Tecom TS0820 Intruder alarm system control panel
Technical Specification
- Make: Tecom
- Model code: TS0820
- Accessories: Data Gathering Panel
- Operating Temp oC: 0 ~ +70
A Data Gathering Panel (DGP) allows inputs and relays to be connected at a location remote from the Challenger Panel. DGP are used to expand the number of inputs and outputs in a system and to send data to the Challenger Panel for processing. Standard with a DGP is 8 inputs, 8 open collectors and a siren driver, however this is expandable to a total of 32 inputs and 16 relays/outputs. Should a failure in communications occur, the DGP remembers the last alarm in a system, helping to identify possible reasons for faults. Up to 15 DGP can be connected directly to the Challenger Panel at a max distance of 1.5 km.
Read more| Make | Tecom |
|---|---|
| Manufacturer | Interlogix |
| Category | Intruder Alarms>Intruder alarm system control panels & accessories |
| Model code | TS0820 |
| Accessories | Data Gathering Panel |
| Environmental Specifications | Operating Temp oC: 0 ~ +70 |
| Additional info | A Data Gathering Panel (DGP) allows inputs and relays to be connected at a location remote from the Challenger Panel. DGP are used to expand the number of inputs and outputs in a system and to send data to the Challenger Panel for processing. Standard with a DGP is 8 inputs, 8 open collectors and a siren driver, however this is expandable to a total of 32 inputs and 16 relays/outputs. Should a failure in communications occur, the DGP remembers the last alarm in a system, helping to identify possible reasons for faults. Up to 15 DGP can be connected directly to the Challenger Panel at a max distance of 1.5 km. |
More Tecom Intruder alarm system control panels & accessories
Related Whitepapers
Security investments retailers should consider for their 2021 budget
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download