Vivotek IP2122, IP2112 manual Application constitution, Weekly schedule, External command script

Page 29

Application constitution

Administrators can use combinations of options on the application page to perform many useful security applications. Network Camera provides two application modes; one is performed according to the settings on the web page, the other is performed according to the external command script. Though most settings will automatically be done by the Application Wizard, administrators still can adjust the settings from this page.

Weekly schedule

A useful weekly schedule is provided for daily security application. Administrators can select weekdays from Monday to Friday with the daily schedule from 9:00 am to 6:00 pm that no one is at home to perform any event checking. If the security system needs to be installed in office that no one is there during the nights or weekend, administrators just set the time period as above, then check “All the time except for the above schedule” for opposite operations.

External command script

Administrators can write a script named SCRIPT.TXT to perfectly match the additional software according to the Command Script for Complex Applications section in the Chapter Advanced Functions. After uploading this script to Network Camera via FTP, check the option “Enable the external script file to exclude the following settings”. Otherwise Network Camera will operate according to the settings below.

Event operation

Network Camera provides general options for two basic applications, event operation for security and sequential operation for web attraction. In event operation, administrators have to setup some conditions to check and some actions to happen consequently. The conditions include motion detection and the status of digital input. While checking “Detect motion” box, administrators should click “Motion Detection” button on Video page or click “Motion Detection” link in Application page to configure the appropriate parameters. In the newly opened window, percentage of object size over whole window and sensitivity can be fine tuned to fit into the environment. If any motion is over the settings, an ‘M’ will appear on the upper-right corner of image for indication. The ‘M’ will appear in the image to indicate some motion is detected as long as “Show alert in image” is checked. If there are any sensors attached to the digital input, administrators can set the state to fire alarm. There are four states of “Input is High”, “Input is Low”, “Input is Rising” and “Input is Falling”. The edge trigger like “Rising” or “Falling” is generally used to detect the emerging signal from the external sensor. Once any event happens, administrators can select “Delay second(s) after

28

Image 29
Contents Page Before You Use Table of Contents Appendix Package Contents Features and Benefits Developer’s technical support Remote system upgradeManual focus ring Physical DescriptionFront Panel Rear Panel BNC video output connectorEthernet 10/100 socket General I/O terminal blockPower cord socket How to Install Power on Hardware installationEthernet Environment Cable connectionEasy way with installer program Software installationPage Manual way with existing programs Change initial password of administrator First access to Network CameraComplete the network settings Manage user privilegeAuthentication How to UseInstalling Plug-in Main Video size selection Video quality selectionExternal digital output control System configurationIntroduction System ConfigurationApplication Wizard Setup WizardAdjust date and time Definitions of ConfigurationSystem parameters Change host nameSecurity privilege Network settings FTP settings Video and motion detection Adjust image settingsConfigure motion detection Application constitution External command scriptWeekly schedule Event operationSending method Sequential operationHomepage layout View parameters Factory defaultView log file Capture Up-to-date Still Images Advanced FunctionsGet snapshot via URL Get snapshot via FTPVideo Embedded in Customers’ Homepage Get triggered snapshots via FTP Download Event-triggered SnapshotsGet triggered snapshots via URL Send snapshots to external Smtp email server Uploading Snapshots PeriodicallyUpload snapshots to external FTP server Object File name Maximal size Customize Graphics in HomepageParameter explanation Command Script for Complex ApplicationsCommand format Page Practical examples Command line DescriptionDrive digital output URL for External Device ControlQuery status of digital input Restore Factory Default Settings via URL URL of System MaintenanceDownload System Log via FTP Restart System via URLConfigure System via FTP Followings are as same as the above Or 1024 ~ ~99 Demo System core debugging Telnet CommandsMonitor changed status of digital input Stop information dumpingReset network for new settings Skip installation at next bootRestore factory default settings Reset systemSelf-diagnostic starts TroubleshootingReset and restore AppendixFrequently Asked Questions Page Page Page Alternative via FTP Upgrade System FirmwareEasy way via Upgrade Wizard System resource URL URL Commands of Network CameraURL Resource name Referenced URL System configuration URL General format of command URLNetwork configuration URL Video configuration URL Excellent Highest resolution Application configuration URL Image quality configuration URLMotion detection configuration URL Page Homepage layout configuration URL Time Zone Table Page GMT+1000 Hobart Vladivostok GMT+1100 Networking Technical SpecificationsElectromagnetic Compatibility EMC

IP2112, IP2122 specifications

Vivotek has established itself as a notable player in the realm of IP surveillance cameras, and the IP2122 and IP2112 models are prime examples of their dedication to quality and performance. Both models are designed to meet the rising demands for security in various environments, from retail establishments to transportation hubs.

The Vivotek IP2122 boasts a range of advanced features tailored for high-performance video surveillance. With a 1.3-megapixel resolution, this camera captures detailed images with clarity, making it suitable for identifying faces and license plates. The camera utilizes a progressive scan CMOS sensor that excels in varying light conditions, providing better images in both bright and low-light environments. It supports H.264 video compression, which offers efficient storage and bandwidth savings without compromising on quality.

On the other hand, the Vivotek IP2112, while similar in many respects, presents slightly varied features. This model also utilizes a 1.3-megapixel sensor and is designed for cost-effective deployment, ideal for users seeking reliable surveillance without excessive complexity. Like the IP2122, it supports H.264 compression, ensuring efficient video quality even in high-motion scenarios.

Both models are equipped with Vivotek's Smart Stream technology, which intelligently adjusts the video quality based on the activity in the scene. This dynamic feature assists in optimizing bandwidth usage and storage requirements, making it a sustainable option for long-term surveillance needs. Furthermore, these cameras utilize a built-in SD/SDHC card slot for local storage, a feature that enhances flexibility for users who prefer recording without depending solely on external servers.

An essential aspect of the Vivotek IP2122 and IP2112 is their ability to work seamlessly with Vivotek's own network video recorders and third-party solutions. Both models are compliant with the ONVIF standard, ensuring interoperability with various security systems and additional video management software.

In terms of physical design, these cameras are compact and feature a weatherproof enclosure, making them suitable for both indoor and outdoor installations. The vandal-resistant features also ensure durability in high-risk environments.

In summary, the Vivotek IP2122 and IP2112 are powerful tools designed for effective surveillance, featuring high-resolution imaging, Smart Stream technology, and easy integration into a broader security system. These characteristics make them excellent choices for anyone looking to enhance their security infrastructure.