DSX DSX-1044 Access control controller
Technical Specification
- Make: DSX
- Model code: DSX-1044
- Controller Type: Standalone
- Networkable: Yes
- Communication Type: RS-232
The DSX-1044 is an independent processing, 32 input, intelligent controller designed to be a building block in the DSX hardware platform that allows expansion in a scalable manner. The DSX-1044 may be used in conjunction will all other DSX controllers as a Master or Slave in the controller network. Up to 128 inputs can be controlled from 1 enclosure for an efficient space saving package. Each DSX-1044 can independently retain all data necessary for system operation in its own RAM. It can perform Time Zone control with holiday overrides for outputs.
Read moreMake | DSX |
---|---|
Manufacturer | DSX - Europe Ltd. |
Category | Access Control>Access control controllers |
Model code | DSX-1044 |
Controller Type | Standalone |
Networkable | Yes |
Communication Type | RS-232 |
Onboard No/Type of Inputs / Outputs | 32 inputs, 4 outputs |
Electrical Specifications |
Voltage: 13.5 V DC Power Consumption: 550 mA |
Physical Specifications |
Dimensions mm: 279 x 114 x 38 Weight g: 544 |
Environmental Specifications |
Operating Temp oC: 0 ~ 55 Operating Humidity %: 0 ~ 95 |
Additional info | The DSX-1044 is an independent processing, 32 input, intelligent controller designed to be a building block in the DSX hardware platform that allows expansion in a scalable manner. The DSX-1044 may be used in conjunction will all other DSX controllers as a Master or Slave in the controller network. Up to 128 inputs can be controlled from 1 enclosure for an efficient space saving package. Each DSX-1044 can independently retain all data necessary for system operation in its own RAM. It can perform Time Zone control with holiday overrides for outputs. |
Download PDF version Download PDF version |
You might be interested in these products
Related Whitepapers
Cybersecurity in keyless access management
Three essential reasons to upgrade your access control technology in 2022
Securing unmanned infrastructure at the network edge
A modern guide to data loss prevention
DownloadThe truth behind 9 mobile access myths
Download7 proven solutions for law enforcement key control and asset management
DownloadAccess control system planning phase 2
DownloadSecurity practices for hotels
Download