SE5850 A&E Specs

SE 5850
Security Management System
DOS-Based Host Software
A/E Guideform Specification
Version 1.0
NOTES:
•
The following A/E Guideform Specification conforms to CSI guidelines to provide Specifiers an easy way to
include Westinghouse Security Electronics products in their specifications.
•
The specifier should carefully select the portions of this document that fit the intended application.
•
Feel free to consult with your Westinghouse Security Electronics systems integrator regarding your
particular application.
•
Optional feature choices are represented by items enclosed in brackets [ ].
•
This document is considered accurate through the date on the cover. For updated specifications, call
Westinghouse Security Electronics at 408 727-6521, or visit the WSE Web page at
HTTP://WWW.WSEinfo.com .
•
The following individuals and organizations contributed to this document:
Editor/project team leader:
- Brent A. Duncan, Marketing Publications Specialist
Core team members:
- Joe Bridgman, Area Sales Manager
- Brian Giampaoli, Area Sales Manager
- Joe Oesterle, US Sales Manager
With contributions by:
- Frank Binzoni, VP Sales & Marketing
- Ken Butte, Project Manager/Readers and Cards
- Bill Blasdell, VP Engineering
- James Collins, Senior Design Engineer
- Dana Frischer, Area Sales Manager
- Susan Goldin, Technical Writer
- Tim Hillbun, System Test & Evaluation Manager
- Peter Keep, Marketing Services Manager
- Steve Lever, Field Service Engineer
- Troy Mickle, Marketing Communications Specialist
- Jim Reeve, Software Engineer
- Alec Ratliff, Field Service Engineer
- Bill Richardson, Technical Instructor
- Ping Saye, Design Enginerring Manager
- Tony Smith, Software Engineer
- George Souza, Project Team Director
- Rick Sparks, Project Manager/Controllers
- Matt Wenzel, Field Service Manager
With special thanks to:
- John Suhr, Engineering Director, Tomasi-Dubois & Assoc. Sec. Consultants
- Construction Services Institute
WSE • 3/21/97
16720 — ii
SE 5850 Host Software
Table of Contents
PART I GENERAL ................................................................................................................................................................1
.1 INTRODUCTION ............................................................................................................................................... 1
A. This document describes the required Electronic Card Access and Security
Management Host Management Software (Host Software or SE 5850). ........................... 1
B. This specification provides all information necessary to produce a complete
proposal for a sophisticated, easy-to-use DOS-based electronic Host Software
system. The appendixes contain hardware specifications necessary to select
the proper equipment for an installation. ............................................................................. 1
.2 GENERAL DESCRIPTION ................................................................................................................................1
A. Host Software: Required Host Software shall: ..............................................................................1
1. Be powerful and multi-functional with the ability to expand as project
needs grow. ................................................................................................................. 1
2. Be simple and economical enough to support a single site, yet powerful
enough to manage a multi-site network. ............................................................... 1
3. Allow for future Software features to be added as management recognizes
requirements. ............................................................................................................. 1
4. Allow the operation of a Co-Session second terminal as an alternative
Software operation or monitoring station. ............................................................. 1
5. Host Software shall be designed to control Westinghouse Security
Electronics’ third and fourth-generation security architecture, and
will fully support all of the following Controllers: ALTO 818 Series,
SE 422 Series and NexSentry 4100 Series................................................................ 1
B. Host Computer Hardware: ............................................................................................................. 1
1. [SE 5850 Host Software shall be bundled with a powerful Hewlett Packard
XM3 computer that is configured to give Host Software optimum
performance.] or......................................................................................................... 1
2. [SE 5850 Host Software shall be a software-only package for use with a
DOS-based IBM compatible computer with a Pentium processor.] ................... 1
3. See PART II.4.A for recommended hardware platform. ................................................. 1
.3 DESCRIPTION OF WORK ................................................................................................................................1
A. Installation: Installing the Security Management Software and bringing it to
operational status requires the following major steps: ......................................................1
1. Determine operational requirements and plan Software to implement
them. ............................................................................................................................1
2. Install Controllers and related hardware.......................................................................... 1
3. Configure Controllers and 5850 to communicate with one another. ........................... 1
4. Enter security system database. ......................................................................................... 1
5. Test security system communications and operation including “COSessions” second terminal as required...................................................................1
6. Train operators. ....................................................................................................................1
