Videotec SM84A-164A CCTV switcher
Technical Specification
- Make: Videotec
- Model code: SM84A-164A
- Series: SM Series
- Video inputs / ports: 16 channels
- Video Outputs: 4 outputs
The SM84A-164A matrix can be controlled by 4 remote keyboards in RS485. 8-16 alarm contact can be associated with the video input, which can be displayed on the video output in case of alarm. The alarm contacts are independent and configured as normally open (NO) or normally closed (NC). The telemetry control can be performed over the coax cable on the 8-16 video inputs and on the RS485 serial output. It is possible to control the video switching by a VCR trigger signal.
Read more| Make | Videotec |
|---|---|
| Manufacturer | Videotec |
| Category | CCTV>CCTV Switchers & Switches |
| Model code | SM84A-164A |
| Video inputs / ports | 16 channels |
| Video Outputs | 4 outputs |
| No of Alarms | 16 alarms |
| Signal Mode | PAL, NTSC |
| TX/RX | TX/RX |
| Detector Range m | 1200 |
| Video Signal V, ohms | 1 Vp-p, 75 Ohms |
| Environmental Specifications | Operating Temperature oC: 0 ~ 45 |
| Analogue Switcher Type | Matrix Switchers |
| Additional info | The SM84A-164A matrix can be controlled by 4 remote keyboards in RS485. 8-16 alarm contact can be associated with the video input, which can be displayed on the video output in case of alarm. The alarm contacts are independent and configured as normally open (NO) or normally closed (NC). The telemetry control can be performed over the coax cable on the 8-16 video inputs and on the RS485 serial output. It is possible to control the video switching by a VCR trigger signal. |
More Videotec CCTV Switchers & Switches
See comparison of Videotec SM84A-164A with similar Videotec CCTV Switchers & Switches
Compare Videotec SM84A-164A with CCTV Switchers & Switches from other manufacturers
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download
