| SNC-B2335(P)   Network Camera   User Manual   imagine the possibilities   Thanks you for purchasing this Samsung product.   To receive a more complete service, please visit   our website   www.samsungsecurity.com   RoHS compliant   Our product complies with “The Restriction Of the use of certain Hazardous Substances in electrical   and electronic equipment”, and we do not use the 6 hazardous materials- Cadmium (Cd), Lead   (Pb), Mercury (Hg), Hexavalent Chromium (Cr+6), Poly Brominated Biphenyls (PBBs), Poly Brominated   Diphenyl Ethers (PBDEs)- in our products.   Download from Www.Somanuals.com. All Manuals Search And Download.   7. Do not install the unit in humid, dusty, or sooty locations. Doing so may cause fire or   electric shock.   8. If any unusual smells or smoke come from the unit, stop using the product. In such   case, immediately disconnect the power source and contact the service center.   Continued use in such a condition may cause fire or electric shock.   9. If this product fails to operate normally, contact the nearest service center. Never   disassemble or modify this product in any way. (SAMSUNG is not liable for problems   caused by unauthorized modifications or attempted repair.)   10. When cleaning, do not spray water directly onto parts of the product. Doing so may   cause fire or electric shock   11. Do not expose the product to the direct airflow from an air conditioner.   Otherwise, it may cause moisture condensation inside the Clear Dome due to   temperature difference between internal and external of the dome camera.   12. If you install this product in a low-temp area such as inside a cold store, you must seal   up the wiring pipe with silicon, so that the external air can not flow inside the housing.   Otherwise, external high, humid air may flow inside the housing, pooling moisture or   vapor inside the product due to a difference between internal and external temperature.   English _3   Download from Www.Somanuals.com. All Manuals Search And Download.   overview   CAUTION   1. Do not drop objects on the product or apply strong blows to it. Keep away from a   location subject to excessive vibration or magnetic interference.   2. Do not install in a location subject to high temperature (over 50°C), low temperature   (below -10°C), or high humidity. Doing so may cause fire or electric shock.   3. If you want to relocate the already installed product, be sure to turn off the power and   then move or reinstall it.   4. Remove the power plug from the outlet when there is a lighting storm. Neglecting to do   so may cause fire or damage to the product.   5. Keep out of direct sunlight and heat radiation sources. It may cause fire.   6. Install it in a place with good ventilation.   7. Avoid aiming the camera directly towards extremely bright objects such as sun, as this   may damage the CCD image sensor.   8. Apparatus shall not be exposed to dripping or splashing and no objects filled with   liquids, such as vases, shall be placed on the apparatus.   9. The Mains plug is used as a disconnect device and shall stay readily operable at any   time.   10. When using the camera outdoors, moisture may occur inside the camera due   to temperature difference between indoors and outdoors. For this reason, it is   recommended to install the camera indoors. For outdoor use, use the camera with built-   in fan and heater.   4_ overview   Download from Www.Somanuals.com. All Manuals Search And Download.   FCC STATEMENT   This device complies with part 15 of the FCC Rules. Operation is subject to the following two   conditions :   1) This device may not cause harmful interference, and   2) This device must accept any interference received including interference that may cause   undesired operation.   Caution   This equipment has been tested and found to comply with the limits for a Class A   digital device, pursuant to part 15 of FCC Rules. These limits are designed to provide   reasonable protection against harmful interference when the equipment is operated in a   commercial environment.   This equipment generates, uses, and can radiate radio frequency energy and, if not   installed and used in accordance with the instruction manual, may cause harmful   interference to radio communications. Operation of this equipment in a residential area   is likely to cause harmful interference in which case the user will be required to correct   the interference at his own expense.   IC Compliance Notice   This Class A digital apparatus meets all requirements of the Canadian   Interference.-Causing Equipment Regulations of ICES-003.   English _5   Download from Www.Somanuals.com. All Manuals Search And Download.   overview   IMPORTANT SAFETY INSTRUCTIONS   1. Read these instructions.   2. Keep these instructions.   3. Heed all warnings.   4. Follow all instructions.   5. Do not use this apparatus near water.   6. Clean only with dry cloth.   7. Do not block any ventilation openings. Install in accordance with the manufacturer’s   instructions.   8. Do not install near any heat sources such as radiators, heat registers, or other apparatus   (including amplifiers) that produce heat.   9. Do not defeat the safety purpose of the polarized or grounding-type plug.   A polarized plug has two blades with one wider than the other. A grounding type plug   has two blades and a third grounding prong. The wide blade or the third prong is   provided for your safety. If the provided plug does not fit into your outlet, consult an   electrician for replacement of the obsolete outlet.   10. Protect the power cord from being walked on or pinched particularly at plugs,   convenience receptacles, and the point where they exit from the apparatus.   11. Only use attachments/accessories specified by the manufacturer.   12. Use only with the cart, stand, tripod, bracket, or table specified by   the manufacturer, or sold with the apparatus. When a cart is used,   use caution when moving the cart/apparatus combination to avoid   injury from tip-over.   13. Unplug this apparatus during lightning storms or when unused for   long periods of time.   14. Refer all servicing to qualified service personnel. Servicing is required when the   apparatus has been damaged in any way, such as powersupply cord or plug is   damaged, liquid has been spilled or objects have fallen into the apparatus, the apparatus   has been exposed to rain or moisture, does not operate normally, or has been dropped.   Apparatus shall not be exposed to dripping or splashing and no objects   filled with liquids, such as vases, shall be placed on the apparatus   6_ overview   Download from Www.Somanuals.com. All Manuals Search And Download.   CONTENTS   6 9 9 Important Safety Instructions   Product Features   Precautions – Installation And   Use   Recommended PC Specifications   What’s Included   At a Glance   OVERVIEW   2 9 10   11   14   15   Mounting the lens   Inserting/Removing an SD   Memory Card   INSTALLATION &   CONNECTION   16   18   Memory Card Information   (not included)   Connecting with other Device   14   22   23   23   24   28   29   30   30   How to use the menu key   Main Menu   Profile   Camera Setup   Privacy Zone   Others   System Info   Language   CAMERA SETUP   22   31   32   33   34   Connecting the Camera to an   IP Router with the XDSL/Cable   Modem   Connecting the Camera to   an IP Router with Local Area   Networking   Connecting the Camera Directly   to a DHCP-Based XDSL/Cable   Modem   Connecting the Camera Directly   to Local Area Networking   IP Address Setup   NETWORK CONNECTION   AND SETUP   31   35   36   39   40   Static IP Setup   Dynamic IP Setup   Port Range Forward (Port   Mapping) Setup   41   41   Connecting to the Camera From   a Shared Local PC   Connecting to the Camera From   a Remote PC via the Internet   English _7   Download from Www.Somanuals.com. All Manuals Search And Download.   overview   42   43   44   45   46   49   Connecting to the camera   Login   Installing ActiveX   Using the Live Screen   Backup   WEB VIEWER   42   Using the SD Search Viewer   Screen   50   50   55   58   59   66   Accessing the Setup screen   Default Setup   System Setup   Overlay Setup   Event Setup   SETUP SCREEN   50   APPENDIX   67   Network Setup   67   68   70   74   80   86   Profile   Terminology   Specifications   Frame Rate (NTSC)   Frame Rate (PAL)   Troubleshooting   8_ overview   Download from Www.Somanuals.com. All Manuals Search And Download.   PRODUCT FEATURES   y Support various communication protocols   Supports TCP/IP, UDP, RTP/RTSP, SMTP for email, and FTP protocols as well as various   internet protocols such as ARP, HTTP, HTTPS and DHCP.   y y y Web Browser-based Monitoring   Using the Internet web browser to display the image in a local network environment.   Automatic Local IP Setup   Even a network novice can install it with minimum operations.   Alarm   If an alarm sensor is connected and it detects a motion, a message is sent to the   registered address via FTP/email (SMTP) or stored in the SD memory card, or an alarm   will signal to the alarm out terminal.   y Intelligent Video Analysis   If an event rule is defined for the video analysis and it detects a motion in the configured rule   area, a message is sent to the registered address via FTP/email (SMTP) or stored in the SD   memory card, or an alarm will signal to the alarm out terminal.   PRECAUTIONS – INSTALLATION AND USE   y y Do not bend or drop the SD memory card.   Do not store or use the SD memory card in a high temperature, high humidity or dusty   place.   y y y Be careful not to apply foreign substances on the terminals of SD memory card.   In case of cleaning terminals, wipe gently with a soft cloth.   Before ejecting the SD memory card, release the checkbox <SD Card Record> in   <Alarm image> and press [Apply] button. (page 61)   y If SD memory card have reached its lifespan, no data will be saved.   In this case, purchase a new one and replace the SD memory card.   RECOMMENDED PC SPECIFICATIONS   y y y y y y y y CPU : Pentium4 / 2.4GHz or higher   Operating System : Windows XP(Service Pack2, Service Pack3) / Windows Vista   Resolution : 1024X768 pixels or higher   RAM : 512MB or higher   Web Browser : Internet Explorer 6.0 or higher   Video Card : Radeon, Nvidia   Video Memory: 128MB   DirectX 8.1 or higher   English _9   Download from Www.Somanuals.com. All Manuals Search And Download.   overview   Compatible IP Routers   y y y Linksys   D-Link   Netgear   Compatible PoE Switches   y y y Linksys SRW224G4P   D-Link DES-1316   SMC SMCPWR-INJ3   WHAT’S INCLUDED   Please check if your camera and accessories are all included in the product package.   Camera Holder (Mount)   & Screws (2EA)   Camera   C Mount Adaptor   User Manual/   IP INSTALLER CD   User Manual   Lens Options   CS Lens   C Lens   10_ overview   Download from Www.Somanuals.com. All Manuals Search And Download.   AT A GLANCE   Front Side   Item   Description   Camera Holder   (Mount) Holes   Used when you mount the camera onto the bracket by fixing the camera   holder (mount) adaptor with the bracket.   Auto Iris Lens   (Optional)   Installed on the lens adaptor.   Auto Iris Lens   Connector   Used to supply power and output signal to control the iris of the lens.    Wipe out a dirty surface of the lens softly with a lens tissue or cloth to which you have applied   ethanol.   M English _11   Download from Www.Somanuals.com. All Manuals Search And Download.   overview   Rear Side   AUDIO OUT AUDIO IN   SD CARD   SD SYSTEM POWER   RESET   VIDEO   NETWORK   1 2 3 4 5 1,2 : ALARM IN 1,2   : GND   4,5 : ALARM OUT 1,2   ACT   LINK   GND   AC 24V   DC 12V   3 Item   Description   SD Memory Card   Compartment   Compartment for the SD memory card.   AUDIO OUT Terminal for audio output.   Audio Out terminal   AUDIO IN   Terminal for audio input.   ON: A memory card is inserted and operates normally.   Flashing: Failed to record, insufficient space, or inserted   abnormally.   SD   OFF: Camera is off, camera is restarting, or memory card   not in place.   System, Power   Indicators   ON: The camera is turned on and connected to the network   properly.   SYSTEM   POWER   Blinking: During DDNS setup, or in case of setup failure, or   in a state of unstable network connection   OFF: When the system is rebooting, or turned off   ON: While the power is on   OFF: If the power is off   12_ overview   Download from Www.Somanuals.com. All Manuals Search And Download.   Resets the camera settings to the default. Press and hold it for about 3   seconds to turn off the system indicator and restart the system.   Reset Button   Power Port   GND   Used to plug the power cable.   Used for earth-grounding.   Network Port   Used to connect to the Network cable.   ALARM IN   Used to connect the alarm input signal.   1,2   I/O Port   GND   Used for earth-grounding.   ALARM OUT   1,2   Used to connect the alarm output signal.   Video Out Port   Video signal output port connected to the monitor.   English _13   Download from Www.Somanuals.com. All Manuals Search And Download.   installation & connection   MOUNTING THE LENS   Disconnect the power before proceeding.   Mounting the CS lens   Turn the optional CS lens clockwise to insert it.   CS Lens   Mounting the C lens   Turn the C mount adaptor clockwise to insert it and do the same with the C lens.   C Lens   14_ installation & connection   Download from Www.Somanuals.com. All Manuals Search And Download.   Connecting the Auto Iris Lens connector   Insert the lens connector into the corresponding hole of the camera.   Focusing   Turn the lens left or right to control the zoom and focus the lens so that you can view a clear,   sharp object.   INSERTING/REMOVING AN SD MEMORY CARD   Inserting an SD Memory Card   Push the SD memory card in the direction of the arrow shown in the diagram.    Do not insert the SD memory card while it’s upside down by force. Otherwise, it may damage the   SD memory card.   J English _15   Download from Www.Somanuals.com. All Manuals Search And Download.   installation & connection   Removing an SD Memory Card   Gently press down on the exposed end of the memory card as shown in the diagram to   eject the memory card from the slot.     Pressing too hard on the SD memory card can cause the card to shoot out uncontrollably from the   slot when released.   J Before ejecting the SD memory card, release the checkbox <SD Card Record> in <Alarm   image> and press [Apply] button. (page 61)   MEMORY CARD INFORMATION (NOT INCLUDED)   What is a memory card?   The memory card is an external data storage device that has been developed to offer an   entirely new way to record and share video, audio, and text data using digital devices.   Selecting a memory card that’s suitable for you   Your camera supports SDHC memory cards.   You may, however, experience compatibility issues depending on the model and make of   the memory card.   Your camera supports SD memory cards.   Note that supported memory card capacity is up to 2GB.   For your camera, we recommend you use a memory card from the following manufacturers:   SDHC/SD Memory Card: Panasonic, Sandisk, Toshiba   Your camera supports 128MB to 16GB (SD Card : 2GB) of memory card capacity.   Playback performance can be affected depending on the speed of memory card, so use   the high-speed memory card.   To ensure proper recording of video data, we recommend you use a memory card that   supports at least read/write speed 10Mbps and Class 6.   16_ installation & connection   Download from Www.Somanuals.com. All Manuals Search And Download.   Memory Card Use   SD and SDHC memory cards feature a switch that disables writing data on to the media.   Having this switch to the Lock position will prevent accidental deletion of data stored in the   memory card but at the same time will also prevent you from writing data on to the media.   ❖ Memory Card Components   Contacts   Lock Switch   SDHC   English _17   Download from Www.Somanuals.com. All Manuals Search And Download.   installation & connection   CONNECTING WITH OTHER DEVICE   Monitor   AUDIO OUT AUDIO IN   SD RD   SD SYSTEM POWER   VIDEO   RESET   NETWORK   1 2 3 4 5 1,2   3 4,5   : : : ALARM IN 1,2   GND   ALARM OUT 1,2   ACT   LINK   GND   AC 2V   DC 1V   Power   Network   Connecting to the monitor   Connect the [VIDEO] port of the camera to the video input port of the monitor.   Network Connection   Connect the Network cable to the local network or to the Internet.   Power Supply   Use the screwdriver to connect each line of the power cable to the corresponding port of   the camera.    Be careful not to reverse the polarity when you connect the power cable.   You can also use a router featuring PoE (Power over Ethernet) to supply power to the camera.   J 18_ installation & connection   Download from Www.Somanuals.com. All Manuals Search And Download.   Connecting to Audio Input/Output   Microphone   LINE-OUT   LINE-IN   Speaker   Pre-Amp   Pre-Amp   Microphone   1. Connect the AUDIO IN port of the camera with the microphone directly or LINE OUT   port of the amplifier that the microphone is connected to.   y y Direct Mic Connection : Set Audio Input Gain high (10). (Refer to page 51)   Line Out Connection : Set Audio Input Gain low (1). (Refer to page 51)   2. Connect the AUDIO OUT port of the camera with the LINE IN port of the speaker.   English _19   Download from Www.Somanuals.com. All Manuals Search And Download.   installation & connection   Audio I/O Block Diagram   PC   Network   Microphone   Microphone   Speaker Pre-Amp   Pre-Amp   y Audio Codec   G.711 PCM. µ-law 64kbps 8kHz sampling   y y Full duplex Audio   Audio in   Used for mono signal line input (Max.2.4 Vpp)   y y Audio out   Used for mono signal line output (Max.2.4 Vpp)   Line out impedance   600   20_ installation & connection   Download from Www.Somanuals.com. All Manuals Search And Download.   Connecting to the I/O port box   Connect the Alarm I/O signal to the corresponding port of the rear port box.   AUDIO OUT AUDIO IN   SD CARD   1 2 3 4 5   SD SYSTEM POWER   RESET   VIDEO   NETWORK   1 2 3 4 5 1,2 : ALARM IN 1,2   1,2 : ALARM IN 1,2   : GND   4,5 : ALARM OUT 1,2   ACT   LINK   GND   AC 24V   DC 12V   3 3 : GND   4,5 : ALARM OUT 1,2   y y y ALARM IN 1, 2 : Used to connect the alarm input signal.   GND : Used for earth-grounding.   ALARM OUT 1, 2 : Used to connect the alarm output signal.   Alarm I/O Wiring Diagram   ALARM IN 1   1 ALARM IN 2   2 GND   3 External Relay   ALARM OUT 1   4 External Relay   ALARM OUT 2   5 English _21   Download from Www.Somanuals.com. All Manuals Search And Download.   camera setup   You can configure the camera settings using the Web Viewer.    For accessing the Web Viewer, refer to "Network Connection and Setup". (page 31)   M HOW TO USE THE MENU KEY   Follow the steps below if you run the Web Viewer for setting the menus.   1. Launch the Web Viewer.   2. From the [Camera OSD] menu in the left   pane, click [Menu].   The <MAIN MENU> screen appears.   3. Click the Up/Down ( ) buttons to move to a   ▲▼   desired item.   4. Click the four direction (   ▲▼◄ ►   ) buttons to navigate through the menu items.   ) buttons.   5. To change the value of a selected item, click the Left/Right (   ◄ ►   6. Click [   ].   Your changes will be applied.   : Exits the menu setup screen.   Before exiting the setup screen, select [SAVE] to save your settings, or [QUIT] to   cancel them.   : Saves your settings and returns to the previous screen.   : Returns to the main menu.   : Use this icon if you want to save your settings after you specified the mask area and   privacy area, etc.   Once you saved your settings, the changes remain intact even if you select [QUIT] on   exit.   : Use this icon if you want to delete a mask, or privacy area, etc.   Once you deleted your settings, the deletions remain valid even if you select [QUIT] on   exit.   : This arrow appears next to a menu that contains sub items.   For the items with the "*" mark on the right, You can get help from "Terminology". (page 68)    If intelligent video analysis is enabled, camera’s OSD menu operation can be set as an event.   J 22_ camera setup   Download from Www.Somanuals.com. All Manuals Search And Download.   MAIN MENU   You can configure the camera settings to your preference.   y PROFILE   ** MAIN MENU **   PROFILE   CAMERRA SET   PRIVACY ZONE   OTHER SET   SYSTEM INFO   LANGUAGE   You can select a mode that is appropriate to the   camera installation environment.   CAMERA SET   Configure the camera functions and settings.   PRIVACY ZONE   You can configure the privacy settings.   OTHER SET   y y y You can configure more settings including   FACTORY DEFAULTS.   y y SYSTEM INFO   Shows the camera version and type.   LANGUAGE   Select a preferred one from the supported languages.   PROFILE   You can select one from the pre-determined modes as appropriate to your specific camera installation   environment.   Your selection on each item in PROFILE will affect all other settings of the camera. For the   setting, refer to "PROFILE". (page 67)   For selecting and saving each menu item, refer to "How to use the menu key". (page 22)   y y y STANDARD   Automatically optimizes the camera settings to   the normal environment.   ◄ ► PROFILE   *STANDARD   ITS   BACKLLIGHT   DAY/NIGHT   GAMING   ITS   This setting enables you to analyze the traffic   situation and take the traffic information at a glance.   CUSTOM   BACKLIGHT   This setting enables you to view a sharp background   and object even in a severe backlight scene.   y y DAY/NIGHT   Automatically optimizes the camera settings to the day and night scene.   GAMING   This automatically configures the settings so that you can work in a stable illumination   condition as indoors.   y CUSTOM   Your change to any of the PROFILE settings will switch the display to CUSTOM.   English _23   Download from Www.Somanuals.com. All Manuals Search And Download.   camera setup   CAMERA SETUP   You can configure the general settings of the camera module.   For selecting and saving each menu item, refer to "How to use the menu key". (page 22)   CAMERA ID   Provide the ID and position for a camera that displays on the screen.   1. Select <CAMERA SET> - <CAMERA ID>.   CAMERA ID   2. Use the four direction (   ▲▼◄ ►   ) buttons to   ABCDEFGGHIJKLMNNOPQRSTTUUVWXYZO   _ select a desired character.   123456789 : ? +*()/   In the lower input box of the screen, the   selected character will be entered.    You can enter up to 54 characters including alphabets,   numbers and special characters.   SP►► ◄◄ SP   - - - - - - - - - - - - - - - - - - - - - - - - -   - - - - - - - - - - - - - - - - - - - - - - - - -   LOCATION   3. When done, continue to select <LOCATION>   to specify the display position of the camera ID.   IRIS   You can set the iris to control the intensity of radiation incoming to the camera.   1. Select <CAMERA SET> - <IRIS>.   ALC   2. Use the left/right ( ) buttons to select either   ◄ ►   LENS   LEVEL   BACKLLIGHT   DC   ---- ----   <ALC> or <ELC>.   [ ] 00   I y ALC : Controls the luminance automatically.   OFF   - - - - LENS : Select a lens to use.   LEVEL : Select the global brightness level.   BACKLIGHT : Select WDR or BLC.   WDR : Define the composition for weight   factor, the shutter speed in WDR level, and   select outdoor or indoor for white balance   setup.   - BLC (Backlight compensation) : Configure the backlight compensation area by   defining the area size and location.   y ELC : Controls the level electronically.   - - LEVEL : Select an overall brightness level.   BACKLIGHT : Set the area for the backlight compensation.   If you select <USER> for <AREA>, you can select the area size and location.    If the iris is set to <ALC>, fixing the iris is your priority when you adjust AE and the shutter speed.   M 24_ camera setup   Download from Www.Somanuals.com. All Manuals Search And Download.   MOTION   ◄ ► CAMERA SET   You can specify a level of AGC for controlling the   camera motion.   Select F.FAST if you want to monitor a very fast   moving object in a low contrast scene, and S.SLOW   if monitoring a very slow moving, inanimate object in   the same condition.   CAMERA ID   IRIS   MOTION   DNR   SHUTTER   SENS-UP   FLICKERLESS   XDR   ON   ALC   (F.FAST)---   MID   OFF   AUTO X4   OFF   MID   OFF   DIS   As long as DAY/NIGHT is set to AUTO, the   <MOTION> menu is not available.   DNR   Reduces the noise on the screen.   This is useful, especially for a noisy screen.   Set it to <USER>, you can specify the level.   DAY/NIGHT   WHITE BAL   DIGITAL ZOOM   DETAIL   AUTO   OFF   [ ] 2 AGC COLOR SUP   REVERSE   POSI/NEGA   PIP   MID   OFF   + SHUTTER   The SHUTTER menu is used to set the fixed fast   electronic shutter or auto fast electronic shutter.   OFF   SENS-UP   If the brightness of the video signal is too low, the Slow Shutter function will be activated.   Slow Shutter can collect the individual max frame rate to adjust the setting.   FLICKERLESS   If set to <ON>, the shutter speed will be fixed to 1/100 second. This will prevent possible   screen distortion due to a mismatch between the vertical sync frequency and the blinking   frequency of the lighting.    If IRIS is set to ELC / SHUTTER to AUTO, FIX, EXT mode / SENSE UP to FIX / AGC to FIX, the <DIS> menu   will be disabled.   XDR   This will correct a brightness difference between different scenes for the optimal visibility.   The higher the value is, the higher the correction level is.   DIS   Automatically compensates for the flicker on the screen.   If set to <ON>, the image will be enlarged with digital zoom as much area as   compensated.   English _25   Download from Www.Somanuals.com. All Manuals Search And Download.   camera setup   DAY/NIGHT   You can specify a recording mode according to the scene.   1. Select <CAMERA SET> - <DAY/NIGHT>.   AUTO   2. Select a screen transition mode according to the   illumination, and set options as appropriate.   BURST   DAYꢁNIGHT   BRIGHTTNESS   DWELL TIME   NIGHTꢁDAY   BRIGHTTNESS   DWELL TIME   OFF   y y MID   2S   DAY : Fixed to DAY mode, regardless of the   scene.   MID   5S   1 2   NIGHT : Fixed to NIGHT mode, regardless   of the scene.   MASK AREA   If BURST is set to <ON>, the burst signal will   output.   y y AUTO : According to the luminance, this will   switch DAY to NIGHT mode, or vice versa.   MASK AREA   DAYꢀNIGHT / NIGHTꢀDAY : If set to   <AUTO>, you can specify the brightness   level triggering the mode switch between   DAY and NIGHT as well as the interval.   <SIZE>   <LOCATION>   y MASK AREA : If there exists a bright spot   light source in a night scene, you can specify   the size and position as needed.   Any excessively bright area in a night scene   will be masked.   WHITE BAL   If you need to adjust the screen brightness, use the WHITE BALANCE function.   1. Select <CAMERA SET> - <WHITE BAL>.   WHITE BAL   2. Select a mode where you set the balance.   DAY/NIGHT   DAY   y DAY : You can set the RED, and BLUE value   in DAY mode.   MODE   RED   BLUE   ATW2   [ [ ] ] ---- ----   00   00   I ---- ----   I y NIGHT : You can adjust the <WHITE BAL>   according to the ambient luminance.   26_ camera setup   Download from Www.Somanuals.com. All Manuals Search And Download.   3. According to the specified recording mode,   select a WHITE BAL mode with necessary   options.   WHITE BAL   DAY/NIGHT   NIGHT   MID   AWC   I I BRIGHTNESS   MODE   y BRIGHTNESS : Specify a brightness level   triggering the switch from DAY to NIGHT   mode.   [ [ [ [ ] ] ---- ----   RED   BLUE   R-GAIN   B-GAIN   00   00   ---- ----   ] ] 0040   0133   y MODE : According to the selected mode,   you can adjust the RED and BLUE color   level.   - - - RED : Adjust the strength of the red color.   BLUE : Adjust the strength of the blue color.   R-GAIN/B-GAIN : Specify the current color temperature manually.    You can set the R-GAIN, and B-GAIN value only in AWC mode.   DIGITAL ZOOM   You can set the digital zoom factor and position.   When the zoom factor and position are defined, the digital zoom function will operate.    If you set the digital zoom to a larger factor than the actual enlargement for compensation, the DIS   function will be disabled.   DETAIL   You can adjust the vertical and horizontal sharpness, respectively.   AGC COLOR SUP   This will adjust the color scheme according to the AGC value.   REVERSE   This will reverse the signal left to right, top to bottom, or a combination of the preceding.   POSI/NEGA   This will display the video brightness signal either normally or reversely.   PIP   You can view a main image with a sub image on the same screen.   English _27   Download from Www.Somanuals.com. All Manuals Search And Download.   camera setup   PRIVACY ZONE   You can set up to 12 privacy zones that will be hided for privacy of the subject when recording.   For selecting and saving each menu item, refer to "How to use the menu key". (page 22)   ZONE SETUP   1. Select <MAIN MENU> - <PRIVACY ZONE>.   ◄ ► PRIVACY ZONE   2. Use the four direction (   ▲▼◄ ►   ) buttons to   1 7 2 8 3 9 4 5 6 select a desired number.   The Zone setup screen appears.   10 11 12   PRIVACY SET   STYLE   ON   MOSAIC1   3. Select the <PIXEL LEVEL>.   Specify the pixel unit level for the POSITION set-   ting.   PRIVACY ZONE SET 1   [ ] 4 PIXEL LEVEL   <POINT>   4. Select <POINT>.   <POSITION>   You will see dots on the screen.   5. Use the four direction (   ▲▼◄ ►   ) buttons to specify   the position for each of the four dots.   6. Select <POSITION> and use the four direction   ( ) buttons to specify the position for each   ▲▼◄ ►   of the four dots.   7. Save the changes and move to the previous screen and select the <STYLE>.   Select <COLOR> and pick a desired color.    Setting one or more privacy zone and enabling privacy function will disable the PIP function.   M 28_ camera setup   Download from Www.Somanuals.com. All Manuals Search And Download.   OTHERS   You can reset the camera, or select the OSD font color to your preference.   For selecting and saving each menu item, refer to "How to use the menu key". (page 22)   FACTORY DEFAULT   1. Select <MAIN MENU> - <OTHER SET>   ◄ ► OTHER SET   - <FACTORY DEFAULTS>.   The FACTORY DEFAULTS setup screen   appears.   FACTORY DEFAULTS   OSD COLOR   BW   2. Select <OK>.   All the settings will be restored to the factory   default.   However, the language setting will not be   restored.   FACTORY DEFAULTS   OK   CANCEL   OSD COLOR   You can set the font color of the user interface.   English _29   Download from Www.Somanuals.com. All Manuals Search And Download.   camera setup   SYSTEM INFO   You can check the system information.   For selecting and saving each menu item, refer to "How to use the menu key". (page 22)   1. Select <MAIN MENU> - <SYSTEM INFO>.   ◄ ► SYSTEM INFO   2. The current system information is displayed.   _ _ P TYPE   3 IPB   CAMERAA VER.   v1.00__090828    The camera type may different, depend on the video   signal.   M LANGUAGE   You can select a language to your preference.   For selecting and saving each menu item, refer to "How to use the menu key". (page 22)   1. Select <MAIN MENU> - <LANGUAGE>.   ◄ ► LANGUAGE   *ENGLISH   FRANÇAIS   DEUTSCH   ESPAÑOL   ITALIANO   2. Select your preferred language using the   up/down ( ) buttons.   ꢀꢁ    Supported language may different.   M 30_ camera setup   Download from Www.Somanuals.com. All Manuals Search And Download.   network connection and setup   You can set up the network settings according to your network configurations.   CONNECTING THE CAMERA TO AN IP ROUTER WITH THE   XDSL/CABLE MODEM   This is for a small network environment such as homes, SOHO and ordinary shops.   SNC-B2335   INTERNET   Cable Modem   xDSL or   Cable Modem   xDSL or   IP Router   External Remote PC   SNC-B2335   Local PC   DDNS Server   (Data Center, KOREA)   Configuring the network settings of the local PC connected to an   IP router   Configuring the network settings of the local PC connected to an IP router, follow the   instructions below.   y Select : <Network Neighborhood> ꢀ<Properties> ꢀ<Local Area Connection>   ꢀ<Properties> ꢀ<General> ꢀ<Internet Protocol (TCP/IP)> ꢀ<Properties>   ꢀ<Obtain an IP address automatically> or <Use the following IP address>.   y Follow the instructions below if you select <Use the following IP address>:   ex1) If the address (LAN IP) of the IP router is 192.168.1.1   IP address: 192.168.1.100   Subnet Mask: 255.255.255.0   Default Gateway: 192.168.1.1   ex2) If the address (LAN IP) of the IP router is 192.168.0.1   IP address: 192.168.0.100   Subnet Mask: 255.255.255.0   Default Gateway: 192.168.0.1   ex3) If the address (LAN IP) of the IP router is 192.168.xxx.1   IP address: 192.168.xxx.100   Subnet Mask: 255.255.255.0   Default Gateway: 192.168.xxx.1    For the address of the IP router, refer to the product’s documentation.   M English _31   Download from Www.Somanuals.com. All Manuals Search And Download.   network connection and setup   Checking if the IP router is connected to the xDSL/Cable modem properly   Select <Status> from the Settings menu of the IP Router   y If it is properly connected, <IP Address>, <Subnet Mask> and <Gateway>   provided by your ISP are displayed. Please remember these values because they   are required so that an external remote computer of the IP router connects to the   camera. However, note that certain ISPs change the settings of <IP Address>,   <Subnet Mask> and <Gateway> on a regular basis   y If the IP router is not properly connected, press the [Connect] button to try to recon-   nect or check if the settings of the IP router are correct.   CONNECTING THE CAMERA TO AN IP ROUTER WITH   LOCAL AREA NETWORKING   This is for a large network environment such as corporate office, building, public office and factory.   SNC-B2335   Switch   INTERNET   HUB   IP Router   External Remote PC   Firewall   SNC-B2335   Local PC   DDNS Server   (Data Center, KOREA)   Local PC   Configuring the network settings of the local PC connected to an   IP router   Configuring the network settings of the local PC connected to an IP router, follow the   instructions below.   y Select : <Network Neighborhood> ꢀ<Properties> ꢀ<Local Area Connection>   ꢀ<Properties> ꢀ<General> ꢀ<Internet Protocol (TCP/IP)> ꢀ<Properties>   ꢀ<Obtain an IP address automatically> or <Use the following IP address>.   y Follow the instructions below if you select <Use the following IP address>:   ex1) If the address (LAN IP) of the IP router is 192.168.1.1   IP address: 192.168.1.100   Subnet Mask: 255.255.255.0   Default Gateway: 192.168.1.1   32_ network connection and setup   Download from Www.Somanuals.com. All Manuals Search And Download.   ex2) If the address (LAN IP) of the IP router is 192.168.0.1   IP address: 192.168.0.100   Subnet Mask: 255.255.255.0   Default Gateway: 192.168.0.1   ex3) If the address (LAN IP) of the IP router is 192.168.xxx.1   IP address: 192.168.xxx.100   Subnet Mask: 255.255.255.0   Default Gateway: 192.168.xxx.1    For the address of the IP router, refer to the product’s documentation.   M CONNECTING THE CAMERA DIRECTLY TO A DHCP-   BASED XDSL/CABLE MODEM   INTERNET   xDSL or   CableModem   External Remote PC   SNC-B2335   DDNSServer   (Data Center, KOREA)   Setting the IP Router   This is enabled for a modem using DHCP.   1. Set the Static or Dynamic IP address. (pages 36~41)   2. Launch an Internet browser on the local PC connected to the IP Router.   3. Enter the IP Router’s address in the address bar of the browser.   ex) http://192.168.1.1, http://192.168.0.1   or http://192.168.xxx.1    For the DDNS URL address, refer to "To check the DDNS address". (page 43)   4. When the IP Router is connected, the login window appears and prompts you to   enter the password.    For the login IP and the password, refer to the IP router’s documentation.   5. When done, you will see the setup window of the IP router. In the setup menu,   select “Automatic Configuration-DHCP” for Internet Connection Type.    For the menu location of Internet Connection Type or DHCP selection, refer to the IP router’s   documentation.   6. When done, click the [Save] or [Apply] button to save the settings.   English _33   Download from Www.Somanuals.com. All Manuals Search And Download.   network connection and setup   CONNECTING THE CAMERA DIRECTLY TO LOCAL AREA   NETWORKING   Connecting to the camera from a local PC in the LAN   1. Launch an Internet browser on the local PC.   2. Enter the IP address of the camera in the address bar of the browser.   SNC-B2335   Switch   HUB   INTERNET   External Remote PC   SNC-B2335   F irewall   Local PC   D D N S S erver   (DataCenter,KOREA)    A remote PC in an external Internet out of the LAN network may not be able to connect to the   camera installed in the intranet if the port-forwarding is not properly set or a firewall is set.   In this case, to resolve the problem, contact your network administrator.   M 34_ network connection and setup   Download from Www.Somanuals.com. All Manuals Search And Download.   IP ADDRESS SETUP   Buttons used in IP Installer   Item   Description   Model name of the connected camera.   Device Name   Mode   Click the column to sort the list by model name.   However, search will be stopped if clicked during the search.   Displays either <Static> or <Dynamic> for the current network connection   status.   Ethernet address for the connected camera.   Click the column to sort the list by Ethernet address.   However, search will be stopped if clicked during the search.   MAC(Ethernet)   Address   IP address.   Click the column to sort the list by IP address.   However, search will be stopped if clicked during the search.   The factory default is "192.168.1.200".   IP Address   Network setting for the camera.   Protocol   UPnP Status   URL   The factory default is "IPv4".   Cameras with the IPv6 setting will be displayed "IPv6".   This function is not currently implemented.   DDNS URL address enabling access from the external Internet.   However, this will be replaced with the <IP Address> of the camera if   DDNS registration has failed.   English _35   Download from Www.Somanuals.com. All Manuals Search And Download.   network connection and setup   IPv4   Scans for cameras with the IPv4 setting.   IPv6   Scans for cameras with the IPv6 setting.   Scans for cameras that are currently connected to the network.   However, this button will be grayed out if neither IPv4 nor IPv6 is checked.   Search   Auto Set   Manual Set   Exit   <IP Installer> will automatically configure the network settings for you.   You should configure the network settings manually.   Exits the IP Installer program.   STATIC IP SETUP   Manual Network Setup   Run <IP Installer.exe> to display the camera search list.   At the initial startup, both [Auto Set] and [Manual Set] will be grayed out.    For cameras found with the IPv6 setting, these buttons will be grayed out as the cameras do not   support this function.   M 1. Select a camera in the search list.   Find the MAC (Ethernet) address labeled   on the rear of the camera.   Both the [Auto Set] and [Manual Set]   buttons will be activated.   2. Click [Manual Set].   The MANUAL SET dialog appears.   The default values of <IP Address>,   <Subnet Mask>, <Gateway>, and <HTTP Port> of the camera will be displayed.   The default <PASSWORD> is 4321.   3. In the <ADDRESS> pane, provide the   necessary information.   MAC (Ethernet) Address : The MAC   (Ethernet) address of the applicable   camera will be set automatically so you   don't need to input it manually.   36_ network connection and setup   Download from Www.Somanuals.com. All Manuals Search And Download.   If using an IP router :   y IP Address : Enter an address falling in   the IP range provided by the IP router.   ex) 192.168.1.2~254,   192.168.0.2~254,   192.168.XXX.2~254   y y Subnet Mask : The <Subnet Mask> of   the IP router will be the <Subnet Mask>   of the camera.   Gateway : The <Local IP Address> of   the IP router will be the <Gateway> of the camera.   If not using an IP router :   For setting <IP Address>, <Subnet Mask>, and <Gateway>, contact your network   administrator.    The values of Device, TCP, UDP, Upload, and Multicast ports can not be changed manually, and   will be adjusted according to the HTTP port value.   M 4. In the <PORT> pane, provide   necessary information.   y HTTP Port : Used to access the   camera using the Internet browser,   defaulted to 80. Use the spin button   to change the HTTP Port value. The   start value of the port is 80, and   increases or decreases by 6 like   10000, 10006, 10012.   y y Device Port : Used to control the video signal transfer, defaulted to 60001(TCP).   TCP Port : Video signal transfer port using TCP protocols, defaulted to   60002(TCP).   y UDP Port : Video signal transfer port using the UDP Unicast method, defaulted to   60003(UDP).   y y Upload Port : Used to upgrade the software firmware, defaulted to 60004(TCP).   Multicast Port : Video signal transfer port using the UDP Multicast method,   defaulted to 60005(UDP).   5. Enter the password.   This is the login password for the "root" user who accesses the camera.   The default password is "4321".   6. Click [OK].   Manual network setup will be completed.   7. When the manual setup including <IP> is completed, the camera will restart.   English _37   Download from Www.Somanuals.com. All Manuals Search And Download.   network connection and setup   If the IP router has more than one camera connected   Configure the IP related settings and the Port related settings distinctly with each other.   Category   IP Address   Subnet Mask   Gateway   Camera #1   Camera #2   192.168.1.200   255.255.255.0   192.168.1.1   192.168.1.201   255.255.255.0   192.168.1.1   IP related settings   HTTP Port   Device Port   TCP Port   UDP Port   Upload Port   Multicast Port   80   10000   10001   10002   10003   10004   10005   60001   60002   60003   60004   60005   Port related settings    If the <HTTP Port> is set other than 80, you must provide the <PORT> number in the address   bar of the Internet browser before you can access the camera.   ex) http://IP address : HTTP Port   M http://192.168.1.201:10000   Auto Network Setup   Run <IP Installer.exe> to display the camera search list.   At the initial startup, both [Auto Set] and [Manual Set] will be grayed out.    For cameras found with the IPv6 setting, these buttons will be grayed out as the cameras do not   support this function.   M 1. Select a camera in the search list.   Find the MAC (Ethernet) address labeled   on the rear of the camera.   Both the [Auto Set] and [Manual Set]   buttons will be activated.   2. Click [Auto Set].   The AUTO SET dialog appears.   The <IP Address>, <Subnet Mask>,   and <Gateway> will be set automatically.   38_ network connection and setup   Download from Www.Somanuals.com. All Manuals Search And Download.   3. Enter the password.   This is the login password for the "root"   user who accesses the camera.   The default password is "4321".   4. Click [OK].   Auto network setup will be completed.   5. The camera will automatically complete   the network setting and restart.   DYNAMIC IP SETUP   Dynamic IP Environment Setup   y Example of the dynamic IP environment   - - - If an IP router, with cameras connected, is assigned an IP address by the DHCP   server   If connecting the camera directly to the xDSL or cable modem using the DHCP   protocols   If IPs are assigned by the internal DHCP server via the LAN   Checking the dynamic IP   1. From a local PC, run <IP Installer>   to display a list of cameras that are   assigned <Dynamic IP>.   2. Select a camera in the list, and click   [Manual Set] to check the <Dynamic   IP> of the camera.   If you uncheck <DHCP>, you can   change <IP> or <PORT> to <STATIC>.   English _39   Download from Www.Somanuals.com. All Manuals Search And Download.   network connection and setup   PORT RANGE FORWARD (PORT MAPPING) SETUP   If you have installed an IP router with a camera connected, you must set the port range   forwarding on the IP router so that a remote PC can access the camera in it.   Manual Port Range Forwarding   1. From the Setup menu of the IP router,   select <Applications & Gaming> -   <Port Range Forward>.   For setting the port range forward for   a third-party IP router, refer to the user   guide of that IP router.   2. Select <TCP> and <UDP Port> for   each connected camera to the IP   router.   Each port number for the IP router   should match that specified in <Basic>   - <IP> from the camera's Setup menu.   3. When done, click [Save Settings].   Your settings will be saved.   40_ network connection and setup   Download from Www.Somanuals.com. All Manuals Search And Download.   CONNECTING TO THE CAMERA FROM A SHARED LOCAL   PC   1. Launch <IP Installer>.   It will scan for connected cameras and   display a list of them.   2. Double-click a camera to access.   The Internet browser starts and   connects to the camera.    You can also access the camera in such way you type the IP address of the found camera in the   address bar of the Internet browser.   M CONNECTING TO THE CAMERA FROM A REMOTE PC VIA   THE INTERNET   As a remote PC can not directly access <IP Installer>, you should access the camera in the IP   router network using DDNS URL of the camera.   1. Before you can access a camera in the IP router network, you should have set the   port range forward for the IP router.   2. From the remote PC, launch the Internet browser and type the DDNS URL address   of the camera, or the IP address of the IP router in the address bar.   ex) http://mfffe42.websamsung.net    For the DDNS URL address, refer to "To check the DDNS address". (page 43)   English _41   Download from Www.Somanuals.com. All Manuals Search And Download.   web viewer   CONNECTING TO THE CAMERA   Normally, you would   1. Launch the Internet browser.   2. Type the IP address of the camera in   the address bar.   ex) • IP address (IPv4) : 192.168.1.200   ꢀhttp://192.168.1.200   - the Login dialog should appear.   • IP address (IPv6) : 2001:230:abcd:   ffff:0000:0000:ffff:1111   ꢀhttp://[2001:230:abcd:ffff:0000   :0000:ffff:1111]   If the HTTP port is other than 80   1. Launch the Internet browser.   2. Type the IP address and HTTP port number of the camera in the address bar.   ex) IP address : 192.168.1.200:Port number(10000) ꢀhttp://192.168.1.200:10000   - the Login dialog should appear.   Using URL   1. Launch the Internet browser.   2. Type the DDNS URL of the camera in the address bar.   ex) URL address : http://mfffe42.websamsung.net   - the Login dialog should appear.   Connecting via URL (If the HTTP port is other than 80)   1. Launch the Internet browser.   2. Type the DDNS URL and HTTP port number of the camera in the address bar.   ex) URL address : http://mfffe42.websamsung.net:Port number(10000)   ꢀhttp://mfffe42.websamsung.net:10000   - the Login dialog should appear.   42_ web viewer   Download from Www.Somanuals.com. All Manuals Search And Download.   To check the DDNS address   The DDNS address consists of: <one of the lower-case letters: c, m, p> + <the last 6 digits   of the MAC (Ethernet) address> + <websamsung.net>   The small letter will be <c> if the first 6 digits of the MAC (Ethernet) address is <00:00:f0>,   or <m> if they are <00:16:6c>, or <p> for <00:68:36>.   ex) - If the MAC (Ethernet) address is 00:00:f0:ff:fe:42: c + fffe42 + websamsung.net =   cfffe42.websamsung.net   - If the MAC (Ethernet) address is 00:16:6c:ff:fe:42: m + fffe42 +websamsung.net =   mfffe42.websamsung.net   - If the MAC (Ethernet) address is 00:68:36:ff:fe:42: p + fffe42 +websamsung.net =   pfffe42.websamsung.net    The above mentioned addresses are simply examples; do not use any of these for connecting   purposes.   J LOGIN   The default user ID is "root", and the default password is "4321".   1. Enter "root" in the <User Name> input   box.   2. Enter "4321" in the <Password> input   box.   If the password is changed, enter the   changed password instead.   3. Click [OK].   If you have logged in successfully, you   will the Live Viewer screen.     For security purposes, ensure that you change the password in <Basic> - <User>.   The administrator ID, "root", is fixed and can not be changed.   M J If you check the "Save this password in your password list" option when your input is done, you   will be logged in automatically without being prompted to enter the login information from next time on.    For this, your computer has installed DirectX 8.1 or later.   You can get a free download of the latest DirectX from http://www.microsoft.com/download.   If you are using Internet Explorer 7.0 or 8.0 as the default web browser, you can view the best   quality image with a screen ratio of 100%. Reducing the ratio may cut the image on the borders.   English _43   Download from Www.Somanuals.com. All Manuals Search And Download.   web viewer   INSTALLING ACTIVEX   If connecting to a camera for the first time, you will see the installation message. Then, install the   required ActiveX to access the camera and control the video from it in real time.   For Windows XP Service Pack 2 users   1. Click the installation message that pops   up when you first access the camera.   2. Click <Install ActiveX Control...>.   3. The security warning popup appears,   click [Install].   4. When the required ActiveX is installed   properly after your access to the camera,   the Live screen should appear.    For normal installation, set the Block   Popup setting as follows:   Internet Explorer ➝ Tools ➝ Block   Popup ➝ Always allow popups from   the current site(A)   J 44_ web viewer   Download from Www.Somanuals.com. All Manuals Search And Download.   USING THE LIVE SCREEN   Item   Description   SD Search   Setup   Moves to the screen for searching event images from the SD card.   Move to the Setup screen.   About   You can check the firmware version, serial number and manufacturer information.   Resets the Alarm icon. (Alarm and Intelligent Video Analysis icons will disappear.)   Saves the snapshot as an image file in the .jpeg or .bmp format.   Prints out the current image.   Reset Alarm   Capture   Print   Record   Records the current video in avi movie file format.   Displays the Live screen in full screen.   Full Screen   You can set the video format(MJPEG, H.264/MPEG4) for video files.   Note that the menu configuration may differ from your setup of <H.264 & MPEG4   video select> in Video Setup menu.   Video format   Alarm output   On : Activates the specified Alarm Out port.   Off : Deactivates the specified Alarm Out port.   Pulse : Activates the Alarm Out port as much time as specified before deactivating it.   English _45   Download from Www.Somanuals.com. All Manuals Search And Download.   web viewer   Used to retrieve and customize the Camera Setup menu.   For selecting and saving each menu item, refer to "How to use the menu key". (page 22)   Camera OSD   Audio   Check the Listen or Speak check box for Audio.   Displays the Live video on the screen.   Viewer Screen   BACKUP   You can capture, print out, and save the snapshot in the specified path.   To capture the snapshot   1. Click [ ] on the scene to capture.   The Capture dialog should appear.   2. Click [OK].   The screenshot will be saved in the   specified path.   y y Default file path   - Windows XP : C:\Program Files\Samsung\SNC-B2335\SnapShot\Live   If you want to change the path, click [Set path ( )] and specify a path.   - Windows Vista : C:\users\[UserID]\AppData\LocalLow\Samsung\SNC-B2335\   SnapShot\Live   On the Windows Vista system, the path to save is fixed.   The screenshot file will be named automatically in the format of <IP address_Port   number_YYYYMMDD_hhmmss_index>.   ex) 192.168.0.203_60001_20090723_204029_00   46_ web viewer   Download from Www.Somanuals.com. All Manuals Search And Download.   To print out the screenshot   1. Click [ ] on the scene to print out.   The Print setup dialog appears.   2. Specify the name of the printer   connected, and click [OK].   To record a video   1. Click [ ] on the scene to record.   2. You will see the Save AVI dialog;   provide the necessary information.   y y y Save path : You can change the   default saving path.   File name : You can change the   default file name.   HDD minimum free size : If the free   space on the HDD is less than the   recorded space, recording will be forcibly ended.   3. Click [OK].   Recording will start with the display of   <REC> on the viewer screen.   The video file will be saved into the   specified path.   4. If you want to quit recording, click [   ] again.   English _47   Download from Www.Somanuals.com. All Manuals Search And Download.   web viewer   y Default file path   - Windows XP : C:\Program Files\Samsung\SNC-B2335\VideoClip\Live   If you want to change the path, click [Set path ( )] and specify a path.   - Windows Vista : C:\users\[UserID]\AppData\LocalLow\Samsung\SNC-B2335\   VideoClip\Live   On the Windows Vista system, the path to save is fixed.   y y The screenshot file will be named automatically in the format of <IP address_Port   number_YYYYMMDD_hhmmss_index>.   ex) 192.168.0.203_60001_20090723_204029_00   If you want to play an .avi file, you must have installed the corresponding DivX   codec on your system.   You can get a free download of the DivX from http://sourceforge.net/projects/   ffdshow/.   48_ web viewer   Download from Www.Somanuals.com. All Manuals Search And Download.   USING THE SD SEARCH VIEWER SCREEN   1. Click <SD search> tab in the Live screen.   2. The SD Search Screen appears.   SD Search Viewer Screen layout   Name   Thumbnail Size   Date   Function and description   The thumbnail images are displayed based on the selected size.   You can select the desired date to search for events generated.   You can select the desired time to search the schedule events.   You can select the desired time to search the alarm events.   Schedule   Alarm input   Intelligent video   analysis   You can search for events of intelligent video analysis by specifying the time period.   English _49   Download from Www.Somanuals.com. All Manuals Search And Download.   setup screen   ACCESSING THE SETUP SCREEN   You can configure the default setting, system, overlay, event and network related settings, and   change them as necessary.   1. In the Live screen, click the <Setup> tab.   2. The Setup screen appears.   DEFAULT SETUP   To configure the video & audio   settings   You can set the video resolution, quality,   CODEC and audio input/output settings.   1. Select <Basic> - <Video & Audio>.   The Video & Audio setup screen appears.   y y y Brightness : Adjust the screen   brightness from 1 to 100.   Contrast : Adjust the contrast from   1 to 100.   Resolution : Set the video size of the   MPEG4, H.264, and MPEG files.   - NTSC : 4CIF(704x480),   VGA(640X480), CIF(352X240)   - PAL : 4CIF(704x576),   VGA(640X480), CIF(352X288)   y y y Quality : Adjust the picture quality   from 1 to 10.   Frame rate : Select one from 30 fps,   15 fps, 8 fps, 3 fps, and 1 fps.   Bitrate control* : Select CBR (Constant   Bit Rate) or VBR (Variable Bit Rate) for   the compression method.    If selecting VBR, you can not set the target   bit rate.   50_ setup screen   Download from Www.Somanuals.com. All Manuals Search And Download.   y y y y y y Target bitrate : Transfers video signal at a specified bit rate.   Compression : Adjust the compression rate from 5 through 100 by 5.   Encode priority : Set the video transfer method to Frame rate or Quality.   GOP* size : Select a GOP size between 5 and 15.   Deblock : This will soften the edges between macro blocks.   De-Interlace : You can reduce the grid noise by using the de-interlacing function.   Only available if MPEG4 resolution is set to 4CIF.   If the WDR is set to <OFF> or the MPEG4 resolution is not 4CIF, you cannot enable the   MPEG4 CODEC’s de-interlacing   J    y y Profile : Select Baseline or Main for the H.264 profiling method.   Entropy coding* : Reduces the compression loss due to encoding.   J    If you set the profile to Baseline, the entropy coding is available only for CAVLC*; if you set it   to MAIN, the entropy coding is available for both CAVLC* and CABAC*.   y y y Motion estimation : Estimates the movement of pixels by determining the motion vector.   Input gain : You can set the audio input gain from 0 to 10.   Output gain : You can set the audio output gain from 0 to 10.   J    If the audio input gain is set to 0, no sound is heard.   2. When done, click [Apply].   Your settings will be saved.   To configure the IP settings   1. Select <Basic> - <IP>.   The IP setup window appears.   y IP configuration : Set the IP and port   settings for the camera.   - IP type : Select one from <Static   IP>, <Dynamic IP>, and <PPPoE   IP>.    If you select <PPPoE IP>, you can   provide the optional ADSL IP and   password. However, the multicast items   (multicast address, port, TTL) for VNP   and RTP will disappear.   English _51   Download from Www.Somanuals.com. All Manuals Search And Download.   setup screen   - MAC address : Displays the Ethernet MAC address.   This is used for creating a DDNS address.   - - - - - IP address : Displays the current IP address.   Subnet mask : Displays the <Subnet mask> for the set IP.   Gateway : Displays the <Gateway> for the set IP.   DNS server : Displays the DNS(Domain Name Service) server address.   HTTP webserver port : HTTP port used to access the camera via the web   browser. The default is 80(TCP).   - Upload port (TCP) : Used to upgrade the software firmware, defaulted to 60004(TCP).   y y IPv6 configuration : Obtains the IPv6 address to access the IPv6 network.   VNP configuration : Set a port used to transfer video signals with the Samsung   protocols.   - - Device port (TCP) : Used to control the video signal transfer, defaulted to 60001(TCP).   TCP streaming port : Video signal transfer port using TCP protocols, defaulted   to 60002(TCP).   - - UDP streaming port : UDP Port used to transfer video signal with the UDP   Unicast protocols. The default is 60003(UDP).   Multicast address : IP address used to transfer video signal with the UDP   Multicast protocols.   The default is 225.128.1.128, and if you want to change the address, specify it   ranging from 224.0.0.0 to 239.255.255.255.   - - Multicast port : UDP Port used to transfer video signal with the UDP Multicast   protocols. The default is 60005(UDP).   TTL* : Set the TTL for the VNP packet.   The default is 63, and if you want to change the address, specify it ranging from   0 to 255.   y RTP configuration : You can set the RTP protocol.   - - RTSP port : You can set the RTSP port.   Streaming port : Used to transfer video signal with the RTP protocols.   The default range is between 61000 and 61999.   - Multicast address : IP address used to transfer video signal with the RTP   protocols.   - - Multicast port : Used to transfer video signal with the RTP-protocol multicasting.   TTL* : You can set the TTL for the RTP packet.   2. When done, click [Apply].   Your settings are saved and the system restarts.   The currently opened web browser will be closed.    If the IP router has more than one camera connected, you should configure IP and port settings   differently with each other.   M 52_ setup screen   Download from Www.Somanuals.com. All Manuals Search And Download.   To set the user account   1. Click <Basic> - <User>.   The User setup window appears.   y Login authentication : You can set to   authenticate the login by the user.   - If you select <Enable>, the user   should have gone through the   login authentication; if selecting   <Disable>, every user can access   the system without the login authentication, having the ordinary user permissions.   - When done, click [Apply].   Your settings will be saved.   2. Add users or edit user ID or password.   y User login ID/password list : Displays a list of accessible users ID, passwords, and   ratings.   - - - You can add up to 10 users.   The admin ID is "root".   The password for the admin ID can be changed, but not added or deleted.   User Registration   1. From the User setup window, click   [Insert].   The Register User window appears.   2. Provide the <User ID>, <Password>,   and <Confirm password>,   respectively. You can enter up to 9   alphanumeric or special characters   (some excluded) for the user ID and   password, respectively.   3. Select a user level.   Select either <Operator> or <User> for a new user's permission.   4. Click [Apply].   The user registration is completed.     An existing user ID can not be added duplicate.   Neither root ID nor guest ID can be registered.   J English _53   Download from Www.Somanuals.com. All Manuals Search And Download.   setup screen   To edit a registered user account   1. From the User setup window, select a   user ID to change.   2. From the User setup window, click   [Modify].   The Modify user window appears.   3. Change the <User ID>, <Password>,   <Confirm password>, and <Level> as   you wish.   4. Click [Apply].   The selected user ID will be changed.   To delete a user ID   1. From the User setup window, select a user ID to delete.   2. From the User setup window, click [Delete].   The selected user ID will be deleted.    About the user permission   M Administrator : Can use all functions (change/control settings).   Operator : Can use only the functions available in the Live Viewer.   User : Can only view the video on the Live Viewer.   To set the display language   1. Click <Basic> - <Language>.   The Language setup window appears.   You can select one from 7 languages   (English/Korean/Chinese/French/Italian/   Spanish/German).   2. When done, click [Apply].   The selected language will be applied.   54_ setup screen   Download from Www.Somanuals.com. All Manuals Search And Download.   SYSTEM SETUP   To set the date/time   You can obtain the current system time from the NTP server or your PC for your time   setting.   1. Select <System> - <Date & Time>.   The Date & Time setup window appears.   2. If you select Manual, input the date and   time manually.   Your settings will be saved.   y Current system time : The specified   time in System Time Setup will be   applied.   y System time setup : You can   synchronize the system time with the NTP server (time server) or your PC, or   specify it manually.    You can specify the time between January 1, 2000 and December 31, 2037.   M To set the system time   1. Select a desired address in <Address>   or select <Synchronize with PC   viewer>.   2. If you select Manual, input the date and   time manually.   3. Click [Apply].   The specified system time will be applied.    <NTP Server IP> is provided by a public agency, the list of which is subject to change from time   to time.   M J   In a local network, a separate NTP server must be manually defined.   The current time can vary depending on the computers regional (GMT and DST) and country (PC   time configuration) settings.   English _55   Download from Www.Somanuals.com. All Manuals Search And Download.   setup screen   To check the log information   Select <System> - <Log>.   The Log information list appears.   y System log list : Shows the log   information about the system changes   along with time and IP address.   - System started: When the camera   turns on   - - - - - - - - - - - User login: When the user logs in to the camera   System reset: When the camera restarts   Network is up: When accessing the network   Network is down: When not accessing the network   Video param. changed: When the video related parameters are changed   System time changed: When the system time is changed   Network configuration change: When the network related configurations are changed   Alarm occurrence 1, 2: When an alarm is generated   Intelligent Video Analysis occurrence: When an intelligent video analysis event is generated.   FTP send error: When FTP transfer failed   SMTP send error: When sending e-mail message through SMTP server fails.    The maximum of 2000 logs can be recorded.   If the log number is over 2000, the log in the bottom of the log list will be replaced with a new log.   M To update the software   Select <System> - <Software update>.   The Software update window appears.   How to update the software   1. From the software update window, click   [Browse…].   The Open dialog appears.   2. Select an updatable file and click   [Open].   3. From the software update window,   click [Install].   The selected file will be unzipped with a   start of the update.   It may take a several minutes to complete the update.   56_ setup screen   Download from Www.Somanuals.com. All Manuals Search And Download.   4. When the software update is completed, you will be prompted to restart the system.   5. Click [OK] to restart the system.   Since the current connection is disconnected, you have to connect to the system again.    If the network is disconnected, the power supply fails, or the PC abnormally operates during the   update, the system does not work at all.   J To reset the system   Restart or reset the system if it does not   work properly or causes a problem.   Select <System> - <Reset>.   The Reset window appears.   y y Restart : Restarts the system.   Factory default : Resets the system   settings to the factory defaults with following two options:   - - Except network parameter : Resets all settings except for the Network Parameters.   All : Restores all settings to the default.   This works the same as pressing the [RESET] button on the rear of the camera.     After the system is reset or restarts, you should try to connect to the camera again.   J It takes several minutes until the system completes rebooting. Wait until the system rebooting is   completed and try to connect again.    After executing <Factory default>, you must run the <IP Installer.exe> program to change the   basic network settings such as IP address, Subnet mask, Gateway, etc., before you can connect to   the Internet.   To set the HTTPS   1. Select <System> - <HTTPS>.   The HTTPS setup window appears.   y Secure connection system : Select   a secure connection system to use.   To use the secure connection mode   requiring the public certificate for the   secure connection system, you must   have installed a signed certificate   issued by a certificate authority on   your system.   y Install a public certificate : To install the certificate to camera, you need to type a   certificate name (it can be arbitrarily assigned by user), certificate file issued from   the authority and a key file. When done, click [Install].   If the certificate is installed successfully, the user-defined certificate name will be   displayed. Also, the option button of <HTTPS (Secure connection mode using   the public certificate)> in the upper side becomes activated.   English _57   Download from Www.Somanuals.com. All Manuals Search And Download.   setup screen    To access the camera using HTTPS mode, you have to type the IP address for the camera in the   form of “https://<Camera_IP>”.   M 2. When done, click [Apply].   The web viewer will switch to the set secure connection system.   To Set IP Filtering   1. Click <System> - <IP filtering>.   The IP Filtering Setup screen appears.   y Basic policy : You can select the IP   filtering policy.   If you set to Permission, the web   server allows all attempting IP   addresses except the addresses   added in the refusal list.   If you set to Refusal, the web server allows only IP addresses added in the   permitted list and rejects all other IP addresses.   To apply the IP filtering policy, click [Apply] button.   2. Enter the IP address and subnet mask into the IP field to be allowed or rejected.   The Filtering range* will differ depending on specified IP address and subnet mask.   OVERLAY SETUP   You can display text on the screen.   To set the text   1. Select <Overlay> - <Overlay text>.   The Overlay Text setup window   appears.   2. When done, click [Apply].   Your settings will be saved.   y Overlay text settings : If you select   <Disable>, the overlay text will not   be displayed; If selecting <Enable>, it will display on the screen.   y Show date : Set to display the date information on the bottom screen.   - Output Format : Select a display format of the date information.   YYYY-MM-DD : Year-Month- Day / MM-DD-YYYY : Month-Day-Year/   DD-MM-YYYY : Day-Month-Year   58_ setup screen   Download from Www.Somanuals.com. All Manuals Search And Download.   y Show time : Set to display the time information on the bottom screen.   - Output Format : Select a display format of the time information.   24hr : Displays the time in the 24-hour format.   12hr : Displays the time in the 12-hour format.   y y Text color : Select black or white for the text color.   Background color : Select black or white for the background color.   EVENT SETUP   To set the event transfer function   You can set the FTP/email server (SMTP)   to transfer the alarm images present in the   camera, in case an alarm event occurs.   Select <Event> - <Transfer setup>.   The Image transfer setup window appears.    For more information on commercial   SMTP services, contact the SMTP service   provider.   M To test the FTP transfer   Click [Test].   This will test if the image is transferred to the   specified FTP server properly.   When the test on the FTP server connection   and transfer is done, a message of   <( Verified )> will be displayed.   You will see an error message if the test   fails. If this is the case, check the FTP server   status or the settings again.   y FTP transfer : With this, you can transfer alarm images to the FTP server. If the initial FTP   server setting and the connection status are not verified, the <( Not verified )> message   appears.   English _59   Download from Www.Somanuals.com. All Manuals Search And Download.   setup screen   - - - Use passive mode : Select this option when the passive mode connection is   inevitable due to the firewall or FTP server setting.   FTP server address : Enter the IP address of a FTP server to which an alarm image   will be transferred.   Upload path : You can specify the path of the FTP directory to which you will   transfer an alarm image.   You can specify the path by just typing </directory name> or <directory name> in   this field.   If nothing is specified, the path will be defaulted to the root directory of the FTP   server.   - Port : The FTP port is defaulted to 21. This value can be changed according to the   FTP server setting.   - - User ID : Provide the user account ID to access the FTP server.   Password : Provide the user account password to access the FTP server.   y E-mail(SMTP) transfer : With this setting, you can transfer alarm images to the email   server. This function is available only for the SMTP email server. When the initial SMTP   server setting and connection are not verified, the <Not verified> message appears.   - SMTP server address : Enter the SMTP server address to use when you send an   email.   ex) 10.240.56.228   - - - - Port : Enter a port number to use when you send an email. The default is 25.   User ID : Provide the user account ID to access the SMTP server.   Password : Provide the user account password to access the SMTP server.   E-mail sender : Enter the address of the email sender. If the sender address is   incorrect, the email from the sender may be classified as SPAM by the SMTP   server and may not be sent.   - - - E-mail receiver : Enter the address of the email receiver.   Title : Enter the subject of the email to send.   Message : Enter the content of the email to send.   To test the email transfer   Click [Test].   This will test if the image is transferred to the   specified SMTP server properly. When the   test on the SMTP server connection and   transfer is done, a message of <( Verified )>   will be displayed.   You will see an error message if the test   fails.   If this is the case, check the SMTP server   status or the settings again.   60_ setup screen   Download from Www.Somanuals.com. All Manuals Search And Download.   To setup the record   1. Click <Event> - <Record setup>.   The Record setup window appears.   2. To complete the setting, click the   [Apply] button.   The settings are saved.   y SD card : Enables you to verify data   saved on the SD memory card and   format the memory card itself. It   is possible to set to automatically delete movie clips recorded before a certain   period of time (e.g. 1 week, 1 month, or 1 year).   y Options : Determine whether or not you wish to receive Email notification of   insufficient capacity warnings.   To set an alarm image   You can configure to send message via FTP/E-mail (SMTP) or to save recording into the   SD memory card.   Select a transfer method when an event occurs or the schedule transfer function is activated.   1. Select <Event> - <Alarm image>.   The Alarm Image setup window   appears.   y Transfer mode : You can select   alarm message notification method   among FTP/E-mail transfer and SD   Card recording.   - FTP transfer : The image is sent to   the specified FTP address.   - - E-mail transfer : The image is sent to the specified email address.   SD Card Record : Saves images into the SD memory card.   M    If an SD memory card is not inserted, the corresponding button will be disabled.   In this case, insert the SD memory card into the slot and refresh to enable the button.   J    If the SD memory card is ejected while the button is checked, the camera automatically   restarts.   y y Transferred image naming setup : You can set the file name of an alarm image   to be sent when an alarm is triggered or during the scheduled transfer.   Pre/post alarm image : You can set to save the pre or post alarm image.   - - Number of image : The frame rate per second can be one among 1, 2, 3, and 5.   Pre-alarm duration : The pre alarm duration can be one among 5 seconds, 10   seconds, 15 seconds, and 30 seconds. You can send a pre-alarm image of up   to 30 seconds before the alarm is triggered.   (The max time differs, depending on the frame rate)   English _61   Download from Www.Somanuals.com. All Manuals Search And Download.   setup screen   - Post-alarm duration : The post alarm duration can be one among 5 seconds, 10   seconds, 15 seconds, and 30 seconds. You can send a post-alarm image of up   to 30 seconds after the alarm is triggered.   (The max time differs, depending on the frame rate)    The pre/post alarm duration is not available in SMTP transfer mode.   Only one image at the corresponding time will be transferred.   M 2. When done, click [Apply].   Your settings will be saved.   To set the alarm input   1. Select <Event> - <Alarm input 1> or   <Alarm input 2>.   The Alarm Input setup window appears.   2. When done, click [Apply].   Your settings will be saved.   y Input device setup : Select an input   type according to the characteristics   of the alarm sensor on the rear of the   camera.   - - Off : Turns off the alarm input setting.   