The product information and design disclosed herein were originated by and are the property of Bosch Security Systems, Inc.
Bosch reserves all patent, proprietary design, manufacturing, reproduction, use and sales rights thereto, and to any article disclosed
therein, except to the extent rights are expressly granted to others.
COPYRIGHT NOTICE
Copyright 2011 by Bosch Security Systems, Inc. All rights
reserved. Reproduction, in whole or in part, without prior written
permission from Bosch is prohibited.
*All other trademarks are property of their respective owners.
WARRANTYAND SERVICE INFORMATION
For warranty and service information, refer to the appropriate web
site below:
Te chnical questions should be directed to:
Customer Service Department
Bosch Security Systems, Inc.
12000 Portland Avenue South
Burnsville, MN 55337 USA
Telephone: 877-863-4169
Fax: 800-323-0498
Info@rtsintercoms.com
THE LIGHTNING
FLASH AND
ARROWHEAD
WITHIN THE
TRIANGLE IS A
WARNING SIGN
ALERTING YOU OF
“DANGEROUS
VOLTAGE” INSIDE
THE PRODUCT.
SEE MARKING ON BOTTOM/BACK OF PRODUCT.
WARNING: APPARATUS SHALL NOT BE EXPOSED TO DRIPPING OR
SPLASHING AND NO OBJECTS FILLED WITH LIQUIDS, SUCH AS VASES,
SHALL BE PLACED ON THE APPARATUS.
WARNING: THE MAIN POWER PLUG MUST REMAIN READILY OPERABLE.
CAUTION: TO REDUCE THE RISK OF ELECTRIC SHOCK, GROUNDING OF
THE CENTER PIN OF THIS PLUG MUST BE MAINTAINED.
WARNING: TO REDUCE THE RISK OF FIRE OR ELECTRIC SHOCK, DO NOT
EXPOSE THIS APPRATUS TO RAIN OR MOISTURE.
WARNING: TO PREVENT INJURY, THIS APPARATUS MUST BE SECURELY
ATTACHED TO THE FLOOR/WALL/RACK IN ACCORDANCE WITH THE
INSTALLATION INSTRUCTIONS.
CAUTION: TO REDUCE
THE RISK OF ELECTRIC
SHOCK, DO NOT REMOVE
COVER. NO USERSERVICABLE PARTS
INSIDE. REFER
SERVICING TO
QUALIFIED SERVICE
PERSONNEL.
This product is AC only.
THE EXCLAMATION
POINT WITHIN THE
TRIANGLE IS A
WARNING SIGN
ALERTING YOU OF
IMPORTANT
INSTRUCTIONS
ACCOMPANYING
THE PRODUCT.
TECHNICAL QUESTIONS EMEA
Bosch Security Systems Technical Support EMEA
http://www.rtsintercoms.com/contact_main.php
DISCLAIMER
The manufacturer of the equipment described herein makes
no expressed or implied warranty with respect to anything
contained in this manual and shall not be held liable for any
implied warranties of fitness for a particular application or
for any indirect, special, or consequential damages. The
information contained herein is subject to change without
prior notice and shall not be construed as an expressed or
implied commitment on the part of the manufacturer.
Bosch Security Systems, Inc.
Technical Manual
F.01U.193.291
Rev. 06
RVON-16 iii
Important Safety Instructions
1.Read these instructions.
2.Keep these instructions.
3.Heed all warnings.
4.Follow all instructions.
5.Do not use this apparatus near water.
6.Clean only with dry cloth.
7.Do not block any ventilation openings. Install in accordance with the
manufacturer’s instructions.
8.Do not install near any heat sources such as radiators, heat registers, stoves,
or other apparatus (including amplifiers) that produce heat.
9.Do not defeat the safety purpose of the polarized or grounding-type plug. A
polarized plug has two blades with one wider than the other. A grounding
type plug has two blades and a third grounding prong. The wide blade or the
third prong are provided for your safety. If the provided plug does not fit
into your outlet, consult an electrician for replacement of the obsolete outlet.
10.Protect the power cord from being walked on or pinched particularly at
plugs, convenience receptacles, and the point where they exit from the
apparatus.
11.Only use attachments/accessories specified by the manufacturer.
12.Use only with the cart, stand, tripod, bracket, or table specified by the
manufacturer, or sold with the apparatus. When a cart is used, use caution
when moving the cart/apparatus combination to avoid injury from tip-over.
13.Unplug this apparatus during lightning storms or when unused for long
periods of time.
14.Refer all servicing to qualified service personnel. Servicing is required
when the apparatus has been damaged in any way, such as power-supply
cord or plug is damaged, liquid has been spilled or objects have fallen into
the apparatus, the apparatus has been exposed to rain or moisture, does not
operate normally, or has been dropped.
Features ....................................................................................................................................................4
Digital ..................................................................................................................................................................4
Installation of the RVON-16 Card into the ADAM System ....................................................................9
Color Key Code .................................................................................................................................................10
Addresses and the RVON-16 Card ....................................................................................................................10
Switches and Connections .....................................................................................................................11
Configuring the RVON-16 Card with AZedit .......................................................................................13
RVON Connection Status Screen ..........................................................................................................15
Download RVON-16 Firmware through AZedit ...................................................................................22
Configuring RVON-16 using RVONedit ..............................................................................................24
LAN (Local Area Network) vs. WAN (Wide Area Network) ..........................................................................27
Local Area Network ....................................................................... ................................................................27
WIDE AREA NETWORK .................................................................................... .... ..... ................................28
ACCESSING THE WIDE AREA NETWORK (WAN) ...................................................................................29
IP ADDRESSES ................................................................................................................................................31
Ping a Computer ................................................................................................................................................32
POSSIBLE PITFALL WITH ROUTERS, GATEWAYS, AND SWITCHES .................................................33
Description of the RVON-16 Voice Over Network Card
Like the RVON-8, the RVON-16 is installed into the ADAM intercom frame, the RVON-16 provid es vo ice over IP
communications for the RTS ADAM intercom family of products. Voice over IP technology sends voice (audio) information
in digital form using discrete packets rather than the traditional telephone network. The R VON-16 is an integrated solution for
connecting custom keypanels to the Intercom Matrix over standard IP networks by supporting 16 channels (ports) of Audio in
and out.
The RVON-16 supports all standard, hot-swappable and configurable options through Bosch’s RVONedit VoIP configuration
software, as well as support for remote keypanels and virtual keypanels via VoIP (voice over internet protocol).
RVON-16 also supports RTS Intelligent Trunking over IP. Trunking is a method of using minimal audio paths for a large
number of users. Because it is flexible, a trunked system can expand along with your business, to accommodate a growing
number of users. RTS’ Intelligent Trunking is a pro ven techn ology, which provides the same capabilities and ease of use for
intercoms and the seamless routing of communications between facilities, regardless of distance.
RVON-16 is fully compatible with internationally recognized standards and supports the following prot ocols: G.711, G.729A.
and G.723 (2 speeds).
Requirements
ApplicationVersion
RVON-Keyp anelv 2.1.0 or higher
RVON-8v 2.1.0 or higher
RVON-Cv 2.1.0 or higher
RVON-IOv 2.1.0 or higher
AZeditv 3.3.1 or higher
RVONed itv 2.0.0 or higher
VKPv 2.0.0 or higher
Bosch Security Systems, Inc.
Te chnical Manual
F . 01U.193.291
Rev. 06
4 IntroductionRVON-16
Features
Installation:The RVON-16 is hot-swappable and installs into any available slot in an ADAM intercom
system. It provides a single RJ-45 Ethernet connection for use with a 10 BASE-T or
100 BASE-TX network. It also has two DB-9 connections for RS-232 or RS-485
pass-thru port.
16 channels of Audio
IN and OUT:Expands the connectivity of the ADAM intercom by supporting 16 channels or ports of
audio in and out. Each channel has configurabl e network and bandwidth parameters that
can be tailored to individual network functions, as well as ancillary data for keypanels and
trunking control.
Ethernet Compatible:Fully Ethernet capable. The RVON-16 uses standard Ethernet protocols and is compatible
with 10 BASE-T or 100 BASE-TX Ethernet compliant devices and networks.
RVONedit Configuration:Users have the ability to adjust the audio parameters of each RVON-16 channel to
optimize the available bandwidth on the network.
Trunk Capable:The RVON-16 supports ancillary data control or use with RTS Intelligent Trunking.
Addressing:16 individually addressable audio channels. The RVON-16 can simultaneously feed VoIP
capable keypanels, as well as various other matrix intercom systems.
Pass-Through Serial Port:Provides two (2) virtual serial connections via an IP connection. Which, if used while
trunking, may eliminate the need for multiple IP resources.
Physical .......................................................................................................................................................5.687” W x 11.024” L
PLAYOUT
DELAY
BANDWIDTH
SAMPLE
RATE
Bosch Security Systems, Inc.
Technical Manual
F . 01U.193.291
Rev. 06
RVON-16Introduction 5
Default Ethernet IP Addresses
TABLE 1. Default Address for the RVON Product Line
ProductDefault IP Ad dressDefault Subnet Mask
RVON-I/O192.168.0.1255.255.0.0
RVON-8192.168.0.2255.255.0.0
RVON-Keypanel192.168.0.3255.255.0.0
RVON-C192.168.0.4255.255.0.0
RVON-16192.168.0.5255.255.0.0
GPIO-16192.168.0.6255.255.0.0
MCII-e192.168.0.7255.255.0.0
Cronus192.168.0.8255.255.0.0
Zeus III192.168.0.9255.255.0.0
Bosch Security Systems, Inc.
Technical Manual
F.01U.193.291
Rev. 06
6 IntroductionRVON-16
Bosch Security Systems, Inc.
Technical Manual
F . 01U.193.291
Rev. 06
CHAPTER 2
RV ON-16 Car d Channel Assignment
RVON-16 Channels
With the introduction of RVON-16 cards into the ADAM system, the number of channels availabl e doubl es from 136 to 272
channels. This is because instead of the eight (8) channels of audio per R VON-8 card, you now have 16 channels of audio per
R VON-16 card. To be backwards compatible with the RVON-8, the RVON-16 channels have been split in to two (2) groups of
eight (8) channels; an upper group and a lower group. The channel numbering sequence follows the lower group channels
before numbering the upper group channels. For example, if you have an RVON-16 card in slot one (1) of an ADAM frame,
the bottom group of eight (8) channels has channels 1-8 assigned to them, while the top group of eight (8) channels has
channels 137 to 144 assigned to them (see Figure 1).
FIGURE 1. ADAM frame with RVON-16 cards only and the port numbering scheme
The ADAM Intercom System can run both the RVON-8 and RVON-16 card in the same frame. You can position your
RVON-8 and RVON-16 cards in any slot or in any sequence within the ADAM frame. However, when mixing the RVON
cards, it is important to consider that the channel numbering is consistent with the 2-tier channel systems. For example, in slots
1, 2, and 3, you have R VON-8 cards and in slot 4 you have a RVON-16 card. The channel numbering scheme assigns eight (8)
channels per card for the first four (4) slots. When assigning ports to slot four (4), the bottom group of channels are assigned in
sequence with the RVON-8 cards; however, the top group of ports associated with the RVON-16 card are assigned the
corresponding channels with the card position. This means channels 137 through 160 are not used and the top group of
channels used by the RV ON-16 card starts with channel 161 (see Figure 2 on page 8).
Bosch Security Systems, Inc.
Te chnical Manual
F . 01U.193.291
Rev. 06
8 RVON-16 Card Channel AssignmentRVON-16
FIGURE 2. ADAM frame with both RVON-8 and RVON-16 cards
Essentially, the channel numbering is static, in that the channel numbers used do not change whether you are using an
RVON-8 or an RVON-16 card. Rather, it is a question of whether the channels shall or shall not exist.
NOTE:You can only hot-swap similar cards in a slot to achieve proper connection. If you swap different types of RVON
cards (RVON-8 and RVON-16), connection at the destination does not occur. You must reconfigure the
destination device to point to the newly swapped RVON device.
Resize your ADAM frame to accommodate AIO-16 cards and RVON-16 cards
For information on how to upgrade your ADAM frame to high density, go to http://www.rtsintercoms.com, search Upgrading
your ADAM to High Density.
Bosch Security Systems, Inc.
Technical Manual
F . 01U.193.291
Rev. 06
CHAPTER 3
Installation
Installation of the RVON-16 Card into the ADAM System
CAUTION: The RVON-16 front card works with either an RVON-16 backcard or an RVON-8 backcard. However, if the
RVON-16 is used with an RVON-8 backcard, the second of the two RS-232 ports on the RVO N-16 is
unavailable. Similarly, an RVON-8 card works with an RVON-16 backcard, but the second RS-232 port is
unavailable. The second serial port is only available when an RVON-16 front card is used with an RVON-16
backcard.
The following firmware versions are the minimum required for RVON-16 support:
•MC V9.28.0
•MCII-e V1.6.0
•DBX V1.19.0 (w/PC V10.19.0 or w/PCII-e V1.19.0)
When inserting the RVON-16 in the ADAM system, the following considerations need to be made:
•Gently insert the RVON-16 into the correct slot. If the card is forced or twisted while inserting, a pin on the
backplane could short or break causing the card to become inoperable.
•When inserting the RVON-16 into the ADAM system, make sure to insert it into a compatible backcard. If
the card is inserted into an incompatible backcard, undesirable results can occur.
•DO NOT FORCE MATING CARDS
Bosch Security Systems, Inc.
Te chnical Manual
F . 01U.193.291
Rev. 06
10 InstallationRVON-16
Color Key Code
FIGURE 3. The RVON-16 Col or Key Code. This Key Code allows only the RVON-8 or RVON-16 to plug into a blue
coded, compatible backcard.
On the RVON-16 card, Telex has provided a color key code and knock-outs for digits 1-8 to ensure a compatible connection
between cards. The RVON-16 card color is blue, and inserts into a blue coded backcard only.
Addresses and the RVON-16 Card
Because the RVON-16 has an Ethernet interface, it is required to have a MAC (Media Access Control) address. This is a low
level address that contains 48 bits. Do not confuse this address with an IP (Internet Protocol) Address. In order to be IP
compliant, all cards must have a unique MAC ID when shipped from the manufacturer. Typically, the MAC ID of a piece of
hardware, such as the RVON-16 card, has a fixed or static address. Whereas, the RVON-16 card’s IP Address can change over
time.
The MAC Address uniquely identifies each node of a network and interfaces directly with the network media. The RVON-16
has a small 8-pin serial device on the board that the processor can read the unique MAC Address from. For more information,
on MAC IDs, contact technical support.
Bosch Security Systems, Inc.
Technical Manual
F . 01U.193.291
Rev. 06
RVON-16Installation 11
Switches and Connections
IMPORTANT:You must remove the card from the frame in order to change any DIP switch settings.
The RVON-16 card, unlike the RVON-8 card has two banks of eight DIP Switches.
DIP Switch 1AZedit Configuration Disable
Closed: Configuration via AZedit is disabled.
Open (Default): Configuration via AZedit is enabled.
Description: Disables configuration changes via AZedit. AZedit is still able to view the RVON
configuration and status. The configuration can be changed via the serial and Telnet connections.
DIP Switch 2Configuration File Save Location
Closed: The RV ON card holds the definitive configuration file.
Open (Default): The Master Controller holds the definitive configuration file.
Description: Assigns where the configuration file for the RVON products is to be stored, either on the
Master Controller or on the RVON card.
DIP Switch 3Not Used.
Keep in Open position.
DIP Switch 4Inhibit Reset
Closed: When enabled, the card is prevented from resetting after 30 seconds of no communication
with the system controller.
Open (Default): When disabled, the card resets after 30 seconds of no communication with the
system controller.
Description: Allows pass-through serial data to continue when the intercom is otherw ise down (i.e.,
upgrades). Mainly used to keep trunking connections open when disruptions in comm unication on
the card occur.
DIP Switch 5Password Reset
Closed: Resets the Telnet user name and password to their default values. The password is case
sensitive:
User: telex
Password: password
Also, this setting disables RVONedit and resets the authentication table in RVONedit.
Open (Default): Uses current username and password.
Description: Enables the user to reset the Telnet username and password.
DIP Switch 6Serial Monitor Enable
Closed: Enables a serial monitor on back card DB9 via Serial Port 1.
Open (Default): Enables pass-through serial port via the back card DB9 on both serial port 1 and
serial port 2.
NOTE:Serial Port 2 is always seen as the pass-through port.
Description: Selects DB9 serial configuration.
Bosch Security Systems, Inc.
Technical Manual
F.01U.193.291
Rev. 06
12 InstallationRVON-16
DIP Switch 7Boot Download Enable
Closed: Runs the boot download
Open (Default): Runs the native flash program.
Description: Switches to the boot download flash program. This program is sent with the RVON-16
card in case the native flash program becomes corrupt.
DIP Switch 8DEBUG ONLY!
Closed: Debug mode.
Open (Default): Normal operation mode.
WARNING: DIP Switch 8 must be left in the Open position. It is reserved for debugging and can
have unintended consequences.
DIP Switch 9Serial Port Select A
Closed: Select RS-485 (for serial port 1)
Open (Default): Select RS-232 (for serial port 1)
Description: Selects either RS-485 or RS-232 operation on the debug/serial pass through port.
DIP Switch 10Serial Port Select B
Closed: Select RS-485 (for serial port 2)
Open (Default): Select RS-232 (for serial port 2)
Description: Selects either RS-485 or RS-232 on the second debu g/seri al pass through port.
DIP Switches
11-15
Not Used.
Keep in Open position.
DIP Switch 16Not Available
Closed: Not Connected
Open (Default): Not Connected
FIGURE 4. RVON-16 Switch Panels
Bosch Security Systems, Inc.
Technical Manual
F . 01U.193.291
Rev. 06
RVON-16Installation 13
Configuring the RVON-16 Card with AZedit
NOTE:RVONedit version 2.0.0 has more extensive configuration options for the RVON-16 card. For more information
on purchasing RVONedit 2.0.0, contact customer service at 1-800-392-3497.
Once the RV ON-16 card is inserted into the intercom, AZedit automatically recognizes the card.
NOTE:Requires intercom firmware and AZedit software that supports RVON cards.
To configure the RVON-16 card, do the following:
1.From the Status menu, select I/O Cards.
The I/O Card Status screen appears showing a list of installed cards.
Bosch Security Systems, Inc.
Technical Manual
F.01U.193.291
Rev. 06
14 InstallationRVON-16
2.Right click an RVON-16 card, and select RVON Configuration.
The RVON Configuration screen appears.
3.From the RVON drop down list, select the slot in which the RVON-16 card resides, if it is not already selected.
4.In the IP Address field, enter the IP Address you have assigned to the RVON-16.
5.In the Network Mask field, enter the Network Mask of the network to which the RVON-16 is connected.
6.In the Default Gateway field, enter the Default Gateway Address, if applicable, of the network to which the RVON-
16 card is connected.
A Default Gateway is only required if the RVON-16 connection s are between LANs.
7.In the Target IP Addr field, enter the Target IP Address of the device you want to connect to over Ethernet.
8.From the First Serial Baud Rate drop down list, select the baud rate at which the data is transmitted for the first serial
port.
NOTE: Configuration of the 2nd pass-through port via AZedit is not supported.
NOTE: You must configure the channels settings on each end of a connection to ensure the same codec and packet
size are selected at each end. Remember, the RVON-16 card has more channels which can be configured.
9.From the R VON Channel drop down list, select the channel you want to use to communicate to another device across
the network.
10. In the Device IP Addr: field, enter the IP Address of the device to which you want to connect.
11. From the Device Type drop down list, select the type of device to which the RVON-16 card is connecting.
12. From the Device Channel drop down list, select the channel on the device to which the RVON-16 communicates.
13. From the CODEC type drop down list, select the CODEC type you want to use for this channel.
14. From the Packet Size drop down list, select the size of each audio packet.
NOTE: A CODEC is an algorithm used to compress audio. There are 5 Codices supported by Telex: G.711 s law,
G.711A, G.729AB, G.723 (5.3k), and G.723 (6.3k). The type of CODEC dictates the quality of audio you
hear and the network bandwidth used. The packet size determines how much audio is carried across the
network in each transmitted packet. The CODEC type and packet size chosen requires different amounts of
bandwidth from the network see “Specifications” on page 4. As with the CODEC type, the packet size you
choose for the audio transfer affects the audio you hear and the bandwidth you use over the network. The
larger the audio packet you choose to use, the lower the bandwidth used. However, the larger packet sized
can result in a higher delay and longer gaps if the packet is lost. On the other hand, smaller packet sizes
result in larger bandwidth use, but lower delays and smaller gaps if the packet is lost. The Intercom System
Engineer and the Network Administrator may want to work together in choosing the CODEC type and
packet size suitable for the size of the network, so degradation of the network resources does not happen.
Bosch Security Systems, Inc.
Technical Manual
F . 01U.193.291
Rev. 06
RVON-16Installation 15
15. Select Enable VAD (Voice Activity Detection), if you want to conserve bandwidth when the audio level is below a
given threshold.
Voice activity detection saves network bandwidth by stopping the flow of audio packets when silence is detected. VAD
is similar to VOX.
NOTE: At this point you may choose another channel to configure or choose another card to configure.
16. Once you are completely finished, click Apply.
Apply sends all of the changes to all the cards in the intercom, or click Cancel to discard all changes you have made.
RV ON Connection Status Screen
The RVON-16 connection status screen di splays information pertaining to RVON channel connections. You can only show
statistics for one channel on a card at a time.
NOTE:To view the RVON Connection Status screens, make sure both AZedit and the RVON-16 card are on the same
Ethernet network. The reason this is important is because the statistics are updated once per second. At this rate
of dynamic update, a serial port could not pass the data effectively.
To view the RVON Connection Status screen, do the following:
1.From the Status menu, select I/O Cards.
The I/O Card Status screen appears showing the types of installed cards.
2.Right click the card with which you want to work.
A context menu appears.
3.Select RVON Con nection Status.
The RVON Connection Status screen appears. The connection screen contains five (5) pages of information about the
selected channel and are described in detail on the following pages.
Bosch Security Systems, Inc.
Technical Manual
F.01U.193.291
Rev. 06
16 InstallationRVON-16
Screen ItemDescription
Select Local Card and Channel
RVON CardThe card for which you want to view the status
From the RVON drop do wn list, select the card you want to view.
IP AddressDisplays the IP (Internet Protocol) Address of the card you select
Local ChannelOne (1) of 16 channels supported by the RVON card.
From the Channel drop down list, select the channel for which you want to view
the status
Remote Connection Information
Device TypeDisplays the type of device the RVON card is connected to on the other end of
the channel.
IP AddressDisplays the IP Address of the device connected at the other end of the channel.
Remote ChannelDisplays the channel at the other end of the connection that the device is using.
Bosch Security Systems, Inc.
Technical Manual
F . 01U.193.291
Rev. 06
RVON-16Installation 17
Screen ItemDescription
Attempts/DropsThe number of times a call attempt has been made and dropped.
NOTE:The number of attempts should always be one greater than the
number of drops.
Current Call StateThe state of the connection. There are two connection states: Connected or Idle.
Origination/TerminationDisplays which end of the connection originated or terminated the call.
Local: RVON device
Remote: Device at the other end of the connection
Release ReasonDisplays why the connection was terminated, for example, congestion, network
error, local release, remote release.
Connection DurationDisplays the duration of the connection. This is shown in hh/mm/ss.
Compression AlgorithmDisplays what type of configuration the connection is using. This can be
Audio Packet Size
Voice Activity Detect (VAD)
different than the original configuration if both ends of the channel are not
configured the same. If the configuration is different, these fields are red.
Bosch Security Systems, Inc.
Technical Manual
F.01U.193.291
Rev. 06
18 InstallationRVON-16
Screen ItemDescription
VOIP Playout Statistics
Playout Buffer SizeDisplays how much audio can be received from the network before packets are
lost. This is four times bigger than configured packet size. This is a static system
setting.
Nominal Playout DelayDisplays how much audio is collected before playout begins. Playout begins at half
the Playout Buffer Size, which is two times the configured packet size. This is a
static system setting.
Average Playout DelayDisplays the actual average audio collected before packets are played out. This is
measured over the length of the connection.
Voice Playout Buffer UnderrunDisplays the number of times that packets were not played because the Playout
Buffer was empty.
NOTE:If VAD is enabled, there are playout buffer runs because there are no
packets being received during silence.
Voice Playout Buffer OverrunDisplays the number of packets that were discarded because the Playout Buffer
was full.
Missing Sequence PacketDisplays how many audio packets were missed in the sequence.
Replaced PacketsDisplays how many audio packets were replayed.
Average Frame JitterDisplays the measure of consistency of packet arrival times. Lower jitter is better.
Bosch Security Systems, Inc.
Technical Manual
F . 01U.193.291
Rev. 06
RVON-16Installation 19
Screen ItemDescription
Network Statistics
Voice Playout Packets (Tx/Rx)Displays the number of voice packets transmitted and received from the other side of
the connection.
DTMF Relay Packets (Tx/Rx)Displays the number of DTMF (dual tone multiple frequency) relay packets
transmitted and received. DTMF relay packets are a bandwidth and quality saving
feature within the RVON devices.
Silence Detection Packets (Tx/
Rx)
Displays the number of times a silence detection packet has been sent or received.
VAD (voice activity detection) must be enabled.
Silence Suppressed Packets (Tx)Displays the number of packets never sent because the packets contained silence.
Packet Interarrival Time (Min/
Displays the minimum and maximum time elapsed between packets being sent.
Max)
Recent Bandwidth Use (Tx/Rx)Displays the amount of bandwidth used in Kbytes/sec over the length of the call.
This is calculated by the number of voice packets transmitted and received over the
last 10 seconds.
Average Bandwidth Use (Tx/Rx)Displays the amount of bandwidth used in Kbytes/sec over the length of the call.
This is calculated by the number of voice packets transmitted and received and the
length of the connection.
Bosch Security Systems, Inc.
Technical Manual
F.01U.193.291
Rev. 06
20 InstallationRVON-16
Screen ItemDescription
Error Counts
Invalid HeadersDisplays how many IP packets could not be parsed.
Invalid MAC AddressDisplays how many invalid MAC addresses tried to connect.
Invalid SSRCDisplays the number of packets with an invalid SSRC.
Invalid PayloadDisplays how many incorrectly formatted packets were received.
DSP to Micro OverrunDisplays the number of packets that were lost because the Micro was too busy to
receive.
Invalid DestinationDisplays how many invalid destinations were received.
Lost Packets Displays how many packets were lost.
Bosch Security Systems, Inc.
Technical Manual
F . 01U.193.291
Rev. 06
RVON-16Installation 21
Screen ItemDescription
SERIAL TO ETHERNETThe Serial to Ethernet information shows the serial data that is received on the
serial connection and transferred to the Ethernet address of the card to which the
serial data is sent.
Bytes TransferredDisplays the number of bytes transferred from the serial connection to Ethernet.
Bytes LostDisplays the number of bytes that could not be transferred.
ErrorsDisplays the number of errors that occurred during transfer.
Tx IP AddressDisplays the IP Address of the card the serial data is sent.
Baud RateDisplays the baud rate of the serial connection.
ETHERNET TO SERIALThe Ethernet to Serial information shows the serial data that is received on the
Ethernet connection and transferred to the serial connection.
Bytes TransferredDisplays the number of bytes that have been transferred to the serial port.
Bytes LostDisplays the number of bytes that could not be transferred.
ErrorsDisplays the number of errors that occurred during transfer.
Rx IP AddressDisplays the IP Address from which data was last received via Ethernet (this
address should match the Tx IP Address).
Unexpected BytesDisplays the number of unexpected bytes of data.
Unexpected bytes is data that has come from any IP address that is not the Tx IP
Address. The bytes of data are considered unexpected bytes and are not
transferred.
Bosch Security Systems, Inc.
Technical Manual
F.01U.193.291
Rev. 06
22 InstallationRVON-16
Download RVON-16 Firmware through AZedit
NOTE:AZedit sends the program directly to the RVON-16 card over Ethernet. This is different from other I/O cards that
receive the firmware from the Master Controller. For this reason, verify the PC running AZedit is on the same
network as the RVON-16 card. If it is not, AZedit is not be able to find the card. To test the connection, ping the
RVON card from a command line. For more information on testing for a connection, see “Ping a Computer” on
page 32.
To download firmwa re to the RVON-16 card from AZedit, do the following:
1.Open AZedit.
2.From the Status menu, select Software Versions, then I/O Cards.
The I/O Card Version Information screen appears showing the occupied slots in the system.
3.Highlight the Version to be updated.
You may select more than one version at a time by holding the Ctrl key down while you select.
4.Right click the high-lighted selections and select Download Firmware.
The Firmware Download window appears.
5.Using the browse feature, browse to the file to be downloaded.
Bosch Security Systems, Inc.
Technical Manual
F . 01U.193.291
Rev. 06
RVON-16Installation 23
6.Click Open.
The Download Device Firmware window appears.
7.Click Begin Download.
The download begins. Once the download shows 100% a message (shown below) appears.
8.Click OK.
The RVON-16 firmware download is complete. This takes a minute or two to occur.
9.Verify the version upgrade in the I/O Card Version Information Window.
CAUTION:Do not power down the frame or pull the RVON-16 card (s) from the frame until you have
verified the new version information from AZedit. If the card loses power while
reprogramming the onboard flash memory, the card may become unbootable, and may need to
have its flash chips replaced.
Bosch Security Systems, Inc.
Technical Manual
F.01U.193.291
Rev. 06
24 InstallationRVON-16
Configuring RVON-16 using RVONedit
NOTE:If you are using R VON-16 with RVONedit, you must use RVONedit version 2.0.0. Please contact your customer
service representative for ordering details.
R VONedit is a W indows-based, GUI (graphical user interface) application designed exclusively for Bosch RVON/V oIP-ba sed
products. It can be used to display or configure R VON (VoIP) options associated with the different devices. RVONedit is to the
VoIP products as AZedit is to ADAM, Cronus, and Zeus. There are five (5) RVON devices in the RVON family:
•RVON-8
•RVON-I/O
•RVON-Keypanel
•RVON-C
•RVON-16
Bosch Security Systems, Inc.
Technical Manual
F . 01U.193.291
Rev. 06
RVON-16Installation 25
RVON-16 Backcard
FIGURE 5. RVON-16 Backcard
RJ-45 PINFunctionDB-9PINFunction
1Ethernet TPO+1N/A
2Ethernet TPO-2RXD, RVON-16 Received Data
3Ethernet TPI+3TXD, RVON-16 Received Data
4TPO+4N/A
5TPO-5GND
6Ethernet TPO-6N/A
7TPI+7N/A
8TPI-8N/A
9N/A
Bosch Security Systems, Inc.
Technical Manual
F.01U.193.291
Rev. 06
26 InstallationRVON-16
LINK
ACT
RVON-16
1
0
2
3
4
6
5
7
8
9
10
11
22
23
20
21
18
19
16
17
14
15
12
13
1
2
LED Explanation
RED LEDGREEN LED
23VOIP not connected - Channel 1VOIP connected - Channel 1
22VOIP not connected - Channel 2VOIP connected - Channel 2
21VOIP not connected - Channel 3VOIP connected - Channel 3
20VOIP not connected - Channel 4VOIP connected - Channel 4
19VOIP not connected - Channel 5VOIP connected - Channel 5
18VOIP not connected - Channel 6VOIP connected - Channel 6
17VOIP not connected - Channel 7VOIP connected - Channel 7
16VOIP not connected - Channel 8VOIP connected - Channel 8
15VOIP not connected - Channel 9VOIP connected - Channel 9
14VOIP not connected - Channel 10 VOIP connected - Channel 10
13VOIP not connected - Channel 11VOIP connected - Channel 11
12VOIP not connected - Channel 12 VOIP connected - Channel 12
11VOIP not connected - Channel 13 VOIP connected - Channel 13
10VOIP not connected - Channel 14 VOIP connected - Channel 14
9VOIP not connected - Channel 15VOIP connected - Channel 15
8VOIP not connected - Channel 16VOIP connected - Channel 16
7Pass-Through Serial TX 1Pass-Through Serial RX1
6Pass-Through Serial TX 2Pass-Through Serial RX2
5RS-232 Enabled - Channel 1
4Shell Log Message (TX)RS-232 Enabled - Channel 2
3Ethernet Half DuplexEthernet Full Duplex
2Ethernet 10MbpsEthernet 100Mbps
1Ethernet Not ‘AUTO’Ethernet Link Good
0Control Bus TXControl Bus RX
The VOIP Red and Green LEDs 8-23 display different states of the VOIP connection:
Green LED on, Red LED off .................................................................................................................................VOIP Connection Connected
Green LED winks on and off; Red LED off...........................................................................................................VOIP Connected to keypanel
Green LED off; Red LED on...... .. .................................. .............................................................................VOIP Configured but not connected
Green LED off; Red LED off...................................... .................................. .................................................VOIP Connection Not Configured
Bosch Security Systems, Inc.
Technical Manual
F . 01U.193.291
Rev. 06
APPENDIX A
Basic Network Configuration
Basic Network Configuration
This section covers basic network configuration set-up and testing. Also covered are basic concepts and operations, including
the difference between LAN and WAN networks and how IP Addressing is used.
In a networked environment, such as a company, typically there are many computers connected together using a router or a
switch. In larger companies, there may be several different routers distributed in buildings and plant locations. A router allows
any LAN-side computer to communicate with other computers and devices outside the LAN (local area network). Routers
send data packets from one place to another place on a network. routers use network addresses to route packets to the correct
destination. For example, in a TCP/IP network, the IP (internet protocol) address of the network interface is used to direct
router destinations.
Because routers help computers inside the LAN talk with computers outside of the LAN, the security of a company’s LAN
may be compromised by gaps of open ports in the router. Security measures may have been instituted to compensate for these
vulnerabilities. Consult you network administrator to learn about the security measures taken to protect your network. VPN, or
virtual private network, is one such security measure to protect the intelligence of the LAN. A computer outside the LAN must
have an address or key known by the VPN to allow access to the LAN. Many companies use a VPN to connect two different
LANs, thus allowing the transfer of data between two networks.
LAN (Local Area Network) vs. WAN (Wide Area Network)
Local Area Network
Simply put, a LAN is a computer network that connects a relatively small area (a single building or group of buildings). Most
LANs connect workstations and computers to each other. Each computer (also known as a “node”), has its own processing unit
and executes its own programs; however, it can also access data and devices anywhere on the LAN. This means many users
can access and share the same information and devices. A good example of a LAN device is a network printer. Most
companies cannot afford the budgetary or hardware expense of providing printers for each of its users; therefore, one printer
(or device) is placed on the LAN where every user can access the same printer.
The LAN uses IP Addresses to route data to different destinations on the network. An IP Address is a 32-bit numeric address
consisting of four numbers separated by periods (for example, 1.160.10.240).
NOTE:For more information on IP Addresses, see you local network administrator.
Bosch Security Systems, Inc.
Te chnical Manual
F . 01U.193.291
Rev. 06
28 RVON-16
FIGURE 6. Local Area Network Diagram
WIDE AREA NETWORK
A wide area network (WAN) connects two or more LANs and can span a relatively large geographical area. For example,
Telex Headquarters in Burnsville, MN is connected to several branch offices in Nebraska and Arkansas over a WAN. The
largest WAN in existence is the Internet.
FIGURE 7. Wide Area Network Diagram
Bosch Security Systems, Inc.
Technical Manual
F . 01U.193.291
Rev. 06
RVON-16 29
ACCESSING THE WIDE AREA NETWORK (WAN)
Figure 3 shows LAN IP Addresses using a common IP Address, 10.2.100.X (192.168.X.X is another common address). Most
devices are shipped with these addresses as its default. It is recommended to use these addresses for LANs.
FIGURE 8. Network Address Translation
NETWORK ADDRESS TRANSLATION (NAT)
Using the initial IP Address, then converting it to a valid WAN IP Address is how the network address translation works, in
theory . Once the IP address is changed, it is up to the network interface device (such as a router, gateway, switch, etc.) to keep
track of which computers are talking on which ports. For example, if two local devices (PC1 and PC2 in Figure 3) both wanted
to talk via port 1031, then the network interface device would have to change one of the port requests to the next available port,
1032.
PORTS
In general, a network port is an endpoint to a logical connection. The port number identifies what type of port it is. For
example, port 80 is used for HTTP traffic. When you type an address into the address bar of a web browser, your computer
goes to find an IP Address for the url you are requesting (http://www.telex.com). To obtain this address, the computer contacts
a DNS server (Domain Name Server). Once the IP Address is found, it tries to connect to the http port of the network device
(port 80). See Ta ble 1 for a list of the more well-known port numbers.
Each network device can be set-up to respond or not respond to the various ports. The function of responding or “hosting a
service” is called “serving”.
TABLE 2. Packet Translation
Packet before TranslationPacket after Tr anslation
If a second workstation on the LAN wants to communicate to the same server, and happens to use the same source port
number, then the LAN Modem translates the source port number as well as the source IP address. In Table, 2, a second LAN
computer wants to access a web page. The NAT device now uses port 1032 for this connection where it used port 1031 in
Table 1.
Bosch Security Systems, Inc.
Technical Manual
F.01U.193.291
Rev. 06
30 RVON-16
TABLE 3. Packet Translation
Packet before TranslationPacket After T ranslation
Amazingly , all the address translation that occurs takes place
automatically in order to make web browsing and other
functions easier. This is also a way for large web hosting
services to speed up the network by having different devices
perform different functions.
TABLE 4. Well-known TCP Port Numbers
Port NumberDescription
1
TCP Port Service Multiplexer
(TCPMUX)
5Remote Job Entry (RJE)
7ECHO
18Message Send Protocol (MSP)
20FTP-Data
21FTP- Control
23Telnet
25Simple Mail Transfer Protocol (SMTP)
29MSG ICP
37Time
42Host Name Server (Nameserv)
43Whols
49Login Host Protocol (Login)
53Domain Name Server (DNS)
69Trivial File Transfer Protocol (TFTP)
70Gopher Service
79Finger
80HTTP
103X.400 Standard
108SNA Gateway Access Server
109POP2
110POP3
115Simple File Transfer Protocol
118SQL Services
TABLE 4. Well-known TCP Port Numbers
Port NumberDescription
119Newsgroup (NNTP)
137NetBIOS Name Service
139NetBIOS Datagram Service
143Interim Mail Access Protocol (IMAP)
150NetBIOS Session Service
156SQL Server
161SNMP
179Border Gateway Protocol (BGP)
(SNPP)
445Microsoft-DS
458Apple Quick Time
546DHCP Client
547DHCP Server
563SNEWS
569MSN
1080Socks
Bosch Security Systems, Inc.
Technical Manual
F . 01U.193.291
Rev. 06
RVON-16 31
IP ADDRESSES
If you do not know your IP Address, you can open a DOS screen in a Windows- based environment and bring up the ipconfig
screen.
To find your IP Address using ipconfig, do the following:
1.From the Start Menu, open a Command Prompt screen.
2.At the prompt, type ipconfig, then press Enter.
The IP configurations appear for your machine, such as the DNS suffix, IP Address, Subnet Mask, and Default
Gateway.
3.At the prompt, type Exit to close the screen.
NOTE: If you want more detailed parameters for your machine, type ipconfig/All. This screen shows the computers
network configuration settings.
Bosch Security Systems, Inc.
Technical Manual
F.01U.193.291
Rev. 06
32 RVON-16
Ping a Computer
Pinging a computer on the network makes sure it is able to be “seen” and receive messages on the network.
NOTE:You can also ping your RVON-8 card to verify that it is responding over the network by putting the cards IP
Address in place of the computer IP Address.
To Ping a computer on the network, do the following:
1.From the Start menu, select Run....
2. At the Run command, type CMD to open a Command Prompt screen.
3.At the prompt, type the IP Address of the computer you wish to ping (for example, 10.2.100.130).
4.Press Enter.
NOTE: If the computer you are pinging is not responding to the ping, you receive a time-out message in the
command prompt screen.
Bosch Security Systems, Inc.
Technical Manual
F . 01U.193.291
Rev. 06
RVON-16 33
POSSIBLE PITFALL WITH ROUTERS, GATEWAYS, AND SWITCHES
Anytime computers communicate through routers, gateways, and switches, they may be allowed or denied th e connection.
Network interface devices can be configured to block specific outgoing requests, as well as incoming requests, based on the IP
Address and/or port. This is one of the security mechanisms of a router. This also happens when broadcast messages are sent
and received.
To view the path an IP Address takes to retrieve information, do the following:
1.From the Start Menu, open a Command Prompt screen.
2.At the prompt, type tracert and type the url or IP Address you want to trace.
3.Press Enter.
The details of the tracer route are displayed.
NOTE: The message request timed out appears if the IP Address port in or out is denied to the incoming or outgoing
message.
4.When you are finished, type exit to close the Command Prompt window.
Bosch Security Systems, Inc.
Technical Manual
F.01U.193.291
Rev. 06
34 RVON-16
RVON Configuration
RVON cards use ports for communication of audio and control packets. Because routers can be configured to block certain
incoming and outgoing requests, you need to open the following ports in your network to allow WAN connections to and from
a Network Interface Device. See Table X for the ports that need to be opened for the RVON cards to operate properly.
TABLE 5. Ports necessary for RVON card functionality.
PortPort Description
2076UDP Call Control Signalling
2077UDP Audio Packets
2079
2080TCP Telex Keypanel Protocol
2081UDP Pass Through Serial
2082TCP Firmware Download
2100Remote Administration
2102Authentication Server
UDP Telex Proprietary
Signalling
Below, is an example of a router configuration screen. Not all routers are configured the same way and may not look exactly
like this screen.
Figure 6. Linksys Port Range Window
NOTE:Linksys supports up to 253 nodes on a router. This is why it is called a Router/Switch because there are WAN
functions like a router as well as having a 4-port LAN switch. It also does not support simultaneous forward and
DHCP.
Bosch Security Systems, Inc.
Technical Manual
F . 01U.193.291
Rev. 06
RVON-16 35
Network Terminology
BridgeA bridge is a device that connects two LANs, or two segments of the same LAN that use the
same protocol. Sometimes called “transparent bridges” they work at the OSI model layer 2.
Simply put, they are not concerned with protocols. Their main job is to pass data to a
destination address that is predetermined in the data packet.
With a bridge, all of your computers are on the same network subnet (s ee Subnet). This means
your computers can communicate with each other an have their own internet connection. If
you assign your own IP addresses be sure to use the same first three (3) octets of the IP
address (for example, 192.168.0.X).
Domain Name Server
(DNS)
A DNS Server is an internet service that translates domain names (for example, in the URL
http//www.telex.com, the domain name is telex.com) into IP addresses. The internet is based
on IP address which are numeric, and since domain names are alphabetic, they are easier to
remember. Every time a domain name is used it must go through the DNS server to be
translated.
GatewayA gateway is a node on a network that serves as an entrance to another network. The gateway
routes traffic from a computer to an outside network that is serving the web pages. For
example, the gateway for a home computer is the ISP provider that connects the user to the
Internet.
In a corporate environment, the gateway often acts as a proxy server and a firewall. Gateways
are similar to routers and switches, in that they forward data to the destination and provide the
path for which the data travels to the destination.
HubA hub is a common connection point for devices in a network. A hub has multiple ports.
When a data packet arrives at a hub, it is copied and distributed to all of its ports so that all
nodes on the LAN can see the packets.
There are three types of hubs:
passive hub - this hub serves as a conduit for the data, enabling it to go from one
device to another.
intelligent hub - (also known as manageable hubs) this hub includes additional
features that enable administrators to monitor traffic through the hub.
switching hub - this hub reads the destination address of each packet and then
forwards the data pack to the appropriate port.
IP Address
(Internet Protocol
Address)
Bosch Security Systems, Inc.
An IP Address is an identifier or numerical name for a computer or device on a network. Data
between computers are routed over the network using these addresses to identify the
computer the message being sent to and the computer the message is being set from.
The format of an IP Address is a 32-bit numeric address written as four numbers separated by
periods. For example, an IP Address looks like 10.100.1.1.
When working within an isolated network (meaning there is no Internet access), IP Addresses
can be assigned at random just as long as they are unique to each computer and device. When
the isolated network is connected to the INternet, registered Internet Addresses must be
obtained. This is to prevent duplication of addresses.
The four numbers in an IP Address are used in different ways to identify a particular network
and host on the network. There are three (3) classes of Internet Addresses:
CLASS A: supports 16 million hosts on each of 127 networks.
CLASS B: supports 65,000 hosts on each of 16,000 networks.
CLASS C: supports 254 hosts on each of 2 million networks.
Technical Manual
F.01U.193.291
Rev. 06
36 RVON-16
LANA LAN is a computer network that connects a relatively small area (a single building or group
of buildings). Most LANs connect work stations and computers to each other. Each c omputer
(also known as a “node”) has its own processing unit and executes its own programs;
however, it can also access data and devices anywhere on the LAN. This means that many
users can access and share the same information and devices. A good example of a LAN
device is a network printer. Most companies cannot afford the budgetary or hardware expense
of providing printers for each of its users; therefore, one printer, (i.e., device) is placed on the
LAN where every user can access the same printer.
The LAN uses IP addresses to route data to different destinations on the network. An IP
address is a 32-bit numeric address written as four numbers separated by per i ods (for
example, 1.160.10.240).
PortA port, when referring to TCP and UDP networks, is an endpoint in a logical connection. The
port number identifies the type of port it is. For example, port 80 is used for HTTP traffic.
RoutersA router is a device that forwards data packets over networks. Most commonly, a router is
connected to at least two (2) networks (normally LANs or WANs). Routers are located at
gateways, the place where two networks are connected. Routers do little data filtering, they
mainly deliver the data.
SubnetA subnet is a portion of a network that shares a common address component. On a TCP/IP
network, a subnet is described as all computers or devices wh ose IP Address have the same
prefix.
Subnetting a network is useful because it provides security for the network, as well as,
increases performance of the network. IP networks are divided using subnet masks.
SwitchesA switch is a device that filters and forwards data packets between networks. Switches
operate at the data layer, and sometimes at the network layer.
WANA wide area network connects two or more LANs and can span a relatively large geographical
area. For example, Telex Headquarters in Burnsville, MN is connected to several branch
offices in Nebraska and Arkansas over the wide are a network. The largest WAN is the
Internet.
Bosch Security Systems, Inc.
Technical Manual
F . 01U.193.291
Rev. 06
In this chapter, find the following drawings:
•AZedit Via RVON-8 RS-232 Mode
•CS9500 Trunking Via RVON-I/O To RVON-8
•ADAM Trunking Via RVON-8
•Zeus II Trunking Via RVON-I/O To RVON-C
•Cronus Trunking Via RVON-I/O To RVON-8
APPENDIX A
RV ON Trunking Connections
Bosch Security Systems, Inc.
Te chnical Manual
F . 01U.193.291
Rev. 06
38 RVON-16
Bosch Security Systems, Inc.
Technical Manual
F . 01U.193.291
Rev. 06
RVON-16 39
FIGURE 9. AZedit Via RVON-8 RS-232 Mode
Bosch Security Systems, Inc.
Technical Manual
F. 01U.193.291
Rev. 06
40 RVON-16
FIGURE 10.
CS9500 Trunking Via RVON-I/O To RVON-8
Rev. 06
F. 01U.193.291
Te chnical Manual
Bosch Security Systems, Inc.
RVON-16 41
FIGURE 11. ADAM Trunking Via RVON-8
Bosch Security Systems, Inc.
Technical Manual
F. 01U.193.291
Rev. 06
42 RVON-16
FIGURE 12.
Zeus II Trunking Via RVON-I/O to RVON-C
Rev. 06
F. 01U.193.291
Te chnical Manual
Bosch Security Systems, Inc.
RVON-16 43
FIGURE 13. Cronus Trunking Via RVON-I/O To RVON-8
Bosch Security Systems, Inc.
Technical Manual
F. 01U.193.291
Rev. 06
44 RVON-16
FIGURE 14.
RVON-16 Trunking
Rev. 06
F. 01U.193.291
Te chnical Manual
Bosch Security Systems, Inc.
RVON-16 45
Notes
Bosch Security Systems, Inc.
Technical Manual
F. 01U.193.291
Rev. 06
Bosch Security Systems, Inc.
12000 Portland Avenue South
Burnsville, MN 55337 U.S.A.
www.boschcommunications.com
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.