TRENDnet TV-IP252P manuel d'utilisation

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106

Aller à la page of

Un bon manuel d’utilisation

Les règles imposent au revendeur l'obligation de fournir à l'acheteur, avec des marchandises, le manuel d’utilisation TRENDnet TV-IP252P. Le manque du manuel d’utilisation ou les informations incorrectes fournies au consommateur sont à la base d'une plainte pour non-conformité du dispositif avec le contrat. Conformément à la loi, l’inclusion du manuel d’utilisation sous une forme autre que le papier est autorisée, ce qui est souvent utilisé récemment, en incluant la forme graphique ou électronique du manuel TRENDnet TV-IP252P ou les vidéos d'instruction pour les utilisateurs. La condition est son caractère lisible et compréhensible.

Qu'est ce que le manuel d’utilisation?

Le mot vient du latin "Instructio", à savoir organiser. Ainsi, le manuel d’utilisation TRENDnet TV-IP252P décrit les étapes de la procédure. Le but du manuel d’utilisation est d’instruire, de faciliter le démarrage, l'utilisation de l'équipement ou l'exécution des actions spécifiques. Le manuel d’utilisation est une collection d'informations sur l'objet/service, une indice.

Malheureusement, peu d'utilisateurs prennent le temps de lire le manuel d’utilisation, et un bon manuel permet non seulement d’apprendre à connaître un certain nombre de fonctionnalités supplémentaires du dispositif acheté, mais aussi éviter la majorité des défaillances.

Donc, ce qui devrait contenir le manuel parfait?

Tout d'abord, le manuel d’utilisation TRENDnet TV-IP252P devrait contenir:
- informations sur les caractéristiques techniques du dispositif TRENDnet TV-IP252P
- nom du fabricant et année de fabrication TRENDnet TV-IP252P
- instructions d'utilisation, de réglage et d’entretien de l'équipement TRENDnet TV-IP252P
- signes de sécurité et attestations confirmant la conformité avec les normes pertinentes

Pourquoi nous ne lisons pas les manuels d’utilisation?

Habituellement, cela est dû au manque de temps et de certitude quant à la fonctionnalité spécifique de l'équipement acheté. Malheureusement, la connexion et le démarrage TRENDnet TV-IP252P ne suffisent pas. Le manuel d’utilisation contient un certain nombre de lignes directrices concernant les fonctionnalités spécifiques, la sécurité, les méthodes d'entretien (même les moyens qui doivent être utilisés), les défauts possibles TRENDnet TV-IP252P et les moyens de résoudre des problèmes communs lors de l'utilisation. Enfin, le manuel contient les coordonnées du service TRENDnet en l'absence de l'efficacité des solutions proposées. Actuellement, les manuels d’utilisation sous la forme d'animations intéressantes et de vidéos pédagogiques qui sont meilleurs que la brochure, sont très populaires. Ce type de manuel permet à l'utilisateur de voir toute la vidéo d'instruction sans sauter les spécifications et les descriptions techniques compliquées TRENDnet TV-IP252P, comme c’est le cas pour la version papier.

Pourquoi lire le manuel d’utilisation?

Tout d'abord, il contient la réponse sur la structure, les possibilités du dispositif TRENDnet TV-IP252P, l'utilisation de divers accessoires et une gamme d'informations pour profiter pleinement de toutes les fonctionnalités et commodités.

Après un achat réussi de l’équipement/dispositif, prenez un moment pour vous familiariser avec toutes les parties du manuel d'utilisation TRENDnet TV-IP252P. À l'heure actuelle, ils sont soigneusement préparés et traduits pour qu'ils soient non seulement compréhensibles pour les utilisateurs, mais pour qu’ils remplissent leur fonction de base de l'information et d’aide.

Table des matières du manuel d’utilisation

  • Page 1

    [...]

  • Page 2

    - 1 - P REF ACE Thank you for purchasing the TV-IP252 Secu rView PoE Dome Internet Camera, a standal one sy stem that can be connected directly to an Ethernet or Fast Ethernet network. The camera features the latest Motion JPEG and MPEG-4 image technology, advanced management functionality, and GPIO connectors (e.g. connectin g to the door sensors [...]

  • Page 3

    - 2 - This User Guide provides you with the in structions and illustrations on how to use your camera, which includes: Chapter 1 Introduction to Your Cam era describes the features of the camera. You will also know the co mponents and functions of the camera. Chapter 2 Hardware Installation helps you in stall the came ra according to your applicati[...]

