Page 26 / 66 Scroll up to view Page 21 - 25
Appendix A
Troubleshooting
25
Wireless-N Internet Home Monitoring Camera
What IEEE 802.11g features are supported?
The product supports the following IEEE 802.11g
functions:
CSMA/CA plus Acknowledge protocol
OFDM protocol
Multi-Channel Roaming
Automatic Rate Selection
RTS/CTS feature
Fragmentation
Power Management
What is ad-hoc mode?
When a wireless network is set to ad-hoc mode, the
wireless-equipped
computers
are
configured
to
communicate directly with each other. The ad-hoc
wireless network will not communicate with any wired
network.
What is infrastructure mode?`
When a wireless network is set to infrastructure mode,
the wireless network is configured to communicate
with a wired network through a wireless access point
or router.
WEB:
If your questions are not addressed
here,
refer
to
the
Linksys
website,
www.linksysbycisco.com
Page 27 / 66
Appendix B
Wireless Security Checklist
26
Wireless-N Internet Home Monitoring Camera
Appendix B:
Wireless Security Checklist
Wireless networks are convenient and easy to install, so
homes with high-speed Internet access are adopting them
at a rapid pace. Because wireless networking operates by
sending information over radio waves, it can be more
vulnerable to intruders than a traditional wired network.
Like signals from your cellular or cordless phones, signals
from your wireless network can also be intercepted. Since
you cannot physically prevent someone from connecting
to your wireless network, you need to take some additional
steps to keep your network secure.
1. Change the default wireless
network name or SSID
Wireless devices have a default wireless network name
or Service Set Identifier (SSID) set by the factory. This
is the name of your wireless network, and can be up
to 32 characters in length. Linksys wireless products
use
linksys
as the default wireless network name. You
should change the wireless network name to something
unique to distinguish your wireless network from other
wireless networks that may exist around you, but do not
use personal information (such as your Social Security
number) because this information may be available for
anyone to see when browsing for wireless networks.
2. Change the default password
For wireless products such as access points, routers, and
gateways, you will be asked for a password when you
want to change their settings. These devices have a default
password set by the factory. The Linksys default password
is
admin
. Hackers know these defaults and may try to
use them to access your wireless device and change your
network settings. To thwart any unauthorized changes,
customize the device’s password so it will be hard to
guess.
3. Enable MAC address filtering
Linksys routers and gateways give you the ability to
enable Media Access Control (MAC) address filtering. The
MAC address is a unique series of numbers and letters
assigned to every networking device. With MAC address
filtering enabled, wireless network access is provided
solely for wireless devices with specific MAC addresses.
For example, you can specify the MAC address of each
computer in your home so that only those computers can
access your wireless network.
4. Enable encryption
Encryption protects data transmitted over a wireless
network. Wi-Fi Protected Access (WPA/WPA2) and Wired
Equivalent Privacy (WEP) offer different levels of security
for wireless communication.
A network encrypted with WPA/WPA2 is more secure
than a network encrypted with WEP, because WPA/WPA2
uses dynamic key encryption. To protect the information
as it passes over the airwaves, you should enable the
highest level of encryption supported by your network
equipment.
WEP is an older encryption standard and may be the
only option available on some older devices that do not
support WPA.
General Network Security Guidelines
Wireless network security is useless if the underlying
network is not secure.
Password protect all computers on the network and
individually password protect sensitive files.
Change passwords on a regular basis.
Install
anti-virus
software
and
personal
firewall
software.
Disable file sharing (peer-to-peer). Some applications
may open file sharing without your consent and/or
knowledge.
Additional Security Tips
Keep wireless routers, access points, or gateways away
from exterior walls and windows.
Turn wireless routers, access points, or gateways
off when they are not being used (at night, during
vacations).
Use strong passphrases that are at least eight characters
in length. Combine letters and numbers to avoid using
standard words that can be found in the dictionary.
WEB:
For
more
information
on
wireless
security, visit
www.linksysbycisco.com/security
Page 28 / 66
Appendix C
Specifications
27
Wireless-N Internet Home Monitoring Camera
Appendix C:
Specifications
Specifications
Model
WVC80N
Standards
IEEE 802.3u, 802.11g,
802.11b, draft 802.11n
LEDs
Power, Wi-Fi Protected
Setup™
Ports
Power, Ethernet
Buttons
Power, Reset,
Wi-Fi Protected Setup™
Cabling Type
Cat 5
Number of Antennas
1
Detachable (y/n)
No
Modulations
802.11b: CCK/QPSK, BPSK
802.11g: OFDM/BPSK,
QPSK, 16-QAM, 64-QAM
802.11n: OFDM/BPSK,
QPSK, 16-QAM, 64-QAM
RF Power (EIRP) in dBm
802.11b: 18 dBm (typical)
@ 11Mbps
802.11g: 16 dBm (typical)
@ 54Mbps
802.11n:
15dBm (typical)
@ 65Mbps (HT20),
135Mbps (HT40)
Receive Sensitivity in dBm
802.11b: -87dBm (typical)
@ 11Mbps
802.11g: -72dBm (typical)
@ 54Mbps
802.11n: -70dBm (typical)
@ MCS7, -65dBm (typical)
@ MCS7
Antenna Gain in dBi
1.5 dBi
UPnP able/cert
UPnP Advertise
Wireless Security
WEP, WPA, Wi-Fi Protected
Access™ 2 (WPA2)
Security key bits
Up to 128-bit encryption
OS Requirements
Windows XP, Vista, or Vista
64-bit edition with latest
updates (for Setup Wizard
only)
Effective Focus
50cm to unlimited
Sensitivity
6.0V/Lux-sec
Field of View
61.2 degrees
Compression Algorithm
MPEG-4 part 2 and MJPEG
Record File Format
ASF, AVI
Brightness
Auto/Manual Adjustment
Environmental
Dimensions
3.54” x 4.72” x 1.46”
(90 x 120 x 37 mm)
Weight
4.59 oz (130 g)
Power
5V, 1A
Certification
FCC, UL/cUL, ICES-003,
RSS210
Operating Temp.
32 to 95°F (0 to 35°C)
Storage Temp.
-4 to 140°F (-20 to 60°C)
Operating Humidity
10 to 80% Noncondensing
Storage Humidity
0 to 90% Noncondensing
Minimum System Requirements
For Setup
Windows PC with Internet
Explorer 6 or higher for
browser-based
configuration, or Setup
Wizard software requires
CD or CD/DVD drive and
up-to-date Windows XP,
Vista, or Vista 64-bit
Edition
For Viewing Video
Windows PC with included
Monitoring Utility, or any
computer with Internet
Explorer 6, Safari 3, or
Firefox 2 or higher, or a
stream-enabled video
player (VLC, Quicktime
Player, Windows Media
Player version 9 or higher,
etc.), or smartphone with
advanced web browser or
RSTP
Page 29 / 66
Appendix D
CGI Commands
28
Wireless-N Internet Home Monitoring Camera
Appendix D:
Common Gateway Interface (CGI) Commands
Overview
CGI (Common Gateway Interface) is a simple method to send or receive data from a program or application through a web
interface.
The WVC80N supports a multitude of CGI commands that can be passed to it via HTTP from your client PC or mobile
phone. This will allow you to perform basic functions such as view the camera’s video stream, capture a snapshot or retrieve the
camera’s status information.
This appendix details all the supported CGI commands for this camera.
NOTE:
Using CGI commands is only recommended for advanced users.
User-Level CGI Commands (User level privilege)
Video and Image commands
Stream MPEG-4 Video and Audio
Method:
GET
URL:
http://<ip>/img/video.asf
or
http://<ip>/img/video.asx (Windows Vista)
Return:
A “video.asf” file is returned through the HTTP protocol.
HTTP/1.0 200 OK\r\n
content-type: application/octet-stream\r\n
<MPEG-4 video data>
Stream M-JPEG Video
HTML page for the end user
Method:
GET
URL:
http://<ip>/img/mjpeg.htm
Return:
HTTP/1.0 200 OK\r\n
content-type: text/html\r\n
http://<ip>/img/video.mjpeg
Page 30 / 66
Appendix D
CGI Commands
29
Wireless-N Internet Home Monitoring Camera
Snapshot
Method:
GET
URL:
http://<ip>/img/snapshot.cgi?[size=<value>][&quality=<value>]
Parameter
Value and description
size
Image resolution
1:
160x120
2:
320x240
3:
640x480
quality
Quality level
1:
Very high
2:
High
3:
Normal
4:
Low
5:
Very low
Snapshot (continued)
Example 1: To snapshot a 640x480 very high quality JPEG image from network Camera 192.168.0.99,
Example 2: To snapshot a JPEG image from network Camera 192.168.0.99 (with current resolution and quality),
Example 3: To snapshot a low quality JPEG image with current resolution from the network Camera 192.168.0.99,
Return:
A JPEG image is returned to the client with the user specified resolution and quality.
HTTP/1.0 200 OK\r\n
content-type: image/jpeg\r\n
<JPEG image data>
SDP (MPEG-4 video only, not for MJPEG video)
Method:
GET
URL:
http://<ip>/img/media.sdp
Return:
A SDP file is returned.
HTTP/1.0 200 OK\r\n
<SDP data>
RTP/RTSP (MPEG-4 video only, not for MJPEG video)
The user can stream video and audio through the following URLs.
Video and audio:
rtsp://<ip>/img/media.sav
Video only:
rtsp://<ip>/img/video.sav
Audio only:
rtsp://<ip>/img/audio.sav

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top