Presentation is loading. Please wait.

Presentation is loading. Please wait.

Private and Confidential TraceTek iServer Concepts, Set-up, Operation.

Similar presentations


Presentation on theme: "Private and Confidential TraceTek iServer Concepts, Set-up, Operation."— Presentation transcript:

1 Private and Confidential TraceTek iServer Concepts, Set-up, Operation

2 Private and Confidential The Concept  The SIMs monitor any TraceTek cable or probe sensor just like they would in any other application.  The iServer is connected to a maximum of 8 SIMs by twisted pair copper wire (RS-485) and it polls data from the SIMs every few seconds  The iServer can be checked at any time from its LAN connection and will report conditions for 6 registers on all of the SIMs it is monitoring  If queried by a browser the current SIM conditions are presented as a web page  If queried by a separate program called the email Notifier, then just the key data is returned.  The email Notifier checks the iServer (or many iServers) every few seconds and compares the returned data against alarm thresholds  If any abnormal condition is detected an email is sent to a list of recipients which can be cell phones, pagers or regular email accounts  When a user gets a notification message on his cell phone he uses any web browser to get a display of current conditions on the SIMs

3 Private and Confidential The Basic Requirements  1 to 8 SIMs (any variety)  A TTDM is optional  You must use SIMs there is no connection to the SI card  A local RJ41 Ethernet connection to a LAN  A PC permanently connected to the same LAN  24/7 connectivity  Ability to send email messages  Very limited resource requirements so this application can run in the background with other services  A cell phone or pager to receive alarm messages  Any PC that can connect to the LAN  May require VPN access if remote  Must have a browser installed

4 Private and Confidential Physical Set-up  Install the sensors and SIMs in normal TraceTek fashion  Place the iServer on a DIN rail near an Ethernet LAN connection.  Provide 10 to 32 VDC (nominal load is 2W) (Terminals marked + / - on the orange terminal block – removable)  Connect the SIMs to the iServer in a typical RS485 daisy chain.  Check instructions for connection details  Install the EOL jumper at the last SIM  Normal RS485 limits apply … (could be 4000’ from last SIM to iServer)  Note down the last four digits of the iServer MAC address  Flip the #3 DIP switch DHCP to ON  Power everything up but hold off on connecting the RJ41 connection to the LAN

5 Private and Confidential Networking and Commissioning  When the physical set-up is complete connect the iServer to the LAN by plugging in the Ethernet cable  What is supposed to happen:  The iServer requests an IP address from the LAN’s DHCP server (remember DIP switch #3)  The DHCP server allocates an IP address to the iServer  The iServer responds with its “name” which is eis followed by the last four digits of the MAC address: (e.g. eis38C3)  The DHCP server publishes the name on the local LAN segment so that any browser can cruise to http://eis38C3http://eis38C3  If this doesn’t work there are alternatives spelled out in the installation instructions  Use any browser connected to the LAN to access the iServer and complete the set-up pages

6 Private and Confidential Software Set-up  Each iServer has 8 slots that can be individually set-up  Each slot can have any SIM address assigned to it  In addition to the SIM address, a tag of 28 characters can be entered  Unused slots can be left blank  Click iServer Setup and use password 12345678  On the iServer set-up page the default name can be changed to something more meaningful than eis38C3. (e.g. TraceTek, Trace001, etc. Maximum of eight characters)  Feet or Meters can be selected  The entire iServer itself can be assigned a useful tag (e.g. Building 4 Leak Detection) maximum of 30 characters  You can change the password to something other than 12345678 if desired

7 Private and Confidential Installing the email Notifier  Find a suitable PC  Install Notifier from the CD  Add list of iServers to be monitored  Add list of email accounts to be notified  Enter local email account and password to send email  Enable email  Enable monitoring


Download ppt "Private and Confidential TraceTek iServer Concepts, Set-up, Operation."

Similar presentations


Ads by Google