Sercomm 0YC01 Wireless Network Camera User Manual NC822A

Sercomm Corporation Wireless Network Camera NC822A

Users manual

Network Camera User’s Guide
Table of Contents CHAPTER 1 INTRODUCTION.............................................................................................. 1Overview ............................................................................................................................ 1Physical Details - Network Camera ................................................................................. 4Package Contents .............................................................................................................. 6CHAPTER 2 BASIC SETUP ................................................................................................... 7System Requirements........................................................................................................ 7Installation - Network Camera......................................................................................... 8Setup using the Windows Wizard .................................................................................... 9CHAPTER 3 VIEWING LIVE VIDEO ................................................................................ 14Overview .......................................................................................................................... 14Requirements................................................................................................................... 14Connecting to a Camera on your LAN.......................................................................... 14Connecting to a Camera via the Internet ...................................................................... 16Viewing Live Video ......................................................................................................... 18Setting the Focus.............................................................................................................. 19CHAPTER 4 ADVANCED VIEWING SETUP ................................................................... 20Introduction ..................................................................................................................... 20Adjusting the Video Image ............................................................................................. 20Controlling User Access to the Video Stream ............................................................... 24Making Video available from the Internet.................................................................... 25Viewing Live Video via the Internet .............................................................................. 27Motion Detection Alerts.................................................................................................. 29CHAPTER 5 WEB-BASED MANAGEMENT .................................................................... 30Introduction ..................................................................................................................... 30Connecting to Network Camera..................................................................................... 30Welcome Screen............................................................................................................... 31Administration Menu...................................................................................................... 32System Screen .................................................................................................................. 33Network Screen................................................................................................................ 35Wireless Screen (Wireless Model Only) ........................................................................ 38DDNS Screen ................................................................................................................... 40IP Filter Screen................................................................................................................42I/O Port Screen ................................................................................................................ 43Video & Audio Screen..................................................................................................... 44Video Access Screen ........................................................................................................ 47User Database Screen...................................................................................................... 49Motion Detection Screen................................................................................................. 51E-Mail Screen .................................................................................................................. 52FTP Screen....................................................................................................................... 54Instant Messaging Screen ............................................................................................... 55Event Trigger Screen ...................................................................................................... 57Maintenance Screen ........................................................................................................ 59Status Screen.................................................................................................................... 61Log Screen........................................................................................................................ 63CHAPTER 6 WINDOWS VIEWING/RECORDING UTILITY........................................ 64Overview .......................................................................................................................... 64Installation ....................................................................................................................... 64System Tray Icon............................................................................................................. 65i
Main Screen .....................................................................................................................65Camera Setup .................................................................................................................. 66Main Screen .....................................................................................................................70Recording Video .............................................................................................................. 72CHAPTER 7 TROUBLESHOOTING .................................................................................. 77Overview .......................................................................................................................... 77Problems........................................................................................................................... 77APPENDIX A SPECIFICATIONS........................................................................................ 80Network Camera ............................................................................................................. 80Regulatory Approvals ..................................................................................................... 80Copyright Notice.............................................................................................................. 82APPENDIX B STREAMING VIDEO/AUDIO SOLUTION............................................... 98Overview .......................................................................................................................... 98Streaming Video/Audio through Internet Camera....................................................... 98P/N: 9560WL0001Copyright 2007. All Rights Reserved.Document Version: 1.0All trademarks and trade names are the properties of their respective owners.ii
1Chapter 1IntroductionThis Chapter provides details of the Network Camera's features, componentsand capabilities.OverviewThe Network Camera has an Integrated Microcomputer and a high quality Sony ProgressiveCCD Image-Sensor, enabling it to display high quality live streaming video over your wiredLAN, the Internet, and for the Network Camera, an 802.11g Wireless LAN.Using enhanced MPEG-4 technologies, the Network Camera is able to stream high qualityvideo and two-way audio directly to your PC. The high compression capabilities of MPEG-4reduce network bandwidth requirements to amazingly low levels.A convenient and user-friendly Windows program is provided for both viewing and recordingvideo. If necessary, you can even view video using your Web Browser, on a variety of softwareplatforms.Figure 1: Network Camera Featuresx Dual Stream Live Video to Multiple Users.  The MPEG4 and JPEG encoders builtinto the camera generate a ready-to-view video stream. Just connect to the camera using your Web browser or the provided Windows utility to view live video.x Night/Day Switch Support. Supporting IR-cut filter, the Network Camera can get bettervideo quality even in the nighttime.1
x Suitable for Home, Business or Public Facilities. Whether for Home, Business orPublic Facility surveillance, the Network Camera has the features you need.x Multi-Protocol Support. Supporting TCP/IP networking, SMTP (E-mail), HTTP andother Internet related protocols, the Network Camera can be easily integrated into yourexisting network.x Easy Configuration.  A Windows-based Wizard is provided for initial setup.Subsequent administration and management can be performed using a standard webbrowser. The administrator can configure and manage the Network Camera via the LANor Internet.x Viewing/Recording Utility.  A user-friendly Windows utility is provided for viewinglive video. For periods when you are absent, or for scheduled recording, this applicationalso allows you to record video on your PC. Use the Playback function of the suppliedWindows utility to view the recorded files.x Motion Detection.  This feature can detect motion in the field of view. The NetworkCamera will compare consecutive frames to detect changes caused by the movement oflarge objects. Motion detection alarm can be triggered via e-mail, FTP, instant messagingand/or an external alarm device.x Flexible Scheduling. You can limit access to the video stream to specified times using a flexible scheduling system. The Motion Detection feature can also have its own schedule,so it is active only when required.x Syslog Support.  If you have a Syslog Server, the Network Camera can send its log datato your Syslog Server.x Audio Support.  You can listen as well as look! Audio is encoded with the video ifdesired. You can use either the built-in microphone or an external microphone.x IP Filter.  Use the IP Filter to block/accept access to the IP addresses. x User-definable HTTP/ HTTPS port number.  This allows Internet Gateways to use"port mapping" so the Network Camera and a Web Server can share the same Internet IP address.x DDNS Support.  In order to view video over the Internet, users must know the InternetIP address of the gateway used by the Network Camera. But if the Gateway has a dynamicIP address, DDNS (Dynamic DNS) is required. Since many existing Gateways do notsupport DDNS, this function is incorporated into the Network Camera.x NTP (Network-Time-Protocol) Support.  NTP allows the Network Camera tocalibrate its internal clock from an Internet Time-Server. This ensures that the time stampon Video from the Network Camera will be correct.Security Featuresx User Authentication. If desired, access to live video can be restricted to known users. Users will have to enter their username and password before being able to view the videostream. User authentication is not required if the Multicast feature is enabled.x Password-Protected Configuration.  Configuration data can be password protected, sothat it only be changed by the Network Camera Administrator.2
Wireless Features (Wireless Model only)x Standards Compliant. The Network Camera complies with the IEEE802.11g (DSSS) specifications for Wireless LANs.x Supports both 802.11b and 802.11g Standards.  The Network Camera supports both802.11b and 802.11g standards.x Speeds to 54Mbps. All speeds up to the 802.11g maximum of 54Mbps are supported.x Wired and Wireless Network Support. The Network Camera supports either wired andwireless transmission.x WEP Support.  Full WEP support (64/128 Bit) on the Wireless interface is provided.x WPA/WPA2-Personal Support.  The WPA/WPA2-Personal standard is also supported,allowing advanced encryption of wireless data.3
Physical Details - Network Camera Front - Network Camera CS Mount Lens Adjust focus manually by turning the front lens clear. You alsoshould ensure that the lens cover remain clean. The image quality is degraded if the lens cover is dirty or smudged.Microphone The built-in microphone is mounted on the front. There is also a connection for an external microphone on the rear. Connecting anexternal microphone will disable the built-in microphone.Power LED (Amber)On - Power on.Off - No power.Blinking - The Power LED will blink during start up. This will take15 to 20 seconds.Network LED(Green)On - Wireless or LAN connection is detected.Off - Wireless or LAN connection is not detectedBlinking - Data is being transmitted or received via the LAN orWireless connection.Rear - Network Camera Antenna For Wireless model, attach the supplied antenna here. The antenna is adjustable; best results are usually obtained with the antennapositioned vertically.Reset Button This button is recessed; you need a pin or paper clip can be used todepress it. It can be activated at any time the camera is in the "ready" mode.x WPS PBC Mode.  For the Wireless Model, when pressed andreleased (less then 3 seconds), the Network Camera will be inthe WPS PBC mode (Auto link mode).x WPS Pin Code Mode.  For the Wireless Model, when pressedand held for over 3 seconds, the Network Camera will be in theWPS Pin Code mode.x Reset to manufacturer default value and reboot. Whenpressed and held over 10 seconds, the settings of NetworkCamera will be set to their default values.Note:After this procedure is completed, the Power LED will blink three times to confirm that the reset was completed successfully.4
LAN port Use a standard LAN cable to connect your Network Camera to a 10/100BaseT hub or switch.Note:x Attaching the LAN cable will disable the Wireless interface.Only 1 interface can be active at any time.x The LAN cable should only be connected or disconnected whenthe camera is powered OFF. Attaching or detaching the LANcable while the camera is powered on does NOT switch theinterface between wired and wireless.Power Input  Connect the supplied 12V power adapter here. Do not use otherpower adapters; doing so may damage the camera.GPIO The GPIO terminal block includes 2 input ports and 2 output ports.MIC In  If required, an external microphone can be attached here. Attaching a microphone here will disable the built-in microphone on the front.Microphones which are designed to be used with PCs are usuallycompatible with this microphone input.SPKR out  If required, an external speaker can be attached here.5
Package Contents The following items should be included: If any of these items are damaged or missing, pleasecontact your dealer immediately.1. Network Camera2. Antennae (Wireless Model only)3. Lens 4. Stand5. Allen Wrench6. Power adapter7. Installation CD-ROM8. Quick Installation GuideCS Mount Lens The following list contains the CS Mount lens which have been tested on the Network Camera:TOPICA0416-M10816-M1TP-0550WOETP-0560WOEComputarT2Z3514CS-2SpaceComTV308DC-2TAV2712DCPentaxC70220DCPSKowaLMVZ38A-IRFujinonYV2.8x2.8LA-SA2LTamron13VG308AS13VG2812AS12VG412ASIR12FM04CST13VM308ASIR13FM04IR6
Chapter 2Basic Setup This Chapter provides details of installing and configuring the NetworkCamera.System Requirements x To use the wired LAN interface, a standard 10/100BaseT hub or switch and network cableis required.x To use the Wireless interface on the on the Wireless Model, other Wireless devices mustbe compliant with the IEEE802.11b or IEEE802.11g specifications. All Wireless stationsmust use compatible settings.The default Wireless settings are:Mode: InfrastructureESSID: ANY Wireless Security: DisabledDomain: USAChannel No.: Auto27
Installation - Network Camera 1. Assemble the Camera Attach the lens to the Network Camera. On the Wireless Model, screw the antenna to therear mounting point, and set the antenna to the upright position to improve wireless reception.2. Connect the LAN CableConnect the Network Camera to a 10/100BaseT hub or switch, using a standard LANcable.For Wireless model, plugging in the LAN cable will disable the Wireless interface. Only 1 interface can be active at any time. The LAN cable should only be connected or disconnectedwhen the camera is powered OFF. Attaching or detaching theLAN cable while the camera is powered on does NOT switchthe interface between wired and wireless.The first time you connect to the camera, you should connectthe LAN cable and configure the Network Camera withappropriate settings. Then you can unplug the LAN cable andpower off the camera. The Network Camera will be in wirelessinterface when you power on the camera again. 3. Power UpConnect the supplied 12Vpower adapter to the Network Camera and power up. Use onlythe power adapter provided. Using a different one may cause hardware damage.4. Check the LEDs x The Power LED will turn on briefly, then start blinking. It will blink during startup, whichtakes 15 to 20 seconds. After startup is completed, the Power LED should remain ON. x The Network LED should be ON.For more information, refer to Physical Details - Network Camera in Chapter 1.8
Setup using the Windows Wizard Initial setup should be performed using the supplied Windows-based setup Wizard. Thisprogram can locate the Network Camera even if its IP address is invalid for your network. Youcan then configure the Network Camera with appropriate TCP/IP settings for your LAN.Subsequent administration can be performed with your Web browser, as explained in Chapter5 - Web-based Management.Setup Procedure 1. Insert the supplied CD-ROM into your drive. If the setup program does not startautomatically, run Setup.exe in the root folder.x You will see the Welcome screen shown below.x Click the Setup Camera button to start the setup WizardFigure 2: Welcome Screen 2. The next screen, shown below, will list all the Network Cameras on your LAN.Figure 3: Camera List Screen9
x Select the desired Camera from the list on the left. The current settings for the selected Camera will be displayed in the table on the right.x Click Next to continue.3. You will be prompted to enter the Administrator Name and Administrator Password, asshown below.x If using the default values, enter administrator for the name, and leave the password blank.x Otherwise, enter the Administrator Name and Administrator Password set on theAdmin Login screen.Figure 4: Password Dialog4. On the following IP Address Settings screen, shown below, choose Fixed IP or DynamicIP.Figure 5: Fixed or Dynamic IP Selectionx Fixed IP is recommended, and can always be used.x Dynamic IP can only be used if your LAN has a DCHP Server.Click Next to continue.5. If you chose Fixed IP Address, the following TCP/IP Settings screen will be displayed.10
Figure 6: TCP/IP Settingsx Enter an unused IP Address from within the address range used on your LAN.x The Subnet Mask and Default Gateway fields must match the values used by PCs onyour LAN.x The Primary DNS address is required in order to use the E-mail alert or DynamicDNS features. Enter the DNS (Domain Name Server) address recommended by yourISP.x The Secondary DNS is optional. If provided, it will be used if the Primary DNS is unavailable.Click Next to continue.6. This screen allows you to enter a suitable Description, and set the correct Time Zone,Local Date, and Local Time. Make any desired changes, then click Next to continue.Figure 7: Camera Settings7. The next screen, shown below, displays all details of the Network Camera.x Click Next if the settings are correctx Click Back to modify any incorrect values.11
Figure 8: Save Settings8. Click OK to confirm that you want to save the new settings. If you want to cancel yourchanges, click Cancel.Figure 9: Confirm Screen 9. After clicking Next, you will see the screen below.12
Figure 10: Final ScreenClicking the Install Utility button will install the Viewing/Recording utility described in Chapter 6 - Windows Viewing/Recording Utility.10. Click Exit to end the Wizard.Setup is now complete.13
3Chapter 3Viewing Live Video This Chapter provides basic information about viewing live video.OverviewAfter finishing setup via the Windows-based Wizard, all LAN users can view live video usingInternet Explorer on Windows.This Chapter has details of viewing live video using Internet Explorer.But many other powerful features and options are available:x To view multiple cameras simultaneously, or record video (either interactively or byschedule), you should install the Windows Viewing/Recording utility. Refer to Chapter 6 -Windows Viewing/Recording Utility for details on installing and using this program.x The camera administrator can also adjust the Video Stream, and restrict access to the videostream to known users by requiring viewers to supply a username and password. See Chapter 4 - Advanced Viewing Setup for details.x To make Live Video from the camera available via the Internet, your Internet Gateway or Router must be configured correctly. See Making Video available from the Internet inChapter 4 - Advanced Viewing Setup for details.RequirementsTo view the live video stream generated by the Network Camera, you need to meet thefollowing requirements:x Windows 98/98SE, Windows 2000, Windows XP, Windows Vista.x Internet Explorer 5.5 or later.Connecting to a Camera on your LAN To establish a connection from your PC to the Network Camera: 1. Use the Windows utility to get the IP address of the Network Camera.2. Start Internet Explorer.3. In the Address box, enter "HTTP://" and the IP Address of the Network Camera.4. When you connect, the following screen will be displayed.14
Figure 11: Home Screen5. Click View Video.6. If the Administrator has restricted access to known users, you will then be prompted for ausername and password.Enter the name and password assigned to you by the Network Camera administrator.7. The first time you connect to the camera, you will be prompted to install an ActiveXcomponent (OCX or CAB file), as in the example below.You must install this ActiveX component (OCX or CAB file) in order to view theVideo stream in Internet Explorer. Click the "Yes" button to install the ActiveX component.Figure 12: ActiveX OCX Prompt8. Video will start playing automatically. There may be a delay of a few seconds while thevideo stream is buffered.15
Connecting to a Camera via the Internet You can NOT connect to a camera via the Internet unless the cameraAdministrator has configured both the camera and the Internet Gateway/Routerused by the camera. See Making Video available from the Internet in Chapter 4 - Advanced Viewing Setup fordetails of the required configuration.Also, you need a broadband Internet connection to view video effectively. Dial-up connectionsare NOT supported.To establish a connection from your PC to the Network Camera via the Internet:1. Obtain the following information from the Administrator of the camera you wish to connect to: x Internet IP Address or Domain Name of the camera.x Port number for HTTP connections.x Login (username, password) if required.2. Start Internet Explorer.3. In the Address box, enter the following:HTTP://Internet_Address:port_numberWhere Internet_Address is the Internet IP address or Domain Name of the camera,and port_number is the port number used for HTTP (Web) connections to the camera.Examples using an IP address: HTTP://203.70.212.52:1024 Where the Internet IP address is 203.70.212.52 and the HTTP port number is 1024.Example using a Domain Name: HTTP://mycamera.dyndns.tv:1024 Where the Domain name (using DDNS in this example) is mycamera.dyndns.tv and the HTTP port number is 1024.16
4. When you connect, the following screen will be displayed.Figure 13: Home Screen5. Click View Video.6. If the Administrator has restricted access to known users, you will then be prompted for ausername and password.Enter the name and password assigned to you by the Network Camera administrator.7. The first time you connect to the camera, you will be prompted to install an ActiveXcomponent (OCX or CAB file), as in the example below.You must install this ActiveX component (OCX or CAB file) in order to view theVideo stream in Internet Explorer. Click the "Yes" button to install the ActiveX component.Figure 14: ActiveX OCX Prompt8. Video will start playing automatically. There may be a delay of a few seconds while thevideo stream is buffered.17
Viewing Live Video After installing the ActiveX component, you be able to view the live video stream in its ownwindow, as shown below.Adjust focus manually by turning the front lens until the video becomes clear. Figure 15: View Video ScreenThere are a number of options available on this screen, accessed by select list, button or icon.See the table below for details.General Options These options are always available, regardless of the type of camera you are connected to. ON.  Click this to set the output I/O port to ON mode.OFF.  Click this to set the output I/O port to OFF mode.Day. Use this to get better video quality during the daytime.Night. Use this to get better video quality during the nighttime.Resolution. Select the desired video resolution format.Zoom. A digital zoom feature is available. To zoom in on a section of thewindow, click this icon. Then use your mouse to select the section you wantto magnify. Click the icon again to disable the zoom feature.18
Snapshot.  Click this to take a single JPEG "snapshot" image of the currentvideo.Flip.  Click this to have the image swapped top-to-bottom.Mirror.  Click this to have the image swapped left-to-right.Audio On.  This icon is displayed if audio is On. Click on the icon to turnaudio Off.Audio Upload. This icon is displayed when the Speaker (Audio & Videoscreen) is enabled. Use this slider to adjust the volume.Volume.  Use this slider to adjust the volume.Setup. Select the desired setup format from the drop-down list.Setting the Focus After viewing the live video, you need to adjust focus manually by turning the front lens untilthe video becomes clear. 19
4Chapter 4Advanced Viewing Setup This Chapter provides information about the optional settings and features forviewing video via the Network Camera. This Chapter is for the CameraAdministrator only. IntroductionThis chapter describes some additional settings and options for viewing live Video:x Adjusting the video imagex Controlling user access to the live video streamx Making video available from the Internetx Using the Motion Detection feature Adjusting the Video Image If necessary, the Network Camera Administrator can adjust the Video image. Settings are provided for:x Resolution - Select the desired resolution format. The larger sizes require greaterbandwidth.x Video quality - This determines the degree of compression applied to the Video stream.Higher quality requires greater bandwidth.x Frame Rate - Select the max frame rate to determine the bandwidth required by the videostream.x Power Line frequency - Select 50Hz or 60Hz power line frequency, as used in yourregion. The correct setting will improve the picture quality under florescent lighting.x White Balance - Select the correct white balance for your environment.x Brightness - Adjust the brightness of the image.x Sharpness - Select the desired option for the sharpness.x Contrast - Select the desired option for the contrast. You can select a contrast valuebetween -3 and 3.x Microphone - If enabled, audio can be included in the video stream.x Time Stamp - If enabled, the time will be displayed on the Video image.x Text Overlay - If enabled, up to 20 characters can be superimposed on the Video image.This is useful for identifying the camera.x Day/Night Switch - If enabled, the Network Camera can get better video quality even in the nighttime.20
To Adjust the Video Image: 1. Connect to the Web-based interface of the Network Camera. (See Chapter 5 - Web-basedManagement for details.)2. Select Video & Audio. You will see a screen like the example below. Figure 16: Video & Audio Screen 3. Make the required adjustments, as explained below, and save your changes.MPEG-4 Settings Resolution Select the desired video resolution format.  The default resolution isset to 320*240.21
Video QualityControlx Constant Bit Rate: Select the desired bit rate. The default is set to 1.2 Mbps.x Fixed Quality: Select the desired option. The default fix qualityis set to Normal.Max. Frame Rate Select the desired Maximum frame rate for the video stream.MJPEG SettingsResolution Select the desired video resolution format.  The default resolution isset to 320*240.Fixed VideoQualitySelect the desired fix quality. The default fix quality is set toNormal.Max. Frame Rate Select the desired Maximum frame rate for the video stream.Mobil Settings Enable MobilStreamingEnable streaming video for the mobile device by checking thischeckbox.Resolution The default resolution is set to 160x120.Video QualityControlx Constant Bit Rate: Select the desired fix bit rate.x Fixed Quality: Select the desired option. The default fix qualityis set to Normal.Max. Frame Rate Select the desired Maximum frame rate for the video stream. The default maximum frame rate is set to 15 fps.Access Code Enter the code for accessing the live video from camera through cell phone connection.Video Adjustments Power line frequencySelect the power line frequency (50Hz or 60Hz) used in your region,to improve the picture quality under florescent lighting.White Balance Select the desired option to match the current environment andlighting.Brightness If necessary, you can adjust the brightness to obtain a better image.For example, if the camera is facing a bright light, the image may be too dark. In this case, you can increase the brightness.Sharpness Select the desired option for the sharpness. You can select a Sharpness value between -3 and 3. Contrast Select the desired option for the contrast. You can select a Contrastvalue between -3 and 3. OptionsMicrophone Enable audio by checking this checkbox. Using Audio will increasethe bandwidth requirements slightly.Audio Type Select the desired audio type.Speaker Enable speaker feature by checking this checkbox.Time Stamp  If enabled, the current time will be displayed on the Video image.22
Text Overlay Enable this setting if you want text to be displayed on the Videoimage, and enter the desired text - up to 20 characters. This featureis often used to identify each camera when multiple cameras are installed.Day/Night SwitchEnable Night Vision ScheduleEnable Night switch schedule by checking this checkbox.Start Time  Choose the desired start time using a 24 hr clock.End Time  Choose the desired end time using a 24 hr clock.23
Controlling User Access to the Video Stream By default, anyone can connect to the Network Camera and view live Video at any time.If desired, you can limit access to scheduled times, and also restrict access to known users.To Control User Access to Live Video: 1. Connect to the Web-based interface of the Network Camera. (See Chapter 5 - Web-basedManagement for details.)2. Select Video Access.3. Set the desired options for Access.AccessIf the Video Access is disabled, users cannot connect using either their Web Browser or theWindows utility. However, viewing video is still possible by logging in as the Administrator.Figure 17: Controlling User AccessSee Chapter 5 - Web-based Management for further details about using the Video Access and User Database screens.24
Making Video available from the Internet If your LAN is connected to the Internet, typically by a Broadband Gateway/Router andBroadband modem, you can make the Network Camera available via the Internet. You willneed to configure your Router or Gateway to allow connections from the Internet to the camera.Router/Gateway SetupYour Router or Gateway must be configured to pass incoming TCP (HTTP) connections (fromInternet Viewers) to the Network Camera. The Router/Gateway uses the Port Number todetermine which incoming connections are intended for the Network Camera. This feature is normally called Port Forwarding or Virtual Servers, and is illustrated below.The Port Forwarding/Virtual Server entry tells the Router/Gateway that incoming TCP connections on port 1024 should be passed to the Network Camera. If necessary, check theuser manual for your Router/Gateway for further details.Figure 18: Connecting via the InternetThe "Port" for the Port Forwarding / Virtual Server entryabove is the " Secondary Port" number specified on the Network screen of the Network Camera. 25
Network Camera Setup The Network Camera configuration does NOT have be changed, unless:x You wish to change the port number from the default value (1024).x You wish to use the DDNS (Dynamic DNS) feature of the Network Camera.HTTP Port ConfigurationNormally, HTTP (Web) connections use port 80. Since the Network Camera uses HTTP, butport 80 is likely to be used by a Web Server, you can use a different port for the NetworkCamera. This port is called the Secondary Port.The default Secondary Port is 1024. If you prefer to use a different port number, you canspecify the port number on the Network Camera's Network screen, as shown below.Figure 19: Network ScreenSee Chapter 5 - Web-based Management for further details on using the Network screen.Viewers need to know this port number in order to connectand view live Video, so you must inform viewers of the correct port number. DDNS (Dynamic DNS)Many internet connections use a "Dynamic IP address", where the Internet IP address is allocated whenever the Internet connection is established.This means that other Internet users don't know the IP address, so can't establish a connection.DDNS is designed to solve this problem, by allowing users to connect to your LAN using a domain name, rather than an IP address.To use DDNS: 1. Register for the DDNS service with a supported DDNS service provider. You can thenapply for, and be allocated, a Domain Name.2. Enter and save the correct DDNS settings on the DDNS screen of the Network Camera.26
Figure 20: DDNS Screen 3. Operation is then automatic:x The Network Camera will automatically contact the DDNS server whenever it detectsthat the Internet IP address has changed, and inform the DDNS server of the new IPaddress.x Internet users can then connect to the camera using the Domain Name allocated by theDDNS service provider.Viewing Live Video via the Internet Clients (viewers) will also need a broadband connection; dial-up connections are NOTrecommended.Viewing Live Video Using your Web BrowserIf using your Web browser, you need to know the Internet IP address (or the Domain name) ofthe camera's Router/Gateway, and the correct port number.Enter the Internet address of the Router/Gateway, and its port number, in the Address (orLocation) field of your Browser.Example - IP address: HTTP://203.70.212.52:1024 Where the Router/Gateway's Internet IP address is 203.70.212.52 and the "SecondaryPort" number on the Network Camera is 1024.Example - Domain Name: HTTP://mycamera.dyndns.tv:1024 27
Where the Router/Gateway's Domain name is mycamera.dyndns.tv and the "SecondaryPort" number on the Network Camera is 1024.Viewing Live Video with the Viewing/Recording UtilityIf using the Windows Viewing/Recording Utility, the details of the Network Camera must beentered on the Camera Setup screen. Figure 21: Add Camera from LANSee Chapter 6 - Window Viewing/Recording Utility for full details on using the WindowsViewing/Recording utility.28
Motion Detection Alerts The Motion Detection feature can generate an Alert when motion is detected.The Network Camera will compare consecutive frames to detect changes caused by themovement of large objects.But the motion detector can also be triggered by:x Sudden changes in the level of available lightx Movement of the camera itself. Try to avoid these situations. The motion detection feature works best in locations where thereis good steady illumination, and the camera is mounted securely.To Use Motion Detection AlertsUsing the Web-based interface on the Network Camera, select the Motion Detection screen,then configure this screen as described below.Figure 22: Motion Detection1. Enable the Motion Detection feature. 2. Set the areas of the video image to be examined for movement. You can define up to 4areas, and set the motion threshold individually for each area.3. If using a schedule, define the desired schedule in Event Trigger screen.4. Save your changes.5. Select the Event Trigger screen to have alerts sentx Enable Trigger Event and check the box of Motion Detection.x Select the desired options for sending the alerts. 29
5Chapter 5Web-based Management This Chapter provides Setup details of the Network Camera’s Web-basedInterface. This Chapter is for the Camera Administrator only.IntroductionThe Network Camera can be configured using your Web Browser. The Network Camera musthave an IP address which is compatible with your PC.The recommended method to ensure this is to use the supplied Windows-based Wizard, asdescribed in Chapter 2 - Basic Setup.Connecting to Network Camera x If using only your Web Browser, use the following procedure to establish a connectionfrom your PC to the Network Camera:x Once connected, you can add the Network Camera to your Browser's Favorites orBookmarks.Connecting using your Web Browser1. Use the Windows utility to get the IP address of the Network Camera.2. Start your WEB browser.3. In the Address box, enter "HTTP://" and the IP Address of the Network Camera. 4. You will then be prompted for a username and password.x If using the default values, enter administrator for the name, and leave the password blank.x Otherwise, enter the Administrator ID and Administrator Password set on theMaintenance screen.30
Welcome Screen When you connect, the following screen will be displayed.Figure 23: Welcome ScreenThe menu options available from this screen are: x View Video - View live Video using your Web Browser. See Chapter 3 - Viewing LiveVideo for details.x Administration - Access the Administration menu.31
Administration Menu Clicking on Administration on the menu provides access to all the settings for the NetworkCamera.The Administration menu contains the following options:Setupx Systemx Networkx Wirelessx DDNSx IP Filterx I/O PortVideo & Audiox Video & Audiox Video Accessx User DatabaseEventx Motion Detectionx E-Mailx FTPx Instant Messagingx Event TriggerAdministrationx Maintenancex Statusx Log32
System Screen After clicking Administration on the main menu, or selecting System on the Setup menu, youwill see a screen like the example below.Figure 24: System ScreenData - System Screen System Settings Device ID  This displays the name for the Network Camera. Description This field is used for entering a description, such as the location of the Network Camera.Date & TimeDate Format Choose the desired format from the drop-down list. CurrentDate & Time This displays the current date and time on the camera.If it's not correct, click the Change button to modify the date/timesettings. This button will open a sub-screen where you have 2 options:x Set the camera's date and time to match your PC.x Enter the correct date and time. Timezone Choose the Timezone for your location from the drop-down list.If your location is currently using Daylight Saving, enable the Adjustfor daylight saving checkbox.You must UNCHECK this checkbox when Daylight Savingfinishes.33
Network TimeProtocolEnable or disable the Time Server feature as required.If Enabled, the Network Camera will contact a Network Time Server at regular intervals and update its internal timer.NTP ServerAddressEnter the address for the desired NTP server.Update The Schedule determines how often the Network Camera contacts theNTP Server.Select the desired options.LED Operation  If Disabled, the LED of the Network Camera will be in off state. 34
Network ScreenThis screen is displayed when the Network option is clicked.Figure 25: Network ScreenData - Network ScreenNetworkObtain an AddressAutomaticallyIf selected, the Network Camera will obtain its IP address andrelated information from a DHCP Server. Only select this option if your LAN has a DHCP Server.Use the following IPAddressIf selected, you must assign the following data to the NetworkCamera.x IP Address - Enter an unused IP address from the addressrange used on your LAN.x Subnet Mask - Use the same value as PCs on your LAN.x Default Gateway - Use the same value as PCs on your LAN.35
Obtain DNS serveraddressautomaticallyIf selected, the Network Camera will use the DNS address or addresses provided by the DHPC server.This option is only available if the IP address setting is Obtain anIP address Automatically.Use the following DNS server addressPrimary DNS server - Use the same value as PCs on your LAN.Normally, your ISP will provide this address.Secondary DNS server - This is optional. If entered, this DNS willbe used if the Primary DNS does not respond.Secondary Port  x HTTP Secondary Port - If enabled, you can connect usingeither port 80 or the Secondary port. You must enter theSecondary port number (between 1024 to 65535) in the fieldprovided.x HTTPS Secondary Port - If enabled, you can connect usingeither port 80 or the Secondary port. You must enter theSecondary port number (between 1024 to 65535) in the fieldprovided.Note that when using a port number which is not 80, you mustspecify the port number in the URL. For example, if the Camera's IP address was 192.168.1.100 and the Secondary port was 1024,you would specify the URL for the Camera as follows: http://192.168.1.100:1024RTP/RTSP The RTSP (Real Time Streaming Protocol), a standard forconnected client(s) to control streaming data (MPEG-4) over theWorld Wide Web. Enter the RTSP Port number (between 1024 and65535) in the field provided. The default RTSP Port is 554.The RTP (Real Time Transport Protocol), an Internet protocol fortransmitting real-time data such as audio and video.Max RTP Data Packet field will let users limit the size of the sending packet. Enter the desired value between 400 and 1400.Video Address Enter the address of video.Video Port Enter the desired value (between 1024 to 65534) in the fieldprovided. The number you entered must be even values.Audio Address Enter the address of the audio.Audio Port Enter the desired value (between 1024 to 65534) in the fieldprovided. The number you entered must be even values.Time to Live Enter the desired length of time, if the packets fail to be deliveredto their destination within. The Time to Live you entered must bein-between 1 to 255.UPnPEnable Discovery  If enabled, the Network Camera will broadcast its availabilitythrough UPnP. UPnP compatible systems such as Windows XP will then be able to detect the presence of the Network Camera.Enable Traversal If enabled, HTTP connections (from your Web Browser or theViewer and Recorder utility) can use secondary port instead of port80 (the standard HTTP port) to access the camera.36
QoSEnable QoS Mode  If enabled, the throughput level (for Video and Audio) is guaranteed through QoS (Quality of Service).37
Wireless Screen (Wireless Model Only)This screen is displayed when the Wireless option is clicked.Figure 26: Wireless ScreenData - Wireless Screen Wireless NetworkNetwork Type Select the network type of wireless communication used by theNetwork Camera.SSID This must match the value used by other devices on your wirelessLAN.Note! The SSID is case sensitive.Domain Select your domain from the drop-down list. Channel No  x In Infrastructure mode, you cannot set the Channel. TheNetwork Camera will use the Channel set on the Access Point.x For Ad-hoc mode, select the Channel you wish to use on yourNetwork Camera. This should match the Channel used on theother Wireless Stations.x If you experience interference (shown by lost connectionsand/or slow data transfers) you may need to experiment withdifferent channels to see which is the best.38
SecuritySecurity System Select the desired option, and then enter the settings for the selectedmethod:x Disabled - No security is used. Anyone using the correct SSIDcan connect to your network.x WEP - The 802.11b standard. Data is encrypted beforetransmission, but the encryption system is not very strong.x WPA/WPA2 Personal - Like WEP, data is encrypted beforetransmission. WPA is more secure than WEP, and should beused if possible. WPA Personal is the version of WPA whichdoes NOT require a Radius Server on your LAN.WEPAuthentication Type Select the appropriate value - "Open System" or "Shared Key."Check your wireless card's documentation to see what method touse.Note: In Infrastructure mode, either setting will normally work,since most Access Points can use both methods.WEP Encryption Select the WEP Encryption level:x 64 Bit Keys (10 Hex Characters)x 128 Bit Keys (26 Hex Characters)x 64 Bit Keys (5 ASCII Characters)x 128 Bit Keys (13 ASCII Characters)Passphrase Enter a word or group of printable characters in the Passphrase boxand click the "Generate Keys" button to automatically configure theWEP Key(s). If encryption strength is set to 64 bit, then each of thefour key fields will be populated with key values. If encryptionstrength is set to 128 bit, then only the selected WEP key field will be given a key value.WEP Keys x Use the radio buttons to select the default key.x Enter the key value you wish to use. Other stations must havethe same key values.x Keys must be entered in Hex. Hex characters are the digits ( 0 ~ 9 ) and the letters A ~ F.x Click Clear Keys to set the Keys to be blank.WPA/WPA2 Personal Shared Key Enter the key value. Data is encrypted using a key derived from thenetwork key. Other Wireless Stations must use the same networkkey. The PSK must be from 8 to 63 characters in length.39
DDNS ScreenMany internet connections use a "Dynamic IP address", where the Internet IP address is allocated whenever the Internet connection is established.This means that other Internet users don't know the IP address, so can't establish a connection.DDNS is designed to solve this problem, as follows:x You must register for the DDNS service with a DDNS service provider. The DDNSService provider will allocate a Domain Name to you upon request.x The DDNS settings on the DDNS screen above must be correct.x The Network Camera will then contact the DDNS server whenever it detects that theInternet IP address has changed, and inform the DDNS server of the new IP address. (TheCheck WAN IP Address determines how often the Network Camera checks if the InternetIP address has changed.)This system allows other internet users to connect to you using the Domain Name allocated bythe DDNS service provider. This screen is displayed when the DDNS menu option is clicked.Figure 27: DDNS Screen Data - DDNS Screen DDNSDDNSEnable/DisableEnable or disable the DDNS function, as required.Only enable this feature if you have registered for the DDNS Service with a DDNS Server provider.Service Provider Choose a service provider from the list. 40
Web Site Button Click this button to open a new window and connect to the Website for the selected DDNS service provider.Domain (Host)NameEnter the Domain Name (Host Name) allocated to you by theDDNS Server provider.Account/E-Mail Enter the login name or the E-mail address for the DDNS account.Password/Key Enter the password/key for the DDNS account. Check WAN IPAddressSet the schedule for checking if the Internet IP address has changed. If the IP address has changed, the DDNS Server will benotified.NOTE: If the DDNS Service provided some software to performthis IP address update or notification, you should NOT use thissoftware. The update is performed by the camera.41
IP Filter Screen This screen is displayed when the IP Filter option is clicked.Figure 28: IP Filter ScreenData - IP Filter ScreenIP FilterIP Filter The IP Filter feature allows administrators to control networkcamera access by filtering IP address. Select the desired optionfrom the drop-down list. Single/Range Enter an IP address or a range of IP addresses you would like to allow or deny.42
I/O Port Screen The Network Camera supports 2 input ports and 2 output ports. This screen is displayed whenthe I/O Port menu option is clicked.Figure 29: I/O Port ScreenData - I/O Port ScreenInput PortsCurrent State It indicates the current state of the input port. Once the configuredstate is happened, it will trigger the event actions.Triggered When…  Select the desired State: x Highx Lowx Risingx FallingOutput PortsCurrent State It indicates the current state of the output port.Default State Select the desired option from the drop-down list. Manual Trigger  Select the option to control the output state. Action WhenTriggeredIf an event is happened, it will trigger the event alerting.43
Video & Audio ScreenThis screen is displayed when the Video & Audio option is clicked.Figure 30: Video & Audio Screen Data - Video & Audio ScreenMPEG-4 Settings Resolution Select the desired video resolution format.  The default resolution isset to 320*240.44
Video QualityControlx Constant Bit Rate: Select the desired bit rate.x Fixed Quality: Select the desired option. The default fix qualityis set to Normal.Max. Frame Rate Select the desired Maximum frame rate for the video stream.MJPEG SettingsResolution Select the desired video resolution format.  The default resolution isset to 320*240.Fixed VideoQualitySelect the desired fix quality. The default fix quality is set toNormal.Max. Frame Rate Select the desired Maximum frame rate for the video stream.Mobil Settings Enable MobilStreamingEnable streaming video for the mobile device by checking thischeckbox.Resolution The default resolution is set to 160x120.Video QualityControlx Constant Bit Rate: Select the desired fix bit rate.x Fixed Quality: Select the desired option. The default fix qualityis set to Normal.Max. Frame Rate Select the desired Maximum bandwidth for the video stream.Access Code Enter the code for accessing the live video from camera through cell phone connection.Video Adjustment Power line FrequencySelect the power line frequency (50Hz or 60Hz) used in your region,to improve the picture quality under florescent lighting.White Balance Select the desired option to match the current environment andlighting.Brightness If necessary, you can adjust the brightness to obtain a better image.For example, if the camera is facing a bright light, the image may be too dark. In this case, you can increase the brightness.Sharpness Select the desired option for the sharpness. You can select a Sharpness value between -3 and 3. Contrast Select the desired option for the contrast. You can select a Contrastvalue between -3 and 3. OptionsMicrophone Enable audio by checking this checkbox. Using Audio will increasethe bandwidth requirements slightly.Audio Type Select the desired audio type.Speaker Enable speaker feature by checking this checkbox.Time Stamp  If enabled, the current time will be displayed on the Video image.Text Overlay Enable this setting if you want text to be displayed on the Videoimage, and enter the desired text - up to 20 characters. This featureis often used to identify each camera when multiple cameras are installed.45
Day/Night SwitchEnable Night Vision ScheduleEnable Night switch schedule by checking this checkbox.Start Time  Choose the desired start time using a 24 hr clock.End Time  Choose the desired end time using a 24 hr clock.46
Video Access ScreenThis screen is displayed when the Video Access option on the Video & Audio menu is clicked.Figure 31: Video Access ScreenData - Video Access Screen Enable SecurityCheckingx If disabled - No login required, users do not have to provide ausername and password when they connect to the camera to view video.x If enabled - Require login, users will be prompted for a username and password when they connect to the camera to view video. The camera administrator must use the "UserDatabase" menu option to create the desired users.Enable ScheduledVideo Accessx If enabled - Camera is available during the scheduled periods,and unavailable at other times. If this option is selected, you need to define a schedule. If no schedule is defined, this optionis always disabled.x If disabled – The option will remain disabled until you enable it. Note that regardless of which setting is chosen, the Administratorcan ALWAYS access the camera and view live video.Access ScheduleScheduled Periods This displays all periods you have entered into the database. If youhave not entered any periods, this list will be empty.Delete Use the Delete button to delete the selected item in the list. 47
Add New ScheduleDay Choose the desired option for the period.Start Time  Enter the start time using a 24 hr clock.End Time  Enter the end time using a 24 hr clock.Add Click this button to add a new period.48
User Database ScreenThis screen is displayed when the User Database option on the Video & Audio menu is clicked.Figure 32: User Database Screen Data - User Database Screen Existing UsersUser List  This displays all users you have entered into the User database. If you have not entered any users, this list will be empty. The cameracan let you save up to 20 cameras in the database.Edit, Delete, Delete AllUse these buttons to manage the user database.User PropertiesUser Name  Enter the name for the user here.x Spaces, punctuation, and special characters must NOT be usedin the name.x The name is case insensitive (case is ignored), so you can nothave 2 names which differ only by case.User Password The password for this user.Confirm Password Re-enter the password for the user, to ensure it is correct. Control Level Select the desired control level for the user you plan to add. (*Operator level allows user to switch day/night vision and to triggeroutput ports manually)Add Button Click this button to add a new user, using the data shown on screen.49
Clear Button Use this button to clear the input fields, ready to add a new user.50
Motion Detection Screen This screen is displayed when the Motion Detection option on the Event menu is clicked..Figure 33: Motion Detection ScreenData - Motion Detection Screen Motion DetectionSet Detection Areas You can set the full screen or areas of the video image to be examined.Note:  Motion detection can be triggered by rapid changes inlighting condition, as well as by moving objects. For this reason, it should only be used indoors.Threshold Adjust the threshold of detection for each area51
E-Mail Screen This screen is displayed when the E-Mail option on the Event menu is clicked.Figure 34: E-Mail ScreenData - E-Mail Screen Primary/Secondary SMTP ServerSMTP ServerAddressEnter the address of the SMTP (Simple Mail Transport Protocol)Server to be used to send E-Mail.Authentication Select the desired Authentication type for the SMTP Server.SMTP Login name Enter your login name for the SMTP Server.SMTP Password Enter your password for the SMTP Server.POP server name Enter the name for the POP Server.Secondary SMTP Check the box to upload to the Secondary SMTP if the camera can not connect to the primary SMTP.E-Mail Setup E-Mail Address  Enter at least one (1) E-Mail address; the 2nd and 3rd addresses areoptional. The E-mail alert will be sent to the E-mail address or addresses specified here.52
Subject Enter the desired text to be shown as the "Subject" for the E-Mailwhen it is received. Subject can not exceed 48 alphanumericcharacters.Show "From" as Enter the E-Mail address to be shown in the "From" field when the E-mail is received. 53
FTP Screen This screen is displayed when the FTP option on the Event menu is clicked.Figure 35: FTP ScreenData - FTP Screen Primary/Secondary FTP FTP Server Enter the address of the FTP Server.Port Enter the Port of the FTP Server to be connected.Login name Enter your login name for the FTP Server.Password Enter your password for the FTP Server.Enable PassiveModeCheck the box to enable the Passive mode feature of the FTP.File Path Name Enter the file path/name of the FTP. Secondary FTP Check the box to upload to the Secondary FTP if the camera can notconnect to the primary FTP. 54
Instant Messaging Screen This screen is displayed when the Instant Messaging option on the Event menu is clicked.Figure 36: Instant Messaging ScreenData - Instant Messaging Screen JabberEnable Enable this checkbox to use Jabber, which is a free InstantMessaging (IM).Server Address Enter the address of your Jabber Server.Login ID  Enter your login ID for the Jabber account.Password Enter your password for the Jabber account.Send To The log will be sent to the e-mail address you specified here.Message Enter the message you wish to attach with the sending log.HTTP NotificationEnable Enable this checkbox to use the HTTP Notification.URL Enter the URL of your HTTP notification server.Proxy ServerNameSpecify the proxy server name in the provided field if the cameraneeds to pass through a Proxy Server to do the HTTP notification.Port Number Enter the port number for the proxy server.55
Method Select the desired method of form data encoding.x Get - It should be used if and only if the form processing isindependent, which typically means a pure query form.Generally it is advisable to do so.x Post - If there are problems related to long URLs and non-ASCIIcharacter repertoires, which can make it necessary to use"POST" even for independent processing.56
Event Trigger Screen This screen is displayed when the Event Trigger option on the Event menu is clicked.Figure 37: Event Trigger ScreenData - Event Trigger ScreenEvent ScheduleSchedule List The Event Schedule shows all of the event types currentlyconfigured in the Network Camera, along with various informationabout their configuration, as listed below:x Name - the descriptive event name set by the user.x Effective Time Frame - shows when the event at a set time will be triggered.x Trigger by - shows what kind trigger activate the event.x Action - shows what kind of the actions will be issued when theevent been triggeredNew ScheduleEffective TimeFrameChoose the desired option for the period.Start Time  Choose the desired start time using a 24 hr clock.57
End Time  Choose the desired end time using a 24 hr clock.Trigger EventEnable Check to perform all of the event(s) that were configured andscheduled.Interval Select the desired option for the events interval. (* "0" = No Delay)Trigger by  x Input 1 / 2 - This describes the states that the input(s) must be infor an event to be triggered. Only one input can be used, alsonote that the states for all the inputs used must be reached before the event will be triggered.x Motion Detection - Movement in a motion detection windowcan be used to trigger events.Actions x E-Mail - If checked, an E-Mail (with "Attachment") will bedelivered to the SMTP server. (SMTP Server must be configured on the E-Mail page.)x FTP - If checked, an FTP upload will be activated to the FTP server. (FTP servers must be configured on the FTP page.)x Output 1 / 2 - If checked, the output port(s) state will beactivated as configured. (Output port(s) must be configured onthe I/O Port page.)x Instant Messaging - If checked, an Instant Messaging (IM) will be delivered to the Jabber server. (Jabber server must beconfigured on the Instant Messaging page.)Attachment Type x Overwrite/Replace oldest video fileCheck to overwrite/replace the oldest video clip with the currentrecording when detecting device's SDRAM is full.x JPEG Image:Frame Rate - Select the desired capture rate for the JPEGimage(s) here.Pre/Post Capture - Select the desired length. The snapshot(s) ofthe JPEG image depends on this setting, and also the file sizeand degree of compression.x Video:Video Format - Select the desired type for the video file.Pre/Post Capture - Select the desired length. The size of the file depends on this setting, and also the Video size and degree ofcompression.58
Maintenance Screen.Figure 38: Maintenance ScreenData - Maintenance Screen Administrator Login AdministratorIDEnter the name for the Administrator here.Spaces, punctuation, and special characters must NOT be used in the name.AdministratorPasswordEnter the password for the Administrator.Verify Password Re-enter the password for the Administrator, to ensure it is correct.Firmware UpgradeUpgrade File  Click the "Browse" button and browse to the location on your PC where you stored the Firmware file. Select this file. Start Click this button to upgrade the Firmware. When the upgrade is finished, the Network Camera will restart, and this managementconnection will be unavailable during the restart.Clear File Name This does NOT stop the Upgrade process if it has started. It only clearsthe input for the "Upgrade File" field.59
Backup & RestoreBackupConfigurationFileClick Backup button to save the current configuration information to a text file. RestoreConfigurationFileClick Restore button to reinitialize the camera to load the new updatedsoftware. Do this after loading the upgrade file.Clear File Name This does NOT stop the Restore process if it has started. It only clearsthe input for the "Restore Configuration File" field.ButtonsDefaults Click Defaults button to reload the default settings of the camera. Restart Click Restart button to restart the camera.60
Status ScreenFigure 39: Status Screen Data - Status Screen SystemDevice Name This shows the name of the Network Camera.Description This shows the description of the Network Camera, such as location.F/W version The version of the current firmware installed.NetworkMAC Address The current IP address of the Network Camera.IP Address  The IP Address of the Network Camera.Network Mask The network mask associated with the IP address above.Gateway The IP Address of the remote Gateway associated with the IP Addressabove.WirelessNetwork Type This shows the Network Type currently in use (Ad-hoc orInfrastructure).61
SSID This displays the wireless SSID. Channel This shows the wireless channel currently used.Security The current security setting for Wireless connections.Signal Strength This shows the strength of the signal.MPEG-4/MJPEGResolution The image size of the video stream.Video Quality This displays the image quality of the video stream.Frame Rate  This displays the frame rate of the video stream.ButtonsRefresh Update the data shown on screen.62
Log Screen This screen displays a log of system activity.Figure 40: Log ScreenData - Log Screen LogSystem Log This is a log of system activity.Enable SyslogServiceCheck the box to enable the System Log Server feature. Syslog ServerAddressEnter the address of the Syslog Server.RefreshButtonClick this to update the data shown on screen.Clear Log Click this button to restart the log.63
6Chapter 6Windows Viewing/Recording UtilityThis Chapter describes how to view and record the live video streamgenerated by the Network Camera, using the supplied Windows utility.OverviewThe recommended method to view video is to use the supplied Windows Viewing/Recordingutility. This utility also allows you to record the video streams, either interactively or using a schedule.Installation1. Insert the supplied CD-ROM into your drive. If the setup program does not startautomatically, run NeutralCamera.exe in the root folder. You will see the Welcomescreen shown below.Figure 41: Welcome Screen2. Click the Install Utility button to start the installation of the Viewing/Recording Utility.3. Follow the prompts to complete the installation.64
System Tray Icon When started, the program will create an icon in the Windows system tray on the taskbar, as shown below.Figure 42: System Tray IconThis Icon has the following functions:x Double-click - This will display the version number.x Right Click - This provides a menu which allows you to view program details, view themain screen, or terminate the program.Main Screen When started, a screen like the example below will be displayed.Figure 43: Main ScreenIf no cameras have been defined, no video will be displayed. See the following section forinformation on defining a camera. Note that each Camera is given a number (Channel Number).65
Camera Setup To define a camera and associate it with a Channel Number.1. Click the Setup button on the main screen. You will see a screen like the example below.Figure 44: Camera Setup Screen2. Select the desired Channel number in the left (No.) column.3. There are 2 radio buttons, for LAN or Internet. The default is LAN. See the followingsection for details of the Internet option.x The LAN panel, on the left, displays all Network Camera found on your LAN. Thislist can be updated by clicking the Refresh button.x The Camera Data panel, on the right, displays the data for the selected camera.4. To associate a camera with the current Channel:x Select a camera in the list on the left.x Enter the value of Local ID.x Check that the Camera Data shown on the right is correct. See below for details.x Click the Add button. The camera will now appear in the Channel List.Camera Data - LAN Local ID  This is the name you gave to this camera. This field must be entered.Camera Name This is the default name for the Network Camera, and cannot bechanged.IP Address  The current IP address of the Network Camera.66
Port Number This will normally display "80". Only change this if requested to do soby the Network Camera Administrator.Login The camera Administrator can require that users provide a username and password before being allowed to view the live video.x If the Administrator has not enabled this option, the Login fields canbe left blank.x Otherwise, you must enter the username and password allocated toyour by Administrator.Stream Type Select the desired video stream type. There might be either MPEG4 orMJPG streaming type.Setup CameraPagesClick this button to connect the Web-based interface of the CameraEnable TriggerEventCheck this if you want the Camera to have the feature enabled.You can add the same Camera twice, once for the LAN (using the LAN IP address), and again for the Internet (using the Internet IP address). This will allow viewing the camera whetheryou are on the same LAN as the camera or in a remote location.67
Adding Cameras on the Internet If the Network Camera you wish to add is not on your LAN, but is available via the Internet,click the Internet button. You will see a screen like the example below.Figure 45: Add Camera from InternetTo associate a camera with the current Channel:1. Enter the Camera Data on the panel on the right. See below for details.2. If desired, click the Test button to check that a connection and login can be performedsuccessfully. Note that if the remote LAN does not currently have an Internet connection, or the remote camera is not on-line, the test will fail because no connection is possible.3. Click the Add button. The camera will now appear in the Channel List.Camera Data - Internet Local ID  This is the name you gave to this camera. This field must be entered.Camera Name This is the default name for the Network Camera, and cannot bechanged.This field will be displayed automatically once a connection to theNetwork Camera has been established.IP Address  Enter the Domain Name or Internet IP address of the desired NetworkCamera.Port Number Enter the port number used by the Network Camera for connections viathe Internet The Camera Administrator can advise you of the port to use.The default value is 1024.68
Login The camera Administrator can require that users provide a username and password before being allowed to view the live video.x If the Camera Administrator has not enabled this option, the Loginfields can be left blank.x Otherwise, you must enter the username and password allocated toyou by the Camera Administrator.Stream Type Select the desired video stream type. There might be either MPEG4 orMJPG streaming type.Setup CameraPagesClick this button to connect the Web-based interface of the CameraEnable TriggerEventCheck this if you want the Camera to have the feature enabled.You can add the same Camera twice, once for the LAN, and again for the Internet. This will allow viewing the camera whether you are on the same LAN as the camera or in a remote location.69
Main Screen You can view live video in the main screen. The built-in software can let you view up to 9cameras on a single computer screen at one central location. The Icons allow you to control the cameras and video streams.Channel (Camera) Selection.Use this to select the desired Channel (Camera) by clicking on the top row. Thispanel also indicates the status of the camera.x The first column indicates if the camera is available. Green indicates the camera is available.Gray indicates that the camera is currently unavailable. x The second column indicates if a recording is in progress.Gray indicates no recording.Red indicates recording is in progress.x The third column indicates if Motion Detection is in progress.Gray indicates this feature is not enabled.Yellow indicates Motion Detection is in progress.x The forth and fifth columns indicate if I/O port 1/2 is in On or Off mode.Gray indicates this feature is not enabled.Yellow indicates I/O port is in On mode.Alert Log List. It displays the list of alert logs, if any.Setup. Click this button to open the Setup Window.Playback. Click this button to open the Playback, which allows you to browsethrough the previously saved files.Channel Indicator.  This indicates the current channel (camera).Screen Layout.  Use this to select the number of Channels (Cameras) to be displayed on screen. Up to 9 cameras can be displayed.Play. Use this to re-start viewing, after using the Stop or Pause button.Pause. Use this to temporarily stop the connection to the cameraStop.  This will terminate the connection to the camera, halting both the viewingand the recording (if in progress).Record.  Click this to start recording the current video stream.While recording, this button will be blue. To stop recording, click the Stopbutton.Snapshot.  Click this to take a single JPEG "snapshot" image of the currentvideo.Zoom Camera.  A digital zoom feature is available. To zoom in on a section ofthe window, click this icon. Then use your mouse to select the section you wantto magnify. Click the icon again to disable the zoom feature.70
Flip Video.   Click this to have the image swapped top-to-bottom.Mirror Video.  Click this to have the image swapped left-to-right.Direct Pan/Tilt.  Use this to move the camera to the Pan/Tilt position directly.Sound On/Off. One of these icons will be displayed.This can be used to select the Audio stream which can be heard. (Only one audiostream can be selected at any time.) If the camera does not support audio, or ifaudio is disabled on the camera, this option is unavailable.Microphone On/Off. - For Cameras that feature audio, click this to enable themicrophone.Port 1. Click the buttons to set the I/O port 1 to ON or OFF mode.Port 2. Click the buttons to set the I/O port 2 to ON or OFF mode.71
Recording VideoYou can record Video while watching, or schedule recordings to occur when you are absent.Recordings are stored in a HDD format, and can be played using the Playback function of theprovided utility.Before doing any recording, you should review the recording settings to ensure they aresuitable for your PC.Recording Schedule To set the Recording Preferences, click the Recording Schedule tab on the Setup screen. Youwill see a screen like the example below.Figure 46: Recording ScheduleIf necessary, change these settings to suit your environment.Local ID. This is the name you gave to this camera. This field must be entered.Interval. Decide which days you want the Camera to record. Select the appropriate Interval from the drop-down list. Start Date. Select the date you want the recording begin.Start Time. Select the time you want the recording begin.Duration.  Select how ling you want the recording to be.After you have made your selections, click the Add button to save the new scheduledrecording, and you will see it appears in the recording list. 72
PreferencesThis screen is displayed after clicking the Preferences tab on the Setup screen. If necessary,change these settings to suit your environment.Figure 47: Preferences ScreenData - PreferencesRecording Paths Recording This is the Drive and Folder on your PC where recorded fileswill be placed. You need a drive which has large amounts(Gigabytes) of free space. Click the Browse button to select thedrive and folder.Note that file names are automatically assigned, using the dateand time.Instant Recording Time Limit Maximum time limit for Instant RecordingThis sets the maximum size of a recording which is started byclicking the Record button on the main screen.If the recording is not stopped manually, it will be terminatedafter the time period indicated here.Trigger EventRecord before MotionDetectedSet the time so the Utility will start recording the certain time before the Utility detects motion in a Camera's field of view.73
Record after Motion DetectedSet the time so the Utility will stop recording the certain time after the Utility detects motion in a Camera's field of view.Disk Allocation for Each Camera RecordingTotal Disk Space This displays the total size of the disk selected for storingrecordings.Available Disk Space This displays the available space of the disk selected for storing recordings.Enable Disk spacelimitationEnable this if you wish to limit the disk space used by videorecordings.Maximum AllowedSpaceEnter the maximum amount of disk space which can be used forvideo recordings.Note.When allowed spaceis full. Select the desired option for the behavior when the disk spacelimit is reached.x Overwrite earliest file  The utility will overwrite the oldfiles if the space is not enough for recording.x Stop Recording If the disk space limit is reached, nofurther recording is done.Initial Settings Launch this utilitywhen Windows startedCheck this to have this utility start when Windows starts. Proxy ServerEnable proxy  If enabled, click the Proxy Settings button to configure thesettings.74
Using Playback To access the saved files of the Camera, click Playback button in the Main screen, then youwill see the following screen.Figure 48: Playback Screen Searching Recorded Video Files Select Camera. Select the desired camera from the list.Recording Methods. Select the type of the recorded file from the drop-down list that you wishto view.Start Date/Time. The date and time the recording will be made.End Date/Time. The date and time the recording will be ended.Load other Cameras. Click this button to load other cameras from the network.Submit. Click this button then it will display the list of files according to the search criteria. Play. Use this to re-start viewing, after using the Stop or Pause button.Pause. Use this to temporarily stop the connection to the camera Frame by Frame. Playback the video in a frame-frame basis by clicking the mouse button.Stop.  This will terminate the connection to the camera, halting both the viewing and therecording (if in progress).Snapshot.  Click this to take a single JPEG "snapshot" image of the current video.Zoom In.  To zoom in on a section of the window, click this icon.Zoom Out.  To zoom out on a section of the window, click this icon.75
Print.  Click this to print the current video stream.Playback Speed. To play a recorded file, select the desired speed.isk for storing recordings.Audio Control. To play a recorded file, select the desired volume.Hard Disk Quota. This displays the available and used space of the dDelete Video. To delete a recorded file, select the file and click this button.76
7Chapter 7TroubleshootingThis chapter covers the most likely problems and their solutions.OverviewThis chapter covers some common problems that may be encountered while using the Network Camera and some possible solutions to them. If you follow the suggested steps and theNetwork Camera still does not function properly, contact your dealer for further advice.ProblemsProblem 1:  I can't connect to the Network Camera with my Web Browser to configure it. Solution 1:  It is possible that your PC's IP address is not compatible with the IP address of the Network Camera.Use the Windows utility to configure the Network Camera with a valid IPaddress.Problem 2: The Windows utility doesn't list any Network Cameras.Solution 2:  Check the following:x The Network Camera is installed, LAN connections are OK, it is powered ON and startup is complete.x Ensure that your PC and the Network Camera are on the same networksegment. (If you don't have a router, this must be the case.)x Ensure that your PC has the TCP/IP network protocol loaded. InWindows, this is done by using Control Panel-Network.x If an entry for TCP/IP -> Network card is not listed, use Add - Protocol - Microsoft - TCP/IP to add it.x You then need to select the new entry (TCP/IP -> Network card),click Properties, and configure the IP Address tab.x If your LAN has a DHCP Server, you can select "Obtain an IP Address automatically". Otherwise, you must select "Specify an IP Address", and enter values for IP Address,Subnet Mask, and Gateway. All devices on your LAN must use compatible values.Remember that each device needs a unique IP Address, and the same Subnet Mask.Problem 3  When I try to connect to the Network Camera, I get prompted for auser name and password.Solution 3  You SHOULD be prompted for a user name and password if trying toaccess the Administration menu.Enter the Administrator ID and Password set on the Maintenance screen.If you are just trying to view Video, the User Name/Password prompt77
indicates that the Administrator has restricted access to specified users.Ask the Administrator for your User Name and Password.Problem 4  I can't connect to the Network Camera using a Wireless connection.Solution 4  1) If a LAN cable is connected to the LAN port, the Wireless interface isdisabled. Only one interface can be active. 2) Check that your PC and the Network Camera have compatible Wirelesssettings.x Mode (Infrastructure or Ad-hoc) must be correct.x ESSID must match.x WEP settings must match.x In Ad-hoc mode, the Channel should match, although this is often notrequired.Problem 5 Video quality may suddenly deteriorate.Solution 5  This can happen when an additional viewer connects to the NetworkCamera, overloading the camera or the available bandwidth. The imagesize and quality can be adjusted to cater for the required number of viewersand the available bandwidth.Problem 6  The motion detection feature doesn't send me any E-Mails.Solution 6  It may be that the SMTP (Simple Mail Transport Protocol) server used bythe camera to send the E-mail will not accept mail. (This is to prevent spanbeing sent from the server.). Try using a different SMTP server, or contactyour ISP to see if SMTP access is being blocked.Problem 7  Using the motion detection feature, I receive E-mails which don't showany moving objects.Solution 7  The motion detection feature doesn't actually detect motion. It comparesframes to see if they are different. Major differences between frames are assumed to be caused by moving objects.But the motion detector can also be triggered by:x Sudden changes in the level of available lightx Movement of the camera itself. Try to avoid these situations. The motion detection feature works best inlocations where there is good steady illumination, and the camera is mounted securely. This feature can NOT be used if the camera is outdoors.Problem 8  The image is blurry.Solution 8  Try cleaning the lens, or adjusting the Video Quality setting on the VideoImage screen. Video created will the lower settings will contain less detail;this is the trade-off for using less bandwidth.Problem 9  I turned on the auto launch after startup option of camera utility, but it's blocked and takes no action under Windows Vista. How can I make itwork?78
Solution 9  Windows Vista has the built-in ability to automatically reduce the potentialof security breeches in the system. It does that by automatically enabling afeature called UAC (User Account Control). With the UAC on,applications will be blocked from launching during system startup. Thatwould also block the camera utility. However, you could turn off the UACby the following steps:1. Select Start - Control Panel - Account and Family settings.2. Click "Add or remove user account".3. Select the desired user account. 4. Click "Go to the main User Account page"5. Select "Change security settings" in the "Make changes to your useraccount" screen.6. Unselect "Turn on User Account Control (UAC) to make yourcomputer more secure".7. Click OK. You will be prompted to reboot your computer.79
AAppendix ASpecificationsNetwork Camera Model Network CameraDimensions 80mm (W) * 50mm (H) * 132mm (D) Operating Temperature 0q C to 40q C Storage Temperature -20q C to 70q C Network Protocols: TCP/IP, DHCP, SMTP, NTP, HTTP, HTTPS, UPnP, FTP, RTP,RTSPNetwork Interface: 1 Ethernet 10/100BaseT (RJ45) LAN connectionWireless interface IEEE 802.11b/802.11g compatible, Infrastructure/Ad-hoc mode,WEP/WPA/WPA2-Personal security support, roaming supportLEDs 2Power Adapter 12V/1A DC ExternalLens CS/M Type, F1.6 Fixed Focus Lens Regulatory Approvals FCC Statement This equipment generates, uses and can radiate radio frequency energy and, if not installed andused in accordance with the instructions, may cause harmful interference to radiocommunications. However, there is no guarantee that interference will not occur in a particularinstallation. If this equipment does cause harmful interference to radio or television reception,which can be determined by turning the equipment off and on, the user is encouraged to try tocorrect the interference by one of the following measures:x Reorient or relocate the receiving antenna.x Increase the separation between the equipment and receiver.x Connect the equipment into an outlet on a circuit different from that to which the receiveris connected.x Consult the dealer or an experienced radio/TV technician for help.To assure continued compliance, any changes or modifications not expressly approved by theparty responsible for compliance could void the user's authority to operate this equipment.(Example - use only shielded interface cables when connecting to computer or peripheraldevices).80
FCC Radiation Exposure Statement This equipment complies with FCC RF radiation exposure limits set forth for an uncontrolledenvironment. This equipment should be installed and operated with a minimum distance of 20centimeters between the radiator and your body.This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions:(1) This device may not cause harmful interference, and(2) This device must accept any interference received, including interference that may causeundesired operation.This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter.CE Approvals The Network Camera and the Ethernet Network Camera meet the guidelines of the European Union and comply with the 99/5/EEC and RTTE 99/5EG directives, including the following standards: x EN60950  x EN300 328-2 x EN301 489-1 x EN301 489-17 This is a Class B product. In a domestic environment this product may cause radio interference in which case the user may be required to take adequate measures. 81You are cautioned that changes or modifications not expressly approved by the partyresponsible for compliance could void your authority to operate the equipment. environment. This equipment should be installed and operated with a minimum distance of 20centimeters between the radiator and your body.This equipment complies with FCC RF radiation exposure limits set forth for an uncontrolledSafety NoticesCaution: To reduce the risk of fire, use only No.26 AWGor larger telecommunication line cord.Do not use this product near water, for example, in a wet basement or near a swimming pool.Avoid using this product during an electrical storm.  There may be a remote risk of electric shock fromlightning.WARNING: This product contains lead, knownto the State of California to cause cancer, andbirth defects or other reproductive harm. Wash hands after handling.•••
Copyright Notice Many software components are covered by the GNU GPL (General Public License). Some are covered by other Licenses as listed in the table below.Details of each applicable license are contained in the following section. No WarrantyTHIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS '' AS IS''AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITEDTO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOROR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOTLIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OFUSE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED ANDON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OFTHE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCHDAMAGE.Network Camera copyright information Package source codes Licenseboot loader GPLARM-Linux 2.4.19 GPLARM-Linux-gcc 3.3.4 library LGPLBusy-box GPLcron Public domain(BSD & Lineo http://www.lineo.com/)thttpd-2.25b Public domain(http://www.acme.com/software/thttpd/)ntp-4.1.71 Public domain (http://www.ntp.org/)ez-ipupdate-3.0.11b7 GPLiptables-1.3.4 GPLstunnel GPLwireless_tools.26 GPLwpa_supplicant GPLdhcpd-1.3.22 GPLDM9102 lan driver GPLlibupnp-1.2.1 BSD82
thttpd.c - tiny/turbo/throttling HTTP server Copyright ?1995,1998,1999,2000,2001 by Jef Poskanzer <jef@mail.acme.com > All rights reserved.Redistribution and use in source and binary forms, with or without modification, are permittedprovided that the following conditions are met:1. Redistributions of source code must retain the above copyright notice, this list of conditionsand the following disclaimer.2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials providedwith the distribution.THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS''AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITEDTO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOROR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOTLIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OFUSE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED ANDON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OFTHE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCHDAMAGE.83
ntp-4.1.71 license Copyright (c) David L. Mills 1992-2001Permission to use, copy, modify, and distribute this software and its documentation for anypurpose and without fee is hereby granted, provided that the above copyright notice appears inall copies and that both the copyright notice and this permission notice appear in supportingdocumentation, and that the name University of Delaware not be used in advertising or publicity pertaining to distribution of the software without specific, written prior permission.The University of Delaware makes no representations about the suitability this software for anypurpose. It is provided "as is" without express or implied warranty.Libupnp-1.2.1 License Copyright (c) 2000 Intel Corporation. All rights reserved.Redistribution and use in source and binary forms, with or without modification, are permittedprovided that the following conditions are met:1. Redistributions of source code must retain the above copyright notice, this list of conditionsand the following disclaimer.2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials providedwith the distribution.3. Neither name of Intel Corporation nor the names of its contributors may be used to endorseor promote products derived from this software without specific prior written permission.THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS ANDCONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES,INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OFMERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE AREDISCLAIMED. IN NO EVENT SHALL INTEL OR CONTRIBUTORS BE LIABLE FORANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, ORCONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO PROCUREMENTOF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OFLIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDINGNEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THISSOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.84
cron license Copyright (c) 1989 The Regents of the University of California. All rights reserved.This code is derived from software contributed to Berkeley by Paul Vixie.Redistribution and use in source and binary forms are permitted provided that the abovecopyright notice and this paragraph are duplicated in all such forms and that any documentation, advertising materials, and other materials related to such distribution and useacknowledge that the software was developed by the University of California, Berkeley. Thename of the University may not be used to endorse or promote products derived from thissoftware without specific prior written permission.THIS SOFTWARE IS PROVIDED ''AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIEDWARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIESOF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.85
GNU General Public License GNU GENERAL PUBLIC LICENSEVersion 2, June 1991Copyright (C) 1989, 1991 Free Software Foundation, Inc.51 Franklin St, Fifth Floor, Boston, MA  02110-1301 USAEveryone is permitted to copy and distribute verbatim copies of this license document, butchanging it is not allowed.PreambleThe licenses for most software are designed to take away your freedom to share and change it.By contrast, the GNU General Public License is intended to guarantee your freedom to shareand change free software--to make sure the software is free for all its users.  This GeneralPublic License applies to most of the Free Software Foundation's software and to any otherprogram whose authors commit to using it.  (Some other Free Software Foundation software is covered by the GNU Library General Public License instead.) You can apply it to yourprograms, too.When we speak of free software, we are referring to freedom, not price.  Our General PublicLicenses are designed to make sure that you have the freedom to distribute copies of freesoftware (and charge for this service if you wish), that you receive source code or can get itif you want it, that you can change the software or use pieces of it in new free programs; and thatyou know you can do these things.To protect your rights, we need to make restrictions that forbid anyone to deny you these rightsor to ask you to surrender the rights. These restrictions translate to certain responsibilities foryou if you distribute copies of the software, or if you modify it.For example, if you distribute copies of such a program, whether gratis or for a fee, you mustgive the recipients all the rights that you have.  You must make sure that they, too, receive orcan get the source code. And you must show them these terms so they know their rights.We protect your rights with two steps: (1) copyright the software, and (2) offer you this licensewhich gives you legal permission to copy, distribute and/or modify the software.Also, for each author's protection and ours, we want to make certain that everyone understandsthat there is no warranty for this free software.  If the software is modified by someone else andpassed on, we want its recipients to know that what they have is not the original, so that anyproblems introduced by others will not reflect on the original authors' reputations.Finally, any free program is threatened constantly by software patents. We wish to avoid thedanger that redistributors of a free program will individually obtain patent licenses, in effect making the program proprietary.  To prevent this, we have made it clear that any patent mustbe licensed for everyone's free use or not licensed at all. The precise terms and conditions for copying, distribution and modification follow.GNU GENERAL PUBLIC LICENSETerms And Conditions For Copying, Distribution And Modification0. This License applies to any program or other work which contains a notice placed by thecopyright holder saying it may be distributed under the terms of this General Public License.The "Program", below, refers to any such program or work, and a "work based on theProgram" means either the Program or any derivative work under copyright law: that is to say, a work containing the Program or a portion of it, either verbatim or with modifications and/or86
translated into another language.  (Hereinafter, translation is included without limitation in theterm "modification".)  Each licensee is addressed as "you".Activities other than copying, distribution and modification are not covered by this License;they are outside its scope.  The act of running the Program is not restricted, and the output fromthe Program is covered only if its contents constitute a work based on the Program(independent of having been made by running the Program). Whether that is true depends onwhat the Program does.1. You may copy and distribute verbatim copies of the Program's source code as you receive it,in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer tothis License and to the absence of any warranty; and give any other recipients of the Program a copy of this License along with the Program.You may charge a fee for the physical act of transferring a copy, and you may at your optionoffer warranty protection in exchange for a fee.2. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program, and copy and distribute such modifications or work under theterms of Section 1 above, provided that you also meet all of these conditions:a) You must cause the modified files to carry prominent notices stating that you changed thefiles and the date of any change.b) You must cause any work that you distribute or publish, that in whole or in part contains oris derived from the Program or any part thereof, to be licensed as a whole at no charge to allthird parties under the terms of this License. c) If the modified program normally reads commands interactively when run, you must causeit, when started running for such interactive use in the most ordinary way, to print or display anannouncement including an appropriate copyright notice and a notice that there is no warranty(or else, saying that you provide a warranty) and that users may redistribute the program underthese conditions, and telling the user how to view a copy of this License.  (Exception: if theProgram itself is interactive but does not normally print such an announcement, your workbased on the Program is not required to print an announcement.)These requirements apply to the modified work as a whole.  If identifiable sections of thatwork are not derived from the Program, and can be reasonably considered independent andseparate works in themselves, then this License, and its terms, do not apply to those sectionswhen you distribute them as separate works.  But when you distribute the same sections as partof a whole which is a work based on the Program, the distribution of the whole must be on theterms of this License, whose permissions for other licensees extend to the entire whole, andthus to each and every part regardless of who wrote it.Thus, it is not the intent of this section to claim rights or contest your rights to work writtenentirely by you; rather, the intent is to exercise the right to control the distribution of derivativeor collective works based on the Program.In addition, mere aggregation of another work not based on the Program with the Program (orwith a work based on the Program) on a volume of a storage or distribution medium does notbring the other work under the scope of this License.3. You may copy and distribute the Program (or a work based on it, under Section 2) in objectcode or executable form under the terms of Sections 1 and 2 above provided that you also doone of the following:a) Accompany it with the complete corresponding machine-readable source code, which mustbe distributed under the terms of Sections 1 and 2 above on a medium customarily used forsoftware interchange; or,87
b) Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no more than your cost of physically performing source distribution, a completemachine-readable copy of the corresponding source code, to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or,c) Accompany it with the information you received as to the offer to distribute correspondingsource code.  (This alternative is allowed only for noncommercial distribution and only if youreceived the program in object code or executable form with such an offer, in accord withSubsection b above.)The source code for a work means the preferred form of the work for making modifications toit.  For an executable work, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the executable. However, as a special exception, the sourcecode distributed need not include anything that is normally distributed (in either source orbinary form) with the major components (compiler, kernel, and so on) of the operating systemon which the executable runs, unless that component itself accompanies the executable.If distribution of executable or object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place counts as distribution of the source code, even though third parties are not compelled to copythe source along with the object code.4. You may not copy, modify, sublicense, or distribute the Program except as expresslyprovided under this License.  Any attempt otherwise to copy, modify, sublicense or distributethe Program is void, and will automatically terminate your rights under this License. However,parties who have received copies, or rights, from you under this License will not have theirlicenses terminated so long as such parties remain in full compliance.5. You are not required to accept this License, since you have not signed it.  However, nothingelse grants you permission to modify or distribute the Program or its derivative works. Theseactions are prohibited by law if you do not accept this License.  Therefore, by modifying or distributing the Program (or any work based on the Program), you indicate your acceptance ofthis License to do so, and all its terms and conditions for copying, distributing or modifying theProgram or works based on it.6. Each time you redistribute the Program (or any work based on the Program), the recipientautomatically receives a license from the original licensor to copy, distribute or modify theProgram subject to these terms and conditions. You may not impose any further restrictions onthe recipients' exercise of the rights granted herein.You are not responsible for enforcingcompliance by third parties to this License.7. If, as a consequence of a court judgment or allegation of patent infringement or for any otherreason (not limited to patent issues), conditions are imposed on you (whether by court order,agreement or otherwise) that contradict the conditions of this License, they do not excuse youfrom the conditions of this License.  If you cannot distribute so as to satisfy simultaneouslyyour obligations under this License and any other pertinent obligations, then as a consequenceyou may not distribute the Program at all.  For example, if a patent license would not permitroyalty-free redistribution of the Program by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrainentirely from distribution of the Program.If any portion of this section is held invalid or unenforceable under any particular circumstance,the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances.It is not the purpose of this section to induce you to infringe any patents or other property rightclaims or to contest validity of any such claims; this section has the sole purpose of protectingthe integrity of the free software distribution system, which is implemented by public license88
practices.  Many people have made generous contributions to the wide range of softwaredistributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any othersystem and a licensee cannot impose that choice. This section is intended to make thoroughly clear what is believed to be a consequence of therest of this License.8. If the distribution and/or use of the Program is restricted in certain countries either bypatents or by copyrighted interfaces, the original copyright holder who places the Programunder this License may add an explicit geographical distribution limitation excluding thosecountries, so that distribution is permitted only in or among countries not thus excluded. Insuch case, this License incorporates the limitation as if written in the body of this License.9. The Free Software Foundation may publish revised and/or new versions of the GeneralPublic License from time to time.  Such new versions will be similar in spirit to the presentversion, but may differ in detail to address new problems or concerns.Each version is given a distinguishing version number. If the Program specifies a versionnumber of this License which applies to it and "any later version", you have the option offollowing the terms and conditions either of that version or of any later version published bythe Free Software Foundation. If the Program does not specify a version number of thisLicense, you may choose any version ever published by the Free Software Foundation.10. If you wish to incorporate parts of the Program into other free programs whose distributionconditions are different, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; wesometimes make exceptions for this.  Our decision will be guided by the two goals ofpreserving the free status of all derivatives of our free software and of promoting the sharingand reuse of software generally.NO WARRANTY11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NOWARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLELAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHTHOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUTWARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUTNOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY ANDFITNESS FOR A PARTICULAR PURPOSE.  THE ENTIRE RISK AS TO THE QUALITYAND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAMPROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING,REPAIR OR CORRECTION. 12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO INWRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAYMODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BELIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL,INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OFDATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BYYOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITHANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEENADVISED OF THE POSSIBILITY OF SUCH DAMAGES.89
END OF TERMS AND CONDITIONS90
Lesser GNU General Public License GNU LESSER GENERAL PUBLIC LICENSE Version 2.1, February 1999Copyright (C) 1991, 1999 Free Software Foundation, Inc.51 Franklin St, Fifth Floor, Boston, MA  02110-1301 USAEveryone is permitted to copy and distribute verbatim copies of this license document, butchanging it is not allowed.[This is the first released version of the Lesser GPL. It also counts as the successor of theGNU Library Public License, version 2, hence the version number 2.1.]PreambleThe licenses for most software are designed to take away your freedom to share and change it.By contrast, the GNU General Public Licenses are intended to guarantee your freedom to shareand change free software--to make sure the software is free for all its users.This license, the Lesser General Public License, applies to some specially designated softwarepackages--typically libraries--of the Free Software Foundation and other authors who decide touse it.  You can use it too, but we suggest you first think carefully about whether this license orthe ordinary General Public License is the better strategy to use in any particular case, based onthe explanations below.When we speak of free software, we are referring to freedom of use, not price.  Our GeneralPublic Licenses are designed to make sure that you have the freedom to distribute copies offree software (and charge for this service if you wish); that you receive source code or can getit if you want it; that you can change the software and use pieces of it in new free programs;and that you are informed that you can do these things. To protect your rights, we need to make restrictions that forbid distributors to deny you theserights or to ask you to surrender these rights.  These restrictions translate to certainresponsibilities for you if you distribute copies of the library or if you modify it. For example, if you distribute copies of the library, whether gratis or for a fee, you must givethe recipients all the rights that we gave you.  You must make sure that they, too, receive or can get the source code. If you link other code with the library, you must provide completeobject files to the recipients, so that they can relink them with the library after making changesto the library and recompiling it.  And you must show them these terms so they know theirrights.We protect your rights with a two-step method: (1) we copyright the library, and (2) we offeryou this license, which gives you legal permission to copy, distribute and/or modify the library.To protect each distributor, we want to make it very clear that there is no warranty for the freelibrary.  Also, if the library is modified by someone else and passed on, the recipients shouldknow that what they have is not the original version, so that the original author's reputation willnot be affected by problems that might be introduced by others.91
Finally, software patents pose a constant threat to the existence of any free program. We wishto make sure that a company cannot effectively restrict the users of a free program by obtaininga restrictive license from a patent holder.  Therefore, we insist that any patent license obtainedfor a version of the library must be consistent with the full freedom of use specified in thislicense.Most GNU software, including some libraries, is covered by the ordinary GNU General PublicLicense.  This license, the GNU Lesser General Public License, applies to certain designatedlibraries, and is quite different from the ordinary General Public License. We use this licensefor certain libraries in order to permit linking those libraries into non-free programs.When a program is linked with a library, whether statically or using a shared library, thecombination of the two is legally speaking a combined work, a derivative of the original library.The ordinary General Public License therefore permits such linking only if the entirecombination fits its criteria of freedom.  The Lesser General Public License permits more laxcriteria for linking other code with the library.We call this license the "Lesser" General Public License because it does Less to protect theuser's freedom than the ordinary General Public License.  It also provides other free softwaredevelopers Less of an advantage over competing non-free programs.  These disadvantages are the reason we use the ordinary General Public License for many libraries.  However, the Lesserlicense provides advantages in certain special circumstances.For example, on rare occasions, there may be a special need to encourage the widest possibleuse of a certain library, so that it becomes a de-facto standard.  To achieve this, non-freeprograms must be allowed to use the library.  A more frequent case is that a free library does the same job as widely used non-free libraries. In this case, there is little to gain by limiting thefree library to free software only, so we use the Lesser General Public License.In other cases, permission to use a particular library in non-free programs enables a greaternumber of people to use a large body of free software.  For example, permission to use theGNU C Library in non-free programs enables many more people to use the whole GNUoperating system, as well as its variant, the GNU/Linux operating system.Although the Lesser General Public License is Less protective of the users' freedom, it does ensure that the user of a program that is linked with the Library has the freedom and thewherewithal to run that program using a modified version of the Library.The precise terms and conditions for copying, distribution and modification follow.  Pay closeattention to the difference between a "work based on the library" and a "work that uses thelibrary".  The former contains code derived from the library, whereas the latter must becombined with the library in order to run.GNU LESSER GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION0. This License Agreement applies to any software library or other program which contains a notice placed by the copyright holder or other authorized party saying it may be distributedunder the terms of this Lesser General Public License (also called "this License"). Eachlicensee is addressed as "you".A "library" means a collection of software functions and/or data prepared so as to beconveniently linked with application programs (which use some of those functions and data) toform executables.92
The "Library", below, refers to any such software library or work which has been distributedunder these terms.  A "work based on the Library" means either the Library or any derivativework under copyright law: that is to say, a work containing the Library or a portion of it, eitherverbatim or with modifications and/or translated straightforwardly into another language.(Hereinafter, translation is included without limitation in the term "modification".)"Source code" for a work means the preferred form of the work for making modifications to it.For a library, complete source code means all the source code for all modules it contains, plusany associated interface definition files, plus the scripts used to control compilation and installation of the library. Activities other than copying, distribution and modification are not covered by this License;they are outside its scope.  The act of running a program using the Library is not restricted, andoutput from such a program is covered only if its contents constitute a work based on theLibrary (independent of the use of the Library in a tool for writing it).  Whether that is truedepends on what the Library does and what the program that uses the Library does. 1. You may copy and distribute verbatim copies of the Library's complete source code as youreceive it, in any medium, provided that you conspicuously and appropriately publish on eachcopy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices thatrefer to this License and to the absence of any warranty; and distribute a copy of this Licensealong with the Library.You may charge a fee for the physical act of transferring a copy, and you may at your optionoffer warranty protection in exchange for a fee.2. You may modify your copy or copies of the Library or any portion of it, thus forming a workbased on the Library, and copy and distribute such modifications or work under the terms ofSection 1 above, provided that you also meet all of these conditions:a) The modified work must itself be a software library.b) You must cause the files modified to carry prominent notices stating that you changed thefiles and the date of any change.c) You must cause the whole of the work to be licensed at no charge to all third parties underthe terms of this License.d) If a facility in the modified Library refers to a function or a table of data to be supplied by anapplication program that uses the facility, other than as an argument passed when the facility is invoked, then you must make a good faith effort to ensure that, in the event an application doesnot supply such function or table, the facility still operates, and performs whatever part of its purpose remains meaningful.(For example, a function in a library to compute square roots has a purpose that is entirelywell-defined independent of the application.  Therefore, Subsection 2d requires that anyapplication-supplied function or table used by this function must be optional: if the applicationdoes not supply it, the square root function must still compute square roots.)These requirements apply to the modified work as a whole.  If identifiable sections of thatwork are not derived from the Library, and can be reasonably considered independent andseparate works in themselves, then this License, and its terms, do not apply to those sectionswhen you distribute them as separate works.  But when you distribute the same sections as partof a whole which is a work based on the Library, the distribution of the whole must be on theterms of this License, whose permissions for other licensees extend to the entire whole, andthus to each and every part regardless of who wrote it.Thus, it is not the intent of this section to claim rights or contest your rights to work writtenentirely by you; rather, the intent is to exercise the right to control the distribution of derivativeor collective works based on the Library.93
In addition, mere aggregation of another work not based on the Library with the Library (orwith a work based on the Library) on a volume of a storage or distribution medium does notbring the other work under the scope of this License.3. You may opt to apply the terms of the ordinary GNU General Public License instead of thisLicense to a given copy of the Library.  To do this, you must alter all the notices that refer tothis License, so that they refer to the ordinary GNU General Public License, version 2, insteadof to this License. (If a newer version than version 2 of the ordinary GNU General PublicLicense has appeared, then you can specify that version instead if you wish.)  Do not make anyother change in these notices.Once this change is made in a given copy, it is irreversible for that copy, so the ordinary GNUGeneral Public License applies to all subsequent copies and derivative works made from thatcopy.This option is useful when you wish to copy part of the code of the Library into a program thatis not a library. 4. You may copy and distribute the Library (or a portion or derivative of it, under Section 2) inobject code or executable form under the terms of Sections 1 and 2 above provided that youaccompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used forsoftware interchange.If distribution of object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place satisfies therequirement to distribute the source code, even though third parties are not compelled to copythe source along with the object code.5. A program that contains no derivative of any portion of the Library, but is designed to workwith the Library by being compiled or linked with it, is called a "work that uses the Library".Such a work, in isolation, is not a derivative work of the Library, and therefore falls outside thescope of this License.However, linking a "work that uses the Library" with the Library creates an executable that is a derivative of the Library (because it contains portions of the Library), rather than a "work thatuses the library".  The executable is therefore covered by this License.Section 6 states terms for distribution of such executables.When a "work that uses the Library" uses material from a header file that is part of the Library,the object code for the work may be a derivative work of the Library even though the sourcecode is not. Whether this is true is especially significant if the work can be linked without theLibrary, or if the work is itself a library. The threshold for this to be true is not precisely defined by law.If such an object file uses only numerical parameters, data structure layouts and accessors, and small macros and small inline functions (ten lines or less in length), then the use of the object file is unrestricted, regardless of whether it is legally a derivative work.  (Executablescontaining this object code plus portions of the Library will still fall under Section 6.)Otherwise, if the work is a derivative of the Library, you may distribute the object code for thework under the terms of Section 6. Any executables containing that work also fall underSection 6, whether or not they are linked directly with the Library itself. 94
6. As an exception to the Sections above, you may also combine or link a "work that uses theLibrary" with the Library to produce a work containing portions of the Library, and distributethat work under terms of your choice, provided that the terms permit modification of the workfor the customer's own use and reverse engineering for debugging such modifications.You must give prominent notice with each copy of the work that the Library is used in it andthat the Library and its use are covered by this License. You must supply a copy of thisLicense.  If the work during execution displays copyright notices, you must include thecopyright notice for the Library among them, as well as a reference directing the user to the copy of this License. Also, you must do one of these things:a) Accompany the work with the complete corresponding machine-readable source code for the Library including whatever changes were used in the work (which must be distributed underSections 1 and 2 above); and, if the work is an executable linked with the Library, with thecomplete machine-readable "work that uses the Library", as object code and/or source code, sothat the user can modify the Library and then relink to produce a modified executablecontaining the modified Library. (It is understood that the user who changes the contents ofdefinitions files in the Library will not necessarily be able to recompile the application to usethe modified definitions.)b) Use a suitable shared library mechanism for linking with the Library. A suitable mechanismis one that (1) uses at run time a copy of the library already present on the user's computersystem, rather than copying library functions into the executable, and (2) will operate properlywith a modified version of the library, if the user installs one, as long as the modified version is interface-compatible with the version that the work was made with.c) Accompany the work with a written offer, valid for at least three years, to give the same userthe materials specified in Subsection 6a, above, for a charge no more than the cost ofperforming this distribution.d) If distribution of the work is made by offering access to copy from a designated place, offerequivalent access to copy the above specified materials from the same place. e) Verify that the user has already received a copy of these materials or that you have already sent this user a copy.For an executable, the required form of the "work that uses the Library" must include any data and utility programs needed for reproducing the executable from it.  However, as a specialexception, the materials to be distributed need not include anything that is normally distributed(in either source or binary form) with the major components (compiler, kernel, and so on) ofthe operating system on which the executable runs, unless that component itself accompaniesthe executable.It may happen that this requirement contradicts the license restrictions of other proprietarylibraries that do not normally accompany the operating system.  Such a contradiction meansyou cannot use both them and the Library together in an executable that you distribute.7. You may place library facilities that are a work based on the Library side-by-side in a single library together with other library facilities not covered by this License, and distribute such a combined library, provided that the separate distribution of the work based on the Library andof the other library facilities is otherwise permitted, and provided that you do these two things:a) Accompany the combined library with a copy of the same work based on the Library,uncombined with any other library facilities.  This must be distributed under the terms of theSections above.b) Give prominent notice with the combined library of the fact that part of it is a work based onthe Library, and explaining where to find the accompanying uncombined form of the samework.95
8. You may not copy, modify, sublicense, link with, or distribute the Library except as expressly provided under this License.  Any attempt otherwise to copy, modify, sublicense,link with, or distribute the Library is void, and will automatically terminate your rights underthis License. However, parties who have received copies, or rights, from you under thisLicense will not have their licenses terminated so long as such parties remain in fullcompliance.9. You are not required to accept this License, since you have not signed it.  However, nothingelse grants you permission to modify or distribute the Library or its derivative works. Theseactions are prohibited by law if you do not accept this License.  Therefore, by modifying or distributing the Library (or any work based on the Library), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying theLibrary or works based on it.10. Each time you redistribute the Library (or any work based on the Library), the recipientautomatically receives a license from the original licensor to copy, distribute, link with ormodify the Library subject to these terms and conditions. You may not impose any furtherrestrictions on the recipients' exercise of the rights granted herein. You are not responsible forenforcing compliance by third parties with this License. 11. If, as a consequence of a court judgment or allegation of patent infringement or for anyother reason (not limited to patent issues), conditions are imposed on you (whether by courtorder, agreement or otherwise) that contradict the conditions of this License, they do notexcuse you from the conditions of this License.  If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not distribute the Library at all. For example, if a patent license wouldnot permit royalty-free redistribution of the Library by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be torefrain entirely from distribution of the Library.If any portion of this section is held invalid or unenforceable under any particular circumstance,the balance of the section is intended to apply, and the section as a whole is intended to applyin other circumstances.It is not the purpose of this section to induce you to infringe any patents or other property rightclaims or to contest validity of any such claims; this section has the sole purpose of protectingthe integrity of the free software distribution system which is implemented by public licensepractices.  Many people have made generous contributions to the wide range of softwaredistributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any othersystem and a licensee cannot impose that choice. This section is intended to make thoroughly clear what is believed to be a consequence of therest of this License.12. If the distribution and/or use of the Library is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Library underthis License may add an explicit geographical distribution limitation excluding those countries,so that distribution is permitted only in or among countries not thus excluded.  In such case, this License incorporates the limitation as if written in the body of this License.13. The Free Software Foundation may publish revised and/or new versions of the LesserGeneral Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns.Each version is given a distinguishing version number. If the Library specifies a versionnumber of this License which applies to it and "any later version", you have the option offollowing the terms and conditions either of that version or of any later version published bythe Free Software Foundation. If the Library does not specify a license version number, youmay choose any version ever published by the Free Software Foundation.96
14. If you wish to incorporate parts of the Library into other free programs whose distributionconditions are incompatible with these, write to the author to ask for permission. For softwarewhich is copyrighted by the Free Software Foundation, write to the Free Software Foundation;we sometimes make exceptions for this. Our decision will be guided by the two goals ofpreserving the free status of all derivatives of our free software and of promoting the sharingand reuse of software generally.NO WARRANTY15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE LIBRARY, TO THE EXTENT PERMITTED BY APPLICABLELAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHTHOLDERS AND/OR OTHER PARTIES PROVIDE THE LIBRARY "AS IS" WITHOUTWARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUTNOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY ANDFITNESS FOR A PARTICULAR PURPOSE.  THE ENTIRE RISK AS TO THE QUALITYAND PERFORMANCE OF THE LIBRARY IS WITH YOU. SHOULD THE LIBRARYPROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING,REPAIR OR CORRECTION. 16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO INWRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAYMODIFY AND/OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE, BELIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL,INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE LIBRARY (INCLUDING BUT NOT LIMITED TO LOSS OFDATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BYYOU OR THIRD PARTIES OR A FAILURE OF THE LIBRARY TO OPERATE WITHANY OTHER SOFTWARE), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEENADVISED OF THE POSSIBILITY OF SUCH DAMAGES.END OF TERMS AND CONDITIONS97
BAppendix BStreaming Video/Audio SolutionOverviewStreaming video is a sequence of "moving images" that are sent in compressed form over the Internet and displayed by the viewer as they arrive. With streaming, a Web user does not haveto wait to download a large file before seeing the video or hearing the sound. Instead, themedia is sent in a continuous stream and is played as it arrives.Streaming Video/Audio through Internet Camera To snapshot a JPEG image from the Internet Camera with specified resolution and quality:http://<ip>/img/snapshot.cgi?[size=<value>][&quality=<value>]Size = 1 (160*120) 2 (320*240) 3 (640*480)Quality = 1 (Very low) 2(Low)3 (Normal)4 (High)5 (Very high)To stream M-JPEG video from the Internet Camera (M-JPEG mode only)http://<ip>/img/mjpeg.htmTo stream video through the RTP/RTSP protocol from Internet Camera (MPEG-4 mode only)rtsp://<ip>/img/media.savNote: Users need to specify the desired protocol in the players.To snapshot a JPEG image (160*120, very low quality) through a mobile phone:http://<ip>/img/mobile.cgi98

Navigation menu