background image

 

Technical Information Brochure 

Universal DECT Secury System 

 10.05.2012

Operational requirements

Functional Description of UDSS

8

1.4 Operational requirements

In order to operate a Funkwerk UDSS, a telephone system with a DECT wireless 
capability that supports DECT GAP/CAP and CLIP features is required. The Funk-
werk UDSS is integrated with the DECT network supplied by the client by means of 
the internal S

0

-bus of the telephone exchange.

The CLIP feature is a basic requirement for the operation of the UDSS and must, if 
required, be subjected to a system test prior to delivery. A list of tested exchanges is 
available under the Partner tab of the Funkwerk website.

Example of a customer-supplied telephone exchange system

Legend

Symbol

Meaning and features

Customer-supplied telephone exchange with GAP/CAP and CLIP features

Connection cable for the DECT stations and DECT Repeater

Telephone network (optional)

DECT station or DECT repeater

Содержание UDSS

Страница 1: ...System Professional Emergency Signal System for Personal Security in hazardous areas and for lone workers Message and telemetry handling system for direct communication with all portable handsets Tech...

Страница 2: ...his document is protected by copyright All rights reserved The copying distribu tion translation or conversion of this document in its entirety or any part thereof whether in electronic or otherwise m...

Страница 3: ...supply 19 1 12 Commissioning 20 2 UDSS Server 21 2 1 Overview 21 2 2 Function 21 2 3 Connection type 21 2 4 Secury Software 22 2 4 1 Overview 22 2 4 2 Configuration and Operation 22 2 4 3 Warden s Ro...

Страница 4: ...measures can then be taken Devices equipped with high performances sensors recognise certain hazardous situations automatically and send the corresponding alarm with an exact position of the incident...

Страница 5: ...system and pre configured as a data sink in all the UDSS devices The addressed UDSS server accepts the call immediately and then awaits the modulated telegram data This data is then analysed by the UD...

Страница 6: ...ic relay of alarms to other active personal emergency signal devices in the system enables assistance to be rendered rapidly Compatible with existing and new systems Compatible with standard DECT syst...

Страница 7: ...s can manually create individual text messages via the alarm management point or retrieve defined texts from clients or handsets These texts can then be sent to individual subscribers groups or all su...

Страница 8: ...the client by means of the internal S0 bus of the telephone exchange The CLIP feature is a basic requirement for the operation of the UDSS and must if required be subjected to a system test prior to...

Страница 9: ...ommunication path to the termi nals In order to be able to use the functions of the UDSS Funkwerk DECT handsets are required see the section on Handsets Page 25 Connection between the UDSS and the exi...

Страница 10: ...r 230 V Further information regarding ILBs can be found in the chapter on Inductive Localisation Beacon Page 28 In the standard configuration information regarding the immediate position of a handset...

Страница 11: ...lled within a pre set reaction time by the user 1 7 1 Alarm types Manual modes Alarm Alarm designation Application Pushbutton alarm 1 Single touch of the button Active Alarm Observed danger Pushbutton...

Страница 12: ...alarm time aural alarm signal sequence and volume signal and display duration Time out alarm A pre programmed key is not pressedafter a predefined time has elapsed Periodic testing for activity Man d...

Страница 13: ...a programming tool and are saved to the memory card of the device via the USB MemCard dongle or a special programming cable The user can have all the alarm parameters displayed in a PIN secured Secur...

Страница 14: ...the device is taken into service or at least once every 24 hours The cyclic monitoring of the connection between the handset and the UDSS server now begins During this monitoring the handsets are con...

Страница 15: ...sion ranges of the ILBs do not overlap and cover an area of only a few square metres transmission range can be preset On leaving one transmis sion range and entering another the newly acquired localis...

Страница 16: ...ram The ILB code is converted into appropriately configured text information The received alarm is displayed in graphic and or text form at the alarm management point of the UDSS server A server ackno...

Страница 17: ...T Secury System 10 05 2012 Alarm Activation Functional Description of UDSS 17 1 9 1 Schematic representation Schematic representation Legend Symbol Meaning and features Call for help alarm activation...

Страница 18: ...on to the UDSS server 2 On completion of the rescue or assistance intervention the person in charge must issue a positive reset authorisation for the relevant handset via the Secury software Resetting...

Страница 19: ...he location of the alarm The alerted personnel can then hurry directly to the location of the alarm or man the UDSS server alarm control point in order to deal with the alarm If the alarm is not proce...

Страница 20: ...re tool on the server 6 Test the connection between the UDSS server and the telephone exchange by means of the software tools UDSS server is now operational Login of handsets to DECT network The proce...

Страница 21: ...S server is linked to the internal So bus of the customer supplied telephone exchange The UDSS server communicates with the Funkwerk FC4 handsets via the existing DECT network 2 3 Connection type The...

Страница 22: ...in name and a password Depending on the authorisation status of the user one of two display modes appears on the screen The Secury software has two display modes with differentiated access rights the...

Страница 23: ...d patrols can be altered to suit actual requirements Decentralised time clocks and cards are no longer required instead the ILBs can be used as contact less control points by means of special identifi...

Страница 24: ...ermined locations guard patrols can be initiated manually or automatically guard alarms can be processed also via the Webnet application automatic recording of various parameters 5 010 403 011 WGS 10...

Страница 25: ...s and temperature range EX protection zones 1 and 21 Gas complies with ATEX 94 9 EG II 2 G Ex ib IIC T4 Dust complies with ATEX 94 9 EG II 2 D Ex ibD 21 T125 C IP6 x IP protection class IP 65 jet proo...

Страница 26: ...D4 Office Slot in battery for rapid replacement Further information can be found in the product brochure FC4 Jet proof and dust tight IP 65 Further information can be found in the product brochure FC...

Страница 27: ...refore not required MemCard SIM card 3 5 Accessories and enhancements Information regarding the separately available accessories and enhancements can be found in the relevant product brochures Handset...

Страница 28: ...emergency assistance In this way the current position of the user can be displayed with precision via the Secury software on the UDSS server The ILB need only be connected to a power supply either 24...

Страница 29: ...nt by separate antenna optional external loop antennas recessed below surface functional monitoring of the ILB with alarm via accessory module optional sabotage alarm sabotage proof installation optio...

Страница 30: ...274 000 Filter for inductive cable loops Inductive cable loops with a length exceeding 30m must be regis tered with the Federal Network Agency IOF 452 localisation filter for loops longer than 30m Enc...

Страница 31: ...ell as the public telephone networks The fault report server is connected to the Funkwerk UDSS server via an interface Now it is the UDSS server that accepts the incoming fault report alarm and relays...

Страница 32: ...iculty For this reason the doors are fitted with alarms Thieves often make use of this opportunity to escape from the building with their loot Here too the Funkwerk UDSS server can be of great help If...

Страница 33: ...solution All personnel are equipped with Funkwerk FC4 U handsets Before start up the machine operator sends a message to both the assistants with the help of the UDSS server and the Secury software Th...

Страница 34: ...UDSS server via an interface The UDSS server sends a message to the appropriate machine operator and his assistant as well as to the artisans This message identifies the relevant machine the fault re...

Страница 35: ...Enhanced Cordless Telephony ESPA Expanded Signalling Protocol for Alarm Processes FC4 Funkwerk Cordless 4 DECT portable telephone GAP Generic Access Profile ILB Inductive Localisation Beacon ISDN Int...

Отзывы: