background image

Application Note: Security, Alarm System 

www.topkodas.lt

  

 

28  | 

E N

   

 

 

19  Event Summary (Events) 

 

 
Sera2> Event Summary 
 

 

Figure 41 the example Event Summary (Events) window 
 
Table 13 Explanation of every field in "Event Summary" window 

ID 

Report sequence number 

Name of Status Event 

Event (report) name 

Code 

Report Contact ID code. 

Enable 

The indicated report will be sent when it is checked. 

Alarm SMS Text 

Alarm text which will be visible in SMS message is entered. 

Restore SMS Text 

Restore text which will be visible in SMS message is entered. 

Type 

 

None 

 

10 

USER 

Refer to USER Report Options 

11 

ZONE 

Refer to Zone Report Options 

12 

NUM 

Refer to Numerical Report Options 

 

20  Software updates 

 

 
Sera2> About (in the command line) 

 

If  you  want  to  update  the  module  manually,  got  to 
“About” and press “Check for updates” 

 

Figure 42 How to update the module manually 

If you need to contact the seller with the questions about the configuration, you have to: 
 

 

Press  “Read”  icon  first  to  read  the  configuration  from  the  module,  the  press 
“File>Save us” and save the configuration. 

 

 

Save the Events Log file and send these files with the question to the seller. 

 
These steps will let better understand the problem and will reduce the time to find the solution. 
 
 

 

If you want to receive software updates, go to Settings and mark “Check for Updates Automatically”. When new  update will be available, 
the program will inform you, and you have to start the update.  After that you have to connect the module to the computer via mini USB 
cable. You have to write this update to the module GTalarm2 by pressing “Update” in the bottom line in SERA2 software. 

21  Recommendations to the installer 

 

21.1 

Glass break, shock sensors 

Glass break sensors 

Acoustic  sensor  recess  mounts  in  a  1  in.  (2.54  cm)  hole. 
One sensor can protect an entire room. Sensor range is 25 
ft. (7.62 m) to the bottom of the g

lass in a 360˚ pattern, so 

the sensor can be ceiling mounted, mounted on the opposite 
wall, or on an adjoining wall. 
 

  

 

Summary of Contents for GTalarm2

Page 1: ...GTalarm2 Application Note Security Alarm System Monitoring alarm control This manual includes steps to install set up and use your system...

Page 2: ...PGM outputs 24V 1000mA Open Drain Digital expansion module BUS In field firmware upgrade via USB SERA Cloud Remote Service Events log buffer 2048 events Program remote controls using the master or ins...

Page 3: ...or to the server 1 3 First steps to prepare GTalarm2 module and Sera2 software Preparation procedure of the module GTalarm2 Connect the GSM antenna to the antenna connector Insert the SIM card in the...

Page 4: ...r supply Battery Wiring It is possible to supply the security system from stabilized power supply source 10 15 V and not less than 1 5A It is necessary to calculate max current of power supply The cur...

Page 5: ...sed or used as security system s zones with selectable type NC NO EOL EOL TAMPER 2 programmable analog inputs I O1 I O2 0 10V 0 20mA that can be used or used as security system s zone with selectable...

Page 6: ...Monitoring control via mobile phone web browser GTalarm2 Figure 5 Monitoring control via mobile phone web browser Figure 7 Monitoring via web mobile app Zone status 4 2 Monitoring via SERA2 software...

Page 7: ...Application Note Security Alarm System www topkodas lt 7 E N Figure 8 Monitoring via free Sera2 software Zone status...

Page 8: ...2012 configurable as encrypted and non encrypted Shock sensor Reporting to the central monitoring station GTalarm2 Figure 9 Reporting to the central monitoring station 4 4 Local alarm For protecting...

Page 9: ...able analog inputs I O1 I O2 0 10V 0 20mA for analog sensors control or using as security system s zone with selectable type NC NO EOL EOL TAMPER 5 1 NC NO EOL detectors wiring It is recommended to us...

Page 10: ...owing conditions If a Delay type zone is NOT violated during exit delay and a zone s with Stay attribute enabled exists the system will arm in Stay mode When arming the system in Stay mode under this...

Page 11: ...xcept the module will auto bypass the zone if Armed in the Stay mode 6 Wiring Type Type EOL End of line resistor Input type with resistor NC Normal Close The alarm will be send when the circuit betwee...

Page 12: ...ectors Figure 20 2 wire smoke detector wiring diagram o If I O1 I O2 set as 2 wire don t need connect 5 1k resistor to VD o I O1 I O2 do not have internal pull up resistors So if you want to connect N...

Page 13: ...inuous signals generated and if the alarm system is disturbed pulse signal Signal is terminated by turning off the alarm system OFF ON Flash Open Command ARM Close Alarm Open Remote Control Output des...

Page 14: ...nuous signals generated and if the alarm system is disturbed pulse signal Signal is terminated by turning off the alarm system 25 System State Output for connection of light indicator of the alarm sys...

Page 15: ...arm the system and turn OFF the alarm by dialing the system s phone number from any of 800 available user phone numbers The system ignores any incoming calls from a non listed phone number The phone c...

Page 16: ...smission Delay to enter a valid 4or 6 digits Security Code before the Central Monitoring Center CMS is notified If a valid Security Code is not entered within the 30 seconds then a message is sent to...

Page 17: ...and press Start iButton RFID programming mode to start entering iButton keys 2 Press Stop iButton programming to stop entering iButton keys 3 Write configuration by pressing Write icon C by sending SM...

Page 18: ...elow 9 2 Enter iButton keys by sending SMS message A Send SMS message to the module GTalarm2 INST123456 063 S INST Install Configuration of the parameters 123456 Installer s password Space character 0...

Page 19: ...y In order to delete the code it is necessary to enter 000000000000 7 OUT The selected input will be switched if a user will call from this number Preferred input may be assigned to each user s number...

Page 20: ...t is necessary to enter 000000000000 6 Keyb Code Key button code might be entered manually In order to delete the code it is necessary to enter 000000000000 7 OUT The selected input will be switched i...

Page 21: ...er tamper recognition 18 Tamper Disable The module will not generate an alarm or trouble 19 Trouble when disarmed alarm as per zone when armed When disarmed Generates Trouble Only The module transmits...

Page 22: ...d busy signal b The system will continue dialing the next listed user phone numbers in the priority order The system will dial again as many times as programmed and the same order as phone numbers lis...

Page 23: ...tem can be configured to report events to the monitoring station by transmitting data messages to the monitoring station The system connects to the central monitoring station when the CMS Central Moni...

Page 24: ...station to receive the connection requests TCP mode or the datagrams UDP mode transmitted by ALERT 2 Backup 1 Backup 1 central monitoring station settings 7 Transport Protocol TCP or UDP The used lin...

Page 25: ...Code Format A 4 digit or 6 digit user access code format can be selected 6 I O1 Settings 2 Wire Smoke detector Fire current loop or 0 10V Analog Input Zone or Sensor or Output or 0 20mA 4 20mA Curren...

Page 26: ...ton stops the monitoring of the module 3 IMEI IMEI number of GSM modem available in the module 4 SIM ICCID ICCID Integrated Circuit Card Identifier A SIM card contains its unique serial number ICCID I...

Page 27: ...rm shutdown for the zone is activated Allowable number of the same alarm events is reached and the same events will not be reported 6 Bypassed If checked and the color is red the zone is bypassed 7 Fo...

Page 28: ...seller with the questions about the configuration you have to Press Read icon first to read the configuration from the module the press File Save us and save the configuration Save the Events Log file...

Page 29: ...l be taken to match sensor range to room size A sensor whose range extends well beyond the boundaries of the room is acoustically hot and vulnerable to false alarms For protecting glass on more than o...

Page 30: ...icable laws codes or standards for a specific type of occupancy approved single and multiple station smoke alarms shall be installed as follows 1 In all sleeping rooms and guest rooms 2 Outside of eac...

Page 31: ...ted on the other side of closed or partly open doors If warning devices sound on a different level of the residence from the bedrooms then they are less likely to waken or alert people inside the bedr...

Reviews: