Automation Products and Equipment in Bangladesh

/Automation Products and Equipment in Bangladesh
Automation Products and Equipment in Bangladesh 2019-05-07T09:19:56+00:00

Automation of engineering systems and smart home ABB. The company WEPROSYS LIMITED – ABB offers the services of design, installation, programming and commissioning of ABB automation systems. ABB is a leader in the production of high, medium and low voltage power equipment; products and technologies for automation. ABB technology allows the company’s customers to increase their productivity by reducing the negative impact on the environment.

“Our technology leadership, global presence and local experience enable us to offer products, systems and solutions that help our customers improve their performance, from increasing the reliability of power lines to increasing production efficiency. Relying on their strengths in power technology and automation, we are committed to sustainable profitable growth. Our global manufacturing base provides high quality equipment.

Smart building:

ABB offers the ABB i-bus® KNX automation system, which is widely used in both residential and commercial smart buildings.

The i-bus® KNX system provides a full range of equipment for the EIB / KNX protocol: switchboard elements, various control modules and relays, all types of sensors that are suitable for different conditions of use, including a weather station, as well as a wide range of controls. All products are made in Germany.

KNX control devices (touch and keypads, switches) are presented as part of the ABB Busch-Jaeger wiring accessories design series. The wide choice of design and surface finish options, the unity of style of all products: both switches and panels of the “Smart Home” and various outlets, allows you to seamlessly integrate the i-bus® KNX automation system into any interior. All ABB i-bus® KNX and Busch-Jeager equipment have an interesting design, flexible modular structure and German reliability.

Honeywell Building Automation. The company Weprosys Limited – Honeywell, offers design, installation, programming, commissioning and maintenance of Honeywell systems. Honeywell occupies a leading position in the field of building automation, technological processes, production of instrumentation and services for various industries. Honeywell’s software solutions and tools give manufacturers a competitive edge and help them benefit from using the Industrial Internet of Things (IIoT) technology.

Automation of engineering systems Beckhoff. Weprosys Limited has been offering services in design, installation, programming, commissioning and maintenance of Beckhoff automation systems. The German company Beckhoff is the undisputed technology leader in Europe in the manufacture of control equipment, controllers , industrial PCs, I / O modules , EtherCat technology, TwinCat software , drive technology and automation software. Beckhoff solutions are characterized by high efficiency, scalability, easy integration with various systems, as well as simple design, implementation and operation.

Beckhoff develops and implements open systems for monitoring and control. The benefits of using open-architecture systems are significant because they are information-independent information systems that meet the requirements of a number of IEEE, ISO, NIST, OSF, X / Open, and other organizations.

Intercom systems Siedle Access:

-Weprosys Limited offers design, installation, programming, start-up and maintenance of the intercom and security systems SSS Siedle.

-Weprosys Limited offers “Smart Living Complex” solutions using IP video intercom system SSS Siedle. The German company SSS Siedle is the leading manufacturer of audio and video intercom systems in the world, has a large selection of video door entry systems , telephones and panels for any needs, with basic and additional functions.

-We create solutions “Smart Residential Complex” integrating into the Siedle sensory video intercoms the metering systems of housing and communal services, video surveillance systems, elevator management system and the “Smart Home” system.

Siedle Access – a centralized IP intercom system with its own server for organizing communications in buildings with a full range of functions and various design options.

Access works in its own IP network or can be connected to existing IP structures via VLANs. Central management on the Access server via a web browser allows you to configure and manage the system.

It also facilitates system upgrades by expanding and replacing devices or licenses (for example, licenses for additional features or licenses to use third-party devices, such as IP cameras, VoIP phones and IP I / O devices, and Smart Home).

The system uses TCP / IP and UDP network protocols, as well as SIP for Internet Telephony (VoIP), advanced data transfer protocol SSMP, which is the main one for Access. Audio (G.711) and video (H.264 / MPEG4) standard codecs guarantee high image and sound quality with minimum network load.

IP systems for intercom and security Fermax MEET – solutions for smart residential complexes and buildings.The company WEPROSYS LIMITED – supplier of the company Fermax offers design services, installation, programming, commissioning and maintenance of Fermoks door intercommunication systems and security systems. The company WEPROSYS LIMITED offers solutions “Smart Housing Complex” using IP-video intercom system Fermax MEET.

IP intercoms True-IP – solutions for smart residential complexes

The company Weprosys Limited offers True IP offers design, installation, programming, commissioning and maintenance services for IP systems of Tru Ai IP. IP intercom system True IP will inspire you for creativity and help you realize the most daring and ambitious ideas. Easily build a dream system, and do not face compromises and limitations.

The international company True IP is a leading developer of IP intercoms and software. Since 2010, True-IP has been implementing an ambitious goal – a fundamentally new level of perception of intercom systems.

– Integration with EAS, ATS, ACS, “Smart Home”, AMR – a complete solution.

– Support for SIP, TCP / IP, RTSP, DTMF, PoE – what you need.

– Innovative software – a single info-space between the owners, management companies and contractors – the service and the possibility of a new level.

– Equipment customization and new features – to make the project truly unique.

– All this allows to realize not only interesting individual solutions, but also modern solutions for residential complexes, hotels or office buildings, including those separated geographically.

Intercom True IP is not just an intercom – it is a world of innovative and interesting solutions.

Automation of engineering systems Trend Controls. Weprosys Limited offers design, installation, programming, commissioning and maintenance of Trend Controls systems. Trend is one of the world’s leading manufacturers of building management systems.

Trend devices provide close monitoring and monitoring of heating, ventilation and air conditioning systems, as well as other building maintenance systems. it is possible to minimize electricity consumption and constantly maintain comfortable conditions in the premises, as well as to achieve other important advantages – in particular, to reduce the operating costs of electrical equipment. Our systems are installed in non-residential buildings of almost any purpose – in schools, hospitals, entertainment centers, offices, shops and enterprises. They are suitable for the largest complexes and for use at many sites, but at the same time remain economical and when used in small structures.

Building Energy Management Systems (BEMS) (BMS)

The main function of the BEMS is to regulate and control heating, ventilation and air conditioning systems (HVAC control), and often lighting. The BEMS system can effectively control up to 84% of the building’s energy consumption.

Management of HVAC systems from Trend Control Systems

Through the use of a number of HVAC systems management programs and current monitoring, the building’s energy management system is able to serve the building’s engineering networks in strict accordance with the consumption, thus avoiding inappropriate energy consumption.

We will develop a free conceptual design of an automation system and a BMS based on Trend Controls equipment for your facility! To clarify the terms of service, please contact info@weprosys.com or Call us at 01788377901.

Siemens automation systems Siemens. Ideal solutions to any problems – Siemens automation systems. Requirements for modern equipment and enterprises are growing in all industries. Siemens automation systems meet all industry needs and provide efficiency, flexibility and cost reduction. The industry is now on the verge of a fourth industrial revolution. Automation is followed by digitalization of production. The goal is to increase productivity, efficiency, speed and quality, which will lead to greater competitiveness of companies on the way to the future of industry.

Siemens is responding to problems in the manufacturing and processing industries, as well as in building automation. Siemens solutions for automation and drives, based on Totally Integrated Automation are used in all industries. In the manufacturing and processing industries. In industrial buildings and special facilities. Siemens offers automation technology, drives, and low-voltage power distribution, as well as industrial software ranging from standard products to turnkey solutions for industries. Industrial software allows our customers to optimize the entire chain – from product design and development through production and sales to after-sales service.

Digital enterprise:

Digital enterprise has already become a reality. Only consistent data integration allows you to take full advantage of digitalization. This can be achieved by supporting industry services, integrating software and automation, expanding communication networks and providing security.

Smart office lighting

Intelligent LED lighting systems can change the color temperature from cold to warm white (Tunable White and bio-efficient lighting) to help synchronize human circadian rhythms by imitating sunlight.

Circadian (circadian) rhythms.

We live and work not thanks to, but contrary to the cycles to which the organism has become accustomed in the process of evolution. However, our internal clock, which received the scientific name “circadian rhythms”, is still synchronized by light. When the eyes catch it, the brain perceives it as the beginning of the day. Bright artificial lighting at night is disorienting the body – it has been proven that even reading e-books before bedtime can make you feel worse the next day.

6 principles of smart lighting in the building

  1. Alternate cold and warm light. The

eye more easily perceives light of greenish and bluish shades, since in the process of evolution this provided it with a better recognition of objects. Lamps with such light invigorate and excite attention, but in the evening it is better to abandon them in favor of warmer tones (Tunable White).

  1. Remember biological clocks.

Human clocks are longer than astronomical clocks: in our day it is about 24.3 hours. Sunlight in the morning will reduce this cycle, while bright lighting in the evening will extend it. In the first case, you will fall asleep earlier, in the second – later, which will lead to fatigue and loss of concentration the next day. In the long run, this can seriously affect health.

  1. Investigate habits

Where will the inhabitants of your space be when the sun penetrates the rooms? Do they work from 9:00 to 18:00 or according to a floating schedule?

  1. Add daylight.

Best lighting for workspaces – natural. The architects are convinced that even the window blinds have a bad effect on concentration and productivity. Studies also show that office workers working in windowless rooms sleep an average of 46 minutes less than those who work in properly lit offices.

  1. Work with lamps

Comparing the spectral distribution and color temperature, you can choose the lighting that is adapted to specific circumstances. Better than other luminaires, smart bulbs, which are controlled by means of rear automation systems, cope with this.

  1. Think about the materials.

Any surface works as a light filter. This effect is especially obvious when you spend time in the shade of trees: you will perceive sunlight as green. In buildings, a similar effect can be achieved through glass with a blue tint or through red walls that will absorb blue and reflect a reddish light.

Smart lighting

– Biologically effective lighting: the science of the biological effectiveness of light, which is adjusted to human well-being through artificial lighting, similar to sunlight.

– Circadian rhythms: associated with the biological day-night rhythm and designed to stabilize the human rhythm of life.

– Tunable White: A feature in advanced lighting that allows the white tone light source to be smoothly tuned to the desired color throughout the time of day.

– Pure light: Innovative DALI compact presence detector with customizable White function.

– The biological effect of light: in 2002, scientists discovered the existence of a third light receptor in the retina of the human eye, in addition to twilight and color vision. Special receptor cells are sensitive to light, but invisible. They respond exclusively to the brightness of the environment, and, depending on its conditions, regulate biological processes in the human body, such as the synthesis of hormones and visual reflexes.

– Melanopic effect of light: an invisible light effect. The eye receives light through a special photoreceptor of the photosensitive component melanopsin. It regulates the hormone cortisol (stress hormone) and melatonin (sleep hormone), and the process itself leads us to a feeling of anxiety or fatigue.

Biodynamic lighting

Biodynamic lighting is an intelligent lighting system, the feature of which is the automatic change of color temperature depending on the time of day and season. You can install the “Smart Light” instead of the classic Armstrong, Grilyatto, etc. lamps. The case has a stylish appearance that is fully consistent with the current trends in interior design

Jung KNX – Smart Home on JUNG equipment

Company Weprosys Limited offers services for the design, installation, programming, commissioning and maintenance of automation systems Jung. JUNG is a leading manufacturer of electrical installation products and equipment for the KNX system.

JUNG products cover all aspects of home automation and building automation. For any task, you can choose the right equipment both from a technical point of view and from a design point of view. JUNG offers its own scientific developments and engineering solutions, as well as constantly updated high-quality design that continues the age-old German tradition. Jung equipment seamlessly integrates with the Siedle IP door entry system . JUNG produces various types of KNX / EIB system controllers, all types of sensors, a media server, and its own intercom system.

The design of control elements – panels, switches, dimmers – is presented in several series, which, along with elements of the KNX system, include other wiring accessories – sockets, flush-mounted radio, LED lighting, etc. This ensures the harmonious integration of automation elements into any interior.

Biometric systems – modern protection technologies

Biometric access systems for buildings and industry. Biometrics is a complex concept. It covers a set of various technologies and methods by which it is possible to identify a specific person. This complex is based on human biological data. A person has purely individual characteristics, including physiological ones. Biometric access control systems are gaining immense popularity today. This is due to the progressive improvement of technology, allowing to explore the natural data of man. Biometric security systems are used in many enterprises. Of course, they have their advantages and disadvantages. An undeniable advantage is the method of identification. First, the physiological parameters are quite unique. Secondly, it is impossible to lose them, unlike electronic access keys.

Physiological classification of authentication

– Fingerprint;

– Palm shape;

– The location of the veins on the wrist;

– Retina;

– Iris;

– Thermo gram of the face.

Biometric access control system has its own customer database. Specialized software allows you to enter data into the system. It also allows you to process data, change them, distribute access rights, create various forms of reporting, and manage the system as a whole. The variety of software today is quite large. This allows you to select the necessary access control system depending on individual preferences.

Weprosys Limited offers design, installation, programming, commissioning and maintenance of access control systems using biometric identification systems, face recognition systems, retina, veins on the wrist.

We will develop a free access control concept or a comprehensive security system for your facility! To clarify the terms of service, please contact info@weprosys.com or Call us at 01788377901.

KNX Smart House in Dhaka Bangladesh

How does the KNX Smart Homework?

WEPROSYS LIMITED is a system integrator of solutions based on KNX and offers design, installation, programming, commissioning and maintenance of KNX automation from different manufacturers. KNX technology is an international open standard for building and smart home management (ISO / IEC 14543-3, etc.). KNX Association unites over 400 equipment manufacturers and over 69,000 integrators. In Europe, KNX smart home systems account for 60% of the KNX smart home automation and systems market. The KNX / EIB bus is a decentralized system, devices connected to the bus communicate with each other directly, and a central processor is not required.

Smart House

Equipment using the KNX / EIB bus is available from a variety of manufacturers, which is compatible with each other and can be integrated into one control system. Compatibility is ensured by software unity. For programming KNX Smart Home systems, the ETS Tool software engineering package is used, regardless of the equipment manufacturer. Weprosys Limited offers KNX equipment from ABB , Jung , Berker, Gira, Schneider-Electric, Merten, Somfy, Theben and other manufacturers.

The Smart Home system is an automated control system. This means that control functions are distributed between human and automatic systems, with manual control taking precedence.

Convenience and ease of managing the whole variety of equipment and systems united by the KNX Smart Home system into a single organism is one of the main advantages of the system.

To communicate with the smart home system and control it, all the variety of means from traditional push-button switches of various designs to touch-sensitive video panels and voice control (siri, google assistant, Alice) are used. Moreover, switches and control panels are not associated with a specific lamp, air conditioning.

The keypad, equipped with a microcontroller, and connected to the Smart Home system – Smart Home, is able to control the lighting in all rooms, as well as, for example, the climate or the volume of the music. The functionality of each button is set programmatically from and can be changed as desired.

Touch panels from different manufacturers are a multifunctional interactive system management system and monitor the status of your smart home.

Comprehensive Security Systems Honeywell Security & Fire

Weprosys Limited offers design, installation, programming, commissioning and maintenance of Honivell security systems. Weprosys Limited uses MaxPro, Pro-Watch, Esser, Novar, NewEquip, PW-6000, WinMag, WinPak, Galaxy, Morpho, HID, Suprema equipment in its solutions. The concept of building an integrated integrated security system based on Honewell equipment and software Pro-Watch.

This concept contains a description of the technical solution from Honeywell to create a high-tech security alarm system, access control and security surveillance (hereinafter referred to as the System).

The purpose of the System is to ensure the safety of an object by introducing an integrated information system that ensures the maintenance of the safe state of the controlled object, preventing, detecting and eliminating threats to life, health, habitat, property and information. To achieve this goal, the concept of using hardware and software tools to maintain the safe state of the controlled object has been developed. The System includes the following subsystems:

1) security video surveillance (hereinafter referred to as COT);

2) security alarm (hereinafter – SOS);

3) access control and management (hereinafter – ACS).

