LevelOne Digital Camera FCS 1000 User Manual

LevelOne  
FCS-1000  
IP Network Camera  
WCS-2000  
Wireless IP Network Camera  
User’s Manual  
VERSION 1.0  
Download from Www.Somanuals.com. All Manuals Search And Download.  
P/N: 9560GF01A0  
Copyright 2003. All Rights Reserved.  
Document Version: 1.0  
All trademarks and trade names are the properties of their respective owners.  
ii  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 1  
Introduction  
1
This Chapter provides details of the LevelOne IP Network Camera's features,  
components and capabilities.  
Overview  
The LevelOne IP Network Camera has an Integrated Microcomputer and a high quality CMOS  
digital-Image-Sensor, enabling it to display high quality live streaming video over your wired  
LAN, the Internet, and for the WCS-2000, an 802.11b Wireless LAN.  
Using enhanced MPEG-4 technologies, the LevelOne IP Network Camera is able to stream  
high quality video directly to your PC. The high compression capabilities of MPEG-4 reduce  
network bandwidth requirements to amazingly low levels.  
A convenient and user-friendly Windows program is provided for both viewing and recording  
video. If necessary, you can even view video using your Web Browser and Microsoft Media  
Player, on a variety of software platforms.  
Figure 1: LevelOne IP Network Camera  
Features  
Standalone Design. The LevelOne IP Network Camera is a standalone system with  
built-in CPU and Video encoder. It requires only a power source and a connection to your  
LAN or Wireless LAN.  
1
Download from Www.Somanuals.com. All Manuals Search And Download.  
Suitable for Home, Business or Public Facilities. Whether for Home, Business or  
Public Facility surveillance, or just for entertainment and fun, the LevelOne IP Network  
Camera has the features you need.  
Multi-Protocol Support. Supporting TCP/IP networking, SMTP (E-mail), HTTP and  
other Internet related protocols, the LevelOne IP Network Camera can be easily integrated  
into your existing network.  
Easy Configuration. A Windows-based Wizard is provided for initial setup.  
Subsequent administration and management can be performed using a standard web  
browser. The administrator can configure and manage the LevelOne IP Network Camera  
via the LAN or Internet.  
Viewing/Recording Utility. A user-friendly Windows utility is provided for viewing  
live video. For periods when you are absent, or for scheduled recording, this application  
also allows you to record video to an ASF file on your PC. The recorded files are in a  
standard Windows Media format, and thus usable by a wide variety of programs if  
required.  
Motion Detection. This feature will capture a short video and send it to your E-mail  
address when motion is detected. The LevelOne IP Network Camera will compare  
consecutive frames to detect changes caused by the movement of large objects. This  
function only works indoors due to the sensitivity of the CMOS sensor.  
Internet Features  
User-definable HTTP port number. This allows Internet Gateways to use “port  
mapping” so the LevelOne IP Network Camera and a Web Server can share the same  
Internet IP address.  
DDNS Support. In order to view video over the Internet, users must know the Internet  
IP address of the gateway used by the LevelOne IP Network Camera. But if the Gateway  
has a dynamic IP address, DDNS (Dynamic DNS) is required. Since many existing  
Gateways do not support DDNS, this function is incorporated into the LevelOne IP  
Network Camera.  
NTP (Network-Time-Protocol) Support. NTP allows the LevelOne IP Network  
Camera to calibrate its internal clock from an Internet Time-Server. This ensures that the  
time stamp on Video from the LevelOne IP Network Camera will be correct.  
Security Features  
User Authentication. If desired, access to live video can be restricted to known users.  
Users will have to enter their username and password before being able to view the video  
stream. Up to 20 users can be entered.  
Password-Protected Configuration. Configuration data can be password protected, so  
that it only be changed by the LevelOne IP Network Camera Administrator.  
Wireless Features (WCS-2000 only)  
Standards Compliance. The IEEE 802.11b standard is fully supported. Gain the  
advantages of mobility, flexibility and high-speed by using IEEE 802.11b wireless LAN  
technology.  
Wired and Wireless Network Support. The WCS-2000 supports both wired and  
wireless transmission.  
WEP Support. Full WEP support (64/128 Bit) on the Wireless interface is provided.  
2
Download from Www.Somanuals.com. All Manuals Search And Download.  
Physical Details  
Figure 2: LevelOne IP Network Camera  
Front-mounted LEDs  
Ready  
On - Power on.  
Off - No power.  
Blinking - The Ready LED will blink during start up. This will take  
15 to 20 seconds.  
Active  
LAN  
Off - Idle.  
Blinking - LevelOne IP Network Camera is providing a live video  
stream to at least one viewer.  
On - LAN port is active.  
Off - LAN port is not available.  
Blinking - Data is being transmitted or received via the LAN port.  
On - Wireless interface is active.  
Wireless  
(WCS-2000 only)  
Off - Wireless interface is not available.  
Blinking - Data is being transferred via the Wireless interface.  
Rear Panel  
Power Input  
LAN port  
Connect the supplied power adapter here.  
Use a standard LAN cable to connect your LevelOne IP Network  
Camera to a 10/100BaseT hub or switch.  
Reset Button  
This button has two (2) functions:  
Restore Default IP Address. When pressed and released, the  
LevelOne IP Network Camera will reset its IP address to the  
default value  
Restore Default IP Address, Administrator ID, and  
Administrator password. When pressed and held or 3  
seconds, the IP address, Administrator ID, and Administrator  
3
Download from Www.Somanuals.com. All Manuals Search And Download.  
Password settings will be set to their default values.  
IP address: 192.168.0.99  
Administrator ID: administrator  
Administrator Password: null (no password)  
Note: After this procedure is completed, all LEDs will blink three  
times to confirm that the reset was completed successfully.  
Package Contents  
The following items should be included: If any of these items are damaged or missing, please  
contact your dealer immediately.  
1. The LevelOne IP Network Camera  
2. Installation CD-ROM  
3. Quick Installation Guide  
4. Power adapter  
5. Base, Stand and Swivel Connector  
6. Extender Unit  
7. Mounting Screws  
4
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 2  
Basic Setup  
2
This Chapter provides details of installing and configuring the LevelOne IP  
Network Camera.  
System Requirements  
To use the LAN interface, a standard 10/100BaseT hub or switch and network cable is  
required.  
To use the Wireless interface on the WCS-2000, other Wireless devices must be compliant  
with the IEEE802.11b specifications. All Wireless stations must use compatible settings.  
Installation  
Figure 3: LevelOne IP Network Camera Installation  
1. Mount the Camera on the supplied Base and Stand.  
Join the Base, stand and swivel connector to the camera, as shown in the diagram above.  
2. Connect the LAN Cable  
Connect the LevelOne IP Network Camera to a 10/100BaseT hub or switch.  
5
Download from Www.Somanuals.com. All Manuals Search And Download.  
For the WCS-2000, this disables the Wireless Interface, because  
only one interface can be active. The LAN interface is  
recommended for initial configuration.  
The default Wireless settings for the WCS-2000 are:  
Mode: Infrastructure  
Channel: 11  
ESSID: wireless  
WEP: Disabled  
3. Adjust the Antenna  
On the WCS-2000, flip the top-mounted Antenna to the upright position to improve  
wireless reception.  
4. Power Up  
Connect the supplied power adapter to the LevelOne IP Network Camera and power up.  
Use only the power adapter provided. Using a different one may cause hardware damage.  
4. Check the LEDs  
The Ready LED will turn on briefly, then start blinking. It will blink during startup, which  
takes 15 to 20 seconds.  
After startup is completed, the Ready LED should remain ON.  
The Active LED should be OFF.  
It will flash when anyone is viewing live video.  
Either the LAN LED OR the Wireless LED should be ON.  
For more information, refer to Front-mounted LEDs in Chapter 1.  
6
Download from Www.Somanuals.com. All Manuals Search And Download.  
Setup  
Initial setup should be performed using the supplied Windows-based setup Wizard. This  
program can locate the LevelOne IP Network Camera even if its IP address is invalid for your  
network. You can then configure the LevelOne IP Network Camera with appropriate TCP/IP  
settings for your LAN.  
Subsequent administration can be performed with your Web browser, as explained in Chapter  
3 - Web-based Administration.  
Setup Procedure  
1. Insert the supplied CD-ROM into your drive. If the setup program does not start  
automatically, run Netcam_Setup.exe in the root folder. You will see the Welcome screen  
shown below.  
Figure 4: Welcome Screen  
2. Click the Setup button to start the setup Wizard.  
3. The next screen will list all the LevelOne IP Network Cameras on your LAN. An example  
screen is shown below.  
Figure 5: Camera List Screen  
7
Download from Www.Somanuals.com. All Manuals Search And Download.  
4. Select the desired Camera from the list on the left. The current settings for the selected  
Camera will be displayed in the table on the right.  
5. Click Next to continue.  
6. If the Administrator ID and Password have been set, you will be prompted to enter them,  
as shown below. Enter the Administrator ID and Password set on the User screen.  
Figure 6: Password Dialog  
By default, the Administrator ID and password are blank.  
However, you should assign a name and password, on the  
"User" screen of the Web interface. The Web interface can be  
accessed via the "Web UI" button on the final screen of the  
Wizard.  
7. On the following screen, shown below, choose Fixed IP or Dynamic IP.  
Fixed IP is recommended, and can always be used.  
Dynamic IP can only be used if your LAN has a DCHP Server.  
Figure 7: Fixed or Dynamic IP Selection  
8. Click Next to continue.  
If Dynamic IP Address was selected, you will then see the screen shown in Figure 9:  
Camera Settings.  
If you selected Fixed IP Address, the following screen will be displayed.  
8
Download from Www.Somanuals.com. All Manuals Search And Download.  
Figure 8: TCP/IP Settings  
9. Enter the desired IP address values:  
Enter an unused IP Address from within the address range used on your LAN.  
The Subnet Mask and Default Gateway fields must match the values used by PCs on  
your LAN.  
Click Next to continue.  
Figure 9: Camera Settings  
10. This screen allows you to enter a suitable Description, and set the correct Date, Time, and  
Time Zone. Make any desired changes, then click Next to continue.  
9
Download from Www.Somanuals.com. All Manuals Search And Download.  
