all | frequencies |
|
|
|
|
exhibits | applications |
---|---|---|---|---|---|---|---|
manual | photos | label |
app s | submitted / available | |||||||
---|---|---|---|---|---|---|---|---|
1 |
|
User manual | Users Manual | 2.16 MiB | July 30 2010 | |||
1 |
|
Internal photos | Internal Photos | 2.23 MiB | July 30 2010 | |||
1 |
|
External photos | External Photos | 1.02 MiB | July 30 2010 | |||
1 |
|
Label format and location | ID Label/Location Info | 229.69 KiB | July 30 2010 | |||
1 |
|
Agent authorization | Cover Letter(s) | 57.69 KiB | July 30 2010 | |||
1 | Antenna specification 1 of 2 | Operational Description | July 30 2010 | confidential | ||||
1 | Antenna specification 2 of 2 | Operational Description | July 30 2010 | confidential | ||||
1 |
|
Attestation letter | Attestation Statements | 66.48 KiB | July 30 2010 | |||
1 | Block Diagram 1 of 2 | Block Diagram | July 30 2010 | confidential | ||||
1 | Block Diagram 2 of 2 | Block Diagram | July 30 2010 | confidential | ||||
1 |
|
MPE calculation | RF Exposure Info | 164.36 KiB | July 30 2010 | |||
1 | Operational description | Operational Description | July 30 2010 | confidential | ||||
1 |
|
Request for confidentiality | Cover Letter(s) | 55.21 KiB | July 30 2010 | |||
1 | Schematics 1 of 2 | Schematics | July 30 2010 | confidential | ||||
1 | Schematics 2 of 2 | Schematics | July 30 2010 | confidential | ||||
1 |
|
Test report | Test Report | 1003.37 KiB | July 30 2010 | |||
1 |
|
Test setup photos | Test Setup Photos | 389.09 KiB | July 30 2010 |
1 | User manual | Users Manual | 2.16 MiB | July 30 2010 |
Wireles Outdoor Camera Users Guide Table of Contents CHAPTER 1 INTRODUCTION.............................................................................................. 1 Overview ............................................................................................................................ 1 Physical Details - Network Camera ................................................................................. 4 Package Contents .............................................................................................................. 6 CHAPTER 2 BASIC SETUP ................................................................................................... 7 System Requirements........................................................................................................ 7 Installation - Network Camera......................................................................................... 7 Setup using the Windows Wizard .................................................................................... 9 CHAPTER 3 VIEWING LIVE VIDEO ................................................................................ 14 Overview .......................................................................................................................... 14 Requirements................................................................................................................... 14 Connecting to a Camera on your LAN.......................................................................... 14 Connecting to a Camera via the Internet ...................................................................... 16 Viewing Live Video ......................................................................................................... 18 CHAPTER 4 ADVANCED VIEWING SETUP ................................................................... 20 Introduction ..................................................................................................................... 20 Adjusting the Video Image ............................................................................................. 20 Viewing the live Video on your cell phone..................................................................... 23 Controlling User Access to the Video Stream ............................................................... 25 Making Video available from the Internet.................................................................... 26 Viewing Live Video via the Internet .............................................................................. 29 Motion Detection Alerts.................................................................................................. 30 CHAPTER 5 WEB-BASED MANAGEMENT .................................................................... 32 Introduction ..................................................................................................................... 32 Connecting to Network Camera..................................................................................... 32 Welcome Screen............................................................................................................... 33 Administration Menu...................................................................................................... 34 System Screen .................................................................................................................. 35 Network Screen................................................................................................................ 37 Wireless Screen (Wireless Model Only) ........................................................................ 40 DDNS Screen ................................................................................................................... 42 Video Image Screen......................................................................................................... 44 Video Access Screen ........................................................................................................ 47 User Database Screen...................................................................................................... 49 Motion Detection Screen................................................................................................. 50 E-Mail Screen .................................................................................................................. 51 FTP Screen....................................................................................................................... 53 HTTP Screen ................................................................................................................... 54 Event Trigger Screen ...................................................................................................... 55 Maintenance Screen ........................................................................................................ 57 Status Screen.................................................................................................................... 59 Log Screen........................................................................................................................ 61 CHAPTER 6 WINDOWS VIEWING/RECORDING UTILITY........................................ 62 Overview .......................................................................................................................... 62 Installation ....................................................................................................................... 62 System Tray Icon............................................................................................................. 63 Main Screen ..................................................................................................................... 63 Camera Setup .................................................................................................................. 64 i Monitor Program - for Streams Live Viewing.............................................................. 68 Recorder Program - for Streams Recording................................................................. 70 CHAPTER 7 TROUBLESHOOTING .................................................................................. 75 Overview .......................................................................................................................... 75 Problems........................................................................................................................... 75 APPENDIX A SPECIFICATIONS........................................................................................ 77 Network Camera ............................................................................................................. 77 Regulatory Approvals ..................................................................................................... 77 Copyright Notice.............................................................................................................. 78 APPENDIX B STREAMING VIDEO/AUDIO SOLUTION............................................... 93 Overview .......................................................................................................................... 93 Streaming Video/Audio through Internet Camera....................................................... 93 P/N: 956YFF0001 Copyright 2009. All Rights Reserved. Document Version: 1.3 All trademarks and trade names are the properties of their respective owners. ii Chapter 1 Introduction 1 This Chapter provides details of the Network Camera's features, components and capabilities. Overview The Network Camera has an Integrated Microcomputer and a high quality CMOS digital-
Image-Sensor, enabling it to display high quality live streaming video over your wired LAN, the Internet, and for the Network Camera, an 802.11g Wireless LAN. Using enhanced MPEG-4 technologies, the Network Camera is able to stream high quality video and audio directly to your PC. The high compression capabilities of MPEG-4 reduce network bandwidth requirements to amazingly low levels. A convenient and user-friendly Windows program is provided for both viewing and recording video. If necessary, you can even view video using your Web Browser, on a variety of software platforms. Figure 1: Network Camera Features Standalone Design. The Network Camera is a standalone system with built-in CPU and Video encoder. It requires only a power source and a connection to your LAN or Wireless LAN. Dual Video Support. The Network Camera can support both MEPG4 and MJEPG video for different image compression. 1 Stream Live Video to Multiple Users. The MPEG4 encoder and HTTP server built into the camera generate a ready-to-view video stream. Just connect to the camera using your Web browser or the provided Windows utility to view live video. Suitable for Home, Business or Public Facilities. Whether for Home, Business or Public Facility surveillance, or just for entertainment and fun, the Network Camera has the features you need. Multi-Protocol Support. Supporting TCP/IP networking, SMTP (E-mail), HTTP and other Internet related protocols, the Network Camera can be easily integrated into your existing network. Easy Configuration. A Windows-based Wizard is provided for initial setup. Subsequent administration and management can be performed using a standard web browser. The administrator can configure and manage the Network Camera via the LAN or Internet. Viewing/Recording Utility. A user-friendly Windows utility is provided for viewing live video. For periods when you are absent, or for scheduled recording, this application also allows you to record video to an ASF file on your PC. The recorded files are in a standard Windows Media format, and thus usable by a wide variety of programs if required. Motion Detection. This feature can detect motion in the field of view. The Network Camera will compare consecutive frames to detect changes caused by the movement of large objects. This function only works indoors due to the sensitivity of the CMOS sensor. When motion is detection, an E-mail alert can be sent, or some other action may be triggered. Flexible Scheduling. You can limit access to the video stream to specified times using a flexible scheduling system. The Motion Detection feature can also have its own schedule, so it is active only when required. Syslog Support. If you have a Syslog Server, the Network Camera can send its log data to your Syslog Server. Audio Support. You can listen as well as look! Audio is encoded with the video if desired. You can use either the built-in microphone or an external microphone. Internet Features User-definable HTTP port number. This allows Internet Gateways to use "port mapping" so the Network Camera and a Web Server can share the same Internet IP address. DDNS Support. In order to view video over the Internet, users must know the Internet IP address of the gateway used by the Network Camera. But if the Gateway has a dynamic IP address, DDNS (Dynamic DNS) is required. Since many existing Gateways do not support DDNS, this function is incorporated into the Network Camera. NTP (Network-Time-Protocol) Support. NTP allows the Network Camera to calibrate its internal clock from an Internet Time-Server. This ensures that the time stamp on Video from the Network Camera will be correct. Security Features User Authentication. If desired, access to live video can be restricted to known users. Users will have to enter their username and password before being able to view the video stream. Up to 5 users can be entered. Password-Protected Configuration. Configuration data can be password protected, so that it only be changed by the Network Camera Administrator. 2 Wireless Features (Wireless Model Only) Standards Compliant. The Network Camera complies with the IEEE802.11g (DSSS) specifications for Wireless LANs. Supports both 802.11b and 802.11g Standards. The Network Camera supports both 802.11b and 802.11g standards. Speeds to 54Mbps. All speeds up to the 802.11g maximum of 54Mbps are supported. Wired and Wireless Network Support. The Network Camera supports either wired or wireless transmission. WEP Support. Full WEP support (64/128 Bit) on the Wireless interface is provided. WPA/WPA2 Support. The WPA Personal/WPA2 Personal standard is also supported, allowing advanced encryption of wireless data. WPS Support. WPS (Wi-Fi Protected Setup) can simplify the process of connecting any device to the wireless network by using the push button configuration (PBC) on the Wireless Access Point, or entering a PIN code if there's no button. 3 Physical Details - Network Camera Front - Network Camera Privacy Button Lens Microphone Reset Button Power LED
(Green) Figure 2: Front Panel On (Green) - The privacy button is activated. Off - The privacy button is not in use. No physical adjustment is required or possible for the lens, but you should ensure that the lens cover remain clean. The image quality is degraded if the lens cover is dirty or smudged. The built-in microphone is mounted on the front. This button is recessed; you need a pin or paper clip can be used to depress it. It can be activated at any time the camera is in the
"ready" mode. Reset to manufacturer default valued and reboot. When pressed and held over 10 seconds, the settings of Network Camera will be set to their default values. Note:
After this procedure is completed, the Power LED will blink three times to confirm that the reset was completed successfully. On - Power on. Off - No power. Blinking - The Power LED will blink during start up. This will take 15 to 20 seconds. 4 Network LED
(Green, Amber) On (Green) - Wireless or LAN connection is available. Off - Wireless or LAN is not connected or camera is not sending/receiving data. Blinking (Green) - Data is being transmitted or received via the LAN or Wireless connection. On (Amber) - If the LED is on, the WPS is not processing successfully. Blinking (Amber) - WPS function is being processed. Rear - Network Camera Antenna Speaker out Power Input LAN port WPS Button
(Wireless Model Only) Figure 3: Rear Panel Attach the supplied antenna here. The antenna is adjustable; best results are usually obtained with the antenna positioned vertically. If required, an external speaker can be plugged in here. Connect the supplied 5V power adapter here. Do not use other power adapters; doing so may damage the camera. Use a standard LAN cable to connect your Network Camera to a 10/100BaseT hub or switch. Note:
Plugging in the LAN cable will disable the Wireless interface. Only 1 interface can be active at any time. The LAN cable should only be connected or disconnected when the camera is powered OFF. Attaching or detaching the LAN cable while the camera is powered on does NOT switch the interface between wired and wireless. Push the WPS button on the device and on your other wireless device to perform WPS function that easily creates an encryption-
secured wireless connection automatically. WPS PBC Mode. When pressed and released (less then 3 seconds), the Network Camera will be in the WPS PBC mode
(Auto link mode). WPS Pin Code Mode. When pressed and held for over 3 5 seconds, the Network Camera will be in the WPS Pin Code mode. Package Contents The following items should be included: If any of these items are damaged or missing, please contact your dealer immediately. 1. Network Camera 2. Antenna (Wireless Model Only) 3. Power adapter 4. 5. Quick Installation Guide Installation CD-ROM 6 Chapter 2 Basic Setup 2 This Chapter provides details of installing and configuring the Network Camera. System Requirements To use the wired LAN interface, a standard 10/100BaseT hub or switch and network cable is required. To use the Wireless interface on the wireless model, other Wireless devices must be compliant with the IEEE802.11b or IEEE802.11g specifications. All Wireless stations must use compatible settings. The default Wireless settings are:
Mode: Infrastructure SSID: ANY Wireless Security: Disabled Domain: USA Channel No.: Auto Figure 4: Installing Diagram 7 Installation - Network Camera 1. Assemble the Camera Screw the supplied antenna to the mounting point on the rear. Attach the Camera Mount to the camera. 2. Connect the LAN Cable Connect the Network Camera to a 10/100BaseT hub or switch, using a standard LAN cable. For the Wireless Model, this will disable the Wireless Interface. The Wireless and LAN interfaces cannot be used simultaneously. Using the LAN interface is recommended for initial configuration. After the Wireless settings are correct, the Wireless interface can be used. The first time you connect to the camera, you should connect the LAN cable and configure the Network Camera with appropriate settings. Then you can unplug the LAN cable and power off the camera. The Network Camera will be in wireless interface when you power on the camera again. 3. Power Up Connect the supplied 5Vpower adapter to the Network Camera and power up. Use only the power adapter provided. Using a different one may cause hardware damage. 4. Check the LEDs The Power LED will turn on briefly, then start blinking. It will blink during startup, which takes 15 to 20 seconds. After startup is completed, the Power LED should remain ON. The Network LED should be ON. For more information, refer to Physical Details - Network Camera in Chapter 1. 8 Setup using the Windows Wizard Initial setup should be performed using the supplied Windows-based setup Wizard. This program can locate the Network Camera even if its IP address is invalid for your network. You can then configure the Network Camera with appropriate TCP/IP settings for your LAN. Subsequent administration can be performed with your Web browser, as explained in Chapter 5 - Web-based Management. Setup Procedure 1. Insert the supplied CD-ROM into your drive. If the setup program does not start automatically, run NetworkCamera.exe in the root folder. You will see the Welcome screen shown below. Click the Setup Camera button to start the setup Wizard Figure 5: Welcome Screen 2. The next screen, shown below, will list all the Network Cameras on your LAN. Figure 6: Camera List Screen 9 Select the desired Camera from the list on the left. The current settings for the selected Camera will be displayed in the table on the right. Click Next to continue. 3. You will be prompted to enter the Administrator Name and Administrator Password, as shown below. If using the default values, enter administrator for the name, and leave the password blank. Otherwise, enter the Administrator Name and Administrator Password set on the Maintenance screen. Figure 7: Password Dialog 4. This screen allows you to enter a suitable Description, and set the correct Time Zone, Date, and Time. Make any desired changes, then click Next to continue. Figure 8: Camera Settings 5. On the following IP Address Settings screen, shown below, choose Fixed IP Address or Dynamic IP Address. 10 Figure 9: Fixed or Dynamic IP Selection Fixed IP Address is recommended, and can always be used. Dynamic IP Address can only be used if your LAN has a DCHP Server. Enable the Set Wireless check box if you want to configure the Wireless settings.
(Wireless Model Only) Click Next to continue. If you chose Fixed IP Address, the following TCP/IP Settings screen will be displayed. 6. Figure 10: TCP/IP Settings Enter an unused IP Address from within the address range used on your LAN. The Subnet Mask and Default Gateway fields must match the values used by PCs on your LAN. The Primary DNS address is required in order to use the E-mail alert or Dynamic DNS features. Enter the DNS (Domain Name Server) address recommended by your ISP. The Secondary DNS is optional. If provided, it will be used if the Primary DNS is unavailable. 11 Click Next to continue. If you enable Set Wireless, the following Site Survey screen will be displayed. 7. Figure 11: Site Survey Screen Select the desired Access Point. If the Access Point does not show up, click the Refresh button. If you select the Manual Setup, click Next to move to the Security Setting screen. Select the desired Security method (Disabled, WEP or WPA/WPA2 Personal) in the screen and enter the required data. 8. The next screen, shown below, displays all details of the Network Camera. Click Next if the settings are correct Click Back to modify any incorrect values. Figure 12: Save Settings 9. Click OK to confirm that you want to save the new settings. If you want to cancel your changes, click Cancel. 12 10. After clicking OK, you will see the screen below. Figure 13: Confirm Screen Figure 14: Final Screen Clicking the Install Utility button will install the Viewing/Recording utility described in Chapter 6 - Windows Viewing/Recording Utility. 11. Click Exit to end the Wizard. Setup is now complete. 13 Chapter 3 Viewing Live Video 3 This Chapter provides basic information about viewing live video. Overview After finishing setup via the Windows-based Wizard, all LAN users can view live video using Internet Explorer on Windows. This Chapter has details of viewing live video using Internet Explorer. But many other powerful features and options are available:
To view multiple cameras simultaneously, or record video (either interactively or by schedule), you should install the Windows Viewing/Recording utility. Refer to Chapter 6 -
Windows Viewing/Recording Utility for details on installing and using this program. The camera administrator can also adjust the Video Stream, and restrict access to the video stream to known users by requiring viewers to supply a username and password. See Chapter 4 - Advanced Viewing Setup for details. To make Live Video from the camera available via the Internet, your Internet Gateway or Router must be configured correctly. See Making Video available from the Internet in Chapter 4 - Advanced Viewing Setup for details. Requirements To view the live video stream generated by the Network Camera, you need to meet the following requirements:
Windows 98/98SE, Windows 2000, Windows XP. Internet Explorer 6 or later. Connecting to a Camera on your LAN To establish a connection from your PC to the Network Camera:
1. Use the Windows utility to get the IP address of the Network Camera. 2. Start Internet Explorer. 3. 4. When you connect, the following screen will be displayed. In the Address box, enter "HTTP://" and the IP Address of the Network Camera. 14 Figure 15: Home Screen 5. Click View Video. 6. If the Administrator has restricted access to known users, you will then be prompted for a username and password. Enter the name and password assigned to you by the Network Camera administrator. 7. The first time you connect to the camera, you will be prompted to install an ActiveX component (OCX or CAB file), as in the example below. You must install this ActiveX component (OCX or CAB file) in order to view the Video stream in Internet Explorer. Click the "Yes" button to install the ActiveX component. Figure 16: ActiveX OCX Prompt 8. Video will start playing automatically. There may be a delay of a few seconds while the video stream is buffered. 15 Connecting to a Camera via the Internet You can NOT connect to a camera via the Internet unless the camera Administrator has configured both the camera and the Internet Gateway/Router used by the camera. See Making Video available from the Internet in Chapter 4 - Advanced Viewing Setup for details of the required configuration. Also, you need a broadband Internet connection to view video effectively. Dial-up connections are NOT supported. To establish a connection from your PC to the Network Camera via the Internet:
1. Obtain the following information from the Administrator of the camera you wish to Internet IP Address or Domain Name of the camera. connect to:
Port number for HTTP connections. Login (username, password) if required. 2. Start Internet Explorer. 3. In the Address box, enter the following:
HTTP://Internet_Address:port_number Where Internet_Address is the Internet IP address or Domain Name of the camera, and port_number is the port number used for HTTP (Web) connections to the camera. Examples using an IP address:
HTTP://203.70.212.52:1024 Where the Internet IP address is 203.70.212.52 and the HTTP port number is 1024. Example using a Domain Name:
HTTP://mycamera.dyndns.tv:1024 Where the Domain name (using DDNS in this example) is mycamera.dyndns.tv and the HTTP port number is 1024. 16 4. When you connect, the following screen will be displayed. Figure 17: Home Screen 5. Click View Video. 6. If the Administrator has restricted access to known users, you will then be prompted for a username and password. Enter the name and password assigned to you by the Network Camera administrator. 7. The first time you connect to the camera, you will be prompted to install an ActiveX component (OCX or CAB file), as in the example below. You must install this ActiveX component (OCX or CAB file) in order to view the Video stream in Internet Explorer. Click the "Yes" button to install the ActiveX component. Figure 18: ActiveX OCX Prompt 8. Video will start playing automatically. There may be a delay of a few seconds while the video stream is buffered. 17 Viewing Live Video After installing the ActiveX component, you will be able to view the live video stream in its own window, as shown below. Figure 19: View Video Screen There are a number of options available on this screen, accessed by select list, button or icon. See the table below for details. Note: The options can only be configured while using IE browser. Other browsers can just view the video rather than configuration. General Options These options are always available, regardless of the type of camera you are connected to. Resolution. Use this drop-down list to select the desired video size. Zoom. A digital zoom feature is available. To zoom in on a section of the window, click this icon. Then use your mouse to select the section you want to magnify. Click the icon again to disable the zoom feature. Snapshot. Click this to take a single JPEG "snapshot" image of the current video. Flip. Click this to have the image swapped top-to-bottom. Mirror. Click this to have the image swapped left-to-right. Audio On. This icon is displayed if audio is On. Click on the icon to turn audio Off. Volume. If audio is enabled, use this slider to adjust the volume. 18 Setup. Select the desired setup format from the drop-down list. 19 Chapter 4 Advanced Viewing Setup 4 This Chapter provides information about the optional settings and features for viewing video via the Network Camera. This Chapter is for the Camera Administrator only. Introduction This chapter describes some additional settings and options for viewing live Video:
Adjusting the video image Controlling user access to the live video stream Making video available from the Internet Using the Motion Detection feature Adjusting the Video Image If necessary, the Network Camera Administrator can adjust the Video image. To Adjust the Video Image:
1. Connect to the Web-based interface of the Network Camera. (See Chapter 5 - Web-based Management for details.) 2. Select Administration, then Video Image. You will see a screen like the example below. Figure 20: Video Image Screen 20 3. Make the required adjustments, as explained below, and save your changes. MPEG-4 Settings Resolution Video Quality Control Max. Frame Rate MJPEG Settings Resolution Fixed Video Quality Max. Frame Rate Mobil Settings Enable Mobil Streaming Resolution Video Quality Control Select the desired video resolution format. The default resolution is set to 320*240. Constant Bit Rate: Select the desired bit rate. The default is set to 256 Kbps. Fixed Quality: Select the desired option. The default fix quality is set to Normal. Select the desired Maximum bandwidth for the video stream. Note that you can specify EITHER the Bandwidth OR the Frame Rate, not both. If the Bandwidth is defined, the frame rate will be adjusted as necessary to achieve the specified frame rate. The default value for bandwidth is 30. Select the desired video resolution format. The default resolution is set to 320*240. Select the desired fix quality. The default fix quality is set to Normal. Select the desired Maximum bandwidth for the video stream. Note that you can specify EITHER the Bandwidth OR the Frame Rate, not both. If the Bandwidth is defined, the frame rate will be adjusted as necessary to achieve the specified frame rate. The default value for bandwidth is 30. Enable streaming video for the mobile device by checking this checkbox. The default resolution is set to 160x120. Constant Bit Rate: Select the desired fix bit rate. Fixed Quality: Select the desired option. The default fix quality is set to Normal. Max. Frame Rate Access Code Select the desired Maximum bandwidth for the video stream. Enter the code for accessing the live video from camera through cell phone connection. Video Adjustment Power Line Frequency White Balance Lighting Condition Brightness Select the power line frequency (50Hz or 60Hz) used in your region, to improve the picture quality under florescent lighting. Select the desired option to match the current environment and lighting. Select the desired option to match the current lighting condition. If necessary, you can adjust the brightness to obtain a better image. For example, if the camera is facing a bright light, the image may be too dark. In this case, you can increase the brightness. 21 Sharpness Options Microphone Audio Type Speaker Flip Mirror Time Stamp Text Display Select the desired option for the sharpness. You can select a Sharpness value between -3 and 3. Enable audio by checking this checkbox. Using Audio will increase the bandwidth requirements slightly. Select the desired audio type. Enable speaker sound by checking this checkbox. This setting will have the image swapped top-to-bottom. This setting will have the image swapped left-to-right. If enabled, the current time will be displayed on the Video image. Enable this setting if you want text to be displayed on the Video image, and enter the desired text - up to 20 characters. This feature is often used to identify each camera when multiple cameras are installed. 22 Viewing the live Video on your cell phone The live streaming of the Network Camera can even be viewed from a compatible cell phone, so you can keep an eye on things almost everywhere you go. Its just as easy as following the required steps. To Adjust the Mobile Settings 1. Connect to the Web-based interface of the Network Camera. (See Chapter 5 - Web-based Management for details.) 2. Select Administration, then Video & Audio. You will see a screen like the example below. Figure 21: Mobile Settings 3. Check the checkbox of Enable Mobile Streaming and configure the related settings in the Mobile Settings section, as explained below. Save your changes. Mobil Settings Enable Mobil Streaming Resolution Video Quality Control Enable streaming video for the mobile device by checking this checkbox. The default resolution is set to 160x120. Constant Bit Rate: Select the desired fix bit rate. Fixed Quality: Select the desired option. The default fix quality is set to Normal. Max. Frame Rate Access Code Select the desired Maximum bandwidth for the video stream. Enter the code for accessing the live video from camera through cell phone connection. Connecting Cell Phone to the Network Camera A number of different mobile handsets are compatible with the Network Camera. Follow the suggested steps (steps may differ according to the mobile phone you use). Before connecting to the cell phone, please make sure the following:
Mobile phone should be supported by 3GPP protocol. Camera Web management - RTSP port number needs to be entered. Default is 554. Access code: 8 digits (0~9) 23 Steps:
1. Start IE 2. Select Add Bookmark 3. Click Edit 4. Enter desired value for Subject or leave it blank 5. Enter the cameras IP address into the Address box. RTSP://Internet_Address:port_number 6. Click Play 24 Controlling User Access to the Video Stream By default, anyone can connect to the Network Camera and view live Video at any time. If desired, you can limit access to scheduled times, and also restrict access to known users. To Control User Access to Live Video:
1. Connect to the Web-based interface of the Network Camera. (See Chapter 5 - Web-based Management for details.) 2. Select Administration, then Video Access. 3. Set the desired options for Access. Access If the Video Access is disabled, users cannot connect using either their Web Browser or the Windows utility. However, viewing video is still possible by logging in as the Administrator. Figure 22: Controlling User Access See Chapter 5 - Web-based Management for further details about using the Video Access and User Database screens. 25 Making Video available from the Internet If your LAN is connected to the Internet, typically by a Broadband Gateway/Router and Broadband modem, you can make the Network Camera available via the Internet. You will need to configure your Router or Gateway to allow connections from the Internet to the camera. Router/Gateway Setup Your Router or Gateway must be configured to pass incoming TCP (HTTP) connections (from Internet Viewers) to the Network Camera. The Router/Gateway uses the Port Number to determine which incoming connections are intended for the Network Camera. This feature is normally called Port Forwarding or Virtual Servers, and is illustrated below. The Port Forwarding/Virtual Server entry tells the Router/Gateway that incoming TCP connections on port 1024 should be passed to the Network Camera. If necessary, check the user manual for your Router/Gateway for further details. Figure 23: Connecting via the Internet The "Port" for the Port Forwarding / Virtual Server entry above is the " Secondary Port" number specified on the Network screen of the Network Camera. 26 Network Camera Setup The Network Camera configuration does NOT have be changed, unless:
You wish to change the port number from the default value (1024). You wish to use the DDNS (Dynamic DNS) feature of the Network Camera. HTTP Port Configuration Normally, HTTP (Web) connections use port 80. Since the Network Camera uses HTTP, but port 80 is likely to be used by a Web Server, you can use a different port for the Network Camera. This port is called the Secondary Port. The default Secondary Port is 1024. If you prefer to use a different port number, you can specify the port number on the Network Camera's Network screen, as shown below. Figure 24: Network Screen See Chapter 5 - Web-based Management for further details on using the Network screen. Viewers need to know this port number in order to connect and view live Video, so you must inform viewers of the correct port number. DDNS (Dynamic DNS) Many internet connections use a "Dynamic IP address", where the Internet IP address is allocated whenever the Internet connection is established. This means that other Internet users don't know the IP address, so can't establish a connection. DDNS is designed to solve this problem, by allowing users to connect to your LAN using a domain name, rather than an IP address. To use DDNS:
1. Register for the DDNS service with a supported DDNS service provider. You can then apply for, and be allocated, a Domain Name. 2. Enter and save the correct DDNS settings on the DDNS screen of the Network Camera. 3. Both Router and Camera should use the same port number for DDNS service. 27 4. Operation is then automatic:
Figure 25: DDNS Screen The Network Camera will automatically contact the DDNS server whenever it detects that the Internet IP address has changed, and inform the DDNS server of the new IP address. Internet users can then connect to the camera using the Domain Name allocated by the DDNS service provider. Example: http://normanyu123456789.dyndns.org:6016 normanyu123456789.dyndns.org is domain host name. 6016 is the port number. 28 Viewing Live Video via the Internet Clients (viewers) will also need a broadband connection; dial-up connections are NOT recommended. Viewing Live Video Using your Web Browser If using your Web browser, you need to know the Internet IP address (or the Domain name) of the camera's Router/Gateway, and the correct port number. Enter the Internet address of the Router/Gateway, and its port number, in the Address (or Location) field of your Browser. Example - IP address:
HTTP://203.70.212.52:1024 Where the Router/Gateway's Internet IP address is 203.70.212.52 and the "Secondary Port" number on the Network Camera is 1024. Example - Domain Name:
HTTP://mycamera.dyndns.tv:1024 Where the Router/Gateway's Domain name is mycamera.dyndns.tv and the "Secondary Port" number on the Network Camera is 1024. Viewing Live Video with the Viewing/Recording Utility If using the Windows Viewing/Recording Utility, the details of the Network Camera must be entered on the Camera Setup screen. Figure 26: Add Camera from Internet See Chapter 6 - Window Viewing/Recording Utility for full details on using the Windows Viewing/Recording utility. 29 Motion Detection Alerts The Motion Detection feature can generate an Alert when motion is detected. The Network Camera will compare consecutive frames to detect changes caused by the movement of large objects. But the motion detector can also be triggered by:
Sudden changes in the level of available light Movement of the camera itself. Try to avoid these situations. The motion detection feature works best in locations where there is good steady illumination, and the camera is mounted securely. It cannot be used outdoors due to the sensitivity of the CMOS sensor. Note: The Motion Detection settings can only be configured while using IE browser. To Use Motion Detection Alerts Using the Web-based interface on the Network Camera, select the Motion Detection screen, then configure this screen as described below. Figure 27: Motion Detection 1. Enable the Motion Detection feature. 2. Set the area or areas of the video image to be examined for movement. You can define up to 4 areas, and set the motion threshold individually for each area. If using a schedule, define the desired schedule in Event Trigger screen. 3. 4. Save your changes. 5. Select the E-Mail screen to have alerts sent by E-mail:
Enable and enter at least one (1) E-mail address Select or enter the desired options for Video Attachment, Show "From" as and Subject fields. 30 Enter details of the SMTP Server used to send the E-mail. If the Motion Detection feature is enabled, but E-Mail is not enabled, then the only action when motion is detected is to log this event in the system log. 31 Chapter 5 Web-based Management 5 This Chapter provides Setup details of the Network Cameras Web-based Interface. This Chapter is for the Camera Administrator only. Introduction The Network Camera can be configured using your Web Browser. The Network Camera must have an IP address which is compatible with your PC. The recommended method to ensure this is to use the supplied Windows-based Wizard, as described in Chapter 2 - Basic Setup. Connecting to Network Camera If you have run the Windows-based setup Wizard, the final screen provided a button Web UI. Clicking this button will immediately connect to the Network Camera, using your Web Browser. If using only your Web Browser, use the following procedure to establish a connection from your PC to the Network Camera:
Once connected, you can add the Network Camera to your Browser's Favorites or Bookmarks. Connecting using your Web Browser 1. Use the Windows utility to get the IP address of the Network Camera. 2. Start your WEB browser. 3. In the Address box, enter "HTTP://" and the IP Address of the Network Camera. 4. You will then be prompted for a username and password. If using the default values, enter administrator for the name, and leave the password blank. Otherwise, enter the Administrator ID and Administrator Password set on the Maintenance screen. 32 Welcome Screen When you connect, the following screen will be displayed. Figure 28: Welcome Screen The menu options available from this screen are:
View Video - View live Video using your Web Browser. See Chapter 3 - Viewing Live Video for details. Administration - Access the Administration menu. 33 Administration Menu Clicking on Administration on the menu provides access to all the settings for the Network Camera. The Administration menu contains the following options:
Setup System Network Wireless (Wireless Model Only) DDNS Video Stream Video & Audio Video Access User Database Event Motion Detection E-Mail FTP HTTP Event Trigger Administration Maintenance Status Log 34 System Screen After clicking Administration on the main menu, or selecting System on the Administration menu, you will see a screen like the example below. Figure 29: System Screen Data - System Screen System Settings Device ID Camera Name Description This displays the ID for the Network Camera. Enter the desired name for the Network Camera. This field is used for entering a description, such as the location of the Network Camera. Date & Time Date Format Select the desired date format, it will also be used to display the date and time as an overlay on the video image. The abbreviations used to predefine the date formats are list as follows:
YYYY-MM-DD = Year-Month-Day, e.g. 2006-01-31 MM/DD/YYYY = Month/Day/Year, e.g. 01/31/2006 DD/MM/YYYY = Day/Month/Year, e.g. 31/01/2006 35 Current Date & Time Time Zone Network Time Protocol NTP Server Address Update LED Operation Privacy Button This displays the current date and time on the camera. If it's not correct, click the Change button to modify the date/time settings. This button will open a sub-screen where you have 2 options:
Set the camera's date and time to match your PC. Enter the correct date and time. Choose the Time Zone for your location from the drop-down list. If your location is currently using Daylight Saving, enable the Adjust for daylight saving checkbox. You must UNCHECK this checkbox when Daylight Saving finishes. Enable or disable the Time Server feature as required. If Enabled, the Network Camera will contact a Network Time Server at regular intervals and update its internal timer. Enter the address for the desired NTP server. The Schedule determines how often the Network Camera contacts the NTP Server. Select the desired options. Enable this if you want to use this function. If Enabled, click the Privacy button will stop uploading the stream without turning the camera off. Click the button one more time to continue uploading. The default is Enabled. 36 Network Screen This screen is displayed when the Network menu option is clicked. Figure 30: Network Screen Data - Network Screen Network Obtain an IP Address Automatically Use the following IP Address If selected, the Network Camera will obtain its IP address and related information from a DHCP Server. Only select this option if your LAN has a DHCP Server. If selected, you must assign the following data to the Network Camera. IP Address - Enter an unused IP address from the address range used on your LAN. Obtain DNS server address automatically Subnet Mask - Use the same value as PCs on your LAN. Default Gateway - Use the same value as PCs on your LAN. If selected, the Network Camera will use the DNS address or addresses provided by the DHPC server. This option is only available if the IP address setting is Obtain an IP address Automatically. 37 Use the following DNS server address Secondary Port RTP/RTSP Multicast RTP/RTSP Enable Multicast Video Address Video Port Audio Address Audio Port Time to Live UPnP Enable Discovery Enable Traversal Primary DNS server - Use the same value as PCs on your LAN. Normally, your ISP will provide this address. Secondary DNS server - This is optional. If entered, this DNS will be used if the Primary DNS does not respond. This sets the port number for HTTP (Web) connections to the Camera, whether for administration or viewing video. The secondary port can be used for DDNS, other service and when more than 2 cameras are in use. If enabled, you can connect using either port 80 or the Secondary port. You must enter the Secondary port number (between 1024 to 65535) in the field provided. Note that when using a port number which is not 80, you must specify the port number in the URL. For example, if the Camera's IP address was 192.168.1.100 and the Secondary port was 1024, you would specify the URL for the Camera as follows:
http://192.168.1.100:1024 The RTSP (Real Time Streaming Protocol), a standard for connected client(s) to control streaming data (MPEG-4) over the World Wide Web. Enter the RTSP Port number (between 1024 and 65535) in the field provided. The default RTSP Port is 554. The RTP (Real Time Transport Protocol), an Internet protocol for transmitting real-time data such as audio and video. Max RTP Data Packet field will let users limit the size of the file. Enter the desired value between 400 and 1400. Note: RTSP and RTP settings are for Mobil phone only. Enable the feature as required. Enter the address of video. Enter the desired value (between 1024 to 65534) in the field provided. The number you entered must be even values. Enter the address of the audio. Enter the desired value (between 1024 to 65534) in the field provided. The number you entered must be even values. Enter the desired length of time, if the packets fail to be delivered to their destination within. The Time to Live you entered must be in-between 1 to 255. If enabled, the Network Camera will broadcast its availability through UPnP. UPnP compatible systems such as Windows XP will then be able to detect the presence of the Network Camera. If enabled, HTTP connections (from your Web Browser or the Viewer and Recorder utility) can use secondary port instead of port 80 (the standard HTTP port) to access the camera. 38 QoS Enable QoS Mode If enabled, the throughput level (for Video and Audio) is guaranteed through QoS (Quality of Service). 39 Wireless Screen (Wireless Model Only) This screen is displayed when the Wireless menu option is clicked. Figure 31: Wireless Screen Data - Wireless Screen Wireless Network WSC PIN Code Network Type SSID Domain Channel No. If you have an Access Point, select Infrastructure. It displays the WSC PIN code number for the camera. This determines the type of wireless communication used by the Network Camera. Otherwise, select Ad-hoc. This must match the value used by other devices on your wireless LAN. The Default is ANY. Note! The SSID is case sensitive. Select your region from the drop-down list. In Infrastructure mode, this setting is ignored. The Network Camera will use the Channel set on the Access Point. For Ad-hoc mode, select the Channel you wish to use on your Network Camera. Other Wireless stations should use the same setting. If you experience interference (shown by lost connections and/or slow data transfers) you may need to experiment with different channels to see which one is the best. 40 Security Security System Select the desired option, and then enter the settings for the selected method:
Disabled - No security is used. Anyone using the correct SSID can connect to your network. This is default. WEP - The 802.11b standard. Data is encrypted before transmission, but the encryption system is not very strong. WPA/WPA2 Personal - Like WEP, data is encrypted before transmission. WPA is more secure than WEP, and should be used if possible. WPA Personal is the version of WPA which does NOT require a Radius Server on your LAN. WEP Authentication Type Normally this can be left at the default value of "Automatic." If that 64 Bit Keys (10 Hex chars) 128 Bit Keys (26 Hex chars) 64 Bit Keys (5 ASCII chars) 128 Bit Keys (13 ASCII chars) fails, select the appropriate value - "Open System" or "Shared Key." Check your wireless card's documentation to see what method to use. Note: In Infrastructure mode, either setting will normally work, since most Access Points can use both methods. Select the WEP Encryption level:
Enter a word or group of printable characters in the Passphrase box and click the "Generate Key" button to automatically configure the WEP Key(s). If encryption strength is set to 64-bit, then each of the four key fields will be populated with key values. If encryption strength is set to 128-bit, then only the selected WEP key field will be given a key value. Use the radio buttons to select the default key. Enter the key value you wish to use. Other stations must have the same key values. WEP Encryption Passphrase WEP Keys Keys must be entered in Hex. Hex characters are the digits (0 ~
9) and the letters A ~ F. Click Clear Keys to set the Keys to be blank. WPA/WPA2 Personal Shared Key Enter the key value. Data is encrypted using a key derived from the network key. Other Wireless Stations must use the same network key. The PSK must be from 8 to 63 characters in length. 41 DDNS Screen Many Internet connections use a "Dynamic IP address", where the Internet IP address is allocated whenever the Internet connection is established. This means that other Internet users don't know the IP address, so can't establish a connection. DDNS is designed to solve this problem, as follows:
You must register for the DDNS service with a DDNS service provider. The DDNS Service provider will allocate a Domain Name to you upon request. The DDNS settings on the DDNS screen above must be correct. The Network Camera will then contact the DDNS server whenever it detects that the Internet IP address has changed, and inform the DDNS server of the new IP address. (The Check WAN IP Address determines how often the Network Camera checks if the Internet IP address has changed.) This system allows other internet users to connect to you using the Domain Name allocated by the DDNS service provider. This screen is displayed when the DDNS menu option is clicked. Figure 32: DDNS Screen Data - DDNS Screen DDNS Enable DDNS Service Provider Enable or disable the DDNS function, as required. Only enable this feature if you have registered for the DDNS Service with a DDNS Server provider. Choose a service provider from the list. 42 Web Site Button Domain (Host) Name Account/E-Mail Password/Key Check WAN IP Address Click this button to open a new window and connect to the Web site for the selected DDNS service provider. Enter the Domain Name (Host Name) allocated to you by the DDNS Server provider. Enter the login name for the DDNS account. Enter the password for the DDNS account. Set the schedule for checking if the Internet IP address has changed. If the IP address has changed, the DDNS Server will be notified. NOTE: If the DDNS Service provided some software to perform this IP address update or notification, you should NOT use this software. The update is performed by the camera. 43 Video Image Screen This screen is displayed when the Video Image menu option is clicked. If Mobile Streaming is enabled:
1. Mobile phone should be supported by 3GPP protocol. 2. Enter 554 for RTSP port number in the Network screen. 3. Enter the following address in the URL:
RTSP:// Router IP address / Access Code 4. Select 15 fps for Max Frame Rate. Figure 33: Video Image Screen 44 Data - Video Image Screen MPEG-4 Settings Resolution Video Quality Control Max. Frame Rate MJPEG Settings Resolution Fixed Video Quality Max. Frame Rate Mobil Settings Enable Mobil Streaming Resolution Video Quality Control Select the desired video resolution format. The default resolution is set to 320*240. Constant Bit Rate: Select the desired bit rate. The default is set to 256 Kbps. Fixed Quality: Select the desired option. The default fix quality is set to Normal. Select the desired Maximum bandwidth for the video stream. Note that you can specify EITHER the Bandwidth OR the Frame Rate, not both. If the Bandwidth is defined, the frame rate will be adjusted as necessary to achieve the specified frame rate. The default value for bandwidth is 30. Select the desired video resolution format. The default resolution is set to 320*240. Select the desired fix quality. The default fix quality is set to Normal. Select the desired Maximum bandwidth for the video stream. Note that you can specify EITHER the Bandwidth OR the Frame Rate, not both. If the Bandwidth is defined, the frame rate will be adjusted as necessary to achieve the specified frame rate. The default value for bandwidth is 30. Enable streaming video for the mobile device by checking this checkbox. The default resolution is set to 160x120. Constant Bit Rate: Select the desired fix bit rate. Fixed Quality: Select the desired option. The default fix quality is set to Normal. Max. Frame Rate Access Code Select the desired Maximum bandwidth for the video stream. Enter the 8-digit code (0~9) for accessing the live video from camera through cell phone connection. Video Adjustment Power Line Frequency White Balance Lighting Condition Brightness Select the power line frequency (50Hz or 60Hz) used in your region, to improve the picture quality under florescent lighting. Select the desired option to match the current environment and lighting. Select the desired option to match the current lighting condition. If necessary, you can adjust the brightness to obtain a better image. For example, if the camera is facing a bright light, the image may be too dark. In this case, you can increase the brightness. 45 Select the desired option for the sharpness. You can select a Sharpness value between -3 and 3. Enable audio by checking this checkbox. Using Audio will increase the bandwidth requirements slightly. Select the desired audio type. Enable speaker sound by checking this checkbox. This setting will have the image swapped top-to-bottom. This setting will have the image swapped left-to-right. If enabled, the current time will be displayed on the Video image. Enable this setting if you want text to be displayed on the Video image, and enter the desired text - up to 20 characters. This feature is often used to identify each camera when multiple cameras are installed. Sharpness Options Microphone Audio Type Speaker Flip Mirror Time Stamp Text Display 46 Video Access Screen This screen is displayed when the Video Access option on the Administration menu is clicked. Figure 34: Video Access Screen Data - Video Access Screen User Access Enable Security Checking Video Access Enable Scheduled Video Access If disabled (default) - No login required. Users do not have to provide a username and password when they connect to the camera for viewing video. If enabled - Require login. Users will be prompted for a username and password when they connect to the camera for viewing video. The camera administrator must use the "User Database" menu option to create the desired users. If enabled - Viewing video is available during the scheduled periods, and unavailable at other times. If this option is selected, you need to define a schedule. If no schedule is defined, this option is always disabled. If disabled - The option will remain disabled until you enable it. Note that regardless of which setting is chosen, the Administrator can ALWAYS access the camera and view live video. Access Schedule Scheduled Periods This displays all periods you have entered into the database. If you have not entered any periods, this list will be empty. 47 Delete Add New Schedule Day Start Time End Time Add Clear Use the Delete button to delete the selected item in the list. Choose the desired option for the period. Enter the start time using a 24 hr clock. Enter the end time using a 24 hr clock. Click this button to add a new period. Use this button to clear the input fields. 48 User Database Screen This screen is displayed when the User Database option on the Administration menu is clicked. Figure 35: User Database Screen Data - User Database Screen Existing Users User List Edit, Delete, Delete All User Properties User Name This displays all users you have entered into the User database. If you have not entered any users, this list will be empty. The maximum number of users is 20. Use these buttons to manage the user database. Enter the name for the user here. Spaces, punctuation, and special characters must NOT be used in the name. The name is case insensitive (case is ignored), so you can not have 2 names which differ only by case. The password for this user. User Password Confirm Password Re-enter the password for the user, to ensure it is correct. Add Button Clear Button Click this button to add a new user, using the data shown on screen. Use this button to clear the input fields, ready to add a new user. 49 Motion Detection Screen This screen is displayed when the Motion Detection option on the Event menu is clicked.
. Figure 36: Motion Detection Screen Data - Motion Detection Screen Motion Detection Set Detection Areas You can set the full screen or selected areas of the video image to be examined. Note: Motion detection can be triggered by rapid changes in lighting condition, as well as by moving objects. For this reason, it should only be used indoors. Administrator needs to adjust the relation between indicator and threshold for each area. Indicator/Threshol d 50 E-Mail Screen This screen is displayed when the E-Mail option on the Event menu is clicked.
. Figure 37: E-Mail Screen Enter the address of the SMTP (Simple Mail Transport Protocol) Server to be used to send E-Mail. Select the desired Authentication type for the SMTP Server. Data - E-Mail Screen Primary/Secondary SMTP Server SMTP Server Address Authentication SMTP Login name Enter your login name for the SMTP Server. SMTP Password POP server name Show "From" as Enter your password for the SMTP Server. Enter the name for the POP Server. Enter the E-Mail address to be shown in the "From" field when the E-Mail is received. Check the box to upload to the Secondary SMTP if the camera can not connect to the primary SMTP. Secondary SMTP 51 E-Mail Setup E-mail Address Subject Enter at least one (1) E-Mail address; the 2nd and 3rd addresses are optional. The E-Mail alert will be sent to the E-Mail address or addresses specified here. Enter the desired text to be shown as the "Subject" for the E-Mail when it is received. Subject can not exceed 48 alphanumeric characters. 52 FTP Screen This screen is displayed when the FTP option on the Event menu is clicked. Figure 38: FTP Screen Data - FTP Screen Primary/Secondary FTP FTP Server Port Login name Password Enable Passive Mode File Path Name Secondary FTP Enter the address of the FTP Server. Enter the Port of the FTP Server to be connected. Enter your login name for the FTP Server. Enter your password for the FTP Server. Check the box to enable the Passive mode feature of the FTP. Enter the file path/name of the FTP. Check the box to upload to the Secondary FTP if the camera can not connect to the primary FTP. 53 HTTP Screen This screen is displayed when the HTTP option on the Event menu is clicked. Figure 39: HTTP Screen Data - HTTP Screen HTTP Notification Enable URL Proxy Server Name Port Number Method Enable this checkbox to use the HTTP Notification. Enter the URL of your HTTP notification server. Specify the proxy server name in the provided field if the camera needs to pass through a Proxy Server to do the HTTP notification. Enter the port number for the proxy server. Select the desired method of form data encoding. Get - It should be used if and only if the form processing is independent, which typically means a pure query form. Generally it is advisable to do so. Post - If there are problems related to long URLs and non-ASCII character repertoires, which can make it necessary to use
"POST" even for independent processing. 54 Event Trigger Screen This screen is displayed when the Event Trigger option on the Event menu is clicked. Figure 40: Event Trigger Screen Data - Event Trigger Screen Event Schedule Schedule List The Event Schedule shows all of the event types currently configured in the Network Camera, along with various information about their configuration, as listed below:
Name - the descriptive event name set by the user. Effective Time Frame - shows when the event at a set time will be triggered. New Schedule Effective Time Frame Start Time End Time Trigger Event Motion Detection Trigger by - shows what kind trigger activate the event. Action - shows what kind of the actions will be issued when the event been triggered Choose the desired option for the period. Choose the desired start time using a 24 hr clock. Choose the desired end time using a 24 hr clock. If enabled, movement in a motion detection window can be used to trigger events. 55 Interval Actions Select the desired option for the events interval. (* "0" = No Delay) E-Mail - If checked, an E-Mail (with "Attachment") will be delivered to the SMTP server. (SMTP Server must be configured on the E-Mail page.) FTP - If checked, an FTP upload will be activated to the FTP server. (FTP servers must be configured on the FTP page.) Attachment Type HTTP - If checked, an Instant Messaging (IM) will be delivered to the Jabber server. (Jabber server must be configured on the Instant Messaging page.) JPEG Image:
Frame Rate - Select the desired capture rate (1~5) for the JPEG image here. Pre/Post Capture - Select the desired length. The snapshot(s) of the JPEG image depends on this setting, and also the file size and degree of compression. Video:
Video Format - Select the desired type for the video file. Pre/Post Capture - Select the desired length. The size of the file depends on this setting, and also the Video size and degree of compression. Note: The total length of Pre/Post Capture is 5 seconds that is limited by the flash size. 56 Maintenance Screen
. Figure 41: Maintenance Screen Data - Maintenance Screen Administrator Login Administrator ID Enter the name for the Administrator here. Spaces, punctuation, and special characters must NOT be used in the name. The password for the Administrator. Administrator Password Verify Password Re-enter the password for the Administrator, to ensure it is correct. Firmware Upgrade Upgrade File Start Clear File Name Click the "Browse" button and browse to the location on your PC where you stored the Firmware file. Select this file. Click this button to start the Firmware. When the upgrade is finished, the Network Camera will restart, and this management connection will be unavailable during the restart. This does NOT stop the Upgrade process if it has started. It only clears the input for the "Upgrade File" field. 57 Backup & Restore Backup Configuration File Restore Configuration File Clear File Name Restore Factory Defaults Restart Camera Click Backup button to save the current configuration information to a text file. It is suggested to backup the configuration file, in order to restore the camera easily. Click Restore button to reinitialize the camera to load the new updated software. Do this after loading the upgrade file. This does NOT stop the Restore process if it has started. It only clears the input for the "Restore Configuration File" field. Click Defaults button to reloads all default settings on the camera. Click Restart button to restarts the camera. 58 Status Screen
. Figure 42: Status Screen Data - Status Screen System Device Name Description F/W version Network MAC Address IP Address Network Mask Gateway This shows the name of the Network Camera. This shows the description of the Network Camera, such as location. The version of the current firmware installed. The current IP address of the Network Camera. The IP Address of the Network Camera. The network mask associated with the IP address above. The IP Address of the remote Gateway associated with the IP Address above. Wireless (Wireless Model Only) WSC PIN Dode It displays the current WSC PIN code. 59 Network Type SSID Channel Security Signal Strength MPEG-4/MJPEG Resolution Video Quality Frame Rate Buttons Refresh This shows the Network Type currently in use (Ad-hoc or Infrastructure). This displays the wireless SSID. This shows the wireless channel currently used. The current security setting for Wireless connections. This shows the strength of the signal. The image size of the video stream. This displays the image quality of the video stream. This displays the frame rate of the video stream. Update the log and any other data on screen. 60 Log Screen This screen displays a log of system activity.
