SE 5850 Security Management System
|
|
- Lorin Wilkerson
- 8 years ago
- Views:
Transcription
1 SE 5850 Security Management System DOS-Based Host Software A/E Guideform Specification Version 1.0
2 NOTES: The following A/E Guideform Specification conforms to CSI guidelines to provide Specifiers an easy way to include Westinghouse Security Electronics products in their specifications. The specifier should carefully select the portions of this document that fit the intended application. Feel free to consult with your Westinghouse Security Electronics systems integrator regarding your particular application. Optional feature choices are represented by items enclosed in brackets [ ]. This document is considered accurate through the date on the cover. For updated specifications, call Westinghouse Security Electronics at , or visit the WSE Web page at The following individuals and organizations contributed to this document: Editor/project team leader: - Brent A. Duncan, Marketing Publications Specialist Core team members: - Joe Bridgman, Area Sales Manager - Brian Giampaoli, Area Sales Manager - Joe Oesterle, US Sales Manager With contributions by: - Frank Binzoni, VP Sales & Marketing - Ken Butte, Project Manager/Readers and Cards - Bill Blasdell, VP Engineering - James Collins, Senior Design Engineer - Dana Frischer, Area Sales Manager - Susan Goldin, Technical Writer - Tim Hillbun, System Test & Evaluation Manager - Peter Keep, Marketing Services Manager - Steve Lever, Field Service Engineer - Troy Mickle, Marketing Communications Specialist - Jim Reeve, Software Engineer - Alec Ratliff, Field Service Engineer - Bill Richardson, Technical Instructor - Ping Saye, Design Enginerring Manager - Tony Smith, Software Engineer - George Souza, Project Team Director - Rick Sparks, Project Manager/Controllers - Matt Wenzel, Field Service Manager With special thanks to: - John Suhr, Engineering Director, Tomasi-Dubois & Assoc. Sec. Consultants - Construction Services Institute WSE 3/21/ ii SE 5850 Host Software
3 Table of Contents PART I GENERAL INTRODUCTION...1 A. This document describes the required Electronic Card Access and Security Management Host Management Software (Host Software or SE 5850)....1 B. This specification provides all information necessary to produce a complete proposal for a sophisticated, easy-to-use DOS-based electronic Host Software system. The appendixes contain hardware specifications necessary to select the proper equipment for an installation GENERAL DESCRIPTION...1 A. Host Software: Required Host Software shall: Be powerful and multi-functional with the ability to expand as project needs grow Be simple and economical enough to support a single site, yet powerful enough to manage a multi-site network Allow for future Software features to be added as management recognizes requirements Allow the operation of a Co-Session second terminal as an alternative Software operation or monitoring station Host Software shall be designed to control Westinghouse Security Electronics third and fourth-generation security architecture, and will fully support all of the following Controllers: ALTO 818 Series, SE 422 Series and NexSentry 4100 Series...1 B. Host Computer Hardware: [SE 5850 Host Software shall be bundled with a powerful Hewlett Packard XM3 computer that is configured to give Host Software optimum performance.] or [SE 5850 Host Software shall be a software-only package for use with a DOS-based IBM compatible computer with a Pentium processor.] See PART II.4.A for recommended hardware platform DESCRIPTION OF WORK...1 A. Installation: Installing the Security Management Software and bringing it to operational status requires the following major steps: Determine operational requirements and plan Software to implement them Install Controllers and related hardware Configure Controllers and 5850 to communicate with one another Enter security system database Test security system communications and operation including CO- Sessions second terminal as required Train operators See section 2.03 for an expansion of this work summary SUBMITTALS...1 A. Block Diagram: Submittals shall include a block diagram detailing all connected devices. This document shall be adequate to ensure that all parties involved can determine that the recommended Software meets security system requirements QUALITY ASSURANCE...1 A. Computer workstation: If Software Host is bundled with a Hewlett-Packard PC workstation or approved alternative, hardware shall meet UL and FCC requirements for class A computing devices....1 B. Manufacturer: Manufacturer of products defined in this section must have: Industry experience: Company must have at least 20 years experience in manufacturing and servicing access management systems ISO 9001 Certification: Manufacturing process of company must meet stringent standards of ISO 9001 Certification WARRANTY...2 A. Computer workstation: The Host Computer hardware shall be warranted for at least 15 months from the date of shipment from the factory. The manufacturer shall support hardware repair for the system computer hardware through Hewlett-Packard s worldwide service organization...2 B. Software: The manufacturer shall directly support software for the selected system product family...2 WSE 3/21/ iii SE 5850 Host Software
4 C. Extended warranty: Extended warranty terms at reasonable rates shall be available from the installing dealer...2 D. System integrator: The system integrator shall be the focal point of all service problems or questions (with manufacturer s full support)...2 PART II PRODUCTS MANUFACTURER...2 A. Westinghouse Security Electronics 5452 Betsy Ross Drive Santa Clara, CA Telephone: Fax: B. Approve equal MANUFACTURED UNITS...2 A. The Access Management System shall consist of the following components: Host hardware: IBM compatible PC with Pentium processor running DOS system 3 or later and SE 5850 Host Software CI-1 & CI-8 Multiplexer Remote Interface to Westinghouse Security Adapters: Westinghouse Security Electronics Controller Printer: Parallel printer or serial printer Access Control/Alarm Monitoring: [Alto 818 Series Controller.] [SE 422 Series.] [NexSentry 4100 Series Controller.] EQUIPMENT...2 A. SE 5850 Architecture: Host Computer: CI-1 or CI-8 Multiplexer Adapter: The system may require one or more CI-1 or CI-8 multiplexers to allow the integration of up to 32 remote distributed intelligence Westinghouse Security Electronics Controllers into a multi-location network Communication interface: The SE 5850 shall connect to the Controller via the CI-1 or CI-8 through one of the following interfaces: RS232, RS485, or 20 ma (Controller dependent)....3 B. Software Platform: Operating System: MS-DOS Networking: Large scale or multi-location systems with security devices or computers distributed to remote locations while overall control of the network is maintained at a central location....3 C. Operator interface/operations: The required system shall fulfill the following requirements for operator monitoring and command functions: Sophisticated operator interface: The required Software shall provide a sophisticated, easy-to-operate interface for security operators. Multiple aspects of the system shall contribute to the effectiveness of the operator interface: System Password Protection/Control: Real-time alarm reporting and display: Real-time Status Reports: System status reports shall be available by: Override Command Capability: The system shall provide the operator the ability, based on password authorization, to override pre-set conditions. The overrides shall include: High Resolution Color graphics at operator console: Powerful Security System Diagnostic Software: feature shall provide operators with the ability to examine the status of the system components and communications. These capabilities are particularly useful for diagnosing suspected problems, including: Audit Trail of all Operator Activity:...4 D. System Management: The required system shall perform all of the following functions: Simple System Administration: Security System Hardware Definition: Define Security System Software: Maximum Database Capabilities: Maximum storage capabilities are limited by the application Database Download to Distributed Local Controllers: Powerful and Meaningful Reports: On-line Storage of Security Events: When the database approaches a selected percentage of its limit, the system shall issue an alert to inform the operator(s) of the condition and to recommend that the operator perform an archive to floppy disk Archiving of Security Events: Backup and Restoration of Security System definitions:...6 WSE 3/21/ iv SE 5850 Host Software
