CEM DCM150 door control module
Technical Specification
- Make: CEM
- Model code: DCM150
- Controller Type: Networkable
- Max No. of Doors per Controller: 2
- Networkable: Yes
Acting as a wiring concentrator for up to two doors it allows local door furniture and read heads to be wired to a single point near the door and remotely connected, via CAT5 or Belden 8723 cable, to a CEM intelligent controller such as webEntryTM or a S9000 type controller for use on AC2000 SE. Up to sixteen units can be multi-dropped from a single RS485 Communications line up to a distance of 1,200 Metres from the host controller.
Read moreMake | CEM |
---|---|
Manufacturer | CEM Systems Ltd |
Category | Access Control>Access control controllers |
Model code | DCM150 |
Controller Type | Networkable |
Max No. of Doors per Controller | 2 |
Networkable | Yes |
Communication Type | RS485 |
Universal / Wiegand Reader Interface | Yes |
Electrical Specifications |
Voltage: 11 ~ 15 V DC Power Consumption: 300 mA |
Physical Specifications |
Dimensions mm: 180 x 120 x 20 Weight g: 100 |
Environmental Specifications |
Operating Temp oC: -20 ~ +70 Operating Humidity %: 0 ~ 95 |
Additional info |
Acting as a wiring concentrator for up to two doors it allows local door furniture and read heads to be wired to a single point near the door and remotely connected, via CAT5 or Belden 8723 cable, to a CEM intelligent controller such as webEntryTM or a S9000 type controller for use on AC2000 SE. Up to sixteen units can be multi-dropped from a single RS485 Communications line up to a distance of 1,200 Metres from the host controller. |
Download PDF version Download PDF version |
You might be interested in these products
Related Whitepapers
Cybersecurity in keyless access management
Three essential reasons to upgrade your access control technology in 2022
Securing unmanned infrastructure at the network edge
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadSelecting the right network video recorder (NVR) for any vertical market
DownloadPhysical access control
DownloadCybersecurity for enterprise: The essential guide to protecting your business
Download