CDMA-based network video surveillance System Solutions

Size: px
Start display at page:

Download "CDMA-based network video surveillance System Solutions"

Transcription

1 1 Contact:Peter Zhang CDMA-based network video surveillance System Solutions Introduction In recent years, mobile communication, video surveillance for its intuitive, easy to use, rich content and are widely used in many important occasions, it has become the primary means of security surveillance. With the rapid development of communication technology and computer network technology, wireless network technology has become a computer network in a vital part, but also the rapid expansion of its applications. Due to the remote video monitoring system to achieve the goal of remote monitoring, remote control and other functions, providing new tools for unattended applications. CDMA technology enables cost appears reasonable, relatively low technical threshold of wireless data transmission technology site in the monitoring system to the real-time data transmission remote monitoring center possible. CDMA is (Code Division Multiple Access) Code Division Multiple Access technology, is an advanced wireless spread spectrum communication technology in recent years, for digital cellular mobile communications. CDMA allows users to send and receive data at end packet transfer mode, without the need to use circuit-switched mode network resources. Thus providing an efficient, low-cost wireless packet data services. Advantages CDMA data transmission comprising: (1) high transmission rate, the maximum theoretical bandwidth of up to 230.4kb / s; MSCBSC Mobile Communication Forum, (2) always-on, real-time transmission of data; (3) by traffic charges, and reasonable price; (4) IP-based access to the entire Internet. Remote video monitoring system CDMA network using wireless propagation medium, got rid of cable bound within a certain range can transform any location. Without active area restrictions, through CDMA communications network, can easily achieve remote mobile monitoring. Two systems networking solutions After the country terminal image data collected, data should be sent to the monitoring center, and some wireless data transmission function of the terminal by the CDMA RUTER to complete. En overall CDMA RUTER with the monitoring center on two programs: CDMA + Internet connection; CDMA network connection. Its system topology shown in Figure 1 and Figure 2. (A) the system topology 1 The monitoring center Internet access, and access methods are a variety of ways, as long as the public IP address (dynamic or static) can be. Telecom, China Netcom and other telecommunications companies to provide dedicated access IP typically receive a fixed public IP address, which is accessible on the Internet IP address, connection RUTER with the monitoring center server via CDMA + Internet, security levels lower, but may by connecting the carriers via VPN tunnel to the monitoring

2 2 Contact:Peter Zhang center server, which can greatly increase the security level and can reduce the delay. Figure 1 - system topology 1: CDMA + Internet connection B) mobile communication system topology forum for leading communications technology forum, we specialize in mobile communications technology, communications engineers online home.._2i; R + R5_ The mobile communication forum for leading communications technology forum, we focused on mobile communication technology, communications engineers online home..c%] 3G.]% C'l CDMA network connection can be dedicated access or CDMA terminal connections. Line access via data lines connected by mobile operators PDSN (CDMA router) to the monitoring center, the monitoring center to obtain a fixed IP address within the network. RUTER network IP address obtained in the same network segment, its data security is good; a small delay; high cost. CDMA terminal connections require mobile operators assigned to the monitoring center CDMA network fixed IP address; open-end CDMA user data communication. RUTER establishing data channel based on the configuration of the monitoring center network in the IP address with the monitoring center. CDMA terminal connection has yet to be technically better is to support, the practical application of this method is rarely used.

3 3 Contact:Peter Zhang Figure 2 - system topology 2: CDMA network connection How to decide what kind of program, the key is determined by the nature of the application. From the most economical way to consider the monitoring center using "ADSL (Dynamic IP) + dynamic domain name" solution. Connection terminal and the monitoring center is based Socket Communications. Achieve three systems 1 terminal part Terminal portion of the image acquisition by the camera DTU, microprocessor and CDMA RUTER components. Camera DTU is responsible for collecting image data collected by the microprocessor, the microprocessor by CDMA RUTER send data to the remote monitoring center. 1.1 DTU and camera interfaces DTU is a camera with video capture and compression functions of the camera, it functions as a digital camera is very similar. DTU camera using standard compression algorithm compresses the original image JPG format, the compression function to improve the usefulness of remote video surveillance system. DTU camera data interface is RJ45 interface, using a + 5V supply input. Pin function as follows: CAPEN: used to enable or disable the camera DTU output image. CAPEN = 1, allows the output image, CAPEN = 0, then disable the output image. JPEGD7..JPEGD0: parallel data output. 8 output image data in this group of pins. JPEGINT: DTU from the camera to an external microcontroller interrupt signal is a positive pulse width of about 10us, the microcontroller can trigger an interrupt on the falling edge of this signal. This interrupt signal indicates that the output has a new image data on the JPEGD7..JPEGD0 pins. DTU camera has an internal reset and initialization process after power enters the standby mode after initialization is complete. In the standby mode, the camera DTU loop checks CAPEN pin, if CAPEN = 1, in the JPEGD7..JPEGD0 pin continuous

