Bosch PT-400 User Manual

EN
Technical Reference Manual
Security Escort
Security Escort | Technical Reference Manual |
EN | 2
Bosch Security Systems | 6/12 | 38947D
This software relates to security. Access should be limited to authorized individuals. This software contains provisions for setting security passwords. Appropriate security levels should be established and passwords should be set before allowing operating personnel access to this software. The original disk should be safeguarded against unauthorized use. In addition, DS security/fire controls contain passwords to prevent unauthorized access; these passwords must also be set and their identity carefully safeguarded.
Software License Agreement
Security Escort’s Central Control
Software for Microsoft® Windows®.
Microsoft®, Windows®, Windows NT® are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
You may NOT
Transfer this program or license to
any other party without the express written approval of Bosch Security Systems.
Limited Warranty
Bosch Security Systems warrants that the program will substantially conform to the published specifications and documentation, provided that it is used on the computer hardware and with the operating system for which it was designed. Bosch Security Systems also warrants that the magnetic media on which the program is distributed and the documentation are free of defects in materials and workmanship. No Bosch Security Systems dealer, distributor, agent, or employee is authorized to make any modification or addition to this warranty, oral, or written. Except as specifically provided above, Bosch Security Systems makes no warranty or representation, either express or implied, with respect to this program or documentation, including their quality, performance, merchantability, or fitness for a particular purpose.
Please read the following license agreement prior to installing and operating the software. Do not install this software unless you agree to the following terms:
You MAY
Use the Security Escort program only
on a single Security Escort system, with a single master computer, a single optional slave computer, and only the number of workstations originally factory programmed into the software key.
This program can be used without a
software key only for demo purposes. In no case can this program be used on a live system without an authorized software key.
Copy the program into another
computer only for backup purposes in support of your use of the program on one Security Escort system.
Security Escort | Technical Reference Manual |
EN | 3
Bosch Security Systems | 6/12 | 38947D
Remedy
Bosch Security Systems will replace defective media or documentation, or correct substantial program errors at no charge, provided you return the item with proof of purchase to Bosch Security Systems within 90 days of the date of delivery. If Bosch Security Systems is unable to replace defective media or documentation, or correct substantial program errors, Bosch Security Systems will refund the license fee. These are your sole remedies for any breach of warranty.
Because programs are inherently complex and may not be completely free of errors, you are advised to verify your work. In no event will Bosch Security Systems be liable for direct, indirect, incidental, or consequential damages arising out of the use of or inability to use the program or documentation, even if advised of the possibility of such damages. Specifically, Bosch Security Systems is not responsible for any costs including, but not limited to, those incurred as a result of lost profits or revenue, loss of use of the computer programs or data, the cost of any substitute program, claims by third parties, or for other similar costs. Bosch Security Systems does not represent that the licensed programs may not be compromised or circumvented. In no case shall Bosch Security Systems liability exceed the amount of the license.
Some states do not allow the exclusion or limitation of implied warranties, or limitation of liability for incidental or consequential damages, so the above limitation or exclusion may not apply to you.
Bosch Security Systems retains all rights not expressly granted. Nothing in this license constitutes a waiver of Bosch Security Systems rights under the U.S. Copyright laws or any other Federal or state law.
Should you have any questions concerning this license, write to: Bosch Security Systems, 130 Perinton Parkway, Fairport, New York 14450.
Security Escort | Technical Reference Manual | Table of Contents
EN | 4
Bosch Security Systems | 6/12 | 38947D
Table of Contents
1.0 Security Escort System
Architecture .......................... 7
1.1 System Components ............... 7
1.1.1 System Overview ................. 7
1.1.2 Transmitter ..................... 7
1.1.3 Receiver ........................ 8
1.1.4 Alert Unit ...................... 8
1.1.5 Transponder ..................... 9
1.1.6 Central Console ................. 9
1.1.7 Software Overview ............... 9
1.2 System Operation ............... 10
1.2.1 Alarm Sequence ................. 10
1.2.2 Test Sequence .................. 12
2.0 Setting Up The System .......... 13
2.1 Initial System Configuration ... 13
3.0 System Menus and Screens ....... 13
3.1 File Menu ...................... 13
3.1.1 Locate Transmitters ............ 13
3.1.2 Maintenance Alarm Database ..... 14
3.1.3 Operator Database .............. 14
3.1.4 Reports Database ............... 14
3.1.5 Subscriber Database ............ 14
3.1.6 Transponder Database ........... 17
3.1.7 Creating a New Transponder Entry .
............................... 19
3.1.8 Setting Receiver Parameters .... 20
3.1.9 Transmitter Change ............. 26
3.1.10 Exit .......................... 26
3.2 Utilities Menu ................. 26
3.2.1 Backup Screen .................. 26
3.2.2 Restore Screen ................. 27
3.2.3 Security Preferences Screen .... 28
3.2.4 System Defaults Screen ......... 31
3.2.5 System Labels Screen ........... 31
3.2.6 Print System Reports Screen .... 31
3.2.7 Alarm Report Generation Screen . 32
3.2.8 Schedules Screen ............... 33
3.2.9 Edit Schedule Times Screen ..... 34
3.2.10 View Alarm Groups Screen ...... 34
3.2.1 Alarm Groups Screen ............ 35
3.2.12 Alarm Group State Screen ...... 35
3.2.13 Current Check-in Status Screen 36
3.2.14 Clear Screen .................. 36
3.2.15 Output Verification ........... 36
3.2.16 Synchronize System Time ....... 36
3.3 Setup Menu ..................... 36
3.3.1 Show History ................... 36
3.3.2 History Filter Screen .......... 37
3.3.3 Popup Trouble Filter ........... 39
3.3.4 Transponder Troubles ........... 40
3.3.5 Mux Bus Point Troubles ......... 41
3.3.6 Transmitter Supervision Monitor 41
3.3.7 Communications Port Monitor ... 42
3.3.8 Delay To Ignore Troubles That
Auto Reset .......................... 42
3.3.9 Transponder Communications Screen
.............................. 42
3.3.10 Transponder Current Status
Screen .............................. 45
3.3.11 Transponder Parameter Change
Screen .............................. 47
3.3.12 Transponder Data View Screen . 48
3.3.13 Receiver Configuration Screen 49
3.3.14 Receiver Test Screen ......... 51
3.3.15 Network Status Screen ........ 52
3.3.16 System Status Screen ......... 53
3.3.17 System Preferences Screen .... 54
3.3.18 Transponder Comm Port Setup
Screen .............................. 57
3.3.19 Remote Comm Port Setup Screen 58
3.3.20 Remote Setup Screen .......... 59
3.3.21 Remote Connection Screen ..... 60
3.3.22 Phone Book Edit Screen ....... 61
3.3.23 Pager Setup Screen ........... 62
3.3.24 Send Pager Message Screen .... 63
3.4 Printer Menu .................. 63
3.4.1 Select Alarm Printer Screen ... 64
3.4.2 Select Report Printer Screen
Screen .............................. 64
3.4.3 Print History Screen .......... 64
3.4.4 Print File Screen ............. 64
3.5 Network Menu .................. 65
3.5.1 System Directories and Network
Address Screen ...................... 65
3.5.2 Network Socket Status Screen .. 67
3.5.3 Winsock Data Screen ........... 68
3.5.4 This Computer's Name and Address
Screen .............................. 68
3.6 About Menu .................... 68
3.6.1 About Screen .................. 69
4.0 Files Required For Security
Escort .............................. 70
5.0 Image Files ................... 71
5.1 Map File Generation and Scaling 71
5.2 Multiple Map Files ............ 72
5.3 Subscriber Images ............. 72
6.0 Security Escort Pager Setup ... 72
6.1 Dial-up Paging Modem Setup .... 73
6.2 Local Paging Setup ............ 73
6.3 Service and Security (Alarm)
Pager Setup ......................... 74
6.4 Subscriber (Individual) Pager
Setup .............................. 74
6.5 Alarm Area Setup .............. 75
6.6 Manual Pages .................. 75
7.0 Importing a Subscriber Database 76
Security Escort | Technical Reference Manual | Figures
EN | 5
Bosch Security Systems | 6/12 | 38947D
Figures
Figure 1: Screen Box for Password Entry
............................ 10
Figure 2: Central Console Screen During
Alarm ....................... 11
Figure 3: Console Screen Showing test
Icons ....................... 12
Figure 4: File Menu .................. 13
Figure 5: Locate Transmitters ........ 14
Figure 6: Maintenance alarm with Signal
Levels Shown in Icons" ...... 14
Figure 7: Edit Subscriber’s Advanced
Features Screen ............. 14
Figure 8: Find Transponder’s Database
Record ...................... 17
Figure 9: Blank Screen Resulting from
Selecting the Insert New
Button ...................... 20
Figure 10: Select Point Screen with "All
Points" Selected ............ 20
Figure 11: Select Point Screen with
"Receivers Only" Selected ... 21 Figure 12: Drop-Down Menu for Selection
of Point Type ............... 21
Figure 13: Data Entry After Selection of
Receiver Point Type ......... 22
Figure 14: Data Entry after Selection of
Alert Unit Point Type ....... 22
Figure 15: Data Entry after Selection of
Virtual Receiver Point Type . 22 Figure 16: Data Entry when Show Areas is
Selected ................... 22
Figure 17: Drop-Down Menu for Assigning
Alert Units to Receivers .... 23
Figure 18: Location Algorithm Selection
................... 23
Figure 19: Receiver floor level
selection ................... 23
Figure 20: Save Changes Screen Box ... 25
Figure 21: Utilities Menu ............ 26
Figure 22: Backup Screen ............. 26
Figure 23: Restore Screen ............ 27
Figure 24: Restore Warning Message Box .
................... 27
Figure 25: Restore Save Old database
Message Box ................. 28
Figure 26: Security Preferences Screen .
................... 28
Figure 27: System Defaults Screen .... 31
Figure 28: System Labels Screen ...... 31
Figure 29: Print System Reports Screen .
................... 31
Figure 30: Alarm Report Generation
Screen ................... 32
Figure 31: Schedule Screen ........... 33
Figure 32: Holiday selection in the
Schedule Screen ............. 33
Figure 33: Edit Schedule Time Screen 34 Figure 34: View Alarm Groups Screen . 34
Figure 35: Alarm Groups Screen ...... 35
Figure 36: Alarm Group State Screen . 35
Figure 37: Current Check-in Status
Screen .................. 36
Figure 38: Setup Menu ................ 36
Figure 39: History Filter Screen .... 37
Figure 40: Pop-Up Alert Showing
Receiver not Responding .... 39
Figure 41: Pop-up Trouble Filter Screen
.................. 39
Figure 42: Transponder Communications
Screen .................. 42
Figure 43: Transponder Current Status
Screen .................. 45
Figure 44: Transponder Parameter Change
Screen .................. 47
Figure 45: Transponder Data View Screen
.................. 48
Figure 46: Receiver Configuration Screen
.................. 49
Figure 47: Abort Button to Remove a
Device from the Setup Mode . 50
Figure 48: Confirmation of Successful
Setup Test ................. 50
Figure 49: Receiver Test Screen ..... 51
Figure 50: Network Status Screen .... 52
Figure 51: System Status Screen ..... 53
Figure 52: System Preferences Screen 54
Figure 53: Transponder Comm Port Setup
Screen .................. 57
Figure 54: Remote Port Setup Screen .. 58
Figure 55: Remote Setup Screen ...... 59
Figure 56: Remote Connection Screen . 60 Figure 57: Phone Book Edit Screen ... 61
Figure 58: Pager Setup Screen ....... 62
Figure 59: Send Pager Message Screen 63
Figure 60: Printer menu ............. 63
Figure 61: Alarm Printer Screen ..... 64
Figure 62: Report Printer Screen .... 64
Figure 63: Print File Screen ........ 64
Figure 64: Common Open File Screen .. 65
Figure 65: Network Menu ............. 65
Figure 66: System Directories and
Network Address Screen ..... 65
Figure 67: Current Network Socket
Status Screen .............. 67
Figure 68: Winsock Data Screen ...... 68
Figure 69: This Computer's Name and IP
Address Screen ............. 68
Figure 70: About Menu ............... 68
Figure 71: About Screen ............. 69
Figure 72: Remote Setup Screen ...... 73
Figure 73: Pager Setup Screen ....... 74
Security Escort | Technical Reference Manual | Tables
EN | 6
Bosch Security Systems | 6/12 | 38947D
Figure 74: Subscriber Database Advanced
Screen ................... 74
Figure 75: Transponder Area Edit Screen
................... 75
Figure 76: Send a Pager Text Message
Screen ................... 75
Tables
Table 1: Importing a Subscriber
Database ................... 77
Security Escort | Technical Reference Manual | 1.0 Security Escort System Architecture
EN | 7
Bosch Security Systems | 6/12 | 38947D
1.0 Security Escort System Architecture
1.1 System Components
1.1.1 System Overview
The Security Escort System consists of five basic components: transmitters, receivers, alert units, transponders, and the central console.
The transmitter is a miniature, radio transmitter, used to transmit either a distress or a test signal. The receivers are located throughout a protected area and detect the radio transmissions from transmitters. Alert units are siren/strobe units activated in the event of an alarm. Transponders are devices that control groups of receivers and alert units, connected to them by wire. Each transponder relays alarm and test signals from its receivers to the central console. In addition, the transponder tests for device and wiring faults, and transmits problem conditions to the central console. The central console consists of a computer (the master computer), an optional backup computer (the slave computer). Up to eight optional workstation computers can be used to receive alarm and trouble signals from the transponders, analyze the signals, activate strobes and sirens on the alert units, and produce a display for the security dispatcher. Each of these system elements is described more fully below.
1.1.2 Transmitter
There are several types of transmitters for personal use; those normally assigned to system subscribers, one for security personnel, and one for maintenance personnel. Each transmitter type serves a different purpose. All versions of transmitters for personal use produce alarm and test transmissions.
Subscriber Transmitter
Each transmitter contains a unique code, which is associated with the subscriber at the time the transmitter is assigned. In the event of an emergency, press and hold the alarm button(s) for 1 sec. to produce an alarm (see your transmitter user manual). Optionally, within approximately 2 sec., the sounders in a
nearby receiver activate, as well as the strobes and sirens on nearby alert units.
The transmitters have a second feature, the test mode. When the user is indoors, in sight of an interior receiver or outdoors, in sight of an alert unit, pressing the test sequence performs a test (see your transmitter User’s Manual). If the test is successful, a small green light flashes on the interior receiver, or the strobe on an alert unit flashes briefly. There is no response at all if the test fails. If the test fails, the user should try again. If there is still no response, the user should contact the security office as soon as possible. Every successful test is recorded in the Subscriber Database in the central console software and optionally printed on the hardcopy printer. The Subscriber Database contains all of the information relating to each subscriber, including the date and time of the most recent test transmission. It is possible to search the Subscriber Database for individuals who have not performed tests for a specified period of time.
Security Transmitter
The Security Transmitter are unique in the way that both tests and alarms are processed. Outwardly, Security Transmitters perform in the same manner as normal transmitters during testing. That is, strobes flash on alert units and green lights flash on receivers to confirm a successful test. However, when a Security Transmitter is tested within close proximity of a receiver, the central console records not only the user identity, and the date and time (as with a normal user test) but also the location of the officer at the time of the test. These tests are designated by the term security test on the printout at the central console and provide a convenient means of recording security patrols. (To protect user privacy, location information is not printed out for regular subscribers during tests.)
The Security Transmitters also differ in the way that alarms are managed. Unlike regular transmitters, no sound is emitted from the transmitter itself, no horns are activated on receivers, and no strobes or sirens are activated.
Security Escort | Technical Reference Manual | 1.0 Security Escort System Architecture
EN | 8
Bosch Security Systems | 6/12 | 38947D
The console in the security office sounds an alert tone and displays the alarm as usual except for a yellow background and text advising that the event is a silent alarm from a security officer. This allows security personnel to call for assistance without attracting unwanted attention.
Maintenance Transmitter
The Maintenance Transmitter is used exclusively for system set-up and diagnosis. Maintenance alarms are used during the system set-up to verify that a receiver is functioning and is properly identified in the Transponder Database. The maintenance alarm is also used to measure the received signal strength of the receivers from any location within the protected area. The central console distinguishes the Maintenance Transmitter by its unique coded message and produces a printout of the signal strengths reported by receivers on each transponder.
In the Test Mode, the Maintenance Transmitter behaves like a normal Subscriber Transmitter except that the central console does not verify the user ID portion of the transmitted code. Unlike the Subscriber Transmitters, all Maintenance Transmitters are assumed to be valid.
Point Transmitter
The Point Transmitter is used to protect assets not people. It has a magnetic reed switch and a supervised loop that reports both open and shorted states. The software can be programmed to report alarms and troubles on any of these conditions going off normal with unique text identifying the condition. These transmitters are supervised and also optionally support the alarm follower.
1.1.3 Receiver
The receivers are located throughout the protected area, including building interiors. Inside buildings, the spacing of these devices depends on the building construction and the locating precision required. Outdoors, spacing depends on terrain and foliage conditions and building obstructions. The procedure for location of receivers is contained in The Security Escort Installation Guide.
Each receiver contains a radio receiver to detect the transmissions from transmitters, and microcomputers to decode and interpret the received test and alarm messages. In addition, the microcomputers monitor to detect tampering, and report such conditions to the transponder.
Each receiver contains a sounder similar to those in self-contained smoke detectors. These sounders are optionally activated if the receiver has detected an alarm transmission.
Indoor receivers are typically mounted on inside walls. They are housed in small beige, rectangular units. Indoor receivers have one red and one green light. The green light is used to indicate a successful test of a transmitter. The red light is only illuminated during certain system tests and during alarms.
Outdoor receivers are contained in small weatherproof boxes typically mounted on the sides of buildings and on light posts. Outdoor receivers do not have the visible red and green
LED’s. Outdoors, the strobe lights on
the alert units flash to acknowledge successful tests.
In addition to its radio receiver, each receiver also contains a transmitter functionally similar to the hand held transmitters. This transmitter can be commanded by the central console to transmit a test message to other nearby receivers. This buddy checking is performed periodically to verify that the receiver sections of all receiver units are functioning satisfactorily.
1.1.4 Alert Unit
An alert unit consists of two components, a self-contained strobe/siren unit and an electronic driver unit. The latter may be housed in either a metal indoor enclosure or an outdoor enclosure (similar to the outdoor receiver enclosure), depending on the application. The strobe siren units are always mounted in outdoor locations. In addition to the function of attracting attention in the event of an emergency, the strobe unit is used to acknowledge a successful test of a transmitter.
Security Escort | Technical Reference Manual | 1.0 Security Escort System Architecture
EN | 9
Bosch Security Systems | 6/12 | 38947D
The alert unit has back-up battery power in addition to AC power. The alert unit driver contains a microprocessor, which communicates with the transponder for strobe and siren commands, status reports, and trouble indications. The troubles monitored are tamper, loss of AC power, and low battery.
1.1.5 Transponder
The transponder is a device controller for up to 64 devices; any combination of receivers and alert units. The devices are connected to the transponder by means of 8 four wire multiplex busses, two wires for power and two wires for data. Each bus is capable of supporting up to eight devices. The Security Escort System supports up to 255 transponders.
Each receiver and alert unit is identified to its transponder by a multiplex address that is set during system installation using a multi­position switch on the receiver or alert unit circuit board. Transponders communicate on the data bus with individual multiplex devices by issuing commands, which contain the receiver or
alert unit’s multiplex address. Note
that a given transponder may have up to eight devices with the same binary multiplex address, one on each bus. Thus, the complete identification of a particular device must include the transponder with which it is associated (1 to 255), the bus on which it is located (0 to 7), and its binary multiplex address (0 to 7).
When a receiver or alert unit detects a reportable event (alarm, test, tamper, loss of AC power, and so on) it goes into an Off Normal state. To quickly locate any devices which might be in the Off Normal state, global commands (which are interpreted simultaneously by all of its devices) are issued by the transponder approximately ten times per second. These global commands are followed by commands to specific devices to determine the nature of the Off Normal condition and, in the case of an alarm or test, to obtain the Transmitter Identification Number, Transmitter Battery Condition, and Received Signal Strength. This information is used by the central console to identify the subscriber transmitting the alarm (test) and to determine the subscriber’s location.
1.1.6 Central Console
The central console consists of one to eight IBMPC compatible computers
running the Security Escort software within the Microsoft Windows environment. One computer serves as the main controller for the entire Security Escort System (the master computer) and a second serves as an optional backup (the slave computer). The other computers serve as workstations for the operators of the software. The slave and workstation computers can be used for administrative functions such as adding subscribers or performing routine system tests without interfering with the operation of the master computer.
In the event of an alarm from a transmitter, the console displays the name of the individual to whom the transmitter is assigned, and the location from which the transmission was made. The location information is shown graphically on a map of the protected area. Other information about the subscriber, such as address, home address, phone number, and any disabilities may also be shown.
Both the main computer and the backup record all messages sent between the central console and the transponders, providing redundancy of records.
1.1.7 Software Overview
The central console contains all of the operating software and all of the databases required by the Security Escort System. The Security Escort System Operations Manual describes that portion of the system software, which affects system operators (in most cases, the Security Department personnel). This Technical Manual discusses only the software functions that are specific to installation and maintenance of the system.
All operations on the central console computers are password access controlled. The Logout option on the Main Menu bar produces a screen for entry of the password (see Figure 1). Passwords may have different authority levels, assigned by installation company personnel or the Security Department’s key operator.
Security Escort | Technical Reference Manual | 1.0 Security Escort System Architecture
EN | 10
Bosch Security Systems | 6/12 | 38947D
Figure 1: Screen Box for Password
Entry
Operations not accessible at a given authority level appear in gray rather than black on the central console. The installation and maintenance portion of the Security Escort Software is designed to facilitate set-up and modification of the system and to provide rapid diagnosis of system problems, usually with only one person being required. From the central console, simple commands can be used to scan all devices on a particular transponder for their current status. Devices can be enabled or disabled from the central console and the on-board transmitter of one receiver can be activated to test an adjacent receiver in order to confirm that its radio receiver section is operating properly (buddy check).
The Security Escort Software also continually monitors the status of each transponder to insure it is functioning correctly. All communications between the central console and a transponder require acknowledgments to verify message integrity. Each transponder must transmit a message periodically, to assure the central console that the transponder is still operating properly. Should a transponder fail to transmit either a routine status report or any other message to the central console, the central console sends a query to the transponder requesting a message be returned. If there is no response after six attempts at communications, a pop-up alert appears on the central console.
1.2 System Operation
The following sections describe the basic operation of the Security Escort System during alarm, test, and various other routine and emergency situations.
1.2.1 Alarm Sequence
Transmitter
When a user of the Security Escort System activates an alarm with the transmitter, multiple identical packets of digital data are transmitted from the hand-held transmitter to nearby receivers. Each packet contains a unique device identification code, an alarm type indication, the transmitter battery condition, and a check sequence. Multiple packets are employed to assure successful receipt of the message by the receivers.
Receiver
The receiver is continuously listening for radio signals that might be alarm or test data from transmitters. If the incoming message is determined to be valid, representing either an alarm or a test from a transmitter, the peak amplitude of the received signal is recorded.
Transponder Scanning
The transponder continually scans all of its receivers to see if any of them received a valid transmission. Once a transponder determines that one or more of its receivers received a transmission, it directs a message to those receivers, to determine the specifics of the transmission.
Receiver’s Response
The receivers respond to these messages with the identification code of the transmitter that sent the alarm or test, the alarm or test type, and the amplitude of the signal received from the transmitter.
Transponder Data Collection and Response
The transponder next constructs a message for the central console containing the receiver addresses, for all receivers responding to the event and signal levels of the receptions, the alarm or test type and the transmitter identification number. The transponder then verifies that the communications channel is free and transmits the information to the central console. If the communication channel is busy, the transponder delays a random period of time and tries again.
Security Escort | Technical Reference Manual | 1.0 Security Escort System Architecture
EN | 11
Bosch Security Systems | 6/12 | 38947D
Figure 2: Central Console Screen
During Alarm
Central Console Response
After acknowledging the alarm transmission from the first transponder, the central console begins its alarm analysis while collecting the alarm data from all other transponders, which had receivers that detected the alarm. The Subscriber Database is checked to determine the appropriate reaction to the alarm. If the transmitter is assigned to a valid subscriber and it is not designated as a security or watchman device, the central console commands the transponders to turn on the appropriate alert units. Depending on the settings selected in the Security Preferences Screen, this enables only the strobe portion of the alert unit, or both the strobe and siren. If the transmitter is unassigned, or has been disabled by selection of that option in the Subscriber Database, no commands will be issued to activate the alert units.
Note:
An option in the Security Preferences Screen allows unauthorized transmitters (not programmed in the database) to be treated like authorized transmitters. For example, strobes and/or sirens can be activated in the case of an alarm transmission (if they are also set to be activated for authorized transmitters).
The central console computes the location of the transmitter by comparing the signal strengths measured by the receivers which detected the transmission.
A partial map of the protected area is displayed on the central console, centered on the computed location, and, a yellow circle is drawn to assist the operator in guiding the response personnel to the probable source of the transmission. Other data drawn from the Subscriber Database is added to the central console display to assist in the response to the alarm. In addition, the central console enunciator is activated to alert the operator to the event.
The central console also writes the time, location, and identity information to the hardcopy printer and writes a complete record of all activities to the hard disks on both the primary and backup computers.
Operator’s Response
The operator reacts to the alarm by acknowledging the event with a keystroke or click of the mouse, which silences the alert sound from the central console. This silences only the central console enunciator, not the outdoor sirens or interior horns. The operator then directs response personnel to the scene and awaits their indication that the problem was resolved.
When the response personnel advise the operator that the problem is under control, the operator enters his password into a box on the central console. This step causes the central console to send commands to the transponders to silence the sirens and horns and extinguish the strobes and
LED’s. A reset of the system is
accomplished with another key stroke or a mouse click on the Reset button on the screen.
Security Escort | Technical Reference Manual | 1.0 Security Escort System Architecture
EN | 12
Bosch Security Systems | 6/12 | 38947D
Figure 3: Console Screen Showing
test Icons
Multiple Alarms
Receivers can handle multiple separate alarm or test events at the same time. If the receiver’s event buffer is full but contains test events, it discards the test records in favor of an incoming alarm. Similarly, the transponder event buffer can hold multiple events and it also replaces test events with alarm events when its buffer is full.
To assure that simultaneous alarms are detected, the multiple identical packets sent by the transmitters are randomly spaced over approximately one second. Only one of the packets must be detected to produce an alarm. Thus a collision between the transmissions of two or more transmitters is virtually eliminated. In addition, unless the transmitters are in the same location, they detect different groups of receivers. The central console is capable of processing 30 concurrent alarms. When there is more than one active alarm, the central console displays data for the first to be received and also indicates the total number received and the identity of the individuals transmitting them. The operator can click on the name of an individual to see the data for a particular alarm.
1.2.2 Test Sequence
Transmitter
When the user of the Security Escort System activates a test transmission, multiple identical packets of digital data are transmitted. In this case, the digital data in the transmitted packets contain a test code rather than an alarm code.
Receiver
The receiver responds to a test transmission the same as to an alarm transmission by decoding the radio signals, and measuring signal levels.
Transponder Data Collection and Response
The transponder collects data on a test event in the same manner as for an alarm event, it does not command the LED (green for test confirmation) to flash until it has been commanded to do so by the central console. Transmitters not in the Subscriber Database, or in
the database, but disabled, do not receive a flashing green light or flashing strobe that would indicate a successful test.
Central Console Response
The central console responds to the report of a test from a transmitter by collecting the data from each transponder reporting the event, and recording the locations of the receivers that detected the transmission. In this case, however, it does not calculate a location estimate. It simply records the data on the primary and backup computers’ hard disks, prints the identity of the subscriber, date and time on the hardcopy printout, and displays generic test icons on the central console in positions corresponding to the locations of receivers hearing the transmission.
In the case of test transmissions from Security Transmitters or Watchman Transmitters, the central console determines the closest receiver to the transmission and creates a guard tour event which becomes a part of the Guard Tour Report.
Operator’s Response
There is no response required of the operator in the case of a test transmission.
Security Escort | Technical Reference Manual | 2.0 Setting Up The System
EN | 13
Bosch Security Systems | 6/12 | 38947D
Figure 4: File Menu
2.0 Setting Up The System
2.1 Initial System Configuration
The default password is PPP. The default password, the Master password, and passwords for all system operators added by referring to the Operators Database in the Security Escort Operations Manual should be changed.
To generate the map file for the
screen display, refer to Section 5.1 Map File Generation and Scaling.
To setup the transponder COMM ports
refer to the Section 3.3.18 Transponder Comm Port Setup Screen.
To setup the system COMM ports refer
to the Section 3.3.19 Remote Comm Port Setup Screen.
To set the function of the system
COMM ports and setup remote access, see Section 3.3.20 Remote Setup Screen.
To program the system configuration,
see Section 3.1.6 Transponder Database.
To program the system responses to
an alarm, see Section 3.2.3 Security Preferences Screen.
To program the system responses to
troubles, see Section 3.3.3 Popup Trouble Filter.
After communications to the
transponders are established for any transponder that uses a Proxim Radio to communicate, program the Uses Proxim Radio field in the Transponder Parameter Change Screen. If all alarms are to be silent, program the Run Silent field. (See
Section 3.3.11 Transponder Parameter Change Screen.)
If this system has master and slave
computers, set the Default Master Computer and Default Slave Computer. (See Section 3.3.20 Remote Setup Screen.)
If using pager access in this
system, see Section 3.3.23 Pager Setup Screen.
If this computer runs other programs
at the same time, Security Escort is running, set the Not Always Top
Window field (see Section 3.2.3 Security Preferences Screen).
To program the ID Receiver to
automatically enter the transmitter IDs, see Section 3.2.3 Security Preferences Screen.
To set the names of the subscriber
classes, see System Default Screen in the Security Escort Operations Manual.
To program the transmitters into the
Subscriber Database, refer to the Security Escort Operations Manual.
3.0 System Menus and Screens
3.1 File Menu
3.1.1 Locate Transmitters
This selection allows the operator to display the last reported location of the transmitter assigned to the indicated individual or asset. When the individual or asset is selected from the list, the time of the last supervision report is shown (or None is displayed if no supervision report was received from that transmitter). On the map, the last report location is shown.
Security Escort | Technical Reference Manual | 3.0 System Menus and Screens
EN | 14
Bosch Security Systems | 6/12 | 38947D
Figure 5: Locate Transmitters Figure 6: Maintenance alarm with
Signal Levels Shown in Icons"
Figure 7: Edit Subscriber’s
Advanced Features Screen
3.1.2 Maintenance Alarm Database
Maintenance Transmitters, when activated in the Test or Alarm Mode, generate a series of multiple data packets like Subscriber Transmitters, however, a special code in each packet identifies the transmitter as a Maintenance Transmitter.
The receiver responds to a maintenance alarm or test transmission in the same way it responds to a subscriber alarm or test, unless the receiver is put in the Setup Mode. The transponder then reports the Maintenance Transmitter identification number and all signal levels to the central console which creates the location estimate and processes the data as it would for a normal alarm.
Note:
All Maintenance Transmitters are assumed to be valid so there is no need for the central console to check for the identification number in the Subscriber Database.
The central console does not generate an audible alert for the operator and does not create an alarm display on the main central console. Because they can be set to graphically display received signal levels, maintenance alarms are very useful in verifying that the system coverage exists at any location in the protected area and that receiver redundancy is adequate.
3.1.3 Operator Database
The Operator Database contains the information on the individuals who are authorized to operate the system, their authority levels, and passwords. See the Security Escort Operations Manual.
3.1.4 Reports Database
The Reports Database contains the information on alarms that were previously processed by the system. Alarm data and maps showing the operators view can be recalled. See the Security Escort Operations Manual.
3.1.5 Subscriber Database
The Subscriber Database contains the information on the transmitters that are assigned in the system. See the Security Escort Operations Manual. When the Advanced button is pressed in the Subscriber Database Edit Screen, the
Edit Subscriber’s Advanced Features
Screen (Figure 7) displays.
The Edit Subscriber’s Advanced Features Screen is used to set up special transmitters that monitor fixed locations, subscriber pager access, parameters for point transmitters, the virtual fence for a wandering alarm, the alarm group for arming of the transmitter, and check-in requirements for this transmitter.
Security Escort | Technical Reference Manual | 3.0 System Menus and Screens
EN | 15
Bosch Security Systems | 6/12 | 38947D
Phone Number
This phone number is dialed to send a pager message to this subscriber. Typically, this is a different phone number than the one that is manually dialed to access this pager. The phone number is assigned by the paging service.
Pager Password
This is the password to be sent to the paging service when a page is sent to this subscriber. Leave blank if not required (typically the pager password is not required). The pager password is assigned by the paging service.
Pager ID
This is the ID that identifies the pager to receive the pager message (many times this value is the last seven digits that are manually dialed to access this pager). The pager ID is assigned by the paging service.
Pager Group
These are the pager groups that this subscriber is a member of. This subscriber can be a member of up to three different pager groups.
Pager Confirmation Not Required
If checked, the confirmation pager message is not sent to this pager if alarm is acknowledged by an acknowledgement transmitter.
Fixed Location Transmitter
This section is used only when this transmitter is mounted in a fixed location (it does not move). When this transmitter transmits an alarm, it is always reported at the programmed location.
Floor Level
This is the floor level where this alarm is located for a fixed location transmitter.
Map X Position
This is the X coordinate of the map position where this alarm is located for a fixed location transmitter.
Map Y Position
This is the Y coordinate of the map position where this alarm is located for a fixed location transmitter.
Locate
When clicked, the Edit Subscriber’s
Advanced Features Screen disappears and the cursor changes to a cross hair. Moving the cursor to a point on the map and clicking the left mouse button scrolls the map to that point at the center of the screen.
When the map is showing the desired alarm location, move the cross hair to the exact location of the alarm to be reported and click the right mouse
button. The Edit Subscriber’s Advanced
Features Screen reappears and the selected location is entered into the X and Y coordinates.
If while the cross hair cursor is displayed, you want to exit without changing any coordinate values, press
the [ESC] key and the Edit Subscriber’s
Advanced Features Screen reappears.
Map Number
Defines which bitmap is displayed for the fixed location of this transmitter. The default map is zero, which corresponds to bitmap MAP0.EDB stored in the Escort sub-directory. Map 1 would be MAP1.EDB. There can be 100 maps per Security Escort System (0 to
99).
Security Escort | Technical Reference Manual | 3.0 System Menus and Screens
EN | 16
Bosch Security Systems | 6/12 | 38947D
Enable Reed Switch
If checked, the reed switch input of this transmitter is enabled and causes an alarm. Otherwise, the reed switch input is disabled. The alarm group this transmitter is assigned to must be armed, for this input to cause an alarm, which is displayed. If no alarm group is assigned, the transmitter is always armed. To enable this option,
the transmitter’s class must be set to
point type.
Optional Text
This is optional text that can be added to the location text when this input reports an alarm. To enable this
option, the transmitter’s class must be
set to point type.
Disable Shorted Loop
If selected, a shorted loop on this transmitter does not cause an alarm or trouble report to display. To enable
this option, the transmitter’s class
must be set to point type.
Alarm on Shorted Loop
If selected and the alarm group this transmitter is assigned to is armed, a shorted loop on this transmitter causes an Alarm Report to display. For this input to cause an alarm, the alarm group this transmitter is assigned to must be armed, which is displayed. If no alarm group is assigned, the transmitter is always armed. To enable
this option, the transmitter’s class
must be set to point type.
Trouble on Shorted Loop
If selected, a shorted loop on this transmitter causes a Trouble Report to display. To enable this option, the
transmitter’s class must be set to
point type.
Alarm When Armed, Trouble When Disarmed on Shorted Loop
If selected and the alarm group this transmitter is assigned to is armed, a shorted loop on this transmitter causes an Alarm Report to display. If selected and the alarm group this transmitter is assigned to is disarmed, then a shorted loop on this transmitter causes a Trouble Report to display. If no alarm group is assigned, the transmitter is always armed. To enable this option,
the transmitter’s class must be set to
point type.
Disable Open Loop
If selected, an open loop on this transmitter does not cause an Alarm or Trouble Report to display. To enable
this option, the transmitter’s class
must be set to point type.
Alarm on Open Loop
If selected and the alarm group this transmitter is assigned to is armed, an open loop on this transmitter causes an Alarm Report to display. The alarm group this transmitter is assigned to must be armed for this input to cause an alarm, which is displayed. If no alarm group is assigned, the transmitter is always armed. To enable
this option, the transmitter’s class
must be set to point type.
Trouble on Open Loop
If selected, an open loop on this transmitter causes a Trouble Report to display. To enable this option, the
transmitter’s class must be set to
point type.
