Imigix icon IP SOLO CCTV transmission system
Technical Specification
- Make: Imigix
- Model code: icon IP SOLO
- Transmission type: High-End transmission
- Video Inputs: 64 channels
- Alarm Inputs: 64 alarms
In conjunction with icontrol software, it may be easily configured for use on routed networks and sub-nets. Maximum IP bandwidth set by the user, removing risk of flooding network with video traffic. Two-way video and audio, full duplex. Compatible with control of third party device. Video, audio, telemetry, alarms and IP built-in as standard. Integrated telemetry control. Variframe: easy switching between full frame and conditionally refreshed images. Up to 64 video inputs.
Read more| Make | Imigix |
|---|---|
| Manufacturer | Imigix Ltd |
| Category | CCTV>Analogue Transmission |
| Model code | icon IP SOLO |
| Transmission type | High-End transmission |
| Video Inputs | 64 channels |
| Alarm Inputs | 64 alarms |
| Built-in Modem | Yes |
| TX/RX | TX/RX |
| Telemetry Control | Yes |
| Network Properties |
Bit rate Bps: 9.6 - max 384 kbps Compression Type: Variframe Interface: 10/100 baseT Ethernet for IP, LAN, WAN |
| Additional info | In conjunction with icontrol software, it may be easily configured for use on routed networks and sub-nets. Maximum IP bandwidth set by the user, removing risk of flooding network with video traffic. Two-way video and audio, full duplex. Compatible with control of third party device. Video, audio, telemetry, alarms and IP built-in as standard. Integrated telemetry control. Variframe: easy switching between full frame and conditionally refreshed images. Up to 64 video inputs. |
Compare Imigix icon IP SOLO with Analogue Transmission from other manufacturers
Related Whitepapers
Security investments retailers should consider for their 2021 budget
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download