MasterFormat: 95
Download this Security Access and Surveillance Specification for   WORD | WP | RTF | TEXT
Find over 500 more construction specifications | Arcat.com
         
Bosch Security Systems Security Access and Surveillance
 
         
SECTION 13700
 
         
SECURITY ACCESS AND SURVEILLANCE
 
         
 
         
Copyright 2009 - 2012 ARCAT, Inc. - All rights reserved

          ** NOTE TO SPECIFIER ** Bosch Security Systems; systems for video surveillance, access control, and intrusion and fire detection.
.
This section is based on the products of Bosch Security Systems, which is located at:
130 Perinton Pkwy.
Fairport, NY 14450
Toll Free Tel: 800-289-0096
Tel: 585-223-4060
Fax: 585-223-9180
Email: request info
Web: www.boschsecurity.us
[ Click Here ] for additional information.
Bosch Security Systems, Inc. works closely with an extensive network of certified dealers and integrators to design dependable security and life safety solutions for the market. Our broad portfolio of products and systems for video surveillance, access control, and intrusion and fire detection are used by major schools and universities, government agencies, correctional facilities, retail stores, casinos and in many other commercial environments throughout North America.
Bosch is also committed to upholding the highest standards for service. Our goal is total customer satisfaction through products, service and support. Bosch associates work closely with customers to help them win new business. Technical support services are easily accessible via phone, email and the Internet for installers working to develop and maintain high-quality security systems, and we provide extensive training to make sure our customers understand how to get the most from their systems.
For more than 100 years, the Bosch name has stood for quality and reliability. We are there for our customers during all crucial phases of a project: before, during and after the sale.
.
 
          PART 1GENERAL
 
          1.1SECTION INCLUDES
          ** NOTE TO SPECIFIER ** Delete items below not required for project.
 
          A.Microprocessor and radio-based electronic security and surveillance system, including the following:
          1.Engineering, installation supervision, calibration, adjustment and checkout necessary for a completely installed and operation system.
          2.Computer software and hardware, operator input/output devices, field devices, sensors, controls, wiring and piping required to perform the functions, intent and performance required.
          3.Devices required for proper system operation including any special electrical switches, transformers, disconnect switches, circuit breaker protection, and similar items, required for proper and continuous electrical operation of the system.
 
          1.2RELATED SECTIONS
          ** NOTE TO SPECIFIER ** Delete any sections below not relevant to this project; add others as required.
 
          A.Section 16050 - Basic Electrical Methods and Materials: Access control systems infrastructure.
 
          1.3REFERENCES
          ** NOTE TO SPECIFIER ** Delete references from the list below that are not actually required by the text of the edited section.
 
          A.European Commission (CE) - Harmonized European Standard.
 
          B.Federal Communications Commission (FCC): Class A digital device, pursuant to Part 15 Radio Frequency Devices.
 
          C.International Organization for Standardization (ISO): 9001:2000 - Quality Management Systems.
 
          D.Underwriters Laboratories, Inc. (UL): UL 294 - Access Control Systems Units.
 
          1.4DEFINITIONS
 
          A.Access Control System: Comprises a PC Based Host, Access Control Software, Access Controllers and/or Access Control Devices.
 
          B.The term "Subscriber" shall refer to any Transmitter known to the system.
 
          C.Access Control Software: Screen based tools for:
          1.Data acquisition and change.
          2.Card creation and layout.
          3.The control of the system components.
 
          D.Access Controllers: Machine aided control of access rights and the granting or denying of physical access.
 
          E.Access Control Devices: Refers to doors and readers, and other opening door elements and sensors.
          ** NOTE TO SPECIFIER ** System description of the Bosch Access Easy Controller System. Delete if not required.
 
          1.5SYSTEM DESCRIPTION
 
          A.Access Control System: The System shall be described as an access controller with a built-in web server that allows the user to access, monitor, manage, and control hardware, which in turn controls the door, access readers, alarms, and other devices.
 
          B.Performance requirements:
          1.Control up to 4 access readers, expandable to 16 access readers.
          2.Support computer with different operating system and hardware platform that runs a Web browser program supporting Java.
          3.Support access readers compliant with industrial Wiegand format.
          4.Allow standalone and client-server configuration.
          ** NOTE TO SPECIFIER ** System description of the Bosch Security Escort System. Delete if not required.
 
          1.6SYSTEM DESCRIPTION
 
          A.The System shall be described as a Personal Safety System consisting of a network of transmitters, receivers, and redundant computers including proprietary software designed to provide users with a means of alerting security personnel when faced with an emergency situation.
 
          B.The System shall consist of six basic components:
          1.Transmitters.
          2.Multiplex Receivers.
          3.Alert Units.
          4.Transponders.
          5.Central Console.
          6.Proprietary Application Software.
 
          C.The System shall be activated by use of hand-held miniature radio Transmitters, which shall be specifically designed for that purpose. There shall be three types of System activation by the Transmitters; Alarm, Test, and Supervision.
          1.An Alarm activation of the System shall cause:
          a.A distinct warbling sound to be emitted from the activated Subscriber or Maintenance Transmitter to confirm that an alarm signal has been sent. For Silent Alarm purposes, there shall be no sound emitted from a Security Transmitter when activated.
          b.Within three seconds, if enabled within the Application Software, nearby Alert Unit strobes and integral sirens along with sounders in any nearby Multiplex Receivers shall be activated.
          c.An auto-tracking feature shall begin sending signals periodically to the Central Console to allow location tracking events, and the Central Console to display:
          1)The name of the individual to whom the Transmitter is assigned.
          2)A map showing the calculated location from which the transmission was made.
          3)Other pertinent information such as related medical information of the individual to whom the Transmitter is assigned.
          4)An alarm entry to be made in the Central Console's computer database.
          2.A Test activation of the System shall cause full System operation verification. Visual feedback of a successful Test shall include a small green light to flash on a nearby interior Multiplex Receiver, and/or the strobe to flash on a nearby Alert Unit.
          3.Specific transmitter types will automatically transmit supervision messages periodically. These messages allow the system to verify the transmitter is functioning normally, the battery level is adequate and to locate a transmitter that is not in an alarm state.
 
          D.Activated sirens and sounders shall be silenced and reset only by command from the Central Console.
 
          E.Multiplex Receivers shall be located on the grounds to be protected and within any buildings to be protected.
          1.To assure transmitted signal reception redundancy, Receivers shall be spaced close enough to assure activation of three or more Receivers on any alarm or test transmission within the protected area. For proper location, receivers shall be spaced 300 feet outdoors (91.5 meters outdoors) and 80 feet indoors (24.5 meters indoors) from adjacent receivers.
 
          F.Alert Units shall consist of two sections; a self-contained Strobe/Siren section and an Electronic Driver section.
          1.The Strobe/Siren section shall always be installed in outdoor locations.
 
          G.Transponders shall be designed as device controllers for up to 64 devices, which shall be any combination of Multiplex Receivers and Alert Units.
          1.Devices shall be connected to Transponders by means of eight Multiplex Busses. Each bus uses four wires, two for power and two for data. Each bus shall be capable of supporting up to eight devices.
          2.Each Transponder shall communicate with the Central Console via SE485 Data Bus or Spread Spectrum radio transmissions in the 902-928 MHz radio range.
          3.The System shall support up to 255 Transponders.
 
          H.The Central Console shall consist of one or more IBM compatible computers running the proprietary Application Software within a Microsoft Windows environment. One computer shall serve as the Main Controller for the entire System while the others shall serve as backup and remote workstations. The computers shall continually exchange information so that the backup computers are kept current.
 
          I.The Application Software shall have provisions to automatically send pager messages containing the necessary Alarm information to roaming security personnel, and to send pager messages containing the necessary System trouble information to maintenance personnel.
 
          J.The Application Software shall support remote computer communications permitting off-site System and Factory maintenance technicians to monitor problems, run System diagnostics, and modify System operating parameters.
 
          K.The Contractor shall provide all power supplies, computers, peripheral devices and equipment required for a complete and operational System.
 
          1.7SUBMITTALS
 
          A.Submit under provisions of Section 01300.
 
          B.Product Data: Manufacturer's data, user and installation manuals for all equipment and software programs including computer equipment and other equipment required for complete access management, including:
          1.Preparation instructions and recommendations.
          2.Storage and handling requirements and recommendations.
          3.Installation methods.
 
          C.Shop Drawings:
          1.Detailed wiring diagrams and system description.
          2.Detailed layout of all field receivers, transponders and audio/visual components and devices of the System.
          3.System device locations on architectural floor plans.
          4.Full Schematic of system, including wiring information for all devices.
 
          D.Closeout Submittals:
          1.User manual.
          2.Parts list.
          3.System device locations on architectural floor plans.
          4.Wiring and connection diagram.
          5.Maintenance required and maintenance schedule.
          ** NOTE TO SPECIFIER ** Delete selection samples if colors have already been selected.
 
          E.Selection Samples: For each finish product specified, two complete sets of color chips representing manufacturer's full range of available colors and patterns.
 
          F.Verification Samples: For each finish product specified, two samples, minimum size 6 inches (150 mm) square, representing actual product, color, and patterns.
 
          1.8QUALITY ASSURANCE
 
          A.Manufacturer Qualification:
          1.Minimum of ten years experience in manufacture and design of access control, surveillance and security systems and devices.
          2.Provide availability of equipment for expansions, replacements, and spare parts available to dealers or end users.
          3.Provide factory direct technical support from 8:00 a.m. to 8:00 p.m. via phone and e-mail, or 24/7 via Web.
          4.Manufacturer's Quality System: Registered to ISO 9001:2000 Quality Standard.
 
