The IMS system was designed to perform three main tasks:

  • Integrated monitoring of local systems and devices in order to visualize all events occurring on the site. When different local systems (alarm, fire, panic, ventilation, access control, control, etc.) work independently on the site, the control, including supervising and analyzing their work can be burdensome and time-consuming, not to mention the inability to exchange information between them. When integrated monitoring is used, all information is “flowing” through the computer system on an ongoing basis and is presented on the screens of the relevant computer monitors, giving the operator a full picture of the facility’s work on an ongoing basis and the ability to react immediately in demanding situations. In this situation, some operator actions can be taken over by the computer system and performed automatically.

 

  • Manage and supervise the operation of local devices and systems automatically with full control by the system operator. No operator intervention is required for the daily operation of many devices. Their work can take place in a fully automatic way after initial set up and its possible to change the set up easy and quickly. This canbe carried out by trained user personnel without the need for interference by a specialized service. Of course, taking control of the system by the operator is possible at any time.

 

  • Managing the operation of individual devices directly by the operator (or operators) from the command point. It is a work pattern that requires an appropriate number of system operators capable of making specific decisions, however, under the precondition that each decision is made by a person with the appropriate competences. Of course, each  decision is saved in a database with his personal identifier and the exact time (up to the second). In addition, some of his decisions require (in addition to the presence of a personal identifier in the form of an RF card in the reader) to provide an access password (double control on the principle of “I have something and I know something”). If any of the system operators is threatened, and there is a danger of unauthorized persons taking control of the system, it is possible to block the operator’s work by remote (from another operator terminal) logout and taking away his rights to operate the system.

Leave a Reply

Your email address will not be published. Required fields are marked *

5000+ Completed projects, we ensure high quality