Backup receiver connection type: 9, Enter. Same as for
Primary receiver connection type.
Backup receiver key number: 10, Enter. Same as for
Primary receiver key number.
Backup receiver encryption key: 11, Enter. Same as for
Primary receiver encryption key.
Backup alternative path test time: 12, Enter. Same as for
Primary alternative path test time.
Note:
For version firmware TDA74XXNG 1.13, set the
following additional settings using the TDA74XXNG
application or terminal, and USB connection between a
PC and the TDA74XXNG dialler:
- set Panel type = VdS with command: AT!U19=1
- set Report X25 status = Disabled with command:
AT!U20=0
USB connection between the dialler and a PC or other
device causes ISDN fault event. Use this connection only
during service.
Specifications
Power supply
Current consumption:
From panel
From battery
Ethernet standard
GSM/GPRS operating frequency
ranges
IRIS communication ports:
Remote Service App
Diagnostics
Polling
Alarm reporting
Dimensions
Weight
Operating temperature
Relative humidity
Description of the IRIS protocol
The polling / alarm mechanism used on the Chiron IRIS
system is highly secure and flexible.
It has been independently certified as compliant to the highest
level of security available – Grade 4, ATS6 - within the
EN 50131 standard for alarm systems.
The IRIS system is unique in its ability for the polling frequency
to be varied which means that the polling profile can be
adjusted as necessary to take into account the grade of
security required and the traffic bandwidth available.
Key features are:
•
Independently certified as compliant with EN 50131-1
Grade 4 ATS configuration SP6 for single path and DP4
for Dual path communications.
•
All polling and alarms are authenticated by the receiver
(Polling Engine) using the secure and sophisticated
14 / 90
12 ±3 V
300 mA
370mA
IEEE 802.3
1710 to 1785 and 1805 to
1880 MHz, GSM 1800 (band I)
880 to 915 and 925 to 960 MHz,
GSM 900 Extended (band I)
TCP 10001
TCP 51292
TCP 52737
TCP 53165
80 x 90 x 22 mm
67 g
−10 to 55°C
95% max, noncondencing
"Challenge Handshake" mechanism as used in military
and credit card applications. Each remote IRIS dialler
proves its authenticity using a 256 bit security key. A new
random number generated by the receiver (Polling
Engine) is used for every poll so it is not possible to
substitute the dialler using playback or sequence
prediction.
•
Unlike other systems each dialler can have a unique
security key which can be changed at the Monitoring
Centre any time as required. For additional security the
installer never needs to load the key or be aware of what it
is.
•
Also unlike other systems, the polling frequency is not
fixed and can be varied by the Monitoring Centre at any
time, from a period of 10 seconds for high security
systems down to once a week for low security systems.
This means that polling rates can be optimised to deliver
the grade of service required and minimise the bandwidth
required.
•
Polling and alarms are carried over the TCP/IP protocol
that gives end-to-end error protection. This removes the
possibility with other protocols such as UDP that data
packets are lost or resequenced in the network leading to
false alarms.
•
All polling and alarms are outbound from the dialler
location to the Monitoring Centre and do not require the IP
address of the dialler to be known. No special set-up is
required at the customer's router, such as port mapping
for incoming calls. This feature is essential for operation
with networks with dynamic addressing and standard
GPRS networks.
•
Background communication path polling is also
configurable at the Monitoring Centre and enables the
IRIS dialler to periodically poll over the backup
communication path, and any faults with this
communication will be reported back to the IRIS
SecureApps system.
•
Each poll transaction is very small and with the
authentication protocol is only about 500 bytes of data,
including all traffic in both directions. For fixed line IP
networks there are no traffic costs.
Total traffic is proportional to the polling frequency. For
example, at 10 second poll 180K bytes per hour and at
3 minutes polling this would reduce substantially to only 10K
bytes per hour.
Even with tariffed networks such as GPRS, and when running
at a polling rate suitable for the highest level of security, a
typical cost is only a few Euros per month. For GPRS in many
cases the level of traffic falls within the free bandwidth that
comes with the SIM card contract and will effectively be at no
cost.
Regulatory information
Manufacturer
PLACED ON THE MARKET BY:
UTC Fire & Security Americas Corporation, Inc.
3211 Progress Drive, Lincolnton, NC, 28092, USA
LOCATION OF MANUFACTURE:
Chiron Security Communications AG
AUTHORIZED EU REPRESENTATIVE:
UTC Fire & Security B.V.
Kelvinstraat 7, 6003 DH Weert, Netherlands
P/N 1087102-ML • REV A • ISS 01APR15