          B.Installer Qualification:
          1.Minimum of five years experience installing access control, surveillance and security systems and devices.
 
          C.System Requirements:
          1.The System products shall be built modular in construction for ease of expansion and servicing. Functions shall be on replaceable panels, modules or circuit boards to accommodate functional changes when required. All field enclosures shall be supervised so as to give a trouble signal if tampered and receiving devices will contain jamming detection circuits. All units shall be of solid state design.
          2.The System shall be designed for, and in compliance with, all applicable FCC Rules and Regulations.
          3.Listed by CE specifically for the required loads. Provide evidence of compliance upon request.
          4.Listed by FCC specifically for the required loads. Provide evidence of compliance upon request.
          5.Listed by UL specifically for the required loads. Provide evidence of compliance upon request.
          ** NOTE TO SPECIFIER ** Include a mock-up if the project size and/or quality warrant taking such a precaution. The following is one example of how a mock-up on a large project might be specified. When deciding on the extent of the mock-up, consider all the major different types of work on the project.
 
          D.Mock-Up: Provide a mock-up for evaluation of installation techniques and application workmanship.
          1.Finish system in areas designated by Architect.
          2.Do not proceed with remaining work until workmanship and aesthetics are approved by Architect.
          3.Remake mock-up area as required to produce acceptable work.
 
          1.9DELIVERY, STORAGE, AND HANDLING
 
          A.Deliver materials in manufacturer's original, unopened, undamaged containers; and unharmed original identification labels.
 
          B.Store products in manufacturer's unopened packaging until ready for installation.
 
          C.Protect store materials from environmental and temperature conditions following manufacturer's instructions.
 
          D.Handle and operate products and systems according to manufacturer's instructions.
 
          1.10PROJECT CONDITIONS
 
          A.Maintain environmental conditions (temperature, humidity, and ventilation) within limits recommended by manufacturer for optimum results. Do not install products under environmental conditions outside manufacturer's absolute limits.
 
          1.11WARRANTY
          ** NOTE TO SPECIFIER ** Easy Access Warranty: Delete if not required.
 
          A.Provide manufacturer's warranty covering one year for the software; and five years warranty on products to repair and replace defective equipment.
          ** NOTE TO SPECIFIER ** Escort Warranty: Refer to manufacturer for coverage and coverage period. Delete if not required.
 
          B.Entire system shall be warranted against equipment failure and installation defects for a period of (__) from the date of acknowledged Owner acceptance of final test.
 
          PART 2PRODUCTS
 
          2.1MANUFACTURERS
 
          A.Acceptable Manufacturer: Bosch Security Systems, which is located at: 130 Perinton Pkwy. ; Fairport, NY 14450; Toll Free Tel: 800-289-0096; Tel: 585-223-4060; Fax: 585-223-9180; Email: request info; Web: www.boschsecurity.us
          ** NOTE TO SPECIFIER ** Delete one of the following two paragraphs; coordinate with requirements of Division 1 section on product options and substitutions.
 
          B.Substitutions: Not permitted.
 
          C.Requests for substitutions will be considered in accordance with provisions of Section 01600.
          ** NOTE TO SPECIFIER ** Bosch Access easy Controller System. Delete if not required.
 
          2.2ACCESS CONTROL SYSTEM
 
          A.Product: Bosch Access Easy Controller (AEC) as manufactured by Bosch Security Systems.
          1.AEC is an access controller with a built-in web server that allows the user to access, monitor, manage, and control AEC hardware, which in turn controls the door, access readers, alarms, and other devices.
          2.Operate with standard Web browser program supporting Java like Internet Explorer, Netscape, Firefox and Opera.
          3.Support computers running different operating systems as long as they have a standard Web browser program with Java Virtual Machine.
          4.Basic System Features:
          a.Connect to TCP/IP network via an Ethernet port. Allow a client computer in the network to access the AEC to manage the database, monitor activity or control devices.
          b.Allow multiple entry access modes.
          c.Allow cardholder to define own Personal Identification Number (PIN).
          d.Assign multiple functions to a single card.
          e.Possess User ID's and password protection with security encryption, allowing access into the AEC to monitor, control, and manage the system parameters, transaction records, and activities.
          f.Have 255 sets of programmable schedule types to provide access-control behavior such as unlocking of doors, access control activation, PIN function activation or automatic arming of an alarm point.
          g.Possess dual memories for storage and backup.
          h.Provide 2 or 4-state alarm monitoring on all inputs. An access reader can be programmed as an arming/disarming reader.
          i.Control alarms input and relay output.
          j.Allow global input-output linking.
          k.Allow advance I/O programming.
          l.Possess anti-pass back feature to prevent "pass back", where a user hands his badge back across a barrier to provide access for an unauthorized person.
          m.Provide remote modem networking.
          n.Support Internet E-mail (SMTP) and Short Message Service (SMS).
          o.Capable of firmware upgrade.
 
          B.System Capacities:
          1.25 maximum user accounts.
          2.128-bit SSL browser Login encryption.
          3.Up to 8 charter alphanumeric, case sensitive user IP and password.
          4.4 access readers expandable to 16 access readers.
          5.254 access groups.
          6.255 time schedules.
          7.20,480 card capacity.
          8.20,479 records memory storage transaction history.
          9.16 programmable Wiegand card formats.
 
          C.Access Easy Controller Hardware:
          1.32-bit microprocessor- 300Mhz CPU.
          2.128 MB RAM memory.
          3.Compact Flash 128 MB and above.
          4.7 concurrent users and 1 super-user.
          5.32 output relay points.
          6.2 RJ45 Ethernet communications ports.
          7.2 RS-232 modem ports.
          8.2 40-pin bus expansions bus ports.
          9.1 RS-485 extension port.
          10.Environment: 0 degrees Centigrade to 45 degrees Centigrade temperature.
          11.Relative Humidity: 10 percent to 90 percent at 32 degrees Celsius (90 degrees Fahrenheit).
          12.Enclosure: (Width/Height/Depth) 530 by 460 by 100 mm (17.9 by 20.7 by 3.9 inches).
          13.Primary Voltage Input (AC): 110 VAC + 10/-15percent, 230 VAC + 10/-15percent (50/60 Hz).
          14.Secondary Voltage Input: +5 VDC and 12 VDC for CPU board, +15 VDC +/- 1 percent for all other boards.
          15.Backup Battery: 12 VDC, 7 Ah rechargeable.
 
