Popularity of Sur-Gard MLR2 multi-line digital receiver set to continue

Dec '99 Perimeter Security, Alarms & Intruder Detection

As a principal development resource for the DSC Group, SUR-GARD’s alarm communications technology is incorporated into a diverse array of products marketed under the DSC and SUR-GARD nameplate. Known as one of the most successful manufacturers of digital receivers in the world, SUR-GARD will be entering the millennium with a feature-rich digital receiver, MLR2 which now incorporates even more features than before.

Separate liquid crystal displays, micropro­cessors and power supplies for each of the line cards and for the CPM2, combined with ­special programming, means total line card independence. They can even keep working with the CPM2 removed from the rack in manual mode. Each line card has two separate circuits to decode the pulse/tone data. The user or the ­microprocessor can determine which gives the best results for weak signals.

Growing with the MLR2

• Expandable to 14 lines (total of 7 DRL2A modules).

• Program memory space to spare-capacity to meet new demands and decode new formats, growing and changing with the needs of modern monitoring requirements.

• Generous data memory allows for large event buffers and easy, flexible user programming.

Control flexibility

• Choose the handshakes you want, and in what order.

• Tailor the output to the computer.

• Change the printer and computer output to be full time, back-up, or not used.

• Customising is done from the keypad and front panel switches or remote via serial port.

Diagnostics

• All programming can be verified on the LCD display or printed.

• Printer events, computer events and call display records can be examined on the LCD and copied to the printer.

• The CPM2 polls each line card regularly.

• Line cards supervise the CPM2 polling.

• The printer is checked for presence, paper out, etc.

• The computer communication is verified with heartbeat test signals. Signals are buffered ­during computer outages.

Security

• 16 master and operator passwords.

• Operator acknowledge with time/date printed and advised to computer.

Verification

• Two-way audio.

• Downlook video verification.

• Built-in Caller-ID display, gives the phone number from which the call originates. ‘Ghost’, mis-programmed, or malfunctioning diallers, as well as wilful interference can now be traced.

For details contact Elvey International on tel: (011) 401 6700, e-mail: [email protected] or visit www.elvey.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

How intrusion protection helps secure O&G operations
Surveillance Perimeter Security, Alarms & Intruder Detection Industrial (Industry)
For O&G operators in Africa, physical security remains one of the biggest considerations, particularly when it comes to perimeter protection and the ability to mitigate intruder-related incidents.

Read more...
New AI perimeter app package
Dallmeier Electronic Southern Africa Perimeter Security, Alarms & Intruder Detection
With the new AI Perimeter App Package, Dallmeier has extended the application range of its neural AI perimeter network. Previously only available for the Panomera S4 Perimeter camera, this technology is now also available for additional models.

Read more...
JVA 4-line LCD keypad
Perimeter Security, Alarms & Intruder Detection
The JVA 4-line LCD keypad is integral to the JVA Security Electric Fence product range and provides a centralised interface between the customer and their perimeter security solution.

Read more...
Gallagher’s Integrate 360 event in Durban
Gallagher News & Events Perimeter Security, Alarms & Intruder Detection
Gallagher Security held its Integrate 360 event in Durban, South Africa. The event attracted 65 channel partners, end users, and consultants from across KwaZulu-Natal and broader South Africa to showcase the latest in Gallagher’s technology suite.

Read more...
Nice launches DC Blue Astute garage door motor
Nice Group South Africa Technews Publishing News & Events Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Nice Systems SA has launched the Nice DC Blue Astute, a garage door motor for the South African market featuring a pre-installed lithium-ion battery instead of traditional lead-acid batteries.

Read more...
Wireless security makes its mark
Perimeter Security, Alarms & Intruder Detection
Alarms have always had a wireless component since the first monitoring control room was launched, but internally, homes and companies used to install cables to connect various sensors and devices to the control panel.

Read more...
Lock it down
OPTEX Perimeter Security, Alarms & Intruder Detection
Securing wide outdoor areas presents several challenges that differ significantly from those faced in smaller, more confined environments, and choosing the right intrusion detection technology is the key to safeguarding these spaces.

Read more...
Smart, reliable detection in any conditions
OPTEX Perimeter Security, Alarms & Intruder Detection
In its discussions with companies operating in South and Southern Africa’s detection and alerting technologies market, SMART Security Solutions spoke to OPTEX for more information on its solutions and technologies.

Read more...
The unseen barrier: AI and perimeter monitoring
Verifier Perimeter Security, Alarms & Intruder Detection Surveillance AI & Data Analytics
Perimeters have been one of the most important security aspects since antiquity, but what does perimeter monitoring look like in the age of AI, CCTV, thermal detection and modern off-site surveillance?

Read more...
Surveillance on the perimeter
Axis Communications SA Hikvision South Africa Technews Publishing Editor's Choice Perimeter Security, Alarms & Intruder Detection
Cameras have long been a feature in perimeter security, with varying reports of success and failure, often dependent on the cameras’ planning, installation and configuration, as well as their integration with other perimeter solutions and centralised management platforms.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.