Note:THIS APPLICATION GUIDE IS THE PROPERTY OF HONEYWELL AND MUST BE
RETURNED TO HONEYWELL UPON REQUEST. ALL INFORMATION CONTAINED
HEREIN IS CONFIDENTIAL. ANY UNAUTHORIZED USE OR DUPLICATION OF THIS
GUIDE IS STRICTLY PROHIBITED. ACCEPTANCE OF THIS GUIDE IS DEEMED
ACCEPTANCE OF THE ABOVE CONDITIONS.
What this guide is intended to provide.........................................................................................................3
Who should use this guide...........................................................................................................................3
The Market ..................................................................................................................................................3
New Exclusives........................................................................................................................................4
Version Comparison....................................................................................................................................5
Control Centers........................................................................................................................................9
Point Index.............................................................................................................................................25
Point Type..........................................................................................................................................26
Point Response...................................................................................................................................26
Point Parameters................................................................................................................................26
Census 4821...........................................................................................................................................61
Updated Data Sheet...................................................................................................................................65
Introduction
What this guide is intended to provide
This guide is a supplement to the Intelliguard 5800/5900/5924 Application Guide (form #56-5016) from
October 1993. Only changes to the original product information are presented here. If a particular feature
or module is not addressed it infers that there have been no changes and the original information is still
relevant. Therefore this guide cannot standalone and requires that you have read or reviewed the original
Application Guide for a complete understanding of the product.
Who should use this guide
This guide is written for anyone involved in delivering the Intelliguard 5800/5900/5924 to our customers.
This guide is aimed at a diverse audience of both operations and sales people. This is the primary reference
for sales people for learning the operation and application of the products. Operations personnel should use
this as an introductory guide in conjunction with the Intelliguard 5900 Operation and Installation Manuals
(Radionics #74-07629-000) and the Intelliguard 5900 Program Entry Guide (Radionics #74-07624-000).
If you have further questions about Intelliguard, contact your Radionics Area Representative at 800/5385807 or Bruce Addleman, Product Marketing at 612/951-3668.
The Market
Intelliguard Entry Control has many benefits, chief among them is that it can reduce false alarms due to
user’s who are unfamiliar with the operation of the security control panel, since entry control is designed to
disarm the appropriate portions of the security system as well as allow access. Other benefits include many
of the same associated with more traditional access control systems including reducing the cost of re-keying
locks and accountability.
Intelliguard Entry Control also addresses the lower end of the access control market we don’t participate in
very well due to the high initial cost threshold associated with standalone access control systems. Because
the platform for the fire and security system is also used for Entry Control the cost of the first door is
roughly equivalent t o the average cost per door of larger systems.
As has always been the case with access control, customers find many other ways to use access control once
they have gained some experience. The simple integration and low cost of Intelliguard Entry Control will
provide a progression to our traditional access control market. Every Entry Control customer will likely
eventually become an access control customer as well.
The integration of products from Radionics and Westinghouse Security Electronics supports our strategy for
partnering with a single vendor in these markets and to differentiate existing product for the benefit of our
customers.
Tailored Security
The concept of Tailored Security was first introduced along with the 5800/5900 in 1993. Your challenge,
still, is to identify the features that your customer needs to assist them with their business situation. Your
opportunities to Delight the Customer come from simple but elegant solutions. To that end you must strive
to Tailor the Security system and to take advantage of the flexibility these products provide. While the
concept has not changed, the fact that the new product features further the ability to provide Tailored
Security suggests that, it i s wor t h redefining here.
Tailored Security is really all about understanding customer requirements. When a customer describes their
needs and concerns, they are doing so because they have an expectation that you can fulfill those needs and
address their concerns. The Intelliguard 5800/5900 allows you to optimize the security system to work the
way your customer operates their business. To do this you must fully understand your customers operation
and expectations. Providing the customer with a system that works, the way they want, is the major feature
of the 5800/5900. This guide will explain how.
3
IntroductionHoneywell Proprietary
Exclusives
Below is a list of the exclusive features from the original product and any comments regarding their
relationship to the Radionics product.
1.Shared Areas automatically turn on and off when other adjacent areas are armed and disarmed. That
means to you easy access through common hallways or vestibules without creating false alarms. Area
types are now available in a number of products including the Radionics versions.
2.Master Areas that cannot be armed until other critical areas are armed. This provides assurance that
important areas such as a safe or vault are armed before the main system is armed. Area types are now
available in a number of products including the Radionics versions.
3.Passcode Access means that a passcode must be entered before any command can be initiated. This
means higher security because it prevents unauthorized or inadvertent use of your security system. New
versions of the Radionics products can be programmed to require a passcode to access the function
menu.
4.Invisible Walk Test that lets you test hold-up buttons or moneyclip traps before a store or bank opens
for the day. What this means to you is assurance that your protection is working.
5.Latest Closing Time that limits how late a user can extend their closing time on systems with
supervised closings. This ensures that employees will stay no later than the time you set.
6.Changing Armed States that lets you move from perimeter to master arm (or vice versa) without having
to disarm. This makes it quick and easy to completely arm your system at night when you have been
working with the perimeter protection on. This feature is available now in the Radionics versions which
include access control, however only from the card reader. A card can cause the area security to change
to Perimeter from Master.
7.HSL Transmitter that communicates alarms on closed window multiplex networks. That means to
you the highest level of transmission security possible.
New Exclusives
1. The ability to execute a custom function from a credential reader allows a customer access to
complex commands without a lot of training. Custom functions might be used for environmental
control such as turning on lights and ventilation controls or it might be used to establish a specific
security routine.
2. Westinghouse Security Electronics digital proximity reader provides Honeywell customers with a
industry leading access control technology and allows easy integration between access and security
systems.
4
Honeywell ProprietaryTable of Contents
Version Comparison
This chart shows the main differences in feature sets. Only new or changed features are shown. See the
original application guide for other features. The new features are explained in detail in this guide.
Feature5800DSCC5900DSCC5800C5900C/5924C
Annunciation48 points (8 on-
board and 40 off-
board
Passcode Capacity
*assumes 5800
programmed in PS6 as a
5900
Maximum number of
D9210 Access modules
Credential Users
includes sub-users
Scheduled events171764 scheduled events
Section One - System Architecture
Basic Components
Control/Communicator
“C” Version
The enhanced Intelliguard 5800, 5900 and 5924 are implemented on a new hardware platform that provides
additional memory required to support the enhanced feature set. This new platform looks the same and
provides the same terminations and connectors as it’s predecessor. The 5800, 5900 and 5924 still differ
only in their configuration of features and capacity. The product that supports the increased Capacity and
enhanced features, specifically Intelliguard Entry Control, is identified as the “C” version.
“DSCC” Version
This same platform is being used for the 5800DSCC and 5900DSCC. This software variation was created
to interface with the Honeywell Security Link transmission device known as DSCC (DSAS to SDI
Communication Card). The DSCC was previously available only with the Intelliguard 5700 which ceased
production in 1995. The 5800DSCC and 5900DSCC do not
version. They retain the features and capacity of the original version (B1). This variation, while not ideal,
was created so that the “C” version would not be delayed by further development and so that we could have
a current platform to support DSCC. This trade-off recognizes the diminishing role of HSL but also
provides an opportunity to update the thousands of loyal HSL customers if required by competitive
pressures.
provide the enhanced features of the “C”
The comparison chart in the introduction section provides the details of each of these new offerings. The
only way to tell them apart is by their label. Review the original application guide (56-5016) for details
about the capabilities and capacities associated with the DSCC version.
Packages
The configured packages that match the Business Alarm Price Book and the National Purchasing Manual
shipped after introduction will be the “C” version. Previous version control/communicators will be
available only as individual replacement components. If your branch has been ordering components instead
of the configured packages, ensure that your orders reflect the appropriate control/communicator in lieu of
the B1.
These same packages are available as the “DSCC” version by using a -DSCC suffix when ord ering.
Control Centers
The existing control centers work with all versions of the Intelliguard 5800/5900/5924.
Expansion Modules
Expansion modules are used to increase the capacity of the control unit. They are generally mounted inside
the control unit enclosure, which has room for 6 modules. Additional Expansion modules can be put in a
separate enclosure, usually next to the control unit. Use the Power Requirements Chart in Section Five to
determine if you must add additional power to accommodate the Expansion modules.
Point Terminal (D9127)
This is an updated version of the POPIT (Point of Protection Interface Terminal). The D9127 provides
increased addressing capability to support the new point capacity of the 5800 and 5900 “C” versions.
D9127s can be used on all earlier systems supporting POPITs except the 5700/7112. Installations may
include both the D9127 and the original D8127 POPIT, even on the same backbone (D8125 POPEX
Module).
9
System ArchitectureHoneywell Proprietary
OctoPOPIT Module (D8128C)
The OctoPOPIT module has also been updated to coincide with the increased point capacity of the 5900C.
Like the POPIT, it may be used on all earlier systems supporting POPITs.
Access Control Module (D9210)
The D9210 Access control module is the interface between the control/communicator and one reader
controlled door. It is connected to the control/communicator via the SDI (keypad wire) like a control
center. It may be placed within the same control/communicator enclosure like most other expansion
modules. It may also be located anywhere within the protected premise in a remote enclosure, however it
must be located within 2000’ (wire distance) of the control/communicator when used with 22 AWG wire.
The module is supervised so that a loss of communication between the module and the
control/communicator will be annunciated. The D9210 can receive 12 vdc power via the SDI, which may
be appropriate for smaller systems however, like a control center, it can also be powered from a standalone
12 vdc power supply.
The D9210 supports standard 5-wire, 26 bit Wiegand protocol data communications from the reader. The
reader may be any technology as long as it communicates using a Wiegand protocol. Reader wire is limited
to 300’. It is possible, depending on the current draw of the reader, to parallel two readers on the same door
used for in/out control. Both readers will operate as one. There will be no control or indication of the
direction the person was going. The D9210 also interfaces the other devices associated with the reader
controlled door including;
•
the electric locking device - a SPDT, dry contact, plug-in relay (D136) rated 2A @ 24 vdc
•
the door contact - a supervised input with a 1000 ohm end of line resistor like an on-board point
•
a request to exit and a request to enter device - normally open input, close to activate
•
a 12 vdc voltage output for a buzzer - active on access granted and door left open
Note: The electric locking device at the door should be powered from a standalone power supply (either 12
or 24 vdc). It may be possible to power the D9210 and provide minimal 12 vdc lock power for a small
system with a single access control module. You must use the Power Requirements Chart to determine if
there is enough auxiliary power available from the control/communicator and to a ssess the impact on
battery standby time.
D9210 Configurations
The D9210 is available in several configurations providing options regarding mounting locations and power
requirements.
•
D9210BLCH - the module only, intended to be mounted within another enclosure like the
control/communicator. (B = B version, LC = le ss c
•
D9210BH - the module mounted in a small (wiring room only) enclosure, ideally located at or near the
controlled door to minimize the wiring between the door and the control/communicator.
•
D9210BCH - a single module mounted on a skirt with a 1 amp 12/24 vdc power supply with plug-in
transformer (battery(s) not supplied), mounted in another 5591(not the control) enclosure, also ideally
located at or near the controlled door. The skirt has room for a second D9210BLCH and additional
D9210BLCH modules can be mounted to the sides of the enclosure for a centrally wired and powered,
multiple door system.
an, H = Honeywell)
WSE 4205W (Wiegand) Credential Readers
The reader recommended and fully supported is the WSE 4205 Wiegand digital proximity reader, available
in indoor, indoor glass mounting and outdoor versions. The NexKey (card) and KeyMate (keychain token)
are the same used in all WSE digital systems. These readers are currently exclusive to Honeywell and
represents a significant commitment on the part of Radionics and WSE to our partnership which enables
you to offer your customers an integration of premier products.
10
Honeywell ProprietarySystem Architecture
The D9210 will support most standard 26 bit Wiegand protocol readers. Readers are available from
Radionics in a variety of technologies including ReadyKey, (which is proximity) Dorado magnetic stripe,
Sensor Engineering Wiegand , Essex BFSK weatherproof keypad and HID pro xi mity.
Accessory Modules
Dual Phone Line Module (D928)
The D928 replaced the D128 shortly after initial introduction in 1994. The D928 has the same features as
the D128. It resolved issues with the D128 supervisory switching being heard during the customers
telephone conversations.
Printer Interface (D9131A)
The firmware of the printer interface has been updated to support the new messages of the “C” version
panels. Existing D9131s can be upgraded by contacting Radionics Order Processing and requesting the
D9131A Update Kit. An example of access messages can be found in section 2, Features.
Power Supply/Battery Charger Module (D9142)
This 4 amp power supply is UL listed both as a supplemental power supply to provide added standby
battery capacity, like the D8132, and as a standalone power supply.
Communications Modules
Honeywell Security Link (HSL) Transmitter Module (DSCC)
The DSCC module is only compatible with the 5800DSCC, 5900DSCC and 5924DSCC. It is not
compatible with the “C” version panels which means that it will not work with systems which require the
expanded capacity or entry control features. The chart in the introduction of this guide shows the capacity
and features of the DSCC control/communicator models. The DSCC module is also not compatible with
earlier versions of the 5800/5900/5924.
HSL provides Grade AA line security over a closed window multiplex network. Closed window networks
provide an isolated path of communication to prevent interference from other transmitters on the same
network and to find network problems quicker to reduce downtime.
The HSL transmitter module (DSCC) will transmit the same information as the digital communicator over
Honeywell's existing HSL networks. The customers voice telephone line will serve as a backup
transmission method in the event of an HSL failure and as access for remote programming of the control
unit. The HSL transmitter module requires 2 module mounting locations in the control unit. It also requires
a HSL dedicated line in addition to the normal telephone line.
Cellular Transmission
C801
The C801 Cellular Transmitter module is mounted within and connects directly to the
control/communicator. It provides an alternative signal path utilizing the cellular telephone network. This
module provides many of the same features of the Telguard Cellular Alarm Transmission System (CATS).
In fact the module is actually manufactured by Telular for Radionics. The main benefits are that the
integration of the module within the control/communicator reduces installation time, costs, wall space
requirements and the module is supported by Radionics Customer Support.
When used as a backup, the C801 will switch to cellular if the digital dialer fails to reach the Customer
Service Center after a preset number of attempts. It also monitors the cellular radio link and will trip a point
on the Intelliguard when there is an interruption in the cellular service.
Because the cellular module simply provides an alternate path, for the digital communicator, to reach the
Customer Service Center, there is no difference in the signals received. The C801, in combination with an
Intelliguard package for UL Mercantile service (LP), provides Grade A service for a burglary system and
may be used as the second phone line in fire alarm applications.
11
System ArchitectureHoneywell Proprietary
The C801 is powered by it’s own AC transformer and uses the panel battery for backup. Two batteries are
required for systems using the C801.
Telguard
The Telguard product may still be used in situations where added features are required.
AirTouch Agreement
Cellular service is now available to your customers at a very affordable price. Air Touch Cellular provides
cellular service to Honeywell for corporate and employee use. This service is limited to use for backup
alarm signaling only and is not to be used with cellular hardware which provides additional features like
priority phone. This service is available nationwide and should be used with either the C801 or the
Telguard models. See the separate bulletin announcing the details of this program.
12
Section Two
Features
Intelliguard 5800/5900/5924
ìCî Version and ìDSCCî Version Update
Application Guide
FeaturesHoneywell Proprietary
14
Honeywell ProprietaryFeatures
Section Two - Features
Intelliguard Entry Control
One of the significant features of the “C” version is the addition of entry control of the burglar alarm. This
section describes the differences between entry control and traditional access control and also defines the
elements and application of entry control of the burglar alarm.
Before Entry Control
The typical Intelliguard system controls one or more areas of a building. Each area includes the security
devices (points) and a control center. The control center is usually located near the entry/exit door for the
area and is used for arming and disarming. The control center provides detailed information about the
status of the security in the area and, in some cases, other areas. The scope of the control center determines
what areas can be seen. The user’s authority level determines what commands they can give in each area.
In most cases, the system is armed using the ALL ON/OFF key. This means that all areas will be armed
that are within the scope of the control center and the user’s authority level. The user leaves the building
through the designa t ed door during the exit delay.
The ALL ON/OFF key is also used most often to disarm. The user unlocks the door with a key to enter.
The control center warns the user that the system must be disarmed. By using the ALL ON/OFF key, the
user disarms all areas that are within the scope of the control center and the user’s authority level. Of
course the user has the option of changing the area status to one of the Perimeter Armed states using other
control center commands.
Simple Entry Control
Intelliguard entry control changes this typical scenario by adding a credential reader outside of the area to
replace the mechanical key used to unlock the door. In it’s simplest form, entry control unlocks the door for
authorized user’s and disarms the appropriate areas just as though the user had pressed the ALL ON/OFF
key at the control center. There are several options to this sequence but like the ALL ON/OFF key it is the
one that will be used most often. The addition of entry control impacts the disarm portion of the above
scenario only. The control center is still required to provide the detailed system status information during
the arming sequence and to issue commands.
Why it’s Called Entry Control
There are some important differences between entry control and our traditional access control offerings.
The list below are customer requirements that are better served by an access control system.
1. Very specific control of a persons access - The front door from 8-5, the lunch room from 11-2,
the records vault on Wednesdays. Entry control uses authority levels to determine access. Doors are
assigned to an area. A user’s authority level for the area determines whether they have access to all
doors within the area or no access at all in that area. Time control is accomplished using SKEDs which
will disable access for an entire authority level. SKEDs are difficult for most customers to manage
effectively.
2. Detailed historical reporting - Where did this person use their card yesterday? This is indicative
of the need for a computer controlled reporting system. The “C” version is similar to an access control
system that uses a dumb terminal/printer for the user interface. Activity can be printed in real time or
in chronological order from the log but no query function is available.
3. Multiple panel requirements - “The ninth door.” A traditional access control system will provide
an option for multiple panels to be interconnected or to be managed by a computer system. Entry
control is limited to a single system. A customer with multiple sites, each with entry control
requirements within the bounds of a single system, must manage each system independently and onsite.
4. Large number of users. Most entry level access control systems are able to manage thousands of
users. Intelliguard is limited by memory and practicality to 250 unique users.
15
FeaturesHoneywell Proprietary
5. Completely customer managed system. Because this is an attachment to the security system, the
level of opening/closing supervision the customer requires may restrict the customers ability to make
user changes on-site.
6. Anti-passback control. Entry control can be used for both In and Out control of a door but no
restrictions are placed on the sequential use of a card.
Hardware
The 5800C will support 4 doors with entry control, the 5900C/5924C will support 8 doors. Each door
requires a D9210 Access Control module, a reader, and the associated electric locking device. Most doors
will also require a door contact. and a device (button or motion detector) to provide Request to Exit
operation. The 12 or 24 vdc power for the locking device will likely be provided by an auxiliary power
supply.
Configuration
A new programming handler called ACCESS is used to configure the doors connected to the D9210s.
9210s (doors) are assigned a door # which coincides with the address set on the module (1-8). Doors are
assigned to an area like any other point. The area assignment is important because it determines which
areas alarm status is looked at to determine if access should be granted. Doors are also assigned to a control
center to determine the “scope” of their impact on the system. This is most often the address of the control
center located immediately inside the door. One reason to use a different control center address would be if
the customer wanted only the local area (area scope) impacted by entry control yet wanted the option of all
areas (panelwide scope) from the control center. This would require referencing a control center, which
could be virtual, assigned to the same area with area scope. The final assignment is the point number for
the door contact. The point can be assigned any valid number including that of an on-board point.
Note: Point numbers must not be duplicated. If the door contact is assigned the number of an on-board
point (1-8) then that point cannot be used and the resistor must be removed. If the door contact is assigned
an off-board point this means that a POPIT or a point on an OctoPOPIT module cannot be used.
Standard Door Parameters
There are a number of other programmable parameters that are typical for the door of an access control
system. The parameters, which are fully programmable for each door, include unlock time, buzzer output
time and shunt time of up to 4 minutes. There is also an extended shunt time of up to 30 seconds which
begins, when the origina l shunt timer runs out, if the door is still open. The extended shunt time will
provide an additional buzzer output and create a “CLOSE DOOR #” warning message for the control
center. Three other items are specific to how the lock works. Deactivate On Open provides for the lock to
be relocked as soon as the door is opened. Some electromagnetic devices with built in door sensors require
this option to be turned off. RTE (Request To Enter) Shunt Only and REX (Request t o Exit) Shunt Only
allow you to define whether or not the door will be unlocked or just shunted. Most often you will want to
unlock the door for RTE and shunt only for REX, unless an electromagnetic lock is employed.
Integrated Entry control Parameters
The fact that Intelliguard has integrated entry control into the alarm system provides several other options
that would not ordinarily be found in a standalone access control system. The parameters described below
are programmable for each entry controlled door in the system.
Disarm On Open
This entry control specific parameter determines at what point in the sequence of events the alarm system
will change armed states. The default (YES) indicates that the alarm will change state only after the door
has been physically opened. This means that the system won’t change states if a user is granted access but
changes their mind and doesn’t enter the area. If the parameter is set to NO the system changes state
immediately when access is granted.
The user’s authority level determines what changes, if any, will take place. For example, some users may
only disarm the interior and those who follow will not change the system further.
Auto Door
16
Loading...
+ 45 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.