Installation Options; Demo Installations; Non-Network Installations; Network Installations - Bosch Security Escort SE2000 Series Training Manual

Hide thumbs Also See for Security Escort SE2000 Series:
Table of Contents

Advertisement

Security Escort
5

Installation options

5.1

Demo installations

When the software is used for demo purposes, it is limited to ten records in the Subscriber
Database, one transponder in the Transponder Database and only receivers 0 through 3 on
bus 0 can be defined for that transponder (no other points can be programmed for that
transponder). If these limitations are observed, the software will communicate with the single
transponder and the system can be used with full functionality for demo purposes. Refer to
the Installing the Security Escort software section of to install the software.
After the software has been installed, do not run it. Double-click the HDD32.EXE file in the
Security Escort directory ("C:\ESCORT"). This will install the driver for the software key. This
is required even for demo installations that will not have the software key. If the HDD32.EXE
installer is not run before the Security Escort software is run the first time, the Security Escort
software will stop with an error and HDD32.EXE will automatically run. The demo installation
is complete at this point and you do not have to refer to the rest of this document.
In demo mode, communications are allowed to one transponder even if the Transponder
Database has more than one transponder in it for diagnostic purposes. The transponder
selected in the Transponder current status or Transponder communications dialog will be
the transponder that can be communicated with. The transponder can be reselected at any
time to change the current transponder in communication. All tests, supervisions and
maintenance alarms will function normally; however only subscriber alarms that contain
reports from receivers 0 through 3 on bus 0 will function. If an alarm also includes other
receivers reporting, that alarm will be ignored. Therefore, actual Security Escort operation can
be demonstrated using up to 4 receivers. Also a demo system can be used to directly connect
to transponders using the actual Transponder Database from the system to perform all
functions except subscriber alarms. This is desirable to allow a laptop to be plugged directly
into a transponder to diagnose problems. In both of these modes the Subscriber Database
must have five or less subscribers.
5.2

Non-network installations

If this system is not using the network to connect master, slave and workstation computers,
refer to the Security Escort software installation section of this document to install the
software. After the software has been installed, do not run it. Plug the software key into the
USB port on the computer and double-click the HDD32.EXE file in the Security Escort
directory ("C:\ESCORT"). This will install the driver for the software key.
If the HDD32.EXE installer is not run before the Security Escort software is run the first time,
the Security Escort software will stop with an error and HDD32.EXE will automatically run. A
non-network installation is complete at this point and you do not have to refer to the rest of
this document.
5.3

Network installations

The Security Escort software supports a single master computer, a single slave computer
(optional) and a maximum of eight workstations (limited to the number programmed in the
software key). The master computer normally processes the real time communications to the
transponders and controls the system. The slave computer can assume the master's role by
switching the transponder communications to the slave computer. This system redundancy
feature is explained in further details in the System redundancy chapter of the Technical
Reference Manual. The workstation computers allow other computers to respond to alarms,
perform maintenance and edit the databases.
Robert Bosch (SEA) Pte Ltd
Training Manual
Installation options | en
57
2017.08 | V2.18.1.0 | DOC

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents