Verint S3100-CE CCTV transmission system
Technical Specification
- Make: Verint
- Model code: S3100-CE
- Series: Nextiva Series
- Network Protocols: RTP/IP, UDP/IP, TCP/IP, or multicast IP
- Transmission Range m: 13700
The S3100-CE wireless video bridge wirelessly links the Nextiva S1100w-CE wireless video transmitters, or S1500e series and S1600e video servers in remote locations, to an Ethernet Local Area Network (LAN). Several S3100-CE wireless bridges can be used to create multiple video links covering a large geographical area, such as a city. Configuration and management are made easy with the Verint nDVR, LVM, or SConfigurator software. The S3100-CE wireless bridge leverages the Nextiva SPCF™ protocol, which resolves “hidden node,” quality of service, range, and security problems.
Read more| Make | Verint |
|---|---|
| Manufacturer | Verint Systems |
| Category | CCTV>Analogue Transmission |
| Model code | S3100-CE |
| Network Properties | Network Protocols: RTP/IP, UDP/IP, TCP/IP, or multicast IP |
| Transmission Range m | 13700 |
| Accessories | Multiband Outdoor Wireless Bridge |
| Physical Specifications |
Weight g: 0.90 Dimensions mm: 205 x 140 x 105 |
| Electrical Specifications |
Voltage: 48 V DC Power Consumption: 12 W |
| Environmental Specifications | Operating Humidity %: 0 ~ 95 |
| Additional info | The S3100-CE wireless video bridge wirelessly links the Nextiva S1100w-CE wireless video transmitters, or S1500e series and S1600e video servers in remote locations, to an Ethernet Local Area Network (LAN). Several S3100-CE wireless bridges can be used to create multiple video links covering a large geographical area, such as a city. Configuration and management are made easy with the Verint nDVR, LVM, or SConfigurator software. The S3100-CE wireless bridge leverages the Nextiva SPCF™ protocol, which resolves “hidden node,” quality of service, range, and security problems. |
Related Whitepapers
Analytics-driven workforce optimisation
Security investments retailers should consider for their 2021 budget
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download

