BERANDA

0 komentar
SETIA ABADI Didirikan pada tanggal 15 Juni tahun 2001, dengan tujuan untuk memenuhi kebutuhan beberapa pelanggan dan diakui sebagai perusahaan Security system dan Door specialist untuk system keamanan.
Kami berusaha untuk memeberikan kenyamanan kepada setiap pelanggan. dengan dasar dan penerapan sistem yang tepat untuk tujuan yang benaar melalui tenaga-tenaga ahli kami, pengetahuan produk dan konsep yang inovatif
Kami merancang dan menyediakan produk-produk keamanan dan servis untuk keselamatan, jangkauan kami akan memenuhi kebutuhan dan desain yang kompleks seperti perkantoran, Apartemen, Hotel, Bank, Pabrik, Pembangkit Listrik, dll. serta bangunan-bangunan komersial dan untuk mereka yang lebih tertarik dan membutuhkan dengan konsep yang lebih simpel seperti rumah tinggal. view

Visi  
Mewujudkan perusahaan yang tumbuh dan berkembang di bidang Security System dan Door Specialist
Misi
Pelanggan adalah perioritas utama dan memberikan SOLUSI adalah hal yang terpenting




SETIA ABADI memberikan troboson dan solusi yang  dapat diandalkan untuk memenuhi kebutuhan akan system keamanan yang aman dan kenyamanan dengan menggunakan Access control system ( proximity card, finger print, handkey, CCTV system, door hardware ), dan  aksesoris untuk beragam aplikasi yang diikuti dengan penyediaan jasa/tenaga teknisi yang handal serta di dukung oleh Dorma door hardware.

sistem keamanan yang kami rancang , bahwa system keamanan harus sederhana dengan biaya yang sangat efisien. SETIA ABADI bekerja keras untuk memberikan segala kebutuhan pelanggan masing-masing sedetail apapun dengan melakukan survei lapangan. sehingga memungkinkan untuk secara efektif dan efisien memberikan produk yang tepat.  


Team Support :
Teguh Susanto ,Product Consultant
mobile : 0818183709, Esia : 021-98854427

Henny NS, Marketting
Mobile : 087876761441 flexi : 021-70501441

  Sales office
Mobile : 021-
70648764
Handy Aprilla,IT Support
Mobile : 0852 1428 5814.
Nanda & Team Teknisi

PELAYANAN PELANGGAN
Perioritas utama kami adalah menjadikan lebih dekat dan mempertahankan setiap pelanggan kami untuk datang kembali. Kami menyadari bahwa penyediaan produk tidak akan pernah mencukupi tanpa mendedikasikan untuk mendukung layanan purna jual. Tim kami akan memneberikan dengan kemampuan yang dimiliki untuk memeberi jawaban dan reaksi pertanyaan pelanggan kami, baik masalah administrasi atau teknis.  

1.Team work
Bekerja dan mendukung satu dengan yang lainya, untuk mencapai hasil yang maksimal, untuk semua pelanggan kami dan memberikan solusi yang tepat akan kebutuhan setiap pelanggan.
2.Marketting Team
Memberikan harga terbaik dengan product yang berkualitas, dan memberikan alternatif  pilihan untuk setiap product.
3.Technical support
Memberikan solusi dan menyelesaikan setiap permasalahan yg terjadi. 
4.Technical Team
Teknisi kami siap untuk menyelesaikan setiap pekerjaan semaksimal mungkin, dengan pelayanan yang sebaik-baiknya kepada setiap pelanggan.
5.Product
Product-product yang berkualiatas dengan harga yamg kompetitif
6.After Sales service
Perawatan setelah masa garansi berakhir, dengan memberikan /menawarkan kontrak service maintenance untuk jangka panjang.
 

ABOUT TRIMEC

0 komentar
TRIMEC ACCESS CONTROL SYSTEM

System Bid Criteria & Product Specifications
1 General Information
1.1 Document Overview
The purpose of this document is to specify the Architectural/Engineering and Bid Criteria for the design, supply and installation of an Access Control System
1.2 Name
[_______________________________________];
Shall be hereinafter referred to in this document as the CUSTOMER and the bid respondents shall be referred to as the CONTRACTOR. The term CUSTOMER includes direct employees and other appointed CUSTOMER agents as architects or consultants. These agents may be requested by the CUSTOMER to represent the CUSTOMER in undertaking certain project tasks.
2 System Architecture
1. The Access Control System shall be a modular, networked system that is capable of handling large propriety corporations with multiple remote sites. The system shall also reflect the open-architecture design that is flexible and easily expandable.

2. The software program based on Microsoft tools and standards. The software program shall operate in one of the following environments; Windows XP, 2000 or NT 4.0 using Service Pack 6 or greater using Intel Pentium III Processor or greater.

3. The PC/workstation computer shall be used to program all access control functions, generate reports, display in real-time all or selected alarms, all or selected valid and invalid entry activity, and all internal system status alarms such as communication loss/restore, power loss etc.

4. The system programming should be user friendly and capable of being accomplished by personnel with no prior computer experience. The software shall be of a consistent user interface that is compatible with current software techniques employed by Microsoft and other software developers, namely drop
down menus, drag and drop programming, dialogue boxes, check boxes, etc. The basic user interface shall be consistent with techniques used in the Windows 2000 operating system, or its predecessor, Windows NT and shall also have a manual mode of operation allowing authorized operators to respond to alarm or trouble conditions, unlock doors or override control points.

5. The System shall provide a means for scheduled automatic backups of any or all database system files.

6. The system (single user system or multi user system) shall have the capability to communicate with the controllers via LAN/WAN connections utilizing industry standard TCP/IP communication protocol. The system shall also support direct communication via RS232 protocol.

7. All the system components shall utilize “Distributed Processing” concepts. The distributed processing shall include the ability to download the operator parameters to any field panels, thus allowing the field panel to provide full operating functions independent of the access control system software. The data to be downloaded to the field panels shall contain “rules of access” into individual areas as follows:
a. Areas to which a cardholder may be admitted.
b. The beginning and expiration date/time of access privileges to those areas.
c. The door types to which access is allowed. (E.g. pedestrian entrances, turnstiles, handicap, loading dock etc.)
d. The area state during which access shall be allowed (normal operation, emergency lock down, strike etc).
e. The time zones during which access shall be granted.

8. A provision shall exist to temporarily extend, shorten or block the access granted to a given area or group of areas. If at any time communication between the intelligent field panel and the PC or File Server is interrupted, the field panel shall automatically switch to the off-line mode of operation. During the off-line operation, the field panel(s) shall continue to control access based on the “rules of access” resident in the on-board RAM memory of the field panel. Alarms and access control transactions shall be stored in the memory of the field panel for automatic uploading to the PC/File Server, when primary communication is restored.
 
3 System Capabilities
1. The access control system software shall serve as a database manager, controlling access rights, time schedules, multiple operation modes and alarm point information. Database changes shall be updated or
downloaded automatically from the system server to the field panels. The system server shall determine which changes are to be downloaded to which field panels.

2. The database/cardholder information downloaded from the PC/File Server to the field panels shall be on an intelligent “need to know” basis. That is, only Field Panels containing readers to which a cardholder has access shall receive the data pertaining to that cardholder. Systems that send all the information to all panels in the system shall not be acceptable.

3. All databases should have the ability to add, delete, report, view and edit information.

4. The system shall provide storage of all system transactions in a retrievable file.

5. Log all events by time and date.

6. After the installation, the CUSTOMER shall be able to perform hardware configuration changes. These hardware configuration changes shall include, but not limited to door open time, door contact shunt time, contact point and reader names, when and where a cardholder is valid and the ability to add or modify card database as desired without the service of the CONTRACTOR or the MANUFACTURER.

7. The software shall be user-oriented, with on-line help, instructional prompts and text descriptions.

8. The software shall use drop-down menus for all previously entered system-required data.

9. Duress feature where, when a PIN is used in conjunction with a card read, the numbers of digits are selected at the keypad where the PIN number is a value of one different from the normal PIN.

10. The system shall provide ability to manually operate the system doors. The manual functions include the ability to Lock, Un-Lock, Shunt, Un-Shunt and Return to Time Zone.

11. Support multiple card reader technology including:
• Proximity
• Weigand
• Biometrics
• Magnetic Stripe
• Bar Code
• Keypad

12. The system shall also support multiple languages for international users.
 
4 Database Design and Management
The system shall also support multiple database system, Microsoft SQL Server and Microsoft Access. For flexibility in searching and reporting, the system shall incorporate a contemporary SQL Server relational database from a widely recognized source, such as Microsoft SQL Server.
Systems based upon a vendor proprietary database shall not be considered.
The software shall create independent database tables for selected groups of information (people, badges, time schedules, etc.). Data from the database shall be retrieved through input of a small amount of information into standard data input forms, and then selecting the search option. The results of the search shall be displayed in a list form, and allow the operator to select the record to work on. When a record is selected, it shall be displayed within the data entry form already on the monitor. The software shall provide edit, add, delete, find and print options for records in selected databases. The cardholder record database shall have pre-set fields containing information about badge holders, such as name, address, department, and access rights and personnel type.
The software shall support descriptive names for all database entries. The cardholder record database shall include name, department, employee number, access rights, and address fields. The software shall allow the attachment of an image to the cardholder record, through a standard, fully integrated badge imaging system.
 
5 Extensibility
The system is to be designed with upward growth and expansion in mind. All hardware and software components, offered by the manufacturer, shall be easily portable to and integrated into the largest system configuration offered. The system design shall be consistent within a given system and across that system product family in the interest of minimizing the costs of migration and minimizing, if not totally eliminating the need for operator re-training.
 
6 System Integration
The system shall be complete and fully integrated. It shall combine access control, alarm reporting and acknowledgement and visitor control and reporting
 
7 System Features and Functionalities
7.1 Software
7.1.1 System Communication
1. The system shall provide an interface (Communication Interface Module or CIM) to issue all database changes to the Reader Controllers. This software module also shall have the ability to gather all the information (transactions) from the Reader Controller and store it in proper history files.
2. The CIM shall reside on any workstation or server. On a single user system, the CIM shall reside on a workstation, but on a multi user system that uses multiple CIMs, it shall reside on any workstation or server.
3. The communication between the CIM and the controllers shall be through direct cabling or TCP/IP communication protocol.
4. All serial ports to which the controllers are connected shall be configured using an easy to follow menu. All the COM PORT status messages shall be color-coded.
5. The CIM shall have a specific window, which shall display all the Controllers connected to a COM Port. The user shall be able to select one particular Controller and get all the information pertaining to that device.
7.1.2 Access Rights
The software shall allow for assignment of the access rights to badge holders. The access right is the combination of what “Areas” the badge holder can go (badge and elevator readers) and when the badge holder can go there (time zones). Each badge holder can be allowed multiple “Area” access rights. Each access right shall be allowed to have a different time schedule. The software shall automatically load the proper access rights into each field panel without any operator intervention. There shall be no limits on the number of access rights (who goes where and when) by the system design.
7.1.3 Access Privilege Expiration
There shall be the ability to force an expiration of access privileges in any or all areas with a simple mouse clicking procedure.
7.1.4 Extended Access Privilege
There shall be the ability extend the access privileges in any or all areas with a simple mouse clicking procedure.
7.1.5 Event Triggers
The system shall provide flexibility when associating action items with time zone programmed events, i.e. card transactions with contact reporting and relay activation.
7.1.6 Holidays and Holiday Sets
The system shall allow the user to define the holidays according to the specific CUSTOMER needs. There shall also be the facility to group holiday dates into specific grouping so that, time zone assignments can include all the individual holidays in that. Holidays shall be organized into holiday sets for easy management.
7.1.7 Time zones
Time zone definitions shall include starting time, ending time, days of week and holidays. Time shall be definable in either AM/PM or 24-hour (military) time.
7.1.8 Hardware Definitions
The system shall allow the configuration and programming of the system hardware by easy programming. The user shall be able to define workstations, CIM, CIM Ports, controllers, readers, relays and contact points. All the information entered shall be editable using an easy to use interface.
7.1.9 Device Status
The operator shall have the option to view a single device’s state at any point off time. The user shall be able to request and receive the status from any reader, relay or contact. The status is displayed in a dialog box when it is received.
7.1.10 System Security
The system shall be secure both in its operation and administration. The system shall offer ample flexibility for the administrator to establish and customize any level of security by assigning security permissions to group of operators. The individual operator shall be able to log into the system using a unique operator ID and a password associated with that operator ID. The “Administrator” of the system may set the following rules and standards:
7.1.11 Login Requirements
Logging into the system shall be restricted using User ID and password. The user ID shall be of alphanumeric characters. It shall be a unique ID and cannot be duplicated. Password also shall be of alphanumeric characters but shall be case sensitive. The administrator shall be able to define the expiration date of the password. The administrator shall have the ability to set a pre-determined period of days in advance to warn the operators upon login, as to how many days remain before their passwords
expire. The administrator shall also have the ability to set the password valid for an indefinite amount of time.
The administrator may disable an operator’s password at any time by merely checking a box for that function. The administrator may also set the following conditions for disabling operator passwords automatically.
7.1.12 Cardholder Creation and Management
The system shall provide an easy to use interface to add, delete or modify cardholder information effortlessly. With the use of wizards the user shall be able to input and retrieve data regarding area access, active, retired badges and cardholder categories etc.
1. The cardholder information shall include the following fields for each badge being issued.
a. Cardholder’s first name and last name.
b. Activation and expiration dates (spanning years).
c. A unique encoded number – The number that is encoded within the card and used as a means of identification.
d. A variable keypad number that the user can select from 1 – 9999.
g. Areas and area sets the cardholder has access to.
2. The system shall allow the user to duplicate specific user definable information like area access, categories, badge layout, technology etc whereas, fields like encoded id, stamped id, portrait, signature etc will be unique to each cardholder. This feature shall be available with in a single mouse click.
For example, the system shall allow the creation of a template for all the members of the engineering department or sales department of a company and save it in the database. When the user creates a cardholder and assigns badge, the user shall be able to use the corresponding template.
3. Cardholder data shall be modified and deleted directly from the main screen or by using menu, hot keys or tool bars.
4. Provide functionality to mass change access control fields for activation/expiration dates, access block and antipass back.
5. Provide a cardholder search wizard to make, finding cardholders a simple process.
6. Provide options to include time zone reference.
7. Upon editing card information, the updated information shall be sent automatically to the appropriate access control panel, when hardwired, with no other user intervention. If the scheduler is used, then the card updates shall be sent based on scheduling.
8. The system shall allow the user to add e-mail addresses of the cardholders into the database.
7.1.13 Assigning Area Access
1. Provide functionality to define cardholder’s access to selected Areas and Area Sets.
2. Provide the ability to define specific time of access.
3. Access Control function shall include validation based on time of day, day of week, holiday scheduling and positive verification of site code, card number or PIN number verification.
7.1.14 Portrait Capture
Provide ability to store digital images of the cardholder. One cardholder shall have only one image attached to one record.
7.1.15 Transaction and Alarm Monitoring
1. The software shall include a real time display of all or selected transactions in the system as they occur.
2. The screen shall display substantial information about each transaction (e.g. cardholder, card number, access granted or denied, location, etc.). The operator shall be able to see only those user definable fields, which he has been given permission to view.
3. The Transaction Monitor shall be split into two sections: (1) cardholder transactions, (2) device and operator transactions.
4. The system shall provide a feature that enables the CUSTOMER to set filters for unwanted transactions. The software shall allow the CUSTOMER to select specific cardholders or devices that generate the transactions.
5. The user shall have the ability to customize the online monitoring screen into two individual partitions. One displaying cardholder transactions and the other one displaying device and operator transactions. The operator shall also have the flexibility of turning off any of these transactions and view only one type of transactions.
6. Transactions may be color-coded according to the dictates of the administrator.
7.1.16 Report Generation
The system software shall be able to generate reports of Alarm History, Archive History, Audit Trail, Cardholder Transactions and Transaction History Reports. The user may print and/or export these reports to other applications, store to disk or send to mail recipients, as well.
When requesting a report, the user shall be able to view a "screen preview" of the alarm activity before directing the report to a printer.
7.1.17 System Wide Features
7.1.17.1 Wizards
The software shall provide step-by-step wizards for easy programming of the entire system.
7.1.17.2 Pull down Menus
The system programming shall be menu driven and include tool bar icon for all major options in the menu.
7.1.17.3 Onscreen help
The software shall provide onscreen description of all the actions that the user has to perform while programming the system.
7.1.17.4 Search and Advanced Find
The system shall include a simple search feature for the user to easily find data in the database. The system shall also provide functionality that helps the user to further customize the search criteria and make the search more precise.
7.1.17.5 Right Click Options
The system shall provide right click options for most of the system functionalities.
7.2 Hardware
All the hardware shall be provided with enclosures, which have hinged doors and latches. All the enclosures shall be equipped with tamper switches.
7.2.1 Control Panels
1. The control panels shall be independently programmed, intelligent devices, which shall be able to make decisions at the local level. The system shall provide reader controllers at 2, 4 and 8-reader capacity.
2. The communication between the PC and the control panel shall be directly through a serial port or through an IP addressable modem.
3. The communication between control panel and the reader interface shall be via RS485 protocol.
9. The control panels shall be used with any combination of read head technologies: magnetic stripe, wiegand, bar code, smart card, biometric and more.
14. Each panel shall be addressed within the system by a unique user defined name.
19. The control panel shall have allocated RAM memory to store up to 30,000 card ID numbers up to six digits in length.
20. The control panel shall Store a minimum of 4,000 card access transactions when offline from the network.
22. The control panel shall have a 7-Amp hour Gel Cell battery for standby operation.
24. The control panel shall be able to run on low voltage: 14-17VAC or 12VDC. Power consumption shall not exceed 600 mA (excluding card readers).
7.2.2 Reader Operation
1. Door lock shall automatically lock upon the door being opened.
2. Automatically locking of the door lock after the door being opened will be delayed for a user defined time period.
3. The shunting of the door contact following the presentation of a valid access card or activation of the request to exit shall be accomplished by software control

TRIMEC ACESS CONTROL

0 komentar

 
 TRIMEC SERI 7

A.Seperangkat access control system, meliputi :
1.Controller Trimec
2.Card reader Proximity
3.Lock Device, ( Magnetic, atau Dropt Bolt atau Door strike)
4.Push button / REX
5.Break glass for emergency exit
6.Proximity Card
7.Software 
8.Converter ( RS 232, RS 485, TCP/IP )
9.Personal Komputer untuk penyimpanan Data Base

B.Tambahan accesories
1.Buzzer 
2.Door contact
3.key swicth 
4.Software Time and Attendance



Trimec Controller seri 7
The Trimec® 7 Series controllers are all fully intelligent and can be used in a standalone or networked configuration. Programming is done via a pc, however once programming has been completed the PC can be removed and only connected when additional programming is required or the event buffer need to be uploaded to the PC.
Trimec Access Controller complete with Trimec 7 PSU Power Supply unit and security management software and internal TCP/IP Module, include Keylok EM Reader, Keylok Push Button and also free Keylok EM clamshell card. 
  • Supports up to 30.000 Cardholders
  • Supports up to 13,000 event in offline mode
  • Supports Wiegand data format between 24 and 72 bits, also compatible with ABA (track two)
  • Support TCP/IP to allow the system to be used across Local Area Networks (LAN) and Wide Area Networks (WAN)
  • Can Connect up to 127 controllers using RS-485
  • Supports multi format readers (for example: EM, MIFARE, HID Prox, HID iClass, Indala and Biometric)
  • Delivered in mild steel cabinet complete with 230-16V AC shielded Transformer, Fuse block, 12V zA DC regulated power supply and cabinet lock
  • 5 years Lithium cell for maintaining memory and real time clock
  • Data can be stored up to go days without power
 

__________________________________________________________________________

Trimec Controller Feature & Benefits :


Fully Intelligent
Branded As Trimec
Designed In USA
Manufatured In China
1, 2 & 4 Doors. 2, 4 & 8 Reader
30.000 User
6.500 / 13.000 Event Buffer
512k RAM
64k ROM
8 bit Processor
Non proprietary
Multiple formats, 24 - 72 bit
Multiple protocols, RS232, RS485, TCP/IP
SMD Technology
Cost effective
12 Volt AC/DC
Aux inputs & output
Daylight saving
Anti-passback
Scalable
Cabinet configuration

Controller Cabinets :

Black metal cabinets
Rear entry cable holes
Key Lock & 2 Keys
Cable knockouts
12 Volt 2A PSU
230 Volt Fuse block
1,2 or 4 door controller
Space for 12 Volt 7A/H battery
Wiring diagrams inside door
230 - 16 Volt AC 40VA transformer
All controller and power supplies have the same cabinet

Trimec Card Readers :
2 Models
Em 125KHz Proximity
Mifare 13.56MHz read/write
Selectable 26/34 bit Wiegand output
Standart and wall plate sizes
Available in black
Removable faceplates (B&W)
Branded TRIMEC
LED
Same base size as the HID Proxpoint


CONVERTER, CONTROLLER TO PC 
Model PTC - TCPE - TCP/IP to RS232/485 Converter :


  • Used to connect a non TCP/IP enabled panel to a TCP/IP Network
  • Can connect 127 controllers to a single IP address








Model PTC - TCPI - TCP/IP to RS232/485 Module :
  • Used to connect a non TCP/IP enabled panel to a TCP/IP Network
  • Plugs into the controller  PCB
  • Can connect a single controller only





Model PTC - 232 - RS232 to RS485 Converter :

  • Used to connect a RS485 LAN to a PC Serial Port
  • Can connect 127 controller to a single PC communication port




LAN Schematic - TCP/IP Complex





IkhtisarThe Trimec s7 pengendali semua sepenuhnya inteligent dan dapat digunakan dalam standalone atau konfigurasi jaringan . Pemrograman dilakukan melalui PC , namun hes sekali pemrograman telah complated PC dapat dihapus dan hanya dihubungkan ketika program tambahan diperlukan atau buffer acara perlu upload ke PC
The Trimec s7 kontroler memiliki port RS - 232 atau koneksi langsung ke PC dan RS 485 port untuk conection lagi .Semua Trimec s7 controller untuk pintu dua arah memiliki masukan REX untuk kontrol remove .
Karena meningkatnya popularitas jaringan ethernet , plug optionl TCP / IP pada modulecan dipasang untuk memungkinkan non ethernet memungkinkan controller ( 7-2-2 ) untuk digunakan di jaringan area lokal ( LAN ) , wide area neteork 9WAN ) internet atau stadium kuncup
Controller memanfaatkan ethernet RJ - 45 soket untuk sambungan card reader dan perangkat lainnya Wiegand ke controller . steker ini dalam konektor menawarkan mudah chaneover og PCB dan memungkinkan ukuran controller larer , 7-4-4 dan 7-4-5 menjadi berkurang sehingga memungkinkan kabinet sama yang akan digunakan untuk semua kontroler PCB
Control Trimec Pengendali AccessNegara Asal : AustraliaKeterangan: Mendukung hingga 30.000 Pemegang KartuMendukung hingga 13.000 acara dalam modus offlineFormat data dukungan Wiegand antara 24 dan 72 bit , juga kompatibel dengan ABA ( jalur dua )Dukungan TCP / IP untuk memungkinkan sistem untuk digunakan di Local Area Networks ( LAN ) dan Wide Area Network ( WAN )Bisa Hubungkan hingga 127controller menggunakan RS - 485 

Dukungan raeders format multi ( misalnya : EM , MIFARE , HID Prox , HID iClass , Indala dan Biometric ) Disampaikan dalam kabinet baja ringan lengkap dengan 230 - 16V AC terlindung Transformer , Fuse blok , 12V 2A DC power supply diatur dan kunci kabinet .5 tahun sel Lithium untuk menjaga memori dan real time clock .Data dapat disimpan untuk pergi hari tanpa daya .Model yang tersedia :
7-1-2 ( Support 1 Pintu , satu atau dua arah )2 x Pembaca Input : tingkat TTL , 12V DC , 150mA1 x Tombol Keluar input : Biasanya Terbuka ( N.O )1 x Pintu Sensor input: Biasanya Ditutup3 x input Auxiliary : Biasanya Terbuka ( N.O )1 x Kunci Output: Biasanya Tertutup ( NC ) atau Biasanya Terbuka ( NO )2 x Auxiliary Output : Biasanya Tertutup ( NC ) atau Biasanya Terbuka ( NO )Dewan Controller Dimensi 165mm x 112mm x 25mm
7-2-2 ( Support 2 Pintu , satu arah ) Discontiue2 x Pembaca Input : tingkat TTL , 12V DC , 150mA2 x Tombol Keluar input : Biasanya Terbuka ( N.O )2 x Pintu Sensor input: Biasanya Ditutup4 x input Auxiliary : Biasanya Terbuka ( N.O )2 x Kunci Output: Biasanya Tertutup ( NC ) atau Biasanya Terbuka ( NO )2 x Auxiliary Output : Biasanya Tertutup ( NC ) atau Biasanya Terbuka ( NO )Dewan Controller Dimensi 165mm x 112mm x 25mm
7-4-4 ( Dukungan 4 pintu , satu atau arah saja )4 x Pembaca Input : tingkat TTL , 12V DC , 150mA4 x Tombol Keluar input : Biasanya Terbuka ( N.O )4 x Pintu Sensor input: Biasanya Ditutup2 x input Auxiliary : Biasanya Terbuka ( N.O )4 x Kunci Output: Biasanya Tertutup ( NC ) atau Biasanya Terbuka ( NO )2 x Auxiliary Output : Biasanya Tertutup ( NC ) atau Biasanya Terbuka ( NO )Dewan Controller Dimensi 165mm x 112mm x 25mm
7-4-8 ( Dukungan 4 pintu , satu atau dua arah )4 x Pembaca Input : tingkat TTL , 12V DC , 150mA4 x Tombol Keluar input : Biasanya Terbuka ( N.O )4 x Pintu Sensor input: Biasanya Ditutup4 x input Auxiliary : Biasanya Terbuka ( N.O )4 x Kunci Output: Biasanya Tertutup ( NC ) atau Biasanya Terbuka ( NO )4 x Auxiliary Output : Biasanya Tertutup ( NC ) atau Biasanya Terbuka ( NO )Dewan Controller Dimensi 165mm x 112mm x 25mm
OPTIONAL :1 . Internal TCP / IP Moduldigunakan untuk menghubungkan satu panel kontrol standar untuk jaringan area lokal ( LAN ) atau jaringan area luas (WAN ) . cocok setiap Dewan control Trimec s7
2 . External TCP / IP ModulDigunakan untuk menghubungkan hingga 127 panel kontrol standar menggunakan bus RS - 485 ke jaringan area lokal ( LAN ) atau wide area network ( WAN ) . koneksi ke panel kontrol Trimec S7 .
3 . Eksternal RS-232/Serial ModulDigunakan untuk menghubungkan hingga 127 panel kontrol standar menggunakan bus RS - 485 ke server / PC menggunakan connetion RS-232/serial . menghubungkan ke panel kontrol Trimec S7 .
SOFTWAREIkhtisarThe Trimec s7 manajemen keamanan Sotware adalah jawaban hari ini untuk mengakses perangkat lunak kontrol . itu adalah pengguna yang sederhana , kuat dansistem manajemen keamanan ramah yang beroperasi pada microsoft windows 2000 atau sistem operasi xp . perangkat lunak tersedia dalam english dan Cina agar sesuai dengan kawasan Asia Pasifik . Menggabungkan pilihan terbatas akses microsoftdan database microsoft kuat SQL , ia menyediakan kinerja tanpa kompromi diperlukan oleh professional.


manfaat sistemintegrasi : Trimec @ Xcess 7 Software terintegrasi dengan semua Trimec @ 7 Series 1,2,4 , pintu mikrokontroler.Kesalahanperangkat lunak yang digunakan untuk program sistem awalnya dan untuk meng-upload review data.Once diprogram , pengendali bisaberoperasi dalam mode off -line jika diperlukan .


Beberapa Teknologi Card & Format : Trimec @ Xcess 7 Software memungkinkan pengelolaan beberapa fasilitas menggunakankartu yang berbeda technologies.EM , MIFARE , INDALA , HID prox , HID iClass hanya beberapa teknologi kartu sopported ,Kebanyakan format standar dan proprietary mulai 24-27 data bit Wiegand adalah supported.This dapat menghemat ribuan dolar untuk mengubah identitasnya .
Networkable : Pemasangan modul TCP / IP opsional atau penggunaan Trimec protokol TCP / IP Converter memungkinkannon-TCP/IP memungkinkan controller untuk conneted melalui LAN , WAN atau internet ke PC yang menjalankan Trimec @ Xcess 7perangkat lunak
Client Server : Trimec @ Xcess 7 software client / server berbasis sehingga beberapa workstation klien remote dapat terhubung ke server host melalui LAN , WAN atau Internet
Sistem Arsitektur Scalable : Trimec @ Xcess 7 Software scalable dari sistem pintu singele kecil untuk sebuah sistem besarmengendalikan ratusan pintu .
FITUR DAN KEMAMPUAN STANDARD .......- Dukungan beberapa Operator melalui Manajemen Operator Fitur- Res tricts akses ke sistem dengan password operator- Menyediakan dan audit trail di pintu dan untuk operator sistem- Mengatur zona waktu hingga 15 pintu untuk setiap pintu- Mengatur up to15 waktu Pengguna zoone- Mengatur libur dan akhir pekan pengaturan- Mengatur format beberapa kartu- Mengatur mode operasi pintu
      
- Anti Pass Kembali Fungsi
      
- Pengawasan akses Fungsi
      
- Pin , Card + di dan super Pin Fungsi
      
- Selalu dekat atau Selalu terbuka Fungsi- Mendukung input / output dan event / output hubungan- Manual override melalui fitur Pemetaan- mendukung backup database
MODUL SOFTWARE PILIHAN- Waktu dan Kehadiran-Guard Tour- Mobil Parkir
KOMPUTER PERSYARATAN- CPU : Min Pentium III - 733 Mhz atau lebih tinggi- Operasi Software : Windows XP/2000- 500MB Hard Disk Space- RAM : min 128MB- CD - ROM dan port USB- VGA 1024X768 Pixel



LOCK DEVICE

0 komentar
LOCK DEVICE 

Electric Lock adalah kunci yang digerakan oleh arus listrik. Umumnya Electric Lock yang ada saat ini digerakkan oleh listrik 12 VDC atau 24 VAC.
Electric Lock merupakan kebutuhan bangunan modern yang memungkinkan pengelolaan access control secara lebih terpadu, lebih aman, dan lebih efisien.  Electric Lock memungkinkan pengelola bangunan untuk mengunci dan membuka pintu tanpa harus menggunakan kunci (Keyless Access). Untuk mengatur mekanisme kerja dari electric lock ini maka dibutuhkan perangkat yang lebih dikenal dengan Access Control System. Dimana Electrick Lock sendiri adalah salah satu komponen dari suatu access control system tersebut.

beberapa Jenis Electric Lock berdasarkan tipe proteksi:

  • Fail Safe: Electric Lock yang memberikan proteksi jika terdapat aliran listrik. Lock jenis ini umumnya digunakan pada ruangan yang memiliki intensitas kegiatan / aktifitas manusia cukup tinggi. Dengan menggunakan lock ini, pintu akan otomatis terbuka pada saat emergency (aliran listrik padam), sehingga orang yang berada di dalam ruangan dapat keluar pada saat terjadi emergency seperti kebakaran.
  • Fail Secure: Electric Lock yang memberikan proteksi jika terjadi pemutusan aliran listrik. Lock jenis ini umumnya digunakan pada ruangan yang memiliki tingkat aktifitas manusia yang rendah dan diisi oleh barang – barang yang sangat berharga. Dengan menggunakan lock ini, pintu akan otomatis tertutup pada saat emergency (aliran listrik padam). Lock jenis ini umumnya digunakan pada tempat seperti gudang dan lemari penyimpanan.

Jenis Electric Lock berdasarkan mekanisme penguncian:

  • Electromagnetic Lock (EMLOCK): Electric Lock yang memberikan proteksi melalui kekuatan magnet. Kekuatan magnet disesuaikan dengan kebutuhan tingkat proteksi dan beban pintu. Electric Lock jenis ini dapat digunakan untuk berbagai jenis pintu.
  • Electric Door Strike: Electric Lock yang memberikan proteksi dengan menggunakan latch (lidah kunci) danelectric face plate. Electric Lock jenis ini umumnya digunakan untuk pintu yang memiliki frame cukup tebal seperti pintu kayu. Electric Door Strike ini harus ditanam pada frame pintu menggantikan fungsi lubang lidah pintu.
  • Electric Drop Bolt: Electric Lock yang memberikan proteksi dengan menggunakan solenoid yang digerakkan secara mekanis. Electric Lock jenis ini umumnya digunakan untuk untuk pintu kaca dan besi


MANETIC Lock

M600   LBS Rp.   655.000,-
M1200 LBS Rp.1.450.000,-





EM 300/600/1200 ELECTROMAGNETIC LOCK
Silent, Continuous Duty Operation
Excellent and Reliable Security Technology
Easy Installation
Low energy consumtion
Specially design to fit all single and pairs of swinging, sliding and roll up doors
Quality electric locksfor access control, the emergency exits and escape doors


DROPT BOLT

ELECTRIC DROP BOLT w/ LED 

Rp.1.050.000,-
Keylok Electric Drop Bolt has been proven durable and reliable in access control application. Keylok Electric Drop Bolt has a compact design and positioning ball that caters for precision operation. The indicator light helps us for easy monitoring the status of the lock.For glass door application, special design casing shall be provided together with electric bolt. The upper casing and lower casing maches to build a rigid structure to hold door together.

DOOR STRIKE 
TRIMEC ES-110 ELECTRIC STRIKE  Rp.1.150.000,-

The ES110 is a low cost robust electric strike with one-piece cast alumunium body. With fewer moving parts and solid construction this is an ideal solution for the cost conscious. Having a deeper than normal throat, the ES 110 is designed to work with an extensive range of locks and offers the same level security and reliability usually provided by more expensive electric locking solutions.




 

DROPT BOLT SECURITRON



WATERPROOF SECURITRON : M32M M32M STAINLESS STEEL MAGNALOCK, 12/24VDC, 600 LBS  Rp.4.500.000,- 



  • Surface mounts easily with a minimum of  tools 
  • Mounted using steel  machine screws into blind finishing nuts
  • All ferrous metal surfaces plated to MIL specification
  • Ten feet  [3.05m]  of  jacketed, stranded conductor
  • UL Listed