Amegia AM1200 User Manual

Compact high-end network camera

Advertisement

Quick Links

2 Megapixels
Compact High-End
Network Camera
User's Manual
Draft v1.2
- 1 -

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the AM1200 and is the answer not in the manual?

Questions and answers

Summary of Contents for Amegia AM1200

  • Page 1 2 Megapixels Compact High-End Network Camera User’s Manual Draft v1.2 - 1 -...
  • Page 2: Table Of Contents

    INDEX OVERVIEW ........................- 3 - PRODUCT DESCRIPTION ..................... - 3 - ................... - 4 - ARDWARE ESCRIPTION SETTING UP THE NETWORK CAMERA ............... - 5 - ..................... - 5 - EFORE .................. - 5 - ARDWARE NSTALLATION TEPS ............- 6 - SING THE ETWORK AMERA FOR THE FIRST TIME...
  • Page 3: Overview

    1 Overview This network camera is intended for your home and commercial surveillance usage under indoor environments. It comes with a High-end 2-megapixel CMOS Sensor, with a maximum resolution of 1600 x 1200, delivering detailed images and covering 6 times larger than a VGA camera. The dPTZ (Digital Pan Tilt Zoom) allows user to navigate through the area of the image of most interest without relocating the camera physically.
  • Page 4: Hardware Description

    Hardware Description ( Front Panel View ) Lens Focus Ring Bracket Nut Hole Network Power Connector Connector Built-In Wireless Antenna (optional) Micro SD Card slot Power LED ( Back Panel View ) Light Sensor (Optional) * Built-In Infrared LEDs (optional) Default Button Microphone Audio Out...
  • Page 5: Setting Up The Network Camera

    3 Setting up the Network Camera Read Before Use The use of surveillance devices may be prohibited by law in your country. The Network Camera is not only a high-performance web-ready camera but can also be part of a flexible surveillance system. It is the user’s responsibility to ensure that the operation of such devices is legal before installing this unit for its intended use.
  • Page 6: Using The Network Camera For The First Time

    Using the Network Camera for the first time The Network Camera is a network device and its use should be straightforward for those who have basic networking knowledge. Making the initial steps for setting up the network camera will be based on a simple network connection.
  • Page 7: Accessing The Network Camera

    4 Accessing the Network Camera Finding the camera IP Discovery Tool IP Discovery is the software that provides an easier way for setting the IP address and network configurations of the Network Camera. Using this tool, you can easily set multiple Network Cameras at the same time. By utilizing the IP Discovery tool, the setting process is largely simplified and the setting time is effectively shortened.
  • Page 8: Assigning The Ip Address To The Network Camera

    Assigning the IP address to the network camera Identify your Network Camera by its MAC address, which is located in the Product Label on the Network Camera. Click on the network camera for which a new IP address will be assigned to it, and proceed to fill with the following information.
  • Page 9 When popup the following dialogue box, click “Yes” Hints: Changing the root password To avoid security breaches, it is recommended changing the Username and Password once the device is set up to work. Refer to Chapter 5, Configuring the Camera, System Settings. - 9 -...
  • Page 10: The Live View Page

    The Live View Page Video Source: The Stream Profile drop-down list allows you to select a customized or pre-programmed stream profile on the Live View page. Refer to Streaming Settings of this chapter for more references. Rotation: allows the rotation of the video to be viewed in an angle of 0 (current), 90, 180 or 270 degrees at a clockwise direction.
  • Page 11 Full Screen: Maximizes the video to be displayed at a full screen size. Real Size: Displays the real size of the video; (the initial video size will be adjusted to fit your monitor, while the real size could be bigger than it is being shown in the monitor). Listen: allows the user from the PC listen the location where the camera is set.
  • Page 12: Configuring The Camera

    5 Configuring the camera Video: Main features and advanced configurations of video streaming. Camera: Image adjustments such as brightness, white balance and more. Storage: Displays information of the files located in the Micro SD card (if any). Event: Smart features for event settings to send emails, snapshots and more. Network: Network configuration for the network camera and Event features.
  • Page 13 OSD Setting: Enable: Once enabled, a text message can be displayed on top of the video. This is useful to indicate a Camera Name or the location where the Network Camera is installed in. Camera Name: To display the OSD, type a text on the box with a maximum of 20 characters. Date / Time: Displays the date and time on the video which is streamed from the Network Camera.
  • Page 14: Camera Settings

    bandwidth will affect picture quality. Quality Level: There are three levels to adjust: Best, Good and Standard The higher the quality is, the more bandwidth it will use for streaming the video. Resolution: You can set up a different video resolution for different viewing devices. Note that a larger frame size takes up more bandwidth.
  • Page 15: Storage Settings

    frame rate and bandwidth considerations. Values can be set to: Automatic, 50 or 60 kHz Max Exposure Time: Select the exposure time for the camera for the duration of the time that gets into the sensor. Max Gain Control: Select the level gain control for the camera Mirror: Flips the video based on Vertical and Horizontal view.
  • Page 16: Event Settings