5 E. Access Control Operation: Common Requirements: Distributed Processing:...7 F. Alarm Monitoring Operation: When utilizing Westinghouse Security Electronics Controllers, the host computer shall monitor the alarm points in two states: secure or alarm. An end-of line resistance shall indicate the point is secure Configurable Alarm Instructions: Operator Alarm Response: Recall Alarm Activity: Monitor Point Status Display: Shunting/Unshunting Alarms and Alarm Points: The system shall provide the capability to shunt or unshunt alarm points via the following methods: COMPONENT DEFINITION...8 A. Recommended hardware platform: SE 5850 is available as a software-only option or it can be packaged with a Hewlett Packard XM3 PC with the following specifications. A comparable IBM Compatible PC is acceptable: Manufacturer/Model: Hewlett-Packard XM3 PC, or comparable IBM Compatible PC Microprocessor: Pentium, 50 Mhz, 32-bit Monitor: 256 Color, Super Video Graphics Adapter (SVGA); 110/220 VAC selectable, UL listed Input media: 1.44 MB diskette drive Mass Storage: 40 MB hard disk, or greater I/O Ports: 1 parallel port, 3 serial ports Keyboard: 101 enhanced keyboard (QWERTY). Foreign language keyboard options available Communications: RS-232, 3 (three) ports Approvals: UL, FCC Made in USA ACCESSORIES:...8 A. Printer: Parallel printer or serial printer...8 B. Communication Modems: Direct Connection: Conversion devices from 20 ma to RS-232: Power Management:...9 PART III EXECUTION FIELD QUALITY CONTROL:...9 A. Tests: A system integrator shall supply a proposed acceptance test procedure Testing the system shall be the sole responsibility of the system integrator Communications tests: Controllers to central terminal, local controller, or remote local controller...9 B. Inspection: The selected system integrator shall provide, on the job site, a factorytrained technician to assist, advise, or manage installing personnel The manufacturer shall also supply on-site inspection All final connections shall be made under the direct supervision of the system integrator....9 C. Field Service: A system integrator authorized by the manufacturer shall provide support for the selected system System integrator must be supported by large service-oriented manufacturers for the system hardware and software The system integrator shall determine and report all problems to the manufacturers customer service departments Support must be available to the integrator via phone inquiries or on-site visits if conditions require and are approved by the manufacturer s customer service manager If purchased, the manufacturer shall provide reliable field service support for the computer hardware utilizing Hewlett-Packard service The manufacturer shall also participate directly in on-site commissioning of new systems with integrator cooperation...9 WSE 3/21/ v SE 5850 Host Software
6 7. HP field service is available in a variety of forms for the customer. A system manufacturer that determines a hardware problem is occurring will contact HP to assist the integrator and customer to resolve the problem SCHEDULES...9 A. System Integrator Assisted Preparation: Data Requirements Operators & privileges Access Hardware Sensors Monitor Points Keyholders Keyholders security codes Maps Prepare room for system installation Receive equipment...9 B. System Installation: Install security management hardware System Integrator and manufacturer (when ordered) on-site commissioning Initial startup and verification Data entry Data entry listing & verification C. Verify Installation: Connect access control hardware to Security Management System Download data and verify correct operation Testing total access and management system Sample Reports Daily Operation and Monitoring Dealer deliver as built drawings...10 WSE 3/21/ vi SE 5850 Host Software
7 SE 5850 Security Management Host Software Database Capacities Summary Summary: SE 5850 is DOS-based single-user, multisite capable access management host software package designed to manage access and security solutions for small to medium-sized applications. Cardholders: 50,000 1 Key Groups: 250 Access Codes 250 Operator Passwords: 100 Operator instructions: 500 Time Periods (64 or 128 max./controller 2 ): 1,000 Time Groups: 250 Holidays: 50 Floor Plan Maps: 100 On-line Transaction Storage: 1,000,000 minimum 3 Off-line Transaction Storage: Unlimited Controllers: 2, 8, 16, or 32 Card Readers: 256 maximum Monitor Points: 1,024 maximum Monitor Groups: 100 Door Groups: 50 Reports (15 or 32 max. per Controller 4 ): Limited by indivual Controller quantities. 2 See Guideform Specification for individual Controller. 3 Depends on hard drive space available. 4 See Guideform Specification for individual Controller. vii
8
9 PART I GENERAL.1 INTRODUCTION A. This document describes the required Electronic Card Access and Security Management Host Management Software (Host Software or SE 5850). B. This specification provides all information necessary to produce a complete proposal for a sophisticated, easy-to-use DOS-based electronic Host Software system. The appendixes contain hardware specifications necessary to select the proper equipment for an installation..2 GENERAL DESCRIPTION A. Host Software: Required Host Software shall: 1. Be powerful and multi-functional with the ability to expand as project needs grow. 2. Be simple and economical enough to support a single site, yet powerful enough to manage a multi-site network. 3. Allow for future Software features to be added as management recognizes requirements. 4. Allow the operation of a Co-Session second terminal as an alternative Software operation or monitoring station. 5. Host Software shall be designed to control Westinghouse Security Electronics third and fourthgeneration security architecture, and will fully support all of the following Controllers: ALTO 818 Series, SE 422 Series and NexSentry 4100 Series. B. Host Computer Hardware: 1. [SE 5850 Host Software shall be bundled with a powerful Hewlett Packard XM3 computer that is configured to give Host Software optimum performance.] or 2. [SE 5850 Host Software shall be a software-only package for use with a DOS-based IBM compatible computer with a Pentium processor.] 3. See PART II.4.A for recommended hardware platform..3 DESCRIPTION OF WORK A. Installation: Installing the Security Management Software and bringing it to operational status requires the following major steps: 1. Determine operational requirements and plan Software to implement them. 2. Install Controllers and related hardware. 3. Configure Controllers and 5850 to communicate with one another. 4. Enter security system database. 5. Test security system communications and operation including CO-Sessions second terminal as required. 6. Train operators. 7. See section 2.03 for an expansion of this work summary..4 SUBMITTALS A. Block Diagram: Submittals shall include a block diagram detailing all connected devices. This document shall be adequate to ensure that all parties involved can determine that the recommended Software meets security system requirements..5 QUALITY ASSURANCE A. Computer workstation: If Software Host is bundled with a Hewlett-Packard PC workstation or approved alternative, hardware shall meet UL and FCC requirements for class A computing devices. WSE 3/21/ SE 5850 Host Software
10 B. Manufacturer: Manufacturer of products defined in this section must have: 1. Industry experience: Company must have at least 20 years experience in manufacturing and servicing access management systems. 2. ISO 9001 Certification: Manufacturing process of company must meet stringent standards of ISO 9001 Certification..6 WARRANTY A. Computer workstation: The Host Computer hardware shall be warranted for at least 15 months from the date of shipment from the factory. The manufacturer shall support hardware repair for the system computer hardware through Hewlett-Packard s worldwide service organization. B. Software: The manufacturer shall directly support software for the selected system product family. C. Extended warranty: Extended warranty terms at reasonable rates shall be available from the installing dealer. D. System integrator: The system integrator shall be the focal point of all service problems or questions (with manufacturer s full support). PART II PRODUCTS.1 MANUFACTURER A. Westinghouse Security Electronics 5452 Betsy Ross Drive Santa Clara, CA Telephone: Fax: B. Approve equal.2 MANUFACTURED UNITS A. The Access Management System shall consist of the following components: 1. Host hardware: IBM compatible PC with Pentium processor running DOS system 3 or later and SE 5850 Host Software. 2. CI-1 & CI-8 Multiplexer Remote Interface to Westinghouse Security Adapters: Westinghouse Security Electronics Controller. 3. Printer: Parallel printer or serial printer. 4. Access Control/Alarm Monitoring: [Alto 818 Series Controller.] [SE 422 Series.] [NexSentry 4100 Series Controller.].3 EQUIPMENT A. SE 5850 Architecture: 1. Host Computer: a. The host computer shall be the nucleus of the required system. It shall provide all necessary capabilities for one operator to manage access and alarm activity. Specifically, the host computer shall be the single computer that supports all the functions of Access Control and Alarm Monitoring, including file management, reporting, and real-time monitoring/control of security hardware devices. b. The Host Computer shall support a Co-Sessions second terminal for alternate station operation and monitoring. 2. CI-1 or CI-8 Multiplexer Adapter: The system may require one or more CI-1 or CI-8 multiplexers to allow the integration of up to 32 remote distributed intelligence Westinghouse Security Electronics Controllers into a multi-location network. WSE 3/21/ SE 5850 Host Software
