background image

 

Technical Information Brochure 

Universal DECT Secury System 

 10.05.2012

Alarm Activation

Functional Description of UDSS

16

1.9 Alarm Activation

If an FC4 U sensor detects an alarm situation or if the user triggers an alarm manu-
ally, the handset transmits an appropriate alarm telegram. The telegram includes the 
most recently received ILB code (site of the alarm) and the type of alarm. The base 
station or the repeater in whose reception area the alarm has been activated relays 
the alarm to the UDSS server. Alarm activation takes place by means of a dial-up 
connection between the handset and the UDSS server.

The UDSS server evaluates the alarm telegram. The ILB code is converted into 
appropriately configured text information. The received alarm is displayed in graphic 
and/or text form at the alarm management point of the UDSS server. A server 
acknowledgement is sent to the handset initiating the alarm. All in-coming alarms 
reports are saved as a data set in a database transaction table. At any stage, a 
history of alarm reports can be requested from the alarm management point of the 
UDSS server for subsequent evaluation.

If the control point is not manned continuously, then all alarms can also be relayed 
via messaging to other devices in the field. In this case, the location report is 
displayed as text.

Depending on the configuration, an alarm can also be relayed to external devices 
(not connected to the DECT system): for example, to mobile radios or landline tele-
phones or in the form of e-mail.

Summary of Contents for UDSS

Page 1: ...System Professional Emergency Signal System for Personal Security in hazardous areas and for lone workers Message and telemetry handling system for direct communication with all portable handsets Tech...

Page 2: ...his document is protected by copyright All rights reserved The copying distribu tion translation or conversion of this document in its entirety or any part thereof whether in electronic or otherwise m...

Page 3: ...supply 19 1 12 Commissioning 20 2 UDSS Server 21 2 1 Overview 21 2 2 Function 21 2 3 Connection type 21 2 4 Secury Software 22 2 4 1 Overview 22 2 4 2 Configuration and Operation 22 2 4 3 Warden s Ro...

Page 4: ...measures can then be taken Devices equipped with high performances sensors recognise certain hazardous situations automatically and send the corresponding alarm with an exact position of the incident...

Page 5: ...system and pre configured as a data sink in all the UDSS devices The addressed UDSS server accepts the call immediately and then awaits the modulated telegram data This data is then analysed by the UD...

Page 6: ...ic relay of alarms to other active personal emergency signal devices in the system enables assistance to be rendered rapidly Compatible with existing and new systems Compatible with standard DECT syst...

Page 7: ...s can manually create individual text messages via the alarm management point or retrieve defined texts from clients or handsets These texts can then be sent to individual subscribers groups or all su...

Page 8: ...the client by means of the internal S0 bus of the telephone exchange The CLIP feature is a basic requirement for the operation of the UDSS and must if required be subjected to a system test prior to...

Page 9: ...ommunication path to the termi nals In order to be able to use the functions of the UDSS Funkwerk DECT handsets are required see the section on Handsets Page 25 Connection between the UDSS and the exi...

Page 10: ...r 230 V Further information regarding ILBs can be found in the chapter on Inductive Localisation Beacon Page 28 In the standard configuration information regarding the immediate position of a handset...

Page 11: ...lled within a pre set reaction time by the user 1 7 1 Alarm types Manual modes Alarm Alarm designation Application Pushbutton alarm 1 Single touch of the button Active Alarm Observed danger Pushbutton...

Page 12: ...alarm time aural alarm signal sequence and volume signal and display duration Time out alarm A pre programmed key is not pressedafter a predefined time has elapsed Periodic testing for activity Man d...

Page 13: ...a programming tool and are saved to the memory card of the device via the USB MemCard dongle or a special programming cable The user can have all the alarm parameters displayed in a PIN secured Secur...

Page 14: ...the device is taken into service or at least once every 24 hours The cyclic monitoring of the connection between the handset and the UDSS server now begins During this monitoring the handsets are con...

Page 15: ...sion ranges of the ILBs do not overlap and cover an area of only a few square metres transmission range can be preset On leaving one transmis sion range and entering another the newly acquired localis...

Page 16: ...ram The ILB code is converted into appropriately configured text information The received alarm is displayed in graphic and or text form at the alarm management point of the UDSS server A server ackno...

Page 17: ...T Secury System 10 05 2012 Alarm Activation Functional Description of UDSS 17 1 9 1 Schematic representation Schematic representation Legend Symbol Meaning and features Call for help alarm activation...

Page 18: ...on to the UDSS server 2 On completion of the rescue or assistance intervention the person in charge must issue a positive reset authorisation for the relevant handset via the Secury software Resetting...

Page 19: ...he location of the alarm The alerted personnel can then hurry directly to the location of the alarm or man the UDSS server alarm control point in order to deal with the alarm If the alarm is not proce...

Page 20: ...re tool on the server 6 Test the connection between the UDSS server and the telephone exchange by means of the software tools UDSS server is now operational Login of handsets to DECT network The proce...

Page 21: ...S server is linked to the internal So bus of the customer supplied telephone exchange The UDSS server communicates with the Funkwerk FC4 handsets via the existing DECT network 2 3 Connection type The...

Page 22: ...in name and a password Depending on the authorisation status of the user one of two display modes appears on the screen The Secury software has two display modes with differentiated access rights the...

Page 23: ...d patrols can be altered to suit actual requirements Decentralised time clocks and cards are no longer required instead the ILBs can be used as contact less control points by means of special identifi...

Page 24: ...ermined locations guard patrols can be initiated manually or automatically guard alarms can be processed also via the Webnet application automatic recording of various parameters 5 010 403 011 WGS 10...

Page 25: ...s and temperature range EX protection zones 1 and 21 Gas complies with ATEX 94 9 EG II 2 G Ex ib IIC T4 Dust complies with ATEX 94 9 EG II 2 D Ex ibD 21 T125 C IP6 x IP protection class IP 65 jet proo...

Page 26: ...D4 Office Slot in battery for rapid replacement Further information can be found in the product brochure FC4 Jet proof and dust tight IP 65 Further information can be found in the product brochure FC...

Page 27: ...refore not required MemCard SIM card 3 5 Accessories and enhancements Information regarding the separately available accessories and enhancements can be found in the relevant product brochures Handset...

Page 28: ...emergency assistance In this way the current position of the user can be displayed with precision via the Secury software on the UDSS server The ILB need only be connected to a power supply either 24...

Page 29: ...nt by separate antenna optional external loop antennas recessed below surface functional monitoring of the ILB with alarm via accessory module optional sabotage alarm sabotage proof installation optio...

Page 30: ...274 000 Filter for inductive cable loops Inductive cable loops with a length exceeding 30m must be regis tered with the Federal Network Agency IOF 452 localisation filter for loops longer than 30m Enc...

Page 31: ...ell as the public telephone networks The fault report server is connected to the Funkwerk UDSS server via an interface Now it is the UDSS server that accepts the incoming fault report alarm and relays...

Page 32: ...iculty For this reason the doors are fitted with alarms Thieves often make use of this opportunity to escape from the building with their loot Here too the Funkwerk UDSS server can be of great help If...

Page 33: ...solution All personnel are equipped with Funkwerk FC4 U handsets Before start up the machine operator sends a message to both the assistants with the help of the UDSS server and the Secury software Th...

Page 34: ...UDSS server via an interface The UDSS server sends a message to the appropriate machine operator and his assistant as well as to the artisans This message identifies the relevant machine the fault re...

Page 35: ...Enhanced Cordless Telephony ESPA Expanded Signalling Protocol for Alarm Processes FC4 Funkwerk Cordless 4 DECT portable telephone GAP Generic Access Profile ILB Inductive Localisation Beacon ISDN Int...

Reviews: