EasyManuals Logo

GE Security EST3 User Manual

GE Security EST3
388 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #187 background imageLoading...
Page #187 background image
Installation
EST3 Installation and Service Manual 5.27
Note:
Only Line 1 can be used to receive incoming calls.
Using the 3-MODCOM, messages can be sent to a central
monitoring station (CMS) or received from remote computers.
When reporting to a CMS, alarm, trouble, and supervisory status
data are transmitted as they occur. Each message identifies the
point (or device or circuit) that is involved.
The 3-MODCOM can receive data from two programs: the
Access Control Database program (ACDB) or the Keypad
Display Configuration program (KDC).
ACDB and KDC information is downloaded on demand from
remote computers. This lets the end users create and maintain
their own security and access control databases.
Functions
Configuration
You create the required configuration data using the 3-SDU and
download this data to the module using standard programming
procedures. The data is stored in the nonvolatile memory of the
3-MODCOM.
Configuration data determines the setup of the 3-MODCOM,
defines the line properties, the receiver attributes, and the
account parameters. This data includes transmission details, such
as telephone numbers and dialing options.
Some reference data relating to user access control and security
systems is downloaded from the ACDB or KDC programs and
stored in the 3-MODCOM.
Point transmission
Using enhanced communication protocols, the 3-MODCOM
module is capable of transmitting data that identifies the specific
device (or circuit) and event status, as reported by the CPU. This
capability is known as point transmission because each and
every device (or circuit) that goes into alarm or trouble, or is
restored, can be reported by order of occurrence and priority.
Receiving user data
In addition to transmitting device data, the 3-MODCOM module
can receive user data from remote computers. In this mode, the
module receives access control or security database information
from one or more end users. This data establishes the operating
characteristics of the user’s security and access control system as
well as the various access options and PIN numbers. All
downloaded data is received over the telephone lines.

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the GE Security EST3 and is the answer not in the manual?

GE Security EST3 Specifications

General IconGeneral
BrandGE Security
ModelEST3
CategorySecurity Sensors
LanguageEnglish