4 4 Contact:Peter Zhang output data, each output data, to generate an interrupt signal on JPEGINT pin to notify the micro The controller reads the data. DTU camera output is a complete JPG file, JPG file is always "0XFF", "0XD8" start and "0XFF", "0XD9" end. The microcontroller checks the received data, when receiving "0XFF", when "0XD9", indicates that the file end, this acquisition is complete. Then the camera DTU will return to the standby mode. Microcontrollers TMS320LF2407A, clocked at 40M, IOPC mouth used to read data DTU camera, camera DTU interrupt output (CAPINT) connected to TMS320LF2407 of XINT1, falling edge; output enable (CAPEN) connected IOPE0. TMS320LF2407 expanded 64K bytes of SRAM as an image cache. Because the camera is used DTU +5 power supply, TM320LF2407 uses a + 3.3V power supply, so the interface must solve level conversion. In this paper, SN74LVC245A chip to achieve the + 5V supply and a + 3.3V power supply system mobile. Level translation between systems. 1.2 CDMA transmission section After the microcontroller to collect image data to be transmitted to the control center via the Internet data. The complete system microcontroller and Internet network communication work is CDMA RUTER and CDMA network. Because CDMA is based on IP protocol, but ordinary CDMA RUTER no embedded TCP / IP protocol stack, the need to provide TCP / IP support for users. That is, the need to embed TCP / IP in CDMA RUTER use of PC systems, this is a complex and tedious work. In order to reduce the workload of the application itself and increase the practicality of the system, the system uses the Xiamen Caimore Communication Industrial CDMA RUTER, model CM6550R, which is embedded with TCP / IP protocol stack, with Socket communication, and provide transparency data transmission channel, the user can set some parameters can realize embedded systems connected directly to the Internet, to achieve network interconnection. The main features of CDMA RUTER easy to use, flexible, and reliable; embedded in a complete TCP / IP protocol stack, including PPP, TCP, UDP, Socket, STMP, etc; supports RS-232 and Rj45 Interface; After power automatic dial-up, has been online, disconnected automatically connect;! Leading communications technology forum 9g f2} 9t & b transparent data transmission mode, the parameters can be set freely;

5 5 Contact:Peter Zhang MSCBSC Mobile Communications Forum; ~ -d7b; u & c4b8t (L: ~ 5y) D support dynamic data center domain names and IP addresses; 7h M ) _, k! support for audio interface for easy maintenance operations;% g; h5t2b6h'r6f &} A2Q! System configuration and maintenance interface; Power interference and heat dissipation, harsh working conditions; Before using CDMA RUTER must set parameters to decide to enter transparent data transfer mode works. Parameters need to be set are: the monitoring center IP address (or dynamic domain name server can resolve the domain name) and port number; Socket communication type (TCP or UDP); communication interface parameters; trigger mode settings. CDMA RUTER after each boot automatically dial the access CDMA and dynamically obtain an IP address, this IP address is CDMA backbone network addresses, without entering the connected state, the server (monitoring center) is not directly communicate with the CDMA RUTER a. CDMA RUTER initiative to connect to the server to send the data. When the connection route is established, the server and the terminal can double the site for data transmission. The route has a time limit, generally only tens of seconds, in order to ensure that the link has been smooth, CDMA RUTER has a link keep-alive function, by regularly sent: "Heartbeat" packets, maintain routing (dynamic IP by the terminal and the server ISP service providers to dynamically allocate server, if a long time do not communicate, ISP server will reclaim IP, in order to facilitate the effective use of IP resources) to ensure timely mutual communication between the server and the terminal, so the monitoring center can actively sends data to the image capture terminal acquisition command and other parameters. In addition, the "heartbeat" packet contains the ID information of the terminal, so the server can easily determine industry source routing and data packets. 2. Construction of the monitoring center In this paper, the monitoring center using ADSL connection, because the IP address each time you connect acquired is not fixed, CDMA RUTER not directly point to a remote monitoring center. To address each time you connect the server IP address is not fixed, we use a dynamic DNS solution. DDNS function, namely to achieve a fixed domain name to resolve dynamic IP addresses. Internet monitoring center after each get a new IP address, the computer installed in the control center of the dynamic domain name software will put the IP address to the dynamic DNS server, update the DNS database. CDMA RUTER initiated by the domain Socket connection, dynamic DNS server returns the correct IP address to it. Firewall Control Center and the Internet to shield out all unused ports, thus ensuring the safety of the control center, the firewall machine may be a software firewall, it can also be a hardware firewall. In this paper, the control center software can be VC / VB / Delphi written internal DLL in Sang-technology, used to complete the preparation Socket program. Basic control center software flow chart shown in Figure 4. Socket port control center

6 6 Contact:Peter Zhang responsible for the listener listens for connection requests image collection terminal, when listening to a connection request to establish a communication link, the original is still responsible for monitoring Socket listen, you can exchange data after any communication link was established. Monitoring center software should have ID display terminal on the monitor screen and multiple images on the hard disk, and storing the image display different terminals. Through the image analysis and processing, such as abnormal alarm signal is given and the alarm information to the remote terminal to activate the alarm device to prevent vandalism, theft and the like. Related managers can be viewed directly monitor site, and feel free to tune to see the current state of each terminal. 4. Conclusion With increasing levels of production management, remote video remote monitoring has been widely used, more and more mature, and is moving network, intelligent direction. CDMA wireless transmission of data using the communication method to solve the communication problem of remote monitoring system, compared to other wired communication has incomparable superiority. Since the transmission of the image data, the amount of data and more frequent, may choose not to limit the use of business packages more economical. Our laboratory constructed in the wireless video remote monitoring, to obtain the desired results. Moreover, with the gradual improvement of mature CDMA network and application technology, CDMA applications will be more broad. CDMA wireless transmission system presented here can be extended to a variety of needs testing, monitoring and security of the environment.