NO (Normal Open) : It is normally open, but if it is closed, an alarm will be   triggered.   - NC (Normal Close) : It is normally closed, but if it is open, an alarm will be   triggered.   y y Activation time : You can set a time to execute a specific command when an   alarm occurs.   - - Always : Always executes the specified command when an alarm occurs.   Only scheduled time : Activates notification as configured only when alarm   events occurred during the specified time period.   Action : You can set an action to execute when an alarm occurs.   - - Alarm output : Set the alarm output port to which the alarm signal is transferred.   Output duration : Set the period of time to output the alarm signal to the   specified alarm output port when an alarm occurs.   If a new alarm event is detected during the alarm output, the delay time is   recalculated based on the detection time of the recent alarm.   - Alarm image transfer : If you select <On>, you can transfer JPEG images to a   registered address via FTP or SMTP server or save images into the SD memory card   according to the setting in <Event> - <Transfer setup>.   62_ setup screen   Download from Www.Somanuals.com. All Manuals Search And Download.   To Set Intelligent Video Analysis   1. Click <Event> - <Intelligent video   analysis>.   The Intelligent Video Analysis screen   appears.   2. When done, click [Apply].   Your settings will be saved.   y IV analysis function : Activated if   <Enable> is selected, deactivated if   <Disable> is selected.    If camera is capturing a close   object, the video analysis capability   may degrade.   J M  In the following cases, the video   analysis function may not produce   proper result on configured event   and motion detections.   - The subject color or brightness is   similar to the background   - Multiple random movement continues due to scene change or other reasons.   - When object that is fixed continues to move in the same position.   - An object hides other objects behind.   - 2 or more objects overlaps or 1 object splits into multiple objects.   - Too fast object (for detection, one object should be found overlapping between   contiguous frames).   - Reflection / blur / shadow due to direct sunlight, illumination, or headlamp   - In severe snow, rain, wind or in dawn / dusk   - Moving object approaches to the camera too close   y Overlay : If <Enable> is selected, configured event rules and motion frame   are displayed on the Live screen. Selecting <Disable> will not display overlay   information.    Motion frame is displayed in two types on the Live screen.   Green frame – indicates the moving object   Red frame – Temporarily displays the moving object detected by the configured event   rules.   M y Sensitivity : Sets the sensitivity of the intelligent video analysis.   - Sensitivity : Select the sensitivity among <Very high>, <High>, <Normal>,   <Low>, and <Very low>.   When selected with <Very high>, the intelligent video analysis functions on the   smallest motion detection.   English _63   Download from Www.Somanuals.com. All Manuals Search And Download.   setup screen   y Set rules   You can set the event rules.   - Virtual line based rules : You can configure event rules for up to 3 virtual lines.   <Event Types>   Pass : Event is generated if a moving object crosses the virtual line in the specified   direction (ꢂ, ꢃ, ꢃꢂ)   - Defined area based rules : You can configure event rules for up to 3 user-   defined areas.   <Event Types>   c Entering : Event is generated if a moving object enters the defined area from   outside to inside.   d Exiting : Event is generated if a moving object exits the defined area from   inside to outside.   e Appearing : An object that has not been existed in the area until the previous   frame suddenly appears inside the configured area, not passing the border   f Disappearing : An object that has been existed in the area until the previous   frame suddenly disappears, not passing the border.   - Entire area based rules : You can configure event rules for the entire video area.   <Event Types>   c Appearing: An object that has not been existed until the previous frame   appears in the area.   d Disappearing: An object that has been existed until the previous frame   disappears from the area.   e Scene Change: This event is generated by a complete scene change, such as   camera veiled by hand or changed camera’s aiming, etc.   - Object size: The maximum object size of motion detection for each event   generation. The minimum size can be adjusted in 5 levels.   Minimum size (the minimum rectangular motion detection area): Step 1: 6x6 (pixel),   Step 5: 50x50 (pixel)   Maximum size (the maximum rectangular motion detection area): Step 1: 60x60   (pixel), Step 5: 320x240 (pixel)   The initial setup for the minimum is 6x6 and for the maximum is 320x240.   64_ setup screen   Download from Www.Somanuals.com. All Manuals Search And Download.   y y Activation time : Sets the operation time of the intelligent video analysis.   - Always : Configured action is performed whenever an intelligent video analysis   event occurs.   - Only scheduled time : Configured action is performed when intelligent video   analysis event occurs during the specified time period.   Action : You can configure the action for an intelligent video analysis event.   - Alarm output : Sets the alarm output port for the signaling the intelligent video   analysis event.   - Output duration : Sets the alarm signal dwell time to the Alarm Output port on   an intelligent video analysis event.   When another intelligent video analysis event follows the previous one, the   output duration time is reset based on the most recent event.   - Alarm image transfer : If selected <Enable>, depending on your setting of   <Event> - <Transfer setup>, the image in JPEG format will be sent to the   registered address via FTP or e-mail (SMTP), or saved in the SD memory card.   To set the scheduled transfer   You can set to transfer the JPEG image to the FTP/SMTP server saved in the SD memory   card at a specific interval.   1. Select <Event> - <Schedule>.   The Schedule Transfer setup window   appears.   y Schedule transfer function :   If selecting <Enable>, the schedule   transfer function will be activated;   if selecting <Disable>, it will be   deactivated.   y y Transfer interval : You can set the   time interval to transfer images.   You can set the unit of the interval to <seconds> or <minutes>; you can also set to   transfer one image per 5/15/30/45/60 seconds, or one per 5/15/30/45/60 minutes.   Activation time : You can set a time to execute a specific command when a sched-   ule transfer event occurs.   - - Always : Always sends an image at the set interval.   Only scheduled time : Periodically transfers image only during the specified time   period.   2. When done, click [Apply].   Your settings will be saved.   English _65   Download from Www.Somanuals.com. All Manuals Search And Download.   setup screen   NETWORK SETUP   To set the video transfer mode   You can control the transfer rate according to the video transfer mode and network speed.   1. Select <Network> - <Streaming type>.   The Video Transfer setup window appears.   2. When done, click [Apply].   Your settings will be saved.   y VNP streaming : You can set the   Samsung Protocol (VNP) for the   streaming service.   - Protocol : Select a video transfer protocol from TCP*, UDP (Unicast)*, and UDP   (Multicast)*.     Speaking to the camera unit through microphone is not supported.   Multicast backbone (MBone) is not supported; you can access the camera only in the   multicast local network environment.   y RTP streaming : You can set the RTP Protocol or the streaming service.   Protocol : Select a video transfer protocol from UDP (Unicast) and UDP (Multicast).   - To set the DDNS   DDNS is an abbreviation of Dynamic Domain Name Service that converts the IP address   of a camera into a general Host Name so that the user can easily remember it and enables   connecting a camera with a fixed Host Name even if the IP address of the camera may be   dynamically changed.   1. Select <Network> - <DDNS>.   The DDNS setup window appears.   2. When done, click [Apply].   Your settings will be saved.    For checking the DDNS address, refer to "To check the DDNS address". (page 43)   M 66_ setup screen   Download from Www.Somanuals.com. All Manuals Search And Download.   appendix   PROFILE   CAMERA SETUP MENU   STANDARD   ITS   BACKLIGHT   DAY/NIGHT   GAMING   Parent Menu   Sub-menus   ALC   - ALC   - ALC   - ALC   - ALC   - ALC   IRIS   LENS   DC   0 DC   0 DC   0 DC   0 DC   0 LEVEL   BACKLIGHT   OFF   OFF   WDR   OFF   OFF   (F.FAST)   ---   (F.FAST)   ---   (F.FAST)   ---   MOTION   NORM   SLOW   DNR   SHUTTER   SENSE UP   XDR   MID   MID   MID   MID   MID   OFF   AUTO 1/250   OFF   OFF   OFF   AUTO X4   AUTO X2   AUTO X4   AUTO X4   AUTO X4   MID   MID   MID   MID   MID   AUTO   AUTO   DAY   AUTO   DAY   DAY/NIGHT NIGHT   DAY   - - - - - BURST   OFF   ON   OFF   OFF   OFF   DAY   DAY/NIGHT   DAY   DAY/NIGHT   DAY   - - - - - MODE   RED   ATW2   ATW1   ATW1   ATW1   ATW1   0 0 0 0 0 BLUE   0 0 0 0 0 WHITE BAL   NIGHT   - - MID   ATW2   0 - - MID   ATW2   0 - BRIGHTNESS   MODE   Custom Setting   OFF   Custom Setting   OFF   Custom Setting   OFF   RED   Custom Setting   Custom Setting   2 Custom Setting   Custom Setting   2 Custom Setting   Custom Setting   2 BLUE   0 0 DETAIL   2 2 English _67   Download from Www.Somanuals.com. All Manuals Search And Download.   appendix   TERMINOLOGY   y GOP : You can set between 5 and 15 for the MPEG4 and H.264 CODEC.   The default is 15, and if set to 15, one I-Frame will be output per 15 frames as one I-Frame   and 14 P-Frames constitute the GOP.   The lower the GOP size is, the better the quality is; however, the bit rate as well as the data   size will increase, causing a lower of the fps. GOP(Group of Pictures) is a set of video frames   for MPEG4 and H.264 format compression, indicating a collection of frames from the initial   I-Frame (key frame) to the next I-Frame. GOP consists of 2 kinds of frames: I-Frame and   P-Frame. I-Frame is the basic frame for the compression, also known as Key Frame, which   contains one complete image data. P-Frame contains only the data that has changed from   the preceding I-Frame.   y y Entropy coding : Data transfer technology used to reduce the compression loss from encoding.   - CAVLC (Context-adaptive variable-length coding): Records a higher compression loss   rate than CABAC.   - CABAC (Context-adaptive binary arithmetic coding): Shows a lesser compression loss than   CAVLC.   Bitrate Control   - CBR(Constant Bitrate)   This will transfer video data in an equal size at all times, regardless of the video   complexity. The video quality may be deteriorated, depending on the video complexity.   - VBR(Variable Bitrate)   The amount of video data to transfer may differ, depending on the video complexity. This   enables receiving video data in an equal quality at all times.   y y TTL : TTL stands for “Time To Live”, which you can specify to prevent loss of data packet that   passes through multiple-staged routers. Each router decreases the TTL value by one each   time a packet passes it through; If the TTL value reaches 0, the packet cannot further pass   through a router.   TCP : It is a general purpose protocol used for transmission that requires reliability. With   constant communication between the sender and recipient, it provides high reliability against   transmission data loss; however, it has imitation to transmit a large amount of data in real time   at a high speed.   It enables reliable data transmission over xDSL and cable network at a relatively slow speed.   y y UDP (Unicast): It refers to a system that transmits data between only one transmitter and one   receiver (1:1).   UDP (Multicast): It refers to the data transfer protocol in one-to-many (1:N) between the trans-   mitting and receiving terminals; although it alleviates the network load, it requires <Multicast>   router.   For more information such as whether the network over which the camera is installed sup-   ports <Multicast>, contact the network administrator.   y UDP : It is a protocol appropriate to transmit a large amount of data such as multimedia data at a   high speed. However, with its nonconnection structure, it records a higher transmission efficiency   than TCP especially in a high LAN environment faster than 100Mbps.   68_ appendix   Download from Www.Somanuals.com. All Manuals Search And Download.   y Filtering range   The filtering range is calculated based on IP address and subnet mask provided by user as   follows:   The subnet value defines the number of masked bits, which will mask the IP address that   is converted into 32-bit binary; rest of masked out bits are ignored to produce the range   as shown below.   Ex) IP address : 128.128.128.128   c If the Subnet is set to 8, converted IP is 1000 0000.1000 0000.1000 0000.1000 0000   and the subnet directs to find matches from the first bit to the 8th bit, produces the   filtering range of 1000 0000.???? ????.???? ????.???? ????, which will be converted   back to IP address range of 128.0.0.0 ~ 128.255.255.255.   d If the Subnet is set to 10, converted IP is 1000 0000.1000 0000.1000 0000.1000   0000 and the subnet directs to find matches from the first bit to the 10th bit, produces   the filtering range of 1000 0000.0000.10?? ????.???? ????.???? ????, which will be   converted back to IP address range of 128.0.0.0 ~ 128.191.255.255.   e If the Subnet is set to 20, converted IP is 1000 0000.1000 0000.1000 0000.1000 0000   and the subnet directs to find matches from the first bit to the 20th bit, produces the   filtering range of 1000 00001000 0000.1000 ????.???? ????, which will be converted   back to IP address range of 128.128.128.0 ~ 128.128.143.255.   f If the Subnet is set to 30, converted IP is 1000 0000.1000 0000.1000 0000.1000 0000   and the subnet directs to find matches from the first bit to the 30th bit, produces the   filtering range of 1000 0000.1000 0000.1000 0000.1000 00??, which will be converted   back to IP address range of 128.128.128.128 ~ 128.128.128.131.   g If the Subnet is set to 32, converted IP is 1000 0000.1000 0000.1000 0000.1000 0000   and the subnet directs to find matches from the first bit to the 32th bit, produces the   filtering range of 1000 0000.1000 0000.1000 0000.1000 0000, which will be converted   back to IP address of 128.128.128.128.   English _69   Download from Www.Somanuals.com. All Manuals Search And Download.   appendix   SPECIFICATIONS   Description   Item   NTSC   PAL   Camera   Color/BW   Type   Color   Device   1/3" Super-HAD PS CCD   811 x 508   Image   Pixels   Total   795 x 596   752 x 582   Effective   768 x 494   System   Progressive   Scanning   Horizontal Frequency   Vertical Frequency   15.734 Hz   15.625 Hz   50 Hz   59.94 Hz   Sens off : 0.12 Lux(15 IRE), 0.2 Lux(30 IRE),   0.4Lux(50 IRE)@F1.2   Sens up x512 : 0.00023 Lux(15 IRE), 0.0005 Lux(30 IRE),   0.0008Lux(50 IRE)@F1.2   Color   B/W   Min. Scene   Illumination   Sens off : 0.012 Lux(15 IRE), 0.02 Lux(30 IRE),   0.04Lux(50 IRE)@F1.2   Sens up x512 : 0.000023 Lux(15 IRE), 0.00005 Lux(30 IRE),   0.00008Lux(50 IRE)@F1.2   Number of Privacy Zone   Day/Night   12 ea   Day/Night/AUTO(Hard Method)   Off/On (x128)   WDR   Extended Dynamic Range   D-Zoom   Off/On (Level Setting)   x1 ~ x16 (x0.1 STEP)   Off/On (Advanced)   PIP   High Speed Shutter   Flickerless   1/60 ~ 1/10Ksec   Off/On   1/50 ~ 1/10Ksec   Functions   Sens Up   x2 ~ x512   BLC   Off/On (Area Setting)   Off/On (Max.Level Setting)   Off/On ( ~ 1/200Ksec)   Off/On (Max.54ea/2Line)   AGC   ELC   Camera ID   White Balance   Digital Noise Reduction   Digital Image Stablization   Etc. Function   ATW1/ATW2/AWC/3200K/5600K   Off/On (Adaptive 3D+2D)   Off/On   Detail, Reverse(H/V), Posi/Nega   70_ appendix   Download from Www.Somanuals.com. All Manuals Search And Download.   Description   Item   NTSC   600 TV Lines   PAL   Horizontal   Vertical   Resolution   350 TV Lines   VBS 1.0Vp-p   about 52 dB   MANUAL/AI(VIDEO/DC)   CS/C   Video Output Video Output   S/N Ratio   S/N Ratio   Lens Drive Type   Mount Type   OS   Lens   Embedded Linux   32M byte   Flash memory   RAM   256M byte   Network   Board   Hardware   DSP   TI Davinci   Ethernet   PoE   RJ-45 (10/100BASE-T)   Yes (IEEE802.3af)   2 ea   Input   Alarm   Video   Output   2 ea   H.264 / MPEG4 / MJPEG Multiple Codec   (H.264 / MPEG4 selectable)   Simultaneous Dual Streaming   Compression   4CIF   VGA   CIF   704x480   704x576   Resolution   640x480   352x240   352x288   Frame Rate   Quality   30, 15, 8, 3, 1 fps   1 ~ 10 level   25, 13, 6, 3, 1 fps   Audio   OSD   Compression   Full Duplex, 64kbps, 8KHz sampling   OSD menu on Video   Camera Control and Adjustment (Menu enter/exit, move by Web UI)   * Some key adjustment menus will be supported by CGI API.   Intelligent   Video   Analysis   Detection   Sensitivity   Very High, High, Normal, Low, Very Low   English _71   Download from Www.Somanuals.com. All Manuals Search And Download.   appendix   Description   Item   NTSC   PAL   IP   IPv4 / IPv6   TCP/IP, UDP/IP, RTP(UDP), RTP(TCP), RTSP, NTP, HTTP,   HTTPS, SSL, DHCP   PPPoE, FTP, SMTP, ICMP, IGMP, SNMPv1/v2c/v3(MIB-2),   ARP, DNS, DDNS, VSIP   IPv4   IPv6   Network   Protocol   Protocol   Streaming   Security   DDNS   TCP/IP, HTTP, HTTPS, SSL, DHCP   Unicast (TCP, UDP), Multicast (UDP)   HTTPS Login Authentication   Digest Login Authentication   Supporting Samsung DDNS and Public DDNS services   Max 10 Users at Unicast (TCP, UDP) Mode   Max 20 Users at Multicast (UDP) Mode   Maximum User Access   Live Monitoring, Alarm I/O control, OSD menu control,   SETUP   Administrator   Connection   User Access   Level   Operator   User   Live Monitoring, Alarm I/O control   Live Monitoring   JPEG Image transfer : FTP, SMTP, SD Card   Notification : notify to viewer or by E-mail (one image   attachment)   Alarm Input   Event   Intelligent Video Analysis   Management Detection   Alarm Out   Schedule   JPEG Image transfer : FTP, SMTP, SD Card   Windows XP, VISTA   Supported OS   Web Browser   Viewer   (Default)   Supported Browser   UI Language   Internet Explorer 6.0 or Higher   E/F/G/S/I/C/K   S/W upgrade   Support   Video Player RTP/RTSP streaming   Quicktime, VLC player   Video   Samsung NET-i   3rd Party S/W appliction   Management Video Management System   Software   Application   IP Installation   IP Installer Application for All Samsung IP Devices   72_ appendix   Download from Www.Somanuals.com. All Manuals Search And Download.   Description   Item   NTSC   PAL   Provides functionality to control cameras   and set/retrieve internal parameter values.   Get JPEG image or MJPEG stream   Alarm In/Out control   HTTP API   CGI Command   SDK   SDK   RTP/RTSP API   ActiveX   RTP Header, RTSP Command Document   ActiveX API for viewing data streams from IP camera.   AC24V 10%(60Hz 0.3Hz)/ DC12V+10%/-5% /   PoE (Power over Ethernet)   Power   Power Consumption   Operating Temp.   Operating Humidity   Dimension   About 8W   -10˚C~50˚C   ~90%   W72 X D139 X H60   About 300g   Weight   English _73   Download from Www.Somanuals.com. All Manuals Search And Download.   appendix   FRAME RATE (NTSC)    Test Condition: MJPEG - Resolution(CIF), Quality(1), Frame rate(1)   M H.264 - Bitrate control(CBR), Compression(40), Encode Priority(Frame rate),   GOP size(15), Deblock(ON), Profile(Baseline), Entropy coding(CAVLC), Motion   estimation(HPel)   MPEG4 - Bitrate control(CBR), Compression(40), Encode Priority(Frame rate),   GOP size(15)   ❖ MPEG4 (4CIF)   Frame Rate   Quality   30 FPS   15 FPS   8 FPS   3 FPS   1 FPS   4239 Kbps   23 FPS   2765 Kbps   15 FPS   1290 Kbps   7 FPS   737 Kbps   4 FPS   221 Kbps   1 FPS   LEVEL10   LEVEL9   LEVEL8   LEVEL7   LEVEL6   LEVEL5   LEVEL4   LEVEL3   LEVEL2   LEVEL1   3686 Kbps   24 FPS   2304 Kbps   15 FPS   1075 Kbps   7 FPS   614 Kbps   4 FPS   184 Kbps   1 FPS   3072 Kbps   25 FPS   1843 Kbps   15 FPS   860 Kbps   7 FPS   492 Kbps   4 FPS   147 Kbps   1 FPS   2396 Kbps   26 FPS   1382 Kbps   15 FPS   645 Kbps   7 FPS   369 Kbps   4 FPS   111 Kbps   1 FPS   1659 Kbps   27 FPS   922 Kbps   15 FPS   430 Kbps   7 FPS   246 Kbps   4 FPS   74 Kbps   1 FPS   1336 Kbps   29 FPS   691 Kbps   15 FPS   323 Kbps   7 FPS   184 Kbps   4 FPS   55 Kbps   1 FPS   1133 Kbps   30 FPS   576 Kbps   15 FPS   269 Kbps   7 FPS   154 Kbps   4 FPS   46 Kbps   1 FPS   922 Kbps   30 FPS   461 Kbps   15 FPS   215 Kbps   7 FPS   123 Kbps   4 FPS   37 Kbps   1 FPS   691 Kbps   30 FPS   346 Kbps   15 FPS   161 Kbps   7 FPS   92 Kbps   4 FPS   28 Kbps   1 FPS   461 Kbps   30 FPS   230 Kbps   15 FPS   108 Kbps   7 FPS   61 Kbps   4 FPS   18 Kbps   1 FPS   74_ appendix   Download from Www.Somanuals.com. All Manuals Search And Download.   ❖ H.264 (4CIF)   Frame Rate   Quality   30 FPS   15 FPS   8 FPS   3 FPS   1 FPS   2298 Kbps   19 FPS   1229 Kbps   10 FPS   737 Kbps   6 FPS   369 Kbps   3 FPS   147 Kbps   1 FPS   LEVEL10   LEVEL9   LEVEL8   LEVEL7   LEVEL6   LEVEL5   LEVEL4   LEVEL3   LEVEL2   LEVEL1   1751 Kbps   19 FPS   1198 Kbps   13 FPS   645 Kbps   7 FPS   369 Kbps   4 FPS   111 Kbps   1 FPS   1536 Kbps   20 FPS   1075 Kbps   14 FPS   538 Kbps   7 FPS   307 Kbps   4 FPS   92 Kbps   1 FPS   1352 Kbps   22 FPS   897 Kbps   15 FPS   430 Kbps   7 FPS   246 Kbps   4 FPS   74 Kbps   1 FPS   1129 Kbps   25 FPS   691 Kbps   15 FPS   369 Kbps   8 FPS   184 Kbps   4 FPS   55 Kbps   1 FPS   960 Kbps   25 FPS   576 Kbps   15 FPS   307 Kbps   8 FPS   154 Kbps   4 FPS   46 Kbps   1 FPS   799 Kbps   26 FPS   461 Kbps   15 FPS   246 Kbps   8 FPS   123 Kbps   4 FPS   37 Kbps   1 FPS   622 Kbps   27 FPS   346 Kbps   15 FPS   184 Kbps   8 FPS   92 Kbps   4 FPS   28 Kbps   1 FPS   445 Kbps   29 FPS   230 Kbps   15 FPS   123 Kbps   8 FPS   61 Kbps   4 FPS   18 Kbps   1 FPS   223 Kbps   29 FPS   115 Kbps   15 FPS   61 Kbps   8 FPS   31 Kbps   4 FPS   9 Kbps   1 FPS   English _75   Download from Www.Somanuals.com. All Manuals Search And Download.   appendix   ❖ MPEG4 (VGA)   Frame Rate   30 FPS   15 FPS   8 FPS   3 FPS   1 FPS   Quality   4055 Kbps   22 FPS   2580 Kbps   14 FPS   1290 Kbps   7 FPS   737 Kbps   4 FPS   221 Kbps   1 FPS   LEVEL10   LEVEL9   LEVEL8   LEVEL7   LEVEL6   LEVEL5   LEVEL4   LEVEL3   LEVEL2   LEVEL1   3533 Kbps   23 FPS   2304 Kbps   15 FPS   1075 Kbps   7 FPS   614 Kbps   4 FPS   184 Kbps   1 FPS   2949 Kbps   24 FPS   1843 Kbps   15 FPS   860 Kbps   7 FPS   492 Kbps   4 FPS   147 Kbps   1 FPS   2304 Kbps   25 FPS   1382 Kbps   15 FPS   645 Kbps   7 FPS   369 Kbps   4 FPS   111 Kbps   1 FPS   1536 Kbps   25 FPS   922 Kbps   15 FPS   430 Kbps   7 FPS   246 Kbps   4 FPS   74 Kbps   1 FPS   1152 Kbps   25 FPS   691 Kbps   15 FPS   323 Kbps   7 FPS   184 Kbps   4 FPS   55 Kbps   1 FPS   998 Kbps   26 FPS   576 Kbps   15 FPS   269 Kbps   7 FPS   154 Kbps   4 FPS   46 Kbps   1 FPS   799 Kbps   26 FPS   461 Kbps   15 FPS   246 Kbps   8 FPS   123 Kbps   4 FPS   37 Kbps   1 FPS   622 Kbps   27 FPS   346 Kbps   15 FPS   184 Kbps   8 FPS   92 Kbps   4 FPS   28 Kbps   1 FPS   415 Kbps   27 FPS   230 Kbps   15 FPS   123 Kbps   8 FPS   61 Kbps   4 FPS   18 Kbps   1 FPS   76_ appendix   Download from Www.Somanuals.com. All Manuals Search And Download.   ❖ H.264 (VGA)   Frame Rate   Quality   30 FPS   15 FPS   8 FPS   3 FPS   1 FPS   2089 Kbps   17 FPS   1229 Kbps   10 FPS   737 Kbps   6 FPS   369 Kbps   3 FPS   147 Kbps   1 FPS   LEVEL10   LEVEL9   LEVEL8   LEVEL7   LEVEL6   LEVEL5   LEVEL4   LEVEL3   LEVEL2   LEVEL1   1659 Kbps   18 FPS   1014 Kbps   11 FPS   553 Kbps   6 FPS   276 Kbps   3 FPS   111 Kbps   1 FPS   1459 Kbps   19 FPS   845 Kbps   11 FPS   538 Kbps   7 FPS   307 Kbps   4 FPS   92 Kbps   1 FPS   1229 Kbps   20 FPS   737 Kbps   12 FPS   430 Kbps   7 FPS   246 Kbps   4 FPS   74 Kbps   1 FPS   1014 Kbps   22 FPS   691 Kbps   15 FPS   323 Kbps   7 FPS   184 Kbps   4 FPS   55 Kbps   1 FPS   883 Kbps   23 FPS   576 Kbps   15 FPS   269 Kbps   7 FPS   154 Kbps   4 FPS   46 Kbps   1 FPS   707 Kbps   23 FPS   461 Kbps   15 FPS   215 Kbps   7 FPS   123 Kbps   4 FPS   37 Kbps   1 FPS   553 Kbps   24 FPS   346 Kbps   15 FPS   161 Kbps   7 FPS   92 Kbps   4 FPS   28 Kbps   1 FPS   384 Kbps   25 FPS   230 Kbps   15 FPS   108 Kbps   7 FPS   61 Kbps   4 FPS   18 Kbps   1 FPS   200 Kbps   26 FPS   115 Kbps   15 FPS   54 Kbps   7 FPS   31 Kbps   4 FPS   9 Kbps   1 FPS   English _77   Download from Www.Somanuals.com. All Manuals Search And Download.   appendix   ❖ MPEG4 (CIF)   Frame Rate   30 FPS   15 FPS   8 FPS   3 FPS   1 FPS   Quality   1382 Kbps   30 FPS   691 Kbps   15 FPS   369 Kbps   8 FPS   184 Kbps   4 FPS   55 Kbps   1 FPS   LEVEL10   LEVEL9   LEVEL8   LEVEL7   LEVEL6   LEVEL5   LEVEL4   LEVEL3   LEVEL2   LEVEL1   1152 Kbps   30 FPS   576 Kbps   15 FPS   307 Kbps   8 FPS   154 Kbps   4 FPS   46 Kbps   1 FPS   922 Kbps   30 FPS   461 Kbps   15 FPS   246 Kbps   8 FPS   123 Kbps   4 FPS   37 Kbps   1 FPS   691 Kbps   30 FPS   346 Kbps   15 FPS   184 Kbps   8 FPS   92 Kbps   4 FPS   28 Kbps   1 FPS   461 Kbps   30 FPS   230 Kbps   15 FPS   123 Kbps   8 FPS   61 Kbps   4 FPS   18 Kbps   1 FPS   346 Kbps   30 FPS   173 Kbps   15 FPS   92 Kbps   8 FPS   46 Kbps   4 FPS   14 Kbps   1 FPS   288 Kbps   30 FPS   144 Kbps   15 FPS   77 Kbps   8 FPS   38 Kbps   4 FPS   12 Kbps   1 FPS   230 Kbps   30 FPS   115 Kbps   15 FPS   61 Kbps   8 FPS   31 Kbps   4 FPS   9 Kbps   1 FPS   173 Kbps   30 FPS   86 Kbps   15 FPS   46 Kbps   8 FPS   23 Kbps   4 FPS   7 Kbps   1 FPS   151 Kbps   30 FPS   76 Kbps   15 FPS   40 Kbps   8 FPS   20 Kbps   4 FPS   6 Kbps   1 FPS   78_ appendix   Download from Www.Somanuals.com. All Manuals Search And Download.   ❖ H.264 (CIF)   Frame Rate   Quality   30 FPS   15 FPS   8 FPS   3 FPS   1 FPS   922 Kbps   30 FPS   461 Kbps   15 FPS   215 Kbps   7 FPS   123 Kbps   4 FPS   37 Kbps   1 FPS   LEVEL10   LEVEL9   LEVEL8   LEVEL7   LEVEL6   LEVEL5   LEVEL4   LEVEL3   LEVEL2   LEVEL1   691 Kbps   30 FPS   346 Kbps   15 FPS   184 Kbps   8 FPS   92 Kbps   4 FPS   28 Kbps   1 FPS   576 Kbps   30 FPS   288 Kbps   15 FPS   134 Kbps   7 FPS   77 Kbps   4 FPS   23 Kbps   1 FPS   461 Kbps   30 FPS   230 Kbps   15 FPS   108 Kbps   7 FPS   61 Kbps   4 FPS   18 Kbps   1 FPS   346 Kbps   30 FPS   173 Kbps   15 FPS   81 Kbps   7 FPS   46 Kbps   4 FPS   14 Kbps   1 FPS   288 Kbps   30 FPS   144 Kbps   15 FPS   67 Kbps   7 FPS   38 Kbps   4 FPS   12 Kbps   1 FPS   230 Kbps   30 FPS   115 Kbps   15 FPS   54 Kbps   7 FPS   31 Kbps   4 FPS   9 Kbps   1 FPS   173 Kbps   30 FPS   86 Kbps   15 FPS   40 Kbps   7 FPS   23 Kbps   4 FPS   7 Kbps   1 FPS   115 Kbps   30 FPS   58 Kbps   15 FPS   27 Kbps   7 FPS   15 Kbps   4 FPS   5 Kbps   1 FPS   58 Kbps   30 FPS   29 Kbps   15 FPS   13 Kbps   7 FPS   8 Kbps   4 FPS   2 Kbps   1 FPS   English _79   Download from Www.Somanuals.com. All Manuals Search And Download.   appendix   FRAME RATE (PAL)    Test Condition: MJPEG - Resolution(CIF), Quality(1), Frame rate(1)   M H.264 - Bitrate control(CBR), Compression(40), Encode Priority(Frame rate),   GOP size(15), Deblock(ON), Profile(Baseline), Entropy coding(CAVLC), Motion   estimation(HPel)   MPEG4 - Bitrate control(CBR), Compression(40), Encode Priority(Frame rate),   GOP size(15)   ❖ MPEG4 (4CIF)   Frame Rate   Quality   25 FPS   13 FPS   6 FPS   3 FPS   1 FPS   4645 Kbps   21 FPS   2654 Kbps   12 FPS   1327 Kbps   6 FPS   664 Kbps   3 FPS   221 Kbps   1 FPS   LEVEL10   LEVEL9   LEVEL8   LEVEL7   LEVEL6   LEVEL5   LEVEL4   LEVEL3   LEVEL2   LEVEL1   4055 Kbps   22 FPS   2212 Kbps   12 FPS   1106 Kbps   6 FPS   553 Kbps   3 FPS   184 Kbps   1 FPS   3391 Kbps   23 FPS   1769 Kbps   12 FPS   885 Kbps   6 FPS   442 Kbps   3 FPS   147 Kbps   1 FPS   2544 Kbps   23 FPS   1327 Kbps   12 FPS   664 Kbps   6 FPS   332 Kbps   3 FPS   111 Kbps   1 FPS   1769 Kbps   24 FPS   885 Kbps   12 FPS   442 Kbps   6 FPS   221 Kbps   3 FPS   74 Kbps   1 FPS   1382 Kbps   25 FPS   664 Kbps   12 FPS   332 Kbps   6 FPS   166 Kbps   3 FPS   55 Kbps   1 FPS   1152 Kbps   25 FPS   553 Kbps   12 FPS   276 Kbps   6 FPS   138 Kbps   3 FPS   46 Kbps   1 FPS   922 Kbps   25 FPS   442 Kbps   12 FPS   221 Kbps   6 FPS   111 Kbps   3 FPS   37 Kbps   1 FPS   691 Kbps   25 FPS   332 Kbps   12 FPS   166 Kbps   6 FPS   83 Kbps   3 FPS   28 Kbps   1 FPS   461 Kbps   25 FPS   221 Kbps   12 FPS   111 Kbps   6 FPS   55 Kbps   3 FPS   18 Kbps   1 FPS   80_ appendix   Download from Www.Somanuals.com. All Manuals Search And Download.   ❖ H.264 (4CIF)   Frame Rate   Quality   25 FPS   13 FPS   6 FPS   3 FPS   1 FPS   2359 Kbps   16 FPS   1180 Kbps   8 FPS   737 Kbps   5 FPS   442 Kbps   3 FPS   147 Kbps   1 FPS   LEVEL10   LEVEL9   LEVEL8   LEVEL7   LEVEL6   LEVEL5   LEVEL4   LEVEL3   LEVEL2   LEVEL1   1991 Kbps   18 FPS   1106 Kbps   10 FPS   664 Kbps   6 FPS   332 Kbps   3 FPS   111 Kbps   1 FPS   1751 Kbps   19 FPS   1014 Kbps   11 FPS   553 Kbps   6 FPS   276 Kbps   3 FPS   92 Kbps   1 FPS   1475 Kbps   20 FPS   885 Kbps   12 FPS   442 Kbps   6 FPS   221 Kbps   3 FPS   74 Kbps   1 FPS   1161 Kbps   21 FPS   664 Kbps   12 FPS   332 Kbps   6 FPS   166 Kbps   3 FPS   55 Kbps   1 FPS   968 Kbps   21 FPS   553 Kbps   12 FPS   276 Kbps   6 FPS   138 Kbps   3 FPS   46 Kbps   1 FPS   811 Kbps   22 FPS   442 Kbps   12 FPS   221 Kbps   6 FPS   111 Kbps   3 FPS   37 Kbps   1 FPS   608 Kbps   22 FPS   332 Kbps   12 FPS   166 Kbps   6 FPS   83 Kbps   3 FPS   28 Kbps   1 FPS   424 Kbps   23 FPS   221 Kbps   12 FPS   111 Kbps   6 FPS   55 Kbps   3 FPS   18 Kbps   1 FPS   230 Kbps   25 FPS   111 Kbps   12 FPS   55 Kbps   6 FPS   28 Kbps   3 FPS   9 Kbps   1 FPS   English _81   Download from Www.Somanuals.com. All Manuals Search And Download.   appendix   ❖ MPEG4 (VGA)   Frame Rate   25 FPS   13 FPS   6 FPS   3 FPS   1 FPS   Quality   4424 Kbps   20 FPS   2654 Kbps   12 FPS   1327 Kbps   6 FPS   664 Kbps   3 FPS   221 Kbps   1 FPS   LEVEL10   LEVEL9   LEVEL8   LEVEL7   LEVEL6   LEVEL5   LEVEL4   LEVEL3   LEVEL2   LEVEL1   3871 Kbps   21 FPS   2212 Kbps   12 FPS   1106 Kbps   6 FPS   553 Kbps   3 FPS   184 Kbps   1 FPS   3097 Kbps   21 FPS   1769 Kbps   12 FPS   885 Kbps   6 FPS   442 Kbps   3 FPS   147 Kbps   1 FPS   2433 Kbps   22 FPS   1327 Kbps   12 FPS   664 Kbps   6 FPS   332 Kbps   3 FPS   111 Kbps   1 FPS   1769 Kbps   24 FPS   885 Kbps   12 FPS   442 Kbps   6 FPS   221 Kbps   3 FPS   74 Kbps   1 FPS   1382 Kbps   25 FPS   664 Kbps   12 FPS   332 Kbps   6 FPS   166 Kbps   3 FPS   55 Kbps   1 FPS   1152 Kbps   25 FPS   553 Kbps   12 FPS   276 Kbps   6 FPS   138 Kbps   3 FPS   46 Kbps   1 FPS   922 Kbps   25 FPS   442 Kbps   12 FPS   221 Kbps   6 FPS   111 Kbps   3 FPS   37 Kbps   1 FPS   691 Kbps   25 FPS   332 Kbps   12 FPS   166 Kbps   6 FPS   83 Kbps   3 FPS   28 Kbps   1 FPS   461 Kbps   25 FPS   221 Kbps   12 FPS   111 Kbps   6 FPS   55 Kbps   3 FPS   18 Kbps   1 FPS   82_ appendix   Download from Www.Somanuals.com. All Manuals Search And Download.   ❖ H.264 (VGA)   Frame Rate   Quality   25 FPS   13 FPS   6 FPS   3 FPS   1 FPS   2507 Kbps   17 FPS   1327 Kbps   9 FPS   737 Kbps   5 FPS   442 Kbps   3 FPS   147 Kbps   1 FPS   LEVEL10   LEVEL9   LEVEL8   LEVEL7   LEVEL6   LEVEL5   LEVEL4   LEVEL3   LEVEL2   LEVEL1   1991 Kbps   18 FPS   1217 Kbps   11 FPS   664 Kbps   6 FPS   332 Kbps   3 FPS   111 Kbps   1 FPS   1659 Kbps   18 FPS   1106 Kbps   12 FPS   553 Kbps   6 FPS   276 Kbps   3 FPS   92 Kbps   1 FPS   1401 Kbps   19 FPS   885 Kbps   12 FPS   442 Kbps   6 FPS   221 Kbps   3 FPS   74 Kbps   1 FPS   1106 Kbps   20 FPS   664 Kbps   12 FPS   332 Kbps   6 FPS   166 Kbps   3 FPS   55 Kbps   1 FPS   968 Kbps   21 FPS   553 Kbps   12 FPS   276 Kbps   6 FPS   138 Kbps   3 FPS   46 Kbps   1 FPS   774 Kbps   21 FPS   442 Kbps   12 FPS   221 Kbps   6 FPS   111 Kbps   3 FPS   37 Kbps   1 FPS   608 Kbps   22 FPS   332 Kbps   12 FPS   166 Kbps   6 FPS   83 Kbps   3 FPS   28 Kbps   1 FPS   424 Kbps   23 FPS   221 Kbps   12 FPS   111 Kbps   6 FPS   55 Kbps   3 FPS   18 Kbps   1 FPS   230 Kbps   25 FPS   111 Kbps   12 FPS   55 Kbps   6 FPS   28 Kbps   3 FPS   9 Kbps   1 FPS   English _83   Download from Www.Somanuals.com. All Manuals Search And Download.   appendix   ❖ MPEG4 (CIF)   Frame Rate   25 FPS   13 FPS   6 FPS   3 FPS   1 FPS   Quality   1382 Kbps   25 FPS   664 Kbps   12 FPS   332 Kbps   6 FPS   166 Kbps   3 FPS   55 Kbps   1 FPS   LEVEL10   LEVEL9   LEVEL8   LEVEL7   LEVEL6   LEVEL5   LEVEL4   LEVEL3   LEVEL2   LEVEL1   1152 Kbps   25 FPS   553 Kbps   12 FPS   276 Kbps   6 FPS   138 Kbps   3 FPS   46 Kbps   1 FPS   922 Kbps   25 FPS   442 Kbps   12 FPS   221 Kbps   6 FPS   111 Kbps   3 FPS   37 Kbps   1 FPS   691 Kbps   25 FPS   332 Kbps   12 FPS   166 Kbps   6 FPS   83 Kbps   3 FPS   28 Kbps   1 FPS   461 Kbps   25 FPS   221 Kbps   12 FPS   111 Kbps   6 FPS   55 Kbps   3 FPS   18 Kbps   1 FPS   346 Kbps   25 FPS   166 Kbps   12 FPS   83 Kbps   6 FPS   41 Kbps   3 FPS   14 Kbps   1 FPS   288 Kbps   25 FPS   138 Kbps   12 FPS   69 Kbps   6 FPS   35 Kbps   3 FPS   12 Kbps   1 FPS   230 Kbps   25 FPS   111 Kbps   12 FPS   55 Kbps   6 FPS   28 Kbps   3 FPS   9 Kbps   1 FPS   173 Kbps   25 FPS   83 Kbps   12 FPS   41 Kbps   6 FPS   21 Kbps   3 FPS   7 Kbps   1 FPS   151 Kbps   25 FPS   73 Kbps   12 FPS   36 Kbps   6 FPS   18 Kbps   3 FPS   6 Kbps   1 FPS   84_ appendix   Download from Www.Somanuals.com. All Manuals Search And Download.   ❖ H.264 (CIF)   Frame Rate   Quality   25 FPS   13 FPS   6 FPS   3 FPS   1 FPS   922 Kbps   25 FPS   442 Kbps   12 FPS   221 Kbps   6 FPS   111 Kbps   3 FPS   37 Kbps   1 FPS   LEVEL10   LEVEL9   LEVEL8   LEVEL7   LEVEL6   LEVEL5   LEVEL4   LEVEL3   LEVEL2   LEVEL1   691 Kbps   25 FPS   332 Kbps   12 FPS   166 Kbps   6 FPS   83 Kbps   3 FPS   28 Kbps   1 FPS   576 Kbps   25 FPS   276 Kbps   12 FPS   138 Kbps   6 FPS   69 Kbps   3 FPS   23 Kbps   1 FPS   461 Kbps   25 FPS   221 Kbps   12 FPS   111 Kbps   6 FPS   55 Kbps   3 FPS   18 Kbps   1 FPS   346 Kbps   25 FPS   166 Kbps   12 FPS   83 Kbps   6 FPS   41 Kbps   3 FPS   14 Kbps   1 FPS   288 Kbps   25 FPS   138 Kbps   12 FPS   69 Kbps   6 FPS   35 Kbps   3 FPS   12 Kbps   1 FPS   230 Kbps   25 FPS   111 Kbps   12 FPS   55 Kbps   6 FPS   28 Kbps   3 FPS   9 Kbps   1 FPS   173 Kbps   25 FPS   83 Kbps   12 FPS   41 Kbps   6 FPS   21 Kbps   3 FPS   7 Kbps   1 FPS   115 Kbps   25 FPS   55 Kbps   12 FPS   28 Kbps   6 FPS   14 Kbps   3 FPS   5 Kbps   1 FPS   58 Kbps   25 FPS   28 Kbps   12 FPS   14 Kbps   6 FPS   7 Kbps   3 FPS   2 Kbps   1 FPS   English _85   Download from Www.Somanuals.com. All Manuals Search And Download.   appendix   TROUBLESHOOTING   PROBLEM   SOLUTION   y y Check to make sure that the camera’s Network settings are appropriate.   Check to make sure that all network cables have been connected   properly.   y y y If connected using DHCP, verify that the camera is able to acquire   dynamic IP addresses without any problem.   I can’t access the camera from a   web browser.   If connected using a DDNS URL, verify that the MAC address has been   properly entered.   If the camera is connected to a router, verify that port forwarding is   properly configured.   y Connected Viewers become disconnected upon any change to camera or   network configurations.   Viewer got disconnected during   monitoring.   y y Check all network connections.   If the camera is connected over an xDSL network, it’ s possible for   Viewer to disconnect under poor network conditions.   y When you try to connect to the system using a tab browser, the same   cookie information is shared, resulting in errors when connected.   Therefore, instead of using a tab browser, open a new browser window   to connect to the system.   I cannot connect to the system   using a tab browser of Internet   Explorer 7.0.   The camera connected to the   network is not detected in the IP   installer program.   y y Turn off the firewall settings on your PC and then search the camera   again.   Check whether two or more cameras are set to a single multicast address   instead of different addresses. If a single address is used for multiple   cameras, the images may overlap.   Images overlap.   y If the transmission method is set to multicast, check whether there is a   router that supports multicast in the LAN the camera is connected to.   No image appears.   86_ appendix   Download from Www.Somanuals.com. All Manuals Search And Download.   PROBLEM   SOLUTION   y Verify the settings in the following sequence:   No JPEG file is transferred via FTP/   SMTP on occurrence of intelligent   video analysis event of camera   even when the <Intelligent Video   Analysis> is set to <Enable>.   A. NTP must be properly configured.   B. The <Intelligent Video Analysis> should be set to <Enable>.   C. Alarm Video Transmission must be enabled.   D. Check for scheduling conflict.   Can <Set Rules> be configured   even when the <Intelligent Video   Analysis> is set to <Disable>?   y y Yes, it can be. You can set rules for events despite of the intelligent video   analysis setting.   No signal is found at the Alarm   Output port even when an   intelligent video analysis event is   generated.   Check alarm output port settings.   y y Check if the memory card is defective.   Cannot record into the SD memory   card.   Check if the write protection tab of the memory card is set to “LOCK”.   y y Check if the memory card is defective.   SD memory indicator does not   turn on even when the SD memory   card is inserted.   Check if the <SD Card Record> is checked in <Setup> - <Event> -   <Alarm image> menu.   y Check if the memory card is inserted in the proper direction. Operation   of memory card that is formatted by other devices is not guaranteed   with this camera unit   SD memory card is inserted but   the camera does not operate   properly.   y y Format the memory card again in <Setup> - <Event> - <Record   setup> menu.   Cannot format the SD memory   card.   Check if the write protection tab of the memory card is set to "LOCK".   English _87   Download from Www.Somanuals.com. All Manuals Search And Download.   GPL/LGPL SOFTWARE LICENSE   This product uses open-source software distributed under the terms of GPL and LGPL.   And you can visit at www.samsungsecurity.com to get the source codes of the following GPL   and LGPL software used for this product.   y GPL S/W   Base Kernel, Busybox, Sysvinit, dosfstools   LGPL S/W   gLibc, Inetutils   - y - want it, that you can change the software   or use pieces of it in new free programs ;   and that you know you can do these things.   GNU GENERAL PUBLIC LICENSE   Version 2, June 1991   Copyright (C)1989, 1991 Free Software   Foundation, Inc.   51 Franklin Street,Fifth Floor, Boston,   MA 02110-1301, USA   To protect your rights, we need to make   restrictions that forbid anyone to deny you   these rights or to ask you to surrender the   rights. These restrictions translate to certain   responsibilities for you if you distribute   copies of the software, or if you modify it.   Everyone is permitted to copy and   distribute verbatim copies of this license   document, but changing it is not allowed.   For example, if you distribute copies of   such a program, whether gratis or for a fee,   you must give the recipients all the rights   that you have.   Preamble   The licenses for most software are designed   to take away your freedom to share and   change it. By contrast, the GNU General   Public License is intended to guarantee   your freedom to share and change free   software-- to make sure the software is free   for all its users.   You must make sure that they, too, receive or   can get the source code. And you must show   them these terms so they know their rights.   We protect your rights with two steps :   (1)copyright the software, and (2)offer   you this license which gives you legal   permission to copy, distribute and/or   modify the software.   This General Public License applies to most   of the Free Software Foundation's software   and to any other program whose authors   commit to using it. (Some other Free Software   Foundation software is covered by the GNU   Lesser General Public License instead.) You   can apply it to your programs, too.   Also, for each author's protection and ours,   we want to make certain that everyone   understands that there is no warranty for   this free software. If the software is modified   by someone else and passed on, we want   its recipients to know that what they have   is not the original, so that any problems   introduced by others will not reflect on the   original authors' reputations.   When we speak of free software, we are   referring to freedom, not price.   Our General Public Licenses are designed   to make sure that you have the freedom   to distribute copies of free software (and   charge for this service if you wish), that you   receive source code or can get it if you   Finally, any free program is threatened   constantly by software patents. We wish   Download from Www.Somanuals.com. All Manuals Search And Download.   to avoid the danger that redistributors of a   free program will individually obtain patent   licenses, in effect making the program   proprietary. To prevent this, we have made   it clear that any patent must be licensed for   everyone's free use or not licensed at all.   recipients of the Program a copy of this   License along with the Program.   You may charge a fee for the physical   act of transferring a copy, and you may   at your option offer warranty protection   in exchange for a fee.   The precise terms and conditions for   copying, distribution and modification follow.   2. You may modify your copy or copies   of the Program or any portion of it,   thus forming a work based on the   Program, and copy and distribute such   modifications or work under the terms of   Section 1 above, provided that you also   meet all of these conditions :   TERMS AND CONDITIONS FOR   COPYING, DISTRIBUTION AND   MODIFICATION   0. This License applies to any program   or other work which contains a notice   placed by the copyright holder saying it   may be distributed under the terms of   this General Public License.   The "Program", below, refers to any such   program or work, and a "work based on   the Program" means either the Program   or any derivative work under copyright   law : that is to say, a work containing the   Program or a portion of it, either verbatim   or with modifications and/or translated   into another language. (Hereinafter,   translation is included without limitation   in the term "modification".) Each licensee   is addressed as "you".   Activities other than copying, distribution   and modification are not covered by   this License ; they are outside its scope.   The act of running the Program is not   restricted, and the output from the   Program is covered only if its contents   constitute a work based on the Program   (independent of having been made by   running the Program). Whether that is   true depends on what the Program does.   a) You must cause the modified files to   carry prominent notices stating that   you changed the files and the date of   any change.   b) You must cause any work that you   distribute or publish, that in whole or   in part contains or is derived from the   Program or any part thereof, to be   licensed as a whole at no charge to   all third parties under the terms of this   License.   c) If the modified program normally   reads commands interactively   when run,you must cause it, when   started running for such interactive   use in the most ordinary way, to   print or display an announcement   including an appropriate copyright   notice and a notice that there is no   warranty (or else, saying that you   provide a warranty) and that users   may redistribute the program under   these conditions, and telling the user   how to view a copy of this License.   (Exception:if the Program itself is   interactive but does not normally print   such an announcement, your work   based on the Program is not required   to print an announcement.)   1. You may copy and distribute verbatim   copies of the Program's source code as   you receive it, in any medium, provided   that you conspicuously and appropriately   publish on each copy an appropriate   copyright notice and disclaimer of   warranty; keep intact all the notices that   refer to this License and to the absence   of any warranty ; and give any other   These requirements apply to the modified   work as a whole. If identifiable sections   of that work are not derived from   the Program, and can be reasonably   Download from Www.Somanuals.com. All Manuals Search And Download.   considered independent and separate   works in themselves, then this License, and   its terms, do not apply to those sections   when you distribute them as separate   works. But when you distribute the same   sections as part of a whole which is a work   based on the Program, the distribution   of the whole must be on the terms of this   License, whose permissions for other   licensees extend to the entire whole, and   thus to each and every part regardless of   who wrote it.   c) Accompany it with the information   you received as to the offer to   distribute corresponding source code.   (This alternative is allowed only for   noncommercial distribution and only   if you received the program in object   code or executable form with such   an offer, in accord with Subsection b   above.)   The source code for a work means the   preferred form of the work for making   modifications to it. For an executable work,   complete source code means all the source   code for all modules it contains, plus any   associated interface definition files, plus   the scripts used to control compilation and   installation of the executable. However,   as a special exception, the source code   distributed need not include anything that   is normally distributed (in either source or   binary form)with the major components   (compiler, kernel, and so on)of the operating   system on which the executable runs,   unless that component itself accompanies   the executable.   Thus, it is not the intent of this section to   claim rights or contest your rights to work   written entirely by you ; rather, the intent is to   exercise the right to control the distribution   of derivative or collective works based on   the Program. In addition, mere aggregation   of another work not based on the Program   with the Program (or with a work based on   the Program)on a volume of a storage or   distribution medium does not bring the other   work under the scope of this License.   3. You may copy and distribute the   Program (or a work based on it, under   Section 2)in object code or executable   form under the terms of Sections 1 and   2 above provided that you also do one of   the following :   If distribution of executable or object code   is made by offering access to copy from a   designated place, then offering equivalent   access to copy the source code from the   same place counts as distribution of the   source code, even though third parties are   not compelled to copy the source along   with the object code.   a) Accompany it with the complete   corresponding machine-readable   source code, which must be   distributed under the terms of   Sections 1 and 2 above on a medium   customarily used for software   interchange ; or,   4. You may not copy, modify, sublicense,   or distribute the Program except as   expressly provided under this License.   Any attempt otherwise to copy, modify,   sublicense or distribute the Program is   void, and will automatically terminate   your rights under this License.   However, parties who have received   copies, or rights, from you under this   License will not have their licenses   terminated so long as such parties   remain in full compliance.   b) Accompany it with a written offer,   valid for at least three years, to give   any third party, for a charge no   more than your cost of physically   performing source distribution, a   complete machinereadable copy   of the corresponding source code,   to be distributed under the terms   of Sections 1 and 2 above on a   medium customarily used for software   interchange ; or,   5. You are not required to accept this   License, since you have not signed it.   Download from Www.Somanuals.com. All Manuals Search And Download.   However, nothing else grants you   a whole is intended to apply in other   permission to modify or distribute the   Program or its derivative works.   circumstances. It is not the purpose of   this section to induce you to infringe any   patents or other property right claims or   to contest validity of any such claims; this   section has the sole purpose of protecting   the integrity of the free software distribution   system, which is implemented by public   license practices. Many people have made   generous contributions to the wide range   of software distributed through that system   in reliance on consistent application of that   system ; it is up to the author/donor to   decide if he or she is willing to distribute   software through any other system and a   licensee cannot impose that choice.   These actions are prohibited by law if you   do not accept this License.Therefore, by   modifying or distributing the Program (or   any work based on the Program), you   indicate your acceptance of this License   to do so, and all its terms and conditions   for copying, distributing or modifying the   Program or works based on it.   6. Each time you redistribute the Program   (or any work based on the Program),   the recipient automatically receives a   license from the original licensor to copy,   distribute or modify the Program subject   to these terms and conditions.   You may not impose any further   restrictions on the recipients' exercise of   the rights granted herein.   This section is intended to make thoroughly   clear what is believed to be a consequence   of the rest of this License.   8. If the distribution and/or use of the   Program is restricted in certain countries   either by patents or by copyrighted   interfaces, the original copyright holder   who places the Program under this   License may add an explicit geographical   distribution limitation excluding those   countries,so that distribution is permitted   only in or among countries not thus   excluded. In such case, this License   incorporates the limitation as if written in   the body of this License.   You are not responsible for enforcing   compliance by third parties to this   License.   7. If, as a consequence of a court judgment   or allegation of patent infringement or for   any other reason (not limited to patent   issues), conditions are imposed on you   (whether by court order, agreement or   otherwise)that contradict the conditions   of this License, they do not excuse you   from the conditions of this License. If   you cannot distribute so as to satisfy   simultaneously your obligations under   this License and any other pertinent   obligations, then as a consequence you   may not distribute the Program at all.   For example, if a patent license would   not permit royalty-free redistribution of   the Program by all those who receive   copies directly or indirectly through you,   then the only way you could satisfy both   it and this License would be to refrain   entirely from distribution of the Program.   9. The Free Software Foundation may   publish revised and/or new versions of   the General Public License from time to   time. Such new versions will be similar   in spirit to the present version, but may   differ in detail to address new problems   or concerns.   Each version is given a distinguishing   version number. If the Program specifies   a version number of this License which   applies to it and "any later version", you   have the option of following the terms and   conditions either of that version or of any   later version published by the Free Software   Foundation. If the Program does not specify   a version number of this License, you may   If any portion of this section is held invalid   or unenforceable under any particular   circumstance, the balance of the section   is intended to apply and the section as   Download from Www.Somanuals.com. All Manuals Search And Download.   choose any version ever published by the   Free Software Foundation.   USE OR INABILITY TO USE THE   PROGRAM (INCLUDING BUT NOT   LIMITED TO LOSS OF DATA OR DATA   BEING RENDERED INACCURATE   OR LOSSES SUSTAINED BY YOU   OR THIRD PARTIES OR A FAILURE   OF THE PROGRAM TO OPERATE   WITH ANY OTHER PROGRAMS),   EVEN IF SUCH HOLDER OR OTHER   PARTY HAS BEEN ADVISED OF THE   POSSIBILITY OF SUCH DAMAGES.   10. If you wish to incorporate parts of the   Program into other free programs   whose distribution conditions are   different, write to the author to ask   for permission. For software which   is copyrighted by the Free Software   Foundation,write to the Free Software   Foundation ; we sometimes make   exceptions for this. Our decision will be   guided by the two goals of preserving   the free status of all derivatives of our   free software and of promoting the   sharing and reuse of software generally.   END OF TERMS AND CONDITIONS   How to Apply These Terms to Your   New Programs   NO WARRANTY   If you develop a new program, and you   want it to be of the greatest possible use to   the public, the best way to achieve this is to   make it free software which everyone can   redistribute and change under these terms.   11. BECAUSE THE PROGRAM IS   LICENSED FREE OF CHARGE,   THERE IS NO WARRANTY FOR   THE PROGRAM, TO THE EXTENT   PERMITTED BY APPLICABLE LAW.   EXCEPT WHEN OTHERWISE STATED IN   WRITING THE COPYRIGHT HOLDERS   AND/OR OTHER PARTIES PROVIDE   THE PROGRAM "ASIS" WITHOUT   WARRANTY OF ANY KIND, EITHER   EXPRESSED OR IMPLIED, INCLUDING,   BUT NOT LIMITED TO, THE IMPLIED   WARRANTIES OF MERCHANTABILITY   AND FITNESS FOR A PARTICULAR   PURPOSE. THE ENTIRE RISK AS TO   THE QUALITY AND PERFORMANCE OF   THE PROGRAM IS WITH YOU. SHOULD   THE PROGRAMPROVE DEFECTIVE,   YOU ASSUME THE COST OF ALL   NECESSARY SERVICING, REPAIR OR   CORRECTION.   To do so, attach the following notices to   the program. It is safest to attach them   to the start of each source file to most   effectively convey the exclusion of warranty   ; and each file should have at least the   "copyright" line and a pointer to where the   full notice is found.   one line to give the program's name and an   idea of what it does.   Copyright (C)yyyy name of author   This program is free software ; you can   redistribute it and/or modify it under the   terms of the GNU General Public License as   published by the Free Software Foundation   ; either version 2 of the License, or (at your   option)any later version.   This program is distributed in the hope   that it will be useful, but WITHOUT ANY   WARRANTY ; without even the implied   warranty of MERCHANTABILITY or   FITNESS FOR A PARTICULAR PURPOSE.   See the GNU General Public License for   more details.   12. IN NO EVENT UNLESS REQUIRED   BY APPLICABLE LAW OR AGREED   TO IN WRITING WILL ANY   COPYRIGHT HOLDER, OR ANY   OTHER PARTY WHO MAY MODIFY   AND/OR REDISTRIBUTE DAMAGES,   INCLUDING ANY GENERAL, SPECIAL,   INCIDENTAL OR CONSEQUENTIAL   DAMAGES ARISING OUT OF THE   Download from Www.Somanuals.com. All Manuals Search And Download.   You should have received a copy of the   GNU General Public License along with this   program ; if not, write to the Free Software   Foundation, Inc.,51 Franklin Street, Fifth   Floor, Boston, MA 02110-1301, USA.   GNU GENERAL PUBLIC LICENSE   Version 3, 29 June 2007   Copyright © 2007 Free Software Foundation,   Inc. <http://fsf.org/>   Also add information on how to contact you   by electronic and paper mail. If the program   is interactive, make it output a short notice   like this when it starts in an interactive   mode :   Everyone is permitted to copy and distribute   verbatim copies of this license document, but   changing it is not allowed.   Gnomovision version 69,   Preamble   Copyright (C) year name of author   The GNU General Public License is a free,   copyleft license for software and other kinds   of works.   Gnomovision comes with ABSOLUTELY   NO   WARRANTY ; for details type ‘show w’.   This is free software, and you are welcome   to redistribute it under certain conditions ;   type ‘show c’ for details.   The licenses for most software and other   practical works are designed to take away   your freedom to share and change the works.   By contrast, the GNU General Public License   is intended to guarantee your freedom to   share and change all versions of a program--   to make sure it remains free software for all its   users. We, the Free Software Foundation, use   the GNU General Public License for most of   our software; it applies also to any other work   released this way by its authors. You can   apply it to your programs, too.   The hypothetical commands ‘show w’ and   ‘show c’ should show the appropriate parts   of the General Public License. Of course,   the commands you use may be called   something other than ‘show w’ and ‘show   c’ ; they could even be mouse-clicks or   menu items-- whatever suits your program.   You should also get your employer (if you   work as a programmer)or your school, if   any, to sign a "copyright disclaimer" for the   program,if necessary. Here is a sample ;   alter the names:   When we speak of free software, we are   referring to freedom, not price. Our General   Public Licenses are designed to make sure   that you have the freedom to distribute copies   of free software (and charge for them if you   wish), that you receive source code or can   get it if you want it, that you can change   the software or use pieces of it in new free   programs, and that you know you can do   these things.   Yoyodyne, Inc.,hereby disclaims all   copyright interest in the program ‘   Gnomovision’ (which makes passes at   compilers) written by James Hacker.   signature of Ty Coon, 1 April 1989 Ty   Coon, President of Vice This General Public   License does not permit incorporating your   program into proprietary programs. If your   program is a subroutine library, you may   consider it more useful to permit linking   proprietary applications with the library. If   this is what you want to do, use the GNU   Lesser General Public License instead of   this License.   To protect your rights, we need to prevent   others from denying you these rights or asking   you to surrender the rights. Therefore, you   have certain responsibilities if you distribute   copies of the software, or if you modify it:   responsibilities to respect the freedom of   others.   For example, if you distribute copies of such a   program, whether gratis or for a fee, you must   pass on to the recipients the same freedoms   Download from Www.Somanuals.com. All Manuals Search And Download.   that you received. You must make sure that   they, too, receive or can get the source code.   And you must show them these terms so they   know their rights.   TERMS AND CONDITIONS   0. Definitions.   “This License” refers to version 3 of the GNU   General Public License.   Developers that use the GNU GPL protect   your rights with two steps: (1) assert copyright   on the software, and (2) offer you this License   giving you legal permission to copy, distribute   and/or modify it.   “Copyright” also means copyright-like laws   that apply to other kinds of works, such as   semiconductor masks.   “The Program” refers to any copyrightable   work licensed under this License. Each   licensee is addressed as “you”. “Licensees”   and “recipients” may be individuals or   organizations.   For the developers' and authors' protection,   the GPL clearly explains that there is no   warranty for this free software. For both users'   and authors' sake, the GPL requires that   modified versions be marked as changed,   so that their problems will not be attributed   erroneously to authors of previous versions.   To “modify” a work means to copy from   or adapt all or part of the work in a fashion   requiring copyright permission, other than the   making of an exact copy. The resulting work   is called a “modified version” of the earlier   work or a work “based on” the earlier work.   Some devices are designed to deny users   access to install or run modified versions   of the software inside them, although the   manufacturer can do so. This is fundamentally   incompatible with the aim of protecting   users' freedom to change the software. The   systematic pattern of such abuse occurs   in the area of products for individuals to   use, which is precisely where it is most   unacceptable. Therefore, we have designed   this version of the GPL to prohibit the practice   for those products. If such problems arise   substantially in other domains, we stand ready   to extend this provision to those domains   in future versions of the GPL, as needed to   protect the freedom of users.   A “covered work” means either the unmodified   Program or a work based on the Program.   To “propagate” a work means to do anything   with it that, without permission, would   make you directly or secondarily liable for   infringement under applicable copyright   law, except executing it on a computer   or modifying a private copy. Propagation   includes copying, distribution (with or without   modification), making available to the public,   and in some countries other activities as well.   To “convey” a work means any kind of   propagation that enables other parties to   make or receive copies. Mere interaction with   a user through a computer network, with no   transfer of a copy, is not conveying.   Finally, every program is threatened constantly   by software patents. States should not allow   patents to restrict development and use of   software on general-purpose computers,   but in those that do, we wish to avoid the   special danger that patents applied to a free   program could make it effectively proprietary.   To prevent this, the GPL assures that patents   cannot be used to render the program non-   free.   An interactive user interface displays   “Appropriate Legal Notices” to the extent   that it includes a convenient and prominently   visible feature that (1) displays an appropriate   copyright notice, and (2) tells the user that   there is no warranty for the work (except   to the extent that warranties are provided),   that licensees may convey the work under   this License, and how to view a copy of this   License.   The precise terms and conditions for copying,   distribution and modification follow.   If the interface presents a list of user   commands or options, such as a menu, a   prominent item in the list meets this criterion.   Download from Www.Somanuals.com. All Manuals Search And Download.   1. Source Code.   The Corresponding Source need not   include anything that users can regenerate   automatically from other parts of the   Corresponding Source.   The “source code” for a work means the   preferred form of the work for making   modifications to it. “Object code” means any   non-source form of a work.   The Corresponding Source for a work in   source code form is that same work.   A “Standard Interface” means an interface   that either is an official standard defined   by a recognized standards body, or, in the   case of interfaces specified for a particular   programming language, one that is widely   used among developers working in that   language.   2. Basic Permissions.   All rights granted under this License are   granted for the term of copyright on the   Program, and are irrevocable provided the   stated conditions are met. This License   explicitly affirms your unlimited permission to   run the unmodified Program. The output from   running a covered work is covered by this   License only if the output, given its content,   constitutes a covered work. This License   acknowledges your rights of fair use or other   equivalent, as provided by copyright law.   The “System Libraries” of an executable   work include anything, other than the work   as a whole, that (a) is included in the normal   form of packaging a Major Component, but   which is not part of that Major Component,   and (b) serves only to enable use of the   work with that Major Component, or to   implement a Standard Interface for which   an implementation is available to the public   in source code form. A “Major Component”,   in this context, means a major essential   component (kernel, window system, and so   on) of the specific operating system (if any) on   which the executable work runs, or a compiler   used to produce the work, or an object code   interpreter used to run it.   You may make, run and propagate covered   works that you do not convey, without   conditions so long as your license otherwise   remains in force. You may convey covered   works to others for the sole purpose of having   them make modifications exclusively for you,   or provide you with facilities for running those   works, provided that you comply with the   terms of this License in conveying all material   for which you do not control copyright. Those   thus making or running the covered works for   you must do so exclusively on your behalf,   under your direction and control, on terms   that prohibit them from making any copies   of your copyrighted material outside their   relationship with you.   The “Corresponding Source” for a work   in object code form means all the source   code needed to generate, install, and (for   an executable work) run the object code   and to modify the work, including scripts   to control those activities. However, it does   not include the work's System Libraries, or   general-purpose tools or generally available   free programs which are used unmodified in   performing those activities but which are not   part of the work. For example, Corresponding   Source includes interface definition files   associated with source files for the work,   and the source code for shared libraries and   dynamically linked subprograms that the work   is specifically designed to require, such as by   intimate data communication or control flow   between those subprograms and other parts   of the work.   Conveying under any other circumstances is   permitted solely under the conditions stated   below. Sublicensing is not allowed; section 10   makes it unnecessary.   3. Protecting Users' Legal Rights From   Anti-Circumvention Law.   No covered work shall be deemed part of an   effective technological measure under any   applicable law fulfilling obligations under article   11 of the WIPO copyright treaty adopted on   20 December 1996, or similar laws prohibiting   or restricting circumvention of such measures.   Download from Www.Somanuals.com. All Manuals Search And Download.   When you convey a covered work, you waive   any legal power to forbid circumvention of   technological measures to the extent such   circumvention is effected by exercising rights   under this License with respect to the covered   work, and you disclaim any intention to limit   operation or modification of the work as a   means of enforcing, against the work's users,   your or third parties' legal rights to forbid   circumvention of technological measures.   This License gives no permission to   license the work in any other way, but it   does not invalidate such permission if you   have separately received it.    d) If the work has interactive user interfaces,   each must display Appropriate Legal   Notices; however, if the Program has   interactive interfaces that do not display   Appropriate Legal Notices, your work   need not make them do so.   4. Conveying Verbatim Copies.   A compilation of a covered work with other   separate and independent works, which are   not by their nature extensions of the covered   work, and which are not combined with it   such as to form a larger program, in or on a   volume of a storage or distribution medium, is   called an “aggregate” if the compilation and   its resulting copyright are not used to limit   the access or legal rights of the compilation's   users beyond what the individual works   permit. Inclusion of a covered work in an   aggregate does not cause this License to   apply to the other parts of the aggregate.   You may convey verbatim copies of the   Program's source code as you receive it, in   any medium, provided that you conspicuously   and appropriately publish on each copy an   appropriate copyright notice; keep intact   all notices stating that this License and any   non-permissive terms added in accord with   section 7 apply to the code; keep intact all   notices of the absence of any warranty; and   give all recipients a copy of this License along   with the Program.   You may charge any price or no price for   each copy that you convey, and you may offer   support or warranty protection for a fee.   6. Conveying Non-Source Forms.   You may convey a covered work in object   code form under the terms of sections 4 and 5,   provided that you also convey the machine-   readable Corresponding Source under the   terms of this License, in one of these ways:   5. Conveying Modified Source Versions.   You may convey a work based on the   Program, or the modifications to produce it   from the Program, in the form of source code   under the terms of section 4, provided that   you also meet all of these conditions:    a) Convey the object code in, or embodied   in, a physical product (including a physical   distribution medium), accompanied by the   Corresponding Source fixed on a durable   physical medium customarily used for   software interchange.    a) The work must carry prominent notices   stating that you modified it, and giving a   relevant date.    b) The work must carry prominent notices   stating that it is released under this   License and any conditions added under   section 7. This requirement modifies the   requirement in section 4 to “keep intact   all notices”.   Convey the object code in, or embodied   in, a physical product (including a physical   distribution medium), accompanied by   a written offer, valid for at least three   years and valid for as long as you offer   spare parts or customer support for   that product model, to give anyone who   possesses the object code either (1) a   copy of the Corresponding Source for all   the software in the product that is covered   by this License, on a durable physical   medium customarily used for software   interchange, for a price no more than your    b)    c) You must license the entire work, as a   whole, under this License to anyone who   comes into possession of a copy. This   License will therefore apply, along with   any applicable section 7 additional terms,   to the whole of the work, and all its parts,   regardless of how they are packaged.   Download from Www.Somanuals.com. All Manuals Search And Download.   reasonable cost of physically performing   this conveying of source, or (2) access to   copy the Corresponding Source from a   network server at no charge.   resolved in favor of coverage. For a particular   product received by a particular user,   “normally used” refers to a typical or common   use of that class of product, regardless of   the status of the particular user or of the way   in which the particular user actually uses, or   expects or is expected to use, the product.   A product is a consumer product regardless   of whether the product has substantial   commercial, industrial or non-consumer uses,   unless such uses represent the only significant   mode of use of the product.    c) Convey individual copies of the object   code with a copy of the written offer to   provide the Corresponding Source. This   alternative is allowed only occasionally   and noncommercially, and only if you   received the object code with such an   offer, in accord with subsection 6b.    d) Convey the object code by offering   access from a designated place (gratis or   for a charge), and offer equivalent access   to the Corresponding Source in the same   way through the same place at no further   charge. You need not require recipients   to copy the Corresponding Source along   with the object code. If the place to copy   the object code is a network server,   the Corresponding Source may be on   a different server (operated by you or   a third party) that supports equivalent   copying facilities, provided you maintain   clear directions next to the object code   saying where to find the Corresponding   Source. Regardless of what server hosts   the Corresponding Source, you remain   obligated to ensure that it is available   for as long as needed to satisfy these   requirements.   “Installation Information” for a User   Product means any methods, procedures,   authorization keys, or other information   required to install and execute modified   versions of a covered work in that User   Product from a modified version of its   Corresponding Source. The information   must suffice to ensure that the continued   functioning of the modified object code is in   no case prevented or interfered with solely   because modification has been made.   If you convey an object code work under this   section in, or with, or specifically for use in,   a User Product, and the conveying occurs   as part of a transaction in which the right of   possession and use of the User Product is   transferred to the recipient in perpetuity or for   a fixed term (regardless of how the transaction   is characterized), the Corresponding Source   conveyed under this section must be   accompanied by the Installation Information.   But this requirement does not apply if neither   you nor any third party retains the ability   to install modified object code on the User   Product (for example, the work has been    e) Convey the object code using peer-to-   peer transmission, provided you inform   other peers where the object code and   Corresponding Source of the work are   being offered to the general public at no   charge under subsection 6d.   installed in ROM).   A separable portion of the object code,   whose source code is excluded from the   Corresponding Source as a System Library,   need not be included in conveying the object   code work.   The requirement to provide Installation   Information does not include a requirement to   continue to provide support service, warranty,   or updates for a work that has been modified   or installed by the recipient, or for the User   Product in which it has been modified or   installed. Access to a network may be   denied when the modification itself materially   and adversely affects the operation of the   network or violates the rules and protocols for   communication across the network.   A “User Product” is either (1) a “consumer   product”, which means any tangible personal   property which is normally used for personal,   family, or household purposes, or (2) anything   designed or sold for incorporation into a   dwelling. In determining whether a product is   a consumer product, doubtful cases shall be   Download from Www.Somanuals.com. All Manuals Search And Download.   Corresponding Source conveyed, and   Installation Information provided, in accord   with this section must be in a format   that is publicly documented (and with an   implementation available to the public in   source code form), and must require no   special password or key for unpacking,   reading or copying.   reasonable ways as different from the   original version; or    d) Limiting the use for publicity purposes   of names of licensors or authors of the   material; or    e) Declining to grant rights under trademark   law for use of some trade names,   trademarks, or service marks; or   7. Additional Terms.    f) Requiring indemnification of licensors and   authors of that material by anyone who   conveys the material (or modified versions   of it) with contractual assumptions of   liability to the recipient, for any liability that   these contractual assumptions directly   impose on those licensors and authors.   “Additional permissions” are terms that   supplement the terms of this License by   making exceptions from one or more of its   conditions. Additional permissions that are   applicable to the entire Program shall be   treated as though they were included in this   License, to the extent that they are valid under   applicable law. If additional permissions apply   only to part of the Program, that part may be   used separately under those permissions,   but the entire Program remains governed by   this License without regard to the additional   permissions.   All other non-permissive additional terms   are considered “further restrictions” within   the meaning of section 10. If the Program   as you received it, or any part of it, contains   a notice stating that it is governed by this   License along with a term that is a further   restriction, you may remove that term. If a   license document contains a further restriction   but permits relicensing or conveying under   this License, you may add to a covered work   material governed by the terms of that license   document, provided that the further restriction   does not survive such relicensing or conveying.   When you convey a copy of a covered work,   you may at your option remove any additional   permissions from that copy, or from any part   of it. (Additional permissions may be written   to require their own removal in certain cases   when you modify the work.) You may place   additional permissions on material, added by   you to a covered work, for which you have or   can give appropriate copyright permission.   If you add terms to a covered work in accord   with this section, you must place, in the   relevant source files, a statement of the   additional terms that apply to those files, or a   notice indicating where to find the applicable   terms.   Notwithstanding any other provision of this   License, for material you add to a covered   work, you may (if authorized by the copyright   holders of that material) supplement the terms   of this License with terms:   Additional terms, permissive or non-   permissive, may be stated in the form of   a separately written license, or stated as   exceptions; the above requirements apply   either way.    a) Disclaiming warranty or limiting liability   differently from the terms of sections 15   and 16 of this License; or   8. Termination.    b) Requiring preservation of specified   reasonable legal notices or author   attributions in that material or in the   Appropriate Legal Notices displayed by   works containing it; or   You may not propagate or modify a covered   work except as expressly provided under this   License. Any attempt otherwise to propagate   or modify it is void, and will automatically   terminate your rights under this License   (including any patent licenses granted under   the third paragraph of section 11).    c) Prohibiting misrepresentation of the origin   of that material, or requiring that modified   versions of such material be marked in   Download from Www.Somanuals.com. All Manuals Search And Download.   However, if you cease all violation of this   License, then your license from a particular   copyright holder is reinstated (a) provisionally,   unless and until the copyright holder explicitly   and finally terminates your license, and (b)   permanently, if the copyright holder fails to   notify you of the violation by some reasonable   means prior to 60 days after the cessation.   An “entity transaction” is a transaction   transferring control of an organization, or   substantially all assets of one, or subdividing   an organization, or merging organizations.   If propagation of a covered work results   from an entity transaction, each party to that   transaction who receives a copy of the work   also receives whatever licenses to the work   the party's predecessor in interest had or   could give under the previous paragraph, plus   a right to possession of the Corresponding   Source of the work from the predecessor in   interest, if the predecessor has it or can get it   with reasonable efforts.   Moreover, your license from a particular   copyright holder is reinstated permanently   if the copyright holder notifies you of the   violation by some reasonable means, this   is the first time you have received notice of   violation of this License (for any work) from   that copyright holder, and you cure the   violation prior to 30 days after your receipt of   the notice.   You may not impose any further restrictions on   the exercise of the rights granted or affirmed   under this License. For example, you may not   impose a license fee, royalty, or other charge   for exercise of rights granted under this License,   and you may not initiate litigation (including a   cross-claim or counterclaim in a lawsuit) alleging   that any patent claim is infringed by making,   using, selling, offering for sale, or importing the   Program or any portion of it.   Termination of your rights under this section   does not terminate the licenses of parties   who have received copies or rights from you   under this License. If your rights have been   terminated and not permanently reinstated,   you do not qualify to receive new licenses for   the same material under section 10.   11. Patents.   9. Acceptance Not Required for Having   Copies.   A “contributor” is a copyright holder who   authorizes use under this License of the   Program or a work on which the Program is   based. The work thus licensed is called the   contributor's “contributor version”.   You are not required to accept this License   in order to receive or run a copy of the   Program. Ancillary propagation of a covered   work occurring solely as a consequence of   using peer-to-peer transmission to receive a   copy likewise does not require acceptance.   However, nothing other than this License   grants you permission to propagate or modify   any covered work. These actions infringe   copyright if you do not accept this License.   Therefore, by modifying or propagating a   covered work, you indicate your acceptance   of this License to do so.   A contributor's “essential patent claims” are   all patent claims owned or controlled by the   contributor, whether already acquired or   hereafter acquired, that would be infringed by   some manner, permitted by this License, of   making, using, or selling its contributor version,   but do not include claims that would be infringed   only as a consequence of further modification   of the contributor version. For purposes of this   definition, “control” includes the right to grant   patent sublicenses in a manner consistent with   the requirements of this License.   10. Automatic Licensing of Downstream   Recipients.   Each time you convey a covered work, the   recipient automatically receives a license   from the original licensors, to run, modify   and propagate that work, subject to this   License. You are not responsible for enforcing   compliance by third parties with this License.   Each contributor grants you a non-exclusive,   worldwide, royalty-free patent license under   the contributor's essential patent claims, to   make, use, sell, offer for sale, import and   otherwise run, modify and propagate the   contents of its contributor version.   Download from Www.Somanuals.com. All Manuals Search And Download.   In the following three paragraphs, a “patent   license” is any express agreement or   software, under which you make payment to   the third party based on the extent of your   activity of conveying the work, and under   which the third party grants, to any of the   parties who would receive the covered work   from you, a discriminatory patent license (a) in   connection with copies of the covered work   conveyed by you (or copies made from those   copies), or (b) primarily for and in connection   with specific products or compilations that   contain the covered work, unless you entered   into that arrangement, or that patent license   was granted, prior to 28 March 2007.   commitment, however denominated, not   to enforce a patent (such as an express   permission to practice a patent or covenant   not to sue for patent infringement). To “grant”   such a patent license to a party means to   make such an agreement or commitment not   to enforce a patent against the party.   If you convey a covered work, knowingly   relying on a patent license, and the   Corresponding Source of the work is not   available for anyone to copy, free of charge   and under the terms of this License, through   a publicly available network server or other   readily accessible means, then you must   either (1) cause the Corresponding Source   to be so available, or (2) arrange to deprive   yourself of the benefit of the patent license   for this particular work, or (3) arrange, in a   manner consistent with the requirements of   this License, to extend the patent license to   downstream recipients. “Knowingly relying”   means you have actual knowledge that, but   for the patent license, your conveying the   covered work in a country, or your recipient's   use of the covered work in a country, would   infringe one or more identifiable patents in that   country that you have reason to believe are   Nothing in this License shall be construed   as excluding or limiting any implied license   or other defenses to infringement that may   otherwise be available to you under applicable   patent law.   12. No Surrender of Others' Freedom.   If conditions are imposed on you (whether   by court order, agreement or otherwise) that   contradict the conditions of this License, they   do not excuse you from the conditions of   this License. If you cannot convey a covered   work so as to satisfy simultaneously your   obligations under this License and any other   pertinent obligations, then as a consequence   you may not convey it at all. For example, if   you agree to terms that obligate you to collect   a royalty for further conveying from those   to whom you convey the Program, the only   way you could satisfy both those terms and   this License would be to refrain entirely from   conveying the Program.   valid.   If, pursuant to or in connection with a single   transaction or arrangement, you convey, or   propagate by procuring conveyance of, a   covered work, and grant a patent license to   some of the parties receiving the covered   work authorizing them to use, propagate,   modify or convey a specific copy of the   covered work, then the patent license you   grant is automatically extended to all   recipients of the covered work and works   based on it.   13. Use with the GNU Affero General   Public License.   Notwithstanding any other provision of   this License, you have permission to link   or combine any covered work with a work   licensed under version 3 of the GNU Affero   General Public License into a single combined   work, and to convey the resulting work.   The terms of this License will continue to   apply to the part which is the covered work,   but the special requirements of the GNU   Affero General Public License, section 13,   concerning interaction through a network will   apply to the combination as such.   A patent license is “discriminatory” if it does   not include within the scope of its coverage,   prohibits the exercise of, or is conditioned   on the non-exercise of one or more of the   rights that are specifically granted under this   License. You may not convey a covered work   if you are a party to an arrangement with a   third party that is in the business of distributing   Download from Www.Somanuals.com. All Manuals Search And Download.   14. Revised Versions of this License.   16. Limitation of Liability.   The Free Software Foundation may publish   revised and/or new versions of the GNU   General Public License from time to time.   Such new versions will be similar in spirit to   the present version, but may differ in detail to   address new problems or concerns.   IN NO EVENT UNLESS REQUIRED BY   APPLICABLE LAW OR AGREED TO IN   WRITING WILL ANY COPYRIGHT HOLDER,   OR ANY OTHER PARTY WHO MODIFIES   AND/OR CONVEYS THE PROGRAM   AS PERMITTED ABOVE, BE LIABLE TO   YOU FOR DAMAGES, INCLUDING ANY   GENERAL, SPECIAL, INCIDENTAL OR   CONSEQUENTIAL DAMAGES ARISING OUT   OF THE USE OR INABILITY TO USE THE   PROGRAM (INCLUDING BUT NOT LIMITED   TO LOSS OF DATA OR DATA BEING   RENDERED INACCURATE OR LOSSES   SUSTAINED BY YOU OR THIRD PARTIES   OR A FAILURE OF THE PROGRAM TO   OPERATE WITH ANY OTHER PROGRAMS),   EVEN IF SUCH HOLDER OR OTHER PARTY   HAS BEEN ADVISED OF THE POSSIBILITY   OF SUCH DAMAGES.   Each version is given a distinguishing version   number. If the Program specifies that a certain   numbered version of the GNU General Public   License “or any later version” applies to it, you   have the option of following the terms and   conditions either of that numbered version   or of any later version published by the Free   Software Foundation. If the Program does   not specify a version number of the GNU   General Public License, you may choose any   version ever published by the Free Software   Foundation.   If the Program specifies that a proxy can   decide which future versions of the GNU   General Public License can be used, that   proxy's public statement of acceptance of a   version permanently authorizes you to choose   that version for the Program.   17. Interpretation of Sections 15 and 16.   If the disclaimer of warranty and limitation of   liability provided above cannot be given local   legal effect according to their terms, reviewing   courts shall apply local law that most closely   approximates an absolute waiver of all civil   liability in connection with the Program, unless a   warranty or assumption of liability accompanies   a copy of the Program in return for a fee.   Later license versions may give you additional   or different permissions. However, no   additional obligations are imposed on any   author or copyright holder as a result of your   choosing to follow a later version.   END OF TERMS AND CONDITIONS   15. Disclaimer of Warranty.   GNU LESSER GENERAL PUBLIC   LICENSE   THERE IS NO WARRANTY FOR THE   PROGRAM, TO THE EXTENT PERMITTED   BY APPLICABLE LAW. EXCEPT WHEN   OTHERWISE STATED IN WRITING THE   COPYRIGHT HOLDERS AND/OR OTHER   PARTIES PROVIDE THE PROGRAM   Version 2.1, February 1999   Copyright (C)1991, 1999 Free Software   Foundation, Inc.   “AS IS” WITHOUT WARRANTY OF   51 Franklin Street, Fifth Floor, Boston,   MA 02110-1301 USA   ANY KIND, EITHER EXPRESSED OR   IMPLIED, INCLUDING, BUT NOT LIMITED   TO, THE IMPLIED WARRANTIES OF   Everyone is permitted to copy and   MERCHANTABILITY AND FITNESS FOR A   PARTICULAR PURPOSE. THE ENTIRE RISK   AS TO THE QUALITY AND PERFORMANCE   OF THE PROGRAM IS WITH YOU. SHOULD   THE PROGRAM PROVE DEFECTIVE, YOU   ASSUME THE COST OF ALL NECESSARY   SERVICING, REPAIR OR CORRECTION.   distribute verbatim copies of this license   document, but changing it is not allowed.   [This is the first released version of the   Lesser GPL. It also counts as the successor   of the GNU Library Public License, version   2, hence the version number 2.1.]   Download from Www.Somanuals.com. All Manuals Search And Download.   We protect your rights with a two-step   method : (1)we copyright the library, and   (2)we offer you this license, which gives you   legal permission to copy, distribute and/or   modify the library.   Preamble   The licenses for most software are designed   to take away your freedom to share and   change it. By contrast, the GNU General   Public Licenses are intended to guarantee   your freedom to share and change free   software--to make sure the software is free   for all its users.   To protect each distributor, we want to   make it very clear that there is no warranty   for the free library. Also, if the library is   modified by someone else and passed   on, the recipients should know that what   they have is not the original version,so   that the original author's reputation will   not be affected by problems that might be   introduced by others.   This license, the Lesser General Public   License, applies to some specially   designated software packages--typically   libraries--of the Free Software Foundation   and other authors who decide to use it.You   can use it too, but we suggest you first   think carefully about whether this license or   the ordinary General Public License is the   better strategy to use in any particular case,   based on the explanations below.   Finally, software patents pose a constant   threat to the existence of any free program.   We wish to make sure that a company   cannot effectively restrict the users of a free   program by obtaining a restrictive license   from a patent holder.   When we speak of free software, we are   referring to freedom of use, not price.   Our General Public Licenses are designed   to make sure that you have the freedom   to distribute copies of free software (and   charge for this service if you wish) ; that   you receive source code or can get it if you   want it ; that you can change the software   and use pieces of it in new free programs ;   and that you are informed that you can do   these things.   Therefore, we insist that any patent license   obtained for a version of the library must   be consistent with the full freedom of use   specified in this license.   Most GNU software, including some   libraries, is covered by the ordinary GNU   General Public License. This license, the   GNU Lesser General Public License,   applies to certain designated libraries, and   is quite different from the ordinary General   Public License. We use this license for   certain libraries in order to permit linking   those libraries into non-free programs.   To protect your rights, we need to make   restrictions that forbid distributors to deny   you these rights or to ask you to surrender   these rights. These restrictions translate to   certain responsibilities for you if you distribute   copies of the library or if you modify it.   When a program is linked with a library,   whether statically or using a shared library,   the combination of the two is legally   speaking a combined work, a derivative of   the original library. The ordinary General   Public License therefore permits such   linking only if the entire combination fits its   criteria of freedom.   For example, if you distribute copies of the   library, whether gratis or for a fee, you must   give the recipients all the rights that we   gave you. You must make sure that they,   too, receive or can get the source code.   If you link other code with the library, you   must provide complete object files to the   recipients, so that they can relink them with   the library after making changes to the library   and recompiling it. And you must show them   these terms so they know their rights.   The Lesser General Public License permits   more lax criteria for linking other code with   the library.   Download from Www.Somanuals.com. All Manuals Search And Download.   We call this license the "Lesser" General   Public License because it does Less   to protect the user's freedom than the   ordinary General Public License. It also   provides other free software developers   Less of an advantage over competing non-   free programs.   TERMS AND CONDITIONS FOR   COPYING, DISTRIBUTION AND   MODIFICATION   0. This License Agreement applies to any   software library or other program which   contains a notice placed by the copyright   holder or other authorized party saying   it may be distributed under the terms of   this Lesser General Public License (also   called "this License"). Each licensee is   addressed as "you".   These disadvantages are the reason we   use the ordinary General Public License for   many libraries. However, the Lesser license   provides advantages in certain special   circumstances.   A "library" means a collection of software   functions and/or data prepared so as to   be conveniently linked with application   programs (which use some of those   functions and data)to form executables.   For example, on rare occasions, there may   be a special need to encourage the widest   possible use of a certain library, so that it   becomes a de-facto standard. To achieve   this, non-free programs must be allowed to   use the library. A more frequent case is that   a free library does the same job as widely   used non-free libraries. In this case, there   is little to gain by limiting the free library to   free software only, so we use the Lesser   General Public License.   The "Library", below, refers to any such   software library or work which has been   distributed under these terms. A "work   based on the Library" means either the   Library or any derivative work under   copyright law : that is to say, a work   containing the Library or a portion of   it,either verbatim or with modifications   and/or translated straightforwardly into   another language. (Hereinafter, translation   is included without limitation in the term   "modification".)   In other cases,permission to use a   particular library in non-free programs   enables a greater number of people to use   a large body of free software. For example,   permission to use the GNU C Library in   non-free programs enables many more   people to use the whole GNU operating   system, as well as its variant, the GNU/   Linux operating system.   "Source code" for a work means the   preferred form of the work for making   modifications to it.   Although the Lesser General Public License   is Less protective of the users' freedom, it   does ensure that the user of a program that   is linked with the Library has the freedom   and the wherewithal to run that program   using a modified version of the Library.   For a library, complete source code   means all the source code for all modules   it contains, plus any associated interface   definition files, plus the scripts used to   control compilation and installation of the   library.   The precise terms and conditions for   copying, distribution and modification   follow. Pay close attention to the difference   between a "work based on the library" and   a "work that uses the library". The former   contains code derived from the library,   whereas the latter must be combined with   the library in order to run.   Activities other than copying, distribution   and modification are not covered by this   License ; they are outside its scope. The act   of running a program using the Library is not   restricted, and output from such a program   is covered only if its contents constitute a   work based on the Library (independent of   the use of the Library in a tool for writing it).   Download from Www.Somanuals.com. All Manuals Search And Download.   Whether that is true depends on what the   Library does and what the program that   uses the Library does.   (For example, a function in a library to   compute square roots has a purpose   that is entirely well-defined independent   of the application. Therefore,Subsection   2d requires that any application-supplied   function or table used by this function must   be optional : if the application does not   supply it, the square root function must still   compute square roots.)   1. You may copy and distribute verbatim   copies of the Library's complete source   code as you receive it, in any medium,   provided that you conspicuously and   appropriately publish on each copy   an appropriate copyright notice and   disclaimer of warranty ; keep intact all   the notices that refer to this License and   to the absence of any warranty ; and   distribute a copy of this License along   with the Library.   These requirements apply to the modified   work as a whole. If identifiable sections of that   work are not derived from the Library, and   can be reasonably considered independent   and separate works in themselves, then this   License, and its terms, do not apply to those   sections when you distribute them as separate   works. But when you distribute the same   sections as part of a whole which is a work   based on the Library, the distribution of the   whole must be on the terms of this License,   whose permissions for other licensees extend   to the entire whole, and thus to each and   every part regardless of who wrote it. Thus, it   is not the intent of this section to claim rights   or contest your rights to work written entirely   by you ; rather, the intent is to exercise the   right to control the distribution of derivative or   collective works based on the Library.   You may charge a fee for the physical act   of transferring a copy, and you may at   your option offer warranty protection in   exchange for a fee.   2. You may modify your copy or copies   of the Library or any portion of it, thus   forming a work based on the Library, and   copy and distribute such modifications   or work under the terms of Section 1   above, provided that you also meet all of   these conditions :   䭓 a)The modified work must itself be a   software library.   䭓 b)You must cause the files modified to   In addition, mere aggregation of another   work not based on the Library with the   Library (or with a work based on the   Library)on a volume of a storage or   carry prominent notices stating that   you changed the files and the date of   any change.   distribution medium does not bring the   other work under the scope of this License.   䭓 c)You must cause the whole of the work   to be licensed at no charge to all third   parties under the terms of this License.   3. You may opt to apply the terms of the   ordinary GNU General Public License   instead of this License to a given   䭓 d)If a facility in the modified Library refers   to a function or a table of data to be   supplied by an application program   that uses the facility, other than as   an argument passed when the facility   is invoked, then you must make a   good faith effort to ensure that, in the   event an application does not supply   such function or table, the facility still   operates, and performs whatever part   of its purpose remains meaningful.   copy of the Library. To do this, you   must alter all the notices that refer to   this License, so that they refer to the   ordinary GNU General Public License,   version 2, instead of to this License. (If   a newer version than version 2 of the   ordinary GNU General Public License   has appeared, then you can specify that   version instead if you wish.) Do not make   any other change in these notices.   Download from Www.Somanuals.com. All Manuals Search And Download.   Once this change is made in a given copy,   it isirreversible for that copy, so the ordinary   GNU General Public License applies to all   subsequent copies and derivative works   made from that copy.   Library, the object code for the work may   be a derivative work of the Library even   though the source code is not. Whether   this is true is especially significant if the   work can be linked without the Library, or if   the work is itself a library.   This option is useful when you wish to   copy part of the code of the Library into a   program that is not a library.   The threshold for this to be true is not   precisely defined by law.   4. You may copy and distribute the Library   (or a portion or derivative of it, under   Section 2) in object code or executable   form under the terms of Sections 1 and   2 above provided that you accompany   it with the complete corresponding   machine-readable source code,   which must be distributed under the   terms of Sections 1 and 2 above on a   medium customarily used for software   interchange.   If such an object file uses only numerical   parameters, data structure layouts   and accessors, and small macros and   small inline functions (ten lines or less in   length), then the use of the object file is   unrestricted, regardless of whether it is   legally a derivative work. (Executables   containing this object code plus portions   of the Library will still fall under Section 6.)   Otherwise, if the work is a derivative of the   Library, you may distribute the object code   for the work under the terms of Section.   If distribution of object code is made by   offering access to copy from a designated   place, then offering equivalent access to   copy the source code from the same place   satisfies the requirement to distribute the   source code, even though third parties are   not compelled to copy the source along   with the object code.   Any executables containing that work also   fall under Section 6, whether or not they are   linked directly with the Library itself.   6. As an exception to the Sections above,   you may also combine or link a "work   that uses the Library" with the Library   to produce a work containing portions   of the Library, and distribute that work   under terms of your choice,provided   that the terms permit modification of the   work for the customer's own use and   reverse engineering for debugging such   modifications.   5. A program that contains no derivative   of any portion of the Library, but is   designed to work with the Library by   being compiled or linked with it, is called   a "work that uses the Library". Such a   work, in isolation, is not a derivative work   of the Library, and therefore falls outside   the scope of this License.   You must give prominent notice with each   copy of the work that the Library is used   in it and that the Library and its use are   covered by this License. You must supply   a copy of this License. If the work during   execution displays copyright notices, you   must include the copyright notice for the   Library among them, as well as a reference   directing the user to the copy of this   License. Also, you must do one of these   things :   However, linking a "work that uses the   Library" with the Library creates an   executable that is a derivative of the Library   (because it contains portions of the Library),   rather than a "work that uses the library".   The executable is therefore covered by this   License.   Section 6 states terms for distribution of   such executables.   䭓 a)Accompany the work with the   When a "work that uses the Library" uses   material from a header file that is part of the   complete corresponding machine-   Download from Www.Somanuals.com. All Manuals Search And Download.   readable source code for the Library   including whatever changes were used   in the work (which must be distributed   under Sections 1 and 2 above) ; and,   if the work is an executable linked with   the Library, with the complete machine-   readable "work that uses the Library",   as object code and/or source code,   so that the user can modify the Library   and then relink to produce a modified   executable containing the modified   Library. (It is understood that the user   who changes the contents of definitions   files in the Library will not necessarily   be able to recompile the application to   use the modified definitions.)   from it. However, as a special exception,   the materials to be distributed need not   include anything that is normally distributed   (in either source or binary form)with the   major components (compiler, kernel, and   so on) of the operating system on which the   executable runs, unless that component itself   accompanies the executable. It may happen   that this requirement contradicts the license   restrictions of other proprietary libraries that   do not normally accompany the operating   system. Such a contradiction means you   cannot use both them and the Library   together in an executable that you distribute.   7. You may place library facilities that are   a work based on the Library side-by-   side in a single library together with   other library facilities not covered by this   License, and distribute such a combined   library, provided that the separate   distribution of the work based on the   Library and of the other library facilities is   otherwise permitted, and provided that   you do these two things :   䭓 b)Use a suitable shared library   mechanism for linking with the Library.   A suitable mechanism is one that   (1)uses at run time a copy of the library   already present on the user's computer   system, rather than copying library   functions into the executable, and   (2)will operate properly with a modified   version of the library, if the user installs   one,as long as the modified version is   interface-compatible with the version   that the work was made with.   䭓 a)Accompany the combined library with   a copy of the same work based on the   Library, uncombined with any other   library facilities. This must be distributed   under the terms of the Sections above.   䭓 c)Accompany the work with a written   offer, valid for at least three years,   to give the same user the materials   specified in Subsection 6a, above,   for a charge no more than the cost   ofperforming this distribution.   䭓 b)Give prominent notice with the   combined library of the fact that part   of it is a work based on the Library,   and explaining where to find the   accompanying uncombined form of the   same work.   䭓 䭓 d)If distribution of the work is made   by offering access to copy from a   designated place, offer equivalent   access to copy the above specified   materials from the same place.   8. You may not copy, modify, sublicense,   link with, or distribute the Library except   as expressly provided under this License.   Any attempt otherwise to copy, modify,   sublicense, link with, or distribute the   Library is void, and will automatically   terminate your rights under this License.   However, parties who have received   copies, or rights, from you under this   License will not have their licenses   terminated so long as such parties   remain in full compliance.   e)Verify that the user has already received   a copy of these materials or that you   have already sent this user a copy.   For an executable, the required form of   the "work that uses the Library" must   include any data and utility programs   needed for reproducing the executable   Download from Www.Somanuals.com. All Manuals Search And Download.   9. You are not required to accept this   License, since you have not signed it.   However, nothing else grants you   is intended to apply, and the section   as a whole is intended to apply in other   circumstances.   permission to modify or distribute the   Library or its derivative works.   It is not the purpose of this section to   induce you to infringe any patents or other   property right claims or to contest validity of   any such claims ; this section has the sole   purpose of protecting the integrity of the   free software distribution system which is   implemented by public license practices.   These actions are prohibited by law if you   do not accept this License. Therefore,   by modifying or distributing the Library   (or any work based on the Library), you   indicate your acceptance of this License   to do so, and all its terms and conditions   for copying, distributing or modifying the   Library or works based on it.   Many people have made generous   contributions to the wide range of software   distributed through that system in reliance   on consistent application of that system;it   is up to the author/donor to decide if he or   she is willing to distribute software through   any other system and a licensee cannot   impose that choice.   10.Each time you redistribute the Library   (or any work based on the Library), the   recipient automatically receives a license   from the original licensor to copy,   distribute, link with or modify the Library   subject to these terms and conditions.   You may not impose any further   restrictions on the recipients’ exercise   of the rights granted herein.You are not   responsible for enforcing compliance by   third parties with this License.   This section is intended to make thoroughly   clear what is believed to be a consequence   of the rest of this License.   12.If the distribution and/or use of the   Library is restricted in certain countries   either by patents or by copyrighted   interfaces, the original copyright   holder who places the Library under   this License may add an explicit   geographical distribution limitation   excluding those countries, so that   distribution is permitted only in or   among countries not thus excluded.In   such case, this License incorporates the   limitation as if written in the body of this   License.   11.If,as a consequence of a court judgment   or allegation of patent infringement or for   any other reason (not limited to patent   issues), conditions are imposed on you   (whether by court order, agreement or   otherwise)that contradict the conditions   of this License, they do not excuse you   from the conditions of this License. If   you cannot distribute so as to satisfy   simultaneously your obligations under   this License and any other pertinent   obligations, then as a consequence you   may not distribute the Library at all.   For example, if a patent license would   not permit royalty-free redistribution   of the Library by all those who receive   copies directly or indirectly through you,   then the only way you could satisfy both   it and this License would be to refrain   entirely from distribution of the Library.   13.The Free Software Foundation may   publish revised and/or new versions of   the Lesser General Public License from   time to time. Such new versions will be   similar in spirit to the present version,   but may differ in detail to address new   problems or concerns.   Each version is given a distinguishing   version number. If the Library specifies   a version number of this License which   applies to it and "any later version", you   have the option of following the terms and   If any portion of this section is held invalid   or unenforceable under any particular   circumstance, the balance of the section   Download from Www.Somanuals.com. All Manuals Search And Download.   conditions either of that version or of any   later version published by the Free Software   Foundation. If the Library does not specify   a license version number, you may choose   any version ever published by the Free   Software Foundation.   YOU FOR DAMAGES, INCLUDING ANY   GENERAL, SPECIAL, INCIDENTAL OR   CONSEQUENTIAL DAMAGES ARISING   OUT OF THE USE OR INABILITY TO   USE THE LIBRARY (INCLUDING BUT   NOT LIMITED TO LOSS OF DATA OR   DATA BEING RENDERED INACCURATE   OR LOSSES SUSTAINED BY YOU OR   THIRD PARTIES OR A FAILURE OF   THE LIBRARY TO OPERATE WITH ANY   OTHER SOFTWARE), EVEN IF SUCH   HOLDER OR OTHER PARTY HAS   BEEN ADVISED OF THE POSSIBILITY   OF SUCH DAMAGES.   14.If you wish to incorporate parts of the   Library into other free programs whose   distribution conditions are incompatible   with these, write to the author to ask   for permission. For software which   is copyrighted by the Free Software   Foundation, write to the Free Software   Foundation ; we sometimes make   exceptions for this. Our decision will be   guided by the two goals of preserving   the free status of all derivatives of our   free software and of promoting the   sharing and reuse of software generally.   END OF TERMS AND CONDITIONS   How to Apply These Terms to Your   New Libraries   If you develop a new library, and you want   it to be of the greatest possible use to   the public, we recommend making it free   software that everyone can redistribute   and change. You can do so by permitting   redistribution under these terms (or,   alternatively, under the terms of the ordinary   General Public License).   NO WARRANTY   15.BECAUSE THE LIBRARY IS LICENSED   FREE OF CHARGE, THERE IS NO   WARRANTY FOR THE LIBRARY,   TO THE EXTENT PERMITTED BY   APPLICABLE LAW. EXCEPT WHEN   OTHERWISE STATED IN WRITING   THE COPYRIGHT HOLDERS AND/   OR OTHER PARTIES PROVIDE THE   LIBRARY "ASIS" WITHOUT WARRANTY   OF ANYKIND, EITHER EXPRESSED   OR IMPLIED, INCLUDING, BUT NOT   LIMITED TO, THE IMPLIED WARRANTIES   OF MERCHANTABILITY AND FITNESS   FOR A PARTICULAR PURPOSE.THE   ENTIRE RISK AS TO THE QUALITY AND   PERFORMANCE OF THE LIBRARY IS   WITH YOU. SHOULD THE LIBRARY   PROVE DEFECTIVE, YOU ASSUME THE   COST OF ALL NECESSARY SERVICING,   REPAIR OR CORRECTION.   To apply these terms, attach the following   notices to the library. It is safest to attach   them to the start of each source file to most   effectively convey the exclusion of warranty   ; and each file should have at least the   "copyright" line and a pointer to where the   full notice is found.   One line to give the library's name and an   idea of what it does.   Copyright (C)year name of author   This library is free software ; you can   redistribute it and/or modify it under the   terms of the GNU Lesser General Public   License as published by the Free Software   Foundation ; either version 2.1 of the   License, or (at your option)any later version.   16.IN NO EVENT UNLESS REQUIRED BY   APPLICABLE LAW OR AGREED TO   IN WRITING WILL ANY COPYRIGHT   HOLDER, OR ANY OTHER PARTY   WHO MAY MODIFY AND/OR   REDISTRIBUTE THE LIBRARY AS   PERMITTED ABOVE, BE LIABLE TO   This library is distributed in the hope   that it will be useful, but WITHOUT ANY   Download from Www.Somanuals.com. All Manuals Search And Download.   WARRANTY ; without even the implied   warranty of MERCHANTABILITY or   FITNESS FOR A PARTICULAR PURPOSE.   See the GNU Lesser General Public   License for more details.   display the following acknowledgment :   "This product includes software   developed by the OpenSSL Project for   use in the OpenSSLToolkit. (http://www.   openssl.org/)"   4. The names "OpenSSL Toolkit" and   "OpenSSL Project" must not be used to   endorse or promote products derived   from this software without prior written   permission. For written permission, please   contact [email protected].   You should have received a copy of the   GNU Lesser General Public License along   with this library ; if not, write to the Free   Software Foundation, Inc.,51 Franklin Street,   Fifth Floor, Boston, MA 02110-1301 USA   Also add information on how to contact you   by electronic and paper mail.   5. Products derived from this software   may not be called "OpenSSL" nor   may "OpenSSL" appear in their names   without prior written permission of the   OpenSSL Project.   You should also get your employer (if you   work as a programmer)or your school, if   any, to sign a "copyright disclaimer" for the   library,if necessary. Here is a sample ; alter   the names:   6. Redistributions of any form whatsoever   must retain the following acknowledgment:   "This product includes software developed   by the OpenSSL Project for use in the   OpenSSL Toolkit (http://www.openssl.   org/)"   Yoyodyne, Inc., hereby disclaims all   copyright interest in the library `Frob'(a   library for tweaking knobs)written   by James Random Hacker.   signature of Ty Coon, 1 April 1990   Ty Coon, President of Vice   THIS SOFTWARE IS PROVIDED BY   THE OpenSSL PROJECT “AS IS   ” AND ANY EXPRESSED OR IMPLIED   WARRANTIES, INCLUDING, BUT   NOT LIMITED TO, THE IMPLIED   WARRANTIES OF MERCHANTABILITY   AND FITNESS FOR A PARTICULAR   PURPOSE ARE DISCLAIMED. IN   NO EVENT SHALL THE OpenSSL   PROJECT OR ITS CONTRIBUTORS BE   LIABLE FOR ANY DIRECT, INDIRECT,   INCIDENTAL, SPECIAL, EXEMPLARY,   OR CONSEQUENTIAL DAMAGES   (INCLUDING, BUT NOT LIMITED TO,   PROCUREMENT OF SUBSTITUTE GOODS   OR SERVICES ; LOSS OF USE,DATA,OR   PROFITS ; OR BUSINESS INTERRUPTION)   HOWEVER CAUSED AND ON ANY   THEORY OF LIABILITY, WHETHER IN   CONTRACT, STRICT LIABILITY, OR   TORT (INCLUDING NEGLIGENCE OR   OTHERWISE) ARISING IN ANY WAY OUT   OF THE USE OF THIS SOFTWARE, EVEN   IF ADVISED OF THE POSSIBILITY OF   SUCH DAMAGE.   OpenSSL LICENSE   Copyright (c)1998-2006 The OpenSSL   Project. All rights reserved.   Redistribution and use in source and   binary forms, with or without modification,   are permitted provided that the following   conditions are met :   1. Redistributions of source code must   retain the above copyright notice, this   list of conditions and the following   disclaimer.   2. Redistributions in binary form must   reproduce the above copyright notice,   this list of conditions and the following   disclaimer in the documentation   and/or other materials provided with the   distribution.   3. All advertising materials mentioning   features or use of this software must   Download from Www.Somanuals.com. All Manuals Search And Download.   This product includes cryptographic   software written by Eric Young (eay@   cryptsoft.com).   and/or other materials provided with the   distribution.   3. All advertising materials mentioning   features or use of this software must   display the following acknowledgement :   "This product includes cryptographic   software written by Eric Young (eay@   cryptsoft.com)" The word 'cryptographic'   can be left out if the rouines from the   library being used are not cryptographic   related :-).   This product includes software written by   Tim Hudson ([email protected]).   Original SSLeay License   Copyright (C)1995-1998 Eric Young   ([email protected]) All rights reserved.   This package is an SSL implementation   writtenby Eric Young ([email protected]).   The implementation was written so as to   conform with Netscapes SSL.   4. If you include any Windows specific code   (or a derivative thereof)from the apps   directory (application code) you must   include an acknowledgement :   "This product includes software written   by Tim Hudson ([email protected])"   This library is free for commercial and   noncommercial use as long as the following   conditions are aheared to. The following   conditions apply to all code found in this   distribution, be it the RC4, RSA, lhash,   DES, etc.,code ; not just the SSL code.   THIS SOFTWARE IS PROVIDED   BY ERIC YOUNG “AS IS” AND ANY   EXPRESS OR IMPLIED WARRANTIES,   INCLUDING, BUT NOT LIMITED TO,   THE IMPLIED WARRANTIES OF   The SSL documentation included with   this distribution is covered by the same   copyright terms except that the holder is   Tim Hudson ([email protected]).   MERCHANTABILITY AND FITNESS   FOR A PARTICULAR PURPOSE ARE   DISCLAIMED. IN NO EVENT SHALL   THE AUTHOR OR CONTRIBUTORS BE   LIABLE FOR ANY DIRECT, INDIRECT,   INCIDENTAL, SPECIAL, EXEMPLARY,   OR CONSEQUENTIAL DAMAGES   (INCLUDING, BUT NOT LIMITED TO,   PROCUREMENT OF SUBSTITUTE GOODS   OR SERVICES ; LOSS OF USE, DATA, OR   PROFITS ; OR BUSINESS INTERRUPTION)   HOWEVER CAUSED AND ON ANY   THEORY OF LIABILITY, WHETHER IN   CONTRACT, STRICT LIABILITY, OR   TORT (INCLUDING NEGLIGENCE OR   OTHERWISE)ARISING IN ANY WAY OUT   OF THE USE OF THIS SOFTWARE, EVEN   IF ADVISED OF THE POSSIBILITY OF   SUCH DAMAGE.   Copyright remains Eric Young's, and as   such any Copyright notices in the code are   not to be removed.   If this package is used in a product,Eric   Young should be given attribution as the   author of the parts of the library used.   This can be in the form of a textual   message at program startup or in   documentation (online or textual) provided   with the package.   Redistribution and use in source and   binary forms, with or without modification,   are permitted provided that the following   conditions are met :   1. Redistributions of source code must   retain the copyright notice, this list of   conditions and the following disclaimer.   The licence and distribution terms for any   publically available version or derivative of   this code cannot be changed.i.e.this code   cannot simply be copied and put under   another distribution licence [including the   GNU Public Licence.]   2. Redistributions in binary form must   reproduce the above copyright notice,   this list of conditions and the following   disclaimer in the documentation   Download from Www.Somanuals.com. All Manuals Search And Download.   (Waste Electrical & Electronic Equipment)   Correct Disposal of This Product   (Applicable in the European Union and other European countries with separate collection systems)   This marking on the product, accessories or literature indicates that the product and its electronic accessories (e.g. charger,   headset, USB cable) should not be disposed of with other household waste at the end of their working life. To prevent   possible harm to the environment or human health from uncontrolled waste disposal, please separate these items from other   types of waste and recycle them responsibly to promote the sustainable reuse of material resources.   Household users should contact either the retailer where they purchased this product, or their local government office, for   details of where and how they can take these items for environmentally safe recycling.   Business users should contact their supplier and check the terms and conditions of the purchase contract. This product and   its electronic accessories should not be mixed with other commercial wastes for disposal.   Download from Www.Somanuals.com. All Manuals Search And Download.   |