background image

 
 

Access Controller

·

User Manual

 

114 

 

Appendix B

 

Custom Wiegand Rule 

Descriptions 

 
Take Wiegand 44 as an example, the setting values in the Custom Wiegand tab are as follows: 
 

Custom Wiegand Name: 

Wiegand 44 

Total Length 

44 

Transformation 

Rule 

(Decimal 

Digit) 

byFormatRule[4]=[1][4][0][0] 

Parity Mode 

XOR Parity 

Odd Parity Start Bit 

 

Length 

 

Even Parity Start Bit 

 

Length 

 

XOR Parity Start Bit 

Length 

per 

Group 

Total Length  40 

Card ID Start Bit 

Length 

32  Decimal Digit 

10 

Site Code Start Bit 

 

Length 

 

Decimal Digit 

 

OEM Start Bit 

 

Length 

 

Decimal Digit 

 

Manufacturer Code Start Bit 

32 

Length 

Decimal Digit 

 

Wiegand Data = Valid Data + Parity Data 

Total Length:

 Wiegand data length. 

Transportation Rule:

 4 bytes. Display the combination types of valid data. The example displays the combination 

of Card ID and Manufacturer Code. The valid data can be single rule, or combination of multiple rules. 

Parity Mode:

 Valid parity for wiegand data. You can select either odd parity or even parity. 

Odd Parity Start Bit, and Length:

 If you select Odd Parity, these items are available. If the odd parity start bit is 1, 

and  the  length  is  12,  then  the  system  will  start  odd  parity  calculation  from  bit  1.  It  will  calculate  12  bits.  The 
result will be in bit 0. (Bit 0 is the first bit.) 

Even Parity Start Bit, and Length: 

If you select Even Parity, these items are available. If the even parity start bit is 

12, and the length is 12, then the system will start even parity calculation from bit 12. It will calculate 12 bits. The 
result will be in the last bit. 

XOR  Parity  Start  Bit,  Length  per  Group,  and  Total  Length:

  If  you  select  XOR  Parity,  these  items  are  available. 

Depending on the table displayed above, the start bit is 0, the length per group is 4, and the total length is 40. It 
means that the system will calculate from bit 0, calculate every 4 bit, and calculate 40 bits in total (10 groups in 
total). The result will be in the last 4 bits. (The result length is the same as the length per group.) 

Card  ID  Start  Bit,  Length,  and  Decimal  Digit:

  If  you  use  the  transformation  rule,  these  items  are  available. 

Depending on the table displayed above, the card ID start bit is 0, the length is 32, and the decimal digit is 10. It 
represents that from bit 0, there are 32 bits represent the card ID. (The length here is calculated by bit.) And the 
decimal digit length is 10 bits. 

Site Code Start Bit, Length, and Decimal Digit:

 If you use the transformation rule, these items are available. For 

detailed information, see the explanation of the card ID. 

OEM  Start  Bit,  Length,  and  Decimal  Digit:

  If  you  use  the  transformation  rule,  these  items  are  available.  For 

detailed information, see the explanation of the card ID. 

Manufacturer  Code  Start  Bit,  Length,  and  Decimal  Digit:

  If  you  use  the  transformation  rule,  these  items  are 

Summary of Contents for DS-K2600-G Series

Page 1: ...DS K2600 G Series Access Controller User Manual UD05678B...

Page 2: ...THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW HIKVISION MAKES NO WARRANTIES EXPRESS OR IMPLIED INCLUDING WITHOUT LIMITATION THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PUR...

Page 3: ...hnician for help FCC Conditions This device complies with part 15 of the FCC Rules Operation is subject to the following two conditions 1 This device may not cause harmful interference 2 This device m...

Page 4: ...to a rack or shelf Major shocks or jolts to the unit as a result of dropping it may cause damage to the sensitive electronics within the unit Use the device in conjunction with an UPS if possible Pow...

Page 5: ...attempt to disassemble the device yourself We shall not assume any responsibility for problems caused by unauthorized repair or maintenance Cautions Do not drop the device or subject it to physical s...

Page 6: ...of any failure occurred you need to return the device to the factory with the original wrapper Transportation without the original wrapper may result in damage on the device and lead to additional co...

Page 7: ...Card Reader Installation 15 4 2 1 The Connection of Wiegand Card Reader 15 4 2 2 RS485 Card Reader Connection 16 4 3 Installing E Lock 17 4 3 1 Installation of Cathode Lock 17 4 3 2 Installation of An...

Page 8: ...55 7 4 8 M1 Card Encryption 55 7 4 9 Remote Configuration 56 7 5 Person and Card Management 63 7 5 1 Organization Management 64 7 5 2 Person Management 65 7 6 Schedule and Template 74 7 6 1 Week Sched...

Page 9: ...ard Linkage 101 7 10 4 Cross Device Linkage 103 7 11 Door Status Management 105 7 11 1 Access Control Group Management 105 7 11 2 Anti control the Access Control Point Door 106 7 11 3 Status Duration...

Page 10: ...larm alarm for door opening timeout duress card and code alarm blacklist alarm and alarm for illegal card swiping attempts reaching the limit The alarm input of controller supports short circuit prote...

Page 11: ...tchdog design and tamper proof function Data can be permanently saved after the access controller is powered off Supports I O linkage and event linkage Supports Ehome protocol and inter network commun...

Page 12: ...iagram is shown below No Component Description DS K2601 G DS K2602 G DS K2604 G 1 Alarm Relay Output Status NC NO 2 Network Data Indicator 3 RS 485 Communication Indicator 4 Network Status Indicator 5...

Page 13: ...Access Controller User Manual 4 No Component Description 9 Running Indicator 10 Hardware Initialization and Normal Working Choice 11 Main board dial up switch Reserved...

Page 14: ...o DS K2601 G A1 Lock Power GND Grounding A2 12V Power Output of the Lock A3 Card Reader Power GND Grounding A4 12V Power Output of the Head Read A5 Wiegand Card Reader 2 GND Grounding A6 W0 Wiegand He...

Page 15: ...Z3 Arming Region Access Terminal 3 Only for Linkage of Alarm Relay Output B5 GND Grounding B6 Z4 Arming Region Access Terminal 4 Only for Linkage of Alarm Relay Output B7 E Lock D1 Door 1 Door Relay I...

Page 16: ...8 COM1 C19 NO NC2 Alarm Relay 2 Output Dry Contact C20 COM2 D1 Event Input C2 Event Alarm Input 2 D2 GND Grounding D3 C1 Event Alarm Input 1 3 1 2 DS K2602 G Terminal Description DS K2602 G Terminal d...

Page 17: ...A18 W0 Wiegand Head Read Data Input Data0 A19 W1 Wiegand Head Read Data Input Data1 A20 BZ Card Reader Buzzer Control Output A21 ERR Indicator of Card Reader Control Output Invalid Card Output A22 OK...

Page 18: ...thode C2 GND Grounding C3 Battery BAT DC12V Battery Cathode C4 BAT DC12V Battery Anode C5 Card Reader 485 Interface RS 485A Card Reader RS485 Access C6 RS 485A Card Reader RS485 Access C7 GND Groundin...

Page 19: ...3 C3 Event Alarm Input3 D4 C2 Event Alarm Input 2 D5 GND Grounding D6 C1 Event Alarm Input 1 3 1 3 DS K2604 G Terminal Description DS K2604 G Terminal descriptions are as follows No DS K2604 G A1 Powe...

Page 20: ...Reader Data Input Data0 A19 W1 Wiegand Card Reader Data Input Data1 A20 BZ Buzzer of Card Reader Control Output A21 ERR Cresset of Card Reader Control Output Invalid Card Output A22 OK Cresset of Card...

Page 21: ...B2 Door 2 Door Button Input B24 B3 Door 3 Door Button Input B25 GND Signal Grounding B26 B4 Door 4 Door Button Input C1 Power 12V DC12V Cathode C2 GND Grounding C3 Battery BAT DC12V Battery Cathode C...

Page 22: ...output and open door relay output Arming region alarm input is only for the alarm relay output linkage RS485 card ID should be set as 1to 8 For example the ID of door 1 is 1 and 2 standing for in and...

Page 23: ...Access Controller User Manual 14 Chapter 4Card Reader Installation 4 1 External Terminal 4 1 1 DS K2601 G External Terminals 4 1 2 DS K2602 G External Terminals 4 1 3 DS K2604 G External Terminals...

Page 24: ...ller User Manual 15 4 2 Card Reader Installation 4 2 1 The Connection of Wiegand Card Reader Note You must connect the OK ERR BZ if using access controller to control the LED and buzzer of the Wiegand...

Page 25: ...Access Controller User Manual 16 4 2 2 RS485 Card Reader Connection Note If the card reader is installed too far away from the access controller you can use an external power supply...

Page 26: ...Access Controller User Manual 17 4 3 Installing E Lock 4 3 1 Installation of Cathode Lock 4 3 2 Installation of Anode Lock...

Page 27: ...Access Controller User Manual 18 4 4 Connecting the External Alarm Device 4 5 Door Button Wiring Diagram...

Page 28: ...Access Controller User Manual 19 4 6 The Connection of Magnetics Detection 4 7 Connecting Power Supply...

Page 29: ...Access Controller User Manual 20 4 8 Arming Region Input Terminal 4 8 1 Connecting Normally Open Detector 4 8 2 Connecting Normally Closed Detector...

Page 30: ...Access Controller User Manual 21 4 9 Fire Alarm Module Wiring...

Page 31: ...al Option 2 Steps 1 Jump the jumper cap from Normal to Initial 2 Disconnect the power and restart the access controller The controller buzzer buzzes a long beep 3 When the beep stopped jump the jumper...

Page 32: ...3 5 2 2 Alarm Relay Output Status Alarm Relay Output Normally Open Alarm Relay Output Normally Closed Work Flow of Software For detailed information please see the user manual of the client software R...

Page 33: ...Access Controller User Manual 24...

Page 34: ...ollow the steps to activate the control panel Steps 1 Run the SADP software to search the online devices 2 Check the device status from the device list and select an inactive device 3 Create a passwor...

Page 35: ...ress modification 6 2 Activating via Client Software The client software is versatile video management software for multiple kinds of devices Get the client software from the supplied disk or the offi...

Page 36: ...assword in the password field and confirm the password STRONG PASSWORD RECOMMENDED We highly recommend you create a strong password of your own choosing using a minimum of 8 characters including upper...

Page 37: ...lick the Modify Netinfor button to pop up the Network Parameter Modification interface 8 Change the device IP address to the same network segment with your computer by either modifying the IP address...

Page 38: ...arch and view the captured pictures stored on local PC Open Video File Search and view the video files recorded on local PC Open Log File View the backup log files Exit Exit the iVMS 4200 client softw...

Page 39: ...Log Search Open the Log Search page System Configuration Open the System Configuration page Broadcast Select camera to start broadcasting Device Arming Control Set the arming status of devices Alarm O...

Page 40: ...rity control panel in Device Management module the Security Control Panel and Real time Alarm modules will be displayed on the control panel automatically The iVMS 4200 client software is composed of...

Page 41: ...ule module provides the schedule settings for recording and pictures The Account Management module provides the adding modifying and deleting of user accounts and different permissions can be assigned...

Page 42: ...er name and password Steps 1 Input the user name and password you registered Note If you forget your password please click Forgot Password and remember the encrypted string in the pop up window Contac...

Page 43: ...n access control status management video intercom and other advanced functions You can also set the event configuration for access control and display access control points and zones on E map Note For...

Page 44: ...to the devices Advanced Function Providing advanced functions including access control parameters settings card reader authentication opening door with first card anti passing back multi door interlo...

Page 45: ...on should be supported by the device Steps 1 Enter the Device Management page 2 On the Device for Management or Online Device area check the device status shown on Security column and select an inacti...

Page 46: ...k Connect service 6 Click OK to activate the device A The device is activated window pops up when the password is set successfully 7 Click Modify Netinfo to pop up the Modify Network Parameter interfa...

Page 47: ...roperly For detailed steps please refer to Chapter 6 Activating the Access Control Terminal 2 Click Add to Client to open the device adding dialog box 3 Input the required information Nickname Edit a...

Page 48: ...ine devices 1 Check the Add Offline Device checkbox 2 Input the required information including the device channel number and alarm input number 3 Click Add When the offline device comes online the sof...

Page 49: ...ing using a minimum of 8 characters including upper case letters lower case letters numbers and special characters in order to increase the security of your product And we recommend you reset your pas...

Page 50: ...including upper case letters lower case letters numbers and special characters in order to increase the security of your product And we recommend you reset your password regularly especially in the h...

Page 51: ...ation Nickname Edit a name for the device as you want Device Serial No Input the device serial No User Name Input the device user name By default the user name is admin Password Input the device passw...

Page 52: ...by default 6 Click Add to add the device Add Devices in Batch Steps 1 Click Add to open the device adding dialog 2 Select Hik Connect Domain as the adding mode 3 Select Batch Adding 4 Input the requi...

Page 53: ...e channels of the device to the corresponding group by default 9 Click Add to add the devices Adding Devices by EHome Account Purpose You can add access control device connected via EHome protocol by...

Page 54: ...add the device Adding Devices by Serial Port Purpose You can add access control device connected via serial port Steps 1 Click Add to open the device adding dialog box 2 Select Serial Port as the addi...

Page 55: ...e can be checked by the software For your privacy we strongly recommend changing the password to something of your own choosing using a minimum of 8 characters including upper case letters lower case...

Page 56: ...y recommend changing the password to something of your own choosing using a minimum of 8 characters including upper case letters lower case letters numbers and special characters in order to increase...

Page 57: ...DDNS 4 indicates that the device is added via EHome protocol 5 indicates that the device is added by serial port 6 indicates that the device is added via Hik Connect Domain Address Edit the address of...

Page 58: ...If you set 0 for Add Offline Device this field is not required Alarm Input Number If you set 1 for Add Offline Device input the alarm input number of the device If you set 0 for Add Offline Device thi...

Page 59: ...online or offline If you use the card reader with Wiegand connection you can view the status of offline Alarm Input Status The alarm input status of each port Alarm Output Status The alarm output sta...

Page 60: ...e information window Click Network Settings tab to enter the network settings interface Uploading Mode Settings Purpose You can set the center group for uploading the log via the EHome protocol Steps...

Page 61: ...tocol By default the port No is 7660 6 Select the protocol type as EHome 7 Set an account name for the network center 8 Click Save button to save parameters Notes The account should contain 1 to 32 ch...

Page 62: ...the port No of EHome 7 4 5 Capture Settings You can set the parameters of capture linkage and manual capture Select the device in the device list and click Modify to pop up the modifying device inform...

Page 63: ...rking mode Select the device in the device list and click Modify to pop up the modifying device information window Click RS 485 Settings tab to enter the RS 485 settings interface Note The RS 485 Sett...

Page 64: ...ied to the device automatically Note After changing the communication direction the device will be rebooted A prompt will be popped up after changing the communication direction 7 4 8 M1 Card Encrypti...

Page 65: ...e You can set the detailed parameters of the selected device Checking Device Information Steps 1 In the device list you can click Remote Configuration to enter the remote configuration interface 2 Cli...

Page 66: ...In the Remote Configuration interface click System System Maintenance 2 Click Reboot to reboot the device Or click Restore Default Settings to restore the device settings to the default ones excluding...

Page 67: ...n be upgraded Managing User Steps 1 In the Remote Configuration interface click System User 2 Click Add to add the user Do not support by the elevator controller Or select a user in the user list and...

Page 68: ...ou can select Compatible Mode or Encryption Mode 3 Click Save to save the settings Configuring Network Parameters Click Network General You can configure the NIC type the IPv4 address the subnet mask...

Page 69: ...ethod You can set the main channel and the backup channel 5 Click Settings on the right of the channel field to set the detailed information 6 Click Save to save the settings Configuring Advanced Netw...

Page 70: ...click Copy to to copy the parameters to other zones Configuring Relay Parameters Steps 1 Click Alarm Relay You can view the relay parameters 2 Click the to pop up the Relay Parameters Settings window...

Page 71: ...settings Uploading Background Picture Click Other Picture Upload Click to select the picture from the local You can also click Live View to preview the picture Click Picture Upload to upload the pictu...

Page 72: ...Operating Relay Steps 1 Click Operation Relay You can view the relay status 2 Check the relay checkbox 3 Click Open or Close to open close the relay 4 Optional Click Refresh to refresh the relay stat...

Page 73: ...p organization as the parent organization of all organizations Click Add button to pop up the adding organization interface 2 Input the Organization Name as desired 3 Click OK to save the adding 4 You...

Page 74: ...can be added Adding Person Adding Person Basic Information Steps 1 Select an organization in the organization list and click Add button on the Person panel to pop up the adding person dialog 2 The Pe...

