Bosch LTC 8564 / 20 Telemetry receiver
Technical Specification
- Make: Bosch
- Model code: LTC 8564 / 20
- Telemetry Type: Coax-Twisted Pair
- Input Voltage: AC type
- Output voltage: 24 VAC
The LTC 8564 series receiver are control data decoder units and motor drivers for pan/tilt units and zoom lenses. These receivers are used in conjunction with Allegiant Series Switcher/Controller systems. The receiver decodes Allegiant biphase control data from the switcher system through the LTC 8568 series signal distribution unit into specific control codes. The receiver will accept RS-232 control code data generated by the LTC 8780 Data Converter Unit.
Read more| Make | Bosch |
|---|---|
| Manufacturer | Bosch Security Systems |
| Category | CCTV>Telemetry receivers |
| Model code | LTC 8564 / 20 |
| Telemetry Type | Coax-Twisted Pair |
| Electrical Specifications |
Input Voltage: AC type Output voltage: 24 VAC |
| Number of Functions | 5 functions |
| Number of Presets | 99 presets |
| Video Inputs | 1 |
| Environmental Specifications |
Protection: IP66 Operating Temperature oC: -40 ~ +60 |
| TX/RX | RX |
| Physical Specifications |
Dimensions mm: 295 x 241 x 165 Weight g: 6.8 kg |
| Additional info | The LTC 8564 series receiver are control data decoder units and motor drivers for pan/tilt units and zoom lenses. These receivers are used in conjunction with Allegiant Series Switcher/Controller systems. The receiver decodes Allegiant biphase control data from the switcher system through the LTC 8568 series signal distribution unit into specific control codes. The receiver will accept RS-232 control code data generated by the LTC 8780 Data Converter Unit. |
- See other Bosch products
- Bosch IP Dome cameras
- Bosch Dome cameras
- Bosch CCTV cameras
- Bosch Intruder detectors
- Bosch IP cameras
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download
