Site hosted by Angelfire.com: Build your free website today!

My Home Page

My Favorite things about Angelfire.

My Favorite Web Sites

Angelfire - Free Home Pages
Free Web Building Help
Angelfire HTML Library
HTML Gear - free polls, guestbooks, and more!

2 Introduction This manual describes the software application for the operators of the Burglar Alarm System to monitor the alarms and the execution of alarm procedures. 2.1 Facts about the Burglar Alarm Operator The Burglar Alarm Operator is a software application running on a workstation which enables operators to monitor alarms and to control the alarm procedures that should be performed according to procedures which have been pre-programmed using the Burglar Alarm Administration Program (please refer to the Administrator software manual). Alarms will be received via the alarm server. The alarm server contains a data base with the alarm procedure definitions which is organised by the administration program. All operators are listed in the same database with a link to their respective workstations and will be automatically notified by the alarm server. The proper installation and execution of the operator program is necessary for the operator to receive messages from the alarm server. The operator program gets access to the database and informs the operator about all necessary information associated with the alarm. The operator can check if all the alarm messages will be sent correctly to the adequate terminators. At the workstation, the screen shows a datasheet “Alarm Operator” consisting of a detailed window of the subscriber data and the terminator data. On the top of the datasheet a menu bar shows the main items used for the alarm operator. The program provides all information to enable the operator to contact the adequate persons on a manual way, e.g. by phone or fax or pager. By clicking on the items the subdirectories will be shown. (please refer to the detailed explanation in 4.2) In case of an incoming alarm, a message box will appear on the screen asking the operator to control the alarm. If the operator wants to control the alarm and confirms with yes, the incoming alarm can be localised in two different ways: First, if the alarm server is sending a message of a real alarm to the operator, a video screen will appear on the datasheet of the Alarm Operator: This video message contains the picture of the location as well as details of the alarm explained by the adequate icons (the icons will be further defined in 4). Also details will be shown in the datasheet of the alarm operator subdivided in a table of the subscriber details and another for the terminators. If the operator is not available, another operator will be selected. Otherwise, the operator can select an alarm by himself by clicking on active alarms as well as older alarms in the menu task to get information. In case of any trouble, the operator can choose any information by clicking on the “message icon” showing in the menu bar. The following information lists all the details of the alarm. The operator has to inform the people allocated to the alarm case. A reason for informing can be described as follows: the police called to inform that the thief is already arrested and the alarm has already ended To transfer the information the operator has to use the phone. The direct connection via modem is impossible, because it is not allocated to the workstation. If the subscriber is calling to inform about a false alarm he has to use the alarm code word. The operator informs by phone that the alarm has been cancelled. 3 Overview of the Organisation Plan of this Manual 3.1 Table of Contents This manual is a reference for functions, objects and data types used in the Burglar Alarm Operator Program. The software is meant to be used for Windows NT. This manual is organised as follows: Chapter I explains the general facts of Burglar Alarm Administrator and provides a description of the Burglar Alarm Operator Program Chapter II lists the technical data and describes the functions to start the program as well as the menu items Chapter III describes the application step by step and explains the main attributes used in this manual Chapter IV lists the possible errors appearing during the use of the program and explains how to handle them Chapter V the Glossary contains an alphabetical list and description of terms used in this manual, including abbreviations, mnemonics and symbols Chapter VI The Index contains an alphabetical list of key terms and topics in this manual, including the page where you can find each one 3.2 Starting the Burglar Alarm Operator The Burglar Alarm Operator is started as described in the following part. 3.3 Login At the login screen the user has to enter his username and his password which is defined by the administrator. If the password is incorrect, a dialogue box will appear, pointing out that the connection to the program can not be established. Enter your exact user ID password again and confirm with the ok icon, e.g. if you use select a password with small characters, you have to enrol identical in the named field. In the more options field you might find a range of the program servers depending on the cities you want to observe and on your local installation. 3.4 Conventional menu items used in the Alarm Operator The following window screen will appear after you entered your exact user ID and password: The datasheet Alarm Operator contains all the required details of the incoming alarm, the data of the location, the subscriber and the terminators. The data sheet is subdivided in two tables which list the required data in case of an incoming alarm. The main functions in the menu bar are: messages, active alarms and devices. To click on the icons the following subdirectories will be shown: Message Active Alarms Devices Sent Messages Register of already sent messages to terminators via: Email, voice, phone or fax Active Alarms Alarms actually in process (no subdirectory leads directly to adequate data sheet) list of modems which are used for the alarm procedures Pending Messages All messages which are currently processed by the alarm server Older Alarms All active alarms registered in the program but not especially dedicated to the operator Cancel Messages All messages not sent because the alarm will be discontinued Error in Messages In case of any error occurrence (telephone number was wrong, the informed person has not answered) a message appears in this list The item about shows the data of the developer of the Burglar Operator Program. 4 Application Step by Step Description of the Main Attributes of Burglar Alarm Operator This chapter gives an overview of the main attributes used by the Burglar Alarm Operator Program. 4.1 Allocated Alarm from the Alarm Server If the location transfers an alarm signal to the alarm server, an operator will be select to administrate the alarm and to inform other persons in case of trouble (s. o. 2.3). The alarm server will sent messages via modem to the terminator (s. o. 2.3) and the subscriber as well as directly to the operator program of the workstation. The operator is working on a workstation and waiting for incoming alarm messages. In case of the location is equipped with a VITS system and the incoming alarm is a real alarm there will be a video message on the window screen. The picture on the video screen consists of the location where the alarm has been initiated. The operator can decide between choose the information in this video screen or by selecting in active alarms in the menu bar (s. 4.3). In case of a false alarm no video picture will be shown, because the line is interrupted. 4.2 Alarm Details If he decides to use the video screen, he will get the following information: 4.3 Results The items results, sent messages, pending messages, location and subscriber which are situated in the navigation bar consist of information about the alarm case. By clicking on the result icon you will find the following details: Time and date explain when the alarm was initiated. The alarm type can be a real or a false alarm (s. Fehler! Verweisquelle konnte nicht gefunden werden.) and the ID number will be used for identifying the location. The following data explains the name of the location, the type of the building, the street name and number, the located city and the telephone number. This data is necessary for the administration of the location and in case of an alarm for giving the data to other persons (e.g. police car).The last entries show the details of the subscriber, his name and the number of pending messages. The next icon informs about the messages which have already been sent. 4.4 Sent Messages The sent message icon is now activated and opens to the data list of sent messages to the terminators in case of an alarm and contains medium, ID number, terminator, telephone and key. The medium shows how the terminator has been informed. This can be via phone, fax, email or pager. The terminators are the persons who have been informed by the alarm server and who is allocated to the location by the administration program. The alarm can select a terminator from the database in the administration program and allocate him to the alarm. The next column lists the telephone number the terminator is available at the moment. The key field shows if the terminator gets a key to the location. The event field down on the data sheet can complete with a name of identifying the alarm. It is used in the same meaning as the Id-no. The operator can see the information of sent messages and in case of any trouble he can inform the subscriber by using phone, fax. Email or pager. If the subscriber calls to tell that the alarm has to be aborted , because the alarm was initiated by the himself the operator has to abort the alarm. Because nothing is demaged, all the informed persons can return back home. The operator has to inform this persons by phone or fax and has to explain what happened. If the thief was arrested by the and the operator get informed he can finish the alarm by pressing the adequate icon. The following data field appears: If the alarm is deleted confirm with the yes icon. 4.5 Pending Messages To control all the messages which are currently administrated from the alarm server, this information will be listed in the pending message. The list consists of the same details as shown above (s. sent messages), but it differs from showing all the messages actually activated and which have not yet been sent. The key item illustrates the keys allocated to the terminators. The list gives an overview of all the messages which must be sent to the terminator as well as details of communication to the location. This messages have not been sent yet. The operator can ask the the terminators for any problems. The operator can asked a terminator for the reason of not being attainable. 4.6 Location The location data will be explained in a schedule in a detailed record by clicking on the location icon. The number in brackets 1105 is defined as ID number especially dedicated to the location. 4.7 Subscriber The list contains details of name of location, sort of building, name of building (if it is a apartment building), number of the room, floor, street name and number, city name, telephone as well as the geographical longitude and latitude of the location. If a police man has problems to find the location, the operator is able to help. The operator has to use the address details to inform about how getting to the location. By clicking on the subscriber icon you will see the details of information (medium, tries and state), the alarm code for identifying as well as the personal data (the name, telephone) of home and office. The medium field shows the way of informing the subscriber (detail explanation in 5.3.1). The next field is used for showing the tries of connecting the subscriber and the state field should enlighten the current status of the message. The alarm code (here 555 SHOE)is necessary for the identification of the subscriber and if he is legitimate to reactivate the alarm. E.g. in case of a burglary, a person who announces the alarm to the operator, has to identify himself with the alarm code. The operator knows that there is no alarm if the subscriber is telling the alarm code. 5 Self Selected Alarms Apart from receiving alarm messages from the alarm server the operator can choose active alarms as well as older alarms from the menu bar. 5.1 Active Alarms The list of active alarms consists of all alarms not actually aborted or finished but dedicated to the workstation the operator is actually working on. The following data sheet consists of all active alarms: The list of active alarms contains all important details of the alarm cases: - ID number (number of the alarm event) - name of the event (every alarm gets another name of event ; it is easier to differentiate as a number) - information of when the alarm have been started (current activated alarms) - alarm status (done, interrupt...) - location (place of activated alarm) - subscriber (owner of the location) You can find a detailed description in 4.2. The listed alarms can be selected by the operator for editing them. It is possible that he was informed by one of his colleagues to adopt an alarm which will be shown in the list above. The icon show event is used for changing into the video mode which will be appear on the screen (s. 3.1-allocated alarms from the server) if the location is equipped with a video capable vits. If no video is installed, only the informations will be shown. By using the scroll bar in the left corner of the data sheet the possible alarms can be choose to operate. By clicking on the close icon you will enter back to the main menu. 5.2 Older Alarms All active alarms which are generally registered in the operator program will be listed in the following data sheet: The list consists of the same details as shown above in 4.1. The required information can be select as demonstrated before. 5.3 Messages The message icon in the menu bar consists of the detailed lists of message types: - sent messages - pending messages - cancelled messages - error in message You also will find a description of sending and pending messages in the video screen which appears by an incoming alarm (s. 4.1). The following data sheet appears by clicking on the sent messages icon: 5.3.1 Sent Messages The first item consists of details of already sent messages to the terminators. The data sheet shows information of the alarm no., the medium 5.3.2), the data of first and last try of connecting the terminator, the ID number as well as the name of the terminator. The alarms will be numbered in order in the first field of the list. If the data fields are completed the alarm message has been duly elaborate. Last try refers to the time the terminator received the alarm message. 5.3.2 Pending Messages The list of pending messages is defined as all the alarm messages actually activated in the operator program 5.3.2. The following data sheet will be shown: The same data fields are used as shown in 5.3.1The field first try is defined as time for starting the alarm. 5.3.3 Cancelled Messages This item consists of all messages which have been deleted or cancelled. To the explanation of the data fields see 5.3.2. The operator can get any information of any trouble by phone or fax. Here, the last try field explains the time the transfer was interrupted. 5.4 Error in Messages This lists shows all the error messages which have been happened during an alarm. The data fields will be explained in 5.3.3. 5.5 Devices Devices are the media to use for informing the subscriber and the terminators. Devices are modems connected to the alarm server. The alarm server allocates the message by means of the devices to the subscriber and the terminators, but not to the operator. The operator is able to see the details of connection in a list: The list is splitted in two data sheets of unused devices and devices which are actually used. Specifying the details the following fields must be named: - ID number of the modem - name of modem - COM Port in the alarm server - medium means of using, e.g. fax, phone - comment Every device is getting an ID number and a name for identifying. The COM Port is important for connecting the computer with the device modem. The connected computer will be the one of the Administration Program. The medium is defined as the message type (fax, voice, pager) depending on the way of transmitting the message and the ability of the modem, if it is not capable to send a fax. An information typed by the administrator in appears the comment field. The operator can see the details of the devices, but he must not contact any other person to inform. 5.6 File Functions The file functions are listed in the menu bar of the alarm operator. By clicking on the file icon you will see two items - all pending messages - close If the first item is activated it shows all pending messages in the operator program on the main menu screen. The list differs from the one in the subdirectory of messages, because it is subdivided in the message table dedicated to the subscriber and another to the terminator. E.g.: The marked message will be explained as follows: the subscriber Arnold Müller with the ID number 39 received a first and a last alarm message will receive an alarm on the 20th of September 99 at 11.53. The state is defined as to be done, i.e. the message has been sent with problems. The medium which has been used was a fax. The operator can get any information of pending messages from this list. 6 Error Messages Signification Cannot reach the Alarm Server Application already running Please ask the Administrator for a valid Login Can not connect to database!!! The Password is incorrect!! Please type again. Letters in password must be typed by using the correct case. Make sure that capslock is not accidentally on Please select a valid Server You can not log in without an IP Address Exit to windows