Note: All parameters or functions listed in the following tables are only accessible if the sensor is in adjustment session. The red LED is then slowly flashing.

During an adjustment session each parameter may be checked or changed at any time in the following way:

 

PARAMETERS

ACTIONS

 

CHECK

Press the key corresponding to the parameter to be checked and then press the CHECK VALUES key (15).

 

 

VALUES

Count the number of times the green LED flashes, which corresponds to the value of the checked parameter. No green LED flash corresponds

 

 

 

to the value 0.

 

 

 

Repeat this operation to check the value of the other parameters if required.

 

 

 

Example: SENSITIVITY key (7) – 7 flashes of the LED: the radar sensitivity is set at the value 7.

 

 

 

CHECK VALUES :

 

 

 

 

 

 

 

 

 

 

PLUS

Press the key corresponding to the sensitivity (7) or holdtime (6) parameter to be modified and then press the PLUS key (3) to increase the

 

 

 

value by 1 unit.

 

 

 

PLUS :

 

 

 

 

 

 

 

 

 

 

 

MINUS

 

Press the key corresponding to the sensitivity (7) or holdtime (6) parameter to be modified and then press the MINUS key (5) to reduce the

 

 

 

 

value by 1 unit.

 

 

 

MINUS :

 

 

 

 

 

 

 

 

 

 

 

 

 

Note about LED signal: The red LED flashes quickly waiting for the value. Once this has been entered, it flashes slowly again.

 

PARAMETERS

ACTIONS

DEFINITIONS - ADVICES

 

 

SENSITIVITY

Press the SENSITIVITY key (7).

To increase the sensitivity means to increase the sensor

 

 

 

 

Use the NUMBER keys 0-9(1) to enter the sensitivity required (or adjust this

capabilities to detect small useful signals.

 

 

 

parameter using the PLUS (3) or MINUS (5) keys as explained above)

Practically, to increase the sensitivity leads to increase the

 

 

 

SENSITIVITY :

 

 

 

 

dimensions of the sensing field.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

HOLD TIME

Press the HOLD TIME key (6).

The hold time allows extended output activation time after a

 

 

 

 

Use the NUMBER keys 0-9(1) to enter the required hold time (0.5 s to 9 s)

motion detection has stopped. It is recommended to use this

 

 

 

(or adjust this parameter using the PLUS (3) or MINUS (5) keys as explained

parameter instead of the operator’s one with the same function

 

 

 

above).

(interferences with the sensor)

 

 

 

 

 

 

 

 

 

 

 

 

 

 

HOLD TIME :

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

DETECTION

Press the DETECTION MODE key (8).

With the bidirectional mode, the approaching and departing

 

 

MODE

 

Use the NUMBER keys 1-3(1) to select the required mode :

target is detected. With the unidirectional mode, only the

 

 

 

Key 1 : bidirectional mode

approaching target is detected.

 

 

 

Key 2 : unidirectional mode

Using the MTF (Motion Tracking Feature) enables the sensor

 

 

 

Key 3 : unidirectional mode with the MTF function

 

 

 

 

 

 

 

 

 

 

 

to automatically switch from the unidirectional mode to

 

 

 

 

 

 

 

 

bidirectional mode as soon as a target is detected. This

 

 

 

 

 

 

 

 

function is recommended for applications with elderly people

 

 

 

DETECTION MODE :

 

 

 

 

or anyone approaching the door hesitantly.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

REJECTION

Press the REJECTION MODE key (8).

The discrimination between a pedestrian and the different

 

 

MODE

Perturbations immunity is used to avoid detection due to environmental

vehicles depends mainly on the mounting height and the

 

 

 

perturbations (vibrations, rains, etc).

microwave module tilt angle. Be careful that the rejection

 

 

 

“Pedestrian/parallel traffic rejection” provides both rejection of pedestrian

function increases the response time of the sensor.

 

 

 

and rejection of any parallel traffic simultaneously.

Use the next table as suggestions and do not hesitate to

 

 

 

Use the NUMBER keys 1- 5 (1) to enter the required rejection mode :

increase or decrease the rejection level to obtain the required

 

 

 

rejection.

