SlideShare a Scribd company logo
1 of 48
D-Link - IP Surveillance  IP Cameras / NVR / D-ViewCAM Xavier Campos ( [email_address] ) Product Manager Spain & Portugal Sevilla, 26 th  January  2010.
IP Surveillance D-Link
IP Surveillance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IP Surveillance Applications ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What’s going on when…?
IP Cameras Advanced Features D-Link
Megapixel Sensor ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Major Features of IP Surveillance Solution
Megapixel
Megapixel Sensor ,[object Object],[object Object],Major Features of IP Surveillance Solution Megapixel  VGA
16x Digital Zoom ,[object Object],Major Features of IP Surveillance Solution 1x video @ VGA resolution 16x digital zoom actual size of 36mm 16x zoom size of 2mm The left image is a 16x zoom image for 2mm length. The right image is around 18 pcs of 2mm actual length.  Therefore, DCS-2121/DCS-5230 supports 16x digital zoom
18x Optical Zoom Left image belongs to a DCS-3415 without applying any optical zoom.  Right image shows the result after applying 18x optical zoom.
Front End Storage ,[object Object],[object Object],Major Features of IP Surveillance Solution
Dual Stream / Multi-Profile ,[object Object],[object Object],[object Object],[object Object]
Dual Stream / Multi-Profile
3GPP Video Streaming ,[object Object]
Day & Night Solution ,[object Object],[object Object],[object Object],[object Object],ICR Lens Module With ICR Without ICR Filter glass.
Wide Dynamic Range (WDR) ,[object Object],[object Object],Normal Camera WDR Camera
Digital Input/Digital Output (DI/DO) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Motion Detection ,[object Object],[object Object],[object Object],[object Object],Figure A – Percentage Indicator Figure B – How motion detection work
Event Triggered Recording ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IP Surveillance Scenario DCS-3415 192.168.1.107 DCS-3110 192.168.1.105 DCS-7410 192.168.1.103 DCS-910  192.168.1.101 DCS-2121 192.168.1.104 DCS-3430 192.168.1.102 DCS-5230 192.168.1.100 DCS-5230 (IR) 192.168.1.106 DNS-726-4 192.168.1.69 D-ViewCAM Internet con IP Dinámica D-Link DDNS Host ipcameras.dlinkddns.com Internet
Device Deployed Information Device IP Address TCP/UDP ports Services Description URL for Remote Access DCS-5230 192.168.1.100 81,555 WEB, RTSP Management and 3GPP http://ipcameras.dlinkddns.com:81 rtsp://ipcameras.dlinkddns.com:555/3gpp DCS-910 192.168.1.101 82,556 WEB, RTSP Management and Monitoring http://ipcameras.dlinkddns.com:82 DCS-3430 192.168.1.102 83,557 WEB, RTSP Management and 3GPP http:// ipcameras .dlinkddns.com:83 rtsp:// ipcameras .dlinkddns.com:557/3gpp DCS-7410 192.168.1.103 84,558 WEB, RTSP Management and 3GPP http:// ipcameras .dlinkddns.com:84 rtsp:// ipcameras .dlinkddns.com:558/3gpp DCS-2121 192.168.1.104 85,559 WEB, RTSP Management and 3GPP http:// ipcameras.dlinkddns.com:85 rtsp://ipcameras.dlinkddns.com:559/3gpp DCS-3110 192.168.1.105 86,560 WEB, RTSP Management and Monitoring http://ipcameras.dlinkddns.com:86 DCS-5230 (IR) 192.168.1.106 89,561 WEB, RTSP Management and Monitoring http://ipcameras.dlinkddns.com:89 rtsp://ipcameras.dlinkddns.com:561/3gpp DCS-3415 192.168.1.107 88,562 WEB, RTSP Management and Monitoring http://ipcameras.dlinkddns.com:88 rtsp://ipcameras.dlinkddns.com:562/live2.sdp DNS-726-4 192.168.1.69 8082 WEB Management Video Recorder http://ipcameras.dlinkddns.com:8082
NVR
Network Video Recorder (NVR) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Network Video Recorder (NVR) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
NVR Features Comparison
NVR Benefits
Multiple Recording Schedules
Recording Auto Overwrite and Store Video ,[object Object],[object Object],[object Object],[object Object],[object Object],Day 5 Day 1 Day 4 Day 6 Day 3 Day 4 Day 2 Day 3 Day 5 Day 3 Automatic Overwrite Store video for 3 days Store for 3 days & Overwrite
AVI/ASF Outputs ,[object Object],[object Object]
Smart Search ,[object Object],[object Object],[object Object],[object Object],Target Area
Multiple Channel Playback ,[object Object],Snapshot Export Video Cue In and Cue Out Digital Zoom Playback Speed
D-View CAM v3.0
System Features ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Storage Table Resolution Frame Rate Image Quality HDD Record Time VGA(640x480) 10fps Good 1TB 40 days,12 hours CIF(320x240) 30fps Good 1TB 31 days,2 hours VGA(640x480) 30fps Excellent 1TB 7 days,8 hours VGA(640x480) 30fps Excellent 2TB 14 days,16 hours
Configure Auto-Patrol ,[object Object],[object Object],[object Object]
Annex
[object Object],[object Object],DYNDNS Service (www.dlinkddns.com)
DYNDNS Service (www.dlinkddns.com) ,[object Object],[object Object]
DYNDNS Service (www.dlinkddns.com) ,[object Object]
Port Mapping Firewall Configuration ,[object Object],[object Object],[object Object]
Port Mapping Firewall Configuration
Port Mapping Firewall Configuration ,[object Object],[object Object],[object Object]
Port Mapping Firewall Configuration
IP66 and IP44 (Environmental Certification) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Rule of IP Code – IP66 and IP44 IP first number Protection against solid object IP second number Protection against liquid 0 No Protection 1 Protected against solid objects up to 50mm, e.g. accidental touch by hands. 2 Protected against solid objects up to 12mm, e.g. fingers. 3 Protected against solid objects over 2.5mm (tools and wires). 4 Protected against solid objects over 1mm (tools, wire, and small wires). 5 Protected against dust limited ingress (no harmful deposit). 6 Totally protected against dust. 0 No protection. 1 Protection against vertically falling drops of water e.g. condensation. 2 Protection against direct sprays of water up to 15° from the vertical. 3 Protected against direct sprays of water up to 60° from the vertical. 4 Protection against water sprayed from all directions. limited ingress permitted. 5 Protected against low pressure jets of water from all directions. limited ingress. 6 Protected against low pressure jets of water, e.g. for use on ship decks - limited ingress permitted. 7 Protected against the effect of immersion between 15cm and 1m. 8 Protects against long periods of immersion under pressure.
Wired-in Bracket ,[object Object]
Gracias! ,[object Object]

More Related Content

What's hot

Surveon Megapxiel Camera Product Introduction
Surveon Megapxiel Camera Product IntroductionSurveon Megapxiel Camera Product Introduction
Surveon Megapxiel Camera Product IntroductionSurveon Technology Inc.
 
CDS Hikvision Intro 2012 V.1
CDS  Hikvision Intro 2012 V.1CDS  Hikvision Intro 2012 V.1
CDS Hikvision Intro 2012 V.1mos81
 
Hikvision CCTV cameras Price in Bangalore - Call: 09066656366
Hikvision CCTV cameras Price in Bangalore - Call: 09066656366Hikvision CCTV cameras Price in Bangalore - Call: 09066656366
Hikvision CCTV cameras Price in Bangalore - Call: 09066656366RajaGopal Reddy
 
Case Study - Garmin - May 2014
Case Study - Garmin - May 2014Case Study - Garmin - May 2014
Case Study - Garmin - May 2014Tim Rowe
 
Nemo handy s-3.60_display_guide_for_n97_c503_c504_c7_e7_500
Nemo handy s-3.60_display_guide_for_n97_c503_c504_c7_e7_500Nemo handy s-3.60_display_guide_for_n97_c503_c504_c7_e7_500
Nemo handy s-3.60_display_guide_for_n97_c503_c504_c7_e7_500Serkan Kahveci
 
CCTV Training Bulletins
CCTV Training BulletinsCCTV Training Bulletins
CCTV Training BulletinsHeidi Schmidt
 
Blaze automation profile jan 2013
Blaze automation profile jan 2013  Blaze automation profile jan 2013
Blaze automation profile jan 2013 Blaze_Hyd
 
Ip cameras vs analog cameras
Ip cameras vs analog camerasIp cameras vs analog cameras
Ip cameras vs analog camerassiscomtech
 
02 cctv camera specification
02 cctv camera specification02 cctv camera specification
02 cctv camera specificationNader Elmansi
 
VMukti Catalogue - V 2.1 - 2016 (1)
VMukti Catalogue  - V 2.1 - 2016 (1)VMukti Catalogue  - V 2.1 - 2016 (1)
VMukti Catalogue - V 2.1 - 2016 (1)Hardik Sanghvi
 

What's hot (17)

Web Based Cctv
Web Based CctvWeb Based Cctv
Web Based Cctv
 
Surveon Megapxiel Camera Product Introduction
Surveon Megapxiel Camera Product IntroductionSurveon Megapxiel Camera Product Introduction
Surveon Megapxiel Camera Product Introduction
 
CDS Hikvision Intro 2012 V.1
CDS  Hikvision Intro 2012 V.1CDS  Hikvision Intro 2012 V.1
CDS Hikvision Intro 2012 V.1
 
Envision - An Overview of Solutions & Services
Envision - An Overview of Solutions & ServicesEnvision - An Overview of Solutions & Services
Envision - An Overview of Solutions & Services
 
Hikvision CCTV cameras Price in Bangalore - Call: 09066656366
Hikvision CCTV cameras Price in Bangalore - Call: 09066656366Hikvision CCTV cameras Price in Bangalore - Call: 09066656366
Hikvision CCTV cameras Price in Bangalore - Call: 09066656366
 
Cctv presentation
Cctv presentationCctv presentation
Cctv presentation
 
Case Study - Garmin - May 2014
Case Study - Garmin - May 2014Case Study - Garmin - May 2014
Case Study - Garmin - May 2014
 
Nemo handy s-3.60_display_guide_for_n97_c503_c504_c7_e7_500
Nemo handy s-3.60_display_guide_for_n97_c503_c504_c7_e7_500Nemo handy s-3.60_display_guide_for_n97_c503_c504_c7_e7_500
Nemo handy s-3.60_display_guide_for_n97_c503_c504_c7_e7_500
 
CCTV Training Bulletins
CCTV Training BulletinsCCTV Training Bulletins
CCTV Training Bulletins
 
Hasco serices
Hasco sericesHasco serices
Hasco serices
 
The easy path to network video
The easy path to network videoThe easy path to network video
The easy path to network video
 
Blaze automation profile jan 2013
Blaze automation profile jan 2013  Blaze automation profile jan 2013
Blaze automation profile jan 2013
 
Ip cameras vs analog cameras
Ip cameras vs analog camerasIp cameras vs analog cameras
Ip cameras vs analog cameras
 
Mdvr H264
Mdvr H264Mdvr H264
Mdvr H264
 
02 cctv camera specification
02 cctv camera specification02 cctv camera specification
02 cctv camera specification
 
Nemo fsr1 scanner user manual
Nemo fsr1 scanner user manualNemo fsr1 scanner user manual
Nemo fsr1 scanner user manual
 
VMukti Catalogue - V 2.1 - 2016 (1)
VMukti Catalogue  - V 2.1 - 2016 (1)VMukti Catalogue  - V 2.1 - 2016 (1)
VMukti Catalogue - V 2.1 - 2016 (1)
 

Viewers also liked

Seguridad en Apache Web Server
Seguridad en Apache Web ServerSeguridad en Apache Web Server
Seguridad en Apache Web ServerChema Alonso
 
Fortificación de MS SharePon
Fortificación de MS SharePonFortificación de MS SharePon
Fortificación de MS SharePonChema Alonso
 
Portátiles A Prueba De Robos
Portátiles A Prueba De RobosPortátiles A Prueba De Robos
Portátiles A Prueba De RobosChema Alonso
 
MS Forefront Client Security
MS Forefront Client SecurityMS Forefront Client Security
MS Forefront Client SecurityChema Alonso
 
Default Passwords: Adelante por favor
Default Passwords: Adelante por favorDefault Passwords: Adelante por favor
Default Passwords: Adelante por favorChema Alonso
 
Asegúr@IT 7: Serialized SQL Injection
Asegúr@IT 7: Serialized SQL InjectionAsegúr@IT 7: Serialized SQL Injection
Asegúr@IT 7: Serialized SQL InjectionChema Alonso
 
Seguridad en Navegadores
Seguridad en NavegadoresSeguridad en Navegadores
Seguridad en NavegadoresChema Alonso
 
Navegadores en la Empresa
Navegadores en la EmpresaNavegadores en la Empresa
Navegadores en la EmpresaChema Alonso
 
Connection String Parameter Pollution Attacks
Connection String Parameter Pollution AttacksConnection String Parameter Pollution Attacks
Connection String Parameter Pollution AttacksChema Alonso
 
Apadrina un malware
Apadrina un malwareApadrina un malware
Apadrina un malwareChema Alonso
 
RootedCON 2011: DUST
RootedCON 2011: DUSTRootedCON 2011: DUST
RootedCON 2011: DUSTChema Alonso
 
Hacking, Ciberguerra y otros Palabros
Hacking, Ciberguerra y otros PalabrosHacking, Ciberguerra y otros Palabros
Hacking, Ciberguerra y otros PalabrosChema Alonso
 
MetaShield Protector & FOCA 2.0
MetaShield Protector & FOCA 2.0MetaShield Protector & FOCA 2.0
MetaShield Protector & FOCA 2.0Chema Alonso
 
Asegúr@IT 7 - Forefront UAG 2010
Asegúr@IT 7 - Forefront UAG 2010Asegúr@IT 7 - Forefront UAG 2010
Asegúr@IT 7 - Forefront UAG 2010Chema Alonso
 
Codemotion 2013: Feliz 15 aniversario, SQL Injection
Codemotion 2013: Feliz 15 aniversario, SQL InjectionCodemotion 2013: Feliz 15 aniversario, SQL Injection
Codemotion 2013: Feliz 15 aniversario, SQL InjectionChema Alonso
 
Hachetetepé dos puntos SLAAC SLAAC
Hachetetepé dos puntos SLAAC SLAACHachetetepé dos puntos SLAAC SLAAC
Hachetetepé dos puntos SLAAC SLAACChema Alonso
 
FC00::1 (Algunos) Ataques en IPv6
FC00::1 (Algunos) Ataques en IPv6FC00::1 (Algunos) Ataques en IPv6
FC00::1 (Algunos) Ataques en IPv6Chema Alonso
 
WebBrowsing Fingerprinting y Privacidad en entornos de Big Data
WebBrowsing Fingerprinting y Privacidad en entornos de Big DataWebBrowsing Fingerprinting y Privacidad en entornos de Big Data
WebBrowsing Fingerprinting y Privacidad en entornos de Big DataChema Alonso
 
XSS Google Persistentes
XSS Google PersistentesXSS Google Persistentes
XSS Google PersistentesChema Alonso
 

Viewers also liked (20)

Seguridad en Apache Web Server
Seguridad en Apache Web ServerSeguridad en Apache Web Server
Seguridad en Apache Web Server
 
Fortificación de MS SharePon
Fortificación de MS SharePonFortificación de MS SharePon
Fortificación de MS SharePon
 
Portátiles A Prueba De Robos
Portátiles A Prueba De RobosPortátiles A Prueba De Robos
Portátiles A Prueba De Robos
 
MS Forefront Client Security
MS Forefront Client SecurityMS Forefront Client Security
MS Forefront Client Security
 
Default Passwords: Adelante por favor
Default Passwords: Adelante por favorDefault Passwords: Adelante por favor
Default Passwords: Adelante por favor
 
Asegúr@IT 7: Serialized SQL Injection
Asegúr@IT 7: Serialized SQL InjectionAsegúr@IT 7: Serialized SQL Injection
Asegúr@IT 7: Serialized SQL Injection
 
Seguridad en Navegadores
Seguridad en NavegadoresSeguridad en Navegadores
Seguridad en Navegadores
 
Navegadores en la Empresa
Navegadores en la EmpresaNavegadores en la Empresa
Navegadores en la Empresa
 
Connection String Parameter Pollution Attacks
Connection String Parameter Pollution AttacksConnection String Parameter Pollution Attacks
Connection String Parameter Pollution Attacks
 
Apadrina un malware
Apadrina un malwareApadrina un malware
Apadrina un malware
 
RootedCON 2011: DUST
RootedCON 2011: DUSTRootedCON 2011: DUST
RootedCON 2011: DUST
 
Hacking, Ciberguerra y otros Palabros
Hacking, Ciberguerra y otros PalabrosHacking, Ciberguerra y otros Palabros
Hacking, Ciberguerra y otros Palabros
 
MetaShield Protector & FOCA 2.0
MetaShield Protector & FOCA 2.0MetaShield Protector & FOCA 2.0
MetaShield Protector & FOCA 2.0
 
Asegúr@IT 7 - Forefront UAG 2010
Asegúr@IT 7 - Forefront UAG 2010Asegúr@IT 7 - Forefront UAG 2010
Asegúr@IT 7 - Forefront UAG 2010
 
Codemotion 2013: Feliz 15 aniversario, SQL Injection
Codemotion 2013: Feliz 15 aniversario, SQL InjectionCodemotion 2013: Feliz 15 aniversario, SQL Injection
Codemotion 2013: Feliz 15 aniversario, SQL Injection
 
Defcon 18: FOCA 2
Defcon 18: FOCA 2Defcon 18: FOCA 2
Defcon 18: FOCA 2
 
Hachetetepé dos puntos SLAAC SLAAC
Hachetetepé dos puntos SLAAC SLAACHachetetepé dos puntos SLAAC SLAAC
Hachetetepé dos puntos SLAAC SLAAC
 
FC00::1 (Algunos) Ataques en IPv6
FC00::1 (Algunos) Ataques en IPv6FC00::1 (Algunos) Ataques en IPv6
FC00::1 (Algunos) Ataques en IPv6
 
WebBrowsing Fingerprinting y Privacidad en entornos de Big Data
WebBrowsing Fingerprinting y Privacidad en entornos de Big DataWebBrowsing Fingerprinting y Privacidad en entornos de Big Data
WebBrowsing Fingerprinting y Privacidad en entornos de Big Data
 
XSS Google Persistentes
XSS Google PersistentesXSS Google Persistentes
XSS Google Persistentes
 

Similar to Circuitos de Video Vigilancia IP

Updated Nu Surveillance Power Point
Updated Nu Surveillance Power PointUpdated Nu Surveillance Power Point
Updated Nu Surveillance Power Pointch1ris
 
Digital Watchdog DWC-MV421TIRB User Manual
Digital Watchdog DWC-MV421TIRB User ManualDigital Watchdog DWC-MV421TIRB User Manual
Digital Watchdog DWC-MV421TIRB User ManualJMAC Supply
 
Digital Watchdog DWC-MV421DB User Manual
Digital Watchdog DWC-MV421DB User ManualDigital Watchdog DWC-MV421DB User Manual
Digital Watchdog DWC-MV421DB User ManualJMAC Supply
 
OpenEye Optix Network Cameras
OpenEye Optix Network CamerasOpenEye Optix Network Cameras
OpenEye Optix Network Camerasopeneyevideo
 
4 camera cctv quotation bangladesh
4 camera cctv quotation bangladesh4 camera cctv quotation bangladesh
4 camera cctv quotation bangladeshJamField Solution
 
4 camera cctv quotation www.unicodebd.com
4 camera cctv quotation www.unicodebd.com4 camera cctv quotation www.unicodebd.com
4 camera cctv quotation www.unicodebd.comJamField Solution
 
Digital Watchdog DWC-MD421DB User Manual
Digital Watchdog DWC-MD421DB User ManualDigital Watchdog DWC-MD421DB User Manual
Digital Watchdog DWC-MD421DB User ManualJMAC Supply
 
Digital Watchdog DWC-MD421TIRB User Manual
Digital Watchdog DWC-MD421TIRB User ManualDigital Watchdog DWC-MD421TIRB User Manual
Digital Watchdog DWC-MD421TIRB User ManualJMAC Supply
 
ipcamerasvsanalogcameras-210126064349 (1).pdf
ipcamerasvsanalogcameras-210126064349 (1).pdfipcamerasvsanalogcameras-210126064349 (1).pdf
ipcamerasvsanalogcameras-210126064349 (1).pdfPattyElwell
 
Redeployable CCTV: WCCTV 4G IR Speed Dome Plus
Redeployable CCTV: WCCTV 4G IR Speed Dome PlusRedeployable CCTV: WCCTV 4G IR Speed Dome Plus
Redeployable CCTV: WCCTV 4G IR Speed Dome PlusDaniel Del Soldato
 
Air Live FE-201DM - Especificaciones
Air Live FE-201DM - EspecificacionesAir Live FE-201DM - Especificaciones
Air Live FE-201DM - Especificacioneslcdtcorp
 
iTM Banking Security Presentation
iTM Banking Security PresentationiTM Banking Security Presentation
iTM Banking Security Presentationmaitretester
 

Similar to Circuitos de Video Vigilancia IP (20)

Updated Nu Surveillance Power Point
Updated Nu Surveillance Power PointUpdated Nu Surveillance Power Point
Updated Nu Surveillance Power Point
 
Digital Watchdog DWC-MV421TIRB User Manual
Digital Watchdog DWC-MV421TIRB User ManualDigital Watchdog DWC-MV421TIRB User Manual
Digital Watchdog DWC-MV421TIRB User Manual
 
Digital Watchdog DWC-MV421DB User Manual
Digital Watchdog DWC-MV421DB User ManualDigital Watchdog DWC-MV421DB User Manual
Digital Watchdog DWC-MV421DB User Manual
 
ZKTeco CCTV products Catalogue
ZKTeco CCTV products CatalogueZKTeco CCTV products Catalogue
ZKTeco CCTV products Catalogue
 
Ip Cam
Ip CamIp Cam
Ip Cam
 
OpenEye Optix Network Cameras
OpenEye Optix Network CamerasOpenEye Optix Network Cameras
OpenEye Optix Network Cameras
 
Ip cctv surveillance
Ip cctv surveillanceIp cctv surveillance
Ip cctv surveillance
 
H.264 MDVRs
H.264 MDVRsH.264 MDVRs
H.264 MDVRs
 
4 camera cctv quotation bangladesh
4 camera cctv quotation bangladesh4 camera cctv quotation bangladesh
4 camera cctv quotation bangladesh
 
4 camera cctv quotation www.unicodebd.com
4 camera cctv quotation www.unicodebd.com4 camera cctv quotation www.unicodebd.com
4 camera cctv quotation www.unicodebd.com
 
Air vision
Air vision Air vision
Air vision
 
Why ip060810
Why ip060810Why ip060810
Why ip060810
 
vivotek_ipcctv_handbook.pdf
vivotek_ipcctv_handbook.pdfvivotek_ipcctv_handbook.pdf
vivotek_ipcctv_handbook.pdf
 
Digital Watchdog DWC-MD421DB User Manual
Digital Watchdog DWC-MD421DB User ManualDigital Watchdog DWC-MD421DB User Manual
Digital Watchdog DWC-MD421DB User Manual
 
Digital Watchdog DWC-MD421TIRB User Manual
Digital Watchdog DWC-MD421TIRB User ManualDigital Watchdog DWC-MD421TIRB User Manual
Digital Watchdog DWC-MD421TIRB User Manual
 
ipcamerasvsanalogcameras-210126064349 (1).pdf
ipcamerasvsanalogcameras-210126064349 (1).pdfipcamerasvsanalogcameras-210126064349 (1).pdf
ipcamerasvsanalogcameras-210126064349 (1).pdf
 
Redeployable CCTV: WCCTV 4G IR Speed Dome Plus
Redeployable CCTV: WCCTV 4G IR Speed Dome PlusRedeployable CCTV: WCCTV 4G IR Speed Dome Plus
Redeployable CCTV: WCCTV 4G IR Speed Dome Plus
 
Air Live FE-201DM - Especificaciones
Air Live FE-201DM - EspecificacionesAir Live FE-201DM - Especificaciones
Air Live FE-201DM - Especificaciones
 
iTM Banking Security Presentation
iTM Banking Security PresentationiTM Banking Security Presentation
iTM Banking Security Presentation
 
Nuevo mini-domo PTZ de Lilin
Nuevo mini-domo PTZ de LilinNuevo mini-domo PTZ de Lilin
Nuevo mini-domo PTZ de Lilin
 

More from Chema Alonso

CyberCamp 2015: Low Hanging Fruit
CyberCamp 2015: Low Hanging FruitCyberCamp 2015: Low Hanging Fruit
CyberCamp 2015: Low Hanging FruitChema Alonso
 
Índice Pentesting con Kali 2.0
Índice Pentesting con Kali 2.0Índice Pentesting con Kali 2.0
Índice Pentesting con Kali 2.0Chema Alonso
 
Configurar y utilizar Latch en Magento
Configurar y utilizar Latch en MagentoConfigurar y utilizar Latch en Magento
Configurar y utilizar Latch en MagentoChema Alonso
 
Cazando Cibercriminales con: OSINT + Cloud Computing + Big Data
Cazando Cibercriminales con: OSINT + Cloud Computing + Big DataCazando Cibercriminales con: OSINT + Cloud Computing + Big Data
Cazando Cibercriminales con: OSINT + Cloud Computing + Big DataChema Alonso
 
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...New Paradigms of Digital Identity: Authentication & Authorization as a Servic...
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...Chema Alonso
 
CritoReto 4: Buscando una aguja en un pajar
CritoReto 4: Buscando una aguja en un pajarCritoReto 4: Buscando una aguja en un pajar
CritoReto 4: Buscando una aguja en un pajarChema Alonso
 
Dorking & Pentesting with Tacyt
Dorking & Pentesting with TacytDorking & Pentesting with Tacyt
Dorking & Pentesting with TacytChema Alonso
 
Pentesting con PowerShell: Libro de 0xWord
Pentesting con PowerShell: Libro de 0xWordPentesting con PowerShell: Libro de 0xWord
Pentesting con PowerShell: Libro de 0xWordChema Alonso
 
Recuperar dispositivos de sonido en Windows Vista y Windows 7
Recuperar dispositivos de sonido en Windows Vista y Windows 7Recuperar dispositivos de sonido en Windows Vista y Windows 7
Recuperar dispositivos de sonido en Windows Vista y Windows 7Chema Alonso
 
It's a Kind of Magic
It's a Kind of MagicIt's a Kind of Magic
It's a Kind of MagicChema Alonso
 
Ingenieros y hackers
Ingenieros y hackersIngenieros y hackers
Ingenieros y hackersChema Alonso
 
Cuarta Edición del Curso Online de Especialización en Seguridad Informática p...
Cuarta Edición del Curso Online de Especialización en Seguridad Informática p...Cuarta Edición del Curso Online de Especialización en Seguridad Informática p...
Cuarta Edición del Curso Online de Especialización en Seguridad Informática p...Chema Alonso
 
Auditoría de TrueCrypt: Informe final fase II
Auditoría de TrueCrypt: Informe final fase IIAuditoría de TrueCrypt: Informe final fase II
Auditoría de TrueCrypt: Informe final fase IIChema Alonso
 
