- Inner Range

advertisement
INNER RANGE
SYSTEM SPECIFICATION
February 2011
SUBJECT TO CHANGE WITHOUT NOTICE. CHECK WEBSITE FOR LATEST REVISION.
www.innerrange.com
Disclaimer
(1) The manufacturer and/or its agents take no responsibility for any damage, financial
loss or injury caused to any equipment, property or person resulting from the correct
or incorrect use of this document.
(2) Whilst every effort has been made to ensure the accuracy of this manual, Inner Range
Pty Ltd assumes no responsibility or liability for any errors or omissions.
(3) Due to ongoing changes and development, the content of this document is subject to
changes without notice.
Please direct enquiries and comments regarding this document to:
Inner Range Pty. Ltd.
1 Millennium Court
Knoxfield 3180
Victoria, Australia
+61 3 9780 4300
admin@innerrange.com
SUBJECT TO CHANGE WITHOUT NOTICE. CHECK WEBSITE FOR LATEST REVISION.
www.innerrange.com
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 2
Index
Section 1 - Software Spec ..................................................................................... 5
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
Computer Requirements................................................................................. 5
Architecture .................................................................................................. 7
Security ....................................................................................................... 9
Client Management ...................................................................................... 10
Interface With Field Hardware ....................................................................... 11
Programming .............................................................................................. 16
Virtual Panel ............................................................................................... 19
Software Database ...................................................................................... 20
Photo ID (optional module)........................................................................... 23
Card Pool (optional module) ......................................................................... 25
Schematics ................................................................................................. 26
DVR Integration (optional module) ................................................................ 28
Review ....................................................................................................... 30
Alarm Management ..................................................................................... 31
Communicator (optional module) .................................................................. 33
Dynamic User Import (optional module) ......................................................... 35
COM Interface (optional Module) ................................................................... 36
Basic Reports .............................................................................................. 37
Advanced Reports (optional module).............................................................. 38
Multi-Tenant ............................................................................................... 42
Operators ................................................................................................... 43
Tag Board (optional module) ........................................................................ 44
User Qualifications (optional module) ............................................................. 45
Credit Tracking (optional module) ................................................................. 46
Active User Rotation Module - AURM (optional module) .................................... 47
Section 2 - Hardware Spec ................................................................................. 48
26.
27.
28.
29.
30.
31.
32.
33.
34.
35.
36.
37.
38.
39.
40.
41.
42.
43.
44.
45.
46.
47.
General Requirements.................................................................................. 48
System LAN (Security Communications Network) ............................................ 50
Control Module ............................................................................................ 52
User Terminals ............................................................................................ 56
2x16 character LCD Terminal ........................................................................ 56
Weatherproof Terminals ............................................................................... 58
Touchscreen Terminals................................................................................. 60
Input / Output Expansion ............................................................................. 61
8 Input Zone Expansion Modules ................................................................... 62
16 or 32 Input Zone Expansion Modules ......................................................... 63
Wireless Detection ....................................................................................... 65
Door Controllers .......................................................................................... 67
Intelligent Door Controllers ........................................................................... 71
Lift Controllers - Access Reader Interface ....................................................... 75
Lift Controllers - Lift Control Equipment Interface ............................................ 78
Power Supplies - Stand-alone ....................................................................... 80
Power Supplies - Intelligent (LAN Comms Capability) ....................................... 81
Analogue Input Monitoring............................................................................ 83
Dual-Format Proximity Reader ...................................................................... 85
Fibre Modems ............................................................................................. 86
BMS & HVAC Interpreter .............................................................................. 88
Hardware System LAN ................................................................................. 89
Section 3 - Functional Spec ................................................................................ 91
48.
49.
50.
51.
52.
General ...................................................................................................... 91
User Terminals ............................................................................................ 92
Weatherproof User Terminals ........................................................................ 94
Touchscreen User Terminals ......................................................................... 95
Real-time Clock and Calendar Functions ......................................................... 96
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 3
53.
54.
55.
56.
57.
58.
59.
60.
61.
62.
63.
64.
65.
66.
67.
Database.................................................................................................... 98
User Database .......................................................................................... 100
Event Review Logging ................................................................................ 102
Remote Monitoring (Off-site communications) ............................................... 104
Alarm Monitoring System ........................................................................... 107
Input Testing ............................................................................................ 111
Duress Alarm Management ......................................................................... 113
Panic Alarm Management ........................................................................... 114
Door Access Control................................................................................... 117
Lift Access Control ..................................................................................... 122
Plant Monitoring System............................................................................. 124
Event Counting ......................................................................................... 127
Building Automation .................................................................................. 128
Zoned Air-conditioning Control .................................................................... 138
System Diagnostics ................................................................................... 139
Appendix A - Core Requirements ...................................................................... 142
68.
69.
70.
Software .................................................................................................. 142
Hardware ................................................................................................. 144
Functional ................................................................................................ 144
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 4
Section 1 - Software Spec
1.
Computer Requirements
1.1
Operating System
The software will function on various 32-bit and 64-bit Operating Systems,
including Microsoft® Windows® 7 (Professional / Enterprise / Ultimate),
Microsoft® Windows® Vista (Business or Ultimate), Microsoft® Windows® XP
Pro, Microsoft® Windows® 2000, Windows 2000 Server and Windows 2003
server operating systems running natively (i.e. not in a virtual machine
environment). The server may require User Account Control (UAC) to be
disabled under Windows® Vista and 7 to function correctly.
1.2
Minimum Server Hardware (small sites)
For sites with few Control Modules, no virtual users, no tenancies and low
traffic, the following system is recommended as a minimum:
(a)
2GHz single-core processor
(b)
4Gb RAM
(c)
CD-ROM (for software installation)
(d)
USB port for hardware protection dongle
(e)
Keyboard and mouse
(f)
300Mb of free hard disk space
(g)
Software:
1.
Windows® XP or Windows® Vista
2.
System Management Server Software
1.2.2
If client modules are installed on the same computer as the server (such as
for a laptop installation), then additional processing power, RAM and hard disk
space may be required.
1.3
Recommended Server Hardware (small to medium sites)
For sites running a modest number of Control Modules and/or few virtual
users and/or low event traffic, the following specifications are recommended:
(a)
Intel® i7 2.4Ghz Quad Core processor or better
(b)
8GB RAM
(c)
CD-ROM (for software installation)
(d)
100Mbps network interface card
(e)
1 spare USB port for hardware protection dongle
(f)
Hard Disks: (faster Hard Disks deliver better performance)
(g)
1.
2 x 80GB hard disks for operating system and SQL log files
(RAID 1 Configuration)
2.
3 x 80GB hard disks for SQL data files (RAID 5 Configuration)
Software:
1.
Microsoft® Windows® 2003 Server
2.
Microsoft® SQL Server
3.
System Management Server Software
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 5
1.4
Recommended Server Hardware (large sites)
For sites running a large number of Control Modules and/or many virtual users
and/or high event traffic, two separate server computers are recommended:
1.4.1
Server Computer
(a)
Intel® Dual Xeon 3Ghz Processors
(b)
12-24GB RAM
(c)
CD / DVD Rom
(d)
Network Interface Cards:
1.
1 x 100 Mbps network interface card
2.
1 x 1,000 Mbps network interface card (gigabit Ethernet for
server to server communications)
(e)
1 spare USB port
(f)
Hard Disks:
1.
(g)
1.4.2
Software:
1.
Microsoft® Windows® Server 2003 64-bit
2.
System Management Server Software
SQL Server Computer
(a)
Quad core processor (or 2 x dual core processors)
(b)
12GB RAM
(c)
CD / DVD Rom
(d)
Network Interface Cards:
(e)
(f)
1.5
2 x 10,400 RPM SCSI or SATA hard disks (RAID 1
configuration)
1.
1 x 100Mbps Network Interface Card
2.
1 x 1,000 Mbps network interface card (gigabit Ethernet for
server to server communications)
Hard Disks:
1.
2 x 15,000 RPM SCSI or SAS Hard Disks (RAID 1
configuration)
2.
3 x 15,000 RPM SCSI or SAS Hard Disks (RAID 5
configuration)
Software:
1.
Microsoft® Windows® Server 2003 64-bit
2.
Microsoft® SQL Server
Recommended Workstation Computers
(a)
2GHz single core processor
(b)
1Gb RAM
(c)
CD-ROM (for software installation)
(d)
1 x 100Mbps Network Interface Card (if running DVR integration)
(e)
1Gb of free hard disk space
(f)
XVGA video adapter supporting 1024x768 resolution and 32-bit colour
(g)
Audio speakers (if sound is required)
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 6
2.
Architecture
2.1
Client / Server
The software shall be implemented with a client / server architecture. Every
installation shall include exactly one ‘live’ server computer, which holds the
main system database. One or more computers can then run the client
software, which presents a user interface to users of the software.
2.2
Terminal Services, Citrix, Remote Desktop or related applications
The use of Terminal Services, Citrix, Remote Desktop or related applications
shall require the installation of an additional “Allow Remote” license key on the
server computer.
2.3
Multiple Control Module Connections
The system shall permit connections to multiple Control Modules
simultaneously. Control Modules can be connected using a variety of media
including serial, dial-up and TCP/IP.
2.4
IP Door Controllers
The system shall permit connections to IP Door Controllers. IP Door
Controllers can be connected at the same time as Control Modules.
2.5
Multiple Concurrent Logins
The system shall permit simultaneous connections from different Operators on
different workstations. Operators can be running the same or different
software modules on each workstation.
2.6
TCP/IP Networking
Clients can connect to the server over any TCP/IP network. No ‘file shares’ or
other network protocols will be required.
2.7
Automatic Refresh
The system will automatically refresh all workstations that are logged on.
2.7.1
If an event occurs in the field, it will be posted to all Operators
simultaneously.
2.7.2
If an Operator edits a programming item, any other Operator with the
information on-screen will see it change.
2.7.3
If an alarm is acknowledged, it will be removed from the pending alarms
window on all workstations.
2.8
Detect Two Operators Editing The Same Data
The system shall warn an Operator who simultaneously edits the same record
as another Operator. The system shall prompt the Operator whether to discard
or override the other Operators edits (subject to Operator permissions).
2.9
Operator Authentication
Operators must supply valid logon credentials before using any part of the
system.
2.10
Data Encryption
All information will be encrypted before being sent on any network. (See the
separate section on software security.)
2.11
Single Workstation Mode
The system can be installed on a single workstation if required.
2.12
Context Sensitive Help
Each module shall include comprehensive electronic help. Pressing F1 will
invoke context sensitive help for that screen. The help system will include
pictures, diagrams and explanations of how to use the system effectively.
2.13
Field Hardware Independence
If the front-end software is not running, the field hardware will continue to
function at full capacity, including authentication of all users. No alarms,
tampers or security logging information is discarded, unless the field hardware
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 7
buffer becomes exhausted (up to 6,500 discrete events, depending on field
hardware configuration).
2.14
COM Programming Interface
The system shall support a COM programming interface so that programmers
of complementary building automation systems can access information stored
by the software such as database information and review. The system shall
implement encryption and passwords so that such a conduit is protected from
unauthorised access.
2.15
Dynamic User Import
The system shall support the dynamic importation of cardholder information
by monitoring a specified folder location for data files. When a data file is
discovered the cardholders are extracted and processed. The data file is then
automatically deleted.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 8
3.
Security
3.1
Encryption
3.1.1
Between Server and Clients
Communications between the front-end Server and front-end Clients will be
encrypted with Blowfish 128-bit encryption. Blowfish is a strong, publicly
documented symmetric block cipher designed in 1993 by Bruce Schneier.
There are no known attacks.
3.1.2
Between Server and Control Modules
Communications between the front-end Server and Control Modules shall be
encrypted with AES 128-bit encryption. AES is a strong, publicly documented
symmetric block cipher. There are no known attacks.
3.2
Hardware Lock
The system will require a USB hardware lock on the server computer. The
hardware lock contains all of the licensee’s credentials for running the
software. This can include trial licenses, paid licenses and optional extra
modules.
3.2.1
If the hardware lock is moved to a different computer, then the licenses shall
travel with it to the new computer.
3.3
Hacker Countermeasures
The USB hardware lock shall include critical security and communications
components to prevent hacking the system, and will be protected by a stateof-the-art security microchip.
3.4
Workstation Lockdown
The system shall be configurable to only permit client logons from designated
workstations.
3.4.1
Attempts to logon from unauthorised workstations will be logged and rejected.
3.4.2
The system will permit the security permissions of a workstation to be
arbitrarily restricted. The system will permit such restrictions to include:
(a)
Controlling which records are visible on that workstation.
(b)
Controlling which records can be opened for inspection on that
workstation.
(c)
Controlling which records can be modified on that workstation.
Such restrictions can be set for individual items such as users so that, for
example, a workstation could only see users 10-50, inspect users 12-25 and
edit users 15-20. Non-contiguous sets can be defined.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 9
4.
Client Management
4.1
Sites
The system will allow Operators to create any number of ‘sites’. Each site can
be programmed to reflect the name, geographic location and contact details of
the site. The system will allow free-form notes to be stored with each site (up
to about 20 pages per site).
4.1.1
Each site can have any number of Control Modules and field hardware.
Graphical maps and building blueprints can also be associated with each site.
4.1.2
Adding and Removing
Sites can be added and removed at any time, subject to Operator permissions.
When a site is added, removed or modified the changes update on all
workstations instantly.
4.1.3
Organisational Chart
Sites can be organised into hierarchies, much like an organisational chart.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 10
5.
Interface With Field Hardware
5.1
Supported Network Connections
The system will support a range of different connection types including:
(a)
TCP/IP Connections
The system will support TCP/IP connections via an Ethernet UART.
(b)
Direct Serial Connections
The system will support direct serial connections over RS-232 twisted
pair. Maximum recommended speed will be 38,400 baud (during
enrolment) and 9,600 baud (during normal operation).
(c)
Dial-up Connections
The system will support dial-up connections via any ATAPI compliant
modem (on the Server side) and an internal or external modem (on the
Control Module side). Maximum recommended speed will be 38,400
baud (during enrolment) and 9,600 baud (normal operation).
5.2
TCP/IP Connections Using IP Addressing and DNS
The system shall support the use of both IP Addressing and the Domain
Naming Service (DNS) to facilitate connections between Control Modules in
the field and the System Management Server.
5.3
Use of Domain Naming Service (DNS) for System Redundancy.
The system shall allow a selectable option to change the manner in which the
Field Hardware uses DNS. In this way, DNS or Dynamic DNS may optionally
be used in conjunction with a centralised database as a means of providing
additional system redundancy. This option will determine which of the
following modes are implemented on the particular Control Module:
(a)
The Ethernet UART on the Control Module will query the nominated DNS
Server upon start-up of the system or start-up of the programmed
communication task.
(b)
The Ethernet UART on the Control Module will query the nominated DNS
Server upon start-up of the system or start-up of the programmed
communication task and also within a few minutes of the system having
lost connection to the system management server. The DNS Server will
continue to be re-queried every few minutes whilst the system
management server is off-line until the connection has been restored.
5.4
Use of a Virtual Machine for System Redundancy
The system shall be capable of installation within a virtual machine
environment. In this way, the system load may be spread across multiple
computer hardware installations to give better performance and machine level
redundancy.
5.5
Permanent vs. On-Demand Connections
The system will support both ‘permanent’ and ‘on demand’ connections.
(a)
Permanent connections are always available for communications.
(b)
On demand connections are normally not kept open, but will be
established if an alarm occurs or to synchronise data or time between
the server and field hardware.
5.6
Network Path Redundancy
The system will support redundancy. If multiple connection paths are enabled,
then the system will choose the best available path.
5.6.1
If the current path fails, the system will switch to another path.
5.6.2
If the primary path becomes available, the system will switch back to it
automatically.
5.7
Modem Blocking
The system will support modem blocking. With modem blocking, Operators
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 11
can specify which modems in a modem pool are available for dialling Control
Modules.
5.8
Connect To Multiple Panels
The system will allow Operators to connect to multiple Control Modules
simultaneously. (See the Architecture section for more information.)
5.9
Scheduled Connections
The system shall permit modem connections to be scheduled, either:
5.9.2
(a)
Hours, daily or weekly
(b)
On specific days of the week and at specific times
(c)
On a particular day of each month
(d)
On the first, second, third, fourth or last occurrence of a particular day
each month
Once a scheduled connection is made, the system can be programmed to
close the connection:
(a)
After a certain time has elapsed
(b)
After all offline edits have been synchronised
(c)
After no review has been received for a specified time interval
5.9.3
The system shall allow the number of retries, the retry timeout and the abort
interval to be specified for each schedule.
5.9.4
The system shall allow schedules to be configured on an individual panel basis.
5.9.5
The system shall maintain a log of successful connections as well as any errors
encountered in the process.
5.10
Control Module Enrolment
The system will require that Control Modules be enrolled into the system. This
enrolment process will be handled by a user-friendly enrolment wizard, which
guides the Operator through the enrolment process.
5.11
Support for Legacy Control Modules
The system will include support for legacy or older version Control Modules.
The degree of interoperability will be determined by the capability of the
version of Control Module connected and may extend to the:
(a)
Upload and Download of all structures
(b)
Control of Areas, Doors etc.
(c)
Retrieval and storage of Review
5.12
Control Module Import / Export
The system will allow Operators to export a Control Module configuration to a
file. The exported file, which will be saved in XML (Extensible Mark-up
Language) format, will include a complete snapshot of that Control Module
including module programming, cardholders, area programming, extended
fields and notes.
5.13
Enrol From Template
The system will allow Control Modules to be enrolled from a template instead
of an actual Control Module on the network. This will allow Operators to
“program up” a system prior to hardware procurement.
5.13.1
The system will include templates for all Control Module memory
configurations. Operators will be allowed to create any number of additional
templates based on Control Modules installed at their site.
5.14
Support for a second temporary System Management Software
Connection
In addition to support for multiple Client Workstations, the system shall allow
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 12
one additional and concurrent computer connection directly to the Control
Module to facilitate installation and servicing of the system by the Installer or
Service Technician. Such a secondary connection will be ad-hoc and temporary
in nature. The Operator(s) of the primary System Management application will
be alerted to any programming changes that are made during this secondary
session and will be given the opportunity to accept or reject the programming
changes.
5.15
Software  Control Module Interface
5.15.1
Octane™ Compression
The software shall support Octane™ compression on all communications paths
with Control Modules. (This technology radically improves communication
bandwidth by compressing data in both directions. Octane™ is based on a
technology which yields significant performance gains on installed systems. )
The table below shows typical enrolment timings both with and without
Octane™ compression on defaulted Control Modules.
Configuration
Size
Standard
Access
Enlarged
Apartments
Access 2
Special
Alarms
512k
512k
512k
512k
512k
512k
512k
Without
Octane™
10:10
10:48
8:41
9:01
10:37
10:18
10:58
With Octane™
Speed Increase
2:13
2:39
1:26
1:20
1:34
1:28
1:28
459%
408%
606%
676%
678%
702%
748%
Source: Panel Enrolment Timings, Andy Lam (engineer), Inner Range 2004.
5.15.2
Rijndael AES 128-bit Encryption
Communications between the front-end Server and Control Modules will be
encrypted with Rijndael AES 128-bit encryption. Rijndael is a strong, publicly
documented symmetric block cipher designed by Dr. Joan Daemen and Dr.
Vincent Rijmen, and has been the AES (Advanced Encryption Standard)
algorithm since October 2000. There are no known attacks.
5.15.3
International Standard 32-bit CRC
Communications between the software and Control Modules will be verified
with the international standard 32-bit cyclic-redundancy check polynomial.
5.15.4
Native TCP/IP Support
The system will support native TCP/IP communications with Control Modules
fitted with an Ethernet UART Board. The software shall communicate with
Control Modules on the same network or different networks, including Control
Modules located elsewhere on the worldwide Internet.
5.15.5
Native PPP Support
The system shall include PPP support. This means that the Control Module can
connect to the internet through a regular dial-up ISP, and communicate with
the software through this connection.
5.15.6
Alarm Prioritisation
The Control Module will transmit alarm events to the software in priority to
regular review events.
5.15.7
Status Prioritisation
The system shall prioritise ‘status’ events over regular review events. This will
ensure that graphical floor plans are updated quickly regardless of the amount
of buffered review.
5.15.8
The system shall prioritise ‘control’ events over regular review events. This will
ensure that control commands are actioned quickly, regardless of the amount
of buffered review.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 13
5.15.9
Status notifications will not rely on polling. Changes shall be transmitted by
the Control Module as they occur and at no other time.
5.15.10
Remote Hardware Control
The system will allow Operators to remotely control field hardware. The
following items will be controllable:
(a)
Areas and Area Lists (with tamper option)
(b)
Auxiliaries, Home Auxiliaries and Auxiliary Lists (with override option)
(c)
Doors and Door Lists (with timed option)
(d)
Floors and Floor Lists (with override option)
(e)
Zone Inputs and System Inputs (with sticky option)
5.15.11
Push Programming
The system shall send programming changes through to field hardware
without any special LAN commands such as LAN Init or LAN Secure. Field
hardware will adopt the new programming immediately and automatically.
5.15.12
Data Integrity Check
At any time an Operator can perform a full or partial data integrity check. This
will compare the field programming with the front-end programming. Any
differences will be highlighted and the Operator can decide how to synchronise
each difference.
5.15.13
Monitoring Field Programming Changes
On connection to the Control Module the system shall automatically detect if
any system parameters have been changed at a terminal. The system will
notify the Operator which item(s) were changed. The Operator can choose to
accept or reject the changes.
5.15.14
LAN Status
The system shall display the status of all field hardware automatically. The
status displayed will include:
5.15.15
(a)
Module present
(b)
Module missing
(c)
Module substituted
(d)
Module not installed
Control Module Initiated Connections
The system shall be configurable so that the Control Module initiates a
connection with the front-end software. A connection can be triggered by the
following events:
1.
An alarm or tamper has occurred
2.
Review buffer has filled to a specified watermark
5.15.16
Timed Fax Bypass
The system will support timed fax bypass, so that the Control Module can
share a single dial-up line with a facsimile machine.
5.15.17
Synchronise Date/Time
The system shall be configurable to automatically synchronise the date and
time of each Control Module. Synchronisation settings will be separate for
each Control Module. Synchronisation can be scheduled to run:
(a)
Hourly, daily or weekly
(b)
On specific days of the week and at specific times
(c)
On a particular day of each month
(d)
On the first, second, third, fourth or last occurrence of a particular day
each month
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 14
5.15.18
Different Panel Time Zones
The system shall allow multiple Control Modules to be assigned in different
regional time zones, such that, a time synchronisation command sent from the
system management server to the Control Module(s) will be automatically
adjusted to reflect the regional time zone time differences.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 15
6.
Programming
6.1
Programming GUI
The system will include a graphical user interface that adheres to the Microsoft
User Interface Guidelines for Windows Professional Editions.
6.1.1
The system will provide forms tailored for each editing task.
6.1.2
Multiple forms can be opened at the same time.
6.1.3
Having a form open will not prevent the Operator from performing any other
editing tasks.
6.2
Context-Sensitive Help
The system will provide comprehensive on-line help, with full indexing and
search capabilities.
6.2.1
The Operator can invoke help specific to the current screen or window by
pressing the F1 key.
6.3
Field Device Programming
The system will allow Operators to program or re-program field devices either
live or off-line.
6.3.1
Programming changes made to field device programming will take effect
automatically, without requiring a LAN initialisation command.
6.4
Online and Offline Editing
The system will allow both online and offline editing.
6.4.1
All offline edits will be tagged, so that an Operator can immediately see which
data items have been modified but not saved to the field hardware.
6.4.2
The system will include a counter, visible at all times, of how many modified
records are waiting to be sent to an offline Control Module and its attached
field hardware.
6.4.3
The system will enable Operators to immediately hide all records that are
synchronised, so that only offline edits are visible.
6.4.4
Online edits will be sent to the field hardware immediately.
6.4.5
Programming changes made to the panel at the terminal are automatically
updated to the system management software.
6.5
Custom Fields
6.5.1
The system shall allow one or more of the first five custom fields within a
users’ programming to be locked as read-only.
6.5.2
The system shall be configurable to only allow the Installer operator, or both
the installer and administrator operators, to lock custom fields to ensure only
these operators can add, remove, or rename custom fields.
6.6
Filtering
The system will display items according to criteria specified by the Operator.
With a single button press, the Operator can selectively show or hide items
based on:
6.7
(a)
Name (text search)
(b)
LAN status (secured, missing, substituted, not installed)
(c)
Programming status (programmed, un-programmed, queued for
upload/download)
Installer and Master PIN Protection
As an additional safeguard, the PIN of User 0001 (‘installer’) and User 0002
(‘master’) shall never be displayed. To change these PINs, the existing PIN
must be entered first.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 16
6.8
PIN Discovered Warning
If an Operator edits a cardholder PIN from the front-end, and inadvertently
discovers the PIN of another cardholder, then the following sequence will
occur:
(a)
The Operator shall be told that the PIN cannot be used.
(b)
When the cardholder with the discovered PIN accesses an Elite
Terminal, they shall be warned that their PIN has been discovered.
6.9
Cardholder Expiry Scheduling
Operators can schedule the expiry of any cardholder in the system. When the
appointed date and time occurs, the cardholders’ user type will automatically
change to the specified type.
6.9.1
Normally, this will be the user type ‘none’ which expires the user; however,
any user type can be specified, meaning that at a scheduled time a user’s
access privileges can be increased or decreased as required.
6.9.2
This mechanism shall be implemented within the front-end software, and will
be provided in addition to the existing expiry mechanism in the Control
Module.
6.10
Direct Cardholder Enrolment
The system will allow Operators to enrol cardholders directly into the front-end
software via an attached card reader. The following reader hardware will be
supported:
6.10.1
(a)
Inner Range Card Enrolment Station
(b)
Inner Range Reader
(c)
ACS Smart Reader
(d)
HID PC Log-On
The following formats will be supported:


N-Bit
37 Bit


General
36 Bit


IR 40 Bit
35 Bit


40 Bit
34 Bit

32 Bit


30 Bit
27 Bit
IR Card Enrolment Station
IR Card Reader
ACS Smart Reader
HID PC Log-On
26 Bit
Site Code Method






27 Bit
30 Bit
32 Bit
34 Bit
35 Bit
36 Bit
37 Bit
40 Bit
IR 40 Bit
General
N-Bit
IR Card Enrolment Station
IR Card Reader
ACS Smart Reader
HID PC Log-On
26 Bit
Direct Entry Method




















6.11
Full and Partial Upload and Download
The system will allow full and partial upload and download between the frontend and Control Modules.
6.11.1
If the Control Module is offline, then the affected records are visibly tagged to
remind the Operator that the upload or download will occur the next time the
Control Module is online.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 17
6.12
Dynamic Memory Configuration Changes
The system will automatically detect if a Control Module is defaulted with a
new memory configuration. It will automatically adjust the front-end database
accordingly, and give the option of expanding or truncating the number of
items in the directory as required.
6.13
Commissioning Reports
The system will allow Operators to generate a variety of Commissioning
Reports, including:
(a) User programming
(c) Input programming
(e) Lift Car List programming
(g) Siren List programming
6.13.1
(b) User Type programming
(d) Door List programming
(f) Floor List programming
It will also allow Operators to generate a variety of Cross Reference Reports,
including:
(a)
(b)
(c)
User Type Reports
1.
Which doors can be accessed by this User Type
2.
Which users are of this User Type
3.
Which areas can be controlled by this User Type
4.
Which floors can be accessed by this User Type
Area Reports
1.
Which inputs are in this area
2.
Which inputs in this area that can generate alarms
3.
Which users can turn this area on
4.
Which users can turn this area off
5.
A list of inputs in an area and their process groups
User Reports
1.
Which users can access a door / area / floor
2.
Which doors a user has access to
3.
Which areas a user can control
4.
Which floors a user has access to
6.13.2
Reports can be viewed, printed to hard copy or saved to file.
6.13.3
Filtering
The system shall permit commissioning reports to be filtered for criterion such
as names, notes or regular expressions. Filtering may require an Advanced
Reports license.
6.14
Complete Audit Trail
The system will maintain an audit trail of all programming changes, including
creation, deletion, and modification, made from the front-end. The audit trail
will include the transaction date and time, details of the transactions, and the
operator logged on. The “from” and “to” details of each change shall be
recorded, for example, “User John S has been renamed to John Smith.”
6.15
Site Cross-Reference
At any time an Operator will be able to generate a “relationships tree” which
shows how all programming items inter-relate. For example, clicking on a door
will show the lock auxiliary, access group, inter-lock group and controlled
areas for that door.
6.16
External Applications
The system shall allow an Operator to create an application link, including
icon, title, and description, to launch a third party application directly from the
home screen of the system management software.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 18
7.
Virtual Panel
7.1
Group Multiple Panels
The system will allow Operators to create one or more virtual panels. A virtual
panel will be a ‘container’ for one or more physical Control Modules. Items in
the virtual panel shall be editable as per normal, except changes will be sent
automatically to all member Control Modules.
7.1.1
Any number of Control Modules can be combined into a virtual panel.
7.1.2
Control Modules can be added and removed from the virtual panel at any
time.
7.2
Virtual Panel Wizard
The system shall guide Operators through the process of creating a virtual
panel with a user-friendly wizard. The wizard will ask the Operator which
panels to include in the virtual panel, and also how the virtual users should be
created. Choices will include:
(a)
Default all users
(b)
Import users from a member panel
(c)
Don’t create any virtual users (the Operator can add them manually
later)
7.3
Virtual Cardholders
Operators can open cardholders in the virtual panel. Any changes will
automatically be saved to all physical member panels. The virtual cardholder
will include the extended information (such as photograph, name and address,
and notes) and also any custom user fields that have been defined in the
system.
7.3.1
Virtual cardholders can have the same user type in each member panel, or
different user types. The system will provide complete flexibility in assigning
user privileges in each panel, whilst maintaining the ability to edit the
cardholder in one place.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 19
8.
Software Database
8.1
Standard Query Language (SQL)
The system will store all information in a relational database. The database
will be an industry-standard database composed of tables and relationships
and accessed with SQL queries. The system databases shall, as a minimum,
be compatible with SQL Server 2005.
8.2
Open Database Connectivity (ODBC)
The server will access the database engine via an industry-standard ODBC
connection.
8.3
Referential Integrity
The database will support referential integrity.
8.4
Maximum Limits
The system shall use ODBC and SQL to access a relational database, hence
there will be no hard limits on the number of cardholders, field devices or
security data that can be stored. The choice of database engine will dictate the
actual maximum limits.
8.4.1
The default engine installed will be SQL Express Server. This is a database
engine based on the popular SQL Enterprise Server. SQL Express Server
imposes a database limit of 4 gigabytes, or approximately four thousand
million bytes.
8.4.2
A computer with the recommended hardware configuration will comfortably
store hundreds of thousands of cardholders and manage events from multiple
Control Modules in the field.
8.4.3
The system shall be capable of being hosted by SQL 2008 Server.
8.5
Users (Cardholders) Database
The system will store information about users of the system. A user is a
person with privileges at the field hardware level – in other words, a person
with PIN or card access at a system terminal or card reader.
8.6
Control Module Data
The system will store a complete copy of all Control Module data including
User Type, User Rank, Extra Area, Extra Door, Extra Door List, Access
Options, Expiry Data and Fob Programming.
8.7
Extended Information
The system will store extended information that, due to space limitations, isn’t
stored by field devices. This information will include:
(a)
Title, First and Last Names (as separate long fields; the field hardware
will store a single name field for some or all cardholders, depending on
memory configuration)
(b)
Birth date, Gender
(c)
Business Profile (Position / Department / Email, Phone / Fax / Mobile)
(d)
Personal Profile (Address, Email, Phone / Fax / Mobile)
(e)
User Photograph
(f)
Notes (free text)
(g)
Custom fields (up to 32 custom labels, with each storing free text)
8.8
User Presets
The system will allow the Operator to define preset files containing default
field values that can be applied to a User with the click of a button.
8.9
Exporting User Information
The system will allow the export of single or multiple user records. This may
also be used to assist an Operator in the creation of User preset files or a
better understanding of the User data Import feature.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 20
8.10
Importing User Information
The system will allow extended information to be imported from an external
source, such as a payroll database.
8.11
User Photographs
The system will allow a user photograph to be stored with each user. (The
photographs are stored in the database along with the other user fields so that
photographs are included in the normal system backup procedure.)
8.11.1
The system shall allow the importation and exportation of user photos.
8.12
Automatic Photo Pop-Up
The system can be configured to pop-up a user’s photograph in response to a
definable event occurring (for example, if the user badges at a particular
reader).
8.12.1
The system shall support, via a licensed option, a more advanced user pop-up
window that is always on top of other windows and can be resized or
maximised to full screen. The advanced user pop-up will retain a history of at
least 100 accesses, and allow Operators to navigate backwards and forwards
through the history.
8.13
Windows Image Capture
The system will allow Operators to capture user photographs directly from
WIA-compliant imaging device such as digital cameras, web cams and
scanners.
8.14
Database Backups
The system will provide a backup tool that can completely archive a snapshot
of the database. The snapshot will be stored in a space-efficient, compressed
archive. The system will provide a straightforward mechanism to restore a
previous backup. Only operators with the highest security privileges will be
permitted to restore from a backup.
8.14.1
Custom Backups
The system shall allow backups to be customised. For example: “Backup only
programming data”, or, “Backup programming data and review.”
8.14.2
Scheduled Backups
The system can be configured to automatically backup the database. Backups
can be scheduled to run:
(a)
Hourly, daily or weekly
(b)
On specific days of the week and at specific times
(c)
On a particular day of each month
(d)
On the first, second, third, fourth or last occurrence of a particular day
each month
8.14.3
Custom Scheduled Backups
The system shall allow multiple scheduled backups to be configured. For
example: “Backup just the programming data every day, but review data only
once per week.”
8.14.4
Single Click Backups
The system will provide a single-click backup solution if Operators want to
manually create a backup. Restoring from a backup will be equally
straightforward.
8.14.5
Backup Scope
The backup process will duplicate all data including module programming,
cardholders, extended fields, custom fields, user photos, floor plans, report
templates and review data. In the event that an entire software installation is
completely wiped, including all data files, then restoring via the backup utility
will recover the system 100%. All that will be required is the licensing dongle
(or a replacement), the software installation CD and the backup file.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 21
8.15
Purge Review To External Archive
The system will allow Operators with sufficient privileges to permanently
“move” aged review data from the software’s main database to an archive file.
Operators will still be able to examine archived review from within the review
manager module. The system will also allow review archives to be purged
from the system.
8.15.1
Archive Segments
The system will allow review to be archived into segments of 1, 2, 3, 4, 6, or
12 months.
8.15.2
Scheduled Purging
The system will allow scheduled purging of review from old archives.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 22
9.
Photo ID (optional module)
9.1
Custom Cards
The system will allow Operators to define custom ID cards using a graphical
user interface.
9.1.1
The system will support the design and printing of double-sided ID cards.
9.1.2
The PhotoID user interface will include a range of photo editing tools, as a
minimum:
9.1.3
9.2
(a)
Copy, cut and paste
(b)
Crop and Zoom
(c)
Move to Back, Front, backwards and forwards
(d)
Rotation and/or cropping of User images as they are acquired either
from a camera or a file.
Each Photo object shall allow the operator to alter its properties, including:
(a)
Image source, orientation and dimensions
(b)
Border size, shape, colour, thickness and visibility
Default Card Properties
The system will allow Operators to define default card properties for all new
card designs that are created. These properties shall include:
(a)
The dimensions of the card
(b)
The default font to be used
(c)
The date format
(d)
Resolution
(e)
Units of measure in inches, millimetres or points
9.3
Card Design Objects
The system will allow Operators to design custom ID Cards by firstly assigning
a colour and optional gradient to each side of their card design template.
9.3.1
Operators will be able to add a range of images, text and data fields through
the incorporation of object placeholders on their card design template. These
objects will as a minimum include:
9.4
(a)
User Photos from the system database
(b)
Any fixed User field from the system database
(c)
Any Custom User field from the system database
(d)
Any free text
(e)
Any compatible image file (bmp, gif, jpg, emf, png), such as company
logos etc
(f)
Barcodes
Card Design Object Properties
The system will allow Operators to alter an extensive range of properties for
each Card Design Object, the extent and scope of such alterations to be
determined by the exact nature of the object, but such properties will include:
(a)
Source and dimensions
(b)
Font size, type and colour
(c)
Border visibility, colour and thickness
(d)
Object fill colour and transparency
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 23
9.5
Card Design Templates
The system will allow Operators to save their custom card designs as Card
Design Templates so that their designs may be saved and reused on multiple
occasions.
9.5.1
The system will allow card templates to be imported and exported and
exchanged between system server installations.
9.5.2
The system will allow these Card Design Templates to be stored centrally in
the database on the system computer server and backed up as part of the
normal system backup procedure.
9.6
Card Associations
The system will allow the Operator to define one or more associations between
specific Users and Card Design Templates. These associations will be based
values stored for each User in the nominated existing User field. It will also be
possible to use a custom User field which has been set aside by the Operator,
specifically for this purpose.
9.7
Card Preview with User Data
The System will allow the Operator to preview the Card Design Template with
User data. The Operator will be allowed to preview the card with any User
record in any panel, providing their Operator permissions also allow them
access to view the selected data.
9.7.1
Should Card Associations be enabled and configured, previewing cards with
User data will automatically cause the correct Card Design Template to be
displayed for the selected User record.
9.8
Card Printing
The system will allow Operators to print ID badges by selecting a card
template and one or more users.
9.8.1
The system will allow single or batch print runs to generate ID badges.
9.8.2
The system will allow front side only, back side only or both front and back
sides to be printed for either a single card or a batch of cards.
9.8.3
Should Card Associations be enabled and configured, printing cards will
automatically cause the correct Card Design Template to be printed for each
selected User record.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 24











N-Bit
40 Bit


General
37 Bit


IR 40 Bit
36 Bit
Direct Entry Method
Site Code Method
35 Bit
Supports Multiple Formats
The system will support card pools with the following formats:
34 Bit
10.2
32 Bit
Manage Multiple Card Pools
The system will support multiple direct entry and site code card pools. Pools
of the same type can be merged by dragging one pool onto another.
30 Bit
10.1
27 Bit
Card Pool (optional module)
26 Bit
10.






10.2.1
The type of card used will be specified per card pool.
10.3
Track Card Status
The system will report the status of each card as: available, assigned, lost or
suspended. Double-clicking on a card shall display details of how the card is
assigned within the system.
10.4
Tag Cards
The system will allow operators to quickly tag cards as lost or suspended. Lost
and suspended cards can be reactivated at a later date by an operator with
sufficient privileges, or returned to the card pool for subsequent re-issue.
10.5
Automatically Create Card Pools
Operators will be able to automatically scan all Control Modules, and create
direct entry and site code card pools based on existing panel programming.
10.6
Detect Non-Pooled Cards
The system will allow operators to scan panels for assigned cards that don’t
exist in any card pool, and will enable operators to quickly distribute any such
cards to the card pool(s) designated by the operator.
10.7
Moving Cards
The system shall allow cards to be moved from one pool to another.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 25
11.
Schematics
11.1
Importing Maps
The system will allow Operators to import maps in a variety of image formats,
including:
(a)
JPEG (Joint Photographic Experts Group) Files
(b)
BMP (Windows Bitmap Picture) Files
(c)
TIFF (Tagged Information File Format) Files
(d)
PNG (Portable Network Graphics) Files
11.1.1
Once imported, blueprints shall be scalable to any arbitrary size, or
automatically zoomed to fit the screen size.
11.2
Drill-Downs
The system will allow Operators to create drill-downs. Drill-downs are
navigational hotspots that switch between different maps or blueprints. For
example, there might be several buildings on a campus map. Clicking a
building could open a blueprint for that building. Clicking the stairwell could
switch to the first floor.
11.2.1
Drill-downs are represented as translucent shapes. It will be up to the
Operator to decide what shape to use – almost any shape can be constructed.
11.2.2
Any number of drill-downs can be placed on a map. Drill-downs can be moved
or deleted at any time.
11.3
Live Status Monitoring
The system will allow the status of field hardware to be monitored in real time.
The field hardware guarantees that status changes will be dispatched
immediately, regardless of how many regular review events are buffered for
sending.
11.3.1
The following field hardware can be added to a floor plan:
(a)
Areas (on / off / alarm / tamper)
(b)
Inputs (sealed / in alarm / in tamper / had alarm or tamper; isolated /
restored)
(c)
Auxiliaries (on or off; override / no override)
(d)
Home Auxiliaries (on or off)
(e)
Doors (locked or unlocked)
(f)
Lift floors (free or secure)
11.4
Control Field Hardware
The system will permit operators with sufficient privileges to control field
hardware directly from floor plans using either interactive Icons or traced
shapes.
11.4.1
Control requests will be posted immediately, and the new status of the item
will appear on all floor plan terminals automatically.
11.5
Default Icons
The system will be installed with a library of default Icons for use on maps or
blueprints. These icons can be associated with particular objects within the
system and, when placed on a schematics map or blueprint, will allow the
operator to view the real time status of that object or to click on the Icon to
control the associated object one the field hardware.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 26
11.6
Customisable Icons
The system will allow the operator to define a custom library of Icons from
existing image files. These Icons may then be used on a map or blueprint to
indicate the status of the associated object. In this way, a general “Auxiliary
Output” may have an Icon that more accurately depicts its actual function,
such as a fan or a water pump.
11.7
Animated Gif Icons
The system will allow the operator to define Animated Gif Icons as part of the
Custom Icon Library. In this way, a schematics map or blueprint may be used
to show the realistic movement of a system object as it changes state, such as
the swinging of a door as it opens and closes, thus presenting a more intuitive
and interesting graphical interface for the system operators to use.
11.8
Area Trace Tool
The system will let Operators create areas of any shape. The following shapes
are examples of shapes that can be defined:
11.9
Zone Area Tool
The system will let Operators create arbitrary shapes, and assign the shape to
an Input. This lets the system designer represent motion sensors, beam
detectors and other “shape oriented” sensors.
11.10
Alarm Group Tool
The system will let Operators group inputs together and display them on the
map as a single icon. If any inputs in the group go into tamper or alarm, the
icon goes into tamper or alarm. The Operator can then open the icon and get
a list of which inputs have triggered the condition. Inputs may be from
different Control Modules and different areas.
11.11
Automatic Floor-Plan Pop-up
The system can be programmed to display a particular floor plan in response
to a programmed event.
11.12
Full Screen Mimic Panel
The system shall provide a mimic panel display, available in full-screen
viewing mode.
11.13
Automatic Log-in
The system shall have the ability to allow automatic login of the schematic
module on workstation boot-up.
11.14
Restoration of Saved Windows
The system shall automatically restore saved window views once an operator
has successfully logged in, returning to the map and location which was last
open.
11.15
Analogue Trigger Values
The system shall allow an operator to change analogue trigger values within
the map viewing screen, without the operator having to enter a dedicated
editing mode.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 27
12.
DVR Integration (optional module)
The system will provide true integration with a range of Digital Video
Recorders / Network Video Recorders. Operators will be able to view live and
recorded camera images directly within the software. Operators can control
PTZ cameras including pan, tilt, zoom and iris. Operators will be able to issue
commands directly to cameras and DVRs.
12.1
Attach DVRs and Cameras
Operators will be able to enrol multiple DVRs.
12.1.1
DVRs will be addressable via serial and/or TCP/IP network connections
(depending on the model of DVR used).
12.2
Supported Models
The following brands and models will be supported as a minimum:
(a)
Baxall RS485 BaxNet
(b)
Baxall Vivid Range of DVRs
(c)
Dedicated Micros Digital Sprite 2
(d)
Dedicated Micros Digital Sprite 2 (rev. a)
(e)
Dedicated Micros DVIP
(f)
Dedicated Micros SD DVRs
(g)
Pacom PDR 16
(h)
Tibet
(i)
Tibet Magic Radar
(j)
March Networks DVRs
(k)
Dallmeier DIS and Leonardo DVRs
(l)
Mitsubishi DVRs
(m)
Panasonic DVRs
(n)
IR-Vision DVRs
(o)
CSD-Vision DVRs
(p)
Genetec NVRs
(q)
Milestone NVRs
(r)
Verint NVRs
(s)
Pelco DVRs
Note that different cameras from different DVRs of different brands can be
displayed collectively and mixed in any combination.
12.3
Software Video Multiplexing
The system will allow up to 16 cameras to be multiplexed onto a single, timesynchronised window. The layout can be changed at any time. Any number of
separate multiplexed windows can be displayed, with each showing footage
from the same or different cameras and DVRs.
12.4
Synchronise Date/Time
The system can be configured to automatically synchronise the date and time
of each DVR. Synchronisation settings are separate for each DVR.
Synchronisation can be scheduled to run:
(a)
Hourly, daily or weekly
(b)
On specific days of the week and at specific times
(c)
On a particular day of each month
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 28
(d)
On the first, second, third, fourth or last occurrence of a particular day
each month
12.4.1
Operators will be able to synchronise manually if they wish.
12.5
Remotely Control PTZ Cameras
The system will allow operators to remotely control any PTZ cameras. This
includes pan, tilt, zoom, focus and iris. If a camera has stored PTZ camera
presets (pre-saved combinations of the above parameters) then Operators will
be able to activate these presets from within the software.
12.6
Associate Cameras with System Objects
The system will allow operators to associate one of more cameras with specific
objects in the security and access control system. These objects will include:
(a)
An Input
(b)
An Area
(c)
An Auxiliary
(d)
A Door
(e)
A User
(f)
A Lift Car
(g)
An LCD Terminal
12.7
Locate Footage Based On Review And Alarm Notification
The system will allow operators to synchronise video playback based
Associated Cameras and a review event. In other words, the software will
display what the associated cameras recorded at the time a review event was
generated. Operators will be able to freeze-frame or seek forwards/backwards
near the event, as per normal DVR operation.
12.8
Floor Plan Integration
The system shall allow operators to place cameras onto site floor plans.
Operators will be able to view camera footage by clicking on that camera.
12.9
Footage Playback Control
Operators will be able to apply all the normal DVR operations to recorded
footage, including forward/reverse play, freeze frame, cue/review and single
frame advance (both forward and backward). All cameras in the same
multiplexer view will remain synchronised at all times. Different multiplexer
windows have their own playback controls, which will operate independently.
12.10
On-Screen Display (OSD)
The system will optionally superimpose an On-Screen Display for each camera
in a video window. The OSD will show the name of the camera.
12.11
Triggers
The system will allow operators to define complicated triggers, which can be
based on any combination of review events, alarms or special conditions.
When the event triggers, the system can be programmed to switch to a
particular camera and display live footage.
12.12
Site Hierarchy
The system shall allow cameras to be grouped under a site and sub-site
hierarchy or tree, independent of the underlying CCTV architecture. Logical
groups of cameras may be created in this manner and operator permissions
may be applied at the site or sub-site level to control access to these cameras
within the system management software.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 29
13.
Review
13.1
Automatic Review Archiving
The system will automatically maintain an archive of all review events for all
Control Modules enrolled in the system. Each Control Module will buffer review
while a front-end connection is not active.
13.1.1
The system will ensure that any buffered events will be fetched the next time
a connection is active with the Control Module. While a connection is active,
each Control Module will dispatch review events as soon as they occur.
13.2
Software Audit Trail
The system will maintain an audit trail of front-end software operations. This
audit trail will be viewed and archived with field hardware review. The system
will record the date and time of each transaction along with the name of the
Operator logged on.
13.3
Review Event “Go To” Link
The system will allow Operators to right-click on a Review event and, by
making a further Menu selection, go to either the User, Door or Area record
that is stipulated within that specific Review event.
13.4
Colour Coded Review Display
The system will provide colour coded Review entries to allow easy distinction
between Review event types. Operators will be allowed to edit the colour of
each Review event type or reset them back to the default colours.
13.5
Advanced Review Filtering
The system will allow Operators to build complex review filters. Filters can be
created by adding simple filters to a review window and stacking them
together to form more complicated filters. Each filter can specify a particular
item of text or data to match against.
13.5.1
Individual filters and filter stacks can be modified at any time. They can also
be saved to disk and loaded later on.
13.6
Live and Offline Review
The system will allow searching/filtering of both live and offline (archived)
review.
13.7
Unlimited Review Windows
The system will let the Operator create as many review windows as desired.
Each window can have a different set of filters applied.
13.8
Automatic Log-in
The system shall have the ability to allow automatic login of the review
module on workstation boot-up.
13.9
Restoration of Saved Windows
The system shall automatically restore saved window views once an operator
has successfully logged in.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 30
14.
Alarm Management
14.1
Alarm Sound Cues
The system will let Operators configure what sounds are played by the
software when an XMIT alarm appears in a review window, and (as a separate
setting) when an alarm restore appears in a review window. The options will
include:
14.2
(a)
Beep PC speaker
(b)
Play a sound file (either from library or custom)
Custom Alarm Events
The system will let Operators trigger alarms based on complex filters. The
custom alarm will support the following configuration options:
(a)
Alarm processing level
(b)
Requires operator response (yes or no)
(c)
Custom text message
(d)
Custom text colour and background colour
(e)
Beep PC speaker
(f)
Play a sound file (either from library or custom)
(g)
Make the Review module full-screen
(h)
Flash the Review module in the Windows® task bar
(i)
Perform Server Action Lists
14.2.2
Server Action Lists
The system shall allow one or more Server Action Lists to automatically run in
the event of an alarm. Actions that can be performed include, but are not
limited to, controlling Auxiliary Outputs, Area On/Off, User Access, and
External Communications (ie to another panel, or monitoring station).
14.2.3
User Selectable Alarm Levels
The system will allow Operators to attach an alarm level to each alarm. The
supported alarm levels will be low, medium, high and critical. Active alarms
will be grouped by priority level.
14.2.4
Customisable Alarm Procedures
The system will support customised alarm procedures. Alarm procedures are
procedural notes that guide Operators through the process of investigating
and managing an alarm. The system will allow any number of alarm
procedures to be created. Each response can include multi-line text with full
per-character text formatting.
14.3
Third Party Integration
The system shall be capable of receiving text data from third party systems or
devices, and integrating it into its alarm management procedures. For
example, an intercom system may be integrated with the security system,
such that, when a button is pressed on one of the intercom units an alarm
may be raised in the security system and video surveillance of the related
area may be activated.
14.4
Alarm Acknowledgement
The system can require Operator acknowledgement of an alarm if its
processing options are set accordingly.
14.4.1
When an alarm is acknowledged at one workstation, it will be automatically
removed from the alarm window of all workstations.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 31
14.4.2
Custom Acknowledgement Window
Operators will be able to customise the acknowledgement window for each
alarm event by specifying which fields are included. The options will include:
(a)
Message box – if enabled, a message will pop up on the Operator’s
screen
(b)
User information – if enabled, the user’s photograph will pop up when
the Operator responds to the alarm
(c)
Auto pop-up – if enabled, the user’s photograph will pop up when the
alarm is received
(d)
Start review – if enabled, a review window will open so the Operator can
gain context on the alarm
(e)
Start schematic – if enabled, the specified building floor plan is opened
so the Operator can see the alarm
(f)
Print report – if enabled, will print a specified report
14.5
User Activity Window
The system will provide the ability to view a user activity window. The window
will display user photographs, in real time, as users access doors in the field.
14.5.1
The user activity window will be a resizable window with a “picture log” of
users that have accessed a specified area. The centre picture will be displayed
at maximum size with event details (date, time, user name) displayed
underneath. To either side, small thumbnails of the preceding and succeeding
users will be displayed.
14.5.2
Operators will be able scroll backwards and forwards through the list of user
photos.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 32
15.
Communicator (optional module)
The system shall allow, via an optional module, messages to be conveyed over
a variety of electronic communications in response to defined event triggers.
15.1
Communications Paths
The system shall permit messages to be sent over the following media:
(a) Email
15.2
15.3
15.4
(b) SMS
(c) Pager
Plug-ins
The system will provide plug-in support for additional media types that can
add functionality to the software. The following plug-ins shall be supported
initially:
(a)
Sound plug-in – the system can play a sound in response to an event
(b)
ComText plug-in - for sending ASCII commands to peripheral devices or
systems
Message Templates
The system will allow Message Templates to be defined, which specify
(a)
Where to send a message (any of the communications paths can be
selected, including those supported by plug-ins).
(b)
For each path, the text that will be sent in the message. Messages can
include information from the review message that triggered it.
Message Rules
The system will allow Message Rules to be defined, which specify
(a)
A regular expression for matching review messages
(b)
An optional regular expression for excluding messages
(c)
A template that will be ‘executed’ if a review message satisfies (a) and
(b) above, which determines the text and transmission paths of what
Communicator dispatches
(d)
A message priority from 0 to 100 (100 is highest)
(e)
Recipients to receive the message
15.5
Operation
Communicator shall monitor live review from Control Modules, and wait for
messages that match any of the Message Rules.
15.5.1
When a Message Rule matches, Communicator will queue the text in the
Message Template with the priority in the Message Rule on the
communications paths in the Message Template. This will occur for each
recipient in the Message Rule.
15.5.2
High priority messages will be dispatched before low priority messages.
15.6
Custom Messages
The system shall permit Operators to queue custom text messages with
custom priorities. The messages can be queued on any of the supported media
types.
15.7
Receive Transactional Data From Third Party Applications or Systems
The system shall allow the real-time importation of ASCII based transactional
data from third party applications or systems into the review log of the system
management software. The system management software shall also allow the
operator to configure the format of the ASCII text so that the message
displayed within the review log is understandable and relevant to the context
in which the third party system is being used.
15.7.1
The system management software shall allow the configuration of event traps
which will, specific and configurable criteria having been met, automatically
initiate one or more pre-defined actions. The transactional data recorded in
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 33
the review log from the third party application or system shall be capable of
triggering an event trap.
15.8
Third Party High Level Interface
The system shall support a high level interface to a range of third party
systems including: IP based intercom, mobile duress, lone worker, personnel
tracking, asset tracking, and fire systems.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 34
16.
Dynamic User Import (optional module)
The system shall provide a mechanism to automatically enrol users based on
an output file from a Property Management System. This Dynamic User
Import module must as a Windows® service.
16.1
Interface
The Dynamic User Import Module interface shall indicate if it is idle,
processing a setup file or processing records via an icon.
16.2
Import File
The system shall allow CSV files, Windows INI files, or DUI files as the source
of the user records.
16.3
Pre-Processing
The system will allow pre-processing of import data through the use of a batch
file.
16.4
Operation
The system shall monitor a nominated folder for compatible Dynamic User
Import Module files (CSV, Windows INI, or DUI format). If a file is discovered,
the file is processed for any users that it contains and then deleted.
16.4.1
Processing each user will mean creating the user, assigning the fields from the
Dynamic User Import Module file to the user (or blanking fields if directed)
and adding the user to a card pool if configured to do so.
16.4.2
If the user already exists then the record is modified. Commands in the import
file can also specify users to be deleted.
16.4.3
The system shall allow users to be added, modified or deleted from multiple
Control Modules, with separate user offsets in each Control Module.
16.5
Virtual Panels
The system shall allow users to be added, modified or deleted from Virtual
Panels.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 35
17.
COM Interface (optional Module)
The system shall provide a library based interface to enable software
developers to write software that can interact directly with the system
management software. This interface will allow high level integration to a wide
variety of software applications and intelligent systems such as human
resource database applications, booking systems, student record systems,
complex video surveillance systems and building management systems.
17.1
Interface to Query the Names of Areas, Doors, Users, and User Types
The system shall provide an interface to enable third party software
developers to write software that can connect to a computer server and query
the names of Areas, Doors, Users and User Types within each Control Module.
17.2
Interface to Query Areas Doors Users and User Types
The system shall provide an interface to enable third party software
developers to write software that can receive live or archival review from the
computer server.
17.3
Interface to Add, Modify or Delete Users
The system shall provide an interface to enable third party software
developers to write software which can add, modify or delete Users within the
system management software.
17.4
Interface to be Protected
The system shall ensure that any interface it offers for the purposes of
allowing high level integration to other software systems is comprehensively
protected through the use of authentication and encryption.
17.5
View Review Data
The system shall provide an interface to enable third party software
developers to write software that can access the system review database.
This functionality allows the third party software to stream live review, and
view historic review on demand.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 36
18.
Basic Reports
18.1
Pre-defined Report Templates
The system will provide seven pre-defined report templates: all events, all
alarms, XMIT alarms, user access, door access, lift access, time on site (if
licensed as an option) and filtered events.
18.2
User-definable Criteria
Each report will prompt the Operator for any criteria needed to run the report
such as reporting interval, Control Modules to report on, doors involved and
target users.
18.3
Filtered Reports
The system will allow a report to be generated based on a filtered data set. In
other words, if an Operator creates a review window and attaches filters to the
window, then the report will only include data entries that satisfy the filters.
18.4
Exporting Reports
Once generated, reports can be exported as formatted HTML or unformatted
text. Reports can be printed at any time.
18.5
Programming Reports
The system will allow operators to view, print or export to file a range of
reports related to system programming. Operators will be able to generate the
following reports:
(a)
User programming
(b)
User type programming
(c)
Input programming
(d)
A list of users for each user type
(e)
A list of inputs in each area
(f)
A list of reportable inputs per area
(g)
A list of users with access per door
(h)
Users who can turn an area on
(i)
Users who can turn an area off
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 37
19.
Advanced Reports (optional module)
19.1
Muster Reports
The system will allow Operators to generate muster reports summarising user
activity over the preceding 24 hours from the report date. Built-in templates
will permit muster reports grouped by access point, by area, by date or
ungrouped (sorted by time only). Operators will be able to create their own
muster reports using the report editor.
19.1.1
Operators will be able to specify which areas to run the muster report against,
and can also optionally select muster points which will be highlighted in the
muster report.
19.1.2
Operators will be able to save common reporting options as a custom report
for easy access later on.
19.2
User and Activity Reports
The system will allow Operators to create a variety of reports based upon the
User data and photos stored in the system database. This information may be
further filtered based upon the Review activity of the Users.
19.2.1
The system will allow Operators to easily create filters and reporting criteria
for use with their reports. Intuitive criteria “Bracketing” or “Grouping” function
will allow Operators to create and apply even the most complex of reporting
filters.
19.2.2
The system will allow Operators to name and save their report designs under
custom folders for ease of access.
19.3
Card Pool Reports
The system will allow Operators to create a variety of Card Pool reports to
assist in the management of cards. These reports may also be qualified by
Review activity to identify which cards have been used through specific Doors
etc.
19.4
Exception Reports
The system will allow Operators to create a variety of Exception Reports,
detailing which Users or cards have NOT been used in the system or have NOT
accessed a particular Door or Area in the past day or week or month etc.
19.5
First or Last Event Reports
The system will allow Operators to create a variety of reports that display the
First event or Last event only for each User or Card during a particular
reporting period.
19.6
User Qualification Reports
The system will allow Operators to create a variety of Qualification reports to
collate users on the basis of qualifications, or conversely, collate qualifications
on the basis of users.
19.7
Virtual User Reports
The system will allow Operators to create virtual user reports to correlate
virtual users across all or selected control modules within the system.
19.8
User Entity Access Reports
The system will allow Operators to create a variety of access reports to collate
user access on the basis of entities (doors, floors, etc) and conversely, entities
on the basis of user access.
19.9
Time On Site Reports
The system will allow generation of time on site reports.
19.9.1
Customisable Report Criteria
The system will allow the start and end date and time to be specified.
(a)
One or more shifts can be defined per report.
(b)
The resolution of all date/time fields will be 1 second.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 38
(c)
19.9.2
19.9.3
The Operator must select at least one cardholder and door. Any number
of additional doors and cardholders can be specified, across multiple
Control Modules if required.
Selectable Reporting Fields
The Operator can select any of the following fields for inclusion in the Time On
Site report:
(a)
Access Points
(b)
Access Counts
(c)
First In
(d)
Last Out
(e)
Total Time
(f)
Time On Site
(g)
Time Off Site
(h)
Shift Count
(i)
Shift Misses
(j)
Exception
Detailed vs. Exception Reporting Modes
The Operator can choose a Detailed Report, which includes all Time On Site
information, or an Exception Report.
(a)
The Exception Report only includes entries that match specified
exception criteria, such as minimum or maximum hours per day / week
/ month.
19.9.4
Customisable Shift Tolerance
The Operator can specify a shift tolerance. In and Out events occurring near
the start or end of a shift will be included if within the specified tolerance.
19.9.5
Customisable Worker Breaks
The Operator can specify that time off site is not included if it is shorter than a
specified time interval. For example, if this value is set to 10 minutes and a
user has an out event at 10:30am which is followed by an in event at
10:35am then the 5 minutes the user was off site will not be included in the
calculations.
19.9.6
Output to CSV File
A Time On Site report can be output to a Comma Separated Values (CSV) file
readable by Excel® and other software.
(a)
19.9.7
Output to MYOB File
A Time On Site report can be output to a MYOB® (Mind Your Own Business)
file.
(a)
19.9.8
The report data will include employee code, item code, quantity (as
calculated by the report) and rate
Custom Data Export Format
A Time On Site report can be output in a format specified by the Operator.
(a)
19.9.9
The Operator can choose which fields are included, and in what order.
The Custom Data Export options allow the Operator to specify the fields
and write the format and syntax of the data string that will exported.
Report Validation Triggers
The system will automatically flag users whose report data may include
inaccuracies. Users are flagged who trigger any of the following events:
(a)
Two or more consecutive ‘Door Out’ events without an intervening ‘Door
In’ event.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 39
(b)
Two or more consecutive ‘Door In’ events without an intervening ‘Door
Out’ event.
(c)
First event in shift is ‘Door Out’.
(d)
Last event in shift is ‘Door In’.
(e)
No ‘Door Out’ events in shift.
(f)
No User/Door Access review entries.
19.9.10
Save and Load Report Settings
The system will allow all settings to be saved to a Time On Site report
template, which can be re-used at a later time.
19.10
Report Designer
The system will include a fully featured report designer that can edit existing
report templates or create brand new templates. The report designer will allow
operators to:
(a)
Place coloured and formatted text and graphics on a report
(b)
Place data fields onto a report, including user photographs
(c)
Add drawing shapes and symbols
(d)
Place charts on a report based on live reporting data
(e)
Add barcodes to a report
(f)
Place tables on a report of tabular data grouped by arbitrary datum
(g)
Add forms to a report
(h)
Place runtime data from other applications using industry-standard OLE
container objects
19.10.1
The report designer will be WYSIWYG (what you see is what you get),
meaning operators will be able to drag objects onto the report and see a
visual preview of how the report will look when generated.
19.11
Organise Reports
The system will allow operators to organise reports into customised groups, so
that related reports are accessible in a single location. The system will allow
operators to save commonly used report settings (such as a selection of areas
for a muster report, or export settings for an extended user report) for quick
and easy access at a later stage.
19.11.1
Saved reports will be easily accessible, and can be generated with just a few
mouse clicks.
19.11.2
Saved reports can be grouped into custom categories designated by the
operator.
19.12
Time and Panel Event Based Scheduling of Reports
The system will allow any one or more Advanced Reports to be run on either a
time or panel event based schedule.
19.13
Export / Import of Report Definitions
The system will allow the Operator to save and reload the definition of a report
for the purposes of sharing the design and framework of the report between
Customer Support personnel and Operators on other similar systems without
having to send them confidential user data.
19.14
Report Definitions Saved on the Computer Server
The system will allow report definitions to be stored centrally on the computer
server so that they are preserved as part of the system backup procedure and
all Operators on all Workstations can potentially make use of the report
definitions.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 40
19.15
Output Formats
The system will allow operators to output a report to a file in the following
formats:
Format
Description
HTML
Hypertext Markup Language
PDF
Portable Document Format
RTF
Rich Text Format
MHTML
MIME Hypertext Markup Language
XML
Extensible Markup Language
JPEG
Joint Photographic Expert Group picture
EMF
Microsoft® Enhanced Metafile
BMP
Windows Bitmap picture
TIFF
Tag Image File Format picture
Multi-TIFF
Multiple Tag Image File Format picture
XLS
Microsoft® Excel® Spreadsheet
TTY
Teletype dot-matrix format
TXT
Text
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 41
20.
Multi-Tenant
20.1
Unlimited Number of Tenants
The system will support any number of tenants in a system.
20.2
Universal Tenanting
The system will permit any item to be assigned to tenants. This includes
areas, doors, cardholders, auxiliaries, zones, modules and all other
programming items; and also front-end entities like floor-plans, sites and
workstations.
20.2.1
When an Operator logs on, their tenant list will be loaded by the system and
used as a filter to determine what items the Operator can or cannot see.
20.2.2
Items that aren’t tenanted will be visible to ALL Operators.
20.2.3
Items can be placed in more than one tenancy.
20.2.4
An Operator can see an item if they share a tenancy in common with that
item, or if the item is not in any tenancy.
20.3
Tenancy Area Counting
The system shall provide tenancy area counting. Instead of counting against
an area for every entry, count values can be achieved through tenancy area
counting. This is useful, for example, in a scenario of a shared car-park,
where only 20 “Tenant 4” cars are allowed to enter, despite there being other
free spaces allocated to other tenants.
20.4
Review
The system will ensure that Operators only see review messages and receive
alarm events that pertain to their tenancy or tenancies.
20.5
Tenancy Counting Review
The system shall provide real-time review of tenancy counting. When a count
increments/decrements this event will be instantly displayed in review.
20.6
Sharing Items Between Tenancies
The system will allow entities to be shared between tenants. For example, if a
reception is shared between two offices, then the areas, doors, inputs and
auxiliaries associated with the reception are visible to both tenants. Items not
in a common area will only be visible to the respective tenants.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 42
21.
Operators
21.1
Operator Types
The system will support multiple Operator Types. Each Operator Type fully
defines the level of access permitted by Operators of that type.
21.1.1
Operators can be assigned an unlimited number of Operator Types. They will
inherit the combination of permissions granted by each individual Operator
Type.
21.2
Operator Permissions
Permissions can be applied to specific items. For example, an operator might
have the ‘see’, ‘inspect’ and ‘change’ permissions for doors 1-5 and 20, but
only the ‘see’ and ‘inspect’ permission on all other doors.
21.3
(a)
See. Without this permission, the item is invisible to the Operator.
(b)
Inspect. Without this permission, the Operator cannot open the item
for inspection.
(c)
Change. Without this permission, the Operator cannot save changes to
the item.
(d)
Create. Without this permission, the Operator cannot create new
instances of the item.
(e)
Delete. Without this permission, the Operator cannot delete the item.
(f)
Control (field hardware only). Without this permission, the Operator
cannot control the field hardware item.
(g)
Print. Without this permission, the Operator cannot print the item.
(h)
Export. Without this permission, the Operator cannot export the item to
a file.
(i)
Set Permissions. Without this permission, the Operator cannot modify
the permissions of the item for themselves or other Operators.
Operator Access Parameters
The system will allow authorised operators to define access parameters for
other operators, governing the times and dates at which each operator is
permitted access to the system management software. The parameters that
can be specified will include:
(a)
Expiry Date and Time. The date and time at which the operator’s
access to the system will be revoked.
(b)
Start Date and Time. The date and time at which the operator’s
access to the system will commence.
(c)
Access Times. The days of the week and the period of time during the
day that the operator’s access to the system will be permitted.
21.4
Workstation Permissions
The system can be configured to only permit Operator logons from designated
workstations.
21.4.1
Attempts to logon from an illegal workstation will be logged and rejected.
21.4.2
Operator permissions can be applied to a workstation. When used in this way,
they set the MAXIMUM permissions for that workstation. Operators with
greater privileges will have those privileges truncated whilst using that
workstation.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 43
22.
Tag Board (optional module)
The system shall have provision to display the location of specific users, or
display all users in specific locations in one simple intuitive screen. A range of
display and monitor options for viewing on both public displays and private
workstations shall be supported.
22.1
Viewing Windows
The system shall incorporate three (3) main viewing windows: Users, Areas,
and Sites. The Users window shall display a listing of the area location for all
users, with the time and date when each user entered that area. The Areas
window shall display a listing of Users within the nominated Areas. The Sites
window shall allow the logical grouping of multiple areas and shall display the
cumulative count of all users within the group of areas.
22.2
User Count
Each Site shall display a summary user count of all users that are located
within the selected areas of that Site. As an option, the user count may be
reset by either of the following methods:
(a)
Defining a “time-out” period in hours, whereby, users deemed inactive
after the defined period of time has lapsed will be removed from the
user count.
(b)
The area in which the user(s) are located in is armed.
22.3
Real-time status
The system will deliver real-time status updates as users change locations.
The time and date shall be recorded of each user as they enter an area.
22.4
User-friendly interface
The graphical user interface shall be simple to read and easy to navigate.
Layout templates may be saved and loaded simply and easily at the operators’
discretion. Viewing windows may be spread across multiple monitor displays.
Full screen mode shall be available, including automatic full-screen mode at
start-up.
22.5
Customised Viewing
The system shall allow an operator to sort and group users based upon any
user record field. For example, all employees of the “ABC” company may be
listed together logically.
22.6
Conditional Properties
The system shall allow rules and expressions to be defined for individual sites,
areas, and users, such that, when a rule or expression is met, one or more
properties of the screen may change to alert the operator. For example, a site
name may automatically turn green when the user count on that site is
greater than zero and return to red once the user count has returned to zero.
22.7
Sites
The system shall accommodate any number of customiseable sites, where
each site is a grouping of selected areas. Sites may be sorted by name or
user count. The system shall allow quick access to viewing the area(s) and
users within a site.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 44
23.
User Qualifications (optional module)
The system shall support the use of a qualification module, whereby
qualifications can be assigned to users and doors. Only users with a valid
qualification can enter a door to which that qualification has been assigned
(eg. only users with a forklift licence may enter the warehouse door).
23.1
Number of qualifications
The system shall support up to eight (8) separate qualifications.
23.2
Qualification duration and expiry warning
Qualifications can be assigned an expiry date per user. A warning can be set
to warn of the pending expiry of a user’s qualification any number of days in
advance (eg. warn 14 days before expiry).
23.2.1
Qualifications can be easily activated or deactivated at any time.
23.2.2
Qualifications can be assigned customiseable names and descriptions.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 45
24.
Credit Tracking (optional module)
The system shall support a credit tracking module, whereby credit points may
be assigned to users. User access events decrement these points until a zero
balance causes access for that user to be denied.
24.1
Credit point entry
Credit points may be assigned to users either by operator entry or dynamically
from a third party application.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 46
25.
Active User Rotation Module - AURM (optional module)
The system shall allow, as an option, accommodation of hundreds of
thousands of users by commissioning one or more control modules in a
caching mode. It shall be possible to store quantities of users in excess of the
capacity of individual panels, such that, when a user badges a reader to gain
access through a door, but that user record is not found within the control
modules’ local database, the control module will interrogate the system
management software for that particular user’s record. If the user record
resides in the system management software database the control module will
automatically download the user record for that user, and validate the user’s
permission for that door. If the user is authorised to access the door, the door
will be unlocked.
25.1
Permanent Users
It shall be possible to preserve any number of locally stored permanent users
within the control module. No permanent user record will be removed from
the control module as part of the caching process.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 47
Section 2 - Hardware Spec
26.
General Requirements
26.1
Integration
The system shall be a single integrated access control and alarm monitoring
system. The system shall also provide integrated control of lighting, heating,
ventilation, air-conditioning and other custom applications as required.
26.2
Host PC
The system must provide an option for connection to a host PC, however full
system functionality must be maintained with or without the Host PC
connected.
26.3
Supply of Equipment
Each item of equipment supplied shall be a standard product of an
established, reputable manufacturer. Custom hardware and/or custom
operating firmware will not be acceptable.
26.4
Modular Design
The system shall be of a modular hardware design allowing for detection and
control devices to be connected to system modules within their immediate
vicinity and also providing for expansion and modification of the system to
meet future requirements.
26.5
LAN
Modules shall communicate via a secure, monitored LAN system utilising a
communications format that does not compromise system integrity.
26.5.1
The LAN shall provide for a minimum of 1500 metres of LAN cabling and/or 64
remote modules to be installed without requiring additional hardware. LAN
Isolation/Repeater equipment shall be available to allow LAN cabling distances
to be extended up to 6.0km on twisted pair cable and/or up to 10km on
Optical Fibre.
26.6
Cabinets/Tamper Protection
All field equipment shall be fitted with cabinet tamper detection capable of
detecting any attempt to remove the cover and any attempt to remove the
enclosure from its mounting surface. Optical tamper devices will not suffice.
26.7
Input Wiring
Alarm monitoring inputs shall be wired using dual end-of-line resistors
installed at the detection device such that the system can monitor Seal, Alarm
(Un-seal), Open Circuit (Tamper) and Short Circuit (Tamper) states.
26.7.1
Each detection device shall be connected to a separate Zone Input for
individual monitoring and reporting unless otherwise stated.
26.7.2
The system shall allow Detection devices with Normally Closed or Normally
Open outputs to be wired to general purpose Zone Inputs in the same
manner. A programming option shall be provided for each Input to define
whether the device connected utilises Normally Closed or Normally Open
outputs. The default setting shall cater for Normally Closed outputs.
26.8
Power Supply
26.8.1
AC Mains Supply Voltage
All field equipment powered from the AC mains supply shall operate on a
supply of 240V AC +/-10%. (Terminal voltage at input to Transformer or Plug
pack)
26.8.2
DC Supply Voltage
All field equipment powered from the system LAN or a separate DC power
supply shall operate on a nominal supply of 12V DC. Normal operation shall
be maintained over a supply range of 11V to 14V DC.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 48
26.8.3
Surge Protection
Optional low voltage AC and battery surge protection devices shall be available
that provide superior protection against damage from electrical transients
such as lightning and power surges.
26.8.4
Batteries
All field equipment powered from the AC Mains supply shall incorporate a
dedicated connection for a re-chargeable Sealed Lead Acid battery of at least
6.5 AH capacity and up to 17 AH capacity to provide backup power in the
event of Mains supply failure.
26.8.5
The equipment shall provide a suitable circuit to charge the batteries during
normal operation.
26.8.6
Battery Testing
An Automatic Battery Testing procedure shall be provided with a
programmable start time that allows the battery test sequence to commence
daily / weekly / monthly / annually [As required]
26.8.7
Programming options shall be provided to allow any field equipment with a
dedicated backup battery connection to be included in an Automatic Battery
Test procedure with a test time specified separately for each Module to be
tested. (Allowing for variations in the load current of each Module.)
26.8.8
Battery Test times for each Module shall be programmable up to 255 minutes
in 1-minute intervals.
26.8.9
Battery Testing shall only be active on one Module at any time.
26.8.10
A battery test currently running on a module shall automatically be cancelled if
any of the following events occurs:
(a)
An AC failure on that Module
(b)
Sirens are activated on that Module
(c)
A LAN comms failure on that Module
(d)
A Low Battery Alarm on that Module
(e)
The Installer accesses the Power Test menu
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 49
27.
System LAN (Security Communications Network)
Communications between the Control Module and remote Modules shall be via
a dedicated Local Area Network (LAN).
27.1
Cable Types
The LAN shall operate reliably over the following cable types:
(a)
Category 5 cable.
(b)
RS485 / RS422 Twisted pair data cable.
27.2
Data Rate
LAN communications shall operate at 19,200 baud (bps).
27.3
LAN Data Security
An option for a LAN Encryption key shall be provided and will not require any
additional hardware or special firmware to be installed. Enabling encryption
shall cause the Control Module to generate a random encryption key that is
immediately broadcast to all remote Modules. If a Module is powered down,
its record of the current encryption key will be erased. The system shall be
capable of logging and reporting individual “Module substitution” alarms
should any Module attempt to communicate without the current encryption
key.
27.4
LAN Supervision
The Control Module shall continuously monitor all remote Modules for Off-line
condition via a supervisory time report system. The system shall provide for a
report time of 1 to 255 seconds to be programmed for each individual Module
according to the level of supervision required. The system shall record all
communications errors for each separate Module. The installer shall have the
ability to view and reset the error count.
27.4.1
Should any Module fail to communicate with the Control Module, a “Module
Off-line” alarm shall be generated that identifies the specific Module. The
alarm shall be logged and annunciate locally and/or to a remote central
monitoring station as required.
27.5
LAN Fail Report Hold-off
If the LAN is significantly damaged, a large number of LAN failure alarms and
restores may be reported, potentially flooding the Central Station with
continuous alarms and restores.
27.5.1
The Control Module shall offer a LAN Hold-off feature which, when enabled,
will restrict the number of LAN Fail input alarm/restore cycles to 4 within an
approximate 2 hour period. After 4 cycles have been reached, any more
processing of the LAN Fail input is temporarily “masked”. Every 2 hours from
the last LAN Fail input alarm, the counter will be cleared and the LAN Fail input
will be “unmasked”, enabling another 4 LAN Fail input alarm/restore cycles
over the next 2 hour period. LAN “Timeout”, “Lost”, “Substitution” and
“Recovered” Review events will still be logged for the masked inputs.
27.5.2
The Control Module shall allow the Installer to manually unmask any masked
LAN Fail inputs when the cause of the LAN Fail alarms has been rectified.
27.6
LAN Cabling Distance
The LAN shall be able to support up to 2000 metres of LAN cabling and/or 64
remote Modules using the specified cable without requiring additional
transmission equipment. Remote Modules shall be capable of communicating
on a single "daisy-chained" cable run of up to 1500 metres from the Control
Module.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 50
27.7
LAN Expansion
Optional LAN Isolator/Repeater devices shall be available to expand the LAN
cabling distance and/or the number of Modules supported up to a maximum of
250 Modules. These devices shall allow remote Modules to be installed up to
6.0km from the Control Module using the specified cable.
27.8
LAN Isolation
Optional LAN Isolator/Repeater devices shall be available to provide improved
surge protection through segmentation of the LAN and the elimination of earth
loops as required in larger installations and multi-building sites. The devices
shall provide a minimum of 2.5kV isolation between each section of the LAN
connected to the device.
27.9
Surge Protection
Optional LAN surge protection devices shall be available that provide superior
protection against damage from electrical transients such as lightning and
power surges.
27.10
Monitored Loop Option
Optional LAN Isolator/Repeater devices shall be available to enable the entire
LAN or sections of the LAN to be wired in a monitored loop configuration of up
1500 metres.
(a)
If a single break in the loop occurs, communication shall be maintained
to all Modules in the loop.
(b)
If two or more breaks in the loop occur, communication shall be
maintained to all Modules except those between the breaks.
27.10.2
Each LAN Isolator device shall provide “LAN Loop Fail” and “LAN Branch Fail”
alarm outputs.
27.11
Optical Fibre
Optional RS485-Optical Fibre Modem pairs shall be available to allow
transmission of the LAN over Optical Fibre. These devices shall allow remote
Modules to be installed up to 10km from the Control Module.
27.11.1
Configuration options on the Fibre Modem shall provide a simple setup method
to define whether the modem is located at the Controller end or remote end of
the fibre link.
27.11.2
Product variants shall allow for the use of Single-mode or Multi-mode fibre.
27.11.3
The Fibre Modem design shall allow the Fibre network to be configured in
Daisy Chain, Star or Loop architectures.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 51
28.
Control Module
28.1
Design
The System Control Module shall be a dedicated microprocessor based module
with dynamic and non-volatile memory and upgradeable built-in operating
firmware.
28.2
Power Supply
The Control Module shall be powered by16V to 18V AC from an approved
Transformer or Plug pack supplied with the Module. The module shall include
an on-board 13.8V DC power supply, battery charger and connection for a 12V
Sealed Lead Acid backup battery of at least 6.5 AH and up to 17 AH capacity.
28.3
Communications
The Control Module shall maintain communications with all other Modules
connected to the system LAN and shall be capable of reporting alarms and
system activity to one or more Central Monitoring Stations.
28.4
Telephone Line Interface
The Control Module shall include an on-board telephone line connection
suitable for PSTN (dialler) or Private Line (Leased Line) connection. The
system shall have the appropriate Telecommunications authority approvals for
connection to the PSTN network.
28.5
PSTN Surge Protection Devices
Optional PSTN surge protection devices shall be available that provide superior
protection against damage from electrical transients such as lightning and
power surges.
28.6
RS232 Interface
The Control Module shall be capable of providing up to 4 bi-directional serial
RS232 Ports for connections to serial communications devices. Programming
options shall provide for these Ports to be connected to any of the following
devices:
(a)
The System Management Software
(b)
Upload / Download Installer’s Programming Utility
(c)
External Modem for use with System Management Software or
Installer’s Programming Utility software.
(d)
Automation systems
(e)
Serial Printer.
(f)
Securitel STU. (Australia only)
(g)
External PSTN Modem.
(h)
GSM Module (e.g. FE2000 GSM Module, FE3000 Serial GSM Module,
FE3000 Multi-path IP STU)
(i)
C&K SpreadNet® Wireless Receiver. (See Note 1 below)
(j)
Data Multiplexer (Contact distributor for details of products supported)
(k)
Elevator Management System (Contact distributor for details of
protocols supported)
(l)
Clipsal C-Bus Network
(m)
Inovonics FA-400 Wireless Receiver and MF Receiver (See Note 2 below)
(n)
PosData 4 Channel Model BX Digital Video Recorder (Allows users to
control, access and program the DVR via a LCD Terminal).
(o)
Dynalite Dynet Network
(p)
The following home automation / building automation systems:
© 2007 Inner Range Pty. Ltd.
(e.g. 3rd party custom building automation
software and compatible Serial Devices, etc).
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 52
1.
AMX
2.
Crestron
(q)
IR-Transtech BMS (Building Management System) and HVAC interface
(r)
HPM iControl network
(s)
Pacom RTU
Note 1: C&K SpreadNet® Wireless Receiver. Only relevant in countries
where SpreadNet® has the appropriate communications authority approvals,
e.g. United States, Canada, Russia and South America. Check with local
distributor of C&K Systems products for other countries.
Note 2: For applications in other countries outside Australia and United States,
please check with Inovonics or their local distributors for appropriate
communication authority approvals.
28.7
Host Computer
The Control Module shall be capable of connecting to a Host Computer via a
direct RS232 connection, a PSTN line connection or an Ethernet TCP/IP
connection. The host computer shall be able to provide full database
maintenance, monitoring and control of the system.
28.7.1
When an Ethernet TCP/IP connection is used, the Control Module shall be
capable of connecting to the Ethernet network directly via a plug-on Expander
Board without employing any external micro serial server, terminal server or
similar device.
28.7.2
The plug-on Expander Board shall include a standard Ethernet connector for
easy connection and shall be compatible with commonly available 10BaseT
Ethernet networks. The plug-on Expander Board shall also provide up to 3 bidirectional serial RS232 communications ports for the Control Module to
interface with external serial devices or systems.
28.7.3
The Control Module shall provide a means of supervising the integrity of both
serial RS232 and Ethernet connections to the System Management Host
Computer. This may be achieved by use of either a dedicated system input or
by nominating a “problem” input which will be placed automatically in the
Alarm state whenever the relevant connection has been lost and will restore
when the connection is once again available.
28.7.4
A separate External PSTN Modem shall be able to be connected to the Control
Module via the plug-on expander board to support dial-in connections from the
Host Computer when the on-board modem is required for other purposes such
as alarm reporting, remote control, etc.
28.7.5
The External PSTN Modem connection shall be capable of sharing a PSTN line
with general purpose telephones at the site. To this end, an “Answer Defer
Time” option must be available which will cause the External Modem to wait
the specified period of time before answering the ringing line. This will give
personnel at the site the opportunity to answer the telephone in the normal
manner. After-hours or when personnel do not answer the telephone, the
Control Module will seize the line after the specified “Answer Defer Time” and
the PSTN connection to the Host computer may be established.
28.8
Processing
The Control Module shall maintain a sufficient database and provide control
processing such that all system functions will operate normally without
requiring connection to a host PC.
28.9
Programming
All System programming and database maintenance shall be possible via User
Terminals without requiring connection to a host PC.
28.10
Review (Event) Memory
The Control Module shall store a minimum of 300 Events in Review Memory.
Optional memory upgrades shall be available to provide up to 6500 Events in
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 53
Review memory. When the review memory is full, oldest events shall be
discarded to allow room for new events.
28.10.1
The standard output format for review shall be ASCII text.
28.10.2
A programming option shall be available to allow the review data to be output
in its raw hexadecimal format, in addition to the ASCII text. This may be
useful to third party applications interpreting review events.
28.11
Inputs
(a)
The Control Module shall provide 16 End-Of-Line (EOL) supervised
inputs and a separate dedicated Cabinet Tamper input connection.
(b)
The Control Module shall be capable of logging and reporting the
following System Inputs (firmware generated alarms):
1.
Cabinet Tamper
2.
Internal Siren (S1) Tamper
3.
External Siren (S2) Tamper
4.
Battery Test fail
5.
AC Fail
6.
Low Battery
7.
LAN fuse fail
8.
Detector fuse fail
9.
LAN Comms problem
10.
Program change
11.
Power on reset
12.
Line fault
13.
UART 1 fault
14.
UART 2 fault
15.
UART 3 fault
16.
UART 4 fault
17.
Zone Self test fail
18.
Time (test) report
19.
Manual trigger (test report)
20.
Comms Backup
21.
Comms Fail
22.
Phone
23.
Module substitution
24.
Request for Service
25.
Area pre-arm 1 test
26.
Area pre-arm 1 test fail
27.
Area pre-arm 2 test
28.
Area pre-arm 2 test fail
29.
Intelligent Reader Problem
30.
GSM Problem
31.
Expander Power Test
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 54
28.12
Outputs
The Control Module shall provide:
(a)
2 Auxiliary outputs each capable of switching up to 500mA. (e.g. To
switch strobes, sounders, etc.)
(b)
2 monitored Siren outputs each capable of driving 2 x 8-Ohm Siren
speakers wired in parallel.
(c)
Option to provide up to 8 additional Auxiliary outputs each capable of
switching up to 100mA;
OR Relay outputs capable of switching up to 5A.
28.13
28.14
Fault Diagnostics
The Control Module shall include on-board diagnostic LEDs to:
(a)
Assist with commissioning & troubleshooting.
(b)
Indicate LAN Receive and Transmit status.
Testing (Volts)
The Control Module shall include options allowing:
(a)
DC Supply (or Battery Charger) Voltage
(b)
DC Drain Current
(c)
AC Supply status and
(d)
Battery Voltage
to be viewed in real time with the display updated twice every second.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 55
29.
User Terminals
A range of User Terminals - with keypad, display and indicating devices - shall
be available, including:
30.
(a)
2x16 character LCD Terminal
(b)
Weatherproof and vandal resistant Terminal
(c)
LCD Touchscreen Terminal
2x16 character LCD Terminal
A minimum of one LCD User Terminal must be installed with the system.
Additional User Terminals shall be installed at suitable locations for performing
system operations, viewing system status, reviewing system activity, database
maintenance and Door control via PIN codes as required.
30.1
Design
The User Terminal shall be of an attractive and functional design with the
option to be surface mounted or flush mounted as required.
30.2
Display
User Terminals shall provide a 32-character backlit Liquid Crystal Display
(LCD) for displaying system status, alarm messages, user prompts, system
data, user help and system information in text form.
30.2.1
Up to 4 Indicator lamps (LEDs) shall also be provided and shall be fully
programmable for each individual Terminal to display Area and alarm status
and/or any other status condition required. When programmed to display
Area status the lamp shall be On when Area On, Off when Area Off and Flash
when Area in alarm.
30.3
Data Entry
User Terminals shall provide an ergonomic backlit keypad for User operations.
30.4
Ease of Use
All User Terminal operations shall be Menu driven with user friendly text
prompts for each function or action to be performed.
30.5
On-line Help
All User Terminals shall include a dedicated HELP key that provides the User
with context sensitive help and instructions in plain text via the LCD.
30.6
System Access
Programming options shall be able to define the Menu options and functions
allowed, Areas displayed and controlled, and Message types displayed at each
individual User Terminal.
30.7
System Maintenance
All System programming and database maintenance shall be possible via
specified User Terminals without requiring connection to a host PC.
30.8
Inputs
User Terminals shall include:
(a)
2 two-state (non EOL) Zone Inputs for monitoring of devices installed
near the Terminal or relevant to the functions performed at the
Terminal. (e.g. Egress device input, Door Reed input, etc.)
(b)
Separate dedicated on-board Cabinet Tamper switch.
(c)
Capability of logging and reporting the following System Inputs
(Firmware generated alarms):
1.
Cabinet Tamper
2.
Panic
3.
Door Forced
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 56
4.
Door Open Too Long
5.
Operator Duress
6.
Too many PIN tries
7.
LAN Comms fail
30.9
Outputs
User Terminals shall provide a minimum of 2 Auxiliary Outputs capable of
switching up to 100mA for control of devices installed near the Terminal or
relevant to the functions performed at the Terminal. (e.g. door locks,
sounders or indicator lamps, etc.)
30.10
Fault Diagnostics
User Terminals shall provide fault messages in plain text on the LCD display to
assist with commissioning & troubleshooting.
30.11
Quick User Login
30.11.1
The system shall, as an option, allow the terminal to be used by entering a
fixed-length four digit code, negating the need to press the “OK” button. In
this way, a user may simply enter their 4-digit code and press either “ON” or
“OFF” to control their default area or area list.
30.11.2
The user may also be given access to one or more programming menus by
entering their 4-digit code followed by the “OK” and “MENU” buttons.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 57
31.
Weatherproof Terminals
31.1
Design
The Weatherproof Terminal shall be housed in an IP65 rated enclosure. It will
be highly water resistant, dust proof and vandal resistant with no external
moving parts.
31.2
Display
Up to 4 Indicator lamps (LEDs) shall be provided and shall be fully
programmable for each individual Terminal to display Area and alarm status
and/or any other status condition required. Default settings shall provide for
one lamp to indicate "logged on" status and one lamp to indicate the
associated Area On/Off (Armed/Disarmed) status while a User is logged on.
31.3
Inputs
Weatherproof Terminals shall include:
(a)
EOL supervised Door Reed input.
(b)
EOL supervised Tongue Sense input.
(c)
Request to Exit (REX) input.
(d)
Request to Enter (REN) input.
(e)
Separate dedicated Cabinet Tamper Input connection.
(f)
Capability of logging and reporting the following System Events
(Firmware generated alarms):
1.
Cabinet Tamper
2.
Keypad Tamper
3.
Keypad Cable Tamper
4.
Low supply voltage
5.
Door Forced
6.
Door Held
7.
Illegal Card/PIN
8.
LAN Comms Fail
31.4
Outputs
31.4.1
Relay
Weatherproof Terminals shall provide at least one relay (750mA @ 30VDC)
31.4.2
Auxiliaries
Weatherproof Terminals shall provide a minimum of 5 Auxiliary Outputs
capable of switching up to 100mA for control of devices installed near the
Terminal or relevant to the functions performed at the Terminal. (e.g.
sounders or indicator lamps, etc.)
31.5
Power Supply
Weatherproof Terminals shall be powered by 12V DC. The supply voltage may
be derived from the LAN.
31.5.1
If the Module is used to control a Door, then it must be powered by a separate
12V battery-backed power supply.
31.6
Readers
Weatherproof Terminal Modules shall also provide a single Reader connection
compatible with the Wiegand data format.
31.7
Functionality
Weatherproof Terminals shall provide the following Access Control
functionality options offered by the system:
(a)
Auto Area Off (Disarm)
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 58
31.8
(b)
Area On (Arm)
(c)
Request to Exit button
(d)
Request to Enter button
(e)
Extended unlock times
(f)
Anti-PassBack
(g)
Free Access (Time control)
(h)
Door Interlocking
Fault Diagnostics
Weatherproof Terminal Modules shall include on-board diagnostic LEDs to:
(a)
Assist with commissioning & troubleshooting.
(b)
Indicate LAN Receive and Transmit status.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 59
32.
Touchscreen Terminals
32.1
Design
The Touchscreen Terminal shall be of a modern design comprising a slimline
housing with a contemporary graphical interface.
32.2
Display
Touchscreen Terminals shall provide a full-colour graphical display measuring
240 by 320 pixels for displaying status, alarms, review, system events and
response to user commands.
32.3
Data Entry
The Touchscreen Terminal shall accept user input via the touchscreen. Buttons
and other screen elements will be large enough to press easily with an adult
thumb or finger.
32.4
Ease of Use
All Touchscreen Terminal operations shall be graphically driven with
descriptive text and icons making all functions easy to understand.
32.5
System Access
The Touchscreen Terminal shall provide access to the following functions:
(a)
Area control
(b)
On / off Auxiliary control and automation functions
(c)
Variable Level control of Automation Auxiliaries (C-Bus, Dynalite, HPM)
(d)
Isolate / de-isolate inputs
(e)
View and search review
(f)
View and acknowledge alarms
32.6
Touchscreen Configuration
Programming options shall allow a “layout” to be assigned to each individual
Touchscreen Terminal that defines the user screens for that terminal.
32.6.1
The number of “layouts” available shall be at least one more than the number
of Touchscreen Terminals available in the memory configuration used in the
system.
32.6.2
The system shall allow touchscreen layouts to be designed and managed
within the system management software. Whole layouts can be saved within
a Panel Template (.xml file), and copied and pasted to other panels.
32.6.3
The terminal can be configured to bypass user PIN codes for automation
functions only.
32.6.4
PIN codes will always be required to control areas.
32.7
Fault Diagnostics
User Terminals shall provide fault messages in plain text on the LCD display to
assist with commissioning & troubleshooting.
32.8
Scramble Keypad
The Touchscreen Terminal shall include a scramble keypad function as part of
its log-in security measures. Whenever the PIN authentication log-in screen is
presented to a user the position of the pin numbers will be set out in a random
array. Subsequently, every log-in screen will be different to that of previous
screens. Attempts to guess the users PIN code by observing hand movements
or the position of residual finger prints will be substantially more difficult.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 60
33.
Input / Output Expansion
A range of Zone Expansion Modules shall be available that can be installed
remotely on the system LAN in suitable locations for decentralised connection
of Inputs, Sirens and Auxiliary Outputs.
33.1
Inputs
Each Zone Expansion Module shall provide 8, 16 or 32 EOL supervised Inputs
as required.
33.1.1
Utilising Zone Expansion Modules the system shall be capable of monitoring up
to 2048 additional EOL supervised Inputs.
33.2
Auxiliary Outputs
Every Zone Expansion Module shall provide as standard a minimum of 8 onboard Auxiliary Outputs capable of switching up to 150mA.
33.3
Fault Diagnostics
Expansion Modules shall include on-board diagnostic LEDs to assist with
commissioning & troubleshooting and to indicate LAN Receive and Transmit
status.
33.4
Off-line Operation
In the event of LAN communications failure with the Control Module, and as
long as power to the Expander Module is maintained, an Expander Module
shall store a record of any Zone Inputs and System Inputs that detect an
Alarm or Tamper condition.
33.4.1
When communications is re-established, the Expander Module shall send one
Alarm or Tamper message and one Restoral message (if restoral occurred) per
Input to the Control Module regardless of the number of Alarm or Tamper
events that have occurred on the Input. The time and date stamp on the
events shall be the time that the Control Module receives the message when
communications is restored.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 61
34.
8 Input Zone Expansion Modules
34.1
Power Supply
8 Input Zone Expansion Modules shall be powered by 12V DC from the LAN or
a separate 12V battery-backed power supply.
34.2
Relay Outputs
8 Input Zone Expansion Modules shall provide an option for 8 Relay Outputs
capable of switching up to 5A.
34.3
System Alarms
8 Input Zone Expansion Modules shall be capable of logging and reporting
“Low supply voltage” and “LAN Comms problem” System Inputs (Firmware
generated alarms).
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 62
35.
16 or 32 Input Zone Expansion Modules
35.1
Power Supply
16 Input Zone Expansion Modules shall be powered by16V AC from an
approved Transformer or Plug pack supplied with the Module. The module
shall include an on-board 13.8V DC power supply, battery charger and
connection for a 12V Sealed Lead Acid backup battery of 6.5 AH capacity.
35.2
32 Input Zone Expansion Modules
The 32 Input Zone Expansion Module shall consist of a standard 16 Input Zone
Expansion Module with a plug-on 16 Input Expander board fitted. This is to
ensure product consistency and ease of future expansion.
35.3
Additional Inputs
16 or 32 Zone Expansion Modules shall also include:
35.4
(a)
Separate dedicated Cabinet Tamper Input connection.
(b)
Capability of logging and reporting the following System Inputs
(Firmware generated alarms):
1.
Cabinet tamper
2.
Internal siren tamper
3.
External siren tamper
4.
Battery test fail
5.
AC fail
6.
Low battery
7.
LAN fuse fail
8.
Detector fuse fail
9.
LAN comms problem
10.
LAN Comms problem
Additional Outputs
16 or 32 Input Zone Expansion Modules shall also include:
(a)
2 Auxiliary Outputs each capable of switching up to 500mA. (e.g. for
control of strobes, sounders, etc.)
(b)
2 monitored Siren Outputs each capable of driving 2 x 8-Ohm Siren
Speakers wired in parallel.
(c)
Option to provide up to 24 additional Auxiliary Outputs each capable of
switching up to 100mA
OR 8, 16 or 24 Relay Outputs capable of switching up to 5A.
35.5
Selectable End-of-line Resistors
16 or 32 Zone Expansion Modules shall support selectable End-Of-Line (EOL)
resistor values. The value will be selected via a DIP-switch, and will affect all
Zone Inputs on the Module and the Zone Expansion Board (if fitted).
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 63
35.5.1
The supported values shall be:
Series EOL
(“sealed” value)
EOL across NC
alarm contact
Resultant “alarm”
value
2k2
6k8
9k0
1k0
1k0
2k0
2k2
2k2
4k4
2k2
4k7
6k9
4k7
4k7
9k4
10k
10k
20k
10k
10k
20k (or 5k for no
alarm contact wiring
scheme)
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 64
36.
Wireless Detection
36.1
SpreadNet®
The system shall be capable of interfacing to a C&K System’s SpreadNet®
Wireless Receiver via a single four wire, 9600 baud, RS232 serial connection
to a Control Module UART Port.
(a)
Monitoring and Logging
The SpreadNet® serial interface shall enable the system to individually
monitor and log Alarm, Tamper, Low Battery and Poll Timeout
conditions on up to 208 SpreadNet® Wireless Detection devices
(SpreadNet® Zone Inputs).
(b)
Reporting
The system shall be capable of reporting:
1.
Individual Alarm and Tamper conditions on SpreadNet® Zone
Inputs.
2.
Low Battery and Poll Timeout for groups of no more than 16
SpreadNet® Zone Inputs.
[SpreadNet® is a secure spread spectrum wireless system that supports
Wireless devices such as movement detectors, door reeds, smoke detectors,
and push buttons, etc.
Note: Only relevant in countries where SpreadNet® has the appropriate
communications authority approvals. E.g. United States, Canada, Australia,
Russia and South America. Check with local distributor of C&K Systems
products for other countries.]
36.2
Inovonics
The system shall be capable of interfacing to a Inovonics FA400 Serial
Receiver or MF 4232 Receiver via a UART Port and IR400 Inovonics Interface
board. The wireless transmitters can either be registered or programmed into
the system.
(a)
Monitoring and Logging
The Inovonics wireless interface shall enable the system to individually
monitor and log Alarm, Tamper, Low Battery and Poll timeout conditions
on up to 208 Inovonics® Wireless Detection devices.
(b)
Reporting
The system shall be capable of reporting:
1.
Individual Alarm and Tamper conditions on Inovonics Zone
Inputs.
2.
Low Battery and Poll Timeout for groups of no more than 16
Inovonics Zone Inputs.
[Note: For appropriate local communication authority approvals, please check
with Inovonics or their local distributors]
36.3
Visonic
The system shall provide a LAN-based RF Expander Module to interface with
Visonic PowerCode™ RF detection devices (e.g. movement detectors, reed
switches, panic buttons etc.) and CodeSecure™ 4-button RF portable
transmitters (fobs). The RF Expander Module shall come with a separate
Tamper Input and on-board diagnostic LEDs.
(a)
Monitoring and Logging
Each Control Module shall be capable of connecting up to 16 RF
Expander Modules via its System LAN with each RF Expander Module
being capable of monitoring up to 32 registered RF detection devices for
Alarm, Tamper, Low Battery and Poll Timeout conditions.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 65
(b)
Remote Control
Each Control Module shall be capable of registering up to 100 RF mobile
transmitters (fobs) to 100 Users. A choice of single button or 4-button
transmitters shall be available. The 4 buttons on a transmitter shall be
fully programmable with functions to Arm an Area, Disarm an Area,
Turn an Auxiliary On, Turn an Auxiliary Off or Generate an Alarm on a
nominated Zone Input.
(c)
Reporting
The system shall be capable of reporting:
1.
Individual Alarm and Tamper conditions on Visonic RF Zone
Inputs.
2.
Cabinet Tamper, Low Volt (LAN), RF Transmitter Low Battery,
RF Transmitter Poll Fail, RF Transmitter Jam and LAN Comms
Problem for each RF Expander Module.
[Note: For appropriate local communication authority approvals, please check
with Visonic or their local distributors]
36.4
36.5
RF Interface
The system shall provide a LAN-based RF Wireless Transceiver module to
interface with Paradox Magellan™ RF detection devices. These devices
include, but are not limited to, movement detectors (PIR’s), reed switches,
smoke detectors, and RF portable transmitters (fobs). The RF Transceiver
Module shall come with a separate Tamper Input and on-board diagnostic
LEDs.
(a)
Monitoring and Logging
Each Control Module shall be capable of connecting up to 16 RF Wireless
Transceiver Modules via its RS-485 LAN, with each RF Transceiver being
capable of monitoring up to 32 registered RF detection devices for
Alarm, Tamper, Low Battery and Poll Timeout conditions.
(b)
Remote Control
Each Control Module shall be capable of registering up to 100 RF mobile
transmitters (fobs) to 100 Users. A range of Paradox RF fobs are
available, including bi-directional fobs which give audible and visual
feedback of area status or input commands. The buttons on a
transmitter shall be fully programmable with functions to Arm an Area,
Disarm an Area, Turn an Auxiliary On, Turn an Auxiliary Off, Generate
an Alarm on a nominated Zone Input, Qualify a Zone Input, Qualify an
Auxiliary, or Toggle an Auxiliary.
(c)
Reporting
The system shall be capable of reporting:
1.
Individual Alarm and Tamper conditions on Paradox RF Zone
Inputs.
2.
Cabinet Tamper, Low Volt (LAN), RF Transmitter Low Battery,
RF Transmitter Poll Fail, RF Transmitter Jam and LAN Comms
Problem for each RF Transceiver.
Other Wireless Detection Systems
The system shall be capable of monitoring Dry Relay Contact outputs or Open
Collector outputs provided from a Wireless Detection system such that the two
wire connection between the Relay Output and the Zone Input can be
monitored for Seal, Alarm and Cable Tamper states.
(a)
Monitoring and Logging
The system shall be capable of individually monitoring and logging each
Relay Output provided by the Wireless Detection system.
(b)
Reporting
The system shall be capable of individually reporting each Relay Output
provided by the Wireless Detection system.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 66
37.
Door Controllers
A range of Door Access Modules shall be available that can be installed
remotely on the system LAN in suitable locations for decentralised connection
of Readers, Electric Locks, Door monitoring devices, Card and/or Door status
indication, general purpose Inputs and Auxiliary Outputs.
37.1
Number of Doors
Utilising Door Access Modules with the appropriate Control Module Memory
option and configuration, the system shall be capable of controlling and
monitoring up to 240 Doors.
37.2
Access Readers
The Readers required for Door access control shall be .…. and shall provide
.….data output format.
[Proximity or contact-less Smart Card readers] The read range shall be a
minimum of ….. cm as specified by the Reader manufacturer.
Reader Type
Data format
Inner Range Reader.
IR-Secure-40 Format.
Magnetic Swipe Readers.
OR
Magnetic Stripe Insert Readers.
Clock and Data.
MR Access Model 6AT1B Magnetic Swipe plus PIN
code reader
Clock and Data with keypad data.
HID Proximity Readers.
Indala Proximity Readers.
Motorola Indala Proximity Readers.
HID 5355 Proximity Reader with keypad.
Motorola ARK-501 Proximity Reader with keypad.
Keri P-600 Proximity Reader with keypad.
Wiegand.
Wiegand with buffered keypad data.
Wiegand Swipe Card Readers.
Wiegand.
Wiegand Key Insert Readers.
Wiegand.
Contact-less Smart Card Readers.
Wiegand.
Biometric Readers. e.g. Hand geometry, Fingerprint,
etc.
Wiegand.
Wiegand Keypads. e.g. Vandal-resistant keypads,
Weatherproof keypads, Scrambling keypads, etc.
Wiegand.
Other types.
Wiegand.
37.3
Reader Data formats
Door Controllers shall be compatible with the following Reader data
communication formats:
(a)
Clock & Data (e.g. Magnetic Stripe Readers)
(b)
Wiegand data (e.g. Proximity, Wiegand and Biometric Readers) formats.
37.4
Reader Power Requirements
Door Controllers shall support 5V and 12 Volt Reader supply voltages.
37.5
Card Formats
The system shall support the following Magnetic Stripe and Wiegand Card
formats:
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 67
(a)
Magnetic Swipe1
(b)
Magnetic Swipe Last
(c)
Magnetic stripe Insertion
(d)
Wiegand 26 Bit2
(e)
Wiegand 27 Bit
(f)
Wiegand 30 Bit
(g)
Wiegand 32 Bit
(h)
Wiegand 34 Bit
(i)
Wiegand 35 Bit
(j)
Wiegand 36 Bit
(k)
Wiegand 37 Bit
(l)
Wiegand 40 Bit
(m)
IR Secure 40 Bit
(n)
Swipe Raw (2-door controllers only)
(o)
N Bit Wiegand
(p)
N Bit Wiegand fast
(q)
Prox. + PIN Wiegand
37.5.1
The system shall provide an option allowing the installer to define the Card
data format of Cards encoded with site code and card number. This option
shall allow the installer to specify the position and length of the site code and
card number data.
37.5.2
This option shall support card data being sequential from most significant to
least significant bit with maximum total data length of 40 bits (Wiegand) or 15
characters (Mag swipe).
37.5.3
This option shall allow processing of Site code data of up to 19 bits (Wiegand)
or 10 characters (Mag swipe); and card number data of up to 16 bits
(Wiegand) or 5 characters (Mag swipe).
37.6
Door Control Hardware Selection
NOTE: The Type of Door Access Module used is determined by the level of
redundancy required and the number of Doors to be controlled in the vicinity
of the Module.
37.6.1
IMPORTANT NOTES:
1
2
(a)
Control equipment requirements stated below assume the use of
standard 12-Volt electric lock strikes requiring up to 250mA holding
current.
(b)
Additional Power Supplies may be required for locks demanding heavier
current requirements such as Magnetic locks, or where longer battery
backup times are required.
(c)
The Intelligent 4 Door Access Module on-board Power Supply can
provide up to 2 Amps total Current for Locks, Readers, Detectors,
Auxiliaries and local LAN power. If the total current requirement
exceeds this, one or more separate 2 Amp Power Supplies should be
used to power the Locks.
(d)
Additional Power Supplies may be required where the physical locations
of multiple Single Door or 2 Door Access Modules makes it impractical to
use a common power supply.
Inner Range Magnetic Swipe Cards support Site Codes.
Industry standard Wiegand format supporting Site Codes.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 68
(e)
Backup Batteries are not listed. Note that a 6.5AH Sealed Lead Acid
(SLA) battery is required for each 2A Power Supply and a 6.5AH or
15AH SLA battery is required for each Intelligent 4 Door Access Module.
Desired Configuration
Single Door / 2 Door Access
Module (“backup cards”
function when offline)
Intelligent 4 Door Access
Module (full access control
functionality maintained when
offline)
1 Door. IN Reader only.
1 x Single Door Access Module.
1 x Intell. 4 Door Access Module.
1 x 2A Power Supply.
1 Door. IN & OUT Readers.
1 x 2 Door Access Module.
1 x Intell. 4 Door Access Module.
1 x 2A Power Supply.
2 Doors. IN Reader only.
1 x 2 Door Access Module.
1 x Intell. 4 Door Access Module.
1 x 2A Power Supply.
OR
2 x Single Door Access Module.
1 x 2A Power Supply.
2 Doors. IN & OUT
Readers.
2 x 2 Door Access Modules.
3 Doors. IN Reader only.
3 x Single Door Access
Modules.
1 x Intell. 4 Door Access Module.
1 x 2A Power Supply.
1 x Intell. 4 Door Access Module.
2 x 2A Power Supplies.
37.7
Single Door / 2 Door Controllers
37.8
Power Supply
Single Door / 2 Door Controllers shall be powered by 12V DC from a separate
12V battery-backed power supply. Door Control Modules shall not be powered
from the LAN.
37.9
Readers
Single Door / 2 Door Controllers shall provide a single Entry Reader connection
for each Door.
37.9.1
2 Door Access Modules shall be able to be configured for Single Door operation
providing connection for an IN Reader and OUT Reader on a single Door.
37.10
Inputs
Single Door / 2 Door Controllers shall include:
(a)
Separate EOL supervised Door Reed for each Door.
(b)
Separate EOL supervised Tongue Sense option for each Door.
(c)
Separate Request to Exit (REX) for each Door.
(d)
Request to Enter (REN) (2 Door Access Module only)
(e)
Area Arm.
(f)
Separate dedicated Cabinet Tamper Input connection.
(g)
Capability of logging and reporting the following System Inputs
(Firmware generated alarms):
1.
Cabinet Tamper
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 69
37.11
37.12
37.13
2.
Low supply voltage
3.
1st Door Forced
4.
1st Door Held
5.
2nd Door Forced3
6.
2nd Door Held3
7.
Illegal Card (either Door)
8.
LAN Comms Fail
Outputs
Single Door / 2 Door Controllers shall include the following for each Door:
(a)
Lock Relay capable of switching 750mA for each Door.
(b)
Valid Card / Invalid Card / Door Open Too Long (DOTL) warning for each
door. (May be combined on a single output for each door)
Functionality
Whilst On-line, Single Door / 2 Door Controllers shall provide the full range of
Access Control functionality options offered by the system including:
(a)
Dual User access
(b)
Card + PIN access
(c)
Anti-PassBack
(d)
Door Interlocking
(e)
Auto Area Off
(f)
Area On (Arm)
(g)
Free Access (Time control)
(h)
Extended unlock times
Off-line Operation
When Off-line, (e.g. Temporary LAN communications failure or Control Module
failure) Single Door / 2 Door Controllers shall provide basic 24 Hour Door
Access Control for:
(a)
The last 110 cards used at each Reader Head (2-Door Controllers only)
(b)
Up to 31 cards nominated by the system administrator
(c)
Up to 127 cards nominated by the system administrator
(Select the required option/s.)
37.14
37.15
3
Fault Diagnostics
Single Door / 2 Door Controllers shall include on-board diagnostic LEDs to:
(a)
Assist with commissioning & troubleshooting.
(b)
Indicate LAN Receive and Transmit status.
Third Party Access Control Integration
The system shall support, via a dedicated door access controller, high level
integration to Assa Abloy’s “Aperio” wireless door access technology, and Assa
Abloy’s “Hi-O” intelligent can-bus locking technology. The system shall
support logging of diagnostic messages from these technologies.
Not relevant on Single Door Access Modules.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 70
38.
Intelligent Door Controllers
38.1
Power Supply
Intelligent Door Controllers shall be powered from 16V AC via an approved AC
Mains Transformer supplied in the Module enclosure. The Transformer shall
have a 1.5m mains cord fitted for connection to a 3 pin GPO. The module
shall include an on-board 13.8V DC power supply, battery charger and
connection for a 12V Sealed Lead Acid backup battery of between 6.5 AH to
17 AH capacity.
38.2
Door Capacity
Intelligent Door Controllers shall provide full control and monitoring of up to 4
Doors.
38.3
Reader connections
38.3.1
Intelligent Four Door Controllers shall provide 4 on-board Reader connections
that can be individually assigned as the IN Reader or OUT Reader for any of
the 4 Doors controlled by the Module. i.e. An Intelligent Four Door Controller
shall be capable of controlling 2 Doors with IN and OUT Readers without
requiring any additional Reader interface hardware to be fitted.
38.3.2
Intelligent Four Door Controllers shall accommodate up to 4 additional Reader
connections via a plug-on 4 Reader Expansion board. The additional Reader
connections shall also be able to be individually assigned as the IN Reader or
OUT Reader for any of the 4 Doors controlled by the Module.
38.3.3
Intelligent Two Door Controllers shall provide 2 on-board Reader connections
that can be individually assigned as the IN Reader or OUT Reader for any of
the 2 Doors controlled by the Module. i.e. An Intelligent Two Door Controller
shall be capable of controlling 1 Door with IN and OUT Readers without
requiring any additional Reader interface hardware to be fitted.
38.3.4
Intelligent Two Door Controllers shall accommodate up to 6 additional Reader
connections via plug-on Reader Expansion boards. The Intelligent Two Door
Controller shall be expandable to a maximum of 4 doors and 8 readers. The
additional Reader connections shall also be able to be individually assigned as
the IN Reader or OUT Reader for any of the 4 Doors controlled by the Module.
38.4
LAN Connection
Intelligent Door Controllers shall provide a minimum of 5kV Isolation between
the Module and the system LAN without requiring any additional hardware to
be installed.
38.5
User Terminals
User Terminals required for “Card AND PIN” or “Card OR PIN” access
requirements shall be connected to a separate local LAN connection on the
Intelligent Door Controller. Whilst the Module is On-line the local LAN shall be
transparently interfaced to the system LAN allowing the option of full system
functionality on these Terminals as required.
38.6
Inputs
Intelligent Door Controllers shall include the following dedicated Inputs for
each Door:
38.7
(a)
EOL supervised Door Reed for each Door.
(b)
EOL supervised Tongue Sense option for each Door.
(c)
Request to Exit (REX) for each Door.
(d)
Request to Enter (REN) for each Door.
(e)
Area Arm Button for each Door.
Intelligent Door Controllers shall also include the following Inputs:
(a)
Minimum of 8 General purpose EOL supervised Inputs.
(b)
Separate dedicated Cabinet Tamper Input connection.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 71
(c)
Capability of logging and reporting the following System Inputs
(Firmware generated alarms):
1.
1st Door Lock Tamper4
2.
2nd Door Lock Tamper4
3.
3rd Door Lock Tamper4
4.
4th Door Lock Tamper4
5.
1st Door Forced
6.
2nd Door Forced
7.
3rd Door Forced
8.
4th Door Forced
9.
1st Door DOTL
10.
2nd Door DOTL
11.
3rd Door DOTL
12.
4th Door DOTL
13.
1st Door Illegal Card
14.
2nd Door Illegal Card
15.
3rd Door Illegal Card
16.
4th Door Illegal Card
17.
Cabinet Tamper
18.
General Lock fault
19.
Battery Test fail
20.
AC Fail
21.
Low Battery
22.
LAN fuse fail
23.
Detector fuse fail
24.
LAN Comms problem
38.8
Outputs
Intelligent Door Controllers shall include the following dedicated Outputs for
each Door:
38.8.1
These Outputs shall be capable of controlling Reader LEDs and/or Beepers or
other devices as required.
38.8.2
4
(a)
Lock Relay capable of switching 5A.
(b)
Valid indication
(c)
Invalid indication.
(d)
Door Open Too Long (DOTL) warning.
Intelligent Door Controllers shall also include the following Outputs:
(a)
Minimum of 8 General purpose Auxiliary Outputs capable of switching up
to 150mA.
(b)
AN option shall be available to utilise 4 of the general purpose Auxiliary
Outputs to provide a dedicated “disabled access” output for each door
for the purpose of activating door opening mechanisms.
Available when lock wired in the normal "power to lock" configuration.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 72
38.9
38.10
Functionality
Whilst On-line, Intelligent Door Controllers shall provide the full range of
Access Control functionality options offered by the system including:
(a)
Dual User access
(b)
Card + PIN access
(c)
Anti-PassBack
(d)
Door Interlocking
(e)
Auto Area Off
(f)
Area On (Arm)
(g)
Free Access (Time control)
(h)
Extended unlock times
(i)
Defer Arming via readers
Off-line Operation
(e.g. Temporary LAN communications failure or Control Module failure)
The Intelligent Door Controller shall maintain a local up-to-date database of all
relevant system data required to provide normal Door access control
functionality when Off-line including:
(a)
User’s normal Door access permissions and restrictions.
(b)
User TimeZone restrictions.
(c)
Door Free Access times.
(d)
Anti-PassBack. (Limited to Doors on the same Intelligent Door
Controller)
(e)
Door Interlocking. (Limited to Doors on the same Intelligent Door
Controller)
38.11
Disabled User Auxiliaries
The Intelligent Door Controller shall allow corresponding on-board general
purpose auxiliaries to follow the Lock Auxiliaries 1-4 respectively, when a
“Disabled” User accesses the Door. This feature will provide an output that can
be used to trigger electric specific Door opening mechanisms on a valid Door
Access event, but only when accessed by a User that is flagged as being a
“Disabled” User in the system.
38.11.1
The Intelligent Door Controller shall make Disabled User Auxiliaries available
in both On-line and Off-line modes.
38.12
Database Maintenance
Any system programming changes relevant to Intelligent Door Controllers
shall be automatically downloaded to the Controllers without requiring any
special User operation.
38.12.1
In the event that an Intelligent Door Controller is receiving a full download of
relevant programming from the Control Module, other up-to-date Intelligent
Door Controllers shall not be affected by the process and will continue
functioning as normal.
38.13
Event Log
Each Intelligent Door Controller shall maintain a local Event log of a size equal
to that of the Control Module. (300 Events, 2000 Events or 6500 Events
depending on the Control Module Memory size)
38.13.1
When the review memory is full, oldest events shall be discarded to allow
room for new events.
38.13.2
An option shall be available, programmable per door, which prevents “user
access granted” events being logged to review unless the door is actually
opened after the card presentation.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 73
38.13.3
When this option is enabled and a door is not opened following a valid card
presentation, a “not opened” event shall be logged.
38.14
Time & Date Stamp
All Events shall have a time and date stamp that includes the Month, Date,
and time accurate to 1/10ths of a second.
38.15
On-line / Off-line Event Logging
When On-line, Events shall be logged locally and uploaded to the Control
Module as they occur in real-time.
38.15.1
When Off-line, Access Control Events shall continue to be logged locally by
each Intelligent Door Controller and shall be endorsed with a special character
after the date to identify the Event as occurring whilst the Door Controller was
off-line. When LAN communication is re-established, the Intelligent Door
Controller shall transfer the Events that have occurred whilst off-line, to the
Control Module at a rate that will not affect the normal operation of the
system.
38.15.2
Any general purpose Zone Input and System Input alarms shall also be
stored, however only one alarm message and one restore message (if a
restore occurred) per Input shall be sent to the Control Module when
communication is re-established.
38.16
Fault Diagnostics
Intelligent Door Controllers shall include on-board diagnostic LEDs to:
38.17
(a)
Assist with commissioning & troubleshooting.
(b)
Indicate LAN Receive and Transmit status.
Version Number
The system shall display the firmware version number of the Intelligent Door
Controller within the relevant programming menu (requires Control Module
firmware 7.8 or higher).
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 74
39.
Lift Controllers - Access Reader Interface
39.1
Reader Interfaces
Reader Interface Modules shall be available that can be installed remotely on
the system LAN in the Lift Cars for connection of Readers, Card and/or status
indication, general purpose Inputs and Auxiliary Outputs.
[Single Door / 2 Door Access Modules recommended]
39.2
Reader Interface Power Supply
Reader Interface Modules installed in Lift Cars shall be powered by 12V DC
from a separate 12V battery-backed power supply. Reader Interface Modules
shall not be powered from the LAN.
39.3
LAN Isolation
A LAN Isolator/Repeater device shall be installed at each Access controlled Lift
at a suitable point before the LAN cabling enters the Elevator shaft. These
devices are provided to isolate the section of LAN cable connecting to the
Access Module in the Lift Car. The devices shall provide a minimum of 2.5kV
Isolation between each section of the LAN connected to the device.
39.4
Number of Lifts.
Utilising standard system Modules the system shall be capable of controlling
and monitoring up to 32 Lift Cars.
39.5
Access Readers
The Readers required for Lift Access Control shall be..…and shall provide …..
data output format.
39.5.1
[Proximity or contact-less Smart Card Readers] The read range shall be a
minimum of ….. cm as specified by the Reader manufacturer.
Reader Type
Data format
Inner Range Reader.
IR-Secure-40 Format.
Magnetic Swipe Readers.
OR
Magnetic Stripe Insert Readers.
OR
Clock and Data.
Weatherproof Magnetic Swipe Readers.
HID Proximity Readers.
Wiegand.
HID 5355 Proximity Reader with keypad.
Wiegand with buffered keypad data.
Indala Proximity Readers.
Motorola Indala Proximity Readers.
Wiegand.
Motorola ARK-501 Proximity Reader with keypad.
Wiegand with buffered keypad data.
Keri P-600 Proximity Reader with keypad.
Wiegand with buffered keypad data.
Wiegand Swipe Card Readers.
Wiegand.
Wiegand Key Insert Readers.
Wiegand.
Contact-less Smart Card Readers.
Wiegand.
Biometric Readers.
e.g. Hand geometry, Fingerprint, etc.
Other types.
39.5.2
Wiegand.
Wiegand.
Reader Interfaces shall be compatible with the following Reader data
communication formats:
(a)
Clock & Data (e.g. Magnetic Stripe Readers)
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 75
(b)
Wiegand data (e.g. Proximity, Wiegand and Biometric Readers) formats.
39.6
Reader Power Requirements
Reader Interfaces shall support 5V and 12 Volt Reader supply voltages.
39.7
Card Formats
The Lift access control system shall support the following Magnetic stripe and
Wiegand Card formats:
(a)
Magnetic Swipe
(b)
Magnetic Swipe Last
(c)
Magnetic stripe Insertion
(d)
Wiegand 26 Bit
(e)
Wiegand 27 Bit
(f)
Wiegand 30 Bit
(g)
Wiegand 32 Bit
(h)
Wiegand 34 Bit
(i)
Wiegand 35 Bit
(j)
Wiegand 36 Bit
(k)
Wiegand 37 Bit
(l)
Wiegand 40 Bit
(m)
IR Secure 40 Bit
(n)
Swipe Raw
(o)
N Bit Wiegand
(p)
N Bit Wiegand fast
(q)
Prox. + PIN Wiegand
(r)
IR-Secure-40
39.7.1
The system shall provide an option allowing the installer to define the Card
data format of Cards encoded with site code and card number. This option
shall allow the installer to specify the position and length of the site code and
Card number data.
39.7.2
This option shall support Card data being sequential from most significant to
least significant bit with maximum total data length of 40 bits (Wiegand) or 15
characters (Mag swipe).
39.7.3
This option shall allow processing of Site code data of up to 19 bits (Wiegand)
or 10 characters (Mag swipe); and Card number data of up to 16 bits
(Wiegand) or 5 characters (Mag swipe).
39.8
Inputs
Reader interfaces shall include:
(a)
Separate dedicated Cabinet Tamper Input connection.
(b)
Capability of logging and reporting the following System Inputs
(Firmware generated alarms):
1.
Cabinet Tamper
2.
Low supply voltage
3.
Illegal Card
4.
LAN Comms Fail
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 76
39.9
Outputs
Reader interfaces shall include the following for each Lift:
(a)
39.10
39.11
Valid Card / Invalid Card indication. (May be combined on a single
output for each lift)
Functionality
Reader interfaces shall provide the full range of Access Control functionality
options offered by the system including:
(a)
Dual User access
(b)
Card + PIN access
(c)
Free Access (Time control)
(d)
Extended unlock times
Fault Diagnostics
Reader interfaces shall include on-board diagnostic LEDs to:
(a)
Assist with commissioning & troubleshooting.
(b)
Indicate LAN Receive and Transmit status.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 77
40.
Lift Controllers - Lift Control Equipment Interface
40.1
Number of Floors
Utilising standard system Expansion Modules the system shall be capable of
controlling and monitoring up to 64 Floors per Lift Car.
40.1.1
Low-level Interface - No Button Monitoring
40.1.2
(a)
Expansion Modules for Lift Control Interface shall be installed remotely
on the system LAN in or near the Lift Motor Room/s.
(b)
The Expansion Modules shall provide for “Normally Open” and “Normally
Closed” Dry Relay Contacts to Enable/Disable Floor selection buttons for
each Lift Car to be controlled. These Relay Contacts shall be electrically
isolated from the Access Control system.
(c)
For ease of maintenance, the Relays shall be provided on separate Relay
Boards that connect to the Expansion Module. Each Relay Board shall
provide no more than 8 Relays.
Low-level Interface - With Button Monitoring
(a)
Expansion Modules for Lift Control Interface shall be installed remotely
on the system LAN in or near the Lift Motor Room/s.
(b)
The Expansion Modules shall provide for the following Inputs and
Outputs:
1.
Opto-isolated Inputs capable of monitoring Lift button circuit
voltages of 16 to 48V DC. (Full Wave rectified and Non
regulated) Input circuits shall provide a minimum of 850V
Isolation from the button circuit.
2.
“Normally Open” and “Normally Closed” Dry Relay Contacts
to select the specific Floor requested by the User. Relay
contacts shall be capable of switching 30W or 62.5VA within
the following voltage and current limits:

