-
- 139 -
SECTION 24
Downloading
This section provides the following information:
• General information about downloading
• Getting on-line with a control panel
• Advisories
• Access security
• Connecting the 4100SM module for direct wire downloading
General
Information
Downloading allows the operator to remotely access, programme, and control the
security system over normal telephone lines. Anything that can be done directly
from the keypad can be done remotely, using ADEMCO's VLINK® downloading
software. To communicate with the control panel, the following is required:
1.
An IBM PC compatible 286, 386, 486 or Pentium computer with at least 1MB
RAM, a hard disk with 12MB available disk space, running MS DOS 3.1 or
higher operating system.
2.
An Ademco designated compatible modem.
3.
Alternately, you may use a 4100SM interface module to "direct wire" the
control panel to your computer at the site (see Figure .)
4.
V-LINK® DOWNLOADING software, from ADEMCO. This software is
available on both 3-1/2" and 5-1/4" diskettes, and includes a complete User's
Manual.
Getting On-Line
with a Control
Panel
At the protected premises, the Control panel must be connected to the existing
telephone line (refer to the PHONE LINE CONNECTIONS section). No
programming of the panel is required before downloading to an initial
installation.
To download, do the following:
1.
Enter the installer code + [#] + [5]. The panel temporarily enables a ring
count of 5 and sets the Download Callback option to "1" (callback not
required).
2.
Call the panel using the downloader software set to "FIRST
COMMUNICATION" mode.
3.
The downloader will establish a session with no callback. The panel
information can then be downloaded.
In order to remotely access, control, or programme the alarm panel, a "link"
must be established between the computer and the control panel, as follows:
a.
The computer calls up the Control panel. (The phone number for each
customer is entered into the customer's account file on the computer).
b.
The Control panel "answers" at the pre-programmed ring count and
executes a handshake with the computer.
c.
The computer sends a request for call-back to the Control, unless call-
back is not required.
4.
The panel acknowledges the request and hangs up. During the next few
seconds, the Control will process the request making sure certain encrypted
information, received from the computer, matches data in its own memory.
5.
Upon a successful match, the Control panel will seize the phone line and call
the computer back, unless call-back is not required.
6.
The computer answers, usually by the second ring, and executes a handshake
with the panel.
6.
The panel then sends other default information to the computer. If this
information matches the computer's information, a successful link is
established. This is known as being "ON-LINE".