16
Figure 4
‑
4 Building setup interface
Floor setup:
press OK button to save the setup and exit; press cancel button to retain the
original setup and exit.
Figure 4
‑
5 Floor design interface
The building can be renamed in the "location description"
column in the form of building setup, which makes the alarm message easier to
read, for example, if building 1 is named as "science building", the alarm message
would be changed as follows:
Fire alarm at room 28, F8, building 1
→
Fire alarm at room 28, F8, science
building
If the location information of each detector or module shall be completely independent, the
corresponding location description of each detector or module can be entered at the
"detector/module setup"
interface. For specific methods, see the setup description of
"detector/module setup"
.
If a certain floor of the building is used as equipment floor (or
mezzanine), it can be ignored during floor setup. The scroll-for-alarm of equipment
floor is typically affiliated to an adjacent floor. The detector or module floor at the
equipment floor can be entered via location description of detector or module. For
example, if an equipment floor is between 2F and 3F of the building and is affiliated
to 2F, the location of detectors at the equipment floor can be set as 2F with the
location description of "equipment floor between 2F and 3F...”.
The building and floor setup must be carried out prior to other
setups, otherwise corresponding alternatives are unavailable at the time of
linkage setup and other operation interfaces. The incorrect building and floor
setup may cause wrong scroll-for-alarm or linkage.
4.1.3 Networking setup
The system supports the networking of 20 control hosts of VST-3010W series. Due to
requirements of over-host linkage, the fire alarm message shall be transmitted to the
concentrator or other regional units in the network simultaneously, so the networking must be
carried out. The alarm messages will be only transmitted to the hosts registered on the local
machine with passive receiving as the receiving mode, the registered host displays the alarm
message it receives.
During networking, time of the concentrator (host 1) will be taken as the criterion for the
network time. Time of all hosts in the network will be changed as time of the concentrator
changes.