Installation and connections
wwConnections with other devices
qqBlock diagram
| FS | Black | BKGD |
|
|
|
SDI IN |
| Color | CUT, MIX, WIPE, DVE |
| SDI OUTPUT | SDI Output |
| BKGD1, 2 | KEY |
| |||
1 to 4 | VPrc |
| ||||
ColorBar | CUT, MIX, WIPE, DVE |
|
|
| ||
| DbyD |
|
|
| ||
SDI Input | STILL1, 2 |
|
|
| ||
PinP1, 2 |
|
|
| |||
|
|
|
| |||
1 to 8 | FS | CLIP1, 2 |
|
|
| |
CUT, MIX |
|
|
| |||
|
|
| SDI OUTPUT | SDI Output | ||
SDI IN | UC |
| DSK | Output | ||
| 2 to 5 | 2 to 5 | ||||
5 to 8 | VPrc |
| CUT, MIX | matrix | ||
|
|
| ||||
| DbyD | Input | FTB |
|
|
|
|
| AUX 1 to 4 |
|
|
| |
|
| matrix |
|
|
| |
|
|
|
|
|
| |
|
|
| Multi View |
|
| |
|
|
|
|
| ||
|
|
| WFM |
| Scaler | |
|
|
|
|
| ||
|
|
| MEM PVW |
|
|
|
Input |
|
| Option slot A |
|
| Output |
A1, A2 |
|
|
|
| A1, A2 | |
|
|
|
|
| ||
Input |
|
| Option slot B |
|
| Output |
B1, B2 |
|
|
|
| B1, B2 | |
|
|
|
|
| ||
|
|
|
|
|
| Reference signal |
|
|
|
| REF IN/OUT (1) |
| |
Memory card |
|
|
|
| REF OUT (2) |
|
|
|
|
|
|
| |
~ AC IN | AC/DC | Power |
|
|
| |
|
|
|
| |||
TALLY/GPI 1 TALLY/GPI 2 | LAN | COM | EDITOR |
| ||
Dsub 15 | Dsub 15 | RJ45 | Dsub 9 | Dsub 9 |
| |
|
|
| (4) |
|
|
|
| 8 | Switching | (5) |
|
| |
| 19 | hub |
|
|
| |
|
|
|
|
| ||
| ALARM OUT: 1 |
|
|
|
| |
| GND: | 2 |
|
|
|
|
|
|
|
|
|
| Editing controller |
|
|
|
|
|
| Aux panel |
Computer | Aux panel |
| Remote camera |
|
|
|
|
|
|
|
|
| VTR, etc. |
1: When external synchronization is selected as the reference signal setting, the reference signal is input.
When internal synchronization is selected, the reference signal is output.
2: When external synchronization is selected as the reference signal setting, the signals are looped through and output.
When internal synchronization is selected, the reference signal is output.
3: Two sets of the same output signals are distributed from SDI OUTPUT 1.
4: Use a crossover cable when connecting the unit and another device on a 1:1 basis without going through a switching hub.
5: Use a switching hub.
Proceed with the connections after reading the section entitled “Network security” (on page 6).
14