Attachment 4b - Data Center Report
Attachment 4b - Data Center Report
Attachment 4b - Data Center Report
10 COMMUNICATION SYSTEMS
10
10 | COMMUNICATION SYSTEMS
10 COMMUNICATION SYSTEMS
10.1 Local Area Network and Wide Area Network (LAN/WAN)
10.1.1 Introduction
The LAN/WAN system will provide a consolidated communications infrastructure comprised of
copper and fibre optic cables routed throughout the airport facilities and the active network
equipment needed. This system should provide transmission media for video, voice and data
signals.
The objective of the network is to provide universal access to voice, video and data services over
a common network infrastructure. It will be a scalable, reliable, highly available three-layer IP
network transport infrastructure to meet the performance and operational needs of the airport.
The LAN/WAN system will provide a base layer for communications between all systems and
users at the airport.
The design shall address issues as high availability, scalability, modularity, manageability, future
development potential and low operating and maintenance costs.
The LAN/WAN System will provide services at least to:
○ Operations;
○ Security;
○ Infrastructure;
○ Airport Staff and Administration;
○ Airlines;
○ Internet Access;
○ Telephony Access;
○ Etc…
Access
Aggregation
Access
Distribution Core
Internet
...
Core
Access
PSTN
Aggregation
Access
Datacentre 1
For the design of the Optical Fiber Ring, it is necessary to consider a double ring, what means
two Physical different rings connecting each building of the ring. Each building shall have two
separate manholes for each FO entrance.
The drawing shows how the ring need to be performed, but how the ducts will be deployed
depends on the constructor design.
46.Staff
25. Ops&Mto
Parking
29.Parking
38. Chillers
Area
42.Electrical 32.Entrance
Charging Drop
28.Gas
31.Vip Drop
Station
Functional Requirements
The design shall address issues as high availability, scalability, modularity, manageability, future
development potential and low operating and maintenance costs.
The LAN/WAN network should provide connectivity and communications service for all
buildings and all infrastructure that should need any data or voice transmission at the airport.
As security and performance requirements are different depending on the final user (or
department) the LAN/WAN would be logically divided into subnets.
Communications should not be possible between elements located in different subnets. Only
predefined interface points, with firewall and routing capabilities, should be allowed to connect
to more than one subnet.
The areas which shall be supported by network connectivity include but are not limited to the
following:
25 OPS&MTO
26 VIP Hangars
27 Airside Parking
28 Gas Station
29 Parking area
31 VIP Drop
32 Entrance Drop
33 Sec. Entrance
34 Cargo + BHS
35 Admin Building
36 ATC TWR
37 ARFFS
38 Chillers
39 Water Tanks
40 Power Plant
41 Fuel Farm
42 Electrical Charging
46 Staff Parking
49 Staff PTB
41 Fuel Farm
42 Electrical Charging
46 Staff Parking
49 Staff PTB
External communications interface should provide service to, but not limited to, the next
systems:
○ Redundant internet access;
○ ATM networks;
○ Fixed and Mobile Telephone Providers;
○ Airline systems.
The network shall be able to transport both layer 3 and layer 2 Multi-Protocol Label Switching
(MPLS) VPNs (Virtual Private Networks).
The network background traffic (service traffic, routing updates and management traffic) shall
never exceed 10% of the total bandwidth of any link.
The design shall address issues as high availability, scalability, modularity, manageability, future
development potential and low operating and maintenance costs. As the operational hours of
an airport are 24x7x365, robustness, stability, scalability and ease of management and
maintenance are key design considerations.
All switches shall have a minimum slot and interface port spare capacity of 20% for future
expansion.
All endpoint outlets should be connected to its Access layer switch port.
The SSI Equipment shall guarantee the protection of systems and data against accidental acts
or deliberate attacks. This protection shall meet four objectives:
○ Availability;
○ Integrity;
○ Privacy;
○ Identification.
At this stage, the regulatory framework is not indicated yet. The only framework indicated at
this level is the ICAO 8973 chapter 18 10th edition 2017 or newer if available.
It is recommended to follow the ISO 27000, 27001, 27002 and 27005 standards, as well as the
ANSSI recommendations.
The Security Equipment/Firewalls to be provided to guarantee the security of the information
exchanged shall provide at least the following functionalities:
○ Filtering;
○ IDS/IPS;
○ Proxy;
○ Antivirus;
○ IPSec/SSL;
○ VPN Server.
The SSI solutions will be distributed in the different layers of the Information Systems. The
proposed solution should allow a correlation of events that occur at different levels and show
the alerts to the IT Department in the AOCC operational centre to be determined through rule
mechanisms.
The security equipment shall interact with:
○ All Active equipment and network management solution;
○ Wireless network (Wi-Fi) equipment;
○ All systems and equipment connected to the network shall be supervised;
○ AOCC: The operator shall have a monitoring interface that integrates different security
elements.
Design Criteria
All critical equipment shall be back up with an Uninterruptible Power Supply (UPS) that shall
maintain the system during at least 2h.
10.1.5.2.1 Cabling
Only Basic cabling requirements are included in this chapter for initial design purposes. Final
and more accurate requirements list shall be done in later design stages.
F/UTP Category 6A rated for horizontal cabling, STP when critical systems are involved.
The horizontal cable length from the distribution room to the telecommunications
outlet/connector shall be no more than 90m long.
A 10m allowance is made for the combined length of patch cords and cables used to connect
equipment.
Sufficient space should be provided in the telecommunications outlet box or equivalent space
so that minimum bend radius requirements are not exceeded.
If an outlet is required outside of the 90m requirement for copper cabling and the requirement
is deemed to be too low density to design an additional communications room, fibre optic
cabling should be utilized.
Multi-mode or single mode (depending on bandwidth and distance) for vertical and WAN
backbone.
The multiple dual ring fibre optic backbone network consists of an A & B fibre optic cable. The
ring cables contained in the dual ring networks have an identical core count.
Buildings shall be provided with a dual ring backbone cable to support the two feeder cables.
A feeder cable is provided from each dual ring to each building entry from diverse splices. These
building entry points are then either located within or connected directly to the building
distribution rooms via a minimum of two twenty four (24) core fibre optic cables routed
separately from different manholes, within the same building in order to achieve maximum
pathway diversity.
The backbone optical fibre cable system shall consist of high capacity, loose tube,
nonconductive, multi-core, low loss, dry water blocking, rodent resistant, aramid yarn di-electric
armouring, loose tube, gel filled polyvinylidene fluoride (PVDF) or high density polyethylene
(HDPE) sheath, inside/outside plant cable.
10.1.5.2.2 Racks
Technical Rooms shall be equipped with 19" racks. Unless recommended by the manufacturer,
all active equipment will be installed in these racks.
○ Minimum Dimensions: 800mm x 800mm;
○ Other Dimensions: 800mm x 1000mm or 1200mm for active equipment in some cases;
○ Minimum Height: 42 U;
○ Optic drawers;
○ Cable-pass panels;
○ RJ-45 connector patch panels;
○ Two (2) Power Distribution Units (PDUs) connected in two (2) different circuits;
○ Access to the equipment shall be protected by a key lock.
All core switches shall be connected to each other in a fully redundant partial mesh. Each Core
switch shall be connected to at least two (2) other Core switches. All Core switch interfaces shall
be at least 10GBASE-X.
All connections between Core and between Core and Distribution/Aggregation switches shall
utilize load balancing.
The Core switches shall support VLAN (IEEE 802.1Q). A minimum of 4096 VLAN’s shall be
supported.
The core switches shall be mountable in 19-inch standard rack.
Aggregation/Distribution switches shall collect 1000BASE-X and 10GBASE-X uplinks from Access
switches and transmit 10GBASE-X Ethernet signals to two Core switches.
All connections between Core and Aggregation/Distribution switches shall utilize load
balancing.
All connections between Aggregation/Distribution switches and Access switches shall utilize
load balancing.
The connections from each Distribution switch to two physically separated Core switches
(located in each Data Centre) shall be 10 Gbit/s SR/LR/ER interfaces. If more than 10 Gbit/s are
needed, the interfaces shall be bundled as one logical channel using LACP.
Every Distribution switch shall be paired with another Distribution switch connecting the same
access switches.
Every Aggregation switch shall be paired with another Aggregation switch connected to the
same pair of Core Switches.
Access switches should connect to the Aggregation/Distribution switch pair through a
1000BASE-X or 10GBASE-X connection to each switch. Distribution switches shall support
modular interfaces (SFP or GBIC).
The Aggregation/Distribution switches shall support VLAN (IEEE 802.1Q). A minimum of 4096
VLANs shall be supported.
The Aggregation/Distribution switches shall support LACP (IEEE 802.3ad).
The Aggregation/Distribution switches shall be mountable in 19-inch standard rack.
○ Minimum performance data:
● +400 mpps Layer 3 forwarding;
● +50.000 MAC entries:
● +128.000 routes.
○ A switch fabric capable of supporting a minimum of 250Gbps bandwidth;
○ A non-blocking backplane with full load of all switching modules-between modules and in
case of inter-module trunking.
The Aggregation/Distribution switches shall be equipped with redundant hot-swappable power
supplies to be connected to two (2) different power distribution circuits.
The Aggregation/Distribution switches shall be able to automatically shut down in case of
overheating.
The Aggregation/Distribution switches shall be able to withstand a Denial of Service (DoS) attack
without significant performance degradation.
The Aggregation/Distribution switches shall support full routing functionality for both IPv4 and
IPv6.
The supported routing protocols shall include Static, OSPF, LDP and MPBGPv4.
OSPF, LDP and MP-BGPv4 shall support MD5 authentication.
Multi-Protocol Label Switching (MPLS) shall be supported.
MPLS (LSP) Ping and TraceRoute shall be supported.
Access Lists shall be configurable for VLANs, Ports, Routers and MAC addresses.
RSVP should still be enabled in the network though. It shall be used for MPLS Traffic Engineering
(TE).
On one hand, the network should not be congestion free, but on the other hand, there is always
more than one link between any switches in the network. TE shall be used to shape and steer
the traffic along the best path in the network at any given time. If for example there is
congestion on a link between an Aggregation switch and Core switch, TE shall automatically
route additional traffic through another path to ensure that the traffic is treated according to its
SLA parameters.
The Aggregation/Distribution switches shall therefore support RSVP-TE.
Fast Re-Routing (FRR) of TE tunnels in case of a link failure is a requirement.
The Aggregation/Distribution switches shall support Spanning Tree including IEEE 802.1w Rapid
Spanning Tree (RSTP) for loop-prevention and IEEE 802.1s Multiple Spanning Tree Protocol
(MSTP) or similar for layer 2 load balancing over redundant links.
Access Switches shall provide 10/100/1000BASE-T Ethernet ports to attached end user devices
or servers and redundant 1000BASE-X or 10GBASE-X (depending on load prevision) to the
Distribution/Aggregation layer.
All switches shall have a minimum of two (2) uplink ports to the Distribution/Aggregation layer.
Some end user equipment should need to be connected through fibre either because it is
located too far away for twisted pair cabling or because the equipment is located outside.
All Access switches shall be connected to two (2) Aggregation/Distribution switches with
1000BASE-X or 10GBASE-X Ethernet interfaces.
All end user devices or servers shall be connected to the Access switches with 10/100/1000BASE-
T or 10GBASE-X uplinks.
Some servers need more bandwidth than one 10/100/1000BASE-T uplink can provide and may
therefore be able to bundle two or more 10/100/1000BASE-T interfaces through IEEE 802.3ad
Link Aggregation. Access switch shall therefore support this functionality.
All Access switches shall support Power over Ethernet (IEEE 802.3af) or preferably PoE+ (IEEE
802.3at) for Wireless Access Points, IP-telephones, IP-based cameras or similar.
To minimize the risk of loops in the net, only one device (one MAC address) shall be connected
to end user switch ports unless the connected device is an IP phone with built in switch ports.
The switch configuration shall take this into account. If more than one device is connected to a
switch port, the port shall go in administrative shutdown for five (5) minutes, and a Simple
network Management Protocol (SNMP) trap shall be transmitted detailing the event.
The Access switches shall support VLAN (IEEE 802.1Q). A minimum of 4096 VLANs shall be
supported.
The Access switches shall support LACP (IEEE 802.3ad).
The Access switches shall be mountable in a 19-inch standard rack.
The Access switches shall include a non-blocking backplane.
The Access switches shall provide redundant power supplies to be connected to at least two (2)
different power Distribution circuits.
The Access switches shall be able to automatically shut down in case of overheating.
The Access switches shall employ broadcast-, multicast- and unicast storm control to prevent
faulty end stations from degrading the switch performance.
Similarly, the Access switches shall be able to withstand a Denial of Service (DoS) attack without
significant performance degradation.
Access Lists shall be configurable for VLANs, ports and MAC-addresses.
Access switches shall be able to classify and remark the data traffic to the Differentiated Services
Code Point (DSCP) values determined in the QoS schedule. DSCP markings shall not be
accepted at the ingress ports to the Access switches, with the only exception being where the
IP Phone has a built-in switch where DSCP marking can be done.
The Access switches shall support Spanning Tree including IEEE 802.1w Rapid Spanning Tree
(RSTP) for loop-prevention and IEEE 802.1s Multiple Spanning Tree Protocol (MSTP) or similar
for layer two (2) load balancing over redundant links.
The Access switches shall support IEEE 802.1X for port-based security on end user ports. All end
user ports shall be assigned to VLANs dynamically based on the 802.1X authentication unless
the port is manually configured for a specific VLAN.
All Access switch end user ports shall support IEEE 802.1p. 802.1p shall be used to ensure that
IP telephones are put into the proper VLAN and gets the proper QoS treatment.
Protocol Independent Multicast shall be supported including Protocol Independent Multicast
(PIM) Sparse Mode.
Internet Group Management Protocol (IGMP) Snooping shall be supported for fast IP multicast
client joins and leaves.
Dynamic Host Configuration Protocol (DHCP) Snooping shall be supported to avoid spoofing of
DHCP servers.
The Access switches shall be able to mirror traffic on one port to another for monitoring and
fault handling.
OTHER SYSTEMS
CONTROL CENTERS
○ All hardware data shall be coordinated with the design drawings, bills of material and basis
of quantity documents.
○ Fully licensed hardware shall be provided for use in the live Operational environment.
○ The components, software and technologies to be employed in the design should be well
proven and conform to the international and industry defined open standards.
○ The provision of the equipment (hardware, software, middleware, firmware, etc.) and
materials should be of international and industry defined standards. The equipment and
materials to be installed and supplied should be of the latest models/standards prior to
delivery, and these provisions should be easily upgradeable to the new standards in use at
any time.
○ All systems should operate under Saudi Arabia´s environmental conditions.
○ The Availability of the entire system over a period of twelve (12) months shall be at least
99.99%.
The LAN system shall be configurable depending assuming the future growth of Amaala
Airport. With the progressive development of the different stages of Amaala airport Master
Plan additional displays will have to be installed to cover the new environments to be built,
although the system will have capacity to assume this increase in the number of managed
devices without requiring any system upgrade or new investment. Infrastructure
Requirements.
Scalability: For future expansion it shall be possible to include additional switches. The
LAN environment will be able to support at least up to 15% switches more and will be able
to support a future growth in the next years of operation. System resources (core/switches
capacities, memory, and network bandwidth) will be dimensioned accordingly.
The Supplier shall provide expansion and reserve capacities for any equipment, if required.
Power supplies shall have a capacity of 1.5 times that required for the proposed design.
Sufficient input/output communications ports shall be physically provided to meet the
specified requirements plus 20% spare capability.
Redundancy
LAN Core/aggregation switches shall be installed in the Data Centre at the Airport.
The management software system to be finally deployed in the Data Centre should use the
virtual server technology.
Optimization of resources should be maintained and the environmental and physical
capabilities of the Data Centre respected. Reliability and cost shall be key decision features
together with the ability to use power efficiently with a view to keeping operating costs to
a minimum.
The System shall be deployed in such a way as to provide a redundant, hot failover ensuring
no single point of failure solution.
The System shall be fault-tolerant, with back-up or redundant capacity built-in and should
have the following service continuity considerations
○ High Availability: A high-level of system availability is required. The System shall be designed
to meet the availability requirements. This may be met through high reliability available in
each component, through redundant servers, or a combination of the two.
○ Hot Swappable: System shall be designed to allow for the replacement of failed or failing
components while the system is operating, up to and including replacement of cards,
components, and other discrete modules of the system.
The following table sums up in a high-level overview the deliverables to be provided by the VoIP
supplier during the project:
ID Deliverable Phase
10.2.1 Introduction
The objective of the VoIP System is to enable the users in the airport to communicate internally
and externally, to the PSTN through the Voice Gateways. All the VoIP infrastructure should rely
on the usage of the local multiservice LAN/WAN backbone.
The system should be scalable, reliable, highly available IP Telephone System (VOIP) to meet the
performance and operational needs of the airport and the integration of the new system with
the other voice communication systems present at the Airport.
The VoIP System comprise all internal deployment for the internal telephony and also the
configuration of a gateway through the LAN/WAN PSTN to be able to generate outside calls
through the designated telecom operator.
○ IP terminals and client devices: Desk or wireless phones or even a software phone application
that runs on a PC must be provided. IP phones must have all the functions expected from a
telephone, as well as more advanced features such as the ability to access web sites.
○ Billing server: Management software application suite for call accounting, cost control and
phone network optimization must be provided.
○ Recording call system: The system should be able to record selected calls.
○ Management tool Telephones to configure all features. Web interface configuration shall be
available.
Although this document provides a conceptual and schematic design to enable the physical
elements of the terminal to be coordinated, the Supplier shall have complete responsibility for
the design and integration of the VoIP system. The VoIP procurement include the:
○ Detailed information of the telephone’s installation in workplaces, information, counter or
boarding desks, or any location required.
○ The design, deployment, installation and integration of all VoIP system.
LAN/WAN
IP Terminal
Fax
The VoIP is required to enable the users in the airport to communicate internally and also
externally for mobility services.
The VoIP architecture is composed of the following elements:
○ Call Processing Cores: The Call Processing equipment is the core processing equipment in
an IP telephony scenario. It can also integrate other added value services such as unified
messaging, presence, instant messaging, collaborative work, IP fax servers, multi-conference,
video calls, video conference, wireless IP telephone, etc.
○ Voice Gateways: The voice gateways allow the IP telephone systems to be able to establish
communication with the public switched telephone network or with other telephone
exchanges.
Functional Requirements
The system shall be capable of supporting the total number of IP Telephones required plus 20%.
The overall system shall be capable of expanding to support a minimum of 200% more users.
Design Criteria
All critical equipment shall be back up with an Uninterruptible Power Supply (UPS) that shall
maintain the system during at least 2h.
The Call Processing equipment is the core processing equipment in an IP telephony scenario. It
can also integrate other added value services such as unified messaging, presence, instant
messaging, collaborative work, IP fax servers, multi-conference, video calls, video conference,
wireless IP telephone, etc.
Two (2) main call processing units should work together as a single IP PBX system, also known
as cluster. The cluster should be distributed across the IP network, one call processing unit in
each Data Centre, to allow for physical redundancy.
The cluster shall be operating as a Primary/Backup configuration. In normal operation, Primary
server should oversee all services, backup should only have the state of operation updated. Any
changes made on the primary shall be automatically replicated to the secondary such that
should one of the servers fail, the other should automatically control all call setups and tear
downs.
Primary and backup servers shall be installed physically separated, in different buildings, in
different Data Centres.
The call processing and management solution shall include voicemail and telephony
conferencing services.
It shall include Interactive Voice Response (IVR) functionality up to thirty (30) simultaneous
connections and multi-language support. IVR shall have text to speech functionality.
The call processing and management equipment shall include standard call centre
functionalities for up to twenty (20) agents (five (5) working simultaneously).
The system shall achieve an availability of 99.999% assuming a two (2) hour MTTR.
The Voice Gateways allow the IP telephone systems to be able to establish communication with
the public switched telephone network or with other telephone exchanges.
The main function is to convert the traditional voice to packets that are adequate for the
transmission of voice traffic over a TCP/IP network and vice versa. For this purpose, it uses
Digital Signal Processors (DSPs), which are in charge of doing this conversion using algorithms
that can digitalize, packetize and compress the voice.
Communication endpoint is a user instrument such as a desk phone, wireless phone or even a
software phone application that runs on a PC. In an IP environment like this, each phone has an
Ethernet connection. IP phones have all the functions expected from a telephone, as well as
more advanced features such as the ability to access web sites.
Base key telephone handset features to be supported should include:
Voice messaging and fax services shall be integrated with the system.
A voice messaging platform allows to manage voice messages in a variety of ways using email
inbox, web browser, phone and smartphone, etc.
Fax integration allows to send and receive faxes via standard fax devices or even using a desktop
software in a computer or smartphone.
The Base Station shall be capable of showing Voltage Standing Wave Ratio (VSWR)
measurements or return power on the Feeder Cable and measuring its own Output Power.
The Billing tool is the management software application suite for call accounting, cost control
and phone network optimization. Among other features, it provides:
The recording system shall be capable of recording at least fifty (50) simultaneous calls.
The system should be able to keep the recording data for at least thirty (30) consecutive days.
The system should be upgradable and scalable.
The system should be able to record selected calls, such as: unidentified calls, calls incoming or
outgoing from/to a given number, or any call as per user command.
The system should include remote management using web interface.
The system should include remote monitoring and management via SNMP.
The telephone configuration shall be accessible to users via web browser interface to make
changes to the user set-up features such as call preference, divert, voice mail, etc. All features
that can be configured from the desk-phone shall be available from the Web interface.
The web interface shall provide a manager to enable authorized users to manage multiple
devices profiles.
The whole VoIP system shall be able to be managed remotely through the network.
The equipment shall support network management through the latest version of Simple
Network Management Protocol (SNMP) and Management Information Base (MIB).
OTHER SYSTEMS
CONTROL CENTERS
WLAN MCS
information shall be delivered on CD-ROM. All compilers, case tools, utilities, etc. that are
needed to create the executable code shall be included.
Perpetual commercial off-the-shelf software licenses shall be provided.
Software support shall be granted within the terms of the warranty.
All software user interfaces shall use the English language as default.
Systems shall handle dates using Gregorian calendar.
Software support shall include upgrades to newer versions of software where appropriate.
A Software Development Kit shall be provided with each application.
installed and supplied should be of the latest models/standards prior to delivery, and these
provisions should be easily upgradeable to the new standards in use at any time.
All systems should operate under Saudi Arabia´s environmental conditions.
Telephone Specifications
Basic phone: Graphic display, phone address list (1000 contacts) and list of calls, media and
signal circulation, authentication by IEEE 802.1x. Updating by software.
Standard phone: Graphic colour display of 3.5", screen with adjustable tilt, variable function tabs
(soft-keys), quick mark buttons, phone address list (1000 contacts) and call list. Signal cyphering.
Authentication by IEEE 802.1x. Updating by software.
Advanced phone: Display colour graphic of 4.3”. Web navigation, touch screen, self-tightening
keys, menu with icons, two pages with quick marking keys, phone address list (1000 contacts)
and list of calls. Signal cyphering. Authentication by IEEE 802.1x. Updating by software.
The Mean Time Between failures (MTBF), Mean Time To Repair (MTTR), Mean Time Between
Critical Failures (MTBCF) and Availability figures of all the equipment proposed should be
provided and the overall system, indicating the method used for the calculation, such as MIL-
HDBK-217. If sub-system MTBF, MTTR, MTBCF, and Availability numbers are submitted, these
shall be rolled up into an overall system MTBF, MTTR, MTBCF and Availability numbers. The
MTBF, MTTR, and the MTBCF numbers of other sites with similar types of equipment installed
should be provided so the quoted numbers may be verified.
A list of parts which are unique to the system and which in case of failure would be considered
critical and cause a suspension of service should be provided.
The MTBF, MTTR, MTBCF and Availability numbers for the communication equipment and its
subsystems should be provided separately.
The Availability of the entire system over a period of twelve (12) months shall be at least 99.99%.
Redundancy
Call processing cores, voice gateways, fax and billing servers and billing system shall be installed
distributed within both data centres.
Optimization of resources should be maintained and the environmental and physical capabilities
of the Data Centre respected. Reliability and cost shall be key decision features together with
the ability to use power efficiently with a view to keeping operating costs to a minimum.
The System shall be deployed in such a way as to provide a redundant, hot failover ensuring no
single point of failure solution.
The System shall be fault-tolerant, with back-up or redundant capacity built-in and should have
the following service continuity considerations
High Availability: A high-level of system availability is required. The System shall be designed
to meet the availability requirements. This may be met through high reliability available in each
component, through redundant servers, or a combination of the two.
Hot Swappable: System shall be designed to allow for the replacement of failed or failing
components while the system is operating, up to and including replacement of cards,
components, and other discrete modules of the system.
ID Deliverable Phase
10.3.1 Introduction
A Public Address System (PAS) shall be provided to enable the making of general
announcements and for the annunciation of instructions during evacuation of the buildings.
The PAS system is intended to deliver emergency voice messages, as a primary use, in line with
international requirements. As a secondary use, the system has been designed to deliver non-
emergency messages, such as paging and general public announcement messages.
The PAS system has not been designed for background music reproduction. However, it shall
have the facility to allow connection of a background music source, such as a music server.
The PAS system shall provide audio reproduction coverage for all public of the building, being
suitable for its use for both emergency and non-emergency voice announcements and using
either microphones or a digital message store as the source for such announcements. Staff and
other areas should be at least covered with Fire Alarm sounder/strobes, but the final PAS
coverage shall be defined with a site survey considering airport security and operational needs.
The PAS shall provide standard public address functionality while adding an expanded feature
set. Using the latest digital audio and network technologies end users shall be provided with
system control and monitoring. This provides a feature rich system that is easier to maintain
and administrate.
The system shall utilize standard network topology that allows a distributed architecture.
Traditional systems require all speaker and microphone cabling to converge at one room, the
PAS System shall allow cabling to be run to the nearest communications room with paging
hardware. The end result shall be less speaker and microphone cable. By leveraging the existing
Ethernet network as the system backbone new hardware can be added anywhere with a network
connection.
It is recommended to define operating areas that may facilitate the management of the
messages through the speakers.
The PAS System procurement will include all hardware, software, and infrastructure needed to
create an audio passenger communication system. Basic functions that shall be provided by the
PAS system will be the following ones:
UL 864 Standard for Control Units and Accessories for Fire Alarm Systems
All activities which may be necessary to complete the design and installation of the
PAS devices;
Installation, setup and configuration and associated activities necessary to deliver
an operationally ready PAS. The IP addressing scheme and VLAN requirements
shall be developed with the Common Network Supplier;
Supply of hardware as specified for the system;
PAS monitoring application in charge to interface with the Fire Alarm System and
all the other systems that may be required to make the system fully operational;
Installation, configuration and testing of the system hardware and software.
Although this document provides a conceptual and schematic design to enable the physical
elements to be coordinated, the Supplier shall have complete responsibility for the design,
location and integration of the PAS.
The PAS System to be provided by the Supplier shall correspond to the need of announcements
throughout the various classified zones. The System provided and installed shall be of proven
efficiency according to existing references in other recent International Airport installations.
The Supplier shall divide the terminal into functional zones corresponding to their utilization
and different announcement. These zones shall be split into categories and levels regarding the
emergency and evacuation plan.
The Supplier shall provide an electroacoustic study to optimize the zones and speakers, and the
audio quality of the speakers.
The PAS supplier shall accept any design change request (due to external conditions such as the
construction works or other systems design) which shall not have any justifiable extra-cost for
the Supplier.
The PASS software and system customization is part of the Supplier´s scope in order to support
all the functionalities requested in this document.
The PAS supplier will provide cooling, ventilation and power information to the MEP supplier to
ensure the proper working of all the PAS system components.
All the measures provided in the Specifications should be given using the International System
of units (SI).
DATA CENTER 1
AMPLIFIER A1
CENTRAL PROCESSOR - A
SWITCH LAN A
AMPLIFIER AN
DATA CENTER 2
CENTRAL PROCESSOR - B
AMPLIFIER BN
TEXT TO SPEECH
SERVER - B TERMINAL AREA N
DIGITAL PAGING
STATION
DIGITAL PAGING
STATION
The system shall be based on redundant link architecture, such that no single failure in
connections between amplifiers or central processor will result in any loss of system
performance.
The system shall utilize fibre optic and copper cabling infrastructure for the backbone of the
announcement distribution, management and maintenance operation. Equipment shall provide
the appropriate interfaces to the copper and fibre optic cabling to implement all required paging
and associated functions.
The following elements will compose at least the scope of supply for the PAS system:
Servers: The server coordinates all activities of the PAS System and provides storage
for databases and system logs. The PAS System shall utilize physical servers. A variety
of redundancy technologies can be implemented to facilitate maximum uptime. These
shall include Redundant Array of Independent Disks (RAID), failover, and clustering
configurations.
DSPs: The Digital Signal Processor (DSP) controls audio routing for the system. The
device handles all analogue input and output connections, ambient noise
compensation, and telephone interfaces. The DSP also allows conversion between
analogue and networked audio.
Amplifiers: The power amplifiers take the DSP line level output and boost it to the high
voltage (70V/100V) signal utilized by the system speakers. The amplifier should be
sized to meet the power requirements of each speaker circuit. Amplifiers should have
a variety of configurations with multiple channels and power ratings.
Paging Station: The paging station is comprised of an intelligent touch screen device
and handheld microphone that provides full functionality for public address and flight
information system control.
o The DPS shall be compatible with PoE;
o Dual Ethernet connection to support redundancy.
Microphones: Ambient Noise Sampling microphones.
o The microphones shall be compatible with PoE.
Speakers: The PAS System shall be compatible with a variety of speaker types.
End of Line Device: To aid verification of the distributed loudspeaker line’s integrity,
the impedance shall be detectable by the audio system.
Design Decisions
The vendor solution is to remain market competitive and as such the final architecture model
shall be left to Supplier to define the most commercially viable solution for their offered system.
The Airport shall be divided in zones. The audio output of the system shall be broadcast via the
loudspeakers, grouped in loudspeaker zones. The system will be capable of addressing any
combination of zones simultaneously, and the zone groups required during normal operations
and during emergencies shall be programmed into the system during commissioning.
System Procurement
PAS is an independent system that shall run from its own clustered servers and core equipment
placed in the Amaala Data Centres. For redundancy and availability, each set of PAS servers
shall be installed in separate Data Centres; the same shall apply for the digital processors.
The PAS is considered to contain the following equipment:
PAS08 Microphones 45
PAS servers and DSP should be redundant and located within each data centre.
Workstations/Paging Stations will be installed at the AOCC, Security Operations Centre (SOC)
and other areas.
Microphones will be installed along the terminal (gates, etc).
Speakers will be installed along the terminal in order to cover all operational zones.
End of lines devices will be installed at the end of each speaker line.
Spares Procurement
The following spares are recommended to be provided by the Supplier. This is just an estimate,
the Supplier is free to justify a different quantity or additional equipment. The PAS is considered
to contain the following spare equipment in order to be able to maintain the system without
interruptions.
PAS016 Microphones 5
Functional Requirements
The system shall operate as a fully integrated part of the building emergency system, alongside
the fire detection and alarms (fire alarm) system. The primary function of the system shall be to
provide secure, fail-safe and high intelligibility emergency speech broadcast to all areas.
The area of coverage shall include all public areas. Back of house areas are to be covered by
sounders directly from the fire alarm system.
The PAS System shall not constrain the number of zones that may be created. Zones shall be
named and presented to users with descriptive alphanumeric names.
The audio output of the system shall be broadcast via the loudspeakers, grouped in loudspeaker
zones. The system will be capable of addressing any combination of zones simultaneously, and
the zone groups required during normal operations and during emergencies shall be
programmed into the system during commissioning.
The PAS System shall be capable of assigning any paging station to any paging zone(s) without
hardware changes, as well as grouping paging zones without hardware changes.
For emergency purposes, the system shall be capable of broadcasting pre-recorded emergency
messages into combinations of pre-determined zone groups, as instructed by the Fire Alarm
System.
There shall also be a fireman’s microphone console with access to override all signals (including
the emergency pre-recorded messages) and broadcast to any combination of zone or zone
group as provided on a programmable console. There shall also be a number of microphone
consoles distributed in the terminal gates and lounges for local non-emergency broadcasts.
The method of evacuation will be provided via a horizontal / vertical evacuation system, similar
to the systems used within other large buildings such as hospitals where people are moved from
the area/ areas of danger to an adjacent (vertical or horizontal) safe zone.
Once the fire signal has been verified and dependent on the location of the fire source (the
particular zone) the safety management personnel shall instruct people via the PAS systems to
evacuate a particular zone and make their way to an adjacent zone or out of the building as
required.
Verification may be provided by a second fire alarm (e.g. a second automatic detector, in which
case the automatic annunciation systems will be activated, announcing the pre-programmed
evacuation procedures).
The system controller shall include frequency response equalization (to optimize sound quality
in relevant zones and system inputs), and electronic time delays (to align audio signals in large
zones with long-throw loudspeakers).
The loudspeaker outputs shall be commissioned to achieve the signal levels specified and the
system balanced (preamplifier gains, power amplifier gains, and individual loudspeaker tapings)
and adjusted(equalization) to give optimized evenness of coverage and speech intelligibility.
The PAS System shall provide for ambient noise compensation that shall allow users to adjust
playback volume up or down based upon the level of ambient noise. Ambient noise adjustment
is handled in one of three (3) ways:
Hardware Based:
Automatic ambient noise analysis compensation via ambient noise sensing shall be
capable of sensing via single or multiple microphones. Multiple sensing microphones
in a space that has varying ceiling heights shall be adjustable and mixable as one zone.
Ambient noise sensing controls amplified SPL levels by independent zones based on a
time and frequency weighted averaging of ambient noise within any given zone area.
Time and frequency weighting shall be user selectable.
Software Based:
Time based Ambient Noise Compensation shall allow for automatic adjustment of
volume levels within any zone based upon user defined schedule. For example, turn up
the volume in Concourse B at 6:30 a.m. and turn it back down at 12:30 p.m.
Manual override:
It shall allow the user to manually set the volume in any zone from the Administration
Console. All volume adjustments are handled manually in this mode.
The PAS System shall support and distribute digital audio for paging stations, message queuing,
emergency announcements, local announcements, background music, and scheduled
messages.
The PAS System shall support the management of passenger-intended messages (i.e. a Courtesy
Announcement) through a client application accessible or intelligent LAN based paging station.
The PAS System shall support the following message types:
A Scheduled Message is typically professionally recorded, complete .wav file that can
be scheduled to play between begin and end dates (or never end) by day of the week
and/or time of day.
A Dynamic Message is created by assembling complete messages from Message Assets
(also known as takes or message parts ). Which message assets are used is determined
by variable data in the flight information (or other) database (i.e. carrier, time, flight
number, flight status, etc) and voice inflection based upon where, in the sentence, the
asset is to be used (beginning, middle, or end). Software concatenates the message
into a single .wav with a unique index.
A Courtesy Message is a predefined message with input controls for variable data (i.e.
passenger name) to be entered at the time of scheduling.
The PAS System shall support Text-To-Speech (TTS) generation of scheduled messages, dynamic
messages, and courtesy announcements. Text-to-speech messages will be generated for any
message type that does not have proper message assets in the system or all courtesy based
announcements.
The PAS system shall be capable of generating audio messages based upon real-time flight data.
Audio messages are generated from flight data using text-to-speech technologies or pre-
recorded phrases.
The PAS System shall support configurable pre-recorded messages. Pre-recorded messages
shall not be constrained in total number or length of messages.
The PAS System shall allow messages and announcements to be assigned to paging zones or
zone groups.
The PAS System shall allow user configuration of message types and priority levels. The number
of priorities is not restricted. The paging system allows messages with higher priorities to
interrupt messages of lower priority. In the case of an interruption, messages with higher
priorities will interrupt the current lower priority message.
The PAS System shall support full paging control via Voice Over IP (VOIP) or telephone interface
card technology including, live paging, record and playback paging. Telephone paging can be
based upon user PIN access.
All messages in the system shall be fully audited based on location and/or user. All messages
can be reviewed and played back in the system as recorded .wav files.
10.3.5.1.5 Administration
The PAS Administration Console shall allow the system administrator to manage all aspects of
Public Address System from one application including hardware management, audio
management, user and system administration, reporting, diagnostics, and flight information
interface.
The PAS Administration Console shall connect to the paging server and audio equipment via
Ethernet allowing users to administer the paging system remotely.
The PAS Administration Console shall be password protected requiring username and password
authentication. Once logged in users are restricted to what their permissions allow.
10.3.5.1.6 Diagnosis
The PAS System shall be capable of monitoring critical system information for hardware device
including servers, audio controllers, amplifiers, matrix mixers, paging stations, and powered
loudspeakers via the Administration Console.
The PAS System shall be capable of monitoring critical system software via a central
Administration PC console.
The PAS System shall be capable of providing configurable diagnostic information and
automatic notification via e-mail to any e-mail address.
10.3.5.1.7 Reports
The PAS System shall provide a comprehensive set of reports, including, but not limited to:
Flight Lookups;
Flight Changes;
Priority Changes;
Input Changes;
Microphone History;
Message History;
Output Changes;
Message Auditing.
Deployment/Performance Requirements
All critical equipment shall be backed up with a Uninterruptible Power Supply (UPS) that shall
maintain the system during at least 2h.
The following parameters shall be considering when designing and deploying PAS system:
Availability:
The whole of the automatic detection and alarm PAS systems will be backed up via a
separate emergency battery system that will be capable of operating for a specific
period.
The failover and monitoring system shall monitor both hardware and software
elements. The software monitor manages all active services related to the PAS System.
This includes the server-based applications, interfaces, database elements, web
services, and paging station applications.
The PAS System shall support amplifier monitoring, failover, and failback. During a
failover event, the PAS System monitors the secondary channel as it actively powers the
zone. Additionally, alerts for failure events can be sent via e-mail with details of the
event including device name, location, amplifier channel and the system conditions
which caused the system to fail over.
Scalability:
The PAS central extension and the management application shall be scalable to support
100% more speakers, paging stations, microphones… etc., beyond the requested values
with constant response time when adding hardware.
System stability:
It should be able to support concurrent use by multiple operators in non-stop 24 hours-
a-day operations.
The whole system shall be equipped with a UPS solution to maintain the system
stability.
Usability:
PAS supplier will perform an electroacoustic study to optimize the audio
quality/speakers to be deployed through an informatics simulation according the
following context:
o Data
- Use the building architecture drawings to prepare the simulation space;
- Including the building materials.
o Objectives
- Define the different zones/areas and cover all Amaala airport requirement
for the specific areas;
- Obtaining the correct average reverberation time. If necessary, some
absorbent building materials can be applied;
- Consistency coverages for the speaker systems whose fluctuation does not
exceed +/- 3 Db;
- SPL calculation. Total SPL >=85 DB.
AODB
AIRPORT NETWORK
FIRE MCS
PAS
ALARM
As previously described and not limited to, the system shall have some logical and physical
interfaces with other systems for which the PAS Supplier shall be responsible for:
information shall be delivered on CD-ROM. All compilers, case tools, utilities, etc. that are
needed to create the executable code shall be included.
Perpetual commercial off-the-shelf software licenses shall be provided.
Software support shall be granted within the terms of the warranty.
All software user interfaces shall use the English language as default.
Systems shall handle dates using Gregorian calendar.
Software support shall include upgrades to newer versions of software where appropriate.
A Software Development Kit shall be provided with each application.
The PAS operating system must provide a seamless solution. The management software shall
be an industry standard, scalable, reliable, multi-user platform.
The PAS system shall be based solely on TCP/IP and capable of supporting this environment.
All components of the PAS system shall be redundant to ensure the continuation of service.
From multi-path wiring to redundant switches and servers to RAID disk arrays on servers and
interleaving workstations across switch devices, PAS installation shall be protected so that no
single component failure can ‘compromise’ the overall service. The Core PAS Equipment will be
installed at two separate Data Centres with independent Power Supply Circuits for the ensuring
of higher level of the redundancy of the system.
PAS system has to be designed and implemented based on a high-speed LAN architecture with
the fastest possible network performance using state-of-the-art LAN networking technologies.
It has to be designed to be fully redundant and resilient while providing flexibility and scalability.
Different segments of the switched Ethernet LAN must have the possibility to be configured for
different amounts of traffic in order to economically pair speed with need. The bandwidth
offered by switched Ethernet has to allow the integration of new PAS and non-PAS functions
and applications on the LAN.
The PAS software shall be 64-bit and based on an open system architecture.
The software shall be designed using a modular approach, in a commonly available
development environment. Software code and functionality shall be well documented in order
to facilitate maintenance by personnel other than the original programmer.
A single user license of the development system and any tools/utilities used during development
shall be included in the proposal as a deliverable item. Custom assembly language routines are
not allowed without specific permission of the Client Design Consultant.
The software selected shall meet the operational, functional, and performance requirements
specified herein. Additionally, due to the rapid advancement and antiquation of software
technology, the supplied software shall be the latest released version with all manufacturer
patches applied.
The Supplier shall deliver all required system and application software for a fully functional
system. Each application shall be identified by the generic, off-the-shelf name. Software
provided by the Supplier to operate the system shall be delivered in a ready-to-run form,
including all necessary utility programs and documentation.
Software shall use industry standard components. Software shall not contain any proprietary
interfaces or components. Software shall use industry standard application development
software such as Java, C++, CORBA, and XML. Supplier shall state what application development
software has been used, for Design Consultant’s review.
All supplied software running on servers or clients shall synchronize to a Network Time Protocol
(NTP) source. The Supplier shall coordinate with other entities the exact IP address of the NTP
source.
System updates: The system shall be based on a concept that all necessary software
components shall be downloaded by the workstations at the time of successful log-in. Any
modification to the software configuration shall therefore only be done at the server level. Such
modifications shall take effect by logging a workstation out and in again. Updates to the PAS
systems shall be distributed from the central platform servers and become active at the
individual workstations upon new login.
The PAS configuration as previously described shall be by proprietary software application
applicable to the selected PAS vendor which shall require approval by the Client Design
Consultant. This application software shall be installed to client and server computers provided
by the PAS Supplier, and accessible only with authorized levels of user privileges.
Fully licensed hardware shall be provided for use in the live Operational environment.
The components, software and technologies to be employed in the design should be well
proven and conform to the international and industry defined open standards.
The provision of the equipment (hardware, software, middleware, firmware, etc.) and materials
should be of international and industry defined standards. The equipment and materials to be
installed and supplied should be of the latest models/standards prior to delivery, and these
provisions should be easily upgradeable to the new standards in use at any time.
All systems should operate under Saudi Arabia´s environmental conditions.
Internet access shall not be allowed from PAS workstations.
All peripherals provided shall be certified for use on the PAS platform.
All applications running on the PAS platform shall be certified by the PAS provider.
The equipment shall be standardized and certified by the supplier. The documents shall be
delivered with them.
The PAS system must be based on standard components which have already been used in
comparable installations at other airports.
The service provider shall propose a configuration so that its upgrade throughout the Contract
term is not necessary. Moreover, a maintenance plan (in accordance with the manufacturers’
instructions) shall provide a number of spare equipment to be delivered with all the equipment.
System Capacity
The system shall be designed to support simultaneous operations.
The system shall be capable of supporting all interfaces as specified in this document (as a
minimum) within the performance requirements as outlined herein.
At peak demand, system utilization of resources shall not exceed Sixty percent (60%) of capacity.
The systems shall be capable of supporting priority orders data queuing and transmission to
ensure immediate delivery of higher priority and time sensitive messages.
10.3.10.2.1 Utilization
For any twenty (20) minute sampling period of normal peak hour operation, system utilization
of resources shall not exceed fifty percent (50%) of capacity. Utilization in this context refers to
CPU usage; CPU usage is obtained through the use of the operating system tool System Activity
Reports (SAR).
NFPA 72:2010;
BS EN 54-2;
BS EN 54-4;
BS 5839-8:2008;
IEC 60849:1998.
The following parameters shall be considering when designing and deploying PAS system:
Availability:
o The whole of the automatic detection and alarm PAS systems will be backed up
via a separate emergency battery system that will be capable of operating for a
specific period;
o The failover and monitoring system shall monitor both hardware and software
elements. The software monitor manages all active services related to the PAS
System. This includes the server-based applications, interfaces, database
elements, web services, and paging station applications;
o The PAS System shall support amplifier monitoring, failover, and failback. During
a failover event, the PAS System monitors the secondary channel as it actively
powers the zone. Additionally, alerts for failure events can be sent via e-mail
with details of the event including device name, location, amplifier channel and
the system conditions which caused the system to fail over.
Scalability:
o The PAS central extension and the management application must be scalable to
support 100% more speakers, paging stations, microphones, etc, beyond the
requested values with constant response time when adding hardware. Such
scalability shall support the extension of Amaala Airport according to the current
airport Master Plan.
System Stability:
o It should be able to support concurrent use by multiple operators in non-stop
24 hours-a-day operations;
o The whole system shall be equipped with a UPS solution to maintain the system
stability.
Usability:
o The system provided shall work 24 hours a day. The system shall have a high
MTBF, and a reduced MTTR shall be achievable:
The Supplier shall provide within the proposal detailed information
regarding technical specifications of each of the proposed equipment,
materials, and accessories demonstrating integration / interfacing
amongst them.
The Mean Time Between failures (MTBF), Mean Time To Repair
(MTTR), Mean Time Between Critical Failures (MTBCF) and Availability
figures of all the equipment proposed should be provided and the
overall system, indicating the method used for the calculation, such as
MIL-HDBK-217. If sub-system MTBF, MTTR, MTBCF, and Availability
numbers are submitted, these shall be rolled up into an overall system
MTBF, MTTR, MTBCF and Availability numbers. The MTBF, MTTR, and
the MTBCF numbers of other sites with similar types of equipment
installed should be provided so the quoted numbers may be verified.
A list of parts which are unique to the system (such as sensors or locks)
and which in case of failure would be considered critical and cause a
suspension of service should be provided.
The MTBF, MTTR, MTBCF and Availability numbers for the
communication equipment and its subsystems should be provided
separately.
PAS servers and workstations shall have excess capacity to avoid an increase in processing time
in peak hour on a busy day.
The system and supporting tools and applications selected shall be appropriate for at least four
(4) times the expected initial load on the system to allow for future expansion, with the ability
to expand the total storage and number of users as needed without significant upgrades or
modifications to the system.
Scalability: The PAS to be procured shall cover the airport needs for all the phases regarded at
the airport Master Plan.
For future expansion it shall be possible to include additional resources. The PAS environment
will be able to support a future growth in the next years of operation. System resources
(processor speed, memory, disk space, network bandwidth) will be dimensioned accordingly.
The Supplier shall provide expansion and reserve capacities for any equipment, if required.
Reserve spare capacity of the processing time shall be not less than 40% of the available
processing time for each processor, based on average use values.
Reserve spare capacity of the memory shall be not less than 40% of the available memory for
each processor, based on average use values.
Power supplies shall have a capacity of 1.5 times that required for the proposed design.
Sufficient input/output communications ports shall be physically provided to meet the specified
requirements plus 20% spare capability.
Redundancy
System application head-end processors shall be installed in the Data Centres at the Airport.
The server technology to be finally deployed in the Data Centres should be chosen. The use of
blades should be encouraged as should be the use of virtual server technology.
Optimization of resources should be maintained, and the environmental and physical
capabilities of the Data Centres respected. Reliability and cost shall be key decision features
together with the ability to use power efficiently with a view to keeping operating costs to a
minimum.
The System shall be deployed in such a way as to provide a redundant, hot failover ensuring no
single point of failure solution.
The System shall be fault-tolerant, with back-up or redundant capacity built-in and should have
the following service continuity considerations:
High Availability: A high-level of system availability is required. The System shall be
designed to meet the availability requirements. This may be met through high reliability
available in each component and through redundant servers;
Hot Swappable: System shall be designed to allow for the replacement of failed or
failing components while the system is operating, up to and including replacement of
cards, components, and other discrete modules of the system.
Load Balancing: The system shall run on fully load balanced server hardware. Load Balancing
shall be achieved by allocating messages and distributing load among interchangeable servers
and provide support for transaction queuing.
Additionally, all systems requiring server-based hardware to support their operation shall
provide as a minimum:
The following table sums up in a high-level overview the deliverables to be provided by the PAS
supplier during the project:
ID Deliverable Phase
10.4.1 Introduction
The DAS System is an antenna distributed system that allows to share mobile coverage within
the places that the telecom operator is not arriving, basically used inside big buildings where
the mobile phone signal is not arriving.
IEEE 802.3z / IEEE 802.3ab 1000 Base-S specification / 1000 Base-T specification
Class D,E,EA,F,FA ISO/IEC 11801 Information Technology – Generic Cabling for Customer Premises
RF Coupler Repeater/Amplifier
Signal
Source
Functional Requirements
The radio equipment connected to the Distributed Antenna System shall operate in the 800/900
MHz bands (825 – 960 MHz), 1800 MHz band (1710 – 1880 MHz) and the 2100 MHz band (1910
– 2170 MHz) in accordance with the relevant ITU, ETSI and 3GPP specifications.
The design shall include Multiple Input/Multiple Output (MIMO).
All elements shall be with PIM less than -150dBc @ 20W.
The design shall generally specify the use of components which operate over the frequency
range 825 – 960 and 1710 - 2170 MHz. Antennas and radiating cable shall operate over the
frequency ranges 825 – 960 and 1710 –2690 MHz.
RF levels shall be sufficient to facilitate both-way handovers with the external network at
locations agreed on the target Coverage Area.
The antennas to be installed throughout the Airport as part of the proposed DAS shall be low-
profile, flush-mounted, multi-band. The antennas shall be resistant to vandalism, accidental
physical abuse or extreme weather conditions (wind, precipitation, etc.).
Handovers to/from external fast-moving mobiles need to be avoided (except in tunnels). The
design should ensure that RF levels specified at ground level outside the building are met.
The DAS shall satisfy the following signal coverage requirements:
Signal coverage of 95% or better in public and non-public areas inside within Mirage
Terminal, Staff Terminal, ATC Tower, Administration Building, Hangars & Cargo and
BHS Handling Building, and within three hundred (300) feet outside of these facilities.
Minimum signal penetration are as follows:
o 85 dBm indoors throughout 95% of the anticipated coverage area;
o -95 dBm outdoors throughout 90% of the anticipated coverage area.
The DAS shall satisfy the following reliability requirements:
Fault tolerance mechanisms to mitigate and/or eliminate single points of failure for all
components of the system. The DAS shall have self-healing features so that none of
the applications is disrupted.
Service level of 99.99 percent or better for all applications.
The DAS shall satisfy the following backup power requirements:
Design Criteria
All critical equipment shall be back up with a Uninterruptible Power Supply (UPS) that shall
maintain the system during at least 2h.
Indoor antennas will be installed suspended on ceilings whenever possible. Final location of the
antennas will be validated by the Supplier, coordinating with Electrical and IT Passive
Infrastructure for final location of these components.
The proposed solution shall specify the number of remote units and antenna arrays depending
on the coverage analysis and heat maps.
Expansion capacity shall be considered for currently not covered areas or possible load increase.
This capacity shall be apart from the spare capacity and should be at least a 20% of the total
capacity.
Power supplies shall have a capacity of two (2) times that required for the proposed design.
Local authorities shall provide DAS frequencies to be use. Channel loading and frequency bands
shall be proposed for full building coverage. Prior to installation, Suppliers shall confirm the
channel loading and frequency use in the serving area and shall guarantee coverage for these
channels.
The service life of the equipment shall be at least ten (10) years.
The DAS normally comprises at least the following components:
Donor Antennas;
Coverage Antennas;
Coax Cable;
Coax Connectors;
Splitters;
Combiners;
Couplers;
Fiber-Optic Cable;
Fiber-Optic Connectors;
Fiber-Optic Jumpers;
Fiber-Optic Master Unit;
Fiber-Optic Remote Units.
All the DAS equipment shall be mountable in a 19-inch rack.
Broadband Donor Antennas shall feature a multi-band design, accommodating Cellular, PCS,
LMR and AWS frequencies in a single small antenna.
The Donor antennas frequency bands will be between 700-806Mhz, 806-960Mhz and 1710-
2200 Mhz.
10.4.5.2.4 Cabling
The Supplier shall try to standardize cable types and lengths in the installation.
The cables shall be laid out, depending on the location, in cable troughs, elevated floors,
suspended ceilings, pipes, cable shafts or cable trays. Outside cables shall be protected in
conduits or in armoured jackets.
Cables shall be placed side by side and tied at regular intervals along their routing and grouped
by function. Addition of cables/wires in existing cable trays shall be reviewed by Amaala Airport
after the provision of the appropriate calculation of additional weight and heat gain by the
Supplier.
To avoid induction, low-level signal cables shall be separated from power cables by a minimum
of 0.25m and shall cross at perpendicular angles.
All interconnecting cables and harnesses used throughout the equipment shall be effectively
formed and loomed, paired out and terminated with crimp connectors or other mechanically
and electrically secure terminals to enable the ready re-assembly and re-connection of
equipment at site.
Cables shall be clearly identified at a prominent point and each wire of the cable shall be
individually identified at each end of the cable adjacent to the terminal with a slip-on tag or
other secure means of tagging.
The Fiber optic DCU shall convert Radio over Coax. (RoC) from the Donor antenna to Radio-
Over-Fiber (RoF) for distribution to Fiber-Optic Remote Units (DHR).
The ODU performs RF to optical conversion and transports these signals over long distances
while minimizing loss. The ODU is co-located with the BIU from which it receives power and RF
communication.
DHR converts the Radio over Fiber (RoF) signal back to radio over coax, as well as provides
filtering so that multiple frequency bands can reside over the same passive cable and antenna
infrastructure. The proposed design shall include the necessary amount of DCU to cover the
operation of the project.
A network management and monitoring platform for all the access points shall be provided with
at least the following specifications:
The client-server architecture shall allow the monitoring of the status of at least all
devices supplied in the project;
The MS shall have a graphic interface to monitor the status of the devices;
There shall be no limit for new devices;
The MS shall have a topology administration feature with auto discovery feature;
The MS equipment visualization feature shall be able to supervise the devices´ status;
The MS shall be accessed through Web client and SNMP client.
The MS shall monitor the entire DAS. Besides monitoring all the active network devices, the MS
will also be used as a tool for fault-resolution, device configuration and as central (backup)
repository for active network device configurations and software.
The MS shall be redundant and fault tolerant to the extent that if a breakdown occurs in either
soft- or hardware, normal operations can be resumed within a short time frame.
The MS shall be able to communicate with the DAS equipment using standard protocols.
Deployment/Performance Requirements
The solution shall have high availability of master equipment.
MTBF, MTTR, MTBCF and Availability figures of all the equipment proposed and the overall
system shall be provided, indicating the method used for the calculation, such as MIL-HDBK-
217.
The Availability of each provided equipment over a period of twelve (12) months shall be at least
99.99%, including boards, components and power supply.
Mobile Telephone
Provider Access
AIRPORT NETWORK
DAS MCS
The equipment shall be standardized and certified by the Supplier. The documents shall be
delivered with them.
The systems and equipment shall be capable of automatic start-up at power on, a system crash
and/or a power failure. It shall also be able to initiate a system start-up in either a cold start or
a warm start mode.
A cold start mode shall consist of starting the system with default parameters, with configuration
and all active files cleared.
A warm start mode shall consist of starting the system with the latest parameters for the
configuration prior to the incident and active files.
The operating environment shall have a menu to allow the operators to modify the different
parameters, such as brightness, colours, etc.
Any human-machine interface (HMI) shall have a graphic environment and be user-friendly. The
information shall be displayed in different colours for easy interpretation.
All supplied equipment and materials shall be new.
The DAS system must be based on standard components which have already been used in
comparable installations at other airports.
The MTBF, MTTR, MTBCF and Availability numbers for the communication equipment and its
subsystems should be provided separately.
The Availability of the entire system over a period of twelve (12) months shall be at least 99.99%,
including boards, components and power supply.
Redundancy
DAS controller shall be installed in the Data Center at the Airport.
Optimization of resources should be maintained and the environmental and physical capabilities
of the Data Centres respected. Reliability and cost shall be key decision features together with
the ability to use power efficiently with a view to keeping operating costs to a minimum.
The System shall be deployed in such a way as to provide a redundant, hot failover ensuring no
single point of failure solution.
The System shall be fault-tolerant, with back-up or redundant capacity built-in and should have
the following service continuity considerations:
The following table sums up in a high-level overview the deliverables to be provided by the DAS
supplier during the project:
ID Deliverable Phase
10.5.1 Introduction
The WLAN or Wi-Fi System shall be provided to enable the airport staff, operations, airlines,
ground handling services, retails tenants, security services and passengers to access a wide
range of services, e.g. high-speed internet access, voice and video applications throughout the
airport. The WLAN system should work as an extension of the LAN system. It should supplement
the connectivity provided by the Local Area Network (LAN). This service could clearly split in
three main services:
Class D,E,EA,F,FA ISO/IEC 11801 Information Technology – Generic Cabling for Customer
Premises
Guaranteeing access to WLAN/WIFI for passengers is an indisputable service, which the airport
can take advantage of to obtain information on its passengers through the login required to
access the Wi-Fi. The WLAN shall provide a captive portal for public wireless users to
authenticate access to the system, or to accept an appropriate Acceptable Usage Policy prior to
guest access.
Facilitating access to data, video and voice services through the WLAN results in greater
efficiency in management and undoubtedly impacts on the benefits, therefore the installation
of a WLAN systems is considered essential.
The WLAN system will be essential to have coverage at the Mirage passenger terminal, Staff
Passenger Terminal, ATC Tower, Apron areas and Hangar Areas.
Another advantage of this system is that it can be procured as a concession. The awarded
company can design, install and manage the system, getting paid by a percentage of the income
generated by the WLAN use.
The WLAN supplier shall provide a proposal for the design, procurement, installation,
integration, testing & commissioning for the Wireless Local Area Network system at Amaala
International Airport. Including the following components:
Full coverage study;
Access Point installation requirements for civil Supplier;
WLAN controller configuration proposal;
Deployment proposal.
Although this document provides a conceptual and schematic design to enable the physical
elements of the terminal to be coordinated, the Supplier shall have complete responsibility for
the design and integration of the WLAN system.
Access Point installation in the best location to maximize the antennas radiation, even whether
any mechanical adaptation has to be done.
The design, deployment, installation and integration of both access point and wireless controller.
The WLAN supplier shall provide the Detailed Design documentation and all documents needed
for the implementation of the WLAN once the contract is awarded. Such detailed design
documentation will include at least (but not limited to):
The WLAN is required for mobility services. Passengers Internet service Access could be offered.
Laptops, smartphones, tablets, etc. could connect to the WLAN.
The WLAN architecture is composed of the following elements:
Access Point: It is a station that transmits and receives wireless data and connects
wireless users to other users across the fixed network (LAN). It serves as the point
of interconnection between the WLAN and the fixed wired network;
Controllers: They provide the central intelligence of the WLAN system and are
responsible for managing de AP’s. They perform real-time RF management and
detection and avoidance of RF interference. They also provide a common platform
for their configuration and allow several AP’s to work together in a unified manner.
Location-based solution can be provided by using wireless infrastructure to deliver
personalized content to mobile devices and gather customers insights to make
smarter business decision;
WLAN Management system: It provides a tools suit to manage the WLAN Network
in order to identify problems before there are disruptions to connectivity, app
quality, and RF coverage. Performances analysis, reports and real time operation
are provided.
WLAN Controllers should be located physically in the Data Centres with physical independent
connections.
The WLAN system highly depends on the availability and redundancy of the Network.
Functional Requirements
There shall be a secure logical airport operations WLAN covering the staff buildings, both
terminals and adjacent apron and stands.
The airport operations WLAN shall support voice, video and data so as to deliver client services
throughout the airport buildings and adjacent apron areas.
There shall be a logical public WLAN covering the publicly accessible areas of the airport (e.g.
terminal building or Hotel).
The WLAN system shall be completely integrated with the LAN/WAN infrastructure, including
any authentication and network security systems.
The system shall have the capability to add new logical WLANs as required to support other
functions.
The design of the WLAN should be optimized to provide high capacity in the areas where usage
is predicted to be the highest.
The WLAN shall provide a captive portal for public wireless users to authenticate access to the
system, or to accept an appropriate Acceptable Usage Policy prior to guest access.
The WLAN shall permit seamless roaming between permitted access points for all applications
without loss of connection.
The WLAN shall have Quality of Service and prioritization techniques to support IP telephony
and real-time data traffic including video.
The system shall be able to monitor the bandwidth consumed by individual Service Set Identifier
(SSID’s).
The System shall allow guests, vendors, and partners to access the Internet while keeping the
internal network secure and easy to manage. The guest username and password shall be saved
for seven (7) days for the transit passengers and one (1) day for the office visitors.
Voice over IP (VoIP) shall be implemented. The handset devices are included in the VoIP general
system, but WLAN shall be completely compatible with them.
To deploy a voice over WLAN solution, it is recommended to maintain a minimum power
requirement of -67dBm at the cell boundary. This shall be considered to achieve packet errors
of one percent or less and to achieve desired Signal to Noise Ratio (SNR) levels (25dB or greater).
It is recommended to obtain -67dBm cell ratio, with 15%-20% overlap to have optimized
network.
The design shall a roaming capability for WLAN data and voice users. When the wireless data
and voice users identify that the signal quality is reaching the minimal threshold level, it takes a
decision to initiate a handoff in order to connect to other Wireless Access Points offering better
signal quality.
WLAN
WLAN controller
controller 11 WLAN
WLAN controller
controller 22
AP 1 AP 2
Non-Functional Requirements
All critical equipment shall be back up with a Uninterruptible Power Supply (UPS) that shall
maintain the system during at least 2h.
The Wireless Network should be a single physical IEEE 802.11a/b/g/n WLAN which should
support multiple logical networks, each comprising several unique Service Set Identifiers (SSID).
The design shall include inherent spare capacity to allow for the quantity of applications to
increase by 25% without the need of major re-engineering of the WLAN.
The centralized WLAN controllers shall be duplicated and located in both main Data Centres.
Wireless Access Points shall be installed at agreed locations in the airport buildings.
The WLAN system shall be based upon a network topology of centralized fully meshed WLAN
controllers that shall be clustered to ensure mobility across an entire wireless network.
Later design phases shall include a radio prediction survey to establish the number of AP’s and
their locations and shall confirm the coverage provided by survey and measurement of signal
strength.
The WLAN end-to-end latency shall not exceed 150ms.
The WLAN shall provide a Received Signal Strength Indication (RSSI) no less than -85dBm.
The WLAN shall automatically augment itself in response to external Radio Frequency (RF) &
Electromagnetic Interference (EMI).
In the event of failure of the WLAN controller to which an AP is connected the AP shall
automatically failover to an alternative controller.
Network equipment shall allow radio frequency to be selected by the software rather than fixed
at a certain frequency.
WLAN system components shall be fully integrated with the LAN/WAN system, exactly with
Access layer and Distribution layer.
WLAN controllers shall be connected to the Distribution layer of the airport network and APs
shall be connected to the Access layer of the network.
The frequencies used for WLAN communications shall be in 2.4GHz spectrum and 5GHz
spectrum. Due to its nature of interference, the UNII-2 band should not be allowed, and the use
of the rest of bands in 5GHz spectrum should be coordinated with the local telecommunications
authority.
The WAPs shall be placed at a suitable location to provide the uniform and complete coverage
across all facilities. Cells provide the coverage area for the WAPs. It shall formulate a honeycomb
pattern aligning them, leaving a hexagonal formation so that there are no blind spots.
The next figure shows the ideal distribution of WAPs.
AP
AP 11 AP
AP 22 AP
AP 33
AP
AP 44 AP
AP 55 AP
AP 66 AP
AP 77
n-2
n-2 n-1
n-1 nn
The coverage and ratio of overlap shall depend upon the usage of the system components and
applications. Each WAP has a spherical boundary of RF coverage around it. In order to provide
the consistent coverage and availability across the facility, each of the cells shall join with each
adjacent cell at a coverage boundary that is greater than our desired minimal signal threshold
level.
The application of cell overlap is intended for VoIP clients as they would quickly roam to an
adjacent cell as soon as they experience packet loss. Where applicable, the cells shall be
overlapped by 15%-20% for inter-cell traffic handover so that the user shall not face
disconnection while moving from one cell to another.
The WLAN system coverage is also dependent on the type of rooms and size of the room. As
an approach to the WLAN system design, areas that have high voice and video traffic over the
internet shall have complete blanket coverage with cell overlap of 15% - 20% while areas with
low usage such as workshops, hangers and equipment rooms are covered with variable overlap.
Performance
The WLAN system shall be designed to support the operational functional and performance
requirements for a minimum of five hundred (500) simultaneous 802.11a/b/g/n.
A maximum capacity of sixteen (16) users per access point and a throughput of a minimum of
24mbps shall be provided at any given time.
A minimum signal of -67dBm shall be provided.
The WLAN system shall continue to deliver coverage and function with minimal degradation of
service in the event of any single component failure.
The WLAN shall achieve an availability of 99.9% over a year (526 minutes maximum downtime
per year).
The 802.11n WAP should be plugged into the Gigabit Ethernet switch ports (LAN/WAN) to take
full advantage of the throughput improvement of 802.11n.
Access Points
A Wireless Access Point (AP or WAP) is a station that transmits and receives wireless data and
connects wireless users to other users across the fixed network (LAN/WAN). It serves as the
point of interconnection between the WLAN and the fixed wired network.
The WAP shall be compatible with IEEE 802.11a/b/g/n and shall support IEEE 802.11af and
802.11at for Power over Ethernet (PoE).
The WAPs shall be Light Weight Access Points and shall use the following:
Dynamic Transmit Power Control (DTPC) mechanism to communicate with the wireless
users;
Control and Provisioning of Wireless Access Points (CAPWAP) to communicate with the
WLAN controller.
The WAPs shall be allocated in a manner that supports anticipated utilization patterns. The
WLAN design involves the use of both indoor and outdoor WAPs. The selection of a WAP shall
be based on the coverage range and transmit power requirement for each individual facility.
WLAN Controllers
WLAN controllers provide the central intelligence of the WLAN system and are responsible for
managing de AP’s. They perform real-time RF management and detection and avoidance of RF
interference. They also provide a common platform for their configuration and allow several
AP’s to work together in a unified manner.
The controllers have embedded software that detects the changes and resolves any problem in
real time by supporting dynamic channel assignment, load balancing, coverage gap detection
and compensation and dynamic power control, thus creating a self-organizing and self-
correcting WLAN environment.
Using clustering, logical groups of wireless controllers shall be created, which pro-actively share
network and user information for consistent wireless services and transparent roaming.
Controllers should be duplicated, and each group installed at a Data Centre. It is recommended
to install them in the same room as the core and aggregation switches.
LAN/WAN:
o The physical network should be used to communicate the WAP with the
WLAN Controllers;
o Users can access the airport systems, or the Internet, from the WLAN and
through the LAN/WAN.
VoIP:
o Wi-Fi telephones should use the wireless network created by the WAP.
o The communication between phones and servers should as well be trough
the WLAN and LAN/WAN infrastructure.
VoIP
AIRPORT NETWORK
WLAN
Redundancy
WLAN controller shall be installed in the Data Centre at the airport.
The management software system to be finally deployed in the Data Centre should use the
hardware platform or a virtual server technology.
Optimization of resources should be maintained and the environmental and physical capabilities
of the Data Centre respected. Reliability and cost shall be key decision features together with
the ability to use power efficiently with a view to keeping operating costs to a minimum.
The System shall be deployed in such a way as to provide a redundant, hot failover ensuring no
single point of failure solution.
The System shall be fault-tolerant, with back-up or redundant capacity built-in and should have
the following service continuity considerations:
High Availability: A high-level of system availability is required. The System shall be
designed to meet the availability requirements. This may be met through high reliability
available in each component, through redundant servers, or a combination of the two.
Hot Swappable: System shall be designed to allow for the replacement of failed or
failing components while the system is operating, up to and including replacement of
cards, components, and other discrete modules of the system.
The following table sums up in a high-level overview the deliverables to be provided by the PAS
supplier during the project:
ID Deliverable Phase
10.6.1 Introduction
A Master Clock System typically either uses an external network-based timeserver such as a
timeserver available on the Internet, or a global positioning system (GPS) receiver that serves as
its own timeserver.
The Master Clock system to be procured for Amaala Airport will facilitate the time
synchronization of all systems and devices throughout the entire airport, as well as to provide
an accurate time for all stakeholders, such as passengers, staff (operators, security…) and airlines.
Such procurement shall comprise the following components:
GPS Antenna;
Master Clock and Time Server Units;
Analogue or digital slave time displays in various locations.
Operational Centres:
Airport Operational Control Centre, Security Centre, Data Centre, etc.
Passenger Area
Mirage Passenger Terminal, Staff Passenger Terminal, etc.
Other Facilities
RFFS, Air Traffic Control Tower, Cargo.
NTPv4 (RFC 1305) Network Time Protocol Specification, Implementation and Analysis
This scope of work shall include all design, planning and coordination support
relating to the final placement of field devices to include but not limited to;
drawings, specifications, project plans, equipment, materials, labour and services,
not specifically mentioned or shown, which may be necessary to complete the
design and installation of the MCS;
The scope of work shall include the development of interfaces to other systems
using the Airport Common Network;
The scope of works for the MCS supplier is for the design and provision of a
scalable, reliable and highly available MCS to meet the security, safety and
performance needs of the airport.
AIRPORT NETWORK
All primary system servers (AODB, CUPPS, FIDS, etc.) shall obtain clock signal references directly
from the Master Clock. Subsequently connected devices will obtain time information from their
dedicated system server. As for example:
Stratum 1: The Network Timer Server shall be at Stratum 1 level;
Stratum 2: The AODB server will obtain clock directly from the Network Time Server
(NTS). This means that the AODB server shall be at Stratum 2 level;
Stratum 3: Any device attached to a stratum 2 device is classified as a stratum 3
device.
It is worth noting that, in some cases, although a device such as a computer terminal may be
attached to a Stratum 2 server it may still receive its time from a higher stratum server.
The Time servers shall be installed in both Data Centres and will establish a peer group (NTP
Peering) by communicating with each other over the Airport Network.
Other considerations regarding system architecture are:
1. All systems will be configured with the two IP addresses of the MCS;
2. The MCS shall be configured in the network in order that all systems can
reach it.
Functional Requirements
The Timeserver shall be mounted in industry standard 19-inch racking. For the purpose of
design dual servers shall be supplied to accommodate redundancy across the Data Centres that
will be established at the new airport.
The Time Server shall be 10/100 Ethernet compatible.
The time server shall contain an oven-stabilized crystal oscillator to maintain the time signal in
the event of loss of the GPS signal.
The server shall synchronize with GPS time signals and include a suitable interface for the GPS
antenna.
The Supplier shall provide and install weatherproof GPS antennas including all mountings and
fixings.
The GPS antenna shall be suitably mounted to withstand the meteorological hazards.
The GPS antenna shall operate over a temperature range of -20C to +40C.
The GPS antenna shall be allocated in a position coordinated with the Architect.
The GPS Antenna shall be provided with protections to prevent electromagnetic surge and/or
lightning causing shutdown or damage to the master clock time server.
Design Criteria
All critical equipment shall be back up with an Uninterruptible Power Supply (UPS) that shall
maintain the system during at least 2h.
The Master clock shall have outputs in the following formats:
NTP V2, V3, and V4;
RS232;
RS485;
SNMP v3.
When synchronized to GPS, the server shall be accurate to within 50uS of the UTC.
When the server is in stand-alone operation (i.e. without GPS synchronizing to the UTC) the
server shall be accurate to less than 0.1seconds/day.
Switching between Daylight Saving Modes shall be automatic.
The provided system shall include the ability to remotely manage the Master Clock.
Clients shall be synchronized by the server within 10mS (discounting network time delay and
jitter).
OTHER SYSTEMS
BMS MCS
MCS system has to be designed and implemented based on a high-speed LAN architecture with
the fastest possible network performance using state-of-the-art LAN networking technologies.
It has to be designed to be fully redundant and resilient while providing flexibility and scalability.
Different segments of the switched Ethernet LAN must have the possibility to be configured for
different amounts of traffic in order to economically pair speed with need.
The MCS software shall be 64-bit and based on an open system architecture.
The software shall be designed using a modular approach, in a commonly available
development environment. Software code and functionality shall be well documented in order
to facilitate maintenance by personnel other than the original programmer.
A single user license of the development system and any tools/utilities used during development
shall be included in the proposal as a deliverable item. Custom assembly language routines are
not allowed without specific permission of the Client Design Consultant.
The software selected shall meet the operational, functional, and performance requirements
specified herein. Additionally, due to the rapid advancement and antiquation of software
technology, the supplied software shall be the latest released version with all manufacturer
patches applied.
The MCS system should be an IP-based system, with an Ethernet network and TCP
/ IP protocols;
The equipment shall be accessible by telnet sessions for:
o IP Configuration;
o Setting time zone offset from UTC if any;
o Status reporting.
It is the responsibility of the network provider to dimension and guarantee the data
traffic required by the system.
Regarding Energy, the MCS deployment shall fulfil the following requirements:
For the Servers it will be necessary to have electrical connections of safe power,
coming from the UPS;
All equipment shall be fed locally via double pole-fused isolators provided by the
electrical service Supplier, according to plan of implantation to be executed by the
Supplier;
It is the responsibility of the supplier of the power grid to dimension the same to
guarantee the permanent service.
The MCS shall be an IP-based system and all wiring from all servers and display stations are
expected to be as high as possible using the CAT-6 UTP cable, with Ethernet and TCP / IP
protocols.
System Capacity
The system shall be designed to support simultaneous operations.
The system shall be capable of supporting all interfaces as specified in this document (as a
minimum) within the performance requirements as outlined herein.
A list of parts which are unique to the system (such as oscillators) and which in case of failure
would be considered critical and cause a suspension of service should be provided.
The MTBF, MTTR, MTBCF and Availability numbers for the communication equipment and its
subsystems should be provided separately.
Redundancy
System servers shall be installed in the Data Centres at the Airport.
Optimization of resources should be maintained, and the environmental and physical
capabilities of the Data Centres respected. Reliability and cost shall be key decision features
together with the ability to use power efficiently with a view to keeping operating costs to a
minimum.
The System shall be deployed in such a way as to provide a redundant, hot failover ensuring no
single point of failure solution.
The System shall be fault-tolerant, with back-up or redundant capacity built-in and should have
the following service continuity considerations:
Servers shall utilize a redundant server pair with automatic fail-over to ensure that
performance and high-availability objectives are met without manual intervention;
Redundant servers shall be located in diverse locations;
Servers shall be fault tolerant via mirroring or clustering or another vendor
technology;
The design should allow a server to be powered down and replaced without
disruption to the network or applications.
The following table sums up in a high-level overview the deliverables to be provided by the MCS
supplier during the project:
ID Deliverable Phase
10.7 Services
The Supplier shall liaise with the Client, Architect, Design Consultant, Security Agencies and
other appropriate parties to define the infrastructure required for each of the necessary
speaker type to be used.
The Supplier shall liaise with the Client, Design Consultant and other appropriate parties to
obtain the information necessary to establish an estimate of the network traffic utilization
profile.
The Supplier shall liaise with the Client and other appropriate parties to determine the exact
location and fixing of the required field equipment.
The Supplier shall be responsible for working with the Airport and the stakeholders to
develop the proper configuration and format for the system.
10.7.3 Installation
The following points explain the general requirements in order to accomplish a complete
functional deployment of the system.
Cabling
Both the structured data cabling and power cabling for the system are expected to be
provided by third party Suppliers, nevertheless, the following points describe the complete
general cabling requirements in order to deliver a full system interconnection. The detailed
scope of the Supplier in these terms needs to be specified with the Client. Meantime it is
assumed that the Supplier will be responsible for the complete installation, labelling and
testing of the cabling up to the closed connection outlet.
The structured cabling shall be CAT 6 and Low Smoke Zero halogen.
All the cabling shall be certified and finished in patch panels and sockets.
The cabling should finish in a male RJ45 to be connected to the monitors/controller.
All the cabling, patch panels and intermediate boxes shall be labelled as per labelling
specifications detailed below.
The maximum distance between the displays and the network distribution rooms for the
Ethernet cable shall be less than 95m.
The Supplier shall try to standardize cable types and lengths in the installation.
The Supplier shall provide the cable certification and validation to the Employer.
Power/Grounding Requirements
The equipment shall operate from a power source of: 230 V ± 10%, 50 Hz ± 5% and from
the Uninterruptible Power System (UPS) supplied by a third party Supplier.
The connection to the power outlet at the installation site shall be the responsibility of the
Supplier. Supplier shall coordinate all power requirements at the design stage in order to
arrange the location of the power points as close as possible to the equipment final
location.
The Supplier shall provide the estimated consumption of all equipment so the MEP Supplier
may size the power installation accordingly. The Supplier shall specify itemized the
electrical capacity in Watts needed for the system connection.
The system will be connected to the Airport UPS.
Labelling
Labelling both equipment and cables is not only a good practice but also a requirement in such
big facilities as airports where different types of systems hardware interface with each other.
All active and passive equipment shall be labelled. The label shall include the system information,
building (XX), floor (YY), room (ZZ), Equipment name (SW) and identification number (001).
All this information shall be included in a tool/system that will be able to link the equipment
installation place with the equipment information (Manufacturer, S/N, P/N, etc.).
Each cable shall be identified at its extremities, in junction boxes and at manholes by a
coloured label containing the following information, as a minimum:
Cable function;
Cable number: This number shall identify the nature of the cable and its source and
destination (indicating the connected equipment and its location at both ends of
the cable).
The Supplier shall provide the appropriate cable documentation which shall contain the
following information for each cable:
Source. Equipment and location;
Destination. Equipment and location;
Cable type;
Cable function/service;
Cable number;
Technical description.
The Factory acceptance test shall ensure the proper operation of the system between the
supplier/manufacturer and the Supplier.
The Supplier shall ensure that all equipment and materials are in good working condition
prior to and after installation.
The Supplier shall invite authorized supplier representative(s) to confirm and accept that
proper installations, termination and another technical requirement are attained.
The Supplier shall ensure a Factory acceptance test sheet properly filled in by the
supplier/manufacturer before the actual testing and commissioning stages.
After all work is completed, and prior to requesting the acceptance test, the Supplier shall
conduct a final inspection, and pre-test all equipment and system features.
During the acceptance test, the Supplier shall demonstrate all equipment and system
features to the Client/Consultant. The Supplier shall remove covers, operate equipment,
and perform other reasonable work as requested by the Client/Consultant.
Any portions of the work found to be deficient or not in compliance with the project
drawing, specifications and the Supplier Design shall be rejected. The Supplier shall correct
all deficiencies in accordance with the General Contract Requirements.
Upon completion of the installation activity, the Supplier shall test, start-up, commission
and handover the system to the Client/Consultant.
The Supplier shall perform the following tests as required for the system with the presence
of the Client/Consultant:
Installation Check Report;
Power "On" test;
Integration test;
Power "Off" test (test of back-up power sources and failover).
The Supplier shall provide a detailed test plan with all relevant functions of the above-
mentioned tests. The test plan shall be reviewed and/or approved by the Client/Consultant
prior to testing.
The Supplier shall ensure proper coordination in testing each relevant system. The Supplier
shall guarantee to the Client/Consultant that each system is ready for testing.
The Supplier shall incur all cost related functions of the acceptance test.
Upon reaching substantial completion, the Supplier shall perform a complete test and
inspection of the system (commissioning). If the system is found to be installed and
operating properly, the Supplier shall notify the Client/Consultant of the Supplier's
readiness to perform the formal test and inspection of the complete system.
The Supplier shall undertake system-wide integrated testing to verify, test and commission
all interfacing systems & equipment.
The integrated system tests shall verify the functionality of the interfacing systems and
confirm that the respective systems and equipment perform and interact satisfactorily and
in accordance with the Requirements.
The Integration test shall not limit the warranty of the system.
The Supplier shall be responsible for inspecting and testing the complete system.
The Supplier shall start up and operate the system for a trial period to ensure that it
operates correctly.
The Supplier shall demonstrate the network resilience by creating a series of failures (i.e.
cutting power to equipment, pulling out cables, etc.) across the different components.
The Supplier shall supply a list of the 'failures' to be simulated including the functionality
that is to be tested as well as the anticipated outcome. The list shall be approved by the
Client/Consultant before the test commences.
The Supplier shall provide the system test strategy, including various test environments
through initial software customization to commissioning; resources; data; tools;
documentation and defect management.
The Supplier shall produce a detailed test plan covering initial software customization
through to commissioning, to include functional and non-functional requirements testing
and manage all systems test teams to complete test schedules specified therein, ensuring
defects are managed appropriately and in accordance with agreed entry / exit criteria, test
cases and schedules for acceptance of all systems individually and for all integrated systems
within the confines of the agreed detailed time program.
Tests after Completion shall be conducted following issue of a Taking-Over Certificate of a
section or the works, as applicable.
ORAT Activities
The organization and execution of all ORAT activities to take place after ICT commissioning
will be the responsibility of the Design Consultant. Nevertheless, the Supplier is expected
to assist those activities in each of the steps that may be related to the system provided.
Typical phases where the Supplier shall be involved:
ORAT set-up;
Operational Preparation;
Training and Familiarization;
Operational Trials;
Terminal Transfer;
Opening Support;
Post Opening Support.
10.7.5 Training
The training program shall ensure that the staff is fully trained in handling the individual
units, subsystems and the full systems. The scope shall include, but not be limited to:
Educational requirements;
Operational procedures and measuring techniques;
Maintenance procedures;
System design including architecture, functionality, performance and non-
functional characteristics;
Trouble shooting;
Quality management;
Health and safety issues;
Environmental issues;
Risk assessment and management;
Content and familiarization with O&M (Operation & Maintenance) manuals;
Business continuity strategy & disaster recovery.
Training shall be provided to trainers and selected operational and maintenance staff for
onward training. The staff shall include outsourced operational and maintenance entities.
Attendees shall include, but not be limited to:
Trainers;
The technical management;
Engineers;
Airlines Operators;
Maintenance staff.
Factory Training
Technical Factory Training to be performed together (not at same time) with FAT within the
Factory Dependencies.
The training shall be based on system functions, configuration, trouble shooting and
maintenance
On Site Training
Technical and Operational training to be performed before the SAT.
During the system installation the Supplier shall offer On the Job Training (OJT) without any cost
to the system technicians.
On-site training shall be offered to System Administration, System Operation and Maintenance.
Training Duration will vary for each of the Systems.
Detailed listing of the scope of supply: COTS, main installation material, such as
trays, pipes, etc.;
All relevant technical descriptions of the equipment hardware/software based on
the personalization of the contractual configuration;
System architecture;
Scaled and detailed equipment floor plans and equipment location drawings;
Cable routing and interconnections;
Supports Designs;
Civil works specifications / requirements (if any);
A complete and detailed final work schedule.
The Supplier shall update the approved project plan on a bi-weekly basis until contract
completion.
Design Review Meeting: The Supplier shall arrange a Design Review Meeting within two
(2) weeks after submitting the revised SDD. The meeting shall be held between the Supplier
and the Employer´s appointed representatives, at a mutually agreed location.
The purpose of the meeting shall be to review the system design as outlined in the SDD.
The SDD shall be subject to the Client/Consultant´s review and approval.
In order to facilitate the review, the Supplier shall provide a spreadsheet indicating the
documents that are part of the SDD (including drawings, datasheets, etc.), version number
and submission date. This document will be utilized to keep track of the changes in the
SDD documentation, as well as the clarifications requested by the Employer. The Supplier
will update this spreadsheet with each SDD submission.
If the document(s) in question are rejected, the Supplier shall have fifteen (15) days to
correct the document(s) and revise them at no additional cost.
The Supplier should assume the responsibility of adapting the design in case of changes in
the civil works or the Master Plan and follow the previously agreed change management
process together with the Client/Consultant in order to manage any impact in the project.
Sufficient spares shall be provided for the system such that the reliability, availability and
maintainability figures specified can be sustained following issuance of Taking-Over
Certificate and shall demonstrate, that the proposed spares are sufficient through the use
of appropriate techniques to provide evidence to this effect.
11 SECURITY SYSTEMS
11
12 | SAFETY SYSTEMS
11 SECURITY SYSTEMS
11.1 Security Concept Overview
The characteristics of the airport Security Zones, such as air, land, safe, unsafe,
sterile and non-sterile areas of the airport;
The necessity of monitoring and control of the basic operation processes of the
airport;
The characteristics of Internal Areas, due to the activity carried out in it, its assets
and users.
Security Zones
The first basic concept to consider in the protection of an airport is the Security Zones, for the
purposes of common understanding, based on ICAO and others SARPS documents, the
definition we have in this regard is as follows:
Public parts: Areas of an airport, adjacent land and buildings or parts thereof that
are not aeronautical parts, identified as such by the State and the pertinent entities
in their security programs.
Land side: The portion of the airport accessible to the public and employees which
have not passed through a Security Screening Check Point (hereafter SSCP).
Landside normally includes airline ticket sales offices, check-in areas, luggage drop-
offs, luggage claim, services areas, bars, and restaurants.
Security Screening Check Points or SSCPs situated in this area serve as border
between Landside and Airside.
Air side: The portion of the airport accessible only to the public, Visitors, and
employees after they have been Screened Passing Successfully Security (SSCP) and
have been authorized to proceed to an aircraft or other restricted areas of the
terminal building or controlled parts of the airport in general.
These areas normally include airline service areas, arrival/departure gates, waiting
or holding areas, retail or mall establishments and restaurant areas.
Secure area: The part of the airport that relates to the delimitation of the space
that has been secured or cleared by airport operations and security and all persons
who enter this area have successfully passed through a security checkpoint (located
in Airside or Landside).
Sterile area (also known as a Restricted Security Zone): It is the portion of an airport
located between inspection points and aircraft, where access is only allowed to
passengers who have a valid boarding pass or staff with valid "ID" (identified and
equipped with a card identification). All of them will have been previously
inspected.
Basic processes
The second basic concept in the protection of airports is the operation processes, at Amaala
Airport security measures must monitor and control the following:
Passengers;
Employees;
Pilots and cabin crew;
Authorities;
Visitors;
Baggage;
Supplies, including fuel;
Vehicles;
Waste.
Protection Measures
The catalogue that will be developed, will be based on the different Standards And
Recommended Practices (SARPs) of airports, considering it necessary to give priority to a
philosophy of preventive actions over those of a corrective type, which schematically means:
Based on the prevention criteria presented, the philosophy of protection in all airport areas is
proposed through the creation of different "security circles or sectors", which allows us to
escalate and progressively manage risk at different levels; each of which with certain objectives
and corresponding means of protection. Within the scope defined in this design document, we
identify:
Passive technical means: Initially, they are not the object of design of this
document, but they are identified since in certain systems specific requirements
must be established in this regard.
Active technical means: They are the basic design object of this document and its
development is carried out in the next sections.
Organizational means: They are the set of human resources and procedures on
which the airport security operation is based. Identification is carried out in this
document, but not their development.
RSAF Responsible for airside security systems, including AOCC Airport Operation
Control Centre for security matters, permanent command post and mobile
command post.
GID Responsible for airside security check and screening in Passenger Terminal
Buildings and airside main gates.
POLICE Responsible for airport security in the landside areas.
ROAD POLICE Responsible for road security in the landside roads within the airport, and
airport main gate.
CUSTOMS Responsible for screening and customs import/export within the PTB.
IMMIGRATION Responsible for border control in international passengers (inbound-
outbound),
Table 77-Organization and Distribution of functions in the Security Operations of the Amaala Airport
Field Equipment
It should be noted that, initially, the design of the passive technical means used in security are
not the object of this document, aimed at delaying the materialization of a risk, by applying
elements that hinder the presence of the causal agents.
Below, their basic relationship is presented, as they have a direct impact on the operation and
performance of any of the different systems to be implemented and in certain systems specific
requirements must be established.
Active technical protection measures are those that complementing the existing physical ones,
must achieve an effective response to a previously evaluated risk.
This equipment is distributed throughout the different areas of the airport and within the
security control centres, in accordance with the coverage criteria assigned to each of the
systems.
The basic equipment identified as the first level of the systems structure is the one presented
below:
Control System
The second level of the systems structure is the one that controls and monitors certain field
elements under specific configuration and functionality. Basically, they are software programs,
installed in the corresponding CPD, main and backup, in redundant configuration.
The identified control systems are those presented below:
CONTROL SYSTEMS
BASE APPLICATION AUXILIARY MODULES
Closed Circuit Television (CCTV) System Video Analytics System
Security Access Control System (SACS)
Management System
The third level are basically platforms that integrate various of the existing control systems and
some specific field element, facilitating integration between these and other airport applications.
They are also installed in the corresponding CPD, main and backup, in redundant configuration.
The identified management systems are those presented below:
CONTROL SYSTEMS
Security Management System (SEMS)
11.3.1 Introduction
The Security Access Control Systems (SACS) addresses the need to control the passage of staff
(not passengers) into secure and sterile areas in line with the regulatory requirements and the
Airports specific Security Program (ASP). These systems are not designed to control the access
of passengers and specifically not for the “Trusted” or “Registered” travel program.
Those responsible for airport security want to be able to control and monitor access to airport
facilities in real time. The result is that Security Access Control Systems are increasingly being
integrated with both airport’s IT network.
At a general level, access control is divided into three basic parts:
Also, the new market trends, complementing the basic functions of a SACS, introduce functional
improvement features through the following modules or subsystems:
ICAO Doc. 8973 – Restricted ICAO The Aviation Security Manual 10th Edition 2017
EC No. 300/2008 Regulation (EC) No 300/2008 of the European Parliament and of the
council of 11 March 2008 on common rules in the field of civil
aviation security and repealing Regulation (EC) No 2320/2002.
TSA - Title 49 – PART 1550 Aircraft Security Under General Operating and Flight Rules.
NFPA 80 Standard for Fire Doors and Other Opening Protective: 2010 Edition
PD 6662: 2010 Scheme for the application of European Standards for intruder alarm
systems
LPS 1175: Issue 5.1, 2004 Specification for testing and classifying the burglary resistance of
building components, strong-points and security enclosures. All
other relevant BS EN standards
Basic functions
SACS is based on a reading terminal of the APIC, linked to a control unit, which when verifying
the access privileges assigned to the user, allows or does not automatically allow entry to a
certain room, releasing the existing physical lock (door , barrier, etc.).
The SACS System will allow airport security responsible to straightforward transfer its protection
policy to the access control installation and manage as well as monitor the systems; profiles and
access routes to restricted areas with calendar and timetables, location of persons, capacity
control, real-time alerts, list of events, etc.
The SACS System main functions are:
Deterrence:
The visible presence of control elements may deter the potential penetrator that is
seeking unauthorized access.
Prevention:
The system will allow the access to be unlocked only for authorized persons.
Detection:
The system will activate an alarm signal if the input is forced.
Traceability:
The system can provide a traceability of the actions performed and thus identify a
person who does not act according to established standards.
Centralized control
The SACS is an IP-based system that uses "controllers" directly connected to the security
network, equipment that can verify the access privileges of the accredited person and thus
regulate entry to the different areas of the premises.
The field elements, through the "Access Controller" must transfer the information of all the
events occurred to the "Access to the server", as well as update the data in a bidirectional way
about the personnel and the assigned privileges.
All these processes are carried out automatically, but it is required that the information be
controlled centrally, due to the possible presence of certain incidents of use:
Identification Technologies
SACS can address the control of one or more of the three factors that identify an individual:
IDS Module
The SACS will have the capacity to manage the events / alarms that it generates in the
monitoring of the closing elements (doors, barriers ...) and other alarm signals of auxiliary
elements that are considered necessary.
The trend in the security of airport facilities is to incorporate signals such as:
Detectors;
Push-buttons;
Alarm Controller.
SIS Module
The centralized management of the security facilities, with control and monitoring of the
different personnel flows, requires at certain times to have intercommunication at the control
points between the users and the Control Centre staff, in order to answer queries, resolve
incidents or activate alternative access procedures.
The trend in the security of airport facilities is to incorporate the SIS (Security
Intercommunication System) into the SACS itself, through the availability of "Access Controller"
that have Audio/Video over IP service and allow the integration of intercom equipment.
Functional Requirements
As defined in the section on Airport security concepts, there are three (3) basic concepts that
shall be considered during the design stage of security measures:
The characteristics of the Airport SECURITY ZONES, such as air, land, safe, unsafe,
sterile and non-sterile areas of the Airport;
The necessity of monitoring and control of the basic operation processes of the
Airport;
The characteristics of INTERNAL AREAS, due to the activity carried out in it, its assets
and users.
11.3.5.1.1 Boundaries
The rules of flows or transits that can occur in the airport environment and shall be controlled,
are summarized in the following scheme:
The definition of the security areas implies the notion of boundaries. In an airport terminal
building, one may define four (4) types of boundaries, among which two (2) are Security
boundaries:
Security boundaries:
o Secured / Non-Secured;
o Sterile / Non-Sterile.
Non-Security boundaries:
o Inbound / Outbound of immigration/emigration border;
o Inbound / Outbound of customs border.
To each boundary a special type of access and procedure is associated where for the limits of
security the basic criteria are:
The change from secure to non-secure zone implies controlled access;
Passing between two secure zones may also involve controlled access (for being
different access privileges);
The passage from sterile to non-sterile zone involves a security check (inspection).
The determination of boundaries is therefore an important element for the design and
boundaries between the different areas should be made clear by the architectural design:
Shall be materialized by a physical separation such as a wall.
The number of communication points between controlled and non-controlled areas
shall be reduced to the minimum.
Access points to Secured and Sterile areas should be fitted with closing devices and
with automatic or attended access control features. This is the purpose of the following
chapters.
This is the purpose of the following chapters.
At a general level, the main application of access control is in the communication points that
can be identified in the exposed limits are:
The main airport services and corresponding transits to be covered at the Amaala airport
complex are:
Parking’s;
Passenger processing area;
Boarding damper;
Salons y waiting areas Landside;
Awaiting gate pods;
Circulation areas;
Bathroom, Trash and staff facilities;
Office installations;
Customs Facilities;
Storage Facilities and GSE;
Immigration Service Facilities;
Prayer rooms;
Technical and Handling Installations;
Intermodal Transport Interchange;
Airport offices.
E=C; S=F; T=NO; E.g.=NO; M=SI.
Security agency offices.
Generally, it will be applied in:
Technical rooms.
Facility Security Level 2
03 Wiring Centres
All Airport facilities where staff or systems are involved
SATE facilities and warehouses
for Airport Security, Airport Safety and Airport
Closed air conditioning rooms.
Operations.
Electrical substation.
Transitions between Landside and Airside in the control process defined as input-from the area
with the lowest to highest risk- (which would coincide with the departures of the passengers),
based on SECURITY CONTROLS, or inspection points that are not within the scope of the present
system.
The transitions between Airside and Landside in the process defined as output (which would
coincide with that of passenger arrivals) the following typologies of doors:
Other applications to be foreseen in the design of access control, not assigned to a standard
door, are:
Vehicle Barriers:
Access points where the concepts of controlled, free or prohibited are equally
applicable. (without identifying emergency criteria).
Lifts:
Transit points where the concepts of controlled, free or prohibited are equally
applicable.
Totem:
Personnel identification point in Security Checkpoint, supervised by security personnel
or it can be automated with a one-person access mechanism.
BHS Blinds:
Luggage passage gates, whose activation requires identification of personnel and
assigned privileges.
Alarm Devices:
Included in the IDS module, the need to incorporate manual alarm activation elements
with direct notice to COS is established, with two basic objectives:
o Panic button.
In areas where a passenger or internal staff can be found alone and needs to
alert of a medical emergency.
Design Criteria
With general criteria, the SACS technology should be:
The SACS solution must be implemented and configured to take advantage of the latest
technology available at the time of design;
The architecture of the SACS system will be modular, allowing easy expansion and
adaptation to new needs;
The solution must demonstrate innovation in delivery within the limits of acceptable
risk;
The solution must support the delivery of an efficient operation in all aspects of the
airport.
All critical equipment shall be back up with an Uninterruptible Power Supply (UPS) that shall
maintain the system during at least 4 hours.
The SACS system to be supplied will comply with the following structure:
The system will be made up of a base management module and different optional
control modules, which can be added and expanded depending on the needs of
the installation.
The system is fully scalable.
The initially planned modules are:
o System administration;
o User administration;
o Control of ID card holders;
o Vehicle control;
o Alarm / Synoptic Module;
o Interfaces.
The structure of each market application can determine the existence or not of certain modules
of the exposed relationship, but it is a mandatory requirement:
Proximity readers;
Biometric readers (option pending validation);
Vehicle License Plate Readers (VLPR).
Airport operations require at certain times to have intercom at control points between users and
Control Centre staff, to answer queries, resolve incidents or activate alternative access
procedures. Therefore, the proposed solution must have one of the following work options:
The system will have a colour graphical user interface (GUI) with maps and dynamic icons:
Showing the location and individual status of all elements of the SACS system
installed at the airport.
The synoptic module allows monitoring of events and alarms on maps, in real time.
Access to the configuration change of the elements must be possible from the
synoptic module maps themselves, per user with administrator level.
The SACS system shall be integrated with the CCTV to such point that any alarm
generated by the system (Door Forced, Door Held etc.) shall cause the camera nearest
that door to display the relevant image on a monitor screen. If covered by a
Pan/Tilt/Zoom (PTZ) camera the camera shall pan/tilt and zoom appropriately to
present the operator with the best image available. Integration shall be at data level
and interfacing by dry contacts shall not be permitted.
Fire Detection and Alarm System FDAS:
The SACS system shall be fully integrated with the FDAS in order to liberate al doors
and enable the correct evacuation of personnel in the event of a fire alarm.
Master-Clock System (MCS):
The SACS system shall be time synchronized to the MCS; this synchronization shall
occur through the use of software that requests time from the Network Time Server at
intervals not exceeding 15 minutes. All recorded alarms shall incorporate the time and
date as well as the ACS field component ID.
Building Management System (BMS):
The SACS system will be integrated with the BMS to report the operational status of its
elements. The connection is limited to energy data and communications for security
aspects.
Airport Workers Identity Management System:
The SACS system shall be fully integrated with the Airport Workers Identity
Management System in order to be able to collate personal data of employees.
The system must be accessible from any Client Station, without the need to install
specific client software;
The system may restrict access to system users, selected based on the assigned
profile and the Client Position from where the session starts;
Users and system administrators can change their password at any time;
The system will allow you to force system users to change their password after the
first login or after the system administrator has reset a system user password;
All password information will be encrypted.
The software to be supplied will guarantee the following system administration benefits:
Counting:
Through the established input-output configuration, the system will provide the
possibility of counting personnel who have accessed a certain facility or area of it.
Anti-Pass Back:
The system will provide the possibility of programming the Anti-Pass Back (APB),
in areas where there are exit readers, to prevent people from entering the zones
and access points selected by reusing an access card from a cardholder who has
not previously left the area or access point in question.
Two-person rule:
The system will allow regulating access to certain areas only if two authorized
persons present their access card in the same card reader, within a definable period.
Minimum occupancy rules:
The system will prevent individuals from being alone in selected areas with exit
readers, by applying certain restrictions.
Component Specification
Internal alarms Alarm power failure, battery failure, door forced/open door
Protection Box Ability to contain all the elements and with tamper detector
Component Specification
Protection Box Ability to contain all the elements and with tamper detector
Alarm Controller
Component Specification
Protection Box Ability to contain all the elements and with tamper detector
Proximity reader
Component Specification
Technology Proximity card reader unit operating in the 13.56 MHz frequency range.
Process Ability to read both the CSN (Chip Serial Number) of the card, and read-
write data in the memory of the card
Component Specification
Technology Proximity card reader unit operating in the 13.56 MHz frequency range.
12-key keyboard and display
Process Ability to read both the CSN (Chip Serial Number) of the card and read-
write data in the memory of the card
It establishes the identification by double factor, with card and code
Stable temporary openings
Protection IP65
Component Specification
Technology Proximity card reader unit operating in the 13.56 MHz frequency range
Biometric reader unit based on fingerprint reading
Process Ability to read both the CSN (Chip Serial Number) of the card, and read-
write data in the memory of the card
Reading through a certified optical sensor, with a resolution of 500 dpi
Operation in 1: N or 1: 1 identification mode
Protection IP65
Opening detector
Component Specification
PIR sensor
Component Specification
Working range Output by contact relay 30V / 1A, in "failsafe" mode or unlock in case of
interruption
Adjustable relay operating time
Protection IP65
Component Specification
"Failsafe" typology
Working range Minimum holding force 3500 N
Close control contact
Horizontal or vertical
Mounting
Long front with latch housing provision
Component Specification
Protection IP65
Workstation
The workstations required by the system will be provided by the IT Supplier, for the
standardization of the elements of the different control rooms and will meet the requirements
identified in the "Hardware Workstation" section of the Security Operation Centre (SOC).
Server
The SACS application must be implemented on a virtual server.
The Supplier shall provide a solution that allows system servers to run on blade server
technology running on VM containers. Suppliers that are unable to accommodate this request
shall state the reason why.
The Customer requests that the Supplier supplies an optional price for the above requirement.
Unit id Unit
Processors Two Processors: Each Processor Intel Xeon 2.93 GHz 64-bit Quad-core
1) Support for Hot plug, Serial Attached SCSI, 2.5” 15KRPM Hard drives
Internal Storage
2) DVDRW Optical Drive
Maintainability
The SACS shall support centralized monitoring and fault reporting to minimize maintenance
overhead and operating expenses (OPEX).
The SACS shall allow technical administrator access that can perform incident diagnostics and
firmware updates remotely.
Data Integrity.
The system shall provide a complete logging system for all alarm and event data.
The solution shall support the integrity and confidentiality of data from source to point of use.
The solution shall support the capture of operational and commercial performance data for
analysis and reporting purposes.
RF interference compliance:
The SACS is to be installed in a major airport and is subject to background RF levels expected in
such an area, including but not limited to aircraft navigation aids and land based mobile radio
systems. All equipment shall comply with statutory radiation limits.
It is the Supplier's responsibility to protect the systems specified here from interference of other
systems and to prevent interference with other systems. All facilities shall comply with applicable
and mandatory regulations.
Operating Environment
Equipment shall be designed, installed, and tested to meet the following minimum
environmental criteria:
Power requirements
Regarding Energy, the SACS deployment will fulfil the following requirements:
For the Access - Alarm Controller, Workstations, Servers, it will be necessary to have
electrical connections of safe power, coming from UPS.
The Access - Alarm Controller has its own power supply.
All equipment shall be fed locally via double pole-fused isolators provided by the
electrical service Supplier, according to plan of implantation to be executed by the
Supplier.
It is the responsibility of the supplier of the power grid to dimension the same to
guarantee the permanent service.
ID Deliverable Phase
Maintenance and
03.03.00 Electronics Maintenance
Support
Design criteria
06.02.00 Technology Systems Design
validation
11.4.1 Introduction
IDMS is a comprehensive airport worker identity management solution designed to work with
highly configurable workflow capabilities to meet all ICAO/TSA/FAA/Local regulations and other
airport specific requirements for managing identities, credentials and the various events
associated with those IDs during their lifecycle as a worker in an airport.
GACA uses IDMS as a centralized solution that allows the integrated management of authorized
identities of national airports and is presented in this document as it is the main interface with
the access control system.
Functional Requirements
The IDMS is a web-based solution, policy-driven software solution which includes all capabilities
of a centralized management system to align with security threats and automation of privilege
lifecycle management for physical access.
It includes:
Bi-directional data exchange between IDMS and other systems that need to be
integrated. This includes SACS server of each Airport Site and authoritative data
sources like APIC Database Card;
Pre-defined rules and workflow for acting on the data fed. This system controller, with
algorithms, will enforce all the rule check prior to allowing access;
A self-service portal, including a security training program for each user that requests
an APIC Card;
A portal to manage visit and visitor;
Administrative console to manage all types of cardholders and their processes;
Reports consoled which include pre-defined reports on enrolled personnel,
provisioned/deprovisioned access, access request and reviews, etc.
Local requirements
Under the current regulations, the credentialing process must be performed by each airport
operator regardless of what privileges or similar credentials an applicant may have at another
airport.
In addition, each airport has a mandatory airport security training program that each individual
must complete before being issued an airport credential. The type of training typically depends
on the nature and scope of access permitted, including special training for persons with ramp
driving privileges.
Therefore, it is not within the scope of this document to carry out the design of the IMDS, already
available from GACA. But as a complement to it, at the Amaala Airport level:
IMDS workstation, to carry out the APIC application and validation process;
Equipment for capturing personnel data (photography, fingerprint, ...);
Equipment for the local production of the APIC and programming of the necessary
information;
Integration of the IDMS with the local SACS system and with authorized data sources,
such as the APIC and vehicle databases.
Therefore, it is considered that for the adequate coverage of the exposed needs, the production
material of the accreditations should be considered as an auxiliary module of the SACS and be
an additional supply from the same supplier.
IDMS:
GACA's centralized solution that provides verification and validation services for an
ID card application, as well as the management of the privileges assigned to it.
Airport Badge Office:
Equipment that allows local production of the identification card for people, visitors
and vehicles. Likewise, capture the personal data of the accredited subject.
SACS:
Control and management system for access privileges to the different areas or
areas of the airport, discussed in the previous section.
The following figure shows the logical relationships between the described components:
Component Specification
Reader-Recorder
Component Specification
Process With the ability to read and write proximity cards (frequency 13.56 MHz)
Workstation connection
Network
Communication in safe mode (cryptographic key)
Fingerprint reader
Component Specification
Technology Device through which the user fingerprint is registered in the system
Workstation connection
Network
Communication in safe mode (cryptographic key)
Identification camera
Component Specification
Technology User image acquisition element to be incorporated the system
Workstation connection
Network Own software, loaded in the PC, that allows the previous adjustments of
each function of the camera
ID Deliverable Phase
11.5.1 Introduction
Closed Circuit Television (CCTV) is a system designed to capture, display and record images of
an enclosure, in this case the Amaala Airport facilities, to which only a certain number of users
should have access.
The equipment technology of CCTV systems is constantly evolving, due to the improvement in
the performance of the products offered by the industry and the regulatory technical standards
that are established.
CCTV design criteria evolve as airport Information Systems /Information Technology (IS/IT)
networks become more capable, video security systems become "digital" and also "smarter" ,
and allows multiple users in the security community to monitor an event in real time and from
different locations through data networks.
Currently the cameras base their operation on the transmission of images through a TCP/IP
network, which can be UTP structured cabling networks, fibre optics and even Wi-Fi networks.
The cameras output is directly digital video streaming.
IP cameras can work with resolutions derived from the computer industry, currently it is common
to achieve image qualities of Megapixel format.
Image recording systems may not be part of the system since any server on the intranet or on
the internet will be able to directly access the cameras and store the images on its own hard
drive. The amount of data coming from the cameras to the storage system is increasing and in
a continuous process, allowing the system to simultaneously view and record the cameras.
In addition, the use of digital video compression techniques simplifies video management and
optimizes the use of system resources by preventing possible network overloads.
To all the above, such as CCTV applications or auxiliary modules, the industry has developed
powerful algorithms for intelligent image analysis or treatment, which offers significant
improvements in certain routines and security services.
All this has promoted that General Authority of Civil Aviation (GACA) of the Kingdom of Saudi
Arabia aims leveraging its airports video surveillance systems to unified one using a common
technology allowing an integrated National Airport Video Surveillance Architecture.
BS 8495 British Standard on the ode of practice for digital CCTV recording
systems for the purpose of image export to be used as evidence
Other uses
Current CCTV systems allow multiple users to view a given image in real time and from different
locations over data networks. This feature has promoted that the installation of the security
CCTV is also used by other areas of the airport and thus eliminate the duplication of equipment
with similar coverage. The proposed solution would be to have a single CCTV system covering
the whole of the airport, supporting security operations and other checkpoints, for example:
Type of coverage
For airport security, a key issue in establishing surveillance requirements is resolution, i.e., the
ability to resolve operationally significant details at a specified distance.
Internationally, there are different guides or supporting regulations in the design of CCTV
systems to relate the operating requirements to be covered with the requirements of the image
to be obtained, such as those of The British Home Office.
An adaptation of the aforementioned standards to the needs of the airport determines the
following types of coverage:
Purpose Description
SURVEILLANCE Cameras related with “surveillance” of people, vehicles and its
environment, it must comply with the following requirements:
Person/vehicle occupies less than 5% of the height of the
monitor. Such a level of detail only allows the presence of
people or vehicles to be detected in a wide area
Usually it relies with PTZ cameras and operator must know
in advance the zone to control
MONITORING Cameras related with “monitoring” of people, vehicles and its
environment must comply with the following requirements:
Person/vehicle must take up at least the 5% of the monitor
height. Such detail level is enough to detect the presence
of people or vehicles over a wide area, and the direction of
its movement
Target distance is usually maximum 50 meters
DETECT Cameras related with “detect” of people and their environment must
comply with the following requirements:
Person/vehicle must take up at least the 10% of the
monitor height. Such detail level is enough to enable the
operator to act in alert condition, search in the monitor for
one specific person and to confirm or dismiss his presence
with high degree of confidence
Target distance is usually up to 30 meters
OBSERVE Cameras related with “observe” of people and their environment
must comply with the following requirements:
Person/vehicle must take up at least the 30% of the
monitor height. Such detail level is enough to identify
specific characteristics like the clothes, its colour, etc, while
having some view about the environment of the monitored
person
Target distance is usually up to 20 meters
RECOGNIZE Cameras related with “recognize” of people must comply with the
following requirements:
Surveilled person/vehicle must take up at least 50% of the
monitor height. Such detail level is enough to enable the
operator to identify a known person with a high degree of
confidence
Target distance is usually up to 10 meters
IDENTIFY Cameras related with “identify” of people must comply with the
following requirements:
Surveilled person/vehicle must take up the 100% of the
monitor height. Such detail level is enough to enable the
operator to identify any person without any doubt
Target distance is usually up to 5 meters
It is usual to relate the “purpose” of the coverage with the pixels of the image to be obtained,
but this will only be of value when the specific monitor model to be used is defined.
For system operation, account should also be made of the difference between live operation
and playback / review operation when considering image size requirements. For example, in a
live monitoring situation, where a rapid assessment of the scene or situation may be needed, a
higher screen occupation may be required than a system which is required to be more ‘reactive’,
whereby little or no live interaction is anticipated and recordings / events can be reviewed in
slower time.
Facial recognition;
Queue control;
License plate recognition;
Intrusion detection;
Temperature detection (thermal cameras).
Functional Requirements
A CCTV system basically comprises the processes of capturing, transporting, displaying and
recording the images, the set of the processes being what will determine the degree of
functionality that the system provides.
The basic components of the system have been defined, covering the described process:
IP cameras;
Transmission through the airport's internal network;
Management and visualization through VMS application;
Network recording system.
Defined the architecture of the system, the value or performance that the captured image
provides us, as a source of information on which the entire process of the CCTV system is based,
is the functional parameter that will further customize the installation to the needs of the Airport
and this will depend on two values:
Resolution or information capacity that the image provides at an operational level.
This factor has already been defined in the previous section, based on the standards
that are applicable.
The Scenario presented by the location of the camera. Amaala Airport shall determine
and apply its own camera location requirements for security purposes, considering the
perceived risk within the particular operating environment and its own infrastructure.
o The criteria to apply are:
By location of controlled doors;
By Airport processes;
By common areas.
From the typology of doors to be protected by the ACS system, most of them have established
the characteristic of "monitoring", that is, they are doors that "have elements for their control
and centralized monitoring of the state of the same.
The monitoring and evaluation process of the alarms or events that may occur requires that the
assigned operators (SOC) carry out the verification thereof. For this, as a general criterion it is
established:
“Every door controlled and monitored in SOC, will have a camera that allows its
visualization”.
The coverage carried out, by general criteria, will be for the purpose of OBSERVE:
“Person/vehicle shall take up at least the 30% of the monitor height. Such detail
level is enough to identify specific characteristics like the clothes, its colour... etc,
while having some view about the environment of the monitored person”.
In Type 02 doors (E = F; S = F; T = NO; E.g. = NO / YES; M = YES). The coverage
carried out will be for the purpose of DETECT:
“Person/vehicle shall take up at least the 10% of the monitor height. Such detail
level is enough to enable the operator to act in alert condition, search in the
monitor for one specific person and to confirm or dismiss his presence with high
degree of confidence”.
Coverage will be carried out in the attack zone, that is, in the zone of least risk, in order
to be able to perform a deterrent function and preventive identification, in the following
types of doors:
o Tipo 02: E=F; S=F; T=NO; E.g.=NO/SI; M=SI;
o Tipo 03: E=C; S=F; T=NO; E.g.=NO; M=SI;
o Tipo 04: E=C; S=F; T=SI; E.g.=NO; M=SI;
o Tipo 09: E=L; S=P; T=NO; E.g.=NO; M=SI;
o Tipo 10: E=C; S=P; T=NO; E.g.=NO; M=SI.
Coverage will be carried out in both areas of the door, in the following types:
o Type 05: E = C; S = C; T = NO; E.g.= NO; M = YES.
o Type 06: E = C; S = C; T = YES; E.g.= NO; M = YES.
Type 07 emergency doors, coverage will be carried out according to the specific
configuration that corresponds to it (02, 03, 04, 05 or 06) and previously defined
requirement.
Type 08 emergency doors, coverage will be made from the area of origin of the
evacuation, in order to perform a deterrent function and preventive identification.
It is not necessary to assign one camera per door, being possible to cover different
doors with the same camera if the established purpose of OBSERVE or DETECT is
covered.
Note: E=Entry; S=Exit; T=Temporary; E.g.=Emergency; M=Monitored; C=Controlled; F=Free;
P=Prohibited.
PASSENGER PROCESS
AUTHORITIES
LUGAGGE PROCESS
STAFF PROCESS
CARGO PROCESS
AIRPLANES PROCESS
In the development of the processes carried out, certain areas have not been considered as they
are common to the different users of the airport and it is necessary to apply general criteria.
The criteria for covering common areas are:
PERIMETER
PARKINGS
The possibility that users can view a certain image in real time and from different locations
through data networks, has promoted the CCTV system, based on certain needs that the present
study has not considered.
Example to this regard are:
IT requires visual verification of the information presented in FIDS;
Maintenance, requires verification of technical alarms that may occur in
electromechanical systems;
General services require visual verification of availability of external transport (taxi, bus,
etc.).
The Video Management System (VMS) provide comprehensive user management, alarm
management, status control and configuration.
The basic components of the application are:
Central Server software, which allows you to manage and control the entire system;
Video Recording Manager services allow you to manage the recording and playback of
video, audio and data;
The Configuration Client software, which provides a user interface for system
configuration and management;
The Operator Client software, which provides a user interface for control and
management of the system.
The VMS user interface will support:
Location of cameras on the map;
Selection and display of cameras;
Consultation of events;
Multiple types of sensors per window;
Visual navigation of the video playback timeline;
Incident management.
Other basic functional requirements of the VMS system are:
It will provide hierarchical role-based authorization policies;
Advanced user interface concepts for effective and efficient operation;
Logical tree configurable with automatic detection of IP device;
Minimum and maximum recording time adjustments per camera;
The recording schedule of each camera has quality and image speed settings for live,
normal, motion or alarm recording;
Assigning events to user groups;
Event recording based on planning;
Execution of scripts generated by events according to planning;
Selectable emergent menu for alarms;
Activation of alarms based on planning;
Access to system resources individually controlled by each user group;
Customized logical tree for each user group: users only see the devices they have access
to;
The system should allow to configure scenarios. A scenario will be a preprogramed
situation in which the action of a group of elements (cameras, monitors, VDRs, etc.) as
a whole is defined;
The configured scenarios will be activated either manually or from certain events or
system alarms;
Support sending live or playback video to external monitors and video walls;
All actions on the system shall be recorded, which shall determine the sequence of
events should any historical analysis be required. Reports shall include alarm event
analysis which can be either manually or automatically generated;
The system will allow live monitoring and recording of peripheral devices with audio
capabilities;
The application shall provide an audit log per operator which will include:
o Operator log-on/off identification and time;
o Camera and monitor selections by number or description and times and including
all camera functions performed;
o Received and accepted alarms by description and times.
Bandwidth requirements to be defined by the system vendor;
Redundancy available, at the software and hardware level, for the Central Server.
The VMS, through the services of the Video Recording Manager, allows you to manage the
recording and playback of video, audio and data of the Video Digital Register (VDR) and shall
fulfil the following requirements:
The review of recorded images shall be password protected and shall be restricted to
authorized operators only;
Deleting recorded images or copying to external memory, shall be allowed only on
supervisor’s level;
The review of recorded images would be performed at either of the VMS workstations;
however, review software shall reside on all workstations but only enabled as required,
by authorized staff;
The system shall enable the playback of time lapse, triggered and real time event
recordings as a continuous video stream;
The system shall include a search function to enable stored data recorded at a specific
time and date to be accessed and reviewed;
The system shall automatically present alarm triggered pre/post alarm recorded
sequences to the operator alarm monitor. It shall also be possible to automatically
present local cameras associated with the alarmed camera, to the video wall to provide
the operator with a greater awareness of the alarm scene, and enable individuals
connected to the alarm to be tracked;
The system shall enable recorded megapixel camera images to be reviewed in zoom
mode;
Programmable time profiles per camera;
The system provides video authentication for recordings to external devices;
Ability to record and deliver incoming audio streams from external devices.
The video wall display is required to be controlled a fully redundant video display processor and
management server located in the SOC and managed by the CCTV Management APP, which
shall provide the following functions:
The Display processor shall provide a scalable solution to drive from a single display to
an effectively unlimited number of display screens;
Source input components shall enable the capture of standard video and DVI/RGB
sources and distribute these at full frame rate and resolution to any number of displays
and operator positions for viewing;
Network streams shall be decoded directly without additional hardware requirements
– the number of these sources that can be viewed simultaneously can easily be
expanded seamlessly – with the addition of more processing units as required for any
future requirement;
Any networked input (computer or videos etc.) shall be capable of being distributed
over the display surface without any restriction on size and position;
To manage the display configuration and positioning of applications and video sources
a Video-Wall Management Server will be provided to enable a simple intuitive user
interface with drag and drop capability to the wall from integration with the CCTV
Management Application;
The video-wall management software shall enable specific pre-configured video display
cameras to be programmed to provide default camera views and sizes to be presented
per operator at log-on to the CCTV Control & Monitoring workstation.
Video wall:
The CCTV shall interface to the Audio-Visual system to enable the display of video
images on the video wall.
VMS Operation
The Video Management System (VMS) provide comprehensive user management, alarm
management, status control and configuration.
The basic components of the application are:
Central Server software, which allows you to manage and control the entire system;
Video Recording Manager services allow you to manage the recording and playback of
video, audio, and data;
The Configuration Client software, which provides a user interface for system
configuration and management;
The Operator Client software, which provides a user interface for control and
management of the system.
The VMS user interface will support:
Location of cameras on the map;
Selection and display of cameras;
Consultation of events;
Multiple types of sensors per window;
Visual navigation of the video playback timeline;
Incident management.
Other basic functional requirements of the VMS system are:
It will provide hierarchical role-based authorization policies;
Advanced user interface concepts for effective and efficient operation;
Logical tree configurable with automatic detection of IP device;
Minimum and maximum recording time adjustments per camera;
The recording schedule of each camera has quality and image speed settings for live,
normal, motion or alarm recording;
VMS Workstation
Each VMS workstation shall provide:
A colour Graphic User Interface (GUI) with maps and dynamic icons showing the
location and individual status of all cameras and VDR installed at the airport and provide
easy selection and control of required systems;
La Workstation shall be programmed with all maps, icons and camera switching
capability and it shall be only preprogramed software partitioning that shall determine
which operator can view and control which camera (depending on the user's login and
password);
Each workstation can incorporate three screen monitors. Monitors will generally
perform the following functions:
o Monitor 1 - Main Graphics Monitor;
o Monitor 2 - Surveillance Monitor;
o Monitor 3 - Alarm Monitor.
Workstations should have high-quality local audio playback capability to match the
audio recording capabilities of CCTV cameras;
Double-click operation on camera selection or drag and drop from a sitemap, logical
tree, or favourite tree.
VDR Operation
The VMS, through the services of the Video Recording Manager, allows you to manage the
recording and playback of video, audio, and data of the Video Digital Register (VDR) and shall
fulfil the following requirements:
The review of recorded images shall be password protected and shall be restricted to
authorized operators only;
Deleting recorded images or copying to external memory, shall be allowed only on
supervisor’s level;
The review of recorded images would be performed at either of the VMS workstations;
however, review software shall reside on all workstations but only enabled as required,
by authorized staff;
The system shall enable the playback of time lapse, triggered and real time event
recordings as a continuous video stream;
The system shall include a search function to enable stored data recorded at a specific
time and date to be accessed and reviewed;
The system shall automatically present alarm triggered pre/post alarm recorded
sequences to the operator alarm monitor. It shall also be possible to automatically
present local cameras associated with the alarmed camera, to the video wall to provide
the operator with a greater awareness of the alarm scene, and enable individuals
connected to the alarm to be tracked;
The system shall enable recorded megapixel camera images to be reviewed in zoom
mode;
Programmable time profiles per camera;
The system provides video authentication for recordings to external devices;
Ability to record and deliver incoming audio streams from external devices.
Component Specification
Identification pass printer
Technology
Colour customization by resin thermal transfer
Electronic image
yes
stabilization
Component Specification
Compression H.265, H.264, MJPEG
BNC video output. Audio input / output. Alarm input / output. 1 RJ45
Input / output
10/100 Mps port
IP address filtering
IP66 outdoor protection
Protection
IK10 vandal protection
Component Specification
Lens (*) 8 – 32 mm
Autofocus yes
Optical zoom 4x
Component Specification
Autofocus yes
IP - Panoramic Dome.
Component Specification
Compression H.265+/H.265/
(*) These data are indicative of market product, others of similar that do not affect
performance and other characteristics will be accepted.
In any case, the selected VDR system will meet the following minimum requirements:
CCTV system shall comply with the following availability and reliability requirements
The entire CCTV system shall provide a high availability. All configurations and data
used by the software shall be backed up on a daily basis to prevent data loss;
The system provided shall be equipped with a UPS solution to maintain the system
stability. Any power variation should not affect the quality of the image nor the
video features;
The organization of information on the screen shall be clear. The information
(Online Help, Documentation) provided with the system shall be clear and concise.
The Graphic User Interface shall be user friendly;
The system provided shall work 24 hours a day. The CCTV System shall have a high
MTBF, and a reduced MTTR shall be achievable;
The Supplier shall provide within the proposal detailed information regarding
technical specifications of each of the proposed equipment, materials, and
accessories demonstrating integration / interfacing amongst them;
The Mean Time Between failures (MTBF), Mean Time To Repair (MTTR), Mean Time
Between Critical Failures (MTBCF) and Availability figures of all the equipment
proposed should be provided and the overall system, indicating the method used
for the calculation, such as MIL-HDBK-217;
The CCTV system shall display the visual information in real time. As minimum
response times values for the CCTV system elements, the following values shall be
considered:
o System start time: 3 min. Maximum;
o Switching time: 10’’ maximum;
o Fault detection time: 10’’ maximum.
The required Availability of the main system elements over a period of twelve (12) months
shall be:
Cameras 99.99
VDRs 99.99
Maintainability
The CCTV must support centralized monitoring and fault reporting to minimize
maintenance overhead and operating expenses (OPEX);
The CCTV will allow technical administrator access that can perform incident
diagnostics and firmware updates remotely.
System resources (processor speed, memory, disk space, network bandwidth) will
be dimensioned accordingly;
Reserve spare capacity of the processing time and memory shall be not less than
40% of the available processing time and memory for each processor, based on
average use values.
Redundancy:
In general, the CCTV shall incorporate the following redundancy concepts:
Data Integrity.
The system will provide a complete logging system for all alarm and event data;
The solution shall support the integrity and confidentiality of data from source to
point of use;
The solution shall support the capture of operational and commercial performance
data for analysis and reporting purposes.
Rf interference compliance
The CCTV is to be installed in a major airport and is subject to background RF levels expected
in such an area, including but not limited to aircraft navigation aids and land based mobile radio
systems. All equipment shall comply with statutory radiation limits.
It is the Supplier's responsibility to protect the systems specified here from interference of other
systems and to prevent interference with other systems. All facilities must comply with
applicable and mandatory regulations.
When a failure is detected, the system shall be able to automatically reconfigure onto the
surviving server and to restart processes, so that operation can continue without message loss
or the need for immediate operator intervention.
Operating Environment
Equipment shall be designed, installed, and tested to meet the following minimum
environmental criteria:
Power requirements
Regarding Energy, the CCTV deployment will fulfil the following requirements:
The following table sums up in a high-level overview the deliverables to be provided by the
CCTV supplier during the project:
ID Deliverable Phase
11.6 Services
The Supplier shall liaise with the Client, Architect, Design Consultant, Security Agencies and
other appropriate parties to define the infrastructure required for each of the necessary
speaker type to be used.
The Supplier shall liaise with the Client, Design Consultant and other appropriate parties to
obtain the information necessary to establish an estimate of the network traffic utilization
profile.
The Supplier shall liaise with the Client and other appropriate parties to determine the exact
location and fixing of the required field equipment.
The Supplier shall be responsible for working with the Airport and the stakeholders to
develop the proper configuration and format for the system.
11.6.3 Installation
The following points explain the general requirements in order to accomplish a complete
functional deployment of the system.
Cabling
Both the structured data cabling and power cabling for the system are expected to be
provided by third party Suppliers, nevertheless, the following points describe the complete
general cabling requirements in order to deliver a full system interconnection. The detailed
scope of the Supplier in these terms needs to be specified with the Client. Meantime it is
assumed that the Supplier will be responsible for the complete installation, labelling and
testing of the cabling up to the closed connection outlet.
The structured cabling shall be CAT 6 and Low Smoke Zero halogen.
All the cabling shall be certified and finished in patch panels and sockets.
The cabling should finish in a male RJ45 to be connected to the monitors/controller.
All the cabling, patch panels and intermediate boxes shall be labelled as per labelling
specifications detailed below.
The maximum distance between the displays and the network distribution rooms for the
Ethernet cable shall be less than 95m.
The Supplier shall try to standardize cable types and lengths in the installation.
The Supplier shall provide the cable certification and validation to the Employer.
Power/Grounding Requirements
The equipment shall operate from a power source of: 230 V ± 10%, 50 Hz ± 5% and from
the Uninterruptible Power System (UPS) supplied by a third party Supplier.
The connection to the power outlet at the installation site shall be the responsibility of the
Supplier. Supplier shall coordinate all power requirements at the design stage in order to
arrange the location of the power points as close as possible to the equipment final
location.
The Supplier shall provide the estimated consumption of all equipment so the MEP Supplier
may size the power installation accordingly. The Supplier shall specify itemized the
electrical capacity in Watts needed for the system connection.
The system will be connected to the Airport UPS.
Labelling
Labelling both equipment and cables is not only a good practice but also a requirement in such
big facilities as airports where different types of systems hardware interface with each other.
All active and passive equipment shall be labelled. The label shall include the system information,
building (XX), floor (YY), room (ZZ), Equipment name (SW) and identification number (001).
All this information shall be included in a tool/system that will be able to link the equipment
installation place with the equipment information (Manufacturer, S/N, P/N, etc.).
Each cable shall be identified at its extremities, in junction boxes and at manholes by a
coloured label containing the following information, as a minimum:
Cable function;
Cable number: This number shall identify the nature of the cable and its source and
destination (indicating the connected equipment and its location at both ends of
the cable).
The Supplier shall provide the appropriate cable documentation which shall contain the
following information for each cable:
Source. Equipment and location;
Destination. Equipment and location;
Cable type;
Cable function/service;
Cable number;
Technical description.
The Factory acceptance test shall ensure the proper operation of the system between the
supplier/manufacturer and the Supplier.
The Supplier shall ensure that all equipment and materials are in good working condition
prior to and after installation.
The Supplier shall invite authorized supplier representative(s) to confirm and accept that
proper installations, termination and another technical requirement are attained.
The Supplier shall ensure a Factory acceptance test sheet properly filled in by the
supplier/manufacturer before the actual testing and commissioning stages.
After all work is completed, and prior to requesting the acceptance test, the Supplier shall
conduct a final inspection, and pre-test all equipment and system features.
During the acceptance test, the Supplier shall demonstrate all equipment and system
features to the Client/Consultant. The Supplier shall remove covers, operate equipment,
and perform other reasonable work as requested by the Client/Consultant.
Any portions of the work found to be deficient or not in compliance with the project
drawing, specifications and the Supplier Design shall be rejected. The Supplier shall correct
all deficiencies in accordance with the General Contract Requirements.
Upon completion of the installation activity, the Supplier shall test, start-up, commission
and handover the system to the Client/Consultant.
The Supplier shall perform the following tests as required for the system with the presence
of the Client/Consultant:
Installation Check Report;
Power "On" test;
Integration test;
Power "Off" test (test of back-up power sources and failover).
The Supplier shall provide a detailed test plan with all relevant functions of the above-
mentioned tests. The test plan shall be reviewed and/or approved by the Client/Consultant
prior to testing.
The Supplier shall ensure proper coordination in testing each relevant system. The Supplier
shall guarantee to the Client/Consultant that each system is ready for testing.
The Supplier shall incur all cost related functions of the acceptance test.
Upon reaching substantial completion, the Supplier shall perform a complete test and
inspection of the system (commissioning). If the system is found to be installed and
operating properly, the Supplier shall notify the Client/Consultant of the Supplier's
readiness to perform the formal test and inspection of the complete system.
The Supplier shall undertake system-wide integrated testing to verify, test and commission
all interfacing systems & equipment.
The integrated system tests shall verify the functionality of the interfacing systems and
confirm that the respective systems and equipment perform and interact satisfactorily and
in accordance with the Requirements.
The Integration test shall not limit the warranty of the system.
The Supplier shall be responsible for inspecting and testing the complete system.
The Supplier shall start up and operate the system for a trial period to ensure that it
operates correctly.
The Supplier shall demonstrate the network resilience by creating a series of failures (i.e.
cutting power to equipment, pulling out cables, etc) across the different components.
The Supplier shall supply a list of the 'failures' to be simulated including the functionality
that is to be tested as well as the anticipated outcome. The list shall be approved by the
Client/Consultant before the test commences.
The Supplier shall provide the system test strategy, including various test environments
through initial software customization to commissioning; resources; data; tools;
documentation and defect management.
The Supplier shall produce a detailed test plan covering initial software customization
through to commissioning, to include functional and non-functional requirements testing
and manage all systems test teams to complete test schedules specified therein, ensuring
defects are managed appropriately and in accordance with agreed entry / exit criteria, test
cases and schedules for acceptance of all systems individually and for all integrated systems
within the confines of the agreed detailed time program.
Tests after Completion shall be conducted following issue of a Taking-Over Certificate of a
section or the works, as applicable.
ORAT Activities
The organization and execution of all ORAT activities to take place after ICT commissioning
will be the responsibility of the Design Consultant. Nevertheless, the Supplier is expected
to assist those activities in each of the steps that may be related to the system provided.
Typical phases where the Supplier shall be involved:
ORAT set-up;
Operational Preparation;
Training and Familiarization;
Operational Trials;
Terminal Transfer;
Opening Support;
Post Opening Support.
11.6.5 Training
The training program shall ensure that the staff is fully trained in handling the individual
units, subsystems and the full systems. The scope shall include, but not be limited to:
Educational requirements;
Operational procedures and measuring techniques;
Maintenance procedures;
System design including architecture, functionality, performance and non-
functional characteristics;
Trouble shooting;
Quality management;
Health and safety issues;
Environmental issues;
Risk assessment and management;
Content and familiarization with O&M (Operation & Maintenance) manuals;
Business continuity strategy & disaster recovery.
Training shall be provided to trainers and selected operational and maintenance staff for
onward training. The staff shall include outsourced operational and maintenance entities.
Attendees shall include, but not be limited to:
Trainers;
The technical management;
Engineers;
Airlines Operators;
Maintenance staff.
Factory Training
Technical Factory Training to be performed together (not at same time) with FAT within the
Factory Dependencies.
The training shall be based on system functions, configuration, trouble shooting and
maintenance
On Site Training
Technical and Operational training to be performed before the SAT.
During the system installation the Supplier shall offer On the Job Training (OJT) without any cost
to the system technicians.
On-site training shall be offered to System Administration, System Operation and Maintenance.
Training Duration will vary for each of the Systems.
Detailed listing of the scope of supply: COTS, main installation material, such as
trays, pipes, etc.;
All relevant technical descriptions of the equipment hardware/software based on
the personalization of the contractual configuration;
System architecture;
Scaled and detailed equipment floor plans and equipment location drawings;
Cable routing and interconnections;
Supports Designs;
Civil works specifications / requirements (if any);
A complete and detailed final work schedule.
The Supplier shall update the approved project plan on a bi-weekly basis until contract
completion.
Design Review Meeting: The Supplier shall arrange a Design Review Meeting within two
(2) weeks after submitting the revised SDD. The meeting shall be held between the Supplier
and the Employer´s appointed representatives, at a mutually agreed location.
The purpose of the meeting shall be to review the system design as outlined in the SDD.
The SDD shall be subject to the Client/Consultant´s review and approval.
In order to facilitate the review, the Supplier shall provide a spreadsheet indicating the
documents that are part of the SDD (including drawings, datasheets, etc.), version number
and submission date. This document will be utilized to keep track of the changes in the
SDD documentation, as well as the clarifications requested by the Employer. The Supplier
will update this spreadsheet with each SDD submission.
If the document(s) in question are rejected, the Supplier shall have fifteen (15) days to
correct the document(s) and revise them at no additional cost.
The Supplier should assume the responsibility of adapting the design in case of changes in
the civil works or the Master Plan and follow the previously agreed change management
process together with the Client/Consultant in order to manage any impact in the project.
12 SAFETY SYSTEMS
12
12 | SAFETY SYSTEMS
12 SAFETY SYSTEMS
12.1 Previous design parameters
12.1.1 Introduction
A fire alarm system is designed to detect the unwanted presence of fire, at the earliest possible
stage, by monitoring the environmental changes associated with combustion.
In general, a fire alarm system has the function of detecting and notifying building occupants
to evacuate in the event of a fire or other emergency. Also, to report the fact to the pre-
established control centres, in order to notify the emergency services, and to prepare the
structure and associated systems to control the spread of fire and smoke.
System that is expected to comply with applicable local regulations and codes or standards that
exist worldwide for the design, installation, commissioning and service of fire detection systems.
With the airport's operational criteria, which require centralized monitoring and management
of its critical facilities, including fire detection, the need is created to incorporate into the usual
structure of the fire detection system, valid and distributed by the different enclosures, an
integration platform for the different existing plants.
The proposed solution shall have centralized monitoring and management is through the Fire
Alarm System Integration, which is developed in the following section.
12.2.1 Introduction
As a basic definition:
NFPA 72 The United States National Fire Alarm Code for fire detection systems
and establishes the design, installation, commissioning, and
maintenance of these systems. Although it is a national code of the
United States. This has been adopted by several countries in the world.
This code is part of the United States NFPA family of standards.
Document: current 2019. Approved as the National Standard of the
United States in August 2012
Where it is identified:
FACP: it is the FA control panel that will be installed in secondary buildings.
MACP: it is the FA control panel that will be installed in the main buildings (offers
greater capacity than the previous one).
FA.WS: it is the workstation from which you can monitor and manage the entire
FA system with which you can set different levels of administration according to
user control.
The Fire Alarm System Integration will use a common database and operating system
throughout the airport's Information, Communications and Telecommunications (ICT)
infrastructure.
Servers will be installed in the main and secondary CPD, to guarantee the operation and
redundancy as it is a critical system, where the application will be installed and from where IP
communications with the different Fire Panels (FACP and MACP) of the existing buildings are
centralized in the airport.
The Airport Rescue & Fire Fighting (ARFF) building and its corresponding FA-Workstation shall
act as the main control position for the fire alarm systems throughout the airport. Similar
monitoring and control capabilities must be provided within the Airport Operations Control
Centre (AOCC) and the Crisis Management Centre (CMC).
Likewise, it is recommended to establish a control terminal of the Fire Alarm System Integration
system in the Security Operation Centre (SOC).
While all Fire Alarm System Integration capabilities are made available on different Workstations,
its use in normal airport operation and fire emergency management generally depends entirely
on operational emergency, preparedness and handling procedures. established elsewhere in
accordance with ICAO and national rules, regulations and procedures.
In general, the basic functions to perform are:
Functional Requirements.
The purpose of the Fire Alarm System Integration is the centralized management of fire alarm
systems throughout the Airport campus, whose most important facilities are the following:
Amaala Terminal;
ATC control;
RFF Building;
Administration Building;
Power Plant;
Chillers Plant;
Technical Building;
Sewage Treatment Plant.
The fire detection and alarm system will be considered a life safety system, therefore they
will have all the necessary elements to cover the risks to be protected and will be
implemented at the level of each installation in accordance with the established regulatory
standards. Specific requirement in this regard is the provision of the corresponding project
legalized by local authorities.
The integrated operation solution to be implemented shall work on a communications ring
independent of all existing facilities, so that they can be managed, monitored and
controlled from a single centralized platform.
At the integration level, at Amaala Airport, fire alarms will be consolidated into a central fire
alarm and response post located in the Air Rescue and Fire Fighting Station (ARFFS) and
with a duplicate work post located in the Security Operation Centre (SOC).
While all the capabilities of the Fire Alarm System Integration will be available at the TWO
key locations, their use in normal airport operation, as well as fire emergency management,
is entirely dependent on emergency operational preparedness. and management
procedures established with the GACA rules, regulations and procedures.
Therefore, this design report is not intended to describe or establish guidelines for the
operational relationship between different fire command centres, or for individual
buildings.
12.2.5.1.2 Operation of the Fire Alarm System Integration
The field elements that make up the fire detection system of the different facilities are:
Control:
o Central detection and alarm;
o Notifying graphic panel;
o Smoke control panel;
o Remote status indicators for hidden items;
o Directional state monitor modules;
o Auxiliary power supply.
Detection / Alarm:
o Alarm pushbuttons;
o Smoke detector;
o Thermal / thermovelocimetric detectors;
o Combined Smoke and Temperature Detectors;
o Carbon monoxide detectors;
o Duct detectors;
o Aspiration detectors by air sampling;
o Flow detectors for sprinklers;
o Water pressure detectors;
o Zone supervision detectors;
o Optical acoustic sirens;
o Linear smoke detectors.
The definition of their characteristics is not the object of this document, but it is recommended
that all the elements of the fire detection system be of the same type and manufacturer in order
to standardize the elements, facilitate maintenance and spare parts, and guarantee
homogeneous integration.
The Fire Alarm System Integration shall be able to interact with the building's systems
and facilities that may facilitate a possible expansion of the fire risk or make it difficult
for people to evacuate.
For this, it shall be integrated into the BMS system, which is capable of controlling and
monitoring the status of the following systems:
The PAS will be integrated with the Fire Alarm in such a way that any alarm generated
by that system and activated in an emergency, will activate the warnings that are
determined in the corresponding operations plan.
The SACS will be integrated with the Fire Alarm in such a way that any alarm generated
by the system or activated in an emergency, will release the points affected by the
evacuation routes. The integration at a high level will be done at the data level and at
the installation level in a redundant and obligatory way, the interaction will not be
through dry contacts.
Closed Circuit TV (CCTV):
In the event of a fire alarm, the CCTV system shall be able to provide the relevant image
on a screen.
Master-Clock System (MCS):
The Fire Alarm System Integration shall be time synchronized with the MCS, this
synchronization shall occur through the use of software that requests time from the
Network Time Server at intervals not exceeding fifteen (15) minutes. All recorded video
images shall incorporate the time and date as well as the camera ID.
Video wall:
The CCTV shall interface with the Audio-Visual system to enable the display of video
images on the video wall.
The system must be accessible from any Client Station, without the need to install
specific client software;
Unique and personalized workstation for the security operator, with the following
benefits:
o Layer structure;
o Predefined symbol libraries as icons;
o Clarity in the visualization of the state of the elements that make up the
installation;
o Interactive state map of the entire campus with the ability to scroll and
zoom;
o Alerts may overlap on campus map;
o Deactivated security devices and sensors will be indicated on the campus
map.
Server requirements
The server hardware platform shall be state of the art system with the following capabilities:
Multi-Core processors;
Multi CPU servers;
Capable of running 64 bit enterprise level OS.
Component Specification
Electronic image
yes
stabilization
Component Specification
Processor Two Processors: Each Processor Intel Xeon 2.93 GHz 64-bit Quad-core
Internal Storage 1) Support for Hot plug, Serial Attached SCSI, 2.5” 15KRPM Hard drives
2) DVDRW Optical Drive
Workstation requirements
The workstations required by the system will be provided by the IT Supplier, for the
standardization of the elements of the different control rooms and will meet the
requirements identified in the "Hardware Workstation" section of the Security Operation
Center.
As minimum response times values for the system elements, the following values shall
be considered:
o System start time: 3 min. Maximum;
o Switching time: 10’’ maximum;
o Fault detection time: 10’’ maximum;
o The system must support any number of simultaneous alarms.
Maintainability
The system will be maintainable according to the guide given in the following
standardization documentation:
o NFPA 72:2010.
The FASI must support centralized monitoring and fault reporting to minimize
maintenance overhead and operating expenses (OPEX);
The FASU will allow technical administrator access that can perform incident diagnostics
and firmware updates remotely.
Data Integrity.
The system will provide a complete logging system for all alarm and event data;
The solution must support the integrity and confidentiality of data from source to point
of use;
The solution shall support the capture of operational and commercial performance data
for analysis and reporting purposes.
Power requirements
Regarding Energy, the FASI deployment will fulfil the following requirements:
For the Workstations, Servers, it will be necessary to have electrical connections of safe
power, coming from UPS;
All equipment shall be fed locally via double pole-fused isolators provided by the
electrical service Supplier, according to plan of implantation to be executed by the
Supplier;
It is the responsibility of the supplier of the power grid to dimension the same to
guarantee the permanent service.
ID Deliverable Phase
12.3 Services
The Supplier shall liaise with the Client, Architect, Design Consultant, Security Agencies and
other appropriate parties to define the infrastructure required for each of the necessary
speaker type to be used.
The Supplier shall liaise with the Client, Design Consultant and other appropriate parties to
obtain the information necessary to establish an estimate of the network traffic utilization
profile.
The Supplier shall liaise with the Client and other appropriate parties to determine the exact
location and fixing of the required field equipment.
The Supplier shall be responsible for working with the Airport and the stakeholders to
develop the proper configuration and format for the system.
12.3.3 Installation
The following points explain the general requirements in order to accomplish a complete
functional deployment of the system.
Cabling
Both the structured data cabling and power cabling for the system are expected to be
provided by third party Suppliers, nevertheless, the following points describe the complete
general cabling requirements in order to deliver a full system interconnection. The detailed
scope of the Supplier in these terms needs to be specified with the Client. Meantime it is
assumed that the Supplier will be responsible for the complete installation, labelling and
testing of the cabling up to the closed connection outlet.
The structured cabling shall be CAT 6 and Low Smoke Zero halogen.
All the cabling shall be certified and finished in patch panels and sockets.
The cabling should finish in a male RJ45 to be connected to the monitors/controller.
All the cabling, patch panels and intermediate boxes shall be labelled as per labelling
specifications detailed below.
The maximum distance between the displays and the network distribution rooms for the
Ethernet cable shall be less than 95m.
The Supplier shall try to standardize cable types and lengths in the installation.
The Supplier shall provide the cable certification and validation to the Employer.
Power/Grounding Requirements
The equipment shall operate from a power source of: 230 V ± 10%, 50 Hz ± 5% and from
the Uninterruptible Power System (UPS) supplied by a third party Supplier.
The connection to the power outlet at the installation site shall be the responsibility of the
Supplier. Supplier shall coordinate all power requirements at the design stage in order to
arrange the location of the power points as close as possible to the equipment final
location.
The Supplier shall provide the estimated consumption of all equipment so the MEP Supplier
may size the power installation accordingly. The Supplier shall specify itemized the
electrical capacity in Watts needed for the system connection.
The system will be connected to the Airport UPS.
Labelling
Labelling both equipment and cables is not only a good practice but also a requirement in such
big facilities as airports where different types of systems hardware interface with each other.
All active and passive equipment shall be labelled. The label shall include the system information,
building (XX), floor (YY), room (ZZ), Equipment name (SW) and identification number (001).
All this information shall be included in a tool/system that will be able to link the equipment
installation place with the equipment information (Manufacturer, S/N, P/N, etc.).
Each cable shall be identified at its extremities, in junction boxes and at manholes by a
coloured label containing the following information, as a minimum:
Cable function;
Cable number: This number shall identify the nature of the cable and its source and
destination (indicating the connected equipment and its location at both ends of
the cable).
The Supplier shall provide the appropriate cable documentation which shall contain the
following information for each cable:
Source. Equipment and location;
Destination. Equipment and location;
Cable type;
Cable function/service;
Cable number;
Technical description.
The Factory acceptance test shall ensure the proper operation of the system between the
supplier/manufacturer and the Supplier.
The Supplier shall ensure that all equipment and materials are in good working condition
prior to and after installation.
The Supplier shall invite authorized supplier representative(s) to confirm and accept that
proper installations, termination and another technical requirement are attained.
The Supplier shall ensure a Factory acceptance test sheet properly filled in by the
supplier/manufacturer before the actual testing and commissioning stages.
After all work is completed, and prior to requesting the acceptance test, the Supplier shall
conduct a final inspection, and pre-test all equipment and system features.
During the acceptance test, the Supplier shall demonstrate all equipment and system
features to the Client/Consultant. The Supplier shall remove covers, operate equipment,
and perform other reasonable work as requested by the Client/Consultant.
Any portions of the work found to be deficient or not in compliance with the project
drawing, specifications and the Supplier Design shall be rejected. The Supplier shall correct
all deficiencies in accordance with the General Contract Requirements.
Upon completion of the installation activity, the Supplier shall test, start-up, commission
and handover the system to the Client/Consultant.
The Supplier shall perform the following tests as required for the system with the presence
of the Client/Consultant:
Installation Check Report;
Power "On" test;
Integration test;
Power "Off" test (test of back-up power sources and failover).
The Supplier shall provide a detailed test plan with all relevant functions of the above-
mentioned tests. The test plan shall be reviewed and/or approved by the Client/Consultant
prior to testing.
The Supplier shall ensure proper coordination in testing each relevant system. The Supplier
shall guarantee to the Client/Consultant that each system is ready for testing.
The Supplier shall incur all cost related functions of the acceptance test.
Upon reaching substantial completion, the Supplier shall perform a complete test and
inspection of the system (commissioning). If the system is found to be installed and
operating properly, the Supplier shall notify the Client/Consultant of the Supplier's
readiness to perform the formal test and inspection of the complete system.
The Supplier shall undertake system-wide integrated testing to verify, test and commission
all interfacing systems & equipment.
The integrated system tests shall verify the functionality of the interfacing systems and
confirm that the respective systems and equipment perform and interact satisfactorily and
in accordance with the Requirements.
The Integration test shall not limit the warranty of the system.
The Supplier shall be responsible for inspecting and testing the complete system.
The Supplier shall start up and operate the system for a trial period to ensure that it
operates correctly.
The Supplier shall demonstrate the network resilience by creating a series of failures (i.e.
cutting power to equipment, pulling out cables, etc) across the different components.
The Supplier shall supply a list of the 'failures' to be simulated including the functionality
that is to be tested as well as the anticipated outcome. The list shall be approved by the
Client/Consultant before the test commences.
The Supplier shall provide the system test strategy, including various test environments
through initial software customization to commissioning; resources; data; tools;
documentation and defect management.
The Supplier shall produce a detailed test plan covering initial software customization
through to commissioning, to include functional and non-functional requirements testing
and manage all systems test teams to complete test schedules specified therein, ensuring
defects are managed appropriately and in accordance with agreed entry / exit criteria, test
cases and schedules for acceptance of all systems individually and for all integrated systems
within the confines of the agreed detailed time program.
Tests after Completion shall be conducted following issue of a Taking-Over Certificate of a
section or the works, as applicable.
ORAT Activities
The organization and execution of all ORAT activities to take place after ICT commissioning
will be the responsibility of the Design Consultant. Nevertheless, the Supplier is expected
to assist those activities in each of the steps that may be related to the system provided.
Typical phases where the Supplier shall be involved:
ORAT set-up;
Operational Preparation;
Training and Familiarization;
Operational Trials;
Terminal Transfer;
Opening Support;
Post Opening Support.
12.3.5 Training
The training program shall ensure that the staff is fully trained in handling the individual
units, subsystems and the full systems. The scope shall include, but not be limited to:
Educational requirements;
Operational procedures and measuring techniques;
Maintenance procedures;
System design including architecture, functionality, performance and non-
functional characteristics;
Trouble shooting;
Quality management;
Health and safety issues;
Environmental issues;
Risk assessment and management;
Content and familiarization with O&M (Operation & Maintenance) manuals;
Business continuity strategy & disaster recovery.
Training shall be provided to trainers and selected operational and maintenance staff for
onward training. The staff shall include outsourced operational and maintenance entities.
Attendees shall include, but not be limited to:
Trainers;
The technical management;
Engineers;
Airlines Operators;
Maintenance staff.
Factory Training
Technical Factory Training to be performed together (not at same time) with FAT within the
Factory Dependencies.
The training shall be based on system functions, configuration, trouble shooting and
maintenance
On Site Training
Technical and Operational training to be performed before the SAT.
During the system installation the Supplier shall offer On the Job Training (OJT) without any cost
to the system technicians.
On-site training shall be offered to System Administration, System Operation and Maintenance.
Training Duration will vary for each of the Systems.
Detailed listing of the scope of supply: COTS, main installation material, such as
trays, pipes, etc.;
All relevant technical descriptions of the equipment hardware/software based on
the personalization of the contractual configuration;
System architecture;
Scaled and detailed equipment floor plans and equipment location drawings;
Cable routing and interconnections;
Supports Designs;
Civil works specifications / requirements (if any);
A complete and detailed final work schedule.
The Supplier shall update the approved project plan on a bi-weekly basis until contract
completion.
Design Review Meeting: The Supplier shall arrange a Design Review Meeting within two
(2) weeks after submitting the revised SDD. The meeting shall be held between the Supplier
and the Employer´s appointed representatives, at a mutually agreed location.
The purpose of the meeting shall be to review the system design as outlined in the SDD.
The SDD shall be subject to the Client/Consultant´s review and approval.
In order to facilitate the review, the Supplier shall provide a spreadsheet indicating the
documents that are part of the SDD (including drawings, datasheets, etc.), version number
and submission date. This document will be utilized to keep track of the changes in the
SDD documentation, as well as the clarifications requested by the Employer. The Supplier
will update this spreadsheet with each SDD submission.
If the document(s) in question are rejected, the Supplier shall have fifteen (15) days to
correct the document(s) and revise them at no additional cost.
The Supplier should assume the responsibility of adapting the design in case of changes in
the civil works or the Master Plan and follow the previously agreed change management
process together with the Client/Consultant in order to manage any impact in the project.
Sufficient spares shall be provided for the system such that the reliability, availability and
maintainability figures specified can be sustained following issuance of Taking-Over
Certificate and shall demonstrate, that the proposed spares are sufficient through the use
of appropriate techniques to provide evidence to this effect.
13 INFRASTRUCTURE SYSTEMS
13
13 | INFRASTRUCTURE SYSTEMS
13 INFRASTRUCTURE SYSTEMS
13.1 Building Management System (BMS)
13.1.1 Introduction
This Section defines and describes the System to be supplied as the Supervisory Control and
Data Acquisition (SCADA) Systems hub. The Building Management System (BMS) will optimise,
operationally and costly wise, facilities maintenance tasks using an integrated automation of
Control processes.
Moreover, the BMS will manage the necessary processed to obtain a joint view of facilities
maintenance operations.
The main aim of this System will consist on:
HVAC;
Energy and electricity subsystems (e.g. LV, MV, etc.);
Power Plant;
Lighting subsystem;
Plumbing subsystem;
Fire alarm subsystem;
Intrusion subsystem;
Public Address System (PAS);
Gas distribution subsystem (if available);
Managing and monitoring of aircraft assistance;
Residues management subsystem;
Mechanical transportation.
SENSORS
BMS NETWORK
SERVER
Functional Requirements
The BMS is primarily responsible for obtaining information and coordinating the Systems
supervision. This will allow having all the necessary information to manage the Engineering and
Maintenance processes.
Regarding the management level, the BMS will be in charge of communications with the
different airport management systems and coordination with the future Airport Operations
Control Centre (AOCC).
The BMS will be a SCADA-based system dedicating to monitor and control the technical
installations of Amaala Airport. As such, it shall have the functionalities of status monitoring,
command over devices, process variables reading, process setpoints modification, alarm
treatment, fault treatment, historical and current trends generation, historical data storage and
reporting.
Among others, the functionalities considered are as follows:
The BMS shall be equipped with the historical running times storage functionality for all
electromechanical equipment under its supervision.
The BMS facilities control system shall implement different functionalities to facilitate Energy
efficient management by Engineering and Maintenance personnel.
The BMS shall allow different levels of energy consumption configuration, depending on
production but without reducing the comfort of the users. The control system shall also be
capable of evaluating the unit energy costs of the installed equipment whose switching on and
off is under supervision.
The control system of the facilities shall allow slumps, in case of overloads when the defined
maximum level is exceeded, turning off equipment or zones programmed by the user so that
the differential jump is avoided, prioritizing safety and comfort at all times.
These actions will facilitate the transmission of clear and reliable information on the energy
efficiency of buildings to other interested systems and areas, such as Environment. The
incorporation of these functionalities to the facilities control system presents both security and
economic and environmental advantages.
The BMS will store all the data received and processed. All signals and alarms historic data will
be collected. The latter will be stored without a time limit, while the signals corresponding to
sensor readings will be stored for a minimum of three (3) months on the history server.
In any case, these records shall be configurable, being able to modify the specifications of each
variable at will. The stored data should be easily exportable by the user to other tools for
reporting, analysis and statistics not covered by the basic functionality of the system.
The BMS shall be accessible from any terminal on the network through a simple web browser.
Web access to the system should be restricted by user privileges, with different levels of access.
Through this access, any member of the organization, with the appropriate privileges, will be
able to view and interact with the available information, in real or historical time.
The System shall provide a Database on which all the data managed by the BMS will be stored.
The historical database should be relational, capable of recording data in real time, with
extensions in queries for data collected in real time and resistant to errors in communication
with information providers.
13.1.5.1.6 Dashboards
Dashboards are the interface that the user will find to interact with all the functionality of the
system and in particular with the Process Manager.
The operator's screens shall have synoptics that allow viewing with colour codes, at least the
following:
Operating status of the different elements of the system;
BMS communications with external systems status;
System time.
The main characteristics to be fulfilled by the Dashboards will be:
Control panels and process flow configuration;
Follow-up and presentation;
Service indicators;
Presentation of alarms.
The BMS should incorporate reporting tools. In addition to the predesigned reports, the system
shall include tools that allow the user to configure their own reports. Any of data presented on
the Database will be available to be incorporated on the reports.
The BMS will incorporate management screens for the alarms and incidents detected in the
system itself, which allow the operator to supervise its operation in real time and perform a
statistical analysis of failures.
The System will incorporate in the BMS, Alarms and Incidents Management Dashboards which
allow an operator to supervise the operation of the system in real time and carry out a
subsequent statistical analysis of incidents.
The Alarms management shall be configurable so that it is feasible to:
Set an alarm;
Send messages upon receipt of alarms;
Deactivation of alarms.
The System will manage technical and operational alarms. Technical alarms will indicate
incidents or failures (and their recovery) such as:
Failures and recoveries of the elements that the BMS controls and supervises;
Incidents in BMS communications with external systems.
In general, the system should allow full supervision of the technical and operational environment
under its responsibility.
The BMS will have system administration tools that allow user and usage profiles management.
The System shall implement user keys and password to identify access to the system.
Each user, registered in the system, will be assigned to one or more user groups. Each group
will have a usage profile that will limit the functionality that can be performed by an operator.
BMS Users Management shall have at least the following functionalities:
Add and remove users;
Assign a group to a user;
Configure usage profiles for different groups;
Configure the functionality of each profile.
13.1.5.1.11 Redundancy Requirements
Much of the information handled by the BMS is crucial for the Engineering and Maintenance
division management. Therefore, high availability characteristics are required in the most
important services of the system. The application core shall be redundant. In this way, in case
of failure of any of the elements of the system, there will be no loss in its functionality.
Likewise, the redundancy in the communication drivers with the field elements shall also be
guaranteed to ensure the reception of data even in the event of a system failure. These drivers
shall also have temporary storage buffers to foresee the possible disconnection of the history
module.
The terminal service shall be installed in suitable equipment to guarantee high availability as
well as the performance characteristics defined in this section.
Document Manager will be in charge of processing the information available to the Engineering
and Maintenance department so that it can be used when it is needed.
The Document Manager will allow to archive existing information in any format (images, office
application documents, faxes, emails, audio, video, etc.). By associating structured information
to the captured document (indexing), its subsequent consultation, recovery and treatment will
be made possible. In addition, content management will be contemplated that allows the
organized retrieval of system information and the subsequent processing for publication in
other media.
It will also have the automation of documentary workflows (task distribution, monitoring and
archiving), properly integrated with Engineering and Maintenance Process Management, so that
during the evolution of a process, documents and tasks are passed from one participant to
another, according to pre-established rules. Each document profile shall have associated
corresponding security information, which can be defined at multiple levels.
The BMS should incorporate reporting tools. These reports will be predesigned and will be
generated by the System without any additional configuration by the user. The system will allow
the issuance of customized reports by the user.
The BMS will allow to present analysis on the data selected by the operator, both graphically
and numerically:
It will provide statistical analysis tools that allow calculating the Data series main
parameters;
It will allow the preselected variables to be measured interactively and presented in the
dashboards incorporated in the HMI;
Operator will be able to present large volumes of data in multidimensional cubes that
allow you to navigate information in a dynamic and intuitive way. The information will
be available through quick access, without depending on the amount of source data or
the complexity of the queries;
Sorting and filtering algorithms can be applied to the results of the analysis;
The analysis carried out will be stored in a common repository that allows a single
access to the information;
It will allow export to Excel office automation tools to provide formatted output of
reports.
13.1.5.1.16 Data Storage
The system will record all data, both raw information received from external sources and the
one processed and generated by its own operations.
The system shall incorporate a Database with the relevant and properly structured information
regarding the following points:
Documentation;
Alarms and Historical control parameters;
All the information received from the control systems on the parameters that treat:
o All the alarms generated on the controlled parameters and their evolution over
time;
o Information received from the different control subsystems (measurements).
All these data will be gathered for historical data and subsequent analysis.
13.1.5.1.18 Indicators
Through the information processed in the Process Manager, the BMS will prepare indicators of
the significant parameters to be controlled.
The SGI shall calculate:
Operational indicators that will reflect the status of activities under the Engineering and
Maintenance responsibility;
Resource indicators that reflect the workload status of the area's resources.
All these indicators shall be provided to the AOCC system so that the division indicators of the
can be controlled from there.
The System will allow the monitoring and control of incidents, complaints and suggestions from
the airport area.
Once the request or incident has been duly documented and its resolution has been drafted,
the BMS will inform of its closure. The BMS shall also be able to automatically open new requests
or incidents that it will report for its management.
The definition of the necessary fields for each complaint will be configurable by the user.
The system will allow you to predefine various formats of user response documents with the
situations typified as habitual in the management of types of complaints. These formats will be
included in Document Management.
Design Criteria
All critical equipment shall be back up with an Uninterruptible Power Supply (UPS) that shall
maintain the system during at least 2h.
The facilities that should be under the supervision of the BMS are as follows:
HVAC;
Energy and electricity;
Plumbing and Sewerage;
Natural gas;
Illumination;
Mechanical transport;
Fire detection;
Public Address System (PAS);
Aircraft Assistance Integrated Management and Monitoring System;
Pneumatic waste collection system;
Hydrological control system;
Lighting.
Supplied equipment will on one of the following typology groups:
PLC’s;
HMI devices;
Field elements (sensors and actuators);
Field buses;
Cabinets and connectors;
Any device installed on the field and necessary to control the facilities.
The BMS will be structured in three different levels, as described below:
This level is made up of servers and operator workstations. The Central System will be provided
with hardware platforms (servers) and the software that runs on them. All the information
related to control points, associated values and measures of both current and historical status
are stored in a relational database.
The workstations are the consoles through which the operators carry out all kinds of operations.
The latter may access and command, according to the established segregations and privileges,
the control points and functions that are the object of their area of responsibility.
13.1.5.2.2 Controllers
The Programmable Logic Controllers (PLCs) oversee the control and supervision of the processes
and are responsible for reading values and acting according to the readings and parameters set
by the users of the installations. Controlled equipment starts and stops, optimizing its operation,
according to the executed sequences and algorithms. In addition, PLC update the servers'
database and generate alarms when they detect abnormal operations.
PLC connection with the Field Elements is carried out through the corresponding input / output
modules. Each PLC consists of hardware platform, I/O modules, communication hardware
modules, an OS as well as the specific programming of the installation under control.
Field elements are devices, both sensors and actuators, through which the PLC controls the
installation in question. In the first case, sensors provide information to the automaton and
whilst the actuators are the elements on which the PLC acts.
CCTV interface;
Master Clock System interface;
BHS interface;
GIS interface;
HVAC;
Energy and electricity subsystems (e.g. LV, MV, etc);
Power Plant;
Lighting subsystem;
Plumbing subsystem;
Fire alarm subsystem;
Intrusion subsystem;
Public Address System (PAS);
Gas distribution subsystem (if available);
Managing and monitoring of aircraft assistance;
Residues management subsystem;
Mechanical transportation.
The characteristics of these interfaces will be at least the ones included in the following Figure:
OTHER SYSTEMS
BMS MCS
The BMS system shall be based on standard components which have already been used in
comparable installations at other airports.
The service provider shall propose a configuration so that its upgrade throughout the Contract
term is not necessary. Moreover, a maintenance plan (in accordance with the manufacturers’
instructions) shall provide a number of spare equipment to be delivered with all the equipment.
Scalability: The system will allow the expansion of its hardware and software
components without incidents on operability;
Availability: The System shall support high availability and fault tolerance. It shall have
redundancy of critical elements.
Integrable and open: It will allow easy integration with other systems in the airport
environment, using standard technologies on the market and subject to the Airport
integration guidelines;
Reliability: The results and calculations obtained by the system shall reflect a reliable
measure of reality;
Configurable: The system shall allow the parameterization of its functions to adapt it
to different circumstances of operation;
Standardization: The System shall comply with the standardization standards defined
and approved by Amaala Airport. The installation, integration and testing of this system
are also subject to Amaala Airport standardization criteria and technological guidelines;
Legality: The System shall submit to the current legislation regarding metrology and
equipment calibration as well as any other applicable regulations.
Reliability, Mean Time Between Failure (MTBF) and maintainability, Mean Time To Repair (MTTR)
shall be provided, as well as supporting hypotheses and calculations, which make it possible to
determine the availability for the system and, as a consequence, the availability of the
functionality provided. In this regard, the following will be considered:
The attached table specifies the minimum availability requirements for system elements:
ID Deliverable Phase
Monitoring of the
02.03.04 Fire Prevention User
alarm system
Monitoring and
03.01.01 Facilities Maintenance
Control
Monitoring and
03.02.XX Utilities & Equipment Maintenance
Control
Monitoring and
03.03.00 Electronics Maintenance
Control
Maintenance of
05.01.00 Airport Security Maintenance
Security Systems
Monitoring equipment
06.XX.00 Technology Maintenance
status
13.2 Services
The Supplier shall liaise with the Client, Architect, Design Consultant, Security Agencies and
other appropriate parties to define the infrastructure required for each of the necessary
speaker type to be used.
The Supplier shall liaise with the Client, Design Consultant and other appropriate parties to
obtain the information necessary to establish an estimate of the network traffic utilization
profile.
The Supplier shall liaise with the Client and other appropriate parties to determine the exact
location and fixing of the required field equipment.
The Supplier shall be responsible for working with the Airport and the stakeholders to
develop the proper configuration and format for the system.
13.2.3 Installation
The following points explain the general requirements in order to accomplish a complete
functional deployment of the system.
Cabling
Both the structured data cabling and power cabling for the system are expected to be
provided by third party Suppliers, nevertheless, the following points describe the complete
general cabling requirements in order to deliver a full system interconnection. The detailed
scope of the Supplier in these terms needs to be specified with the Client. Meantime it is
assumed that the Supplier will be responsible for the complete installation, labelling and
testing of the cabling up to the closed connection outlet.
The structured cabling shall be CAT 6 and Low Smoke Zero halogen.
All the cabling shall be certified and finished in patch panels and sockets.
The cabling should finish in a male RJ45 to be connected to the monitors/controller.
All the cabling, patch panels and intermediate boxes shall be labelled as per labelling
specifications detailed below.
The maximum distance between the displays and the network distribution rooms for the
Ethernet cable shall be less than 95m.
The Supplier shall try to standardize cable types and lengths in the installation.
The Supplier shall provide the cable certification and validation to the Employer.
Power/Grounding Requirements
The equipment shall operate from a power source of: 230 V ± 10%, 50 Hz ± 5% and from
the Uninterruptible Power System (UPS) supplied by a third party Supplier.
The connection to the power outlet at the installation site shall be the responsibility of the
Supplier. Supplier shall coordinate all power requirements at the design stage in order to
arrange the location of the power points as close as possible to the equipment final
location.
The Supplier shall provide the estimated consumption of all equipment so the MEP Supplier
may size the power installation accordingly. The Supplier shall specify itemized the
electrical capacity in Watts needed for the system connection.
The system will be connected to the Airport UPS.
Labelling
Labelling both equipment and cables is not only a good practice but also a requirement in such
big facilities as airports where different types of systems hardware interface with each other.
All active and passive equipment shall be labelled. The label shall include the system information,
building (XX), floor (YY), room (ZZ), Equipment name (SW) and identification number (001).
All this information shall be included in a tool/system that will be able to link the equipment
installation place with the equipment information (Manufacturer, S/N, P/N, etc.).
Each cable shall be identified at its extremities, in junction boxes and at manholes by a
coloured label containing the following information, as a minimum:
Cable function;
Cable number: This number shall identify the nature of the cable and its source and
destination (indicating the connected equipment and its location at both ends of
the cable).
The Supplier shall provide the appropriate cable documentation which shall contain the
following information for each cable:
Source. Equipment and location;
Destination. Equipment and location;
Cable type;
Cable function/service;
Cable number;
Technical description.
The Factory acceptance test shall ensure the proper operation of the system between the
supplier/manufacturer and the Supplier.
The Supplier shall ensure that all equipment and materials are in good working condition
prior to and after installation.
The Supplier shall invite authorized supplier representative(s) to confirm and accept that
proper installations, termination and another technical requirement are attained.
The Supplier shall ensure a Factory acceptance test sheet properly filled in by the
supplier/manufacturer before the actual testing and commissioning stages.
After all work is completed, and prior to requesting the acceptance test, the Supplier shall
conduct a final inspection, and pre-test all equipment and system features.
During the acceptance test, the Supplier shall demonstrate all equipment and system
features to the Client/Consultant. The Supplier shall remove covers, operate equipment,
and perform other reasonable work as requested by the Client/Consultant.
Any portions of the work found to be deficient or not in compliance with the project
drawing, specifications and the Supplier Design shall be rejected. The Supplier shall correct
all deficiencies in accordance with the General Contract Requirements.
Upon completion of the installation activity, the Supplier shall test, start-up, commission
and handover the system to the Client/Consultant.
The Supplier shall perform the following tests as required for the system with the presence
of the Client/Consultant:
Installation Check Report;
Power "On" test;
Integration test;
Power "Off" test (test of back-up power sources and failover).
The Supplier shall provide a detailed test plan with all relevant functions of the above-
mentioned tests. The test plan shall be reviewed and/or approved by the Client/Consultant
prior to testing.
The Supplier shall ensure proper coordination in testing each relevant system. The Supplier
shall guarantee to the Client/Consultant that each system is ready for testing.
The Supplier shall incur all cost related functions of the acceptance test.
Upon reaching substantial completion, the Supplier shall perform a complete test and
inspection of the system (commissioning). If the system is found to be installed and
operating properly, the Supplier shall notify the Client/Consultant of the Supplier's
readiness to perform the formal test and inspection of the complete system.
The Supplier shall undertake system-wide integrated testing to verify, test and commission
all interfacing systems & equipment.
The integrated system tests shall verify the functionality of the interfacing systems and
confirm that the respective systems and equipment perform and interact satisfactorily and
in accordance with the Requirements.
The Integration test shall not limit the warranty of the system.
The Supplier shall be responsible for inspecting and testing the complete system.
The Supplier shall start up and operate the system for a trial period to ensure that it
operates correctly.
The Supplier shall demonstrate the network resilience by creating a series of failures (i.e.
cutting power to equipment, pulling out cables, etc.) across the different components.
The Supplier shall supply a list of the 'failures' to be simulated including the functionality
that is to be tested as well as the anticipated outcome. The list shall be approved by the
Client/Consultant before the test commences.
The Supplier shall provide the system test strategy, including various test environments
through initial software customization to commissioning; resources; data; tools;
documentation and defect management.
The Supplier shall produce a detailed test plan covering initial software customization
through to commissioning, to include functional and non-functional requirements testing
and manage all systems test teams to complete test schedules specified therein, ensuring
defects are managed appropriately and in accordance with agreed entry / exit criteria, test
cases and schedules for acceptance of all systems individually and for all integrated systems
within the confines of the agreed detailed time program.
Tests after Completion shall be conducted following issue of a Taking-Over Certificate of a
section or the works, as applicable.
ORAT Activities
The organization and execution of all ORAT activities to take place after ICT commissioning
will be the responsibility of the Design Consultant. Nevertheless, the Supplier is expected
to assist those activities in each of the steps that may be related to the system provided.
Typical phases where the Supplier shall be involved:
ORAT set-up;
Operational Preparation;
Training and Familiarization;
Operational Trials;
Terminal Transfer;
Opening Support;
Post Opening Support.
13.2.5 Training
The training program shall ensure that the staff is fully trained in handling the individual
units, subsystems and the full systems. The scope shall include, but not be limited to:
Educational requirements;
Operational procedures and measuring techniques;
Maintenance procedures;
System design including architecture, functionality, performance and non-
functional characteristics;
Trouble shooting;
Quality management;
Health and safety issues;
Environmental issues;
Risk assessment and management;
Content and familiarization with O&M (Operation & Maintenance) manuals;
Business continuity strategy & disaster recovery.
Training shall be provided to trainers and selected operational and maintenance staff for
onward training. The staff shall include outsourced operational and maintenance entities.
Attendees shall include, but not be limited to:
Trainers;
The technical management;
Engineers;
Airlines Operators;
Maintenance staff.
Factory Training
Technical Factory Training to be performed together (not at same time) with FAT within the
Factory Dependencies.
The training shall be based on system functions, configuration, trouble shooting and
maintenance
On Site Training
Technical and Operational training to be performed before the SAT.
During the system installation the Supplier shall offer On the Job Training (OJT) without any cost
to the system technicians.
On-site training shall be offered to System Administration, System Operation and Maintenance.
Training Duration will vary for each of the Systems.
The financial offer shall provide, as a minimum, prices itemized to the level agreed in the
instructions to Suppliers.
The proposal shall include documentation related to the operational commands, preventive and
corrective maintenance routines, fault analysis and other information which the Supplier deems
necessary.
Project Implementation: The Supplier shall submit with the tender a proposed schedule setting
out the anticipated program of major activities of the design, fabrication, supply, installation of
the systems, Site Acceptance Tests, training, integration and commissioning.
Detailed listing of the scope of supply: COTS, main installation material, such as
trays, pipes, etc.;
All relevant technical descriptions of the equipment hardware/software based on
the personalization of the contractual configuration;
System architecture;
Scaled and detailed equipment floor plans and equipment location drawings;
Cable routing and interconnections;
Supports Designs;
Civil works specifications / requirements (if any);
A complete and detailed final work schedule.
The Supplier shall update the approved project plan on a bi-weekly basis until contract
completion.
Design Review Meeting: The Supplier shall arrange a Design Review Meeting within two
(2) weeks after submitting the revised SDD. The meeting shall be held between the Supplier
and the Employer´s appointed representatives, at a mutually agreed location.
The purpose of the meeting shall be to review the system design as outlined in the SDD.
The SDD shall be subject to the Client/Consultant´s review and approval.
In order to facilitate the review, the Supplier shall provide a spreadsheet indicating the
documents that are part of the SDD (including drawings, datasheets, etc.), version number
and submission date. This document will be utilized to keep track of the changes in the
SDD documentation, as well as the clarifications requested by the Employer. The Supplier
will update this spreadsheet with each SDD submission.
If the document(s) in question are rejected, the Supplier shall have fifteen (15) days to
correct the document(s) and revise them at no additional cost.
The Supplier should assume the responsibility of adapting the design in case of changes in
the civil works or the Master Plan and follow the previously agreed change management
process together with the Client/Consultant in order to manage any impact in the project.
14 CORPORATE SYSTEMS
14
14 | CORPORATE SYSTEMS
14 CORPORATE SYSTEMS
14.1 Enterprise Resource Planning (ERP)
14.1.1 Introduction
The Enterprise Recourse Planning System (hereafter ERP) software is a central processing facility
or hub, handling all data and processes associated with the business activities involved in the
operation of an airport.
The ERP shall consist of different modules that handle such data or processes like estimating,
purchasing, administrative overheads as well as all accounting and financial activities. The final
result shall be a software system that aggregates all the essential activities of airport business
into one integrated system.
All applications in this suite of systems shall have a single consistent set of navigation, ‘look &
feel’ and help functions. The functional architecture of the ERP system could be as follows:
The ERP shall be able to invoice the aeronautical billing with the income data received from the
AODB about the Flights/Airlines consumptions.
Its deployment is essential to manage and ensure airport incomes and payments.
The Supplier shall provide a proposal for the design, procurement, installation, integration,
testing & commissioning for the ERP System at Amaala International Airport. Including the
following tasks:
All activities which may be necessary to complete the design and installation of the
ERP devices;
Installation, setup and configuration and associated activities necessary to deliver
an operationally and ready ERP System. The IP addressing scheme and VLAN
requirements shall be developed with the LAN/WAN Supplier;
Supply of hardware as specified for the system;
ERP System application in charge to interface all the other systems that may be
required to make the system fully operational;
Installation, configuration and testing of the system hardware and software.
ERP WS ERP WS
Printer ERP WS
AIRPORT NETWORK
ERP ERP
Server – A server – B
ESI ESI
ERP Configuration
Workstation
The system shall be based on redundant link architecture, such that no single failure in
connections between workstations or central servers will result in any loss of system
performance.
The system shall utilize fibre optic and copper cabling infrastructure for the backbone of the
announcement distribution, management and maintenance operation. Equipment shall provide
the appropriate interfaces to the copper and fibre optic cabling to implement all required paging
and associated functions.
The following elements will compose at least the scope of supply for the ERP system:
Servers: The server coordinates all activities of the ERP System and provides storage
for databases and system logs. The ERP System shall utilize physical servers. A
variety of redundancy technologies can be implemented to facilitate maximum
uptime. These shall include Redundant Array of Independent Disks (RAID), failover,
and clustering configurations.
Workstations: specific workstation will be procured for the ERP, but also, the
Supplier shall ensure that the ERP application is accessible from the client
workstations via web.
Functional Requirements
ERP management tool shall provide access to the data stored in the database through a simple
and intuitive user interface. This tool shall take care of the operational environment functions
related to:
CRM Module:
Client management, the module shall manage and store all client information in a
collaborative manner.
Reports Module:
The system shall be able to create template and custom reports.
Materials Management:
The Materials Management functionality of the ERP System shall be obtained through
five integrated systems and sub-systems:
o Maintenance Management Tool: This tool shall provide status reports and
document giving details or summaries of maintenance activities and shall
include, but not be limited to, Asset Management, Procurement process and
Inventory Accounting.
o Material Requirement Planning: The ERP system shall support maintenance
planning, material planning and purchasing management.
o Procurement Management: Covering all the procurement process stages.
o Asset Data Capture: Asset Data shall be obtained when required form the
database of assets maintained in the Maintenance Management Tool in addition
to direct entry of data for Financial other types of assets such as Intellectual
Property Assets, Financial Assets or IT Assets.
o Contract & Lease Management: The ERP module shall keep records of all
contracts issued to tenants and it shall generate invoice data based on the
conditions defined in the lease contracts. These Module shall be integrated with
the Financial System module. The System shall provide the ability to perform
Financial Reconciliation activities across the General Ledger accounts on a
periodic basis.
o Non-Aviation Billing: This ERP module shall handle all billing information not
directly associated with the airline or aviation activities such as rents, utilities, IT
services, parking, etc. This information shall be consolidated in a single invoice
for each tenant or customer and this shall require interfacing with the SCADA
system directly or through the BMS System.
o The ERP shall be fully integrated with the Aeronautical Billing System, which shall
take care of all invoicing processes with airlines exchanging such information
later with the ERP for global accounting.
Design Criteria
All critical equipment shall be back up with an Uninterruptible Power Supply (UPS) that shall
maintain the system during at least 2h.
The ERP system as a whole shall meet an availability rate of 99.95%. This shall require that key
components are duplicated and data maintained concurrent between such duplications, that
access to this data will be distributed, and accessible via alternative communication routes and
the failure of one component shall not impact the performance and availability of other
components.
Aeronautical
AODB
Billing
AIRPORT NETWORK
All invoicing process with the airlines shall be carried out through the aeronautical billing system,
exchanging such information later with the ERP for global accounting through AODB-ERP
integration. If any topic has to be invoiced to the airlines directly from the ERP (non-aeronautical
fees, like the renting of spaces for the tickets selling), such invoicing will follow the guidelines
about IATA Invoice XML Standard, IS-XML (Integrated Settlement XML) indicated at the
aeronautical billing system
The Supplier shall deliver all required system and application software for a fully functional
system. Each application shall be identified by the generic, off-the-shelf name. Software
provided by the Supplier to operate the system shall be delivered in a ready-to-run form,
including all necessary utility programs and documentation.
Software shall use industry standard components. Software shall not contain any proprietary
interfaces or components. Software shall use industry standard application development
software such as Java, C++, CORBA, and XML. Supplier shall state what application development
software has been used, for Design Consultant’s review.
All supplied software running on servers or clients shall synchronize to a Network Time Protocol
(NTP) source. The Supplier shall coordinate with other entities the exact IP address of the NTP
source.
System updates: The system shall be based on a concept that all necessary software
components shall be downloaded by the workstations at the time of successful log-in. Any
modification to the software configuration shall therefore only be done at the server level. Such
modifications shall take effect by logging a workstation out and in again. Updates to the ERP
systems shall be distributed from the central platform servers and become active at the
individual workstations upon new login.
The ERP configuration as previously described shall be by proprietary software application
applicable to the selected ERP vendor which shall require approval by the Client Design
Consultant. This application software shall be installed to client and server computers provided
by the ERP Supplier, and accessible only with authorized levels of user privileges.
Hardware shall be suitably and clearly labelled at minimum with the manufacturer´s name, the
product number, serial number, and date of manufacture and asset number.
In case of misplacement of interchangeable units no damage shall be caused to the equipment
and the protection methods employed in that regard shall be detailed.
All hardware data shall be coordinated with the design drawings, bills of material and basis of
quantity documents.
Fully licensed hardware shall be provided for use in the live Operational environment.
The components, software and technologies to be employed in the design should be well
proven and conform to the international and industry defined open standards.
The provision of the equipment (hardware, software, middleware, firmware, etc.) and materials
should be of international and industry defined standards. The equipment and materials to be
installed and supplied should be of the latest models/standards prior to delivery, and these
provisions should be easily upgradeable to the new standards in use at any time.
All systems should operate under Saudi Arabia´s environmental conditions.
Internet access shall not be allowed from ERP servers.
All applications running on the ERP platform shall be certified by the ERP provider.
The equipment shall be standardized and certified by the supplier. The documents shall be
delivered with them.
The ERP system shall be based on standard components which have already been used in
comparable installations at other airports.
The service provider shall propose a configuration so that its upgrade throughout the Contract
term is not necessary. Moreover, a maintenance plan (in accordance with the manufacturers’
instructions) shall provide a number of spare equipment to be delivered with all the equipment.
Regarding communications, the ERP deployment will fulfil the following requirements:
The ERP system should be an IP-based system, with an Ethernet network and TCP / IP
protocols;
It is the responsibility of the network provider to dimension and guarantee the data
traffic required by the system.
Regarding Energy, the ERP deployment will fulfil the following requirements:
For the Servers it will be necessary to have electrical connections of safe power, coming
from UPS;
All equipment shall be fed locally via double pole-fused isolators provided by the
electrical service Supplier, according to plan of implantation to be executed by the
Supplier;
It is the responsibility of the supplier of the power grid to dimension the same to
guarantee the permanent service.
The ERP System shall be an IP-based system and all wiring from all HW stations are expected to
be as high as possible using the CAT-6 UTP cable, with Ethernet and TCP / IP protocols.
System Capacity
The system shall be designed to support simultaneous operations.
The system shall be capable of supporting all interfaces as specified in this document (as a
minimum) within the performance requirements as outlined herein.
At peak demand, system utilization of resources shall not exceed Sixty percent (60%) of capacity.
The systems shall be capable of supporting priority orders data queuing and transmission to
ensure immediate delivery of higher priority and time sensitive messages.
Utilization
For any 20 (twenty) minute sampling period of normal peak hour operation, system utilization
of resources shall not exceed 50% (fifty percent) of capacity. Utilization in this context refers to
CPU usage; CPU usage is obtained through the use of the operating system tool System Activity
Reports (SAR).
Scheduled Downtime
Downtime to update operating systems, applications or repair components shall be acceptable
reasons for downtime, however, where components are duplicated there shall be no interruption
to system services. The following reasons shall be acceptable causes of downtime:
If the operating systems of the servers require maintenance or updates, or if the servers
require system maintenance, each server shall be brought down individually to be
updated/maintained, such that at no time is more than one server down;
If the operating system of the end devices requires maintenance or updates, or if the
end device requires system maintenance, the end device that requires the maintenance
shall be brought down during non-peak hours of operation;
The Employer may authorize maintenance/updates on the end devices during other
than non-peak hours if the particular end device is non-functional without having the
maintenance or updates performed.
Response Time
Response time criteria shall be met under maximum loading conditions:
The transmission delay for on-line critical business transactions shall not exceed 1.0
second total for 95% of all transactions. The remaining 5% of transactions shall not
exceed 2.0 seconds;
The time required for servers to complete a full fail-over switching shall not exceed one
(1) minute;
The time required to restart and resynchronize the servers after a complete system
failure shall not exceed fifteen (15) minutes (e.g. after an extended system outage or
failure of both main and standby servers).
1. NFPA 72:2010;
2. BS EN 54-2;
3. BS EN 54-4;
4. BS 5839-8:2008;
5. IEC 60849:1998.
The following parameters shall be considering when designing and deploying ERP system:
Availability:
o The whole of the ERP systems will be backed up via a separate emergency battery
system that will be capable of operating for a specific period.
o The failover and monitoring system shall monitor both hardware and software
elements. The software monitor manages all active services related to the ERP
System. This includes the server-based applications, interfaces, database
elements, web services.
o The ERP System shall support HW monitoring, failover, and failback. During a
failover event, additionally, alerts for failure events can be sent via e-mail with
details of the event including device name, location, amplifier channel and the
system conditions which caused the system to fail over.
Scalability:
o The ERP central extension and the management application must be scalable to
support a 100% more users, clients, interfaces and incoming data, etc, beyond
the requested values with constant response time when adding hardware. Such
scalability shall support the extension of Amaala Airport according to the current
Airport Master Plan.
System Stability:
o It should be able to support concurrent use by multiple operators in non-stop
24 hours-a-day operations.
o The whole system shall be equipped with a UPS solution to maintain the system
stability.
Reliability:
o The system provided shall work 24 hours a day. The system shall have a high
MTBF, and a reduced MTTR shall be achievable:
o The Supplier shall provide within the proposal detailed information regarding
technical specifications of each of the proposed equipment, materials, and
accessories demonstrating integration / interfacing amongst them.
o The Mean Time Between Failures (MTBF), Mean Time To Repair (MTTR), Mean
Time Between Critical Failures (MTBCF) and Availability figures of all the
equipment proposed should be provided and the overall system, indicating the
method used for the calculation, such as MIL-HDBK-217. If sub-system MTBF,
MTTR, MTBCF, and Availability numbers are submitted, these shall be rolled up
into an overall system MTBF, MTTR, MTBCF and Availability numbers. The MTBF,
MTTR, and the MTBCF numbers of other sites with similar types of equipment
installed should be provided so the quoted numbers may be verified.
o A list of parts which are unique to the system (such as sensors or locks) and which
in case of failure would be considered critical and cause a suspension of service
should be provided.
o The MTBF, MTTR, MTBCF and Availability numbers for the communication
equipment and its subsystems should be provided separately.
Sufficient input/output communications ports shall be physically provided to meet the specified
requirements plus 20% spare capability.
Redundancy
System application head-end processors shall be installed in the Data Centres at the Airport.
The server technology to be finally deployed in the Data Centres should be chosen. The use of
blades should be encouraged as should be the use of virtual server technology.
Optimization of resources should be maintained, and the environmental and physical
capabilities of the Data Centres respected. Reliability and cost shall be key decision features
together with the ability to use power efficiently with a view to keeping operating costs to a
minimum.
The System shall be deployed in such a way as to provide a redundant, hot failover ensuring no
single point of failure solution.
The System shall be fault-tolerant, with back-up or redundant capacity built-in and should have
the following service continuity considerations:
ID Deliverable Phase
14.2 Services
The Supplier shall liaise with the Client, Architect, Design Consultant, Security Agencies and
other appropriate parties to define the infrastructure required for each of the necessary
speaker type to be used.
The Supplier shall liaise with the Client, Design Consultant and other appropriate parties to
obtain the information necessary to establish an estimate of the network traffic utilization
profile.
The Supplier shall liaise with the Client and other appropriate parties to determine the exact
location and fixing of the required field equipment.
The Supplier shall be responsible for working with the Airport and the stakeholders to
develop the proper configuration and format for the system.
14.2.3 Installation
The following points explain the general requirements in order to accomplish a complete
functional deployment of the system.
Cabling
Both the structured data cabling and power cabling for the system are expected to be
provided by third party Suppliers, nevertheless, the following points describe the complete
general cabling requirements in order to deliver a full system interconnection. The detailed
scope of the Supplier in these terms needs to be specified with the Client. Meantime it is
assumed that the Supplier will be responsible for the complete installation, labelling and
testing of the cabling up to the closed connection outlet.
The structured cabling shall be CAT 6 and Low Smoke Zero halogen.
All the cabling shall be certified and finished in patch panels and sockets.
The cabling should finish in a male RJ45 to be connected to the monitors/controller.
All the cabling, patch panels and intermediate boxes shall be labelled as per labelling
specifications detailed below.
The maximum distance between the displays and the network distribution rooms for the
Ethernet cable shall be less than 95m.
The Supplier shall try to standardize cable types and lengths in the installation.
The Supplier shall provide the cable certification and validation to the Employer.
Power/Grounding Requirements
The equipment shall operate from a power source of: 230 V ± 10%, 50 Hz ± 5% and from
the Uninterruptible Power System (UPS) supplied by a third party Supplier.
The connection to the power outlet at the installation site shall be the responsibility of the
Supplier. Supplier shall coordinate all power requirements at the design stage in order to
arrange the location of the power points as close as possible to the equipment final
location.
The Supplier shall provide the estimated consumption of all equipment so the MEP Supplier
may size the power installation accordingly. The Supplier shall specify itemized the
electrical capacity in Watts needed for the system connection.
The system will be connected to the Airport UPS.
Labelling
Labelling both equipment and cables is not only a good practice but also a requirement in such
big facilities as airports where different types of systems hardware interface with each other.
All active and passive equipment shall be labelled. The label shall include the system information,
building (XX), floor (YY), room (ZZ), Equipment name (SW) and identification number (001).
All this information shall be included in a tool/system that will be able to link the equipment
installation place with the equipment information (Manufacturer, S/N, P/N, etc.).
Each cable shall be identified at its extremities, in junction boxes and at manholes by a
coloured label containing the following information, as a minimum:
Cable function;
Cable number: This number shall identify the nature of the cable and its source and
destination (indicating the connected equipment and its location at both ends of
the cable).
The Supplier shall provide the appropriate cable documentation which shall contain the
following information for each cable:
Source. Equipment and location;
Destination. Equipment and location;
Cable type;
Cable function/service;
Cable number;
Technical description.
The Factory acceptance test shall ensure the proper operation of the system between the
supplier/manufacturer and the Supplier.
The Supplier shall ensure that all equipment and materials are in good working condition
prior to and after installation.
The Supplier shall invite authorized supplier representative(s) to confirm and accept that
proper installations, termination and another technical requirement are attained.
The Supplier shall ensure a Factory acceptance test sheet properly filled in by the
supplier/manufacturer before the actual testing and commissioning stages.
After all work is completed, and prior to requesting the acceptance test, the Supplier shall
conduct a final inspection, and pre-test all equipment and system features.
During the acceptance test, the Supplier shall demonstrate all equipment and system
features to the Client/Consultant. The Supplier shall remove covers, operate equipment,
and perform other reasonable work as requested by the Client/Consultant.
Any portions of the work found to be deficient or not in compliance with the project
drawing, specifications and the Supplier Design shall be rejected. The Supplier shall correct
all deficiencies in accordance with the General Contract Requirements.
Upon completion of the installation activity, the Supplier shall test, start-up, commission
and handover the system to the Client/Consultant.
The Supplier shall perform the following tests as required for the system with the presence
of the Client/Consultant:
Installation Check Report;
Power "On" test;
Integration test;
Power "Off" test (test of back-up power sources and failover).
The Supplier shall provide a detailed test plan with all relevant functions of the above-
mentioned tests. The test plan shall be reviewed and/or approved by the Client/Consultant
prior to testing.
The Supplier shall ensure proper coordination in testing each relevant system. The Supplier
shall guarantee to the Client/Consultant that each system is ready for testing.
The Supplier shall incur all cost related functions of the acceptance test.
Upon reaching substantial completion, the Supplier shall perform a complete test and
inspection of the system (commissioning). If the system is found to be installed and
operating properly, the Supplier shall notify the Client/Consultant of the Supplier's
readiness to perform the formal test and inspection of the complete system.
The Supplier shall undertake system-wide integrated testing to verify, test and commission
all interfacing systems & equipment.
The integrated system tests shall verify the functionality of the interfacing systems and
confirm that the respective systems and equipment perform and interact satisfactorily and
in accordance with the Requirements.
The Integration test shall not limit the warranty of the system.
The Supplier shall be responsible for inspecting and testing the complete system.
The Supplier shall start up and operate the system for a trial period to ensure that it
operates correctly.
The Supplier shall demonstrate the network resilience by creating a series of failures (i.e.
cutting power to equipment, pulling out cables, etc) across the different components.
The Supplier shall supply a list of the 'failures' to be simulated including the functionality
that is to be tested as well as the anticipated outcome. The list shall be approved by the
Client/Consultant before the test commences.
The Supplier shall provide the system test strategy, including various test environments
through initial software customization to commissioning; resources; data; tools;
documentation and defect management.
The Supplier shall produce a detailed test plan covering initial software customization
through to commissioning, to include functional and non-functional requirements testing
and manage all systems test teams to complete test schedules specified therein, ensuring
defects are managed appropriately and in accordance with agreed entry / exit criteria, test
cases and schedules for acceptance of all systems individually and for all integrated systems
within the confines of the agreed detailed time program.
Tests after Completion shall be conducted following issue of a Taking-Over Certificate of a
section or the works, as applicable.
ORAT Activities
The organization and execution of all ORAT activities to take place after ICT commissioning
will be the responsibility of the Design Consultant. Nevertheless, the Supplier is expected
to assist those activities in each of the steps that may be related to the system provided.
Typical phases where the Supplier shall be involved:
ORAT set-up;
Operational Preparation;
Training and Familiarization;
Operational Trials;
Terminal Transfer;
Opening Support;
Post Opening Support.
14.2.5 Training
The training program shall ensure that the staff is fully trained in handling the individual
units, subsystems and the full systems. The scope shall include, but not be limited to:
Educational requirements;
Operational procedures and measuring techniques;
Maintenance procedures;
System design including architecture, functionality, performance and non-
functional characteristics;
Trouble shooting;
Quality management;
Health and safety issues;
Environmental issues;
Risk assessment and management;
Content and familiarization with O&M (Operation & Maintenance) manuals;
Business continuity strategy & disaster recovery.
Training shall be provided to trainers and selected operational and maintenance staff for
onward training. The staff shall include outsourced operational and maintenance entities.
Attendees shall include, but not be limited to:
Trainers;
The technical management;
Engineers;
Airlines Operators;
Maintenance staff.
Factory Training
Technical Factory Training to be performed together (not at same time) with FAT within the
Factory Dependencies.
The training shall be based on system functions, configuration, trouble shooting and
maintenance
On Site Training
Technical and Operational training to be performed before the SAT.
During the system installation the Supplier shall offer On the Job Training (OJT) without any cost
to the system technicians.
On-site training shall be offered to System Administration, System Operation and Maintenance.
Training Duration will vary for each of the Systems.
Detailed listing of the scope of supply: COTS, main installation material, such as
trays, pipes, etc.;
All relevant technical descriptions of the equipment hardware/software based on
the personalization of the contractual configuration;
System architecture;
Scaled and detailed equipment floor plans and equipment location drawings;
Cable routing and interconnections;
Supports Designs;
Civil works specifications / requirements (if any);
A complete and detailed final work schedule.
The Supplier shall update the approved project plan on a bi-weekly basis until contract
completion.
Design Review Meeting: The Supplier shall arrange a Design Review Meeting within two
(2) weeks after submitting the revised SDD. The meeting shall be held between the Supplier
and the Employer´s appointed representatives, at a mutually agreed location.