 

 

 

Key 1 : detection of all kind of targets in motion

 

 

 

 

 

 

 

 

Key 2 : detection of all kind of targets in motion

 

 

 

 

 

 

 

 

 

23 ft

 

 

 

 

 

 

+ perturbations immunity

 

 

 

 

 

 

 

 

 

 

 

 

 

Key 3 : Low “Pedestrian/parallel traffic” rejection

 

16.5 ft

 

 

 

 

+ perturbations immunity

 

11.5 ft

 

 

 

 

 

 

Key 4 : Mid “Pedestrian/parallel traffic” rejection

 

 

 

 

 

 

 

 

 

10 ft

 

 

 

 

 

 

+ perturbations immunity

 

 

 

 

 

Key 5 : High “Pedestrian/parallel traffic” rejection

 

7.5 ft

 

 

 

 

 

 

+ perturbations immunity

 

 

 

 

 

 

 

 

 

 

 

 

 

 

OUTPUT

Press the OUTPUT REDIRECTION key (2) to switch from one mode to

 

 

 

 

 

 

REDIRECTION

another.

Pedestrian or vehicle mode detection only works if pedestrian

 

 

 

Key 0: regular operating mode (standard FALCON).

 

 

 

rejection is enabled (immunity parameter set to 3,4 or 5).

 

 

 

Key 1: pedestrian or vehicle mode detection

Otherwise the sensor does not classify target types and as a

 

 

 

consequence is never able to trigger relay 2.

 

 

 

Any motion detected activates relay 1.

 

 

 

 

 

 

 

 

Motion of vehicle triggers relay 2.

 

 

 

 

 

75.5268.01 20070111

 

 

 

 

 

 

Page 5 of 7

Page 5
Image 5
BEA DR Parameters Actions Check, Values, Plus, Minus, Parameters Actions Definitions Advices Sensitivity, Hold Time, Mode

XL-DR, DR specifications

The BEA DR (Disaster Recovery) and XL-DR (Extended Disaster Recovery) systems are crucial components in modern data management and enterprise resilience strategies. These systems are designed to ensure that organizations can effectively safeguard their data, maintain operations during unforeseen events, and recover swiftly from potential threats or disasters.

One of the main features of BEA DR and XL-DR is their robust data protection mechanisms. These systems utilize advanced data replication technologies that ensure real-time or near-real-time replication of critical data across multiple locations. By continuously mirroring data, organizations minimize the risk of data loss and enhance their recovery capabilities. This feature is particularly vital for businesses that cannot afford downtime, as it enables them to maintain access to their data even during a disaster.

Another significant characteristic of these systems is their scalability. BEA DR and XL-DR can be tailored to fit various organizational sizes and needs, allowing businesses to expand their disaster recovery solutions as they grow. This level of customization enables enterprises to protect their data investment effectively and adapt to changing requirements without significant overhauls in their system infrastructure.

The technology behind BEA DR and XL-DR includes sophisticated algorithms that optimize data transfer and storage. These systems employ incremental backup processes, which capture only the changes made since the last backup, reducing bandwidth usage and accelerating recovery times. Additionally, they support various storage mediums, including cloud-based solutions, facilitating flexible deployment options that align with an organization's infrastructure.

Security is also a vital aspect of these systems. BEA DR and XL-DR come equipped with encryption and access controls to protect sensitive data during transmission and storage. This is particularly important in sectors that deal with regulated data, ensuring compliance with legal and operational standards.

Furthermore, the user interface of BEA DR and XL-DR is designed for ease of use, enabling IT teams to manage disaster recovery processes without extensive training. Dashboards provide real-time monitoring and reporting features, empowering organizations to proactively address potential issues and refine their recovery strategies.

In summary, BEA DR and XL-DR systems are comprehensive solutions that provide essential features such as real-time data replication, scalability, advanced data management technologies, stringent security measures, and user-friendly interfaces. These characteristics position them as critical assets for any organization aiming to enhance its resilience against disasters and maintain uninterrupted operations.