BICSI 005-2016 Electronic Safety and Security
BICSI 005-2016 Electronic Safety and Security
BICSI 005-2016 Electronic Safety and Security
BICSI international standards contain information deemed to be of technical value to the industry and are published at
the request of the originating committee. The BICSI International Standards Program subjects all of its draft standards
to a rigorous public review and comment resolution process, which is a part of the full development and approval
process for any BICSI international standard.
The BICSI International Standards Program reviews its standards at regular intervals. By the end of the fifth year after
a standard’s publication, the standard will be reaffirmed, rescinded, or revised according to the submitted updates and
comments from all interested parties.
Suggestions for revision should be directed to the BICSI International Standards Program, care of BICSI.
Copyright
This BICSI document is a standard and is copyright protected. Except as permitted under the applicable laws of the
user's country, neither this BICSI standard nor any extract from it may be reproduced, stored in a retrieval system or
transmitted in any form or by any means, electronic, photocopying, recording, or otherwise, without prior written
permission from BICSI being secured.
Published by:
BICSI
8610 Hidden River Parkway
Tampa, FL 33637-1000 USA
i
ANSI/BICSI 005-2016
BICSI standards and publications are designed to serve the public interest by offering information communication and
technology systems design guidelines and best practices. Existence of such standards and publications shall not in any
respect preclude any member or nonmember of BICSI from manufacturing or selling products not conforming to such
standards and publications, nor shall the existence of such standards and publications preclude their voluntary use,
whether the standard is to be used either domestically or internationally.
By publication of this standard, BICSI takes no position respecting the validity of any patent rights or copyrights
asserted in connection with any item mentioned in this standard. Additionally, BICSI does not assume any liability to
any patent owner, nor does it assume any obligation whatever to parties adopting the standard or publication. Users of
this standard are expressly advised that determination of any such patent rights or copyrights, and the risk of
infringement of such rights, are entirely their own responsibility.
This standard does not purport to address all safety issues or applicable regulatory requirements associated with its
use. It is the responsibility of the user of this standard to review any existing codes and other regulations recognized
by the national, regional, local, and other recognized authorities having jurisdiction (AHJ) in conjunction with the use
of this standard. Where differences occur, those items listed within the codes or regulations of the AHJ supersede any
requirement or recommendation of this standard.
All warranties, express or implied, are disclaimed, including without limitation, any and all warranties concerning the
accuracy of the contents, its fitness or appropriateness for a particular purpose or use, its merchantability and its non-
infringement of any third party’s intellectual property rights. BICSI expressly disclaims any and all responsibilities for
the accuracy of the contents and makes no representations or warranties regarding the content’s compliance with any
applicable statute, rule, or regulation.
BICSI shall not be liable for any and all damages, direct or indirect, arising from or relating to any use of the contents
contained herein, including without limitation any and all indirect, special, incidental, or consequential damages
(including damages for loss of business, loss of profits, litigation, or the like), whether based upon breach of contract,
breach of warranty, tort (including negligence), product liability or otherwise, even if advised of the possibility of
such damages. The foregoing negation of damages is a fundamental element of the use of the contents hereof, and
these contents would not be published by BICSI without such limitations.
ii
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
TABLE OF CONTENTS
PREFACE ....................................................................................................................... xi
1 Introduction .................................................................................................................... 1
1.1 General ............................................................................................................................................................ 1
1.2 Purpose ............................................................................................................................................................ 1
1.3 Categories of Criteria..................................................................................................................................... 1
2 Scope ........................................................................................................................... 2
3 Required Standards and Documents ............................................................................ 3
4 Definitions, Acronyms, Abbreviations, and Units of Measurement ............................ 5
4.1 Definitions ....................................................................................................................................................... 5
4.2 Acronyms and Abbreviations ........................................................................................................................ 9
4.3 Units of Measurement .................................................................................................................................. 10
iii
ANSI/BICSI 005-2016
iv
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
v
ANSI/BICSI 005-2016
vi
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
12 Commissioning ............................................................................................................ 77
12.1 Overview ....................................................................................................................................................... 77
12.2 Documentation .............................................................................................................................................. 77
12.2.1 Overview .................................................................................................................................................. 77
12.2.2 Requirements ............................................................................................................................................ 77
12.3 Cleaning ........................................................................................................................................................ 78
12.3.1 Overview .................................................................................................................................................. 78
12.3.2 Requirements ............................................................................................................................................ 78
12.3.3 Recommendations .................................................................................................................................... 78
12.4 Labeling Components .................................................................................................................................. 78
12.4.1 Requirements ............................................................................................................................................ 78
12.4.2 Recommendations .................................................................................................................................... 78
12.5 Testing ........................................................................................................................................................... 78
12.5.1 Acceptance Testing Plan........................................................................................................................... 78
12.5.2 System Testing ......................................................................................................................................... 78
12.5.3 Acceptance Testing................................................................................................................................... 79
12.5.4 Retesting Equipment and Systems ............................................................................................................ 80
12.5.5 Warranty Periods ...................................................................................................................................... 80
12.6 Additional Commissioning Tasks ............................................................................................................... 80
12.7 Training ......................................................................................................................................................... 81
vii
ANSI/BICSI 005-2016
viii
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
INDEX OF FIGURES
INDEX OF TABLES
ix
ANSI/BICSI 005-2016
x
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
PREFACE
Revision History
May 5, 2013 First publication of this standard, titled ANSI/BICSI 005-2013, Electronic Safety and Security
(ESS) System Design and Implementation Best Practices
May 11, 2016 Revision of ANSI/BICSI 005-2013 published as ANSI/BICSI 005-2016, Electronic Safety and
Security (ESS) System Design and Implementation Best Practices
This standard has the following usability features as aids to the user:
• Additions and changes, other than those for editorial purposes, are indicated with a vertical rule within the
left page margin.
• Deletions of one or more paragraphs are indicated with a bullet (•) between the content that remains
Translation Notice
This standard may have one or more translations available for the convenience of its readers. As translated text may
contain inconsistencies when compared to the original text, if differences between the translation and the published
English version exist, the English text shall be used as the official and authoritative version.
xi
ANSI/BICSI 005-2016
xii
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
1 Introduction
1.1 General
This standard is written in the context that a comprehensive safety and security strategy for a specific project or
property has been developed. The interconnections of these electronic safety and security (ESS) systems are facilitated
once the client requirements have been determined by parties responsible for the development of those requirements.
The designed or recommended system takes into account the environmental constraints in which the electronic safety
and security infrastructure will be installed and operated. This includes consideration of the appropriate safeguards
that may be necessary due to:
• Layout of a particular area
• Environment
• Topology
• Climate
• Current and future types of equipment to be supported
• Type of cabling
• Functionality of the network
• Pathways or spaces over which the cabling will be installed
1.2 Purpose
This standard is written for use in the design and implementation of the structured cabling systems used within
electronic safety and security systems. This standard provides a reference of common technology and design practices,
and is not intended to be used by architects and engineers as their sole reference or as a step-by-step design guide.
This standard may also be used to determine design requirements in conjunction with the system owner, occupant, or
safety and security consultant.
This standard is intended primarily for, but not limited to:
• ESS system owners and operators
• ESS system consultants and project managers
• Architects
• Authorities having jurisdiction (AHJ)
• Engineers
• ESS system installers
1.3 Categories of Criteria
Two categories of criteria are specified - mandatory and advisory.
• Mandatory criteria generally apply to protection, performance, administration, and compatibility; they
specify the absolute minimum acceptable requirements.
• Advisory or desirable criteria are presented when their attainment will enhance the general performance of
the ESS system infrastructure in all its contemplated applications.
Mandatory requirements are designated by the word shall; advisory recommendations are designated by the words
should, may, or desirable, which are used interchangeably in this standard. When possible, recommendations and
requirements were separated to aid in clarity.
1
ANSI/BICSI 005-2016
2 Scope
This standard applies to the electronic safety and security systems that are provided by a physical security
professional. Electronic devices and systems include, but are not limited to:
• Safety systems
• Physical access control
• Video surveillance
• Intrusion detection systems
• Integrated systems
The performance specifications for the electronic safety and security systems are not offered in this standard unless it
relates to the structured cabling systems. For example, desired frame rates and image quality for video surveillance
systems impact the bandwidth of the signal and therefore impact the type of cabling selected. This standard will not
describe the selection of the frame rates and the video quality but will describe bandwidth and cabling considerations
for video content.
2
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
BICSI
• ANSI/NECA/BICSI 607, Telecommunications Bonding and Grounding Planning and Installation Methods
for Commercial Buildings
• ANSI/BICSI 006, Distributed Antenna System (DAS) Design and Implementation Best Practices
3
ANSI/BICSI 005-2016
NFPA
• NFPA 70®, National Electrical Code®
• NFPA 72, National Fire Alarm and Signaling Code
4
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
5
ANSI/BICSI 005-2016
equipment cord A length of cable with connectors on both ends used to join active equipment
directly to other active equipment or the cabling infrastructure.
equipment room An environmentally controlled centralized space for telecommunications and
(telecommunications) data processing equipment with supporting communications connectivity
infrastructure.
fail-latched A property of a locking device that upon the loss of power, the device will latch
or remain latched but does not necessarily restrict movement or access from the
secured side.
fail-safe A property of a locking device that upon the loss of power, the device will
automatically unlock (open) or remain unlocked (open).
fail-secure A property of a device that upon the loss of power, the device will automatically
lock (close) or remain locked (closed).
field of view ’The extent of the observable location or area that is seen at any given moment
from a defined point. For ESS devices, the field of view is typically described as
an angle on a specified plane (e.g., vertical, horizontal) or as a cone within
encompasses two or more planes for which a detector or device will perform its
observation function(s). For cameras, the field of view may also be known as the
angle of view.
fire detection The means of detecting the occurrence of heat, smoke or other particles or
products of combustion.
fire suppression The products, materials, and methods used to control and extinguish an active
fire.
forensic review A property of video surveillance equipment, which denotes that the equipment
has been optimized to provide high resolution recordings of scene content or
digital multimedia content (DMC) captured by the video camera or encoding
device.
horizontal cabling (1) The cabling between and including the telecommunications outlet and
connector and the horizontal cross-connect. (2) The cabling between and
including the building automation system outlet or the first mechanical
termination of the horizontal connection point and the horizontal cross-connect.
(3) Within a data center, horizontal cabling is the cabling from the horizontal
cross-connect (in the main distribution area or horizontal distribution area) to the
outlet in the equipment distribution area or zone distribution area.
horizontal connection point A location for connections between horizontal cables that extend from building
pathways and horizontal cables that extends to building automation systems
(BAS) devices and equipment.
horizontal cross-connect A cross-connect of horizontal cabling to other cabling (e.g., backbone cabling,
active equipment).
hybrid cable An assembly of two or more cables, of the same or differing types of media,
categories designation, etc., covered by one overall sheath.
interconnection (1) A connection scheme that employs connecting hardware for the direct
connection of a cable to another cable without a patch cord or jumper. (2) A type
of connection in which single port equipment connections (e.g., 4-pair and
optical fiber connectors) attach to horizontal or backbone cabling by means of
patch cords or jumpers.
interoperability The ability of two or more systems to communicate and exchange data, while
allowing any of the participating systems to use the exchanged information.
6
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
7
ANSI/BICSI 005-2016
pixel In digital imaging, a single point in a bitmap image, or the smallest addressable
screen element in a display device. It is the smallest unit of a picture that can be
represented or controlled.
proprietary A characteristic of a technique, technology, or device which is owned and
controlled by a company or other party and is thereby only usable or adaptable
as allowed by that party and not deemed to achieve interoperability.
raceway An enclosed channel of metal or nonmetallic materials designed expressly for
holding wires or cables. Raceways include, but are not limited to: rigid metal
conduit, rigid nonmetallic conduit, rigid nonmetallic conduit, intermediate metal
conduit, liquid tight flexible conduit, flexible metallic tubing, flexible metal
conduit, electrical nonmetallic tubing, electrical metallic tubing, underfloor
raceways, cellular, cellular concrete floor raceways, cellular metal floor
raceways, surface raceways, wireways, and busways.
NOTE: Cable tray is not considered a type of raceway.
recognition In ESS systems, a function used to capture and record imagery that may include,
but not be limited to, vehicle license plate recognition, facial recognition, smoke
and fire detection, object recognition, pattern recognition, cross-line detection,
object temporal characteristics, color recognition and trajectory.
recording media Any device or component to which digital multimedia content (DMC) is written,
stored and can be retrieved.
single connector modified A test procedure for a Category 5e/Class D or higher modified permanent link
permanent link plug-ended configuration where the fixed length of cabling is punched down at
the near end patch panel and an eight position modular plug is attached at the
device far end. The test equipment utilizes a test equipment cord on the near end
attached to a permanent link adapter and is directly attached to a channel adapter
at the far end. A consolidation point may optionally be located between the near
and far ends.
soft space In architectural spaces, virtual spaces adjacent to actual spaces that permit
expansion of an actual space into the virtual space if required at a later date (e.g.,
expansion of a telecommunications room). Examples of architectural spaces by
this definition include: storage spaces, conference rooms, unassigned coverage
areas, or other spaces not located within the life safety egress path to allow for
future expansion.
space (telecommunications) An area whose primary function is to house the installation and termination of
telecommunications equipment and cable (e.g., equipment room,
telecommunications room, entrance facility).
telecommunications Any transmission, emission, and reception of information (e.g., signs, signals,
writings, images, sounds) by cable, radio, optical, or other electromagnetic
systems.
telecommunications The receptacle and insertion elements which provide a means of aligning,
connector attaching and achieving continuity between the conductors and optical fibers
used within telecommunication and ICT applications.
telecommunications outlet An assembly of which consists of a faceplate, body, housing, or supporting
bracket, and one or more receptacles or jacks of a telecommunication connector.
telecommunications room A telecommunications space that differs from equipment rooms and entrance
facilities in that this space is generally considered a floor-serving or tenant-
serving (as opposed to building- or campus-serving) space that provides a
connection point between backbone and horizontal cabling.
termination The physical connection of a conductor to connecting hardware.
topology The physical or logical arrangement of a system.
8
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
uninterruptible power supply A system that provides a continuous supply of power to a load, utilizing stored
energy when the normal source of energy is not available or is of unacceptable
quality. A UPS will provide power until the stored energy of the system has been
depleted, or when the acceptable quality of either an alternative source of power
(e.g., generator) or the normal source of power becomes available.
use case A list of steps, typically defining interactions between a role and a system, to
achieve a goal. The actor can be a human or an external system.
varistor An electronic component used to protect circuits against excessive transient
voltages by incorporating them into the circuit in such a way that, when
triggered, they will shunt the current created by the high voltage away from the
sensitive components. Also known as a voltage dependent resistor.
video monitor A type of display for the viewing of live and recorded video. A video monitor
may also be known as a digital panel.
9
ANSI/BICSI 005-2016
Ah ampere-hour
dB decibel
dBA ambient decibel adjusted for frequency
fps frames per second
ft foot
ft2 square foot
GHz gigahertz
Hz hertz
in inch
km kilometer
lbf pound force
m meter
m2 square meter
Mb/s megabit per second
MHz megahertz
mi mile
mm millimeter
N newton
nm nanometer
ppf pixels per foot
ppm pixels per meter
VAC volt alternate current
VDC volt direct current
W watt
10
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
5 Telecommunications Infrastructure
5.1 Overview
ESS systems may either share the collective set of cabling system components, cabling pathways, and related
telecommunications spaces with a traditional voice/data information and communications technology (ICT) network
or use a dedicated ESS network operating in parallel with the traditional voice/data information ICT network.
Regardless of the way that these systems are deployed, telecommunications cabling infrastructure standards and
telecommunications cabling installation best practices should be observed.
This section addresses the best practices for the design and installation of a telecommunications cabling infrastructure
for ESS devices to support a wide range of applications.
The basic elements of the telecommunications infrastructure are the following:
• Topology
• Equipment room (ER)
• Telecommunications room (TR)
• Telecommunications enclosure (TE)
• Backbone cabling
• Horizontal cabling
• Cabling pathways
• Telecommunications outlets and connectors
• Coverage areas
The diversity of ESS services currently available, coupled with the continual addition of new services, means that
there may be cases where limitations to desired performance may occur. When applying specific applications to these
telecommunications cabling systems, the user is cautioned to consult existing codes, regulations, application
standards, equipment manufacturer requirements, and system and service suppliers for applicability, limitations, and
ancillary requirements.
5.2 Topology
5.2.1 Star Topology
5.2.1.1 Requirements Campus Distributor
(Main Cross-Connect)
The topology for horizontal and backbone cabling
shall be configured as a star (horizontal) or
hierarchical star (backbone). See Figure 5-1 for an
example of a hierarchical star topology.
5.2.1.2 Recommendations Building Distributor
Horizontal cabling topology should be planned to (Intermediate Cross-Connect)
allow the deployment of numerous ESS services
within the ICT network. Services and their associated
devices include, but are not limited to: Floor Distributor
(Horizontal Cross-Connect)
• Surveillance and security cameras
• Access control devices Telecommunications
• Intrusion detection sensors and notification Outlet / Connector
devices
• Fire alarm control panels, sensors, and Figure 5-1
annunciators Hierarchical Star Topology
• Other specialty applications (e.g., asset
management, mass notification)
5.2.2 Non-Star Topologies
5.2.2.1 Overview
Non-star based topologies may be used in order to accommodate other ICT services and associated cabling
infrastructure. For example, ancillary systems cabling from a master control panel to a remote device. Examples of
non-star topologies that are commonly used are shown in Figure 5-2.
11
ANSI/BICSI 005-2016
Ring Topology
Bus Topology Tree Topology
(shows secondary cable)
Figure 5-2
Examples of Non-star Topologies
5.3 Spaces
5.3.1 Equipment Rooms
5.3.1.1 Overview
Equipment rooms (ERs) provide connections between ESS equipment and backbone cabling via the campus
distributor (main cross-connect) and house electronic equipment to support devices in the building served. Equipment
rooms are considered to be distinct from telecommunications rooms because of the nature or complexity of the
equipment they contain.
ERs usually house a campus distributor (main cross-connect) or building distributor (intermediate cross-connect). An
ER may also house the floor distributor (horizontal cross-connection) intended to connect coverage areas served by
the ER. An ER may also serve as the interface point for access or service provider facilities.
5.3.1.2 Equipment Room Size and Provisioning
5.3.1.2.1 Requirements
The design and provisioning of the equipment room shall be in accordance with applicable standards (e.g., TIA-569-D,
ISO/IEC 14763-2). The ER shall be able to contain telecommunications equipment, cable terminations, and associated
cross-connect cabling.
An ER shall be sized and provisioned (e.g., power, lighting, backboards, pathways) to accommodate enough space for
all planned equipment, offering suitable access to the equipment for maintenance and administration, including
planned growth based on a five to ten year plan.
ERs shall be climate controlled to help assure proper operation of ESS equipment. This will require the designer to
provide the following information to personnel responsible for the engineering or operation of the applicable
mechanical systems (e.g. HVAC) supporting the ER, in order to ensure proper operation:
• ESS equipment power and heat loads
• ESS equipment manufacturer/vendor specified operating temperature and humidity ranges and limits
Where dedicated ESS equipment rooms are required, ESS equipment rooms shall be planned to accommodate future
expansion on a minimum of one side of the room. Rooms shall be located adjacent to flexible space, also known as
soft space (e.g., storage spaces, conference rooms, unassigned coverage areas or other spaces not located within the
life safety egress path) to allow for future expansion.
12
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
Where ESS equipment is required to share space within an ER or other telecommunications space with components of
other building systems, the installation of the ESS equipment and support systems shall:
• Be dedicated to the telecommunications function and related support facilities. Equipment not related to the
support of the distributor room (e.g., water pipes, HVAC ductwork, pneumatic tubing) shall not be installed
in, pass through, or enter the ER space.
• Comply with the requirements of applicable codes and standards (e.g., NFPA 70) for working space around
electrical service equipment.
• Be sized appropriately to accommodate future planned and unplanned adds, moves and changes as the
project and client requirements demand.
• Be separated from the other equipment in the ER (e.g., on a separate wall or in a separate equipment rack or
cabinet). If ESS equipment shares wall space or equipment rack or cabinet space, ESS equipment shall be
clearly labeled as ESS equipment.
• Be designed to incorporate security measures to restrict unauthorized access to the space (e.g., card reader
access).
5.3.1.2.2 Recommendations
The ER is the recommended space to install the centralized ESS equipment for the building.
The ER should be located as close as practicable to the center of the area served.
Additional space and pathway sizing should be incorporated into the design to accommodate the ESS cabling systems.
Refer to the BICSI Telecommunications Distribution Methods Manual for examples of ER designs.
When multiple ERs are located on the same floor, they should be interconnected by a minimum of one metric
designator 78 (trade size 3) conduit or equivalent pathway.
The ER should not be shared with electrical installations other than those for telecommunications use. Cross-connect
connecting hardware (e.g., patch panels, connecting blocks) intended for use with ESS equipment that is cross-
connected to the backbone connecting hardware should be readily and uniquely identifiable (e.g. use of a different
color than those used for voice and data interconnections or cross-connections).
Each cross-connect jumper or patch cable should be clearly labeled to identify the ESS equipment it serves. The
recommended color codes for cross-connect fields are shown in Table 5-1.
Table 5-1 Recommended Cross-Connect Color Codes For Use at Cabling Distributors
Pantone Color
Color Examples of Services for the Corresponding Colors
Number
Orange 150C Public network demarcation point of access provider service
Green 353C Connections to user side of public network demarcation point
Common equipment such as private branch exchange and local area networks (LANs), network
Purple 264C
switches, network servers, network routers and related data equipment
Terminations of building backbone cabling, first level campus or building backbone emanates
White N/A from the campus distributor (main cross-connect) connecting to a building distributor
(intermediate cross-connect) or floor distributor (horizontal cross-connect)
Terminations of building backbone cabling, second level building backbone emanates from the
Gray 422C building distributor (intermediate cross-connect) connecting to a campus distributor (main cross-
connect) in one direction and an floor distributor (horizontal cross-connect) in the other direction
Terminations of campus backbone cabling, second level campus backbone emanates from the
Brown 465C building distributor (intermediate cross-connect) connecting to a campus distributor (main cross-
connect) in one direction and an floor distributor (horizontal cross-connect) in the other direction
Terminations of horizontal cabling, from the floor distributor (horizontal cross-connect)
Blue 291C connecting to an optional consolidation point and the work area/coverage area serving
telecommunications outlets
Yellow 101C Terminations of cabling serving alarms, security, or energy management systems
NOTE: Industry practice and the AHJ in some areas reserves red for life safety alarm systems
Red N/A
(e.g. fire detection and alarm systems)
Note: Color codes are aligned with standard TIA-606-B, Administration Standard for Telecommunications Infrastructure
13
ANSI/BICSI 005-2016
14
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
Each cross-connect jumper or patch cable should be clearly labeled to identify the ESS equipment it serves. The
recommended color codes for cross-connect fields are shown in Table 5-1.
All TRs should have access to two horizontal cabling pathways on a minimum of two walls.
5.4 Cabling
5.4.1 Backbone Cabling
5.4.1.1 Overview
Backbone cabling facilitates interconnections between the telecommunications rooms or telecommunications
enclosures, equipment rooms, and entrance facilities, whether for one building or a campus. The life span of the
backbone is dependent on the service requirement level of the facility and ensuing changes of the telecommunications
equipment and applications.
5.4.1.2 Recognized Backbone Cabling
5.4.1.2.1 Requirements
Backbone cabling installed within a building shall follow the requirements specified in applicable standards (e.g.,
TIA-568-D series, ISO/IEC 11801-1). The following media types are recognized for use in the backbone cabling
infrastructure:
• 4-pair 100-ohm balanced twisted-pair cabling (e.g., TIA-568-C.2, ISO/IEC 11801-1) Category 5e/Class D or
higher. It is recommended to use Category 6/Class E or higher cabling in new installations.
• Multi-pair 100-ohm balanced twisted-pair cabling (e.g., TIA-568-C.2, ISO/IEC 11801-1) Category 3/Class C
or higher.
• Multimode optical fiber cabling (e.g., TIA-568-C.3, ISO/IEC 11801-1) 50 micron OM3 minimum. 50 micron
OM4 is recommended.
• Singlemode optical fiber cabling (e.g., TIA-568-C.3, ISO/IEC 11801-1) OS1 or OS2 singlemode cabling.
Backbone cabling installed outdoors in a campus environment shall follow the requirements specified in applicable
standards (e.g., TIA-758-B, ISO/IEC 11801-1).
5.4.1.2.2 Recommendations
Backbone cabling design should accommodate a variety of systems that may be deployed using these media. For
example, the use of singlemode optical fiber backbone cabling may be an optimal solution when deploying both a 10
Gigabit Ethernet system for a data (e.g., voice, video) network as well as Ethernet switches for an ESS system.
For each installed ESS service (e.g., security, access control, fire-life-safety):
• Separate backbone cabling for each ESS service should be provided.
• Backbone cabling for each service should be placed in a separate pathway.
• Redundant backbone cabling (as applicable) should be placed in a physically diverse pathway.
While ESS services may share the same backbone as the data and voice network, the applicable AHJ may have
requirements restricting or prohibiting this practice.
Designs for backbone cabling should accommodate projected system and application expansion, as well as increases
in utilization and bandwidth capacity for a life cycle of at least ten years past the commissioning date.
It may be necessary to use more than one medium in the backbone cabling, depending on distance and application.
Refer to the BICSI Outside Plant Design Reference Manual for additional recommendations and information for
campus environments.
5.4.2 Horizontal Cabling
5.4.2.1 Overview
The horizontal cabling is the portion of the telecommunications cabling system that extends from the mechanical
termination in the telecommunications outlet to the horizontal cross-connect in the TR or TE.
Horizontal cabling includes:
• Horizontal cable
• Mechanical terminations,
• Equipment cords, patch cords, or optical fiber jumpers
• Consolidation points (optional)
15
ANSI/BICSI 005-2016
16
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
Table 5-3 Balanced Twisted-Pair Cabling Frequency Range of Interest and Associated Applications
Category / Frequency Range
Associated Applications Notes/Standards
Class of Cabling of Interest
Category 3 / IEEE transmission protocols Multipair cabling and 4-pair cabling, shielded and
1-16 MHz
Class C up to 10BASE-T Ethernet unshielded. Not recommended for new installations.
Category 5e / IEEE transmission protocols Multipair cabling and 4-pair cabling, shielded and
1-100 MHz
Class D up to 1000BASE-T Ethernet unshielded. Not recommended for new installations.
Category 6 / IEEE transmission protocols Most commonly installed cabling. 4-pair cabling,
1-250 MHz
Class E up to 1000BASE-T Ethernet shielded and unshielded.1
Category 6A / IEEE transmission protocols Augmented Category 6, 4-pair cabling, shielded and
1-500 MHz
Class EA up to 10GBASE-T Ethernet unshielded.1
4-pair shielded cabling, overall braid screen with
Category 7 / IEEE transmission protocols individually foil shielded twisted-pairs (S/FTP). Also
1-600 MHz
Class F up to 10GBASE-T Ethernet available in 4-pair shielded cabling, overall foil shield
with individually foil shielded twisted-pairs (F/FTP).2
IEEE transmission protocols
4-pair shielded cabling, overall braid screen with
up to 10GBASE-T Ethernet.
Category 7A / individually foil shielded twisted-pairs (S/FTP). Also
1-1000 MHz Features bandwidth to support
Class FA available in 4-pair shielded cabling, overall foil shield
high definition broadband
with individually foil shielded twisted-pairs (F/FTP).2
transmissions
Notes:
1. Referenced by multiple standards (e.g., TIA-568-C.2, ISO/IEC 11801-1)
2. Referenced by multiple standards (e.g., EN 50173-1, ISO/IEC 11801-1)
17
ANSI/BICSI 005-2016
Media Converters
Switch ESS Device
(in TR)
Figure 5-3
Optical Fiber Cabling With Media Converters
5.4.2.6.2 Configuration
5.4.2.6.2.1 Introduction
Three common configurations for using a copper/optical fiber hybrid cable to connect an ESS device are shown in
Figure 5-4. These are presented to provide an example of the concept, as requirements from the site, end-user, or AHJ
may affect the final acceptability and configuration of components.
Power is supplied to the copper conductors through either a powered media converter or a separate power sourcing
equipment (PSE). At the far end of the cable, a passive media converter converts the signals from the optical fiber
cable to a balanced twisted-pair cable.
5.4.2.6.2.2 Requirements
Use of hybrid cables and the method of sheath sharing shall conform to the requirements of local codes, regulations
and the AHJ.
5.4.2.6.2.3 Recommendations
The supplied voltage to ESS equipment should be within the manufacturers recommended range. Copper conductors
for power should be sized to the load of the ESS equipment, accounting for voltage loss due to the overall length of
the conductors.
NOTE: Increasing the size of the conductors is a method to overcome voltage loss due to the length of the conductors.
Classes of cables for remote-control, signaling, and power-limited cabling may be defined in codes and standards
(e.g., NFPA 70).
5.4.2.7 Coaxial Cabling
5.4.2.7.1 Recommendations
While coaxial cabling has been and may be used for analog video systems, it is not recommended for new
installations. When installing IP cameras that utilize a coaxial-based cabling system, media converters, or baluns
should be used to convert the signal for transmission over a recognized cabling media.
5.4.2.8 Physical Security
5.4.2.8.1 Recommendations
For additional physical layer security for horizontal cabling, see standards such as TIA 5017.
18
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
Powered
Media Converter
Balanced
Balanced Twisted-Pair
Twisted-Pair Cable
Cable
Media Converter
Interconnect/
Patch Panel ESS Device
Power Sourcing
Equipment Balanced
Twisted-Pair
Cable
Hybrid Cable
Copper Conductors for Power
Optical Fiber for IP-based Transmissions
Power Sourcing
Equipment
Media Converter
Figure 5-4
Configuration Examples for Using Hybrid Copper/Optical Fiber Cable to Connect an ESS Device
19
ANSI/BICSI 005-2016
ESS Device
Device
Coverage Areas
ESS Device
Figure 5-5
Example of a Horizontal Connection Point Within a Star Topology
5.4.3.3 Recommendations
HCP design, including location, should be developed in accordance with the security plan of the building.
The HCP should be readily accessible and its location visibly marked allowing for ease of routine maintenance and
reconfiguration. For balanced twisted-pair cabling, in order to reduce the effect of multiple connections in close
proximity on near end crosstalk (NEXT) loss and return loss, the HCP should be located at least 15 m (50 ft) from the
distributor located in the TR or TE.
The use of suspended ceiling space or access floor space for HCPs may be acceptable, provided that the space is
accessible without moving building fixtures, and it is reasonable to assume such space will continue to be in an open
space such as a corridor or hallway.
When an equipment outlet is used, the HCP is optional. In this case, from an architectural perspective, the HCP is to
ESS or BAS cabling what the consolidation point is to commercial building cabling (e.g., TIA-568.1-D).
The functions of a consolidation point and an HCP can be combined within the same zone box. The number of links
served by an HCP should be limited to twelve (12). HCP design will depend on the number of coverage areas served.
NOTE: Spare capacity for future expansion should be considered when determining the size of the HCP.
5.4.4 Power over Ethernet (PoE)
5.4.4.1 Introduction
PoE is a technology that integrates transmitting DC power with data using a structured cabling infrastructure.
NOTE: When optical fiber cabling is used, the power cannot transmit over the fiber itself, rather the signal is transmitted
over the optical fiber. At some point, the transmission medium is converted to balanced twisted-pair using media converters
where power may then be injected into the available copper medium.
IEEE 802.3 defines both the standard PoE power sources to be used with Ethernet standard-based products, as well as
the Power over Ethernet Plus (PoE +) specification which provides capabilities up to 25.5 W. IEEE 802.3bt DTE
Power via MDI over 4-Pair will deliver at least 49W is an approved project objective and is expected to be an
approved standard in April 2017. HDBaseT, a standard for delivery of uncompressed high definition video, audio,
control and power developed by the HDBaseT alliance provides up to 100W of power.
