Video servers (IP transmission) Comparison: Bosch, LILIN (4)
| Contact manufacturer | Contact | Contact | Contact | Contact |
| Video Inputs |
16
|
4
|
CVBS 1.0 V
|
1
|
| Audio Input |
✔
|
--
|
✔
|
✔
|
| Alarm Input |
✔
|
--
|
--
|
--
|
| Compression Type |
H.264/M-JPEG
|
--
|
H.264/M-JPEG
|
H.264/M-JPEG
|
| Network Protocols |
IPv4, IPv6, UDP, TCP, HTTP, HTTPS, RTP/ RTCP, IGMP V2/V3, ICMP, ICMPv6, RTSP, FTP, Telnet, ARP, DHCP, NTP (SNTP), SNMP (V1, MIB-II), 802.1x, DNS, DNSv6, DDNS (DynDNS.org, selfHOST.de, noip.com), SMTP, iSCSI, UPnP (SSDP), DiffServ (QoS), LLDP, SOAP, Dropbo
|
--
|
RTP/HTTP, RTP/TCP, RTP/UDP
|
RTP/HTTP, RTP/TCP, RTP/UDP
|
| Interface |
10/100/1000 Base-T, auto sensing, half/full duplex, RJ45
|
--
|
--
|
10Mbps / 100Mbps , RJ-45
|
| Resolution TVL |
704 x 576 p
|
--
|
960 x 480
|
960 x 480
|
| Image per second (IPS) |
30
|
--
|
--
|
30 / 25
|
| Data Input |
--
|
✔
|
--
|
--
|
| Web Browser |
--
|
--
|
Windows Internet Explorer 6, 7, 8
|
Windows Internet Explorer 6, 7, 8
|
| Bandwidth MHz |
--
|
--
|
--
|
128 Kbps ~ 3 Mbps
|
| Control |
--
|
--
|
--
|
RS-485
|
| System Requirements |
--
|
--
|
--
|
Windows 2000, XP, Vista, 7
|
Related Videos
OmniVista 2500 - Locator Introduction
OmniVista 2500 - Locator Historical Data Search
OmniVista 2500 - Top N Clients Application
Latest Video server (IP transmission) case studies
The IP-based video surveillance system consists of a LILIN NVR recorder, HD video decoder, VMS software, and IP cameras Background Tenaga Nasional Berhad (TNB)...
Background Wangke Corporation selected LILIN cameras and NVRs to provide security at the Beijing ZhongLiang WanKe shopping mall and entertainment centre in Beijing, China. Beijin...
Reliable technology from Bosch Security Systems is playing a principal role in a new CCTV installation at the University of Sussex as it extends the IP camera network to cover furt...
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download
