GE Security EST3, EST3-230, EST3R, EST3R-230 Installation And Service Manual

EST3
Installation and Service
Manual
P/N 270380 • Rev 8.0 • 18SEP08
DEVELOPED BY
GE Security, Inc. 8985 Town Center Parkway Bradenton, FL 34202 (941) 739-4300
COPYRIGHT NOTICE
TRADEMARKS
© 2008 GE Security, Inc.
This manual is copyrighted by GE Security, Inc. (GE Security). You may not reproduce, translate, transcribe, or transmit any part of this manual without express, written permission from GE Security.
This manual contains proprietary information intended for distribution to authorized persons or companies for the sole purpose of conducting business with GE Security. Unauthorized distribution of the information contained in this manual may violate the terms of the distribution agreement.
Microsoft, Microsoft Mouse, Microsoft Windows, Microsoft Word, and Microsoft Access are either registered trademarks or trademarks of Microsoft Corporation.
Content
Important information • v UL 864 9th edition requirements • vii About this manual • x The EST3 library • xii Related documentation • xiii
Chapter 1 System overview • 1.1
System description • 1.2 Audio subsystem description • 1.6 Digital network subsystem • 1.16 Foreign language support • 1.22 Signature series devices • 1.26 Network applications • 1.29 Audio applications • 1.33 Firefighter phone system • 1.42
Chapter 2 Security applications • 2.1
Security equipment • 2.2 Certificate installations • 2.8 Multiple 3-MODCOM modules • 2.13 Multiple site security and access • 2.14 Multiple tenant security • 2.17 Secure access • 2.21
Chapter 3 Access control applications • 3.1
Access control equipment • 3.2 Anti-passback • 3.11 Central monitoring station • 3.14 Common door access • 3.16 Delayed egress • 3.18 Elevator control • 3.21 Emergency exit door • 3.24 Handicap access door • 3.26 Maglock peripherals • 3.28 Multiple card readers • 3.30 Muster • 3.32 Power for continuous locks • 3.35 Power for intermittent locks • 3.37 Power from an AC source • 3.39 Power from a remote source • 3.42 Remote controls • 3.45 Two-person rule • 3.47
Chapter 4 Centralized audio applications • 4.1
Equipment required • 4.2 ATPC Amplifier Terminal Panel Cabinet • 4.3 ATP Amplifier Terminal Panel • 4.6 Audio amplifiers • 4.8 URSM Universal Riser Supervisory Module • 4.10
EST3 Installation and Service Manual i
ATP external battery charger • 4.20 Amplifier backup • 4.22 Branch speaker wiring • 4.25 Troubleshooting • 4.27
Chapter 5 Installation • 5.1
Installation overview • 5.3 UL 864 NAC signal synchronization • 5.6 Creating an initial startup version of the project database • 5.16 System installation sequence • 5.18 Preliminary field wiring testing • 5.19 Chassis installation in EIA 19-inch racks • 5.22 ATCK Attack Kit for cabinets • 5.23 Local rail module installation • 5.24 3-MODCOM Modem Communicator module • 5.26 3-SAC Security Access Control module • 5.40 3-AADC1 Addressable Analog Driver Controller and IRC-3 • 5.41 AC power and DC battery wiring • 5.42 Connecting auxiliary/booster power supplies • 5.44 Connecting the PT-1S impact printer • 5.46 Adjusting amplifier output levels • 5.49 Connecting a CDR-3 Zone Coder for coded tone output • 5.50 Connecting an external modem for use with the Remote
Diagnostics Utility • 5.53
Running the RPM and distributing profiles • 5.55
Chapter 6 Power-up and testing • 6.1
Cabinet power-up procedure • 6.3 Runtime and system errors • 6.4 Initial and reacceptance test procedures • 6.6 Control and emergency communications equipment testing • 6.7 Detector, input module, and output module testing • 6.18 Initiating device testing • 6.21 Notification appliance testing • 6.23 Record of completion • 6.24
Chapter 7 Preventive maintenance • 7.1
General • 7.2 Preventive maintenance schedule • 7.3 Signature device routine maintenance tips • 7.5 Signature detector cleaning procedure • 7.6 System trouble and maintenance log • 7.7
Chapter 8 Service and troubleshooting • 8.1
Overview • 8.3 Hardware problems • 8.5 Modules • 8.7 Audio components • 8.20 Pseudo point descriptions • 8.24 Signature data circuit (SDC) operation • 8.35 Basic Signature data circuit troubleshooting • 8.37 Signature controller modules • 8.47 Device troubleshooting • 8.49 Signature diagnostic tools • 8.51
ii EST3 Installation and Service Manual
DSDC status • 8.65 Addressable analog diagnostic tools • 8.70 3-AADC1 Addressable Analog Driver Controller • 8.74 Addressable analog device troubleshooting • 8.75 Wiring problems • 8.77
Appendix A System addresses • A.1
Address format • A.2 LRM addresses • A.4 Control / display module addresses • A.9 Device addresses • A.10
Appendix B System calculations • B.1
Network data riser limits • B.2 Signature data circuit wire length • B.5 Notification appliance circuit calculations • B.11 25 or 70 Vrms NAC wire length • B.17 Addressable analog circuit wire length • B.19 Cabinet battery • B.20 SAC bus power • B.21 CPU memory • B.26 Fiber optic cable worksheet • B.28
Appendix C Listing requirements • C.1
NFPA standards • C.2 Minimum requirements for UL security applications • C.3 UL and ULC requirements • C.10
Y Glossary • Y.1
Z Index • Z.1
EST3 Installation and Service Manual iii
iv EST3 Installation and Service Manual
Important information
Limitation of liability
This product has been designed to meet the requirements of NFPA Standard 72; Underwriters Laboratories, Inc., Standard 864; and Underwriters Laboratories of Canada, Inc., Standard ULC S527. Installation in accordance with this manual, applicable codes, and the instructions of the Authority Having Jurisdiction is mandatory. GE Security shall not under any circumstances be liable for any incidental or consequential damages arising from loss of property or other damages or losses owing to the failure of GE Security products beyond the cost of repair or replacement of any defective products. GE Security reserves the right to make product improvements and change product specifications at any time.
While every precaution has been taken during the preparation of this manual to ensure the accuracy of its contents, GE Security assumes no responsibility for errors or omissions.
FCC warning
This equipment can generate and radiate radio frequency energy. If this equipment is not installed in accordance with this manual, it may cause interference to radio communications. This equipment has been tested and found to comply within the limits for Class A computing devices pursuant to Subpart B of Part 15 of the FCC Rules. These rules are designed to provide reasonable protection against such interference when this equipment is operated in a commercial environment. Operation of this equipment is likely to cause interference, in which case the user at his own expense, will be required to take whatever measures may be required to correct the interference.
Industry Canada information
Note: The Industry Canada label identifies certified equipment.
This certification means that the equipment meets certain telecommunications network protective, operational, and safety requirements. Industry Canada does not guarantee the equipment will operate to the user’s satisfaction.
Before installing this equipment, users should ensure that it is permissible to be connected to the facilities of the local telecommunications company. The equipment must also be installed using an acceptable method of connection. The customer should be aware that compliance with the above conditions may not prevent degradation of service in some situations.
EST3 Installation and Service Manual v
Repairs to certified equipment should be made by an authorized Canadian maintenance facility designated by the supplier. Any repairs or alterations made by the user to this equipment, or equipment malfunctions, may give the telecommunications company cause to request the user disconnect the equipment.
Users should ensure for their own protection that the electrical ground connections of the power utility, telephone lines, and internal metallic water pipe system, if present, are connected together. This precaution may be particularly important in rural areas.
Caution: Users should not attempt to make such connections
themselves, but should contact the appropriate electric inspection authority, or electrician, as appropriate
Note: The Load Number (LN) assigned to each terminal device
denotes the percentage of the total load to be connected to a telephone loop that is used by the device, to prevent overloading. The termination on a loop may consist of any combination of devices subject only to the requirements that the sum of the Load Numbers of all the devices does not exceed 100.
vi EST3 Installation and Service Manual
UL 864 9th edition requirements
NOTICE TO USERS, INSTALLERS, AUTHORITIES HAVING JURISDICTION, AND OTHER INVOLVED PARTIES
This product incorporates field-programmable software. In order for the product to comply with the requirements in the Standard for Control Units and Accessories for Fire Alarm Systems, UL 864, certain programming features or options must be limited to specific values or not used at all as indicated below.
Programmable feature or option
Permitted in UL 864? (Y/N)
Possible settings Settings permitted in
UL 864
Enable Supervision (telephone line is supervised for ground faults, a single
Y No
Yes
Yes
open line, or a wire-to-wire fault)
DACT Settings - Line 2 Installed (single line or dual line dialer)
Trouble Resound (panel resound)
AC Power Delay Y Disabled
Y No
Yes
Y Disabled (0)
1 second to ~99 hours
Yes
Disabled [2]
0 to 24 hours
1 to 3 hours
1 minute to 45 hours
Event message routing Y All Cabinets
No Cabinets
User defined routes (1 to 15)
Event message display filtering: Alarm, Supervisory, and Trouble options
Y Enabled
Disabled
All Cabinets
No Cabinets [3]
User defined routes (1 to
15) [4]
Enabled
Disabled [5]
Delays (programmed in rules) Y 0 to 240 seconds 0 to 240 seconds [6]
CMS event reporting priority (programmed in rules)
CMS activate and restore messages (programmed in rules)
4-state alarm IDC N N/A In Signature module
EST3 Installation and Service Manual vii
Y 1 to 255 1 to 255 [7]
Y Send on activation
Send on restoration
Activation and restoration triggers must match the message type
configuation, personality code 18 is prohibited [11]
Programmable feature or option
Permitted in UL 864?
Possible settings Settings permitted in
(Y/N)
Alarm zone group members Y Alarm device type
Pull device type
Heat device type
Verified smoke device type
Water flow device type
AND group members Y Alarm device type
Pull device type
Heat device type
Verified smoke device type
Water flow device type
Alarm zone device type
Fire zone device type
Matrix group device type
UL 864
Alarm device type [8]
Pull device type
Heat device type
Verified smoke device type
Water flow device type
Alarm device type [8]
Pull device type
Heat device type
Verified smoke device type [9]
Water flow device type
Alarm zone device type
Fire zone device type
Matrix group device type
AND group device activation
Y 1 to 255 1 to 255 [10]
count
Matrix groups: Members Y Alarm device type
Pull device type
Fire device type
Call point device type
Heat device type
Verified smoke device type
Water flow device type
Matrix groups: Device
Y 3 to 10 3 to 10 [10]
activation count
Alarm device type [8]
Pull device type
Fire device type [8]
Call point device type
Heat device type
Verified smoke device type [9]
Water flow device type
viii EST3 Installation and Service Manual
Programmable feature or option
Permitted in UL 864?
Possible settings Settings permitted in
UL 864
(Y/N)
Notes
[1] Allowed only when the supervising station supervises the telephone line and annunciates
fault conditions within 200 seconds
[2] Allowed only on control panels that transmit trouble event signals off premises
[3] Allowed only with monitor device types and switches
[4] Allowed only if user route includes the control panel
[5] Allowed only on nonrequired remote annunciators
[6] Allowed only when setting does not prevent the activation or transmission of alarm or
supervisory signals within 10 seconds or trouble signals within 200 seconds
[7] When priorities are used, alarm events must have a higher priority than supervisory and
trouble events.
[8] Allowed in alarm zone groups, AND groups, and matrix groups that are used to initiate the
release of extinguishing agents or water except when the addressable smoke detector's alarm verification is used.
[9] Allowed only in alarm zone groups, AND groups, and matrix groups that are not used to
initiate the release of extinguishing agents or water
[10] A minimum device activation count of 2 is required if the AND group or matrix group is used
to initiate the release of extinguishing agents or water
[11] Personality code 18 is typically used when a short condition must be distinguished from an
alarm condition. This type of IDC is prohibited by UL 864.
EST3 Installation and Service Manual ix
About this manual
This manual provides information on how to properly install, wire, and maintain the EST3 integrated system and related components. This manual applies to the following EST3 models:
• EST3
• EST3R
• EST3-230
• EST3R-230
Organization
Chapter 1: System overview: a descriptive overview of the components and subsystems that comprise an EST3 system.
Chapter 2: Security applications: covers security applications. This chapter contains block diagrams that show the components required to create specific security systems.
Chapter 3: Access control applications: covers access control applications. Like Chapter 2, this chapter contains block diagrams and descriptions of specific access control systems.
Chapter 4: Centralized audio applications: describes the equipment and configuration required to create centralized audio for a site.
Chapter 5: Installation: installation information for system components and applications that supplement the instructions provided on individual component installation sheets.
Chapter 6: Power-up and testing: information and procedures necessary to perform initial system power-up and acceptance testing.
Chapter 7: Preventive maintenance: lists the required scheduled maintenance items and procedures.
Chapter 8: Service and troubleshooting: a comprehensive set of procedures and tables to aid certified technical personnel in servicing and troubleshooting the system.
Appendices A, B, and C provide supplementary information about system addressing, calculations, and compatibility.
x EST3 Installation and Service Manual
Safety information
Important safety admonishments are used throughout this manual to warn of possible hazards to persons or equipment.
Caution: Cautions are used to indicate the presence of a hazard
which will or may cause damage to the equipment if safety instructions are not followed or if the hazard is not avoided.
WARNING: Warnings are used to indicate the presence of a
hazard which will or may cause personal injury or death, or loss of service if safety instructions are not followed or if the hazard is not avoided.
EST3 Installation and Service Manual xi
The EST3 library
EST3 documents
A library of documents and multi-media presentations supports the EST3 life safety system. A brief description of each is provided below.
EST3 Installation and Service Manual (P/N 270380): Gives complete information on how to install and service the EST3 hardware. The manual also includes installation information on selected Signature Series components.
SDU Online Help (P/N 180653): Provides full online support for configuring and programming a system using the System Definition Utility program.
EST3 System Operation Manual (P/N 270382): Provides detailed information on how to operate the system and system components.
EST3 Smoke Management Application Manual (P/N 270913): Provides information for designing, programming, and testing an EST3 smoke control system.
EST3 ULI ULC Compatibility Lists (P/N 3100427): Lists the appliances, devices, and accessories that are compatible with EST3.
Other documents
In addition to documents in the EST3 library, you may find the following documents useful.
Signature Series Intelligent Smoke and Heat Detectors Applications Bulletin (P/N 270145): Provides additional
applications information on the Signature series smoke and heat detector applications.
Signature Series Component Installation Manual (P/N 270497): Contains detailed mounting and wiring information for all Signature series devices.
Speaker Application Guide (P/N 85000-0033): Provides information on the placement and layout of speakers for fire alarm signaling and emergency voice communications.
Strobe Applications Guide (P/N 85000-0049): Provides information on the placement and layout of strobes for fire alarm signaling.
xii EST3 Installation and Service Manual
Related documentation
National Fire Protection Association
1 Batterymarch Park P.O. Box 9101 Quincy, MA 02269-9101
NFPA 70 National Electric Code
NFPA 72 National Fire Alarm Code
NFPA 11 Low-Expansion Foam Systems
NFPA 11A Medium- and High-Expansion Foam Systems
NFPA 12 Carbon Dioxide Extinguishing Systems
NFPA 13 Sprinkler Systems
NFPA 15 Water Spray Fixed Systems for Fire Protection
NFPA 16 Deluge Foam-Water Sprinkler and Foam­Water Spray Systems
NFPA 17Dry Chemical Extinguishing Systems
Underwriters Laboratories, Inc. 333 Pfingsten Road Northbrook, IL 60062-2096
UL 38 Manually Actuated Signaling Boxes
UL 217 Smoke Detectors, Single & Multiple Station
UL 228 Door Closers/Holders for Fire Protective Signaling Systems
UL 268 Smoke Detectors for Fire Protective Signaling Systems
UL 268A Smoke Detectors for Duct Applications
UL 346 Waterflow Indicators for Fire Protective Signaling Systems
UL 464 Audible Signaling Appliances
UL 521 Heat Detectors for Fire Protective Signaling Systems
UL 864 Standard for Control Units for Fire Protective Signaling Systems
UL 1481 Power Supplies for Fire Protective Signaling Systems
UL 1638 Visual Signaling Appliances
UL 1971 Visual Signaling Appliances
EST3 Installation and Service Manual xiii
Underwriters Laboratories of Canada
7 Crouse Road Scarborough, ON Canada M1R 3A9
Canadian Electrical Code Part 1
ULC S527 Standard for Control Units for Fire Alarm Systems
ULC S524 Standard for the Installation of Fire Alarm Systems
ULC S536 Standard for the Inspection and Testing of Fire Alarm Systems
ULC S537 Standard for the Verification of Fire Alarm Systems
ULC ORD–C693–1994 Central Station Fire Protective Signaling System and Services
CAN/ULC-S301 Standard for Central and Monitoring Station Burglar Alarm Systems
CAN/ULC-S302 Standard for Installation and Classification of Burglar Alarm Systems for Financial and Commercial Premises, Safes, and Vaults
CAN/ULC-S303 Standard for Local Burglar Alarm Units and Systems
CAN/ULC-S304 Standard for Central and Monitoring Station Burglar Alarm Units
PLUS: Requirements of state and local building codes and the
local authority having jurisdiction.
xiv EST3 Installation and Service Manual
Chapter 1
System overview
Summary
This chapter provides a descriptive overview of the components and subsystems that comprise a system.
Content
System description • 1.2
System features • 1.3 Minimum system requirements • 1.4 System construction • 1.4
Audio subsystem description • 1.6
Network audio riser wiring • 1.6 Amplifiers • 1.7 Backup amplifiers • 1.8 3-ASU Audio Source Unit • 1.9 Firefighter phone • 1.15
Digital network subsystem • 1.16
Network data riser wiring • 1.16 Class B network data risers • 1.16 Class A network data risers • 1.17 Download connections • 1.18 Downloading database files over the network • 1.19
Foreign language support • 1.22
Printer use with foreign languages • 1.22 Bilingual language support • 1.22
Display device language support • 1.23 Signature series devices • 1.26 Network applications • 1.29
Network layout • 1.29
Feature/function domain • 1.30 Audio applications • 1.33
Audio channels • 1.34
Manual audio zone selection • 1.38
Messages • 1.39 Firefighter phone system • 1.42
Five phone off-hook limit • 1.42
One phone per circuit • 1.42
Five phones per circuit • 1.43
Limited number of portable telephone handsets • 1.43
EST3 Installation and Service Manual 1.1
System overview
System description
EST3 is designed using modular hardware and software components to facilitate rapid configuration, installation, and testing. Most network components are provided as local rail modules (LRMs) that plug into the rail chassis assemblies. Rail chassis assemblies are available to meet most any application.
Rail modules are used for data processing, intrapanel communication of command/control data, response data, audio signal processing, and power distribution. Each rail module provides an interface to support a control/display module that can be mounted on the front of the module. Most field wiring is terminated using removable terminal strips for easy installation and servicing of modules.
Cabinets are available in a variety of sizes. The smallest (3­CAB5), in addition to the central processor module and primary power supply module, supports two rail modules and three control/display modules. The largest, the 3-CAB21 supports as many as 18 rail modules and 19 control/display modules.
An EST3 cabinet can be configured as a stand-alone system or as part of a network which supports up to 64 cabinets on a peer-to-peer Class A or B token ring network. Below is a partial list of local rail modules that can be incorporated into a system:
Central Processor module (CPU). One is required for each panel. Several models of CPU are available. See the current compatibility lists for details.
Primary Power Supply module (3 PPS/M, 3 BPS/M, or 3 BBC/M). One power supply module is required for each panel.
Main LCD Display module (LCD). One LCD is required to provide a point of control for the entire network. Additional displays can be added to any CPU module for additional points of control or annunciation. Several LCD models are available. See the current compatibility lists for details.
Additional control/display modules as required by the application:
3-BPS/M Booster Power Supply module
3-MODCOM Modem Communicator module
3-SAC Security Access Control module
3-SSDC(1) Signature Driver Controller module
3-AADC(1) Analog Addressable Driver Controller module
3-IDC8/4 Initiating Device Circuit module
3-OPS Off-Premises Signaling module
3-ZAxx Zoned Amplifier modules
1.2 EST3 Installation and Service Manual
System overview
The audio and firefighter phone functions use a different hardware format, providing operator controls and storage for the microphone and telephone handset in a chassis configuration.
System features
Each cabinet in the system provides local control, display, power supply, and communication functions. Each cabinet has the following capacities:
10 addressable device circuits (Signature and addressable analog combined)
120 traditional input / output zones
4 Class B (2 Class A) security / access control communication (SAC) busses
10 modem / dialer cards, each with two telephone lines
2 RS-232 external peripheral device ports
456 LED annunciation points
342 input switches
In addition, the EST3 system has these global features:
• Firefighter telephone
Custom programmability and user-friendly front panel
Class B (Style B), initiating device circuits (IDC)
Event reporting by alarm, trouble, supervisory, or monitor mode and message display routing
Dead front construction
Supports networking — up to 64 nodes may be connected in a regenerative Class A or Class B token ring
Fast response time, less than three seconds from initial alarm to device activation on a fully loaded system over the network
Flash memory on controller modules to facilitate quick firmware upgrades
Supports 255 security partitions
Multiplexed eight-channel digital audio system
Transient protected field wiring
EST3 Installation and Service Manual 1.3
Class B (Style Y) or Class A notification appliance circuits
Ground fault detection by panel, Signature data circuit, and Signature modules
Switch mode power supply
System overview
Copper or fiber network and audio communications
Application and firmware downloading over the network or from a single point
Network-wide control routing
Form C alarm, supervisory, and trouble relay contacts
Refer to the release notes for the latest information regarding specifications and capabilities.
Minimum system requirements
NFPA 72 system classification
Required control equipment
Protected Premises (Local)
Auxiliary —or— Remote Station —or— Proprietary Protected Premises
Cabinet with a CPU (Central Processor module), one LCD (Main LCD Display module) one 3-PPS/M Primary Power Supply and Monitor, appropriate batteries, plus appropriate initiating device circuits and notification appliance circuits
Add a 3-OPS Off Premises Signal module or a correctly configured and programmed 3-MODCOM Modem Communicator module to the protected premises system
System construction
The EST3 system is assembled in layers as shown in Figure 1-1. The cabinet (1) houses all the system components. A variety of cabinets are available for as few as 5 and as many as 21 modules. A 3-RCC14 cabinet is illustrated in Figure 1-1.
Mounted directly to the cabinets are the rail chassis assemblies (2), of which there are three types: rail, audio, and audio with telephone. The most common chassis is the rail chassis, which provides mounting and electrical connections for the local rail modules (LRMs) (4). Mounted on the rear of the chassis are the cabinet power supplies (3).
1.4 EST3 Installation and Service Manual
The local rail modules (4) are the specialized cards that provide an interface between the CPU and the field wiring. The front of any rail module can support a control/display module (5), providing customized operator controls and annunciators.
System overview
Completing the EST3 “CAB” series cabinet assembly are the inner (6) and outer (7) doors. The “RCC” cabinets use a single outer door.
Figure 1-1: Exploded CAB series cabinet equipment installation
EST3 Installation and Service Manual 1.5
System overview
U
Audio subsystem description
The audio subsystem consists of a variety of signal sources, integral amplifiers, and sophisticated control software. The 3-ASU Audio Source Unit is available with the optional 3-FTCU Firefighter Telephone Control Unit as the model 3-ASU/FT. The ASU/FT is the only audio equipment required at the fire command control center. Zoned audio amplifiers are distributed throughout the system and provide the de-multiplexing, switching, amplification and circuit supervision.
Network audio riser wiring
A digital network audio riser consisting of a single pair (Class B) or two pairs (Class A) of wires connect all amplifiers together. Since the digital signals are multiplexed, any of 8 independent audio sources can be directed to any amplifier connected to the network. All command and control signals for the audio system are distributed over the network data riser.
CPU CPU CPU CPU
TB2 TB2 TB2 TB2
AUDIO AUDIO AUDIO AUDIOAUDIO AUDIO AUDIO AUDIO
A IN A IN A IN A INA OUT A OUT A OUT A OUTB OUT B OUT B OUT B OUT
AUDIO AUDIO AUDIO AUDIOAUDIO AUDIO AUDIO AUDIO
B IN B IN B IN B IN
AUDIO DATA PRIMARY
From
on 3-AS
Figure 1-2: Class B network audio riser wiring
1.6 EST3 Installation and Service Manual
System overview
CPU CPU
TB2 TB2 TB2 TB2
AUDIO AUDIO AUDIO AUDIOAUDIO AUDIO AUDIO AUDIO
A IN A IN A IN A INA OUT A OUT A OUT A OUTB OUT B OUT B OUT B OUT
From AUDIO DATA PRIMARY connections on 3-ASU
AUDIO AUDIO AUDIO AUDIOAUDIO AUDIO AUDIO AUDIO
B IN B IN B IN B IN
CPU CPU
Figure 1-3: Class A network audio riser wiring
Amplifiers
Amplifiers are designed to feed a single audio zone and provide an integral 24 Vdc visual notification appliance circuit. Amplifier modules are available in 20-, 40-, and 95-watt versions, with each amplifier providing a single supervised Class B or A audio output circuit. The amplifier is configurable for either 25 Vrms or 70 Vrms output. An independent supervised Class B or Class A, 24 Vdc, 3.5 Amp notification appliance circuit (NAC) is also provided on the 20- and 40-watt amplifiers to drive notification appliances. In addition, automatic backup amplifiers can be added on a switched common backup configuration.
EST3 Installation and Service Manual 1.7
Each audio power amplifier has an integral demultiplexer, making the 8 audio channels available to the amplifier’s input, as directed by the system programming. Each amplifier also contains circuitry that handles routine signal processing functions such as channel priority.
The amplifier’s output is a dedicated, supervised, 25-, 70-Vrms speaker circuit, which covers one audio zone in the protected facility. Figure 1-4 is an example of an enclosure with four zone amplifiers and a backup amplifier. In response to an alarm, selected audio amplifiers have been connected to the required audio channels. Note that three different audio signals are being broadcast simultaneously.
System overview
Network Data Riser
Network Audio Riser
Equipment Enclosure
Central
Processor
Module
Local Rail Bus
Backup
Amplifier
Zoned
Amplifier
Figure 1-4: Normal amplifier operation
Possible fault condition Amplifier operation
Amplifier loses communication with Central Processor module
If the panel is configured for stand-alone operation, the amplifier automatically switches to the EVAC channel and outputs its 1 kHz temporal tone when the panel detects an alarm.
If the panel is not configured for stand-alone operation, the amplifier will not output any signal.
Panel loses communication with network data riser
Panel loses communication with network audio riser
Amplifier switches to the EVAC channel only in response to the local panel’s programming uses the default EVAC message.
Amplifier switches to the EVAC channel in response to the system programming. For EVAC the amplifier uses its 1 kHz temporal tone. For Alert the amplifier uses its 1 kHz 20 bps tone.
Zoned
Amplifier
Zoned
Amplifier
Zoned
Amplifier
AlertEVACPagePage
1.8 EST3 Installation and Service Manual
Backup amplifiers
In the event of an amplifier failure (not a field wiring problem), the backup amplifier automatically replaces the failed amplifier, as shown in Figure 1-5.
System overview
Network Data Riser
Network Audio Riser
Equipment Enclosure
Central
Processor
Module
Local Rail Bus
Backup
Amplifier
Figure 1-5: Single amplifier failure
Note: The backup amplifier will back up a failed amplifier if it was being used for Page, EVAC, or
The amplifier failure caused the backup amplifier to automatically connect to the same audio source as the failed amplifier. The output of the backup amplifier replaced the output of the failed amplifier.
Alert. It will not back up an amplifier being used on an Auxiliary or General channel.
Note: The backup amplifier will not replace an amplifier that has
detected a field wiring problem to prevent the amplifier from driving into a shorted circuit.
3-ASU Audio Source Unit
The 3-ASU is the source of the network audio riser. Available audio sources are local and remote voice PAGE functions and the firefighter telephone PAGE function. An integral tone generator database is provided for the EVAC, ALERT and other functions. Alternately, the 3-ASU’s integral digital voice message playback unit can simultaneously provide up to 8 different prerecorded audio messages that may be assigned to any channel.
Zoned
Amplifier
Zoned
Amplifier
Zoned
Amplifier
Zoned
Amplifier
AlertEVACPagePage
EST3 Installation and Service Manual 1.9
The multiplexer within the 3-ASU converts and compresses the real-time audio signal and converts it to a digital format. The output of the digital message playback unit and the integral tone generator database is already in the digital format. The 8 signal sources in digital format are then combined together as selected by the system designer using a multiplexer. This makes up the network audio riser signal.
System overview
Local mic.
Remote mic.
Firefighter’s
telephone
Auxiliary
input
Network audio riser (eight digitized audio channels)
Audio si gnals
Multiplexer
Digital message
playback unit
Tone / message
database
Figure 1-6: ASU Signal Flow
Network audio riser
(eight digitized audio
channels)
Network data riser
(command and control)
Demultiplex and decode
Figure 1-7: Amplifier Signal Flow
Digital signals
The amplifiers at the remote-panels extract the audio signals from the network riser, amplify it and send it to the speakers.
Local tone
generator
Channel
selection and
supervision
Audio signal priority
Power
amp
25/70 VRMS
supervised audio
circuit
EOLR
During system configuration, each of the eight available audio channels is assigned one of the five available attributes listed in Table 1-1. The Page, and Auxiliary attributes may only be assigned to a single channel. The General attribute may be assigned to up to four channels.
Table 1-1: Network audio channel parameters
1.10 EST3 Installation and Service Manual
Channel attribute Priority
PAGE 1
EVAC 2
ALERT 3
AUXILIARY 4
System overview
Table 1-1: Network audio channel parameters
Channel attribute Priority
GENERAL 5
Each channel attribute has a priority level associated with it. When more than one channel is commanded to source a given amplifier, the amplifier will connect to the source having the highest priority. The Page channel will only go active when the microphone push-to-talk switch is pressed.
Special audio source unit page modes
The front panel of the ASU offers four special page mode switches:
• All Call
• EVAC
• Alert
All Call Minus
These switches provide instantaneous switching of the page signal to the most frequently contacted areas of the building. The special page modes do not require any source switching by the zoned audio amplifiers. When a special page mode switch is activated, the signal content of the eight outgoing audio channels is modified. Figure 1-8 illustrates this principle.
In the normal page mode, the eight audio signal sources are each connected to a separate audio channel, as represented by a at the intersection of the signal source and the audio channel, shown at the lower left of Figure 1-8. Each audio channel is represented as a vertical line in this figure. The eight audio channels are actually multiplexed together and distributed over a common pair of wires called the network audio riser. The figure shows the system in the normal page mode, with the zoned audio amplifiers processing EVAC signals on the 1st and 3rd levels, a page signal on the 2nd level, and the alert signal on the 4th level.
EST3 Installation and Service Manual 1.11
System overview
Eight multiplexed audio channels
on a two-wire circuit
25/70 VRMS supervised
audio circuit
Network data riser
Local tone
generator
Local tone
generator
Local tone
generator
Power
amp
Power
amp
Power
amp
ALERT
25/70 VRMS supervised
audio circuit
EVAC
25/70 VRMS supervised
audio circuit
PAG E
EOLR
EOLR
EOLR
25/70 VRMS supervised
audio circuit
Local tone
generator
Power
amp
EOLR
EVAC
Network audio signals
Page Evac Alert Auxiliary General1 General2 General3 General4
3-ASU signal sources
Normal mode
= Audio source unit audio signal to audio channel connection
Audio si gnal distribution during special paging modes
Page Evac Alert Auxiliary General1 General2 General3 General4
Page Evac Alert Auxiliary General1 General2 General3 General4
Page Evac Alert Auxiliary General1 General2 General3 General4
Page Evac Alert Auxiliary General1 General2 General3 General4
ALL CALL mode Page to EVAC mode Page to ALERT mode ALL CALL MINUS mode
Figure 1-8: Audio Source Unit Special Page Mode Signal Flow
1.12 EST3 Installation and Service Manual
System overview
The All Call mode is used to send a page to the entire facility. When the All Call switch is activated, the Audio Source Unit is put into the all call mode. In this mode, the zoned audio amplifiers do not all transfer to the page channel. Rather, the Audio Source Unit redirects the page signal source to all the audio channels. Figure 1-8 shows the all call page source to audio channel connections in the lower left corner. Note that all channels receive the same signal. Any amplifier on the system, regardless of the audio channel selected, will receive the page. Any amplifiers that were previously idle will power up and receive the page.
The Page to EVAC mode is used to send a page to the areas automatically receiving the evacuation signal. Activating the EVAC switch causes the Audio Source Unit to enter the page to EVAC mode. In this mode, the zoned audio amplifiers connected to the EVAC channel do not transfer to the page channel. Rather, the Audio Source Unit redirects the page signal source to the EVAC channel. Figure 1-8 shows the page to EVAC mode page source to EVAC channel connections. The page and EVAC audio channels both receive the page signal. Any amplifier connected to either the page or EVAC audio channels will receive the page. The alert, auxiliary and general channels are connected to their respective signal sources, as in the normal mode.
The Page to Alert mode is used to send a page to the areas automatically receiving the alert signal. Activating the Alert switch causes the Audio Source Unit to enter the page to alert mode. In this mode, the zoned audio amplifiers connected to the alert channel do not transfer to the page channel. Rather, the Audio Source Unit redirects the page signal source to the alert channel. Figure 1-8 shows the page to alert mode page source to alert channel connections. The page and alert audio channels both receive the page signal. Any amplifier connected to either the page or alert audio channels will receive the page. Any amplifiers that were previously idle will power up and receive the page. The EVAC, auxiliary and general channels are connected to their respective signal sources, as in the normal mode.
The All Call Minus mode is used to send a page to all areas NOT automatically receiving the EVAC or alert signals. In high rise applications, all call minus is an effective way to quickly select stairwells. Activating the All Call Minus switch causes the Audio Source Unit to enter the all call minus mode. In this mode, the zoned audio amplifiers connected to the auxiliary and general channels do not transfer to the page channel. Rather, the Audio Source Unit redirects the page signal source to the auxiliary and four general channels. Figure 1-8 shows the all call minus mode page source to auxiliary and general channel connections. The
EST3 Installation and Service Manual 1.13
System overview
page, auxiliary and four general audio channels all receive the page signal. Any amplifier connected to the page, auxiliary or general audio channels will receive the page. The EVAC and alert channels are connected to their respective signal sources, as in the normal mode.
Automatic messaging
One of the features of the 3-ASU Audio Source Unit is the method used to monitor the integrity of the digital audio system. When an audio messaging system is configured, default audio messages are recorded for the Evacuation and Alert channels. The text of default messages should be generic in nature, and should not include location-specific instructions. When the system is in the normal condition, the 3-ASU continuously transmits default messages over the network audio riser. The zone amplifiers use the default messages to verify their operational integrity, as well as the integrity of the riser wiring.
When an alarm is detected, the evacuation and alert message channels are selected by the amplifiers in the appropriate areas in the facility, as directed by the system rules. If a specific evacuation message has been programmed to play in response to the alarm, it is sent out over the evacuation channel. Location specific evacuation messages contain information and instructions that should only be used for a specific alarm location. Should a second alarm from another location be received, the evacuation message playing as a result of the first alarm may not be appropriate for the second alarm.
Note: In the event of conflicting messaging instructions caused
by multiple alarm events, the system will play the default evacuation message, whenever two or more different messages are requested at the same time on the evacuation channel.
Automatic message processing is illustrated in Figure 1-9. By reverting back to the generic default evacuation message in multiple alarm location scenarios, no one can be misdirected by the wrong message. Default messages also play during alarms when no location specific message has been requested.
1.14 EST3 Installation and Service Manual
System overview
83 82
80th floor, west wing evacuation message: A fire has been reported on the west wing of the 80th floor.
Location specific messages
30th floor, north wing evacuation message: A fire has been reported on the north wing of the 30th floor.
Figure 1-9: Automatic Message Processing
81 80 79 78 77
33 32
31 30 29 28 27
Generic (default) message: An emergency has been reported in the building. Remain where you are and await further instructions.
Generic (default) evacuation message
The generic (default) evacuation message plays when multiple location­specific messages have been requested by the system, or when no location­specific message has been specified.
Firefighter phone
The 3-FTCU contains a master telephone handset that provides an analog telephone riser for totally independent 2-way communications between the fire command station and Firefighter telephone stations / jack telephones installed at strategic locations throughout the protected facility.
Taking a telephone off-hook or plugging into a telephone jack generates a visual and audible incoming call signal at the fire command station. The individual originating the call hears a tone until the handset is connected to the system. The fire command station operator manually connects the incoming phone call to the phone riser to complete the call. Up to five remote telephones may be connected to the riser simultaneously. The fire command center operator can also use the telephone circuit as a page source, permitting paging via the telephone system.
EST3 Installation and Service Manual 1.15
System overview
Digital network subsystem
Network data riser wiring
The network data riser provides the communication path between each CPU module (3-CPUx or 3-ANNCPUx) installed in the system. Each CPU module has two bi-directional RS-485 ports (Network A and Network B) that are used to connect the network data riser wiring. Network B is isolated from ground and Network A is not.
The correct method for running the network data riser is to connect the isolated Network B port on one CPU module to the non-isolated Network A port on another. Any remote CPU modules connected to a local CPU module’s Network B port is considered to be downstream from the local CPU module. Any remote CPU modules connected to a local CPU module’s Network A port is considered upstream from the local CPU module.
Additionally, next and previous refer to the order in which remote CPU modules are electrically connected to a local CPU module. Previous refers to the remote CPU module whose isolated Network B port connects to the local CPU module’s non-isolated Network A port. Next refers to the remote CPU module whose non-isolated Network A port connects to the local CPU module’s isolated Network B port.
Note: Since the data traveling the network data riser is
bi-directional, out and in references are used to direct wire connections.
Class B network data risers
In a Class B network, a break or short in the network data riser wiring divides the network into separate independent networks. Panels on the same side of the line fault will communicate with each other but not with panels across the line fault. Figure 1-10 shows the wiring for a Class B network.
1.16 EST3 Installation and Service Manual
System overview
B1_CAB1 B1_CAB2 B1_CAB3 B1_CAB4
J5
CPU CPU CPU CPU
TB2
NETWORK
OUT
AB
AUDIO
A IN
IN
BA
J5
TB2
NETWORK
OUT
AB
J5
TB2
AUDIO
A IN
IN
BA
NETWORK
OUT
IN
BA
AB
Downstream
Figure 1-10: Class B network data riser wiring using copper wire
As a matter of convention, a Class B network data riser
Note:
should start at the CPU module that does not have wires connected to its Network A port.
When wiring a Class B network, give careful consideration as to the location of the service panel. The service panel provides a single point from which you can download files to all other panels on the network. For this function to work properly you must use the panel at the start of the network data riser as the service panel. See “Downloading data files” for more information.
AUDIO
A IN
J5
TB2
NETWORK
OUT
Upstream
AUDIO
A IN
IN
BA
AB
Class A network data risers
In a Class A network, a single break or short in the network data riser wiring does not interrupt communications between panels. Figure 1-11 shows the wiring for a Class A network.
EST3 Installation and Service Manual 1.17
System overview
B1_CAB1 B1_CAB2 B1_CAB3 B1_CAB4
J5
CPUCPUCPUCPU
TB2
NETWORK
OUT
AUDIO
A IN
IN
BA AB
J5
TB2
NETWORK
OUT
AUDIO
A IN
IN
BA AB
J5
TB2
NETWORK
OUT
AUDIO
A IN
IN
BA AB
Figure 1-11: Typical Class A network data riser wiring using copper wire
Download connections
Each programmable rail module has a modular phone jack to use for downloading data directly from the SDU computer. The modular phone jack on any CPU module can also be used to download data to other programmable rail modules in the same panel over the rail bus, or to other panels over the network data riser.
J5
TB2
NETWORK
OUT
AUDIO
A IN
IN
BA AB
In addition to the modular phone jack, the CPU module has two serial communication ports that can be used to download data, provided both of these conditions are met:
A 3-RS232 option card is installed
The serial port used to download data is not configured for gateway or coder applications
Tip: To download data over the network without having to
reconfigure the system, temporarily install a 3-RS232 option card on any CPU module in the system and connect the SDU computer to serial port 1.
1.18 EST3 Installation and Service Manual
System overview
A
Connect here to download data to all three programmable rail modules over the rail bus (network mode) or to this programmable rail module only (single-step mode)
S H
SIGA1
SIGA2 SIGA2 SI GA 2
B-B+A-A+SHB-B
J1
NETWORK
INOUT B OUT
+B+AA-
NC
N
-
CNONCO
CNNONC
A
SUPCALARMTROUBLE
TB1
R
C
AUDIOAUDIO
A IN A OUT
B IN
B
-+
+--
--
C
AUDIO++AUDIO
R
T
T
RRTXT
O
X
X
S
XOM
S
M
111
2122
2
Optional serial ports may be used to
download over the network (3-
RS232 required)
+
SIGA1 SIGA 1
S
A-PB+B-A
SB+B
WM
KR
1
2 P
S
WRKM
SB+B
H
-
-PB+B-A+
-
WM
KR
SIGA1 SIGA 1
SIGA1
1
OUTPUT MODULE
+
2
SIGA2 SIGA2 SI GA 2
P
S
B-B+A-A+SHB-B
WRKM
OUTPUT MODULE
+
Connect here t o download data to
this programmable rail module only
(singl e-step mode)
J9
J8
J11
J10
Figure 1-12: Potential connection points for downloading data
Downloading database files over the network
A CPU module’s Network A port and its modular phone jack share an interrupt with the module’s microprocessor. As such, the microprocessor disables the Network A port whenever you connect the SDU computer to the modular phone jack. Consequently, download options differ for Class A and Class B networks.
EST3 Installation and Service Manual 1.19
System overview
Download connection from SDU computer
B1_CAB1 B1_CAB2 B1_CAB3 B1_CAB4
J5
CPUCPUCPUCPU
TB2
NETWORK
OUT
AB
AUDIO
IN
A IN
BA
J5
TB2
NETWORK
OUT
AB
J5
AUDIO
IN
A IN
BA
TB2
NETWORK
OUT
AB
AUDIO
IN
A IN
BA
J5
TB2
NETWORK
OUT
AB
AUDIO
IN
A IN
BA
Figure 1-13: Impact of disabling Network A terminal connection on Class B networks during a download
Figure 1-13 shows how connecting the SDU computer to the modular phone jack affects downloading data over a Class B network. Connecting the SDU computer to the modular phone jack on the CPU module installed in panel B1_CAB3, disables that CPU module’s Network A port. Downloading data to panels B1_CAB2 and B1_CAB1 from panel B1_CAB3 is no longer possible but downloading to B1_CAB4 still is.
Since the microprocessor disables only the Network A port, the CPU module that doesn’t have a Network A port connection should be used as the service panel. It is the only panel that is capable of downloading to every panel on the network using the modular phone jack.
Note: Connecting the SDU computer to an optional serial
communications port does not affect the Network A port. If a 3-RS232 option card is connected to the CPU, you can download data to any panel on a Class B network regardless of where the panel physically connects to the network data riser.
1.20 EST3 Installation and Service Manual
System overview
Download connection from SDU computer
B1_CAB1 B1_CAB2 B1_CAB3 B1_ CAB4
J5
CPUCPUCPUCPU
TB2
NETWORK
OUT
AB
AUDIO
IN
A IN
BA
J5
TB2
NETWORK
OUT
AB
J5
AUDIO
IN
A IN
BA
TB2
NETWORK
OUT
AB
AUDIO
IN
A IN
BA
J5
TB2
NETWORK
OUT
AB
AUDIO
IN
A IN
BA
Figure 1-14: Impact of disabling Network A terminal connection on Class A networks during a download
On Class A networks however, see Figure 1-14, disabling the Network A port on panel B1_CAB3 does not prevent the other panels from receiving data through B1_CAB3’s Network B port. Connecting the SDU computer to the modular phone jack does cause the panel to report a Network Class A Failure trouble. When the network data riser is configured for Class B, connecting to the panel modular phone jack causes the local CPU module to report a communications fault with every panel upstream of the local CPU module.
Tip: To download data to every panel across the Class B network
data riser, connect to the first connection on the network data riser as the download panel — the panel with no connections on its Network A terminals.)
EST3 Installation and Service Manual 1.21
System overview
Foreign language support
Printer use with foreign languages
When supporting a single-byte character set language, your printer must be able to support the appropriate DOS code page. To support a double-byte character set language, your printer must be able to support the appropriate Windows code page. The required code pages are listed below.
Remember that not all Windows characters are available on DOS printers, so some characters are not supported on these printers.
Language Code page
Chinese simplified Windows Page Code 936 (GB)
Chinese traditional Windows Code Page 950
(Big 5)
Korean Windows Code Page 949
(Extended Wansung)
Hebrew DOS Code Page 862
Turkish DOS Code Page 857
Dutch, French, Italian, Portuguese, Spanish, English
Polish, Slovak DOS Code Page 852
Russian DOS Code Page 866
DOS Code Page 850
Bilingual language support
EST3 display modules (all LCD models and the KPDISP) feature bilingual operation. For two languages to be supported simultaneously, they must appear on the same code page. Refer to the table below to determine the system bilingual capabilities. Bilingual operation is not supported for Chinese and Korean.
Windows code page Languages supported
1250 (Eastern Europe) English, Polish Slovak
1251 (Cyrillic) English, Russian
1252 (Western Europe) Dutch, English, French, Italian,
Portuguese, Spanish
1.22 EST3 Installation and Service Manual
1254 (Turkish) English, Turkish
1255 (Hebrew) English, Hebrew
System overview
Example:
Bilingual operation between Polish and Slovak is supported (code page 1250). Bilingual operation between Polish and Russian is not supported, as no code page has both.
Display device language support
LCD language support
Marketplace
US
European
Asian
Canadian
Language
Chinese, traditional (Taiwan) X
Chinese, simplified (PRC) X
Dutch X
English (UK) X
English (US) X X X[1] X X
French Canadian X X
Mideast
Hebrew X X X
Italian X X X
Korean, Extended Wansung X
Polish X
Portuguese (Brazil) X X
Russian X X X
Slovak X
Spanish (South America) X X
Turkish X X
[1] For testing and support purposes only
EST3 Installation and Service Manual 1.23
System overview
3-FTCU language support
Marketplace
US
European
Asian
Canadian
Language
Chinese, traditional (Taiwan) [1]
Chinese, simplified (PRC) [1]
Dutch X
English (UK) X
English (US) X X X X X
French Canadian X X
Hebrew X [1] [1]
Italian X X X
Mideast
Korean, Extended Wansung [1]
Portuguese (Brazil) X X
Spanish (South America) X X
Turkish [1] [1]
Russian [1] [1] [1]
Polish [1]
Slovak [1]
[1] Only Western European character set is supported
1.24 EST3 Installation and Service Manual
System overview
KPDISP language support
Marketplace
US
European
Asian
Canadian
Language
Chinese, traditional (Taiwan)
Chinese, simplified (PRC)
Dutch X
English (UK) X
English (US) X X X X
French Canadian X X
Hebrew X X X
Italian X X X
Mideast
Korean, Extended Wansung
Polish X
Portuguese (Brazil) X X
Russian X X X
Slovak X
Spanish (South America) X X
Turkish X X X
EST3 Installation and Service Manual 1.25
System overview
Signature series devices
The Signature series family consists of intelligent smoke and heat detectors, bases, input/output modules, and ancillary devices. The EST3 network supports Signature series devices using several models of the Signature Driver Controller module. Up to 125 detectors and 125 modules can be connected to the Signature Data Circuit on these modules.
The Signature series smoke and heat detectors contain their own microprocessors. This allows the devices to make alarm decisions based on the information gathered by the sensing elements incorporated in the device. Signature series detectors can be installed in any of four detector bases:
• The Standard Base provides wiring terminals for connection to a remote LED.
• The Relay Base provides a detector activated, pilot-duty dry contact relay used to control external appliances.
• The Sounder Base incorporates a sounder horn that can be controlled by the detector, by a special Signature module, by the control panel, or by programmed rules
• The Isolator Base protects the Signature Data Circuit from wiring shorts.
Signature modules interface and support the operation of initiating devices, conventional 2-wire smoke and heat detectors, manual pull-stations, strobes, bells, etc. The actual functions of each Signature module is determined by a personality code downloaded to the module through the System Definition Utility (SDU) program.
Signature series manual pull-stations (1-stage and 2-stage) feature an integral Signature module that monitors the station. One-stage stations are monitored by a single input module that sends an alarm signal to the loop controller when the station is activated. Two-stage stations are monitored by a dual input module which sends two independent alarm events to the control panel; one when the pull-switch is activated, and the second when the key switch is activated.
Alarm sensitivity setting
Alarm sensitivity refers to the primary threshold (expressed in percent smoke obscuration) at which the smoke detector will go into alarm. The alarm sensitivity setting for smoke detectors can be set to one of five sensitivity levels. When smoke detectors having both ionization and photoelectric elements are used, the sensitivity setting applies to both elements. Reduced sensitivity settings are used to reduce the occurrence of nuisance alarms.
1.26 EST3 Installation and Service Manual
System overview
The alarm sensitivity setting may be individually set for each detector using the SDU program.
Alternate alarm sensitivity setting
Alternate alarm sensitivity refers to the secondary threshold (expressed in percent smoke obscuration) at which the smoke detector goes into alarm. The alternate alarm sensitivity setting for smoke detectors can be set to one of the same five sensitivity levels as the primary alarm. When smoke detectors having both ionization and photoelectric elements are used, the sensitivity setting applies to both elements. This feature permits increasing or reducing an individual detector’s sensitivity at various times of the day, dependent upon, environmental conditions, occupancy, manufacturing processes, etc. Increased sensitivity is typically used when a facility is unoccupied. Reduced sensitivity is typically used to reduce the occurrence of nuisance alarms when occupancy or environmental conditions may create prealarm conditions. An alternate alarm sensitivity setting for each detector can be set using the SDU program.
Alarm verification
Upon receipt of the initial alarm signal from a verified detector, the EST3 panel issues a detector reset command. After a programmable reset/retard period, if the detector continues to generate an alarm during the fixed confirmation period, the alarm is considered valid and processed by the EST3 control panel. Alarm verification reduces the occurrence of nuisance alarms, as it provides a time frame in which the cause of the alarm can be investigated to determine whether an actual alarm condition exists. The alarm verification period can be increased or decreased through the SDU program, as limited by the listing agencies.
Alternate alarm verification
The alternate alarm verification feature operates the same way the alarm verification feature operates using a second, alternate, programmed reset/retard period.
Prealarm setting
Signature smoke detectors can be configured to enter a prealarm state, which generates a monitor event message. Detectors configured for prealarm have a prealarm pseudo point for which rules can be written.
EST3 Installation and Service Manual 1.27
During configuration, you specify a percentage of the alarm sensitivity setting that will generate a prealarm event.
System overview
Alternate prealarm setting
The alternate prealarm setting is similar to the prealarm setting, but it represents a percentage of the alternate alarm sensitivity that will generate a prealarm event.
1.28 EST3 Installation and Service Manual
System overview
Network applications
This section deals with the initial layout of the network cabinets as well as application configurations for the basic network modules.
Network layout
The first task for the system designer is locating the equipment cabinets throughout the project. The objective when locating cabinets is to maximize the per cabinet coverage of the facility while minimizing hardware cost. The following general information should be used as a guide to designing the system.
The per cabinet coverage is, in some part, based upon the type of project being designed. In a high rise building installation that requires an audio emergency voice communication system, the problem becomes how many floors can be served by a single cabinet. In a campus style installation, there may be one or more cabinets per building, depending on building size.
Cabinet coverage
The following factors govern how much area a single cabinet can cover:
Cabinet capacity: Depending on the installed equipment, the
largest backbox available can have 21 module spaces and 3 chassis spaces. Is this enough cabinet capacity to house the equipment required to cover the proposed area?
Available current per cabinet: Does the proposed number of
large current components (audio amplifiers and 24 Vdc notification appliance circuits), in addition to the required module currents, exceed the available 28 amps per cabinet or 60-Ah battery capacity?
Notification Appliance Circuit voltage drop: Does the distance
from the cabinet to the last strobe, horn, speaker, etc. exceed the acceptable limits?
User interface requirements: Depending on the installed
equipment, the largest backbox available can have 19 module displays installed. Will this provide enough capacity for the required control/display module functions?
Distance between cabinets: Does the wiring length between
any three cabinets exceed 5,000 ft. (1,524 m)?
EST3 Installation and Service Manual 1.29
System capacity of 64 cabinets per network: Does the
proposed system require more than 64 cabinets?
Cost of installation labor and materials: Is it cheaper to install
a smaller cabinet and service the floor above and below the floor
System overview
of installation, or install a larger cabinet with more equipment, and wire two floors above and two floors below the cabinet floor?
Feature/function domain
The EST3 life safety system utilizes peer-to-peer networking technology. No single cabinet is in control of the network. Peer-to-peer networking permits multiple control locations within a single network. The feature/function domain is defined as the group of cabinets that are affected when the feature or function is activated. A network cabinet may be a part of one or more groups. Multiple control locations are permitted for any group.
Three types of domains are available.
Local: The feature/function affects only the cabinet on which the
LCD module is installed.
Group: The feature/function affects a predefined group of
cabinets on the network.
Global: The feature/function affects all the cabinets on the
network.
Group #3
Group #1 Group #2
1 6
Figure 1-15: Sample domain consisting of three groups
234
5
Using the System Definition Utility (SDU), you can configure the system so that information from any cabinet can be selectively sent to any combination of other cabinets on the network.
Each cabinet may selectively transmit the following information to other cabinets on the network:
• Reset commands
Alarm Silence commands
Trouble Silence commands
• Drill commands
• Acknowledge commands
1.30 EST3 Installation and Service Manual
System overview
A cabinet can also be configured to receive state changes (Alarm, Supervisory, Trouble, Monitor, firefighter telephone incoming calls), logicals, events, audio controls, and so forth, from a select group of cabinets.
Feature/function domains are associated with the cabinet providing the operator controls. In Figure 1-15, the feature/function domain for Cabinet 1, which has the operator controls for the first subnet, is groups 1 and 3. The feature/function domain for Cabinet 6, which has the operator controls for the second subnet is groups 2 and 3.
Two subnetworks, with operator controls at cabinets 1 and 6.
Cabinets 3 and 4 are common to both subnetworks.
Commands
Sending
cabinet
Cabinet 1
Cabinet
state
1, 2, 3, 4
Reset
1, 2, 3, 4 1, 2, 3, 4 1, 2, 3, 4 1, 2, 3, 4
Alarm
silence
Trouble
silence
AcknowledgeDrill
1, 2, 3, 4, 5, 6
Cabinet 2
Group 1Group 2 Group 3
Cabinet 3
Cabinet 4
Cabinet 5
Cabinet 6
Legend 1 through 6 = Cabinets that receive commands from the sending cabinet N/A = Not applicable
1, 2, 3, 4
1, 2, 3, 4, 5, 6
1, 2, 3, 4, 5, 6
3, 4, 5, 6
3, 4, 5, 6 3, 4, 5, 6 3, 4, 5, 6 3, 4, 5, 6 3, 4, 5, 6
N/AN/AN/AN/AN/A
N/AN/AN/AN/AN/A
N/AN/AN/AN/AN/A
N/AN/AN/AN/AN/A
1, 2, 3, 4, 5, 6
Figure 1-16: Routed network commands for the domain illustrated in Figure 1-15
In Figure 1-16, the Cabinet 1 entry under the Cabinet State column indicates that Cabinet 1 should receive from cabinets 1, 2, 3, and 4 all information about changes of state. Because Cabinet 1 is the location of the operator controls it should send information about reset, alarm silence, trouble silence, drill, and acknowledgments to all the cabinets in the domain, which are cabinets 1, 2, 3, and 4. In this example, the drill command is common to both systems. Note, that the drill command is also sent to cabinets 5 and 6 by Cabinet 1.
The Cabinet 2 entry under the Cabinet State column indicates that Cabinet 2 receives its change of state information from cabinets 1, 2, 3, and 4. Because there are no operator controls located at cabinet 2, there is no need to send reset, alarm silence, trouble silence, drill, and acknowledgment information to other cabinets. As an alternative, the table could show these commands sent to other cabinets, because they can never be issued due to the lack of an LCD module in the cabinet.
EST3 Installation and Service Manual 1.31
System overview
Cabinets 3 and 4 receive their change of state information from all cabinets on the network, as indicated in the cabinet state column. This is necessary as cabinets 3 and 4 are part of both domains. Again, there is no need to send reset, alarm silence, trouble silence, drill, and acknowledgment information to other cabinets from cabinets 3 and 4.
The Cabinet 5 entry under the Cabinet State column indicates that Cabinet 5 receives its change of state information from cabinets 3, 4, 5, and 6.
Cabinet 6 information indicates that Cabinet 6 should receive from cabinets 3, 4, 5, and 6 all information about changes of state. Because cabinet 6 is the location of the operator controls it should send information about reset, alarm silence, trouble silence, drill, and acknowledgments to cabinets 3, 4, 5, and 6, (all the cabinets in the domain.) In this example, the drill command is common to both systems. Note, that the drill command is also sent to cabinets 1 and 2 by Cabinet 6.
1.32 EST3 Installation and Service Manual
System overview
Audio applications
Amplifier selection
The EST3 system provides amplifiers with 20-, 40-, and 95-watt output ratings to meet any project requirement. Selection of the proper amplifiers requires an understanding of the amplifier characteristics and application related information that follows.
Audio zoning
The output of each amplifier usually covers a single audio zone, typically a floor of a high rise building. Using the appropriate Signature modules, the amplifier’s output can be divided into several zones. The output circuit can be configured for either Class A or Class B wiring.
Output wattage
The output rating of an amplifier is determined by the speaker load it is required to drive, and any expansion or safety factor required. The speaker load is determined by adding up the value of all the wattage taps selected on each speaker connected to the amplifier. For a conservative approach, use the highest wattage tap available on each speaker. This insures there is enough head room to adjust speaker taps to compensate for any installation variables such as sound absorbing furniture, etc.
Output voltage
Zoned amplifiers are available with either a 25 Vrms or 70 Vrms output. The 25 Vrms output amplifiers are primarily used in retrofit applications that previously had 25 Vrms speakers installed. 70 Vrms output amplifiers are recommended for new installations. The output circuits of a 70 Vrms amplifier can be run eight-times farther than a 25 Vrms amplifier, given the same load.
Note: If all the system wiring is required to be power limited,
you may use any 20-, 40-, or 95-watt amplifier with either a 25 Vrms or 70 Vrms output.
Wiring considerations
Refer to Appendix B of this manual for wire distance calculations and other wiring considerations.
EST3 Installation and Service Manual 1.33
System overview
Backup amplifiers
Each cabinet can contain 1 zoned amplifier module to use to back up the remaining primary zoned amplifier modules installed in the same cabinet with the following restrictions:
All the amplifiers must have the same output voltage rating.
If the cabinet contains older amplifier modules (15- and
30-watt) and newer amplifier modules (20- and 40-watt), the amplifier used to back up the primary amplifier modules must be of the older type.
Note: In cases where older and newer zoned amplifiers exist in
the same cabinet, the older modules should be replaced with newer modules for optimum results.
The backup amplifier must have an output wattage rating
equal to or greater than the largest primary amplifier it is backing up. If not, the output capacity of the speaker circuit is diminished proportionately.
The wire used to wire the backup amplifier to the other
amplifiers must be the same size or greater than that used to wire the speaker circuit.
Cabinet space
The 20- and 40-watt amplifiers each require one space on the rail assembly. The 95-watt amplifier requires two rail spaces.
The number of zoned amplifier modules that can be installed in a single cabinet is limited by the number of available rail spaces, the number of power supplies installed in the cabinet, and battery limits, if any.
