DSX DSX-1044 Access control controller
Technical Specification
- Make: DSX
- Model code: DSX-1044
- Controller Type: Standalone
- Networkable: Yes
- Communication Type: RS-232
The DSX-1044 is an independent processing, 32 input, intelligent controller designed to be a building block in the DSX hardware platform that allows expansion in a scalable manner. The DSX-1044 may be used in conjunction will all other DSX controllers as a Master or Slave in the controller network. Up to 128 inputs can be controlled from 1 enclosure for an efficient space saving package. Each DSX-1044 can independently retain all data necessary for system operation in its own RAM. It can perform Time Zone control with holiday overrides for outputs.
Read more| Make | DSX |
|---|---|
| Manufacturer | DSX - Europe Ltd. |
| Category | Access Control>Access control controllers |
| Model code | DSX-1044 |
| Controller Type | Standalone |
| Networkable | Yes |
| Communication Type | RS-232 |
| Onboard No/Type of Inputs / Outputs | 32 inputs, 4 outputs |
| Electrical Specifications |
Voltage: 13.5 V DC Power Consumption: 550 mA |
| Physical Specifications |
Dimensions mm: 279 x 114 x 38 Weight g: 544 |
| Environmental Specifications |
Operating Temp oC: 0 ~ 55 Operating Humidity %: 0 ~ 95 |
| Additional info | The DSX-1044 is an independent processing, 32 input, intelligent controller designed to be a building block in the DSX hardware platform that allows expansion in a scalable manner. The DSX-1044 may be used in conjunction will all other DSX controllers as a Master or Slave in the controller network. Up to 128 inputs can be controlled from 1 enclosure for an efficient space saving package. Each DSX-1044 can independently retain all data necessary for system operation in its own RAM. It can perform Time Zone control with holiday overrides for outputs. |
You might be interested in these products
Related Whitepapers
Cybersecurity in keyless access management
Three essential reasons to upgrade your access control technology in 2022
Securing unmanned infrastructure at the network edge
Aligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
DownloadSecurity and surveillance technologies for the casino market
Download

