48TMSS18R0
48TMSS18R0
TABLE OF CONTENTS
1.0 SCOPE
2.0 CROSS REFERENCES
3.0 APPLICABLE CODES AND STANDARDS
3.1 International Standards Compliance
3.2 Abbreviations
4.0 DESIGN AND CONSTRUCTION REQUIREMENTS FOR CCTV SURVEILLANCE
SYSTEM
4.1 General CCTV Surveillance system
4.2 Design Criteria General
4.3 CCTV Surveillance Cameras
4.4 IP CCTV System Communication
4.5 NVR with storage requirements
4.6 Intelligent Video Analytics
4.7 Computer Control of CCTV
4.8 Ethernet Media Converter
4.9 Camera Junction Box (CJB)
4.10 Video Management System (VMS)
4.11 Network Attached Storage (NAS)
1. SCOPE
2. CROSS REFERENCES
This Transmission Materials Standard Specification shall be read in conjunction with the
latest revision/amendment of Transmission General Specification No. 01-TMSS-01 titled
“General Requirements for All Equipment Materials” which shall be considered as an
integral part of this TMSS.
This TMSS shall also be read in conjunction with Purchase Order or Contract Schedules for
project, as applicable.
4.1 General
4.1.1 The CCTV surveillance system shall meet, or exceed the requirements of this
specifications in all respects.
ii. CCTV Camera shall use Internet Protocol (IP) video technology.
iii. CCTV Camera shall help to ensure normal operations for power
equipment, protect against intrusion, and tampering by un-authorized
personnel, and prevent accident.
iv. CCTV Camera shall monitor the security situation inside and outside
the substation by detecting intruders through sound, movement and
visual monitoring.
v. CCTV Camera shall have high quality (Full HD) of video images that
can be sent over Ethernet TCP/IP networks.
vi. CCTV Camera shall have surge protection and fiber transmission to
reduce electromagnetic interference and high Mean Time Before
Failure (MTBF).
ii. comply the SEC-01 (Security) and SEC-05 HCIS Directives 2017
(also detailed in Company Engineering Specification TES-P-119.21
Rev. 1).
vi. generate an alarm when the video signal from the camera is lost.
ix. be able to monitor & provide early detection, trace and assess an
unauthorized intrusion to the facility in real time so that on site
security personnel may react in a timely manner.
x. monitor the perimeter fence of the Substation and the Main access
gate to the Substation. CCTV with Video Analytics & Access control
devices shall detect intrusions at the Substations and transmit data to
the Security Management System located in the Main Security
Control Center and Main Dispatch Control Center in respective
operating area HQ.
xi. have the capability to print data at the Security Control Center via the
operator console.
xii. handle advanced video analytics features such as virtual fence, virtual
boundary, object tracking-removal and placement, people tracking,
vehicle number plate, tracking-black list/white list as per the project
requirement.
xiv. be open protocol system that shall not require multiple licensing
commitments.
xv. be equipped with power supply and UPS which shall be as per SEC-
07 directives of HCIS latest revision.
a. be used for surveillance and alarm detection, and dome cameras shall
be utilized for indoor facilities surveillance as per National Grid SA
approval.
c. All the surveillance cameras shall have the capability for personal
identification coverage level.
f. The power for the IP MP fixed camera shall be supplied from the
power supply unit installed inside the Camera Junction Box (CJB)
and the power of the indoor cameras will be from DC source or over
the Ethernet (PoE), will be subject to National Grid SA approval.
h. The IP outdoor fixed camera shall have the video output via fiber
optic cable or electrical Ethernet cable as per project requirement and
to be linked directly to the Ethernet switch in the communication
room. The outdoor fixed cameras shall be environmentally sealed
with passive airflow to prevent over-heating, protection from salt
environment, humidity control and sun-guard to reduce direct
sunlight.
t. The IP MP camera shall support G.711 A-Law and G.726 for audio
compression.
a. IP PTZ Cameras shall be colored cameras used for area control by the
operator. PTZ cameras shall be used for assessment at the critical
facilities and buildings.
b. IP PTZ Camera shall monitor the perimeter fence, interior road and
gates.
q. IP PTZ camera Pan Range shall be: 360° Continuous Rotation; Pan
Speed shall be 0.1 to 80° per sec.
j. The fixed IP MP Dome camera lens shall be 1/3” vari-focal auto iris
with minimum adjustable focal length of between 2.5 ~ 75mm and
manual override 30X optical zoom.
Each CCTV camera video output shall have a provision to be connected to Ethernet
switch installed inside a communication room through direct fiber optic cable or
electrical LAN CAT-6 type cables. The video along with any alerts/alarms shall be
transmitted over the switch (primary and secondary link) to the Security Control
Center (SCC) and the Main Dispatch Control Center in respective Operating Area
HQ building using National Grid SA communication Infrastructure.
In the communication room all the video signal links shall be linked to the NVR
system, and transmitted over the MPLS-TP Network to the work stations in the SCC
and Main Dispatch Control Center in the same regional Operating Area of National
Grid SA.
4.5.1 The NVR shall be capable to record video from all proposed cameras locally
and will be recorded as a back-up at the Security Control Center at particular
operating area HQ, while playback shall be possible to be viewed from all
CCTV Workstations.
4.5.2 NVR shall have capacity to store Video for ninety (90) days at eight (8) FPS
on continuous recording and thirty (30) FPS for alarm & events recording.
4.5.4 NVR shall be provided at each site as per SOW for local recording.
4.5.5 NVR shall record the motion detection for each camera.
4.5.6 All Video recording devices shall be connected via the dedicated network
switches at each facility to the Video Management Software (VMS) at the
SCC.
4.5.7 Recording from the cameras to two network storages shall be ensured, one at
the facility for local recording and one will be at SCC for redundant purpose,
or the contractor can choose failover solution (which is preferable because it
shall save huge bandwidth, in that case only, second recording from the
camera to SCC is not required). Therefore, redundant NVR(s) shall be
provided at SCC. It shall be ensured that the back-up methodology in the
SCC shall be by synchronization or archiving with the local recording of each
site.
4.5.8 Video recorders shall support RAID-0,1,5 controllers for hard disks, and hot
swappable dual 230 VAC power supply modules and the capability to be
remotely and easily configured.
4.5.9 If one camera input within the NVR failed to function/record properly, it
shall not affect video recording from any other camera that belongs to this
device.
4.5.10 The NVR equipment shall meet or exceed the following minimum
requirements:
c) The NVR shall operate in 24/7 mode, 365 days per year.
e) NVR shall have On-Board Battery backup in the event that the AC
cord is removed.
g) NVR shall have CD/DVD writer/player media and USB 3.0 port.
h) NVR shall support SNMP ver.3 (or latest ver.) Network Management
and Control.
i) If one NVR is used per site, the controlling server shall be redundant.
k) NVR shall allow view, record, control cameras, handle alarms and
check device status through one interface.
o) Manual export and backup of video via USB 3.0 port, DVD or
network shall be possible.
p) NVR shall have two (2) monitor outputs on VGA, CVBS, and Y/C
outputs.
q) The NVR shall have or support dual Network Interface Card (NIC).
All outdoor IP Fixed Cameras shall support intelligent Video Analytics software.
4.6.1 The Intelligent Video Analytics (IVA) shall provide an early warning to the
SCC operators by alerting them on any potential threat at a given perimeter
zone. The alert is registered as a pre-alert onto the Security Management
System running at the Main Security Control Room and Dispatch SCC
Building.
4.6.2 Each IP MP Fixed camera shall contain its own set of rules for Video
Analytics detection. The user shall be able to configure the rules. It shall be
possible to upload the configuration file locally or centrally to a PC for
backup.
4.6.3 Each IP MP Fixed camera shall embed the Video analytics data in the form
of metadata and transmit it together with the video. The video and metadata
should be stored together.
4.6.4 The IVA shall work by classifying an object based on size and speed to
determine if the object is a vehicle or a person.
4.6.5 The IVA shall be ideal for outdoor perimeter intrusion type of analytics
where small objects such as a flying bird, a walking cat or the motion of trees
can be easily filtered out thus minimizing the false alarming detection rates of
potential intruders.
4.7.3 All operations involving the selection of a zone camera shall be available to
the operator through the operations menu keypad or touch screen.
4.7.4 Camera selection shall be achieved by using simple mouse, touch screen, or
keypad commands.
4.7.6 Automatic camera selection and video display to the operator shall occur for
all alarm events.
4.7.7 The console computer shall allow the operator to perform video routing of
selected cameras to the auxiliary monitors at the Security Control Center
Operator Consoles.
4.8.1 The Ethernet Media Converter (EMC) card shall be built in the camera or
shall be located inside the Camera housing.
4.8.2 The EMC shall enable connection of the IP fixed & PTZ camera over the
single mode fiber optic link connected to the Access switch located in the
communication room.
4.8.3 The EMC shall provide fiber connectivity of the cameras to the access
switches inside the communications room.
a) The EMC card shall be designed for quick and easy installation.
f) EMC shall have LED Status Indicators for Monitoring all critical and
normal operating parameters.
4.9.1 The Camera Junction Box (CJB) shall be installed on each zone around the
perimeter.
4.9.2 Each CJB shall be linked to the communication room inside the control
building over fiber optic cable by establishing a fiber ring.
The cameras in all the remote substation shall be integrated with the latest version of
existing video management software in Security Control Center.
a) The VMS shall be based on a true open architecture that shall allow
the use of non-proprietary workstation and server hardware, non-
proprietary network infrastructure and non-proprietary storage.
d) The VMS shall have native Software Development Kit (SDK), which
shall support Open Network Video Interface Forum (ONVIF).
g) Each camera’s bit rate, frame rate, and resolution shall be set
independently from other cameras in the system, and altering these
settings shall not affect the recording and display settings of other
cameras.
i) The VMS shall be able to retrieve and set the current position of PTZ
cameras using XYZ coordinates.
k) The VMS shall arbitrate the user conflict on PTZ usage based on user
levels per camera.
l) The Server Software Module (SSM) shall not limit the actual storage
capacity configured per server.
c) The USP shall limit the IP ports in use and shall provide the
Administrator with the ability to configure these ports.
e) The VMS shall offer the ability to encrypt the media stream, including
video, audio, and metadata with authenticated encryption.
Media stream encryption shall be done at rest and in transit and be a
certificate-based AES 128-bits encryption.
g) The VMS shall support end to end encrypted streams with cameras
supporting SRTP both in unicast and multicast from the camera.
b. Failover Directory:
vi. The storage shall have a dedicated high speed low latency InfiniBand
back-end communication technology.
viii. Upgrades should take place without change to the proposed controller
configuration.
ix. The Storage shall support data access over 1 Gigabit Ethernet and 10
Gigabit Ethernet front end networking at the same time for flexible
network configuration.
xi. Storage system shall support native Hadoop Distributed File System
(HDFS1.X, HDFS 2.X).
xii. The storage shall be able to mix of Serial attached SCSI (SAS), Serial
ATA (SATA) and Solid State Drive (SSD) disk types within one file
system, providing to end-users and applications an aggregate capacity
and performance view of the system.
xiii. The storage system shall allow creating different capacity and
performance tiers made up of different disk types (SAS, SATA, and
SSD disk types) with a single file system.
xiv. The storage system shall manage data life cycle and migrate files
between the storage tiers using policies based on file age, type, size and
directory location.
xv. The storage system shall provide a way to balance data access
performance across all clients on the network as well as allocate
different bandwidth to different clients to meet the specific performance
demands.
xvi. The system shall have a globally coherent cache, scalable as more
nodes are added to the cluster.
iii. The file system shall be continuously & automatically balancing data
across all storage nodes and disks to eliminate hot spots and
performance bottlenecks.
iv. The File system shall be able to sustain multiple disks and multiple
controller failures and provide access to data at the desired performance
levels. Vendor to mention the protection levels support.
vi. The file system shall allow unlimited number of client access regardless
the operating system and protocols.
i. Storage solution shall not rely on RAID technology for disk protection,
and should protect data and not disk drives.
ii. The storage system shall provide guaranteed protection from silent data
corruption scenarios.
iii. The storage system shall be able to sustain multiple disk and multiple
controller failures. N-way system resiliency shall be provided & shall
support N+1, N+2, N+3, and N+4 (4 simultaneous failure support) and
mirroring at (1x till 8x mirroring).
v. The storage system shall remain fully on-line and all data fully
accessible in the event of failure of any entire enclosure/node.
vi. Rebuild times should be shortened drastically as more storage nodes are
added to the storage system.
vii. shall have Ability to change protection settings on the fly while in
production and without downtime.
viii. The storage system shall support Network Data Management Protocol
(NDMP 3 & 4) for tape backups & restore of any part of the file system,
and support Fiber Channel (FC) tape connectivity directly or via
Storage Area Network (SAN).
i. Include user quotas with hard and soft limits and Over Provisioning
ii. Support automatic data tiering between different disk storage tiers
within a single file system and name space. It shall be capable of
managing data life cycles according to their modification date, age,
type, size and location.
xiv. Support Write Once and Read Many (WORM) and locking mechanism
protection.
xv. Include advanced load balancing mechanism for storage nodes such as
connection count, network throughput and CPU utilization
xvii. Have ability to failover NFS connections in case of node failure without
job restart.
iii. The solution shall support authenticating users and administrators with
Network Information (NIS), Light Weight Directory Adaptation
Protocol (LDAP) and Active Directory.
iv. The storage system shall support Anti-Virus scanning via internet
Content Adaptation protocol (iCAP).
vi. The storage system should support historical performance storage and
analysis.
5.1 General
5.1.1 The SAC system shall meet, or exceed the requirements of this specifications
in all respects.
5.2.2 The System shall meet and/or exceed all Project Specification requirements
listed below and shall have 24 hours 365 days per year availability.
The items listed in this section represent the major devices for the SAC system to be
provided at the substation. Any additional items deemed necessary shall be provided
to satisfy the functional requirements of this specification, i.e. to provide a fully
functional and highly reliable security access control system:
Intelligent Controllers
Reader Modules
Card Readers
IP Cameras to capture video of activities
Video Storage System
Communications link between system elements
Connection to the UPS system
Magnetic locks
Alarm Contact
All equipment and materials used for SAC system shall be standard components that
are non-obsolete or available in the market and shall comply with the latest edition of
the references, unless otherwise noted.
All SAC system equipment and components shall be thoroughly tested and proven in
actual use. The SAC system components shall have Ethernet interface and shall
communicate via TCP/IP.
All system components shall be field proven meaning that after handing over they
have successfully performed for 02 years in similar environment.
5.4.1 Capacity
The SAC System shall acquire all data on demand from the Security Control
Center and shall store data locally as dictated by system design.
CONTRACTOR shall ensure that the SAC System has adequate storage
capacity to store the following data:
The SAC System shall be shipped with at least 50% spare storage capacity.
5.4.2 Redundancy
The SAC system shall have redundancy in order to ensure compliance with
the availability requirements. The contractor shall provide a Fully Redundant
system that will meet all availability requirements.
5.4.3 Backup
The system shall be designed such that there is no data loss due to hardware
or communication failures. This shall be achieved using the appropriate
RAID setting and Hard Disk combinations. The contractor shall provide
Backup Procedures.
5.4.4 Security
All system activities, including operator log-ins, operator actions and card
reader usage shall be logged into the system.
5.5.1 The security management system shall be equipped with access control field
hardware required to receive alarms and administer all access granted/denied
decisions.
5.5.2 The Intelligent Controller shall link the security management system
software to all other field hardware components (card reader modules and
input & output control modules). The Intelligent Controller shall provide full
distributed processing of access control and alarm monitoring operations.
5.5.5 The intelligent controller shall include embedded Web Server for ease of
configuring key hardware attributes:
a. Ports for connecting card readers and data gathering panels via RS485
multi-drop wiring configuration.
g. Issue code support for both magnetic and Wiegand card readers
5.5.6 The System shall include a mechanism to save card user data in case of
power failure. The Controller shall have self-recover software to be
automatically launched in case of controller internal errors.
5.6.1 The iCLASS Proximity Card shall combine iCLASS 13.56 MHz contactless
read/write smart card and Prox 125 kHz proximity technology on a single
card with the ability to add magnetic stripe, barcode, and anti-Counterfeiting
features including custom artwork or a photo identification directly on the
credential.
The card feedstock shall comply with the requirements of ISO/IEC 7810.
a. 13.56 MHz read/write contactless smart card and 125 kHz technology
shall provide high-speed reliable communications with high data
integrity.
d. Shall be available in 2k bit (256 Byte), 16k bit (2k Byte) or 32k bit
(4k Byte) configurations.
5.7.1 All RF data transmission between the card and reader shall be encrypted
using secure algorithms. Additionally, security can be extended from the
reader all the way to the Hi-O enabled access control panel using encrypted
Hi-O communication (Hi-O hardware option).
5.7.2 All Card readers shall be configurable to enable or disable Anti-Pass Back for
that reader.
5.7.3 A valid card iClass proximity access shall allow access automatically after
validation by the system.
5.7.4 The system shall be capable of setting each Card reader to a different security
code or group of security codes. The security code validates that this card is
a valid Facility card.
5.7.5 The Card readers shall only activate Pedestrian gate and/or Main Door of
buildings for a maximum of 10 seconds (shunt time) or until a movement
message is received, whichever is shorter.
e. Three LED’s shall indicate the status of the reader and access control
decision.
h. Two wires shall be provided for data and two wires for power. The
reader shall operate in a bus or star or mixed configuration.
k. The reader head life shall be designed for greater than 1 million
accesses.
5.8.1 If the intelligent controller requires reader module, the Single Reader Module
shall provide a weignad interface between the Intelligent Controller and the
card readers.
5.8.2 Single Reader Module shall operate with any card reader that produces a
standard Wiegand (Data 1/Data 0 or Clock and Data) communication output.
e. The single reader module shall support 3 access modes upon loss of
communication with the intelligent controller. These modes shall be
locked, unlocked, or facility code.
5.9.1 If the intelligent controller requires reader module, the Dual Reader Module
shall provide a weignad interface between the intelligent controller and the
card readers.
5.9.2 The dual reader module shall operate with any card reader that produces a
standard Wiegand (Data 1/Data 0 or Clock and Data) communication output.
5.9.3 A dual intelligent controller shall be able to multi- drop up to 32 dual reader
modules on four separate RS485 ports.
a. Each dual reader module shall support 2 card readers, each of which
may be up to 500 feet from the dual reader module.
c. Each dual reader module shall include 8 supervised inputs and 6 relay
outputs.
f. The dual reader module shall support 3 access modes upon loss of
communication with the intelligent controller. These modes shall be
locked, unlocked, or facility code.
5.10.1 Each IP Camera video output shall connect to an Ethernet Switch installed
inside the Communication Room of the Security Control Center building.
5.10.2 If the distance is more than 90 meters media convertor (built-in or inside the
camera housing) shall be used.
5.10.3 The IP video signal shall be transmitted over the Ethernet switch to the NVR
located in the same Cabinet at the communication room.
5.10.4 In the communication room, all video signals linked to the NVR system shall
be transmitted over Network switches by using National Grid SA
communication infrastructure (i.e. MPLS-TP) to the Security Control Center
and Main Dispatch Control Center at the respective Operating Area HQ.
5.11.1 All installations shall have the ability to present security personnel with a
single interface and user environment for all installed security systems. It
shall allow the security personnel to manage the system from this
environment without regard to the physical distribution on different
platforms.
a. All the proposed security systems shall share data across secured links
and permit the integration of security data with imagery from cameras
and sensor activations. This integrated environment shall be presented
to security personnel across multiple displays that share common
design and management techniques.
d. The alarms and video stream from the Substation shall be routed to
the Main Security Control Center and Main Dispatch Control Center
in respective Operating Area HQ.
The Security System Integration shall comply with the HCIS directives, Sec-
05 section. 4.7.
5.12.1 The SAC system equipment shall be able to operate in the substation
environmental conditions in accordance with the requirements of 01-TMSS-
01. Where possible, it is preferred that the systems automatically compensate
for varying climate conditions.
5.12.3 All communication cables, power supplies and other outdoor equipment shall
continuously operate within specification at ambient temperatures between -
10 and +65°C.
5.12.4 All communication cables shall also be capable of operating under these
conditions while immersed in water.
5.12.5 The SAC system shall have the capability to operate during periods when
there are communication outages between the facility and Main SCC.
5.12.6 In case of communication failure between SCC and local station, Data that is
normally sent immediately to the SCC shall be queued locally till
communications restoration. Immediately upon restoration of
communications between SCC and local station, all queued data shall be sent
to the SCC without manual intervention.
6.1 The SMS at SCC shall be under the control of single software program and shall
provide full integration of all components. SMS shall be alterable any time
depending upon facility requirements.
6.2 The SMS shall have Multi-User/Network Capabilities and it shall support multiple
operator workstations via local area network/wide area network (LAN/WAN).
6.3 SMS shall be Graphical User Interface (GUI), including hardware tree-based system
configuration.
6.4 SMS application shall provide multi-level password protection, with user defined
operator name/password combinations. Name/password log-on shall restrict
operators to selected areas of program. The application shall allow the assignment of
operator levels to define the system components that each operator has access to
view, operate, change or delete.
6.5 SMS shall support industry standard relational database management system.
6.6 SMS shall provide the option to restrict access to sensitive information by user
identity.
6.7 The SMS shall provide multiple levels of data encryption. The encryption shall
ensure data integrity that is compliant with the requirements of Federal Information
Processing Standard-197 (FIPS) and Sensitive Compartmented Information Facility
(SCIF) environments.
6.8 SMS shall include validation based on time of day, day of week,, holiday schedule,
site code and card number verification, automatic or manual retrieval of cardholder
photographs, and access validation based on positive verification of card type (VIP,
Supervisor, Standard), card, card and PIN, card or PIN, PIN only and Site Code only.
7. IP Intercom System
7.1 Intercom Master Station shall support the following minimum requirements:
7.2 Intercom Slave Station shall support the following minimum requirements:
7.2.6 Monitoring,
8.1.1 The sensor set shall be a transmitter and receiver pair used as an active
Infrared Photo Beam in remote monitored CCTV applications.
8.1.2 The Infrared Photo beams should be installed inside 1m or 2m towers 360 deg.
Double sided.
c) The sensor receiver shall have an alarm output (Form C Relay, normally
open or normally closed).
d) The sensor shall have an included PoE IP (PIE-1) Ethernet encoder with
a network port for direct connection to 3rd party supported NVR &
VMS.
e) The sensor shall have “Sniper Viewfinder” for accurate pair alignment.
h) The sensor shall support UDP, TCP/IP, Redwall Event Code Protocols.
The detector[s] shall incorporate a single, Red LED to indicate the operating
conditions. Red LED illuminated shall indicate an alarm condition. Red LED
not illuminated shall indicate a non-alarm condition.
The LED indicator shall feature a 15 Step Process for fast and accurate fine
beam adjustment. On [each] [the] detector, the alignment condition shall be
visually displayed via LED’s on the front of both the receiver and transmitter.
By simply aiming both units and watching the LED indicators, accurate and
reliable alignment shall be achieved. The alignment status at the receiver
shall be optically version transferred to the transmitter and shall be indicated
by the LEDs. To align the transmitter, one shall simply monitor the LED
level while adjusting.
A sounder shall emit a tone at both the transmitter and receiver during
alignment and during walk testing. An alignment viewfinder shall incorporate
a x2 magnification factor. Beam power control must be available in 3
selectable steps.
The detector shall feature protection against Lighting and High EMI
Disturbances. An improved EMI Surge Absorber and High Surge
Resistiveness Relay shall maintain stable operation even in the most lightning
prone areas, and shall remain stable against over 14kV of lightning surge.
The detector shall also utilize selectable beam frequencies to eliminate cross
talk of Beams and to provide accurate beam discrimination.
The detector shall remain stable even in high temperature conditions. The
detector shall be rated to operate within a temperature range of minus 40°
Celsius to Plus 70° Celsius]. The detector shall also tolerate a humidity rate
of 95% max. No false alarm shall occur within these operating conditions.
The detector shall provide protection against rain, dust, and insects by means
of a sealed enclosure housing. The Rubber O-Ring and Rubber Grommets
(IP65) used in the detector[s] shall prevent rain, dust, and tiny insects from
adversely affecting performance. The detector shall feature frost and dew
protection. An anti-frost and convex visor design shall be incorporated to
protect the detector[s] from the effect of frost or snow.
The detector shall contain a durable and high grade Aspherical lens that shall
focus received infrared energy onto the sensor. The sensor and module
combined shall create more sharply defined and precise infrared beams
compared to those created by ordinary lenses.
Fine optical beam alignment shall also be incorporated into the detectors.
8.2.1 The Fiber optic sensor cable shall be used for Perimeter Fence with
Alarm Processing Unit (APU)
8.2.3 Installation
• Sensing cable may be inserted into flexible, protective conduit
• Conduit attached to fence with wire ties
• Loop-back zone configuration
8.2.6 Maximum length of fiber optic sensing cable per zone shall be 500 meters or
as per manufacturer’s recommendation.
8.2.7 Programming method shall be with RS-232 interface using laptop PC.
8.2.8 Communications
RS-232 serial communications, IP/XML
LC/PC polish
8.2.14 Fiber optic fence system shall be compliant to CE, FCC Part 15, RoHS
8.3 All Ethernet switches should be integrated with existing management system.
The equipment shall be type tested at National Grid Saudi Arabia acceptable Independent
Testing Laboratory.
9.2.1 Radiated radio frequency interference test shall be carried out for 30
MHz to 1 GHz according to IEC 61000-6-3.
9.2.2 Conducted radio frequency interference AC/DC Power supply test shall be
carried out for 150 kHz to 30 MHz according to IEC 61000-6-3.
9.3.1 ESD test shall be carried out for +/- 8 kV Contact/air discharge according to
IEC 61000-4-2.
9.3.2 Radiated electromagnetic field test shall be carried out for 80 to 1000
MHz, 80% AM, 1 kHz modulated according to IEC 61000-4-3.
a. Radiated electromagnetic field test shall be carried out for 1.0 to 2.5
GHz, 80% AM, 1 kHz modulated according to IEC 61000-4-3.
b. The burst (fast transient) shall be carried out at D.C./A.C. and ground
power ports according to IEC 61000-4-4.
c. The surge test shall be carried out at D.C./A.C. and ground power
ports according to IEC 61000-4-5.
9.3.3 Radio Spectrum Test shall be carried out for CCTV Surveillance & SAC
system as per ETSI EN 300 328 FCC Part 15.247 RSS-210.
9.3.5 CCTV Surveillance & SAC system shall meet the safety requirements as per
IEC 60950-1.
The following tests shall be carried out as per respective standards mentioned
against each:-
10.1 Where air shipment is used for the equipment, export packing and shipping
shall be adequate for air transport and handling up to the site in Saudi Arabia.
10.2 Wooden crates shall be used, and constructed crates shall allow for adequate
ventilation of internal equipment, so as not to sustain damage to the packed
equipment in periods of outdoor exposure to temperature and humidity in the
environmental conditions specified in 01-TMSS-01.
Unless otherwise specified in the National Grid SA Project Scope of Work and Technical
Specifications or Material Purchase orders, the following shall be supplied with CCTV
surveillance and SAC system.
11.1 One (1) copy in paper format of the Operation and Maintenance manual.
11.2 One (1) copy in electronic form (in CD-ROM ) of the operation and maintenance
manual, related drawings, factory tests and other data associated with the equipment.
Electronic format of this should be in Adobe Acrobat PDF format readable with
11.3 One (1) copy of the factory documentation test for the specific CCTV
surveillance and SAC system (to be included with the equipment).
11.4 One (1) copy of the configuration information (hard copy) be included with
CCTV surveillance and SAC system.
REFERENCE
SECTION NO. DESCRIPTION 'A' 'B' 'C'
REFERENCE
SECTION NO. DESCRIPTION 'A' 'B' 'C'