TAC b3865/3866 Access control controller
Technical Specification
- Make: TAC
- Model code: b3865/3866
- Series: Continuum Series
- Controller Type: Networkable
- Networkable: Yes
The Continuum b3865 and b3866 are native BACnet Advanced Application Controllers (B-AAC) that communicate on an RS-485 field bus as Master devices using the MS/TP BACnet protocol. The b3865 and b3866 are unique, low-cost VAV box controllers that come equipped with a built-in actuator to streamline hardware installation and save commissioning time. Four universal inputs; an airflow sensor; three Form A triac-based outputs; and an integrated damper actuator, make these controllers perfect for VAV applications requiring reheat control.
Read more| Make | TAC |
|---|---|
| Manufacturer | TAC Satchwell |
| Category | Access Control>Access control controllers |
| Model code | b3865/3866 |
| Controller Type | Networkable |
| Networkable | Yes |
| Communication Type | RS-485 |
| Onboard No/Type of Inputs / Outputs | 4 inputs, 3 outputs |
| Universal / Wiegand Reader Interface | Yes |
| Electrical Specifications |
Voltage: 24 V AC Power Consumption: 30 VA |
| Physical Specifications |
Dimensions mm: 142 x 227 x 62 Weight g: 850 |
| Environmental Specifications |
Operating Temp oC: 0 ~ 49 Operating Humidity %: 10 ~ 95 |
| Additional info |
The Continuum b3865 and b3866 are native BACnet Advanced Application Controllers (B-AAC) that communicate on an RS-485 field bus as Master devices using the MS/TP BACnet protocol. The b3865 and b3866 are unique, low-cost VAV box controllers that come equipped with a built-in actuator to streamline hardware installation and save commissioning time. Four universal inputs; an airflow sensor; three Form A triac-based outputs; and an integrated damper actuator, make these controllers perfect for VAV applications requiring reheat control. |
You might be interested in these products
Related Whitepapers
Cybersecurity in keyless access management
Three essential reasons to upgrade your access control technology in 2022
Securing unmanned infrastructure at the network edge
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download
