HomeMy WebLinkAbout28-1100-Intrusion-Detection-System_Rev_0Dennis Yarmouth Intermediate Middle School January 19, 2021
Dennis Yarmouth Regional School District 100% Construction Documents
Perkins Eastman DPC, project #71011 Addendum No. 1. February 3, 2021
28 1100 Intrusion Detection System
i of i
SECTION 28 1100
INTRUSION DETECTION SYSTEM
(sub-contract to ELECTRICAL DIVISION 26)
PART 1 – GENERAL
1.01 FILED SUB-BID REQUIREMENTS .............................................................................................. 1
1.02 RELATED DOCUMENTS ............................................................................................................. 1
1.03 SUMMARY .................................................................................................................................... 1
1.04 RELATED SECTIONS .................................................................................................................. 2
1.05 DEFINITIONS................................................................................................................................ 3
1.06 REFERENCES .............................................................................................................................. 3
1.07 COORDINATION .......................................................................................................................... 4
1.08 COORDINATION DRAWINGS ..................................................................................................... 4
1.09 PROJECT MEETINGS .................................................................................................................. 5
PART 2 - PRODUCTS
2.01 GENERAL ..................................................................................................................................... 5
2.02 INTRUSION DETECTION SYSTEM AND DURESS/PANIC SYSTEM ........................................ 6
2.03 REFERENCES AND STANDARDS FOR THE INTRUSION DETECTION SYSTEM .................. 7
2.04 QUALITY ASSURANCE ............................................................................................................... 7
2.05 GENERAL SYSTEM DESCRIPTION ........................................................................................... 8
2.06 SYSTEM INTERFACE REQUIREMENTS .................................................................................. 15
2.07 FIELD DEVICES AND SENSORS .............................................................................................. 16
2.08 MODULES AND ALARM KEYPAD ............................................................................................. 19
PART 3 - EXECUTION
3.01 GENERAL ................................................................................................................................... 20
3.02 EXAMINATION............................................................................................................................ 20
3.03 FIELD QUALITY CONTROL ....................................................................................................... 21
3.04 SYSTEM CONFIGURATION PREPARATION ........................................................................... 21
3.05 ADJUSTING ................................................................................................................................ 22
3.06 DEMONSTRATION ..................................................................................................................... 23
3.07 PROTECTION ............................................................................................................................. 23
3.08 TESTING ..................................................................................................................................... 23
3.09 TRAINING ................................................................................................................................... 23
3.10 CLOSE-OUT AND WARRANTY ................................................................................................. 23
3.11 SPECIAL CONDITIONS PROGRAMMING ................................................................................ 23
3.12 ELECTRONIC SECURITY SYSTEM TESTING, TRAINING, CLOSEOUT & WARRANTY ....... 24
3.13 IDENTIFICATION AND TAGGING ............................................................................................. 24
3.14 DATABASE PREPARATION, CHECKING AND ACTIVATION .................................................. 24
3.15 START-UP RESPONSIBILITY .................................................................................................... 25
3.16 PRELIMINARY INSPECTION, TESTING AND COMMISSIONING ........................................... 25
3.17 FINAL PROCEDURES ................................................................................................................ 25
3.18 NOTICE OF COMPLETION ........................................................................................................ 25
Dennis Yarmouth Intermediate Middle School January 19, 2021
Dennis Yarmouth Regional School District 100% Construction Documents
Perkins Eastman DPC, project #71011 Addendum No. 1. February 3, 2021
28 1100 Intrusion Detection System
1 of 25
SECTION 28 1100
INTRUSION DETECTION SYSTEM
(sub-contract to ELECTRICAL DIVISION 26)
PART 1 - GENERAL
1.01 FILED SUB-BID REQUIREMENTS
A. Filed Sub-Sub-Bid Requiring a Paragraph “E” LISTING on the FORM FOR SUB-BID required
per M.G.L. Chapter 149 Section 44A to 44L, as amended to date. The Electrical Subcontractor
shall be responsible for all related building preparation and coordination, see specification for
additional Paragraph “E” Listing requirements of the Listed Systems Contractor, and
coordination of responsibilities.
B. Section 28 0000 “ELECTRONIC SECURITY SYSTEM GENERAL”, Section 28 1000 “ELECTRONIC ACCESS CONTROL SYSTEM”, Section 28 1100 “INTRUSION DETECTION
SYSTEM”, Section 28 1200 “INTERCOM AND EMERGENCY PHONE SYSTEM”, Section 28 2000 “ELECTRONIC VIDEO MANAGEMENT SYSTEM”, and Section 28 4000 “ELECTRONIC
SECURITY SYSTEMS TESTING, TRAINING, CLOSEOUT AND WARRANTY” shall be a Filed
Sub-Sub Bid of Section 26 0000 “ELECTRICAL”, requiring a Paragraph “E” Listing on the
FORM FOR SUB-BID.
C. The work in this is Section shall be provided by a trained and certified Company (or Security
Subcontractor) in the Systems they are providing.
D. The Security Subcontractor shall be DCAMM Certified by the state of Massachusetts Division of
Capital Asset Management and Maintenance, in the category of: ALARM SYSTEMS, and shall
hold a current S-License per the requirements of the Commonwealth of Massachusetts.
E. A single Security Subcontractor shall be responsible for the DIV28 contract in its entirety as
included in these contract documents.
1.02 RELATED DOCUMENTS
A. Drawings and general provisions of the Contract, including General and Supplementary
Conditions and other Division 01 Specification Sections, apply to these sections.
B. Security General Requirements as outlined in Section 28 0000 are applicable to these sections.
C. These Specification Sections and contract documents shall be in accordance with Section 28
0000 “ELECTRONIC SECURITY SYSTEMS GENERAL”, Section 28 1000 “ELECTRONIC
ACCESS CONTROL SYSTEM”, Section 28 1200 “INTERCOM AND EMERGENCY PHONE SYSTEMS”, Section 28 4000 “VIDEO SURVEILLENCE SYSTEMS” and Section 28 4000
“ELECTRONIC SECURITY SYSTEMS TESTING, TRAINING, CLOSEOUT & WARRANTY”
1.03 SUMMARY
A. This Specification Section 28 1100 includes the furnishing, installation and programming of the
following:
1. Intrusion Detection System
Dennis Yarmouth Intermediate Middle School January 19, 2021
Dennis Yarmouth Regional School District 100% Construction Documents
Perkins Eastman DPC, project #71011 Addendum No. 1. February 3, 2021
28 1100 Intrusion Detection System
2 of 25
2. Panic and Duress System
B. The Security Subcontractor shall provide, install, program and warranty all components to
provide new complete and functional Intrusion Detection and Panic and Duress Systems. All
components to be new and unused. All materials, obviously a part of the electronic safety and
security infrastructure and necessary to its proper operation, but not specifically mentioned or
shown on the Drawings, shall be furnished and installed without any additional charge.
C. The Security Subcontractor to provide programming for the Intrusion Detection System and the
Panic and Duress Systems to call out to a designated third-party monitoring company and a list
of identified Dennis-Yarmouth District personnel.
D. The Security Subcontractor to provide all input/output modules, equipment and programming to
perform the required functions in this contract associated with special school conditions such as
but not limited to:
1. Shelter in Place
2. Evacuation
3. Lock Down
And the Associated trigger functions
1. Door Hold opens to release
2. Trigger previously recorded messages or other functions
3. Blue beacons on the exterior of the building to engage.
E. The Security Subcontractor is to coordinate with the Architect and the General Contractor.
F. The Drawings and Specifications are complementary to each other and what is called for by
one shall be as binding as if it were called for by both. If a discrepancy exists the higher level of
functionality shall be utilized.
G. The Security Subcontractor shall coordinate work with that of all other trades affecting or
affected by the work of this Section. Cooperate with such trades as to assure the steady
progress of all work under the contract.
H. The Security Subcontractor shall provide all necessary hardware, software, firmware,
programming, mounting brackets, enclosures, backboards, power supplies, keypads, contacts,
sensors, panels and controllers, wire, cable and conduit, batteries, relays and the like, to
provide a fully functional Intrusion Detection, and Panic and Duress System.
I. Related Requirements:
1. Section 01 3200 "Construction Progress Documentation" for preparing and submitting
Security Subcontractor's construction schedule.
2. Section 01 7300 "Execution" for procedures for coordinating general installation and field-
engineering services, including establishment of benchmarks and control points.
3. Section 01 7700 "Closeout Procedures" for coordinating closeout of the Contract.
4. Section 01 9113 "General Commissioning Requirements" for coordinating the Work with
Owner's Commissioning Authority.
1.04 RELATED SECTIONS
A. Division 01
B. Division 08 Door Hardware
Dennis Yarmouth Intermediate Middle School January 19, 2021
Dennis Yarmouth Regional School District 100% Construction Documents
Perkins Eastman DPC, project #71011 Addendum No. 1. February 3, 2021
28 1100 Intrusion Detection System
3 of 25
C. Division 26 Electrical
D. Division 27 Communications
E. 28 0000 Electronic Security Systems General
F. 28 1000 Electronic Access Control System
G. 28 1200 Intercom and Emergency Phone System
H. 28 2000 Video Management System
I. 28 4000 Electronic Security Systems Testing, Training, Closeout & Warranty
1.05 DEFINITIONS
A. BIM: Building Information Modeling.
B. RFI: Request for Information. Request from Owner, General Contractor, Architect, or Security
Subcontractor seeking information required by or clarifications of the Contract Documents.
C. ACS: Access Control System
D. IDS: Intrusion Detection System
E. ICS: Intercom System
F. EPS: Emergency Phone System
G. VMS: Video Management System
H. ESS: Electronic Security System
I. Credential: Data assigned to an entity and used to identify that entity
J. Additional Terms:
1. "Furnish" - Purchase and deliver to the project site complete with every necessary
appurtenance and support, all as part of the Work. Purchasing shall include payment of
all sales taxes and other surcharges as may be· required to assure that purchased items
are free of all liens, claims, or encumbrances.
2. "Install" - Unload at the delivery point at the site and perform every operation necessary
to establish secure mounting and correct operation at the proper location in the project,
all as part of the Work.
3. "New" - Manufactured within the past year and never before used.
4. “Provide”: As used herein shall mean furnish, install, commission (if not under contract of
a commissioning agent), test, close out and warranty complete.
5. “Infrastructure”: As used herein shall mean cable, conduit, and raceway with all required
boxes, fittings, connectors, and accessories; completely installed.
1.06 REFERENCES
A. All work shall be in accordance with, but not limited to, the following:
Dennis Yarmouth Intermediate Middle School January 19, 2021
Dennis Yarmouth Regional School District 100% Construction Documents
Perkins Eastman DPC, project #71011 Addendum No. 1. February 3, 2021
28 1100 Intrusion Detection System
4 of 25
1. The National Electrical Code
2. American National Standards Institute (ANSI)
3. National Electrical Manufacturers Association (NEMA)
4. Telecommunications Industries Association (TIA)
5. Institute of Electrical & Electronics Consultants (IEEE)
6. Underwriters Laboratories (UL)
7. Federal Communications Commission (FCC)
8. Occupational Safety and Health Administration (OSHA)
9. Americans with Disabilities Act (ADA)
10. Local city and county ordinances
B. In the event of conflict of code, the more stringent shall apply.
1.07 COORDINATION
A. Coordinate with the Architect, General Contractor, Division 8 and Division 26 Contractor to
ensure that adequate power has been provided and properly located for all Electronic Security
System equipment.
B. Coordinate locations of all devices with the Architect prior to installation.
C. Coordinate and verify the location of wall mounted panel equipment and keypads with the
Architect.
D. Coordinate finishes and colors of all equipment with the Architect.
E. Certain applications and Architectural Treatments require in the field decisions, the Security
Subcontractor shall coordinate in the field as needed.
F. Coordinate construction operations included in different Sections of the Specifications to ensure
efficient and orderly installation of each part of the Work. Coordinate construction operations
included in different Sections that depend on each other for proper installation, connection, and
operation.
G. Each contractor shall cooperate with Project coordinator, who shall coordinate its construction
operations with those of other contractors, trades and entities to ensure efficient and orderly
installation of each part of the Work.
1.08 COORDINATION DRAWINGS
A. Prepare coordination drawings according to requirements in individual Sections, and
additionally where installation is not completely indicated on Shop Drawings, where limited
space availability necessitates coordination, or if coordination is required to facilitate integration
of products and materials fabricated or installed by more than one entity.
1. The Architect shall review coordination drawings to confirm that, in general, the Work is
being coordinated, but not for the details of the coordination, which are Security
Subcontractor's responsibility. If Architect determines that coordination drawings are not
being prepared in sufficient scope or detail, or are otherwise deficient, Architect will so
inform Security Subcontractor, who shall make suitable modifications and resubmit.
2. Prepare coordination drawing prints according to requirements in "Submittal Procedures."
B. Coordination Drawing Process: Prepare coordination drawings in the following manner:
Dennis Yarmouth Intermediate Middle School January 19, 2021
Dennis Yarmouth Regional School District 100% Construction Documents
Perkins Eastman DPC, project #71011 Addendum No. 1. February 3, 2021
28 1100 Intrusion Detection System
5 of 25
1. Schedule submittal and review of Fire Sprinkler, Plumbing, HVAC, and Electrical Shop
Drawings to make required changes prior to preparation of coordination drawings. Ensure
no conflicts.
2. Each trade shall be provided a separate color for identifying conflicts.
3. The Electrical Subcontractor shall provide service and feeder conduit runs and equipment
to the Security Subcontractor. Electrical Subcontractor shall forward drawing files to
Electronic Safety and Security Subcontractor.
4. The Communications and Electronic Safety and Security Subcontractor shall indicate
cable trays and back planes, and equipment needed by other trades. Electronic Safety
and Security Subcontractor shall forward completed drawing files to General Contractor
or Construction Manager.
5. The Security Subcontractor shall perform a final coordination review, and as each
coordination drawing is completed, Security Subcontractor shall meet with Architect and
the General Contractor to review and resolve conflicts on the coordination drawings.
1.09 PROJECT MEETINGS
A. The General Contractor shall schedule and conduct meetings and conferences at Project site
unless otherwise indicated.
B. The Security Subcontractor shall attend all meeting as required by the General Contractor or
Construction Manager.
PART 2 - PRODUCTS
2.01 GENERAL
A. The product section herein contains lists of acceptable products based either on a prior
approved proprietary product or a manufacturer’s product, and identifies the functional
requirements of that system component. Products that have not been identified as proprietary
allow for “AS EQUAL” products.
B. The Intrusion Detection Manufacturer shall be in business for no less than 15 years
manufacturing Intrusion Detection Systems and non-proprietary Panels that will function with
multiple manufacturers field devices that include door contacts/sensors, motion sensors, glass
breaks, panic or duress buttons and other common field devices.
C. The Intrusion Detection System Manufacturer must provide detailed information regarding their
cybersecurity practices and hardening of Intrusion Detection Systems and devices if the system
is a networked system. Unacceptable cybersecurity practices by a manufacturer is grounds for
dismissal of the manufacturer and product.
D. All products shall have UL Listing that is clearly marked on the component.
E. All product shall be new and unused, and shall have, if needed, the latest software/firmware
version that has been actively utilized in the field on a site for no less than two (2) year. No
“X.0” versions shall be allowed.
F. The Owner shall have the final decision regarding change in function or aesthetics.
Dennis Yarmouth Intermediate Middle School January 19, 2021
Dennis Yarmouth Regional School District 100% Construction Documents
Perkins Eastman DPC, project #71011 Addendum No. 1. February 3, 2021
28 1100 Intrusion Detection System
6 of 25
G. The Security Subcontractor shall work with, and coordinate with, the all-other trades that
require inputs, outputs and devices to enable specific School Incident functions within the
contract documents. These connections to the additional system components are required to
be integrated for complete function in the named School Incident function requirements.
H. The Security Subcontractor shall coordinate with and ensure that the DIV26 and DIV8 contract
drawings include all required sensors, keypads, panels, conduit to door and device locations,
conduit to appropriate closets, device back boxes and hardware required for Intrusion Detection
installation, programming and function.
I. The Security Subcontractor shall coordinate with the DIV26 vendor and requirements for Fire
System locking/unlocking function power per NFPA/the fire code.
2.02 INTRUSION DETECTION SYSTEM AND DURESS/PANIC SYSTEM
A. System Description
1. The Intrusion Detection System shall be a functionally complete, integrated Intrusion
Detection System per manufacturer's guidelines, codes and specification requirements,
with reporting of sensors and providing specific trigger functions. Duress and Panic
devices shall be integrated, and incorporated to perform specific School Incident alerting
functions.
2. The Intrusion Detection System shall include an Intrusion Detection Control Panel with
built-in, supervised telephone line interface for dial out to a third-party monitoring
company and a designated list of School personnel.
3. The Intrusion Detection System shall include recording and retention of event information
in a dedicated event log.
4. The Intrusion Detection System shall incorporate an integral real-time clock, calendar,
and a test timer.
5. The Intrusion Detection System shall incorporate battery charging capabilities with
supervision of battery voltage and battery leads.
6. The Intrusion Detection System shall include keypads that will arm/disarm the Intrusion
Detection System.
7. The Intrusion Detection System shall accommodate a time / event-based scheduling
system.
8. The Intrusion Detection System shall be capable of supervision of peripheral devices and
communications interfaces.
9. The Intrusion Detection System shall support the connection and reporting of intrusion,
fire detection and access control devices to a remote Intrusion Detection Receiver (IDR).
10. The Intrusion Detection System shall accommodate configuration and operation of
separate, independent areas.
11. The Intrusion Detection System shall accommodate hard-wired or wireless point
expansion via expansion point interface modules and RF receivers.
12. The Intrusion Detection System shall have electrically supervised detection loops and
power supplies with battery(s) maintenance. This supervision shall be programmable for
the purposes of reporting this information to the IDR.
13. The Intrusion Detection System shall be capable of monitoring and switching to active
telephone lines when trying to establish communications with the IDR and transmitting a
report.
14. The Intrusion Detection System shall be capable of sending (manually or automatically)
test and status reports to remote IDRs.
15. The Intrusion Detection System shall be able to accommodate test, diagnostics, and
configuration programming functions locally or remotely via a portable programmer or a
computer running the Remote Programming Software (RPS).
Dennis Yarmouth Intermediate Middle School January 19, 2021
Dennis Yarmouth Regional School District 100% Construction Documents
Perkins Eastman DPC, project #71011 Addendum No. 1. February 3, 2021
28 1100 Intrusion Detection System
7 of 25
16. The Intrusion Detection System shall annunciate alarm, trouble, service reminders, and
other relevant system status messages in custom English text at the ACC.
2.03 REFERENCES AND STANDARDS FOR THE INTRUSION DETECTION SYSTEM
A. National Electric Code, Article 760.
B. National Fire Alarm Code (NFPA 72).
C. Administrative Council for Terminal Attachments (ACTA):
1. ANSI/TIA-968-A-2002 Technical Requirements for Connection of Terminal Equipment to
the Telephone Network.
D. American National Standards Institute (ANSI):
1. ANSI C63.4 Methods of Measurement of Radio-Noise Emissions from Low-Voltage
Electrical and Electronic Equipment in the Range of 9 kHz to 40 GHz.
E. Federal Communications Commission (FCC):
1. Title 47 C.F.R. Part 15; Class B – Radiated and Conducted Emissions.
2. Title 47 C.F.R. Part 68; rules governing the connection of Terminal Equipment (TE) to
the Public Switched Telephone Network (PSTN).
F. The National Institute of Standards and Technology of the United States of America (NIST):
1. Federal Information Processing Standards Publications 197 (FIPS 197) –Advanced
Encryption Standard (AES).
G. International Organization for Standardization (ISO):
1. 9001 - Quality System.
H. Underwriters Laboratories, Inc. (UL):
1. UL 50 - Enclosures for Electrical Equipment.
2. UL 294 – Access Control System Units.
3. UL 365 - Police Station Connected Burglar Alarm Units and Systems.
4. UL 609 - Local Burglar Alarm Units and Systems.
5. UL 864 - Control Units System for Fire-Protective Signaling System.
6. UL 985 - Household Fire Warning System Units.
7. UL 1023 - Household Burglar Alarm System Units.
8. UL 1076 – Proprietary Burglar Alarm Units and Systems
9. UL 1610 - Central Station Burglar-Alarm Units.
10. UL 60950-1 - Information Technology Equipment - Safety.
11. UL 636 – Hold up alarms
2.04 QUALITY ASSURANCE
A. Manufacturer Qualification:
1. The system shall be the standard product of one manufacturer, and the manufacturer
shall have been in business manufacturing similar products for at least 5 years.
2. Manufacturer's Quality System: Registered to ISO 9001:2000 Quality Standard.
B. Acceptable Manufacturer
1. Acceptable Manufacturer: Bosch Security Systems, Inc., DSC, ADI OR EQUAL.
Dennis Yarmouth Intermediate Middle School January 19, 2021
Dennis Yarmouth Regional School District 100% Construction Documents
Perkins Eastman DPC, project #71011 Addendum No. 1. February 3, 2021
28 1100 Intrusion Detection System
8 of 25
2.05 GENERAL SYSTEM DESCRIPTION
A. Control Panel and Features:
1. The Intrusion Detection System control panel shall be Bosch Security Systems, Inc.
model D9412GV4, OR EQUAL, comprising of a fully integrated intrusion system, fire
system integration, and access control system integrated function. The control panel
shall support the following:
a. The Intrusion Detection System is capable of being utilized as a combination
Intrusion and Fire system per code. Fully integrated intrusion, access and fire
functions allow users to interface with 1 system instead of 3
b. Integrated Telephone Line Interface with programmable options for signaling and
supervision.
c. IP based communication option provides high-speed, secure alarm transport and
control.
d. 32 programmable areas with perimeter and interior partitioning.
e. 8 on-board, class B hardwired points with expansion capability for a total of 246
wired or wireless points.
f. Compatibility with touch-screen color LCD, vacuum fluorescent, ATM style LCD or
LED style Alarm Command Centers.
g. Local or remote programming, test, and diagnostic capability via a computer running
the Remote Programming Software (RPS).
h. The system shall support the use of an Apple iOS device for control. Functions to
include arming, disarming, control of outputs, lock, unlock, cycle and secure access
doors.
i. Integrated real time clock, calendar, test timer and programmable scheduling
capability for relay control and automatic execution of system functions based on a
time / event.
j. Provide 1.4 amps of power for standby operation and 2 amps of alarm power, both
rated at 12 VDC.
k. 2 wet-contact relay outputs and 1 Auxiliary wet-contact relay output with expansion
capability for up to an additional 128 dry-contact relay outputs.
l. Integrated battery charger with reverse hook up protection, battery supervision and
battery deep discharge protection.
m. Supervision of peripheral devices and communications interface(s).
B. Point Functionality and Expansion:
1. Each point in the system shall be programmable to provide the following type of response
in the system:
a. Always on (24-hour response).
b. On when the system is Master Armed.
c. Only on when the system is Perimeter Armed.
d. Displays / Does Not Display at the ACC when the point is activated.
e. Provides / Does Not Provide entry warning tone.
f. Sounds / Does Not Sound audible alarm indication.
g. The Point is bypass able / not bypass able.
h. Alarm Verification with programmable verification time.
i. Relay activation by Point.
j. Provides / Does Not Provide "watch point" capability.
k. Provides Swinger Bypass.
l. Defers Bypass Report.
m. Can return to the system after being force armed and then restoring.
n. Can return to the system after being bypassed and then restoring.
2. The Intrusion Detection System shall be capable of supporting "group zoning." Group
zoning refers to the combining of points into a separately identifiable and separately
annunciated (programmable text) areas.
Dennis Yarmouth Intermediate Middle School January 19, 2021
Dennis Yarmouth Regional School District 100% Construction Documents
Perkins Eastman DPC, project #71011 Addendum No. 1. February 3, 2021
28 1100 Intrusion Detection System
9 of 25
3. The Intrusion Detection System shall be capable of allowing variable point response
times via programming. Point response times shall be programmable over a range of
300 milliseconds to 4.5 seconds.
4. The Intrusion Detection System shall have the capability to expand up to 246 separately
identifiable points, of which 8 are on-board and 238 are off-board, wired or wireless
addressable points connected to multiplexed backbone trunks via wired modules and/or
wireless receivers.
a. The 8 on-board points shall be able to accommodate powered class B functionality
using a powered loop interface module.
b. Point Expansion Modules (Wired and Wireless) shall be able to be located remote to
the main panel to a maximum distance of 1000 feet.
5. The Intrusion Detection System shall support 32 independent areas. Each of the 32
areas shall have custom text associated with the armed state, disarmed state and point-
off-normal state.
6. The Intrusion Detection System shall support 8 independent areas. Each of the 8 areas
shall have custom text associated with the armed state, disarmed state and point-off-
normal state.
7. The Intrusion Detection System shall be capable of assigning 1 to 32 account identifiers
to the areas depending on the distribution of areas per account.
8. The Intrusion Detection System shall be capable of linking multiple areas to a shared
area which may be automatically controlled (hallway or lobby).
9. The Intrusion Detection System shall accommodate conditional area arming dependent
on the state of other areas (master or associate). Any area can be configured for
perimeter and interior arming, not requiring a separate area for this function.
C. The Intrusion Detection System shall provide the capability for output relay expansion using
relay expansion modules. Independent control of relay functions by area shall be possible
through programming assignments.
D. The Intrusion Detection System shall be capable of activating 128 additional relay outputs for
auxiliary functions based on its classifications (area vs. panel wide). Output Expansion
Modules shall be able to be located remote to the main panel, to a maximum distance of 1000
feet. 8 relays (Form C) are to be provided per octo-relay module.
E. The Intrusion Detection System shall support scheduling capabilities with the following
characteristics:
1. Arm / Disarm specific area(s) based on open/close windows.
2. Bypass / Unbypass point(s).
3. Activate / Deactivate relay(s).
4. Send test reports.
5. Up to 4 programmable holiday schedules of 366 days each (includes leap year). Based
on the holiday settings, different time windows for open/close and other system functions
can be executed.
6. Automatic adjustment of system clock for daylight savings time.
7. Turn an Access Authority Level On/Off.
8. Hold a Door Open (unlocked and shunted).
9. Secure a Door Closed (locked, no valid cards will allow entry).
10. Return a Door to Normal Operation (locked, valid cards will allow entry).
11. Turn recording of Access Granted events On/Off (and transmittal if routing is ON).
12. Turn recording of Access Denied events On/Off (and transmittal if routing is ON).
F. Alarm Command Center Keypads (ACC):
1. The Intrusion Detection System shall accommodate connection with up to 32 ACCs, each
capable of displaying custom English text on touch screen, liquid crystal or vacuum
fluorescent (VF) displays.
Dennis Yarmouth Intermediate Middle School January 19, 2021
Dennis Yarmouth Regional School District 100% Construction Documents
Perkins Eastman DPC, project #71011 Addendum No. 1. February 3, 2021
28 1100 Intrusion Detection System
10 of 25
2. The Alarm Command Centers shall accommodate viewing and configuration of system
parameters including:
a. Network Parameters:
1) DHCP Enable/Disable for the selected network module.
2) UPnP Enable/Disable for the selected network module.
3) IP Address for the selected network module.
4) Subnet Mask for the selected network module.
5) Default Gateway for the selected network module.
6) Port Number for the selected network module - The module's port number shall
range from 0 to 65,535.
7) DNS Server Address for the selected module's DNS server IP address.
8) DNS Host Name for the selected module. The DNS host name shall contain up
to 63 characters.
9) AES Encryption Key Size – Enable/Disable encryption by selecting the AES
encryption key size for the selected network module.
10) AES Encryption Key String - The user shall be able to display, add and modify
the AES encryption string based upon the key size previously configured for
the selected network module.
b. Point Parameters:
1) Point Selection between one and the maximum number of points in the control
panel.
2) Point Registration to allow system response from a specific physical point on
any one of the expansion modules; On-board, Point expansion modules (wired
or wireless), and Access.
3) Wireless points shall be able to be enrolled in the system via an auto learn
feature.
c. Event Routing Parameters to allow programming of up to 4 report routing groups as
well as configuration of primary and secondary paths.
3. The Intrusion Detection System shall accommodate connection with up to 8 ACCs, each
capable of displaying custom English text on liquid crystal or vacuum fluorescent (VF)
displays.
4. The ACC’s shall be capable of displaying point status, arm/disarm status, and carry out
user command functions.
5. The ACC can be programmed to respond to the entry of any of the specifically authorized
user passcodes.
6. The ACC’s shall be able to be configured to control a specific area, or group of areas, or
all areas in the system.
7. The ACC’s shall be able to be temporarily re-addressed to view the status of a remote
area.
8. The ACC’s shall be able to provide different audible tones for Intrusion, Fire alarms, and
system troubles.
G. User Passcodes and Authority: Passcodes shall be programmable with authority levels to allow
users to operate any or all areas.
1. Up to 999 different passcodes shall be accommodated.
2. Each passcode shall be 3 to 6 digits (variable) and be assigned a 16-character user
name that shall be printed on the local printer and IDR with associated opening and
closing reports from the user.
3. User access to System features and functions shall be configurable based on 14
individual programmable levels of authority assigned to the user passcode. Additionally,
the system shall have the capability to assign to the user passcode, a different authority
level in each of the areas. A service passcode can be assigned to the servicing agent
allowing the agent limited access to system functions. User-programmable / activated
functions include:
a. Arming the system: All areas, specific area(s) only, perimeter instant, perimeter
Dennis Yarmouth Intermediate Middle School January 19, 2021
Dennis Yarmouth Regional School District 100% Construction Documents
Perkins Eastman DPC, project #71011 Addendum No. 1. February 3, 2021
28 1100 Intrusion Detection System
11 of 25
delayed, perimeter partial, watch mode, and arming the system with a duress
passcode.
b. Disarming the system: All areas, specific area(s) only and disarming with a duress
passcode.
c. Viewing system status: Faulted points, event memory, bypassed points, area status
and point status.
d. Implementation functions: Bypass a point, unbypass a point, reset sensors, silence
bell, activating relays, initiating the remote programming function locally to allow
programming the system from a remote location.
e. Testing the system: Local Walk test, Service Walk test, Fire test, send report to
remote IDR to check the telephone link, and programming the time and date for the
next test report transmission.
f. Change system parameters: ACC display brightness, system time and date, and
add/delete/change passcodes.
g. Extend the closing time of the system.
h. Transmitting special alerts and activating audible and visible signals.
i. Executing multiple commands / ACC keystrokes from a single Menu / Command List
item. This function shall be able to have a 16-character (alphanumeric) title to
identify it on the ACC display.
j. Editing of time / event-based scheduling program from the ACC.
4. The Intrusion Detection System shall also provide a "service menu" to implement
functions such as viewing and printing the system log, displaying the system firmware
revision number, and defaulting (toggling) text displays between custom and default text
displays for troubleshooting.
5. The Intrusion Detection System shall allow users to change their own user passcode
from the Alarm Command Center (ACC). Administration shall be capable of changing the
user passcodes and authority assignments by area of other users from the ACC.
6. The Intrusion Detection System shall incorporate a programmable "Passcode Follows
Scope" feature to allow users to arm or disarm only the area they are entering with one
simple command or control all areas from one ACC.
7. Passcodes shall be able to be associated with a unique access card/token. The authority
of the card assigned to the user will equal that of the user, and each card will report in the
display, local printer, memory event log and at the IDR as a unique, individual, user.
H. Communication
1. The Intrusion Detection System shall be capable of reporting system events and
supervisory reports including alarm, trouble, missing modules, restores, system status,
AC failure, battery status to primary and secondary off-site IDR’s.
2. The Intrusion Detection System shall be capable of communicating via dial-up analog
telephone lines, over a LAN/WAN/Internet using a wired network interface module, or
over a cellular network using a GSM/GPRS interface module.
3. The Intrusion Detection System shall be capable of communicating via dial-up analog
telephone lines, over a LAN/WAN/Internet using a wired dialer capture network interface
module.
4. The Bosch ModemIIIa² communications format shall be utilized for optimum system
performance. The ModemIIIa² format provides the maximum data information to the
receiver for alarms, troubles, restorals, bypasses, relay activation, opening/closings, and
card access. The detailed information includes the point numbers with text, peripheral
device numbers, user numbers with text, and area information. As an alternative format,
Contact ID may be used when a non-Bosch receiver is used although it will include less
detailed information like point or user text.
5. The Intrusion Detection System shall have the capability of communicating with up to 8
different IDRs using up to 4 different phone numbers, up to 24-digits in length and/or 4
URL/IP addresses over a network.
Dennis Yarmouth Intermediate Middle School January 19, 2021
Dennis Yarmouth Regional School District 100% Construction Documents
Perkins Eastman DPC, project #71011 Addendum No. 1. February 3, 2021
28 1100 Intrusion Detection System
12 of 25
6. The Intrusion Detection System shall have the capability of communicating with up to 5
different IDRs using up to 4 different phone numbers, up to 32-digits in length or 1 IP
address using a dialer capture network interface module.
7. The Intrusion Detection System shall support 2 telephone lines using a dual phone line
module. The lines shall be capable of being alternated for the transmission of
consecutive events.
8. The Intrusion Detection System shall report to a Commercial Central Station that is using
a Bosch D6600 Receiver/Gateway or a Bosch D6100i Receiver using ModemIIIa² as a
preferred format or Contact ID as an alternate format.
9. The Intrusion Detection System reports shall be classified, by event, into eleven
subcategories or "report groups." Each group represents similar types of events.
Individual events within each group shall be selectively enabled or disabled for
transmission. The eleven report groups shall be as follows:
a. Fire Reports.
b. Burglar Reports.
c. User Reports.
d. Test Reports.
e. Diagnostic Reports.
f. Relay Reports.
g. Auto Function Reports.
h. RPS Reports.
i. Point Reports.
j. User Change Reports.
k. Access Reports.
10. The Intrusion Detection System shall be capable of listening to the telephone line when
calls are answered by other devices on the premises side of the phone line and
determining if a special tone is being sent from RPS (Remote Programming Software)
and intercepting the call for RPS Sessions.
11. The Intrusion Detection System shall have the ability to verify the integrity of the remote
communications path and switch to alternate paths when a communications failure
occurs.
12. The Intrusion Detection System shall be capable of unattended mode of operation
whereby programming and configuration updates are automatically transferred using the
Remote Programming Software (RPS). These updates can initiate from either the control
panel or the remote computer using RPS.
I. Network Communication: The Intrusion Detection System shall be capable of network
communications over a LAN, WAN, Intranet, or the Internet. The system shall include
supervision of the network communication utilizing configurable periodic heartbeats to the
Digital Alarm Communications Receiver (IDR). The IDR shall provide notification of the loss of
communications from a networked system after a programmable timeframe since the last
communication. The notification options shall be programmable and include local annunciation
or indication to automation software.
1. The network interface module shall be capable of supporting Dynamic Host
Communication Protocol (DHCP) to obtain an IP Address.
2. The system shall support a method of authentication between the control panel and the
receiver to ensure that the control panel has not been compromised or replaced.
3. The network interface modules shall be capable of supporting encryption using a
minimum of 128-bit AES Encryption (Rijndael) certified by NIST (National Institute of
Standards and Technology).
4. The network interface modules shall support a 10/100BaseT connection to an Ethernet
network.
5. The control panel shall be capable of network communication with a programmable poll
time to send periodic heartbeats to the receiver, programmable ACK Wait time, and
programmable retry time. In the situation where a communication path is unsuccessful,
Dennis Yarmouth Intermediate Middle School January 19, 2021
Dennis Yarmouth Regional School District 100% Construction Documents
Perkins Eastman DPC, project #71011 Addendum No. 1. February 3, 2021
28 1100 Intrusion Detection System
13 of 25
the control panel shall be capable of attempting backup communication through an
available communication method to the same receiver or a backup receiver.
a. The control panel shall have the ability to automatically adjust the heartbeat rate of a
backup path that is using GPRS, to the heartbeat rate of the primary path in case of
a primary path failure. Upon restoral of the primary path, the heartbeat rate of the
backup path shall automatically restore to the original rate. This allows a system
utilizing GPRS communications to keep the wireless charges low.
b. The network communication between the control panel and the receiver shall use
ModemIIIa².
c. The control panel shall be capable of two-way communication using a wired network
interface module with a 10/100BaseT on a LAN/WAN/Internet configuration or with a
wireless GPRS module on the Internet.
d. The control panel shall be capable of configuring the destination of the receiver
using a URL or static IP Address.
e. The control panel shall be capable of using DNS to lookup the IP Address of the
receiver when programmed with a URL.
f. The control panel shall support UPnP for automated Port Forward configuration in
the router where the control panel is installed.
g. The control panel shall support AutoIP to enable the RPS software to connect to the
control panel locally using an IP Direct connection.
h. The control panel shall support configuration of the IP parameters from the keypad
eliminating the need for a PC to configure the IP device.
i. The control panel shall support network diagnostics from a keypad to allow local
testing of network connectivity. The diagnostics should include, Ethernet cable
connected, gateway configuration ok, DNS lookup operational, and external network
connectivity (such as the Internet) operational.
j. The system shall be capable of meeting DCID 6/9 and UL 2050 standards.
6. The system shall use a Dialer Capture Network Module (C900V2) to convert standard
PSTN communications to send the messages to the receiver using the IP network.
a. The Dialer Capture Network Module enables IP communications from the PSTN
based Intrusion Detection System to the receiver using an IP network.
b. The Dialer Capture Network Module shall include supervision of the network
communication, utilizing periodic heartbeats to the Digital Alarm Communications
Receiver (IDR). The IDR shall provide notification of the loss of communications
from a networked system after a programmable timeframe since the last
communication.
J. Event Log: The Intrusion Detection System shall maintain a log of events indicating time, day,
month, year type of event, account number, area number, user ID, point text, user text and
primary/secondary event route. The system shall allow the following characteristics:
1. The Intrusion Detection System shall be capable of storing up to 1000 events
2. The Intrusion Detection System shall support the printing of these events on a local
printer.
3. The Intrusion Detection System shall support viewing of logs locally at the ACC and
remotely via an upload to a remote central station computer running the RPS software.
4. The Intrusion Detection System shall provide notification via a report to the IDR when the event log reaches a programmable “percent full capacity". This allows retrieval of stored
events via RPS to prevent any loss of event history.
5. Group, signal type and area can route events to specific printers.
6. Each IDR shall be designated as a primary, backup, or duplicate destination for each
report group. Assigning an event to multiple routing groups provides for duplicate
destinations for the event. The transmission of grouped events allows the reporting of
different types of information to different remote IDRs.
Dennis Yarmouth Intermediate Middle School January 19, 2021
Dennis Yarmouth Regional School District 100% Construction Documents
Perkins Eastman DPC, project #71011 Addendum No. 1. February 3, 2021
28 1100 Intrusion Detection System
14 of 25
K. Testing, Diagnostics and Programming: The Intrusion Detection System shall be capable of
sending (manually or automatically) test and status reports to remote IDRs.
1. The Intrusion Detection System shall be capable of sending automatic tests daily, weekly
or once every 28 days. Automatic test times shall be programmable to provide an offset
of up to 24 hours from the current time.
2. Automatic test reports shall be programmable to be deferred by one test interval if any
other report is transmitted in the current interval.
3. Automatic test reports and remote system access for diagnostics shall be supported via a
remote central station computer with Remote Programming Software (RPS).
4. The Intrusion Detection System shall be programmable locally or remotely. Programming
shall be accomplished via a command center or a computer with a remote programmer
and diagnostic software package (RPS).
5. The Intrusion Detection System shall allow an on-site user to initiate remote programming
while on-line with the servicing location. The remote programming device must provide a
compare feature and allow for downloading either the stored program or the (un)modified
program copied from the panel.
6. The Intrusion Detection System shall allow the local programming option to be disabled
and must provide a method to program a panel while no one is on premises, when the
panel shares a line with an answering machine.
7. The Intrusion Detection System shall accommodate IP Diagnostic to verify settings and
operation of the network interface modules; Host name, MAC address, IPV4 address
assignment. The IP Connection test shall include; Link test to verify physical cable
integrity, Ping test to verify gateway response and ping test to verify address on the
internet.
8. Wireless point diagnostics shall include signal strength and device states of registered
wireless points in the system.
9. The number of systems testing and programming sessions shall be restricted via the use
of program locking features and passwords. Passcode protection in excess of sixteen
million combinations is required.
L. Miscellaneous Features: Programmable alarm output timer, 31 programmable entry delay
times, exit delay programmable by area, individually programmable point of protection text,
point bypassing, key switch arming capability with LED outputs, and fire verification.
M. False Alarm Reduction: The Intrusion Detection System shall comply with all ANSI SIA CP-01
requirements for false alarm reduction
N. Ambush Detection: The Intrusion Detection System shall include an early ambush feature that
requires that the user disarm, and then inspect the facility within a specified time period, before
entering their passcode or a different authorized passcode again. If the user does not enter a
passcode a second time, a duress event is generated. If the user does enter a passcode within
the specified time period, the system disarms.
O. Two-man rule: The Intrusion Detection System shall include a programmable feature that
requires 2 separate passcodes to be entered to disarm the system. After 1 passcode is
entered, the system will prompt for a second passcode to be entered on the same ACC.
Without the second passcode, the system shall not disarm.
P. User-Programmable Features: The Intrusion Detection System shall provide a menu driven
interface to provide a user-friendly command structure for programming / customizing the
system to the operational criteria of the application. The Intrusion Detection System shall be
capable of being operated via:
1. The Command Structure.
2. Menu / Command List.
Dennis Yarmouth Intermediate Middle School January 19, 2021
Dennis Yarmouth Regional School District 100% Construction Documents
Perkins Eastman DPC, project #71011 Addendum No. 1. February 3, 2021
28 1100 Intrusion Detection System
15 of 25
2.06 SYSTEM INTERFACE REQUIREMENTS
A. Grounding: The Security Subcontractor shall properly earth ground the Intrusion Detection
System to prevent electrostatic charges and other transient electrical surges from damaging the
Intrusion Detection System panel.
B. Primary power: The Security Subcontractor shall provide a dedicated 120 VAC power circuit to
the Intrusion Detection System. This circuit shall be connected to the emergency power system.
The 120 VAC is stepped down to power the Intrusion Detection System panel using a class
two, plug-in transformer. This power circuit shall be properly rated to continuously power all
points and functions indefinitely in full alarm condition.
C. Primary power supervision: When the primary power source fails, the system can be configured
to report an "AC Fail" message to a commercial central station.
1. The message can also be programmed to "tag-along" with another message transmitted
to the central station.
2. The system shall always display a loss of primary power on the ACC and may be
configured to provide additional audible warning.
3. The transmission delay of this message is programmable from 5 seconds to 86 minutes
with an optional 6 to 12-hour transmission delay.
D. Secondary power (standby battery): The Security Subcontractor shall provide adequate battery
power as defined by the relevant application criteria, (UL 864 and UL 985 for alarm
installations, or NFPA 72 chapters for fire applications). Appropriate battery chargers shall be
provided consistent with the battery back-up capacity. The most current accepted version of
NFPA 72 and any applicable local codes or AHJ requirements must be met accordingly.
E. Secondary power supervision: When the secondary power source experiences a 85 percent
depletion of its standby capacity, the system can be configured to report a "Low Battery"
message to a commercial central station. The system shall always display a low battery
condition on the ACC and may be configured to provide additional audible warning.
F. Telephone interface: The control panel in the Intrusion Detection System shall be equipped with
a phone line monitor and shall interface with the phone lines via RJ-31X jacks for supervision of
the telephone line connection.
1. The telephone line interface shall conform with FCC rules (Title 47 C.F.R. part 68).
2. When a telephone line is determined to be out of service by the Intrusion Detection
System panel, the event will be annunciated locally on the ACC and transmitted to the
central station over the alternate communications interface. The transmission delay of
this message is programmable from ten to two-hundred forty seconds.
3. A telephone line switching module shall be used to interface to a second telephone line.
G. Ethernet Interface: The Intrusion Detection System may use an Ethernet interface module as
the primary, or back-up means of communicating to an IDR.
1. Built-in IP-based alarm transport, programming, and control
2. The module shall accommodate 128-bit AES encryption.
10BASE T or 100BASE T network connection
3. Full-duplex and half-duplex support
H. GSM/GPRS interface: The Intrusion Detection System may use an GSM/GPRS radio module
as the primary, or backup, means of communicating to an IDR. Up to 4 IP Addresses shall be
available for routing system events. The supervision time shall be programmable with a range
of 5 to 65,535 seconds. This module shall accommodate 128-bit AES encryption.
Dennis Yarmouth Intermediate Middle School January 19, 2021
Dennis Yarmouth Regional School District 100% Construction Documents
Perkins Eastman DPC, project #71011 Addendum No. 1. February 3, 2021
28 1100 Intrusion Detection System
16 of 25
I. Auxiliary function control interfaces: The Intrusion Detection System shall accommodate
auxiliary functions such as activating bells, strobes, or lights and shall be accomplished using
the optional application specific relay modules. These auxiliary interfaces shall be electrically
isolated to avoid inter-system interferences or damage to the system.
1. Amber Strobes
a. The Amber Strobe shall be triggered by the Dennis- Yarmouth School Districts
Emergency Response protocols, and shall be coordinated with the School District.
b. The Amber Strobe shall be UL recognized and manufactured to NEMA 4X
requirements.
c. The Amber Strobe shall be durable vibration resistant construction, have long life
100,000 hour LED technology, and be backed up with a five year warranty.
d. The Amber Strobe will operate over a wide DC input voltage range of 10 - 100
VDC.
e. Amber Strobe shall be Tomar Electronics Model number 395L-1280 ½” threated
with Model 440 STAND, MAM-DS30 Wall Mounted Bracket and Model G470 Heavy
Duty Cage Guard, OR EQUAL.
J. Wiring: The Security Subcontractor shall provide cables consistent with the manufacturer's
recommendations. The following general guidelines shall be followed for wiring installation:
1. Wiring shall be appropriately color-coded with permanent wire markers. Copper
conductors shall be used.
2. All signal cables provided under this contract shall be Class II, plenum-rated cable where
required. Where subject to mechanical damage, wiring shall be enclosed in metal
conduits or surface metallic raceway.
3. Data wires shall not be enclosed in conduit or raceways containing AC power wires.
4. Where EMI may interfere with the proper operation of the Intrusion Detection System
circuits, twisted/shielded cable shall be used.
K. Environmental Conditions: The Intrusion Detection System shall be designed to meet the
following environmental conditions:
1. The system shall be designed for a storage temperature of -10° C to 70°C (14° F to
158°F).
2. The system shall be designed for an operating temperature of 0° C to 50°C (32° F to
120°F).
3. The system shall be designed for normal operation in an 85% relative humidity
environment.
4. The system shall meet or exceed the requirements of FCC rules Title 47 C.F.R. Part 15,
Class B devices, and Part 68, IEC EMC directive.
2.07 FIELD DEVICES AND SENSORS
A. Door Position Switches shall be furnished and installed by the Security Subcontractor. The
Security Subcontractor shall align, prepare and fabricate doors and frames to accept specified
door position switches. The Security Subcontractor shall be responsible for coordinating the
installation so systems and hardware operate as specified.
1. All Door Position Switches to be Double Pole Double Throw (DPDT) and report to both
the Access Control System and the Intrusion Detection System.
2. Surface Mounted Door Switch: Interlogix Model 2505-A-06 OR EQUAL, Surface Mounted
Magnetic Switch with armored cable. Route armored cable to junction box and
permanently secure to box with clamp or set-screws. Use only where flush mounted
devices cannot be installed.
3. Flush Mounted Door Switch: Interlogix Model 1076D-N (DPDT) or approved equal. Flush
Mounted Magnetic Switch with armored cable, OR EQUAL.
Dennis Yarmouth Intermediate Middle School January 19, 2021
Dennis Yarmouth Regional School District 100% Construction Documents
Perkins Eastman DPC, project #71011 Addendum No. 1. February 3, 2021
28 1100 Intrusion Detection System
17 of 25
4. Overhead Door Switch: Interlogix Model 2202AU-L or approved equal. Floor-mount
Magnetic Contact for Overhead Doors, Universal Magnet, 3 in. Gap Size, Closed Loop,
Includes 18 in. Stainless Steel Armored Cable, OR EQUAL.
5. Gates and Roll-Up Doors: Interlogix Model 2205-A, 2205-AU, 2507A series with armored
cable, OR EQUAL.
6. Slide Gates: Interlogix Model 2700 Series with appropriate mounting brackets and cable,
OR EQUAL.
B. Duress Buttons shall be furnished and installed by the Security Subcontractor. Security
Subcontractor shall align, prepare and fabricate under counter or under desk locations to
accept specified Duress Button door position switches. The Security Subcontractor shall be
responsible for coordinating the installation so systems and hardware operate as specified.
1. Under desk or under counter Duress Buttons: Interlogix Model 3040, OR EQUAL
C. Hallway Panic Buttons with Bopper Stopper Covers shall be furnished and installed by the
Security Subcontractor. Security Subcontractor shall prepare locations in hallways as indicated
in contract document to accept specified Panic Buttons. The Security Subcontractor shall be
responsible for coordinating the installation so systems and hardware operate as specified.
1. Hallway Stopper stations/Panic Buttons: Safety Technology International Model STI
SS2422LD-EN, OR EQUAL
D. Motion Detectors and Power Supply
1. PIR Motion Detector; 360° Ceiling Mounted: Bosch Model ZX938Z OR EQUAL
2. PIR Motion Detector; Wall Mounted: Bosch Model ISC-BPR2-W12 OR EQUAL
3. PIR Motion Detector Power Supply; Bosch Model B520-C OR EQUAL (must be
compatible with PIR Motion Detectors.)
E. Motion Detectors Tri-Tech Technology (Install in Gymnasium, Cafetorium, Back Stage and in
the Theatre)
1. The product specified is a dual detector incorporating PIR signals with range adaptive
Doppler radar into an intelligent algorithm to provide accurate and reliable alarm
decisions. The product is designed for commercial indoor applications and is built with a
sealed optic chamber to provide immunity to drafts and insects. The unit consists of a
self-locking two-piece enclosure with a built-in two-way bubble level to help simplify the
installation. The detector incorporates sensor data fusion technology that integrates the
data from five different sensors to ensure alarm conditions are based on precise
information and tri-focus optics technology that eliminates coverage gaps and false
alarms.
2. Detector Requirements:
a. The specified detector shall be a dual detector unit incorporating range adaptive
Doppler radar and PIR signals into an intelligent algorithm to provide accurate and
reliable alarm decisions.
b. The detector shall be available in 10.525 GHz and 10.588 GHz microwave models as
required by the application.
c. The detector shall consist of a self-locking two-piece enclosure with a built-in two-way
bubble level to help simplify the installation.
d. The detector shall be built with a sealed optic chamber to provide immunity to drafts,
insects, and small animals.
e. The detector shall be designed to provide coverage in the event the microwave
subsystem fails.
f. A Microwave Anti-Masking feature shall send a supervision trouble signal if
microwave reflective material is placed within 30 cm (1 ft) of the detector.
g. The detector shall contain light emitting diodes (LEDs) that adjust automatically to the
surrounding light level. A blue LED indicates dual alarms and activates during a
remote walk test. The walk test LED may be enabled or disabled from the control
Dennis Yarmouth Intermediate Middle School January 19, 2021
Dennis Yarmouth Regional School District 100% Construction Documents
Perkins Eastman DPC, project #71011 Addendum No. 1. February 3, 2021
28 1100 Intrusion Detection System
18 of 25
panel or locally at the detector via a DIP switch. A yellow LED shall indicate
microwave alarms, and a red LED indicates PIR alarms.
h. The detector shall reduce false alarms by having a sealed optic chamber that
provides immunity to drafts and insects.
i. The detector shall provide a remote self-test function that initiates when the walk test
input switches to its active state. The alarm relay and alarm LED activate for four
seconds following a successful test. The trouble relay activates and the alarm LED
flashes following a failed test.
j. The detector shall provide input power supervision that activates the trouble relay
and causes the LED to flash when the power is lower than 8 volts.
3. Sensor Technology Requirements:
a. The detector shall incorporate sensor data fusion technology that uses an internal
microprocessor to gather, analyze, and compare the data from five separate sensors
to make the most intelligent alarm decisions. The data processed from the
microprocessor shall be from two pyroelectric sensors, a Doppler microwave sensor,
a room temperature sensor, and a light level sensor.
b. The detector shall also incorporate tri-focus technology that uses three high-quality
Fresnel lenses with three specific focal lengths to provide long-range, middle-range,
and short-range coverage. The detector shall apply the three focal lengths to 86
detection zones which combine to produce 11 solid curtains of detection. The tri-focal
optics technology shall include two pyroelectric sensors which deliver twice the
standard optical gain.
c. The detector shall provide active white light suppression capable of measuring the
light intensity directed at the face of the unit, and use the data gathered by the
sensors to eliminate false alarms caused by the bright light source. False alarms
shall not be caused from bright light sources up to 10,000 lux.
d. The detector shall provide dynamic temperature compensation that adjusts the PIR
sensitivity to detect human body heat accurately to avoid false alarms and deliver
consistent catch performance at all operating temperatures.
4. Outputs:
a. The detector shall provide a cover and wall tamper switch with a normally- closed
contact that opens to notify the control panel in the event the cover is removed or the
detector is separated from the wall. The contacts shall be rated at 25 VDC, 125 mA
maximum.
b. The detector shall provide a solid-state relay that is power supervised and uses less
current and provides longer standby capacity than a mechanical relay. The solid-
state relay shall be used to send a silent alarm output signal. Rating of the relay shall
be 3W, 125 mA, 25 VDC, with resistance less than 10 ohms.
c. The detector shall provide a solid-state relay with normally-closed (NC) contacts that
shall be used as a trouble indicator.
5. PIR Coverage and Mounting Brackets
a. The detector shall provide the following DIP switch selectable fields of coverage:
1) 18 m x 25 m (60 ft x 80 ft)
2) 8.0 m x 10 m (25 ft x 33 ft)
b. The detector shall be designed to be mounted at a height between 2m to 3m (7 ft to
10 ft) and require no adjustments.
c. The manufacturer shall offer the following three optional mounting brackets:
1) A Gimbal-mount bracket [Bosch B328] that mounts on a single- gang box and
allows rotation of the detector.
2) A Low-profile plastic wall swivel mount bracket [Bosch B335-3]. The mount
allows a vertical pivot range of +10º to -20º and a horizontal pivot range of ±25º.
3) A plastic universal swivel bracket for ceiling mounting [Bosch B338]. The mount
allows a vertical pivot range of +7º to -16º and a horizontal pivot of ±45º.
6. Certifications and Approvals
Dennis Yarmouth Intermediate Middle School January 19, 2021
Dennis Yarmouth Regional School District 100% Construction Documents
Perkins Eastman DPC, project #71011 Addendum No. 1. February 3, 2021
28 1100 Intrusion Detection System
19 of 25
a. The specified detector is designed to comply with the following standards and
approvals:
1) UL639 and cULus
1) CE
2) C-Tick
3) EN50131-1 Grade 2
4) FCC
5) IC
b. The specified detector shall globally meet or exceed all relevant electrical, safety, and
safety requirements.
7. Mechanical Specifications:
a. Dimensions: 136mm x 69 mm x 58mm (5.25 in. x 2.75 in. x 2.25 in.)
b. Material: High impact ABS plastic.
c. Color: white
8. Electrical Specifications:
a. Operating Voltage: 9 VDC to 15 VDC
b. Current (maximum): less than 25 mA
c. Current (Standby): 13 mA
9. Environmental Specifications:
a. Temperature, Operating and Storage: -30ºC to +55ºC (-20ºF to +130º F)
b. For UL Certified Installations: 0ºC to +49ºC (+32ºF TO +120ºF).
c. IP Rating: IP 41, IK02 (EN60529 and EN50102)
d. Relative humidity: 0 to 95%, non-condensing
10. Install Tri-Tech Motions on opposing walls for cross coverage in large spaces.
F. Mounting Brackets (as needed for field of sensing)
1. Swivel Mount Bracket; Bosch Model B335-3 OR EQUAL
2. Gimbal Mount Bracket; Bosch Model B328 OR EQUAL
3. Ceiling Mount Bracket; Bosch Model B338 OR EQUAL
2.08 MODULES AND ALARM KEYPAD
A. Alarm Command Center Keypad: Alarm Command Center Keypad with 16-character
alphanumeric display for DACS programming and display of alarm status, with distinctive alarm
tones and back lighted multi-key touchpad: Bosch Model D1260 Command Center, OR
EQUAL.
B. Point of Protection Expander Module; Multiplexed Alarm Point Expander: Bosch Model D8125,
OR EQUAL.
C. Alarm Point Input Module: Input Module as required by system configuration and functions.
Bosch Model D9127T POPIT, or D9128 OctoPOPIT Module, OR EQUAL.
D. Control Point Output Module: The Control Point Output Module shall have 8 dry-contact relay
outputs for door control, local alarm horns, ACS interface and other output functions; Bosch
Model D8129 OctoRelay Module, OR EQUAL.
E. Eight Zone Input Module: The Eight Zone Input Module shall be Bosch Model B208, OR
EQUAL.
F. Eight Zone Output Module: The Eight Zone Output Module shall be Bosch Model B308, OR
EQUAL.
G. Motion Detector Power Supply: Bosch Model B520-C OR EQUAL.
Dennis Yarmouth Intermediate Middle School January 19, 2021
Dennis Yarmouth Regional School District 100% Construction Documents
Perkins Eastman DPC, project #71011 Addendum No. 1. February 3, 2021
28 1100 Intrusion Detection System
20 of 25
H. Zone Expansion Module: Bosch Model D8125 OR EQUAL.
PART 3 - EXECUTION
3.01 GENERAL
A. The Security Subcontractor shall install and program the Intrusion Detection System in
accordance with Section 28 0000, Security System General Requirements, and to the Owners
specification.
3.02 EXAMINATION
A. The Security Subcontractor shall examine areas to receive devices and notify the General
Contractor and the Architect of any adverse conditions affecting installation or subsequent
operation.
B. All unacceptable conditions are to be corrected installation of any components or devices.
C. The Security Subcontractor shall ensure all preparation is completed. If preparation is the
responsibility of another Subcontractor, the Security Subcontractor shall notify Architect of
unsatisfactory preparation before proceeding.
D. Ensure selected location is secure and offers protection from accidental damage.
E. Location shall provide reasonable temperature and humidity conditions, free from sources of
electrical and electromagnetic interference.
F. Ensure power source is protected against accidental shutoff or short.
G. Install all equipment and materials in accordance with the "current" recommendations of the
manufacturer. The work shall also be in accordance with:
1. Installation criteria defined in these specifications, in the installation manuals and guides,
and in the construction documents.
2. Factory Representative can be the Bosch Security Systems Inc Security Dealer.
3. Approved submittals.
4. Applicable requirements of referenced standards.
H. Programming of the system shall include the following tasks:
1. Programming system configuration parameters as required by the Owner (hardware and
software, zone/circuit numbers, communication parameters). Coordinate with Security
Consultant.
2. Programming operational parameters as required by the Owner such as opening/closing
reports and windows, system response text (custom English) displays of events,
activation of relays that drive auxiliary devices, and identifying types of zones/loops.
Coordinate with Security Consultant.
3. Programming passcodes according to the Owners requirements and functions defined by
the Owner. Coordinate with Security Consultant.
4. Other system programming tasks required by the owner including Lock down, shelter in
place, Evacuation or other defined School related functions. Coordinate with Security
Consultant.
Dennis Yarmouth Intermediate Middle School January 19, 2021
Dennis Yarmouth Regional School District 100% Construction Documents
Perkins Eastman DPC, project #71011 Addendum No. 1. February 3, 2021
28 1100 Intrusion Detection System
21 of 25
5. Operational Testing: The Security Subcontractor shall perform thorough operational
testing and verify that all system components are fully operational.
6. Hard-copy System Printout: The Security Subcontractor shall submit a hard-copy system
printout of all components tested and certify 100 percent operation indicating all
devices/panels/units have passed the test criteria set forth by the manufacturer.
7. Acceptance Test Plan Form: An acceptance test plan form shall be prepared/provided by
the Security Subcontractor prior to the acceptance walk-through.
8. This form shall include separate sections for each device/panel/unit as well as a column
indicating the manufacturer's performance allowance/margin, a column indicating the
result of the testing performed by the Security Subcontractor (pass/fail), and an empty
column for recording findings during the walk-through.
9. Fire Alarm Systems shall comply with NFPA 72 Standards for inspection, testing, and
maintenance.
10. Special School Incident Conditions such as Lock Down, Shelter in Place and Evacuation.
Coordinate with Architect, Owner and Security Consultant.
I. The Security Subcontractor shall certify completion in writing and schedule the commissioning
walk-through. The Security Subcontractor shall provide all the tools and personnel needed to
conduct an efficient commissioning process.
3.03 FIELD QUALITY CONTROL
A. The Security Subcontractor shall meet specification requirements as described in Section 28
0000, “ELECTRONICS SECURITY SYSTEMS GENERAL”, and Section 28 4000 Testing
Requirements.
B. The Security Subcontractor shall submit a written test report that the system has been 100
percent tested and approved. Final test shall be witnessed by the Security Consultant and the
Electrical Subcontractor, and performed by the Security Subcontractor. Final test report shall be
received and acknowledged by the Security Consultant prior to request for final sign-off.
C. The Security Subcontractor shall meet all requirements as outlined in Section 28 4000 for
Closeout & Warranty.
D. The Security Subcontractor shall provide instruction to the owner's satisfaction with regard to
proper use and operation of the system.
E. Determine and report all problems to the Manufacturer's customer service department.
3.04 SYSTEM CONFIGURATION PREPARATION
A. The Security Subcontractor shall prepare detailed project planning worksheets and forms for
programming and configuration of the Intrusion Detection System. The Security Subcontractor
shall coordinate with the Owner to complete. Needed information for programming, not
provided in the contract documents, shall be provided by the Owner for programming.
B. The Security Subcontractor shall work with the Owner and the Architect to complete the
worksheets and forms for Intrusion Detection System programming. The Owner shall provide
information regarding programming that is not available on the project drawings. The Owner
shall review and approve the final Intrusion Detection System Programming documents. The
Security Subcontractor shall use final documents to program and configure software.
C. Intrusion Detection System programming information may include but is not limited to:
Dennis Yarmouth Intermediate Middle School January 19, 2021
Dennis Yarmouth Regional School District 100% Construction Documents
Perkins Eastman DPC, project #71011 Addendum No. 1. February 3, 2021
28 1100 Intrusion Detection System
22 of 25
1. Define and set up partitions and zones.
2. Define alarm delays.
3. Develop schedules.
4. Develop passwords.
5. Propose start and stop times for time zones and holidays.
6. Set up groups, codes, software triggers, and list inputs and outputs.
7. Assign action message names and compose messages.
8. Assign device names and locations.
9. Set up alarms and establish trigger events.
10. Set up user names and pass codes.
11. Set up keypads.
12. Develop user-defined fields.
13. Develop call list for third-party monitoring company.
14. Complete system diagnostics and operation verification.
15. Prepare a specific plan for system testing, startup, and demonstration.
16. Develop acceptance test draft and on approval develop test.
17. Develop system details; input data with all changes from construction documents.
Include system schematics and technical drawings in electronic format.
D. Programming of the system shall include the following tasks:
1. Programming system configuration parameters (hardware and software, zone/circuit
numbers, communication parameters).
2. Programming operational parameters such as opening/closing reports and windows,
system response text (custom English) displays of events, activation of relays that drive
auxiliary devices, and identifying types of zones/loops.
3. Programming passcodes according to the authorities and functions defined by the
Owner.
4. Other system programming tasks required by the Owner. These additional programming
requirements shall be coordinated between the Owner and the General Contractor.
5. Operational Testing: The contractor shall perform thorough operational testing and verify
that all system components are fully operational.
6. Hard-copy System Printout: The Security Subcontractor shall submit a hard-copy system
printout of all Intrusion Detection System components tested and certify 100 percent
operation indicating all devices/panels/keypads/inputs/outputs, POPIT/OctoPOPIT units
have passed the test criteria set forth by the manufacturer.
7. Acceptance Test Plan Form: An acceptance test plan form shall be prepared/provided by
the Security Subcontractor prior to the walk-through.
8. This form shall include separate sections for each device/panel/unit as well as a column
indicating the manufacturer's performance allowance/margin, a column indicating the
result of the testing performed by the Security Subcontractor (pass/fail), and an empty
column for recording findings during the walk-through.
9. Fire Alarm Systems integration shall comply with NFPA 72 Standards for inspection,
testing, and maintenance.
10. Program all special School Incident Conditions and triggers for conditions such as Lock
Down, Shelter in Place and Evacuation. Coordinate with Architect, Owner and Security
Consultant.
E. The Security Subcontractor shall certify programming completion in writing and schedule the
commissioning walk-through. The Security Subcontractor shall provide all the tools and
personnel needed to conduct an efficient commissioning process. Security Subcontractor to
coordinate with Owner.
3.05 ADJUSTING
Dennis Yarmouth Intermediate Middle School January 19, 2021
Dennis Yarmouth Regional School District 100% Construction Documents
Perkins Eastman DPC, project #71011 Addendum No. 1. February 3, 2021
28 1100 Intrusion Detection System
23 of 25
A. The Security Subcontractor shall return to the project site one month after completion to make
false alarm adjustments, small and minor adjustments, and to provide additional high level
informal training.
B. System maintenance and repair of system or workmanship defects during the warranty period
shall be provided by the Security Subcontractor free of charge (including parts and labor).
C. The Security Subcontractor shall correct any system defect within six hours of receipt of call
from the Owner.
3.06 DEMONSTRATION
A. Demonstrate at final inspection that Intrusion Detection System and devices functions properly.
1. The Security Subcontractor, upon completion of installation, shall furnish training in the
complete operation of the systems.
3.07 PROTECTION
A. Protect installed products until completion of project.
B. Touch-up, repair or replace damaged products before substantial completion.
3.08 TESTING
A. See SECTION 28 4000 ELECTRONIC SECURITY SYSTEMS TESTING, TRAINING,
CLOSEOUT & WARRANTY.
3.09 TRAINING
A. See SECTION 28 4000 ELECTRONIC SECURITY SYSTEMS TESTING, TRAINING,
CLOSEOUT & WARRANTY.
3.10 CLOSE-OUT AND WARRANTY
A. See SECTION 28 4000 ELECTRONIC SECURITY SYSTEMS TESTING, TRAINING,
CLOSEOUT & WARRANTY.
3.11 SPECIAL CONDITIONS PROGRAMMING
A. The Security Subcontractor shall program special conditions and trigger functions for:
1. Shelter in Place
2. Lock Down
3. Evacuation
4. Conditions for First Responders and Law Enforcement
B. The Security Subcontractor shall program outputs to initiate the Amber Beacons on the
perimeter of the building, and messaging thru the communications.
Dennis Yarmouth Intermediate Middle School January 19, 2021
Dennis Yarmouth Regional School District 100% Construction Documents
Perkins Eastman DPC, project #71011 Addendum No. 1. February 3, 2021
28 1100 Intrusion Detection System
24 of 25
1. The Security Subcontractor shall provide inputs and outputs for audio and visual triggers
to be initiated for warning of conditions.
C. The Security Subcontractor shall coordinate with the School Administration and the Architect for
all required functions, including know box control functions as needed.
3.12 ELECTRONIC SECURITY SYSTEM TESTING, TRAINING, CLOSEOUT & WARRANTY
A. See SECTION 28 4000 “ELECTRONIC SYSTEM TESTING, TRAINING, CLOSEOUT & WARRANTY.”
3.13 IDENTIFICATION AND TAGGING
A. Cables, wires, wiring forms, terminal blocks and terminals shall be identified by labels, tags or
other permanent markings. The markings shall clearly indicate the function, source, or
destination of all cabling, wiring and terminals. The wire-marking format contained in the shop
drawings shall be utilized for all conductors installed under this Specification. All cables and
wires shall be identified, utilizing heat-shrink, machine-printed, polyolefin wire markers. Hand
written tags are not acceptable.
B. All terminal points shall be appropriately identified and labeled as shown on shop drawings.
C. All panels shall be provided with permanently attached engraved labels with identifying names
and functions. Labels shall be consistent in form, color, and typeface throughout the system
and all must contain the name of the system or subsystem as part of the label textual
information. Design, color, font and layout shall be coordinated with, and approved by, the
Owner.
3.14 DATABASE PREPARATION, CHECKING AND ACTIVATION
A. Security Subcontractor shall provide the Owner with the appropriate request forms necessary to
organize the system database inputs. Guidance shall also be provided to Owner’s IT personnel
to insure their understanding of database format requirements and constraints.
B. The Security Subcontractor to clearly identify on the Project Schedule, any database
requirements so database preparation is accomplished in sufficient time to permit orderly and
on time system activation. The forms and guidance shall be presented to the Owner no less
than 60 days prior to scheduled central system activation.
C. It shall be the responsibility of the Owner to ensure the accuracy of the database information
entered on forms by thoroughly checking all completed data entry forms.
D. It shall be the responsibility of Security Subcontractor to ensure that database formatting is
correct prior to entry into the system and system activation.
E. The Security Subcontractor shall be responsible for the initial database entry into the system
prior to activation. This database entry may be manual and shall be the responsibility if the
Security Subcontractor. The database shall consist of users, hardware and function-related
information, i.e., system configuration, cameras, alarm points, software parameters for system
management, graphical maps and telephone entry system interfaces. A printout of the final
Dennis Yarmouth Intermediate Middle School January 19, 2021
Dennis Yarmouth Regional School District 100% Construction Documents
Perkins Eastman DPC, project #71011 Addendum No. 1. February 3, 2021
28 1100 Intrusion Detection System
25 of 25
database shall be provided to the Owner’s IT Department for review and approval prior to
system activation.
F. System activation shall be the responsibility of Security Subcontractor. Once the system and
database have been demonstrated to be functioning properly according to manufacturer's
guidelines and the system design, all further database entries and upgrades shall be the
responsibility of the Owner’s IT Department after final close-out.
3.15 START-UP RESPONSIBILITY
A. The Security Subcontractor shall initiate System Operation. Competent CERTIFIED start-up
technicians shall be provided by the Security Subcontractor on each consecutive working day
until the System is functional and ready to start the acceptance test phase. If in Architects
judgment the Security Subcontractor is not demonstrating progress, the Security Subcontractor
shall supply Manufacturer's factory technical representation and diagnostic equipment at no
cost to Owner, until resolution of those defined problems.
B. Properly ground each piece of electronic equipment prior to applying power.
C. Properly ground all shielded wire shields to the appropriate earth ground at the hub end only,
not at the remote or device end. Provide EOL resistors.
D. Use a start-up sequence that incrementally brings each portion of the system on-line in a
logical order that incorporates checking individual elements before proceeding to subsequent
elements until the entire system is operational.
3.16 PRELIMINARY INSPECTION, TESTING AND COMMISSIONING
A. The Security Subcontractor shall provide Preliminary Testing, Inspection, Acceptance Testing,
Burn-In and Commissioning Performance services for systems and equipment. General
Commissioning Requirements as found in General Conditions.
3.17 FINAL PROCEDURES
A. Post Acceptance Work:
1. The Security Subcontractor shall return to the project site thirty (30) days after
Acceptance of the Installation for a two (2) Hour retraining session as part of this
contract.
2. Check, inspect and adjust systems, equipment, devices and components specified, programming updates, at the Owner’s convenience, approximately thirty (30) days after
Acceptance of the Installation.
3.18 NOTICE OF COMPLETION
A. When the performance and acceptance requirements described, including the Final
Acceptance Test, have been satisfactorily completed, the General Contractor shall issue a
Letter of Completion to Security Subcontractor indicating the date of such completion.
Dennis Yarmouth Intermediate Middle School January 19, 2021
Dennis Yarmouth Regional School District 100% Construction Documents
Perkins Eastman DPC, project #71011 Addendum No. 1. February 3, 2021
28 1100 Intrusion Detection System
26 of 25
B. The Notice of Completion shall be recorded by Security Subcontractor upon receipt of the
General Contractor completion letter. This date of record shall be the start of the warranty
period.
END OF SECTION 28 1100
(THIS PAGE IS BLANK)