Beward DS03M Operation User's Manual page 66

Ip video door station
Hide thumbs Also See for DS03M:
Table of Contents

Advertisement

where individual users connect to the DSL modem over Ethernet and in plain Metro Ethernet
networks.
Progressive scan, as opposed to interlaced video, scans the entire picture, line by line
every sixteenth of a second. In other words, captured images are not split into separate fields as in
interlaced scanning.
Jack-45 is an eight-wire connector used to connect computers onto a local-area networks
(LAN), especially Ethernets. RJ-45 connectors look similar to the RJ-11 connectors used for
connecting telephone equipment, but they are a bit wider.
Router is a device that determines the next network point to which a packet should be
forwarded on its way to its final destination. A router creates and/or maintains a special routing
table that stores information on how best to reach certain destinations. A router is sometimes
included as part of a network switch.
RTP is an Internet protocol for the transport of real-time data, e.g. audio and video. It can
be used for media-on-demand as well as interactive services such as Internet telephony.
RTSP (Real Time Streaming Protocol) is a control protocol, and a starting point for
negotiating transports such as RTP, multicast and Unicast, and for negotiating codecs.
RTSP can be considered a "remote control" for controlling the media stream delivered by a
media server. RTSP servers typically use RTP as the protocol for the actual transport of
audio/video data.
Shutter is the device on the camera that opens and closes to control how long the focal
plane is exposed to light.
SMTP is used for sending and receiving e-mail. However, as it is "simple," it is limited in its
ability to queue messages at the receiving end, and is usually used with one of two other protocols,
POP3 or IMAP. These other protocols allow the user to save messages in a server mailbox and
download them periodically from the server.
SMTP authentication is an extension of SMTP, whereby the client is required to log into the
mail server before or during the sending of email. It can be used to allow legitimate users to send
email while denying the service to unauthorized users, such as spammers.
SSL/TLS (Secure Socket Layer/Transport Layer Security). These two protocols (SSL is
succeeded by TLS) are cryptographic protocols that provide secure communication on a network.
SSL is commonly used over HTTP to form HTTPS, as used e.g. on the Internet for electronic
financial transactions. SSL uses public key certificates to verify the identity of the server.
Subnet & subnet mask is an identifiably separate part of an organization's network.
Typically, a subnet may represent all the machines at one geographic location, in one building, or
on the same local area network (LAN). Having an organization's network divided into subnets
allows it to be connected to the Internet with a single shared network address.
The subnet mask is the part of the IP address that tells a network router how to find the subnet that
IP Video Door Station DS03M(P) Operation User Manual
Appendices
65

Advertisement

Table of Contents
loading

This manual is also suitable for:

Ds03mp

Table of Contents