This manual is copyrighted by GE Security, Inc. (GE Security).
You may not reproduce, translate, transcribe, or transmit any
part of this manual without express, written permission from GE
Security.
This manual contains proprietary information intended for
distribution to authorized persons or companies for the sole
purpose of conducting business with GE Security. Unauthorized
distribution of the information contained in this manual may
violate the terms of the distribution agreement.
Microsoft, Microsoft Mouse, Microsoft Windows, Microsoft Word,
and Microsoft Access are either registered trademarks or
trademarks of Microsoft Corporation.
Content
Important information • v
UL 864 9th edition requirements • vii
About this manual • x
The EST3 library • xii
Related documentation • xiii
Chapter 1 System overview • 1.1
System description • 1.2
Audio subsystem description • 1.6
Digital network subsystem • 1.16
Foreign language support • 1.22
Signature series devices • 1.26
Network applications • 1.29
Audio applications • 1.33
Firefighter phone system • 1.42
Access control equipment • 3.2
Anti-passback • 3.11
Central monitoring station • 3.14
Common door access • 3.16
Delayed egress • 3.18
Elevator control • 3.21
Emergency exit door • 3.24
Handicap access door • 3.26
Maglock peripherals • 3.28
Multiple card readers • 3.30
Muster • 3.32
Power for continuous locks • 3.35
Power for intermittent locks • 3.37
Power from an AC source • 3.39
Power from a remote source • 3.42
Remote controls • 3.45
Two-person rule • 3.47
Installation overview • 5.3
UL 864 NAC signal synchronization • 5.6
Creating an initial startup version of the project database • 5.16
System installation sequence • 5.18
Preliminary field wiring testing • 5.19
Chassis installation in EIA 19-inch racks • 5.22
ATCK Attack Kit for cabinets • 5.23
Local rail module installation • 5.24
3-MODCOM Modem Communicator module • 5.26
3-SAC Security Access Control module • 5.40
3-AADC1 Addressable Analog Driver Controller and IRC-3 • 5.41
AC power and DC battery wiring • 5.42
Connecting auxiliary/booster power supplies • 5.44
Connecting the PT-1S impact printer • 5.46
Adjusting amplifier output levels • 5.49
Connecting a CDR-3 Zone Coder for coded tone output • 5.50
Connecting an external modem for use with the Remote
Diagnostics Utility • 5.53
Running the RPM and distributing profiles • 5.55
Chapter 6 Power-up and testing • 6.1
Cabinet power-up procedure • 6.3
Runtime and system errors • 6.4
Initial and reacceptance test procedures • 6.6
Control and emergency communications equipment testing • 6.7
Detector, input module, and output module testing • 6.18
Initiating device testing • 6.21
Notification appliance testing • 6.23
Record of completion • 6.24
Chapter 7 Preventive maintenance • 7.1
General • 7.2
Preventive maintenance schedule • 7.3
Signature device routine maintenance tips • 7.5
Signature detector cleaning procedure • 7.6
System trouble and maintenance log • 7.7
DSDC status • 8.65
Addressable analog diagnostic tools • 8.70
3-AADC1 Addressable Analog Driver Controller • 8.74
Addressable analog device troubleshooting • 8.75
Wiring problems • 8.77
Appendix A System addresses • A.1
Address format • A.2
LRM addresses • A.4
Control / display module addresses • A.9
Device addresses • A.10
Appendix B System calculations • B.1
Network data riser limits • B.2
Signature data circuit wire length • B.5
Notification appliance circuit calculations • B.11
25 or 70 Vrms NAC wire length • B.17
Addressable analog circuit wire length • B.19
Cabinet battery • B.20
SAC bus power • B.21
CPU memory • B.26
Fiber optic cable worksheet • B.28
Appendix C Listing requirements • C.1
NFPA standards • C.2
Minimum requirements for UL security applications • C.3
UL and ULC requirements • C.10
Y Glossary • Y.1
Z Index • Z.1
EST3 Installation and Service Manual iii
iv EST3 Installation and Service Manual
Important information
Limitation of liability
This product has been designed to meet the requirements of
NFPA Standard 72; Underwriters Laboratories, Inc., Standard
864; and Underwriters Laboratories of Canada, Inc., Standard
ULC S527. Installation in accordance with this manual,
applicable codes, and the instructions of the Authority Having
Jurisdiction is mandatory. GE Security shall not under any
circumstances be liable for any incidental or consequential
damages arising from loss of property or other damages or losses
owing to the failure of GE Security products beyond the cost of
repair or replacement of any defective products. GE Security
reserves the right to make product improvements and change
product specifications at any time.
While every precaution has been taken during the preparation of
this manual to ensure the accuracy of its contents, GE Security
assumes no responsibility for errors or omissions.
FCC warning
This equipment can generate and radiate radio frequency energy.
If this equipment is not installed in accordance with this manual,
it may cause interference to radio communications. This
equipment has been tested and found to comply within the limits
for Class A computing devices pursuant to Subpart B of Part 15
of the FCC Rules. These rules are designed to provide
reasonable protection against such interference when this
equipment is operated in a commercial environment. Operation
of this equipment is likely to cause interference, in which case
the user at his own expense, will be required to take whatever
measures may be required to correct the interference.
Industry Canada information
Note: The Industry Canada label identifies certified equipment.
This certification means that the equipment meets certain
telecommunications network protective, operational, and safety
requirements. Industry Canada does not guarantee the equipment
will operate to the user’s satisfaction.
Before installing this equipment, users should ensure that it is
permissible to be connected to the facilities of the local
telecommunications company. The equipment must also be
installed using an acceptable method of connection. The
customer should be aware that compliance with the above
conditions may not prevent degradation of service in some
situations.
EST3 Installation and Service Manual v
Repairs to certified equipment should be made by an authorized
Canadian maintenance facility designated by the supplier. Any
repairs or alterations made by the user to this equipment, or
equipment malfunctions, may give the telecommunications
company cause to request the user disconnect the equipment.
Users should ensure for their own protection that the electrical
ground connections of the power utility, telephone lines, and
internal metallic water pipe system, if present, are connected
together. This precaution may be particularly important in rural
areas.
Caution: Users should not attempt to make such connections
themselves, but should contact the appropriate electric inspection
authority, or electrician, as appropriate
Note: The Load Number (LN) assigned to each terminal device
denotes the percentage of the total load to be connected to a
telephone loop that is used by the device, to prevent overloading.
The termination on a loop may consist of any combination of
devices subject only to the requirements that the sum of the Load
Numbers of all the devices does not exceed 100.
vi EST3 Installation and Service Manual
UL 864 9th edition requirements
NOTICE TO USERS, INSTALLERS, AUTHORITIES HAVING JURISDICTION, AND OTHER
INVOLVED PARTIES
This product incorporates field-programmable software. In order for the product to comply with
the requirements in the Standard for Control Units and Accessories for Fire Alarm Systems, UL
864, certain programming features or options must be limited to specific values or not used at all
as indicated below.
Programmable feature or
option
Permitted
in UL 864?
(Y/N)
Possible settings Settings permitted in
UL 864
Enable Supervision
(telephone line is supervised
for ground faults, a single
Y No
Yes
Yes
open line, or a wire-to-wire
fault)
DACT Settings - Line 2
Installed (single line or dual
line dialer)
Trouble Resound (panel
resound)
AC Power Delay Y Disabled
Y No
Yes
Y Disabled (0)
1 second to ~99 hours
Yes
Disabled [2]
0 to 24 hours
1 to 3 hours
1 minute to 45 hours
Event message routing Y All Cabinets
No Cabinets
User defined routes (1
to 15)
Event message display
filtering: Alarm, Supervisory,
and Trouble options
Y Enabled
Disabled
All Cabinets
No Cabinets [3]
User defined routes (1 to
15) [4]
Enabled
Disabled [5]
Delays (programmed in rules) Y 0 to 240 seconds 0 to 240 seconds [6]
CMS event reporting priority
(programmed in rules)
CMS activate and restore
messages (programmed in
rules)
4-state alarm IDC N N/A In Signature module
EST3 Installation and Service Manual vii
Y 1 to 255 1 to 255 [7]
Y Send on activation
Send on restoration
Activation and
restoration triggers must
match the message type
configuation, personality
code 18 is prohibited
[11]
Programmable feature or
option
Permitted
in UL 864?
Possible settings Settings permitted in
(Y/N)
Alarm zone group members Y Alarm device type
Pull device type
Heat device type
Verified smoke device
type
Water flow device type
AND group members Y Alarm device type
Pull device type
Heat device type
Verified smoke device
type
Water flow device type
Alarm zone device type
Fire zone device type
Matrix group device
type
UL 864
Alarm device type [8]
Pull device type
Heat device type
Verified smoke device
type
Water flow device type
Alarm device type [8]
Pull device type
Heat device type
Verified smoke device
type [9]
Water flow device type
Alarm zone device type
Fire zone device type
Matrix group device type
AND group device activation
Y 1 to 255 1 to 255 [10]
count
Matrix groups: Members Y Alarm device type
Pull device type
Fire device type
Call point device type
Heat device type
Verified smoke device
type
Water flow device type
Matrix groups: Device
Y 3 to 10 3 to 10 [10]
activation count
Alarm device type [8]
Pull device type
Fire device type [8]
Call point device type
Heat device type
Verified smoke device
type [9]
Water flow device type
viii EST3 Installation and Service Manual
Programmable feature or
option
Permitted
in UL 864?
Possible settings Settings permitted in
UL 864
(Y/N)
Notes
[1] Allowed only when the supervising station supervises the telephone line and annunciates
fault conditions within 200 seconds
[2] Allowed only on control panels that transmit trouble event signals off premises
[3] Allowed only with monitor device types and switches
[4] Allowed only if user route includes the control panel
[5] Allowed only on nonrequired remote annunciators
[6] Allowed only when setting does not prevent the activation or transmission of alarm or
supervisory signals within 10 seconds or trouble signals within 200 seconds
[7] When priorities are used, alarm events must have a higher priority than supervisory and
trouble events.
[8] Allowed in alarm zone groups, AND groups, and matrix groups that are used to initiate the
release of extinguishing agents or water except when the addressable smoke detector's
alarm verification is used.
[9] Allowed only in alarm zone groups, AND groups, and matrix groups that are not used to
initiate the release of extinguishing agents or water
[10] A minimum device activation count of 2 is required if the AND group or matrix group is used
to initiate the release of extinguishing agents or water
[11] Personality code 18 is typically used when a short condition must be distinguished from an
alarm condition. This type of IDC is prohibited by UL 864.
EST3 Installation and Service Manual ix
About this manual
This manual provides information on how to properly install,
wire, and maintain the EST3 integrated system and related
components. This manual applies to the following EST3 models:
• EST3
• EST3R
• EST3-230
• EST3R-230
Organization
Chapter 1: System overview: a descriptive overview of the
components and subsystems that comprise an EST3 system.
Chapter 2: Security applications: covers security applications.
This chapter contains block diagrams that show the components
required to create specific security systems.
Chapter 3: Access control applications: covers access control
applications. Like Chapter 2, this chapter contains block
diagrams and descriptions of specific access control systems.
Chapter 4: Centralized audio applications: describes the
equipment and configuration required to create centralized audio
for a site.
Chapter 5: Installation: installation information for system
components and applications that supplement the instructions
provided on individual component installation sheets.
Chapter 6: Power-up and testing: information and procedures
necessary to perform initial system power-up and acceptance
testing.
Chapter 7: Preventive maintenance: lists the required scheduled
maintenance items and procedures.
Chapter 8: Service and troubleshooting: a comprehensive set of
procedures and tables to aid certified technical personnel in
servicing and troubleshooting the system.
Appendices A, B, and C provide supplementary information
about system addressing, calculations, and compatibility.
x EST3 Installation and Service Manual
Safety information
Important safety admonishments are used throughout this
manual to warn of possible hazards to persons or equipment.
Caution: Cautions are used to indicate the presence of a hazard
which will or may cause damage to the equipment if safety
instructions are not followed or if the hazard is not avoided.
WARNING: Warnings are used to indicate the presence of a
hazard which will or may cause personal injury or death, or loss
of service if safety instructions are not followed or if the hazard
is not avoided.
EST3 Installation and Service Manual xi
The EST3 library
EST3 documents
A library of documents and multi-media presentations supports
the EST3 life safety system. A brief description of each is
provided below.
EST3 Installation and Service Manual (P/N 270380): Gives
complete information on how to install and service the EST3
hardware. The manual also includes installation information on
selected Signature Series components.
SDU Online Help (P/N 180653): Provides full online support for
configuring and programming a system using the System
Definition Utility program.
EST3 System Operation Manual (P/N 270382): Provides detailed
information on how to operate the system and system
components.
EST3 Smoke Management Application Manual (P/N 270913):
Provides information for designing, programming, and testing an
EST3 smoke control system.
EST3 ULI ULC Compatibility Lists (P/N 3100427): Lists the
appliances, devices, and accessories that are compatible with
EST3.
Other documents
In addition to documents in the EST3 library, you may find the
following documents useful.
Signature Series Intelligent Smoke and Heat Detectors
Applications Bulletin (P/N 270145): Provides additional
applications information on the Signature series smoke and heat
detector applications.
Signature Series Component Installation Manual (P/N 270497):
Contains detailed mounting and wiring information for all
Signature series devices.
Speaker Application Guide (P/N 85000-0033): Provides
information on the placement and layout of speakers for fire
alarm signaling and emergency voice communications.
Strobe Applications Guide (P/N 85000-0049): Provides
information on the placement and layout of strobes for fire alarm
signaling.
xii EST3 Installation and Service Manual
Related documentation
National Fire Protection Association
1 Batterymarch Park
P.O. Box 9101
Quincy, MA 02269-9101
NFPA 70 National Electric Code
NFPA 72 National Fire Alarm Code
NFPA 11 Low-Expansion Foam Systems
NFPA 11A Medium- and High-Expansion Foam
Systems
NFPA 12 Carbon Dioxide Extinguishing Systems
NFPA 13 Sprinkler Systems
NFPA 15 Water Spray Fixed Systems for Fire
Protection
NFPA 16 Deluge Foam-Water Sprinkler and FoamWater Spray Systems
NFPA 17Dry Chemical Extinguishing Systems
Underwriters Laboratories, Inc.
333 Pfingsten Road
Northbrook, IL 60062-2096
UL 38 Manually Actuated Signaling Boxes
UL 217 Smoke Detectors, Single & Multiple Station
UL 228 Door Closers/Holders for Fire Protective
Signaling Systems
UL 268 Smoke Detectors for Fire Protective Signaling
Systems
UL 268A Smoke Detectors for Duct Applications
UL 346 Waterflow Indicators for Fire Protective
Signaling Systems
UL 464 Audible Signaling Appliances
UL 521 Heat Detectors for Fire Protective Signaling
Systems
UL 864 Standard for Control Units for Fire Protective
Signaling Systems
UL 1481 Power Supplies for Fire Protective Signaling
Systems
UL 1638 Visual Signaling Appliances
UL 1971 Visual Signaling Appliances
EST3 Installation and Service Manual xiii
Underwriters Laboratories of
Canada
7 Crouse Road
Scarborough, ON
Canada M1R 3A9
Canadian Electrical Code Part 1
ULC S527 Standard for Control Units for Fire Alarm
Systems
ULC S524 Standard for the Installation of Fire Alarm
Systems
ULC S536 Standard for the Inspection and Testing of
Fire Alarm Systems
ULC S537 Standard for the Verification of Fire Alarm
Systems
ULC ORD–C693–1994 Central Station Fire Protective
Signaling System and Services
CAN/ULC-S301 Standard for Central and Monitoring
Station Burglar Alarm Systems
CAN/ULC-S302 Standard for Installation and
Classification of Burglar Alarm Systems for Financial
and Commercial Premises, Safes, and Vaults
CAN/ULC-S303 Standard for Local Burglar Alarm Units
and Systems
CAN/ULC-S304 Standard for Central and Monitoring
Station Burglar Alarm Units
PLUS: Requirements of state and local building codes and the
local authority having jurisdiction.
xiv EST3 Installation and Service Manual
Chapter 1
System overview
Summary
This chapter provides a descriptive overview of the components
and subsystems that comprise a system.
Content
System description • 1.2
System features • 1.3
Minimum system requirements • 1.4
System construction • 1.4
Network data riser wiring • 1.16
Class B network data risers • 1.16
Class A network data risers • 1.17
Download connections • 1.18
Downloading database files over the network • 1.19
Foreign language support • 1.22
Printer use with foreign languages • 1.22
Bilingual language support • 1.22
Display device language support • 1.23
Signature series devices • 1.26
Network applications • 1.29
Limited number of portable telephone handsets • 1.43
EST3 Installation and Service Manual 1.1
System overview
System description
EST3 is designed using modular hardware and software
components to facilitate rapid configuration, installation, and
testing. Most network components are provided as local rail
modules (LRMs) that plug into the rail chassis assemblies. Rail
chassis assemblies are available to meet most any application.
Rail modules are used for data processing, intrapanel
communication of command/control data, response data, audio
signal processing, and power distribution. Each rail module
provides an interface to support a control/display module that
can be mounted on the front of the module. Most field wiring is
terminated using removable terminal strips for easy installation
and servicing of modules.
Cabinets are available in a variety of sizes. The smallest (3CAB5), in addition to the central processor module and primary
power supply module, supports two rail modules and three
control/display modules. The largest, the 3-CAB21 supports as
many as 18 rail modules and 19 control/display modules.
An EST3 cabinet can be configured as a stand-alone system or as
part of a network which supports up to 64 cabinets on a
peer-to-peer Class A or B token ring network. Below is a partial
list of local rail modules that can be incorporated into a system:
• Central Processor module (CPU). One is required for each
panel. Several models of CPU are available. See the current
compatibility lists for details.
• Primary Power Supply module (3 PPS/M, 3 BPS/M, or 3
BBC/M). One power supply module is required for each
panel.
• Main LCD Display module (LCD). One LCD is required to
provide a point of control for the entire network. Additional
displays can be added to any CPU module for additional
points of control or annunciation. Several LCD models are
available. See the current compatibility lists for details.
Additional control/display modules as required by the
application:
• 3-BPS/M Booster Power Supply module
• 3-MODCOM Modem Communicator module
• 3-SAC Security Access Control module
• 3-SSDC(1) Signature Driver Controller module
• 3-AADC(1) Analog Addressable Driver Controller module
• 3-IDC8/4 Initiating Device Circuit module
• 3-OPS Off-Premises Signaling module
• 3-ZAxx Zoned Amplifier modules
1.2 EST3 Installation and Service Manual
System overview
The audio and firefighter phone functions use a different
hardware format, providing operator controls and storage for the
microphone and telephone handset in a chassis configuration.
System features
Each cabinet in the system provides local control, display, power
supply, and communication functions. Each cabinet has the
following capacities:
• 10 addressable device circuits (Signature and addressable
analog combined)
• 120 traditional input / output zones
• 4 Class B (2 Class A) security / access control
communication (SAC) busses
• 10 modem / dialer cards, each with two telephone lines
• 2 RS-232 external peripheral device ports
• 456 LED annunciation points
• 342 input switches
In addition, the EST3 system has these global features:
• Firefighter telephone
• Custom programmability and user-friendly front panel
• Class B (Style B), initiating device circuits (IDC)
• Event reporting by alarm, trouble, supervisory, or monitor
mode and message display routing
• Dead front construction
• Supports networking — up to 64 nodes may be connected in
a regenerative Class A or Class B token ring
• Fast response time, less than three seconds from initial alarm
to device activation on a fully loaded system over the
network
• Flash memory on controller modules to facilitate quick
firmware upgrades
• Supports 255 security partitions
• Multiplexed eight-channel digital audio system
• Transient protected field wiring
EST3 Installation and Service Manual 1.3
• Class B (Style Y) or Class A notification appliance circuits
• Ground fault detection by panel, Signature data circuit, and
Signature modules
• Switch mode power supply
System overview
• Copper or fiber network and audio communications
• Application and firmware downloading over the network or
from a single point
• Network-wide control routing
• Form C alarm, supervisory, and trouble relay contacts
Refer to the release notes for the latest information regarding
specifications and capabilities.
Minimum system requirements
NFPA 72 system
classification
Required control equipment
Protected Premises
(Local)
Auxiliary
—or—
Remote Station
—or—
Proprietary Protected
Premises
Cabinet with a CPU (Central Processor
module), one LCD (Main LCD Display
module) one 3-PPS/M Primary Power
Supply and Monitor, appropriate
batteries, plus appropriate initiating
device circuits and notification appliance
circuits
Add a 3-OPS Off Premises Signal
module or a correctly configured and
programmed 3-MODCOM Modem
Communicator module to the protected
premises system
System construction
The EST3 system is assembled in layers as shown in Figure 1-1.
The cabinet (1) houses all the system components. A variety of
cabinets are available for as few as 5 and as many as 21 modules.
A 3-RCC14 cabinet is illustrated in Figure 1-1.
Mounted directly to the cabinets are the rail chassis assemblies
(2), of which there are three types: rail, audio, and audio with
telephone. The most common chassis is the rail chassis, which
provides mounting and electrical connections for the local rail
modules (LRMs) (4). Mounted on the rear of the chassis are the
cabinet power supplies (3).
1.4 EST3 Installation and Service Manual
The local rail modules (4) are the specialized cards that provide
an interface between the CPU and the field wiring. The front of
any rail module can support a control/display module (5),
providing customized operator controls and annunciators.
System overview
Completing the EST3 “CAB” series cabinet assembly are the
inner (6) and outer (7) doors. The “RCC” cabinets use a single
outer door.
Figure 1-1: Exploded CAB series cabinet equipment installation
EST3 Installation and Service Manual 1.5
System overview
U
Audio subsystem description
The audio subsystem consists of a variety of signal sources,
integral amplifiers, and sophisticated control software. The
3-ASU Audio Source Unit is available with the optional 3-FTCU
Firefighter Telephone Control Unit as the model 3-ASU/FT. The
ASU/FT is the only audio equipment required at the fire
command control center. Zoned audio amplifiers are distributed
throughout the system and provide the de-multiplexing,
switching, amplification and circuit supervision.
Network audio riser wiring
A digital network audio riser consisting of a single pair (Class B)
or two pairs (Class A) of wires connect all amplifiers together.
Since the digital signals are multiplexed, any of 8 independent
audio sources can be directed to any amplifier connected to the
network. All command and control signals for the audio system
are distributed over the network data riser.
CPUCPUCPUCPU
TB2TB2TB2TB2
AUDIOAUDIOAUDIOAUDIOAUDIOAUDIOAUDIOAUDIO
A INA INA INA INA OUTA OUTA OUTA OUTB OUTB OUTB OUTB OUT
AUDIOAUDIOAUDIOAUDIOAUDIOAUDIOAUDIOAUDIO
B INB INB INB IN
AUDIO DATA PRIMARY
From
on 3-AS
Figure 1-2: Class B network audio riser wiring
1.6 EST3 Installation and Service Manual
System overview
CPUCPU
TB2TB2TB2TB2
AUDIOAUDIOAUDIOAUDIOAUDIOAUDIOAUDIOAUDIO
A INA INA INA INA OUTA OUTA OUTA OUTB OUTB OUTB OUTB OUT
From
AUDIO DATA PRIMARY
connections on 3-ASU
AUDIOAUDIOAUDIOAUDIOAUDIOAUDIOAUDIOAUDIO
B INB INB INB IN
CPUCPU
Figure 1-3: Class A network audio riser wiring
Amplifiers
Amplifiers are designed to feed a single audio zone and provide
an integral 24 Vdc visual notification appliance circuit.
Amplifier modules are available in 20-, 40-, and 95-watt
versions, with each amplifier providing a single supervised Class
B or A audio output circuit. The amplifier is configurable for
either 25 Vrms or 70 Vrms output. An independent supervised
Class B or Class A, 24 Vdc, 3.5 Amp notification appliance
circuit (NAC) is also provided on the 20- and 40-watt amplifiers
to drive notification appliances. In addition, automatic backup
amplifiers can be added on a switched common backup
configuration.
EST3 Installation and Service Manual 1.7
Each audio power amplifier has an integral demultiplexer,
making the 8 audio channels available to the amplifier’s input, as
directed by the system programming. Each amplifier also
contains circuitry that handles routine signal processing
functions such as channel priority.
The amplifier’s output is a dedicated, supervised, 25-, 70-Vrms
speaker circuit, which covers one audio zone in the protected
facility. Figure 1-4 is an example of an enclosure with four zone
amplifiers and a backup amplifier. In response to an alarm,
selected audio amplifiers have been connected to the required
audio channels. Note that three different audio signals are being
broadcast simultaneously.
System overview
Network Data Riser
Network Audio Riser
Equipment Enclosure
Central
Processor
Module
Local Rail Bus
Backup
Amplifier
Zoned
Amplifier
Figure 1-4: Normal amplifier operation
Possible fault condition Amplifier operation
Amplifier loses communication
with Central Processor module
If the panel is configured for stand-alone operation, the amplifier
automatically switches to the EVAC channel and outputs its 1
kHz temporal tone when the panel detects an alarm.
If the panel is not configured for stand-alone operation, the
amplifier will not output any signal.
Panel loses communication
with network data riser
Panel loses communication
with network audio riser
Amplifier switches to the EVAC channel only in response to the
local panel’s programming uses the default EVAC message.
Amplifier switches to the EVAC channel in response to the
system programming. For EVAC the amplifier uses its 1 kHz
temporal tone. For Alert the amplifier uses its 1 kHz 20 bps tone.
Zoned
Amplifier
Zoned
Amplifier
Zoned
Amplifier
AlertEVACPagePage
1.8 EST3 Installation and Service Manual
Backup amplifiers
In the event of an amplifier failure (not a field wiring problem),
the backup amplifier automatically replaces the failed amplifier,
as shown in Figure 1-5.
System overview
Network Data Riser
Network Audio Riser
Equipment Enclosure
Central
Processor
Module
Local Rail Bus
Backup
Amplifier
Figure 1-5: Single amplifier failure
Note: The backup amplifier
will back up a failed
amplifier if it was being
used for Page, EVAC, or
The amplifier failure caused the backup amplifier to
automatically connect to the same audio source as the failed
amplifier. The output of the backup amplifier replaced the output
of the failed amplifier.
Alert. It will not back up an
amplifier being used on an
Auxiliary or General
channel.
Note: The backup amplifier will not replace an amplifier that has
detected a field wiring problem to prevent the amplifier from
driving into a shorted circuit.
3-ASU Audio Source Unit
The 3-ASU is the source of the network audio riser. Available
audio sources are local and remote voice PAGE functions and
the firefighter telephone PAGE function. An integral tone
generator database is provided for the EVAC, ALERT and other
functions. Alternately, the 3-ASU’s integral digital voice
message playback unit can simultaneously provide up to 8
different prerecorded audio messages that may be assigned to
any channel.
Zoned
Amplifier
Zoned
Amplifier
Zoned
Amplifier
Zoned
Amplifier
AlertEVACPagePage
EST3 Installation and Service Manual 1.9
The multiplexer within the 3-ASU converts and compresses the
real-time audio signal and converts it to a digital format. The
output of the digital message playback unit and the integral tone
generator database is already in the digital format. The 8 signal
sources in digital format are then combined together as selected
by the system designer using a multiplexer. This makes up the
network audio riser signal.
The amplifiers at the remote-panels extract the audio signals
from the network riser, amplify it and send it to the speakers.
Local tone
generator
Channel
selection and
supervision
Audio signal priority
Power
amp
25/70 VRMS
supervised audio
circuit
EOLR
During system configuration, each of the eight available audio
channels is assigned one of the five available attributes listed in
Table 1-1. The Page, and Auxiliary attributes may only be
assigned to a single channel. The General attribute may be
assigned to up to four channels.
Table 1-1: Network audio channel parameters
1.10 EST3 Installation and Service Manual
Channel attribute Priority
PAGE 1
EVAC 2
ALERT 3
AUXILIARY 4
System overview
Table 1-1: Network audio channel parameters
Channel attribute Priority
GENERAL 5
Each channel attribute has a priority level associated with it.
When more than one channel is commanded to source a given
amplifier, the amplifier will connect to the source having the
highest priority. The Page channel will only go active when the
microphone push-to-talk switch is pressed.
Special audio source unit page modes
The front panel of the ASU offers four special page mode
switches:
• All Call
• EVAC
• Alert
• All Call Minus
These switches provide instantaneous switching of the page
signal to the most frequently contacted areas of the building. The
special page modes do not require any source switching by the
zoned audio amplifiers. When a special page mode switch is
activated, the signal content of the eight outgoing audio channels
is modified. Figure 1-8 illustrates this principle.
In the normal page mode, the eight audio signal sources are each
connected to a separate audio channel, as represented by a at
the intersection of the signal source and the audio channel,
shown at the lower left of Figure 1-8. Each audio channel is
represented as a vertical line in this figure. The eight audio
channels are actually multiplexed together and distributed over a
common pair of wires called the network audio riser. The figure
shows the system in the normal page mode, with the zoned audio
amplifiers processing EVAC signals on the 1st and 3rd levels, a
page signal on the 2nd level, and the alert signal on the 4th level.
ALL CALL modePage to EVAC modePage to ALERT modeALL CALL MINUS mode
Figure 1-8: Audio Source Unit Special Page Mode Signal Flow
1.12 EST3 Installation and Service Manual
System overview
The All Call mode is used to send a page to the entire facility.
When the All Call switch is activated, the Audio Source Unit is
put into the all call mode. In this mode, the zoned audio
amplifiers do not all transfer to the page channel. Rather, the
Audio Source Unit redirects the page signal source to all the
audio channels. Figure 1-8 shows the all call page source to
audio channel connections in the lower left corner. Note that all
channels receive the same signal. Any amplifier on the system,
regardless of the audio channel selected, will receive the page.
Any amplifiers that were previously idle will power up and
receive the page.