The purpose of the meeting shall be to review the system design as outlined in the SDD.
The SDD shall be subject to the Client/Consultant´s review and approval.
In order to facilitate the review, the Supplier shall provide a spreadsheet indicating the
documents that are part of the SDD (including drawings, datasheets, etc.), version number
and submission date. This document will be utilized to keep track of the changes in the
SDD documentation, as well as the clarifications requested by the Employer. The Supplier
will update this spreadsheet with each SDD submission.
If the document(s) in question are rejected, the Supplier shall have fifteen (15) days to
correct the document(s) and revise them at no additional cost.
The Supplier should assume the responsibility of adapting the design in case of changes in
the civil works or the Master Plan and follow the previously agreed change management
process together with the Client/Consultant in order to manage any impact in the project.
15 OTHER SYSTEMS
15
15 | OTHER SYSTEMS
15 OTHER SYSTEMS
15.1 Airport Operations Control Centre (AOCC)
15.1.1 Introduction
The purpose of the AOCC is to provide the airport the ability to effectively and efficiently
performs, analyses and improves operations and maintenance tasks required to maintain
business continuity. Any disruption to the control and information management will negatively
impact the operation of the Airport.
This chapter describes an infrastructure, unlike the other systems in this document, which
provides fast and reliable services to airlines, passengers, ground handlers and cargo companies
by 24/7 planning, dispatching, and responding to various events at the airport, such as:
Functional Requirements
There is a list of requirements to be assured in the AOCC location:
Location: This centre shall be located on the airside, in a security restricted area
avoiding the possibility of any non-authorised person to arrive near the sides of the
AOCC. It will not be located with any of its sides on an outer wall, nor landside either
airside. Its access shall be physically restricted only authorized personnel, although
occasionally the access can be authorized to other visitors for specific purposes (visits,
emergencies…). Besides of these access restrictions each technical room should have
restricted access only IT and maintenance staff.
o Operational hours: This area should be used by airport staff on a 24x7 basis,
the 365 days of the year and should be designed to allow operation to meet
these scheduled time and occasional use outside of these hours by prior
agreement.
Design Criteria
All critical equipment shall be back up with a Uninterruptible Power Supply (UPS) that shall
maintain the system during at least 2h.
The AOCC physical distribution shall accommodate at least the areas, as per shown in
Erreur ! Source du renvoi introuvable.:
Reception/Entrance Room and Administrative room;
Rest Rooms & Toilets;
Technical rooms: IT room and power room. Including Videowall technical areas;
Crisis Room;
Meeting Room;
AOCC Director Office;
Training Room;
Apron Control Room;
Control main room: Including the following sub-spaces;
o Operation area:
One (1) resource allocation coordinator and one (1) departure/arrival
operator to carry out the following tasks:
Resource management, preallocation and resolving conflicts;
Departure and arrival operations management;
Coordination with ground handlers and airlines;
Turnaround management;
Aircraft incident management;
Duty Manage;
operator to carry out the following tasks;
Queue management;
Management of all parking areas;
Management of taxi areas;
Passenger incident management;
BHS.
o Ground handler and airline area:
Turnaround management with operations area;
Incident management with operations area.
o Coordination area:
Briefing meetings management;
AOCC resolving conflicts.
o IT & Maintenance area:
BMS monitoring;
Maintenance incident management;
Other SCADAS monitoring;
Power, plumbing, HVAC and mechanical equipment monitoring;
BHS monitoring operator and other SCADAs;
System monitoring;
Networks monitoring;
Critical System Management;
Data Centre supervision.
o Security Room
Governmental agencies.
Each working position to be installed at the AOCC shall have the means required according to
the functions allocated to such position and the following requirements:
Unification of all position in such a way that its number could be increased, reduced or
moved without major impact on the AOCC configuration;
Working position design to encourage ergonomics and modularity;
Each working position shall be totally independent, but able to be assembled to
generate the final configuration required;
The position shall integrate a working surface which will be manufactured with latest
technology materials and dimensioned to host all the required equipment for the
operator. There will be the possibility to include an embedded box for power, voice
and data plugs at one of the sides of the working place. Also, the configuration shall
enable the emptiness and the clearness of the operator working space, facilitating to
hide all cables or obstacles on it. The length of 2.000mm and should have the possibility
to host the required equipment. At least:
o Three or four (24”-27”) monitors;
o Two workstations;
o Mouse and keyboard;
o IP telephone and radio communication devices;
o CCTV equipment. Joystick and keyboard;
o KVM user station;
o KVM display aggregator. Enabling the user to interact with up to two (2)
computers using a single mouse and keyboard simply moving the cursor
across screen borders;
o Network and power plugs and cables;
o Multiple component and composite video source inputs and outputs for the
following:
Surveillance camera monitoring;
Off-Air programming;
VCR/DVD/Blu-ray sources for all common formats;
Computer video and audio;
IPTV;
HDMI;
Component Video (Y/Pb/Pr);
S-Video;
Optical and Coaxial Audio Output;
Line Level Audio Output;
IR Input;
Composite Video;
USB.
o Room video and audio teleconferencing;
o Program audio from IPTV;
o Voice reinforcement;
o Universal headset and microphone for each operator (integrating audio from
Workstations, IP Telephony, PA, GSR and IPTV audio);
o Video recording of AV sources;
o Audio recording of Control Centre operations in a digital format to be stored
for a minimum period of thirty (30) days;
o Remote control capabilities via touch panel displays;
o Remote diagnostics;
o Expansion capability;
o Printing capabilities, if required.
Within the working position, in the back side, there shall be a closed area designated to host all
the computer and electronic equipment required for the operator activity. Such equipment will
be attached to removable trays which will facilitate all installation and maintenance tasks.
All working positions shall regard a double cable rising and installation paths, separating data
and electric power distribution to all equipment in the position.
The working position shall be ready to be connected to safety earth. All power supply plugs will
be located in a closed and locked place, although some extra power and data connections may
be supplied through an embedded box with flap-lids.
The chair to be used by the operator at the working position shall be an ergonomic 24x7 one,
guaranteeing the right back and head position at work regarding the anatomy or any operator.
The following picture shows a generic example of an AOCC Position
Working positions computers shall be remotely located at the equipment corridor reducing
noise and heat giving off and enabling a higher flexibility on functions allocation to each working
position. The following diagram details KVM architecture to be deployed at the AOCC.
Figure 91-KVM Architecture for workstation connection to the working positions in the AOCC
Careful design attention should be given to the desk equipment/furniture, because it should be
provided ready for use including all chairs, tables, screens, storage, mounting brackets etc. Desk
furniture shall comply with the following minimum specifications:
Furniture:
o Provide four (4) square meters per desk;
o Desks shall be of solid core materials utilizing a post and panel design. Hollow
core panel systems using cantilevered surfaces shall not be acceptable;
o Unified frame construction is required in order to prevent movement of the
monitor surface away from the remainder of the desk;
o Desks shall be modular in design for ease of reconfiguration and upgrading;
o There shall be no obstructions for side-to-side movement by the dispatcher
within desk footprint.
Furniture Technology Requirements:
o Fixed full-width electronics cavity storage shall be provided for CPU equipment
and cable routing, keeping the knee space below the desks unobstructed;
o Cavities shall be vented to allow for passive airflow and should be designed to
accommodate additional fans if required;
o Concealed cavities for cable management and power distribution;
o Each desk shall include cable access drops;
o Desks shall be clutter free, comprising only of HMI and communications
equipment essential to the role. Processing units shall wherever possible be
located outside the AOCC.
Desk Equipment (additional to the ones mentioned above):
o Line-level speakers (One (1) pair per workstation);
o Keyboard & Mouse;
o Power strips 6-way, twist locks under raised floor;
o 1 x Personal desk light;
o 1 x Vent/air cooling;
Figure 89 provides an overview of the hardware and software making up the overall video-wall
system to be procured for the AOCC areas which may require it. It shall rely on three main
elements:
AOCC Video-Wall main characteristics will be:
Such video-wall will have a minimum size of four (4) columns and four (4) rows. With
minimum expansion capacity of one column each side;
Minimum size of each monitor will be 55’’;
The vertical view angle for the operators respecting to the video-wall must not exceed
the 25 degrees to facilitate a comfortable view;
Used to present context information which affect to several operators;
Used to bring additional elements that need to be taken into account for a quick real
time decision making;
Enable to ‘free’ one of the operator’s monitor, which can be used to view other
information;
They will be used in two different ways: permanent and occasional (special situations,
emergencies, meetings, …);
Information displayed will be of common interest and global vision, with preference
drawings;
Several images may be presented simultaneously.
The Airport requires the AOCC to support business and operational needs by providing real
time, redundant, secure and dependable video display systems that can be used to enhance
the security and operation processes. In addition to the ability to quickly access video and
data display information as needed by various integrated airport systems, the ability to
reconfigure display information quickly and easily at the Control Centres is of prime
importance.
Manipulation of the images displayed in the video wall will can be restricted to only the
coordinators and operators responsible at that particular schedule depending on the
configuration.
The configuration of the system will be advisable to pre-establish the different space in it
and possible information to be presented and the responsible of the centre will be the
person managing it.
Video wall image distribution shall be stable, the operator needs to know what will find and
where will it be located.
Operators shall have a global overview of the system in order to monitor the current status
in real time.
Each HMI will provide the service manager and system operators with the capability to
select any video sources to any or all video wall segments.
It will be possible to integrate any control software from the different systems (AODB,
RMS,CCTV, ACS, BHS, NMS, etc.) with the control applications needed on the video wall.
Therefore, it is necessary to configure or implement the needed interfaces to transport all
the applications up to the video wall in the scope of this project.
The Application security mechanism will be based on personal or groups control access and
restricted objects. It will allow configuring an individual permission for every user or group
of every object.
The system shall have a historic record with all status changes user accesses, and errors
occurred during operation.
The video wall may be broken into a number of segments with each segment (or segments)
being capable of accepting a video source from any desk in any control room, IPTV or other
input specified in this document.
The following diagram provides an overview of the hardware and software making up the
overall video-wall system to be procured for the AOCC areas which may require it. It shall
rely on three main elements:
Displays pool:
The video-wall is made up of a set of cubes or displays.
The expected configuration for the AOCC is a 4x4.
Graphical controller:
Enabling the video-wall to perform as a unique visualization surface, on which any signal
or application can be displayed in anywhere and in any different size.
Video-wall Control Software:
Handling the technical management of the video-wall as well as the visualization
management.
The displays composing the visualization area of the video wall shall comply with the following
requirements:
Each display shall have an intelligent recording of its configuration parameters such
as colour and brightness, so in case of replacement of any component (lamp, colour
wheel…) the system will be able to recover such parameters automatically;
The Supplier shall select and provide a suitable display technology (or
technologies) for the approval of the Client;
The displays shall support the video-teleconferencing capability;
The displays are easy to maintains, don’t need to switch off due to the redundancies
of its components such double power source;
In case of power failure, the displays shall be able to be configured to turn on
automatically as soon as they have power supply.
The graphical controller shall comply with the following requirements:
All displays shall include a sensor measuring the brightness, and the graphical
controlled shall be automatically adjust it to uniform the brightness of the whole
system;
At least sixty-four (64) composite video, S-video or video IP inputs, which may be
presented in a single display if required, without the need of using external
multiplexers. The presentation of such signals on the display shall not increase the
CPU load, or to slow down the system, as it shall use an internal video bus;
The management software will be based on a client server architecture with
programming open interfaces and accepting local or remote global management;
If there is a communication problem between management software and graphical
controller, the wall displays will continue working with the last configuration;
The graphical controller/s will have redundant power supply;
The control software shall comply with the following requirements:
It shall be accessible from any working position which may require it, being
required that all of them could add/remove presented streams or information, add
new sources, or move or update the existing ones concurrently in real time and
with no interference between the operators;
This system shall present on the working position managing the video-wall, a
schematic view of the displays grid where it can be appreciated the presented
information and streams and the available information sources. Any update on this
information shall be updated at all positions running the control software in real-
time;
The operator running the control software shall be able to remove or move existing
sources of information, add new ones just selecting it and choosing the place to
locate it. Such sources shall be:
o Direct video stream signals, coming from the configured video inputs;
o Applications running on the graphical controller or any other remote
application;
o Complete or partial external screens management, enabling the control of
the captured equipment (mouse, keyboard…).
Also, this software shall allow the recording of layouts (active sources configuration,
including the elements presented, its location… etc.), and manual or automatic
(scheduled) activation of such layouts.
The requirements defined in this section are applicable to the entire installation and the systems
contemplated as a whole. The specific requirements of each system present in the AOCC are
defined in the corresponding section.
Response time criteria for the complete AOCC facility shall be met under maximum loading
conditions:
The transmission delay for on-line critical business transactions (e.g. end to end flight
update) shall not exceed 1.0 second total for 95% of all transactions. The remaining 5%
of transactions shall not exceed 2.0 seconds;
The time required for servers to complete a full fail-over switching shall not exceed one
(1) minute;
The time required to restart and resynchronize the servers after a complete system
failure shall not exceed fifteen (15) minutes (e.g. after an extended system outage or
failure of both main and standby servers).
The AOCC will be used by airport staff on a 24x7 basis, the 365 days of the year.
The AOCC is a mission critical facility, it shall have a reliability of 99.99%. Any disruption to the
control and display of information will negatively impact the operation of the Airport.
Systems within the AOCC shall be high availability, resiliently designed and with no single point
of failure.
All building equipment and plant shall be supplied with two sets of Equipment Manuals.
Equipment Manuals shall as a minimum, describe equipment operation, maintenance tasks and
schedules and fault isolation.
System Manuals shall detail the environmental and electrical power system (i.e. how individual
equipment are configured to form a system and any system level maintenance requirements).
The designer shall provide the Mean Time To Repair (MTTR) for environmental and electrical
equipment.
MTTR shall assume recommended spares and competent personnel are immediately available.
Operations area:
Working positions will require access to the following systems as a minimum:
o Resource Management System;
o Flight Information Display System;
o AODB;
o CCTV (note that prioritization over camera control shall be provided by the CCTV
system);
o Telephones, including hotline access to the ATC Tower and the Fire Department;
o Baggage Handling System.
Airlines and ground handlers:
ID Deliverable Phase
15.2.1 Introduction
The Security Operations Centre (SOC), officially known as Security Control Centre (SCC) as per
all GACA formal documentation, is designed as the only room from which the control,
surveillance and distribution of orders in relation to airport security is exercised.
It is operationally 24 hours a day, 7 days a week (24/7) and manned by specially trained operators
which need to be in permanent contact with the different security posts at the airport.
According to GACA regulations, please note that the SOC or SCC shall be interfaced with the
National Aviation Control Centre (NACC) located on the Jeddah airport and is used to centralize
information from the various KSA airports.
The NACC also regulates and controls the security level for all airports and could manage
important operations and sensitive data in live.
ICAO Doc. 8973 – Restricted ICAO The Aviation Security Manual 10th Edition 2017
Location
In order to guarantee its operation and safety of the activities, the SOC location criteria are:
Inside a building (normally the passenger terminal);
On restricted land side (not accessible to public);
Next to the Airport Operations Control Centre (AOCC), which would allow sharing
general services.
It is recommended not to be installed against the exterior wall of the building.
Interior layout
The architectural and utilities infrastructure of this facility will be designed to meet planned
activities with comfort, without disruption and shutdown to perform maintenance or repair work.
The Security Control Centre shall be organized as follows:
Lobby:
Internal distribution area, whose priority objective is that there is no direct access from
the outside to the main room (normally it is designed in a lock operation with the
external door).
Operation room:
Main room is the nerve centre of the SCC and shall house the management and
command elements, including most of the communication equipment.
Area where the personnel directly responsible for the service are located (Terminal
Security Operator and Duty Manager), equipped with individual work consoles and a
common information panel.
Technical room:
This room shall host all technical equipment to operate operational systems located at
the Security Control Centre.
In case of the Security Control Centre is too small to install a Technical room, the
cabinets shall be installed directly in an auxiliary technical room.
Office / Meeting room:
The basic criterion for this space is to have room and equipment that allows access to
the databases and histories of the different systems for a subsequent analysis processes,
individually or in groups, all without having to occupy the operators' spaces.
This room shall be a separate facility immediately adjacent to the main room, but it is
recommended to have acoustic isolation, since the activities that will be carried out in
parallel, are different and are incompatible with the rest of the SOC work.
Break room, toilets and prayer room:
Security Control Centre shall always be attended and maintain operations 24 hours a
day, for this reason, break room, toilets and prayer room for all staff shall be installed.
A kitchen capable of producing light food and refreshments, with adequate seating
accommodation, shall also be included.
In the case of a physical grouping of the SOC, AOCC and other possible centres, these
auxiliary services can be in common use.
Space sizing
Based on the anticipated operational needs, the dimensioning of the spaces identified in the
SOC would be:
Lobby, the minimum dimensions that allow the functions of distributor and lock;
Operations room, for a minimum of three workstation, 30 square meters approx.;
Technical room, the measures established by IT for a communications room;
Office / Meeting room, 15 square meters approx.;
Break room, toilets and prayer room, the usual ones for the service to be provided
considering a maximum simultaneity of three people.
Utilities infrastructure
The Security Control Centre (SCC) maintains operation of the Airport 24 hours a day, 7 days a
week (24/7). Therefore, the utility infrastructure supporting the SCC shall be designed to allow
the SCC to sustain 24/7 operations:
All communications, IT, video, security, computer and technology related systems shall
be fed from a dual UPS system (2N);
The entire area has to be served by air-conditioning, but only technical rooms have to
be served by a dual redundant air-conditioning;
The entire area shall be served by fire protection system;
The entire area shall be grounded and shall have a distributed ground grid;
The area shall have a raised access floor;
Consoles and workstations must be designed with ergonomic and human comfort
features.
Other security support infrastructures are:
Apron access control;
Auxiliary security control;
Airport badge office;
Screening Centre (Baggage inspection room).
Design Criteria
All critical equipment shall be back up with a Uninterruptible Power Supply (UPS) that shall
maintain the system during at least 2h.
Each working position to be installed at the SOC shall have the means required according to the
functions allocated to such position and the following requirements:
Unification of all position in such a way that its number could be increased, reduced or
moved without major impact on the SOC configuration;
Working position design to encourage ergonomics and modularity;
Each working position shall be totally independent, but able to be assembled to
generate the final configuration required;
The position shall integrate a working surface which will be manufactured with latest
technology materials and dimensioned to host all the required equipment for the
operator. There will be the possibility to include an embedded box for power, voice
and data plugs at one of the sides of the working place. Also, the configuration shall
enable the emptiness and the clearness of the operator working space, facilitating to
hide all cables or obstacles on it. The length of 2.000mm and should have the possibility
to host the required equipment. At least:
All working positions shall regard a double cable rising and installation paths, separating
data and electric power distribution to all equipment in the position.
The working position shall be ready to be connected to safety earth. All power supply plugs
will be located in a closed and locked place, although some extra power and data
connections may be supplied through an embedded box with flap-lids.
The chair to be used by the operator at the working position shall be an ergonomic 24x7
one, guaranteeing the right back and head position at work regarding the anatomy or any
operator.
The following picture shows a generic example of an SOC Position:
Working positions computers shall be remotely located at the equipment corridor reducing
noise and heat giving off and enabling a higher flexibility on functions allocation to each
working position. The following diagram details KVM architecture to be deployed at the
AOCC.
Figure 94-KVM Architecture for workstation connection to the working positions in the SOC
Figure 92 provides an overview of the hardware and software making up the overall video-wall
system to be procured for the SOC areas which may require it.
The video wall display is required to be controlled a fully redundant video display processor and
management server located in the SOC and managed by the CCTV Management APP, which
shall provide the following functions:
The Display processor shall provide a scalable solution to drive from a single display to
an effectively unlimited number of display screens.
Source input components shall enable the capture of standard video and DVI/RGB
sources and distribute these at full frame rate and resolution to any number of displays
and operator positions for viewing.
Network streams shall be decoded directly without additional hardware requirements
– the number of these sources that can be viewed simultaneously can easily be
expanded seamlessly – with the addition of more processing units as required for any
future requirement.
Any networked input (computer or videos etc.) shall be capable of being distributed
over the display surface without any restriction on size and position.
To manage the display configuration and positioning of applications and video sources
a Video-Wall Management Server will be provided to enable a simple intuitive user
interface with drag and drop capability to the wall from integration with the CCTV
Management Application.
The video-wall management software shall enable specific pre-configured video display
cameras to be programmed to provide default camera views and sizes to be presented per
operator at log-on to the CCTV Control & Monitoring workstation
SOC Video-Wall main characteristics will be:
Such video-wall will have a minimum size of two (2) columns and two (2) rows. With
minimum expansion capacity of one column each side;
Minimum size of each monitor will be 55’’;
The vertical view angle for the operators respecting to the video-wall must not exceed
the 25 degrees to facilitate a comfortable view;
Used to present context information which affect to several operators;
Used to bring additional elements that need to be taken into account for a quick real
time decision making;
Enable to ‘free’ one of the operator’s monitor, which can be used to view other
information;
They will be used in two different ways: permanent and occasional (special situations,
emergencies, meetings, etc.);
Information displayed will be of common interest and global vision, with preference
drawings;
Several images may be presented simultaneously.
The Airport requires the SOC to support business and operational needs by providing real
time, redundant, secure and dependable video display systems that can be used to enhance
the security and operation processes. In addition to the ability to quickly access video and
data display information as needed by various integrated airport systems, the ability to
reconfigure display information quickly and easily at the Control Centres is of prime
importance.
Manipulation of the images displayed in the video wall will can be restricted to only the
coordinators and operators responsible at that particular schedule depending on the
configuration.
The configuration of the system will be advisable to pre-establish the different space in it
and possible information to be presented and the responsible of the centre will be the
person managing it.
Video wall image distribution shall be stable, the operator needs to know what will find and
where will it be located.
Operators shall have a global overview of the system in order to monitor the current status
in real time.
Each HMI will provide the service manager and system operators with the capability to
select any video sources to any or all video wall segments.
It will be possible to integrate any control software from the different systems (SACS,
CCTV…etc.) with the control applications needed on the video wall. Therefore, it is
necessary to configure or implement the needed interfaces to transport all the applications
up to the video wall in the scope of this project.
The Application security mechanism will be based on personal or groups control access and
restricted objects. It will allow configuring an individual permission for every user or group
of every object.
The system shall have a historic record with all status changes user accesses, and errors
occurred during operation.
The video wall may be broken into a number of segments with each segment (or segments)
being capable of accepting a video source from any desk in any control room, IPTV or other
input specified in this document.
The following diagram provides an overview of the hardware and software making up the
overall video-wall system to be procured for the SOC areas which may require it. It shall
rely on three main elements:
Displays pool:
The video-wall is made up of a set of cubes or displays.
The expected configuration for the SOC is a 2x2.
Graphical controller:
Enabling the video-wall to perform as a unique visualization surface, on which any signal
or application can be displayed in anywhere and in any different size.
Video-wall Control Software:
Handling the technical management of the video-wall as well as the visualization
management.
The displays composing the visualization area of the video wall shall comply with the following
requirements:
Avoid the hot-spot effect (brightness concentration on the centre of the image).
Bright uniformity shall be higher than the 80%;
Reduced depth and weight, making its installation and maintenance easier;
Tiny separation between the active areas of the displays, less than 2 mm;
High resolution: Each display shall admit HD (1920x1080) resolution;
Maximum high availability for each display: Double power supply connection,
double projection lamp, etc.;
Each module will have at least a video digital connection (HDMI, DVI…);
Each display shall have an intelligent recording of its configuration parameters such
as colour and brightness, so in case of replacement of any component (lamp, colour
wheel…) the system will be able to recover such parameters automatically;
The Supplier shall select and provide a suitable display technology (or
technologies) for the approval of the Client;
The displays shall support the video-teleconferencing capability;
The displays are easy to maintains, don’t need to switch off due to the redundancies
of its components such double power source;
In case of power failure the displays shall be able to be configured to turn on
automatically as soon as they have power supply.
All displays shall include a sensor measuring the brightness, and the graphical
controlled shall be automatically adjust it to uniform the brightness of the whole
system;
At least 64 composite video, S-video or video IP inputs, which may be presented in
a single display if required, without the need of using external multiplexers. The
presentation of such signals on the display shall not increase the CPU load, or to
slow down the system, as it shall use an internal video bus;
The management software will be based on a client server architecture with
programming open interfaces and accepting local or remote global management;
If there is a communication problem between management software and graphical
controller, the wall displays will continue working with the last configuration;
The graphical controller/s will have redundant power supply.
The control software shall comply with the following requirements:
It shall be accessible from any working position which may require it, being
required that all of them could add/remove presented streams or information, add
new sources, or move or update the existing ones concurrently in real time and
with no interference between the operators;
This system shall present on the working position managing the video-wall, a
schematic view of the displays grid where it can be appreciated the presented
information and streams and the available information sources. Any update on this
information shall be updated at all positions running the control software in real-
time;
The operator running the control software shall be able to remove or move existing
sources of information, add new ones just selecting it and choosing the place to
locate it. Such sources shall be:
o Direct video stream signals, coming from the configured video inputs;
o Applications running on the graphical controller or any other remote
application;
o Complete or partial external screens management, enabling the control of
the captured equipment (mouse, keyboard,etc.).
Also, this software shall allow the recording of layouts (active sources configuration,
including the elements presented, its location… etc.), and manual or automatic
(scheduled) activation of such layouts;
Finally, this software shall be an open system, programmable and configurable to
enable the operators to include any additional information source for its
presentation on the displays.
Since each operator of the SOC will have to manage more than two workstations at the
same time, it is needed a system that shall help the operator. This system, or device, is
called a Keyboard Video Mouse switch (KVM).
The KVM system is a solution that allows a user located within SOC control room, or sub-
spaces, to manage and monitor multiple systems installed in a remote workstation or
server.
A complete KVM infrastructure shall be installed in the control room. Each working
position will have only one keyboard and mouse, independently of the number of
workstations connected to it;
The KVM system shall allow users to access and share the desktop of a remote
workstation over the existing network;
All user applications will run in the remote workstation and will take full advantage
of computing and graphics resources of the workstation. These workstations are
not properly a part of the KVM system;
The KVM system shall support remote audio and USB, which enables a user to
connect audio and USB devices in the local console;
Each working position shall have a maximum of two (2) keyboards and two (2) mice
independently of the number of systems or workstations controlled.
The KVM system shall be compatible with VGA and DVI connectors.
The KVM switch shall handle DDC and EDID transmissions between monitor and
workstation with a pass-through technique (the KVM switch makes communication
between the monitor and the system transparent).
The requirements defined in this section are applicable to the entire installation and the systems
contemplated as a whole. The specific requirements of each system present in the SOC are
defined in the corresponding section.
Response time criteria for the complete SOC facility shall be met under maximum loading
conditions:
The transmission delay for on-line critical business transactions (e.g. end to end
flight update) shall not exceed 1.0 second total for 95% of all transactions. The
remaining 5% of transactions shall not exceed 2.0 seconds;
The time required for servers to complete a full fail-over switching shall not exceed
one (1) minute;
The time required to restart and resynchronize the servers after a complete system
failure shall not exceed fifteen (15) minutes (e.g. after an extended system outage
or failure of both main and standby servers).
The SOC will be used by airport staff on a 24x7 basis, the 365 days of the year.
The SOC is a mission critical facility, it shall have a reliability of 99.99%. Any disruption to the
control and display of information will negatively impact the operation of the airport.
Systems within the SOC shall be high availability, resiliently designed and with no single point
of failure.
All building equipment and plant shall be supplied with two sets of Equipment Manuals.
Equipment Manuals shall as a minimum, describe equipment operation, maintenance tasks and
schedules and fault isolation.
System Manuals shall detail the environmental and electrical power system (i.e. how individual
equipment are configured to form a system and any system level maintenance requirements).
The designer shall provide the Mean Time to Repair (MTTR) for environmental and electrical
equipment.
MTTR shall assume recommended spares and competent personnel are immediately available.
ID Deliverable Phase