Figure 10: Save Screen  
11. This screen displays all details of the LevelOne IP Network Camera.  
Click Save if the settings are correct, or click Back to modify any incorrect values.  
12. After clicking Save, you will see the screen below.  
You can click the Web UI button to connect to the camera using  
your Web Browser.  
Using the Web UI is required in order the change the Wireless  
settings for the WCS-2000, on the Network screen. The default  
Wireless settings for the WCS-2000 are:  
Mode: Infrastructure  
Channel:11  
ESSID: wireless  
WEP: Disabled  
Figure 11: Final Screen  
13. Click Exit to end the Wizard.  
Setup is now complete.  
10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 3  
Setup for Viewing  
3
This Chapter provides information about the optional settings and features for  
viewing video via the LevelOne IP Network Camera. This Chapter is for  
Administrators only.  
Introduction  
After finishing setup via the Windows-based Wizard, the LevelOne IP Network Camera can  
immediately be used by all users on your LAN.  
This chapter describes some additional settings and options for viewing live Video:  
Adjusting the video image  
Controlling user access to the live video stream  
Making video available from the Internet  
Using the Motion Detection/E-mail feature  
Adjusting the Video Image  
If necessary, the LevelOne IP Network Camera Administrator can adjust the Video image.  
Settings are provided for:  
Image size - Select 320 x 240 or 160 x 120. The larger size requires greater bandwidth.  
Image quality - This determines the degree of compression applied to the Video stream.  
Higher quality requires greater bandwidth.  
Exposure - Adjust the brightness of the image, if the Auto-Exposure does not give  
satisfactory results.  
Color Adjustment - Red, Green, Blue intensity can be adjusted.  
Time Stamp - If enabled, the date/time will be displayed on the Video image.  
Text Overlay - If enabled, up to 20 characters can be superimposed on the Video image.  
This is useful for identifying the camera.  
To Adjust the Video Image:  
1. Connect to the Web-based interface of the LevelOne IP Network Camera. (See Chapter 4  
- Web-based Management for details.)  
2. On the Administration menu, select Image. You will see a screen like the example below.  
11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Figure 12: Image Screen  
3. Make the required adjustments, and save your changes.  
12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Controlling User Access to the Video Stream  
By default, all users can connect to the LevelOne IP Network Camera and view live Video.  
If desired, you can limit access to known users, by requiring each user to login to the LevelOne  
IP Network Camera with their individual username and password.  
To Enable this feature:  
1. Connect to the Web-based interface of the LevelOne IP Network Camera. (See Chapter 4  
- Web-based Management for details.)  
2. On the Administration menu, select User.  
3. Select the setting Allow access by Only users in database, as shown below.  
Figure 13: User Screen  
4. To add users to the database, click the Add button, and enter the name and password for  
each user.  
Operation  
When each user connects, they will be prompted for their username and password. They  
must enter the name and password defined on the User screen above.  
If using the Windows Viewing/Recording utility, the username and password can be  
entered into the program, so that users do not need to provide the login data each time.  
13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Making Video available from the Internet  
If your LAN is connected to the Internet, typically by a Broadband Gateway/Router and  
Broadband modem, you can make the LevelOne IP Network Camera available via the Internet.  
LevelOne IP Network Camera Setup  
The LevelOne IP Network Camera configuration does NOT have be changed, unless:  
You wish to change the port number from the default value (1024).  
You wish to use the DDNS (Dynamic DNS) feature of the LevelOne IP Network Camera.  
Second Port Configuration  
Normally, HTTP (Web) connections use port 80. Since the LevelOne IP Network Camera uses  
HTTP, but port 80 is likely to be used by a Web Server, you can use a different port for the  
LevelOne IP Network Camera. This port is called the "Second Port". (The first port is port 80.)  
The default "Second Port" number is 1024. If you prefer to use a different port number, you  
can specify the port number on the LevelOne IP Network Camera's Network screen, as shown  
below.  
Figure 14: Network Screen  
The Network screen is part of the Web-based Administration interface. See Chapter 4 - Web-  
based Management for further details on using this interface.  
Viewers need to know this port number in order to connect  
and view live Video, so you must inform viewers of the  
current port number.  
DDNS (Dynamic DNS)  
Many internet connections use a "Dynamic IP address", where the Internet IP address is  
allocated whenever the Internet connection is established.  
This means that other Internet users don't know the IP address, so can't establish a connection.  
DDNS is designed to solve this problem, by allowing users to connect to your LAN using a  
domain name, rather than an IP address.  
To use DDNS:  
1. Register for the DDNS service with a supported DDNS service provider. You can then  
apply for, and be allocated, a Domain Name.  
2. Enter and save the correct DDNS settings on the Network screen of the LevelOne IP  
Network Camera.  
14  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Figure 15: DDNS Settings - Network Screen  
3. Operation is then automatic:  
The LevelOne IP Network Camera will then automatically contact the DDNS server  
whenever it detects that the Internet IP address has changed, and inform the DDNS  
server of the new IP address.  
Internet users can then connect to your LAN using the Domain Name allocated by the  
DDNS service provider.  
Router/Gateway Setup  
Your Router or Gateway must be configured to pass incoming TCP (HTTP) connections (from  
Viewers) to the LevelOne IP Network Camera. The Router/Gateway use the Port Number to  
determine which incoming connections are intended for the LevelOne IP Network Camera.  
This feature is normally called Port Forwarding or Virtual Servers, and is illustrated below.  
The Port Forwarding/Virtual Server entry tells the Router/Gateway that incoming TCP  
connections on port 1024 should be passed to the LevelOne IP Network Camera. If necessary,  
check your Router/Gateway's user manual to check how to perform this configuration.  
Figure 16: Connecting via the Internet  
The "Port" for the Port Forwarding / Virtual Server entry  
above is the port number specified on the Network screen of  
the LevelOne IP Network Camera.  
15  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Viewing via the Internet  
Clients (viewers) will also need a broadband connection; dial-up connections are NOT  
recommended.  
Using the Windows Viewing/Recording Utility  
If using the Windows Viewing/Recording Utility, the details of the LevelOne IP Network  
Camera must be entered on the Internet tab of the Add Camera screen.  
Figure 17: Add Camera from Internet  
You can then select the camera in the Cameras list on the main screen, and click View to  
establish a connection and view live video.  
See Chapter 5 - Viewing and Recording for full details on using the Windows  
Viewing/Recording utility.  
Using your Web Browser  
If using your Web browser, you need to enter EITHER the Internet IP address OR the Domain  
name, AND the correct port number, of the LevelOne IP Network Camera.  
Enter the address of the LevelOne IP Network Camera, and its port number, in the Address (or  
Location) field of your Browser.  
Example - IP address:  
HTTP://203.70.212.52:1024  
Where the Router/Gateway's Internet IP address is 203.70.212.52and the "Second Port"  
number on the LevelOne IP Network Camera is 1024.  
Example - Domain Name:  
HTTP://mycamera.dyndns.tv:1024  
Where the Router/Gateway's Internet Domain name (using DDNS in this example) is  
mycamera.dyndns.tvand the "Second Port" number on the LevelOne IP Network  
Camera is 1024.  
See Chapter 5 -Viewing and Recording for further details of viewing Video using either the  
Windows Viewing/Recording utility or your Web Browser.  
16  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Motion Detection/E-mail Alerts  
The Motion Detection feature will capture a short video and send it to your E-mail address  
when motion is detected.  
The LevelOne IP Network Camera will compare consecutive frames to detect changes caused  
by the movement of large objects.  
But the motion detector can also be triggered by:  
Sudden changes in the level of available light  
Movement of the camera itself.  
Try to avoid these situations. The motion detection feature works best in locations where there  
is good steady illumination, and the camera is mounted securely. It cannot be used outdoors  
due to the sensitivity of the CMOS sensor.  
To Use Motion Detection/E-mail Alert  
1. Using the Web-based interface on the LevelOne IP Network Camera, select the User  
screen.  
2. Configure the Alerts section shown below.  
Figure 18: Motion Detection/E-mail Alert  
Check the box Send E-mail Alert when Motion Detected.  
Enter the destination E-mail address in the Send to: field.  
Enter a valid E-mail address in the Show "From" as field. The SMTP (Simple Mail  
Transport Protocol) Server associated with this E-mail address is used to send the mail.  
Enter a suitable Subject for the E-mail  
Save (Apply) your changes.  
17  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 4  
Web-based Management  
4
This Chapter provides Setup details of the LevelOne IP Network Camera’s  
Web-based Interface. This Chapter is for Administrators only.  
Introduction  
The LevelOne IP Network Camera can be configured using your Web Browser. The LevelOne  
IP Network Camera must have an IP address which is compatible with your PC.  
The recommended method to ensure this is to use the supplied Windows-based Wizard, as  
described in the previous chapter.  
Connecting to LevelOne IP Network Camera  
If you have run the Windows-based setup Wizard, the final screen provided a button Web  
UI. Clicking this button will immediately connect to the LevelOne IP Network Camera,  
using your Web Browser.  
If using only your Web Browser, use the following procedure to establish a connection  
from your PC to the LevelOne IP Network Camera:  
Once connected, you can add the LevelOne IP Network Camera to your Browser's  
Favorites or Bookmarks.  
Connecting using your Web Browser  
1. Start your WEB browser.  
2. In the Address box, enter "HTTP://" and the IP Address of the LevelOne IP Network  
Camera, as in this example, which uses the LevelOne IP Network Camera's default IP  
Address:  
HTTP://192.168.0.99  
3. If the Administrator ID and Password have been assigned, you will then be prompted for a  
username and password. Enter the name and password you assigned.  
18  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Welcome Screen  
When you connect, the following screen will be displayed.  
Figure 19: Welcome Screen  
The menu options available from this screen are:  
View Video - View live Video using your Web Browser.  
Administration - Access the Administration menu.  
Exit - Terminate the connection to the LevelOne IP Network Camera.  
These options are explained in the following sections.  
19  
Download from Www.Somanuals.com. All Manuals Search And Download.  
View Video Screen  
This screen is displayed when the View Video menu option is selected.  
Figure 20: View Video Screen  
If using Internet Explorer on Windows, you may see a prompt regarding an "ActiveX  
control", like the example below.  
You must allow this ActiveX control in order to view the Video. Click "Yes".  
Figure 21 ActiveX Prompt  
Video will start playing automatically. There may be a delay of a few seconds while the  
video stream is buffered.  
Using the "Connect" Option  
The Connect feature on this screen allows you to connect to another LevelOne IP Network  
Camera. To use this feature:  
1. Enter the IP address of the other LevelOne IP Network Camera in the Enter new Camera  
IP Address field.  
2. Click the Connect button  
3. A new browser window will open, and connect to the IP address you entered.  
20  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Administration Menu  
Clicking on Administration on the menu provides access to all the settings for the LevelOne IP  
Network Camera.  
The Administration menu contains the following options:  
System - Description, Date & Time  
Network - All network and Wireless settings  
Image - Adjust the Video image  
Users - Administrator login, user database, and Motion Detection/E-mail alerts.  
Status - Current Status information.  
System Screen  
After clicking Administration on the main menu, or selecting System on the Administration  
menu, you will see a screen like the example below.  
Figure 22: System Screen  
Data - System Screen  
System Settings  
Device Name  
Description  
This displays the name for the LevelOne IP Network Camera.  
This field is used for entering a description, such as the location of the  
LevelOne IP Network Camera.  
Time  
Enter the current time.  
Date  
Enter the current date.  
Timezone  
Choose the timezone for your location from the drop-down list.  
21  
Download from Www.Somanuals.com. All Manuals Search And Download.  
NTP (Network Time Protocol)  
Time Server  
Enable or disable the Time Server feature as required.  
If Enabled, the LevelOne IP Network Camera will contact a Network  
Time Server at regular intervals and update its internal timer.  
Server Address  
Enter the address for the desired NTP server.  
Update Schedule The Schedule determines how often the LevelOne IP Network Camera  
contacts the NTP Server.  
Select the desired options.  
Network Screen  
This screen is displayed when the Network menu option is clicked.  
Figure 23: Network Screen  
22  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Data - Network Screen  
IP Setting  
Obtain Address  
Automatically  
If selected, the LevelOne IP Network Camera will obtain its IP  
address and related information from a DHCP Server.  
Only select this option if your LAN has a DHCP Server. The fields  
below can then be ignored.  
Fixed IP Address  
If selected, you must assign the following values to the LevelOne  
IP Network Camera.  
IP Address - Enter an unused IP address from the address  
range used on your LAN.  
Subnet Mask - Use the same value as PCs on your LAN.  
Gateway - Use the same value as PCs on your LAN.  
DNS Address - Use the same value as PCs on your LAN.  
Wireless Setting (WCS-2000 only)  
Mode  
The Connection Mode determines the type of wireless  
communication used by the LevelOne IP Network Camera.  
If you have an Access Point, select Infrastructure.  
Otherwise, select Ad-hoc.  
Authentication Type Select the appropriate value - Open System or Shared Key, as used  
on your LAN.  
Note: In Infrastructure mode, either setting will normally work,  
since most Access Points can use both methods.  
ESSID  
This must match the value used by other devices on your wireless  
LAN.  
Note! The ESSID is case sensitive.  
Channel No.  
In Infrastructure mode, this setting is ignored. The LevelOne  
IP Network Camera will use the Channel set on the Access  
Point.  
For Ad-hoc mode, select the Channel you wish to use on your  
LevelOne IP Network Camera. Other Wireless stations should  
use the same setting.  
If you experience interference (shown by lost connections  
and/or slow data transfers) you may need to experiment with  
different channels to see which one is the best.  
WEP  
This shows the current WEP setting.  
This must match other Wireless stations on your LAN.  
Click the Configure WEP button to change the WEP settings if  
required.  
DDNS  
DDNS  
Enable or disable the DDNS function, as required.  
Only enable this feature if you have registered for the DDNS  
Service with a DDNS Server provider. See the following section for  
further details on using DDNS.  
Service Provider  
Choose a service provider from the list.  
23  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Host Name  
Enter the host name (Domain Name) allocated to you by the DDNS  
Server provider.  
Account  
Enter the login name for the DDNS account.  
Enter the password for the DDNS account.  
Password  
Check WAN IP  
Schedule  
Set the schedule for checking if the Internet IP address has  
changed. If the IP address has changed, the DDNS Server will be  
notified.  
Options  
UPnP  
Enable UPnP support if required. If Enabled, the LevelOne IP  
Network Camera will broadcast its availability using UPnP. UPnP  
compatible systems such as Windows XP will then be able to detect  
the presence of the LevelOne IP Network Camera.  
Second Port  
Enable this feature if required. If enabled, then HTTP connections  
(using your Web Browser or Media Player) can use this port  
number instead of the standard HTTP port 80.  
If you already have a Web Server on your LAN, then you  
should enable the Second Port, and use this port number  
instead of port 80.  
If enabled, enter the desired port number to use for connections  
to the LevelOne IP Network Camera. The default is 1024.  
Using DDNS (Dynamic DNS)  
Many internet connections use a "Dynamic IP address", where the Internet IP address is  
allocated whenever the Internet connection is established.  
This means that other Internet users don't know the IP address, so can't establish a connection.  
DDNS is designed to solve this problem, as follows:  
You must register for the DDNS service with a DDNS service provider. The DDNS  
Service provider will allocate a Domain Name to you upon request.  
The DDNS settings on the Network screen above must be correct.  
The LevelOne IP Network Camera will then contact the DDNS server whenever it detects  
that the Internet IP address has changed, and inform the DDNS server of the new IP  
address. (The Check WAN IP Schedule determines how often the LevelOne IP Network  
Camera checks if the Internet IP address has changed.)  
This system allows other internet users to connect to you using the Domain Name allocated by  
the DDNS service provider.  
24  
Download from Www.Somanuals.com. All Manuals Search And Download.  
WEP Screen (WCS-2000 only)  
This screen is accessed by clicking the Configure WEP button on the Network screen. An  
example WEP screen is shown below.  
Figure 24: WEP Screen  
Data - WEP Screen  
WEP Encryption  
WEP Encryption Select the option used on your Wireless LAN.  
None - This is the default. If selected, data is NOT encrypted  
before being transmitted.  
64 Bit Encryption - If selected, data is encrypted, using the  
default key, before being transmitted.  
You must enter a default key.  
Other Wireless stations must be set to use 64 Bit Encryption, and  
have the same Key value in the same position in their key table.  
128 Bit Encryption - If selected, data is encrypted, using the  
default key, before being transmitted.  
You must enter a default key.  
Other Wireless stations must be set to use 128 Bit Encryption, and  
have the same Key value in the same position in their key table.  
Passphrase  
The Passphrase feature will generate a Key from the phrase you enter,  
which may be easier than entering keys in Hex (0~9 and A~F).  
To use the Passphrase feature, enter the desired Passphrase in the field  
provided, and click the Generate button.  
Default Key  
Key Value  
Select a key to be used as the default key.  
If WEP Encryption is used, you must enter at least one key value, for  
the Default Key. All transmissions are encrypted using the Default Key.  
Other wireless stations must use the same key value in the same  
position in their key table. (It does not have to be selected as the default  
key.)  
25  
Download from Www.Somanuals.com. All Manuals Search And Download.  
The other key values are optional, and are used only for decrypting  
data. This allows you to use different keys for transmitting and  
receiving, if required.  
When inputting a key value, follow these rules:  
For 64 Bit Encryption, keys must be 10 characters.  
For 128 Bit Encryption, keys must be 26 characters.  
Keys must be entered in Hex.  
Hex characters are A ~ F, and 0 ~ 9.  
26  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Image Screen  
This screen is displayed when the Image menu option is clicked.  
Figure 25: Image Screen  
Data - Image Screen  
Video Settings  
Resolution  
Select the desired video resolution format. A larger size requires  
more bandwidth.  
Image Quality  
Select the desired image quality. Higher quality requires more  
bandwidth.  
Adjustment  
Exposure  
Select Automatic or Manual as required.  
Manual Exposure  
If Manual Exposure is selected, this field controls the exposure of  
the Video image. Adjust it to the desired value.  
If using Automatic Exposure, this field has no effect.  
Red, Green, Blue  
Options  
Adjust these color settings to the preferred values.  
Time Stamp  
Enable the check box if you want the time to be displayed on the  
Video image.  
Text Overlay  
If you want some text to be displayed on the Video image, enable  
the check box and enter the desired text. This feature is often used  
when multiple camera are installed, to identify each camera.  
27  
Download from Www.Somanuals.com. All Manuals Search And Download.  
User Screen  
This screen is displayed when the User option on the Administration menu is clicked.  
Figure 26: User Screen  
Data - User Screen  
Admin Login  
Administrator ID  
Enter the name for the Administrator login. Spaces, punctuation, and  
special characters must NOT be used in the name.  
When you connect to the LevelOne IP Network Camera, you will be  
prompted for a name and password. Enter this name to login with  
Administrator rights. Only the Administrator can change the  
configuration; other users can only view the Video.  
Password  
The password for the Administrator login above.  
Verify Password  
User Access  
Allow access by  
Re-enter the password for the Administrator, to ensure it is correct.  
Everyone - Anyone can view the Video stream.  
Only users in database - Allow viewing only by people in the  
user database. If selected, users will be prompted for a User  
Name and Password when they attempt to view the Video.  
28  
Download from Www.Somanuals.com. All Manuals Search And Download.  
User Database  
User List  
This lists all users who currently exist.  
Use the Add, Delete, and Modify buttons to manage this database.  
Alerts  
E-Mail Alert  
Enable the checkbox if you want to send an E-Mail Alert when motion  
is detected.  
Note:  
Motion detection can be triggered by rapid changes in the available  
lighting, as well as by moving objects. For this reason, it should only  
be used indoors where the available light is fairly constant.  
Send to  
Enter the E-Mail address for the receiver of the E-mail alert.  
Show “From” as Enter the E-Mail address to be used as the Sender. This must be a  
standard E-mail address, because the SMTP (Simple Mail Transport  
Protocol) Server used to send the mail is derived from this address.  
Subject  
Enter the desired text to be shown as the "Subject" for the E-Mail.  
Add/Modify User Screen  
This screen is displayed when the Add or Modify button on the User screen is clicked. It is used  
to enter details of each user.  
Figure 27: Add/Modify User Screen  
Data - Add/Modify User  
User Name  
Enter the name for the user. Spaces, punctuation, and special  
characters must NOT be used in the name.  
Also, names are case-insensitive (case is ignored), so you can NOT  
use 2 names with the same spelling and different case.  
User Password  
The password for the user above.  
Confirm Password  
Re-enter the password, to ensure it is correct.  
29  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Status Screen  
.
Figure 28: Status Screen  
Data - Status Screen  
Status  
Device Name  
This is the default name for the LevelOne IP Network Camera, and  
cannot be changed.  
Description  
This displays the description you have entered.  
MAC Address  
The MAC address is the low-level network address, also called the  
Network Adapter address or Physical Address.  
IP Address  
Network Mask  
Gateway  
The current IP address of the LevelOne IP Network Camera.  
The network mask associated with the IP address above.  
The address of your Router or Gateway.  
F/W version  
The version of the Firmware (software) currently installed on your  
LevelOne IP Network Camera.  
Current Viewers The number of users currently viewing the video stream generated by  
the LevelOne IP Network Camera.  
Log  
System Log  
The log displays internal operations of the LevelOne IP Network  
Camera, and is mostly useful for troubleshooting.  
30  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Upgrade Firmware Screen  
This screen is displayed when you click the Upgrade Firmware button on the Status screen.  
Figure 29: Upgrade Firmware Screen  
This screen allows you upgrade the Firmware (software) in your LevelOne IP Network  
Camera. Before using this screen, your must download the upgrade file to your PC.  
Then follow this procedure:  
1. Click the Browse button, and locate the upgrade file.  
2. Select this file, and click OK. The filename will then appear in the Upgrade File field.  
3. Click the Start Upgrade button to transfer the file to the LevelOne IP Network Camera and  
start the upgrade procedure.  
Note:  
The upgrade may take several minutes.  
When the upgrade is completed, the LevelOne IP Network Camera will restart. This will  
cause any existing connections to be terminated. Any users viewing or recording the video  
will see this as an error.  
31  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 5  
Viewing & Recording  
5
This Chapter describes how to view and record the live video stream  
generated by the LevelOne IP Network Camera.  
Overview  
The recommended method to view video is to use the supplied Windows Viewing/Recording  
utility.  
Installation  
1. Insert the supplied CD-ROM into your drive. If the setup program does not start  
automatically, run Netcam_Setup.exe in the root folder. You will see the Welcome screen  
shown below.  
Figure 30: Welcome Screen  
2. Click the Client Utility button to start the installation of the Viewing/Recording Utility.  
3. Follow the prompts to complete the installation.  
32  
Download from Www.Somanuals.com. All Manuals Search And Download.  
System Tray Icon  
When started, the program will create an icon in the Windows system tray on the taskbar, as  
shown below.  
Figure 31: System Tray Icon  
This Icon has the following functions:  
Animation - If a recording is in progress, this icon will be animated. Otherwise, it is  
stationary.  
Hover - Hovering your mouse over this icon will generate a pop-up informing you of the  
current status.  
Double-click - This will display the main screen, shown below.  
Right Click - This provides a menu which allows you to view program details, view the  
main screen, or terminate the program.  
Main Screen  
The main screen is displayed when the program first starts up. If you exit the program, you can  
return to the main screen by double-clicking the system tray icon.  
Figure 32: Main Screen  
33  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Cameras - Camera List  
The Camera List displays all LevelOne IP Network Camera you have defined. If you have  
not defined any cameras, this list will be empty.  
Click the Add Camera button to add a LevelOne IP Network Camera. See the following  
section for further details.  
Once some cameras are listed, you can select one and then use the Modify Camera, Delete  
Camera and View buttons.  
To view live video, select a camera and click the View button.  
Recordings - Current Recordings  
This panel lists all recording currently in progress, whether started directly, or by the scheduled  
recording feature.  
The Stop button can be used to terminate any recording currently in progress.  
Adding Cameras to the Camera List  
To add a camera to the Camera List, click the Add Camera button on the main screen. You will  
see a screen like the example below.  
The Cameras on LAN panel, on the left, displays all LevelOne IP Network Camera found  
on your LAN. This list can be updated by clicking the Refresh button.  
The Camera Data panel, on the right, displays the data for the selected camera.  
Figure 33: Add Camera from LAN  
To add a camera to the Camera List on the main screen:  
1. Select a camera in the list on the left.  
2. Check that the Camera Data shown on the right is correct. See below for details.  
3. Click the Add button. The camera will now appear in the Camera List on the main screen.  
Camera Data - LAN  
Device Name  
Description  
Address  
This is the default name for the LevelOne IP Network Camera, and  
cannot be changed.  
This displays the description entered by the LevelOne IP Network  
Camera Administrator.  
The current IP address of the LevelOne IP Network Camera.  
34  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Port Number  
Login  
This will normally display "80". Only change this if requested to do so  
the LevelOne IP Network Camera Administrator.  
The camera Administrator can require that users provide a username and  
password before being allowed to view the live video.  
If the Administrator has not enabled this option, the Login fields can  
be left blank.  
Otherwise, you must enter the username and password allocated to  
your by Administrator.  
Adding Cameras on the Internet  
If the LevelOne IP Network Camera you wish to add is not on your LAN, but is available via  
the Internet, click the Internet tab. You will see a screen like the example below.  
Figure 34: Add Camera from Internet  
To add a camera to the Camera List on the main screen:  
1. Enter the Camera Data on the panel on the right. See below for details.  
2. Click the Test button to check that a connection and login can be performed successfully.  
3. Click the Add button. The camera will now appear in the Camera List on the main screen.  
Camera Data - Internet  
Device Name  
This is the default name for the LevelOne IP Network Camera, and  
cannot be changed.  
This field will be displayed automatically once a connection to the  
LevelOne IP Network Camera has been established.  
Description  
This displays the description entered by the LevelOne IP Network  
Camera Administrator.  
This field will be displayed automatically once a connection to the  
LevelOne IP Network Camera has been established.  
Address  
Enter the Domain Name or Internet IP address of the desired LevelOne  
IP Network Camera.  
Port Number  
Enter the port number used by the LevelOne IP Network Camera. The  
LevelOne IP Network Camera Administrator can advise you of the port  
to use. The default value is 1024.  
35  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Login  
The camera Administrator can require that users provide a username and  
password before being allowed to view the live video.  
If the Administrator has not enabled this option, the Login fields can  
be left blank.  
Otherwise, you must enter the username and password allocated to  
your by Administrator.  
Modifying an Existing Camera  
You can change the settings for an existing camera by selecting it in the Camera List on the  
main screen, then clicking the Modify Camera button.  
You will see a screen like the example below.  
Figure 35: Modify Camera  
Data on this screen is the same as for the Add Camera screens.  
You can use the Test button to button to check that a connection and login can be  
performed successfully.  
36  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Viewing Live Video  
To view live video, select a camera in the Camera List on the main screen, and click the View  
button. You will see a screen like the example below.  
Figure 36 Viewing Live Video  
Controls are provided to stop and start viewing, and to start recording the video stream.  
Play  
Record. While recording, this button will be red.  
Stop  
37  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Recording Video  
You can record Video while watching, or schedule recordings to occur when you are absent.  
Recordings are stored in a standard Microsoft ASF file format, and can be played using  
Microsoft Media Player.  
Before doing any recording, you should review the Recording Preferences to ensure they are  
suitable for your PC.  
Recording Preferences  
To set the Recording Preferences, click the Preferences button below the Recordings panel on  
the main screen. You will see a screen like the example below.  
Figure 37: Recording Preferences  
If necessary, change these settings to suit your environment.  
File Location  
This is the Drive and Folder where recorded files will be placed. You  
need a drive which has large amounts (Gigabytes) of free space.  
Note that file names are automatically assigned, using the date and time.  
Time Limit  
This sets the maximum size of a recording which is started by clicking  
the Record button on the View screen.  
If the recording is not stopped manually, it will be terminated after the  
time period indicated here.  
Live Recordings  
Recordings in progress are listed in the Recordings panel of the main screen.  
Figure 38: Recording Panel  
38  
Download from Www.Somanuals.com. All Manuals Search And Download.  
To Stop a recording in progress, select it and click the Stop button.  
To Start a Recording, click the Record button on the View screen.  
Figure 39 Viewing Live Video  
Record Button. While recording, this button will be red.  
Recorded Files  
To view a list of all recorded files, click the Files button under the Recordings panel on the  
main screen.  
You will see a screen like the example below.  
Figure 40: Recorded Files  
This list shows all of the recorded files. The following operations are supported:  
Play - Play the selected file in Microsoft Media Player.  
Delete - Delete the selected file.  
Explore - Open the folder containing these files, using Windows Explorer.  
39  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Scheduled Recordings  
Recordings can be scheduled at any time, for any known LevelOne IP Network Camera. (Of  
course, your PC must be on at the scheduled time.)  
To use this feature, click the Schedule button under the Recordings panel on the main screen.  
You will see a screen like the example below.  
Figure 41: Scheduled Recording List  
This screen lists all scheduled recordings. For each recording, the following data is shown.  
Camera - The camera which will be recorded.  
Date - The date the recording will be made. If the recording is repeated (weekly or  
monthly), this is the date of the next recording.  
Time - The time the recording will be made.  
Type - Indicates if the recording is One Time, Everyday, or a particular day of the week.  
If a scheduled recording is selected, the Modify and Delete buttons can be used to edit or delete  
the selected entry.  
Schedule Definition Screen  
If the Add or Modify button is clicked, a screen like the following is displayed. You can then  
enter or modify the details of this schedule.  
Figure 42: Schedule Definition Screen  
Data - Schedule Definition  
Camera  
Select the camera to be used. If the desired camera is not listed, you  
must define by using the Add Camera button on the main screen.  
40  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Schedule Type  
Select the desired option:  
One Time - Only one (1) recording is made, on the specified date,  
at the specified time.  
Everyday - The recording is made every day, at the specified time.  
The Start Day indicates when the first recording will be made.  
Every Sunday, Every Monday, … - The recording is made on the  
specified day each week. The Start Day indicates when the schedule  
becomes active.  
Start Day  
Select the desired date. For a single recording, this is the day the  
recording will be made. For daily (Everyday) recordings, this is the  
starting date. For weekly recordings, this determines when the schedule  
becomes active.  
Start Time  
Duration  
Select the desired start time.  
Enter or select the desired duration of the recording.  
41  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Viewing with your Web Browser  
The recommended method to view live video from the LevelOne IP Network Camera is use the  
Windows utility.  
However, you can also use your Web browser if necessary.  
Viewing over your LAN  
To establish a connection from your PC to the LevelOne IP Network Camera:  
1. Start your WEB browser.  
2. In the Address box, enter "HTTP://" and the IP Address of the LevelOne IP Network  
Camera, as in this example, which uses the LevelOne IP Network Camera's default IP  
Address:  
HTTP://192.168.0.99  
3. If the Administrator has enabled the user security feature, you will then be prompted for a  
username and password.  
Enter the name and password assigned to you by the LevelOne IP Network Camera  
administrator.  
4. When you connect, the following screen will be displayed.  
Figure 43: Home Screen  
5. Click View Video to see a screen like the example below.  
42  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Figure 44: View Video in Browser  
Video will start playing automatically. There may be a delay of a few seconds while the Video  
stream is buffered.  
43  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Viewing via the Internet  
If LAN with the LevelOne IP Network Camera is connected to the Internet, and configured  
correctly, you can connect to the LevelOne IP Network Camera via the Internet.  
See Making Video available from the Internet in Chapter 3 for details of the required LAN  
configuration.  
To establish a connection from your PC to the LevelOne IP Network Camera via the Internet:  
1. Obtain the Internet address and port number of the LevelOne IP Network Camera from the  
Administrator.  
2. Start your WEB browser.  
3. In the Address box, enter the following:  
HTTP://Internet_Address:port_number  
Example using IP address:  
HTTP://203.70.212.52:1024  
Where the Router/Gateway's Internet IP address is 203.70.212.52and the "Second  
Port" number on the LevelOne IP Network Camera is 1024.  
Example using Domain Name:  
HTTP://mycamera.dyndns.tv:1024  
Where the Router/Gateway's Internet Domain name (using DDNS in this example) is  
mycamera.dyndns.tvand the "Second Port" number on the LevelOne IP Network  
Camera is 1024.  
4. If the Administrator has enabled the user validation feature, you will then be prompted for  
a username and password.  
Enter the name and password assigned to you by the LevelOne IP Network Camera  
administrator.  
5. When you connect, the following screen will be displayed.  
Figure 45: Home Screen  
44  
Download from Www.Somanuals.com. All Manuals Search And Download.  
6. Click View Video to see a screen like the example below.  
Figure 46: View Video in Browser  
Video will start playing automatically. There may be a delay of a few seconds while the Video  
stream is buffered.  
Note:  
You need a broadband connection to view video effectively; dial-up connections are NOT  
recommended.  
45  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 6  
Troubleshooting  
6
This chapter covers the most likely problems and their solutions.  
Overview  
This chapter covers some common problems that may be encountered while using the  
LevelOne IP Network Camera and some possible solutions to them. If you follow the  
suggested steps and the LevelOne IP Network Camera still does not function properly, contact  
your dealer for further advice.  
Problems  
Problem 1:  
I can't connect to the LevelOne IP Network Camera with my Web  
Browser to configure it.  
Solution 1:  
It is possible that your PC's IP address is not compatible with the IP  
address of the LevelOne IP Network Camera.  
Use the Windows utility to configure the LevelOne IP Network Camera  
with a valid IP address.  
Problem 2:  
The Windows utility doesn't list any LevelOne IP Network Cameras.  
Solution 2:  
Check the following:  
The LevelOne IP Network Camera is installed, LAN connections are  
OK, it is powered ON and startup is complete.  
Ensure that your PC and the LevelOne IP Network Camera are on the  
same network segment. (If you don't have a router, this must be the  
case.)  
Ensure that your PC has the TCP/IP network protocol loaded. In  
Windows, this is done by using Control Panel-Network. If an entry for  
TCP/IP -> Network card is not listed, use Add - Protocol - Microsoft -  
TCP/IP to add it.  
You then need to select the new entry (TCP/IP -> Network card), click  
Properties, and configure the IP Address tab.  
If your LAN has a DHCP Server, you can select "Obtain an IP  
Address automatically".  
Otherwise, you must select "Specify an IP Address", and enter  
values for IP Address, Subnet Mask, and Gateway. All devices on  
your LAN must use compatible values. Remember that each  
device needs a unique IP Address, and the same Subnet Mask.  
Problem 3  
When I try to connect to the LevelOne IP Network Camera, I get  
prompted for a user name and password.  
Solution 3  
You SHOULD be prompted for a user name and password if trying to  
access the Administration menu.  
Enter the Administrator ID and Password set on the User screen.  
If you are just trying to view Video, the User Name/Password prompt  
46  
Download from Www.Somanuals.com. All Manuals Search And Download.  
indicates that the Administrator has restricted access to specified users.  
Ask the Administrator for your User Name and Password.  
Problem 4  
I can't connect to the LevelOne IP Network Camera using a Wireless  
connection.  
Check that your PC and the LevelOne IP Network Camera have  
compatible Wireless settings.  
Solution 4  
Mode (Infrastructure or Ad-hoc) must be correct.  
ESSID must match.  
WEP settings must match.  
In Ad-hoc mode, the Channel should match, although this is often not  
required.  
Problem 5  
Video quality may suddenly deteriorate.  
This can happen when an additional viewer connects to the LevelOne IP  
Network Camera, overloading the camera or the available bandwidth. The  
image size and quality can be adjusted to cater for the required number of  
viewers and the available bandwidth.  
Solution 5  
The motion detection feature doesn't send me any E-mails.  
Problem 6  
It may be that the SMTP (Simple Mail Transport Protocol) server used by  
the LevelOne IP Network Camera to send the E-mail will not accept mail  
from the LevelOne IP Network Camera. Try using a different SMTP  
server. The LevelOne IP Network Camera derives the address of the SMTP  
server from the E-mail address you enter in the Show "From" as: field.  
Solution 6  
Using the motion detection feature, I receive E-mails which don't show  
any moving objects.  
Problem 7  
The motion detection feature doesn't actually detect motion. It compares  
frames to see if they are different. Major differences between frames are  
assumed to be caused by moving objects.  
Solution 7  
But the motion detector can also be triggered by:  
Sudden changes in the level of available light  
Movement of the camera itself.  
Try to avoid these situations. The motion detection feature works best in  
locations where there is good steady illumination, and the camera is  
mounted securely. This feature can NOT be used if the camera is outdoors.  
47  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix A  
Specifications  
FCS-1000  
A
Model  
FCS-1000 LevelOne IP Network Camera  
Dimensions  
164 mm (L) * 88 mm (W)* 53.5 mm (H)  
6.4 inch (L) * 3.5 inch (W) * 2.1 inch (H)  
Operating  
Temperature  
0° C to 40° C  
Storage Temperature  
Network Protocols:  
Network Interface:  
Wireless interface  
LEDs  
-10° C to 70° C  
TCP/IP, DHCP, SMTP, NTP, HTTP  
1 Ethernet10/100BaseT (RJ45) LAN connection  
IEEE 802.11b compatible, WEP security support, roaming support  
3
Power Adapter  
5V DC External  
WCS-2000  
Model  
WCS-2000 LevelOne IP Network Camera  
Dimensions  
164 mm (L) * 88 mm (W)* 53.5 mm (H)  
6.4 inch (L) * 3.5 inch (W) * 2.1 inch (H)  
Operating  
Temperature  
0° C to 40° C  
Storage Temperature  
Network Protocols:  
Network Interface:  
-10° C to 70° C  
TCP/IP, DHCP, SMTP, NTP, HTTP  
1 Ethernet 10/100BaseT (RJ45) LAN connection  
802.11b Wireless Interface  
Wireless interface  
LEDs  
IEEE 802.11b compatible, WEP security support, roaming support  
4
Power Adapter  
Wireless Interface  
5V DC External  
802.11b, Infrastrstructure/Ad-hoc mode, WEP support.  
48  
Download from Www.Somanuals.com. All Manuals Search And Download.  
FCC Statement  
This equipment has been tested and found to comply with the limits for a Class B digital  
device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable  
protection against harmful interference in a residential installation.  
This equipment generates, uses and can radiate radio frequency energy and, if not installed and  
used in accordance with the instructions, may cause harmful interference to radio  
communications. However, there is no guarantee that interference will not occur in a particular  
installation. If this equipment does cause harmful interference to radio or television reception,  
which can be determined by turning the equipment off and on, the user is encouraged to try to  
correct the interference by one of the following measures:  
Reorient or relocate the receiving antenna.  
Increase the separation between the equipment and receiver.  
Connect the equipment into an outlet on a circuit different from that to which the receiver  
is connected.  
Consult the dealer or an experienced radio/TV technician for help.  
To assure continued compliance, any changes or modifications not expressly approved by the  
party responsible for compliance could void the user's authority to operate this equipment.  
(Example - use only shielded interface cables when connecting to computer or peripheral  
devices).  
FCC Radiation Exposure Statement  
This equipment complies with FCC RF radiation exposure limits set forth for an uncontrolled  
environment. This equipment should be installed and operated with a minimum distance of 20  
centimeters between the radiator and your body.  
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two  
conditions:  
(1) This device may not cause harmful interference, and  
(2) This device must accept any interference received, including interference that may cause  
undesired operation.  
This transmitter must not be co-located or operating in conjunction with any other antenna or  
transmitter.  
CE Marking Warning  
This is a Class B product. In a domestic environment this product may cause radio interference  
in which case the user may be required to take adequate measures.  
49  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Copyright Notice  
Many software components are covered by the GNU GPL (General Public License). Some are  
covered by other Licenses as listed in the table below.  
Details of each applicable license are in contained in the following section.  
No Warranty  
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS''  
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED  
TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A  
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR  
OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,  
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT  
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF  
USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND  
ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR  
TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF  
THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH  
DAMAGE.  
Network Camera copyright information  
Package source codes  
License  
GPL  
rrload  
GPL  
uClinux-2.0.38.1pre7  
busybox-0.61pre  
GPL  
GPL  
GPL  
tinylogin-1.00pre  
inetutils-1.3.2  
thttpd-2.20b-rr  
uClibc-0.9.5  
See following  
LGPL  
Wireless driver  
Lan driver (DM9000)  
cgi-lib  
GPL  
GPL  
Copyright cgi-LIB  
Free SW  
Cgihtml  
Ntp-4.1.0-4.src.rpm  
GPL  
Cron-small version  
Dhcpcd-1.3.20-p10  
Smtpclient-1.0.0  
Upnpsdk-1.0.4  
GPL  
GPL  
GPL  
GPL  
GPL  
ez-ipupdate-3.0.11b7  
50  
Download from Www.Somanuals.com. All Manuals Search And Download.  
thttpd License  
Copyright 1995,1998,1999,2000 by Jef Poskanzer <jef@acme.com>. All rights reserved.  
Redistribution and use in source and binary forms, with or without modification, are permitted  
provided that the following conditions are met:  
1. Redistributions of source code must retain the above copyright notice, this list of conditions  
and the following disclaimer.  
2. Redistributions in binary form must reproduce the above copyright notice, this list of  
conditions and the following disclaimer in the documentation and/or other materials provided  
with the distribution.  
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS''  
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED  
TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A  
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR  
OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,  
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT  
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF  
USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND  
ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR  
TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF  
THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH  
DAMAGE.  
51  
Download from Www.Somanuals.com. All Manuals Search And Download.  
cgi-LIB Copyright Notice  
Author: Noel V Aguilar  
Version: 1.4  
Filename: cgi-lib.h  
Program Library: CGI-LIB  
Feel free to use, copy, reference, or modify this program in any way.  
Support public domain freeware.  
For updates or to report bugs go to my home page  
The web page for the library is:  
Disclaimer  
THE INFORMATION, CODE AND EXECUTABLE PROVIDED ARE PROVIDED "AS IS"  
WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING  
BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND  
FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL NOEL V AGUILAR  
BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,  
INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL  
DAMAGES. ALL THE INFORMATION, CODE AND EXECUTABLES ARE FOR  
EDUCATIONAL PURPOSES ONLY.  
52  
Download from Www.Somanuals.com. All Manuals Search And Download.  
GNU General Public License  
GNU GENERAL PUBLIC LICENSE  
Version 2, June 1991  
Copyright (C) 1989, 1991 Free Software Foundation, Inc.  
59 Temple Place, Suite 330, Boston, MA 02111-1307 USA  
Everyone is permitted to copy and distribute verbatim copies of this license document, but  
changing it is not allowed.  
Preamble  
The licenses for most software are designed to take away your freedom to share and change it.  
By contrast, the GNU General Public License is intended to guarantee your freedom to share  
and change free software--to make sure the software is free for all its users. This General  
Public License applies to most of the Free Software Foundation's software and to any other  
program whose authors commit to using it. (Some other Free Software Foundation software is  
covered by the GNU Library General Public License instead.) You can apply it to your  
programs, too.  
When we speak of free software, we are referring to freedom, not price. Our General Public  
Licenses are designed to make sure that you have the freedom to distribute copies of free  
software (and charge for this service if you wish), that you receive source code or can get it if  
you want it, that you can change the software or use pieces of it in new free programs; and that  
you know you can do these things.  
To protect your rights, we need to make restrictions that forbid anyone to deny you these rights  
or to ask you to surrender the rights. These restrictions translate to certain responsibilities for  
you if you distribute copies of the software, or if you modify it.  
For example, if you distribute copies of such a program, whether gratis or for a fee, you must  
give the recipients all the rights that you have. You must make sure that they, too, receive or  
can get the source code. And you must show them these terms so they know their rights.  
We protect your rights with two steps: (1) copyright the software, and (2) offer you this license  
which gives you legal permission to copy, distribute and/or modify the software.  
Also, for each author's protection and ours, we want to make certain that everyone understands  
that there is no warranty for this free software. If the software is modified by someone else and  
passed on, we want its recipients to know that what they have is not the original, so that any  
problems introduced by others will not reflect on the original authors' reputations.  
Finally, any free program is threatened constantly by software patents. We wish to avoid the  
danger that redistributors of a free program will individually obtain patent licenses, in effect  
making the program proprietary. To prevent this, we have made it clear that any patent must  
be licensed for everyone's free use or not licensed at all. The precise terms and conditions for  
copying, distribution and modification follow.  
GNU GENERAL PUBLIC LICENSE  
Terms And Conditions For Copying, Distribution And Modification  
0. This License applies to any program or other work which contains a notice placed by the  
copyright holder saying it may be distributed under the terms of this General Public License.  
The "Program", below, refers to any such program or work, and a "work based on the  
Program" means either the Program or any derivative work under copyright law: that is to say,  
a work containing the Program or a portion of it, either verbatim or with modifications and/or  
53  
Download from Www.Somanuals.com. All Manuals Search And Download.  
translated into another language. (Hereinafter, translation is included without limitation in the  
term "modification".) Each licensee is addressed as "you".  
Activities other than copying, distribution and modification are not covered by this License;  
they are outside its scope. The act of running the Program is not restricted, and the output from  
the Program is covered only if its contents constitute a work based on the Program  
(independent of having been made by running the Program). Whether that is true depends on  
what the Program does.  
1. You may copy and distribute verbatim copies of the Program's source code as you receive it,  
in any medium, provided that you conspicuously and appropriately publish on each copy an  
appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to  
this License and to the absence of any warranty; and give any other recipients of the Program a  
copy of this License along with the Program.  
You may charge a fee for the physical act of transferring a copy, and you may at your option  
offer warranty protection in exchange for a fee.  
2. You may modify your copy or copies of the Program or any portion of it, thus forming a  
work based on the Program, and copy and distribute such modifications or work under the  
terms of Section 1 above, provided that you also meet all of these conditions:  
a) You must cause the modified files to carry prominent notices stating that you changed the  
files and the date of any change.  
b) You must cause any work that you distribute or publish, that in whole or in part contains or  
is derived from the Program or any part thereof, to be licensed as a whole at no charge to all  
third parties under the terms of this License.  
c) If the modified program normally reads commands interactively when run, you must cause  
it, when started running for such interactive use in the most ordinary way, to print or display an  
announcement including an appropriate copyright notice and a notice that there is no warranty  
(or else, saying that you provide a warranty) and that users may redistribute the program under  
these conditions, and telling the user how to view a copy of this License. (Exception: if the  
Program itself is interactive but does not normally print such an announcement, your work  
based on the Program is not required to print an announcement.)  
These requirements apply to the modified work as a whole. If identifiable sections of that  
work are not derived from the Program, and can be reasonably considered independent and  
separate works in themselves, then this License, and its terms, do not apply to those sections  
when you distribute them as separate works. But when you distribute the same sections as part  
of a whole which is a work based on the Program, the distribution of the whole must be on the  
terms of this License, whose permissions for other licensees extend to the entire whole, and  
thus to each and every part regardless of who wrote it. Thus, it is not the intent of this section  
to claim rights or contest your rights to work written entirely by you; rather, the intent is to  
exercise the right to control the distribution of derivative or collective works based on the  
Program.  
In addition, mere aggregation of another work not based on the Program with the Program (or  
with a work based on the Program) on a volume of a storage or distribution medium does not  
bring the other work under the scope of this License.  
3. You may copy and distribute the Program (or a work based on it, under Section 2) in object  
code or executable form under the terms of Sections 1 and 2 above provided that you also do  
one of the following:  
54  
Download from Www.Somanuals.com. All Manuals Search And Download.  
a) Accompany it with the complete corresponding machine-readable source code, which must  
be distributed under the terms of Sections 1 and 2 above on a medium customarily used for  
software interchange; or,  
b) Accompany it with a written offer, valid for at least three years, to give any third party, for a  
charge no more than your cost of physically performing source distribution, a complete  
machine-readable copy of the corresponding source code, to be distributed under the terms of  
Sections 1 and 2 above on a medium customarily used for software interchange; or,  
c) Accompany it with the information you received as to the offer to distribute corresponding  
source code. (This alternative is allowed only for noncommercial distribution and only if you  
received the program in object code or executable form with such an offer, in accord with  
Subsection b above.)  
The source code for a work means the preferred form of the work for making modifications to  
it. For an executable work, complete source code means all the source code for all modules it  
contains, plus any associated interface definition files, plus the scripts used to control  
compilation and installation of the executable. However, as a special exception, the source  
code distributed need not include anything that is normally distributed (in either source or  
binary form) with the major components (compiler, kernel, and so on) of the operating system  
on which the executable runs, unless that component itself accompanies the executable.  
If distribution of executable or object code is made by offering access to copy from a  
designated place, then offering equivalent access to copy the source code from the same place  
counts as distribution of the source code, even though third parties are not compelled to copy  
the source along with the object code.  
4. You may not copy, modify, sublicense, or distribute the Program except as expressly  
provided under this License. Any attempt otherwise to copy, modify, sublicense or distribute  
the Program is void, and will automatically terminate your rights under this License. However,  
parties who have received copies, or rights, from you under this License will not have their  
licenses terminated so long as such parties remain in full compliance.  
5. You are not required to accept this License, since you have not signed it. However, nothing  
else grants you permission to modify or distribute the Program or its derivative works. These  
actions are prohibited by law if you do not accept this License. Therefore, by modifying or  
distributing the Program (or any work based on the Program), you indicate your acceptance of  
this License to do so, and all its terms and conditions for copying, distributing or modifying the  
Program or works based on it.  
6. Each time you redistribute the Program (or any work based on the Program), the recipient  
automatically receives a license from the original licensor to copy, distribute or modify the  
Program subject to these terms and conditions. You may not impose any further restrictions on  
the recipients' exercise of the rights granted herein. You are not responsible for enforcing  
compliance by third parties to this License.  
7. If, as a consequence of a court judgment or allegation of patent infringement or for any  
other reason (not limited to patent issues), conditions are imposed on you (whether by court  
order, agreement or otherwise) that contradict the conditions of this License, they do not  
excuse you from the conditions of this License. If you cannot distribute so as to satisfy  
simultaneously your obligations under this License and any other pertinent obligations, then as  
a consequence you may not distribute the Program at all. For example, if a patent license  
would not permit royalty-free redistribution of the Program by all those who receive copies  
55  
Download from Www.Somanuals.com. All Manuals Search And Download.  
directly or indirectly through you, then the only way you could satisfy both it and this License  
would be to refrain entirely from distribution of the Program.  
If any portion of this section is held invalid or unenforceable under any particular  
circumstance, the balance of the section is intended to apply and the section as a whole is  
intended to apply in other circumstances.  
It is not the purpose of this section to induce you to infringe any patents or other property right  
claims or to contest validity of any such claims; this section has the sole purpose of protecting  
the integrity of the free software distribution system, which is implemented by public license  
practices. Many people have made generous contributions to the wide range of software  
distributed through that system in reliance on consistent application of that system; it is up to  
the author/donor to decide if he or she is willing to distribute software through any other  
system and a licensee cannot impose that choice.  
This section is intended to make thoroughly clear what is believed to be a consequence of the  
rest of this License.  
8. If the distribution and/or use of the Program is restricted in certain countries either by  
patents or by copyrighted interfaces, the original copyright holder who places the Program  
under this License may add an explicit geographical distribution limitation excluding those  
countries, so that distribution is permitted only in or among countries not thus excluded. In  
such case, this License incorporates the limitation as if written in the body of this License.  
9. The Free Software Foundation may publish revised and/or new versions of the General  
Public License from time to time. Such new versions will be similar in spirit to the present  
version, but may differ in detail to address new problems or concerns.  
Each version is given a distinguishing version number. If the Program specifies a version  
number of this License which applies to it and "any later version", you have the option of  
following the terms and conditions either of that version or of any later version published by  
the Free Software Foundation. If the Program does not specify a version number of this  
License, you may choose any version ever published by the Free Software Foundation.  
10. If you wish to incorporate parts of the Program into other free programs whose distribution  
conditions are different, write to the author to ask for permission. For software which is  
copyrighted by the Free Software Foundation, write to the Free Software Foundation; we  
sometimes make exceptions for this. Our decision will be guided by the two goals of  
preserving the free status of all derivatives of our free software and of promoting the sharing  
and reuse of software generally.  
NO WARRANTY  
11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO  
WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE  
LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT  
HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT  
WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT  
NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND  
FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY  
56  
Download from Www.Somanuals.com. All Manuals Search And Download.  
AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM  
PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING,  
REPAIR OR CORRECTION.  
12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN  
WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY  
MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE  
LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL,  
INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR  
INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF  
DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY  
YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH  
ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN  
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.  
END OF TERMS AND CONDITIONS  
57  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Lesser GNU General Public License  
GNU LESSER GENERAL PUBLIC LICENSE  
Version 2.1, February 1999  
Copyright (C) 1991, 1999 Free Software Foundation, Inc.  
59 Temple Place, Suite 330, Boston, MA 02111-1307 USA  
Everyone is permitted to copy and distribute verbatim copies of this license document, but  
changing it is not allowed.  
[This is the first released version of the Lesser GPL. It also counts as the successor of the  
GNU Library Public License, version 2, hence the version number 2.1.]  
Preamble  
The licenses for most software are designed to take away your freedom to share and change it.  
By contrast, the GNU General Public Licenses are intended to guarantee your freedom to share  
and change free software--to make sure the software is free for all its users.  
This license, the Lesser General Public License, applies to some specially designated software  
packages--typically libraries--of the Free Software Foundation and other authors who decide to  
use it. You can use it too, but we suggest you first think carefully about whether this license or  
the ordinary General Public License is the better strategy to use in any particular case, based on  
the explanations below.  
When we speak of free software, we are referring to freedom of use, not price. Our General  
Public Licenses are designed to make sure that you have the freedom to distribute copies of  
free software (and charge for this service if you wish); that you receive source code or can getit  
if you want it; that you can change the software and use pieces of it in new free programs; and  
that you are informed that you can do these things.  
To protect your rights, we need to make restrictions that forbid distributors to deny you these  
rights or to ask you to surrender these rights. These restrictions translate to certain  
responsibilities for you if you distribute copies of the library or if you modify it.  
For example, if you distribute copies of the library, whether gratis or for a fee, you must give  
the recipients all the rights that we gave you. You must make sure that they, too, receive or can  
get the source code. If you link other code with the library, you must provide complete object  
files to the recipients, so that they can relink them with the library after making changes to the  
library and recompiling it. And you must show them these terms so they know their rights.  
We protect your rights with a two-step method: (1) we copyright the  
library, and (2) we offer you this license, which gives you legal permission to copy, distribute  
and/or modify the library.  
To protect each distributor, we want to make it very clear that there is no warranty for the free  
library. Also, if the library is modified by someone else and passed on, the recipients should  
know that what they have is not the original version, so that the original author's reputation will  
not be affected by problems that might be introduced by others.  
Finally, software patents pose a constant threat to the existence of any free program. We wish  
to make sure that a company cannot effectively restrict the users of a free program by obtaining  
58  
Download from Www.Somanuals.com. All Manuals Search And Download.  
a restrictive license from a patent holder. Therefore, we insist that any patent license obtained  
for a version of the library must be consistent with the full freedom of use specified in this  
license.  
Most GNU software, including some libraries, is covered by the ordinary GNU General Public  
License. This license, the GNU Lesser General Public License, applies to certain designated  
libraries, and is quite different from the ordinary General Public License. We use this license  
for certain libraries in order to permit linking those libraries into non-free programs.  
When a program is linked with a library, whether statically or using a shared library, the  
combination of the two is legally speaking a combined work, a derivative of the original  
library. The ordinary General Public License therefore permits such linking only if the entire  
combination fits its criteria of freedom. The Lesser General Public License permits more lax  
criteria for linking other code with the library.  
We call this license the "Lesser" General Public License because it does Less to protect the  
user's freedom than the ordinary Genera Public License. It also provides other free software  
developers Less of an advantage over competing non-free programs. These disadvantages are  
the reason we use the ordinary General Public License for many libraries. However, the Lesser  
license provides advantages in certain special circumstances.  
For example, on rare occasions, there may be a special need to encourage the widest possible  
use of a certain library, so that it becomes a de-facto standard. To achieve this, non-free  
programs must be allowed to use the library. A more frequent case is that a free library does  
the same job as widely used non-free libraries. In this case, there is little to gain by limiting the  
free library to free software only, so we use the Lesser General Public License.  
In other cases, permission to use a particular library in non-free programs enables a greater  
number of people to use a large body of free software. For example, permission to use the  
GNU C Library in non-free programs enables many more people to use the whole GNU  
operating system, as well as its variant, the GNU/Linux operating system.  
Although the Lesser General Public License is Less protective of the users' freedom, it does  
ensure that the user of a program that is linked with the Library has the freedom and the  
wherewithal to run that program using a modified version of the Library.  
The precise terms and conditions for copying, distribution and modification follow. Pay close  
attention to the difference between a "work based on the library" and a "work that uses the  
library". The former contains code derived from the library, whereas the latter must be  
combined with the library in order to run.  
GNU LESSER GENERAL PUBLIC LICENSE  
TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND  
MODIFICATION  
0. This License Agreement applies to any software library or other program which contains a  
notice placed by the copyright holder or other authorized party saying it may be distributed  
under the terms of this Lesser General Public License (also called "this License").Each licensee  
is addressed as "you".  
A "library" means a collection of software functions and/or data prepared so as to be  
conveniently linked with application programs(which use some of those functions and data) to  
form executables.  
The "Library", below, refers to any such software library or work which has been distributed  
under these terms. A "work based on the Library" means either the Library or any derivative  
work under copyright law: that is to say, a work containing the Library or a portion of it, either  
59  
Download from Www.Somanuals.com. All Manuals Search And Download.  
verbatim or with modifications and/or translated straightforwardly into another language.  
(Hereinafter, translation is included without limitation in the term "modification".)  
"Source code" for a work means the preferred form of the work for making modifications to it.  
For a library, complete source code means all the source code for all modules it contains, plus  
any associated interface definition files, plus the scripts used to control compilation and  
installation of the library.  
Activities other than copying, distribution and modification are not covered by this License;  
they are outside its scope. The act of running a program using the Library is not restricted, and  
output from such a program is covered only if its contents constitute a work based on the  
Library (independent of the use of the Library in a tool for writing it). Whether that is true  
depends on what the Library does and what the program that uses the Library does.  
1. You may copy and distribute verbatim copies of the Library's complete source code as you  
receive it, in any medium, provided that you conspicuously and appropriately publish on each  
copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that  
refer to this License and to the absence of any warranty; and distribute a copy of this License  
along with the Library. You may charge a fee for the physical act of transferring a copy, and  
you may at your option offer warranty protection in exchange for a fee.  
2. You may modify your copy or copies of the Library or any portion of it, thus forming a work  
based on the Library, and copy and distribute such modifications or work under the terms of  
Section 1above, provided that you also meet all of these conditions:  
a) The modified work must itself be a software library.  
b) You must cause the files modified to carry prominent notices stating that you changed the  
files and the date of any change.  
c) You must cause the whole of the work to be licensed at no charge to all third parties under  
the terms of this License.  
d) If a facility in the modified Library refers to a function or a table of data to be supplied by an  
application program that uses the facility, other than as an argument passed when the facility is  
invoked, then you must make a good faith effort to ensure that, in the event an application does  
not supply such function or table, the facility still operates, and performs whatever part of its  
purpose remains meaningful.  
(For example, a function in a library to compute square roots has a purpose that is entirely  
well-defined independent of the application. Therefore, Subsection 2d requires that any  
application-supplied function or table used by this function must be optional: if the application  
does not supply it, the square root function must still compute square roots.)  
These requirements apply to the modified work as a whole. If identifiable sections of that  
work are not derived from the Library, and can be reasonably considered independent and  
separate works in themselves, then this License, and its terms, do not apply to those sections  
when you distribute them as separate works. But when you distribute the same sections as part  
of a whole which is a work based on the Library, the distribution of the whole must be on the  
terms of this License, whose permissions for other licensees extend to the entire whole, and  
thus to each and every part regardless of who wrote it.  
Thus, it is not the intent of this section to claim rights or contest your rights to work written  
entirely by you; rather, the intent is to exercise the right to control the distribution of derivative  
or collective works based on the Library.  
60  
Download from Www.Somanuals.com. All Manuals Search And Download.  
In addition, mere aggregation of another work not based on the Library with the Library (or  
with a work based on the Library) on a volume of a storage or distribution medium does not  
bring the other work under the scope of this License.  
3. You may opt to apply the terms of the ordinary GNU General Public License instead of this  
License to a given copy of the Library. To do this, you must alter all the notices that refer to  
this License, so that they refer to the ordinary GNU General Public License, version 2, instead  
of to this License. (If a newer version than version 2 of the ordinary GNU General Public  
License has appeared, then you can specify that version instead if you wish.) Do not make any  
other change in these notices.  
Once this change is made in a given copy, it is irreversible for that copy, so the ordinary GNU  
General Public License applies to all subsequent copies and derivative works made from that  
copy.  
This option is useful when you wish to copy part of the code of the Library into a program that  
is not a library.  
4. You may copy and distribute the Library (or a portion or derivative of it, under Section 2) in  
object code or executable form under the terms of Sections 1 and 2 above provided that you  
accompany it with the complete corresponding machine-readable source code, which must be  
distributed under the terms of Sections 1 and 2 above on a medium customarily used for  
software interchange.  
If distribution of object code is made by offering access to copy from a designated place, then  
offering equivalent access to copy the source code from the same place satisfies the  
requirement to distribute the source code, even though third parties are not compelled to copy  
the source along with the object code.  
5. A program that contains no derivative of any portion of the Library, but is designed to work  
with the Library by being compiled or linked with it, is called a "work that uses the Library".  
Such a work, in isolation, is not a derivative work of the Library, and therefore falls outside the  
scope of this License.  
However, linking a "work that uses the Library" with the Library creates an executable that is a  
derivative of the Library (because it contains portions of the Library), rather than a "work that  
uses the library". The executable is therefore covered by this License. Section 6 states terms  
for distribution of such executables.  
When a "work that uses the Library" uses material from a header file that is part of the Library,  
the object code for the work may be a derivative work of the Library even though the source  
code is not. Whether this is true is especially significant if the work can be linked without the  
Library, or if the work is itself a library. The threshold for this to be true is not precisely  
defined by law.  
If such an object file uses only numerical parameters, data structure layouts and accessories,  
and small macros and small inline functions (ten lines or less in length), then the use of the  
object file is unrestricted, regardless of whether it is legally a derivative work. (Executables  
containing this object code plus portions of the Library will still fall under Section 6.)  
Otherwise, if the work is a derivative of the Library, you may distribute the object code for the  
work under the terms of Section 6.Any executables containing that work also fall under Section  
6,whether or not they are linked directly with the Library itself.  
61  
Download from Www.Somanuals.com. All Manuals Search And Download.  
6. As an exception to the Sections above, you may also combine or link a "work that uses the  
Library" with the Library to produce a work containing portions of the Library, and distribute  
that work under terms of your choice, provided that the terms permit modification of the work  
for the customer's own use and reverse engineering for debugging such modifications.  
You must give prominent notice with each copy of the work that the Library is used in it and  
that the Library and its use are covered by this License. You must supply a copy of this  
License. If the work during execution displays copyright notices, you must include the  
copyright notice for the Library among them, as well as a reference directing the user to the  
copy of this License. Also, you must do one of these things:  
a) Accompany the work with the complete corresponding machine-readable source code for the  
Library including whatever changes were used in the work (which must be distributed under  
Sections 1 and 2 above); and, if the work is an executable linked with the Library, with the  
complete machine-readable "work that uses the Library", as object code and/or source code, so  
that the user can modify the Library and then relink to produce a modified executable  
containing the modified Library. (It is understood that the user who changes the contents of  
definitions files in the Library will not necessarily be able to recompile the application to use  
the modified definitions.)  
b) Use a suitable shared library mechanism for linking with the Library. A suitable mechanism  
is one that (1) uses at run time a copy of the library already present on the user's computer  
system, rather than copying library functions into the executable, and (2) will operate properly  
with a modified version of the library, if the user installs one, as long as the modified version is  
interface-compatible with the version that the work was made with.  
c) Accompany the work with a written offer, valid for at least three years, to give the same user  
the materials specified in Subsection 6a, above, for a charge no more than the cost of  
performing this distribution.  
d) If distribution of the work is made by offering access to copy from a designated place, offer  
equivalent access to copy the above specified materials from the same place.  
e) Verify that the user has already received a copy of these materials or that you have already  
sent this user a copy.  
For an executable, the required form of the "work that uses the Library" must include any data  
and utility programs needed for reproducing the executable from it. However, as a special  
exception, the materials to be distributed need not include anything that is normally distributed  
(in either source or binary form) with the major components (compiler, kernel, and so on) of  
the operating system on which the executable runs, unless that component itself accompanies  
the executable.  
It may happen that this requirement contradicts the license restrictions of other proprietary  
libraries that do not normally accompany the operating system. Such a contradiction means  
you cannot use both them and the Library together in an executable that you distribute.  
7. You may place library facilities that are a work based on the Library side-by-side in a single  
library together with other library facilities not covered by this License, and distribute such a  
combined library, provided that the separate distribution of the work based on the Library and  
of the other library facilities is otherwise permitted, and provided that you do these two things:  
a) Accompany the combined library with a copy of the same work based on the Library,  
uncombined with any other library facilities. This must be distributed under the terms of the  
Sections above.  
b) Give prominent notice with the combined library of the fact that part of it is a work based on  
the Library, and explaining where to find the accompanying uncombined form of the same  
work.  
62  
Download from Www.Somanuals.com. All Manuals Search And Download.  
8. You may not copy, modify, sublicense, link with, or distribute the Library except as  
expressly provided under this License. Any attempt otherwise to copy, modify, sublicense, link  
with, or distribute the Library is void, and will automatically terminate your rights under this  
License. However, parties who have received copies, or rights, from you under this License  
will not have their licenses terminated so long as such parties remain in full compliance.  
9. You are not required to accept this License, since you have not signed it. However, nothing  
else grants you permission to modify or distribute the Library or its derivative works. These  
actions are prohibited by law if you do not accept this License. Therefore, by modifying or  
distributing the Library (or any work based on the Library), you indicate your acceptance of  
this License to do so, and all its terms and conditions for copying, distributing or modifying the  
Library or works based on it.  
10. Each time you redistribute the Library (or any work based on the Library), the recipient  
automatically receives a license from the original licensor to copy, distribute, link with or  
modify the Library subject to these terms and conditions. You may not impose any further  
restrictions on the recipients' exercise of the rights granted herein. You are not responsible for  
enforcing compliance by third parties with this License.  
11. If, as a consequence of a court judgment or allegation of patent infringement or for any  
other reason (not limited to patent issues), conditions are imposed on you (whether by court  
order, agreement or otherwise) that contradict the conditions of this License, they do not  
excuse you from the conditions of this License. If you cannot distribute so as to satisfy  
simultaneously your obligations under this License and any other pertinent obligations, then as  
a consequence you may not distribute the Library at all. For example, if a patent license would  
not permit royalty-free redistribution of the Library by all those who receive copies directly or  
indirectly through you, then the only way you could satisfy both it and this License would be to  
refrain entirely from distribution of the Library. If any portion of this section is held invalid or  
unenforceable under any particular circumstance, the balance of the section is intended to  
apply, and the section as a whole is intended to apply in other circumstances. It is not the  
purpose of this section to induce you to infringe any patents or other property right claims or to  
contest validity of any such claims; this section has the sole purpose of protecting the integrity  
of the free software distribution system which is implemented by public license practices.  
Many people have made generous contributions to the wide range of software distributed  
through that system in reliance on consistent application of that system; it is up to the  
author/donor to decide if he or she is willing to distribute software through any other system  
and a licensee cannot impose that choice. This section is intended to make thoroughly clear  
what is believed to be a consequence of the rest of this License.  
12. If the distribution and/or use of the Library is restricted in certain countries either by  
patents or by copyrighted interfaces, the original copyright holder who places the Library under  
this License may add an explicit geographical distribution limitation excluding those countries,  
so that distribution is permitted only in or among countries not thus excluded. In such case, this  
License incorporates the limitation as if written in the body of this License.  
13. The Free Software Foundation may publish revised and/or new versions of the Lesser  
General Public License from time to time. Such new versions will be similar in spirit to the  
present version, but may differ in detail to address new problems or concerns. Each version is  
given a distinguishing version number. If the Library specifies a version number of this  
License which applies to it and "any later version", you have the option of following the terms  
63  
Download from Www.Somanuals.com. All Manuals Search And Download.  
and conditions either of that version or of any later version published by the Free Software  
Foundation. If the Library does not specify a license version number, you may choose any  
version ever published by the Free Software Foundation.  
14. If you wish to incorporate parts of the Library into other free programs whose distribution  
conditions are incompatible with these, write to the author to ask for permission. For software  
which is copyrighted by the Free Software Foundation, write to the Free Software Foundation;  
we sometimes make exceptions for this. Our decision will be guided by the two goals of  
preserving the free status of all derivatives of our free software and of promoting the sharing  
and reuse of software generally.  
NO WARRANTY  
15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO  
WARRANTY FOR THE LIBRARY, TO THE EXTENT PERMITTED BY APPLICABLE  
LAW.  
EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS  
AND/OR OTHER PARTIES PROVIDE THE LIBRARY "AS IS" WITHOUT WARRANTY  
OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED  
TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A  
PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND  
PERFORMANCE OF THE LIBRARY IS WITH YOU. SHOULD THE LIBRARY PROVE  
DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR  
OR CORRECTION.  
16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN  
WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY  
MODIFY AND/OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE, BE  
LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL,  
INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR  
INABILITY TO USE THE LIBRARY (INCLUDING BUT NOT LIMITED TO LOSS OF  
DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY  
YOU OR THIRD PARTIES OR A FAILURE OF THE LIBRARY TO OPERATE WITH  
ANY OTHER SOFTWARE), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN  
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.  
END OF TERMS AND CONDITIONS  
64  
Download from Www.Somanuals.com. All Manuals Search And Download.  

Lexmark Network Card x560 User Manual
LG Electronics Projector RD JT91 User Manual
LG Electronics Refrigerator LMX28988 User Manual
Life Fitness Bicycle 93CW User Manual
Lincoln Electric Welding System CV 305 User Manual
Linear Car Stereo System M3300CD User Manual
Lochinvar Water Heater 151 801 User Manual
Magnavox DVD VCR Combo MWD2206 User Manual
M Audio Headphones gd_060903 User Manual
Metabo Air Compressor MEGA 450D User Manual