ReadyPlanet.com
dot
dot
ค้นหา

dot
dot
รายละเอียดสินค้า
dot
bulletสินค้าระบบกันขโมย BOSCH
bulletสินค้ากล้องวงจรปิด (CCTV)
bulletสินค้าระบบเตือนอัคคีภัย BOSCH
bulletระบบสแกนลายนิ้วมือ SUPREMA
dot
บทความและสาระความรู้
dot
bulletระบบแจ้งเตือนอัคคีภัย BOSCH
bulletระบบกันขโมย BOSCH
bulletVideo สอนการใช้งาน
bulletVideo การโปรแกรมและต่ออุปกรณ์
bulletTechnical Tips


ระบบกันขโมยบ้าน BOSCH-Facebook

TeamViewerQS


ระบบกันขโมย BOSCH รุ่น B4512 article

 

BOSCH Intrusion Alarm Systems -  B Series  Control Panels B4512

ระบบกันขโมย BOSCH - ตู้ควบคุม รุ่น B-Series B4512

Download Datasheet - B-Series B4512.pdf download

  • Supports up to 28 points using a combination of hardwired or wireless points for installation flexibility and 2 areas with perimeter and interior
    control
  • On-board Ethernet port for Conettix IP alarm communication and remote programming, compatible with modern IP networks including IPv6/IPv4, Auto-IP and Universal Plug and Play
  • Installer-friendly features including on-board USB for easy on-site RPS programming, plus plug-in PSTN and Cellular communication modules for simple installation and future proof upgrades
  • Notifications with email and text messaging, and the Remote Security Control app for Android and iOS mobile devices
  • Programmable keypad shortcuts, situation sensitive on-screen help, and a bilingual user interface make system operation simple and easy

             The B4512 Control Panel integrates intrusion and residential fire, providing one simple user interface for both systems. The B4512 provides up to 28 individually identified points that can be split into 2 areas. The control panel includes a built-in Ethernet port for IP network communications, and is compatible with modules that send events to selected public switched telephone network (PSTN), IP network, or cellular network destinations through four programmable route groups.
          With the B4512, you can monitor doors, windows, and motion within areas like showrooms or those that hold inventory. Each user can have a personalized passcode, a wireless keyfob, and a credential to control the system.
          Use programmable authority levels with restricted privileges to provide service, security, and cleaning personnel with full or limited access. Use the three programmable outputs (expandable up to 27) to turn on ligts or open and lock doors. Users can:

  • Turn on the system to secure the stock room while you conduct daily business.
  • Perform tests to ensure your system is working properly.
  • Set your system to alarm immediately if a door opens.
  • Activate the Watch feature so a tone sounds whenever a customer enters.
  • Set a schedule for your system to automatically turn on at closing time.
  • Use wireless security options to customize your system.

            Central monitoring stations provide 24-hour system monitoring with access to vital services. Professional security personnel can test the system, monitor system activity, and alert the police, fire department, or other emergency response teams if necessary. 


Functions

Programmable outputs    

    • 500 mA not to exceed 1.3 A total current for a burglary system, or not to exceed 1.0 A total current for household fire applications
    • 800 mA auxiliary power at 12 VDC
    • Four alarm-output patterns
    • Programmable bell test
    • Three programmable outputs; one high current using a relay, and two trigger outputs
    • Output A contact rating is 3 Amps
System response
    • High-performance micro-controller provides industry leading system response
    • 20 custom point indexes
    • Selectable point response time
    • Cross point capability
    • Fire alarm verification
    • Dangerous gas indicator includes carbon monoxide (NFPA 720)
    • Watch mode
    • Scheduled events (SKEDs) perform several functions, such as turn on (arm) the system, turn off (disarm) the system, bypass and unbypass points, and control relays
User interface
    • Supervision of up to 8 keypads
    • Custom keypad text is fully programmable through RPS
    • Full function menu including custom functions
    • Authority by area and 32 character name for each user
    • 14 custom authority levels control user’s authority to change, add, or delete passcodes to disarm or bypass areas; and to start system tests
    • Programmable primary and secondary language by user and keypad; select from English, Spanish, French, and Portuguese
      Area programming offers a wide selection of different system configurations. Make area arming conditional on other areas (master or associate), if desired. You can configure any area for perimeter and interior arming, not requiring a separate area for this function. For higher security applications, the Area Re-Arm feature guarantees that areas are always rearmed, and are disarmed for no longer than a specific, configurable, amount of time (for example, service time).
Custom functions
      For added convenience, the installer can program custom functions that allow customers to complete complex tasks with one simple action. For example, a custom function can bypass a group of points and arm the system, allowing the user to perform these functions with one easy command. Users can activate custom functions with a keypad, keyfob, token, or card, or the control panel can activate a function in reaction to a faulted point, or automatically through a scheduled event (SKED).
Passcode security
    • Two-man rule. Requires two people with two unique passcodes to be present at the time of opening.
    • Early ambush. Allows users to verify that the facility is safe by requiring two passcodes. The control panel sends a duress event if the user does not enter the passcode a second time after inspecting the premises.
    • Dual authentication. Requires two forms of identification before processing certain system commands, including turning off the system and opening doors. A standard system user must have a passcode, a credential (token or card), and appropriate command authority permissions assigned in the door and keypad’s assigned area.
Easy exit control
     The control panel changes from one On (armed) state to another without turning off (disarming) the system. For example, if you change the state from Part On (Perimeter Arm) to All On (Master Arm), the control panel complies and reports the change. Easy Exit Control reduces the number of keystrokes, simplifying system operation.
Programmable passcode-controlled menu list
     Passcode-controlled shortcuts provide users only with the options and information pertinent to them, simplifying system operation.
Flexible control
     The system provides the flexibility to choose added convenience or high security. For example, you can restrict to a keypad's immediate local area turning on (arming) and turning off (disarming) the system with a passcode, even if the user has access to other areas. This is particularly useful for high security areas, where a user may have access to the area, but would prefer to only turn off (disarm) the area individually rather than with the rest of the system. Another option is to program the system to turn off all areas the user can access from any keypad.
Monitor Delay/Delayed Response
     Create a special point index that delays the reaction of a point for a specified time (up to 1 hour in minutes and seconds). This delay provides time for the specified condition to reset before activating any annunciation. The system can annunciate locally and send a report, if desired. When the system is armed, the point can respond like a normal point – providing dual functionality. Use this feature to ensure that perimeter doors have not been propped open, or to monitor critical areas such as computer rooms and safes, for example.

System users
     The system supports up to 32 users. Each user can have a personalized passcode, a wireless keyfob, and a credential to control the system. User passcodes contain three to six digits. You can assign passcodes to one of 14 customized authority levels in each area and can be restricted to operate only during certain times. Programmable primary and secondary language by user and keypad; select from English, Spanish, French, and Portuguese.
Communication formats
     The control panel prioritizes and sends reports to four route groups. Network communication uses the Modem4 communication format, whereas phone communication uses Contact ID or Modem4 communications formats. Each group has a programmable primary and backup destination. The control panel provides flexible communications for most central stations with reporting capabilities such as:
    • Individual point numbers
    • Opening or closing reports by user and area number
    • Remote programming attempts
    • Diagnostic reports
IP communication
     The control panel uses on-board Ethernet (IP) connection (the on-board Ethernet port is excluded on “E” versions) to communicate with a Conettix D6600 or a Conettix D6100IPv6 Communications Receiver/Gateway.
     The control panel can optionally communicate with a Conettix D6600 or a Conettix D6100IPv6 Communications Receiver/Gateway using a B426 Conettix Ethernet Communication Module or a Conettix Plug-in Cellular Communicator (B440/B441/B442/B443).
     Using Conettix IP communication offers a secure path that includes anti-replay/anti-substitution features and provides enhanced security with AES 256-bit encryption (using Cipher Block Chaining (CBC)).The control panel supports Domain Name System (DNS) for both remote programming and central station communication. DNS provides ease of use, eliminating the need to use static IP addresses as your reporting destination, and accommodates a simple solution for central station disaster recovery. IP Setup is available via the keypad Installer menu and the remote programming software, eliminating the need to use complicated internet programming tools such as ARP and Telnet. The control panel supports both IPv6 and IPv4 networks.
     For more information on the enhanced communications capabilities, refer to RPS Help or the control panel's Program Entry Guide.
Communication paths
     The control panel accommodates up to four separate phone and four separate network paths to the central station receiver. When resetting alarms or turning a system on and off, the user is identified by name and number.
Personal notification
     The control panel can send text messages and emails for personal notification over Ethernet or using a cellular communicator. You can configure up to 16 destinations using a combination of cellular phone numbers and email addresses. The control panel sends notifications in the user’s programmed primary language.
Firmware updates
     The system allows remote firmware updates through Remote Programming Software (RPS) using the RPS Firmware Update Wizard. The Firmware Update Wizard uses the on-board USB connection or the on-board Ethernet (IP) connection (the on-board Ethernet port is excluded on “E” versions) to transmit firmware updates.
     The control panel can optionally receive firmware updates from RPS using a B426 Conettix Ethernet Communication Module or a Conettix Plug-in Cellular Communicator (B440/B441/B442/B443). Notice! Cellular firmware updates require more time than Ethernet updates and carrier data rates apply.
    • Control panel updates. Remotely update the control panel firmware for easy feature enhancements without replacing ROM chips.
    • Module update support. Remotely update the firmware on connected SDI2 modules for easy feature enhancements without visiting each individual module.
A wide variety of input options
Each point:
    • Accommodates normally‑open (NO) and normally‑closed (NC) devices with end‑of‑line (EOL) resistor supervision.
    • Accepts programming for fire, gas, fire supervisory, or intrusion applications.
    • Supports hardwired and wireless devices.
    • Supports IP cameras by Bosch as point sources.
Security and fire detection
    The control panel provides eight on-board points, and up to 20 additional off-board points (depending on model and expansion interfaces). You can program individual points to monitor some types of burglar alarms, fire alarms, and supervision devices.
Event log
    The event log stores local and reported events. The event log includes information such as time, date, event, area, point, and user. View the event log from a keypad or use RPS to remotely retrieve event information. When the event log reaches a programmed threshold of stored events, it can send an optional report to a receiver. The log stores up to 127 local and reported events.
Scheduled events (SKEDs)
    The internal clock and calendar start individually scheduled events (SKEDs). SKEDs perform functions such as turn on or off, relay control, or point bypassing.
The control panel offers:
The control panel offers:
    • Five scheduled events with up to 25 different functions
    • Two opening windows and two closing windows
    • Two user windows
    • Day-of-week, date-of-month, or holiday only schedules
    • One holiday schedule of 366 days (leap year)
Programming
    Installers can perform limited programming on-site with a keypad (critical parameters; such as account IDs, central station and RPS IP addresses and phone numbers, reporting formats, and more). They can also do full programming on-site or remotely (attended or unattended) with RPS.  A programmable system passcode prevents unauthorized remote programming.
Diagnostics
    Keypads and RPS offer diagnostic help for monitoring and troubleshooting. The diagnostics features allow you to view the status of the on-board Ethernet connection, plug-in communicators, and SDI2 devices, including inputs, outputs, and RF. The features provide the status of the control panel and its connected devices, such as firmware version, power, and missing conditions. View the status of each area. Diagnostics also include connection data for connected wireless and Ethernet devices.


 




ระบบกันขโมย BOSCH รุ่น B-Series

ระบบกันขโมย BOSCH รุ่น B5512 article
ระบบกันขโมย BOSCH รุ่น B3512 article
ระบบกันขโมย BOSCH - อุปกรณ์เสริม - B930 article
ระบบกันขโมย BOSCH - อุปกรณ์เสริม - B942 article
ระบบกันขโมย BOSCH - อุปกรณ์เสริม - B915 Basic Keypads article
ระบบกันขโมย BOSCH - อุปกรณ์เสริม - B208 article
ระบบกันขโมย BOSCH - อุปกรณ์เสริม - B308 article
ระบบกันขโมยบ้าน BOSCH รุ่น B-Series article



Copyright © 2010 All Rights Reserved.

ระบบ สัญญาณกันขโมย บ้าน BOSCH , Intrusion , คีย์การ์ด , Key Card, Access Control, กล้องวงจรปิด , CCTV

Link เพื่อนบ้าน: สารบัญเว็บไซต์ ; โปรโมทเว็บฟรี ; Blog เพื่อนบ้าน ;Free SEO Tools ;Active Search Results