Welcome Customer !

Membership

Help

Fujian Huanyutong Information Technology Co., Ltd
Custom manufacturer

Main Products:

smart-city-site>Products
Product Categories

Fujian Huanyutong Information Technology Co., Ltd

  • E-mail

  • Phone

  • Address

Contact Now

TBV-8219A IP network intercom terminal

NegotiableUpdate on 01/08
Model
Nature of the Manufacturer
Producers
Product Category
Place of Origin
Overview
TBV-8219A IP network intercom terminal
Product Details
·All metal aluminum shell, explosion-proof and waterproof, sturdy and durable, can be installed openly or fixed on vertical poles; It has functions such as waterproof, moisture-proof, dust-proof, tamper proof, and anti violent damage; TBV-8218 comes with a rain cover for better waterproof performance;
·Single key call, which can be used to specify the target microphone or software to be called by the call key through software, achieving full duplex intercom;
·Call forwarding, when the paging microphone of the call is busy, can transfer the call to the higher-level center of the microphone;
·Built in speaker, capable of hands-free calling and receiving broadcasts;
·Built in microphone and camera, achieving both audio and video effects during intercom, and can be monitored and monitored; There are 6 white lights next to the camera, which automatically light up during calls, increasing the brightness of the scene and improving video quality;
·Digital recording and video recording function, the audio and video files recorded during intercom are saved in the paging microphone and uploaded to the server when idle;
·When the device is idle, background music can be played, and it will automatically interrupt during intercom;
·Equipped with an audio output port, it can be connected to external active speakers or headphones;
·Provide TCP instructions, UDP instructions, RS485 interface, with short-circuit input and output ports, can receive and control some peripheral devices (such as police lights, pan tilt/ball machines, curtain detectors, etc.);
·Call data confidentiality function. Encrypt the data being transmitted to prevent others from eavesdropping and exploiting it, making the call more secure;
·Power supply methods include separate power supply, centralized power supply, and POE power supply (POE modules can be added or an external POE power splitter can be used, which is powered by POE switches through Ethernet cables);
·Optional 25W power amplifier module, external sound column or horn; 13. It can be accessed where there is Ethernet. It can be accessed across network segments and routes