Loading...
HomeMy WebLinkAbout28 1000 EACS_Technical Guideline Specs_2024-07-12Tarrant County College District 2024-08-09 Technical Guideline Specification Electronic Security Systems Page 1 EACIDS SYSTEM 28 1000-1 SECTION 28 1000 ELECTRONIC ACCESS CONTROL AND INTRUSION DETECTION SYSTEM (EACIDS) PART 1 - GENERAL 1.01 DESCRIPTION A. General Description: This specification section covers the furnishing and installation of a new Electronic Access Control and Intrusion Detection System (EACIDS) and modifications to existing door hardware. B. Furnish and install electric security hardware devices, mounting brackets, power supplies, switches, equipment cabinets, controls, consoles, and other components of the system as shown and specified. C. Furnish and install outlets, junction boxes, pull boxes, conduit, connectors, wiring, and other accessories necessary to complete the system installation. Requirements shall be in accordance with Division 26 Electrical. D. Provide pre-testing and acceptance testing of equipment, programming, wiring and installation. 1.02 RELATED WORK A. Provide the work in accordance with Section 28 0000, Security General Requirements. B. Door Hardware 1. Security Door Requirements: The Contractor shall be responsible for surveying each security door shown on the drawings before installation, and reviewing the door hardware configuration and installation conditions with respect to the specified functions. The Contractor shall verify the compatibility and completeness of the proposed hardware and its installation, submit detailed drawings showing the proposed modifications and installation, and provide all equipment and services required to achieve the specified electrical and mechanical performance. Coordinate acceptable door hardware and installation techniques with TCCD’s Electronic Security Department Manager. 2. Doors and Door Hardware: Door hardware and installation shall comply in all respects with the requirements of Public Law 101-336, Americans with Disabilities Act 3. {Use items 3 thru 6 for new construction. Coordinate with TCCD, the architect and door hardware specifier to ensure these items are coordinated and specified in each section correctly.} Door Position Switches, electric transfer hinges, and electrified locking hardware shall be furnished and installed under Section 08 7100 Door Hardware. Section 08 7100 shall be responsible for connection of electric locking hardware to electric transfer hinges and for verifying proper operation and adjustment of locking hardware when power is applied. Electrical connection for 120 VAC and connection from power booster to electric transfer hinge shall be under Division 26. This section shall be responsible for connection of EACIDS inputs and outputs to door position switch leads, electric transfer hinge leads, and power booster input. 4. Electrified locks shall be mechanically keyed, to permit manual locking/unlocking, in an emergency. Mechanical operation shall not override door monitoring functions. 5. All electrified locks shall be configured as fail-secure, i.e.: the lock shall unlock only when powered. Coordinate the selected hardware with TCCD Electronic Security Department to assure its suitability for the purpose intended. 6. Fire Alarm Interface: Electrified locks, strikes and delayed exiting panic hardware, which are part of this work and which are locked in the path of legal exiting, shall be connected to the building Fire Alarm System in accordance with local Fire Marshall requirements such that they automatically unlock in the event of activation of the Fire Alarm System. This shall occur whether the activation is a result of a manual pull station, smoke detector or sprinkler flow switch. a. A fire alarm "general/common alarm relay" shall be programmed at the fire alarm control panel to activate the EACIDS interface relays located in each Lock Power Supply cabinet. The Security Contractor shall research and provide all necessary fire alarm system conduit, wire, hardware, and programming to perform the required interface. b. This interface shall not depend on the EACIDS System Server or Remote Controllers for its operation. Locate these interface relays electrically ahead of lock power distribution as shown on the drawings. The Contractor shall supply and install programmed alarm interface relay(s) with sufficient capacity to control the power supplied to all controlled locks 1.03 SHOP DRAWINGS & EQUIPMENT SUBMITTAL A. Provide for materials proposed manufacturer’s product data in accordance with Section 28 0000, Security General Requirements and Division 01. 1.04 OPERATIONS AND MAINTENANCE MANUALS A. Provide the Operations and Maintenance Manuals in accordance with Section 28 0000, Security General Requirements and Division 01. 1.05 WARRANTY A. Provide the work in accordance with Section 28 0000, Security General Requirements and Division 01. 1.06 TRAINING A. Provide the work in accordance with Section 28 0000, Security General Requirements and Division 01. 1.07 EQUIPMENT COMPATIBILITY REQUIREMENTS A. Provide the work in accordance with Section 28 0000, Security General Requirements. 1.08 TECHNICAL REQUIREMENTS, ELECTRONIC ACCESS CONTOL SYSTEM (EACIDS) A. Purpose: The Electronic Access Control System is designed to monitor and restrict access to specified areas, and to report on the activity and violations of restricted access in those areas. B. Existing System: 1. TCCD has an existing Lenel system with On Guard software operating system managing the EACIDS. The current version is 8.2. The contractor shall confirm the version at the beginning of the project. C. Environment: 1. The system shall be wholly contained within {Enter areas where equipment will be installed}. Additional work will be required at IDF Rooms as designated on the drawings. Video headend equipment and UPS shall be installed in the {If any servers for storage are required for the project enter room where they will be installed}. Refer to the drawings and Bid Instructions to determine the scope limitations for this phase of work. 2. Primary Monitoring Post: The primary monitoring for the campus is in the Security Monitoring Center at the Trinity River campus. 3. Secondary Monitoring Posts: Secondary monitoring is located in the PD Dispatch Center at the Trinity River Campus Emergency Operations Center. 4. Infrastructure and Connectivity: a. Network communications between controllers and the access control server shall be over the TCCD LAN/WAN and connections shall be coordinated with the TCCD IT. Refer to specification section 28 0000 for secure communications. b. The Contractor shall coordinate with TCCD IT to provide IP address and routing from network switch termination to the management server in the Trinity River data center. D. EACIDS Software Functionality 1. General: The system shall be capable of providing all the functionality inherent in the Lenel OnGuard software. The following items shall be implemented for this project. 2. {{Delete this section if there are no elevators as part of the project}} Elevator Control: The EACIDS application software shall be capable of supporting this feature as an integral part of the EACIDS. Control of the elevators on a floor-by-floor basis shall be required for this project. a. The EACIDS shall provide elevator control using standard access control field hardware that will permit the restriction of cardholder access to certain floors while also allowing general access to other floors. Each elevator card reader shall control access for each floor of the building. b. The EACIDS shall be able to track which floor was selected by an individual cardholder for auditing and reporting purposes. 3. Alarms a. Pre-Alarm: The EACIDS shall support a pre-alarm feature at the card reader. Configure the system such that a pre-alarm will sound a tone at the card reader prior to the door held open alarm. b. Alarm/Event Logging 1) Alarms and events in the EACIDS shall by default always be recorded in the database. The EACIDS shall give System Administrators the ability to select on a time zone basis, the times that they require the EACIDS to log specific events to the database. 2) System Administrators shall have the option for Alarm/Events to be set to log or not to log alarms/events on any individual reader and or input. c. Monitor Zones 1) The EACIDS shall provide System Administrators the ability to segment the EACIDS field hardware devices into various zones or areas where Alarm Monitoring client workstations will monitor. These zones shall be assigned an alphanumeric name using up to 128 characters. d. Alarm/Event Routing 1) The EACIDS shall be capable of allowing System Administrators to route alarms and events to various Alarm Monitoring client workstations on the network or to specific Users based on their login credentials. The EACIDS shall allow any alarm or event to be routed to one or multiple client workstations on the network regardless of where the alarm is generated in the field. Alarms shall be routed to client workstations on a device-by-device level. 2) The EACIDS shall implement network synchronization that in the event alarm/event is routed to multiple client workstations, once the first client workstation ‘grabs’ the alarm, the alarm/event shall be cleared from other client workstations. As such, alarms that are routed to an Alarm Monitoring client workstation which does not have a System Operator logged in shall be queued so that unacknowledged alarms will report to that client workstation once a System Operator has logged into the EACIDS. Alarms/Events shall be routed based on default settings or time zone control. 3) Alarm events from {{Building Name}} shall report to the security workstations located in the Trinity River Campus Monitoring Center and PD Dispatch Center. Coordination with the TCCD and Police Department for alarm names shall be required. e. Text Instructions: The EACIDS shall allow for a set of text instructions to be associated with each alarm that arrives into the EACIDS. The text instruction function shall allow the System Administrator to enter a minimum of 32,000 characters of text for procedures to follow for each alarm that arrives at the Alarm Monitoring client workstations. Each alarm or event in the EACIDS shall have its own unique set of text instructions should the System Administrator desire. f. Alarm-Event Mappings: The EACIDS attributes in Alarm Attributes shall be assignable on a ‘global’ basis to devices that share an alarm description. Thus, the ‘door forced open’ alarm attributes shall apply to any door with a card reader that is forced opened. The EACIDS shall have the capability to assign a unique group of alarm attributes to specific device/alarm combinations to override the global settings for specific case settings. For example, System Administrators may assign a different set of attributes to be applied to a ‘door forced open’ at a vehicle gate than they would if the front door to a building was forced open. The EACIDS must include this type of flexibility. Each device/alarm combination shall have the ability to have its own unique attribute set if the System Administrator desires. 