11 3. Communication interface: The SE 5850 shall connect to the Controller via the CI-1 or CI-8 through one of the following interfaces: RS232, RS485, or 20 ma (Controller dependent). B. Software Platform: 1. Operating System: MS-DOS. 2. Networking: Large scale or multi-location systems with security devices or computers distributed to remote locations while overall control of the network is maintained at a central location. C. Operator interface/operations: The required system shall fulfill the following requirements for operator monitoring and command functions: 1. Sophisticated operator interface: The required Software shall provide a sophisticated, easy-tooperate interface for security operators. Multiple aspects of the system shall contribute to the effectiveness of the operator interface: a. Menu-driven screen selection shall allow even an infrequent operator to move through and manage the functions of the system easily and with a minimum of training. There shall be no need to memorize complicated commands or procedures. b. Function key control of actions must provide the ability to control the system with simple keystrokes. 2. System Password Protection/Control: a. Operator name and password shall control access to all menus and screens and the corresponding capability for each screen. b. The Software shall be able to assign each and every operator a completely unique set of capabilities. c. The Software shall protect the password screen by blanking out the password when the operator enters it. d. Operators supported: 100 maximum. 3. Real-time alarm reporting and display: a. The Software shall process alarms in real time. b. Priority levels defined by system Administrator: 10. 1) The System Administrator shall have the capability to assign the priority levels into categories such as fire, intrusion, or duress. c. Alarms displays: Color. d. The system shall associate color graphic maps with alarm points and must display maps in real time. 4. Real-time Status Reports: System status reports shall be available by: a. Alarm category. b. Security area device. c. Monitor points. 5. Override Command Capability: The system shall provide the operator the ability, based on password authorization, to override pre-set conditions. The overrides shall include: a. Unlock/re-lock doors individually or in logical groups. b. Shunt/unshunt alarm monitor points individually or in logical groups. c. Open, limit, or close the areas covered by specific Controllers. d. Silence latched alarm contacts. e. Forgive anti-passback status in individual Controllers. WSE 3/21/ SE 5850 Host Software
12 6. High Resolution Color graphics at operator console: a. SVGA Resolution with 256 Colors (minimum). b. ASCII Graphics for Maps: 1) Using simple keys to facilitate selection and placement of graphic symbols, the system can define maps representative of the site. 2) The symbols can be associated with alarm points. 3) Mapping supports a map sequence function which allows definition of maps containing greater detail of previously drawn maps. 4) The mapping system shall support output to Okidata 184 parallel or similar printers. 7. Powerful Security System Diagnostic Software: feature shall provide operators with the ability to examine the status of the system components and communications. These capabilities are particularly useful for diagnosing suspected problems, including: a. Card Reader Status: 1) A status screen shall show the condition of all card readers attached to the system. This screen shall show the status of card readers, coaxial cables. b. Card Reader Activity: 1) The system shall display access activity at doors associated with a particular card reader as it occurs. 2) Displays shall include the door name, access time, card number, door status (closed, open, held open, or forced open) and lock status (locked, unlocked, manually unlocked, or auto unlocked). c. Controller Status: 1) Open/Limited/Closed, Shunted/Unshunted, Communications Failure. 2) Power: online vs. backup, and tamper status. d. Monitor Point Status: 1) Active, clear, communications failure, device failure. e. Communications Monitor: 1) Communications between the card readers and the computer must be monitored. 2) This function normally will be used during installation to verify proper connection of communication cables. 8. Audit Trail of all Operator Activity: a. The System Administrator shall be provided with the ability to monitor and to manage all actions performed by operators on the system. b. Audit trail records shall be saved to hard disk and must not be able to be modified. c. The only possible actions for audit records shall be report retrieval and archiving for off-line storage. D. System Management: The required system shall perform all of the following functions: 1. Simple System Administration: a. To administer the Host computer, the system shall provide control of all system administration functions via menu-accessed screens. b. There shall be no need to memorize complicated commands or to learn the syntax of the DOS operating system. c. System administrative functions: 1) Adding and deleting system users and their passwords. 2) Performing system and database backups. 3) Displaying current system activity. 4) Performing transaction archives. WSE 3/21/ SE 5850 Host Software
13 5) Initiating data transfer to remote devices. 6) Defining and maintaining user-controlled fields. 7) Performing alarm transaction clean-up. 2. Security System Hardware Definition: a. Access control/alarm monitoring devices. b. Communication characteristics. c. Grouping of doors and monitor points. d. Defining readers. e. Defining points. f. Defining actions. g. Defining auto activate/open periods: 1) Proximity access control. 2) Keypad access control. 3) Magnetic Stripe access control. 4) Alarm monitor points. 3. Define Security System Software: a. Card number. b. Employee name. c. Card valid date. d. Card expiration date. e. Time Periods: Start time, stop time, and one or more days of the week. f. Holidays: 1) Along with the time zones, days of week, and doors for access control, the system shall allow the System Administrator to add holidays to the access definition. 2) Holiday definition shall allow days defined as holidays to have automatic and access parameters different from their normal definitions. g. Data Grouping: The system shall provide the capability to group the following data items: 1) Time Periods : 4 (four) per time group. 2) Doors: into door groups. 3) Monitor points: into monitor groups. 4) Keyholders into keyholder groups. 4. Maximum Database Capabilities: Maximum storage capabilities are limited by the application. 5. Database Download to Distributed Local Controllers: a. The host computer must download all information pertinent to each particular control unit. b. The system shall execute downloads automatically at pre-defined times or by manual initiation. 6. Powerful and Meaningful Reports: a. The system shall be able to execute reports without impacting the real-time operation of the security system. b. The system shall track and report the dates of archived events available for reporting. It must be able to generate reports for activity spanning any time period, using fixed disk files and high-density 3.5-inch floppy disk files. c. The system shall separate reports by group (door, monitor, time). d. The system shall provide reports for every data file maintained in the system. WSE 3/21/ SE 5850 Host Software
14 e. Pre-defined Reports: 1) Detail activity: Provides detail reports of all activity on the system within specified time intervals. 2) Exception activity: Provides selective reporting of specific types of activity on the system within specified time intervals. 3) Audit trail: Any time any data is changed, the system shall maintain an audit trail of the data changed and who made the change. This report allows management of database changes and is useful in meeting the requirements of most controlling agencies. 4) History reports to be available based on a particular cardholder or door. 7. On-line Storage of Security Events: When the database approaches a selected percentage of its limit, the system shall issue an alert to inform the operator(s) of the condition and to recommend that the operator perform an archive to floppy disk. 8. Archiving of Security Events: a. The system shall provide the ability to backup to floppy disk all events stored in the transaction file. b. In the event of hardware failure or need to execute a report using archived events, the events must be able to be restored to the system. 9. Backup and Restoration of Security System definitions: a. The system shall provide the ability to backup to floppy disk definition, including both hardware and user information. b. In the event of data corruption, tampering, or other loss of data integrity, the security system definitions shall be able to be restored to the on-line system from the floppy disk. E. Access Control Operation: 1. Common Requirements: a. System Designed for Growth: 1) Through addition of Controllers (and possibly software upgrade) the system shall provide support for middle scale applications with a larger number of cardholders, card readers and alarm points. 2) Modular software architecture and performance-oriented programming techniques shall optimize the system to provide minimum response time. 3) From the speed with which doors are unlocked and the speed with which reports are produced, the system software must be able to meet the stringent specification for capacity. b. Capture of all Events from Access Control Units (Controllers): 1) The host computer shall capture all events that occur at local access control. 2) Event capture shall occur real-time. 3) These devices may include multiple switch monitors, Controllers, and alarm monitor units. c. Failsoft Operation: 1) If for any reason, communication between the computer and the Controller is interrupted, the Controller shall continue to make its decisions. 2) While connected to the host computer, the system shall constantly update the Controllers with the information necessary to operate in failsoft mode. Each Controller has its own specific quantitabive limitations. 3) The host computer shall download a maximum of 11,000 card numbers plus 120 access codes to give full decision making capability to each Controller. 4) This capability shall provide for continued operation of distributed card readers at all times. WSE 3/21/ SE 5850 Host Software
