Wireless rf Ethernet Transceiver TDD-COFDM Full Duplex

Ref Price:
Loading Port:
Guangzhou
Payment Terms:
TT OR LC
Min Order Qty:
1 set
Supply Capability:
500 set/month

OKorder Service Pledge

Quality Product

Order On-line Tracking

Timely Delivery

OKorder Service Pledge

Credit Rating

Credit Services

Credit Purchasing

Share to:

Item specifice:

Brand Name: Safe Guard Model Number: SG-TDD20 Modulation: TDD_COFDM, time division duplex mode
RF power: 20W RF bandwidth: 4/8MHz Baud rate: 7200 ~ 921600bps (adjustable)
Correction mechanism: 32bit of CRC, ARQ Encryption: 128bit AES (Optional 256bit AES) Dimension: 210 * 133 * 54mm
Weight: 2.5kg Customization: All features can be changed as your prefer!

Product Description:


Model: SG-TDD20

TDD-COFDM is our new NLOS(non-line of sight) two-way data transmission system and wireless mobile emergency communication private network, which is independent of telecom operators wireless network. Its confidentiality, security, mobile performance that is better than Telecom operators. Also is a fully transparent data encryption transmission emergency security network.


Wireless rf Ethernet Transceiver TDD-COFDM Full Duplex



TDD-COFDM multiplexing technology to channel resources in time through time slot, frequency through a large number of sub carriers to flexibly allocated to multiple users, and in a single frequency to maximize the realization of multi user access. Channel into the AES128bit, and user manually customize key that strength to ensure the data encryption. System occupy relatively narrow-band air frequency(4/8MHz)and strong anti-multipath interference ability to overcome simulation technique and the high-speed mobile data transmission under multipath reflections and nuisance caused by occlusion, then achieved in a complex environment transfer: data packing form, audio and video data, serial asynchronous data, Miniature volume, precision design, lightweight and easy to carry that commonly used in short distance high speed wireless data transmission and on air long distance high speed wireless data transmission purposes.


Wireless rf Ethernet Transceiver TDD-COFDM Full Duplex






Main Features


+ Support protocol PTP &PMD network technology;
+ Support non-line of sight(NLOS) high speed mobile transmission
+ Bit rate can up to 921600bps;
+ AES 128-bit encryption, and also customer manually customize the secret key.
+ Standard RJ45 Ethernet and RS485/RS485/RS422 data interfaces;
+ Built in with small LCD screen that shows the signal working status. 
+ Available frequency: 330-430MHz/ 430-530MHz, or 2.4GHz (option). 





Product Parameters


Physical interface section

Ethernet

Standard RJ-45

RS-232/422/485 data

Two or Three pin terminals

Power supply

DC12V, Four pin terminals

RF connector

SMA female

Main parameters:

Modulation

TDD_COFDM, time division duplex mode

Working mode

Full duplex

Working frequency

330-430MHz/ 430-530MHz,or 2.4GHz (option). step in 1MHz  

other frequencies can be customized

RF power

20W

RF bandwidth

4/8MHz

Correction mechanism

32bit of CRC, ARQ

Transfer Protocol

standard TCP / IP, transparent transmission,serial asynchronous

Data Rate

6.5Mbps ( both video and data occupy the same channel)

Baud rate

7200 ~ 921600bps  (automatically assigned)

Data type

10 / 100Bate-T Ethernet, RS-232, RS-422, RS-485 standard

Audio channel

analog audio intercom interface (non-Open)

BER

≤10-6

Receiving sensitivity

-103dBm

Networking format

point-to-multipoint

Encryption

128bit AES (Optional 256bit AES)

Ethernet

10 / 100BaseT, Auto-MDI / X, IEEE802.3

TCP, UDP, TCP / IP, TFTP, ARP, ICMP, DHCP, HTTP, SNMP, FTP, DNS

Parameter Control

adjustable parameters through the LCD panel

Built-in battery

12000mA or remove

Working time

6 hours

Working temperature

-40 ℃ ~ 85 ℃

Dimension

210 * 133 * 54mm

Weight

2.5kg




About our specification:

1. Advancement: TDD-COFDM channel modulation technology, support fast-moving, ultra-wide band, and fully transparent transmission.
2. Security: private network, private communication transport protocol, sole synchronization code and AES encryption.
3. Flexibility: transparent transmission of IP data channel, supports multi-user access.
4. Scalability: all-digital network, is compatible with all IP data transmission equipment.
5. Technical performance:
- Multi-frequency network base stations, single base station same frequency network, the same frequency network with bidirectional communication, high spectrum efficiency;

- Flexible allocation of channel resources to achieve PTP, PTMT and multipoint-to-multipoint two-way communication;

- Multiple channel bandwidth and a variety of modulation mode function;

- Flexible TDD slot allocation model to meet a single-frequency but multi-user access, not only save the spectrum but also to reduce power consumption;

- Spectrum sensing, perception slot, upstream bandwidth sensing function;

- Strong diffraction ability and anti-multipath capability

- High-sensitivity receiver. When receive level is -110dBm, can still ensure BER<10E-5 and frame error rate <1%. Powerful error correction capability;

- Low PAPR, high power amplifier efficiency, low power consumption;

- Can transmit video audio and etc signals synchronous,high speed.Velocity >600km/h.

- Digital signal processing, a strong system of confidentiality, stability and reliability.





Product Application


As its Miniature volume, precision design, lightweight and easy to carry, suitable used in short distance and long range air high speed wireless video data transmission purposes. Such as UAV, rotorcraft, micro UAV, drone,UGV, unmanned powered parachute, unmanned underwater vehicles boats, Fire-fighting robot,unmanned ship, airship, USV, high iron, EMU, unmanned vehicles, unmanned vehicle and etc..data transmission.






Our Services

One year free warranty;
Three months for free spare parts (Replacement parts will be charged after a year);
24-h technical guidance;
One-stop ODM/OEM solution;
We provide professional system design and construction;
We have over 15 years experience's study, design and manufacturing in wireless microwave transmission area;
We are the professional plant source,so we can provide you high quality in best price.


Send a message to us:

Remaining: 4000 characters

- Self introduction

- Required specifications

- Inquire about price/MOQ

Q:How do security control engineers get it?
Certificates can be used as an important basis for professional technicians to employ, hold, grade and promote their positions. Certificate holders will be included in the national information engineer talent pool for enterprises and institutions website inquiries. Nationwide, online search.
Q:How much is the charge for security monitoring?
If the building construction units, security monitoring equipment is used for the construction of residential or commercial housing sales, security monitoring equipment costs should be included in the cost of the project. ,
Q:Intelligent security and smart home profit space which big?
I. presentation layerPerformance city is our most intuitive feel, it shows the quality of the entire security monitoring system. Such as surveillance TV wall, monitor, treble alarm horn, alarm, automatic answering telephone and so on, all belong to this layer.Two. Control layerThe control layer is the core of the whole security monitoring system, and it is the most clear embodiment of the system's scientific and technological level. Usually we have two control modes analog control and digital control. Analog control is an early control mode, and its console is usually composed of a controller or analog control matrix. It is suitable for small and local security monitoring system. This control method has low cost and low failure rate. But for large and medium-sized security monitoring systems, this approach appears to be complex and without any price advantage. At this time, we have a better choice of digital control. Digital control is the industrial computer as the control core of the monitoring system, it will complex analog control operation into a simple mouse click operation, the huge analog controller stack shrunk into a computer, control cable will be complex and huge number into a serial line. It can change remote monitoring into reality and provide possibility for Internet remote monitoring. But digital control is not so perfect, the price of the control host is very expensive, the waste of modules, the system may collapse, the crisis is still lagging behind and so on.
Q:Security monitoring, construction costs, how much is reasonable?
Usually in accordance with the 20% collection, according to the construction of the difficulty can be a certain coefficient.However, such a small project like you, if in full accordance with the proportion, not your loss is the loss of Party AIt's better to negotiate a reasonable cost
Q:What are the most profitable products in the security industry?
Security analysis1. security system to safeguard public security for the purpose of intrusion using security products and other related products of the alarm system, video monitoring system, entrance control system, explosion-proof safety inspection system; or by the system is the combination or integration of the electronic system or network.1., the security system is defined in the domestic standard as security & protection system (SPS), while abroad is more called prevention Crime (Loss prevention & a). Loss prevention is the task of security industry, and crime prevention is the responsibility of police law enforcement departments.
Q:What are the grades of security monitoring enterprises?
Security qualification is divided into grade one qualification, level two qualification, grade three qualification and undetermined grade, and some provinces have no undetermined rank. Among them, the undecided level is the lowest level, and the enterprise qualification evaluation is carried out in accordance with the principle of gradual promotion. So, the new company needs never to start grading or start applying at level three. Last time, Guangzhou Bo Hao to help us apply for an undetermined level, after the upgrade, we are assured to give us help to apply.
Q:Security monitoring sales method,Security monitoring sales, first of all, they will install,
The overall marketing methods of security products include supplier marketing, distributor marketing, final customer marketing, and staff marketing.
Q:What is the quality standard of security monitoring products?
Quality standard of security monitoring products:Relating to the technical standards and specifications (including the design standards and specifications, product standards and specifications, engineering standards and specifications, acceptance criteria and norms) must comply with the relevant laws and regulations of People's Republic of China, regulations, standards and technical specifications (but not limited to those listed):Code for design of cigarette factory (YC/T9-2006);Code for fire protection design of buildings (GB50016-2006);Standard for intelligent building design (GB/T50314-2006);Code for electrical design of civil buildings (JGJ16-2008);Code for engineering design of integrated wiring system (GB50311-2007).
Q:Security monitoring plan how to draw? Please expert advice!! Urgent!
I drew some simple pictures before. Make the floor plan first, then insert the camera icon, and have a walking map. In the lower right corner of the diagram, you should have a legend!
Q:What are the sales methods of security engineering?
The overall marketing methods of security products include supplier marketing, distributor marketing, final customer marketing, and staff marketing.

1. Manufacturer Overview

Location
Year Established
Annual Output Value
Main Markets
Company Certifications

2. Manufacturer Certificates

a) Certification Name  
Range  
Reference  
Validity Period  

3. Manufacturer Capability

a)Trade Capacity  
Nearest Port
Export Percentage
No.of Employees in Trade Department
Language Spoken:
b)Factory Information  
Factory Size:
No. of Production Lines
Contract Manufacturing
Product Price Range