11.07.2015 Views

XProtect Express 1.1; Administrator's Manual - Milestone

XProtect Express 1.1; Administrator's Manual - Milestone

XProtect Express 1.1; Administrator's Manual - Milestone

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Milestone</strong> <strong>XProtect</strong> ® <strong>Express</strong> <strong>1.1</strong><strong>Administrator's</strong> <strong>Manual</strong>MJPEGMotion JPEG—compressed video format whereeach frame is a separately compressed JPEGimage. The method used is quite similar to the I-frame method used for MPEG, but no interframeprediction is used. This allows for somewhat easierediting, and makes compression independent of theamount of motion.Monitor1) A computer screen. 2) An application used inprevious versions of <strong>XProtect</strong> <strong>Express</strong> for recordingand displaying video. The Monitor application hasbeen discontinued.MPEGCompression standards and file formats for digitalvideo developed by the Moving Pictures ExpertsGroup. MPEG standards use so-called lossycompression as they store only the changesbetween frames, removing often considerableamounts of redundant information. Keyframesstored at specified intervals record the entire view ofthe camera, whereas the frames that follow recordonly pixels that change. This helps greatly reducethe size of MPEG files.NTLMNIn a Windows network, NT LAN Manager is anetwork authentication protocol.PanomorphA type of lens that allows the creation and viewingof 360-degree images.P-framePPredictive frame—the MPEG standard for digitalvideo compression uses P-frames together with I-frames. An I-frame, also known as a keyframe, is asingle frame stored at specified intervals. The I-frame records the entire view of the camera,whereas the frames that follow (the P-frames)record only the pixels that change. This helpsgreatly reduce the size of MPEG files.PINPersonal identification number (or personal identitynumber)—number used to identify and authenticateusers.PingA computer network administration utility used todetermine whether an IP address is available, bysending a small amount of data to see if it responds.The word ping was chosen because it mirrors thesound of a sonar. You send the ping commandusing a Windows command prompt.PollingRegularly checking the state of something, forexample, whether input has been received on aparticular input port of a device. The defined intervalbetween such state checks is often called a pollingfrequency.PortLogical endpoint for data traffic. Networks usedifferent ports for different types of data traffic.Therefore it is sometimes, but not always,necessary to specify which port to use for particulardata communication. Most ports are usedautomatically based on the types of data included inthe communication. On TCP/IP networks, portnumbers range from 0 to 65536, but only ports 0 to1024 are reserved for particular purposes. Forexample, port 80 is used for HTTP traffic, which isused when viewing web pages.POS(Also PoS) Point of sale; the physical place where asale is made, for example, at the cash register.Post-recordingThe ability to store recordings from periods followingmotion and/or specified events. Based on incomingvideo being buffered on the <strong>XProtect</strong> <strong>Express</strong> serverin case it is going to be needed for a motion- orevent-triggered recording. Using post-recording canbe highly advantageous: if, for example, you havedefined that video should be recorded while a gateis open, being able to see what happensimmediately after the gate is closed may also beimportant.Pre-alarmwww.milestonesys.com 172 Glossary of terms

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!