1 Overview This network camera is intended for your home and commercial surveillance usage under indoor environments. It comes with a High-end 2-megapixel CMOS Sensor, with a maximum resolution of 1600 x 1200, delivering detailed images and covering 6 times larger than a VGA camera. The dPTZ (Digital Pan Tilt Zoom) allows user to navigate through the area of the image of most interest without relocating the camera physically.
3 Setting up the Network Camera Read Before Use The use of surveillance devices may be prohibited by law in your country. The Network Camera is not only a high-performance web-ready camera but can also be part of a flexible surveillance system. It is the user’s responsibility to ensure that the operation of such devices is legal before installing this unit for its intended use.
Using the Network Camera for the first time The Network Camera is a network device and its use should be straightforward for those who have basic networking knowledge. Making the initial steps for setting up the network camera will be based on a simple network connection.
4 Accessing the Network Camera Finding the camera IP Discovery Tool IP Discovery is the software that provides an easier way for setting the IP address and network configurations of the Network Camera. Using this tool, you can easily set multiple Network Cameras at the same time. By utilizing the IP Discovery tool, the setting process is largely simplified and the setting time is effectively shortened.
Assigning the IP address to the network camera Identify your Network Camera by its MAC address, which is located in the Product Label on the Network Camera. Click on the network camera for which a new IP address will be assigned to it, and proceed to fill with the following information.
Page 9
When popup the following dialogue box, click “Yes” Hints: Changing the root password To avoid security breaches, it is recommended changing the Username and Password once the device is set up to work. Refer to Chapter 5, Configuring the Camera, System Settings. - 9 -...
The Live View Page Video Source: The Stream Profile drop-down list allows you to select a customized or pre-programmed stream profile on the Live View page. Refer to Streaming Settings of this chapter for more references. Rotation: allows the rotation of the video to be viewed in an angle of 0 (current), 90, 180 or 270 degrees at a clockwise direction.
Page 11
Full Screen: Maximizes the video to be displayed at a full screen size. Real Size: Displays the real size of the video; (the initial video size will be adjusted to fit your monitor, while the real size could be bigger than it is being shown in the monitor). Listen: allows the user from the PC listen the location where the camera is set.
5 Configuring the camera Video: Main features and advanced configurations of video streaming. Camera: Image adjustments such as brightness, white balance and more. Storage: Displays information of the files located in the Micro SD card (if any). Event: Smart features for event settings to send emails, snapshots and more. Network: Network configuration for the network camera and Event features.
Page 13
OSD Setting: Enable: Once enabled, a text message can be displayed on top of the video. This is useful to indicate a Camera Name or the location where the Network Camera is installed in. Camera Name: To display the OSD, type a text on the box with a maximum of 20 characters. Date / Time: Displays the date and time on the video which is streamed from the Network Camera.
bandwidth will affect picture quality. Quality Level: There are three levels to adjust: Best, Good and Standard The higher the quality is, the more bandwidth it will use for streaming the video. Resolution: You can set up a different video resolution for different viewing devices. Note that a larger frame size takes up more bandwidth.
frame rate and bandwidth considerations. Values can be set to: Automatic, 50 or 60 kHz Max Exposure Time: Select the exposure time for the camera for the duration of the time that gets into the sensor. Max Gain Control: Select the level gain control for the camera Mirror: Flips the video based on Vertical and Horizontal view.
Below, a graphic representation of the page when a disk is inserted, with files store inside. 5.3.2 File list Displays the list of files which are stored in the Micro SD Card. A checkbox is shown to allow the deletion of the file if necessary. Event Settings The Event Settings page allows the user to customize the Network Camera to perform actions during a period of time, upon the occurrence of certain events in order to have a result.
Page 17
The time of doing something will be set by “Respond to Trigger” Doing something with a result will be set by “When Triggered…” 5.4.1 Event Configuration Event Type List Add: In order to turn on the capability of setting an Event, go to the Event Configuration page and click on Add to see the available options.
Page 18
the Schedule condition, since the Schedule condition sets the time as the main reason to start doing something, while the “time frame” sets the duration of the action. Check the corresponding days to execute the triggering time. Start Time: indicates that time that the trigger will be start executing Interval: indicates the interval between each action.
