This software relates to
security. Access should be
limited to authorized
individuals. This software
contains provisions for
setting security passwords.
Appropriate security levels
should be established and
passwords should be set before
allowing operating personnel
access to this software. The
original disk should be
safeguarded against
unauthorized use. In addition,
DS security/fire controls
contain passwords to prevent
unauthorized access; these
passwords must also be set and
their identity carefully
safeguarded.
Software License
Agreement
Security Escort’s Central Control
Software for Microsoft® Windows®.
Microsoft®, Windows®, Windows NT® are
either registered trademarks or
trademarks of Microsoft Corporation in
the United States and/or other
countries.
You may NOT
Transfer this program or license to
any other party without the express
written approval of Bosch Security
Systems.
Limited Warranty
Bosch Security Systems warrants that the
program will substantially conform to
the published specifications and
documentation, provided that it is used
on the computer hardware and with the
operating system for which it was
designed. Bosch Security Systems also
warrants that the magnetic media on
which the program is distributed and the
documentation are free of defects in
materials and workmanship. No Bosch
Security Systems dealer, distributor,
agent, or employee is authorized to make
any modification or addition to this
warranty, oral, or written. Except as
specifically provided above, Bosch
Security Systems makes no warranty or
representation, either express or
implied, with respect to this program or
documentation, including their quality,
performance, merchantability, or fitness
for a particular purpose.
Please read the following license
agreement prior to installing and
operating the software. Do not install
this software unless you agree to the
following terms:
You MAY
Use the Security Escort program only
on a single Security Escort system,
with a single master computer, a
single optional slave computer, and
only the number of workstations
originally factory programmed into
the software key.
This program can be used without a
software key only for demo purposes.
In no case can this program be used
on a live system without an
authorized software key.
Copy the program into another
computer only for backup purposes in
support of your use of the program on
one Security Escort system.
Security Escort | Technical Reference Manual |
EN | 3
Bosch Security Systems | 6/12 | 38947D
Remedy
Bosch Security Systems will replace
defective media or documentation, or
correct substantial program errors at no
charge, provided you return the item
with proof of purchase to Bosch Security
Systems within 90 days of the date of
delivery. If Bosch Security Systems is
unable to replace defective media or
documentation, or correct substantial
program errors, Bosch Security Systems
will refund the license fee. These are
your sole remedies for any breach of
warranty.
Because programs are inherently complex
and may not be completely free of
errors, you are advised to verify your
work. In no event will Bosch Security
Systems be liable for direct, indirect,
incidental, or consequential damages
arising out of the use of or inability
to use the program or documentation,
even if advised of the possibility of
such damages. Specifically, Bosch
Security Systems is not responsible for
any costs including, but not limited to,
those incurred as a result of lost
profits or revenue, loss of use of the
computer programs or data, the cost of
any substitute program, claims by third
parties, or for other similar costs.
Bosch Security Systems does not
represent that the licensed programs may
not be compromised or circumvented. In
no case shall Bosch Security Systems
liability exceed the amount of the
license.
Some states do not allow the exclusion
or limitation of implied warranties, or
limitation of liability for incidental
or consequential damages, so the above
limitation or exclusion may not apply to
you.
Bosch Security Systems retains all
rights not expressly granted. Nothing in
this license constitutes a waiver of
Bosch Security Systems rights under the
U.S. Copyright laws or any other Federal
or state law.
Should you have any questions concerning
this license, write to: Bosch Security
Systems, 130 Perinton Parkway, Fairport,
New York 14450.
Security Escort | Technical Reference Manual | Table of
Contents
The Security Escort System consists of
five basic components: transmitters,
receivers, alert units, transponders,
and the central console.
The transmitter is a miniature, radio
transmitter, used to transmit either a
distress or a test signal. The
receivers are located throughout a
protected area and detect the radio
transmissions from transmitters. Alert
units are siren/strobe units activated
in the event of an alarm. Transponders
are devices that control groups of
receivers and alert units, connected to
them by wire. Each transponder relays
alarm and test signals from its
receivers to the central console. In
addition, the transponder tests for
device and wiring faults, and transmits
problem conditions to the central
console. The central console consists
of a computer (the master computer), an
optional backup computer (the slave
computer). Up to eight optional
workstation computers can be used to
receive alarm and trouble signals from
the transponders, analyze the signals,
activate strobes and sirens on the
alert units, and produce a display for
the security dispatcher. Each of these
system elements is described more fully
below.
1.1.2 Transmitter
There are several types of transmitters
for personal use; those normally
assigned to system subscribers, one for
security personnel, and one for
maintenance personnel. Each transmitter
type serves a different purpose. All
versions of transmitters for personal
use produce alarm and test
transmissions.
Subscriber Transmitter
Each transmitter contains a unique
code, which is associated with the
subscriber at the time the transmitter
is assigned. In the event of an
emergency, press and hold the alarm
button(s) for 1 sec. to produce an
alarm (see your transmitter user
manual). Optionally, within
approximately 2 sec., the sounders in a
nearby receiver activate, as well as
the strobes and sirens on nearby alert
units.
The transmitters have a second feature,
the test mode. When the user is
indoors, in sight of an interior
receiver or outdoors, in sight of an
alert unit, pressing the test sequence
performs a test (see your transmitter
User’s Manual). If the test is
successful, a small green light flashes
on the interior receiver, or the strobe
on an alert unit flashes briefly. There
is no response at all if the test
fails. If the test fails, the user
should try again. If there is still no
response, the user should contact the
security office as soon as possible.
Every successful test is recorded in
the Subscriber Database in the central
console software and optionally printed
on the hardcopy printer. The Subscriber
Database contains all of the
information relating to each
subscriber, including the date and time
of the most recent test transmission.
It is possible to search the Subscriber
Database for individuals who have not
performed tests for a specified period
of time.
Security Transmitter
The Security Transmitter are unique in
the way that both tests and alarms are
processed. Outwardly, Security
Transmitters perform in the same manner
as normal transmitters during testing.
That is, strobes flash on alert units
and green lights flash on receivers to
confirm a successful test. However,
when a Security Transmitter is tested
within close proximity of a receiver,
the central console records not only
the user identity, and the date and
time (as with a normal user test) but
also the location of the officer at the
time of the test. These tests are
designated by the term security test on
the printout at the central console and
provide a convenient means of recording
security patrols. (To protect user
privacy, location information is not
printed out for regular subscribers
during tests.)
The Security Transmitters also differ
in the way that alarms are managed.
Unlike regular transmitters, no sound
is emitted from the transmitter itself,
no horns are activated on receivers,
and no strobes or sirens are activated.
The console in the security office
sounds an alert tone and displays the
alarm as usual except for a yellow
background and text advising that the
event is a silent alarm from a security
officer. This allows security personnel
to call for assistance without
attracting unwanted attention.
Maintenance Transmitter
The Maintenance Transmitter is used
exclusively for system set-up and
diagnosis. Maintenance alarms are used
during the system set-up to verify that
a receiver is functioning and is
properly identified in the Transponder
Database. The maintenance alarm is also
used to measure the received signal
strength of the receivers from any
location within the protected area. The
central console distinguishes the
Maintenance Transmitter by its unique
coded message and produces a printout
of the signal strengths reported by
receivers on each transponder.
In the Test Mode, the Maintenance
Transmitter behaves like a normal
Subscriber Transmitter except that the
central console does not verify the
user ID portion of the transmitted
code. Unlike the Subscriber
Transmitters, all Maintenance
Transmitters are assumed to be valid.
Point Transmitter
The Point Transmitter is used to
protect assets not people. It has a
magnetic reed switch and a supervised
loop that reports both open and shorted
states. The software can be programmed
to report alarms and troubles on any of
these conditions going off normal with
unique text identifying the condition.
These transmitters are supervised and
also optionally support the alarm
follower.
1.1.3 Receiver
The receivers are located throughout
the protected area, including building
interiors. Inside buildings, the
spacing of these devices depends on the
building construction and the locating
precision required. Outdoors, spacing
depends on terrain and foliage
conditions and building obstructions.
The procedure for location of receivers
is contained in The Security Escort Installation Guide.
Each receiver contains a radio receiver
to detect the transmissions from
transmitters, and microcomputers to
decode and interpret the received test
and alarm messages. In addition, the
microcomputers monitor to detect
tampering, and report such conditions
to the transponder.
Each receiver contains a sounder
similar to those in self-contained
smoke detectors. These sounders are
optionally activated if the receiver
has detected an alarm transmission.
Indoor receivers are typically mounted
on inside walls. They are housed in
small beige, rectangular units. Indoor
receivers have one red and one green
light. The green light is used to
indicate a successful test of a
transmitter. The red light is only
illuminated during certain system tests
and during alarms.
Outdoor receivers are contained in
small weatherproof boxes typically
mounted on the sides of buildings and
on light posts. Outdoor receivers do
not have the visible red and green
LED’s. Outdoors, the strobe lights on
the alert units flash to acknowledge
successful tests.
In addition to its radio receiver, each
receiver also contains a transmitter
functionally similar to the hand held
transmitters. This transmitter can be
commanded by the central console to
transmit a test message to other nearby
receivers. This buddy checking is
performed periodically to verify that
the receiver sections of all receiver
units are functioning satisfactorily.
1.1.4 Alert Unit
An alert unit consists of two
components, a self-contained
strobe/siren unit and an electronic
driver unit. The latter may be housed
in either a metal indoor enclosure or
an outdoor enclosure (similar to the
outdoor receiver enclosure), depending
on the application. The strobe siren
units are always mounted in outdoor
locations. In addition to the function
of attracting attention in the event of
an emergency, the strobe unit is used
to acknowledge a successful test of a
transmitter.
The alert unit has back-up battery
power in addition to AC power. The
alert unit driver contains a
microprocessor, which communicates with
the transponder for strobe and siren
commands, status reports, and trouble
indications. The troubles monitored are
tamper, loss of AC power, and low
battery.
1.1.5 Transponder
The transponder is a device controller
for up to 64 devices; any combination
of receivers and alert units. The
devices are connected to the
transponder by means of 8 four wire
multiplex busses, two wires for power
and two wires for data. Each bus is
capable of supporting up to eight
devices. The Security Escort System
supports up to 255 transponders.
Each receiver and alert unit is
identified to its transponder by a
multiplex address that is set during
system installation using a multiposition switch on the receiver or
alert unit circuit board. Transponders
communicate on the data bus with
individual multiplex devices by issuing
commands, which contain the receiver or
alert unit’s multiplex address. Note
that a given transponder may have up to
eight devices with the same binary
multiplex address, one on each bus.
Thus, the complete identification of a
particular device must include the
transponder with which it is associated
(1 to 255), the bus on which it is
located (0 to 7), and its binary
multiplex address (0 to 7).
When a receiver or alert unit detects a
reportable event (alarm, test, tamper,
loss of AC power, and so on) it goes
into an Off Normal state. To quickly
locate any devices which might be in
the Off Normal state, global commands
(which are interpreted simultaneously
by all of its devices) are issued by
the transponder approximately ten times
per second. These global commands are
followed by commands to specific
devices to determine the nature of the
Off Normal condition and, in the case
of an alarm or test, to obtain the
Transmitter Identification Number,
Transmitter Battery Condition, and
Received Signal Strength. This
information is used by the central
console to identify the subscriber
transmitting the alarm (test) and to
determine the subscriber’s location.
1.1.6 Central Console
The central console consists of one to
eight IBM PC compatible computers
running the Security Escort software
within the Microsoft Windows
environment. One computer serves as the
main controller for the entire Security
Escort System (the master computer) and
a second serves as an optional backup
(the slave computer). The other
computers serve as workstations for the
operators of the software. The slave
and workstation computers can be used
for administrative functions such as
adding subscribers or performing
routine system tests without
interfering with the operation of the
master computer.
In the event of an alarm from a
transmitter, the console displays the
name of the individual to whom the
transmitter is assigned, and the
location from which the transmission
was made. The location information is
shown graphically on a map of the
protected area. Other information about
the subscriber, such as address, home
address, phone number, and any
disabilities may also be shown.
Both the main computer and the backup
record all messages sent between the
central console and the transponders,
providing redundancy of records.
1.1.7 Software Overview
The central console contains all of the
operating software and all of the
databases required by the Security
Escort System. The Security Escort System Operations Manual describes that
portion of the system software, which
affects system operators (in most
cases, the Security Department
personnel). This Technical Manual
discusses only the software functions
that are specific to installation and
maintenance of the system.
All operations on the central console
computers are password access
controlled. The Logout option on the
Main Menu bar produces a screen for
entry of the password (see Figure 1).
Passwords may have different authority
levels, assigned by installation
company personnel or the Security
Department’s key operator.
Operations not accessible at a given
authority level appear in gray rather
than black on the central console. The
installation and maintenance portion of
the Security Escort Software is
designed to facilitate set-up and
modification of the system and to
provide rapid diagnosis of system
problems, usually with only one person
being required. From the central
console, simple commands can be used to
scan all devices on a particular
transponder for their current status.
Devices can be enabled or disabled from
the central console and the on-board
transmitter of one receiver can be
activated to test an adjacent receiver
in order to confirm that its radio
receiver section is operating properly
(buddy check).
The Security Escort Software also
continually monitors the status of each
transponder to insure it is functioning
correctly. All communications between
the central console and a transponder
require acknowledgments to verify
message integrity. Each transponder
must transmit a message periodically,
to assure the central console that the
transponder is still operating
properly. Should a transponder fail to
transmit either a routine status report
or any other message to the central
console, the central console sends a
query to the transponder requesting a
message be returned. If there is no
response after six attempts at
communications, a pop-up alert appears
on the central console.
1.2 System Operation
The following sections describe the
basic operation of the Security Escort
System during alarm, test, and various
other routine and emergency situations.
1.2.1 Alarm Sequence
Transmitter
When a user of the Security Escort
System activates an alarm with the
transmitter, multiple identical packets
of digital data are transmitted from
the hand-held transmitter to nearby
receivers. Each packet contains a
unique device identification code, an
alarm type indication, the transmitter
battery condition, and a check
sequence. Multiple packets are employed
to assure successful receipt of the
message by the receivers.
Receiver
The receiver is continuously listening
for radio signals that might be alarm
or test data from transmitters. If the
incoming message is determined to be
valid, representing either an alarm or
a test from a transmitter, the peak
amplitude of the received signal is
recorded.
Transponder Scanning
The transponder continually scans all
of its receivers to see if any of them
received a valid transmission. Once a
transponder determines that one or more
of its receivers received a
transmission, it directs a message to
those receivers, to determine the
specifics of the transmission.
Receiver’s Response
The receivers respond to these messages
with the identification code of the
transmitter that sent the alarm or
test, the alarm or test type, and the
amplitude of the signal received from
the transmitter.
Transponder Data Collection and
Response
The transponder next constructs a
message for the central console
containing the receiver addresses, for
all receivers responding to the event
and signal levels of the receptions,
the alarm or test type and the
transmitter identification number. The
transponder then verifies that the
communications channel is free and
transmits the information to the
central console. If the communication
channel is busy, the transponder delays
a random period of time and tries
again.
After acknowledging the alarm
transmission from the first
transponder, the central console begins
its alarm analysis while collecting the
alarm data from all other transponders,
which had receivers that detected the
alarm. The Subscriber Database is
checked to determine the appropriate
reaction to the alarm. If the
transmitter is assigned to a valid
subscriber and it is not designated as
a security or watchman device, the
central console commands the
transponders to turn on the appropriate
alert units. Depending on the settings
selected in the Security Preferences Screen, this enables only the strobe
portion of the alert unit, or both the
strobe and siren. If the transmitter is
unassigned, or has been disabled by
selection of that option in the
Subscriber Database, no commands will
be issued to activate the alert units.
Note:
An option in the Security
Preferences Screen allows
unauthorized transmitters (not
programmed in the database) to be
treated like authorized
transmitters. For example, strobes
and/or sirens can be activated in
the case of an alarm transmission
(if they are also set to be
activated for authorized
transmitters).
The central console computes the
location of the transmitter by
comparing the signal strengths measured
by the receivers which detected the
transmission.
A partial map of the protected area is
displayed on the central console,
centered on the computed location, and,
a yellow circle is drawn to assist the
operator in guiding the response
personnel to the probable source of the
transmission. Other data drawn from the
Subscriber Database is added to the
central console display to assist in
the response to the alarm. In addition,
the central console enunciator is
activated to alert the operator to the
event.
The central console also writes the
time, location, and identity
information to the hardcopy printer and
writes a complete record of all
activities to the hard disks on both
the primary and backup computers.
Operator’s Response
The operator reacts to the alarm by
acknowledging the event with a
keystroke or click of the mouse, which
silences the alert sound from the
central console. This silences only the
central console enunciator, not the
outdoor sirens or interior horns. The
operator then directs response
personnel to the scene and awaits their
indication that the problem was
resolved.
When the response personnel advise the
operator that the problem is under
control, the operator enters his
password into a box on the central
console. This step causes the central
console to send commands to the
transponders to silence the sirens and
horns and extinguish the strobes and
LED’s. A reset of the system is
accomplished with another key stroke or
a mouse click on the Reset button on
the screen.
Receivers can handle multiple separate
alarm or test events at the same time.
If the receiver’s event buffer is full
but contains test events, it discards
the test records in favor of an
incoming alarm. Similarly, the
transponder event buffer can hold
multiple events and it also replaces
test events with alarm events when its
buffer is full.
To assure that simultaneous alarms are
detected, the multiple identical
packets sent by the transmitters are
randomly spaced over approximately one
second. Only one of the packets must be
detected to produce an alarm. Thus a
collision between the transmissions of
two or more transmitters is virtually
eliminated. In addition, unless the
transmitters are in the same location,
they detect different groups of
receivers. The central console is
capable of processing 30 concurrent
alarms. When there is more than one
active alarm, the central console
displays data for the first to be
received and also indicates the total
number received and the identity of the
individuals transmitting them. The
operator can click on the name of an
individual to see the data for a
particular alarm.
1.2.2 Test Sequence
Transmitter
When the user of the Security Escort
System activates a test transmission,
multiple identical packets of digital
data are transmitted. In this case, the
digital data in the transmitted packets
contain a test code rather than an
alarm code.
Receiver
The receiver responds to a test
transmission the same as to an alarm
transmission by decoding the radio
signals, and measuring signal levels.
Transponder Data Collection and
Response
The transponder collects data on a test
event in the same manner as for an
alarm event, it does not command the
LED (green for test confirmation) to
flash until it has been commanded to do
so by the central console. Transmitters
not in the Subscriber Database, or in
the database, but disabled, do not
receive a flashing green light or
flashing strobe that would indicate a
successful test.
Central Console Response
The central console responds to the
report of a test from a transmitter by
collecting the data from each
transponder reporting the event, and
recording the locations of the
receivers that detected the
transmission. In this case, however, it
does not calculate a location estimate.
It simply records the data on the
primary and backup computers’ hard
disks, prints the identity of the
subscriber, date and time on the
hardcopy printout, and displays generic
test icons on the central console in
positions corresponding to the
locations of receivers hearing the
transmission.
In the case of test transmissions from
Security Transmitters or Watchman
Transmitters, the central console
determines the closest receiver to the
transmission and creates a guard tour
event which becomes a part of the Guard
Tour Report.
Operator’s Response
There is no response required of the
operator in the case of a test
transmission.
Security Escort | Technical Reference Manual | 2.0 Setting Up The
System
EN | 13
Bosch Security Systems | 6/12 | 38947D
Figure 4: File Menu
2.0 Setting Up The System
2.1 Initial System Configuration
The default password is PPP. The
default password, the Master password,
and passwords for all system operators
added by referring to the Operators
Database in the Security Escort Operations Manual should be changed.
To generate the map file for the
screen display, refer to Section 5.1 Map File Generation and Scaling.
To setup the transponder COMM ports
refer to the Section 3.3.18 Transponder Comm Port Setup Screen.
To setup the system COMM ports refer
to the Section 3.3.19 Remote Comm Port Setup Screen.
To set the function of the system
COMM ports and setup remote access,
see Section 3.3.20 Remote Setup
Screen.
To program the system configuration,
see Section 3.1.6 Transponder Database.
To program the system responses to
an alarm, see Section 3.2.3 Security Preferences Screen.
To program the system responses to
troubles, see Section 3.3.3 Popup Trouble Filter.
After communications to the
transponders are established for any
transponder that uses a Proxim Radio
to communicate, program the Uses Proxim Radio field in the
Transponder Parameter Change Screen.
If all alarms are to be silent,
program the Run Silent field. (See
computers, set the Default Master
Computer and Default Slave Computer.
(See Section 3.3.20 Remote Setup
Screen.)
If using pager access in this
system, see Section 3.3.23 Pager Setup Screen.
If this computer runs other programs
at the same time, Security Escort is
running, set the Not Always Top
Window field (see Section 3.2.3
Security Preferences Screen).
To program the ID Receiver to
automatically enter the transmitter
IDs, see Section 3.2.3 Security Preferences Screen.
To set the names of the subscriber
classes, see System Default Screen
in the Security Escort Operations Manual.
To program the transmitters into the
Subscriber Database, refer to the
Security Escort Operations Manual.
3.0 System Menus and
Screens
3.1 File Menu
3.1.1 Locate Transmitters
This selection allows the operator to
display the last reported location of
the transmitter assigned to the
indicated individual or asset. When the
individual or asset is selected from
the list, the time of the last
supervision report is shown (or None is
displayed if no supervision report was
received from that transmitter). On the
map, the last report location is shown.
Security Escort | Technical Reference Manual | 3.0 System Menus
and Screens
EN | 14
Bosch Security Systems | 6/12 | 38947D
Figure 5: Locate Transmitters
Figure 6: Maintenance alarm with
Signal Levels Shown in Icons"
Figure 7: Edit Subscriber’s
Advanced Features Screen
3.1.2 Maintenance Alarm Database
Maintenance Transmitters, when
activated in the Test or Alarm Mode,
generate a series of multiple data
packets like Subscriber Transmitters,
however, a special code in each packet
identifies the transmitter as a
Maintenance Transmitter.
The receiver responds to a maintenance
alarm or test transmission in the same
way it responds to a subscriber alarm
or test, unless the receiver is put in
the Setup Mode. The transponder then
reports the Maintenance Transmitter
identification number and all signal
levels to the central console which
creates the location estimate and
processes the data as it would for a
normal alarm.
Note:
All Maintenance Transmitters are
assumed to be valid so there is no
need for the central console to
check for the identification number
in the Subscriber Database.
The central console does not generate
an audible alert for the operator and
does not create an alarm display on the
main central console. Because they can
be set to graphically display received
signal levels, maintenance alarms are
very useful in verifying that the
system coverage exists at any location
in the protected area and that receiver
redundancy is adequate.
3.1.3 Operator Database
The Operator Database contains the
information on the individuals who are
authorized to operate the system, their
authority levels, and passwords. See
the Security Escort Operations Manual.
3.1.4 Reports Database
The Reports Database contains the
information on alarms that were
previously processed by the system.
Alarm data and maps showing the
operators view can be recalled. See the
Security Escort Operations Manual.
3.1.5 Subscriber Database
The Subscriber Database contains the
information on the transmitters that
are assigned in the system. See the
Security Escort Operations Manual. When
the Advanced button is pressed in the
Subscriber Database Edit Screen, the
Edit Subscriber’s Advanced Features
Screen (Figure 7) displays.
The Edit Subscriber’s Advanced Features
Screen is used to set up special
transmitters that monitor fixed
locations, subscriber pager access,
parameters for point transmitters, the
virtual fence for a wandering alarm,
the alarm group for arming of the
transmitter, and check-in requirements
for this transmitter.
Security Escort | Technical Reference Manual | 3.0 System Menus
and Screens
EN | 15
Bosch Security Systems | 6/12 | 38947D
Phone Number
This phone number is dialed to send a
pager message to this subscriber.
Typically, this is a different phone
number than the one that is manually
dialed to access this pager. The phone
number is assigned by the paging
service.
Pager Password
This is the password to be sent to the
paging service when a page is sent to
this subscriber. Leave blank if not
required (typically the pager password
is not required). The pager password is
assigned by the paging service.
Pager ID
This is the ID that identifies the
pager to receive the pager message
(many times this value is the last
seven digits that are manually dialed
to access this pager). The pager ID is
assigned by the paging service.
Pager Group
These are the pager groups that this
subscriber is a member of. This
subscriber can be a member of up to
three different pager groups.
Pager Confirmation Not Required
If checked, the confirmation pager
message is not sent to this pager if
alarm is acknowledged by an
acknowledgement transmitter.
Fixed Location Transmitter
This section is used only when this
transmitter is mounted in a fixed
location (it does not move). When this
transmitter transmits an alarm, it is
always reported at the programmed
location.
Floor Level
This is the floor level where this
alarm is located for a fixed location
transmitter.
Map X Position
This is the X coordinate of the map
position where this alarm is located
for a fixed location transmitter.
Map Y Position
This is the Y coordinate of the map
position where this alarm is located
for a fixed location transmitter.
Locate
When clicked, the Edit Subscriber’s
Advanced Features Screen disappears and
the cursor changes to a cross hair.
Moving the cursor to a point on the map
and clicking the left mouse button
scrolls the map to that point at the
center of the screen.
When the map is showing the desired
alarm location, move the cross hair to
the exact location of the alarm to be
reported and click the right mouse
button. The Edit Subscriber’s Advanced
Features Screen reappears and the
selected location is entered into the X
and Y coordinates.
If while the cross hair cursor is
displayed, you want to exit without
changing any coordinate values, press
the [ESC] key and the Edit Subscriber’s
Advanced Features Screen reappears.
Map Number
Defines which bitmap is displayed for
the fixed location of this transmitter.
The default map is zero, which
corresponds to bitmap MAP0.EDB stored
in the Escort sub-directory. Map 1
would be MAP1.EDB. There can be 100
maps per Security Escort System (0 to
99).
Security Escort | Technical Reference Manual | 3.0 System Menus
and Screens
EN | 16
Bosch Security Systems | 6/12 | 38947D
Enable Reed Switch
If checked, the reed switch input of
this transmitter is enabled and causes
an alarm. Otherwise, the reed switch
input is disabled. The alarm group this
transmitter is assigned to must be
armed, for this input to cause an
alarm, which is displayed. If no alarm
group is assigned, the transmitter is
always armed. To enable this option,
the transmitter’s class must be set to
point type.
Optional Text
This is optional text that can be added
to the location text when this input
reports an alarm. To enable this
option, the transmitter’s class must be
set to point type.
Disable Shorted Loop
If selected, a shorted loop on this
transmitter does not cause an alarm or
trouble report to display. To enable
this option, the transmitter’s class
must be set to point type.
Alarm on Shorted Loop
If selected and the alarm group this
transmitter is assigned to is armed, a
shorted loop on this transmitter causes
an Alarm Report to display. For this
input to cause an alarm, the alarm
group this transmitter is assigned to
must be armed, which is displayed. If
no alarm group is assigned, the
transmitter is always armed. To enable
this option, the transmitter’s class
must be set to point type.
Trouble on Shorted Loop
If selected, a shorted loop on this
transmitter causes a Trouble Report to
display. To enable this option, the
transmitter’s class must be set to
point type.
Alarm When Armed, Trouble When Disarmed
on Shorted Loop
If selected and the alarm group this
transmitter is assigned to is armed, a
shorted loop on this transmitter causes
an Alarm Report to display. If selected
and the alarm group this transmitter is
assigned to is disarmed, then a shorted
loop on this transmitter causes a
Trouble Report to display. If no alarm
group is assigned, the transmitter is
always armed. To enable this option,
the transmitter’s class must be set to
point type.
Disable Open Loop
If selected, an open loop on this
transmitter does not cause an Alarm or
Trouble Report to display. To enable
this option, the transmitter’s class
must be set to point type.
Alarm on Open Loop
If selected and the alarm group this
transmitter is assigned to is armed, an
open loop on this transmitter causes an
Alarm Report to display. The alarm
group this transmitter is assigned to
must be armed for this input to cause
an alarm, which is displayed. If no
alarm group is assigned, the
transmitter is always armed. To enable
this option, the transmitter’s class
must be set to point type.
Trouble on Open Loop
If selected, an open loop on this
transmitter causes a Trouble Report to
display. To enable this option, the
transmitter’s class must be set to
point type.
Alarm When Armed, Trouble When Disarmed
on Open Loop
If selected and the alarm group this
transmitter is assigned to is armed, an
open loop on this transmitter causes an
Alarm Report to display. If selected
and the alarm group this transmitter is
assigned to is disarmed, an open loop
on this transmitter causes a Trouble
Report to display. If no alarm group is
assigned, the transmitter is always
armed. To enable this option, the
transmitter’s class must be set to
point type.
Fixed Location and Pager Text
This is the text that displays as the
location of the alarm for fixed
location transmitters and on pagers
reporting this alarm.
Transponder Name
Select the transponder with the area
that defines the area for a wandering
(virtual fence) alarm. Refer to
Transponder Area for the operation and
setup of the wandering alarm (virtual
fence alarm).
Security Escort | Technical Reference Manual | 3.0 System Menus
and Screens
EN | 17
Bosch Security Systems | 6/12 | 38947D
Figure 8: Find Transponder’s
Transponder Area
Wandering Alarm - Create a protected
area by placing a virtual monitor fence
around an area of the main map. These
areas are defined in the transponder
database. If this transmitter is
constrained to remain within one of
these defined areas, first select the
defining transponder in the Transponder Name field. Then select the desired
area from this dropdown list of the
transponder’s area names.
For the wandering alarm to work, the
supervision period must also be
programmed for this transmitter.
Specific transmitters are marked in the
Subscriber Database to be constrained
within a specific fenced area defined
by this option. If the transmitters
leave their defined area, the system
reports this as a wandering alarm and
continues to monitor and track the
location of the transmitter until the
alarm is canceled from the screen in
the normal way. However, these tracking
updates can only occur every
supervision transmission period (not on
an accelerated rate like a tracking
alarm).
The Security Escort System computes the
location of the transmitters when they
broadcast automatic supervision
transmissions periodically.
Because of the basic location accuracy
and the floor-to-floor accuracy of the
system, there is a potential for some
false alarms. If false alarms are a
problem, check the Filter Virtual Fence
checkbox in the Edit Security
Preferences Screen. If you do this, two
successive location calculations
indicate the transmitter moved outside
the protected area before an alarm was
generated. The downside of this is a
delay in the reporting of a wandering
alarm of one extra transmitter
supervision period.
Alarm Group
This is the alarm group that controls
the arm/disarm status of this
transmitter. Select the desired alarm
group from the dropdown list. This
alarm group must be armed for this
transmitter to cause an alarm, which is
displayed. If no alarm group is
assigned, the transmitter is always
armed.
Requires Check-in
When this checkbox is checked, this
transmitter activates once each day
during the check-in schedule time. At
the end of the check-in period, if the
subscriber fails to check-in, a Failed
to Check-in Report is generated and
presented to the operator. This report
contains all of the people who failed
to check-in with their first address
line and phone number. All subscribers
in the report must be checked on to
make sure they are not in need of
assistance, as this may be a lifethreatening situation. A printed report
may be generated.
If the transmitter is not a point type,
the transmitter can generate alarms and
therefore a test transmission is used
for the check-in.
If the transmitter is a point type, any
non-trouble transmission serves as a
check-in.
One of the ten schedules must be
selected as the check-in schedule to
define the check-in period.
Done
Click this button when all changes are
complete to return the main Subscriber
Database Edit Screen.
3.1.6 Transponder Database
The Transponder Database is established
at system set-up and contains all
necessary configuration data for each
transponder, receiver, and alert unit.
It describes the basic structure of the
installation, including all device
names, locations, types, multiplex
addresses, and so on. This information
is used by the central console to
generate alarm and test displays on the
central console and in determining
which alert units are activated.
Security Escort | Technical Reference Manual | 3.0 System Menus
and Screens
EN | 18
Bosch Security Systems | 6/12 | 38947D
Database Record
Access the Transponder Database from
the FileMenu on the Main Menu bar. The
following paragraphs describe the
elements of the Find Transponder’s
Database Record Screen.
Transponder
This box contains the names of the
transponders. Clicking the arrow to the
right of this box displays a drop-down
list. The names of each transponder in
the system display, allowing easy
selection for review or editing.
The transponder names are assigned
during set-up and used to indicate the
physical location of the transponder or
the region of the protected area
covered by a particular transponder.
Created, Modified, Modify Oper
The system software automatically
creates these three fields to the right
of the Find Transponder’s Database
Record Screen. They represent the date
the transponder was first entered into
the Transponder Database, the date of
the last change of any entry for this
transponder, and the identity of the
operator who made the last change
(determined from the password entered
to make the change).
Transponder ID
This is a number assigned to the
transponder at system set-up. It is
used by the central console to identify
the transponder during all
communications between the central
console and the transponder. The number
must agree with the transponder
address, which is set during final
installation by switches on the
transponder circuit board.
Note:
Zero is not allowed as a transponder
address.
Comm Port Index
This indicates which central console
communications port to use to
communicate with this transponder. The
Transponder Comm Port Setup Screen
selects the specific physical port that
this index refers.
Radio ID
This is the identification number for
the radio interface unit, if the
transponder communicates to the central
console by a radio link. (This feature
is currently not implemented.)
Isolate From All Other Transponders For
Location
When checked, this transponder is
isolated from all other transponders
for location considerations. This is
used when distant transponders
sometimes hear an alarm and throw off
the alarm location calculation. If this
checkbox is checked, it indicates that
this transponder is protecting an area
that is independent of all other
transponders in the system. When an
alarm is reported and receivers on this
transponder have the best reception,
only the receivers on this transponder
are considered for the location of this
alarm. If another transponder has the
best reception, then the receivers on
this transponder are ignored for the
location of this alarm.
Ignore Communications Failure
This checkbox allows communications
failures to be ignored for this
transponder. It is used during a new
installation for transponders that are
not yet fully on line. During system
maintenance when a transponder is out
of service for a while, it is used so
that the communications failure
messages do not flash on the screen and
distract the operator. Checking this
checkbox causes the system to ignore
communication failure. Therefore, if
communications fail with this
transponder, the area this transponder
protects is not protected and alarms
from subscribers in that area are
missed without the operator’s
knowledge. This checkbox should not be
checked in a live system.
Security Escort | Technical Reference Manual | 3.0 System Menus and Screens
EN | 19
Bosch Security Systems | 6/12 | 38947D
It is a good idea to create an
entry in the Transponder
Database for each transponder
in the system before entering
the data for each device so
that all transponders appear in
the drop-down menus.
Insert New
Clicking this button displays a new
Edit Subscriber’s Advanced Features
Screen. This is used to enter a new
transponder to the database.
Edit Data
Clicking this button allows the
currently displayed transponder’s
database record to be edited.
Kill Transponder
Clicking this button deletes the
displayed transponder’s database
record. If the transponder is deleted.
its data is permanently deleted and
cannot be recovered.
Delete Point
Clicking this button deletes the
displayed point only from the displayed
transponder’s database record. If the
point is deleted, its data is
permanently deleted and cannot be
recovered.
Copy
Clicking this button copies the
displayed transponder’s database record
into a new transponder record. This
allows similarly configured
transponders to be programmed once,
then copied into a new record.
Note:
It is not possible to edit the
transponder ID itself. If this
should be necessary, the Copy button
can be used to produce another
Transponder Database entry
duplicating the first, but with the
transponder ID blank. The new
transponder ID can be entered, the
new data saved by using the Save
button, and the old transponder
entry can be deleted by using the
Kill Transponder button.
Print
Clicking this button prints the
displayed transponder’s database
record.
Beginning
Clicking this button changes the
displayed transponder to the first
transponder in the database.
Previous
Clicking this button changes the
displayed transponder to the previous
transponder in the database.
Next
Clicking this button changes the
displayed transponder to the next
transponder in the database.
End of File
Clicking this button changes the
displayed transponder to the last
transponder in the database.
Mux Point Data
The lower portion of the Find
Transponder’s Database Screen provides
information on each of the devices
controlled by the transponder selected
in the Transponder field. Two digits
represent each receiver or alert unit
address; the first is the number of the
multiplex bus on which the device is
mounted (0 to 7) and the second is the
multiplex point address assigned to the
particular device. On each of the eight
multiplex busses up to eight devices
may be installed, but each device must
be assigned a unique multiplex point
address (0 to 7). More than one device
can have a particular multiplex point
address, but only if on different
busses. The multiplex point addresses
are assigned by switch settings on the
device (receiver or alert unit) circuit
boards. These multiplex point address
settings are also a part of the
Transponder Database. The multiplex
address shown in the Transponder
Database and the multiplex address set
on the device circuit board must agree.
The Transponder Setup Screen s used to
verify multiplex address settings.
3.1.7 Creating a New Transponder Entry
The creation and modification of the
Transponder Database requires special
authority levels usually assigned only
to installation company personnel.
The Insert New button creates a new
Transponder Database Screen, ready for
entry of data.
Security Escort | Technical Reference Manual | 3.0 System Menus
and Screens
EN | 20
Bosch Security Systems | 6/12 | 38947D
Figure 9: Blank Screen Resulting
from Selecting the Insert New
Button
Figure 10: Select Point Screen with
"All Points" Selected
The System Design Layout Sheets
prepared in advance by the installation
manager should contain the necessary
information for assigning the
transponder name and ID, the comm port
or radio ID, as well as the names and
multiplex addresses for all receivers
and alert units connected to each
transponder.
The System Design Layout Sheets also
contain the text used to indicate the
receiver locations and designates the
alert units driven by each receiver.
3.1.8 Setting Receiver Parameters
If the Transponder Database already
contains the transponder, the Edit
button is used to allow completion or
modification of the data.
Trouble Type Text
This is the text that is shown in the
Trouble Screen when the remote key
input on the transponder goes active
(shorted).
Trouble Tamper Text
This is the text that is shown in the
Trouble Screen when the remote key
input on the transponder goes into
trouble (open).
Trouble Response Text
This is the text that is shown in the
Trouble Screen as the response test.
The actions the responding individual
should take.
Show Points
If selected, the lower half of the
Transponder Database’s Screen shows the
point’s (receiver, virtual receiver, or
alert unit’s) database values.
Show Areas
If selected, the lower half of the
Transponder Database’s Screen shows the
area’s database values.
Area Number
Each Transponder can have up to 80
areas defined (prior to version 2.04 of
the software only 40 areas could be
defined). Area numbers range from 0 to
79. Use the Locate button to define the
area graphically on the map.
Point Number
Each receiver and alert unit connected
to the transponder has a unique point
number assigned during the system
design process. This number corresponds
to a specific bus number and point
multiplex address number. The multiplex
address, set by means of switches on
the device (receiver or alert unit)
itself, must correspond with the point
number assigned in the Transponder
Database. For instance, a device
programmed with multiplex address
location 3 and on bus 5 is point number
29. This relationship is displayed in
the table that displays anytime a ? box
is clicked with the mouse. Clicking on
any number in the table automatically
enters that number into the Point Number field on the Transponder
Database Screen and closes the table
screen.
Security Escort | Technical Reference Manual | 3.0 System Menus
and Screens
EN | 21
Bosch Security Systems | 6/12 | 38947D
Figure 11: Select Point Screen with
"Receivers Only" Selected
Figure 12: Drop-Down Menu for
Selection of Point Type
A third number, the point number is
unique to a particular device. Point
numbers range from 0 to 63. There is a
one-to-one correspondence between a
point number and a point multiplex
address/bus number pair. The point
number assignment is presented in a
table displayed whenever the ? box to
the right of the Point Number field is
clicked.
Figure 11 illustrates a quick way to
select a particular device without
having to translate between the two
numbering systems. Three buttons at the
bottom of this screen allow the user to
display all possible device numbers
(whether or not the particular
transponder has a device assigned to
the number) or, to display only
locations populated by receivers or
only locations populated by alert
units.
When the Point Number button in the
table is clicked, the Point Number
table disappears and that point number
automatically appears in the Point Number field of the Transponder
Database Screen. The bus number and
point address are also changed to
reflect the selection
+, -, Bus + and Bus -
These buttons, just below the Point
Number field, allow you to quickly
advance the device selection by one
location, either one point location (+
or -) or one bus number (Bus + or Bus ). This is useful when a task requires
proceeding from device to device, as
during system setup or check out. The ?
box is used to display all devices to
facilitate quick selection of a
particular device. It is most useful
when diagnosing a problem with a
particular device.
Point Type
The Point Type field indicates the type
of device (receiver, virtual receiver,
or alert unit) located at the location
currently selected in the Point Number
field. Once the Point Number field
contains the proper value, the device
type is set by selecting from the
options in the drop-down menu that
appears when the arrow to the right of
the Point Type field is clicked.
Security Escort | Technical Reference Manual | 3.0 System Menus
and Screens
EN | 22
Bosch Security Systems | 6/12 | 38947D
Figure 13: Data Entry After
Selection of Receiver Point
Type
Figure 14: Data Entry after
Selection of Alert Unit Point
Type
Figure 15: Data Entry after
Selection of Virtual Receiver
Point Type
Figure 16: Data Entry when Show
Areas is Selected
Use the receiver selection when there
is a physical receiver connected at
this bus location.
Use the alert unit selection when there
is an alert unit connected at this bus
location.
The virtual receiver is intended to
compensate in cases where there is a
receiver imbalance. For example, if a
building with a dense population of
receivers is adjacent to a fence with
few receivers and an alarm occurs
between them, the alarm location can
pull towards the building. The virtual
receiver references two other physical
receivers that must be on the same
transponder. Only if both of the
referenced receivers receive an alarm
transmission, is the virtual receiver
added to the alarm as if a physical
receiver heard the alarm at the average
receive level of the two referenced
receivers. The virtual receiver’s
location and sensitivity can be
adjusted the same as a physical
receiver. After a virtual receiver is
added, verify the surrounding areas to
make sure they were not adversely
affected. In no event, should a virtual
receiver be utilized as a cost savings
measure to avoid the installation of an
actual receiver.
Use the virtual selection when there is
no physical device connected at this
bus location. Starting with version
2.03 of the Security Escort software,
you can add virtual receivers in the
Transponder Database. A virtual
receiver is added at one of the 64
points allowed per transponder.
However, there is no physical hardware
used.
Security Escort | Technical Reference Manual | 3.0 System Menus
and Screens
EN | 23
Bosch Security Systems | 6/12 | 38947D
Figure 17: Drop-Down Menu for
Assigning Alert Units to
Receivers
Figure 18: Location Algorithm
Selection
Figure 19: Receiver floor level
selection
Alert 1, Alert 2, Alert 3, and Test
Each receiver can be assigned up to
three alert units that are activated if
it is one of the receivers reported by
the transponder as part of an alarm
event. Each receiver can also be
assigned one alert unit that is
activated to confirm test
transmissions. These alert units do not
need to be connected to the same
transponder as the receiver. The
Transponder field contains the
transponder to which the designated
alert unit is connected and the Point
field contains the point number of the
alert unit on that transponder.
The test boxes similarly designate the
alert unit, if any, whose strobe unit
is activated in the event of a test
transmission from a transmitter.
To assign alert units to each receiver,
use the drop-down menus to the right of
the boxes labeled Alert 1, Alert 2, and
Alert 3 to select the transponder of
the designated alert unit. Type point
number into the Point field.
Changing the algorithm setting for a
receiver only affects the location when
the alarm is close to this receiver and
it hears the alarm the strongest. The
stronger the pull the more the alarm is
pulled towards the receiver, with
linear having no extra pull.
The algorithm setting is only available
if the Enable algorithm tweaks field is
checked in the System Preferences
Screen. Also Security Escort Software
version 2.03 and higher, allows
individual receiver sensitivity to be
set in the Transponder Database.
Receivers can be adjusted from 50% to
149% of their normal sensitivity using
the SA% field.
Floor Level
This selects the physical floor level a
receiver is mounted at or a virtual
receiver acts like it is mounted at. It
is very important that this setting is
correct for the operation of the
location algorithm.
Algorithm
Starting with version 2.03 of the
Security Escort Software, there are
five different location algorithms that
can be selected on an individual
receiver basis in the transponder
database. Classic (original Escort
algorithm), linear, low pull, medium
pull, and strong pull. By default, when
a receiver is set for outside or tunnel
it uses the linear algorithm; all other
receivers use the low pull algorithm.
The receiver that hears the alarm
transmission the strongest determines
the algorithm used for this alarm.
Receiver 1 and Receiver 2
These are the two receivers, on the
same transponder, that a virtual
receiver assumes the average of. Both
receivers must receive a signal before
the virtual receiver reports it also
received a signal that is the average
of the other two receivers signals. The
location algorithm and sensitivity
adjust work the same for a virtual
receiver as for a physical receiver.
Security Escort | Technical Reference Manual | 3.0 System Menus
and Screens
EN | 24
Bosch Security Systems | 6/12 | 38947D
Location
This block contains the text to be
displayed on the Alarm Screen if this
receiver is one of those closest to the
alarm source. The description is
developed with the guidance of the
security personnel who must respond to
an alarm. It is vital that the
description be clear and unambiguous to
them.
To enter a location description, place
the cursor in the Location field, click
the mouse, and begin typing. Receiver
and alert unit location names are
important because they are used for
directing response to an alarm and aid
service personnel in identifying the
device in the event of a problem. The
Problem Reports displayed on the
central console and printed by the
hardcopy printer contain the device
location descriptions that are entered
in the Location field.
SA%
Security Escort Software version 2.03
and higher allow individual receiver
sensitivity to be set in the
Transponder Database. Receivers can be
adjusted from 50% to 149% of their
normal sensitivity. No physical
receiver changes or upgrades are
required. This setting should only be
changed if there are known location
accuracy problems in the area of this
receiver. Settings of 50 to 99
desensitize the receiver to 50% to 99%
of the actual received signal strength.
Settings of 1 to 49 increase the
sensitivity to 101% to 149% of the
actual received signal strength. Try
changing the sensitivity of receivers
one at a time while testing the alarm
location response. For example, if
alarms are being pulled towards a
particular receiver, lower its
sensitivity in 10% increments and
retest. If the area can be corrected
using this method, verify the
surrounding areas to make sure they
have not been adversely affected.
Generally, it is better if the
correction is done in small steps while
verifying the adjacent areas, rather
than trying to correct the entire error
in one step.
The SA% option is only available if the
Enable algorithm tweaks field is
checked in the System Preferences
Screen. Also in the Transponder
Database the Algorithm dropdown list
allows selection of Default, Classic,
Linear, Low, Medium, or Strong pull
location algorithms for each
transmitter. The point reporting the
best reception level determines the
actual algorithm used for the location
on any event. If programmed for
Default, the algorithm used is Linear
for points programmed as outdoor or
tunnel. All other points use Low. If
the point reporting the best reception
level is not programmed for the Default
algorithm, the location calculation
uses the algorithm programmed.
Map
Defines which bitmap to display for
this receiver or area when an alarm is
closest to it. The default map is 0,
which corresponds to bitmap MAP0.EDB
stored in the Security Escort subdirectory. Map 1 is MAP1.EDB. There can
be 100 maps per Security Escort System
(0 to 99).
Video Switcher
Selects a system serial port programmed
in the Remote Setup Screen displaying
the most likely area the alarm is
located on the CCTV monitors near the
central console. The string activates a
macro in the video switcher that
selects the appropriate camera and
controls any required zoom and tilt
actions. Up to 40 characters can be
entered. Control characters can be
entered as [^][A] for control A.
Pager Group
The pager group that is paged if the
alarm location is determined to be in
this area.
Floor
Determines the floor number that this
area is defined for. The areas on
floors above and below this one can be
defined differently. For an area to be
selected when an alarm is received, the
location determined by the central
console must be located within the
defined area and must be located on the
designated floor.
Security Escort | Technical Reference Manual | 3.0 System Menus
and Screens
EN | 25
Bosch Security Systems | 6/12 | 38947D
Figure 20: Save Changes Screen Box
Virtual Fence Area
If this checkbox is checked, this area
is not used for a normal alarm area
location. This area is only used to
define a virtual fence. Specific
transmitters in the Subscriber Database
can reference this transponder and
area. When they reference this area and
the system locates the transmitter
position outside the area, a Wandering
(Virtual Fence) Alarm is generated.
This alerts the operator and shows the
position of the transmitter.
Locate
When clicked, the Edit Transponder’s
Database Record Screen disappears and
the cursor changes to a cross hair.
Moving the cursor to a point on the map
and clicking the left mouse button
scrolls the map so the point is at the
center of the screen and all previously
defined receivers and areas are shown
with numerical labels.
When the map is showing the location of
the desired receiver, move the cross
hair to the exact location of the
receiver and click the right mouse
button. The Edit Transponder’s Database
Record Screen reappears and the
selected location is entered into the X
and Y coordinates.
When the map shows the desired
location, move the cross hair to the
exact location of the first point of
the polygon that describes the boundary
of the area and right click. Move the
cursor to the second point of the
polygon and again right click. The
computer draws a straight line between
the first and second points. Repeat
this process drawing all sides of the
polygon to define the area. To close
the polygon, place the last point on
top of the first point. The polygon can
have up to nineteen sides and no two
lines of the polygon may cross each
other. If you try to create more than
nineteen sides, the computer
automatically closes the polygon with
the nineteenth side. When the polygon
is closed, it can be crosshatched to
make it more visible. After the polygon
is complete, double click the left
mouse button to return to the Edit
Transponder’s Database Record Screen.
If the area being defined is a virtual
monitor “fence” area for Wandering
Alarms, the monitor fence (area
boundary) should be drawn at least 7.62
m (25 ft.) past the area to be
protected to reduce potential false
alarms.
If the cross hair cursor is displayed
and you want to exit without changing
any coordinate values, press the [ESC]
key and the Edit Transponder’s Database
Record Screen reappears.
Cut
Clicking this button copies the
displayed point or area data to a
clipboard and returns all values to
their defaults.
Copy
Clicking this button copies the
displayed point or area data to a
clipboard. Displayed values are not
changed.
Paste
Clicking this button copies the
clipboard values to the displayed point
or area data. The values on the
clipboard are not changed and can be
copied to more points or areas.
Save
Clicking this button saves all changes
to the database.
Cancel
Clicking this button closes the screen.
If changes were made, Figure 20
displays giving you another chance to
save the changes by clicking the Yes
button.
Security Escort | Technical Reference Manual | 3.0 System Menus
and Screens
EN | 26
Bosch Security Systems | 6/12 | 38947D
Figure 21: Utilities Menu
Figure 22: Backup Screen
3
.1.9 Transmitter Change
Refer to the Security Escort Operations
Manual.
3.1.10 Exit
Click this button to close the Security
Escort application. Enter your password
at the prompt to verify you have the
authority to shut down the program.
3.2 Utilities Menu
3.2.1 Backup Screen
Use this screen to make backups for all
the databases. Only the databases with
a checkmark are backed up. Preferably,
all databases should be backed up at
once. Only when they do not fit on one
floppy disk should you save individual
databases to one floppy; then switch
floppy disks and repeat the procedure
to save the rest of the files. As
insurance against database problems,
make multiple backups to different
disks frequently. Store at least one
backup copy in a different location
from this system and remember to keep
this copy current.
Operators
This is the database of all individuals
with passwords to operate the system
software and acknowledge alarms.
Subscriber
This database contains all the
transmitters assigned in the system.
Transponders
This database contains the
transponders, receivers, virtual
receivers, and alert units
configurations.
Reports
This database contains all the Alarm
Reports and related alarm map screens.
Master Database Drive
Store the backup files in the Security
Escort Master Database path. See the
System Directories and Network Address
Screen.
Slave Database Drive
Store the backup files in the Security
Escort Slave Database path. See the
System Directories and Network Address
Screen.
Local Database Drive
Store the backup files in the same subdirectory on this computer where the
Security Escort System components are
stored (typically C:\ESCORT).
Cartridge Disk Drive
Store the backup files in the
Backup/restore to disk cartridge path
field assigned in the System
Preferences Screen. This path can point
to a cartridge disk drive, a local hard
disk, or a network disk drive.
Loading...
+ 60 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.