12.02.2013 Views

Design and Construction Handbook - Los Angeles World Airports

Design and Construction Handbook - Los Angeles World Airports

Design and Construction Handbook - Los Angeles World Airports

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Guide Specification<br />

G. While working in the facility, the Contractor shall not block any entrances, egresses, or other<br />

passageways that are necessary for normal, safe operation. It should be noted that the<br />

Contractor is responsible to provide any lifts, h<strong>and</strong> trucks, etc. that it will need to transport its<br />

materials <strong>and</strong> equipment throughout the site.<br />

H. The Contractor shall protect all buildings, walls, floors, <strong>and</strong> property from damage resulting<br />

from the installation. Any <strong>and</strong> all damage to property shall be repaired by the Contractor at its<br />

expense. If the Contractor enters an area that has damage (not caused by the Contractor), the<br />

Contractor shall immediately bring this to the attention of the Engineer so the area can be<br />

appropriately noted.<br />

I. Following each day’s work, the Contractor shall clean up the areas in which it has been working<br />

<strong>and</strong> dump all trash in the appropriate designated areas.<br />

PART 2 - PRODUCTS<br />

2.1 WIRELESS EQUIPMENT GENERAL SPECIFICATIONS<br />

A. RF Management:<br />

1. RF management shall be set to restrict performance-impacting operations such as channel<br />

changes when voice over IP traffic is present.<br />

B. User B<strong>and</strong>width Control:<br />

1. The b<strong>and</strong>width contract shall be implemented to ensure that one single user cannot<br />

monopolize b<strong>and</strong>width <strong>and</strong> can limit users to a maximum amount of b<strong>and</strong>width.<br />

B<strong>and</strong>width contracts can be specified by user role for simple administration, <strong>and</strong> can be<br />

applied per-user (one user cannot exceed 2Mbps, for example) or per-group (all guest<br />

users together cannot exceed 2Mbps.)<br />

C. Privacy Protection:<br />

1. AP’s shall contain no configuration, passwords, encryption keys, or security information.<br />

The AP shall have no exposed serial port, no recoverable passwords, no vendor-installed<br />

certificates, <strong>and</strong> no way for an intruder to tap into the wired side of the AP to eavesdrop<br />

on wireless communication.<br />

2. AP’s shall be FIPS-140 Level 2 compliant.<br />

D. Simplified Management:<br />

1. The system shall be manageable through a single interface <strong>and</strong> a single web-based URL.<br />

Each of these devices shall have a software image, configuration file, <strong>and</strong> run-time<br />

statistics, as well as different configuration <strong>and</strong> operation comm<strong>and</strong>s.<br />

WIRELESS COMMUNICATION SYSTEM (WiFi)<br />

27 21 33 - 7<br />

Communication Systems

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!