Samsung SNC-B5399P manual Acceptance Not Required for Having Copies, Patents

Page 103

However, if you cease all violation of this License, then your license from a particular copyright holder is reinstated (a) provisionally, unless and until the copyright holder explicitly and fi nally terminates your license, and (b) permanently, if the copyright holder fails to notify you of the violation by some reasonable means prior to 60 days after the cessation.

Moreover, your license from a particular copyright holder is reinstated permanently if the copyright holder notifi es you of the violation by some reasonable means, this is the fi rst time you have received notice of violation of this License (for any work) from that copyright holder, and you cure the violation prior to 30 days after your receipt of the notice.

Termination of your rights under this section does not terminate the licenses of parties who have received copies or rights from you under this License. If your rights have been terminated and not permanently reinstated, you do not qualify to receive new licenses for the same material under section 10.

9.Acceptance Not Required for Having Copies.

You are not required to accept this License in order to receive or run a copy of the Program. Ancillary propagation of a covered work occurring solely as a consequence of using peer-to-peer transmission to receive a copy likewise does not require acceptance. However, nothing other than this License grants you permission to propagate or modify any covered work. These actions infringe copyright if you do not accept this License. Therefore, by modifying or propagating a covered work, you indicate your acceptance of this License to do so.

10.Automatic Licensing of Downstream Recipients.

Each time you convey a covered work, the recipient automatically receives a license from the original licensors, to run, modify and propagate that work, subject to this License. You are not responsible for enforcing compliance by third parties with this License.

An “entity transaction” is a transaction transferring control of an organization, or substantially all assets of one, or subdividing an organization, or merging organizations. If propagation of a covered work results from an entity transaction, each party to that transaction who receives a copy of the work also receives whatever licenses to the work the party's predecessor in interest had or could give under the previous paragraph, plus a right to possession of the Corresponding Source of the work from the predecessor in interest, if the predecessor has it or can get it with reasonable efforts.

You may not impose any further restrictions on the exercise of the rights granted or affi rmed under this License. For example, you may not impose a license fee, royalty, or other charge for exercise of rights granted under this License, and you may not initiate litigation (including a cross-claim or counterclaim in a lawsuit) alleging that any patent claim is infringed by making, using, selling, offering for sale, or importing the Program or any portion of it.

11. Patents.

A “contributor” is a copyright holder who authorizes use under this License of the Program or a work on which the Program is based. The work thus licensed is called the contributor's “contributor version”.

A contributor's “essential patent claims” are all patent claims owned or controlled by the contributor, whether already acquired or hereafter acquired, that would be infringed by some manner, permitted by this License, of making, using, or selling its contributor version, but do not include claims that would be infringed only as a consequence of further modifi cation of the contributor version. For purposes of this defi nition, “control” includes the right to grant patent sublicenses in a manner consistent with the requirements of this License.

Each contributor grants you a non-exclusive, worldwide, royalty-free patent license under the contributor's essential patent claims, to make, use, sell, offer for sale, import and otherwise run, modify and propagate the contents of its contributor version.

Image 103
Contents Netzwerkkamera Warnung ÜbersichtVorsicht Important Safety Instructions Inhaltsangabe 71 74 Technische Daten Kompatible IP-Routers Vorsichtsmassnahmen Installation UND VerwendungFunktionen DES Produktes Empfohlene PC-SPEZIFIKATIONENART-PAPIER LieferumfangAufbau AUF Einen BlickInnenansicht Entriegelung KomponentenTragflächen Innenabdeckung möglich Monitor-Ausgang Der Kamera anschließenDemontage Installation & verbindungEinsetzen einer SD-Speicherkarte EINSETZEN/ENTFERNEN Einer SD-SPEICHERKARTEEntfernen einer SD-Speicherkarte Verwendung der Speicherkarte Speicherkarteninformation Nicht EnthaltenWas ist eine Speicherkarte? Wählen Sie eine für Ihre Zwecke geeignete SpeicherkarteEnergie Monitor Anschluss AN Andere GeräteStromversorgung Anschluss des MonitorsLINE-IN Verbinden an den Audio Eingang/AusgangLINE-OUT MikrofonNetzwerk Audio E/A BlockdiagrammAnschluss an die I/O-Port-Box Verbindung der Kabel für den Alarmeingang/AlarmausgangOptionales Zubehör FÜR DIE Installation InstallationBevor Sie mit der Installation beginnen Eckadapter SCX-300KM Direkte Montage an der DeckeUnd entfernen Sie dann die Kamera vom Gehäuse Bündige Montage an der Decke Anschluss zusätzlicher Alarmkabel Überwachungsrichtung der Kamera einstellen Es wird zum Hauptmenü zurückgekehrt SO Verwenden SIE DIE Taste MenüProfil HauptmenüKAMERA-ID KameraeinstellungBlende EMPF-PLUS AktivitaetDNR VrschlWeissabgl TAG/NACHTWeissabgleich Rückw Digital ZoomDetail AGC Untd FarbüberlEinstellung DER Privatzone PrivatzoneDie Spracheinstellung wird jedoch nicht zurück- gesetzt SonstigesWerkseinstellungen OSD-FARBDie aktuellen Systeminformationen werden angezeigt SysteminfoSprache Sie können die Systeminformationen überprüfenNetzwerkverbindungen und -konfiguration HUB Internet Einstellung des IP-Routers Anschluss an die Kamera von einem lokalen PC im LAN Direktes Verbinden DER Kamera AN DAS LANKonfiguration VON IP-ADRESSEN Schaltflächen des IP-InstallationsprogrammsManuelle Netzwerkeinstellung Einstellung DER Statischen IPURL Geben Sie die nötigen Informationen in dem Fenster Port an Bei Verwendung eines IP-RoutersKlicken Sie auf Auto Set Automatische NetzwerkeinstellungEinstellung der dynamischen IP-Umgebung Einstellung DER Dynamischen IPManuelle Portbereichweiterleitung Portbereichweiterleitung Konfigurieren Port MappingNetzwerkverbindungen und -konfiguration URL verwenden Verbindung ZU DER Kamera HerstellenNormalerweise gehen Sie so vor Falls die Nummer des HTTP-Ports nicht 80 istDDNS-Adresse überprüfen AnmeldenFür Benutzer von Windows XP Service Pack ACTIVEX-STEUERELEMENT InstallierenKlicken Sie auf Install ActiveX Control DEN LIVE-BILDSCHIRM Verwenden Einen Schnappschuss aufnehmen BackupEin Video aufnehmen Ein Bildschirmfoto ausdruckenDeutsch Anordnung Hauptbild Benutzung DES SD SuchbildschirmsStandardeinstellungen DEN Bildschirm FÜR DIE Einstellungen ÖffnenVideo- und Audioeinstellungen konfigurieren Bildschirm für die einstellungen Wählen Sie Basic IP IP-Einstellungen konfigurierenIP-Adresse Die aktuelle IP-Adresse wird angezeigt Ein Benutzerkonto einrichten Das Fenster für die Benutzerregistrierung wird geöffnet BenutzerregistrierungDatum/Uhrzeit einstellen „Systemzeit-Setup festgelegte Zeit wird übernommenSystemeinstellungen Anzeigesprache festlegenEin neues Protokoll ersetzt Protokollinformationen überprüfenSystem gestartet Wenn sich die Kamera einschaltet Systemzeit geändert Wenn die Systemzeit geändert wurdeSystem zurücksetzen Die Software aktualisierenErscheint Https einstellenIP-Filter festlegen Https wird geöffnetText einstellen OVERLAY-EINSTELLUNGSie können einen Text auf dem Bildschirm anzeigen lassen Die Funktion der Ereignisübertragung einstellen EreigniseinstellungBildschirm für die einstellungen Zur Einstellung der Aufnahme Alarmbild einstellenAlarmeingang einstellen Objekt in Bewegung kommt zu nahe an Kamera heran Intelligente Videoanalyse festlegenNicht aktiv, wenn Deaktivieren gewählt wurde Ein Objekt verdeckt andere ObjekteBildschirm für die einstellungen Übertragungsintervall Legen Sie Die zeitgeplante Übertragung einstellenDen Modus der Videoübertragung einstellen NetzwerkeinrichtungDdns einstellen Objektiv Wert ITSSpielb ALCVBR Variable Bitrate BegriffsdefinitionDeutsch Technische Daten 4CIF CS/CRAM DSPG/S/I/C/K HTTPS, SSL, DhcpARP, DNS, DDNS, Vsip DdnsSDK Http APIFPS Bildrate Ntsc Testbedingung Mjpeg AuflösungCIF, Qualität1, Bildfrequenz1 30 FPS 15 FPS264 4CIF MPEG4 VGA 264 VGA MPEG4 CIF 264 CIF 25 FPS 13 FPS Bildrate PALKbps 16 FPS MPEG4 VGA Kbps 17 FPS MPEG4 CIF 264 CIF Fehlersuche Problem LösungGesetzt werden Alarm Videoübertragung muss aktiviert seinAufnahmesetup erneut NTP muss korrekt konfiguriert werdenWe protect your rights with two steps GPL/LGPL Software LicenseGNU General Public License PreambleProgram, and can be reasonably Page Page How to Apply These Terms to Your New Programs No WarrantyEND of Terms and Conditions GNU General Public License You must show them these terms so they know their rights Terms and ConditionsBasic Permissions Source CodeProtecting Users Legal Rights From Anti-Circumvention Law Conveying Modified Source Versions Conveying Verbatim CopiesConveying Non-Source Forms Installed in ROM Additional Terms Automatic Licensing of Downstream Recipients Acceptance Not Required for Having CopiesPatents No Surrender of Others Freedom ValidUse with the GNU Affero General Public License END of Terms and Conditions GNU Lesser General Public LicensePreamble Page Page Page Page Page How to Apply These Terms to Your New Libraries No Event Shall the OpenSSL OpenSSL LicenseCopyright C1995-1998 Eric Young Original SSLeay LicenseKorrekte Entsorgung von Altgeräten Elektroschrott
Related manuals
Manual 117 pages 7.67 Kb Manual 117 pages 9.38 Kb Manual 117 pages 10.42 Kb Manual 115 pages 845 b