500milliAmps at 48V DC or 48V AC RMS.
OR

3.
40.1.3
200milliAmps at 120V DC or 150V AC RMS.
For ease of maintenance, the Inputs and Relays shall be
provided on separate Interface Boards that connect to the
Expansion Module. Each Relay Board shall provide no more
than 8 Inputs/Relays and the Relays shall be mounted in
sockets.
High-level Interface
(a)
The system shall provide a serial data connection for Interface to the
Lift Control Equipment.
(b)
Communication shall be via RS232 serial data at 300 / 600 / 1200 /
2400 / 4800 / 9600 baud.
(c)
The serial interface shall provide the ability to enable the relevant floors
for selection after a valid card read.
OR
(d)
40.1.4
The serial interface shall provide the ability to monitor the Floor button
selections after a card is read and, after processing, return a command
to select a specific floor.
[Dependant on Lift protocol used]
IMPORTANT NOTES:
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 78
(a)
Contact Inner Range for details of High Level Lift protocols supported,
functions supported and baud rate required.
(b)
Ensure that all relevant local and/or national regulations allow use of
High-Level Lift Interfaces for access control.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 79
41.
Power Supplies - Stand-alone
41.1
AC Input
Power supplies shall be powered from an AC mains supply of 240V AC +/-10%
and be fitted with an approved Power Transformer.
41.2
Output Voltage
Any Power Supplies used within the system shall maintain an output voltage
under static load:
41.3
(a)
Within 2% of the rated output voltage at 90% of the rated current
output;
(b)
And within 5% of the rated output voltage at 100% of the rated current
output.
Output Protection
Fuse protection shall be provided for the following Outputs
(a)
Battery Input.
(b)
Detector Output.
41.4
Spurious Emissions
Power Supplies shall be of a design that does not interfere with the operation
of other system devices such as Proximity Readers and Wireless detectors and
shall comply with appropriate regulations.
41.5
Backup Battery
Power Supplies shall include a battery charger and connection for a Sealed
Lead Acid Battery of at least 6.5 AH capacity.
41.6
Fault Monitoring
Power Supplies shall provide separate AC Mains Fail and Low Battery outputs
that can be monitored by inputs on a suitable system Module. AC Mains fail,
Output present and Battery reversed / Battery fuse fail shall be indicated
locally on the Power supply PCB by indicator lamps (LEDs).
41.7
Battery Testing
Power Supplies shall have a control input to allow the regulator to be switched
off by a remote device for the purposes of automated battery testing if
required.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 80
42.
Power Supplies - Intelligent (LAN Comms Capability)
42.1
Design
LAN Power Supply Modules shall be available to be utilized wherever batterybacked 12V power supplies are required. They shall be capable of reporting
status of Fault, Tamper, Input and Output conditions immediately via LAN
communications without additional wiring.
42.2
LAN Connection
LAN connection shall be provided allowing the module to be connected
anywhere along the System LAN.
42.3
AC Input
LAN Power Supply modules shall be powered from 16V AC +/-10% via an
approved 240V AC Mains Transformer supplied in the module enclosure.
42.4
Power Supply Outputs
The module shall include a 13.75V power supply output and battery charger
output.
42.4.1
Any Power Supplies used within the system shall maintain an output voltage
under static load:
42.4.2
(a)
Within 2% of the rated output voltage at 90% of the rated current
output;
(b)
And within 5% of the rated output voltage at 100% of the rated current
output.
A single module shall be capable to provide a total output current up to 4A
for:
(a)
Battery Charging
(b)
Combined current drawn by: Auxiliaries, Detectors and System LAN.
42.4.3
An option shall be available to connect up to 4 LAN Power Supply Modules
together in a Master/Slave configuration to provide additional Battery
Charging current and/or Detector current up to a total combined current
output of 16A.
42.5
Backup Battery
LAN Power Supplies shall include a battery charger and connection for a 12V,
Sealed Lead Acid Battery of at least 6.5 AH capacity.
42.6
Battery Testing
LAN Power Supplies shall have an option to be included in Automatic Battery
Testing procedures. These procedures shall provide a programmable start
time that allows the Battery Test sequence to commence daily / weekly /
monthly / annually [As required], and a test time specified separately for each
Module to be tested. (Allowing for variations in the load current of each
Module.)
42.7
Spurious Emissions
Power Supplies shall be of a design that does not interfere with the operation
of other system devices such as Proximity Readers and Wireless detectors and
shall comply with appropriate regulations.
42.8
Fault Diagnostic LEDs
The module shall include on-board diagnostic LEDs to:
42.9
(a)
Assist with testing, commissioning and trouble-shooting LAN
communications.
(b)
Indicate LAN activity.
(c)
Indicate presence of AC Input, 13.75V supply and 5V supply.
Inputs and Fault monitoring
The module shall include two on-board general purpose EOL supervised
Inputs.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 81
42.9.1
42.10
42.11
It shall also log and report the following System Inputs (Firmware generated
alarms):
(a)
Cabinet Tamper
(b)
AC Fail
(c)
Low Battery
(d)
Detector Fuse Fail
(e)
LAN Fuse Fail
(f)
Battery Fuse Fail
(g)
AUX 2 Fuse Fail
(h)
AUX 2 Tamper
(i)
Detector Over-current
(j)
Battery Over-current
(k)
Over Volts
(l)
Low Volts
(m)
Battery Fail
(n)
Slave Fail
(o)
Battery Test Fail
(p)
LAN Comms Problem
Auxiliary Outputs
The module shall include the following Outputs:
(a)
A general purpose Auxiliary Output capable of switching up to 200mA.
(b)
With the option to provide one additional Auxiliary output capable of
providing 13.75V DC to control Satellite Siren Unit or other external
controlled device.
(c)
When connecting to external devices, programming option shall allow an
output current value to be nominated. A tamper alarm shall be
generated when the output current falls below this nominated output
current level.
Output Protection
Fuse protection shall be provided for the following Outputs
(a)
Battery Input.
(b)
Detector Output.
(c)
LAN Power Output.
(d)
Satellite Siren / Auxiliary Output.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 82
43.
Analogue Input Monitoring
A Module shall be available that can be installed remotely on the system LAN
in suitable locations for monitoring of Analogue values.
43.1.1
The Analogue Module shall support a Serial Temperature Sensor option to
eliminate the need for voltage or current loop sensing when monitoring
temperatures.
43.2
Power Supply
Analogue Modules shall be powered by 12V DC from the LAN or a separate
12V battery backed up power supply.
43.3
Inputs
Each Analogue Module shall provide:
(a)
Up to 4 Inputs for Analogue sensor devices or serial temperature
sensors.
(b)
2 general purpose Zone Inputs.
43.3.1
Utilising Analogue Modules the system shall be capable of monitoring up to 32
Analogue sensor devices using standard programming options.
43.3.2
Utilising Analogue Modules the system shall be capable of monitoring up to
396 Analogue sensor devices using a customised system configuration.
43.3.3
Installation options for each individual Analogue Input shall provide for the
following Analogue Input signals:
(a)
Voltage sensing. 0V to 5V DC. Uni-polar referenced to 0V input
terminal. (Input is polarised)
(b)
Current loop sensing. 4mA to 20mA DC polarised. Input termination
resistor selectable.
(c)
Serial Temperature Sensor.
43.4
Analogue Input Processing - General
The Analogue to Digital Converter shall provide a minimum of 8-bit resolution.
43.4.1
Analogue Input processing shall allow an alarm or seal condition to be
generated when an Input exceeds or drops below one or more preprogrammed trigger values.
43.4.2
Programming options shall provide for these changes of state on Analogue
Inputs to be logged and activate Messages, Auxiliary Outputs, Alarms, Central
Station reports, etc. as required.
43.4.3
Programming options shall allow the actual value on any Analogue Input to be
viewed via a Menu option on the User Terminal and/or on a host PC connected
to the system. The name of the Input shall be displayed in plain text and the
value shown in meaningful scaled units.
43.5
Analogue Input Processing - Voltage or Current Loop Sensing
A programmable Trigger value shall be provided for each Analogue Input.
43.5.1
The Input shall generate a Seal state below the programmed Trigger value
and an Alarm state above the programmed Trigger value. A Tamper state
shall be generated if the Analogue value is outside the expected range. [Mode
0]
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 83
43.6
Analogue Input Processing - Serial Temperature Sensor
The system shall provide programming options to accommodate the following
processing Modes:
(a)
A programmable Trigger value shall be provided for each Serial Input.
The Input shall generate a Seal state below the programmed Trigger
value and an Alarm state above the programmed Trigger value. A
Tamper state to indicate a fault condition shall be generated if the value
is outside the expected temperature range of 0º to +30º Celsius.
[Mode 1]
(b)
The Output value of a Serial Temperature Sensor connected to Input 1
or 3 shall be mirrored on the next Input. (i.e. Input 2 or 4 respectively)
A programmable Trigger value shall be provided for each Input
effectively providing two independent Trigger points per Sensor. Each
Input shall generate a Seal state below the programmed Trigger value
and an Alarm state above the programmed Trigger value. A Tamper
state to indicate a fault condition shall be generated if the value is
outside the expected temperature range of 0º to +30º Celsius. [Mode
2]
(c)
The Output value of a Serial Temperature Sensor connected to Input 1
shall be mirrored on Inputs 2, 3 and 4. A programmable Trigger value
shall be provided for each Input effectively providing four independent
Trigger points per Sensor. Each Input shall generate a Seal state below
the programmed Trigger value and an Alarm state above the
programmed Trigger value. A Tamper state to indicate a fault condition
shall be generated if the value is outside the expected temperature
range of 0º to +30º Celsius. [Mode 3]
(d)
Two programmable Trigger values shall be provided for each Serial
Input. The trigger values shall define the “mean value of the desired
range” and the “dead band value”, thus providing a “minimum desired
value” and “maximum desired value” for each Serial Input. Each Input
shall generate a Seal state below the minimum desired value, a Tamper
state between the minimum and maximum desired values, and an
Alarm state above the maximum desired value. [Mode 4]
(e)
Two programmable Trigger values shall be provided for each Serial
Input operating as per Mode 4 but providing a temperature range of 55º to +70º Celsius. [Mode 5]
43.7
Auxiliary Outputs
Each Analogue Module shall provide as standard a minimum of 4 on-board
Auxiliary Outputs capable of switching up to 150mA.
43.8
Fault Diagnostics
Analogue Modules shall include on-board diagnostic LEDs to:
43.9
43.10
(a)
Assist with commissioning & troubleshooting.
(b)
Indicate LAN Receive and Transmit status.
System Alarms
Analogue Modules shall be capable of logging and reporting the following
System Inputs (Firmware generated alarms):
(a)
Cabinet Tamper
(b)
Low supply voltage
(c)
LAN Comms problem
Monitoring and Logging
The system shall individually monitor and log activity on each Analogue Input
and be capable of reporting changes of state above and/or below one or more
pre-programmed trigger values to a local and/or remote Central Monitoring
Station.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 84
44.
Dual-Format Proximity Reader
A dual-format proximity reader shall be available that can be connected to
Door Access Modules and read prox cards in a variety of formats.
44.1
Power Supply
Dual-format Proximity Card Readers can be powered by 12V DC from an
attached Inner Range Door Access Module (current consumption 85mA max).
44.2
Warm-up Time
The warm up time shall be less than 15 seconds from application of power.
44.3
Configuration
The reader shall be capable of supporting the following card formats:
44.3.2
(a)
Inner Range Secure40 format
(b)
125kHz FSK Proximity Card format from 26 bit to 40 bit
(c)
EM 125kHz ASK format
An advanced configuration kit shall be available that allows the Reader to be
configured for the following modes of operation:
(a)
Single-mode operation where any one of the three available formats
may be selected to enhance the processing speed and, if mounted on
metallic surfaces, the read range.
(b)
Dual-mode operation where any two of the three available formats may
be selected to allow for sites that utilize both formats.
44.4
Read Range
The dual-format proximity reader shall have a maximum read range of
150mm using proximity cards (where power supply ripple is less than 150
mV). If the reader is mounted on metal the effective range may be reduced.
44.5
User Identification
User identification devices, compatible with the Proximity Reader specified,
shall be available in the following types:
44.5.1
(a)
Clamshell Cards
(b)
ISO cards compatible with Photo ID printer
(c)
Key fobs
The data format of the User ID devices shall support the following features:
(a)
A “registered site” service that enables customers to register a unique
site code for an individual site or client.
(b)
No duplication of any card issued.
(c)
Encrypted data.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 85
45.
Fibre Modems
A fibre modem shall be available that provides two separate, optically isolated
ports to the LAN.
45.1
Single Mode vs. Multi-mode
The fibre modem shall be available in two types – single mode and multimode.
45.1.1
In single mode fibre modems, each port will have a transmit / receive pair
with SC connectors which will accommodate single-mode 9/125 μm optical
fibre cables.
45.1.2
In multi mode fibre modems, each port will have a transmit / receive pair with
SC connectors which will accommodate multi-mode 62.5/125 μm optical fibre
cables.
45.2
Power
Fibre Modems shall be powered by 12V DC from the LAN or a separate 12V
battery-backed power supply (maximum current draw 260mA).
45.3
Indicators
LED indicators show operational status (RUN) and the status of each receive
line (FAULT). Data flow shall be indicated with TX and RX LED indicators for
each of the three ports.
45.3.1
Outputs
Two switched outputs shall be provided, which can be wired directly into Zone
Inputs on a module to monitor the state of each receive port.
Fault
Fault LED
OUT 1
OUT 2
Data detected on both ports
OFF
Seal
Seal
Data not detected on port 1
Fast flash
Alarm
Seal
Data not detected on port 2
Slow flash
Seal
Alarm
ON
Alarm
Alarm
Data not detected on both ports
45.4
Topology
The Fibre Modem shall be usable in a “LOOP” mode or in a “STAR” mode to
create 2 separate electrically isolated LAN segments. The Fibre Modems can
also be “daisy chained” to cover larger sites.
45.4.1
Transmission Distance
The typical transmission distance between each fibre modem shall be 3000
metres.
45.4.2
Deployment Considerations
When designing the Fibre Modem network for a particular Concept 3000/4000
system, a number of factors will limit the number of Fibre Modems and/or the
length of fibre optic cabling that can be used. These are as follows:
45.4.3
(a)
The Fibre Modem signal processing delay.
(b)
The propagation delay and signal attenuation of the Optical Fibre cable
connected between Fibre modems.
(c)
The propagation delay and signal attenuation of the RS485 twisted pair
LAN cable connecting the Fibre modem to the Concept 3000/4000
Modules.
Single Mode
To simplify the single-mode fibre network design, the following rules shall be
adhered to:
(a)
Maximum length of Optical Fibre cable between two Fibre Modems must
not exceed 13000 metres (13km).
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 86
45.4.4
(b)
Maximum length of twisted pair LAN cable from a Fibre Modem LAN Port
to the furthest Module on that segment of LAN must not exceed 1500m
(1.5km).
(c)
No two Modules on the LAN shall be more than 15 “Delay Units” apart.
(d)
When used in a loop configuration, the Fibre optic loop may be no more
than 14 “Delay Units” in length.
The number of “Delay Units” is calculated as follows:
(a)
Add 1 Delay Unit for each Fibre Modem in the path.
(b)
Add 1 Delay Unit for each 1000 metres (1km) of Optical Fibre cable in
the path.
(c)
Add 1 Delay Unit for each 1350 metres (1.35km) of twisted pair LAN
cable in the path.
45.4.5
Multi-Mode
45.4.6
To simplify the multi-mode fibre network design, use the following rules.
45.4.7
(a)
Maximum length of Optical Fibre cable between two Fibre Modems must
not exceed 3000 metres (3km).
(b)
Maximum length of twisted pair LAN cable from a Fibre Modem LAN Port
to the furthest Module on that segment of LAN must not exceed 1500m
(1.5km).
(c)
No two Modules on the LAN shall be more than 15 “Delay Units” apart.
(d)
When used in a loop configuration, the Fibre optic loop may be no more
than 14 “Delay Units” in length.
The number of “Delay Units” is calculated as follows:
(a)
Add 1 Delay Unit for each Fibre Modem in the path.
(b)
Add 1 Delay Unit for each 1000 metres (1km) of Optical Fibre cable in
the path.
(c)
Add 1 Delay Unit for each 1350 metres (1.35km) of twisted pair LAN
cable in the path.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 87
46.
BMS & HVAC Interpreter
A field device shall be available that enables the system to interact with all
major building automation and HVAC communication protocols (over and
above the integration options built into the Control Module).
46.1
Operation
The device shall operate as a hardware level “black box” solution that
connects directly between the Control Module and the target automation
system.
46.2
Deployment & Configuration
The Trans-Tech device shall be supplied as a custom factory-programmed
solution based on individual site requirements.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 88
47.
Hardware System LAN
47.1.1
The system hardware architecture shall be capable of using a mix of both
traditional RS-485 LAN and IP LAN between the Control Module and its field
modules.
47.1.2
Any part of the IP LAN must be capable of being routed across any IP
infrastructure, including wireless.
47.2
Encryption
The system IP LAN shall be encrypted using 128 bit AES encryption.
47.3
Electrical Isolation
The system shall provide electrical isolation between RS-485 LAN segments.
47.4
LAN Security
The system shall provide security detection across all RS-485 and IP LAN
segments in the event of network outages or module substitution.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 89
(This page has been intentionally left blank)
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 90
Section 3 - Functional Spec
48.
General
48.1
Integration
Options for Security and Intruder Alarm, Access Control, Plant Monitoring,
Building Automation and Custom Control logic and timing functions shall be
provided within a single integrated system.
48.1.1
Security Alarm, Access Control, Plant Monitoring and Building Automation
functions shall operate independently or shall be integrated together to
achieve the system features required.
48.2
Host PC
The system must provide an option for connection to a host PC. The Host PC,
if utilised, shall provide system control and monitoring, event logging,
database maintenance and database backup. Full system functionality must
be maintained with or without the Host PC connected.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 91
49.
User Terminals
This section pertains to standard User Terminals. For Weatherproof Terminals
and Touchscreen Terminals, see the appropriate section.
49.1
Display
Programming options for each User Terminal shall provide the ability to
display any or all of the following information in plain text form:
(a)
Area status.
(b)
System status.
(c)
Alarm messages.
(d)
Alarm Review data.
(e)
Custom messages and/or Maintenance messages. Permanent or
displayed for specific time periods.
(f)
System information.
(g)
Current Time & Date of the Control Module.
49.2
Ease of Use
All User Terminal operations shall be Menu driven with user friendly text
prompts for each function or action to be performed.
49.3
On-line Help
All User Terminals shall include a dedicated HELP key that provides the User
with context sensitive help and instructions in plain text via the LCD.
49.4
Keypad Timeout
Users shall automatically be logged out from the User Terminal:
(a)
After no more than 15 seconds if logged in but no further key is
pressed.
(b)
After no more than 15 seconds if logged in and Area control screen
displayed.
(c)
After no more than 255 seconds if logged in and the Menu is entered.
49.5
User Duress
All User Terminals shall provide the ability to generate a Duress alarm when
any PIN Code is entered that is defined in system programming as a Duress
PIN Code. The Duress alarm shall identify the individual User and the User
Terminal and programming options shall allow the alarm to be logged and
reported as required.
49.6
Panic
All User Terminals shall provide the ability to generate a Panic alarm when a
designated key (e.g. the HELP key) is pressed three times is succession. The
Panic alarm shall identify the individual User Terminal and programming
options shall allow the alarm to be logged and reported as required.
49.7
Too Many PIN Tries (Keypad lockout)
All User Terminals shall provide the ability to generate a "Too many tries"
alarm and lock out the keypad for a specified period of time when a User fails
to enter a valid PIN code after a specified number of successive attempts.
49.7.1
Factory default settings shall provide a lockout time of 60 seconds after 5
attempts.
49.7.2
An enhanced programming option, when enabled, shall allow the number of
attempts to be programmable between 0 (no lockout) and 15.
49.7.3
Enhanced programming options, when enabled, shall also allow the following
timing parameters to be specified for each User Terminal from 1 to 255
seconds or from 1 to 255 minutes.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 92
(a)
The period in which the specified number of sequential incorrect
attempts must be reached.
(b)
The keypad lockout time.
49.7.4
The alarm shall identify the individual User Terminal and programming options
shall allow the alarm to be logged and reported as required.
49.8
System Access
Programming options shall be able to define the Menu options and functions
allowed, Areas displayed and controlled, and Message types displayed at each
individual User Terminal.
49.9
System Maintenance
All System programming and database maintenance shall be possible via
specified User Terminals without requiring connection to a host PC.
49.10
Fault Diagnostics
User Terminals shall provide fault messages in plain text on the LCD display to
assist with commissioning & troubleshooting.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 93
50.
Weatherproof User Terminals
This section pertains to Weatherproof Terminals. For Standard Terminals and
Touchscreen Terminals, see the appropriate section.
50.1
Invalid PIN
All Weatherproof Terminals shall provide the ability to generate an alarm when
a User fails to enter a valid PIN code.
50.1.1
The alarm shall identify the individual User Terminal and programming options
shall allow the alarm to be logged and reported as required.
50.1.2
Three unsuccessful PIN code attempts in succession shall cause the keypad to
be locked out for sixty seconds. An indicator lamp shall flash continuously
during this time.
50.2
Display
Programming options for each Weatherproof Terminal shall provide the ability
to display any or all of the following information via indicator lamps:
50.3
50.4
(a)
Area status while logged on
(b)
System status
(c)
Alarm condition
Ease Of Use
All Weatherproof Terminals shall be easy to operate, requiring simple logon
procedure followed by a unique single button operation for the following
functions:
(a)
Toggle area on/off
(b)
Unlock door
(c)
Logoff
Keypad Timeout
Users shall automatically be logged out from the Weatherproof Terminal:
(a)
After five seconds of no keypad activity
(b)
Following a door unlock operation
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 94
51.
Touchscreen User Terminals
This section pertains to Touchscreen Terminals. For standard Terminals and
Weatherproof Terminals, see the appropriate section.
51.1
51.2
Display
Programming options for each Touchscreen Terminal shall provide the ability
to display any or all of the following information in plain text form:
(a)
Area status.
(b)
System status.
(c)
Alarm messages.
(d)
Alarm Review data.
(e)
Custom messages and/or Maintenance messages. Permanent or
displayed for specific time periods.
Ease of Use
All Touchscreen Terminal operations shall be Menu driven with user-friendly
pictorial icons and/or text for each function or action to be performed.
(a)
Keypad Timeout
Users shall automatically be logged out from the Touchscreen Terminal
after no more than 60 seconds if logged in and no further touches are
made.
51.3
User Duress
All User Terminals shall provide the ability to generate a Duress alarm when
any PIN Code is entered that is defined in system programming as a Duress
PIN Code. The Duress alarm shall identify the individual User and the User
Terminal and programming options shall allow the alarm to be logged and
reported as required.
51.4
System Access
Configuration options shall be able to define the layout and hierarchy of some
of the user screens in each Touchscreen Terminal, and whether a PIN is
required to access building automation functions.
51.5
Fault Diagnostics
Touchscreen Terminals shall provide fault messages in plain text on the
display to assist with commissioning & troubleshooting
51.6
Too Many PIN Tries
All Touchscreen Terminals shall provide the ability to generate a “too many
tries” alarm and lock out the Touchscreen for 60 seconds when a user fails to
enter a valid PIN code after 5 successive attempts.
51.7
Scramble Keypad
The system shall have an option for scramble keypads to prevent PIN
discovery by reducing the likelihood of identifying frequently used PIN’s
through observation and the presence of finger print residue.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 95
52.
Real-time Clock and Calendar Functions
52.1
The system shall provide a real-time clock and calendar facility for the control
of Time Programs and Time & Date stamping of Events in the Event Review
log.
52.2
Daylight Saving Adjustment (Summer Time)
The system shall provide programming options to cause the system to
automatically add one hour to the Real-time clock at the beginning of the
Daylight saving period, and automatically subtract one hour from the Realtime Clock at the end of the Daylight saving period. This option shall be
programmable up to 1 year in advance and shall allow programming of the
date and time that each action is to be executed.
52.3
Time Programs (Time Zones)
The system shall provide Time Programs that allow valid time periods and/or
restrictions to be specified for specific User operations, system functions and
automatic control of specific system entities.
52.3.1
A minimum of 8 Time Programs shall be provided, expandable to 96.
52.3.2
Each Time Program shall allow up to four separate time periods (sub-zones) to
be specified allowing different valid time periods to be provided for different
types of days. (e.g. Weekdays, Weekends and Holidays)
52.3.3
Each time period shall allow the Start Time and End Time to be specified in
Hours and Minutes in 24-hour format and shall allow the valid days of the
week to be specified and whether the time period is to be valid on dates
specified as Holidays.
52.3.4
Programming options shall be provided to allow any Time Program to be
qualified (validated and/or invalidated) by the current state of any entity
within the system (E.g. Area status, Input status, etc.) via a nominated
Auxiliary Output.
52.3.5
Time Programs shall be able to be utilised to disable and/or alter the following
system parameters according to the Time of Day and/or Day of the Week:
52.3.6
(a)
The level of access to the system for specific types of Users.
(b)
The Door access criteria for specific types of Doors.
(c)
Input processing requirements for specific types of Inputs.
Time Programs shall be able to be utilised to control the following system
entities according to the Time of Day and/or Day of the week:
(a)
Turn an Area or a List of Areas On and/or Off.
(b)
Turn an Auxiliary Output On and/or Off.
(c)
Turn an Auxiliary Output On for 1 to 255 seconds, or 1 to 255 minutes.
(d)
Unlock and/or Lock a Door or a List of Doors.
(e)
Free and/or Secure a Floor or a List of Floors.
(f)
Trigger a test report to a Central Monitoring Station.
52.4
Holidays
The system shall provide for a minimum of 8 Holidays to be defined,
expandable to 32. Holidays shall be programmable up to 1 year in advance
and shall allow either one specific date to be programmed, or a date range
defined with a Start Date and End Date.
52.5
Custom Messages & Maintenance Messages
The system shall provide an option to display text messages of up to 32
characters on specified User Terminals either permanently, on a specific date
or for other specific time periods.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 96
52.5.1
The messages may be used to display a Helpdesk phone number, to indicate
that routine maintenance is due or other messages periodically required.
52.5.2
A minimum of 5 custom messages shall be provided, expandable to 32.
52.5.3
The messages shall be prioritised with Message 1 being the lowest priority and
the highest numbered message being the highest priority. Alarm messages
and system messages shall always take priority over any custom message.
52.5.4
A programming option shall be available for each message to activate a
specified Auxiliary Output while the message is valid.
52.5.5
A programming option shall be available to allow the use of an Auxiliary
Output to qualify the validity of a message. A message will become valid when
the Auxiliary Output is ON and is invalid when the Auxiliary Output is OFF.
52.5.6
A diagnostic programming option shall be available to check the Control
Module memory when the diary event becomes valid.
52.6
Clock Adjustment
The system shall provide an option to adjust the clock synchronization for
countries where the AC mains frequency is 60 Hertz.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 97
53.
Database
53.1
Expansion and Configuration
The database shall provide for expansion via different Memory size options.
Within each Memory size available, the installer shall be able to choose from
several standard configuration options to best utilise the available memory for
the particular application.
53.2
Database Structure
The database shall provide the ability to define multiple items and operations
in the form of programming Lists, Types and Groups to simplify programming
when multiple items are assigned or controlled and when common sets of
permissions and operations are assigned to multiple entities, e.g. Users,
Doors, Zone Inputs and Areas.
53.3
Dimensions
The database shall allow for a minimum of nnn [Entity], expandable to nnn.
Entity
Minimum of
Expandable to
User PIN codes
User names
Card Users
50
50
50
User Types
User RF Fobs
Areas
Doors
Lift Cars
8
10
8
4
3
Time Programs
Event Review Log
User Terminals
General purpose Zone
Inputs
Total LAN Modules
8
300
8
64
4096
4000
24,576 (up to 53,249 with special
custom memory configuration)
250
100
250
240
16 (up to 32 with special custom
memory configuration)
96
6500
99
2064
16
250
53.4
Text Names
The system database shall provide programmable text descriptions for all
Inputs, Areas, Users, User Types, TimeZones, Holidays, Groups, Doors, Area
Lists, Door Lists, Telephone Numbers and User controlled Auxiliaries.
53.4.1
Each individual Text entry shall be fully programmable with a minimum of 16
characters. A minimum of 24 characters shall be provided for Input names.
Systems using a library of pre-programmed words will not be acceptable.
53.5
Programming Defaults
The database shall provide a selection of basic default settings to simplify
programming.
53.6
Programming via User Terminals
All System programming and database maintenance shall be possible via
specified User Terminals without requiring connection to a host PC. Users shall
access programming menus and options via either entering a valid PIN code or
presenting a valid Card to a proximity reader connected to a Single Door or 2Door Access Module equipped with V5.0 Firmware or later.
53.6.1
Programming and editing the database from the LCD Terminal shall be via a
spreadsheet style menu allowing the User to select the next or previous item
to program and/or the next or previous option to program with a single
keystroke. A facility shall also be provided to jump to other relevant
programming options when required.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 98
53.6.2
The system shall provide a means of quickly locating items when
programming or editing the database via the User Terminal. Items shall be
able to be located by number or by text name via the ability to enter the first
letter of the name on the keypad in conjunction with “Up” and “Down” search
keys.
53.7
Installer Programming via PC
Software shall be available to allow the Installer full database programming
and editing either On-line or Off-line. However, programming changes shall
not be allowed on communications tasks that are currently active.
53.7.1
The software shall provide an Upload / Download facility to allow the full
system database to be transferred freely between the Control Module and the
PC via PSTN dialler line, direct RS232 connection or TCP/IP Ethernet network.
53.7.2
The Software application shall be password protected and in addition a
separate login code must be provided for connection to the Control Module.
53.7.3
The PC software shall also provide control of system entities and monitoring of
the Event Review log.
53.7.4
Programmable operator password levels shall be provided to ensure security
and allow operators to be restricted to the functions and databases that are
relevant to their role.
53.7.5
An option to enable a "Callback" facility shall be provided such that remote
login will require the remote operator to call the system, disconnect, then wait
for the system to call back on a pre-defined telephone number for added
security.
53.7.6
A more comprehensive System Management Software application shall be
available for continued management of the system by the customer.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 99
54.
User Database
54.1
PIN Code and/or Card Users
The system shall allow the following parameters to be specified individually for
up to 4096 separate Users:
(a)
User name of up to 16 characters.
(b)
User Type that defines permissions for: Operations allowed, Area/s to
turn On, Area/s to turn Off, Doors/Lift, Cars/Floors to access, Outputs to
control and any Time restrictions.
(c)
PIN code of up to 8 digits.
(d)
Access Card details.
(e)
Expiry Date and/or Time option.
(f)
User tenancy option for defining ability to program other Users.
54.1.2
An option shall be available to force user PIN codes to be six digits in length.
54.1.3
An option shall be available to define permission of control for a particular
Area for a User. This shall be User-specific rather than User Type-specific. A
system option shall be provided to allow the installer to disable the ability to
assign or edit this field if required.
54.1.4
Special options shall be available to define permission of access to a particular
door or a list of doors for each User. This shall be User-specific rather than
User Type-specific. A system option shall be provided to allow the installer to
disable the ability to assign or edit this field if required.
54.2
Card only Users
The system shall provide for an additional 24,576 User ID numbers that allow
the following parameters to be specified:
54.3
(a)
User Type that defines permissions for: Operations allowed, Area/s to
turn On, Area/s to turn Off, Doors/Lift Cars/Floors to access, Outputs to
control and any Time restrictions.
(b)
Access Card details.
(c)
Special options shall be available to define permission of access to a
particular door or a list of doors for up to 20,904 Users. This shall be
User-specific rather than User Type-specific. A system option shall be
provided to allow the installer to disable the ability to assign or edit this
field if required.
User RF Fob
The system shall provide up to 100 RF Fobs for 100 Users. Each RF Fob shall
be registered to a single User with each button on the RF Fob being fully
programmable to perform either one of the following functions:
(a)
Turn a nominated Area On
(b)
Turn a nominated Area Off
(c)
Turn a nominated Area List On
(d)
Turn a nominated Area List Off
(e)
Turn a nominated Auxiliary Output On
(f)
Turn a nominated Auxiliary Output Off
(g)
Toggle Auxiliaries On and Off
(h)
Generate an Alarm on a nominated Zone Input
(i)
Qualify a Zone Alarm Input
(j)
Qualify an Auxiliary Output
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 100
54.4
54.5
User Types
The following parameters shall be able to be specified separately for up to 250
different types of Users:
(a)
User Type name of up to 16 characters.
(b)
Time restrictions.
(c)
Areas allowed to turn On.
(d)
Areas allowed to turn Off.
(e)
User operations allowed. (Remote Access, Isolate Inputs when arming,
Timed Area control, Cancel Hold-up alarms, Cancel Sirens, Acknowledge
all alarms, Turn off Tamper monitoring and Reset latched alarms.)
(f)
Menu options allowed.
(g)
Doors, Lift Cars and Floors allowed to access.
(h)
Longer Door/Lift access time. (For disabled Users)
(i)
Dual User and Anti-Passback permissions and over-ride options.
(j)
User Ranking for permission to program other Users.
(k)
Auxiliary Outputs allowed to control.
Visitor Registration
The system shall allow programming of temporary Users such that a PIN Code
and/or Card issued to a User can be programmed to:
(a)
Be cancelled after a single use. [e.g. Card/PIN code issued at gate
house for one-off access to front door]
(b)
Expire at a specific Date and/or Time of Day. [e.g. Card/PIN code
issued to tradesperson]
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 101
55.
Event Review Logging
55.1
Event Review Log Capacity
The system shall maintain a Review log of all system activity of a minimum of
300 Events with options to expand the Review log up to 6500 events.
55.2
Access to Event Review Log
The full Event review log shall be accessible to authorised Users when logged
on to a User Terminal via a Menu option.
55.2.1
The full Event review log shall be accessible to authorised Operators via
optional Management software installed on the Host PC.
55.3
Quick Access to Alarm Review Log
The system shall provide an option for Quick Alarm Review at User Terminals.
If enabled the option shall be accessed with no more than two key presses
and shall not require the User to logon to the Terminal with a PIN code.
55.4
Detail
The system shall have a Review log option to temporarily provide the installer
with a detailed review of all processes and decisions made and all activity that
occurs in the system as an aid in de-bugging system programming and
commissioning the system.
55.5
Event Review Attributes
All Events shall be time and date stamped with Month, Date and Time,
accurate to 1/10ths of a second resolution and shall be categorised for basic
search facilities and filtering via the User Terminal. The following filter
categories shall be provided:
(a)
Alarms/Tampers/Restores
(b)
Reports
(c)
Auxiliary On/Off
(d)
Siren On/Off
(e)
User Logon/Logoff Operations.
(f)
Area On/Off
(g)
Isolates / De-Isolates
(h)
Modules (LAN)
(i)
General System messages
(j)
Time messages
(k)
Detail
(l)
Communications
(m)
Lifts
(n)
Cards
(o)
Errors
55.6
Display options shall be available allowing the display of Events in Full Text or
Abbreviated Text or Full Text + Abbreviated Text (for “Xmit and Input changes
of state” Events) or Raw Review Data on a User Terminal.
55.7
Printer (directly connected to Control Module)
The system shall have an option to connect a printer via a serial RS232
connection. The printer shall print Review log Events in real-time. Printer
options shall allow Review log Events to be filtered such that Events sent to
the printer can be limited to any number of the categories listed above in
“Review attributes”.
55.7.1
A special area filter shall be available to specify a list of Areas such that only
events related to the Areas on the list will be sent to the printer.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 102
55.8
Event Review Log Management
The system programming shall provide options for each Input and Auxiliary
Output that allow the installer to specify that particular non-critical events are
not to be saved to the Review log, thereby preserving memory space for more
important events as required.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 103
56.
Remote Monitoring (Off-site communications)
56.1.1
Central Station Reporting
The system shall provide options for reporting alarms and other information as
required to a remote and/or local Central Monitoring Station.
56.1.2
Initially, the system shall be programmed to report to [Monitoring Company]
utilising [Reporting format] as the primary format. Backup reporting shall be
programmed to report to [Monitoring Company] utilising [Reporting format] as
the Backup reporting format.
56.2
Primary Reporting Formats
The client’s future monitoring needs may change. As a minimum, the system
must support the following primary reporting formats:
56.3
56.4
(a)
Contact ID dialler via PSTN line.
(b)
IRfast dialler via PSTN line.
(c)
IRfast via serial link to Multipath IP STU
(d)
4+2 dialler.
(e)
Securitel. (Australia only)
(f)
Polled IP via GPRS
(g)
Polled IP via Ethernet
(h)
Polled IP via dial-up ISP
(i)
EarthNet Direct Line. (V1 to V4.5 firmware)
(j)
Contact ID via GSM Modem. (V4.06 firmware or later)
(k)
Text alarm messaging with optional programmable acknowledgement
time via GSM SMS (Short Message Service)
(l)
8 Pin STU (Subscriber Terminal Unit). Note that the STU must have
physical Inputs capable of receiving the Pin data from the Security
system via Auxiliary Outputs or Relay Outputs.
(m)
SIA dialler (V5 firmware or later)
(n)
System Management Software as Alarm Forwarding Service
Backup Reporting Formats
The system shall provide the option for backup reporting in the following
format options:
(a)
Contact ID dialler via PSTN line.
(b)
IRfast dialler via PSTN line.
(c)
IRfast via serial link to Multipath IP STU
(d)
4+2 dialler
(e)
Polled IP via GPRS
(f)
Polled IP via Ethernet
(g)
Polled IP via dial-up ISP
(h)
Contact ID via GSM Modem. (V4.06 firmware or later)
(i)
Text alarm messaging with optional programmable acknowledgement
time via GSM SMS (Short Message Service)
Multiple Central Monitoring Stations
The system shall be capable of reporting to more than one primary Central
Monitoring Stations.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 104
56.5
Dial-up Reporting
For each Central Monitoring Station that the system will report to via a PSTN
dialler line, programming Options shall provide for up to four Telephone
Numbers to be assigned that will be used in turn to attempt to establish the
connection.
56.6
Dialling Sequence
Should the dial attempt on the primary telephone number fail, the system
shall utilise the other telephone numbers programmed for the communications
task, in sequence, to attempt to connect, up to the specified maximum
number of attempts. A suitable pause shall be inserted between each
attempt, but shall be no more than 120 seconds.
56.6.1
The number of dial attempts shall be programmable from 1 to 255, but when
programmed, must comply with Telecommunications authority regulations. A
default setting of 4 attempts shall be pre-programmed.
56.7
Remote Access
The system shall be capable of answering an incoming call from a remote PC
regardless of the reporting format used. Support for use of an external
modem is acceptable if the selected reporting format necessitates. (e.g.
Direct line formats)
56.8
8 Pin Communication Output
The system shall provide an option to activate Auxiliary Outputs for 8 different
types of alarms with Alarm Verification logic for “Intruder” alarms. These
Outputs shall be able to trigger Inputs on a third-party communication device,
e.g. an 8 Pin STU. This option shall satisfy UK ACPO requirements.
56.9
PSTN Line Monitoring and Testing
The system shall provide automatic PSTN line testing and shall monitor the
status of the line during any dial attempts. In the event of communications
failure with the Central Monitoring Station, the system shall display a
Communications Fail message on specified User Terminals and generate an
entry in the Event log that describes the specific problem for any of the
following conditions:
(a)
No Line detected.
(b)
No telephone number programmed.
(c)
Noisy Line.
(d)
Maximum dial attempts reached.
(e)
No acknowledgement.
(f)
Maximum on-line time exceeded.
56.9.2
Carrier Lost. (Modem formats)
56.9.3
Area Status Reporting
The system shall provide the following Area reporting features:
(a)
Area Open/Close by User ID.
(b)
Options to specify which Areas are reported.
(c)
Option to report a unique Client Code for each Area (Partition).
(d)
Options to allow Area (Partition) Open and Close reports to be sent for
each individual Area or as “General Open/Close” reports. (i.e. First to
Open / Last to Close)
(e)
Option to send “Area Still Open” (Late to Close) reports if a specified
Area is still Open when other Area/s are closed.
(f)
Option to send “Area 24 Hour Off” (Area Tamper monitoring Off) reports
when Tamper monitoring is turned Off in any Area.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 105
56.10
Input Status Reporting
The system shall provide the following Input reporting features:
(a)
Alarm.
(b)
Tamper.
(c)
Isolate (Bypass).
(d)
Restore.
(e)
Option to report multiple alarms on a single point. (“Multi-break”
reporting)
(f)
Option to cause reporting of a new alarm point to take priority over
multiple reports (multi-breaks) on an existing alarmed point. (Often
referred to as “Look-ahead” reporting)
(g)
Options to allow customisation of Contact ID point mapping to best
utilise the limited number of Contact ID points available in the format.
56.11
Alarm Routing
The system shall have the capacity to report alarm events of different types or
from different origins via different communications formats to different
locations.
56.11.1
For example:
(a)
Security alarms from one section or tenant go to ABC Control Room Ltd.
via dialler.
(b)
Security alarms from another section or tenant go to XYZ Alarm
Monitoring Ltd. via dialler or GSM modem.
(c)
All building plant alarms go to an engineer via an SMS message.
56.11.2
The system shall allow the same alarm to be processed by up to ten
communication tasks, with each task able to report in a different format to a
different location.
56.12
System Management Software Alarm Forwarding Service (Option)
The system shall have the ability to report any and all alarm events to its
permanently connected System Management Computer Server which, in turn
will forward the alarm event to the appropriate co-located Central Station
Automation Server in the appropriate communication format. In this way, a
System Management Server connected to a large number of Control Modules
on an Ethernet network can act as a cost-effective concentrator for alarm
transmissions.
56.12.1
The system shall implement true end-to-end alarm transmission
acknowledgement between the Control Module and the Alarm Automation
Server in the Central Station.
56.12.2
The system shall initiate a back-up communication task in the event that an
alarm message:
(a)
has not been acknowledged by the Automation Server within a specific
period of time.
(b)
if the maximum number of retries is reached.
(c)
if the System Management Server is unavailable of off-line.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 106
57.
Alarm Monitoring System
(Intruder Alarm system / Intruder Detection system)
57.1
Partitioning
Provision shall be made for partitioning the system into separate Areas for
individual programming, control, monitoring and reporting. A minimum of 8
Areas shall be available with options for up to 250 Areas. Each Area must
provide for a programmable 16-character name to be defined.
57.2
Area Control
Programming options shall allow for individual or multiple Area Off and On
(Open / Close) operations to be performed by Users, Inputs (e.g. Keyswitches), RF Fobs, Time Programs or Logic Programs and for Areas to be
controlled either singly, or as a group.
57.3
Entry Delay
The system shall provide an Entry Delay feature to allow authorised Users
sufficient time to enter the premises and make their way to the User Terminal
[or other device used to turn the Area Off such as Keyswitch, Card Reader,
etc.] before turning the relevant Area/s Off.
57.3.1
Programming options shall allow for an Entry Delay time to be programmed
for each Area from 1 to 255 seconds such that when an Area is On (Armed or
Closed) Zone Inputs defined as Entry Zones will not generate an alarm when
activated until after the Entry Delay has expired.
57.3.2
If the Area is turned Off before the Entry Delay timer expires, any alarms on
Entry Zones shall be ignored.
57.3.3
If the Area is still On after the Entry Delay timer expires, any alarms that
occurred during the Entry Delay time shall then be processed normally.
57.3.4
Programming options shall allow two types of Entry Zones to be defined such
that an Entry path can be defined:
(a)
Primary Entry Zones - when activated will start the Entry Delay timer
running if not already running, e.g. Reed switch on Entry Door/s or
PIR/s just inside the Entry Door/s.
(b)
Entry Zones - when activated will generate an alarm instantly if the
Entry Delay timer is not already running, e.g. Internal PIR/s that will
not be the first Zone Input/s activated on Entry.
57.4
Exit Delay
The system shall provide an Exit Delay feature to allow Users sufficient time to
exit the premises without generating an alarm after turning the relevant
Area/s On.
57.4.1
Programming options shall allow for an Exit Delay time to be programmed for
each Area from 1 to 255 seconds such that when the Area is turned On, Zone
Inputs defined as Exit Zones will not generate an alarm if activated during the
Exit Delay time.
57.4.2
When the Exit Delay timer has expired, any new alarms on Exit Zones shall
then be processed normally.
57.5
Auto Isolation
Programming options shall allow specified Zone Inputs to be automatically
isolated (bypassed) if un-sealed when the Area is turned On (Closed or
Armed).
57.6
Associated Areas
A programming option shall allow an individual area to be associated with
another area or an area list such that, when the primary area is turned on or
off, the corresponding associated area or area list will turn on or off as well.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 107
57.7
Timed Area Control
An option shall be provided to define any Area to be “Timed Off” when turned
off (opened) by a User via a User Terminal or a Time Program or an Access
Control Card. The time period shall be programmable from 1 to 255 minutes
in 1-minute intervals and shall be defined separately for each Area to be
timed.
57.7.1
The system shall allow Area Timing operations to be enabled or disabled for
different types of Users such that an Area can be “Timed off” by some types of
Users and controlled normally by other types of Users.
57.7.2
When a timed Area is turned off by a User with Area timing operations enabled
or Time Program with Area timing operations enabled, the timer shall start.
On expiry of the timer the Area shall automatically return to the on state.
57.7.3
If an Area is currently timed off; a User with Area timing operations enabled
may perform an Area off operation at any time to re-start the timer.
57.7.4
If an Area is currently timed off; a User with Area timing operations disabled
may perform an Area off operation at any time to cancel the timer and
maintain the Area in the off state.
57.7.5
The system shall provide a warning via beepers in User Terminals for a period
of 255 seconds prior to the expiry of an Area timer to allow Users to exit the
premises or perform an Area off operation to re-start or cancel the timer.
57.8
Single Badge Arming/Disarming
The system shall have provision for single badge arming and disarming of
areas. An authorised user need only present their card to a reader once, and
the area associated with that reader will toggle state to be either armed or
disarmed, as appropriate.
57.9
Siren Operation
The system shall provide the following Siren control options:
(a)
Two Siren Speaker Outputs for “External” and “Internal” Sirens shall be
provided on the Control Module and all Zone Expansion Modules
supporting 16 or more Inputs.
(b)
"Instant", "Delayed" and "Backup" Siren Modes shall be defined
separately for the External and Internal Siren Outputs in each individual
Area.
(c)
A minimum of 4 different Siren Tones shall be available that can be
defined separately for different types of Alarms. (e.g. "Bell", "Sweep",
"Fire" & "Evacuation")
(d)
Siren tones shall also be defined separately for Input Alarm and Input
Tamper conditions.
(e)
Two programming options shall be available for setting Siren Time: up
to 200 minutes in 1-minute increments or up to 55 seconds in 1-second
increments.
(f)
Open circuit on any dedicated Siren Speaker Output shall activate a
system alarm.
(g)
The "Backup" Siren Mode shall cause the Siren Speaker to sound only
when the backup communication task is triggered, i.e. there is a
primary communication failure.
(h)
An optional Holdoff Timer shall be provided for Siren Speaker Outputs,
to delay the sounding after an alarm is triggered. This timer shall be
programmable from 0 to 127 minutes in 1-minute intervals. This timer
will expire immediately by entering a valid PIN code to turn OFF the
Area the alarm is attached to while the Timer is still running.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 108
57.10
Auxiliary Outputs
Programming options shall provide for Auxiliary Outputs to be defined for each
individual Area to activate under the following conditions:
(a)
Entry Timer running
(b)
Exit Timer running
(c)
Siren
(d)
Area Close (Area On or Armed)
(e)
Tamper
(f)
Alarm
(g)
Isolate
(h)
User Count
(i)
Test mode active
57.11
Wireless Detection Devices
The system shall provide a LAN-based RF Expander Module to interface with
Visonic PowerCodeTM RF detection devices and CodeSecure™ RF Fobs. Each
RF Module shall support up to 32 RF detection devices with each system being
capable of registering up to 100 RF Fobs for 100 Users.
57.11.1
The system shall provide a LAN based RF Wireless Transceiver Module to
interface with Paradox Magellan™ RF detection devices and RF personal
transmitters (fobs). Each Module shall support up to 32 RF detection devices
with each system being capable of registering up to 100 RF fobs for 100 users.
57.11.2
The system shall have the ability to provide a 4-wire RS232 serial interface to
a Wireless Receiver (C&K SpreadNet® Receiver or Inovonics FA-400/MF
Receiver). The interface shall support up to 208 Wireless devices
[Please check with local distributors of C&K Systems products and Inovonics
products for communications authority approvals]
57.12
Input Processing
The system shall provide 16 already programmed default Input Processing
Types with options to support up to 64 different types.
57.12.1
Inputs may be assigned to more than one Area up to a maximum of 8 Areas.
57.12.2
Input processing shall be separately defined for each Area that an Input is
assigned to, e.g. a single entry hall PIR may be processed as a Burglary alarm
via one Area and control lighting via another Area.
57.12.3
Input Alarm (Unseal) and Seal states shall only be processed whenever an
Area that it is assigned to is On (Closed or Armed). Alarm monitoring will be
disabled in an Area whenever the Area is Off.
57.12.4
An input processing option shall allow the Input Alarm (unseal) and Seal
states to be processed regardless of the area state (i.e. “24 hour” processing)
for nominated input types.
57.12.5
All Alarm monitoring Inputs shall be supervised for the Tamper state 24 hours
a day. The Tamper state shall always be processed regardless of Area Status.
57.12.6
An Input processing option shall be available to “Latch” an alarm such that the
alarm message cannot be acknowledged by a User until the Input has
returned to the "Seal" condition e.g. plant alarms.
57.12.7
An Input processing option shall allow Pulse Counting to be specified for
individual Inputs, where the nature of the Input device or the installation
environment requires multiple “hits” to be recorded before registering an
Alarm (Unseal) condition. The count number and pulse count time window
shall be programmable on a per Area basis.
57.12.8
An Input processing option shall allow delay in reporting an Input alarm with a
programmable timer from 1 to 255 seconds in 1-second increments.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 109
57.12.9
An Input processing option shall allow an Input to cancel the running of an
Exit Delay Timer in an Area when the Input state changes from Seal to Alarm
(e.g. when a Push Button is pressed).
57.12.10
Input processing options shall allow the "Pin Type" for 8 Pin communication
format to be specified for individual Inputs with Verify Group logic when
applicable.
57.12.11
An Input processing option shall allow SMS alarm messages to be sent to one
or more telephone numbers with or without acknowledgement.
57.12.12
An Input processing option shall allow SIA alarm messages to be sent to one
or more Central Monitoring stations when an alarm condition takes place.
57.12.13
The following parameters shall be defined separately for each type of Input to
be processed:
57.13
(a)
Input States to be processed. These shall include Alarm (Unseal),
Tamper, Primary Entry Delay, Entry Delay (Hand-over), Exit Delay and
Pulse Count.
(b)
Input conditions to be reported. These shall include Alarm (Unseal),
Tamper, Isolated (Bypassed), Restored, Alarm during Entry Delay and
Alarm during Exit Delay.
(c)
Contact ID Event Code. (Standard default Event Codes shall apply if not
specified)
(d)
Area Auxiliary Outputs to activate.
(e)
Alarm Siren Tone and Tamper Siren Tone.
(f)
Siren Isolate (lockout) and Siren Re-trigger options.
Defaults
A set of default Input processing options shall be available to simplify system
programming and shall provide for processing of the following basic Input
types:
Alarm Input Type
Example
Burglary Zone.
Internal PIR.
Door Reed on Fire Door or Internal Door.
Door Reed on Entry Door.
PIR inside Entry Door.
Burglary Primary Entry/Exit Zone.
Burglary Entry/Exit Zone. (Hand-over
Zone)
Local Silent.
Fire Zone.
Duress
Automation
System Tamper.
System Silent.
System LAN problems.
System Local.
Access Local.
Access Alarm.
Access Silent.
57.14
Smoke detector / Heat detector.
Keypad Duress alarm. (When a "Duress"
PIN Code is entered)
Duress or Silent Panic button.
Function Zone Inputs
Switches for control of lighting systems.
Cabinet Tamper / Siren Tamper.
AC Fail / Low Battery / Plant alarms to
report /
Film Low/Film Out.
Module Off-line.
Line fault / Comms fail / Local Plant
alarms.
Too many PIN code attempts / Illegal
Card.
Door Forced.
Door Open Too Long. (Door Held)
Alarm Messages
Programming options shall allow the installer to define which types of alarm
messages are displayed on each User Terminal.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 110
58.
Input Testing
58.1
Area Pre-Arm Testing
Whenever a User attempts to turn an Area On at a User Terminal or using 3
Badges-Arming or Arm Button-Arming at a Single Door or 2-Door Access
Module, the system shall perform a test on all Inputs in that Area to ensure
that they are in the Sealed state in order to minimise false alarms when the
Area is turned on.
58.1.1
Programming options shall be provided to allow specific Zone Inputs to be
excluded from the test for Sealed state if they are expected to be Unsealed
when the Area is turned On, e.g. a PIR that detects movement near the User
Terminal, a Reed Switch on an Open Entry Door, etc.
58.1.2
This programming option shall only be utilised on Inputs defined as Exit Zones
in any Area that has an Exit Delay time defined and that are expected to be in
the Sealed state before the Exit timer expires.
58.2
Automatic Input Testing
Programming options shall be provided for each individual Zone Input, to allow
automatic testing of appropriate detection devices.
58.2.1
Automatic Input testing shall be performed on specified Zone Inputs when the
Area is turned On and shall ensure that each detection device is operational by
checking that the Input has gone into the Alarm state at least once since the
last time that the Area was turned On. No additional User operation shall be
required.
58.2.2
This programming option shall only be utilised on Inputs that are activated
regularly in the period during which the Area is Off (Disarmed or Open), e.g.
PIRs and Door Reeds that are activated during the normal course of a day.
This option would not be utilised on devices such as Smoke Detectors, Seismic
Detectors, Roof Space PIRs, Panic/Duress buttons, etc.
58.2.3
Programming options shall provide for a Test Fail condition to be logged and
activate auxiliary Outputs, alarms, central station reports, etc. as required.
58.3
Polling of RF Zone Inputs
As to maintain system integrity, every Visonic and Paradox RF Zone Inputs
registered on the system shall be monitored via a programmable polling time.
If any Zone Input fails to report within the polling time to the RF Expander
Module it is registered to, a System Input shall be generated by the RF
Expander Module to report the situation.
58.4
Area Walk Testing
Programming options shall be provided for each individual Area database to
provide Walk testing of specified Zone Inputs in the Area.
58.4.1
Programming Options shall provide for Walk testing to be commenced by
either or both of the following methods:
(a)
Manually by an authorised User via a User Terminal Menu option.
(b)
Automatically when an Area is being turned On (Area Pre-Arm Walk
Test).
58.4.2
Walk testing shall force the User to test that each specified Zone Input is
operational by activating the device connected to the Zone Input during the
maximum test time allowed, e.g. Walking past a PIR, Opening and Closing a
Door, Pressing and Releasing a Panic Button, etc.
58.4.3
Area programming options shall allow for Zone Inputs already tested via the
Automatic Input Testing to be excluded from the Walk Test.
58.4.4
The maximum test time shall be programmable for each Area from 1 to 20
minutes in 5 second increments.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 111
58.4.5
Programming options shall provide for an Area Pre-Arm Walk Test Started
and/or Area Pre-Arm Walk Test Fail condition to be logged and activate
Auxiliary Outputs, Alarms, Central Station Reports, etc. as required.
58.4.6
Area programming options shall allow an Auxiliary Output to be activated
during Walk Testing to:
(a)
Enable testing of devices that provide a test Input connection such as
Smoke, Glass-break and Seismic detectors.
(b)
Provide audible and/or visual indication of Walk Test mode active.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 112
59.
Duress Alarm Management
59.1
User PIN Code Operation
A User, when forced to perform operations on the system under Duress shall
have the ability to enter a Duress PIN code that will trigger a Duress alarm
while still providing the User with normal or limited system operation.
59.2
Duress PIN Code/s
The system shall provide for one common “Duress Code” to be programmed
for all Users that will trigger a Duress alarm while providing the User with a
pre-defined level of system operation.
59.2.1
The system shall individually identify the User Terminal where the Duress
Code is entered in the Review log and to the Central Monitoring Station and/or
Host PC Management Software.
OR
59.2.2
The system shall provide for a number of common “Duress Codes” that can be
issued to different types of Users. Each Duress Code shall trigger a Duress
alarm while providing the User with a pre-defined level of system operation
according to their level of system access, physical location or department, etc.
59.2.3
The system shall individually identify the Duress Code used and the User
Terminal where the Duress Code is entered in the Review log and to the
Central Monitoring Station and/or Host PC Management Software.
OR
59.2.4
The system shall provide for any User to increment the last digit of their
normal PIN code by a value of 1 to indicate a Duress condition while still
identifying the individual User, e.g. Normal PIN = 12345. Duress PIN =
12346.
59.2.5
The system shall individually identify the User and the User Terminal where
the Duress Code is entered in the Review log and to the Central Monitoring
Station and/or Host PC Management Software.
59.3
Duress Alarm Messages
The system shall restrict Duress Alarm messages to appear on specified User
Terminals only.
OR
59.3.1
The system shall not display Duress Alarm messages on any User Terminal.
59.4
Duress Alarm Processing
The full range of Input processing options shall be available for Duress Alarms
to provide for future additions and/or changes to Duress Alarm monitoring.
59.5
Discreet Processing
Programming options shall be provided to allow for Duress Alarms to be
logged and/or reported and activate any Outputs required with no local
indication of the alarm condition via User Terminal displays or other audible or
visible devices.
59.5.1
A default Input processing option named "Duress" shall be available that
meets these requirements.
59.6
Mimic Panel
A mimic panel shall be installed that shall display individual Duress Alarms for
each User Terminal in the system.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 113
60.
Panic Alarm Management
[NOTE: All Input processing features described in this application are
standard features that can also be utilised in the monitoring and processing of
any type of Zone Input in the system as required]
60.1
Panic Buttons
Momentary Push-button switches shall be installed in specified locations and
individually wired to Inputs on appropriate system Modules for signalling a
“Panic” condition.
60.2
Input De-bounce Time
Programming options for momentary Panic Button Inputs shall allow the Input
de-bounce time to be programmed separately for each Input from 5
milliseconds to 1250 milliseconds (1.25 seconds).
60.2.1
(To provide the optimum de-bounce value for the required button sense time
while still maintaining immunity to noise.)
60.3
Panic Button Operation
When activated, Panic Buttons shall trigger a Panic Alarm that individually
identifies the Input activated in the Review log and to the Central Monitoring
Station and/or Host PC Management Software.
60.4
Delayed Panic Alarm Reporting (False Alarm Management)
An option shall be available for each Area in which Panic Inputs are monitored
to delay the reporting of the Alarm condition for a programmable period of up
to 255 seconds in 1-second increments. Activation of local alarm annunciation
and actions shall not be affected by the delay.
60.4.1
User Terminals shall display a discreet prompt (e.g. “Enter Code”) allowing
authorised Users to enter their PIN code and cancel the Panic alarm during the
delay period.
60.4.2
The registering of a specified number of Panic Input activations shall cancel
the reporting delay and immediately report the Panic alarm/s. The number of
activations required shall be programmable from 2 to 15.
60.5
User Terminal Panic Operation
Pressing the <HELP> key on any User Terminal three times in succession shall
trigger a Panic Alarm that individually identifies the User Terminal in the
Review log and to the Central Monitoring Station and/or Host PC Management
Software.
60.6
Panic Alarm Messages
The system shall display Panic Alarm messages on all User Terminals.
OR
60.6.1
The system shall restrict Panic Alarm messages to appear on specified User
Terminals only.
OR
60.6.2
The system shall not display Panic Alarm messages on any User Terminal.
60.7
Panic Alarm Processing
The full range of Input processing options shall be available for Panic Alarms
to provide for future additions and/or changes to Panic Alarm monitoring.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 114
60.8
Discreet Processing
Programming options shall be provided to allow for Panic Alarms to be logged
and/or reported and activate any Outputs required with no local indication of
the alarm condition via User Terminal displays or other audible or visible
devices.
60.9
Mimic Panel
A mimic panel shall be installed that shall display individual Panic Alarms for
each Panic Button and User Terminal in the system.
60.10
Hold-up Alarm and/or Suspicion Alarm Management
[NOTE: All Input processing features described in this application are
standard features that can also be utilised in the monitoring and processing of
any type of Zone Input in the system as required]
60.11
Hold-up and/or Suspicion Buttons
Momentary Push-button switches shall be installed in specified locations and
individually wired to Inputs on appropriate system Modules for signalling a
“Hold-up” or "Suspicion" condition.
60.12
Input De-bounce Time
Programming options for momentary Hold-up button Inputs shall allow the
Input de-bounce time to be programmed separately for each Input from 5
milliseconds to 1250 milliseconds (1.25 seconds).
60.12.1
(To provide the optimum de-bounce value for the required button sense time
while still maintaining immunity to noise.)
60.13
Button Operation
When activated, buttons shall trigger an Alarm that individually identifies the
Input activated in the Review log and to the Central Monitoring Station and/or
Host PC Management Software.
60.14
Delayed Hold-up Alarm Reporting (False Alarm Management)
An option shall be available for each Area in which Hold-up Inputs are
monitored to delay the reporting of the alarm condition for a programmable
period of up to 255 seconds in 1-second increments. Activation of local alarm
annunciation and actions shall not be affected by the delay.
60.14.1
User Terminals shall display a discreet prompt (e.g. “Enter Code”) allowing
authorised Users to enter their PIN code and cancel the Hold-up Alarm during
the delay period.
60.14.2
The registering of a specified number of Hold-up Input activations shall cancel
the reporting delay and immediately report a Hold-up Alarm. The number of
activations required shall be programmable from 2 to 15.
60.15
Bandit Screen Activation
Hardware and programming options shall be provided to allow activation of
Hold-up Buttons to operate an Auxiliary Output on the same system Module
within 20milliSeconds of the button activation for the purpose of triggering
bandit screens.
60.16
Alarm Messages
The system shall display Hold-up and/or Suspicion Alarm messages on all User
Terminals.
OR
60.16.1
The system shall be capable of restricting Hold-up and/or Suspicion Alarm
messages to appear on specified User Terminals only.
OR
60.16.2
The system shall not display Hold-up and/or Suspicion Alarm messages on any
User Terminal.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 115
60.17
Hold-up Alarm and/or Suspicion Alarm Processing
The full range of Alarm monitoring system Input processing options shall be
available to provide for future additions and/or changes to Hold-up and
Suspicion Alarm monitoring.
60.18
Discreet Processing
Programming options shall be provided to allow for Hold-up Alarms and/or
Suspicion Alarms to be logged and/or reported and activate any Outputs
required with no local indication of the alarm condition via User Terminal
displays or other audible or visible devices.
60.19
Mimic Panel
A mimic panel shall be installed that shall display individual Hold-up Alarms
and/or Suspicion Alarms for each Button in the system.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 116
61.
Door Access Control
61.1
Door Access Operations
The system shall be capable of providing User Door Access Control via any of
the following operations:
(a)
Presentation of a Card (or other form of User ID token) at the Door
Reader assigned to the Door.
(b)
Entry of a PIN code only at the User Terminal assigned to the Door.
(c)
Entry of a PIN code at a Wiegand keypad assigned to the Door.
(Vandal-proof and/or Scrambling keypad)
(d)
Presentation of a Card at the Reader PLUS entry of a PIN code at the
User Terminal assigned to the Door within a specified time period.
(e)
Presentation of a Card PLUS entry of a PIN code at a Proximity Reader
with built-in keypad assigned to the Door within a specified time period.
(HID5355 and Motorola ARK-501 only)
(f)
Presentation of a Card PLUS entry of a PIN code at a 26 Bit Wiegand
Keypad wired in parallel with a 26 Bit Wiegand Proximity Reader (the
PIN code must be 5 digits in length and not greater than 65,536;
available with Single Door or 2-Door Access Module with V5.0 Firmware
or later only).
(g)
Presentation of a Card at the Reader OR entry of a PIN code at the User
Terminal assigned to the Door.
(h)
Activation of a Button, other Input device such as a Movement detector
or PE beam designated as an Entry or Exit Input.
(i)
Activation of the <OK> key on a User Terminal assigned to the Door.
61.1.2
The mode of Access shall be programmed separately for the Entry operation
and Exit operation on each Door in the system. Options shall be provided to
allow the mode of Entry Access and/or Exit Access at any Door to be altered or
cancelled according to a Time Program, Area Status (On, Off or Alarm),
Keyswitch Input or other mechanism as required.
61.1.3
The full range of Door Access Control operations listed above that utilise a
Card shall be available on all Doors in the system regardless of the type of
Door Access Module installed.
61.1.4
Door Un-lock and Lock operations shall also be available to authorised Users
via a Door Control Menu when logged on to a User Terminal. The User
Terminal display shall provide text prompts for the User to specify the Door to
control and the operation required.
61.2
Door Timers
“Door Un-lock Time” and “Maximum Door Open Time” shall be programmed
separately for each Door in the system from 1 to 255 seconds in 1-second
increments.
61.2.1
Intelligent Door Controllers shall provide an option via a DIP switch setting to
process the ‘Door Un-lock time” in 100 millisecond increments.
61.2.2
This option shall be provided to cater for 3rd party access devices such as
turnstiles that require an un-lock command consisting of a short pulse.
61.2.3
Programming options shall provide extended Door Access times for disabled
Users.
61.3
Access Alarms
The system shall provide the ability to activate the following alarms on any
Door in the system:
(a)
Door Forced. When the Door is secure and is opened without a valid
un-lock command.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 117
(b)
Door Held (Door Open Too Long). If the Door is opened after a valid
un-lock command and remains open longer than the specified
"Maximum Door Open time".
61.3.2
The full range of Input processing options shall be available to log Access
alarms and activate any Messages, Sirens, Outputs, Central Station Reports,
etc. as required.
61.3.3
Programming options shall allow two stage Door Held (Door Open Too Long)
alarm processing to be enabled for each Door such that a local Module Alarm
can be activated for a period equivalent to the maximum Door Open Time to
allow the Door to be closed before a system Door Held alarm is generated.
61.3.4
Programming options shall allow for a separate Tongue Sense Input to be
monitored for each Door and utilised in “Door Forced” and “Door Held” alarm
processing.
61.4
Review Log
A Review Log entry shall be generated for every Door Access operation. Each
Review log entry shall be time and date stamped with Month, Date and Time,
accurate to 1/10ths of a second resolution and shall identify the User, the
Mode of Access and the Door controlled.
61.5
Alarm System Control
Programming options shall be provided to allow an Area to be associated with
the Inside and/or Outside of any Door to allow integration of Access Control
and Alarm System Control.
61.5.1
Programming options shall be provided to allow authorised Users to
automatically turn off the alarm system Area that they are entering when
gaining access through a Door.
61.5.2
Programming options shall be provided to allow authorised Users to
automatically turn off an Area associated with the particular User when
gaining access through a Door.
61.5.3
Programming options shall be provided to allow authorised Users to turn on
the alarm system Area that they are leaving via the Entry Reader or Exit
Reader associated with the Door.
61.5.4
To ensure that an Area on operation is the Users intended action; the
operation shall differ from a normal Door Access operation. Any of the
following options are acceptable:
(a)
Activation of an “Arming button” while the card is presented.
(b)
Three presentations of the same card within 5 seconds.
61.5.5
Programming options shall be provided to allow Alarm System Control
operations at any Door to be altered or cancelled according to a Time
Program, Area Status (On, Off or Alarm), Keyswitch Input or other mechanism
as required.
61.6
Dual User Access
An option for Dual User access shall be able to be specified separately for
Entry and Exit Readers on any Door where the function is required.
61.6.1
The system shall provide the ability to define specific types of Users as “Dual
User Providers”, i.e. a User defined as a “Dual User Provider” must provide the
first User Card and/or PIN code at Doors defined as Dual User Access.
NOTE: The system shall also have the ability to provide for any two Users to
gain access at Dual User Access Doors by simply defining all types of Users as
“Dual User Providers”.
61.6.2
Dual User Access shall be compatible with Card access, PIN code access or
Card & PIN access operations.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 118
61.7
Free Access - Enable and/or Disable
Programming options shall allow any individual Door or any group of Doors to
be set to Free Access mode and/or Re-locked via a Time Program, Input (e.g.
Key-switch), Area Status (on, off or alarm), User Terminal operation, Logic
Program or other mechanisms as required.
61.8
Door Interlocking
Programming options shall allow Doors to be interlocked together such that a
valid User will not be granted access at a Door unless all other Doors in the
interlock group are currently both locked and closed.
61.8.1
Interlocking shall be processed globally across the system allowing any Doors
to be included in Interlock logic.
61.8.2
Programming options shall allow Door Interlock logic to be qualified with Time
Programs, Area Status (On or Off), Input state or Auxiliary state as required.
i.e. A User will not be granted access at a Door unless all other Doors in the
interlock group are currently both locked and closed and the qualifying
factor/s are met, e.g. a specified TimeZone is valid, a particular Area is Off, a
Keyswitch Input is sealed, etc.
61.8.3
Door Interlocking shall be available on all Doors in the system regardless of
the type of Door Access Module installed and shall not require any additional
detectors or wiring apart from that associated with standard Door control and
monitoring.
61.9
Anti-Passback
The system shall provide options for Anti-Passback logic by maintaining a
record of the current location of each User. An Anti-Passback violation shall
be logged if the User attempts to:
(a)
Gain access through a Door to the Area that the system currently
records them in, i.e. the Card has been “passed back” to another User.
(b)
Access a Door from an Area other than the Area that they are currently
recorded in.
61.9.2
The Anti-Passback feature shall be available on all Doors in the system
regardless of the type of Door Access Module installed.
61.9.3
Three modes of Anti-Passback processing shall be provided defined as “Soft
Anti-Passback”, “Hard Anti-Passback” and “Timed Anti-Passback”. The AntiPassback mode (None, Soft, Hard or Timed) shall be defined separately for
Entry and Exit operations on each Door and programming options shall be
provided to cancel or alter Anti-Passback modes according to a Time Program.
(a)
Entry and/or Exit operations defined as “Soft Anti-Passback” operation
shall log Anti-Passback violations but shall still grant access through the
Door.
(b)
Entry and/or Exit operations defined as “Hard Anti-Passback” operation
shall deny access through the Door and log the Anti-Passback violation.
(c)
Entry and/or Exit operations defined as “Timed Anti-Passback” operation
shall deny access through the Door and log the Anti-Passback violation.
Amnesty will automatically be granted when the anti-passback timer
expires for that user.
61.9.4
Anti-Passback shall be processed globally across the system allowing any or all
Doors to be included in Anti-Passback logic.
61.9.5
An Anti-Passback “Amnesty” function shall be available to reset all Users to
“No Area” such that Anti-Passback processing will be re-started. Programming
options shall provide for the “Amnesty” function to be triggered by a User
operation, Time Program, Input (Keyswitch, etc.), Area status, or other
operation as required.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 119
61.10
User Counting
The system shall provide programming options to monitor the number of
Users present in any nominated Areas entered and exited via Accesscontrolled Doors.
61.10.1
The system shall allow the Installer to select whether Area User Count is
saved to review or not.
61.10.2
Programming options shall provide for automatic Area Off and On (Open and
Close) operations based on the number of Users recorded in a nominated
Area, i.e. Area automatically turns off when User count increments from 0 to
1. Area automatically turns on when User count decrements from 1 to 0.
61.10.3
Programming options shall provide for a User count “Trigger Level” to be
defined for any Area. When the trigger count is reached in an Area, a
nominated Auxiliary Output shall be switched on. The trigger auxiliary is
turned off again when the user count falls below the nominated trigger level.
61.10.4
An option shall be available to reset the User Count in a specified Area to 0.
Programming options shall provide for the Counter reset function to be
triggered manually by a User operation or Input (Keyswitch, etc.); or
automatically by a Time Program, Area status, or other operation as required.
61.10.5
The system shall allow installers to view and/or edit individual Area User
Count values when logged on to a User Terminal.
61.11
Location of Personnel
The system shall maintain a record of the current location (Area) of each User
in the system.
61.11.1
Authorised Users shall be able to view the current location of any User via a
Menu option when logged on to a User Terminal.
61.11.2
[Requires IN Readers and OUT Readers on every Door and methods
implemented to ensure every User always uses their card to access a door so
that multiple Users do not pass through any door on a single Users card
presentation]
61.12
Redundancy (Off-line Operation)
In the event of temporary loss of communications between the Control Module
and any Access Control Module, the following Door Access operations shall be
maintained with no degradation in performance or response times:-
61.12.1
Full access for up to 15 specified cards irrespective of Time or Alarm System
status on [List of Doors][firmware 3.55 or earlier].
AND/OR
61.12.2
Full access for up to 31 specified cards irrespective of Time or Alarm System
status on [List of Doors][firmware 3.56 or later].
AND/OR
61.12.3
Full access for up to 127 specified cards irrespective of Time or Alarm System
status on [List of Doors].[Special option. Only available on request]
AND/OR
61.12.4
Normal Door Access operations for all cardholders including permissions based
on Doors allowed, and where relevant, permissions based on Time Programs,
Mode of Access (i.e. Card and PIN and/or Dual User operation) and Extended
Access Times on [List of Doors].
61.12.5
During Off-line operation Door access operations may proceed without
reference to Alarm System status.
61.12.6
(Intelligent 4 Door Access Modules must be used)
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 120
61.13
User Qualifications
The system shall support enhanced door access control via a qualification
system. A qualification may be associated with one or more specific doors and
individual users, so only users that hold a valid qualification associated with
the specific doors may gain access. For example, a user may not enter any
of the warehouse doors without a valid forklift licence (qualification), but may
access other doors on the site.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 121
62.
Lift Access Control
62.1
Lift Access Operations
The system shall be capable of providing Lift Access Control via any of the
following operations followed by selection of the Floor button required within
the button selection time.
(a)
Presentation of a Card (or other form of User ID token) at the Reader
assigned to the Lift Car.
(b)
Presentation of a Card at the Reader PLUS entry of a PIN code at the
User Terminal assigned to the Lift Car within a specified time period.
(c)
Presentation of a Card PLUS entry of a PIN code at a Proximity Reader
with built-in keypad assigned to the Lift within a specified time period.
(HID5355 and Motorola ARK-501 only)
(d)
Presentation of a Card PLUS entry of a PIN code at a 26 Bit Wiegand
Keypad wired in parallel with a 26 Bit Wiegand Proximity Reader (the
PIN code must be 5 digits in length and not greater than 65,536;
available with Single Door or 2-Door Access Module with V5.0 Firmware
or later only).
62.1.2
The User shall be restricted to selection of a single Floor for each Card
presentation and details of the Floor selected shall be logged to the Event
Review log.
62.1.3
The mode of Access shall be programmed separately for each Lift in the
system. Options shall be provided to allow the mode of Access at any Lift to
be altered or cancelled according to a Time Program, Area Status (On, Off or
Alarm), Keyswitch Input or other mechanism as required.
62.1.4
The full range of Lift Access Control operations listed above shall be available
on all Lifts in the system regardless of the type of Reader Interface Module
installed.
62.1.5
Lift Floor “Free Access” and “Secure” operations shall also be available to
authorised Users via a Lift Control Menu when logged on to a User Terminal.
The User Terminal display shall provide text prompts for the User to specify
the Lift Car and Floor to control and the operation required.
62.2
Lift Access Timers
“Button selection time” shall be programmed separately for each Lift in the
system from 1 to 255 seconds in 1 second increments.
62.2.1
A programming option shall provide extended Button selection times for
disabled Users.
62.3
Review Log
Event Review Log entries shall be generated for every Lift Access operation.
Review log entries shall be time and date stamped with Month, Date and Time,
accurate to 1/10ths of a second resolution and shall identify the User, the
Mode of Access, the Lift controlled [and the Floor selected. (Available only if
Lift Control with Button Feedback is utilised via Lift Interface Boards or a Highlevel Lift Interface).]
62.4
Dual User Access
An option for Dual User access shall be able to be specified separately for any
Lift where the function is required.
62.4.1
The system shall provide the ability to define specific types of Users as “Dual
User Providers”, i.e. A User defined as a “Dual User Provider” must provide
the first User Card in Lifts defined as Dual User Access.
NOTE: The system shall also have the ability to provide for any two Users to
gain access at Dual User Access Lifts by simply defining all types of Users as
“Dual User Providers”.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 122
62.4.2
Dual User Access shall be compatible with Card access or Card & PIN access
operations.
62.5
Free Access - Enable and/or Disable
Programming options shall allow any individual Floor or any group of Floors in
a specified Lift Car or group of Lift Cars to be set to Free Access mode and/or
Re-secured via a Time Program, Input (e.g. Keyswitch), Area Status (On, Off
or Alarm), User Terminal operation, Logic Program or other mechanism as
required.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 123
63.
Plant Monitoring System
[NOTE: All Input processing features described in this application are
standard features that can also be utilised in the monitoring and processing of
any type of Zone Input in the system as required]
63.1
Partitioning
Provision shall be made for partitioning the system into separate Areas for
individual programming, monitoring and control. A minimum of 8 Areas shall
be available with options for up to 250 Areas per Control Module.
63.2
Area Control
Programming options shall allow for Area Off and On (Open / Close)
operations to be performed by Users, Inputs (e.g. Keyswitches), Time
Programs or Logic Programs and for Areas to be controlled either singly, or as
a group.
63.3
Siren Operation
The system shall provide the following Siren control options:
(a)
Two Siren Speaker Outputs for “External” and “Internal” Sirens shall be
provided on the Control Module and all Zone Expansion Modules
supporting 16 or more Inputs.
(b)
"Instant", "Delayed" and "Backup" Siren Modes shall be defined
separately for the External and Internal Siren Outputs in each individual
Area.
(c)
A minimum of 4 different Siren Tones shall be available that can be
defined separately for different types of Alarms. (e.g. "Bell", "Sweep",
"Fire" & "Evacuation")
(d)
Siren tones shall also be defined separately for Input Alarm and Input
Tamper conditions.
(e)
Open circuit on any dedicated Siren Speaker Output shall activate a
system alarm.
(f)
Two programming options shall be available for setting Siren Time: up
to 200 minutes in 1-minute increments or up to 55 seconds in 1-second
increments.
(g)
The "Backup" Siren Mode shall cause the Siren Speaker to sound only
when the backup communication task is triggered, i.e. there is a
primary communication failure.
(h)
An optional Holdoff Timer shall be provided for Siren Speaker Outputs,
to delay the sounding after an alarm is triggered. This timer shall be
programmable from 0 to 127 minutes in 1-minute intervals. This timer
will expire immediately by entering a valid PIN code to turn OFF the
Area the alarm is attached to while the Timer is still running.
63.4
Input Processing
The system shall provide for 16 already programmed default Input Processing
Types with options to support up to 64 different types.
63.4.1
Inputs may be assigned to more than one Area up to a maximum of 8 Areas.
63.4.2
Input processing shall be separately defined for each Area that an Input is
assigned to.
63.4.3
Input Alarm (Unseal) and Seal states shall be processed whenever an Area
that it is assigned to is On (Closed or Armed).
63.4.4
Input Tamper monitoring shall be maintained regardless of Area Status.
63.4.5
An Input processing option shall be available to “Latch” an alarm such that the
alarm message cannot be acknowledged by a User until the Input has
returned to the "Seal" condition.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 124
63.4.6
An Input processing option shall allow Pulse Counting to be specified for
individual Inputs where the nature of the Input device or the installation
environment require multiple “hits” to be recorded before registering an alarm
(Unseal) condition. The count number and pulse count time window shall be
programmable on a per Area basis.
63.4.7
An Input processing option shall allow delay in reporting an Input alarm with a
programmable timer from 1 to 255 seconds in 1-second increments.
63.4.8
An Input processing option shall allow an Input to cancel the running of an
Exit Delay Timer in an Area when the Input state changes from Seal to Alarm
(e.g. when a Push Button is pressed).
63.4.9
Input processing options shall allow the "Pin Type" for 8 Pin communication
format to be specified for individual Inputs with Verify Group logic when
applicable.
63.4.10
An Input processing option shall allow SMS alarm messages to be sent to one
or more telephone numbers with or without acknowledgement.
63.4.11
An Input processing option shall allow SIA alarm messages to be sent to one
or more Central Monitoring stations when an alarm condition takes place.
63.4.12
The following parameters shall be defined separately for each type of Input to
be processed:
(a)
Input States to be processed. These shall include Alarm (Unseal),
Tamper, Primary Entry Delay, Entry Delay (Hand-over), Exit Delay and
Pulse Count.
(b)
Input conditions to be reported. These shall include Alarm (un-seal),
Tamper, Isolated, Restore, Alarm during Entry Delay and Alarm during
Exit Delay.
(c)
Contact ID Event Code. (Standard default Event Codes shall apply if not
specified)
(d)
Area Auxiliary Outputs to activate.
(e)
Alarm Siren Tone and Tamper Siren Tone.
(f)
Siren Isolate (lockout) and Siren Re-trigger options.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 125
63.5
Defaults
A set of default Input processing options shall be available to simplify system
programming and shall provide for processing of the following basic Input
types:
Alarm Input Type
Example
Burglary Zone.
Internal PIR
Door Reed on Fire Door or Internal Door.
Door Reed on Entry Door.
PIR inside Entry Door.
Burglary Primary Entry/Exit Zone
Burglary Entry/Exit Zone. (Hand-over
Zone)
Local Silent.
(User Terminal message only)
Fire Zone.
Duress
Automation
System Tamper.
System Silent.
System LAN problems.
System Local.
Access Local.
Access Alarm.
Access Silent.
63.6
Smoke detector / Heat detector.
Keypad Duress alarm. (When a "Duress"
PIN Code is entered)
Duress or Silent Panic button.
Function Zone Inputs
Switches for control of lighting systems.
Cabinet Tamper / Siren Tamper.
AC Fail / Low Battery / Plant Alarms to
report.
Module Off-line.
Line fault / Comms fail / Local Plant
Alarms.
Too many PIN code attempts / Illegal
Card.
Door Forced.
Door Open Too Long.
Alarm Messages
Programming options shall allow the installer to define which types of alarm
messages are displayed on each LCD Terminal.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 126
64.
Event Counting
The system shall provide appropriate hardware and programming options to
allow up to 128 Event Counters to be managed by the system. Each Counter
shall provide 8-digit resolution and shall have a programmable text name of
up to 16 characters for easy identification.
64.1
Count Sensing
The Output from the device to be monitored shall be Normally Open dry
contacts and shall be connected directly to a Zone Input. An Open circuit to
Short circuit transition will cause the Counter to increment by a value of 1.
64.1.1
The system shall allow an up/down counting mode, in which case odd
numbered zones will cause the counter to increment and even numbered
zones will cause the counter to decrement.
64.1.2
Zone Inputs used for Event Counting shall not be limited to Inputs on the
Central Control Module.
64.2
Input De-bounce Time
Programming options for Event Counter Inputs shall allow the Input de-bounce
time to be programmed separately for each Input from 5 milliseconds to 1250
milliseconds (1.25 seconds).
64.2.1
(To provide the optimum de-bounce value for the required counter resolution
while still maintaining immunity to noise.)
64.3
Counter Integrity
The current count value shall be stored in non-volatile memory on the Module
that is utilised to monitor the device such that any disruption in LAN
communications will not compromise the accuracy of the Counter.
64.4
Trigger Counts
Programming options shall provide for one or two “Trigger Count values” to be
defined for each Event Counter.
64.4.1
When a trigger count is reached a pre-defined Input on the Module shall
change to the Alarm (Unseal) state. Separate Inputs shall be defined for each
of the two possible trigger count values.
64.4.2
The full range of Input processing options shall then be available to log the
event and activate any Messages, Outputs, Central Station Reports, etc. as
required.
64.5
Counter Reset
An option shall be available to reset any Event Counter to 0. Programming
options shall provide for the Counter Reset function to be triggered manually
by a User operation or Input (Keyswitch, Trigger Count, etc.); or automatically
by a Time Program, Area status, Auxiliary activation or other operation as
required. When a Counter is reset, the Inputs associated with the Counter
shall return to the Seal state.
64.6
View and Edit Counters
The system shall allow an option for authorised Users to view individual Area
User Counter and Event Counter values via a Menu option when logged on to a
User Terminal.
64.6.1
The system shall also allow an option for specially authorised Users to reset
and/or edit individual Area user Counter and Event Counter values via a
separate Menu option when logged on to a User Terminal.
64.6.2
When viewed on a User Terminal, the displayed Counter value shall refresh
every 2 seconds.
64.6.3
An option shall be provided for each Counter to limit the displayed Count value
to the 4 least significant digits.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 127
65.
Building Automation
65.1
Control of Outputs
Any Auxiliary Output in the system shall be capable of being controlled by any
one or more of the following:
(a)
Users via a User Terminal
(b)
Users via RF Fobs
(c)
Zone Inputs (Including Movement Detectors, Keyswitches, Button
Inputs, etc.)
(d)
Time Programs.
(e)
Area Status (On, Off or Alarm).
(f)
Auxiliary Logic Programs: Follow, Invert, AND, OR, XOR, NAND, NOR,
etc.
(g)
User Count value in an Area exceeding and/or dropping below
programmable pre-defined levels.
(h)
Event Counter value exceeding and/or dropping below programmable
pre-defined levels.
(i)
Analogue Input value exceeding and/or dropping below programmable
pre-defined levels.
(j)
Remotely via DTMF Touch-tone telephone, GSM Digital Mobile phone
and/or Computer.
(k)
HPM iControl outputs, groups or scenes.
(l)
Clipsal C-Bus Group commands.
(m)
Dynalite Commands.
(n)
Any third party device or system using the automation comms task.
65.1.2
Programming options shall allow any Auxiliary Output to have a timer
assigned that can be programmed to time for 1 to 254 seconds or 1 to 254
minutes. An option shall also be provided to generate a random timer
between 1 and 255 seconds or 1 and 255 minutes.
65.1.3
All Auxiliary Output actions shall be recorded in the Event log. A programming
option shall be provided for each Auxiliary Output to disable logging of Events
for that Output to preserve space in the Event log memory.
65.2
Control of Outputs by Users
The system shall provide the ability to control Auxiliary Outputs from specified
User Terminals and/or from a Host Computer if connected.
65.2.1