Page 75: ...issions to the person when adding person Note For setting the access control permission refer to Chapter 7 7 Permission Configuration Steps 1 In the Add Person interface click Permission tab 2 In the...

Page 76: ...led Person The door will remain open for the configured time period for the card holder Card in Blacklist The card swiping action will be uploaded and the door cannot be opened Patrol Card The card sw...

Page 77: ...time and expiry time of the card 6 Select the Card Reader Mode for reading the card No Access Controller Reader Place the card on the reader of the Access Controller and click Read to get the card No...

Page 78: ...hine to the PC and set its parameters first Click Set Fingerprint Machine to enter the following dialog box 1 Select the device type Currently the supported fingerprint machine types include DS K1F800...

Page 79: ...dance Rule You can set the attendance rule for the person Note This tab page will display when you select Non Residence mode in the application scene when running the software for the first time Steps...

Page 80: ...information 5 Click OK to start importing Getting Person Information from Access Control Device If the added access control device has been configured with person information including person details...

Page 81: ...gender of the persons will be Male by default Up to 10000 persons with up to 5 cards each can be imported Managing Person Modifying and Deleting Person To modify the person information and attendance...

Page 82: ...e door if you enable the card reader authentication mode as Card and Password Password and Fingerprint and Card Password and Fingerprint For details refer to Chapter 7 8 2 Card Reader Authentication 4...

Page 83: ...ou can click Restore Default Value button to restore the defaults Manually Input Input the card No and click Enter to input the card No 7 After issuing the card to the person the person and card infor...

Page 84: ...d edited Whole Week Schedule Card swiping is valid on each day of the week Blank Schedule Card swiping is invalid on each day of the week You can perform the following steps to define custom schedules...

Page 85: ...he schedule time bar and then click Delete Duration to delete the selected time bar or click Clear to delete all the time bars or click Copy to Week to copy the time bar settings to the whole week 7 C...

Page 86: ...n also edit the displayed time point to set the accurate time period 3 When the cursor turns to you can lengthen or shorten the selected time bar 4 Optionally you can select the schedule time bar and...

Page 87: ...You can define custom templates on your demand Steps 1 Click Add Template to pop up the adding template interface 2 Input the template name in the text filed and click OK button to add the template 3...

Page 88: ...o Chapter 7 6 2 Holiday Group You can click to select an added holiday group in the right side list and click Delete to delete it You can click Clear to delete all the added holiday groups 6 Click Sav...

Page 89: ...efer to Chapter 7 6 Schedule and Template for details 4 In the Person list all the added persons display Check the checkbox es to select person s and click to add to the Selected Person list Optional...

Page 90: ...control device to take effect Steps 1 Select the permission s to apply to the access control device To select multiple permissions you can hold the Ctrl or Shift key and select permissions 2 Click App...

Page 91: ...ccess control device you can configure its access control point door s parameters and its card readers parameters Click Access Control Parameters tab to enter the parameters settings interface Door Pa...

Page 92: ...or can be locked once it is closed even if the Door Locked Time is not reached Duress Code The door can open by inputting the duress code when there is duress At the same time the client can report th...

Page 93: ...matically Enable Failed Attempts Limit of Card Reading Enable to report alarm when the card reading attempts reach the set value Max Times of Card Swiping Failure Set the max failure attempts of readi...

Page 94: ...inputting the fingerprint Card The door can open by only swiping the card Card or Fingerprint The door can open by inputting the fingerprint or swiping the card Password and Fingerprint The door can o...

Page 95: ...button to copy the same settings to the whole week Optional You can click Delete button to delete the selected time period or click Clear button to delete all the configured time periods 5 Optional C...

Page 96: ...card permission and apply the permission setting to the access control device first For details refer to Chapter 7 7 Permission Configuration Steps 1 Click Multiple Authentication tab to enter the fo...

Page 97: ...type of the authentication group from the dropdown list Local Authentication Authentication by the access control device Local Authentication and Remotely Open Door Authentication by the access contro...

Page 98: ...Card Purpose You can set multiple first cards for one access control point After the first card swiping it allows multiple persons access the door or other authentication actions The first card mode...

Page 99: ...permission and apply the permission setting to the access control device first For details refer to Chapter 7 7 Permission Configuration 2 Click OK button to save adding the card 6 You can click Dele...

Page 100: ...e beginning and select Reader In_02 Reader Out_04 as the linked card readers Then you can only get through the access control point by swiping the card in the order as Reader In_01 Reader In_02 and Re...

