Loading...
HomeMy WebLinkAbout28-1100-Intrusion-Detection-System_Rev_0Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 1. February 3, 2021 28 1100 Intrusion Detection System i of i SECTION 28 1100 INTRUSION DETECTION SYSTEM (sub-contract to ELECTRICAL DIVISION 26) PART 1 – GENERAL 1.01 FILED SUB-BID REQUIREMENTS .............................................................................................. 1 1.02 RELATED DOCUMENTS ............................................................................................................. 1 1.03 SUMMARY .................................................................................................................................... 1 1.04 RELATED SECTIONS .................................................................................................................. 2 1.05 DEFINITIONS................................................................................................................................ 3 1.06 REFERENCES .............................................................................................................................. 3 1.07 COORDINATION .......................................................................................................................... 4 1.08 COORDINATION DRAWINGS ..................................................................................................... 4 1.09 PROJECT MEETINGS .................................................................................................................. 5 PART 2 - PRODUCTS 2.01 GENERAL ..................................................................................................................................... 5 2.02 INTRUSION DETECTION SYSTEM AND DURESS/PANIC SYSTEM ........................................ 6 2.03 REFERENCES AND STANDARDS FOR THE INTRUSION DETECTION SYSTEM .................. 7 2.04 QUALITY ASSURANCE ............................................................................................................... 7 2.05 GENERAL SYSTEM DESCRIPTION ........................................................................................... 8 2.06 SYSTEM INTERFACE REQUIREMENTS .................................................................................. 15 2.07 FIELD DEVICES AND SENSORS .............................................................................................. 16 2.08 MODULES AND ALARM KEYPAD ............................................................................................. 19 PART 3 - EXECUTION 3.01 GENERAL ................................................................................................................................... 20 3.02 EXAMINATION............................................................................................................................ 20 3.03 FIELD QUALITY CONTROL ....................................................................................................... 21 3.04 SYSTEM CONFIGURATION PREPARATION ........................................................................... 21 3.05 ADJUSTING ................................................................................................................................ 22 3.06 DEMONSTRATION ..................................................................................................................... 23 3.07 PROTECTION ............................................................................................................................. 23 3.08 TESTING ..................................................................................................................................... 23 3.09 TRAINING ................................................................................................................................... 23 3.10 CLOSE-OUT AND WARRANTY ................................................................................................. 23 3.11 SPECIAL CONDITIONS PROGRAMMING ................................................................................ 23 3.12 ELECTRONIC SECURITY SYSTEM TESTING, TRAINING, CLOSEOUT & WARRANTY ....... 24 3.13 IDENTIFICATION AND TAGGING ............................................................................................. 24 3.14 DATABASE PREPARATION, CHECKING AND ACTIVATION .................................................. 24 3.15 START-UP RESPONSIBILITY .................................................................................................... 25 3.16 PRELIMINARY INSPECTION, TESTING AND COMMISSIONING ........................................... 25 3.17 FINAL PROCEDURES ................................................................................................................ 25 3.18 NOTICE OF COMPLETION ........................................................................................................ 25 Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 1. February 3, 2021 28 1100 Intrusion Detection System 1 of 25 SECTION 28 1100 INTRUSION DETECTION SYSTEM (sub-contract to ELECTRICAL DIVISION 26) PART 1 - GENERAL 1.01 FILED SUB-BID REQUIREMENTS A. Filed Sub-Sub-Bid Requiring a Paragraph “E” LISTING on the FORM FOR SUB-BID required per M.G.L. Chapter 149 Section 44A to 44L, as amended to date. The Electrical Subcontractor shall be responsible for all related building preparation and coordination, see specification for additional Paragraph “E” Listing requirements of the Listed Systems Contractor, and coordination of responsibilities. B. Section 28 0000 “ELECTRONIC SECURITY SYSTEM GENERAL”, Section 28 1000 “ELECTRONIC ACCESS CONTROL SYSTEM”, Section 28 1100 “INTRUSION DETECTION SYSTEM”, Section 28 1200 “INTERCOM AND EMERGENCY PHONE SYSTEM”, Section 28 2000 “ELECTRONIC VIDEO MANAGEMENT SYSTEM”, and Section 28 4000 “ELECTRONIC SECURITY SYSTEMS TESTING, TRAINING, CLOSEOUT AND WARRANTY” shall be a Filed Sub-Sub Bid of Section 26 0000 “ELECTRICAL”, requiring a Paragraph “E” Listing on the FORM FOR SUB-BID. C. The work in this is Section shall be provided by a trained and certified Company (or Security Subcontractor) in the Systems they are providing. D. The Security Subcontractor shall be DCAMM Certified by the state of Massachusetts Division of Capital Asset Management and Maintenance, in the category of: ALARM SYSTEMS, and shall hold a current S-License per the requirements of the Commonwealth of Massachusetts. E. A single Security Subcontractor shall be responsible for the DIV28 contract in its entirety as included in these contract documents. 1.02 RELATED DOCUMENTS A. Drawings and general provisions of the Contract, including General and Supplementary Conditions and other Division 01 Specification Sections, apply to these sections. B. Security General Requirements as outlined in Section 28 0000 are applicable to these sections. C. These Specification Sections and contract documents shall be in accordance with Section 28 0000 “ELECTRONIC SECURITY SYSTEMS GENERAL”, Section 28 1000 “ELECTRONIC ACCESS CONTROL SYSTEM”, Section 28 1200 “INTERCOM AND EMERGENCY PHONE SYSTEMS”, Section 28 4000 “VIDEO SURVEILLENCE SYSTEMS” and Section 28 4000 “ELECTRONIC SECURITY SYSTEMS TESTING, TRAINING, CLOSEOUT & WARRANTY” 1.03 SUMMARY A. This Specification Section 28 1100 includes the furnishing, installation and programming of the following: 1. Intrusion Detection System Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 1. February 3, 2021 28 1100 Intrusion Detection System 2 of 25 2. Panic and Duress System B. The Security Subcontractor shall provide, install, program and warranty all components to provide new complete and functional Intrusion Detection and Panic and Duress Systems. All components to be new and unused. All materials, obviously a part of the electronic safety and security infrastructure and necessary to its proper operation, but not specifically mentioned or shown on the Drawings, shall be furnished and installed without any additional charge. C. The Security Subcontractor to provide programming for the Intrusion Detection System and the Panic and Duress Systems to call out to a designated third-party monitoring company and a list of identified Dennis-Yarmouth District personnel. D. The Security Subcontractor to provide all input/output modules, equipment and programming to perform the required functions in this contract associated with special school conditions such as but not limited to: 1. Shelter in Place 2. Evacuation 3. Lock Down And the Associated trigger functions 1. Door Hold opens to release 2. Trigger previously recorded messages or other functions 3. Blue beacons on the exterior of the building to engage. E. The Security Subcontractor is to coordinate with the Architect and the General Contractor. F. The Drawings and Specifications are complementary to each other and what is called for by one shall be as binding as if it were called for by both. If a discrepancy exists the higher level of functionality shall be utilized. G. The Security Subcontractor shall coordinate work with that of all other trades affecting or affected by the work of this Section. Cooperate with such trades as to assure the steady progress of all work under the contract. H. The Security Subcontractor shall provide all necessary hardware, software, firmware, programming, mounting brackets, enclosures, backboards, power supplies, keypads, contacts, sensors, panels and controllers, wire, cable and conduit, batteries, relays and the like, to provide a fully functional Intrusion Detection, and Panic and Duress System. I. Related Requirements: 1. Section 01 3200 "Construction Progress Documentation" for preparing and submitting Security Subcontractor's construction schedule. 2. Section 01 7300 "Execution" for procedures for coordinating general installation and field- engineering services, including establishment of benchmarks and control points. 3. Section 01 7700 "Closeout Procedures" for coordinating closeout of the Contract. 4. Section 01 9113 "General Commissioning Requirements" for coordinating the Work with Owner's Commissioning Authority. 1.04 RELATED SECTIONS A. Division 01 B. Division 08 Door Hardware Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 1. February 3, 2021 28 1100 Intrusion Detection System 3 of 25 C. Division 26 Electrical D. Division 27 Communications E. 28 0000 Electronic Security Systems General F. 28 1000 Electronic Access Control System G. 28 1200 Intercom and Emergency Phone System H. 28 2000 Video Management System I. 28 4000 Electronic Security Systems Testing, Training, Closeout & Warranty 1.05 DEFINITIONS A. BIM: Building Information Modeling. B. RFI: Request for Information. Request from Owner, General Contractor, Architect, or Security Subcontractor seeking information required by or clarifications of the Contract Documents. C. ACS: Access Control System D. IDS: Intrusion Detection System E. ICS: Intercom System F. EPS: Emergency Phone System G. VMS: Video Management System H. ESS: Electronic Security System I. Credential: Data assigned to an entity and used to identify that entity J. Additional Terms: 1. "Furnish" - Purchase and deliver to the project site complete with every necessary appurtenance and support, all as part of the Work. Purchasing shall include payment of all sales taxes and other surcharges as may be· required to assure that purchased items are free of all liens, claims, or encumbrances. 2. "Install" - Unload at the delivery point at the site and perform every operation necessary to establish secure mounting and correct operation at the proper location in the project, all as part of the Work. 3. "New" - Manufactured within the past year and never before used. 4. “Provide”: As used herein shall mean furnish, install, commission (if not under contract of a commissioning agent), test, close out and warranty complete. 5. “Infrastructure”: As used herein shall mean cable, conduit, and raceway with all required boxes, fittings, connectors, and accessories; completely installed. 1.06 REFERENCES A. All work shall be in accordance with, but not limited to, the following: Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 1. February 3, 2021 28 1100 Intrusion Detection System 4 of 25 1. The National Electrical Code 2. American National Standards Institute (ANSI) 3. National Electrical Manufacturers Association (NEMA) 4. Telecommunications Industries Association (TIA) 5. Institute of Electrical & Electronics Consultants (IEEE) 6. Underwriters Laboratories (UL) 7. Federal Communications Commission (FCC) 8. Occupational Safety and Health Administration (OSHA) 9. Americans with Disabilities Act (ADA) 10. Local city and county ordinances B. In the event of conflict of code, the more stringent shall apply. 1.07 COORDINATION A. Coordinate with the Architect, General Contractor, Division 8 and Division 26 Contractor to ensure that adequate power has been provided and properly located for all Electronic Security System equipment. B. Coordinate locations of all devices with the Architect prior to installation. C. Coordinate and verify the location of wall mounted panel equipment and keypads with the Architect. D. Coordinate finishes and colors of all equipment with the Architect. E. Certain applications and Architectural Treatments require in the field decisions, the Security Subcontractor shall coordinate in the field as needed. F. Coordinate construction operations included in different Sections of the Specifications to ensure efficient and orderly installation of each part of the Work. Coordinate construction operations included in different Sections that depend on each other for proper installation, connection, and operation. G. Each contractor shall cooperate with Project coordinator, who shall coordinate its construction operations with those of other contractors, trades and entities to ensure efficient and orderly installation of each part of the Work. 1.08 COORDINATION DRAWINGS A. Prepare coordination drawings according to requirements in individual Sections, and additionally where installation is not completely indicated on Shop Drawings, where limited space availability necessitates coordination, or if coordination is required to facilitate integration of products and materials fabricated or installed by more than one entity. 1. The Architect shall review coordination drawings to confirm that, in general, the Work is being coordinated, but not for the details of the coordination, which are Security Subcontractor's responsibility. If Architect determines that coordination drawings are not being prepared in sufficient scope or detail, or are otherwise deficient, Architect will so inform Security Subcontractor, who shall make suitable modifications and resubmit. 2. Prepare coordination drawing prints according to requirements in "Submittal Procedures." B. Coordination Drawing Process: Prepare coordination drawings in the following manner: Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 1. February 3, 2021 28 1100 Intrusion Detection System 5 of 25 1. Schedule submittal and review of Fire Sprinkler, Plumbing, HVAC, and Electrical Shop Drawings to make required changes prior to preparation of coordination drawings. Ensure no conflicts. 2. Each trade shall be provided a separate color for identifying conflicts. 3. The Electrical Subcontractor shall provide service and feeder conduit runs and equipment to the Security Subcontractor. Electrical Subcontractor shall forward drawing files to Electronic Safety and Security Subcontractor. 4. The Communications and Electronic Safety and Security Subcontractor shall indicate cable trays and back planes, and equipment needed by other trades. Electronic Safety and Security Subcontractor shall forward completed drawing files to General Contractor or Construction Manager. 5. The Security Subcontractor shall perform a final coordination review, and as each coordination drawing is completed, Security Subcontractor shall meet with Architect and the General Contractor to review and resolve conflicts on the coordination drawings. 1.09 PROJECT MEETINGS A. The General Contractor shall schedule and conduct meetings and conferences at Project site unless otherwise indicated. B. The Security Subcontractor shall attend all meeting as required by the General Contractor or Construction Manager. PART 2 - PRODUCTS 2.01 GENERAL A. The product section herein contains lists of acceptable products based either on a prior approved proprietary product or a manufacturer’s product, and identifies the functional requirements of that system component. Products that have not been identified as proprietary allow for “AS EQUAL” products. B. The Intrusion Detection Manufacturer shall be in business for no less than 15 years manufacturing Intrusion Detection Systems and non-proprietary Panels that will function with multiple manufacturers field devices that include door contacts/sensors, motion sensors, glass breaks, panic or duress buttons and other common field devices. C. The Intrusion Detection System Manufacturer must provide detailed information regarding their cybersecurity practices and hardening of Intrusion Detection Systems and devices if the system is a networked system. Unacceptable cybersecurity practices by a manufacturer is grounds for dismissal of the manufacturer and product. D. All products shall have UL Listing that is clearly marked on the component. E. All product shall be new and unused, and shall have, if needed, the latest software/firmware version that has been actively utilized in the field on a site for no less than two (2) year. No “X.0” versions shall be allowed. F. The Owner shall have the final decision regarding change in function or aesthetics. Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 1. February 3, 2021 28 1100 Intrusion Detection System 6 of 25 G. The Security Subcontractor shall work with, and coordinate with, the all-other trades that require inputs, outputs and devices to enable specific School Incident functions within the contract documents. These connections to the additional system components are required to be integrated for complete function in the named School Incident function requirements. H. The Security Subcontractor shall coordinate with and ensure that the DIV26 and DIV8 contract drawings include all required sensors, keypads, panels, conduit to door and device locations, conduit to appropriate closets, device back boxes and hardware required for Intrusion Detection installation, programming and function. I. The Security Subcontractor shall coordinate with the DIV26 vendor and requirements for Fire System locking/unlocking function power per NFPA/the fire code. 2.02 INTRUSION DETECTION SYSTEM AND DURESS/PANIC SYSTEM A. System Description 1. The Intrusion Detection System shall be a functionally complete, integrated Intrusion Detection System per manufacturer's guidelines, codes and specification requirements, with reporting of sensors and providing specific trigger functions. Duress and Panic devices shall be integrated, and incorporated to perform specific School Incident alerting functions. 2. The Intrusion Detection System shall include an Intrusion Detection Control Panel with built-in, supervised telephone line interface for dial out to a third-party monitoring company and a designated list of School personnel. 3. The Intrusion Detection System shall include recording and retention of event information in a dedicated event log. 4. The Intrusion Detection System shall incorporate an integral real-time clock, calendar, and a test timer. 5. The Intrusion Detection System shall incorporate battery charging capabilities with supervision of battery voltage and battery leads. 6. The Intrusion Detection System shall include keypads that will arm/disarm the Intrusion Detection System. 7. The Intrusion Detection System shall accommodate a time / event-based scheduling system. 8. The Intrusion Detection System shall be capable of supervision of peripheral devices and communications interfaces. 9. The Intrusion Detection System shall support the connection and reporting of intrusion, fire detection and access control devices to a remote Intrusion Detection Receiver (IDR). 10. The Intrusion Detection System shall accommodate configuration and operation of separate, independent areas. 11. The Intrusion Detection System shall accommodate hard-wired or wireless point expansion via expansion point interface modules and RF receivers. 12. The Intrusion Detection System shall have electrically supervised detection loops and power supplies with battery(s) maintenance. This supervision shall be programmable for the purposes of reporting this information to the IDR. 13. The Intrusion Detection System shall be capable of monitoring and switching to active telephone lines when trying to establish communications with the IDR and transmitting a report. 14. The Intrusion Detection System shall be capable of sending (manually or automatically) test and status reports to remote IDRs. 15. The Intrusion Detection System shall be able to accommodate test, diagnostics, and configuration programming functions locally or remotely via a portable programmer or a computer running the Remote Programming Software (RPS). Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 1. February 3, 2021 28 1100 Intrusion Detection System 7 of 25 16. The Intrusion Detection System shall annunciate alarm, trouble, service reminders, and other relevant system status messages in custom English text at the ACC. 2.03 REFERENCES AND STANDARDS FOR THE INTRUSION DETECTION SYSTEM A. National Electric Code, Article 760. B. National Fire Alarm Code (NFPA 72). C. Administrative Council for Terminal Attachments (ACTA): 1. ANSI/TIA-968-A-2002 Technical Requirements for Connection of Terminal Equipment to the Telephone Network. D. American National Standards Institute (ANSI): 1. ANSI C63.4 Methods of Measurement of Radio-Noise Emissions from Low-Voltage Electrical and Electronic Equipment in the Range of 9 kHz to 40 GHz. E. Federal Communications Commission (FCC): 1. Title 47 C.F.R. Part 15; Class B – Radiated and Conducted Emissions. 2. Title 47 C.F.R. Part 68; rules governing the connection of Terminal Equipment (TE) to the Public Switched Telephone Network (PSTN). F. The National Institute of Standards and Technology of the United States of America (NIST): 1. Federal Information Processing Standards Publications 197 (FIPS 197) –Advanced Encryption Standard (AES). G. International Organization for Standardization (ISO): 1. 9001 - Quality System. H. Underwriters Laboratories, Inc. (UL): 1. UL 50 - Enclosures for Electrical Equipment. 2. UL 294 – Access Control System Units. 3. UL 365 - Police Station Connected Burglar Alarm Units and Systems. 4. UL 609 - Local Burglar Alarm Units and Systems. 5. UL 864 - Control Units System for Fire-Protective Signaling System. 6. UL 985 - Household Fire Warning System Units. 7. UL 1023 - Household Burglar Alarm System Units. 8. UL 1076 – Proprietary Burglar Alarm Units and Systems 9. UL 1610 - Central Station Burglar-Alarm Units. 10. UL 60950-1 - Information Technology Equipment - Safety. 11. UL 636 – Hold up alarms 2.04 QUALITY ASSURANCE A. Manufacturer Qualification: 1. The system shall be the standard product of one manufacturer, and the manufacturer shall have been in business manufacturing similar products for at least 5 years. 2. Manufacturer's Quality System: Registered to ISO 9001:2000 Quality Standard. B. Acceptable Manufacturer 1. Acceptable Manufacturer: Bosch Security Systems, Inc., DSC, ADI OR EQUAL. Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 1. February 3, 2021 28 1100 Intrusion Detection System 8 of 25 2.05 GENERAL SYSTEM DESCRIPTION A. Control Panel and Features: 1. The Intrusion Detection System control panel shall be Bosch Security Systems, Inc. model D9412GV4, OR EQUAL, comprising of a fully integrated intrusion system, fire system integration, and access control system integrated function. The control panel shall support the following: a. The Intrusion Detection System is capable of being utilized as a combination Intrusion and Fire system per code. Fully integrated intrusion, access and fire functions allow users to interface with 1 system instead of 3 b. Integrated Telephone Line Interface with programmable options for signaling and supervision. c. IP based communication option provides high-speed, secure alarm transport and control. d. 32 programmable areas with perimeter and interior partitioning. e. 8 on-board, class B hardwired points with expansion capability for a total of 246 wired or wireless points. f. Compatibility with touch-screen color LCD, vacuum fluorescent, ATM style LCD or LED style Alarm Command Centers. g. Local or remote programming, test, and diagnostic capability via a computer running the Remote Programming Software (RPS). h. The system shall support the use of an Apple iOS device for control. Functions to include arming, disarming, control of outputs, lock, unlock, cycle and secure access doors. i. Integrated real time clock, calendar, test timer and programmable scheduling capability for relay control and automatic execution of system functions based on a time / event. j. Provide 1.4 amps of power for standby operation and 2 amps of alarm power, both rated at 12 VDC. k. 2 wet-contact relay outputs and 1 Auxiliary wet-contact relay output with expansion capability for up to an additional 128 dry-contact relay outputs. l. Integrated battery charger with reverse hook up protection, battery supervision and battery deep discharge protection. m. Supervision of peripheral devices and communications interface(s). B. Point Functionality and Expansion: 1. Each point in the system shall be programmable to provide the following type of response in the system: a. Always on (24-hour response). b. On when the system is Master Armed. c. Only on when the system is Perimeter Armed. d. Displays / Does Not Display at the ACC when the point is activated. e. Provides / Does Not Provide entry warning tone. f. Sounds / Does Not Sound audible alarm indication. g. The Point is bypass able / not bypass able. h. Alarm Verification with programmable verification time. i. Relay activation by Point. j. Provides / Does Not Provide "watch point" capability. k. Provides Swinger Bypass. l. Defers Bypass Report. m. Can return to the system after being force armed and then restoring. n. Can return to the system after being bypassed and then restoring. 2. The Intrusion Detection System shall be capable of supporting "group zoning." Group zoning refers to the combining of points into a separately identifiable and separately annunciated (programmable text) areas. Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 1. February 3, 2021 28 1100 Intrusion Detection System 9 of 25 3. The Intrusion Detection System shall be capable of allowing variable point response times via programming. Point response times shall be programmable over a range of 300 milliseconds to 4.5 seconds. 4. The Intrusion Detection System shall have the capability to expand up to 246 separately identifiable points, of which 8 are on-board and 238 are off-board, wired or wireless addressable points connected to multiplexed backbone trunks via wired modules and/or wireless receivers. a. The 8 on-board points shall be able to accommodate powered class B functionality using a powered loop interface module. b. Point Expansion Modules (Wired and Wireless) shall be able to be located remote to the main panel to a maximum distance of 1000 feet. 5. The Intrusion Detection System shall support 32 independent areas. Each of the 32 areas shall have custom text associated with the armed state, disarmed state and point- off-normal state. 6. The Intrusion Detection System shall support 8 independent areas. Each of the 8 areas shall have custom text associated with the armed state, disarmed state and point-off- normal state. 7. The Intrusion Detection System shall be capable of assigning 1 to 32 account identifiers to the areas depending on the distribution of areas per account. 8. The Intrusion Detection System shall be capable of linking multiple areas to a shared area which may be automatically controlled (hallway or lobby). 9. The Intrusion Detection System shall accommodate conditional area arming dependent on the state of other areas (master or associate). Any area can be configured for perimeter and interior arming, not requiring a separate area for this function. C. The Intrusion Detection System shall provide the capability for output relay expansion using relay expansion modules. Independent control of relay functions by area shall be possible through programming assignments. D. The Intrusion Detection System shall be capable of activating 128 additional relay outputs for auxiliary functions based on its classifications (area vs. panel wide). Output Expansion Modules shall be able to be located remote to the main panel, to a maximum distance of 1000 feet. 8 relays (Form C) are to be provided per octo-relay module. E. The Intrusion Detection System shall support scheduling capabilities with the following characteristics: 1. Arm / Disarm specific area(s) based on open/close windows. 2. Bypass / Unbypass point(s). 3. Activate / Deactivate relay(s). 4. Send test reports. 5. Up to 4 programmable holiday schedules of 366 days each (includes leap year). Based on the holiday settings, different time windows for open/close and other system functions can be executed. 6. Automatic adjustment of system clock for daylight savings time. 7. Turn an Access Authority Level On/Off. 8. Hold a Door Open (unlocked and shunted). 9. Secure a Door Closed (locked, no valid cards will allow entry). 10. Return a Door to Normal Operation (locked, valid cards will allow entry). 11. Turn recording of Access Granted events On/Off (and transmittal if routing is ON). 12. Turn recording of Access Denied events On/Off (and transmittal if routing is ON). F. Alarm Command Center Keypads (ACC): 1. The Intrusion Detection System shall accommodate connection with up to 32 ACCs, each capable of displaying custom English text on touch screen, liquid crystal or vacuum fluorescent (VF) displays. Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 1. February 3, 2021 28 1100 Intrusion Detection System 10 of 25 2. The Alarm Command Centers shall accommodate viewing and configuration of system parameters including: a. Network Parameters: 1) DHCP Enable/Disable for the selected network module. 2) UPnP Enable/Disable for the selected network module. 3) IP Address for the selected network module. 4) Subnet Mask for the selected network module. 5) Default Gateway for the selected network module. 6) Port Number for the selected network module - The module's port number shall range from 0 to 65,535. 7) DNS Server Address for the selected module's DNS server IP address. 8) DNS Host Name for the selected module. The DNS host name shall contain up to 63 characters. 9) AES Encryption Key Size – Enable/Disable encryption by selecting the AES encryption key size for the selected network module. 10) AES Encryption Key String - The user shall be able to display, add and modify the AES encryption string based upon the key size previously configured for the selected network module. b. Point Parameters: 1) Point Selection between one and the maximum number of points in the control panel. 2) Point Registration to allow system response from a specific physical point on any one of the expansion modules; On-board, Point expansion modules (wired or wireless), and Access. 3) Wireless points shall be able to be enrolled in the system via an auto learn feature. c. Event Routing Parameters to allow programming of up to 4 report routing groups as well as configuration of primary and secondary paths. 3. The Intrusion Detection System shall accommodate connection with up to 8 ACCs, each capable of displaying custom English text on liquid crystal or vacuum fluorescent (VF) displays. 4. The ACC’s shall be capable of displaying point status, arm/disarm status, and carry out user command functions. 5. The ACC can be programmed to respond to the entry of any of the specifically authorized user passcodes. 6. The ACC’s shall be able to be configured to control a specific area, or group of areas, or all areas in the system. 7. The ACC’s shall be able to be temporarily re-addressed to view the status of a remote area. 8. The ACC’s shall be able to provide different audible tones for Intrusion, Fire alarms, and system troubles. G. User Passcodes and Authority: Passcodes shall be programmable with authority levels to allow users to operate any or all areas. 1. Up to 999 different passcodes shall be accommodated. 2. Each passcode shall be 3 to 6 digits (variable) and be assigned a 16-character user name that shall be printed on the local printer and IDR with associated opening and closing reports from the user. 3. User access to System features and functions shall be configurable based on 14 individual programmable levels of authority assigned to the user passcode. Additionally, the system shall have the capability to assign to the user passcode, a different authority level in each of the areas. A service passcode can be assigned to the servicing agent allowing the agent limited access to system functions. User-programmable / activated functions include: a. Arming the system: All areas, specific area(s) only, perimeter instant, perimeter Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 1. February 3, 2021 28 1100 Intrusion Detection System 11 of 25 delayed, perimeter partial, watch mode, and arming the system with a duress passcode. b. Disarming the system: All areas, specific area(s) only and disarming with a duress passcode. c. Viewing system status: Faulted points, event memory, bypassed points, area status and point status. d. Implementation functions: Bypass a point, unbypass a point, reset sensors, silence bell, activating relays, initiating the remote programming function locally to allow programming the system from a remote location. e. Testing the system: Local Walk test, Service Walk test, Fire test, send report to remote IDR to check the telephone link, and programming the time and date for the next test report transmission. f. Change system parameters: ACC display brightness, system time and date, and add/delete/change passcodes. g. Extend the closing time of the system. h. Transmitting special alerts and activating audible and visible signals. i. Executing multiple commands / ACC keystrokes from a single Menu / Command List item. This function shall be able to have a 16-character (alphanumeric) title to identify it on the ACC display. j. Editing of time / event-based scheduling program from the ACC. 4. The Intrusion Detection System shall also provide a "service menu" to implement functions such as viewing and printing the system log, displaying the system firmware revision number, and defaulting (toggling) text displays between custom and default text displays for troubleshooting. 5. The Intrusion Detection System shall allow users to change their own user passcode from the Alarm Command Center (ACC). Administration shall be capable of changing the user passcodes and authority assignments by area of other users from the ACC. 6. The Intrusion Detection System shall incorporate a programmable "Passcode Follows Scope" feature to allow users to arm or disarm only the area they are entering with one simple command or control all areas from one ACC. 7. Passcodes shall be able to be associated with a unique access card/token. The authority of the card assigned to the user will equal that of the user, and each card will report in the display, local printer, memory event log and at the IDR as a unique, individual, user. H. Communication 1. The Intrusion Detection System shall be capable of reporting system events and supervisory reports including alarm, trouble, missing modules, restores, system status, AC failure, battery status to primary and secondary off-site IDR’s. 2. The Intrusion Detection System shall be capable of communicating via dial-up analog telephone lines, over a LAN/WAN/Internet using a wired network interface module, or over a cellular network using a GSM/GPRS interface module. 3. The Intrusion Detection System shall be capable of communicating via dial-up analog telephone lines, over a LAN/WAN/Internet using a wired dialer capture network interface module. 4. The Bosch ModemIIIa² communications format shall be utilized for optimum system performance. The ModemIIIa² format provides the maximum data information to the receiver for alarms, troubles, restorals, bypasses, relay activation, opening/closings, and card access. The detailed information includes the point numbers with text, peripheral device numbers, user numbers with text, and area information. As an alternative format, Contact ID may be used when a non-Bosch receiver is used although it will include less detailed information like point or user text. 5. The Intrusion Detection System shall have the capability of communicating with up to 8 different IDRs using up to 4 different phone numbers, up to 24-digits in length and/or 4 URL/IP addresses over a network. Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 1. February 3, 2021 28 1100 Intrusion Detection System 12 of 25 6. The Intrusion Detection System shall have the capability of communicating with up to 5 different IDRs using up to 4 different phone numbers, up to 32-digits in length or 1 IP address using a dialer capture network interface module. 7. The Intrusion Detection System shall support 2 telephone lines using a dual phone line module. The lines shall be capable of being alternated for the transmission of consecutive events. 8. The Intrusion Detection System shall report to a Commercial Central Station that is using a Bosch D6600 Receiver/Gateway or a Bosch D6100i Receiver using ModemIIIa² as a preferred format or Contact ID as an alternate format. 9. The Intrusion Detection System reports shall be classified, by event, into eleven subcategories or "report groups." Each group represents similar types of events. Individual events within each group shall be selectively enabled or disabled for transmission. The eleven report groups shall be as follows: a. Fire Reports. b. Burglar Reports. c. User Reports. d. Test Reports. e. Diagnostic Reports. f. Relay Reports. g. Auto Function Reports. h. RPS Reports. i. Point Reports. j. User Change Reports. k. Access Reports. 10. The Intrusion Detection System shall be capable of listening to the telephone line when calls are answered by other devices on the premises side of the phone line and determining if a special tone is being sent from RPS (Remote Programming Software) and intercepting the call for RPS Sessions. 11. The Intrusion Detection System shall have the ability to verify the integrity of the remote communications path and switch to alternate paths when a communications failure occurs. 12. The Intrusion Detection System shall be capable of unattended mode of operation whereby programming and configuration updates are automatically transferred using the Remote Programming Software (RPS). These updates can initiate from either the control panel or the remote computer using RPS. I. Network Communication: The Intrusion Detection System shall be capable of network communications over a LAN, WAN, Intranet, or the Internet. The system shall include supervision of the network communication utilizing configurable periodic heartbeats to the Digital Alarm Communications Receiver (IDR). The IDR shall provide notification of the loss of communications from a networked system after a programmable timeframe since the last communication. The notification options shall be programmable and include local annunciation or indication to automation software. 1. The network interface module shall be capable of supporting Dynamic Host Communication Protocol (DHCP) to obtain an IP Address. 2. The system shall support a method of authentication between the control panel and the receiver to ensure that the control panel has not been compromised or replaced. 3. The network interface modules shall be capable of supporting encryption using a minimum of 128-bit AES Encryption (Rijndael) certified by NIST (National Institute of Standards and Technology). 4. The network interface modules shall support a 10/100BaseT connection to an Ethernet network. 