Formats for transmitting and receiving NAVIgard messages. Converter of alarm codes from ContactID to SMS Requests for the ademco contact id protocol


______________________________________________________________________________________________

CID = Contact ID- the most common highly informative format for transmitting alarm messages in the world.
CID is supported by all leading control panel and monitoring receiver manufacturers.
Based on the set of criteria for evaluating message transmission channels given in this table, and based on the results of the functional-cost analysis of the receiving and transmitting sides, recommended use transmission format GPRS with redundancy/duplication CLIP

▼ Descriptions of message transmission and reception formats:
GPRS- transfer of Contact ID to a static IP address using the GPRS service of a GSM operator.
Messaging options:
1. transfer of Contact ID to the static IP address assigned to the SIM card* of the monitoring GPRS extender.
2. transfer of Contact ID to the static IP address of the GPRS server.
. A GPRS report is considered delivered if the transmitter receives a response from the monitoring GPRS extender (server) that the extender (server) has successfully received the report.
*SIM card with a static IP address is a special service of the GSM operator. This is a special SIM card with an open GPRS service; when you access the Internet using this service, the operator’s GPRS server will always assign the same IP address when connecting. You will need to obtain this address from your GSM operator.

Question

When a connection is established between the receiver and transmitter There is no connection as such. Communication between devices and receivers is established when a signal appears. Control is carried out based on the integrity of the information package with the issuance of confirmation. When the transmitter is turned on and kept active
Time to send one report 5-60 sec - most of the time is spent on opening a GPRS session and establishing a connection to transmit the report Less than 1 sec - for today we have BEST indicator in the GPRS transmitters market
How much traffic does one report take? 84 bytes*+ 24 bytes confirmation acceptance of report 35 bytes* + 8 bytes confirmation acceptance of the report
Number of simultaneous connections 1 6000

*traffic for which the telecom operator will demand money is very different from the actual sent/received traffic.
The reason is rounding, with the accuracy specified by the operator, for a certain period of time, i.e.: if the operator rounds traffic with an accuracy of 100 kb every 15 minutes (common practice), and every 15 minutes any information exchange occurs (test E703, reconnection, service signals to maintain connection, etc.), then 4 * 24 * 30 * 100 kb = 281 MB of traffic will be presented for payment per month. Moreover, the accuracy of rounding and the period during which rounding occurs, even within the tariff plans of the same operator, vary greatly. The best option for the transmitter would be to choose a tariff plan with unlimited Internet, with further analysis of the operator’s integrity.

CID IP- transmission of Contact ID in digital form to a static IP address via an Ethernet channel.
. The CID IP report is considered delivered if the transmitter receives a response from the monitoring receiver that the receiver has successfully received the report.

CID UDP - transmission of Contact ID in digital form to a GPRS receiver using the GPRS channel of a GSM operator via the UDP protocol. Several event codes can be transmitted in a UDP report during one communication session.
. A UDP report is considered delivered if the transmitter receives a response from the monitoring receiver that the receiver has successfully received the report.
NEW! Instead of a static IP address, you can use yours Domain name for transmitting GPRS / CID UDP / CID IP reports.

CLIP- transmission of reports using automatic identification of the SIM card number in the GSM network. The message itself is the fact of the call. 2 seconds after picking up the handset, the connection is terminated before the call starts charging.
. The CLIP report is considered delivered (handshake) if the transmitter has received a response from the telecom operator that the subscriber (NV DG/DT 2xxx/3xxx receivers) has picked up the handset.

CID SMS
Sending and receiving Contact ID in the form of text messages to GSM receivers NV DG XXXX, using the SMS service of the GSM operator.
. The CID SMS report is considered delivered if the transmitter receives a response from the SMS center of the telecom operator that the SMS message has been accepted by the SMS center.

CID DialUp is the same as CID DTMF, but the entire message path runs entirely over a wired communication line, without using the GSM network.

SMS - sending and receiving text messages using the SMS service of the GSM operator.
. An SMS report is considered delivered if the transmitter receives a response from the SMS center of the telecom operator stating that the SMS message has been accepted by the SMS center.


ALARM - a call to a telephone with the transmission of conditional tones / voice messages using the voice channel of a GSM operator.
. The ALARM report is considered delivered if the transmitter receives a response from the telecom operator that the subscriber has picked up the handset.

VOICE - a call to a telephone with the establishment of a two-way direct voice connection using the voice channel of a GSM operator.
. A VOICE report is considered delivered if the transmitter receives a response from the telecom operator that the subscriber has picked up the phone.

MMS - transmission of video, audio and graphic messages using the MMS service of the GSM operator.
. An MMS report is considered delivered if the transmitter receives a response from the telecom operator’s SMS center stating that the MMS message has been accepted by the SMS center.

CID DTMF - Transfer of Contact ID in analog form to wired monitoring stations using the voice channel of the GSM operator. Several event codes can be transmitted in a DTMF report during one communication session if more than one event occurred at the time of transmission.
. A DTMF report is considered delivered if the transmitter receives a response from the monitoring receiver that the receiver has successfully received the report.

Sergey Zabelin
July 2005

"Presto" - a new format for transmitting notifications over dial-up telephone connections in fire and security alarm systems

There are a great variety of formats for transmitting notifications over a telephone line to an alarm system; some types of object devices even allow you to design a format almost “manually” during programming, specifying individual elements and parameters for message transmission. But, despite this, all these formats are like two peas in a pod, and all of them, to a slightly greater or slightly lesser extent, have the same disadvantages.

Notification in all formats is a certain sequence of decimal digits, each of which is encoded during transmission either by DTMF 1 message (for high-speed formats) or by a series of tone-filled pulses (for low-speed formats). Reception is confirmed by a single-tone message of a specified frequency and duration. The frequencies, durations and interpretation of numbers in different formats may differ slightly, but this does not change the essence. Therefore, the ADEMCO ID Contact format, which has become the most widely used (one might even say that its distribution is overwhelming), was chosen for consideration; this format is recommended for use by the Main Directorate of Military Education of Russia. But what is said below applies equally to all other formats.

So, why are we not satisfied with ADEMCO ID Contact?

