Automatic Fire Alarm Service Provider Computer Interface Specification for Extended Alarm Protocol (XAP) Devices
|
|
|
- Scarlett Leonard
- 10 years ago
- Views:
Transcription
1 March 2014 Version 1.5 Automatic Fire Alarm Service Provider Computer Interface Specification for Extended Alarm Protocol (XAP) Devices For the New Zealand Fire Service December 2013 Copyright New Zealand Fire Service Commission
2 Table of contents Document history... 3 Important note... 3 Copyright... 3 List of terms & abbreviations Overview of XAP Computer Interface Specification XAP log data protocol System data protocol XAP control data protocol XAP alarm data specification XAP alarm data structure overview Alarm data field structure detail Zone-related information Zone ID Zone description Zone type Zone mode summary Zone status summary Zone LLA Co-ordinates Point-related information Point ID Point description Point type Point mode Point status Point level Point rate Point LLA Co-ordinates Rules for mode and status summaries Select alarm data parameters Data profile Zone point types Alarmdata.xsd file, API Change control New Zealand Fire Service Commission page 2 of 18
3 Document history Version Status Date Comments 1.4 New 12 December 2008 New XAP version 1.5 Updated March 2014 Reformatted and updated document Important note No interface software should be produced without the inclusion of the NZFS approved Application Programming Interface (API). Copyright The copyright of this document is the property of the New Zealand Fire Service Commission: 80 The Terrace PO Box 2133 Wellington New Zealand Phone: (04) Document owner and contact: Stuart Waring, Manager Data & Intelligence New Zealand Fire Service Commission page 3 of 18
4 List of terms and abbreviations Term Ack AFAS AFASP AFASPCIS API Code of Practice Contractor Interconnection Device Contractor Interface DB FA IP ISO LAN LLA MHS NZFS NZFS Interconnection Device Definition Acknowledgement Automatic Fire Alarm System that includes the collection of equipment, software, transmission links, standards, specifications, protocols and processes necessary to transport messages between fire alarms and the Communications Centres Automatic Fire Alarm Service Provider [Contractor]. Provides telecommunications and/or management services in respect of the Automatic Fire Alarm System Automatic Fire Alarm Service Provider Computer Interface Specification. The protocol specification, extended alarm protocol specification (XAP) and associated application programming interface specification, for the computer interface between the NZFS Interconnection Device and the Contractor Interconnection Device, as available on the NZFS public internet page, as amended from time to time Application programming interface Code of Practice for Automatic Fire Alarm System document available on the NZFS public internet page, as amended from time to time A device under control of the Contractor that exchanges messages with the NZFS Interconnection Device in accordance with the Computer Interface Specification AFASP computer/server application that conforms to the Computer Interface Specification Database Fire alarm. An apparatus that performs specified fire-related functions in response to the operation of a sprinkler, detector, manual call point or other input, as defined in the relevant NZ standard, as amended from time to time, that is connected to the AFAS by the Contractor fire alarm Internet protocol International Standards Organisation Local area network Longitude, latitude and altitude Message handling server New Zealand Fire Service STSMHS message handling servers that route messages received from the Contractor and fire alarms to NZFS New Zealand Fire Service Commission page 4 of 18
5 Term NZFS Interconnection Device Contractor NZS OSI PtID RAM Service Agent STS STSMHS TCP/IP UDP VPN WAN XAP XML XML schema ZID Definition The entity that supports and manages the STSMHS under a contract and service level agreement with NZFS New Zealand standard Open systems interconnection Point identification Remote access software Person engaged by the owner of protected premises to maintain and repair the protected premises fire alarm Signal transport system. Hardware, software, transmission links, and processes to transport messages between fire alarms and the STSMHS Signal Transport System Message Handling System. The collection of servers, equipment and transmission links between the Contractor Interconnection Device and the Communications Centres alarm interface servers (which transport messages from the NZFS Interconnection Device to the Communications Centres alarm terminals), as contracted to and managed by the NZFS Interconnection Device Contractor signal transport system message handling system. Routes messages received from the AFASP and fire alarms (if connected via a programmable device) to the Communication Centres Transmission control protocol User datagram protocol Virtual private network Wide-area network Extended alarm protocol Extensible markup language. Markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readable Describes the structure of an XML document Zone identification New Zealand Fire Service Commission page 5 of 18
6 1. Overview of XAP Computer Interface Specification 1.1 Introduction This document describes the Extended Alarm Protocol (XAP) specification for the computer interface between the New Zealand Fire Service (NZFS) Automatic Fire Alarm Communications server operated by the NZFS and the by Automatic Fire Alarm Service Providers (AFASPs) wide area alarm network. This document extends the basic (non-xap) protocol defined in version 1.5 (and later) of the Automatic Fire Alarm Service Provider Computer Interface Specification document (PDF, 1MB) which can be found on the Fire Alarms Connections Downloads section of the NZFS website: All XAP devices and interfaces must conform to the basic protocol specified in that document. New Zealand Fire Service Commission page 6 of 18
7 2 XAP log data protocol 2.1 Log data protocol messages XAP log data message An XAP log data message is the same as the basic log data message, but with the addition of zone and (optionally) point information. Note that multiple zones and points can be reported on in a single XAP log data message. A valid XAP log data message must include all fields with profile Essential XAP log data Ack The XAP Log Data Ack is exactly the same as a basic log data Ack. New Zealand Fire Service Commission page 7 of 18
8 3 System data protocol 3.1 System data protocol messages XAP system data message An XAP system data message is the same as the basic log data message, but with the addition of zone and (optionally) point IDs. The zones or points being queried must be included in the XAP system data message. The ZIDs of the zones being queried must be specified, but all other essential zone fields can be set to any valid value (usually set to Unknown ), and are ignored by the AFASP. If a point is being queried, then its parent s ZID must be specified and the PtID must be specified. All other essential point and zone fields can be set to any valid value (usually set to Unknown ), and are ignored by the AFASP. Note that multiple zones and multiple points within a zone can be queried in a single XAP system data message XAP system data response An XAP system data response message is sent by an AFASP server in response to an XAP system data message from an NZFS client. Upon receiving an XAP system data message from the NZFS client the AFASP server must send a related XAP system data response message to the NZFS client within 5 seconds. The XAP system data response is the same as a basic system data response message, but with the addition of zone and optional point information. If the original XAP system data message specifies one or more zones, then all information relating to the ZIDs must be returned in the response message. If the original XAP system data message specifies one or more points, then all information relating to the points and their zone parents must be returned in the response message. A valid XAP system data response must include all fields with profile Essential. New Zealand Fire Service Commission page 8 of 18
9 4 XAP control data protocol 4.1 XAP control data protocol messages XAP control data message An XAP control data message is the same as a basic control data message with the addition of zone or point commands. An XAP control data message is sent by an NZFS client when the NZFS subsystems want to control the mode/status of a fire alarm zone or point within the AFASP wide area alarm network. The system data message is uniquely identified by the unique sequence number and the Brigade ID XAP control data response An XAP control data response message is sent by an AFASP server in response to a XAP control data message from an NZFS client. It is the same as a basic control data response, but with the addition of zone and optional point response information. A valid response must include all fields with profile Essential. New Zealand Fire Service Commission page 9 of 18
10 5 XAP alarm data specification The XAP Alarm data specification extends the basic alarm data specification defined in the NZFS AFASP Computer Interface Specification document (PDF, 1MB), with zone and optional point fields. 5.1 XAP alarm data structure overview Below is the list of fields required by the AFASP and the NZFS when sending XAP log, system or control data. The Log data format shall be used for all new, repeats and unacknowledged fire alarm and fire alarm state change of state messages of fire alarms managed by the AFASP. System data from the AFASP sent to the NZFS uses the same alarm data structure and processes to communicate reports and updated information. Control data from the NZFS sent to the AFASP also uses the same alarm data structure to communicate command and control functions. The data is grouped into the following categories: Header information Site-related information Area-related information Zone-related information Point-related information For message identification and message handling. Information related to a site (e.g. hospital complex). A site is comprised of one or more areas. Information related to a specific automatic fire alarm. NZFS assigns a unique identification number to each fire alarm. An area comprises one or more zones. For more information about zones. Information related to a specific zone. A zone is comprised of one or more points. Information related to a specific point (e.g. detector). 5.2 Alarm data field structure detail Because fire protection equipment has varying technical capabilities and associated feature sets (legacy systems), the data fields listed below have different profiles. Refer to the data profile table in section 6.1. Messages must include all fields with profile Essential, and those requested fields that are necessary to process the data action. Whether fields with profiles Essential** or Optional** may, must or must not be included in a data message depends on whether specified conditions are met. These conditions are defined in section 6. They are also included in the data schema. Optional fields that do not contain data must be marked with the value Unknown or NA if non-applicable, otherwise an error data event will be generated by the recipient server. Optional fields will not generate other errors. For precise detail regarding field specifications described below, including ownership and/or authoritative data source, refer to the alarmdata schema document which is available on request from the NZFS. New Zealand Fire Service Commission page 10 of 18
11 5.2.1 Zone-related information If a message includes field ZID, then this message must also include all fields in this section (5.2.1) with profile Essential*, and may include all fields in this section (5.2.1) with profile Optional**. If a message does not include field ZID, then this message must not include any of the fields in this section (5.2.1) Zone ID Fire alarm zone identification, as assigned by AFASP. ZID Text 8 Duplicates ok Optional AFASP Zone description Zone description for zone identification. ZDescription Text 48 Duplicates ok Essential** AFASP Zone type Zone equipment type description. See the Zone point types table in section 6.2 for valid entries. ZType Text 16 Duplicates ok Essential** AFASP Zone mode summary Summary mode of the fire alarm zone. See the Modes table in section 7.8 of the NZFS AFASP Computer Interface Specification document (PDF, 1MB) for valid entries, and section 6.4 of that document for rules for mode and status summaries. ZMode Text 12 Duplicates ok Essential** AFASP Zone status summary Summary status of the fire alarm zone. See the Status table in section 7.9 of the NZFS AFASP Computer Interface Specification document (PDF, 1MB) for valid entries, and section 6.4 of that document for rules for mode and status summaries. ZStatus Text 12 Duplicates ok Essential** AFASP New Zealand Fire Service Commission page 11 of 18
12 Zone LLA Co-ordinates Fire alarm zone longitude, latitude and altitude co-ordinates (in that order, separated by a colon, : ) presented in the decimal degree format. This should be a GPS reading obtained from the zone main entrance. ZLLA Text 32 Duplicates ok Optional** AFASP New Zealand Fire Service Commission page 12 of 18
13 5.2.2 Point-related information If a message includes field PtID, then this message must also include all fields in this section (5.2.2) with profile Essential*, and may include all fields in this section (5.2.2) with profile Optional**. If a message does not include field PtID, then this message must not include any of the fields in this section (5.2.2) Point ID Fire alarm point identification, assigned by AFASP. PtID Text 8 Duplicates ok Optional AFASP Point description Point description for point identification. PtDescription Text 48 Duplicates ok Optional** AFASP Point type Point equipment type. See the Zone point types table in section 6.2 for valid entries. PtType Text 16 Duplicates ok Essential** AFASP Point mode Mode of the fire alarm point. See the Modes table in section 7.8 of the NZFS AFASP Computer Interface Specification document (PDF, 1MB) for valid entries. PtMode Select text 12 Duplicates ok Essential** AFASP Point status Status of the fire alarm point. See the Status table in section 7.9 of the NZFS AFASP Computer Interface Specification document (PDF, 1MB) for valid entries. PtStatus Text 12 Duplicates ok Essential** AFASP New Zealand Fire Service Commission page 13 of 18
14 Point level For data events from points that can forward analogue values related to the point level (e.g. temperature), with these analogue values corresponding to numeric values from 0 to would relate to the lower limit and 100 to the upper limit of the range covered by the point. If the point cannot forward analogue values, then this field must not be included in the message. PtLevel General Number 4 Duplicates ok Optional** AFASP Point rate For data events from points that can forward analogue values related to the rate of point level change (e.g. temperature change per second), with these analogue values corresponding to numeric values from 0 to 100. These numeric values relate to a change of the point level within a time period of 1 second. 0 relates to no change. 100 relates to a change from lower limit to upper limit of the range covered by the point within 1 second, and (-100) to a change from upper limit to lower limit of the range covered by the point within 1 second. If the point cannot forward analogue values, then this field must not be included in the message. PtRate General Number 5 Duplicates ok Optional** AFASP Point LLA Co-ordinates Fire alarm point longitude, latitude and altitude co-ordinates (in that order, separated by a colon, : ) presented in the decimal degrees format. This should be a GPS reading obtained from the point location. PtLLA Text 32 Duplicates ok Optional** AFASP New Zealand Fire Service Commission page 14 of 18
15 5.3 Rules for mode and status summaries The status summary and mode summary information of a parent element (site, zone or area) is determined by the states and modes of the child elements (areas, zones or points) related to that parent element. Refer to section 6.4 of the NZFS AFASP Computer Interface Specification document (PDF, 1MB) for rules for how these are summarised from child elements. New Zealand Fire Service Commission page 15 of 18
16 6 Select alarm data parameters 6.1 Data profile Select text Essential Essential** Optional Optional** Description Fields with profile Essential are necessary for any message to be processed. They must be included in every data message. Fields with profile Essential** must be included in a data message if specified conditions are met. Fields with profile Optional contain data that could optionally be sent to the NZFS. Fields with profile Optional** may or must not to be included in a data message depending on specified conditions. 6.2 Zone point types Select text Heat Gas Call point Smoke Sprinkler Flame Unknown Description Heat detector Flammable gas detector Manual call point Smoke detector Sprinkler detector Flame detector AFASP database has not determined the equipment type New Zealand Fire Service Commission page 16 of 18
17 7 Alarmdata.xsd file, API To assist development programmers in the design specification for the AFASP application, a programming interface (API) document will be supplied to qualified applicants on request to the Manager of Data and Intelligence, NZFS. The alarmdata.xsd file defines both the basic and XAP protocol messages. New Zealand Fire Service Commission page 17 of 18
18 8 Change control Version Date Page, Section Change description Dec 2008 All First release of XAP version 1.5 March 2014 All Reformatted and updated document Section 5 XAP alarm data specification unchanged Section 6 Select alarm data parameters unchanged New Zealand Fire Service Commission page 18 of 18
Overview of Automatic Fire Messaging System
Automatic Fire Alarm Service Provider Overview of Automatic Fire Messaging System V.1.0 Prepared by ALARM NEW ZEALAND LTD 10 West Terrace Newton Auckland Tel : (09) 3030303 DDI: 3063507 M: 0276943248 E:
Proposed changes to the Acceptable Solution for Building Code clause F7 (Warning Systems) Proposed amended Acceptable Solution for Warning Systems
Proposed changes to the Acceptable Solution for Building Code clause F7 (Warning Systems) Appendix A Proposed amended Acceptable Solution for Warning Systems s in the grey boxes form part of the proposed
Compliance Document for New Zealand Building Code Clause F7 Warning Systems Fourth Edition
Compliance Document for New Zealand Building Code Clause F7 Warning Systems Fourth Edition Prepared by the Department of Building and Housing This Compliance Document is prepared by the Department of Building
Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I)
Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I) By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU : Fall 2015, Networks II Agenda Introduction to networking architecture Historical
INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM
INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM Okumoku-Evroro Oniovosa Lecturer, Department of Computer Science Delta State University, Abraka, Nigeria Email: [email protected] ABSTRACT Internet security
Overview of Computer Networks
Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource
NZQA Expiring unit standard 6857 version 4 Page 1 of 5. Demonstrate an understanding of local and wide area computer networks
Page 1 of 5 Title Demonstrate an understanding of local and wide area computer networks Level 7 Credits 10 Purpose People credited with this unit standard are able to: describe network types and standards;
Associate in Science Degree in Computer Network Systems Engineering
Moorpark College Associate in Science Degree in Computer Network Systems Engineering To earn an Associate in Science Degree with a major in Computer Network Systems Engineering, students complete 40.5-45
CF Dashboard. Features and Benefits
M-Applications Manual 653 CF Dashboard Section Product Bulletin Issue Date 0601 CF Dashboard The CF Dashboard offering is a customized solution for the telecommunications market and other large enterprises.
Module 5. Fire and Emergency Alarm System Part I- Basics
Module 5 Fire and Emergency Alarm System Part I- Basics 1 This module will describe: 1. Components and the arrangements of components in fire and emergency alarm systems. 2. How these systems work. 3.
Vehicle Tracking System,
Vehicle Tracking System, The Complete Solution What is GPS? Product Review. Complete system. Contact Us. What is GPS? GPS, which stands for Global Positioning System, is the only system today able to show
Chapter 2 - The TCP/IP and OSI Networking Models
Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application
SwiftBroadband and IP data connections
SwiftBroadband and IP data connections Version 01 30.01.08 inmarsat.com/swiftbroadband Whilst the information has been prepared by Inmarsat in good faith, and all reasonable efforts have been made to ensure
Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet
Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected
Transports of explosive materials (TranV)
Transports of explosive materials (TranV) Of the judicial act results the Czech Police obligation to track transports of explosive materials within domestic and foreign routes. Applied to carriers it is
White paper. SIP An introduction
White paper An introduction Table of contents 1 Introducing 3 2 How does it work? 3 3 Inside a normal call 4 4 DTMF sending commands in sip calls 6 5 Complex environments and higher security 6 6 Summary
Autos Limited Ghana Vehicle Tracking Business Proposal
Autos Limited Ghana Vehicle Tracking Business Proposal Executive Summary Our Understanding of Your Goals We understand that you or your business needs to monitor all your vehicles or company's to minimize
OFFICE OF THE STATE AUDITOR General Controls Review Questionnaire
OFFICE OF THE STATE AUDITOR Agency: * University Please answer all of the following questions. Where we ask for copies of policies and procedures and other documentation, we would prefer this in electronic
The OSI Model and the TCP/IP Protocol Suite
The OSI Model and the TCP/IP Protocol Suite To discuss the idea of multiple layering in data communication and networking and the interrelationship between layers. To discuss the OSI model and its layer
ICTTEN2209A Build and maintain a secure network
ICTTEN2209A Build and maintain a secure network Release: 1 ICTTEN2209A Build and maintain a secure network Modification History Not Applicable Unit Descriptor Unit descriptor This unit describes the performance
ITEC310 Computer Networks II
ITEC310 Computer Networks II Chapter 28 Network Management: Department of Information Technology Eastern Mediterranean University Objectives 2/60 After completing this chapter you should be able to do
Data Logger & Net Client Software (Windows, ipad, Android) Instant On. Touch. Drop & Drag Opera on. No more proprietary display equipment!
Data Logger & Net Client Software (Windows, ipad, Android) builds an Intelligent HMI system Instant On. Touch. Drop & Drag Opera on. No more proprietary display equipment! Running a HMI system with your
LEARNING SOLUTIONS website milner.com/learning email [email protected] phone 800 875 5042
Course 6451B: Planning, Deploying and Managing Microsoft System Center Configuration Manager 2007 Length: 3 Days Published: June 29, 2012 Language(s): English Audience(s): IT Professionals Level: 300 Technology:
25 Years of Manufacturing Excellence. Premier Quatro Addressable Fire Alarm System. Assessed to ISO 9001: 2008
Premier Quatro Addressable Fire Alarm System Premier Quatro 4 Loop Analogue Addressable Fire Alarm Panel The Premier Quatro is the new 4 loop analogue Alarm Systems. It is available in 1, 2, 3 or 4 loop
Crow Limited Warranty. Print Version 017
Crow Limited Warranty (Crow) warrants this product to be free from defects in materials and workmanship under normal use and service for a period of one year from the last day of the week and year whose
New South Wales Fire Brigades Automatic Fire Alarm System Agreement
New South Wales Fire Brigades Automatic Fire Alarm System Agreement Guideline No. 4: Issued under Terms and Conditions, clause 11 Community Safety Directorate Version: 07 Date: 09/05/2013 Page: 1 of 17
TRBOnet Enterprise 3.0
TRBOnet Enterprise 3.0 Installation and Configuration Guide TRBOnet Enterprise Installation and Configuration Guide 2 Contents: Architecture Overview 1 1.1. Architecture Overview 1 1.2. System Diagram
How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN
How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN Applicable Version: 10.6.2 onwards Overview Virtual host implementation is based on the Destination NAT concept. Virtual
Network Layers. CSC358 - Introduction to Computer Networks
Network Layers Goal Understand how application processes set up a connection and exchange messages. Understand how addresses are determined Data Exchange Between Application Processes TCP Connection-Setup
How To Set Up A Xerox Econcierge Powered By Xerx Account
Xerox econcierge Account Setup Guide Xerox econcierge Account Setup Guide The free Xerox econcierge service provides the quickest, easiest way for your customers to order printer supplies for all their
Rancho Cucamonga Fire Protection District Prevention Bureau Standard
Rancho Cucamonga Fire Protection District Prevention Bureau Standard Title: Fire Alarm and Monitoring Systems Standard # 9-3 Effective: May 2002 Number of Pages: 7 Revised: January 2014 INTENT The intent
Chapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
FIRE ALARM PANEL & SYSTEM OPERATION ID50 SYSTEM. The Fire Alarm System can be activated in the following ways :~
ID50 SYSTEM The Fire Alarm System can be activated in the following ways :~ 1. By breaking the glass in a Manual Alarm Call Point 2. By a rise in temperature activating an Automatic Heat Detector 3. By
Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2
Network-Oriented Software Development Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2 Topics Layering TCP/IP Layering Internet addresses and port numbers Encapsulation
IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life
Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer
Network Client. Troubleshooting Guide FREQUENTLY ASKED QUESTIONS
Network Client Troubleshooting Guide 1 Network Client Troubleshooting Guide The first section of this guide answers some frequently asked questions (FAQs) about the operation of Intellex and the Network
CompTIA Network+ (Exam N10-005)
CompTIA Network+ (Exam N10-005) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate
Data Communication Networks and Converged Networks
Data Communication Networks and Converged Networks The OSI Model and Encapsulation Layer traversal through networks Protocol Stacks Converged Data/Telecommunication Networks From Telecom to Datacom, Asynchronous
FIRE ALARM AND EMERGENCY COMMUNICATION SYSTEM RECORD OF COMPLETION
FIRE ALARM AND EMERGENCY COMMUNICATION SYSTEM RECORD OF COMPLETION To be completed by the system installation contractor at the time of system acceptance and approval. It shall be permitted to modify this
Module 1: Reviewing the Suite of TCP/IP Protocols
Module 1: Reviewing the Suite of TCP/IP Protocols Contents Overview 1 Lesson: Overview of the OSI Model 2 Lesson: Overview of the TCP/IP Protocol Suite 7 Lesson: Viewing Frames Using Network Monitor 14
Introduction to Networks
www.eazynotes.com Maninder Kaur [Page No. 1] Introduction to Networks Short Answer Type Questions Q-1. Which Technologies of this age had led to the emergence of computer network? Ans: The technologies
Scalability is the best solution. The new Social Alarm Management System 7 Professional.
Scalability is the best solution. The new Social Alarm Management System 7 Professional. 2 Efficiency through customising Ideal solutions for your success To ensure immediate responses to emergency calls,
VoIP technology employs several network protocols such as MGCP, SDP, H323, SIP.
1 VoIP support configuration First used in the mid-1990s, VoIP is an emerging technology for telephone calls and other data transfer. The concept is relatively simple: Use the multiple networks that comprise
Computer Networks - Xarxes de Computadors
Computer Networks - Xarxes de Computadors Teacher: Llorenç Cerdà Slides: http://studies.ac.upc.edu/fib/grau/xc Outline Course Syllabus Unit 2. IP Networks Unit 3. TCP Unit 4. LANs Unit 5. Network applications
Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.
Securing Modern Substations With an Open Standard Network Security Solution Kevin Leech Schweitzer Engineering Laboratories, Inc. Copyright SEL 2009 What Makes a Cyberattack Unique? While the resources
CLEARSPAN 911/E911 Overview
CLEARSPAN 911/E911 Overview Revision 09012014-1 Proprietary Notice This document contains sensitive and proprietary information and company trade secrets that are critical to Aastra business. This information
TYLER JUNIOR COLLEGE School of Continuing Studies 1530 SSW Loop 323 Tyler, TX 75701 1.800.298.5226 www.tjc.edu/continuingstudies/mycaa
TYLER JUNIOR COLLEGE School of Continuing Studies 1530 SSW Loop 323 Tyler, TX 75701 1.800.298.5226 www.tjc.edu/continuingstudies/mycaa Education & Training Plan CompTIA N+ Specialist Program Student Full
Integrating Computer and Technology Systems Networks in Industrial Technology Programs
Volume 20, Number 2 - February 2004 to April 2004 Integrating Computer and Technology Systems Networks in Industrial Technology Programs By Mr. Awa Uma Non-Refereed Article KEYWORD SEARCH Administration
ERserver. iseries. Remote Access Services: PPP connections
ERserver iseries Remote Access Services: PPP connections ERserver iseries Remote Access Services: PPP connections Copyright International Business Machines Corporation 1998, 2002. All rights reserved.
Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol
Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol 1 TCP/IP protocol suite A suite of protocols for networking for the Internet Transmission control protocol (TCP) or User Datagram protocol
Global (Re)insurance Best Practices Accounting, Settlement and Claims
Global (Re)insurance Best Practices Accounting, Settlement and Claims A Consistent Community Approach to Implementing the ACORD Global Reinsurance and Large Commercial Message Standards V1 July 2012 Legal
CITY OF LONDON SCHOOL FOR GIRLS FIRE SAFETY, PROCEDURE AND RISK ASSESSMENT POLICY
CITY OF LONDON SCHOOL FOR GIRLS FIRE SAFETY, PROCEDURE AND RISK ASSESSMENT POLICY This policy was written in July 2014 and will be agreed by the Board of Governors in October 2014. To be reviewed by June
FIRE ALARM SYSTEM SUBMITTAL CHECKLIST AND APPLICATION
PERMITS AND INSPECTIONS FIRE ALARM SYSTEM SUBMITTAL CHECKLIST AND APPLICATION 911 Assigned PROJECT LOCATION Subdivision: Lot: Blk: Sec: PROJECT New Construction Addition/Remodel Demolition Other: Number
Millbeck Communications. Secure Remote Access Service. Internet VPN Access to N3. VPN Client Set Up Guide Version 6.0
Millbeck Communications Secure Remote Access Service Internet VPN Access to N3 VPN Client Set Up Guide Version 6.0 COPYRIGHT NOTICE Copyright 2013 Millbeck Communications Ltd. All Rights Reserved. Introduction
TCP/IP Basis. OSI Model
TCP/IP Basis 高 雄 大 學 資 訊 工 程 學 系 嚴 力 行 Source OSI Model Destination Application Presentation Session Transport Network Data-Link Physical ENCAPSULATION DATA SEGMENT PACKET FRAME BITS 0101010101010101010
Networking Test 4 Study Guide
Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.
PC/POLL SYSTEMS Version 7 Polling SPS2000 Cash Register TCP/IP Communications
PC/POLL SYSTEMS Version 7 Polling SPS2000 Cash Register TCP/IP Communications PC/POLL SYSTEMS supports native TCP/IP polling for the SPS2000 cash register. It is recommended users have the register updated
Module 1. Introduction. Version 2 CSE IIT, Kharagpur
Module 1 Introduction Lesson 2 Layered Network Architecture Specific Functional Objectives On Completion of this lesson, the students will be able to: State the requirement for layered approach Explain
Mobile IP Network Layer Lesson 01 OSI (open systems interconnection) Seven Layer Model and Internet Protocol Layers
Mobile IP Network Layer Lesson 01 OSI (open systems interconnection) Seven Layer Model and Internet Protocol Layers Oxford University Press 2007. All rights reserved. 1 OSI (open systems interconnection)
Chapter 4 Virtual Private Networking
Chapter 4 Virtual Private Networking This chapter describes how to use the virtual private networking (VPN) features of the FVL328 Firewall. VPN tunnels provide secure, encrypted communications between
Transport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX
APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix
GSM. Quectel Cellular Engine. GSM TCPIP Application Notes GSM_TCPIP_AN_V1.1
GSM Cellular Engine GSM TCPIP Application Notes GSM_TCPIP_AN_V1.1 Document Title GSM TCPIP Application Notes Version 1.1 Date 2011-09-22 Status Document Control ID Release GSM_TCPIP_AN_V1.1 General Notes
How To Upgrade To Symantec Mail Security Appliance 7.5.5
Release notes Information Foundation 2007 Symantec Mail Security Appliance 7.5 Copyright 1999-2007 Symantec Corporation. All rights reserved. Before installing or upgrading: Migration issues If you are
IT - General Controls Questionnaire
IT - General Controls Questionnaire Internal Control Questionnaire Question Yes No N/A Remarks G1. ACCESS CONTROLS Access controls are comprised of those policies and procedures that are designed to allow
FIRE ALARM SYSTEM RECORD OF COMPLETION
FUNDAMENTALS OF FIRE ALARM SYSTEMS 72 33 FIRE ALARM SYSTEM RECORD OF COMPLETION To be completed by the system installation contractor at the time of system acceptance and approval. 1. PROTECTED PROPERTY
Serenity s Web & Mobile Remote Access Concept
Serenity s Web & Mobile Remote Access Concept Communication Concept INSTALLATION Panel first connection Panel first connection The Serenity is supplied with unique serial number and Mac Address (factory
Terminology. Internet Addressing System
Terminology A local area network (LAN) is a computer network covering a small physical area, like a home, office, or small group of buildings, such as a school, or an airport. The defining characteristics
Introduction to Computer Networks and Data Communications
Introduction to Computer Networks and Data Communications Chapter 1 Learning Objectives After reading this chapter, you should be able to: Define the basic terminology of computer networks Recognize the
Application. Transport. Network. Data Link. Physical. Network Layers. Goal
Layers Goal Understand how application processes set up a connection and exchange messages. Understand how addresses are determined 1 2 Data Exchange Between Processes TCP Connection-Setup Between Processes
FIRE ALARM SYSTEM RECORD OF COMPLETION
FIRE ALARM SYSTEM RECORD OF COMPLETION To be completed by the system installation contractor at the time of system acceptance and approval. 1. Protected Property Information Name of property: Description
Learning Outcome 1 The learner will: Understand the functions and operating modes of different business information systems. Indicative Content
Unit Title: Information Systems Applications for Business Unit Reference Number: H/601/3904 Guided Learning Hours: 160 Level: Level 5 Number of Credits: 18 Learning Outcome 1 The learner will: Understand
FOXBORO. I/A Series SOFTWARE Product Specifications. I/A Series Intelligent SCADA SCADA Platform PSS 21S-2M1 B3 OVERVIEW
I/A Series SOFTWARE Product Specifications Logo I/A Series Intelligent SCADA SCADA Platform PSS 21S-2M1 B3 The I/A Series Intelligent SCADA Platform takes the traditional SCADA Master Station to a new
SNMP Web card. User s Manual. Management Software for Uninterruptible Power Supply Systems
SNMP Web card User s Manual Management Software for Uninterruptible Power Supply Systems Table of Contents 1. Overview... 3 1.1 Introduction... 3 1.2 Features... 3 1.3 Overlook... 3 1.4 Installation and
How to setup PPTP VPN connection with DI-804HV or DI-808HV using Windows PPTP client
How to setup PPTP VPN connection with DI-804HV or DI-808HV using Windows PPTP client Make sure your DI-804HV or DI-808HV is running firmware ver.1.40 August 12 or later. You can check firmware version
AT-S84 Version 1.3.0 (1.0.0.90) Management Software for the AT-9000/24 Gigabit Ethernet Switch Software Release Notes
AT-S84 Version 1.3.0 (1.0.0.90) Management Software for the AT-9000/24 Gigabit Ethernet Switch Software Release Notes Please read this document before you begin to use the management software. Supported
EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst
EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst Data communication in reality In reality, the source and destination hosts are very seldom on the same network, for
Internetworking and IP Address
Lecture 8 Internetworking and IP Address Motivation of Internetworking Internet Architecture and Router Internet TCP/IP Reference Model and Protocols IP Addresses - Binary and Dotted Decimal IP Address
IEC 61850: Communication Networks and Systems in Substations
IEC 61850: Communication Networks and Systems in Substations Sistemi e strumenti per l'automazione, A. Flammini, AA2011-2012 Background I: Power Grid Sistemi e strumenti per l'automazione A. Flammini,
etrust Audit Using the Recorder for Check Point FireWall-1 1.5
etrust Audit Using the Recorder for Check Point FireWall-1 1.5 This documentation and related computer software program (hereinafter referred to as the Documentation ) is for the end user s informational
CSCI 362 Computer and Network Security
The Purpose of ing CSCI 362 Computer and Security Introduction to ing Goals: Remote exchange and remote process control. A few desirable properties: Interoperability, Flexibility, Geographical range, Scalability,
NATIONAL FIRE ALARM AND SIGNALING CODE
GAP.11.1.1.0 A Publication of Global Asset Protection Services LLC NATIONAL FIRE ALARM AND SIGNALING CODE INTRODUCTION National Fire Protection Association (NFPA) documents describe a level of fire protection
Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0
Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0 Course length: 5 Days Course No. 688 - Five days - Instructor-led Introduction This course provides students with the knowledge and skills required
Communications and Computer Networks
SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the
ICE Trade Vault. Public User & Technology Guide June 6, 2014
ICE Trade Vault Public User & Technology Guide June 6, 2014 This material may not be reproduced or redistributed in whole or in part without the express, prior written consent of IntercontinentalExchange,
"Charting the Course...
Description "Charting the Course... Course Summary Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is a course consisting of ICND1 and ICND2 content in its entirety, but with the content
Turquoise Equities Connectivity Guide
T Q 1 0 2 T E C H N I C A L S P E C I F I C A T I O N Turquoise Equities Connectivity Guide I S S U E 2. 1 20 F e b r u a r y 2 0 1 3 Contents 1 Introduction... 3 1.1 Purpose... 3 1.2 Readership... 3 1.3
Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology
Indian Institute of Technology Kharagpur TCP/IP Part I Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 3: TCP/IP Part I On completion, the student
F re Alarm Network etwo (FAN) T rou rou h Virt Vi ual u Private Network etwo (VPN) Dr. Dr Sa S mir H. Abdull--Ja J u a wad
Fire Alarm Network (FAN) Through Virtual Private Network (VPN) By Dr. Samir H. Abdul-Jauwad Director General (Acting) Environment, Health and Safety Department July 07, 2013 1 Outline Introduction of Virtual
ELEC3030 Computer Networks
ELEC3030 Computer Networks Professor Sheng Chen: Building 86, Room 1021 E-mail: [email protected] Download lecture slides from: http://www.ecs.soton.ac.uk/ sqc/el336/ or get them from Course Office (ECS
ENDIAN Topologies Setup of different Network topologies with Endian Firewalls
ewon Application User Guide You Select, We Connect AUG 027 / Rev 1.0 ENDIAN Topologies Setup of different Network topologies with Endian Firewalls Table of Contents 1. Hardware and software requirements...3
CS 3530 Operating Systems. L02 OS Intro Part 1 Dr. Ken Hoganson
CS 3530 Operating Systems L02 OS Intro Part 1 Dr. Ken Hoganson Chapter 1 Basic Concepts of Operating Systems Computer Systems A computer system consists of two basic types of components: Hardware components,
Grandstream Networks, Inc.
Grandstream Networks, Inc. XML Based Downloadable Phone Book Guide GXP21xx/GXP14xx/GXP116x IP Phone Version 2.0 XML Based Downloadable Phone Book Guide Index INTRODUCTION... 4 WHAT IS XML... 4 WHY XML...
Networking Best Practices Guide. Version 6.5
Networking Best Practices Guide Version 6.5 Summer 2010 Copyright: 2010, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form
Contact ID Event Definition Codes
Contact ID Event Definition Codes EVENT ALARMS Medical Alarms -100 100 Medical Zone 101 Personal Emergency Zone 102 Fail to report in Zone Fire Alarms -110 110 Fire Zone 111 Smoke Zone 112 Combustion Zone
SmartPTT File Transfer User's Guide. Version 2.0
SmartPTT File Transfer User's Guide Version 2.0 Introduction 2 Introduction SmartPTT File Transfer was designed to transfer files over-the-air by means of MOTOTRBO radios. It is an easy-to-use and very
GE Security. FHSD Monitor / Web Server user manual
GE Security FHSD Monitor / Web Server user manual version 1-0 / november 2004 http://www.geindustrial.com/ge-interlogix/emea 2004 GE Interlogix B.V.. All rights reserved. GE Interlogix B.V. grants the
The OSI Model and the TCP/IP Protocol Suite PROTOCOL LAYERS. Hierarchy. Services THE OSI MODEL
The OSI Model and the TCP/IP Protocol Suite - the OSI model was never fully implemented. - The TCP/IP protocol suite became the dominant commercial architecture because it was used and tested extensively