Page 19
5.4.2 Motion Detection Video motion detection is used to generate an alarm whenever movement occurs (or stops) in the video image. A total of 3 Include and/or Exclude windows can be configured. Once configured, the video motion detection windows appear in the list of available triggers, for triggering events.
Remove: In case any of the area is not required, click on the name of the Area Name from the Motion Detection List, and click on Remove. Windows Area Name: Descriptive name of your choice Trigger Level: values run from 0 to 100; for which the higher the number, the faster the trigger is executed. Sensitivity: values run from 0 to 100;...
Page 21
5.5.1 General DHCP: Obtain IP address via DHCP Dynamic Host Configuration Protocol (DHCP) is a protocol that lets network administrators centrally manage and automate the assignment of IP addresses on a network. Although a DHCP server is mostly used to set an IP address dynamically, it is also possible to use it to set a static, known IP address for a particular MAC address.
Page 22
provided by the DHCP server. Click the View button to see the current settings. Use the Host Name - enter the desired DNS server by specifying the following: Domain name - enter the domain(s). Multiple domains can be separated by semicolons (;). The host name is always the first part of a Fully Qualified Domain Name, for example, myserver is the host name in the Fully Qualified Domain Name myserver.mycompany.com where mycompany.com is the Domain name.
Page 23
To be able to use the DDNS feature, a domain name must be registered first in a domain name service from a 3 party service provider, such as DynDNS (www.dyndns.org). The DDNS feature only forwards the information between the Host Name server and the Network Camera, therefore the Username and Password must be obtained from the 3 party service provider before using the feature.
Page 24
Add FTP: adds an FTP to be used as a recipient for the images AddHTTP: adds an HTTP server to receive text messages. AddTCP: adds a TCP port to received text messages. AddSMTP: adds an Email server/address to receive email messages Remove: to remove any existing Event Server, select a Name from the Event Server List and click on Remove.
Page 25
HTTP Server Receives notification messages Name: Descriptive name of your choice URL: URL (IP address or host name) Username and Password: Enter the Username and Password for allowing the reception of messages. Note: Consult your Network Administrator for the correct Username and Password applied to the HTTP and Proxy Server.
Page 26
Note: Consult your Network Administrator for the availability of the TCP service and Port number to be used. Note: The SMTP Server is set in the Event Settings > Event Server configuration. Refer that section for more references. 5.5.6 Wireless ( Optional ) Wireless Mode The wireless feature is available only for wireless models.
desired rather than the wired connection. In order to avoid network conflicts, it is recommended that the wireless IP address be different from the wired connection. Network Name (SSID): When the user wants to use the wireless function, an Access Point must be designated to serve the wireless connection.
Page 28
Such information is useful to have references when direct information is required without going through the different pages of configuration of the Network Camera. 5.6.2 User The user configuration page allows the Network Camera to have multiple users and profiles to access the Network Camera.
Page 29
Deleting a user To delete user, click on a Name from the Users list and click on “Remove”, then click on “Save” to make the changes permanent. 5.6.3 Date & Time Displays the date and time (24 hours clock) of the Network Camera. Set Server Time Select the Automatically adjust for daylight saving time changes if necessary.
Page 30
Set manually - this option allows you to manually set the time and date. Note: If using a host name for the NTP server, a DNS server must be configured under Network Settings. Click on “Save” to make the changes permanent. In case there was error during the selection, click on “Reset”...
Application 5.7.1 Yoics Setup 5.7.1.1 Register the camera Have a Yoics account already Please go to www.yoics.net to sign in your account. Create a new Yoics account You can view it locally by typing the IP address on your browser. The IP-Discovery tool (IPDIS) can help you find the IP address of your camera.
Page 32
Fig1.Register this camera Register Here Fig2. New Registration - 32 -...
Page 33
Fig3.Detect new product window 5.7.1.2 Unregister Camera Login into Yoics Website Please go to www.yoics.net to sign in to your account. Delete Service from Camera Settings. Choose [MY STUFF]-> Settings of Camera Name.(Fig4) Click [Advanced Service Settings]->[Delete Service].(Fig5) Click Here Fig4.Camera Settings - 33 -...
Page 34
Click Here Fig5.Advanced Service Settings - 34 -...
6 Troubleshooting Emergency Factory Default Default Button To execute the Emergency Factory Default, proceed as follows: 1. Remove the power adapter from the socket power of the network camera 2. With a pin thin enough to go through the Default Button hole, push inside gently 3.
Viewing the camera from a remote location The below guideline shows you how to setup the Network Camera for viewing it from a remote location. The network infrastructure demonstration is just for your reference only. Each network infrastructure may vary upon the needs of the organization.
Page 37
Address bar the Public IP address. Once the broadband router's configurations are set, we can open the Internet Explorer and type in the address bar the Public IP address. http://210.20.34.23/ 6.2.2 Assigning Ports Manually Local Network Network Camera 192.168.1.21 / Port 8080 Internet Service Provider...
Page 38
6.2.3 Using two ore more public IPs The following figure is just an illustration on how the camera can be connected when 2 or more Public IPs are involved in a network infrastructure Internet Service Provider Network Camera Hub / Switch ADSL Modem 2 Public IP Public IP...
7 Frequently Asked Questions Symptoms, Possible Causes, and Remedial Action Problems setting the IP address The camera is located on a different subnet If the IP address intended for the camera and the IP address of your computer are located on different subnets, you will not be able to set the IP address.
Page 40
Reduce number of applications running on the client computer. Limit the number of simultaneous viewers. Check with the system administrator that there is enough bandwidth available. See also the online help. Lower the image resolution. No images displayed on web page Installation of additional ActiveX component restricted Configure your Internet Explorer to allow the installation of ActiveX by lowering temporally the Internet Explorer security settings.
Page 42
Dimension 70 (W) x 38 (L) x 88.5 (H) mm Camera only 90g Net Weight Camera with Stand 210 g Certification Report CE/FCC, ROHS 1x RJ45 10BASE-T/100 BASE-TX 1x DC Power Jack 1x Default setting button I/O Connectors 1x Micro SD slot 1x Audio Out - 42 -...
9 Glossary of Terms ActiveX - A standard that enables software components to interact with one another in a networked environment, regardless of the language(s) used to create them. Web browsers may come into contact with ActiveX controls, ActiveX documents, and ActiveX scripts.
Page 44
DC-Iris (Autoiris) - This special type of iris is electrically controlled by the camera, to automatically regulate the amount of light allowed to enter. DHCP (Dynamic Host Configuration Protocol) - DHCP is a protocol that lets network administrators automate and centrally manage the assignment of Internet Protocol (IP) addresses to network devices in a network.
Page 45
A standard for video compression, also known as MPEG-4 Part 10. HTML (Hypertext Markup Language) - HTML is the set of "markup" symbols or codes inserted in a file intended for display in web browser. The markup tells the browser how to display the page's words and images for the user.
Page 46
MAC address (Media Access Control address) - A MAC address is a unique identifier associated with a piece of networking equipment, or more specifically, its interface with the network. For example, the network card in a computer has its own MAC address. Manual iris - This is the opposite to an autoiris, i.e.
Page 47
Protocol - A special set of rules governing how two entities will communicate. Protocols are found at many levels of communication, and there are hardware protocols and software protocols. Proxy server - In an organization that uses the Internet, a proxy server acts as an intermediary between a workstation user and the Internet. This provides security, administrative control, and a caching service.
Page 48
Sockets are a method for communication between a client program and a server program over a network. A socket is defined as ‘the endpoint in a connection. Sockets are created and used with a set of programming requests or ‘function calls’ sometimes called the sockets application programming interface (API).
Page 49
A wireless security protocol, specified in the IEEE 802.11 standard, which is designed to provide a wireless local area network (WLAN) with a level of security and privacy comparable to that usually expected of a wired LAN. Security is at two different levels; 40-bit and 128-bit encryption.
10 FCC Statement This device compiles with FCC Rules Part 15. Operation is subject to the following two conditions. This device may not cause harmful interference, and This device must accept any interference received, including interference that may cause undesired operation.
Need help?
Do you have a question about the AM1200 and is the answer not in the manual?
Questions and answers