Jamming Detection; Battery Monitoring; User Access Code; Planning And Extending Your Alarm System - Response SL3 Installation And Operating Manual

6 zone wireless security alarm
Table of Contents

Advertisement

the alarm even if the system is Disarmed (unless the
system is in Test or Program modes).

JAMMING DETECTION

In order to detect any attempts to illegally jam the
radio channel used by your alarm system, a special
jamming detection function is incorporated into the
Control Panel. If this feature is enabled, an alarm
will be triggered if the radio channel is jammed
continuously for more than 30 seconds or if the
system is jammed for more than 3 periods of
10 seconds in a 5 minute period. At full alarm it will
beep for 3 seconds and will alarm after 10 seconds,
at Part Arm it will beep for 3 seconds.
The jamming detection circuit will constantly scan for
jamming signals. However, it will also detect and
could in extreme cases be triggered by radio signals
from other radio equipment within range operating on
the same frequency which would not interfere with
the normal operation of your alarm.
If you are planning to operate the Jamming
Detection feature we recommend that you wait
at least 30 days before activating this feature to
allow time for you to become familiar with the
operation of your system.
When activating jamming detection the system
should be monitored carefully for false jamming
alarms for at least 2 weeks before leaving the
Jamming Detection function permanently enabled.

BATTERY MONITORING

All devices powered by non-rechargeable batteries
incorporate a battery level monitoring feature which
will warn of a low battery status.
In addition the Control Panel will also indicate a low
battery status on any PIR (Passive Infra-Red) or
Door / Window Detector on the system.
The batteries on any device indicating a low battery
status should be replaced immediately.

USER ACCESS CODE

The Control Panel is the heart of the system and is
where the system is programmed and operated
from. A 4 digit code is used to ensure that only
authorised people have access to the system. This
is the User access code and can be set to a code of
6
your choice that only you and other authorised
system users know.
PLANNING AND EXTENDING
YOUR ALARM SYSTEM
Before attempting to install your Alarm System it is
important to study your security requirements and
plan your installation accordingly.
PIR Movement Detectors are used to protect the
main areas of the property, (e.g. lounge, study,
hallway and landing). Door / Window Detectors are
typically used to protect the main access points to
the property, (e.g. front door, back door, patio
doors etc). However, they can also be used to
protect other vulnerable doors/ windows or access
doors to important rooms.

TYPICAL INSTALLATION

The following example (right) shows a typical
property incorporating the suggested positions
for the External Siren, PIR and Door / Window
Detectors. Use this as a guide for your installation
in conjunction with the detailed positioning
requirements for each device provided in the
appropriate installation sections in this manual
for planning your intruder alarm system.
Typical Installation using only the detectors
supplied:
1.
Place the 1st Door / Window Detector (configured
on zone 1) on the front door.
2.
Place the 1st PIR Detector (also configured on
zone 1) in the hall covering the Control Panel
and routes between downstairs rooms.
3.
Place the 2nd Door / Window Detector (configured
on zone 2) on the back or patio doors.
4.
Place the 2nd PIR Detector either
i) downstairs in the main living room containing
most valuables, (set on zone 3), or
ii) upstairs on the landing covering the access
routes between bedrooms and the stairs, (set on
zone 5). This will be inactive if Part-Arm is used.
The system may be expanded with additional detectors,
Remote Controls and Keypads to provide even greater

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Sl8

Table of Contents