InvisiFence User Manual

Size: px
Start display at page:

Download "InvisiFence User Manual"

Transcription

1 InvisiFence User Manual Version 1.2 Date May 2016

2 Table of Contents 1. Introduction General System Components Hierarchy of system components Processing unit Connections Detection Pattern System Installation Sensitivity Test SensoGuard Command and Control software Specifications... 13

3 1. Introduction SensoGuard Develop advanced intrusion detection systems for a broad range of applications. SensoGuard Team composed of engineers with more than 10 years of experience in development of intrusion detection systems based on seismic technology for both civil and military use. Contact information: Website: sales@sensoguard.com Phone number: General InvisiFence Security System provides a comprehensive solution for perimeter protection. InvisiFence operates with seismic sensors which are installed below ground, creating an invisible perimeter fence around the secured area. The system recognizes threats whenever fluctuations are sensed in its vicinity and sends an early warning before the intrusion actually occurs. The InvisiFence is designed to provide the optimal solution for protection of perimeters, borders, prisons and large infrastructure sites.

4 3. System Components Seismic sensors- the seismic sensors sense very small ground vibrations. They transform vibration to electrical outputs. We analyze those vibration signals to detect intruders Communication cables - the communication cables connects all of the processing units of the system to the hub. All of the units get the power supply and the RS485 data through this cable Processing units the processing unit can analyze a signal from 3 seismic sensors. The processing unit analyzes the data on real time and outputs the processing result to the RS485 line

5 Hub units a hub unit can manage a line of 600m of InvisiFence processing units. The hub outputs the alerts to the user via C&C program (contact SensoGuard to get more info about our C&C program) or through dry contacts or serial communication in SensoGuard protocol (if required, we can adjust our messages to a client request).

6 4. Hierarchy of system components Every 3 seismic sensors are connected to a processing unit. Every processing unit analyzes the signals of those sensors and decides whether the signal is environmental noise or an event (footsteps, vehicle, digging). The hub collects the processing units outputs and sends the alerts to C&C computer or GSM modem. A hub is required every 600m approx. Data Flow of InvisiFence

7 5. Processing unit Connections 6. Connector 1-3 Marked Ch1-Ch3 : Connection of the seismic sensors channels 7. Connector 4 Marked COM : Configuration connection to PC using RS232 protocol 8. Connector 5-6 Marked Network In, Network Out: network connection using RS485 and power input Connect the cable connector to the panel connector (red dots face each other), you should hear a click when the connector is properly connected to the unit panel. Connect all the connectors only after deployed all the sensors it is crucial to keep the rubber cover on the connectors at all time remove them only when you connect the connectors to the processing unit (put them back on when you open the connector) Make sure you connect the sensors to the correct processing unit the first unit in the line is unit 1, the second unit is unit 2 and so on. It is important to the HUB unit that the processing units will be in the right order

8 6. Detection Pattern The seismic sensor has ball shaped detection pattern. Each sensor creates a ball shaped detection area around itself and detects every operation in this ball shaped zone. Sensor detection area InvisiFence system detection area

9 7. System Installation In terms of maintenance it is recommended to use inspection chambers for the processing units (those chambers can be with open bottom, as for the processing units are water sealed IP67 rating Preparing a trench: Dig a trench at the location of the InvisiFence system. Trench dimensions: Width=10-30cm Depth= 40cm Dig to 50cm at the locations of the sensors to be placed. (If possible, it is best to dig the whole trench to 50 cm depth)

10 Seismic sensor placement Fix the sensor at the bottom of the trench (at the proper location default distance is 6 meters between sensors)). Make sure that the sensor is straight as shown below Make sure that the sensor stuck well in the ground and doesn t move Cover the sensor gently with soil without stones and tighten lightly - so that the sensor will not move or change his angle

11 Cover the communication cables with soil without stones so that the cables will not move, and be protected from big stones or rocks 8. Sensitivity Test After finishing deploying all the sensors and connecting them in the right order to the processing units and connect all the processing units to the HUB unit you can start the sensitivity test 1. Set the sensitivity to level 1 Move 20 meters from the sensors line Wait for 30 sec Make sure there is no movement in the area Walk across the sensors line between sensors 1.1 and 1.2 Check the C&C software for an event + hear the beeping sound from the processing unit If you got an event in the C&C repeat those steps between sensors every two sensors along the sensors line. In case you don't see an event in the C&C software set the sensitivity level to 2 and repeat the test between the 2 sensors. In case you don't see an event in the C&C software set the sensitivity level one level up and check again until you receive an event in the C&C software After finishing checking the intruder event along the whole sensors line, repeat those steps for Car event (only if necessary) It is possible to set different sensitivity for each event on each processing unit

12 9. SensoGuard Command and Control software The InvisiFence system outputs alert data in the following options: Dry contacts connection Serial communication (RS232 or RS485) RF transmission GSM- via SMS messages SensoGuard command and control software The SensoGuard command and control software provides graphical user interface which includes a map view of the system installation area, and enable the operator a more convenient, user friendly way to respond to system alerts. The software includes a list of the installed processing units and hub on the field, a map view of the installed units. When the system detects an intruder, a siren sound can be played (configurable setting) and the operator can see immediately an icon in the relevant location in the map and also the alarm data in the event log.

