Operation

SDC / DHC

 

 

4.2.2.4.3.1Copying switching time programs (days)

Source day

Target day

NOTE

Block programming enables the switching times and cycle temperatures of any day of the week to be copied

1 – To any days within the week (Mo, Tu, We, ..., Su)

2 – To all weekdays (Mo to Fr)

3 – To the weekend (Sa to Su)

4 – To the entire week (Mo to Su)

Calling up the copy function (days)

See flowcharts on pg. 44

Press input button î to confirm the copy function.

Turn input button î to select the source day (MO to SU) to be copied.

The respective automatic program P1 (P2, P3) of the source day is copied in the display with the time switch symbol and the program index.

Press input button î to confirm the source day. The source day appears flashing.

Turn input button î to select the following setting values and confirm by pressing the input button î:

The following target days (Mo to Su) individually

All days of the week (1 to 7) as a week block

All weekdays (1 to 5) as a weekday block

The weekend days (6 to 7) as a weekend block Acceptance is confirmed by acknowledging DAY COPY OK.

After acknowledgement, the following target days appear one after another automatically with each additional press of the input button î and can be skipped and accepted if necessary.

Pressing the button causes an immediate return to the basic display.

Only complete days with all cycles and temperature specifications and the respective program can be copied.

42

EN2H-0220GE51 R0308

Page 42
Image 42
Honeywell SDC manual Copying switching time programs days Source day Target day, Calling up the copy function days

SDC specifications

Honeywell SDC, or Honeywell's Security Digital Controller, represents a significant advancement in the security management sector, integrating state-of-the-art technology to meet the modern demands of facility Security and operations. This innovative platform is designed to deliver enhanced security monitoring and control to various industries, including commercial buildings, airports, and critical infrastructures.

One of the main features of the Honeywell SDC is its ability to provide centralized control over access control systems. This allows security personnel to manage entry points efficiently, granting or revoking access permissions in real-time, which is crucial for maintaining security in dynamic environments. The SDC supports a wide range of credential types, including smart cards, biometrics, and mobile credentials, making it highly adaptable to the needs of diverse organizations.

The Honeywell SDC utilizes advanced technologies such as IP-based communications, enabling seamless integration with IT infrastructure. This facilitates remote management and monitoring capabilities through a user-friendly interface, allowing security teams to operate from various locations. Moreover, the system incorporates robust encryption protocols to safeguard data transmission, ensuring that sensitive information is kept secure from unauthorized access.

Another noteworthy characteristic of the Honeywell SDC is its scalability. Whether managing a small facility or a vast enterprise, organizations can easily expand their security systems without overhauling existing setups. This flexibility is further enhanced by the system's ability to integrate with other Honeywell security products, such as video surveillance systems and alarm solutions, creating a comprehensive security ecosystem.

Additionally, the SDC is built to support advanced analytics and reporting features. This enables organizations to gather insights into security events and access patterns, which aids in identifying vulnerabilities and improving response strategies. The system also supports alarm management, allowing for the quick and efficient handling of incidents.

In summary, Honeywell SDC stands out as a leading solution in the realm of security management. With its centralized control, integration capabilities, strong security features, and advanced reporting tools, it provides organizations with a powerful platform to safeguard their assets and streamline security operations, meeting the challenges of today's complex security landscape.