
VIII. DOWNLOADING PRIMER
(Remote Downloader is not a UL aDDroved feature)
WNAT
is
DOWNLOADING?
HOW DOES
DOWNLOADING
WORK?
ADWSORIES
Downloading allows the operator t; “remotely access: program, and
control the
security system over normal telep~ne tines. Anything that can be done direct.-
from the keypad can & done remotely, using DOWNLOADING. To Download,
the following is required:
1.
3.
4.
An IBM PC, or compatible com~ter with MS DOS 3.1 or higher, to run the
DOWNLOADING program. MS DOS stands for: Microsoft Disk Operating
System.
A HAYES 1200 SMARTMODEM (external: level 1.2 or highe~
internal: level
1.1
or Ngher). If these levels cannot be found locally, an external modem can
be purchased from ADEMCO, or contact HAYES for a free update, Ofher
brands are not corrrpatib/e, even if c/airrred to be 700% mrrrpafib/e.
4130PC V-LINK@ DOWNLOADING software, from ADEMCO. This software is
available in kth 3-1/7 (4130 P3-3) and 5-1/4 diskettes, and includes a
wmplete Usefs Manual.
At the protected premises, the Control panel must be connected to the existing
telephone line (refer to the PHONE LINE CONNECTIONS section). No
programming of the panel is required before downloading to an
intial installation.
To download, do the following:
1.
2.
3.
Enter the installer We +~#] + [5]. The panel temporarily enables a ring munt
of 5 and sets the Download Callback option to”1 - (callback not required).
Call the panel using the downloader software set to “FIRST
COMMUNICATION rode.
The downloader will establish a session with no callback. The oanel
information can then be downloaded.
In order to remotely awess, mntrol, or program the alarm panel, a “lin~ must be
established between the mmDuter and the control oanel. as follows:
1.
2.
3.
4.
5.
6.
7.
1.
2.
The computer calls up the ‘Control panel. (The’ phorie number for eat’
customer is entered into the customers account file on the mmputer). ~.
The Control panel “answers” at the pre-programmed ring count and executes
a handshake with the computer.
The computer sends a request for call-back to the Control, unless call-back is
not required.
The panel acknowledges the request and hangs up. During the next few
semnds, the Control will process the request making sure certain encrypted
information, re~ived from the mmputer, matches its own memory.
UpOn a successful match, the Control panel will seize the phone line and call
the computer back, unless call-back is not required.
The computer answers, usually by the second ring, and executes a
handshake wih the panel.
The panel then sends other default information to the mmputer. If this
information matches the computer’s information, a successfu I link is
established. This is known as being “ON-LINS.
Alarm and trouble res~nses ati reports are disabled during on-line time.
Should an event occur during this time, the response will take place and the
report will go through as soon as the rem’2 access sequence is camoleted.
Alarm and trouble condtions are not ignores, they are simply delayed.
The keypads are inactive during downloading communication, and resume
normal functions after hang up. All keypad entries are ignored during on-tine
time.
. .
-54-
Comentarios a estos manuales