. Figure 43: Log Screen Data - Log Screen Log System Log Refresh Button Clear Log Enable Syslog Service Syslog Server Address This is a log of system activity. Click this to update the data shown on screen. Click this button to restart the log. Check the box to enable the System Log Server feature. Enter the address of the Syslog Server. 61 Chapter 6 Windows Viewing/Recording Utility 6 This Chapter describes how to use the supplied Utilities package to view and listen the live streams generated by the Network Camera. Overview The Utilities package includes following four functions:
Monitor - to view/listen the live streams. Recorder - to record the live streams. Playback - to view the previous recordings. Configuration - to configure the Utilities such as adding camera, making recording schedules and setting required parameters, etc.. The Utilities must be installed in the Windows before they can be configured. Installation 1. Insert the supplied CD-ROM into your drive. If the setup program does not start automatically, run NetworkCamera.exe in the root folder. You will see the Welcome screen shown below. Figure 44: Welcome Screen 2. Click the Install Utility button to start the installation of the Utilities package. 3. Follow the prompts to complete the installation. 62 4. After the installation, double click the Monitor icon on the desktop or click Monitor menu item in the Windows main program menu to launch the Utilities. System Tray Icon When started, the program will create an icon in the Windows system tray on the taskbar, as shown below. Figure 45: System Tray Icon You can right click the icon and it will provides a menu which allows you to launch Playback program, view the recording schedule details or even exit the Utilities package. Main Screen When Utilities launched, the Monitor Manager screen like the example below will be displayed. Figure 46: Main Screen If no cameras have been defined and added to the Utilities, no video will be displayed. Utilities should be configured first to view the camera streams. See the following section for information on defining a camera. Note that each Camera is given a number (Channel Number). 63 Camera Setup To define a camera and associate it with a Channel Number. 1. Click the Setup button on the main screen. You will see a screen like the example below. Figure 47: Camera Setup Screen 2. Select the desired Channel number in the left (No.) column. 3. There are 2 radio buttons, for LAN or Internet. The default is LAN. See the following section for details of the Internet option. The LAN panel, on the left, displays all available Network Cameras found on your LAN automatically. This list can be updated by clicking the Refresh button. The progress bar appears for initial use or clicking the Refresh button. The Camera Data panel, on the right, displays the data for the selected camera. 4. To associate a camera with the current Channel:
Select a camera in the list on the left. Check that the Camera Data shown on the right is correct. Enter associated User It is required to enter the unique value of Local ID. Name and Password. Note: The IP Address, Port Number, User Name and Password can only be modified in the WEB UI instead of Camera Setup screen. You can click the Setup Camera Pages button to the WEB UI screens. Click the Add button. The camera will now appear in the Channel List. 64 Camera Data - LAN Local ID Device ID This is the name you gave to this camera. This field must be entered. This is the default name for the Wireless Network Camera, and cannot be changed. The current IP address of the Wireless Network Camera. This will normally display "80". Only change this if requested to do so by the Wireless Network Camera Administrator. The camera Administrator can require that users provide a username and password before being allowed to view the live video. If the Administrator has not enabled this option, the Login fields can be left blank. Otherwise, you must enter the username and password allocated to your by Administrator. Select the desired type from the drop-down list. Click this button to connect the Web-based interface of the Camera Check this if you want the Utilities to enable motion triggered recording. Note: Event trigger setting in the camera must also be enabled to let the event triggered recording of Utilities take effect. IP Address Port Number Login Stream Type Setup Camera Pages Enable Trigger Event You can add the same Camera twice, once for the LAN (using the LAN IP address), and again for the Internet (using the Internet IP address). This will allow viewing the camera whether you are on the same LAN as the camera or in a remote location. 65 Adding Cameras on the Internet If the Wireless Network Camera you wish to add is not on your LAN, but is available via the Internet, click the Internet button. You will see a screen like the example below. Figure 48: Add Camera from Internet To associate a camera with the current Channel:
1. Enter the Local ID, IP Address, Port Number, User Name and Password in the Camera Data section manually. 2. Click the Test button to check that a connection and login can be performed successfully. Note that if the remote LAN does not currently have an Internet connection, or the remote camera is not on-line, the test will fail because no connection is possible. 3. Click the Add button. The camera will now appear in the Channel List. Camera Data - Internet Local ID Device ID IP Address This is the name you gave to this camera. This field must be entered. This is the default name for the Wireless Network Camera, and cannot be changed. This field will be displayed automatically once a connection to the Wireless Network Camera has been established. Enter the Domain Name or Internet IP address of the desired Wireless Network Camera. 66 Port Number Login Stream Type Setup Camera Pages Enable Motion Detection Enter the port number used by the Wireless Network Camera for connections via the Internet The Camera Administrator can advise you of the port to use. The default value is 1024. The camera Administrator can require that users provide a username and password before being allowed to view the live video. If the Camera Administrator has not enabled this option, the Login fields can be left blank. Otherwise, you must enter the username and password allocated to you by the Camera Administrator. Select the desired type from the drop-down list. Click this button to connect the Web-based interface of the Camera Check this if you want the Utilities to enable motion triggered recording. Note: Event trigger setting in the camera must also be enabled to let the event triggered recording of Utilities take effect. You can add the same Camera twice, once for the LAN, and again for the Internet. This will allow viewing the camera whether you are on the same LAN as the camera or in a remote location. 67 Monitor Program - for Streams Live Viewing You can view live video in the Monitor screen. The built-in software can let you view up to 9 cameras on a single computer screen at one central location. The following table lists the icons displayed on the Monitor screen:
Channel (Camera) Selection. Use this to select the desired Channel (Camera) by clicking on the top row. This panel also indicates the status of the camera. The First column indicates if the associated channel number has a configured camera or not. Blue indicates a camera has been configured for the channel. Gray indicates no camera is configured for the channel. User can drag a blue button to a desired viewport to let the camera stream be displayed in the desired viewport. The View column indicates if the camera stream is being viewed. Green indicates the configured camera is being viewed. Gray indicates that no camera is configured or the configured camera is not connected to the Monitor. The Instant Record column indicates if a recording is in progress. Gray indicates no recording. Red indicates recording is in progress. The Motion Detection column indicates if Motion event detected in the associated channel. Yellow indicates Motion Detection is in progress. Gray indicates this feature is not enabled. The I/O columns indicate if there is any I/O type triggered event detected in the port 1/2. Yellow indicates there is an I/O type trigger event detected. Gray indicates there is no new I/O type trigger event detected. When user clicks on the Alert Log List, all the trigger event indicators such as motion, I/O for the associated focused channel will turn to gray. The PIR column indicates if there is any PIR triggered event detected. Yellow indicates there is a PIR trigger event detected. Gray indicates there is no new PIR trigger event detected. Alert Log List. It displays the list of triggered events, if any, for the focused viewport. Setup. Click this button to open the Utilities configuration program. Playback. Click this button to launch the Playback program, which allows you to browse through the previously saved recordings. Please see the
"Playback Program - for Streams Playback" section for details. Channel Indicator. This indicates the current channel (camera). Play. Use this to re-start viewing, after using the Stop or Pause button. Pause. Use this to temporarily stop the playing of focused viewport. 68 Stop. This will terminate the connection to the camera, halting both the viewing and the instant recording (if in progress). Record. Click this to start recording the current stream. While recording, this button will be red. To stop recording, click the Stop button. To pause the playing, press Pause button. Snapshot. Click this to take a still image of the current video stream. The image format could be BMP or JPEG depending on users selection. Zoom Camera. A digital zoom-in feature is available. To zoom in a viewport:
1. Click this icon. Then move the mouse to the area to be magnified. 2. Left click the mouse to magnify the viewport to x2 rate. 3. Repeat steps 1) and 2) to magnify the viewport to x4 rate. 4. Click the icon again to back to normal viewport display rate. Flip Video. Click this to have the image swapped top-to-bottom. Mirror Video. Click this to have the image swapped left-to-right. Sound On/Off. To turn On/Off the audio volume for the camera in focused viewport. Microphone On/Off. To turn On/Off the audio upload function for the camera in the focused viewport. Volume. If Sound/Microphone is enabled, you can right click the icon, then drag and drop to raise or lower the volume. Screen Layout. Use this to select the number of Channels (Cameras) to be displayed on screen. Up to 9 cameras can be displayed. 69 Recorder Program - for Streams Recording You can record the streams from camera by pressing the Record button in the Monitor program as mentioned in the "Monitor Program - for Streams Live viewing" section or by making schedules to let the recording happen on the arranged time period. All the recorded streams are stored in files with a proprietary format and can be viewed via Playback program in the Utilities package. If you want to change the default settings of recording parameters before doing any recording, please see the Preferences section for details. Recording Schedule To make recording schedules, click the Recording Schedule tab on the Setup screen. You will see a screen like the example below. Figure 49: Recording Schedule If necessary, change these settings to suit your environment. Please follow the steps below to make a schedule for recording:
1. Select a camera from the available camera list labeled Local ID. 2. Select a recording type from the Interval list box. 3. Select the recording time range from Start Date, Start Time and Duration list boxes. 4. Press Add button to add the schedule. There are up to ten schedules could be added for each camera. You will see all the schedules in the recording list. 70 Preferences Clicking the Preferences tab on the Configuration program to make change of default Utilities parameter settings. Data - Preferences Recording Paths Recording Figure 50: Preferences Screen This is the Drive and Folder on your PC/Notebook where recorded files will be placed. You need a drive which has large amounts (Gigabytes) of free space. Click the Browse button to select the drive and folder if you want to change the default path. Note that file names for the recordings are automatically assigned, using an internal date-time coding rule. Instant Recording Time Limit Maximum time limit for Instant Recording This sets the maximum time period of a recording which is started by clicking the Record button on the Monitor main screen. If the recording is not stopped manually before the arranged time period elapsed, it will be terminated automatically when the end time hit. Trigger Event Record before Trigger Event Set the time so that the Recorder will make a pre-recording for at most the specified time range while a triggered event detected. 71 Enable Disk space limitation Maximum Allowed Space When allowed space is full. Initial Settings Launch this utility when Windows started Proxy Server Enable proxy Record after Trigger Event Set the time so that the Recorder will make a post-recording for at most the specified time range while a detected triggered event ends. Disk Allocation for Each Camera Recording Total Disk Space Available Disk Space This displays the total size of the selected disk. This displays the available space of the selected disk for storing recordings. Enable this if you wish to limit the disk space used by video recordings. Enter the maximum amount of disk space assigned to each camera for stream recordings. Select the desired option for the behavior when the disk space limit is reached. Overwrite earliest file. The Recorder will overwrite the oldest file if the space is not enough for further recording. Stop Recording. If the disk space limit is reached, no further recording is done. Check this to have this utility start when Windows starts. If enabled, click the Proxy Settings button to configure the proxy server/exception list settings. Enter the address and port number for the proxy server in the proxy sub-screen. 72 Print. Click this to print the current video stream. Playback Speed. To play a recorded file, select the desired speed. Audio Control. To play a recorded file, select the desired volume. Delete Video. To delete a recorded file, select the file and click this button. Recording Bar. It displays the recordings that match your requests. Green color indicates the schedule and instant recordings. Orange color indicates Motion triggered recordings. Blue color indicates I/O triggered recordings. Gray color indicates no recording found. Available Operation on Recording Bar. It is possible to drag an area on the Recording Bar to narrow the time range selection. 74 Chapter 7 Troubleshooting 7 This chapter covers the most likely problems and their solutions. Overview This chapter covers some common problems that may be encountered while using the Network Camera and some possible solutions to them. If you follow the suggested steps and the Network Camera still does not function properly, contact your dealer for further advice. Problems Problem 1:
Solution 1:
Problem 2:
Solution 2:
I can't connect to the Network Camera with my Web Browser to configure it. It is possible that your PC's IP address is not compatible with the IP address of the Network Camera. Use the Windows utility to configure the Network Camera with a valid IP address. The Windows utility doesn't list any Network Cameras. Check the following:
The Network Camera is installed, LAN connections are OK, it is powered ON and startup is complete. Ensure that your PC and the Network Camera are on the same network segment. (If you don't have a router, this must be the case.) Ensure that your PC has the TCP/IP network protocol loaded. In Windows, this is done by using Control Panel-Network. If an entry for TCP/IP -> Network card is not listed, use Add -
Protocol - Microsoft - TCP/IP to add it. You then need to select the new entry (TCP/IP -> Network card), click Properties, and configure the IP Address tab. If your LAN has a DHCP Server, you can select "Obtain an IP Address automatically". Otherwise, you must select "Specify an IP Address", and enter values for IP Address, Subnet Mask, and Gateway. All devices on your LAN must use compatible values. Remember that each device needs a unique IP Address, and the same Subnet Mask. Problem 3 Solution 3 When I try to connect to the Network Camera, I get prompted for a user name and password. You SHOULD be prompted for a user name and password if trying to access the Administration menu. Enter the Administrator ID and Password set on the Maintenance screen. If you are just trying to view Video, the User Name/Password prompt 75 Playback Program - for Recordings Playback To access the saved recordings of the Cameras, click Playback button in the Monitor main screen, then you will see a screen like following. Figure 51: Playback Screen Searching Recorded Streams Files Select Camera. Select the desired camera from the list. Recording Methods. Select the type of the recorded file from the drop-down list that you wish to view. Start Date/Time. The start date and time the recordings will be searched End Date/Time. The end date and time the recordings will be searched. Load other Cameras. Click this button to load other recordings made from cameras outside of the current folder where the Utilities was installed. Submit. Click this button to confirm the file searching criteria then the Playback will display a list of files matched with the search criteria on the recording bar. Play. Use this to re-start viewing, after using the Stop or Pause button. Pause. Use this to temporarily stop playing. Frame by Frame. Playback will display the video stream in a one-frame per mouse clicking mode. Stop. This will stop playing the recording. Snapshot. Click this to take a still image of the current video. Zoom In. To zoom in on a section of the window, click this icon. Zoom Out. To zoom out on a section of the window, click this icon. 73 indicates that the Administrator has restricted access to specified users. Ask the Administrator for your User Name and Password. Problem 4 I can't connect to the Network Camera using a Wireless connection. Solution 4 1) If a LAN cable is connected to the LAN port, the Wireless interface is disabled. Only one interface can be active. 2) Check that your PC and the Network Camera have compatible Wireless settings. Mode (Infrastructure or Ad-hoc) must be correct. ESSID must match. WEP settings must match. In Ad-hoc mode, the Channel should match, although this is often not required. Problem 5 Video quality may suddenly deteriorate. Solution 5 Problem 6 Solution 6 Problem 7 Solution 7 Problem 8 Solution 8 This can happen when an additional viewer connects to the Network Camera, overloading the camera or the available bandwidth. The image size and quality can be adjusted to cater for the required number of viewers and the available bandwidth. The motion detection feature doesn't send me any E-mail. It may be that the SMTP (Simple Mail Transport Protocol) server used by the camera to send the E-Mail will not accept mail. (This is to prevent span being sent from the server.). Try using a different SMTP server, or contact your ISP to see if SMTP access is being blocked. Using the motion detection feature, I receive E-Mails which don't show any moving objects. The motion detection feature doesn't actually detect motion. It compares frames to see if they are different. Major differences between frames are assumed to be caused by moving objects. But the motion detector can also be triggered by:
Sudden changes in the level of available light Movement of the camera itself. Try to avoid these situations. The motion detection feature works best in locations where there is good steady illumination, and the camera is mounted securely. This feature can NOT be used if the camera is outdoors. The image is blurry. Try cleaning the lens, or adjusting the Video Quality Control setting on the Video Image screen. Video created by the lower settings will contain less detail; this is the trade-off for using less bandwidth. 76 Copyright Notice Many software components are covered by the GNU GPL (General Public License). Some are covered by other Licenses as listed in the table below. Details of each applicable license are contained in the following section. No Warranty THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS''
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Network Camera copyright information Package source codes bootloader arm-linux 2.6.5 arm-linux-gcc 3.4.1 library DM9000 lan driver Busy-box boa-0.94.13a ez-ipupdate dhcpd-1.3.22 boa-0.94-13e11 WPA_supplicant cron ntp-4.1.71 libupnp-1.2.1 License GPL GPL LGPL GPL GPL GPL GPL GPL GPL GPL Public domain (BSD & Lineo http://www.lineo.com/) Public domain
(http://www.ntp.org/) Intel
(http://upnp.sourceforge.net/) 78 ntp-4.1.71 license Copyright (c) David L. Mills 1992-2001 Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is hereby granted, provided that the above copyright notice appears in all copies and that both the copyright notice and this permission notice appear in supporting documentation, and that the name University of Delaware not be used in advertising or publicity pertaining to distribution of the software without specific, written prior permission. The University of Delaware makes no representations about the suitability this software for any purpose. It is provided "as is" without express or implied warranty. Libupnp-1.2.1 License Copyright (c) 2000 Intel Corporation. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. Neither name of Intel Corporation nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL INTEL OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 79 cron license Copyright (c) 1989 The Regents of the University of California. All rights reserved. This code is derived from software contributed to Berkeley by Paul Vixie. Redistribution and use in source and binary forms are permitted provided that the above copyright notice and this paragraph are duplicated in all such forms and that any documentation, advertising materials, and other materials related to such distribution and use acknowledge that the software was developed by the University of California, Berkeley. The name of the University may not be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED ''AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. 80 GNU General Public License GNU GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C) 1989, 1991 Free Software Foundation, Inc. 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Preamble The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation's software and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Library General Public License instead.) You can apply it to your programs, too. When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish), that you receive source code or can get itif you want it, that you can change the software or use pieces of it in new free programs; and that you know you can do these things. To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights. These restrictions translate to certain responsibilities for you if you distribute copies of the software, or if you modify it. For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the recipients all the rights that you have. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights. We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives you legal permission to copy, distribute and/or modify the software. Also, for each author's protection and ours, we want to make certain that everyone understands that there is no warranty for this free software. If the software is modified by someone else and passed on, we want its recipients to know that what they have is not the original, so that any problems introduced by others will not reflect on the original authors' reputations. Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that redistributors of a free program will individually obtain patent licenses, in effect making the program proprietary. To prevent this, we have made it clear that any patent must be licensed for everyone's free use or not licensed at all. The precise terms and conditions for copying, distribution and modification follow. GNU GENERAL PUBLIC LICENSE Terms And Conditions For Copying, Distribution And Modification 0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License. The "Program", below, refers to any such program or work, and a "work based on the Program" means either the Program or any derivative work under copyright law: that is to say, a work containing the Program or a portion of it, either verbatim or with modifications and/or 81 translated into another language. (Hereinafter, translation is included without limitation in the term "modification".) Each licensee is addressed as "you". Activities other than copying, distribution and modification are not covered by this License;
they are outside its scope. The act of running the Program is not restricted, and the output from the Program is covered only if its contents constitute a work based on the Program
(independent of having been made by running the Program). Whether that is true depends on what the Program does. 1. You may copy and distribute verbatim copies of the Program's source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and give any other recipients of the Program a copy of this License along with the Program. You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee. 2. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions:
a) You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change. b) You must cause any work that you distribute or publish, that in whole or in part contains or is derived from the Program or any part thereof, to be licensed as a whole at no charge to all third parties under the terms of this License. c) If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty
(or else, saying that you provide a warranty) and that users may redistribute the program under these conditions, and telling the user how to view a copy of this License. (Exception: if the Program itself is interactive but does not normally print such an announcement, your work based on the Program is not required to print an announcement.) These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Program, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works. But when you distribute the same sections as part of a whole which is a work based on the Program, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it. Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Program. In addition, mere aggregation of another work not based on the Program with the Program (or with a work based on the Program) on a volume of a storage or distribution medium does not bring the other work under the scope of this License. 3. You may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you also do one of the following:
a) Accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, 82 b) Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no more than your cost of physically performing source distribution, a complete machine-readable copy of the corresponding source code, to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, c) Accompany it with the information you received as to the offer to distribute corresponding source code. (This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer, in accord with Subsection b above.) The source code for a work means the preferred form of the work for making modifications to it. For an executable work, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the executable. However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable. If distribution of executable or object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place counts as distribution of the source code, even though third parties are not compelled to copy the source along with the object code. 4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance. 5. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Program or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Program (or any work based on the Program), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Program or works based on it. 6. Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a license from the original licensor to copy, distribute or modify the Program subject to these terms and conditions. You may not impose any further restrictions on the recipients' exercise of the rights granted herein.You are not responsible for enforcing compliance by third parties to this License. 7. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not distribute the Program at all. For example, if a patent license would not permit royalty-free redistribution of the Program by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program. If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances. It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system, which is implemented by public license 83 practices. Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice. This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License. 8. If the distribution and/or use of the Program is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Program under this License may add an explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License. 9. The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number. If the Program specifies a version number of this License which applies to it and "any later version", you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation. If the Program does not specify a version number of this License, you may choose any version ever published by the Free Software Foundation. 10. If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally. NO WARRANTY 11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. 84 Lesser GNU General Public License GNU LESSER GENERAL PUBLIC LICENSE Version 2.1, February 1999 Copyright (C) 1991, 1999 Free Software Foundation, Inc. 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.
[This is the first released version of the Lesser GPL. It also counts as the successor of the GNU Library Public License, version 2, hence the version number 2.1.]