What you don t know about industrial GSM/GPRS modem communications

What you don t know about industrial GSM/GPRS modem communications What you don t know about industrial GSM/GPRS modem communications A White Paper presented by: Ira Sharp Product Marketing Lead Specialist Phoenix Contact P.O. Box 4100 Harrisburg, PA 17111-0100 Phone:

More information

INTERIM MARKET DOCUMENT CHANGE

INTERIM MARKET DOCUMENT CHANGE INTERIM MARKET DOCUMENT CHANGE Title: MPLS and Alternative Communications for Medium Performance Facilities File #: IESO_IMDC_0169 Version #: 0.2 Part 1 General Information Document Affected: Market Manual

More information

Understanding the Cisco VPN Client

Understanding the Cisco VPN Client Understanding the Cisco VPN Client The Cisco VPN Client for Windows (referred to in this user guide as VPN Client) is a software program that runs on a Microsoft Windows -based PC. The VPN Client on a

More information

IP Ports and Protocols used by H.323 Devices

IP Ports and Protocols used by H.323 Devices IP Ports and Protocols used by H.323 Devices Overview: The purpose of this paper is to explain in greater detail the IP Ports and Protocols used by H.323 devices during Video Conferences. This is essential

More information

Digi Cellular Application Guide Using Digi Surelink

Digi Cellular Application Guide Using Digi Surelink Introduction Digi s SureLink is a mechanism to help maintain persistent wireless connections. It contains four main components: 1. Mobile Link Rx Inactivity Timer 2. SureLink Settings - Hardware Reset

More information

3.1 RS-232/422/485 Pinout:PORT1-4(RJ-45) RJ-45 RS-232 RS-422 RS-485 PIN1 TXD PIN2 RXD PIN3 GND PIN4 PIN5 T+ 485+ PIN6 T- 485- PIN7 R+ PIN8 R-

3.1 RS-232/422/485 Pinout:PORT1-4(RJ-45) RJ-45 RS-232 RS-422 RS-485 PIN1 TXD PIN2 RXD PIN3 GND PIN4 PIN5 T+ 485+ PIN6 T- 485- PIN7 R+ PIN8 R- MODEL ATC-2004 TCP/IP TO RS-232/422/485 CONVERTER User s Manual 1.1 Introduction The ATC-2004 is a 4 Port RS232/RS485 to TCP/IP converter integrated with a robust system and network management features

More information

Overcoming IP Address Issues with GPRS Remote Monitoring and Alarm Systems

Overcoming IP Address Issues with GPRS Remote Monitoring and Alarm Systems Overcoming IP Address Issues with Remote Monitoring and Alarm Systems Released on April 14, 2009 Stanley Liu, Product Manager stanley.liu@moxa.com is a communication technology that allows data acquisition

More information

Three Key Design Considerations of IP Video Surveillance Systems

Three Key Design Considerations of IP Video Surveillance Systems Three Key Design Considerations of IP Video Surveillance Systems 2012 Moxa Inc. All rights reserved. Three Key Design Considerations of IP Video Surveillance Systems Copyright Notice 2012 Moxa Inc. All

More information

Galaxy GPRS/EDGE/CDMA VPN Router

Galaxy GPRS/EDGE/CDMA VPN Router Galaxy GPRS/EDGE/CDMA VPN Router 1. General 2.5G mobile communication technology (GPRS/EDGE/CDMA 1x) has become widely used of industrials and utilities in recent years and many customers are seeking reliable,

More information

User s Manual TCP/IP TO RS-232/422/485 CONVERTER. 1.1 Introduction. 1.2 Main features. Dynamic DNS

User s Manual TCP/IP TO RS-232/422/485 CONVERTER. 1.1 Introduction. 1.2 Main features. Dynamic DNS MODEL ATC-2000 TCP/IP TO RS-232/422/485 CONVERTER User s Manual 1.1 Introduction The ATC-2000 is a RS232/RS485 to TCP/IP converter integrated with a robust system and network management features designed

More information

Chapter 5. Data Communication And Internet Technology

Chapter 5. Data Communication And Internet Technology Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN

More information

Technical Support Information

Technical Support Information Technical Support Information Broadband Module/Broadband Module Plus Configuration Guidance Setting up Remote Access to a Network Device (Mail/File Server/Camera Etc) connected to the LAN port of the Broadband

More information

Ten top problems network techs encounter

Ten top problems network techs encounter Ten top problems network techs encounter Networks today have evolved quickly to include business critical applications and services, relied on heavily by users in the organization. In this environment,

More information

What communication protocols are used to discover Tesira servers on a network?

What communication protocols are used to discover Tesira servers on a network? Understanding device discovery methods in Tesira OBJECTIVES In this application note, basic networking concepts will be summarized to better understand how Tesira servers are discovered over networks.

More information

Network Client. Troubleshooting Guide FREQUENTLY ASKED QUESTIONS

Network Client. Troubleshooting Guide FREQUENTLY ASKED QUESTIONS Network Client Troubleshooting Guide 1 Network Client Troubleshooting Guide The first section of this guide answers some frequently asked questions (FAQs) about the operation of Intellex and the Network

More information

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS

More information

Quick Guide of DDNS Settings

Quick Guide of DDNS Settings Quick Guide of DDNS Settings Solution: With the development of surveillance systems, more and more users want to use ADSL to realize video surveillance through network. But ADSL gives dynamic IP addresses

More information

Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1

Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1 Smart Tips Enabling WAN Load Balancing Overview Many small businesses today use broadband links such as DSL or Cable, favoring them over the traditional link such as T1/E1 or leased lines because of the

More information

Packetized Telephony Networks

Packetized Telephony Networks Packetized Telephony Networks Benefits of Packet Telephony Networks Traditionally, the potential savings on long-distance costs was the driving force behind the migration to converged voice and data networks.

More information

Using Remote Desktop Software with the LAN-Cell

Using Remote Desktop Software with the LAN-Cell Using Remote Desktop Software with the LAN-Cell Technote LCTN0010 Proxicast, LLC 312 Sunnyfield Drive Suite 200 Glenshaw, PA 15116 1-877-77PROXI 1-877-777-7694 1-412-213-2477 Fax: 1-412-492-9386 E-Mail:

More information

Using VPNs over BGAN. Version BGAN solutions guide. 1/18 Using VPNs over BGAN

Using VPNs over BGAN. Version BGAN solutions guide.  1/18 Using VPNs over BGAN 1/18 Using VPNs over BGAN BGAN solutions guide Using VPNs over BGAN Version 01 15.05.06 www.inmarsat.com/bgan Whilst the information has been prepared by Inmarsat in good faith, and all reasonable efforts

More information

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining

More information

Configuring High Availability for Embedded NGX Gateways in SmartCenter

Configuring High Availability for Embedded NGX Gateways in SmartCenter Configuring High Availability for Embedded NGX Gateways in SmartCenter February 2008 Active and Passive Gateway States Contents Introduction...1 High Availability Basics and Terminology...2 Active and

More information

Lab 4.5.4 Diagramming External Traffic Flows

Lab 4.5.4 Diagramming External Traffic Flows Lab 4.5.4 Diagramming External Traffic Flows Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 R2 R3 FC-CPE-1 FC-CPE-2 ISP Fa0/1 172.17.0.1

More information

UIP1868P User Interface Guide

UIP1868P User Interface Guide UIP1868P User Interface Guide (Firmware version 0.13.4 and later) V1.1 Monday, July 8, 2005 Table of Contents Opening the UIP1868P's Configuration Utility... 3 Connecting to Your Broadband Modem... 4 Setting

More information

The Industrial Wireless Book - Articles TECHNICAL ARTICLE: USING GPRS TO CONNECT SMALL, OUTLYING STATIONS

The Industrial Wireless Book - Articles TECHNICAL ARTICLE: USING GPRS TO CONNECT SMALL, OUTLYING STATIONS Page 1 of 6 Print this Page Close this Window TECHNICAL ARTICLE: USING GPRS TO CONNECT SMALL, OUTLYING STATIONS Process monitoring and control for electricity distribution grids until now has been available

More information

Technical Notes TN 1 - ETG 3000. FactoryCast Gateway TSX ETG 3021 / 3022 modules. How to Setup a GPRS Connection?

Technical Notes TN 1 - ETG 3000. FactoryCast Gateway TSX ETG 3021 / 3022 modules. How to Setup a GPRS Connection? FactoryCast Gateway TSX ETG 3021 / 3022 modules How to Setup a GPRS Connection? 1 2 Table of Contents 1- GPRS Overview... 4 Introduction... 4 GPRS overview... 4 GPRS communications... 4 GPRS connections...

More information

Multifunctional Broadband Router User Guide. Copyright Statement

Multifunctional Broadband Router User Guide. Copyright Statement Copyright Statement is the registered trademark of Shenzhen Tenda Technology Co., Ltd. Other trademark or trade name mentioned herein are the trademark or registered trademark of above company. Copyright

More information

Introduction. Technology background

Introduction. Technology background White paper: Redundant IP-VPN networks Introduction IP VPN solutions based on the IPsec protocol are already available since a number of years. The main driver for these kinds of solutions is of course

More information

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4

More information

Source-Connect Network Configuration Last updated May 2009

Source-Connect Network Configuration Last updated May 2009 Source-Connect Network Configuration Last updated May 2009 For further support: Chicago: +1 312 706 5555 London: +44 20 7193 3700 support@source-elements.com This document is designed to assist IT/Network

More information

Network Terminology Review

Network Terminology Review Network Terminology Review For those of you who have experience with IP networks, this document may serve as a reminder of the current lexicon of terms used in our industry. If you re new to it or specialized

More information

ALLNET ALL-VPN10. VPN/Firewall WLAN-N WAN Router

ALLNET ALL-VPN10. VPN/Firewall WLAN-N WAN Router ALLNET ALL-VPN10 VPN/Firewall WLAN-N WAN Router 1~2x100Mbps WAN + 3~4x100Mbps Switch LAN + 2xUSB port+2xwireless Antenna Dual WAN Ports for load balancing Up to 10 IPSec VPN tunnels, VPN Throughput 100Mbps

More information

Introduction To Computer Networking

Introduction To Computer Networking Introduction To Computer Networking Alex S. 1 Introduction 1.1 Serial Lines Serial lines are generally the most basic and most common communication medium you can have between computers and/or equipment.

