![Eaton i-onEX Series Скачать руководство пользователя страница 10](http://html1.mh-extra.com/html/eaton/i-onex-series/i-onex-series_administrators-and-user-manual_3865630010.webp)
1. Introduction
i-on40 & i-onEX Range
Page 4
detectors that monitors a different area. The highest security level is called
Full Set, and includes all the detectors. There are three other security
levels called Part Set B, C and D. For example, in a small shop Full Set
might monitor the whole premises, while Part Set B might monitor just the
store room. Any rear doors would normally be monitored 24 hours a day
(see “24 Hour Alarms” below).
Partitions
If the system is installed at a site where some users must be restricted to
parts of the site, for example a warehouse with storage areas and separate
offices, then the installer can split the system electronically into separate
“partitions”.
The i-on160EX can have up to 20 partitions, the i-on50EX up to five, the i-
on30EX and i-on40 up to four. Users can set and unset each partition
completely independently of all the others. Individual users can be given
access to one or more partitions: if they have no access to a partition then
they cannot set or unset that partition. In effect the system splits into 20 (or
five, or four) separate alarm systems.
In addition each partition can be programmed to set at one of two security
levels: either Full Set or Part Set. Any user who is allowed to set a partition
can select either of the two security levels.
24 Hour Alarms
The control unit can also monitor detectors continuously rather than being
set and unset. For example:
Fire and smoke detectors, flood sensors, Hold Up Alarm buttons or
emergency exits.
Monitors for machinery (for example freezers) or other type of
“technical alarm”.
These are collectively known as “24-hour alarms” because they can cause
an alarm 24 hours a day: it does not matter whether a user has set or unset
the system.
Communications
Your system may be fitted with a communication module that allows the
control unit to send alarm information over the telephone network, the
mobile phone network, or the internet. There are separate modules for
each of these different tasks.