5. The control panel shall be capable of network communication with a programmable poll time to send periodic heartbeats to the receiver, programmable ACK Wait time, and programmable retry time. In the situation where a communication path is unsuccessful, Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 1. February 3, 2021 28 1100 Intrusion Detection System 13 of 25 the control panel shall be capable of attempting backup communication through an available communication method to the same receiver or a backup receiver. a. The control panel shall have the ability to automatically adjust the heartbeat rate of a backup path that is using GPRS, to the heartbeat rate of the primary path in case of a primary path failure. Upon restoral of the primary path, the heartbeat rate of the backup path shall automatically restore to the original rate. This allows a system utilizing GPRS communications to keep the wireless charges low. b. The network communication between the control panel and the receiver shall use ModemIIIa². c. The control panel shall be capable of two-way communication using a wired network interface module with a 10/100BaseT on a LAN/WAN/Internet configuration or with a wireless GPRS module on the Internet. d. The control panel shall be capable of configuring the destination of the receiver using a URL or static IP Address. e. The control panel shall be capable of using DNS to lookup the IP Address of the receiver when programmed with a URL. f. The control panel shall support UPnP for automated Port Forward configuration in the router where the control panel is installed. g. The control panel shall support AutoIP to enable the RPS software to connect to the control panel locally using an IP Direct connection. h. The control panel shall support configuration of the IP parameters from the keypad eliminating the need for a PC to configure the IP device. i. The control panel shall support network diagnostics from a keypad to allow local testing of network connectivity. The diagnostics should include, Ethernet cable connected, gateway configuration ok, DNS lookup operational, and external network connectivity (such as the Internet) operational. j. The system shall be capable of meeting DCID 6/9 and UL 2050 standards. 6. The system shall use a Dialer Capture Network Module (C900V2) to convert standard PSTN communications to send the messages to the receiver using the IP network. a. The Dialer Capture Network Module enables IP communications from the PSTN based Intrusion Detection System to the receiver using an IP network. b. The Dialer Capture Network Module shall include supervision of the network communication, utilizing periodic heartbeats to the Digital Alarm Communications Receiver (IDR). The IDR shall provide notification of the loss of communications from a networked system after a programmable timeframe since the last communication. J. Event Log: The Intrusion Detection System shall maintain a log of events indicating time, day, month, year type of event, account number, area number, user ID, point text, user text and primary/secondary event route. The system shall allow the following characteristics: 1. The Intrusion Detection System shall be capable of storing up to 1000 events 2. The Intrusion Detection System shall support the printing of these events on a local printer. 3. The Intrusion Detection System shall support viewing of logs locally at the ACC and remotely via an upload to a remote central station computer running the RPS software. 4. The Intrusion Detection System shall provide notification via a report to the IDR when the event log reaches a programmable “percent full capacity". This allows retrieval of stored events via RPS to prevent any loss of event history. 5. Group, signal type and area can route events to specific printers. 6. Each IDR shall be designated as a primary, backup, or duplicate destination for each report group. Assigning an event to multiple routing groups provides for duplicate destinations for the event. The transmission of grouped events allows the reporting of different types of information to different remote IDRs. Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 1. February 3, 2021 28 1100 Intrusion Detection System 14 of 25 K. Testing, Diagnostics and Programming: The Intrusion Detection System shall be capable of sending (manually or automatically) test and status reports to remote IDRs. 1. The Intrusion Detection System shall be capable of sending automatic tests daily, weekly or once every 28 days. Automatic test times shall be programmable to provide an offset of up to 24 hours from the current time. 2. Automatic test reports shall be programmable to be deferred by one test interval if any other report is transmitted in the current interval. 3. Automatic test reports and remote system access for diagnostics shall be supported via a remote central station computer with Remote Programming Software (RPS). 4. The Intrusion Detection System shall be programmable locally or remotely. Programming shall be accomplished via a command center or a computer with a remote programmer and diagnostic software package (RPS). 5. The Intrusion Detection System shall allow an on-site user to initiate remote programming while on-line with the servicing location. The remote programming device must provide a compare feature and allow for downloading either the stored program or the (un)modified program copied from the panel. 6. The Intrusion Detection System shall allow the local programming option to be disabled and must provide a method to program a panel while no one is on premises, when the panel shares a line with an answering machine. 7. The Intrusion Detection System shall accommodate IP Diagnostic to verify settings and operation of the network interface modules; Host name, MAC address, IPV4 address assignment. The IP Connection test shall include; Link test to verify physical cable integrity, Ping test to verify gateway response and ping test to verify address on the internet. 8. Wireless point diagnostics shall include signal strength and device states of registered wireless points in the system. 9. The number of systems testing and programming sessions shall be restricted via the use of program locking features and passwords. Passcode protection in excess of sixteen million combinations is required. L. Miscellaneous Features: Programmable alarm output timer, 31 programmable entry delay times, exit delay programmable by area, individually programmable point of protection text, point bypassing, key switch arming capability with LED outputs, and fire verification. M. False Alarm Reduction: The Intrusion Detection System shall comply with all ANSI SIA CP-01 requirements for false alarm reduction N. Ambush Detection: The Intrusion Detection System shall include an early ambush feature that requires that the user disarm, and then inspect the facility within a specified time period, before entering their passcode or a different authorized passcode again. If the user does not enter a passcode a second time, a duress event is generated. If the user does enter a passcode within the specified time period, the system disarms. O. Two-man rule: The Intrusion Detection System shall include a programmable feature that requires 2 separate passcodes to be entered to disarm the system. After 1 passcode is entered, the system will prompt for a second passcode to be entered on the same ACC. Without the second passcode, the system shall not disarm. P. User-Programmable Features: The Intrusion Detection System shall provide a menu driven interface to provide a user-friendly command structure for programming / customizing the system to the operational criteria of the application. The Intrusion Detection System shall be capable of being operated via: 1. The Command Structure. 2. Menu / Command List. Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 1. February 3, 2021 28 1100 Intrusion Detection System 15 of 25 2.06 SYSTEM INTERFACE REQUIREMENTS A. Grounding: The Security Subcontractor shall properly earth ground the Intrusion Detection System to prevent electrostatic charges and other transient electrical surges from damaging the Intrusion Detection System panel. B. Primary power: The Security Subcontractor shall provide a dedicated 120 VAC power circuit to the Intrusion Detection System. This circuit shall be connected to the emergency power system. The 120 VAC is stepped down to power the Intrusion Detection System panel using a class two, plug-in transformer. This power circuit shall be properly rated to continuously power all points and functions indefinitely in full alarm condition. C. Primary power supervision: When the primary power source fails, the system can be configured to report an "AC Fail" message to a commercial central station. 1. The message can also be programmed to "tag-along" with another message transmitted to the central station. 2. The system shall always display a loss of primary power on the ACC and may be configured to provide additional audible warning. 3. The transmission delay of this message is programmable from 5 seconds to 86 minutes with an optional 6 to 12-hour transmission delay. D. Secondary power (standby battery): The Security Subcontractor shall provide adequate battery power as defined by the relevant application criteria, (UL 864 and UL 985 for alarm installations, or NFPA 72 chapters for fire applications). Appropriate battery chargers shall be provided consistent with the battery back-up capacity. The most current accepted version of NFPA 72 and any applicable local codes or AHJ requirements must be met accordingly. E. Secondary power supervision: When the secondary power source experiences a 85 percent depletion of its standby capacity, the system can be configured to report a "Low Battery" message to a commercial central station. The system shall always display a low battery condition on the ACC and may be configured to provide additional audible warning. F. Telephone interface: The control panel in the Intrusion Detection System shall be equipped with a phone line monitor and shall interface with the phone lines via RJ-31X jacks for supervision of the telephone line connection. 1. The telephone line interface shall conform with FCC rules (Title 47 C.F.R. part 68). 2. When a telephone line is determined to be out of service by the Intrusion Detection System panel, the event will be annunciated locally on the ACC and transmitted to the central station over the alternate communications interface. The transmission delay of this message is programmable from ten to two-hundred forty seconds. 