Page 59 - 14th @ Irving Basis of Design (internal)
P. 59
Intercoms shall provide a dedicated communications link with the 24-hr security monitoring location for use in situations of duress
or assistance.
• Intercoms will be in areas where persons that lacks the proper level of access authority may require access, or during a
time that a person is not scheduled to have such access. Intercoms will be in public areas and the type shall be approved by
the architect.
9.2 SECURITY SYSTEM REQUIREMENTS
The security system shall be an integrated system and shall function as described.
• All alarms shall be recorded, and annunciated and monitored at locations designated by the owner.
• IP – Video Surveillance network video recorders, intrusion detection and associated video control head-end equipment
shall be cabinet/rack mounted within the secure equipment room (SER). Monitors shall be located at the monitoring
locations. The monitors’ placement shall be designed consistent with operational requirements and number of
workstations. The monitor’s configuration shall be a combination of design possibilities, (console and wall mounted, etc.).
Remote monitoring locations can be: the building security/reception desk at each lobby, the main entry and remote
locations of the facility as necessary. Monitors at these locations shall be built-in to millwork coordinated with the
architect.
• Intercommunications master stations are located at the monitoring desk with one master station per workstation. Remote
field units for the intercom shall be located at the front entrance of the lobby, office lobby, service and delivery entrances.
• All field panels, power supplies and associated equipment shall be located within secure closets as needed. Power
requirements shall be coordinated with the electrical engineer.
9.2.1 SECURITY MANAGEMENT SYSTEMS
The electronic security system (ESS) shall be a combination of software and microcomputer-based integrated network systems.
The integrated control systems will include Access Control System, IP – Video Surveillance, intrusion detection, duress alarm,
emergency notification and intercom.
All these components will interface to each other. For example: alarm activation, invalid transaction will cause IP – Video
Surveillance system cameras to activate, alert and display the coverage area camera image onto the monitor screen designated and
start the recording equipment to record in a real-time mode of operation.
All systems are to be monitored and controlled directly from the monitoring desk.
9.2.2 SECURITY SYSTEM INTERFACES
SECURITY SYSTEM
The Access Control System (ACS) will serve as core of the security systems to provide interoperability between all the electronic
security systems. IP – Video Surveillance system and the intercommunication system alarms shall be routed to the access control
server via software interfaces and responsive actions will occur based on the initial programming.
IT&T SYSTEMS
The security system will utilize a structured cabling system (SCS) for the transport of data between the security devices,
telecommunication room and equipment rooms. The security system will utilize the converged network LAN for routing data
between the security head-end servers and the operator workstations. The security system shall be logically separated from other
network services via a dedicated security VLAN.
14th @ IRVING WSP
Project No. B1809809.000
RAL COMPANIES & AFFILIATES Page 59