Nash Rocky Mount Schools. Specifications for; Upgrades and Additions to Existing Door Access Control System Phase 3

Similar documents
CARD ACCESS CONTROL SYSTEM

B. Configuration of system shall be through Schneider Electric in Homewood, Illinois (Jerry Lanfear ).

Networked Access Control Panel. Installation Guide

SECTION SECURITY TESTING AND COMMISSIONING

Architectural and Engineering Specification for a. Flash / Flare

SECTION DIGITAL, ADDRESSABLE FIRE-ALARM SYSTEM

B. After installation, the Owner shall be able to perform hardware configuration changes as desired without the services of the Integrator.

The purpose of this addendum is to further clarify the requirements of the plans and specifications.

Section PERIMETER SECURITY SYSTEMS

RFP Addendum 2 March 31, 2016

PROJ. NO SECTION PAGING, SPEAKERS AND HARD-WIRED CLOCK SYSTEMS

SECTION INTRUSION DETECTION SYSTEM

Hugs Product Guide Specification

UNC100 Integra Manual

The system should also be capable of recording events automatically on any compatible DVR and should be able to retrieve recordings based on events.

Architectural and Engineering Specification for a Real-Time Locating System Flare

SECTION INTRUSION DETECTION

ARCHITECTURAL AND ENGINEERING SPECIFICATION

Architectural and Engineering Specification for a Fence-Mounted Perimeter Intrusion Detection System. FlexZone

Control Panel. 1.0 GENERAL SCOPE OF WORK Introduction... 2

CONSULTANT PROCEDURES & DESIGN GUIDELINES ACCESS CONTROL SYSTEM

PWGSC Ontario MULTIPLEX FIRE ALARM SYSTEM Sect Region Project Page 1 Number R

Appendix 1 LACCD Districtwide Security Performance Requirements

C. The system shall be capable of turning luminaires on/off (where supported by the luminaire) as well as full range dimming.

DENVER PUBLIC SCHOOLS DESIGN AND CONSTRUCTION STANDARDS This Standard is for guidance only. SECTION IBAS LIGHTING CONTROL

CV-350 TCP/IP Access Control System. System Overview

1. Floor above/floor below notification. 2. Private alarm notification. 3. Not Used 4. Voice alarm notification. 5. Not Used.

UBC Technical Guidelines Section Edition Access Control Page 1 of 5

Cardax System Comparison

Synergis Master Controller 2.2 Integration Guide for Assa Abloy Aperio- Enabled Locks

TAB C-6 KEYLESS ACCESS AND SECURITY SYSTEM GUIDELINE

ACTIVE INFRARED BARRIER

Alarm Lock A Division of the Napco Security Group 333 Bayview Avenue Amityville, New York Phone (631) Fax (631)

UNIVERSITY OF WASHINGTON Facilities Services Design Guide. Architectural. Access Control System - CAAMS. Basis of Design

FIRE ALARM SYSTEM 1.1 GENERAL REQUIREMENTS

FlexPS. Architectural & Engineering. Specification for FlexPS. Architectural/Engineering Specification for a

SECTION DIGITAL-NETWORKING LIGHTING CONTROLS ENLIGHTED LIGHT MANAGEMENT SYSTEM

FIRE DETECTION SYSTEM SPECIFICATION FOR MODEL XR200

DIVISION 28 ELECTRONIC SAFETY AND SECURITY

GE LightSweep Lighting Control System Guideform Specification

Architectural and Engineering Specification for a Fiber Optic Perimeter Intrusion Detection System. FiberPatrol FP1150

TABLE OF CONTENTS GENERAL... 2 A. DEFINITIONS DIGITAL, ADDRESSABLE FIRE ALARM SYSTEM... 2

G SERIES: Security INTEGRATION as you want it. Greater expansion, communication, video integration, system resilience, and automation.

Integrated Security Solutions

Architectural and Engineering Specification for a Fiber Optic Perimeter Intrusion Detection System. FiberPatrol FP1100X

A. Drawings and general provisions of Contract, including General and Supplementary Conditions apply to work of this section.

Access CONTROL. MANAGEMENT Software

PIV-Enabled. Access Control Solutions for Government Facilities

SECTION NURSE CALL SYSTEM

Synergis Master Controller 2.2 Integration Guide for Assa Abloy IP Locks

Access Control for. Part 3 of 4. Brought to You by. Presented by Video Security Consultants

SECTION LOW VOLTAGE LIGHTING CONTROLS

ONYX FirstVision Specification Interactive Firefighters Display

USD 380 Centralia, Frankfort & Vermillion

SECTION (13730) - INTRUSION DETECTION

BSD Technical Standard. Division 28: Electronic Safety & Security

Why Should You Invest In An Access Management System?

Access Control (card access)

PRODUCT CATALOGUE. Cape Town 18 Darter Road Blue Water Estate Kommetjie. Gauteng 245 Louis Botha Avenue Orchards Johannesburg

SPECIFICATION MICROMIST FIRE SUPPRESSION SYSTEM WITH SHP-PRO CONTROL PANEL

ELECTRONIC SAFETY AND SECURITY SYSTEMS

Architectural and Engineering Specification for a Fence-Mounted Perimeter Intrusion Detection System. FlexZone

PRO-WATCH NOTIFIER SECONDARY FIRE INTERFACE ARCHITECT AND ENGINEERING SPECIFICATION

Electronic Safety and Security

_5120_School_Intercom_Rack_Spec.doc 09/21/04

DATA SHEET ESS-ACS WE INDENTIFY SECURE AND INTEGRATE. IRIZ ID TECHNOLOGIES

SECTION FIRE ALARM AND SMOKE DETECTION SYSTEMS

SECTION AUTOMATIC TRANSFER SWITCHES

NORTHWESTERN UNIVERSITY PROJECT NAME JOB # ISSUED: 03/29/2017

KT-100 Door Controller

1.3 REFERENCE STANDARDS

East Central College

Architectural and Engineering Specification for a Hybrid Perimeter Intrusion Detection and Intelligent Lighting System.

Architect s Project Number of 12 Fire Alarm/Smoke Detection Systems District Master Specs 2013 Edition

SECTION ( ) FIRE DETECTION AND ALARM SYSTEM. ENGINEERING SPECIFICATION INTELLIGENT REPORTING FIRE DETECTION SYSTEM February 2017

OpenDevice Events Guide

SECTION AUTOMATIC TRANSFER SWITCHES PART 1 - GENERAL

ARCHITECTURAL DOOR HARDWARE KEY PADS & CARD READERS CATALOG

SECTION FIRE ALARM SYSTEMS

Pro-Watch Software Suite. Architect and Engineering Specifications. January 9, 2002 Revision 3.4

EC-BOS-602/616 AX Security

GARCIA GALUSKA DESOUSA Consulting Engineers

7638 Standish Place Derwood, MD Tel: (301) Fax: (301) Page 1 of 12. Website:

UltraLITE Model ELU Centralized Emergency Lighting Inverter 4.2 KW- 5 KW

CRC Technical Reference Manual P/N Rev NOV01

Integrated Security Solutions

SECTION AUTOMATIC TRANSFER SWITCHES

For a red enclosure add an R suffix to the part # e.g. eflow4na8dr. Altronix Corp th St. Brooklyn, NY. Installing Company: Service Rep.

VACUUM BREAKER MEDIUM VOLTAGE AUTOMATIC TRANSFER SWITCHES

Access Professional Edition. The flexible access control system that grows with your business.

SECTION HEALTHCARE COMMUNICATION AND MONITORING SYSTEM (NURSE CALL)

HARDwired Installation/ Owner s Manual

DOOR MONITORING/DURESS SYSTEM

DIVISION 26 ELECTRICAL SECTION LIGHTING CONTROL SYSTEM

Security Considerations for Secure Workplaces

PART 1 GENERAL Quality Assurance A. Fire Alarm Contractor Qualifications:

The following information shall become and form part of the contract documents.

OSU PROJECT NO PAGE 1 02 NOV 2006 SECTION FIRE ALARM SYSTEM

SECTION BUILDING AUTOMATION SYSTEM

5120_School_Intercom_Rack_Spec.doc 10/10/07

Transcription:

Nash Rocky Mount Schools Specifications for; Upgrades and Additions to Existing Door Access Control System Phase 3 Access Control System Section 281300 Page 1

Nash Rocky Mount Schools is seeking bids to install the following; 1. Installation of additional door access equipment for doors at facilities with existing door access systems already installed. Nash Rocky Mount Schools has a district wide Sielox/Pinnacle door access system installed. This system is installed with central virtual server software and partitioned databases for each site. This allows the district to enroll cards once for the entire district, maintain one database, and control every door in the county from one single management software. It is the intention of this bid to expand the existing system by installing additional Sielox 2 door controllers and peripheral devices at each door. 2. Nash Rocky Mount Schools will be providing the following items to be installed by the contractor. a. 2 door controllers as needed per site. b. Software license for additional doors. c. Electric Door Strikes as needed per site. d. Request to exit sensors as needed per site. e. Door Position Switches (contacts) as needed per site. f. Power Supplies for doors as needed per site. g. Door access cable as needed per site. h. Magnetic door holders as needed per site. i. Electronic latch retraction kits as needed per site. j. Push to exit buttons as needed per site. 3. Contractor responsibilities a. Install all items provided by the owner as indicated in bid documents and noted in the pre bid conference. b. Provide any items not supplied by the owner to complete the installation. It is the responsibility of the contractor to provide and install any required items to make a complete functional system. c. Hold a valid NC Alarm License and have all employees registered with the NCASLB. Contractor shall provide a copy of this license with the bid submission. d. Expand the license of the existing software to allow for the total number of doors being added. e. Contractor shall be a current partner of Sielox/Pinnacle products and shall have certified and factory trained technicians on staff. Contractor shall have been a direct partner of Sielox for a minimum of two years. Non Sielox partners will not be allowed to bid due to the fact that installing Sielox equipment by anyone other than a Sielox partner will void the warranty on the new products as well as the existing system. Existing Door access system is still under warranty and successful bidder will assume the remainder of that existing warranty. f. Make connections to the owners existing data network to connect new two door controllers. Data cabling and shall be installed under the current BICSI standards and successful contractor shall have a current RCDD on staff to oversee the deployment of these devices on the owners network. Contractor shall provide a copy of the RCDD certificate with the bid submission. g. Enroll new controllers into the existing door access system database and configure them to function with the existing system. 4. It is the preference of Nash Rocky Mount Schools to utilize a surface mounted electric strike mounted to the removable mullion bar when available. A disconnect means shall be provided at the top of any removable mullion bar to allow for school staff to disconnect when the mullion needs to be removed. This contractor is responsible for installing all associated wiring, power supplies, batteries, raceways, door hardware and labor for a complete functional system Access Control System Section 281300 Page 2

5. Door Access Controllers and Central Management Software (provided by owner) a. Install 2 door control units as needed at each school or facility. This shall be a fully functional 2 door controller tied to the owners network and reporting back to the central office server/software. b. Controller will be install at the site with power supplies, batteries and wiring to provide full control of the items installed in the bid listed above All items listed above in both the bid shall meet the following specifications and requirements. Any and all questions shall be submitted to the owner in writing 5 days prior to the bid opening. Bidders are required to visit each site and make themselves aware on the conditions. Any unforeseen conditions or additional work required to complete this installation will be the sole responsibility of this contractor and considered to have already been included in the contract price. Bidder must be a factory trained installer for the products proposed and shall submit proof of certification with the bid. A full materials list and product specification sheet shall be submitted with the contractors bid. Access Control System Section 281300 Page 3

PREFACE GENERAL SECURITY DEFINTIONS: A. ACS: Access Control System. B. Server: PC with software designated as the main controlling PC of the security access control system. Where this term is presented with initial capital letters, this definition applies. C. Controller: An intelligent peripheral control unit that uses a computer for controlling its operation. Where this term is presented with an initial capital letter, this definition applies. D. LCD and LED: Liquid Crystal Display and Light emitting Diode, used to display conditions of devices. E. Card, Tag or Fob: Data assigned to a Cardholder stored in a credential and used to identify that person. F. CR: Card Reader, Reads the Card, Tag or Fob assigned to the cardholder. G. Cardholder: A person programmed into the Access System and holding a Card, Tag or Fob H. TZ: Time Zone Time restrictions that may be assigned to a door or Card, Tag or Fob holder I. Identifier: A credential card, keypad personal identification number or code, biometric characteristic, or other unique identification entered as data into the entry-control database for the purpose of identifying an individual. Where this term is presented with an initial capital letter, this definition applies. J. REX: Request to Exit, a signal produced by a motion sensor, Exit device, or push button to tell the Access system of a valid Exit by a cardholder. The selected device is configured on the inside (egress) side of the door. K. SQL Server: A Database program to stores the user and system information for later use L. GFI: Ground fault interrupter. M. I/O: Input/Output. Input receives a signal, output produces a signal N. LAN / WAN / VPN: Local area network / Wide area network / Virtual Private Network O. LED: Light-emitting diode. P. Mantrap: A man-trap in physical security protocols refers to a space having two sets of interlocking doors such that the first set of doors must close before the second set opens. Q. PC or WS: Personal Computer or Workstation, this acronym applies to the, workstations, and sometime ID stations. R. SD Card: A type of Industry Standard Memory storage device S. User: A person assigned to operate the Access Control System from a Workstation or the Server sometimes referred to as an operator. T. Division 8 Section Door Hardware U. Division 13 Section Fire Alarm V. Division 26 Section Electrical W. Division 28 Section "Intrusion, Access Control, CCTV Access Control System Section 281300 Page 4

Part I: GENERAL I. 1. INTRODUCTION: COMPLETE SYSTEM PROPOSAL A. This document provides the information necessary to produce a complete proposal for a highly secure, easy-to-use and dependable Access Control System (ACS). The ACS shall provide the speed and flexibility of 32 bit multiple-technology controllers and be managed by a client/server application using an intuitive graphical operator interface on the Microsoft Server 2003, 2008, Windows 7, Vista Business or XP SP2 operating Systems. All devices, such as card readers, keypads, access cards, alarm inputs and outputs. The ACS shall include all computer hardware and software, field controllers, communication boards, power supplies, battery back up, electric hardware, conduit, raceways, and all other equipment as indicated on the contract drawings and as specified herein. All material shall be the manufacturer' standard catalog products. I. 2. SECTIONS TO INCLUDE B. This section covers the provision of ACS for the Nash Rocky Mount Schools System located at 930 Eastern Ave, Nashville, NC, including all items and systems shown on the drawings or otherwise required by these specifications. C. The requirements of these specifications shall be understood to be Nash Rocky Mount Schools System minimum. The requirements shall be expanded as necessary to ensure quality. However, unless Nash Rocky Mount Schools System approval is obtained, the requirement herein shall not be deleted or revised. The Security Contractor will make note of any feature or item that falls short of this specifications requirements. It will then be up the Security Consultant and the Owner to place a value on the feature that falls short of the request. D. Nash Rocky Mount Schools System shall be hereinafter referred to in this document as the OWNER and the bid respondents shall be referred to as the SECURITY CONTRACTOR OR SECURITY VENDOR. The term OWNER includes direct employees and other appointed OWNER agents such as architects or consultants. These agents may be requested by the OWNER to represent the OWNER in undertaking certain project tasks. E. All of the CONTRACTOR'S personnel, operating forces, and delivery personnel shall be made aware of and shall comply at all times with the regulations and the directions of responsible OWNER personnel. F. If any statement in this or any other specification is in conflict with any provision of the General Terms and Conditions to the contract, the provision stated in the General Terms and Conditions shall take precedence. Any questions that require additional interpretation and guidance shall be immediately brought to the OWNER'S attention. Access Control System Section 281300 Page 5

I. 3. DESCRIPTION OF WORK A. General 1. If not provided by the owner then the Security Contractor shall include all necessary wiring, cabling, labor, tools, equipment, and ancillary materials required to furnish and install a complete and operational ACS. 2. 117 VAC power extensions and other electrical work shall be furnished in existing electrical, mechanical or data closets. Owner will not be providing 120vac. 3. Electric door hardware and associated lock power supplies for card reader doors shall be installed by Security Contractor. It will be the responsibility of the Security Contractor to coordinate with other division contractors to in sure a complete and working Access Control System for the owners building[s]. 4. The Owner shall arrange for all LAN/ WAN connections and setting as shown on the attached drawings. 5. The ACS will manage access to Buildings and Selected areas using cards, and or coded keypads. 6. Requirements are indicated elsewhere in these specifications for work including, but not limited to, raceways and electrical boxes and fittings required for installation of ACS equipment and wiring. B. Installing the ACS and bringing it to operational status requires the following steps: 1. The Security Contractor shall furnish and install, where necessary, the communications network providing communications between the Client and Server computer workstation, over the customers IP Network. 2. Determine operation and software requirements to implement the project. a) Select host computer site, with the owner s approval. b) Install ACS and related hardware as per contract drawings. c) Configure intelligent field controllers and ACS host computer to communicate with one another. d) Enter ACS database, with all information provided by the owner. e) Connect between the host computer, intelligent field controllers and related hardware, through the owners IP network or with a RS-485 local network if needed. f) The ACS Systems and components will be tested in accordance with the final test and acceptance sections of the document. g) Training of the owner s staff will also be in full accordance with this document and will be part of the acceptance testing at the end of the installation. h) Secure software support agreement from system manufacturer, will be reviewed during the installation, with all options explained in advance of acceptance testing. Access Control System Section 281300 Page 6

I. 4. SUBMITTALS A. Shop Drawings 1. Submit in accordance with requirements of Section 2. Shop drawings shall detail all connected devices, of sufficient detail to adequately communicate that recommended software meets requirements, including CAD drawings of each school/facility. Security Contractor is responsible for generating and supplying the owner with a full set of CAD drawings of each device installed, controller locations etc: a) System device locations should be included on the architectural floor plans. Please also include model numbers and any IP address that can help with future expansion or service. A separate list will also be aceptable. b) Full schematic wiring drawing for all devices with wiring information including cable type, the number of conductors, routings, quantities, and connection details of devices. Please list any spare conductors that may be used for future expansion or service. c) The security contractor will also provide a complete system one-line block diagram if not already on the drawings. B. Contract Close-Out Submittals 1. Provide 4 bound sets of manuals including: a) Provide operating instructions and suggestions to the owner, also all documents should be reviewed with the owner, or the owner s representative. b) Provide maintenance recommendations and options for the years 2-5, and review with owner or his representative. c) Parts list, including wiring and connection diagrams. Please supply at least [one] [1] paper copy of the related drawing and [one] [1] electronic copy on CD, DVD, or on a thumb drive/memory stick device (see section E - AS Built Drawing) d) A copy of the final test results, showing any problems encountered and what was done to Correct each problem will also be provided to the owner or his representative at this time. C. As-Built Drawings 1. During system installation, the Security Contractor shall maintain a separate hard copy set of drawings, elementary diagrams, and wiring diagrams of the ACS to be used for record drawings. 2. As-built drawings shall be accurately kept up to date by the Security Contractor with all changes and additions. 3. Copies of the final as-built drawings shall be provided to the Owner in Auto CAD DWG format using at least one of the last 2 versions of AutoCAD. Access Control System Section 281300 Page 7

D. Delivery, Storage, and Handling 1. Comply with requirements of Section 2. Deliver materials in manufacturer s original, unopened undamaged containers with identification labels intact. 3. Storage of materials should be protected from exposure to harmful environmental conditions and at temperature conditions recommended by manufacturer. 4. Handle products and systems in accordance with manufacturer s instructions E. ACS Security Vendor shall: 1. Contractor shall have a local Technician, which will be a factory authorized service person for the ACS. They will carry a stock of [ALL] parts to perform any needed repairs. Local shall be defined as an area in a 75 mile radius of installed location, or have a service center within [2] hours of installation site. 2. Contractor shall be an authorized and a trained Business Partner for the ACS manufacturer proposes. 3. Shall be able to provide certification proving their installation and service technicians are competent, factory-trained personnel capable of installing and maintaining the ACS. 4. Shall provide a minimum of [five] [5] references whose systems are of similar complexity and size and also have serviced and maintained these systems for at least [five] [5] years. 5. At the time of the bid, be licensed by the State or local jurisdiction to perform security work within the state. Contractors who have security licenses or permits pending shall not be considered acceptable for bidding on this project. Copies of Security licenses may be requested by owner. 6. Shall assure that all personnel working on the project are registered with the State or local jurisdiction Systems Licensing Board as provided for by current state statutes. 7. At the time of the bid, the security vendor will provide evidence of liability insurance and Workmen's Compensation coverage for employees as required by law in the state of the project. 8. System Checkout shall consist of the following Tasks which are to be preformed by the Security Contractor: a. All Equipment supplied per the contract will be pre-test before arriving on site. c. On-site Testing: Manufacturer trained and authorized ACS Business Partner shall functionally test each component in the system after installation to verify proper operation and confirm that the panel wiring and addressing conform to the wiring documentation, and to the owner s standards in the document. Access Control System Section 281300 Page 8