Alarm When Armed, Trouble When Disarmed on Open Loop
If selected and the alarm group this transmitter is assigned to is armed, an open loop on this transmitter causes an Alarm Report to display. If selected and the alarm group this transmitter is assigned to is disarmed, an open loop on this transmitter causes a Trouble Report to display. If no alarm group is assigned, the transmitter is always armed. To enable this option, the
transmitter’s class must be set to
point type.
Fixed Location and Pager Text
This is the text that displays as the location of the alarm for fixed location transmitters and on pagers reporting this alarm.
Transponder Name
Select the transponder with the area that defines the area for a wandering (virtual fence) alarm. Refer to Transponder Area for the operation and setup of the wandering alarm (virtual fence alarm).
Security Escort | Technical Reference Manual | 3.0 System Menus and Screens
EN | 17
Bosch Security Systems | 6/12 | 38947D
Figure 8: Find Transponder’s
Transponder Area
Wandering Alarm - Create a protected area by placing a virtual monitor fence around an area of the main map. These areas are defined in the transponder database. If this transmitter is constrained to remain within one of these defined areas, first select the defining transponder in the Transponder Name field. Then select the desired area from this dropdown list of the transponder’s area names.
For the wandering alarm to work, the supervision period must also be programmed for this transmitter.
Specific transmitters are marked in the Subscriber Database to be constrained within a specific fenced area defined by this option. If the transmitters leave their defined area, the system reports this as a wandering alarm and continues to monitor and track the location of the transmitter until the alarm is canceled from the screen in the normal way. However, these tracking updates can only occur every supervision transmission period (not on an accelerated rate like a tracking alarm).
The Security Escort System computes the location of the transmitters when they broadcast automatic supervision transmissions periodically.
Because of the basic location accuracy and the floor-to-floor accuracy of the system, there is a potential for some false alarms. If false alarms are a problem, check the Filter Virtual Fence checkbox in the Edit Security Preferences Screen. If you do this, two successive location calculations indicate the transmitter moved outside the protected area before an alarm was generated. The downside of this is a delay in the reporting of a wandering alarm of one extra transmitter supervision period.
Alarm Group
This is the alarm group that controls the arm/disarm status of this transmitter. Select the desired alarm group from the dropdown list. This alarm group must be armed for this transmitter to cause an alarm, which is displayed. If no alarm group is assigned, the transmitter is always armed.
Requires Check-in
When this checkbox is checked, this transmitter activates once each day during the check-in schedule time. At the end of the check-in period, if the subscriber fails to check-in, a Failed to Check-in Report is generated and presented to the operator. This report contains all of the people who failed to check-in with their first address line and phone number. All subscribers in the report must be checked on to make sure they are not in need of assistance, as this may be a life­threatening situation. A printed report may be generated.
If the transmitter is not a point type, the transmitter can generate alarms and therefore a test transmission is used for the check-in.
If the transmitter is a point type, any non-trouble transmission serves as a check-in.
One of the ten schedules must be selected as the check-in schedule to define the check-in period.
Done
Click this button when all changes are complete to return the main Subscriber Database Edit Screen.
3.1.6 Transponder Database
The Transponder Database is established at system set-up and contains all necessary configuration data for each transponder, receiver, and alert unit. It describes the basic structure of the installation, including all device names, locations, types, multiplex addresses, and so on. This information is used by the central console to generate alarm and test displays on the central console and in determining which alert units are activated.
Security Escort | Technical Reference Manual | 3.0 System Menus and Screens
EN | 18
Bosch Security Systems | 6/12 | 38947D
Database Record
Access the Transponder Database from the File Menu on the Main Menu bar. The following paragraphs describe the
elements of the Find Transponder’s
Database Record Screen.
Transponder
This box contains the names of the transponders. Clicking the arrow to the right of this box displays a drop-down list. The names of each transponder in the system display, allowing easy selection for review or editing.
The transponder names are assigned during set-up and used to indicate the physical location of the transponder or the region of the protected area covered by a particular transponder.
Created, Modified, Modify Oper
The system software automatically creates these three fields to the right of the Find Transponder’s Database Record Screen. They represent the date the transponder was first entered into the Transponder Database, the date of the last change of any entry for this transponder, and the identity of the operator who made the last change (determined from the password entered to make the change).
Transponder ID
This is a number assigned to the transponder at system set-up. It is used by the central console to identify the transponder during all communications between the central console and the transponder. The number must agree with the transponder address, which is set during final installation by switches on the transponder circuit board.
Note:
Zero is not allowed as a transponder address.
Comm Port Index
This indicates which central console communications port to use to communicate with this transponder. The Transponder Comm Port Setup Screen selects the specific physical port that this index refers.
Radio ID
This is the identification number for the radio interface unit, if the transponder communicates to the central console by a radio link. (This feature is currently not implemented.)
Isolate From All Other Transponders For Location
When checked, this transponder is isolated from all other transponders for location considerations. This is used when distant transponders sometimes hear an alarm and throw off the alarm location calculation. If this checkbox is checked, it indicates that this transponder is protecting an area that is independent of all other transponders in the system. When an alarm is reported and receivers on this transponder have the best reception, only the receivers on this transponder are considered for the location of this alarm. If another transponder has the best reception, then the receivers on this transponder are ignored for the location of this alarm.
Ignore Communications Failure
This checkbox allows communications failures to be ignored for this transponder. It is used during a new installation for transponders that are not yet fully on line. During system maintenance when a transponder is out of service for a while, it is used so that the communications failure messages do not flash on the screen and distract the operator. Checking this checkbox causes the system to ignore communication failure. Therefore, if communications fail with this transponder, the area this transponder protects is not protected and alarms from subscribers in that area are
missed without the operator’s
knowledge. This checkbox should not be checked in a live system.
Security Escort | Technical Reference Manual | 3.0 System Menus and Screens
EN | 19
Bosch Security Systems | 6/12 | 38947D
It is a good idea to create an entry in the Transponder Database for each transponder in the system before entering the data for each device so that all transponders appear in the drop-down menus.
Insert New
Clicking this button displays a new Edit Subscriber’s Advanced Features Screen. This is used to enter a new transponder to the database.
Edit Data
Clicking this button allows the
currently displayed transponder’s
database record to be edited.
Kill Transponder
Clicking this button deletes the
displayed transponder’s database
record. If the transponder is deleted. its data is permanently deleted and cannot be recovered.
Delete Point
Clicking this button deletes the displayed point only from the displayed
transponder’s database record. If the
point is deleted, its data is permanently deleted and cannot be recovered.
Copy
Clicking this button copies the
displayed transponder’s database record
into a new transponder record. This allows similarly configured transponders to be programmed once, then copied into a new record.
Note:
It is not possible to edit the transponder ID itself. If this should be necessary, the Copy button can be used to produce another Transponder Database entry duplicating the first, but with the transponder ID blank. The new transponder ID can be entered, the new data saved by using the Save button, and the old transponder entry can be deleted by using the Kill Transponder button.
Print
Clicking this button prints the
displayed transponder’s database
record.
Beginning
Clicking this button changes the displayed transponder to the first transponder in the database.
Previous
Clicking this button changes the displayed transponder to the previous transponder in the database.
Next
Clicking this button changes the displayed transponder to the next transponder in the database.
End of File
Clicking this button changes the displayed transponder to the last transponder in the database.
Mux Point Data
The lower portion of the Find
Transponder’s Database Screen provides
information on each of the devices controlled by the transponder selected in the Transponder field. Two digits represent each receiver or alert unit address; the first is the number of the multiplex bus on which the device is mounted (0 to 7) and the second is the multiplex point address assigned to the particular device. On each of the eight multiplex busses up to eight devices may be installed, but each device must be assigned a unique multiplex point address (0 to 7). More than one device can have a particular multiplex point address, but only if on different busses. The multiplex point addresses are assigned by switch settings on the device (receiver or alert unit) circuit boards. These multiplex point address settings are also a part of the Transponder Database. The multiplex address shown in the Transponder Database and the multiplex address set on the device circuit board must agree. The Transponder Setup Screen s used to verify multiplex address settings.
3.1.7 Creating a New Transponder Entry
The creation and modification of the Transponder Database requires special authority levels usually assigned only to installation company personnel.
The Insert New button creates a new Transponder Database Screen, ready for entry of data.
Security Escort | Technical Reference Manual | 3.0 System Menus and Screens
EN | 20
Bosch Security Systems | 6/12 | 38947D
Figure 9: Blank Screen Resulting
from Selecting the Insert New Button
Figure 10: Select Point Screen with
"All Points" Selected
The System Design Layout Sheets prepared in advance by the installation manager should contain the necessary information for assigning the transponder name and ID, the comm port or radio ID, as well as the names and multiplex addresses for all receivers and alert units connected to each transponder.
The System Design Layout Sheets also contain the text used to indicate the receiver locations and designates the alert units driven by each receiver.
3.1.8 Setting Receiver Parameters
If the Transponder Database already contains the transponder, the Edit button is used to allow completion or modification of the data.
Trouble Type Text
This is the text that is shown in the Trouble Screen when the remote key input on the transponder goes active (shorted).
Trouble Tamper Text
This is the text that is shown in the Trouble Screen when the remote key input on the transponder goes into trouble (open).
Trouble Response Text
This is the text that is shown in the Trouble Screen as the response test. The actions the responding individual should take.
Show Points
If selected, the lower half of the
Transponder Database’s Screen shows the point’s (receiver, virtual receiver, or alert unit’s) database values.
Show Areas
If selected, the lower half of the
Transponder Database’s Screen shows the area’s database values.
Area Number
Each Transponder can have up to 80 areas defined (prior to version 2.04 of the software only 40 areas could be defined). Area numbers range from 0 to
79. Use the Locate button to define the
area graphically on the map.
Point Number
Each receiver and alert unit connected to the transponder has a unique point number assigned during the system design process. This number corresponds to a specific bus number and point multiplex address number. The multiplex address, set by means of switches on the device (receiver or alert unit) itself, must correspond with the point number assigned in the Transponder Database. For instance, a device programmed with multiplex address location 3 and on bus 5 is point number
29. This relationship is displayed in
the table that displays anytime a ? box is clicked with the mouse. Clicking on any number in the table automatically enters that number into the Point Number field on the Transponder Database Screen and closes the table screen.
Security Escort | Technical Reference Manual | 3.0 System Menus and Screens
EN | 21
Bosch Security Systems | 6/12 | 38947D
Figure 11: Select Point Screen with
"Receivers Only" Selected
Figure 12: Drop-Down Menu for
Selection of Point Type
A third number, the point number is unique to a particular device. Point numbers range from 0 to 63. There is a one-to-one correspondence between a point number and a point multiplex address/bus number pair. The point number assignment is presented in a table displayed whenever the ? box to the right of the Point Number field is clicked.
Figure 11 illustrates a quick way to select a particular device without having to translate between the two numbering systems. Three buttons at the bottom of this screen allow the user to display all possible device numbers (whether or not the particular transponder has a device assigned to the number) or, to display only locations populated by receivers or only locations populated by alert units.
When the Point Number button in the table is clicked, the Point Number table disappears and that point number automatically appears in the Point Number field of the Transponder Database Screen. The bus number and point address are also changed to reflect the selection
+, -, Bus + and Bus -
These buttons, just below the Point Number field, allow you to quickly
advance the device selection by one location, either one point location (+ or -) or one bus number (Bus + or Bus ­). This is useful when a task requires proceeding from device to device, as during system setup or check out. The ? box is used to display all devices to facilitate quick selection of a particular device. It is most useful when diagnosing a problem with a particular device.
Point Type
The Point Type field indicates the type of device (receiver, virtual receiver, or alert unit) located at the location currently selected in the Point Number field. Once the Point Number field contains the proper value, the device type is set by selecting from the options in the drop-down menu that appears when the arrow to the right of the Point Type field is clicked.
Security Escort | Technical Reference Manual | 3.0 System Menus and Screens
EN | 22
Bosch Security Systems | 6/12 | 38947D
Figure 13: Data Entry After
Selection of Receiver Point Type
Figure 14: Data Entry after
Selection of Alert Unit Point Type
Figure 15: Data Entry after
Selection of Virtual Receiver Point Type
Figure 16: Data Entry when Show
Areas is Selected
Use the receiver selection when there is a physical receiver connected at this bus location.
Use the alert unit selection when there is an alert unit connected at this bus location.
The virtual receiver is intended to compensate in cases where there is a receiver imbalance. For example, if a building with a dense population of receivers is adjacent to a fence with few receivers and an alarm occurs between them, the alarm location can pull towards the building. The virtual receiver references two other physical receivers that must be on the same transponder. Only if both of the referenced receivers receive an alarm transmission, is the virtual receiver added to the alarm as if a physical receiver heard the alarm at the average receive level of the two referenced
receivers. The virtual receiver’s
location and sensitivity can be adjusted the same as a physical receiver. After a virtual receiver is added, verify the surrounding areas to make sure they were not adversely affected. In no event, should a virtual receiver be utilized as a cost savings measure to avoid the installation of an actual receiver.
Use the virtual selection when there is no physical device connected at this bus location. Starting with version
2.03 of the Security Escort software, you can add virtual receivers in the Transponder Database. A virtual receiver is added at one of the 64 points allowed per transponder. However, there is no physical hardware used.
Security Escort | Technical Reference Manual | 3.0 System Menus and Screens
EN | 23
Bosch Security Systems | 6/12 | 38947D
Figure 17: Drop-Down Menu for
Assigning Alert Units to Receivers
Figure 18: Location Algorithm
Selection
Figure 19: Receiver floor level
selection
Alert 1, Alert 2, Alert 3, and Test
Each receiver can be assigned up to three alert units that are activated if it is one of the receivers reported by the transponder as part of an alarm event. Each receiver can also be assigned one alert unit that is activated to confirm test transmissions. These alert units do not need to be connected to the same transponder as the receiver. The Transponder field contains the transponder to which the designated alert unit is connected and the Point field contains the point number of the alert unit on that transponder.
The test boxes similarly designate the alert unit, if any, whose strobe unit is activated in the event of a test transmission from a transmitter.
To assign alert units to each receiver, use the drop-down menus to the right of the boxes labeled Alert 1, Alert 2, and Alert 3 to select the transponder of the designated alert unit. Type point number into the Point field.
Changing the algorithm setting for a receiver only affects the location when the alarm is close to this receiver and it hears the alarm the strongest. The stronger the pull the more the alarm is pulled towards the receiver, with linear having no extra pull.
The algorithm setting is only available if the Enable algorithm tweaks field is checked in the System Preferences Screen. Also Security Escort Software version 2.03 and higher, allows individual receiver sensitivity to be set in the Transponder Database. Receivers can be adjusted from 50% to 149% of their normal sensitivity using the SA% field.
Floor Level
This selects the physical floor level a receiver is mounted at or a virtual receiver acts like it is mounted at. It is very important that this setting is correct for the operation of the location algorithm.
Algorithm
Starting with version 2.03 of the Security Escort Software, there are five different location algorithms that can be selected on an individual receiver basis in the transponder database. Classic (original Escort algorithm), linear, low pull, medium pull, and strong pull. By default, when a receiver is set for outside or tunnel it uses the linear algorithm; all other receivers use the low pull algorithm. The receiver that hears the alarm transmission the strongest determines the algorithm used for this alarm.
Receiver 1 and Receiver 2
These are the two receivers, on the same transponder, that a virtual receiver assumes the average of. Both receivers must receive a signal before the virtual receiver reports it also received a signal that is the average of the other two receivers signals. The location algorithm and sensitivity adjust work the same for a virtual receiver as for a physical receiver.
Security Escort | Technical Reference Manual | 3.0 System Menus and Screens
EN | 24
Bosch Security Systems | 6/12 | 38947D
Location
This block contains the text to be displayed on the Alarm Screen if this receiver is one of those closest to the alarm source. The description is developed with the guidance of the security personnel who must respond to an alarm. It is vital that the description be clear and unambiguous to them.
To enter a location description, place the cursor in the Location field, click the mouse, and begin typing. Receiver and alert unit location names are important because they are used for directing response to an alarm and aid service personnel in identifying the device in the event of a problem. The Problem Reports displayed on the central console and printed by the hardcopy printer contain the device location descriptions that are entered in the Location field.
SA%
Security Escort Software version 2.03 and higher allow individual receiver sensitivity to be set in the Transponder Database. Receivers can be adjusted from 50% to 149% of their normal sensitivity. No physical receiver changes or upgrades are required. This setting should only be changed if there are known location accuracy problems in the area of this receiver. Settings of 50 to 99 desensitize the receiver to 50% to 99% of the actual received signal strength. Settings of 1 to 49 increase the sensitivity to 101% to 149% of the actual received signal strength. Try changing the sensitivity of receivers one at a time while testing the alarm location response. For example, if alarms are being pulled towards a particular receiver, lower its sensitivity in 10% increments and retest. If the area can be corrected using this method, verify the surrounding areas to make sure they have not been adversely affected. Generally, it is better if the correction is done in small steps while verifying the adjacent areas, rather than trying to correct the entire error in one step.
The SA% option is only available if the Enable algorithm tweaks field is checked in the System Preferences Screen. Also in the Transponder Database the Algorithm dropdown list allows selection of Default, Classic, Linear, Low, Medium, or Strong pull location algorithms for each transmitter. The point reporting the best reception level determines the actual algorithm used for the location on any event. If programmed for Default, the algorithm used is Linear for points programmed as outdoor or tunnel. All other points use Low. If the point reporting the best reception level is not programmed for the Default algorithm, the location calculation uses the algorithm programmed.
Map
Defines which bitmap to display for this receiver or area when an alarm is closest to it. The default map is 0, which corresponds to bitmap MAP0.EDB stored in the Security Escort sub­directory. Map 1 is MAP1.EDB. There can be 100 maps per Security Escort System (0 to 99).
Video Switcher
Selects a system serial port programmed in the Remote Setup Screen displaying the most likely area the alarm is located on the CCTV monitors near the central console. The string activates a macro in the video switcher that selects the appropriate camera and controls any required zoom and tilt actions. Up to 40 characters can be entered. Control characters can be entered as [^][A] for control A.
Pager Group
The pager group that is paged if the alarm location is determined to be in this area.
Floor
Determines the floor number that this area is defined for. The areas on floors above and below this one can be defined differently. For an area to be selected when an alarm is received, the location determined by the central console must be located within the defined area and must be located on the designated floor.
Security Escort | Technical Reference Manual | 3.0 System Menus and Screens
EN | 25
Bosch Security Systems | 6/12 | 38947D
Figure 20: Save Changes Screen Box
Virtual Fence Area
If this checkbox is checked, this area is not used for a normal alarm area location. This area is only used to define a virtual fence. Specific transmitters in the Subscriber Database can reference this transponder and area. When they reference this area and the system locates the transmitter position outside the area, a Wandering (Virtual Fence) Alarm is generated. This alerts the operator and shows the position of the transmitter.
Locate
When clicked, the Edit Transponder’s
Database Record Screen disappears and the cursor changes to a cross hair. Moving the cursor to a point on the map and clicking the left mouse button scrolls the map so the point is at the center of the screen and all previously defined receivers and areas are shown with numerical labels.
When the map is showing the location of the desired receiver, move the cross hair to the exact location of the receiver and click the right mouse
button. The Edit Transponder’s Database
Record Screen reappears and the selected location is entered into the X and Y coordinates.
When the map shows the desired location, move the cross hair to the exact location of the first point of the polygon that describes the boundary of the area and right click. Move the cursor to the second point of the polygon and again right click. The computer draws a straight line between the first and second points. Repeat this process drawing all sides of the polygon to define the area. To close the polygon, place the last point on top of the first point. The polygon can have up to nineteen sides and no two lines of the polygon may cross each other. If you try to create more than nineteen sides, the computer automatically closes the polygon with the nineteenth side. When the polygon is closed, it can be crosshatched to make it more visible. After the polygon is complete, double click the left mouse button to return to the Edit Transponder’s Database Record Screen.
If the area being defined is a virtual
monitor “fence” area for Wandering
Alarms, the monitor fence (area boundary) should be drawn at least 7.62 m (25 ft.) past the area to be protected to reduce potential false alarms.
If the cross hair cursor is displayed and you want to exit without changing any coordinate values, press the [ESC]
key and the Edit Transponder’s Database
Record Screen reappears.
Cut
Clicking this button copies the displayed point or area data to a clipboard and returns all values to their defaults.
Copy
Clicking this button copies the displayed point or area data to a clipboard. Displayed values are not changed.
Paste
Clicking this button copies the clipboard values to the displayed point or area data. The values on the clipboard are not changed and can be copied to more points or areas.
Save
Clicking this button saves all changes to the database.
Cancel
Clicking this button closes the screen. If changes were made, Figure 20 displays giving you another chance to save the changes by clicking the Yes button.
Security Escort | Technical Reference Manual | 3.0 System Menus and Screens
EN | 26
Bosch Security Systems | 6/12 | 38947D
Figure 21: Utilities Menu
Figure 22: Backup Screen
3
.1.9 Transmitter Change
Refer to the Security Escort Operations Manual.
3.1.10 Exit
Click this button to close the Security Escort application. Enter your password at the prompt to verify you have the authority to shut down the program.
3.2 Utilities Menu
3.2.1 Backup Screen
Use this screen to make backups for all the databases. Only the databases with a checkmark are backed up. Preferably, all databases should be backed up at once. Only when they do not fit on one floppy disk should you save individual databases to one floppy; then switch floppy disks and repeat the procedure to save the rest of the files. As insurance against database problems, make multiple backups to different disks frequently. Store at least one backup copy in a different location from this system and remember to keep this copy current.
Operators
This is the database of all individuals with passwords to operate the system software and acknowledge alarms.
Subscriber
This database contains all the transmitters assigned in the system.
Transponders
This database contains the transponders, receivers, virtual receivers, and alert units configurations.
Reports
This database contains all the Alarm Reports and related alarm map screens.
Master Database Drive
Store the backup files in the Security Escort Master Database path. See the System Directories and Network Address Screen.
Slave Database Drive
Store the backup files in the Security Escort Slave Database path. See the System Directories and Network Address Screen.
Local Database Drive
Store the backup files in the same sub­directory on this computer where the Security Escort System components are stored (typically C:\ESCORT).
Cartridge Disk Drive
Store the backup files in the Backup/restore to disk cartridge path field assigned in the System Preferences Screen. This path can point to a cartridge disk drive, a local hard disk, or a network disk drive.
Loading...
+ 60 hidden pages