background image

 

- 67 - 

SMTP (Simple Mail Transfer Protocol) - 

SMTP is used for sending and receiving e-mail. However, as it is ‘simple,’ it is limited in its ability to queue messages at the 
receiving end, and is usually used with one of two other protocols, POP3 or IMAP. These other protocols allow the user to save 
messages in a server mailbox and download them periodically from the server. 
SMTP authentication is an extension of SMTP, whereby the client is required to log into the mail server before or during the 
sending of email. It can be used to allow legitimate users to send email while denying the service to unauthorized users, such as 
spammers. 
 

Sockets - 

Sockets are a method for communication between a client program and a server program over a network. A socket is defined as 
‘the endpoint in a connection. Sockets are created and used with a set of programming requests or ‘function calls’ sometimes 
called the sockets application programming interface (API). 
 

SSL/TSL (Secure Socket Layer/Transport Layer Security) 

These two protocols (SSL is succeeded by TSL) are cryptographic protocols that provide secure communication on a network. SSL 
is commonly used over HTTP to form HTTPS, as used e.g. on the Internet for electronic financial transactions. SSL uses public key 
certificates to verify the identity of the server. 
 

Subnet/subnet mask - 

A subnet is an identifiably separate part of an organization's network. Typically, a subnet may represent all the machines at one 
geographic location, in one building, or on the same local area network (LAN). Having an organization's network divided into 
subnets allows it to be connected to the Internet with a single shared network address. 
The subnet mask is the part of the IP address that tells a network router how to find the subnet that the data packet should be 
delivered to. Using a subnet mask saves the router having to handle the entire 32-bit IP address; it simply looks at the bits 
selected by the mask. 
 

Switch - 

A switch is a network device that connects network segments together, and which selects a path for sending a unit of data to its 
next destination. In general, a switch is a simpler and faster mechanism than a router, which requires knowledge about the 
network and how to determine the route. Some switches include the router function. See also Router. 
 

TCP (Transmission Control Protocol) - 

TCP is used along with the Internet Protocol (IP) to transmit data as packets between computers over the network. While IP takes 
care of the actual packet delivery, TCP keeps track of the individual packets that the communication (e.g. requested a web page 
file) is divided into, and, when all packets have arrived at their destination, it reassembles them to re-form the complete file. 
TCP is a connection-oriented protocol, which means that a connection is established between the two end-points and is 
maintained until the data has been successfully exchanged between the communicating applications. 
 

Telnet - 

Telnet is a simple method with which to access another network device, e.g. a computer. The HTTP protocol and the FTP protocols 
allow you to request specific files from remote computers, but do not allow you logon as a user of that computer. With Telnet, 
you log on as a regular user with whatever privileges you may have been granted for specific applications and data residing on 
that computer. 
 

UDP (User Datagram Protocol) - 

UDP is a communications protocol that offers limited service for exchanging data in a network that uses the Internet Protocol (IP). 
UDP is an alternative to the Transmission Control Protocol (TCP). The advantage of UDP is that it is not required to deliver all data 
and may drop network packets when there is e.g. network congestion. This is suitable for live video, as there is no point in 
re-transmitting old information that will not be displayed anyway. 
 

Unicast - 

Communication between a single sender and a single receiver over a network. A new connection is established for each new user. 
URL (Uniform Resource Locator) - 
An "address" on the network. 
 

Varifocal lens - 

A varifocal lens provides a wide range of focal lengths, as opposed to a lens with a fixed focal length, which only provides one. 
 

WAN (Wide-Area-Network) - 

Similar to a LAN, but on a larger geographical scale. 
 

W-LAN (Wireless LAN) - 

A wireless LAN is a wireless local area network that uses radio waves as its carrier: where the network connections for end-users 

Summary of Contents for Network Camera

Page 1: ...1 2 Megapixels High End Box Network Camera User s Manual Version 1 7...

Page 2: ...THE CAMERA 12 4 2 BEFORE ASSIGNING AN IP ADDRESS 13 4 3 ASSIGNING THE IP ADDRESS TO THE NETWORK CAMERA 14 4 4 ACCESS THE CAMERA FROM THE BROWSER 15 4 5 THE LIVE VIEW PAGE 17 4 6 IPHONE CAMERA VIEWER...

Page 3: ...might not be seen as identical to the actual software or hardware you are using To avoid misunderstanding or misinterpretation please refer to our official website at www amegia com or the FAQ docume...

Page 4: ...to 8 independent streams with multiple profiles Different configurations can be set according to the bandwidth that is available from the network 5 Infrared Cut Filter Removable for Day Night Environ...

Page 5: ...is level Reset use a pin to insert into it to ignite the reset function The Bracket Pad comes as an accessory of the box camera Place the stand mounting pad on the top bottom panel of the camera for d...

Page 6: ...intended It is designed for various applications including video sharing general security surveillance etc 3 2 Hardware Installation Steps After unpacking the package and identifying its parts assembl...

Page 7: ...or Not necessary for Power over Ethernet Network Camera Models After the Power Connector is plugged in the Network Camera will boot up Wait a few seconds for the Network Camera to startup How to adjus...

Page 8: ...k infrastructure 1 Configuration 1 Internet Access ADSL or Cable Modem IP address One real IP or one dynamic IP Connection Type Only the Network Camera connects to the internet For fixed real IP set u...

Page 9: ...relay device such as an alarm that expects to be activated Connect Pin 3 and Pin 6 for an external Triggering device for sending a signal into the Network Camera Refer to Chapter 5 Configuring the ca...

Page 10: ...act like Data and Power transmission And it is not necessary to use any Power Adapter since the powering will be done directly through the Ethernet Connector Below a comparison between a Regular Ethe...

Page 11: ...cro SD card into from the slot it s recommended to turn the device off Note The device does not support Hot Swapping function Note this unit supports min 2GB and max 32GB Micro SD SDHC card and Class...

Page 12: ...cally to provide installation guide 4 1 Finding the camera IP Discovery Tool IP Discovery is the software that provides an easier way for setting the IP address and network configurations of the Netwo...

Page 13: ...section 4 2 in the following about configuring IP information This tool is only compatible to the camera with F W version 1 0 0 3044 or above 4 2 Before Assigning an IP Address Make sure the Network...

Page 14: ...4 3 Assigning the IP address to the network camera Select a Network Camera and click on Setup Then start to configure network settings such as the following fields IP Address Subnet Mask Gateway Click...

Page 15: ...in default account password to pass the authentication When the Network Camera is accessed via Internet Explorer it will ask you to install the ActiveX component Note during the webpage loading you ma...

Page 16: ...ee the Live view image Please make sure to install it first To adjust the Security Options of Internet Explorer follow the below instructions Internet Explorer Tools Internet Options Security Tab Cust...

Page 17: ...k Yes Then the Live View page will be opened Click on the Setup link of the Live View page to change the configurations of the network camera 4 5 The Live View Page Select user interface language Engl...

Page 18: ...shown in the monitor Listen allows the user from the PC listen the location where the camera is set Talk allows the user from the PC talk remotely to the camera for which the speaker will emit the voi...

Page 19: ...monitor via iPhone Once LAN or internet settings are completed on iPhone as below user can monitor via iPhone web browser by just entering the IP address or domain name of the network camera 1 Go to S...

Page 20: ...ttings to send emails snapshots and more Network Network configuration for the network camera and Event features System Firmware version information and upgrade User access management and system infor...

Page 21: ...ically to fit the best picture quality through the bandwidth provided by the network The balance between VBR and network bandwidth will affect picture quality Quality Level There are three levels to a...

Page 22: ...on to have a bigger and more detailed image for your viewing The streams for using Digital PTZ are streams 3 4 and 5 6 Stream 3 4 or stream 5 6 will be enabled respectively when choosing v03 or v05 T...

Page 23: ...e on iPhone or other network enabled smart phones and NVR surveillance application software OSD Setting Camera Name To display the OSD type a text on the box with a maximum of 20 characters Date Time...

Page 24: ...al area of the image same as default setting Brightness The image brightness can be adjusted in the range 0 100 where a higher value produces a brighter image Hue The image hue can be adjusted in the...

Page 25: ...ol for the camera ICR Select Light Sensor to activate IR cut filter or Delete it automatically according to day or night vision Select Schedule to assign the starting time of day mode and night mode D...

Page 26: ...ll display the control panel for the installed PTZ device Protocol Select one from the list of protocols such as Pelco D Pelco P Li Lin and ID Select ID of the analog camera that the video encoder int...

Page 27: ...v05 or v07 streaming which is H 264 HD compressed Pre Alarm Pre Recording works when Pre Alarm enabled which is to record video to Micro SD card The buffered memory in device contains selectable 1 3 S...

Page 28: ...2 ways to play the recorded video files file click on the file to play the record video file online There will be a pop out window as below playing the recorded video mp4 click on the mp4 file to dow...

Page 29: ...29 QuickTime http www apple com quicktime download VLC http www videolan org vlc KMPlayer http kmplayer en softonic com...

Page 30: ...ition during a time do something with a result The condition will be set by Trigger by The time of doing something will be set by Respond to Trigger Doing something with a result will be set by When T...

Page 31: ...when the camera is booted or restarted This feature is useful to detect reconnections that are not anticipated or expected GPIN it will perform an action when a connected triggering device at Pin3 4 i...

Page 32: ...trigger from the Start Time Temporal Disable don t do anything while activated In other words even if the condition has happened the Network Camera shall not do anything This option is useful to pre s...

Page 33: ...ssage contents Attach file tick it if you need to attach a file Send HTTP notification Send a text message as a parameter to an HTTP port that should be expecting a text message or a command Interval...

Page 34: ...Record to SD Record video image to SD card Note It won t display if insert SD card not yet GPOUT Set to activate a connected device at Pin1 2 once triggered When Trigger by Condition Motion Detection...

Page 35: ...tal of 3 Include and or Exclude windows can be configured Once configured the video motion detection windows appear in the list of available triggers for triggering events Note 1 Using the motion dete...

Page 36: ...t OSD On to present in screen that Motion Detection is working Windows Area Name Descriptive name of your choice Sensitivity values run from 0 to 100 for which the higher the number the more sensitive...

Page 37: ...ill show up for filling the required information FTP Server Receives uploaded images Name Descriptive name of your choice Network address IP address or host name User Name and Password Enter the Usern...

Page 38: ...ded messages to be delivered will not take into effect TCP Server Receives notification messages Name Descriptive name of your choice Network Address IP address or host name Port number Enter the port...

Page 39: ...a is installed As for the IP Discovery Tool is useful for initial boot up and straight network configuration the Network Settings page offers a flexible way to fully utilize the network capabilities G...

Page 40: ...mask for the subnet the network camera Gateway Specify the IP address for the Gateway DNS1 Specify the IP address for the first group of DNS DNS2 Specify the IP address for the second group of DNS PP...

Page 41: ...t settings Use the Host Name enter the desired DNS server by specifying the following Domain name enter the domain s Multiple domains can be separated by semicolons The host name is always the first p...

Page 42: ...ault For Windows Vista 7 users this step is simple Simply click on Network either on your desktop or go to Start and it will show You may encounter a message asking for your permission regarding the f...

Page 43: ...s XP users first click on My Network Places you may either click on the icon on your desktop or go to Start and then it will show When you enter My Network Places click on the Show icons for networked...

Page 44: ...ly forwards the information between the Host Name server and the Network Camera therefore the Username and Password must be obtained from the 3rd party service provider before using the feature Note R...

Page 45: ...rk camera is changed Please configure SMTP Server information Network Event Server first IPCHANGE Disable or Enabled SMTP Server Select one on the list of configured Email servers Mail To Set the dest...

Page 46: ...Camera Enable anonymous login To allow the access to the Network Camera without restrictions select the box of Enable anonymous login and click on Save to make the changes permanent Such change will...

Page 47: ...ime 24 hours clock of the Network Camera Set Server Time Select the Automatically adjust for daylight saving time changes if necessary From the Time Mode section select the preferred method to use for...