More information

Configuring Network Address Translation (NAT)

Configuring Network Address Translation (NAT) 8 Configuring Network Address Translation (NAT) Contents Overview...................................................... 8-3 Translating Between an Inside and an Outside Network........... 8-3 Local and

More information

TAXONOMY OF TELECOM TERMS

TAXONOMY OF TELECOM TERMS TAXONOMY OF TELECOM TERMS Prepared by TUFF Ltd This short taxonomy is designed to describe the various terms used in today s telecommunications industry. It is not intended to be all embracing but to describe

More information

Enterprise Edge Communications Manager. Data Capabilities

Enterprise Edge Communications Manager. Data Capabilities Enterprise Edge Communications Manager Data Capabilities Data Module Objectives After the completion of this module you will be able to describe the following Data components of the Enterprise Edge Communications

More information

ewon-vpn - User Guide Virtual Private Network by ewons

ewon-vpn - User Guide Virtual Private Network by ewons VPN : what is it? A virtual private network (VPN) is a private communications network usually used within a company, or by several different companies or organizations, to communicate over a public network

More information

1 Basic Configuration of Cisco 2600 Router. Basic Configuration Cisco 2600 Router

1 Basic Configuration of Cisco 2600 Router. Basic Configuration Cisco 2600 Router 1 Basic Configuration of Cisco 2600 Router Basic Configuration Cisco 2600 Router I decided to incorporate the Cisco 2600 into my previously designed network. This would give me two seperate broadcast domains

More information

Guideline for setting up a functional VPN

Guideline for setting up a functional VPN Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the

More information

Application Note. Cell Janus Load Balancing Algorithms Technical Overview

Application Note. Cell Janus Load Balancing Algorithms Technical Overview Cell Janus Load Balancing Algorithms Technical Overview Introduction This application note describes the technical aspects of all load balancing algorithms in Cell Janus. Load balancing occurs in both

More information

Technology & You. Behind the Curtain Robert McQueen, CGCIO Princeton NJ

Technology & You. Behind the Curtain Robert McQueen, CGCIO Princeton NJ Technology & You Behind the Curtain Robert McQueen, CGCIO Princeton NJ What do you needed for your computer to operate? Electrical Power or Battery LAN (local area network) or WIFI Hardware Physical components

More information

Quick Guide of HiDDNS Settings (with UPnP)

Quick Guide of HiDDNS Settings (with UPnP) Quick Guide of HiDDNS Settings (with UPnP) Solution 1: With the development of surveillance systems, more and more users want to use ADSL to realize video surveillance through network. But ADSL gives dynamic

More information

Wireless IP for IoT / M2M Best Practices

Wireless IP for IoT / M2M Best Practices Wireless IP for IoT / M2M Best Practices Neo White Paper neo.aeris.com WIRELESS IP FOR M2M / IOT DATA BEST PRACTICES COPYRIGHT 2015, AERIS COMMUNICATIONS, INC. 1 Let our experts lead the way Table of Contents

More information

Quick Guide of DDNS Settings

Quick Guide of DDNS Settings Quick Guide of DDNS Settings Solution: With the development of surveillance systems, more and more users want to use ADSL to realize video surveillance through network. But ADSL gives dynamic IP addresses

More information

Accessing Remote Devices via the LAN-Cell 2

Accessing Remote Devices via the LAN-Cell 2 Accessing Remote Devices via the LAN-Cell 2 Technote LCTN0017 Proxicast, LLC 312 Sunnyfield Drive Suite 200 Glenshaw, PA 15116 1-877-77PROXI 1-877-777-7694 1-412-213-2477 Fax: 1-412-492-9386 E-Mail: support@proxicast.com

More information

Digi Connectware Manager:

Digi Connectware Manager: Digi Connectware Manager: Dynamic IP Address Support White Paper Abstract In the world of TCP/IP, each network device receives an identifier called an IP address. Unfortunately, there are a finite number

More information

IP Wireless / Wired Camera NIGHT VISION & REMOTE PAN/TILT ROTATE. User Manual

IP Wireless / Wired Camera NIGHT VISION & REMOTE PAN/TILT ROTATE. User Manual IP Wireless / Wired Camera NIGHT VISION & REMOTE PAN/TILT ROTATE User Manual WELCOME This model IP Camera is an integrated wireless IP Camera solution. It combines a high quality digital Video Camera with

More information

Introduction to computer networks and Cloud Computing

Introduction to computer networks and Cloud Computing Introduction to computer networks and Cloud Computing Aniel Nieves-González Fall 2015 Computer Netwoks A computer network is a set of independent computer systems that are connected by a communication

More information

Video Conferencing and Firewalls

Video Conferencing and Firewalls Video Conferencing and Firewalls Out with the Old, in with the New Video Conferencing is leaving ISDN for a better transport medium, IP. It s been happening for a long time in Europe but now ISDN is well