13 10. Specifications Invisible alert system based on seismic detectors Can operate independently or integrated with existing systems Working Temperature : -40 to 70 degrees (Celsius) Relative humidity = 95% Maintenance free, easy operation (plug & play) Recommended installation depth below ground level: 4m Underground detection depth: up to 20m RoHS compliant Operating Radius per sensor(depending on the area's terrain): o Walking- up to 12m radius o Digging- up to 20m radius Outputs : RS232,RS485,Relay outputs Case Enclosure: IP67, Polycarbonate System indications Intruder Detected Sensor failure Low battery System OK message- Built in Test

SensoGuard. Seismic Security Solutions

SensoGuard. Seismic Security Solutions SensoGuard Seismic Security Solutions About Founded on January 2012 Founders have extensive experience in seismic security systems Develop security solutions based on seismic technology Field proven systems

More information

G-MAX IVS R123 Vibration Sensors Perimeter Intrusion Detection System

G-MAX IVS R123 Vibration Sensors Perimeter Intrusion Detection System PS-4001-48461-A G-MAX IVS R123 Sensors Perimeter Intrusion Detection System Product Specifications G-Max Security Tech Ltd a l d o r e c o t e c L td. I n t e g r a t e d S e c u r i t y s y s t e m s

More information

Operation Manual Fighter ProVision Software. Version: 0.0 Revision: 1

Operation Manual Fighter ProVision Software. Version: 0.0 Revision: 1 Operation Manual Fighter ProVision Software Version: 0.0 Revision: 1 TABLE OF CONTENTS 1. Introduction 5 2. Software Installation 5 3. PC Users 6 3.1 Introduction 6 3.2 Default Code 6 3.3 Edit PC User

More information

SECURITY SYSTEMS. ipatrol. Unattended ground sensors. indracompany.com

SECURITY SYSTEMS. ipatrol. Unattended ground sensors. indracompany.com SECURITY SYSTEMS ipatrol Unattended ground sensors indracompany.com SECURITY SYSTEMS ipatrol The ipatrol System provides intrusion detection with image verification in wide areas with no civil works or

More information

Presented By. BEI Security

Presented By. BEI Security Presented By BEI Security Fiber Optic Perimeter Intrusion Detection Systems BEI Security 30 years of experience in security and surveillance Fiber optic perimeter detection Video motion detection Covert

More information

TW-8000 TAUT WIRE FENCE

TW-8000 TAUT WIRE FENCE TW-8000 TAUT WIRE FENCE www. rbtec. com Email: info@rbtecom GENERAL TW-8000 Product information INTRUDALERT is a powerful electronic system specifically designed for total perimeter protection of critical

More information

The system is expanded via the RCC network with each RCC capable of passing information to and from up to 31 detection or output devices.

The system is expanded via the RCC network with each RCC capable of passing information to and from up to 31 detection or output devices. FireCell Radio Hub Fully addressable Wireless activation Third party approved (EN54) 2-way radio communication Loop powered Diagnostics port Range in excess of 150 metres Overview The model FCX-500-001

More information

with internal sensor (channel 1) with an external sensor (channel 2) A-Editor software, Professional AK20 version (not for version AK4)

with internal sensor (channel 1) with an external sensor (channel 2) A-Editor software, Professional AK20 version (not for version AK4) Examples of use Example Creating an SMS-based alarm with confirmation A project file must first be created using the A-Editor software. This project file is then stored in the alarm modem. The alarm modem

More information

Security made in Germany

Security made in Germany Security made in Germany systems guard exhibits and pieces of art in collections and museums value of an object is usually only appreciated once the The object has been lost. Arthur Schopenhauer Small

More information

Octalarm-T: the latest in future-proof industrial alarm diallers

Octalarm-T: the latest in future-proof industrial alarm diallers Octalarm-T: the latest in future-proof industrial alarm diallers Companies are becoming increasingly reliant on computers and technical equipment. Meaning you have to take steps to guarantee continuous

More information

CONTENT version Piccolo Object protection

CONTENT version Piccolo Object protection CONTENT version 1.14 1: PICCOLO - WIRELESS PROTECTION... 4 HOW THE PICCOLO SYSTEM WORKS... 4 SYSTEM DESCRIPTION... 4 DETECTORS... 4 ALARM RECEIVERS... 4 CENTRAL UNIT & PC... 4 FORWARDING ALARMS (INTERFACES)...

More information

Introducing the innovative ipids Indoor Outdoor Detection System MANUFACTURING SECURITY SOLUTIONS

Introducing the innovative ipids Indoor Outdoor Detection System MANUFACTURING SECURITY SOLUTIONS Introducing the innovative ipids Indoor Outdoor Detection System 1 SENSITIVE Electronic Sensors installed on the perimeter fence, and communicating to a central computer. Can adapt to any type of fence.

More information

TYDOM 315. * _Rev.2* GSM domotics transmitter. 1. Presentation

TYDOM 315. * _Rev.2* GSM domotics transmitter. 1. Presentation TYDOM 5 GSM domotics transmitter ) Présentation. Presentation Delta Dore hereby declares that the equipment complies with the essential requirements and other relevant provisions of the R&TTE Directive

More information

PRODUCT CATALOGUE. Cape Town 18 Darter Road Blue Water Estate Kommetjie. Gauteng 245 Louis Botha Avenue Orchards Johannesburg

PRODUCT CATALOGUE.   Cape Town 18 Darter Road Blue Water Estate Kommetjie. Gauteng 245 Louis Botha Avenue Orchards Johannesburg PRODUCT CATALOGUE Cape Town 18 Darter Road Blue Water Estate Kommetjie Luke Fowles - 076 161 8124 luke@providenttech.co.za Frank Fowles - 082 445 1541 frank@providenttech.co.za www.providenttech.co.za

More information

SALES SUPPORT DOCUMENT

SALES SUPPORT DOCUMENT SALES SUPPORT DOCUMENT ML-1632 MAXLOGIC SUPERVISOR GRAPHIC MONITORING AND CONTROL SOFTWARE INTEGRATED WITH ENVIRONMENTAL SYSTEMS AND MANAGING ML-1632 supervisor software is a specially developed and easy

More information

>WIRELESS> ALARM SYSTEM CR200

>WIRELESS> ALARM SYSTEM CR200 intrusion >WIRELESS> ALARM SYSTEM CR200 INTRUSION HOME SECURITY CR200 is a Modern, Effective and Versatile 20-zone Household Security System. It is packed with simple Plug & Play functionality, designed

More information

Professional perimeter intrusion detection system

Professional perimeter intrusion detection system PROTECTS YOUR PERIMETER MORE EFFECTIVELY + Detects an intruder directly on the boundary of the protected area + Suitable for various types of fences + Gains sufficient time for the security operator for

More information

V1.0. Smart Home Alarm System. User Manual. APP download via QR Code scanning. Please read the manual carefully before using.

V1.0. Smart Home Alarm System. User Manual. APP download via QR Code scanning. Please read the manual carefully before using. V1.0 Smart Home Alarm System User Manual APP download via QR Code scanning Please read the manual carefully before using. Content FUNCTION PROFILE 2 THE SCHEMATIC GRAPH OF HOST 3 PROCESS OF BOOTING 6 OPERATION

More information

D3D Wi-Fi GSM Smart Alarm System -User Manual

D3D Wi-Fi GSM Smart Alarm System -User Manual D3D Wi-Fi GSM Smart Alarm System -User Manual D3D Wi-Fi / GSM Smart Alarm system (Model : D10). Please read all instructions carefully & follow steps for easy home installation. 1 P a g e D3D Wi-Fi / GSM

More information

WG Buried Fibre Cable Long Perimeter Detection System

WG Buried Fibre Cable Long Perimeter Detection System WI CODE : 11954 Telephone : +44 (01295 756300 Fax : +44 (0)1295 756302 E-Mail : info@wi-ltd.com Website : www.wi-ltd.com WG Buried Fibre Cable Long Perimeter Detection System The WG Buried Cable Long Perimeter

More information

Added password for IP setup page : Password must be in IP format!

Added password for IP setup page : Password must be in IP format! NETWORK POWER MONITOR Release : 21 August 2014 Hardware Version : Version 7 Firmware version 1.00 PC Application Software : Version (latest)...2 Added password for IP setup page : Password must be in IP

More information

Preface. Thank you for purchasing our GSM Security Alarm System ( The System )! The System will keep your home and property safe around the clock.

Preface. Thank you for purchasing our GSM Security Alarm System ( The System )! The System will keep your home and property safe around the clock. Preface Thank you for purchasing our GSM Security Alarm System ( The System )! The System will keep your home and property safe around the clock. The GSM Security Alarm ( The Alarm ) adopts the most advanced

More information

Laboratory Refrigerator/Deep Freezer TC 802

Laboratory Refrigerator/Deep Freezer TC 802 External Dimension: B = 600 mm D = 615 mm H = 2000 mm Inside Dimension: Useful space on top Useful space at the bottom B = 440 mm B = 431 mm D = 435 mm D = 435 mm H = 1105 mm H = 597 mm Capacity: 254 l

More information

With Magictrl, you can control MatiGard anytime & anywhere via your smartphone, even without data network.

With Magictrl, you can control MatiGard anytime & anywhere via your smartphone, even without data network. MatiGard User Guide 02 Menu Feature-------------------------------------------------------------- 05 Overviews---------------------------------------------------------- 07 Read Before Using-----------------------------------------------

More information

Operation Manual For model CM706E

Operation Manual For model CM706E Operation Manual For model CM706E www.temperatureguard.com The CM706E is an environmental monitor with built in Ethernet and Cellular alarming and reporting capabilities. This unit can monitor up to ten

More information

600 Range Dialer Installation Manual. Version 1.0

600 Range Dialer Installation Manual. Version 1.0 600 Range Dialer Installation Manual Version 1.0 The information contained is supplied without liability for any errors or omissions. No part may be reproduced or used except as authorised by contract

More information

DDS. Intruder Detection System for Surveillance and UNDERWATER Protection of Critical Infrastructures and Ships

DDS. Intruder Detection System for Surveillance and UNDERWATER Protection of Critical Infrastructures and Ships DDS Intruder Detection System for Surveillance and UNDERWATER Protection of Critical Infrastructures and Ships DDS 03 INTRUDER DETECTION SONAR Can be integrated into Surveillance Networks Easy manual 'over-the-side'

More information

idware Idware Remote Site Monitoring Solution

idware Idware Remote Site Monitoring Solution idware Idware Remote Site Monitoring Solution 2 TOPIC 1. Why a Remote Site Monitoring solution is mandatory for a TELCO? 2. Remote Site Monitoring features a) Power monitoring b) Security Monitoring c)

More information

The. Long Beach, California August 14-17, Solutions Network. Physical Security PERIMETER SECURITY TECHNOLOGIES. Leon Snyman GVI Security, Inc.

The. Long Beach, California August 14-17, Solutions Network. Physical Security PERIMETER SECURITY TECHNOLOGIES. Leon Snyman GVI Security, Inc. Long Beach, California August 14-17, 2005 The Solutions Network Physical Security PERIMETER SECURITY TECHNOLOGIES Leon Snyman GVI Security, Inc. Why Secure the Perimeter? Your Perimeter is Your FIRST line

More information

SMS GSM Alarm Messenger

SMS GSM Alarm Messenger SMS GSM Alarm Messenger Data Logging Alarm Input Relay Output Voice Temperature Humidity Analog Input Capture and Send Data via SMS Report triggered alarm via SMS Output triggered via SMS Auto pick up

More information

C&K Software What s New. Commander II Version 3.0 Monitor II Version 3.0 Satellite II Version 1.0

C&K Software What s New. Commander II Version 3.0 Monitor II Version 3.0 Satellite II Version 1.0 C&K Software What s New Commander II Version 3.0 Monitor II Version 3.0 Satellite II Version 1.0 C&K Software PC-based receiver with monitoring features Windows-based Remote programming software (Commander

More information

TURN OFF ALARM AUTO ALARM RESET WRITE A COMMENT DISPLAY THE GUARDS GUARD FUNCTION RELAY INTERFACE:...

TURN OFF ALARM AUTO ALARM RESET WRITE A COMMENT DISPLAY THE GUARDS GUARD FUNCTION RELAY INTERFACE:... CONTENT version 2.03 1: PICCOLO - WIRELESS PROTECTION... 3 HOW THE PICCOLO SYSTEM WORKS... 3 SYSTEM DESCRIPTION... 3 DETECTORS... 3 ALARM RECEIVERS... 3 PICCOLO SERVER UNIT... 3 FORWARDING ALARMS (INTERFACES)...

More information

PWM. Solar Charge controller with Ethernet. Solar Smart PWM 20Amp. Hardware Description : Release : 19 June 2014

PWM. Solar Charge controller with Ethernet. Solar Smart PWM 20Amp. Hardware Description : Release : 19 June 2014 Solar Charge controller with Ethernet Release : 19 June 2014 Hardware Version : Version 1 Firmware version 1 PC Application Software : Version 1.0.0.0 Hardware Description : The Solar Smart regulator was

More information

Perimeter Intrusion Detection System

Perimeter Intrusion Detection System System System Features & Advantages 1. Hardware Zone In hardware zone application, a perimeter is segregated into different detection zones deployed with several sets of sensing fibers. On the other hand,

More information

Fiber Optic Cable Fence Disturbance Sensor

Fiber Optic Cable Fence Disturbance Sensor Architectural & Engineering Specification for Fiber Optic Cable Fence Disturbance Sensor Purpose of document This document is intended to provide performance specifications and operational requirements

More information

INTREPID Perimeter Intrusion Detection System

INTREPID Perimeter Intrusion Detection System TM INTREPID Perimeter Intrusion Detection System Next Generation Perimeter Protection icropoint Cable combines patented Southwest Microwave technology with microprocessor power and laptop computer convenience.

More information

ATSTORM v2. The sensor with FCES technology is connected to the interface with a communication cable.

ATSTORM v2. The sensor with FCES technology is connected to the interface with a communication cable. ATSTORM v2 ATSTORM v2 is a storm detector that measures the environmental electric field. It is fully automatic, without mobile parts, robust and highly reliable The storm detector ATSTORM v2 basic configuration

More information

PIDS Sensor Installation & Maintenance. 15/03/13/Rev1/PIDS Sensor Installation & Maintenance 1

PIDS Sensor Installation & Maintenance. 15/03/13/Rev1/PIDS Sensor Installation & Maintenance 1 PIDS Sensor Installation & Maintenance 15/03/13/Rev1/PIDS Sensor Installation & Maintenance 1 The information contained herein contains proprietary information of ST Electronics (Satcom& Sensor Systems)

More information

The WAVE Plus Instant Notification System for Schools and Colleges

The WAVE Plus Instant Notification System for Schools and Colleges Instant Notification System for Schools and Colleges Duress alarm has been activated in the School of Engineering! Schools strive to provide a safe environment for students and teachers. In an emergency,

More information

Mobeye CM2410 GSM fire alarm communicator

Mobeye CM2410 GSM fire alarm communicator PORTAL USER MANUAL Mobeye CM2410 GSM fire alarm communicator Accessory for Ei Electronics fire detector SW version 5.n Incl. CM2400 Attention! Very important This user manual contains important guidelines

More information

Combined CAN Sensor Unit Temperature, Humidity and Smoke

Combined CAN Sensor Unit Temperature, Humidity and Smoke Combined CAN Sensor Unit Temperature, Humidity and Smoke Didactum`s IP-based monitoring devices have many uses: Monitoring of wiring closets and server room environments Remote monitoring of technical

More information

PROVEN PERIMETER PROTECTION NEW SINGLE-PLATFORM SIMPLICITY.

PROVEN PERIMETER PROTECTION NEW SINGLE-PLATFORM SIMPLICITY. SMARTER PERIMETER DETECTION SYSTEMS MicroPoint II Fence Detection System MicroTrack II Buried Cable Detection System MicroWave 330 Digital Microwave Link PROVEN PERIMETER PROTECTION NEW SINGLE-PLATFORM

More information

Inner Range FE3000S. Serial GSM Modem. P/No: INSTALLATION MANUAL

Inner Range FE3000S. Serial GSM Modem. P/No: INSTALLATION MANUAL Revision 1.0 October. 2014 1 Inner Range FE3000S Serial GSM Modem. P/No: 998306 INSTALLATION MANUAL IMPORTANT NOTE: This Installation Manual is only relevant to Serial GSM Modems utilizing the G-Link PCB.

More information

PROJECT PROPOSAL FOR INTRUDER DETECTION SYSTEM

PROJECT PROPOSAL FOR INTRUDER DETECTION SYSTEM Middle East Technical University Department of Computer Engineering Fall 2011 PROJECT PROPOSAL FOR INTRUDER DETECTION SYSTEM BEE - TECH Çağlar Seylan _1631126 Fatih Semiz _1752476 Güner Orhan _1631050

More information

KELTRON LS 7000 ALARM MANAGEMENT SYSTEM Keltron Alarm Monitoring, Dispatch, and Reporting Software

KELTRON LS 7000 ALARM MANAGEMENT SYSTEM Keltron Alarm Monitoring, Dispatch, and Reporting Software KELTRON LS 7000 ALARM MANAGEMENT SYSTEM Keltron Alarm Monitoring, Dispatch, and Reporting Software OVERVIEW The Keltron LS 7000 Alarm Management System software and computers make up the dispatch portion

More information

NX-10 wireless keypad. To wire or not to wire?

NX-10 wireless keypad. To wire or not to wire? NX-10 wireless keypad To wire or not to wire? Now your security goes where you go Our NX-10 system is fully wireless with a keypad in a designer housing. The NX-10 series goes where no security system

More information

PSM CONTROL & MANAGEMENT PRODUCT CATALOGUE. GAMATRONIC, A SolarEdge Division. 17 Hartom Street, Jerusalem , Israel

PSM CONTROL & MANAGEMENT PRODUCT CATALOGUE. GAMATRONIC, A SolarEdge Division. 17 Hartom Street, Jerusalem , Israel PSM CONTROL & MANAGEMENT PRODUCT CATALOGUE GAMATRONIC, A SolarEdge Division 17 Hartom Street, Jerusalem 9777517, Israel 1-800-20-70-90 Tel: +972-2-5888277 Fax: +972-2-5710663 SalesIL.Gama@solaredge.com

More information

Remote switching machines with a SMS text from your mobile phone! Remote Monitoring your assets in the worldwide by your mobile Phone!

Remote switching machines with a SMS text from your mobile phone! Remote Monitoring your assets in the worldwide by your mobile Phone! Remote switching machines with a SMS text from your mobile phone! Remote Monitoring your assets in the worldwide by your mobile Phone! GSM SMS Controller DCS-130 User Manual Ver 1.20 Date Issued: 14-9-2010

More information

Section 9 System Operation

Section 9 System Operation Section 9 System Operation Operation of the control panel is simple. Menus guide you step-by-step through operations. This section of the manual is an overview of the operation menus. Please read this

More information

Sentient. Downloader Manual D4854

Sentient. Downloader Manual D4854 Sentient Downloader Manual D4854 Dycon Ltd Tel: +44 (0)1443 471 060 Fax: +44 (0)1443 479 374 Cwm Cynon Business Park Mountain Ash CF45 4ER - UK www.dyconsecurity.com sales@dyconsecurity.com TABLE OF CONTENTS

More information

MOBILE CALL GSM Alarm System User s Manual

MOBILE CALL GSM Alarm System User s Manual MOBILE CALL GSM Alarm System User s Manual Profile For a better understanding of this product, please read this user manual thoroughly before using it. Contents Function Introduction (3) Alarm Host Diagram

More information

INTREPID Buried Cable Perimeter Intrusion Detection System

INTREPID Buried Cable Perimeter Intrusion Detection System INTREPID Buried Cable Perimeter Intrusion Detection System TM M icrotrack, the latest addition to Southwest Microwave s INTREPID TM family of intrusion detection products, is a new buried cable intrusion

More information

products and services

products and services products and services Welcome Energizers Keypads Monitors Communications Monitoring Electrical Accessories Fencing Hardware Agricultural Range 2 4 8 9 12 14 16 17 18 JVA ELECTRIC FENCING 1 Welcome to JVA

More information

Centaur TM II Cube Slave Alarm Signalling Equipment INSTALLATION GUIDE

Centaur TM II Cube Slave Alarm Signalling Equipment INSTALLATION GUIDE Centaur TM II Cube Slave Alarm Signalling Equipment INSTALLATION GUIDE General Description This guide provides a summary for installing and configuring the Centaur TM Cube Slave Alarm Signalling Equipment

More information

Section 8 System Operation

Section 8 System Operation Section 8 System Operation Operation of the control panel is simple. Menus guide you step-by-step through operations. This section of the manual is an overview of the operation menus. Please read this

More information

IntesisBox BACnet/IP Server - Notifier ID3000 series

IntesisBox BACnet/IP Server - Notifier ID3000 series IntesisBox Server - Notifier ID3000 series Gateway for integration of Notifier ID3000, ID3002, ID50 and ID60 fire panels into enabled control systems. Integrate your Notifier fire panels into your BACnet

More information

ViewMatrix. Software for Online Monitoring & Control of Matrix2000 Conventional Fire Alarm Panels. Version: 2.0 Revision: 0.1

ViewMatrix. Software for Online Monitoring & Control of Matrix2000 Conventional Fire Alarm Panels. Version: 2.0 Revision: 0.1 ViewMatrix Software for Online Monitoring & Control of Matrix2000 Conventional Fire Alarm Panels Version: 2.0 Revision: 0.1 CONTENTS 1. Introduction...3 2. Keyboard...5 2.1 POWER indication - Normal Operation...5

More information

Laptop / PC Programming Manual

Laptop / PC Programming Manual Laptop / PC Programming Manual Doc. # Fire PC Program rev B 01.07 This Document is property of Evax Systems, Inc. The Evax Fire Solutions Programmer Components 2 1.0 System Setup 4 1.1 Interface Setup

More information

Smoke Detector and Siren. Manual

Smoke Detector and Siren. Manual Smoke Detector and Siren Manual 004001 Smoke Detector and Siren Manual Quick Start... 2 Product Description... 2 Installation Guidelines... 3 Behavior within the Z-Wave Network... 3 Operating the Device...

More information

Technologies Hazard management system. Inveron Hazard management system

Technologies Hazard management system. Inveron Hazard management system Technologies Hazard management system Inveron Hazard management system OVERVIEW Inveron safety at a glance INTERFACES Flexibility via system independence The Inveron hazard management system from Minimax

More information

They ll never know... LEADERS IN WIRELESS SECURITY SURVEILLANCE EQUIPMENT

They ll never know... LEADERS IN WIRELESS SECURITY SURVEILLANCE EQUIPMENT They ll never know... LEADERS IN WIRELESS SECURITY C O V E R T & R E M O T E SURVEILLANCE EQUIPMENT ...but you will FM2000 is a monitored portable alarm system that has been specifically designed for use

More information

FALCON EYE Land Based Surveillance System

FALCON EYE Land Based Surveillance System Land Based Surveillance System SpecOps Group is a global technology innovation leader in security systems and autonomous border protection platforms. SpecOps Group provides a unique autonomous situational

More information

Please use authentic SATA hard drive, USB device and battery.

Please use authentic SATA hard drive, USB device and battery. Note The device should be set in the room with good ventilation, far from water, hot reservoir or dust. Network Video Recorder is not designed to be used outdoor. Please use authentic SATA hard drive,

More information

INTREPID Buried Cable Perimeter Intrusion Detection System

INTREPID Buried Cable Perimeter Intrusion Detection System TM INTREPID Buried Cable Perimeter Intrusion Detection System icrotrack, the latest addition to Southwest Microwave s INTREPID family of intrusion detection products, is a new buried cable intrusion detection

More information

INC. DESIGN AND INTEGRATION OF ADVANCED SYSTEMS. Multipli Cité REMOTE WATER TREATMENT MANAGEMENT SYSTEM

INC. DESIGN AND INTEGRATION OF ADVANCED SYSTEMS. Multipli Cité REMOTE WATER TREATMENT MANAGEMENT SYSTEM AUTOMATISATION INC. DESIGN AND INTEGRATION OF ADVANCED SYSTEMS Multipli Cité REMOTE WATER TREATMENT MANAGEMENT SYSTEM Multipli Cité REMOTE WATER TREATMENT MANAGEMENT SYSTEM Multipli Soft Automatisation

More information

PREVENTIVE PROTECTION PROTECCIÓN PREVENTIVA

PREVENTIVE PROTECTION PROTECCIÓN PREVENTIVA PREVENTIVE PROTECTION PROTECCIÓN PREVENTIVA R PREVENTIVE PROTECTION ATSTORM v2 is a storm detector that measures the environmental electric field. It is fully automatic, without mobile parts, robust and

More information

IMS Operation Manual. Version 1.1. Phonetics, Inc.

IMS Operation Manual. Version 1.1. Phonetics, Inc. IMS 4000 Operation Manual Version 1.1 Phonetics, Inc. IMS-4000 Operation Manual Every effort has been made to ensure that the information in this document is complete, accurate and up-to-date. Phonetics,

More information

ACTIVE INFRARED BARRIER

ACTIVE INFRARED BARRIER Although PROTECH provides high security indoor intrusion sensors for the military and government markets, our specialty is outdoor protection. Since we first introduced our PIRAMID outdoor dual technology

More information

Cold chain monitoring technologies. Facility monitoring

Cold chain monitoring technologies. Facility monitoring Cold chain monitoring technologies Facility monitoring Advanced wireless data logging system - Cobalt For various controlled environment facilities, equipments and transport conditions, real time monitoring

More information

Architectural and Engineering Specification for a Fence-Mounted Perimeter Intrusion Detection System. FlexZone

Architectural and Engineering Specification for a Fence-Mounted Perimeter Intrusion Detection System. FlexZone Architectural and Engineering Specification for a Fence-Mounted Perimeter Intrusion Detection System FlexZone April 15, 2014 Page 1 of 14 G6DA0115-001 This document is intended to provide performance specifications

More information

GSM House Alarm System. User Manual. Ver 1.20 Date Issued:

GSM House Alarm System. User Manual. Ver 1.20 Date Issued: GSM House Alarm System User Manual Ver 1.20 Date Issued: 2010-05-14 Table of Contents 1. Brief introduction -----------------------------------2 2. Safety Directions -----------------------------------2

More information

All tested. Easy Series Intrusion Control Panel Making security easy featuring wlsn* * wireless Local SecurityNetwork

All tested. Easy Series Intrusion Control Panel Making security easy featuring wlsn* * wireless Local SecurityNetwork All tested Easy Series Intrusion Control Panel Making security easy featuring wlsn* * wireless Local SecurityNetwork 2 A powerful yet straightforward intrusion control panel A powerful intrusion control

More information

The Genesis. Wireless PIR System. Se t t i n g n e w s t a n d a r d s f o r P I R d e t e c t i o n. BS8418 Compliant

The Genesis. Wireless PIR System. Se t t i n g n e w s t a n d a r d s f o r P I R d e t e c t i o n. BS8418 Compliant Se t t i n g n e w s t a n d a r d s f o r P I R d e t e c t i o n The Genesis Wireless PIR System BS8418 Compliant S e t t i n g n e w s t a n The Genesis Wireless PIR System BS8418 compliant The GENESIS

More information

Ethernet General Purpose

Ethernet General Purpose Ethernet General Purpose Technical Manual Revision 1.03 8 November 2013 Pakton Technologies IO PAE224 Ethernet GPIO Manual.docx Page 1 of 22 Revision 1.03 Last updated 8/11/2013 Table of Contents INTRODUCTION...3

More information

The Kentec driver connects to the Kentec Syncro range of fire detection panels. Available for Commander and ObSys.

The Kentec driver connects to the Kentec Syncro range of fire detection panels. Available for Commander and ObSys. The Kentec Driver The Kentec driver connects to the Kentec Syncro range of fire detection panels. Available for Commander and ObSys. This document relates to Kentec driver version 1.1 to 1.3 Please read

More information

Revision November 2013 JVA Technologies. Ethernet General Purpose IO Technical Manual

Revision November 2013 JVA Technologies. Ethernet General Purpose IO Technical Manual Revision 1.03 8 November 2013 JVA Technologies Ethernet General Purpose IO Technical Manual www.jva-fence.com.au Table of Contents INTRODUCTION...3 Scope and Purpose...3 Glossary...3 SPECIFICATIONS...4

More information

BURGLAR ALARM PANEL BS-468

BURGLAR ALARM PANEL BS-468 BURGLAR ALARM PANEL BS-468 Contents 1. Description... 3 2. Instructions for the user... 4 2.1Basic operations... 4 Complete system.... 4 Split system.... 4 2.2 Armed system indication... 5 2.3 Advanced

More information

Protecting Station Platform & Rail Perimeters. TransitVUE IDS The Latest in Fiber Optic Station Platform & Rail Perimeter Security Sensor Systems

Protecting Station Platform & Rail Perimeters. TransitVUE IDS The Latest in Fiber Optic Station Platform & Rail Perimeter Security Sensor Systems TransitVUE IDS The Latest in Fiber Optic Station Platform & Rail Perimeter Security Sensor Systems Transit Applications Station Platforms and Security Gates Train Track & Highway-Rail Intersections Fenced

More information

CAN unit for Analog Sensors

CAN unit for Analog Sensors CAN unit for Analog Sensors Didactum`s Monitoring Systems have many uses: Monitoring of wring closets and server room environments Remote monitoring of technical rooms in branch offices Monitoring of power

More information

HERCULES 6 GRAPHICS SYSTEM

HERCULES 6 GRAPHICS SYSTEM HERCULES 6 GRAPHICS SYSTEM USER MANUAL Protec Fire Detection PLC, Protec House, Churchill Way, Nelson, Lancashire, BB9 6RT. Telephone: +44 (0) 1282 717171 Fax: +44 (0) 1282 717273 Web: www.protec.co.uk

More information

TS400. Operating Manual. Test Station for Microtector II Series (G450/G460)

TS400. Operating Manual. Test Station for Microtector II Series (G450/G460) Operating Manual TS400 Test Station for Microtector II Series (G450/G460) GfG GESELLSCHAFT FÜR GERÄTEBAU MBH KLÖNNESTRASSE 99 44143 DORTMUND, Germany TEL. +49 / (0)2 31 / 5 64 00 0 FAX +49 / (0)2 31 /

More information

GSM POWER ALARM SYSTEM

GSM POWER ALARM SYSTEM GSM POWER ALARM SYSTEM Design Scheme GSM Alarm Receiver PH-008 Centre Monitoring Software PH-BC110 Summarize The stolen of the power facilities such as transformer, cable line and so on are serious both

More information

IP & SMS Alarm Communicator

IP & SMS Alarm Communicator Models: WGSMSC You deserve to feel safe, secure & protected IP & SMS Alarm Communicator Quick Start Guide Thank you for purchasing a Watchguard IP & SMS Alarm Communicator This Quick Start Guide covers

More information

- Basic information of Laser Scan detector

- Basic information of Laser Scan detector Laser Scan detector RLS-3060 - Basic information of Laser Scan detector OPTEX CO., LTD. Product overview Laser Scan detector RLS-3060 utilises Time of Flight technology. RLS-3060 does not require any PC

More information

FlexPS. Architectural & Engineering. Specification for FlexPS. Architectural/Engineering Specification for a

FlexPS. Architectural & Engineering. Specification for FlexPS. Architectural/Engineering Specification for a Architectural/Engineering Specification for a Fence-Mounted Perimeter Intrusion Detection System FlexPS Disclaimer Senstar, and the Senstar logo are registered trademarks, and FlexPS, Silver Network and

More information

WG Buried Cable Perimeter Detection System

WG Buried Cable Perimeter Detection System Telephone : +44 (01295 756300 Fax : +44 (0)1295 756302 E-Mail : info@wi-ltd.com Website : www.wi-ltd.com WG Buried Cable Perimeter Detection System The WG Cable Detection Sensor is a covert outdoor perimeter

More information

TOTAL PERIMETER SOLUTION

TOTAL PERIMETER SOLUTION TOTAL PERIMETER SOLUTION INTRODUCTION Since 1986 RBtec has been recognized as a leading technology company specializing in the design, development, and manufacturing of quality Outdoor Perimeter Detection

More information

GSM RFID VOICE Alarm System

GSM RFID VOICE Alarm System GSM RFID VOICE Alarm System User s Manual For a better understanding of this product, please read this user manual thoroughly before using it. CONTENTS [Function Instruction] [Control Panel] Control Panel

More information

Control panel «Contact GSM-5-2»

Control panel «Contact GSM-5-2» Control panel «Contact GSM-5-2» Operating Manual Rev. 1.1 Saint Petersburg, 2017 Table of Contents Introduction 4 Panel Overview 5 Designation 5 Capabilities 6 Specifications 9 Design 11 Delivery Package

More information

Section PERIMETER SECURITY SYSTEMS

Section PERIMETER SECURITY SYSTEMS Section 28 16 43 PERIMETER SECURITY SYSTEMS PART 1 GENERAL 1.1 SUMMARY A. Provide and install a perimeter security system as herein specified for the purpose of detecting entry into a designated security

More information

Flexibility. adjusted to specific needs of a client.

Flexibility. adjusted to specific needs of a client. IFTER EQU IFTER is a well known manufacturer of the building management systems software, which includes: Fire Alarm Systems (FAS), Access Control Systems (ACS), Intruder & Hold Up Alarm Systems (I&HAS),

More information

Ontech GSM 9040/50. Reference Manual English -1 -

Ontech GSM 9040/50. Reference Manual English -1 - Ontech GSM 9040/50 Reference Manual English -1 - Content Welcome... 5 This manual... 5 Text styles... 5 Support... 5 Disclaimer... 5 Overview... 6 Accessories... 6 External temperature sensor 9901... 7

More information

PowerMaxComplete. All-in-one Professional Grade Wireless Security

PowerMaxComplete. All-in-one Professional Grade Wireless Security PowerMaxComplete All-in-one Professional Grade Wireless Security PowerMaxComplete Visonic's PowerMax Complete is an innovative all-in-one professional grade wireless security system for homes and small

More information

CO SENSOR CARBON MONOXIDE DETECTOR

CO SENSOR CARBON MONOXIDE DETECTOR CO SENSOR CARBON MONOXIDE DETECTOR One device, many features The FIBARO is an ultra-light, compact, battery-powered carbon monoxide detector, designed to be placed on a wall. Its high sensitivity allows

More information

Messenger Wireless Lock Access Network

Messenger Wireless Lock Access Network Messenger Wireless Lock Access Network SAFLOK TM introduces the next era of online communication with Messenger TM operating on a ZigBee-compliant platform. The ZigBee Prostack protocol is an internationally

More information

Сontrol panel Contact GSM-9N

Сontrol panel Contact GSM-9N Сontrol panel Contact GSM-9N Data sheet Device identification number 2 1. General Information The Contact GSM-9N control panel (hereinafter referred to as the device) is designed for setting up security

More information

DI220 Using the Optional Docking Station The maintenance and operating functions of the Micro IV can be automated with the Micro IV Docking Station.

DI220 Using the Optional Docking Station The maintenance and operating functions of the Micro IV can be automated with the Micro IV Docking Station. DI220 Using the Optional Docking Station The maintenance and operating functions of the Micro IV can be automated with the Micro IV Docking Station. The following steps outline the correct sequence to

More information

Fitting instructions

Fitting instructions Fitting instructions Ver. 02_English 02. 11. 2017 CONTENT 1 INTRODUCTION... 3 2 FITTING THE PATRIOT EU... 3 2.1 Electronic diagram... 3 2.2 Fitting instructions... 4 2.3 Final placement... 4 2.4 Alarm

More information

1. User features of the GSM dialer

1. User features of the GSM dialer 1. User features of the GSM dialer The JA60GSM dialer offers many useful features described in detail below. The installer should properly demonstrate the use of the system to the user after installation

More information

GSM Alarm System. S120 User Manual. Ver 1.00 Date Issued:

GSM Alarm System. S120 User Manual. Ver 1.00 Date Issued: GSM Alarm System S120 User Manual Ver 1.00 Date Issued: 2010-09-01 Website: Http://www.thebest-plus.com Table of Contents 1. Brief introduction -----------------------------------2 2. Safety Directions

More information