Vivotek ST3402 User Manual

VIVOTEK ST3402
User’s Manual
0
105BContents
Chapter 1 Installation.................................................................................................1-3
1.1.1 Recommended minimum system hardware requirements...............1-3
1.1.2 Suggestions......................................................................................1-4
1.2 Software Installation.................................................................................1-7
1.3 First Start up............................................................................................1-12
Chapter 2 Launcher .................................................................................................2-14
2.1 Security for Launcher .............................................................................2-14
2.2 User Interface..........................................................................................2-15
Chapter 3 Monitor ...................................................................................................3-21
3.1 Features of Monitor Tool........................................................................3-21
3.1.1 Traditional Surveillance Features ..................................................3-21
3.1.2 Special Features .............................................................................3-21
3.2 Application Layout and Functionalities..................................................3-22
3.3 Logging In...............................................................................................3-24
3.3.1 The Privilege of Each Group .........................................................3-24
3.4 Camera Configurations...........................................................................3-25
3.4.1 The Layout of the Configuration ...................................................3-26
3.4.2 Local Settings.................................................................................3-26
3.4.3 Alert Settings and Recording Settings...........................................3-29
3.4.4 Changing the Camera Order in the List.........................................3-30
3.4.5 Saving the Changes........................................................................3-31
3.5 Global Settings........................................................................................3-31
3.6 Display & UI Settings.............................................................................3-35
3.7 Using Monitor Tool.................................................................................3-39
3.7.1 Connection of the Video Server / Network Camera Series............3-39
3.7.2 The Layout.....................................................................................3-46
3.7.3 Backup ...........................................................................................3-53
3.7.4 About..............................................................................................3-54
3.7.5 Miscellaneous Functions................................................................3-54
3.7.6 Common Control Functions...........................................................3-56
3.7.7
UMultiple FocusU ...............................................................................3-57
3.7.8 Status Bar.......................................................................................3-57
Chapter 4 Scheduling...............................................................................................4-58
4.1 Invoke Scheduling Tool..........................................................................4-59
1
4.1.1 Starting the Scheduling tool...........................................................4-59
4.2 The Layout and Functionalities ..............................................................4-59
4.2.1 Introduction....................................................................................4-59
4.2.2 The Functionalities of Configuration Components........................4-61
4.2.3 The Schedule Scheme operations ..................................................4-61
4.3 Primary Schedule....................................................................................4-62
4.3.1 Schedule with Time Lines..............................................................4-62
4.3.2 Schedule with Time Picker ............................................................4-63
4.3.3 Schedule in event mode.................................................................4-65
4.3.4 Schedule in Continuous mode .......................................................4-65
4.4 Secondary Schedule................................................................................4-66
4.4.1 Schedule modes .............................................................................4-66
Chapter 5 Playback..................................................................................................5-67
5.1 Features of Playback...............................................................................5-67
5.2 Logging In...............................................................................................5-68
5.3 Layout.....................................................................................................5-69
5.3.1 Main Areas.....................................................................................5-69
5.3.2 Indicators........................................................................................5-72
5.3.3 Pull Bar ..........................................................................................5-72
5.4 Settings....................................................................................................5-72
5.5 Normal (Single Frame) Mode.................................................................5-75
5.5.1 Histogram Area..............................................................................5-76
5.6 Preview (Multiple Frame) Mode ............................................................5-77
5.6.1 Histogram Area..............................................................................5-78
5.6.2 Histogram Legend..........................................................................5-79
5.7 Using Tools.............................................................................................5-79
5.7.1 Selector Tools.................................................................................5-79
5.7.2 Play Control ...................................................................................5-81
5.7.3 Display Adjustment Toolbox .........................................................5-83
5.7.4 Searching Range Adjustment Toolbox...........................................5-84
5.7.5 Toolbox..........................................................................................5-85
5.7.6 System Control Toolbox................................................................5-86
2
Chapter 1 0BInstallation
1.1 5BSystem Hardware Requirement s
Before installing the application software, make sure your system has the following recommended minimum hardware requirements.
1.1.1 28BRecommended minimum system hardware requirements
The system requirement recommended for this application is as follows.
OS: MS Windows 2000/XP/98SE/Me CPU: Intel 2.0 GHz Pentium IV or above and AMD Athlon or above SDRAM: 512 MB SDRAM or above for 16 channels
256 MB SDRAM for 9 channels Hard disk: 40 GB Display Chip: nVidia, GeForce series with 32 MB Display memory
ATI Radeon series with 32 MB Display memory
Table 1-1 Recommended System Ha rdware Requirements
The following notes should help you with the proper installation of the software on to the recommended hardware system.
This application software only supports Intel Pentium IV series or above and AMD Athlon or above CPUs.
It is also recommended to run this application software on Win2000 OS to avoid any functional limitation.
Make sure all Power Management and Screen Saver functions are turned off to avoid system hang-ups.
1-3
1.1.2 29BSuggestions
The following suggestions will help you to run our software faster and smooth. All suggestions are optional.
1. Maximum supported hard disk space
200GB is the maximum tested supported hard disk space. Performance can’t be guaranteed if the recording hard disk space is greater than 200GB.
2. In Window XP system, close system restore
In Window XP, system restore will help you to back to the previous restore point that recorded a snapshot of your computer. But when system restore is turned on, the disk I/O would be much worse. This means the recording of our application would be affected dramatically. So we recommend turning off the system restore for the application’s recording disk. You can disable system restore in System Properties page (Start \ Control Panel \ System \ System Restore).
Click to disable system restore
Disable system restore of specify disk
Figure 1-1 System Restore
1-4
As shown in XFigure 1-1X, you can disable system restore of all disk or specified
t
disk.
3. Exclude file protectation for specified files in AntiVirus
The following XTable 1-2X represents the specified files that should be excluded in AntiVirus to accelerate our application.
Suggest to Exclude
DBS, DES, DIA, DSK, DSS
HGD, WAP, BCK
Table 1-2 Specified Files to Exclude
There are two ways to exclude file protection of above files from AntiVirus: Method One: Find “Option \ Auto-Protect \ Scan files using SmartScan \ Customize” and
ensure above files don’t exist on the list. The following
XFigure 1-2X shows the
location of the list.
Ensure specified
files don’t exis
Click
Figure 1-2 The File List in AntiVirus
Method Two:
Find “Option \ Auto-Protect \ Exclusions” and ensure all above specified files are added on the list. The following XFigure 1-3X shows the list.
1-5
Figure 1-3 Auto-Protect Exclusion List
4. Exclude file protectation for specified files in PC-cillin
As shown in XFigure 1-4X, find “Settings \ Real-time scan \ Selected files \ Select File Types” and ensure the files described in table 1-1 do not exist in the list.
Click
Files list
Figure 1-4 The File List in PC-cillin
1-6
NOTE: If the above settings cannot help you to improve performance, try to use disk defragmenter “Start \ All Programs \ Accessories \ System Tools \ Disk Defragmenter” to reconfigure your hard disk may help your computer more efficient.
1.2 6BSoftware Installation
The following are steps for the software installation.
STEP 1: Put the Installation disk into the CD-ROM drive, and installation should start automatically. If installation does not start, click on “Start” on the lower left corner of your screen and open “My Computer” and double click on the CD-ROM icon. The IP surveillance Recorder Installation Window will appear as XFigure 1-5X in below.
Figure 1-5 ST3402 Smart VS-IP Recorder Installation Window
STEP 2: There are links on this page, including Quick Guide, User’s Manual, Release Note, and Install Software DVR. Click on “Install Software DVR” to launch the intallation shield. The InstallShield Wizard will come on and
XFigure 1-6X will appear.
1-7
Figure 1-6 Welcome page for the VIVOTEK ST3402
STEP 3: If you click on “Next” and XFigure 1-7X appears, it means you have inst alled a previous version of the recording software (the previous version is the video-only version, which means it would not get the audio stream from servers). If you want to keep the previous version, choose the second option. If you are new to the Smart VS-IP recorder software, this window will not appear; skip on over to Step 4.
Figure 1-7 Video only version detected
STEP 4: Click on “Next”and the “User information” window will appear as in XFigure 1-8X. This window prompts you to enter a username, company name. Click on “Next”
1-8
to continue.
Figure 1-8 User information for Smart VS-IP Recorder
STEP 5: Set up the administrator’s password by entering a password and confirm the password as shown in XFigure 1-9X. Click on “Next” to continue.
Figure 1-9 Confirm Password
1-9
STEP 6: Select the installation directory for this application software and click on “Next”, as shown in XFigure 1-10X. You can also change the installation directory from the Default directory by clicking on “Browse…”
Figure 1-10 Destination Location for Installation
STEP 7: Select a program folder to install the application software into and then click on “Next”, as shown in XFigure 1-11 X.
Figure 1-11 Select Program Folder
1-10
STEP 8: Af ter checking all the set up information shown in XFigure 1-12X, click on “Next” to start file movement and registries update.
Figure 1-12 Check Setup Information
STEP 9: Click on “Finish”, as shown in XFigure 1-13X, to finish installation. This completes the program installation.
Figure 1-13 Finish the Installation
1-11
1.3 7BFirst Start up
After installation, one of the IE settings needs to be changed before you can start running the Monitor program. Enable the mechanism for submitting non-encrypted data in the path “Start->Settings->control Panel->Internet Options->Security->Custom Level…\Setting:” You can also find the path from the IE browser, as it is depicted in the following. You can follow the instructions to complete this setting, as shown in
XFigure 1-14X.
2
1
3
5
6
4
Figure 1-14 Enable Submitting Non-encrypted Form Data
Upon completion of the settings, you can start to invoke the Monitor program.
1-12
Chapter 2 1BLauncher
1BLauncher is a controller program that allows starting the recording procedure before
the user logs in and the program will run as a service procedure after Window starts up automatically. LauncherUI is the program that provides a uer interface to allow the user to invoke Monitor or Playback quickly. In the following we refer to Launcher for both Launcher and LauncherUI.
2.1 8BSecurity for Launcher
Starting Launcher does not require passing the username/password check. Once invoked, Launcher can run automatically. Howe ver, if the user clicks on the Launcher icon in the system tray, the program will pop up a username/password dialog. This happens if this is a first time menu pop up, or when LauncherUI was locked. If the user fails to pass the authentication check, no menu will appear.
There are three kinds of group: root, power user and general user. After passing identification and authentication, functions will be enabled according to the login user’s group. For more detail about user’s group, please refer to section 2.2 User Inferface. The user can lock the Launcher as a security measure. When the Launcher is locked, it turns back to the Start-up state. The user needs to pass identification and authentication again to get to the popup menu.
ATTENTION: Only the login user or users of root group can unlock the program when the program is locked. Refer to X2.2X XUser InterfaceX to obtain more detail about the privilege of user’s group.
Below is the login window:
2-13
Figure 2-1 Login Dialog
When the Launcher is locked, the unlock window is as follows:
Figure 2-2 Unlock Dialog
The input area of the dialog will be grayed (disabled) for 60 seconds after three failure attempts.
2.2 9BUser Interface
This is the user interface for Launcher:
Figure 2-3 Popup Menu
The main user interface for Launcher is an icon on the system tray. The popup menu
2-14
is displayed by clicking on the right or left buttons on the mouse. The menu items are listed below:
1. Lock Launcher – When this item is selected, Launcher will enter Lock mode. In
Lock mode, whenever the user wants to invoke the menu, a dialog asking for username and password appears. The interface for this dialog is covered in the previous section.
2. Tools – This contains utilities; currently only change password and user
management are implemented. I. Change password:
The tool can be used to change the password of the login user. Below is the change password screen:
Figure 2-4 Change Password Dialog
II. User management:
XFigure 2-5X shows the tool of user management. The tool can be used to add,
modify or delete user. The maximum available user is 30 and the number of available user will be shown in “Resource” field. As shown in XFigure 2-6X, when you want to add a new user, you should specify user name, password and user’s group for the user. You can modify user’s status in Modify Status window.
ATTENTION: The tool can only be invoked by users of root group. The default root (root / admin) cannot be removed and the user could remove the other users of root group
2-15
Figure 2-5 User Management Window
Figure 2-6 Add and Modify User Windows
Functionalities may be disabled according to the login user’s group. The following
XTable 2-1X represents the privilege of each group in Lanuncher.
2-16
Item Root Power User General
User
Monitor Start Up
ˇ Mode User Management ˇ Playback ˇ ˇ Change Password ˇ ˇ ˇ Exit ˇ ˇ ˇ Lock / Unlock ˇ ˇ ˇ Logout ˇ ˇ ˇ
Table 2-1 The Privilege in Launcher
3. Monitor start up mode – The option decides the program type of Monitor that is described in section 3 after Window boot up. There are three kinds of types: Service: Do not Autorun – The Monitor will be run as a service but it will not be invoked automatically after Window boot up. Manual startup is needed.
Service: Autorun – The Monitor will be run as a service procedure and it will be invoked after Window boot up automatically without login. Recording procedure will be also invoked if proper schedule is configured. More detail about scheduler in Monitor, refer section 4.
Non-Service – The Monitor will be run as a normal procedure (non-service). User can invoke Monitor by using the interface provided by Launcher.
Figure 2-7 Monitor Start Up Mode
NOTE: When Monitor runs as service procedure, it will work in background after
2-17
closing (click on the close button in Monitor). It means that the recording procedure will be continued and user does not need to worry about missing media data that you like to record.
As the following XFigure 2-8X, a useful hint can help user to monitor the state of running channel, monitoring channel and recording channel. Move cursor on Launcher icon on system tray and the hint will pop up automatically.
Figure 2-8 The Hint of State
Running – The number of current running channel(s) in Monitor. Regardless of schedule, all connected channel will be counted.
Monitoring – The number of the channel that is running with schedule. If the connected channel without schedule, the channel will not be counted. XFigure 2-9X and XFigure 2-10X show Launcher icon when the number is equal to zero and not 0 respectively.
Figure 2-9 Launcher Icon with Zero Monitoring Channel
Figure 2-10 Launcher Icon with Non-Zero Monitoring Channel
Recording – The number of the channel that is recording now. The following
XFigure 2-11X shows Launcher icon when recording procedure is running.
Figure 2-11 Launcher Icon with Recording
4. Monitor – This starts up the Monitor. If the Monitor is already running, move the focus to it.
5. Playback – This starts up Playback. If Playback is already running, move the focus to it.
2-18
6. Exit – This ends Launcher. If the user chooses this option, a message box will pop up to confirm whether the user really wants to exit. It warns the user that exiting Launcher will also close Monitor and Playback.
2-19
Chapter 3 2BMonitor
3.1 10BFeatures of Monitor Tool
In this section, we will depict all features of the Monitor tool in this software.
3.1.1 30BTraditional Surveillance Features
The traditional surveillance features include the following
9 Real-time monitor 9 PTZ control 9 Recording
3.1.2 31BSpecial Features
In our digital surveillance system, we support not only the features listed above but also the following features, making the system more powerful and convenient to use.
9 Simultaneous real-time monitoring and audio and video recording 9 High quality video, up to full-screen display 9 High compression ratio 9 Maximum support of 16 cameras with different monitor layouts 9 Smart playback 9 Triggered event browsing with 9 preview video windows 9 Fast database searching 9 Auto alarm in different ways 9 Account-password protection 9 Different recording modes: Event-driven, Scheduled and Manual recording for
each camera
9 Intelligent database index modes: indexing by sharp time tag, time interval,
motion-detected events and digital-input events.
9 Just-in-time snapshot 9 AVI export 9 Motion detection with 3 alert windows for each camera
3-20
3.2 11BApplication Layout and
Functionalities
This section demonstrates a global view of the Monitor tool, as shown in XFigure 3-1X. Components of the Monitor tool in details are shown in the following sections.
Misc. functions
Channel area
Layout area
Hard disk status
Common controls
PTZ, DI/DO, Alert message and Talk
Video area
Display frame
Figure 3-1 Overview of the Monitor Tool
There are several parts in the monitor tool: 9 Miscellaneous functions:
These include application exit, minimization, full-screen display, lock, stop alert, and configuration menu for camera configurations, global settings, display and UI settings, scheduler settings, video/audio database backup, and the user information of this application software. The operation tips are provided on-line when you move the mouse cursor over each item.
9 Channel area
This area displays the status of each channel. The information indicates the
3-21
status of connection, recording, selection, and alert-event triggered.
9 Video area
In this area, you can see the video of the selected channel in the display frame. The number of display frames in the video area depends on the layout chosen by the user. You can also do some convenient controls for the video display in it.
9 Layout area
You can change different monitoring layouts in this area. There are six kinds of layouts the user can choose from: 1, 4, 6, 9, 13, or 16 video display frames in the video area.
9 Hard disk status
In this area, you can get the status of the hard disk that the media datamedia database resides in. This reminds you to arrange for available storage size of the recorded media database. If the path set for recording is no longer valid or does not exist any more, the free space will show “Invalid Path” to remind you to update the setting.
9 Common control area
This area includes volume controller, manual recording, video printing, and snapshot, as well as a trash can to remove any video from display frames.
9 PTZ control
In this area you can do PTZ control, auto pan, auto patrol, and preset location control of the selected channel. The camera must be a remote Visual Server / Network Camera series product that supports PTZ functions.
9 DI/DO control
This tool receives digital input signal and sends digital output signal to the remote Video Server/ Network Camera series product associated with the dedicated channel.
9 Alert Message
This tool allows the display of the latest alert messages received from the remote Video Server / Network Camera series product associated with the selected channel.
3-22
9 Talk
If the connected Video Server / Network Camera series product supports two-way audio feature, the tool can be used to talk with remote side by using additional device, such as mircophone.
3.3 12BLogging In
The authentication mechanism is implemented in Launcher. If user has already passed the authentication in Launcher, Monitor can be invoked without further authentication. If not, the Authentication of Launcher will be popped up and user must pass it to get Monitor shows up. There are three privileges in the user-protection system: the root, the power user and the general user.
3.3.1 32BThe Privilege of Each Group
In the Monitor tool system, root privilege includes the right to access Video Server / Network Camera series products as well as changing local settings. However, this root privilege is not the same as that of the root privilege of the Video Server / Network Camera series product. You can change the settings of each selected Video Server / Network Camera in the remote site only if you have the root privilege of the remote Video Server / Network Camera series product. The following XTable 3-1X shows the privilege and limitation of each group in Monitor:
3-23
Item Root Power User General User
Backup
Camera configuration
Display & UI settings
Global settings
ˇ ˇ ˇ ˇ
Record ˇ
Schedule
ˇ
DI/DO control ˇ ˇ
PTZ contrl ˇ ˇ
Change layout
Lock
Printer
Snapshot Stop alert
Table 3-1 The Privilege of Each Group in Monitor
ˇ ˇ ˇ ˇ ˇ ˇ ˇ ˇ ˇ ˇ ˇ ˇ ˇ ˇ ˇ
Again, if you need to change the settings of remote Video Server / Network Camera series products, you must have the root user password for each of the products.
3.4 13BCamera Configurations
When you log in for the first time, you need to configure this application software to connect to the remote Video Server / Network Camera series products in “Configuration Menu \ Camera Configuration”, as shown in XFigure 3-2X. You must have the root (administrator) privilege in order to run the configuration.
Figure 3-2 Camera Configuration
ATTENTION: Once you click on “Configuration Menu\Camera Configuration” for
3-24
setting each camera, a warning window will pop up to warn you that all recording processes will be stopped.
3.4.1 33BThe Layout of the Configuration
In this section, we discuss the local settings of the connection and the functional configurations of each camera. If you are interested in the remote settings for each camera, you can refer to each Video Server / Network Camera series product’ s user’s manual that was shipped with the hardware. The following XFigure 3-3X shows layout of Camera Configuration window.
NOTE: As for the location of the selected camera, you need to make sure the location string does not include prohibited characters such as “"\ / : * ? " < > |”. Otherwise, the “wrong” location string will cause the application program to malfunction. You can change the location string in “Video->Text on Video” of the remote setting webpage.
Local settings
Setup page
Camera selections
Remote setting webpage
Figure 3-3 Layouts of Camera Configurations
B
3-25
3.4.2 Local Settings
In the local settings, as shown in XFigure 3-4X, there are three main functions:
Insert camera
Delete camera
Figure 3-4 Local Settings
Insert – This allows the user to insert a remote Video Server / Network Camera series product to the camera list. Click on the “Insert” button, an “Insert New Channel”
History
dialog will pop up, as shown inXFigure 3-5X. Specify the IP address, port and root password of the remote Video Server / Network Camera series product, and click on the “Ok” button to close the dialog. The system will try to connect to the selected camera. If the connection is successful, the camera will be inserted to the list.
IP address and port
Figure 3-5 Insert New Channel Dialog
Delete – This removes the selected Video Server / Network Camera series product from the camera list. You should select a camera as shown in XFigure 3-6X to remove.
3-26
Loading...
+ 61 hidden pages