I. 5. WARRANTY A. Project Warranty: Comply with any special owner requirements of Section. B. Manufacturer s Warranty: Submit manufacturer s standard warranty document executed by authorized company official. Manufacturer s warranty is in addition to, and not a limitation of, other rights Owner may have under the Contract Documents. C. Warranty Period will be [One] [1] year from date of Substantial Completion. D. If ACS is purchased with Server/Computer, the computer hardware shall be warranted for not less than [24] months from the date of shipment from the factory. ACS manufacturer shall support hardware repair for the system through the computer manufacturer s worldwide service organization. E. Extended warranty terms at reasonable rates shall be available from the installing Security dealer, and needed to be reviewed as part of the finial Acceptance producer with the owner. F. The Security Business Partner shall be the focal point of all service problems or questions with manufacturer s full support. A service phone number and procedure will be provided to the owner as part of the training of the staff. The owner will designate one or two person who will be authorized to initiate a service call on behalf of the owner. C. System Field Controller (provided by owner) 1. The ACS shall support their legacy controllers, any new hardware will be 100% backwards compatible to all legacy hardware. 2. The controllers shall be 100% distributed intelligence architecture. Each controller shall operate independently of one another. If the ACS Controller communication is lost, the controller will NOT revert to a degraded mode of operation. The ACS Controller will continue operation without losing any features for cardholders or alarm functions, and it will retain a minimum of 10,000 events which will be down loaded to the sever upon the restoration of network communications. The failure of any ACS controller will result in a Maximum of 1 or 2 hardwired Card Reader doors in the off-line condition. Any controller offline condition that affects more than 1 or 2 hardwired Card Readers will be considered unacceptable. Controllers that control 4, 8 or 16 readers will not be aceptable to the Owner. 3. The controllers shall provide intelligent interface to intrusion detection and duress alarm devices, card reader devices, door locking and gate control mechanisms, elevator systems, local alarm devices, intercom systems, wireless locking systems and other auxiliary systems that may be part of a building security systems. 4. The ACS controllers shall incorporate a 32-bit CPU, using high speed processing for maximum reliability. The design shall allow for a mixture of readers and I/O support on a single board to facilitate expansion capabilities. These features will be standard. a) Two Reader Controller Provides support for up to two hardwired Card Readers each with support for, door strike, door contact, and request-to-exit devices. All aspects of each input and output can be completely configured to meet owner s needs. Any controller that supports 4, 8, or 16 readers one controller will be considered unacceptable. b) Each Controller shall have a minimum of 4 auxiliary inputs each input could be independently configured to be either Supervised 4 states or unsupervised 2 states. All aspects of shunting and other timing features shall also be independently configured. c) Each Controller shall have a Minimum of 4 auxiliary outputs each output Access Control System Section 281300 Page 9

should be Superviseable and completely programmable. Relays are assignable to activate In the normally open or normally closed positions. The outputs will be assignable to trip on any system event, either alarm type event or on any Card holder type event. Each Relay on the Controller shall be socketed and removable for field replaceable. d) Each shall support the expansion of at least 56 auxiliary inputs or outputs or any combination of the two, with a total of at least 56. e) On board Ethernet Connection, with Network speed direct to into controller CPU. A POE option should also be available. The POE option will power the Controller and up to two card readers attached to the ACS controller 5. Controllers shall incorporate the following basic features as minimums; a) Cards stored on Controller 50,000 with one access level per cardholder b) Cards stored on Controller 25,000 with three access levels per cardholder c) Buffered events shall be a Minimum of 10,000 d) Equipment and materials for which there are ETL or UL standard testing requirements, e) A Web based onboard port which will allow for remote; testing, status reports, rebooting of controller, input and output tests, communication tests as well as the ability to remotely update the controller s firmware. This Maintenance port will remain operational even when the controller is communicating through the RS-485 port for day to day operation. f) User-defined dry contact relays/outputs with or without supervision g) User-defined SPDT dry contacts relays/outputs, shall be a minimum of 2Amps max at 24 VDC or 24 VAC, and be removable and socketed for field replaceability. h) The ACS controller should run in a voltage range of 11.5 VDC to 18 VDC max. I) All inputs and outputs of the ACS Controller shall have an option to be supervised. j) All communication through the Ethernet Port will have AES 256 bit encryption. k) Provide support for FIPs 201, PIV, TWIC and CAC Card standards. l) Standard coin battery for real time clock retention. m) Secure SD card (standard type) for door configuration, database backup and end-user and field technician use, as well as remote setup without a network/computer. (Construction Mode) n) The Controller shall have no limit to the number of facilities codes that each will except. o) The controller will have LED indicator s for the following, RS-485 ports, RS-232 ports, network port, relay s (outputs), Power L.E.D., and storage device on controller. Any ACS that does not have these field trouble shooting aids will be considered unacceptable. 6. All database information shall be stored at the controller level resulting in decision making being performed at the controller level thus eliminating the need for a degraded mode of operation. 7. Controllers shall support direct wiring of a 1 or 2 Wiegand output readers without the need for a separate reader interface board, including any proprietary formats that may need to be incorporated into owners system. Access Control System Section 281300 Page 10

