![cias IB-SYSTEM-R Installation Handbook Download Page 72](http://html1.mh-extra.com/html/cias/ib-system-r/ib-system-r_installation-handbook_2606593072.webp)
CIAS Elettronica S.r.l.
Ed 2.3
Installation manual
Page
71
of
79
IB-SYSTEM-R
When there are many network interfaces on the system it is possible to physically locate them by
using the
Buzz
command: select the required device from the list and click the
Buzz
button. On
the device the red and green status led flash alternately for around a second. This command only
works correctly if the device has been assigned a valid IP address.
3.7.2.4. Password
It is possible to protect the network devices using a password by clicking on the Password button,
which opens a new dialogue window:
Enter the old password (by default the network devices are supplied without password protection)
then enter the new password (two times for confirmation). The password can be made up from
any characters on the keyboard, including characters and punctuation signs and can have a
maximum of 6 characters. It is also case sensitive and the password PrE77 is different from
PRe77. The protection password allows modification of the device working parameters. Without
the password it is not possible to modify any of the previously set parameters.
3.7.3. Network Configuration
IB-ETH uses the UDP protocol to send the data provided by the sensors using the Ethernet
network. Each packet is sent to the broadcast address 255.255.255.255. In large information
networks, separated by firewalls and routers, packets sent directly to the address
255.255.255.255 (Broadcast address) could be blocked. In cases where it is necessary to
connect to parts of the network separated by these devices contact the Network Administrator.
Also the programming of the IB-ETH requires the use of some of the packets sent in UDP
broadcasting mode and blocking these packets will make it impossible to identify and set the
devices connected to the network.
3.7.4. Special configuration
UDP protocol is used inside the local network to interconnect sensors and various site devices. It
is possible to use FMC-Rep-ETH also to give remote access to the security system: for example
to allow remote supervision devices to connect to the system. In this case TCP protocol must be
selected on the configuration window above.
Warning: UDP protocol allows interconnection of many devices as if they are connected to the
same wire, TCP protocol can only interconnect two devices (a server and a client).
TCP protocol is subdivided in server and client: if set as a server device it will wait for incoming
connection and will remain in this state until another device connects to it. If it is set as a client
the device will try to open a connection to a specified address and will continue trying until
successful.
TCP protocol is used to give remote access to the system: in this case set it as TCP-server;
otherwise it can be used to interconnect different networks: in this case set it as TCP-server on
one device and as TCP-client on the other.