports
speeds of 10Gbps at lengths of up to 100 meters. To achieve this, the cable features four
individually shielded pairs plus an additional cable shield to protect the signals from crosstalk and
electromagnetic interference (EMI).Due to the extremely high data rates, all components used
throughout the installation of a CAT7 cabling infrastructure must be CAT7 certified. This includes
patch panels, patch cords, jacks and RJ-45 connectors. Failing to use CAT7 certified components
will result in the overall performance degradation and failure of any CAT7 certification tests (e.g.
using a Cable Analyzer) since CAT7 performance standards are most likely not to be met. Today,
CAT7 is usually used in DataCenters for backbone connections between servers, network switches
and storage devices.
The newer Cat cables are shielded, making them more expensive and harder to install and
terminate. They also require different connectors than their predecessors. I am seeing projects that
may be over specified. Many computers have an Ethernet card that is only good for 100 Mbps,
which can be handled with a Cat 5e instead of higher rated cables. This may be a good alternative
to suggest to your customers. Category8 was developed primarily to help data centers increase
bandwidth and network speeds. It has a speed of 40 Gbps and a bandwidth of 2 GHz over a
maximum of 30 meters, or 98 feet.
Three types of fiber optic cables commonly used are Single Mode, Multi-Mode and Plastic optical
Fiber(POF). The infrared light propagates through the fiber with much lesser attenuation hence it
is advantageous compared to an electrical cable.
Different types of cableare used for different applications, for example, long distance
telecommunication, or providing a high-speed data connection between different parts of a
building.
I/O Port
An I/O port is a socket on a computer/ Network device for plugging a cable . The port connects
the CPU(Central Processing Unit) to a peripheral device via a hardware interface or to the network
via a network interface. It also acts as an interface between computer and external devices.
21
In the above figure, different types of ports like LAN port, HDMI port, VGA port, Serial port are
shown for connecting cables according to the application.
Connector
A connector is a device which is connected to both the ends of the cable so that it is securely
connected to the computer at one end and networking devices on the other hand.
There are different types of connectors as per the use.
Fiber LC (Local Connector)
These connectors are used for single-mode and multimode fiber-optic cables andoffer extremely
precise positioning of the fiber-optic cable with respect to the transmitter's optical source emitter
and the receiver's optical detector.
SC(Standard Connector) — This connector is square, like an LC, but is approximately twice the
size. It also holds into place using a push/pull mating mechanism.
ST(Straight Tip) Connector — This is a round connector that uses a bayonet-style mechanism
and has to be twisted into place. It is about the same size as the SC connector .
22
MT-RJ (Mechanical Transfer Registered Jack)connectors are used with single-mode and
multimode fiber-optic cables. The MT-RJ connectors are constructed with a plastic housing and
provide accurate alignment via their metal guide pins and plastic ferrules.
It is a standardized telecommunication network interface for connecting voice and data equipment
to a service provided by local exchange carrier or long-distancecarrier.It is also used for
connecting computers to Ethernet based LAN.
RJ45 is an 8P8C modular connector. 8P8C = 8 position, 8 contact.The "45" simply refers to the
number of the interface standard. It looks similar to a telephone jack, but is slightly wider with the
advantage that it is easy to install, very reliable and suitable for 100 Mbps speed.
It is designed to replace serial and parallel ports. A single USB port can be used to connect up to
127 peripheral devices, such as mouse, modems, keyboards, digital camera's incoming port,
printers, scanners, MP3 players etc. It also supports Plug-and-Play installation and hot plugging.
23
the wall at a suitable location as decided by the user department/architect. The incoming
connections to the gang box are given through Cat 5/6 cable depending upon the speed of data
transmission.
24
Section 4
Space and Other Functional Requirements of Network Control Centre
Assessing the space requirement of Network control center is the first priority of the architectural
in charge of the project. Normally two centralized and easily accessible spaces should be allocated
to the networking center. The size of the room and inside facilities to be provided should be
clearly worked out after thorough discussions with the networking agency and drawing the layout
of the machines and operating staff. Normally, the machine room is separate from network
monitoring room which is manned by operating staff and are provided side by side ideally. The
machine room has a different requirement than the monitoring room. It has a raised floor for
accommodating the cables to be connected to the Equipments and has electrostatic and ventilation
features. Various Equipments are housed in a rack which needs to be properly ventilated to
remove the heat generated by the Equipments. There can be a number of racks depending upon the
type and number of Equipments. The dimensions of the room are dependent upon the layout of the
main Equipments and future expansion including proper space for working on all sides of the
communication Racks.
A suggestive layout in which equipment room and monitoring center are shown separatelyis given
below. However, these can be together also if requirement so demands:
Besides proper layout, there are other functional requirements of the NOC.
1. Lighting
2. Airconditioning &Ventilation Requirements
3. Power Requirements i/c UPS back up
4. Electrostatic Flooring i/c Earthing Requirements
5. Fire Safety i/c Fire Alarm, VESDA, Fire suppression System
25
6. Rodent repellant system
7. Water leakage detection system
All the above requirements should be discussed thoroughly with the equipment supplier and
network vendor before providing them.However broad parameters are given below for the sake of
general guidance.
1. Lighting- The lighting of the equipment room should be bright enough to be able to see
various connecting wires clearly by the technician for repairing or other activities related to
maintenance after erection. However, the lighting should be equipped with occupancy
detectors so as to switch off the lights automatically when no operating personnel is present in
order to save wastage of electricity.
2. Air-conditioning & Ventilation Requirement- The air conditioning to be provided for this
room is for machines andnot comfort air conditioning.Accordingly precision air conditioning
is provided. The parameters of inside conditions i.e. temperature and humidity should be
decided mainly on the recommendations of equipment manufacturers. However, as a general
guideline temperature of 180C and RH of 50 % can be considered for equipment room.Lesser
humidity will result in the buildup of static electricity on the systems while more humiditywill
lead to corrosion which will start damaging equipmentslowly resulting in permanent
equipment failures. Redundancy of one air conditioning unit should be provided as the
Equipments remain in24X7 operation. Ventilation as per NBC 2016 should be provided.
3. Power Requirements i/c UPS back up- Power requirements should also be worked out with
sufficient redundancy. The UPS system with proper battery back-up should be provided. The
number of hours battery backup depends upon the power situation of the place. Generally, 4
hours battery back-up is considered sufficient where power availability is good and power
outage is minimum.
4. Electrostatic Flooring i/c Earthing Requirements- This should be given due consideration as
per the advice of Equipment manufacturers.
5. Fire Safety i/c Fire Alarm, VESDA, Fire suppression System- Fire safety requirements should
be considered carefully and should be adequate. Smoke detector, Very Early Smoke Detection
and Alarm system(VESDA) can be considered for fire detection. The fire fighting system
should be gas based confined to Equipments room and no water sprinklers should be
provided.
6. Rodent repellant System- It is necessary to provide this system in order to repel the rats etc.
for protection against cable cutting and thus avoiding downtime of the system.
7. Water leakage detection system- There could be water due to sweating by Air conditioning.
This should be detected so as to provide remedial action. Therefore, water leakage detection
systems is necessary.
26
Section 5
Selection Parameters of Network Components
This section deals with selection parameters required for network elements.
Wired Router
Wired routers give fast speeds and works well in case of fiber optic connected internet.Following
are some of the parameters of selection of router:
Note:- The above are indicative parameters and not exhaustive. NIT Authority may decide for
inclusion of more parameters depending upon the requirement of client.
Network Switches
Following parameters are required to be specified:
Physical Configuration is one of the necessary criteria and accordingly network switches can
be either Fixed, Stackableor Modular.In a fixed configuration, number of ports are fixed and
are not expandable while in a stackable configuration, number of switches are connected
together to increase the expandability.Wherever stacking is required, minimum requirements
of stacking should be specified.Modular configuration provides flexibility to address
changing networks by adding expansion modules into the switches.
Number of devices to be connected
It should supportPoE (Power over Ethernet) and routing protocols.
The switches should have non-blocking performance with minimum 1GB RAM and 1GB
internal flash memory.
It should support automation like ZTP (Zero Touch Provisioning) and scripting like Python.
The Switch should support L2 functionalities/ Connectivity. L2 functionality is the most
fundamental form of network connectivity needed for virtual machines and is the connectivity
to a physical or virtual switch.
The switch should be IPv6 ready and certified as per applicable Standards.
27
Note:- The above are indicative parameters and not exhaustive. NIT Authority may decide for
inclusion of more parameters depending upon the requirement of client.
Firewall
Following are some of the parameters of the firewall.
The Firewall should be purpose appliance. It means it is made to optimize for a set of
purposes.
It should not use any proprietary ASIC (Application Specific Integrated Circuit ). This
indicates that the electronic circuitary used is of generic design and features.
The Firewall should support UTM(Unified Threat Management) features like Intrusion
prevention, Antivirus, Antispam and URL(Uniform Resource Locator) filtering.
The Firewall should be IPv6 ready and certified as per applicable Standards.
Note:- The above are indicative parameters and not exhaustive. NIT Authority may decide for
inclusion of more parameters depending upon the requirement of client.
Cable
Fiber Optic Cable
There are two types of specifications for Fiber Optic Cable:
1. Optical Specifications
Attenuation
Chromatic Dispersion
Core/Cladding Concentricity Error
Cladding Non- Circularity
Cut Off Wavelength
Zero Dispersion Wavelength
2. Mechanical Specifications
Core Diameter
Cladding Diameter
Coating diameter
Installation Temperature
Cable is selected based on the distance between the two networking Equipments. If the distance is
more than 100 meters, then this cable is chosen. For distance between 100 meters to 2 KMs,
Multimode Fiber optic cable is chosen and beyond that single mode cable is selected. Following
Table provides an overview of Fiber cable selection i/c connector type as per application.
28
Fiber No. Typical Connect Connector Image
Type of Applications or Type
Fibers
Single
mode 1 LANs ST
/Multimode
Single
Data/Tele-
mode 1 FC
communications
/Multimode
Single CATV,
mode 1 Test SC
/Multimode Equipment
Single Gigabit
mode 1 Ethernet, LC
/Multimode Video Multimedia
Single Gigabit
mode Ethernet,
/Multimode 2 Asynchronous MT-RJ
Transmission
Mode (ATM)
CAT Cables
Following Table gives Overview of Data Rate and application of different CAT cables:
29
CAT6 Up to 10Gbps 100m Twisted Pair GigabitEthernet, 10g
Ethernet (55 meters)
Connector Specifications
These include physical construction, wiringand signal semantics. Accordingly, different
connectors are specified. For example, Registered Jacks are primarily named by letters RJfollowed
by two digits that express type.Additional letter suffixes minor variations. Selection of connector
is based on application,cable type and I/O Port.
Rack/Cabinet Specifications
There are three types of rack/cabinetfor housing various electronic switches and systems used in
networking:
1. Solid-walled cabinets with a roof fan tray (for bottom to top cooling)
2. Standard open rack
3. Standard perforated cabinet.
Rack Size
The rack unit size is based on a standard rack specification as defined in EIA-310 where EIA
stands for Electronic Industries Alliance. The standard was adopted worldwide as IEC 60297
Mechanical structures for electronic equipment. It defines the sizes for rack.
Generally, width of the Rack is defined in terms of inches while its height is defined in multiples
of 1U or 1RU which isRU(rack unit) and is defined as 1 3⁄4 inches (44.45 mm). However,a front
panel or filler panel in a rack is not an exact multiple of this height to allow space between
adjacent rack-mounted components.A panel is 1⁄32 inch (0.03125 in or 0.794 mm) less in height
than the full number of rack units would imply. Thus, a 1U front panel would be 123⁄32 inch
(1.71875 in or 43.66 mm) tall. If n is number of rack units, the ideal formula for panel height is h
= (1.75n − 0.031) for calculating in inches, and h = (44.45n − 0.794) for calculating in millimeters.
Normally the height of a Rack used in network/server room is 7 feet but it can be more depending
upon the ceiling height of the room and requirement.
Normal width of the front side of the Rack is 19 inch(which isa standardized frame or enclosure
for mounting multiple electronic equipment modules) or 23 inch which includes the edges or
"ears" that protrude from each side of the equipment, allowing the module to be fastened to the
rack frame with screws.
The Rack is having four sides to accommodate switches and other Equipments which have
sufficient depth. So, four post Racks are used to accommodate network switches and other
Equipments.
30
Four-post EIA cabinets (perforated or solid-walled)
It must meet the following requirements:
The minimum spacing for the bend radius for fiber-optic cables should have the front-mounting
rails of the cabinet offset from the front door by a minimum of 3 inches (7.6 cm).The distance
between the outside face of the front mounting rail and the outside face of the back mounting rail
should be 23.0 to 30.0 inches (58.4 to 76.2 cm) to allow for rear-bracket installation.
31
Section 6
System Engineering
The system engineering or engineering management is to focus on designing the system,
integrating it with the other disciplines of engineering and maintaining it over the complete life
cycle.
When designing a networking system, it is important to select the proper hardware to meet current
network requirements, as well as allow for future growth. Within an enterprise network, both
switches and routers play a critical role. This selection is a very complex task due to ever-growing
scope of network services along with the faster up gradation of technology. It also requires an in-
depth analysis of user’s requirements vis-a-vis the available technology.
For designing the system, it should be segregated into two parts namely Active components and
Passive Components. However, the most challenging part is design of Active Components
because of the maximum impact of technology up-gradation.The active components constituteall
networking Equipments like Routers, Core Layer including Distributors, Network Switches,
Firewall etc. All these are mounted on a Standard Rack while Patch panel, Scanner for monitoring
patch panel, Cable Manager etc. are mounted on Passive Rack. The Active and Passive Racks are
connected together through cabling and Equipments inside the Active and Passive Racks are also
joined together by suitable cabling and jumpers.
For appropriate design of the active system, first of all, commensurate with the requirement of
client,all available technologies should be studied first.The most appropriate technology should be
selected then based on the available inputs.
For data connectivity in a building to be constructed, functionality requirements, type and speed
of data flow, number of floors, floor-wise connectivity matrix, level of data security, redundancy
requirements, voice communication facility over data network, bandwidth requirement,
attenuation of signals etc. are some of the prime design factors. Based on these factors, designing
of data networking is undertaken.
2. Incident Management- It includes Threat Analysis & Intrusion Prevention Systemwhich calls
for actual response to incidence threats, their analysis and preventionfor the safety of data
networks. Thus, identification, analysis and correction of hazards including prevention are the
main activities of Incident Management.
32
3. Network Performance- NetworkOptimization and Quality Reporting are parts of Network
Performance. The process of visualizing, monitoring, optimizing, troubleshooting and reporting
on the service quality of network as experienced by usersare important functions and include a
set of best practices to improve network performance. A variety of tools and techniques can be
used to achieve it like global load balancing, minimize latency, packet loss monitoring and
bandwidth management etc.
4. Patch Management- Here system patches are monitored and a decision is taken whether these
are needed or not. In case these are needed; they are installed and implemented smoothly. Patch
management fixes vulnerabilities on the software and applications which are susceptible to
cyber attacks. It also ensures software and applications are kept up-to-date and run smoothly,
supporting system uptime.
5. Back-up and Storage-Data back-up is necessary to restore the originaldata after a data loss.
There are different types of data storage devices used for keeping data back-up.Sometimes, this
function is done in NOC and sometimes in Cloud.
6. Firewall Management- Firewall, a network security system monitors and controls incoming and
outgoing network traffic based on pre-decided security rules.
Architecture of NOC
One of the various typical schemes of Network services is described below for the sake of
understanding the scheme of networking .
Active Rack
The WAN Link which is provided by fiber optic cable from network service provider comes to the
NOC room and connects to the Router. The core switch, distribution switch apart from various
systems like network monitoring, Network optimization, performance monitoring etc. are also
housed here.For Firewall Management, separate equipment is placed on the active rack with
suitable connections. Scanner required for monitoring network components and other functions is
also provided in the Active Rack.
33
Passive Rack
It contains all the connections brought from the Access Switches which are provided at each floor.
These cables are terminated into Patch Panel.Patch Panel and Cable Manager can also be the part
of active Rack.
Patch Panel
It is a requirement of big networks.It acts as a passive networking hub that bunches multiple ports
together connecting incoming and outgoing lines and facilitates in providing proper connections
between server and network switch and from network switch to computers and other devices.
Cable Manager
It manages the electrical or optical cable in the rack for ease of termination and installation.
In addition, Floor Racks should also be designed along with Gang boxes and cable laying upto the
end point.
Thus, based on the functional requirements of data and communication Network, the line diagram
and BOQ is envisaged.
Next step is to integrate the system with the building design/services layout so as to have the best
coordination among various agencies. Normally, fiber optic cable is used for long distance
travelling of the data. So, from the NSP/Data Center, connectivity is through optic fiber cable with
enough redundancy to avoid any disruption of services.For cabling, suitable ducts, conduiting
inside the wall and above false ceiling and Gang boxes are provided which should be well
integrated with the building layout. These should not interfere with other services and should be
planned accordingly.
34
Maintaining the system
Maintenance is the key requirement of any asset.It is required to be carried out throughout the life
cycle of the building because number of people working in a building change besides changes of
layout in various spaces and other changes required on account of changed circumstances etc. A
proper maintenance with the objective to reduce the downtime dictates that there should be
enough redundancy in the system and availability of those spare parts which are frequently
needed.Redundancy in the system minimizes the requirements of breakdown maintenance. Faults
in the main Equipments also necessitate upkeep and maintenance. Recording of Fault types and
their analysiscan help in reduction of downtime.
35
Section 7
Part of the 568 standards for Cat5e cable and other twisted-pair cabling is the 568A and 568B
wiring schemes which specify pin and pair assignments. The schemes define the process of UTP
cable terminations. Each wiring pair corresponds to an assigned color during terminations, as in
pair 3 to the green on a patch panel or jack. Cat5e cable is connected using the 8P8C modular
connectors with terminations in a T568A or T568B scheme.
The 568B standard sets minimum requirements for various categories of cabling, such as Cat5e
with performance up to 100 MHz, Fast Ethernet, and Gigabit Ethernet. The TIA/EIA requirements
for Category 5e cable are higher than those of basic Cat5. Category 6 and 6a cables deliver
performance up to 250 MHz, Fast Ethernet, Gigabit Ethernet and 10-Gigabit Ethernet.
37
Section 8
Glossary
A
ASIC- Application specific Integrated Circuitis an integrated circuit (IC) chip customized for a
specific use, rather than intended for general-purpose use.
B
Border Gateway Protocol (BGP)-is one of the key protocols used to achieve Internet connection
redundancy.
Bridge- a computer networking device that creates a single aggregate network from multiple
communication networks or network segments. This function is called network bridging. Bridging
is distinct from routing.
C
Cable-Networking hardware used to connect one network device to other network devices or to
connect two or more computers to share printers.
Connector-a device that terminates a segment of cabling or provides a point of entry for
networking devices such as computers, hubs, and routers.
Content-any information that is available for retrieval by the user, including Web pages, images,
music, audio, white papers, driver and software downloads as well as training, educational and
reference materials.
Computing-any activity that uses computers to manage, process, and communicate information. It
includes development of both hardware and software. Computing is a critical, integral component
of modern industrial technology.
Cyber Security- It is the protection of computer system or networks from the theft or damage to
their hardware, software, electronic data or misdirection of any of their services.
D
Data- Distinct pieces of information formatted in a special way.
Database- Organized Collection of information for easy access, management and updation.
Data Link Layer-The data link layer, or layer 2, is the second layer of the seven-layer OSI model
of computer networking. This layer is the protocol layer that transfers data between adjacent
network nodes in a wide area network or between nodes on the same local area network segment.
Device- An object used for a particular purpose.
DHCP - It is a network management protocol used on Internet Protocol networks. The elongated
form of DHCP is Dynamic Host Configuration Protocol. It automatically provides and assigns IP
addresses ,default gateways and other network parameters to client devices.
DNS- Domain Name System is full form of DNS and is known as phonebook of the Internet.
DSL- DSL. Stands for "Digital Subscriber Line." DSL is a communications medium used to
transfer digital signals over standard telephone lines.
38
E
Electrostatic flooring- It protects electronics from damage caused by static electricity, which
accumulates as people walk.
Ethernet- A system for connecting number of computer systems to form a Local Area Network
with protocols to control passing of information and to avoid simultaneous transmission by two or
more systems.
40
P
Patch Cord- A patch cord, patch cable or patch lead is an electrical or optical cable used to connect
one electronic or optical device to another for signal routing. Devices of different types are
connected with patch cords.
Patch Panel-A device or unit featuring a number of jacks, usually of the same or similar type, for
the use of connecting and routing circuits for monitoring, interconnecting, and testing circuits in a
convenient, flexible manner.
Peripheral-A peripheral or peripheral device is ancillary device used to put information into and
get information out of the computer.
Port- is a communication endpoint.
Protocol- A set of rules or procedures for transmitting data between electronic devices such as
computers.
Python- It is a programming language and used as a scripting language for web application.
Q
Queue- A linear structure which follows a particular order in which the operations are performed.
The order is First In First Out (FIFO). A good example of a queue is any queue of consumers for a
resource where the consumer that came first is served first.
R
Rack-is a metal frame chassis that holds, stacks, organizes, secures and protects various computer
network and server hardware devices. The term "network" refers to the rack being used to house
network hardware like routers, switches, access points, and modems
Router-The main purpose of a router is to connect multiple networks and forward packets destined
either for its own networks or other networks. A router is considered a layer-3 device because its
primary forwarding decision is based on the information in the layer-3 IP packet, specifically the
destination IP address.
S
Server- A server is a computer that provides data to other computers.
STP-a type of copper telephone wiring in which each of the two copper wires that are twisted
together are coated with an insulating coating that functions as a ground for the wires. ... STP
cabling often is used in Ethernet networks, especially fast data rate Ethernets.
T
Telecommunication-Exchange of signs, signals, messages, words, writings, images and sounds or
information of any nature by wire, radio, optical or other electromagnetic
systems. Telecommunication occurs when the exchange of information between communication
participants includes the use of technology.
U
URL- It is abbreviated form of Universe Resource Locator which is also known as web address.
UTM(Unified Threat Management)- It is a combined approach to information security where a
single hardware or software installation provides multiple security functions in contrast to the
traditional method of having point solutions for each security function.
41
UTP-Unshielded twisted pair (UTP) is a ubiquitous type of copper cabling used in telephone
wiring and local area networks (LANs).
V
VoIP- It is an acronym for Voice over IP. It is the transmission of voice and multimedia content
over Internet Protocol Networks. This term is also used for IP telephony.
VPN-virtual private network (VPN) extends a private network across a public network and
enables users to send and receive data across shared or public networks
W
Wireless Communication- a method of transmitting information from one point to other, without
using any connection like wires, cables or any physical medium.
Z
ZTP-Short form of Zero touch provisioning, it is designed to provide the intelligence needed to
allow the switch to boot with minimal disruption to the network. It is the feature of a network
switch that allows the devices to be provisioned and configured automatically, eliminating most of
the manual labor involved with adding them to a network.
References
https://www.google.com/search?q=networking etc.
42
CCCF - Package Makelist (MEP)
Instruction to bidders:
a. Submit catalogues EQUIPMENT GA DWG &TDS with the
b. Approved consultants/ project manager /PMC other make proposed by bidder approved by owner
c. Produce test certificates for equipment/material supplied with bills for certification.
d. Submittals and samples must be gotten approved before supply from Owner / Project Managers / Architect / Consultants.
e final make and techanical specification asper boq and approved TDS to be follow for rate submission /
Indigenous Medical gas hose /rubber tubing colour Aktiv Technologies / Anaesthetics India / S- Kumar / GFlow
3
coded. (Indian). / MPS / MDD / Axahantre / Anesthetics
Oxygen flow meter, Theatre vacuum unit & ward vacuum Aktiv Technologies / Anaesthetics India / S- Kumar / G Flow
16
unit (Indigenous) / Axahantre
Aluminium Ducting work with Nitrile Rubber Thermal Aluminium ducting work-Jindal, tata Thermal insulation- aramacell,
7
Insulation and Exhaust Return Grill in Operating Rooms alp, Exhaust return grill- -system air, ruskin,Caryaire,pine air
Indigenous Medical gas hose /rubber tubing colour Aktiv Technologies / Anaesthetics India / S- Kumar / GFlow
4
coded. (Indian). / MPS / MDD / Axahantre / Anesthetics
Oxygen flow meter, Theatre vacuum unit & ward vacuum Aktiv Technologies / Anaesthetics India / S- Kumar / G Flow
17
unit (Indigenous) / Axahantre
1 IP EPABX : a. NEC
b. Microsoft
c. Cisco
d AudioCodes
2 LIU & OFC PATCH CHORD : a. Legrand
b. R&M
c. Panduit
3 Switches : a. Brocade
b. Alcatel
c. Arista
4 Rack : a. APW
b. Rittal
c. Valrack
d. Mts
8 Phones- : a. NEC
b. Microsoft
c. Cisco
d AudioCodes
D6 UPS & Inverter
Please refer General makelist (MEP)
D7 LT Panel
Please refer General makelist (MEP)
D8 Nurse Call System (NCS)
Please refer to Indian standards & Specifications.
Products shall have certified/ approved by VDE 0834/ UL
Nurse Call System (NCS) Make list - IMPORTED OEM - SCHRACK SECONET,
TUNSTALL, Rauland borg
D9 Solar Panel
Please refer General Makelist (MEP), CPWD/MPWD
Specifications.
D10 Light Fixtures
Light Fixtures Havells, Wipro, Philips
E3 Transformers
Please refer General Makelist (MEP), CPWD/MPWD
Specifications.
E4 DG Sets
1 Engine : Cummins / Catterpillar / MTU / Volvo Penta / Perkins / KOEL-Tricolite
2 Alternator
: Stamford / AVK –SEG / Leroy Somer /
KOEL (made by Leroy Somer)
3 Bulk Oil Diesel Tank : Ranuq Enterprises / Satgur
4 DG Controller : Cummins / Dieff / Wood Word / Deep Sea
5 Anti-Vibration Mounting : Dunlop / Resistoflex
6 Exhaust Piping
a. Upto 450mm dia : SAIL / Tata / Prakash Surya / Jindal Hissar
b. 500mm & above diameter (seamless) : MSL / JSW
7 Exhaust Pipe Insulation, RockWool Insulation
: Lloyds / Rockwool / Sriram
8 Ceramic wool Insulation : Llyods
9 Check Valves : ADVANCE
10 Butterfly valves : AUDCO / HONEYWELL / DANFOSS
11 Y-strainer & Pot-Strainer : SANT / EMERALD / LEADER
12 Gate Valve : Sant / Leader
13 Pr. Gauges : FIEBIG / H.GURU / ANERGY
14 Thermometer : EMERALD / ANERGY
15 Pump Sets
: GRUNDFOS / MATHER & PLAT / BEACON /
KRILOSKAR / Armstrong
16 Balancing valves : ADVANCE
17 Cooling Towers : ADVANCE / BELL
18 Flexible pipe connections : RESISTOFLEX
19 Anchor Fastner : Fisher / Hilti / Walraven-Hira
20 Rubber Bellow : Resistoflex or Equivalent
21 Steel Structures : Tata / Sail
22 Heat Resistant Paint : Berger / Nerolac / ICI
23 Wall / Ceiling Acoustic Insulation Fibre
Glass Insulation
: OWENS CORNING / UP TWIGA
24
Aluminium Perforated Sheet for
acoustic lining
ARKC
HSD TANK
1 Bucket Strainer : Emerald
2 Ball Valve : Audco
3 Non-Return Valve : Audco
4 Foot Valve : Gurco
5 Pressure Gauge : H.Guru
6 Fuel Pipes ERW 'C' Class
: Jindal / Tata / Prakash Surya / Jindal
Hissar
7 ON/OFF Push Buttons : L&T / Siemens
8 Flame proof starters : L&T / Crompton Greaves
9 Under Ground HSD Storage tank : Engineers Syndicate / Sterling
10 Rotary Gear Oil Transfer Pump for DG Set : Rotodel
11 Overflow Tank : Engineers Syndicate / Sterling
12 Day Oil Tank for D.G. Set : Engineers Syndicate / Sterling
13 Buffer Tank : Engineers Syndicate / Sterling
14 Level Sensor : Banner / Siemens / Omicron
15 Fire extinguisher : a. Safex
16 Oil Flow Meter : a. Kent
17 Y-Strainers : a. Zoloto
18 Wires & Cables (Power & Control) - : Bonton / KEI / RR Kabel / Ravin
Aluminum / Copper Armoured /
Unarmoured
/ Rallison / Finolex
19 Cable lugs & thimbles : Dowells / Jainson
20 Cable glands : HMI / Lotus / Commet
1a. (a) 11kV Compact Unitised Substation : a. ABB / ABB Approved channel partner
(with Dry type Transformer) b. Schneider / Schneider approved channel parter
c. Control & Switchgear
(b) 11kV Compact Unitised Substation a. ABB / ABB Approved channel partner with CAHORS transformer
(with Oil type Transformer) b. Schneider / Schneider approved channel parter with CAHORS
transformer
c. Control & Switchgear with CAHORS transformer
(c ) 33 kV Compact Unitised Substation a. ABB / ABB Approved channel partner with CAHORS transformer
(With Oil Type Transformer) b. Schneider / Schneider approved channel parter with CAHORS
transformer
c. Control & Switchgear with CAHORS transformer
(e) 22 kV Compact Unitised Substation a. ABB / ABB Approved channel partner with CAHORS
transformer
(With Oil Type Transformer) b. Schneider / Schneider approved channel parter with CAHORS
transformer
4 11kV GIS VCB Panels : a. ABB / ABB licensed - GOEL POWER, AMBIT
b. Schneider / Schneider licensed-Sudhir
c. Control & Switchgear
5 11kV VCB Panels : a. Schneider Design: Sudhir, Adlec ABB Design: Ambit, GOEL
b. POWER Control & Switchgear
c.
6 22 kV & 33kV VCB Panels : a. Schneider Design: Sudhir, Adlec ABB Design: Ambit, GOEL
b. POWER Control & Switchgear
c.
18 Contactors & O/L relays within built SPP : a. Schneider: Tesys Series
b. Siemens: 3TF Series
c. Mitsubishi: SN Series
19 SPP : a. Minilec
L&T
b. Epcos
c. Neptune -Ducati
35 DG Controllers a. Dief
b. Woodword
65c. Piping, ducting & cable tray supports (Supports, wires , : a. MUPRO
Channels, Brackets, hangers, nuts, washers, fastners etc.) b. WURTH
c. GRIPPLE
d. OBO BETTERMAN
b. DEHN
c. FURSE
b. OBO
c. Alltec
79 Inverter : a. Luminous
b. Su-kam
c. Microtek
81 PA Speakers : a. Bosch
89 UPS a. Emerson
b. Schneider
c. Delta
d Legrand Numeric
e. SOCOMEC, india
NOTES
1. ALL DIMENSIONS ARE IN MM UNLESS OTHERWISE SPECIFIED.
2. ALL LEVELS INDICATED ARE IN METERS UNLESS OR OTHERWISE SPECIFIED.
3. DIMENSIONS / LEVELS INDICATED ARE STRUCTURAL UNLESS OTHERWISE SPECIFIED.
4. THIS DRAWING, UNLESS OTHERWISE MENTIONED, TO BE PLOTTED TO MENTIONED PAPER SIZE.
5. ONLY WRITTEN DIMENSIONS ARE TO BE FOLLOWED. DO NOT SCALE THE DRAWING.
6. DIMENSIONS / LEVELS SHOWN TO BE VERIFIED AT SITE BEFORE COMMENCEMENT OF
WORK, ANY DISCREPANCIES IF NOTED BE BROUGHT TO THE NOTICE OF ARCHITECT
PRIOR TO THE COMMENCEMENT OF WORK.
7. RELEVANT SERVICES DRAWINGS ARE TO BE READ SIMULTANEOUSLY AND PROVISION OF
CUTOUTS / SLEEVES TO BE PROVIDED AS REQUIRED.
8. ALL MATERIALS / FINISHES TO BE AS SPECIFIED AND APPROVED BY THE CONSULTANTS.
A1 A B C D E F G H J K L
7643 8400 8400 8400 8400 8400 8400 8400 8400 8400 8400
1
8400
2TR
1 RUN 2 RUN 3 RUN 3 RUN
CH D8-A D8-A
RT2
COUNSELING 01 COUNSELING 02
45 40 BED (1) BED (2)
2TR
EQUIPMENT STORE 4 RUN 38 WIFI
39
RT2
WIFI
7 7
PATIENT 1 RUN 1 RUN
CHANGE CH 2 RUN 1 RUN
44 2 RUN
D5-A D3 D3 1 RUN
TOI-M TOI-F
4 RUN 4 RUN 5 RUN 3 4
8950
2 RUN 2 RUN
PRE-PROCEDURE CORRIDOR 21 RECLINERS (1-4) RECLINERS (5-12) RECLINERS (13-20)
POST-PROCEDURE WIFI
42 41 LADIES DORM
8 8 8
43 1 RUN FD4-E 7 RUN 1 RUN (10 BEDS) 1 RUN 2 RUN 2 RUN
D3-M D5-J
5
D3-M D3-M
D11-L D5-J WAITING
1 RUN
4300 M 2450 N 2450 P 2450 Q 2450 R 2450 S
WASTE
( 74SEATS )
2 RUN 1 RUN 2 RUN 2 RUN 2 RUN
COLLECT
BIN RECEPTION
WIFI
37 1
TOILET
WASTE
COLLECT
2 2 RUN
25MM FLOOR
25MM FLOOR
BIN
CLEAN DIRTY
NURSE STATION
CONDUIT
CONDUIT
UTILITY 48 UTILITY GENTS DORM
46 47 49 2 RUN (10 BEDS) FH-01
M-03
D5-A D5-A
2 RUN 2 RUN 3 RUN 225
3 D11-L 9 RUN D5-A D5-A
3 RUN
2500
FD2-E FD4-E BORW=3175 14 RUN FD4-E
150x50mm RACEWAY 200 200 200
DROP FROM CEILING CORRIDOR 18 CORRIDOR 19 3 RUN UP
ENDOSCOPY CORRIDOR 22 (31+(wifi-4)=35
D11-L 50 6 3 RUN 10 3 RUN
WIRES)
DN
55 2 RUN CLOSET
D11-J PL-09 M-10 M-08 M-07
EQUIPMENT ALCOVE D3-A D11-J D11-J FD5-F D3
FH-03 M-13 15
150x50mm RACEWAY
150x50mm RACEWAY
M-04
8400
3050
3 RUN WIFI
WIFI
D3
56 PL-04 PATIENT
TOILET F.
25MM FLOOR
25MM FLOOR
M-15 EQUIPMENT
PL-03
STAFF CHANGE WIFI NURSE STATION 1 NURSE STATION 2
CONSULTING TOILET D3-M
CONDUIT
CONDUIT
(F) SCOPE WASH SD2 3 RUN ALCOVE
ROOM 18 3 RUN 20
BORW=3175
BORW=3175
54 UP
D2-M
1 RUN 21 WCA
3TR
D3
PROCEDURE PROCEDURE 150x50mm RACEWAY 9
ROOM-2 ROOM-1 DROP FROM CEILING
DN CHANGE CHANGE DN (35+(wifi-3)=38 1 RUN
52 51 WIRES)
MICROWAVE
1 RUN
2625
SD2
VISITOR VISITOR VISITOR PATIENT D5 1 RUN
ME-02
PL-04.1
STORAGE
3TR
UP D3 2 RUN PHARMACY
ELEVATOR 02 ELEVATOR 03 ELEVATOR 04 PANTRY D5-J 16 TOILET 2 RUN
PL-06
STAFF MINOR-O.T D3-M 22
11 WCA D5
FD5-F CHANGE
D3 57 53 D3-M
D2-M PL-01
4 (M)
STAFF STAFF STAFF WASTE
COLLECT
WASTE
COLLECT
TOILET H.
BIN BIN
2575
D5-J PATIENT AIR
PROCEDURE ROOM
17
ME-01
TOILET DISPENSING MED.PREP D5 LOCK
4 RUN DIRTY UTILITY 19
CORRIDOR 20 (WCA) WINDOW LOBBY
DN
12 D7-A
24
M-16 27 23
3 RUN
SP-01
M-17
E-02 UPS MED EQ. UP
L+P PANEL
25MM FLOOR
25MM FLOOR
900 MM WIDE COUNTER FOR 99 M-05
E-01
3150.0000
D5-J
CONDUIT
CONDUIT
96 80 81 84 88
15 WCA
EQUIPMENTS WITH OVERHEAD STORAGE 3 RUN
3000.0000
3095.0000
2100.0000
3950
AUTOCLAVE ROOM 93
2400.0000
10330.0001
D3-A OFFICE 29 25
WIFI EQUIPMENT WIFI
14 TOILET M-02
FH-04 97
D5-A M-11 M-12 30 M-09 FH-02 PL-02 CLEAN UTILITY ALCOVE
WIFI FD5-F 13
4 RUN
3 RUN
SD7 SD2 SD2
5680.0000
5680.0000
MEDIA ROOM 79
1 RUN 8 RUN 200 200 9 RUN
350 350 200
1875
MICROBILOGY 3 RUN CORRIDOR 20 2 RUN
10 FD9-F
3145.0000
94 (32+(wifi-2)=34 2 RUN
5
83 82
WIRES)
PL-07 PL-08
D5-A D5-A D5-A 600 MM WIDE COUNTER FOR EQUIPMENTS D3-A HOUSE PL-05 STRETCHER/ 2 RUN
WITH STORAGE ABOVE
3 RUN EQUIPMENT ALCOVE
KEEPING
25MM FLOOR
23 1 RUN
1 RUN 1 RUN 2 RUN 3 RUN D5-A HISTOPATHOLOGY LAB
CONDUIT
IT STORE LOBBY
60 34
3 RUN STAFF
1 RUN
26 1 RUN
1 RUN
750 MM 750 MM 750 MM 750 MM 750 MM 750 MM 1 RUN LOUNGE 2 RUN 3 RUN
D5-A 3 RUN
750 MM WIDE
38
31
WIFI
5830.0000
D5-A D5-A 66
COUNTER FOR 33 TOILET-F 2 RUN
7125
69
D5-A EQUIPMENTS 28 31 24 37 FD14-E
HPL HPL
68
A.H.U BEDS (3-8) BEDS (9-14) BEDS (15-20)
1 RUN
8950
25MM FLOOR
28 26 26 26
D3
03
22
CONDUIT 64
67
2 RUN
4032.5000
D5-A 2 RUN
02
STORE
19
BLOCK/SLIDE R3 24.11.2021 VB SD AS PER CONSULTANT COMMENTS
STORE D2-A
IT WORK DESK
5965.0000
2 RUN
6115.0000
18
STORAGE FD9-F 1 RUN
66 67 25
D3
R2 08.04.2021 SM SD AS PER CONSULTANT COMMENTS
01
7
NOC AREA
14145.0000
2164.9573
21 HPL HPL
RACKS, 31 SLOTS (4X8)
3000.0000
61 , 62 1 RUN 1 RUN
36
32 TOILET-M R0 14.02.2021 SM SD AS PER SHOP DRAWING
1275 1825
MICROWAVE
6580.0427
M-06
OFFICE
BIOCHEMISTRY BIOCHEMISTRY HEMAT IMMUNOASSAY 27 29
ANALYZER ANALYZER ANALYZER ESR ANALYZER ANALYZER 35
REV. DRAWN CHECKED DESCRIPTION OF
DATE
NO. BY BY THE REVISIONS
6 W1 W1
CONTACTOR:
C:\Users\harshali.wadekar\Downloads\HCPL_LOGO.bmp
21
PROJECT:
1.5
150
ANCHOR
ANCHOR 10MM SLAB
17.5
SLAB
10MM 50x150x50MM CENTRE
25
THREADED VARIABLE
CONSULTANT:
THREADED 1420 NUT & ROD 10MM
ROD 10MM
1091
M-19
RACEWAY JOINT PL-10
SLOTTED
GI CHANNEL
1.5
300
1.5
7
150
M-28
38x10MM CONSULTANT:
17.5
PL-11
50x300x50MM M-27
25
TWO TIER CABLE TRAY SUPPORT STRUCTURE FOR TWO TIERS RACEWAY ARRANGEMENT IN CEILING
40x1000x40MM CABLE TRAY
CEILING RACEWAY 50x300x50MM
M-29 Sunil Nayyar Consultants Pvt. Ltd
WITH JOINTING ARRANGEMENT 206, 206A, 305A, 305B Second & Third Floor, Time Centre,
CUTOUT IN SLAB
Golf Course Road, Sector-54, Gurgaon-122002
STRUCTURAL CONSULTANT:
VASTECH
2nd Floor Almonte Building, Kharadi Hadapsar Bypass Road, Kharadi ,
Pune-411014, Yashwantnagar Chowk
LEGEND DISCRIPTION QTR. 8 E-03 FH-05
PROJECT MANAGEMENT:
M-22
200 CUTOUT IN SLAB CLIENT:
M-21
CHANDRAPUR CANCER CARE FOUNDATION
RT-STAIRCASE-01
PROJECT ARCHITECT:
9
M-23
PURPOSE OF RELEASE
8950
M-25
AS PER SHOP DRAWING
S.N. CABLE TRAY DETAIL G.F CR
PL-12
EB
STAGE: FOR APPROVAL
01 - 300mm WIDE RACEWAY 25 FH-06
M-24
A1 A B C D E F G H J K L
7735 8400 8400 8400 8400 8400 8400 8400 8400 8400 8400
8400
2
1 RUN 1 RUN
ISOLATION ( + VE ) ISOLATION ( + VE ) 1 RUN 1 RUN 1 RUN 1 RUN
68 71
WARD-1 MULTIBED
2 RUN 3 RUN 3 RUN 3 RUN WARD-2 WARD-4
3 WARD-3
5 7 9
1 RUN 1
3 RUN 3 RUN 3 RUN 3 RUN
69 72
6 RUN 3 RUN M N
4 RUN
TWIN ROOM-1 TWIN ROOM-2 TWIN ROOM-3 TWIN ROOM-4 TWIN TWIN 3 RUN 4300 2450
73 75 77 79 ROOM-5 ROOM-6 3 RUN
3 RUN 1 RUN 3 RUN
2 RUN 81 83
4 RUN
76 4 6 8 10
STORE 74
78 80 82 84
70 4 RUN 3 RUN
67 69a 3 RUN 4 RUN FH-01 M-03
225
3
3 RUN 8 RUN 3 RUN
M-14 2 RUN 4 RUN 4 RUN
6 RUN 6 RUN 15 RUN
275
CORRIDOR 24
7 RUN 275 UP
275
CORRIDOR 23
25mm floor COUNSELLING ROOM M-08 M-07
COUNSELLING ROOM
M-32 conduit M-13
FH-03
225x50mm RACEWAY
225x50mm RACEWAY
4 RUN M-04
8400
1 RUN PL-04
25mm floor
2
M-15 TOILET F. WIFI
PL-03
NURSE STATION-1 WIFI conduit
WIFI SD2
1 RUN NURSE STATION-3
BORW=3175
BORW=3175
60 D2-M TREATMENT
WIFI 23
UP ROTALLIRBIFED
ROOM
DEFIBRILLATOR
CORRIDOR 25
EVAWORCIM
22 21 ACD
ROOM PANTRY
ME-02
PANTRY PL-04.1
31
UP 57 1 RUN 64 24
1 RUN
CR
EB
CR
EB
PL-06
D3-M PL-01 R3 13.01.2022 VB SD AS PER CONSULTANT COMMENTS
1 RUN D2-M
4 MEP
MICROWAVE
CORRIDOR 25
1 RUN
WASTE WASTE WASTE WASTE
CR
EB
EB
CR
58 CLEAN UTILITY
DIRTY UTILITY
ME-01
DIRTY UTILITY
61 65 1 RUN
R1 4.03.2021 SM SD AS PER CLIENT COMMENTS
31
25 STORE ROOM
MEDICATIONSACD ACD 18
62 1 RUN
M-16 DN
STAFF STAFF STAFF MEP
MEP 16.02.2021 SM SD
R0 AS PER SHOP DRAWING
ELEVATOR 07 ELEVATOR 06 ELEVATOR 05 UPS MED EQ. L+P PANEL
SP-01
M-17
UP
ELEVATOR 01 E-02 PANEL
DEFIBRILLATOR DEFIBRILLATOR
46 48 50 2 RUN 12 4 RUN
44 8 RUN 6 RUN 1 RUN WIFI MULTIBED 14
WARD-5
3 RUN
WIFI
TOILET-F 29
7125
SEMINAR
RELATIVE'S ROOM 02 HPL 37 HPL
SINGLE ROOM-2 41 D3-M 1 RUN
ROOM SUITE ROOM SINGLE ROOM-1 SINGLE ROOM-3 SINGLE ROOM-4 3 RUN
CORRIDOR 25
8950
WIFI WIFI
2 RUN
WIFI ROOM 01
40 2 RUN
32
1 RUN
NEWARCH
WIFI WIFI 2 RUN
1 RUN 202/203, Gokarna, Haridas Nagar
1 RUN 3 RUN
25MM FUR.C
WIFI
1 RUN 1 RUN PATIENT'S 2 RUN 3 RUN 5 RUN 6 RUN 7 RUN D3-M
1 RUN 1 RUN SD2
ROOM HPL HPL 2 RUN
RESEARCH & 2 RUN
1 RUN EDUCATION 36 2 RUN
KITCHEN CONSULTANT:
1 RUN 1 RUN
MICROWAVE
1 RUN TOILET-M M-06
HPG
6 W1 W1
HPG Level 4, A Wing, Dynasty Business Park, Andheri
Kurla Road, Andheri East, Mumbai, 400059, India
MEP CONSULTANT:
1.5
150
1.5
VASTECH
ANCHOR 2nd Floor Almonte Building, Kharadi Hadapsar Bypass Road, Kharadi ,
ANCHOR 10MM SLAB
17.5
CEILING RACEWAY FRAME TO SET BOLT CBRE South Asia Pvt. Ltd
600
RACEWAY JOINT
EB 11th & 12th Floor Raheja Tower, G Block, Bandra Kurla Complex,
Bandra East, Mumbai, Maharashtra 400051
SLOTTED 1.5
300
1.5
PH- 022 4069 0100
GI CHANNEL
150
38x10MM
17.5
50x300x50MM CLIENT:
25
ACS
MUMBAI-DELHI-CHENNAI-KOLKATA-BANGALURU-HYDERABAD-PUNE-KOCHI
PURPOSE OF RELEASE
THIS DRAWING IS THE SOLE PROPERTY OF EDIFICE CONSULTANTS PVT. LTD. IT'S USE FOR ANY
PURPOSE OTHER THAN THAT MENTIONED IS TO BE DONE ONLY AFTER PRIOR APPROVAL.
NOTES
1. ALL DIMENSIONS ARE IN MM UNLESS OTHERWISE SPECIFIED.
2. ALL LEVELS INDICATED ARE IN METERS UNLESS OR OTHERWISE SPECIFIED.
3. DIMENSIONS / LEVELS INDICATED ARE STRUCTURAL UNLESS OTHERWISE SPECIFIED.
4. THIS DRAWING, UNLESS OTHERWISE MENTIONED, TO BE PLOTTED TO MENTIONED PAPER SIZE.
5. ONLY WRITTEN DIMENSIONS ARE TO BE FOLLOWED. DO NOT SCALE THE DRAWING.
6. DIMENSIONS / LEVELS SHOWN TO BE VERIFIED AT SITE BEFORE COMMENCEMENT OF
WORK, ANY DISCREPANCIES IF NOTED BE BROUGHT TO THE NOTICE OF ARCHITECT
PRIOR TO THE COMMENCEMENT OF WORK.
7. RELEVANT SERVICES DRAWINGS ARE TO BE READ SIMULTANEOUSLY AND PROVISION OF
CUTOUTS / SLEEVES TO BE PROVIDED AS REQUIRED.
8. ALL MATERIALS / FINISHES TO BE AS SPECIFIED AND APPROVED BY THE CONSULTANTS.
A1 A B C D E F G H J K L
7743 8400 8400 8400 8400 8400 8400 8400 8400 8400 8400 4300
1
3291
W3 W3 W1 W2 W1 W1 W2 W2 W1 W1 W2 W2 W1 W1 W1 W1 W1 W1 W2 W2 W1 W1 W1 W1 W1 W1 W2 W2 W1 W6 W1 W2 W2 W1
2
1 RUN 1 RUN
1 RUN 1 RUN 1 RUN 1 RUN CLEAN 1 RUN 1 RUN
1 RUN COUNSELING ROOM
2 RUN 2 RUN UTILITY 2 RUN
WIFI
3 RUN 2 RUN
3 RUN 1 RUN
2 RUN 2 RUN 1 RUN
1 RUN
2 RUN
ACD EB
M N 2450 P 2450 Q R S
DEFIBRILLATOR
EB
2 RUN
2450 2450
ECG
DEFIBRILLATOR DEFIBRILLATOR
ECG ECG
MICROWAVE
DIRTY WIFI WIFI WIFI WIFI WIFI
CLEAN
WIFI 2 RUN 2 RUN TOILET
25mm conduit in floor UTILITY 25mm conduit in floor 1 RUN STORE - 2 RUN
UTILITY
OFFICE OFFICE OFFICE STORE COUNSELING EQUIPMENT FH-01 M-03
2500
1 RUN 3 RUN 3 RUN 6 RUN 11 RUN 2 RUN 1 RUN
8 RUN
WIFI STORE - 25MM FLOOR
GENERAL CONDUIT
9 RUN DIRTY
1 RUN 1 RUN 1 RUN ACD 2150
3 RUN EB
UTILITY DN
OFFICE CR
STAFF CHANGE( MALE) PL-09 M-10 M-08 M-07 5 RUN 1 RUN 1 RUN
519.9105
CONTROL DESK FH-03 M-13 B.O.R.W.=3175 M-04
8400
3050
150 150 150
STORE PANTRY WIFI 2 RUN
1850.0000
PL-04 2 RUN WIFI
2 RUN 1 RUN
M-15 WIFI
PL-03
TOILET F. 2 RUN 1 RUN 150x50mm RACEWAY 3 RUN
150x50mm RACEWAY 1 RUN
DROP FROM CEILING DROP FROM CEILING
UP
ISOLATION
DN
2.45 M WIDE CORRIDOR
DN 2 RUN
WIFI
STORE
2625
2825 x 360 MM TOILET TOILET 1 RUN
1 RUN VISITOR VISITOR VISITOR
ME-02
UP 1 RUN PL-04.1
EQUIPMENT STAFF CHANGE (FEMALE) EL CUTOUT
W7 PL-06 ELEVATOR 02 ELEVATOR 03 ELEVATOR 04
STORE STAFF LOUNGE
PL-01
4 WIFI 1 RUN
TOILET M.
STAFF STAFF STAFF
ELEVATOR 01 TOILET H.
2.45 M WIDE CORRIDOR
WIFI
ELEVATOR 07 ELEVATOR 06 ELEVATOR 05 STORE
2575
1 RUN
DUTY DOCTOR
ME-01
DIRTY UTILITY DOCTOR CHANGE (FEMALE)
STERILE 360 1500 1600 1 RUN 2 RUN TOILET
M-16 1000 x 200 MM DN 1 RUN
STORE 1 RUN LV CUTOUT
2 RUN
200
300
UPS MED EQ.L+P PANEL
SP-01
M-17 1000
ISOLATION
600
E-02 UP 2 RUN
DOCTOR'S LOUNGE PANEL
ELECTRICAL RM. M-05
450
1 RUN E-01
1 RUN
450
WIFI DOCTOR CHANGE (MALE)
8400
3950
3 RUN
450
DROP FROM CEILING
ACD B.O.R.W.=3175 WIFI M-02
CR
WIFI
300x50mm RACEWAY HUB RM. 1 RUN
450
FH-04 EB M-11 M-12 M-09 FH-02 PL-02 2 RUN 2 RUN 1 RUN
DROP FROM CEILING 150 150
ECG
MEDICATION EB DIRTY
25MM FLOOR UTILITY
NURSE STATION ROOM
150 350 350 350 350 150
WIFI
CONDUIT A.H.U. ROOM
1 RUN 150x50mm RACEWAY M-01
1875
1 RUN WIFI 3 RUN 2 RUN B.O.R.W.=3175 1 RUN
1 RUN
1 RUN
2 RUN 1 RUN 2 RUN
2.45 M WIDE CORRIDOR 1 RUN
1500
1 RUN EQ.BAY 1 RUN W3
5
300
W4 2 RUN C.S.S.D PANEL CHANGE PL-05
PL-07 PL-08 (F) STORE - PANTRY
TROLLEY HOLD
25MM FLOOR
EQUIPMENT 2 RUN
STORE CONDUIT
1 RUN STERILE CSSD
WIFI 300x50mm RACEWAY WIFI
STERILE
MICROWAVE
DISPATCH DROP FROM CEILING
MANAGER
DISPATCH 1 RUN (26+(wifi-3)=29
(FOR O.T.) STERILE STORE 6 RUN WIRES) CLEAN
(FOR HOSPITAL)
UTILITY
ACD EB
1 RUN CHANGE (M)
7125
ETO ROOM AIR LOCK CR
CSSD I.C.U.
1 RUN 1 RUN
RECEIPT COUNTER 5 RUN
(DIRTY) 3 RUN 1 RUN 1 RUN
1 RUN
2 RUN
2 RUN
R3 09.02.2022 RK SD AS PER COMMENTS
TROLLEY BAY
3150
WASH / DISINFECTION AREA R2 16.06.2021 SM SD AS PER COMMENTS
STORE STERILIZER CLEAN & PACKING AREA
16.02.2021 SM SD AS PER COMMENTS
1275 1825
M-06 R1
R0 02.02.2021 SM SD AS PER SHOP DRAWING
16A 16A 16A 16A 16A 16A
UPS UPS UPS UPS UPS UPS
6 W3 W3 W1 W1 W1 W1 W1 W2 W2 W1 W1 W1 W1 W1 W1 W2 W2 W1 W1 W1 W5 W1 W1 W1 W1 W1 W1 W1 W2 W2 W1 W3 W3
REV.
DATE
DRAWN CHECKED DESCRIPTION OF
NO. BY BY THE REVISIONS
CONTACTOR:
PROJECT:
UPRIGHT SPRINKLER
CONSULTANT:
7650 ANCHOR
135
BOT 3275
10MM 50x150x50MM
550
550
MEP CONSULTANT:
STRUCTURAL CONSULTANT:
3275
3175
DUCT
VASTECH
3175
NUT &
Pune-411014, Yashwantnagar Chowk
CEILING RACEWAY FRAME TO SET BOLT
RACEWAY JOINT PROJECT MANAGEMENT:
2450.00 CLIENT:
MUMBAI-DELHI-CHENNAI-KOLKATA-BANGALURU-HYDERABAD-PUNE-KOCHI
EB
350 01 - 300mm WIDE RACEWAY 45 PURPOSE OF RELEASE
ng drawingRevised MEP LAYOUT_2020.05.222020.05.21MR-ACF-RET-CHN-MEP-04-05-05-2020.dwg THIS DRAWING IS THE SOLE PROPERTY OF EDIFICE CONSULTANTS PVT. LTD. IT'S USE FOR ANY
PURPOSE OTHER THAN THAT MENTIONED IS TO BE DONE ONLY AFTER PRIOR APPROVAL.