TRICONEX EICM 4119A Invensys tricon Enhanced Intelligent Communication Module
USD $86 - $103 /Piece
Min.Order:1 Piece
XiongBa DianZ i automat ion equi pment Co. L td.
TRICONEX MP2101 Invensys tricon main processor backplane MP/10P
TRICONEX PI3351 AI2354A Invensys tricon MTL4850 Analog Input Module
TRICONEX PI3381 Invensys TRICON 3381 Pulse Volume Input Module in Stock
Triconex PM6301A Stock Tricon PM 6301A Invensys Power Module
TRICONEX TCM 4355X Communication Module 4610X Invensys 3901X tricon
TRICONEX EICM 4119A Invensys tricon Enhanced Intelligent Communication Module
TRICONEX EICM 4119A Invensys tricon Enhanced Intelligent Communication Module
XiongBa DianZi automation equi pment Co., Ltd.
Contact:Lily
QQ:3005319639
Tel/Weixin:+86-15359254348
whatsapp:+86 15359254348
Landline:05922350124
QQ email: 3005319639@qq.com/
Netease email: XMXB0395@163.com
We specialise in supplying the world's leading brands; Allen Bradley, ABB, General Electric, Triconex, ICS, Honeywell, Bently Nevada, Schneider, Hima and many more. Even spare parts for some discontinued products etc.
EcoStruxure Triconex Security Systems
Trident high availability and high integrity systems meet the stringent demands of security and critical control applications in high-risk industries.
Features
Suitable for harsh environments
The Trident system operates in extreme ambient temperature conditions, from as low as -20 °C to as high as +70 °C. It is also protected against corrosive environments and is conformally coated to the harsh G3 level of ISA S71.04.
Open Connectivity
Trident solutions support industry protocols: Modbus TCP/IP primary and secondary, RS485 Modbus primary and secondary, OPC UA (Unified Architecture), and TSAA protocols for tight integration with the EcoStruxure Foxboro DCS.
Safe and Secure
Trident supports a "defense-in-depth" approach to ensure that systems are protected from the threat of cyber attacks.
Trident is approved for Achilles Level 1 as a standard, and the Triconex Tofino firewall can be used to provide additional protection if required. The system can be configured to deny all unauthorized "write" commands from external systems.