7. See section 2.03 for an expansion of this work summary.............................................. 1
.4 SUBMITTALS..................................................................................................................................................... 1
A. Block Diagram: Submittals shall include a block diagram detailing all connected
devices. This document shall be adequate to ensure that all parties involved
can determine that the recommended Software meets security system
requirements. ............................................................................................................................1
.5 QUALITY ASSURANCE..................................................................................................................................... 1
A. Computer workstation: If Software Host is bundled with a Hewlett-Packard PC
workstation or approved alternative, hardware shall meet UL and FCC
requirements for class A computing devices. ......................................................................1
B. Manufacturer: Manufacturer of products defined in this section must have: ......................... 2
1. Industry experience: Company must have at least 20 years experience in
manufacturing and servicing access management systems................................ 2
2. ISO 9001 Certification: Manufacturing process of company must meet
stringent standards of ISO 9001 Certification.........................................................2
.6 WARRANTY ....................................................................................................................................................... 2
A. Computer workstation: The Host Computer hardware shall be warranted for at
least 15 months from the date of shipment from the factory. The
manufacturer shall support hardware repair for the system computer
hardware through Hewlett-Packard’s worldwide service organization...........................2
B. Software: The manufacturer shall directly support software for the selected system
product family. ..........................................................................................................................2
WSE • 3/21/97
16720 — iii
SE 58 50 Host Software
C. Extended warranty: Extended warranty terms at reasonable rates shall be
available from the installing dealer. ......................................................................................2
D. System integrator: The system integrator shall be the focal point of all service
problems or questions (with manufacturer’s full support). ...............................................2
PART II PRODUCTS ............................................................................................................................................................2
.1 MANUFACTURER .............................................................................................................................................2
A. Westinghouse Security Electronics 5452 Betsy Ross Drive Santa Clara, CA 950541102 Telephone: 408 727-5170 Fax: 408 727-6707 ................................................................2
B. Approve equal .....................................................................................................................................2
.2 MANUFACTURED UNITS ................................................................................................................................2
A. The Access Management System shall consist of the following components: .........................2
1. Host hardware: IBM compatible PC with Pentium processor running DOS
system 3 or later and SE 5850 Host Software. ........................................................2
2. CI-1 & CI-8 Multiplexer Remote Interface to Westinghouse Security
Adapters: Westinghouse Security Electronics Controller. ..................................2
3. Printer: Parallel printer or serial printer. .........................................................................2
4. Access Control/Alarm Monitoring: [Alto 818 Series Controller.] [SE 422
Series.] [NexSentry 4100 Series Controller.] ...........................................................2
.3 EQUIPMENT ......................................................................................................................................................2
A. SE 5850 Architecture: .......................................................................................................................2
1. Host Computer: ...................................................................................................................2
2. CI-1 or CI-8 Multiplexer Adapter: The system may require one or more
CI-1 or CI-8 multiplexers to allow the integration of up to 32 remote
distributed intelligence Westinghouse Security Electronics
Controllers into a multi-location network. ............................................................2
3. Communication interface: The SE 5850 shall connect to the Controller via
the CI-1 or CI-8 through one of the following interfaces: RS232,
RS485, or 20 mA (Controller dependent). ...............................................................3
B. Software Platform: ............................................................................................................................3
1. Operating System: MS-DOS...............................................................................................3
2. Networking: Large scale or multi-location systems with security devices
or computers distributed to remote locations while overall control of
the network is maintained at a central location. ...................................................3
C. Operator interface/operations: The required system shall fulfill the following
requirements for operator monitoring and command functions: .....................................3
1. Sophisticated operator interface: The required Software shall provide a
sophisticated, easy-to-operate interface for security operators.
Multiple aspects of the system shall contribute to the effectiveness of
the operator interface: ...............................................................................................3
2. System Password Protection/Control:............................................................................3
3. Real-time alarm reporting and display: .........................................................................3
4. Real-time Status Reports: System status reports shall be available by: .....................3
5. Override Command Capability: The system shall provide the operator
the ability, based on password authorization, to override pre-set
conditions. The overrides shall include: ................................................................3
6. High Resolution Color graphics at operator console: .................................................4
7. Powerful Security System Diagnostic Software: feature shall provide
operators with the ability to examine the status of the system
components and communications. These capabilities are particularly
useful for diagnosing suspected problems, including: .........................................4
8. Audit Trail of all Operator Activity: ................................................................................4
D. System Management: The required system shall perform all of the following
functions: ...................................................................................................................................4
1. Simple System Administration: .......................................................................................4
2. Security System Hardware Definition: ...........................................................................5
3. Define Security System Software:....................................................................................5
4. Maximum Database Capabilities: Maximum storage capabilities are
limited by the application. ........................................................................................5
5. Database Download to Distributed Local Controllers: ..............................................5
6. Powerful and Meaningful Reports: .................................................................................5
7. On-line Storage of Security Events: When the database approaches a
selected percentage of its limit, the system shall issue an alert to
inform the operator(s) of the condition and to recommend that the
operator perform an archive to floppy disk. ..........................................................6
8. Archiving of Security Events: ...........................................................................................6
9. Backup and Restoration of Security System definitions:...........................................6
WSE • 3/21/97
16720 — iv
SE 5850 Host Software
E. Access Control Operation: ..............................................................................................................6
1. Common Requirements: ................................................................................................... 6
2. Distributed Processing: ..................................................................................................... 7
F. Alarm Monitoring Operation: ........................................................................................................7
1. When utilizing Westinghouse Security Electronics Controllers, the host
computer shall monitor the alarm points in two states: secure or
alarm. An end-of line resistance shall indicate the point is secure.................... 7
2. Configurable Alarm Instructions: ................................................................................... 7
3. Operator Alarm Response: ................................................................................................8
4. Recall Alarm Activity: ........................................................................................................8
5. Monitor Point Status Display: ..........................................................................................8
6. Shunting/Unshunting Alarms and Alarm Points: The system shall
provide the capability to shunt or unshunt alarm points via the
following methods: ....................................................................................................8
.4 COMPONENT DEFINITION............................................................................................................................. 8
A. Recommended hardware platform: SE 5850 is available as a software-only option
or it can be packaged with a Hewlett Packard XM3 PC with the following
specifications. A comparable IBM Compatible PC is acceptable: ......................................8
1. Manufacturer/Model: Hewlett-Packard XM3 PC, or comparable IBM
Compatible PC. ........................................................................................................... 8
2. Microprocessor: Pentium, 50 Mhz, 32-bit. ........................................................................8
3. Monitor: 256 Color, Super Video Graphics Adapter (SVGA); 110/220 VAC
selectable, UL listed. ..................................................................................................8
4. Input media: 1.44 MB diskette drive. ................................................................................. 8
5. Mass Storage: 40 MB hard disk, or greater. ......................................................................8
6. I/O Ports: 1 parallel port, 3 serial ports.............................................................................. 8
7. Keyboard: 101 enhanced keyboard (QWERTY). Foreign language keyboard
options available. ....................................................................................................... 8
8. Communications: RS-232, 3 (three) ports. ........................................................................8
9. Approvals: UL, FCC. ............................................................................................................. 8
10. Made in USA. ....................................................................................................................... 8
.5 ACCESSORIES:................................................................................................................................................... 8
A. Printer: Parallel printer or serial printer........................................................................................ 8
B. Communication Modems: ..............................................................................................................8
1. Direct Connection: ............................................................................................................... 8
2. Conversion devices from 20 mA to RS-232: ..................................................................... 8
3. Power Management: ............................................................................................................9
PART III EXECUTION ......................................................................................................................................................... 9
.1 FIELD QUALITY CONTROL:........................................................................................................................... 9
A. Tests: ................................................................................................................................................... 9
1. A system integrator shall supply a proposed acceptance test procedure. ....................9
2. Testing the system shall be the sole responsibility of the system integrator. ............. 9
3. Communications tests: Controllers to central terminal, local controller, or
remote local controller. ............................................................................................. 9
B. Inspection: ......................................................................................................................................... 9
1. The selected system integrator shall provide, on the job site, a factorytrained technician to assist, advise, or manage installing personnel. ............... 9
2. The manufacturer shall also supply on-site inspection. ................................................9
3. All final connections shall be made under the direct supervision of the
system integrator. ......................................................................................................9