El juego es el mismo
El juego es el mismoEl juego es el mismo
El juego es el mismoChema Alonso
 
El Hardware en Apple ¿Es tan bueno?
El Hardware en Apple ¿Es tan bueno?El Hardware en Apple ¿Es tan bueno?
El Hardware en Apple ¿Es tan bueno?Chema Alonso
 
Latch en Linux (Ubuntu): El cerrojo digital
Latch en Linux (Ubuntu): El cerrojo digitalLatch en Linux (Ubuntu): El cerrojo digital
Latch en Linux (Ubuntu): El cerrojo digitalChema Alonso
 
Hacking con Python
Hacking con PythonHacking con Python
Hacking con PythonChema Alonso
 
Tu iPhone es tan (in)seguro como tu Windows
Tu iPhone es tan (in)seguro como tu WindowsTu iPhone es tan (in)seguro como tu Windows
Tu iPhone es tan (in)seguro como tu WindowsChema Alonso
 

More from Chema Alonso (20)

CyberCamp 2015: Low Hanging Fruit
CyberCamp 2015: Low Hanging FruitCyberCamp 2015: Low Hanging Fruit
CyberCamp 2015: Low Hanging Fruit
 
Índice Pentesting con Kali 2.0
Índice Pentesting con Kali 2.0Índice Pentesting con Kali 2.0
Índice Pentesting con Kali 2.0
 
Configurar y utilizar Latch en Magento
Configurar y utilizar Latch en MagentoConfigurar y utilizar Latch en Magento
Configurar y utilizar Latch en Magento
 
Cazando Cibercriminales con: OSINT + Cloud Computing + Big Data
Cazando Cibercriminales con: OSINT + Cloud Computing + Big DataCazando Cibercriminales con: OSINT + Cloud Computing + Big Data
Cazando Cibercriminales con: OSINT + Cloud Computing + Big Data
 
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...New Paradigms of Digital Identity: Authentication & Authorization as a Servic...
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...
 
CritoReto 4: Buscando una aguja en un pajar
CritoReto 4: Buscando una aguja en un pajarCritoReto 4: Buscando una aguja en un pajar
CritoReto 4: Buscando una aguja en un pajar
 
Dorking & Pentesting with Tacyt
Dorking & Pentesting with TacytDorking & Pentesting with Tacyt
Dorking & Pentesting with Tacyt
 
Pentesting con PowerShell: Libro de 0xWord
Pentesting con PowerShell: Libro de 0xWordPentesting con PowerShell: Libro de 0xWord
Pentesting con PowerShell: Libro de 0xWord
 
Foca API v0.1
Foca API v0.1Foca API v0.1
Foca API v0.1
 
Recuperar dispositivos de sonido en Windows Vista y Windows 7
Recuperar dispositivos de sonido en Windows Vista y Windows 7Recuperar dispositivos de sonido en Windows Vista y Windows 7
Recuperar dispositivos de sonido en Windows Vista y Windows 7
 
It's a Kind of Magic
It's a Kind of MagicIt's a Kind of Magic
It's a Kind of Magic
 
Ingenieros y hackers
Ingenieros y hackersIngenieros y hackers
Ingenieros y hackers
 
Cuarta Edición del Curso Online de Especialización en Seguridad Informática p...
Cuarta Edición del Curso Online de Especialización en Seguridad Informática p...Cuarta Edición del Curso Online de Especialización en Seguridad Informática p...
Cuarta Edición del Curso Online de Especialización en Seguridad Informática p...
 
Auditoría de TrueCrypt: Informe final fase II
Auditoría de TrueCrypt: Informe final fase IIAuditoría de TrueCrypt: Informe final fase II
Auditoría de TrueCrypt: Informe final fase II
 
El juego es el mismo
El juego es el mismoEl juego es el mismo
El juego es el mismo
 
El Hardware en Apple ¿Es tan bueno?
El Hardware en Apple ¿Es tan bueno?El Hardware en Apple ¿Es tan bueno?
El Hardware en Apple ¿Es tan bueno?
 
Latch en Linux (Ubuntu): El cerrojo digital
Latch en Linux (Ubuntu): El cerrojo digitalLatch en Linux (Ubuntu): El cerrojo digital
Latch en Linux (Ubuntu): El cerrojo digital
 
Hacking con Python
Hacking con PythonHacking con Python
Hacking con Python
 
Shuabang Botnet
Shuabang BotnetShuabang Botnet
Shuabang Botnet
 
Tu iPhone es tan (in)seguro como tu Windows
Tu iPhone es tan (in)seguro como tu WindowsTu iPhone es tan (in)seguro como tu Windows
Tu iPhone es tan (in)seguro como tu Windows
 

Recently uploaded

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 

Recently uploaded (20)

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 

Circuitos de Video Vigilancia IP

  • 1. D-Link - IP Surveillance IP Cameras / NVR / D-ViewCAM Xavier Campos ( [email_address] ) Product Manager Spain & Portugal Sevilla, 26 th January 2010.
  • 3.
  • 4.
  • 5. What’s going on when…?
  • 6. IP Cameras Advanced Features D-Link
  • 7.
  • 9.
  • 10.
  • 11. 18x Optical Zoom Left image belongs to a DCS-3415 without applying any optical zoom. Right image shows the result after applying 18x optical zoom.
  • 12.
  • 13.
  • 14. Dual Stream / Multi-Profile
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21. IP Surveillance Scenario DCS-3415 192.168.1.107 DCS-3110 192.168.1.105 DCS-7410 192.168.1.103 DCS-910 192.168.1.101 DCS-2121 192.168.1.104 DCS-3430 192.168.1.102 DCS-5230 192.168.1.100 DCS-5230 (IR) 192.168.1.106 DNS-726-4 192.168.1.69 D-ViewCAM Internet con IP Dinámica D-Link DDNS Host ipcameras.dlinkddns.com Internet
  • 22. Device Deployed Information Device IP Address TCP/UDP ports Services Description URL for Remote Access DCS-5230 192.168.1.100 81,555 WEB, RTSP Management and 3GPP http://ipcameras.dlinkddns.com:81 rtsp://ipcameras.dlinkddns.com:555/3gpp DCS-910 192.168.1.101 82,556 WEB, RTSP Management and Monitoring http://ipcameras.dlinkddns.com:82 DCS-3430 192.168.1.102 83,557 WEB, RTSP Management and 3GPP http:// ipcameras .dlinkddns.com:83 rtsp:// ipcameras .dlinkddns.com:557/3gpp DCS-7410 192.168.1.103 84,558 WEB, RTSP Management and 3GPP http:// ipcameras .dlinkddns.com:84 rtsp:// ipcameras .dlinkddns.com:558/3gpp DCS-2121 192.168.1.104 85,559 WEB, RTSP Management and 3GPP http:// ipcameras.dlinkddns.com:85 rtsp://ipcameras.dlinkddns.com:559/3gpp DCS-3110 192.168.1.105 86,560 WEB, RTSP Management and Monitoring http://ipcameras.dlinkddns.com:86 DCS-5230 (IR) 192.168.1.106 89,561 WEB, RTSP Management and Monitoring http://ipcameras.dlinkddns.com:89 rtsp://ipcameras.dlinkddns.com:561/3gpp DCS-3415 192.168.1.107 88,562 WEB, RTSP Management and Monitoring http://ipcameras.dlinkddns.com:88 rtsp://ipcameras.dlinkddns.com:562/live2.sdp DNS-726-4 192.168.1.69 8082 WEB Management Video Recorder http://ipcameras.dlinkddns.com:8082
  • 23. NVR
  • 24.
  • 25.
  • 29.
  • 30.
  • 31.
  • 32.
  • 34.
  • 35. Storage Table Resolution Frame Rate Image Quality HDD Record Time VGA(640x480) 10fps Good 1TB 40 days,12 hours CIF(320x240) 30fps Good 1TB 31 days,2 hours VGA(640x480) 30fps Excellent 1TB 7 days,8 hours VGA(640x480) 30fps Excellent 2TB 14 days,16 hours
  • 36.
  • 37. Annex
  • 38.
  • 39.
  • 40.
  • 41.
  • 42. Port Mapping Firewall Configuration
  • 43.
  • 44. Port Mapping Firewall Configuration
  • 45.
  • 46. Rule of IP Code – IP66 and IP44 IP first number Protection against solid object IP second number Protection against liquid 0 No Protection 1 Protected against solid objects up to 50mm, e.g. accidental touch by hands. 2 Protected against solid objects up to 12mm, e.g. fingers. 3 Protected against solid objects over 2.5mm (tools and wires). 4 Protected against solid objects over 1mm (tools, wire, and small wires). 5 Protected against dust limited ingress (no harmful deposit). 6 Totally protected against dust. 0 No protection. 1 Protection against vertically falling drops of water e.g. condensation. 2 Protection against direct sprays of water up to 15° from the vertical. 3 Protected against direct sprays of water up to 60° from the vertical. 4 Protection against water sprayed from all directions. limited ingress permitted. 5 Protected against low pressure jets of water from all directions. limited ingress. 6 Protected against low pressure jets of water, e.g. for use on ship decks - limited ingress permitted. 7 Protected against the effect of immersion between 15cm and 1m. 8 Protects against long periods of immersion under pressure.
  • 47.
  • 48.