Axis Communications AXIS Q1755 user manual URL Uniform Resource Locator An address on the network

Page 56

IMAP. These other protocols allow the user to save messages in a server mailbox and download them periodically from the server.

SMTP authentication is an extension of SMTP, whereby the client is required to log into the mail server before or during the sending of email. It can be used to allow legitimate users to send email while denying the service to unauthorized users, such as spammers.

SNMP (Simple Network Management Protocol) - SNMP forms part of the Internet Protocol suite, as defined by the Internet Engineering Task Force. The protocol can support monitoring of network-attached devices for any conditions that warrant administrative attention.

Sockets - Sockets are a method for communication between a client program and a server program over a network. A socket is defined as ‘the endpoint in a connection.’ Sockets are created and used with a set of programming requests or ‘function calls’ sometimes called the sockets application programming interface (API).

SSL/TSL (Secure Socket Layer/Transport Layer Security) These two protocols (SSL is succeeded by TSL) are cryptographic protocols that provide secure communication on a network. SSL is commonly used over HTTP to form HTTPS, as used e.g. on the Internet for electronic financial transactions. SSL uses public key certificates to verify the identity of the server.

Subnet/subnet mask - A subnet is an identifiably separate part of an organization's network. Typically, a subnet may represent all the machines at one geographic location, in one building, or on the same local area network (LAN). Having an organization's network divided into subnets allows it to be connected to the Internet with a single shared network address.

The subnet mask is the part of the IP address that tells a network router how to find the subnet that the data packet should be delivered to. Using a subnet mask saves the router having to handle the entire 32-bit IP address; it simply looks at the bits selected by the mask.

Switch - A switch is a network device that connects network segments together, and which selects a path for sending a unit of data to its next destination. In general, a switch is a simpler and faster mechanism than a router, which requires knowledge about the network and how to determine the route. Some switches include the router function. See also Router.

TCP (Transmission Control Protocol) - TCP is used along with the Internet Protocol (IP) to transmit data as packets between computers over the network. While IP takes care of the actual packet delivery, TCP keeps track of the individual packets that the communication (e.g. requested a web page file) is divided into, and, when all packets have arrived at their destination, it reassembles them to re-form the complete file.

TCP is a connection-oriented protocol, which means that a connection is established between the two end-points and is maintained until the data has been successfully exchanged between the communicating applications.

Telnet - Telnet is a simple method with which to access another network device, e.g. a computer. The HTTP protocol and the FTP protocols allow you to request specific files from remote computers, but do not allow you logon as a user of that computer. With Telnet, you log on as a regular user with

AXIS Q1755/-E - Glossary of Terms

whatever privileges you may have been granted for specific applications and data residing on that computer.

UDP (User Datagram Protocol) - UDP is a communications protocol that offers limited service for exchanging data in a network that uses the Internet Protocol (IP). UDP is an alternative to the Transmission Control Protocol (TCP). The advantage of UDP is that it is not required to deliver all data and may drop network packets when there is e.g. network congestion. This is suitable for live video, as there is no point in re-transmitting old information that will not be displayed anyway.

Unicast - Communication between a single sender and a single receiver over a network. A new connection is established for each new user.

URL (Uniform Resource Locator) - An "address" on the network.

Varifocal lens - A varifocal lens provides a wide range of focal lengths, as opposed to a lens with a fixed focal length, which only provides one.

VPN (Virtual Private Network) - This creates a secure "tunnel" between the points within the VPN. Only devices with the correct "key" will be able to work within the VPN. The VPN network can be within a company LAN (Local Area Network), but different sites can also be connected over the Internet in a secure way. One common use for VPN is for connecting a remote computer to the corporate network, via e.g. a direct phone line or via the Internet.

VOP (Video Object Plane) - A VOP is an image frame in an

H.264 video stream. There are several types of VOP:

-An I-VOP is complete image frame.

-A P-VOP codes the differences between images, as long as it is more efficient to do so. Otherwise it codes the whole image, which may also be a completely new image.

WAN (Wide-Area-Network) - Similar to a LAN, but on a larger geographical scale.

W-LAN (Wireless LAN) - A wireless LAN is a wireless local area network that uses radio waves as its carrier: where the network connections for end-users are wireless. The main network structure usually uses cables.

Web server - A web server is a program, which allows web browsers to retrieve files from computers connected to the Internet. The web server listens for requests from web browsers and upon receiving a request for a file sends it back to the browser.

The primary function of a web server is to serve pages to other remote computers; consequently, it needs to be installed on a computer that is permanently connected to the Internet. It also controls access to the server whilst monitoring and logging server access statistics.

WEP (Wireless Equivalent Privacy) - A wireless security protocol, specified in the IEEE 802.11 standard, which is designed to provide a wireless local area network (WLAN) with a level of security and privacy comparable to that usually expected of a wired LAN. Security is at two different levels;

40-bit and 128-bit encryption. The higher the bit number, the

56

Image 56
Contents USER’S Manual Axis Q1755/-E User’s Manual Axis Q1755/-E Table of contents Contents Axis Q1755/-E Product Description Key featuresProduct Description Overview Rear view Bottom viewAlarm output connected at delivery Axis Q1755-EAxis Q1755/-E Accessing the Camera Accessing the CameraAccess from a browser Click the Create self-signed certificate button Setting the root passwordAccess from the internet Setup Events Gatekeeper Live ViewGeneral controls Axis Media Control toolbarHalf-duplex mode AMC Audio controlsAxis Q1755/-E Video Streams How to stream H.264Video Streams Alternative methods of accessing the video stream Motion JpegAxis Q1755/-E Video Streams Axis Media Control AMC Unicast via Rtsp axrtsp//ip/axis-media/media.ampBasic Setup Axis Q1755/-E Basic SetupVideo & Audio Video StreamAxis Q1755/-E Video & Audio Text Overlay Settings 264 GOV SettingsAudio Bit Rate ControlCamera Settings Exposure SettingsStream Profiles White balancePrivacy mask Focus and zoomOverlay Image Audio Settings Audio mode The available audio modes areAudio Channels Audio InputAxis Q1755/-E Video & Audio Audio Output Live View Config Axis Q1755/-E Live View ConfigDefault Viewer LayoutViewer Settings Action ButtonsUser Defined Links Other browsersAxis Q1755/-E Live View Config Output Buttons Preset Positions PTZ Pan Tilt ZoomAdvanced Pan/Tilt DeviceControl Queue Settings Panel Shortcut Command ButtonsEnable/Disable controls ControlsEvents Event ServersEvent Types Axis Q1755/-E EventsHow to set up a triggered event Following example describes how to set up a triggered eventAxis Q1755/-E Events Triggered Event Save streamHow to set up a scheduled event SettingsGatekeeper Camera tamperingSet up a motion detection include window After you define these settings, click SaveMotion Detection Go to Events Motion DetectionPort Status ExamplesRemove button is used to delete unlocked recordings Recording ListAxis Q1755/-E Recording List System Options SecurityAxis Q1755/-E System Options UsersCertificates Audio SupportAxis Q1755/-E System Options Ieee Basic TCP/IP Settings Network SettingsIPv4 Address Configuration Date & TimeAdvanced TCP/IP Settings IPv6 Address ConfigurationServices DNS ConfigurationLAN intranet Link-Local IPv4 AddressHttp and Https NAT traversal port mapping for IPv4QoS Quality of Service Smtp emailSnmp v1/v2 As the Internet. See the online help for more informationStorage Ports & DevicesSupport LED SettingsMaintenance Plain Config ConfigurationAdvanced File UploadResetting to the Factory Default Settings Using the Control ButtonAbout Axis Q1755/-E AboutUnit connectors Axis Q1755/-E Unit connectorsLED indicators Troubleshooting Axis Q1755/-E TroubleshootingEmergency Recovery Procedure Checking the FirmwareAxis Q1755/-E Troubleshooting Axis Support Installation Guide Guide or the ARP/Ping commandsRouter to allow access to the camera Check the Internet firewall with your system administratorSet to Decode only I frames Volume settings are correct Server. This is enabled under System Options Date & TimeExisting files to free up space NanceTechnical Specifications Axis Q1755/-E Technical SpecificationsAlarm triggers Alarm eventsSystem Application Integration ProgrammingPower ConnectorsDimensions WeightGeneral performance considerations Glossary of Terms Axis Q1755/-E Glossary of TermsEtrax Ethernet Token Ring Axis Axis own microprocessor Half-duplex See Full-duplexMAC address Media Access Control address a MAC VOP See VOPAxis Q1755/-E Glossary of Terms URL Uniform Resource Locator An address on the network More secure the encryption Axis Q1755/-E Index Active/Inactive 22 Alarm 28, 41 AMC 7 ARP/Ping 34 AudioBackup Bit Rate Bonjour Buffer Size Video Stream