Video servers (IP transmission) Comparison: Hikvision, Dahua Technology (4)
| Contact manufacturer | Contact | Contact | Contact | Contact |
| Video Inputs |
12
|
4
|
4
|
128
|
| Data Input |
✔
|
--
|
--
|
✔
|
| Alarm Input |
✔
|
✔
|
✔
|
✔
|
| Compression Type |
H.264/ JPEG /M-JPEG/MPEG-4
|
H.264/ JPEG /M-JPEG/MPEG-4
|
H.264/ JPEG /M-JPEG/MPEG-4
|
Smart H.265+/Smart H.264+/H.265/H.264
|
| Interface |
One 10/100/1000Mbps self-adaptive Ethernet interface
|
--
|
--
|
4 RJ-45 10/100/1000 Mbps self-adaptive Ethernet ports
|
| Resolution TVL |
1920 x 1080
|
--
|
3840 x 2160
|
32MP/24MP/16MP/12MP/8MP/6MP/5MP/4MP/3MP/10 80p/960p/720p/D1/CIF/QCIF
|
| Audio Input |
--
|
✔
|
--
|
✔
|
| Video Outputs |
--
|
12
|
9
|
4
|
| System Requirements |
--
|
LINUX
|
LINUX
|
Embedded Linux OS
|
| Network Protocols |
--
|
--
|
--
|
HTTP; HTTPS; TCP/IP; IPv4; RTSP; UDP; SMTP; NTP; DHCP; DNS; DDNS; P2P
|
| Bandwidth MHz |
--
|
--
|
--
|
Incoming bandwidth: 400 Mbps, Recording bandwidth: 320 Mbps, Outgoing bandwidth: 96 Mbps
|
| Image per second (IPS) |
--
|
--
|
--
|
20/25/30/60fps
|
| Web Browser |
--
|
--
|
--
|
Chrome; PCAPP; IE9 or higher; Firefox
|
Related Videos
OmniVista 2500 - Locator Introduction
OmniVista 2500 - Locator Historical Data Search
OmniVista 2500 - Top N Clients Application
Latest Video server (IP transmission) case studies
The IP-based video surveillance system consists of a LILIN NVR recorder, HD video decoder, VMS software, and IP cameras Background Tenaga Nasional Berhad (TNB)...
Sony deployed a combination of analog cameras and network cameras to implement HD monitoring along Changping line Background The Beijing Subway serves the city&...
Background Wangke Corporation selected LILIN cameras and NVRs to provide security at the Beijing ZhongLiang WanKe shopping mall and entertainment centre in Beijing, China. Beijin...
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download
