Home' RTCA Documents for Review : DO-230H FRAC Contents 84
© 2017, RTCA, Inc.
The host hardware may be configured as appropriate for the software as recommended by the manufacturer.
Best practice may include estimating future expansion and calculate additional capacity accordingly.
Consult with the system manufacturer to determine appropriate storage and processing capacities based on
In order to address current and projected needs, the PACS owner should carefully explore the benefits and
limitations of each type of system configuration before making a decision on host hardware elements .
The cost and complexity of the system is determined by the requirements of the particular applications
software, number of access portals (i.e. doors) controlled, the data gathering technology, access levels,
number of card holder records, number of clients connected simultaneously, etc. Application software,
supporting software and operating systems as well as the overall system configuration and performance
expectations should be finalized before computer hardware is selected as the hardware is often driven by
the software and applications requirements.
Allowance for network growth should also be taken into consideration, as well as LAN bandwidth capacity
(10/100/1000), availability, serial interfaces, etc. [Refer: Section 8: Integration on networking and the
appropriate appendices for strategies and specifications.]
In addition, server requirements often include malware and virus protection as defined by local IT Security
PACS Client Workstations
Client workstations can serve a number of purposes including managing the PACS, monitoring PACS
generated alarms and registering applicants for access. Most PACS client software programs reside on
workstations that may also contain other client software such as video as well as other related systems. This
architecture allows different PACS operations such as registration and report generation to be performed in
dedicated locations separate and away from the server.
Client workstations are typically part of the PACS network and reside on the same physical network as the
server and field panels. These workstations are role-restricted to limit their use, providing only the role
functionality that has been previously assigned by the PACS administrator. PACS workstations may have
additional software installed on them as they may not be dedicated to the PACS system only. (There are
risks associated with sharing of workstations.)
It is recommended to conduct a security assessment on client workstations. Since the workstations may be
used exclusively by a security guard to monitor the PACS, or have multiple roles that may include acting
as the user’s primary workstation with viewing function into the security communications network, the
system needs to be protected from network-based attacks such as denial of service.
Like the server, a workstation also must be secured against computer malware. The workstation needs to
have all current security patches loaded, antivirus software, VPN software for remote access into the
Security network where applicable and a security assessment to verify ports open on the workstation.
Similar considerations should be given to servers.
Links Archive Navigation Previous Page Next Page