ImageVerifierCode 换一换
格式:PDF , 页数:131 ,大小:8.94MB ,
资源ID:430227      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-430227.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ANSI 005-2016 Electronic Safety and Security (ESS) System Design and Implementation Best Practices.pdf)为本站会员(赵齐羽)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ANSI 005-2016 Electronic Safety and Security (ESS) System Design and Implementation Best Practices.pdf

1、 ANSI/BICSI 005-2016 Electronic Safety and Security (ESS) System Design and Implementation Best Practices Committee Approval: April 2016 First Published: May 2016 i BICSI International Standards BICSI international standards contain information deemed to be of technical value to the industry and are

2、 published at the request of the originating committee. The BICSI International Standards Program subjects all of its draft standards to a rigorous public review and comment resolution process, which is a part of the full development and approval process for any BICSI international standard. The BIC

3、SI International Standards Program reviews its standards at regular intervals. By the end of the fifth year after a standards publication, the standard will be reaffirmed, rescinded, or revised according to the submitted updates and comments from all interested parties. Suggestions for revision shou

4、ld be directed to the BICSI International Standards Program, care of BICSI. Copyright This BICSI document is a standard and is copyright protected. Except as permitted under the applicable laws of the users country, neither this BICSI standard nor any extract from it may be reproduced, stored in a r

5、etrieval system or transmitted in any form or by any means, electronic, photocopying, recording, or otherwise, without prior written permission from BICSI being secured. Requests for permission to reproduce this document should be addressed to BICSI. Reproduction may be subject to royalty payments o

6、r a licensing agreement. Violators may be prosecuted. Published by: BICSI 8610 Hidden River Parkway Tampa, FL 33637-1000 USA Copyright 2015 BICSI All rights reserved Printed in U.S.A. ANSI/BICSI 005-2016 ii Notice of Disclaimer and Limitation of Liability BICSI standards and publications are designe

7、d to serve the public interest by offering information communication and technology systems design guidelines and best practices. Existence of such standards and publications shall not in any respect preclude any member or nonmember of BICSI from manufacturing or selling products not conforming to s

8、uch standards and publications, nor shall the existence of such standards and publications preclude their voluntary use, whether the standard is to be used either domestically or internationally. By publication of this standard, BICSI takes no position respecting the validity of any patent rights or

9、 copyrights asserted in connection with any item mentioned in this standard. Additionally, BICSI does not assume any liability to any patent owner, nor does it assume any obligation whatever to parties adopting the standard or publication. Users of this standard are expressly advised that determinat

10、ion of any such patent rights or copyrights, and the risk of infringement of such rights, are entirely their own responsibility. This standard does not purport to address all safety issues or applicable regulatory requirements associated with its use. It is the responsibility of the user of this sta

11、ndard to review any existing codes and other regulations recognized by the national, regional, local, and other recognized authorities having jurisdiction (AHJ) in conjunction with the use of this standard. Where differences occur, those items listed within the codes or regulations of the AHJ supers

12、ede any requirement or recommendation of this standard. All warranties, express or implied, are disclaimed, including without limitation, any and all warranties concerning the accuracy of the contents, its fitness or appropriateness for a particular purpose or use, its merchantability and its non-in

13、fringement of any third partys intellectual property rights. BICSI expressly disclaims any and all responsibilities for the accuracy of the contents and makes no representations or warranties regarding the contents compliance with any applicable statute, rule, or regulation. BICSI shall not be liabl

14、e for any and all damages, direct or indirect, arising from or relating to any use of the contents contained herein, including without limitation any and all indirect, special, incidental, or consequential damages (including damages for loss of business, loss of profits, litigation, or the like), wh

15、ether based upon breach of contract, breach of warranty, tort (including negligence), product liability or otherwise, even if advised of the possibility of such damages. The foregoing negation of damages is a fundamental element of the use of the contents hereof, and these contents would not be publ

16、ished by BICSI without such limitations. Electronic Safety and Security (ESS) System Design and Implementation Best Practices iii TABLE OF CONTENTS PREFACE . xi 1 Introduction 1 1.1 General 1 1.2 Purpose 1 1.3 Categories of Criteria . 1 2 Scope . 2 3 Required Standards and Documents 3 4 Definitions,

17、 Acronyms, Abbreviations, and Units of Measurement 5 4.1 Definitions . 5 4.2 Acronyms and Abbreviations 9 4.3 Units of Measurement 10 5 Telecommunications Infrastructure 11 5.1 Overview . 11 5.2 Topology 11 5.2.1 Star Topology . 11 5.2.2 Non-Star Topologies . 11 5.3 Spaces 12 5.3.1 Equipment Rooms 1

18、2 5.3.2 Telecommunications Rooms and Telecommunications Enclosures . 14 5.4 Cabling 15 5.4.1 Backbone Cabling. 15 5.4.2 Horizontal Cabling . 15 5.4.3 Horizontal Connection Point (HCP) . 19 5.4.4 Power over Ethernet (PoE) . 20 5.5 Cabling Pathways . 21 5.5.1 Requirements 21 5.5.2 Enclosures, Pull Box

19、es and Splice Boxes . 21 5.5.3 ESS Pathway Redundancy 21 5.5.4 ESS Pathways between Telecommunications Spaces within a Building 21 5.5.5 ESS Campus Pathways Between Buildings 22 5.5.6 ESS Pathways Serving Equipment Outlets . 22 5.5.7 ESS Pathway Separation from Power and EMI Sources 22 5.5.8 ESS Pat

20、hway Bonding and Grounding . 23 5.5.9 Special Pathways and Spaces Considerations. 23 5.5.10 Secure Areas . 24 5.6 Telecommunications Outlet and Connectors . 24 5.6.1 Overview 24 5.6.2 Facility Connections by Modified Permanent Link Method 25 5.7 Cabling Installation Requirements . 26 5.7.1 Overview

21、26 5.7.2 Bonding and Grounding Considerations . 26 5.7.3 Transmission Performance Field Testing . 26 ANSI/BICSI 005-2016 iv 5.8 Administration and Documentation 28 5.8.1 Requirements 28 5.8.2 Recommendations . 28 5.9 ESS Device Mounting Heights . 28 5.9.1 Requirements 28 5.9.2 Recommendations . 29 5

22、.10 Infrastructure for Wireless Transmission 29 5.10.1 Requirements 29 5.10.2 Additional Information . 29 5.11 Coverage Area Planning and Density . 29 5.11.1 Introduction . 29 5.11.2 Recommendations . 29 6 Intrusion Detection Systems . 31 6.1 Overview 31 6.2 Developing an IDS 31 6.2.1 Requirements 3

23、1 6.2.2 Recommendations . 31 6.3 System Connectivity . 31 6.3.1 Wired Devices . 31 6.3.2 Wireless Devices . 32 6.4 Sensors . 32 6.4.1 Introduction . 32 6.4.2 Recommendations . 32 6.5 Notification 32 6.5.1 Requirements 32 6.5.2 Recommendations . 32 6.5.3 Additional Information . 33 6.6 Control Panel

24、33 6.6.1 Requirements 33 6.6.2 Recommendations . 33 6.7 Keypads and Annunciators 34 6.7.1 Requirements 34 6.7.2 Recommendations . 34 6.8 Initiating Devices 34 6.8.1 Overview . 34 6.8.2 Motion Sensors . 34 6.8.3 Window Sensors . 34 6.8.4 Door Status Sensors 35 6.8.5 Perimeter Sensors . 35 6.9 Optiona

25、l Integrated Equipment 35 6.9.1 Introduction . 35 6.9.2 Requirements 35 7 Video Surveillance . 37 7.1 Overview 37 7.2 Generation and Conformance with Use Cases . 37 7.2.1 Scene Characteristics 37 7.2.2 Observation as a Primary VSS Function . 38 7.2.3 Forensic Review as a Primary VSS Function . 38 7.

26、2.4 Recognition as a Primary VSS Function . 39 7.2.5 Additional VSS Functions 39 Electronic Safety and Security (ESS) System Design and Implementation Best Practices v 7.3 Device Groups and Interoperability . 40 7.3.1 Requirements 40 7.4 Device Categories . 40 7.4.1 Requirements 40 7.5 Use Cases . 4

27、1 7.5.1 Requirements 41 7.6 Open Network Video Interface Forum Conformance 41 7.6.1 Requirements 41 7.7 Deployment Process . 41 7.7.1 Requirements 41 7.7.2 Recommendations 42 7.8 Authentication of Network Video Cameras for Improved ESS Network Security 43 7.8.1 Requirements 43 8 Access Control Syste

28、ms 45 8.1 Overview . 45 8.2 System Structure 45 8.2.1 Overview 45 8.2.2 Central Equipment Processing (Level 1) 45 8.2.3 Computer Hardware and Software . 45 8.2.4 Server 45 8.2.5 Software 46 8.2.6 Backup 46 8.2.7 Event Recording . 46 8.2.8 Backup Power . 46 8.2.9 Access Control Workstation . 46 8.2.1

29、0 Badging System 47 8.2.11 Visitor Management . 47 8.3 Controllers for Intelligent Field Processing (Level 2) . 47 8.3.1 Overview 47 8.3.2 Controller Configurations . 47 8.4 Peripheral Devices (Level 3) 48 8.4.1 Overview 48 8.4.2 Relays . 48 8.4.3 Power Distribution 48 8.4.4 Readers . 49 8.4.5 Reque

30、st to Exit Devices 49 8.4.6 Door Contacts . 49 8.4.7 Electrified Door Hardware . 49 8.4.8 Fail-Secure/Fail-Safe/Fail Latched . 49 8.4.9 Power to Locks . 50 8.5 Credentials (Level 4) 51 8.5.1 Overview 51 8.5.2 Web-Enabled Access Control . 51 8.5.3 IP Card Readers 51 8.5.4 IP Controllers 51 8.5.5 Comm

31、unications . 51 8.5.6 Analog Communications 52 8.5.7 TCP/IP or Network Communications . 52 ANSI/BICSI 005-2016 vi 9 Fire Alarm Systems . 53 9.1 Introduction 53 9.1.1 Overview . 53 9.1.2 Recommendations . 54 9.2 Regulatory . 54 9.2.1 Overview . 54 9.3 Risk Assessment 54 9.3.1 Overview . 54 9.3.2 Requ

32、irements 54 9.3.3 Recommendations . 55 9.4 Fire Alarm Systems 55 9.4.1 Introduction . 55 9.4.2 Control Panel 55 9.4.3 Detection/Initiation . 56 9.4.4 Notification Appliances 56 9.5 Communications Systems 57 9.5.1 Overview . 57 9.5.2 Requirements 57 9.5.3 Recommendations. 57 9.6 Pathways 58 9.6.1 Int

33、roduction . 58 9.6.2 Class N 58 9.6.3 Class N Cabling 60 9.7 Circuits 60 9.7.1 Overview . 60 9.7.2 Requirements 61 9.7.3 Recommendations . 61 9.8 Monitoring and Supervision 61 9.8.1 Overview . 61 9.8.2 Requirements 62 9.8.3 Recommendations . 62 9.9 Power over Ethernet (PoE) Implementation 62 9.9.1 O

34、verview . 62 9.9.2 Requirements 62 9.9.3 Recommendations . 62 9.10 Class N Operations and Maintenance . 62 9.10.1 Overview . 62 9.10.2 Requirements 62 9.10.3 Recommendations . 62 9.11 As-Built Drawings and Related Documentation 62 9.11.1 Overview . 62 9.11.2 Requirements 62 9.11.3 Recommendations .

35、62 10 Integrated Systems 63 10.1 Overview 63 10.2 ESS Integrated Services, Design and Integration 63 10.2.1 Public Network Services . 63 10.2.2 Design and Selection of Components . 64 10.2.3 ESS Integration . 64 Electronic Safety and Security (ESS) System Design and Implementation Best Practices vii

36、 10.3 ESS Components 64 10.3.1 Overview 64 10.3.2 Intrusion Detection System. 64 10.3.3 Access Control System . 65 10.3.4 Video Surveillance System . 65 10.3.5 Physical Security Information Management System 65 10.3.6 Sensor-Based System . 65 10.3.7 Building Automation System . 65 10.3.8 Location Sy

37、stem . 65 10.3.9 Global Positioning System . 67 10.3.10 Automated Infrastructure Management (AIM) with other ESS systems 67 10.3.11 Software 68 10.4 System Configuration and Expandability 69 10.4.1 Overview 69 10.4.2 Input/Output Matrix 69 10.4.3 Maps and Icons . 69 10.4.4 System Response Times . 70

38、 10.4.5 System Expansion Capability . 70 10.5 ESS Integration Process . 70 10.5.1 Overview 70 10.5.2 Integration Process Team Members . 70 10.5.3 Integration Process . 71 11 Risk Management and Risk Assessment 75 11.1 Introduction 75 11.2 Requirements 75 11.3 Additional Information 75 12 Commissioni

39、ng 77 12.1 Overview . 77 12.2 Documentation 77 12.2.1 Overview 77 12.2.2 Requirements 77 12.3 Cleaning 78 12.3.1 Overview 78 12.3.2 Requirements 78 12.3.3 Recommendations 78 12.4 Labeling Components 78 12.4.1 Requirements 78 12.4.2 Recommendations 78 12.5 Testing . 78 12.5.1 Acceptance Testing Plan.

40、 78 12.5.2 System Testing . 78 12.5.3 Acceptance Testing . 79 12.5.4 Retesting Equipment and Systems 80 12.5.5 Warranty Periods 80 12.6 Additional Commissioning Tasks . 80 12.7 Training . 81 Appendix A Cabling Pathways (Normative) 83 A.1 Overview . 83 A.2 Types of Cabling Pathways . 83 A.3 General I

41、nstallation Practices . 91 ANSI/BICSI 005-2016 viii Appendix B Electronic Safety and Security (ESS) Design Fundamentals (Informative) 92 B.1 Introduction 93 B.2 Elements 93 B.3 Types of Projects . 94 B.4 Current and Future Trends in Safety and Security. 94 B.5 Electronic Safety and Security System D

42、evelopment Basics. 95 Appendix C Wireless Transmission (Informative) 97 C.1 Overview 97 C.2 Radio Frequency Transmission . 97 C.3 Free Space Optics . 97 C.4 Licensed Microwave Radio Transmission 98 C.5 Frequency Selection 98 Appendix D Cloud Computing (Informative) . 99 D.1 Overview 99 D.2 Services

43、99 D.3 Infrastructure Management of Cloud Services 101 D.4 Selecting an Infrastructure Management Model . 102 D.5 Cloud Deployment Models . 103 D.6 Delivering Secure Services . 103 D.7 Trends 104 Appendix E System Training (Informative) . 105 E.1 Overview 105 E.2 Sessions 105 E.3 Position or Task Tr

44、aining 105 E.4 Training Schedules . 107 Appendix F ESS Operations and Maintenance (Informative) 109 F.1 Operation Best Practices 109 F.2 Maintenance Plan Recommendations . 110 F.3 Service Contracts 110 Appendix G Related Documents (Informative) . 113 Electronic Safety and Security (ESS) System Desig

45、n and Implementation Best Practices ix INDEX OF FIGURES Section 5 Telecommunications Infrastructure Figure 5-1 Hierarchical Star Topology . 11 Figure 5-2 Examples of Non-star Topologies . 12 Figure 5-3 Optical Fiber Cabling With Media Converters . 18 Figure 5-4 Configuration Examples for Using Hybri

46、d Copper/Optical Fiber Cable to Connect an ESS Device . 19 Figure 5-5 Example of a Horizontal Connection Point Within a Star Topology 20 Figure 5-6 Example Locations of User-Administered and Facility Connection Telecommunications Outlets 25 Figure 5-7 Examples of Facility Connections Using a Modifie

47、d Permanent Link . 25 Figure 5-8 Configuration 1: Single Connector Modified Permanent Link Set Up for a Modified Permanent Link Without a Consolidation Point 27 Figure 5-9 Configuration 2: Single Connector Modified Permanent Link Set Up for a Modified Permanent Link With a Consolidation Point . 28 S

48、ection 8 Access Control Systems Figure 8-1 Form A, B and C Relays . 48 Section 9 Fire Alarm Systems Figure 9-1 Basic Fire Alarm System. 53 Section 10 Integrated Systems Figure 10-1 Sample Physical Security Information Management System 66 INDEX OF TABLES Section 5 Telecommunications Infrastructure T

49、able 5-1 Recommended Cross-Connect Color Codes For Use at Cabling Distributors 13 Table 5-2 Media Selection Criteria 16 Table 5-3 Balanced Twisted-Pair Cabling Frequency Range of Interest and Associated Applications 17 Table 5-4 Typical Coverage Area for Each ESS Link . 30 Section 6 Intrusion Detection Systems Table 6-1 Detection Sensor Technology and Application . 32 Appendix A Cabling Pathways (Normative) Table A-1 Balanced Twisted-Pair Cabling Bend Radius and Pulling Tension Requirements . 84 Table A-2 Opti

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1