TAC i2850/2851/2853 Access control controller
Technical Specification
- Make: TAC
- Model code: i2850/2851/2853
- Series: Infinet II Series
- Controller Type: Standalone
- Networkable: Yes
The Infinet II (i2) 850, 851, and 853 controllers provide cost-effective DDC control of individual terminal units: VAV boxes, fan-powered induction units, unit ventilators, heat pumps, etc. The i2850 series is a perfect fit for your VAV applications where external damper actuators are used. And because all i2850s feature a built-in expansion port for additional I/O, these controllers are perfect for your more demanding control applications.
Read more| Make | TAC |
|---|---|
| Manufacturer | TAC Satchwell |
| Category | Access Control>Access control controllers |
| Model code | i2850/2851/2853 |
| Controller Type | Standalone |
| Networkable | Yes |
| Communication Type | RS-485 |
| Onboard No/Type of Inputs / Outputs | 4 inputs, 3 outputs |
| Universal / Wiegand Reader Interface | Yes |
| Electrical Specifications |
Voltage: 24 VAC Power Consumption: 20 VA |
| Physical Specifications |
Dimensions mm: 139 x 207 x 62 Weight g: 500 |
| Environmental Specifications |
Operating Temp oC: 0 ~ 49 Operating Humidity %: 10 ~ 95 |
| Additional info |
The Infinet II (i2) 850, 851, and 853 controllers provide cost-effective DDC control of individual terminal units: VAV boxes, fan-powered induction units, unit ventilators, heat pumps, etc. The i2850 series is a perfect fit for your VAV applications where external damper actuators are used. And because all i2850s feature a built-in expansion port for additional I/O, these controllers are perfect for your more demanding control applications. |
You might be interested in these products
Related Whitepapers
Cybersecurity in keyless access management
Three essential reasons to upgrade your access control technology in 2022
Securing unmanned infrastructure at the network edge
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download