  • Page 4

    - 3 - Contents PREFACE ......................................................................... 1 CHAPTER 1 ..................................................................... 5 INTRODUCTION TO YOUR CAMERA ............... 5 1.1 C HECKIN G THE P ACKAGE C ONTENT S ................................... 5 1.2 G ETTING T O K NOW Y OUR C AMER A ........[...]

  • Page 5

    - 4 - USING SECURVIEW™ 62 5.1 Installation 62 5.2 Using Installation 67 Item Features 68 To Add a Camera 72 To Remove a Camera 75 To Link to the Web Page of the Camera 76 To Record Video 77 To Configure the Recording Settings 82 To Playback the Recorded Video 84 To Set Up Motion Detection Options 85 Account 87 Other 87 Information 88 CHAPTER 6 89[...]

  • Page 6

    - 5 - C HAPTER 1 I NTRODUCTION T O Y OUR C AMERA 1.1 Checking the Package Contents Check the items contained in t he packa ge carefully. You should have the following: 5 TV-IP252P 5 Power Adapter (12V DC, 1 .5A) 5 Mounting Kit 5 Cat. 5 Ethernet Cable (1.8m / 6ft.) 5 GPIO Adapter 5 CD-ROM (Utility & User’s Guide) 5 Multi-Language Quick In stal[...]

  • Page 7

    1.2 Getting to Know Your Camera  Physical Components Dome cover Connectors X Y Z [ ] z Connectors X Power: Connects the power adapter to sup ply power to the camera. Y GPIO: Connects the external device that features additional controlling functi on, such as motion detection, event triggering, alarm notification, and a variety of external cont[...]

  • Page 8

    Z Mic In: Connects an external microphone to re ceive the on-the-spot sound where the cam era is installed. (Pink Connecto r) [ Audio Out: Conne cts an external au dio device (such as the active speaker) to deliver sound via the camera. (Green Connector) TV Out: The BNC connector is u sed to connect the composite video input of external video dev[...]

  • Page 9

     Inside Components Unscrew the four screws to disassemble the Dome cover. Lens w ith the adjustable base LED indicators Reset button Link & Power switches z Reset butto n: Press the button to restart the camera. Press and hold the button for fi ve seconds, the camera will resume the factory default settings. z LED indicators - Power indicate[...]

  • Page 10

    - 9 - 1.3 Features and Benefits z MPEG4/MJPEG Dual-codec Suppor te d The camera provides you with excellent images by th e MPEG4/MJPEG dual-codec selecta ble tech nology, allowing you to adjust image size and quality, and bit rate accordin g to the networking environment. z Flexible Audio Capability The camera allows you to connect the external mic[...]

  • Page 11

    - 10 - z I/O Connectors Supported The I/O connectors (2-in/1-out) of the camera provide the physical interface to send and re ceive digital signals to a variety of external alarm de vices. You can configure the settings and control the device from the GPIO Trigge r setting of Web Configuration. z Multiple Platforms Supported The camera supports mul[...]

  • Page 12

    - 1 1 - 1.4 System Requirement z Netw orking - LAN: 10Base-T Ethernet or 100Base-TX Fast Ethernet. z Accessing the Camera using SecurVie w ™ - Platform: Microsoft® Windows® 2000/XP/Vista. z Accessing the Camera using Web Br owser - Platform: Microsoft® Windows® 2000/XP/Vista - CPU: Intel Pentium III 350MHz or above - RAM: 128MB - Resolution: [...]

  • Page 13

    C HAPTER 2 H ARDW ARE I NST ALLA TION 2.1 Applications of the Camera The camera can be applied in multiple applications, including: z Monitor local and remote place s and objects via Internet or Intranet. z Capture still images and video cli ps remotely. z Upload images or send email messages with the still images attached. The following diagram ex[...]

  • Page 14

    2.2 Installing the Camera  Basic Installation (Surface) The camera can be mounted to t he ceiling surface directly by the following steps: 1. Remove the Dome cover by unscrewing four screws. 2. Drill three pilot holes into the ceiling and hamme r the plastic anchors into the holes. TIP You can easily and precisely drill the three pilot hole s wi[...]

  • Page 15

    3. Install the camera to the ceiling with three screws. - 14 -[...]

  • Page 16

    - 15 - 4. Make connections accordi ng to your ne eds (refer to the illustration of connecti ng cables on page 6). 5. Pan/tilt the camera lens to a proper posit ion by using the adjustable base, and adjust the lens focus by turning the lens ring slowly in either clockwise or a nti-clo ckwise direction. NOTE You can revie w the image quality from the[...]

  • Page 17

    - 16 -[...]

  • Page 18

    C HAPTER 3 A CCESSING T HE C AMERA 3.1 Using IPSetup The camera comes with a conveni ent utility, IPSetup, which is included in the Installation CD-ROM, allowin g you to sea rch the camera(s) on your network easily. 1. Insert the Installation CD-ROM into your computer’s CD- ROM drive to initiate the Auto-Run program. - 17 - 2. Click the IPSetup f[...]

  • Page 19

    - 18 - 3. Click Bro wse to choose the desired d estination location. By default the destination location is C:Program FilesTRENDnetIPSetup. Then click Next .[...]

  • Page 20

    4. Click Next to confirm the IPSetup software to be installed to the computer. 5. When the Installation Complete window app ear s, click Close . - 19 -[...]

  • Page 21

    6. After installing the IPSetup Utility, the application is automatically installed to your computer, and creates a folder in StartProgramTRENDnetIPSetup . 7. Click Start > Programs > TRENDn et > IPSetup , and then click IPSetup . 8. The IPSetup window will appear. It will search for SecurView camera(s ) within the same network - 20 -[...]

  • Page 22

    Camera Display Area Camera Display Area: It shows the connected camera(s) within the same network. Double click the IP Address, it will link to the Camera’s Web Configuration page. - Change IP: Click this button to bring up the following window. It allows you to change the IP Address. You can select either Static IP or click DH CP . Then, enter t[...]

  • Page 23

    - Search: Click this button to search the connected SecurView camera(s ) in the same network. - Exit: Click this button to exit the program. 3.2 Accessing to the Camera Whenever you want to access the camera: 1. Open the Web browser on your co mputer (example showed in the User’s Guide is based on Internet Ex 2. Since the default configuration of[...]

  • Page 24

    hen the login window app ears, en 3. W ter the default User K screen of the camera’s Web Configuration. name ( admin ) and Password ( admin ). Then, click the O button to access to the main Enter the User name and Password. NOTE If you are initially access ing the camera, you will be asked to install a new plug-in for the camera. Permission reque[...]

  • Page 25

    Zoom In Buttons Camera Information Live View/Setup - 24 - The Main page of the Web Configuration provides you with f rmation and functions, including: useful in o to configure the camera. For o image. d  Fun vid z eo  Live View/Setup Switch: z Click the Setup button details, see Chapter 4. z Click the Live View button to return to the Main sc[...]

  • Page 26

    - 25 - z save a still image. z o assign the destination folder to z Talk u to speak out through the camera. Please note only one user is allowed to use this function at a time. z Listen allows you to receive the on-site sound an d voice from the camera. z Trigger Out allows you to trigger on/off the GPIO output manually.  Live View Ima ge: Displ[...]

  • Page 27

    - 26 - 3.3 Configuring the IP Address of the PC If you have failed to access the camera, please check the IP address of your computer. When y ou connect the ca mera to your computer directly, proceed with co nfiguration of the camera. You need to set up the IP addresses to be in the same segment for the two devices to communicate. 1. On your comput[...]

  • Page 28

    - 27 - C HAPTER 4 C ONFIGURING THE C AMERA 4.1 Using the Web Configuration You can access and man age the camera through the Web browser and the provided software appli cation Secu rView™ (see chapter 5 in more detail). This chapte r describes the Web Configuration, and guide s you thr ough the configuration of the camera by using the web b rowse[...]

  • Page 29

    The Web Configuration contains t he set tings that are require d for the camera in the left menu bar, including Smart Wizard , Basic , Network , Video/Audio , Event Server , Motion detect , Event Config , Tools , USB , and Info rmatio n . 4.2 Using Smart Wizard The camera’s Smart Wizard lets you configure your camera quickly and easily. The wizar[...]

  • Page 30

    Step 3. Email Settings Enter the required information to be able to send emai l with image. - 29 -[...]

  • Page 31

    Step 4. Confirm Settings The last step shows the co nfigurat ion of your camera. When you confirm the settings, click Apply to finish the wizard and reboot the camera. Other wise, click Prev to go back to the previou s step(s) and change the settings; or click Cancel to end the wizard and discard the chang es. - 30 -[...]

  • Page 32

    4.3 Basic Setup The Basic menu contain s three sub -menus that provide the System settings for the camera, such as the Camera Name, Location, Date & Time , and User management .  Basic >> System - 31 -[...]

  • Page 33

    z Basic: This item allows you to assign th e came ra name and location information. - Camera Name: Enter a descriptive name for the camera. - Location: Enter a descriptive name for the location where the camera is monitored. z Indication LED: This item allows you to set the LED illumination as desired. There are two options: Normal and OFF .  Ba[...]

  • Page 34

    - Synchronize with PC: Select this option and the date & time settings of the camera will be synchronized with the connected com p uter. - Synchronize with NTP Server: Select this option and the time will be synchronized with the NTP Server. You need to enter the IP address of the server and select the update interval in the followi ng two boxe[...]

  • Page 35

    password. Type the administrator password twice to set and confirm the password. z General User - User Name: Enter the user’s name you want to add to use the camera. - Password: Enter the password for the new u ser. When you are finished, click Add/Modi fy to add the new user to the camera. To modify the user’s information, select the one you w[...]

  • Page 36

    - 35 - 4.4 Network Settings The Network menu contains two sub-me nus that p rovide the Networking settings for the camera, such as the IP Setting, DDNS Setting, and IP Filter .[...]

  • Page 37

     Network >> Network z IP Setting: This item allows you to select the IP address mode and set up the related config uratio n. - DHCP: Select this option when your network uses the DHCP server. When the camera starts up, it will be - 36 -[...]

  • Page 38

    assigned an IP addres s fro m the DHCP server automatically. - Static IP: Select this option to assign the IP addre ss for the camera directly. You can use IPSetup to obtain the related setting values. - 37 - IP Enter the IP address of the camera. The default setting is 192.168.10.30 . Subnet Mask Enter the Subnet Mask of the camera. The default se[...]

  • Page 39

    - 38 - 3. Enter the required information in the Host Nam e , User Name , and Password boxes. NOTE You have to sign up for DDNS service with the service provider before co nfigurin g this feature. z UPnP: The camera supports UPnP (Uni versal Plug and Play), which is a set of com puter network protocols that enable the device-to-devic e intero perabi[...]

  • Page 40

    - 39 - The IP Filter setting allows the administrator to limit the users within a certain range of IP addresses to have access to the camera. To disable this feature, select the Disabl e option; otherwise, select the Accept option to assign the range of IP ad dresses that are allowed to access the camera, o r sele ct the Deny option to assign the r[...]

  • Page 41

    For example, when you enter 192.168.1 0.50 in Start IP Address and 192.168.10.80 in End IP Address, the user whose IP address located within 192.168.1 0.50 ~ 192.168.10.80 will not be allowed to acce ss the camera. - Accept IP List: The list displays the range setting(s) of IP addresses that are allowed to access the camera. To clear the setting, s[...]

  • Page 42

    - 41 - 4.5 Setting up Video & Audio The Video & Audio menu contains four sub-menus that provide the video and audio settings for the camera.  Video & Audio >> Camera[...]

  • Page 43

    z Image Setting - Brightness: Adjust the brightness level from 0 ~ 10 0. - Saturation: Adjust the colors level from 0 ~ 100 . - Sharpness: Adjust the sharpn ess level from 0 ~ 100. Click Default to restore the default settings of the three options above. - Mirror: Select Vertical to mirror the image vertically, or select Horizontal to mirror the im[...]

  • Page 44

    - Video Resolution: Select the desired video resolution from the three formats: VGA , QVGA , and QQVGA . The higher setting (VGA) obtains bette r video quality while it uses more resource within your network. - Video Quality: Select the desired image quality from five levels: Low est , Low , Medium , High , and Highest . - Frame Rate: Select Auto o[...]

  • Page 45

    - 44 - select 3GPP Without Aud io or 3GPP With Audio to transfer the video clips without or with au dio. If you use a mobile phone that supports 3GPP, you can also view the real-time streaming image captu red by the camera on your phone (with the default player on the phone) by entering the RT SP link: rtsp://(IP address of the camera)/3gp .  Vi[...]

  • Page 46

    z Overlay Setting: This option allo ws you to set the overlay function of the camera, so that you can se e the related information on the live view image. - Includes Date & Time: Select this option to display the date & time stamp on the live view image. - Include Text: Select this option and enter your heading text in the box to display th[...]

  • Page 47

    4.6 Event Server Configuration The Event Server menu contains three sub-menus that allow you to upload images to FTP , send Emails that include still images, and store the images to a NAS sy stem . When you complete the required setting s for FTP, Email, or Network Storage, click Test to test the related configuration i s correct or not. Once the c[...]

  • Page 48

    z FTP - Host Address: Enter the IP addre ss of the target FTP server. - Port Number: Enter the port number used for the FTP server. - User Name: Enter the user name to login into the FTP server. - Password: Enter the pa ssword to login into the FTP server. - Directory Path: Enter the destination folder for uploading the images. For example, /Test/ [...]

  • Page 49

    format as One Snapshot or images co ntaining Pre- event (0 ~ 3) secon ds and Post-ev ent (0 ~ 3) seconds.  Event Server Setting >> Email z Email - SMTP Server Address: Enter the mail server address. For example, mymail.com . - Sender Email Address: Enter the email addre s s of the user who will send t he email. For example, John@mymai l.co[...]

  • Page 50

    the User Name and Password according to the mail server configuration. - Sender User Name: Enter the user name to login the mail server. - Sender Password: Enter the password to login the mail server. - Receiver #1 Email Address: Enter the first email address of the user who will receive the email. - Receiver #2 Email Address: Enter the secon d ema[...]

  • Page 51

    z Network Sto rage - Samba Server Address: Enter the IP address of the Network Storage server. - Share: Assign the folder on the Network Storage server to share the files to users. - Path: Assign the path for u ploading the files on the Network Storage serv er. For example, /Test/ . - User Name: Enter the user name to login into the Network Storage[...]

  • Page 52

    - 51 - 4.7 Motion Detect The Motion Detect menu contains the command and option that allow you to enable and set up the motion detection feature of the camera. The camera provi des two dete cting areas. To enable the detecting area, select Win do w 1 or 2 from the pull- down list, and then select Enable . When the detecting area is enabled, you can[...]

  • Page 53

    4.8 Event Config The Event Config menu contains fi ve sub-menus that provide the commands to configure ev ent profiles.  Event Configuration >> General Setting z General - Snapshot/Recording Subfolder: You can assign a given subfolder to each new ca ptured file. Otherwise, leave this option blank to use the default setting. - 52 - - Networ[...]

  • Page 54

    - GPIO Trigger Out Retention Time Per Ev ent: Limit the retention time of the GPIO Trigger Out function.  Event Configuration >> Arrange Schedule Profile z Schedule Profile: This sub-me nu displays the scheduled profile(s). To customize the profile, click Add and then enter a descriptive name for the profile in the prompt dialog window. z [...]

  • Page 55

    - Profile Name: Display the profile name that you select in the Schedule Profiles list. - Weekday s: Select the weekday(s) that you want to separately assign in the schedul e profile . The weekday that has been as signed will be displayed with green color. - Time List: Display the time period that you have assigned within the selected weekd ay. To [...]

  • Page 56

    captured images within the detecting a rea to the FTP server, email receiver, Network Storage server, or the connected USB device. You have to configure corresponding settings, su ch a s FTP server and email server, to enable this feature. Please note that you have to configure the related settings before e nablin g these features. - Schedule Profi[...]

  • Page 57

    the Enable option on each item, and then select a Schedule Profile from the pull-down list and set the Interval time. NOTE If the setting value of the Net w ork Storage Recording Time Per Event option in General Setting is longer than the Interval time in Network Storage Schedule, the recorded file will be a conti nuous video clip. For example, if [...]

  • Page 58

    detecting area to the Network Storage server, email receive r, or FTP server. You have to configure corresponding settings, such as FTP server and email se rver, to enabl e this feature. z Enable Trigger In 1/2: Select the option to enable the GPIO trigger function of the camera. Then, compl ete the following options - Schedule Profile: Select a sc[...]

  • Page 59

    - 58 - 4.9 Tools The Tools menu provides t he commands that allow you to re start or reset the camera. You can also backup and restore your configuration, and upgrade the firmware for the camera. z Factory Reset: Click Reset to restore all factory default settings for the camera. z System Reboot: Click Reboot to restart the camera just like turning[...]

  • Page 60

    resume the original settings, you can re store th em by retrieving the backup file. - Backup: Click Ge t the backup file to save the current configuration of the camera. - Resto re: Click Browse to locate the backup file and then click Restore . z Update Firmware : You can upgrade th e firmware for your camera once you obtained a latest version of [...]

  • Page 61

    - 60 - 4.10 Information The Information menu displays the cu rre nt configuration and events log of the camera.  Information >> Device Info Display the Basic, Video & Audio, and Network settings of the camera.  Information >> System Log[...]

  • Page 62

    The Logs table displays the events log re corded by the system. - 61 -[...]

  • Page 63

    C HAPTER 5 SECUR VIEW™ SOFTW ARE This chapter describe s detailed instructions on ope rating SecurView™ software, a useful friendly application for ease of control and navigation requirement. 5.1 Inst allation 1. Insert the Installation CD-ROM into your computer’s CD- ROM drive to initiate the Auto-Run program. 2. Click the SecurView From the[...]

  • Page 64

    NOTE To use SecurView™, you must have Micros oft .NET Framework 2.0 installed in the co mputer. The setup wizard will detect it and, if the program is not installed yet, ask you to install it during the process of installing Secu rVie w™. 3. Then SecurView Setup Wizard will appe ar. Click Next when the Welcome to the SecurVie w Setup Wizard app[...]

  • Page 65

    4. Click Bro wse to choose the desired destination location. By default, the destination location is C:Program FilesTRENDnetSecurView. Then click Next . - 64 -[...]

  • Page 66

    5. Click Next to confirm the SecurView software to be installed to the computer - 65 -[...]

  • Page 67

    6. When the Installation Complete window app ear s, click Close . 7. After installing the IPSet up utility, the application is automatically installed to your computer, and creates a folder in StartProgramTRENDnetSecurVie w . - 66 -[...]

  • Page 68

    5.2 Using Installation 1. To launch the program, cli c k Start > Program > TRENDne t > SecurView, and then click SecurView™ . The main screen w ill appear as below. NOTE Please set the resol ution to 1024 x 768 or above on your computer while using Secu rView™; otherwise, the displayed main screen may be distorted. - 67 -[...]

  • Page 69

    Item Features The following describes the function of each item on the main screen:  CONTROLS Panel - SETTING: Click to enter the Setting screen of SecurView™. - Click again to return to the main screen of SecurView™. - Play: Click to play the recorded video file using the media player on the computer (for exam ple, Windows Media Player by d[...]

  • Page 70

    - Lock: Click to lock the camera controls. Click again to resume controls for the camera. If you have set ID and Password in Setting > Account , you will be asked to enter the required information to unlock. - ALL RECORD: Cli ck to start recording video clip s using ALL connected cam era s. To stop recording, please click Re cor d button to stop[...]

  • Page 71

    - Scan: When multiple camera s connected, clic k this button to display the video views between camera s. Click the Scan button again to stop scanning. - PREV: When multiple cameras c onn ected, click th i s button to switch the video view to the previous came ra. - NEXT: When multiple camera s connected, cli ck this button to switch the video view[...]

  • Page 72

    - RECORD: Click to start recording a video cli p using the selected camera. Cli ck a gain to stop recording and save the file in the computer. - TALK: Click to speak out through the camera. Please note only one user is allowed to use this function at the same time. - LISTEN: Click to receive the on-site soun d and v oice from the camera.  SYSTEM[...]

  • Page 73

    - Video Viewing Window: This window displays the video view of the selected camera, which can be divided into 4/9/16 windows accordin g to your sel ection in VIEW SELECTION panel. - Camera List: This list displays the information of the connected camera (s ). T o add a camera 1 . Click SETTING in the CONTROLS panel to display the Setting screen. 2.[...]

  • Page 74

    3. In the pop-up Add New Camera di alog window, you can: z Select the Search tab if you are not sure of the camera’s IP Address. Click Search camera to search for an available camera within the network. On ce the came ra is found and is shown in the list, sele ct it and click Add Camera . z Select the Input tab to add a camera by entering its IP [...]

  • Page 75

    4. Enter the User name and Password for the camera, and then click OK. The connected came ra will be displayed in the Camera’s List. 5. Click SETTING to return to the Video View Window. The video view of the selected camera will b e displ ayed now. - 74 -[...]

  • Page 76

    T o remove a camera 1. Click SETTING in the CONTROLS panel to display the Setting screen. 2. Select a camera from the list and click Delete Camera . - 75 -[...]

  • Page 77

    Delete a camera Select a camera T o link to the W eb p age of the camera Click SETTING > Camera List > Camera Configura tion and then Link web page to launch the Web browser that di splays live view image and Web Configuration of the selected came ra. - 76 -[...]

  • Page 78

    T o Record V ideo SecurView™ provides three methods to record video clip s: one is to click the RECORD / All Record button to record manually; the second is to record by motion detection; the third is to set the recording schedule in Setting > Recording Configuration > Schedule Recording Configuration . z Manually record Click RECOR D / All[...]

  • Page 79

    z Trigger recording by motion detec tio n When the motion detection function of the selected camera is enabled, you can configure th e camera to start recording triggered by the motion detected. Click SETTING > Motion Configuration , an d then select the Recording option to enable the selecte d camera to record by motion detection. - 78 -[...]

  • Page 80

    z Schedule Recording Configuration This recording method will work after you have completed the required settings in the Schedule Recording Configuration . The recording schedule can be defi ned by Dates or Day s . - Dates: Select the camera from the pull-down list. - 79 -[...]

  • Page 81

    Select a camera Add Sche dule - Then, click Add to set the Start/Stop date and time and then click OK to add the recording schedule to the list. - 80 -[...]

  • Page 82

    - Click Apply to save the settings. Days : First, select the camera from the pull-down list and select Day s tab. Then, select the weekday from the day buttons and then set the time period. Click Apply to save the settings. - 81 -[...]

  • Page 83

    T o configure the recording settings To configure the recording setting s, including the storage folder and storage options, clic k SETTING > Recording Configuration . - 82 -[...]

  • Page 84

    z Recording File Path: To change the destination folder to save the recorded video file, click Browse under the Recording File Path box to assign a new folder. z Each Recording File Size: This option allows you to select from 20 to 100 MB so that the video will be recorded as another file automatically when the re co rding file reaches the specifie[...]

  • Page 85

    z Enable Recycle Recordin g: Click on t he camera number to clear the files when the unreserved spa ce of the hard disk drive is full. T o playback the recorded video The recorded video clip s are saved in your computer, and can be played using the media player on the computer, such as Wi ndows Media Player. To start playback, simply click the PLAY[...]

  • Page 86

    the video code from http://www.xvid.org/downloads.1 5.0.html to support. T o set up motion detection options When the motion detection function of the selected camera is enabled, you can set the Motion Options by selectin g Alarm , Recording , Send e-Mail , and Trigger Out un der SETTING > Motion Configuration . z Alarm: Select Beep or Music to [...]

  • Page 87

    z Recording: Select this option to enable the came ra to record by motion detected. z Send Email: Select this option so that the system will be able to send an email to the specified receiver. Once the option is selected, you have to complete the requi red information in SETTING > Motion Configuration > Email Configuration . - Mail Server: En[...]

  • Page 88

    - Password: Enter the password to login the mail server. - Subject: Enter a subject for the notification email. z Trigger Out: If the selected camera supports Trigger Out connector, select this option to enable the Trigg er out function. Account Click SETTING > Account to setup the username & password to lock & unlock the main screen of [...]

  • Page 89

    Information Click SETTING > About to display the information of the software application. - 88 -[...]

  • Page 90

    C HAPTER 6 A PPENDIX A.1 Specification z System Hardware - Processor ARM9 base - RAM 32MB SDRAM - ROM 8MB NOR Flash - Pow er DC 12V z Image Sensor - Sensor 1/4” Low Lux CMOS sensor; minimum illumination @ 0.1 LUX - Resolution 640 x 480 z Lens Assembly - Lens Type Board Lens - Aperture (F/No.) 2.0 - Focus Length 4.2 mm - View Angle (Diagonal) 60 d[...]

  • Page 91

    - 90 - - Protocol TCP/IP, UDP, ICMP, DHCP, NTP, DNS, DDNS, SMTP, FTP, HTTP, Samba, PPPoE, UPnP, Bonjour, RTP, RTSP, RTCP z User Interface - LAN One RJ-45 port - Reset One Reset button - GPIO 2 in / 1 out - TV Out BNC connecter, 1 Vp-p, 75 Ohms - Sw itches One Power LED switch; one Link LE D switch - LEDs One Power LED (amber); one Link LED (green) [...]

  • Page 92

    - 91 - A.2 Glossary of Terms NUMBERS 10BASE-T 10BASE-T is Ethernet over UTP Category III, IV, or V unshielded twisted-pa ir media. 100BA SE-TX The two-pair twisted-media im pleme ntation of 100BASE-T is called 100BASE-TX. A ADP CM Adaptive Differential Pulse C o de Modulation, a ne w technology improved from PCM, which encodes analog sounds to digi[...]

  • Page 93

    - 92 - BOOTP Bootstrap Protocol is an Internet protocol that can automatically configure a network dev ice in a diskless workstation to give its own IP address. C Communication Communication has four components: sender, receiver, message, and medium. In net works, devices and application tasks and processes commu nicate messages to each other over [...]

  • Page 94

    - 93 - DNS will translate the name into the corresp onding IP address. For example, the do main name www.network_camera.com might translate to 192.167.222.8 . E Enterprise network An enterprise network consists of collections of networks connected to each other over a geographically dispersed area. The enterpris e network serves the needs of a wide[...]

  • Page 95

    - 94 - formats together. Group Groups consist of several user machines that have similar characteristics such as being in the same department. H HEX Short for hexadecim al refers to the base-16 numb er system, which consists of 16 unique symbol s: the numbers 0 to 9 and the letters A to F. For example, the decimal number 15 is repr esented as F in [...]

  • Page 96

    - 95 - function of a router or gateway to assign the IP addresses on internal net works. IP address IP address is a 32-binary di git number that identifies each sender or receiver of information that is sent in packets across the Internet. For example 80.80.80.69 is an IP address. When you “call” that num be r, using any connection methods, you[...]

  • Page 97

    - 96 - M MJPEG MJPEG (Motion JPEG) composes a movi ng image by storing each frame of a moving picture sequenc e in JPEG compression, and then decom pressi ng and displaying eac h frame at rapi d speed to show the moving picture. MPEG4 MPEG4 is desi gned to enable transmission a nd reception of high-qualit y audio and video ov er the Internet and ne[...]

  • Page 98

    - 97 - P PCM PCM (Pulse C ode Modulation) is a techniqu e for converting analog audi o sign als into digital form for transmission. PING Packet Internet Groper, a utility us ed to deter mine whether a specific IP address is accessible. It functions by sending a packet to the specified address and waits for a reply. It is primarily used to troublesh[...]

  • Page 99

    - 98 - R RJ-45 RJ-45 connector is used for Ethernet cab le connections. Router A router is the network software or hardware entity charged with routing packets bet ween networks. RTP RTP (Real-time Transport Protocol) is a data transfer protocol defined to deliver live media to the clients at the same time, which defines the transmission of video a[...]

  • Page 100

    - 99 - T (TCP/IP) Transmission Control Protoc ol/Internet Prot ocol is a widely used transport protocol that connects divers e computers of various transmission methods. It was developed y the Department of Defense to c onnect different computer types and led to the development of the Internet. Transcei ver A transceiver joins two network segments [...]

  • Page 101

    - 100 - Windows Windo ws is a graphical user interface for workstations that use DOS. WPA WPA (Wi-Fi Protected Access ) is used to improve the security of Wi-Fi networks, replacing the cur rent WEP standard. It uses its own enc ryption, Temporal Key Integrity Protocol (TKIP), to secure data during transmission. WPA2 Wi-Fi Protected Access 2, the la[...]

  • Page 102

    - 101 - Limited Warranty TRENDnet warrants its products against defects in material and workmanship, under normal use and se rvice, for the following lengths of time from the date of purchase. TV-IP252P – 3 Years Warranty AC/DC Power Adapter, Cooling Fan, and Power Supply carry 1 year warranty. If a product does not operate as warranted during th[...]

  • Page 103

    - 102 - product was subject to conditions more severe than those specified in the manual. Warranty service may be obtained by contacting TRENDnet within the applicable warranty period and providing a copy of the dated proof of the purchase. Upon proper submission of required documentation a Return Material Authorization (RMA) number will be issued.[...]

  • Page 104

    - 103 - TRENDNET SHALL NOT BE LIABLE UNDER THIS WARRANTY IF ITS TESTING AND EXAMINATION DISCLOSE THAT THE ALLEGED DEFECT IN THE PRODUCT DOES NOT EXIST OR WAS CAUSED BY CUSTOMER’S OR ANY THIRD PERSON’S MISUSE, NEGLECT, IMPROPER INSTALLATION OR TESTING, UNAUTHORIZED ATTEMPTS TO REPAIR OR MODIFY, OR ANY OTHER CAUSE BEYOND THE RANGE OF THE INTENDED[...]

  • Page 105

    - 104 - Some TRENDnet products include software code written by third party developers. These codes are subject to the GNU General Public License ("GPL") or GNU Lesser General Public License ("LGPL"). Go to http://www.trendnet.com/gpl or http://www.trendnet.com Download section and look for the desired TRENDnet product to access[...]

  • Page 106

    - 105 -[...]