Volume2 CCTV
Volume2 CCTV
Volume2 CCTV
The information contained in this Request for Proposal (“RFP”) document whether subsequently provided to the bidders (“Bidder/s”),
verbally or in documentary form by Guwahati Smart City Limited (henceforth referredtoas“Authority”inthisdocument)oranyof its
employees or advisors, is provided to Bidders on the terms and conditions set out in this tender document and any other terms and
conditions subject to which such information is provided.
This RFP is neither an agreement nor an offer or invitation to any party. The purpose of this document is to provide the Bidders or any
other person with information to assist in the formulation of their Techno- commercial offers (“Bid”). This RFP includes statements,
which reflect various assumptions and assessments whichmaybearrivedat bythe Authorityinrelationtotheprojectscope.ThisRFPdoes
not purport to contain all the information which each Bidder may require. This RFP may not be appropriate for all persons, and it is not
possible for the Chief Executive Officer, Authority and their employees or advisors to consider the objectives, technical expertise and
particular needs of each Bidder. The assumptions, assessments, statements and information contained in the bid documents may not
be complete, accurate, adequate or correct. Hence, each Bidder must therefore conduct their own independent analysis of the
information contained inthe RFP and seek its own professional advice from appropriate sources.
Information provided in this RFP to the Bidder is on a wide range of matters, some of which may depend upon the interpretation of
the law. The information given is not intended to be an exhaustive account of statutory requirements and should not be regarded
as a complete or authoritative statement of law. The authority accepts no responsibility for the accuracy or otherwise for any
interpretation of opinion on law expressed herein.
The authority also accepts no liability of any nature whether resulting from negligence or otherwise how so ever caused arising from a
reliance of any Bidder upon the statements contained in this RFP. Authority may in its absolute discretion, but without being under any
obligation to do so, can amend/modify or supplement the information in this RFP.
This RFP does not imply that Authority is bound to select a Bidder or to appoint the Selected Bidder (as defined hereinafter), for
Implementation and Authority reserves the right to reject all or any of the Bidders or Bids without assigning any reason thereof.
TABLE OF CONTENTS
1. Introduction………………………………………………………………………………………………………………………………..11
1.1. Introduction to Intelligent City Surveillance Project in Guwahati……………………………………………………11
1.2. Project Objectives………………………………………………………………………………………………………………………….11
1.3. Strategic Objective of the Project………………………………………………………………………………………………….12
1.4. Project Outcomes & Benefits…………………………………………………………………………………………………………13
3. Payment Schedule…………………………………………………………………………………………….. 29
3.1. Payment Schedule – Implementation Phase………………………………………………………………………………………..29
3.2. Payment Schedule – Operation & Maintenance Phase……………………………………………………………………….30
4. Solution Overview of Proposed Intelligent City Surveillance System………………….. 30
4.1. Installation of cameras………………………………………………………………………………………………………………………..30
4.2. Installation of Public Address System and Emergency Call Back…………………………………………………………..30
4.3. Installation of Poles……………………………………………………………………………………………………………….31
4.4. Provisioning hardware and software……………………………………………………………………………………………………31
4.5. Connectivity…………………………………………………………………………………………………………………………………………32
4.6. Site Clearance obligations and other relevant permission………………………………………………………33
4.7. Electrical works and power supply…………………………………………………………………………………………33
4.8. Civil and Electrical works……………………………………………………………………………………………………….33
4.9. Surge and Lightning-proof measures…………………………………………………………………………………….34
4.10. Earthing System……………………………………………………………………………………………………………………34
4.11. Junction Box, Poles (Gantries and Cantilever)………………………………………………………………………………….34
4.12. Cabling Infrastructure…………………………………………………………………………………………………………..34
4.13. Design, Supply, Installation and Commissioning of the Field Equipment……………………………….35
4.14. Cameras……………………………………………………………………………………………………………………………….35
4.15. Public Address System…………………………………………………………………………………………………………..35
4.16. Emergency Call Box System…………………………………………………………………………………………………..36
4.17. Design, Supply, Installation, Testing and Commissioning of Network and Backbone Connectivity…36
4.18. Design, Supply, Installation, Testing and Commissioning of ICCC………………………………………….36
4.19. Design, Supply, Installation, Testing and Commissioning of IT Infrastructure for DR over cloud………….37
4.20. Capacity Building and Training…………………………………………………………………………………………….38
4.21. Factory Acceptance Testing (FAT)………………………………………………………………………………………….39
4.22. Third Party Audit…………………………………………………………………………………………………………………………………39
4.23. Final Acceptance Testing………………………………………………………………………………………………………40
4.24. System Documents and User Manuals………………………………………………………………………………….40
4.25. Operations and Maintenance during contract period…………………………………………………………..41
4.26. Project Management and Operation Maintenance……………………………………………………………...41
4.27. Indicative resource requirement…………………………………………………………………………………………………………41
4.28. Hand-over of the system before contract expiry……………………………………………………………………43
4.29. Other requirements……………………………………………………………………………………………………………..43
4.30. Video Analytics for the project…………………………………………………………………………………………….43
Terms Meaning
AP Access Points
DC Data Centre
DR Disaster Recovery
HO Head Office
IP Internet Protocol
IT Information Technology
OS Operating System
RF Radio Frequency
SI System Integrator
SOS Save Our Souls. SOS is International Morse code distress signal
VA Video Analytics
VM Virtual Machine
VM Virtual Machine
The SPV is introducing ICT based applications as per an action plan to monitor and manage the city and improve its efficiency,
by providing better maintenance and public delivery services. As part of this plan, the Intelligent City Surveillance Project will
ensure a safe and secure environment and also help in urban planning.
This project aims to converge multiple types of camera feeds to a centralized point, which is the Intelligent Command and
Control Room and co-located Data Center and DR in Private Cloud. Fixed Box, PTZ, and ANPR cameras and other Smart City
elements like Emergency Call Box (ECB), Public Announcement System (PA) , Environmental Sensor and Visual Message Display
System (VMD) will be deployed across Guwahati to enhance women, child, and elderly safety. The camera feeds will travel from
the source to the destination via MPLS connectivity, with the SI being responsible for network backbone and last mile
connectivity through an Internet Service Provider. The Data Center will have Tier III provisions and High Availability measures
for IT and Non-IT components. The success of this project will be driven by Video Analytics using AI and ML methodologies. The
MSI must write and execute well-considered SoPs and workflows of all the use-cases to ensure project success and a
sustainable, scalable system. The implemented platform will be used to leverage video feeds from other schemes, so data lake
formulations and approaches must be clearly defined. The project implementation must be time-bound and professional to
meet all the outlined objectives.
The vision of the project is to implement a citizen friendly, holistic, integrated and responsive Intelligent City Surveillance System
to achieve the following objectives:
1.2.1 Safety Improvement: Real-time safety management, and intelligent surveillance can help prevent
criminal activities and also respond to potentially dangerous situations in advance. Further, city
surveillance will improve women's safety by providing a constant monitoring and alert system, deterring
potential offenders, and aiding in the identification and prosecution of perpetrators, promoting a safer
and more secure environment for citizens, especially women.
1.2.2 Higher Productivity: Achieving improvement in productivity, logistics and other economic activities by
obtaining precise real-time information in key areas of the city through video surveillance system.
1.2.3 Enforcement: Law enforcement is improved through continued monitoring of the city, specifically at
crowded areas and aids in detection of criminal activity, enabling timely response and investigation
through the use of video analytics.
1.2.4 Effective & Preventive Policing: Geographical Information System (GIS) combined with city surveillance
can enhance preventive policing by identifying crime hotspots, tracking criminal activity patterns, and
enabling targeted resource deployment.
1.2.5 Event Tracking and Real Time Information: The real-time information at the Integrated Command and
Control Center (CCC) from Cameras, Environmental Sensors and other technology interventions like GIS
shall enable the operator to take necessary actions based on the type of information and send out
emergency notifications through Variable Message Signages or inform other urban bodies as per set
SOPs.
1.2.6 Integration with existing Traffic Management System: Video and analytic data from traffic
management system will further strengthen the effectiveness of the city surveillance system for real
time policing as well as help to identify trends and patterns, which can inform city planning and
infrastructure improvements.
With this RFP, GSCL intends to set-up an Intelligent City Surveillance System through a process of competitive bidding for
selecting a System Integrator (SI)/ Implementation Agency (IA) for Supply, Installation, Testing, Commissioning and Five (5)
years of operations and maintenance. The selected SI shall have the overall responsibility to design, build, implement,
operate, and maintain the CCC from the date of Go-Live / successful commissioning of the Intelligent City Surveillance
Project. Overall, the selected System Integrator (SI) will be responsible for designing, deliver and maintain a sustainable,
productive, scalable and reliable system for the benefit of citizens of Guwahati.
The system is to be designed taking into consideration the future scalability and integration with upcoming systems. The
system should help to meet the following strategic objectives:
1. Safety and Security
2. Improved Responsiveness
3. Effective Policing
4. Improved Management
1 Safety and Security ● Live Monitoring and control of movement of Crowd at Important locations of the
city including entry and exit points
● Live alerts in case of an event/ incident
● Help to identify, apprehend and prosecute offenders
● Monitoring of suspicious activity, vehicles, objects etc. with respect to protecting life
& property
2 Improved ● Access to Police by the Citizens for quick and effective response, improved visibility
Responsiveness and transparency
● Provide assistance to emergency services and faster turn-around time
3 Effective Policing ● Assist in management and policing of large-scale events
● Aid to investigation by Police Department by integration of analytic tools
● Providing evidence for criminal and civil action in the courts
City Administration ● The implementation of Intelligent City Surveillance System in Guwahati will ensure
safety and crowd surveillance.
● The central command and control will ensure efficient continued working of the field
equipment
● Continuous surveillance would help in reduction in number of criminal and unlawful
activities, unnecessary gathering, women safety.
● Prompt emergency response in cases of accidents, fires, disasters, epidemics, etc. due
to availability of real time data and response mechanisms
● To lower the costs by adopting a centralized architecture, enabling the platform to be
administered and supported from one location
● Instant MIS reports for planning, budgeting, monitoring & evaluation
● Instant identification of delay points enabling prompt administrative action
● Facilitate cross-department collaboration with the help of online systems in compliance
with various standard operating procedures will bring transparency in city
administration
Citizen ● Increased public safety through crime prevention and quicker incident response
● Enhanced accountability of public officials and citizens
● Deterrence of criminal activity due to the visible presence of surveillance cameras,
especially increased safety of citizens, especially women
● Protection of critical infrastructure, such as airports and railway stations, from potential
terrorist attacks and other threats
● Better management of public spaces, such as parks and markets, through real-time
monitoring and response
● Improved emergency response capabilities through better situational awareness and
coordination
● Reduced public disorder and nuisance behavior, such as littering and public urination,
through the fear of being monitored
● Increased trust between citizens and law enforcement due to the perception of
improved safety and security
● The potential to use surveillance data for urban planning and decision-making
2 . Scope of Work for the Project
The SI’s scope of work shall include but is not limited to the following broad areas. Details of each of these broad areas have also
been outlined in subsequent sections of this document. The project will be implemented throughout the city of Guwahati. The
list of places along with detailed indicative BoQ is mentioned in subsequent section (Ref Sec. 6) of this volume of RFP.
The SI shall deploy the team based out of Guwahati proposed for the project upon signing of the agreement and ensure that a
Project Inception Report and Detailed Engineering Report are submitted to Authority as per the schedule in the subsequent
section of this tender document, covering following aspects:
The SI shall conduct a comprehensive As-Is study of existing infrastructure, systems and associated processes in the city in line
with project requirement.
The below ILLUSTRATIVE EXAMPLE explains various aspects to be considered during AS-IS study.
The existing infrastructure study of junctions/intersections to be done during various time periods of day including peak and
non-peak hours to establish the key performance indicators (KPI) for the Intelligent City Surveillance System.
The report shall also include the expected measurable improvements against each KPI as well as use cases to be implemented
under INTELLIGENT CITY SURVEILLANCE SYSTEM, once the command & control centre is commissioned. The benchmarking data
should also be developed to track current situation and desired state.
Additionally, the SI should provide detailed TO-BE designs specifying the following, at the minimum:
• High Level Design (for all components installed) for Application architecture, Logical and physical database design, Data
dictionary and data definitions, ER diagrams and other data modeling documents and Physical infrastructure design for
devices on the field.
• Application component design including component deployment views, control flows, etc.
• Low Level Design (including but not limited to) for all components installed Application flows and logic including pseudo
code, GUI design (screen design, navigation, etc.), Database architecture, including defining data structure, data dictionary
as per standards laid-down by Government of India/ Government of (State)
• KPI design for the Video wall to visualize important events on real time
The City Surveillance System will improve the livability of Guwahati by enhancing public safety, reducing crime rates, and promoting
efficient resource allocation. It will enable the authorities to monitor public areas and respond quickly to any potential safety or
security threats. It will help in creating a safe and secure environment for residents, reducing crime rates, and increasing their quality
of life. The data collected by the surveillance system can be used to make informed decisions about resource allocation, such as
transportation, energy, and waste management, improving the overall efficiency of the city. Overall, a city surveillance system can
significantly contribute to creating a livable and sustainable urban environment.
By analyzing the data collected by surveillance cameras, AI algorithms will identify patterns, anomalies, and potential threats that
might be missed by human operators. This will help to improve the speed and accuracy of threat detection, enabling the authorities
to respond quickly and effectively. Analytics will be used to analyze data from multiple sources, such as social media or weather
forecasts, providing additional context and insights that can be used for informed decision-making.
Facial Recognition technology can help identify suspects in real-time, enabling the authorities to respond quickly to potential threats.
Crowd Estimation can monitor large gatherings and detect potential safety concerns, while Abandoned Object Detection can identify
unattended bags or packages that might pose a threat. Person Collapsing can identify people who have collapsed or are in distress,
alerting emergency responders. Stray Animal Detection can identify animals in urban areas, improving animal control efforts.
Vandalism detection can help authorities prevent property damage and maintain a clean city. Women's safety analytics can help
authorities prevent harassment or violence against women. Encroachment Detection can identify violations of public spaces and
rights-of-way, enabling authorities to enforce regulations. People Fighting analytics can detect fights in public areas, enabling
authorities to quickly intervene and restore order. Perimeter Protection can monitor city boundaries or specific locations, detecting
any breaches or intrusions. Overall, these analytics can help authorities detect potential safety threats, allocate resources more
efficiently, and maintain a safer and more secure urban environment.
Emergency notifications, Announcements and Public Awareness Messages will be announced via Public Address system located at
different locations in city. PA Systems integrated with Emergency Call Boxes enable effective communication with the public
during emergencies or critical situations, such as natural disasters. The PA system can be used to broadcast emergency
announcements, warnings, and evacuation instructions to a large audience quickly.
Integrating the PA system with ECBs can enable direct communication between the public and emergency response teams,
allowing for more rapid and effective response to incidents. The ECBs can also be used to summon medical or law enforcement
assistance in case of emergencies, providing a critical lifeline for those in need. PA system can be used for public service
announcements, traffic updates, and other informational messages, providing residents and visitors with real-time information
that can improve their safety and quality of life.
GIS platform integrated with a city surveillance system will provide significant benefits to the security of Guwahati. By leveraging
GIS technology, the system will gain a comprehensive understanding of the city's physical layout and infrastructure, allowing
security operators to quickly respond to incidents and emergencies. The integration of GIS layers, such as camera positioning,
building structures, and utility resources, can provide real-time, actionable intelligence to operators during an incident. The GIS
platform can also be used to monitor and analyze crime patterns and hotspots, allowing for proactive and preventative measures
to be taken.
The single integrated , deployed GIS platform will be able to do Image feature extraction, geoprocessing, image mosaicking, sub
setting, classification (supervised, unsupervised) change detection, AI/ML based object Detection components , 3D , network
analysis, SAR based processing and analysis, Photogrammetry, Terrain analysis.
While the information gathered at ICCC can rapidly be shared across various agency lines to accelerate problem response and
improve better coordination. Furthermore, the ICCC will help in anticipating the challenges and minimizing the impact of
disruptions on city road / Junctions. The scope of the project includes implementation of ICCC at location identified by GSCL.
SI has to provide edge devices, network connectivity, application softwares and other required components. Compute and
storage components of the solution shall be housed at the co-located Data Center. The DR will be on cloud to ensure high
reliability of the system. The SI will make all the arrangements related to its safety and security.
All the services related to ICT components of Intelligent City Surveillance System project such as Cameras, Public Address System,
Emergency Call Back System, IPPBX etc. and any future ICT initiatives which will act either as upstream or downstream interfaces
to the Integrated Operations Platform. Feed from all these field devises will be monitored and controlled from ICCC. ICCC will be
the single platform from where all decision making shall be done.
This platform should be compatible and integrable with the National Informatics Centre (NIC) portal and infrastructure. The data
and analytics generated by the system should be accessible through both web and mobile applications. These applications should
provide both textual and graphical information enabling a comprehensive understanding of the surveillance data .
c. Finalization of exact locations of the Cameras, Junction Boxes, Pole, Power Metres at different
junctions
d. Finalization and submission of a detailed scalable & secured technical architecture and submission
of detailed project plan which includes
○ Deployment of the Team, Project Manager, Their Roles & Responsibility
○ Responsibility Matrix of the stakeholders
○ Approach & Methodology to be adopted
k. Design the LAN connectivity diagrams for approx. 800 Locations from each Junction Box to Pole,
From Power Meter to Junction Box & Prepare the Implementation plan in coordination with ISP
l. Design the Architecture, Concept of Operations for ICCC, Datacenter and DR on cloud and prepare
the 3D Diagrams, DC Floor Strengthening Plan.
n. MSI will adopt latest finishing items and construction materials so that better finish and quality is
achieved at reasonable cost.
l. IT and Non-IT Infrastructure installation, development, testing and production environment setup
p. Preparation of Standard Operating Procedures (SOPs) for operation of the system andto ensure
implementation/ operation of the system as per SOPs
q. SOP preparation in consultation with GSCL, implementation, Integration with GIS Platform,
Integration of solutions with Command and Control Center, KPI Development. SOP needs to be
approved by GSCL
Standards of Performance
The MSI shall provide the services and carry out their obligations under the Contract with due diligence,
efficiency and professionalism/ethics in accordance with generally accepted professional standards and
practices. The MSI shall always act in respect of any matter relating to this contract. The MSI shall abide
by all the provisions/Acts/Rules/Regulations, Standing orders, etc. of Information Technology and other
relevant legality as prevalent in the country. The MSI shall also ensure to maintain the standards laid
down by User department from time to time for carrying out work in office or at public places.
The MSI will ensure that there is no damage caused to any private or public property in execution of work
in field. In case such damage is caused, MSI shall immediately bring it to the notice of GSCL office in writing
and MSI will pay necessary charges towards fixing of the damage. GSCL instructs MSI that no traffic
congestion/public inconvenience is caused while carrying out work at public places.
The MSI shall ensure that its employees/representatives or the agencies hired by them to carry out the
contract don’t breach privacy of any citizen or establishment during the course of execution or
maintenance of the project.
If GSCL objects to the appointment, Bidder shall not assign the individual to that position and shall seek
an alternative candidate in accordance with the resource requirements of this RFP.
The Bidder needs to ensure at least 4 weeks of overlap period in such replacements. GSCL will not be
responsible for any knowledge transition to the replacement resource and any impact/escalation of cost
incurred by the bidder due to resource replacement.
d. High Attrition causing adverse impacts to Project flow
If in the first 6 month period from the Contract Effective Date in case of replacement of the projected
man power resourcing, a penalty of INR 2,00,000 for first fifteen days and INR 10,000 per day can be
imposed on the Bidder (for one replacement) till appropriate and approved replacement is done. Bidder
shall:
e. Provide GSCL with a reasonably detailed explanation as to the reasons for such change, including, where
applicable and permitted, notes from any exit interviews conducted by Bidder with any departing
member of the Key Personnel; and
f. If such change to Key Personnel has or is likely to have any material adverse impact on the provision of
the Services or any substantial part thereof, undertake, at its own costs, such remediation acts as are
reasonably necessary in order to improve the retention of the Key Personnel including making reasonable
changes to the human resources policies and procedures applicable to the Key Personnel (including those
related to compensation, benefits and other conditions so that they are competitive with the market) as
may be necessary to ensure that such policies and procedures comply with Good Industry Practice.
2.8 Convergence
The SI shall note that the activities defined within scope of work mentioned are indicative and may not be exhaustive depending
on the respective city specific requirement later provided by them. SI is expected to perform independent analysis of any
additional work that may be required to be carried out to fulfill the requirements as mentioned in the RFP and factor the same
in their techno-commercial bid response.
6 Assessment of R/A C C C C I
Business processes
13 Assessment of R/A I R A C I
training
requirement
14 Develop the R/A C R R C C
Concept of
Operations (CONOPS)
15 Formulation of R/A C C C I
Solution
Architecture
16 Preparation of R/A C C C I
Detailed Drawing
20 Approval of C R/A C
material for
procurement
21 SoP preparation R C A A C I
27 Development of R/A I C I C I
Bespoke Solution
(if any)
28 Implementation, testing of R/A I C C C
Solutions
Note:
Authority may modify the above matrix as per project requirements, which shall be adhered to, by all the stakeholders
as mentioned above.
SI have to arrange own warehouse during Project phase to store the material in Guwahati as well as they have to take
proper insurance during project delivery and O&M time period.
· Design Built Report (DBR) containing the High Level Design, Low Level
Design, BOQ
· Detailed Project deployment plan including Operations Management,
Contract Management, Risk Management, Information Security and Business
Continuity, Capacity Building Plan
It should be noted that SI has to take prior approval from GSCL on a request order before supplying the project components for
phase wise implementation of the project.
SI should complete all the activities within the defined timelines as indicated in Timeline of this project. The timeline will be
reviewed regularly during implementation phase and may be extended in case GSCL feels that extension in a particular Request
Order/Integration or any track is imperative, for the reason beyond the control of the bidder. In all such cases GSCL’s decision shall
be final and binding. The SI will be eligible for the payment based on the completion of activities and approval of the relevant
deliverables.
• The request for payment shall be made to the Authority in writing, accompanied by invoices
describing, as appropriate, the services performed, and by the required documents -Pre-
Acceptance Testing, Test Results, Audit Reports etc.
• All payments shall be made after Verification of documentation by the GSCL or any person
authorized by GSCL.
• Due payments shall be made promptly by the Authority, generally within Thirty (30) days after
submission of an invoice or request for payment by SI.
• The currency in which payments shall be made to the SI under this Contract shall be Indian
Rupees (INR) only.
• In case of disputed items, the disputed amount shall be withheld and shall be paid only after
settlement of the dispute.
• Any penalties/ liquidated damages, as applicable, for delay and non-performance, as mentioned
in this RFP document, shall be deducted from the due payments of the respective milestones.
• Taxes and duties, as applicable, shall be deducted / paid, as per the prevalent rules and regulations
as on date of the invoice. Any change in rates of Taxes and duties during the project shall adjusted
upwards or downwards as per the latest regulations.
• All payments shall be made on pro-rata basis on actual supplies or services provided.
1) 10% of the CAPEX cost shall be released on submission of following and consequent approval by GSCL:
Detailed Survey Report including infrastructure AS-IS and TO BE assessment, phase wise location distribution.
Design Built Report (DBR) containing the High Level Design, Low Level Design, BOQ
Detailed Project deployment plan including Operations Management, Contract Management, Risk Management
2) 50% of the CAPEX cost shall be released on Supply of material on pro-rata basis and as per the approved supply plan by
GSCL.
3) 15% of the CAPEX cost shall be released on Installation on pro-rata basis and as per the approved supply plan by GSCL.
4) 15% of the CAPEX cost shall be released on Commissioning on prorate basis and as per the approved supply plan by GSCL.
5) 5% of the CAPEX cost shall be released on Go Live of individual systems on prorate basis and as per the approved supply
plan by GSCL.
6) 5% of the CAPEX cost shall be released on overall Go Live of the complete project.
Payment of Operations and maintenance phase will be made on quarterly basis (at completion of each quarter) based on
the adherence to SLA, for the amount quoted for each respective year.
Public Address System with Emergency Call Back System to be installed at various junctions
4.3 Installation of Poles:
1. The SI shall ensure that all the installations to be as per satisfaction of GSCL. Ensure that the power and signal connections are
properly installed in the pole such that they are protected from damage and tempering. During pole installation, the line-of-
sight/field-of-view should be checked with test cameras
2. For installation of Cameras, PA-ECB etc. the SI shall provide appropriate poles (Depending on the location and weather
conditions a durable, corrosion-resistant, and wind-resistant pole material should be chosen ) and any supporting equipment
3. SI to ensure that the poles erected to house cameras, PA-ECB etc. are good, both qualitatively and aesthetically
4. SI should use the industry best practices while positioning and mounting the cameras and ensure that the pole
implementation is vibration resistant. Arrangements for bird scare spikes on top of camera shall be made to prevent birds from
sitting on top of camera/ camera box.
5. The poles shall be installed with base plate, pole door, pole distributor block and cover
6. Base frames and screws shall be delivered together with poles and installed by the SI
7. In case the cameras need to be installed besides or above the signal heads, suitable stainless-steel extensions for poles have
to be provided and installed by the SI, so that there is clear line of sight
8. The successful SI shall provide the structural calculations and drawings for approval to GSCL. The design shall match with
common design standards as applicable under the jurisdiction of Guwahati city and NHAI guidelines to be followed.
9. All necessary coordination related to this installation will be done by SI in discussion with the GSCL
10. Poles and cabinet shall be so designed that all elements of the field equipment can be easily installed and removed.
11. All the poles, junction boxes and necessary infrastructure deployed on the field shall be marked with logo of GSCL with text
(as required). SI shall ensure its provisioning and proper numbering shall be done for all field equipment / inventory.
Documentation for the inventory list with numbering and GIS coordinates shall be submitted by SI to GSCL at regular intervals
and also at the time of Go-Live.
12. Need to share the safety and Quality Assurance Plan for entire project and considered during design phase and need to
follow/comply the CPWD rules for entire field activity, specially for Civil/Electrical work like trenching, restoration, foundation
and Electrical/Signal cabling in Field.
4.5 Connectivity
The SI shall conduct detailed study for connectivity of all filed devises / cameras considering feasibility, design optimization
reliability.
The testing and monitoring procedures need to submit, to ensure the quality and performance of the connectivity over the time
should also be in place and consider the same during detailed engineering and design phase.
The overall Architecture is given below
OVERALL ARCHITECTURE
4.6 Site Clearance obligations and other relevant permissions
Prior to starting the site clearance, the SI shall carry out survey of field locations as specified in this RFP, for buildings, structures,
fences, trees, existing installations, etc. The authority shall be fully informed of the results of the survey and the amount and
extent of the demolition and site clearance shall then be agreed with the authority. The Authority shall facilitate SI to take all
requisite approvals and take necessary clearances for activities like Right of Way (ROW) etc.
The environmental and social impact assessment and mitigation measures for the site clearance activities should also be
considered.
SI is responsible for Maintenance and repair of the electrical works and power supply. SI is responsible for the backup and
alternative power sources in case of a power outage or disruption. SI will be responsible for any damages happen due to any
nonstandard work.
4.8 Civil and Electrical works
a) SI is responsible for carrying out all the civil work required for setting up all the field components of the system
including:
• Preparation of concrete foundation for MS-Poles & cantilevers
• Laying of Pipes complete with fitting
• Hard soil deep digging and backfilling after cabling
• Soft soil deep digging and backfilling after cabling
• Chambers with metal cover at every junction box, pole and at road crossings
• Concrete foundation from the Ground for outdoor racks
b) The SI will be required to provide electricity to the cameras through the aggregation point. Since this component has
dependency on approval from local authorities, it is recommended that Bidder plans this requirement well in advance &
submits the application to the concerned electricity distribution agency with requisite fees if applicable.
c) The SI to carry out study and identify locations to provide UPS backup, depending upon power situation across city, so as
to meet the camera uptime requirements.
d) SI is responsible for carrying out all the electrical work required for powering all the components of the system
e) Electrical installation and wiring shall conform to the electrical codes of India.
f) SI must make provisions for providing electricity to the cameras, field elements, the JB (Junction Box) housing the UPS/
SMPS power supply with minimum backup as defined in this RFP, using UPS/inverter.
g) Registration of electrical connections at all field sites shall be done in the name of SI/GSCL as agreed and finalized in the
contract document.
h) SI has to also arrange for alternate or redundant power supply in form of UPS etc. in case the primary source of power fails
for all surveillance, INTELLIGENT CITY SURVEILLANCE SYSTEM equipment as described in the RFP.
i) SI should house the electricity meters inside the power cabinet as mentioned in this RFP document.
The SI shall describe the planned lightning-protection and anti –interference measures in the feasibility report. Corresponding
lightning arrester shall be erected for the entrance cables of power line, video line, data transmission cables. All crates shall
have firm, durable shell. Shell shall have dustproof, antifouling, waterproof function and should capable to bear certain
mechanical external force.
Earthing should be done for the entire power system and provisioning should be there to earth UPS systems, Power distribution
units, AC units, etc. so as to avoid a ground differential. Department shall provide the necessary space required to prepare the
earthing pits.
Based on the survey report approved by authority, the SI will undertake the system configuration and customization in line with
the changed, improved or specific requirements of Guwahati Police and GSCL including:
• The SI shall be responsible for obtaining all permits and approvals necessary to install the Intelligent City Surveillance
System components from authority. However, authority shall borne the ROW charges and provide permissions from
various government departments.
• The SI shall be required to submit a detailed installation report post installation of all the equipment at approved locations.
The report shall be utilized during the acceptance testing period of the project to verify the actual quantity of the
equipment supplied and commissioned under the project.
• Finally approved/accepted solution for each component of Intelligent City Surveillance System including enforcement
system shall be accompanied with “Intelligent City Surveillance System Configuration” document and the same should be
referenced for installation of Intelligent City Surveillance System including enforcement system at Junctions that are
identified within the scope of this project.
• The implementation methodology and approach must be based on the global best practices in-order to meet the defined
Service Levels during the operation.
• Best efforts have been made to define major functionalities for each sub- system of Intelligent City Surveillance System
including enforcement System. However, SI should not limit its offerings to the proposed solution in this RFP and is
suggested to propose any associated item part of RFP BOQ already been given in this tender.
4.14 Cameras
The broad scope of work to be covered under this will include the following, but is not limited to:
• The SI shall install the cameras at the specified junctions/locations across the city.
• The SI shall design, supply, and install the camera system as defined in the RFP, all camera accessories , camera housing
and mounting shall be installed by the SI. The SI shall supply all of the necessary equipment for the camera poles, warning
signs and shall make the final connections to the camera.
• The SI shall be responsible for providing the necessary IT infrastructure for detection, analysis, retrieval of the information
at Command and Control Center.
• For more details on technical and functional specifications of Cameras, bidder should refer to Functional and Technical
Requirements in this RFP.
• The SI will responsible for the maintenance and Regular updates of the camera systems.
.
• The SI shall install the Public Address System at the specified junctions/locations across the city.
• The SI shall design, supply, and install the public address system as defined in the RFP, all accessories and mounting shall
be installed by the SI. The SI shall supply all of the necessary equipment for the poles and shall make the final connections.
• The SI shall be responsible for providing the necessary IT infrastructure for announcement to be made from the information
at Command and Control Center.
• For more details on technical and functional specifications of Public Address System, bidder should refer to Functional and
Technical Requirements in this RFP.
• The SI shall install the Emergency Call Back System at the specified junctions/locations across the city.
• The SI shall design, supply, and install the Emergency Call Back system as defined in the RFP, all accessories and mounting
shall be installed by the SI. The SI shall supply all of the necessary equipment for the poles and shall make the final
connections.
• The SI shall be responsible for providing the necessary IT infrastructure for receiving and accepting Voice command and
retrieval of the same at Command and Control Center.
• For more details on technical and functional specifications of Emergency Call Back System, bidder should refer to Functional
and Technical Requirements in this RFP.
• System should detect the false alarms.
• The CCTV cameras should have a field-of-view that include the view of the emergency call box system.
4.17 Design, Supply, Installation, Testing and Commissioning of Network and Backbone Connectivity
• Network and Backbone Connectivity is an important component of the Intelligent City Surveillance System and needs
attention in assessment, planning and implementation. It is important not only to ensure that the required connectivity is
provisioned within the required timelines but also ensure that it is reliable, secure and supports the required SLA
parameters of Latency, Jitter, Packet Loss and Performance.
• The SI shall procure bandwidth as a service for the contract duration in order to meet the requirements as defined within
the service level agreement (SLA).
• The SI should provide detailed network architecture of the overall system, incorporating findings of site survey exercise.
The network so envisaged should be able to provide real-time data streams to the CCC. All the components of the technical
network architecture should be of industry’s best standard and assist SI in ensuring that all the connectivity SLAs are
adhered to during the operational phase.
• The SI shall prepare the overall network connectivity plan for this project. The plan shall comprise of deployment of network
equipment at the junctions to be connected over the network, any clearances required from other government
departments for setting up of the entire network.
• SI is also required to do the estimation of bandwidth requirements considering the specifications mentioned in this RFP
document.
• As per TRAI guidelines, the resale of bandwidth connectivity is not allowed. In such a case tripartite agreement may be
formed between Purchaser, selected Bidder and Internet Service Provider (s). In order to meet the RFP requirement,
Selected Bidder may have a to form tripartite agreement with multiple ISPs.
• Supply, Install, and Commission of IT Infrastructure including site preparation in CCC. A secured environment will be
provided to the SI at the CCC. As well as need to share a feasibility report for the shifting of infrastructure would be in
case of relocalization of CCC during design phase.
• Supply Smart Network Rack, Network Switches, and required accessories at CCC.
• The SI shall establish a state-of-the-art CCC, the key components of the CCC will be as follows:
4.18.1 Video Wall system
4.18.2 Operator workstations
4.18.3 Active Networking Components (Switches, Routers)
4.18.4 Passive Networking Components
4.18.5 Electrical Cabling and Necessary LED Illumination Devices for approx. ~3000 Square feet area
4.18.6 Office Workstations
4.18.7 UPS (1-hour backup)
4.18.8 Furniture & Fixtures as specified in subsequent sections of this RFP document
4.18.9 Physical and electronic Security systems for authorized entry (Biometric access control)
4.18.10 Safety System for protection against Fire, Theft and any other possible damage.
• The SI shall provide system integration services to customize and integrate the applications procured through the project.
The Intelligent City Surveillance System applications proposed by the SI should have open APIs and should be able to
integrate and share the data with other third- party systems already available.
• The SI must ensure that redundancy is provided for all the key components to ensure that no single point of failure affects
the performance of the overall system.
• The above are only indicative requirements of IT and Non-IT Infrastructure requirements at CCC. The exact quantity and
requirement shall be proposed as part of the technical proposal of the SI.
• The implementation roll-out plan for hosting of the data center over the cloud shall be approved by authority. The detailed
plan shall ensure the scalability, expandability and security.
• The SI shall be required to submit a detailed installation report post installation of all the equipment at approved locations.
The report shall be utilized during the acceptance testing period of the project to verify the actual quantity of the
equipment supplied and commissioned under the project.
4.19 Design, Supply, Installation, Testing and Commissioning of IT Infrastructure for DR over cloud
The SI shall be responsible for deploying Disaster – Recovery for the Intelligent City Surveillance System on Cloud. The SI shall
select a MeitY empaneled Cloud Service Provider (CSP). The SI may refer to the details of MeitY empaneled CSPs over,
http://meity.gov.in/content/gi-cloud-meghraj. It should also comply with the empanelment requirements published by the
MeitY.
All the requirements/scope of work mentioned in this section shall be the responsibility of the SI. SI shall also ensure that as a
SI, the CSP provides the features in the cloud and also performs the scope of work which is directly attributable to CSP.
i. The SI is required to prepare and submit along with their technical proposal, the details of methodologies &
computations for sizing & capacity of storage, compute, backup, network and security.
ii. There should be sufficient capacity (compute, network and storage capacity offered) available for real time
provisioning during any unanticipated spikes in the user load.
iii. The SI will be responsible for adequately sizing the necessary compute, memory, and storage required, building the
redundancy into the architecture (including storage) and load balancing to meet the service levels mentioned in the
RFP.
iv. While the initial sizing & provisioning of the underlying infrastructure (including the system software and bandwidth)
may be carried out for the first year; subsequently, it is expected that the SI along with the CSP, based on the growth
in the user load (peak and non-peak periods; year-on year increase), will scale up or scale down the compute, memory,
storage, and bandwidth requirements to support the scalability and performance requirements of the solution and
meet the SLAs.
v. Ensure redundancy at each level
vi. SI shall provide interoperability support with regards to available APIs, data portability etc. for GSCL to utilize in case
of:
a) Change of Cloud Service Provider,
b) Migration back to in-house infrastructure,
c) Burst to a different cloud service provider for a short duration, or
vii. Required support to be provided to GSCL in migration of the VMs, data, content and any other assets to the new
environment created by the GSCL or any Agency (on behalf of GSCL) on alternate cloud service provider's offerings to
enable successful deployment and running of GSCL solution on the new infrastructure.
viii. The SI/CSP should configure, schedule and manage backups of all the data including but not limited to files, folders,
images, system state, databases and enterprise applications:
a) Perform and store data and file backups consisting of an initial full back up with daily incremental backups for
files;
b) For the files, perform weekly backups;
c) For the databases, perform a twice weekly full database backup, with a three times daily backup of database
log files
d) Encryption of all backup files and data and management of encryption keys as a service that can be enabled
for GSCL that require such a service.
e) Retain database backups for five (5) years on system and thereafter on tapes which can to be restored when
required.
ix. SI/CSP shall not delete any data at the end of the agreement (for a maximum of 90 days beyond the expiry of the
Agreement) without the express approval of GSCL.
x. The SI is fully responsible for technology refreshes, patch management and other operations of infrastructure that is
in the scope of the SI.
xi. The SI should offer dashboard to provide visibility into service via dashboard.
i. Senior Officers: Officers from Guwahati Police and other departmental stakeholders
ii. Functional users: Field staff, the staff of command and control Center and other departmental stakeholders
• SI should ensure that the knowledge transfer to the concerned department staff happens effectively post training.
• Prepare the training material in consultation with authorities. Detailed training manuals would be prepared by the
SI prior to the start of the training. Master copies of all training material should be submitted to the Authority for
approval.
The core objective of TPA is to provide objective assurance to monitor and assess the conformance by the bidder on various
project activities and add value to improve the project operations. It would help GSCL to accomplish the project objective by
bringing a systematic, disciplined approach to evaluate and improve the effectiveness of infrastructure, operations service level
management and control and governance process.
• Detailed test plan shall be developed by the SI and approved by authority. This shall be submitted by SI before Final
Acceptance Testing activity to be carried out.
• All documentation related to Intelligent City Surveillance System project and relevant acceptance test document
(including IT Components, Non-IT Components etc.) should be completed and submitted before the final acceptance
test to the Department.
• The training requirements as mentioned should be completed before the final acceptance test.
• Successful hosting of Application.
• All hardware and software items must be installed at respective sites as per the specification.
• Availability of all the defined services shall be verified.
• DR Drill to be performed and 100% successful.
• The SI shall be required to demonstrate all the features / facilities / functionalities as mentioned in the RFP.
• The SI shall arrange the test equipment required for performance verification and will also provide documented test
results.
The SI shall be responsible for documenting configuration of all devices and keeping back up of all configuration files for
the complete project tenure, so as to enable quick recovery in case of failure of devices.
The SI shall provide O&M services for all project related components installed as part of Intelligent City Surveillance System
project during the Contract Period, including one (1) year of warranty period after “Go-Live”.
The activities to be carried out during the contract period shall include, but not limited, to the following:
• Monitor the operation of Intelligent City Surveillance System and take suitable interventions as required such as
change of signal plan, change of signal timing from CCC enabling green corridor etc. Periodic change of signal plans
and other configurations parameters on directions of Authority.
• Monitor health of signal and camera equipment and initiate immediate corrective action in any fault.
• Undertake configuration management for all systems.
• Undertake system admin, database admin, back up, archival, network admin activities.
• Comprehensive maintenance of all equipment/sub-system during Contract period.
• Facility Management of Command and Control centre during O&M phase.
• Help Desk Management.
Minimum
Deployment Minimum Deployment
SI no. Position Quantity during during Operation and
Implementation Maintenance phase
phase
Project
1 1 At least 80% 100%
Manager
Integrated
Commandand Onsite Support to Project
2 1 At least 80%
Control Centre team on need basis
(ICCC) Expert
Solution Onsite Support to Project
3 1 At least 80%
Architect team on need basis
Network &
Security
4 1 At least 60% 100%
Infrastructure
Expert
Security &
5 Surveillance 1 At least 80% 100%
Expert
Server &
6 1 At least 60% 100%
Storage Expert
Quality Control Onsite Support to Project
7 Expert 1 At least 80% team on need basis
including quarterly visit and
report submission
The above-mentioned manpower requirement is minimum and if the SI believes that to meet the SLAs, additional resources are required,
the same may be provided by the SI. GSCL can suggest changes in the aforementioned resource requirement as per the
requirement. It is the SI’s responsibility to identify and deploy the resources during the O&M phase.
The Command Centre Operators provided by the SI shall be responsible for verification and generation of the e-challans. They
will also be responsible for providing support in terms of monitoring of the data feeds at Command and Control Center and
handholding the Officials from Police department required for operationalization of the Intelligent City Surveillance System
project.
System Engineer - Hardware shall be responsible for first level of technical support in terms of ICT equipments placed at the
Command and Control Centre as well as Help Desk functions.
SI shall deploy adequate site engineers required for smooth operation of the Project components.
SI shall deploy adequate Facility Management staff at Command and Control Centre. Facilities management shall include but
not limited to building and grounds maintenance, cleaning, catering and vending, security, space management, utilities
management etc. and associated manpower shall also be under the scope of the SI during Operation & Maintenance phase.
• Information relating to the current services rendered and data relating to the performance of the services;
• Entire documentation relating to various components of the Project, any other data and confidential information
related to the Project;
• All other information (including but not limited to documents, records and agreements) relating to the products and
services related to the project
• Enable Police Department and its nominated agencies, or its replacing Successful SI to carry out due diligence in order
to transition the provision of the Project Services to authority or its nominated agencies, or its replacing Successful SI
(as the case may be).
• The SI shall provide GSCL or its nominated agency with a recommended exit management plan ("Exit Management
Plan").
• Promptly during exit on reasonable request by GSCL, SI shall provide access to and copies of all information held or
controlled by them which they have prepared or maintained in accordance with this agreement relating to any material
aspect of the services (whether provided by the SI or subcontractors appointed by the SI).
• GSCL shall be entitled to copy of all such information. Such information shall include details pertaining to the services
rendered and other performance data.
• SI to provide appropriate knowledge transfer.
Any specified parameters mentioned in the scope/technical requirement in the RFP may be considered if it is required for
meeting current & future requirements during the contract period. The SI is fully responsible for the specified outcome to
be achieved.
3 Bid should be compliant to the Policy and Make in India makes shall be given
preference as per Order 2017-Revision vide the Department of Industrial
Policy and Promotion (DIPP) Order No. P-45021/2/2017-PP(BE-II) dated 16th
September,2020 or latest. OEMs under make in India must submit
Undertaking and supporting documents.
5 MP IP Bullet Camera with in-built 100 Mtr. IR Technical Compliance Remark
(Yes/No)
S.No Features Required Parameter
1 Sensor 1/2.7”, 5MP Progressive Scan CMOS Sensor
2 Max resolution 5 MP
3 Min. illumination Color: 0.01 Lux @F1.2, B/W: 0.001 Lux@F1.2, 0
Lux at IR ON
4 Electronic Shutter Auto, Slow Shutter, (1/1s-1/100,000s Adjustable)
5 Lens 5-50mm Motorized Lens
6 IR Range up to 100Mtr
7 Camera Feature WDR (120dB), 3D-DNR, AGC, AWB, Day & Night,
8 S/N ratio ≥60db
9 Video Analytics Line Crossing, Motion Detection, Intrusion
Detection, Scene Change, Human Detection
10 Video & Audio Video: H.265 & H.264 (H.265/ HEVC and H.264
Compression /AVC Certificate to be submitted at the time of
submitting bid)
Audio: G.711A
11 Video & Audio Bit Rate Video: Constant bit rate, variable bit rate
(250kbps-8Mbps)
12 Video Streams Mainstream: 5MP
(2880X1620)/2MP(1920×1080)@25/30fps
Sub Stream: D1 (704x576)/ CIF (352×288)
@15FPS
Third Stream: VGA (640X480)/CIF (352×288)
@15FPS
13 Security Feature New Password Policy, ActiveX Remove, Shifting
to HTML5, HTTPS, Video Encryption , HTTPS X
509 certificate, syslog, 801.X, Trusted Boot
14 Protocol TCP/IP, IPv4,Ipv6, RTCP, NTP, UPnP, SMTP, FTP,
ICMP, HTTP, HTTPS, HTTP-Base64, HTTP-Digest,
DHCP, DNS, DDNS, RTP, RTSP, IGMP, P2P, IP
Filter, SNMP V1 & V2
15 Alarm In/out 1 Alarm In/1 Alarm Out
16 Audio In/out 1 Audio In/1 Audio Out
17 System Compatibility ONVIF Profile S, G & T . CCTV OEM Should be
ONVIF Full Member.
18 Privacy Mask Support 4 area privacy mask
19 Network Port RJ45 10M,100M adaptive Ethernet interface
20 SD Card Support up to 512GB
21 Operating Conditions -30°C ~ 60 °C Humidity 95% or less (non-
condensing)
22 Ingress protection IP66/67 Complaint
23 Vandalism IK10 Vandal Proof Complaint
24 Product Certification CE, FCC, IS-13252 (Part 1):2010, BIS Registered
25 OEM should have ISO 9001, 14001, 27001, 45001, ISO/IEC 27032:2012 and
CMMI Level 5 Certificate.
5 MP IP BOX Camera
Sl. No. Parameters Specifications
1 Sensor 1/2.7”, 5MP Progressive Scan CMOS Sensor
3 Max resolution 5 MP
4 Min. illumination Color: 0.01 Lux @F1.2, B/W: 0.001 Lux@F1.2, 0
Lux at IR ON
5 Electronic Shutter Auto, Slow Shutter, (1/1s-1/100,000s Adjustable)
6 Lens 5-50mm CSMount/M12 Mount Lens/Any Other
mount
7 IR Range External IR
8 Camera Feature WDR (120dB), 3D-DNR, AGC, AWB, Day & Night,
9 S/N ratio ≥60db
11 Video & Audio Video: H.265 & H.264 (H.265/ HEVC and H.264
Compression /AVC Certificate to be submitted at the time of
submitting bid)
Audio: G.711A
12 Video & Audio Bit Rate Video: Constant bit rate, variable bit rate
(250kbps-8Mbps)
13 Video Streams Mainstream: 5MP
(2880X1620)/2MP(1920×1080)@25/30fps
Sub Stream: D1 (704x576)/ CIF (352×288)
@15FPS
Third Stream: VGA (640X480)/CIF (352×288)
@15FPS
14 Security Feature New Password Policy, ActiveX Remove, Shifting
to HTML5, HTTPS, Video Encryption , HTTPS X
509 certificate, syslog, 801.X, Trusted Boot
15 Protocol TCP/IP, IPv4,Ipv6, RTCP, NTP, UPnP, SMTP, FTP,
ICMP, HTTP, HTTPS, HTTP-Base64, HTTP-Digest,
DHCP, DNS, DDNS, RTP, RTSP, IGMP, P2P, IP
Filter, SNMP V1 & V2
16 Alarm In/out 1 Alarm In/1 Alarm Out
17 Audio In/out 1 Audio In/1 Audio Out
18 System Compatibility ONVIF Profile S, G & T . CCTV OEM Should be
ONVIF Full Member.
19 Privacy Mask Support 4 area privacy mask
20 Network Port RJ45 10M,100M adaptive Ethernet interface
21 SD Card Support up to 512GB
22 Operating Conditions -30°C ~ 60 °C Humidity 95% or less (non-
condensing)
23 Ingress protection IP66/67 Complaint
24 Vandalism IK10 Vandal Proof Complaint
25 Product Certification CE, FCC, IS-13252 (Part 1):2010, BIS Registered
26 OEM should have ISO 9001, 14001, 27001, 45001, ISO/IEC 27032:2012 and
CMMI Level 5 Certificate.
Technical Compliance
IP Speaker Software Remark
(Yes/No)
1 Software should have the capability to connect multiple IP speakers
Software should have the capability for one to one and one to many
2
announcement
3 Software should have the capability to make the group of multiple IP speaker
Technical Compliance
Emergency Call Box Software Remark
(Yes/No)
SOS Emergency Call Box offers hands-free emergency call management service at
the time of distress. Such call boxes should be mounted in easily accessible
1 locations. Emergency Call Boxes should be mounted in locations where a CCTV
Camera from the proposed bill of material is nearby positioned to capture the
overview of the region.
The call-box with Video and all the call boxes are connected to a central server
2
through the bandwidth connectivity envisaged for the project.
Video Based call management application with a live site map, the calls for help can
3
be served practically from a remote location
Software shall be capable to transfer the call to the next Pre-defined Station and
4
ECB Monitoring System at Control Room
Software should be capable to define minimum three pre-define stations to get the
5
alert of each ECB
Software should have the capability to send the alert simultaneously once any Call
will be initiated between the ECB and Station, at the same time alert will be sent to
6
VMS and audio/video recording will be started at ECB Recording Server in Control
Room
Technical Compliance
Sr. No Description Remark
Yes/No
1 General
The Video Management System shall be a fully distributed solution, designed for
limitless multi-site and multiple server installations requiring 24/7 surveillance
with support for devices from different vendors. The Video Management System
shall offer centralized management of all devices, servers and users and must
empower a flexible rule-based system driven by schedules and events.
VMS shall support IP cameras (all the features & functionalities) from at least
thirty (50) major camera brands with API level Integration. Documentary
evidence having make detail should be mandatorily submitted.
