
Security Escort | Installation and Setup Guide | 2.0
E
ui
ment Estimation
EN | 24
Bosch Security Systems | 1/09 | 33831E
• Try changing the transponder
database sensitivity of receivers
one at a time while testing the
alarm location response, using one
of the testing methods above. For
example, if alarms are being pulled
towards a particular receiver,
lower its sensitivity in 10%
increments and retest. If the area
can be corrected using this method,
verify the surrounding areas were
not adversely affected. It is
generally better if the correction
is done in small steps while
verifying the adjacent areas,
rather than trying to correct the
entire error in one step.
• With Version 2.03 and higher of the
Security Escort software, there are
five different location algorithms
that can be selected on an
individual receiver basis in the
transponder database: classic
(original Security Escort
algorithm), linear, low pull,
medium pull, and strong pull. By
default when a receiver is set for
outside or tunnel, it uses the
linear algorithm and all other
receivers use the low pull
algorithm. The receiver that most
strongly hears the alarm
transmission determines the
algorithm used for this alarm.
Changing the transponder database
algorithm setting for a receiver
only affects the location when the
alarm is close to this receiver and
it most strongly hears the alarm.
Change the transponder database
algorithm setting for a receiver
and test in its area, using one of
the testing methods above. The
stronger the pull the more the
alarm is pulled towards the
receiver, with linear having no
extra pull. Verify the surrounding
areas to make sure they are not
adversely affected.
• With Version 2.03 and higher of the
Security Escort software, the five
different location algorithms can
individually limit how close other
receivers must be to the level of
the receiver hearing the alarm the
best, before they are included in
the alarm. Classic (original
Security Escort algorithm), linear,
low pull, medium pull, and strong
pull each have a separate setting.
By adjusting this setting you can
control if distant receivers with
low receive levels are considered
in the alarm calculation.
• With Version 2.03 and higher of the
Security Escort software, you can
add virtual receivers in the
transponder database. A virtual
receiver is added at one of the 64
points allowed per transponder.
However, there is no physical
hardware used. The virtual receiver
is intended to compensate in cases
where there is a receiver
imbalance. For example, if a
building with a dense population of
receivers is adjacent to a fence
with few receivers and an alarm
occurs between them; the alarm
location may pull towards the
building. The virtual receiver
refers to other physical receivers
that must be on the same
transponder. If both the referred
receivers receive an alarm
transmission, the virtual receiver
added to the alarm as if it was a
physical receiver hearing the alarm
at the average receive level of the
two reference receivers.
The virtual receiver’s location and
sensitivity may be adjusted the
same as a physical receiver. After
a virtual receiver is added, verify
the surrounding areas to make sure
they are not adversely affected. In
no event should a virtual receiver
be utilized as a cost savings
measure to avoid the installation
of an actual receiver.
Komentarze do niniejszej Instrukcji