4. Access Control a. Multiple Card Formats: The EACIDS shall support an unlimited number of card formats. Magnetic stripe, RFID, contactless smart card, and contact smart card formats shall be supported. Each Controller shall support a minimum of eight (8) access control card formats and if applicable, eight (8) asset formats. As such, each card reader shall also be able to support a minimum of eight (8) access control card formats. If applicable, asset readers shall be able to support a minimum of eight (8) access control card formats and eight (8) asset management card formats. In addition, the EACIDS shall support the following: 1) Any industry standard Wiegand card format. 2) Any industry standard 125 KHz and 13.56 MHz card technology. 3) Bi-directional RS-485 Open Supervised Device Protocol (OSDP) readers. 4) Desfire EV3 readers and card formats. 5) Mobile Credentials. The system shall support Bluetooth and NFC mobile credentials on Android and Apple phones. 5. {{Delete this section if visitor management is not required for this project}} Visitor Management: The system shall support an optional, embedded Visitor Management feature. The Visitor Management feature shall be implemented for this project. The system shall support the creation and management of visitor appointments. The Visitor Management feature shall serve as a replacement for paper-based visitor log books and shall support the organization and tracking of visitors. The Visitor Management feature shall support the following features: a. Keep track of visits (and Visitors) in progress b. Single-/multi-visitor group appointment scheduling c. Temporary credential issuance d. Visitor check-in/check-out e. Identify which workstation a visitor was checked in at f. Visit Templates g. Visit Sites h. e-mail notification of visitor arrivals i. Manage unplanned visits and anonymous visitors j. Manage the return of credentials and the end of a visit k. Configure Instructions for the visit l. Configure personnel as visit hosts m. The capability to check-in and check-out visitors by presenting a valid card at a designated reader. n. The ability to scan a license or a passport when adding a new visitor. Each field associated with a license or passport can be individually selected for import. o. Run reports and queries on both scheduled or completed visits p. Identify visitors on a Watchlist and activate events when a watch-listed visitor is checked in or added to a visit. E. Controllers 1. The Controller shall link the EACIDS Software to all “down-stream” field hardware components. The Controller shall provide full distributed processing of access control and alarm monitoring rules and operations. A fully loaded and configured Controller with shall respond in less than one-half (0.5) second to grant or deny access to cardholder. a. Contractor shall not daisy chain boards to one another. b. There shall be a max of 2 card readers per intelligent controller. 2. The Controller shall continue to function normally (stand-alone) in the event that it loses communication with the EACIDS software. While in this off-line state, the Controller shall make access granted/denied decisions and maintain a log of the events that have occurred. Events shall be stored in local memory, and then uploaded automatically to the EACIDS database after communication has been restored. 3. In addition, the Controller shall incorporate the following features: a. UL 294, UL1076, ULC, and CE Certified b. Support for Direct Connect, Remote Dial Up, or Local Area Network (LAN) Connection c. Support for Dual Path Host Communications - Secondary Path shall be Direct Connect, Local Area Network (LAN) Connection, or Remote Dial-up Connection. 1) First data drop shall be to the intelligent controller. 2) Second data drop shall be for power monitoring. d. Support for up to 2GB of On-Board Memory e. LAN Support shall utilize RJ45 (10/100baseT) Ethernet Interface f. Flash Memory for real time program updates and overall host communications g. Support for four 2-wire downstream ports, two 4-wire downstream ports, or combination one 4-wire downstream port and two 2-wire downstream ports. Downstream ports shall be for connecting card readers and data gathering and output control panels via RS-485 multi-drop wiring configuration h. Memory storage of up to 120,000 cardholders i. Initial base memory download between Controller with standard memory from the EACIDS shall require no more than ten (10) seconds j. Support for up to 32 devices consisting of relay, input, and output modules, in any combination desired, with a maximum of 16 AIM/OCM devices per Controller k. Support of multiple card technologies l. Supervised Communications between Controller and EACIDS Software m. AES 256-bit Symmetrical Block Encryption conforming to the FIPS-197 standard between Controller and EACIDS Software communications driver. n. Multi – drop support for up to eight Controllers per EACIDS communications port o. Support of up to eight card formats and facility codes p. Support for SEIWG and FIPS 201-compliant card formats q. RS-485 Full Duplex, UL 1076 Grade AA communication channel to the EACIDS head-end r. Integration to other manufacturer’s card readers s. 32-bit Microprocessor t. A Controller downstream serial port shall multi-drop 16 access control field hardware devices using an RS-485 UL 1076 Grade A communication format allowing a distance of 4,000 feet using Belden 9842 cable or equivalent u. 12 VAC or 12 VDC input power v. Issue Code Support for both Magnetic and Wiegand Card Formats w. Individual Shunt Times (ADA Requirement) x. Up to Nine Digit PIN Codes y. Downstream serial RS-232 device support z. Status LEDs for normal component and communication status PART 2 - PRODUCTS 2.01 PRODUCT ACCEPTABILITY A. The Products section contains lists of acceptable products. If product substitutions are proposed, they must be made based upon a comparison of equivalence to the product specified. Considerations may include but shall not be limited to functional, physical, aesthetic and/or interface aspects. TCCD Electronic Security Department shall be the sole judge of whether or not a submitted substitution is deemed to be "equivalent" to that specified. B. Software Licenses: The contractor shall provide all licensing required to provide a completely operation al system as described herein and shown on the plan drawings whether specifically specified within or implied based of system attributes and functions. 