15 d. Automated System Control: The system shall provide the ability to automatically change the state of certain devices or areas based on time. e. Multiple Identification Required for Access: 1) Selected entrances and exits may require multiple methods of confirming identity for entry. 2) The required system must support any combination of the following access controlling devices: (i) Analog Proximity Sensors. (ii) Digital Proximity Readers. (iii) Keypads. (iv) Magnetic Stripe Readers. (v) Smart card readers. f. Anti-passback: 1) Ability to forgive passback status shall be available via operator overrides. 2) Passback forgiveness shall be provided to a single cardholder or for all cardholders. 3) Automatically forgive passback at predetrmined time of the day. 4) In the event of Controller failure, the Controller shall automatically forgive all passback status upon return to operational status. g. Trace: 1) The system shall provide the capability to trace activity for specific cardholders at specific doors. 2) For a cardholder, the system shall report activities throughout the system. 3) The system shall display trace activities with the alarm functions to alert the operator. 2. Distributed Processing: a. Distributed Access Control Decision Making: Westinghouse Security Electronics Controllers support distributed processing, with the capability to make access decisions independent of the Host Computer. b. Automated Download of Data to Distributed Controllers: 1) SE 5850 maintains a central database on all access control equipment. 2) Central database includes: (i) Keyholders. (ii) Access levels. (iii) Automatic events (such as auto unlock), etc. 3) SE 5850 shall sort the information in the central database and send it to the appropriate Controller, allowing the local Controller to make all necessary decisions without the SE 5850 central terminal support. F. Alarm Monitoring Operation: 1. When utilizing Westinghouse Security Electronics Controllers, the host computer shall monitor the alarm points in two states: secure or alarm. An end-of line resistance shall indicate the point is secure. 2. Configurable Alarm Instructions: a. Alarm instructions: 500 maximum with up to 228 characters each for each alarm event or monitor point in the system. b. The system shall be able to assign alarm instructions to any monitor point in the system for unique responses to any circumstance. WSE 3/21/ SE 5850 Host Software
16 3. Operator Alarm Response: a. SE 5850 shall prioritize alarm events. b. When acknowledging an alarm, the operator must individually acknowledge the event. c. The system shall save alarm acknowledgment with the respective event for future recall and reference. 4. Recall Alarm Activity: a. The system shall save to disk information associated with each alarm that occurred within the system. b. The operator cannot modify or delete this information. Hence, all information is available to the operator viewing an alarm. 5. Monitor Point Status Display: a. The system shall provide a display that summarizes the current condition of all of the monitor points. b. The status display shall indicate normal, active, shunted, and communication line status. 6. Shunting/Unshunting Alarms and Alarm Points: The system shall provide the capability to shunt or unshunt alarm points via the following methods: a. Automatically, based on time of day, day of week, or holiday. b. Manually by Operator override. The operator must previously have been provided the capability of shunt/unshunt via the password definition..4 COMPONENT DEFINITION A. Recommended hardware platform: SE 5850 is available as a software-only option or it can be packaged with a Hewlett Packard XM3 PC with the following specifications. A comparable IBM Compatible PC is acceptable: 1. Manufacturer/Model: Hewlett-Packard XM3 PC, or comparable IBM Compatible PC. 2. Microprocessor: Pentium, 50 Mhz, 32-bit. 3. Monitor: 256 Color, Super Video Graphics Adapter (SVGA); 110/220 VAC selectable, UL listed. 4. Input media: 1.44 MB diskette drive. 5. Mass Storage: 40 MB hard disk, or greater. 6. I/O Ports: 1 parallel port, 3 serial ports. 7. Keyboard: 101 enhanced keyboard (QWERTY). Foreign language keyboard options available. 8. Communications: RS-232, 3 (three) ports. 9. Approvals: UL, FCC. 10. Made in USA..5 ACCESSORIES: A. Printer: Parallel printer or serial printer. B. Communication Modems: 1. Direct Connection: a. Short distance (max. two miles point-to-point on 22-AWG twisted pair at 9600 baud. Uses Black Box short haul modems). b. Lease line, point-to-point: Modem not defined. 2. Conversion devices from 20 ma to RS-232: a. SE CI-1 or SE CI-8. WSE 3/21/ SE 5850 Host Software
17 3. Power Management: a. UPS: 1) Provides continuous power, without interruption, should primary power be interrupted. 2) Provides 1 hour or more continuous DC power, depending on configuration. PART III EXECUTION.1 FIELD QUALITY CONTROL: A. Tests: 1. A system integrator shall supply a proposed acceptance test procedure. 2. Testing the system shall be the sole responsibility of the system integrator. 3. Communications tests: Controllers to central terminal, local controller, or remote local controller. B. Inspection: 1. The selected system integrator shall provide, on the job site, a factory-trained technician to assist, advise, or manage installing personnel. 2. The manufacturer shall also supply on-site inspection. 3. All final connections shall be made under the direct supervision of the system integrator. C. Field Service: 1. A system integrator authorized by the manufacturer shall provide support for the selected system. 2. System integrator must be supported by large service-oriented manufacturers for the system hardware and software. 3. The system integrator shall determine and report all problems to the manufacturers customer service departments. 4. Support must be available to the integrator via phone inquiries or on-site visits if conditions require and are approved by the manufacturer s customer service manager. 5. If purchased, the manufacturer shall provide reliable field service support for the computer hardware utilizing Hewlett-Packard service. 6. The manufacturer shall also participate directly in on-site commissioning of new systems with integrator cooperation. 7. HP field service is available in a variety of forms for the customer. A system manufacturer that determines a hardware problem is occurring will contact HP to assist the integrator and customer to resolve the problem..2 SCHEDULES A. System Integrator Assisted Preparation: 1. Data Requirements. 2. Operators & privileges. 3. Access Hardware. 4. Sensors. 5. Monitor Points. 6. Keyholders. 7. Keyholders security codes. 8. Maps. 9. Prepare room for system installation. 10. Receive equipment. WSE 3/21/ SE 5850 Host Software
18 B. System Installation: 1. Install security management hardware. 2. System Integrator and manufacturer (when ordered) on-site commissioning. 3. Initial startup and verification. 4. Data entry. 5. Data entry listing & verification. C. Verify Installation: 1. Connect access control hardware to Security Management System. 2. Download data and verify correct operation. 3. Testing total access and management system. 4. Sample Reports. 5. Daily Operation and Monitoring. 6. Dealer deliver as built drawings. WSE 3/21/ SE 5850 Host Software
NexSentry Manager Access Control & Security Management System
NexSentry Manager Access Control & Security Management System Featuring: NexSentry Manager Security Management System, version 3.0 NexSentry Star I Controllers NexSentry Star II Controllers A/E Guideform
More informationAPPLICATION NOTE. The DMP Software Family DMP COMPUTER SOFTWARE PROGRAMS
APPLICATION NOTE Contents The DMP Software Family... 1 Stand-Alone Link Software... 1 Add-on Modules for Link Software... 1 System Link End-User Panel Management Software... 2 Simple Registration and Activation...
More informationCMS Central Monitoring System
General In This Section CMS for Windows CMS Hardware CMS Functional Spec Relational Database Monitoring Interface Communication Network CMS Central Monitoring System General CMS Central Monitoring System
More informationAlto 818SC / Alto 818SX Security Management System
Alto 818SC / Alto 818SX Security Management System 8-door controller A/E Guideform Specification Version 1.0 NOTES: The following A/E Guideform Specification conforms to CSI guidelines to provide Specifiers
More informationFunctional Specification Document
Functional Specification Document Access Control Technology Unit C1 South City Business Centre Tallaght Dublin 24 Ireland Ph: + 353 (0) 1 4662570 Web: www.accesscontrol.ie Index Introduction 1.1 Hardware
More informationV Series. Intelligent Programmer Software (DOS Version) User Manual
V Series Intelligent Programmer Software (DOS Version) User Manual Copyright 1996, 1997, 1999, 2002 Best Lock Corporation dba Best Access Systems. All rights reserved. Printed in the United States of America.
More informationTopaz. GE Security. Intelligent software for access control. Topaz. Features
GE Security Topaz Integrate access control, video surveillance, alarm monitoring, and photo ID badging with the Topaz Access Control System. Topaz is packaged with everything you need to get your security
More informationACCESS CONTROL SYSTEM
ACCESS CONTROL SYSTEM Flexible, Expandable, Economical. The i-pass system comprises of the i-pass controller built with state of the art technology to provide reader access for up to 16 doors and 32 elevator
More informationEQUIPMENT SPECIFICATIONS
EQUIPMENT SPECIFICATIONS IC-1600 Intelligent Controller The IC-1600 Intelligent Controller is a fully intelligent panel that has a complete database on board. It operates in conjunction with the Access
More informationAlliance System Ordering Guide
Alliance System Ordering Guide Multiple Technologies Versatile Hardware Powerful Software One family of parts and accessories Version 12-Nov-03 Alliance System Ordering Guide Table of Contents Controllers
More informationOWNERS MANUAL. Status Monitor. for Windows 95, 98, ME, NT 4, 2000 & XP. SIGNALCRAFTERS TECH, INC. www.signalcrafters.com
OWNERS MANUAL Status Monitor for Windows 95, 98, ME, NT 4, 2000 & XP SIGNALCRAFTERS TECH, INC. www.signalcrafters.com 57 Eagle Rock Avenue, East Hanover, NJ 07936 Tel: 973-781-0880 or 800-523-5815 Fax:
More informationMINIMUM TOOL REQUIREMENT FOR EPROM UPGRADE
Installing and Updating SE422 Access Control Units Firmware! Read all procedures before attempting the field replacement of the EPROM firmware in any equipment. Components are static sensitive and care
More informationOverview. Alarm console supports simultaneous viewing of both live and recorded video when alarm events are selected
Niagara Security Overview Niagara Security by Tridium, is an open, web-based security management solution that allows you to manage and monitor your facility anytime, anywhere. Built on Tridium s Niagara
More informationReliable Security Solutions
Reliable Security Solutions Challenger10 The proven solution for access control, intrusion detection and video integration. An integrated security solution for your most challenging environments The Tecom
More informationPRT-CTRL-SE. Protege System Controller Reference Manual
PRT-CTRL-SE Protege System Controller Reference Manual The specifications and descriptions of products and services contained in this document were correct at the time of printing. Integrated Control Technology
More informationTime Attendance V1.4
Time Attendance V1.4 Installation Manual May 11, 2011 Page 1 TABLE OF CONTENTS 1. TIME ATTENDANCE...5 2. SOFTWARE INSTALLATION...6 3. SETTING UP THE TIME ATTENDANCE SYSTEM...7 3.1 Set Password...7 3.2
More informationHoneywell s WIN PAK SE 2.0 / WIN PAK PE 2.0 Access Control System Guide Specifications in CSI Format SECTION 281300
SECTION 281300 INTEGRATED SECURITY MANAGEMENT SYSTEM PART 1 GENERAL 1.1 SECTION INCLUDES A. Provide a modular and network enabled access control system for security management, including engineering, supply,
More informationSystem Integration Software
System Integration Software Release Notes for Version 6.0.5 1.0 Compatibility Currently, PC9000 is compatible with the following Radionics control/communicators: D7212, D7412, D7412G D9112, D9412 and D9412G
More informationHyperAccess Access Control System
Control System We manufacture, an advanced PC based access control solution that will give you control over who has access to your building. With you can control access on hundreds of doors for up to 10,000
More informationAccess Easy Controller 2.1
Systems Access Easy Controller 2.1 Access Easy Controller 2.1 4 readers expandable to 32 readers Supports up to 20,480 card holders and 100,000 transactions Classify cardholders based on 254 access groups
More informationAC-115 Compact Networked Single Door Controller. Installation and User Manual
AC-115 Compact Networked Single Controller Installation and User Manual December 2007 Table of Contents Table of Contents 1. Introduction...5 1.1 Key Features... 6 1.2 Technical Specifications... 7 2.
More informationA Fully Integrated Online Hotel Locking System
ZLock ALV2 Wireless Online System A Fully Integrated Online Hotel Locking System A state-of-the-art integrated real-time access system especially designed for today s demanding Lodging industry. Unlike
More informationAPOGEE Security Technology Management Software
Technical Specification Sheet Rev 1, July, 1999 APOGEE Security Technology Management Software Figure 1 APOGEE Security Technologies workstation The APOGEE Security Technology System (ASTS) is a family
More informationController 5000GL Controller 5000GL provides flexible system architecture with options of GBUS and LOCAL BUS communications to field devices, to meet a wide range of site requirements. GGBUS L LOCAL BUS
More informationVersatility, reliability and expandability are the three main features that make the N-1000 one of the most popular access control panels ever.
Versatility, reliability and expandability are the three main features that make the N-1000 one of the most popular access control panels ever. Expandability is the most important feature of any access
More informationTroubleshooting and Diagnostics
Troubleshooting and Diagnostics The troubleshooting and diagnostics guide provides instructions to assist in tracking down the source of many basic controller installation problems. If there is a problem
More informationDUKANE Intelligent Assembly Solutions
PC Configuration Requirements: Configuration Requirements for ipc Operation The hardware and operating system of the PC must comply with a list of minimum requirements for proper operation with the ipc
More informationMade in America. Phone: (909) 664-9970 Fax: (909) 627-7449 Website: SmartClock.com
Phone: (909) 664-9970 Fax: (909) 627-7449 Website: SmartClock.com 1 Introduction Who is Smart Clock? Formerly Coastal Data Products, Smart Clock is a manufacturer and marketer of computer based automated
More informationThe Access Engine. Building Integration System - The Access Engine. Security Systems
The Access Engine 1 What is BIS Access Engine? It is one of the central software modules of the Building Integration System It s a fully integrated access control solution with corresponding access hardware
More informationHow To Use Safety System Software (S3)
SPECIFICATION DATA Safety System Software (S3) APPLICATION Safety System Software (S 3 ) is a robust, full featured configuration, diagnostic, programming and real-time monitoring package for integrators
More informationSiloPatrol. SiloTrack Inventory Management Software Version 3.5 BULLETIN 343B. Interface With Multiple Sensor Technologies
Setting The Standard For Supplier Excellence SiloPatrol SiloTrack Inventory Management Software Version 3.5 Interface With Multiple Sensor Technologies Simple Local And Remote User Access Vendor/Remote
More informationC CURE 800/8000 Security Management Solution
D A T a s h e e t C CURE 800/8000 Security Management Solution Features that make a difference: Advanced event and alarm monitoring solution provides flexible and powerful control Easily integrate with
More informationThis page was intentionally left blank.
WinDSX User s Guide b This page was intentionally left blank. DSX, Our Commitment to Service Our Commitment to service is continually demonstrated through our Training Programs and Technical Support Department.
More informationSiPass Software. Fire Safety & Security Products. SiPass integrated
SiPass Software SiPass integrated Flexible structure for each demand Easy installation and administration Expansion modules optionally available High operational ease by Graphic User Interface Access control
More informationAxTraxNG Access Control Management Software
AxTraxNG Access Control Management Software ARCHITECTURAL AND ENGINEERING SPECIFICATIONS April 2013 Experience the Difference www.rosslaresecurity.com 5505-0228701-00 Table of Contents 1. General... 4
More informationOperating Software Service Tool
385 Operating Software Service Tool for M-bus central units OZW10 / OZW111 ACS11 ACT110 Software for the remote operation and supervision of one or several plants equipped with an M-bus central unit OZW10
More informationKeyscan Hosted Services A C e n t r a l l y M a n a g e d A c c e s s C o n t r o l S o l u t i o n
Keyscan Hosted Services A C e n t r a l l y M a n a g e d A c c e s s C o n t r o l S o l u t i o n A convenient, new way Since the launch of Keyscan s Centrally Managed Access Control (CMAC), access control
More informationSystem i and System p. Customer service, support, and troubleshooting
System i and System p Customer service, support, and troubleshooting System i and System p Customer service, support, and troubleshooting Note Before using this information and the product it supports,
More informationCENTAUR. Access Control Software Version 4.2 REFERENCE MANUAL
CENTAUR Access Control Software Version 4.2 REFERENCE MANUAL Copyright (C) 2006-2008 CDVI Americas LTD. All rights reserved. Centaur access control system software is protected by copyright law and international
More informationAutomated Time & Attendance System BIG EFFICIENCY FOR BUSINESS
Automated Time & Attendance System BIG EFFICIENCY FOR BUSINESS PAYROLL BECOMES A UTOMATIC Business owners used to have little choice when it came to processing time and attendance data either spend a lot
More informationDIVISION 28 ELECTRONIC SAFETY AND SECURITY SECTION 28 13 00 SECURITY AND ACCESS CONTROL SYSTEM
DIVISION 28 ELECTRONIC SAFETY AND SECURITY PART 1 GENERAL 1.01 DESCRIPTION A. Division 28 Contractor shall extend a complete Matrix Systems Access Control System as shown on the Drawings and as specified
More informationTailored integration to suit you
UTC Fire & Security Integrated Systems Platforms Tailored integration to suit you We listened to you A majority of the Fortune 100 companies have chosen UTC Fire & Security for their integration needs.*
More informationAccess Control Software Manual
CONTENTS 1. Function overview...1 2. Installation environment...2 3. Concept description...3 4. Installation and Uninstallation...4 4.1 Installation...4 4.2 Uninstallation...10 5. Function instroduction...11
More informationQuickSpecs. HP Compaq t5525 Thin Client. Overview
Overview 1. 10/100 RJ-45 6. PS/2 Connector 2. Security lock 7. DC Power Input 3. Parallel Connector 8. Video Connector 4. USB Connectors 9. Serial Connector 5. Audio connector (mic in/line out) DA - 12265
More informationNortechCommander Software Operating Manual MAN-00004 R6
NortechCommander Software Operating Manual MAN-00004 R6 If the equipment described herein bears the symbol, the said equipment complies with the applicable European Union Directive and Standards mentioned
More informationDoors.NET Access Control Software. Data Sheet. email: sales@kerisys.com web: www.kerisys.com
Doors.NET Access Control Software Data Sheet Software Application to manage Keri s NXT TCP/IP-based, RS-485-based PXL-500 hardware platforms, and additional 3rd party platforms Native Microsoft.NET application
More informationO C M III. Open Channel Flow Monitor
O C M III Open Channel Flow Monitor Part 1. General 1.1 Scope A. This section describes the requirements for an ultrasonic flow transmitter with sensor and temperature compensation probe. B. Under this
More informationOnGuard Online User Guide
OnGuard Online User Guide T81165/Rev ER-7991-40 Jan 2005 Contents 1 Introduction Related documents 1 1 Navigation of the software 1 2 How to use this guide 1 4 2 Managing Access Holidays and Timezones
More informationTable Of Contents. System Monitoring... 14 System Monitoring Display...14 Monitoring Zones...15 About Areas (partitions)...15 Area Status Display...
Quick Start Table Of Contents Getting Started... 2 NEware Editions...2 Installing NEware...3 Installing Languages...3 Connecting to NEware...3 Changing Your IP100 Password...4 User Codes... 5 Master Feature...5
More informationINSTALLATION/PROGRAMMING INSTRUCTIONS E4KP ENTRYCHECK
Security Door Controls 3580 Willow Lane, Westlake Village, CA 91361-4921 (805) 494-0622 Fax: (805) 494-8861 www.sdcsecurity.com E-mail: service@sdcsecurity.com INSTALLATION/PROGRAMMING INSTRUCTIONS E4KP
More informationFVSU-33201301 REPAIR & UPGRADE FIBER OPTIC 280000-1 SECTION 280000 FIRE ALARM SYSTEM CONNECTIVITY
FVSU-33201301 REPAIR & UPGRADE FIBER OPTIC 280000-1 SECTION 280000 FIRE ALARM SYSTEM CONNECTIVITY PART 1 - GENERAL 1.1 SUMMARY A. Section Includes: 1. Fire-alarm control unit. 2. Addressable interface
More informationDETAIL AUDIT PROGRAM Information Systems General Controls Review
Contributed 4/23/99 by Steve_Parker/TBE/Teledyne@teledyne.com DETAIL AUDIT PROGRAM Information Systems General Controls Review 1.0 Introduction The objectives of this audit are to review policies, procedures,
More informationUpdated: May 2008. Copyright 2005-2008 DBA Software Inc. All rights reserved. 2 Getting Started Guide
Updated: May 2008 Copyright 2005-2008 DBA Software Inc. All rights reserved. 2 Getting Started Guide Table of Contents Welcome 4 Support Center Subscription 5 1. System Requirements 7 2. Installing the
More informationACX 780, ACX 781 Access Control Units and Expansion Module
Infinity ACX 780, ACX 781 Access Control Units and Expansion Module The Infinity ACX 780 is a programmable, stand-alone access controller that is a basic building block of the Infinity Security Management
More informationTime Attendance V1.0
Time Attendance V1.0 User Manual Page 1 TABLE OF CONTENTS 1. TIME ATTENDANCE...5 2. SOFTWARE INSTALLATION...6 3. SETTING UP THE TIME ATTENDANCE System...7 3.1 Set Password...7 3.2 Login...8 3.3 Setup -
More informationLaundry Logic Management System Basic Edition Software
Basic Edition Software The Laundry Logic Basic Edition software was designed for the single site owner. It offers functions needed to review information about a single site View and Tool Options The Basic
More informationASERIES ATM Access Management System
ASERIES ATM Access Management System Increase Security. Reduce Operation Costs. Reduce Liability. The A-Series ATM Access Management System from Sargent & Greenleaf increases security and management efficiency
More informationNC State University Design and Construction Guidelines Division 26 Fire Alarm Systems
NC State University Design and Construction Guidelines Division 26 Fire Alarm Systems 1.0 Purpose A. The following guideline provides the minimum standards and requirements for fire alarm systems. 2.0
More informationQuickSpecs. HP IP Console Switch with Virtual Media Overview
Overview HP's IP Console Switch with Virtual Media is a key component in managing the heterogeneous data center and along with the IP Viewer software allows remote access to multiple servers running various
More informationACCESS CONTROL SYSTEMS USER MANUAL
Ritenergy Pro (Version 3.XX) ACCESS CONTROL SYSTEMS USER MANUAL 1 User Manual Ritenergy International, LLC TABLE OF CONTENTS RITENERGY PRO PROGRAMMING GUIDE 3 System Requirement 3 System Components 3 Basic
More informationHP Hardware Support Onsite 6-Hour Call-to-Repair Service HP Customer Support Contractual Service Package
HP Hardware Support Onsite 6-Hour Call-to-Repair Service HP Customer Support Contractual Service Package Technical data HP Hardware Support Onsite 6-Hour Call-to-Repair Service provides an IT manager with
More informationCOMBINE BURGLARY AND FIRE PROTECTION WITH ACCESS CONTROL IN A SINGLE,
securıty COMMERCIAL the power of integration A truly effective commercial security system must be smart, flexible, and adaptable: Smart to provide a combination of intrusion, fire, access control, and
More informationUniFireNet Facilities Monitoring System MEA GENERAL NETWORK FEATURES
November 16, 1999 A1-100 UniFireNet Facilities Monitoring System Section: Integrated Systems GENERAL UniFireNet is the next generation in advanced technology to monitor and control security, fire, card
More informationDCS110 CATVisor COMMANDER
Broadband Cable Networks April 13, 2006 1(5) DCS110 CATVisor COMMANDER Introduction CATVisor Commander is the standalone software tool for configuring, adjusting and monitoring Teleste Headend and HFC
More informationAccess CONTROL. MANAGEMENT Software
Software Guide Access CONTROL MANAGEMENT Software 21 Personnel Fields Users are provided twenty one fields to record various personnel data such as first name, last name, department, parking spot, and
More informationSmart Cartridge. Software Guide. UNLOCK dbase MEMORY LEVELS FUNCTIONS HISTORY TASK ACCESS CONTROL SYSTEMS CORPORATION
Smart Cartridge Software Guide UNLOCK dbase MEMORY LEVELS FUNCTIONS HISTORY TASK DOS CORPORATION TOY E ACCESS CONTROL SYSTEMS Installing the Software UP AND RUNNING IN 5 MINUTES 1. Place the system disk
More informationFLORIDA ATLANTIC UNIVERSITY FIRE ALARM SYSTEM INSTALLATION MANUAL
FLORIDA ATLANTIC UNIVERSITY FIRE ALARM SYSTEM INSTALLATION MANUAL January, 2003 Environmental Health and Safety Florida Atlantic University 777 Glades Rd. Boca Raton, FL 33431 Phone: 561-297-3129 Fax:
More informationHow To Build A Scada System
SECTION 17902 SCADA SYSTEMS PART 1 - GENERAL 1.01 SCOPE OF WORK A. The work of this section shall be performed by a qualified System Integrator and includes providing and installing SCADA computer system
More informationMeridian 1 Meridian 1 Attendant PC LAN Interface Installation Guide
Meridian 1 Meridian 1 Attendant PC LAN Interface Installation Guide Document Number: P0874391 Document Release: Standard 1.00 Date: November 1997 Year Publish FCC TM 1997 All rights reserved Printed in
More informationGallagher Command Centre
DATASHEET Gallagher Command Centre security.gallagher.com Gallagher Command Centre is the central management platform for the Gallagher security system. Leveraging a client server architecture, the software
More informationOvation Operator Workstation for Microsoft Windows Operating System Data Sheet
Ovation Operator Workstation for Microsoft Windows Operating System Features Delivers full multi-tasking operation Accesses up to 200,000 dynamic points Secure standard operating desktop environment Intuitive
More informationHigh Performance Access Control and Integrated Security Systems
High Performance Access Control and Integrated Security Systems High Performance Access Control and Integrated Security Systems EntraPass Corporate Edition is a powerful multi-user access control system
More informationH ARDWARE C ONSIDERATIONS
H ARDWARE C ONSIDERATIONS for Sidewinder 5 firewall software Dell Precision 530 This document provides information on specific system hardware required for running Sidewinder firewall software on a Dell
More informationDSX-Soft I/O Integration Software
DSX Access Systems, Inc. DSX-Soft I/O Integration Software DSX now has the ability to integrate with various different external devices through serial data streams. This integration allows other systems
More informationAccess Professional Edition Selection Guide
Access Professional Edition Selection Guide 2 Contents Contents 3 System overview 3 Wiegand based hardware 4 RS485 Bus reader 5 Selection Guide The Seven Steps to your Access System 6 Step 1: Choose Base
More informationSECTION 13421 PROGRAMMABLE LOGIC CONTROLLERS AND COMPUTER CONTROL SYSTEM PART 1 GENERAL. 1.01 Summary. A. Section Includes:
SECTION 13421 PROGRAMMABLE LOGIC CONTROLLERS AND COMPUTER CONTROL SYSTEM PART 1 GENERAL 1.01 Summary A. Section Includes: 1. The ISS shall furnish all labor, materials, equipment, services and incidentals
More informationTechnical Manual. For use with Caller ID signaling types: Belcore 202, British Telecom, & ETSI
Technical Manual For use with Caller ID signaling types: Belcore 202, British Telecom, & ETSI Caller ID.com WHOZZ CALLING? POS 2 Caller ID Monitoring Unit Technical Manual For use with Caller ID signaling
More informationIntegrated Building Management and Security System. Building Automation & Security. www.coba-group.com
Integrated Building Management and Security System Building Automation & Security www.coba-group.com INTEGRATED BUILDING MANAGEMENT AND SECURITY SYSTEM INDEX 1 GENERAL... 3 1.1 SYSTEM INTEGRATION... 3
More informationAccess Control Management Software
ACCESS CONTROL MANAGEMENT SOFTWARE Access Control Management Software System VII - meeting today s demands and tomorrow s challenges. Supports multiple-monitor workstations Compatible with Microsoft s
More informationAccess Control. Intrusion Alarms. Elevator Control CCTV & DVR. Photo ID. Building Automation. Visitor Management. On & Offsite Monitoring
Access Control Intrusion Alarms Elevator Control CCTV & DVR Photo ID SECURITY MANAGEMENT SYSTEM Building Automation Visitor Management On & Offsite Monitoring BUILDING SECURITY WORLDWIDE Our Corporate
More informationQuick Installation. A Series of Intelligent Bar Code Reader with NeuroFuzzy Decoding. Quick Installation
Quick Installation A Series of Intelligent Bar Code Reader with NeuroFuzzy Decoding This chapter intends to get your new FuzzyScan scanner working with your existing system within minutes. General instructions
More informationEmerson Smart Firewall
DeltaV TM Distributed Control System Product Data Sheet Emerson Smart Firewall The Emerson Smart Firewall protects the DeltaV system with an easy to use perimeter defense solution. Purpose built for easy
More informationT a b l e o f C o n t e n t s
w w w. g e n t e c h e a l t h c a r e. c o m M E D I C A L M O N I T O R I N G, A L A R M A N D C O N T R O L S Y S T E M S I n t e r n a t i o n a l E d i t i o n Technology for a Better Future Company
More informationSECTION 13850 DETECTION AND ALARM
SECTION 13850 DETECTION AND ALARM PART 1 GENERAL 1.01 SUMMARY A. Section Includes 1. Control Panel 2 Associated Equipment B. Products Installed But Not Supplied Under This Section 1. Section 16140 - Wiring
More informationPARTNER ACS R4.0 Remote Administration R4.0. Getting Started
PARTNER ACS R.0 Remote Administration R.0 Getting Started 8-6-66 700080 Issue May 00 Copyright 00, Avaya Inc. Document 8-6-66 All Rights Reserved 700080 Printed in USA Issue May 00 Notice Every effort
More informationSECTION 16911 WEB-BASED POWER MONITORING COMMUNICATIONS SYSTEM
WEB-BASED POWER MONITORING COMMUNICATIONS SYSTEM PART 1 GENERAL 01 02 03 04 SCOPE This section describes the metering, communications, and visualization requirements for a modular, scalable Web-based Power
More informationINTELLIGENT CONTROL MODULE SA-2000-II HARDWARE MANUAL. Access Technologies International, Inc.
SA-2000-II HARDWARE MANUAL Access Technologies International, Inc. 1 Table of Contents 1. Introduction 3 2. Features 3 3. Specification 4 4. Identifying Supplied Parts 4 5. Panel Description 5 6. Connection
More informationElectronic Access Control Solutions
Electronic Access Control Solutions Access Control Access Control Digitus BIOMETRIC ACCESS CONTROL Secure every access point The new db (Digitus Biometric) Biolock Technology paired with our Electromechanical
More informationREQUEST FOR PROPOSALS SECURITY SYSTEMS MIDDLETOWN PUBLIC SCHOOLS MIDDLETOWN, RHODE ISLAND 02842
REQUEST FOR PROPOSALS SECURITY SYSTEMS MIDDLETOWN PUBLIC SCHOOLS MIDDLETOWN, RHODE ISLAND 02842 1. Middletown Public Schools is seeking bids for security systems for the Gaudet Middle school: 1113 Aquidneck
More informationServer Manual. For Administrators of Cameleon Version 4
Server Manual For Administrators of Cameleon Version 4 Cameleon Version 4 Server Manual For Administrators of Cameleon Version 4 R4-07OCT04 Copyright 2004 360 Surveillance Inc. Camera Cameleon is a trademark
More informationControl Technology Corporation CTC Monitor User Guide Doc. No. MAN-1030A Copyright 2001 Control Technology Corporation All Rights Reserved Printed in USA The information in this document is subject to
More informationOperation Guide. Systems Integration Software
Operation Guide Systems Integration Software Trademarks Microsoft, Windows, Windows NT are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
More informationUSB Secure Management for ProCurve Switches
ProCurve Networking USB Secure Management for ProCurve Switches Introduction... 2 A simple solution with multiple uses... 2 Staged deployment... 2 Remote deployment or upgrade... 3 Troubleshooting... 3
More informationGlobal Water Instrumentation, Inc.
Global Water Instrumentation, Inc. 151 Graham Road P.O. Box 9010 College Station, TX 77842-9010 Telephone : 800-876-1172 International : (979) 690-5560, Fax : (979) 690-0440 e-mail : globalw@globalw.com
More informationPREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:
A SYSTEMS UNDERSTANDING A 1.0 Organization Objective: To ensure that the audit team has a clear understanding of the delineation of responsibilities for system administration and maintenance. A 1.1 Determine
More informationTime Clock V1.2 User Manual. Time Clock V1.2. User Manual. Page 1. www.avea.cc
Time Clock V1.2 User Manual Page 1 TABLE OF CONTENTS 1. TIME CLOCK...4 2. SOFTWARE INSTALLATION...5 3. SETTING UP THE TIME CLOCK SYSTEM...6 3.1 Set Password...7 3.2 Login...8 3.3 Setup - Auto IN/OUT Time
More informationNetwork Client. Troubleshooting Guide FREQUENTLY ASKED QUESTIONS
Network Client Troubleshooting Guide 1 Network Client Troubleshooting Guide The first section of this guide answers some frequently asked questions (FAQs) about the operation of Intellex and the Network
More informationUpdated: April 2010. Copyright 2005-2010 DBA Software Inc. All rights reserved. 2 Getting Started Guide
Updated: April 2010 Copyright 2005-2010 DBA Software Inc. All rights reserved. 2 Getting Started Guide Table of Contents Welcome 4 Support Center Subscription 5 1. System Requirements 8 2. Installing the
More informationDocumentum Management & Imaging System Overview
Documentum Management & Imaging System Overview Introduction The University of Tennessee is in the process of purchasing an electronic document management system (EDMS) that will enable Graduate Admissions
More information3.11 System Administration
3.11 The functional area is intended to contribute to the overall flexibility, efficiency, and security required for operating and maintaining the system. Depending on the architecture of the system, system
More information