Wireless Devices: a General Description The EKHO wireless fire system can be composed of a Sensors (EK‐WL8‐O, EK‐WL8‐H, EK‐WL8‐OH, EK‐ combination of the following wireless devices: WL8‐OV) are designed to detect smoke and/or heat in the environment. If heat and/or smoke is present EK‐WL8‐TRH Wireless translator: this device is the and exceeds a defined limit, the wireless system core of the wireless system; it communicates triggers an alarm condition. continuously with wireless devices, such as sensors, call points, sounders, etc. The translator connects to EK‐WL8‐SND Sounders play an audible warning ...
www.acornfiresecurity.com Technical Specifications Maximum number of devices supported by a single translator 126 Maximum number of expanders supported by the translator 126 Communication range between a translator and an expander or between 2000 m two expanders Communication range between a translator or expander and a wireless 1200 m device Maximum number of expanders connected sequentially one after 10 another Maximum number of expanders connected to another single expander 31 Maximum number of devices connected to a single expander 126 www.acornfiresecurity.com...
www.acornfiresecurity.com Before installing the system the following points It is recommended that preliminary system design is need to be considered. made on paper. Optimum device positioning can be verified during installation and additional expanders The communication range between the translator, can be added if required. expanders, and all wireless devices is specified in ‘free air’. The range will vary and generally decrease The number of translators / expanders required is when installed within building structures. determined by the number of wireless devices connected ...
www.acornfiresecurity.com Expanders automatically form a wireless network for If one of the expanders loses connection, the system delivering information to the translator. For will reconfigure itself and use alternative example, if an expander can’t communicate with the communication routes for delivering signals. The translator directly, it will send the signal through wireless devices that were previously connected to other expanders in the system. This means that each this expander will also reconnect to another. The expander also acts as a signal repeater. The primary ...
www.acornfiresecurity.com Frequency Channels and Traffic Wireless devices can communicate via 6 different It is recommended to keep the traffic value under 10%. One frequency channel can accommodate frequency channels. around 2000 devices. During system commissioning the installer can assess which channel has the lowest noise and A translator and the wireless devices connected to it, make up an “independent” wireless system. If the interference level and program the wireless system ...
www.acornfiresecurity.com Addressing Every wireless device has a unique address (number) For example, if the starting address is “1”, the that is automatically assigned during the following wireless devices that are added to the configuration of the wireless system. system will be given address “2”, “3”, “4”, “5” and so on. If another starting address is specified, for The wireless protocol uses its own addressing example, ...
www.acornfiresecurity.com Programming and Servicing in Translator Menu The "Configuration" menu can be accessed by entering a password. Default password‐ "33333". It can be changed in the "PSW Change" sub‐menu. Adding devices To add a new device in the system, use the ADD command in the “Configuration” menu Changing settings Each device has different settings, such as the sensitivity of smoke sensors or alarm signal type of sounders. The majority of them can be adjusted in the “Configuration” menu. www.acornfiresecurity.com...
Page 10
www.acornfiresecurity.com Servicing The “Maintenance” menu allows you to check the state of devices, generate a test alarm, and send different control commands. For more information on how to use the hardware menu on the translator, please refer to its manual. www.acornfiresecurity.com...
EKHO Configurator: Getting Started To start using the software, connect your PC to the translator via the microUSB port. Create a new configuration file. This file stores all information on the system. Select WL8‐TRV and choose USB port in the right window Send the “Program” command to the translator. After the programming is complete, press “Activate event protocoling” so that the PC maintains a constant connection with the translator and updates the state of the system in real‐time. www.acornfiresecurity.com...
www.acornfiresecurity.com Programming Devices Use the context menu of the translator to add new devices. Press “Initialize” to link the device with the translator. After pressing the “Prog” button on the device, it will appear in the pop‐up window. Select it and press “Continue” to confirm. www.acornfiresecurity.com...
www.acornfiresecurity.com Configuration Each device has a number of different properties that can be changed in the right window. Here are a few examples: WL8‐TRH settings System code is the unique identification number of the wireless network. Each translator must have a different code. It is generated randomly when a new configuration file is created. The wireless system can operate in 6 wireless channels. If the building already has some other equipment that operates in the 868MHz range, it might interfere with the wireless system. In this case, you may need to change the “Channel number”. “Child devices control period” is the time delay before the translator creates a fault event if it’s not receiving any signals from a device ...
The table contains all of the available information for each device Some of the more important columns include: Actuality – time since the last update Primary/standby supply – voltage level of the main and the backup battery Fault – current state of the device Analog value and Analog type – will contain different values based on the type of the device. For example, smoke sensors measure the smoke (Analog value 1) and dust (Analog value 3) levels in the sensor chamber. The normal voltage level of a full battery in a wireless sensor is 3.2 V. The device will generate a fault event if the voltage is in the range of 2,75 ± 0,1 V. Knowing this information, you can use EKHO Configurator to plan battery replacement ahead of time. The same principle applies to the dust level. The device goes into a fault state when the value is over 127, however, it is recommended to clean the chamber when the dust level exceeds 64. By analyzing the analog values you can plan maintenance procedures in advance and not risk any potential false alarms. www.acornfiresecurity.com...
Page 15
Double‐click any device to see the history of measurements it made. They are logged when the translator is connected to a PC and EKHO Configurator is running. EKHO Configurator software has the “Problem filter” feature that could useful for system maintenance. Open it using the button on the top of the table and select the desired time interval (e.g. a month). The “Problems” column will now display the number of faults and alarms that occurred in that time frame for each of the devices. You can sort the table by this column so that the devices that need to be inspected and fixed during maintenance will be at the very top of the list. The event protocol window is located in the bottom part of the Control tab. Here you can see all events that occur in the system. The color shows you if the event is common (white), a warning (yellow), or an alarm (red). www.acornfiresecurity.com...
Above the list of events you will find different actions available to the user: – download full protocol from the translator (up to 4000 events) ‐ enable/disable automatic scrolling when new events occur – clear the window – export full list to an HTML file ‐ filter necessary events and export to .txt or .csv You can sort the event list by one of the columns, and set a filter for each of the columns. For example, you can set the protocol window to only display alarm messages or events from a certain device. Wireless Connections The EKHO Configurator software allows you to analyze the network topology and connection strength with wireless devices in real‐time. To do that, go to the “Wireless connection” tab. To begin analyzing the network, turn on “Read signal strength data” The table allows you to see the connection strength with each device in the system. The “Evaluation” column shows connectivity levels with the devices on a scale from 2 to 5. It is recommended that all devices have a connection rate of at least 4 or 5. The “Actuality” column tells you how much time has passed since the connectivity levels have been last updated. www.acornfiresecurity.com...
Page 17
By double‐clicking on a device you can open a graph of connection strength with this device over a certain amount of time. Connection strength history is logged only while the translator is connected to a computer and EKHO Configurator is running. The graph in the lower‐left corner shows the current signal level and traffic percentage in the network. In a good functional system, the base level of the Signal graph should fall in the range from ‐110 to ‐90 dBm and Traffic should not exceed 10% The network topology window shows how wireless devices are interconnected with each other in the system. The bigger the system is, the more complicated the graph will get. The color of the line also represents the connection strength (green – 5, yellow – 4, orange – 3). Options on the right allow you to choose how the graph is displayed in the window, and toggle the visibility of backup communication routes. ...
Need help?
Do you have a question about the ekho and is the answer not in the manual?
Questions and answers