CAUTION: Not all remote powering equipment complies with IEEE 802.3 or HDBase-T standards. Non-compliant
equipment providing higher than standardized power levels may increase cable temperatures. Overheating the cable
beyond its temperature rating may affect the ability of the cable to transmit data.
5.4.4.2 Requirements
PoE cabling implementations shall conform to the requirements of local codes, regulations and the AHJ, both for the
premises and the application being served.
A minimum of one dedicated horizontal cabling link shall be provided for each distinct ESS service.
20
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
5.4.4.3 Recommendations
PoE provides power up to 15.4 W on the switch or midspan side, which translates to a maximum power consumption
of 12.9 W on the device/camera side – making it suitable for most fixed indoor cameras. PoE+ can power a wide
range of powered devices (e.g., PTZ cameras, wireless access points and newer emerging applications) over existing
Category 5e/Class D and higher performing cabling.
Cable bundle size for PoE depends on the power level, cable type (e.g., conductor size, construction), and the
installation condition (e.g., air, plastic conduit, EMT conduit). See TIA TSB-184-A for further details.
5.5 Cabling Pathways
5.5.1 Requirements
All applicable codes, standards (e.g., TIA 568.1-D, TIA 569-D, ISO/IEC 14763-2) and requirements of the AHJ shall
be met. Appendix A of this standard provides a summary of many of the general requirements for specific types of
pathways and is considered a normative part of this standard. Additional requirements specific to pathways for ESS
applications are presented in the following sections.
NOTE: Appendix A also contains recommendations and additional information for pathways, which may be treated as
optional or non-binding.
Each pathway shall be evaluated for risk prior to selecting the means and methods for installing pathway systems.
5.5.2 Enclosures, Pull Boxes and Splice Boxes
5.5.2.1 Requirements
The following requirements apply to the design of ESS enclosures, pull boxes and splice boxes:
• Pull boxes and splice boxes shall be sized in accordance with applicable codes, standards and regulations.
• Covers for pull boxes larger than 0.5 m2 (5 ft2) shall be hinged.
• Pull boxes and splice boxes shall not be labeled indicating that they contain ESS cabling or equipment.
• If locking boxes are required during maintenance, a key control plan shall be provided prior to installation.
• Consider providing mechanical tamper switches for enclosures and fittings with covers in high security areas.
• Enclosures exposed to weather shall be corrosion resistant and meet applicable site specifications for
resistance to moisture and dust entry.
NOTE: See standards, such as NEMA 250, Enclosures for Electrical Equipment (1000 Volts Maximum) and IEC
60529, Degrees of protection provided by enclosures (IP Code), for more information concerning moisture and dust
ingress ratings of enclosures.
• Penetrations of enclosures shall maintain and not reduce the designated enclosure rating (i.e. IP or NEMA
classification)
• Outdoor enclosure penetrations shall be sealed with a sealant approved by the cable manufacturer to prevent
moisture from entering.
5.5.3 ESS Pathway Redundancy
5.5.3.1 Introduction
Properly implemented ESS systems help to assure the protection of people and property. Redundant ESS pathway
designs offer some accommodation in case of catastrophic failures that may occur along the route of one of the ESS
pathways.
5.5.3.2 Recommendations
When diverse ESS pathways are developed, they should be separated from each other by sufficient distance to ensure
that they are not vulnerable to a single outage event. Wherever possible, they should not pass through the same
telecommunications space containing ESS infrastructure.
5.5.4 ESS Pathways between Telecommunications Spaces within a Building
5.5.4.1 Introduction
ESS pathways between telecommunications spaces may be intended for single-tenant occupancy or multi-tenant
occupancy floors in buildings. In some multi-tenant occupancy floor environments, an individual tenant’s ESS
infrastructure requirements may exceed the load and fill capacity of multi-tenant common use pathways or spaces of a
floor in a building. A tenant may want to keep their cabling physically separate from the common pathways and
spaces used by other tenants in the multi-tenant building. This is sometimes referred to as “bypassing” in multi-tenant
buildings. When this type of separation occurs, there is a resulting reduction in the multi-tenant building’s common
pathways and spaces. As the quantity of bypassing tenants increases, so too does the need for a building’s common
21
ANSI/BICSI 005-2016
pathways and spaces to decrease. Without careful management, tenant bypass can effectively exhaust a multi-tenant
building’s fixed and limited pathways and spaces.
5.5.4.2 Requirements
The placement, number, and size of sleeves, slots or conduits to be used shall be determined in conjunction with ICT
personnel.
5.5.4.3 Recommendations
When multiple telecommunications spaces are located on the same floor, they should be interconnected by a minimum
of one metric designator 78 (trade size 3) conduit or equivalent pathway. These recommendations apply to single-
tenant occupancy and multi-tenant occupancy floors in buildings.
5.5.5 ESS Campus Pathways Between Buildings
5.5.5.1 Requirements
ESS campus pathways shall meet the requirements of applicable codes and standards. Where a conduit containing
ESS cabling is to be placed to a device exposed to the weather, care shall be taken to prevent the ingress of moisture,
dirt or other objectionable materials. Care shall also be taken to ensure that moisture will not collect in low points,
which may freeze in some climates and damage the ESS cabling. Nonmetallic conduit shall be UV resistant and
marked accordingly.
NOTE: Refer to the BICSI Outside Plant Design Reference Manual for recommendations and information.
5.5.6 ESS Pathways Serving Equipment Outlets
5.5.6.1 Introduction
Cabling system performance is sensitive to the arrangement of slack cable behind the equipment outlet. The following
requirements and recommendations offer cautionary guidance for the design and installation of cabling infrastructure
associated with ESS pathways.
5.5.6.2 Requirements
Sufficient space shall be provided so that cable bend radius requirements are not violated in equipment outlet
termination spaces. See Tables A1 and A2, located in Appendix A, for cabling bend radius requirements.
5.5.6.3 Recommendations
The location, mounting, and strain relief of the equipment outlet should allow pathway covers and trim to be removed
without disturbing the cable termination. Equipment outlets should be mounted in such a way that they do not reduce
the required pathway cabling capacity.
5.5.7 ESS Pathway Separation from Power and EMI Sources
5.5.7.1 Introduction
Co-installation of telecommunications cabling and power cabling is governed by applicable electrical codes for safety.
Consult with the AHJ for local compliance.
5.5.7.2 Requirements
The separation guidelines offered by applicable codes, standards and regulations and enforced by the AHJ shall be
followed. Several examples of applicable codes and standards that offer separation guidelines include:
• BS 6701, Telecommunications equipment and telecommunications cabling. Specification for installation,
operation and maintenance
• BS 7671, Requirements for Electrical Installations. IET Wiring Regulations
• EN 50174-2, Information technology – Cabling installation – Part 2: Installation planning and practices
inside buildings
• IEC 60364-5-52, Electrical installations of buildings – Part 5-52: Selection and erection of electrical
equipment – Wiring systems
• ISO/IEC 11801-1, Generic cabling for customer premises – Part 1: General requirements
• NFPA 70®, National Electrical Code®
• ANSI/TIA-569-D, Telecommunications Pathways and Spaces
• ANSI/TIA-1005-A, Telecommunications Infrastructure Standard for Industrial Premises
22
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
23
ANSI/BICSI 005-2016
24
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
Figure 5-6
Example Locations of User-Administered and Facility Connection Telecommunications Outlets
Horizontal Connection
Point (HCP)
Coverage Area
Coverage
Horizontal Cable Area Cable
ESS Device
Coverage Area
Horizontal Cable
ESS Device
Figure 5-7
Examples of Facility Connections Using a Modified Permanent Link
25
ANSI/BICSI 005-2016
5.6.2.3 Recommendations
The modified permanent link method is acceptable in the following scenarios:
• In plenum spaces where the outlet or equipment cord are not plenum rated
• Where there is no room for a workstation outlet or equipment cord assembly
• Where it is not safe or secure for an exposed outlet or equipment cord assembly to be installed
• When the customer deems it is not aesthetically pleasing with the design of the facility
• When the ESS cable is enclosed in conduit and the conduit system is directly attached to the ESS equipment
(e.g., IP outdoor camera)
• Where acceptable to the AHJ
• Where its use will not result in mechanical failure of the cable (e.g., repeated motion of a PTZ camera)
5.7 Cabling Installation Requirements
5.7.1 Overview
This section applies to the installation of all forms of recognized cable and connecting hardware including:
• Optical fiber cabling
• Balanced twisted-pair cabling
• Coaxial cabling
5.7.1.1 Requirements
Cabling installation shall conform to applicable standards (e.g., TIA-568-D Series, ISO/IEC 11801-1).
5.7.1.2 Recommendations
Cabling installation should conform to global best practices (e.g., BICSI Information Technology Systems Installation
Methods Manual).
5.7.2 Bonding and Grounding Considerations
5.7.2.1 Requirements
Bonding and grounding shall meet the requirements and practices of the AHJ. In addition, the building
telecommunications bonding and grounding system shall conform to applicable standards (e.g., TIA-607-C,
NECA/BICSI 607, ISO/IEC 30129) requirements. Adherence to cable manufacturers’ bonding and grounding
requirements shall be followed when installing shielded cabling systems.
5.7.3 Transmission Performance Field Testing
5.7.3.1 Introduction
Field testing of installed cabling is typically conducted after balanced twisted-pair and optical fiber cabling links are
installed. These cabling links may be pre-terminated or field terminated.
5.7.3.1.1 Requirements
All installed cabling (e.g., balanced twisted-pair, optical fiber, coaxial cabling), shall be measured with the appropriate
field-test instrument, in accordance with applicable standards. All installed cabling shall meet the field-test measurement
requirements of applicable standards (e.g., TIA 526-7-A, TIA-526-14-C, TIA-568-C.2, ISO/IEC 14763-2).
Field test instruments used to test installed balanced twisted-pair cabling shall meet the requirements of TIA-1152-A
or equivalent standards.
5.7.3.1.2 Recommendations
In a modified permanent link connection utilizing Category 5e/Class D or higher cabling, a single connector modified
permanent link configuration should be measured.
26
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
Configuration 1 – Single connector modified permanent link set up for a modified permanent link without
consolidation point
A fixed length of horizontal cabling terminated to a randomly selected port of the near end patch panel and an eight
position modular plug on the work area/device far end. The field-test instrument shall be fitted with the permanent
link adapter on the near end and a channel adapter on the work area plug far end. (See Figure 5-8)
Configuration 2 – Single connector modified permanent link set up for a modified permanent link with consolidation
point
A fixed length of horizontal cabling terminated to a randomly selected port of the near end patch panel with an
optional consolidation point connector in close proximity to an eight position modular plug on the work area/device
far end. The field-test instrument shall be fitted with the permanent link adapter on the near end and a channel adapter
on the work area plug far end. (See Figure 5-9)
Horizontal Cabling
90 meters
Figure 5-8
Configuration 1: Single Connector Modified Permanent Link Set Up for a Modified Permanent Link Without
a Consolidation Point
27
ANSI/BICSI 005-2016
90 meters
Figure 5-9
Configuration 2: Single Connector Modified Permanent Link Set Up for a Modified Permanent Link With a
Consolidation Point
28
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
5.9.2 Recommendations
Codes may only provide minimum and maximum mounting height. When mounting heights are not specified,
convenience of users should be considered when determining mounting height including users with disabilities.
Typical mounting heights:
• Fire alarm pull station – Not less than 1.1 m (3.5 ft) and not more than 1.2 m (4 ft) above finished floor
(AFF)
• Fire alarm horn/strobe – Not less than 2 m (6.5 ft) and not greater than 2.4 m (8 ft) AFF.
Exception: where low ceiling heights do not permit mounting at a minimum of 2 m (6.5 ft), visible appliances should
be mounted.
• Intercom – 1.2 m (4 ft) AFF
• Nurse call stations – 1.2 m (4 ft) AFF
• Buzzers or bells – 2 m (6.5 ft) AFF or 150 mm (6 in) below ceiling
• Clocks – 2.4 m (8 ft) AFF or 150 mm (6 in) below ceiling
• Access control card/badge reader – 1 m (3.3 ft) AFF
Clients may provide specifications for mounting heights that differ from the typical examples offered above.
5.10 Infrastructure for Wireless Transmission
5.10.1 Requirements
Cabling infrastructure used for wireless transmission within ESS devices shall conform to all requirements of Section 5.
Any distributed antenna system (DAS) used within ESS application shall conform to BICSI 006. DASs shall also
conform to the requirements of the AHJ, codes, and standards for the particular application (e.g., emergency mass
notification, public responder) being served.
5.10.2 Additional Information
Appendix C provides additional information on wireless transmission methods.
5.11 Coverage Area Planning and Density
5.11.1 Introduction
The coverage area refers to the space served by one ESS device.
5.11.2 Recommendations
Each ESS application required for the building project (e.g., security camera, card reader) should be considered in
determining the density of coverage areas and devices. ESS devices may have overlapping coverage areas. For
example, multiple ESS devices may serve the same building space.
For planning purposes, a sufficient number of cabling links should be provided for ESS over the average floor space.
For example, in an office space, a minimum of one cabling link should be provided per 25 m2 (270 ft2) of floor space.
Each cabling link may serve multiple coverage areas.
If the quantity of ESS coverage areas is unknown, use Table 5-4 to estimate the quantity of cabling links
recommended for serving that space. Coverage areas may be served by:
• Centralized equipment located in spaces containing one or multiple distributors
• Distributed equipment located in spaces containing one or multiple distributors
• Local equipment located in the coverage area
29
ANSI/BICSI 005-2016
30
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
31
ANSI/BICSI 005-2016
6.5 Notification
6.5.1 Requirements
Notification devices, such as keypads, audible devices (e.g., speakers, sirens, bells), strobe lights, video monitors,
relays, recording devices and power line carriers, shall be used as part of an IDS. A combination of more than one
type of notification device in a given IDS is possible and permitted by this standard.
When active devices are used, power shall be provided to these devices. When connected to the building’s structured
cabling system, cable length limits shall be observed (See Section 5.4).
6.5.2 Recommendations
An IDS should be monitored by an off-site facility or monitoring station to indicate alarms, or off-normal conditions
so that necessary actions or responses will not be delayed. Communications to a remote site can be accomplished in
many different ways.
32
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
B = Ts × Is + Ta × Ia (6-1)
Where:
B = Battery size (ampere-hour, Ah)
Ts = Required battery run time (hour, h) during Standby
Is = Current draw (ampere, A) during Standby
Ta = Required battery run time (hour, h) during Alarm
Ia = Current draw (ampere, A) during Alarm
6.6.2 Recommendations
When a standard battery backup size for a given total value determined (by applying formula 1) is not available,
battery size should be sized up (this information is usually available in the manufacturer’s literature). When a required
battery runtime is necessary while the panel is in alarm condition, additional calculations should be performed.
Standby runtime is generally a requirement of fire alarm systems (See Section 9).
Control panels should be installed in a secure area with limited or restricted access. Access to the control panels is
usually only needed by installation or service personnel.
33
ANSI/BICSI 005-2016
34
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
35
ANSI/BICSI 005-2016
36
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
7 Video Surveillance
7.1 Overview
Video surveillance is the extension of human vision to areas requiring surveillance. Discussions regarding surveillance
system deployment, integration, monitoring, and convergence often lead to the determination of functional needs.
Some primary applications of this technology include:
• Observation
• Investigation and forensic review
• Recognition of objects (e.g., human faces, license plates)
• Prosecution
• Loss prevention and deterrence
• Intrusion detection and perimeter monitoring
• Access control
• Operations management and resource allocation
• Safety
• Security
This section applies to video surveillance systems deployed for use cases listed in the following text, but may also be
applicable to other uses not cited.
When planning video surveillance systems, like all ESS systems, device performance in unanticipated conditions and
potential interdependencies with other external devices, systems, and infrastructure should be included, as elements to
be addressed for achieving the highest level of fault tolerance possible.
7.2 Generation and Conformance with Use Cases
7.2.1 Scene Characteristics
7.2.1.1 Introduction
The video surveillance system (VSS) use case is defined by the scene characteristics and the specification of the VSS
function(s).
7.2.1.2 Requirements
7.2.1.2.1 Scene
The scene shall be identified to include one or more areas of interest or scene content.
The VSS shall present a scene of interest to a user in sufficient detail to make a decision or perform a task based on
recognition of what is happening in the scene. For example, an end user may wish to be able to read the characters in a
license plate, or determine the identities of individuals at a local convenience store while performing surveillance.
The VSS shall be designed to accomplish one or more specific tasks regarding a scene. The primary functions of the
VSS shall be identified as one of the following:
• Observation
• Forensic review
• Recognition
The VSS scene content criteria shall incorporate resolution, object size, speed, trajectory, scene lighting level, and
required refresh rate.
7.2.1.2.2 Resolution
Resolution, as required by the VSS primary function, and shall be measured in pixels per meter (ppm) or pixels per
foot (ppf). The pixels per meter or foot calculation shall be derived for both horizontal and vertical pixels and is equal
to the imager’s pixel dimensions divided by the corresponding field of view linear dimension (meter or feet).
The use of video cameras and encoding technology with built-in pixel counting shall be considered as an enhancement
to the design process, measurement and verification of pixels on target.
37
ANSI/BICSI 005-2016
38
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
39
ANSI/BICSI 005-2016
40
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
41
ANSI/BICSI 005-2016
VSS devices that utilize PoE shall be provisioned, powered and connected to cabling that conforms to IEEE 802.3. All
PSE shall deliver the power on request from a compatible VSS powered device and maintain operation supervised by
an external management system. Critical failures, such as PSE device failure, shall be monitored by the owner or end
user’s information management, information technology or systems solutions staff. PoE and high power PoE
designations for powered devices and PSEs shall be considered manufacturer specific and not used where devices
compliant with IEEE 802.3 are available. Deployments at higher power levels than these standards shall be
accompanied with an analysis of cabling, cabling installation, supporting cabling accessories, local compliance, and
dedicated data cabling, negating any temperature concerns and guaranteeing safe and consistent operation.
Qualified personnel (e.g., ESS designer) shall:
• Assess the existing or proposed infrastructure / system architecture / network topology / protocol support and
determine the impact on the VSS.
• Recommend specific physical infrastructure improvements as part of the current design or separate project,
capital project, or periodic expansion to accommodate the requirements of the VSS.
• Provide guidance for infrastructure lifecycle management, or the continuous assessment of the facility’s
transmission system to maintain compatibility with the VSS bandwidth, user access, infrastructure-delivered
power, and scalability requirements.
• Consider systems external to the VSS to manage power and connectivity where possible.
These systems shall be known as infrastructure management systems and shall provide intelligent patching
and provision services, using the network to aggregate power usage reporting. The infrastructure
management system shall be necessary for systems expected to exceed 20% expansion.
• Specify the resolution and image refresh rate for network cameras, according to the use case requirement.
• Provide the necessary data to make use of a user’s existing network:
– Estimate bandwidth using approved manufacturer tools and verify with average site conditions with
scene motion.
– Get individual values.
– Prepare bandwidth use and overlay on network device map.
NOTE: Verify expected protocol compliance and performance with user’s network or IT professional (make sure
bandwidth needs and protocol requirements match infrastructure).
• Verify users are satisfied with the workstations’ intended use and expected performance.
• Verify server performance and modify VSS as required.
• Finalize the equipment list with merging components into assemblies by function / purpose.
• Create a matrix of VSS uses and stakeholder responsibilities containing:
– The person and group responsible
– How the responsible group is informed
– Identification of input and support to group responsible
• Make use of virtual local area networks (VLANs) and quality of service (QoS) as much as possible to ensure
minimal impact on shared infrastructure (See Section 5).
• Dedicated infrastructure shall only be used when the ESS designer has shown the shared infrastructure is
over capacity or over-utilized for the use case and the safety management program, security management
program or risk assessment requires same.
• Use these documents and define who is responsible for developing a commissioning statement.
7.7.2 Recommendations
Where illumination is unavailable or poor quality images are rendered by the DMC source, designs should consider
using infrared illumination, HDTV devices capable of supporting low light conditions. Network-based thermal
imaging cameras of the uncooled sensor type, capable of multiple palette rendering, verifying compatibility with the
VSS primary function, should be considered.
42
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
7.8 Authentication of Network Video Cameras for Improved ESS Network Security
7.8.1 Requirements
The non-person entity shall be a network camera capable of streaming DMC. The DMC shall also be known as digital
video content, network video content or digital multimedia evidence. Each of these formats are capable of
incorporating digital data representing audio content, video content, metadata information, location-based information,
relevant IP addresses, recording time, and system time attached to a digital file.
Where applicable by user requirements, the DMC source shall be a network camera incorporating embedded memory,
SD or MicroSD card media. The network camera shall be capable of running a cryptographic algorithm authenticating
the network camera, DMC source originating from the network camera and the DMC user that consumes, stores or
displays the DMC in accordance with an identity, credential, and access management (ICAM) policy. This ICAM
policy shall incorporate a trustworthy process for assigning attributes to a digital identity (DMC source) and to
connect that identity to an individual (DMC user) via a trusted framework.
43
ANSI/BICSI 005-2016
44
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
45
ANSI/BICSI 005-2016
8.2.5 Software
8.2.5.1 Overview
An ACS may use proprietary software, which can limit its interoperability with other systems. Additionally, there may
be licensing requirements based on the number of devices or credential holders expected to use the ACS.
8.2.6 Backup
8.2.6.1 Overview
Backup specifications for the ACS are determined by the length of time the information is intended to be made
available and the amount of data that is intended to be stored. The manufacturer may determine the drive size once the
amount of data required has been established. The ACS server provides long-term secure storage as needed.
8.2.7 Event Recording
8.2.7.1 Recommendations
A means to record and store events in the system should be provided. If the event is on the ACS, the initial events
should be written to the local hard drive. If the event or alarm has a surveillance camera associated with it, the image
should be recorded.
The types of events to be recorded or monitored are part of the initial planning stages of the ACS and may include:
• Door forced open alarm
• Invalid badge read
• Card/badge passback attempts
• Duress alarm
• Fire alarm
• Infant alarm
Once the event is recorded, a means to provide long-term storage and retrieval should be provided. The length of time
that recordings are to be archived may be governed by AHJ guidelines.
8.2.8 Backup Power
8.2.8.1 Recommendations
The ACS power supply should have a backup. All computers should be provided with an UPS that can provide the
required length of operation. The minimum time recommended for an orderly shutdown and saving of all data with a
software/hardware connection to the ACS computers should be fifteen minutes.
The card reader panels should have some type of battery backup for the electronics, and where possible, the doors
controlled by the reader panel. A four-hour backup should be provided for door operation. Depending on the
application and applicable codes, the AHJ may provide requirements for the reader panel back-up.
NOTE: AHJs may require that a door fail-safe when the batteries fail.
If emergency power is available, it may be advantageous to connect the ACS to this source as well as to the UPS.
In addition to backup power recommendations, the ESS designer may request dedicated access control branch circuits
for the primary power source for ACS equipment.
8.2.9 Access Control Workstation
8.2.9.1 Recommendations
The ACS workstation is primarily used for entering system data through some type of GUI into the ACS access
software. The workstation also may be shared for badging functions and visitor management uses. The workstation’s
location should accommodate the intended uses (e.g., visitor management software installation requires locating the
workstation near the facility’s entry point).
The workstation communicates with the access control server over a network, hard wire, or modem connection.
46
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
47
ANSI/BICSI 005-2016
48
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
The AC power input, the power transformer, and all fused power outputs should be enclosed in one lockable enclosure
with tamper switches monitored by the alarm monitoring system. It is recommended that all outputs be individually
fused. If a device or accessory is individually AC powered, more UPS circuits may be needed than when using a
multi-fused power supply. A multi-fused power supply also simplifies placing a UPS circuit by having only one
source for the multiple devices or accessories.
8.4.4 Readers
8.4.4.1 Requirements
Readers shall be placed and installed in accordance to codes and the AHJ, in addition to any requirements pertaining
to the accessibility or interaction by a person (e.g., Americans with Disabilities Act).
8.4.5 Request to Exit Devices
8.4.5.1 Overview
A request to exit (REX, or also known as RX, RTE, or RQE) device is a device installed on the secure side of the door
that allows egress without triggering an alarm. In most ACS, if the door opens from either side without a valid
credential presented to the reader or REX, an alarm is activated. When activated, the REX device sends an REX signal
to the ACS, communicating an authorized exit through the door.
8.4.5.2 Requirements
A REX may be used to unlock a door from the egress side to exit an area, which is commonly performed using
magnetic locks. When an REX device is used for this purpose, its installation and use shall conform to applicable
codes and the AHJ.
8.4.6 Door Contacts
8.4.6.1 Overview
Magnetic door contacts are often used for monitoring an open or closed door. The door contact consists of two
parts - a reed switch and an actuator magnet. The actuator magnet’s pull on the reed switch causes the contacts to
close. The reed switch part of the door contact is generally installed in or on the doorframe near the latch side of the
door. The magnet is generally installed in or on the door near the latch side of the door.
8.4.7 Electrified Door Hardware
8.4.7.1 Overview
Electrified door release hardware is a generic term for electromechanical locking hardware that is released upon an
approval signal. This signal may originate from various sources, such as a simple remote button or the ACS software.
8.4.7.2 Requirements
Electrified door hardware shall meet all applicable codes and requirements of the AHJ.
8.4.8 Fail-Secure/Fail-Safe/Fail Latched
8.4.8.1 Fail Secure
8.4.8.1.1 Overview
Fail-secure hardware goes to a locked state when power is removed from the hardware. It is sometimes referred to as
power unlocked. Power is applied to unlock this type of device. This type of hardware is normally specified for
security purposes as a device failure leaves the door secured.
8.4.8.1.2 Requirements
If a fail-secure device is kept unlocked for long periods of time, the device shall be rated for continuous duty.
8.4.8.1.3 Recommendations
Employing an inline power conditioner to minimize DC voltage surges also is recommended to extend the life of the
device.
8.4.8.2 Fail Safe
8.4.8.2.1 Overview
Fail-safe hardware fails in the unlocked position when power is removed. It is sometimes referred to as power locked.
Power is removed to unlock this type of device. This type of device is normally used in emergency situations when the
door must fail unlocked for life safety egress.
49
ANSI/BICSI 005-2016
8.4.8.2.2 Recommendations
Certain door release devices require power to lock (e.g., magnetic locks). When door release devices requiring power
to lock are used solely for security purposes and there are no life safety issues, backup power is recommended.
8.4.8.3 Fail-Latched
8.4.8.3.1 Requirements
A related term to “fail-secure” is “fail-latched”. Fire-rated door release devices shall be rated fail-secure to avoid
unlatched egress doors. Doors that are fire rated and part of a fire separation (e.g., stairwell doors) shall remain latched
even though they are unlocked.
8.4.8.4 Fail-Secure and Fail-Safe REXs
8.4.8.4.1 Overview
The installation and setup of REX devices that require power have to be carefully planned and performed. If the REX
is set to the fail-secure configuration and power is lost, the REX will not change state, bypass the alarm, or open the
door. If the REX is set to the fail-safe configuration and power is lost, the REX changes state, bypasses the alarm, and
releases the door.
8.4.8.4.2 Requirements
The following items shall be verified when using fail-secure or fail-safe REXs:
• Does the PIR, door release button, or panic button unlock the door when activated?
• Does the door lock automatically on closure?
• Does the ACS detect that the door is open and display this condition?
• Does a local audible alarm sound when the door is opened?
• If required, is video coverage of the door adequate?
• Is an alarm generated if the door is open longer than the preset time?
• Is the fail-safe configuration for proper operation feasible?
• Does the door release when power is lost?
8.4.9 Power to Locks
8.4.9.1 Requirements
Power supplies shall be sized to provide adequate power for the connected devices and have a source of primary
power at their location.
8.4.9.2 Recommendations
Having battery backup to allow uninterrupted operation for a selected period of time in the event of loss of primary
power is desirable.
Certain types of release hardware require specific power supplies because of the initial power inrush necessary to
activate the device. This power may be significantly different from the power necessary to keep the device seated in a
normal operation.
NOTE: This type of power inrush is most commonly seen with electrified exit or panic hardware.
Considerations for selecting voltage should include the following:
• Manufacturer recommendations
• Distance between the power supply and the devices should be calculated to ensure that there is an allowable
level of voltage drop at the device. This level varies with the gauge of the wire run between the device and
the power supply.
• If distance from the power supply causes the voltage drop to be too high, a separate circuit should be
installed. It is not recommended to share the electrical circuits in the room.
• Available power should exceed the sum of the power consumed by the devices by at least 10 percent.
• Power for the door release hardware should be separate from the power for any other electronics.
A metal-oxide varistor (MOV) meeting the ratings for the voltage application should be used across electronic lock
inputs at the door to mitigate the possibility of a reverse current presented by the lock causing damage to the controller
or the lock’s power supply.
50
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
51
ANSI/BICSI 005-2016
52
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
Constant power
source
Control Panel
Secondary power
source
FIRE
Figure 9-1
Basic Fire Alarm System
53
ANSI/BICSI 005-2016
Equipment manufacturers conduct installation seminars on fire alarm systems products to ensure that all equipment is
installed properly and within code requirements. Continuing education related to changes in products, codes, and
regulations helps to assure fire alarm systems professionals to maintain proficiency in design and installation skills.
Classes of fire alarm systems; whether wired, wireless, or IP-based, generally fall into one of three types. These types
include:
• Protected Premises - This system is a closed protected system, meaning the entire system is contained to the
entire campus or single building. This is protected by a single fire and detection alarm system and is under
common ownership and use.
• Supervising Station - This system embellishes on a protected premises system and is continuously monitored
by a central monitoring company for any abnormal events. The central monitoring company is responsible
for dispatching, reporting, or similar functions due to events initiated by the protected premises system.
• Household Fire – This system is typically a residence with sleeping occupancies.
Fire alarm systems contain components that initiate a fire alarm condition by either manual operation, or automatic
operation through the detection of smoke, heat or both. The systems activate notification appliances to alert the
occupants of a building to safely evacuate the area when a fire condition is detected.
Fire suppression systems and their related initiation devices help to ensure active suppression of a fire condition.
These supervisory devices monitor such items as the open and closed position of valves and the pressures and flow
within a fire suppression system, as well as, indicate trouble conditions that would contribute to the system’s inability
to perform as designed. Their functions include notification of personnel for the maintenance of a component or a
break in a circuit.
9.1.2 Recommendations
While every effort is made to ensure the accuracy of the content in this document, it is recommended that designers
/installers of fire alarm systems should check with appropriate fire services professionals and AHJs while considering
national, state and local codes to ensure compliance with all applicable codes and standards.
Installers should be trained in the latest codes and standards and certified under professional development programs
(e.g., National Institute for Certification in Engineering Technologies [NICET]). This type of certification is vital to
the proper installation of the fire alarm system.
9.2 Regulatory
9.2.1 Overview
The fire alarm industry is governed by many codes and standards. The primary standard of this type that applies
within the United States (U.S.) is the NFPA 72: National Fire Alarm and Signaling Code which is published by the
National Fire Protection Association (NFPA). NFPA 70: National Electrical Code is the U.S. electrical code which is
followed by electrical and communications contractors. Additional codes that are coming into play within the fire
alarm market are the International Building Code (IBC) and the International Fire Code (IFC). Each of these codes is
updated on a cyclical basis and it is important to keep up to date on these codes and standards. State and local codes
vary by jurisdiction and it is important to understand and fully comply with these codes as well.
9.3 Risk Assessment
9.3.1 Overview
When preparing a fire alarm system, a risk assessment is typically conducted prior to the design to fully encapsulate
the site specific needs. Some primary considerations include:
• Observation of ignition sources
• Recognition of fuel loads
• Fire containment
• Operational management and resource allocation
9.3.2 Requirements
As with all fire safety issues, a formal risk assessment is required to define the design criteria for fire safety
applications. This risk assessment shall be based on the Emergency Response Plan for each specific site.
54
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
9.3.3 Recommendations
Determining the primary function of the fire alarm system is the first and most critical step in the system design
process. A proper system design should be established to match the needs of the user, comply with national, state, and
local codes and standards, and the approval of the AHJ.
9.4 Fire Alarm Systems
9.4.1 Introduction
The main elements of a basic fire alarm system include the control panel, detection/initiation devices, notification
devices, and battery backup. Each of these main elements are covered in further detail below in this section.
9.4.1.1 Requirements
Fire alarm systems are required in many premises environments (e.g., commercial building, healthcare facilities,
educational facilities, etc.) and can be either wired, wireless or IP based and range from very basic to extremely
complex.
9.4.2 Control Panel
9.4.2.1 Overview
Typically, all fire alarm devices are connected to a control panel. The control panel may contain the power supplies
(normal and backup) required to operate the system and the control logic to cause the appropriate system actions. The
panel can also contain auxiliary relays for interfacing with other building systems, as well as, communication devices
for notifying off‐premises personnel of system conditions.
Fire alarm control panels can be interfaced with various auxiliary building components (e.g., environmental air
handling equipment, smoke dampers, elevators, fire‐rated doors). The proper operation of these components is
essential to the integrity of a building’s fire alarm system.
Fire alarm systems can be configured with a single, central control unit or with distributed control units as the size of
the facility dictates. Some control panels support an additional type of circuit for network communications. These
circuits are used to interconnect multiple control panels to form a distributed fire alarm network.
Fire alarm control panels report three types of system conditions:
• Alarm – Indication that a manual pull station, a detector, or some other alarm‐initiating device has been
activated.
• Supervisory – Indication that a device being monitored by the fire alarm system (e.g., fire sprinkling control
valve) has been changed in a way that affects building occupant safety.
• Trouble – Indication that a fire alarm system circuit has been interrupted or that a device has failed, been
removed, or requires maintenance.
Control units are capable of two‐way communications via analog and digital configurations. They receive, process,
and make decisions based on detection device data. Depending on the programming, the control units transmit
commands to alarm and control devices. Control units are usually microprocessor‐based and require software to
process data and make output selections based on programming.
Control units monitor (supervise) the integrity of the following circuits:
• Initiating device circuits – These circuits connect devices (e.g., manual pull stations, heat detectors, smoke
detectors, fire sprinkling system water flow switches) to the central control panel. These circuits are used to
transmit alarm conditions from the alarm‐initiating devices to the central control panel.
• Notification appliance circuits – These circuits connect audible and visual alarm‐indicating devices to the
central control panel. These circuits are used by the central control panel to provide notification of alarm
conditions to building occupants.
• Signaling line circuits – These circuits connect the central control panel to monitoring equipment at locations
remote from the premises. These circuits are used to notify agencies responsible for responding to alarm and
trouble conditions.
9.4.2.2 Requirements
All panels shall be tested and listed by a nationally recognized testing laboratory (NRTL) for the purpose for which it
is intended.
55
ANSI/BICSI 005-2016
9.4.2.3 Recommendations
Utilize experienced professional fire alarm system designers, such as a Professional Engineer (P.E.) or NICET
certified professional. Refer to applicable codes (e.g., NFPA 72) for specific requirements of a fire alarm control
panel.
9.4.3 Detection/Initiation
9.4.3.1 Overview
Detection and initiation devices are used to provide early warning of a fire hazard in a building or occupancy. These
devices can be single units or be multi-criteria devices. System initiating devices utilized in fire alarm systems include
the following:
• Smoke detection
• Heat detection
• Flame detection
• Fire‐gas detection
• Human detection (e.g., fire alarm pull station)
• Water flow detection
• Supervisory switches (e.g., tamper, pressure)
• Manual alarm stations
9.4.3.2 Requirements
Detection and initiation devices shall be tested and listed by a NRTL for the application.
9.4.3.3 Recommendations
Utilize experienced professional fire alarm system designers, such as a P.E. or NICET certified professional. Refer to
applicable codes (e.g., NFPA 72) for specific requirements of these devices.
9.4.4 Notification Appliances
9.4.4.1 Introduction
Fire alarm notification and signaling appliances protect lives by automatically warning occupants of a fire or related
emergency condition, and signaling the need to evacuate the building or area. To achieve its intended purpose, fire
alarm notification appliances need to function in a way that ensures the signal is correctly perceived and interpreted by
building occupants.
Notification appliances used for fire alarm signaling are almost exclusively designed to operate on low voltage
circuits. They are designed this way to continue to function normally on battery backup power in the event of a loss of
primary power source from the fire alarm system.
The most commonly utilized notification appliances for fire alarm signaling are audible, visible, or combination
audible and visible appliances. Notification appliances are manufactured in a wide variety of appearances, designs,
and configurations, but are generally classified in the following categories:
• Audible appliances – bells, chimes, horns, speakers
• Visible appliances – strobes, digital signage
• Audible and visible appliances – chime/strobes, horn/strobes, speaker/strobes
9.4.4.2 Audibility/Intelligibility for Notification Appliances
9.4.4.2.1 Overview
Historically, the only requirement for notification appliances has been to meet audible criteria to notify building
occupants of a fire emergency (e.g., sound from a horn). Over time, the fire alarm systems have evolved to include
voice commands as a feature of the notification appliance. With the addition of voice commands, systems are now
designed to be not just audible, but intelligible. Please note in the new 2016 Edition of NFPA 72, non-listed speakers
can be used when a fire alarm speaker does not meet intelligibility requirements.
Many fire codes and standards now state that voice messages be intelligible, however they do not expressly define
required levels of intelligibility. ISO 7240-16 Fire detection and alarm systems — Part 16: Sound system control and
indicating equipment introduces the concept of a common intelligibility scale to assist engineers in designing
intelligible systems. An additional source of information on intelligibility is the latest edition of the National Electrical
Manufacturers Association’s (NEMA) SB-50, Emergency Communications Audio Intelligibility Applications Guide.
56
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
9.4.4.2.2 Requirements
Public mode signaling shall achieve output levels of at least 15 dB above the average ambient sound level or 5 dB
above the maximum ambient sound level, whichever is greater, lasting at least 60 seconds in duration.
Systems shall be designed based on actual measurements of ambient sound conditions and be intelligible.
Occupancies that involve sleeping arrangements require notification appliances that comply with a 520 Hz tone alarm
to notify occupants of an alarm condition.
9.4.4.2.3 Recommendations
Utilize experienced professional fire alarm system designers, such as a P.E. or NICET certified professional. In
designing an emergency voice system, an experienced professional in sound system design is recommended.
9.4.4.3 Visibility of Notification Appliances
9.4.4.3.1 Overview
Codes and standards have taken a prescriptive approach in describing visible requirements, which makes design of
visible notification appliances a straightforward procedure. Even with these prescriptive requirements, a designer is
expected to be cautious when designing these systems due to the various interior design schemes (e.g. furniture
placement, high utilization of modular furniture systems, etc.).
9.4.4.3.2 Requirements
Fire alarm systems designers and installers shall refer to applicable documents for guidance related to codes and
standards compliance (e.g., NFPA 72 has explicit guidelines on placement and functionality of visible notification
appliances).
Devices shall be tested and Listed by a NRTL for the application.
9.4.4.3.3 Recommendations
A visible notification appliance is considered by codes to project its luminance outward evenly in all directions.
Therefore, a wall‐mounted appliance with a coverage pattern that extends an equal distance on either side of the
device is recommended.
9.5 Communications Systems
9.5.1 Overview
With the convergence of building technology systems, fire alarm systems are being integrated with communications
systems. Whether it is a paging system or an integrated emergency communications system, many codes (e.g., NFPA
72) now offer provisions to incorporate and interface a fire alarm system with these other building technology
systems.
Please note if the paging or emergency communications system is not interfaced to the fire alarm system, code
requirements (e.g., NFPA 72) may not apply; however, system designers can use codes as a guideline when designing
these systems. Codes are not designed to prohibit new technologies from being used, rather they are implemented for
life safety purposes.
9.5.2 Requirements
When designing any emergency communications system, a risk analysis is required. The risk analysis is based on the
emergency response plan which is site specific. The AHJ shall approve the final system design.
Paging or emergency communications systems used for fire alarm notification shall meet the requirements of
applicable fire alarm regulations and codes (e.g., NFPA 72) in addition to those of the paging or emergency
communications system
9.5.3 Recommendations.
Designers should consult with the AHJ when introducing new technologies to show they meet or exceed code
requirements.
If fire alarm speakers do not meet intelligibility requirements, other speakers may be used. However, it is
recommended to have supervision of the speakers. As many of these systems can be quite complex, it is recommended
to get the AHJ involved during the beginning design phases of the project.
57
ANSI/BICSI 005-2016
There are several guidelines that have been published to help in the design of these emergency communications
systems. These include the following:
• Partner Alliance for Safer Schools PASS Safety and Security Guidelines for K-12 Schools
• NEMA SB-40 Communications Systems For Life-Safety in Schools
NOTE: PASS is a volunteer alliance among the Security Industry Association (SIA), the National Systems
Contractors Association (NSCA) and other industry professionals. The PASS K-12 team was formed for a singular
purpose—to provide school administrators, school boards, public safety and security professionals with guidelines
for a tiered approach to securing schools. These guidelines are the first of their kind in the education industry.
9.6 Pathways
9.6.1 Introduction
Codes may classify fire alarm systems signal pathways into various classes based on a number of criteria. The
following requirements and recommendations are based on content from the NFPA 72 code.
NFPA 72 defines various pathways as any circuit, conductor, optical fiber, radio carrier or other means connecting
two or more locations. Based on their performance, pathway designations fall into one of the following
• Class A – includes a redundant pathway, and operational capability continues past a single open. A single
open fault and any other conditions that affect the intended operation result in an annunciation of a trouble
signal. A single ground fault does not affect operational capability but will also be annunciated as a trouble
signal. These pathways are commonly used for notification and signaling line circuits.
• Class B – does not include a redundant path, and operational capability stops at a single open. Conditions
that affect the intended operation result in an annunciation of a trouble signal. A single ground fault does not
affect operational capability but will also be annunciated as a trouble signal. These pathways are also
commonly used for notification and signaling line circuits.
• Class C – includes one or more pathways, and operational capability is verified via end-to-end
communications, but the integrity of individual paths is not monitored. A loss of end-to-end communication
is annunciated as a trouble signal. These pathways are typically used with addressable devices and
appliances.
• Class D – has a fail-safe operation where no fault is annunciated, but the operation is performed in the event
of a pathway failure. An example of use for these pathways would be to a magnetic door holder.
• Class E – not monitored for integrity. These pathways are normally used for supplemental equipment only.
• Class N – includes two or more pathways where operational capability of the primary pathway and a
redundant pathway to each device are verified through end-to-end communications. (Exception: When only
one device is served, only one pathway is used). A loss of intended communications between
endpoints are annunciated as a trouble signal. A single open, ground, short, or combination of faults
on one pathway do affect any other pathway. Conditions that affect the operation of the primary
pathway(s) and redundant pathway(s) are annunciated as a trouble signal when the system’s minimal
operational requirements cannot be met. Primary and redundant pathways are not permitted to share
traffic over the same physical segment.
• Class X – includes a redundant pathway, and operational capability continues past a single open, a single
short circuit, a ground fault and a combination open fault and ground fault. All result in the annunciation of
a trouble signal. Any other condition that affects the intended operation of the path is also annunciated
as a trouble signal. These pathways are typically used for signaling line circuits. There is one exception:
requirements for ground faults do not apply to non-conductive pathways (e.g., wireless, optical fiber).
9.6.2 Class N
9.6.2.1 Introduction
With the emergence of building technology systems convergence, Class N was added to the 2016 edition of NFPA 72.
Class N impacts the installation of structured cabling infrastructure systems when it is used in conjunction with a fire
alarm system; therefore, this document will address this particular class of cabling in greater detail than the other
classes previously listed.
NFPA 72 defines the requirements for Class N, but does not define the technology or techniques required to
comply with those requirements.
58
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
59
ANSI/BICSI 005-2016
60
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
9.7.2 Requirements
Based on an evaluation of performance capabilities under abnormal conditions, the governing laws, codes, standards
and a site-specific engineering analysis, determines the class of circuit to be used. The designed system shall comply
with national, state, and local codes and standards.
Devices shall be tested and listed by a NRTL for the application.
9.7.3 Recommendations
Experienced professional fire alarm system designers, such as a P.E. or NICET certified professionals, experienced
with national, state, and local regulations and requirements of the AHJ, should be consulted to help assure compliance
with applicable regulations and requirements.
9.8 Monitoring and Supervision
9.8.1 Overview
Fire detection and alarm system circuits are typically designed to be continuously monitored (supervised) to ensure a
system’s integrity. This supervision feature helps facility owners maintain systems in an operable condition and
ensures the systems will provide the life safety functions for which they are installed.
In zoned systems, supervision is typically accomplished by current sensing. The central control panel supplies
(sources) a small current that continually circulates through the system’s circuit. The interruption of the circuit (e.g.,
removal of a detector or manual station) will cause current flow to change. The control panel, sensing a change in
current, will initiate a trouble signal to indicate a problem has occurred with the system.
In addressable systems, supervision is accomplished by electronic polling of individual devices. In response to a
query, each device reports its status to the central control panel.
Fire detection and alarm systems may be required to monitor or control auxiliary building components that are not
part of the system. Examples of such components include:
• Fire and smoke dampers in heating, ventilating, and air conditioning (HVAC) ductwork
• Door closers (kickers) for doors in fire‐rated partitions
• Flow devices on fire sprinkling equipment
An IP based system is inherently monitored and supervised in that the system is constantly checking end-to-end
communications.
A monitoring or control module is used to interface these auxiliary components with the central control panel. Circuits
that connect monitoring and control modules to the fire detection and alarm system control panel are supervised in the
same manner as are detectors and manual pull stations. However, the interface circuit between a monitoring or control
module and the auxiliary building component being controlled is usually unsupervised. These unsupervised circuits
have the potential to be a weak link in the overall system of supervision.
Monitoring/supervision of the various classes of fire alarm systems include:
• Protected premises system
This type of system can be locally or remotely monitored by the client or maintenance personnel but is not a
supervised station class of system.
• Supervising station system
This system is continuously monitored by a central monitoring company for any abnormal events.
• Household fire alarm system
Residential occupancies that contain fire-warning equipment provide a reliable means to notify the occupants
of the presence of a fire and the need to egress to a safe location.
Remote Monitoring may be provided by:
• IP-enabled fire alarm system
• Network‐based monitoring
• Digital alarm communicator transmitter (DACT)
• Supervising station system
• Central station service
61
ANSI/BICSI 005-2016
9.8.2 Requirements
Designed system shall comply with national, state and local codes and standards.
Monitoring for integrity between enclosures containing control equipment located within 6 m (20 ft) of each other
where the conductors are installed in conduit or equivalently protected against mechanical injury is NOT required.
9.8.3 Recommendations
Experienced professional fire alarm system designers or engineers experienced with local regulations and
requirements of the AHJ should be consulted to help assure compliance with applicable regulations and requirements.
9.9 Power over Ethernet (PoE) Implementation
9.9.1 Overview
Fire alarm equipment and devices designed to function on Class N may be powered from PoE.
9.9.2 Requirements
PoE devices shall comply with Section 5.4.4.
9.9.3 Recommendations
Refer to section 5.4.4 for a list of recommendations.
9.10 Class N Operations and Maintenance
9.10.1 Overview
Scheduled maintenance and abnormal operations shall be logged and reported in accordance with the 2016 edition of
NFPA 72.
9.10.2 Requirements
Refer to the 2016 edition of NFPA 72.
9.10.3 Recommendations
Experienced professional fire alarm system designers or engineers experienced with local regulations and
requirements of the AHJ should be consulted to help assure compliance with applicable regulations and requirements.
9.11 As-Built Drawings and Related Documentation
9.11.1 Overview
As-built drawings and related documents are important to the overall success and acceptance of the project. Refer to
the AHJ and governing laws to make sure you have all of the required documentation to complete the project.
9.11.2 Requirements
Accurate as-built drawings shall be provided by the installer showing the actual installation when the work is
complete. The drawings shall reflect the pathways utilized. The as-built drawings shall contain a copy of all
manufacturer’s data sheets, system software, and device database. The as-built drawings shall also include battery
calculations and NAC calculations.