Honeywell cctv system

Introduced security surveillance system is designed for:

—-the implementation of video surveillance and display of the situation on the controlled areas of the territory and in the premises;

—-Controlled areas of the territory include:

– internal perimeter;

– outer perimeter;

– walking areas;

– courtyard;

– parking areas;

– perimeter of buildings, ramps, entrances;

—-digital recording of video from cameras with a given quality (at least 4 megapixels), resolution and frame rate with fixing the time, date and ID of the television camera;

—-video recording of scenes of events according to signals from motion detectors and video analytics, according to a schedule or according to specified rules with a specified quality, resolution and frame rate;

—-integration with the alarm system and access control system at the hardware and software level, by automatically displaying priority on the video wall and / or on automated workstations (AWS) of the duty operators of observation zones from the specified number of cameras and switching / tracking the scene / zone, upon entry into the System of the event, as well as further recording of the development of the situation in the specified scene / zones on the video storage devices with the date, time and camera ID on each and Image in accordance with the specified work algorithm;

—-recording images from all cameras (with adjustable quality, resolution and frame rate) in digital format with ensuring archive capacity for at least 30 days without overwriting;

—-the possibility of viewing video archives (including operational and long-term), including the use of intelligent video analysis software, various operators and administrators of the security system, in accordance with the established access rights;

—-providing graphical and textual information about events and system status to security system operators in real time;

—-priority display of the situation in the alarm zone on the operator’s monitor with an audible alert.

—-recognition of license plates with the fixation of data in the event log and the issuance of alerts.

Honeywell alarm system

Introduced alarm system is designed to:

—-intrusion detection (intrusion attempts) to a protected object, collection, processing, transmission and presentation of information on intrusion (intrusion attempts) in a given form, issuing an “alarm” signal and service information.

—-timely notifying security officers of the occurrence of a contingency situation (unauthorized entry, attempted entry, pressing the alarm button, etc.) in protected premises;

—-implementation of continuous monitoring of the state of all elements of the system (self-control);

—-logging of alarm and service messages, as well as system status messages.

Honeywell Access Control Systems:

The introduced access control system is designed for:

—-prevent unauthorized access to the object and to separate selected zones;

—-providing access to authorized areas of authorized employees, visitors and vehicles;

—-solving, if necessary, the problem of accounting and control of visitors;

providing information on the passage and presence in controlled areas of people in other systems.

The concept of an integrated security system

Practice proves that the use of separate systems to ensure safety in most cases is insufficient. A significant increase in the reliability of detecting threats to an object in integrated security systems is achieved by using several subsystems to detect (or confirm) the same threat. For example, unauthorized intrusion into an object may be recorded by intruder alarm and television surveillance subsystems. A television surveillance system turns out to be an effective means for confirming the operation of burglar and fire alarm systems, as well as for authenticating persons on an object when passing through access points to the ACS. Besides,

In ensuring the safety of the facility, the priority is to organize effective interaction between the operators of the television surveillance system and security personnel. Operators should have quick and convenient access to the graphical plans of the facility to quickly respond to events. It is important to remember that security threats can come not only from people, but can also be associated with emergency situations (fire, smoke). For the considered type of objects, the priority is not only to prevent unauthorized access of unauthorized persons to the controlled object, but also to monitor the movement of its employees to record working time, investigate incidents, etc. It is known that the greatest potential for causing damage to an organization has its own personnel. To detect threats of such a plan, it is necessary to use an integrated integrated security system, which includes not only a TV surveillance system, but also an ACS and a fire alarm system. It is important that the software of the system allows high-quality visualization of events from different subsystems.

Only in the case when all the elements of the integrated system are initially developed taking into account further full-fledged interaction, it becomes practically possible to realize all the declared functionality of the equipment. At the same time, it is important that the manufacturer of this solution was the developer of not only software, but also hardware (OPS and ACS control panels, DVR / NVR, detectors, etc.).

The basis of the security system being created is the Honeywell Pro-Watch software and hardware complex. Implementing the concept of an integrated security system based on Honeywell hardware and software provides high-quality visualization and logging of events from various security subsystems. On the basis of these data, timely decisions can be made aimed at maintaining the safe state of the object.

Characteristics and functionality of video surveillance Honeywell

The system of television surveillance based on equipment and software Honeywell solves the following tasks:

—-video formation of controlled areas, suitable for further processing and analysis.

—-monitoring and evaluation of the current situation in the places of observation.

—-monitoring and evaluation of the current situation in places inaccessible (or dangerous) for human presence.

—-analysis of the situation that took place in the past (recorded on the information carrier).

—-protection of the object (detection of criminal acts or attacks).

—-identifying abnormal situations that require taking certain actions to resolve them.

—-Detection of hazardous situations (for example, fire or failure of life support systems for buildings) requiring urgent action.

—-identification of objects (for example, the identity of people entering the enterprise or entering vehicles).

—-assessment of the degree of threat in case of emergency or dangerous situations to take adequate measures.

—-detection of unauthorized actions.

—-implementation of a visual check of the correctness of the operation of other subsystems of the integrated security system (in particular, security and fire alarm systems).

—-archiving video information about the state of controlled areas, including ensuring the legal legality of using these archived data.

Honeywell Video Surveillance System Structure

The video surveillance system used has parameters that provide a high-quality image of the monitored zones, taking into account the installation location of cameras and changes in illumination. The video management system provides:

—-Unified graphical user interface for monitoring and controlling television surveillance equipment. The system allows you to monitor video and audio from multiple network workstations in real time.

—-Integration with the access control system, alarm system and fire alarm system, including automatic display of video images on monitors when alarm events occur. The ability to quickly move from event to recorded video.

—-The ability to use a video wall to display video images and visualize events from all security subsystems.

—-Simultaneous work with digital video recording devices (NVR) in pentaplex mode, including: watching live video, recording, playing back, archiving video images to an external storage device, as well as controlling data exchange between a server and a remote workstation.

—-The ability to display video from 64 cameras on one network workstation, equipped with four monitors.

—-The ability to use hardware keyboards to control video images and PTZ cameras. Keyboards provide control of the entire video surveillance system.

—-Ability to use GPU-rendering of H.264 and H.265 video streams for displaying video images on network workstations. For highly efficient rendering of megapixel (up to 12 megapixel) video images, workstations use technology that utilizes graphics card resources. Modern video adapters (GPUs) have significant computational resources that can be used to decode and display video streams from the NVR, having direct access to the video card hardware. A MAXPRO VMS workstation with an Intel Core i7 processor and Intel HD Graphics using GPU rendering technology can decode and display over 28 H.264 / H.265 video streams with 1080p resolution in real time. This is especially true when using multi-monitor configurations and monitors with 4K resolution support.

—-Support ONVIF Profile G on video recording servers (NVR). The local memory of modern IP cameras allows you to record significant amounts of data, but storing video on a memory card as the main recording method is effectively used only in small video surveillance systems, for example, when you need to monitor an apartment or a garage using a mobile application. For larger systems, the presence of local memory in the camera provides the ability to save a fragment of the video image in the absence of a network connection to the NVR. This feature is available when using the MAXPRO NVR NVR, which complies with the ONVIF Profile G specification and supports work with the local memory of IP cameras.

—-Integration with intelligent video analysis software. Using intelligent video analysis subsystem to detect potential security threats in a fully automatic mode. Support for video analytics functions built into IP cameras, as well as the ability to use server-based video analytics.

—-Ability to create fault-tolerant server configurations for the video management system server (high availability server).

Ability to create fault-tolerant server configurations for network video recorders and video recording servers (NVR). Support for NVR backup options using the “N + 1” and “N + M” schemes. The NVR redundancy feature available when using Honeywell software allows you to quickly switch recording channels from one NVR to another without losing video recording. Features and benefits of redundancy in Honeywell MAXPRO VMS / NVR software

Characteristics and functionality of ACS Honeywell

The Honeywell Access Control and Management System includes:

—-ID card readers;

—-interface modules;

—-network controllers;

—-actuators;

—-optional equipment;

—-automated workplaces, information display facilities and access control servers and SSOI;

—-software.

Access controllers provide:

—-The ability to create systems with a distributed architecture, where each controller stores a local database of cards and access levels needed to make decisions about allowing or denying access to the card without having to contact the server with access control software.

—-Store at least 50,000 events offline. After reconnecting to the server with the access control software, the controller automatically transmits events to the server with the Honeywell Pro-Watch software.

—-Uninterrupted operation of the access control system during the configuration download of the controller and the card database from the server with the access control system.

—-Interfaces for connecting to a computer with access control software: Ethernet, RS-232, RS-485.

—-The possibility of using card numbers containing up to 15 decimal places.

—-The ability to assign a start and end date for each card.

—-The ability to assign at least 32 access levels for one card for one ACS controller. The ability to create individual access levels for each card.

—-The ability to use user passwords (PIN-codes) containing at least eight digits. Ability to disable the requirement to enter a password for certain users when using the “card + password” access mode.

—-Ability to limit the maximum number of password guessing attempts (PIN-code) on the reader’s keyboard. The user password can be blocked when the specified number of attempts is reached using the “card + password” access mode.

—-Global and local anti-passback control. The access control controller supports the use of a mode to prohibit a second pass, taking into account the time the card holder is in or without a zone.

—-The ability to power the ACS controller and the readers connected to it from a network switch with PoE support or a 12 V DC source. Current.

—-Apparatus of reactions to events in the system. When an event occurs, the ACS controller automatically performs a pre-programmed sequence of actions. The reaction apparatus is programmed at the hardware level of the access control controller and functions independently of the connection with the server with the access control software. The list of events includes: violation of the alarm loop, presentation of a card with a given access level, the onset of the time zone, etc.

—-Support for Wigand (Wiegand) and OSDP (Open Supervised Device Protocol) protocols for connecting readers.

—-Support encryption of data transmitted over the network. The ACS controller supports encryption to ensure the security and integrity of data when exchanging information with the server with the ACS software. Encryption keys are generated by the system administrator and downloaded to the access control controller.

—-The ability to use controlled alarm loops. All alarm loops used to connect ACS elements (door status sensors, exit request buttons), as well as detectors, have the ability to program an electrical circuit with or without terminating resistors. The ratings of the terminating resistors and tolerances for loop resistance are programmed by the system administrator. The ACS controller has the ability to distinguish at least three states of each alarm loop: norm, alarm (violation), and intervention (short circuit or break of the loop).

—-The ability to connect wireless lock concentrators to build a hybrid access control system that contains both wired and wireless locks. Management of wireless locks is performed by the access control controller regardless of the state of the server with the software.

—-The mode “entry under duress” (when entering a special password on the reader’s keyboard).

—-The ability to use the “two-person rule” to restrict access to certain areas of the controlled object. To gain access, two cardholders must present the reader with two different valid cards (one after the other) for a specified time interval.

The main element of the Honeywell PW-6000 modular access control system is the PW6K1IC (or PW6K1ICE) controller module, which stores configuration parameters, card database, users, time zones, access levels, etc. in memory. The PW6K1IC module also provides communication with the Pro-Watch server and expansion modules. The base memory of the controller stores information on 300,000 user cards and 50,000 system messages.

The main module of the controller contains an autonomous real-time clock with automatic transition to summer / winter time, the definition of leap years and support for different time zones. The controller is programmed using the Pro-Watch software. At the same time, all program changes made in Pro-Watch are dynamically loaded into the controller, without requiring its initialization (forced configuration data loading by an operator command). The main module of the PW6K1IC controller allows you to organize two independent channels of communication with the Pro-Watch server to ensure fault tolerance (the PW6K1IC module can have two independent Ethernet ports).

Access control system readers, alarm loops and relay outputs are connected to the PW-6000 expansion modules. The PW6K1R2 expansion module has 2 inputs for readers and keyboards, 6 relays (NZK / NRK) and 8 alarm loops (used to connect sensors / buttons ACS). The system can use almost any type of keyboards and readers with Wiegand, Clock-and-Data and OSDP interfaces. Expansion modules have local memory and can work offline (without communication with the main module of the controller), with partial retention of their functions. The security functions of the system allow the implementation of PW6K1IN modules with 16 alarm loops and 2 relays. To control external devices, such as sirens, indicators, elevators, lighting, etc., PW6K1OUT modules with 16 relay outputs can be used. Control, monitoring and programming of the system is carried out from a computer with Pro-Watch software. For communication with a computer, various communication channels can be used: direct connection of the PW6K1IC to the computer via the RS-232 port, integration of the main controller modules into the network via the RS-485 interface, remote connection via a telephone line via a modem, and connection to a computer network with dial TCP / IP protocols through the built-in network card. The PW-6000 controller functions independently of the personal computer; therefore, if the communication line between the PW6K1IC and the computer is faulty, the system fully preserves all its functions. Pro-Watch software licensing. Direct connection of the PW6K1IC to the computer via the RS-232 port; integration of the main controller modules into the network via the RS-485 interface; remote connection via a telephone line via a modem; and connection to the computer network with the TCP / IP protocol set via the built-in network card. The PW-6000 controller functions independently of the personal computer; therefore, if the communication line between the PW6K1IC and the computer is faulty, the system fully preserves all its functions. Pro-Watch software licensing. Direct connection of the PW6K1IC to the computer via the RS-232 port; integration of the main controller modules into the network via the RS-485 interface; remote connection via a telephone line via a modem; and connection to the computer network with the TCP / IP protocol set via the built-in network card. The PW-6000 controller functions independently of the personal computer; therefore, if the communication line between the PW6K1IC and the computer is faulty, the system fully preserves all its functions. Pro-Watch software licensing. therefore, if the communication line between the PW6K1IC and the computer is faulty, the system fully preserves all its functions. Pro-Watch software licensing. therefore, if the communication line between the PW6K1IC and the computer is faulty, the system fully preserves all its functions. Pro-Watch software licensing.

Characteristics and functionality of the Honeywell alarm system

The security alarm system includes:

—-security detectors;

—-security alarms and messaging devices;

—-alarm buttons;

—-arming devices;

—-interface modules;

—-alarm panels (control panels) with programming and display devices.

Honeywell PW-6000 series security control panels (KP) or MB-Secure provide:

—-The ability to use addressable and indirective alarm loops. The total number of alarm loops connected to one gearbox is up to 4096.

—-The possibility of dividing KP resources into independent sections. The total number of sections for one CP is up to 256. The following elements and parameters of CP are assigned individually for each section:

– users (passwords and cards);

-outputs of the relay and electronic keys;

– keyboards and readers;

– event logs (OS and ACS);

– entry / exit delays.

—-The ability to transfer information about the following states of each alarm loop:

– intervention (loop closure);

– norm;

– anxiety (violation);

– malfunction (used for detectors having a self-diagnostic function with a separate output);

– intervention (break of loop).

—-The ability to connect keyboards with a touch screen to work with the system using a graphical interface. The keypad with a touchscreen display provides the following functions:

– management of the system security mode (arming in various modes, disarming, exclusion / restoration of armed zones);

– display of the system event log with the ability to sort messages by types (alarms, arming / disarming, malfunctions, etc.);

– display of the current state of alarm loops;

– the ability to control external devices (using the KP outputs) using macro commands.

—-The ability to use keyboards combined with a contactless card reader. The reader realizes the following functions:

– control of arming and disarming by means of a card;

– user access mode “password + card” (control of arming / disarming and doors);

– access mode on two cards;

– performing various actions in the system when the card is presented to the reader and the card is held for a set time;

—-The ability to send messages to the centralized monitoring station (CMS) via the following communication channels:

– computer network with Ethernet architecture and TCP / IP protocol suite (including the ability to encrypt data according to AES)

– phone line;

—-The ability to use the address bus BUS-2 for connecting address detectors and peripheral devices with an arbitrary topology.

—-The ability to connect readers with RS-485 interface and / or Wiegand (Wiegand) for the implementation of the control functions of the formulation and removal of partitions KP with protection.

—-The possibility of programming the joint logic of the alarm loops, outputs of electronic keys, partitions, keyboards, readers, passwords and user cards.

—-The ability to use wireless detectors and keyfobs with a two-way communication channel with the control panel. The wireless subsystem provides control of message delivery from the detectors to the control panel and monitoring the status of the radio channel.

—-Availability of multi-user access to the system. Users have the ability to simultaneously set / disarm assigned sections using different keyboards connected to the same control panel.

—-The possibility of programming text descriptions (for loops, outputs, sections, readers, users) displayed on the keyboard displays when programming the system and the occurrence of events. Text descriptions are used for convenient work of users and operators with KP.

—-Ability to synchronize programming data with the computer.

The main tactical and technical requirements for the SOS, the list of objects of protection and methods of arming / disarming each of the objects (centralized / decentralized) are determined by the individual technical task issued by the Customer.

Presentation of Honeywell MaxPro, Pro-Watch, Win-Pak and Galaxy solutions.