Introduction
16
Perimeter protection
All points of access to the premises are monitored, in-
cluding house doors, terrace doors, cellar doors, sky-
lights and all windows. Usually magnetic contacts, glass
breakage detectors and wireless window/door locks are
used. The building’s occupants can still move around
freely within the building when the alarm system is armed
internally.
Outdoor siren
Sounder for outdoor use, usually designed as a combina-
tion sounder (siren + strobe).
End of line (EOL)
End point of the line system, end point of access to tele-
phone network.
The line end point or "building distribution for telephone
lines" is the end of the distribution cable for the consumer
connection line within the telephone network.
User
Different users of the alarm system (e.g. owners, tenants)
can be assigned separate rights and user codes.
User guidance
Electronically guided help for operating the alarm panel.
Motion detectors
Detector used to identify people by thermal movement
(PIR), ultrasound (US) or microwave/radar (MW).
Bidirectional 2-way wireless (2WAY)
Unidirectional: components (e.g. remote control) and
control modules only transmit commands to the alarm
panel. Bidirectional: components can both receive the
feedback from the alarm panel and evaluate it (e.g. via
LED displays).
BS8243
British standard BS8243 describes a set of methods for
reducing false alarms generated by intruder and hold up
alarm systems.
Chip key/proximity keyfob
Electronic "key" for quick access to the building without
code entry.
CLIP
Calling Line Identification Presentation
Coding of wireless signals
Ensures secure transmission of signals without manipula-
tion or tampering between the alarm panel and its com-
ponents.
Contact ID, CID
Protocol for transmitting data to an ARC/ESCC.
DD243
British requirement for sequential alarm confirmation.
DHCP
The Dynamic Host Configuration Protocol (DHCP) is a
communications protocol in computer technology. It facili-
tates the assignment of the network configuration to cli-
ents through a server.
DHCP makes it possible to automatically integrate a
computer into an existing network without having to con-
figure it manually. The client usually only has to be set to
obtain the IP address automatically. When the computer
starts on the network, it is automatically assigned an IP
address, subnet mask, gateway and DNS server by the
DHCP server. Without DHCP some additional settings
are required depending on the network to which the com-
puter is connecting.
Display
Display field on the alarm panel for operating and config-
uring the panel.
DNS
The Domain Name System (DNS) is one of the most im-
portant services in many IP-based networks. Its main
task is to respond to name conversion requests.
The DNS works like a telephone directory enquiries cen-
tre. The user knows the domain (the "friendly" computer
name on the IP network), such as "example.org". The
user sends this domain as the query. The URL is then
converted by the DNS into the associated IP address (the
"connection number" on the IP network), e.g. an IPv4 ad-
dress in form 192.168.2.21 and directs it to the correct
computer.
Summary of Contents for SECVEST FUAA50 Series
Page 12: ...Device overview 12 International key assignment...
Page 39: ...Configuration 39 Communication...
Page 46: ...Configuration 46 Components Teach in via web interface...
Page 74: ...Configuration 74 Outputs...
Page 85: ...Configuration 85 1 Select menu item Type...
Page 94: ...Configuration 94...
Page 111: ...Configuration 111 System...
Page 148: ...Configuration 148 Communication Network...
Page 157: ...Configuration 157 ARC reporting...
Page 159: ...Configuration 159...
Page 177: ...Configuration 177 Voice dialler S W 3 00 05...
Page 185: ...Configuration 185...
Page 216: ...Configuration 216...
Page 229: ...Configuration 229 Log S W v2 01 08...
Page 278: ...Appendix 278...
Page 326: ......