Securitas Central System

 

 

Introduction

  • The technological development has brought large improvements also to the field of security technology, especially for the central alarm units against fire and intrusion.

  • This means for example SECURITON SMS 500 detection system can be extended to modular structure for up to 40 alarm lines with up to 255 alarm groups, divided into up to 32 areas of detection.

Top

 

ILS 5000

The SECURITON ILS 5000 Information and Processing System

The ILS 5000 system has been developed in consideration of the following criteria:

  • The possibility to connect also other than SECURITON safety systems
  • The microprocessor-controlled central alarm unit makes it possible to program all customized parameters on site, automatically addresses the detectors and operational devices, make individual requests of their states and so on.
  • On the other hand, additional detectors/operational devices can be easily connected without large expenses, due to the tamper proof transmission line SECURILINEŽ.

    Top

The System Structure

  • The ILS software allows the information of a hierarchical structure of the connected safety systems up to the individual detectors.
  • The possibility of additionally being able to switch internal technical systems on and off, to make requests concerning their status and to receive fault messages.
  • Very strict criteria concerning the functional and system security.Largest possible ease of operation.
  • Modular structure in order that systems in different sizes can be set up without the need of software changes.


Top

The Safety Philosophy

Special care has been taken for the system and functional safety. The safety levels corresponds at the least to that of the safety systems connected:

  • It is possible to determine what function each user is allowed to carry out. This prevents authorized persons from carrying out critical ILS-functions (e.g. look at passwords). However, the system protection is not yet sufficiently realized by the functional restrictions.

  • It may be convenient to also define the groups, areas or systems a user is allowed to work on. This is made by allocating so-called privilege keys to those units, which is very similar to a key plan.

Top

 

The Operational Comfort

Normally, operation is reduced to the pressing of functional keys, the present assignment of which can be taken from the corresponding menu, or the system is operated by pressing keys with preset meanings.

In the case of alarm or failure, the description of the incident is displayed on the operator screen. Furthermore, the screen displays the exact location of the incident, the predefined collection of actions to be taken as well s the present assignment of the functional keys, such as 'reset of the acoustic alarm'.

Moreover, the place of an incident (alarm, failure) can be displayed graphically on a graphics terminal in the form of a ground plan. Besides the alarm processing, the ILS-software offers several more functions, such as:

  • Requests: The state of the connected systems can be interrogated as far down as the detector level. All systems are listed on the screen, and by pressing the appropriate function key, the selected object (e.g. a building), then the desired area (e.g. story in the building), the desired group (e.g. room in the story), and finally a list of the detectors of this group with their states (on, off, alarm, revision) may be successively selected. The selection is made according to its textual contents.
  • Control: The connected systems can be controlled from the central unit. All control functions, which can be used on the connected systems themselves, can be carried out from here.
  • Modification: These functions are only accessible to the system administrator and refer to the modification of the user profile function and the interventions.


Top

 

The Hardware

The ILS central unit consists of a powerful Eclipse central processing unit (CPU) by Data General and the AOS/VS operating system.

  • Depending on complexity and size of the systems connected, central and peripheral memories of corresponding sizes are used. The normal configuration consists of 4MB RAM, 70-MB hard disk, 22MB cartridge tape and a 737KB-diskette drive.
  • Up to 32 autonomous safety systems (intrusion, attack, perimeter protection, fire, access control) and up to 16 peripheral devices for the operation of the central alarm unit may be connected to the V24/RS 232 interfaces. Normally, monochrome text terminals, color graphics terminals and printers are used as operational devices.

Top

 

System Configuration in Case of Local Integration

Local integration means monitoring and control of several safety systems within one building. Data transmission is made via LAN (Local Area Network).

Top

 

Systems Configuration in Case of Geographical Integration

Geographical Integration means connection of several geographically decentral buildings (branches, agencies) to the ILS central unit.

Here, again, the individual branches may be equipped with several safety systems.

  • Data transmission between the central building and the branches is effected via WAN-modem or own leased lines.

  • The PADs integrated in the main computer (central building) and in the node (branches), respectively, provided for the batch-wise data transmission.
  • To prevent possible data theft, in some cases in the central building and in the individual branches encoders/decoders can be integrated.
  • Technical facilities, such as heating, air conditioning, and ventilating systems and lifts etc. can also be switched on and off from the central unit.
  • Moreover, possible failures can be received. DARES (Data acquisition and remote control system), integrated in racks, provided for the digital inputs and outputs between the central unit and the technical systems.

Top

 

E-mail : 24hrs@securitas-lebanon.com
Tel : +961-1-897 090  / 897 831  fax: +961-1-879 479
Center Securitas, Bauchrieh, P.O.Box 901032, Beirut, Lebanon.

Designed by www.libanmall.com