2.02 ELECTRONIC ACCESS CONTROL EQUIPMENT A. System: Lenel OnGuard, no acceptable equal. B. Server and Software: Server and software are existing. The contractor shall verify the current version of software and verify the number of readers being added as part of the project is within the reader capacity of the software. C. Workstations: Client workstations are located as shown on the plan drawings. Where new workstations are required, TCCD will provide the workstation computer and the Contractor shall be responsible for providing licenses to allow the client workstation to operate. The contractor shall also load the client software on the workstation and configure the software to communicate with the server. Coordinate with TCCD. D. System Controller Panels: Provide sufficient controllers and input/output boards to meet all requirements of specifications. 1. EACIDS Controller: Where new controllers are required provide the following; a. Provide Lenel Model LNL-X2220 network controller as required for the application, compatible with the EACIDS application software, with a minimum 30,000 card record capacity, power supply, battery standby, and Communications Module, as described herein. b. Optional Intelligent Controllers: Option controllers may be used based on the design intent. Coordinate with TCCD where optional Intelligent Controllers are recommended. 1) Lenel Model LNL-X2210 2) Lenel Model LNL-X3300 3) Lenel Model LNL-X4420 c. Contractor shall review drawings and specifications with the TCCD Access Control Manager, and may propose changes to the topology of the system based on device layout, where such changes improve performance or functionality of the system. TCCD has final authority as to the final approach for system topology. 2. Controller Modules: Provide reader, input and output control capacity at each controller location, to meet the requirements of the site configuration. Provide access control reader boards (ACB), alarm input boards (AIM), and output control boards (OCB) as required to control the devices connected at each location. a. ACB Single Reader: Lenel Model LNL-1300 Series 3 b. ACB Dual Reader: Lenel Model LNL-1320 Series 3 c. AIM: Lenel Model LNL-1100 Series 3 d. OCB: Lenel Model LNL-1200 Series 3 3. Controller Connectivity a. Controllers shall support connection to the security LAN/WAN using TCP/IP protocol, and shall also support connection to the manufacturer’s standard data communications protocol (RS-232, RS-485, or RS-422). b. The controllers shall be configured to communicate with card readers using OSDP V2 protocol 4. Controller Power Supply: Provide manufacturer recommended power supply based on panel configuration. Refer to STC requirements for additional information regarding power supplies. 5. Controller Modules: Provide reader, input and output control capacity at each controller location, to meet the requirements of the site configuration. Provide access control reader boards (ACB), input boards (AIM), and output boards (OCB) as required to control the devices connected at each location. 6. Controllers and modules shall be mounted within a Security Terminal Cabinet (STC). Cabinet shall be suitable for the environment in which it is installed, as recommended by the manufacturer and required by the specifications. 7. Security terminal cabinets manufactured by LifeSafety Power that include all power requirements for controllers and locks with space for Mercury panels are required. E. Access Control Readers: Provide multiclass 125 KHz Proximity (RFID) / 13.56 MHz smartcard readers as shown on the drawings. Access control readers shall be configured to read the TCCD existing access credentials. Coordinate with TCCD to verify the current credential technology. Readers shall be "single-package" type, combining controller, electronics and antenna in one package, in the following configurations: 1. Provide “single-gang” mounting style smart card proximity readers for wall mounting, Vehicle Stanchions and Pedestals, as shown on plans. 2. The reader shall have an approximate read range of 2.2” when used with the compatible access card. 3. The readers shall support OSDP V2 protocol and shall be connected to the controllers using the OSDP V2 protocol. 4. The reader shall be compatible with NFC and Bluetooth-enabled mobile devices. 5. The reader shall be UL746CFL outdoor rated 6. The reader shall be UL 294 listed, and shall be FCC certified. 7. The reader shall have a lifetime warranty. 8. The reader shall have separate terminal control points for the tri-color LED and for the audible indicator. 9. The reader shall support software control of the LED indicator when paired with controller equipped with appropriate reader API. 10. Color shall be black. 11. Reader configurations a. Reader, Wall Mounting (Single-Gang Mounting Applications): Schlage Model MTB15-485 b. Reader w/Keypad, Wall Mounting (Single-gang Mounting Applications): Schlage Model MTKB15-485 c. Reader, Special Mounting (applications with a minimum of mounting space or mullion locations): Schlage Model MTB11-485. 12. {{Delete if integrated reader/lock is not required for this project}} Networked Hardwire Electronic Lock: Schlage AD-300 a. Coordinate finish and keylock requirements with Section 08 7111. b. Reader shall be compatible with existing TCCD credential custom format. Coordinate with TCCD representative for credential format requirements F. Credentials (Access Cards): {Coordinate credential requirements with TCCD and edit this section as needed} 1. Credentials are existing and no additional credentials are required. Coordinate credential requirements should additional credentials be requested. 2. Obtain an existing access card from the TCCD Electronic Security Department and coordinate with Lenel to configure the system to read the existing cards. G. Security Terminal Cabinet (STC): System controllers and field control boards serving a given area shall be installed inside Security Terminal Cabinets. No controller or control module shall be mounted independently of the cabinet and its power supplies. Refer to the drawings and the following description for details on STC construction. Each STC shall contain the following equipment to support the current and future alarm initiating and controlled devices to be connected at that STC location. 1. Provide a single enclosure containing all power requirements, including lock power supplies and controller boards in a single enclosure pre-configured by the manufacturer. Acceptable manufacturers for unified power and controller systems: a. LifeSafety Power Integrated Unified Power Systems 2. STC Power: a. Derive primary STC 120VAC power from a designated emergency power source in a secure location. The Contractor shall use the existing 120V source for the new equipment that is replacing existing equipment. Where new equipment is being provided coordinate with electrical drawings for power source. b. Power cable shall be protected by conduit. c. Transformers shall be installed in locked cabinets, protected by tamper switches. Plug-in transformers that are not protected by locked cabinets are not acceptable. d. Serve all low voltage powered devices within the STC from the Electronics Power Supply. e. Provide barriers as may be necessary to separate Class I from Class II power 3. Electronics Power Supply: a. Ratings: Provide UL Listed Class II transformers and power supplies within the STC. Provide barriers as may be necessary to separate Class I from Class II power. b. Capacity: The power supply shall be capable of powering a minimum of 150 percent of the load required at the time of acceptance. c. Power Monitoring: The system shall monitor the loss and restoration of power at the STC through network monitoring. Loss and restoration of power shall be displayed at the Primary and Secondary monitoring locations, but shall not require resetting of the system. d. Battery Back-up: Provide battery back-up to retain functions of all electronics for a period of four (4) hours upon loss of 120VAC power then power shall switch to redundant emergency power. 4. Lock Power Supply (LPS): a. The lock power supplies and control modules shall be installed inside the same enclosure as EACIDS controllers and electronic power supplies. b. For control of new and existing electrified locking hardware provide power distribution boards, network communications for monitoring power systems, mounting accessories and other accessories as required for a complete installation within a ventilated, locked cabinet as indicated on the contract drawings, or as otherwise required to affect proper system performance. Power supply shall include separate terminals for each door lock. Low-voltage lock power cable shall be routed through the conduit riser system for interface with the access control board for switching power to the electric locks located at each door. c. Capacity: The power supply shall be capable of powering 150 percent of the load required at the time of acceptance. d. Power Monitoring: The system shall monitor the loss and restoration of power at the STC. Restoration of power shall be displayed at the Primary and Secondary monitoring locations, but shall not require resetting of the system. e. Battery Back-Up: Provide 4 hours of battery back-up for all low-voltage electrified door hardware. Power supplies shall be equipped with integral battery recharging circuits H. Alarm Initiating Devices {{Specifier should verify stated models are accurate. Changes in the industry often find manufacturers purchased and product numbers change}} 1. Door Position Switch: {{Where possible Door Position Switches should be included with the Door Hardware Specification Section 08 7100 to ensure doors and frames meet fire rating certifications. For small projects where Section 08 7100 is not provided edit this section as required to delete reference to Section 08 7100 and ensure text is clear that the contractor shall provide all DPS and ensure all door ratings are intact at the end of the project}} Door Position Switches shall be furnished and installed by the Section 08 7100 as specified in the door hardware specifications. The Contractor shall be responsible for coordinating the installation so systems and hardware operate as specified. Where door position switches are required for locations not covered in Section 08 7100 the following requirements shall apply. a. Surface Mounted Door Switch: Surface Mounted Magnetic Switch with armored cable. Route armored cable to junction box and permanently secure to box with clamp or set-screws. Use where shown on drawings, and where flush mounted devices cannot be installed. b. Non-fire Rated Doors, Flush Mount: 1) Hollow Metal Doors: Appropriate Concealed Magnetic Door Switch. 2) Storefront Doors: Appropriate Concealed Magnetic Door Switch. 3) Wood Faced Doors: Appropriate Concealed Magnetic Door Switch. c. Fire Rated Doors 1) General: Contractor shall coordinate all security hardware equipment and installation so as to maintain the Fire Rating of each specific door to the satisfaction of the local Authority Having Jurisdiction (AHJ). 2) Hollow Metal Doors: Concealed magnetic door switch, approved by UL for use on UL classified fire doors with metal faces, rated up to 3-hours. 3) Hollow Metal Doors, Hinge Switch: Electrical Hinge Switch. Finish and style as directed by TCCD. 4) Storefront Doors: Concealed Magnetic Door Switch. 5) Wood Door w/Hollow Metal Frame: Concealed Magnetic Door Switch, Magnet shall be made of rare-earth magnetic materials, and shall be of 5/8” x 1/8”, cylindrical (washer) shape. Drill 1/8”-deep hole to flush mount magnet to top of door. d. Gates and Roll-Up Doors: Surface mounted magnetic with armored cable. Route armored cable to junction box and permanently secure to box with clamp or set-screws. I. Request-to-Exit (REX) Detector: 1. Electric locking hardware provided under Section 08 7100 shall be equipped with integral RX option to provide REX function. 2. Where integral RX option is not provided, provide motion activated request to exit device. Coordinate color with TCCD. RX shall be wired directly to the board terminal with no breaks within path of travel J. Alarm Panel {Include for projects requiring separate alarm panels} 1. DMP XR550DNL-G integrated to Lenel OnGuard 8.2. Coordinate with Lenel to verify model of alarm panel compatible with the Lenel OnGuard software package. No acceptable equal 2. Provide minimum number of inputs to support alarm inputs as shown on the plans. Provide minimum of 8 inputs. 3. Provide DMP Model Series7000W Thinline LCD Keypad 4. Provide manufacturer recommended enclosure and power supply. 5. Panel shall conform to the following Listings: a. UL 1023 Household Burglar Alarm System Units b. UL 1076 Proprietary Burglar c. UL 1610 Central Station Burglar Alarm Units d. UL 1635 Digital Burglar Alarm Communication System Units K. Zone Expansion Module {Include for projects requiring separate alarm panels and expansion zones are needed.} 1. Provides a minimum of 8 or 16 expansion zones 2. Supports Class B alarm zones 3. Connects to 4-wire bus 4. Data LED to indicate communications status 5. Provide DMP Model 714-8 or DMP 714-16 L. Dual Technology Motion Detector: 1. Ceiling Mount Dual Technology Motion Detector (360°): {{Include when required}} Provide Bosch Model DS9360, Honeywell Model IS280CM, or equal 2. Wall Mount Long Range Dual Technology Motion Detector: {{Include when required}} Provide Bosch Model DS970 w/B328 Gimbal Bracket or equal M. Glass Break Detector: {{Include when required}} Provide Honeywell Model FG1625F, Bosch Model DS1108i, or equal N. Duress Switch: {{Include when required}} 1. Lever Type Duress Switch (D): Carrier Model 3045 or equal. 2. Recessed Push-button (D): Provide United Security Products Model HUB2 series recessed push button, or equivalent by Security Door Controls or Locknetics, momentary contact, push-button with key reset. O. Lockdown Button: {{Include where required}} Switchcraft PL206705, Locknetics Model TS- 100 Touch Switch, or equal with Dual lamp/LED. Lamp/LED shall be Green in normal condition and Red when lockdown is activated. Connect to input and output control at the panel. Coordinate acceptable hardware with TCCD’s Electronic Security Department Manager and Campus PD. P. Electrified Locking Hardware: {{Include where hardware is not specified in Section 08 7100. If Section 08 7100 is included text should read “Refer to Section 08 7100”. Coordinate reference section with hardware section. Sometimes 08 7111 is used}} Electrified locking hardware shall meet the following TCCD standards. 1. Electrified Latch Retraction kit for Von Duprin Panic Hardware Locations: Command Access Technologies MLRK1-VD a. Integral RX switch 2. Electrified Mortise Lock: Command Access Technologies Schlage L9000 Series. a. ML80 Storeroom function fail secure. b. Finish: 626. c. REX request-to-exit switch. d. Coordinate trim with the TCCD Electronic Security Department Manager. e. Coordinate cylinders and keying with TCCD Electronic Security Department Manager. Q. Power Transfer Devices: {{Include when required}} Use power transfer devices as needed to deliver power and signals to door-mounted devices. Power transfer devices shall be concealed, unless otherwise noted or where installation conditions do not allow it (as with concrete-filled frames or frameless glass doors). 1. ¼’ Armored Loop 18” length: Keedex Model K-DLA R. Wire and Cable 1. General: Refer to Section 28 0513. PART 3 - EXECUTION 3.01 GENERAL A. The Contractor shall install system components and appurtenances in accordance with the manufacturer's instructions, and as shown. The Contractor shall furnish necessary interconnections, services, and adjustments required for a complete and operable system as specified and shown. B. Follow the General Requirements of Section 28 0000, Security General Requirements for equipment and services provided under this section. In addition, provide the following. C. Installation: The Contractor shall install the system in accordance with the standards for safety, NFPA 70, UL 681, UL 1037 and UL 1076, and the appropriate installation manual for each equipment type. Flexible cords or cord connections shall not be used to supply power to any components of the system, except where specifically noted. All other electrical work shall be as specified in Division 26, and as shown. 3.02 INSTALLATION REQUIREMENTS A. ADA Standard: Conform to ANSI A117.1 for positioning requirements for disabled. B. Items for fire doors shall be installed in conformance with NFPA 80, and all other applicable building codes and regulations. C. Cable Routing through Door frames and Mullions: Routing of cable to doors and door frames for installation of locking hardware and door position switches shall require routing cable through door frames and mullions. Contractor shall coordinate with the General Contractor for removing mullion sections for routing cable and re-installation of mullion sections. Contractor shall return all door frames and mullions to their previous condition upon completion of the work. Refer to door details for additional requirements. 3.03 SYSTEM CONFIGURATION A. Portal Hardware 1. Access Control and Lock Configuration a. Secured Doors: Doors equipped with electric locks shall be individually programmed for locking at specified times as directed by TCCD’s Electronic Security Department. Contractor shall coordinate with TCCD’s Electronic Security Department for all time schedules. A valid credential presented at a reader will allow the portal to unlock for a programmed period of time. b. Upon authorization by card reader or manual means, "door forced" and "door held open" alarms associated with the portal shall be automatically bypassed (or masked) for a duration of time programmable on an individual door and individual cardholder basis. c. Auto-Relock: The door shall re-lock immediately upon closing, after an authorized access, and the bypass duration shall be immediately truncated. A magnetic contact will be required at every door for this purpose, and to sense the position of the door for "door forced" and "door held open" sensing. d. Free Egress Authorization: Unless otherwise shown on the plans or described herein, such as for anti-passback zones, the system shall detect the normal egress of a user at any individual portal and shall bypass any alarm associated with the portal for a duration of time programmable on an individual door and individual cardholder basis. Request-to-exit timing shall be independently programmed for each cardholder during the initial enrollment process. This function allows extended timing for disabled persons to pass through certain portals. The timing function shall automatically truncate after an adjustable period (0 - 4 seconds) after a portal is closed. This feature allows a subsequent alarm at the portal to be detected, and prevents the portal from being re- opened without an authorized request. e. Reader LED States 1) When a door is locked the reader LED shall be Red. 2) When a door is unlocked for free ingress, the LED shall be Green. 3) When a door is locked the LED shall change from Red to Green to indicate ingress is allowed. Reader LED shall return to Red when the door is closed. 4) When an invalid or unauthorized credential is presented to the reader the LED shall flash Red a minimum of three times. B. Alarm Devices: Coordinate programming of alarm devices such as door position switches at doors with readers, motion detector, duress switches and other devices with TCCD’s Electronic Security Department Manager. C. Output Devices: Coordinate programming of output devices such as lockdown buttons, local alarms, and other output devices with TCCD’s Electronic Security Department Manager. D. Tamper Devices: 1. Terminal cabinets, equipment cabinets, enclosures, power supply cabinets, and pull and junction boxes with wire connections or splices shall be equipped with tamper switches programmed to report an alarm. 2. Junction boxes requiring tamper switches that are associated with an individual alarmed device (such as a door position switch) may report to the respective device alarm point. Other cabinet and box tamper switches shall report as independent alarm points. 3. Power Supplies and Battery Chargers: Power supplies and battery chargers shall be connected to alarm monitoring points to provide an indication of tamper, power failure, battery disconnection, and charger trouble. E. Cyber Security: Contractor shall implement cyber security configuration for software and hardware as recommended by the manufacturer. Coordinate connection of IP devices to the network with TCCD IT department to ensure all security configuration meet TCCD cyber security requirements. F. Graphical User Interface (GUI) Environment 1. General: a. Contractor shall create maps, icons, menus, text, and other functions of the GUI, as noted herein, to incorporate elements and functionality of the project as specified and required by TCCD. 1) Contractor shall utilize project provided CAD files to create floor plans within GUI. b. The system monitor shall display color graphic maps, menus, and real-time information in graphical image formats, as required by TCCD’s Electronic Security Department and described herein. All viewing, menu and operating activity, including map "browse", "zoom", scrolling, output control, alarm acknowledgment and reset functions shall be operable by point-and-click interface with the mouse and by programmable "function keys" on the system keyboard. c. Alternate Display and Control Techniques: Alternate map control and display techniques that provide the required functionality and information may be considered by TCCD. Contractor shall submit a clearly delineated description of map display and control operation, demonstrate its use and effectiveness to TCCD using a working copy of the software, and obtain approval from TCCD before proceeding with the work. 2. Map Database: Contractor shall research (with TCCD), design, develop and provide maps described herein in complete operating condition including graphic representations, icons, alarm, and control interfaces. a. Individual Site Plans: Individual site plan maps shall include the entire site perimeter showing buildings, vehicle and foot traffic features and street frontage. Individual site plans may contain multiple buildings. Large-scale maps shall have dynamic zoom or designated “hot spot” areas to allow the capability to zoom into an area down to 1/8” scale. Site plans shall have icons for exterior mounted devices and entry/exit portals. b. Building Maps: Building Maps shall include the building footprint and surrounding areas, ground floor plan, a floor stacking plan (elevation) and stairwell risers. Building plans shall have icons for exterior mounted devices and entry/exit portals. c. Floor Plan Maps (Where access control, alarm, or video security measures are deployed): Floor plan maps shall include rooms, corridors, elevators, door and room designations (number and usage), penetrable wall points, column supports, location of security control equipment and any other details necessary to clearly and completely depict the secured environment. d. Individual site plans, building plans, and floor plan maps shall show text and icons for devices monitored and/or controlled by the security system. G. Emergency Standby Power: 1. EACIDS components including, but not limited to, computers, EACIDS Remote Controllers, and peripheral devices shall be protected from power failure by being connected to the building standby power source. Refer to the plans and coordinate with the Project Representative on the provision of 120VAC standby power. 2. Low-Voltage Equipment: EACIDS Remote Controllers and Lock Power Supplies shall also have their own 4-hour battery back-up systems. a. Power back-up may be in the form of direct DC battery power back-up or by 120VAC Uninterruptable Power Supplies (UPS), depending upon equipment requirements. b. Lock Power Supplies shall allow fail-secure locks to be operated by the system a minimum of 100 times-per-hour, during this time period. Fail-safe locks shall be maintained for the full 4-hours. c. Battery back-up systems may be distributed throughout the facility to provide the required emergency power to individual components. d. Battery back-up systems shall include battery chargers to keep storage batteries at their peak charge. 3. Client Workstations: EACIDS servers, workstations, displays and other 120VAC EACIDS components shall also be supported by their own one hour, 120VAC Uninterruptable Power Supplies (UPS). UPS systems shall include battery chargers to keep storage batteries at their peak charge. Refer to plan drawings and coordinate with TCCD’s Electronic Security Department for UPS locations and requirements. 3.04 SECURITY SYSTEM INTEGRATION A. Provide security system integration equipment, software and programming, in accordance with Section 28 0700, Security System Integration. 3.05 EQUIPMENT, RACK AND CONSOLE INSTALLATION A. Mount equipment in rooms, consoles, equipment racks, and desktops in accordance with Section 28 0000, Security General Requirements. 3.06 GROUNDING PROCEDURES A. Provide grounding of all systems and equipment in accordance with Section 28 0000, Security General Requirements. 3.07 WIRE AND CABLE INSTALLATION PRACTICES A. Provide wire and cable installation in accordance with Section 28 0513, Security General Requirements. 3.08 DATABASE PREPARATION, CHECKING AND ACTIVATION A. Provide database preparation, checking and activation for systems and equipment in accordance with Section 28 0000, Security General Requirements. B. In addition, provide the following: 1. Required Graphical Maps: Contractor shall research (with TCCD), develop and install property, building, floor plans, and other graphic maps with all icons and details necessary to clearly display all system information and functions, including but not limited to the information described herein. Contractor shall provide a complete and operating graphical environment for all EACIDS systems and subsystems. 2. Required System Programming: a. Contractor shall research with TCCD, develop, and install all executive and user software required for the final acceptance of the system as specified herein and on the drawings. b. Contractor shall provide TCCD with forms and instructions to facilitate the gathering and entry of user software data. Forms shall include but not be limited to information regarding cardholder data, access privileges, time schedules, portal groups, access groups, alarm points, tenant/elevator authorization, password protection levels, two-man and anti-passback locations. c. Contractor shall coordinate naming for doors with TCCD to ensure each reader/door location meets TCCD naming conventions. Refer to Specification Section 28 0000, Article 3.08 Database Preparation, checking and Activation for additional requirements. 3.09 START-UP RESPONSIBILITY A. Provide start-up services for all systems and equipment in accordance with Section 28 0000, Security General Requirements. 3.10 SYSTEM PERFORMANCE TESTING AND ADJUSTING PROCEDURES A. Provide Preliminary Testing, Inspection, Performance Verification Testing, Commissioning and Endurance Testing services for EACIDS systems and equipment in accordance with Article 3.12, Section 28 0000, Security General Requirements. B. Electronic Access Control System Testing 1. Test and verify the normal operation of every alarm point in all four states at each alarm panel. Test each alarm point for the alarm function by normal operation of the alarm point, i.e.: for a door position switch, open the door and so forth. 2. Test and verify the operation of the Electronic Access Control System. 3. Test each door during its programmed secure time period to assure that it commands the lock to activate and permits access by valid credential within one second from presentation of the key. 4. Verify all egress systems on access-controlled doors work correctly. 5. Verify system integration schemes function automatically and correctly. 6. Verify all activity at Monitoring Stations functions correctly. 3.11 FINAL PROCEDURES A. Perform final procedures in accordance with Section 28 0000, Security General Requirements. END OF SECTION