2.3.2
Software Scalability
The system software shall be scalable as shown. The software shall have
the capability of managing the total operations of the ESS system capacity
of credential readers, alarm inputs, control outputs, and peripheral
equipment as shown, as governed by licensing agreements. Minimum
requirements for regional server additions shall be driven by bandwidth and
latency calculations provided by the manufacturer of the ESS system.
2.3.3
System Architecture
may dictate the development of an enterprise and regional server
architecture as opposed to system capacity. Provide server and workstation
configurations with all necessary connectors, interfaces, and accessories
as shown.
2.3.4
Real Time Clock Synchronization
The system shall synchronize each real time clock within 1 second and at
least once per day automatically, without operator intervention and without
requiring system shutdown.
2.3.3
Database Definition Process
Software shall be provided to define and modify each point in the database
using operator commands. The definition shall include all parameters and
constraints associated with each sensor, commandable output, zone, facility
interface device, terminal device, etc. Data entry software shall provide
mass enrollment capability, such that multiple devices may be assigned
similar parameters with a single entry. Each database item shall be
callable for display or printing, including EPROM, ROM and RAM resident
data. The database shall be defined and entered into the ESS by the
Contractor based upon input from the Government.
2.3.4
Software Tamper
The ESS shall annunciate a tamper alarm when unauthorized changes to the
system database files are attempted. Three consecutive unsuccessful
attempts to log onto the system shall generate a software tamper alarm. A
software tamper alarm shall also be generated when an operator or other
individual makes 3 consecutive unsuccessful attempts to invoke central
processor functions beyond their authorization level. The ESS shall
maintain a transcript file of the last 5000 commands entered at each
central station to serve as an audit trail. The system shall not allow
write access to the system transcript files by any person, regardless of
their authorization level. The system shall only allow acknowledgment of
software tamper alarms and read access to the system transcript files by
operators and managers with the highest password authorization level
available in the system.
2.3.7
Conditional Command Event
The ESS software shall provide a programmable timeframe and alarm output
for failure of the operator to acknowledge an alarm condition. If an alarm
is not acknowledged within the specified timeframe, the alarm and notice of
lack of response shall be communicated to other stations on the system. If
no other stations are manned 24 hours per day, then an automatic alert must
be provided for security response personnel.
SECTION 13720A
Page 43