AVT Titan Micro CCTV transmission system
Technical Specification
- Make: AVT
- Model code: Titan Micro
- Series: Titan Micro Series
- Transmission type: High-End transmission
- Video Inputs: 4 channels
Can be operated via its integrated line interfaces and remote camera control and input selection possible. TITAN Micro 2M can be connected to 2-Mbit/s leased lines, to the 2-Mbit/s ports of STM 1 Add & Drop Multiplexers, micro-wave radio links, ATM switches (E1 Ports), etc. and the TITAN Micro 2M-40dB, to coaxial cable and symmetrical (twisted pair) copper lines. The X.21 version of the TITAN Micro can be connected to X.21 leased lines, e.g. to X.21 interfaces on PCM30 systems and microwave radio links.
Read more| Make | AVT |
|---|---|
| Manufacturer | AVT Audio Video Technologies |
| Category | CCTV>Analogue Transmission |
| Model code | Titan Micro |
| Transmission type | High-End transmission |
| Video Inputs | 4 channels |
| Alarm Inputs | 4 ~10 alarms |
| TX/RX | TX/RX |
| Telemetry Control | Yes |
| Video Outputs | 2 |
| Network Properties |
Bit rate Bps: Up to 1024 kbit/s Interface: E1(sym,unsym),T1 or X21 or V35 |
| Digital | Yes |
| Additional info | Can be operated via its integrated line interfaces and remote camera control and input selection possible. TITAN Micro 2M can be connected to 2-Mbit/s leased lines, to the 2-Mbit/s ports of STM 1 Add & Drop Multiplexers, micro-wave radio links, ATM switches (E1 Ports), etc. and the TITAN Micro 2M-40dB, to coaxial cable and symmetrical (twisted pair) copper lines. The X.21 version of the TITAN Micro can be connected to X.21 leased lines, e.g. to X.21 interfaces on PCM30 systems and microwave radio links. |
Compare AVT Titan Micro with Analogue Transmission from other manufacturers
Related Whitepapers
Security investments retailers should consider for their 2021 budget
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download