The program consists of several independent modules that perform various functions.

a) Administrative – Reporting

It consists of two parts: Admin and Report.

The “Admin” section is used to configure the entire access control system, site monitoring and remote, automatic device control. Its tasks can be divided into two groups:

  • – detailed definition of control rules for devices installed in the system
  • – defining access control rules for authorized persons to individual parts of the facility.

The “Report” section allows to reconstruct the history of events that took place on the site. It makes it possible to trace what happened in the system in a given time interval, on a given controller: who opened individual doors, what devices were started, what signals came from controllers, etc. Similarly to defining the system configuration, also when consuming a report, we have the possibility of very detailed definition of its criteria, i.e. select only those events that interest us at a given moment.

b) Operator

It consists of three parts: Operator, Maper and ID20.

The “Operator” section is used to track the current state of the system and to manually control some of its elements. With the help of this module, the operator, i.e. the person on duty at a given moment at the console, can e.g. turn on the devices, receive alarm signals from the system and perform those activities that have been defined as activities that require confirmation.

The “Maper” part is used to prepare the map, which is a graphic presentation of the defined system displayed on the control console screen (after starting the “Operator” part). The purpose of the map is to: – help the operator track the current situation of the system on the control console screen – definition of actions possible to be performed by the operator at the console (set of instructions).

The “ID20” part is used to identify the user (operator) sitting at the control console. Before performing any operation in the Operator program, the validity of the identification card in the terminal and the user’s authorization to control the operation of the system is checked on an ongoing basis

c) COM monitor

The Monitor module is responsible for communication of the executive computer with controllers or other electronic devices connected to its COM port.

It carries out two tasks:

  • – Collects information about the current status of controller’s input ports and transmits this data to the system.
  • – Sends data (or more precisely: orders to be executed) from the system to the desired controller.

d) MLX monitor

The Monitor MLX module is used to maintain communication between the computer system and external devices controlled by ASCII codes, e.g. multiplexer, timelapse etc.

e) GSM monitor

The GSM Monitor module is responsible for receiving communication via SMS between the computer system and GSM devices. With its help, we can also control the work of the system by phone (in a strictly defined range).

f) Archiver

The Archiver module is used for periodic (manual or automatic) data archiving, i.e. backing up data in the event of equipment failure, virus interference, accidental or deliberate deletion of data, etc. Two types of data are stored in the IMS system: – configuration, i.e. a set of information on how to program the system (data on users, location and assignment of controllers, etc.) – event history, i.e. information about what happened in the system.

g) Task Agent

The Task Agent module supervises the execution of tasks (Actions) programmed for a specific day and time. In addition, it controls the operation of all running Monitor modules.

Leave a Reply

Your email address will not be published. Required fields are marked *

5000+ Completed projects, we ensure high quality