Europlex 3959V5 Intruder alarm system control panel
Technical Specification
- Make: Europlex
- Model code: 3959V5
- Series: 3GS Series
- Control Panels & Accessories: Yes
- Tamper: Yes
The 3GS control panel works with the 3GS Keypad Node (model 3850). The model includes a 3 or 4 or 8 Amp power supply unit and incorporates 3 Serial ports (one RS232 and 2 TTL), and an extended 4 Mb memory. Comes with embedded software. The 3GS system can be built up to 200 zone inputs and 255 individually addressable outputs by the onboard I/O which can be increased with I/O Nodes. A maximum of 99 nodes can be added to the controller. 3GS can include Intruder Alarm, Radio P.A. and Paging, and Access Control in one network.
Read more| Make | Europlex |
|---|---|
| Manufacturer | Europlex Technologies Limited |
| Category | Intruder Alarms>Intruder alarm system control panels & accessories |
| Model code | 3959V5 |
| Control Panels & Accessories | Yes |
| Tamper | Yes |
| No Event Logs | 1000 event logs |
| No of Zones | 8 |
| No of Outputs | 4 |
| Keypad Operated | Yes |
| Physical Specifications | Dimensions mm: 465 x 450 x 130 |
| Environmental Specifications | Operating Temp oC: -10~+40 |
| Additional info | The 3GS control panel works with the 3GS Keypad Node (model 3850). The model includes a 3 or 4 or 8 Amp power supply unit and incorporates 3 Serial ports (one RS232 and 2 TTL), and an extended 4 Mb memory. Comes with embedded software. The 3GS system can be built up to 200 zone inputs and 255 individually addressable outputs by the onboard I/O which can be increased with I/O Nodes. A maximum of 99 nodes can be added to the controller. 3GS can include Intruder Alarm, Radio P.A. and Paging, and Access Control in one network. |
Related Whitepapers
Security investments retailers should consider for their 2021 budget
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download