20
Figure 4-6 Floor design interface
The building can be renamed in the "position description"
column in the form of building setup, which makes the alarm message easier to
read, for example, if building 1 is named as "science building", the alarm message
would be changed as follows:
Fire alarm at room 28, F8, building 1
→
Fire alarm at room 28, F8, science building
If the location information of each detector or module shall be completely independent, the
corresponding position description of each detector or module can be entered at the
"detector/module setup"
interface. For specific methods, see the setup description of
"detector/module setup"
.
If a certain floor of the building is used as equipment floor (or
mezzanine), it can be ignored during floor setup. The scroll-for-alarm of equipment
floor is typically affiliated to an adjacent floor. The detector or module floor at the
equipment floor can be entered via position description of detector or module. For
example, if an equipment floor is between 2F and 3F of the building and is affiliated
to 2F, the location of detectors at the equipment floor can be set as 2F with the
position description of "equipment floor between 2F and 3F...".
The building and floor setup must be carried out prior to other
setups, otherwise corresponding alternatives are unavailable at the time of
linkage setup and other operation interfaces. The incorrect building and floor
setup may cause wrong scroll-for-alarm or linkage.
4.1.3 Network setup
The system provides two kinds of interconnection ways: CAN Bus and Ethernet. It can
support 20 controllers to be interconnected by CAN Bus as well as 254 controllers to be
interconnected by Ethernet. Due to requirements of over-host linkage, the fire alarm message
shall be transmitted to the concentrator or other regional units in the network simultaneously, so
the networking must be carried out. The alarm messages will be only transmitted to the hosts
registered on the local machine with passive receiving as the receiving mode, the registered host
displays the alarm message it receives.
During networking, time of the concentrator (host 1) will be taken as the criterion for the
network time. Time of all hosts in the network will be changed as time of the concentrator