9.11.3 Recommendations
Installers and designers should always follow project documents, manufacturer's recommendations and applicable
codes and regulations. As-built drawings should utilize a set of industry recognized symbols or project specific
symbols (e.g., NFPA 170).
62
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
10 Integrated Systems
10.1 Overview
This section includes concepts, systems, and processes related to the integration of ESS systems. Integration of ESS
systems allows various systems to share information, command, and control with a range of other systems, including:
• Data networks
• Building automation
• Fire-life-safety
• Energy and lighting management
• Automated infrastructure management (AIM) systems
Integrated ESS systems are deployed in many environments, including:
• Cities
• Facilities
• Campuses
• Vehicles
• People
These integrated systems can utilize common infrastructure, input, output, or data networks for information
transmission, including both wired and wireless information technology systems.
Integrating various IP based systems across multiple sites have been observed to provide the following benefits:
• Number of servers and storage requirements lowered
• Reduction in false alarms in video surveillance areas
• Risk mitigation by expediting maintenance and repair
• Time required investigating security incidents reduced
• Reduction in maintenance, monitoring and control costs
• Virtualization and emergence of new solutions
• Simplified user training
NOTE: A site's specific conditions may affect the ability to meet these values.
63
ANSI/BICSI 005-2016
64
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
65
ANSI/BICSI 005-2016
Figure 10-1
Sample Physical Security Information Management System
66
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
67
ANSI/BICSI 005-2016
68
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
69
ANSI/BICSI 005-2016
10.4.3.2 Recommendations
The maps should be configured such that any additions to the system are readily incorporated.
The AHJ can provide input as to future plans, but the system maps should be configured to match the expansion
capability of the system hardware as installed. The addition of event or alarm icons to the maps may necessitate a
reconfiguration of the mapping system.
10.4.4 System Response Times
10.4.4.1 Requirements
The response times shall be calculated for peak use times. Distributed processing reduces the response times
significantly.
10.4.4.2 Recommendations
The system response times should be calculated because they are an effective tool in determining the need for lighter
system loading on a distributed system. The goal of system response times is to determine the processing and
reporting times for alarms or system requests.
10.4.5 System Expansion Capability
10.4.5.1 Overview
The expansion capability of the system hardware is based on the as-built and future expansion capability. The as-built
capability is the number of available physical connections, including:
• Inputs
• Outputs
• Card readers
The future capability is how much the system can be physically expanded by adding hardware.
The physical layout impacts the system expansion.
10.5 ESS Integration Process
10.5.1 Overview
In order to properly define and integrate multiple systems, operational and functional requirements are necessary.
These requirements are the framework for the integrated system. They will be the basis against which all system
expectations and testing will be measured.
Defining how the system is intended to behave is the most important step in the integration process. How each
individual system is put together will impact the ability to make the systems work together. Each system will have to
meet applicable standards and codes in addition to how the end user wants the system to function as a whole.
Before the design process begins, general requirements for how the final system configuration will function are
expected to be defined. These general requirements can range from very simple to very complex.
10.5.2 Integration Process Team Members
10.5.2.1 Introduction
In order to properly define the process and generate the proper documentation to integrate various ESS systems, a
team of knowledgeable persons and project stakeholders needs to be established.
10.5.2.2 Recommendations
Project stakeholders should include:
• ESS designer
• Operations personnel
• Information technology (IT) personnel
• Key facilities personnel
• Security personnel
• End users
• Financial stakeholders
70
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
71
ANSI/BICSI 005-2016
72
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
73
ANSI/BICSI 005-2016
10.5.3.3.3 Verification
10.5.3.3.3.1 Introduction
There are steps to set up each verification configuration, including, but not limited to:
• Tuning of the hardware
• Configuring and starting the software
• Starting the special test software
• Set-up steps at each external system to be used
There are steps to be taken by the ESS designer for each verification case. Each step includes:
• Operator action to be taken
• Expected results
• Pass / fail entry space
The ESS designer records whether or not the expected result occurred. If the expected results are not
observed, then the procedures for dealing with failures are contained in the Testing and Verification Plan.
• A trace of each verification step from a verification case in the applicable verification plan and a trace from a
requirement in the applicable requirements document.
10.5.3.3.3.2 Recommendations
If possible, acceptable limitations should be documented. These documents should be dated and treated as a living
document. As parties on the project change, the functional description can be used to introduce new members to the
project. Once an initial functional description is filed, a method for changing the document should be devised and
implemented.
Once the general system description has been developed, the engineering and design process for the integrated system
should begin. If the system is not a legacy system, all of the subset systems should be designed with the overall
integration in mind.
Each system can be designed independently and may account for additional recommendations for integration prior to
design completion. As these systems are built, any inherent flaws or newly exposed issues can be investigated and
changes can be implemented to the functional description, if necessary.
Obtain references of operational systems that meet the same system requirements (or similar requirements) and
request the ability to contact the end user. Discuss the limitations of any item that may impact the system
functionality. An existing process will not necessarily work when trying to implement an integrated system with new
technologies.
The architectural design should be reviewed and evaluated for spacing requirements, control room layouts, and access
points. The design of the individual systems also should be in accordance with the need to integrate them together.
Panel locations and network connections become important when trying to eliminate cabling or cross-system
connection points.
74
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
75
ANSI/BICSI 005-2016
76
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
12 Commissioning
12.1 Overview
Commissioning is often one of the most neglected aspects of system installation. A system that is properly tested and
commissioned will provide the ESS designer, installer, and client with a system that functions correctly, meets the
client’s requirements, and can help foster a continuing professional business relationship between the ESS designer
and client for future work.
Commissioning an ESS system should clearly identify real and potential issues with the physical security systems and
the affiliated subsystems during all phases of the project.
Commissioning verifies that the ESS systems operate consistent with the contract and specification documents and
must include:
• Operation and maintenance documentation.
• Cleaning.
• Labeling devices, cabling, and equipment.
• Testing, adjusting, and settings.
• Training for client personnel.
12.2 Documentation
12.2.1 Overview
Clients and contractors alike often overlook the importance of this commissioning documentation, which is critical for
the successful operation and maintenance of the installed system.
12.2.2 Requirements
Documentation must be produced to support each phase of the commissioning process, including the preliminary
testing and calibration plan. The plan must include each device in the system (e.g., access control devices, door
position switches, intrusion detection points, video cameras, intercoms). The plan must be based on the
manufacturer’s standard written commissioning procedures and include the manufacturer’s standard field checkout
sheets as part of the final project documentation.
In addition to testing each device, the commissioning technician shall also test all system bonding and grounding,
copper cabling, and optical fiber cabling.
12.2.2.1 Operation and Maintenance Manuals
The operation and maintenance manuals must include detailed installation, operating, troubleshooting, and
maintenance procedures. Security contractors should not simply submit manufacturers’ user manuals as the required
documentation. It is important that security contractors also prepare site-specific instructions for routine and
emergency operations and maintenance.
The operation and maintenance manuals also should contain complete warranty information, including the client’s
responsibilities for maintaining the warranty in full force. Warranty cards or other documents that are required to be
returned to the manufacturer must be completed by the security contractors and mailed back with copies provided in
the final documentation given to the client. The manufacturers of each system component must be listed along with
contact details and part numbers, including any custom manufactured components.
Additionally, any certifications provided by the manufacturer that indicate compliance with any regulatory
requirements, codes, or standards shall be included in the operation and maintenance manuals.
12.2.2.2 Record Drawings
Record drawings setting out as-built conditions of the systems must be included in the manuals. As-built drawings are
shop drawings and consolidated information from the marked up set showing the final as-built conditions. These
drawings are to be used and kept current throughout the life of the system.
Record drawings should contain the manufacturer and model number of each component as well as its location and
orientation, raceway, and cable tray locations and sizes. The record drawings must also include the identification of
each component and cable termination that corresponds with the cable labeling and component nameplates.
Equipment loading schedules, clearly identifying terminations and spare capacity, are also a critical part of accurate
record drawings that are invaluable in the maintenance and future moves, adds, and changes (MACs) to the system.
77
ANSI/BICSI 005-2016
12.3 Cleaning
12.3.1 Overview
A major task in commissioning security systems is the cleaning and removal of dust, dirt, and temporary covers.
12.3.2 Requirements
All devices and enclosures, including those used in outdoor applications, must be inspected to ensure that the finish
has not been damaged during the installation. The cleanliness of the system must be maintained by the security
contractor until the date of completion and final acceptance by the client for all of the work.
12.3.3 Recommendations
All foreign debris should be removed from the equipment and enclosures. The cleanliness of outdoor mounted video
surveillance camera domes is extremely important and should be regularly maintained.
12.4 Labeling Components
Labeling the equipment and cables is a vital part of ESS system commissioning. Labeling will support the relationship
between components and as-built or record drawings and prove their value in future repair, troubleshooting, or MACs
of an ESS system.
12.4.1 Requirements
Components require labeling with identification numbers or letters that accurately correspond to the drawings. Cables
must be marked with machine-printed permanent labels at each end. Cables and terminations should be marked in
accordance with applicable standards (e.g., TIA-606-B, ISO/IEC 14763-2).
Labels and identification plates affixed to rack- or wall-mounted ESS equipment shall be located so that they are
easily read. Electrical circuits feeding ESS equipment must be clearly identified at electrical receptacles, junction
boxes, and distribution panels.
12.4.2 Recommendations
Enclosures and other large components typically should have engraved plastic or metal identification plates.
12.5 Testing
12.5.1 Acceptance Testing Plan
The acceptance testing plan will be used by the client during the final acceptance test as part of the turnover
documentation.
12.5.1.1 Requirements
Testing documentation must include full details of all commissioning tests as well as factory testing reports provided
by the manufacturer with the equipment.
The plan needs to include checklists and procedures with specific areas for recording and documenting all tests and
inspections and a summary statement and signature block at the end of the plan.
12.5.1.2 Recommendations
Clear acceptance testing guidelines should be provided in the construction specification documents. The guidelines
must define the performance requirements for the ESS system.
The test plan forms and checklists should list any deficiencies and fully document the test results of each acceptance
test performed. The client should also document all observed tests and create a punch list of deficiencies that need to
be corrected and retested.
12.5.2 System Testing
12.5.2.1 General
Testing occurs in the stages described in the following sections, with each section having additional requirements or
recommendations.
12.5.2.1.1 Testing Requirements
Equipment must be calibrated according to the manufacturer’s recommendations and whenever damage is suspected.
Calibration certification must be kept on record and copies for each tester provided in turnover documents.
78
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
79
ANSI/BICSI 005-2016
80
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
• Verifying that surveillance cameras are properly positioned to capture the required event video information.
An ESS designer should ensure that the recordings are time and date coded and saved in a digital video
recorder with sufficient data storage capability, in a secure location, and connected to a backup power supply.
• Verifying that all of the electrical (e.g., door locks, request to exit) and mechanical hardware (e.g., crash
hardware) at all of the access points function in accordance with the manufacturers’ specifications. An ESS
designer should verify that low-voltage cables are not exposed and that all equipment is installed in lockable
cabinets. All card readers and keypads should be tamper proofed.
• Systems (e.g., IDS) might perform differently under various weather conditions; therefore, they should be
tested to the fullest extent possible under all conditions.
A “defeat the system” test may be required by a client to verify system hardware and software integrity prior to
acceptance of the system.
If any failures in the electrical or mechanical operation of the ESS system are noted, a retest must be scheduled. A
corrective action plan must be established, and a retest should be performed with passing results and added to the
documented file.
During the system’s operation, all event logs should be regularly analyzed, and repeat events should be decreased or
eliminated. The security system performance should be retested periodically to ensure that all functions comply with
the original specifications.
12.7 Training
Typically, the system training is the responsibility of the system’s integrator or installation contractor. The goal of the
following information is to provide a holistic view of an ESS project and explain how an ESS design may affect the
system’s operation.
For more information on training, see Appendix E.
81
ANSI/BICSI 005-2016
82
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
A.1 Overview
This section describes the telecommunications cabling pathways and related telecommunications spaces necessary to
support ESS systems. ESS is one of several subsets of systems covered by the term “telecommunications”. While the
scope of this standard is limited to the telecommunications cabling, pathways, and spaces associated with ESS
systems, this standard significantly influences the design of other building services, such as electrical power. This
standard also provides minimum requirements for the size of telecommunications spaces in support of ESS systems.
When designing and installing cabling pathways, it is important to ensure that the route is verified to drawings and
specifications prior to actually installing the cabling pathway support structures.
Cabling pathway system design and implementation involves the cabling pathway (e.g., cable tray, conduits, ducts,
open spaces using non-continuous supports [J-hooks]) and the locations of related telecommunications spaces (e.g., an
ER that provides access to cable and connecting hardware, ESS equipment and their interconnection or cross-
connection to ESS cabling systems). Cabling pathway components are expected to accommodate all standards-
compliant cabling and the potential need for change during the life cycle of the cabling system and building.
This standard offers a number of pathway design alternatives for ESS pathways and spaces. Qualified ESS systems
designers are responsible to select the appropriate ESS pathway infrastructure system design based upon the ESS
applications to be supported.
The backbone cabling pathways are those portions of the telecommunications cabling pathway system that permits the
placement of backbone cabling between the building entrance location and all additional telecommunications spaces
within the building (e.g., equipment room, telecommunications room, telecommunications enclosure). The horizontal
cabling pathways are the portions of the telecommunications cabling pathway system that permits the placement of
horizontal cabling between the horizontal cross-connect (floor distributor) typically located in the TR and potentially
passing through the optional HCPs and terminating at equipment outlets located in a coverage area.
Designers and installers are expected to ensure that the cabling pathways and spaces:
• Allow for the accommodation of change over the facility’s life cycle with the goal of reducing long-term
maintenance and operational costs.
• Consist of standards-based methodologies and components.
• Meet or exceed applicable codes, standards, regulations, and complies with AHJ rulings.
Cabling pathways may include:
• Continuous cabling pathways (e.g., conduit, cable tray, surface raceway) used for containment of
telecommunications cabling.
• Non-continuous cabling pathways (e.g., J-hooks) through which cabling is placed between physical support
or containment components.
A.2 Types of Cabling Pathways
A.2.1 Introduction
There are many types of cabling pathways. While this standard is not intended to define a list of approved cabling
pathway types, this standard does address the use of cabling pathways specifically for the purpose of distribution of
ESS cabling. These cabling pathways may be used exclusively throughout a project or in combination with any
number of additional cabling pathways. The following is a list of cabling pathways, which includes:
• Cable tray (e.g., solid bottom, ladder, mesh, center spine, etc)
• Non-continuous pathways (e.g., J-hooks)
• Conduit (e.g., metallic, non-metallic)
• Surface raceway (e.g., metallic, non-metallic)
• Duct (e.g., wall duct, floor duct, trench duct, cellular floor)
• Access floor (also referred to as raised floor, computer room floor)
• In-floor systems such as floor boxes, poke throughs (e.g., concealed access, flush access, surface access)
• Catenary (e.g., cable suspended from its end points used to attach cabling)
83
ANSI/BICSI 005-2016
This appendix does not restrict nor endorse any particular type of metallic or non-metallic cabling pathway products
or systems. For any questions related to specific cabling pathway types or applications that may not be approved for
use, consult with the AHJ.
A.2.1.1 Requirements
Except where otherwise specified, all cabling pathways shall adhere to the specifications of relevant cabling and
containment standards (e.g., TIA-569-D, CENELEC EN 50174-2, ISO/IEC 14763-2).
All of the following general cabling pathway requirements shall be met:
• ESS pathway types, sizes, and configurations shall accommodate the initial installation of ESS cabling and
related bend radius requirements, with an allowance for 100% growth.
• ESS pathways shall not be located in elevator shafts or other locations that may require specialized
tradespersons to permit access to the ESS pathways.
• ESS pathway specifications shall accommodate the applicable seismic zone requirements in accordance with
the AHJ.
• Where premises cabling is intended to be used, building ESS pathways shall be installed in “dry” locations.
• Where outside plant (e.g., campus) or indoor/outdoor cabling is intended to be used, building ESS pathways
shall be suitable for use in the type of environment (e.g., damp, dry, wet) in which they are installed. See
applicable codes, standards or regulations (e.g., NFPA 70 Article 100) for definitions of damp, dry and wet
locations.
• Firestop assemblies, where required, shall be maintained when penetrated by cables, wires, and ESS
pathways. See the specifications of relevant cabling pathways and containment standards (e.g., TIA-569-D,
CENELEC EN 50174-2, ISO/IEC 14763-2) for additional guidance.
Regardless of the type of cabling pathway(s) that are selected for a given project, the telecommunications cabling
bend radius and pulling tension requirements shall be met. See Table A-1 below for balanced twisted-pair cabling
bend radius and pulling tension requirements. See Table A-2 below for optical fiber cabling bend radius and pulling
tension requirements.
Cable manufacturers bend radius and pulling tension requirements may vary from Table A-1 and Table A-2. Where
bend radius and tension requirements vary, values used should be the most conservative (i.e., largest applicable bend
radius, smallest tensile load).
The maximum depth of telecommunications cabling (e.g., balanced twisted-pair, optical fiber) installed in cabling
pathways shall not exceed 150 mm (6 in) for a solid bottomed cable tray pathway regardless of the depth of the cable
tray pathway.
For cabling pathway systems that are not solid bottomed, the maximum depth of installed cabling shall be determined
by the spot loading and pressure it exerts on the support points of the pathway system. See Table A-3 for maximum
allowable cabling stacking height in cabling pathways.
Table A-1 Balanced Twisted-Pair Cabling Bend Radius and Pulling Tension Requirements
Required Minimum Inside Required Minimum Inside Recommended Maximum
Cabling/Cord Types Bend Radius Under No Load Bend Radius Under Load Tensile Load Under Load
(No Stress) (Stress) (Stress)
4-pair, balanced twisted-pair One times the cord cable One times the cord cable Follow manufacturer
patch/equipment cord outside diameter outside diameter specifications
4-pair, balanced twisted-pair Four times the cable’s outside
See Note 1 110 N (25 lbf)
cables diameter
Multipair balanced twisted- Follow manufacturer Follow manufacturer Follow manufacturer
pair cables specifications specifications specifications
Note 1: Consult the applicable cabling standard(s) applicable at the site, as well as manufacturer’s recommendations for the specific cable.
84
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
Table A-2 Optical Fiber Cabling Bend Radius and Pulling Tension Requirements
Minimum Bend Radius While Minimum Bend Radius While
Cable Type and Installation Maximum Tensile Load
Subjected to Maximum Tensile Subjected to No Tensile Load
Details During Installation
Load (During Installation) (After Installation)
Inside plant horizontal cable
220 N (50 lbf) 50 mm (2 in) 25 mm (1 in)
with 2 or 4 fibers
Inside plant cable with more 20 times the cable outside 10 times the cable outside
Per manufacturer
than 4 fibers diameter diameter
Indoor/outdoor cable with up 20 times the cable outside 10 times the cable outside
1335 N (300 lbf)
to 12 fibers diameter diameter
Indoor/outdoor cable with 20 times the cable outside 10 times the cable outside
2670 N (600 lbf)
more than 12 fibers diameter diameter
20 times the cable outside 10 times the cable outside
Outside plant cable 2670 N (600 lbf)
diameter diameter
Drop cable installed by 20 times the cable outside 10 times the cable outside
1335 N (300 lbf)
pulling diameter diameter
Drop cable directly buried, 20 times the cable outside 10 times the cable outside
440 N (100 lbf)
trenched or blown into ducts diameter diameter
85
ANSI/BICSI 005-2016
A.2.2.2 Requirements
When cable tray is installed and attached to any building structure, it shall be supported at intervals specified by the
manufacturer. These support intervals may depend on the load the cable tray is designed and manufactured to support.
Cable trays of all types shall be bonded per the AHJ requirements whether the cable tray is used for electrical power
wiring, telecommunications cabling (includes ESS cabling) or both.
Cable tray fill ratio shall not exceed 50%. The maximum fill depth of any cable tray shall be 150 mm (6 in).
Cable trays installed above equipment rack and cabinet heights, shall protrude straight into the telecommunications
space (e.g., ER, TR), without a bend, at a height that is in accordance with the customary practices of the location
where the installation takes place. For example, it is customary in many parts of the United States to place the cable
tray system at least 2.4 m (8 ft) AFF.
A.2.2.3 Recommendations
Cable tray pathways addressed here may be located below or above the ceiling or within an access floor system in
either plenum or non-plenum applications.
Cable tray pathways should provide fixed or movable dividers to separate ESS cabling from electrical cabling.
Movable dividers are more advantageous than fixed dividers because they can dynamically accommodate change over
the lifecycle of the building.
A.2.3 Non-continuous Pathways
A.2.3.1 Introduction
Non-continuous pathways (e.g., J-hooks) provide a base that is wide enough to distribute the cable bundles weight to
prevent damage. They may be constructed of metal, plastic, or fabrics and have various configurations for use in
different environments. Sizes are available to support a variety of cable bundle sizes.
A.2.3.2 Requirements
Non-continuous pathway devices shall not be spaced more than 1.5 m (5 ft) apart, on centers.
These non-continuous pathway devices shall not be attached to the ceiling grid support system or any other support
system that is not exclusively provided for the purpose of fastening the non-continuous pathway devices.
Non-continuous pathway devices shall be securely attached to the building structure or to support structures directly
attached to building structure. Specifications concerning the weight carrying capacity of the attachment device and the
support system may be subject to plan review by the AHJ. Designers and installers shall be prepared to demonstrate
compliance with applicable codes and regulations to satisfy the AHJ that the system is capable of supporting the
calculated weight at the maximum fill of the system.
Inaccessible ceiling areas, such as lock-in type ceiling tiles, drywall or plaster ceilings, shall not be used as
distribution pathways. Ceiling tiles shall be of the removable or lay-in type. In the event that the ESS pathway
transverses inaccessible areas, a permanent pathway shall be installed as a part of the building construction that is
sized to accommodate the maximum possible number of telecommunications cables anticipated to pass through such
space.
Cabling shall not be laid directly on the ceiling tile or ceiling rails or in any support structure or support system that is
not specifically and exclusively designed for the purpose of supporting telecommunications cabling.
A clear vertical space of at least 75 mm (3 in) shall be provided between the non-continuous pathway devices and the
ceiling tiles and ceiling grids.
A.2.3.3 Recommendations
Areas above ceilings may be used as ESS pathways for telecommunications cables as well as spaces for connecting
hardware where allowed by the AHJ.
Non-continuous pathways (J-hooks) should be installed on a spacing of 1 m (3 ft) to 1.5 m (5 ft) centers, additional
supports may be required. Non-continuous pathways (J-hooks) should be capable of providing the following features:
• Individual color-coding to distinguish between types of services supported (e.g., ESS cameras, ESS access
control, fire-life-safety wiring).
• Capability of stacking in series and mounting in back-to-back configurations in various environments (e.g.,
threaded rod, I-beam, side of wire basket tray, wall, ceiling, floor).
• Option for a wire/cable retention device to help contain wires/cables within the device.
• Rounded edges to help avoid damage to wires/cables placed or pulled through device.
86
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
87
ANSI/BICSI 005-2016
Factory-manufactured metallic conduit bends instead of field-manufactured metallic conduit bends are recommended
when conduit installation applies. There are two disadvantages of field-manufactured metallic conduit bends:
• Specialized equipment is used to accomplish the required angle of bend.
• Field-manufactured bends typically result in an elliptically shaped cross-section, rather than being completely
round like factory-manufactured metallic conduit bends.
In the event a field-manufactured metallic conduit bend becomes elliptical, it should be replaced or de-rated to the
next smaller trade size conduit for cable fill calculation purposes.
If conduit bodies are used, a telecommunications style conduit body with a smooth internal bend radius for preventing
cable damage should be used in place of the electrical style conduit bodies.
Cable pulling tensions may be reduced by using lubricants. Care should be practiced in lubricant selection, taking into
consideration compatibility with cable jacket composition, safety, lubricity, adherence, stability, and drying speed.
A.2.5 Surface-mounted Pathways (Perimeter Raceways)
A.2.5.1 Introduction
Perimeter raceways are surface-mounted pathways, often installed at baseboard, chair-rail, or ceiling height, that may
contain power and equipment outlets. Surface raceway systems may be used as a distribution system within and
between rooms and may extend from building pathways to furniture pathways to connect furniture partitions or
furniture systems. Surface mounted raceway passing between rooms or penetrating walls are expected to conform to
the requirements of the AHJ in terms of fire and acoustical ratings.
This type of raceway is available in metallic and non-metallic materials and in many sizes and configurations. This
raceway is typically available in two sections - a base and a cover. The base is installed on the floor, wall, or ceiling
surface using fasteners. The cabling is installed and then the cover is installed over the top of the cabling. Typically,
the cover is held in place by snapping it over the base. Some surface raceways include bend radius control to ensure
compliance with minimum bend radius requirements of telecommunications cabling.
Secure raceway systems are also available. There are generally two types of secure raceway systems:
• Physically secure
– Covers slide onto the base(s) at access points consisting of lockable surface boxes; the covers cannot be
removed without access to the boxes.
– Covers may be secured to the base with fasteners employing a “safety screw” type head requiring special
tooling to tighten or remove.
• Electronically secure
– Tamper detection software and hardware are used to identify a potential security breech.
A.2.5.2 Requirements
When outlets of any type are provided as part of a perimeter raceway system, the outlet height shall comply with the
requirements of the applicable codes, standards, and regulations (e.g., ADA).
Electrical style surface raceway corners (e.g., inside corners, outside corners) shall not be used with
telecommunications cabling (e.g., balanced twisted-pair, optical fiber) due to potential cable bend radius violations
that may be caused by the use of electrical style surface raceway corners.
Telecommunications style surface raceway corners (e.g., inside corners, outside corners) shall be used with
telecommunications cabling (e.g., balanced twisted-pair, optical fiber). Such systems provide smooth rounded corners
to accommodate the bend radius requirements of such telecommunications cabling.
Surface raceway systems consist of bases, covers, associated fittings, and accessories. Fittings (e.g., coupler, corner,
end cap, adapter, device box) shall be used to connect, change direction, or terminate a surface raceway. Accessories
shall provide the means of mounting specific or generic devices (e.g., service area outlet, conduit connection) either
internal or external to the raceway system.
Surface raceway systems shall be configured as either single-channel or multi-channel systems. Single-channel
systems shall be designed and used for either telecommunications cabling or power cabling. Multi-channel systems
shall contain divider wall(s), either pre-configured or modular.
For planning perimeter pathways, the maximum pathway fill shall be 40%. Pathway (raceway) fill is calculated by
dividing the summation of the cross-sectional area of all cables by the most restrictive cross-sectional area of the
raceway system (typically located at 90 degree corner sections). This fill capacity does not consider the additional
constrictions caused by service area outlets.
88
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
Single lengths of metallic surface mounted raceway sections shall be bonded and grounded in accordance with
applicable codes, standards and regulations (e.g., NFPA 70) as well any additional requirements of the local AHJ. In
addition, adjacent sections shall be contiguously bonded to one another as a function of product design or with
external bonding conductors.
A.2.6 Duct Raceway Pathways
A.2.6.1 Overview
Duct raceway pathways may include wall duct, underfloor duct, trench duct, cellular floor and other types of duct
raceway pathways not listed here.
Wall duct is a flush, in-wall raceway system designed to support electrical and communications cabling infrastructure.
Its primary advantage over conduit is its cabling lay-in features. Wall duct offers continuous covers so cables can be
installed, and later accessed and changed, by simply removing the covers.
Underfloor duct systems include a network of metal raceways embedded in concrete, which facilitates the distribution
of horizontal cabling (e.g., between TRs or TEs and work areas).Trench duct is a flush, in-floor raceway system
designed to support electrical and communications cabling infrastructure. It is commonly used as a feeder for the cells
of a cellular steel floor system, a feeder for the distribution ducts of an underfloor duct system and a flush self-
contained raceway system for computer room areas, laboratories, and medical imaging facilities.
Cellular floor systems are generally utilized for in-floor raceway design in elevated steel framed construction. The
cellular floor structural members support the concrete floor slab, with the cells becoming the distribution raceways.
Cellular floor systems are typically fed from the floor serving TR by trench headers, which have removable steel
cover plates at the top of slab elevation. Preset inserts and afterset inserts are the two methods used for work area
activation. Cellular floor systems may also be used for slab-on-grade applications to maintain the large feed and
distribution areas typical of elevated floor design.
A.2.7 Access Floor Raceway Pathways
A.2.7.1 Introduction
Access floor systems consist of modular floor panels supported by pedestals, an assembly of pedestals and stringers,
or an integral pedestal and floor panel. Access floor systems are typically used in telecommunications spaces such as
the computer room area within a data center. Access floor pathways may include systems referred to as raised floors
or computer room floors and other types of access floor pathways not listed here.
A.2.7.2 Requirements
Minimum clearance between the top of the cabling pathway system and the bottom of the access floor tile in cabling
pathways under an access floor shall be 75 mm (3 in).
When used in a telecommunications space (e.g., ER, TR), the minimum finished floor height shall not be less than 150
mm (6 in) above the slab.
A.2.7.3 Recommendations
The minimum finished height of access flooring is a variable that may depend on the selected access flooring
manufacturers’ range of products, the use of the access floor system and the access floor system location.
When access flooring is used in:
• General office areas, the finished floor should be 200 mm (8 in) high or higher. This height is necessary to
provide sufficient space for cable trays and other means of cable management.
• A computer or control room environment where the plenum is used for heating, ventilating, and air
conditioning (HVAC), the finished floor height should be 300 mm (12 in) or greater.
Regardless of the height of the finished floor, a minimum of 50 mm (2 in) of free space should exist between the top
of the cable tray side rails and the underside of the stringers. If cable trays with covers or raceways are used, the free
space above the tray should allow for easy removal of covers.
For cable management, the following methods of containment for main runs should be considered:
• Dedicated routes
• Enclosed raceway distribution
• Zone distribution
• Cable trays
• Cable matting
89
ANSI/BICSI 005-2016
NOTE: Applicable codes, standards, regulations, and AHJs should be consulted for compliance with flame spread and
smoke index properties of cables used in cabling pathway systems.
Connecting hardware or telecommunications equipment should not be placed in the access floor space. The only
allowable exception is for connecting hardware as part of a consolidation point or HCP.
The space under an access floor may be used as an air-handling plenum for distributing conditioned air throughout the
room or, in some cases, the entire office area. Compliance with AHJ should be anticipated.
If the space under an access floor is not used as an air-handling plenum, most codes allow certain types of
telecommunications cables to be used without special enclosure requirements. This is also true for an above-ceiling
interstitial space that is not used for air handling.
Proper placement of cable trays and telecommunications cabling in the space under an access floor is essential to
ensure that adequate airflow is maintained. The underfloor air space should not be blocked by cable bundles thereby
causing air dams.
In office areas, code requirements may be different for telecommunications spaces (e.g., ERs or TRs) where special
fire suppression systems may be installed.
Whenever possible, the floor plan should be designed so that the telecommunications space (e.g., ER or TR) is
adjacent to the access floor area that it will serve. Threaded sleeves or conduit or equivalent should connect the
telecommunications space to the access floor area.
If the telecommunications space and the access floor area it serves are not adjacent, other connection methods should
be considered. The interconnecting pathways should adequately serve the access floor area.
The manufacturer’s guidelines should be consulted to ensure compatibility between access floor components and
service fittings. Firestop integrity should be maintained in all rated building structures that are penetrated by cabling
or pathways.
All metal parts of an access floor should be bonded to ground. For bonding and grounding, follow the access floor
manufacturer’s guidelines and all applicable building and electrical codes and standards.
A.2.8 In-floor System Pathways
A.2.8.1 Introduction
In-floor system pathways may include product categories referred to as floor boxes or poke throughs offering
concealed access, flush access or surface access. In-floor systems pathways may also include systems not listed here.
A.2.8.2 Requirements
For planning in-floor system pathways, the maximum pathway fill shall be 40%.
A.2.8.3 Recommendations
The manufacturer’s guidelines should be consulted to ensure compatibility between in-floor system components and
service fittings. Firestop integrity should be maintained in all rated building structures that are penetrated by cabling
or pathways.
A.2.9 Catenary Pathways
A.2.9.1 Overview
Catenary pathways are generally defined as metallic or non-metallic cables suspended from its end points used for the
purpose of attaching cabling.
A.2.10 Utility Columns (Power Poles)
A.2.10.1 Overview
Utility columns provide pathways for wires and cables extending from the ceiling to the service area.
A.2.10.2 Requirements
When utility columns are used, the main ceiling rails shall be rigidly installed and braced to overcome movement,
both vertical and horizontal.
A.2.10.3 Recommendations
Utility columns should be attached to and supported by main ceiling support channels. They should not be attached to
the transverse or short length channels unless they are also rigidly secured to the main support channel.
90
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
91
ANSI/BICSI 005-2016
92
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
B.1 Introduction
The ability to use and integrate the various practices, methodologies, and devices constitutes the practice of safety and
security design. Many elements of design are unique to the protection of life and property, and others are
multidisciplinary.
The ESS designer should have a firm grasp of the fundamentals and be able to incorporate aspects of the trades
brought into the ESS design by other professionals. Depending on the expertise or knowledge of the ESS designer,
additional support may not be necessary. The physical and electronic safety and security should work as a
comprehensive package. The ESS designer should understand how they influence each other to have a successful
project.
B.2 Elements
B.2.1 Access Control
Access control is important for overall personal safety and the protection of physical and intellectual property. Access
control devices can include entry point locks, integrated electronic devices controlling a single door or room, or a
complex system of interconnected electronic devices controlling a zone, building, or campus. ESS designs can be
affected by each individual’s location and the level of security desired.
B.2.2 Intrusion Detection
Intrusion detection is often viewed as part of the access control system because most door controls for access control
can alarm when the door is left open or opened without a valid card read. However, it is a stand-alone system that
should be evaluated to its own standards and levels of due diligence.
These systems use everything from simple switches to complex devices that detect motion, heat, glass breaking, or
other nonstandard occurrences in the area to detect the presence of persons in secure zones. Intrusion detection
systems can generate simple local or paging alarms or can be integrated with other systems to provide more active
responses (e.g., turning on cameras or lighting).
B.2.3 Surveillance
Video surveillance is a widely used technology within ESS systems. Video surveillance involves the use of cameras
for watching or controlling assets. It is the process of image:
• Capturing
• Transmitting
• Processing
• Viewing
• Recording
This technology requires knowledge of cameras and their placement, as well as knowledge of image transmission and
recording principles.
B.2.4 Fire Detection and Alarm
Fire detection and alarm involves the early detection and notification of life safety threats. Fire detection and alarm
requires that the ESS designer have a thorough knowledge of specific codes, statutes, and the requirements of the
applicable AHJ.
93
ANSI/BICSI 005-2016
94
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
95
ANSI/BICSI 005-2016
96
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
C.1 Overview
Wireless transmission can aid in meeting the needs for rapid deployment of ESS systems and devices, such as
intrusion detection systems and surveillance cameras. These technologies can be limited to line of sight applications,
requiring careful site surveys to determine potential signal obstructions.
A formal risk assessment and security master program will identify the appropriate deployment of wireless
technologies. Security master plans may not allow the use of wireless technologies due to the critical nature of the
transmitted data.
Wireless frequencies are used for specific applications. Some examples of wireless technologies are:
• 900 MHz and orthogonal frequency division multiplexing (OFDM) technologies for outdoor multipoint
• 2.4 GHz for in-building wireless
• Above 40 GHz for short-haul, high-speed PTP communications
Three primary types of wireless technologies are used for transmitting video signals:
• Radio frequency
• Free space optics
• Microwave
C.2 Radio Frequency Transmission
C.2.1 Introduction
RF transmission typically uses low-power unlicensed radio transmitters and receivers to convey the surveillance
signal and typically operates in the 2.4 GHz or 5.8 GHz band.
Unlicensed wireless network equipment has less power output than licensed equipment. The 2.4 GHz and 5.8 GHz
frequency bands are used for wireless deployments for the unlicensed spectrum. Although the spectrum range below
2.4 GHz has unlicensed space available, these frequencies are used primarily by amateur radio operators, 900 MHz
wireless Internet service providers, and SCADA communications. The unlicensed frequencies above 5 GHz are used
primarily in short-range, high-speed, PTP communications at ranges of 1.6 km (1 mi) or less.
Among the unlicensed spectrum, 2.4 GHz and 5 GHz are the most popular for wireless PTP and point-to-multipoint
data networks. The frequency 2.4 GHz is primarily an indoor standard for multipoint, and 5 GHz is primarily for
outdoor PTP and high-speed multipoint. There are 5.3 GHz technologies available for both PTP and multipoint links,
as well as for indoor applications.
C.3 Free Space Optics
C.3.1 Introduction
Free space optics utilize many of the same principles for transmitting video signals that an optical fiber cabling system
does. However, the media is open space rather than a strand of optical glass. A light source is modulated with the
surveillance images and projected through a lens to a receiver some distance away. The light source is then gathered
by another lens and focused on a photosensitive cell for demodulation. The primary drawback is the failure of the link
to operate in environmental extremes (e.g., heavy rain and fog).
These systems are typically utilized for disaster recovery and to provide redundancy to an existing system.
97
ANSI/BICSI 005-2016
98
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
D.1 Overview
The term cloud computing is used to describe all types of Internet-based resources and services, including storage.
While the concept of cloud computing originated in the 1950s, it was not until the early 2000s when high-capacity
networks, low-cost computers and storage devices, and the growth of the Internet provided the catalyst for the
widespread adoption of hardware virtualization and service-oriented architecture.
The main enabling technology for cloud computing is server virtualization. Server virtualization is the process of
running multiple operating systems (OS) simultaneously in a single server. Virtualization software is used to share the
physical resources of the server among the virtual environments. Instead of operating several servers at a light load,
their OS can be installed virtually in a single server (referred to as server consolidation). As long as the consolidated
server has adequate physical resources (e.g., processing capacity, memory), the migration from physical to virtual is
transparent to users.
Cloud computing provides flexibility in how certain functions of an ESS system may be provided by removing the
need for specific site infrastructure, equipment, and support.
D.2 Services
Within cloud computing, a specific function is generally called a service. The type of service may vary, and some may
not have an easily recognizable connection to cloud computing. However, a generally accepted nomenclature has
evolved to impart some clarity where services provided by the cloud function are expressed as X as a service (XaaS).
While X may represent anything, X also may be replaced by the first letter or combination of letters of the
specific service provided, including:
• S (software).
• I (infrastructure).
• P (platform).
• DC (data center).
• SEC (security).
The most established service of cloud computing is software as a service (SaaS), which can be deployed generally
across all systems or specific to a particular system.
D.2.1 Software as a Service (SaaS)
Within SaaS, cloud providers install and operate application software in the cloud, and users or equipment access this
software from cloud clients. Cloud users do not manage the cloud infrastructure and platform where the application
runs, which eliminates the need to install and run the application on the user’s own computers and simplifies
maintenance and support.
The ESS designer has a growing diversity of SaaS solutions where security and safety applications and data may be
delivered through the cloud.
D.2.2 Physical Access Control as a Service
Physical access control as a service can offer transaction data of users entering or exiting a facility. It also makes
available card, biometric data, and visitor management services in the case of managed access control systems (ACS).
The emergence of the mobile device credential will continue to become a consideration by large card populations as a
way to reduce costs.
The following are examples where door entries recorded and managed by the ACS are useful cloud-based services:
• The user has external doors that are unlocked or unsupervised and pose a risk to the facility.
• Video clips of anyone entering a door within a specific timeframe can be captured and stored off-site.
• Other problem areas can be monitored easily without the major investment required by digital video
recorders (DVRs).
99
ANSI/BICSI 005-2016
100
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
101
ANSI/BICSI 005-2016
102
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
103
ANSI/BICSI 005-2016
Current evolving capabilities that further extend the security framework of the network infrastructure components to
the VSS include creating a trust model or high-assurance identity and access control framework that uses a security
technique known as public key infrastructure (PKI) to implement cryptographic requirements for authenticating
nonperson entities (NPEs) such as cameras or other DMC sources. Through PKI, video is encrypted during
transmission over fixed and wireless networks as well as stored in mobile, network attached, or cloud-hosted storage
repositories.
Authenticating NPEs in accordance with certificate and credentialing management standards is under development
and will permit these devices to attain high trust levels and deliver DMC to users on public or private networks.
The validation of trusted network devices also makes bandwidth management easier and is a logical companion to
network management systems.
D.7 Trends
Big data are data sets so large and complex that they are difficult to process by traditional applications. The capture,
management, and analysis of data go beyond typical structured data, which can be queried by relational database
management systems. Big data have come from advances in mobile devices and other sources of DMC-like network
cameras. Users are collecting and keeping much more data than they did a decade ago.
Big data are characterized by volume, variety, and velocity:
• Volume is the amount of data.
• Variety refers to the wide-ranging types of data.
• Velocity refers to the speed of data processing or the required retrieval of archived information.
With big data volume varying from megabytes to exabytes, depending on the variety, the ESS
designer can furnish educated estimates of storage solution requirements.
However, data velocity is more challenging to model as security and safety professionals may have changing data
retention policies and forensic investigation requirements. This alone would require the assurance of cloud computing
scalability; however, even newer big data classifications have emerged:
• Validity—Are the security and safety data correlated as valid with similar sites?
• Veracity—Is the veracity of the data apparent, or are the analysis results meaningful for the security or safety
function?
• Volatility—Is the data volatile, or are there rules, requirements, expiration, and repeated processing
requirements?
This advanced analysis is often best provided as a service because security and safety data may unpredictably grow or
shrink in size and require the scalability and agility of the cloud. Big data as a service offers users that produce large
amounts of security and safety data the opportunity to make their data more meaningful to the users by using metadata
and cloud-based solutions that can search effectively through this tagged data, avoiding the need to utilize on-site
resources.
104
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
E.1 Overview
An ESS system is a valuable part of the overall security solution. Many other systems depend on proper utilization
and operation of the ESS system. Therefore, the users should know how to use the entire system properly.
Most ESS system software packages are currently designed around the different roles and job requirements of end
users. For instance, some workstation software is written exclusively for the occasional operator who may have the
responsibility to occasionally add a user and monitor the alarms that come into the system.
In some cases, software is written exclusively for the administrator who owns the system and is responsible for its
operation and all of the integrated systems. A group of users is responsible for maintaining the system. Their work
with the software is limited, but they need to be familiar with the hardware. Each group would receive the most value
from training that is focused on their everyday tasks.
Manufacturers offer many choices for user training. Because each software application is unique, each training course
should be customized to the user’s unique needs. This customization should go beyond the content to include class
location options. The classes may be held either on the installed system at the end user’s location or on test or
demonstration equipment at the manufacturer’s location.
If the end user has 50 or more users for training, a train-the-trainer program may be more cost effective. This person
would get the training, the certificate, and the handout materials from the manufacturer to conduct classes on location.
An ESS designer should check with the manufacturer to learn if a train-the-trainer program is offered.
E.2 Sessions
At least two separate instruction sessions should be provided for training the client’s operating staff.
The first session is conducted during acceptance testing to provide the initial training needed to operate and maintain
the system. The first training session should include:
• General familiarization and operating instructions for each specialty system.
• Routine maintenance procedures.
• User level programming of software and systems.
Instruction on complicated systems and components should be provided by factory-trained technicians.
The second training session should be conducted after the final acceptance to fill in gaps and answer questions that
develop once the staff has become familiar with the system. Each training session should provide all the necessary
training materials, including:
• An overview of the implementation and commissioning program.
• A description of how the training is to be conducted.
• The date, time, and location of the training.
• The names and company affiliations of instructors.
• A summary of the content.
• Recommended reference material.
The training sessions should be recorded and archived for repeat training and reference for additional staff. Training
should be required as part of the construction documents and included in the project cost.
E.3 Position or Task Training
The ESS system users may be divided by different roles or job requirements, such as:
• System administrators.
• System operators.
• Managers.
• IT staff.
• Maintenance personnel.
105
ANSI/BICSI 005-2016
106
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
107
ANSI/BICSI 005-2016
108
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
109
ANSI/BICSI 005-2016
110
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
F.3.2 Recommendations
A service contract for the ESS system should clearly define the terms and conditions between the organization and the
security contractor. Using written agreements that specify the scope of work eliminates misunderstandings and
miscommunications.
The service contract should include the:
• Work to be performed and the frequency of said performance (e.g., weekly, monthly, quarterly).
• Price of the contract for the standard service and cost for additional services that are not part of the standard
contract (e.g., after-hours or weekend response).
• Terms on which the contract can be terminated by either party.
Although different contractors may be servicing different components of the systems at the same facility, the
following information should be included as an integral part of all ESS service contracts:
• Facilities to be covered.
• Normal working hours and days on which service work can be performed without impacting the
organization’s business.
• Labor rate per hour and associated materials and parts required for normal serving of the systems to be
serviced.
• Type of response expected (e.g., callback, physical presence on-site) and time frame required once a service
call is placed to the security contractor’s business.
• Method of communicating with the security contractor, including calls occurring outside the security
contractor’s normal hours of operation.
• Categories of system or device failure matched to an emergency condition. The response time may then be
calculated based on the level of the emergency condition that occurs (see Section F.3.3).
• Detailed list of all the systems and related devices to be serviced under the proposed contract, including:
– Power supplies.
– Detection devices and their specific location within the facility (e.g., motion detectors, glass break
detectors, pull stations, smoke detectors).
– Field and data-gathering panels.
– Servers, workstations, printers, network devices, and related peripheral devices.
– Surveillance cameras, listing types (fixed or PTZ, IP or analog), housings, domes, recording devices,
camera controllers, and display monitors.
– Uninterruptible power supply and related power conditioning and surge protection devices.
– Electronic door locking devices, listing types (e.g., strike, magnetic lock, electrified mortise handset,
shear lock).
– Communication devices (e.g., emergency telephones, two-way intercoms, one-way paging systems).
– Audible and other emergency display devices.
To better manage the security contractor’s response once a service call has been reported, the organization should
formulate the following into its service contract:
• Define the work rules that exist at each facility to be serviced, including those related to parking, building
access, means of communicating with local management regarding problems identified, and proposed course
of action to restore system to operational condition.
• Develop a method in which management can authorize work to be performed that is not part of the normal
service contract; the approval process should be streamlined to expedite authorization and minimize
downtime of the system.
• Establish sign-in and sign-out procedures that clearly document the process that is followed in the completion
of all service calls.
• List all safety rules that must be adhered to by service personnel while conducting their duties within the
facility.
• List work area cleanup, storage of materials, and lockout and tagout procedures.
• Clearly define a list of spare parts that shall be maintained and immediately available for emergency
installation in the event of a system or device failure.
111
ANSI/BICSI 005-2016
• Identify who is responsible for carrying and maintaining the list of spare parts deemed critical to maintain
system operation; who carries this responsibility could impact the contract price and response time.
• Define the access level that will be granted to service personnel, especially in sensitive areas of the facility
where an escort may be required for nonemployees.
• Define the procedures for the security contractor’s workers seeking access to perform required or requested
service. Failure to have a coherent policy could delay the response time if allowing access to service
personnel is ambiguous or unclear.
F.3.3 Emergency Response Category
The content of the emergency response category matrix in Table F-1 should be viewed as a guide for organizations
developing their own criteria for classification levels of failures.
112
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
The following standards and documents are related to, or have been referenced within recommendations of this
standard, and provide additional information which may be of use to the reader.
ASIS International
• Protection of Assets Manual
BICSI
• Information Technology Systems Installation Methods Manual, 6th edition
• Outside Plant Design Reference Manual, 5th edition
• Telecommunications Distribution Methods Manual, 13th edition
FM GLOBAL (FM)
• FM P7825a (2005), Approval Guide Fire Protection
113
ANSI/BICSI 005-2016
114
Electronic Safety and Security (ESS) System Design and Implementation Best Practices
115
ANSI/BICSI 005-2016
116