3. A telephone line switching module shall be used to interface to a second telephone line. G. Ethernet Interface: The Intrusion Detection System may use an Ethernet interface module as the primary, or back-up means of communicating to an IDR. 1. Built-in IP-based alarm transport, programming, and control 2. The module shall accommodate 128-bit AES encryption. 10BASE T or 100BASE T network connection 3. Full-duplex and half-duplex support H. GSM/GPRS interface: The Intrusion Detection System may use an GSM/GPRS radio module as the primary, or backup, means of communicating to an IDR. Up to 4 IP Addresses shall be available for routing system events. The supervision time shall be programmable with a range of 5 to 65,535 seconds. This module shall accommodate 128-bit AES encryption. Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 1. February 3, 2021 28 1100 Intrusion Detection System 16 of 25 I. Auxiliary function control interfaces: The Intrusion Detection System shall accommodate auxiliary functions such as activating bells, strobes, or lights and shall be accomplished using the optional application specific relay modules. These auxiliary interfaces shall be electrically isolated to avoid inter-system interferences or damage to the system. 1. Amber Strobes a. The Amber Strobe shall be triggered by the Dennis- Yarmouth School Districts Emergency Response protocols, and shall be coordinated with the School District. b. The Amber Strobe shall be UL recognized and manufactured to NEMA 4X requirements. c. The Amber Strobe shall be durable vibration resistant construction, have long life 100,000 hour LED technology, and be backed up with a five year warranty. d. The Amber Strobe will operate over a wide DC input voltage range of 10 - 100 VDC. e. Amber Strobe shall be Tomar Electronics Model number 395L-1280 ½” threated with Model 440 STAND, MAM-DS30 Wall Mounted Bracket and Model G470 Heavy Duty Cage Guard, OR EQUAL. J. Wiring: The Security Subcontractor shall provide cables consistent with the manufacturer's recommendations. The following general guidelines shall be followed for wiring installation: 1. Wiring shall be appropriately color-coded with permanent wire markers. Copper conductors shall be used. 2. All signal cables provided under this contract shall be Class II, plenum-rated cable where required. Where subject to mechanical damage, wiring shall be enclosed in metal conduits or surface metallic raceway. 3. Data wires shall not be enclosed in conduit or raceways containing AC power wires. 4. Where EMI may interfere with the proper operation of the Intrusion Detection System circuits, twisted/shielded cable shall be used. K. Environmental Conditions: The Intrusion Detection System shall be designed to meet the following environmental conditions: 1. The system shall be designed for a storage temperature of -10° C to 70°C (14° F to 158°F). 2. The system shall be designed for an operating temperature of 0° C to 50°C (32° F to 120°F). 3. The system shall be designed for normal operation in an 85% relative humidity environment. 4. The system shall meet or exceed the requirements of FCC rules Title 47 C.F.R. Part 15, Class B devices, and Part 68, IEC EMC directive. 2.07 FIELD DEVICES AND SENSORS A. Door Position Switches shall be furnished and installed by the Security Subcontractor. The Security Subcontractor shall align, prepare and fabricate doors and frames to accept specified door position switches. The Security Subcontractor shall be responsible for coordinating the installation so systems and hardware operate as specified. 1. All Door Position Switches to be Double Pole Double Throw (DPDT) and report to both the Access Control System and the Intrusion Detection System. 2. Surface Mounted Door Switch: Interlogix Model 2505-A-06 OR EQUAL, Surface Mounted Magnetic Switch with armored cable. Route armored cable to junction box and permanently secure to box with clamp or set-screws. Use only where flush mounted devices cannot be installed. 3. Flush Mounted Door Switch: Interlogix Model 1076D-N (DPDT) or approved equal. Flush Mounted Magnetic Switch with armored cable, OR EQUAL. Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 1. February 3, 2021 28 1100 Intrusion Detection System 17 of 25 4. Overhead Door Switch: Interlogix Model 2202AU-L or approved equal. Floor-mount Magnetic Contact for Overhead Doors, Universal Magnet, 3 in. Gap Size, Closed Loop, Includes 18 in. Stainless Steel Armored Cable, OR EQUAL. 5. Gates and Roll-Up Doors: Interlogix Model 2205-A, 2205-AU, 2507A series with armored cable, OR EQUAL. 6. Slide Gates: Interlogix Model 2700 Series with appropriate mounting brackets and cable, OR EQUAL. B. Duress Buttons shall be furnished and installed by the Security Subcontractor. Security Subcontractor shall align, prepare and fabricate under counter or under desk locations to accept specified Duress Button door position switches. The Security Subcontractor shall be responsible for coordinating the installation so systems and hardware operate as specified. 1. Under desk or under counter Duress Buttons: Interlogix Model 3040, OR EQUAL C. Hallway Panic Buttons with Bopper Stopper Covers shall be furnished and installed by the Security Subcontractor. Security Subcontractor shall prepare locations in hallways as indicated in contract document to accept specified Panic Buttons. The Security Subcontractor shall be responsible for coordinating the installation so systems and hardware operate as specified. 1. Hallway Stopper stations/Panic Buttons: Safety Technology International Model STI SS2422LD-EN, OR EQUAL D. Motion Detectors and Power Supply 1. PIR Motion Detector; 360° Ceiling Mounted: Bosch Model ZX938Z OR EQUAL 2. PIR Motion Detector; Wall Mounted: Bosch Model ISC-BPR2-W12 OR EQUAL 3. PIR Motion Detector Power Supply; Bosch Model B520-C OR EQUAL (must be compatible with PIR Motion Detectors.) E. Motion Detectors Tri-Tech Technology (Install in Gymnasium, Cafetorium, Back Stage and in the Theatre) 1. The product specified is a dual detector incorporating PIR signals with range adaptive Doppler radar into an intelligent algorithm to provide accurate and reliable alarm decisions. The product is designed for commercial indoor applications and is built with a sealed optic chamber to provide immunity to drafts and insects. The unit consists of a self-locking two-piece enclosure with a built-in two-way bubble level to help simplify the installation. The detector incorporates sensor data fusion technology that integrates the data from five different sensors to ensure alarm conditions are based on precise information and tri-focus optics technology that eliminates coverage gaps and false alarms. 2. Detector Requirements: a. The specified detector shall be a dual detector unit incorporating range adaptive Doppler radar and PIR signals into an intelligent algorithm to provide accurate and reliable alarm decisions. b. The detector shall be available in 10.525 GHz and 10.588 GHz microwave models as required by the application. c. The detector shall consist of a self-locking two-piece enclosure with a built-in two-way bubble level to help simplify the installation. d. The detector shall be built with a sealed optic chamber to provide immunity to drafts, insects, and small animals. e. The detector shall be designed to provide coverage in the event the microwave subsystem fails. f. A Microwave Anti-Masking feature shall send a supervision trouble signal if microwave reflective material is placed within 30 cm (1 ft) of the detector. g. The detector shall contain light emitting diodes (LEDs) that adjust automatically to the surrounding light level. A blue LED indicates dual alarms and activates during a remote walk test. The walk test LED may be enabled or disabled from the control Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 1. February 3, 2021 28 1100 Intrusion Detection System 18 of 25 panel or locally at the detector via a DIP switch. A yellow LED shall indicate microwave alarms, and a red LED indicates PIR alarms. h. The detector shall reduce false alarms by having a sealed optic chamber that provides immunity to drafts and insects. i. The detector shall provide a remote self-test function that initiates when the walk test input switches to its active state. The alarm relay and alarm LED activate for four seconds following a successful test. The trouble relay activates and the alarm LED flashes following a failed test. j. The detector shall provide input power supervision that activates the trouble relay and causes the LED to flash when the power is lower than 8 volts. 3. Sensor Technology Requirements: a. The detector shall incorporate sensor data fusion technology that uses an internal microprocessor to gather, analyze, and compare the data from five separate sensors to make the most intelligent alarm decisions. The data processed from the microprocessor shall be from two pyroelectric sensors, a Doppler microwave sensor, a room temperature sensor, and a light level sensor. b. The detector shall also incorporate tri-focus technology that uses three high-quality Fresnel lenses with three specific focal lengths to provide long-range, middle-range, and short-range coverage. The detector shall apply the three focal lengths to 86 detection zones which combine to produce 11 solid curtains of detection. The tri-focal optics technology shall include two pyroelectric sensors which deliver twice the standard optical gain. c. The detector shall provide active white light suppression capable of measuring the light intensity directed at the face of the unit, and use the data gathered by the sensors to eliminate false alarms caused by the bright light source. False alarms shall not be caused from bright light sources up to 10,000 lux. d. The detector shall provide dynamic temperature compensation that adjusts the PIR sensitivity to detect human body heat accurately to avoid false alarms and deliver consistent catch performance at all operating temperatures. 4. Outputs: a. The detector shall provide a cover and wall tamper switch with a normally- closed contact that opens to notify the control panel in the event the cover is removed or the detector is separated from the wall. The contacts shall be rated at 25 VDC, 125 mA maximum. b. The detector shall provide a solid-state relay that is power supervised and uses less current and provides longer standby capacity than a mechanical relay. The solid- state relay shall be used to send a silent alarm output signal. Rating of the relay shall be 3W, 125 mA, 25 VDC, with resistance less than 10 ohms. c. The detector shall provide a solid-state relay with normally-closed (NC) contacts that shall be used as a trouble indicator. 5. PIR Coverage and Mounting Brackets a. The detector shall provide the following DIP switch selectable fields of coverage: 1) 18 m x 25 m (60 ft x 80 ft) 2) 8.0 m x 10 m (25 ft x 33 ft) b. The detector shall be designed to be mounted at a height between 2m to 3m (7 ft to 10 ft) and require no adjustments. c. The manufacturer shall offer the following three optional mounting brackets: 1) A Gimbal-mount bracket [Bosch B328] that mounts on a single- gang box and allows rotation of the detector. 2) A Low-profile plastic wall swivel mount bracket [Bosch B335-3]. The mount allows a vertical pivot range of +10º to -20º and a horizontal pivot range of ±25º. 3) A plastic universal swivel bracket for ceiling mounting [Bosch B338]. The mount allows a vertical pivot range of +7º to -16º and a horizontal pivot of ±45º. 6. Certifications and Approvals Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 1. February 3, 2021 28 1100 Intrusion Detection System 19 of 25 a. The specified detector is designed to comply with the following standards and approvals: 1) UL639 and cULus 1) CE 2) C-Tick 3) EN50131-1 Grade 2 4) FCC 5) IC b. The specified detector shall globally meet or exceed all relevant electrical, safety, and safety requirements. 7. Mechanical Specifications: a. Dimensions: 136mm x 69 mm x 58mm (5.25 in. x 2.75 in. x 2.25 in.) b. Material: High impact ABS plastic. c. Color: white 8. Electrical Specifications: a. Operating Voltage: 9 VDC to 15 VDC b. Current (maximum): less than 25 mA c. Current (Standby): 13 mA 9. Environmental Specifications: a. Temperature, Operating and Storage: -30ºC to +55ºC (-20ºF to +130º F) b. For UL Certified Installations: 0ºC to +49ºC (+32ºF TO +120ºF). c. IP Rating: IP 41, IK02 (EN60529 and EN50102) d. Relative humidity: 0 to 95%, non-condensing 10. Install Tri-Tech Motions on opposing walls for cross coverage in large spaces. F. Mounting Brackets (as needed for field of sensing) 1. Swivel Mount Bracket; Bosch Model B335-3 OR EQUAL 2. Gimbal Mount Bracket; Bosch Model B328 OR EQUAL 3. Ceiling Mount Bracket; Bosch Model B338 OR EQUAL 2.08 MODULES AND ALARM KEYPAD A. Alarm Command Center Keypad: Alarm Command Center Keypad with 16-character alphanumeric display for DACS programming and display of alarm status, with distinctive alarm tones and back lighted multi-key touchpad: Bosch Model D1260 Command Center, OR EQUAL. B. Point of Protection Expander Module; Multiplexed Alarm Point Expander: Bosch Model D8125, OR EQUAL. C. Alarm Point Input Module: Input Module as required by system configuration and functions. Bosch Model D9127T POPIT, or D9128 OctoPOPIT Module, OR EQUAL. D. Control Point Output Module: The Control Point Output Module shall have 8 dry-contact relay outputs for door control, local alarm horns, ACS interface and other output functions; Bosch Model D8129 OctoRelay Module, OR EQUAL. E. Eight Zone Input Module: The Eight Zone Input Module shall be Bosch Model B208, OR EQUAL. F. Eight Zone Output Module: The Eight Zone Output Module shall be Bosch Model B308, OR EQUAL. G. Motion Detector Power Supply: Bosch Model B520-C OR EQUAL. Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 1. February 3, 2021 28 1100 Intrusion Detection System 20 of 25 H. Zone Expansion Module: Bosch Model D8125 OR EQUAL. PART 3 - EXECUTION 3.01 GENERAL A. The Security Subcontractor shall install and program the Intrusion Detection System in accordance with Section 28 0000, Security System General Requirements, and to the Owners specification. 3.02 EXAMINATION A. The Security Subcontractor shall examine areas to receive devices and notify the General Contractor and the Architect of any adverse conditions affecting installation or subsequent operation. B. All unacceptable conditions are to be corrected installation of any components or devices. C. The Security Subcontractor shall ensure all preparation is completed. If preparation is the responsibility of another Subcontractor, the Security Subcontractor shall notify Architect of unsatisfactory preparation before proceeding. D. Ensure selected location is secure and offers protection from accidental damage. E. Location shall provide reasonable temperature and humidity conditions, free from sources of electrical and electromagnetic interference. F. Ensure power source is protected against accidental shutoff or short. G. Install all equipment and materials in accordance with the "current" recommendations of the manufacturer. The work shall also be in accordance with: 1. Installation criteria defined in these specifications, in the installation manuals and guides, and in the construction documents. 2. Factory Representative can be the Bosch Security Systems Inc Security Dealer. 3. Approved submittals. 4. Applicable requirements of referenced standards. H. Programming of the system shall include the following tasks: 1. Programming system configuration parameters as required by the Owner (hardware and software, zone/circuit numbers, communication parameters). Coordinate with Security Consultant. 2. Programming operational parameters as required by the Owner such as opening/closing reports and windows, system response text (custom English) displays of events, activation of relays that drive auxiliary devices, and identifying types of zones/loops. Coordinate with Security Consultant. 3. Programming passcodes according to the Owners requirements and functions defined by the Owner. Coordinate with Security Consultant. 4. Other system programming tasks required by the owner including Lock down, shelter in place, Evacuation or other defined School related functions. Coordinate with Security Consultant. Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 1. February 3, 2021 28 1100 Intrusion Detection System 21 of 25 5. Operational Testing: The Security Subcontractor shall perform thorough operational testing and verify that all system components are fully operational. 6. Hard-copy System Printout: The Security Subcontractor shall submit a hard-copy system printout of all components tested and certify 100 percent operation indicating all devices/panels/units have passed the test criteria set forth by the manufacturer. 7. Acceptance Test Plan Form: An acceptance test plan form shall be prepared/provided by the Security Subcontractor prior to the acceptance walk-through. 8. This form shall include separate sections for each device/panel/unit as well as a column indicating the manufacturer's performance allowance/margin, a column indicating the result of the testing performed by the Security Subcontractor (pass/fail), and an empty column for recording findings during the walk-through. 9. Fire Alarm Systems shall comply with NFPA 72 Standards for inspection, testing, and maintenance. 10. Special School Incident Conditions such as Lock Down, Shelter in Place and Evacuation. Coordinate with Architect, Owner and Security Consultant. I. The Security Subcontractor shall certify completion in writing and schedule the commissioning walk-through. The Security Subcontractor shall provide all the tools and personnel needed to conduct an efficient commissioning process. 3.03 FIELD QUALITY CONTROL A. The Security Subcontractor shall meet specification requirements as described in Section 28 0000, “ELECTRONICS SECURITY SYSTEMS GENERAL”, and Section 28 4000 Testing Requirements. B. The Security Subcontractor shall submit a written test report that the system has been 100 percent tested and approved. Final test shall be witnessed by the Security Consultant and the Electrical Subcontractor, and performed by the Security Subcontractor. Final test report shall be received and acknowledged by the Security Consultant prior to request for final sign-off. C. The Security Subcontractor shall meet all requirements as outlined in Section 28 4000 for Closeout & Warranty. D. The Security Subcontractor shall provide instruction to the owner's satisfaction with regard to proper use and operation of the system. E. Determine and report all problems to the Manufacturer's customer service department. 3.04 SYSTEM CONFIGURATION PREPARATION A. The Security Subcontractor shall prepare detailed project planning worksheets and forms for programming and configuration of the Intrusion Detection System. The Security Subcontractor shall coordinate with the Owner to complete. Needed information for programming, not provided in the contract documents, shall be provided by the Owner for programming. B. The Security Subcontractor shall work with the Owner and the Architect to complete the worksheets and forms for Intrusion Detection System programming. The Owner shall provide information regarding programming that is not available on the project drawings. The Owner shall review and approve the final Intrusion Detection System Programming documents. The Security Subcontractor shall use final documents to program and configure software. C. Intrusion Detection System programming information may include but is not limited to: Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 1. February 3, 2021 28 1100 Intrusion Detection System 22 of 25 1. Define and set up partitions and zones. 2. Define alarm delays. 3. Develop schedules. 4. Develop passwords. 5. Propose start and stop times for time zones and holidays. 6. Set up groups, codes, software triggers, and list inputs and outputs. 7. Assign action message names and compose messages. 8. Assign device names and locations. 9. Set up alarms and establish trigger events. 10. Set up user names and pass codes. 11. Set up keypads. 12. Develop user-defined fields. 13. Develop call list for third-party monitoring company. 14. Complete system diagnostics and operation verification. 15. Prepare a specific plan for system testing, startup, and demonstration. 16. Develop acceptance test draft and on approval develop test. 17. Develop system details; input data with all changes from construction documents. Include system schematics and technical drawings in electronic format. D. Programming of the system shall include the following tasks: 1. Programming system configuration parameters (hardware and software, zone/circuit numbers, communication parameters). 2. Programming operational parameters such as opening/closing reports and windows, system response text (custom English) displays of events, activation of relays that drive auxiliary devices, and identifying types of zones/loops. 3. Programming passcodes according to the authorities and functions defined by the Owner. 4. Other system programming tasks required by the Owner. These additional programming requirements shall be coordinated between the Owner and the General Contractor. 5. Operational Testing: The contractor shall perform thorough operational testing and verify that all system components are fully operational. 6. Hard-copy System Printout: The Security Subcontractor shall submit a hard-copy system printout of all Intrusion Detection System components tested and certify 100 percent operation indicating all devices/panels/keypads/inputs/outputs, POPIT/OctoPOPIT units have passed the test criteria set forth by the manufacturer. 7. Acceptance Test Plan Form: An acceptance test plan form shall be prepared/provided by the Security Subcontractor prior to the walk-through. 8. This form shall include separate sections for each device/panel/unit as well as a column indicating the manufacturer's performance allowance/margin, a column indicating the result of the testing performed by the Security Subcontractor (pass/fail), and an empty column for recording findings during the walk-through. 9. Fire Alarm Systems integration shall comply with NFPA 72 Standards for inspection, testing, and maintenance. 10. Program all special School Incident Conditions and triggers for conditions such as Lock Down, Shelter in Place and Evacuation. Coordinate with Architect, Owner and Security Consultant. E. The Security Subcontractor shall certify programming completion in writing and schedule the commissioning walk-through. The Security Subcontractor shall provide all the tools and personnel needed to conduct an efficient commissioning process. Security Subcontractor to coordinate with Owner. 3.05 ADJUSTING Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 1. February 3, 2021 28 1100 Intrusion Detection System 23 of 25 A. The Security Subcontractor shall return to the project site one month after completion to make false alarm adjustments, small and minor adjustments, and to provide additional high level informal training. B. System maintenance and repair of system or workmanship defects during the warranty period shall be provided by the Security Subcontractor free of charge (including parts and labor). C. The Security Subcontractor shall correct any system defect within six hours of receipt of call from the Owner. 3.06 DEMONSTRATION A. Demonstrate at final inspection that Intrusion Detection System and devices functions properly. 1. The Security Subcontractor, upon completion of installation, shall furnish training in the complete operation of the systems. 3.07 PROTECTION A. Protect installed products until completion of project. B. Touch-up, repair or replace damaged products before substantial completion. 3.08 TESTING A. See SECTION 28 4000 ELECTRONIC SECURITY SYSTEMS TESTING, TRAINING, CLOSEOUT & WARRANTY. 3.09 TRAINING A. See SECTION 28 4000 ELECTRONIC SECURITY SYSTEMS TESTING, TRAINING, CLOSEOUT & WARRANTY. 3.10 CLOSE-OUT AND WARRANTY A. See SECTION 28 4000 ELECTRONIC SECURITY SYSTEMS TESTING, TRAINING, CLOSEOUT & WARRANTY. 3.11 SPECIAL CONDITIONS PROGRAMMING A. The Security Subcontractor shall program special conditions and trigger functions for: 1. Shelter in Place 2. Lock Down 3. Evacuation 4. Conditions for First Responders and Law Enforcement B. The Security Subcontractor shall program outputs to initiate the Amber Beacons on the perimeter of the building, and messaging thru the communications. Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 1. February 3, 2021 28 1100 Intrusion Detection System 24 of 25 1. The Security Subcontractor shall provide inputs and outputs for audio and visual triggers to be initiated for warning of conditions. C. The Security Subcontractor shall coordinate with the School Administration and the Architect for all required functions, including know box control functions as needed. 3.12 ELECTRONIC SECURITY SYSTEM TESTING, TRAINING, CLOSEOUT & WARRANTY A. See SECTION 28 4000 “ELECTRONIC SYSTEM TESTING, TRAINING, CLOSEOUT & WARRANTY.” 3.13 IDENTIFICATION AND TAGGING A. Cables, wires, wiring forms, terminal blocks and terminals shall be identified by labels, tags or other permanent markings. The markings shall clearly indicate the function, source, or destination of all cabling, wiring and terminals. The wire-marking format contained in the shop drawings shall be utilized for all conductors installed under this Specification. All cables and wires shall be identified, utilizing heat-shrink, machine-printed, polyolefin wire markers. Hand written tags are not acceptable. B. All terminal points shall be appropriately identified and labeled as shown on shop drawings. C. All panels shall be provided with permanently attached engraved labels with identifying names and functions. Labels shall be consistent in form, color, and typeface throughout the system and all must contain the name of the system or subsystem as part of the label textual information. Design, color, font and layout shall be coordinated with, and approved by, the Owner. 3.14 DATABASE PREPARATION, CHECKING AND ACTIVATION A. Security Subcontractor shall provide the Owner with the appropriate request forms necessary to organize the system database inputs. Guidance shall also be provided to Owner’s IT personnel to insure their understanding of database format requirements and constraints. B. The Security Subcontractor to clearly identify on the Project Schedule, any database requirements so database preparation is accomplished in sufficient time to permit orderly and on time system activation. The forms and guidance shall be presented to the Owner no less than 60 days prior to scheduled central system activation. C. It shall be the responsibility of the Owner to ensure the accuracy of the database information entered on forms by thoroughly checking all completed data entry forms. D. It shall be the responsibility of Security Subcontractor to ensure that database formatting is correct prior to entry into the system and system activation. E. The Security Subcontractor shall be responsible for the initial database entry into the system prior to activation. This database entry may be manual and shall be the responsibility if the Security Subcontractor. The database shall consist of users, hardware and function-related information, i.e., system configuration, cameras, alarm points, software parameters for system management, graphical maps and telephone entry system interfaces. A printout of the final Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 1. February 3, 2021 28 1100 Intrusion Detection System 25 of 25 database shall be provided to the Owner’s IT Department for review and approval prior to system activation. F. System activation shall be the responsibility of Security Subcontractor. Once the system and database have been demonstrated to be functioning properly according to manufacturer's guidelines and the system design, all further database entries and upgrades shall be the responsibility of the Owner’s IT Department after final close-out. 3.15 START-UP RESPONSIBILITY A. The Security Subcontractor shall initiate System Operation. Competent CERTIFIED start-up technicians shall be provided by the Security Subcontractor on each consecutive working day until the System is functional and ready to start the acceptance test phase. If in Architects judgment the Security Subcontractor is not demonstrating progress, the Security Subcontractor shall supply Manufacturer's factory technical representation and diagnostic equipment at no cost to Owner, until resolution of those defined problems. B. Properly ground each piece of electronic equipment prior to applying power. C. Properly ground all shielded wire shields to the appropriate earth ground at the hub end only, not at the remote or device end. Provide EOL resistors. D. Use a start-up sequence that incrementally brings each portion of the system on-line in a logical order that incorporates checking individual elements before proceeding to subsequent elements until the entire system is operational. 3.16 PRELIMINARY INSPECTION, TESTING AND COMMISSIONING A. The Security Subcontractor shall provide Preliminary Testing, Inspection, Acceptance Testing, Burn-In and Commissioning Performance services for systems and equipment. General Commissioning Requirements as found in General Conditions. 3.17 FINAL PROCEDURES A. Post Acceptance Work: 1. The Security Subcontractor shall return to the project site thirty (30) days after Acceptance of the Installation for a two (2) Hour retraining session as part of this contract. 2. Check, inspect and adjust systems, equipment, devices and components specified, programming updates, at the Owner’s convenience, approximately thirty (30) days after Acceptance of the Installation. 3.18 NOTICE OF COMPLETION A. When the performance and acceptance requirements described, including the Final Acceptance Test, have been satisfactorily completed, the General Contractor shall issue a Letter of Completion to Security Subcontractor indicating the date of such completion. Dennis Yarmouth Intermediate Middle School January 19, 2021 Dennis Yarmouth Regional School District 100% Construction Documents Perkins Eastman DPC, project #71011 Addendum No. 1. February 3, 2021 28 1100 Intrusion Detection System 26 of 25 B. The Notice of Completion shall be recorded by Security Subcontractor upon receipt of the General Contractor completion letter. This date of record shall be the start of the warranty period. END OF SECTION 28 1100 (THIS PAGE IS BLANK)