Sie sind auf Seite 1von 16

Sheikh Khalifa Medical City

SECTION 281300 ACCESS CONTROL SYSTEM

PART 1 – GENERAL ................................................................................................ 2


1.1 SUMMARY .............................................................................................................................................. 2
1.2 SUBMITTALS .......................................................................................................................................... 3
1.3 SCOPE OF WORKS .............................................................................................................................. 3
1.4 COORDINATION .................................................................................................................................... 4
1.5 CLOSE OUT SUBMITTALS .................................................................................................................. 4
1.6 QUALITY ASSURANCE ........................................................................................................................ 5
1.7 PROJECT CONDITIONS ....................................................................................................................... 5
1.8 MANAGEMENT OF THE PROJECT .................................................................................................... 5
1.9 STANDARDS .......................................................................................................................................... 5

PART 2 – PRODUCTS ............................................................................................. 6


2.1 PRODUCT SELECTION ........................................................................................................................... 6
2.2 DESIGN CRITERIA .................................................................................................................................. 6
2.3 MATERIALS ............................................................................................................................................................... 8

PART 3 – EXECUTION........................................................................................... 14
3.1. EXAMINATION ....................................................................................................................................... 14
3.2. PREPARATION ...................................................................................................................................... 15
3.3. SITE QUALITY CONTROL ..................................................................................................................... 15
3.4. CLEANING AND ADJUSTING ................................................................................................................ 16
3.5. PROTECTION .........................................................................................................................................................16

Security Systems Specification 281300 / 1 ITS


Tender Documents 19/12/2012 ACCESS CONTROL SYSTEM
Sheikh Khalifa Medical City

SECTION 281300 - ACCESS CONTROL SYSTEM

PART 1 – GENERAL

1.1 SUMMARY

A. For normal SKMC daily work doors should be secured using electronic cylinders.

B. This requires the installation of a combination of Proximity Card Reader system, Keypad and Biometric
reader or an approved equal to apply changes easily for the hospital but allows the use of standard doors.

C. For high security areas (drugs, laboratories, server room, Pharmacy) keypad logs/biometrics should be
applied to prevent the misusage of stolen key cards.

D. The Access Control System shall be an integral system solution. The system shall provide a variety of
integral functions including but not limited to controlling vehicle barriers, doors, CCTV images (live and
recorded), and intercom system and provide identification credentials. This functionality will be provided via
a easy to use Graphical User Interface (GUI) and provide the system operators with a simple operating tool
that can control and monitor all security and associated systems.

E. The Access Control System shall consist of independent intelligent modules that provide controlled access
at nominated doors, barriers or rollers shutters (if any), through security control override, time schedules or
by authorized card. The security access system shall have the following functionalities, but not be limited to:
1. Access Control
2. Mustering.
3. Time and attendance.
4. Alarm Masking Groups.
5. Biometric identity verification equipment.
6. Credential creation and credential holder database and management.
7. Alarm Monitoring
8. Credential Management
9. Digital Video Management
10. Intrusion Detection Management
11. Asset Management
12. Visitor Management
13. Remote Access Level Management
14. Third-party Interfaces
15. System Administration
16. Mobile Enterprise Solutions
17. Badge Layout Creation
18. Screen/Forms Creation
19. Graphical Map Creation
20. Application Programming Interfaces
21. Data Import
22. Bi-Directional Data Exchange
23. API Development Toolkit
24. Server Redundancy

F. The system shall consist of fully integrated IP Access Control, alarm processing and photo badging system
capable of managing the entire SKMC. The cutting edge system must utilize IP addressable controllers, I/O
from power over Ethernet switches providing power for the readers and the locks.

G. The system shall provide clear graphical representation of the building layout, with dynamic icons that can
provide indication of the status of system devices.

Security Systems Specification 281300 / 2 ITS


Tender Documents 19/12/2012 ACCESS CONTROL SYSTEM
Sheikh Khalifa Medical City

1.2 SUBMITTALS

A. Product Data: For each type of the product indicated Include dimensions and data on features, performance,
electrical characteristics, rating and finishes

B. Shop drawings:
1. Detail equipment assemblies and indicate dimensions, weight, loads, required clearances, method of field
assembly, components and location & size of each field connection.
2. Functional Block diagram: Show single-Line interconnections between components for signal transmission
and control provide cable types and sizes.
3. Dimensioned plan and elevation of equipments rack, control panels and consoles. Provide access and
workspace requirement.
4. Provide wiring diagram for power, signal and control wiring.

C. Provide materials, equipment and services, and perform operations required for the installation &
commissioning of the complete and fully operational Access control systems as generally specified herein.

D. Design drawings, method statement, & bill of material shall be provided as part of a material submittal.

E. All system devices must be allowed to be easily replaced or upgraded

F. The vendor shall describe what methods are available to detect and repair system malfunctions

G. Equipments List: provide every piece of equipment by Model number, Manufacture, serial number, location and
date of original installation. Provide pre testing record of each piece of equipment ,listing name of person
testing ,date of test, set point of adjustments ,name and descriptions of the view of preset positions,
descriptions of alarms and description of unit output response to an alarm

H. Field quality-control reports required

1.3 SCOPE OF WORKS

A. The Security Scope of Works for SKMC is to include all necessary integration and interfaces to security sub-
systems.
B. This Technical Specification details the minimum requirements for both the operational and technical aspects of
the works, the design, supply, coordination, installation, engineering, programming, testing, commissioning,
documentation, maintenance and full warranty of the following items for this project. It shall also include all
equipment and associated services, as detailed in this document, shown and noted on the drawings 'or
listed within the schedules.
1. Security Management System.
2. Access Control System.
3. Security Intercom System.
4. Panic Alarm.
5. Security -Local Area Network (LAN).
6. Uninterruptible Power Supply (UPS) for security equipment.
7. Fibre Optic Equipment.
8. Fibre Optic Cabling.
9. All security AC/DC power reticulation and distribution boards not covered by the
Electrical Contractor.
10. Power supplies and enclosures.
11. All security services cabling.
12. Security consoles for Security Control Rooms.
13. Equipment racks.
14. Termination panels.
15. Lightning protection (including earth bonding).
16. Factory Acceptance Testing (FAT).
17. Interfacing and integration with other systems provided by others, (i.e. Fire, BMS,
Lift, and the like).
18. Testing, Commissioning and Training.
19. Defects liability works.
20. Manuals and drawings (English and Arabic language).
21. Software licenses.
22. Maintenance services and support.

Security Systems Specification 281300 / 3 ITS


Tender Documents 19/12/2012 ACCESS CONTROL SYSTEM
Sheikh Khalifa Medical City

C. The Security Contractor shall procure the systems, install all such technologies and
associated services to provide a fully operational Integrated Security System, which will
provide the integrated monitoring and control of systems, including remote monitoring
and control (if applicable).
D. Comprehensive method statements shall be submitted for approval and these statements
must clearly include all aspects of the installation.
E. All containment provisions shall be supplied and installed by the Security Contractor,
unless otherwise stated.
F. All systems shall support open protocols between 3rd party systems and products (e.g.
interface to lifts, BMS, etc.) to fully achieve the required functionality and performance.
G. Liaise with and co-ordinate all works to be provided by other Sub-Contractors.

1.4 COORDINATION

A. Although such works may not be specifically shown or specified, all supplementary miscellaneous items and
devices, which are incidental to or necessary for the complete operational installation, shall be included.
B. Where any architectural work is required to provide access for installation of the systems, associated services,
devices, and the Security Contractor shall request direction and be given approval from the Client and Security
Consultant prior to commencement of any such works.
C. Liaise with Main Contractor, MEP Contractor and other sub-contractors for all works:
1. To determine the exact and final location of services to be provided as part of the security services
installation.
2. To ensure the security installation works are completed in accordance with the Main Contractor's
construction works program.
3. To determine the location of devices to align with wall and ceiling mounted equipment while
maintaining the required coverage and operation of the device.
4. To ensure works and material by the Main Contractor and the other Services Sub- Contractors is
provided to enable the security systems to function correctly.
D. All necessary cast-in conduits, cut-outs, holes and mounting facilities to be part of the doors, door frames, door
hardware and the like, to facilitate the installation of hardware for monitored, electrically locked and accessed
controlled doors are to be provided. The Security Contractor shall liaise, co-ordinate and be responsible for
checking of all such provisions and where necessary, advise the Main Contractor of any defects associated
with these cast-in works.
E. Doors and door frames, including cable access to door frames, frame block outs and cut outs for mounting of
recessed security devices (door contacts, magnetic locks, power transfer links and the like).
F. Door furniture (i.e. door closers, mechanical locksets, handles, hinges, closers, strap bolts, emergency push
bars, keys and key cylinders, pad locks and keys).
G. Penetrations and cut-outs in modular furniture as required for the installation of security equipment and cabling.
H. The Security Contractor is to liaise with the Fire Contractor in order to integrate the security system with the fire
system. The Security Contractor is to ensure sufficient input and outputs are allowed for on the security system
to fully integrate with all fire alarm requirements.
I. The Security Contractor is to fully co-ordinate all works and programming with the Fire Contractor to provide a
complete, Code and Authority compliant system.

1.5 CLOSE OUT SUBMITTALS

A. As-Built Drawings: Prior to contract close-out, submit one copy of the system As-Built 'drawings and documents
to the Consultant for review. Submit two copies to the Project Managers
B. Cutover and Training: The subcontractor shall provide on-site support during and immediately after system
start-up. This will ensure quick response time to any issues that may arise. Training shall be provided to ensure
knowledge transfer regarding documentation, moves, adds and changes and related activity. The
subcontractor shall conduct a training session explain and orient the staff.
C. Operation and Maintenance Manuals
1. Prior to system acceptance and commissioning, submit three copies of the operation and
maintenance manuals to the Consultant for review.
2. This manual shall describe how to operate and maintain the systems.
3. These manual shall be targeted to be technically competent engineers to describe in full detail
these specific systems.
4. The manuals shall be bound. At acceptance testing, turn over soft copies of the manual to the
owner.
5. It is expected that user training shall be based on these manuals
6. List of spare part and replacement components recommended being stored at the site for ready
access.

Security Systems Specification 281300 / 4 ITS


Tender Documents 19/12/2012 ACCESS CONTROL SYSTEM
Sheikh Khalifa Medical City

D. Warranty
1. The manufacturer must guarantee to the End User that the products referenced within the specific
Warranty Modules when correctly installed in accordance with installation guidelines.
2. All components have to be produced by the same system manufacturer, unless by written approval
from the consultant.

1.6 QUALITY ASSURANCE

A. Installer Qualifications
1. Manufacture’s authorized representative who is trained and approved for installation of units
required for SKMC

B. Access Control systems integrator Qualifications:


1. The intent of these Specifications is to ensure the supply and installation of highly professional
systems & equipment belonging to the latest generation of technology only bids from highly
qualified companies shall be considered.
2. Vendors submitting a bid must have at least 5 years experience in installation of similar systems.
3. Submit sufficient qualification documentation and references with bid return.
4. Only companies having installed projects of similar size and type as requested for this project shall
be authorized to bid.
5. The system integrator is required to submit a prequalification document along with a support letter
from the vendors/manufacturers of the Access control system components.
6. This prequalification document should contain the following:
a) Vendor support letter.
b) Company profile.
c) Reference projects
d) Project organizational chart (clearly mentioning the man power)

1.7 PROJECT CONDITIONS

A. Environmental conditions: Capable of withstanding the following environment conditions without mechanical
or electrical damage or degradation of operating capability.
B. Exterior Environment: System components installed in locations exposed to weather shall be rated for
continues operations in ambient of 5 to 50 deg C. Comply with UL 295 and UL 639 for outdoor use
equipments. Rate of conditions operations when exposed to rain as specified in NEMA 250
C. Hazardous Environment: System components located in areas where fire or explosion hazards may exist
because of flammable gases or vapors, flammable liquids, combustible dust ,or ignitable fibers or flying shall
be rated ,listed and installed according to NFPA 70

1.8 MANAGEMENT OF THE PROJECT

A. The vendor will first make a site survey. This will allow him to propose a complete turnkey solution without
any additional costs for unforeseen labor. The installer will use the existing infrastructure.
B. To ensure the transparency of the installation and the maintenance of the Access control system, the vendor
has to ensure the project implements without any ambiguity.
C. Project Management
1. For the complete duration of the project the vendor will appoint a Project Manager, who will work on his
behalf. He will be the single point of contact to ensure a smooth co-ordination.
2. The vendor will appoint a Site Manager, who will be permanently present on site on behalf of the
vendor.
3. The Site Manager will report to the Project Manager, in order to ensure that the correct information is
communicated from the commencement of the project until the hand-over of the system to the client

1.9 STANDARDS

A. BS EN 50133-1:1997 Alarm Systems. Access control systems for use in security applications. System
requirements.
B. BS 4737:2006 Intruder & hold-up alarm systems. Management of false alarms. Code of practice.

Security Systems Specification 281300 / 5 ITS


Tender Documents 19/12/2012 ACCESS CONTROL SYSTEM
Sheikh Khalifa Medical City

PART 2 – PRODUCTS
2.1 PRODUCT SELECTION

A. Subject to compliance with operational and integration requirements .

2.2 DESIGN CRITERIA

A. Access control depends on the value of the stored goods and the security risk related to the area to be
secured.

B. The access control architecture must integrate the different kinds of locks and cameras into one single
security network.

C. High Security areas with biometrical access must be integrated in the same structure that controls the locks
in the offices doors, because the system is only as good as its weakest point.

D. The system must integrate different lock systems like digital cylinder locks, biometrical systems or card
transponder.

E. An electronic lock system is needed at the front doors as well as for internal access control.

F. The most critical doors (pharmacy, IT network, server rooms) are supplied with key pads and/or biometrical
systems.

G. Logging of all accepted and denied authentications is mandatory;

H. The SYSTEM shall support a two tier mature client/server architecture in which the central database server
performs all of the data processing. The clients shall be one of many types of client workstations including
administrative, alarm monitoring, access control, asset management, digital video management, visitor
management, intrusion detection management, or enrollment and badging client workstations. The client
workstation shall send all requests to the database server, which does all of the processing. The database
server then sends only the results of the request back to the client workstation. This minimizes network
traffic and ensures data integrity as a central database is performing all processing.

I. The functionality of the access control system will be provided via a Graphical User Interface (GUI) and
provide the system operators with a simple operating tool that when any alarm occurs, the operator shall be
notified immediately. The alarm can be accepted immediately or stored in a queue. Each alarm point can be
prioritized and shall have associated custom text and graphic, the text providing instruction to the operator
as to the actions to be taken.

J. The Access control system will be capable of monitoring for attempted unauthorized entry, forced door, door
ajar and other alarms and report these to the SMS for logging, alarm notification and further action including
fire release of security controlled doors. The access control system will also monitor all doors connected to
the system and also tamper alarms. The systems will also be integrated to the CCTV system to provide
verification of alarms all which will be managed from an integrated security control room.

K. System Network Requirements:


1. The Access Control System shall communicate with the Intelligent System
Controllers (ISC) or Main ACS controller by either RS-485 or RS-232 EIA standard or any internationally
proven standard.
2. The ACS shall have the ability to communicate with ISC's or Main ACS Controllers by LAN/WAN
connections utilizing TCPIIP communications protocol.

L. All access doors shall include field equipment like electric locks and Request-to-exit switch (where
applicable) to control and monitor the door at a remote location. In addition door contacts will be required.

M. The Access Control System shall operate using contact-less smart card technology for validation. Access
granted or denied decisions shall be performed in under 500 milliseconds. Details of card transactions and
reader status shall be transmitted from the reader to the central database server in real time.

Security Systems Specification 281300 / 6 ITS


Tender Documents 19/12/2012 ACCESS CONTROL SYSTEM
Sheikh Khalifa Medical City

N. The information may be used to generate on-screen or hard copy reports. In the event of the card reader
being unable to contact the host (i.e. the reader is offline), it will check the card number against its local
database. If access is granted the reader will release the lock. The reader will store each transaction in its
database and upload them to the host when communications are re-established. Up to min 50,000
transactions may be stored at the reader.

O. In the event of an alarm, the ACS shall report this status, to the SMS GUI operator workstations and
maintenance workstation via the security communications network.

P. The ACS shall allow the access and egress through all security controlled doors or barriers. This shall occur
by card readers, vehicle control readers, remote door control panels, by the SMS GUI operator workstations
and maintenance workstation to all access control devices and equipment, or a locally mounted door release
push button at the reception desks, or micro switch in the electric mortise lock.

Q. The Access Control system shall offer an alarms filtering option. This allows users to instruct the system to
discard certain alarm types from specified devices during allocated periods e.g. discard 'Door Forced / Lock
not engaged' alarms. These alarms can either be discarded completely (shunted), or can be recorded as
events in the central database (filtered).

R. The ACS shall record all movements and activities at each control point. All ACS shall be synchronized via a
Master Clock System by the SMS. System shall be designed with intelligent modules; Door Controller
Panels (DCPs) In the event of an SMS failure or security communications network failure, these intelligent
modules, DCPs shall remain stand-alone and shall not affect the operation of the ACS.

S. The ACS shall operate via the dedicated security mains supply and shall be source by secondary power
sources, namely UPS and battery back. All intelligent modules, DCPs shall be provided with battery back-up
to last a minimum of four (4) hours in the event of mains failure.

T. All ACS shall also allow for interfacing with other security systems and devices using Data control panels or
input/output (I/O) modules to record all systems activities and provide the necessary operator interface.

U. The ACS shall incorporate redundancy to the SMS Server and shall be installed in the main security
communication room. The SMS Server shall include the distribution and structure of the system database
and all relative functions and access. All ACS is required to operate on positive recognition, to allow
management to, at any time, define who is located within any selected areas, particularly under times of
crisis. Provide logs for all valid and invalid access throughout the building.

V. The Security Contractor shall install and recess all access readers adjacent to doors, adjacent to boom
gates within pedestrian access control barriers and co-ordinate all associated works with the appointed Door
contractor, MEP contractor and Main contractor.

W. Security Contractor shall undertake the programming of 'user' groups by sections, zones, as directed by the
Client and Security Consultant. The integration to other systems via high level interface to the Building
Management systems, Fire system, Car park system and the like, as directed by the Security Consultant.

X. All doors and access control barriers integrated to the Access Control systems shall meet the appropriate
access, egress, disable and emergency requirements as required by codes and authorities.

Y. The ACS system shall consist of the following main components at the locations as detailed in the drawings :
1. Card Readers
2. Access control Panel
3. Reader Interface modules
4. Input / Output Modules
5. Filed devices including locks ,door contacts, request-to-exit Switches, , etc
6. Servers and workstations
7. Software
8. Cards

Security Systems Specification 281300 / 7 ITS


Tender Documents 19/12/2012 ACCESS CONTROL SYSTEM
Sheikh Khalifa Medical City

Z. In general, the access will be controlled as follows:

1. Public Access Ground floor: main entrance to hospital, access consultancy,


2. VIP access: the access is free during the day and locked at night.
3. The personnel access is controlled Proximity or biometric reader.
4. The logistics will be provided with access to video phones or intercoms
5. Pedestrian access to the emergency room will be open day and night.
6. Access via the underground parking for VIPs or ambulances will be controlled by intercom.
7. All access will be under video surveillance.

2.3 MATERIALS

A. ACCESS CONTROL

1. The latest access control technology shall be used in the final system design which will provide the
monitoring and control of all of the equipment linked to the access database. The access control system
will not only act as a level of deterrent against crime but also as an audit and monitoring system.

2. The integrated approach to the access control system will ensure that the personnel within the Hospital
need only to carry one access token to access all authorized areas of the Hospital. The access control
system will be designed to operate from a central database and fully scalable to cope with the varying
demands for information and control imposed throughout the Hospital. It is intended that the card is
multi- identifying and multi-functional.

3. The Access Control System will consist of door modules that will be able to operate in an online or
offline state to provide controlled access at nominated doors or barriers, through security control
override, time schedules or by authorized credentials.

4. The access control will be able to communicate with all standard lock types
including:
a) Electric mortise locks
b) Magnetic locks
c) Certified high security surface mounted locks (associated with the high
security doors)
d) Electric strikes

B. SECURITY MANAGEMENT SYSTEM

1. The Security Management System (SMS) shall provide the alarm gathering,
monitoring, alarm inputs, control outputs, operator Graphical User Interface (GUI) I management to
integrate to the nominated Systems, equipment, and devices detailed further in this Technical
Specification specified.

2. The system shall be configurable to distinguish operations between the identified 'user' groups via
software segregation, to include partitioning of controls and monitoring for Security Services equipment
devices and equipment outlined.

C. ETHERNET ACCESS CONTROL PANEL

1 Intelligent System Controllers shall be microprocessor based hardware, equipped with RAM and Flash
memory (or other equivalent non-volatile memory) in order to maintain application program,
configuration data, resident data base, events log and transactions. All Intelligent System Controllers
shall be able to interface a local printer for logging, reporting and maintenance purposes.

2 Intelligent System Controllers shall ensure communication on LAN and WAN networks as well as point-
to-point communication on a dedicated or dial-up PSTN. The latter shall be configurable as an
alternative to LAN or a backup transmission media in the event of a failure of the LAN communication. If
redundant LAN communication is required, a dual Ethernet LAN interface shall be used. The Ethernet
Controller shall be capable of connecting directly to an Ethernet network. Use of external device such
as serial to Ethernet converters will not be allowed on this project.

Security Systems Specification 281300 / 8 ITS


Tender Documents 19/12/2012 ACCESS CONTROL SYSTEM
Sheikh Khalifa Medical City

3 The Ethernet Controller shall have an internal offline database. This shall permit up to min 197,000 card
records to be stored onboard in case of offline operation. The Access control panel shall be capable of
providing both alarm and access control functions. It shall have a high level of flexibility, comprehensive
system management and reporting facilities.

4 The Controller shall be designed to continually monitor all devices connected to the panels and
supervise all general inputs .The intelligent controller shall send device status information and accept
control commands from the SMS server.

5 A "shared" operation feature is required in order to increase system availability. Should the need arise
as a consequence of a failure, all Reader interface modules handled by a Field Controller should be
taken in charge from another pre-defined Field Controller connected to the same network. No hardware
switching should be performed and all the management should be based upon software functionalities
only. This feature shall be embedded in the Field Controller and selected simply setting proper
parameters during system configuration. Backup solutions requiring additional hardware (switches, etc.)
or cabling will not be acceptable.

6 Any input throughout the system shall be able to be interlocked with any other input or output through
software assignment of conditional logic.

7 The Controllers shall be capable of providing both alarm and access control functions. Data Control
Panels and Data Gathering Panels shall have a high level of flexibility, comprehensive system
management and reporting facilities.

8 The Controllers shall be designed to continually monitor all devices connected to the panels and
supervise all general inputs .The intelligent controller shall send device status information and accept
control commands from the SMS server.

9 Any input throughout the system shall be able to be interlocked with any other input or output through
software assignment of conditional logic. Each output shall consist of a single pole; double throw relay
contact with a rating of 1A minimum.

10 Unauthorized opening of any Data Control Panel enclosures shall activate a tamper alarm and shall be
displayed on all SMS GUI operator workstations and maintenance workstation, report to the nominated
system printer and updated to the history file.

11 The software shall have at least 100 access groups where by each access group contains a list of
control points to which a cardholder has authorized access. These access groups shall be enabled,
disabled, or changed, by time of day, with contingencies of the day of week, holidays, and object status.

12 It shall also be possible to use any card reader within multiple access groups (i.e. linked to more than
one access group) and across distribution of Controllers to facilitate access control of staff using
different floors of the building.
13 It shall also be possible to attribute a minimum of four (4) access groups to each access card.

14 Full system redundancy shall be built into the system to provide reliable operations at the equipment.
This includes the distribution and structure of the system database and all relative function and access
requirements.

15 Each individual card reader and access card shall be enabled or disabled via the SMS GUI operator
workstations and maintenance workstation using authorized password(s) to access those readers and
cards. This shall only occur through appropriately assigned access level of that password, by time or
zone control, or by time of day with contingencies for day of week, holidays, device status and
manually.

16 Controllers shall be future proof with a minimum 30% spare capacity to accommodate any new
requirement.

17 A minimum of 256 time schedules shall be programmed to provide full flexibility in the automatic locking
and unlocking of buildings as well as controlling all card users on combined time schedules and access
groups. Time schedules shall include holiday facilities with advanced programming of such events. All
schedules shall be defined by day, hours and minutes.

Security Systems Specification 281300 / 9 ITS


Tender Documents 19/12/2012 ACCESS CONTROL SYSTEM
Sheikh Khalifa Medical City

18 Systems programming, scheduling, access card validation, and other system set up shall be undertaken
from a nominated SMS GUI operator workstations and maintenance workstation.

19 Access to database information shall only be accessible by using the appropriate password. Information
which can be accessed, reviewed or modified shall be determined by the password entered and not the
SMS GUI operator workstations and maintenance workstation from which the operator logs onto the
system.

20 The central database server shall have a method of ensuring that, in the event of a server failure, a
secondary duplicate central database server will automatically take over. There shall be no system
down time as a result. The Access Control system shall support all currently available ID card
technologies. The systems may be single technology, or a combination of technologies.

21 The system shall be capable of programming any or all readers as an anti-pass back reader, as
directed by the Security Consultant. This function shall be programmable and accessible by authorized
persons only. The anti-pass back function shall be global across all readers such that zones can be
defined from the outer most ring of security (i.e. external perimeter doors / barriers to internal rooms
within a building). The number of zones within any other zone shall be limited to a number of three
however the number of zone groups within the total SMS shall be at least 50.

D. SMART CARD READERS

1. The Smart card reader shall be capable of connecting directly to an Intelligent Controller via door
interface modules. The card reader shall have an internal offline database.

2. The Security Contractor shall provide and install card readers as indicated below:

A. Card reader operation shall not be adversely affected by its mounting.

B. The Security Contractor shall supply and install appropriate isolation backing plate to maintain
integrity of card reader operation.

C. Card readers shall be secure and shall not compromise security if tampered.

D. There shall be both audible and visual indication on the card reader to indicate a valid card read.

E. When the system is fully loaded, the time elapsed from presentation of a card at the reader to
granting access, shall not exceed 1 second.

F. The ACS shall monitor each individual card reader to provide their status, number, location and
shall annunciate an alarm at the SMS if a reader is off-line or has failed to continue polling.

G. It shall not be possible to open the door by tampering with the reader or its wiring.

H. The card readers shall be securely mounted to prevent removal by force.

I. Power: Voltage 9 - 14Vdc.

J. Current Consumption: 200mA (passive), 320mA (peak).

K. IP Rating: IP65.

L. Temperature: -20° to 50°C (_4° to 122°F).

M. LED Indicators: 3 high intensity LED indicators red, amber and green.

N. LCD Indicators: 32 x 122 dots Monochrome Graphics super twist.

O. Analog inputs: 4

P. Outputs: 2

Q. Memory: 2 MB battery backed memory.

R. Database Battery Backup: 3.0V rechargeable Lithium-Ion.

Security Systems Specification 281300 / 10 ITS


Tender Documents 19/12/2012 ACCESS CONTROL SYSTEM
Sheikh Khalifa Medical City

S. Cardholders Storage: up to 219,000 cardholders at the door.

T. Transactions: Up to 50,000 transactions in offline.

3. Long range readers shall be utilized at the Gate barrier location at basement 01. The long range
readers shall have minimum read range of 2 to 5 m and shall be connected directly to the Ethernet
Controller via the reader modules. Each reader shall be capable to store transactions in case of offline
operation. These transactions shall be transferred to the central server once the network is restored. It
is preferred to utilize tags for the staff vehicles to provide an easy and quick access to their designated
car park.

4. When a card is read, the encoded information will be transmitted to the host controller where extensive
database checks will be made. On receipt of a valid response, the reader will switch power to the lock.
Any security violations (e.g. the door being held open) will be reported to the host.

5. The card reader will be capable of operating in a number of distinct modes. These include, but may not
be limited to:

A. DOOR MODE: - the reader controls a single door. In most cases there will be an exit reader / exit
read head or an egress button on the secure side.

B. TURNSTILE MODE: - a swipe on the master head allows the turnstile to turn in one direction and a
swipe on the exit head allows it to turn in the other direction.

C. CONTROL POST: - the reader just checks the validity of cards. In this mode the reader will not be
controlling a physical barrier.

D. PASSENGER MODE: - Allows a cardholder with 'special' permissions enabled to place a door in
the held position for a period exceeding the standard DOOR HELD OPEN time without generating
an alarm

E. CARDS

1. The cards shall provide the staff of the Hospital an authorized access and at the same time setting the
limits of entry. All staff shall have access to their section of the Hospital and the visitors shall be granted
with temporary cards for access.

2. The cards shall be a combination of Proxy card and RFID/smart card technology in a single ISO
standard thickness card. It shall be read/write compatible providing versatile interoperability in
applications such as access control, network log-on security, cashless vending, time and attendance,
event management and biometric identification.

3. The technology shall ensure high security with mutual authentication between card and reader,
encrypted data transfer, and 64-bit diversified keys for read/write capabilities. Securely separated files
enable multiple applications and support future growth.

4. It shall also feature graphics quality surface optimized for Photo ID printing, and shall be available in
standard PVC construction, or a composite polyester/PVC construction for more demanding high wear
and tear environments.

5. The security subcontractor shall liaise with the client and the manufacturer to supply the first 5000 dual
function smart access cards and assist in the production of the initial complete set of 2000 printed and
encoded access card passes.

A. Connection : ISO standard


B. Memory configuration: 2K bit, 16K bit or 32K bit
C. Operating Frequency: 13.46M Hz
D. Operating temperature: -400 to 700 C
E. Transaction time: < 100 ms typical
F. Multi application memory: 16k bit (2k Byte) card - 16 application areas

Security Systems Specification 281300 / 11 ITS


Tender Documents 19/12/2012 ACCESS CONTROL SYSTEM
Sheikh Khalifa Medical City

F. CENTRAL DATABASE SERVER

1. The Access Control central server shall run under a mission critical operating platform and shall be
redundant. In order to enhance system security, the central server shall maintain a full audit log of every
change made to the database. This log will consist of details of any database changes and when they
were made plus the user name of the person who logged into the toolbar to make those changes. This
data will be stored in flat files on hard disk and will not be removed unless it has been archived at least
twice. A basic search tool will be provided to allow the user to examine these files.

2. The Central Database Server shall carry out the following core tasks:
A. Record cardholder personal and access information.
B. Control card verification (i.e. the recording of cards on the system).
C. Control data flow to the Ethernet Reader Controllers - card and configuration information.
D. Provide automatic updates of Smart Card Readers and field device changes, so that the system is
continually updated.
E. Pass alarm and status information to an Alarm and Event Display computer.
F. Allow changes to system parameters.
G. Back up transaction, alarm and database audit files to removable storage media.
H. Issue broadcast messages to the Readers

3. The servers shall meet the following minimum requirement:


A. Hardware: RAID 1 SCSI disk array Minimum 150GB usable
B. Processor: Intel Pentium 4 G Hz or equivalent
C. Operating System: Windows 7 professional
D. Ethernet Network adaptors: Minimum 2
E. Disk drives: DVD R!W
F. LCD screen size: 21inch
G. PCI slots : Min 3

4. The servers shall be rack mountable with ventilation fans and internal redundant power supplies.

NOTE: In addition to the above minimum requirement, all servers shall be of the latest
technology currently available at the time of procurement. The specification for the ACS Central Database Server
shall be approved by the Client Representative/Consultant.

G. SYSTEM WORKSTATION

1. The Access Control system shall be accessible by multiple workstations running the 'front end' software,
connected over a local/wide area network. The workstation will be the main interface for the Access
Control operator or administrator. The main system administration will be carried out at a workstation
using the custom-built suite of applications. This administration shall include, but is not limited to:
A. Adding / Updating Personnel Records
B. Issuing cards
C. Defining Access levels
D. Defining Time Zones and Holidays
E. Adding / Configuring hardware units

2. The number of workstations on the Access Control system shall be unlimited, subject to sufficient
licenses being in place.
A. LCD screen size: 2linch as indicated on the drawings
B. Processor: Shall be the latest version available at the time of procurement.
C. Operating System: Microsoft Windows XP professional
D. Keyboard: Full size
E. Memory: 1024 Megabyte min
F. Hard disk size: 120GB HDD min
G. Disk drives: DVD RIW

NOTE: In addition to the above minimum requirement, all system workstation shall be of the latest
technology currently available at the time of procurement. The specification for the ACS Central Database
Server shall be approved by the Client Representative.

Security Systems Specification 281300 / 12 ITS


Tender Documents 19/12/2012 ACCESS CONTROL SYSTEM
Sheikh Khalifa Medical City

H. PHOTO BADGING SYSTEM

1. It shall be possible to capture portraits and signatures for all cardholders and then create photo
identification badges using these images.

2. Image capture and printing of photo identification badges must be fully integrated into the system and
must use the same database. Any system, which uses a separate photo badging system or separate
database, will not be acceptable

3. Capture devices must include Video Capture cards, Digital Cameras, scanners and signature tablets
and capture facilities must support the MCI, TWAIN or WinTab standards for image capture. Devices
may be connected directly via PC boards or through serial or USB ports. If using a Video Capture card
for image capture, a live preview facility must be provided. Import and export facilities for images shall
also be available.

4. The SMS system must provide a tool for the creation of photo badging card layouts. This must allow the
incorporation of standard display creation facilities such as image import, a variety of fonts and text
effects, a variety of tools for drawing objects and a facility for linking to the cardholder database and any
user fields within this. This tool shall be the same tool as used for the creation of custom graphics in the
SMS system so as to reduce training and maintenance requirements for the system.

5. In addition, it shall also be possible to incorporate bar codes and automatic magnetic stripe encoding
facilities into the photo badging system.

6. The color photo card printer shall meet the following specifications:
A. Print Material: Able to print on PVC and/or PET card material
B. Print Method: Dye-sublimation re-transfers.
C. Ink Ribbon: Transfer films.
D. Resolution: 300 dpi.
E. Colour: 30 seconds with all colours (Y,M,C,IK and overlay).
F. Print Width: 56.8mm.
G. Print Length: 85.5mm.
H. Card Width: 53mm to 67mm.
I. Card Length: 82mm to 98mm.
J. Card Thickness: 0.254mm to 1.5mm.
K. Print Buffer: 2MB RAM.

I. SECURITY MANAGEMENT SYSTEM

1. The entire Security System for the SKMC shall be controlled and monitored from a single point, Security
Management System.

2. The system is to be based on a current microprocessor based system and conform to the following:

A. True multi-user / multi-tasking operating system with enough core memory to store and manage all
operational and application programs, complete with a minimum of three months' historical data of
systems activity
B. All communication between the server / workstations, controllers, and other hardware shall be via
the Security Management System.
C. A flexible and modular design shall provide ease of installation, robustness, reliability, and
expansion.
D. A distributed Architecture shall allow field controllers to operate independently of the host. All key
access decisions, event/action processing, and alarm monitoring functions will be performed within
the relevant controller.
E. Proprietary software programs and control logic information used to control system hardware shall
be stored in read-only memory.
F. Upgrades to the hardware and software must occur without the loss of database configurations, or
historical report data.
G. The system will include high level interfacing allowing the capability of monitoring and controlling
other sub systems.

3. All necessary software license fees and registration costs (including all client workstation licenses) will
be included as part of the tender price. The Security Management System (SMS) shall be designed with
dual redundant SMS Servers with remote multi-server microprocessor controlled system based on
distributed intelligent module network.

Security Systems Specification 281300 / 13 ITS


Tender Documents 19/12/2012 ACCESS CONTROL SYSTEM
Sheikh Khalifa Medical City

J. AUDIO INTERCOM SYSTEM

1. Audi Intercom system shall meet the following specifications

A. IP Network compatible Server less system.


B. System configuration by intuitive software through LAN
C. Integration with access control system.
D. Ambient noise control
E. Consist of exchange unit, Interface unit and dedicated stations.
F. Mountable in EIA standard rack (1U Size)
G. Echo canceller function for easy hands free full duplex conversation between stations.
H. High quality audio frequencies up to 7Khz for clarity

2. Audio Intercom system IDF exchange shall meet the following specifications

A. IP Network intercom Exchange


B. 10/100 base –TX Ethernet network configuration
C. 16 stations capacity
D. Station connect to exchange via twisted pair cable
E. 4 internal/8 external speech links
F. 2 audio paging outputs
G. 2 relay outputs

3. Master station shall meet the following specifications

A. The station shall have a LCD display


B. Hands free or handset conversation
C. Auto dialer function
D. Headset terminal
E. External speaker terminal
F. High quality sound
G. Powered by POE switching

4. Door station shall meet the following specification

A. IP door station
B. Flush mount
C. Network connection
D. Powered by POE switching
E. High quality sound
F. Full Duplex communication
G. Vandal proof
H. Heavy duty stainless steel face plate
I. Weather resistant for Outdoor use –Parking entrances.

PART 3 – EXECUTION

3.1. EXAMINATION

A. Examine substrates, areas, and conditions, with Installer present, for compliance with requirements for
installation tolerances and other conditions affecting performance of access security.

1. Examine roughing-in for embedded and built-in anchors to verify actual locations of Access Control
connections before Access Control installation.

2. For the record, prepare written report, endorsed by Installer, listing conditions
detrimental to performance of perimeter security.

Security Systems Specification 281300 / 14 ITS


Tender Documents 19/12/2012 ACCESS CONTROL SYSTEM
Sheikh Khalifa Medical City

B. Inspect built-in and cast-in anchor installations, before installing perimeter security, to verify anchor
installations comply with requirements. Prepare inspection reports.

1. Remove and replace anchors where inspections indicate that they do not comply with requirements.
Re-inspect after repairs or replacements are made.

2. Perform additional inspections to determine compliance of replaced or additional anchor installations.


Prepare inspection reports.

C. Examine pathway elements intended for cables. Check raceways and other elements for compliance with
space allocations, installation tolerance, hazards to access control installation, and other conditions
affecting installation.

D. Examine roughing-in for LAN, WAN, and IP network before device installation.

E. Proceed with installation only after unsatisfactory conditions have been corrected.

3.2. PREPARATION

A. Obtain detailed Project planning forms from manufacturer of access-control system; develop custom forms
to suit Project. Fill in all data available from Project plans and specifications and publish as Project planning
documents for review and approval.
1. Record setup data for control station and workstations.
2. For each Location, record setup of Controller features and access requirements.
3. Propose start and stop times for time zones and holidays, and match up access levels for doors.
4. Set up groups, facility codes, linking, and list inputs and outputs for each Controller.
5. Assign action message names and compose messages.
6. Develop user-defined fields.
7. Develop screen layout formats.
8. Propose setups for guard tours and key control.
9. Discuss badge layout options; design badges.
10. Complete system diagnostics and operation verification.
11. Prepare a specific plan for system testing, startup, and demonstration.
12. Develop acceptance test concept and, on approval, develop specifics of the test.
13. Develop cable and asset management system details; input data from construction documents. Include
system schematics and Visio Technical Drawings.

B. In meetings with Engineer and Owner, present Project planning documents and review, adjust, and prepare
final setup documents. Use final documents to set up system software.

3.3. SITE QUALITY CONTROL

A. Manufacturer's Field Service: Engage a factory-authorized service representative to inspect, test, and adjust
field-assembled components and equipment installation, including connections. Report results in writing.

B. Testing Agency: a qualified testing and inspecting agency to perform field tests and inspections and
prepare test reports:

C. Perform the following field tests and inspections and prepare test reports:

1. LAN Cable Procedures: Inspect for physical damage and test each conductor signal path for continuity
and shorts. Use Class 2, bidirectional, Category 5 tester. Test for faulty connectors, splices, and
terminations. Test according to TIAlEIA-568-1, "Commercial Building Telecommunications Cabling
Standards - Part 1 General Requirements." Link performance for FTP cables must comply with
minimum criteria in TIAlEIA-568-B.
2. Test each circuit and component of each system. Tests shall include, but are not limited to,
measurements of power supply output under maximum load, signal loop resistance, and leakage to
ground where applicable. System components with battery backup shall be operated on battery power
for a period of not less than 10 percent of the calculated battery operating time. Provide special
equipment and software if testing requires special or dedicated equipment.
3. Operational Test: After installation of cables and connectors, demonstrate product capability and
compliance with requirements. Test each signal path for end-to-end performance from each end of all
pairs installed. Remove temporary connections when tests have been satisfactorily completed.

Security Systems Specification 281300 / 15 ITS


Tender Documents 19/12/2012 ACCESS CONTROL SYSTEM
Sheikh Khalifa Medical City

D. Remove and replace malfunctioning devices and circuits and retest as specified above.

3.4. CLEANING AND ADJUSTING

A. It shall be the responsibility of the contractor to keep their work area clear of debris and clean area daily at
completion of work.

B. It shall be the responsibility of the contractor to patch and paint any wall or surface that has been disturbed
by the execution of this work

3.5. PROTECTION

A. Contractor shall protect network devices during unpacking and installation by wearing manufacturer
approved ESD wrist straps tied to chassis ground. The wrist strap shall meet OSHA requirements for
prevention of electrical shock, should technician come in contact with high voltage.

B. Make certain that all network control equipment is accessible for service. Contractor shall notify specifying
authority if designated equipment closet does not meet manufacturer's requirements for heat, radiation or
static electricity.

C. Care should be taken to connect power supply common mode lines when DC current can flow.

D. Large separation between controllers and power supplies should be connected by fiber optic cable to reduce
common mode power supply Issues.

END OF SECTION

Security Systems Specification 281300 / 16 ITS


Tender Documents 19/12/2012 ACCESS CONTROL SYSTEM

Das könnte Ihnen auch gefallen