5.7.6 System Control Toolbox................................................................5-86
2
Chapter 1 0BInstallation
1.1 5BSystem Hardware Requirement s
Before installing the application software, make sure your system has the following
recommended minimum hardware requirements.
1.1.1 28BRecommended minimum system hardware
requirements
The system requirement recommended for this application is as follows.
OS: MS Windows 2000/XP/98SE/Me
CPU: Intel 2.0 GHz Pentium IV or above and AMD Athlon or above
SDRAM: 512 MB SDRAM or above for 16 channels
256 MB SDRAM for 9 channels
Hard disk: 40 GB
Display Chip: nVidia, GeForce series with 32 MB Display memory
ATI Radeon series with 32 MB Display memory
Table 1-1 Recommended System Ha rdware Requirements
The following notes should help you with the proper installation of the software on to
the recommended hardware system.
This application software only supports Intel Pentium IV series or above and AMD
Athlon or above CPUs.
It is also recommended to run this application software on Win2000 OS to avoid any
functional limitation.
Make sure all Power Management and Screen Saver functions are turned off to avoid
system hang-ups.
1-3
1.1.2 29BSuggestions
The following suggestions will help you to run our software faster and smooth. All
suggestions are optional.
1. Maximum supported hard disk space -
200GB is the maximum tested supported hard disk space. Performance can’t be
guaranteed if the recording hard disk space is greater than 200GB.
2. In Window XP system, close system restore -
In Window XP, system restore will help you to back to the previous restore point
that recorded a snapshot of your computer. But when system restore is turned on,
the disk I/O would be much worse. This means the recording of our application
would be affected dramatically. So we recommend turning off the system restore
for the application’s recording disk. You can disable system restore in System
Properties page (Start \ Control Panel \ System \ System Restore).
Click to disable system restore
Disable system restore of specify disk
Figure 1-1 System Restore
1-4
As shown in XFigure 1-1X, you can disable system restore of all disk or specified
t
disk.
3. Exclude file protectation for specified files in AntiVirus -
The following XTable 1-2X represents the specified files that should be excluded in
AntiVirus to accelerate our application.
Suggest to Exclude
DBS, DES, DIA, DSK, DSS
HGD, WAP, BCK
Table 1-2 Specified Files to Exclude
There are two ways to exclude file protection of above files from AntiVirus:
Method One:
Find “Option \ Auto-Protect \ Scan files using SmartScan \ Customize” and
ensure above files don’t exist on the list. The following
XFigure 1-2X shows the
location of the list.
Ensure specified
files don’t exis
Click
Figure 1-2 The File List in AntiVirus
Method Two:
Find “Option \ Auto-Protect \ Exclusions” and ensure all above specified files are
added on the list. The following XFigure 1-3X shows the list.
1-5
Figure 1-3 Auto-Protect Exclusion List
4. Exclude file protectation for specified files in PC-cillin -
As shown in XFigure 1-4X, find “Settings \ Real-time scan \ Selected files \ Select File
Types” and ensure the files described in table 1-1 do not exist in the list.
Click
Files list
Figure 1-4 The File List in PC-cillin
1-6
NOTE: If the above settings cannot help you to improve performance, try to use disk
defragmenter “Start \ All Programs \ Accessories \ System Tools \ Disk Defragmenter”
to reconfigure your hard disk may help your computer more efficient.
1.2 6BSoftware Installation
The following are steps for the software installation.
STEP 1: Put the Installation disk into the CD-ROM drive, and installation should start
automatically. If installation does not start, click on “Start” on the lower left corner of
your screen and open “My Computer” and double click on the CD-ROM icon. The IP
surveillance Recorder Installation Window will appear as XFigure 1-5X in below.
STEP 2: There are links on this page, including Quick Guide, User’s Manual, Release
Note, and Install Software DVR. Click on “Install Software DVR” to launch the
intallation shield. The InstallShield Wizard will come on and
XFigure 1-6X will appear.
1-7
Figure 1-6 Welcome page for the VIVOTEK ST3402
STEP 3: If you click on “Next” and XFigure 1-7X appears, it means you have inst alled a
previous version of the recording software (the previous version is the video-only
version, which means it would not get the audio stream from servers). If you want to
keep the previous version, choose the second option. If you are new to the Smart
VS-IP recorder software, this window will not appear; skip on over to Step 4.
Figure 1-7 Video only version detected
STEP 4: Click on “Next”and the “User information” window will appear as in XFigure
1-8X. This window prompts you to enter a username, company name. Click on “Next”
1-8
to continue.
Figure 1-8 User information for Smart VS-IP Recorder
STEP 5: Set up the administrator’s password by entering a password and confirm the
password as shown in XFigure 1-9X. Click on “Next” to continue.
Figure 1-9 Confirm Password
1-9
STEP 6: Select the installation directory for this application software and click on
“Next”, as shown in XFigure 1-10X. You can also change the installation directory from
the Default directory by clicking on “Browse…”
Figure 1-10 Destination Location for Installation
STEP 7: Select a program folder to install the application software into and then click
on “Next”, as shown in XFigure 1-11 X.
Figure 1-11 Select Program Folder
1-10
STEP 8: Af ter checking all the set up information shown in XFigure 1-12X, click on “Next”
to start file movement and registries update.
Figure 1-12 Check Setup Information
STEP 9: Click on “Finish”, as shown in XFigure 1-13X, to finish installation. This
completes the program installation.
Figure 1-13 Finish the Installation
1-11
1.3 7BFirst Start up
After installation, one of the IE settings needs to be changed before you can start
running the Monitor program. Enable the mechanism for submitting non-encrypted
data in the path “Start->Settings->control Panel->Internet Options->Security->Custom
Level…\Setting:” You can also find the path from the IE browser, as it is depicted in
the following. You can follow the instructions to complete this setting, as shown in
XFigure 1-14X.
2
1
3
5
6
4
Figure 1-14 Enable Submitting Non-encrypted Form Data
Upon completion of the settings, you can start to invoke the Monitor program.
1-12
Chapter 2 1BLauncher
1BLauncher is a controller program that allows starting the recording procedure before
the user logs in and the program will run as a service procedure after Window starts
up automatically. LauncherUI is the program that provides a uer interface to allow the
user to invoke Monitor or Playback quickly. In the following we refer to Launcher for
both Launcher and LauncherUI.
2.1 8BSecurity for Launcher
Starting Launcher does not require passing the username/password check. Once
invoked, Launcher can run automatically. Howe ver, if the user clicks on the Launcher
icon in the system tray, the program will pop up a username/password dialog. This
happens if this is a first time menu pop up, or when LauncherUI was locked. If the
user fails to pass the authentication check, no menu will appear.
There are three kinds of group: root, power user and general user. After passing
identification and authentication, functions will be enabled according to the login
user’s group. For more detail about user’s group, please refer to section 2.2 User
Inferface. The user can lock the Launcher as a security measure. When the Launcher
is locked, it turns back to the Start-up state. The user needs to pass identification and
authentication again to get to the popup menu.
ATTENTION: Only the login user or users of root group can unlock the program when
the program is locked. Refer to X2.2XXUser InterfaceX to obtain more detail about the
privilege of user’s group.
Below is the login window:
2-13
Figure 2-1 Login Dialog
When the Launcher is locked, the unlock window is as follows:
Figure 2-2 Unlock Dialog
The input area of the dialog will be grayed (disabled) for 60 seconds after three failure
attempts.
2.2 9BUser Interface
This is the user interface for Launcher:
Figure 2-3 Popup Menu
The main user interface for Launcher is an icon on the system tray. The popup menu
2-14
is displayed by clicking on the right or left buttons on the mouse. The menu items are
listed below:
1. Lock Launcher – When this item is selected, Launcher will enter Lock mode. In
Lock mode, whenever the user wants to invoke the menu, a dialog asking for
username and password appears. The interface for this dialog is covered in the
previous section.
2. Tools – This contains utilities; currently only change password and user
management are implemented.
I. Change password:
The tool can be used to change the password of the login user. Below is the
change password screen:
Figure 2-4 Change Password Dialog
II. User management:
XFigure 2-5X shows the tool of user management. The tool can be used to add,
modify or delete user. The maximum available user is 30 and the number of
available user will be shown in “Resource” field. As shown in XFigure 2-6X,
when you want to add a new user, you should specify user name, password
and user’s group for the user. You can modify user’s status in Modify Status
window.
ATTENTION: The tool can only be invoked by users of root group. The default root
(root / admin) cannot be removed and the user could remove the other users of root
group
2-15
Figure 2-5 User Management Window
Figure 2-6 Add and Modify User Windows
Functionalities may be disabled according to the login user’s group. The following
XTable 2-1X represents the privilege of each group in Lanuncher.
3. Monitor start up mode – The option decides the program type of Monitor that is
described in section 3 after Window boot up. There are three kinds of types:
Service: Do not Autorun – The Monitor will be run as a service but it will not be
invoked automatically after Window boot up. Manual startup is needed.
Service: Autorun – The Monitor will be run as a service procedure and it will be
invoked after Window boot up automatically without login. Recording procedure
will be also invoked if proper schedule is configured. More detail about scheduler
in Monitor, refer section 4.
Non-Service – The Monitor will be run as a normal procedure (non-service). User
can invoke Monitor by using the interface provided by Launcher.
Figure 2-7 Monitor Start Up Mode
NOTE: When Monitor runs as service procedure, it will work in background after
2-17
closing (click on the close button in Monitor). It means that the recording procedure
will be continued and user does not need to worry about missing media data that you
like to record.
As the following XFigure 2-8X, a useful hint can help user to monitor the state of
running channel, monitoring channel and recording channel. Move cursor on
Launcher icon on system tray and the hint will pop up automatically.
Figure 2-8 The Hint of State
Running – The number of current running channel(s) in Monitor. Regardless of
schedule, all connected channel will be counted.
Monitoring – The number of the channel that is running with schedule. If the
connected channel without schedule, the channel will not be counted. XFigure 2-9X
and XFigure 2-10X show Launcher icon when the number is equal to zero and not 0
respectively.
Figure 2-9 Launcher Icon with Zero Monitoring Channel
Figure 2-10 Launcher Icon with Non-Zero Monitoring Channel
Recording – The number of the channel that is recording now. The following
XFigure 2-11X shows Launcher icon when recording procedure is running.
Figure 2-11 Launcher Icon with Recording
4. Monitor – This starts up the Monitor. If the Monitor is already running, move the
focus to it.
5. Playback – This starts up Playback. If Playback is already running, move the
focus to it.
2-18
6. Exit – This ends Launcher. If the user chooses this option, a message box will
pop up to confirm whether the user really wants to exit. It warns the user that
exiting Launcher will also close Monitor and Playback.
2-19
Chapter 3 2BMonitor
3.1 10BFeatures of Monitor Tool
In this section, we will depict all features of the Monitor tool in this software.
3.1.1 30BTraditional Surveillance Features
The traditional surveillance features include the following
9 Real-time monitor
9 PTZ control
9 Recording
3.1.2 31BSpecial Features
In our digital surveillance system, we support not only the features listed above but
also the following features, making the system more powerful and convenient to use.
9 Simultaneous real-time monitoring and audio and video recording
9 High quality video, up to full-screen display
9 High compression ratio
9 Maximum support of 16 cameras with different monitor layouts
9 Smart playback
9 Triggered event browsing with 9 preview video windows
9 Fast database searching
9 Auto alarm in different ways
9 Account-password protection
9 Different recording modes: Event-driven, Scheduled and Manual recording for
each camera
9 Intelligent database index modes: indexing by sharp time tag, time interval,
motion-detected events and digital-input events.
9 Just-in-time snapshot
9 AVI export
9 Motion detection with 3 alert windows for each camera
3-20
3.2 11BApplication Layout and
Functionalities
This section demonstrates a global view of the Monitor tool, as shown in XFigure 3-1X.
Components of the Monitor tool in details are shown in the following sections.
Misc. functions
Channel area
Layout area
Hard disk status
Common controls
PTZ, DI/DO, Alert message and Talk
Video area
Display frame
Figure 3-1 Overview of the Monitor Tool
There are several parts in the monitor tool:
9 Miscellaneous functions:
These include application exit, minimization, full-screen display, lock, stop alert,
and configuration menu for camera configurations, global settings, display and UI
settings, scheduler settings, video/audio database backup, and the user
information of this application software. The operation tips are provided on-line
when you move the mouse cursor over each item.
9 Channel area
This area displays the status of each channel. The information indicates the
3-21
status of connection, recording, selection, and alert-event triggered.
9 Video area
In this area, you can see the video of the selected channel in the display frame.
The number of display frames in the video area depends on the layout chosen by
the user. You can also do some convenient controls for the video display in it.
9 Layout area
You can change different monitoring layouts in this area. There are six kinds of
layouts the user can choose from: 1, 4, 6, 9, 13, or 16 video display frames in the
video area.
9Hard disk status
In this area, you can get the status of the hard disk that the media datamedia
database resides in. This reminds you to arrange for available storage size of the
recorded media database. If the path set for recording is no longer valid or does
not exist any more, the free space will show “Invalid Path” to remind you to update
the setting.
9Common control area
This area includes volume controller, manual recording, video printing, and
snapshot, as well as a trash can to remove any video from display frames.
9 PTZ control
In this area you can do PTZ control, auto pan, auto patrol, and preset location
control of the selected channel. The camera must be a remote Visual Server /
Network Camera series product that supports PTZ functions.
9 DI/DO control
This tool receives digital input signal and sends digital output signal to the remote
Video Server/ Network Camera series product associated with the dedicated
channel.
9 Alert Message
This tool allows the display of the latest alert messages received from the remote
Video Server / Network Camera series product associated with the selected
channel.
3-22
9 Talk
If the connected Video Server / Network Camera series product supports
two-way audio feature, the tool can be used to talk with remote side by using
additional device, such as mircophone.
3.3 12BLogging In
The authentication mechanism is implemented in Launcher. If user has already
passed the authentication in Launcher, Monitor can be invoked without further
authentication. If not, the Authentication of Launcher will be popped up and user must
pass it to get Monitor shows up. There are three privileges in the user-protection
system: the root, the power user and the general user.
3.3.1 32BThe Privilege of Each Group
In the Monitor tool system, root privilege includes the right to access Video Server /
Network Camera series products as well as changing local settings. However, this
root privilege is not the same as that of the root privilege of the Video Server /
Network Camera series product. You can change the settings of each selected Video
Server / Network Camera in the remote site only if you have the root privilege of the
remote Video Server / Network Camera series product.
The following XTable 3-1X shows the privilege and limitation of each group in Monitor:
3-23
Item Root Power User General User
Backup
Camera configuration
Display & UI settings
Global settings
ˇ
ˇ
ˇ
ˇ
Record ˇ
Schedule
ˇ
DI/DO control ˇ ˇ
PTZ contrl ˇ ˇ
Change layout
Lock
Printer
Snapshot
Stop alert
Table 3-1 The Privilege of Each Group in Monitor
ˇ ˇ ˇ
ˇ ˇ ˇ
ˇ ˇ ˇ
ˇ ˇ ˇ
ˇ ˇ ˇ
Again, if you need to change the settings of remote Video Server / Network Camera
series products, you must have the root user password for each of the products.
3.4 13BCamera Configurations
When you log in for the first time, you need to configure this application software to
connect to the remote Video Server / Network Camera series products in
“Configuration Menu \ Camera Configuration”, as shown in XFigure 3-2X. You must have
the root (administrator) privilege in order to run the configuration.
Figure 3-2 Camera Configuration
ATTENTION: Once you click on “Configuration Menu\Camera Configuration” for
3-24
setting each camera, a warning window will pop up to warn you that all recording
processes will be stopped.
3.4.1 33BThe Layout of the Configuration
In this section, we discuss the local settings of the connection and the functional
configurations of each camera. If you are interested in the remote settings for each
camera, you can refer to each Video Server / Network Camera series product’ s user’s
manual that was shipped with the hardware. The following XFigure 3-3X shows layout of
Camera Configuration window.
NOTE: As for the location of the selected camera, you need to make sure the location
string does not include prohibited characters such as “"\ / : * ? " < > |”. Otherwise, the
“wrong” location string will cause the application program to malfunction. You can
change the location string in “Video->Text on Video” of the remote setting webpage.
Local settings
Setup page
Camera selections
Remote setting webpage
Figure 3-3 Layouts of Camera Configurations
B
3-25
3.4.2 Local Settings
In the local settings, as shown in XFigure 3-4X, there are three main functions:
Insert camera
Delete camera
Figure 3-4 Local Settings
Insert – This allows the user to insert a remote Video Server / Network Camera
series product to the camera list. Click on the “Insert” button, an “Insert New Channel”
History
dialog will pop up, as shown inXFigure 3-5X. Specify the IP address, port and root
password of the remote Video Server / Network Camera series product, and click on
the “Ok” button to close the dialog. The system will try to connect to the selected
camera. If the connection is successful, the camera will be inserted to the list.
IP address and port
Figure 3-5 Insert New Channel Dialog
Delete – This removes the selected Video Server / Network Camera series product
from the camera list. You should select a camera as shown in XFigure 3-6X to remove.
3-26
Loading...
+ 61 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.