    Below, a graphic representation of the page when a disk is inserted, with files store inside. 5.3.2 File list Displays the list of files which are stored in the Micro SD Card. A checkbox is shown to allow the deletion of the file if necessary. Event Settings The Event Settings page allows the user to customize the Network Camera to perform actions during a period of time, upon the occurrence of certain events in order to have a result.
  • Page 17 The time of doing something will be set by “Respond to Trigger” Doing something with a result will be set by “When Triggered…” 5.4.1 Event Configuration Event Type List Add: In order to turn on the capability of setting an Event, go to the Event Configuration page and click on Add to see the available options.
  • Page 18 the Schedule condition, since the Schedule condition sets the time as the main reason to start doing something, while the “time frame” sets the duration of the action. Check the corresponding days to execute the triggering time. Start Time: indicates that time that the trigger will be start executing Interval: indicates the interval between each action.
  • Page 19 5.4.2 Motion Detection Video motion detection is used to generate an alarm whenever movement occurs (or stops) in the video image. A total of 3 Include and/or Exclude windows can be configured. Once configured, the video motion detection windows appear in the list of available triggers, for triggering events.
  • Page 20: Network Settings

    Remove: In case any of the area is not required, click on the name of the Area Name from the Motion Detection List, and click on Remove. Windows Area Name: Descriptive name of your choice Trigger Level: values run from 0 to 100; for which the higher the number, the faster the trigger is executed. Sensitivity: values run from 0 to 100;...
  • Page 21 5.5.1 General DHCP: Obtain IP address via DHCP Dynamic Host Configuration Protocol (DHCP) is a protocol that lets network administrators centrally manage and automate the assignment of IP addresses on a network. Although a DHCP server is mostly used to set an IP address dynamically, it is also possible to use it to set a static, known IP address for a particular MAC address.
  • Page 22 provided by the DHCP server. Click the View button to see the current settings. Use the Host Name - enter the desired DNS server by specifying the following: Domain name - enter the domain(s). Multiple domains can be separated by semicolons (;). The host name is always the first part of a Fully Qualified Domain Name, for example, myserver is the host name in the Fully Qualified Domain Name myserver.mycompany.com where mycompany.com is the Domain name.
  • Page 23 To be able to use the DDNS feature, a domain name must be registered first in a domain name service from a 3 party service provider, such as DynDNS (www.dyndns.org). The DDNS feature only forwards the information between the Host Name server and the Network Camera, therefore the Username and Password must be obtained from the 3 party service provider before using the feature.
  • Page 24 Add FTP: adds an FTP to be used as a recipient for the images AddHTTP: adds an HTTP server to receive text messages. AddTCP: adds a TCP port to received text messages. AddSMTP: adds an Email server/address to receive email messages Remove: to remove any existing Event Server, select a Name from the Event Server List and click on Remove.
  • Page 25 HTTP Server Receives notification messages Name: Descriptive name of your choice URL: URL (IP address or host name) Username and Password: Enter the Username and Password for allowing the reception of messages. Note: Consult your Network Administrator for the correct Username and Password applied to the HTTP and Proxy Server.
  • Page 26 Note: Consult your Network Administrator for the availability of the TCP service and Port number to be used. Note: The SMTP Server is set in the Event Settings > Event Server configuration. Refer that section for more references. 5.5.6 Wireless ( Optional ) Wireless Mode The wireless feature is available only for wireless models.
  • Page 27: System Settings

    desired rather than the wired connection. In order to avoid network conflicts, it is recommended that the wireless IP address be different from the wired connection. Network Name (SSID): When the user wants to use the wireless function, an Access Point must be designated to serve the wireless connection.
  • Page 28 Such information is useful to have references when direct information is required without going through the different pages of configuration of the Network Camera. 5.6.2 User The user configuration page allows the Network Camera to have multiple users and profiles to access the Network Camera.
  • Page 29 Deleting a user To delete user, click on a Name from the Users list and click on “Remove”, then click on “Save” to make the changes permanent. 5.6.3 Date & Time Displays the date and time (24 hours clock) of the Network Camera. Set Server Time Select the Automatically adjust for daylight saving time changes if necessary.
  • Page 30 Set manually - this option allows you to manually set the time and date. Note: If using a host name for the NTP server, a DNS server must be configured under Network Settings. Click on “Save” to make the changes permanent. In case there was error during the selection, click on “Reset”...
  • Page 31: Application

    Application 5.7.1 Yoics Setup 5.7.1.1 Register the camera Have a Yoics account already Please go to www.yoics.net to sign in your account. Create a new Yoics account You can view it locally by typing the IP address on your browser. The IP-Discovery tool (IPDIS) can help you find the IP address of your camera.
  • Page 32 Fig1.Register this camera Register Here Fig2. New Registration - 32 -...
  • Page 33 Fig3.Detect new product window 5.7.1.2 Unregister Camera Login into Yoics Website Please go to www.yoics.net to sign in to your account. Delete Service from Camera Settings. Choose [MY STUFF]-> Settings of Camera Name.(Fig4) Click [Advanced Service Settings]->[Delete Service].(Fig5) Click Here Fig4.Camera Settings - 33 -...
  • Page 34 Click Here Fig5.Advanced Service Settings - 34 -...
  • Page 35: Troubleshooting

    6 Troubleshooting Emergency Factory Default Default Button To execute the Emergency Factory Default, proceed as follows: 1. Remove the power adapter from the socket power of the network camera 2. With a pin thin enough to go through the Default Button hole, push inside gently 3.
  • Page 36: Viewing The Camera From A Remote Location

    Viewing the camera from a remote location The below guideline shows you how to setup the Network Camera for viewing it from a remote location. The network infrastructure demonstration is just for your reference only. Each network infrastructure may vary upon the needs of the organization.
  • Page 37 Address bar the Public IP address. Once the broadband router's configurations are set, we can open the Internet Explorer and type in the address bar the Public IP address. http://210.20.34.23/ 6.2.2 Assigning Ports Manually Local Network Network Camera 192.168.1.21 / Port 8080 Internet Service Provider...
  • Page 38 6.2.3 Using two ore more public IPs The following figure is just an illustration on how the camera can be connected when 2 or more Public IPs are involved in a network infrastructure Internet Service Provider Network Camera Hub / Switch ADSL Modem 2 Public IP Public IP...
  • Page 39: Frequently Asked Questions

    7 Frequently Asked Questions Symptoms, Possible Causes, and Remedial Action Problems setting the IP address The camera is located on a different subnet If the IP address intended for the camera and the IP address of your computer are located on different subnets, you will not be able to set the IP address.
  • Page 40 Reduce number of applications running on the client computer. Limit the number of simultaneous viewers. Check with the system administrator that there is enough bandwidth available. See also the online help. Lower the image resolution. No images displayed on web page Installation of additional ActiveX component restricted Configure your Internet Explorer to allow the installation of ActiveX by lowering temporally the Internet Explorer security settings.
  • Page 41: Technical Specifications

    1 x Built-in Microphone; 1 x Audio Speaker Audio Compression G.711 AAC-LC PCM 8Khz Networking & Accessing Network Interface 10BASE-T/100 BASE-TX Wireless LAN AM1200-W / AM1201-W (optional) IEEE 802.11b/g Wireless Security AM1200-W / AM1201-W ( for wireless models) Security WEP(64/128 bit), WPA-PSK(AES/TKIP), WPA2-PSK(AES/TKIP)
  • Page 42 Dimension 70 (W) x 38 (L) x 88.5 (H) mm Camera only 90g Net Weight Camera with Stand 210 g Certification Report CE/FCC, ROHS 1x RJ45 10BASE-T/100 BASE-TX 1x DC Power Jack 1x Default setting button I/O Connectors 1x Micro SD slot 1x Audio Out - 42 -...
  • Page 43: Glossary Of Terms

    9 Glossary of Terms ActiveX - A standard that enables software components to interact with one another in a networked environment, regardless of the language(s) used to create them. Web browsers may come into contact with ActiveX controls, ActiveX documents, and ActiveX scripts.
  • Page 44 DC-Iris (Autoiris) - This special type of iris is electrically controlled by the camera, to automatically regulate the amount of light allowed to enter. DHCP (Dynamic Host Configuration Protocol) - DHCP is a protocol that lets network administrators automate and centrally manage the assignment of Internet Protocol (IP) addresses to network devices in a network.
  • Page 45 A standard for video compression, also known as MPEG-4 Part 10. HTML (Hypertext Markup Language) - HTML is the set of "markup" symbols or codes inserted in a file intended for display in web browser. The markup tells the browser how to display the page's words and images for the user.
  • Page 46 MAC address (Media Access Control address) - A MAC address is a unique identifier associated with a piece of networking equipment, or more specifically, its interface with the network. For example, the network card in a computer has its own MAC address. Manual iris - This is the opposite to an autoiris, i.e.
  • Page 47 Protocol - A special set of rules governing how two entities will communicate. Protocols are found at many levels of communication, and there are hardware protocols and software protocols. Proxy server - In an organization that uses the Internet, a proxy server acts as an intermediary between a workstation user and the Internet. This provides security, administrative control, and a caching service.
  • Page 48 Sockets are a method for communication between a client program and a server program over a network. A socket is defined as ‘the endpoint in a connection. Sockets are created and used with a set of programming requests or ‘function calls’ sometimes called the sockets application programming interface (API).
  • Page 49 A wireless security protocol, specified in the IEEE 802.11 standard, which is designed to provide a wireless local area network (WLAN) with a level of security and privacy comparable to that usually expected of a wired LAN. Security is at two different levels; 40-bit and 128-bit encryption.
  • Page 50: Fcc Statement

    10 FCC Statement This device compiles with FCC Rules Part 15. Operation is subject to the following two conditions. This device may not cause harmful interference, and This device must accept any interference received, including interference that may cause undesired operation.

Table of Contents