Security Escort
Troubleshooting transponders, points, receivers, and alert units | en
177
Robert Bosch (SEA) Pte Ltd
Training Manual
2017.08 | V2.18.1.0 | DOC
7.15.6
Key Select
This button also works similarly to its counterparts in the
Operator
and
Subscriber Database
.
Using it, the reports can be ordered by
Subscriber Name
,
Transmitter ID
,
Subscriber ID
,
Alarm Time
,
Problem Type
, or
Subscriber Type
.
Figure 7.40: Select Database Key
7.15.7
Incomplete
When this button is clicked, the most recent incident report file that has not been completed
will be displayed. The reports are not reordered when this command is used.
7.16
System redundancy
The Security Escort system redundancy is operational as long as master and slave controllers
are configured in a network setup. By default, master computer is the one controlling the
devices. If the master computer is unavailable for some reasons, slave computer could take
over the operation (automatically or manually). Once the master computer is back online,
slave computer will hand over the control to the master computer. If both the master and
slave computers are not available, the system is not operational. Devices will take control by
themselves.
Notice!
In the event where the master computer is unavailable and the slave computer takes control
of the devices, alarms will be reported on the slave computer. If the master computer
becomes available again, it will try to take control of the devices.
However, if there are still
unacknowledged alarms
on the slave computer, the master
computer will not succeed in taking control, as the alarms need to be acknowledged on the
slave computer first. The master computer will try to take control of the devices continuously
until the unacknowledged alarms on the slave computer are acknowledged accordingly.
During the acknowledgement process, the receiver’s sounders and red LEDs may not be
turned off properly. You may need to turn these off manually from menu
Setup > Receiver
configuration
.
There are 2 types of redundancy: