Check out our special report on casino security
ComNet FDX50M2 RS232/422 point-to-point data transceiver
Technical Specification
- Make: ComNet
- Model code: FDX50M2
- Data Transceiver: Yes
- Dimensions mm: 155 x 135 x 28
- Weight g: 900
The ComNet™ FDX50M2 and FDX51M2 data transceivers are interchangeable by application and provide point-to-point transmission of simplex or duplex EIA RS232/RS422 data signals over two multimode optical fibers. The transceivers are transparent to data encoding allowing for broadrange compatibility. Plug-and-play design ensures ease of installation requiring no electrical or optical adjustments.
Read more| Make | ComNet |
|---|---|
| Manufacturer | ComNet Europe Ltd. |
| Category | CCTV>Fibre optics, telemetry receivers, transmitters, transceivers |
| Model code | FDX50M2 |
| Data Transceiver | Yes |
| Physical Specifications |
Dimensions mm: 155 x 135 x 28 Weight g: 900 |
| Environmental Specifications |
Operating Temperature oC: -40 ~ +75 C (-40 ~ +167 F) Operating Humidity %: 0 ~ 95 |
| Electrical Specifications |
Voltage: 8 ~ 15 V DC Power Consumption: 70 mA |
| Additional info | The ComNet™ FDX50M2 and FDX51M2 data transceivers are interchangeable by application and provide point-to-point transmission of simplex or duplex EIA RS232/RS422 data signals over two multimode optical fibers. The transceivers are transparent to data encoding allowing for broadrange compatibility. Plug-and-play design ensures ease of installation requiring no electrical or optical adjustments. |
Related Whitepapers
ComNet - Designing in flexibility and controlling costs in your Ethernet network
A new alternative to video transmission over Ethernet for industrial security applications
EoVDSL: A cost-effective solution for transmitting Ethernet data over existing copper wiring for ITS and traffic applications
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download