SNC-B5399P specifications

The Samsung SNC-B5399P is a high-performance network camera designed for various surveillance applications, providing exceptional video quality and advanced features that cater to both commercial and residential users. It is equipped with a progressive scan 1/3” CMOS sensor, offering a resolution of up to 2 Megapixels, which allows for clear and detailed images, making it ideal for monitoring critical areas where image clarity is paramount.

One of the standout features of the SNC-B5399P is its ability to deliver superior low-light performance. With the support of Wide Dynamic Range (WDR) technology, this camera can capture images in challenging lighting conditions, ensuring that both bright and dark areas are well-represented. This is particularly beneficial in environments such as entrances where direct sunlight and shadows can cause visibility issues.

The camera also supports H.264 and MJPEG video compression technologies, enabling efficient bandwidth and storage management. This flexibility allows users to choose the best format according to their specific needs, whether they prioritize image quality or storage space. Furthermore, the SNC-B5399P is capable of providing frame rates of up to 30 frames per second at full resolution, ensuring smooth video playback without noticeable delays.

In terms of connectivity, the SNC-B5399P features Ethernet support with Power over Ethernet (PoE) capabilities, simplifying installation by allowing power and data transmission through a single cable. This can be particularly advantageous in locations where power outlets are scarce or difficult to access.

The camera is equipped with advanced security features, including motion detection that can trigger alerts and recording, as well as support for secure streaming protocols to protect data integrity. Its sleek, compact design allows for discreet installation, making it suitable for a variety of surveillance settings without drawing unwanted attention.

Users can easily manage and configure the SNC-B5399P through a user-friendly interface, accessible via web browsers or dedicated software, providing flexibility in monitoring and maintaining surveillance systems. Overall, the Samsung SNC-B5399P is a robust solution for those seeking reliable, high-quality video surveillance with cutting-edge features tailored to meet diverse security needs.