The VMS application shall support all the features & functionalities of the offered
cameras. Documentary proof should be submitted for same.
The offered VMS should have integration with 10000+ camera models at API
level. Documentary evidence having camera make and model detail should be
mandatorily submitted.
VMS shall have API based integration with the major camera vendors in order to
support features such as, up to 3 Multi-streams, SD Card storage sync, Camera
based Edge Analytics support, Camera I/O support, Camera Audio support
To ensure openness, VMS, cameras and VA should not be from the same
manufacturer but should be tightly integrated on API level.
VMS shall support installation and ability to run on virtualized windows servers
VMS manufacturer shall provide their SDK (or any other integration means)
libraries and documentation) to ensure a seamless integration with any other
system
VMS shall be open to any standard storage technologies integration.
VMS shall be open to any video wall system integration.
VMS OEM should be one of the top 5 OEM from Latest Global IHS World Report
for Video Management Software
VMS should have the possibility to integrate third party Video Analytics systems.
VMS should consist of only Base license and Channel Licenses. VMS should be
provided with unlimited number of Failover Servers and Failover Camera
Licenses.
The system shall act as an SNMP agent which can generate an SNMP trap as a
result of rule activation in addition to other existing rule actions.
The system shall be able to utilize Microsoft Windows SNMP Service for
triggering of SNMP traps
The VMS should have the feature to record client workstation screens for
monitoring & to provide an account of fraudulent activities by capturing screen
recordings of activities/transactions.
The VMS should be mandatory provided with 100 number of Client Licenses. In
case of additional Licenses required, no extra cost needs to be considered.
The VMS should have the feature of privacy masking to conceals certain parts of
the image, both in live and playback video and in exported material. It supports
permanent masks and liftable masks that can be lifted and managed with user
credentials. Masking level is adjustable and ranges between ‘light blur’ to ‘solid
grey’
The VMS should support video data grooming feature to enables reduction of
video recording data size by reducing the frame rate of the video data.
VMS should support Scalable Video Quality Recording to record high-quality
video to edge storage, while a
low-quality reference video stream can be recorded centrally in the recording
servers
The VMS system shall be a scalable client – server architecture built using well
known operating systems
The VMS system shall enable recording to be done at the aggregation sites and
shall allow the local Control center to import selected video’s on demand.
Aggregation site types shall be categorized according to function and size as per
the table below.
To facilitate the VMS system architecture, the BIDDER shall ensure that sufficient
capacity is designed into the data communications & telecommunications
infrastructure to deliver the required functionality, along with the ability to
allocate and reserve resources (including bandwidth).
The Recording server shall have the ability to handle Video Motion detection on
Nvidia GPU to optimize the server requirement.
The VMS data communications and telecommunications network shall use a
suitable transport medium and associated cabling and data transmission
infrastructure that will support real-time video display of cameras at the
nominated operations centers. The type of transmission network shall be
determined by the BIDDER.
The VMS system shall be compatible to single and multiple processor servers.
The server processor & hardware shall be optimized in all cases.
The VMS system shall cluster the processing & memory load across several
machines. The failure of any one server in the solution shall not cause a failure
in the entire system.
The VMS system device drivers shall be stored separately to the central core
application to ensure any instability in 3rd party SDKs do not affect the core
application.
The VMS management server shall be able to intelligently scan an IP network for
new devices (cameras or servers) along with automatic model detection.
Network infrastructure and installation are the responsibility of the Bidder.
Network components both active and required for the successful
implementation of the video surveillance detailed in this tender shall be provided
by the Bidder. The network infrastructure shall meet the streaming requirement
of the project without any bottlenecks. The network infrastructure shall support
UDP multicast, UDP unicast and TCP transmission.
The VMS system shall provide an integrated secure, scalable and easily accessible
software-based solution for the management of the existing & future physical
security infrastructure
The VMS system shall provide a powerful and efficient management interface for
all the security systems across all monitored sites.
The Video Management System shall be a fully distributed solution, designed for
limitless multi-site and multiple server installations requiring 24/7 surveillance
with support for devices from different vendors. The Video Management System
shall offer centralized management of all devices, servers and users and must
empower a flexible rule-based system driven by schedules and events.
The Video Management System shall contain recording servers used for
recording video feeds and for communicating with cameras and other devices.
The recording servers shall process the recordings and playback the video
streams.
The Video Management System shall include a federated architecture allowing
clients on the host system with the right user rights to view video sources
belonging to multiple independent Video Management Systems simultaneously,
as if they were on The Video Management System shall contain a management
server that shall be the central manager of the system and control recording
servers, cameras, devices and users. The management server shall handle the
initial client login, system configuration and logging.
The management server shall allow access to a system manager from where the
administrator can configure and manage all servers, cameras and users.
The system shall allow the management server to be installed on multiple servers
within a cluster of servers ensuring that another server in the cluster
automatically takes over in case the first server fails.
VMS should have the capability to integrate with 3rd party Fire alarm, Access
Control Systems, BMS systems.
The Video Management System shall support installation and ability to run on
virtualized Windows servers.
The VMS system shall support Device firmware upgrade of single and multiple
devices in bulk from within the Management Interface
The Video Management System shall allow an unlimited number of cameras to
be connected to each recording server and an unlimited number of recording
servers to be connected to each management server across multiple sites, if
required.
The Video Management System shall support high availability of recording
servers. A failover option shall provide standby support for recording servers
with automatic synchronization to ensure maximum uptime and minimum risk
of lost data.
The Video Management System shall support a versatile rule system including
scheduled or event-driven actions with numerous options including support to
time profiles.
The Video Management System shall support latest Microsoft windows
operation software. The system must use DirectX and .NET Framework.
The Video Management System software shall include multicast and multi-
streaming support.
The Video Management System shall include automatic camera discovery.
The Video Management System shall support archiving for optimizing recorded
data storage through unique data storage solutions by combining performance
and scalability with cost efficient long-term video storage.
The Video Management System shall incorporate fully integrated matrix
functionality for distributed viewing of any camera in the system from any
computer with the client viewer.
The Video Management System shall incorporate intuitive map functions
allowing for multilayered map environment. The map functionality shall allow for
the interactive control of the complete surveillance system, at-a-glance overview
of system integrity, and seamless drag-and-drop integration with video wall
module option.
The VMS software must be possible to integrate customer provided GIS MAP,
Google MAP, Open Street MAP only having the MAP credentials.
The Video Management System shall support 56-bit encryption of video for
export purposes. The 56-bit encryption shall meet the requirements on export
limits for encryption.
The Video Management System shall support full two-way audio between clients
and remote devices. Two-way audio integration shall support the following
features and functions:
The Video Management System software shall provide fast evidence export by
exporting in video to various formats, including video from multiple cameras in
encrypted native database format with an included viewer.
The Video Management System shall show full awareness of the system through
audit logs and shows user activity through comprehensive logs.
The Video Management System shall include support for a frame work data
module designed to integrate multiple third party Video Content Analysis (VCA)
solutions seamlessly into client viewer environments.
The Video Management System shall include a Software Development Kit (SDK)
that offers important capabilities for integrating the Video Management System
with third party software and applications.
The Video Management System shall include a stand-alone viewer application to
be included with video exported from the client viewer application. The viewer
application shall allow recipients of the video to browse and playback the
exported video without installing separate software on their computers.
The Video Management System shall include support for Active Directory to
allow users to be added to the system. Use of Active Directory requires that a
server running Active Directory, acting as a domain controller, to be available on
the network.
The Video Management System shall be designed to support each component
on the same computer for efficiency in smaller systems, or each component on
separate systems for large system deployments.
VMS should support ONVIF S, G, T, Q & M Profile supported by IP Devices
Cameras can be possible to position on the MAP by using latitude and longitude.
The VMS software must ensure compliance with GDPR data privacy law requires
careful planning and preparation of the design of your video surveillance system
and the policies and procedures regulating how it is used.
16 Remote Mobile App
Integrated Mobile Application to monitor overall CCTV system and for required
coordination during emergency
Mobile Client support Native mobile app for smartphone or tablet users, for easy
access to live and playback of cameras, and to activate system events and
outputs. Additionally, for use as a remote recording device by using the mobile
device’s built-in camera, whereby video from the device’s camera is streamed
back to the VMS and recorded like a standard camera.
Provide mobile client capability for mobile device users to use their mobile
device cameras as cameras in the VMS
9 Key UI View and The System shall provide the following key results
operational from the use case
functionalities of the Event Notifications: The result of each of the use
Video Intelligence case shall be in the form of events that contain the
Platform screenshot with other metadata describing the
event, such as detected objects, timestamp,
camera/video that generated the event and all
other metadata representing the event from
different use cases. The User Interface shall have a
grid and list view with all the events from different
use cases, cameras etc. These features should be
also supported through a mobile application to
may be utilized by various users in future.
10 Common UI for all the The user interface shall be a unified dashboard
use-cases that shows events from all the Video Analytics use-
cases and all the cameras in a common UI, and
which gets populated in real time from event
notifications.
11 Web based Interface The User based access and interface of the system
shall be completely web interface that can be
accessed from any system in the local area network
(LAN) or wide area network (WAN) with login
credentials. It shall allow multiple users to log in at
the same time, and receive real-time alerts and
notifications.
15 Key configuration The use case on each camera shall allow setting up
parameters configuration of multiple detections zones such as
lines and regions that can be used to define
perimeters, regions of interest.
20 Deployment of use- The system shall allow deployment of any use case
case across any camera on any camera without any MAC level or IP level
locking. Ideally any use case shall be deployable
and redeploy able on any camera or video source
as far as the camera view supports such use cases
to be deployed.
8 Data representation The CEM system shall have an MIS system with a
detailed report and dashboard on crowding events
and data at a minimum of hourly granularity.
2 View Obstruction It should detect and raise an alert if the camera view
is obstructed by any foreign object. The user should
be able to adjust the threshold parameters of
extent of obstruction in terms of percentage of
camera view
3 Bright Light Shown The app should be able to detect and raise an alert
if the camera view is tampered with bright lights.
The system should specifically identify it as a
camera tampering event with light shining.
3. Detections in crowd The system shall be able work to detect more than
20 faces in crowd on moderate face rotation either
horizontal or vertical. It should support a yaw angle
of -40 to +40 degrees, a pitch angle of -30 to +30
degrees and a roll angle of -30 to +30 degrees.
4. Detection of partial The FDS shall recognize partial faces with varying
faces angles from multiple videos simultaneously from
Video clips, Group Photographs and VMS Playback
directly from FRS Client Interface. FRS shall be able
to process uploaded pre-recorded video feeds with
a speed of up to X20, depending on the proposed
hosting hardware and the video quality
9. Image Format support The system shall be able to utilize any of the file
formats like JPEG, PNG, BMP, TIFF etc. format for
enrolment.
10. De-duplication FRS shall be able to check if new enrolled face is
already enrolled in the database before registering
the new enrolled face in the system. Also, the
system shall be able to find a previous detection of
a POI (person of interest) upon enrolment to watch
list (retrospective search) in less than 2 sec.
11. Enrolment of faces The system shall have option to automatically enroll
face images from CCTV cameras/video source. This
functionality should also be provided through the
Video Intelligence platform in addition to the FRS
application.
12. Categories of database The system shall have capacity to create different
faces categories of people with option to customize the
matching threshold for different categories.
13. Full HD Support The system shall be able to work on full HD Camera
video with maximum performance.
14. Implementation The system shall be able to be implemented on IT
hardware like Server or Workstation.
15. OS Support The FRS algorithm should be able to use proven
open source tools and technologies like Linux to
bring down the total cost of ownership of the
solution. FRS running on any other OS should be
supplied with Pre-Licensed Server based latest
version OS like Microsoft Server 2016 and Microsoft
SQL as needed by the application
16. Database Support The system shall employ database system like MS
SQL/ MYQL/ Leading Open Source
Database/Sybase/ Mongo DB/ Postgres/Oracle etc.
The FRS system should natively integrate with Video
Intelligence platform and use a common database
of the platform, so that common queries can be
made on the common database for faces detection
and other events.
19. Mobile Application FRS Software vendor shall have mobile application
Support of the same FRS software to support iOS and
android based smart field devices. Mobile
application shall be capturing the face of suspect in
field and sending back to the FRS server for
matching. Matching result shall be shown on the
mobile application screen with matching score.
There shall be provision in mobile application to
stream mobile device camera as video streamer.
20. Detection robustness System shall be able to detect the faces across the
multiple CCTV video sources for online (real-time)
and offline modes regardless of following
conditions:
a. Changes in Facial expression
b. Changes in facial hair or hairstyle
c. Changes by moderate aging (up to 15 years)
24. OEM owned algorithm The FRS OEM should have ownership of Face
Recognition Engine /Algorithm for any custom
specific development as required by client
25. Map feature FRS must allow tracking of person on maps to be
uploaded in the system for cameras connected to
FRS and shall highlight the camera location on the
map for each detection/alert.
26. SDK/API for integration FRS shall provide an SDK/API for integration with
any third-party software like C4I (Command,
Control Communication & Compute Center). API
must be available with a full set of documentation
of each method with accompanying sample code.
All FRS function shall be fully accessible via API.
27. Video Alert FRS shall be able to play a short video clip of the
moment of face detection without dependency on
VMS which can be downloaded/exported/saved for
evidence proof
31. Use of AI accelerator FRS shall use extensive AI Technology and perform
hardware video processing on GPUs like NVIDIA; INTEL or
similar as per design & sizing vetted by AI FRS
Algorithm OEM. The number of servers to be
supplied, shall be based on the number of camera
channels on which the FRS needs to be performed.
Ø Operating Temperature
· Operating Temperature of LED Display is -20° C ~ 60° C
· Storage Temperature of LED Display is -40° C ~ 60° C
Ø Others
· LED Display Communication: Ethernet, Wifi, GSM.
· Nominal Work Life of LED Display is 50000 Hours
Ø Picture Display
· System’s Picture Display is At least 300mm as per IRC /EN 12966 standards
· Full Matrix of LED Display and It is capable of displaying real time message generated by
CCCC.
· System has special frontal design to avoid reflection and UV resistant
· Beam Width of LED Display is B6 as per IRC/EN12966 standards.
· System’s Standard- viewing angle both horizontal and vertical is 160 / 160 degree
· System’s Viewing Distance is Suitable for readability from 150 Mtrs. or more at the
character size of 240mm, from moving vehicles
Ø Alarms
· System’s Refresh Frequency should not be less 90 Hz. No visible flicker to naked eye.
· System’s Communication (connectivity) is Wired & GPRS based wireless technology with
3G upgradable to 4G capability.
· Display’s Ambient Operating Temperature is capable of working in ambient
temperature range of T1 (- 15oC to +60oC.)
· System is capable to protect against Pollution/dust/water
Ø Power
· 230V AC (more than 90% power factor) or DC as per equipment requirement.
· Protection for overvoltage/ fluctuation/drop of the nominal voltage (50%) incorporated.
· power supply is with PFC, thus screen's actual power consumption is less and heat less,
which are good for long-time usage;
· The enclosure shall contain at least two 15 Amp VAC (industrial grade) outlet socket for
maintenance purpose.
Ø Functional Requirements:
· Central Control Software allows controlling multiple VMAS from one console.
· System is Capable of programming to display all types of Message having alphanumeric
character in English and Hindi and combination of text with pictograms signs. The system has
feature to manage video / still content for VMAS display.
· The system has capability to divide VMAS screen into multi parts to display diverse form
of information like video, text, still images, advertisements, weather info, city info etc.
· It is Capable of controlling and displaying multiple font types with flexible size and
picture sizes suitable as per the size of the VMAS.
· It is Capable of controlling brightness & contrast through software.
· It is Capable to continuously monitor the operation of the Variable Message sign board,
implemented control commands and communicate information to the Traffic Monitoring
Centre via communication network
· Real time log facility – log file documenting the actual sequence of display to be available
at central control system.
· Multilevel event log with time & date stamp.
· Access to system only after the authentication and acceptance of authentication based
on hardware dongle with its log.
· Report generation facility for individual/group/all VMASs with date and time which
includes summary of messages, dynamic changes, fault/repair report and system accessed
logs, link breakage logs, down time reports or any other customized report.
· Configurable scheduler on date/day of week basis for transmitting pre-programmed
message to any VMAS unit.
· Various users can access the system using single sign on and shall be role based.
Different roles which could be defined (to be finalized at the stage of SRS) could be
Administrator, Supervisor, Officer, Operator, etc.
· Apart from role based access, the system shall also be able to define access based on
location.
· Rights to different modules / Sub-Modules / Functionalities shall be role based and
proper log report should be maintained by the system for such access
· Components of the architecture must provide redundancy and ensure that there are no
single points of failure in the key project components. To take care of remote failure, the
systems need to be configured to mask and recover with minimum outage.
· The architecture must adopt an end-to-end security model that protects data and the
infrastructure from malicious attacks, theft, natural disasters etc. provisions for security of
field equipment as well as protection of the software system from hackers and other threats
shall be a part of the proposed system. Using Firewalls and Intrusion detection systems such
attacks and theft shall be controlled and well supported (and implemented) with the security
policy. The virus and worm’s attacks shall be well defended with Gateway level Anti-virus
system, along with workstation level Antivirus mechanism. There shall also be an endeavour
to make use of the SSL/VPN technologies to have secured communication between
Applications and its end users. Furthermore, all the system logs shall be properly stored &
archived for future analysis and forensics whenever desired.
· Ease of configuration, ongoing health monitoring, and failure detection are vital to the
goals of scalability, availability, and security and must be able to match the growth of the
environment.
· System use open standards and protocols to the extent possible
· System has Facility to export reports to excel and PDF formats.
Ø Remote Monitoring
· All VMAS are connected/configured to Traffic Monitoring system for remote monitoring
through network for two-way communication between VMAS and control Room to check
system failure, power failure & link breakage.
· Remote Diagnostics to allow identifying reason of failure up to the level of failed
individual LED.
· The system is capable to display warnings, traffic advice, route guidance and emergency
messages to motorists from the ICCC in real time.
· The system is also be capable to display warnings, traffic advice, route guidance and
emergency messages to motorist by using local PC/Laptops. The system shall display graphical
representation of the lanes with directional arrows and colour such as green, yellow, red for
depicting density of traffic
· The VMAS can display text and graphic messages using Light Emitting Diode (LED) arrays
· The System is able to display failure status of any LED at ICCC.
· The System supports Display characters in true type fonts and adjustable based on the
Operating system requirement.
· The ICCC workstation can communicate with the VMAS controller through the network.
It shall send out command data to the variable message sign controller and to confirm normal
operation of the signboard. In return, the ICCC workstation shall receive status data from the
VMAS controller.
· VMAS controllers continuously monitor the operation of the VMAS via the provided
communication network.
· Operating status of the variable message sign shall be checked periodically from the
ICCC.
· It is capable of setting an individual VMAS or group of VMAS’s to display either one of
the pre-set messages or symbols entered into the computer via the control computer
keyboard or by another means.
Functional Requirement
Sl. Parameter Description Technical Remark
No. Compliance
(Yes/ No)
Since there may be unseen situations when the power outage in some locations is more than 60 minutes, it should be ensured that
all data from various equipment like camera, sensors, etc. are backed up to avoid loss of data and Its SI responsibility to maintain it.
Proper civil infrastructure for housing the UPS must be ensured at each location during design and detail engineering phase.
S. Technical Compliance
TECHNICAL SPECIFICATIONS FOR 100 KW N+1 MODULAR ON-LINE UPS Remark
No. (Yes/No)
GENERAL FEATURES:
Supply, installation and commissioning of 100 KW N+1 True On-Line Double
Conversion, modular type UPS. The UPS shall be DSP controlled with front end
1
IGBT rectifier. Inverter shall be 3 Level IGBT based for highest efficiency. The 100
KW N+1 KW UPS system should have provision to operate in parallel redundant
mode, with similar UPS to provide redundancy in future (at least 3 nos. UPS
frames/cabinets in parallel).
Each 100 KW N+1 KW UPS shall be with modular architecture with suitable nos of
25KW~50KW Hot Swappable Power Modules of double conversion configuration,
especially designed for mission critical applications, i.e. 5 nos x 25 KW or 4 nos x
40KW or 3 nos x 50KW Modules, such that 01 module shall be redundant.
2 Individual Module size >50 KW and <25 KW shall not be accepted. There shall be
provision to scale up the UPS to minimum 200 KW through vertical expansion
simply by inserting additional 25KW/50KW hot swappable power modules as and
when necessary. Further, UPS should also be scalable upto 600 KW through
horizontal expansion
The frame for Each 100 KW N+1 UPS shall be in a space saving design, with
3
standard IT 42U frame
Each hot swappable UPM power module shall include a rectifier, battery
4 converter, inverter and independent logic circuitry. There should be no common
controller (either single or redundant) outside the modules
Each hot-swappable power module should have isolated air flow design, such that
the PCB boards and heat-sinks are in two completely different sections, which
5
should allow the UPS to run in dusty environments, significantly improving its
stability and environmental adaptability.
Each UPS frame shall also have an STS Module comprising of a fully rated,
6 continuous duty static bypass switch for high-speed transfers along with RS232
port, USB port, SNMP Slot, Dry contact ports.
The control panel comprising of a Colour graphical LCD DISPLAY, touch screen
based, with LED status indicators for monitoring of all measured parameters, UPS
and battery status and alarms along with facility for displaying the waveform of
7
the output voltage and current, and the bypass voltage. There shall be provision
for Recording/Storing of waveforms of critical elements during fault conditions for
rapid maintenance service diagnosis.
UPS should have inbuilt facility for Life cycle monitoring of critical components like
8 fan, capacitors, battery which helps the UPS to predict the life of these
components.
The UPS shall have inbuilt 35 Amperes Charging Current to adequately charge the
battery bank. The vendor has to supply the necessary battery rack and
interconnecting cables (nyvin fire retardant type). There shall be provision for
9
adding extra rack mounted charger module (3U) of 30 Amperes in order to allow
proper charging of batteries in case extended autonomies are required. Technical
Datasheet verifying this feature should be provided.
BATTERIES: Each 100 KW N+1 KW UPS shall have battery bank comprising of
158,000 VAH using 12V, VRLA Sealed Maintenance Free Batteries for 60
minutes backup time. Offered VRLA SMF batteries should comply with below:
Long Design Float life of at least 10 years
Made of Lead-Calcium-Tin alloy composition for long float service life
Battery should be Manufactured in India (class 1 MII Product with >50% local
10 content)
Made of UL94 V0 class fire retardant container and cover
Operating Temperature Range of 0°C - 45°C
Self-discharge per month <3% of rated capacity at 25°C
ISO 9001, ISO 14001 for manufacturing plant in India
Brochure of Battery indicating above specifications with Make & Model to be
specified
Energy Saver Smart sleep function: System should have capability to intelligently
11 shutdown inactive power modules to increase energy savings and achieve higher
efficiency
Self-Test mode: System can perform a full load test without the connection of a
load bank, processing power in a re-circulating fashion, using its own rectifiers
12
and inverters as an internal load bank, generating significant savings in cost,
time, coordination and power.
Isolation Transformer of 200 KVA should be provided with each UPS for providing
galvanic isolation between input & output. Isolation Transformer should be
13
external to the UPS and placed inside a suitable enclosure with powder coated
paint and provided with cast iron wheels at bottom and hooks for lifting the unit.
14 DETAILED SPECIFICATION SHEET
MODEL RATING (1.0 p.f.) 100 KW N+1 KVA/KW Modular On-
Line UPS
Make & Model To be Specified
ELECTRICAL CHARACTERISTICS INPUT
Rated input voltage 380 V; 400 V; 415 V, 3 Phase
Voltage tolerance 310~475 VAC @100% load
220~475 VAC @50% load
Rated input frequency 50 or 60 Hz, user configurable
Frequency tolerance 40 to 70 Hz
Input power factor, double conversion > 0.99
@100% load
Input current distortion at rated input < 3%, 100% load
current
ELECTRICAL CHARACTERISTICS OUTPUT
Crest factor 3:1
Rated output voltage 380 V; 400 V; 415 V, 3 Phase
Output voltage variation, steady state ± 1% (balanced load); ± 2%
(unbalanced load)
Total voltage harmonic distortion
100% linear load < 1%
100% non-linear load < 5%
Rated output frequency 50 or 60 Hz, configurable
Output frequency variation ± 0.1 Hz
Overload capability 1 hour: 110%, 10 mins: 125%, 1
min:150%
Efficiency in double-conversion, rated ≥95%
linear load
BYPASS
Type of bypass Static
Bypass rating 200 KW
Bypass voltage range 380 V; 400 V; 415 V
BATTERY CHARACTERISTICS
Battery technology 12V, VRLA SMF Batteries
Nominal VAH capacity 158000 VAH for 60 minutes Back-up
Battery start option Yes
COMMUNICATION CIRCUITS
Standard connectivity ports USB/RS-232, BMS/SNMP card
System Display Touch based graphical LCD display
UPS should have Cloud based
Monitoring & Management platform
with necessary hardware and below
features:
UPS monitoring system should
be plug and play easy
installation that allows the user
to manage and monitor the
UPS status remotely via an
ANDROID and iOS mobile
phone application in addition
to browser based platform
SNMP having both Wi-Fi
UPS Remote Monitoring through antenna and RJ45 port with QR
Mobile App Code ID
Clear interface to view instant
status
Real Time alert and notification
After Sales Support & Manufacturer’s UPS OEM should have its
16 registered office in Assam for ≥10
Credibility
years and company owned 8~10
service centres across Assam
with adequate technical
manpower and spares for
ensuring 24 x 7 x 365 support as
per contract SLA. Contact
numbers and addresses to be
provided for support centers
UPS OEM should have ongoing
service & maintenance contracts
for ≥1000 nos. On-Line UPS
Systems to Govt./PSU
organizations in Assam & NE as
proof of having 24 x 7 x 365
service support capabilities and
competency along with their
Client references.
UPS OEM should not have past
history of blacklisting or breach
of contract from any
government/PSU organization.
UPS OEM should have past
experience for supply &
installation of at least 10 units of
≥100 KW Modular UPS System in
any Govt. or PSU Data
Centre/Server Room/Computer
Centre Site
The bidder should submit documentary evidence in support of 100% compliance
to the tender specifications. The bidder should submit the Datasheet and
user/operation manual of the UPS system offered.
The sound level of the DG must be in accordance with the latest CPCB norms
Scope of installation for Diesel Generating Set when offered by the vendor - inclusive in the scope of supply
1 Installation of Power Generator when offered by the vendor is inclusive in the scope of
supply and shall be done by the seller. The installation work of Power Generator and its
constituent parts shall be generally conforming to CPWD General Specification for
Electrical Works, Part - VII - latest.
2 Foundation shall be constructed by the Selected bidder. Foundation shall be of PCC type
with the ratio of 4:2: 1. The length and breadth of the foundation shall be 300 mm more
from the respective length and breadth of the Power Generator. The height of the
foundation shall be 400 mm, i.e., 200 mm below and 200 mm above the ground level.
All the materials / labour required for foundation work shall be supplied by the selected
bidder.
3 Supply, laying and termination of exhaust Pipe Line, interconnecting power and control
cable, changeover switch etc. shall be done by the seller. The cable supplied shall be ISI
marked heavy duty PVC insulated, armoured cable, with PVC outer Sheath of Type ST- 2
(FR Grade, Category Cl), with aluminium conductor having insulation of PVC compound
type -C, suitable for rated voltage up to and including 1100 volts and conforming to IS:
1554 (Part-1) latest. For 3-Phase Power Generators, 3.5 core or higher core (150 sq mm)
cables shall be used. Total length of the cable supplied by the seller may be within 70
meters for each Power Generator with AMF control panel. (4 turns)
4 Construction of suitable earthing station and necessary connections shall be done by the
Selected bidder. All the materials / labour required for construction of earthing station
shall be supplied by the Selected bidder. The total number of earthing pits/stations shall
be 4, i.e., 2 for neutral and 2 for body-earthing. Neutral earthing shall be done with
copper Plate and Body earthing shall be done with G.I. plate / Copper. The consignee
should choose installation site in such a way that the earthing stations can be made
within 10 metres of the Power Generator. Earthing station shall be typically constructed
as per prevalent standard practices and shall be generally conforming to CPWD General
specification for Electrical Works, Part - VII & Part - I - latest.
5.10 Integrated Command and Control Centre(ICCC)
20 2. It should provide complete visibility to the events and real time insight to take
action faster by the workforce.
21 Smart City Software Suite should be in compliance with the Smart City Standards of a
layered architecture and should be able to integrate the various layers to provide a
unified system capability. The Software Suite should at the minimum cover the
following layers.
22 IoT & AI Platform
23 A central IoT & AI Platform for integrating the Sensor Data and Application Data from
the various city-wide urban systems. It should be pre-integrated with various sub
systems like – IoT, Complex Event processing. Big Data, BI and AI Advanced Data
Analytics, API/ESB, BPM, GIS, Security and Logging & Monitoring. Also, it should
support rich pre-integrated tools for Provisioning and Administration, Building
Dashboards and Deploying and Building ML Models and deploying.
24 The Smart City Software Suite should be integrated and support all the core
applications that will enable the Digital Transformation of the city. The Applications
should cover –
25 · Integrated Command and Control Center System for City Operations
26 · Mobile Workforce Management System for integrating the city workforce
through a City Workforce App.
27 · Business Intelligence based real time dashboards for various domains.
28 The Smart City Software Suite should comprise of various client applications for the
stakeholders to use and consume the services. Wide range of personas covering – City
Authorities, City Operator and Managers, City Workforce and Managers across the
various departments, Community should be able to access the system securely
through Web Application, Dashboards, Portals and Mobile Apps.
29 Smart City Platform : The functional specifications provided in the below sections are
critical functionalities to be adhered by the proposed Smart City Platform.
30 Smart City Platform should serve as a City-Wide IoT & AI Platform that can integrate
data from any urban system, detect anomalies and take action in real-time so that the
urban system operations can be remotely managed through a common city command
and control centre.(Urban System – Municipality, Health, Education, Transport,
Utility, Power/Electricity, Disaster mgmt.,Law and order, etc ).
31 It should be a system of systems platform pre-integrated with advanced digital
technologies to collect, process, store and analyse the data. The system of systems
approach supports the sub systems to be pre-integrated to the platform to deliver the
total value of IoT and AI.
32 The Platform should support Microservices and each of the Service components
should be loosely coupled to support scale. The sub systems of Smart City Platform
should be able to provide the services as listed below
33 Data Integration: Should integrate data from sensors and external applications from
the city-wide urban systems
34 Data Processing: Should process the data in real time and create alarms based on data
anomalies and geo-events
35 Data Management & Analytics System: 1.Big Data based Storage System to store the
structured, semi-structured and unstructured data
36 2.Platform should have pre-integrated analytics engine covering BI services to build
and deploy Dashboard for monitoring operational KPIs and gain insights to city civic
services delivery
37 3. Platform should also have a pre-integrated AI engine with Ready to use ML Pipeline
for prediction, recommendation, optimization, forecasting, Natural Language
Processing, and anomaly detection to provide advanced analytics based on AI/ML.
38 Common Enabling System: Platform should be enabled with the following common
services delivery-
39 1. Mobile Enablement – Integrate with mobile applications and enable service
40 2. GIS Integration Engine to work with various Map and Map Services – Custom Map,
ESRI (offline) and Google (online). GIS integration may also be made with indigenous
GIS system (https://stategisportal.nic.in/stategisportal).
41 3. Inbuilt, pre-integrated security system for Device, User and Data Security
42 4. Logging and Monitoring for platform and application services uptime
43 5. BPM Engine to create Dynamic Workflows and Automate SOP execution
44 Out-of-the-Box Tools: The Platform should have built-in tool capabilities to support
easy provisioning and management of the platform, build and deploy -ML models,
configurable dashboards, and reports
45 1. Platform Administration tool- Tool which shall act a central hub for Smart City
platform administration and monitoring
46 2. Machine Learning Composer – Visual programming-based environment for building
Machine Learning Models and deploying the same
47 3. Configurable Dashboard- Enable customer to personalize their dashboards and
deploy faster
48 The Platform should be integrated and work with unified communication and Contact
Center System for Call handling, routing, and recording. Standard APIs should be
available for quick and easy deployment.
62 Data Normalization : The Platform shall automate the steps required to analyse data
from IoT devices. It should transform and enrich IoT data before using it for real-time
analytics and time-series data storage for analysis.
71 API Gateway: The platform should enable decentralized API management policies
72 Key Manager: The platform should authenticate and authorize API requests from any
client or device types that requests the resource servers which are operating on
traditional and microservice architectures.
73 API Portal: The API portal shall be the repository of standard APIs for consumption by
any third-party applications/ sub-systems
74 Normalized APIs should be available to carry out integration with other
platforms/applications
75 Enables City and/or its partners to write software adaptors based on the API(s)
provided by device vendors and have the ability to control, monitor and collect the
data from these street devices
76 Services and Protocol Support: API Management System should possess integrated
ESB solution capable of ensuring pluggable approach to Smart City Application
77 Route, Mediate and Transform Data: API Management System should possess
following routing capabilities such as header based, content based, rule-based and
priority-based routing
78 API Management System should possess mediation capability to support
all Enterprise Integration Patterns (EIPs), database integration, event publishing,
logging & auditing and validation
79 API Management System should possess payload transformation capability to support
XSLT 1.0/2.0, XPath, XQuery and Smooks
80 API & Interface Security: API Management System should support security standards:
OAuth 2.0, HTTPS over SSL, and key management help protect the data across all
domains.
81 API Management System should support security features built for many of its
components by using HTTPS, TLS for all its public facing API implementations. For
deployment where CCC Software API(s) exposed to application eco system, API
Management, API security features and API Key management functions are required.
82 Control Access and Enforce Security : API Management System should be capable of
configured Single Sign-On (SSO) using SAML 2.0 for easy integration with existing web
apps
83 ESB System: The ESB System shall be highly available (Active / Active, Failover, Load
Balancing, etc.)
84 The ESB System shall support common publish-subscribe architecture
85 The ESB System shall be capable of vertically and horizontally scalable
86 The ESB System shall support synchronous and asynchronous transactions
87 The ESB System shall support service orchestration, business process management,
and complex event processing
88 The ESB System shall provide common management capabilities (monitoring,
auditing, and logging.)
89 The ESB System shall support general use of XML as the messaging language
90 The ESB System must enable the management and control of APIs exposed to third
parties by identifying authorized access, time of access, SLA and number of allowed
requests etc.
91 The ESB System must support real-time monitoring and management of APIs at
runtime
92 The ESB System must enable appropriate and authorized users to easily create and
edit new workflow processes through a graphical user interface that will specify the
steps of the workflow, business rules around each step, authorized users, and control
points that require manual authorization
93 The ESB System design shall incorporate a multi-bus approach supporting micro-
services architecture and differentiation between internal and external integrations
94 The ESB System shall be Service Oriented Architecture (SOA) capable and support SOA
standards.
95 Data Processing sub-system - Complex Event Processing System
96 The Smart City digital platform should be pre-integrated with Complex Event Processing
System with BPM enabling the configuration of the Policy, alarm management and
execution of SOPs. The system shall provide extensive capabilities in detecting
anomalies and also correlating anomalies across various city domains.
97 The Complex Event Processing sub-system shall allow the city to create complex
analytics on sensor data with Adaptive Intelligence
98 The Complex Event Processing sub-system shall have a drag and drop functionality
using which rules can be applied to a single stream of data or multiple streams from
interconnected sensor systems.
99 The Complex Event Processing sub-system shall process and integrate millions of events
per second in real time with <10ms latency.
100 The Complex Event Processing sub-system shall support streaming and complex event
processing types such as filters, streaming aggregations, patterns, non-occurrence,
anomaly detection, Aggregative Functions (window based, or Start Based, Group
based), Joins (works with Windows) Pattern, Sequence, Geo Spatial and etc.
131 The Big Data System should be designed to avoid storing and processing of duplicate
data
132 The Big Data System should support System Integration (E.g., Web services) and Data
integration (E.g., ETL / ELT) functionality out of the box with capabilities for data
transfer to Big Data Platform to support Analytics Use cases with different latencies.
133 The Big Data System should be capable of using connections to perform all the tasks
and to implement the following Integration Services features:
134 The Big Data System should have connection with source and destination data stores
such as text, XML, Excel workbooks, relational databases and bigdata to extract and
load data
135 The Big Data System should have connection with relational databases that contain
reference data to perform exact or fuzzy lookups
136 The Big Data System should have connection with relational databases to run stored
procedures and SQL commands such as SELECT, DELETE, and INSERT
137 The Big Data System should have connection with SQL Server to perform maintenance
and transfer tasks such as database backup and login transfer
138 The Big Data System should have connection with Analysis Services projects and
databases to access data mining models, process cubes & dimensions and to run DDL
code
139 The Big Data System shall specify existing or create new files and folders to use with
Foreach Loop enumerators and tasks
140 The Big Data System should have connection with message queues, windows
management instrumentation (WMI), SQL Server Management Objects (SMO), Web,
and mail servers.
141 The Big Data System must provide the ability to make OLAP and OLTP transactions in
the same time
142 The Big Data System must support both Column-based and Row-based in-memory
data structure
143 The Big Data System should have Schema flexibility and ability to add columns on real
time
144 The Big Data System should have security mechanism for metadata access by enabling
controls on access to entity instances and operations like add/update/remove
classifications
145 The Big Data System should be Integrated with centralized RBAC store to enable
authorization/data-masking on data access based on classifications associated with
entities. The authorized access would be classified as Personally identifiable
information (PII) and SENSITIVE
146 Data as Service Server should be capable of enabling API access to the Sensor/ Event
data through Interactive querying. It shall also have pluggable approach that would
allow the system to extend the API requirement using the standards
147 The Integrated data access system should have APIs including Real Time Data, Latest
data, Time series data and Search data
148 It should aggregate time-series data from sensor/device-based system and event
series data through ETL process to get insights of operational view and KPIs.
149 The stored data shall be leveraged using Machine Learning and Analytics engine to
enable Real time interactive querying, enable intelligence by KPI based reports and
Analytics.
150 Data Analytics sub-system
151 The Smart City digital platform OEM should be pre-integrated with analytics engine to
enable necessary insights and analytics.
152 The Analytics sub-system should be an AI-based smart city analytics platform module
to maximize business value through advanced machine learning capabilities. The
machine learning capabilities aid in automating policies that result in better asset and
infrastructure management.
154 The Platform shall be integrated with analytics engine, and which shall support
following capability.
155 The Analytics sub-system should support multiple Data Sources. Min below standard
data sources should be supported from day 1 – CSV, TSV, MS Excel, NoSQL, RDBMS
156 The Analytics sub-system should be able to discover, compare, and correlate data
across heterogeneous data sources to unravel the patterns that are previously hidden.
At a broader level system shall support following tasks:
165 The Analytics sub-system should provide capabilities to create KPIs to measure progress
and performance over time and graphically communicate strategy & strategic dynamics
using Strategy maps, Cause and Effect diagrams, and Custom views. Intuitive and dense
visualizations must be available.
166 The Analytics sub-system should help simulate what if scenarios. It should help visualize
assets/resources at risk due to the pending/ongoing incident, should render impacted
region on a GIS/3D map. The solution should help build the list of assets, their
properties, location and their interdependence through an easy-to-use Graphical User
Interface. Solution should highlight not only the primary asset impacted but also
highlight the linked assets which will be impacted.
167 The subsystem should be capable of providing time-shifted or offline analytics on the
archived data.
168 It should provide capabilities for the analysis to run autonomously, refreshing data and
re-analyse the situation continuously across a complex set of variables.
169 Analytics Engine Visualizations
170 Analytics sub-system should provide visualizations dashboard.
171 In the visualization workspace, it should allow to change visual attributes of a graph.
172 User should not be allowed to alter the graph/visualization definition.
173 In the visualization workspace, user should be able to do the following operations:
174 - Change the graph/visualization type
175 - Print the graph
176 - Export the graph
177 - Narrow down on the value ranges
178 - Toggle the axis labels
179 - Integrate with other 3rd party applications seamlessly
180 Sentiment Analytics
181 The Analytics sub-system shall have the capability to provide sentiment analytics of
configured key words/accounts through internet crawling through the platform.
Ability to categorize key issues/topics/words in real time on social media platform
(Twitter, Facebook, Website Discussion Forums, News Papers) which are contributing
to negative/positive perception among citizens.
182 Business Intelligence
183 The BI subsystem should be capable of providing vertical specific models and report
repository.
184 It should support tabular models at all compatibility levels, multidimensional models,
and data mining service.
185 It should be built considering scale from ground up and should have single source of
analytical data to ensure discrepancies at minimum.
186 The Analytics sub-system shall be capable of carrying out business intelligence as well
as real time analytics for city systems where it shall develop insight into possible future
conditions or events. Analytics shall measure the efficacy of services delivered and help
operators and city personnel to test scenarios.
187 The Analytics sub-system shall make use of cross-system data analytics from historian
and real-time information received from independent systems through smart city
platform to aid in the operations and management of city services.
188 The system shall have ability to synthesize, analyse and integrate data from all City
systems and should provide analytical insights to city integrated operation Centre for
running real time sensors and to decision makers for policy making and optimizing
decisions.
189 Platform should provide a user friendly; web based, drag and drop interface for data
processing
190 Platform should be capable of summarizing and presenting the data using a variety of
highly customizable charts
191 Platform should be capable of displaying and tracking of metrics with the support visual
features like Metric Dials and Graphs etc.
192 Platform should be scalable to incorporate any additional functional requirements (Low
Code Tools-like IOTops, ML Composer, Configurable Dashboard)and analysis
capabilities.
193 Platform should be capable of displaying the dashboards on third-party
tools/applications
194 Platform shall allow generation of dashboard using ad-hoc queries by the user
195 The reporting solution should be web-enabled
196 Platform should enable different types of users to conduct effective explorations on all
available data without the need of subset, sample, and multiple views of data with
minimal training for users
197 Platform should have self service capability in importing and integrating local
text/csv/xls files with the data warehouse and be able to generate reports
198 Platform should assist the user with explanation on forecast results by providing “What
does it mean” capabilities
199 Platform should provide geographical map views to provide a quick understanding of
geospatial data
200 Platform should provide capabilities to subset data independently without any
technology intervention
201 Platform should allow ad-hoc hierarchy creations for traversing till intricate information
to execute root cause analysis
202 Platform should provide the capability to export data in Excel and CSV/TSV document
formats
203 Platform should provide the ability for user to view interactive reports using iOS &
Android devices using a native application. It should provide rich user experience with
capabilities such as gesture control, zoom and swipe etc.
204 Platform should provide the capability to the user to save and share the analysis as
exploration, report, or PDF
205 Platform should directly extract information from transactional systems without
depending on data warehouse or data marts
206 Platform should be capable of scheduling data updates and report refresh
207 Platform shall have capability to generate MIS reports
208 Platform should enable the user with an interface to design reports and dashboards
with automatic refresh capability on changes in underlying data
209 Platform should allow the user to drill down the reports to the granular level of details
210 Platform should be able to populate/ filter output with interactive filtering of reports
from existing selection
211 Platform should be capable of passing parameters among reports to retrieve details
and investigate specific entity
212 Platform should enable the user to execute pre-defined procedures using the interface
to visualize reports
213 Platform should support configurable report generation based on ad-hoc querying
across multiple fields of entity-wise information
214 AI Data Pre-Processing
215 Platform should enable machine learning with big data, providing the ability to obtain
valuable insight from large amounts of structured, unstructured and fast-moving data
216 Platform should enable organization and labelling of data by the intelligent methods of
alignment and indexing
217 Platform should be capable of handling missing data
218 Platform should support data cleaning operations.
219 ML Libraries Notebook
220 Platform should be capable of native support for asynchronous execution of collective
operations and peer-to-peer communication
221 Platform should allow user to export models in the standard file formats( Pickle, H5,
ONNX)
222 Platform should enable fast, flexible experimentation and efficient production through
a hybrid front-end, distributed training and ecosystem of tools & libraries
223 Platform should have a web-based notebook that would enable data-driven, interactive
data analytics and collaborative documents
224 The notebook should possess a console-based approach to interactive computing,
providing a web-based application suitable for capturing the whole computation
process: developing, documenting, and executing code and communicating the results.
253 To maintain the integrity of the system, the Platform shall allow the user to selectively
revoke access rights for specific devices as needed.
254 To ensure the flexibility for the device vendor, the platform should allow the user to
create Authentication and Authorization policies based on device profile level, it shall
also support the below policies:
269 Data Protection / Production Data integrity: The Platform should support procedure in
place to ensure production data shall not be replicated or used in non-production
environment
270 Data Protection / Data at rest: The Platform should support encryption for tenant data
at rest (on disk/storage)
271 Data Retention: The Platform should support capabilities to enforce tenant data
retention policies
272 Data recover & restore: The Platform should support capability to recover and restore
data in case of a failure or data loss.
273 Data disclosure & privacy: The Platform should disclose data attributes, elements
collected from source. All the attributes should be disclosed & appraised to data owner.
With appropriate approval from City authority, Platform should have ability to encrypt
sensitive data element at rest.
283 Monitoring - all the data access from the application shall be logged and monitored
284 Centralized Logging & Monitoring Platform
285 The Platform shall consist of a centralized logging and Monitoring platform which
integrates with all part of platform services for Audit and performance monitoring.
286 The Centralized Logging and Monitoring sub-system should be integrated with all smart
city application and the IoT platform to give the user an operational view
287 The system should be able monitor the application/platform infrastructure for
performance with time series view of:
288 - Up time
289 - CPU Utilization
290 - Network Utilization (Bytes received per second, Bytes sent per second, Packet
drops and Timed out connection)
291 - User connection count
292 - Disk connection count
293 - Process Count
294 - Total threshold count
295 Platform should keep track of sensor last seen date and time and be able to detect
disconnected sensors & raise alarms
296 The Platform shall allow time shifted analytics with the log data.
297 The user should be enabled to control all the platform service from a single system, the
control operation includes
298 1. Service Restart
299 2. Update Configuration
300 The system should allow user to get detailed SLA monitoring along with SLA report
301 Out of the Box Support for Tools: The Smart City Platform should support pre-
integrated Tools for Provisioning and Administration, Composing and Building ML
models and support Configuration of dashboards.
302 Provisioning & Service Management
303 The Smart City digital platform OEM shall provide solution for enabling end to end
Platform Administration which includes Asset Management, Rule Configuration &
Workflow Management.
304 The solution shall have a view of all the sensors connected to the platform with their
health status for real time monitoring.
305 The solution shall support secure device onboarding process with bulk uploading
options.
306 The solution shall be capable of sensor health abnormality detection and automated
workflow execution with integrated workforce app.
307 The solution should provide icon-based user interface on the GIS map to report non-
functional assets.
308 The solution should also provide a single tabular view to list all assets along with their
availability status in real time.
309 Machine Learning Builder
310 ML Composer should provide an environment to build machine learning models
through low-code/no-code visual toolkit for developing, deploying, and operating
enterprise AI ML driven applications.
311 The system also supports traditional ML models, time series forecasting, and deep
learning.
312 There shall be a tool for the city administrators to create analytics / predict outcomes,
when necessary, the tool provided shall allow the user to develop models for analytics
using the necessary data available to the user.
313 The Machine Learning Tool should have an easy-to-use, visual interface that gives users
the access to data exploration.
314 The Machine Learning Tool shall support data input from multiple data Sources for data
accumulation.
315 The Machine Learning Tool supports ready to use ML Pipeline for prediction,
recommendation, optimization, forecasting, Natural Language Processing, Anomaly
detection.
316 The Machine Learning Tool should support users to choose from multiple Machine
Learning Model types like (Not limited to:)
317 1. Auto ML: Users can select this option and the system automatically selects the
Algorithm based on best accuracy
318 2. Manual ML: Users can select Algorithms manually and provide parameters based on
the selected Algorithm
319 3. Geo ML: Users can select ML Algorithms especially built for Geospatial Data.
320 Users can Export files in multiple data formats (CSV, PDF, Excel etc.)
321 The Machine Learning Tool shall allow the users to load disparate data sources and join,
filter, and wrangle data, all without having to write queries.
322 Configurable Dashboard
323 Configurable Dashboard should help in reducing the customization time for building
the dashboard.
324 Configurable Dashboard should provide a single web interface for configuring the
data source to visualize the data using various visuals available
325 Application should allow to connect various data sources for fetching the data. The
Configurable Dashboard shall provide the user to connect with any data source
provided in the application for fetching the data and later can be configured in the
widgets Standard Dashboard templates should be available for various Smart City
Domains- Surveillance, Traffic, Environment, Parking, Waste Management, Energy,
Buildings
326 The application should provide GIS based visuals for geospatial analysis.
327 The application should allow user to configure the basic settings, colour theme, etc.
which need to get updated throughout all the widgets built
328 The application will allow user to create widgets which can be used for building the
dashboard. Once the widget configuration is done, the same widget can be used in
multiple dashboards without the need to create multiple times
329 The user should be able to fetch the data from the saved data source and configure
the dataset for the selected widget.
330 The user should be able to view the configured widgets which user can bring a
common place and create the layout as per the need.
331 The user should be able to save the dashboard and can get shareable link which can
be used to embed the dashboard in any application
332 The user should be able to create a KPI defined on top the connected data source. If
the KPI has been met, a pre-defined process should be executed.
333 The Smart City Software Suite should support pre-integrated applications software
that enable the digital transformation of cities. The applications should be fully
integrated with the City Platform and can be modularly deployed in a phased manner.
334 Command & Control Centre: Integrated Command & Control Center System to build a
unified city operations centre for Major Incidents and Events.
335 Advanced Analytics covering Business Intelligence (BI) and AI/ML.: Advanced Analytics
Applications to derive intelligence and drive efficiencies in operations of the various
in-line departments. Standard BI Dashboard templates for various smart city
domains.
336 Mobile Workforce Management System to unify the city workforce across
departments through a common App: Mobile Workforce Management System to
unify the city workforce across departments through a common Workforce app and
empower them with real-time intelligence and mobility
337 Smart City Solutions. Optionally it should be possible to extend the Smart City
Platform services and build various in-line department specific solutions for use the by
the various departments. The various applications can cover.
338 Solid Waste Management System for garbage collection and disposal.
339 Parking Management System for booking and availing parking services.
340 Intelligent Transport System for public transit and passenger information.
341 Intelligent Street Light System for optimising the use of the Street Lights
342 Command-and-Control Centre
343 The Command-and-Control Centre should be pre-integrated with the platform and
shall act as the central hub for integration of the various systems and form the
foundation for the city administrator to manage the city operations.
The Integrated Command and Control Center Software should support Incident
Management and provide a 360-degree situational awareness of the city operations
with real-time KPI based operational dashboard.
344 Incident Management - General Capabilities.
Incidents are verified and converted from alerts (Like Camera based Alerts, Bin Fill Alert,
Environmental alerts etc) generated by various sensors/systems. The each type of
alarms are configured based on the rules defined. This will consider during detailed
engineering and design phase.
345 The application should:
346 help the city operators to run the city efficiently by integrating all the alarms and
provides an easy-to-use GUI interface (web & client server)
347 help manage: alarms, map-based visualization of the city assets and events, execute
SOPs and coordinate the operations;
348 provide 360-degree situational awareness and insights across urban functions to city
administrators.
349 SOP Execution:
350 Based on the incident type, system shall open the activities that need to be carried out
for the incident. The SOP shall provide the actions like notification, correlate, dispatch,
and close incident. This activity should be defined in the administrator system for each
type of incident. This activity will be either manual or automated. SOP’s will be
configured based on the concerned department’s usage through administrative module
as well as will consider during design and detailed engineering phase.
351 It should be integrated with a real-time KPI dashboard that will provide 360-degree
situational awareness of the various urban system operations and efficiency.
352 The alarm management module should:
353 enable the City Operations Center (CoC) to service all alarms generated automatically
by the city digital platform for operators to visualize the alarms, create incidents and
dispatch city workforce for action.
354 Provide the details about each alarm received from the various sub-systems
integrated.
355 provide the operator details regarding the source of the alarm, type of alarm,
generated time, priority, and elapsed time to take appropriate action.
356 provide advanced map & video visualization for situation awareness.
357 provide an easy use GUI that is simple to operate.
358 operator to view various types of alerts in a single place and validate the alerts for
further processing.
359 GIS Visualization
360 The application shall provide map-based visualization for all the details of the alarms
and enable the operator in decision making.
361 Application enables visualization of all the assets (camera, access control, lighting) on
the GIS map as a layer.
362 Unique identification (icon /symbol) should be provided for each of the asset types.
363 The application shall allow health status (functional /non-functional) of assets to be
identified using colour code.
364 All field resources (vehicles /field workforce) should be location enabled and mapped
to the GIS with unique identification (icon /symbol).
365 Each of the asset shall be created as a layer on the map and can be turned ON /OFF by
the operator depending upon the alarm type and incident use case.
366 The application shall enable operator to search assets based on the type and
jurisdiction and enables operator to object based interactive building floor plan,
parking lot layouts, bus inside, etc.
S.No Parameter Application Use Cases Dashboard Use Cases Compliance Remarks
(Yes / No)
1 ITMS (Intelligent Traffic Asset Synchronization Live view of traffic density
Management System - based on area and status
RLVD, ANPR, Geo Visualization violation (Traffic)
SVD,NHDS,TRDS,DOP,NSB) Automated Number Plate Recognition Live view of traffic density
(ANPR) Alert by location
Red Light Violation Detection (RLVD) Alert Alarm trend
Speed Violation Detection (SVD) Alert Hourly/average and traffic
speed
Unauthorized vehicle movement Type of violation based on
categories
Vehicle without valid permit Type of violation based on
alarm status
Vehicle without/expired insurance
Stolen vehicle as well as report vehicles by
police department
Vehicles without valid PUC certificate
2 Adaptive Traffic Control Synchronization & Geo Visualization of Total ATCS controllers
System (ATCS) Traffic Signals
Real time monitoring of traffic Signals Active ATCS controllers
Blinker mode activate and deactivate Inactive ATCS controllers
functionality
Signals running status (Auto/Manual) Energy consumption per
day
Traffic Signals health status (On/Off) as well Percentage change
alert (previous 24h)"
Congestion Alert (Over Saturated & Under Grievance statistics
Saturation)
Controller Fault Alert Highest traffic density
location
Blinker Mode Alert Average traffic density in
24h
4D Radar failure alert Realtime view of traffic
sensors
Hurry Call/Green corridor SOP Total Signals
Adaptive camera will provide the real time ATCS Health Status
Vehicle count
3 City Surveillance System Synchronization & Geo Visualization of Live view of all the
(VMS & VA) surveillance Camera's cameras within the city
City Surveillance Camera live feed for Total, Active, Inactive
situational awareness Camera's
Detection/Recognize the pattern of Region wise Alarm Type
Demonstration & Conflicts in Crowd
Detection of loitering person Top 10 Crime Region
Speeding Vehicle
Accident Detection
Person Climbing Barricade
Person Collapsing
Vehicle of Interest tracking by speed, colour,
and number plate
No Helmet Detection
Unwanted/
Banned vehicle detection
4 Environmental Sensor Synchronization & Geo Visualization of Synchronization & Geo
Environment sensor locations Visualization of
Environment sensor
locations
Environment sensor health alert status · Total Environmental
(On/Off) sensors
· Active environmental
sensors
· Inactive
environmental sensors
AQI alert through Environment sensor: · Air quality trend
based for 24hr based on
time and date
1. Air Quality alerts will be generated based · Real time air quality
on standard threshold limits for CO, NO2, index
SO2,O3,CO2,PM2.5,PM10 like Good, Normal,
Satisfactory, Moderately polluted, poor, very
poor & Severe
8 GIS ICCC Should integrate with the GIS MAP and Asset visualization on the
support the MAP based visualization MAP Screen
ICCC Should support marking of the event on
the MAP Screen
Should Support Integration with future Applications. Dashboard Use Cases
9 Intelligent Transport Real-time fleet tracking and Management Vehicle Dashboard
System MAP Based visualization of the vehicle list, View the map with the
route list, Bus stop List, point of interests, live spot
for buses, Bus stops.
View a list of vehicles on routes for ETA Visualize the count of
citizen grievances
Vehicle Scheduling - Time Table Visualize the Fleet
statistics
View the Device Alerts, Citizen Complaints
10 Solid Waste Management MAP based visualization of the assets like Visualize total Vehicles
System, Vehicle Type, Bin Type, Vehicle Status, Citizen
Grievance, Cameras
view the tracking details of the vehicle such Visualize total Bins
as Vehicle Number, Vehicle Type, Position,
Speed, Location, Time on the map.
Scalability – The system should be capable of supporting at least 15 thousand network flow
9
per second on single server with capability to capture each unique traffic conversations
The solution shall provide future scalability of the whole system without major architectural
10
changes.
The Solution shall be distributed, scalable, and multi-platform and open to third party
11 integration such as Cloud, Virtualization, Database, Web Server, Application Server platforms
etc.
The monitoring module of proposed solution must not use any third party database (including
12 RDBMS and open source) to store data in order to provide full flexibility and control on
collected data as well as avoiding tempering with SLA calculations
All the required modules should be from same OEM and should be tightly integrated for
13
single pane of glass view of enterprise monitoring
The OEM of the proposed EMS solution should be a "Make In India" company with 100% local
14
content.
The OEM of the proposed EMS solution should have presence of min. 10 years in the market
15 and the solution should be deployed in min. 5 smart city projects in India. The documentary
proof should be submitted at time of the bid submission.
The solution and it's data store should be virtual appliance and deployable on Linux operating
16
systems to reduce the overall TCO.
DETAILED SPECIFICATIONS: EMS
Consolidated Dashboard
1 The platform must provide complete cross-domain visibility of IT infrastructure issues
The platform must consolidate monitoring events from across layers such as Network, Server,
2
Application, Database etc
The solution should support single console for automated discovery of enterprise network
3
components e.g. network device, servers, virtualization, cloud, application and databases
The solution must support custom dashboards for different role users such as Management,
4
admin and report users
The solution must allow creating custom data widget to visualize data with user preferences
5
eg. Refresh time, time span, background colour, unit conversion
The solution must support custom query based widget with multiple visualization methods
6 including Chart, Guage, Grid, Top N list etc. to visualize and represent collected data with
ease.
The solution must provide compehensive query language to pull and plot complex
7
visualization with multiple arithmatic operator such as top, sum, min, max etc.
The solution must support out of the box data widgets for Metric, Log and network flow data
8
with multiple visualization methods such as gauge, grid, charts, Top N etc.
The solution should provide superior view of infrastructure health across system, networks,
9
application and other IT Infrastructure components into a consolidated, central console
The solution must support custom device template to support Generic SNMP devices as well
2
as exptensive support on traffic encryption including SNMP v3 with AES-256 encryption
The NMS should provide very powerful event correlation platform/engine and thus must
filter, correlate & process, the events that are created daily from network devices. It should
3 assist in root cause determination and help prevent flooding of non-relevant console
messages.
It shall provide Real time network monitoring and Measurement offend-to-end Network
4
performance & availability to define service levels and further improve upon them.
The Network performance operator console should provide operators with seamless
transitions from fault data to performance data. For example - select a NMS fault event and
5
fault drill down must also provide historical, near real time and correlated data without
switching the page
The solution should have the ability to do "baseline" performance metrics and determine
normal operating values and patterns by self-learning algorithms on a day, week, month, etc.
6
and ability to configure threshold on these values. The solution should also have built in
algorithms to start the monitoring with zero threshold configurations
The proposed system should be able to auto-calculate resource utilization baselines for the
7 entire managed systems and networks and allow user choose algorithms that is more
relevant to specific KPI in case of false positive
The agents should be extensible and customizable allowing incorporation of any required
monitoring source not included in the out-of-the-box monitoring policies. With capabilities to
8
collect and analyze performance data from the operating system and installed applications
and use historical patterns to establish performance baselines.
All baseline thresholds should have lower bound, higher bound, polarity, deviation set point
9
and reset point for ease of use.
System should have anomalies detection, outlier detection and stop alarm flooding with
10
these dynamic thresholds.
The solution should be capable of performing prediction- based anomaly detection to identify
11 unusual or unexpected events and measurements within the monitored environment.
The Solution should provide AI and ML capabilities to help in preventing of Network problems
before they occur The Solution should include unsupervised learning module to gather
12 realtime network data and which learns the behavior of devices, applications, and users on
the network It should be capable to bring together and correlate network and application
data to predict anomaly and performance issues
The solution must provide agentless and agent based method for managing the nodes and
have the capability of storing events / data locally if communication to the management
13
server is not possible due to some problem. This capability will help to avoid losing critical
events.
The NMS admin consol must provide the ability to start, stop and restart the agent on target
14 server infrastructure and the agent should provide collection capabilities not limited to just
KPIs but also support collecting raw logs as well as packets.
The proposed EMS solution must provide agentless as well as agent based monitoring for
15 server infrastructure. The agents should be able to set polling interval as low as 1 second with
low overhead on target server infrastructure.
16 The proposed solution should include a distributed search engine data-store to ingest
various types of textual, numerical, geospatial, structured and unstructured data.
The NMS admin console must provide operators with seamless automation to extract fields
17 from collected logs via drag and drop functionality to avoid log parsing complexity of
collected logs from various syslog/ windows/ application sources.
It shall provide Real time network monitoring and Measurement offend-to-end Network
18
performance & availability to define service levels and further improve upon them.
The EMS solution shall keep historical rate and protocol data for a minimum of 30 days (most
recent) in its short term operating database. All data in that database shall have a maximum
19
1- minute window granularity. User shall be able to select any 1-minute window over the last
30 days and display unique utilization and protocol data for every monitored interface
The proposed solution should be able to take back up of running and startup configuration of
20
network devices. It should also provide versioning for backup to track changes.
Fault Management
The proposed solution must should provide out of the box root cause analysis with multiple
root cause algorithms inbuilt for root cause analysis. It should also have a strong event
1
correlation engine which can correlate the events on the basis of event pairing, event
sequencing etc.
The Platform must include an event correlation automatically fed with events originating
from managed elements, monitoring tools or data sources external to the platform. This
2
correlation must perform event filtering, event suppression, event aggregation and event
annotation
The proposed solution should provide alert console with alert summary such as no. of
3 correlated alert, network alert, server alert, virtualization alert, cloud alert, applcation alert
etc.
The system must have provistion to overlay alert on reported metric to understand alert
4
triggering behaviour across mutiple drill down pages
The proposed solution should have drill-down and correlation page to correlate cross domain
5
historical data points and result should be exported as image and tabular format.
The proposed solution should provide out of the box root cause analysis with multiple root
6 cause algorithms inbuilt for root cause analysis. It should also have a strong event correlation
engine which can correlate the events on the basis of event pairing, event sequencing etc.
Powerful correlation capabilities to reduce number of actionable events. Topology based and
7
event stream based correlation should be made available.
The solution must offer relevant remedy tools, graphs in context of a selected fault
8
alarm/event
The proposed monitoring solution should have capability to configure actions based rules for
9
set of pre-defined alarms/alerts enabling automation of set tasks.
The Platform must support Event or Alarm Correlation integrations with service desk to
10
trigger automated creation of incidents, problems management
The solution should classify events based on business impact and also allow defining custom
11
severity levels and priority metrics such as Ok, Critical, Major, Down, Info etc with color codes
12 The solution should allow creation of correlation or analytics rules for administrators
The proposed solution must provide default event dashboard to identify, accept and assign
13
generated alarms
Log Management
The proposed solution must provide a common classification of event irrespective of the log
1
format
The proposed solution must provide the ability to store/ retain both normalized and the
original raw format of the event log as for forensic purposes for the period of 3 months and
2
allow to extend it to further with additional hardware without any disruption to the ongoing
data collection
The proposed solution should provide a minimum log compression of 8:1 for ensuring log
3
compression to reduce overall log index storage space for the raw log format
The log data generated should be stored in a centralized server. The period upto which the
4
data must be available should be customizable.
The proposed solution must support logs collected from commercial and proprietary
5 applications. For assets not natively supported, the solution should provide the collection of
events through customization of connectors or similar integration
The proposed solution must support log collection for Directories (i.e. AD, LDAP), hosted
6
applications such as database, web server, file integrity logs etc. using agents
The Log receiver or log collection component must store the data locally if communication
7
with centralized collector/receiver is unavailable.
The proposed solution must support log collection from Network infrastructure (i.e. switches,
8
routers, etc.). Please describe the level of support for this type of product.
The system shall support the following log formats for log collection: Windows Event Log,
9 Syslog, Access Log Data, Application Log data, Any Custom Log data, Text Log (flat file), JSON
Data
The collection devices should support collection of logs through Syslog,
10 syslogNG and also provide native Windows Agents as well as Agentless(PowerShell)
connectors
11 The proposed solution must provide alerting based upon established policy
The proposed solution must provide SDK and Rest API to write custom connectors and
12
collectors to pull log and monitoring data from third party system
The proposed solution must provide UI based wizard and capabilities to minimize false
13
positives and deliver accurate results.
The proposed solution must collect, index the log messages and support full-text searching
14
for forensic investigation
The proposed solution must support the ability to take action upon receiving an alert. For
15
example, the solution should support the ability to initiate a script or send an email message.
16 The solution must provide pre-defined log correlation rules to detect suspicious behavior
The solution must support real-time and scheduled alerting time-line while creating a log
17
policy to catch specific log pattern
The solution should support applying regex pattern in real-time to extract vendor specific log
18
data for reporting and alerting purpose
The system shall have the capability to drag and drop building of custom search queries &
19
reports
The system shall be capable of operating at a sustained 5000 EPS per collection instance. The
20 system shall provide the ability to scale to higher event rates by adding multiple collection
instance
Network Flow-based Traffic Analysis
The proposed traffic monitoring system must be able to track all network flow (including
1 netflow v1-v9, Jflow, Sflow and IPFix) of traffic on the network and identify malicious
behavior with all IP conversations.
The proposed system must provide details of applications, hosts, and conversations
2
consuming WAN bandwidth to isolate and resolve problems.
The proposed system must provide baseline network flow policy to detect anomaly in traffic
3
usage behaviour
The solution must provide flow data expolrer with capability to analyze extacted data using
4 multiple columns , chart type, group by operators and filters. System must also provide
dashboard to flow data explorer drill down capability.
The proposed solution must be able to monitor and report on a variety of unique protocols
5 (used in the overall deployed solutions) per day and display utilization data for each protocol
individually. This capability must be available for each monitored interface uniquely.
The proposed solution must keep historical rate and ip to ip, ip to protocol, protocol to
protocol conversation data for a minimum of 3 months (most recent) in its current long term
6
operating database. All data in that database must have a maximum 15 minute window
granularity.
The proposed solution should include a distributed search engine data-store to ingest
7
various types of textual, numerical, geospatial, structured and unstructured data.
Should support use of policies that can detect violations based on blacklist/whitelist
8
matches.
The proposed solution must keep historical rate and protocol data for a minimum of 60 days
9 (most recent) in its short term operating database. All data in that database must have a
maximum 1 minute window granularity with option change retention period
The system must support the ability to create reports that allow the user to search all IP
traffic over a specified historical period, for a variety of conditions.
10
o Search for any traffic using a specific configurable destination port, or port range.
o Search for any protocol in use by a specific host, interface or list of hosts or interfaces.
The proposed solution should allow administrator to define ticket dispatcher workflow which
automatically assign incoming tickets based on rules defined in workflow. E.g. Network fault
9 keyword tickets gets assigned to network technician automatically within NOC team
The proposed helpdesk system shall provide grouping access on different security knowledge
10 articles for different group of users.
The proposed helpdesk system shall have an updateable knowledge base for technical
11 analysis and further help end-users to search solutions for previously solved issues
The proposed solution should allow Technician to relate Incidents to Problem, Change and
12 vice versa to have better context while working on any of ticket type
The proposed helpdesk system shall support tracking of SLA (service level agreements) for call
13 requests within the help desk through service types.
The proposed helpdesk system shall integrate tightly with the Knowledge tools and CMDB
14 and shall be accessible from the same login window
The proposed helpdesk solution should be equipped with chatbot functionality for identifying
the intent of the query and provide an accurate answer and suggest options to confirm or
15 resolve the issue.
The chatbot should have NLP functions (Natural Language Processing) to analyze the context
16 of the query.
Proposed solution should not be dependent on any third party NLP algorithm. It should be
17 inbuilt in the product.
18 Proposed helpdesk should have support of inbuilt conversational AI.
19 Proposed helpdesk should support custom theme option including color scheme of GUI, Fonts
and custom logo placement.
Asset Inventory Management
A configuration management database shall be established which stores unique information
1 about each type Configuration Item CI or group of CI.
The proposed solution allow scheduling periodic report to check current software and
2 hardware inventory
3 The proposed solution must allow attaching CI record to generated service tickets
The Proposed solution should provide end to end Asset Life Cycle Management: Makes it
easier to handle the complete life cycle of an asset, that is, all stages/modules from
4 procurement to disposal
The Proposed solution should support maintaining AMC/Warranty Information with Alerting
5 when about to expire also provide Asset Deletion capabilities enabled with workflow engine
The Proposed solution should support Software License Metering: Helps to understand the
software license compliance and the use of unauthorized software in the organization and
6 helps to act proactively to curb illegal usage and problems associated with it.
The proposed solution should provide Asset Dashboards/Reporting: Graphical representation
all the assets based on Category, location, aging of the asset, customer, which can be further
7 level down to the incident record ID
The proposed solution should provide out of the box purchase and contract management
8 modules to support end to end asset life cycle
9 The proposed solution must provide asset baselining to manage and track asset effectively.
Project Management
A project management tool should have a clean, intuitive, and user-friendly interface that
1 allows users to easily navigate the software and access the features they need.
The tool should allow for easy creation and management of project plans, including tasks,
timelines, milestones, and dependencies. It should also allow for real-time tracking of
2 progress against the project plan.
The tool should enable team members to communicate, collaborate, and share project
3 information in real-time.
The tool should allow users to create, assign, and track tasks, as well as set deadlines,
4 priorities, and reminders.
Project scheduling: The tool should provide the ability to create and manage project
5 schedules, including milestones, deadlines, and dependencies.
Resource management: The tool should enable users to allocate and manage resources,
6 including people, materials, and equipment.
Budget tracking: The tool should enable users to create and manage project budgets, track
7 expenses, and monitor financial performance.
Reporting and analytics: The tool should provide users with reports and analytics that enable
8 them to monitor progress, identify bottlenecks, and make informed decisions.
The tool should have robust security features and access controls that protect project data
9 and ensure that only authorized users can access sensitive information.
Integration with other software: The tool should integrate seamlessly with other software,
such as accounting or CRM systems, to streamline workflows and improve efficiency.
10
The tool should be scalable and flexible to accommodate the needs of small or large teams,
and customizable to fit the specific requirements of different projects and industries.
11
12 The proposed solution must allow attaching CI record to generated service tickets
13 The Proposed solution should provide end to end Asset Life Cycle Management: Makes it
easier to handle the complete life cycle of an asset, that is, all stages/modules from
procurement to disposal
14 The Proposed solution should support maintaining AMC/Warranty Information with Alerting
when about to expire also provide Asset Deletion capabilities enabled with workflow engine
The Proposed solution should support Software License Metering: Helps to understand the
15 software license compliance and the use of unauthorized software in the organization and
helps to act proactively to curb illegal usage and problems associated with it.
The proposed solution should provide Asset Dashboards/Reporting: Graphical representation
16 all the assets based on Category, location, aging of the asset, customer, which can be further
level down to the incident record ID
18 The proposed solution should provide out of the box purchase and contract management
modules to support end to end asset life cycle
Service Level Reporting:
1 The solution should provide reports that can prove IT service quality levels, such as
application response times and server resource consumption
2 The system reports should be accessible via web browser and Reports can be published in
PDF and csv format
3 The solution most have an integrated dashboard, view of Contract Parties & current SLA
delivery levels and view of Services & current SLA performance
4 The solution must provide Reports that can be scheduled to publish automatically, or they
can be produced on demand
5 The solution should be able to report in the context of the business services that the
infrastructure elements support— clearly showing how the infrastructure impacts business
service levels
The solution should provide Business Service Management functionality to track Service
quality by logically grouping Network, Server, and Application components. The solution
6 should provide correlation between Network, Server, and Application to identify the business
impact from the specific event or alarm
7 The solution must provide way to define key performance indicators (KPIs) within the Service
Quality report.
8 The solution must provide SLA measurement to track service quality from both Availability
and Performance perspective.
EMS Other Key Requirements:-
1 Proposed NMS solution must have deployment reference in Smart city for monitoring &
managing network nodes in at least 5 Smart City Projects.
2 The Solution should provide all the modules as a single monitoring engine to correlate events
in real-time from Networks, Servers, and Applications
3 The solution should be virtual appliance and deployable on Linux operating systems to reduce
the overall TCO
4 The proposed OEM should possess ISO 27034 Certification for Application Security
Management. Documentary proof must be provided at the time of submission.
5 The proposed Network Monitoring Solution, Help Desk and Asset Management module
should be from a single OEM.
5.12 VIDEOWALL
2 Cube Cube & controller, Software should be from the Same OEM
&Controller
3 Native Full HD (1920x 1080) DLP Single chip/DLP LED/ LASER
Resolution Technology or higher
4 LED/ LASER Lit DLP Rear Projection Technology without any
Technology
colour wheel
5 LED/ LASER light source with a minimum life time of 1,00,000
hrs. in Normal Mode; Individual cube should be equipped with
multiple LED/ LASER banks and each LED/ LASER bank should
have an array of diodes. Single or multiple diode failure should
Light Source not impact image display on the screen
12 Less than 650 BTU / h, with noise < 20 dB(A) one module at 5m
Heat dissipation
distance in front
13 IP Based control ; old IR based control should not be
Control
acceptable
14 IP based control should also be provided for quick access; old
Remote IR based control should not be acceptable
23 Maintenance Cube should be accessible from the rear side for maintenance
Access only
24 Cube control & Video wall should be equipped with a cube control &
Monitoring monitoring system. It should provide options to view control
layouts on remote devices such as tab, laptop, etc through web
browsers
Technical Specifications for IP PBX System (Latest Server - Media Gateway Architecture) System
6 Switch should support IGMP v1/v2/v3 snooping, MLD v1/v2 snooping with min 512
multicast group.
7 Switch should support ACL, BPDU protection, Dynamic ARP Inspection, DHCP Snooping,
STP root guard, IP Source Filtering, RADIUS and TACACS+.
8 Should support UDLD, Digital Diagnostic monitoring, Port and VLAN mirroring and IEEE
802.1ag or equivalent.
9 Should support SNMPv6, Telnetv6 and SSHv6, NTPv6, Openflow and have USB or
equivalent interface for easy backup and restore.
10 Switch should support MAC Sec/FIPS 180-1 and IEEE 1588v2 PTP
16 Port Switch
SL No Minimum Specifications Compliance
Yes/No
1 The Switch Should be Industrial grade in nature and should have 16x10/100/1000 Base-
T PoE+ ports and 4x100/1000 Base-X SFP ports and to be supplied with required
module.
2 Switch should support maximum PoE Budget of 240watt
3 The switch should have minimum switching capacity of 40Gbps.
6 Switch should support IGMP v1/v2/v3 snooping, MLD v1/v2 snooping with min 512
multicast group.
7 Switch should support ACL, BPDU protection, Dynamic ARP Inspection, DHCP Snooping,
STP root guard, IP Source Filtering, RADIUS and TACACS+.
8 Should support UDLD, Digital Diagnostic monitoring, Port and VLAN mirroring and IEEE
802.1ag or equivalent.
9 Should support SNMPv6, Telnetv6 and SSHv6, NTPv6, Openflow and have USB or
equivalent interface for easy backup and restore.
10 Switch should support MAC Sec/FIPS 180-1 and IEEE 1588v2 PTP
shaping
Port Features Must support Port Mirroring, Port Trunking and 802.3ad
4
LACP Link Aggregation port trunks
Flow Control Support IEEE 802.3x flow control for full-duplex mode
5
ports.
Switch should support VLAN, Port based VLAN, 802.1Q tag based VLAN, MAC
based VLAN, Protocol based VLAN, Management VLAN, Private VLAN Edge
5
(PVE), Q in Q (double tag) VLAN, GARP VLAN Registration Protocol (GVRP) for
propagating VLAN
Switch should Support Security Secure Shell (SSH), Secure Socket Layer (SSL),
7 802.1x, IP Source Guard, Port Security, DHCP Snooping, Loop Protection,
Storm Control
Switch should Support Various ACL - Source Destination MAC, VLAN ID, DSCP/
8 IP precedence, TCP/ UDP source and destination ports, 802.1p, Ethernet type,
Internet Control Message Protocol (ICMP) packets, TCP flag
12 Switch should have 90- 240 V AC input & console port for local access
3 Should support 24 port POE as per 1EEE 803.af for IP cameras. (each port
Power as per Bidder design)
7 The switch should support Smart Zoning increasing the overall scalability of the SAN
Fabric.
8 Inter-switch links should support the transport of multiple Virtual Fabrics between
switches, whilst preserving the security between Virtual Fabrics
9 The switch should be equipped with congestion control mechanisms such that it is
able to throttle back away from a congested link.
10 The switch should be capable of discovering neighbouring switches and identify the
neighbouring Fibre Channel or Ethernet switches.
11 The fibre channel switch should be rack-mountable. Thereafter, all reference to the
switch’ shall pertain to the ‘fibre channel switch
12 The switch to be configured with minimum of 96 ports 16 Gbps FC configuration
backward compatible to 4/8.
13 All 96 x FC ports for device connectivity should be 4/8/16 Gbps autosensing Fibre
Channel ports.
14 The switch shall support hot-swappable Small Form Factor Pluggable (SFP) LC typed
transceivers
15 The switch should support hardware ACL-based Port Security, Virtual SANs (VSANs),
and Port Zoning.
16 The switch should support routing between Virtual Fabric instances in hardware.
1 The solution should offer centralized, web-based administration with a single view
of all back up activities and should have alerts generation facility in case of any
issue in backup process.
2 Support de-duplication at source and at target (disk) on any commodity storage
volume. Based on policy backup software should be able to move data to a
Tape/Disc library automatically
3 Support scheduled unattended backup using policy-based management for all
Server and OS platforms
4 Should have in-built frequency and calendar based scheduling system.
5 Should be able to backup any applications in online mode through online SAN
based backups of databases through appropriate agents; Important Applications
such as Database, webserver, application, emails irrespective of the number of
servers / CPUs, configuration of the servers, etc.
6 Should be capable of having multiple back-up sessions simultaneously
7 Should be capable of taking back up of SAN environment as well as LAN based
backup.
8 Should support different types of backup such as Full back up, Incremental back up,
Differential back up, Selective back up, Point in Time back up and Progressive
Incremental back up and snapshots
9 Should have the ability to integrate with archival software and create a single
repository for backup and archive for space efficiency and easier data
management.
10 Should have in-built media management and supports cross platform Device &
Media sharing in SAN environment.
11 Should be able to rebuild the Backup Database/Catalogue from tapes in the event
of catalogue loss/corruption.
12 Should have online backup solution for different type of databases such as Oracle,
MS SQL, MySQL and Sybase / DB2 etc. on various OS.
13 Should be able to copy data across firewall.
14 Should also be capable of reorganizing the data onto tapes within the library by
migrating data from one set of tapes into another, so that the space available is
utilized to the maximum. The software should be capable of setting this utilization
threshold for tapes
15 Should be able to support versioning and should be applicable to individual backed
up objects.
Sl. No Remark
Technical Compliance
Technical Specification
(Yes/ No)
1. The Load Balancer device should be a dedicated Hardware Appliance
with the following features:
a. Should support multiple virtual network functions in which each VNF
has a dynamic or dedicated resource allotted to it like CPU, RAM, Hard
Disk, SSL cores.
b. The appliance shall deliver the high availability required by modern
data centres. It should support Active/Passive or Active / Active HA
configurations using standard VRRP protocol or equivalent
5.23 Servers
KVM Keyboard, Video Display Unit and Mouse Unit (KVM) for
1
Requirement the IT Infrastructure Management at Data Centre
Server
4 USB or KVM over IP.
Connections
6 Rack Access It should support local user port for rack access
Multi-User
10 It should support multi-user access and collaboration
support
Technical
Sl.
Technical Specifications Compliance Remark
No.
(Yes/ No)
Patch panel should be modular design, to be populated with 24 nos. Cat 6 UTP RJ 45
1
Keystone Jack as per specifications provided
Each Ports should be with individual spring loaded shuttered/ hinge type cover for dust
2
protection. Each port (jack) and individual replaceable.
Material: Should Be made of cold rolled steel and conform to TIA / EIA 568-C.2 Component
3
Compliant
4 Should have integral rear cable management shelf.
Commercial Standards:
ANSI/TIA 568-C.2 and IEEE 802.3bt Component Compliant
FCC Subpart F 68.5 Compliant
5
IEC-603-7 Compliant
ISO 11801 Class E Compliant
ETL Verified for Category 6 Component Compliance Or BIS Equivalent
Technical
Sl.
Functional Requirement Compliance Remark
No.
(Yes/ No)
Wherever cables are laid underground, it must be laid within HDPE duct as per the
1
specifications below.
LAN/ OFC Cable should not be laid together with Power cable. If cables are laid using
2
conduit, then there should be separate conduit for LAN cable and power cable.
When taking multiple cables through a single HDPE Duct it should be ensured that there is
3
always space available to take one more additional cable through it if required later.
Technical
Sl.
Technical Specifications Compliance Remark
No.
(Yes/ No)
As per design considering passive components to be used in Project.
Outer Diameter
To be industry standard as applicable.
Raw material used for the HDPE pipe shall meet the following requirements:
i. the anti-oxidant establishers, colour master batch and other additive used shall
be physiologically harmless and shall be used only to minimum extent necessary to
meet the specification.
1 ii. Usage of any additives used separately or together should not impair the long-
term physical and chemical properties of the HDPE pipe.
iii. Suitable Ultra-Violent stabilizers may be used for manufacture of the HDPE pipe
to protect against UV degradation when stored in open for a minimum period of 8
months.
iv. The base HDPE resin used for manufacturing outer layer of pipe shall conform to
any grade of IS-7328 or to any equivalent standard meeting the following
requirement.
Density 940 to 958 kg/m3 at 27o C
Melt Flow Rate 0.12 - 1.1g/10 minutes at 190oC & 5kg load
v. In case of HDPE pipe of two concentric layer construction, the friction reducing,
polymeric material to be used as the inner layer lubrication material shall be
integral with HDPE layer. The lubricant materials shall have no toxic or dramatic
hazards for safe handling. Permanent Lubricated (Per Lub) HDPE Pipes should be
sourced from the manufacturer with ISO 9000 accredited manufacturing facility.
Plastic coupler: The coupler shall be used to join two HDPE pipes. The coupling
shall be able to provide a durable water tight joint between two pipes without
deteriorating the strength of the pipes. The strength of coupler shall match the
2
primary strength of the HDPE pipe. It should be push fit type. Threaded coupler is
not acceptable. The jointing shall meet the air pressure test of 15 kg/cm2 for a
minimum period of 2 hours without any leakage
End plug: This shall be used for sealing the ends of empty pipe, prior to installation
of FO cable and shall be fitted immediately after laying of the HDPE pipe, to
3
prevent entry of any unwanted elements such as dirt, water, moisture,
insects/rodents etc.
Cable sealing plug: This is used to hold the cable and prevent entry of any
4
unwanted elements, as specified above.
End cap: This cap is made of hard rubber, shall be fitted with both ends of HDPE
5 pipe to prevent the entry of any unwanted elements such as dirt, water, moisture,
insects/rodents during transportation and storage
The HDPE Pipe should comply with the following standards
A. IS: 4984 - Specification for HDPE pipe.
B. IS: 2530 - Method for tests for polyethylene molding materials and compounds.
C. IS: 9938 -Recommended colours for PVC insulation for LF wires and cables.
D. TEC-spec no -HDPE pipe for use as duct for G/CDS-08/01 optical fibre cable.
6
E. IS: 7328 - HDPE material for molding and extrusion.
F. ASTM D 1693 - Test method for environmental stress cracking of ethylene
plastics.
G. ASTMD 1505 - Test method for density.
H. ASTMD 3895 - Method for Oxidation Induction test.
12 Core Outdoor Armoured Single Mode OS2 Type Outdoor Fiber Cable Double Sheathed
Compliance
Sr. Description
(Yes / No) Remark
1 Pole Type Galvanized pole as per IS:2629 and Fabrication as per IS:2713
Pipes should be as per IS 1161
2 Fininsh Poles should be Hot Dipped Galvanized with min 75Micron
3 Height 6 Meters / 7Meters Height as per site requirement
Pole Nominal Bore : 175NB
4
Diameter Outer Diameter : 193MM
Pipe
5 Min 4.5MM
Thickness
2M / 4M Cantliver Arm should be provided as per site requirement
The cantilever should be fitted such that they can be rotated to change the
6 Cantilever direction or adjust the angle, if at all required.
The Cantilever should be strong enough so as to mount at least 2 CCTV
camera’s and associated fixtures like IR, etc., if required.
Bottom base
7 Minimum base plate of size 40x40x2 cm
plate
All wiring must be hidden, through tubes/pipes. No wires shall be visible from
8 Pipes, Tubes
outside.
Minimum 1 meter; To ensure that video feed quality is not impacted due to
9 Foundation winds in different climatic conditions and from vibration caused due to heavy
vehicles on road
Mounting
10 Should support pole, cantilever, Junction Box
Facility
CYBER SECURITY COMPONENTS SPECIFICATION
Technical
Sl.
Technical Specification Compliance Remark
No
(Yes/No)
Hardware Specification
1 Firewall should be ICSA Labs Certified
Proposed solution should come from firewall appliance family which has more than
2 10 years of ICSA labs certification
Minimum internal storage 1000 GB SSD for detailed graphical Logs & Reports on
3 Appliance
4 Appliance must have 16 GB RAM or Higher
5 Firewall should have 2 or higher USB 2.0 / USB 3.0
6 Firewall should have Redundant Hot-Swappable Power Supply
7 Firewall should have Redundant Hot-Swappable Fan
Proposed solution should have open standard multicore processor based architecture
8 and not proprietary ASIC based architecture
Interface Requirement
1 Solution should have 1/2 x Management Port + 1 x Console Port (RJ45/MicroUSB)
2 8 Ports of 1G Copper
3 4 Ports of 10G SFP+ (Fiber Ports)
6 or Higher Expansion Slot for Future Expansion (1G Copper / 1G SFP / 10G SFP+/ 40G
4 QSFP+)
Performance Capacity
1 Concurrent Sessions -30000000 or Higher
2 New Sessions/second - 300000 or Higher
3 Firewall Throughput - 70 Gbps or Higher
4 Threat Protection Throughput- 12 Gbps or Higher
5 VPN Throughput - 18 Gbps or Higher
6 NGFW Throughput - 20 Gbps or Higher
7 IPS Throughput - 30 Gbps or Higher
8 Firewall IMIX Throughput - 32 Gbps or Higher
Next Generation Firewall Features
The proposed system should have firewall with stateful packet filtering technology &
must support one-to-one and dynamic user based NAT with a facility to create rules
1 based on usernames, Source & Destination IP address, Hosts, network, IP Range
The firewall of the proposed system should be based on a hardened OS, should be
capable of delivering network protection services at all layers along with options of
network gateway level anti virus, anti spam, intrusion detection and prevention,
2 content filtering, multiple ISP load balancing, failover and VPN solutions.
The firewall should be able to support deployment in transparent mode , Bridge
3 mode, layer 3 transparent proxy mode
The firewall of the proposed system should provide Predefined services based on port
numbers and Layer 7 application and ability to create user-definable services which
4 can be used to define firewall rules
Minimum 20 perpetual Virtual Firewall licenses to be provided with the solution.
5 Scalable upto 25.
The proposed system must provide inbuilt PPPoE client and should be capable to
automatically update all required configuration (NAT Policies, VPN Configuration,
6 Firewall Rules) whenever PPPoE IP get changed.
The firewall of the proposed system should support 802.1q based VLAN tagging to
7 segregate devices logically
The proposed solution should have option to configure firewall policies to block or
8 allow rules based on Country based Geo Location
The proposed solution must have control mechanism to perform policy based control
9 for Application, shaping and visibility for Users, Groups, IP address & Network.
The proposed solution should be able to detect & block known applications like P2P &
10 IM.
The proposed solution should provide guaranteed and burstable bandwidth for
11 applications.
12 Should have Role based and multi factor authorization for Administration
The proposed solution should be able to detect & block known applications based on
13 time schedule.
The Proposed solution should have an option to provide complete policy enforcement
14 and visibility of roaming users and should restrict the remote user from disabling it.
The organization policy framework must be extended to the remote users and ideally
15 it should control the Web and Application filter of remote user
16 The proposed solution should be able to alert on user activity outside business hours
URL Filtering & Web Protection
1 Should support 85+ Web categories
Should support blocking of category based HTTPS sites without having to provide the
2 URL of the site to be blocked
3 Should support HTTPS transparent proxy
The proposed system should support browsing proxy and gateway mode
4 simultaneously
The proposed solution should block HTTPS URLs with complete path instead of only
5 sites names
6 The proposed solution should support regular expression in blocking of HTTPS sites
7 Should enforce Google/Yahoo Images strict filtering through a web interface.
8 Web based management through https and command line interface support
Application Filtering
1 The proposed solution should support Application Filtering in the same appliance.
2 The proposed solution should have inbuilt Application category database.
The proposed solution should provide policy-based shaping by application for User,
3 Group, IP address & Network.
The proposed solution should be able to detect & block known applications like P2P &
4 IM.
The proposed solution should have 2500+ application database & 5000+ application
5 signature
6 The proposed solution must give reports based on username / IP address.
Intrusion Prevention System
Intrusion Prevention system should be appliance based or integrated with the NGFW
1 solution
The proposed IPS system should have signature and anomaly base intrusion detection
2 and prevention system
The proposed system should have configuration options to prevent all the common
DOS and DDOS attacks like syn flood, ICMP flood, UDP flood, Ping of death. Should
have prevention option for more than 30 common attacks. Real-time intrusion
3 detection for minimum 6000+ signatures.
The IPS should be able to detect, respond to and alert any unauthorized activity.
Product detects the attacks and the network misuse that represent risk to the
4 customer.
NIDS shall be able to detect incidents that originate from inside the network
perimeter as well as from outside the network perimeter and shall be able to take
5 action on the basis of configured policies.
Support at least 25000+ or more signatures with online download support of newer
6 signatures.
The proposed system should automatically update the attack signatures database
7 from a central database server
The proposed system should be able to detect and block HTTP proxy both from
8 Content filtering solution & also from IDP
Gateway Anti-Malware
1 Gateway level Anti Malware solution should be an appliance based.
2 The proposed system should scan for viruses even for downloads from HTTPS sites
Proposed solution should be cloud based Anti-APT solution to scan for zero day
3 malwares
Embedded Anti Malware support. Should have option to automatically update the
new virus pattern updates. Anti Malware should be supported for HTTP, HTTPS, FTP,
POP3, SMTP, SMTPS (Port 465), SMTPTLS (Port 587), POP3. Anti Malware scanning
4 should be signature based and should provide ZERO HOUR Anti Malware support.
Gateway level Anti Malware should provide high-performance protection against
viruses in SMTP, SMTPS (Port 465), SMTPTLS (Port 587), POP3, HTTP, HTTPS and FTP .
It should block viruses and worms from penetrating into an organization’s internal
network through e-mail attachments, malicious Web pages, and files obtained
5 through FTP.
Virus gateway should provide real-time detection of viruses and malicious code at the
gateway for IMAP SMTP, SMTPS (Port 465), SMTPTLS (Port 587), POP3, HTTP, HTTPS
6 and FTP Internet .
7 The proposed solution should be licensed per unit as against per user.
APT
The Proposed solution should Provide advance protection to prevent zero day
1 threats, ransomware and evolving malware
The Proposed solution should Analyse executable programs and documents like
2 Microsoft Office files, PDF files, JAR, DLL, PE
This Proposed solution should examine compressed archives like gzip, tar, zip, rar
and 7z Support for malicious files under Windows, Linux, Mac OS and
Android Performs advanced memory analysis of executable programs to detect
3 malicious files
The Proposed solution should Provides threat analysis dashboard to provide insight
4 of real time threats Dump and analyse network even when encrypted with SSL/TLS
VPN
This feature should be easy to configure and use. Should have a support inbuilt for
IPSEC VPNs, SSL VPN, PPTP, L2TP, VPN CLIENT pass through, should support DES, 3
DES and AES encryption, IKE certificate authentication , RSA secure ID & Vasco Token
1 support
The proposed SD WAN solution should provide complete threat protection, including
firewall, network DLP, gateway anti malware, intrusion prevention system (IPS), URL
2 Filtering and application control
3 The proposed solution should be managed centrally
4 Support for IPSec, L2TP, PPTP & SSL VPN.
5 Support Encryption : DES, 3DES, AES, twofish, blowfish & serpent encryption
6 Authentication support : Preshared Key, Digital Certificates.
7 support for Automatic IKE (Internet Key Exchange) and IKEv2
8 Supports IPSEC NAT traversal
9 Supports Hash Algorithms – MD5, SHA1, SHA2.
Should support for IPSEC and PPTP VPN pass through so that computers or subnets on
10 your internal network can connect to a VPN gateway on the Internet
Logging and Reporting solution
1 The proposed system should have integrated on-appliance reporting solution.
The proposed system should provide individual users download & Upload data usage
2 report.
The proposed system should email daily group browsing reports to respective group
3 heads in pdf format.
4 The proposed system should provide user and IP address based reports.
The proposed system should have options to create users with different access rights
5 (E.g. users who can only view reports and not manage the system)
The reporting solution of the proposed system should be able to provide detailed
6 Audit log for auditing and tracking system
Should support logging on the Next Generation Firewall appliance only and should not
require additional Hardware or Software for Logging. It should provide various kinds
of reports like virus reports, URL filtering reports, Top visited websites, Systems
infected by Spywares, User or IP wise download for the day. It should have graphical
7 reports of usages ISP wise, Application wise and IP wise.
Additional Point
Self-Declaration for Local Supplier-Local Content/Make in India Certification from
OEM/ Manufacture should be submitted/Uploaded as per Format of Annexure-II from
MeitY Notification file No 1(10)/20217 CL-ES dated 6/12/2019. If the bidder fails to
1 submit the same, the bidder shall be liable to be rejected/disqualified.
The product shall have Indian Standard, IC3S/Common Criteria (provided by STQC in
India common-criteria- certification-0 ) or Alternatively from International
equivalents, NDPP or NSS or ICSALabs, at least one of them should be provided while
bidding.
Additional Point
1 Self-Declaration for Local Supplier-Local Content/Make in India Certification from
OEM/ Manufacture should be submitted/Uploaded as per Format of Annexure-II from
MeitY Notification file No 1(10)/20217 CL-ES dated 6/12/2019. If the bidder fails to
submit the same, the bidder shall be liable to be rejected/disqualified.
2 The product shall have Indian Standard, IC3S/Common Criteria (provided by STQC in
India common-criteria- certification-0 ) or Alternatively from International
equivalents, NDPP or NSS or ICSALabs, at least one of them should be provided while
bidding.
Technical Remark
Sl.
Technical Specifications Compliance
No.
(Yes/No)
Solution must be a custom built on premise solution and must not be network
1 perimeter security component part devices like UTM and NGFW and not be a
CPU and chip based function.
The proposed solution should have capabilities to configure files, IP, URLs and
2
Domains to Black list or white list.
The Proposed solution should provide correlated threat data such as: IP
addresses, DNS domain names, URLs, Filenames, Process names, Windows
3
Registry entries, File hashes, Malware detections and Malware families through
a dashboard
The proposed solution must be able to provide intelligence feed for malware
4 information, threat profile and containment remediation recommendations
where applicable.
The proposed solution should be able to support XFF (X-Forwarded-For) to
5
identify the IP Address of a host in a proxy/NAT environment.
The proposed solution should have a built-in document vulnerabilities detection
6
engine to assure analysis precision and analysis efficiency..
The proposed solution should have virtual patching feature along with Indicators
7
of Compromise build and sharing.
Proposed solution should have 2 TB in RAID 1 of on box storage from day one
8 with a scalability of 8 TB and should be able to run at least 30 parallel sandboxes
images scalable up to 60 for analysis of payload
The Solution must have inline sensor with capability of hardware based fail-open
11
& Software Fail Open, which must allow to pass through uninterrupted.
Solution should have inline inspection throughput of 1 Gbps for all kinds of real
12 world , scalable to 5 Gbps in a single device, optionally if required must support
Active-Active in HA or Active-Passive mode.
Must have minimum 4 x 10G monitoring interface (with SFP - SR modules) and 4
13 X 1 GE with fail-open capability and latency on network inline device must be
<60 microseconds.
The solution must use prevention techniques and provide zero-day protection
14 against worms, Trojans, spyware, key loggers, and other malware from
penetrating the network.
The solution must accurately detect intrusion attempts and discerns between
15 the various types and risk levels including unauthorized access attempts, pre-
attack probes, suspicious activity, vulnerability exploitation and zero-day attacks.
The solution filter must support network action set such as Block (drop packet),
Block (TCP Reset), Permit, Trust, Notify, Trace (Packet Capture), Rate Limit and
16
Quarantine & must support signatures, protocol anomaly, vulnerabilities and
anomaly filtering methods to detect attacks and malicious
The solution must have filter categories for easy management: - Exploits,
Identity Theft/Phishing, Reconnaissance, Security Policy, Spyware, Virus,
Vulnerabilities, Network Equipment, Normalization, Peer to Peer, Internet
17
Messaging, Streaming Media and must be able to control the known bad host
such as spyware, botnet C2 server, spam and so on based on country of origin,
exploit type and the reputation score.
The solution must have Inline sensors with custom sandboxing for simulation
18 and create IOC's on real time basis as per sandboxing analysis and revert back to
sensors to block threats on real time.
The proposed solution should be able to inspect the multi-protocol sessions to
19 detect and flag the suspicious activity including suspicious file downloads
through the web and internal infections.
The Proposed solution should provide correlated threat data such as: IP
addresses, DNS domain names, URLs, Filenames, Process names, Windows
21
Registry entries, File hashes, Malware detections and Malware families through
a portal
The proposed solution have the capability to performs tracking and analysis of
25 virus downloads and suspicious files and solution should support exporting of
analysis results such as C&C server IP and malicious domain listing.
The Proposed solution should be able to generate out of box reports to highlight
32 Infections, C&C behavior, Lateral Movement, Asset and data discovery and
Exfiltration
Solution must be able to share threat intelligence with integrated third-party
33
vendor products or services such as SIEM systems.
Solution must be able to connect to TAXII server for obtaining threat intelligence
34 & must be able to act as a TAXII server and share threat intelligence to
subscribed TAXII clients.
Solution must be able to provide web-based API such as Restful API for sharing
threat intelligence and integrating with security operation automations and
35
sharable threat intelligence must include at least 4 types - IP, URL, domain and
file checksum.
Solution must allow admin to define custom threat intelligence including IP, URL,
36
domain and file checksum, and deploy them to managed products / devices.
1 The footprint of the overall solution at the endpoint must be very light in terms of
Memory, Hard disk usage and CPU. The entire endpoint software should be single
agent software deployed with all features and functions of NGAV, EDR, Threat
Hunting, IT Hygiene, Vulnerability Management and Device Control and do not
require any agent or software update to enable or disable these modules. Agent
footprint must be under 70MB memory and 1-2% CPU.
6 Container support (OCI) by capturing container activity and metadata, and solution
must provide full visibility into containers and add runtime security
7 Solution must continuously monitor endpoint activities for both on premise and
roaming uses, captures events and forensic details of interest in near real time.
16 Solution should provide full remote remediation capabilities from the management
console even for roaming users on public network (eg. delete registry, file, push or
pull file/package, execute commands and powershell script, etc)
17 Solution must offer memory protection (e.g. ASLR, structured exception handling
overwrite protection, null page protection, heap spray preallocation, etc.)
18 The proposed solution should be able to track more than 130+ adversary groups.
The details of adversary and TTP should be available in the management portal
along with their other well- known names in the community like APT28 is also
known as Fancy Bear, Sofacy, Tsar Team, Sednit.
19 If detection belong to known adversary, solution should provide threat actor with
TTP's to proactively investigate and tune protection policies.
20 The Management Portal should provide capability to filter threat actor information
based on Origin, Target Country, Target Industry & Actor Motivations.
23 Proposed OEM should adhere compliance to SOC II, PCI DSS, HIPAA/HITECH, SOX
and/or other regulatory frameworks
24 Solution should include 24/7 managed threat hunting as an additional service from
the OEM. Threat hunters should have minimum 8+ years of threat hunting
experience.
25 Proposed OEM should have inhouse IR, breach investigation, Red Team, Blue Team
services.
6 The solution should have an inbuilt dual factor authentication for soft token,
mobile OTP etc. Also it should have an inbuilt authentication for Bio-Metrics
without having to acquire another biometric authentication server.
8 The solution should also provide local authentication and all the security
features as per best standards.
9 The solution should provide flexibility user/device wise for local
authentication or enterprise authentication
10 The solution should support an application integration framework for web
based as well as .exe based applications. There should be strong out of the
box support including ease of integration with any third party connectors.
11 The solution should provide a method for creating new connectors with
minimal intervention required from OEM.
12 The solution should provide multi-tenancy feature whereby the entire
operations can be carried out within a tenant or line of business.
8 Allow single baseline policy across all systems, applications and devices (eg
one single update to enforce baseline policy
14 The solution should automatically reconcile passwords that are detected 'out
of sync' or lost without using external restore utilities
15 The solution should have the ability to reconcile passwords manually, upon
demand
16 The solution should automatically verify , notify and report all passwords
which are not in sync with PIM
17 The solution should have the ability to automatically "check-out" after a
specific time and "check-in" within a specified time.
22 The solution should have the capability to seamlessly change the passwords
for the large number of desktops. It should be able to handle floating IPs
23 The solution should have provision for secure offline access of managed
credentials in case of vault failure (break glass scenario)
25 The solution should have provision to allow authorized users to upload their
sensitive/confidential files in the Vault for secured and encrypted storage.
26 Files uploaded in Vault for secured and encrypted storage should be allowed
to be shared between PAM users with an option to expire the share after
defined period of time (in days).
C Access Control
1 The solution should be able to restrict usage of critical commands over a SSH
based console based on any combination of target account, group or target
system and end-user.
13 System should be able to define critical commands for alerting & monitoring
purpose and also ensure user confirmation (YES or NO) for critical
commands over SSH.
2 The solution should be able to log commands for all commands fired over
SSH Session and for database access through ssh, sql+
3 The solution should be able to log/search text commands for all sessions of
database even through the third party utilities
4 The solution should be able to log/search text commands for all sessions on
RDP
5 The solutions should support selective option for enabling session based
recording on any combination of target account, group or target system and
end-user.
6 All logs created by the solution should be tamper proof and should have
legal hold
7 The solution logs all administrator and end-user activity, including successful
and failed access attempts and associated session data (date, time, IP
address. Machine address, BIOS No and so on). The tool can generate — on-
demand or according to an administrator-defined schedule — reports
showing user activity filtered by an administrator, end user or user group.
11 The solution should provide separate logs for commands and session
recordings. Session recordings should be available in image/ video based
formats
12 The session recording should be SMART to help jump to the right session
through the text logs
13 Secure and tamper-proof storage for audit records, policies, entitlements,
privileged credentials, recordings etc.
14 The proposed solution shall cater for live monitoring of sessions and manual
termination of sessions when necessary
15 The proposed solution shall allow a blacklist of SQL commands that will be
excluded from audit records during the session recording. All other
commands will be included.
18 The proposed solution shall allow specific commands to be executed for RDP
connections (e.g. Start the connection by launching a dedicated program on
the target machine without exposing the desktop or any other executables).
19 The proposed solution shall support correlated and unified auditing for
shared and privileged account management and activity.
21 The proposed system shall support full colour and resolution video
recording.
22 The proposed system shall support video session compression with no
impact on video quality.
23 The solution should provide a secure method to facilitate access to managed
asset in case of PAM failure for identified users (local vault)
24 These managed assets accessed in offline mode should generate access logs
that are synced with the PAM solution once it's back online.
E PIM Security
1 The solutions should use minimum FIPS 140-2 validated cryptography for all
data encryption.
2 The Solution should be TLS 1.2 and SHA-2 compliant for PCI-DSS compliance
4 All communication between the client PC and the target server should be
completely encrypted using secured gateway. (Example: a telnet session is
encrypted from the client PC through the secured gateway)
5 The Administrator user cannot see the data (passwords) that are controlled
by the solution.
6 Secured platform - main password storage repository/Vault should be highly
secured (hardened machine, limited and controlled remote access etc.).
7 The solution should secure master data, records, entitlement, policy data
and other credentials in tamper proof storage container.
8 The solution should store Password and SSH keys safekeeping in the certified
vault (minimum AES 256-bit encryption)
9 The solution should not require direct third party access to PAM Database
F PIM Administration
1 The solution should have central administration web based console for
unified administration.
2 The tool uses Active Directory/LDAP as an identity store for administrators
and end users.
3 The tool enables an administrator to define groups (or similar container
objects) of administrators and end users.
11 All administrative task should be done LOB wise i.e. Line of Business Wise
G System Architecture
1 The solution architecture should be highly scalable both vertically as well as
horizontally.
2 The proposed solution shall provide multi-tier architecture where the
database and application level is separated.
3 The solution should work at the network layer instead through a jump
server. This will have achieve large number of sessions.
4 The proposed solution shall provide scalability where it is not limited by the
hardware. Also the solution shall provide modular design for capacity
planning and scalability metrics.
5 The proposed solution shall have the ability to support multiple mirrored
systems at offsite Disaster Recovery Facilities across different data centre
locations.
6 The proposed solution shall have built-in options for backup or integration
with existing backup solutions
7 The proposed solution shall handle loss of connectivity to the centralized
password management solution automatically.
8 The proposed solution shall not require any network topology changes in
order to ensure all privileged sessions are controlled by the solution.
10 The proposed solution shall support both client based (in the case where
browser is not available) as well as browser based administration
12 The solution must support parallel execution of password resets for multiple
concurrent requests.
13 The solution should provide fully failover from a single active instance to a
backup/standby instance with a fully replicated repository
14 The solution should support multiple active instances with load balancing
and fully automatic failover to another active instance
3 The solution provides the capability to enable end users to retrieve (or reset)
a target-system password only after approval by a designated approver (to
allow dual control). Approval criteria can be based on any combination of
target account, group or target system and end-user identity, group or role,
as well as contextual information such as day of the week or time of day.
5 Inbuilt ticketing system with 5 level workflow approval with ticket level
validation, risk and impact assessments as per LOB wise, Service type and
user type. This ticketing system to help in creating a work order on an
executer, who will then request for the access through the request workflow
with this valid ticket
J SIEM Integration
1 The solution should be able to integrate with leading SIEM Solutions.
2 The solution should provide feature for user governance on the target
devices i.e. autodetect users and schedule a governance workflow and user
certification process with adequate review process.
5 Ability to quickly identify private and public SSH keys, including orphaned
SSH keys, on Unix/Linux machines, extracts key related data and ascertain
the status of each key
M Notification Engine
1 The solution should have capability to provide alerts and notification for
critical PIM events over SMS & Email
2 The solution should have capability to provide alerts and notification for all
administration/configuration activities over SMS & Email
N Solution Workflow
1 The solution should have inbuilt workflow to manage
2 Electronic Approval based Password Retrieval
3 Onetime access / Time Based / Permanent Access
4 5 level approval workflow with E-mail and SMS notification with delegation
rules
5 Ability to provide for delegation at all levels in the workflow
15 The recorded session should be compressed and not take much space on
storage and only active session has to be monitored
Q Additional Functions
1 Access Management
•The Solution should allows an end user/bot to use the command line/tools
like MobaXterm, SecureCRT to not only authenticate a user in PAM solution
but also establish a connection to any *nix target device.
2 Architecture
•Should include an enterprise version which will be highly scalable to
support the High Availability at both DC and DR sites.
3 Architecture
•The solution should be scalable to be configured as Active-Passive from DC
to DR using its auto failover technique.
•The solution should have the ability to support DR in multiple geographical
locations and networks.
4
The module should enable the admin to take remote connection of user
endpoint without the need to possess local password or without using any
third party.
5 The solution should have End Point Privilege Management and Threat
Analytics.
2 The solution should normalise the logs to collect insights from the logs
5 The user interface to monitor and investigate events from the SIEM tool
should be interactive and should provide capabilities necessary for further
analysis
6 The proposed solution should be configurable, manageable, and should
have ability to be monitored through a centralized management console
7 The solution should have ability to perform trend analysis basis the
historical data collected.
8 The solution should have ability to do full-text search on any field in the
indexed data
9 Solution should enable the easy customizable dashboards and customizable
dashboards based on various visualizations
10 Solution should anticipate likely threats to the customer both from outside
as well as arising from customer’s internal infrastructure.
11 The solution should provide an inventory solution through collected
information
12 Vendor should have capabilities to detect anomalies such as brute force,
command injections, indicators
13 Solution should collect existing logs from security controls such as
firewalls , IPS devices , to detect targeted attacks.
16 Solution should have detection models to find out threats sources are
linked to the same attacker by grouping alerts with common characteristics
like time, day location, target asset profiles etc.
23 The proposed solution should support log collection from all major
operating systems and their versions but not limited to Windows, Linux,
AIX, Solaris etc.
24 The collectors should be able to store/retain both normalized & raw data
for forensic purposes
25 The proposed solution should have capabilities to store the event data in its
original format in the central log storage
26 The proposed system shall be able to capture all details in raw log, events
and alerts and normalize them into a standard format for easy
comprehension.
27 The proposed solution should support multiple log collection protocols.
28 The proposed solution should prevent tampering of any type of logs and log
any attempts to tamper logs. It must provide encrypted transmission of log
data to the log management.
29 The proposed solution (SIEM) should be able to perform the correlations
between different logs.
30 Events should be presented in a manner that is independent of device
specific syntax and easy to understand for all users
34 The solution should be able to integrate with third party threat intelligence
sources over APIs to enrich events and cases
35 The solution should allow to create custom visualizations and graphs as per
customer requirement
36 The solution should allow access to the raw logs for investigation and RCA
activities
37 The solution should be able to export dashboards as pdf reports.
38 The solution should have User management module for authentication and
authorization
39 The proposed solution should support log collection, correlation and alerts
for the number of devices /applications
40 The proposed solution must ensure all the system components continue to
operate when any other part of the system fails or loses connectivity.
41 The proposed solution must automate internal health checks and notify the
user in case of problems.
42 The proposed solutions should be able to collect data from new devices
added into the environment, without any disruption to the ongoing data
collection.
43 The proposed solution should have connectors to support all the
devices/applications of all project landscape described in this RFP.
44 The proposed solution should be able to continue to collect log data during
database backup, de-fragmentation and other management scenarios,
without any disruption to service
45 The proposed solution should provide options to load balance incoming
logs to multiple collector instances.
46 The proposed solution should support log collection from all operating
systems and their versions including but not limited to Windows, Unix,
Linux, etc.
47 The proposed solution should be able to store/retain both the log meta
data and the original raw message of the event log for forensic purposes.
50 The proposed solution should be able to parse and correlate multi line logs
52 The dashboard should show the status of all the tools deployed as part of
the SIEM
53 It should be possible to categorize events while archiving for example,
events for network devices, antivirus, servers etc.
59 The proposed solution should be able to store both normalized and RAW
logs
60 The Solution should have its own integrated case management to analyse
the alerts.
61 The solution should be able to send notification over multiple channels
integration such as slack, teams, telegram.
62 The solution should be able to categories the events based on the mitre
attack framework.
· Bar chart
· Pie
· Donut
· Area Chart
· Line Chart
16 Providers sandbox enriches any detonation with additional context from internal
intelligence data sources and malware repository
17 Provider sandbox is capable of being fully automated via an open REST-based API
18 Provider sandbox is capable of being integrated with first-party endpoint security product,
automating the delivery, detonation, and analysis of quarantined executable files
19 Provider offers manual, human-based malware forensics and analysis conducted on
customer submitted samples on an ad-hoc basis
20 Provider maintain a searchable repository of indexed malware containing no less than 1.9
billion samples including binaries, macros, document files, and other file types
21 Provider offers ability to identify malware with code reuse and string similarity through
YARA rule hunting, and ASCII, WIDE, and HEX string searching against providers malware
database containing 1.9 billion samples
22 Provider offers ability to be alerted when new malware samples matching specific YARA
hunts are added to providers malware database
23 Provider offers web-browser plug-in supporting customer open source (OSINT) data
enrichment and correlation by scraping indicators of compromise from the surface web
and in-browser documents, to include PDF documents, matching the data up against
provider threat intelligence. Supported scrapable indicators of compromise include,
domain, IP address, URL, sha256 file hash, sha1 file hash, md5 file hash, and Bitcoin
addresses
24 Provider offers attribution of alerts to known threat actors
25 Provider offers Continuous Monitoring by Human Analysts
26 Provider offers detailed information and descriptions of malware families
27 Provider offers in-depth analysis and reporting on threat actor trends
28 Provider offers on-demand analysis of IP addresses and domains
29 Provider offers threat intelligence collected from over 100,000 hours of provider serviced
incident response (IR) work per year
30 Provider offers threat intelligence collected from over 400,000 unique malware samples a
day
31 Provider leverages graph technology for storing and retrieving data from databases,
capturing individual nodes with freeform properties, and potential complex relationships
between nodes, and connecting these nodes via vertices for executing queries supporting
the understanding of patterns and connections between disparate data types
32 OEM should be running their business operations in India for last 4 years and must have
office based in India for atleast last 4 years
33 The proposed OEM Threat Intelligence solution should be positioned as leaders in latest
Forrester Wave Intelligence Services analyst report
5.40 VAPT Certification & STQC Audit for DC for every year
Sl. VAPT Certification & STQC Audit for DC for every year Technical Remark
No. Compliance
(Yes/ No)
1 Security Testing (including penetration and vulnerability test): Security test shall be conducted to
demonstrate security requirements at network layer and software applications
2 Components shall pass vulnerability and penetration testing for rollout of each phase
3 Components shall also pass web application security testing for portal, mobile app, and other
systems.
4 Security testing shall be carried out for exact same environment/architecture that shall be set up
for go-live
5 Penetration test shall be carried out periodically and vulnerability analysis shall be carried half-
yearly during maintenance phase
6 For all applications hosted on-cloud or hosted on premises, the security testing shall be a
mandatory requirement.
Technical Specification for Control Room Interior and Control Desk Technical Compliance Remark
(Yes/No)
System Integrator / Contractor to ensure that the control room interior solution
provider has all these certificates / reports prior to tender RFP release date, and these
certificates / test reports must be submitted along with the bid. These certificates are
mandatory to ensure that the solution meets the desired functionality & norms
therefore, general compliance / self-compliance shall be deemed unacceptable.
1.2 The Control Room Interior Solution Provider shall have experience of
supplying below products in any one year out of last seven financial
years to qualify: -
a) Acoustic Modular Metal Paneling / Partition – minimum 300 Sq.
Meter
b) Acoustic Modular Metal False Ceiling - minimum 300 Sq. Meter
1.1 The wall paneling shall be robust & strong enough to sustain the routine
loads/minor impacts of typical control room environment. The wall
paneling/partition structure shall have audit certified feature of Load
bearing capacity of 300 Kgs to hold any display unit on clamp having
minimum length of 750mm. Valid audit certificate (from UL / Intertek)
to be submitted along with the technical bid.
1.11 Seismic safety of user & control room equipment is a prime concern
area. The metal paneling, metal linear plank ceiling & false flooring shall
sustain the seismic vibrations as per design spectrum IS 1893 for zone
4 or better vibrations. The test shall be carried out by authorized
government agency. Test Report to be submitted along with the
technical bid.
1.12 From fire safety point of view the metal wall paneling tiles shall be class
A fire rated as per the norms of comparative measurements of surface
flame spread and smoke density measurements with that of select
grade red oak and fiber-cement board surfaces under the specific fire
exposure conditions. The proposed metal paneling & metal ceiling tiles
shall be Class A certified/tested as per ASTM e84 (from UL / Intertek)
for surface spread of flame and smoke generation. This is mandatory to
ensure that the materials used in the interiors do not provoke fire. Valid
certificate / report to be submitted along with the technical bid.
1.13 The modular metal paneling & metal ceiling shall comply to the lead-
free directive to ensure restriction of hazardous substances so that the
final product does not contaminate the environment. The final product
i.e., modular metal paneling & metal ceiling does not contain hazardous
substances and we give a healthy life to our coming generations it is
necessary that the modular metal paneling & metal ceiling system shall
be RoHS certified/tested (from UL / Intertek). Valid certificate to be
submitted along with the technical bid.
1.2 12mm thick Frameless tempered clear glass door with fittings (Single /
Double Doors): - With door spring and locking arrangements and both
way handle and patch fittings.
1.21 Metallic Door (Single / Double Doors): - With door hinges and locking
arrangements and both way handle. Prepare with rigid thermo fused
film metal panels. Specification: 0.6mm thick Metal panel sheets,
internal cavity filled with adequate quantity of honeycomb. Material of
the partition and that of metal door will remain the same. The door
thickness shall be minimum 45mm and frame thickness shall be
minimum 115mm.
1.22 The Control Desk shall conform to high standard of engineering as
mentioned in the document; meeting the specified codes, standards
and designs. It shall be capable of performing 24X7 operations under
the specified environmental condition in compliance to control room
ergonomic norms i.e. ISO 11064. All the certificates and reports
mentioned below and in BOQ shall be submitted along with the
technical bid.
1.22.1 Structure: -
Made of heavy-duty extruded vertical and horizontal aluminium
profiles. The extrusions shall be duly powder coated with 40+ microns
over all surfaces. All sheet metal parts shall be finished with a durable,
black, electrostatic powder coating. OEM shall have a valid trademark
registration certificate issued by the Government of India for the
Control Desk proposed in this tender. Valid Trademark registration
certificate to be submitted along with the technical bid.
1.22.3 Table top: - The material of the working surface shall be minimum 25
mm thick MDF with High-Pressure laminate. The proposed Control
Desk’s life cycle should be assessed (from approved LCA consultant) for
environmental impacts associated with all the stages of a product's life
for cradle to grave analysis. Valid report/document from UL/Intertek to
be submitted along with the technical bid.
1.22.4 Slat Wall: - Slat wall shall be made of approximately 2mm thick
extruded aluminium (aluminium alloy). The proposed Control Desk shall
be UL Listed and valid certificate to be submitted along with the
technical bid.
1.22.5 Modular removable PU nosing: The front edge of consoles is the
component which comes in frequent contact of the operator. The soft
polyurethane edge is meant to prevent injury (accidental impact) to
operator during emergency and it also reduces the contact stress. In
case of damage to this edge the desk design shall permit quick & easy
replacement within half an hour without taking any shutdowns or
removal of the tabletops. Audit certified design feature of modular PU
Edge: High-density poly-urethane foam moulded on industrial grade
aluminium core to form 50mm deep tapered edge to be installed on
worktop. In case of damage or wear, the edge shall be mechanically
replaceable within 30 minutes without opening or removing the
worktop. Valid UL audit certificate to be submitted along with the
technical bid. Extruded PU edging/PVC T-beading shall be deemed
unacceptable.
1.22.6 Monitor Arm: - The Console shall feature ergonomic display mounting
arms. It shall enable quick & easy replacement of VESA mounts & arm
extensions as per the ergonomic. UL audit certified design feature of
monitor arm assembly shall have auto lock, push & remove feature for
quick release of VESA mounts and modular arm extensions for ease in
maintenance and fixing of monitor by one technician within 30 seconds
without using any tools. Valid UL audit certificates to be submitted
along with the technical bid.
1.22.8 Shutters & Side Legs: - Front, and back shutters shall be of 18 mm
Laminated MDF Board with premium finish. Side leg shall be of 25mm
of the same finish. The proposed console shall be Greenguard Gold
certified. OEM shall have had this certificate for at-least five years prior
to April 1st, 2023. Valid certificate from UL/Intertek to be submitted
along with the technical bid.
1.22.9 Cable Trays and Wiring: - The Console shall be designed with vertical
and horizontal cable trays to allow for continuous cable management
between the cabinets. Wire shall be routed into the cabinet through
gland plate. The proposed console shall be RoHS Certified/tested from
UL/Intertek and the valid certificate/ test report shall be submitted
along with the technical bid.
5.42 SAFETY AND SECURITY SYSTEM FOR INTEGRATED COMMAND AND CONTROL CENTRE (ICCC)
Feature Spec
Sl. No. Spec Details Technical
Compliance Remark
(Yes/No)
1 The Main Digital Addressable Water Leak Detection Panel shall Operate on 230 V A.C.
with battery backup. It will provide supervision of Interface modules. The Main Water
Leak Detection Panel shall provide minimum:
1. 10.1 inch Touch Screen Display to indicate Module No. and distance to Leak
Location in Meters.
2. Event Log with date and time.
3. SIM Naming facility.
4. RS485 Communication with Interface Modules.
5. Builtin Modbus/Bacnet output for BMS Communication.
6. Built-In audible sounder and one Common Hooter Output.
7. Fault Relay output.
8. Common Alarm Relay Output.
2 The Water Leak Interface Module shall operate with A.C. local supply. The Water
Leak Interface Module shall provide supervision for the water sensing cable. The
Interface Module shall provide, at minimum, the following:
1. Sensing cable capacity 150 mtrs.
2. LCD display to indicate distance to Leak Location in Meters .
3. Red LED for Power On.
4. Red LED for Alarm.
5. Fault Relay output.
6. Common Alarm Relay Output.
7. RS485 Communication with Main Water Leak Detection Panel
8. Built-In audible sounder and one Common Hooter Output.
3 The Liner Water Leak Cable shall provide, at minimum, the following:
1. Water detection cable shall consist of 4 conductors, 2 water sensitive and 2
data.
2. The cable shall be restorable and corrosion resistant, and shall not require
replacement after being wet.
3. Maximum length of Liner Leak Detection Cable not to exceed 150 meters
per Interface Module.
4. Cable shall be installed in the path of a potential water leak.
4 SOUNDER:
The sounder shall give audible alarm when any sensor operates. It shall be complete
with electronic oscillations, magnetic coil (sound coil) and accessories ready for
mounting (fixing). The sound output from the Hooter should not be less than 85
decibels at the source point.
2 · CSP should be a registered firm or a company in India and the proposed Data
Centers (DC & DR) should have jurisdiction in India
3 · Neither the current organization nor the holding company should have been
Debarred and / or blacklisted by any organizations of Govt. of India/ Central PSU/ state
government entities as on bid submission date
4 · Proposed Cloud Service Provider (CSP) should be STQC audited and MeiTY
empanelled and offer all services from India only as per guidelines of MeiTY
5 · The CSP must have a turnover of at least 200 Crore in each of the last 5 years or 500
Crore in each of the last 3 years from data center and cloud services.
6 · The Primary and DR Data Centre (Cloud) shall be physically located in India. The
proposed Datacenter for DR should be at least 100 KM from current Primary Datacenter,
and it should not be in same River Flood plain
7 · The proposed data center must be Tier III or above for better availability of cloud
services and certified under:
o TIA 942/ Uptime Institute Certification
o Data Centre should be either Seismic Zone-II or Seismic Zone-III only
9 · CSP should be a Leader in latest Gartner Magic Quadrant for “Cloud Infrastructure
as a Service”.
10 · CSP should have minimum 2 data centers each empanelled with MEITY to be used
as DC and DR which are atleast 500 km apart.
11 · The CSP should provide financially backed SLAs for all the services offered and these
SLAs should be declared in public portal of CSP.
12 · The CSP should provide native marketplace with certified applications which can be
deployed on cloud. The CSP should also provide capability for administrators to create
private marketplace with images from the public marketplace.
13 · The CSP should provide all variants of cloud service as per MeiTY guidelines.
o Infrastructure as a Service (IaaS),
o Platform as a Service (PaaS)
o Software as a Service (SaaS)
14 · The CSP must provide the following services from both DC and DR proposed in this
RFP
o VM and dedicated physical server based compute services for x64 platform
o Multiple options of storage including managed disks, unmanaged disks, block storage,
file share and data lake storage in multiple performance tiers.
o PaaS services for analytics, AI, Kubernetes and container based offerings.
o Options for container registry and resource template libraries to support faster
deployment and best practice implementation.
o CI/CD services to support quick dev and test deployments.
o Support for both proprietary and open source versions of Linux distributions
o Managed instances and Database as a service for Microsoft SQL, MYSQL and
PostGreSQL.
o Certified marketplace for purchase of third party solutions.
o Options for shipping of data from CSP to department if required for backup purposes
o Native Firewall, EDR and WAF services both as a native PaaS from the CSP as well as
certified third party solutions selectable from a marketplace hosted by the CSP without
intervention from CSP.
o Native Bastion host as a service to ensure secure and resilient access to VMs without
opening up public IP addresses.
o Native CSP VPN based access to cloud services to ensure no open direct public IP based
access to any cloud service under this RFP.
o Native CSP provided Media services and CDN for media streaming and large file
transfer between department/organization and CSP
o Offering for perimeter, host and in-memory security solutions for the compute and
storage offerings provided by CSP.
15 · The CSP should be a OEM of the following native services:
o Layer 3 and Layer 4 Firewall
o Layer 7 Firewall (WAF)
o SIEM & SOAR
o Vulnerability Scanner
o Endpoint Security
o Backup Tools
o Disaster Recovery Tools
16 · The CSP should have minimum following experiences.
o Providing the Public Cloud Services (PaaS, SaaS) in India for last 5 years
o Should have minimum 10 Government / Private Customer reference/ PO in India
o Should have minimum 05 reference of Government Entity in India for providing (PaaS,
SaaS) Services.
17 · CSP should support both BYOL (Bring your own license) as well as PAYG (Pay as you
go). The OS offered should come with continuous updates and upgrades for the entire
contract duration.
18 · Monitoring services for cloud resources hosted in the data center and support for
customized report generation.
19 · The CSP should support per hour, per month and options for long term (1 yr. & 3 yr.)
reservation of compute VMs and DB as a service for MYSQL, PostGreSQL and Microsoft
SQL servers.
20 · The CSP should provide options for dynamic pricing as well as fix unit pricing of all
the resources proposed under this RFP for a period of 5 years.
23 · CSP should support a minimum uptime of 99.5% for each of its services. A publicly
available documentation needs to be provided for the same.
24 · The CSP must support dedicated connectivity from atleast 3 ISP providers for
department/organization to chose between at the time of deployment.
SPECIFICTION FOR CLOUD SERVICES for Guwahati Intelligent City Surveillance Project Technical Remark
Compliance
(Yes/No)
1 Minimum VM and Compute Requirements:
· Virtual Machines offered should be with the latest generation processor offered by
the processor OEM.
· Physical core to vCPU ratio should not be more than 1:2 for all proposed Virtual
Machines
· Ability to automatically increase/scale the number of Instances/VMs during demand
spikes to maintain performance (i.e. ‘scale-out’)
· Cloud service architecture should be in such a way that avoids VM outages or
downtime when the provider is performing any kind of hardware or service maintenance
at the host level
· Required Operating System should be offered along with the Virtual Machines and
should support both BYOL (Bring your own license) as well as PAYG (Pay as you go). The
OS offered should come with continuous updates and upgrades for the entire contract
duration.
· MSP should have capability to provide dedicated hosts in its native Cloud
Infrastructure in India, which allows usage of existing third-party software license
· CSP Should offer monthly uptime of 99.5% or higher (as published in the CSP’s
Public Portal)
· Cloud provider should offer the following instance types –
o General Purpose – optimized for generic applications and provides a balance of
compute, memory, and network resources.
o Memory optimized – optimized for memory applications.
o Compute optimized – optimized for compute applications.
o Storage optimized – include very fast/large amount of local storage for NoSQL
databases and Hadoop.
o GPU – intended for graphics and general-purpose GPU compute applications
· Cloud provider should offer instances that provide a baseline level of CPU
performance with the ability to burst above the baseline.
· Cloud provider should offer instances that run on hardware dedicated to a single
Guwahati Smart City Ltd.
· Cloud provider should offer instances that can run nested virtual machines, that is
virtual machine inside a virtual machine.
· Cloud provider should be able to support following Linux distributions - Red Hat,
SUSE, Ubuntu, CentOS, and Debian
· Cloud provider should be able to support the last two major Windows Server
versions
· Guwahati Smart City Ltd must be able to specify and modify server configuration
(CPU, memory, storage) parameters seamlessly.
· Cloud service should support local storage for compute instances to be used for
temporary storage of information that changes frequently.
· Guwahati Smart City Ltd should be able to split and host instances across different
physical data centers to ensure that a single physical failure event does not take all
instances offline.
· Guwahati Smart City Ltd should be able to import their existing image and save it as
a new, privately available image that can then be used to provision instances in the
future.
· Cloud service must support the ability to take an existing running instance or a copy
of an instance and export the instance into a VMDK or VHD image format.
· Cloud provider must be able to schedule events for Guwahati Smart City Ltd’s
instances, such as a reboot, stop/start, or retirement. Depending on the event, Guwahati
Smart City Ltd might be able to take action to control the timing of the event.
· Cloud provider should offer license portability and support for Microsoft apps like
SQL Server and SharePoint Server, Active Directory as service
· Cloud provider should offer license portability and support for Oracle apps like
Oracle Database 11g, 12c etc.
· Cloud provider should offer license portability and support for IBM apps like DB2
and WebSphere.
· Cloud provider should offer a simple pay-as-you-go pricing where Guwahati Smart
City Ltds can pay for compute capacity by the hour with no long-term commitments.
· For the proposed Block Storage, CSP should offer the capability to increase the
Volume size in minimum increments of 10GB or lower so that charges are for the actual
usage. Offers the ability to increase the size of an existing block storage volume without
having to provision a new volume and copy/move the data.
· Block Storage with minimum monthly uptime of 99.99% or higher (as published in
the CSP’s Public Portal)
· Object storage should be replicated across multiple DC’s for better resiliency and
should be designed for 99.99% availability and 99.99999999999999% (16 9's) durability.
· Offer server-side encryption of data ‘at-rest’, i.e., data stored on volumes and
snapshots
· Offer object storage tiering capability, i.e. the ability to recommend transitioning an
object between object storage classes based on its frequency of access.
· Object Storage
o Cloud provider should offer secure, durable, highly scalable object storage for storing
and retrieving any amount of data from the web.
o Cloud provider should support an extremely low-cost storage for archival. The CSP
should automatically tier the data.
o Cloud service should support encryption for data at rest using 256-bit Advanced
Encryption Standard (AES-256) encryption to encrypt your data.
o Cloud service should support encryption using Guwahati Smart City Ltd provided keys.
These keys should be used to manage both the encryption, as data is written to disks, and
decryption, when data is accessed.
o Management Service that creates encryption keys, defines the policies that control
how keys can be used, and audits key usage to prove they are being used correctly.
o Cloud Service should support managing an object's lifecycle by using a lifecycle
configuration, which defines how objects are managed during their lifetime, from
creation/initial storage to deletion.
o Cloud provider should provide a strong regional isolation, so that objects stored in a
region never leave the region unless Guwahati Smart City Ltd explicitly transfers them to
another region.
o Cloud service should be able to send notifications when certain events happen at the
object level (addition/deletion).
o Cloud service should be able to host a website that uses client side technologies (such
as HTML, CSS, and JavaScript) and does not require server-side technologies (such as PHP
and ASP.NET).
o Cloud Service should support versioning, where multiple versions of an object can be
kept in one bucket. Versioning protects against unintended overwrites and deletions.
o Cloud service should support flexible access-control policies to manage permissions for
objects.
o Cloud service should be able to provide audit logs on storage buckets including details
about a single access request, such as the requester, bucket name, request time, request
action, response status, and error code.
o CSP should offer a mechanism to avoid accidental deletion of data. In such case data
when deleted should be preserved for a minimum of 3 months.
o Cloud service should support a lower cost option for noncritical, reproducible data at
lower levels of redundancy.
o Cloud service should allow uploading a single object as a set of parts where each part
is a contiguous portion of the object's data and these object parts can be uploaded
independently and in any order.
o Cloud provider should offer a service to speed up distribution of static and dynamic
web content.
o Cloud service should support read-after-write consistency for PUT operations for new
objects.
o Cloud provider should offer a storage gateway appliance for seamlessly storing on-
premises data to the cloud.
o Cloud provider should support moving large amounts of data into the cloud by
bypassing the internet.
o Cloud provider should support moving large amounts of data out of the cloud by
bypassing the internet.
o Cloud provider should support replicating data to DR site and should provide read-only
access to the replicated data.
· File Storage
o Cloud provider should offer a simple scalable file storage service to use with compute
instances in the cloud.
o Cloud service should offer SSD backed storage media to provide the throughput, IOPS,
and low latency needed for a broad range of workloads.
o Cloud service should support petabyte-scale file systems and allow thousands of
concurrent NFS connections.
o Cloud service should support consistent low latency performance between 5-15 MS at
any scale.
o Cloud service should support scalable IOPS and throughput performance at any scale.
o Cloud service should support thousands of instances so that many users can access
and share a common data source.
o Cloud service should automatically scale up or down as files are added or removed
without disrupting applications.
o Cloud service should be highly durable - file system object (i.e. directory, file, and link)
should be redundantly stored across multiple datacentres.
o Cloud service should support read after write consistency (each read and write
operation is guaranteed to return the most recent version of the data).
· Audit Trail: Logs of all user activity within a CSP account including actions taken
through the CSP's Management Console, CSP's SDKs, command line tools, and other CSP
services. The recorded information includes the identity of the API caller, the time of the
API call, the source IP address of the API caller, the request parameters, and the response
elements returned by the Cloud service.
· Cloud Advisor: Analyses the Cloud environment and provides best practice
recommendations (or checks) in five categories: cost optimization, security, fault
tolerance, performance, and service limits.
· Cloud Service Providers must offer Cloud native turnkey SIEM offering by which
GSCL can configure real-time analysis and alerting of security events. At a minimum, the
integration or service must support alerting, log retention and some form of forensic
analysis that is able to search across logs and periods of time for patterns.
· Cloud Service Providers must include, at minimum, a local identity management
system (that is, local accounts) with granular role-based authorization for network
services in both the service interfaces and management console. At a minimum, the role-
based authorization must support assigning authorization based on individual users and
groups of users and delineation must be assignable per firewall, load balancer, IP address
and network segment and support, as applicable, the following granular actions: create,
delete and configure.
· Cloud Service Providers must allow GSCL to access the cloud service via an IPsec
VPN tunnel or Secure Sockets Layer (SSL) VPN tunnel over the public Internet. This must
be a self-service capability from the provider side, although Guwahati Smart City Ltd will
have to make configurations on their end.
· CSP must provide an option to the Guwahati Smart City Ltd to encrypt the data on
the instance block storage volume so that data remains encrypted at rest. This must be a
simple, self-service option when the instance is provisioned.
· The block and object storage services must offer GSCL the self-service ability from
both management console and Command Line Interface to opt into provider-enabled
server side encryption (SSE) for objects or object hierarchies within the storage service.
· Large instance support: Providers must offer GSCL instances with a large number of
processor cores and memory for processor- or memory intensive use cases. The provider
must be able to provide instances that support at 128 vCPUs and 3072 GB of RAM.
· Cloud provider should offer a dashboard that displays up-to-the minute information
on service availability across multiple regions.
· Cloud provider should offer 365 days’ worth of Service Health Dashboard (SHD)
history.
· Cloud provider should offer a service acts like a customized cloud expert and helps
provision resources by following best practices.
· Monitoring tools that will enable collection and tracking metrics, collection and
monitoring log files, set alarms, and automatically react to changes in the provisioned
resources. The monitoring tools should be able to monitor resources such as compute
and other resources to gain system-wide visibility into resource utilization, application
performance, and operational health.
· Able to define guidelines for provisioning and configuring cloud resources and then
continuously monitor compliance with those guidelines. Ability to choose from a set of
pre-built rules based on common best practices or custom rules (e.g., ensure Storage
volumes are encrypted, Compute instances are properly tagged, and Elastic IP addresses
(EIPs) are attached to instances) and continuously monitor configuration changes to the
cloud resources and provides a new dashboard to track compliance status.
· Provide Audit Trail of the account activity to enable security analysis, resource
change tracking, and compliance auditing
· CSP should offer a fully managed service in India that makes it easy to identify
potentially fraudulent online activities such as online payment fraud and the creation of
fake accounts.
· CSP should provide in India, a single location to track migration tasks across multiple
cloud native tools and partner solutions certified on the cloud to provide visibility into
migration.
· CSP should offer a fully managed service in India, that lets Guwahati Smart City Ltd
easily create and publish interactive dashboards that include ML Insights. The dashboards
should be accessible from any device, and embedded into your applications, portals, and
websites.
· Web Application Firewall (Layer 7): Protection from attacks by filtering based on
rules that create. Filter web requests based on IP addresses, HTTP headers, HTTP body, or
URI strings, which allows to block common attack patterns, such as SQL injection or cross-
site scripting that could affect application availability, compromise security, or consume
excessive resources. Features like protection against Web visibility, east of deployment
and maintenance, integrated security.
· DDoS Protection: Managed DDoS protection service that defends against most
common, frequently occurring network and transport layer DDoS attacks that target web
site or applications. When used with Content Delivery Network and global DNS service,
should provide comprehensive availability protection against all known infrastructure
(Layer 3, 4 and 7) attacks. Should provide always-on detection and automatic inline
mitigations, minimize application downtime and latency.
· Identity and Access Management: Service that properly separates users by their
identified roles and responsibilities, thereby establishing least privilege and ensuring that
users have only the permissions necessary to perform their assigned tasks.
· Managed Threat Detection Service: Continuously monitor for malicious or
unauthorized behaviour to help protect accounts and workloads. It should monitor for
activity such as unusual API calls or potentially unauthorized deployments that indicate a
possible account compromise. The service should also detect potentially compromised
instances or reconnaissance by attackers.
· Review the audit logs to identify any unauthorized access to the Client’s systems.
The GIS platform integrated with a city surveillance system can enhance inter-departmental coordination and communication
by providing a common operating picture for all stakeholders involved in public safety and emergency response. This can lead
to faster response times and better decision-making during critical situations.
An indicative list of use cases which the Master System Integrator (MSI)/ Implementation Agency (IA) will be required to
implement is given below. As and when the system expands, and more applications get added the Master System Integrator
(MSI)/ Implementation Agency (IA) is required to be open to all such subsequent additions. Exact definition of the use cases
shall be finalized as SRS(Software Requirement Specification) stage.
2 Video camera Video camera site location Display of IFOV on click at any location with Department officials,
surveillance optimisation and analysis opening angle and viewing distance on 3D City Planners
Mapping for planning GIS/ Web GIS Map environment.
3 Video camera Significant location Gap IFOVs of all installed camera assets with a Department officials,
surveillance and Analysis buffer of view adjustment with all significant City Planners
viewing Analytics high security locations in the city for
surveillance coverage analytics
4 Video camera Camera view link Linking of live GPS location of app based Department officials,
surveillance and optimisation for tracking Services with camera (IFOV) for on the fly City Planners,
viewing Analytics (Live GPS) live view display of camera feed. It will be Surveillance
used for tracking /Geo-fencing of App department (police)
Based Vehicles services.
5 Video camera Camera view link Linking of moving asset with respect to Department officials,
surveillance and optimisation for speed and camera location (IFOV) for on City Planners,
viewing Analytics tracking(Speed) the fly live view display of camera feed. Surveillance
department (police)
6 Environment Display of location of all Display location and data retrieved from all Department officials,
sensor analytics environment sensor environmental sensor and display bar City Planners, Citizen
graphs and charts in near real time updates
on click.
7 Environment Sensor data based alert Display of sensor environment factor data Department officials,
sensor analytics generation in spatio-temporal genre and generation of City Planners, Citizen
alert to citizen within effective area (buffer)
of the sensor.
8 Environment ITMS based integration for Red flag from environment sensor to be Department officials,
sensor analytics re-routing of traffic displayed on dashboard and can be City Planners, Citizen
integrated with ITMS to reroute traffic
(using network analysis) in more polluted
areas
9 Environment Temperature based Heat Display of a high temperature density map Department officials,
sensor analytics island mapping of the city using temperature data from the City Planners,
sensors for identification of urban heat
islands on GIS Map/Web GIS Map.
11 Environment Visualisation of sensor Visualisation of Sensor Impact Area Using Department officials,
sensor analytics impact area and colour as Impact area Buffer and Change of Buffer City Planners,
per sensor value on web colour as per Change in environments
GIS Map sensor value
12 Environment Environmental Sensor site Identify senor location using Web GIS Department officials,
sensor analytics location optimisation and Software using various parameters like City Planners,
analysis for planning Population density. Industrial area etc
COTS 3D GIS Platform with Geo Analytics Software Platform Specification Compliance
Sl.
No. Specification Compliance
1 COTS GIS platform with 16 core licenses for 3D GIS
The proposed deployed COTS 3D GIS Enterprise Platform should be Industry standard COTS GIS
platform. The proposed deployed 3D GIS platform should have all functions of GIS and Image
feature extraction, geo-processing, image mosaicking, Photogrammetry, sub setting,
classification (supervised, unsupervised) change detection, AI/ML based object Detection
components in a single installed software only. The platform should also have advance modules
like network analysis, terrain analysis, 3D analysis, change Detection, Photogrammetry module,
Raster GIS analysis, SAR processing and 3D analysis.
2
The Proposed solution should be an integrated solution only having GIS, 3D Analytic and Image
Processing components in single COTS Enterprise software. The overall proposed solution should
be of Single GIS Platform only
3
The single integrated platform of GIS platform should have both GIS and Image analysis
components, which going to be deployed at site. It should support 64 bits. It should based on a
Services Oriented Architecture (SOA). The Enterprise GIS software must be OGC certified and
must have the capability to serve and consume OGC complied web services including WMS,
WFS, WCS, CSW, INSPIRE, etc. Licensing policy should not be restricted by hardware/ period or
sites. OEM undertaking should be submitted for further customization of application based on
GIS and Image processing Custom based web application, as per project needs of present and
future. No restriction during hardware upgrade/ scaling in future.
4
Server deployed Software should run as a native 64-bit application and should support Windows
5 64- bit and Linux 64 bits.
The deployed Integrated enterprise platform should have capabilities like geo-processing and
analysis, spatial and statistics analysis and Image analysis functions. It should support server end
Geo processing and Image analysis tools such as supervised classification, Enhancement,
Vegetation Indices, buffer, clip, erase. Provision should be available by server for sending the
request using the web client and display the processed data on web using OGC certified services.
6
The web GIS application should open on any browser and should support cross platform. It
7 should have RestAPI for integration with other applications
The Integrated 3D Enterprise platform should provide a map centric for managing geospatial
content of organization. It should serve as project centric approach to Create, Access, Analyze,
Manage and disseminate geo-spatial content with capability of user management and role-
based access control.
8
3D Enterprise Platform should have rich display and navigation tools like zoom in, zoom out,
fixed zoom in, fixed zoom out, pan, real time pan, bookmark, Geo link multiple views, swipe,
flicker, search by location, cursor location value, etc.
9
Ability for 3D representation of the city or town with LOD1 to LOD4 level details as required.
The 3D platform should have functionality for 3D analysis tools such as Measurement (Distance,
Area, etc.), Dynamic based View shed, Line Profile, Line of Sight, Dynamic Contour, Flooding
simulation, Dynamic Buffer generation of all geometry types. Capability to create slope & Aspect
from terrain model, dynamic water, Dynamic River course, sub-merge analysis, Volumetric
analysis. The software should have capability to create skyline based on observer position and
distance. Model Cut tool for the visualization of object from different directions,
10
The 3D enterprise software should support draping of vector and raster: WMS, WMTS,
KML/KMZ. Facilities to view Shape File, DGN, GPX & Geo-tiff, TIF. Provision to process and
display CEOS SLC and Hybrid Polarimetric data of SAR, DTED, DEM. It should support various data
such as Terrain (DEM, Tiff, DTED etc.. ), 3D Building and animation file i.e CZML Collada - *.dae,
*.obj, *.gltf. Photogrammetry Meshes data derived from UAV. Display of model generated form
Drone, Satellite Stereo Pairs, LiDAR, Point Clouds (LiDAR data *.las, *.laz). Support of Vector data
(GeoJSON, KML, Shape etc.), OGC (WMS, WFS, WCS, etc.), Capable of consume multiple third
party OGC map services for visualization
11
It should have capability to import / export data in various formats like .dwg,dxf, .dgn, .shp
(shape files), coverage file, .mif (MapInfo), .gml, .kml, .gpx. , Geo PDF GeoJSON, H4, H5 formats,
MBtiles etc. Should support ODBC compliance interface with industry standard RDBMS like
PostGRE SQL, Oracle, SQL server, Access etc.
12
The deployed GIS platform should provide a complete set of drawing & editing tools in order to
enable the user to draw & modify any or parts of various geographical objects (point, line and
polygon) on the map. Provision for finding invalid geometry and Polygon Topology error
13
The deployed 3D enterprise Platform should have capabilities like geo-processing and analysis,
spatial and statistics analysis and Image processing functions in a single window. It should have
out of box Geo processing and Image analysis functions like Clip, Erase, Spatial Join, Relate,
Buffer, clip, erase, intersection, dissolve, union, polyline to polygon, summarize, polygon auto
numbering based on line feature and direction, Image classification(supervised, unsupervised),
Image segmentation , Recode, Change detection module, Photogrammetric module, Resolution
Merge, Radiometric correction , Enhancement , Layer stacking, Georeferencing ,Collage Image,
Mosaicking, High pass, Low Pass filter, Fast Fourier transformation,3D viewer with 3D based
analytic tools and AI / ML based Object identification as out of box functions.
14
Software should have the facility for reports generation, customized map layout, high resolution
printing in different formats (jpg, pdf) with desired map scale and customized templates.
15
Should have capability to store the applied legend, color , symbology and further applied in
other GIS projects. Further, provision should be there to export and import the custom
annotation and labelling pattern from one project to other. Thematic mapping like Bivarte,
Multibivarte, chart mapping should be available as out of box. Geocoding and Reverse
Geocoding should be available.
16
Single deployed Platform should must support Time aware data for Trends / Time Series
17 Analysis. Provision should be there for Online and Offline GPS integration.
It should network analysis module to perform Routing analysis, Service Area Analysis, Dynamic
segmentation etc. Capabilities like Dynamic Labelling and Rule based Labelling should be
available
18
The software should have function to perform different operations like: mathematical, logical,
19 string operations on the field of table of vector layer or selected objects of vector.
The software should allow visualization of data in 2D/3D in enterprise application. Provision
should be available to host the 3d project from to browser mode. Facilities to import Satellite
images, LIDAR, Building model. The system should have facilities to store the 3d model which
can be used in future without doing any pre-processing.
20
The 3D GIS Enterprise platform should have out of box provision to generate / create feature on
3d enviourment of all geometry types. Facilities for creation on 2d and 3d symbol should be
there. Additionally, provision to share the 3d scenes is also required.
21
It should have module for terrain analysis and 3D analysis to create/ view - slope/aspect,
22 hillshade, elevation profile, topographic normalize, line of sight and viewshed analysis.
It should have algorithm for surface generation such as heat maps, Linear, IDW and Krigging.
23
The proposed software should support HRSI (High Resolution Satellite Imagery) and low
resolution satellite images (panchromatic & multispectral) such as IKONOS, Quick bird, Geoeye,
Worldview, CARTOSAT, EROS, LISS-IV, LISS-III, AWIFS, RISAT-1 & 2, KALPANA-1, INSAT3A,
INSAT3D, PROVA-V,CEOS,ECW,JP2000, Sentinel, Radarsat, etc..
24
The platform should have capability to process optical satellite data, microwave image data, and
25 Metrological.
The software should have image transformation module such Vegetation Index, Principal
Component Analysis (PCA), Inverse PCA, Pan sharpening, Wavelet fusion, etc.
27
The3D enterprise platform should be capable to process the temporal or time series image data.
To identify encroachment and monitor urban sprawl, software should provide change detection
capabilities as out of box tools such as Basic Change Detection, Advance Change Detection, Auto
Change Detection and Site Monitoring. The advance change detection capability should allow to
ingest multiple input images to find the change. It should also handle the multi resolution
satellite image along with mis-registration. It should have capability of Object Library Creation
for Object Identification and Automatic Feature Extraction (AFE).
28
It should be out of box functions for generation of reports and pie charts maps like bubble, time
29 series, scatterplot matrix. Trees map, box plot, Data plot map.
The platform should have photogrammetric extension which should have facilities for automatic
stereo model by using stereo data from sensors like cartosat , worldview , superview , Astrium ,
Geoeye by using RPC /RPB information. Also, provision should be there for auto mosaicking of
stereo tiles by using sensor information.
30
Provision should be there to create DSM, DTM and Ortho rectify Images from stereo pair. Also
31 provision should there to generate the accuracy report of stereo model.
In large borrow pits, excavation shall be done not less than 165 cms. In depth and
both sides of borrow pit shall be excavated more than 165 cms in depth to keep
5
gradient of bed less than 15 degree with horizontal.
If not possible as stated in sub clause above, alignment of trench shall be changed to
6 avoid borrow pit completely.
7. Location details
Refer Annexure_Location details