VA 28 13 16-2011 PHYSICAL ACCESS CONTROL SYSTEM AND DATABASE MANAGEMENT.pdf

上传人:hopesteam270 文档编号:1075002 上传时间:2019-04-06 格式:PDF 页数:19 大小:174.22KB
下载 相关 举报
VA 28 13 16-2011 PHYSICAL ACCESS CONTROL SYSTEM AND DATABASE MANAGEMENT.pdf_第1页
第1页 / 共19页
VA 28 13 16-2011 PHYSICAL ACCESS CONTROL SYSTEM AND DATABASE MANAGEMENT.pdf_第2页
第2页 / 共19页
VA 28 13 16-2011 PHYSICAL ACCESS CONTROL SYSTEM AND DATABASE MANAGEMENT.pdf_第3页
第3页 / 共19页
VA 28 13 16-2011 PHYSICAL ACCESS CONTROL SYSTEM AND DATABASE MANAGEMENT.pdf_第4页
第4页 / 共19页
VA 28 13 16-2011 PHYSICAL ACCESS CONTROL SYSTEM AND DATABASE MANAGEMENT.pdf_第5页
第5页 / 共19页
点击查看更多>>
资源描述

1、9-11 28 13 16 - 1 SECTION 28 13 16 PHYSICAL ACCESS CONTROL SYSTEM AND DATABASE MANAGEMENT SPEC WRITER NOTE: Delete between /_/if not applicable to project. Also delete any other item or paragraph not applicable in the section and renumber the paragraphs. PART 1 GENERAL 1.1 DESCRIPTION A. This sectio

2、n specifies the finishing, installation, connection, testing and certification of a complete and fully operation Physical Access Control Database Management System, hereinafter referred to as the PACMS. B. This Section includes a Physical Security Access System Database Management consisting of data

3、base management software. Requirements for hardware supporting database management are described in Section 28 13 00 PHYSICAL ACCESS CONTROL, Part 2. 1.2 RELATED WORK SPEC WRITER NOTE: Delete any item or paragraph not applicable in the section and renumber the paragraphs. A. Section 01 00 00 - GENER

4、AL REQUIREMENTS. For General Requirements. B. Section 28 05 00 COMMON WORK RESULTS FOR ELECTRONIC SAFETY AND SECURITY. Requirements for general requirements that are common to more than one section in Division 28. C. Section 28 05 13 - CONDUCTORS AND CABLES FOR ELECTRONIC SAFETY AND SECURITY. Requir

5、ements for conductors and cables. D. Section 28 05 26 - GROUNDING AND BONDING FOR ELECTRONIC SAFETY AND SECURITY. Requirements for grounding and bonding. E. Section 28 05 28.33 - CONDUITS AND BOXES FOR ELECTRONIC SAFETY AND SECURITY. Requirements for infrastructure. F. Section 28 08 00 - COMMISIONIN

6、G OF ELECTRONIC SAFETY AND SECURITY SYSTEMS. For requirements for commissioning and systems readiness checklists. G. Section 28 13 00 - PHYSICAL ACCESS CONTROL SYSTEM. Requirements for physical access control system. Provided by IHSNot for ResaleNo reproduction or networking permitted without licens

7、e from IHS-,-,-9-11 28 13 16 - 2 H. Section 28 13 53 - SECURITY ACCESS DETECTION. Requirements for screening of personnel and shipments. I. Section 28 16 00 - INTRUSION DETECTION SYSTEM (IDS). Requirements for alarm systems. J. Section 28 23 00 - VIDEO SURVEILLANCE. Requirements for security camera

8、systems. K. Section 28 26 00 - ELECTRONIC PERSONAL PROTECTION SYSTEM (EPPS). Requirements for emergency and interior communications. 1.3 QUALITY ASSURANCE A. The Contractor shall be responsible for providing, installing, and the operation of the Access Control System and Database Management as shown

9、. The Contractor shall also provide certification as required. B. The security system shall be installed and tested to ensure all components are fully compatible as a system and can be integrated with all associated security subsystems, whether the security system is stand-alone or a part of a Infor

10、mation Technology (IT) computer network. C. The Contractor or security sub-contractor shall be a licensed security Contractor as required within the state or jurisdiction of where the installation work is being conducted. D. The manufacturers of all hardware and software components employed in the S

11、MS shall be established vendors to the access control/security monitoring industry for no less than five (5) years and shall have successfully implemented at least 5 systems of similar size and complexity. E. Contractor / Integrator Qualifications 1. The security system integrator shall have been re

12、gularly engaged in the installation and maintenance of integrated access control systems and have a proven track record with similar systems of the same size, scope, and complexity. 2. The security system integrator shall supply information attesting to the fact that their firm is an authorized prod

13、uct integrator certified with the SMS. A minimum of one technician shall be a installer certified by the SMS manufacturer. 3. The security system integrator shall supply information attesting to the fact that their installation and service technicians are competent factory trained and certified Prov

14、ided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-9-11 28 13 16 - 3 personnel capable of maintaining the system and providing reasonable service time. 4. The security system integrator shall provide a minimum of three (3) references whose systems are of si

15、milar complexity and have been installed and maintained by the security system integrator in the last five (5) years. 5. There shall be a local representative and factory authorized local service organization that shall carry a complete stock of parts and provide maintenance for these systems. F. Se

16、rvice Qualifications: There shall be a permanent service organization maintained or trained by the manufacturer which will render satisfactory service to this installation within / four / / eight / hours of receipt of notification that service is needed. Submit name and address of service organizati

17、ons. 1.4 SUBMITTALS SPEC WRITER NOTE: Delete and/or amend all paragraphs and sub-paragraphs and information as needed to ensure that only the documentation required is requested per the Request for Proposal (RFP). A. Submit below items in conjunction with Master Specification Sections 01 33 23, SHOP

18、 DRAWINGS, PRODUCT DATA, AND SAMPLES, and Section 02 41 00, DEMOLITION. B. Provide certificates of compliance with Section 1.3, Quality Assurance. C. Provide a pre-installation and as-built design package in both electronic format and on paper, minimum size 48 x 48 inches (1220mm x 1220mm); drawing

19、submittals shall be per the established project schedule. D. Pre-installation design and as-built packages shall include, but not be limited to: 1. Index Sheet that shall: a. Define each page of the design package to include facility name, building name, floor, and sheet number. b. Provide a list of

20、 all security abbreviations and symbols. c. Reference all general notes that are utilized within the design package. Provided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-9-11 28 13 16 - 4 d. Specification and scope of work pages for all security systems t

21、hat are applicable to the design package that will: 1) Outline all general and job specific work required within the design package. 2) Provide a device identification table outlining device Identification (ID) and use for all security systems equipment utilized in the design package. 2. Drawing she

22、ets that will be plotted on the individual floor plans or site plans shall: a. Include a title block as defined above. b. Define the drawings scale in both standard and metric measurements. c. Provide device identification and location. d. Address all signal and power conduit runs and sizes that are

23、 associated with the design of the electronic security system and other security elements (e.g., barriers, etc.). e. Identify all pull box and conduit locations, sizes, and fill capacities. f. Address all general and drawing specific notes for a particular drawing sheet. 3. A riser drawing for each

24、applicable security subsystem shall: a. Indicate the sequence of operation. b. Relationship of integrated components on one diagram. c. Include the number, size, identification, and maximum lengths of interconnecting wires. d. Wire/cable types shall be defined by a wire and cable schedule. The sched

25、ule shall utilize a lettering system that will correspond to the wire/cable it represents (example: A = 18 AWG/1 Pair Twisted, Unshielded). This schedule shall also provide the manufacturers name and part number for the wire/cable being installed. 4. A system drawing for each applicable security sys

26、tem shall: a. Identify how all equipment within the system, from main panel to device, shall be laid out and connected. b. Provide full detail of all system components wiring from point-to-point. Provided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-9-11 2

27、8 13 16 - 5 c. Identify wire types utilized for connection, interconnection with associate security subsystems. d. Show device locations that correspond to the floor plans. e. All general and drawing specific notes shall be included with the system drawings. 5. A schedule for all of the applicable s

28、ecurity subsystems shall be included. All schedules shall provide the following information: a. Device ID. b. Device Location (e.g. site, building, floor, room number, location, and description). c. Mounting type (e.g. flush, wall, surface, etc.). d. Power supply or circuit breaker and power panel n

29、umber. e. In addition, for the CCTV Systems, provide the camera ID, camera type (e.g. fixed or pan/tilt/zoom (P/T/Z), lens type (e.g. for fixed cameras only) and housing model number. 6. Detail and elevation drawings for all devices that define how they were installed and mounted. E. Pre-installatio

30、n design packages shall be reviewed by the Contractor along with a VA representative to ensure all work has been completed. All reviews shall be conducted in accordance with the project schedule. There shall be four (4) stages to the review process: 1. 35 percent 2. 65 percent 3. 90 percent 4. 100 p

31、ercent F. Provide manufacturer security system product cut-sheets. Submit for approval at least 30 days prior to commencement of formal testing, a Security System Operational Test Plan. Include procedures for operational testing of each component and security subsystem, to include performance of an

32、integrated system test. G. Submit manufactures certification of Underwriters Laboratories, Inc. (UL) listing as specified. Provide all maintenance and operating manuals per Section 01 00 00, GENERAL REQUIREMENTS. Provided by IHSNot for ResaleNo reproduction or networking permitted without license fr

33、om IHS-,-,-9-11 28 13 16 - 6 1.5 APPLICABLE PUBLICATIONS SPEC WRITER NOTE: Delete first paragraph below if stand alone specs. Delete rest of the subparagraphs if section 280500 is provided with the project. /A. Refer to 25 05 00 COMMON WORK RESULTS FOR ELECTRONIC SAFETY AND SECURITY, Part 1/ A. The

34、publications listed below (including amendments, addenda, revisions, supplement, and errata) form a part of this specification to the extent referenced. The publications are referenced in the text by the basic designation only. B. American National Standards Institute (ANSI)/ Security Industry Assoc

35、iation (SIA): AC-03 Access Control: Access Control Guideline Dye Sublimation Printing Practices for PVC Access Control Cards TVAC-01 CCTV to Access Control Standard - Message Set for System Integration C. American National Standards Institute (ANSI)/ International Code Council (ICC): A117.1 . Standa

36、rd on Accessible and Usable Buildings and Facilities D. Department of Justice American Disability Act (ADA) 28 CFR Part 36 . 2010 ADA Standards for Accessible Design E. Federal Communications Commission (FCC): (47 CFR 15) Part 15 Limitations on the Use of Wireless Equipment/Systems F. Government Acc

37、ountability Office (GAO): GAO-03-8-02Security Responsibilities for Federally Owned and Leased Facilities G. National Electrical Contractors Association 303-2005 . Installing Closed Circuit Television (CCTV) Systems H. National Electrical Manufactures Association (NEMA): 250-08 . Enclosures for Elect

38、rical Equipment (1000 Volts Maximum) I. National Fire Protection Association (NFPA): Provided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-9-11 28 13 16 - 7 70-11 National Electrical Code J. Underwriters Laboratories, Inc. (UL): 294-99 . The Standard of Sa

39、fety for Access Control System Units 305-08 . Standard for Panic Hardware 639-97 . Standard for Intrusion-Detection Units 752-05 . Standard for Bullet-Resisting Equipment 827-08 . Central Station Alarm Services 1076-95 Standards for Proprietary Burglar Alarm Units and Systems 1981-03 Central Station

40、 Automation System 2058-05 High Security Electronic Locks K. Homeland Security Presidential Directive (HSPD): HSPD-12 Policy for a Common Identification Standard for Federal Employees and Contractors L. Federal Information Processing Standards (FIPS): FIPS-201-1 . Personal Identity Verification (PIV

41、) of Federal Employees and Contractors M. National Institute of Standards and Technology (NIST): IR 6887 V2.1 . Government Smart Card Interoperability Specification (GSC-IS) Special Pub 800-37 . Guide for Applying the Risk Management Framework to Federal Information Systems Special Pub 800-63 . Elec

42、tronic Authentication Guideline Special Pub 800-73-3 . Interfaces for Personal Identity Verification (4 Parts) . Pt. 1- End Point PIV Card Application Namespace, Data Model Contactless Provided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-9-11 28 13 16 - 9

43、 Proximity Cards Operating at 13.56 MHz in up to 5 inches distance 15693 Identification cards - Contactless integrated circuit cards - Vicinity cards; Contactless Vicinity Cards Operating at 13.56 MHz in up to 50 inches distance 19794 Information technology - Biometric data interchange formats O. Un

44、iform Federal Accessibility Standards (UFAS) 1984 P. Section 508 of the Rehabilitation Act of 1973 1.6 WARRANTY OF CONSTRUCTION. A. Warrant PACMS work subject to the Article “Warranty of Construction” of FAR clause 52.246-21 and Section 280500. B. Demonstration and training shall be performed prior

45、to system acceptance. PART 2 PRODUCTS Spec Note: Delete or amend all paragraphs and sub-paragraphs as needed to ensure that only the equipment required per the Request for Proposal (RFP) is provided. 2.1 SYSTEM DATABASE A. Database and database management software shall be HSPD-12 and FIPS compliant

46、. Database and database management software shall define and modify each point in database using operator commands. Definition shall include parameters and constraints associated with each system device. B. Database Operations: 1. System data management shall be in a hierarchical menu tree format, w

47、ith navigation through expandable menu branches and manipulated with use of menus and icons in a main menu and system toolbar. 2. Navigational Aids: a. Toolbar icons for add, delete, copy, print, capture image, activate, deactivate, and muster report. b. Point and click feature to facilitate data ma

48、nipulation. Provided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-9-11 28 13 16 - 10 c. Next and previous command buttons visible when editing database fields to facilitate navigation from one record to the next. d. Copy command and copy tool in the toolba

49、r to copy data from one record to create a new similar record. 3. All data entry shall be automatically checked for duplicate and illegal data and shall verify that data are in a valid format. 4. Provide a memo or note field for each item that is stored in database, allowing the storing of information about any defining characteristics

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 标准规范 > 国际标准 > 其他

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1