The Page to EVAC mode is used to send a page to the areas
automatically receiving the evacuation signal. Activating the
EVAC switch causes the Audio Source Unit to enter the page to
EVAC mode. In this mode, the zoned audio amplifiers connected
to the EVAC channel do not transfer to the page channel. Rather,
the Audio Source Unit redirects the page signal source to the
EVAC channel. Figure 1-8 shows the page to EVAC mode page
source to EVAC channel connections. The page and EVAC
audio channels both receive the page signal. Any amplifier
connected to either the page or EVAC audio channels will
receive the page. The alert, auxiliary and general channels are
connected to their respective signal sources, as in the normal
mode.
The Page to Alert mode is used to send a page to the areas
automatically receiving the alert signal. Activating the Alert
switch causes the Audio Source Unit to enter the page to alert
mode. In this mode, the zoned audio amplifiers connected to the
alert channel do not transfer to the page channel. Rather, the
Audio Source Unit redirects the page signal source to the alert
channel. Figure 1-8 shows the page to alert mode page source to
alert channel connections. The page and alert audio channels
both receive the page signal. Any amplifier connected to either
the page or alert audio channels will receive the page. Any
amplifiers that were previously idle will power up and receive
the page. The EVAC, auxiliary and general channels are
connected to their respective signal sources, as in the normal
mode.
The All Call Minus mode is used to send a page to all areas NOT
automatically receiving the EVAC or alert signals. In high rise
applications, all call minus is an effective way to quickly select
stairwells. Activating the All Call Minus switch causes the
Audio Source Unit to enter the all call minus mode. In this mode,
the zoned audio amplifiers connected to the auxiliary and general
channels do not transfer to the page channel. Rather, the Audio
Source Unit redirects the page signal source to the auxiliary and
four general channels. Figure 1-8 shows the all call minus mode
page source to auxiliary and general channel connections. The
EST3 Installation and Service Manual 1.13
System overview
page, auxiliary and four general audio channels all receive the
page signal. Any amplifier connected to the page, auxiliary or
general audio channels will receive the page. The EVAC and
alert channels are connected to their respective signal sources, as
in the normal mode.
Automatic messaging
One of the features of the 3-ASU Audio Source Unit is the
method used to monitor the integrity of the digital audio system.
When an audio messaging system is configured, default audio
messages are recorded for the Evacuation and Alert channels.
The text of default messages should be generic in nature, and
should not include location-specific instructions. When the
system is in the normal condition, the 3-ASU continuously
transmits default messages over the network audio riser. The
zone amplifiers use the default messages to verify their
operational integrity, as well as the integrity of the riser wiring.
When an alarm is detected, the evacuation and alert message
channels are selected by the amplifiers in the appropriate areas in
the facility, as directed by the system rules. If a specific
evacuation message has been programmed to play in response to
the alarm, it is sent out over the evacuation channel. Location
specific evacuation messages contain information and
instructions that should only be used for a specific alarm
location. Should a second alarm from another location be
received, the evacuation message playing as a result of the first
alarm may not be appropriate for the second alarm.
Note: In the event of conflicting messaging instructions caused
by multiple alarm events, the system will play the default
evacuation message, whenever two or more different messages
are requested at the same time on the evacuation channel.
Automatic message processing is illustrated in Figure 1-9. By
reverting back to the generic default evacuation message in
multiple alarm location scenarios, no one can be misdirected by
the wrong message. Default messages also play during alarms
when no location specific message has been requested.
1.14 EST3 Installation and Service Manual
System overview
83
82
80th floor, west wing evacuation message:
A fire has been reported on the west wing
of the 80th floor.
Location specific messages
30th floor, north wing evacuation message:
A fire has been reported on the north wing
of the 30th floor.
Figure 1-9: Automatic Message Processing
81
80
79
78
77
33
32
31
30
29
28
27
Generic (default) message:
An emergency has been reported in the
building. Remain where you are and await
further instructions.
Generic (default) evacuation message
The generic (default) evacuation
message plays when multiple locationspecific messages have been requested
by the system, or when no locationspecific message has been specified.
Firefighter phone
The 3-FTCU contains a master telephone handset that provides
an analog telephone riser for totally independent 2-way
communications between the fire command station and
Firefighter telephone stations / jack telephones installed at
strategic locations throughout the protected facility.
Taking a telephone off-hook or plugging into a telephone jack
generates a visual and audible incoming call signal at the fire
command station. The individual originating the call hears a tone
until the handset is connected to the system. The fire command
station operator manually connects the incoming phone call to
the phone riser to complete the call. Up to five remote telephones
may be connected to the riser simultaneously. The fire command
center operator can also use the telephone circuit as a page
source, permitting paging via the telephone system.
EST3 Installation and Service Manual 1.15
System overview
Digital network subsystem
Network data riser wiring
The network data riser provides the communication path
between each CPU module (3-CPUx or 3-ANNCPUx) installed
in the system. Each CPU module has two bi-directional RS-485
ports (Network A and Network B) that are used to connect the
network data riser wiring. Network B is isolated from ground
and Network A is not.
The correct method for running the network data riser is to
connect the isolated Network B port on one CPU module to the
non-isolated Network A port on another. Any remote CPU
modules connected to a local CPU module’s Network B port is
considered to be downstream from the local CPU module. Any
remote CPU modules connected to a local CPU module’s
Network A port is considered upstream from the local CPU
module.
Additionally, next and previous refer to the order in which
remote CPU modules are electrically connected to a local CPU
module. Previous refers to the remote CPU module whose
isolated Network B port connects to the local CPU module’s
non-isolated Network A port. Next refers to the remote CPU
module whose non-isolated Network A port connects to the local
CPU module’s isolated Network B port.
Note: Since the data traveling the network data riser is
bi-directional, out and in references are used to direct wire
connections.
Class B network data risers
In a Class B network, a break or short in the network data riser
wiring divides the network into separate independent networks.
Panels on the same side of the line fault will communicate with
each other but not with panels across the line fault. Figure 1-10
shows the wiring for a Class B network.
1.16 EST3 Installation and Service Manual
System overview
B1_CAB1B1_CAB2B1_CAB3B1_CAB4
J5
CPUCPUCPUCPU
TB2
NETWORK
OUT
AB
AUDIO
A IN
IN
BA
J5
TB2
NETWORK
OUT
AB
J5
TB2
AUDIO
A IN
IN
BA
NETWORK
OUT
IN
BA
AB
Downstream
Figure 1-10: Class B network data riser wiring using copper wire
As a matter of convention, a Class B network data riser
Note:
should start at the CPU module that does not have wires
connected to its Network A port.
When wiring a Class B network, give careful consideration as to
the location of the service panel. The service panel provides a
single point from which you can download files to all other
panels on the network. For this function to work properly you
must use the panel at the start of the network data riser as the
service panel. See “Downloading data files” for more
information.
AUDIO
A IN
J5
TB2
NETWORK
OUT
Upstream
AUDIO
A IN
IN
BA
AB
Class A network data risers
In a Class A network, a single break or short in the network data
riser wiring does not interrupt communications between panels.
Figure 1-11 shows the wiring for a Class A network.
EST3 Installation and Service Manual 1.17
System overview
B1_CAB1B1_CAB2B1_CAB3B1_CAB4
J5
CPUCPUCPUCPU
TB2
NETWORK
OUT
AUDIO
A IN
IN
BA AB
J5
TB2
NETWORK
OUT
AUDIO
A IN
IN
BA AB
J5
TB2
NETWORK
OUT
AUDIO
A IN
IN
BA AB
Figure 1-11: Typical Class A network data riser wiring using copper wire
Download connections
Each programmable rail module has a modular phone jack to use
for downloading data directly from the SDU computer. The
modular phone jack on any CPU module can also be used to
download data to other programmable rail modules in the same
panel over the rail bus, or to other panels over the network data
riser.
J5
TB2
NETWORK
OUT
AUDIO
A IN
IN
BA AB
In addition to the modular phone jack, the CPU module has two
serial communication ports that can be used to download data,
provided both of these conditions are met:
• A 3-RS232 option card is installed
• The serial port used to download data is not configured for
gateway or coder applications
Tip: To download data over the network without having to
reconfigure the system, temporarily install a 3-RS232 option
card on any CPU module in the system and connect the SDU
computer to serial port 1.
1.18 EST3 Installation and Service Manual
System overview
A
Connect here to download data to all three programmable
rail modules over the rail bus (network mode) or to this
programmable rail module only (single-step mode)
S
H
SIGA1
SIGA2 SIGA2 SI GA2
B-B+A-A+SHB-B
J1
NETWORK
INOUTB OUT
+B+AA-
NC
N
-
CNONCO
CNNONC
A
SUPCALARMTROUBLE
TB1
R
C
AUDIOAUDIO
A IN A OUT
B IN
B
-+
+--
--
C
AUDIO++AUDIO
R
T
T
RRTXT
O
X
X
S
XOM
S
M
111
2122
2
Optional serial ports may be used to
download over the network (3-
RS232 required)
+
SIGA1 SIGA 1
S
A-PB+B-A
SB+B
WM
KR
1
2
P
S
WRKM
SB+B
H
-
-PB+B-A+
-
WM
KR
SIGA1 SIGA 1
SIGA1
1
OUTPUT MODULE
+
2
SIGA2 SIGA2 SI GA 2
P
S
B-B+A-A+SHB-B
WRKM
OUTPUT MODULE
+
Connect here t o download data to
this programmable rail module only
(singl e-step mode)
J9
J8
J11
J10
Figure 1-12: Potential connection points for downloading data
Downloading database files over the network
A CPU module’s Network A port and its modular phone jack
share an interrupt with the module’s microprocessor. As such,
the microprocessor disables the Network A port whenever you
connect the SDU computer to the modular phone jack.
Consequently, download options differ for Class A and Class B
networks.
EST3 Installation and Service Manual 1.19
System overview
Download connection
from SDU computer
B1_CAB1B1_CAB2B1_CAB3B1_CAB4
J5
CPUCPUCPUCPU
TB2
NETWORK
OUT
AB
AUDIO
IN
A IN
BA
J5
TB2
NETWORK
OUT
AB
J5
AUDIO
IN
A IN
BA
TB2
NETWORK
OUT
AB
AUDIO
IN
A IN
BA
J5
TB2
NETWORK
OUT
AB
AUDIO
IN
A IN
BA
Figure 1-13: Impact of disabling Network A terminal connection on Class B networks during a
download
Figure 1-13 shows how connecting the SDU computer to the
modular phone jack affects downloading data over a Class B
network. Connecting the SDU computer to the modular phone
jack on the CPU module installed in panel B1_CAB3, disables
that CPU module’s Network A port. Downloading data to panels
B1_CAB2 and B1_CAB1 from panel B1_CAB3 is no longer
possible but downloading to B1_CAB4 still is.
Since the microprocessor disables only the Network A port, the
CPU module that doesn’t have a Network A port connection
should be used as the service panel. It is the only panel that is
capable of downloading to every panel on the network using the
modular phone jack.
Note: Connecting the SDU computer to an optional serial
communications port does not affect the Network A port. If a
3-RS232 option card is connected to the CPU, you can download
data to any panel on a Class B network regardless of where the
panel physically connects to the network data riser.
1.20 EST3 Installation and Service Manual
System overview
Download connection
from SDU computer
B1_CAB1B1_CAB2B1_CAB3B1_ CAB4
J5
CPUCPUCPUCPU
TB2
NETWORK
OUT
AB
AUDIO
IN
A IN
BA
J5
TB2
NETWORK
OUT
AB
J5
AUDIO
IN
A IN
BA
TB2
NETWORK
OUT
AB
AUDIO
IN
A IN
BA
J5
TB2
NETWORK
OUT
AB
AUDIO
IN
A IN
BA
Figure 1-14: Impact of disabling Network A terminal connection on Class A networks during a
download
On Class A networks however, see Figure 1-14, disabling the
Network A port on panel B1_CAB3 does not prevent the other
panels from receiving data through B1_CAB3’s Network B port.
Connecting the SDU computer to the modular phone jack does
cause the panel to report a Network Class A Failure trouble.
When the network data riser is configured for Class B,
connecting to the panel modular phone jack causes the local
CPU module to report a communications fault with every panel
upstream of the local CPU module.
Tip: To download data to every panel across the Class B network
data riser, connect to the first connection on the network data
riser as the download panel — the panel with no connections on
its Network A terminals.)
EST3 Installation and Service Manual 1.21
System overview
Foreign language support
Printer use with foreign languages
When supporting a single-byte character set language, your
printer must be able to support the appropriate DOS code page.
To support a double-byte character set language, your printer
must be able to support the appropriate Windows code page. The
required code pages are listed below.
Remember that not all Windows characters are available on DOS
printers, so some characters are not supported on these printers.
Language Code page
Chinese simplified Windows Page Code 936 (GB)
Chinese traditional Windows Code Page 950
(Big 5)
Korean Windows Code Page 949
(Extended Wansung)
Hebrew DOS Code Page 862
Turkish DOS Code Page 857
Dutch, French, Italian,
Portuguese, Spanish, English
Polish, Slovak DOS Code Page 852
Russian DOS Code Page 866
DOS Code Page 850
Bilingual language support
EST3 display modules (all LCD models and the KPDISP)
feature bilingual operation. For two languages to be supported
simultaneously, they must appear on the same code page. Refer
to the table below to determine the system bilingual capabilities.
Bilingual operation is not supported for Chinese and Korean.
Bilingual operation between Polish and Slovak is
supported (code page 1250). Bilingual operation between Polish
and Russian is not supported, as no code page has both.
Display device language support
LCD language support
Marketplace
US
European
Asian
Canadian
Language
Chinese, traditional (Taiwan) X
Chinese, simplified (PRC) X
Dutch X
English (UK) X
English (US) X X X[1] X X
French Canadian X X
Mideast
Hebrew X X X
Italian X X X
Korean, Extended Wansung X
Polish X
Portuguese (Brazil) X X
Russian X X X
Slovak X
Spanish (South America) X X
Turkish X X
[1] For testing and support purposes only
EST3 Installation and Service Manual 1.23
System overview
3-FTCU language support
Marketplace
US
European
Asian
Canadian
Language
Chinese, traditional (Taiwan) [1]
Chinese, simplified (PRC) [1]
Dutch X
English (UK) X
English (US) X X X X X
French Canadian X X
Hebrew X [1] [1]
Italian X X X
Mideast
Korean, Extended Wansung [1]
Portuguese (Brazil) X X
Spanish (South America) X X
Turkish [1] [1]
Russian [1] [1] [1]
Polish [1]
Slovak [1]
[1] Only Western European character set is supported
1.24 EST3 Installation and Service Manual
System overview
KPDISP language support
Marketplace
US
European
Asian
Canadian
Language
Chinese, traditional (Taiwan)
Chinese, simplified (PRC)
Dutch X
English (UK) X
English (US) X X X X
French Canadian X X
Hebrew X X X
Italian X X X
Mideast
Korean, Extended Wansung
Polish X
Portuguese (Brazil) X X
Russian X X X
Slovak X
Spanish (South America) X X
Turkish X X X
EST3 Installation and Service Manual 1.25
System overview
Signature series devices
The Signature series family consists of intelligent smoke and
heat detectors, bases, input/output modules, and ancillary
devices. The EST3 network supports Signature series devices
using several models of the Signature Driver Controller module.
Up to 125 detectors and 125 modules can be connected to the
Signature Data Circuit on these modules.
The Signature series smoke and heat detectors contain their own
microprocessors. This allows the devices to make alarm
decisions based on the information gathered by the sensing
elements incorporated in the device. Signature series detectors
can be installed in any of four detector bases:
• The Standard Base provides wiring terminals for connection
to a remote LED.
• The Relay Base provides a detector activated, pilot-duty dry
contact relay used to control external appliances.
• The Sounder Base incorporates a sounder horn that can be
controlled by the detector, by a special Signature module, by
the control panel, or by programmed rules
• The Isolator Base protects the Signature Data Circuit from
wiring shorts.
Signature modules interface and support the operation of
initiating devices, conventional 2-wire smoke and heat detectors,
manual pull-stations, strobes, bells, etc. The actual functions of
each Signature module is determined by a personality code
downloaded to the module through the System Definition Utility
(SDU) program.
Signature series manual pull-stations (1-stage and 2-stage)
feature an integral Signature module that monitors the station.
One-stage stations are monitored by a single input module that
sends an alarm signal to the loop controller when the station is
activated. Two-stage stations are monitored by a dual input
module which sends two independent alarm events to the control
panel; one when the pull-switch is activated, and the second
when the key switch is activated.
Alarm sensitivity setting
Alarm sensitivity refers to the primary threshold (expressed in
percent smoke obscuration) at which the smoke detector will go
into alarm. The alarm sensitivity setting for smoke detectors can
be set to one of five sensitivity levels. When smoke detectors
having both ionization and photoelectric elements are used, the
sensitivity setting applies to both elements. Reduced sensitivity
settings are used to reduce the occurrence of nuisance alarms.
1.26 EST3 Installation and Service Manual
System overview
The alarm sensitivity setting may be individually set for each
detector using the SDU program.
Alternate alarm sensitivity setting
Alternate alarm sensitivity refers to the secondary threshold
(expressed in percent smoke obscuration) at which the smoke
detector goes into alarm. The alternate alarm sensitivity setting
for smoke detectors can be set to one of the same five sensitivity
levels as the primary alarm. When smoke detectors having both
ionization and photoelectric elements are used, the sensitivity
setting applies to both elements. This feature permits increasing
or reducing an individual detector’s sensitivity at various times
of the day, dependent upon, environmental conditions,
occupancy, manufacturing processes, etc. Increased sensitivity is
typically used when a facility is unoccupied. Reduced sensitivity
is typically used to reduce the occurrence of nuisance alarms
when occupancy or environmental conditions may create
prealarm conditions. An alternate alarm sensitivity setting for
each detector can be set using the SDU program.
Alarm verification
Upon receipt of the initial alarm signal from a verified detector,
the EST3 panel issues a detector reset command. After a
programmable reset/retard period, if the detector continues to
generate an alarm during the fixed confirmation period, the
alarm is considered valid and processed by the EST3 control
panel. Alarm verification reduces the occurrence of nuisance
alarms, as it provides a time frame in which the cause of the
alarm can be investigated to determine whether an actual alarm
condition exists. The alarm verification period can be increased
or decreased through the SDU program, as limited by the listing
agencies.
Alternate alarm verification
The alternate alarm verification feature operates the same way
the alarm verification feature operates using a second, alternate,
programmed reset/retard period.
Prealarm setting
Signature smoke detectors can be configured to enter a prealarm
state, which generates a monitor event message. Detectors
configured for prealarm have a prealarm pseudo point for which
rules can be written.
EST3 Installation and Service Manual 1.27
During configuration, you specify a percentage of the alarm
sensitivity setting that will generate a prealarm event.
System overview
Alternate prealarm setting
The alternate prealarm setting is similar to the prealarm setting,
but it represents a percentage of the alternate alarm sensitivity
that will generate a prealarm event.
1.28 EST3 Installation and Service Manual
System overview
Network applications
This section deals with the initial layout of the network cabinets
as well as application configurations for the basic network
modules.
Network layout
The first task for the system designer is locating the equipment
cabinets throughout the project. The objective when locating
cabinets is to maximize the per cabinet coverage of the facility
while minimizing hardware cost. The following general
information should be used as a guide to designing the system.
The per cabinet coverage is, in some part, based upon the type of
project being designed. In a high rise building installation that
requires an audio emergency voice communication system, the
problem becomes how many floors can be served by a single
cabinet. In a campus style installation, there may be one or more
cabinets per building, depending on building size.
Cabinet coverage
The following factors govern how much area a single cabinet can
cover:
Cabinet capacity: Depending on the installed equipment, the
largest backbox available can have 21 module spaces and 3
chassis spaces. Is this enough cabinet capacity to house the
equipment required to cover the proposed area?
Available current per cabinet: Does the proposed number of
large current components (audio amplifiers and 24 Vdc
notification appliance circuits), in addition to the required
module currents, exceed the available 28 amps per cabinet or
60-Ah battery capacity?
Notification Appliance Circuit voltage drop: Does the distance
from the cabinet to the last strobe, horn, speaker, etc. exceed the
acceptable limits?
User interface requirements: Depending on the installed
equipment, the largest backbox available can have 19 module
displays installed. Will this provide enough capacity for the
required control/display module functions?
Distance between cabinets: Does the wiring length between
any three cabinets exceed 5,000 ft. (1,524 m)?
EST3 Installation and Service Manual 1.29
System capacity of 64 cabinets per network: Does the
proposed system require more than 64 cabinets?
Cost of installation labor and materials: Is it cheaper to install
a smaller cabinet and service the floor above and below the floor
System overview
of installation, or install a larger cabinet with more equipment,
and wire two floors above and two floors below the cabinet
floor?
Feature/function domain
The EST3 life safety system utilizes peer-to-peer networking
technology. No single cabinet is in control of the network.
Peer-to-peer networking permits multiple control locations
within a single network. The feature/function domain is defined
as the group of cabinets that are affected when the feature or
function is activated. A network cabinet may be a part of one or
more groups. Multiple control locations are permitted for any
group.
Three types of domains are available.
Local: The feature/function affects only the cabinet on which the
LCD module is installed.
Group: The feature/function affects a predefined group of
cabinets on the network.
Global: The feature/function affects all the cabinets on the
network.
Group #3
Group #1Group #2
16
Figure 1-15: Sample domain consisting of three groups
234
5
Using the System Definition Utility (SDU), you can configure
the system so that information from any cabinet can be
selectively sent to any combination of other cabinets on the
network.
Each cabinet may selectively transmit the following information
to other cabinets on the network:
• Reset commands
• Alarm Silence commands
• Trouble Silence commands
• Drill commands
• Acknowledge commands
1.30 EST3 Installation and Service Manual
System overview
A cabinet can also be configured to receive state changes
(Alarm, Supervisory, Trouble, Monitor, firefighter telephone
incoming calls), logicals, events, audio controls, and so forth,
from a select group of cabinets.
Feature/function domains are associated with the cabinet
providing the operator controls. In Figure 1-15, the
feature/function domain for Cabinet 1, which has the operator
controls for the first subnet, is groups 1 and 3. The
feature/function domain for Cabinet 6, which has the operator
controls for the second subnet is groups 2 and 3.
Two subnetworks, with operator controls at cabinets 1 and 6.
Cabinets 3 and 4 are common to both subnetworks.
Commands
Sending
cabinet
Cabinet 1
Cabinet
state
1, 2, 3, 4
Reset
1, 2, 3, 41, 2, 3, 41, 2, 3, 41, 2, 3, 4
Alarm
silence
Trouble
silence
AcknowledgeDrill
1, 2, 3, 4, 5, 6
Cabinet 2
Group 1Group 2 Group 3
Cabinet 3
Cabinet 4
Cabinet 5
Cabinet 6
Legend
1 through 6 = Cabinets that receive commands from the sending cabinet
N/A = Not applicable
Figure 1-16: Routed network commands for the domain illustrated in Figure 1-15
In Figure 1-16, the Cabinet 1 entry under the Cabinet State
column indicates that Cabinet 1 should receive from cabinets 1,
2, 3, and 4 all information about changes of state. Because
Cabinet 1 is the location of the operator controls it should send
information about reset, alarm silence, trouble silence, drill, and
acknowledgments to all the cabinets in the domain, which are
cabinets 1, 2, 3, and 4. In this example, the drill command is
common to both systems. Note, that the drill command is also
sent to cabinets 5 and 6 by Cabinet 1.
The Cabinet 2 entry under the Cabinet State column indicates
that Cabinet 2 receives its change of state information from
cabinets 1, 2, 3, and 4. Because there are no operator controls
located at cabinet 2, there is no need to send reset, alarm silence,
trouble silence, drill, and acknowledgment information to other
cabinets. As an alternative, the table could show these
commands sent to other cabinets, because they can never be
issued due to the lack of an LCD module in the cabinet.
EST3 Installation and Service Manual 1.31
System overview
Cabinets 3 and 4 receive their change of state information from
all cabinets on the network, as indicated in the cabinet state
column. This is necessary as cabinets 3 and 4 are part of both
domains. Again, there is no need to send reset, alarm silence,
trouble silence, drill, and acknowledgment information to other
cabinets from cabinets 3 and 4.
The Cabinet 5 entry under the Cabinet State column indicates
that Cabinet 5 receives its change of state information from
cabinets 3, 4, 5, and 6.
Cabinet 6 information indicates that Cabinet 6 should receive
from cabinets 3, 4, 5, and 6 all information about changes of
state. Because cabinet 6 is the location of the operator controls it
should send information about reset, alarm silence, trouble
silence, drill, and acknowledgments to cabinets 3, 4, 5, and 6,
(all the cabinets in the domain.) In this example, the drill
command is common to both systems. Note, that the drill
command is also sent to cabinets 1 and 2 by Cabinet 6.
1.32 EST3 Installation and Service Manual
System overview
Audio applications
Amplifier selection
The EST3 system provides amplifiers with 20-, 40-, and 95-watt
output ratings to meet any project requirement. Selection of the
proper amplifiers requires an understanding of the amplifier
characteristics and application related information that follows.
Audio zoning
The output of each amplifier usually covers a single audio zone,
typically a floor of a high rise building. Using the appropriate
Signature modules, the amplifier’s output can be divided into
several zones. The output circuit can be configured for either
Class A or Class B wiring.
Output wattage
The output rating of an amplifier is determined by the speaker
load it is required to drive, and any expansion or safety factor
required. The speaker load is determined by adding up the value
of all the wattage taps selected on each speaker connected to the
amplifier. For a conservative approach, use the highest wattage
tap available on each speaker. This insures there is enough head
room to adjust speaker taps to compensate for any installation
variables such as sound absorbing furniture, etc.
Output voltage
Zoned amplifiers are available with either a 25 Vrms or 70 Vrms
output. The 25 Vrms output amplifiers are primarily used in
retrofit applications that previously had 25 Vrms speakers
installed. 70 Vrms output amplifiers are recommended for new
installations. The output circuits of a 70 Vrms amplifier can be
run eight-times farther than a 25 Vrms amplifier, given the same
load.
Note: If all the system wiring is required to be power limited,
you may use any 20-, 40-, or 95-watt amplifier with either a 25
Vrms or 70 Vrms output.
Wiring considerations
Refer to Appendix B of this manual for wire distance
calculations and other wiring considerations.
EST3 Installation and Service Manual 1.33
System overview
Backup amplifiers
Each cabinet can contain 1 zoned amplifier module to use to
back up the remaining primary zoned amplifier modules installed
in the same cabinet with the following restrictions:
• All the amplifiers must have the same output voltage rating.
• If the cabinet contains older amplifier modules (15- and
30-watt) and newer amplifier modules (20- and 40-watt), the
amplifier used to back up the primary amplifier modules
must be of the older type.
Note: In cases where older and newer zoned amplifiers exist in
the same cabinet, the older modules should be replaced with
newer modules for optimum results.
• The backup amplifier must have an output wattage rating
equal to or greater than the largest primary amplifier it is
backing up. If not, the output capacity of the speaker circuit
is diminished proportionately.
• The wire used to wire the backup amplifier to the other
amplifiers must be the same size or greater than that used to
wire the speaker circuit.
Cabinet space
The 20- and 40-watt amplifiers each require one space on the rail
assembly. The 95-watt amplifier requires two rail spaces.
The number of zoned amplifier modules that can be installed in a
single cabinet is limited by the number of available rail spaces,
the number of power supplies installed in the cabinet, and battery
limits, if any.
Audio channels
The EST3 audio system provides eight (8) simultaneous
channels for distribution of audio signals. The functions of four
of these channels are fixed by the system. These four channels
are referred to by their functions: Page, EVAC, Alert, and
Auxiliary Input channels. The four remaining channels are
referred to as general channels 1 to 4.
Under manual or automatic network control, each amplifier’s
input can be connected to either the Alert channel, the
Evacuation (EVAC) channel, the Page channel, the Auxiliary
Input channel, or one of four (4) general input channels. Should
conflicting commands be issued to a single amplifier, the
amplifier responds to the channel with the highest priority. The
eight channels are prioritized as follows, with the Page channel
having the highest priority
1.34 EST3 Installation and Service Manual
System overview
Page channel
Paging is a manual function. An operator is required to select a
destination for the page, and then make an announcement. The
Page channel is never automatically selected by the EST3
system.
The page channel always carries a live page signal, regardless of
its source. There are three sources which can supply the paging
signal: 1) the local 3-ASU microphone, 2) the remote
microphone, and the 3) the firefighter telephone system. These
sources are automatically prioritized as shown in Table 1-2.
Table 1-2: Page priorities
Priority Page signal source
1 (highest) Local microphone
2 Firefighter phone
3 (lowest) Remote microphone
The page command is a non-latching function. When the page
command ends, amplifiers automatically switch back to the
source channel that was active (if any) prior to the page
command.
Five types of page commands are available on the network. The
first four page commands are available simply by pressing a
single switch on the front of the 3-ASU. These are the paging
functions most commonly used in an emergency situation.
1. The All Call command temporarily transfers all amplifiers to
the Page channel while the page is active. All Call distributes
the page signal to every amplifier in the system.
2. The Page to EVAC command temporarily transfers the Page
signal to all amplifiers actively connected to the EVAC
channel. All “EVAC” amplifiers then receive and distribute
the Page signal.
3. The Page to Alert command temporarily transfers the Page
signal to all amplifiers actively connected to the Alert
channel. All Alert amplifiers then receive and distribute the
page signal.
4. The All Call Minus command temporarily transfers the page
signal to all amplifiers except those connected to the EVAC
and Alert channels.
EST3 Installation and Service Manual 1.35
5. A Selective Page temporarily transfers the selected
amplifiers to the Page channel while the page is activate,
distributing the page signal only to selected audio zones
System overview
(amplifiers). Audio zones are selected manually by the
operator using the LED/Switch displays.