C. Field Service: ..................................................................................................................................... 9
1. A system integrator authorized by the manufacturer shall provide support
for the selected system. ............................................................................................. 9
2. System integrator must be supported by large service-oriented
manufacturers for the system hardware and software. ....................................... 9
3. The system integrator shall determine and report all problems to the
manufacturers’ customer service departments. ....................................................9
4. Support must be available to the integrator via phone inquiries or on-site
visits if conditions require and are approved by the manufacturer’s
customer service manager. ......................................................................................9
5. If purchased, the manufacturer shall provide reliable field service support
for the computer hardware utilizing Hewlett-Packard service. ..........................9
6. The manufacturer shall also participate directly in on-site commissioning
of new systems with integrator cooperation.......................................................... 9
WSE • 3/21/97
16720 — v
SE 58 50 Host Software
7. HP field service is available in a variety of forms for the customer. A
system manufacturer that determines a hardware problem is
occurring will contact HP to assist the integrator and customer to
resolve the problem. ..................................................................................................9
.2 SCHEDULES ......................................................................................................................................................9
A. System Integrator Assisted Preparation: .....................................................................................9
1. Data Requirements. ..............................................................................................................9
2. Operators & privileges. ........................................................................................................9
3. Access Hardware...................................................................................................................9
4. Sensors. ..................................................................................................................................9
5. Monitor Points. .....................................................................................................................9
6. Keyholders.............................................................................................................................9
7. Keyholders security codes...................................................................................................9
8. Maps. ......................................................................................................................................9
9. Prepare room for system installation. ...............................................................................9
10. Receive equipment. ............................................................................................................9
B. System Installation:........................................................................................................................10
1. Install security management hardware. .........................................................................10
2. System Integrator and manufacturer (when ordered) on-site
commissioning. ........................................................................................................10
3. Initial startup and verification. .........................................................................................10
4. Data entry. ...........................................................................................................................10
5. Data entry listing & verification. ......................................................................................10
C. Verify Installation: ..........................................................................................................................10
1. Connect access control hardware to Security Management System. ..........................10
2. Download data and verify correct operation. .................................................................10
3. Testing total access and management system. ..............................................................10
4. Sample Reports. ..................................................................................................................10
5. Daily Operation and Monitoring. .....................................................................................10
6. Dealer deliver “as built” drawings...................................................................................10
WSE • 3/21/97
16720 — vi
SE 5850 Host Software
SE 5850 Security Management Host Software
Database Capacities Summary
•
Summary:
•
Cardholders:
•
Key Groups:
250
•
Access Codes
250
•
Operator Passwords:
100
•
Operator instructions:
500
•
Time Periods (64 or 128
max./Controller2):
•
Time Groups:
•
Holidays:
•
Floor Plan Maps:
•
On-line Transaction Storage:
•
Off-line Transaction Storage:
•
Controllers:
•
Card Readers:
•
Monitor Points:
•
Monitor Groups:
•
Door Groups:
•
Reports (15 or 32 max. per
Controller4):
1
2
3
4
SE 5850 is DOS-based single-user, multisite capable access management host
software package designed to manage
access and security solutions for small to
medium-sized applications.
50,0001
1,000
250
50
100
1,000,000 minimum3
Unlimited
2, 8, 16, or 32
256 maximum
1,024 maximum
100
50
100
Limited by indivual Controller quantities.
See Guideform Specification for individual Controller.
Depends on hard drive space available.
See Guideform Specification for individual Controller.
vii
PART I
.1
.2
INTRODUCTION
A.
This document describes the required Electronic Card Access and Security Management Host
Management Software (Host Software or SE 5850).
B.
This specification provides all information necessary to produce a complete proposal for a
sophisticated, easy-to-use DOS-based electronic Host Software system. The appendixes contain
hardware specifications necessary to select the proper equipment for an installation.
GENERAL DESCRIPTION
A.
B.
.3
1.
Be powerful and multi-functional with the ability to expand as project needs grow.
2.
Be simple and economical enough to support a single site, yet powerful enough to manage a
multi-site network.
3.
Allow for future Software features to be added as management recognizes requirements.
4.
Allow the operation of a Co-Session second terminal as an alternative Software operation or
monitoring station.
5.
Host Software shall be designed to control Westinghouse Security Electronics’ third and fourthgeneration security architecture, and will fully support all of the following Controllers: ALTO 818
Series, SE 422 Series and NexSentry 4100 Series.
Host Computer Hardware:
1.
[SE 5850 Host Software shall be bundled with a powerful Hewlett Packard XM3 computer that is
configured to give Host Software optimum performance.] or
2.
[SE 5850 Host Software shall be a software-only package for use with a DOS-based IBM
compatible computer with a Pentium processor.]
3.
See PART II.4.A for recommended hardware platform.
Installation: Installing the Security Management Software and bringing it to operational status
requires the following major steps:
1.
Determine operational requirements and plan Software to implement them.
2.
Install Controllers and related hardware.
3.
Configure Controllers and 5850 to communicate with one another.
4.
Enter security system database.
5.
Test security system communications and operation including “CO-Sessions” second terminal as
required.
6.
Train operators.
7.
See section 2.03 for an expansion of this work summary.
SUBMITTALS
A.
.5
Host Software: Required Host Software shall:
DESCRIPTION OF WORK
A.
.4
GENERAL
Block Diagram: Submittals shall include a block diagram detailing all connected devices. This
document shall be adequate to ensure that all parties involved can determine that the recommended
Software meets security system requirements.
QUALITY ASSURANCE
A.
Computer workstation: If Software Host is bundled with a Hewlett-Packard PC workstation or
approved alternative, hardware shall meet UL and FCC requirements for class A computing devices.
