1, now the camera, the current market has a fiber optic network camera, the back end of the interface directly with fiber optics.
2, if the network camera, then add a fiber optic transceiver can be, fiber optic transceiver is the optical signal and digital signal through the conversion of the device.
3, if it is an analog camera with the addition of optical transceiver, optical transceiver is the optical signal and analog signal through the conversion device.
Network camera is a combination of traditional cameras and network technology produced by a new generation of cameras, it can be transmitted to the other side of the globe through the network image, and the remote end of the viewer does not need to use any professional software, as long as the standard Web browser (such as "Microsoft IE or Netscape) can monitor its image. Network cameras are generally composed of a lens, image, sound sensor, A/D converter, image, sound, controller web server, external alarm, control interface and other components.
Use:
With the rapid development of the network, network products gradually cover all corners of our lives. Network camera development and innovation, widely used in many fields, such as education, business, medical, public **** business
In the bank, supermarkets, companies and even some families in the use of ordinary audio and video camera surveillance system is gradually being replaced by a network camera, all the contents of the filming will be directly on the Internet dissemination. You can sit at home or anywhere you have Internet access and see real-time updated photo images or motion pictures from public or private sources.
Civilian camera:
1, the maturity of network camera technology
2, the development of Internet access
3, the public's awareness of security
4, cell phone video surveillance and alarm system is a set of security into the civilization of a set of intelligent systems, the system integrates a cell phone monitoring and cell phone burglar alarm system, when an illegal person breaks into the restricted area of the security zone. When an illegal person breaks into the forbidden area of the defense, the system host will be the first time to the designated user to call and send a text message or email! Users can receive the phone text message the first time with a cell phone or computer to view the monitoring area of the screen.