Audio channels
The EST3 audio system provides eight (8) simultaneous channels for distribution of audio signals. The functions of four of these channels are fixed by the system. These four channels are referred to by their functions: Page, EVAC, Alert, and Auxiliary Input channels. The four remaining channels are referred to as general channels 1 to 4.
Under manual or automatic network control, each amplifier’s input can be connected to either the Alert channel, the Evacuation (EVAC) channel, the Page channel, the Auxiliary Input channel, or one of four (4) general input channels. Should conflicting commands be issued to a single amplifier, the amplifier responds to the channel with the highest priority. The eight channels are prioritized as follows, with the Page channel having the highest priority
1.34 EST3 Installation and Service Manual
System overview
Page channel
Paging is a manual function. An operator is required to select a destination for the page, and then make an announcement. The Page channel is never automatically selected by the EST3 system.
The page channel always carries a live page signal, regardless of its source. There are three sources which can supply the paging signal: 1) the local 3-ASU microphone, 2) the remote microphone, and the 3) the firefighter telephone system. These sources are automatically prioritized as shown in Table 1-2.
Table 1-2: Page priorities
Priority Page signal source
1 (highest) Local microphone
2 Firefighter phone
3 (lowest) Remote microphone
The page command is a non-latching function. When the page command ends, amplifiers automatically switch back to the source channel that was active (if any) prior to the page command.
Five types of page commands are available on the network. The first four page commands are available simply by pressing a single switch on the front of the 3-ASU. These are the paging functions most commonly used in an emergency situation.
1. The All Call command temporarily transfers all amplifiers to the Page channel while the page is active. All Call distributes the page signal to every amplifier in the system.
2. The Page to EVAC command temporarily transfers the Page signal to all amplifiers actively connected to the EVAC channel. All “EVAC” amplifiers then receive and distribute the Page signal.
3. The Page to Alert command temporarily transfers the Page signal to all amplifiers actively connected to the Alert channel. All Alert amplifiers then receive and distribute the page signal.
4. The All Call Minus command temporarily transfers the page signal to all amplifiers except those connected to the EVAC and Alert channels.
EST3 Installation and Service Manual 1.35
5. A Selective Page temporarily transfers the selected amplifiers to the Page channel while the page is activate, distributing the page signal only to selected audio zones
System overview
(amplifiers). Audio zones are selected manually by the operator using the LED/Switch displays.
An example of how the page commands work is illustrated in Figure 1-17. This figure shows a nine story high rise building, with a fire on the 6th floor. The fire plan requires the evacuation signal to be sounded on the fire floor, floor above the fire, and floor below the fire. The alert signal is required to sounded in all other areas of the building except the stairwells. The first column (Fire Alarm) shows the automatic responses on the affected floors according to the fire plan.
Floor
Stairwells
9th floor
8th floor
7th floor
6th floor
5th floor
4th floor
3rd floor
2nd floor
1st floor
Legend
Fire floor Floor above or floor below fire
Fire
Alarm
Alert
Alert
Evac
Evac
Evac
Alert
Alert
Alert
Alert
Page to
Evac
Alert
Alert
Page
Page
Page
Alert
Alert
Alert
Alert
ASU page commands
Page to
Alert
Page
Page
Evac
Evac
Evac
Page
Page
Page
Page
All Call
Minus
Page
Alert
Alert
Evac
Evac
Evac
Alert
Alert
Alert
Alert
Figure 1-17: ASU Page Command Example
All Call Zoned
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Paging
Alert
Alert
Evac
Page
Evac
Alert
Alert
Alert
Alert
1.36 EST3 Installation and Service Manual
The Page to EVAC command replaces the EVAC signal with the Page signal, as shown in the figure’s second column.
The third column shows the Page to Alert command response, all the Alert signals have been replaced by the Page signal.
The All Call Minus command directs the Page to the areas which are not receiving the EVAC or Alert signals, i.e. the stairwells. In the fourth column of Figure 1-17, the stairwells receive the Page signal when the All Call Minus command is used and do not automatically receive either the EVAC or Alert signals.
System overview
The All Call command directs the page signal to all areas of the building, as illustrated in the last column of Figure 1-17.
Any combination of floors and stairwells could be selected to receive the page by manually selecting the audio zones on the audio zone select control/display module. Notice that at no time does any area receiving a signal have its signal interrupted by any page command function.
Evacuation (EVAC) channel
The EVAC channel always carries a signal designed to notify the occupants they must leave the facility. The evacuation signal may take the form of a textual message, a variety of audio tones, or an audio tone modulated by the standard 3-3-3 evacuation pattern, or any combination of these signals.
The EVAC channel is preprogrammed, and activated by the system in response to an alarm. The EVAC signal is automatically sent to the areas that are in danger and require immediate evacuation.
The EVAC channel has priority over all channels signals except for the Page channel. The alarm silence function automatically silences the EVAC channel when an operator presses the Alarm Silence switch.
Alert channel
The Alert channel always carries a signal designed to notify the occupants that an emergency situation exists in the facility. Occupants hearing the alert signal are not in immediate danger, but should prepare to evacuate. In some installations, the alert signal advises occupants that persons evacuating the danger area will be entering the area for safety.
The Alert channel is preprogrammed, and activated by the system in response to an alarm. The Alert signal is automatically sent to areas that are not in immediate danger and do not require immediate evacuation.
The Alert channel has priority over all other channels except the Page and EVAC channels. The alarm silence function automatically silences the Alert channel when an operator presses the Alarm Silence switch.
General channel
The General channel is used to distribute special purpose signals to special areas in the facility. Typically these areas include elevator cabs, stairwells, and areas in less peril than those areas receiving the Alert signal.
EST3 Installation and Service Manual 1.37
The general channel signals can be preprogrammed in response to an alarm, or they may be manually activated.
System overview
General channels have a lower priority than the Alert channel. The alarm silence function does not automatically silence the Alert channel unless programmed to do so.
Manual audio zone selection
If manual audio zone selection is required on the system, the appropriate control/display modules must be mounted on modules in the same cabinet as the Audio Source Unit. Typical configurations of control/display modules is shown in Figure 1-18. Exact operation of each display is dependent on system programming. Typical operation is described below.
r
Pa g e 12t h Fl
Page 11t h Fl
Page 10th Fl
Page 9th Fl
Page 8th Fl
Page 7th Fl
Page 6th Fl
Page 5th Fl
Page 4th Fl
Page 3rd Fl
Page 2nd Fl
Page 1st Fl
Page 12th Fl
Page 11t h Fl
Page 10th Fl
Page 9th Fl
Page 8th Fl
Page 7th Fl
Page 6th Fl
Page 5th Fl
Page 4th Fl
Page 3rd Fl
Page 2nd Fl
Page 1st Fl
Alert
Evac
Page
Alert
Evac
Page
Alert
Evac
Page
Alert
Evac
Page
Alert
Evac
Page
Alert
Evac
Page
o o
l F
h t
6
r o o
l F
h t 5
r o o
l F
h t
4
r o o
l F
d r 3
r o o
l F
d n 2
r o o
l F t s 1
Alert
Status
Page
Alert
Status
Page
Alert
Status
Page
Alert
Status
Page
Alert
Status
Page
Alert
Status
Page
ABCD
Figure 1-18: Audio zone selection displays
r o o
l F
h t
6
r o o
l F
h t 5
r o o
l F
h t
4
r o o
l F
d r 3
r o o
l F
d n 2
r o o
l F t s 1
1.38 EST3 Installation and Service Manual
Display A is a model 3-12SG. Each floor switch provides audio zone selection for the Page signal, and the integral green LED indicates the audio zone is selected.
Display B is a model 3-12GY. Each floor switch provides Page audio zone selection. The green LED to the upper left of the switch indicates the audio zone is selected. The yellow LED to the lower left of the switch indicates audio circuit trouble.
System overview
Displays C and D are model 3-6/3Sxxx. The display C configuration permits manual selection of the Alert, EVAC, and Page signals by floor. This configuration is well suited for systems which do not sound signals through the entire facility during an alarm. Responsible authorities can then manually add EVAC and Alert signals to other floors of the facility. Display configuration D is used in facilities which sound the Alert signal in all areas not receiving the EVAC signal. This eliminates the need to switch the Alert signal. The middle switch is not used, the middle LED indicates amplifier status.
Messages
General
While there is no standardization on message content, messages must tell the occupant what is happening, why it is happening, and what actions they should take.
As a rule, each message should be repeated three times. If there is more than one language spoken in the area, the messages should be provided in each language.
A male voice has been demonstrated to be more authoritative than a female voice, and should be used where urgency is required. A female voice has been shown to initially gain the public’s attention quicker than a male voice.
Alarm message format
The basic alarm message format consists of an alarm tone followed by an evacuation message repeated three times. The suggested alarm tone can take the form of a 1000 Hz tone modulated by the standard 3-3-3 evacuation pattern, a slow whoop, an electronic bell, a constant tone, or a constant tone modulated at a 120 pulse per minute rate. Please refer to the Authority Having Jurisdiction for specific requirements.
Typical Alarm Message text:
Female Voice: “May I have your attention please. May I
have your attention Please.” Male Voice: “There has been a fire reported in the building.” “Proceed to the nearest stairwell and exit the building.” “Do not use the elevators.” “Repeat, do not use the elevators.”
EST3 Installation and Service Manual 1.39
System overview
The EST3 amplifiers operate in a stand-alone mode should
Note:
they lose communication with the Audio Source Unit. The alarm tone used in the alarm message should be the same tone used by the amplifier for stand alone alarm signaling.
Alert message format
The basic alert message consists of an alert tone followed by an advisory message. The suggested alert tone should be easily differentiated from the alarm tone and can take the form of a constant tone, or a constant tone modulated at a 20 pulse per minute rate. Please refer to the Authority Having Jurisdiction for specific requirements.
Typical Alert message text:
Female Voice: “May I have your attention please. May I
have your attention Please.” Male Voice: “There has been an emergency reported in the building.” “Your area is in no immediate danger.” “People from other areas of the building may be entering your area.” “Be prepared to leave the building if you hear the evacuation signal.” “Repeat, you are in no immediate danger.”
Informative messages
Informative messages are those special purpose signals to areas of the facility which may have special concerns during an emergency situation. Typically these areas include elevator cabs, stairwells, and areas in less peril than those areas receiving the Alert signal. Some sample informative messages appear below.
Elevator message text:
Female Voice: “May I have your attention please. May I
have your attention Please.” Male Voice: “There has been an emergency reported in the building.” “The building manager has directed the elevators to the lobby.” “Please exit the building when you reach the lobby.”
Stairwell message text:
Female Voice: “Please continue down the stairs to your
assigned re-entry floor or the lobby.” “Do not attempt to use the elevators.”
Do Not Enter message text:
Male Voice: Do not enter this area.” “This is not an exit.”
“An emergency has been reported in this section of the building.” “Please exit the building using a marked fire exit.”
1.40 EST3 Installation and Service Manual
System overview
Message and tone storage
The prerecorded messages and tone sequences are stored in a digital format in the 3-ASU Audio Source Unit internal memory. When the message and tone library exceeds two minutes in total length, a 3-ASUMX/32 Expansion Memory card must be installed in the 3-ASU. The 3-ASUXM/32 provides additional storage space for up to 32 minutes of messages.
Messages and tone sequences are created and downloaded directly into the Audio Source Unit using the SDU and a computer equipped with a compatible sound card.
EST3 Installation and Service Manual 1.41
System overview
Firefighter phone system
Five phone off-hook limit
The circuitry on the 3-FTCU Firefighter Telephone Control Unit can support up to five telephones off-hook in addition to the master handset at the 3-FTCU at any one time. The flexibility of the EST3 system permits any number of phones to be wired on a single phone circuit, as long as they are not all used simultaneously. There are a number of different designs which can be used to insure that no more than five phones are active at any one time.
One phone per circuit
The advantages of installing a single firefighter phone station or jack on a SIGA-CC1 Signature module (personality code 6) are numerous. The system provides complete control and annunciation phone/circuit. Installing a single phone on a circuit permits the operator to immediately identify the exact location of the calling party. Because the 3-FTCU will only permit five circuits to be connected simultaneously, the maximum number of off-hook handsets can never be exceeded. Should a branch telephone circuit be damaged during a fire, the fault will not affect other phone circuits. When there is only one phone per circuit, troubleshooting of faults is simplified.
The largest disadvantage of installing one phone per branch telephone circuit is cost. Each phone location requires a separate SIGA-CC1 module.
1.42 EST3 Installation and Service Manual
System overview
Typical branch
telephone circuit
UL/ULC Listed
Ω
47 k EOLR
DATA OUT (+) DATA OUT (-)
To next SIGA-CC1 or UL/ULC Listed EOLR
To next device
From 3-FTCU
From Signature
controller module or
previous device
RISER IN (+) RISER IN (-)
DATA IN (+) DATA IN (-)
Class B
TB3
- +
10
9
SIGA-CC1 with
personality code 6
6
48372
5
1
TB1TB2
RISER OUT (+) RISER OUT (-)
Figure 1-19: SIGA-CC1 with one phone installed
Five phones per circuit
Installing up to five phones per branch circuit is a realistic compromise between installing a single phone per circuit and more than five phones per circuit. In the rare instance that all five phones are off-hook and a need to communicate with a sixth remote phone arises, the 3-FTCU operator can temporarily disconnect the entire branch circuit. Then the second branch circuit can be connected to complete the conversation.
The advantages of installing up to five telephone stations or jacks on a SIGA-CC1 Signature module (personality code 6) are: a reasonable balance between cost and performance; and the system maintains the high quality voice circuit at all times because the maximum number of off-hook handsets can never be exceeded.
The main disadvantage of installing up to five phones per branch telephone circuit is that a circuit failure can render the entire branch circuit useless. Additionally, the location of the incoming caller is not precisely known, and troubleshooting is more difficult.
Limited number of portable telephone handsets
EST3 Installation and Service Manual 1.43
Another method of limiting the number of off-hook phones to five limits the number of available portable phones available to the fire department to five. The biggest advantage of this method
System overview
is low cost, as multiple remote telephone jacks can be installed on a single branch circuit.
The main disadvantage of this method are: that five phones may not be adequate to properly cover the facility; a circuit failure can render many of the phone jacks useless; the location of the incoming caller is not precisely known; and troubleshooting is more difficult.
1.44 EST3 Installation and Service Manual
Chapter 2
Security applications
Summary
EST3 has powerful and flexible security capabilities. This chapter introduces you to the equipment required for security systems.
This chapter also illustrates and describes several security applications. Each application is presented as a separate topic that includes a block diagram and description. These give you an overview of the application, and show the components required and their interconnection.
Refer to the EST3 Installation Sheets for specific component settings and terminal connections.
Content
Security equipment • 2.2 Certificate installations • 2.8 Multiple 3-MODCOM modules • 2.13 Multiple site security and access • 2.14 Multiple tenant security • 2.17 Secure access • 2.21
EST3 Installation and Service Manual 2.1
Security applications
Security equipment
Introduction
The equipment required for a general security system is shown in Figure 2-1. We’ll discuss each item shown in the drawing, plus the other factors called out on the drawing.
Control panel
Signat ure data circuit
Signat ure Controller
Module
3-SAC
Security Access Control
Module
3-MODCOM
Modem Communication
Module
Distributor
Signat ure fire
alarm
devices
KPDISP
Keypad Display
Telephone lines
KDC program
Motion Detector
SAC bus
Central
monitoring
station
SDU
RPM
Resour ce
profile
Figure 2-1: Equipment required for a basic security system
MD
SEC2
Security Loop
Module
Conventional
security devices
Other factors
X
Power supply
X
Hardware configuration
SDU programming
X
ACDB/KDC operation
X
2.2 EST3 Installation and Service Manual
Equipment
The equipment used in security applications includes:
• Control panel
Signature Controller module
SIGA-MD Motion Detector module
SIGA-SEC2 Security Loop module
3-SAC Security Access module
• SAC bus
Security applications
KPDISP Keypad Display
3-MODCOM Modem Communication module
RPM Resource Profile Manager tool
KDC Keypad Display Configuration program
Control panel
It is a UL listing requirement that all cabinets in a system that includes security functions must have a tamper switch. The control panel must include a 3-TAMP, 3-TAMP5, or 3-TAMPRCC Cabinet Tamper Switch.
Signature Controller module
The Signature data circuit plays a dual role in integrated systems. First, it supports devices and modules belonging to the fire alarm system. Second, it supports security devices that are part of the security system.
Figure 2-1 shows a Signature Controller module with a Class B Signature data circuit. Shown on this circuit are Signature fire alarm devices, plus two security devices, the SIGA-MD and the SIGA-SEC2.
Several Signature Controller models are available, and can be used with integrated systems.
Note: Security devices can also be installed on the SAC bus via
CRCs, or on an analog device loop.
SIGA-MD Motion Detector module
The SIGA-MD is a passive infrared motion detector that connects to the Signature loop. The detector has alarm and tamper output monitoring capability. A contact closure causes an alarm but does not latch at the module.
The SIGA-MD provides six separate curtain coverage patterns with a 34-foot range. The detector can be mounted in flat corners or on walls up to a height of ten feet.
SIGA-SEC2 Security Loop module
The SIGA-SEC2 Security Loop Module is an intelligent analog addressable device that connects one or two security loops to a Signature data circuit. In Figure 2-1 this is indicated by the conventional security devices connected to the SIGA-SEC2.
The operation of the SIGA-SEC2 is determined by its device type and personality code. These are assigned during system design and configuration.
EST3 Installation and Service Manual 2.3
Security applications
3-SAC Security Access Control module
The 3-SAC Security Access Control rail module controls a high­speed RS-485 circuit called the Security Access Control (SAC) bus. The SAC bus supports fire, security, and access control devices.
The 3-SAC handles message traffic for these devices, interfacing them with the CPU as required. Events are passed from the devices to the 3-SAC module, then to the CPU for alarm processing.
The 3-SAC has two sets of circuit terminals, and is capable of Class A or Class B configuration. Each Class B circuit can include 31 devices, for a total of 62 devices per module. Class A circuits can include 30 devices total. In the figure, we show a Class B bus with a KPDISP Keypad Display control and display module.
SAC bus
Since our security and access control devices require 24 Vdc, we suggest that you always use a four-wire cable (two twisted-pairs) for the SAC bus and a 24 Vdc power supply.
Tip: To improve system performance in systems with a high number of partitions or cardholders, limit the volume of network messages. To do this, create partition routing groups so that only essential messages are sent to each KPDISP. In practice, limit the average number of partitions in a partition routing group to 10 or less.
For the data wires we suggest unshielded, twisted pair, with greater than 6 twists per foot, in 14 to 22 AWG (1.50 to 0.25 sq mm).
For the power wires, we recommend 14 or 16 AWG.
KPDISP Keypad Display
The KPDISP Keypad Display is a control and display module for security and fire alarm systems. The KPDISP has an LCD display and a telephone-style keypad. It operates on the 24 Vdc power supplied with the SAC bus.
The KPDISP is completely menu-driven. It lets the system user:
Arm and disarm partitions
Review off-normal points
Bypass or disable points
Execute fire alarm panel commands
Each KPDISP stores its portion of the security database.
You can create a security system that is operated via the LCD module alone, or in combination with any Control/LED display module. See the topic “Secure access.”
2.4 EST3 Installation and Service Manual
Security applications
3-MODCOM Modem Communicator module
The 3-MODCOM Modem Communicator module has both modem and dialer functions. It can transmit and receive information.
The 3-MODCOM can transmit alarm, supervisory, or trouble messages to a remote central monitoring station using one or two telephone lines. A variation of the module (3-MODCOMP) can transmit pager messages to a paging company using the TAP protocol. The 3-MODCOMP remote paging feature is supplemental and is not supervised.
The module can also receive information sent over telephone lines by the Keypad Display Configuration program.
RPM Resource Profile Manager tool
The Resource Profile Manager (RPM) tool is part of the SDU. It uses the project database to let you create a separate resource profile for each company that will be using the security system.
The resource profile defines the security system for the KDC program. It includes such information as:
The KPDISPs in the system
The routing required to access each KPDISP for downloads
Which KPDISPs can execute fire alarm system commands
The resource profile is imported into the KDC program during installation.
KDC Keypad Display Configuration program
The Keypad Display Configuration (KDC) program lets the system user define and maintain a database of information about KPDISPs, users, and access levels. This is part of the overall security database.
The KDC program runs on the user’s PC. Additions or updates to the security database can be transmitted to the KPDISP units in two ways.
The first method is via modem and dial-up telephone line to the3-MODCOM. The information is then routed to the CPU, through the correct 3-SACs, and finally to the affected KPDISP units.
The second method is by connecting the user’s PC directly to the CPU using an RS-232 cable. The connection is made between the PC’s COM1 port and any of the RS-232 terminals on the CPU. As in the first method, after reaching the CPU additions and changes are routed through the correct 3-SACs to the affected KPDISPs.
EST3 Installation and Service Manual 2.5
Security applications
Fire and security functionality cannot be programmed into
Note:
a control panel from a remote location. You must perform all panel programming on site. Changes to the security database have no impact on the parameters or operations of listed fire system equipment.
When the site includes an access control system, the Access Control Database (ACDB) program is used in place of the KDC. The ACDB includes the required KDC functionality.
Other factors
Next, we’ll cover the additional factors listed on the drawing:
• Power supply
• Hardware configuration
• SDU programming
• ACDB/KDC operation
These factors are called out on each application diagram given in this chapter.
Power supply
The KPDISP is designed to operate on 24 Vdc. For this reason, we recommend that you include power from the panel with the SAC bus cable. You can use the panel 3-PPS/M, 3-BPS/M, or 3-BBC/M power supplies.
Note that additional power supplies must be listed for the application.
Hardware configuration
The KPDISP does not have any switch or jumper settings. All configuration is done with the SDU program.
SDU programming
While the KDC program controls a small portion of the security database, all other definition, configuration, and programming for the security system happens in the SDU.
The SIGA-MD and SIGA-SEC2 are both treated as modules on the Signature data circuit. You configure each security module using the SDU.
The SDU controls the general configuration of the 3-SAC modules, plus the configuration of all CRC or KPDISP devices on the SAC busses.
2.6 EST3 Installation and Service Manual
KPDISP modules can be configured to execute a specific, predefined command list when a specific security or access
Security applications
control event occurs. You write the command lists in the SDU, and assign them to KPDISP events when you configure the KPDISP module.
Partitions are fundamental groups used with security systems. A partition is a group of devices intended to provide security for a given area of the site. Partitions can be armed and disarmed separately.
All partitions are created and defined in the SDU, and each CRC, CRC input circuit, KPDISP, SIGA-SEC2 circuit, and SIGA-MD circuit can be assigned to a partition. Partitions also play a role in KPDISP message routing.
For the 3-MODCOM module, the SDU determines the dialer and modem parameters, defines the receivers and accounts, and assigns each account to the correct receiver.
Finally, the SDU includes the RPM tool, described earlier in this topic.
ACDB/KDC operation
The Keypad Display Configuration (KDC) program runs on the end-user’s PC. It lets him create and maintain a database of information about KPDISPs, users, and access levels. This is part of the overall security database.
During setup of the program, the user imports the resource profile created by the RPM during system programming.
Once installed, the user can create and revise his KDC database. Changes and additions are transmitted via modem to the 3-MODCOM or via direct RS-232 connection to the CPU. The data is then routed to the correct 3-SAC and KPDISP units.
Security applications
The remaining topics in this chapter cover specific security applications. Each topic gives you an overview of the application, and shows you the components required and their interconnection.
Each topic has a block diagram and general description of the application. Other factors (as called out on the drawings) are discussed under separate headings in each topic.
EST3 Installation and Service Manual 2.7
Security applications
Certificate installations
Description of the applications
An installation company can be listed to install burglar alarm systems that are covered by UL under its Follow-Up Service. The listed company issues a certificate of the appropriate class, grade, and type.
This topic does not detail the steps required for certificate installations. You must follow UL 681 to determine the exact requirements for a given installation. Here, we simply list special EST3 equipment that can be used in the following applications:
Central Station Alarm Certificate
Police Station Connect Certificate
Local Mercantile Alarm Certificate
Refer to Appendix C, “Listing requirements” for additional information.
Special equipment
Certificate installations require the use of specialized attack and tamper equipment. Here are brief descriptions of the special parts. The diagrams for each application show which parts are required.
ATCK Attack Kit: a replacement cover kit for the 3-RCC7
cabinet. The kit provides a two-minute attack delay time. It includes a red, overlapping box cover for the cabinet. The cover attaches to the backbox sides using sheet metal screws and four locks. The kit also includes special knockout plugs that secure the unused knockout holes.
3-TAMPRCC Cabinet Tamper Switch: a switch that detects
removal of the cover.
Central station alarm certificate
Figure 2-2 shows the equipment that can be used as part of a Central Station Alarm Certificate installation. Note that this is the same equipment used for a Police Station Connect Certificate installation.
2.8 EST3 Installation and Service Manual
Security applications
Listed
bell
Tamper loop Bell circuit
Wires must be in a metal conduit with no boxes or other
Control panel
junctions
3-IDC8/4
3-SAC
3-MODCOM
3-TAMPRCC Cabinet
Tamper Switch
ATCK Attack Kit
Central
monitoring
station
Figure 2-2: Components used with a central station certificate application
KPDISP
SAC bus
Telephone lines: one line with 24-hour test or two lines with line cut monitors
Other factors
Power supply
Hardware configuration
SDU programming
X
ACDB/KDC operation
For this certificate, the control panel cabinet must be fitted with an ATCK Attack Kit and a 3-TAMPRCC Cabinet Tamper Switch. In addition, a listed local bell is required.
EST3 Installation and Service Manual 2.9
The bell must be positioned where it can be heard from every arming station in the system. You can use multiple bells if required.
The bell requires a tamper detection loop. Both the bell circuit and the tamper detection loop can be supported by a 3-IDC8/4 module.
A single phone line that is tested at least once in every 24-hour period can be used. Alternately, two lines with line cut monitoring can be used in place of a line with 24-hour testing.
If the central monitoring station (CMS) does not have testing services, the SDU can program the system to issue tests on a fixed or relative basis to meet this requirement.
Security applications
The CMS must have a maximum response time of 30 minutes.
When this application includes partitions, the partition that contains the EST3 panel equipped with the 3-MODCOM and local bell must be armed 24 hours a day, and have limited, high­level access.
Police station connect certificate
The equipment, installation requirements, and application restrictions for a Police Station Connect Certificate installation are the same as for a Central Station Alarm Certificate installation, as described above.
Central station alarm certificate
Figure 2-3 shows the equipment that can be used as part of a Central Station Alarm Certificate installation.
Control Panel
3-SAC
3-MODCOM
3-TAMPRCC Cabinet
Tamper Switch
ATCK Attack Kit
Central
monitoring
station
Figure 2-3: Central station certificate
KPDISP
SAC bus
Telephone lines: one line with 24-hour test or two lines with line cut monitors
Other factors
Power supply
Hardware configuration
SDU programming
X
ACDB/KDC operation
This certificate requires that the control panel be fitted with an ATCK Attack Kit and a 3-TAMPRCC Cabinet Tamper Switch. No local bell is required.
2.10 EST3 Installation and Service Manual
A single phone line that is tested at least once in every 24-hour period can be used. Alternately, two lines with line cut monitoring can be used in place of a line with 24-hour testing.
Security applications
When this application includes partitions, the partition that contains the EST3 panel equipped with the 3-MODCOM must be armed 24 hours a day, and have limited, high-level access.
In mercantile burglar alarm systems, you can locate an alarm sounding device outside the protected area, provided the sounding device is located inside the building, is rated for outside service, and you transmit alarm conditions to one of the following:
The dispatch location of the law enforcement agency having jurisdiction over the protected property
A central station or residential monitoring station complying with the Standard for Central Station Alarm Services, UL 827
You can also locate an alarm sounding device within the area of greatest protection, or outside the area of greatest protection within an area protected by an alarm system that shares a common control unit with the alarm system installed in the area of greatest protection, provided the sounding device is rated for inside service and you transmit alarm conditions to one of the following:
The dispatch location of the law enforcement agency having jurisdiction over the protected property
A central station or residential monitoring station complying with the Standard for Central Station Alarm Services, UL 827
In either case above, mount alarm sounding devices located inside building at least 10 feet (3.05 m) above the floor or at the surface of the ceiling. When there is fixed construction within the area that could provide access for an intruder, mount the alarm sounding device at least 4 feet (1.2 m) away from the edges of the fixed construction along the surface of the ceiling or at least 10 feet (3.05 m) above it so as to minimize access by an intruder.
Local mercantile alarm certificate
Figure 2-4 shows the equipment that can be used as part of a Local Mercantile Alarm Certificate installation. The control panel cabinet must be fitted with an ATCK Attack Kit and a 3-TAMPRCC Cabinet Tamper Switch. A listed local bell is also required.
The bell requires a tamper detection loop. Both the bell circuit and the tamper detection loop can be supported by a 3-IDC8/4 module.
EST3 Installation and Service Manual 2.11
Security applications
Listed bell
and bell housing
Control Panel
Tamper loop Bell circuit
Wires must be in a metal conduit with no boxes or other junctions
3-IDC8/4
3-SAC
3-TAMPRCC Cabinet
Tam p e r S w it c h
ATCK Attack Kit
Figure 2-4: Local certificate
SAC bus
KPDISP
Other factors
Power supply
Hardware configuration
SDU programming
ACDB/KDC operation
The bell must be positioned where it can be heard from every arming station in the system. You can use multiple bells if required.
In mercantile alarm systems that do not provide a remote alarm transmission connection, you must mount the alarm housing on the outside of the building in a location that is accessible, is not more than four stories above street level, and is visible from the public street or highway.
You may locate the alarm housing as high as the seventh floor, provided you do one of the following:
2.12 EST3 Installation and Service Manual
Mount a second alarm sounding device and housing intended for outside service adjacent to the premises or area of the building in which the alarm system is installed
Mount a second alarm sounding device and housing intended for inside service within the premises
Security applications
Multiple 3-MODCOM modules
You can install more than one 3-MODCOM Modem Communicator module in a system. Two or more 3-MODCOM modules can be installed in the same cabinet. Two or more cabinets can contain 3-MODCOM modules.
There are several reasons for using multiple 3-MODCOMs:
Redundant communication to a CMS
Backup of critical communication links
Dedicated security transmission hardware
In a redundant communication system both 3-MODCOMs are programmed to transmit the same message to different receivers at the CMS or at different CMS installations.
One 3-MODCOM can be programmed to back up another. This guarantees CMS communication (or TAP paging) should one panel in the system become disabled.
In a multiple tenant application, there may be a high volume of ACDB/KDC program traffic. You can design such systems with a second 3-MODCOM, dedicating the first module to ACDB/KDC traffic, and the second module to CMS transmissions. This prevents contention for communication channels.
Overall limits for the number of 3-MODCOM modules are:
10 modules per node
10 modules total per network
EST3 Installation and Service Manual 2.13
Security applications
Multiple site security and access
Description of the application
Figure 2-5 shows how a company with multiple sites can centralize security and access control functions for all sites. This means an employee only needs to carry a single access card to gain appropriate access to any company site.
The figure shows a company with three plants, designated sites A, B, and C. Site C is chosen as the company headquarters for security and access control purposes.
Each site is a separate SDU project. At each site, the Resource Profile Manager (RPM) tool is used to create a profile for that site. This includes site C, the headquarters plant.
All the profiles are sent to the security office at site C for import into the Keypad Display Configuration (KDC) or Access Control Database (ACDB) program. This means that the programs will present all resources at all sites in a single hierarchy, as shown by the tree diagram.
The security personnel at site C can create global access groups. This means that they can assign an employee the correct security and access privileges for all sites from one central location. The employee can carry a single access card that will grant him the correct security and access privileges at each site.
2.14 EST3 Installation and Service Manual
Security applications
A
SDU
RPM
Site A
profile
SITE A
EST3
system
Telephone lines
SITE C (HQ)
EST3
system
ACDB
KDC
Site C profile
SITE B
EST3
system
SDU
RPM
Site B profile
T
D1 D2 D3
B
D1 D2 D3
C
D1 D2 D3
Other factors
Power supply
Hardware configuration
X
SDU programming
X
ACDB/KDC operation
X
RPM
SDU
Total resource
profile tree
Figure 2-5: Multiple site security and access control system
Hardware configuration
Each site must have an EST3 system. In each EST3 system, at least one panel must include a 3-MODCOM module to support modem communication between headquarters and sites A and B.
The KDC and ACDB programs can communicate with the EST3 system either by modem, or by direct connection to an RS-232 port on the CPU module.
EST3 Installation and Service Manual 2.15
Security applications
Each system includes 3-SAC modules as required to support the security and access control systems implemented.
Rules covering installation and classification (of extent) of alarm equipment at individual locations are published in the Standard
for Installation and Classification of Burglar and Holdup Alarm Systems UL681.
SDU programming
No special project programming is required to enable multiple site security and access control systems. When running the RPM tool, each site receives 100% of the resources for that site.
Note that all profiles must be sent to the site C headquarters when the project is finished.
ACDB/KDC operation
At the headquarters site, all three profiles are imported into the ACDB/KDC program. The result is a global tree of resources that includes each KPDISP and CRC device in each site.
Importing all the profiles into one ACDB/KDC program creates the global database.
When additions or changes to the KPDISP database are made, headquarters can transmit the changes to the affected sites.
2.16 EST3 Installation and Service Manual
Security applications
Multiple tenant security
Description of the application
Figure 2-6 illustrates a simple strip mall security application. The mall consists of three identical stores and an electrical room.
The control panel supports a SIGA data circuit and a SAC bus. The panel also supports modem communications via telephone lines.
The SIGA circuit has pull stations and smoke detectors. In addition, the SIGA circuit has two security devices, the motion detector and the SIGA-SEC2 security loop module. The SIGA­SEC2 connects a conventional door contact to the SIGA circuit.
The SAC bus is used exclusively for the KPDISP devices.
Each company owner has a Keypad Display Configuration (KDC) program. The program runs on a computer equipped with a modem, and uses the modem and a dial-up telephone line to communicate with the control panel.
Each company owner can use the KDC to download changes to that company’s portion of the security database. The changes are routed through the panel to the appropriate KPDISP unit.
Note: Fire and security functionality cannot be programmed into
a control panel from a remote location. You must perform all panel programming on site. Changes to the security database have no impact on the parameters or operations of listed fire system equipment.
The control panel can be configured to provide telephone connection to a central monitoring station (CMS). Each tenant company can have a separate account at the same CMS, or can use the services of a separate CMS.
Refer to Appendix C, “Listing requirements” for additional information.
EST3 Installation and Service Manual 2.17
Security applications
Telephone line
SIGA-MD
KDC
SIGA-MD
KDC
Motion
Smoke
Partition 4
Company C
Program
Moti on
Partition 3
Company B
Program
SIGA-IPS
SIGA-IPS
Smoke
Security
SIGA-SEC2
Security
SIGA-SEC2
Door
contact
Other factors
Power supply
Hardware configuration
SDU programming
KPDISP
SIGA-270
Pull station
Door
contact
KPDISP
SIGA-270
Pull station
ACDB/KDC operation
X
X
X
Motion
SIGA-MD
Smoke
SIGA-IPS
SAC bus
panel
Control
KDC
SIGA-MD
Partition 2
Company A
Program
Motion
SIGA loop
Partition 1
Figure 2-6: Multiple tenant security in a strip mall
Door
Security
SIGA-SEC2
contact
KPDISP
SIGA-270
Pull station
KPDISP
bell
Security
NOTE: Star taps are shown to simplify this diagram, but are not
recommended for Signature data circuits. Create two T-taps in
the same junction box if required.
2.18 EST3 Installation and Service Manual
Security applications
Hardware configuration
The control panel contains the following rail modules:
Signature Controller module
3-SAC Security Access Control module
3-MODCOM Modem Communicator module
The Signature Controller module supports the SIGA loop.
The 3-SAC module supports the SAC bus. Power for the KPDISP can be taken from the 3-PPS/M and routed with the data lines in a cable composed of two twisted-pair wires.
The 3-MODCOM module supports modem communication between the control panel and the KDC programs via telephone lines.
In the Class B configuration illustrated, an appropriate RS-485 line terminating resistor is required in the KPDISP located in partition 4.
The electrical room, partition 1, must be armed 24 hours a day, and have limited, high-level access.
SDU programming
When programming the system for this application, you define the required partitions and assign the correct partition number to each security device.
Part of the programming effort includes using the Resource Profile Manager (RPM) tool to create resource profiles for the site owner and for each company owner.
Since none of the devices are shared, each company should receive 100% of the resources of their KPDISP. A small percentage may be set aside for use of the site owner, depending on the owner’s policy.
Programming for the 3-MODCOM module determines the dialer and modem parameters, defines the receivers and accounts, and assigns each account to the correct receiver.
Finally, when running the RPM tool, you specify which, if any, of the KPDISP modules can execute fire system commands. Typically, this privilege is reserved for the site owner or site security staff.
Refer to the SDU Online Help for more information.
EST3 Installation and Service Manual 2.19
KDC operation
Each company owner must import the resource profile output from the RPM. After importing this resource data, each company
Security applications
owner can create his portion of the security database, according to the instructions included with the KDC program.
Changes to the tenant portion of the security database can be made at any time, and from any location.
Note: Fire and security functionality cannot be programmed into
a control panel from a remote location. You must perform all panel programming on site. Changes to the security database have no impact on the parameters or operations of listed fire system equipment.
2.20 EST3 Installation and Service Manual
Security applications
Secure access
Description of the application
Secure access is a simplified type of security application. Typical secure access applications are operated from a secured control panel, and use partitions with no entry or exit delay timers.
Secure access applications often use the control panel LCD module (or dedicated Control/LED display modules) to control the security partitions. Partitions can be armed or disarmed using any of the following:
• LCD menus
• EST3 Control/LED modules
• FireWorks interface
• ENVOY annunciators
• KPDISP
A secure access system can be implemented using either Signature or Analog Addressable security devices. Signature devices are less prone to false alarms, and are more resistant to tampering, since they cannot be swapped with deliberately compromised devices.
SDU programming
When you create a secure access application, use the SDU to create partitions as required. When configuring the partitions, set the Entry Delay Timer and Exit Delay Timer values to zero. When configuring SIGA-SEC2 and SIGA-MD devices, set the Delay to None.
You can use LCD menu commands to arm and disarm the partitions. To do so, you must check the Enable LCD Security Control Functions check box. This is located on the Options tab of the Cabinet Configuration dialog box. Checking this box causes the Security menu to appear in the Command Menus list.
You can use any suitable Control/LED module to arm and disarm partitions. Configure the switches as momentary contact switches, and use them to activate command lists. Program the command lists to perform the desired arm and disarm actions and control the LEDs.
Refer to the SDU Online Help for more information on rule programming for secure access applications.
EST3 Installation and Service Manual 2.21
Security applications
2.22 EST3 Installation and Service Manual
Chapter 3
Access control applications
Summary
EST3 supports rugged and adaptable access control systems. This chapter introduces you to the equipment required for access control applications.
This chapter also illustrates and describes several access control applications. Each application is presented as a separate topic that includes a block diagram and description. These give you an overview of the application, and show the components required and their interconnection.
Refer to the EST3 Installation Sheets for specific component settings and terminal connections.
Security applications make use of the CRC Card Reader Controller. Refer to the CRC and CRCXM—Card Reader Controller Installation Sheet for specific installation information on this module.
Content
Access control equipment • 3.2 Anti-passback • 3.11 Central monitoring station • 3.14 Common door access • 3.16 Delayed egress • 3.18 Elevator control • 3.21 Emergency exit door • 3.24 Handicap access door • 3.26 Maglock peripherals • 3.28 Multiple card readers • 3.30 Muster • 3.32 Power for continuous locks • 3.35 Power for intermittent locks • 3.37 Power from an AC source • 3.39 Power from a remote source • 3.42 Remote controls • 3.45 Two-person rule • 3.47
EST3 Installation and Service Manual 3.1
Access control applications
Access control equipment
Introduction
The equipment required for a basic networked access control system is shown in Figure 3-1. We’ll discuss each item shown in the figure, plus the other factors called out on the drawing.
Input circuit 1 Input circuit 2
Control panel
Security Access Control
3-SAC
Module
3-MODCOM
Modem Communication
Module
Distributor
SDU
RPM
Telephone lines
ACDB program
Resource
profile
SAC bus
Output circuit
Central
monitoring
station
Figure 3-1: Equipment required for a basic access control system
CRC
Card Reader
Controller
Power supply
X
X
Hardware configuration
X
SDU programming
X
LockCard reader
Other factors
ACDB/KDC operation
3.2 EST3 Installation and Service Manual
Equipment
Here is a list of the equipment used in a basic networked access control system:
3-SAC Security Access Control module
3-MODCOM Modem Communication module
• SAC bus
CRC Card Reader Controller
Access control applications
• Input circuit 1
• Input circuit 2
• Output circuit
• Card reader
• Lock
RPM Resource Profile Manager tool
ACDB Access Control Database program
3-SAC Security Access Control module
The 3-SAC Security Access Control rail module controls a high­speed RS-485 circuit called the Security Access Control (SAC) bus. The SAC bus supports fire, security, and access control devices.
The 3-SAC handles message traffic for these devices, interfacing them with the CPU as required. Events are passed from the devices to the 3-SAC module, then to the CPU for alarm processing.
The 3-SAC has two sets of circuit terminals, and is capable of Class A or Class B configuration. Each Class B circuit can include 31 devices, for a total of 62 devices per module. Class A circuits can include 30 devices total. In Figure 3-1, we show a Class B bus with a CRC Card Reader Controller module.
3-MODCOM Modem Communicator module
The 3-MODCOM Modem Communicator module has both modem and dialer functions. It can transmit and receive information.
The 3-MODCOM can transmit alarm, supervisory, or trouble messages to a remote central monitoring station using one or two telephone lines. A variation of the module (3-MODCOMP) can transmit pager messages to a paging company using the TAP protocol.
The module can also receive information sent over telephone lines by the Access Control Database (ACDB) program.
SAC bus
Since our security and access control devices require 24 Vdc, we suggest that you always use a four-wire cable for the SAC bus and a 24 Vdc power supply.
For the data wires, use unshielded, twisted pair, with greater than 6 twists per foot, in 14 to 22 AWG (1.50 to 0.25 sq mm). For the power wires, use 14 or 16 AWG.
You can use a four-conductor cable with an overall jacket containing solid 2-19 AWG and 2-16 AWG for the SAC bus.
EST3 Installation and Service Manual 3.3
Access control applications
The maximum run from a CRC to the 3-SAC is 4,000 ft (1,220 m) at 25 pF/ft. The maximum total capacitance of the run is 0.1 μF, and the maximum total resistance is 52 Ω.
CRC Card Reader Controller
The Card Reader Controller (CRC) module performs all access decision processing. Each CRC stores a database and is capable of granting or denying entry without external communication. If entry is granted, the CRC applies or removes power to the strike or maglock to unlock the door. The CRC is also capable of unlocking a door by activating a manual push button.
Each CRC stores an access database of users and events for the door it controls. The CRCXM model features enhanced storage capacity. (Refer to the product installation sheets for quantities.)
Each CRC has terminals that support:
Two card readers, typically one inside and one outside the door
One lock device, either strike or maglock type
Two input circuits for devices such as request to exit detectors, door contacts, or motion detectors
One output circuit with N.O and N.C. contacts for auxiliary devices, such as door openers
With the addition of an internal battery, the CRC can continue processing access events even if there is a loss of communication or power.
CRC options
CRCSND CRC Sounder
The CRC Sounder is a small horn that mounts inside the card reader controller module. The sounder operates if an emergency exit door is opened without an exit request and can also indicate that a door has been left open.
The CRC Sounder can be programmed, using rules written in the SDU. Further, the ACDB program can control several operating parameters of the sounder.
CRCRL CRC Accessory Relay
The CRCRL is an accessory relay for the CRC (or CRCXM) Card Reader Controller. Use the CRCRL in conjunction with an external power supply to control a lock which requires voltage or current outside the CRC's operating range.
3.4 EST3 Installation and Service Manual
Access control applications
The CRCRL can be mounted inside the CRC housing when connected to power-limited wiring. The unit includes a hook­and-loop patch which can be attached to the CRC battery strap.
When nonpower-limited wiring is used, the CRCRL must be mounted in a junction box.
The CRCRL is listed as an Access Control Accessory and Control Unit Accessory.
Battery
Each CRC has space for an internal, 1.2 Ah, sealed lead-acid battery. The battery supplies power to the CRC and its peripherals, and provides local standby power.
The CRC battery provides 30 minutes of standby power for access control functions and up to 4 hours for security functions. The battery cannot be used for fire applications.
CRCXF CRC Transformer
The CRCXF CRC Transformer is a 16.5 Vac transformer that can power the CRC or CRCXM. It provides local power for applications requiring additional power at door lock. The CRC has AC load terminals for easy connection to transformer.
Be sure to check the CRC installation sheet for a list of applications that prohibit the use of the CRCXF.
Input circuits 1 and 2
Each CRC supports two input circuits for such devices as:
• Door contacts
• Motion detectors
Request to exit (REX) switches
• Security devices
A door contact device monitors the door position (open or closed) for various applications.
A motion detector detects a person’s approach and can be used to unlock the door.
A request to exit (REX) push button (or bar) can be used to manually unlock the door.
Security devices, such as glass-break detectors can be associated with the door to enhance its security, or to monitor a nearby window.
EST3 Installation and Service Manual 3.5
Access control applications
Output circuit
Each CRC supports one output circuit in the form of N.O. and N.C. dry contact connections. The output circuit can be used for such devices as:
Automatic door openers
Door holder control
Card reader
By card reader, we mean any of the different types of credential reader supported by the CRC. A card reader scans a card to determine the card number and passes the card number to the CRC.
A card reader is a self-contained module capable of reading one type of access card and transmitting the card’s code to a card reader controller.
All the required electronics are assembled in the card reader housing. The card reader connects directly to the CRC, which processes the card code and grants or denies access.
Each CRC can support several card readers. Typically, a CRC will control an entry and exit card reader for the doorway. It can also support multiple readers for such applications as two-person rule or anti-passback.
Note that the CRC supports any type of reader that uses the industry standard Wiegand output format. These include:
• Proximity
• Wiegand pin
• Magnetic stripe
• Bar code
• Keypad
• Smart card
• Biometric
For simplicity, we present all the applications in this chapter as operating with proximity readers, but other reader types can be used.
Some applications work best with card readers that support dual LED control. The CRC uses two LEDs, or two LED states, to indicate that further actions are required after the initial badging operation, before access is granted. These applications are:
• Two-person rule
Visitor and escort
• PIN schedule
3.6 EST3 Installation and Service Manual
Some card readers are also equipped with a keypad. The keypad allows for entry of a PIN number in addition to the card code.
Access control applications
The CRC can accommodate any PIN number of 1-4 digits along with the associated card code. The need to enter a PIN is controlled by two factors: whether or not the CRC is armed, and whether or not the access schedule calls for use of a PIN.
Lock
The CRC supports any type of door locking or releasing device. Common lock devices are strikes and maglocks. A strike opens the door when power is supplied, while a maglock secures the door while power is supplied.
RPM Resource Profile Manager tool
The Resource Profile Manager (RPM) tool is part of the SDU. It uses the project database to let you create a separate resource profile for each company that will be using the access control system.
The resource profile defines the access control system for the ACDB program. It includes detailed information about each CRC used by a given company. For example:
• Communication method
Primary or secondary control
Number of cardholders
Number of schedules
Number of holidays
Number of access levels
Command lists used
ACDB Access Control Database program
The Access Control Database (ACDB) program lets you define and maintain a database of information about CRCs, cardholders, and access levels.
The ACDB program runs on the your PC. Additions or updates to the access control database can be transmitted to the CRC units in two ways.
The first method is via modem and dial-up telephone line to the 3-MODCOM. The information is then routed to the CPU, through the correct 3-SACs, and finally to the CRC units.
The second method is by connecting your PC directly to the CPU using an RS-232 cable. The connection is made between the PC’s COM1 port and any of the RS-232 terminals on the CPU. As in the first method, after reaching the CPU additions and changes are routed through the correct 3-SACs to the CRCs.
EST3 Installation and Service Manual 3.7
Note: Changes to the access control database have no impact on
the parameters or operations of listed fire system equipment.
Access control applications
Other factors
Next, we’ll cover the additional factors listed on the drawing:
• Power supply
• Hardware configuration
• SDU programming
• ACDB/KDC operation
These factors are called out on each application diagram given in this chapter.
Power supply
The CRC is designed to operate on 24 Vdc. For this reason, we recommend that you include power from the panel with the SAC bus cable. You can use the panel 3-PPS/M or 3-BPS/M power supplies.
When using CRCXF CRC Transformer you must provide a circuit common path between all devices, using the –24 Vdc terminals.
If you use an additional power supply other than the CRCXF, that power supply must be listed for fire alarm applications, must have ground fault detection disabled, and must have a circuit ground (circuit common) that is isolated from earth ground.
Hardware configuration
The CRC has two jumpers that configure the power source and usage for the module. See the CRC installation sheet for details on the jumper settings.
No other configuration settings are made at the device itself. All other configuration is done via SDU or ACDB programming.
The SDU determines site-level configuration and parameters. The ACDB program controls end-user settings.
SDU programming
While the ACDB program defines the access control database, all other definition, configuration, and programming for the access control system happens in the SDU.
The SDU controls the general configuration of the 3-SAC modules, plus the configuration of all CRC devices on the SAC busses.
3.8 EST3 Installation and Service Manual
CRC modules can be configured to execute a specific, predefined command list when a specific access control event occurs. You write the command lists in the SDU, and assign them to CRC events when you configure the CRC module.
Access control applications
Partitions are fundamental groups used with access control systems. To use such access control features as two man rule, muster, or anti-passback, CRCs must belong to the same partition. All partitions are created and defined in the SDU, and each CRC can be assigned to a partition.
For the 3-MODCOM module, the SDU determines the dialer and modem parameters, defines the receivers and accounts, and assigns each account to the correct receiver. These settings control CMS reporting and ACDB download operation.
Finally, the SDU includes the RPM tool, described earlier in this topic.
ACDB operation
The ACDB program lets you create and revise your access control database. Parameters stored in the database identify cardholders, schedules, and holidays, and assign access privileges.
The SDU includes a tool called the Resource Profile Manager (RPM). The RPM lets you create a resource profile for each company using the system for access control purposes. During setup of the ACDB program, you import the resource profile created by the RPM. This defines the system devices for the ACDB program.
The ACDB runs on your computer. You can connect the computer to the access control system in two ways:
From an RS-232 port on the computer to an RS-232 port on the CPU
From the computer modem to a 3-MODCOM via telephone lines
The end result is that the ACDB database can be downloaded from your computer to the system. Each CRC stores that portion of the database pertinent to its operation.
Locally defined unlock and open timers
Using the ACDB program, you can control how much time a cardholder has to enter or exit after badging in or pressing a request-to-exit button (REX). The CRC controls both the unlock time and door open time. Both can be set in the ACDB program.
Unlock timers control the number of seconds that the door stays unlocked after a cardholder badges in. When the unlock timer expires, the door locks. The ACDB has four unlock timers:
• Standard unlock
• Handicap unlock
EST3 Installation and Service Manual 3.9
Access control applications
• Manual unlock
• Minimum unlock
The CRC relay can be used to control a door opener. Door open timers control the number of seconds that the relay remains active. The ACDB has two door open timers:
• Manual open time
Relay open time
Access control applications
The remaining topics in this chapter discuss specific access control applications. Each topic gives you an overview of the application, showing the components required and their interconnection.
Each topic includes a block diagram and general description of the application. Other factors (as called out on the drawings) are discussed under separate headings in the topic.
3.10 EST3 Installation and Service Manual
Access control applications
Anti-passback
Description of the application
Anti-passback is a feature of the access control system that prevents successive use of one card to pass through any door in the same direction. Anti-passback prevents a card from being passed back to another person for the purpose of gaining unauthorized access.
The CRC supports three forms of anti-passback:
• Strict
• Logged
• Timed
Strict anti-passback is the most restrictive form of anti-passback. It requires all personnel to badge in and out, denying them access to an area when they fail to do so.
Logged anti-passback is less restrictive than strict anti-passback. It still requires personnel to badge in and out but does not deny access when anti-passback rules are violated. Rather, such access is logged as an access granted anti-passback event. With logged anti-passback, security staff can work to correct violations, but personnel are not locked out.
Timed anti-passback prevents reuse of a card for a specific period, but does not require personnel to badge out. A timed anti-passback system automatically badges a cardholder out of the controlled partition after a specified time period, allowing the card to be used again.
Note: Timed anti-passback cannot be used with a muster
application, since the system automatically logs cardholders out of the partition, defeating muster accounting.
To implement anti-passback, a separate CRC is required at each doorway in the controlled partition. Each doorway requires an outside card reader. Strict and logged anti-passback applications also require an inside reader at every doorway. Timed anti­passback does not require the use of an inside card reader.
A typical anti-passback application is shown in Figure 3-2, below.
The figure shows a building with a perimeter fence. It would be easy for an employee to pass his access card to an unauthorized individual through the fence, thereby allowing access. Configuring the access control system for anti-passback operation can help prevent this from happening.
EST3 Installation and Service Manual 3.11
Access control applications
Outside
reader
Inside
Perimeter fence
Entrance
turnstile
reader
Lock circuit Reader circuit
SITE
Building
entrance
CRC
Figure 3-2: Anti-passback
SAC bus
Main building
Control panel
3-SAC
Emergency
exit
Other factors
Power supply
Hardware configuration
X
SDU programming
X
ACDB/KDC operation
X
Hardware configuration
The control panel must contain a 3-SAC Security Access Control module. The 3-SAC module supports the SAC bus. Power for the CRC can be taken from the 3-PPS/M and routed with the data lines in a cable composed of two twisted-pair wires (the SAC bus).
3.12 EST3 Installation and Service Manual
Access control applications
SDU programming
If the CRC is to be used for anti-passback this must be configured using the SDU. The CRC configuration dialogs let you select the type of anti-passback you want to use:
• None
• Logged
• Timed
• Strict
You can also assign a predefined command list to various access granted or access denied events, including the anti-passback events:
Access granted anti-passback
Access denied anti-passback
The CPU runs the command list you specify when either of these events occurs.
ACDB programming
With timed anti-passback, the cardholder is automatically marked out after a specified period of time. This period is defined by the ACDB. The period can be set from 0 through 255 minutes (4 hours and 15 minutes).
EST3 Installation and Service Manual 3.13
Access control applications
A
Central monitoring station
Description of the application
An access control system can transmit different kinds of event information to a central monitoring station (CMS). The basics for such a system are shown in Figure 3-3.
Card
reader
CRC
SAC bus
Control panel
ccess denied event
3-SAC
CPU
Programmed rules for transmission
3-MODCOM
Formatted CMS message
Telephone line
Other factors
Power supply
Hardware configuration
SDU programming
X
ACDB/KDC operation
Central
monitoring
station
Figure 3-3: Access control reporting to a central monitoring station
When a reportable access event occurs, the event message travels from the CRC to the 3-SAC. The 3-SAC passes the message to the CPU which executes a predefined command list. The command list specifies the details of the message that is sent to the 3-MODCOM for transmission to the CMS.
3.14 EST3 Installation and Service Manual
Access control applications
SDU programming
Reporting access control events to a CMS depends entirely on programming and the creation of command lists. In essence, you must assign a command list to each CRC event you want to report. The command list contains the details of the message to be transmitted.
The following CRC events can be assigned command events:
• Access granted
Access granted irregular
Access granted anti-passback
Access granted muster
Access denied unknown
Access denied reader disabled
Access denied access level not active
Access denied outside schedule 1
Access denied outside schedule 2
Access denied partition armed
Access denied PIN not entered
Access denied PIN not valid
Access denied two-person timeout
Access denied anti-passback
Access denied escort
EST3 Installation and Service Manual 3.15
Access control applications
A
A
Common door access
Description of the application
A site that makes use of a common door is shown in Figure 3-4. Here, the door is the main entrance of an office building, and leads into a common lobby area. Within the building, two companies rent offices, each with controlled access doors.
Site owner
ACDB
Modem
Distributor
SDU
RPM
Telephone lines
Site
Owner
Company
A
Company
B
Control panel
3-SAC
3-MODCOM
CDB
Modem
Common door
CRC 1
Suite 101
Company A
CR 1
SITE
Lobby
SAC bus
2 C
R C
2 R
C
Resource profiles
Other factors
Power supply
Hardware configuration
X
SDU programming
X
ACDB/KDC operation
X
Figure 3-4: Common door in a lobby area
3.16 EST3 Installation and Service Manual
CDB
Modem
Suite 102
Company B
3 C
R C
3 R
C
Access control applications
Hardware configuration
The site has an EST3 control panel that includes a 3-SAC and a 3-MODCOM module. The 3-SAC supports the SAC bus. The 3-MODCOM module supports modem communication with the control panel over telephone lines.
SDU programming
As the distributor, you use the SDU to program the control panel for this application. Part of the programming job is to use the Resource Profile Manager (RPM) to create resource profiles for the site owner and for each tenant company.
Resource profiles are imported into the Access Control Database (ACDB) program. They determine which devices the user can see and program. Resource profiles also establish transmission routes that permit modem communication with the EST3 panel.
When a device is shared, the RPM lets you specify how much of the device is allocated to each company. You can allocate resources either by percentages or by actual numbers.
It’s a good idea to hold some allocation in reserve, giving each company only what it needs. It is much easier to allocate additional resources as needed than to reclaim resources that are already allocated.
In our example, the resource profile for company A would contain CRC 1 (the lobby door) and CRC 2 (the suite 101 door). For Company A, you might choose to allocate 80% of CRC 2, and 20% of CRC 1.
Similarly, the resource profile for company B would allocate 80% of CRC 3 and another 20% of CRC 1.
The site owner will need access to the CRC2 and CRC3 doors for cleaning or inspection purposes. The site owner resource profile could allocate 20% of CRC 1, 10 % of CRC 2, and 10% of CRC 3.
This leaves 40% of CRC 1 unallocated, and 10% of CRC 2 and CRC 3 unallocated. The unallocated resources are reserved for future expansion or changes.
ACDB operation
The site owner, the owner of company A, and the owner of company B, can all use telephone lines to communicate with the control panel via the 3-MODCOM module. They can download additions and changes to the CRCs, and upload usage data for various ACDB reports.
EST3 Installation and Service Manual 3.17
Access control applications
Delayed egress
Description of the application
Delayed egress doors help to control shoplifting at retail sites. A delayed egress door has card readers and a request to exit (REX) switch. Employees can badge in and out as they would at any other door. In an emergency, customers must press the REX switch to unlock the door.
When the REX switch is activated, the CRC sounds the CRCSND horn and sends a security alarm event to the panel. It does not unlock the door immediately, thus allowing site staff time to investigate.
The CRC waits for a specific interval of time before unlocking the door. The typical delay time is 15 seconds; however, you may be able to use a delay of up to 30 seconds with the approval of the AHJ. The horn continues to sound for a specific period of time, or until the CRC is reset.
After the delay time passes, the CRC unlocks the door, and latches it in the unlocked state. The CRC must be reset in order to relock the door and silence the horn. To reset the CRC, site staff must use a valid badge at the card reader.
The CRC also activates the CRCSND horn if the door is opened without badging. For example, if the door is forced open from the outside, the CRCSND activates, even though the REX switch has not been pressed.
Many codes require that delayed egress doors unlock during a fire alarm, or when the panel is in trouble. This requirement allows occupants to evacuate the site immediately when a fire is detected, or when the panel loses its ability to detect a fire or sound the alarm.
Figure 3-5 shows a delayed egress door with inside and outside card readers and a request to exit switch. The CRC uses a door contact switch to determine the position of the door, and a maglock to lock the door. The door contact switch and REX switch are connected to the input loops of the CRC.
Note: Refer to NFPA 101 and the local AHJ to determine the
requirements for delayed egress applications.
3.18 EST3 Installation and Service Manual
Loading...