          D.Access Easy Controller Software
          1.Software Requirements:
          a.Compatible with any version of Microsoft Windows or Macintosh Operating System.
          b.Functional Web browser program supporting Java, such as Microsoft Internet Explorer (version 4.0 and later) or Netscape Navigator (version 4.0 and later).
          2.Hardware Requirements:
          a.Server PC: Microsoft Windows or Macintosh Operating System capable of running on any PC with minimum capabilities.
          b.Notebook or Desktop with a 10/100Base-T Ethernet card and any Microsoft Windows or Macintosh Operating System.
          c.Standard Ethernet LAN crossover cable to connect to the computer for standalone configurations.
          d.TCP/IP network via an Ethernet port in the client-server configuration, allowing client computer in the network access AEC to manage the database, monitor activity or control devices.
          3.Software Features:
          a.Display in real time four transactions type: alarm activities, valid activities, restore activities, and time attendance.
          b.Send to Central Monitoring Computer an alerting audio tone when alarm activity transaction is made.
          c.Allow to preview and print customized activity reports based on the combination of card number, name, or department with location.
          d.Allow to configure the amount of records to view on screen (up to a maximum of 70 records).
          e.Format report based on day and time.
          f.Set card parameters:
          1)Card Details:
          a)Card Number.
          b)Facility Code.
          c)Card Format.
          d)User Name.
          e)Department.
          f)User Fields 1 and 2 (user definable field).
          g)Access Groups A and B.
          2)Card Functionality:
          a)Cardholder Arm/Disarm rights.
          b)Card Operations.
          c)Card + PIN Operations.
          d)User PIN.
          e)Card Validation Period.
          f)Dual Card Assignment.
          g.Activate card assignment.
          h.Allow assigning card numbers with same data entries.
          i.Allow selected cardholders to use their card to activate an enrollment reader.
          j.Allow searching the card database for a particular card.
          k.Allow printing a card assignment report.
          l.Support card database Import and Export in cvs format.
          m.Allow adding and deleting a single card or a block of card numbers.
          n.Have 255 programmable schedules, each defining 4 sets of start and end time for 7 days in a week. Regular and special holidays have 4 sets of time intervals.
          o.Preview and print configured schedules.
          p.Have 254 programmable access groups.
          q.Have two additional unique access groups:
          1)Full Access: Allows cardholders to access all readers at all times.
          2)Unused Group: Prohibits a cardholder from accessing any reader at all times.
          r.Preview and print selected access groups.
          s.Allow customized holiday setup if the system operation behavior is be different during holidays. There is 64 selections; 32 assigned to regular holiday dates and 32 assigned to special holiday dates.
          t.Preview and print holiday's setup configuration.
          u.Allow checking doors' status and override the system to send a command to either momentarily unlock or permanently unlock/lock the door without being at the door location. System resumes normal operation when it encounters a valid schedule interval.
          v.Allow checking input points' status assigned to specific alarm zones and overrides the system to manually arm or disarm the zone. System resumes normal operation when it encounters a valid schedule interval.
          w.Allow checking output points' status and overriding the system to send a command to manually turn the points on and off. If the output point is linked to an input point as a status output, the status is not indicated. System resumes normal operation when it encounters a valid schedule interval.
          x.Provide backup capability:
          1)Backup Database to AEC Flash Memory: Allow to overwrite the database in the flash memory with the current parameters in the dynamic random access memory (DRAM). Allow to carry out an automatic backup at a specific time of the day or manually back up the database.
          2)Backup Database To PC: Allow two backup options:
          a)Save a backup copy of current RAM system database to PC.
          b)Save a backup copy of current RAM activity, audit log, and attendance records to PC in comma separated variable (CSV) format.
          y.Set up AEC configurations:
          1)Network Settings.
          2)Email Server Setting.
          3)Dial in IP Settings.
          4)Access Easy Master Setting.
          5)Input Point Configuration.
          6)Set Date & Time Setting.
          7)Auto Logout Timer.
          8)Audit Log.
          9)Default Settings.
          10)Card Format: Customize the AEC to accept up to 16 types of Wiegand card formats. Configure up to 64 bits and 8 parity formats.
          11)Company Profile.
          12)Email/SMS Configuration: Configure to send out messages or Lateness Report using SMTP. A total of eight groups and eight message fields are available for configuration, each with two Send To and two Carbon Copy (Cc) email addresses.
          13)SMS Configuration: Configure to send SMS using eight group and eight message fields. Each group has up to four mobile telephone numbers for SMS messaging.
          z.Possess 32 user-programmable Input Points to monitor alarms. Each I/O card provides up to 8 Input Points. Input Points can be assigned to a group such as Alarm Zone or as individual points. Allows to configure up to four Alarm Zones.
          aa.Alarm Zone can be armed or disarmed:
          1)Manually using a dedicated Arm/Disarm Reader.
          2)Manually using the web page (Input Control).
          3)Using system control based on Schedule Intervals.
          ab.Configures Input Points, group or individual, to trigger 1 to 4 Output Points of the I/O Card to indicate status as:
          1)Alarm Status: On during an alarm.
          2)Arm/Disarm Status: On when armed.
          3)Ready Status: On when the Input Point is not in the normal condition (Not Ready for Arming).
          4)Bypass Status: On when the Input Point is bypassed.
          ac.Allows changing the description of each Alarm Zone to improve user visualization of alarm zone's location.
          ad.Preview and print Input Point reports.
          ae.Possesses 32-user programmable Output Points used to trigger a utility. Each I/O card provides up to 8 Output Points, which trigger:
          1)Manually by users using the web page.
          2)Schedule intervals.
          3)Input Point as a status indicator.
          af.Preview and print Output Point reports.
          ag.Set up card readers parameters:
          1)Reader Function: Define the use of the reader as an Entry Reader, Exit Reader, Entry and Arm/Disarm Reader, or Elevator Reader.
          2)Reader Options: Configure reader parameters. Program to activate or de-activate the reader based on pre-programmed Schedules.
          3)I/O Settings
          4)PIN Code Settings: Define when the personal identification number (PIN) is used.
          5)Anti-Pass back (APB) Settings: Define the APB type:
          a)Time based APB.
          b)Soft APB.
          c)Full APB.
          ah.Dual Card Configuration.
          ai.Allow advance I/O functions:
          1)Guard Tour.
          2)Feed Through.
          3)OR Logic.
          4)AND Logic.
          5)XOR Logic.
          6)NAND Logic.
          7)Interlock/Man Trap.
          8)Up-Down Counter.
          9)Exit Door.
          10)One Shot.
          aj.Possesses anti-pass back feature to prevent "pass back", where a user hands his badge back across a barrier to provide access for an unauthorized person.
          ak.Assigns rights up to 25 users to access and carry out programming of specific or all AEC functions. Define access rights: view, save or both view and save.
          al.Possesses Update Flash memory capability for upgrading or database recovery.
          am.Connects to the AEC through telephone dial-in. This feature is useful to remotely connect to AEC.
          ** NOTE TO SPECIFIER ** Delete devices not required.
 
          E.Access Control Devices and Compatible Readers: The readers and field devices verified by UL for compatibility are:
          1.HID MiniProx Reader (Bosch D8224):
          a.Accepts 5 to 16 volts, meets most voltage requirements.
          b.Available with Wiegand or Clock-and-data interface.
          c.Allows easy upgrade from magstripe to proximity reader without rewiring.
          d.High reliability, consistent read-range and low power consumption.
          e.Mounts onto metal with no change in performance.
          f.Multicolor LED, compatible with all standard access control systems, host control of LED and beeper.
          2.HID ProxPro with Keypad Reader (Bosch D8223-P):
          a.High reliability, consistent read-range and low power consumption.
          b.Multicolor LED, internal or Host control of LED and beeper "off" switch for silent operation.
          c.Wiegand protocol interface compatible with all standard access control systems.
          d.Personal identification number keypad for heightened security.
          e.Can be mounted on glass using optional glass mounting kit.
          3.HID ProxPro without Keypad Reader (Bosch D8223):
          a.High reliability, consistent read-range and low power consumption.
          b.Multicolor LED, internal or Host control of LED and beeper "off" switch for silent operation.
          c.Wiegand protocol interface compatible with all standard access control systems.
          d.Can be mounted on glass using optional glass mounting kit.
          4.HID ProxPoint Reader (Bosch D8225):
          a.Beeper and multicolor LED host and/or locally controlled.
          b.Enables various beeper and LED configurations.
          c.Reads HID cards with up to 85 bits.
          d.Mounts on metal with no change in performance.
          e.Available with Wiegand or Clock-and-data (magnetic stripe data) output.
          f.Aesthetic design available in 2 cover designs and 4 colors.
          ** NOTE TO SPECIFIER ** Delete accessories not required.
 
          F.Accessories:
          1.Bosch Access Easy Controller Extension Enclosure (Bosch AEC EXT):
          a.Provides room to house extension boards with more readers and Input/Output points for AEC.
          b.Communicates via RS-485 with the AEC.
          c.Requires a AEC Serial Extension board to communicate.
          d.Provides space for extending capabilities of the AEC with 3 available slots for the AEC 4W EXT or AEC 8180 EXT boards.
          e.Extends the AEC to a maximum of 16 Wiegand readers and 32 Input/Output.
          2.Bosch Extension Board 4 Wiegand (Bosch AEC 4W EXT):
          a.Supports 4 Wiegand compatible reader interfaces.
          b.Supports 4 input points for door contact sensors.
          c.Supports 4 input points used for Request-to-Exit Devices.
          d.Supports 8 form-C relay output points.
          e.Up to a maximum of 4 AEC-4W-EXT boards can be supported by one AEC allowing maximum configuration of 16 readers per AEC.
          f.2 40-pin IDE connectors for data bus.
          3.Bosch Extension Board 8 Input and 8 Output (Bosch AEC 8180 EXT):
          a.Provides Inputs and Outputs points extension for AEC or AEC Extension.
          b.Visual LED indicators providing diagnostic on-board.
          c.Up to a maximum of 4 AEC 8180 EXT board can be supported by one AEC for a maximum configuration of 32 inputs/outputs per AEC.
          d.Inputs are supervised with 6.8kOhm resistor placed in series or in parallel with the contact.
          e.The outputs are Form-C relay, dry contacts, rated at 24 VDC @ 1Amp.
          f.Requires the install of diodes across the DC load.
          4.Bosch AEC Extension RS-485 to extension board.
          a.AEC conversion serial RS-485 to reader or IO board, 1 for each extension.
          5.Bosch Power Supply (Bosch AMC PBC-60):
          a.External power supply (10 -30 Volts DC) connect at pin 1 (positive) and pin 3 (negative).
          b.Additional power supply (12 Volts DC) for peripheral devices such as card readers and door openers connect at pin 6 (positive) and pin (negative).
          ** NOTE TO SPECIFIER ** Select reader type(s) based on project requirement. Refer to manufacturer's technical literature for specific features of each product. Delete if not required.
          6.Door strikes and magnetic locks handling 1A at 24 VDC resistive.
          ** NOTE TO SPECIFIER ** Bosch Escort System. Delete if not required.
 
          2.3SECURITY/EMERGENCY CONTROL SYSTEM
 
          A.Transmitters:
          1.There shall be three types of Transmitters available; Basic Duress Transmitter, Enhanced Duress Transmitter, and Point-Tracking Transmitter. Refer to schedule of transmitter types and quantities.
          2.All Transmitters shall:
          a.Upon activation, generate an Alarm transmission.
          1)Each Alarm transmission shall consist of eight redundant packets, each packet to be 15 to 20 milli-seconds in length.
          2)Each Alarm transmission shall consist of a unique digital code, which contains a User ID and battery status information.
          b.Be capable of a minimum of 16 million different User Identification (ID) codes, one of which shall be programmed into the transmitter's digital code by the manufacturer. The digital code shall differentiate the specific transmitter as assigned to a User, Security or Maintenance personnel, or asset.
          c.Each Transmitter shall be a miniature, battery operated, hand-held radio transmitter designed for the purpose of transmitting both a Distress Alarm and a Test Signal. Radio transmissions shall occur in the 304 Mhz band reserved for security applications.
          3.Basic Duress Transmitter:
          ** NOTE TO SPECIFIER ** Delete transmitter not required.
          a.Product: Bosch Security Systems SE3U-304 User Transmitter.
          b.Product: Bosch Security Systems SE3M-304 Maintenance Transmitter.
          c.Product: Bosch Security Systems SE3S-304 Security Transmitter.
          4.Enhanced Duress Transmitter:
          ** NOTE TO SPECIFIER ** Delete transmitter not required.
          a.Product: Bosch Security Systems SE2U-304 User.
          b.Product: Bosch Security Systems SE2M-304 Maintenance Transmitter.
          c.Product: Bosch Security Systems SE2S-304 Security Transmitter.
          d.Product: Bosch Security Systems SE2U-SN-304 Subscriber Man-Down Transmitter.
          e.Product: Bosch Security Systems SE2S-SN-304 Security Man-Down Transmitter.
          ** NOTE TO SPECIFIER ** Delete transmitter if not required.
          5.Point-Tracking Transmitter:
          a.Product: Bosch Security Systems SE3401 Transmitter.
 
          B.Multiplex Receivers:
          1.Multiplex Receivers shall be designed to detect and receive Alarm, Test, and supervisory transmissions from Personal Transmitters, and relay the information to the Transponders.
          2.There shall be two versions of the Multiplex Receiver, indoors and outdoors. The Receivers shall differ only in the product housing, ability to display colored status lights, sounder operation and radio reception range.
          a.The indoor enclosure shall be vandal resistant. The enclosure shall consist of a base plus screw mounted cover manufactured from General Electric Noryl, Grade FN-215. The cover shall mount to the base with four tamper-resistant screws held captive in the cover, and the cover shall contain two clear lenses for the exhibition of status lights, and a circular opening to permit an internal sounder to be heard.
          b.The outdoor enclosure shall be weatherproof when assembled and shall consist of a base plus screw mounted cover manufactured from industrial-gray colored Structural Foam. The cover shall contain a weatherproofing gasket and mount to the base with four screws held captive in the cover.
          3.Each Multiplex Receiver circuit board shall also contain a tamper switch to detect the removal of the cover.
          4.Each Multiplex Receiver shall be connected to a Transponder via an 18 AWG, fire rated 4-conductor cable.
          5.Each Multiplex Receiver shall identify itself to its Transponder through use of a binary Multiplex Address, which shall be set during installation using a multi-position switch installed on the Receiver's circuit board.
          6.Product: Bosch Security Systems EA102A-304 (receive electronics) with housing as required or scheduled.
 
          C.Alert Units:
          1.Alert Units shall be designed to provide visual and audio indications of an emergency situation, and visual indications of a successful test of a Personal Transmitter.
          2.Each Alert Unit shall consist of two parts, a self-contained Strobe/Siren section and an Electronic Driver section.
          3.The Strobe/Siren section of the Alert Unit shall be designed for outdoor applications, and shall only be installed outdoors.
          4.Product: Bosch Security Systems EA120B and TR1850 transformer.
 
          D.Transponders:
          1.Transponders shall be designed to monitor and control Multiplex Receivers and Alert Units, and to communicate Alarm, Test and Trouble information back to the Central Console.
          2.There shall be two versions of Transponders, one that supports eight buses and one that supports one bus.
          3.There shall be a maximum of 255 Transponders in the System, and each Transponder shall be identified with a number from 1 to 255, which shall be set during installation using an 8-position switch installed on the circuit board.
          4.Transponders shall be connected to Alert Units and Multiplex Receivers via an 18 AWG, fire rated 4-conductor cable.
          5.Transponders shall communicate on the data exchange wiring with individual Alert Units and Multiplex Receivers by issuing commands, which contain the Receiver or Unit's binary Multiplex Address. As a given Transponder may have up to eight devices connected to it with the same binary Multiplex Address, the complete identification of a particular device shall include the Transponder Identification number, the bus number, and its binary Multiplex Address.
          6.Transponders shall poll each connected Alert Unit and Multiplex Receiver for a status check ten times each second.
          7.Transponders shall communicate with the Central Console via Bosch SE485 Data Bus cabling or a 2-Way Spread Spectrum Radio Data Link. The Bosch SE485 Data Bus shall be set up for 9600 baud, full-duplex transmission.
          8.Power for the Transponder section shall be provided by an 18 VAC, 50 VA transformer. The transformer shall be a UL Listed, Class 2, plug-in device.
          ** NOTE TO SPECIFIER ** Delete system transponder type not required.
          9.Product: Bosch Security Systems EA500B (8-bus, 64 points) and TR1850 transformer.
          10.Product: Bosch Security Systems EA501B (1-bus, 8 points), and TR1850 transformer.
 
          E.Enclosures:
          1.The electronic components shall be housed in an enclosure and cover shall be manufactured from painted 20 Ga., cold-rolled steel. Refer to schedule on the drawings.
          a.The cover shall secure to the enclosure using a keyed lock.
          b.The enclosure shall allow an optional tamper switch to detect the opening of the cover or its removal from a wall.
          ** NOTE TO SPECIFIER ** Delete enclosure not required.
          2.Product: Bosch Security Systems AE1 (Small).
          3.Product: Bosch Security Systems AE3 (Large).
 
          F.Central Console:
          1.The Central Console shall be the primary human interface to the System, shall be located indoors in a climate controlled environment, and shall be manned 24 hours a day by qualified Operators.
          2.The Console shall consist of one or more desktop computers and monitors, a printer, and backup power.
          3.The computers shall be IBM compatible.
          a.Each computer shall be powered from a 120 VAC power source, and each shall be connected to its own 900 VA (minimum) Uninterruptable Power Source (UPS) for backup power.
          ** NOTE TO SPECIFIER ** Delete emergency generator requirement if not required.
          b.Each UPS shall be backed up by an emergency 120 VAC generator supplied by the Owner and which may be shared with other equipment.
          c.One computer shall be designated as the Main Controller for the entire System, and the other computers shall serve as real-time backups and remote workstations.
          4.The computers shall contain the primary databases for the System.
          5.The Main Controller shall be responsible for receiving Alarm messages from the Transponders, and recording Alarm events on a printer.
          6.The Main Controller shall be responsible for receiving Personal Transmitter Test messages from the Transponders.
          7.The Main Controller shall be responsible for receiving Trouble messages from the Transponders. Typical of these messages shall be tamper alarm, loss of power, low battery, bus faults, output device errors, bad checksum, and receiver jamming.
          8.If the Central Console receives no message from a Transponder after a one-minute time period, the Central Console shall command the Transponder to send a message.
          9.The Application Software shall assure that the Backup computer is kept up-to-date in real time so that the Backup computer is available to assume System control without delay.
          10.The Application Software shall permit the Main Controller, Backup and Remote computers to be used for Administrative functions such as adding, deleting, changing or otherwise modifying databases, or performing routine system tests.
 
          G.Application Software:
          1.The System's Application Software shall be proprietary software specifically written for the System, and shall be written and designed to require little or no computer literacy on the part of the Operator.
          2.The Software shall allow the Operator to perform all of the functions necessary to dispatch aid in the event of an Alarm transmission, and to monitor the progress of Alarms and Tests.
          3.The Software shall present the Operator with a Graphical User's Interface (GUI) at all times, and shall permit the use of a "Mouse" for on-screen cursor control.
          4.The Software shall, wherever possible, permit the Operator to issue a computer command by "clicking" on a GUI generated "button", or by using a single specified key on the keyboard.
          5.The Application Software shall automatically write to the appropriate databases any Alarm and Test times, dates, Transmitter ID numbers, and any other data as called for by the particular database.
          6.The Software shall allow access to the databases for the purposes of viewing, adding, deleting, changing or otherwise modifying the data contained in the database.
          a.Database access shall be restricted to personnel contained in the Operator's database.
          b.Database access shall further be restricted by the Authority Level assigned to the personnel in the Operator's database.
          c.Authority Levels shall be controlled only by authorized personnel identified by the Owner.
          7.Product: Security Escort System Application Software, Revision level 2.00 or later.
          a.Display Screens: The Software, through the construction and display of Screens on the Central Console's computer monitor, shall allow the Operator and Application Software Maintenance personnel to interact with and/or modify the Software and related databases.
          ** NOTE TO SPECIFIER ** The Building Integration System (BIS) is a modular, extensible software application with a wide range of features. Typically a basic installation might include access control with video integration or fire alarm monitoring and public address control. At any time you have the opportunity to extend your system with additional features, for example intrusion and alarm monitoring, video management, additional workstation or detector point licenses. BIS has limited availability. Refer to manufacturer. Delete if not required.
 
          2.4BUILDING INTEGRATION SYSTEMS
 
          A.The Building Integration System (BIS) shall be a modular, extensible software application with the following upgraded software capabilities.
          ** NOTE TO SPECIFIER ** Delete existing system refitting package not required.
          1.BIS - Re-fitting package V2.x as manufactured by Bosch Security Systems.
          2.BIS - Re-fitting package V1.4.x as manufactured by Bosch Security Systems.
          ** NOTE TO SPECIFIER ** The optional features listed below are all common BIS options available for BIS 2.0.x, 2.1.x or 2.2.x which can be added regardless of what application (engines) you are already running or wish to add later. Delete refitting package capability options not required.
          3.Software Capabilities:
          ** NOTE TO SPECIFIER ** Please note that the display of action plans, location maps or the device overview must be ordered in addition to Action Management if the operator is required to control the system from these views.
          a.Provide Action Management: Shall allow control of connected subsystems and their peripheral elements. The controls shall be specific to the various subsystems and detector types integrated with these systems.
          b.Provide Display of action plans: License to display event-driven action plans, which describe emergency procedures and provide action buttons, live video and other relevant information. The display and handling of such action plans shall be recorded indelibly in the event log.
          c.Provide Display Of Location Maps: License to display vector-graphic location maps. In case of an alarm BIS shall zoom in automatically on the relevant area in the map and animates the detector icon which triggered the alarm. Operators shall have the ability to send commands to devices via their icons with or without involving the alarm system, e.g. open a door by clicking the door icon.
          d.Provide Graphical Navigation: An extension of the location map feature which activates the zoom and pan function and allows, together with the location tree, coordinated graphical navigation through the premises.
          e.Provide Layer Controlling: An extension of the location map feature which activates the automatic event-driven display of layers inside the graphics.
          ** NOTE TO SPECIFIER ** This feature is included in BIS Basic packages (BIS 2.1 and newer) ordered after April 2008.
          f.Provide Displaying Miscellaneous Documents: License to display additional event-dependent alarm documents, which give further information to the operator in an alarm situation.
          ** NOTE TO SPECIFIER ** Attractive when needing two or more of the single features.
          g.Provide Alarm Document Package: Bundle consisting of the single features; Display of action plans; Display of location maps; Graphical navigation; Layer controlling.
          ** NOTE TO SPECIFIER ** This feature is included in BIS Basic packages (BIS 2.1 and newer) ordered after April 2008.
          h.Provide Device Overview: Detailed status overview of all connected subsystems and their peripherals, as well as all internal components such as event log, operators and virtual devices.
          i.Provide Message Distribution: Enables the implementation of escalation paths which come into effect, for instance, if an operator or operator group fails to acknowledge an alarm message within a defined time. In such a scenario BIS forwards the message automatically to the next operator group in the escalation path.
          j.Provide Timer: Enables timer-driven execution of commands and schedule sensitive alarm-handling procedures.
          k.Provide Operator Alarm: Allows dummy alarms to be generated manually from the location tree for test or safety-drill purposes. As with real alarms these simulated alarms and their handling shall be recorded in the event log.
          l.Provide Application Launcher: Allows operating system command lines (e.g. the invocation of any .EXE file) to be stored within BIS, parameterized and executed at scheduled times.
          ** NOTE TO SPECIFIER ** Attractive when needing two or more of the single features.
          m.Provide Alarm Management Package: Bundle consisting of the single features: Message distribution; Timer; Operator alarm; Application launcher.
          ** NOTE TO SPECIFIER ** You may purchase additional divisions in steps of one.
          n.Provide Additional Division: The division feature allows division of large sites/buildings between autonomous parties, giving each division customized views (user interface, event log), system access and control functions. Private divisions are visible only to their designated operator groups whereas the members/devices of the default common division are visible to all operators.
          ** NOTE TO SPECIFIER ** For instance, a fire department operator can be given full control over smoke detectors and alarms but prevented from operating the access control subsystem. This feature is included in BIS Basic packages (BIS 2.1 and newer) ordered after April 2008.
          o.Provide Multi-Client System: Shall allow system to define permissions that allow operators to monitor and control only designated subsystems or detectors.
          p.Provide Additional Operator License: The number of operator licenses determines how many operators can work in the system simultaneously.
          q.Provide Additional OPC Server License: License to operate an additional OPC server (OPC driver) of any type within BIS.
          ** NOTE TO SPECIFIER ** Automation Engine and Video Engine (for Allegiant matrix) in steps of 100. Bosch detector points are required by peripherals of Bosch subsystems, e.g. LSN detectors for fire or intrusion, Allegiant (LTC) cameras and inputs.
          r.Provide N X 100 Bosch Detector Points: Licenses additional detector points for the entire Building Integration System and the supplementary packages in steps of 100.
          s.Provide N X 1000 Bosch Detector Points: Licenses additional detector points for the entire Building Integration System and the supplementary packages in steps of 1000.
          t.N X 10,000 Bosch Detector Points: Licenses additional detector points for the entire Building Integration System and the supplementary packages in steps of 10000.
          ** NOTE TO SPECIFIER ** You need to order this upgrade package together with one of the above mentioned re-fitting options. Do not forget to quote the serial number of the existing customer system. Please note that license files from BIS 2.1 or older will not run with the new version 2.2.
          u.Upgrade to BIS Version 2.2: This package allows upgrade to existing BIS systems 2.0.x or 2.1.x to the new version 2.2. The package includes: Installation DVD BIS V2.2; Installation CDs BIS 2.0.880 for intermediate update step from 1.4.x with Access Engine; Quick installation guide; Updated license file 2.2 (corresponding to existing serial number).
          ** NOTE TO SPECIFIER ** Products with "EA" are for Easy Access System. Products with "SE" are for Security Escort system. Delete components not required.
 
          2.5SYSTEMS PRODUCTS AND SOFTWARE
          ** NOTE TO SPECIFIER ** Detects the radio transmissions from transmitters. Receives alarm information and relays it to the transponder. Indoor or outdoor enclosures available.
 
          A.Bosch EA102A-304 Receiver:
          ** NOTE TO SPECIFIER ** Activates third party signaling devices, such as siren and strobe units, during an alarm.
 
          B.Bosch EA120B Alert Unit:
          ** NOTE TO SPECIFIER ** Controls receivers and alert units. Relays alarm and test signals from the receivers to the central console.
 
          C.Bosch EA500B Transponder:
          ** NOTE TO SPECIFIER ** A high-performance PIR detector that uses advanced signal processing to provide outstanding catch performance
 
          D.Bosch RF920 Wireless PIR Detector:
          ** NOTE TO SPECIFIER ** Provides concealed protection on doors and windows
 
          E.Bosch RF3402 Recessed Wireless Magnetic Contact:
          ** NOTE TO SPECIFIER ** The introduction of access control in a company is often done in several small steps. At first only a few central areas are monitored. As system needs expands, access control may become part of an integrated security system. Access PE allows you to start small. Your investment is always safeguarded, because it supports the same controllers as Bosch's large scale project based systems.
 
          F.Access Personal Edition Software:
          1.Access Personal Edition V 1.0: Commercial Type Bosch No: ASL-APE-SW:
          a.Features: Compact access control based on Bosch's innovative AMC controller family; Easy installation for quick setup; Minimal PC and Operating System requirements; Multi-user system with definable user profiles.
 
          G.Access Modular Controller:
          1.Access control panels:
          ** NOTE TO SPECIFIER ** Access controller, which is able to work offline and offers host, reader and signal interfaces to manage the access at the entrances.
          a.Bosch AMC2 - Access Modular Controller.
          2.Access hardware Extensions:
          a.Bosch AMC-MUX interface converter: RS-232 into RS-485/422.
          ** NOTE TO SPECIFIER ** An extension module for the AMC-MUX to create a network star topology.
          b.Bosch AMC-MUX-EXT interface extension.
          ** NOTE TO SPECIFIER ** A power supply unit with an integrated battery charging device.
          c.Bosch PBC-60 - power supply and battery charger.
          ** NOTE TO SPECIFIER ** These modules serve additional inputs and outputs to complete AMC2 configurations.
          d.Bosch AMC2 - Input/Output Extension Boards.
          ** NOTE TO SPECIFIER ** This enclosure has been produced in accordance with VDS guidelines and is used for securely mounting and housing the AMC2 and a power supply (e.g. AMC PBC60).
          e.Bosch AMC2 ENC-VDS1 - Enclosure.
          ** NOTE TO SPECIFIER ** AMC2 enclosure with single din rail.
          f.Bosch AMC2 ENC-UL1 - Enclosure - Small.
          ** NOTE TO SPECIFIER ** AMC2 enclosure with two din rails.
          g.Bosch AMC2 ENC-UL2 - Enclosure - Large.
          ** NOTE TO SPECIFIER ** Features; Enhanced Imaging; Image export; Support for 64 bit credential (card. token, or adhesive tag) numbers; iCLASS integration with Smart Card encoding capabilities.
ReadykeyPRO is a Microsoft ® Windows ® 2000 certified product designed and written by a Microsoft Certified Gold Partner. It supports industry standard databases, networks, and identification card printers. ReadykeyPRO is an application compliant with open database connectivity (ODBC). ReadykeyPRO comes standard with an MSDE 2000 database and supports Microsoft ® SQL Server 2000.
 
          H.ReadykeyPRO Systems as manufactured by Bosch Security Systems:
          1.ReadyKeyPRO Software Licenses.
          2.Features:
          a.Enhanced Imaging.
          b.Image export.
          c.Support for 64 bit credential numbers.
          d.iCLASS integration with Smart Card encoding capabilities.
          ** NOTE TO SPECIFIER ** The RKP6200-S32 Server Software License allows the configuration of the hardware for up to 32 readers using one PC. Use the license to: Grant or deny access Define access levels Configure time zones and holidays View and sort alarm information Import custom maps Control elevators* * Elevators must be integrated into the system through elevator card readers.
          3.Bosch RKP6200-S32 Server Software License.
          4.Features:
          a.Setup menus for system configuration.
          b.Custom map creation.
          c.Alarm monitoring controls.
          d.Elevator controls.
          ** NOTE TO SPECIFIER ** The RKP6210 Series Client Software Licenses include the RKP6210-CL software license and the RKP6210-CPID software license. Use these software licenses to run ReadykeyPRO applications on one concurrent client PC (one PC connection per license). The RKP6210-CL Software License adds one additional connection to system administration and monitoring applications.
          5.Bosch RKP6210 Series Client Software Licenses.
          6.ReadyKeyPRO Software Accessories
          ** NOTE TO SPECIFIER ** Integrates with Bosch G Series Control Panels (D9412G, D9412, D7412G, D7412, and D7212 revision 6.3 or higher using a DX4020 or DX4010i interface). Monitors intrusion detection alarms in ReadykeyPRO alarm monitoring. Requires one RKP6210-INT Intrusion Panel Interface Option purchase per intrusion control panel connection.
          a.Bosch RKP6210-INT Intrusion Panel Interface Option:
          ** NOTE TO SPECIFIER ** Creates multiple database scripts for custom database connections.
          b.Bosch RKP6210-DATAX Data Exchange Option:
          ** NOTE TO SPECIFIER ** Allows authorized personnel to perform security tours using identification credentials or keys. Generates alarms if the person arrives early, late, or out of sequence to checkpoints.
          c.Bosch RKP6210-GT Guard Tour Option:
          ** NOTE TO SPECIFIER ** Tracks people through card readers as they enter and exit hazardous areas.
          d.Bosch RKP6210-M Real-time Muster Reporting Option:
          ** NOTE TO SPECIFIER ** Increases the number of supported readers from 32 to 64.
          e.Bosch RKP6210-32 Reader Option:
          ** NOTE TO SPECIFIER ** Allows the RKP6200 server or client to interface with a closed circuit television (CCTV) system using ASCII commands.
          f.Bosch RKP6210-CCTV Option:
          ** NOTE TO SPECIFIER ** Adds one additional concurrent connection.
          g.Bosch RKP6210-CL Client Software License:
          ** NOTE TO SPECIFIER ** Adds one concurrent connection for Photo ID.
          h.Bosch RKP6210-CPID Photo ID Client Software License:
          ** NOTE TO SPECIFIER ** Allows ReadykeyPRO to interface with any SMTP compliant mail server. Custom alarms or event messages can be sent to any e-mail recipient.
          i.Bosch RKP6210-EMAIL Automated E-mail Interface Option:
          ** NOTE TO SPECIFIER ** Modifies any standard field or adds a field or page to the Cardholder screen. This gives the customer ultimate control over the appearance of the Cardholder screen.
          j.Bosch RKP6210-FD Forms Designer Option:
          ** NOTE TO SPECIFIER ** Sends numeric or alphanumeric paging messages from the system to individual or multiple pagers. Requires Wireless Office software (third party).
          k.Bosch RKP6210-PG Automatic Paging Interface Upgrade:
          ** NOTE TO SPECIFIER ** Connects D6600 Communications Receiver/Gateway to a workstation through direct RS-232 or IP addressed D6680 Ethernet Network Adapter.
          l.Bosch RKP6210-REC Receiver Option:
          ** NOTE TO SPECIFIER ** Compares the live video of a user at the card reader with the image of the user stored in the system. Requires the RKP6220-V Video Board and RKP6220-EC Expanded Cable.
          m.Bosch RKP6210-VV Live Video Verification Window Upgrade:
          ** NOTE TO SPECIFIER ** Expanded cable that works with the RKP6220-VB.
          n.Bosch RKP6220-EC Expanded Cable:
          ** NOTE TO SPECIFIER ** Video capture board for composite and RGB video signals. The RKP6210-VV Live Video Verification Window Upgrade requires the video board to display live images and user images.
          o.Bosch RKP6220-VB Video Board:
          ** NOTE TO SPECIFIER ** A blue-green backdrop that provides a solid color surface for photography.
          p.Bosch RKP-CHROMKEY Chromakey Backdrop:
          ** NOTE TO SPECIFIER ** An image capture kit that features a CCP-500 Saerim auto focus/iris, DSP32X digital zoom, color 1/3 in. CCD camera; an S-video camera with 16x AF lens; and a fixed diffused light with tilt head. This kit includes a PCI Video Capture Card and a camera tripod.
          q.Bosch RKP-IMAGECAPKIT Image Capture Kit:
          7.ReadykeyPRO System Hardware:
          ** NOTE TO SPECIFIER ** Contains one power supply, intelligent system controller, and one dual reader interface module.
          a.Bosch LNL-2DRKIT RKP-2 Controller Kit:
          ** NOTE TO SPECIFIER ** Controls RKP6200-S32 Server Software and ReadykeyPRO hardware modules.
          b.Bosch LNL-500 Intelligent System Controller (512 KB):
          ** NOTE TO SPECIFIER ** Primary access control engine for ReadykeyPRO input and output (I/O) interfaces.
          c.Bosch LNL-1000 Intelligent System Controller (1 MB):
          ** NOTE TO SPECIFIER ** Communicates with the LNL-500 Intelligent System Controller (ISC). Has 16 input control points, and two output control points. Acknowledges critical alarm points in monitored areas.
          d.Bosch LNL-1100 Input Control Module:
          ** NOTE TO SPECIFIER ** Provides sixteen Form C relay outputs, status LEDs, and dedicated tamper and power failure input contacts.
          e.Bosch LNL-1200 Output Control Module:
          ** NOTE TO SPECIFIER ** Creates a communications link between the Intelligent System Controller (ISC) and a card reader.
          f.Bosch LNL-1300 Single Reader Interface Module:
          ** NOTE TO SPECIFIER ** Provides communications link between the Intelligent System Controller (ISC) and the card reader
          g.Bosch LNL-1320 Dual Reader Module:
          ** NOTE TO SPECIFIER ** Provides two-way communication protocol conversion and connection to alternative communication devices. Extends the distance between an LNL-500 Intelligent System Controller (ISC) and a downstream device such as LNL-1100 or LNL-1320. Add up to eight devices.
          h.Bosch LNL-8000 Star Multiplexer:
          ** NOTE TO SPECIFIER ** The LNL-830 High Speed Line Driver Series transmit data past the RS-232 limit without the expense of a modem. The Series includes the LNL-837A and LNL-838A Line Drivers.
          i.Bosch LNL-830 High Speed Line Driver Series:
          ** NOTE TO SPECIFIER ** The LNL-100 Converter Series converts RS-232 data to RS-485 data while maintaining high-speed transmission over 2- and 4-wire lines in either full or half duplex mode. The Series includes the LNL-108A and the LNL-109A converters.
          j.Bosch LNL-100 RS-232 to RS-485 Converter Series:
          ** NOTE TO SPECIFIER ** Provides the data speed and transmission output required for the ReadykeyPRO Access Control System. Includes the HOC-56KEXT Communications Cable.
          k.Bosch LNL-DC336K External Modem:
          ** NOTE TO SPECIFIER ** Works in 10/100 Ethernet/Fast Ethernet applications. Features a DB25 with full modem control and a 10/100 RJ45 Network Interface.
          l.Bosch LNL-ETHLAN Micro-Serial Server:
          ** NOTE TO SPECIFIER ** Connects local-area network (LANs) or wide-area networks (WANs) to the Intelligent System Controller (ISC).
          m.Bosch LNL-ETHLAN-MICR Micro-Serial Server:
          ** NOTE TO SPECIFIER ** Integrates devices into a ReadykeyPRO system without a direct network connection.
          n.Bosch UDS-10-01 Device Server:
          ** NOTE TO SPECIFIER ** Power-limited supply and charger. Converts 115 VAC 60 Hz input into a non-power-limited 12 VDC or 24 VDC output.
          o.Bosch RK-AL400ULX Power Supply:
          ** NOTE TO SPECIFIER ** Power-limited supply and charger. Converts 115 VAC 60 Hz input into a non-power-limited 12 VDC or 24 VDC output.
          p.RK-AL600ULX4CB6 Power Supply with Large Enclosure:
          8.ReadykeyPRO Hardware Accessories:
          ** NOTE TO SPECIFIER ** A cable that connects the LNL-500 to the LNL-56KEXT or LNL-DC336K dial-up modem.
          a.Bosch HOC-56KEXT Communications Cable:
          ** NOTE TO SPECIFIER ** A 6 ft (1.8 m) long nine-pin female to 25-pin male PC-to-modem cable.
          b.Bosch HOC-BC00301 Host-to-modem Cable:
          ** NOTE TO SPECIFIER ** A communications cable that connects the LNL-500 to host communications devices (see LNL-ETHLAN micro serial server).
          c.Bosch HOC-ETHLAN Communications Cable:
          ** NOTE TO SPECIFIER ** A replacement lock assembly and key set for standard power supply enclosures.
          d.Bosch LNL-CAM1 Replacement Lock and Key Set:
          ** NOTE TO SPECIFIER ** A plastic adapter for one LN-1300 Single Reader Interface Module.
          e.Bosch LNL-CONV-1 Adapter Plate:
          ** NOTE TO SPECIFIER ** A plastic adapter for up to four LNL-1300 Single Reader Interface Modules.
          f.Bosch LNL-CONV-4 Adapter Plate:
          ** NOTE TO SPECIFIER ** Padded shipping case for the RKP-DEMO Hardware Demo Case.
          g.Bosch RKP-DEMOCASE Shipping Case:
          ** NOTE TO SPECIFIER ** Does not include a power supply. Supports two ReadykeyPRO Access Control Modules.
          h.Bosch RK-CTX Enclosure:
          ** NOTE TO SPECIFIER ** UL Listed hardware enclosure that measures 18 inches by 24 inches by 4.5 inches (45.7 cm by 61 cm by 11.4 cm). Includes lock and tamper switch. Supports up to six ReadykeyPRO Access Control Modules (UL Approved).
          i.Bosch RK-CTX-6 Large Enclosure with Lock:
          9.iCLASS Readers:
          ** NOTE TO SPECIFIER ** Provides contactless smart card technology and proximity technology, curved faceplate design, and distinct audio and visual indicators.
          a.Bosch ARD-R10 iCLASS Mullion Reader:
          ** NOTE TO SPECIFIER ** Provides contactless smart card technology and proximity technology, curved faceplate design, and distinct audio and visual indicators. Suitable for exterior and interior installations
          b.Bosch ARD-R40 iCLASS Switchplate Reader:
          ** NOTE TO SPECIFIER ** Provides contactless smart card technology and proximity technology, curved faceplate design, distinct audio and visual indicators, PIN keypad, and Wiegand output. Suitable for exterior and interior installations.
          c.Bosch ARD-RK40-09 iCLASS PIN Reader:
          ** NOTE TO SPECIFIER ** Modular dual-factor authentication reader
          d.Bosch V-Smart iCLASS Reader:
          10.Pass-through Readers:
          ** NOTE TO SPECIFIER ** The WP644 Series Waterproof Pass-through Readers are compatible with mainstream access controllers that accept Wiegand or clock and data input from a card reader. They are available in two models: WP644B (black) or WP644W (white).
          a.Bosch WP644 Series Waterproof Pass-through Readers:
          11.Traditional and Contactless Credentials:
          ** NOTE TO SPECIFIER ** Traditional credentials, including cards, tokens, and adhesive tags, with unique identity codes to provide a secure working environment
          a.Bosch Traditional Credentials:
          ** NOTE TO SPECIFIER ** Contactless smart card technology in the form of cards, tokens, and adhesive tags for providing enhanced security; credentials are available in 2K bit (256 Bytes) or 16K bit (2K Bytes) configurations
          b.Bosch iCLASS Contactless Smart Credentials:
          ** NOTE TO SPECIFIER ** Randomly-coded card with magnetic stripe. The card is Wiegand 26-bit. Each package contains 25 cards.
          c.Bosch D8230-25 Wiegand Magstripe Card (26-bit):
          ** NOTE TO SPECIFIER ** Randomly-coded swipe card that is Wiegand 26-bit. Each package contains ten cards.
          d.Bosch D8231-10 Wiegand Swipe Card (26-bit):
          ** NOTE TO SPECIFIER ** Randomly-coded proximity card that is Wiegand 26-bit. Each package contains ten cards.
          e.Bosch D8236-10 Wiegand Proximity Card (26-bit):
          ** NOTE TO SPECIFIER ** Randomly-coded and ISO thin proximity card suitable for badge printing. It is Wiegand 37-bit. Each package contains 50 cards to be used with ReadykeyPRO systems only.
          f.Bosch D8237-50 Wiegand Proximity Card (37-bit):
          ** NOTE TO SPECIFIER ** Black insert key token that is 26-bit. Each package contains ten tokens.
          g.Bosch D8232-10 Wiegand Proximity Insert Key Token (26-bit):
          ** NOTE TO SPECIFIER ** Randomly-coded, gray, plastic, Wiegand 26-bit token. Attaches to a key chain. Each package contains ten tokens.
          h.Bosch D8236KF-10 Wiegand Proximity Token (26-bit):
          ** NOTE TO SPECIFIER ** Randomly-coded, gray, plastic, Wiegand 37-bit token. Attaches to a key chain. Each package contains ten tokens. Works with ReadykeyPRO systems only.
          i.Bosch D8237KF-10 Wiegand Proximity Token (37-bit):
          ** NOTE TO SPECIFIER ** Randomly-coded, gray, plastic, Wiegand 26-bit adhesive tag. Attaches to non-metallic surfaces. Each package contains ten tags.
          j.Bosch D8236TG-10 Wiegand Proximity Adhesive Tag (26-bit):
          ** NOTE TO SPECIFIER ** Randomly-coded, gray, plastic, Wiegand 37-bit adhesive tag that attaches to non-metallic surfaces. Each package contains ten tags. Works with ReadykeyPRO systems only.
          k.Bosch D8237TG-10 Wiegand Proximity Adhesive Tag (37-bit):
          ** NOTE TO SPECIFIER ** Non-photo proximity card. Each package contains ten cards.
          l.Bosch D8235A-10 Non-photo Proximity Card:
          12.Photo ID Printers:
          ** NOTE TO SPECIFIER ** Professional single-side, high-volume ID card printer with support for fully customizable watermarks for added security
          a.Bosch Magicard Rio 2 ID Card Printer:
          ** NOTE TO SPECIFIER ** Professional double-side ID card printer with support for fully customizable watermarks for added security.
          b.Bosch Magicard Tango 2 ID Card Printer:
          ** NOTE TO SPECIFIER ** Works with Rio or Tango printers. Includes two cleaning pens, three sticky rollers, and ten cleaning T-cards.
          c.Bosch MC-CLEANING KIT Printer Cleaning Kit:
          ** NOTE TO SPECIFIER ** Anti-forgery frosted security logo across entire card. One-time setup requires artwork and lead time (contact a sales representative for details).
          d.Bosch MC-CUSTOMKEY Holokote Custom Logo Setup:
          ** NOTE TO SPECIFIER ** 14 mil PVC adhesive back cards. Each package contains 1000 cards.
          e.Bosch MC-PVCSTICKY PVC Adhesive Back Cards:
          ** NOTE TO SPECIFIER ** Up to 350 badges.
          f.Bosch MC-RIO-YMCKO Five Panel Color Dye Film:
          ** NOTE TO SPECIFIER ** Anti-forgery frosted security logo across entire card. Requires MC-CUSTOMKEY initial setup before purchasing additional keys for additional printers.
          g.Bosch MC-SECUREKEY Holokote Secure Key:
          ** NOTE TO SPECIFIER ** For double-sided badge printing (color front side and black and white back side). Up to 300 badges.
          h.Bosch MC-TANGO-YMCKOK Six Panel Color Dye Film:
 
          I.Readykey Systems:
          ** NOTE TO SPECIFIER ** Integrates devices into a ReadykeyPRO system without a direct network connection.
          1.IP Micro CoBox and Accessories:
          a.Bosch UDS-10-01 Device Server.
          2.iCLASS Mullion and Switchplate Readers:
          ** NOTE TO SPECIFIER ** Provides contactless smart card technology and proximity technology, curved faceplate design, and distinct audio and visual indicators.
          a.Bosch ARD-R10 iCLASS Mullion Reader:
          ** NOTE TO SPECIFIER ** Provides contactless smart card technology and proximity technology, curved faceplate design, and distinct audio and visual indicators.
          b.Bosch ARD-R40 iCLASS Switchplate Reader:
          3.iCLASS Mullion and Switchplate Readers:
          ** NOTE TO SPECIFIER ** Provides contactless smart card technology and proximity technology, curved faceplate design, and distinct audio and visual indicators.
          a.Bosch ARD-R10 iCLASS Mullion Reader:
          ** NOTE TO SPECIFIER ** Provides contactless smart card technology and proximity technology, curved faceplate design, and distinct audio and visual indicators.
          b.Bosch ARD-R40 iCLASS Switchplate Reader:
          4.Credentials:
          ** NOTE TO SPECIFIER ** A 13.56 MHz contactless smart card programmed to Wiegand 26-bit format. It has two 1 Kb application areas (256 Byte capacity). Each package contains 50 cards.
          a.Bosch iCLASS 2K Wiegand Card (26-bit):
          ** NOTE TO SPECIFIER ** A 13.56 MHz contactless smart card programmed to Wiegand 26-bit format. It has sixteen 1 Kb application areas (2K Byte capacity). Each package contains 50 cards.
          b.Bosch iCLASS 16K Wiegand Card (26-bit):
          ** NOTE TO SPECIFIER ** A contactless smart card programmed to Wiegand 26-bit format. It operates at 125 kHz or 13.56 MHz. It has sixteen 1 Kb application areas (2K Byte capacity). Each package contains 50 cards.
          c.Bosch iCLASS 16K Dual Wiegand Card (26-bit):
          ** NOTE TO SPECIFIER ** A contactless token with smart card technology programmed to Wiegand 26-bit format. It operates at 13.56 MHz. It is 2K (256 Byte) with two application areas. Each package contains ten tokens.
          d.Bosch iCLASS 2K Wiegand Token (26-bit):
          ** NOTE TO SPECIFIER ** A contactless token with smart card technology programmed to Wiegand 26-bit format. It operates at 13.56 MHz. It is 16K (2K Byte) with 16 application areas. Each package contains ten tokens.
          e.Bosch iCLASS 16K Wiegand Token (26-bit):
          ** NOTE TO SPECIFIER ** A contactless adhesive tag with smart card technology programmed to Wiegand 26-bit format. It operates at 13.56 MHz. It is 2K (256 Byte) with two application areas. Each package contains ten tags.
          f.Bosch iCLASS 2K Wiegand Adhesive Tag (26-bit):
          ** NOTE TO SPECIFIER ** A contactless adhesive tag with smart card technology programmed to Wiegand 26-bit format. It operates at 13.56 MHz. It is 16K (2K Byte) with 16 application areas. Each package contains ten tags.
          g.Bosch iCLASS 16K Wiegand Adhesive Tag (26-bit):
 
          J.Generic Readers and Accessories:
          1.D8200 Series Readers as manufactured by Bosch Security Systems:
          ** NOTE TO SPECIFIER ** Includes the D8203 Reader (black) and the D8203W Reader (white)
          a.Bosch D8203/W Series Mullion Proximity Readers:
          ** NOTE TO SPECIFIER ** Card reader suitable for use in harsh environments
          b.Bosch D8221 Swipe Card Reader:
          ** NOTE TO SPECIFIER ** Indoor or outdoor Wiegand reader in black with single-color LED.
          c.Bosch D8222 Wiegand Key Insert Reader:
          ** NOTE TO SPECIFIER ** Provides Wiegand protocol interface capability in a black, easily mounted, weather-resistant enclosure.
          d.Bosch D8223 Prox Pro Reader:
          ** NOTE TO SPECIFIER ** Provides Wiegand protocol interface capability and a keypad in an attractive, easily mounted, and weather-resistant enclosure.
          e.Bosch D8223-P Prox Pro PIN Reader:
          ** NOTE TO SPECIFIER ** Wiegand protocol reader designed for installation on a door mullion.
          f.Bosch D8224 Mullion Reader (Wiegand Compatible):
          ** NOTE TO SPECIFIER ** Provides Wiegand or magnetic stripe compatibility and an indoor and outdoor design.
          g.Bosch D8224-SP Low-profile Proximity Card Reader:
          ** NOTE TO SPECIFIER ** Mounts directly onto metal such as door mullions with no change in read range.
          h.Bosch D8225 Mini Mullion Reader:
          ** NOTE TO SPECIFIER ** Card reader accepts warped, wet, or dirty cards
          i.Bosch D8227 Insert Card Reader:
          ** NOTE TO SPECIFIER ** Access keypad in sturdy, steel enclosure; electronic components sealed in protective material
          2.Access Keypads:
          a.Bosch D8229 Access Keypad.
 
          K.Readers, Cards, and Accessories:
          1.Weigand Interface Readers:
          ** NOTE TO SPECIFIER ** Proximity long range access control reader with Wiegand interface.
          a.Bosch ARD-R90 - iCLASS Reader - America.
          ** NOTE TO SPECIFIER ** Access control card reader with Wiegand output for 125 kHz card technology (EM).
          b.Bosch ARD-AYK12 - RFID Proximity reader.
          ** NOTE TO SPECIFIER ** Access control card reader with Wiegand output for 125 kHz card technology (EM).
          c.Bosch ARD-AYJ12 - RFID Proximity reader.
          ** NOTE TO SPECIFIER ** Access control card reader with Wiegand output for 125 kHz card technology (EM).
          d.Bosch ARD-AYH12 - RFID Proximity reader.
          ** NOTE TO SPECIFIER ** Slim metal anti-vandal reader with 26-bit Wiegand output for 125 kHz card technology.
          e.Bosch ARD-AYQ12 - RFID Proximity reader.
          ** NOTE TO SPECIFIER ** Slim access control card reader with piezoelectric keypad and Wiegand output for 125 kHz card technology (EM).
          f.Bosch ARD-AYCE65B - RFID Proximity reader.
          2.Request-To-Exit:
          ** NOTE TO SPECIFIER ** Consists of the DS150i Detector (light gray) and the DS151i Detector (black)
          a.Bosch DS150i Series Request-to-exit Detectors.
          ** NOTE TO SPECIFIER ** Consists of the DS160 Detector (light gray) and the DS161 Detector (black)
          b.Bosch DS160 Series High Performance Request-to-exit Detectors.
          3.Standby Battery:
          ** NOTE TO SPECIFIER ** Sealed lead-acid standby and auxiliary rechargeable power supply.
          a.Bosch D126 Standby Battery (12 V, 7 Ah).
 
          L.Access Easy Control System:
          ** NOTE TO SPECIFIER ** Access Easy Controller, (AEC) is a new generation access controller that uniquely combines the features of a web server and security system functionality's into one complete unit.
          1.Access Easy Controller V 1.0.
          ** NOTE TO SPECIFIER ** The Access Easy Master Controller (AEMC) offers a centralized access management for all the AECs in the network.
          2.Access Easy Master Controller.
          3.Access Easy Extensions.
          ** NOTE TO SPECIFIER ** Access Easy Extension - 4 Wiegand Interfaces and Door controls (8 IN/OUT), Fitting parts.
          a.Extension Board 4 Wiegand for AEC V 1.0.
          ** NOTE TO SPECIFIER ** Access Easy Extension - 8 Input 8 Output Board, Fitting parts.
          b.Extension 8 Input and 8 Output for AEC V 1.0.
          ** NOTE TO SPECIFIER ** Access Easy Extension Enclosure (AEC EXT) provides the space for extending the basic capabilities of the AEC as and when required.
          4.Access Easy Extension Enclosure.
          ** NOTE TO SPECIFIER ** Controls system operation and houses databases. The software shows the security dispatcher a display with the user or asset location during an alarm event.
 
          M.Central Console Software: Bosch SE2000 Series.
          ** NOTE TO SPECIFIER ** Includes the SE2M-304, SE2U-304, SE2S-SN-304, and SE2U-SN-304 models
 
          N.Bosch SE2 Series Personnel Transmitters:
          1.Model SE2M-304.
          2.Model SE2U-304.
          3.Model SE2S-SN-304.
          4.Model SE2U-SN-304.
          ** NOTE TO SPECIFIER ** Includes the SE3U-304, SE3S-304, SE3M-304 models
 
          O.Bosch SE3 Series Subscriber Transmitters:
          1.Model SE3M-304.
          2.Model SE3U-304.
          3.Model SE3S-304.
          ** NOTE TO SPECIFIER ** Worn like a watch or pendant; when activated, sends a person's identity and location to a central console
 
          P.Bosch SE88 Series Panic Transmitters:
          ** NOTE TO SPECIFIER ** Contains a unique code that becomes associated with the item using the transmitter. Provides supervision, manual duress alarm, and low battery indication.
 
          Q.Bosch SE3401 Point Tracking Transmitter:
          ** NOTE TO SPECIFIER ** Interfaces between the RS-485 signal bus of the Security Escort Transponder and the Serial Bus (RS-232) of the Security Escort Central Station
 
          R.Bosch SE485 Interface:
          ** NOTE TO SPECIFIER ** Black 4.4 cm (1.75 in.) holster with Velcro opening and belt clip.
 
          S.Bosch SE2 Belt Clip Holster:
          ** NOTE TO SPECIFIER ** Plastic belt clip. Each package contains five clips and related hardware.
 
          T.Bosch SE2 Belt Clip:
 
          PART 3EXECUTION
 
          3.1EXAMINATION
 
          A.Examine areas to receive devices and notify adverse conditions affecting installation or subsequent operation.
 
          B.Do not begin installation until unacceptable conditions are corrected.
 
          C.If preparation is the responsibility of another installer, notify Architect of unsatisfactory preparation before proceeding.
 
          D.Ensure selected location is secure and offers protection from accidental damage.
 
          E.Location shall provide reasonable temperature and humidity conditions, free from sources of electrical and electromagnetic interference.
 
          F.Ensure power source is protected against accidental shutoff.
 
          3.2INSTALLATION
 
          A.Installation shall be accomplished in a professional manner by qualified personnel regularly engaged in and experienced in this type of work.
 
          B.Install necessary wiring in accordance with manufacturer's recommendations and this document.
 
          C.All wiring shall be installed in accordance with NFPA 70, the National Electrical Code.
 
          D.Provide a dedicated 120 volt, 20 ampere circuit in separate conduit as a source of primary power for the Central Console.
 
          E.Install all Central Console hardware and software, initialize all databases, and assure real-time communication between the main and backup computers.
 
          F.Perform walk tests and set up procedures for each receiver as specified by the manufacturer to insure that all boundaries of coverage are sufficient to detect alarm transmissions in each intended coverage area.
 
          G.Installation Contractor shall provide complete wiring diagrams to the Electrical Contractor as part of the shop drawing submittal, and shall supervise the installation in order to insure a complete operating and trouble-free system.
 
          H.Install controllers and devices in accordance with manufacturer's instructions at locations indicated on the floor drawings plans.
 
          I.Provide sets of keys for all panels, stations and devices.
 
          3.3FIELD QUALITY CONTROL
 
          A.Installation Contractor shall submit a written test report that the system has been 100% tested and approved. Final test shall be witnessed by the Owner, Engineer, Electrical Contractor, Chief Security Officer, and performed by the Installation Contractor. Final test report shall be received and acknowledged by the Owner prior to request for final payment.
 
          B.Provide instruction to the Owner's satisfaction with regard to proper use and operation of the system.
 
          C.Test snugness of all circuit board mounting screws.
 
          D.Test proper operation of controllers and readers. Present card to the readers to validate if reader functions correctly.
 
          E.Determine and report all problems to the manufacturer's customer service department.
 
          3.4ADJUSTING
 
          A.Make proper adjustment to controller, extensions and readers for correct operation in accordance with manufacturer's instructions.
 
          3.5DEMONSTRATION
 
          A.Demonstrate at final inspection that access control system and devices functions properly.
 
          3.6PROTECTION
 
          A.Protect installed products until completion of project.
 
          B.Touch-up, repair or replace damaged products before Substantial Completion.
 
         
END OF SECTION