Modulation with dual-frequency bursts is far from the most effective way of encoding information in terms of resistance to distortion in the communication channel and the minimum acceptable signal-to-noise ratio. The permissible range of changes in the signal amplitude, in which stable detection of DTMF is still ensured, is not higher than 30 dB (moreover, it is unacceptable to exceed the signal amplitude - the signal is limited, and its spectrum is irreversibly distorted, or to reduce it - the signal is lost at the noise level), the minimum permissible signal ratio noise - 12 dB.

These restrictions do not play a significant role in the telephone channel High Quality- there they are easily performed, but, alas, in the vastness of our homeland, high-quality telephone channels are not yet very common. Quite often there are cases when the attenuation in the channel exceeds 30 dB, especially in the high-frequency part of the spectrum, and noise and interference in the channel - 12 dB. This is caused by both outdated equipment on a significant part of the telephone exchange and the length of communication lines to the telephone exchange (which often reaches 10 km or more).

This problem is even more aggravated when transmitting a DTMF signal over the voice channel of the GSM network. The fact is that the GSM voice path is designed exclusively for transmitting a speech signal, and uses powerful vocoder compression systems with losses focused on speech spectrum statistics. Vocoder compression provides very good signal compression (the voice channel is encoded from the nominal 64 kb/s to 9600 b/s!) with acceptable quality of speech signal reproduction, but any modulated signal in such a channel is subject to very large distortions. This especially applies to the DTMF signal, which, as the name implies (Dual Tone Multi Frequency), always contains two frequencies in the instantaneous spectrum, and GSM compression is optimized for signal transmission, in the instantaneous spectrum of which there is one prevailing frequency. Therefore, transmission methods based on modulation in one way or another (AM, FM, FM) of one carrier frequency, although they also lead to significant signal distortion, are still to a lesser extent than DTMF. The use of EFR 2 encoding slightly improves the situation, but, again, not all cellular operators and not in all regions support EFR encoding.

Another drawback of ADEMCO ID Contact (and all similar formats) is the completely insufficient degree of control over the reliability of the received message. To control reliability, only one control symbol is used, calculated as the arithmetic sum modulo 15 of all other symbols.

Errors that occur during transmission are an unpleasant phenomenon, but within certain limits they are acceptable - after all, a message received with an error is not acknowledged by the receiving device, and the object device will try to transmit it again and again until the transmission fails. will be successful. Errors only lead to an increase in the average delivery time of messages.

But this scheme only works if the receiving device detects this error. And the control method used - one digit modulo 15 leads to the fact that statistically, on average, every fifteenth error remains undetected - the checksum accidentally turns out to be correct, despite the distortion of information symbols. In this case, the receiving device confirms reception, the object device also thinks that everything is in order - the message was transmitted successfully, in general, everyone is happy. Except, of course, for the user, whose message, perhaps the most important message, was incorrectly interpreted and did not actually reach.

Further. Let's consider the transmission speed, notification delivery time and the throughput of the receiving device. Typically, a notification is just a few bytes of useful information, and the transmission speed is not critical. But, still, up to certain limits.

One DTMF send corresponds to 4 bits and is transmitted in 100 ms (50 ms send and 50 ms pause), that is, the transmission speed is 40 bps (in the best case). In fact, less, since only characters 0..9 are used for encoding (with the exception of the identification number), that is, the information transmission speed is no longer higher than 32 bps, and the method of packing information in ID Contact is quite loose. Therefore, the transmission time of a notification containing 6 bytes of useful information is 1.6 s, and taking into account the receipt of a confirmation signal - 2.8 s.

This seems to be a short (but still noticeable) time, but we must also take into account that quite a lot of complex systems security systems with a large number of zones and high information content. And notifications in such systems rarely go one by one. As a rule, a packet of 3...5 notifications is transmitted, that is, the average communication session time is about 10 s or more. And if we also remember about the inevitable errors in the communication channel, and the retransmission of notifications caused by them, then it becomes clear that using the ADEMCO ID Contact protocol we cannot count on the average delivery time of notifications (excluding dialing time) and the average session duration communication less than 10-20 s.

From the point of view of the notification delivery time, this time does not look very annoying, since one should add to it the inevitable time for establishing communication (dialing a number and connecting the line) - about 5..10 s, but from the point of view of the throughput of the input channel of the receiving device, the reduction in the average session time communication would be highly desirable.

According to the standards established by the GUVO of the Russian Federation, there should be no more than 200 facility devices per telephone line of the receiving device. It is believed that with this ratio the probability of delivering a notice “on the first try” is quite high. But it should be noted that in most security departments this norm is exceeded, sometimes several times - due to the insufficient number of input telephone lines and the high cost of their maintenance. Obviously, reducing the average duration of a communication session from 10 s to 3-4 s would make it possible to increase the number of objects served by one telephone line by 3 times!

And when using communication channels with time-based payment (for example, GSM), reducing the average duration of a communication session has another very significant advantage - time, which in this case is money.

Let's consider one more aspect, perhaps the most important one - the resistance of the notification transmission protocol to malicious actions. We see that in this part the ADEMCO ID Contact protocol is not protected at all. For example, we can assume the following pattern of actions by an attacker.

An attacker finds out the identification (remote) number of the protected object - this, as a rule, is not difficult; he purchases any security panel and programs this number on it. After entering a protected facility, the security panel at the facility transmits a notification to the centralized security console, saying, “I have an alarm.” After that, the attacker connects his own device (with the same identification number) to the telephone line and sends a notification to the remote control about disarming and canceling the alarm. The usual practice of security departments in such a situation is to cancel the departure of the detention group and calm down. And no one bothers the attacker anymore.

More complex schemes of an attacker’s actions are also possible; we will not reveal all the secrets here. But we note that the possibility of assigning an identification number to the UOO by the user, the lack of identification of a specific instance of the device by a message received from it, and the lack of encryption pose a potential threat of hacking the facility’s security system.

Well, the last consideration, which the author considers to be a certain drawback of the ADEMCO ID Contact protocol. The fact is that this protocol is one-way, that is, information can only be transmitted from the object to the centralized monitoring console, and it is fundamentally impossible to transmit it in the opposite direction. This limitation does not allow the implementation of some functions that are useful to both the user and the security console; for example, remote programming of the OOO from the security console, control and monitoring of its condition, both by the user and the security console. But we live in the third millennium, and such functions would be relatively easy to implement, increasing the consumer value, ease of operation of the UOO and its reliability. (To be fair, it should be noted that some security panels from some manufacturers do support a remote programming mode, but this function is available via a different communication channel and a separate, proprietary protocol, that is, it does not allow its integration into common system security).

Taking into account all the above considerations, a new format for transmitting notices was developed, called “Presto”, in which, if possible, the noted shortcomings were eliminated.

As has already been indicated, the amount of information transmitted from security systems to the security console is tiny, and therefore there is no point in pursuing high transmission speeds; reducing the time to establish communication is much more important. And the physics of the processes of modulation - demodulation of signals is such that the higher the transmission speed we want to obtain, the longer it takes for the receiver and transmitter to enter into synchronization (carrier capture, setting bit synchronization, setting transmission levels, compensating the phase characteristics of the path, suppressing echo reflections etc.). For example, modern modems provide transmission speeds of up to 33.6 Kbit/s (this, by the way, is the theoretical maximum for a telephone channel, determined by Shannon’s theorem), but their connection establishment time is at least 15 seconds. It would be quite stupid to establish a connection within 15 seconds and then transmit 1-2 notifications in one millisecond.

Well, an equally important factor that must be taken into account when choosing a transmission speed is to achieve maximum reliability and resistance of the communication protocol to distortions and interference in the channel, which, in general, are inversely related to the transmission speed.

Based on these considerations, a compromise solution was chosen - a speed of 300 bps. At this speed, the transmission time of one notification is about 100-200 ms, with an acceptable communication establishment time - consistent with the transmission time of one or two notifications.

The modulation method chosen was relative phase shift keying (RPK) of a 914 Hz carrier with coherent baud synchronization (3 carrier periods per transmitted bit). This method provides the highest resistance to interference and distortion of the telephone channel and allows for effective demodulation in a digital way (carrier selection using a PLL based on a Costas loop, correlation reception, intelligent frequency and phase capture)

Taking into account the fact that, as a rule, in modern systems Security notifications are transmitted in batches; the packet format allows for the transmission of several notifications in one package; this also made it possible to significantly reduce the average time of a communication session.

To control the reliability of received data, each packet is accompanied by a 16-bit polynomial control code (CRC), the polynomial X16+X15+X2+1 is selected as a generator. This method control allows you to reliably detect any single, double and triple errors, error packets up to 17 bits long, as well as with a high probability of detecting any other errors.

The test results of the proposed transmission method confirmed its high resistance to distortion and interference in the communication channel. The modulated signal has a constant envelope, and thanks to this, it is tolerant of extremely strong amplitude distortions and uneven frequency response of the channel - in the direction of increase, the permissible distortions are practically unlimited; downwards - stable reception is ensured with a signal-to-noise ratio of 2 dB, that is, reception is possible almost at the noise level! The high stability of the signal and the adopted demodulation method to jitter (phase jitter) and specific distortion of the GSM channel was also noted.

The protocol is built in a symmetrical manner, that is, it allows information to be transmitted both from the OOO to the security console and in the opposite direction. This allows you to expand the functionality of the alarm system complex by introducing various service functions for remote control of the object, programming, and monitoring its condition.

In order to increase resistance to malicious actions, in particular, to device substitution, the following has been done. Each message transmitted from the facility is accompanied by a special security session key. The session key is generated randomly by the OOO at the beginning of a security session and remains constant until the start of the next session; that is, the new key is transmitted only along with the “Arming” message, and all other messages must be accompanied by the already installed key. The remote control software monitors the security session keys received with each notification from objects, and when the key is changed before the session is completed (which, obviously, will happen when the device is replaced), it generates an alarm message about the substitution of the OOO.

Also, to increase resistance to malicious actions, the Presto protocol provides the ability to transmit messages containing not the usual identification number, which is programmed when installing the device, but a serial number, by which messages are identified. Each instance of the UOO has a unique serial number; it is indicated in the operational documentation for this instance, and the manufacturer guarantees that the number used once will never be repeated. It is not possible to change the UOO serial number. With this identification method, any substitution of the device becomes fundamentally impossible - each notification received at the remote control is uniquely compared with the specific instance of the UOO that generated it. In addition, the proposed identification method is more visual and helps to avoid confusion when programming the device, changing the database, etc.

Comparative characteristics of the ADEMCO ID Contact and Presto protocols
ADEMCO ID Contact Presto
Data transfer rate 32 b/s 305 bps
Time of transmission of one notification together with receipt of confirmation 2.8s 0.95s
Average call duration 10s 3.5s
Minimum acceptable signal-to-noise ratio that ensures stable reception 12 dB 2 dB
Resistance to frequency response distortions and amplitude distortions in the communication channel average high
Probability of missing an error 1/15 10-5
Anti-spoofing protection absent There is

The described protocol is supported by the Antey software package (starting from version 3.1.10.0) and UPO MT040M (starting from version 2.6).

The protocol is implemented in the AS006G “Raven” object device (manufacturer: Telemak JSC). In order to maintain compatibility, the protocol is implemented as an optional one (in addition to the standard ADEMCO ID Contact and ADEMCO Express).

Tests of the system confirmed the declared characteristics.

Notes:

DTMF 1 (Dual Tone Multi Frequency)- A method of encoding a dialed number or other information, in which the numbers are transmitted by a combination of two audio tones. In total, the system uses eight different tones, selected in such a way that they are transmitted over the telephone network with minimal attenuation and without overlapping each other.

FR/EFR/HR 2 coding. Before the introduction of the GSM Phase 2 specification, all networks operated using FR (Full Rate) speech coding technology. Over time, the number of cellular users increased, and the networks could not keep up with the growing number of requests. With the introduction of EFR (Enhanced Full Rate) and HR (Half Rate), network capacity has increased several times, since EFR and HR allow several subscribers to use one signal transmission channel simultaneously. Due to more frequent communication between the phone and the base station, the quality of transmitted speech has also increased. EFR is an advanced speech coding system. This system was developed by Nokia and subsequently became the industry standard encoding/decoding for the GSM standard. However, the new encoders also have their drawbacks: when using the EFR function, the device consumes the battery power 10% faster, but this is more than compensated by the quality of the transmitted signal.

Good afternoon

This review considers a rather specific device, and accordingly its use is very limited. It may be useful for those who have an old alarm system installed at home or in their country house with signals transmitted only via a wired telephone line. Usually this kind of product is of high quality and changes more often not because of its condition, but because of obsolescence. Anyone who has this can use this device to revive an old woman and prolong her life.

I bought the device with my own money, although it was a little cheaper with a coupon and on sale - about $40.

So, the apartment has an old, but reliable, PARADOX 728 alarm system with six motion sensors and two door sensors with a wired connection. I got it from the previous owner without a power supply and battery, but this is not a problem. The complete set looks like this:
Of course, before purchasing the device, the alarm system was restored, wires were replaced somewhere, a couple of sensors were replaced, and tested.

the main task this is to broadcast an incomprehensible code like 123418113101002 into a text SMS with a transcript of the event, similar to the central security console, only in this case the remote control will be a mobile phone.

A little theory

As a rule (but not always, of course, there are other transmission protocols) the signal from the alarm to the security console goes in the form of a code according to the Ademco ® Contact ID Protocol. It transmits numbers in the form - ACCT MT QXYZ GG CCC The first four digits are the alarm panel identifier, the next two are 18 (I didn’t understand that, but it doesn’t matter, they are static), the next four are a description of the event (new, repeat) and the code events (for example, code 301 means loss of power), the next two are the partition number, and the last three are the number of the event zone or the number of the user who made this event, for example, disarmed the alarm.

This is what the device itself looks like

Characteristics:
GSM Frequency 850 / 900 / 1800 / 1900 MHz
GSM Communication Ways TCP/IP via GPRS
Message Transmission Protocols SIA DC-09-2007 or SIA DC-09-2012
Outputs OUT1, OUT2 ,OC type, commutates voltage of up to 30 V and direct current of up to 1 A
Configuration via USB port or SMS commands
Power Supply DC 9V ---24 V
Used Current 20 ---30 mA (on standby),
up to 200 mA (while sending data)
Workplace Temperature from -20C to +50C,
Relative humidity up to 80% when +20C
Backup battery 900mAH

Giblets





The current consumption is apparently small, so I had no problems powering it from the signal panel itself.

After installing the SIM card, connecting it to the panel with four wires (+,-,RING,TLP), I loaded the drivers from the included CD onto the computer (Vin7), connected the device via mini USB (it is possible to send commands via SMS, but using a wire is much more convenient) . I looked into the devices, looked at the COM port number and connected to the socket using software. There's this picture:

From the settings, I entered only the PIN of the SIM card, the phone number for sending SMS and ticked off what information to send (without false modesty - that’s all).

The second tab contains the most interesting thing -

After entering the partition number, zone and SMS text, the mobile phone will receive not a set of numbers, but decrypted information. There are hundreds of these codes, I did not engage in paranoia, but programmed the panel to send only installation, disarming and activation of alarm sensors in the armed state.

How it looks on a mobile phone:

Without SMS decryption:

And now run around the apartment with decoding:

Yes, yes, there is no Cyrillic alphabet. If you type in Cyrillic, it doesn’t send anything.
One more thing, you never know... It is possible to enter an APN and send codes via GPRS, but the number of characters in the APN data is limited to 16 characters. Therefore, I couldn’t test this function; my opsos has 17 of them. It doesn’t work. Although I didn’t plan it, I initially planned to use a cheap SIM card only for SMS.

The photo is complete, just needs to be cultivated:

That's all. Thank you for your attention!

I'm planning to buy +11 Add to favorites I liked the review +25 +39

Transcript

1 "ADEMCO" - table of codes of the "Contact-ID" protocol Code Event Event Group "Medical Alarms" Button pressed - Medical alarm Button pressed - Medical alarm Pressed Button - Medical alarm Group "Fire Alarms" "Medical Alarms" Emerg-Personal Emergency Emerg -Personal Emergency Emerg-Fail to check in "Fire Alarms" 110 Fire alarm Fire-Fire Alarm 111 Smoke Detector Alarm Fire-Fire Alarm 112 Fire-Combustion Alarm 113 Water Leak Alarm Fire-Water Flow 114 Heat Detector Alarm Fire-Heat Sensor 115 Fire Button Pressed Fire-Pull Station 116 Pipeline Alarm Fire-Duct Sensor 117 Alarm Flame Detector Fire-Flame Sensor 118 Probable Alarm Fire-Near Alarm Assault Group "Panic Alarms" 120 Panic Button Pressed Panic-Panic 121 Duress Alarm Panic-Duress- User 000, or duress zone number on low end panels 122 Silent Alarm; Panic-Silent Panic Button 123 Audible Alarm; Panic Button-Audible Panic 124 Duress, Entry Allowed Panic-Duress Access Grant 125 Duress, Exit Allowed Panic-Duress Egress Grant

2 Group "Security alarms" "Burglar Alarms" 130 Alarm in the Burg-Burglary zone 131 Alarm in the perimeter zone Burg-Perimeter 132 Alarm in the internal zone Burg-Interior 133 Alarm in the 24-hour zone Burg-24 Hour 134 Alarm in the Entry/zone Exit Burg-Entry/Exit 135 Alarm in the zone Day/Night Burg-Day/Night 136 Alarm in the zone Outdoor Burg-Outdoor 137 Alarm in the zone Tamper Burg-Tamper 138 Probable Alarm Burg-Near Alarm 139 Intrusion Verifier Burg-Intrusion Verifier Group " General Alarm" "General Alarm" 140 General Alarm Alarm-General Alarm 141 Loop Open Alarm-Polling Loop Open 142 Loop Short Alarm-Polling Loop Short 143 Expansion Module Failure Alarm-Exp. Module Tamper 144 Hacking the Tamper detector Alarm-Sensor Tamper 145 Hacking the Tamper expansion module Alarm-Exp. Module Tamper 146 Silent alarm; hack Burg-Silent Burglary 147 Trouble Sensor Super detector control failure. 150 Group "Non-Security Alarms" 24-hour alarm; non-security zone "24 Hour Non-Burglary" Alarm-24 Hr. Non-Burg 151 Alarm; Gas Detector Alarm-Gas Detected 152 Alarm; Refrigerator Alarm-Refrigeration 153 Alarm; Heat Leakage Alarm-Heating System