Page 48: ...Note if you enter a different value other than 80 for your HTTP port you can not return to the Live View screen In order to return to the Live View screen please launch IP Discovery tool again and sel...

Page 49: ...to connect the camera Then select the firmware to upload Once new firmware is uploaded onto to the camera camera will process upgrade automatically Upgrade via Micro SD card 1 User need to save new fi...

Page 50: ...help you find the IP address of your camera Enter Setup Application Yoics page Fig1 then click register this camera Follow the Yoics website instructions NEW REGISTERATION Fig2 to fill in and get a n...

Page 51: ...51 Fig1 Register this camera Fig2 New Registration Register Here...

Page 52: ...era Click on Disable Yoics Support Login into Yoics Website Please go to www yoics net to sign in to your account Delete Service from Camera Settings Choose MY STUFF Settings of Camera Name Fig4 Click...

Page 53: ...53 Fig4 Camera Settings Fig5 Advanced Service Settings Click Here Click Here...

Page 54: ...g press the reset button until the Power LED starts flashing The device is back to factory default All settings will be erased from the device and the assigned IP will be back to 192 168 1 200 and Sub...

Page 55: ...also can be changed Since Port 80 is the default when we type our IP address at the Address bar there won t be any need to type the port number The default port for streaming an H 264 video is port 55...

Page 56: ...r the camera will be as follows Private IP Private Port Type Public Port 192 168 1 22 8080 TCP UDP 8080 192 168 1 22 554 TCP UDP 554 In this case we are using Port 8080 for the Network Camera at 192 1...

Page 57: ...ration on how the camera can be connected when 2 or more Public IPs are involved in a network infrastructure ADSL Modem Company Web Server 192 168 1 23 Terminal 192 168 1 22 Network Camera Broadband R...

Page 58: ...with no DHCP or BOOTP server Set the IP address again using the IP Discovery Utility see the Installation Guide or the ARP Ping commands 2 Access the unit and disable DHCP in the TCP IP settings Retur...

Page 59: ...he camera Poor performance Poor performance may be caused by heavy network traffic multiple users accessing the unit low performance clients use of features such as Motion Detection Event handling Poo...

Page 60: ...Micro SD card Notification via email and TCP GPOUT Audio Compression AAC LC Terminal Block Pins Common Relay Out Normal Open Close RS485 Ground Digital Input Audio In Out Local Storage Micro SD slot u...

Page 61: ...ight 300g net 400g with stand Certifications CE FCC Part 15 Class B ROHS I O Connectors 1 x RJ45 of 10 100M 1 x DC Power Jack 1 x Reset Button 1 x Micro SD Slot Terminal Block 8 pins 1 x BNC Video Out...

Page 62: ...CCD Charged Coupled Device This light sensitive image device used in many digital cameras is a large integrated circuit that contains hundreds of thousands of photo sites pixels that convert light ene...

Page 63: ...come necessary to reset a device to its factory default settings this will for many devices completely reset any settings that were changed by the user Firewall A firewall works as a barrier between n...

Page 64: ...each data packet contains both the sender s address and the receiver s address The Internet Protocol ensures that the data packets all arrive at the intended address As IP is a connectionless protoco...

Page 65: ...s Group develops standards for digital video and audio compression It operates under the auspices of the International Organization for Standardization ISO The MPEG standards are an evolving series ea...

Page 66: ...ernatively the total number of pixels usually in megapixels in the image can be used In analog systems it is also common to use other format designations such as CIF QCIF 4CIF etc RTCP Real Time Contr...

Page 67: ...tination In general a switch is a simpler and faster mechanism than a router which requires knowledge about the network and how to determine the route Some switches include the router function See als...

Page 68: ...rivacy comparable to that usually expected of a wired LAN Security is at two different levels 40 bit and 128 bit encryption The higher the bit number the more secure the encryption WPA PSK Wi Fi Prote...

Page 69: ...nt off and on the user is encouraged to try to correct the interference by one or more of the following measures Reorient or relocate the receiving antenna Increase the separation between the equipmen...

Reviews: