||RF output Power:
||All features can be changed as your prefer!
||AES/ ALLTECH Basic scrambling
1) COFDM modulation, Stable transmission
2) MPEG-4 /H.264 video compression, DVD video quality
3) Support high speed moving transmission
4) Works well in case of NLOS harsh environment;
5) Great security by encryption of AES128 bits
6) Modular design, compact structure, OEM design
7) Support custom made for you or add additional functionality.
138-4400MHz (option), only 100MHz space for user
RF output Power
QPSK,16QAM,64QAM,QPSK/16QAM/64QAM @ 6/7/8MHz
stereo left and right channels
AES/ ALLTECH Basic scrambling
≤2dB(within full frequency range) ,
≤0.5dB (within 8MHz)
Aluminum alloy, rainproof
3km max NLOS (manpack)
100km max LOS (on helicopter)
This special designed system is for long range distance for any AV equipments, popularly used in live broadcast video audio transmission.
1) For armyman training
2) For any AV signal system
One year free warranty;
Three months for free spare parts (Replacement parts will be charged after a year);
24-h technical guidance;
One-stop ODM/OEM solution;
We provide professional system design and construction;
We have over 15 years experience's study, design and manufacturing in wireless microwave transmission area;
We are the professional plant source,so we can provide you high quality in best price.
- Q:How does the security monitoring system go through the line?
- Throughout the construction process, timely notification of the process, the person in charge of various types of work to communicate, to identify problems immediately notify Party A, in other follow-up work before the start of the timely completion of the task of this type of work.If the installation is unshielded twisted pair, the docking site is not high enough to be earthed at the main slot connected to the cabinet.The specification of the slot is to confirm that the cross section of the slot remains 40% of the surplus to be expanded, and the cross section area of the over 5 types of twisted pair is 0.3 square centimeters.When installing the slot, attention should be paid to the isolation of the strong wire slot. The wiring system shall avoid parallel lines of 3 meters parallel to the strong line without shielding and distance less than 20cm. If it can not be avoided, the line slot shall be shielded and isolated. The cable line into the furniture is made up of the nearest ceiling line along the partition wall to the ground, and from the ground boring trough and the buried pipe to the furniture partition.
- Q:How is the security monitoring cost charged?
- You buy first, stock goods, should pay taxes and fees. Delivery installation can be done first in the construction of accounts receivable, and related subjects, to reduce inventory of goods, accessories can be assisted in cost accounting, labor costs. In construction, employee compensation payable. After completion of the project, the construction works will be carried out to confirm the income and the cost.
- Q:What is the front end product of security?
- Front end: for example, you have a project to load the ball machine, one machine, and the like. This is the front end product. Back end: for example, you need to install the monitor, DVR ah, the class is the back-end
- Q:Security monitoring project is not to build the division of electromechanical professional practice
- Relatively speaking, in addition to building the largest number of candidates, the municipal public and mechanical and electrical professional demand is also large, but also anchored higher than the price of construction.
- Q:Intelligent security and smart home profit space which big?
- I. presentation layerPerformance city is our most intuitive feel, it shows the quality of the entire security monitoring system. Such as surveillance TV wall, monitor, treble alarm horn, alarm, automatic answering telephone and so on, all belong to this layer.Two. Control layerThe control layer is the core of the whole security monitoring system, and it is the most clear embodiment of the system's scientific and technological level. Usually we have two control modes analog control and digital control. Analog control is an early control mode, and its console is usually composed of a controller or analog control matrix. It is suitable for small and local security monitoring system. This control method has low cost and low failure rate. But for large and medium-sized security monitoring systems, this approach appears to be complex and without any price advantage. At this time, we have a better choice of digital control. Digital control is the industrial computer as the control core of the monitoring system, it will complex analog control operation into a simple mouse click operation, the huge analog controller stack shrunk into a computer, control cable will be complex and huge number into a serial line. It can change remote monitoring into reality and provide possibility for Internet remote monitoring. But digital control is not so perfect, the price of the control host is very expensive, the waste of modules, the system may collapse, the crisis is still lagging behind and so on.
- Q:What data does security monitoring and bidding require?
- 2, the tender must be issued as follows documents or copies of documents:(1) People's Republic of China industrial and commercial business license;(2) tax registration certificate;(3) legal person's power of attorney;
- Q:How to quote for security monitoring project
- Finally, there's the tax, you didn't add itIf you think the profit is low, each can be adjusted accordingly, of course, the most standardized is in accordance with the fixed rate reported, fixed quote, then other costs should be added at about 40-50% of equipment costs.
- Q:Security surveillance camera, the camera's 60 shell and 90 shell difference
- The 60 housing is 60mm in diameter and 90 in shell diameter 90mm. 60 shell --30 meters infrared small gun, 90 shell --50 meters infrared big guns, there are some differences.
- Q:What are the grades of security monitoring enterprises?
- So, the new company needs never to start grading or start applying at level three. Last time, Guangzhou Bo Hao to help us apply for an undetermined level, after the upgrade, we are assured to give us help to apply
- Q:Monitoring security in the scope of individual business, how to write?
- Undertake: building intelligent engineering, electrical and mechanical installation works, security engineering design, construction, system integration, commissioning, maintenance and management.
1. Manufacturer Overview
|Annual Output Value
2. Manufacturer Certificates
|a) Certification Name
3. Manufacturer Capability
|No.of Employees in Trade Department
|No. of Production Lines
|Product Price Range