Request for Proposals For
CSITMS Gujarat Project
Confidential
Request for Proposals
For
Appointment of Agency for Design, Site
Preparation, Supply, Installation and Maintenance of Physical & IT
Infrastructure for the
City Surveillance and Intelligent Traffic Monitoring System
For Three major cities of Gujarat
VOLUME - II
(Technical Specifications)
Bid Reference No. RFP/CCTV/CSITMS-Rev/2013/02
Home Department (GoG),
Block – II Sachivalaya.
Gandhinagar,
Gujarat (INDIA)
1
CSITMS Gujarat Project
Confidential
Volume: II
Technical Specifications
2
CSITMS Gujarat Project
Confidential
Contents
1.0
General Specification and Requirement ................................................................... 5
1.1
General requirements ............................................................................................... 6
1.2
Broad details and requirements ................................................................................ 8
1.3
Inspection and Tests ................................................................................................ 10
2.0
Technical Specifications and Compliances .............................................................. 14
3.0
Network Switches & Bandwidth.............................................................................. 21
3.1
Network switch – 24 ports ...................................................................................... 21
3.2
Bandwidth ............................................................................................................... 22
4.0
Storage..................................................................................................................... 24
5.0
Video Management Software ................................................................................. 27
6.0
Video Analytics ........................................................................................................ 33
6.1
Automatic Number Plate Recognition (ANPR) ........................................................ 33
6.2
Red Light Violation Detection (RLVD) ...................................................................... 39
6.3
Manual Challan ........................................................................................................ 43
7.0
Data Center.............................................................................................................. 45
7.1
Air conditioners ....................................................................................................... 45
7.2
UPS........................................................................................................................... 50
7.3
Access control system ............................................................................................. 55
7.4
Fire detection and suppression ............................................................................... 63
7.5
Internal CCTV system .............................................................................................. 87
8.0
City wise Command and Control Centre ................................................................. 88
8.1
Workstation ............................................................................................................. 88
8.2
USB Joystick ............................................................................................................. 89
8.3
Server....................................................................................................................... 89
8.4
Video Wall (3 X 4) .................................................................................................... 91
3
CSITMS Gujarat Project
Confidential
8.5
Furniture .................................................................................................................. 93
9.0
UPS and DG set ........................................................................................................ 95
9.1
6 KVA UPS ................................................................................................................ 95
9.2
DG set ...................................................................................................................... 97
10.0 Firewall / UTM Specifications ................................................................................ 102
11.0 Antivirus Specifications ......................................................................................... 107
12.0 NMS Specifications ................................................................................................ 116
13.0 Multifunctional Printer .......................................................................................... 118
Annexure – I
Approved Make ..................................................................................... 119
4
CSITMS Gujarat Project
Confidential
1.0 General Specification and Requirement
The purpose of this project is to create a safe and secure environment for the citizens
who live, work, visit and doing business in Ahmedabad, Vadodara & Gandhinagar city by:









Reducing the fear of crime and reassuring the public
Helping to prevent crime
Deterring and detecting crime
Helping to identify, apprehend and prosecute offenders
Providing evidence for criminal and civil action in the courts
Helping maintain public order
Assisting in the management and policing of large-scale events
Providing assistance to emergency services
Assisting in improving traffic discipline and the town environment
The broad scope of the project is to install IP based Surveillance System &
Traffic Solution at strategic locations, entry / exits, traffic junctions of Ahmedabad,
Vadodara & Gandhinagar City to provide security to the citizens.
At all the locations the work is to be executed carefully, ensuring that the other areas of
premises and nearby services are not disturbed and cleanliness shall be maintained at all
the time during project execution. There should be a City Command & Control Room at
respective CP offices for monitoring & storage.
The video feed from the individual fixed and PTZ camera, alerts from ANPR, RLVD system
should reach to network switch at the location and from the network switch through
fiber connectivity it should be transmitted to City Command & Control room. There shall
be UPS installed with 4 Hrs. of backup at field and at City Command & Control Room to
cater the power backup facility for equipments during the period of outage of the power.
More over at certain location where the street light and other related illumination is not
adequate, external IR illuminator shall be installed to capture the video footage during
the night / low lux environment.
One traffic junctions Viz. Income tax will contain Automatic Number Plate Reading
(ANPR) and Red Light Violated Detection (RLVD) system. One City Entry / exit point at
5
CSITMS Gujarat Project
Confidential
Narol Junction will have ANPR. The data processing will be done locally but only alerts
with relevant images will be sent to city wise control room and challan (Automatic /
Manual) will be generated.
1.1General requirements
a) Equipment, devices and materials used should be as per Industry standards.
Workmanship and installation of devices should consider proper installation;
connecting and testing all points related to IP based CCTV & Traffic System for all
the locations mentioned in this RFP. Co-ordination with other agencies for other
sub systems installed in the Command & Control Centre is to be taken care of like
Civil, Electrical, UPS, furniture etc.
6
CSITMS Gujarat Project
Confidential
b) Care is to be taken considering service & maintenance for the period of five years
of various systems and necessary provisions shall be made at desired places for sub
systems.
c) Usage of materials as mentioned is to be strictly adhered to.
d) Team of Skilled manpower is to be deployed during project implementation
under trained supervisor at site. A detail list of qualifications and No. of persons has
to be submitted with the bid.
e) Wherever possible; efficient & sturdy structure, usage of trays, necessary
accessories and bends etc should be used and work shall be completed on time at
all stages of the Project.
The response to RFP must include/ensure the following:
1.
Detailed description of materials proposed in accordance with the requirement
statement.
2.
Compliance must be ensured to all the Technical Specifications / makes / etc. spelt
out in this RFP must be ensured.
3.
Comprehensive Bill of Quantity with identification numbers, sizes, specifications
and quantity for materials to be used must be provided.
4.
Wherever required design/layout should be provided for each section.
5.
Bidder should keep sufficient spares of the key components at the local office for
7 years from FAT.
6.
Timely completion of the work including at each project stage is essential.
7.
Bidder must provide write-up, pictures etc as documentary proof of quality work
executed.
8.
Any special skill, list of tools or other important information may be provided,
which can explain qualitative expertise of the Bidder for this project.
7
CSITMS Gujarat Project
9.
Confidential
The work is to be carried out as per Industry standard and specific needs of an IP
based CCTV project, Traffic Solution & Control Room.
1.2 Broad details and requirements
Bidder shall carry out supply, installation, testing, commissioning, manage and run all
systems / subsystems for CSITMS PROJECT IN THREE CITIES OF GUJARAT for 5 years
after FAT. The list of locations of CSITMS Project for Ahmedabad, Vadodara and
Gandhinagar is mentioned in the RFP. Such work shall be executed as per the
National and International standards, the best industry practices and Vendor’s
standard practice/documentation and recommendations. The bidder has to take care
of transport, lifting and shifting of the all the equipments at the respective sites.
At all the locations the work is to be executed carefully, ensuring that the other areas
of premises and nearby services are not disturbed and cleanliness shall be
maintained at all the time during project execution.
1.2.1 Bidder shall carry out the work including necessary co-ordination and integration
to many other systems to be installed for the CSITMS Project :
a) The Bidder should ensure that the work is carried out as per the specification
using material from reputed manufacturer.
b) The Bidder and his OEM shall work in coordination to resolve the issues related to
interoperability problem with any other equipment/solution during the
implementation of the solution.
c) While bringing the equipment, ensure customer assets are not damaged due to
usage of cranes, trucks for material movement.
1.2.2 The Bidder should supply all necessary accessories required to install the various
subsystems to commission and integrate the equipment/solutions for CSITMS
project.
8
CSITMS Gujarat Project
Confidential
1.2.3 The Bidder along with (n)Code Solutions – A Division of GNFC Ltd. shall conduct
the inspection & testing of all equipments / materials at the time of delivery and
after implementation and commissioning.
1.2.4 The warranty shall be comprehensive in nature i.e. shall include components
replacement/ repairing of material, equipments / solution, software free of cost
and all expenses incurred on the replacement /repairing/standby shall be borne
by the Bidder.
1.2.5 The terms and the time period of the warranty should be as per the specifications
given separately under the heading of “Warranty”.
1.2.6
Timely availability of the materials at site shall be ensured & the work is to be
carried out by skilled manpower
1.2.7 Bidder shall provide spares and service support as mentioned under. Bidder to
provide information and organization set up for the spares and service support
offered by them.
a. The Bidder shall agree to supply the spares for a period of seven years
after the date of Final Acceptance Certificate at the same or less price
( provide such list with current rates ).
b. The Bidder or its OEM shall stock all necessary spare parts available
with them for the replacement / rectification of problems and must be
used so as to rectify the faults at the all the locations of Ahmedabad ,
Vadodara & Gandhinagar City within the time limit specified in tender.
1.2.8 The Bidder shall clearly describe what other technical services, assistance, training
or support will be provided to Home Department - GoG to deploy the proposed
solution.
1.2.9 The Bidder should have their Sales & Service arrangement to be able to provide
Offsite / Onsite 24 X 7 hours support at the locations of Ahmedabad, Vadodara &
Gandhinagar city.
9
CSITMS Gujarat Project
Confidential
1.3 Inspection and Tests
The inspection and tests shall be conducted at the installation locations of all the
three cities i.e. Ahmedabad, Vadodara & Gandhinagar.
a)
b)
The inspection and tests shall be conducted at the installation premises. The
Bidder / OEM shall provide all necessary facilities and equipments including access
to drawings, datasheet, architecture, programming manual, software etc required
to carry out such tests.
The Bidder shall provide inspection and testing from EQDC for the equipment
before the delivery.
The Bidder shall provide the following things as minimum before the delivery of
the Equipment.
 Factory test reports
 Identification of the equipment being delivered
 Bill of Quantity along with detailed specifications and quantity
 All the documentation in hard/soft copy, required for the successful
installation and commissioning of the equipment for the project.
c)
On site Test shall include testing of all equipments for the acceptance level of
various parameters for system reliability, availability and maintainability. The
Bidder shall broadly include/submit a comprehensive write up to cover the
performance test as proposed to be conducted. The intent of the performance
shall be to demonstrate that the proposed system performs all the functions as
indicated in the Specification sheets correctly and reliably and as per the
requirement mentioned in tender.
d)
The write up/ procedure for performance test shall be subjected to (n)Code
Solutions – A Division of GNFC Ltd ‘s approval. The availability tests shall include
all reasonable exercises with which the combination of equipment and software
can be expected to perform in actual usage.
e)
Inspection Tests for Components:



Confirm on the components with the Packing list & Purchase Order.
Check for internal/ external damages.
Check for appropriate Power conditions.
10
CSITMS Gujarat Project



f)
Verify if the equipment and accessories are as per the list provided by
the Bidder.
Demonstration of working conditions of Equipment’s Functionality.
EQDC test report for supplied equipments
Inspection Tests for completely integrated system:






g)
Confidential
Physical inspection
Verification of contents as provided by the Bidder in response to this
RFP.
Verification of documentation as provided in softcopy and/or
hardcopy format.
Demonstration of the proper functioning of all devices to be deployed
as per the specifications.
Tests shall be carried out as per applicable material standards and
specifications mentioned in RFP.
Bidder shall provide life of goods supplied and version of goods
supplied.
Post Implementation
Integrated Test Plans should include the following as minimum:



h)
Should any inspected or tested equipment/solution fail to confirm to the
specifications, Home department - GoG may reject it and the Bidder shall
replace the rejected goods or make all alterations necessary to meet the
requirements of specifications, free of cost to Home department - GoG within
two days.
The Bidder shall also furnish the reference documents/standards etc. as
referred in quality plans along with the quality plans.
In case the equipment is assembled at the time of commissioning then these
equipments shall be tested post implementation of the equipment/solution.
Service Level Requirements

Warranty/AMC involves comprehensive maintenance and repairs of all items,
equipments for the work executed, including free of cost replacement of
11
CSITMS Gujarat Project
Confidential
parts, consumables if any, modules, sub-modules, assemblies, sub-assemblies,
spares, parts, to make the system operational. Provide OEM warranty
Guarantee cards etc. arrange immediate delivery of consumables/spare
during Warranty/AMC period.
i)
MAINTENANCE:


j)
Manufacturer’s Technical Data



k)
The material supplied shall have warranty of 5 years from the date of
completion of installation, testing and commissioning of the systems.
Warranty involves comprehensive maintenance and repairs of material for
the installed material, including free of cost replacement of parts,
consumables if any, modules, sub-modules, assemblies, sub-assemblies,
spares, to make the system operational.
Manufacturer's performance data, certified factory drawings of apparatus
giving full information as to capacity, dimensions, serial number, materials
and all information pertinent to the adequacy of the submitted equipment
shall be submitted for approval. Manufacturers’ names, sizes, catalogue
numbers and/or samples of all materials shall be submitted for approval.
Submittals and drawings should, as far as possible be complementary so that
drawings and submittals can be crosschecked.
Requirements for Equipment submitted for approval must be accompanied by
relevant drawings, technical data, catalogues and samples. Where data
certified drawings or other required information is not available until after
orders have been placed, Project-in-charge will give provisional approval until
all requested drawings and information have been supplied to the PROJECTIN-CHARGE and approved by him. It is Contractor's responsibility to ensure
that all necessary information is supplied to the PROJECT-IN-CHARGE in
accordance with the progress of the work.
Proprietary Materials

Proprietary materials to be used in the works, shall, when brought to site be
got inspected by the PROJECT-IN-CHARGE.
12
CSITMS Gujarat Project



Confidential
Proprietary materials brought to site shall be stored as per recommendation
of the manufacturer and as directed by the PROJECT-IN-CHARGE.
The Contractor shall, on demand, produce to the PROJECT-IN-CHARGE any
document / proof of purchase in respect of the supplies.
The Contractor shall ensure that the materials are brought to site in original
sealed containers/ packing bearing manufacturer's markings.
13
CSITMS Gujarat Project
Confidential
2.0 Technical Specifications and Compliances
2.1
Fixed IP 2 MP Outdoor Camera
Specifications
Electronic Shutter
1 / 3” CCD / CMOS Progressive Scan (2
MP)
1 to 1 / 10,000 s
Min illumination/ light sensitivity (Color)
2 lux (30 IRE, F 1.2)
Min illumination/ light sensitivity (B/W)
0.5 lux (30 IRE, F 1.2)
Wide Dynamic Range
Backlight Compensation
IRIS Control
Focus
Automatic Gain Control
Color, Brightness, Contrast functionality
Required
ON/OFF
DC or Automatic
Automatic / Manual
Auto / Manual
Required
Frame Rate
25 FPS for 1920 x 1080
Varifocal Lens
2.8 – 12mm varifocal lens
Image sensor
Video
Day and Night functionality
Video Resolution
Video Streams
Intelligent Video
Compression
MJPEG
H.264
Audio
Audio support
Audio Compression
Automatic, Color, Mono
2 MP (1920 x 1080)
Individually configurable 02 video
streams (H.264, MJPEG)
Motion detection
Required
Required
Required
G.711 or better
14
CSITMS Gujarat Project
Two-way audio
Input / Output
Network & Interface
Interface
I/O Port
Upgrade
Network Protocols support
Alarm Event
Confidential
Required
01 IN & 01 OUT
RJ-45 for 10/100 base-T Ethernet
01 IN, 01 OUT
Through web browser , online, firmware
upgrade
TCP/IP, HTTP, ICMP, PPPoE, DDNS,
DHCP, UDP, DNS, SMTP, RTP, RTSP,
SNMP protocols
Events / alerts send via FTP, HTTP, email,
Pre-Post alarm video buffering.
Compliance
Security
Password Protection
HTTPS encryption
IEEE 802.1X
General
Operational temperature °C
Humidity
IP rating
Power
ONVIF
Certifications
CE, UL/EN, FCC
Required
Required
Required
0°C to 50 °C
0 to 80% RH non-condensing
IP66, NEMA 4X Rated Outdoor Housing
PoE, AC24V/ DC12V, 100- 230VAC
15
CSITMS Gujarat Project
2.2
Confidential
PTZ IP, 2MP, 18x Outdoor Camera
Specifications
Image sensor
1 / 3” CCD / CMOS Progressive Scan (2
MP)
Focal Length
4.7 to 84.6 mm
Zoom
18x Optical & 10x Digital
Electronic Shutter
1 to 1 / 10,000 s
Min illumination/ light sensitivity (Color)
2 lux (30 IRE, F 1.6)
Min illumination/ light sensitivity (B/W)
0.5 lux (30 IRE, F 1.6)
Wide Dynamic Range
Backlight Compensation
IRIS Control
Focus
Automatic Gain Control
Color, Brightness, Contrast functionality
Required
ON/OFF
DC or Automatic
Automatic / Manual
Auto / Manual
Required
Frame Rate
25 FPS for 1920 x 1080
Video
Day and Night functionality
Video Resolution
Video Streams
Intelligent Video
Electronic Image Stabilization
PTZ Function
PAN TILT Range
PAN TILT Speed
Automatic, Color, Mono
2 MP (1920 x 1080)
Individually configurable 02 video
streams (H.264, MJPEG)
Motion detection
Required
360° continuous pan & 180° tilt range
280° / sec for panning &
16
CSITMS Gujarat Project
Confidential
160° / sec for tilting
Presets
64 Preset Points
Tour & Pattern
Privacy Mask
Compression
MJPEG
H.264
Audio
Audio support
Audio Compression
Two-way audio
Input / Output
Network & Interface
Interface
I/O Port
Required
04 Zones
Upgrade
Network Protocols support
Alarm Event
Compliance
Security
Password Protection
HTTPS encryption
IEEE 802.1X
General
Operational temperature °C
Humidity
IP rating
Power
Required
Required
Required
G.711 or better
Required
01 IN & 01 OUT
RJ-45 for 10/100 base-T Ethernet
01 IN, 01 OUT
Through web browser , online, firmware
upgrade
TCP/IP, HTTP, ICMP, PPPoE, DDNS,
DHCP, UDP, DNS, SMTP, RTP, RTSP,
SNMP protocols
Events / alerts send via FTP, HTTP, email,
Pre-Post alarm video buffering.
ONVIF
Required
Required
Required
0°C to 50 °C
0 to 80% RH non-condensing
IP66, NEMA 4X Rated Outdoor Housing
AC24V/ DC12V, 100- 230VAC
17
CSITMS Gujarat Project
Confidential
Certifications
2.3
CE, UL/EN, FCC
Outdoor IP55 Enclosure
Outdoor IP 55 enclosure with Air conditioner
Dimensions (mm)
The Overall dimension of cabinet should not exceed 80W X
1300H X 600D.
Enclosure
Outdoor IP55 Enclosure. Condensate discharge plug to be
provided inside the enclosure to prevent condensation.
Load carrying capacity
(Kgs.)
Plinth height (mm)
Doors and locking system
Panel Sizes (mm.)
Regulatory Compliances
1000
100
Front and rear 2 mm thick sheet steel door with PU Foamed
Seal (Gasketing) with removable galvanized rectangular
frame with holes on a 25 mm DIN pitch pattern with 3 point
locking system.
The hinges and retainers should be made of die cast, copper
nickel chrome plated with SS hinge pins. The doors should
be swapped to LH if required with door opening angle 130
deg to VDI.
Top panel made of 1.5 mm thick sheet steel with PU foamed
(Gasketing) boltable from inside.
Bottom panel made of 1.5 mm thick sheet steel with PU
foamed (Gasketing) with provision for fixing 4 nos of PG 29
glands.
Side panels in double walled construction with air gap of
minimum 20 mm between two walls with PU
foamed(Gasketing) for IP 55 protection
IP55 to EN60529/09.2000, ISO 9001, 14001, 18001 comply
with EIA 310, DIN 41494 and IEC 297 standards.
18
CSITMS Gujarat Project
Painting
Rain Canopy Height (mm)
Universal sockets
Angles
Earthing
Cantilever Shelf
Cable Manager
Limit Switches
Hardware
For Front and rear door
Cable Entry
2.4
Confidential
The cabinet has to be nano ceramic coated, Electro phoretic
(EC) dipcoat priming to 20 Microns and then powder coated
to RAL 7035 textured Pure Polyester (PP) to 80 to 120
Microns.
75
One 19” mountable socket strip with 4 nos of 5/15A
universal sockets
2 pairs of L type 19” angles to be provided at front and rear
for mounting the equipments on 23X73 (maxim) punched
sections:
Earthing to be done for the entire cabinet with 4 sq mm
earthing cables.
One 1U cantilever shelf of 250 mm deep.
2 Horizontal 1U cable manager with 5 nos of plastic cable
loops.
2 Door Operated limit switch to be provided at front and
rear door.
Captive hardware (pack of 20): 1 pack.
4 Ergoform S handles with key insert and pad locking
arrangement for front and rear door
PG 29 glands to be provided at the bottom for cable entry
Outdoor Cooling Unit (Part of the outdoor enclosure with Air
conditioning)
Description
Sr.
No. Cooling unit output
1
2
3
4
5
6
7
Rated operating voltage
Dimensions of cooling unit
Rated current
Start up current
Power consumption
Refrigeration Factor
Refrigerant
Specification
1400 Watts at L35L35
1100 Watts at L35L50
230V/50/60 Hz
Vendor to specify
Vendor to specify
Vendor to specify
Vendor to specify
Vendor to specify
R-134 a Gas
19
CSITMS Gujarat Project
8
9
10
11
12
13
14
15
16
17
18
19
Weight
Permissible operating pressure
Temperature range
Duty cycle
Protection category to EN
60529/10.91
Type of connection
Colour
Temperature control
Internal Fan
External Fan
Expansion valve
Copper tubes
Confidential
Vendor to specify
24 bar
+20ºc to +55ºc
100%
IP 55 Internal circuit
Vendor to specify
Vendor to specify
+20ºc to +55ºc, Factory set 35 ºc.
Required
Required
Required
Required
20
CSITMS Gujarat Project
Confidential
3.0 Network Switches & Bandwidth
3.1
Network switch – 24 ports
Architecture
General Requirements: Switch should be rack mountable
Switch should have non-blocking architecture
Switch should have total 24 nos. of 10/100/1000BaseT Interfaces with additional
4xGigabit uplink ports
Switch Should offer option for Redundant Power Supply (RPS) if required
Switch should support Auto MDI/MDIX and stacking feature with required stack cables
Switch should support TDR for detecting cable breaks and shorts
Performance Requirements ; Switch should have minimum 80Gbps Data switching
capacity
Switch should have minimum 60 Mpps L2 throughput
Layer-2 Requirements
Switch should support minimum 10000 MAC address
Switch should support Jumbo Frames & minimum 1000 vlans
Switch should support 802.1q VLAN tagging & Voice VLAN
Switch should support link aggregation for minimum 4 ports
Layer-3 Requirements
Should support - static IP routing, RIP-1, RIP-2, RIPng,, OSPF, BGP-4, OSPFv3, IS-ISv6, and
BGP4+ for IPv6
Should support IPv6 L2 and L3 features as well as IPv6 tunneling mechanism
Should support Policy based Routing
Should support Equal-Cost Multipath (ECMP) to enable multiple equal-cost links in
routing environment to increase link redundancy and scale bandwidth or equivalent
feature.
Security Requirements
Should support Access control lists to provide L2 to L4 traffic filtering for IPv4 and IPv6
Packets by offering Standard ACL, Extended ACL, VLAN ACL, Port based ACL, and Time
based ACL
Should support MAC, 802.1x and Web based authentication, with multiple
authentication method and concurrent authentication session per port minimum for 80
Users per port.
21
CSITMS Gujarat Project
Confidential
Should support Full Network Access Control features to push Dynamic Vlan and Port
based profile to the user ports based on the AAA, LDAP, AD, Radius server authenticated
response.
Should support Guest Vlan, and should restrict access to specific users or devices based
on MAC address learned or statically defined.
Should support BPDU port protection, Root Guard, DHCP ARP protection, IP Source
Guard, and Unicast Reverse Path Forwarding URPF features.
Supports DoS-DDoS protection, Storm Control
QoS Requirements
Support IGMPv1, v2, and v3, PIM-SM / DM, PIM-SSM, Multicast Source Discovery
Protocol, Multicast Vlan
Support congestion control mechanism
Management Requirements
Should support encrypted communication between the user accessing the device namely
using all access methods CLI, GUI, or NMS via features like SSHv2, SSL, and SNMPv3 and
Secure FTP/TFTP etc.
Should support features like CDP, LLDP, LLDP-MED
Link activity, port transmission speed, port duplex mode, power, link OK, system etc
Should support Debugging via cli via console, telnet, ssh
Switch should support Traffic mirroring (port, vlan)
ACL-based mirroring
IP tools (e.g. Ping, extended Ping, extended Trace)
3.2
Bandwidth

Bidder shall supply the required hardware, software and accessories for
bandwidth. Such work shall be executed as per the National and International
standards, the best industry practices and Vendor’s standard
practice/documentation and recommendations.

The Bidder should supply all necessary cables/items/Interface converters etc. to
commission and integrate the equipment supplied for internet bandwidth.
Internet bandwidth of 10Mbps should be considered for Control Center or Data
center location(s) only.
The Bidder should sign an SLA of 99.5% uptime of bandwidth supply with Home
Department - GoG
22
CSITMS Gujarat Project
Sr.
No.
1
Item
Media
2
Media
converters
3
Connectivity
with other
service
providers
4
Indian sites
accessibility
5
Any other
sites
accessibility
6
Other
7
IP Address
8
Proactive
Monitoring
9
Reports
Confidential
Description
Must be on fiber/Ethernet media with the SLA of 99.5% uptime
In case of fiber, the same should be converted to Ethernet
media. SLA of 99.5% uptime will be applicable on all accessories
in such case.
Must ensure availability of enough free bandwidth between
other local service providers such as Tata, Airtel, Reliance,
BSNL, Aircel , Vodafone, etc. (Applicable only for internet
bandwidth)
The ping or trace result for any Indian region sites must be
reachable within <50ms or to the entry point of the said service
provider (Applicable only for internet bandwidth)
The ping or trace result for any other sites must be reachable
within <80ms or to the entry point of the said service provider
The reach ability from BSNL and/or such other broad band
connections must be within 80‐100 ms so as our services across
Gujarat and India should not face any issue of unavailability of
our servers/services hosted on vendor IP network (Applicable
only for internet bandwidth)
IPv4 & IPv6 must be supported. Minimum 32 usable real/public
IPs of IPv4 should be provided. (Applicable only for internet
bandwidth)
Vendor should ensure proactive monitoring of the bandwidth
and must inform (n)Code Solutions between 7:00 AM to 11:00
PM within 5 minutes of any fault detected in the bandwidth. In
case of any unusual observations like high or low traffic pattern
bandwidth usage compared to routine bandwidth usage, packet
loss, etc.; then it must be brought to the notice of concern
person at customer end. During night time between 11:00PM to
7:00AM, such updates/alerts should be sent via mail.
Weekly reports should be submitted towards 99.9% uptime of
bandwidth on the first day of each week by 15:00.
For field locations no internet bandwidth is required but adequate bandwidth should be
provided for all cameras feed transmitting to CC/DC.
23
CSITMS Gujarat Project
Confidential
4.0 Storage
Features
Storage Architecture
Capacity expansion
with no Data
Migrations
Cache Protection
Storage Operating
System
Type of Storage
System and
Protocols support
Front-end Ports &
Back plane
Scalability
Open Architecture
Description
The Storage System should be with NSPoF (No single point of failure).
The architecture should allow modular upgrades of hardware and
software. Must support load balancing at the controller level between
multiple similar storage arrays. Storage solution should have Truly
distributed fully symmetric clustered architecture.
Should support latest technology SSD, SAS, NL-SAS/SATA Drives
There should not be any downtime or migration activity required in
the event it is needed to add additional capacity or additional
performance to the storage system. Storage solution should enable
independent and linear scalability of performance and capacity.
In the event of storage up gradation, existing data should be
rebalanced across all storage controllers/disks etc. This auto balance
should be done with low priority avoiding any impact to performance.
Cache should be protected through cache protection mechanism like
mirroring, de-staging, coherency etc.
Storage System should have Fully journaled, fully distributed,
specialized Operating System, dedicated for serving data optimally,
efficiently and customized for Storage.
The Storage System can be either NAS or IP SAN or FC SAN suiting the
VMS Application
Network protocol Support: CIFS / NFS Version 3 and 4, SNMP,
Network time protocol (NTP), HTTP, FTP/ iSCSI, NDMP
Should support minimum 4 X 1 Gb Ethernet front end ports per
controller. Should also support 10 Gb Ethernet (optional 8Gbps FC).
All components of the storage system architecture must support
scaling to provide continuous growth to meet the growing demand of
Gujarat Police. The system should support vertical / horizontal
scalability so that depending on the changing requirement from time
to time system can be scaled. There must not be any system imposed
restrictions on upward scalability of number of IP Camera’s.
Storage Solution to be configured with minimum 16GB cache /
memory per controller with protection mechanism. Additional
Controllers should have their own cache equal to or greater than
16GB each.
24
CSITMS Gujarat Project
Storage Capacity
Storage Scalability
RAID Rebuild times
on disk failures
Performance
Guarantee
Confidential
Shall provide 750 TB of useable disk space under RAID 6 or equivalent
protection with hot spare disk per Shelf, using 3TB/4TB 7.2K RPM NLSAS or SATA-II Disks. Must support online expansion of RAID Group.
Bidder should clearly specify number of RAID groups, RAID group size
and the total number of disks considered for the RAID group size.
The storage system should be scalable to double the capacity of the
original/initial usable space without replacement of the controllers
etc. Must be able to add additional disks on the fly to expand the RAID
group capacity.
Intelligently restripe data/ expanding the file system as disks are
added to optimize the performance and no additional licence for the
same should be required.
Should not take more than 24 hrs to rebuild failed disk(s).
The certificate, on OEM's letterhead, of performance/throughput
figures, for the offered configuration of Storage Solution, needs to be
given by the OEM along with the technical proposal itself.
In case of any component failure, system should not have more than
20% impact to system performance which needs to be demonstrated
as part of User Acceptance Test.
Standard Software
Integrated automatic RAID Manager, alerts, DNS, SNMP. Automatic
Features & Product error reporting via SMTP email to global support center.
Lifecycle Support
The Proposed Storage should not be declared for End of Life for the
next 5 yrs and OEM confirmation on their letter head should be
attached.
Should support snapshot feature and only one time licence should be
applicable for any future expansion also. If any of the features
mentioned / offered requires license the same should be included as
part of the BOM.
Firmware should be upgradeable for functionality improvement and
enhancements. Must support non-disruptive upgrade.
RAID Support
Should support RAID 0,1, 5, 6 or equivalent
OS Support
Shall support Windows server 2003 & 2008, Red hat Linux, HP-UX,
SUN Solaris, Suse Linux, Vmware, Windows XP/7 etc. All requisite
licenses for these operating systems shall be provided.
Storage Management Management software for performance monitoring to be provided
& Security
along with the storage hardware with Web GUI & CLI interface. The
storage system shall be configured with GUI based management
software to provide minimum following functionality:
•Monitor status and health of storage and manage the storage
solution
•Storage performance, throughput, network connections etc
25
CSITMS Gujarat Project
Other Features
Confidential
monitoring
•Folder and File Level Access Control Lists (ACL) security for users &
groups.
•Should support user security mechanisms like AD,LDAP / NIS.
Should support minimum 512 CIFS/NFS shares. This capability should
be at minimum doubled with the addition of one more pair of
(clustered) controllers in the future.
should support quota and minimum 512 quota rules with support for
50,000 user quota rules per system
26
CSITMS Gujarat Project
Confidential
5.0 Video Management Software
1.
2.
3.
4.
5.
The system should be easy to install, learn, operate and manage:
The VMS shall have rich user interface that provides one-click access, dragdrop, context menu, shortcut keys, customizable GUI etc to enhance
operational efficiently in daily tasks and maintain The VMS shall have ability to
respond fast & shall be applicable to all processes, functions, features, and
screens of a video management system.
Simple, clear documentation including User Guides (how to use the product)
and Technical Reference Manuals (quick reference on functions and
procedures) shall be submitted
Scalability: The VMS shall have ability to connect and integrate other
technologies and third party software systems (e.g. ANPR, RLVD) and act as a
cohesive platform for entire surveillance and security system. The system
should be able to bi-directionally and dynamically exchange data between
various software applications in real-time as well as schedule transfer.
The Software shall be scalable upto 10 times minimum.
Support for unlimited cameras, servers, sites and clients.
Support for storage expandability.
Well documented Software Development Kit (SDK): The SDK should include a
rich, easy-to-use Application Programming Interface (API) that supports the
most common programming languages.
Input and output support: The VMS shall have ability to receive and
accumulate inputs from external hardware/software and respond and activate
outputs based on the predefined rules.
Event management: The VMS shall have ability to enforce custom settings for
event detection, alarm notification, recording, input/out (I/O) control, and
other features in response to events.
The alarm management module shall support graphical displays with
interactive icons to display the status of the cameras & other inputs.
Support for standard protocols: The VMS shall have ability to maintain
independence from any one vendor & shall support open standard protocol i.e.
ONVIF
Smooth software upgrade path for support of new devices, drivers and
operating systems. System should be able to implement software upgrades
without requiring all hardware components to be reconfigured.
System should provide Database Server Redundancy options, Camera Server
Redundancy options, and automatic fault tolerance for robust system uptime
and Distributed database and video storage.
On screen help and instructions: The system should provide context-sensitive
27
CSITMS Gujarat Project
Confidential
15.
help and active assistance based on the module / screen / operations a user is
trying view or perform. As the user moves around the interface, the help
should automatically changes to the relevant field-level help topic.
User management with user groups, roles, privileges and access policies
(assigned views, PTZ priority, access to video wall etc)
Integration with LDAP/AD users and policies
Centrally controlled user management - Users, roles, rules and privileges
should be stored on the central VMS server allowing any authorized user to log
into any workstation.
Recording Server :
 The System shall not restrict the number of recording servers
 Shall support dual streaming
 Shall allow each stream to be viewed independently by client viewer.
 Recording from connected cameras shall be stored in individual databases.
 Shall support multiple storage formats
 Shall support recording in all resolution at desired FPS
 Shall support audio recording
The VMS shall have ability to push a single command or configuration to
multiple users with a single “Click”. This can be done though a GUI where
access privileges and other parameters can be applied to multiple users or
user-groups.
Support for Motion Exclusion Zones to enhances optimized recordings and
storage.
Configurable data aging mechanism to automatically compress older
recordings in lower frame rates to enhance storage.
Customizable recording retention period for specific camera, group, area etc.
Remote Users : Should support at least 10 remote users via network/web
browser/client software
Automatic check & update of hardware drivers & firmware free of cost
16.
The VMS shall have Electronic Image Stabilization feature
17.
Support and configuration options for virtual matrix.
Copy or Clone option to install new device based on already configured device
and template based batch administration option.
The VMS shall have ability to easily install, configure, modify, search and
remove surveillance devices with automatic discovery of IP devices.
Advanced option to install other devices like Analog cameras, encoders,
microphone-speakers, access control devices, digital message boards etc.
The VMS shall have ability to logically group devices based on installation
location, device type, configuration type or any other predefined rules.
Individual cameras/devices should inherited rules from parent
6.
7.
8.
9.
10.
11.
12.
13.
14.
18.
19.
20.
21.
28
CSITMS Gujarat Project
Confidential
group/subgroup.
22.
23.
24.
25.
26.
27.
28.
29.
30.
The VMS shall have ability to search and view device(s) based on standard
criteria like ID, Name, Location, Group, Type etc.
The VMS shall have ability to enforce access privileges (View /Add /Edit/
Remove) to device(s) or group(s).
The VMS shall have ability to draw and configure e-map of surveillance facility,
choose back-ground images, User-definable symbols (for deployed devices)and
programmable functions, e.g. hyperlinks, controlling video feed, initialing
alarms etc
Automatic firmware updates notifications and wizard driven installation.
Provision for primary and backup storage settings for individual camera feeds.
The VMS shall have ability to configure multiple steams with different quality
parameters e.g. Codec (H.264, MPEG, JEPG) , resolution, frame & bit rate etc.
Support for full duplex audio
 The VMS shall have ability to create and assign pre-configured
views/layouts for monitoring including features like:
 Custom salvos
 Linking dynamic WebPages, images, maps a view,
 Sharing a view between users,
 Special views for widescreen monitors,
 Updating a view only on motion detection,
 Rotating live video from a pool of cameras,
 Assigning different quality attributes on-the-fly, based on operator’s
actions. E.g. different quality settings for selected and non-selected video
feeds/tiles/panes.
 Granting or revoking permission to use the view etc.
Setup Virtual matrix/ video wall with customizable rules & priorities.
31.
Basic recording options [Full, Scheduled recoding , Motion detection recording ,
external/internal hardware or software events / trigger based recording]
32.
Advanced recordings options [Video only, Audio only, Video plus Audio,
Retention rules, Archive/back-up rules, storage limits etc]
33.
34.
35.
The VMS shall have ability to configure, store and track both pre- and post
event recordings. The pre-post event time should be configurable.
PTZ configuration including presets, patterns, patrolling, masking, priority and
permissions.
The VMS shall have ability to support operations from Web client, Windows
client, and Mobile devices etc.
29
CSITMS Gujarat Project
Confidential
36.
Popup display on the screen in case of any event/alarm/threshold etc
37.
Multiple monitor support: The system should allow connecting multiple
monitors on single client workstation (loaded with suitable graphics card) and
display different contents on each of the connected monitor.
38.
39.
40.
41.
42.
43.
44.
45.
46.
47.
48.
All panes / tiles should indicate mode (live or recoded), source (camera
name/location) and date/time and applied quality information (FPS, CODEC).
The font color shall be changed automatically in sync with the video/image to
have a clear text reading at any point of time.
A matrix view should support minimum 2x2, 3x3, 4x4…9x9 formats and any
number of multiple screen divisions.
PTZ controls: When PTZ is deployed and enabled, system should offer a
separate control panel for PTZ operations. The control panel should include list
of presets, patterns, tours, eight directional & home positions and zoom-in &
zoom-out buttons. A dedicated joystick can also be used for PTZ operations.
PC keyboard shortcut keys: Along with menu-driven interface, a VMS should
also support custom shortcut keys to helps operators quickly switch between
different modules/screens, change views or panes/tiles and to carry out
playback functions.
Snapshots: System should allow creating a still image from live or recorded
feed and storing it into a workstation.
E-maps: The VMS shall have ability to underscore installed devices on entire
facility using e-maps. It should also allow users to quickly search and jump to
the right device/camera to carry out interactive functions e.g view the actual
camera video, initiate and cancel alarms, etc
The VMS shall have ability to boost video quality manually (by operators) or
automatically as configured on event trigger or as scheduled.
Instant replay facility with configurable replay-duration.
The VMS shall have ability to bookmark / add-to-favorites in both live and
playback modes. Bookmarks should be user specific and managed (create,
share with other users, search, remove, add comment) by the owner.
Digital zoom to enlarge portion of an image to provide superior zooming
capability.
The VMS shall have ability to Start/Stop Recording on demand (manually)
Option to view surrounding cameras: The system should enable operators to
select master camera feed and based on group/subgroup details, its
surrounding cameras should be automatically displayed on separate panes.
These panes/tiles should be dynamically generated so that operator does not
30
CSITMS Gujarat Project
49.
50.
51.
52.
53.
54.
55.
56.
57.
Confidential
need to manually pull the feeds from desired cameras.
Evidence export feature: The system should allow users to export audio/video
evidences in open format for internal investigation or to share authentic proof
to public authorities and outside agencies. Alternatively the bidder may
provide the required player/software to run the exported video file if the VMS
not support to export in avi or other standard format. The system should offer
options to enable watermarking camera name & timestamp and also encrypt
or apply password protection to the exported clips.
The VMS shall have ability to quickly search and retrieve recordings: Search
methods should include search by camera(s), group, date/time, alarm/event /
bookmark list, smart (motion) search by creating motion index or by generating
thumbnail summary of a video archive to locate specific event.
The search result should provide an intuitive timeline browser that represents
the overall length of the recording. It should underscore recoded event
(motion based, scheduled, event based or normal) and allow users to quickly
jump back and forth to a location in selected recording.
Smart (motion) Search: The feature should enable users to select area of
interest on any given view of camera recording, and search for motion
incidents within that area
The VMS should have onscreen process guidance/help menu & instruction
The system should offer following playback controls
 Play/Pause
 Lock speed
 Forward playback (1x, 2x, 4x, 10x, 20x, 40x,…
 Reverse playback (-1x, -2x, -4x, -10x, -20x,-40x, …..
 Slow forward playback (frame by frame, 1/8x, 1/4x,1/3x, 1/2x, 1x)
 Slow reverse playback
Video Lock: The system should allow users to lock the relevant portion of video
recording related to any event to avoid the deletion of the important incidence
from the system before its retained/backed-up.
Evidence Printing: Option to create and print a small surveillance report that
includes image(s) and comments about recorded incident.
The system should enable users to send/transfer a view to preconfigured
displays.
The system should offer options to set Hue, Saturation, Brightness, Contrast,
Sharpness etc.
The system should have in-built, configurable, basic motion detection analytic
engine that efficiently
 Detects motion
 Virtual line
 Auto tracking
31
CSITMS Gujarat Project
58.
59.
60.
61.
Confidential
The system should have in-built event/alarm management module that allows
generating, distributing, storing, tracking and reporting of incidents and events
as they occur. The module should have The VMS shall have ability to
 Define and configure events that can be triggered by motion detection
analytics, video loss, audio detection, integrated third party software tools
(ANPR, RLVD), active tampering, temperature, connected external devices
or by manually activating the same.
 Configure automatic/programmed responses based on priority and
escalation level for specific event(s).
 Send email and SMS notifications to respective users.
 Search and view list of triggered events based on source, priority, event
type, date/time, keyword etc
 Acknowledge events – Change status, key-in more information
 Escalate event records to the next level of users or share event records with
other users.
 Allow manual respond to triggered events including activating external
hardware and transmitting I/O commands.
 Consolidated e-reports generation with archive video, images, text and
other file attachments.
The system should provide interactive reporting interface with standard and
user-defined custom reports and filtering options to:
 Monitor real-time and history of overall operational health of a surveillance
system or individual components (recordings, cameras, servers, storages,
CPU, memory, bandwidth etc).
 Review currently logged in users and functions being performed.
 Retrieve audit trails - user activities, errors and system logs.
 View list of hardware units and selected configuration options.
 List down configured users and corresponding roles & permissions.
 View details of bookmarks, event/alarm history and exported evidences
The system should have Inbuilt diagnostic utility that constantly monitors
several different functions of deployed hardware and software modules and
attempts to correct the problem in case of deviations from the established
baselines occurs.
The facility should be there to extract & save the video footages / images on
CD, DVD, USB, External Storage etc.
32
CSITMS Gujarat Project
Confidential
6.0 Video Analytics
6.1
Automatic Number Plate Recognition (ANPR)
System should work as local ANPR system as well as Local Surveillance system with
remote connectivity and data base management
The system should be a full ANPR system that processes, stores and makes available data
collected to the control Room
The system should be able to work as surveillance record video, transmit video
The system should easy to be controlled by a operator in the Control Room
It should generate an alert in case the number plate of passing vehicle is similar to one
which is already in the enrolled list as blacklisted, stolen, unregistered vehicle & should
be able to generate the alarm simultaneously.
The system should send transit data and images to central system both in real-time (if
cellular network available) or offline
The system should be a complete video-surveillance system that record continuously
video acquired by the camera and stores onto the automotive hard disk of the rugged
onboard processor
It should be the minimum two components
1. A Network Fixed Camera
2. A Processor
System Specification
ANPR System
Very easy user interface.
It acquires continuously images and automatically detects number
plates by the use of ANPR Software at local Processor & only sends
alerts & processed data to the City Command & Control Centre to
save Bandwidth.
Hi-resolution 2MP camera for ANPR and and 3MP Camera for
context image and video-surveillance.
IR will be required with ANPR camera but not required with
33
CSITMS Gujarat Project
Connectivity
Performance:
Central System
feature:
Video Surveillance
Feature:
Specification for
2MP fixed camera
with for ANPR
Confidential
context camera.
It should works with both color and b/w pictures
It should works with both back or front side number plates
It should compares plates in real time with the suspected list (or
more than one list) stored in the vehicle. In case the plate belongs
to a suspected vehicles list it should does the following actions:
Send images to a control room through network.
Show images and plate at the control room to the operator on the
screen with and an eventual action to perform (e.g. “stop that
vehicle”, “call this number”, etc.)
Connectivity of the cameras From the field location to the control
room including network recording & video streams from all the
cameras on 24 x 7 basis with 99.5% up time. It should keep
updated the lists automatically by RTO DATA BASE .
When the system finds a plate in the database, it should transmit
an alarm to the data center. It sends the strings of the plate, the
image acquired.
• At 0km/h : average percentage of correct plate read compared
to every standard plate readable by a passenger onboard – 40%
• At 30km/h : average percentage of correct plate read
compared to every standard plate readable by a passenger
onboard – 40%
• At 60 km/h : average percentage of correct plate read
compared to every standard plate readable by a passenger
onboard - 35%
Transits storage and visualization
Searching transit images using many criteria, such as:
Date / time
Number plate
Searching of alarm detected
Managing and updates of database
The system should be used also as a ‘video-surveillance system’
The system stores images continuously or under the control of the
operator,
Infrared Illuminator Integrated
Image sensor
1 / 3” CCD/CMOS Progressive Scan (2 MP)
Electronic
1 to 1 / 10,000 s
Shutter
Min
1 lux
illumination/
34
CSITMS Gujarat Project
Confidential
light sensitivity
(Color)
Min
illumination/
light sensitivity
(B/W)
Wide Dynamic
Range
Backlight
Compensation
0.25 lux
Required
ON/OFF
FOCUS
Automatic / Manual
White Balance
Automatic / Manual
Frame Rate
Video
Day and Night
functionality
Max video
resolution
25 FPS for 1920 X 1080
Video Streams
Intelligent
Video
Compression
H.264, MJPEG,
MPEG-4
Network &
Interface
Interface
I/O Port
Upgrade
Network
Protocols
support
Compliance
Application
programming
interface
Security
Password
Automatic, Color, Mono
3 MP (2048 X 1536)
Individually configurable 02 video streams
(H.264, MJPEG, JPEG)
Motion detection, tamper detection
Required
RJ-45 for 10/100 base-T Ethernet
01 IN, 01 OUT
Through web browser , online, firmware upgrade
Compatible with TCP/IP, HTTP, ICMP, PPPoE,
DDNS, DHCP, UDP, DNS, SMTP, RTP, RTSP, SNMP
protocols
ONVIF
Open API preferable
Required
35
CSITMS Gujarat Project
Specification for
3MP camera with
IR for context view
Confidential
Protection
HTTPS
encryption
IEEE 802.1X
General
Operational
temperature
°C
Housing
Image sensor
Electronic
Shutter
Min
illumination/
light sensitivity
(Color)
Min
illumination/
light sensitivity
(B/W)
Wide Dynamic
Range
Backlight
Compensation
FOCUS
White Balance
Frame Rate
IR
Wavelength
Housing
Video
Day and Night
functionality
Max video
resolution
Video Streams
Intelligent
Video
Compression
Required
Required
-0 to 50 °C
IP66 rated outdoor housing
1 / 3” CCD/CMOS Progressive Scan (3 MP)
1 to 1 / 10,000 s
1 lux
0.25 lux
Required
ON/OFF
Automatic / Manual
Automatic / Manual
12 FPS for 2048 X 1536
Inbuilt / external with 15 Meters range
850 nm
IP 66 outdoor
Automatic, Color, Mono
3 MP (2048 X 1536)
Individually configurable 02 video streams
(H.264, MJPEG, JPEG)
Motion detection, tamper detection
36
CSITMS Gujarat Project
Confidential
H.264, MJPEG,
MPEG-4
Network &
Interface
Interface
I/O Port
Upgrade
Network
Protocols
support
Compliance
Application
programming
interface
Security
Password
Protection
HTTPS
encryption
IEEE 802.1X
General
Operational
temperature
°C
Housing
Specification of the
Processor
Chipset
CPU
Memory
IP Rating:
Hard Disk
Drive
LAN port
Required
RJ-45 for 10/100 base-T Ethernet
01 IN, 01 OUT
Through web browser , online, firmware upgrade
Compatible with TCP/IP, HTTP, ICMP, PPPoE,
DDNS, DHCP, UDP, DNS, SMTP, RTP, RTSP, SNMP
protocols
ONVIF
Open API preferable
Required
Required
Required
-0 to 50 °C
IP66 rated outdoor housing
ICH-8M
Intel® Atom™ D510 Dual Core 1.6
DDR2 667/800 one 200-pin SO-DIMM 2GB
IP66 compliant
1 x 160G 2.5” SATA II HDD
3 x 10/100 Ethernet
8V ~ 60V DC thru 3-pin connector (ignition,
Power
power & ground)
Other Features Integrated GPS
Minimum 300,000 transit to be stored
Challaning system
37
CSITMS Gujarat Project
Confidential

Should be integrated with automatic challan system

Complete statistic generation and payment updates

Integrated with RTO data base / HD IITS

Integrated with Crime Branch data base

One platform sharing with Enforcement system

Challan should contain below information before, during and after violation
a) Notice no
b) Location name
c) Offense date
d) Offense time
e) Lane
f) Registration number
g) Violation
h) Light lapse time
i) Penalty amount
j) Due date
k) License base data
Field required in traffic memo application with data type and length
Field Details for New Memo Application In Traffic Module
Sr. No. Heading
1
2
3
4
Group/Point
5
6
7
8
Field Name
Group
Point
Memo Type
Date of Issue
Memo Number
Is Wasted
License Number
Vehicle Number
Data type and
Length of field
Type
varchar
varchar
varchar
datetime
bigint
char
varchar
varchar
Length
20
20
100
NA
20
1
20
20
38
CSITMS Gujarat Project
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
Violation Search
Biometric Attachment
Address of Violator
30
6.2
Confidential
Violation Type
Act Id
Act Description
Section
Section Description
Badge Number
Type of Vehicle
Name of Violator (First Name)
Name of Violator (Middle Name)
Name of Violator (Last Name)
File Description
Attach File
Country
State
House Name/No.
Society/Building Name/Office Name
Street
Area
City
Other Details(if any)
Important Landmark(if any)
Pin code
varchar
varchar
varchar
varchar
varchar
varchar
varchar
varchar
varchar
varchar
varchar
LONGBLOB
varchar
varchar
varchar
varchar
varchar
varchar
varchar
varchar
bigint
50
10
500
45
2000
50
100
50
50
50
100
NA
50
50
150
150
150
150
50
150
20
varchar
150
Red Light Violation Detection (RLVD)
System should be fair system: All evidence before and after infraction
Should be Integrated with automatic challan system with multiple images
Multi user support
User level authentication
Easy to use Graphical Interface
39
CSITMS Gujarat Project
Confidential
System should be totally digital system
Should function upto 100 KMPH vehicle speed
It should automatically recognize number plate of infracted vehicle
It should use the same image for the reading of number plate
It should stored pre and post image of infracted vehicle
It should work on traffic light color
It should not integrated with traffic light
It should store context image of the infracted vehicle as well as close image of infracted
vehicle
It should store color image for both day and night for context image
It should store color image for daylight and black & White image for Night light
System should be able to work in 0 lux with the help IR Illuminator
It should use a magnetic probe / inductive loop / virtual line Concept to trigger the
camera when traffic light indicate Red Signal
The magnetic probe/inductive loop should be maintenance free.
System should be able to integrate with RTO database
Each frame should be stamped with date time and infarction place
The context image should show the color of traffic light
Software should be able to store all the data temporally on local server after that
40
CSITMS Gujarat Project
Confidential
centralized storage
It Should Produced, Store and transmit a sequence of at least 10 image relatives to any
violation detected, or a movie in standard format like avi, mp4, mov, vfw etc
It should produces, stores and transmits images related to the passage of vehicle with
the red light switched on, and images previous and following: the system produces a
complete documentation about approaching and leaving intersection by Vehicle in
infraction
It should detects red light switching on only by image analysis and without any hardware
link with red light control boards
It should detects transits in violation overcrossing intersection by passive components
placed underground (ex magnetic probes) or inductive loops
Each frame produced by system shows the date and the exact time of the infraction, the
crossroads where the infraction took place and the span of time passed after the red
light turned on. The frame also show the red traffic lights
Each peripheral system transmits violation's images by any type of TCP-IP channel,
For each violation system performs ANPR algorithms to automatic recognize plate of
vehicles in infraction
It has at least one camera for panoramic view in which red light switched on is visible and
one or more cameras to see plates of vehicles in infraction each for one lane maximum 5
meters with
The system uses IR illuminator for night conditions, and do not use any flashes lights
because it can be dangerous for vehicles circulation
All peripheral violation detectors involving a specified area are centralized in a single
server
41
CSITMS Gujarat Project
Confidential
Lens:
Imaging Device
1/3” CMOS/CCD Sensor
Day Night Camera
Varifocal (Lens size based on the location)
Day and Night:
Automatically removable infrared-cut filter
Shutter Time:
1/10000 s to 1/6 s
Video Compression:
MJPEG, H.264
Resolutions:
Field of view for
License Plate
recognition:
2048x1536 (3 MP) to 320x240
Sensor
up to 25 meters (installing external IR in front of camera)
Video Streaming:
Multiple simultaneous individually configurable streams in H.264
and MJPEG Controllable frame rate and bandwidth
Image Settings:
Compression, color, brightness, sharpness, contrast, white
balance, exposure control, exposure zones, backlight
compensation, fine tuning of behavior at low light
Supported Network
Protocols:
Inside Camera
Power:
Housing Power
Housing
Construction:
Environmental
HTTP, FTP, RTSP
PoE 802.3af, 24VAC
Pl. specify
Aluminum
IP66
IR Illuminator
Spectral emission
850nm
Beam angle
10˚
Temperature Range
-50˚ C (-58˚ F) to 50˚ C (122˚ F)
Voltage Input
12 – 40 VDC or 24 VAC (± 30 %)
Power consumption
45 W
Environmental
IP 67
Technical Specification for Processor hardware (outdoor- Poll mount) IP66
Chipset
ICH-8M
CPU
Intel® Atom™ D510 Dual Core 1.6 or better
42
CSITMS Gujarat Project
Confidential
Memory
DDR2 667/800 one 200-pin SO-DIMM 2GB
Construction
Aluminum enclosure with fan less design
Dimensions
320mm (L) x 176mm (W) x 50mm (H)
IP Rating:
Hard Disk Drive
LAN port
IP66 compliant
1 x 160G 2.5” SATA II HDD
3 x 10/100 Ethernet
Power
8V ~ 60V DC thru 3-pin connector (ignition, power & ground)
More than 300,000 transit to be stored
6.3
Manual Challan
The operator should be able to pause the video feed, copy &
paste the snapshot on manual challan from recorded video feeds
as per the requirement. The vendor has to ensure the
compatibility between the manual challan software the VMS
from where the photo/videos to be copied.
Manual challan form should appear on the screen alongside the
video display section.
General
The operator should be able to fill the vehicle registration /
license plate number in the manual challan form & the rest of
the datas should be filled automatically. In case if required the
system should allow operator to fill all the relevant datas.
The manual challan system should be capable of integration with
the RTO database to fetch the vehicle ownership details from the
same with respect to the vehicle registration / license plate
number.
In case the data base does not contain the ownership details
with respect to vehicle registration / license plate number
operator should be able to fill in all the desired details manually.
All manual entries must have an audit trail and should be
controlled by necessary authorizations.
43
CSITMS Gujarat Project
Confidential
The system should be able to extract the desired picture frame
from the video feed being displayed.
This picture frame should be saved in the system along with the
manual challan under a unique system generated ID with time &
date.
Operating System
Software environment
Database
Microsoft Windows XP / Vista / Seven (32 and 64 bit) / Linux
Microsoft .NET framework v. 2.0 and above
Work with major DBMS software
Scalability
The system should be scalable enough to expand in terms of
storage, no of users, format supported, clients, number of
challan etc. Should have scalability to be executed on various
hardware from a single pc to a high availability cluster with
hundreds of connected clients
Statistics
Challan feature
Can generate statistics of number of challan aggregated into a
specified period.
Special statistics can be made on customer request
Highly customizable.
Should be generated in preferred customized format.
should have facility to store templates of the challan types
High resolution images
Print markers
Charts
It should be possible to insert all data like date, time, street,
license plate, owner name, address, money amount etc.
The evidence photo on challan shall have actual time , date of
the event occurred
The system should allow user to insert any images like Police
logo or other objects like barcode (mono or bidirectional), print
markers, charts and many others.
eChallan export formats
VMS Compatibility
The system should be capable of extracting and viewing
recorded camera feed from the storage.
PDF, JPEG and other standard images formats.
The system should be capable enough to be integrated with
reputed ONVIF compliant software. If any third party / bridging
software required then the same shall be borne by the bidder.
44
CSITMS Gujarat Project
Confidential
7.0 Data Center
7.1
Air conditioners
The Air conditioner shall be High sensible cooling capacity and high SHR (i.e. the
sensible to total cooling capacity ratio). Low running costs, achieved by means of
sophisticated design and co-design methods, combined with an accurate selection of
the components. The whole range of units shall be "environment friendly" because it
uses materials that can be recycled, particularly for the plastics and the thermal
insulation.
1. Cabinet
The cabinet should be constructed using double folded panels with hi-tech riveted
construction; from best quality sheet steel suitably treated for weather protection,
corrosion and should be powder coated.
2. Refrigerant Circuit
The refrigerant system shall be of the direct expansion type and incorporate one or
two hermetic scroll compressors complete with crankcase heaters. A hot gas bypass
and solenoid valve shall be used on single compressor models to provide two steps of
cooling.
3. Compressor
The compressor shall be of the high efficiency compliant scroll design, with an E.E.R.
of not less than 11.1 BTUH/watt at ARI rating conditions. Each compressor shall have
rotolock valve for service purpose & have inbuilt overloads, HP & LP controllers and
mounted on vibration isolators.
Pressure gauge ports should be provided in each compressor
Expansion valve should be Thermostatic type for higher reliability of Units.
Time delay circuit should be provided to each compressor for restart in case of supply
interruption.
45
CSITMS Gujarat Project
Confidential
4. Blower Section
Airflow should be constant under all operating modes, including dehumidification, so
that uniform air distribution is maintained.
Forward curved centrifugal fans should be used. The fans should be dynamically
balanced and each fan should have a separate motor and drive.
Fan Motor Assembly:
Fan should be driven by a weatherproof electric motor suitable for operation on
415+ 10% variations 3 phase, 50 Hz Ac supply. The motor housing should be of IP22
degree of protection and class F insulation.
The fan should be belt driven having a maximum speed of 1400 rpm. Each fan should
have its own self-adjusting, permanently aligned belt drive.
5. Evaporative Coil
The Evaporator coil should be V/A shaped constructed, for higher efficiency, of rifled
bore / inner grooved copper tubes of gauge 27swg and louvered aluminium fins
(11/14 fins per inch)
The frame and drip tray should be fabricated from heavy gauge aluminium . The drip
tray must be doubling angled for condensate flow and easily removable for cleaning.
6. Dehumidification feature
It should be achieved by reducing effective coil area by solenoid valve arrangement
and controlled by micro processor based control system. Constant air flow air flow
rate is to be maintained even during dehumidification.
7. Air Cooled Condenser

Each condenser unit should incorporate the following:

A heat rejection coil block should be constructed from copper tubes of not less
46
CSITMS Gujarat Project
Confidential
than27 gauge copper tubes expanded on to straight aluminum fins (Approx 13
fins/inches)

The fan should be selected for quiet operation. The fan should be directly driven
by a motor of speed not exceeding 1400 RPM and constructed from CRCA sheet
and powder coated. When compressor stops condenser fan should also stop.

The motor housing should be of IP54 degree of protection and class F
insulation. The condenser should be suitable for horizontal / Vertical
mounting type
The entire assembly should be supported by a corrosion treated frame having
four legs

8. Humidifier
Humidification should be provided by boiling water in a high temperature
polypropylene steam generator. The steam should be distributed evenly into the
bypass air-steam of the Indoor-cooling unit. The humidifier should be capable of
providing 6 kg of steam per hour. The humidifier should have an efficiency of not less
than 1.3 kg/kW and be fitted with an auto flush cycle activated on demand from the
unit’s control system. The humidifier should be fully serviceable with replaceable
electrodes. Wastewater should be flushed from the humidifier by the initiation of the
water supply solenoid water valve via a U-pipe system. The humidifier shall be type
test certified for direct connection to portable water supplies.
9. Electric Heating:
The electric heating elements should operate at a level not exceeding 60 kw/sq.m .
The low watt density elements should be of finned tubular nickel-plated steel
construction. The heating circuit should include dual safety protection through loss of
air and high temperature controls.
10. Electric System

The Electrical power system should confirm to relevant I.S. standard. A main
isolator (MCB) should be provided on the unit sized to meet the system total
power requirement.
47
CSITMS Gujarat Project
Confidential

Within the panel individual power loads should be distributed equally across the
three phases through a bus bar.

Low voltage and high voltage protection for micro-processor control

All individual wires should be of copper and colour coded or should be numbered
at their point of termination to facilitate servicing.

Low voltage control wiring and power wiring should be segregated from
each other. The following should be incorporated

Motor Protection circuit breakers (MPCB) of suitable rating should be provided
for each sub-circuit.

Single-phase preventers in the main incoming, of Minilec make model VMRD2.

Auto-Off-Manual switch is to be provided.
11.
Electric Power Switchboard
It should consist of Switchgear and main isolator switch mounted on DIN rails for
serviceability. Each circuit should be protected by separate circuit breakers and all
live parts protected against accidental contact.
12. Filter
Microvee Filter of 100 mm depth should be fitted in the unit with 95% efficiency
down to 5 microns of dry media disposable type (HDPE – EU5).
13.
Service Access
No side access should be required for servicing and maintenance. All servicing should
be possible from the front of the unit only.
14.
Microprocessor Controller
48
CSITMS Gujarat Project
Confidential
Each Air conditioner should have single microprocessor with following controls:
Control Type:
The controls shall be a microprocessor based, PID based programmable logic
controller. The controls shall have separate indication of operating modes (cooling,
heating, humidifying and dehumidifying), alarm conditions (temperature high, loss of
sensor, compressor HP & LP, wet floor, no air flow and low humidifier water). The
display and indication shall be visible on the front without removing any external
panels. Local and remote alarms will be triggered if an alarm condition is reached.
Alarms:
The alarm should operate with the audible signal.
Following alarms should be available:












High & Low Temperature / Loss of Sensor
High & Low Humidity
Compressor High / Low Pressure
Water under floor
Loss of Air flow
Low Humidifier Water.
Compressor Short Cycle
Condenser water flow fail
Service Intervals
Low Battery
Brownout
Spare Alarms for Customization
Proportional Integral and Derivative (PID) & Dew point control strategies should be
employed.
Diagnostics
An onboard brownout detection circuit should protect the controller from
abnormally low mains voltages and initiate a staged restart of the unit’s components
when the main returns to normal levels.
49
CSITMS Gujarat Project
Confidential
The control should have an auto-restart feature which will return the unit to normal
operation resumption of mains power.
Display
In normal operating mode the screen should display unit number, temperature and
relative humidity set points and actual, graphs, time, date and operating status. It
should be able to record a real time 48 hour data log of temperature and humidity
updated every minute.
7.2
UPS
Technical Specifications of True On-line UPS:
General
The specification defines the electrical and mechanical characteristics and
requirements for a continuous duty, highly reliable, solid state type true on-line fully
microprocessor controlled double conversion PWM IGBT based Inverter and 6/12
Pulse SCR Rectifier based Uninterruptible Power Supply systems. The UPS shall
provide high quality AC power for sensitive electronic equipment loads. It shall also
supply clean power automatically without any break in supply in the absence of raw
power. Under no conditions will be protected system get direct supply from the raw
mains unless there is fault in the protected system.
All the manufacturers have to ensure that their product confirm to be IEC 146 part IV
standards & specifications set in this document. Non compliance will result in the
disapproval of the product. The UPS shall be connected in PRS mode.
Standards
The UPS and all associated equipment and components shall be manufactured
in accordance with the following applicable standards:
• IEC 62040-1-1: General and Safety requirements.
• EN 50091-2: EMC Requirements
50
CSITMS Gujarat Project
Confidential
• IEC 62040-2: Uninterruptible Power System (UPS) part 2: EMC requirements
• IEC 62040-3: Performance requirements and Test Method
• EN 60950: Information Technology equipment
• EN 60529: Degrees of protection provided by enclosures (IP Code)
The Quality System for the engineering and manufacturing facility shall be
certificated to conform to Quality System Standard ISO 9001 for the design and
manufacture of power protection systems for computers and other sensitive
electronics.
System Description
a)
Design Requirements – UPS Module
i)
Input Voltage rating: 380/400/415 volts three-phase, Three wire
for rectifier and 4 wire for bypass.
ii)
Input Voltage range: +10%, -15%
iii)
Input Frequency: 50Hz +/-5%
iv) Output Voltage regulation (at default parameter settlings):
• +/-1% steady state for a static 100% balanced load.
• +/- 2% steady state for a static 100% unbalanced load.
• +/-5% for a 0 to 100% load step.
v)
Output Frequency: 50Hz +/- 0.1 Hz free running (battery operation).
Under synchronized condition with bypass UPS output frequency shall
be between 48 to 52 Hz.
vi) Crest Factor: 3 : 1
vii) Voltage Transient Response:
• +/- 3% for a 50% load step.
• +/- 5% for a 100% load step.
viii) Voltage Recovery to +/- 1 % ,Transient Recovery Time: <=20 milli seconds.
ix) Phase Displacement:
• 120 degrees +/-1 degree for balanced load
• 120 degrees +/- 1 degree for 50% unbalanced load
51
CSITMS Gujarat Project
Confidential
• 120 degrees +/- 1 degree for 100% unbalanced load
x)
Overload Capability:
• 110% for 60 minutes
• 125% for 10 minute
• 150% for 60 seconds
• 200% single phase for 30 seconds
xi) Short Circuit Withstand: The UPS shall withstand a bolted fault short
circuit on the output without damager to the UPS module.
xii) AC to AC efficiency: > 90% with filters from 50% load to 100% non
linear load, at nominal input voltage with batteries fully charged.
xiii) Acoustical Noise : <65 dB(A) of noise, typical, measured at 1 meter from
the operator surface.
xiv) Inverter short circuit Current limit - 155% full load current
for instantaneous.
b) Mode of Operation
The UPS shall be designed to operate as Double conversion True ON LINE
VFI as per IEC 62040-3
i) Normal – The critical AC load is continuously supplied by the UPS
Inverter. The rectifier/ Charger derives power from AC Input source and
supplies DC power to the Inverter while simultaneously charging power
reserve battery.
ii) Emergency – Upon failure of AC Input power, the critical AC load is
supplied by the inverter which without any switching obtains power
from the battery.
There shall be no interruption in power to the critical load upon
failure or restoration of the AC input source.
iii) Recharge – Upon restoration of AC input power during the emergency
mode of operation, the rectifier/charger shall automatically restart, walk-in
and gradually assume the inverter and battery recharge loads.
iv) Bypass – UPS must have for static bypass switch in addition to manually
operated maintenance bypass switch. Manual switch should be
52
CSITMS Gujarat Project
Confidential
incorporated into UPS cabinet that will connect the load to AC power
source bypassing the rectifier/charger, inverter and static transfer switch.
v) SNMP (Simple Network Management Protocol) - Web enabled adopter
card with smart software for server shutdown shall be provided by UPS
vendor.
vi) Dual Bus system - The two UPS systems should work in Load Bus
Synchronization mode. Both the UPS shall share 50% of the total load. The
malfunction of one of the modules shall cause that module to be
disconnected automatically from the load and the healthy module shall
continue to carry the total load. Upon repair of the module, it shall be
reconnected to the critical load to resume dual supply operation.
Any module shall also be capable of being taken off the load
manually for maintenance without disturbing the load bus.
vii) Maintenance Free Battery Requirements - Battery bank connected to
each
40 KVA or adequate capacity UPS shall be designed to provide 30
minutes back-up at full load. The UPS module should be automatically
disconnected when the battery
reaches to the minimum discharge voltage level or when signaled by
other control functions.
During normal operation batteries shall be continuously float charged &
the charging current is electronically controlled for the limiting purpose.
c) Performance Requirements
The UPS is VFI classified (according to IEC 62040-3) producing an output
waveform that is independent of both the input supply frequency and
voltage.
i) UPS AC Input
Voltage Range: ±15% (rectifier is operational until -25% is
exceeded) Frequency Range: ±5%
In-rush Current Limiting: 20% to 100% of full rated current over 10
seconds. Power Factor: For 6 pulse modules, minimum of 0.8 lagging at
full load with nominal input voltage (can be increased to 0.95 lagging with
optional input filter.) For 12 pulse modules with input filter permits
operation with the filter connected down to 10% rated load without the
53
CSITMS Gujarat Project
Confidential
input power factor going leading.
2-Step Input Current Limit: Maximum of 125% normal full load input
current. (100% for generator operation.)
Temperature Compensated Charging: Above 25ºC the battery charge
voltage shall reduce by 2mV per cell per ºC in order to optimize on the
battery lifetime.
Current Distortion: Less than 30% THD at full load input current for a 6
pulse modules; the optional input filter shall reduce this input current
distortion to less than 9% THD at full load. Less than 8.5% THD at full load
current for a 12 pulse modules; the optional input filter shall reduce this
input current distortion to less than 4% THD at full load.
ii) UPS Output
Load Rating: 100% continuous load rating at 40ºC for any combination of
linear and non-linear loads.
Voltage Regulation: 1% steady state for balanced load, 2% for 100%
unbalanced load.
Frequency Regulation: ± 1Hz synchronized with bypass source, ± 0.01Hz
free running or on battery operation.
Frequency Slew Rate: 0.1Hz per second.
Efficiency: Defined as output kW / input kW at a load power factor
of 0.8 lagging:
Up to 93.5% efficient at full rated load for 6 pulse modules when operating
as a true on-line configuration.
Up to 92.9% efficient at full rated load for 12 pulse modules when
operating as a true on-line configuration.
Phase Imbalance:
120º ±1º el. for balanced loads.
120º ±1º el. for 100% unbalanced loads
Voltage Transients: ± 5% for 100% output load step.
Transient Recovery Time: To within 1% of steady state output voltage
within 20ms
54
CSITMS Gujarat Project
7.3
Confidential
Access control system
a. General
The intent of this document is to specify the minimum criteria for the Design,
Supply, Installation, and Commissioning & Maintenance of Access Control System.
The work under this system shall consist of design, supply, installation, testing,
training & handing over of all materials, equipment’s and appliances and labor
necessary to commission the said system, complete with Door controller,
Proximity card reader, Electromagnetic locks, Magnetic contact and Emergency
release switch. It shall also include lying of cabling, necessary for installation of
the system as indicated in the specification and Bill of Quantities. Any
openings/chasing in the wall/ceiling required for the installation shall be made
good in appropriate manner.
The software for the Fire alarm, Access control and CCTV system shall run on a
single platform. The specification for the same is provided along with the fire
alarm system and vendor shall comply point-wise on the requirement.
b. Scope
The scope of work shall include the design, supply, installation, commissioning,
integrating, guaranteeing and maintenance of an integrated access control
system.
c. Operational Requirements
The Access Control System (ACS) as outlined in the tender document shall be
used to control the flow of authorized personnel through the secured access area
of the facility.
Individual access cards shall be issued to all the employees. The system shall
authorize entry only after the card read by the smart card reader is validated with
respect to door, time & day of the week. For authorizing an exit, the system shall
verify the validity of the card read by the reader and release the door lock
The document shall provide an outline of the various parameters that are
specified, as minimum requirements, with respect to various hardware &
software components required for the implementation of an integrated security
& access control system. This document together with the detailed schedule of
quantities for the site forms the basis for the tender issued.
55
CSITMS Gujarat Project
Confidential
d. Access Software Features & Requirements
General Description
i. The Access control system software shall be a module in the integrated
software. The Access Control System software shall be capable of integrating
multiple functions including Access control, Time and Attendance Management
of employees, Alarm Management, Database Partitioning, and external system
database sharing of employee personal information (Import Utility).
ii. The system shall be modular in nature, and shall permit expansion of both
capacity and functionality through the addition of control panels, card readers,
software modules and sensors.
iii. The system shall incorporate the necessary hardware, software, and firmware
to collect, transmit, and process alarm, tamper and trouble conditions, access
requests, and advisories in accordance with the security procedures configured.
The system shall control the flow of authorized personnel traffic through the
secured areas of a facility.
iv. The user interface at the host computer (server) and at the UWS (user
workstation computers) shall be a mouse driven graphical user interface (GUI)
allowing the user to open and work on multiple windows simultaneously.
Abbreviations
The following abbreviations are used in this document:
ASCII
BPS
CPU
ID
I/O
ISDN
GUI
LAN
UWS
ODBC
PIN
PSTN
TCP/IP
WAN
American Standard Code for Information Interchange
Bits per Second
Central Processing Unit
Identification
Input/output
Integrated Standard Digital Network
Graphical User Interface
Local Area Network
User Workstation (computer)
Open Database Connectivity
Personal Identification Number
Public Switched Telephone Network
Transmission Control Protocol / Internet Protocol
Wide Area Network
56
CSITMS Gujarat Project
Confidential
Glossary of Terms
The following terms are defined for the purpose of this specification:
Card Profile - A logical group of doors which may be connected to one controller and
which represent a collection of readers for which a particular cardholder may have
access privileges.
Acknowledge - The action taken by an operator to indicate that he/she is aware of a
specific alarm or tamper state.
Process – The action taken by an operator to indicate that he/she is satisfied that
the alarm has been attended to and can be cleared from the screen.
Alarm - A change of state as sensed by the ACS Software indicating that the ACS
Software has detected a condition, which its sensors were designed to detect.
Badge - The physical card, carried by the Cardholder used to gain access through a
door by presentation to a Card Reader.
Cardholder - A person who is a member of the Cardholder database and may or may
not have been issued a valid badge.
Card Reader - A device usually located at access points, designed to decode the
information contained on or within a badge for the purposes of making an access
decision or for identity verification.
Download - To send computer data from one sub-system to another; for example, to
send a cardholder database from the ACS Software server to a controller for the
purposes of making access decisions without the intervention of the host PC.
Facility Code - A coded number, in addition to the individual card number, stored
within each card key, which uniquely identifies the facility at which the card is valid.
This feature prevents cards from one facility from being used at another facility that
has a similar Security System.
Server - The central computer that serves as the common point controller for the
57
CSITMS Gujarat Project
Confidential
remote user workstation terminals, as an alarm monitoring and control workstation,
as a point of integration for related sub-systems, and as a central data base server.
Line Supervision - The monitoring of an electrical circuit via electrical and software
systems to verify the electrical integrity of the supervised circuit.
Off-line - A condition in which a controller(s) is not in communication. In the off-line
mode, the controller continues to make access decisions and process alarms
according to the information stored at its local database.
User Workstation (UWS) - a personal computer connected to the ACS Software
server computer via local area network connections for the purpose of operating the
system and responding to alarms.
Password - A combination of numbers and/or letters unique to each ACS Software
operator.
Reset - A command or feedback signal that indicates that a monitored point has
returned to its normal state after having transferred to the alarm or trouble state.
Armed - The normal state of an alarm input point in which it will be monitored for
change of state, which would indicate that it has transferred to the alarm state.
Secured Area - A physical location within the facility to which access is controlled by
one or more card readers.
Tamper - A condition within the circuitry of a monitored point, which indicates that
the electrical integrity of that sensing circuit has been compromised.
Time Zone - A user programmable period made up of days of the week and hours of
the day during which events such as valid card grants and Input/output linking
events may occur.
e.
Software Architecture
i. Server
The ACS Software Server shall be configured to be located at the Central
integrated software. The ACS Software server shall operate on Windows XP/Vista/
58
CSITMS Gujarat Project
Confidential
2008 Server Platforms. The Server shall consist of various managers that are
assigned specific functionalities logically grouped together and shall control all
access to the database.
In some areas, access control should be given after entering the code. In Control
room, which person is sitting on which console and other info should have date
and time stamp on it so that whoever tempers with evidence shall be caught.
The ACS Software Server shall be designed for unattended execution and should
not have any user interface.
ii. User Workstation
The UWS shall be dedicated to act as a card issue terminal/System
Monitoring/Administration Station. The UWS shall be connected to the ACS
Software Server over a dedicated Ethernet LAN/Internet. The UWS shall provide
the GUI in the familiar windows point and click environment for easy
maneuverability.
Various configurable parameters shall be logically grouped and shall be available
in various consoles.
f.
System Architecture
i. General
The Access Control System Management System (ACS Software) shall use a Client
Server architecture based around a modular PC network, utilizing industry
standard operating systems, networks and protocols. The system shall allow the
distribution of system functions such as monitoring and control and graphical
user interface etc. across the network to allow maximum flexibility and
performance. The architecture shall include support native Ethernet LAN / WAN
using standard hardware and software to link nodes into a single integrated
system. The network protocol used shall be industry standard TCP-IP / UDP
ii. Software features


The software shall have a capacity to accommodate the following based
on licensing A central database on the server able to support up to
unlimited badges
Unlimited number of card profiles.
59
CSITMS Gujarat Project






























Confidential
Unlimited number of operators.
Central on-line data storage of historical transactions, expandable as
system resources allow.
255 levels of alarm priority
Multiple badge numbers per cardholder. Each badge can be tracked
separately.
Multiple issue levels per card, only one of which shall be active at any
given time
Fifty user-defined card holder fields. The system shall be capable of
reporting on any or all of the user-defined fields. Each user-defined field
may be defined by the user as alphanumeric, numeric, or Text List.
Support all time zones with 2 on & 2 off periods. And 3 set of times
corresponding to 3 security levels.
Anti-pass back feature support.
Door open time set for each door.
The time in and time out is calculated on the first in and last out basis.
Supports day and overnight shifts.
Overtime calculations.
Detailed data entry fields in employee master.
Employee master maintained for various locations/branches.
Employee code up to 8 digits.
Employee master maintained for old employees on location basis.
Photographs can be stored for each employee.
Manual Entries
Outdoor duty entries
In/Out Personals
Tour entries
Department types, employee types, grades, locations maintained.
Grace time for different grade types.
Backup and restoration facilities for employee master and swipe data.
Reports on employee master and time and attendance.
Login and authority rights to the software can be set for each user.
Leave system set on calendar or financial year or any month of the year.
Pro-rata calculation of leaves.
Leave register maintained for CL, SL, PL and other leaves.
Maternity and marriage leave setup.
60
CSITMS Gujarat Project














Confidential
Carry forward of previous years leave.
Backend Database: ODBC compliant
Data can be stored on a central database server.
Front end: GUI based user-friendly interface based on client server
technology for Windows 2000/XP/2003 Server environment.
Third party interface: ASCII flat files with coma separated values as per
requirement
Architecture: 3 Tier (User, Business & Data services) to ensure scalability
Operators: Unlimited
Configuration: Full set up & programming of all door controller functions
Card Database: To contain Photo image of cardholder along with other
relevant data.
Card profiles: Unlimited with respect to single card or batch of cards. Shall
define valid doors, 3 time zones per card applicable to weekday, off day &
holiday
Archival: Daily automatic archival based on defined time.
Reports: User definable access reports with respect to time, Date, door &
card. Daily Attendance reports based on 1st IN & last OUT. Reports should
also include archived data.
Door Control: Each Door individually or all door simultaneously may be
locked / unlocked or normalised from the PC.
Roll call: The software shall be able to provide the no. of list of card
holders in the premises. It shall also be capable locating an user based on
the last transaction.
iii. Operator Interface Characteristics
ACS Software shall provide a Windows operator interface as standard. No custom
programming or scripting shall be necessary to produce the following:
Window re-size, dedicated icons and Pull down Menus to perform the
following:




Associated Alarm Display
Alarm Summary
Alarm Acknowledgement
Graphic Call-up
61
CSITMS Gujarat Project



Confidential
Card Holder Detail
Alarm Banner showing priority System Date
Current Operator
iv. Operator Functions
The following functions shall be performed through the operator
interface:





Display and control of door control units
Acknowledge alarms on a priority basis Initiate printing of reports
Archive and retrieve event logs Change own password
Monitoring of data communications channels
Configure system parameters
v. Operator
Security
Each operator shall be assigned a user profile that defines the
following:





Operator Identifier or User Name
Unique Password
Workstation Access
Password expiry parameters
Any actions initiated by the operator shall be logged in the Event database
by operator identifier.
Area Assignment / Area Profile
Each operator shall be assigned a specific area of the building with the
appropriate monitoring and control responsibility (no view, view only, alarm
acknowledge only or full control). An area shall be defined in this context as a
Partition. This in turn may represent a physical space in the building. This can be
used to partition the database in such a way as to assign operators control over
certain areas and prevent unauthorized access to other areas.
vi. Standard System Displays
The ACS software shall be capable of storing a number of graphic displays (maps).
The quantity of such maps shall be limited by available hard disk storage space
62
CSITMS Gujarat Project
Confidential
only. Display maps) are layered i.e. lower level maps associated with the top layer
map existing in the system. It should be possible to navigate through the displays
(maps) layers by clicking on the sections of a map layer. The following displays
shall be included as part of the system:



7.4
Alarm
Display
Alarm Count Event display
Fire detection and suppression
Addressable Fire Detection System
General
a. Description
i.
This section of the specification includes the furnishing, installation,
connection and testing of the microprocessor controlled, intelligent
reporting fire alarm equipment required to form a complete, operative,
coordinated system. It shall include, but not be limited to, alarm initiating
devices, alarm notification appliances, Fire Alarm Control Panel (FACP),
auxiliary control devices, annunciators, and wiring.
ii. The fire alarm system shall comply with requirements of NFPA Standard
72 for Protected Premises Signaling Systems except as modified and
supplemented by this specification. The system shall be electrically
supervised and monitor the integrity of all conductors.
iii. The FACP and peripheral devices shall be manufactured 100% by a
manufacturer (or division thereof).
iv. The system and its components shall be Underwriters Laboratories, Inc.
listed under the appropriate UL testing standard as listed herein for fire
alarm applications and the installation shall be in compliance with the UL
listing.
b. Scope
i.
A new intelligent reporting, microprocessor controlled fire detection
system shall be installed in accordance to the specifications as detailed in
the tender document / RFP. AMC fire department’s certificate required.
63
CSITMS Gujarat Project
Confidential
ii. Basic Performance:
Alarm, trouble and supervisory signals from all intelligent reporting
devices shall be encoded on NFPA Style 6 (Class A) Signaling Line Circuits
(SLC).
Initiation Device Circuits (IDC) shall be wired Class A (NFPA Style D) as part
of an addressable device connected by the SLC Circuit.
Notification Appliance Circuits (NAC) shall be wired Class A (NFPA Style Z)
as part of an addressable device connected by the SLC Circuit.
On Style 6 or 7 (Class A) configurations a single ground fault or open circuit
on the system Signaling Line Circuit shall not cause system malfunction,
loss of operating power or the ability to report an alarm.
Alarm signals arriving at the FACP shall not be lost following a primary
power failure (or outage) until the alarm signal is processed and recorded.
iii. Basic System Functional Operation
When a fire alarm condition is detected and reported by one of the
system initiating devices, the following functions shall immediately occur:
The system alarm LED on the system display shall flash.
A local piezo electric signal in the control panel shall sound.
A backlit LCD display shall indicate all information associated with the fire
alarm condition, including the type of alarm point and its location within
the protected premises.
Printing and history storage equipment shall log the information
associated each new fire alarm control panel condition, along with time
and date of occurrence.
All system output programs assigned via control-by-event interlock
programming to be activated by the particular point in alarm shall be
executed, and the associated system outputs (notification appliances
and/or relays) shall be activated.
c. Submittals
64
CSITMS Gujarat Project
Confidential
i. General
Two copies of all submittals shall be submitted to the Owner’s authorised
official for review.
All references to manufacturer's model numbers and other pertinent
information herein is intended to establish minimum standards of
performance, function and quality. Equivalent compatible UL-listed
equipment from other manufacturers may be substituted for the specified
equipment as long as the minimum standards are met.
For equipment other than that specified, the contractor shall supply proof
that such substitute equipment equals or exceeds the features, functions,
performance, and quality of the specified equipment.
ii. Shop Drawings
Sufficient information, clearly presented, shall be included to determine
compliance with drawings and specifications.
Include manufacturer's name(s), model numbers, ratings, power
requirements, equipment layout, device arrangement, complete wiring
point-to-point diagrams, and conduit layouts.
iii. Manuals:
Submit simultaneously with the shop drawings, complete operating and
maintenance manuals listing the manufacturer's name(s), including
technical data sheets.
Wiring diagrams shall indicate internal wiring for each device and the
interconnections between the items of equipment.
Provide a clear and concise description of operation that gives, in detail,
the information required to properly operate the equipment and system.
iv. Software Modifications
Provide the services of a factory trained and authorized technician to
perform all system software modifications, upgrades or changes.
Provide all hardware, software, programming tools and documentation
65
CSITMS Gujarat Project
Confidential
necessary to modify the fire alarm system on site. Modification includes
addition and deletion of devices, circuits, zones and changes to system
operation and custom label changes for devices or zones. The system
structure and software shall place no limit on the type or extent of
software modifications on-site.
d. Guaranty / Warranty
All work performed and all material and equipment furnished under this
contract shall be free from defects and shall remain so for the warranty
period of one year and AMC period of three years.
A The contractor shall have the ability to provide parts and labor to
expand the system specified, if so requested, for a period of 5 years from
the date of acceptance.
g.
Approvals
i. The system shall have proper listing and/or approval from the following
nationally recognized agencies:
UL
FM
Underwriters Laboratories Inc
Factory Mutual
ii. The fire alarm control panel shall meet UL Standard 864 (Control
Units) and UL Standard 1076 (Proprietary Burglar Alarm Systems).
iii.The system shall be listed by the national agencies as suitable for
extinguishing release applications.
Products
a. Equipments and Material
All equipment and components shall be new, and the manufacturer’s current
model. The materials, appliances, equipment and devices shall be tested and
listed by a nationally recognized approvals agency for use as part of a
protective signaling system, meeting the National Fire Alarm Code.
ii.
All equipment and components shall be installed in strict compliance with
manufacturers' recommendations. Consult the manufacturer's installation
manuals for all wiring diagrams, schematics, physical equipment sizes, etc.,
66
CSITMS Gujarat Project
Confidential
before beginning system installation.
iii. All equipment shall be attached to walls and ceiling/floor assemblies and
shall be held firmly in place (e.g., detectors shall not be supported solely by
suspended ceilings). Fasteners and supports shall be adequate to support
the required load.
c. Conduit and Wire
i. Conduit:
Conduit shall be in accordance with The National Electrical Code (NEC), local
and state requirements.
Where required, all wiring shall be installed in conduit or raceway. Conduit fill
shall not exceed 40 percent of interior cross sectional area where three or
more cables are contained within a single conduit.
Jelly cable should be use so that Rat doesn’t cut it. Cable must be separated
from any open conductors of power, or Class 1 circuits, and shall not be
placed in any conduit, junction box or raceway containing these conductors,
per NEC Article 760-29. All the conduits should be separate.
Wiring for 24 volt DC control, alarm notification, emergency communication
and similar power-limited auxiliary functions may be run in the same conduit
as initiating and signaling line circuits. All circuits shall be provided with
transient suppression devices and the system shall be designed to permit
simultaneous operation of all circuits without interference or loss of signals.
Cabling should be such a way that in future there is no need of digging.
Conduit shall not enter the fire alarm control panel or any other remotely
mounted control panel equipment or back boxes, except where conduit entry
is specified by the FACP manufacturer. Different colored conduits needed for
Data cables and Electrical connectors.
Conduit shall be 3/4-inch (19.1 mm) minimum.
ii. Wire
All fire alarm system wiring shall be new.
Wiring shall be in accordance with local, state and national codes (e.g., NEC
Article 760) and as recommended by the manufacturer of the fire alarm
67
CSITMS Gujarat Project
Confidential
system. Number and size of conductors shall be as recommended by the fire
alarm system manufacturer, but not less than 18 AWG (1.02 mm) for Initiating
Device Circuits and Signaling Line Circuits, and 14 AWG (1.63 mm) for
Notification Appliance Circuits.
All wire and cable shall be listed and/or approved by a recognized testing
agency for use with a protective signaling system.
Wire and cable not installed in conduit shall have a fire resistance rating
suitable for the installation as indicated in NFPA 70 (e.g., FPLR).
Wiring used for the multiplex communication circuit (SLC) shall be twisted and
unshielded and support a minimum wiring distance of 12,500 feet. The design
of the system shall permit use of IDC and NAC wiring in the same conduit with
the SLC communication circuit.
All field wiring shall be electrically supervised for open circuit and ground
fault.
The fire alarm control panel shall be capable of t-tapping Class B (NFPA Style
4) Signaling Line Circuits (SLCs). Systems that do not allow or have restrictions
in, for example, the amount of t-taps, length of t-taps etc., are not acceptable.
c. Terminal Boxes, Junction Boxes and Cabinets:
All boxes and cabinets shall be UL listed for their use and purpose.
Initiating circuits shall be arranged to serve like categories (manual, smoke,
waterflow). Mixed category circuitry shall not be permitted except on signaling
line circuits connected to intelligent reporting devices.
The fire alarm control panel shall be connected to a separate dedicated branch
circuit, maximum 20 amperes. This circuit shall be labeled at the main power
distribution panel as FIRE ALARM. Fire alarm control panel primary power
wiring shall be 12 AWG. The control panel cabinet shall be grounded securely to
either a cold water pipe or grounding rod.
Main Fire Alarm Control Panel or Network Node
a. Main FACP or network node shall be a Two Loop Panel and shall contain a
microprocessor based Central Processing Unit (CPU) and power supply in an
economical space saving single board design. The CPU shall communicate with
68
CSITMS Gujarat Project
Confidential
and control the following types of equipment used to make up the system:
intelligent addressable smoke and thermal (heat) detectors, addressable
modules, printer, enunciators, and other system controlled devices.
b.
Operator Control
i. Acknowledge Switch:
Activation of the control panel acknowledge switch in response to new alarms
and/or troubles shall silence the local panel piezo electric signal and change the
alarm and trouble LEDs from flashing mode to steady-ON mode. If multiple
alarm or trouble conditions exist, depression of this switch shall advance the
LCD display to the next alarm or trouble condition.
Depression of the Acknowledge switch shall also silence all remote annunciator
piezo sounders.
ii. Alarm Silence Switch:
Activation of the alarm silence switch shall cause all programmed alarm
notification appliances and relays to return to the normal condition after an
alarm condition. The selection of notification circuits and relays that are
silenceable by this switch shall be fully field programmable within the confines
of all applicable standards. The FACP software shall include silence inhibit and
auto-silence timers.
iii.
Alarm Activate (Drill) Switch:
The Alarm Activate switch shall activate all notification appliance circuits. The
drill function shall latch until the panel is silenced or reset.
iv.
System Reset Switch:
Activation of the System Reset switch shall cause all electronically-latched
initiating devices, appliances or software zones, as well as all associated output
devices and circuits, to return to their normal condition.
v.
Lamp Test:
The Lamp Test switch shall activate all local system LEDs, light each segment of
the liquid crystal display and display the panel software revision for service
personal.
69
CSITMS Gujarat Project
Confidential
c. System Capacity and General Operation
i.
ii.
iii.
iv.
v.
vi.
vii.
viii.
The control panel or each network node shall provide, or be capable of
expansion to 636 intelligent/addressable devices.
The control panel or each network node shall include Form-C alarm,
trouble, supervisory, and security relays rated at a minimum of 2.0 amps
@ 30 VDC. It shall also include four Class B (NFPA Style Y) or Class A (NFPA
Style Z) programmable Notification Appliance Circuits.
The control panel or each network node shall support up to 8 additional
output modules (signal, speaker, telephone, or relay), each with 8 circuits
for an additional 64 circuits. These circuits shall be either Class A (NFPA
Style Z) or Class B (NFPA Style Y) per the project drawings.
The system shall include a full featured operator interface control and
annunciation panel that shall include a backlit Liquid Crystal Display (LCD),
individual color coded system status LEDs, and an alphanumeric keypad
with easy touch rubber keys for the field programming and control of the
fire alarm system.
The system shall be programmable, configurable, and expandable in the
field without the need for special tools, PROM programmers or PC based
programmers. It shall not require replacement of memory ICs to facilitate
programming changes.
The system shall allow the programming of any input to activate any
output or group of outputs. Systems that have limited programming (such
as general alarm), have complicated programming (such as a diode
matrix), or require a laptop personal computer are not considered suitable
substitutes.
The FACP shall support up to 20 logic equations, including "and," "or," and
"not," or time delay equations to be used for advanced programming.
Logic equations shall require the use of a PC with a software utility
designed for programming.
The FACP or each network node shall provide the following features:
a. Drift compensation to extend detector accuracy over life. Drift
compensation shall also include a smoothing feature, allowing
transient noise signals to be filtered out.
b. Detector sensitivity test, meeting requirements of NFPA 72, Chapter 7.
c. Maintenance alert, with two levels (maintenance alert/maintenance
urgent), to warn of excessive smoke detector dirt or dust
accumulation.
- Nine sensitivity levels for alarm, selected by detector. The alarm level
70
CSITMS Gujarat Project
Confidential
range shall be .5 to 2.35 percent per foot for photoelectric detectors
and 0.5 to 2.5 percent per foot for ionization detectors. The system
shall also support sensitive advanced detection laser detectors with an
alarm level range of .03 percent per foot to 1.0 percent per foot. The
system shall also include up to nine levels of Prealarm, selected by
detector, to indicate impending alarms to maintenance personnel.
- The ability to display or print system reports.
- Alarm verification, with counters and a trouble indication to alert
maintenance personnel when a detector enters verification 20 times.
- PAS presignal, meeting NFPA 72 3-8.3 requirements.
- Rapid manual station reporting (under 3 seconds) and shall meet
NFPA 72 Chapter 1 requirements for activation of notification circuits
within 10 seconds of initiating device activation.
- Periodic detector test, conducted automatically by the software.
- Self optimizing pre-alarm for advanced fire warning, which allows
each detector to learn its particular environment and set its prealarm
level to just above normal peaks.
- Cross zoning with the capability of counting: two detectors in alarm,
two software zones in alarm, or one smoke detector and one thermal
detector.
- Walk test, with a check for two detectors set to same address.
- Control-by-time for non-fire operations, with holiday schedules.
- Day/night automatic adjustment of detector sensitivity.
- Device blink control for sleeping areas.
ix.
The FACP shall be capable of coding main panel node notification circuits
in March Time (120 PPM), Temporal (NFPA 72 A-2-2.2.2), and California
Code. Panel notification circuits (NAC 1, 2,3 and 4) shall also support TwoStage operation, Canadian Dual Stage (3 minutes) and Canadian Dual
Stage (5 minutes). Two stage operation shall allow 20 Pulses Per Minute
(PPM) on alarm and 120 PPM after 5 minutes or when a second device
activates. Canadian Dual stage is the same as Two-Stage except will only
switch to second stage by activation of Drill Switch 3 or 5 minute timer.
The panel shall also provide a coding option that will synchronize specific
strobe lights designed to accept a specific "sync pulse."
d. Network Communication
The network architecture shall be based on a Local Area Network (LAN), a
firmware package that utilizes a peer-to-peer, inherently regenerative
communication format and protocol. The protocol shall be based on
ARCNET or equivalent. The network shall use a deterministic token-
71
CSITMS Gujarat Project
Confidential
passing method. Collision detection and recovery type protocols are not
acceptable substitutes due to life safety requirements. In addition, there
shall be no master, polling computer, central file computer, display
controller or other central element (weak link) in the network which, on
failure, may cause complete loss of network communications or cause
major degradation of network capability. There shall be no cascading of
CPUs or master-slave relationships at the network level to facilitate
network communications. Failure of any node shall not cause failure or
communication degradation of any other node or change the network
communication protocol among surviving nodes located within distance
limitations. Each node/panel shall communicate on the network at a baud
rate of not less than 312 KBPS (kilo bits per second). A node may be an
intelligent Fire Alarm Control Panel (FACP), Network Control Station PC
(NCS) or Network Control Annunciator (NCA). The network shall be
capable of expansion to at least 100 nodes.
Each network node address shall be capable of storing Event equations.
The event equations shall be used to activate outputs on one network
node from inputs on other network nodes.
The network shall be capable of communicating via wire or fiber optic
medium. A wire network shall include a fail-safe means of isolating the
nodes in the unlikely event of complete power loss to a node.
A network repeater shall be available to increase the twisted-pair distance
capability in 3,000 ft. increments.
e. Central Microprocessor
i.
The microprocessor shall be a state-of-the-art, high speed, 16-bit RISC device
and it shall communicate with, monitor and control all external interfaces. It
shall include an EPROM for system program storage, Flash memory for
building-specific program storage, and a "watch dog" timer circuit to detect
and report microprocessor failure.
ii. The microprocessor shall contain and execute all control-by-event programs
for specific action to be taken if an alarm condition is detected by the system.
Control-by-event equations shall be held in non-volatile programmable
memory, and shall not be lost even if system primary and secondary power
failure occurs.
iii. The microprocessor shall also provide a real-time clock for time annotation of
72
CSITMS Gujarat Project
Confidential
system displays, printer, and history file. The time-of-day and date shall not be
lost if system primary and secondary power supplies fail. The real time clock
may also be used to control non-fire functions at programmed time-of-day,
day-of-week, and day-of-year.
iv. A special program check function shall be provided to detect common
operator errors.
v. An auto-program (self-learn) function shall be provided to quickly install initial
functions and make the system operational.
vi. For flexibility and to ensure program validity, an optional Windows(TM) based
program utility shall be available. This program shall be used to off-line
program the system with batch upload/download, and have the ability to
upgrade the manufacturers (FLASH) system code changes. This program shall
also have a verification utility, which scans the program files, identifying
possible errors. It shall also have the ability to compare old program files to
new ones, identifying differences in the two files to allow complete testing of
any system operating changes. This shall be in incompliance with the NFPA 72
requirements for testing after system modification.
f. System Display
i.
The system shall support the following display mode options:
80 Character display option. The display shall include an 80-character
backlit alphanumeric Liquid Crystal Display (LCD) and a full PC style
QWERTY keypad.
ii. The display shall provide all the controls and indicators used by the system
operator:
The 80-character display shall include the following operator control
switches: ACKNOWLEDGE, ALARM SILENCE, ALARM ACTIVATE (drill),
SYSTEM RESET, and LAMP TEST.
iii. The display shall annunciate status information and custom alphanumeric
labels for all intelligent detectors, addressable modules, internal panel
circuits, and software zones.
iv. The display shall also provide Light-Emitting Diodes.
73
CSITMS Gujarat Project
Confidential
v. The 80-character display shall provide 8 Light-Emitting-Diodes (LEDs) that
indicate the status of the following system parameters: AC POWER, FIRE
ALARM, PREALARM WARNING, SECURITY ALARM, SUPERVISORY SIGNAL,
SYSTEM TROUBLE, DISABLED POINTS, and ALARM SILENCED.
vi. The 80-character display keypad shall be an easy to use QWERTY type keypad,
similar to a PC keyboard. This shall be part of the standard system and have
the capability to command all system functions, entry of any alphabetic or
numeric information, and field programming. Two different password levels
shall be provided to prevent unauthorized system control or programming.
vii. The system shall support the display of battery charging current and voltage
on the 80-character LCD display.
g. Signaling Line Circuits (SLC)
Each FACP or FACP network node shall support up to two SLCs. Each SLC
interface shall provide power to and communicate with up to 125 intelligent
detectors (ionization, photoelectric or thermal) and 125 intelligent modules
(monitor or control) for a loop capacity of 400 detectors. The addition of the
optional second loop shall double the device capacity, Panel should have
expansion capacity. Each SLC shall be capable of NFPA 72 Style 4, Style 6, or
Style 7 (Class A or B) wiring.
CPU shall receive analog information from all intelligent detectors to be
processed to determine whether normal, alarm, prealarm, or trouble conditions
exist for each detector. The software shall automatically maintain the detector's
desired sensitivity level by adjusting for the effects of environmental factors,
including the accumulation of dust in each detector. The analog information
shall also be used for automatic detector testing and for the automatic
determination of detector maintenance requirements.
h. Serial Interfaces
The system shall include two serial EIA-232 interfaces. Each interface shall be a
means of connecting UL Listed Information Technology Equipment (ITE)
peripherals.
i. Notification Appliance Circuit (NAC) Module
The Notification Appliance Circuit module shall provide four fully supervised Class
A or B (NFPA Style Z or Y) notification circuits. An expansion circuit board shall
allow expansion to eight circuits per module.
74
CSITMS Gujarat Project
Confidential
The notification circuit capacity shall be 3.0 amperes maximum per circuit and 6.0
amperes maximum per module.
The module shall not affect other module circuits in any way during a short circuit
condition.
The module shall provide eight green ON/OFF LEDs and eight yellow trouble LEDs.
The module shall also provide a momentary switch per circuit that may be
used to manually turn the particular circuit on or off or to disable the circuit.
Each notification circuit shall include a custom label inserted to identify each
circuit's location. Labels shall be created using a standard typewriter or word
processor.
The notification circuit module shall be provided with removable wiring terminal
blocks for ease of installation and service. The terminal strips shall be UL listed for
use with up to 12 AWG wire.
Each circuit shall be capable of, through system programming, deactivating upon
depression of the signal silence switch.
j. Control Relay Module
The control relay module shall provide four Form-C auxiliary relay circuits rated at
5 amperes, 28 VDC. An expansion circuit board shall allow expansion to eight
Form-C relays per module.
Each relay circuit shall be capable of being activated (change in state) by any
initiating device or from any combination of initiating devices.
The relay module shall provide 8 green ON/OFF LEDs and 8 yellow LEDs (indicates
disabled status of the relay).
The module shall provide a momentary switch per relay circuit that may be used
to manually turn the relay ON/OFF or to disable the relay.
Each relay circuit shall include a custom label inserted to identify its location.
Labels shall be created using a standard typewriter or word processor.
The control relay module shall be provided with removable wiring terminal blocks
for ease of installation and service. The terminal blocks shall be UL listed for use
with up to 12 AWG wire.
75
CSITMS Gujarat Project
Confidential
k. Enclosures:
The control panel shall be housed in a UL-listed cabinet suitable for surface or
semi-flush mounting. The cabinet and front shall be corrosion protected, given a
rust-resistant prime coat, and manufacturer's standard finish.
The back box and door shall be constructed of 0.060 steel with provisions for
electrical conduit connections into the sides and top.
The door shall provide a key lock and shall include a glass or other transparent
opening for viewing of all indicators. For convenience, the door may be site
configured for either right or left hand hinging.
l. Power Supply:
A high tech off-line switching power supply shall be available for the fire alarm
control panel or network node and provide 6.0 amps of available power for the
control panel and peripheral devices.
Provisions will be made to allow the audio-visual power to be increased as
required by adding modular expansion audio-visual power supplies.
Positive-Temperature-Coefficient (PTC) thermistors, circuit breakers, or other
over-current protection shall be provided on all power outputs. The power supply
shall provide an integral battery charger for use with batteries up to 60 AH or may
be used with an external battery and charger system. Battery arrangement may
be configured in the field.
The power supply shall continuously monitor all field wires for earth ground
conditions, and shall have the following LED indicators:
Ground Fault LED
AC Power Fail LED
NAC on LED (4)
The main power supply shall operate on 120 VAC, 60 Hz, and shall provide all
necessary power for the FACP.
The main power supply shall provide a battery charger using dual-rate charging
techniques for fast battery recharge and be capable of charging batteries up to 60
AH.
76
CSITMS Gujarat Project
Confidential
All circuits shall be power-limited, per UL864 requirements.
m. Field Charging Power Supply (FCPS): The FCPS is a device designed for use as
either a remote 24 volt power supply or used to power Notification
Appliances.
The FCPS shall offer up to 6.0 amps (4.0 amps continuous) of regulated 24 volt
power. It shall include an integral charger designed to charge 7.0 amp hour
batteries and to support 60 hour standby.
The Field Charging Power Supply shall have two input triggers. The input trigger
shall be a Notification Appliance Circuit (from the fire alarm control panel) or a
relay. Four outputs (two Style Y or Z and two style Y) shall be available for
connection to the Notification devices.
The FCPS shall include an attractive surface mount back box.
The Field Charging Power Supply shall include the ability to delay the AC fail
delay per NFPA requirements.
The FCPS include power limited circuitry, per 1995 UL standards.
n. Specific System Operations
i.
Smoke Detector Sensitivity Adjust: A means shall be provided for adjusting
the sensitivity of any or all addressable intelligent detectors in the system
from the system keypad. Sensitivity range shall be within the allowed UL
window and have a minimum of 9 levels.
ii. Alarm Verification: Each of the intelligent addressable smoke detectors in the
system may be independently selected and enabled to be an alarm verified
detector. The alarm verification delay shall be programmable from 5 to 30
seconds and each detector shall be able to be selected for verification. The
FACP shall keep a count of the number of times that each detector has
entered the verification cycle. These counters may be displayed and reset by
the proper operator commands.
iii. Point Disable: Any addressable device or conventional circuit in the system
may be enabled or disabled through the system keypad.
iv. Point Read: The system shall be able to display or print the following point
status diagnostic functions:
a.
Device status
77
CSITMS Gujarat Project
Confidential
b.
c.
d.
e.
f.
Device type
Custom device label
View analog detector values
Device zone assignments
All program parameters
v. System Status Reports: Upon command from an operator of the system, a
status report will be generated and printed, listing all system status.
vi. System History Recording and Reporting: The fire alarm control panel shall
contain a history buffer that will be capable of storing up to 800 events. Up to
200 events shall be dedicated to alarm and the remaining events are general
purpose. Systems that do not have dedicated alarm storage, where events are
overridden by non-alarm type events, are not suitable substitutes. Each of
these activations will be stored and time and date stamped with the actual
time of the activation. The contents of the history buffer may be manually
reviewed, one event at a time, or printed in its entirety. The history buffer
shall use non-volatile memory. Systems that use volatile memory for history
storage are not acceptable substitutes.
vii. Automatic Detector Maintenance Alert: The fire alarm control panel shall
automatically interrogate each intelligent detector and shall analyze the
detector responses over a period of time. If any intelligent detector in the
system responds with a reading that is above or below normal limits, then the
system will enter the trouble mode, and the particular detector will be
annunciated on the system display, and printed on the optional printer. This
feature shall in no way inhibit the receipt of alarm conditions in the system,
nor shall it require any special hardware, special tools or computer expertise
to perform.
viii. Pre-Alarm Function: The system shall provide two levels of pre-alarm warning
to give advance notice of a possible fire situation. Both pre-alarm levels shall
be fully field adjustable. The first level shall give an audible indication at the
panel. The second level shall give an audible indication and may also activate
control relays. The system shall also have the ability to activate local detector
sounder bases at the pre-alarm level, to assist in avoiding nuisance alarms.
ix. Software Zones: The FACP shall provide 100 software zones, 10 additional
special function zones, 10 releasing zones, and 20 logic zones.
x. The fire alarm control panel shall include a walk test feature. It shall include
the
78
CSITMS Gujarat Project
Confidential
ability to test initiating device circuits and notification appliance circuits from
the field without returning to the panel to reset the system. Operation shall
be as follows:
Alarming an initiating device shall activate programmed outputs, which are
selected to participate in walk test, for 3 seconds.
Introducing a trouble into the initiating device shall activate the programmed
outputs for 8 seconds.
All devices tested in walk test shall be recorded in the history buffer.
xi. Water flow Operation: An alarm from a waterflow detection device shall
activate the appropriate alarm message on the main panel display, turn on all
programmed notification appliance circuits and shall not be affected by the
signal silence switch.
xii. Supervisory Operation: An alarm from a supervisory device shall cause the
appropriate indication on the system display, light a common supervisory
LED, but will not cause the system to enter the trouble mode.
xiii. Signal Silence Operation: The FACP shall have the ability to program each
output circuit (notification, relay, speaker etc) to deactivate upon depression
of the signal silence switch.
Xiv.Non-Alarm Input Operation: Any addressable initiating device in the system
may be used as a non-alarm input to monitor normally open contact type
devices. Non-alarm functions are a lower priority than fire alarm initiating
devices.
xv. Combo Zone: A special type code shall be available to allow water flow and
supervisory devices to share a common addressable module. Water flow
devices shall be wired in parallel, supervisory devices in series.
System Components
a. Speakers:
i.
All speakers shall operate on 25 VRMS or with field selectable output taps
from 0.5 to 2.0 Watts.
79
CSITMS Gujarat Project
Confidential
ii. Speakers in corridors and public spaces shall produce a nominal sound output
of 84 dBA at 10 feet (3m).
iv. Frequency response shall be a minimum of 400 HZ to 4000 HZ.
v. The back of each speaker shall be sealed to protect the speaker cone from
damage and dust.
b. Projected Beam Detectors
i.
The projected beam type shall be a 4-wire 24 VDC device.
ii.
The detector shall be listed to UL 268 and shall consist of a separate
transmitter and receiver capable of being powered separately or together.
iii. The detector shall operate in either a short range (30' - 100') or long range
(100' - 330') mode.
iv. The temperature range of the device shall be -22 degrees F to 131 degrees F.
v.
The detector shall feature a bank of four alignment LEDs on both the
receiver and the transmitter that are used to ensure proper alignment of
unit without special tools.
vi. Beam detectors shall feature automatic gain control which will compensate
for gradual signal deterioration from dirt accumulation on lenses.
vii. The unit shall be both ceiling and wall mountable.
c. Alphanumeric LCD Type Annunciator
i.
The alphanumeric display annunciator shall be a supervised, remotely
located back-lit LCD display containing a minimum of eighty (80) characters
for alarm annunciation in clear English text.
ii.
The LCD annunciator shall display all alarm and trouble conditions in the
system.
iii. An audible indication of alarm shall be integral to the alphanumeric display.
iv. The display shall be UL listed for fire alarm application.
80
CSITMS Gujarat Project
v.
Confidential
It shall be possible to connect up to 32 LCD displays and be capable of wiring
distances up to 6,000 feet from the control panel.
vi. The annunciator shall connect to a separate, dedicated "terminal mode" EIA485 interface. This is a two-wire loop connection and shall be capable of
distances to 6,000 feet. Each terminal mode LCD display shall mimic the main
control panel.
vii. The system shall allow a minimum of 32 terminal mode LCD annunciators. Up
to 10 LCD annunciators shall be capable of the following system functions:
Acknowledge, Signal Silence and Reset, which shall be protected from
unauthorized use by a key switch or password.
d. All interfaces and associated equipment are to be protected so that they will
not be affected by voltage surges or line transients consistent with UL
standard 864.
e. Field Wiring Terminal Blocks
For ease of service all panel I/O wiring terminal blocks shall be removable,
plug-in types and have sufficient capacity for #18 to #12 AWG wire. Terminal
blocks that are permanently fixed are not acceptable.
System Components – Addressable Devices
a. Addressable Devices - General
i.
Addressable devices shall use simple to install and maintain decade, decimal
address switches. Devices shall be capable of being set to an address in a
range of 001 to 159.
ii. Addressable devices, which use a binary-coded address setting method, such
as a DIP-switch, are not an allowable substitute.
iii. Detectors shall be intelligent (analog) and addressable, and shall connect with
two wires to the fire alarm control panel Signaling Line Circuits.
iv. Addressable smoke and thermal detectors shall provide dual alarm and power
/ polling LEDs. Both LEDs shall flash green under normal conditions, indicating
that the detector is operational and in regular communication with the
control panel, and both LEDs shall be placed into steady red illumination by
81
CSITMS Gujarat Project
Confidential
the control panel, indicating that an alarm condition has been detected. If
required, the LED flash shall have the ability to be removed from the system
program. An output connection shall also be provided in the base to connect
an external remote alarm LED.
v. The fire alarm control panel shall permit detector sensitivity adjustment
through field programming of the system. The panel on a time-of-day basis
shall automatically adjust sensitivity.
vi. Using software in the FACP, detectors shall automatically compensate for dust
accumulation and other slow environmental changes that may affect their
performance. The detectors shall be listed by UL as meeting the calibrated
sensitivity test requirements of NFPA Standard 72, Chapter 7.
vii. The detectors shall be ceiling-mount and shall include a separate twist-lock
base with tamper proof feature. Bases shall include a sounder base with a
built-in (local) sounder rated at 85 DBA minimum, a relay base and an isolator
base designed for Style 7 applications.
viii. The detectors shall provide a test means whereby they will simulate an alarm
condition and report that condition to the control panel. Such a test may be
initiated at the detector itself (by activating a magnetic switch) or initiated
remotely on command from the control panel.
ix. Detectors shall also store an internal identifying type code that the control
panel shall use to identify the type of device (ION, PHOTO, THERMAL).
x. Detectors will operate in an analog fashion, where the detector simply
measures its designed environment variable and transmits an analog value to
the FACP based on real-time measured values. The FACP software, not the
detector, shall make the alarm/normal decision, thereby allowing the
sensitivity of each detector to be set in the FACP program and allowing the
system operator to view the current analog value of each detector.
xi. Addressable devices shall store an internal identifying code that the control
panel shall use to identify the type of device.
xii. Addressable modules shall mount in a 4-inch square (101.6 mm square), 2-1/8
inch (54 mm) deep electrical box. An optional surface mount Lexan enclosure
shall be available.
82
CSITMS Gujarat Project
Confidential
b. Addressable Manual Fire Alarm Box (manual station)
i.
Addressable manual fire alarm boxes shall, on command from the control
panel, send data to the panel representing the state of the manual switch and
the addressable communication module status. They shall use a key operated
test-reset lock, and shall be designed so that after actual emergency
operation, they cannot be restored to normal use except by the use of a key.
ii. All operated stations shall have a positive, visual indication of operation and
utilize a key type reset.
iii. Manual fire alarm boxes shall be constructed of Lexan with clearly visible
operating instructions provided on the cover. The word FIRE shall appear on
the front of the stations in raised letters, 1.75 inches (44 mm) or larger.
c. Intelligent Photoelectric Smoke Detector
The detectors shall use the photoelectric (light-scattering) principal to
measure smoke density and shall, on command from the control panel, send
data to the panel representing the analog level of smoke density.
d. Intelligent Laser Photo Smoke Detector
i.
The intelligent laser photo smoke detector shall be a spot type detector that
incorporates an extremely bright laser diode and an integral lens that focuses
the light beam to a very small volume near a receiving photo sensor. The
scattering of smoke particles shall activate the photo sensor.
ii. The laser detector shall have conductive plastic so that dust accumulation is
reduced significantly.
iii. The intelligent laser photo detector shall have nine sensitivity levels and be
sensitive to a minimum obscuration of 0.03 percent per foot.
iv. The laser detector shall not require expensive conduit, special fittings or PVC
pipe.
v. The intelligent laser photo detector shall support standard, relay, isolator and
sounder detector bases.
vi. The laser photo detector shall not require other cleaning requirements than
those listed in NFPA 72. Replacement, refurbishment or specialized cleaning
of the detector head shall not be required.
83
CSITMS Gujarat Project
Confidential
vii. The laser photo detector shall include two bicolor LEDs that flash green in
normal operation and turn on steady red in alarm.
e. Intelligent Ionization Smoke Detector
The detectors shall use the dual-chamber ionization principal to measure
products of combustion and shall, on command from the control panel, send
data to the panel representing the analog level of products of combustion.
f. Intelligent Multi Criteria Acclimating Detector
i.
The intelligent multi criteria Acclimate detector shall be an addressable device
that is designed to monitor a minimum of photoelectric and thermal
technologies in a single sensing device. The design shall include the ability to
adapt to its environment by utilizing a built-in microprocessor to determine its
environment and choose the appropriate sensing settings. The detector
design shall allow a wide sensitivity window, no less than 1 to 4% per foot
obscuration. This detector shall utilize advanced electronics that react to slow
smoldering fires and thermal properties all within a single sensing device.
ii. The microprocessor design shall be capable of selecting the appropriate
sensitivity levels based on the environment type it is in (office, manufacturing,
kitchen etc.) and then have the ability to automatically change the setting as
the environment changes (as walls are moved or as the occupancy changes).
iii. The intelligent multi criteria detection device shall include the ability to
combine the signal of the thermal sensor with the signal of the photoelectric
signal in an effort to react hastily in the event of a fire situation. It shall also
include the inherent ability to distinguish between a fire condition and a false
alarm condition by examining the characteristics of the thermal and smoke
sensing chambers and comparing them to a database of actual fire and
deceptive phenomena.
g. Intelligent Thermal Detectors
Thermal detectors shall be intelligent addressable devices rated at 135
degrees Fahrenheit (58 degrees Celsius) and have a rate-of-rise element rated
at 15 degrees F (9.4 degrees C) per minute. It shall connect via two wires to
the fire alarm control panel signaling line circuit.
h. Intelligent Duct Smoke Detector
84
CSITMS Gujarat Project
Confidential
The smoke detector housing shall accommodate either an intelligent ionization
detector or an intelligent photoelectric detector, of that provides continuous
analog monitoring and alarm verification from the panel.
When sufficient smoke is sensed, an alarm signal is initiated at the FACP, and
appropriate action taken to change over air handling systems to help prevent the
rapid distribution of toxic smoke and fire gases throughout the areas served by
the duct system.
i. Addressable Dry Contact Monitor Module
Addressable monitor modules shall be provided to connect one supervised DC
zone of conventional alarm initiating devices (any N.O. dry contact device) to one
of the fire alarm control panel SLCs.
The DC zone shall be suitable for Style D or Style B operation. An LED shall be
provided that shall flash under normal conditions, indicating that the monitor
module is operational and in regular communication with the control panel.
For difficult to reach areas, the monitor module shall be available in a miniature
package and shall be no larger than 2-3/4 inch (70 mm) x 1-1/4 inch (31.7 mm) x
1/2 inch (12.7 mm). This version need not include Style D or an LED.
j. Two Wire Detector Monitor Module
Addressable monitor modules shall be provided to connect one supervised IDC
zone of conventional 2-wire smoke detectors or alarm initiating devices (any N.O.
dry contact device).
The DC zone may be wired for Class A or B (Style D or Style B) operation. An LED
shall be provided that shall flash under normal conditions, indicating that the
monitor module is operational and in regular communication with the control
panel.
k. Addressable Control Module
Addressable control modules shall be provided to supervise and control the
operation of one conventional NACs of compatible, 24 VDC powered, polarized
audio/visual notification appliances.
Audio/visual power shall be provided by a separate supervised power circuit
from the main fire alarm control panel or from a supervised UL listed remote
power supply.
85
CSITMS Gujarat Project
Confidential
The control module shall be suitable for pilot duty applications and rated for a
minimum of 0.6 amps at 30 VDC.
l. Addressable Relay Module
Addressable Relay Modules shall be available for HVAC control and other
building functions. The relay shall be form C and rated for a minimum of 2.0
Amps resistive or 1.0 Amps inductive. The relay coil shall be magnetically
latched to reduce wiring connection requirements, and to insure that 100% of
all auxiliary relay or NACs may be energized at the same time on the same pair
of wires.
m. Isolator Module
Isolator modules shall be provided to automatically isolate wire -to-wire short
circuits on an SLC Class A or Class B branch. The isolator module shall limit the
number of modules or detectors that may be rendered inoperative by a short
circuit fault on the SLC loop segment or branch. At least one isolator module
shall be provided for each floor or protected zone of the building.
If a wire-to-wire short occurs, the isolator module shall automatically opencircuit (disconnect) the SLC. When the short circuit condition is corrected, the
isolator module shall automatically reconnect the isolated section.
The isolator module shall not require address-setting, and its operations shall
be totally automatic. It shall not be necessary to replace or reset an isolator
module after its normal operation.
The isolator module shall provide a single LED that shall flash to indicate that
the isolator is operational and shall illuminate steadily to indicate that a short
circuit condition has been detected and isolated.
Batteries
The battery shall have sufficient capacity to power the fire alarm system for
not less than twenty-four hours plus 5 minutes of alarm upon a normal AC
power failure.
The batteries are to be completely maintenance free. No liquids are required.
Fluid level checks for refilling, spills, and leakage shall not be required.
If necessary to meet standby requirements, external battery and charger
86
CSITMS Gujarat Project
Confidential
systems may be used.
7.5
Internal CCTV system
All system and components shall have been thoroughly tested and proven in
actual use. All the cameras should be IP based Indoor dome / Box camera
(Whatever required) with a Network Video Recorder (NVR) or Server with storage
capacity of 30 days. The CCTV system for the CONTROL ROOM should be
ISOLATED and SEPRATE from the city CCTV network.
Specifications included in this section are inductive and considered as minimum;
components and software that shall be acquired at the time of implementing the
project shall be the latest versions available in the market.
Camera requirement:
The camera should be IP based Indoor Dome / Box with 2.8 ~ 12 mm verifocal
lens with minimum resolution of 1 Megapixel. Camera should carry all the
accessories and mounting equipments required to make it installed and live.
The camera should provide high picture quality through Digital signal Processing
and real color picture through ATW.
The camera should work with minimum illumination of 0.1 lux @ F1.2. 30 IRE,
AGC on condition.
The camera should be CE/FCC certified.
Vendor has to provide Server / Workstation with 22” LCD for monitoring purpose.
87
CSITMS Gujarat Project
Confidential
8.0 City wise Command and Control Centre
8.1
Workstation
Specifications
Form factor
Small form factor or Desktop or Tower
CPU
1 * 3rd gen Intel Core processor i7-3770, 3 GHz, 8 MB
cache, 1333 MHz memory, Quad-Core, HT, Turbo or
equivalent or higher
Chipset
Intel® Q77 Express or equivalent or higher
Memory
16GB(4x4GB) DDR3-1333MHz memory scalable up to
32 GB
Bays
1 internal 3.5" bay, and 1 shared with external 3.5"
bay. 1 external 5.25" bay.
Hard disk
2 * 1TB SATA 7200 rpm 3Gbps 3.5" HDD
Graphics
NVIDIA Quadro 600 1GB memory PCIe Graphics Card
or equivalent or higher with dual display port
Networking
Integrated Gigabit Ethernet Card with Management
capabilities WOL, PXE 2.1 and AMT 6.0
Ports
4 USB 2.0 or 3.0, optional IEEE 1394: 1 Front, 1 Rear
(rear via optional card, front port via 19-in-1 MCR), 1
audio out, and 1 microphone/ 2nd headphone.
Other
22” LCD monitor with 1280 x 1024 or greater display
resolution, Keyboard & optical scroll mouse
88
CSITMS Gujarat Project
Confidential
Bus Slots
1 PCI Express x16 Gen2 / Gen 3
1 PCIe Gen1/Gen2 slot x16 mechanical / x4 electrical
1 PCIe Gen1 slot x1 mechanical/x1 electrical
Optical drive
Internal DVD Writer
Industry Standard Compliance
ACPI 2.0b Compliant, PCI 2.2 Compliant, WOL
Support, Microsoft® Logo certifications, PXE Support,
USB 2.0 and 3.0 Compliant
Operating System
Windows7 64 bit OS or latest with media
8.2
USB Joystick
Basic Design
Device Support
Software Support
Switches and ports
Storage Temperature
Humidity
Compliance
Power Supply required
8.3
The joystick shall be USB with Hall Effect specifically
designed to provide the network video controlling with
responsive and accurate pan/tilt/zoom camera positioning
controls.
The device shall support the camera makes mentioned in the
RFP
Can be integrated seamlessly with any video surveillance
software platform recognizing joystick inputs via Microsoft's
DirectX.
Six programmable switches and USB Port
0° to 50°C
0 to 85%
RoHS Compliance
+5VDC
Server
Server
Redundant
Clustered
Servers
If one server fails, the second server must perform all the operation
automatically. (Minimum two server for each setup)
89
CSITMS Gujarat Project
Chassis
CPU
Motherboard
Memory
Memory
Protection
Bays
Hard disk drive
Controller
Networking
features
HBA
Ports
Bus Slots
Optical drive
Power Supply
Fans
Operating
System
Industry
Standard
Compliance
OS Support
Manageability
Features
Confidential
Rack Mountable
2 * Eight Core Intel Xeon processor E5 Series with minimum 2.0 GHz
(E5-2650) or better
Intel® C600 Series Chipset with Intel® E5-2600 Processor Family or
equivalent or better
64GB DDR3 Registered (RDIMM) memory 8 x 8GB @1600 MHz
scalable up to 384GB. RAM up gradation to 128GB should be
without replacing the existing RAM Modules supplied initially.
Advanced ECC (multi-bit error protection)/ Mirroring mode/
Lockstep mode
8 (scalable up to 16) Hot Plug 2.5" hard disk bays / 6 Hot Plug 3.5"
hard Disk Bays + CDROM/DVD Bay
3 X 600GB 15K SAS Hot plug 2.5" HDDs
SAS Raid Controller with RAID 0/1/1+0/0+1/5/5+0 with 1GB Flash
backed Write Cache (onboard or in a PCI Express slot).
4 Nos of Multifunction Gigabit Ethernet Ports with iSCSI feature.
Should support 10Gbps Ethernet ports with iSCSI feature in future.
1 No of Remote Management Ethernet Port
2 x single port 8Gbps HBAs
Total 5 USB v2.0 or v3.0 ports
Minimum 2 PCIe slots should be free after configuring all
requirement mentioned in this technical specifications
DVD/CD - RW combo drive
n + n Hot swappable Power Supplies for redundancy
Redundant Hot swappable Fans
Microsoft Windows latest server OS standard edition
ACPI 2.0b Compliant, PCIe 3.0 Compliant, PXE Support, WOL
Support, Microsoft® Logo certifications, USB 2.0 Compliant
Microsoft Windows Server, Red Hat Enterprise Linux (RHEL), SUSE
Linux Enterprise Server (SLES), Optional Oracle Enterprise Linux
(OEL), All leading virtualization hypervisor support like VMware,
Citrix Xen, Windows HyperV etc.
Dedicated Hardware Controller based Management
Should be able to manage systems through a web-browser
OEM to provide its own systems management software.
SMS or e-Mail alerts should be supported & provided
Pre-failure ALERTS for critical components like CPU, Memory, Hard
Disk, RPS & FAN before actual failure of component.
90
CSITMS Gujarat Project
Confidential
It should provide Secure Sockets Layer (SSL) 128 bit encryption and
Secure Shell (SSH) Version 2 and support VPN for secure access over
internet.
Should be able to generate a report on Inventory
Automatic check & update of hardware drivers & Bios Version
Control without any downtime
8.4
Video Wall (3 X 4)
Picture
Commercial Grade Direct Vide LCD
Diagonal Size
42"
Type
S-PVA(DID)
Resolution
1366*768
Pixel Pitch(mm)
0.7455(H) * 0.7455(V)
Active Display Area(mm)
1018.353(H) x 572.544(V)
Bezel Width
Maximum 6.7 mm between
two LCDs.
Brightness(Typ.)
450 cd/m2
Contrast Ratio
4500:1
Viewing Angle(H/V)
178/178
Response Time(G-to-G)
8ms
Display Colors
8 bit - 16.7M
Color Gamut
72%
Dynamic C/R
10000:1
H-Scanning Frequency
30kHz ~ 81kHz
V-Scanning Frequency
56Hz ~ 85Hz
Maximum Pixel Frequency
148.5MHz
Panel
Display
INPUT
Connectivity
OUTPUT
RGB
Analog D-SUB, DVI-D, Display Port
VIDEO
CVBS, HDMI1,HDMI2,
Component(D-sub 15pin)
AUDIO
RCA(L/R) , Stereo mini Jack
RGB
DVI-D(Loop-out)
VIDEO
N/A
AUDIO
Stereo mini Jack
Power Out
5V (for SBB)
91
CSITMS Gujarat Project
Confidential
EXTERNAL CONTROL
EXTERNAL SENSOR
Power
Type
Internal
Power Supply
AC 100 - 240 V~ (+/- 10 %), 50/60 Hz
Power
Consumption
On Mode
Sleep Mode
Off Mode
205W(max) / 195W(typ)
Set
1025.7 X 579.8 X 130.0
Package
1148.0 * 705.0 * 330.0
Set
19.3
Package
24.6
Dimension
(mm)
Weight (kg)
Mechanical
Spec
Operation
RS232C(in/out), RJ45
Stero mini jack(IR in/out),
mini USB (Ext. BR/IR sensor)
less than 2W
less than 1W
VESA Mount
600*400mm
Protection Glass
N/A
Stand Type
Foot Stand(optional)
Media Player Option Type
N/A
Bezel Width (mm)
Operating Temperature
4.3mm(U/L), 2.4mm(R/B)
0℃~ 40℃
Humidity
10~80%
Quick Setup Guide, Warranty Card,
Accessories
Included
Application CD, D-Sub cable,
Power Cord,
Remote Controller, Batteries
Video Wall Bracket
CONTROL SYSTEM
2-Series Ethernet Control system that features a built-in Web server and supports a
wide variety of control formats, including IR, Rs-232 and TCP/IP. Compact Control
System with Ethernet. Includes PW-2410RU Power Supply-with 8 Channel relay Module
with 8 On/Off Relay. Relay contractor with 8 power socket operation with control
system only
SWITCHER & INTERFACE
8 x 8 VGA with Audio Matrix Switcher
Matrix Switcher
Video
Routing
Video bandwidth
Switching speed
Video Inputs
8 x 8 matrix
350 MHz
Minimum 195 nseo input
8 VGA-UXGA RGBHV, RGBS, RGsB, RsGsBs, HDTV,
92
CSITMS Gujarat Project
Confidential
component video, S-video, composite video
VIDEO INPUT
Connectors
Impedance
Control
Matrix Switcher
1 x 15 Min HD female
75 Ohms
RS-232 control
8 x 8 Composite Video and Audio Matrix Switcher
Video
Routing
Video bandwidth
8 x 8 matrix switcher
150 MHz
VIDEO INPUT
Connectors
Control
Distribution Amp
Bandwidth
Video Input Nominal level
Connectors
Inputs connectors
Other connectors
1 x Female BNC connectors, audio on captive screw
RS-232 control
1 Input 2 Output VGA Distribution Amplifier
350 MHz
0.7 Vp-p for RGB
2 x 15 Pin HD female
1 x 15 Pin HD female
3.5 mm captive screw connector
Cables, Connectors & Patch Cords
RGBHV Cable
RG6/SHR Cable - Video Cable
Cables etc.
Two Conductor S-Video Cable - S-Video Cable
RS-232 Cable
Molded VGA patch cord to connect your Laptops/PCs
Various types of A/V connectors
Heat Shrink sleeves - various size and color (Lumpsum)
Rack 22U
8.5
Equipment rack Black Color Front and Rear Door
Perforated
Furniture
Typical Work station
93
CSITMS Gujarat Project
Confidential

Providing and fixing work surface as per drawing complete.

With 19 mm plywood laminated on top surface finished with white wood
beading Strip with melamine polish.

Front edge having 19mm ply Strip. Rate also includes wooden Strip for fixing
and cable manager and necessary hardware alongwith providing and fixing
Ebco make key board trey with mouse (350mm size) of metal.
Storage Unit (2.5' X 1.5')

Providing and fixing storage unit of 19mm thick BWR ecotach or kitply gold
ply only back side is having 6mm thick ply of same make, having drawer on
sliding ebco channel (telescopic).

The shutter of unit having auto hinges lock & "D" ss handle. Unit having ss
legs All inside surface having asian royral paint.

Rate includes 1/2" PVC floor buffer, melamine polish finish, locks, handles,
hardwares etc. complete.

All the beadings and all other inner surface will be polished in shade as
approved.
Manager's Chair (Medium Back) :

Medium back revolving chair with Synchro Mechanism, PP Base, fix crome
handle with PP pad, seat-pu mould, back with 40-45 density u-foam, Gas lift
mechanism with approved tapastry.

Base made from CRCA steel with 5 prolonged and fitted with twin wheel
castors. Size: 1070 mm (H) x 700 (D) x 600(W).
94
CSITMS Gujarat Project
Confidential
9.0 UPS and DG set
9.1
6 KVA UPS
PARAMETER
Capacity
Technology
SPECIFICATIONS
4200 Watts / 6000 VA
SPWM, IGBT/MOSFET (for more than 72 DC volt IGBT
preferred)
Input voltage
Input Voltage Range
Input Frequency Range
Input Over Voltage Protection
Input Under Voltage Protection
Over Voltage cut off
Output voltage
Frequency
Lead power factor
230V AC, Single Phase, 3 wire
176V AC to 282V AC
47 /63 Hz +/- 3 Hz (auto sensing)
280V AC
155V AC
Should be offered externally
230V AC Single phase ±1%
50 Hz ± 1%
0.7 Lag to Unity
Output Over Voltage
Protection
245V AC Single Phase
Output Under Voltage
Protection
Over load capacity
Total Harmonic Distortion
210V AC Single Phase
125% of rated load for 60 sec
Less than 3%
Short circuit protection
Soft Shut down should occur without blowing any fuse
Crest Factor
Over Temperature
Load on Battery
Battery on Charge
Battery low
Mains on
DC on
up to 2 : 1
Indication Required
Indication Required
Indication Required
Indication Required
Indication Required
Indication Required
95
CSITMS Gujarat Project
Inverter on
Inverter Tripped
1. Output Over Voltage.
2. Output Low
3. Over Load System
Confidential
Indication Required
Indication Required
Indication Required
Indication Required
Static Switch
Automatic Bi-directional should take care of 100%
uninterrupted transfer of load from UPS
Transfer Time
Overall Efficiency
Inverter Efficiency
Metering
DC Voltage
DC Current Charge/discharge
Output Voltage
Output Current
Input Voltage
<4 m sec
>85%
>90%
Separate/Single Digital Meter
Display Required
Display Required
Display Required
Display Required
Display Required
Digital three/three & half freq.
Meter (for Both input &
output)
Display Required
Battery
Maintenance-free sealed Lead-Acid battery with
suspended electrolyte : leak proof
Period of Backup
DC Bus Ripple
Total DC Bus Voltage
No. of Battery Banks
No. of Battery
1 Hr. with 100% Load
<1%
Vendor to specify
Single
Vendor to specify
VAH Rating
Vendor to specify
Battery Housing
Closed housing with lock
Audible Alarm for Following
Conditions
Battery Low
Mains Failure
Inverter Under-voltage
Audible alarm Required
Audible alarm Required
Audible alarm Required
96
CSITMS Gujarat Project
Confidential
Inverter Over Voltage
Over Temperature
Inverter Overload
SNMP
Environmental
Operating Temperature
Humidity
Audible alarm Required
Audible alarm Required
Audible alarm Required
Enabled
Noise Level
<50 dB at full Load from 1 Mtr distance
9.2
0 - 40 °C
0 - 95% (non-condensing)
DG set
a) DIESEL ENGINE:
Engine should be 6 cylinders, 4 stroke cycle, Water cooled developing desired
KVA at 1500 RPM under NTP conditions of BS: 5514. The engine shall be
provided with electrical starting arrangement & shall give the electrical output of
100 KVA / 80 KW or adequate capacity as per the laod at 0.8 power factor, 415 V
at the alternator terminal. (The preferred make for the diesel engine are
Cummins, Kirloskar, Volvo Penta, Caterpillar and Mitsubishi.)
Governing performance should be in accordance with class-A1 as per ISO-3046, BS-
5514.
Power output guaranteed within 0 to +2 % and can be operated up to 3130 Mt.
altitude and no de-rating for ambient temperature or humidity
Other accessories of the engine should be as under:
b) COOLING SYSTEM






Radiator cooled / HE cooled
Engine mounted Water pump
Thermostats
Corrosion Inhibitor
Self contained piping
Outboard after coolers
97
CSITMS Gujarat Project
Confidential
c) FUEL SYSTEM




PT fuel pump or EUI System
STC Injectors or EUI System
Fuel filters – Paper element type
Self contained piping
d) LUBRICATING SYSTEM






Oil pump
Strainer
Lub oil cooler-Plate type
Oil filter – Paper element type or Spin on Type
Bypass filter ( If required)
Self contained piping
e) AIR INTAKE SYSTEM




Dry type Paper Element filters
Air intake manifold with necessary connections
Turbo charged after cooled
Restriction Indicator
f) EXHAUST SYSTEM



Exhaust manifold
Stainless steel flexible connections suitably optimized to reduce noise.
Silencers (Residential)
g) GOVERNING SYSTEM

Electronic Digital Governor
h) STARTING SYSTEM



Starter, 24V, DC
Battery charging Alternator
With in-built Regulator
i) SAFETY SYSTEM (Engine Protection – Trip)

Low lub oil pressure
98
CSITMS Gujarat Project



Confidential
High water temperature
Over speed
Low Coolant oil level (alarm)
j) OTHER SYSTEM


Flywheel
Flywheel housing
k) POWER COMMAND GENSET CONTROLS
The Power Command Control should be a micro processor based generator set
monitoring, metering, protection and control system. It offers advanced levels of
functions for reliability and optimum Genset performance. An extensive array of
integrated standard control and digital display features eliminate the need for
discrete component devices such as the voltage regulator, governor control and
protective relays. The control system has easy servicing capabilities that allow
system parameters to be interrogated, monitored and adjusted with a PC.
Features:
 Digital Governing
 Digital voltage regulation
 Amp Sentry protection for true alternator O/C protection
 Analog/ bargraph/ digital AC output metering
 Battery monitoring system to sense and warn against a weak battery
condition
 Digital alarm and status message display
 Genset monitoring: displays status of all critical engine and generator set
functions
 Protection : Over Voltage , Under Voltage ,Over frequency, Under
frequency,
 Over current, reverse Power, Load Demand Relay.
 Smart starting control system: Integrated fuel ramping to limit black
smoke and frequency overshoot
 Advanced serviceability
l)
ALTERNATOR:
99
CSITMS Gujarat Project








m)
The A. C. Generator shall be 100 KVA or adequate capacity as per the load,
3 phase, 4 wire, 415 V, 0.8 P.F., 1500 RPM, 50 Hz, The preferred make of
the Generator is Stamford.
Salient pole, Brush-less & Revolving field type.
Synchronous, self-excited, self-regulated,
Self- ventilated, Screen Protected Drip Proof,
2/3rd Pitch Winding,
Enclosure: IP23,
Class of Insulation ‘H’
The A.C. Generator shall be Horizontal foot mounted single bearing type
and shall be fitted with Automatic Voltage Regulator (AVR) for Voltage
regulation of +/- 1% or better. The AVR shall be fitted inside the Alternator
terminal box and pre-wired. The A.C. Generator shall meets the
requirements as per IS4722/ BS5000.
MOUNTING:

n)
Confidential
The engine & A.C. Generator described above shall be flexibly coupled,
aligned and mounted on rigid M.S. Fabricated Base Frame.
PERIPHERALS:
The DG Set be equipped with all the required peripherals for the smooth
operation of the DG set, few of them are listed below:
Fuel Storage Day Tank Fabricated from MS Sheet Steel and shall be complete
with:




o)
Tube Type Level Indicator
Air vent
Drain Outlet with dead plug
Supply & Return Connection with isolation valves.
ACOUSTIC ENCLOSURE:
Acoustic Enclosure with other accessories should meet the detailed
specifications/ scope of supply as under:
100
CSITMS Gujarat Project
Confidential
The noise emission under free field condition shall be 75 dbA at 1mtr.
Distance.
The Acoustic Enclosure should generally comprise / incorporates following:













The Structure / Profile should be made out of export quality CRCA Sheet
Steel.
The roof, side-walls, integral partition and doors should be all sandwich
design made out of export quality CRCA sheet steel.
The Acoustic Enclosure should be natural cooled & maintain ∆ t (Temp.
difference with
Air ambient) of 5 - 7º Cent. If need arises articulated ventilation are also
considered.
The sound absorption material should be selected from either mineral
wool / non-igniting foam of relevant thickness and density to meet the
performance.
The enclosure construction should provide sufficient access for
maintenance work.
The Enclosure should be complete with:
Arrangement for Power Cable connection for supply to load
Suction Louvers
Discharge Louvers
Open able and lockable doors with Air tight neoprene rubber gasket.
Interior lighting arrangement - 1 No. Lamp with ON/OFF Switch on Control
Panel
Lifting arrangements
101
CSITMS Gujarat Project
Confidential
10.0 Firewall / UTM Specifications
Specification
General Requirements:
Should be rack mountable
Must be appliance based and should facilitate multi-application environment.
It should be modular based to accommodate future growth/ expansion
The Firewall should be ICSA Labs for ICSA 4.0 or equivalent certified
The platform should be based on real time, secure embedded operating system
The platform should use ASIC based architecture that is optimized for packet and
application level content processing
The proposed system shall support unlimited IP/User license for Firewall / VPN (IPSec &
SSL)/ IPS/WCF/AV
Should provide a Http, Https, SSH, Telnet, SNMP based management console for
managing and configuring various components of the appliance
Should be IPv6 Ready
Networking & System Performance Requirements:
Should support minimum of 8 no of Gigabit interfaces with 10/100/1000 auto sensing
capacity
Should support the standards based Link aggregation technology (IEEE 802.3ad) to
achieve higher bandwidth.
Should support IEEE 802.1q VLAN Tagging with about 1024 VLANs supported (in
NAT/Route mode)
Should support automatic ISP/link failover as well as ISP/link load sharing for outbound
traffic
Should support Dynamic Routing Protocol for RIP1 & 2, OSPF, OSPFv3, BGP4, ISIS, RIPng
etc.
Should support Static, Policy Based, and Multicast routing
Should support throughputs of 4.0 Gbps or better for both small & large packets
102
CSITMS Gujarat Project
Confidential
The firewall should support throughput of minimum 1 Gbps of AES - IPSEC VPN and
should support H/W acceleration
should support concurrent session minimum 4,00,000
Should support new session per second minimum 15,000
Should support IPS throughput of 600 Mbps or better
Should support GAV throughput of up to 200 Mbps
Should support Site to Site VPN Tunnels up to 1000
Operating System & Management Requirements:
Should prevent inheriting common OS vulnerabilities
Should reside on either on flash disk or hard disk
Allow multiple OS firmware image for booting options
Should be upgradeable via Web UI or TFTP or equivalent mechanism
Should support easy backup or restore via GUI and CLI to/from local PC, remote
centralized management or USB disk
Should support profile based login administration for gradual access control like only
Policy Configuration, Log Data Access etc.
Should be able to limit remote management access from certain trusted network or host
with corresponding administrator account
The proposed system should be able to facilitate administration audits by logging
detailed activities to event log for management & configuration updates
The administrator authentication shall be facilitated by local database, PKI & remote
services such as Radius, LDAP and TACAS+ with option of 2 Factor Authentication
The Firewall must be capable of clustering multiple firewalls together into a redundant
and highly available stateful configuration for creating HA.
Firewall Requirements:
Should support deploy modes like “Stealth Mode” or “Route Mode" or "Transparent
Mode” or "Proxy Mode"
Should support integrated Traffic Shaping / QoS functionality
Should support DHCP server & DHCP Agent functionality
Should support Stateful inspection with optional Policy based NAT (Static OR Dynamic)
Should support Inbound Port Forwarding with Load Balancing
Should support IPv6 ACL to implement security Policy for IPv6 traffic
103
CSITMS Gujarat Project
Confidential
All internet based applications should be supported for filtering like Telnet, FTP,SMTP,
HTTP, DNS, ICMP, DHCP, RPC,SNMP, BGP, IMAP, NFS etc
Should be able to inspect HTTP and FTP traffic when these are deployed using non
standard port( i.e when HTTP is not using standard port TCP/80)
High Availability Requirements:
Must support Active-Active and Active-Passive redundancy.
Must support stateful clustering of multiple active firewalls, and load balance the traffic
between them to share the load.
IPSEC VPN Requirements:
The IPSEC VPN and SSL VPN capability shall have ICSA or equivalent
Certification
The proposed system shall comply/support industry standards, L2TP, PPTP, IPSEC, and
SSL VPN with/without additional external solution, hardware or modules. All such
components should be supplied if required externally
Should support hardware VPN acceleration (inbuilt is preferred)
IPSEC (DES, 3DES, AES) encryption/decryption
SSL encryption/decryption
The system shall support the following IPSEC VPN capabilities:
Multi-zone VPN supports
IPSec, ESP security
Supports Aggressive and Dynamic mode
Hardware accelerated encryption using IPSEC, DES, 3DES, AES
Support perfect forward secrecy group 1 and group 2 configuration
MD5 or SHA1/2 authentication and data integrity.
Automatic IKE and Manual key exchange.
Supports NAT traversal
Supports Extended Authentication
Supports Hub and Spoke architecture
DDNS support
Should support IPSEC site-to-site VPN and remote user VPN in transparent mode
SSL VPN Requirements:
Should be integrated solution and should not be user based licensing for SSL VPN
Should support for TWO modes of SSL VPN
1. Web-only mode: for thin remote clients equipped with a web browser only and
support web application such as: HTTP/HTTPS PROXY, FTP, SMB/CIFS, SSH, VNC,
RDP
104
CSITMS Gujarat Project
Confidential
2. Tunnel mode : for remote computers that run a variety of client and server
applications
Network Intrusion Detection & Prevention System Requirements:
The IPS capability shall have ICSA or equivalent NIPS Certification
Should have a built-in Signature and Anomaly based IPS engine
Should be able to prevent DOS & DDOS attacks
Should support Signature based detection using real time updated database
Should support Anomaly based detection that is based on thresholds
Should allow administrators to create Custom IPS signatures
IPS Signatures should be able to update manually or via pull or push technology.
Configurable IPS filters to selectively implement signatures based on severity, target
(client/server), protocol, OS and Application types.
Supports automatic security updates directly over the internet without any dependency
of any intermediate device
Security check updates should not require reboot of the unit
Supports attack recognition inside IPv6 encapsulated packets
Supports user-defined signatures with Regular Expressions
Supports several prevention techniques including drop-packet, tcp-rst (Client, Server &
both) etc. List all prevention options
Antivirus System Requirements
Should be able to block, allow or monitor using AV signatures and file blocking based on
per firewall policy
The System should be able to scan Protocols like HTTP, HTTPS, SMTP, SMTPS, POP3,
POP3S, IMAP, IM, NNTP etc.
Should be able to allow, block and quarantine attachments or downloads according to
file extensions and/or file types
Should support updates of Signatures manually or via pull / push technology.
Should be able to quarantine blocked and infected files to either local hard disk or
externally.
Should be able to block or allow oversize file based on configurable thresholds for each
protocol types and per firewall policy.
Should be capable scanning Encrypted VPN tunnel traffic originating from the unit for
virus
Web & Application Content Filtering System Requirements:
Should have integrated Web Content Filtering solution
105
CSITMS Gujarat Project
Confidential
Should be able to enable or disable Web Filtering per firewall policy or based on firewall
authenticated user groups for both HTTP and HTTPS traffic.
Should blocks web plug-ins such as ActiveX, Java Applet, and Cookies
Should support Web Exempt List & blocking of Web URL, score based web keyword
Should be able to replace the web page when the web page matches the Web Filtering
blocking criteria.
Should be able to identify, retrieve and rate the actual URL of the cache content
commonly available in search engines such as Yahoo and Google
Should be able to identify, retrieve and rate the image/multimedia files from search
engines. If belongs to a blocked category, that content should be replaced by a blank.
Should allow administrators to create multiple new local URL filtering categories besides
dynamic categories
Should allow administrators to override Online URL Database ratings with local settings
Should have application control feature
Should have the intelligence to identify & control popular IM & P2P applications like
KaZaa, BitTorrent etc.
Should have database of minimum 500 types of application awareness
Data Leak Prevention Requirements
Should have the ability to prevent data loss through SMTP, FTP, HTTP, HTTPS & IM
Should have built in pattern database
106
CSITMS Gujarat Project
Confidential
11.0 Antivirus Specifications
Specifications
All the Solutions should be virtualization aware providing flexibility of deploying the
solution both in Virtualization and physical environment.
The antivirus solution should have enhanced protection from Network virus/Worms,
Trojans, Key loggers, Intrusions, Conceivably harmful websites/Phishing sites, Malicious
behavior, data loss, web based threats, root kits, mixed threats, real-time compressed
executable files, spyware/gray ware etc.
Should have Compressed File Detection and Repair and should also be able to reduce the
risk of virus/malware entering the network by blocking files with real-time compressed
executable files.
Should have Unknown Virus Detection & Repair. Should have behavioral & Heuristic
scanning to protect from unknown viruses.
Must be capable of cleaning viruses/malware even without the availability of virus
cleanup components. Using a detected file as basis, it should be able to determine if the
detected file has a corresponding process/service in memory and a registry entry, and
then remove them altogether
Must have the capability to detect and clean Virus and also perform different Scan
Actions based on the virus type (Trojan/ Worm, Joke, Hoax, Virus, other)
Should have buffer overflow protection integrated with AV scan engine for protection
from threats/exploits that uses buffer overflow vulnerability regardless of presence of
signature / OS patches
Should have cloud-client infrastructure with Reputation services like File Reputation,
Web Reputation & Email Reputation working in correlation.
Should have web based management console to give administrators transparent access
to all clients and servers on the network and also provide automatic deployment of
security policies, AV signatures, and software updates on every client and server.
Should support Active Directory integration and also have security compliance to
leverage Microsoft Active Directory services to determine the security status of the
computers in the network and also have logical group based on IP addresses (Subnets).
Establish separate configuration for internally versus externally located machines (Policy
action based on location awareness)
Should have Configurable Scanning. Should have the ability to control the amount of CPU
resources dedicated to a scan process.
107
CSITMS Gujarat Project
Confidential
Must have behavior monitoring to restrict system behavior and malicious changes in
applications, keeping security-related processes always up and running.
Should have device control to regulate the access to external storage devices and
network resources, as well as USB auto run prevention and also provide the granular
level access like No Access, Read Only, Read & write, Full Access etc.
Must provide the flexibility to create firewall rules to filter connections by IP address,
port number, or protocol, and then apply the rules to different groups of users
Must reduce network traffic generated when downloading the latest signature by
downloading only incremental updates of signatures and scan engine.
Reduces network bandwidth consumed during pattern updates. The bulk of pattern
definition updates only need to be delivered to the cloud or some kind of repository and
not to many endpoints
Should be able to update definitions & scan engine on the fly, without a need for reboot
or stopping of services on servers.
Must have the flexibility to roll back the Virus Pattern and Virus Scan Engine if required
via the web console
Should have the capability to assign a client the privilege to act as a update agent for the
update of rest of the agents in the network for AV signatures and hotfix/ service pack/
patch update/upgrade.
Should enable administrators to easily move clients (who have changed departments, for
example) from one physical parent server to another simply by dragging and dropping
through the central management console.
Should have role based administration with active directory integration to add the
custom role type and also use the predefined roles as per requirement.
Should have multiple client deployment options like Web install page, Remote
installation, MSI/EXE package installation, Login Script, Vulnerability Scanner etc.
Should have enhanced tamper protection that guards against unauthorized access and
attacks, protecting users from viruses that attempt to disable security measures.
Should support 32bit and 64bit operating systems
Should have Cache files for scans which can help up to 40% improvement to speed
performance.
Should have a feature of scan cache based on digital signatures or on-demand scan
cache.
It should recognize a missed event on a machine, which was switched off, and restart the
same when machine is turned on.
Should have feedback option so that if any threat (new/earlier) is found, then relevant
data can be automatically collected and transferred to the research team for further
108
CSITMS Gujarat Project
Confidential
analysis to be conducted, and consequently, advanced solutions can evolve and be
provided.
Should have enhanced tamper protection that guards against unauthorized access and
attacks, protecting users from viruses that attempt to disable security measures.
Must support plug-in modules designed to add new security features without having to
redeploy the entire solution, thereby reducing effort and time needed to deploy new
security capabilities to clients and servers across the network
Must have Plug-in solutions - Stateful Inspection Firewall/IPS with Virtual Patching, VDI,
Data Protection, Mac Protection, Mobile Protection without any additional installation
and should provide single console.
Solution should help identify the vulnerabilities and help them fix the same till the time
windows patches are tested in the staging environment and apply the same.
Solution should be able to Shields endpoints against unwanted network traffic with
multiple protection layers
Solution should be able to Blocks known and unknown vulnerability exploits before
patches are deployed
Solution should be able to Automatically adjusts security configuration based on the
location of an endpoint and removes / block the bad traffic from Business-Critical Traffic
Should Block attacks before they enter the endpoint’s application and execution layer
Solution should have application control filters to alert/
block specific traffic such as instant messaging and media streaming, etc..
Should have deep packet inspection to identify content that may harm the application
layer.
Solution should Provides protection before patches are
deployed using attack blocking and vulnerability shielding
Should Block all known exploits with attack-facing network inspection
Solution be able to Defend custom and legacy applications
using custom filters that block user-defined parameters
Solution mush reduce the deployment cycle by eliminating
the need to redeploy the entire solution
Solution should provide recommendation to the administrator by identifying the
vulnerability of the operating systems and the applications installed and also help
automate the process of enforcing the rules to patch / block this vulnerabilities.
Solution should have plug-in architecture for instant, live deployment to previously
installed antivirus clients, thus providing HIPS protection via single integrated
management console.
109
CSITMS Gujarat Project
Confidential
Should provide Data Loss Protection as an plug-in solution with the capability of data
protection with multichannel monitoring, robust rules, and predefined policy templates.
Data Protection must have File Attribute, Key words and Pattern based technology in
single solution.
Data Protection should work in both environment - Workgroup and AD with User/
Group/ Domain based policy creation option.
Solution should support Mobile Security Solution as a Plug in Module and should be
managed from same Anti Virus Server.
Virtual Desktop Support : Solution should support Virtual Desktop integrated in the single
antivirus console as a module for the following platforms:
· VMware vCenter™ 3.5 and 4 (VMware View™ 4)
· Citrix™ XenServer™5.5 and 5.6 (Citrix XenDesktop™ 4)
Mobile Security Specifications
Solution should protect the wide range of consumer-grade mobile devices, such as
iPhones, iPads, Android, and Blackberry devices.
Solution should be Centralized, Integrated, Scalable, with Single Console Management
for all managing Desktop, Laptops and Mobile devices using one console.
Solution should permit feature lock to disable camera, Bluetooth®, and SD card reader
Solution should provide multi cross-device policies for consistent application and
enforcement of security and management requirements
Solution should provide feature to define online and offline policies
Solution should provide anti-malware protection which has industry-leading, cloudbased threat intelligence which will help protect the devices with the latest threats.
Should be able to detects and block malicious applications and data files
Solution should be able to protect against malicious websites and malious content.
Should have features like Firewall / IDS which will help detect attacks on the device via
network applications, ports etc…
Solution should be able to monitor, block and logs the calls, sms, mms messages sent to
and from devices, based on the user policy.
110
CSITMS Gujarat Project
Confidential
Solution should provide seamless cross-platform security regardless of device factor:
▪▪ iOS (iPad and iPhone)
▪▪ Android™
▪▪ Windows®
▪▪ Symbian
▪▪ RIM Blackberry
(Note: Capabilities may vary by platform.)
Solution should provide Expanded mobile device management capabilities which will
help organizations to remotely provision and de-provision and secure both company and
employee-owned smart phones and tablets
Solution should provides critical visibility into devices and status, including encryption
and password configuration.
Solution should have features like Remote lock, remote wipe, and power-on-password
enforcement which will help organization to protect corporate data on smart phones
and tablets in case of loss or theft
Solution should provide device inventory and location tracking feature which will help
trace the device in case of theft or loss
Should provide Encryption providing organizations to comply with Encryption
requirement with multi-level encryption algorithm option:
• AES 128-bit
• AES 192-bit
• AES 256-bit
• AES+XTS
Should be able to integrate with Active Directory
Solution should have Web Reputation filters to protect your mobile device from unsafe
Web sites
Solution should have features like SMS Anti-spam which will ensure only genuine SMS
are received by the end-user
Should be capable to protect the end-users from WAP-Push Messages which are used to
deliver unwanted applications, content, system settings and even malware
Solution should be able to log all the details for e.g. virus/malware, firewall, SMS antispam logs, task logs, system logs etc….
Solution should have feature of remote device unlock feature from the central
management server which will help administrator if a user has forgotten the power-on
password.
111
CSITMS Gujarat Project
Confidential
Solution should have feature to send update settings to mobile devices which will help
mobile device to auto-check components, configuration and policy changes.
Solution should have mobile agent capable of doing real-time scan feature.
Should have feature to scan memory card when a memory cared is inserted in the
mobile device
Should have Scan Actions like remove the infected file, Quarantine the infected file, send
logs to the Mobile security server when connected
Should be able to scan compressed files like ZIP, CAB
Should have option to specify the number of compression layers to scan
Should have feature to enable or disable call filtering for mobile device, configure mobile
device to use allowed or block list, configure filtering list from the management console,
administrator should have control to allow, block , modify the list defined
Should have features enables you to control the applications that users can run on their
mobile devices.
LINUX PROTECTION
Solution should help maintain corporate antivirus policies that extend critical protection
to Linux servers.
Solution should offer comprehensive real-time protection for enterprise web-servers
and file-servers, preventing them from spreading malware to internal or external
endpoints.
Solution should be designed to protect Linux servers from inadvertently hosting viruses,
Trojan horses, bots, and other malware
The solution should be stable and reliable and should have certifications from all major
Linux vendors, including Redhat™, Novell™, IBM™, and Virus Bulletin.
Solution should have Central Management and should be able Seamlessly integrate with
single management console framework which enables central management of attack
information, policy deployment, pattern file and scan engine deployment, and reports
on policy implementation
Solution should be easy to install with an ability of web-based interface supports
multiple simultaneous remote installations as well as central update and configuration
that accelerate the rollout process on the broadest range of Linux distributions.
Solution should have Real-time, on-demand, and scheduled scanning uses the latest
multi-threaded scanning engine for highest performance and kernel-level scanning to
help minimize performance degradation.
112
CSITMS Gujarat Project
Confidential
Solution should prevent suspect files from reaching end users by notifying the
administrator. It should also block infected files from re-entering the system, defending
the network from possible re-infection.
Solution must ensure Linux servers comply with corporate antivirus policies.
Solution should support secure socket layer (SSL) protocol to maximize protection of
data transfer during remote management administration
Solution should enable antivirus policy enforcement and accelerates update deployment
through automatic updates of virus patterns and scan engines
Solution should allow administrators to create alert of virus or program events through
email notifications and SNMP traps
Solution should be powered by solution vendor’s global network of research centers
committed to constant threat surveillance and attack prevention. By continuously
monitoring the Internet and customer networks, solution vendor should have security
specialists develop both Internet and customer-specific threat intelligence. With
accurate, real-time data, solution vendor should deliver more effective, timely security
measures designed to detect, pre-empt, and eliminate attacks.
Solution should prevent Linux servers from spreading threats to other servers and
personal computers.
Solution should have facility of Remote Management through a Web Browser, which will
help configure the solution via a browser-based console. It should also allow you to
control the application from any location.
Solution should be compatible with a browser-based console like MicrosoftTM Internet
Explorer™, Mozilla™, or Mozilla
Firefox.
Solution should have Manual, Real-Time, and Scheduled Scanning options.
In addition to manual scanning option solution should act against viruses/malwares
automatically without user intervention. Whenever user access a file, Real-time Scan
should check that file for viruses/malwares (for example, when you copy or open a file).
Scheduled scanning should thoroughly scan Linux machine or the specified directories at
regular, user-specified intervals. Should provide an option to schedule scans after office
hours to avoid interfering with normal operations.
Real-time option should also detect viruses/malwares in Linux applications whenever an
application is executed.
Solution should back up infected files before the Real-time Scan, Manual Scan, or
Scheduled Scan features and perform the Clean action.
113
CSITMS Gujarat Project
Confidential
Solution should provide option to Manually and Automated Log Deletion.
Solution should provide option to perform manual or scheduled virus pattern and scan
engine file updates to ensure up-to-date virus protection. Solution should also give
option to specify your Internet-based update server.
Solution should provide an option to configure Simple Network Management Protocol
(SNMP) settings for email notifications about events, such as virus/malware outbreaks,
that occur on machines running vendor’s solution client.
In addition to providing a Web-based management console, solution should provide
command-line support for the following: real-time scans, scheduled scans, manual scans,
log deletions, and virus pattern/engine updates.
Solution should be with the latest technology of scanning the files, in addition to Scan All
or Scan by File Name Extension, the latest technology should optimize security by
examining file headers using true file type recognition, and scanning file types known to
potentially harbor malicious code.
Solution should have experts action defined for dealing with virus, worms, Trojans, etc….
Solution should have is a new method of selecting the action to take when a security risk
has been detected, also solution vendor should customize scan actions for different
types of security risks. New scan actions should be updated when you download
updates.
Central Management
Solution should have single console to Manage desktop AV , Servers , Mail and Web
Gateway software solution
Should be a Software Solution Integrated, centrally-managed security framework—for a
unified defense
Simplifies administration with automated update deployment and license renewal
Provides single sign-on, eliminating the need to logon to each product
Consolidates data for a master view of Central Manager servers throughout the
network
Simplifies administration with a web based console and integrated agent
should have capability for consolidating updates and global alerts
Should have Intelligence with customizable, flexible reports for easy interpretation
Expands visibility into individual clients, reducing desk-side visits
Software should Ensures only authorized personnel make critical changes to the
security environment
Assigns specific privileges based on predefined administrative roles
Allows user-defined customizable administrative roles
114
CSITMS Gujarat Project
Confidential
Supports visibility into clients so central IT can remotely monitor and manage client
security
Should have capability to implement Parent-->Child Architecture
Solution should support Role based administration
Should have capability to control the Outbreak scenario such as applying/ removing
policy related to outbreak as when required.
Should have capability to provide critical alerts during virus outbreak, action taken on
infections, suspicious vulnerability detection
Should be able to produce the reports on scheduled and one-time basis and shall also
be able to automatically deliver reports via email to designated users
Reports shall support the following formats: PDF, RTF, ActiveX, Crystal Reports
Should have Report Templates minimum as per below:
Virus & Spyware/Grayware Detection Reports
Antivirus Client Information Reports
Antivirus Product Registration Report (Registration Status)
Comparative Reports
Antivirus Server Deployment Reports
Virus Damage Cleanup Services Reports
Top 10 Virus and Infected Files Detection Report
All Entities Virus Infection List
Top 10 Infected Email Sender Report
Daily Virus Count
Top 10 Virus & Security Violation Report
Virus Infection Channel vs.Product
Web Security Violations Report
Desktop Antivirus Protection Summary
Filter Events by Frequency Report
Filter Events by Policy Report
Spam Summary for Recipients Report
Spam Summary for Domains
Outdated Antivirus Client
Consolidated Report
115
CSITMS Gujarat Project
Confidential
12.0 NMS Specifications
Network Discovery
GUI based system (Web based & Windows Based)
Auto - discovery on Physical and logical basis
Discovery of network elements should be on per device basis and automatically group by
vendor
Should support the discovery of devices from Layer -2 to Layer -3 devices
Captures logical connectivity information including virtual private network (VPN), virtual
local area network (VLAN)
built-in wireless monitoring should supports both autonomous access points and
controller-based technology
Fault Management
Support comprehensive fault management for all the network devices
Should give event details & track root cause by launching fault summary
Quickly identify the source of network faults and speed problem resolution with realtime root-cause analysis
Support diagnostic function for multicast & unicast
Monitor & troubleshoot problems at the protocol
Performance Management
System should give real time utilization and performance matrix
Give the facility to track the performance matrix subnet basis, VLAN basis and protocol
basis
Support wireless LAN Management
Support specific protocol level performance characteristics
Delivers highly accurate, real-time information on network connectivity, availability,
performance, usage, and inventory
Define parent and child dependencies so that a child object will appear ‘unreachable’
instead of ‘down’ if the parent is down
Prevent a network outage from sending redundant alerts by recognizing the critical
parent device outage
Monitors, tracks the up/down status, and analyzes real-time, in-depth, network
performance statistics for routers, switches, wireless access points, servers, and any
other SNMP-enabled device.
Device-by-device drill down and detailed system information on network devices,
servers, virtual machines, or virtual or Fibre Channel switches.
116
CSITMS Gujarat Project
Confidential
Security Management
Support network Integrity and security with a user based network security model via full
SNMP V-3 support
Authentication & privacy keys on per user basis
Multiple users on per IP address basis
Inventory Management
Should support inventory management on per device basis
Module level inventory management support
Should be able handle Alert/Event management
Should be able to monitor the server system usage
Should support workflows for improved setup and troubleshooting
Should offer centralized change -audit logging, graphical device management
Should provide network response and availability information for WAN networks
Should support Portal technology which allows the user to customize views into the
network management application functionality or chose from one of the three default
views provided
Should support a wide collection of switch-and-router analysis tools is accessible from a
single location; third -party applications can link to the tools centre
Traffic Analyzer
Comprehensive, customizable view of network traffic on a single page.
Drill down into any element’s traffic using multiple views
Create and access personalized network traffic views by filtering NetFlow, J-Flow, sFlow®,
IPFIX, and CBQoS data based on specific parameters, such as date or location
Advanced Application Mapping- Monitor network traffic from multi-port applications,
Gain insight into top application hogs by organizing traffic coming from common
applications such as Apple® QuickTime, Oracle® databases, and telnet
traffic analysis on turbo boost by focusing on top talker bandwidth usage
Delivers an instant alert notification, including a list of “top talkers”, when an interface
exceeds its utilization threshold
View network traffic segmented by Class of Service methods, measure effectiveness of
your CBQoS policies, and quantify bandwidth consumption by class map
Analyze network traffic with custom overlapping IP address groups
Analyze NetFlow, J-Flow, sFlow, and IPFIX data on devices from Cisco Systems®, Extreme
Networks®, HP®, Juniper®, Nortel Networks®, and other leading vendors
Create in-depth network traffic reports with a few clicks or schedule automatic weekly
delivery
117
CSITMS Gujarat Project
Confidential
13.0 Multifunctional Printer
Printing Technology:
Laser Monocrom
Format:
A4
Printing Speed:
A4 / Letter – minimum 40 ppm
Printing Resolution (dpi): 600 x 600 dpi (1200 x 1200dpi equivalent)
First Page (sec):
A4 / Letter - 8.6 sec
Memory (MB):
Minimum 512MB
Paper Feeding:
600 (Standard – 500 + Multipurpose Tray – 100)
Interface:
USB 2.0
Network:
10Base-T / 100Base-TX / 1000Base-T
Duplex:
Standard (only A4 / LTR / LGL / 8.5"×13")
Size (W x D x H mm):
454 x 424 x 345 mm
Power Printing (W):
Approx 660 W
Others:
5 Line LCD Operation Panel
Power Stand-by (W):
15 W
Noise Level
54.5 dB or less
Maxim Volume (page):
100000 pages
118
CSITMS Gujarat Project
Annexure – I
Confidential
Approved Make
Product
Approved Makes
Fixed IP Outdoor Camera
Sony, Axis, Bosch, Pelco, Infinova
IP PTZ Camera
Sony, Axis, Bosch, Pelco, Infinova
Outdoor IP 55 enclosure with Air
conditioner / Outdoor Cooling Unit
Network Switch
Rittal, WQ
Cisco, Juniper, HP-3com, Avaya-Nortel,
Brocade
Bandwidth
Tata, Reliance, BSNL, Airtel, Tulip, Sify
Storage
HP, IBM, Dell, EMC, Net App, Hitachi
Video Management Software
Milestone, DVTel, Nice
Automatic Number Plate Recognition
System, Challaning System
Kritikal, Eng Techno
Red Light Violation Detection System
Kritikal, Eng Techno
Manual Challan
Kritikal, Eng Techno
Air Conditioner
Voltas, Blue star, Hitachi, Daikin, o’general
UPS
APC, Emerson, EATON
DG Set
Kirloskar, Cummins, Volvo penta
Access Control System
Honeywell, Siemens
Fire detection and Suppression
Honeywell, Siemens, Notifier
Internal CCTV system for Datacenter
Sony, Axis, Bosch, Pelco, Infinova
Server / Workstation
HP, Dell, IBM
USB Joystick
Sony, Axis, Bosch, Pelco, Infinova or
Equivalent make
Video Wall
Samsung , Planar, Sharp, Barco, Sony, Delta
Furniture
Godrej, Featherlite, Wipro
119
CSITMS Gujarat Project
Confidential
Firewall / UTM
Checkpoint, Juniper, Fortinet
Antivirus
Mcafee, Symantec, Trend Micro
Network Management Software
HP, IBM, Solarwind, CA, Manage Engine
Multifunctional Printer
HP, Canon, Samsung
120
Was this manual useful for you? yes no
Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Download PDF

advertisement