Yaesu FT-2900R

The Yaesu FT-2900R is a VHF 2M FM mobile amateur radio transceiver. It is currently in production.

Technical description

  • Transmit Frequency Range 144 MHz to 148 MHz (alternate 144MHz to 146MHz)
  • Receive Frequency Range 136 MHz to 174MHz (alternate 144MHz to 148MHz)
  • Emission: FM
  • Power Output: FM 5W / 10W / 30W / 75W
  • Standard Repeater Shift: +/- 600kHz
  • Audio Output: 3W into 4 Ohms @10% THD
  • Antenna Impedance: 50 Ohms unbalanced
  • Supply voltage 13.8V DC +/- 15% negative ground
  • Current Consumption (typical)
  • Receive with audio: 0.7A
  • Receive squelched: 0.3A
  • Transmit at 75W: 15A
  • Transmit at 30W: 9A
  • Transmit at 10W: 5A
  • Transmit at 5W: 4A
  • Memories
  • 200 "Basic" channels
  • 10 band edge channels
  • 1 "Home" channel
  • CTCSS: 50 standard CTCSS tones
  • DCS Encoder/Decoder: 104 standard DCS codes
  • 6 digit LCD display with dimmer
  • Time out timer: 1min / 3min / 5min / 10min / off
  • Automatic Power Off: 30min / 1h / 3h / 5h / 8h / off
  • Automatic repeater shift.
  • Large heatsink, no fan design
  • Internal temperature sensor
  • Weight: 4.2 pounds


The case has 2 analog potentiometers for volume and squelch. One large rotary dial for frequency and data entry. One power button and 5 functions buttons are also included. The MH-48 hand microphone has a DTMF keypad, as well as additional function buttons. The face of the radio does not detach for remote mounting.

gollark: Have you not seen the 918273189378193718937198237891723871892371 people saying something like "humanity bad"?
gollark: They should probably also have sensible fallbacks in case the server implodes, or a sensor fails.
gollark: If all your smartâ„¢ things use an encrypted communication channel to a reasonably secured server, and have some kind of privilege system so that a random thermometer can't override door lock controls or something, it's probably fine for practical purposes.
gollark: Well, it does seem that all sufficiently complex computer systems end up with horrible vulnerabilities somewhere because people cannot into security, but apart from that.
gollark: You can use advanced technology called "basically any cryptography and sensible system design".

References

    This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.