An example of how the page commands work is illustrated in
Figure 1-17. This figure shows a nine story high rise building,
with a fire on the 6th floor. The fire plan requires the evacuation
signal to be sounded on the fire floor, floor above the fire, and
floor below the fire. The alert signal is required to sounded in all
other areas of the building except the stairwells. The first column
(Fire Alarm) shows the automatic responses on the affected
floors according to the fire plan.
Floor
Stairwells
9th floor
8th floor
7th floor
6th floor
5th floor
4th floor
3rd floor
2nd floor
1st floor
Legend
Fire floor
Floor above or floor below fire
Fire
Alarm
Alert
Alert
Evac
Evac
Evac
Alert
Alert
Alert
Alert
Page to
Evac
Alert
Alert
Page
Page
Page
Alert
Alert
Alert
Alert
ASU page commands
Page to
Alert
Page
Page
Evac
Evac
Evac
Page
Page
Page
Page
All Call
Minus
Page
Alert
Alert
Evac
Evac
Evac
Alert
Alert
Alert
Alert
Figure 1-17: ASU Page Command Example
All CallZoned
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Paging
Alert
Alert
Evac
Page
Evac
Alert
Alert
Alert
Alert
1.36 EST3 Installation and Service Manual
The Page to EVAC command replaces the EVAC signal with the
Page signal, as shown in the figure’s second column.
The third column shows the Page to Alert command response, all
the Alert signals have been replaced by the Page signal.
The All Call Minus command directs the Page to the areas which
are not receiving the EVAC or Alert signals, i.e. the stairwells.
In the fourth column of Figure 1-17, the stairwells receive the
Page signal when the All Call Minus command is used and do
not automatically receive either the EVAC or Alert signals.
System overview
The All Call command directs the page signal to all areas of the
building, as illustrated in the last column of Figure 1-17.
Any combination of floors and stairwells could be selected to
receive the page by manually selecting the audio zones on the
audio zone select control/display module. Notice that at no time
does any area receiving a signal have its signal interrupted by
any page command function.
Evacuation (EVAC) channel
The EVAC channel always carries a signal designed to notify the
occupants they must leave the facility. The evacuation signal
may take the form of a textual message, a variety of audio tones,
or an audio tone modulated by the standard 3-3-3 evacuation
pattern, or any combination of these signals.
The EVAC channel is preprogrammed, and activated by the
system in response to an alarm. The EVAC signal is
automatically sent to the areas that are in danger and require
immediate evacuation.
The EVAC channel has priority over all channels signals except
for the Page channel. The alarm silence function automatically
silences the EVAC channel when an operator presses the Alarm
Silence switch.
Alert channel
The Alert channel always carries a signal designed to notify the
occupants that an emergency situation exists in the facility.
Occupants hearing the alert signal are not in immediate danger,
but should prepare to evacuate. In some installations, the alert
signal advises occupants that persons evacuating the danger area
will be entering the area for safety.
The Alert channel is preprogrammed, and activated by the
system in response to an alarm. The Alert signal is automatically
sent to areas that are not in immediate danger and do not require
immediate evacuation.
The Alert channel has priority over all other channels except the
Page and EVAC channels. The alarm silence function
automatically silences the Alert channel when an operator
presses the Alarm Silence switch.
General channel
The General channel is used to distribute special purpose signals
to special areas in the facility. Typically these areas include
elevator cabs, stairwells, and areas in less peril than those areas
receiving the Alert signal.
EST3 Installation and Service Manual 1.37
The general channel signals can be preprogrammed in response
to an alarm, or they may be manually activated.
System overview
General channels have a lower priority than the Alert channel.
The alarm silence function does not automatically silence the
Alert channel unless programmed to do so.
Manual audio zone selection
If manual audio zone selection is required on the system, the
appropriate control/display modules must be mounted on
modules in the same cabinet as the Audio Source Unit. Typical
configurations of control/display modules is shown in Figure
1-18. Exact operation of each display is dependent on system
programming. Typical operation is described below.
r
Pa g e
12t h Fl
Page
11t h Fl
Page
10th Fl
Page
9th Fl
Page
8th Fl
Page
7th Fl
Page
6th Fl
Page
5th Fl
Page
4th Fl
Page
3rd Fl
Page
2nd Fl
Page
1st Fl
Page
12th Fl
Page
11t h Fl
Page
10th Fl
Page
9th Fl
Page
8th Fl
Page
7th Fl
Page
6th Fl
Page
5th Fl
Page
4th Fl
Page
3rd Fl
Page
2nd Fl
Page
1st Fl
Alert
Evac
Page
Alert
Evac
Page
Alert
Evac
Page
Alert
Evac
Page
Alert
Evac
Page
Alert
Evac
Page
o
o
l
F
h
t
6
r
o
o
l
F
h
t
5
r
o
o
l
F
h
t
4
r
o
o
l
F
d
r
3
r
o
o
l
F
d
n
2
r
o
o
l
F
t
s
1
Alert
Status
Page
Alert
Status
Page
Alert
Status
Page
Alert
Status
Page
Alert
Status
Page
Alert
Status
Page
ABCD
Figure 1-18: Audio zone selection displays
r
o
o
l
F
h
t
6
r
o
o
l
F
h
t
5
r
o
o
l
F
h
t
4
r
o
o
l
F
d
r
3
r
o
o
l
F
d
n
2
r
o
o
l
F
t
s
1
1.38 EST3 Installation and Service Manual
Display A is a model 3-12SG. Each floor switch provides audio
zone selection for the Page signal, and the integral green LED
indicates the audio zone is selected.
Display B is a model 3-12GY. Each floor switch provides Page
audio zone selection. The green LED to the upper left of the
switch indicates the audio zone is selected. The yellow LED to
the lower left of the switch indicates audio circuit trouble.
System overview
Displays C and D are model 3-6/3Sxxx. The display C
configuration permits manual selection of the Alert, EVAC, and
Page signals by floor. This configuration is well suited for
systems which do not sound signals through the entire facility
during an alarm. Responsible authorities can then manually add
EVAC and Alert signals to other floors of the facility. Display
configuration D is used in facilities which sound the Alert signal
in all areas not receiving the EVAC signal. This eliminates the
need to switch the Alert signal. The middle switch is not used,
the middle LED indicates amplifier status.
Messages
General
While there is no standardization on message content, messages
must tell the occupant what is happening, why it is happening,
and what actions they should take.
As a rule, each message should be repeated three times. If there
is more than one language spoken in the area, the messages
should be provided in each language.
A male voice has been demonstrated to be more authoritative
than a female voice, and should be used where urgency is
required. A female voice has been shown to initially gain the
public’s attention quicker than a male voice.
Alarm message format
The basic alarm message format consists of an alarm tone
followed by an evacuation message repeated three times. The
suggested alarm tone can take the form of a 1000 Hz tone
modulated by the standard 3-3-3 evacuation pattern, a slow
whoop, an electronic bell, a constant tone, or a constant tone
modulated at a 120 pulse per minute rate. Please refer to the
Authority Having Jurisdiction for specific requirements.
Typical Alarm Message text:
Female Voice: “May I have your attention please. May I
have your attention Please.” Male Voice: “There has been a
fire reported in the building.” “Proceed to the nearest
stairwell and exit the building.” “Do not use the elevators.”
“Repeat, do not use the elevators.”
EST3 Installation and Service Manual 1.39
System overview
The EST3 amplifiers operate in a stand-alone mode should
Note:
they lose communication with the Audio Source Unit. The alarm
tone used in the alarm message should be the same tone used by
the amplifier for stand alone alarm signaling.
Alert message format
The basic alert message consists of an alert tone followed by an
advisory message. The suggested alert tone should be easily
differentiated from the alarm tone and can take the form of a
constant tone, or a constant tone modulated at a 20 pulse per
minute rate. Please refer to the Authority Having Jurisdiction for
specific requirements.
Typical Alert message text:
Female Voice: “May I have your attention please. May I
have your attention Please.” Male Voice: “There has been an
emergency reported in the building.” “Your area is in no
immediate danger.” “People from other areas of the building
may be entering your area.” “Be prepared to leave the
building if you hear the evacuation signal.” “Repeat, you are
in no immediate danger.”
Informative messages
Informative messages are those special purpose signals to areas
of the facility which may have special concerns during an
emergency situation. Typically these areas include elevator cabs,
stairwells, and areas in less peril than those areas receiving the
Alert signal. Some sample informative messages appear below.
Elevator message text:
Female Voice: “May I have your attention please. May I
have your attention Please.” Male Voice: “There has been an
emergency reported in the building.” “The building manager
has directed the elevators to the lobby.” “Please exit the
building when you reach the lobby.”
Stairwell message text:
Female Voice: “Please continue down the stairs to your
assigned re-entry floor or the lobby.” “Do not attempt to use
the elevators.”
Do Not Enter message text:
Male Voice: Do not enter this area.” “This is not an exit.”
“An emergency has been reported in this section of the
building.” “Please exit the building using a marked fire exit.”
1.40 EST3 Installation and Service Manual
System overview
Message and tone storage
The prerecorded messages and tone sequences are stored in a
digital format in the 3-ASU Audio Source Unit internal memory.
When the message and tone library exceeds two minutes in total
length, a 3-ASUMX/32 Expansion Memory card must be
installed in the 3-ASU. The 3-ASUXM/32 provides additional
storage space for up to 32 minutes of messages.
Messages and tone sequences are created and downloaded
directly into the Audio Source Unit using the SDU and a
computer equipped with a compatible sound card.
EST3 Installation and Service Manual 1.41
System overview
Firefighter phone system
Five phone off-hook limit
The circuitry on the 3-FTCU Firefighter Telephone Control Unit
can support up to five telephones off-hook in addition to the
master handset at the 3-FTCU at any one time. The flexibility of
the EST3 system permits any number of phones to be wired on a
single phone circuit, as long as they are not all used
simultaneously. There are a number of different designs which
can be used to insure that no more than five phones are active at
any one time.
One phone per circuit
The advantages of installing a single firefighter phone station or
jack on a SIGA-CC1 Signature module (personality code 6) are
numerous. The system provides complete control and
annunciation phone/circuit. Installing a single phone on a circuit
permits the operator to immediately identify the exact location of
the calling party. Because the 3-FTCU will only permit five
circuits to be connected simultaneously, the maximum number
of off-hook handsets can never be exceeded. Should a branch
telephone circuit be damaged during a fire, the fault will not
affect other phone circuits. When there is only one phone per
circuit, troubleshooting of faults is simplified.
The largest disadvantage of installing one phone per branch
telephone circuit is cost. Each phone location requires a separate
SIGA-CC1 module.
1.42 EST3 Installation and Service Manual
System overview
Typical branch
telephone circuit
UL/ULC Listed
Ω
47 k EOLR
DATA OUT (+)
DATA OUT (-)
To next SIGA-CC1 or
UL/ULC Listed EOLR
To next device
From 3-FTCU
From Signature
controller module or
previous device
RISER IN (+)
RISER IN (-)
DATA IN (+)
DATA IN (-)
Class B
TB3
- +
10
9
SIGA-CC1 with
personality code 6
6
48372
5
1
TB1TB2
RISER OUT (+)
RISER OUT (-)
Figure 1-19: SIGA-CC1 with one phone installed
Five phones per circuit
Installing up to five phones per branch circuit is a realistic
compromise between installing a single phone per circuit and
more than five phones per circuit. In the rare instance that all
five phones are off-hook and a need to communicate with a sixth
remote phone arises, the 3-FTCU operator can temporarily
disconnect the entire branch circuit. Then the second branch
circuit can be connected to complete the conversation.
The advantages of installing up to five telephone stations or
jacks on a SIGA-CC1 Signature module (personality code 6) are:
a reasonable balance between cost and performance; and the
system maintains the high quality voice circuit at all times
because the maximum number of off-hook handsets can never be
exceeded.
The main disadvantage of installing up to five phones per branch
telephone circuit is that a circuit failure can render the entire
branch circuit useless. Additionally, the location of the incoming
caller is not precisely known, and troubleshooting is more
difficult.
Limited number of portable telephone handsets
EST3 Installation and Service Manual 1.43
Another method of limiting the number of off-hook phones to
five limits the number of available portable phones available to
the fire department to five. The biggest advantage of this method
System overview
is low cost, as multiple remote telephone jacks can be installed
on a single branch circuit.
The main disadvantage of this method are: that five phones may
not be adequate to properly cover the facility; a circuit failure
can render many of the phone jacks useless; the location of the
incoming caller is not precisely known; and troubleshooting is
more difficult.
1.44 EST3 Installation and Service Manual
Chapter 2
Security applications
Summary
EST3 has powerful and flexible security capabilities. This
chapter introduces you to the equipment required for security
systems.
This chapter also illustrates and describes several security
applications. Each application is presented as a separate topic
that includes a block diagram and description. These give you an
overview of the application, and show the components required
and their interconnection.
Refer to the EST3 Installation Sheets for specific component
settings and terminal connections.
The equipment required for a general security system is shown in
Figure 2-1. We’ll discuss each item shown in the drawing, plus
the other factors called out on the drawing.
Control panel
Signat ure data circuit
Signat ure Controller
Module
3-SAC
Security Access Control
Module
3-MODCOM
Modem Communication
Module
Distributor
Signat ure fire
alarm
devices
KPDISP
Keypad Display
Telephone lines
KDC program
Motion Detector
SAC bus
Central
monitoring
station
SDU
RPM
Resour ce
profile
Figure 2-1: Equipment required for a basic security system
MD
SEC2
Security Loop
Module
Conventional
security devices
Other factors
X
Power supply
X
Hardware configuration
SDU programming
X
ACDB/KDC operation
X
2.2 EST3 Installation and Service Manual
Equipment
The equipment used in security applications includes:
• Control panel
• Signature Controller module
• SIGA-MD Motion Detector module
• SIGA-SEC2 Security Loop module
• 3-SAC Security Access module
• SAC bus
Security applications
• KPDISP Keypad Display
• 3-MODCOM Modem Communication module
• RPM Resource Profile Manager tool
• KDC Keypad Display Configuration program
Control panel
It is a UL listing requirement that all cabinets in a system that
includes security functions must have a tamper switch. The
control panel must include a 3-TAMP, 3-TAMP5, or
3-TAMPRCC Cabinet Tamper Switch.
Signature Controller module
The Signature data circuit plays a dual role in integrated systems.
First, it supports devices and modules belonging to the fire alarm
system. Second, it supports security devices that are part of the
security system.
Figure 2-1 shows a Signature Controller module with a Class B
Signature data circuit. Shown on this circuit are Signature fire
alarm devices, plus two security devices, the SIGA-MD and the
SIGA-SEC2.
Several Signature Controller models are available, and can be
used with integrated systems.
Note: Security devices can also be installed on the SAC bus via
CRCs, or on an analog device loop.
SIGA-MD Motion Detector module
The SIGA-MD is a passive infrared motion detector that
connects to the Signature loop. The detector has alarm and
tamper output monitoring capability. A contact closure causes an
alarm but does not latch at the module.
The SIGA-MD provides six separate curtain coverage patterns
with a 34-foot range. The detector can be mounted in flat corners
or on walls up to a height of ten feet.
SIGA-SEC2 Security Loop module
The SIGA-SEC2 Security Loop Module is an intelligent analog
addressable device that connects one or two security loops to a
Signature data circuit. In Figure 2-1 this is indicated by the
conventional security devices connected to the SIGA-SEC2.
The operation of the SIGA-SEC2 is determined by its device
type and personality code. These are assigned during system
design and configuration.
EST3 Installation and Service Manual 2.3
Security applications
3-SAC Security Access Control module
The 3-SAC Security Access Control rail module controls a highspeed RS-485 circuit called the Security Access Control (SAC)
bus. The SAC bus supports fire, security, and access control
devices.
The 3-SAC handles message traffic for these devices, interfacing
them with the CPU as required. Events are passed from the
devices to the 3-SAC module, then to the CPU for alarm
processing.
The 3-SAC has two sets of circuit terminals, and is capable of
Class A or Class B configuration. Each Class B circuit can
include 31 devices, for a total of 62 devices per module. Class A
circuits can include 30 devices total. In the figure, we show a
Class B bus with a KPDISP Keypad Display control and display
module.
SAC bus
Since our security and access control devices require 24 Vdc, we
suggest that you always use a four-wire cable (two twisted-pairs)
for the SAC bus and a 24 Vdc power supply.
Tip: To improve system
performance in systems
with a high number of
partitions or cardholders,
limit the volume of network
messages. To do this,
create partition routing
groups so that only
essential messages are
sent to each KPDISP. In
practice, limit the average
number of partitions in a
partition routing group to 10
or less.
For the data wires we suggest unshielded, twisted pair, with
greater than 6 twists per foot, in 14 to 22 AWG (1.50 to 0.25 sq
mm).
For the power wires, we recommend 14 or 16 AWG.
KPDISP Keypad Display
The KPDISP Keypad Display is a control and display module for
security and fire alarm systems. The KPDISP has an LCD
display and a telephone-style keypad. It operates on the 24 Vdc
power supplied with the SAC bus.
The KPDISP is completely menu-driven. It lets the system user:
• Arm and disarm partitions
• Review off-normal points
• Bypass or disable points
• Execute fire alarm panel commands
Each KPDISP stores its portion of the security database.
You can create a security system that is operated via the LCD
module alone, or in combination with any Control/LED display
module. See the topic “Secure access.”
2.4 EST3 Installation and Service Manual
Security applications
3-MODCOM Modem Communicator module
The 3-MODCOM Modem Communicator module has both
modem and dialer functions. It can transmit and receive
information.
The 3-MODCOM can transmit alarm, supervisory, or trouble
messages to a remote central monitoring station using one or two
telephone lines. A variation of the module (3-MODCOMP) can
transmit pager messages to a paging company using the TAP
protocol. The 3-MODCOMP remote paging feature is
supplemental and is not supervised.
The module can also receive information sent over telephone
lines by the Keypad Display Configuration program.
RPM Resource Profile Manager tool
The Resource Profile Manager (RPM) tool is part of the SDU. It
uses the project database to let you create a separate resource
profile for each company that will be using the security system.
The resource profile defines the security system for the KDC
program. It includes such information as:
• The KPDISPs in the system
• The routing required to access each KPDISP for downloads
• Which KPDISPs can execute fire alarm system commands
The resource profile is imported into the KDC program during
installation.
KDC Keypad Display Configuration program
The Keypad Display Configuration (KDC) program lets the
system user define and maintain a database of information about
KPDISPs, users, and access levels. This is part of the overall
security database.
The KDC program runs on the user’s PC. Additions or updates
to the security database can be transmitted to the KPDISP units
in two ways.
The first method is via modem and dial-up telephone line to
the3-MODCOM. The information is then routed to the CPU,
through the correct 3-SACs, and finally to the affected KPDISP
units.
The second method is by connecting the user’s PC directly to the
CPU using an RS-232 cable. The connection is made between
the PC’s COM1 port and any of the RS-232 terminals on the
CPU. As in the first method, after reaching the CPU additions
and changes are routed through the correct 3-SACs to the
affected KPDISPs.
EST3 Installation and Service Manual 2.5
Security applications
Fire and security functionality cannot be programmed into
Note:
a control panel from a remote location. You must perform all
panel programming on site. Changes to the security database
have no impact on the parameters or operations of listed fire
system equipment.
When the site includes an access control system, the Access
Control Database (ACDB) program is used in place of the KDC.
The ACDB includes the required KDC functionality.
Other factors
Next, we’ll cover the additional factors listed on the drawing:
• Power supply
• Hardware configuration
• SDU programming
• ACDB/KDC operation
These factors are called out on each application diagram given in
this chapter.
Power supply
The KPDISP is designed to operate on 24 Vdc. For this reason,
we recommend that you include power from the panel with the
SAC bus cable. You can use the panel 3-PPS/M, 3-BPS/M, or
3-BBC/M power supplies.
Note that additional power supplies must be listed for the
application.
Hardware configuration
The KPDISP does not have any switch or jumper settings. All
configuration is done with the SDU program.
SDU programming
While the KDC program controls a small portion of the security
database, all other definition, configuration, and programming
for the security system happens in the SDU.
The SIGA-MD and SIGA-SEC2 are both treated as modules on
the Signature data circuit. You configure each security module
using the SDU.
The SDU controls the general configuration of the 3-SAC
modules, plus the configuration of all CRC or KPDISP devices
on the SAC busses.
2.6 EST3 Installation and Service Manual
KPDISP modules can be configured to execute a specific,
predefined command list when a specific security or access
Security applications
control event occurs. You write the command lists in the SDU,
and assign them to KPDISP events when you configure the
KPDISP module.
Partitions are fundamental groups used with security systems. A
partition is a group of devices intended to provide security for a
given area of the site. Partitions can be armed and disarmed
separately.
All partitions are created and defined in the SDU, and each CRC,
CRC input circuit, KPDISP, SIGA-SEC2 circuit, and SIGA-MD
circuit can be assigned to a partition. Partitions also play a role in
KPDISP message routing.
For the 3-MODCOM module, the SDU determines the dialer and
modem parameters, defines the receivers and accounts, and
assigns each account to the correct receiver.
Finally, the SDU includes the RPM tool, described earlier in this
topic.
ACDB/KDC operation
The Keypad Display Configuration (KDC) program runs on the
end-user’s PC. It lets him create and maintain a database of
information about KPDISPs, users, and access levels. This is part
of the overall security database.
During setup of the program, the user imports the resource
profile created by the RPM during system programming.
Once installed, the user can create and revise his KDC database.
Changes and additions are transmitted via modem to the
3-MODCOM or via direct RS-232 connection to the CPU. The
data is then routed to the correct 3-SAC and KPDISP units.
Security applications
The remaining topics in this chapter cover specific security
applications. Each topic gives you an overview of the
application, and shows you the components required and their
interconnection.
Each topic has a block diagram and general description of the
application. Other factors (as called out on the drawings) are
discussed under separate headings in each topic.
EST3 Installation and Service Manual 2.7
Security applications
Certificate installations
Description of the applications
An installation company can be listed to install burglar alarm
systems that are covered by UL under its Follow-Up Service.
The listed company issues a certificate of the appropriate class,
grade, and type.
This topic does not detail the steps required for certificate
installations. You must follow UL 681 to determine the exact
requirements for a given installation. Here, we simply list special
EST3 equipment that can be used in the following applications:
• Central Station Alarm Certificate
• Police Station Connect Certificate
• Local Mercantile Alarm Certificate
Refer to Appendix C, “Listing requirements” for additional
information.
Special equipment
Certificate installations require the use of specialized attack and
tamper equipment. Here are brief descriptions of the special
parts. The diagrams for each application show which parts are
required.
ATCK Attack Kit: a replacement cover kit for the 3-RCC7
cabinet. The kit provides a two-minute attack delay time. It
includes a red, overlapping box cover for the cabinet. The cover
attaches to the backbox sides using sheet metal screws and four
locks. The kit also includes special knockout plugs that secure
the unused knockout holes.
3-TAMPRCC Cabinet Tamper Switch: a switch that detects
removal of the cover.
Central station alarm certificate
Figure 2-2 shows the equipment that can be used as part of a
Central Station Alarm Certificate installation. Note that this is
the same equipment used for a Police Station Connect Certificate
installation.
2.8 EST3 Installation and Service Manual
Security applications
Listed
bell
Tamper loop
Bell circuit
Wires must be in a
metal conduit with no
boxes or other
Control panel
junctions
3-IDC8/4
3-SAC
3-MODCOM
3-TAMPRCC Cabinet
Tamper Switch
ATCK Attack Kit
Central
monitoring
station
Figure 2-2: Components used with a central station certificate
application
KPDISP
SAC bus
Telephone lines: one
line with 24-hour test or
two lines with line cut
monitors
Other factors
Power supply
Hardware configuration
SDU programming
X
ACDB/KDC operation
For this certificate, the control panel cabinet must be fitted with
an ATCK Attack Kit and a 3-TAMPRCC Cabinet Tamper
Switch. In addition, a listed local bell is required.
EST3 Installation and Service Manual 2.9
The bell must be positioned where it can be heard from every
arming station in the system. You can use multiple bells if
required.
The bell requires a tamper detection loop. Both the bell circuit
and the tamper detection loop can be supported by a 3-IDC8/4
module.
A single phone line that is tested at least once in every 24-hour
period can be used. Alternately, two lines with line cut
monitoring can be used in place of a line with 24-hour testing.
If the central monitoring station (CMS) does not have testing
services, the SDU can program the system to issue tests on a
fixed or relative basis to meet this requirement.
Security applications
The CMS must have a maximum response time of 30 minutes.
When this application includes partitions, the partition that
contains the EST3 panel equipped with the 3-MODCOM and
local bell must be armed 24 hours a day, and have limited, highlevel access.
Police station connect certificate
The equipment, installation requirements, and application
restrictions for a Police Station Connect Certificate installation
are the same as for a Central Station Alarm Certificate
installation, as described above.
Central station alarm certificate
Figure 2-3 shows the equipment that can be used as part of a
Central Station Alarm Certificate installation.
Control Panel
3-SAC
3-MODCOM
3-TAMPRCC Cabinet
Tamper Switch
ATCK Attack Kit
Central
monitoring
station
Figure 2-3: Central station certificate
KPDISP
SAC bus
Telephone lines: one
line with 24-hour test or
two lines with line cut
monitors
Other factors
Power supply
Hardware configuration
SDU programming
X
ACDB/KDC operation
This certificate requires that the control panel be fitted with an
ATCK Attack Kit and a 3-TAMPRCC Cabinet Tamper Switch.
No local bell is required.
2.10 EST3 Installation and Service Manual
A single phone line that is tested at least once in every 24-hour
period can be used. Alternately, two lines with line cut
monitoring can be used in place of a line with 24-hour testing.
Security applications
When this application includes partitions, the partition that
contains the EST3 panel equipped with the 3-MODCOM must
be armed 24 hours a day, and have limited, high-level access.
In mercantile burglar alarm systems, you can locate an alarm
sounding device outside the protected area, provided the
sounding device is located inside the building, is rated for
outside service, and you transmit alarm conditions to one of the
following:
• The dispatch location of the law enforcement agency having
jurisdiction over the protected property
• A central station or residential monitoring station complying
with the Standard for Central Station Alarm Services, UL
827
You can also locate an alarm sounding device within the area of
greatest protection, or outside the area of greatest protection
within an area protected by an alarm system that shares a
common control unit with the alarm system installed in the area
of greatest protection, provided the sounding device is rated for
inside service and you transmit alarm conditions to one of the
following:
• The dispatch location of the law enforcement agency having
jurisdiction over the protected property
• A central station or residential monitoring station complying
with the Standard for Central Station Alarm Services, UL
827
In either case above, mount alarm sounding devices located
inside building at least 10 feet (3.05 m) above the floor or at the
surface of the ceiling. When there is fixed construction within
the area that could provide access for an intruder, mount the
alarm sounding device at least 4 feet (1.2 m) away from the
edges of the fixed construction along the surface of the ceiling or
at least 10 feet (3.05 m) above it so as to minimize access by an
intruder.
Local mercantile alarm certificate
Figure 2-4 shows the equipment that can be used as part of a
Local Mercantile Alarm Certificate installation. The control
panel cabinet must be fitted with an ATCK Attack Kit and a
3-TAMPRCC Cabinet Tamper Switch. A listed local bell is also
required.
The bell requires a tamper detection loop. Both the bell circuit
and the tamper detection loop can be supported by a 3-IDC8/4
module.
EST3 Installation and Service Manual 2.11
Security applications
Listed bell
and bell
housing
Control Panel
Tamper loop
Bell circuit
Wires must be in a
metal conduit with no
boxes or other
junctions
3-IDC8/4
3-SAC
3-TAMPRCC Cabinet
Tam p e r S w it c h
ATCK Attack Kit
Figure 2-4: Local certificate
SAC bus
KPDISP
Other factors
Power supply
Hardware configuration
SDU programming
ACDB/KDC operation
The bell must be positioned where it can be heard from every
arming station in the system. You can use multiple bells if
required.
In mercantile alarm systems that do not provide a remote alarm
transmission connection, you must mount the alarm housing on
the outside of the building in a location that is accessible, is not
more than four stories above street level, and is visible from the
public street or highway.
You may locate the alarm housing as high as the seventh floor,
provided you do one of the following:
2.12 EST3 Installation and Service Manual
• Mount a second alarm sounding device and housing intended
for outside service adjacent to the premises or area of the
building in which the alarm system is installed
• Mount a second alarm sounding device and housing intended
for inside service within the premises
Security applications
Multiple 3-MODCOM modules
You can install more than one 3-MODCOM Modem
Communicator module in a system. Two or more 3-MODCOM
modules can be installed in the same cabinet. Two or more
cabinets can contain 3-MODCOM modules.
There are several reasons for using multiple 3-MODCOMs:
• Redundant communication to a CMS
• Backup of critical communication links
• Dedicated security transmission hardware
In a redundant communication system both 3-MODCOMs are
programmed to transmit the same message to different receivers
at the CMS or at different CMS installations.
One 3-MODCOM can be programmed to back up another. This
guarantees CMS communication (or TAP paging) should one
panel in the system become disabled.
In a multiple tenant application, there may be a high volume of
ACDB/KDC program traffic. You can design such systems with
a second 3-MODCOM, dedicating the first module to
ACDB/KDC traffic, and the second module to CMS
transmissions. This prevents contention for communication
channels.
Overall limits for the number of 3-MODCOM modules are:
• 10 modules per node
• 10 modules total per network
EST3 Installation and Service Manual 2.13
Security applications
Multiple site security and access
Description of the application
Figure 2-5 shows how a company with multiple sites can
centralize security and access control functions for all sites. This
means an employee only needs to carry a single access card to
gain appropriate access to any company site.
The figure shows a company with three plants, designated sites
A, B, and C. Site C is chosen as the company headquarters for
security and access control purposes.
Each site is a separate SDU project. At each site, the Resource
Profile Manager (RPM) tool is used to create a profile for that
site. This includes site C, the headquarters plant.
All the profiles are sent to the security office at site C for import
into the Keypad Display Configuration (KDC) or Access Control
Database (ACDB) program. This means that the programs will
present all resources at all sites in a single hierarchy, as shown
by the tree diagram.
The security personnel at site C can create global access groups.
This means that they can assign an employee the correct security
and access privileges for all sites from one central location. The
employee can carry a single access card that will grant him the
correct security and access privileges at each site.
2.14 EST3 Installation and Service Manual
Security applications
A
SDU
RPM
Site A
profile
SITE A
EST3
system
Telephone lines
SITE C (HQ)
EST3
system
ACDB
KDC
Site C
profile
SITE B
EST3
system
SDU
RPM
Site B
profile
T
D1
D2
D3
B
D1
D2
D3
C
D1
D2
D3
Other factors
Power supply
Hardware configuration
X
SDU programming
X
ACDB/KDC operation
X
RPM
SDU
Total resource
profile tree
Figure 2-5: Multiple site security and access control system
Hardware configuration
Each site must have an EST3 system. In each EST3 system, at
least one panel must include a 3-MODCOM module to support
modem communication between headquarters and sites A and B.
The KDC and ACDB programs can communicate with the EST3
system either by modem, or by direct connection to an RS-232
port on the CPU module.
EST3 Installation and Service Manual 2.15
Security applications
Each system includes 3-SAC modules as required to support the
security and access control systems implemented.
Rules covering installation and classification (of extent) of alarm
equipment at individual locations are published in the Standard
for Installation and Classification of Burglar and Holdup Alarm
Systems UL681.
SDU programming
No special project programming is required to enable multiple
site security and access control systems. When running the RPM
tool, each site receives 100% of the resources for that site.
Note that all profiles must be sent to the site C headquarters
when the project is finished.
ACDB/KDC operation
At the headquarters site, all three profiles are imported into the
ACDB/KDC program. The result is a global tree of resources
that includes each KPDISP and CRC device in each site.
Importing all the profiles into one ACDB/KDC program creates
the global database.
When additions or changes to the KPDISP database are made,
headquarters can transmit the changes to the affected sites.
2.16 EST3 Installation and Service Manual
Security applications
Multiple tenant security
Description of the application
Figure 2-6 illustrates a simple strip mall security application. The
mall consists of three identical stores and an electrical room.
The control panel supports a SIGA data circuit and a SAC bus.
The panel also supports modem communications via telephone
lines.
The SIGA circuit has pull stations and smoke detectors. In
addition, the SIGA circuit has two security devices, the motion
detector and the SIGA-SEC2 security loop module. The SIGASEC2 connects a conventional door contact to the SIGA circuit.
The SAC bus is used exclusively for the KPDISP devices.
Each company owner has a Keypad Display Configuration
(KDC) program. The program runs on a computer equipped with
a modem, and uses the modem and a dial-up telephone line to
communicate with the control panel.
Each company owner can use the KDC to download changes to
that company’s portion of the security database. The changes are
routed through the panel to the appropriate KPDISP unit.
Note: Fire and security functionality cannot be programmed into
a control panel from a remote location. You must perform all
panel programming on site. Changes to the security database
have no impact on the parameters or operations of listed fire
system equipment.
The control panel can be configured to provide telephone
connection to a central monitoring station (CMS). Each tenant
company can have a separate account at the same CMS, or can
use the services of a separate CMS.
Refer to Appendix C, “Listing requirements” for additional
information.
EST3 Installation and Service Manual 2.17
Security applications
Telephone line
SIGA-MD
KDC
SIGA-MD
KDC
Motion
Smoke
Partition 4
Company C
Program
Moti on
Partition 3
Company B
Program
SIGA-IPS
SIGA-IPS
Smoke
Security
SIGA-SEC2
Security
SIGA-SEC2
Door
contact
Other factors
Power supply
Hardware configuration
SDU programming
KPDISP
SIGA-270
Pull station
Door
contact
KPDISP
SIGA-270
Pull station
ACDB/KDC operation
X
X
X
Motion
SIGA-MD
Smoke
SIGA-IPS
SAC bus
panel
Control
KDC
SIGA-MD
Partition 2
Company A
Program
Motion
SIGA loop
Partition 1
Figure 2-6: Multiple tenant security in a strip mall
Door
Security
SIGA-SEC2
contact
KPDISP
SIGA-270
Pull station
KPDISP
bell
Security
NOTE: Star taps are shown to simplify this diagram, but are not
recommended for Signature data circuits. Create two T-taps in
the same junction box if required.
2.18 EST3 Installation and Service Manual
Security applications
Hardware configuration
The control panel contains the following rail modules:
• Signature Controller module
• 3-SAC Security Access Control module
• 3-MODCOM Modem Communicator module
The Signature Controller module supports the SIGA loop.
The 3-SAC module supports the SAC bus. Power for the
KPDISP can be taken from the 3-PPS/M and routed with the
data lines in a cable composed of two twisted-pair wires.
The 3-MODCOM module supports modem communication
between the control panel and the KDC programs via telephone
lines.
In the Class B configuration illustrated, an appropriate RS-485
line terminating resistor is required in the KPDISP located in
partition 4.
The electrical room, partition 1, must be armed 24 hours a day,
and have limited, high-level access.
SDU programming
When programming the system for this application, you define
the required partitions and assign the correct partition number to
each security device.
Part of the programming effort includes using the Resource
Profile Manager (RPM) tool to create resource profiles for the
site owner and for each company owner.
Since none of the devices are shared, each company should
receive 100% of the resources of their KPDISP. A small
percentage may be set aside for use of the site owner, depending
on the owner’s policy.
Programming for the 3-MODCOM module determines the dialer
and modem parameters, defines the receivers and accounts, and
assigns each account to the correct receiver.
Finally, when running the RPM tool, you specify which, if any,
of the KPDISP modules can execute fire system commands.
Typically, this privilege is reserved for the site owner or site
security staff.
Refer to the SDU Online Help for more information.
EST3 Installation and Service Manual 2.19
KDC operation
Each company owner must import the resource profile output
from the RPM. After importing this resource data, each company
Security applications
owner can create his portion of the security database, according
to the instructions included with the KDC program.
Changes to the tenant portion of the security database can be
made at any time, and from any location.
Note: Fire and security functionality cannot be programmed into
a control panel from a remote location. You must perform all
panel programming on site. Changes to the security database
have no impact on the parameters or operations of listed fire
system equipment.
2.20 EST3 Installation and Service Manual
Security applications
Secure access
Description of the application
Secure access is a simplified type of security application.
Typical secure access applications are operated from a secured
control panel, and use partitions with no entry or exit delay
timers.
Secure access applications often use the control panel LCD
module (or dedicated Control/LED display modules) to control
the security partitions. Partitions can be armed or disarmed using
any of the following:
• LCD menus
• EST3 Control/LED modules
• FireWorks interface
• ENVOY annunciators
• KPDISP
A secure access system can be implemented using either
Signature or Analog Addressable security devices. Signature
devices are less prone to false alarms, and are more resistant to
tampering, since they cannot be swapped with deliberately
compromised devices.
SDU programming
When you create a secure access application, use the SDU to
create partitions as required. When configuring the partitions, set
the Entry Delay Timer and Exit Delay Timer values to zero.
When configuring SIGA-SEC2 and SIGA-MD devices, set the
Delay to None.
You can use LCD menu commands to arm and disarm the
partitions. To do so, you must check the Enable LCD Security
Control Functions check box. This is located on the Options tab
of the Cabinet Configuration dialog box. Checking this box
causes the Security menu to appear in the Command Menus list.
You can use any suitable Control/LED module to arm and
disarm partitions. Configure the switches as momentary contact
switches, and use them to activate command lists. Program the
command lists to perform the desired arm and disarm actions and
control the LEDs.
Refer to the SDU Online Help for more information on rule
programming for secure access applications.
EST3 Installation and Service Manual 2.21
Security applications
2.22 EST3 Installation and Service Manual
Chapter 3
Access control applications
Summary
EST3 supports rugged and adaptable access control systems.
This chapter introduces you to the equipment required for access
control applications.
This chapter also illustrates and describes several access control
applications. Each application is presented as a separate topic
that includes a block diagram and description. These give you an
overview of the application, and show the components required
and their interconnection.
Refer to the EST3 Installation Sheets for specific component
settings and terminal connections.
Security applications make use of the CRC Card Reader
Controller. Refer to the CRC and CRCXM—Card Reader Controller Installation Sheet for specific installation information
on this module.
Content
Access control equipment • 3.2
Anti-passback • 3.11
Central monitoring station • 3.14
Common door access • 3.16
Delayed egress • 3.18
Elevator control • 3.21
Emergency exit door • 3.24
Handicap access door • 3.26
Maglock peripherals • 3.28
Multiple card readers • 3.30
Muster • 3.32
Power for continuous locks • 3.35
Power for intermittent locks • 3.37
Power from an AC source • 3.39
Power from a remote source • 3.42
Remote controls • 3.45
Two-person rule • 3.47
EST3 Installation and Service Manual 3.1
Access control applications
Access control equipment
Introduction
The equipment required for a basic networked access control
system is shown in Figure 3-1. We’ll discuss each item shown in
the figure, plus the other factors called out on the drawing.
Input circuit 1Input circuit 2
Control panel
Security Access Control
3-SAC
Module
3-MODCOM
Modem Communication
Module
Distributor
SDU
RPM
Telephone lines
ACDB program
Resource
profile
SAC bus
Output circuit
Central
monitoring
station
Figure 3-1: Equipment required for a basic access control system
CRC
Card Reader
Controller
Power supply
X
X
Hardware configuration
X
SDU programming
X
LockCard reader
Other factors
ACDB/KDC operation
3.2 EST3 Installation and Service Manual
Equipment
Here is a list of the equipment used in a basic networked access
control system:
• 3-SAC Security Access Control module
• 3-MODCOM Modem Communication module
• SAC bus
• CRC Card Reader Controller
Access control applications
• Input circuit 1
• Input circuit 2
• Output circuit
• Card reader
• Lock
• RPM Resource Profile Manager tool
• ACDB Access Control Database program
3-SAC Security Access Control module
The 3-SAC Security Access Control rail module controls a highspeed RS-485 circuit called the Security Access Control (SAC)
bus. The SAC bus supports fire, security, and access control
devices.
The 3-SAC handles message traffic for these devices, interfacing
them with the CPU as required. Events are passed from the
devices to the 3-SAC module, then to the CPU for alarm
processing.
The 3-SAC has two sets of circuit terminals, and is capable of
Class A or Class B configuration. Each Class B circuit can
include 31 devices, for a total of 62 devices per module. Class A
circuits can include 30 devices total. In Figure 3-1, we show a
Class B bus with a CRC Card Reader Controller module.
3-MODCOM Modem Communicator module
The 3-MODCOM Modem Communicator module has both
modem and dialer functions. It can transmit and receive
information.
The 3-MODCOM can transmit alarm, supervisory, or trouble
messages to a remote central monitoring station using one or two
telephone lines. A variation of the module (3-MODCOMP) can
transmit pager messages to a paging company using the TAP
protocol.
The module can also receive information sent over telephone
lines by the Access Control Database (ACDB) program.
SAC bus
Since our security and access control devices require 24 Vdc, we
suggest that you always use a four-wire cable for the SAC bus
and a 24 Vdc power supply.
For the data wires, use unshielded, twisted pair, with greater than
6 twists per foot, in 14 to 22 AWG (1.50 to 0.25 sq mm). For the
power wires, use 14 or 16 AWG.
You can use a four-conductor cable with an overall jacket
containing solid 2-19 AWG and 2-16 AWG for the SAC bus.
EST3 Installation and Service Manual 3.3
Access control applications
The maximum run from a CRC to the 3-SAC is 4,000 ft
(1,220 m) at 25 pF/ft. The maximum total capacitance of the run
is 0.1 μF, and the maximum total resistance is 52 Ω.
CRC Card Reader Controller
The Card Reader Controller (CRC) module performs all access
decision processing. Each CRC stores a database and is capable
of granting or denying entry without external communication. If
entry is granted, the CRC applies or removes power to the strike
or maglock to unlock the door. The CRC is also capable of
unlocking a door by activating a manual push button.
Each CRC stores an access database of users and events for the
door it controls. The CRCXM model features enhanced storage
capacity. (Refer to the product installation sheets for quantities.)
Each CRC has terminals that support:
• Two card readers, typically one inside and one outside the
door
• One lock device, either strike or maglock type
• Two input circuits for devices such as request to exit
detectors, door contacts, or motion detectors
• One output circuit with N.O and N.C. contacts for auxiliary
devices, such as door openers
With the addition of an internal battery, the CRC can continue
processing access events even if there is a loss of communication
or power.
CRC options
CRCSND CRC Sounder
The CRC Sounder is a small horn that mounts inside the card
reader controller module. The sounder operates if an emergency
exit door is opened without an exit request and can also indicate
that a door has been left open.
The CRC Sounder can be programmed, using rules written in the
SDU. Further, the ACDB program can control several operating
parameters of the sounder.
CRCRL CRC Accessory Relay
The CRCRL is an accessory relay for the CRC (or CRCXM)
Card Reader Controller. Use the CRCRL in conjunction with an
external power supply to control a lock which requires voltage or
current outside the CRC's operating range.
3.4 EST3 Installation and Service Manual
Access control applications
The CRCRL can be mounted inside the CRC housing when
connected to power-limited wiring. The unit includes a hookand-loop patch which can be attached to the CRC battery strap.
When nonpower-limited wiring is used, the CRCRL must be
mounted in a junction box.
The CRCRL is listed as an Access Control Accessory and
Control Unit Accessory.
Battery
Each CRC has space for an internal, 1.2 Ah, sealed lead-acid
battery. The battery supplies power to the CRC and its
peripherals, and provides local standby power.
The CRC battery provides 30 minutes of standby power for
access control functions and up to 4 hours for security functions.
The battery cannot be used for fire applications.
CRCXF CRC Transformer
The CRCXF CRC Transformer is a 16.5 Vac transformer that
can power the CRC or CRCXM. It provides local power for
applications requiring additional power at door lock. The CRC
has AC load terminals for easy connection to transformer.
Be sure to check the CRC installation sheet for a list of
applications that prohibit the use of the CRCXF.
Input circuits 1 and 2
Each CRC supports two input circuits for such devices as:
• Door contacts
• Motion detectors
• Request to exit (REX) switches
• Security devices
A door contact device monitors the door position (open or
closed) for various applications.
A motion detector detects a person’s approach and can be used
to unlock the door.
A request to exit (REX) push button (or bar) can be used to
manually unlock the door.
Security devices, such as glass-break detectors can be associated
with the door to enhance its security, or to monitor a nearby
window.
EST3 Installation and Service Manual 3.5
Access control applications
Output circuit
Each CRC supports one output circuit in the form of N.O. and
N.C. dry contact connections. The output circuit can be used for
such devices as:
• Automatic door openers
• Door holder control
Card reader
By card reader, we mean any of the different types of credential
reader supported by the CRC. A card reader scans a card to
determine the card number and passes the card number to the
CRC.
A card reader is a self-contained module capable of reading one
type of access card and transmitting the card’s code to a card
reader controller.
All the required electronics are assembled in the card reader
housing. The card reader connects directly to the CRC, which
processes the card code and grants or denies access.
Each CRC can support several card readers. Typically, a CRC
will control an entry and exit card reader for the doorway. It can
also support multiple readers for such applications as two-person
rule or anti-passback.
Note that the CRC supports any type of reader that uses the
industry standard Wiegand output format. These include:
• Proximity
• Wiegand pin
• Magnetic stripe
• Bar code
• Keypad
• Smart card
• Biometric
For simplicity, we present all the applications in this chapter as
operating with proximity readers, but other reader types can be
used.
Some applications work best with card readers that support dual
LED control. The CRC uses two LEDs, or two LED states, to
indicate that further actions are required after the initial badging
operation, before access is granted. These applications are:
• Two-person rule
• Visitor and escort
• PIN schedule
3.6 EST3 Installation and Service Manual
Some card readers are also equipped with a keypad. The keypad
allows for entry of a PIN number in addition to the card code.
Access control applications
The CRC can accommodate any PIN number of 1-4 digits along
with the associated card code. The need to enter a PIN is
controlled by two factors: whether or not the CRC is armed, and
whether or not the access schedule calls for use of a PIN.
Lock
The CRC supports any type of door locking or releasing device.
Common lock devices are strikes and maglocks. A strike opens
the door when power is supplied, while a maglock secures the
door while power is supplied.
RPM Resource Profile Manager tool
The Resource Profile Manager (RPM) tool is part of the SDU. It
uses the project database to let you create a separate resource
profile for each company that will be using the access control
system.
The resource profile defines the access control system for the
ACDB program. It includes detailed information about each
CRC used by a given company. For example:
• Communication method
• Primary or secondary control
• Number of cardholders
• Number of schedules
• Number of holidays
• Number of access levels
• Command lists used
ACDB Access Control Database program
The Access Control Database (ACDB) program lets you define
and maintain a database of information about CRCs, cardholders,
and access levels.
The ACDB program runs on the your PC. Additions or updates
to the access control database can be transmitted to the CRC
units in two ways.
The first method is via modem and dial-up telephone line to the
3-MODCOM. The information is then routed to the CPU,
through the correct 3-SACs, and finally to the CRC units.
The second method is by connecting your PC directly to the
CPU using an RS-232 cable. The connection is made between
the PC’s COM1 port and any of the RS-232 terminals on the
CPU. As in the first method, after reaching the CPU additions
and changes are routed through the correct 3-SACs to the CRCs.
EST3 Installation and Service Manual 3.7
Note: Changes to the access control database have no impact on
the parameters or operations of listed fire system equipment.
Access control applications
Other factors
Next, we’ll cover the additional factors listed on the drawing:
• Power supply
• Hardware configuration
• SDU programming
• ACDB/KDC operation
These factors are called out on each application diagram given in
this chapter.
Power supply
The CRC is designed to operate on 24 Vdc. For this reason, we
recommend that you include power from the panel with the SAC
bus cable. You can use the panel 3-PPS/M or 3-BPS/M power
supplies.
When using CRCXF CRC Transformer you must provide a
circuit common path between all devices, using the –24 Vdc
terminals.
If you use an additional power supply other than the CRCXF,
that power supply must be listed for fire alarm applications, must
have ground fault detection disabled, and must have a circuit
ground (circuit common) that is isolated from earth ground.
Hardware configuration
The CRC has two jumpers that configure the power source and
usage for the module. See the CRC installation sheet for details
on the jumper settings.
No other configuration settings are made at the device itself. All
other configuration is done via SDU or ACDB programming.
The SDU determines site-level configuration and parameters.
The ACDB program controls end-user settings.
SDU programming
While the ACDB program defines the access control database,
all other definition, configuration, and programming for the
access control system happens in the SDU.
The SDU controls the general configuration of the 3-SAC
modules, plus the configuration of all CRC devices on the SAC
busses.
3.8 EST3 Installation and Service Manual
CRC modules can be configured to execute a specific,
predefined command list when a specific access control event
occurs. You write the command lists in the SDU, and assign
them to CRC events when you configure the CRC module.
Access control applications
Partitions are fundamental groups used with access control
systems. To use such access control features as two man rule,
muster, or anti-passback, CRCs must belong to the same
partition. All partitions are created and defined in the SDU, and
each CRC can be assigned to a partition.
For the 3-MODCOM module, the SDU determines the dialer and
modem parameters, defines the receivers and accounts, and
assigns each account to the correct receiver. These settings
control CMS reporting and ACDB download operation.
Finally, the SDU includes the RPM tool, described earlier in this
topic.
ACDB operation
The ACDB program lets you create and revise your access
control database. Parameters stored in the database identify
cardholders, schedules, and holidays, and assign access
privileges.
The SDU includes a tool called the Resource Profile Manager
(RPM). The RPM lets you create a resource profile for each
company using the system for access control purposes. During
setup of the ACDB program, you import the resource profile
created by the RPM. This defines the system devices for the
ACDB program.
The ACDB runs on your computer. You can connect the
computer to the access control system in two ways:
• From an RS-232 port on the computer to an RS-232 port on
the CPU
• From the computer modem to a 3-MODCOM via telephone
lines
The end result is that the ACDB database can be downloaded
from your computer to the system. Each CRC stores that portion
of the database pertinent to its operation.
Locally defined unlock and open timers
Using the ACDB program, you can control how much time a
cardholder has to enter or exit after badging in or pressing a
request-to-exit button (REX). The CRC controls both the unlock
time and door open time. Both can be set in the ACDB program.
Unlock timers control the number of seconds that the door stays
unlocked after a cardholder badges in. When the unlock timer
expires, the door locks. The ACDB has four unlock timers:
• Standard unlock
• Handicap unlock
EST3 Installation and Service Manual 3.9
Access control applications
• Manual unlock
• Minimum unlock
The CRC relay can be used to control a door opener. Door open
timers control the number of seconds that the relay remains
active. The ACDB has two door open timers:
• Manual open time
• Relay open time
Access control applications
The remaining topics in this chapter discuss specific access
control applications. Each topic gives you an overview of the
application, showing the components required and their
interconnection.
Each topic includes a block diagram and general description of
the application. Other factors (as called out on the drawings) are
discussed under separate headings in the topic.
3.10 EST3 Installation and Service Manual
Access control applications
Anti-passback
Description of the application
Anti-passback is a feature of the access control system that
prevents successive use of one card to pass through any door in
the same direction. Anti-passback prevents a card from being
passed back to another person for the purpose of gaining
unauthorized access.
The CRC supports three forms of anti-passback:
• Strict
• Logged
• Timed
Strict anti-passback is the most restrictive form of anti-passback.
It requires all personnel to badge in and out, denying them access
to an area when they fail to do so.
Logged anti-passback is less restrictive than strict anti-passback.
It still requires personnel to badge in and out but does not deny
access when anti-passback rules are violated. Rather, such access
is logged as an access granted anti-passback event. With logged
anti-passback, security staff can work to correct violations, but
personnel are not locked out.
Timed anti-passback prevents reuse of a card for a specific
period, but does not require personnel to badge out. A timed
anti-passback system automatically badges a cardholder out of
the controlled partition after a specified time period, allowing the
card to be used again.
Note: Timed anti-passback cannot be used with a muster
application, since the system automatically logs cardholders out
of the partition, defeating muster accounting.
To implement anti-passback, a separate CRC is required at each
doorway in the controlled partition. Each doorway requires an
outside card reader. Strict and logged anti-passback applications
also require an inside reader at every doorway. Timed antipassback does not require the use of an inside card reader.
A typical anti-passback application is shown in Figure 3-2,
below.
The figure shows a building with a perimeter fence. It would be
easy for an employee to pass his access card to an unauthorized
individual through the fence, thereby allowing access.
Configuring the access control system for anti-passback
operation can help prevent this from happening.
EST3 Installation and Service Manual 3.11
Access control applications
Outside
reader
Inside
Perimeter fence
Entrance
turnstile
reader
Lock circuitReader circuit
SITE
Building
entrance
CRC
Figure 3-2: Anti-passback
SAC bus
Main building
Control panel
3-SAC
Emergency
exit
Other factors
Power supply
Hardware configuration
X
SDU programming
X
ACDB/KDC operation
X
Hardware configuration
The control panel must contain a 3-SAC Security Access Control
module. The 3-SAC module supports the SAC bus. Power for
the CRC can be taken from the 3-PPS/M and routed with the
data lines in a cable composed of two twisted-pair wires (the
SAC bus).
3.12 EST3 Installation and Service Manual
Access control applications
SDU programming
If the CRC is to be used for anti-passback this must be
configured using the SDU. The CRC configuration dialogs let
you select the type of anti-passback you want to use:
• None
• Logged
• Timed
• Strict
You can also assign a predefined command list to various access
granted or access denied events, including the anti-passback
events:
• Access granted anti-passback
• Access denied anti-passback
The CPU runs the command list you specify when either of these
events occurs.
ACDB programming
With timed anti-passback, the cardholder is automatically
marked out after a specified period of time. This period is
defined by the ACDB. The period can be set from 0 through 255
minutes (4 hours and 15 minutes).
EST3 Installation and Service Manual 3.13
Access control applications
A
Central monitoring station
Description of the application
An access control system can transmit different kinds of event
information to a central monitoring station (CMS). The basics
for such a system are shown in Figure 3-3.
Card
reader
CRC
SAC bus
Control panel
ccess denied event
3-SAC
CPU
Programmed rules
for transmission
3-MODCOM
Formatted CMS message
Telephone line
Other factors
Power supply
Hardware configuration
SDU programming
X
ACDB/KDC operation
Central
monitoring
station
Figure 3-3: Access control reporting to a central monitoring
station
When a reportable access event occurs, the event message travels
from the CRC to the 3-SAC. The 3-SAC passes the message to
the CPU which executes a predefined command list. The
command list specifies the details of the message that is sent to
the 3-MODCOM for transmission to the CMS.
3.14 EST3 Installation and Service Manual
Access control applications
SDU programming
Reporting access control events to a CMS depends entirely on
programming and the creation of command lists. In essence, you
must assign a command list to each CRC event you want to
report. The command list contains the details of the message to
be transmitted.
The following CRC events can be assigned command events:
• Access granted
• Access granted irregular
• Access granted anti-passback
• Access granted muster
• Access denied unknown
• Access denied reader disabled
• Access denied access level not active
• Access denied outside schedule 1
• Access denied outside schedule 2
• Access denied partition armed
• Access denied PIN not entered
• Access denied PIN not valid
• Access denied two-person timeout
• Access denied anti-passback
• Access denied escort
EST3 Installation and Service Manual 3.15
Access control applications
A
A
Common door access
Description of the application
A site that makes use of a common door is shown in Figure 3-4.
Here, the door is the main entrance of an office building, and
leads into a common lobby area. Within the building, two
companies rent offices, each with controlled access doors.
Site owner
ACDB
Modem
Distributor
SDU
RPM
Telephone lines
Site
Owner
Company
A
Company
B
Control panel
3-SAC
3-MODCOM
CDB
Modem
Common door
CRC 1
Suite 101
Company A
CR 1
SITE
Lobby
SAC bus
2
C
R
C
2
R
C
Resource profiles
Other factors
Power supply
Hardware configuration
X
SDU programming
X
ACDB/KDC operation
X
Figure 3-4: Common door in a lobby area
3.16 EST3 Installation and Service Manual
CDB
Modem
Suite 102
Company B
3
C
R
C
3
R
C
Access control applications
Hardware configuration
The site has an EST3 control panel that includes a 3-SAC and a
3-MODCOM module. The 3-SAC supports the SAC bus. The
3-MODCOM module supports modem communication with the
control panel over telephone lines.
SDU programming
As the distributor, you use the SDU to program the control panel
for this application. Part of the programming job is to use the
Resource Profile Manager (RPM) to create resource profiles for
the site owner and for each tenant company.
Resource profiles are imported into the Access Control Database
(ACDB) program. They determine which devices the user can
see and program. Resource profiles also establish transmission
routes that permit modem communication with the EST3 panel.
When a device is shared, the RPM lets you specify how much of
the device is allocated to each company. You can allocate
resources either by percentages or by actual numbers.
It’s a good idea to hold some allocation in reserve, giving each
company only what it needs. It is much easier to allocate
additional resources as needed than to reclaim resources that are
already allocated.
In our example, the resource profile for company A would
contain CRC 1 (the lobby door) and CRC 2 (the suite 101 door).
For Company A, you might choose to allocate 80% of CRC 2,
and 20% of CRC 1.
Similarly, the resource profile for company B would allocate
80% of CRC 3 and another 20% of CRC 1.
The site owner will need access to the CRC2 and CRC3 doors
for cleaning or inspection purposes. The site owner resource
profile could allocate 20% of CRC 1, 10 % of CRC 2, and 10%
of CRC 3.
This leaves 40% of CRC 1 unallocated, and 10% of CRC 2 and
CRC 3 unallocated. The unallocated resources are reserved for
future expansion or changes.
ACDB operation
The site owner, the owner of company A, and the owner of
company B, can all use telephone lines to communicate with the
control panel via the 3-MODCOM module. They can download
additions and changes to the CRCs, and upload usage data for
various ACDB reports.
EST3 Installation and Service Manual 3.17
Access control applications
Delayed egress
Description of the application
Delayed egress doors help to control shoplifting at retail sites. A
delayed egress door has card readers and a request to exit (REX)
switch. Employees can badge in and out as they would at any
other door. In an emergency, customers must press the REX
switch to unlock the door.
When the REX switch is activated, the CRC sounds the
CRCSND horn and sends a security alarm event to the panel. It
does not unlock the door immediately, thus allowing site staff
time to investigate.
The CRC waits for a specific interval of time before unlocking
the door. The typical delay time is 15 seconds; however, you
may be able to use a delay of up to 30 seconds with the approval
of the AHJ. The horn continues to sound for a specific period of
time, or until the CRC is reset.
After the delay time passes, the CRC unlocks the door, and
latches it in the unlocked state. The CRC must be reset in order
to relock the door and silence the horn. To reset the CRC, site
staff must use a valid badge at the card reader.
The CRC also activates the CRCSND horn if the door is opened
without badging. For example, if the door is forced open from
the outside, the CRCSND activates, even though the REX switch
has not been pressed.
Many codes require that delayed egress doors unlock during a
fire alarm, or when the panel is in trouble. This requirement
allows occupants to evacuate the site immediately when a fire is
detected, or when the panel loses its ability to detect a fire or
sound the alarm.
Figure 3-5 shows a delayed egress door with inside and outside
card readers and a request to exit switch. The CRC uses a door
contact switch to determine the position of the door, and a
maglock to lock the door. The door contact switch and REX
switch are connected to the input loops of the CRC.
Note: Refer to NFPA 101 and the local AHJ to determine the
requirements for delayed egress applications.
3.18 EST3 Installation and Service Manual
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.