DKS Enterprises 1803PC, 1815, 1817 Controlling a Gate Operator and Pedestrian Gate or Door

Page 25

2.3.2 Controlling a Gate Operator and Pedestrian Gate (or Door)

When controlling a gate operator and pedestrian gate (or door), relay 1 is typically used to control the gate operator while relay 2 is typically used to control the door or gate. Note that the electric strike and the magnetic lock are powered from their own power supply. The relay 2 contact is set to either normally open (NO) for electric strikes, or normally closed (NC) for magnetic locks by placing the relay 2 contact shorting bar on either the NO or NC pins.

A variation of this diagram is for the system to control two doors or two gates.

Relay 0 COM

Relay 0 NC

Relay 0 NO

Relay 0

Relay 2 COM

Relay 2

Relay 1 COM

Relay 1 NC

Relay 1 NO

13 14 15 16 17

Gate Operator

AND

Electric Strike

OR

Magnetic Lock

25

Image 25
Contents 1803PC, 1815, 1817 PC Programmable Telephone Entry Systems Page Use this manual with the following models only Table of Contents Adjustments Listing Important NoticeGeneral Information Features Installation Guidelines ALL Systems InstallationSurface Mount Units Surface Mount Units with Recess Box Flush Mount Units Flush Mount Rough-in Box Flush Mount Trim Ring Flush Mount Surface Mounting Kit Wall Mount Units Memory Chip Installation Postal Lock Installation Wiring 18AWG Terminal Description Main Terminal DescriptionWeigand Terminal Description Weigand Power TerminalsWeigand Data Terminals 4 RS-232 Terminals Elevator Control TerminalsControlling a Single Door or Gate Relay Wiring TypicalControlling a Gate Operator and Pedestrian Gate or Door Magnetic Lock Electric Strike Gate Operator Tracker Expansion Board Control Page Programming with a PC General Programming InformationProgramming from the Keypad System Memory Standard Chip MemPLUS ChipMaster Code Programming with a PCSingle or Multiple Systems PC Programming Table Programming for Call-up OperationRelay Strike Time General ProgrammingTalk Time Tone Open Numbers Postal SwitchRotary-dial Touch-tone / Rotary-dialProgramming Letters and Numbers Programming LETTERS, Numbers and MessagesProgramming the User Message 1815 Systems Programming the Instruction Message 1815 Systems Programming the User Message 1817 Systems Programming the Instruction Message 1817 Systems Programming Phone Numbers and Names Programming 7-digit Phone Numbers Programming the Directory Code LengthProgramming Phone Numbers with Area Code Reference Programming Area CodesDeleting Individual Phone Numbers Programming Names 1815, 1817 Systems OnlyDelete Names 1815, 1817 Systems Only Display Phone Numbers 1815, 1817 Systems Only Delete Area CodesProgramming Device Codes Programming Device CodesDeleting Device Codes Programming Four-digit Entry Codes FOUR-DIGIT Entryt CodesDelete Four-digit Entry Codes Entry Code RangesFeedback Speaker VolumeClick Sensitivity Display Contrast 1815 OnlyBack-light Cutoff 1817 Only Master Code SwitchRing Pin Relay 2 Contact PinAdjustment Locations SEC Level Back Light Contrast Lower Contrast Upper Volume Guest Instructions Operating InstructionsResident Instructions Using an Entry CodeResponding to a Guest Call Tracker Board Override Hold Open Command System AdministratorOpening from a Remote Location Time and Date Check Relay CheckLine Sharing Miscellaneous Operating InstructionsConnection to a PBX Areas with 10-digit DialingPage Trouble Shooting MaintenanceSympton Possible Solutions 1 RS-232 Test Will be erased when this function is performedElevator Boards Hardware Test Weigand Test 1815, 1817 Systems OnlyElevator Board / Floor Hardware Test Accessories LOG Tables Name AAC Phone Number DIR Code ENT Device SEC FL ER Level Access Code Granting or Denying AccessGuest Communication Call Waiting

1815, 1803PC, 1817 specifications

DKS Enterprises has established itself as a leading provider of cutting-edge access control solutions, and among its notable offerings are the 1803PC, 1817, and 1815 models. These products stand out in the commercial security landscape, providing businesses with reliable and efficient entry management.

The DKS 1803PC is an advanced digital keyless entry system designed for commercial applications. Its primary feature is the easy-to-use keypad interface, which allows users to input their access codes directly. This model is equipped with a robust memory capable of storing up to 100 unique codes, making it suitable for locations with multiple users. Additionally, the 1803PC supports timed access, enabling businesses to set specific entry windows, which enhances security and access control.

The DKS 1817 model takes entry management a step further with its smart technology integration. It features Bluetooth capabilities that allow users to unlock doors via their smartphones, offering convenience and flexibility. The 1817 can be connected to various security devices, such as alarms and surveillance cameras, providing a comprehensive security ecosystem. It also includes a user-friendly mobile app that enables remote management of access permissions, ensuring that business owners can monitor and control entry points effectively from anywhere.

In contrast, the DKS 1815 model caters to businesses looking for a cost-effective yet reliable access solution. This model features a straightforward keypad interface similar to the 1803PC, but it is designed with essential functionalities to meet basic security needs. The 1815 supports up to 50 access codes and is ideal for smaller businesses or limited access areas. Its durable construction ensures longevity and requires minimal maintenance over time.

All three models employ DKS's proprietary technology that emphasizes durability and security. They are built to withstand harsh environmental conditions, making them suitable for both indoor and outdoor use. Each model adheres to stringent safety standards to protect against unauthorized access, ensuring the safety of personnel and assets.

In conclusion, DKS Enterprises' 1803PC, 1817, and 1815 models represent a diverse range of access control solutions tailored for various business needs. Their features focus on ease of use, advanced technology, and reliability, making them an excellent choice for organizations looking to enhance their security measures while streamlining access management.