8. Controllers shall be compatible with any identification device that transmits data using Weigand, ANSI and Custom ANSI, or other industry standard protocol. This shall include but not limited to Proximity [HID][AWID][INDALA], Bar code, Magnetic-stripe, Iclass, Corporate 1000, Smart Card, Weigand Readers, Keypads and Biometric readers. 13. Local (server-independent) Anti-Passback per Main Controller (MC) and server based global and soft Anti-Passback supporting up to 20 TC s (40 Readers) per defined zone, each independent of location: (1) Hard APB denying access to an area when a Cardholder improperly exits the area last time they left. (2) Global (universal) APB enforcing anti-passback communication between Main Controllers connected to different Pinnacle hardware servers. (3) Soft (forgiven at midnight) or Timed (forgiven after a programmed time interval) APB supporting two different scenarios: (I) Even though a Cardholder improperly exits an area, the system grants access, but logs the event for reporting or (ii) even though a Cardholder improperly enters an area, the system allows the Cardholder to exit, but logs the event for reporting. (4) Local APB defined as being server-independent and performed at the Entrance and exit point of a single 2-Reader Terminal Controller module. (5) Regional up to 32 Hardwired Card Readers can be controlled (grouped) under a single Main Control. 14. The ACS Controller and Legacy controllers a) System architecture shall provide for controllers to communicate with Legacy controllers Via point-to-point RS-485 2 wire, up to 4,000 feet from the Main Controller. 15. The controllers shall have the capability of being upgraded (flashed) either from host Computer or maintenance port directly to the board with a standard SD Memory card. G. Card Reader / Keypad (provided by owner) 1. The ACS shall support proximity card, Weigand, magnetic stripe, and barcode technologies to include the following manufacturers: a) Sielox Mirage SG, Mirage 2, Performa, and AC-160 Keypad Readers b) Farpointe Readers c) Integrated Biometric Readers d) FIPS 201. PIV, TWIC, CAC and FRAC Readers Standards e) Bioscrypt V-Flex, V-Prox V-Pass, V-Smart, and V-Station f) HID including; iclass, Corporate 1000, BioCLASS, MultiCLASS and Indala g) AWID Proximity Readers [26-75] bit h) Sentex Passport Readers i) Any Weigand formatted Reader, [26-75] bit Access Control System Section 281300 Page 11

j) Select barcode Reader k) Integrated Engineering l) Ingersol Rand Readers 2. Readers a) The Proximity/Smart Card reader shall be low profile, weatherized and have a read range of up to [five] inches. The reader shall communicate to the controller through a six conductor, stranded, shielded 18 AWG cable for distances up to 500 feet. The reader shall utilize a [26]-bit Weigand data output and operate at [13.56 MHz] enabling the reader to track assets via RFID. The reader shall be available in industry standard switch plate size and mullion mount. The reader shall be suitable for indoor and outdoor applications and feature bi-color LED status indicator. The reader shall be powered by + [12.0] VDC, supplied by the controller]. K. Smart Power Supply (UPS) (provided by owner) 1. The ACS shall manufacture its own Power Supply. If a Third Party Power Supply is to be Supplied the following lists of features are desired: a) Dual power supply with dual battery chargers, or panels and locking devices b) Dual voltages, 2 12vdc or 2 24vdc or one of each @ 6 amps c) Power supply must hold a Minimum of 4 12AHR batteries d) Power supply will automatically adjust for battery size and condition e) Front panel will have an LCD Screen to report battery charge level, AC fail, FACP f) Power supply will have a minimum of 8 and have an option for 16 output distribution Board g) The power supply distribution board will be fused by either glass or thermal fuses for each zone h) Each channel on the distribution board will have relays that can be fail safe or fail secure selectable, as well as powered or dry contact i) Any power supply output will be selectable for fail safe or secure for fire system connection, and will be indicated in red when energized j) Each fused zone on the distribution board will be indicated with a green LED k) Power supply will be UL294, UL603, and will meet FCC Class B Part 15 Access Control System Section 281300 Page 12

I. 6. FIELD QUALITY CONTROL A. Installation 1. The contractor shall install all system components in accordance with the manufacturer s instructions, and shall furnish all necessary interconnections, services, and adjustments required for a complete and operable system as specified and shown. Control signal, communications, and data transmission line grounding shall be installed as necessary to preclude ground loops, noise, and surges from adversely affecting system operation. Provide mounting hardware as required. 2. Coordinate wiring of controlled or monitored doors with hardware provided under Division 8, elevators provided under Sections, fire alarm system provided under Section general electrical requirements under Section, and conduit under Section. 3. All low voltage wiring outside the control console, cabinets, boxes, and similar enclosures, shall be plenum rated where required by code. Cable shall not be pulled into conduits or placed in raceways, compartments, outlet boxes, junction boxes, or similar fittings with other building wiring. 4. All inputs shall be protected against surges induced on device wiring. Outputs shall be protected against surges induced on control and device wiring installed outdoors and as shown. All communications equipment shall be protected against surges induced on any communications circuit. All cables and conductors, except fiber optics, which serve as communications circuits from security console to field equipment, and between field equipment, shall have surge protection circuits installed at each end. 5. All boxes and enclosures containing security system components and/or cabling and which are easily accessible to employees or to the public shall be provided with a lock. Boxes above ceiling level in occupied areas of the building shall not be considered to be accessible. 6. All junction boxes and small device enclosures below ceiling level and easily accessible to employees or the public shall be covered with a suitable cover plate and secured with tamper proof screws. 7. All exposed metallic flexible conduit and armored cable shall be dressed down neatly and secured with low profile, metal fasteners. 8. End-of-Line resistors shall be installed at the field device location and not at the controller panel location. 9. ACS device locations on floor plans are intended to generally indicate areas where such devices are to be located. Security Contractor shall [With aid of security consultant and or Owner], be responsible for determining final location of these devices in accordance with Owner's requirements. 10. Riser diagrams and schematic do not show every conduit, wire box, fitting, or other accessories. Provide such materials as necessary for a complete and functioning installation. Install in accordance with referenced codes and these specifications. Use weatherproof equipment or covers where installed in areas exposed to weather. 11. Seal penetrations through fire rated construction in accordance with Section. Provide draft stop penetrations in all partitions not required to be firestopped. Draftstop material shall be pliable and elastic, similar to Dow Corning silicone sealant. 12. All wiring is to be installed in dedicated conduit throughout. Subject to the following conditions, use power-limited wiring methods and materials complying with Part C of NEC Article 725. 13. Product data submitted shall include manufacturer's documentation that specifically states which circuits are power-limited in accordance with NEC Article 725. Access Control System Section 281300 Page 13

14. Power supplies that energize power-limited circuits shall be factory marked "Class 3" in accordance with NEC Article 725 Part C. Absence of required markings will require use of NEC Article 760 Part B wiring methods and materials. 15. Protect cable from damage when passing through building structure or conduit system. Provide sleeves wherever cable penetrates floors or partitions; see Section [Insert #] for sleeves. Provide conduit stubs where wiring runs inside walls or partitions. Provide bushings wherever cable enters sleeves, conduit, junction boxes, equipment backboxes, or control enclosures. Install cable in conduit where it would otherwise be exposed, as in mechanical and electrical equipment rooms. 1.41 CABLING (provided by owner) A. Comply with NECA 1, "Good Workmanship in Electrical Contracting." (a) Install cables and wiring according to requirements in Division 28. (b) Access control system wiring color to be distinct and specific to the system. Contractor to coordinate cable colors with all other vendors to ensure color is not duplicated. (c) Wiring Method: Install wiring in raceway and cable tray except within consoles, cabinets, desks, and counters and except in accessible ceiling spaces and in gypsum board partitions where unenclosed wiring method may be used. Use NRTL-listed plenum cable in environmental air spaces, including plenum ceilings. Conceal raceway and cables except in unfinished spaces. (d) Install LAN cables using techniques, practices, and methods that are consistent with Category 5E rating of components and that ensure Category 5E performance of completed and linked signal paths, end to end. (e) Install cables without damaging conductors, shield, or jacket. (f) Boxes and enclosures containing security system components or cabling, and which are easily accessible to employees or to the public, will be provided with a lock. Boxes above ceiling level in occupied areas of the building will not be considered to be accessible. Junction boxes and small device enclosures below ceiling level and easily accessible to employees or the public will be covered with a suitable cover plate and secured with tamperproof screws. (g) Install end-of-line resistors at the field device location and not at the controller or panel location. 1.41 CABLE APPLICATION (a) Comply with EIA/TIA-569, "Commercial Building Standard for Telecommunications Pathways/Spaces." (b) Cable application requirements are minimum requirements and will be exceeded if recommended or required by manufacturer of system hardware. (c) RS-232 Cabling: Install at a maximum distance of 20 feet. (d) RS-485 Cabling: Install at a maximum distance of 4,000 feet Per Main Controller. Access Control System Section 281300 Page 14

B. System Labeling 1. The Contractor shall provide all labeling and numbering required for all components and wiring for the project. Final as-built drawing will reflect this information. 2. All wiring conductors connected to terminal strips shall be individually numbered and each cable or wiring group being extended from a panel or cabinet to a building mounted device shall be identified with the name and number of the particular device as shown. C. Project Management 1. The Security Contractor shall provide an on-site, factory-trained technician to assist, advise and manage installing personnel. D. Field Service 1. A Security Contractor, authorized by the manufacturer, shall provide first line support for both hardware and software properties of the selected system. 2. Security Contractor shall in turn be provided second line support directly from the manufacturer, or manufacturer s OEM for all component and computer hardware, and all operating and application software that comprise the complete system. 3. Security Contractor shall determine and report all problems to the manufacturer s customer service departments. 4. Support shall be available to the Security Contractor via the following methods: a) Phone call inquiries Monday through Friday from 8:30 am to 7:30 pm. EST b) Access to the customers system for remote system troubleshooting by a qualified Field Service Engineer also Monday though Friday 8:30am to 7:30pm EST c) On-site visits if required, upon approval by the manufacturer s Customer Service Manager, fees may apply. 5. Manufacturer shall provide reliable field service support for the computer hardware utilizing. 6. Extended and peripheral service and maintenance agreements shall be available for purchase by the customer through the authorized Security Contractor. I. 7. TESTING A. General 1. The contractor shall perform pre-delivery testing, site testing, and adjustment of the completed ACS. The contractor shall provide all personnel, equipment, instrumentation, and supplies necessary to perform all testing. Written notification of planned testing shall be given to the owner at least [Fourteen] [(14)] days prior to the test and in no case shall notice be given until after the contractor has received written approval of the specific test procedures. Test procedures shall explain in detail, step-by-step actions and expected results demonstrating compliance with the requirements of the specification. Test reports shall be used to document results of the tests. Reports shall be delivered to the owner within [Seven] [(7)] days after completion of each test. Access Control System Section 281300 Page 15

2. A factory trained field technician shall perform site tests with the Owner's Representatives in attendance. 3. Tests shall be performed on each circuit and component of each system. Tests shall include, but not be limited to, measurements of power supply output under maximum load, signal loop resistance, and leakage to ground where applicable. System components with battery backup shall be operated on battery power for a period of not less than 10% of the calculated battery operating time. Where testing components requires special or dedicated equipment, the Contractor shall provide the equipment. 4. On any circuit where malfunctions occur, each component within the malfunctioning circuit shall also be retested after the malfunction has been corrected. 5. The Contractor shall continue the test procedures until all devices and sequences are complete and functioning properly and until all system testing has been completed. 6. The Contractor shall demonstrate to the Owner's Representative that all sequences operate correctly and that all products, devices and system software operate as designed and specified. 7. Documentation of testing shall be included in the As-built package. B. On-Site Commissioning 1. The manufacturer shall provide direct participation in the on-site commissioning activity of the ACS, in conjunction with the Security Contractor. 2. The manufacturer shall provide the Security Contractor with the expertise on installing, configuring and commissioning of the system to meet the Owner s requirements and to provide on site training on system operation and administration. 3. The on-site commissioning activity shall include the following: a) Hardware set-up and testing, with report to owner Facility Manger b) Communication configuration and test, with report to owner IT Department c) Preventative maintenance and troubleshooting training for the Security Contractor d) End-User Operator training, staff, administrator and maintenance to be included e) Database configuration and build assistance, with report to owner s IT Department C. System Acceptance 1. The ACS shall not be considered accepted until all punch list items have been corrected. Beneficial use of part or all of the system shall not be considered as acceptance, until all of the above testing, as-built drawing, and maintenance paperwork is presented to the owner or the owner s representative. I. 8. TRAINING A. The contractor shall conduct training courses for personnel designated by the owner. Training shall cover the maintenance and operation of the ACS. The training shall be oriented to the specific system being installed under this contract including central processor. Training manuals shall be delivered for each trainee with two additional copies delivered for archiving at the project site. The manuals shall include an agenda, defined objectives for each lesson, and a detailed description of the subject matter for each lesson. The contractor shall furnish audiovisual equipment and other training materials and supplies as necessary. Where the contractor presents portions of the course by audiovisual material, copies of the audiovisual Access Control System Section 281300 Page 16

material shall be delivered to the owner on the same media as that used during the training session. Up to 16 hours of training shall be provided for in the base contract. B. Classroom training shall be available to end-operators at the manufacturer s facility. The training shall offer hands on instruction that allows each student to perform specific tasks using the ACS. The training shall be structured so that Operators and Administrators of the ACS receive the appropriate level of training. Types of courses offered by the manufacturer shall include: ACS hardware installation and troubleshooting, fundamental of LAN/WAN networking, operations and administration on all ACS applications. C. On-site training from the manufacturer shall also be available upon Owner s request. The security Contractor will have make arrangements for travel and training costs. Any costs to the Owner will be presented as soon as possible in the process. The training will include [xx] hours, for all personal, general operation staff, managers, system administrators I. 9. SUPPORT AND SERVICE A. Warranty and Support 1. The Security Contractor shall warrant the ACS both Labor and Parts for [one] [(1)] year from the date of final system acceptance. The Security contractor will also provide the owner pricing for years [2-5] and discuss the extended warranty programs at the time of finial acceptance. 2. The contractor shall provide all services required and equipment necessary to maintain the entire ACS in an operational state as specified for a period of [one] [(1)] year after formal written acceptance of the system, and shall provide all necessary material required for performing scheduled adjustments or other nonscheduled work. 3. The Security Contractor shall be available during the warranty period to answer programming and application questions to support Owner s personnel during this period. # 4 is an Optional Statement 4. [The Security Contractor shall have capability to have a remote System Access for programming the intelligent field controller to support the Owner s personnel during the warranty period. The Owner s system shall include VPN or Remote Network Connection to support this remote service and support.] B. Service Personnel 1. Service personnel shall be qualified to accomplish all work promptly and satisfactorily. Provide proof that Service personnel have successfully completed the appropriate level of both hardware and software training offered by the system manufacturer. The owner shall be advised in writing of the name of the designated service representative s and of any change in personnel during the installation process. C. Inspections 1. During the warranty period, the Security Contractor shall perform two inspections at [six] [(6)] month intervals. This work shall be performed during regular working hours, Monday through Friday, excluding holidays. These inspections shall include: Access Control System Section 281300 Page 17

a) Visual checks and operational tests of the Pinnacle Server, local Work Stations, monitors, keyboards, system printers, peripheral equipment, ACS Controllers, power supplies, battery s, and electrical and mechanical locks and controls. b) Clean system equipment, including interior and exterior surfaces. c) Perform diagnostics on all equipment, battery voltage, check and calibrate each ACS device as needed. d) Run system software and correct diagnosed problems, check that back-ups are being preformed as scheduled, and check database log for any errors. e) Resolve previous outstanding problems, and provide owner with a signed check list. D. Emergency Service 2. The owner shall initiate service calls when the ACS is not functioning properly. Qualified personnel shall be available to provide service to the complete ACS. The owner shall be furnished with the telephone number where the contractor s service supervisor can be reached at all times. Service personnel shall be at the site within [four] [(4)] hours after receiving a request for service. The ACS shall be restored to proper operating condition after [one] [(1)] calendar day. END OF SECTION 281300 Access Control System Section 281300 Page 18