Ability 510M User Manual page 28

Anti-intrusion system
Table of Contents

Advertisement

A control device (card or keyfob) which allows the authorized user to access the system.
The key must be held in the vicinity of the reader in such a way to allow the system to read
it and permit access to authorized operations.
Each key is programmed with:
a random code selected from over 4 billion possible combinations
a label (usually the name of the user)
the partitions it controls (arms, disarms, etc.)
a group of pre-set parameters which allow the key user to operate the system in
accordance with the authorized access level (for example, a key can be programmed to
arm or disarm the system only at certain times of the day).
This device allows users to access and control the system. Keypads can be connected to
the system via the I-BUS.
The keypad allows users to access and control the partitions which are common to both the
code and keypad in use. The user can arm/disarm partitions, view the status of the zones,
stop visual and audible signaling devices.
A generic magnetic-contact is a detector/sensor based on an magnet which, when placed
near the sensor, provokes the mechanical closure of an electrical contact.
An electrical output point connected to a signaling or control device activated/deactivated
by the control panel in response to programmed events.
A group of zones.
A partition identifies a group of zones that belong to a spatial or logical portion of the
protected premises. For example, a partition may comprise all the zones that protect the
downstairs partition of a house (spatial partition), or all the entrances of an office building
(logical partition).
This refers to the status of a partition as requested by the user.
The user can carry out the following operations.
Disarm - this operation disables the partition completely. In this way, none of the
zones belonging to the partition can generate alarms.
Away mode - this operation enables the interior and perimeter zones of the partition.
In this way, all of the zones of the partition can generate alarms.
Stay mode - this operation enables only the perimeter zones of the partition. In this
way, only the perimeter zones of the partition can generate alarms.
Instant mode - this operation enables the partition perimeter zones only and annuls
delays. In this way, violation of the perimeter zones of the partition will generate
instant alarms.
Hold - this operation forces the partition to hold its current status.
A periodic inspection of the protected premises carried out by authorized security staff.
A zone that monitors the entrance points of the protected building.
Perimeter zones are usually direct entrance points such as doors and windows.
example, the front door of an apartment and windows that allow access from outside.
Devices connected to the control panel via the I-BUS.
Ability control panels manage the following peripherals:
nCode/S keypads
Proximity Readers (nBy)
Expansions (Flex5)
Transceiver (Air2-BS100)
Sounder (Ivy)
The period (expressed in minutes) before an automatic arming operation.
For example, if a partition is set to arm automatically at 10:30 with a Pre-arm time of 5
minutes, all the partition keypads and readers will initiate an audible countdown at 10:25
in order to warn users of the forthcoming arming operation.
Each partition can be programmed with its own Pre-arm time.
The installation site.
Identifies the building or part protected by the intrusion control system, generally, a house
or office.
Under normal circumstances, the mains power supply (230Vac) 50 Hz (110V a.c. 60Hz in
some countries).
Usually connected to a switching power supply or transformer (depending on the model)
that provides the stabilized voltage to the system and the charge source to the batteries.
This device allows users to access and control the system. The system readers are
connected to the control panel via the I-BUS.
The key (TAG) allows the user to activate shortcuts (refer to Shortcuts) and arm/disarm
the partitions which are common to both the key (TAG) and reader in use. The key (TAG)
must be held in the vicinity of the reader in such a way to allow the system to read it and
permit access to authorized operations. Although readers provide a more limited access to
the system, they are easiest way of carrying out day-to-day operations (arm, disarm,
etc.).
A pre-set arming configuration which applies various operating modes to the system
partitions.
28
User's manual
KEY
KEYPAD
( NCODE/S)
MAGNETIC CONTACT
(AIR2-MC100)
OUTPUT
PARTITION
PARTITION ARM/DISARM
OPERATIONS
PATROL
PERIMETER ZONE
For
PERIPHERALS
PRE-ARM TIME
PREMISES
PRIMARY POWER SOURCE
READER
(NBY)
SCENARIO
Technical terminology and Glossary

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

510v1030m1030b510b1030v

Table of Contents