WSE • 3/21/97
16720 — 1
SE 5850 Host Software
B.
.6
Manufacturer: Manufacturer of products defined in this section must have:
1.
Industry experience: Company must have at least 20 years experience in manufacturing and
servicing access management systems.
2.
ISO 9001 Certification: Manufacturing process of company must meet stringent standards of ISO
9001 Certification.
WARRANTY
A.
Computer workstation: The Host Computer hardware shall be warranted for at least 15 months from
the date of shipment from the factory. The manufacturer shall support hardware repair for the system
computer hardware through Hewlett-Packard’s worldwide service organization.
B.
Software: The manufacturer shall directly support software for the selected system product family.
C.
Extended warranty: Extended warranty terms at reasonable rates shall be available from the
installing dealer.
D. System integrator: The system integrator shall be the focal point of all service problems or questions
(with manufacturer’s full support).
PART II
.1
.2
MANUFACTURER
A.
Westinghouse Security Electronics
5452 Betsy Ross Drive
Santa Clara, CA 95054-1102
Telephone: 408 727-5170
Fax: 408 727-6707
B.
Approve equal
MANUFACTURED UNITS
A.
.3
PRODUCTS
The Access Management System shall consist of the following components:
1.
Host hardware: IBM compatible PC with Pentium processor running DOS system 3 or later and
SE 5850 Host Software.
2.
CI-1 & CI-8 Multiplexer Remote Interface to Westinghouse Security Adapters: Westinghouse
Security Electronics Controller.
3.
Printer: Parallel printer or serial printer.
4.
Access Control/Alarm Monitoring: [Alto 818 Series Controller.] [SE 422 Series.] [NexSentry 4100
Series Controller.]
EQUIPMENT
A.
SE 5850 Architecture:
1.
2.
Host Computer:
a.
The host computer shall be the nucleus of the required system. It shall provide all necessary
capabilities for one operator to manage access and alarm activity. Specifically, the host
computer shall be the single computer that supports all the functions of Access Control and
Alarm Monitoring, including file management, reporting, and real-time monitoring/control of
security hardware devices.
b.
The Host Computer shall support a “Co-Sessions” second terminal for alternate station
operation and monitoring.
CI-1 or CI-8 Multiplexer Adapter: The system may require one or more CI-1 or CI-8 multiplexers
to allow the integration of up to 32 remote distributed intelligence Westinghouse Security
Electronics Controllers into a multi-location network.
WSE • 3/21/97
16720 — 2
SE 5850 Host Software
3.
B.
C.
Communication interface: The SE 5850 shall connect to the Controller via the CI-1 or CI-8
through one of the following interfaces: RS232, RS485, or 20 mA (Controller dependent).
Software Platform:
1.
Operating System: MS-DOS.
2.
Networking: Large scale or multi-location systems with security devices or computers
distributed to remote locations while overall control of the network is maintained at a central
location.
Operator interface/operations: The required system shall fulfill the following requirements for
operator monitoring and command functions:
1.
2.
3.
Sophisticated operator interface: The required Software shall provide a sophisticated, easy-tooperate interface for security operators. Multiple aspects of the system shall contribute to the
effectiveness of the operator interface:
a.
Menu-driven screen selection shall allow even an infrequent operator to move through and
manage the functions of the system easily and with a minimum of training. There shall be no
need to memorize complicated commands or procedures.
b.
Function key control of actions must provide the ability to control the system with simple
keystrokes.
System Password Protection/Control:
a.
Operator name and password shall control access to all menus and screens and the
corresponding capability for each screen.
b.
The Software shall be able to assign each and every operator a completely unique set of
capabilities.
c.
The Software shall protect the password screen by blanking out the password when the
operator enters it.
d.
Operators supported: 100 maximum.
Real-time alarm reporting and display:
a.
b.
The Software shall process alarms in real time.
Priority levels defined by system Administrator: 10.
1)
4.
5.
The System Administrator shall have the capability to assign the priority levels into
categories such as fire, intrusion, or duress.
c.
Alarms displays: Color.
d.
The system shall associate color graphic maps with alarm points and must display maps in
real time.
Real-time Status Reports: System status reports shall be available by:
a.
Alarm category.
b.
Security area device.
c.
Monitor points.
Override Command Capability: The system shall provide the operator the ability, based on
password authorization, to override pre-set conditions. The overrides shall include:
a.
Unlock/re-lock doors individually or in logical groups.
b.
Shunt/unshunt alarm monitor points individually or in logical groups.
c.
Open, limit, or close the areas covered by specific Controllers.
d.
Silence latched alarm contacts.
e.
Forgive anti-passback status in individual Controllers.
WSE • 3/21/97
16720 — 3
SE 5850 Host Software
6.
7.
High Resolution Color graphics at operator console:
a.
SVGA Resolution with 256 Colors (minimum).
b.
ASCII Graphics for Maps:
1)
Using simple keys to facilitate selection and placement of graphic symbols, the system
can define maps representative of the site.
2)
The symbols can be associated with alarm points.
3)
Mapping supports a map sequence function which allows definition of maps containing
greater detail of previously drawn maps.
4)
The mapping system shall support output to Okidata 184 parallel or similar printers.
Powerful Security System Diagnostic Software: feature shall provide operators with the ability
to examine the status of the system components and communications. These capabilities are
particularly useful for diagnosing suspected problems, including:
a.
Card Reader Status:
1)
b.
c.
d.
Card Reader Activity:
1)
The system shall display access activity at doors associated with a particular card reader
as it occurs.
2)
Displays shall include the door name, access time, card number, door status (closed,
open, held open, or forced open) and lock status (locked, unlocked, manually unlocked,
or auto unlocked).
Controller Status:
1)
Open/Limited/Closed, Shunted/Unshunted, Communications Failure.
2)
Power: online vs. backup, and tamper status.
Monitor Point Status:
1)
e.
8.
A status screen shall show the condition of all card readers attached to the system. This
screen shall show the status of card readers, coaxial cables.
Active, clear, communications failure, device failure.
Communications Monitor:
1)
Communications between the card readers and the computer must be monitored.
2)
This function normally will be used during installation to verify proper connection of
communication cables.
Audit Trail of all Operator Activity:
a.
The System Administrator shall be provided with the ability to monitor and to manage all
actions performed by operators on the system.
b.
Audit trail records shall be saved to hard disk and must not be able to be modified.
c.
The only possible actions for audit records shall be report retrieval and archiving for off-line
storage.
D. System Management: The required system shall perform all of the following functions:
1.
Simple System Administration:
a.
To administer the Host computer, the system shall provide control of all system
administration functions via menu-accessed screens.
b.
There shall be no need to memorize complicated commands or to learn the syntax of the DOS
operating system.
c.
System administrative functions:
WSE • 3/21/97
1)
Adding and deleting system users and their passwords.
2)
Performing system and database backups.
3)
Displaying current system activity.
4)
Performing transaction archives.
16720 — 4
SE 5850 Host Software
2.
3.
5)
Initiating data transfer to remote devices.
6)
Defining and maintaining user-controlled fields.
7)
Performing alarm transaction clean-up.
Security System Hardware Definition:
a.
Access control/alarm monitoring devices.
b.
Communication characteristics.
c.
Grouping of doors and monitor points.
d.
Defining readers.
e.
Defining points.
f.
Defining actions.
g.
Defining auto activate/open periods:
1)
Proximity access control.
2)
Keypad access control.
3)
Magnetic Stripe access control.
4)
Alarm monitor points.
Define Security System Software:
a.
Card number.
b.
Employee name.
c.
Card valid date.
d.
Card expiration date.
e.
Time Periods: Start time, stop time, and one or more days of the week.
f.
Holidays:
g.
1)
Along with the time zones, days of week, and doors for access control, the system shall
allow the System Administrator to add holidays to the access definition.
2)
Holiday definition shall allow days defined as holidays to have automatic and access
parameters different from their normal definitions.
Data Grouping: The system shall provide the capability to group the following data items:
1)
Time Periods : 4 (four) per time group.
2)
Doors: into door groups.
3)
Monitor points: into monitor groups.
4)
Keyholders into keyholder groups.
4.
Maximum Database Capabilities: Maximum storage capabilities are limited by the application.
5.
Database Download to Distributed Local Controllers:
6.
a.
The host computer must download all information pertinent to each particular control unit.
b.
The system shall execute downloads automatically at pre-defined times or by manual
initiation.
Powerful and Meaningful Reports:
a.
The system shall be able to execute reports without impacting the real-time operation of the
security system.
b.
The system shall track and report the dates of archived events available for reporting. It must
be able to generate reports for activity spanning any time period, using fixed disk files and
high-density 3.5-inch floppy disk files.
c.
The system shall separate reports by group (door, monitor, time).
d.
The system shall provide reports for every data file maintained in the system.
WSE • 3/21/97
16720 — 5
SE 5850 Host Software
e.
1)
Detail activity: Provides detail reports of all activity on the system within specified time
intervals.
2)
Exception activity: Provides selective reporting of specific types of activity on the system
within specified time intervals.
3)
Audit trail: Any time any data is changed, the system shall maintain an audit trail of the
data changed and who made the change. This report allows management of database
changes and is useful in meeting the requirements of most controlling agencies.
4)
History reports to be available based on a particular cardholder or door.
7.
On-line Storage of Security Events: When the database approaches a selected percentage of its
limit, the system shall issue an alert to inform the operator(s) of the condition and to recommend
that the operator perform an archive to floppy disk.
8.
Archiving of Security Events:
a.
The system shall provide the ability to backup to floppy disk all events stored in the
transaction file.
b.
In the event of hardware failure or need to execute a report using archived events, the events
must be able to be restored to the system.
9.
Backup and Restoration of Security System definitions:
a.
b.
E.
Pre-defined Reports:
The system shall provide the ability to backup to floppy disk definition, including both
hardware and user information.
In the event of data corruption, tampering, or other loss of data integrity, the security system
definitions shall be able to be restored to the on-line system from the floppy disk.
Access Control Operation:
1.
Common Requirements:
a.
b.
c.
WSE • 3/21/97
System Designed for Growth:
1)
Through addition of Controllers (and possibly software upgrade) the system shall provide
support for middle scale applications with a larger number of cardholders, card readers
and alarm points.
2)
Modular software architecture and performance-oriented programming techniques shall
optimize the system to provide minimum response time.
3)
From the speed with which doors are unlocked and the speed with which reports are
produced, the system software must be able to meet the stringent specification for
capacity.
Capture of all Events from Access Control Units (Controllers):
1)
The host computer shall capture all events that occur at local access control.
2)
Event capture shall occur real-time.
3)
These devices may include multiple switch monitors, Controllers, and alarm monitor
units.
Failsoft Operation:
1)
If for any reason, communication between the computer and the Controller is
interrupted, the Controller shall continue to make its decisions.
2)
While connected to the host computer, the system shall constantly update the Controllers
with the information necessary to operate in failsoft mode. Each Controller has its own
specific quantitabive limitations.
3)
The host computer shall download a maximum of 11,000 card numbers plus 120 access
codes to give full decision making capability to each Controller.
4)
This capability shall provide for continued operation of distributed card readers at all
times.
16720 — 6
SE 5850 Host Software
d.
Automated System Control: The system shall provide the ability to automatically change the
state of certain devices or areas based on time.
e.
Multiple Identification Required for Access:
1)
Selected entrances and exits may require multiple methods of confirming identity for
entry.
2)
The required system must support any combination of the following access controlling
devices:
(i) Analog Proximity Sensors.
(ii)
Digital Proximity Readers.
(iii) Keypads.
(iv) Magnetic Stripe Readers.
(v)
f.
g.
2.
Smart card readers.
Anti-passback:
1)
Ability to forgive passback status shall be available via operator overrides.
2)
Passback forgiveness shall be provided to a single cardholder or for all cardholders.
3)
Automatically forgive passback at predetrmined time of the day.
4)
In the event of Controller failure, the Controller shall automatically forgive all passback
status upon return to operational status.
Trace:
1)
The system shall provide the capability to trace activity for specific cardholders at specific
doors.
2)
For a cardholder, the system shall report activities throughout the system.
3)
The system shall display trace activities with the alarm functions to alert the operator.
Distributed Processing:
a.
Distributed Access Control Decision Making: Westinghouse Security Electronics
Controllers support distributed processing, with the capability to make access decisions
independent of the Host Computer.
b.
Automated Download of Data to Distributed Controllers:
1)
SE 5850 maintains a central database on all access control equipment.
2)
Central database includes:
(i) Keyholders.
(ii)
Access levels.
(iii) Automatic events (such as auto unlock), etc.
3)
F.
SE 5850 shall sort the information in the central database and send it to the appropriate
Controller, allowing the local Controller to make all necessary decisions without the SE
5850 central terminal support.
Alarm Monitoring Operation:
1.
When utilizing Westinghouse Security Electronics Controllers, the host computer shall monitor
the alarm points in two states: secure or alarm. An end-of line resistance shall indicate the point
is secure.
2.
Configurable Alarm Instructions:
a.
Alarm instructions: 500 maximum with up to 228 characters each for each alarm event or
monitor point in the system.
b.
The system shall be able to assign alarm instructions to any monitor point in the system for
unique responses to any circumstance.
WSE • 3/21/97
16720 — 7
SE 5850 Host Software
3.
4.
5.
6.
.4
Operator Alarm Response:
a.
SE 5850 shall prioritize alarm events.
b.
When acknowledging an alarm, the operator must individually acknowledge the event.
c.
The system shall save alarm acknowledgment with the respective event for future recall and
reference.
Recall Alarm Activity:
a.
The system shall save to disk information associated with each alarm that occurred within
the system.
b.
The operator cannot modify or delete this information. Hence, all information is available to
the operator viewing an alarm.
Monitor Point Status Display:
a.
The system shall provide a display that summarizes the current condition of all of the
monitor points.
b.
The status display shall indicate normal, active, shunted, and communication line status.
Shunting/Unshunting Alarms and Alarm Points: The system shall provide the capability to
shunt or unshunt alarm points via the following methods:
a.
Automatically, based on time of day, day of week, or holiday.
b.
Manually by Operator override. The operator must previously have been provided the
capability of shunt/unshunt via the password definition.
COMPONENT DEFINITION
A.
Recommended hardware platform: SE 5850 is available as a software-only option or it can be
packaged with a Hewlett Packard XM3 PC with the following specifications. A comparable IBM
Compatible PC is acceptable:
1.
Manufacturer/Model: Hewlett-Packard XM3 PC, or comparable IBM Compatible PC.
2.
Microprocessor: Pentium, 50 Mhz, 32-bit.
3.
Monitor: 256 Color, Super Video Graphics Adapter (SVGA); 110/220 VAC selectable, UL listed.
4.
Input media: 1.44 MB diskette drive.
5.
Mass Storage: 40 MB hard disk, or greater.
6.
I/O Ports: 1 parallel port, 3 serial ports.
7.
Keyboard: 101 enhanced keyboard (QWERTY). Foreign language keyboard options available.
8.
Communications: RS-232, 3 (three) ports.
9.
Approvals: UL, FCC.
10. Made in USA.
.5
ACCESSORIES:
A.
Printer: Parallel printer or serial printer.
B.
Communication Modems:
1.
2.
Direct Connection:
a.
Short distance (max. two miles point-to-point on 22-AWG twisted pair at 9600 baud. Uses
Black Box short haul modems).
b.
Lease line, point-to-point: Modem not defined.
Conversion devices from 20 mA to RS-232:
a.
WSE • 3/21/97
SE CI-1 or SE CI-8.
16720 — 8
SE 5850 Host Software
3.
Power Management:
a.
PART III
.1
1)
Provides continuous power, without interruption, should primary power be interrupted.
2)
Provides 1 hour or more continuous DC power, depending on configuration.
EXECUTION
FIELD QUALITY CONTROL:
A.
B.
C.
.2
UPS:
Tests:
1.
A system integrator shall supply a proposed acceptance test procedure.
2.
Testing the system shall be the sole responsibility of the system integrator.
3.
Communications tests: Controllers to central terminal, local controller, or remote local controller.
Inspection:
1.
The selected system integrator shall provide, on the job site, a factory-trained technician to assist,
advise, or manage installing personnel.
2.
The manufacturer shall also supply on-site inspection.
3.
All final connections shall be made under the direct supervision of the system integrator.
Field Service:
1.
A system integrator authorized by the manufacturer shall provide support for the selected system.
2.
System integrator must be supported by large service-oriented manufacturers for the system
hardware and software.
3.
The system integrator shall determine and report all problems to the manufacturers’ customer
service departments.
4.
Support must be available to the integrator via phone inquiries or on-site visits if conditions
require and are approved by the manufacturer’s customer service manager.
5.
If purchased, the manufacturer shall provide reliable field service support for the computer
hardware utilizing Hewlett-Packard service.
6.
The manufacturer shall also participate directly in on-site commissioning of new systems with
integrator cooperation.
7.
HP field service is available in a variety of forms for the customer. A system manufacturer that
determines a hardware problem is occurring will contact HP to assist the integrator and customer
to resolve the problem.
SCHEDULES
A.
System Integrator Assisted Preparation:
1.
Data Requirements.
2.
Operators & privileges.
3.
Access Hardware.
4.
Sensors.
5.
Monitor Points.
6.
Keyholders.
7.
Keyholders security codes.
8.
Maps.
9.
Prepare room for system installation.
10. Receive equipment.
WSE • 3/21/97
16720 — 9
SE 5850 Host Software
B.
C.
System Installation:
1.
Install security management hardware.
2.
System Integrator and manufacturer (when ordered) on-site commissioning.
3.
Initial startup and verification.
4.
Data entry.
5.
Data entry listing & verification.
Verify Installation:
1.
Connect access control hardware to Security Management System.
2.
Download data and verify correct operation.
3.
Testing total access and management system.
4.
Sample Reports.
5.
Daily Operation and Monitoring.
6.
Dealer deliver “as built” drawings.
WSE • 3/21/97
16720 — 10
SE 5850 Host Software