Page 101: ...passing back parameters Based on Card Note The system will judge the anti passing back according to the entrance and exit records on the card 1 Select Based on Card as the anti passing back mode in th...

Page 102: ...ollment station column to select the first card reader The icon will turn to 6 Click the card reader afterward input field to select the card readers afterward in the pop up window 7 Check the checkbo...

Page 103: ...Delete Record and select the card in the pop up window to delete the card swiping information in all devices 5 Click Select Device to select a device in the pop up window for anti passing back authen...

Page 104: ...ist and click Delete to delete the combination 7 Click Save button to save and take effect 7 8 8 Authentication Password Purpose You can open the door by inputting the authentication password on the c...

Page 105: ...default 4 Optional You can input the keywords of card No person name or authentication password to search Notes Up to 500 cards with authentication password can be added to one access control device...

Page 106: ...wn list If you select Odd Even Parity you should set the odd parity start bit the odd parity length the even parity start bit and the even parity length If you select XOR Parity you should set the XOR...

Page 107: ...e device will use the customized wiegand protocol Up to 5 custom wiegands can be set Up to 32 characters are allowed in the custom wiegand name Up to 80 bits are available in the total length The odd...

Page 108: ...to export the search results to the local PC 7 10 Access Control Event Configuration Purpose For the added access control device you can configure its access control linkage including access control e...

Page 109: ...e storage in Storage Schedule 5 Check the checkboxes to activate the linkage actions For details refer to Table 14 1 Linkage Actions for Access Control Event 6 Click Save to save the settings 7 You ca...

Page 110: ...the event list on the left select an alarm input 3 Switch the property from to to enable this action Host Buzzer The audible warning of controller will be triggered Card Reader Buzzer The audible warn...

Page 111: ...pdown list For Alarm Input select the type as alarm or alarm recovery and select the alarm input name from the table For Door Event select the detailed event type and select the source door from the t...

Page 112: ...able this function Host Buzzer The audible warning of controller will be enabled disabled Capture The real time capture will be enabled Card Reader Buzzer The audible warning of card reader will be en...

Page 113: ...ecovery and select the alarm input name from the table For Door Event select the detailed event type and select the door from the table For Card Reader Event select the detailed event type and select...

Page 114: ...status and the linked event s of the selected door You can control the status of the door and set the status duration of the doors as well 7 11 1 Access Control Group Management Purpose Before contro...

Page 115: ...ng channel to the group 2 Select the names of the access control points in the list 3 Select a group from the group list 4 Click Import to import the selected access control points to the group You ca...

Page 116: ...s Information panel to control the door Click to open the door once Click to close the door once Click to keep the door open Click to keep the door closed Click to capture the picture manually 4 You c...

Page 117: ...ps 1 Click to select a door from the access control device list on the left 2 On the Door Status Configuration panel on the right draw a schedule for the selected door 1 Select a door status brush as...

Page 118: ...can select the schedule time bar and click Copy to Whole Week to copy the time bar settings to the other days in the week 4 You can select the time bar and click Delete Duration to delete the time pe...

Page 119: ...rganization event time etc You can also click the event to view the card holder details including person No person name organization phone contact address etc 7 11 5 Real time Access Control Alarm Pur...

Page 120: ...captured picture of the triggered camera when the alarm is trigged Note For setting the triggered camera refer to Chapter 7 10 1 Access Control Event Linkage 4 Click Subscribe to select the alarm that...

Page 121: ...the client can receive the alarm information from the device Steps 1 Click Tool Device Arming Control to pop up the Device Arming Control window 2 Arm the device by checking the corresponding checkbox...

Page 122: ...or swiping card Wiegand protocol Pressing keys prompt Swiping card prompt Two rapid beeps The operation of pressing keys or swiping card is valid Three slow beeps The operation of pressing keys or swi...

Page 123: ...ngth If you select Even Parity these items are available If the even parity start bit is 12 and the length is 12 then the system will start even parity calculation from bit 12 It will calculate 12 bit...

Page 124: ...g on the table displayed above the manufacturer code start bit is 32 length is 8 and decimal digit is 3 It represents that from bit 32 there are 8 bits are manufacturer code The length here is calcula...

Page 125: ...Access Controller User Manual 116...

Reviews: