DSC TL250 Network Internet Alarm Communicator Instruction Manual

June 9, 2024
DSC

TL250 Network Internet Alarm Communicator

T-Link TL250
Network Internet Alarm Communicator
Installation Manual
version 1.10
firealarmresources.com

WARNING Please Read Carefully
Note to Installers
This warning contains vital information. As the only individual in contact with system users, it is your responsibility to bring each item in this warning to the attention of the users of this system.
Sy st em Fai lur es
This system has been carefully designed to be as effective as possible. There are circumstances, however, involving fire, burglary, or other types of emergencies where it may not provide protection. Any alarm system of any type may be compromised deliberately or may fail to operate as expected for a variety of reasons. Some but not all of these reasons may be:
Inadequate Installation A security system must be installed properly in order to provide adequate protection. Every installation should be evaluated by a security professional to ensure that all access points and areas are covered. Locks and latches on windows and doors must be secure and operate as intended. Windows, doors, walls, ceilings and other building materials must be of sufficient strength and construction to provide the level of protection expected. A reevaluation must be done during and after any construction activity. An evaluation by the fire and/or police department is highly recommended if this service is available.
Criminal Knowledge This system contains security features which were known to be effective at the time of manufacture. It is possible for persons with criminal intent to develop techniques which reduce the effectiveness of these features. It is important that a security system be reviewed periodically to ensure that its features remain effective and that it be updated or replaced if it is found that it does not provide the protection expected.
Access by Intruders Intruders may enter through an unprotected access point, circumvent a sensing device, evade detection by moving through an area of insufficient coverage, disconnect a warning device, or interfere with or prevent the proper operation of the system.
Power Failure Control units, intrusion detectors, smoke detectors and many other security devices require an adequate power supply for proper operation. If a device operates from batteries, it is possible for the batteries to fail. Even if the batteries have not failed, they must be charged, in good condition and installed correctly. If a device operates only by AC power, any interruption, however brief, will render that device inoperative while it does not have power. Power interruptions of any length are often accompanied by voltage fluctuations which may damage electronic equipment such as a security system. After a power interruption has occurred, immediately conduct a complete system test to ensure that the system operates as intended.
Failure of Replaceable Batteries This system’s wireless transmitters have been designed to provide several years of battery life under normal conditions. The expected battery life is a function of the device environment, usage and type. Ambient conditions such as high humidity, high or low temperatures, or large temperature fluctuations may reduce the expected battery life. While each transmitting device has a low battery monitor which identifies when the batteries need to be replaced, this monitor may fail to operate as expected. Regular testing and maintenance will keep the system in good operating condition.
Compromise of Radio Frequency (Wireless) Devices Signals may not reach the receiver under all circumstances which could include metal objects placed on or near the radio path or deliberate jamming or other inadvertent radio signal interference.
System Users A user may not be able to operate a panic or emergency switch possibly due to permanent or temporary physical disability, inability to reach the device in time, or unfamiliarity with the correct operation. It is important that all system users be trained in the correct operation of the alarm system and that they know how to respond when the system indicates an alarm.
Smoke Detectors Smoke detectors that are a part of this system may not properly alert occupants of a fire for a number of reasons, some of which follow. The smoke detectors may have been improperly installed or positioned. Smoke may not be able to reach the

smoke detectors, such as when the fire is in a chimney, walls or roofs, or on the other side of closed doors. Smoke detectors may not detect smoke from fires on another level of the residence or building.
Every fire is different in the amount of smoke produced and the rate of burning. Smoke detectors cannot sense all types of fires equally well. Smoke detectors may not provide timely warning of fires caused by carelessness or safety hazards such as smoking in bed, violent explosions, escaping gas, improper storage of flammable materials, overloaded electrical circuits, children playing with matches or arson.
Even if the smoke detector operates as intended, there may be circumstances when there is insufficient warning to allow all occupants to escape in time to avoid injury or death.
Motion Detectors Motion detectors can only detect motion within the designated areas as shown in their respective installation instructions. They cannot discriminate between intruders and intended occupants. Motion detectors do not provide volumetric area protection. They have multiple beams of detection and motion can only be detected in unobstructed areas covered by these beams. They cannot detect motion which occurs behind walls, ceilings, floor, closed doors, glass partitions, glass doors or windows. Any type of tampering whether intentional or unintentional such as masking, painting, or spraying of any material on the lenses, mirrors, windows or any other part of the detection system will impair its proper operation.
Passive infrared motion detectors operate by sensing changes in temperature. However their effectiveness can be reduced when the ambient temperature rises near or above body temperature or if there are intentional or unintentional sources of heat in or near the detection area. Some of these heat sources could be heaters, radiators, stoves, barbeques, fireplaces, sunlight, steam vents, lighting and so on.
Warning Devices Warning devices such as sirens, bells, horns, or strobes may not warn people or waken someone sleeping if there is an intervening wall or door. If warning devices are located on a different level of the residence or premise, then it is less likely that the occupants will be alerted or awakened. Audible warning devices may be interfered with by other noise sources such as stereos, radios, televisions, air conditioners or other appliances, or passing traffic. Audible warning devices, however loud, may not be heard by a hearing-impaired person.
Telephone Lines If telephone lines are used to transmit alarms, they may be out of service or busy for certain periods of time. Also an intruder may cut the telephone line or defeat its operation by more sophisticated means which may be difficult to detect.
Insufficient Time There may be circumstances when the system will operate as intended, yet the occupants will not be protected from the emergency due to their inability to respond to the warnings in a timely manner. If the system is monitored, the response may not occur in time to protect the occupants or their belongings.
Component Failure Although every effort has been made to make this system as reliable as possible, the system may fail to function as intended due to the failure of a component.
Inadequate Testing Most problems that would prevent an alarm system from operating as intended can be found by regular testing and maintenance. The complete system should be tested weekly and immediately after a break-in, an attempted break-in, a fire, a storm, an earthquake, an accident, or any kind of construction activity inside or outside the premises. The testing should include all sensing devices, keypads, consoles, alarm indicating devices and any other operational devices that are part of the system.
Security and Insurance Regardless of its capabilities, an alarm system is not a substitute for property or life insurance. An alarm system also is not a substitute for property owners, renters, or other occupants to act prudently to prevent or minimize the harmful effects of an emergencysituation.

firealarmresources.com

Table of Contents

Section 1: Introduction

1

1.1 Operating Modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.2 Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2

Section 2: Quick Start

3

2.1 Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2.2 Testing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2.3 Resetting to Factory Defaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

Section 3: Bell Follower Installation (Mode 1)

5

Section 4: Stand alone Installation (Modes 2 & 3)

6

4.1 Stand alone Mode 2 Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 4.2 Input Expander Mode 3 Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6

Section 5: Standard Installation (Mode 4)

7

5.1 Input Expander Mode 3 Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 5.2 Standard connection with PC4020(CF)/PC5020(CF) . . . . . . . . . . . . . . . . . . . . 7 5.3 Wiring T-Link to a DSC compatible Control Panel . . . . . . . . . . . . . . . . . . . . . . 8 5.4 UL Listed Commercial Fire Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8

Section 6: DVACS Installation (Mode 5)

9

6.3 DVACS Panel Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 6.3 DVACS Events. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

Section 7: T-Link Operation

11

7.1 Remote Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 7.2 Programming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 7.3 IP Address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 7.4 Port Usage Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 7.5 Integrated Call Directions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 7.6 Status Indicators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 7.7 Test & Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

Section 8: Programming Guide

14

8.1 Basic Programming (PC4020 Control Panel). . . . . . . . . . . . . . . . . . . . . . . . . . 14 8.2 Basic Programming (PC5020 Control Panel) . . . . . . . . . . . . . . . . . . . . . . . . . 15 8.3 T-Link DVACS Programming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16

Section 9: Programming Descriptions (Advanced)

17

Section 10: Programming Worksheets

25

Glossary

29

Appendix A: T-Link Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 Appendix B: T-Link TL250 Compatibility Chart . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 Appendix C: Network Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34

firealarmresources.com

firealarmresources.com

Section 1: Introduction
The T-Link TL250 module is a network internet communicator that sends alarm system information to a central station receiver. The module is pre-programmed with the most commonly used settings for quick installation. Default options can be custom programmed using T-Link Console software if required. The five different operating mode configurations are indicated below: New for version 1.10 · Supports DVACS panel conversion (Canada only). Corresponding version
numbers for SG DRL3-IP and T-Link Console are required to ensure compatibility (i.e., SG DRL3-IP v1.10 and T-Link Console v1.10 are required for corresponding T-Link TL250 v1.10).
NOTE: For DVACS mode an SG-DRL3-IP v1.10 receiver line card is required to communicate with the T-Link TL250 v1.10 or higher.
· Account code extended from 6 to 10 digit capability.
1.1 Operating Modes
Mode 1: Bell Follower In Mode 1, the T-Link TL250 monitors the Bell Output of a control panel. The system identifies the Bell Output cadence and transmits the corresponding Fire or Burglar alarm reporting code to the central station. Refer to section 3 for details Refer to the appropriate control panel Installation Manual.
NOTE: Do not use Mode 1 for UL or ULC listed installations.
Mode 2: 4-Zone Panel In Mode 2, the system is configured for 4-zone, stand alone operation. Refer to section 4.1 for details.
Mode 3: 12-Zone Panel If the T-Link TL250 detects a PC5108 expander card on power up it will automatically configure itself for 12-zone standalone operation with normally open loops. Refer to section 4.2 for details.
NOTE: In modes 2 & 3, the connections between the PC5108 inputs or T-Link TL250 inputs and the alarm control unit outputs (relay contacts) shall be done in metal conduit, within 20 ft. Stand-alone operation will still require the inputs to be programmed with the desired alarm types.
Mode 4: Standard Mode In standard mode, the system is configured as a communicator with a compatible DSC alarm panel: Models PC4020, PC4020CF, PC5020 or PC5020CF. Refer to section 5 for details.
Mode 5: DVACS®* Mode (V1.10 or later) In DVACS mode, the system is configured as a communicator with a compatible DVACS alarm panel. Refer to section 6 for details. Refer to appendix C for a list of compatible DVACS panels and modules.
NOTE: T-Link TL250 zone events are transmitted using the standard T-Link SIA protocol. DVACS generated events are transmitted using the DVACS protocol.
NOTE: DVACS Mode 5 is used in ULC listed installations.

  • DVACS is a registered trademark of Electro Arts Ltd. Scarborough Ontario, Canada
    1
    firealarmresources.com

1.2 Specifications/Requirements The maximum allowable current draw from a compatible DSC panel on the Aux terminal Output is 500 mA @ 12VDC. Operational current draw of the T-Link TL250 is 250 mA. The T-Link TL250 module has 2 switched negative programmable outputs (50 mA @ 12 VDC).
Specifications
Input Voltage: …………………………………………………………………………………………………………. 12 VDC
Input Current: ……………………………………………………………. 250 mA (275 mA with PGM or PC5108)
Dimensions: ………………………………………………………………………. 3.25″ × 5.25″ (8.3 cm × 13.3 cm)
Operating Temperature: ………………………………………………………………………… 32°-122°F (0°-49°C)
Output Protocols: ….. UDP/IP 10/100 BaseT half duplex, TCP/IP for Console and DLS communications
Input Protocols: ………………………………………………..PC-Link (SIA format), DVACS (V1.10 and higher)
Digital Inputs: …………………………………… 4-digital inputs (can be increased to 12 using the PC5108)
Connectors: ………………………… 4-pin header for the PC-Link and RJ-45 for Ethernet, DVACS adaptor (DVACS kit only)
Programming: ……………………………… Panel keypad, console on the RS232 or remote T-Link console.
Network: …………………………………………………………… Ethernet LAN/WAN 10 BaseT or 10/100 BaseT
E-mail: ……………………………………………………. sends alarm messages to maximum 2 E-mail addresses (NOT available for DVACS installations)
Downloading Support for DSC Panels: …………………… DLS-3 and/or System Administrator software
Multiple Central Stations: ………………………………………………… primary and backup via phone line (NOT available for DVACS installations).
Call Direction Options: ……………………… primary or backup communicator using panel call direction (NOT available for DVACS installations).
Approval Listings: ………………………………………………………………………………………………FCC, IC, CE UL (Grade of Service AA, Encrypted Line Security) ULC (Signal Channel Security Level 4/5)
NOTE:This manual shall be used with the Installation Manual of the associated Alarm Controller for installation.
NOTE: For UL Listed fire installations, shared on-premises communication equipment is required to be UL Listed for Information Technology Equipment. The communication medium between protected property and communications service provider must be for the exclusive use of the protected property and not shared with other communications service provider subscriber.
NOTE:When a hub or router/gateway is used on the premises with the T-Link TL250, 24-hr. standby power is required for these devices (i.e., UL listed UPS, battery backup).
NOTE:This equipment (T-Link TL250) shall be installed and used within an environment that provides the POLLUTION DEGREE MAX 2 and OVERVOLTAGES CATEGORY II NON-HAZARDOUS LOCATIONS, indoor only. The equipment must be FIXED and permanently connected, and is intended to be installed by SERVICE PERSONS (i.e., having the appropriate technical training and experience necessary to be aware of hazards which that person may be exposed to in performing the task, and of measures to minimize the risks to that person or other persons).
CAUTION
Ethernet communication lines must be connected to an approved (acceptable to local authorities) type NID (Network Interface Device) before leaving the premises (e.g., UL installations, UL60950 Listed NID).
2
firealarmresources.com

Section 2: Quick Start
2.1 Installation 1. Determine the Operating Mode Required The operating mode (Modes 1, 2, 3, Standard Mode, or DVACS Mode) will determine how the unit is to be wired. 2. Determine the Mounting Location Select a mounting location in a dry, protected area at least 30 cm. away from physical contact with any person. Refer to page 34, appendix C, for Network Protection details.
NOTE: Do not exceed the following recommendations for wire run distances
· Input wiring should must be minimum 22 gauge quad (0.5mm). Two pair twisted is preferred.
· PC5108, or zone wiring must not exceed 1,000′ (305m) (in wire length) from the T-Link TL250.
· Shielded wire is not necessary unless wires are run in an area that may present excessive RF noise or interference.
· Refer to section 9, Programming Descriptions, section [36] for zone wiring details.
3. Route Wiring to Mounting Location Route wiring from the hard wired zones or control panel as required.
NOTE: Route wiring through conduit to a junction box if possible.
4. Mount the T-Link TL250 Panel 2.2 Testing
Standard Mode: Ensure the panel is programmed to use the T-Link TL250 in accordance with the settings outlined in section 8, Programming Guide. Simulate Burglar and Fire Zone violation on the DSC alarm panel. Verify that the T-Link TL250 transmits the events to the central station. Mode 1: Make sure the T-Link TL250 Input 1 is programmed in accordance with the settings outlined in Sections 9, Programming Descriptions. Simulate Burglar and Fire Zone violation on the alarm panel. Verify that the T-Link TL250 transmits the events to the central station. Modes 2, 3 and DVACS: Simulate Inputs violations in accordance with the settings outlined in Sections 9, Programming Descriptions. Verify that the T-Link TL250 transmits the events to the central station.
3
firealarmresources.com

2.3 Resetting to Factory Defaults Modes 1, 2, 3 and DVACS: · Remove Power from the T-Link TL250; disconnect battery and control panel if applicable · Disconnect all wiring from the PGM1 and IN1 terminals. Connect a jumper wire between the PGM1 and IN1 terminals · Apply power to the system · Remove power from the system · Reconnect all original wiring and reapply power to the system · Test System – refer to section 2.2
NOTE: A restart is required for the programming changes to take effect. Allow up to 15 seconds for a restart.
Mode 4: · Enter section 999 of the T-Link TL250 · Enter 00 to default the unit to factory settings · Enter 55 to restart the unit.
4
firealarmresources.com

Section 3: Bell Follower Installation (Mode1)
3.1 Setup and Installation
3.1.1 Bell Follower Installation (Mode 1) Install the T-Link TL250 in a DSC enclosure (model PC5003C) when used in a Bell Follower configuration. Refer to section [036][99]. Connect the 12VDC and GND terminals to the external 12V power source. NOTE: Bell Follower mode can not be used in UL or ULC listed installations.
+12V GND YX RX GND RED YEL GRN PGM1 PGM2 IN1 GND IN2 IN3 GND IN4 EARTH
NC
Relay Com
NO
Alternate connection for Control Panels where Bell switches High
BELL+ BELL-
Refer to options [062] through [065].
5
firealarmresources.com

Section 4: Stand-alone Installation (Modes 2&3)

Install the T-Link TL250 in a DSC enclosure (model PC5003C) when used in a standalone configuration or with the PC5108 module.
Connect the 12VDC and GND terminals to the external 12V power source.
NOTE: For UL Listed installations, the power supply used must be UL Listed for the application.

4.1 Stand alone Mode 2 Configuration

Fire/Burglary Alarm Panel

PC5003C Cabinet

Outputs Input

Metal Conduit (20ft max.)

STAT
T-LINK TL250
+12V GND TX RX GND REDBLK YEL GRN 1 PGM 2 IN1 GND IN2 IN3 GND IN4 EARTH
IN1 – IN4 Zone Inputs (Not supervised) PGM1 Trouble Output

CAT5 Cable (shielded) 10/100 BaseT Network

LK ACT SPD

Note: Wiring between the control panel and the T-Link TL250 must be enclosed in metal conduit.

12V 275mA UL Listed
Power Supply

4.2 Input Expander (Mode 3 Configuration)
To expand from the 4-zone inputs a PC5108 must be connected to the T-Link. Connect the Keybus from the PC5108 to the Keybus of the T-Link TL250. Any devices that require 12VDC, motion detectors, glass break detectors, etc., will require an external 12VDC power supply.

LK ACT SPD

12V 275mA UL Listed
Power Supply

STAT

T-LINK TL250
Cat5 Network 10/100 BaseT
+12V GND TX RX GND RED BLK YELGRN 1 PGM 2 IN1 GND IN2 IN3 GND IN4 EARTH
IN1 – IN4 Inputs (NO/NC) (Not supervised)
PGM1 Trouble Outputs

J6 J4 J5

J1 J2 J3

Connect to Fire/Burg. Alarm Panel
Metal Conduit (20ft max.)

Z1 – Z8 Inputs (NO/NC) (Not supervised)

6
firealarmresources.com

Section 5: Standard Installation (Mode 4)

5.1 Power864 and Maxsys Panel Setup and Installation
Refer to the PC4020(CF) or PC5020(CF) Installation Manuals for control panel installations. Mount the T-Link on the side wall of the PC4050C or PC4050CR cabinet. Refer to appendix C for Network Protection installation instructions.
Remove power from the control panel before any connections are made to the T-Link TL250. Connect the 12VDC and GND terminals to the panel auxiliary power output. Connect the supplied cable from the T-Link TL250 white connector to the PC-Link header of the control panel.
The black wire of the PC-Link cable is pin 1 on the PC-Link header for the PC5020 v3.2 or higher control panels. The PC-Link header is polarized on the PC4020 v3.31 or higher control panel. Connect the e-ground to a proper earthground connection.

5.2 Standard Connection with PC4020(CF)/PC5020(CF)
CAUTION: All circuits are supervised and power limited. Refer to section 5.4, UL Listed Commercial Fire Systems diagram for wire routing. Do NOT route any wiring over the circuit boards. Maintain at least 1″ (25.4mm) separation between circuit board and wiring.

A minimum of 1/4″ (7mm) separation must be maintained at all points between non power limited wiring and power limited wiring.

PC-LINK
STAT
SUPERVISED

LK ACT SPD

Network Connection
Use only CAT5 cable (1000ft / 303m max.) Supervised

+12V GND TX RX GND RED BLK YEL GRN PGM1PGM2 IN1 GND IN2 IN3 GND IN4 EARTH

Network

WARNING!: Do not connect transformer to receptacle controlled by a switch. The transformer must be UL Listed and have a restraining means.

PC-LINK

16.0V@40VA

RED

BLK

SUPERVISED
V = 12VDC I = 250mA (275mA with PGM or PC5108)

7
firealarmresources.com

5.3 Wiring T-Link to a DSC Compatible Control Panel · Secure the T-Link module to the side of the cabinet using the supplied standoffs. · With AC power and battery disconnected removed from the DSC control panel, wire
the T-Link to the panel using 4 wires from the PC-Link of the panel to the “PANEL” connector on the T-Link. · Wire the panel’s AUX+ and – to 12VDC and GND terminals of T-Link. · Apply AC and DC to the main control panel. Both the T-Link and the panel should power up. · Do the necessary programming that is required.
NOTE: If a Bell/Siren will not be used, wire the Bell/Siren terminals on the panel with a 1000 ohm resistor. For Commercial Fire installation, when a bell/siren is used in the application, it should be connected to the DSC module PC4702BP. Refer to the PC4020 Installation manual. The keypad or any other accessory connected to the Combus shall be connected within 3 feet / 0.9 m and in conduit.
5.4 Battery and AC Power Lead Routing for UL Listed Commercial Fire Systems
T-Link board must be mounted on the side of the cabinet. Refer to the mounting instructions in the associated Installation Manual.
8
firealarmresources.com

+12V GND

Section 6: DVACS Installation (Mode 5)

6.1 DVACS Panel Installation. Remove power from the control panel before wiring connections to the T-Link TL250 module. Connect the 12VDC and GND terminals to the panel auxiliary power output. Connect the DVACS cable from the T-Link TL250 Adaptor on the PC-Link header to the DVACS connector on the control panel. Connect the eground to a proper earth-ground connection.
In a typical DVACS Installation, a DVACS panel is connected to an F1/F2 subset that communicates the alarm information to the central station comprising an SG MRL2 receiver with an SG DVL2A module installed.

DVACS Panel

DVACS RS-232 TX, RX, GND

DV1660
Installed in Cabinet ULC Listed Installation

12/24VDC Red, Blk

F1/F2 DVACS Subset

DVACS Network

CARRIER Tx Rx
ALARM ACK./ FUNCT. TROUBLE
SELECT
WATCHDOG

MLR2 with DVL2A

SG-DVL2A CARRIER Tx Rx ALARM
A C K . / F U N C T. TROUBLE
SELECT
WATCHDOG

OPTION
ACK.
Tx ENTER
Rx BACKSPACE
TROUBLE ESCAPE
AC

SG-CPM2
123A 456B 789C 0FED

To send DVACS Alarm information over the internet, the T-Link TL250 performs the equivalent functions of the F1/F2 subset and the polling function of the SG DVL2A. DVACS alarm information is sent to the T-Link TL250 by connecting the existing RJ-45 terminated cable to the PC-Link Header on the TL250 module with an RJ-45 to PC-Link adaptor. The T-Link transmits DVACS alarm information in the DVACS protocol and T-Link Alarm information in the SIA protocol over the internet to a System III Receiver with SG-DRL3-IP line card installed.

Typical T-Link TL250/DVACS Installation

DVACS cable must be run in metal conduit & terminated with an RJ-45 connector

RJ-45 to PC-Link Adaptor

System III Receiver with DRL3-IP Line Card

DVACS Panel
DV1660
Installed in Cabinet ULC Listed Installation

T-Link TL250

CON3

PCLINK

STAT

CON2

SPD ACT LNK

CON1

220

12VDC Red, Blk

+12V GND TX RX GND RED BLK YEL GRN PGM1 PGM2 IN1 GND IN2 IN3 GND IN4 EARTH
PC 5003C Cabinet

ID = 34 Account = 010A000034 RRLL = 010A
For Decimal Account# Account = 010A000056

Alternate Power Supply
ULC Listed Power Supply with Battery Backup

CON5

LAN/WAN/ Internet

RRLLL = 02345 IP Account = 010A000034

DVACS Automation Protocol 1 Digit 101A 034… 2 Digits 1010A 034… 3 Digits 10100A 034…

SIA Automation Protocol 1 Digit S025[#000034|… 2 Digits S0245[#000034|… 3 Digits S02345[#000034|…

6.2 DVACS Events DVACS events generated on DVACS panels connected through the T-Link TL250 follow the same protocols used on the SG-DVL2A module.
DVACS Alarms Examples
Example 1 (DVACS with receiver set as 1 digit line number) Printer:
01 Nov 2004-11:38:22-01/02-SG -01-1-001–Burgl Alm Zn#02
Computer:
1011 001 A 02

9
firealarmresources.com

Example 2 (DVACS with receiver set as 3 digits line number) Printer:
01/02-SG -01-001-014–Burgl Alm Zn#13
Computer:
101001 014 A 13
SIA DVACS Alarms Examples
Example 1 (DVACS with receiver set as 1 digit line number) Printer:
01 Nov 2004-13:50:51-01/02-SG -01-1-0456–Fire Alm Zn999
Computer:
3011 0456FA 999
Example 2 (DVACS with receiver set as 3 digits line number) Printer:
01 Nov 2004-13:51:03-01/02-SG -01-001-0456–Medical Alm Zn001
Computer:
3011 0456MA 001
Additional Events: If the T-Link TL250 transmitter does not receive polls (response) from the panel, the TLink will generate the events previously generated by the SG-DVL2A for DVACS panel and restoral. SIA
Printer:
01 Nov 2004-13:50:51-01/02-SG -01-1-001–Account Absent
Computer:
3011 0001YC 000
Printer:
01 Nov 2004-13:50:51-01/02-SG -01-1-001–Account Present
Computer:
3011 0001YK 000
Standard
Printer:
01 Nov 2004-13:50:51-01/02-SG -01-1-001–IDcde IncResp
Computer:
1011 001 A 0A
Printer:
01 Nov 2004-13:50:51-01/02-SG -01-1-001–IDcde Restore
Computer:
1011 001 R 0A NOTE: The SG-DRL3-IP will use 10-digit account identifications in it’s IP table for DVACS transmitters. The first four digits represents the receiver and line number originally used on the SG-DVL2A and are programmed as the first four digits of the T-Link account (refer to appendix F of SG-DRL3-IP Installation Manual).
NOTE:If the automation protocol in the form of 1RRL, 3RRL is required when using the DRL3-IP in the DVACS configuration, set DRL3-IP Option [11] =1 and CPM3 Options [10] & [11] = 03
10
firealarmresources.com

Section 7: T-Link Operation

7.1 Remote Control The panel and the DLS software will control this function. The module will be a conduit for the information. Commands can be sent from the DLS or SA software to allow control of the panel; Arm/Disarm, Bypass/Un- Bypass, Status Request.
NOTE: New DLS-3 and System Administrator drivers are required for the PC5020 v3.2 and PC4020 v3.31. These drivers can be downloaded free from dsc.com/ dls3drivers.htm. DLS-3 and System Administrator can communicate directly to the T-Link TL250 module. The DLS software can be used with UL Listed installations only when service personnel are on-site.
7.2 Programming The T-Link TL250 can be programmed remotely or locally with the T-Link Console Software via the ethernet connection or locally with the T-Link console via the serial port. Programming can also be done through the control panel when connected to a PC4020 or PC5020. TL250 programming cannot be done using DLS software.
NOTE: On a default unit the T-Link can be reached from the console at IP 192.168.0.99 with a subnet mask of 255.255.0.0 on port 3064.
7.3 IP Address Each T-Link on the same network node must have a unique IP address. This system is compatible with any device that masks the IP address of the originating device. Dynamic addressing (DHCP) can also be used with the TL250.
For remote programming, the IP must be known by the T-Link console or the DLS/SA computer(s). For this reason, DSC recommends a Static IP or setting up the DHCP server to always license the same IP to the T-Link based on its MAC address.
7.4 Port Usage Table
NOTE: Confirm with the network administrator that the following ports are locked open and that the SG-DRL3-IP has network access for all required network segments.

Description

T-Link TL250

T-Link Source Port

T-Link Destination Port

SG-DRL3-IP

T-Link Port

DLS Port

SA Port

Console S/W Port

DLS2002

DLS Port

DLS SA

SA Port

Console

Console Port

T-Link Console TFTP Firmware Upgrade

Default Port #

Programming Location to Change

3060 Section [009] T-Link options from Keypad 3061 Section [010] T-Link options from Keypad

3061 3062 3063 3064 3062 3063 3064
69

Section [0B] [0C] from Console S/W Section [0D] [0E] from Console S/W Section [11] [12] from Console S/W Section [14] [15] from Console S/W Modem Configuration Options Modem Configuration Options

11
firealarmresources.com

7.5 Integrated Call Directions The T-Link features a built-in call direction that will allow signals to be sent to active receivers as well as a local LAN logging application. The T-Link has a choice of 3 receivers when transmitting signals. Receiver 1, Receiver 2 and Receiver 3. Should the communications be lost to Receiver 1, the T-Link will generate a local trouble and send the trouble to the appropriate receiver. The loss of Receiver 2 or 3 does not generate any signal since they are not supervised. The panel can direct to which receiver the signal will be sent. If a Receiver is lost, the T-Link TL250 will route the alarm to the backup receiver (if programmed). Receiver 3 will be used as a local logging. Any signal sent to either Receiver 1 or Receiver 2 will also be sent to Receiver 3. Once the connections has been reestablished to Receiver 1 the T-link will resume transmission to it.
NOTE: If Receiver 1, 2 or 3 is not programmed, T-Link will not attempt to report to the receiver. NOTE: Receiver 2 is not supported for DVACS installations.
7.6 Status Indicators There are 4 LEDs on the board to indicate connection, traffic and trouble conditions. LK LED (Link Status) will turn on when the network is present and will blink when there is network activity. ACT LED (Activity/Network Traffic Status) will blink to show network activity. SPD LED (Speed Status) will remain off for 10BaseT network connection and will be on to indicate 100BaseT network connection. STAT (Status) LED will normally blink once every 5 seconds. If a trouble is present, the LED will blink a number of times (as per table) with a one second pause before restarting the sequence. If there is more then one trouble present, the LED will blink at a rate that is equal to the highest priority. The transmitter has a number of individually maskable trouble conditions that report various troubles present on the transmitter. For the corresponding trouble toggle option, refer to section [033] and [034]. Options [033] and [034] can be set to ignore for any or all trouble conditions. Once a trouble is ignored, it will no longer generate a signal or have any affect on the Status LED. Example: The network is not present and inputs are in alarm. The LED will blink once with a one-second pause. When the network trouble is cleared the LED will blink five times with a one-second pause.
12
firealarmresources.com

Status

Blinks/ Priority

Description

Network Absent

The Ethernet link between the transmitter and local

1

hub or router is absent. This is equivalent to the link

LED on the Ethernet chip being off.

Invalid Account

2

The transmitter account code is still set to the default value of FFFFFF.

Receiver 1 Absent

3

The transmitter is not receiving Receiver Heartbeat commands from the receiver.

Panel Absent

The transmitter is not receiving polls from the DSC

4

4020, 5020 or DVACS panel through the PC-Link interface. Generic panels are not supervised by the

transmitter.

Input Alarms

5

There are inputs on the T-Link which are in `alarm’ condition

FTC 1

6

T-Link failed to communicate with Receiver#1

PC5108 Absent

7

The PC5108 Module is not responding to the transmitter.

PC5108 Tamper

8

The PC5108 Module Tamper has been activated

FTC 2

9

T-Link failed to communicate with Receiver#2

Keyswitch Arm

10 The system was armed by the keyswitch zone

T-Link Remote Programming

11 T-Link is being programmed remotely

T-Link Local Programming

12

T-Link is being programmed locally

Receiver #2 Absent

13

The transmitter is not able to connect to Receiver#2 on power-up

7.7 Testing & Troubleshooting
The T-Link TL250 and the System III Receiver can be connected directly With an Ethernet crossover cable. An Ethernet crossover cable can be made by taking a standard Ethernet cable (which will have wires attached to pins 1, 2, 3 and 6 only on the 8 pin RJ-45 connector) and swapping pin 1 with pin 3, and also swapping pin 2 with pin 6, on one end of the cable only. This effectively reverses the transmit and receive pairs, and allows two hosts to communicate without the use of a network hub.

Upon T-Link TL250 power-up (without the Ethernet cable connected), LED2 will blink periodically, approximately once every 12 seconds. This represents the T-Link TL250 attempting to send a connection request to the receiver. The TL250 will try to connect to the receiver until it succeeds.

The Activity and Link LED’s are normally OFF in their default state after power-up (i.e. when no Ethernet cable is connected, and there are no packets being transmitted or received, respectively). Refer to the Status Indicator table above for details.

13
firealarmresources.com

Section 8: Programming Guide
The following information is required Before programming the T-Link TL250 module. 1. The static IP address for the T-Link TL250 module (Section [001]). 2. The subnet mask for the T-Link TL250 module (Section [002]). 3. The static IP address of the receiver (Section [007]). 4. The static IP address of the static gateway for the LAN that the T-Link TL250 is
connected to in a WAN configuration (Section [008]).
NOTE: For DHCP networks, the above items are not required. Consult your network administer for information about the DHCP settings.
Important!: If a telephone line is used to back up communication, program the phone number you want to use as a backup or dial direction option in section [000401] Communication Toggle Options’. If using a PC4020 or a PC5020 [380] option 5, enables 3rd number to backup. DSC recommends programming T-Link TL250 to transmit first for faster communication. If the land line communication is programmed to communicate first, then the T-Link TL250 communication will be delayed for the duration of the land line call (30-45 seconds). This also applies when using the phone line for backup only. 8.1 Basic Programming (PC4020 Control Panel) NOTE: PC4020 v3.3 or higher required (Rev04B hardware). DSC recommends changing the reporting code transmission delay from 20s to 40s on the PC4020: Step 1 Power down the MAXSYS panel. Step 2 Power up the MAXSYS panel. Enter installers programming ([*] + 8 + Installers Code) within the first 10 minutes of power up. Step 3 Scroll to Diagnostics (04) and press [*]. Step 4 Scroll to Binary Programming (01) and press [*]. Step 5 Enter the address of the address location 03044 and change the value to 40 seconds (0x28). Programming Steps: Step 1: Program the Hex digits [CAAA] in the telephone number that will be used for T-Link TL250 communications (section [0004000000]Communicator + Main Items Phone Numbers’).
NOTE: You must delete the [D] in the telephone number first (this is the dial tone detection).
Step 2: Program YES for T-Link Enabled’ option, section [000401] Communication Toggles’.
Step 3: If using DLS communication over T-Link then program YES for DLS Enabled’ in section [000300],DLS Section +DLS Toggles’.
Step 4: Program the dialer direction options for the phone number that has been programmed to send T-Link communications in section [000400XX02], where XX = telephone number 00-02 in the `Communicator + Main Options’.
NOTE: Auto report SIA section [000401] must be enabled in order for the T-Link TL250 to communicate. The communication format must be programmed for SIA [000400XX01].
14
firealarmresources.com

Step 5: Enter section [000406] for T-Link module programming options.
Step 6: Program the static IP address for the T-Link module in section [001]. Program 000.000.000.000 for DHCP.
Step 7: Program the subnet mask for the T-Link module in section [002]. This option will be ignored if the unit is set for DHCP.
Step 8: Program the receiver static IP address (DRL3-IP line card or the PC running The Reporter IP software) in section [007].
Step 9: If the receiver (DRL3-IP) is on a different network segment than the T-Link module, the gateway address associated with the T-Link module must be programmed in section [008]. This is an optional step; determine if this is required with the network administrator.
Step 10: Program the T-Link’s account number in section [003].
Step 11: After all T-Link TL250 module programming is complete, you must restart the module so the programming changes will take effect. To restart the T-Link module enter the digits [55] in T-Link programming section [999] and wait 15 seconds for the module to reboot. Once complete, press the [#] key to exit TLink TL250 programming.

Maxsys V3.5 Only:
CAAA = Receiver 0

CCCC = Receiver 2

CBBB = Receiver 1

CDDD = Receiver 3

If the panel sends events to Receiver 0, the T-Link will perform backups automatically to IPs from Receiver 1 and Receiver 2. If the panels sends events to specific receivers then the panel will be responsible for all backup/alternate dial functions.
NOTE: The IP Receiver addresses are programmed in the T-Link TL250.
8.2 Basic Programming (PC5020 Control Panel)
NOTE: PC5020 software version 3.2 or higher required (Rev03 hardware).
Programming Steps:
Step 1: Program the hex digits [DCAA] in the telephone number that will be used for T-Link TL250 communications (section [301] to [303], Telephone Phone Number Programming’). NOTE: The leading digit [D] in the telephone number for dial tone detection is already programmed. Step 2: Program the communication format as SIA FSK format in section [350] and Auto SIA, option 3 in section [381] has to be OFF. Step 3: Program the call direction options in section [351] to [376] for the phone number being used to communicate using T-Link TL250. Step 4: Section [382] Option 5PC-Link Active’ option must be ON to enable T-Link TL250 communication.
Step 5: Enter section [851] for T-Link TL250 module programming options.
NOTE: Option [5] in Section [382] must be enabled to access this section.

15
firealarmresources.com

Step 6: Program the static IP address for the T-Link TL250 module in section [001]. Program 000.000.000.000 for DHCP.
Step 7: Program the subnet mask for the T-Link TL250 module in section [002]. This option will be ignored if the unit is set for DHCP.
Step 8: Program the static IP address of the receiver (DRL3-IP line card) in section [007]. Step 9: If the receiver (DRL3-IP) is on a different network segment than the T-Link
TL250 module, the gateway address associated with the T-Link TL250 module must be programmed in section [008]. This is an optional step; verify with the network administrator if this is required. 8.3 T-Link DVACS Programming Obtain the following information from the station monitoring the DVACS alarm panel:

  1. The SG-DVL2A Receiver number and line number that the DVACS panel is connected to. 2. The DVACS panel ID (Account Number). 3. The programmed value of the SG-DVL2A extended format (option 07) for step 2 below. Step 1: Program the Account Number of the DVACS control panel in the DVACS account option of the T-Link (option 067). The T-link will use this number to supervise the control panel and poll for DVACS signals from the panel.
    NOTE: Alarms generated by the DVACS panel will be sent using the T-Link account.
    Step 2: Program the T-Link DVACS extended option 068 so that it is identical to the SG-DVL2A extended option 07.
    Step 3: Program the T-Link Account (option 003). To use the DVACS account number for alarm reporting, program the T-Link account option with this value. When an alarm is sent from the DVACS control panel to the central station, the account number is expanded to a 10-digit value. The first four digits emulate the line number and receiver number on the MLR2/DVL2A. These four digits overwrite the SG-DRL3-IP receiver and line number before being sent to the printer and computer. This allows existing DVACS accounts to be sent to the automation software without alteration and account duplication on the same SG DRL3-IP line card using a different line and/or receiver number.
    NOTE: If a new account is created, the first four digits must be programmed as `0000′.
    16
    firealarmresources.com

Section 9: Programming Descriptions (Advanced)
[001] Module IP (Static IP address for the T-Link module) Default: 192.168.000.099 Unique IP address for the module. The network administrator will provide this information. To enable DHCP program the address as 000.000.000.000.
[002] Subnet Mask Default: 255.255.0.0 Must equal the subnet mask for the local subnet. For any single subnet, there is only one valid subnet mask; all nodes on the same subnet will use the same subnet mask. The network administrator will provide this information.
NOTE: If DHCP is enabled then this section will be ignored.
[003] T-Link Account Code Default: 0000FFFFFF The account number is used by the central station to distinguish between transmitters. There is one account number programmable for the T-Link. This account number is only used when transmitting signals from inputs or internal troubles. Signals received on the PC-Link will use the panel’s account number.
NOTE: Account codes 0000FFFFFF, FFFFFFFFFF and 0000000000 are not valid accounts. Refer to section 5.3 T-Link DVACS Programming.
[004]-[005] Encryption Password (32 Hex characters max.) Default: None Once programmed the T-Link will use this data to encrypt and decrypt all receiver and DLS messages. The user can program a value from 1-8 bytes long in each section. To disable the encryption, program both sections with zeros. If the encryption key does not match the central station key, then the communication will FTC.
NOTE: For UL/ULC Installations, an encryption key is required.
NOTE: E-mail messages are not encrypted.
[006] T-Link Installer Code This code is used when using the T-Link Console to remotely or locally program the T-Link.
[007] Receiver #1 IP (Static IP address for the receiver) Default: 000 000 000 000 Program the IP address of the central station receiver.
[008] T-Link Gateway Default: 000.000.000.000 This is the IP address of the local gateway the T-Link can use to connect with the receiver (WAN network). The IP address of the gateway must also be a valid IP address for the local subnet.
NOTE: If DHCP is enabled then this section will be ignored.
[009] Receiver #1 T-Link Source Port Number Default: 3060
17
firealarmresources.com

[010] Receiver #1 T-Link Destination Port Number Default: 3061
[011] Receiver #2 IP (Static IP address for the second receiver) Default: 000.000.000.000 Program the IP address of the second receiver.
[012] Receiver #2 Gateway Default: 000 000 000 000 This is the IP address of the local gateway the T-Link can use to connect with the second receiver (WAN network). The IP address of the gateway must also be a valid IP address for the local subnet.
[013] Receiver #2 T-Link Source Port Number Default: 3065
[014] Receiver #2 T-Link Destination Port Number Default: 3061
[015] Receiver #3 IP (Static IP address for the third receiver) Default: 000 000 000 000 Program the IP address of the third receiver.
[016] Receiver #3 Gateway Default: 000.000.000.000 This is the IP address of the local gateway the T-Link can use to connect with the third receiver (WAN network). The IP address of the gateway must also be a valid IP address for the local subnet.
[017] Receiver #3 T-Link Source Port Number Default: 3066
[018] Receiver #3 T-Link Destination Port Number Default: 3061
[019] Console Port Number Default: 3064
[020] TFTP Port Default: 69 Port used to do the remote flash upload.
[021] DLS Port Number Default: 3062
[022] SA Port Number Default: 3063
[023] T-Link Supervision Enable/Disable Default: 0 When set to 1, the T-Link is supervised by the central station receiver.
NOTE: For UL/ULC installations, this option must be set to 1.
[024] Receiver Failure Debounce Time The amount of time that must elapse with no heartbeat response from the receiver before the T-Link TL2XX will generate a Receiver#1 absent condition.
18
firealarmresources.com

NOTE: For UL installations, this option shall be set to B4h (180s). For ULC installations this option shall be set to 5Ah (90s) for Security Level 4, and to 4Bh (75s) for Security Level 5.
[025] Receiver Restoral Debounce Time The amount of time that must elapse when the heartbeat resumes from the receiver before the T-Link TL2XX will generate a Receiver #1 restoral condition.
[026]-[027] E-mail Address 1 and 2 (64 characters max.) Default: None The T-Link can send alarm messages to two E-mail addresses. The T-Link only supports SMTP to transmit E-mails in the MIME format. T-Link does not support UUENCODE message formats. T-Link does not accept any incoming messages.
NOTE: This option can only be programmed via the console software.
The following is an example of the information contained in an E-mail from the TLink module. For more details on the SIA reporting codes, refer to the control panel Installation Manual. From: T-Link 123456 To: recipient@address.com Subject: T-Link v1.0.30; 123456 Event Report Message:

6789|[Nri0/LS000] NOTE: The account number in the subject line is the

T-Link’s account number. The account number in the message body is from the originator of the signal. In this example, the originator was the panel connected on the PC-Link with account number 6789. If the T-Link would have been the originator, the account number in the message body would match the account number in the subject line.
[028] E-mail From The E-mail from’ option is used for theFROM’ field in E-mails sent out by the T-Link TL2XX. If the option is not programmed (all 0’s) then the from’ field of the T-Link TL2XX will look as follows: T-Link AAAAAA where A is the account code of that T-Link TL2XX. If this option is programmed with any string, the value in theFROM’ field will be programmed in this option.
[029] DNS Server Address Default: 000.000.000.000 In order to communicate to a T-Link via a host name program the IP address of the DNS server. The DNS lookup for the T-Link TL2xx will only work for T-Link TL2xxs with Static IP addresses (Dynamic DNS is not supported).
[030] SMTP Server Name (64 characters max.) Default: None In order to send E-mails to the Internet a valid outgoing E-mail server. Contact your Internet service provider or system administrator for this information. This option can only be programmed with T-Link Console software.
[031] E-mail Account (64 characters max.) Default: None
19
firealarmresources.com

Some E-mail servers will require an account name to allow outgoing messages to be sent. Contact your Internet service provider or system administrator for this information.
NOTE: This option can only be programmed with T-Link Console software.
[032] E-mail Account Password (20 characters max.) Default: None
Some E-mail servers will require a password and the account name to allow outgoing messages to be sent. Contact your Internet service provider or system administrator for this information
NOTE: This option can only be programmed With T-Link Console software.
[033] Trouble Toggle Option Section 1 Option [033] and [034] are for the trouble reporting toggles. To enable, set the specific trouble toggle option ON. To disable, set toggle to option OFF.

Toggle Default

Description

[1]

ON

|____| Network Trouble

[2]

ON

|____| Invalid Account (set as FFFFFF)

[3]

ON

|____| Receiver 1 Absent

[4]

ON

|____| Panel Communication Trouble

[5]

OFF

|____| Input Alarm

[6]

*OFF

|____| FTC to Receiver 1

[7]

*OFF

|____| PC5108 Absent

[8]

*OFF

|____| PC5108 Tamper

*Must be ON for UL/ULC installations

[034] Trouble Toggle Option Section 2

Toggle Default

Description

[1]

OFF

[2]

OFF

[3]

OFF

[4]

OFF

[5]

OFF

[6]-[8]

|____| |____| |____| |____| |____| |____|

FTC to Receiver 2 Keyswitch Arm/Disarm Reporting T-Link Remote Programming T-Link Local Programming Receiver 2 Absent For Future Use

20
firealarmresources.com

[035] PGM1 Enable/Disable
Default: 01
This PGM can be enabled (01) or disabled (00).
When the PGM is enabled, the output will activate when any of the trouble conditions enabled in the T-Link Trouble Toggle Options are present. It will deactivate when all the selected trouble conditions are cleared.
NOTE: If a trouble condition occurs that is not enabled in the T-Link Trouble Reporting option, the PGM will not turn on for that trouble condition nor will it be required to turn off the PGM.

PGM1-The PGM1 output is dedicated for T-Link TL250 trouble indications. Program this option as `01′ for Modes 2 & 3,.
If a control panel is not monitoring the T-Link TL250, an LED or a buzzer can be connected between this terminal and the RED terminal for trouble indication. The PGM terminal switches low from an open-collector state.
NOTE: The PGM output can sink 50mA (max.). For UL installations, use DSC RM-1 Relay Module.

T-Link TL250
RED BLK YEL GRN COM PGM

LED Output with current limiting resistor
Optional rela y driver output
To External Supply

LED 560

+ Coil –

Relay

NC

Com

PGM2-The PGM2 output is dedicated as an input follower that is triggered on any input alarm (including Bell Follower which generates Burglary and Fire Alarms) except for keyswitch zones. The PGM2 output will only turn off when ALL violated zones are restored.
NOTE: PGM2 is always enabled and follows all zones. It is the users option to connect devices to the PGM.
[036]-[047] Digital input 1 through 12 configuration for TL250 Default: 00 Program a 2-digit code for the definition of the inputs. Select a definition from the list below.
[00] Null Input The input is vacant. Unused inputs should be programmed as Null inputs. Any activity on this input is ignored.
[03] Instant Input This input type will reports if the T-Link is armed, it also supports force arming. When forced armed the T-Link will arm even if the input is open. When the input is closed it is treated as a normal instant input. SIA Reporting Code: BA/BH.
[08] Standard 24-hr. Fire Input When this input is violated, the panel immediately communicates to the central station. SIA Reporting Code: FA/FH.
[11] Standard 24-hr. Burglary When this input is violated, the panel immediately communicates to the central station. SIA Reporting Code: BA/BH.
21
firealarmresources.com

[16] 24-hr. Panic Input If this input is violated, when the system is armed or disarmed, the panel reports to the central station. SIA Reporting Code: PA/PH.
[21] 24-hr. Tamper When this input is violated, the panel immediately communicates to the central station. SIA Reporting Code: TA/TH.
[23] Maintained Keyswitch Arm Input (Input 2 Only) When this input is violated, the system will arm. When this input is secured, the system will disarm. All instant type inputs have force arming support. SIA Reporting Code: CS/OS.
[99] 24-hr. Bell Follower Input Input 1 can only be programmed to follow the Bell output for burg/fire monitoring. Connect Input 1 to the Control Panel Bell+ output. This will disable signal sending when arm and disarm squawks are generated. Refer to options [062] through [065].
Mode 1 – Bell Follower Operation
+12V GND YX RX GND RED YEL GRN PGM1 PGM2 IN1 GND IN2 IN3 GND IN4 EARTH
NC
Relay Com
NO
Alternate connection for Control Panels where Bell switches High
BELL+ BELL-
[048] Input 1 Configuration Default: 0 Set to 0 for normally open inputs. Set to 1 for normally closed inputs.
NOTE: Select this option when Normally Closed (NC) detection devices or contacts are being used on Input 1.
[049] Input 2 to 4 Configuration Default: 0 Set to 0 for normally open contacts. Set to 1 for normally close contacts.
[050]-[061] SIA Reporting Input If ’00’ is entered, central station reporting is disabled. All other actions for PGM outputs and status are still activated. If ‘FF’ is entered, default reporting code is enabled using the input definitions, with the hard coded input number. If anything between 01 and 99 is programmed, the hard coded input number will be replaced by the programmed value.
22
firealarmresources.com

Alarm Reporting Codes, Inputs 1-12

Default: FF |__|__| Input 1 Alarm FF |__|__| Input 2 Alarm FF |__|__| Input 3 Alarm FF |__|__| Input 4 Alarm FF |__|__| Input 5 Alarm FF |__|__| Input 6 Alarm

Default:
FF |__|__| Input 7 Alarm FF |__|__| Input 8 Alarm FF |__|__| Input 9 Alarm FF |__|__| Input 10 Alarm FF |__|__| Input 11 Alarm FF |__|__| Input 12 Alarm

[062] Fire On Time
Default: 05
The Bell Pulse On Time is used with Digital Input#1 when configured for Bell Follower mode. The Bell Pulse On/Off Time is the time of the pulse width. This option is programmed in hex times 100 milliseconds.
[063] Fire Off Time
Default: 05
The Bell Steady On Time is used with Digital Input #1 when configured for Bell Follower mode. This is the minimum time in 100ms increments that the bell must be active/sounding before it will be considered a steady on state and generate the Burglary Alarms. This option is programmed in hex times 100 milliseconds.
[064] Restoral Delay Time
The Restoral Delay Time is used with Digital Input#1 when configured for Bell Follower mode. It is the minimum time that the bell must be inactive before it will be considered a Fire/Burglary Restoral.
[065] Fire Pulse Count
The Fire Pulse Count is used with Digital Input #1 when configured for Bell Follower mode. The pulsed count will be the minimum number of pulses (high and low forming 1 cycle) before the T-Link will consider it an alarm state.
[066] SIA ACK Time
The SIA ACK Time option is the maximum wait time for a response from a receiver for any messages sent to the receiver.
[067] DVACS Account Number
The DVACS Account Number. The T-Link will use this number to receive DVACS signals from the control panel and to supervise the panel.
[068] DVACS Extended
The SG-DV1660LC software versions 3.00 and higher support the group arm/disarm option. If a value other than 00′ is programmed here, the T-Link TL250 will poll the subscriber’s control unit repeatedly to get the transmitter group number arm/disarm status change and the user number. This information is combined then sent to the receiver. This allows the automation software to keep track of partition arm/disarm status. Program01′ to enable or 00′ to disable this option, the default is01′.

23
firealarmresources.com

Example, Option Enabled `01′
Printer:
01 Nov 2004-11:38:22-01/02-SG -01-1-001–012- Grp 1 Arming!B4 01 Nov 2004-11:38:22-01/02-SG -01-1-001–012- Grp 2 Arming!B5 01 Nov 2004-11:38:22-01/02-SG -01-1-001–012- Close User# 01
Computer:
1011sssssss012sC1s01 1011sssssss012sC2s01
Computer message combining for DVACS SIA protocol
3RRLssssss0AAAOGs002 (partition(OG/CG) 3RRLssssss0AAAOPs001 (user number)
Computer message combining When DVACS extended option enabled
SRRL[#AAAA|Nri2/OP001][14] NOTE:This will support 0-F group numbers maximum.
[901] Current T-Link IP Address The Current T-Link IP Address is a read-only option. If this option is selected through the panel programming, the T-Link TL2XX will respond with the current IP address of the T-Link TL2XX and display it on the keypad for the user.
24
firealarmresources.com

Section 10: Programming Worksheets
Sect. Description 001 T-Link IP Address
|||_| |__|_|| |||____|
002 T-Link Subnet Mask
|
||| |__||| |||____|
003 T-Link Account Code
|||| | | || |_| __|
004 Receiver Encryption Password
|_
||| __| | || |____||| __| | || |____|
005 Receiver Encryption Password
|||_| __| _| || |____||_| __| _| || |____|
006 Installer Codei
|
||| |__||| |||____|
007 Primary Receiver IP Address
|||_| |__|_|| |||____| |||____|
008 Primary Receiver Gateway IP Address
|
||| |__||| |||____| |||____|
009 Receiver Local Port
|||| |
010 Receiver Remote Port
|||| |
011 Secondary Receiver IP Address
|||_| |__|_|| |||____| |||____|
012 Secondary Receiver Gateway IP Address
|
||| |__||| |||____| |||____|
013 Receiver#2 Local Port
|||| |
014 Receiver#2 Remote Port
|||| |
015 Receiver 3 IP Address
|||| |
016 Receiver 3 Gateway IP Address
|||| |
017 Receiver#3 Local Port
|||| |
018 Receiver#3 Remote Port
|||| |
019 Console Port
|||| |

Default Value 192.168.0.99 255.255.0.0 0000FFFFFF 0000000000000000 0000000000000000
CAFE 0.0.0.0 0.0.0.0 3060 3061 0.0.0.0 0.0.0.0 3065 3061 0.0.0.0 0.0.0.0 3066 3061 3064

25
firealarmresources.com

Sect. Description

020 TFTP port

|||
021 DLS Port

|||| |
022 SA Port

|||| |
023 Supervision Enable (UL/ULC option must be set to 1)

|___|

024

Receiver Failure Debounce Time (UL = B4, ULC Security Level 4 = 5A, Security Level 5 = 4B)

|||
025 Receiver Restoral Debounce Time

|||
026 E-Mail Address 1

|__|__|__| __| __| __|__| __|__|__|__|__| __| __| __|__| __|__|
027 E-Mail Address 2

|__|__|__| __| __| __|__| __|__|__|__|__| __| __| __|__| __|__|
028 E-Mail From

|__|__|__| __| __| __|__| __|__|__|__|__| __| __| __|__| __|__|
029 DNS Server IP Address

|||_| |__|_|| |||____| ||___|____|
030 SMTP Server

|__|__|__| __| __| __|__| __|__|__|__|__| __| __| __|__| __|__|
031 E-mail Account

|__|__|__| __| __| __|__| __|__|__|__|__| __| __| __|__| __|__|
032 E-mail Password

|__|__|__| __| __| __|__| __|__|__|__|__| __| __| __|__| __|__|
033 T-Link Trouble Reporting 034 T-Link Trouble Reporting 035 T-Link Programmable Output #1

|||
036 Digital Input 01 Definition

|||
037 Digital Input 02 Definition

|||
038 Digital Input 03 Definition

|||
039 Digital Input 04 Definition

|||
040 Digital Input 05 Definition

Default Value 69
3062 3063
0
0x0078
0x003C Null Null Null
0.0.0.0 Null Null Null
See Troubles See Troubles
Disabled 00 (Disabled) 00 (Disabled) 00 (Disabled) 00 (Disabled) 00 (Disabled)

26
firealarmresources.com

Sect. Description

|||
041 Digital Input 06 Definition

|||
042 Digital Input 07 Definition

|||
043 Digital Input 08 Definition

|||
044 Digital Input 09 Definition

|||
045 Digital Input 10 Definition

|||
046 Digital Input 11 Definition

|||
047 Digital Input 12 Definition

|||

048

Digital Input 01 configuration: N.C. or N.O.

|___|
049 Digital Input 02-04 configuration: N.C. or N.O.

|___|
050 Digital Input 01 SIA Reporting Code

|||
051 Digital Input 02 SIA Reporting Code

|||
052 Digital Input 03 SIA Reporting Code

|||
053 Digital Input 04 SIA Reporting Code

|||
054 Digital Input 05 SIA Reporting Code

|||
055 Digital Input 06 SIA Reporting Code

|||
056 Digital Input 07 SIA Reporting Code

|||
057 Digital Input 08 SIA Reporting Code

|||
058 Digital Input 09 SIA Reporting Code

|||
059 Digital Input 10 SIA Reporting Code

|||

27
firealarmresources.com

Default Value 00 (Disabled) 00 (Disabled) 00 (Disabled) 00 (Disabled) 00 (Disabled) 00 (Disabled) 00 (Disabled) 00 (N.O.) 00 (N.O.) 0xFF 0xFF 0xFF 0xFF 0xFF 0xFF 0xFF 0xFF 0xFF 0xFF

Sect. Description 060 Digital Input 11 SIA Reporting Code
|||
061 Digital Input 12 SIA Reporting Code
|||
062 Fire On Time
|||
063 Fire Off Time
|||
064 Restoral Delay Time
|||
065 Fire Pulse Count
|||
066 SIA ACK Time
|||
067 DVACS Account
|||
068 DVACS Extended
|||
901 Current T-Link IP Address
|||_| |__|_|| |||____| ||___|____|

Default Value 0xFF 0xFF 0x05 0x05 0x64 0x03 0x02 0x00
01 (Disabled)

28
firealarmresources.com

Glossary
Console A PC application program which can connect to the receiver and provide Diagnostic and programming abilities to the user.
DHCP Dynamic Host Configuration Protocol, a protocol for assigning dynamic IP addresses. With dynamic addressing, a device can have a different IP address every time it connects to the network. In some systems, the device’s IP address can even change while it is still connected. DHCP also supports a mix of static and dynamic IP addresses. Dynamic addressing simplifies network administration because the server keeps track of IP addresses rather than requiring an administrator to manage the task. This means that a new computer can be added to a network without the hassle of manually assigning it a unique IP address.
DVACS® Digital Voice Access Control System This monitoring method requires a dedicated leased line from Bell Canada connected between the alarm system and the monitoring station. It is supervised so that if the line is cut an alarm will occur. This system is only available in Canada and meets ULC certification requirements. DVACS is a registered trademark of Electro Arts Ltd. Scarborough Ontario Canada
Encryption The translation of data into a secret code usually based on a key. Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt.
Ethernet A local-area network (LAN) protocol developed by Xerox Corporation in cooperation with DEC and Intel in 1976. Ethernet uses a bus or star topology and supports data transfer rates of 10 Mbps. A newer version of Ethernet, called 100BaseT (or Fast Ethernet), supports data transfer rates of 100 Mbps. The newest version, Gigabit Ethernet, supports data rates of 1 Gigabit (1,000 Megabits) per second.
IEEE Abbreviation of Institute of Electrical and Electronics Engineers, pronounced Itriple-E. Founded in 1963, the IEEE is an organization composed of engineers, scientists, and students. The IEEE is best known for developing standards for the computer and electronics industry.
Intranet A network based on TCP/IP protocols belonging to an organization, usually a corporation, accessible only by the organization’s members, employees, or others with authorization.
IP Abbreviation of Internet Protocol, pronounced as two separate letters. IP specifies the format of packets, and the addressing scheme. Most networks combine IP with a higher-level protocol called Transport Control Protocol (TCP), which establishes a virtual connection between a destination and a source.
29
firealarmresources.com

IP by itself is something like the postal system. It allows you to address a package and drop it in the system, but there’s no direct link between you and the recipient. TCP/IP, on the other hand, establishes a connection between two devices so that they can send messages back and forth for a period of time.
IP Address An identifier for a computer or device on a TCP/IP network. Networks using the TCP/IP protocol route messages based on the IP address of the destination. The format of an IP address is a 32-bit numeric address written as four numbers separated by periods. Each number can be zero to 255.
LAN A computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected to other LANs over any distance via telephone lines and radio waves. A system of LANs connected in this way is called a wide area network (WAN).
MAC Short for Media Access Control address, a hardware address that uniquely identifies each device of a network. The address is not programmable by the user and the manufacturer of the device must register with IEEE before receiving an assigned group of addresses.
Mime Multipurpose Internet Mail Extensions, a specification for formatting non-ASCII messages so that they can be sent over the internet.
Network Two or more computer systems connected together.
Packet A piece of a message transmitted over a packet-switching network. One of the key features of a packet is that it contains the destination address in addition to the data.
Subnet A portion of a network that shares a common address component. On TCP/IP networks, subnets are defined as all devices whose IP addresses have the same prefix. Dividing a network into subnets is useful for both security and performance reasons.
Subnet Mask A mask used to determine to what subnet an IP address belongs.
TCP Abbreviation of Transport Control Protocol, and pronounced as separate letters. TCP is one of the main protocols in TCP/IP networks. Whereas the IP protocol deals only with packets, TCP enables two devices to establish a connection and exchange data. TCP guarantees delivery of data and also guarantees that packets will be delivered in the same order in which they were sent.
TFTP Trivial File Transfer Protocol. A version of the FTP protocol that has no directory or password capability. Most commonly used protocol to upgrade firmware of network devices.
30
firealarmresources.com

UDP User Datagram Protocol. A TCP/IP protocol which allows for connectionless communications between two network hosts. Retries are not handled and packet delivery is not guaranteed. Packets may also arrive out of sequence. WAN A computer network that spans a relatively large geographical area. Typically, a WAN consists of two or more local area networks (LANs). Computers connected to a wide area network are often connected through public networks, such as the telephone system. They can also be connected through leased lines or satellites.
31
firealarmresources.com

Appendix A: T-Link Events
T-Link events sent to the central station.

Description
Panel Absent Panel Restored FTC1 Alarm FTC1 Restoral FTC2 Alarm FTC2 Restoral PC5108 Tamper Alarm PC5108 Tamper Restoral PC5108 Absent PC5108 Restored Keyswitch Arm Keyswitch Disarm Remote Programming Start Remote Programming End Local Programming Start Local Programming End Internal Comm. Error

SIA Event Code
ET0001 ER0001 YC0001 YK0001 YC0002 YK0002 ES0000 EJ0000 ET0002 ER0002 CS0000 OS0000 RB0000 RS0000 LB0000 LS0000 YC0000

32
firealarmresources.com

Appendix B: T-Link TL250 Compatibility Chart

Compatible Control Panels

MAXSYS PC4020 Power864 PC5020
DVACS Panels

· Software V3.31 or higher · Hardware Rev 04B
· Software V3.2 or higher · Hardware Rev 03
· DV1660 LCD V5.03 · DV1660 LED V3.01 · DV4420 V1.11 · DVCOM · DV4T · PC5400DV · PC4400DV · PC4401DV

IP Communicator

T-Link TL250

· 10/100 BaseT · TCP/IP communication module · Static or DHCP IP configurable · Additional zone inputs using PC5108 · Program locally using PowerSeries keypad.

IP Communication Routing / Receiver

SG-DRL3-IP V1.10 *

· Supports 1024 accounts, maximum 512 accounts can be supervised
· Static IP required for DRL3-IP

Downloading Software

DLS2002
Maxsys PC4020 V3.3 (with TCP/IP support) Driver Pack
Power864 PC5020 V3.2 DLS-3 Driver

· Required · CD from distributor or free download from dsc.com
with a valid password
· Required · Free download from dsc.com with a valid password
· Required · Free download from dsc.com with a valid password

System Administration Software

DLS-3 SA V1.3
DLS-3 SA V1.3 Service Pack 1 for Maxsys V3.31 support
DLS-3 SA V1.3 Service Pack 2 for Power864 v3.2 support

· Required · Kit with modem or PC4401 from distributor
· Required · Included in the kit or free download from
dscsec.com/dls3drivers.htm
· Required · Included in the kit or free download from
dscsec.com/dls3drivers.htm

Configuration Software

T-Link Console V1.10

· Required · Free download from dsc.com with a valid password

NOTE: The DLS software can only be used with UL Listed installations when service personnel are on-site.

33
firealarmresources.com

Appendix C: Network Protection
Installation Instructions
Important
The following requirements for installation of CAT5 ethernet cable must be observed for correct operation of connected equipment.
Do NOT strip off cable sheathing more than required for proper termination. Do NOT kink or knot cable. Do NOT crush cable with cable ties. Do NOT splice cable. Do NOT bend cable at right angles or make any other sharp bends.
Note: All cable bends must have a minimum 2″ (50mm.) radius.
Do NOT untwist CAT5 pairs more than ½” (12mm.) Do NOT exceed maximum 6″ (150mm.) from center of ferrite to T-Link Network Connector
INSTALLATION of CAT-5 Ethernet Cable

CAT5 Ethernet Cable

To Network
Ferrite DSC PN 10000089

Note:

To T-Link Network Connector

Install the ferrite inside the control
panel as close to the T-Link network connector as allowable.
6″ (150 mm.) max from center of ferrite to the network connector).

34
firealarmresources.com

Limited Warranty
Digital Security Controls warrants the original purchaser that for a period of twelve months from the date of purchase, the product shall be free of defects in materials and workmanship under normal use. During the warranty period, Digital Security Controls shall, at its option, repair or replace any defective product upon return of the product to its factory, at no charge for labour and materials. Any replacement and/or repaired parts are warranted for the remainder of the original warranty or ninety (90) days, whichever is longer. The original purchaser must promptly notify Digital Security Controls in writing that there is defect in material or workmanship, such written notice to be received in all events prior to expiration of the warranty period. There is absolutely no warranty on software and all software products are sold as a user license under the terms of the software license agreement included with the product. The Customer assumes all responsibility for the proper selection, installation, operation and maintenance of any products purchased from DSC. Custom products are only warranted to the extent that they do not function upon delivery. In such cases, DSC can replace or credit at its option.
International Warranty
The warranty for international customers is the same as for any customer within Canada and the United States, with the exception that Digital Security Controls shall not be responsible for any customs fees, taxes, or VAT that may be due.
Warranty Procedure
To obtain service under this warranty, please return the item(s) in question to the point of purchase. All authorized distributors and dealers have a warranty program. Anyone returning goods to Digital Security Controls must first obtain an authorization number. Digital Security Controls will not accept any shipment whatsoever for which prior authorization has not been obtained.
Conditions to Void Warranty
This warranty applies only to defects in parts and workmanship relating to normal use. It does not cover:
· damage incurred in shipping or handling;
· damage caused by disaster such as fire, flood, wind, earthquake or lightning;
· damage due to causes beyond the control of Digital Security Controls such as excessive voltage, mechanical shock or water damage;
· damage caused by unauthorized attachment, alterations, modifications or foreign objects;
· damage caused by peripherals (unless such peripherals were supplied by Digital Security Controls);
· defects caused by failure to provide a suitable installation environment for the products;
· damage caused by use of the products for purposes other than those for which it was designed;
· damage from improper maintenance;
· damage arising out of any other abuse, mishandling or improper application of the products.
Items Not Covered by Warranty
In addition to the items which void the Warranty, the following items shall not be covered by Warranty: (i) freight cost to the repair centre; (ii) products which are not identified with DSC’s product label and lot number or serial number; (iii) products disassembled or repaired in such a manner as to adversely affect performance or prevent adequate inspection or testing to

verify any warranty claim. Access cards or tags returned for replacement under warranty will be credited or replaced at DSC’s option. Products not covered by this warranty, or otherwise out of warranty due to age, misuse, or damage shall be evaluated, and a repair estimate shall be provided. No repair work will be performed until a valid purchase order is received from the Customer and a Return Merchandise Authorisation number (RMA) is issued by DSC’s Customer Service.
Digital Security Controls’ liability for failure to repair the product under this warranty after a reasonable number of attempts will be limited to a replacement of the product, as the exclusive remedy for breach of warranty. Under no circumstances shall Digital Security Controls be liable for any special, incidental, or consequential damages based upon breach of warranty, breach of contract, negligence, strict liability, or any other legal theory. Such damages include, but are not limited to, loss of profits, loss of the product or any associated equipment, cost of capital, cost of substitute or replacement equipment, facilities or services, down time, purchaser’s time, the claims of third parties, including customers, and injury to property. The laws of some jurisdictions limit or do not allow the disclaimer of consequential damages. If the laws of such a jurisdiction apply to any claim by or against DSC, the limitations and disclaimers contained here shall be to the greatest extent permitted by law. Some states do not allow the exclusion or limitation of incidental or consequential damages, so that the above may not apply to you.
Disclaimer of Warranties
This warranty contains the entire warranty and shall be in lieu of any and all other warranties, whether expressed or implied (including all implied warranties of merchantability or fitness for a particular purpose) and of all other obligations or liabilities on the part of Digital Security Controls Digital Security Controls neither assumes responsibility for nor authorizes any other person purporting to act on its behalf to modify or to change this warranty, nor to assume for it any other warranty or liability concerning this product.
This disclaimer of warranties and limited warranty are governed by the laws of the province of Ontario, Canada.
WARNING: Digital Security Controls recommends that the entire system be completely tested on a regular basis. However, despite frequent testing, and due to, but not limited to, criminal tampering or electrical disruption, it is possible for this product to fail to perform as expected.
Out of Warranty Repairs
Digital Security Controls will at its option repair or replace out-of-warranty products which are returned to its factory according to the following conditions. Anyone returning goods to Digital Security Controls must first obtain an authorization number. Digital Security Controls will not accept any shipment whatsoever for which prior authorization has not been obtained.
Products which Digital Security Controls determines to be repairable will be repaired and returned. A set fee which Digital Security Controls has predetermined and which may be revised from time to time, will be charged for each unit repaired.

firealarmresources.com

FCC Compliance Statement
CAUTION: Changes or modifications not expressly approved by the manufacturer could void your authority to use this equipment.
This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation.
If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on,

the user is encouraged to try to correct the interference by one or more of the following measures:
– Re-orient the receiving antenna.
– Increase the separation between the equipment and receiver.
– Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
– Consult the dealer or an experienced radio/television technician for help.
The user may find the following booklet prepared by the FCC useful: “How to Identify and Resolve Radio/Television Interference Problems”. This booklet is available from the U.S. Government Printing Office, Washington D.C. 20402, Stock # 004-000-00345-4.

©2004 Digital Security Controls Toronto, Canada · www.dsc.com Tech Support: 1-800-387-3630 (Canada & US) or 905-760-3036 Printed in Canada

2 9 0 3 4 6 3 1 R0 0 4

firealarmresources.com

References

Read User Manual Online (PDF format)

Read User Manual Online (PDF format)  >>

Download This Manual (PDF format)

Download this manual  >>

Related Manuals