Fire-Lite IPDACT-2 User Manual

Page 5

Advertising
background image

Public Telephony

Switched Network

Alarm

Control Panel

Client

Alarm Receiver

Sur-Gard/Radionics

Automation SW

IBS/ MAS/ MicroKey

Fax

Alarm Receiver Center

Figure 1. Traditional security scenario

Within the general user scenario, the IPDACT-2(UD) device is located in the
client area, next to the control panel, intercepting the telephone line. This is
displayed in Figure 2. The arrow in the figure demonstrates the preferred
path to send alarms from the CP; here the telephone line is used as a backup
in case there is a communication malfunction in the IP network.

Figure 2. Teldat VisorALARM and IPDACT-2(UD) operating scenario

The IPDACT-2(UD) has a functionality incorporated giving rise to a third
possible scenario: network backup. In the previous scenario, where
communication fails between the device and the ARC, the IPDACT-2(UD)
hands over the communications to the control panel. With the new
functionality, the IPDACT-2(UD) tries to open communications with a second
device, the backup VisorALARM. Only in cases where there are problems
with this second device does the control panel take over. Meanwhile, even in
this state, the IPDACT-2(UD) continues to try and communicate with the ARC
until one of the VisorALARMs responds.

IPDACT-2(UD) - Introduction

I-2

Doc.DM385-I

Rev. 4.0

Advertising
This manual is related to the following products: