Introduction
20
security service providers also control call for intervention
services (police/fire brigade).
NTP
Network Time Protocol
The Network Time Protocol (NTP) is a standard for syn-
chronizing clocks in computer systems via packet-based
communication networks. NTP uses the UDP connection
free transport protocol, which was specially developed to
facilitate reliable time setting across networks with varia-
ble packet run times.
Generally, references to NTP refer to both the protocol
and its software reference implementation. The SNTP
(Simple Network Time Protocol) represents a simpler
form of the NTP.
Opening detector
A detector that identifies when a window, door, shutter,
garage door, etc. is opened.
Perimeter surveillance
Continuous monitoring of large areas of open land
around the periphery or the areas used for approaching
the property, e.g. using light barriers and motion detec-
tors on the premises and/or surveillance cameras with in-
telligent motion detection.
Port
Part of a network address.
Programming
Detailed settings for the alarm panel according to the
user’s requirements (e.g. zones/partitions can be de-
fined).
PSTN
Public Switched Telephone Network, analogue, a/b
Smoke alarm device
Optical smoke alarm devices save lives, as they respond
to smoke particles in the air (usually poisonous gases).
Heat detectors/heat difference detectors respond to a
maximum temperature (e.g. 65°C) or a rapid increase in
temperature.
Relay outputs
Switching outputs for external devices (lighting control,
electric shutters, other sounders, etc.)
Rolling code (RC)
Rolling code is a technology which provides optimum
protection against code scanning and code grabbing in
order to prevent unauthorised access.
Router
See IAD
RSSI
The
Received Signal Strength Indicator
is an indica-
tor of the signal strength of wireless communication
applications.
Tampering, tampering protection, sabotage
So that the alarm panel and its components cannot be
tampered with, each component is monitored for tamper-
ing. Opening a detector and disconnecting cables
ALWAYS triggers an alarm. The components are usually
protected by a cover contact (alarm when detector is
opened) and an anti-removal wall contact.
Scancom
A social care alarm protocol.
Scancom is the same as Scanfast, except for channel 8.
Channel 8 in this case is used to establish a 2-way voice
connection between the alarm panel and the alarm re-
ceiving centre.
Scanfast
A social care alarm protocol
Scanfest is the same as Fast Format, except that in this
case only channel 2 (social care alarm) and channel 3
(inactivity) are used. Channels 1, 4, 5, 6, 7, 8 are always
"5" (unused).
Arming, disarming
Activating/deactivating the alarm panel.
Arm components
Devices that can be used to arm/disarm the alarm panel
(e.g. remote control, key switch, control device).
SD card, micro SD card
Micro SD storage card for saving:
Application software in the INSTALL folder
Language files in the INSTALL folder
Images from the TVIP41550 in the IMG_X folder
Traces in the TRACE folder
A circular buffer function is integrated for images, etc.
The alarm panel checks whether the storage is full or not
every minute.
If the SD card is full, the oldest recordings will be auto-
matically deleted. However, you will still receive the error
message “SD card full”. In order to confirm this error
message, data must be manually deleted from the SD
card.
Security frequency band(868 MHz)
This frequency range is approved by the authorities for
the security field. Signals from wireless earphones, mo-
bile phones, garage door openers, etc. cannot interfere
with devices operating in these ranges.
Summary of Contents for SECVEST FUAA50 Series
Page 12: ...Device overview 12 International key assignment...
Page 39: ...Configuration 39 Communication...
Page 46: ...Configuration 46 Components Teach in via web interface...
Page 74: ...Configuration 74 Outputs...
Page 85: ...Configuration 85 1 Select menu item Type...
Page 94: ...Configuration 94...
Page 111: ...Configuration 111 System...
Page 148: ...Configuration 148 Communication Network...
Page 157: ...Configuration 157 ARC reporting...
Page 159: ...Configuration 159...
Page 177: ...Configuration 177 Voice dialler S W 3 00 05...
Page 185: ...Configuration 185...
Page 216: ...Configuration 216...
Page 229: ...Configuration 229 Log S W v2 01 08...
Page 278: ...Appendix 278...
Page 326: ......