28
Technical terminology and Glossary
User’s manual
A control device (card or keyfob) which allows the authorized user to access the system.
The key must be held in the vicinity of the reader in such a way to allow the system to read
it and permit access to authorized operations.
Each key is programmed with:
•
a random code selected from over 4 billion possible combinations
•
a label (usually the name of the user)
•
the partitions it controls (arms, disarms, etc.)
•
a group of pre-set parameters which allow the key user to operate the system in
accordance with the authorized access level (for example, a key can be programmed to
arm or disarm the system only at certain times of the day).
KEY
This device allows users to access and control the system. Keypads can be connected to
the system via the I-BUS.
The keypad allows users to access and control the partitions which are common to both the
code and keypad in use. The user can arm/disarm partitions, view the status of the zones,
stop visual and audible signaling devices.
KEYPAD
( NCODE/S)
A generic magnetic-contact is a detector/sensor based on an magnet which, when placed
near the sensor, provokes the mechanical closure of an electrical contact.
MAGNETIC CONTACT
(AIR2-MC100)
An electrical output point connected to a signaling or control device activated/deactivated
by the control panel in response to programmed events.
OUTPUT
A group of zones.
A partition identifies a group of zones that belong to a spatial or logical portion of the
protected premises. For example, a partition may comprise all the zones that protect the
downstairs partition of a house (spatial partition), or all the entrances of an office building
(logical partition).
PARTITION
This refers to the status of a partition as requested by the user.
The user can carry out the following operations.
•
Disarm
- this operation disables the partition completely. In this way, none of the
zones belonging to the partition can generate alarms.
•
Away mode
- this operation enables the interior and perimeter zones of the partition.
In this way, all of the zones of the partition can generate alarms.
•
Stay mode -
this operation enables only the perimeter zones of the partition. In this
way, only the perimeter zones of the partition can generate alarms.
•
Instant mode
- this operation enables the partition perimeter zones only and annuls
delays. In this way, violation of the perimeter zones of the partition will generate
instant alarms.
•
Hold
- this operation forces the partition to hold its current status.
PARTITION ARM/DISARM
OPERATIONS
A periodic inspection of the protected premises carried out by authorized security staff.
PATROL
A zone that monitors the entrance points of the protected building.
Perimeter zones are usually direct entrance points such as doors and windows. For
example, the front door of an apartment and windows that allow access from outside.
PERIMETER ZONE
Devices connected to the control panel via the I-BUS.
Ability control panels manage the following peripherals:
•
nCode/S keypads
•
Proximity Readers (nBy)
•
Expansions (Flex5)
•
Transceiver (Air2-BS100)
•
Sounder (Ivy)
PERIPHERALS
The period (expressed in minutes) before an automatic arming operation.
For example, if a partition is set to arm automatically at 10:30 with a Pre-arm time of 5
minutes, all the partition keypads and readers will initiate an audible countdown at 10:25
in order to warn users of the forthcoming arming operation.
Each partition can be programmed with its own Pre-arm time.
PRE-ARM TIME
The installation site.
Identifies the building or part protected by the intrusion control system, generally, a house
or office.
PREMISES
Under normal circumstances, the mains power supply (230Vac) 50 Hz (110V a.c. 60Hz in
some countries).
Usually connected to a switching power supply or transformer (depending on the model)
that provides the stabilized voltage to the system and the charge source to the batteries.
PRIMARY POWER SOURCE
This device allows users to access and control the system. The system readers are
connected to the control panel via the I-BUS.
The key (TAG) allows the user to activate shortcuts (refer to Shortcuts) and arm/disarm
the partitions which are common to both the key (TAG) and reader in use. The key (TAG)
must be held in the vicinity of the reader in such a way to allow the system to read it and
permit access to authorized operations. Although readers provide a more limited access to
the system, they are easiest way of carrying out day-to-day operations (arm, disarm,
etc.).
READER
(NBY)
A pre-set arming configuration which applies various operating modes to the system
partitions.
SCENARIO
Содержание 510M
Страница 1: ...USER S MANUAL ANTI INTRUSION SYSTEM...
Страница 4: ...4 User s manual...
Страница 32: ......