||All features can be changed as your prefer!
||BNC / RCA
The device is our New Sole design COFDM transmitter and receiver SG-C10. Has a character of Walkie Talkie function, long range remote control and more intuitive as well natural. Use H.264 coding format and COFDM (coded orthogonal frequency division multiplexing) modulation, provide high quality of picture in revolution 720*576, short latency. Support NLOS and high speed mobile transmission. Support parameters adjusted by user. PAL/NTSC video format self- adaption and good anti-interference.
This special designed system is for long range distance for military use, it is also popular to use in other fields for live broadcast video audio transmission.
300-900 MHz, 1.2GHz/2.4GHz/4.4GHz (option)
AV Input (BNC)
Video: for analog camera connection
Audio: Analog stereo left and right channels
AES 128 bits
1 ports, RS485/RS232/TTL @1200/2400/9600/19200pbs
Full band≤2dB, 8MHz≤0.5dB
Aluminum alloy, Rain-proof
2*antennas (customized); RF cables and mounted kits.
1. For police car
2. For soldier training
One year free warranty;
Three months for free spare parts (Replacement parts will be charged after a year);
24-h technical guidance;
One-stop ODM/OEM solution;
We provide professional system design and construction;
We have over 15 years experience's study, design and manufacturing in wireless microwave transmission area;
We are the professional plant source,so we can provide you high quality in best price.
- Q:What are the functions of security decoder, the main function and principle?
- The device that controls these actions is called a cloud mirror controller, also called a decoder. Coupled with the control keyboard control device can control the servo device more, with the monitor consists of a simple monitoring system. With the development of. Decoder can be placed inside the pan (built-in decoder), and control equipment interface is generally RS-485, the commonly used communication protocols are: PELCO-D, PELCO-P, AD/AB, YAAN and so on.
- Q:How to promote security products?
- You can go to add security or weak group, and then recommend to integrators, so you will be a lot of pressure to promote. To push it to give integrators sufficient profit space. Otherwise they won't help you push it.
- Q:Every day, mainly engaged in monitoring and installation, there are other security products
- Do not have to become a wealthy businessman, the security will be more and more, the computer age, monitoring purposes will be more and more widely
- Q:Security monitoring sales method，Security monitoring sales, first of all, they will install,
- The overall marketing methods of security products include supplier marketing, distributor marketing, final customer marketing, and staff marketing.
- Q:Monitoring security equipment, how to find dealers online, agents?
- Two schemes:1, looking for sales, go to the city to find agents, because the big ones are in the city; and more concentrated, publicity, the speed must be fast!2, to security network, such as: Hot security network, HC network, etc., these are more security network platform, that can also expand your product awareness.Of course, the city agent is a bit difficult, once done, the pace of development is amazing. The town plan, can let the county people do to use your product, because the county people consider the use of new products to do the project, the profit space is relatively large, big brands in the low-end products prices are transparent, looking at is a mouth to live, no meat, are not too happy. You can take advantage of this opportunity to enter.
- Q:How is the security monitoring cost charged?
- You buy first, stock goods, should pay taxes and fees. Delivery installation can be done first in the construction of accounts receivable, and related subjects, to reduce inventory of goods, accessories can be assisted in cost accounting, labor costs. In construction, employee compensation payable. After completion of the project, the construction works will be carried out to confirm the income and the cost.
- Q:What's the difference between security and surveillance?
- Security refers to security and protection, including infrared alarm system and access control, monitoring and so on.
- Q:What qualifications do you need for security?
- Security engineering enterprise qualification is divided into three levels: level one, level two, level three. Level three is the lowest level. Enterprise qualification evaluation implementation progressive promotion principle.Security engineering business qualification certificate (hereinafter referred to as the qualification certificate) from the center of management qualification in anxie adopts the printing anti-counterfeiting technology unified design, issued by the certification agency in.The main contents of the certificate include security engineering, enterprise information and qualification information.
- Q:Do you have a safety monitoring system?
- Security monitoring system uses optical fiber, coaxial cable or microwave to transmit video signals in its closed loop, and from the camera to the image display and recording to form an independent and complete system. It can reflect the monitored object in real time, image and reality. It can replace the manual for long time monitoring in bad environment, and record it by video recorder. At the same time, the alarm system equipment for illegal invasion alarm.
- Q:I just started, is to do security monitoring project, I do not know how to start living running project,
- You can not start the business, first with the line related to do a few years, and so on to find a routine, there are contacts and experience, and it is not too late! Now you go blind, and there's no sense of direction
1. Manufacturer Overview
|Annual Output Value
2. Manufacturer Certificates
|a) Certification Name
3. Manufacturer Capability
|No.of Employees in Trade Department
|No. of Production Lines
|Product Price Range