More information

4-CH Video Server SED-2310Q. Ver. 061031. User s Manual

4-CH Video Server SED-2310Q. Ver. 061031. User s Manual 4-CH Video Server SED-2310Q Ver. 061031 User s Manual 0 0 PRECAUTIONS 1. Read these instructions All the safety and operating instructions should be read before the product is operated. 2. Heed all warnings

More information

Secured Voice over VPN Tunnel and QoS. Feature Paper

Secured Voice over VPN Tunnel and QoS. Feature Paper Secured Voice over VPN Tunnel and QoS Feature Paper Table of Contents Introduction...3 Preface...3 Chapter 1: The Introduction of Virtual Private Network (VPN) 3 1.1 The Functions and Types of VPN...3

More information

Using Remote Desktop Software with the LAN-Cell 3

Using Remote Desktop Software with the LAN-Cell 3 Using Remote Desktop Software with the LAN-Cell 3 Technote LCTN3010 Proxicast, LLC 312 Sunnyfield Drive Suite 200 Glenshaw, PA 15116 1-877-77PROXI 1-877-777-7694 1-412-213-2477 Fax: 1-412-492-9386 E-Mail:

More information

Polycom. RealPresence Ready Firewall Traversal Tips

Polycom. RealPresence Ready Firewall Traversal Tips Polycom RealPresence Ready Firewall Traversal Tips Firewall Traversal Summary In order for your system to communicate with end points in other sites or with your customers the network firewall in all you

More information

IPv6 commercial deployment

IPv6 commercial deployment A closer look: IPv6 commercial deployment The commercial deployment of IPv6 is not just a simple shift to IPv6. Instead, it represents a large-scale and very challenging transformation of existing networks

More information

DSL-2600U. User Manual V 1.0

DSL-2600U. User Manual V 1.0 DSL-2600U User Manual V 1.0 CONTENTS 1. OVERVIEW...3 1.1 ABOUT ADSL...3 1.2 ABOUT ADSL2/2+...3 1.3 FEATURES...3 2 SPECIFICATION...4 2.1 INDICATOR AND INTERFACE...4 2.2 HARDWARE CONNECTION...4 2.3 LED STATUS

More information

NAT & IP Masquerade. Internet NETWORK ADDRESS TRANSLATION INTRODUCTION. NAT & IP Masquerade Page 1 of 5. Internal PC 192.168.0.25

NAT & IP Masquerade. Internet NETWORK ADDRESS TRANSLATION INTRODUCTION. NAT & IP Masquerade Page 1 of 5. Internal PC 192.168.0.25 NAT & IP Masquerade Page 1 of 5 INTRODUCTION Pre-requisites TCP/IP IP Address Space NAT & IP Masquerade Protocol version 4 uses a 32 bit IP address. In theory, a 32 bit address space should provide addresses

More information

* A WAN is a data communications network that operates beyond the geographic scope of a LAN.

* A WAN is a data communications network that operates beyond the geographic scope of a LAN. CCNA4 Chapter 1 * The Hierarchical Network Model: Access layer - Grants user access to network devices. In a network campus, it incorporates switched LAN devices that provide connectivity to workstations

More information

Introduction Chapter 1. Uses of Computer Networks

Introduction Chapter 1. Uses of Computer Networks Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks

More information

The Shift to Wireless Data Communication

The Shift to Wireless Data Communication The Shift to Wireless Data Communication Choosing a Cellular Solution for Connecting Devices to a WWAN Dana Lee, Senior Product Manager dana.lee@moxa.com Recent developments in the wireless and industrial

More information

A B S T R A C T. Index Trems- Wi-Fi P2P, WLAN, Mobile Telephony, Piconet I. INTRODUCTION

A B S T R A C T. Index Trems- Wi-Fi P2P, WLAN, Mobile Telephony, Piconet I. INTRODUCTION Wi-Fi Calling Using Android Phones. Mr.Dnyaneshwar Bhusari, Mr.Gaurav Mokase, Mr.Prasad Waghmare, Ms. Kundan Kumar Department of Information Technology D.Y.Patil College of Engineering, Akurdi, Pune, India

More information

ADSL MODEM. User Manual V1.0

ADSL MODEM. User Manual V1.0 ADSL MODEM User Manual V1.0 CONTENTS 1.OVERVIEW... 3 1.1 ABOUT ADSL... 3 1.2 ABOUT ADSL2/2+... 3 1.3 FEATURES... 3 2 SPECIFICATION... 4 2.1 INTERFACE INTRODUCTION... 4 2.1.1 INDICATOR AND INTERFACE...

More information

IPv6 Broadband Access Network Systems

IPv6 Broadband Access Network Systems IPv6 Broadband Access Network Systems IPv6 Broadband Access Network Systems 60 Junji Yamada Koji Wakayama Eisuke Sato OVERVIEW: To meet the demand for broadband access and enable a smooth transition from

More information

Mobile Wireless Overview

Mobile Wireless Overview Mobile Wireless Overview A fast-paced technological transition is occurring today in the world of internetworking. This transition is marked by the convergence of the telecommunications infrastructure

More information

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

Introduction. Network Basics. Workstations. Server. Hub

Introduction. Network Basics. Workstations. Server. Hub Introduction If you re planning to use eivf soon, you may want to install a computer network to improve access to your eivf Provider Portal from any PC in your office. This paper provides information you

More information

Kepware Technologies Optimizing KEPServerEX V5 Projects

Kepware Technologies Optimizing KEPServerEX V5 Projects Kepware Technologies Optimizing KEPServerEX V5 Projects September, 2010 Ref. 50.16 Kepware Technologies Table of Contents 1. Overview... 1 2. Factors that Affect Communication Speed... 1 2.1 Defining Bandwidth...

More information

51-10-50 Circuit-Switched Router Connections Nathan J. Muller

51-10-50 Circuit-Switched Router Connections Nathan J. Muller Previous screen 51-10-50 Circuit-Switched Router Connections Nathan J. Muller Payoff LAN managers will find that routers supporting dial backup, bandwidth-on-demand, and dial-on-demand enable more flexible

More information

Chapter 9. VLANs. Concept Questions

Chapter 9. VLANs. Concept Questions Chapter 9 VLANs This chapter introduces virtual LANs (VLANs) and switched internetworking, compares traditional shared LAN configurations with switched LAN configurations, and discusses the benefits of

More information

Research on Design and Implementation of ZigBee Gateway System Based on Internet of Things ZHOU Huachun1, a

Research on Design and Implementation of ZigBee Gateway System Based on Internet of Things ZHOU Huachun1, a 4th International Conference on Electrical & Electronics Engineering and Computer Science (ICEEECS 2016) Research on Design and Implementation of ZigBee Gateway System Based on Internet of Things ZHOU

More information

RIDE-IT System Overview

RIDE-IT System Overview RIDE-IT System Overview 2 BROADBAND BUS ROUTER Dragontech Systems www.dragontech.hk Demands on Operator Enabling with Broadband Connectivity 3 SAFETY CUSTOMER SERVICE BUS OPERATIONS IT EFFICIENCY On-Board

More information

VMware vcloud Air Networking Guide

VMware vcloud Air Networking Guide vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

Connect your Control Desk to the SIP world

Connect your Control Desk to the SIP world Connect your Control Desk to the SIP world Systems in

More information

White Paper. Solutions to VoIP (Voice over IP) Recording Deployment

White Paper. Solutions to VoIP (Voice over IP) Recording Deployment White Paper Solutions to VoIP (Voice over IP) Recording Deployment Revision 2.1 September 2008 Author: Robert Wright (robert.wright@ultra-audiosoft.com), BSc (Hons) Ultra Electronics AudioSoft, October

More information

Broadband Phone Gateway BPG510 Technical Users Guide

Broadband Phone Gateway BPG510 Technical Users Guide Broadband Phone Gateway BPG510 Technical Users Guide (Firmware version 0.14.1 and later) Revision 1.0 2006, 8x8 Inc. Table of Contents About your Broadband Phone Gateway (BPG510)... 4 Opening the BPG510's

More information

Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006

Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006 Core Syllabus C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS Version 2.6 June 2006 EUCIP CORE Version 2.6 Syllabus. The following is the Syllabus for EUCIP CORE Version 2.6, which

More information

Design of Remote data acquisition system based on Internet of Things

Design of Remote data acquisition system based on Internet of Things , pp.32-36 http://dx.doi.org/10.14257/astl.214.79.07 Design of Remote data acquisition system based on Internet of Things NIU Ling Zhou Kou Normal University, Zhoukou 466001,China; Niuling@zknu.edu.cn

More information

TRUFFLE Broadband Bonding Network Appliance BBNA6401. A Frequently Asked Question on. Link Bonding vs. Load Balancing

TRUFFLE Broadband Bonding Network Appliance BBNA6401. A Frequently Asked Question on. Link Bonding vs. Load Balancing TRUFFLE Broadband Bonding Network Appliance BBNA6401 A Frequently Asked Question on Link Bonding vs. Load Balancing LBRvsBBNAFeb15_08b 1 Question: What's the difference between a Truffle Broadband Bonding

More information

Overview of Computer Networks

Overview of Computer Networks Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs.

Procedure: You can find the problem sheet on Drive D: of the lab PCs. University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.9 Network Address Translation (NAT) Objectives 1. To understand the need

More information

Part I: Introduction. Housekeeping. What s the Internet: nuts and bolts view. What s the Internet: nuts and bolts view

Part I: Introduction. Housekeeping. What s the Internet: nuts and bolts view. What s the Internet: nuts and bolts view Part I: Introduction Housekeeping Chapter goal: get context, overview, feel of networking more depth, detail later in course approach: descriptive use Internet as example Overview: what s the Internet

More information

Summer In brief describe OSI model with suitable diagram. (Layered structure 1 mark and explanation 3 marks) Answer: Function of OSI model

Summer In brief describe OSI model with suitable diagram. (Layered structure 1 mark and explanation 3 marks) Answer: Function of OSI model Summer 15 1. In brief describe OSI model with suitable diagram. (Layered structure 1 mark and explanation 3 marks) Answer: OSI model (open system interconnection) model was developed by ISO(international

More information

Introduction of Intrusion Detection Systems

Introduction of Intrusion Detection Systems Introduction of Intrusion Detection Systems Why IDS? Inspects all inbound and outbound network activity and identifies a network or system attack from someone attempting to compromise a system. Detection:

More information

Lab 4.5.2 Diagramming Intranet Traffic Flows

Lab 4.5.2 Diagramming Intranet Traffic Flows Lab 4.5.2 Diagramming Intranet Traffic Flows Objective Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 FC-CPE-1 Fa0/1 172.17.0.1 Fa0/0 10.0.0.1

More information

Network Architecture and the OSI Reference Model

Network Architecture and the OSI Reference Model Network Architecture and the OSI Reference Model Advanced Computer Networks D12 Architecture Outline The Internet and IP Network Architecture Protocols and s Encapsulation The OSI Reference Model The Seven

More information

TCP/IP Network Communication in Physical Access Control

TCP/IP Network Communication in Physical Access Control TCP/IP Network Communication in Physical Access Control The way it's done: The security industry has adopted many standards over time which have gone on to prove as solid foundations for product development

More information

Cellular M2M Communications using. The InvisiConnect System

Cellular M2M Communications using. The InvisiConnect System Cellular M2M Communications using The InvisiConnect System From A Division of Mercury Instruments Copyright Metretek Inc. June 2007 A bit About Cellular s two technologies each with two paths data or voice

More information

Network Client. Troubleshooting Guide A0

Network Client. Troubleshooting Guide A0 Network Client Troubleshooting Guide 8200-0082-99 A0 2 Network Client Troubleshooting Guide FREQUENTLY ASKED QUESTIONS The first section of this guide answers some frequently asked questions (FAQs) about

More information

PCTV Systems Requirements for using DistanTV mobile

PCTV Systems Requirements for using DistanTV mobile PCTV Systems Requirements for using DistanTV mobile PCTV Systems Requirements for using DistanTV mobile GB/US February 2010 2010 PCTV Systems S.à r.l. All rights reserved. No part of this manual may be

More information

Chapter 15: Advanced Networks

Chapter 15: Advanced Networks Chapter 15: Advanced Networks IT Essentials: PC Hardware and Software v4.0 1 Determine a Network Topology A site survey is a physical inspection of the building that will help determine a basic logical

More information

District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification

District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification 1.1 Multipoint Control Unit (MCU) A. The MCU shall be capable of supporting (20) continuous presence HD Video Ports at 720P/30Hz resolution and (40) continuous presence ports at 480P/30Hz resolution. B.

More information

Network+ Guide to Networks, Fourth Edition. Chapter 7 WANs, Internet Access, and Remote Connectivity. Objectives

Network+ Guide to Networks, Fourth Edition. Chapter 7 WANs, Internet Access, and Remote Connectivity. Objectives Network+ Guide to Networks, Fourth Edition Chapter 7 WANs, Internet Access, and Remote Connectivity Objectives Identify a variety of uses for WANs Explain different WAN topologies, including their advantages

More information

C n o t n e t n e t n s

C n o t n e t n e t n s Preface Thank you for choosing our product, for a better understanding of the product, we recommend you read the instruction and safety information before use. Notice: This user manual is an operation

More information

2. Layer-2 Ethernet-based VPN

2. Layer-2 Ethernet-based VPN 2. Layer-2 Ethernet-based VPN 2.1. Full Ethernet Virtualization The key concept of the method of realizing VPN by SoftEther VPN is the full virtualization of Ethernet segments, layer-2 Ethernet switches

More information

Crow Limited Warranty. Print Version 017

Crow Limited Warranty. Print Version 017 Crow Limited Warranty (Crow) warrants this product to be free from defects in materials and workmanship under normal use and service for a period of one year from the last day of the week and year whose

More information

F2103 GPRS DTU USER MANUAL

F2103 GPRS DTU USER MANUAL F2103 GPRS DTU USER MANUAL Add:J1-J2,3rd Floor,No.44,GuanRi Road,SoftWare Park,XiaMen,China 1 Zip Code:361008 Contents Chapter 1 Brief Introduction of Product... 3 1.1 General... 3 1.2 Product Features...

More information

Corporate VPN Using Mikrotik Cloud Feature. By SOUMIL GUPTA BHAYA Mikortik Certified Trainer

Corporate VPN Using Mikrotik Cloud Feature. By SOUMIL GUPTA BHAYA Mikortik Certified Trainer Corporate VPN Using Mikrotik Cloud Feature By SOUMIL GUPTA BHAYA Mikortik Certified Trainer What is a VPN? A virtual private network (VPN) is a method for the extension of a private network across a public

More information

Effective Wireless Data Communications Solutions for Air Monitoring Systems

Effective Wireless Data Communications Solutions for Air Monitoring Systems Effective Wireless Data Communications Solutions for Air Monitoring Systems Prepared by: Joey Landreneau Sonoma Technology, Inc. Petaluma, CA David Schwarz Mobile Electron, LLC Tampa, FL Presented to:

More information

SYSTEM ADMINISTRATION USING CISCO (41)

SYSTEM ADMINISTRATION USING CISCO (41) PAGE 1 OF 12 CONTESTANT ID# 12 Pages Time Rank SYSTEM ADMINISTRATION USING CISCO (41) Regional 2013 TOTAL POINTS (500) Failure to adhere to any of the following rules will result in disqualification: 1.

More information