Selection of the Output to control shall be via programmable text names of up
to 16 characters and shall allow control of a single Output or a group of up to
8 Outputs.
65.2.2
Control options shall provide the ability to perform any of the following control
functions:
(a)
Output On.
(b)
Output Off.
(c)
Output Timed On for 1 to 255 seconds.
(d)
Output Timed On for 1 to 255 minutes.
65.2.3
The system shall provide a minimum of 8 User-controlled Outputs expandable
up to 128.
65.2.4
The following programming options shall be provided for each individual
Output to define the method of control via a User Terminal:
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 128
(a)
User Terminal Logon required - the User is required to logon to the User
Terminal with a PIN code and selects the Output to control via a Control
Menu.
(b)
No Logon required - the User is provided with a list of Outputs to select
from via a single key press.
65.3
Control of Outputs by RF Fobs
The system shall provide the ability to control Auxiliary Outputs via up to 100
registered RF Fobs.
65.3.1
Control options shall provide the ability to perform any of the following control
functions:
(a)
Output On.
(b)
Output Off.
65.4
Control of Outputs by Inputs
The system shall provide the ability for specific changes of state on an Input
to control one or more Auxiliary Outputs.
65.4.1
Programming options shall provide the ability to define any of the following
control functions for an Input change of state. I.e. Seal and/or Alarm (Unseal) and/or Tamper (Open or Short circuit) states. The control function shall
be defined separately for each of the Input states as required:
65.4.2
(a)
Output On.
(b)
Output Off.
(c)
Output Timed On for 1 to 255 seconds.
(d)
Output Timed On for 1 to 255 minutes.
(e)
Output Toggled from current state to opposite state.
e.g.
(a)
A Momentary Push-button switch used for “Push on/Push off” operation
is programmed for “Toggle” on a change to “Alarm” state.
(b)
A Momentary Push-button switch or Movement detector used to activate
a light for 5 minutes is programmed to “Turn On for 5 minutes” on a
change to “Alarm” state.
(c)
A Two-position switch used for On/Off operation is programmed for “On”
on a change to “Alarm” state, AND “Off” on a change to “Seal” state.]
65.5
Control of Outputs by Time Programs
The system shall provide the ability for one Auxiliary Output or a group of up
to 8 Auxiliary Outputs to be controlled by a Time Program becoming Valid
and/or Invalid.
65.5.1
Programming options shall provide the ability to define any of the following
control functions for a Time Program going Valid and/or Invalid. The control
function shall be defined separately for the Valid and Invalid transitions as
required:
(a)
Output On.
(b)
Output Off.
(c)
Output Timed On for 1 to 255 seconds.
(d)
Output Timed On for 1 to 255 minutes.
65.6
Control of Outputs by Area Status
The system shall provide the ability for controlling one or more Auxiliary
Outputs according to specific conditions in an Area.
65.6.1
Programming options shall provide the ability to turn a specified Auxiliary
Output, or group of up to 8 Auxiliary Outputs, On and/or Off according to any
of the following Area conditions. A separate Auxiliary Output shall be able to
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 129
be defined for each condition and the control functions shall be defined
separately for each Area used in the system:
(a)
Area On and/or Off.
(b)
Alarm in Area.
(c)
Tamper condition in Area.
(d)
Inputs Isolated in Area.
(e)
Siren running in Area.
(f)
Area Entry Timer running.
(g)
Area Exit Timer running.
(h)
Area Defer Timer running (250 seconds before the Timer expires)
(i)
Area in Pre-Arm Walk Test mode.
65.7
Control of Outputs by Auxiliary Logic Programs
The system shall provide the ability to program simple Logic equations
utilising one or two Auxiliary Outputs.
65.7.1
The Logic equation “result” shall have the ability to:
(a)
Control one or more Auxiliary Outputs.
(b)
Generate an Alarm (Unseal) and/or Seal state on a specified Zone
Input.
(c)
Control Door or Lift access.
(d)
Control Areas.
65.7.2
The system shall provide a minimum of 16 Logic Programs expandable up to
128.
65.7.3
Programming options shall provide the ability to perform the following Logic
functions as a minimum utilising one or more Logic Programs:
(a)
Result to follow or invert a single specified Auxiliary Output.
(b)
Result to turn On and/or Off when a single specified Auxiliary Output
turns On and/or Off.
(c)
Result to turn On for a time period of 1 to 255 seconds or 1 to 255
minutes when a single specified Auxiliary Output turns On or Off.
(d)
AND, OR, XOR (Exclusive OR), NAND and NOR functions.
(e)
Result to Unlock and/or Lock Doors when a single specified Auxiliary
Output turns On and/or Off.
(f)
Result to Free and/or Secure Lift Floors when a single specified Auxiliary
Output turns On and/or Off.
(g)
Result to turn Areas On and/or Off when a single specified Auxiliary
Output turns On and/or Off.
65.8
Remote Control of Outputs
Remote controlled Outputs shall also be able to be controlled by DTMF Touchtone Telephones, GSM Mobile Phones, Computers or other mechanism as
required.
65.8.1
DTMF TOUCH-TONE REMOTE CONTROL
The system shall provide the ability to control Auxiliary Outputs from any
Touch-tone (DTMF) telephone. The system shall provide a minimum of 4 DTMF
controlled Outputs expandable up to 16.
65.8.2
Dialling the system and sending a single programmable DTMF tone shall
access DTMF Control. Once connected to the system, the system shall send a
“Start tone” to indicate the Ready state. Selection of the Output to control
shall then be via programmable 4 digit Control codes.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 130
65.8.3
The command timer shall timeout and disconnects if more than 10 seconds
elapses before entering the first digit of the Control code or between entering
each subsequent digit of the Control code.
65.8.4
The system shall disconnect if a valid Control code is not entered after 6
successive tries.
65.8.5
Control options shall provide the ability to perform any of the following control
functions:
65.8.6
(a)
Output On.
(b)
Output Off.
(c)
Output Timed On for 1 to 255 seconds.
(d)
Output Timed On for 1 to 255 minutes.
The system shall provide User feedback via distinct DTMF tones to indicate any
of the following conditions:
(a)
Start (Ready) tone.
(b)
Output turned On (Or already On).
(c)
Output turned Off (Or already Off).
(d)
Error - to indicate Code not recognised, Operation cannot be executed
or Timeout.
65.8.7
GSM DIGITAL MOBILE REMOTE CONTROL
The system shall provide the ability to control Auxiliary Outputs from any GSM
Digital Mobile telephone with Short Message Service (SMS) enabled. The
system shall provide a minimum of 8 GSM controlled Outputs expandable up
to 128.
65.8.8
Selection of the Output to control shall be via pre-defined, simple, userfriendly text messages and shall allow control of a single Output or a group of
up to 8 Outputs.
65.8.9
Control message options shall provide the ability to perform any of the
following control functions:
65.8.10
(a)
Output On.
(b)
Output Off.
(c)
Output Timed On for 1 to 255 seconds.
(d)
Output Timed On for 1 to 255 minutes.
(e)
Return list of text names and current status of 5 sequential Outputs.
The following programming options shall be provided to define GSM Mobile
phone access to the system:
(a)
Specified GSM Mobile phones only. Access will be limited to one or two
GSM Mobile phones by programming the phone numbers into the
system.
(b)
Any GSM Mobile phone. Access allowed to any GSM Mobile phone but
the User must prefix the Control message with a valid PIN code.
65.8.11
The system shall return a text message to the GSM Mobile phone that
indicates the result of any Control message sent.
65.9
Status Monitoring and Control via simple Automation Interface
The system shall provide (as an option) an RS232 Serial interface for
connection to Third Party Home Automation and Building Automation Systems.
The protocol to be used will be an ASCII based protocol for ease of
understanding.
65.9.1
The simple Automation interface will provide the following functions:
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 131
(a)
Request state of Zone Inputs, System Inputs, Areas, Doors, Auxiliaries
and Home Auxiliaries.
(b)
Request text names for all named entities. (e.g. Areas, Inputs, Users,
Doors, Home Auxiliaries, Time Zones, etc.)
(c)
Control Area, Door, Auxiliary and Home Auxiliary states.
(d)
Isolate/De-isolate Zone Inputs and System Inputs.
(e)
Manipulate Control Module Zone Input states.
(f)
65.9.2
65.10
Access the Review log. (Includes options for streaming,
acknowledgement and pointer manipulation)
The system shall provide an option for monitoring communications integrity on
the interface.
Phantom Zone Status Reporting via Advanced Automation Interface
In addition to the functionality of the simple automation interface described
above, the system will support status reporting of phantom zones via an
advanced automation interface.
This allows a third party BMS/Home automation system etc to utilise zone
inputs to log, annunciate, process and/or report third party system events.
As an example, two applications could include:
(a)
Transfer BMS plant alarms to the control module to facilitate logging,
local annunciation and off-site reporting to the relevant personnel via
the relevant communication paths.
(b)
Transfer alarms from a portable duress system to the control module to
allow reporting to an on-site system management application and/or a
remote monitoring station.
65.11
Control of Outputs by Clipsal C-Bus
The system shall provide the ability to control Auxiliary outputs via Clipsal CBus Group commands.
65.11.1
An Auxiliary linked to a C-Bus Group Address shall have an option to allow the
Auxiliary to:
(a)
Turn on when an ON command is detected
(b)
Turn off when an OFF command is detected
(c)
Turn on above a pre-programmed ramp level threshold and off below
that threshold
65.12
Control of Outputs by HPM iControl
The system shall provide the ability to control Auxiliary Outputs via HPM
iControl channels, groups and scenes.
65.12.1
For iControl auxiliaries programmed for “scene” commands, the Auxiliary will
turn on when the scene turns on, and off when the scene turns off.
65.12.2
For iControl auxiliaries programmed for “channel” or “group” commands, the
Auxiliary will turn on above a programmed threshold (between 0% and 100%)
and off below that threshold.
65.13
Building Automation Systems
65.13.1
The system shall natively allow interaction with many 3rd party building
automation systems.
65.13.2
The system shall allow, via the addition of a Trans-Tech hardware module,
interaction with all major building automation and HVAC communication
protocols including:
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 132
360 Vision Technologies' Dome and Controls
CCTV system
ABB ACS 500 (SAMI GS) frequency
converters
ABB ACS 600 variable speed drives
ABB DCS variable speed drives
Access single door control
AD Network Video NetVu Video Desktop
CCTV system
Adam Systems Alarm Receiver System
Ademco Microtech Galaxy Security System
Ademco/Honeywell Video Systems
VideoBlox matrix switchers
Advance Power Systems PC1200 Rectifiers
Advantech ADAM 4000 Series
Aertesi MaxiNet BMS
Agritron MegaPoint sensor monitoring
system
Alerton LSI BMS
Alfa Laval Automation SattCon
Alldales Drive Systems Gemini GV
frequency converters
ALSTOM GEM80 series PLC
American Auto-Matrix SAGE controller
American Auto-Matrix Unitary Controllers
Andel Floodline 128 Leak Detection System
Andover Controls Infinity/Continuum
Systems
Andover Controls Nucleus/AC8+/AC257
APC Silcon UPS
APC Smart and Matrix UPS
ASI Controls VAV
Asutsa TLVCR964 Video Cassette Recorder
Autoflame DTI boiler/burner controls
Automated Logic controls
Autometers EVO IC Series Harmonic
Analyser meters
Autometers IC Series power meters
BACnet open protocol
Baxall Security's ZMX+ Series Multiplexers
Belimo Automation MP-Bus Actuators
Benning Power Electronics MCU 1000/2001
Betatech Master Series matrix switchers
Bosch DP6000 paging system
Building Block Video Tx1000 System
Canatal International Precision Air
Conditioning system
Carel air-conditioning and refrigeration
controllers
Carlo Gavazzi WM3-96 Smart Quality Power
Analyzer
Carrier CCN DataPort I Systems
Carrier CCN DataPort II Systems
Caterpillar generator
Cerberus/Siemens AlgoRex Fire Panels
Cerberus/Siemens CS11 Security Panels
Cerberus/Siemens CS1115 Fire Panels
Colt International OPV Control system
COMLI protocol
Complus Teltronic GE 100 Intercom
Computar DPLEX 9/16 Video Multiplexer
Cooper Menvier/JSB Electrical Easicheck
Emergency Lighting System
Cooper Menvier/Scantronic Security System
Cover Partner UPS
Crestron Home Automation
Crompton Integra 2000 power meter
Cylon Controls Unitron Range
Daikin DBACS Air Conditioning
Daikin VRV Controls
Danfoss Refrigeration controls
Danfoss VLT 3500 Frequency Converters
Danfoss VLT 6000 Frequency Converters
Dedicated Micros DVST Video Transmission
System
Dedicated Micros Sprite Video Multiplexers
Dedicated Micros Uniplex Series 2 Video
Multiplexer
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 133
Deep Sea Electronics 55x Generator Monitor
Deltec Power Systems UPS
Denco Millennium Access Module
Denco Monitrol system
Denco Monitrol system via a CIU
Dorman-Smith Load Module 3-phase energy
analyser
Duemmegi Conatto IO system
Dunham Bush Chiller controls
ECS Philips LightMaster System
Elcontrol Energy Net VIP Energy/VIP One
meters
Electronic Security Products CS16 Spider
Elgama LZQM/LZMF Electricity Meters
Eltek PRS Power Rectification System
Enercom EMA
Enercom IsoBase/IsoHub Earth Leakage
Monitoring
Enercom Isobox Earth Leakage Monitoring
Esser/Novar System 8000 Series Fire Panels
European Installation Bus (EIB) network
European Selective Paging Association
(ESPA) 4.4.4 protocol
Europlex Technologies Aplex/Midiplex/3GS
Intruder Systems
Exide Electronics UPS
Exide Electronics UPS with BCM protocol
Exide Electronics UPS with P-Record
protocol
Fermax Digital Entry Phone System
Fermax MDS Door Entry System
FG Wilson generators
Fiskars Power Systems UPS
Fronius IG photovoltaic system
Gent/Novar 3400/Vigilon Fire Panels
Gent/Novar 8000 Series Fire Panels
Geoquip Electronic Perimeter Detection
System
Hitachi CS-Net Air Conditioning
Hitzinger Powercon System
Hochiki ESP Fire Detection panels
Honeywell Excel 5000 System
Honeywell Q7700 Boiler/Burner Control
system
Honeywell XLS50/60 Fire Panel
Honeywell XLS80 Fire Panel
iLight iCan lighting control system
iLight/Dynalite DyNet lighting control
network
IME Nemo 96 Power Measurement unit
Innsite Hotel Services Energy Management
System
Invertomatic Telecontrol UPS system
JBus protocol
JBus protocol (slave)
Johnson Controls Metasys system
JVC BR-S925E Video Cassette Recorder
Kamstrup Electricity meters
Kamstrup Multical heat meters
Key Universal Building Systems Apex
Display
Kidde Fire Protection GRS network
Kidde Fire Protection MARS network
Kidde Fire Protection Vega or Procyon Panel
Kohler Power Systems Decision-Maker
generator
Landis & Staefa/Siemens AS1000 BMS
Landis & Staefa/Siemens IS1000 Display
Landis & Staefa/Siemens MS2000
NCRS/NCRE System
Landis & Staefa/Siemens NCRE Trunk Bus
Landis & Staefa/Siemens Pronto BMS
Landis & Staefa/Siemens Visoni PRV2
controller
Liebert Datawave PDU
Liebert DCLAN Interface
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 134
Liebert ECA2 Environmental
Communications Adapter
Liebert Hiross Air Conditioning
LonWorks networks via Echelon Serial
LonTalk Adapter
Luxmate building management system
Mark Mercer Electronics PTZ Dome cameras
McQuay International's Chiller System
Controller (CSC)
McQuay International's Frame 4 Chillers
McQuay International's range of Air-Cooled
(Stargate) Screw Chillers
McQuay International's range of Centrifugal
Chillers
McQuay International's range of
Reciprocating Chillers
McQuay International's range of Roof-Top
Units
McQuay International's range of Unit
Ventilator
McQuay International's Self-Contained Air
Conditioning Units
McQuay International's Series 200 Flooded
Screw Chiller
McQuay International's Water Source Heat
Pump
Meaco Radio Telemery System
Megacon AB ISORACK 2000 Earth Leakage
Condition Monitoring System
MegaTec compatible Advance-Intelligent
UPS
Meissner MP100 Series UPS
Meissner MP3000 Sentinel Series UPS
Meitav MaxiNet thermostat network
MEM Memshield Circuit Breaker Protection
System
Menvier TS2500 Intruder Alarm Control
System
Merlin Gerin Galaxy PW UPS
Microlec SmokeMaster system
Minerva Fire Panel
Mitsubishi Electric City Multi air conditioning
system (via IFU-100SA)
Mitsubishi Electric City Multi air conditioning
system (via IPxxM)
Mitsubishi Electric Mr Slim air conditioning
system (via IPxxM)
Mitsubishi HS-S5600 Series and HS-S8300
Series Video Cassette Recorder
Modbus protocol
Modbus protocol (slave)
Molynx Visilynx CCTV system
Morley-IAS Fire Systems (multiple ZX
panels)
Morley-IAS Fire Systems (single ZX series
panel)
Multitone Access 3000 paging system
Newport Data Systems Cellwatch 2 software
North Building Technologies Commander
North Communications ObSys Display
North Compass Network Link via Modem
North Compass Open Link (COL) protocol
North Compass Simple Gateway protocol
North ObSys PC Information
North Simple Terminal Object protocol
North XOM ActiveX Control
North XOM Alarm Archive
North XOM Alarm Dispatch
North XOM Alarm Email/SMTP Gateway
North XOM Alarm Generator
North XOM Alarm History
North XOM Alarm Printer
North XOM Alarm Printer (serial)
North XOM Alarm Priority Translator
North XOM Alarm Router
North XOM Alarm Store
North XOM Alarm to Object
North XOM Alarm Translator
North XOM Calendar Timer Control
North XOM Data Log Archive
North XOM Data Logger
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 135
North XOM IPBus protocol
North XOM Meter Logger
North XOM Programmable Control
North XOM Shared Token Database
North XOM SMS Portal
North XOM SNMP Trap Portal
North XOM Transfer Interface
North XOM User Data
North XOM User Locator Database
North XOM Web Server
North Zip System
Northern Design PM390 power meter
Notifier Fire Systems
Omron Programmable Logic Controllers
(PLC)
PABX Systems with CDR output
PABX Systems with DTMF input
PAC International 2100 series door
controller
Pelco CM9760 Series Video Matrix
Peripheral Support Services FireQuest Fire
Detection panels
Philips DP6000 paging system
Philips Helio Lighting Control System
PHP compatible products
Power Measurement 3300 ACM power
monitor
Power Measurement 7300 Ion power
monitor
Power-One DC Power Systems
Powerware Corporation UPS with BCM
protocol
Powerware Corporation UPS with P-Record
protocol
Protec Fire Detection control panels
PUP compatible products
RF Solutions Radio Modems
Rhoss Fan Coil Units
Sabroe's Unisab and Prosab II refrigerating
compressors
Sanyo AMY air conditioning system
Satchwell Satchnet protocol
Schneider Digipact PM300 power meter
SDA Protec SMS 5000 alarm monitoring
system
SeaChange hvac control systems
Serial Alarm Messages
Siebe I/A MicroNet VAV Controls
Siemens Desigo PX controls
Siemens SED2 Variable Frequency Drives
SimplexGrinnell Simplex 4100 series fire
alarm system
SmartKontrols hvac control systems
Socomec Diris Ap power meter
Socomec Sicon Delphys UPS
SocoMec UPS
Staefa Smart I controllers
Starkstrom Circutor power meters
Static Systems Series 900 fire alarm system
Stulz CompTrol Air Conditioning via MIB
Systems Controls & Instruments (SCI)
MaxiNet thermostat network
TAC UniHub Display
TAC Xenta HVAC Controllers
TAC/CSI I/NET
Tecton's Darlex 20 Digital Video Recorder
Tek-Air MPC-2000 Gateway
Telocator Alphanumeric Protocol (TAP)
Texcel Technology Vision VE5000 system
Thorn Security Infinity BMS
Thorn Security Star bms
Titus ASIC VAV control system
Titus ZCom VAV zone control
TraceTek SIM/TTDM Leak Detection
Trane GCI chiller controls
Trane Tracer Summit controls
Trend Control Systems IQ Series BMS
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 136
Trend Control Systems IQ Time Zone
expansion module
Trend MP/MPO power meter
Triatek Lighting control system
Tyrrell Systems CrossTalk Display
Ultrak/Honeywell Video Systems MAX-1000
video management system
Uniflair Air-conditioning controllers
Uninterruptible Power Supplies PowerWAVE
UPS
Veeder-Root TLS series tank-monitoring
system
Vicon AurorA digital video multiplexer
Vicon NOVA and 1300 CPU matrix systems
Vision Systems Adpro Fast Scan Series III
Vision Systems Adpro VST-10 Fast Scan
Series
Vision Systems VESDA aspirating smoke
detection system
Viterra Combimeter II heat meter
WattMaster Controls Auto-Zone system
York FM Display
York International ASCII Microgateway
York International ISN Controls
York International YorkTalk Controllers
Ziton ZP fire detection systems
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 137
66.
Zoned Air-conditioning Control
The system shall provide dedicated Air-conditioning Control logic for the
control of up to 4 Air-conditioning units. Each unit shall consist of a single
compressor and monitoring and control of up to 8 Air-conditioning Zones.
66.1
Control
Control of the Air-conditioning unit/s shall be through either or both of the
following options:
(a)
Automatic via Thermostats and/or Time Programs and/or Area On/Off
status.
(b)
Manual via separate 3-position switches for:
1.
System ON / OFF / TIMEZONE CONTROL
2.
Ventilation RECIRC / FRESH / AUTO
3.
Fan ON / HEAT PUMP / AUTO
OR
Manual via User Terminals.
66.2
66.3
Inputs
For each Air-conditioning unit the system shall be able to provide:
(a)
Up to 8 Thermostats connected to separate sequential Inputs with Endof-line resistors to monitor “Too warm”, “Dead band” and “Too cool”
conditions in each of the 8 possible Zones.
(b)
A single Thermostat connected to an Input with End-of-line resistors to
monitor the external air “Too warm”, “Dead band” and “Too cool”
conditions. [If required for automatic Fresh/Re-circulated air selection.]
(c)
Three 3-position switches connected to 3 sequential Inputs with End-ofline resistors for control functions. [If User Terminal control not used.]
Outputs
For each Air-conditioning unit the system shall be able to provide:
(a)
Up to 8 sequential Relays to control the Zone Damper for the outlet in
each of the 8 possible Zones.
(b)
Up to 8 sequential Relays to control the following functions as required:
1.
Compressor On/Off.
2.
Compressor Heat/Cool.
3.
Re-circulated/Fresh Air Damper.
4.
Fan On/Auto.
5.
Compressor Bypass Damper Open/Close.
6.
Exhaust Re-circulated air Damper Open/Close.
7.
Disable. (Special control auxiliary manipulated by other
tasks)
8.
Smoke Mode. (Special control auxiliary manipulated by other
tasks)
66.4
Minimum On Time / Off Time
The system shall allow the minimum Compressor On time and Off time to be
specified for each Air-conditioning unit.
66.5
Bypass Damper
The system shall allow the installer to specify the number of Zone Dampers
that must be open to allow the Compressor Bypass Damper to be closed.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 138
67.
System Diagnostics
67.1
Inputs
The system shall allow the Installer to view the current status of any Zone
Input in the system via a Menu option when logged on to a User Terminal.
67.1.1
The system shall allow the Installer and any other authorised Users to Isolate
and De-isolate any Zone Input in the system via a Menu option when logged
on to a User Terminal or via a local or remote PC.
67.2
Outputs and Sirens
The system shall allow the Installer to view the current status of any Auxiliary
Output in the system and turn any Auxiliary Output On or Off via a Menu
option when logged on to a User Terminal or via a local or remote PC.
67.2.1
The system shall allow the Installer to view the current status of any Siren
Output in the system and turn any Siren Output On or Off via a Menu option
when logged on to a User Terminal.
67.3
PSTN Dialler Line
The system shall allow the Installer to perform the following operations on the
PSTN Dialler circuit via a Menu option when logged on to a User Terminal.
(a)
View the current line status. Line present / No line / Line Seized / Line
Un-seized.
(b)
Toggle the “Seize” relay On and Off.
(c)
Loop and Un-loop the Line.
(d)
Select between DTMF and Decadic (Pulse) dialling.
(e)
Dial a telephone number using the digit keys on the User Terminal.
67.4
Cards
The system shall allow the Installer to view the raw data from any card format
supported by the system or any Wiegand card regardless of format, via a
Menu option when logged on to a User Terminal.
67.5
Memory
The system shall allow the Installer to run a memory check to determine the
time and date of the last change to any specific database via a Menu option
when logged on to a User Terminal.
67.6
RS232 Serial Ports
The system shall allow the Installer to perform the following operations on any
Serial Ports installed on the Control Module via a Menu option when logged on
to a User Terminal.
67.7
(a)
View the current status of the relevant IN signals. DCD (Data Carrier
Detect) / CTS (Clear to Send) / DSR (Data Set Ready) / RI (Ring
Indicator).
(b)
View the current status of the relevant OUT signals. DTR (Data
Terminal Ready) / RTS (Request To Send).
(c)
Toggle the DTR or RTS signal High and Low.
Module Power Supplies
The system shall allow the Installer to monitor the status of the following
conditions on the relevant Modules via a Menu option when logged on to a
User Terminal.
(a)
LAN fail.
(b)
AC fail.
(c)
Low Battery or Low DC Volts.
(d)
Detector fuse fail and LAN fuse fail.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 139
67.7.2
67.8
The system shall allow the Installer to perform the following power supply
tests on any Module via a Menu option when logged on to a User Terminal.
(a)
Turn Zone Expansion Module battery chargers On and Off.
(b)
Turn the Control Module battery charger On and Off.
(c)
Unlock and Re-lock all Doors.
Module Disable
The system shall allow the installer to disable one or more modules on the
LAN. Disabling a module will cause the Module to stop attempting to
communicate with the Control Module and will also cause all Zones and
System Inputs on that Module to be Sticky Isolated.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 140
(This page has been intentionally left blank)
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 141
Appendix A - Core
Requirements
68.
Software
68.1
Encryption
68.1.1
Communications between Server and Clients will be encrypted with a
minimum of 128-bit encryption (e.g. Blowfish 128-bit)
68.1.2
Communications between the Server and Control Modules shall be encrypted
with a minimum of 128-bit encryption (e.g. AES 128-bit)
68.2
Virtual Panel
68.3
The software will allow multiple panels to be grouped together into a single
virtual panel. Cardholders can be programmed in one place, and changes will
automatically be sent to each member panel.
68.4
Universal Tenanting
The system will permit any item to be assigned to tenants. This includes
areas, doors, cardholders, auxiliaries, zones, modules and all other
programming items; and also front-end entities like floor-plans, sites and
workstations.
68.4.1
When an Operator logs on, their tenant list will be loaded by the system and
used as a filter to determine what items the Operator can or cannot see.
68.4.2
Items that aren’t tenanted will be visible to ALL Operators.
68.4.3
Items can be placed in more than one tenancy.
68.4.4
An Operator can see an item if they share a tenancy in common with that
item.
68.5
Cross-Reference
The software shall allow Operators to view relationships between all Control
Module programming items. The software will display a ‘tree’, showing how
any item (e.g. user, door, area) relates to all other items.
68.6
Detect Two Operators Editing The Same Data
The system shall warn an Operator who simultaneously edits the same record
as another Operator. The system shall prompt the Operator whether to discard
or override the other Operators edits (subject to Operator permissions).
68.7
Workstation Lockdown
The system shall be configurable to only permit client logons from designated
workstations.
68.8
Push Programming
The system shall send programming changes through to field hardware
without any special LAN commands such as LAN Init or LAN Secure. Field
hardware will adopt the new programming immediately and automatically.
68.9
Monitoring Field Programming Changes
The system shall automatically detect if any system parameters have been
changed at a terminal. The system will notify the Operator which item(s) were
changed. The Operator can choose to accept or reject the changes.
68.10
Software Video Multiplexing
The system will allow up to 16 cameras to be multiplexed onto a single, timesynchronised window. The layout can be changed at any time. Any number of
separate multiplexed windows can be displayed, with each showing footage
from the same or different cameras and DVRs.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 142
68.11
Shaped Areas On Floor Plans
The system will let Operators create areas of any shape. The following shapes
are examples of shapes that must be definable:
68.12
Report Designer
The system will include a fully featured WYSIWYG (what you see is what you
get) report designer that can edit existing report templates or create brand
new templates. The report designer will allow operators to:
68.13
(a)
Place coloured and formatted text and graphics on a report
(b)
Place data fields onto a report, including user photographs
(c)
Add drawing shapes and symbols
(d)
Place charts on a report based on live reporting data
(e)
Add barcodes to a report
(f)
Place tables on a report of tabular data grouped by arbitrary datum
(g)
Add forms to a report
(h)
Place runtime data from other applications using industry-standard OLE
container objects
Operator Permissions
Permissions can be applied to specific items. For example, an operator might
have the ‘see’, ‘inspect’ and ‘change’ permissions for doors 1-5 and 20, but
only the ‘see’ and ‘inspect’ permission on all other doors.
(a)
See. Without this permission, the item is invisible to the Operator.
(b)
Inspect. Without this permission, the Operator cannot open the item
for inspection.
(c)
Change. Without this permission, the Operator cannot save changes to
the item.
(d)
Create. Without this permission, the Operator cannot create new
instances of the item.
(e)
Delete. Without this permission, the Operator cannot delete the item.
(f)
Control (field hardware only). Without this permission, the Operator
cannot control the field hardware item.
(g)
Print. Without this permission, the Operator cannot print the item.
(h)
Export. Without this permission, the Operator cannot export the item to
a file.
(i)
Set Permissions. Without this permission, the Operator cannot modify
the permissions of the item for themselves or other Operators.
68.14
Compliance
The front-end software will be written in Microsoft Visual C++ and built using
Microsoft compiler tools.
68.14.1
The front-end software will comply with Microsoft’s User Interface Guidelines.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 143
69.
Hardware
69.1
Field Hardware Independence
If the front-end software is not running, the field hardware will continue to
function at full capacity, including authentication of all users.
69.2
Field Hardware Programming
The system shall permit ANY programmable item to be programmed in the
field from a System Terminal, without recourse to a computer of any kind.
69.3
TCP/IP Network Independence
The system shall support the option to deploy on non-TCP/IP networks. If a
TCP/IP network goes down, the system shall have a private non-TCP LAN
which will continue to function.
69.4
Automatic Link Switching
The system can be configured to automatically try different links if the primary
link fails. For example, if the TCP/IP connection is disconnected, the system
will connect on a dial-up link or backup serial link. When the primary link
returns, this will be detected and reconnected automatically.
69.5
Alarm Prioritisation
The Control Module will transmit alarm events in priority to regular review
events.
69.6
Multi-Purpose Detectors
The system shall permit a single detector to be used for up to 8 different
purposes. (e.g. add a single detector to two different areas with two different
process groups.)
69.7
Alarm Reporting
The system shall be capable of reporting different alarm types via different
communication paths to different locations.
70.
Functional
70.1
Alarm Routing
The system shall have the capacity to report alarm events of different types or
from different origins via different communications formats to different
locations.
70.1.1
For example:
70.1.2
(a)
Security alarms from one section or tenant go to ABC Control Room Ltd.
via dialler.
(b)
Security alarms from another section or tenant go to XYZ Alarm
Monitoring Ltd. via dialler or GSM modem.
(c)
All building plant alarms go to an engineer via an SMS message.
The system shall allow the same alarm to be processed by up to ten
communication tasks, with each task able to report in a different format to a
different location.
© 2007 Inner Range Pty. Ltd.
Rev. 7.82 (v5.1/v7.82)
February 2011
Page 144
Download