User Manual

3
Siemens Building Technologies
Cerberus Division
e1143b
06.2000
2 Basic concepts of integrated system
2.1 System architecture
FHI Pad is an interface that allows the Cerberus danger management System to
transfer real time information regarding its status to a supervision system other than
Cerberus' LMS, named in this document Foreign Supervision System (short FSS). The
FHI Pad interface allows the Cerberus danger management system to receive com-
mands from a Foreign Supervision System.
The same interface could also be used to allow an LMS system to receive information
and to send commands to an FSS.
The interface is not designed for file transfer; therefore historic or statistical data will not
be available trough it.
The interface adopted complies with Cerberus norm VT397e, "Communication of a
danger detection systems with a higher ranking system".
The FHI Pad functions are:
1. to allow a LMSmodular system to access a subset of the information points of a non
Cerberus FSS system. The LMS system will therefore be able to receive selected
changes of status and to issue selected commands to the specified FSS point sub-
set.
2. to allow an FSS system to manage a subset of the information messages of Cer-
berus control panel (CZ10, CZ12). FSS will therefore be able to receive selected
changes of status and to issue selected commands to Cerberus control panel.
3. to allow automatic interactions between security subsystems connected to the LMS
gateway and the technological devices connected to the FSS.
GW20
LMS FSS
CZ10 CZ12
FHI Pad
Subsystem Pad
CMS Pad
CS11 CS4
Fig. 1 The LMS-FSS integrated system
LMS
The LMS system is composed of security and safety control panels that acquire data
from the field e.g. CZ10 or CS11 (fire detection), CC60 (gas detection) and CZ12, CS4
and CS4-40 (intrusion detection). LMS can be interfaced to various other electronic de-
vices, but only data from CZ10, CS11, CS4 and CZ12 can be integrated in the FSS.
These control panels (or subsystems) get their information from field devices such as
smoke detectors, intrusion detectors, contacts etc. According to the software configura-