3 154 Anxiety; Water Leakage Alarm-Water Leakage 155 Alarm; Foil Break Trouble-Foil Break 156 Trouble - Day Trouble-Day Zone 157 Low gas level in the cylinder Alarm-Low Gas Level 158 High Temperature Alarm-High Temperature 159 Low temperature Alarm-Low Temperature 161 Reduced Air Flow Alarm-Air Flow 162 Alarm, Carbon monoxide Alarm-Carbon Monoxide 163 Incorrect Tank Level Trouble-Tank Level Supervision Group "Fire Supervisory" 200 Fire Control Super.-Fire Supervisory 201 Low Water Pressure Super-Low Water Pressure 202 Low CO2 Concentration Super.-Low CO2 203 Valve Sensor Super.-Gate Valve 204 Low Water Level Super.-Low Water Level 205 Pump Enabled Super.-Pump Activation 206 Pump Failure Super.-Pump Failure Group "Faults" "System Troubles" 300 Secondary power failure Trouble-System Trouble 301 Lack of mains power Trouble-AC Power 302 Low battery voltage 303 RAM - checksum error 304 ROM - checksum error 305 System reboot Trouble-Low Battery (AC is lost, battery is getting low) Trouble-Bad RAM Checksum Trouble-Bad ROM Checksum Trouble- System Reset (Restore Not Applicable)

4 306 Control panel program changed Trouble-Programming Changed 307 Trouble-Self Test Failure 308 Trouble-System Shutdown 309 Trouble-Battery Test Failure (Battery failed at test interval) 310 Trouble-Ground Fault 311 Battery Missing Trouble-Battery Missing 312 Power Supply Overload Trouble-Pwr. Supp. Overcur. 313 Software reboot by engineer Group "Relay Troubles" Status-Engineer Reset User # "Sounder/Relay Troubles" 320 Siren/Relay Trouble Trouble-Sounder/Relay 321 Siren Trouble Siren 2 Trouble Trouble-Bell/Siren #1 (Event an Restore) Trouble -Bell/Siren #2 (Event an Restore) 323 Trouble-Alarm Relay Trouble-Alarm Relay Trouble-Trouble Relay Trouble-Reversing Relay 326 Notification Device 3 Trouble-Notification Appl. Ckt#3 327 Notification Device 4 Trouble-Notification Appl. Ckt#4 330 Group "Peripheral Trouble" System peripheral trouble "System Peripheral Trouble" Trouble-Sys. Peripheral. From LRR, ECP data connection to panel. 331 Address loop is open Trouble-Polling Loop Open 332 Address loop K.Z. Trouble-Polling Loop Short

5 333 Expansion module fault Trouble-Exp. Module Fail. ECP Path problem between panel to LRR, etc (new) 334 Repeater failure Trouble-Repeater Failure 335 Printer, no paper Trouble-Printer Paper Out 336 Loss of communication with the printer Trouble-Local Printer Lack of DC power to the external module Low battery voltage of the external module Trouble- Exp. Mod. DC Loss Trouble-Exp. Mod. Low Batt 339 Rebooting external module Trouble-Exp. Mod. Reset 341 Opening the external module Trouble-Exp. Mod. Tamper No AC power supply to external module External module self-test failure Detected Interference on RF device Group "Communicator faults" No communication with monitoring station Malfunction of telephone line 1 Malfunction of telephone line 2 Malfunction of long-range transmitter No communication with monitoring station No control of long-range transmitter Trouble-Exp. Module AC Loss Trouble-Exp. Self-Test Fail Trouble-RF Rcvr Jam Detect "Communication Troubles" Trouble-Communication Failure Trouble-Phone line # 1 Trouble-Phone Line # 2 Trouble-Radio Transmitter Comm Path problem between panel and lrr (0ld) Trouble-Fail to Communicate Trouble -Radio Supervision From LRR - ECP data connection to panel

6 356 Loss of polling from the Trouble-Central Radion Polling Center 357 SWR problem for a long-range transmitter Group “Loop faults” 370 Trouble-Radio Xmitter protective loop. VSWR "Protection Loop" Trouble-Protection Loop (zone type 19) 371 The protective loop is open Trouble-Prot. Loop Open 372 Security loop is closed Trouble-Prot. Loop Short 373 Fire Loop Trouble Trouble-Fire Loop 374 Exit Zone Error Alarm-Exit Error 375 Panic Zone Trouble Trouble-PA Trouble 376 Hold-Up Zone Trouble-Hold-Up Trouble 377 Tilt Sensor Trouble Swinger Trouble 378 Associated Zone Trouble Cross Zone Trouble "Sensor Trouble" group "Sensor Trouble" 380 Sensor Trouble Trouble-Sensor Trouble 381 Loss of transmitter control Trouble-RF Sensor Super 382 Loss of RPM control Trouble-RPM Sensor Super 383 Tamper Detector Trouble Trouble-Sensor Tamper 384 Transmitter battery low Trouble-RF Sensor Battery Smoke Detector; high sensitivity Smoke Detector; low sensitivity Security Detector; high sensitivity Security Detector; low sensitivity Trouble-Smoke Hi Sens Trouble-Smoke Lo Sens Trouble-Intrusion Hi Sens Trouble-Intrusion Lo Sens 389 Self-diagnosis error Trouble-Sensor Test Fail

7 Detector 391 Detector control error Trouble-Sensor Watch Fail 392 Frequency drift compensation error Trouble-Drift Comp. Error. Reported by Firelite panels. The panel is not able to adjust its thresholds to balance out drift in the normal operating point of a smoke detector. 393 Alarm maintenance Group "Disarm/Arm" Trouble-Maintenance Alert "Open/Close" 400 Disarm/Arm Opening/Closing 401 Disarm/Arm by user Opening-User / Closing-User 402 Disarm/Arm section Closing-Group User Automatic disarm/arm Arming Disarming/Arming after a set time Interrupting automatic arming Opening-Automatic / Closing- Automatic Opening-Late / Closing-Late Event & Restore Not Applicable 406 Cancel Alarms Opening-Cancel 407 Disarming/Arming from a computer 408 Quick Disarming/Arming 409 Disarming / Arming with the Opening-Remote switch / Closing-Remote Event Not Applicable for opening / Closing-Quick Arm Opening-Keyswitch / Closing- Keyswitch 441 Arming with people present 442 Switch; Staging with people present Opening-Armed Stay / Closing-Armed Stay Opening-Keysw. Arm Stay/Opening-Keysw. Arm Stay

8 Failure to Disarm/Arm Disarm/Arm before the set time Disarm/Arm after the set time Failure to Disarm at the set time Failure to Arm at the set time Failure of Automatic Arming Opening-Exception / Closing- Exception Opening-Early / Closing-Early-User Opening-Late / Closing-Late-User Trouble-Fail to open (Restore not applicable) Trouble-Fail to Close (Restore not applicable) Trouble-Auto Arm Failed (Restore not applicable) 456 Partial Arming Closing-Partial arm-user 457 Error; Exit zone is open after exit delay Closing-Exit Error-User 458 User on premises Opening-User on Prem. User 459 Alarm after recent setting by the user 461 Entering an incorrect Code 462 Entering a correct Code 463 Re-arming after Alarm 464 Automatic Arming time increased Trouble-Recent Close User (Restore not applicable) Access Wrong Code entry (Restore not applicable) Acces-Legal Code entry user ( Restore not applicable) Status-Re Arm After Alarm-User (restore not applicable) Status-Auto Arm Time Ext. User (Restore not applicable) 465 Panic Alarm Reset 466 Indoor/Outdoor Service Group " Remote control"Service On/Off Premises "Remote Access"

9 411 Callback request 412 Successful upload session 413 Unsuccessful upload session System stop command received Typist stop command received 416 Successful download session Access Control group 421 Access denied 422 User access report Remote-Callback Requested (No Restore) Enabled with O/ C reports Remote-Successful Access (Restore Not Applicable) Remote-Unsuccessful Access Remote-System Shutdown Remote-Dialer Shutdown Remote-Successful Upload (Restore Not Applicable) "Access control" Access-Access Denied-User (Restore Not Applicable) Access-Access Gained User 423 Access under duress Panic-Forced Access 424 Exit Denied 425 Exit Allowed Access-Egress Denied (Restore Not Applicable) Access-Egress Granted (Restore Not Applicable) 426 Door unlocked and open Access-Door Propped Open Fault, door status monitoring Fault devices Exit Request Access-ACS Point DSM Trbl. Access Point RTE Trouble 429 Entering access programming Access Program Mode Entry 430 Exiting access programming Access Program Mode Exit 431 Changing access level Access Threat Level Change 432 Access relay did not work Access Relay/Trigger Fail

10 433 Request for Output shunted Access RTE Shunt 434 Door status control shunted Group "Bypass" Access DSM Shunt "System Disables" 501 Reader disabled Access Reader Disable Group "Relay Disables" "Sounder/Relay Disables" 520 Siren/Relay disabled Sounder/Relay Disable 521 Siren 1 disabled Bell 1 Disable 522 Siren 2 disabled Bell 2 Disable 523 Alarm Relay disabled Alarm Relay Disable 524 Relay Trouble disabled Trouble Relay Disable 525 Reversing Relay disabled Reversing Relay Disable Notification Device 3 disabled Notification Device 4 disabled Notification Appliance Ckt # 3 Notification Appliance Ckt # Module Added "System Peripheral Disables" 532 Module Removed Module Removed "Communication Disables" 551 Communicator Disabled Dialer Disabled Long Range Transmitter Disabled Remote Upload/Download Disabled "Bypass Zones" Radio Xmitter Disabled Remote Upload/Download "Bypasses" 570 Zone Bypassed ZONE/SENSOR BYPASS 571 Fire Zone Bypassed Fire Bypass

11 Hour Zone disabled 24 Hour Zone Bypass 573 Instant Security Zone disabled Burg. Bypass 574 Group zone shutdown Group Bypass 575 Swinger disabled SWINGER BYPASS 576 Access Zone shunted Access Zone Shunt 577 Access Zone disabled Access Point Bypass Group "Test" "Test/Misc" 601 Manual message sending test MANUAL TEST 602 Periodic test report PERIODIC TEST 603 Periodic wireless transmission 604 Fire test FIRE TEST Periodic RF Xmission 605 Status Report To Follow 606 Voice communication LISTEN-IN TO FOLLOW 607 Detector Test-Pass Mode WALK-TEST MODE 608 Periodic Test - There is a System Trouble Test-System Trouble Present 609 Video transmission activated Listen-Video Xmitter Active 611 Checkpoint passed Test-Point Tested OK 612 Checkpoint not passed Test-Point Not Tested Security Zone tested in Test-Pass mode Panic button tested in Test-Pass mode Security Zone tested in Test-Pass mode Intrusion Zone Walk Tested Panic Zone Walk Tested Alarm Zone Walk Tested 616 Service Desk Call Service Request "Event Log"

12 621 Clearing the Event Log Trouble-Event Log Reset 622 Event list is 50% full Trouble-Event Log 50% Full 623 Event list is 90% full Trouble-Event Log 90% Full 624 Event list is full Trouble-Event Log Overflow System time is programmed System time, date is incorrect 627 Entering programming mode Exiting programming mode Marker in the event log for 32 hours Group "Schedules" Trouble-Time/Date Reset-User Trouble-Time/Date Invalid (clock not stamping to log correctly) Trouble-Program Mode Entry Trouble-Program Mode Exit (Restore Not Applicable) "Scheduling" 630 Changing the Schedule Trouble-Schedule Changed 631 Impossibility of changing the Schedule Trouble-Esc. Sched. Changed 632 Change of Access Schedule Trouble-Access Sched. Changed "Personnel Monitoring" 641 Senior Watch Trouble 642 Latch-key Supervision Group "Miscellaneous Events" 651 Reserve 652 Reserve 653 Reserve "Misc" Code sent to Identify the control panel as an ADT Authorized Dealer. 654 System inactive Trouble System Inactivity Safe House Company tel. +38 (095) ; +38 (068)


Standard codes for the Ademco Contact ID Protocol Structure of the transmitted data: OOOO KSSS GG ZZZ, where: OOOO four-digit code of the object being cut; K event qualifier set to 1 means

SOFTWARE OF THE "OKO" NOTIFICATION TRANSMISSION SYSTEM Instructions for setting up the OKOGATE connector (SurGard, JBN, Andromeda XML_Guard channels) 2018 Contents Instructions for setting up the OkoGate connector.

A device for transmitting messages over a cellular communication channel. Programming and connection instructions. 1. Purpose of the device and principle of operation. The module is designed to connect to cell phones

Reef Sentinel RS-202 Operational security monitoring program RECOMMENDATIONS FOR USE INTRODUCTION The operational security monitoring program "Reef Sentinel RS-202" is designed to organize work

SATEL CA-6 SECURITY AND FIRE CONTROL PANEL 1 2 3 4 5 6 7 8 9 * 0 # 1 2 3 4 5 6 7 8 POWER PHONE FAILURE A ARMED B A ALARM B GENERAL DESCRIPTION AND USER MANUAL CONTENTS 1. GENERAL DESCRIPTION...

Universal 8-channel receiver Rosslare SA-38 Additional information about the products represented by our company can be found on the Internet website www.ronixs.ru General information Rosslare SA-38

OBJECT TERMINAL AUTOMATIC CALL DEVICE UOO-AV (versions 1, 2) Operating manual 2 UOO-AV (versions 1,2) CONTENTS 1 Purpose... 3 2 Technical data... 4 3 Completeness...

Guide to Module Programming PROGRAMMING METHODS Modules can be programmed using the following methods: Using WinLoad software. Modules can be programmed

Keyboard type 6139. Use in master keyboard mode. This keyboard can be used as a master keyboard when dividing the system into sections (areas). In this case, the display shows

NBUSJY 424/832/832+ Reception and control panel with remote control panels Version 5.0 PROGRAMMING GUIDE with ICON remote control RINS388-4 TABLE OF EVENT CODES CONTACT ID Q EEE English. designation

Operating instructions Touch alarm control panel with GSM module HB-BJQ-560B This is an intelligent home station (hereinafter referred to as DS) for wireless security systems. DS runs on advanced

Untranslated terms: Backbone Seismic Test DSC PC6010 Programming Manual software version 2.1 INTRODUCTION Documentation for the PC6010 control panel 3 documents have been prepared for the Installer: Manual

OPERATING INSTRUCTIONS Wireless GSM alarm system “Falcon G40W” Before using the GSM alarm system, make sure that all precautions listed in these operating instructions are taken.

DSC Power 864 Digital Security Controls Operating Instructions Quick Start Guide Below is a list of the main functions of your system, and the buttons assigned to each function.

User manual V01.01.08-1 - Attention! The reliability and durability of the product is ensured not only by the quality of the product itself, but also by compliance with operating modes and conditions, therefore

DSC Power 864 Digital Security Controls Operating Instructions Quick Start Guide Below is a list of the main functions of your system, and the keys assigned to each function.

1 SMS-4N/S (version 1.3) Device for listing alarm messages via cellular communication channel. Programming and connection instructions. 1. Purpose of the device and principle of operation. The SMS-4 module is designed

Www.mobilclick.ru Wireless GSM alarm system “Falcon G40W” 1 Features 1. Large liquid crystal capacitive touch display and touch buttons. 2. Main functions: Calendar. 5 groups of numbers

NBUSJY 424/832/832+ Reception and control panel with remote control panels Version 5 PROGRAMMING MANUAL with LCD remote control RINS735-3 Table of protocol event codes Contact ID Q EEE English. designation

Operation manual Security and fire system "Konta act GSM-10A" 2 1. General information "Contact GSM-10A" is a wireless security and fire system that signals attempts to penetrate

Radio alarm system RS-4000 Object device RT4-5se (version 3.1.7) Installation manual CONTENTS 2012 GENERAL INFORMATION...3 Main technical characteristics...3 SETTING MODES

Programming tables TL260GS/TL265GS Ethernet/Internet and GSM/GPRS dual channel communicator GS2060/GS2065 GSM/GPRS wireless communicator version 1.1 Note: This manual contains information

DSC PC - 510 panel programming instructions. System programming. Introduction. The panel is programmed by entering instructions from the keypad. The panel storage device does not lose data even

GUARD NET CONTROLLER USER MANUAL RF Enabled 2 1. General information GUARD NET controller for controlling access to premises or territory. The presence of two RS485 lines, one of which is galvanically isolated,

PC4020 INSTRUCTION MANUAL May 23, 1995 Software Version 2.0 Introduction The LCD4500 keypad is used to display easy-to-understand status messages in English.

GSM EMERGENCY ALARM SYSTEM ALM-GSM-003 USER MANUAL FEATURES Sleek and advanced touch keypad for easy operation; 128x64 display resolution displays time; Opportunity

GSM alarm operating manual SGA9907 GSM alarm operating manual 1.1 General description This security alarm works with two types of networks and is intended for both home and

DOCUMENT COVER SHEET Revision History Sheet Revision Changes 0 First Issue 1 Updated 2 Updated 3 Note added on page 014 4 Added Dual Language

Declaration of conformity TR CU RU D-RU.AL16.V.58960 Fire safety certificate C-RU.PB25.V.03053 Keyboard “KV1-2” Passport Identification number of the device 2 1. General information Keyboard “KV1-2”

SECURITY AND FIRE ALARM CONTROL PANEL “VERITAS 8” USER INSTRUCTIONS 1 Read the instructions before starting installation SUMMARY OF “USER INSTRUCTIONS” Installing the system in mode

Transmitter "Delta PDM" and Digiplex PARADOX panels "Delta PDM" - Transmitter up to 15W, with built-in tamper sensor (tamper). Working with Paradox "Digiplex" and "EVO" panels. Up to 192 wired zones, security

Description of programming of Condor series devices 1. Main configuration window Ctrl +N - default or factory settings Ctrl +O - open the configuration from a file Ctrl +S - save the configuration to a file.

Complex of fire and security alarm equipment CADDX Modules additional functions Bus repeater module NX-320E Connection instructions Programming instructions 2013 1. GENERAL TECHNIQUE

SR System Alarm Codes 2 00 No Alarms Exist 02 Check Evaporator Coil Sensor 03 Check (Control) Return Air Sensor

GSM communicator G10F (v.1.62) User manual Draugystės g. 17, LT-51229 Kaunas El. p.: [email protected] www.trikdis.lt 2 Purpose of the document This document introduces the properties of a GSM communicator

ELECTRONIC ENGINEERING LTD. Runner Series WIRELESS AND WIRED CONTROL PANEL Installer's Instructions Version 9.08.2 1 IMPORTANT NOTES All information and data in this document are proprietary

SOFTWARE OF THE "OKO" NOTIFICATION TRANSMISSION SYSTEM Instructions for setting up the OKOGATE connector (SurGard, JBN, XML_Guard Channels) 2013 Contents 1. General information... 3 2. Preparation for work...

Guide for setting up and working with the Vista-501 integration module List of terms used in the document Guide for setting up and working with the Vista-501 integration module...................... ................

ITC Group Guide to setting up and working with the integration module "KODOS" Version 1.1 Moscow, 2011 Contents CONTENTS... 2 1 LIST OF TERMS USED... 4 2 INTRODUCTION... 5 2.1 Purpose of the document...

Event template: C-Nord GSM Description of events received via IP channels from Nord GSM, Sergeant GSM, Union GSM devices Code Event class Description Loop number Channels E00 Alarm Medical alarm. %part%

Programming tables PKP-8/16 (version 2.0) The device is programmed using the PR-100 programming console (version 2). Please complete the tables below before starting programming.

GSM Alarm User manual Functions GSM 850/900/1800/1900 compatible alarm Two-way communication with the base Monitoring of surroundings and residential premises Alarm notification by SMS message

Cell Description Format Note *01 Installer code 4 1 4 0 *02 Zone response type 1-8 01 02 03 04 05 06 07 08 *03 Zone response type 9-16 09 10 11 12 13 14 15 16 *04 Zone response type 17-24 17 18 19 20 21 22 23

Intelligent GSM alarm system KH-AS10 Gsm Level Away Arm 12:00 PM 20 01/10/2014 Friday OK User manual Contents. Functions 1 1. Description of the main unit. 2 Using the remote control

IP Communicator JA-60WEB The Communicator JA-60WEB is designed for use in conjunction with control panels JA-63 and JA-65 and is designed to interact with monitoring stations via local network

We produce: Addressable analogue fire alarm and control devices of the MA series Non-addressable fire alarm and control alarm and control devices of the MV series Input devices for sending signals to

User's manual for the VISTA-501 control panel With control panels (user keyboards) types 6139 and 6128 2014 www.easy-ops.ru Types of keyboards Determine what kind of keyboard you have. With system

SECURITY AND FIRE ALARM CONTROL REMOTE “VERITAS R8 PLUS” USER INSTRUCTIONS Read the instructions before starting installation 1 SUMMARY OF “USER INSTRUCTIONS” Full installation mode

Orion Connector v.1.2.0 User Manual 2012 Contents 1. General information... 2 2. Working with Orion Connector v.1.0.0... 4 2.1. Preliminary settings... 4 3. Appendix. Messages broadcast

642 LCD Keypad Instruction Manual CONTENTS Introduction...3 Conventions...3 Basic Operations...5 Keypad Indicator Lights...5 Visual Feedback...5 Auditory Feedback

LED KEYBOARD KS1-8/KS1-16 OPERATION MANUAL CONTENTS Contents... 3 1 General provisions... 4 2 BASIC TERMS... 5 3 Installation and connection... 9 3.1 Auto-registration... 9 4 OPERATION

ITT Group Guide to setting up and working with the integration module “Vista-501” Version 1.2 Moscow 2012 1 Contents CONTENTS... 2 1 LIST OF TERMS USED... 3 2 INTRODUCTION... 4 2.1 Purpose

GSM alarm GSM panic button www.provodu.net Major-GSM Panic Operation manual - 1 - 1. Open the back panel and insert the SIM card into the alarm slot Before doing this, check that: - Request

Event template: C-Nord GSM Description of events received via IP channels from Nord GSM, Sergeant GSM, Union GSM devices Code Event class Description Loop number Channels E00 Alarm Medical alarm. %part%

MATRIX 6/816 (RUSSIAN) Security and fire alarm panel with remote control panels Version 1.34 (User) USER MANUAL RINS795-4 Certification in Russia Certificate of conformity: ROSS GB.OC03.H00174

Control Panels D7212, D7412, D9112 and D9412 Integrated Security System: fire and burglar alarms, access control Control functions 8 programmable zones, each divided into

GSM alarm system GS-02. User Manual Thank you for using our home security alarm system. This system will provide complete protection for your home and property. Alarm system

Guide for setting up and working with the KODOS integration module List of terms used in the document Guide for setting up and working with the KODOS integration module........................... .............

Automatic Generator Start/Stop from the Color Control GX (CCGX) Panel Introduction The CCGX internal relay can be used to start/stop the generator. With this function you can set

GSM ALARM USER MANUAL Appearance 10-pin connector (GROUND; SIREN; RELAY1; RELAY2; SPEAKER; O2; O1; I3; I2; I1): GROUND, “-” GROUND SIREN, this point is connected to the siren, the other

Centralized surveillance and security systems and information transmission Security and fire alarm equipment complex Addressable module NX-2192 Technical description Connection and operating instructions

Security alarm system. Instructions 1. Introduction 2. Functions 3. Technical specifications 4. Installation 5. Basic parameters 6. Adding / removing additional sensors and key fobs 7. Programming the main one

26 Quick arming: [*] Viewing the event memory (128): [*] Advanced viewing of events: [*] Viewing system troubles: [*] Turning on/off the audio status indication

Centralized monitoring and information transmission systems. Object equipment. SECURITY AND FIRE CONTROL DEVICE ISECO NX VOICE MODULE NX-535E CONNECTION INSTRUCTIONS. INSTRUCTIONS

CUSTOM GSM ALARM SYSTEM J-HOME-light Introduction All rights reserved. www.j2000.ru User manual J-HOME-light Dear Customers, Thank you for using our alarm system.

User manual Security GSM detector ALTOX ALARM-4 Customizable voice and SMS notification up to 5 numbers SMS notification about arming/disarming Four security zones with fixation

Restore on AC Power Loss (turn on the computer after a power loss) On the Albatron motherboard, the required option was included in: Perephirais - PWRON After PWR-Fail - ON On the DELL system unit motherboard in: Power

STATIONARY SECURITY SYSTEMS USER'S MANUAL FOR THE HYBRID SECURITY SYSTEM ON STRELETS EQUIPMENT Version 3.0 Contents: 1. PURPOSE OF THE SYSTEM... 3 2. FUNCTIONING OF THE SYSTEM... 5 2.1.

Wireless intelligent GSM alarm Contents Introduction... 3 1. System states and its use.... 4 1.1 Installation of the central Panel of the device... 5 2. Setting up the Panel... 6 2.1 First

Alarm Control Center Program User Manual Version 1.0.0.3 Purpose The program is designed to register and archive messages received from the line of modules of the GSM-M1 family. Program