Transcript
Longitude ACS
Specification Document
DVTel, Inc.
www.dvtel.com
SECTION 17910 - SECURITY SYSTEMS PART 1 - GENERAL 1.1
REFERENCE TO GENERAL CONDITIONS
PART 2 - PRODUCTS 2.1
Intelligent Security Operation Center (ISOC) A.
System Description 1.
The ISOC shall consist of Master system software, Web server software, ACS software, client workstation, badge enrollment workstation, badge printer, report application, Intelligent Controller (Intelligent Controller), Reader Interface Modules (RIMs/DGPs), and alarm initiating devices.
2.
The ISOC shall be software based solution and shall not require any proprietary hardware.
3.
The ISOC shall be based on TCP/IP network protocol and shall communicate with Ethernet ready, TCP/IP based components.
4.
The ISOC software shall be capable of running on Windows 2003 servers with full feature operation
5.
The Intelligent Controller shall be a software base solution and shall be capable of operating on Windows or Linux based devices.
6.
Acceptable Manufacturers a.
b.
c.
B.
ISOC Software: 1)
DVTel
2)
Or equal.
Intelligent Controllers 1)
DVTel
2)
Mercury
3)
HID
4)
Rosslare
5)
Or equal.
Other off-the-shelf components, including but not limited to computers, monitors, printers, badge enrollment cameras and accessories, etc. shall be acceptable as recommended by the ISOC manufacturer as long as the components meet the functional and technical requirements stated herein.
System Infrastructure
Security Systems
17910 - 1
Longitude ACS
Specification Document
DVTel, Inc. 1.
www.dvtel.com Another section will provide the Ethernet TCP/IP network architecture for the ISOC. All components including but not limited to the ISOC server(s), Web server, client workstations, printers, and Intelligent Controller shall be Ethernet ready and shall provide as minimum 10/100BT using RJ45 interface to the network to provide for communications. a.
2.
C.
Off-the-shelf converter from RS-232/422/485 to Ethernet TCP/IP communication shall not be utilized and will not be conceder as equal.
Another section will provide infrastructure cabling between the security device locations, security equipment and the IT room (IDF/MDF/Security/IT rooms).
ACS Software 1.
2.
3.
The ISOC software shall as minimum support the following without additional licenses or software: a.
Intelligent Controller, Reader Interface Modules or Data Gathering Panels, card readers, biometrics, alarm input points, and control output points as required to connect all devices included
b.
The ISOC shall as minimum support 20,000 cardholders and photo images.
c.
The ISOC shall as minimum support 40,000 Card Readers
d.
The ISOC shall as minimum support 8,000,000 Transactions on-line
The ISOC software shall be capable to range from a small standalone Host with directly attached card readers to a large distributed processing system using Intelligent Controllers with Data Gathering Panel. a.
The Intelligent Controller software shall be capable of controlling up to 32 RIMs. Each RIM can be of a single or dual door reader module or a multiple Input or Output Module.
b.
The Intelligent Controller shall include as minimum 512Meg of non-volatile Flash Memory
c.
The Intelligent Controller shall be capable of storing all access control and alarms rules and shall be capable of operating all doors contact on board
d.
The Intelligent Controller shall be capable of making all “decisions” on board with no need to communicate with the master host
e.
The Intelligent Controller shall be capable of storing 1,000,000 transaction in the on board memory
f.
The Intelligent Controller shall provide dual network interface ports, for redundancy, and shall communicate over the Ethernet TCP/IP network.
g.
The Intelligent Controller shall support Encryption between the Master Host and itself.
h.
The Intelligent Controller shall be capable of operating with other Intelligent Controllers and shall also be capable of operating with a Master Host
i.
The Intelligent Controller shall provide distributed processing by incorporating local and regional nodes in a multi-tier hierarchical architecture. When more than one Intelligent Controller is required a host server shall manage this hierarchy.
The ISOC software shall adhere to open software standards including an SQL based database, TCP/IP Communications, Multi-Node/Multi-Tier Architecture, and support for XML
Security Systems
17910 - 2
Longitude ACS
Specification Document
DVTel, Inc.
www.dvtel.com communications and shall be able to run on a Microsoft Windows 2003 Operating System or Linux.
4.
The ISOC software shall provide for online Intelligent Controller through the use of flash ROM. The ISOC shall provide for individual or system-wide update of RIMs and/or Intelligent Controllers. Flash ROM updates shall not affect performance of the ISOC.
5.
The ISOC software shall incorporate failover and redundancy to eliminate total system failure due to communications outage, natural disasters, or terrorist attack. This optional capability must provide redundant, stand-by operation incorporating real time data replication to one or more distributed nodes. Upon detection of a failure, the system must provide automatic take over of field panels by alternate nodes.
6.
The ISOC software shall provide the following: a.
Graphical User Interface (GUI) with integrated help.
b.
Distributed operations between the host server, client workstations, Intelligent Controller and RIMs. 1)
Intelligent Controller shall provide an intelligent interface between point monitoring and access control devices, and the host server. Intelligent Controller shall collect point monitoring and access control messages from field devices, and transmit the data to the system host server and client workstations.
c.
Hardware and software specifically designed to support multi-user, multi-tasking point monitoring, access control, video imaging, and network video applications. Independent, simultaneous performance of multiple system functions from client workstations shall not cause an appreciable reduction in ACS and ISOC processing or response time.
d.
Automation/Customization such that any combination of Person, Transaction, Time, or specific Point can trigger any sequence of Door Locks, Outputs, XML transactions, or Video Control.
e.
Operation over wired and/or wireless links 1)
2)
f.
Security Systems
The ISOC shall provide for access for controlling and monitoring of the following security system equipment from wireless based devices running windows OS. a)
ISOC devices (e.g. input/output points, card readers, locks, etc.).
b)
Live and recorded video for CCTV cameras.
Applications shall function simultaneously with non-security applications as specified by the Owner.
Operation over Web/Intranet links 1)
The ISOC shall provide for Web/Intranet-based access to ISOC functions and features.
2)
Provide a Web Server to support Web clients.
3)
Provide the capability to support simultaneous Web clients.
17910 - 3
Longitude ACS
Specification Document
DVTel, Inc.
www.dvtel.com 4)
g.
The Web clients shall provide for the following controls: a)
Call-up of CCTV cameras
b)
Remote control of outputs (locks, relays, etc.)
c)
The ISOC shall restrict camera call up and output controls based on the user’s login and system partitioning restrictions.
Other ISOC options must include: 1)
Digital Video Management
2)
Visitor Logging
3)
Time & Attendance a)
Payroll Interface for uploading Time & Attendance data to an enterprise Payroll System
4)
Human Resources (HR) Interface for downloading Employee Data from an Enterprise HR System
5)
Photo ID Badge Creation
6)
XML to allow open and secure access by external systems
h.
The ISOC Software shall display and record alarm messages including time, date, location, point number, point description, event type, and point status for each point transaction.
i.
The ISOC Software shall comprise of a system history database to store every alarm event, control function, and card access transaction. Each record shall include the nature of the transaction, time, date, card reader or alarm location, cardholder name, card number and valid/invalid status. The ISOC history database shall be Microsoft SQL based and shall not be editable
j.
The ISOC Software shall comprise of an audit trail feature to maintain an historical record of what changes were made to the database, when the changes were made, and who made them. The audit trail shall not be editable.
k.
The ISOC Software shall support future expansion over telephone lines, T1 lines and other communications lines through modems.
l.
The ISOC Software User Accounts 1)
Individual accounts for each ISOC operator. Each account shall require a different password to access the ISOC system components.
2)
Password restricted operator access levels to restrict access to sensitive programming functions to authorized personnel only.
3)
Password Restrictions a)
Security Systems
The ISOC shall allow the Owner to independently assign access levels to each operator account.
17910 - 4
Longitude ACS
Specification Document
DVTel, Inc.
D.
www.dvtel.com b)
The highest-level “global-user” password shall have access to all ISOC databases. Assign of “global-user” shall be per user bases only.
c)
Each password shall be individually programmable to restrict operator access to programming and operator functions, commands, and database access, and alarm point and control point functions.
d)
Each password shall be individually programmable to restrict operator control functions for specific areas.
m.
The ISOC Software shall comprise of an independent time programming for each alarm input, control output, card reader input, and output groups via software controls from client workstations.
n.
The ISOC Software shall comprise of an integrated Network Video Management Software (NVMS). The ISOC shall provide for visual verification by utilizing a shared Access Control and NVMS database.
o.
The ISOC Software shall include the ability to verify current status of any point in the ISOC system and change any of the programmable point descriptors via the client workstation.
p.
The ISOC Software shall include the ability to have any combination of point (reader or input), person, time, or specific transaction trigger a relay, output or XML message in addition to visual notification over the ISOC and NVMS Video Surveillance software.
q.
The ISOC Software shall include the ability to schedule a program to allow the administrator to automatically generate report printing, or schedule an output commands, door access, alarm access, etc. on a time/day programmable basis up to one year in advance.
Access Control System (ACS) Functionality 1. Provide access control through the use of the following:
2.
3.
a.
Contactless smart card or proximity reader technology.
b.
Keypads reader technology (programmed through the ISOC).
c.
Biometric reader
d.
Combination of the above card reader/keypads/biometric.
e.
Different combinations shall be available during different time periods.
The ACS combined with the ISOC shall be designed to manage and control open standard nonproprietary access control and alarm monitoring panels such as: a.
Mercury
b.
HID
c.
Rosslare
The ACS shall provide full a minimum of 3 interfaces to existing access control and alarm panels from the following manufacturers, a head-end only interface does not count:
Security Systems
17910 - 5
Longitude ACS
Specification Document
DVTel, Inc.
www.dvtel.com a.
Checkpoint Systems
b.
Hirsch Electronics
c.
Lenel
d.
Apollo
e.
ProWatch
f.
Security Applications Inc.
g.
Westinghouse WSE 808, 818, and 708
4.
The ACS software shall provide full migration from any of the above systems to the ACS and ISOC operation with no need to introduce new hardware.
5.
The ACS shall provide access control and remote control of access points including doors, automatic door operators, sliding doors, overhead doors, vehicle gates, and parking lift gates. a.
Control point outputs for lock power and device control activated by access control device, client workstation keyboards, and time schedule.
b.
Control of access through access control devices based on the cardholder's access levels. 1) An access level shall define an access point or group of access points accessible by a cardholder during a certain time period. 2)
Time periods shall include both authorized days and hours, and shall include independent holiday schedules. The ISOC shall provide for modification of each cardholder access level to create unique cardholder access requirements.
3)
The ACS shall allow for a minimum of 32,000 Access Levels.
6.
The ACS shall provide automatic card expiration after a programmable time period.
7.
The ACS shall provide alarm indications at the ACS, ISOC and/or NVMS client workstation for unauthorized reader use attempts. Unauthorized reader use alarms shall be user selectable on a reader-by-reader basis.
8.
The ACS shall provide a visual display on the ACS and/or ISOC client applications of card use (all transactions or violations, only by card and/or by reader).
9.
The ACS shall provide momentary, programmable time, and/or maintained release of card reader controlled door locks and controlled devices via the client workstation. a.
Controls shall be available through keyboard, mouse or graphical map
10.
The ACS shall provide real time monitoring of the status of each card reader controlled doors against intrusion or door hold.
11.
The ACS shall allow importing cardholder data through ASCII files, ODBC, or XML from other databases or systems or database conversions.
12.
The ACS shall allow for the automatic assignment of Access Levels based on selected fields from the Personnel record.
Security Systems
17910 - 6
Longitude ACS
Specification Document
DVTel, Inc. 13.
14.
www.dvtel.com The ACS shall provide Valid Entry/No Access Events a.
When a cardholder passes through a protected door (door open, valid turnstile passage, etc.) after a valid card read, the ISOC shall record a “valid entry” event in history for the cardholder.
b.
When a cardholder does not pass through a protected door after a valid card read, the ISOC shall record a “valid access/no entry” event in history for the cardholder.
c.
If valid access is granted, but the door is not used, the system shall report such condition.
The ACS shall support the following Anti-Passback options a.
The access control shall provide for anti-passback card control to prevent two card access transactions without a valid exit transaction for any one card holder.
b.
Anti-passback control shall be independently programmable for each card reader controlled area.
c.
Anti-passback shall support both Soft and Hard anti-passback options 1)
Hard Anti-passback a)
2)
Soft Anti-passback a)
d.
The anti-passback shall include timed Anti-passback
4)
The ACS shall grant access to the cardholder and shall not allow the card to be used for a programmable time period after access has been granted.
5)
The access control system shall display an anti-passback alarm on designated ACS, ISOC and/or NVMS client workstations, and record an anti-passback violation in ISOC database when the access card is used again before the anti-passback time has expired.
The anti-passback shall include manual reset The ACS shall provide for an authorized user to manually reset the anti-passback for a specific card or globally through the client workstation.
Anti-passback exemptions 1)
15.
The ISOC shall grant access through the controlled portal, display an antipassback alarm on designated ACS, ISOC and/or NVMS client workstations, and record an anti-passback violation in ISOC database when anti-passback violation occurs.
3)
1)
e.
The ISOC shall not allow access through the controlled portal during an antipassback violation.
The ISOC shall allow an authorized user to designate certain cards as exempt from anti-passback requirements.
The ACS shall provide selective card reader and cardholder tracking
Security Systems
17910 - 7
Longitude ACS
Specification Document
DVTel, Inc. 16.
17.
www.dvtel.com The ACS shall provide card reader controlled doors a.
Provide card reader, client workstation, and time schedule control of the locking mechanisms.
b.
Provide normally closed magnetic door position switch for each door to monitor door propping/intrusion alarms and open/closed status. In addition, the ISOC shall monitor the card reader for invalid card use.
c.
The RIM shall provide two (2) independent a normally closed input per door for double door operations
d.
The ACS shall declare each door/input individually.
The ACS shall provide Card Reader/keypad Controlled Doors a.
Provide card reader/keypad, client workstation, and time schedule control of electric locking mechanisms.
b.
Provide normally closed magnetic door position switch for each door to monitor door propping/intrusion alarms and open/closed status. In addition, the ISOC shall monitor the card reader for invalid card use.
c.
18.
The RIM shall provide two (2) independent a normally closed input per door for double door operations
2)
The ACS shall declare each door/input individually.
Card reader/keypads shall provide the following options for granting access through doors: 1)
Card reader control only.
2)
PIN control only.
3)
Simultaneous control by either card reader or PIN.
4)
Combination card read and PIN control.
5)
Different combinations shall be available during different time schedules
Supervision a.
19.
1)
All devices shall include integrated end of line resistors (1-29K) to provide for supervision as specified for the ISOC.
The ACS and ISOC shall provide imaging solution to create and manage card enrolment a.
The ISOC shall allow for a centralized user management and shall provide full password protection for the addition, modification and review of badge holder records from any client workstation.
b.
Capture the badge holder image using a high resolution, digital color camera.
c.
Produce identification badges containing an image, text, and graphical images (logo).
Security Systems
17910 - 8
Longitude ACS
Specification Document
DVTel, Inc.
20.
www.dvtel.com d.
A badge editor that shall enable the Owner to fully customize the badge, background colors, location, content and orientation of badge information.
e.
Print identification badges with varying user defined security color backgrounds (15 different colors minimum). For example, a red background may designate access to restricted area while a blue background may designate general access, etc.
f.
Re-issue an employee identification badge by utilizing the previously stored image and record of the badge holder.
g.
Keep a record of number of card printed (lost) per user
The ACS and ISOC software shall provide interface to Network Video Management Software (NVMS) a.
b.
21.
The ISOC shall provide a unified digital video management application and provide the following video imaging functions: 1)
Digital Virtual Matrix System providing full video matrix operations over IP camera and video encoders.
2)
Ability to control existing analog matrix and/or replace the existing analog matrix.
3)
Provide live monitoring of video at 30fps and resolution of up to 4CIF (704x480 NTSC/ 704x576 PAL)
4)
Provide independent video recording stream per camera to record each camera at up to 30fps and up to 4CIF video resolution.
5)
The NVMS shall utilize the MPEG-4 video compression technology
6)
The NVMS shall be able to support the motion JPEG video compression technology to be able to support legacy IP solutions.
Complete NVMS specification are as noted under Digital Network Video management Software section
The ACS and ISOC software shall provide Alarm Management for monitoring and controlling all system alarms and functions a.
The ISOC shall provide for the following alarm monitoring information: 1)
2)
Security Systems
User programming of the following data for each alarm input point: a)
Point number
b)
Point priority group
c)
Point description
d)
Alarm point normal and abnormal status descriptions (SECURE, TROUBLE, ALARM, SHUNTED, BYPASSED, etc.)
e)
The ACS, ISOC and/or NVMS client application shall allow for operator instructions to be displayed for every alarm. The ISOC shall provide for multiple instruction pages to simplify and organize operators during alarm time.
Queuing of multiple alarms in order of priority and time.
17910 - 9
Longitude ACS
Specification Document
DVTel, Inc.
www.dvtel.com 3)
Alarm points can initiate other events within the ISOC (e.g. ACS, NVMS, XML, etc…)
4)
User programming of the following data for each control output point:
5)
22.
a)
Point number
b)
Point activation (alarm point, time schedule or real time)
c)
Maintained or momentary output
d)
Normally open or normally closed output
Time programmable and real time arming and disarming of alarm input points and control output points.
b.
Alarm notification shall take over all other ISOC functions. The ACS, ISOC and/or NVMS client workstation shall visually and audibly annunciate that an alarm condition exists, independent of any other current client workstation activity. An alarm event shall annunciate on the client workstation no more than one second after event initiation.
c.
Alarms may not be removed until a clearing transaction has occurred (ie. A door forced open may not be cleared until the door is closed).
d.
Upon operator selection of an alarm event, the ISOC shall remove the alarm from other users queue and shall display the programmed instruction for the alarm.
e.
The ISOC shall require the operator to enter a response/resolution acknowledgment message for each event, before the event is cleared from the operator queue. The ISOC shall allow for programming of a required acknowledgment message individually for each alarm point and shall make it available as a pull down to prevent mixed responses.
The ACS and ISOC Systems shall provide operation using Graphics Maps a.
Security Systems
General 1)
The ISOC shall allow for generating and sharing maps between the ACS, ISOC and NVMS with no need to duplicate maps.
2)
The ISOC shall provide for graphical maps at each client workstation. Maps shall include pictures, text, instructions and other information to assist the operator with monitoring and controlling the ISOC. Maps shall provide alarm sensor activation, card reader alarms and normal activities, ISOC troubles, communication connections and all CCTV NVMS related functions.
3)
From the alarm event screen, the ISOC shall allow the user to select Maps for a specific alarm.
4)
Maps shall allow the user to call up a graphic displaying the location of a selected alarm or associated door control functions. The device icon shall graphically differentiate each monitored status by enhancement, color change, and/or flashing.
5)
Maps option shall be available only to authorized users.
17910 - 10
Longitude ACS
Specification Document
DVTel, Inc.
www.dvtel.com
b.
6)
Maps quality shall be comparable to Drawings and shall illustrate partitions, doors, and other major building structures.
7)
Maps graphic format shall be a standard file such as; JPEG, GIF, or BMP.
8)
The ISOC software shall allow for unlimited, layered Maps for each alarm point.
9)
The ISOC shall allow for the import standard Windows file format drawing.
Navigation 1)
c.
Monitoring and Control: Configure Maps to provide efficient monitoring and control of Security System devices. Provide the device icons and controls for each device as follows: 1)
Alarm Input Points: Icon identifying open, closed, alarm, secure, and trouble status.
2)
Control Output Points
3)
23.
Navigation through Maps shall be done through a single click on the Map, with drill down capabilities. Configure the main Map to allow the user to call up floor plans, maps, instructions, and/or control panel graphics.
a)
Icon identifying output point status.
b)
Controls to provide for momentary, maintained, and timed output status changes.
Card Readers a)
Icon identifying open, closed, secure, or alarmed status of door.
b)
Icon identifying locked and unlocked status of electric locking mechanism.
c)
Controls for lock, momentary unlock (preprogrammed for five second unlock time), timed unlock with selectable unlock time, and maintained unlock.
The ACS and ISOC Systems shall provide Database Partitioning a.
Security Systems
The ISOC shall provide for software partitioning of the ISOC databases by password. 1)
Partitioning of the cardholder database shall restrict access to card programming functions for groups of cards.
2)
Partitioning of the card reader, and control output point databases shall restrict access to card programming functions for groups of cards, readers and control output points.
3)
Partitioning of the alarm input point database shall provide for programming of alarms to be reported only to workstation logged in under that specific tenant.
4)
Operators with partitioned access shall only be able to view or edit information (databases, card reader controlled doors, maps, alarm inputs, control point outputs, etc.) for those partitions that their password gives them privileges.
17910 - 11
Longitude ACS
Specification Document
DVTel, Inc.
24.
www.dvtel.com 5)
Operators with partitioned access shall only be able to respond to alarms for those partitions that their password gives them privileges.
6)
The Contractor shall be responsible for coordinating partitioning requirements with the Owner for each input, output, card reader and card holder.
The ACS and ISOC Systems shall provide Database Queries and Report Functions: a.
Security Systems
The ISOC shall provide the following query, edit, and report printing functions: 1)
Display requested queries and reports on a client workstation or print to a report printer.
2)
Cardholder search by field or any combination of user defined fields. Users shall be able to select the search criteria and sort order for the query (e.g. alphabetically by last name, numerically by badge number, alphabetically by department name, etc.).
3)
Database queries on any field or combination of fields in all ISOC databases. The ISOC shall allow the operator shall be able to edit queried records after the search. The operator shall only be required to search the database once to edit multiple associated database records.
4)
Report printing and/or display of any group of events within any selectable time period. The report printer shall be capable of producing a hard copy of any report that the ISOC may generate. Reports shall include historical events, defined by any combination of the following categories: a)
All events
b)
Location
c)
Point number
d)
Event type (e.g. intrusion, door open, etc.)
e)
Point status (e.g. on, off, alarm, normal, shunted, etc.)
f)
Management reports of transaction history by card number, cardholder data, reader number, time period, or invalid attempts
g)
Audit reports (e.g. card holders with access to specific areas and/or doors, including time periods, queried by area)
h)
Access reports (e.g. areas and doors that can be accessed by specific card holders and groups of card holders, including time periods)
i)
Audit trail reports
j)
Provide 10 preprogrammed custom reports. Coordinate report information, layouts and format information with the Owner, and submit report formats to the Owner for review and acceptance.
k)
Display and report printing of user generated custom reports. Sorts and queries for custom reports shall be by any field or combination of fields of the cardholder, card reader, alarm input point and control output point databases. Custom report generators shall be user friendly and not require the knowledge of high level programming languages.
17910 - 12
Longitude ACS
Specification Document
DVTel, Inc. E.
www.dvtel.com
Access Control Hardware Requirements 1.
Intelligent Controller - Data Gathering Panels (DGPs) a.
The Intelligent Controller shall provide the following: 1)
Minimum 512Megs of Ram a)
The Intelligent Controller shall be capable of storing all access control and alarms rules and shall be capable of operating all doors connected to it.
b)
The Intelligent Controller shall be capable of making all “decisions” on board with no need to communicate with the master host
2)
Adequate RAM to maintain a minimum card database of 100,000 cards including access levels and time zones of system provided.
3)
Reader Interface Modules that utilize the security cabling, provided under a separate section, to provide card reader, door position switch, request to exit device, and lock and auxiliary control relay control interface.
4)
On-board TCP/IP network connection to provide communications with the file server via the network. a)
5)
Security Systems
The use of Serial to IP converters that constantly poll over the network will not be accepted.
Four (4) Serial communication ports to Reader Interface Modules. a)
Eight (8) RIMs or I/O bords shall be able to be connected to each of the ports
b)
This shall provide for 64 devices to be attached to a single network based Intelligent Controller
6)
Flash ROM to allow for efficient firmware updates from the system software, remotely from the ISOC manufacturer, or locally at the Intelligent Controller. During Flash ROM updates, the Intelligent Controller shall operate normally. Any degradation in operation, speed and/or processing capability during flash updates shall be unacceptable.
7)
Supervision and monitoring of wiring between the Intelligent Controller and the monitored alarm devices for secure, alarm, and fault (open and short) conditions.
8)
Simultaneous support of at least eight (8) access card formats, including different facility codes and different length card formats.
9)
The Intelligent Controller shall be capable of storing all access control and alarms rules and shall be capable of operating all doors contact on board
10)
The Intelligent Controller shall be capable of making all “decisions” on board with no need to communicate with the master host
17910 - 13
Longitude ACS
Specification Document
DVTel, Inc.
Security Systems
www.dvtel.com 11)
The Intelligent System Controller shall support communication to the Host Server as well as any IP based Reader Interface Modules through the same port.
12)
IP Reader Interface panels must support the ability to communicate to a backup IP should the primary Intelligent Controller fail.
13)
Granted access through card reader controlled devices based on cardholder access level, access card facility codes, and access card number.
14)
Capability of collecting alarm input point status and card reader data, multiplexing the information, and transmitting that data back to the file server.
15)
Capability of receiving and executing instructions issued automatically from the ACS and ISOC and/or manually by operators via client workstation.
16)
An intelligent interface between card readers, card reader/keypads, and keypads and the host server utilizing distributed processing technology.
17)
Supervised alarm inputs to monitor the status of alarm circuits and report the status information to the ISOC host server.
18)
Control relay outputs for controlling devices by remote command from the client workstation, through time programming or on alarm point activation.
19)
Intrusion and door prop alarm detection for card reader controlled doors.
20)
20 percent spare alarm input points and output points on each RIM after all specified points are initially connected.
21)
Upon loss of communication with the host server, ISOC operation shall not be degraded, the Intelligent Controller shall contain enough RAM to operate normally and provide the following: a)
The Intelligent Controller shall be capable of storing all access control and alarms rules and shall be capable of operating all doors contact on board
b)
Storage of 100,000 card reader and/or keypad transactions and up to 100 events per potential alarm input, and transmission of that data to the file server as soon as communication is restored.
c)
ISOC operation shall not be degraded or adversely affected during the time that that stored data is being transmitted to the file server.
d)
The Intelligent Controller shall be capable of making all “decisions” on board with no need to communicate with the master host
22)
Upon verification of card authorization the Intelligent Controller shall activate a door control relay output and shunt the intrusion alarm. The door shall automatically relock upon closure.
23)
Transaction time for authorized cards shall be less than 0.5 seconds from the time of card read until the door unlocked.
24)
Independent time programmable control of alarm and control points as well as card reader inputs.
17910 - 14
Longitude ACS
Specification Document
DVTel, Inc.
www.dvtel.com 25)
b.
Reader Input Modules 1)
2)
c.
Single Reader Modules a)
12 VDC operation
b)
2-wire RS-485 communication
c)
Magnetic/Wiegand/Proximity & Keypad Support
d)
Two programmable inputs
e)
Two programmable relay outputs
Dual Reader Modules a)
12 VDC operation
b)
2-wire RS-485 communication
c)
Two Reader Support
d)
Eight programmable inputs
e)
Six programmable relay outputs
Input/Output Modules 1)
2)
F.
All control functions for devices directly connected to the Intelligent Controller (such as Alarm input and relay output, conditional auto-open, etc.) shall continue to function without connectivity to the host computer.
Input Modules a)
12 VDC operation
b)
2-wire RS-485 communication
c)
Sixteen programmable inputs
d)
Inputs support normally open, normally closed, supervised, and nonsupervised circuits
Output Modules a)
12 VDC operation
b)
2-wire RS-485 communication
c)
Sixteen programmable relay outputs
The ACS and ISOC Server and Workstation Requirements
Security Systems
17910 - 15
Longitude ACS
Specification Document
DVTel, Inc. 1.
www.dvtel.com ISOC Server Requirements a.
The server shall provide the following features and functions: 1)
Components specifically designed for high reliability, high availability file/Web server systems.
2)
Sufficient processing capability, memory and RAID-5 based storage capacity to accommodate the ISOC minimum capacities as per these specifications.
3)
Centralized storage, retrieval, and archive of all ISOC database and history information.
4)
Centralized control of operator access to the ISOC.
5)
Centralized means of downloading and uploading software and firmware updates to client workstations, Intelligent Controllers, and field devices.
6)
Connections with networks, client workstations, printers, and Intelligent Controllers
7)
Monitoring of communications between the ISOC and ACS server and Intelligent Controllers such that any loss of communication shall cause a supervisory alarm at the ACS, NVMS and/or the ISOC servers and client workstations.
8)
Automatic server recovery to full operation from a complete shutdown within 10 minutes. The servers shall be self-booting upon power restoration.
9)
Annunciation of component, communications, and power failure and supervisory alarms anywhere within the ACS and ISOC (also NVMS).
10)
Database record of all ISOC transactions for a minimum of 1,000,000 transactions. The ISOC shall have an automated system for backups. The ISOC shall have an overwrite feature in which disk space shall be reused in a FIFO manner.
11)
2.
Minimum Specifications a Monitor Color LCD and/or plasma flat panel. Reference Drawings. Dual Monitor – Provide video cards to support dual monitor b Monitor Support configuration. c Monitor resolution 1024 x 768. Intel Pentium 4 at 2.8 GHz. Provide latest technology d Processor available at time of bid. e Operating System Microsoft Windows XP Professional or Linux. f Keyboard Full size. g Memory One Gigabyte. h Drives Tape Backup. i OS Hard disk 40G Hard drive
Client Workstations a.
All operator interfaces with the system shall be through client workstations. 1)
Security Systems
Client workstations shall not be proprietary to the Contractor. The Owner shall be able to purchase additional client workstations from computer vendors other than the Contractor.
17910 - 16
Longitude ACS
Specification Document
DVTel, Inc.
www.dvtel.com 2)
Client workstations shall display the date, time, and number of alarms waiting at all times.
3)
Client workstations shall display and record the alarm messages including the time, date, location, point number, event type, and point status for each transaction.
4)
Minimum Specifications a Monitor Color LCD and/or plasma flat panel. Reference Drawings. Dual Monitor – Provide video cards to support dual monitor b Monitor Support configuration. c Monitor resolution 1024 x 768. Intel Pentium 4 at 2.8 GHz. Provide latest technology d Processor available at time of bid. e Operating System Microsoft Windows XP Professional. f Keyboard Full size. g Memory 512 Megabytes h Drives DVD R/W. i OS Hard disk 40G Hard drive
b.
The client workstation shall include the latest computer and component technology available when purchased. Provide processor, memory, hard disk, and other components as required to meet performance specifications.
c.
Badge Enrollment Workstation 1)
d.
a)
Capture cardholder images and signatures.
b)
Issue cardholder badges.
2)
Provide necessary video cards, cabling, power cords, and surge protection required for a complete installation.
3)
High-Resolution Digital Camera
4)
Signature Capture Pad
5)
Badge Printer
Report Printer 1)
Security Systems
The badge enrollment workstation shall provide the following additional functions:
The report printer shall provide a printed record of all or selected system transactions. a)
Connect and configure the report printer to allow access from any client workstation to print. The Owner may choose to restrict access from certain workstations to the report printer. Coordinate restrictions and final configuration with the Owner.
b)
The report printer shall be a high quality workgroup laser printer with a minimum duty cycle of 10,000 pages per month.
c)
The print speed shall be a minimum of 15 pages per minute (PPM).
17910 - 17
Longitude ACS
Specification Document
DVTel, Inc.
G.
www.dvtel.com d)
The printing resolution shall be a minimum of 600X600 DPI.
e)
The printer shall include two paper trays and shall support automatically printing to both letter and legal size paper without swapping trays.
f)
The report printer shall have a memory buffer as specified by the manufacturer to meet performance requirements as specified (16 megabytes minimum) to provide for efficient operation of the system.
Access Control Field Hardware Devices 1.
Proximity Access Card Readers a.
2.
4.
1)
The system shall support the use of a unidirectional proximity card reader. The card reader shall have read range of three to six inches. The reader shall be able to be mounted with its sides against metal door or window frames. The reader shall be powered by an external + 12VDC regulated power supply.
2)
Acceptable Manufacturers: HID iClass.
Proximity Access Cards a.
3.
Standard Proximity Cards:
The access card shall provide the following: 1)
HID iClass technology of ISO "credit card" size and thickness.
2)
Direct dye sublimation printing to the card.
3)
Non-proprietary bit pattern to a single contractor.
4)
Acceptable Manufacturers: HID iClass.
Electric Locking Mechanisms a.
A separate section will provide electric locking mechanisms and power transfer devices.
b.
Interface with electric locking mechanisms. Provide wire and connections between the ISOC, the power transfer device, and the electric locking mechanism.
c.
Provide fail-safe operation of electric locking mechanisms as required by local codes.
Request-to-Exit (REX) Motion Sensor a.
Minimum Specifications 1) Detection technology 2) Detection pattern 3) Output contact 4) Power requirements 5) Mounting
Security Systems
Passive Infrared. Adjustable to provide coverage of immediate door area. Normally open contact that closes momentarily (one second or less) when sensor is activated. 12-24 VDC. Surface mount to wall, ceiling, or door mullion.
17910 - 18
Longitude ACS
Specification Document
DVTel, Inc. 5.
www.dvtel.com Request-to-Exit (REX) Button a.
6.
Minimum Specifications 1) Button 1 1/2" mushroom 2) Color Red Normally open contact that closes momentarily when button is 3) Button contact pressed. 4) Graphics “EXIT” engraved on button or printed on button wall plate. 5) Mounting Flush mounted on a single gang plate.
Door Position Switches a.
Provide normally closed, single and double pole double throw, door position switches to monitor the open/closed status of doors.
b.
Concealed Door Position Switch 1) Minimum Specifications a) Gap 1/2 inch between the magnet and switch. b) Configuration Normally closed when the door is closed. c) Mounting One-inch diameter hole in door and frame.
7.
Door Release Button a.
Door release button shall operate as follows: 1)
When a door release button is pressed, the ISOC shall unlock the door and shunt the door position switch for a user programmable (1 to 60 seconds) time period. The ISOC shall unlock the door and shunt the door position switch no more than one second after the door release button is pressed.
2)
The ISOC shall record each use of a door release button in history.
3)
The door release button use shall not cause an alarm on the client workstation.
4)
The door release button shall not affect the request-to-exit device operation for doors with free egress hardware. Request-to-exit devices for doors with free egress hardware shall not unlock the door.
b.
Minimum Specifications 1) Actuation Momentary. 2) Output contacts Single pole, double throw. 3) Contact rating 5 Amps @ 24 VDC. Surface mount designed for mounting in knee space of desk or 4) Enclosure counter.
c.
Provide armored cable from the switch location to the associated junction box in order to conceal and protect the wire.
Security Systems
17910 - 19
Longitude ACS
Specification Document
DVTel, Inc. 8.
9.
www.dvtel.com Ceiling Mounted Motion Sensor a.
Provide intrusion detection motion sensors to detect persons within restricted areas.
b.
Minimum Specifications a) Detection technology b) Detection pattern c) Alarm output d) Power requirements e) Mounting
Combination passive infrared/ microwave. Three 360 degree fields. Normally closed and normally open contact. 10-13 VDC Ceiling mount
Power Supplies a. Provide power supplies for all ISOC equipment as per manufacturers specifications.
Security Systems
17910 - 20