Preamble The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public Licenses are intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users. This license, the Lesser General Public License, applies to some specially designated software packages--typically libraries--of the Free Software Foundation and other authors who decide to use it. You can use it too, but we suggest you first think carefully about whether this license or the ordinary General Public License is the better strategy to use in any particular case, based on the explanations below. When we speak of free software, we are referring to freedom of use, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish); that you receive source code or can get it if you want it; that you can change the software and use pieces of it in new free programs;
and that you are informed that you can do these things. To protect your rights, we need to make restrictions that forbid distributors to deny you these rights or to ask you to surrender these rights. These restrictions translate to certain responsibilities for you if you distribute copies of the library or if you modify it. For example, if you distribute copies of the library, whether gratis or for a fee, you must give the recipients all the rights that we gave you. You must make sure that they, too, receive or can get the source code. If you link other code with the library, you must provide complete object files to the recipients, so that they can relink them with the library after making changes to the library and recompiling it. And you must show them these terms so they know their rights. We protect your rights with a two-step method: (1) we copyright the library, and (2) we offer you this license, which gives you legal permission to copy, distribute and/or modify the library. To protect each distributor, we want to make it very clear that there is no warranty for the free library. Also, if the library is modified by someone else and passed on, the recipients should know that what they have is not the original version, so that the original author's reputation will not be affected by problems that might be introduced by others. 86 Finally, software patents pose a constant threat to the existence of any free program. We wish to make sure that a company cannot effectively restrict the users of a free program by obtaining a restrictive license from a patent holder. Therefore, we insist that any patent license obtained for a version of the library must be consistent with the full freedom of use specified in this license. Most GNU software, including some libraries, is covered by the ordinary GNU General Public License. This license, the GNU Lesser General Public License, applies to certain designated libraries, and is quite different from the ordinary General Public License. We use this license for certain libraries in order to permit linking those libraries into non-free programs. When a program is linked with a library, whether statically or using a shared library, the combination of the two is legally speaking a combined work, a derivative of the original library. The ordinary General Public License therefore permits such linking only if the entire combination fits its criteria of freedom. The Lesser General Public License permits more lax criteria for linking other code with the library. We call this license the "Lesser" General Public License because it does Less to protect the user's freedom than the ordinary General Public License. It also provides other free software developers Less of an advantage over competing non-free programs. These disadvantages are the reason we use the ordinary General Public License for many libraries. However, the Lesser license provides advantages in certain special circumstances. For example, on rare occasions, there may be a special need to encourage the widest possible use of a certain library, so that it becomes a de-facto standard. To achieve this, non-free programs must be allowed to use the library. A more frequent case is that a free library does the same job as widely used non-free libraries. In this case, there is little to gain by limiting the free library to free software only, so we use the Lesser General Public License. In other cases, permission to use a particular library in non-free programs enables a greater number of people to use a large body of free software. For example, permission to use the GNU C Library in non-free programs enables many more people to use the whole GNU operating system, as well as its variant, the GNU/Linux operating system. Although the Lesser General Public License is Less protective of the users' freedom, it does ensure that the user of a program that is linked with the Library has the freedom and the wherewithal to run that program using a modified version of the Library. The precise terms and conditions for copying, distribution and modification follow. Pay close attention to the difference between a "work based on the library" and a "work that uses the library". The former contains code derived from the library, whereas the latter must be combined with the library in order to run. GNU LESSER GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0. This License Agreement applies to any software library or other program which contains a notice placed by the copyright holder or other authorized party saying it may be distributed under the terms of this Lesser General Public License (also called "this License"). Each licensee is addressed as "you". A "library" means a collection of software functions and/or data prepared so as to be conveniently linked with application programs (which use some of those functions and data) to form executables. 87 The "Library", below, refers to any such software library or work which has been distributed under these terms. A "work based on the Library" means either the Library or any derivative work under copyright law: that is to say, a work containing the Library or a portion of it, either verbatim or with modifications and/or translated straightforwardly into another language.
(Hereinafter, translation is included without limitation in the term "modification".)
"Source code" for a work means the preferred form of the work for making modifications to it. For a library, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the library. Activities other than copying, distribution and modification are not covered by this License;
they are outside its scope. The act of running a program using the Library is not restricted, and output from such a program is covered only if its contents constitute a work based on the Library (independent of the use of the Library in a tool for writing it). Whether that is true depends on what the Library does and what the program that uses the Library does. 1. You may copy and distribute verbatim copies of the Library's complete source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and distribute a copy of this License along with the Library. You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee. 2. You may modify your copy or copies of the Library or any portion of it, thus forming a work based on the Library, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions:
a) The modified work must itself be a software library. b) You must cause the files modified to carry prominent notices stating that you changed the files and the date of any change. c) You must cause the whole of the work to be licensed at no charge to all third parties under the terms of this License. d) If a facility in the modified Library refers to a function or a table of data to be supplied by an application program that uses the facility, other than as an argument passed when the facility is invoked, then you must make a good faith effort to ensure that, in the event an application does not supply such function or table, the facility still operates, and performs whatever part of its purpose remains meaningful.
(For example, a function in a library to compute square roots has a purpose that is entirely well-defined independent of the application. Therefore, Subsection 2d requires that any application-supplied function or table used by this function must be optional: if the application does not supply it, the square root function must still compute square roots.) These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Library, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works. But when you distribute the same sections as part of a whole which is a work based on the Library, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it. Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Library. 88 In addition, mere aggregation of another work not based on the Library with the Library (or with a work based on the Library) on a volume of a storage or distribution medium does not bring the other work under the scope of this License. 3. You may opt to apply the terms of the ordinary GNU General Public License instead of this License to a given copy of the Library. To do this, you must alter all the notices that refer to this License, so that they refer to the ordinary GNU General Public License, version 2, instead of to this License. (If a newer version than version 2 of the ordinary GNU General Public License has appeared, then you can specify that version instead if you wish.) Do not make any other change in these notices. Once this change is made in a given copy, it is irreversible for that copy, so the ordinary GNU General Public License applies to all subsequent copies and derivative works made from that copy. This option is useful when you wish to copy part of the code of the Library into a program that is not a library. 4. You may copy and distribute the Library (or a portion or derivative of it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange. If distribution of object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place satisfies the requirement to distribute the source code, even though third parties are not compelled to copy the source along with the object code. 5. A program that contains no derivative of any portion of the Library, but is designed to work with the Library by being compiled or linked with it, is called a "work that uses the Library". Such a work, in isolation, is not a derivative work of the Library, and therefore falls outside the scope of this License. However, linking a "work that uses the Library" with the Library creates an executable that is a derivative of the Library (because it contains portions of the Library), rather than a "work that uses the library". The executable is therefore covered by this License. Section 6 states terms for distribution of such executables. When a "work that uses the Library" uses material from a header file that is part of the Library, the object code for the work may be a derivative work of the Library even though the source code is not. Whether this is true is especially significant if the work can be linked without the Library, or if the work is itself a library. The threshold for this to be true is not precisely defined by law. If such an object file uses only numerical parameters, data structure layouts and accessors, and small macros and small inline functions (ten lines or less in length), then the use of the object file is unrestricted, regardless of whether it is legally a derivative work. (Executables containing this object code plus portions of the Library will still fall under Section 6.) Otherwise, if the work is a derivative of the Library, you may distribute the object code for the work under the terms of Section 6. Any executables containing that work also fall under Section 6, whether or not they are linked directly with the Library itself. 89 6. As an exception to the Sections above, you may also combine or link a "work that uses the Library" with the Library to produce a work containing portions of the Library, and distribute that work under terms of your choice, provided that the terms permit modification of the work for the customer's own use and reverse engineering for debugging such modifications. You must give prominent notice with each copy of the work that the Library is used in it and that the Library and its use are covered by this License. You must supply a copy of this License. If the work during execution displays copyright notices, you must include the copyright notice for the Library among them, as well as a reference directing the user to the copy of this License. Also, you must do one of these things:
a) Accompany the work with the complete corresponding machine-readable source code for the Library including whatever changes were used in the work (which must be distributed under Sections 1 and 2 above); and, if the work is an executable linked with the Library, with the complete machine-readable "work that uses the Library", as object code and/or source code, so that the user can modify the Library and then relink to produce a modified executable containing the modified Library. (It is understood that the user who changes the contents of definitions files in the Library will not necessarily be able to recompile the application to use the modified definitions.) b) Use a suitable shared library mechanism for linking with the Library. A suitable mechanism is one that (1) uses at run time a copy of the library already present on the user's computer system, rather than copying library functions into the executable, and (2) will operate properly with a modified version of the library, if the user installs one, as long as the modified version is interface-compatible with the version that the work was made with. c) Accompany the work with a written offer, valid for at least three years, to give the same user the materials specified in Subsection 6a, above, for a charge no more than the cost of performing this distribution. d) If distribution of the work is made by offering access to copy from a designated place, offer equivalent access to copy the above specified materials from the same place. e) Verify that the user has already received a copy of these materials or that you have already sent this user a copy. For an executable, the required form of the "work that uses the Library" must include any data and utility programs needed for reproducing the executable from it. However, as a special exception, the materials to be distributed need not include anything that is normally distributed
(in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable. It may happen that this requirement contradicts the license restrictions of other proprietary libraries that do not normally accompany the operating system. Such a contradiction means you cannot use both them and the Library together in an executable that you distribute. 7. You may place library facilities that are a work based on the Library side-by-side in a single library together with other library facilities not covered by this License, and distribute such a combined library, provided that the separate distribution of the work based on the Library and of the other library facilities is otherwise permitted, and provided that you do these two things:
a) Accompany the combined library with a copy of the same work based on the Library, uncombined with any other library facilities. This must be distributed under the terms of the Sections above. b) Give prominent notice with the combined library of the fact that part of it is a work based on the Library, and explaining where to find the accompanying uncombined form of the same work. 90 8. You may not copy, modify, sublicense, link with, or distribute the Library except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense, link with, or distribute the Library is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance. 9. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Library or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Library (or any work based on the Library), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Library or works based on it. 10. Each time you redistribute the Library (or any work based on the Library), the recipient automatically receives a license from the original licensor to copy, distribute, link with or modify the Library subject to these terms and conditions. You may not impose any further restrictions on the recipients' exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties with this License. 11. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not distribute the Library at all. For example, if a patent license would not permit royalty-free redistribution of the Library by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Library. If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply, and the section as a whole is intended to apply in other circumstances. It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system which is implemented by public license practices. Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice. This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License. 12. If the distribution and/or use of the Library is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Library under this License may add an explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License. 13. The Free Software Foundation may publish revised and/or new versions of the Lesser General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number. If the Library specifies a version number of this License which applies to it and "any later version", you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation. If the Library does not specify a license version number, you may choose any version ever published by the Free Software Foundation. 91 14. If you wish to incorporate parts of the Library into other free programs whose distribution conditions are incompatible with these, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation;
we sometimes make exceptions for this. Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally. NO WARRANTY 15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE LIBRARY, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE LIBRARY "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE LIBRARY IS WITH YOU. SHOULD THE LIBRARY PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE LIBRARY (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. END OF TERMS AND CONDITIONS 92 Appendix B Streaming Video/Audio Solution Overview B Streaming video is a sequence of "moving images" that are sent in compressed form over the Internet and displayed by the viewer as they arrive. With streaming, a Web user does not have to wait to download a large file before seeing the video or hearing the sound. Instead, the media is sent in a continuous stream and is played as it arrives. Streaming Video/Audio through Internet Camera To snapshot a JPEG image from the Internet Camera with specified resolution and quality:
http://<ip>/img/snapshot.cgi?[size=<value>][&quality=<value>]
Size = 1(160*128) 2(320*240) 3(640*480) Quality = 1(Very low) 2(Low) 3(Normal) 4(High) 5(Very high) To stream M-JPEG video from the Internet Camera (M-JPEG mode only) http://<ip>/img/mjpeg.cgi or http://<ip>/img/main_mjpeg.htm To stream video through the RTP/RTSP protocol from Internet Camera (MPEG-4 mode only) rtsp://<ip>/img/media.sav Note: Users need to specify the desired protocol in the players. To snapshot a JPEG image (160*128, very low quality) through a mobile phone:
http://<ip>/img/mobile.cgi 93
1 | Internal photos | Internal Photos | 2.23 MiB | July 30 2010 |
Compliance Certification Services Inc. Report No.: T100603205 Date of Issue: July 21, 2010 INTERNAL PHOTOGRAPHS OF EUT A1 - 6 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205 Date of Issue: July 21, 2010 A1 - 7 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205 Date of Issue: July 21, 2010 A1 - 8 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205 Date of Issue: July 21, 2010 A1 - 9 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205 Date of Issue: July 21, 2010 A1 - 10 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205 Date of Issue: July 21, 2010 A1 - 11 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205 Date of Issue: July 21, 2010 A1 - 12 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205 Date of Issue: July 21, 2010 A1 - 13 Rev. 00
1 | External photos | External Photos | 1.02 MiB | July 30 2010 |
Compliance Certification Services Inc. Report No.: T100603205 Date of Issue: July 21, 2010 APPENDIX 1 - PHOTOGRAPHS OF EUT EXTERNAL PHOTOGRAPHS OF EUT A1 - 1 Total Page: 13 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205 Date of Issue: July 21, 2010 A1 - 2 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205 Date of Issue: July 21, 2010 A1 - 3 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205 Date of Issue: July 21, 2010 Adapter A1 - 4 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205 Date of Issue: July 21, 2010 Antenna A1 - 5 Rev. 00
1 | Label format and location | ID Label/Location Info | 229.69 KiB | July 30 2010 |
Model No: OC810 S/N:
MAC:
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) this device may not cause harmful interference and
(2) this device must accept any interference received, including interference that may ause undesired operation EX-B.JPG
1 | Agent authorization | Cover Letter(s) | 57.69 KiB | July 30 2010 |
SerComm Corporation Taipei Office: 8F, No.3-1, YuanQu St., NanKang, Taipei 115, Taiwan, R.O.C. TEL: 886-2-2655-3988 FAX: 886-2-2655-3966 Chu Nan Office: 3F, No. 81, YuYi Rd., Chu-Nan, Miao-Li 350, Taiwan, R.O.C. TEL: 886-37-585-899 FAX: 886-37-585-000 Federal Communications Commission 7435 Oakland Mills Road Columbia MD 21046 c.c. Compliance Certification Services Certification Division 47173 Benicia Street Fremont, CA 94538, USA To whom it may concern:
I, the undersigned, hereby authorize Mr. James Lee / Section Manager of Compliance Certification Date:June 9, 2010 Services Inc. and hereafter referred to as CCS, to act on our behalf in all manners relating to application for equipment authorization, including signing of all documents relating to these matters. Any and all acts carried out by Mr. James Lee / Section Manager of Compliance Certification Services Inc. on our behalf shall have the same effect as acts of our own. I, the undersigned, hereby certify that we are not subject to a denial of federal benefits, that includes FCC benefits, pursuant to Section 5301 of the Anti-Drug Abuse Act of 1988, 21 U.S.C. 853(a). In authorizing CCS as our agent, we still recognize that we are responsible to:
a) comply with the relevant provisions of the certification program;
b) c) d) e) make all necessary arrangements for the conduct of the evaluation, including provision for examining documentation and access to all areas, records (including internal audit reports) and personnel for the purposes of evaluation (e.g. testing, inspection, assessment, surveillance, reassessment) and resolution of complaints;
make claims regarding certification only in respect of the scope for which certification has been granted;
do not use our product certification in such a manner as to bring the Certification Division into disrepute and not make any statement regarding our product certification which the Certification Division may consider misleading or unauthorized;
upon suspension or cancellation of certification, discontinue use of all advertising matter that contains any reference thereto and return any certification documents as required by the Certification Division;
SerComm Corporation Taipei Office: 8F, No.3-1, YuanQu St., NanKang, Taipei 115, Taiwan, R.O.C. TEL: 886-2-2655-3988 FAX: 886-2-2655-3966 Chu Nan Office: 3F, No. 81, YuYi Rd., Chu-Nan, Miao-Li 350, Taiwan, R.O.C. TEL: 886-37-585-899 FAX: 886-37-585-000 use certification only to indicate the products are certified as being in conformity with specified standards;
endeavor to ensure that no certificate or report nor any part thereof is used in a misleading manner;
ensure that any reference to our product certification in communication media such as documents, brochures or advertising, complies with the requirements of the Certification Division;
keep a record of all complaints made known to the us relating to the products compliance with requirements of the relevant standard and to make these records available to the Certification Division when requested;
take appropriate action with respect to such complaints and any deficiencies found in products or services that affect compliance with the requirements for certification;
f) g) h) i) j) k) document the actions taken. This authorization is valid until further written notice from the applicant. Yours sincerely, __________________________ _ Ronnie Cheng Associate Manager / R&D Division SerComm Corporation TEL: 886-2-2655-3988 #2547 FAX: 886-2-2655-3975 E-Mail: ronnie_cheng@sercomm.com
1 | Attestation letter | Attestation Statements | 66.48 KiB | July 30 2010 |
SerComm Corporation Taipei Office: 8F, No.3-1, YuanQu St., NanKang, Taipei 115, Taiwan, R.O.C. TEL: 886-2-2655-3988 FAX: 886-2-2655-3966 Chu Nan Office: 3F, No. 81, YuYi Rd., Chu-Nan, Miao-Li 350, Taiwan, R.O.C. TEL: 886-37-585-899 FAX: 886-37-585-000 Date:July 27, 2010 Subject: Ad Hoc Mode Function Declaration FCC ID: P27OC810 To Whom it may concern, This device is acting as slave and operating on 2.4GHz band. Ad Hoc function is available and not able to work on non-US frequencies. Please contact the one signed below or the authorized agent for this filing. Thank you. Regards,
1 | MPE calculation | RF Exposure Info | 164.36 KiB | July 30 2010 |
Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 APPENDIX I RADIO FREQUENCY EXPOSURE LIMIT According to 15.247(i), systems operating under the provisions of this section shall be operated in a manner that ensures that the public is not exposed to radio frequency energy levels in excess of the Commission's guidelines. See 1.1307(b)(1) of this chapter. EUT Specification EUT Wireless Outdoor camera Frequency band
(Operating) Device category Exposure classification Antenna diversity Max. output power Antenna gain (Max) Evaluation applied WLAN: 2.412GHz ~ 2.462GHz WLAN: 5.18GHz ~ 5.32GHz / 5.50GHz ~ 5.70GHz WLAN: 5.745GHz ~ 5.825GHz Others Portable (<20cm separation) Mobile (>20cm separation) Others Occupational/Controlled exposure (S = 5mW/cm2) General Population/Uncontrolled exposure
(S=1mW/cm2) Single antenna Multiple antennas Tx diversity Rx diversity Tx/Rx diversity IEEE 802.11b mode: 14.41 dBm (27.60 mW) IEEE 802.11g mode: 22.02dBm (159.22 mW) draft 802.11n Standard-20 MHz Channel mode: 21.74 dBm (149.27 mW) draft 802.11n Wide-40 MHz Channel mode: 21.55 dBm (142.88 mW) 5.4 dBi (Numeric gain: 3.46) MPE Evaluation*
SAR Evaluation N/A gain.) Remark:
1. The maximum output power is 22.02dBm (149.27 mW) at 2412MHz (with 3.46 numeric antenna 2. DTS device is not subject to routine RF evaluation; MPE estimate is used to justify the compliance. 3. For mobile or fixed location transmitters, no SAR consideration applied. The maximum power density is 1.0 mW/cm2 even if the calculation indicates that the power density would be larger. TEST RESULTS No non-compliance noted. MPE EVALUATION No non-compliance noted. Page 76 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 Calculation 30 GP d 2E 3770
=
S =
&
E Where E = Field strength in Volts / meter Given Combining equations and re-arranging the terms to express the distance as a function of the remaining variables yields:
P = Power in Watts G = Numeric antenna gain d = Distance in meters S = Power density in milliwatts / square centimeter S
=
GP 30 d 3770 2 Changing to units of mW and cm, using:
P (mW) = P (W) / 1000 and d (cm) = d(m) / 100 Yields S
=
(
P 30 1000
/
(
d 3770
) G
) 2 100
/
=
.0 0796 GP d 2 Equation 1 Where d = Distance in cm P = Power in mW G = Numeric antenna gain S = Power density in mW / cm2 Maximum Permissible Exposure S
.0
= 000199 Substituting the MPE safe distance using d = 20 cm into Equation 1:
Yields Where P = Power in mW G = Numeric antenna gain S = Power density in mW / cm2 GP Page 77 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 IEEE 802.11b mode:
EUT output power = 27.60 mW Numeric Antenna gain = 3.46
Power density = 0.0190 mW / cm2 IEEE 802.11g mode:
EUT output power = 159.22 mW Numeric Antenna gain = 3.46
Power density = 0.1096 mW / cm2 draft 802.11n Standard-20 MHz Channel mode:
EUT output power = 149.27 mW Numeric Antenna gain = 3.46
Power density = 0.1027 mW / cm2 draft 802.11n Wide-40 MHz Channel mode:
EUT output power = 142.88 mW Numeric Antenna gain = 3.46
Power density = 0.0983 mW / cm2
(For mobile or fixed location transmitters, the maximum power density is 1.0 mW/cm2 even if the calculation indicates that the power density would be larger.) Page 78 Rev. 00
1 | Request for confidentiality | Cover Letter(s) | 55.21 KiB | July 30 2010 |
SerComm Corporation Taipei Office: 8F, No.3-1, YuanQu St., NanKang, Taipei 115, Taiwan, R.O.C. TEL: 886-2-2655-3988 FAX: 886-2-2655-3966 Chu Nan Office: 3F, No. 81, YuYi Rd., Chu-Nan, Miao-Li 350, Taiwan, R.O.C. TEL: 886-37-585-899 FAX: 886-37-585-000 Date:June 9, 2010 Federal Communications Commission Authorization and Evaluation Division FCC ID : P27OC810 Confidentiality Request Pursuant to Sections 0.457 and 0.459 of the Commissions Rules, the Applicant hereby requests confidential treatment of information accompanying this Application as outlined below:
1. Schematics 2. Operational Description 3. Block diagram The above materials contain trade secrets and proprietary information not customarily released to the public. The public disclosure of these matters might be harmful to the Applicant and provide unjustified benefits to its competitors. The Applicant understands that pursuant to Rule 0.457, disclosure of this Application and all accompanying documentation will not be made before the date of the Grant for this application. Yours sincerely, ___________________________ Ronnie Cheng Associate Manager / R&D Division SerComm Corporation TEL: 886-2-2655-3988 #2547 FAX: 886-2-2655-3975 E-Mail: ronnie_cheng@sercomm.com
1 | Test report | Test Report | 1003.37 KiB | July 30 2010 |
Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 FCC 47 CFR PART 15 SUBPART C TEST REPORT For Wireless Outdoor camera Model: OC810 Trade Name: SerComm Issued to SerComm Corporation 8F, No. 3-1, YuanQu St., NanKang, Taipei 115, Taiwan, R.O.C. Issued by Compliance Certification Services Inc. No. 11, Wu-Gong 6th Rd., Wugu Industrial Park, Taipei Hsien 248, Taiwan (R.O.C.) http://www.ccsrf.com service@ccsrf.com Note: This report shall not be reproduced except in full, without the written approval of Compliance Certification Services Inc. This document may be altered or revised by Compliance Certification Services Inc. personnel only, and shall be noted in the revision section of the document. Page 1 Total Page: 81 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 TABLE OF CONTENTS 1. TEST RESULT CERTIFICATION....................................................................................................3 2. EUT DESCRIPTION ...........................................................................................................................4 3. TEST METHODOLOGY ....................................................................................................................5 3.1 EUT CONFIGURATION ........................................................................................................................5 3.2 EUT EXERCISE....................................................................................................................................5 3.3 GENERAL TEST PROCEDURES.............................................................................................................5 3.4 FCC PART 15.205 RESTRICTED BANDS OF OPERATIONS ........................................................6 3.5 DESCRIPTION OF TEST MODES ...........................................................................................................7 4. INSTRUMENT CALIBRATION........................................................................................................8 4.1 MEASURING INSTRUMENT CALIBRATION......................................................................................8 4.2 MEASUREMENT EQUIPMENT USED.........................................................................................9 4.3 MEASUREMENT UNCERTAINTY.............................................................................................10 5. FACILITIES AND ACCREDITATIONS ........................................................................................11 5.1 FACILITIES .......................................................................................................................................11 5.2 EQUIPMENT......................................................................................................................................11 5.3 TABLE OF ACCREDITATIONS AND LISTINGS.....................................................................................12 6. SETUP OF EQUIPMENT UNDER TEST.......................................................................................13 6.1 SETUP CONFIGURATION OF EUT.......................................................................................................13 6.2 SUPPORT EQUIPMENT ...............................................................................................................13 7. FCC PART 15.247 REQUIREMENTS.............................................................................................14 7.1 6DB BANDWIDTH.............................................................................................................................14 7.2 PEAK POWER....................................................................................................................................22 7.3 BAND EDGES MEASUREMENT ................................................................................................24 7.4 PEAK POWER SPECTRAL DENSITY....................................................................................................41 7.5 SPURIOUS EMISSIONS.................................................................................................................49 7.6 RADIATED EMISSIONS ..............................................................................................................56 7.7 POWERLINE CONDUCTED EMISSIONS...............................................................................................73 APPENDIX I RADIO FREQUENCY EXPOSURE...............................................................................76 APPENDIX II PHOTOGRAPHS OF TEST SETUP.............................................................................79 APPENDIX 1 - PHOTOGRAPHS OF EUT Page 2 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 1. TEST RESULT CERTIFICATION Applicant:
SerComm Corporation 8F, No. 3-1, YuanQu St., NanKang, Taipei 115, Taiwan, R.O.C. Equipment Under Test: Wireless Outdoor camera Trade Name:
Model:
Date of Test:
SerComm OC810 June 7 ~ July 13, 2010 APPLICABLE STANDARDS STANDARD FCC 47 CFR Part 15 Subpart C TEST RESULT No non-compliance noted We hereby certify that:
The above equipment was tested by Compliance Certification Services Inc. The test data, data evaluation, test procedures, and equipment configurations shown in this report were made in accordance with the procedures given in ANSI C63.4: 2003 and the energy emitted by the sample EUT tested as described in this report is in compliance with the requirements of FCC Rules Part 15.207, 15.209, 15.247. The test results of this report relate only to the tested sample EUT identified in this report. Approved by:
Rex Lai Section Manager Compliance Certification Services Inc. Reviewed by:
Gina Lo Section Manager Compliance Certification Services Inc. Page 3 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 2. EUT DESCRIPTION Product Trade Name Model Number Model Discrepancy Wireless Outdoor camera SerComm OC810 N/A Power Adapter Sunny / SYS1381-1212-W2 I/P: 100-240V, 50/60Hz, 0.5A O/P: 12V, 1.0A 2412 ~ 2462 MHz IEEE 802.11b mode: 14.41 dBm IEEE 802.11g mode: 22.02 dBm draft 802.11n Standard-20 MHz Channel mode: 21.74 dBm draft 802.11n Wide-40 MHz Channel mode: 21.55 dBm IEEE 802.11b mode: DSSS (1, 2, 5.5 and 11 Mbps) IEEE 802.11g mode: OFDM (6, 9, 12, 18, 24, 36, 48 and 54 Mbps) draft 802.11n Standard-20 MHz Channel mode: OFDM (6.5, 7.22, 13, 14.44, 19.5, 21.67, 26, 28.89, 39, 43.33, 52, 57.78, 58.5, 65.0, 72.22Mbps) draft 802.11n Wide-40 MHz Channel mode: OFDM (13.5, 15, 27, 30, 40.5, 45, 54, 60, 81, 90, 108, 120, 121.5, 135, 150Mbps) IEEE 802.11b/g mode: 11 Channels draft 802.11n Standard-20 MHz Channel mode: 11 Channels draft 802.11n Wide-40 MHz Channel mode: 7 Channels Power Ratting Frequency Range Transmit Power Modulation Technique Number of Channels Antenna Specification 1. 5.4 dBi for black 2. 4.2 dBi for white Antenna Designation Omni Antenna Remark:
1. The sample selected for test was engineering sample that approximated to production product and was provided by manufacturer. 2. This submittal(s) (test report) is intended for FCC ID: P27OC810 filing to comply with Section 15.207, 15.209 and 15.247 of the FCC Part 15, Subpart C Rules. Page 4 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 3. TEST METHODOLOGY The tests documented in this report were performed in accordance with ANSI C63.4 and FCC CFR 47 2.1046, 2.1047, 2.1049, 2.1051, 2.1053, 2.1055, 2.1057, 15.207, 15.209 and 15.247. 3.1 EUT CONFIGURATION The EUT configuration for testing is installed on RF field strength measurement to meet the Commissions requirement and operating in a manner that intends to maximize its emission characteristics in a continuous normal application. 3.2 EUT EXERCISE The EUT was operated in the engineering mode to fix the TX frequency that was for the purpose of the measurements. According to its specifications, the EUT must comply with the requirements of the Section 15.207, 15.209 and 15.247 under the FCC Rules Part 15 Subpart C. 3.3 GENERAL TEST PROCEDURES Conducted Emissions The EUT is placed on the turntable, which is 0.8 m above ground plane. According to the requirements in Section 13.1.4.1 of ANSI C63.4 Conducted emissions from the EUT measured in the frequency range between 0.15 MHz and 30MHz using CISPR Quasi-peak and average detector modes. Radiated Emissions The EUT is placed on a turn table, which is 0.8 m above ground plane. The turntable shall rotate 360 degrees to determine the position of maximum emission level. EUT is set 3m away from the receiving antenna, which varied from 1m to 4m to find out the highest emission. And also, each emission was to be maximized by changing the polarization of receiving antenna both horizontal and vertical. In order to find out the maximum emissions, exploratory radiated emission measurements were made according to the requirements in Section 13.1.4.1 of ANSI C63.4. Page 5 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 3.4 FCC PART 15.205 RESTRICTED BANDS OF OPERATIONS
(a) Except as shown in paragraph (d) of this section, only spurious emissions are permitted in any of the frequency bands listed below:
MHz MHz MHz 0.090 - 0.110 10.495 - 0.505 2.1735 - 2.1905 4.125 - 4.128 4.17725 - 4.17775 4.20725 - 4.20775 6.215 - 6.218 6.26775 - 6.26825 6.31175 - 6.31225 8.291 - 8.294 8.362 - 8.366 8.37625 - 8.38675 8.41425 - 8.41475 12.29 - 12.293 12.51975 - 12.52025 12.57675 - 12.57725 13.36 - 13.41 16.42 - 16.423 16.69475 - 16.69525 16.80425 - 16.80475 25.5 - 25.67 37.5 - 38.25 73 - 74.6 74.8 - 75.2 108 - 121.94 123 - 138 149.9 - 150.05 156.52475 -
156.52525 156.7 - 156.9 162.0125 - 167.17 167.72 - 173.2 240 - 285 322 - 335.4 399.9 - 410 608 - 614 960 - 1240 1300 - 1427 1435 - 1626.5 1645.5 - 1646.5 1660 - 1710 1718.8 - 1722.2 2200 - 2300 2310 - 2390 2483.5 - 2500 2655 - 2900 3260 - 3267 3332 - 3339 3345.8 - 3358 3600 - 4400 GHz 4.5 - 5.15 5.35 - 5.46 7.25 - 7.75 8.025 - 8.5 9.0 - 9.2 9.3 - 9.5 10.6 - 12.7 13.25 - 13.4 14.47 - 14.5 15.35 - 16.2 17.7 - 21.4 22.01 - 23.12 23.6 - 24.0 31.2 - 31.8 36.43 - 36.5
(2) 1 Until February 1, 1999, this restricted band shall be 0.490-0.510 MHz. 2 Above 38.6
(b) Except as provided in paragraphs (d) and (e), the field strength of emissions appearing within these frequency bands shall not exceed the limits shown in Section 15.209. At frequencies equal to or less than 1000 MHz, compliance with the limits in Section 15.209 shall be demonstrated using measurement instrumentation employing a CISPR quasi-peak detector. Above 1000 MHz, compliance with the emission limits in Section 15.209 shall be demonstrated based on the average value of the measured emissions. The provisions in Section 15.35 apply to these measurements. Page 6 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 3.5 DESCRIPTION OF TEST MODES The EUT (model: OC810) had been tested under operating condition. Software used to control the EUT for staying in continuous transmitting mode was programmed. After verification, all tests were carried out with the worst case test modes as shown below except radiated spurious emission below 1GHz and power line conducted emissions below 30MHz, which worst case was in normal link mode only. RF out put power of IEEE 802.11b mode is reduced 4dBm in order to meet radiated spurious emission above 1GHz test. IEEE 802.11b mode:
Channel Low (2412MHz), Channel Mid (2437MHz) and Channel High (2462MHz) with 1Mbps data rate were chosen for full testing. IEEE 802.11g mode:
Channel Low (2412MHz), Channel Mid (2437MHz) and Channel High (2462MHz) with 6Mbps data rate were chosen for full testing. draft 802.11n Standard-20 MHz Channel mode:
Channel Low (2412MHz), Channel Mid (2437MHz) and Channel High (2462MHz) with 6.5Mbps data rate were chosen for full testing. draft 802.11n Wide-40 MHz Channel mode:
Channel Low (2422MHz), Channel Mid (2437MHz) and Channel High (2452MHz) with 13.5Mbps data rate were chosen for full testing. Page 7 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 4. INSTRUMENT CALIBRATION 4.1 MEASURING INSTRUMENT CALIBRATION The measuring equipment, which was utilized in performing the tests documented herein, has been calibrated in accordance with the manufacturer's recommendations for utilizing calibration equipment, which is traceable to recognized national standards. Page 8 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 4.2 MEASUREMENT EQUIPMENT USED Equipment Used for Emissions Measurement Remark: Each piece of equipment is scheduled for calibration once a year and Loop Antenna is scheduled for calibration once three years. Conducted Emissions Test Site Name of Equipment Spectrum Analyzer Spectrum Analyzer Power Meter Power Sensor Manufacturer Agilent R&S Agilent Agilent Model E4446A FSEK30 E4416A E9327A Serial Number MY43360131 100264 GB41291611 US40441097 Calibration Due 03/03/2011 04/13/2011 06/27/2011 06/27/2011 3M Semi Anechoic Chamber Name of Equipment Spectrum Analyzer EMI Test Receiver Manufacturer Agilent R&S Model E4446A ESCI Serial Number US42510252 100064 Pre-Amplifier Pre-Amplifier Bilog Antenna Horn Antenna Loop Antenna Turn Table Antenna Tower Controller Site NSA Test S/W Mini-Circults ZFL-1000LN SF350700823 MITEQ Sunol Sciences EMCO EMCO CCS CCS CCS CCS AFS44-00102650-
42-10P-44 JB3 3117 6502 1415367 A030105 00055165 8905/2356 CC-T-1F CC-A-1F CC-C-1F N/A N/A N/A N/A EZ-EMC (CCS-3A1RE) N/A Calibration Due 10/26/2010 02/04/2011 01/13/2011 11/20/2010 09/11/2010 12/07/2010 06/10/2013 N.C.R N.C.R N.C.R 12/31/2010 Name of Equipment TEST RECEIVER LISN (EUT) LISN BNC CABLE Pulse Limiter THERMO-
HYGRO METER Test S/W Powerline Conducted Emissions Test Site # B Manufacturer R&S FCC EMCO Huber+Suhner R&S TOP Model ESCI FCC-LISN-50-32-
2 3825/2 RG 223/U ESH3-Z2 HA-202 Serial Number Calibration Due 100234 08009 1382 BNC B2 100374 9303-3 06/13/2011 03/25/2011 01/11/2011 01/12/2011 08/23/2010 01/31/2011 EZ-EMC Page 9 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 4.3 MEASUREMENT UNCERTAINTY PARAMETER UNCERTAINTY Powerline Conducted Emission 3M Semi Anechoic Chamber / 30M~200M 3M Semi Anechoic Chamber / 200M~1000M 3M Semi Anechoic Chamber / 1G~8G 3M Semi Anechoic Chamber / 8G~18G 3M Semi Anechoic Chamber / 18G~26G 3M Semi Anechoic Chamber / 26G~40G Remark: This uncertainty represents an expanded uncertainty expressed at approximately the 95% confidence level
+/- 1.6202
+/- 4.0606
+/- 3.9979
+/- 2.5790
+/- 2.5928
+/- 2.7212
+/- 2.9520 using a coverage factor of k=2. Page 10 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 5. FACILITIES AND ACCREDITATIONS 5.1 FACILITIES All measurement facilities used to collect the measurement data are located at No.199, Chunghsen Road, Hsintien City, Taipei Hsien, Taiwan, R.O.C. Tel: 886-2-2217-0894 / Fax: 886-2-2217-1029 Remark: The powerline conducted emissions test items was tested at Compliance Certification Services Inc.
(Hsintien Lab.) The test equipments were listed in page 9 and the test data, please refer page 76- 77. No.11, Wugong 6th Rd., Wugu Industrial Park, Taipei Hsien 248, Taiwan Tel: 886-2-2299-9720 / Fax: 886-2-2298-4045 No.81-1, Lane 210, Bade 2nd Rd., Luchu Hsiang, Taoyuan Hsien 338, Taiwan Tel: 886-3-324-0332 / Fax: 886-3-324-5235 The sites are constructed in conformance with the requirements of ANSI C63.7, ANSI C63.4 and CISPR Publication 22. 5.2 EQUIPMENT Radiated emissions are measured with one or more of the following types of linearly polarized antennas: tuned dipole, biconical, log periodic, bi-log, and/or ridged waveguide, horn. Spectrum analyzers with pre-selectors and quasi-peak detectors are used to perform radiated measurements. Conducted emissions are measured with Line Impedance Stabilization Networks and EMI Test Receivers. Calibrated wideband preamplifiers, coaxial cables, and coaxial attenuators are also used for making measurements. All receiving equipment conforms to CISPR Publication 16-1, Radio Interference Measuring Apparatus and Measurement Methods. Page 11 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 5.3 TABLE OF ACCREDITATIONS AND LISTINGS Country Agency Scope of Accreditation USA FCC 3M Semi Anechoic Chamber (FCC MRA: TW1039) to perform FCC Part 15 measurements Taiwan TAF LP0002, RTTE01, FCC Method-47 CFR Part 15 Subpart C, D, E, RSS-210, RSS-310 IDA TS SRD, AS/NZS 4268, AS/NZS 4771, TS 12.1 & 12,2, ETSI EN 300 440-1, ETSI EN 300 440-2, ETSI EN 300 328, ETSI EN 300 220-1, ETSI EN 300 220-2, ETSI EN 301 893, ETSI EN 301 489-1/3/7/17 FCC OET Bulletin 65 + Supplement C, EN 50360, EN 50361, EN 50371, RSS 102, EN 50383, EN 50385, EN 50392, IEC 62209, CNS 14958-1, CNS 14959 FCC Method 47 CFR Part 15 Subpart B IEC / EN 61000-3-2, IEC / EN 61000-3-3, IEC / EN 61000-4-2/3/4/5/6/8/11 Logo FCC MRA: TW1039 Canada Industry Canada 3M Semi Anechoic Chamber (IC 2324G-1 / IC 2324G-2) to perform IC 2324G-1 IC 2324G-2
* No part of this report may be used to claim or imply product endorsement by A2LA or any agency of the US Government. Page 12 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 6. SETUP OF EQUIPMENT UNDER TEST 6.1 SETUP CONFIGURATION OF EUT See test photographs attached in Appendix II for the actual connections between EUT and support equipment. 6.2 SUPPORT EQUIPMENT No Device Type Series No. Model Brand 1. Server Nobebook HP 2210B CNV7472KG5 FCC ID Data Cable Power Cord BSMI: R33001 Unshielded, 20m Unshielded, 1.8m DOC 2 3 4 Notebook PC ASUS M5200AE 5BN0AG019631 PD9WM3B2100 LAN Cable:
Unshielded, 10m USB Mouse GIGABYTE GK-KM6150 094425002038 FCC DoC Shielded, 1.5m N/A Notebook PC
(Remote) DELL PP19L GK102 A00 QDS-BRCM1021 LAN Cable:
Unshielded, 10m AC I/P:
Unshielded, 1.8m with a core DC O/P:
Unshielded, 1.8m AC I/P:
Unshielded, 1.8m DC O/P:
Unshielded, 1.8m with a core Remark:
1. All the equipment/cables were placed in the worst-case configuration to maximize the emission during the test. 2. Grounding was established in accordance with the manufacturers requirements and conditions for the intended use. Page 13 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 7. FCC PART 15.247 REQUIREMENTS 7.1 6DB BANDWIDTH LIMIT According to 15.247(a)(2), systems using digital modulation techniques may operate in the 902 -
928 MHz, 2400 - 2483.5 MHz, and 5725 - 5850 MHz bands. The minimum 6dB bandwidth shall be at least 500 kHz. Test Configuration EUT Spectrum Analyzer TEST PROCEDURE 1. Place the EUT on the table and set it in the transmitting mode. 2. Remove the antenna from the EUT and then connect a low loss RF cable from the antenna port to the spectrum analyzer. 3. Set the spectrum analyzer as RBW = 100 kHz, VBW = RBW, Span = 50 MHz, Sweep =
auto. 4. Mark the peak frequency and 6dB (upper and lower) frequency. 5. Repeat until all the rest channels are investigated. TEST RESULTS No non-compliance noted Page 14 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 Test Data Test mode: IEEE 802.11b mode Frequency Channel Test mode: IEEE 802.11g mode Frequency Channel
(MHz) 2412 2437 2462
(MHz) 2412 2437 2462
(MHz) 2412 2437 2462
(MHz) 2422 2437 2452 6dB Bandwidth
(MHz) 10.25 10.17 10.17 6dB Bandwidth
(MHz) 16.50 16.58 16.58
(MHz) 17.75 17.67 17.67
(MHz) 36.33 36.33 36.50 Limit
(kHz)
>500 Limit
(kHz)
>500 Limit
(kHz)
>500 Limit
(kHz)
>500 Result PASS PASS PASS Result PASS PASS PASS Result PASS PASS PASS Result PASS PASS PASS Test mode: draft 802.11n Standard-20 MHz Channel mode Frequency 6dB Bandwidth Test mode: draft 802.11n Wide-40 MHz Channel mode Frequency 6dB Bandwidth Low Mid High Low Mid High Channel Low Mid High Channel Low Mid High Page 15 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 IEEE 802.11b mode 6dB Bandwidth (CH Low) 6dB Bandwidth (CH Mid) Page 16 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 6dB Bandwidth (CH High) IEEE 802.11g mode 6dB Bandwidth (CH Low) Page 17 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 6dB Bandwidth (CH Mid) 6dB Bandwidth (CH High) Page 18 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 draft 802.11n Standard-20 MHz Channel mode 6dB Bandwidth (CH Low) 6dB Bandwidth (CH Mid) Page 19 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 6dB Bandwidth (CH High) draft 802.11n Wide-40 MHz Channel mode 6dB Bandwidth (CH Low) Page 20 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 6dB Bandwidth (CH Mid) 6dB Bandwidth (CH High) Page 21 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 7.2 PEAK POWER LIMIT The maximum peak output power of the intentional radiator shall not exceed the following:
1. According to 15.247(b)(3), for systems using digital modulation in the bands of 902-928 MHz, 2400-2483.5 MHz, and 5725-5850 MHz: 1 Watt. 2. According to 15.247(b)(4), the conducted output power limit specified in paragraph (b) of this section is based on the use of antennas with directional gains that do not exceed 6 dBi. Except as shown in paragraph (c) of this section, if transmitting antennas of directional gain greater than 6 dBi are used, the conducted output power from the intentional radiator shall be reduced below the stated values in paragraphs (b)(1), (b)(2), and (b)(3) of this section, as appropriate, by the amount in dB that the directional gain of the antenna exceeds 6 dBi. Test Configuration EUT Power Meter Power Sensor TEST PROCEDURE The transmitter output is connected to the Power Meter. The Power Meter is set to the peak power detection. TEST RESULTS No non-compliance noted Page 22 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 Test Data Output Power Test mode: IEEE 802.11b mode Output Power Channel Frequency
(MHz) 2412 Low Mid 2437 2462 High
(dBm) 14.41 14.18 13.75 Test mode: IEEE 802.11g mode Output Power Channel Frequency
(MHz) Low 2412 2437 Mid High 2462
(dBm) 22.02 21.75 21.23
(W) 0.0276 0.0262 0.0237
(W) 0.1592 0.1496 0.1327 Output Power Limit
(W) 1.00 Limit
(W) 1.00 Result PASS PASS PASS Result PASS PASS PASS Output Power Test mode: draft 802.11n Standard-20 MHz Channel mode Channel Frequency
(MHz) 2412 Low 2437 Mid High 2462
(W) 0.1493 0.1429 0.1285
(dBm) 21.74 21.55 21.09 Output Power PASS PASS PASS Limit
(W) 1.00 Result Output Power Test mode: draft 802.11n Wide-40 MHz Channel mode Channel Frequency
(MHz) 2422 Low 2437 Mid High 2452
(W) 0.1429 0.1390 0.1274
(dBm) 21.55 21.43 21.05 Output Power Limit
(W) 1.00 Result PASS PASS PASS Page 23 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 7.3 BAND EDGES MEASUREMENT LIMIT According to 15.247(d), in any 100 kHz bandwidth outside the frequency bands in which the spread spectrum intentional radiator in operating, the radio frequency power that is produced by the intentional radiator shall be at least 20 dB below that in the 100 kHz bandwidth within the band that contains the highest level of the desired power, based on either an RF conducted or a radiated measurement, provided the transmitter demonstrates compliance with the peak conducted power limits. In addition, radiated emissions which fall in the restricted bands, as defined in 15.205(a), must also comply with the radiated emission limits specified in 15.209(a) (see Section 15.205(c)). Test Configuration Antenna tower EUT 3m 4m Turntable 0.8m 1m Horn antenna Spectrum analyzer Pre-amp TEST PROCEDURE 1. The EUT is placed on a turntable, which is 0.8m above the ground plane. 2. The turntable shall be rotated for 360 degrees to determine the position of maximum emission level. the highest emission. 3. EUT is set 3m away from the receiving antenna, which is varied from 1m to 4m to find out 4. Set the spectrum analyzer in the following setting in order to capture the lower and upper band-edges of the emission:
(a) PEAK: RBW=VBW=1MHz / Sweep=AUTO
(b) AVERAGE: RBW=1MHz / VBW=10Hz / Sweep=AUTO 5. Repeat the procedures until all the PEAK and AVERAGE versus POLARIZATION are measured. TEST RESULTS Refer to attach spectrum analyzer data chart. Page 24 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 Band Edges (IEEE 802.11b mode / CH Low) Detector mode: Peak Polarity: Vertical Detector mode: Average Polarity: Vertical Page 25 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 Detector mode: Peak Polarity: Horizontal Detector mode: Average Polarity: Horizontal Page 26 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 Band Edges (IEEE 802.11b mode / CH High) Detector mode: Peak Polarity: Vertical Detector mode: Average Polarity: Vertical Page 27 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 Detector mode: Peak Polarity: Horizontal Detector mode: Average Polarity: Horizontal Page 28 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 Band Edges (IEEE 802.11g mode / CH Low) Detector mode: Peak Polarity: Vertical Detector mode: Average Polarity: Vertical Page 29 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 Detector mode: Peak Polarity: Horizontal Detector mode: Average Polarity: Horizontal Page 30 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 Band Edges (IEEE 802.11g mode / CH High) Detector mode: Peak Polarity: Vertical Detector mode: Average Polarity: Vertical Page 31 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 Detector mode: Peak Polarity: Horizontal Detector mode: Average Polarity: Horizontal Page 32 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 Band Edges (draft 802.11n Standard-20 MHz Channel mode / CH Low) Detector mode: Peak Polarity: Vertical Detector mode: Average Polarity: Vertical Page 33 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 Detector mode: Peak Polarity: Horizontal Detector mode: Average Polarity: Horizontal Page 34 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 Band Edges (draft 802.11n Standard-20 MHz Channel mode / CH High) Detector mode: Peak Polarity: Vertical Detector mode: Average Polarity: Vertical Page 35 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 Detector mode: Peak Polarity: Horizontal Detector mode: Average Polarity: Horizontal Page 36 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 Band Edges (draft 802.11n Wide-40 MHz Channel mode / CH Low) Detector mode: Peak Polarity: Vertical Detector mode: Average Polarity: Vertical Page 37 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 Detector mode: Peak Polarity: Horizontal Detector mode: Average Polarity: Horizontal Page 38 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 Band Edges (draft 802.11n Wide-40 MHz Channel mode / CH High) Detector mode: Peak Polarity: Vertical Detector mode: Average Polarity: Vertical Page 39 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 Detector mode: Peak Polarity: Horizontal Detector mode: Average Polarity: Horizontal Page 40 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 7.4 PEAK POWER SPECTRAL DENSITY LIMIT 1. According to 15.247(e), for digitally modulated systems, the power spectral density conducted from the intentional radiator to the antenna shall not be greater than 8 dBm in any 3 kHz band during any time interval of continuous transmission. 2. According to 15.247(f), the digital modulation operation of the hybrid system, with the frequency hopping turned off, shall comply with the power density requirements of paragraph (d) of this section. Test Configuration EUT Spectrum Analyzer TEST PROCEDURE 1. Place the EUT on the table and set it in transmitting mode. Remove the antenna from the EUT and then connect a low loss RF cable from the antenna port to the spectrum analyzer. 2. Set the spectrum analyzer as RBW = 3 kHz, VBW = 10 kHz, Span = 300 kHz, Sweep time = 100 s 3. Record the max reading. 4. Repeat the above procedure until the measurements for all frequencies are completed. TEST RESULTS No non-compliance noted Page 41 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 Channel Test Data Test mode: IEEE 802.11b mode PPSD
(dBm)
-17.01
-17.57
-17.73
(MHz) 2412 2437 2462 Low Mid High Frequency Channel Frequency Test mode: IEEE 802.11g mode PPSD
(dBm)
-17.56
-17.28
-17.74
(MHz) 2412 2437 2462 Low Mid High Limit
(dBm) 8.00 Limit
(dBm) 8.00 Result PASS PASS PASS Result PASS PASS PASS Test mode: draft 802.11n Standard-20 MHz Channel mode Channel Low Mid High Frequency
(MHz) 2412 2437 2462 PPSD
(dBm)
-15.99
-17.36
-17.01 Limit
(dBm) 8.00 Result PASS PASS PASS Test mode: draft 802.11n Wide-40 MHz Channel mode Channel Low Mid High Frequency
(MHz) 2422 2437 2452 PPSD
(dBm)
-17.86
-18.17
-18.35 Limit
(dBm) 8.00 Result PASS PASS PASS Page 42 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 Test Plot IEEE 802.11b mode PPSD (CH Low) PPSD (CH Mid) Page 43 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 PPSD (CH High) IEEE 802.11g mode PPSD (CH Low) Page 44 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 PPSD (CH Mid) PPSD (CH High) Page 45 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 draft 802.11n Standard-20 MHz Channel mode PPSD (CH Low) PPSD (CH Mid) Page 46 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 PPSD (CH High) draft 802.11n Wide-40 MHz Channel mode PPSD (CH Low) Page 47 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 PPSD (CH Mid) PPSD (CH High) Page 48 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 7.5 SPURIOUS EMISSIONS 7.5.1 Conducted Measurement LIMIT According to 15.247(d), in any 100 kHz bandwidth outside the frequency bands in which the spread spectrum intentional radiator in operating, the radio frequency power that is produced by the intentional radiator shall be at least 20 dB below that in the 100 kHz bandwidth within the band that contains the highest level of the desired power, based on either an RF conducted or a radiated measurement, provided the transmitter demonstrates compliance with the peak conducted power limits. In addition, radiated emissions which fall in the restricted bands, as defined in 15.205(a), must also comply with the radiated emission limits specified in 15.209(a) (see Section 15.205(c)). Test Configuration EUT Spectrum Analyzer TEST PROCEDURE Conducted RF measurements of the transmitter output were made to confirm that the EUT antenna port conducted emissions meet the specified limit and to identify any spurious signals that require further investigation or measurements on the radiated emissions site. The transmitter output is connected to the spectrum analyzer. The resolution bandwidth is set to 100 kHz. The video bandwidth is set to 100 kHz. Measurements are made over the 30MHz to 26GHz range with the transmitter set to the lowest, middle, and highest channels. TEST RESULTS No non-compliance noted Page 49 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 Test Plot IEEE 802.11b mode CH Low CH Mid Page 50 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 CH High IEEE 802.11g mode CH Low Page 51 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 Page 52 Rev. 00 CH Mid CH High Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 draft 802.11n Standard-20 MHz Channel mode CH Low CH Mid Page 53 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 CH High draft 802.11n Wide-40 MHz Channel mode CH Low Page 54 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 Page 55 Rev. 00 CH Mid CH High Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 7.6 RADIATED EMISSIONS LIMIT 1. According to 15.209(a), except as provided elsewhere in this Subpart, the emissions from an intentional radiator shall not exceed the field strength levels specified in the following table:
Frequency
(MHz) 30-88 88-216 216-960 Above 960 Field Strength
(V/m) 100*
150*
200*
500 Measurement Distance
(m) 3 3 3 3 Remark: Except as provided in paragraph (g), fundamental emissions from intentional radiators operating under this Section shall not be located in the frequency bands 54-72 MHz, 76-88 MHz, 174-216 MHz or 470-806 MHz. However, operation within these frequency bands is permitted under other sections of this Part, e.g., Sections 15.231 and 15.241. 2. In the emission table above, the tighter limit applies at the band edges. Frequency
(MHz) 30-88 88-216 216-960 Above 960 Field Strength
(V/m at 3-meter) Field Strength
(dBV/m at 3-meter) 100 150 200 500 40 43.5 46 54 Page 56 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 Test Configuration 9kHz ~ 30MHz 3m EUT Turntable 0.8m 1m Reference ground plane 30MHz ~ 1GHz EUT 3m 4m Turntable 0.8m 1m Reference ground plane Loop antenna Spectrum /
Receiver Antenna tower Bi-log antenna Spectrum analyzer Page 57 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 Above 1 GHz EUT 3m 4m Turntable 0.8m 1m Antenna tower Horn antenna Spectrum analyzer Pre-amp Page 58 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 TEST PROCEDURE 1. The EUT is placed on a turntable, which is 0.8m above ground plane. 2. The turntable shall be rotated for 360 degrees to determine the position of maximum emission level. 3. EUT is set 3m away from the receiving antenna, which is varied from 1m to 4m to find out the highest emissions. 4. Maximum procedure was performed on the six highest emissions to ensure EUT compliance. 5. And also, each emission was to be maximized by changing the polarization of receiving antenna both horizontal and vertical. 6. Set the spectrum analyzer in the following setting as:
Below 1GHz:
RBW=100kHz / VBW=300kHz / Sweep=AUTO Above 1GHz:
(a) PEAK: RBW=VBW=1MHz / Sweep=AUTO
(b) AVERAGE: RBW=1MHz / VBW=10Hz / Sweep=AUTO 7. Repeat above procedures until the measurements for all frequencies are complete. Page 59 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 TEST RESULTS Below 1GHz Operation Mode: Normal Link Temperature:
Humidity:
Frequency 25C 55% RH Ant. Pol.
(H/V)
(MHz) 59.10 159.33 319.38 639.48 880.37 959.58 159.33 240.17 319.38 639.48 696.07 799.53 Remark:
V V V V V V H H H H H H Test Date: July 9, 2010 Tested by: Ming Chen Polarity: Ver. / Hor. Correction Factor
(dB/m)
-15.90
-10.53
-8.78
-3.14
-0.71 0.44
-10.53
-11.09
-8.78
-3.14
-2.57
-1.34 Result
(dBuV/m) Limit
(dBuV/m) 35.46 39.51 40.72 40.39 41.57 43.32 37.00 43.04 42.47 43.32 42.04 39.41 40.00 43.50 46.00 46.00 46.00 46.00 43.50 46.00 46.00 46.00 46.00 46.00 Margin
(dB)
-4.54
-3.99
-5.28
-5.61
-4.43
-2.68
-6.50
-2.96
-3.53
-2.68
-3.96
-6.59 Remark QP Peak Peak Peak Peak QP QP Peak QP Peak QP QP Reading
(dBuV) 51.36 50.04 49.50 43.53 42.28 42.88 47.53 54.13 51.25 46.45 44.61 40.75 1. No emission found between lowest internal used/generated frequency to 30MHz
(9kHz~30MHz) 2. Radiated emissions measured in frequency range from 30 MHz to 1000MHz were made with an instrument using peak/quasi-peak detector mode. 3. Quasi-peak test would be performed if the peak result were greater than the quasi-peak limit or as required by the applicant. 4. Measurements above show only up to 6 maximum emissions noted, or would be lesser, with N/A remark, if no specific emissions from the EUT are recorded (ie:
margin>20dB from the applicable limit) and considered that's already beyond the background noise floor. 5. Margin (dB) = Result (dBuV/m) Limit (dBuV/m). Page 60 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 Test Date: July 12, 2010 Tested by: Ming Chen Polarity: Ver. / Hor. Result
(Average)
(dBuV/m) 98.02
---
59.86 52.58 Limit
(Peak)
(dBuV/m) 74.00 80.61 74.00 Limit
(Average)
(dBuV/m) Margin
(dB) Fundamental
-2.39
-18.16
-1.42 54.00 78.02 54.00 Remark Peak 20dBc AVG Fundamental AVG Above 1 GHz Operation Mode: TX / IEEE 802.11b / CH Low Temperature:
Humidity:
23C 51 % RH Correction Factor
(dB/m)
-2.93
-7.78
-1.17 1.18 Result
(Peak)
(dBuV/m) 100.61 51.61 62.16 55.05 Reading
(Peak)
(dBuV) 103.54 59.39 63.32 53.87 Reading
(Average)
(dBuV) 100.95
---
61.03 51.40 Frequency
(MHz) 2412.00 1606.67 3216.67 4825.00 N/A Ant.Pol.
(H/V) V V V 2412.00 1606.67 3216.67 N/A Remark:
H H H 102.82 59.75 58.72 100.24
---
57.75
-2.93
-7.78
-1.17 99.89 51.97 59.89 97.31
---
56.58 Fundamental
-2.03
-20.73 54.00 77.31 74.00 79.89 Peak 20dBc AVG Fundamental 1. Measuring frequencies from 1 GHz to the 10th harmonic of highest fundamental frequency. 2. Radiated emissions measured in frequency above 1000MHz were made with an instrument using peak/average detector mode. Average test would be performed if the peak result were greater than the average limit or as required by the applicant. 3. 4. Data of measurement within this frequency range shown --- in the table above means the reading of emissions are attenuated more than 20dB below the permissible limits or the field strength is too small to be measured. 5. Measurements above show only up to 6 maximum emissions noted, or would be lesser, with N/A remark, if no specific emissions from the EUT are recorded (ie: margin>20dB from the applicable limit) and considered that's already beyond the background noise floor. 6. Margin (dB) = Remark result (dBuV/m) Average limit (dBuV/m). 7. In any 100 kHz bandwidth outside the frequency band in which the spread spectrum or digitally modulated intentional radiator is operating, the radio frequency power that is produced by the intentional radiator shall be at least 20 dB below that in the 100 kHz bandwidth within the band that contains the highest level of the desired power, based on either an RF conducted or a radiated measurement, provided the transmitter demonstrates compliance with the peak conducted power limits. If the transmitter complies with the conducted power limits based on the use of RMS averaging over a time interval, as permitted under paragraph (b)(3) of this section, the attenuation required under this paragraph shall be 30 dB instead of 20 dB. Page 61 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 Operation Mode: TX / IEEE 802.11b / CH Mid Temperature:
Humidity:
23C 51 % RH Test Date: July 12, 2010 Tested by: Ming Chen Polarity: Ver. / Hor. Result
(Average)
(dBuV/m) 97.47
---
56.75 52.17 Limit
(Peak)
(dBuV/m) 74.00 80.59 74.00 Limit
(Average)
(dBuV/m) Margin
(dB) Fundamental
-2.08
-20.72
-1.83 54.00 77.47 54.00 Remark Peak 20dBc AVG Fundamental AVG Correction Factor
(dB/m)
-2.86
-7.62
-1.16 1.16 Result
(Peak)
(dBuV/m) 100.59 51.92 58.88 56.87
-2.85
-7.59
-1.16 1.16 96.89 50.71 51.14 50.59 94.23
---
---
---
74.00 76.89 74.00 Fundamental
-3.29
-25.75
-3.41 54.00 74.23 54.00 Peak 20dBc Peak Fundamental Peak Frequency
(MHz) 2437.00 1623.33 3250.00 4875.00 N/A Ant.Pol.
(H/V) V V V V 2437.00 1626.67 3250.00 4875.00 N/A Remark:
H H H H Reading
(Peak)
(dBuV) 103.45 59.54 60.04 55.71 99.74 58.30 52.30 49.43 Reading
(Average)
(dBuV) 100.33
---
57.91 51.01 97.08
---
---
---
1. Measuring frequencies from 1 GHz to the 10th harmonic of highest fundamental frequency. 2. Radiated emissions measured in frequency above 1000MHz were made with an instrument using peak/average detector mode. 3. Average test would be performed if the peak result were greater than the average limit or as required by the applicant. 4. Data of measurement within this frequency range shown --- in the table above means the reading of emissions are attenuated more than 20dB below the permissible limits or the field strength is too small to be measured. 5. Measurements above show only up to 6 maximum emissions noted, or would be lesser, with N/A remark, if no specific emissions from the EUT are recorded (ie: margin>20dB from the applicable limit) and considered that's already beyond the background noise floor. 6. Margin (dB) = Remark result (dBuV/m) Average limit (dBuV/m). 7. In any 100 kHz bandwidth outside the frequency band in which the spread spectrum or digitally modulated intentional radiator is operating, the radio frequency power that is produced by the intentional radiator shall be at least 20 dB below that in the 100 kHz bandwidth within the band that contains the highest level of the desired power, based on either an RF conducted or a radiated measurement, provided the transmitter demonstrates compliance with the peak conducted power limits. If the transmitter complies with the conducted power limits based on the use of RMS averaging over a time interval, as permitted under paragraph (b)(3) of this section, the attenuation required under this paragraph shall be 30 dB instead of 20 dB. Page 62 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 Operation Mode: TX / IEEE 802.11b / CH High Temperature:
Humidity:
23C 51 % RH Test Date: July 12, 2010 Tested by: Ming Chen Polarity: Ver. / Hor. Result
(Average)
(dBuV/m) 97.44
---
56.12 52.88 Limit
(Peak)
(dBuV/m) 74.00 80.10 74.00 Limit
(Average)
(dBuV/m) Margin
(dB) Fundamental
-2.06
-21.32
-1.12 54.00 77.44 54.00 Remark Peak 20dBc AVG Fundamental AVG Correction Factor
(dB/m)
-2.77
-7.47
-1.15 1.14 Result
(Peak)
(dBuV/m) 100.10 51.94 57.60 55.67
-2.78
-7.47
-1.15 96.47 51.24 50.41 93.83
---
---
Fundamental
-2.76
-26.06 54.00 73.83 74.00 76.47 Peak 20dBc Peak Fundamental Frequency
(MHz) 2462.00 1640.00 3283.33 4925.00 N/A Ant.Pol.
(H/V) V V V V 2462.00 1640.00 3283.33 N/A Remark:
H H H Reading
(Peak)
(dBuV) 102.87 59.41 58.75 54.53 99.25 58.71 51.56 Reading
(Average)
(dBuV) 100.21
---
57.27 51.74 96.61
---
---
1. Measuring frequencies from 1 GHz to the 10th harmonic of highest fundamental frequency. 2. Radiated emissions measured in frequency above 1000MHz were made with an instrument using peak/average detector mode. 3. Average test would be performed if the peak result were greater than the average limit or as required by the applicant. 4. Data of measurement within this frequency range shown --- in the table above means the reading of emissions are attenuated more than 20dB below the permissible limits or the field strength is too small to be measured. 5. Measurements above show only up to 6 maximum emissions noted, or would be lesser, with N/A remark, if no specific emissions from the EUT are recorded (ie: margin>20dB from the applicable limit) and considered that's already beyond the background noise floor. 6. Margin (dB) = Remark result (dBuV/m) Average limit (dBuV/m). 7. In any 100 kHz bandwidth outside the frequency band in which the spread spectrum or digitally modulated intentional radiator is operating, the radio frequency power that is produced by the intentional radiator shall be at least 20 dB below that in the 100 kHz bandwidth within the band that contains the highest level of the desired power, based on either an RF conducted or a radiated measurement, provided the transmitter demonstrates compliance with the peak conducted power limits. If the transmitter complies with the conducted power limits based on the use of RMS averaging over a time interval, as permitted under paragraph (b)(3) of this section, the attenuation required under this paragraph shall be 30 dB instead of 20 dB. Page 63 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 Operation Mode: TX / IEEE 802.11g / CH Low Temperature:
Humidity:
23C 51 % RH Reading
(Peak)
(dBuV) 105.17 64.19 64.05 57.33 Reading
(Average)
(dBuV) 97.15 60.08 61.02 43.78 Correction Factor
(dB/m)
-2.91
-7.78
-1.17 1.18 Result
(Peak)
(dBuV/m) 102.26 56.41 62.89 58.51 Test Date: July 12, 2010 Tested by: Ming Chen Polarity: Ver. / Hor. Result
(Average)
(dBuV/m) 94.24 52.30 59.85 44.96 Limit
(Peak)
(dBuV/m) 74.00 82.26 74.00 Limit
(Average)
(dBuV/m) Margin
(dB) Fundamental
-1.70
-14.39
-9.04 54.00 74.24 54.00 Remark AVG 20dBc AVG Fundamental AVG 105.59 65.03 59.85 50.17 96.75 60.62 56.43
---
-2.93
-7.78
-1.17 1.18 102.66 57.25 58.68 51.35 93.82 52.84 55.26
---
74.00 82.66 74.00 Fundamental
-1.16
-18.56
-2.65 54.00 73.82 54.00 AVG 20dBc AVG Fundamental Peak Frequency
(MHz) 2412.00 1606.67 3216.67 4825.00 N/A Ant.Pol.
(H/V) V V V V 2412.00 1606.67 3216.67 4825.00 N/A Remark:
H H H H 1. Measuring frequencies from 1 GHz to the 10th harmonic of highest fundamental frequency. 2. Radiated emissions measured in frequency above 1000MHz were made with an instrument using peak/average detector mode. 3. Average test would be performed if the peak result were greater than the average limit or as required by the applicant. 4. Data of measurement within this frequency range shown --- in the table above means the reading of emissions are attenuated more than 20dB below the permissible limits or the field strength is too small to be measured. 5. Measurements above show only up to 6 maximum emissions noted, or would be lesser, with N/A remark, if no specific emissions from the EUT are recorded (ie: margin>20dB from the applicable limit) and considered that's already beyond the background noise floor. 6. Margin (dB) = Remark result (dBuV/m) Average limit (dBuV/m). 7. In any 100 kHz bandwidth outside the frequency band in which the spread spectrum or digitally modulated intentional radiator is operating, the radio frequency power that is produced by the intentional radiator shall be at least 20 dB below that in the 100 kHz bandwidth within the band that contains the highest level of the desired power, based on either an RF conducted or a radiated measurement, provided the transmitter demonstrates compliance with the peak conducted power limits. If the transmitter complies with the conducted power limits based on the use of RMS averaging over a time interval, as permitted under paragraph (b)(3) of this section, the attenuation required under this paragraph shall be 30 dB instead of 20 dB. Page 64 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 Operation Mode: TX / IEEE 802.11g / CH Mid Temperature:
Humidity:
23C 51 % RH Reading
(Peak)
(dBuV) 105.53 59.54 60.85 52.30 Reading
(Average)
(dBuV) 97.15
---
58.20 48.96 Correction Factor
(dB/m)
-2.86
-7.62
-1.16 1.16 Result
(Peak)
(dBuV/m) 102.67 51.92 59.69 53.46 Test Date: July 12, 2010 Tested by: Ming Chen Polarity: Ver. / Hor. Result
(Average)
(dBuV/m) 94.29
---
57.04 50.12 Limit
(Peak)
(dBuV/m) 74.00 82.67 74.00 Limit
(Average)
(dBuV/m) Margin
(dB) Fundamental
-2.08
-17.25
-3.88 54.00 74.29 54.00 Remark Peak 20dBc AVG Fundamental AVG 99.36 59.53 53.19 96.52
---
---
-2.84
-7.62
-1.16 96.52 51.91 52.03 93.68
---
---
Fundamental
-2.09
-24.49 54.00 73.68 74.00 76.52 Peak 20dBc Peak Fundamental Frequency
(MHz) 2437.00 1623.33 3250.00 4875.00 N/A Ant.Pol.
(H/V) V V V V 2437.00 1623.33 3250.00 N/A Remark:
H H H 1. Measuring frequencies from 1 GHz to the 10th harmonic of highest fundamental frequency. 2. Radiated emissions measured in frequency above 1000MHz were made with an instrument using peak/average detector mode. 3. Average test would be performed if the peak result were greater than the average limit or as required by the applicant. 4. Data of measurement within this frequency range shown --- in the table above means the reading of emissions are attenuated more than 20dB below the permissible limits or the field strength is too small to be measured. 5. Measurements above show only up to 6 maximum emissions noted, or would be lesser, with N/A remark, if no specific emissions from the EUT are recorded (ie: margin>20dB from the applicable limit) and considered that's already beyond the background noise floor. 6. Margin (dB) = Remark result (dBuV/m) Average limit (dBuV/m). 7. In any 100 kHz bandwidth outside the frequency band in which the spread spectrum or digitally modulated intentional radiator is operating, the radio frequency power that is produced by the intentional radiator shall be at least 20 dB below that in the 100 kHz bandwidth within the band that contains the highest level of the desired power, based on either an RF conducted or a radiated measurement, provided the transmitter demonstrates compliance with the peak conducted power limits. If the transmitter complies with the conducted power limits based on the use of RMS averaging over a time interval, as permitted under paragraph (b)(3) of this section, the attenuation required under this paragraph shall be 30 dB instead of 20 dB. Page 65 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 Operation Mode: TX / IEEE 802.11g / CH High Temperature:
Humidity:
23C 51 % RH Frequency
(MHz) 2462.00 1640.00 3283.33 4925.00 N/A Ant.Pol.
(H/V) V V V V 1640.00 4941.67 N/A Remark:
H H Reading
(Peak)
(dBuV) 105.41 59.10 57.75 49.95 58.08 48.34 Reading
(Average)
(dBuV) 96.58
---
54.28
---
---
---
Correction Factor
(dB/m)
-2.77
-7.47
-1.15 1.14 Result
(Peak)
(dBuV/m) 102.64 51.63 56.60 51.10
-7.47 1.14 50.61 49.48 Test Date: July 12, 2010 Tested by: Ming Chen Polarity: Ver. / Hor. Result
(Average)
(dBuV/m) 93.81
---
53.13
---
Limit
(Peak)
(dBuV/m) 74.00 82.64 74.00 Limit
(Average)
(dBuV/m) Margin
(dB) Fundamental
-2.37
-20.68
-2.90 54.00 73.81 54.00 Remark Peak 20dBc AVG Fundamental Peak
---
---
74.00 74.00 54.00 54.00
-3.39
-4.52 Peak Peak 1. Measuring frequencies from 1 GHz to the 10th harmonic of highest fundamental frequency. 2. Radiated emissions measured in frequency above 1000MHz were made with an instrument using peak/average detector mode. 3. Average test would be performed if the peak result were greater than the average limit or as required by the applicant. 4. Data of measurement within this frequency range shown --- in the table above means the reading of emissions are attenuated more than 20dB below the permissible limits or the field strength is too small to be measured. 5. Measurements above show only up to 6 maximum emissions noted, or would be lesser, with N/A remark, if no specific emissions from the EUT are recorded (ie: margin>20dB from the applicable limit) and considered that's already beyond the background noise floor. 6. Margin (dB) = Remark result (dBuV/m) Average limit (dBuV/m). 7. In any 100 kHz bandwidth outside the frequency band in which the spread spectrum or digitally modulated intentional radiator is operating, the radio frequency power that is produced by the intentional radiator shall be at least 20 dB below that in the 100 kHz bandwidth within the band that contains the highest level of the desired power, based on either an RF conducted or a radiated measurement, provided the transmitter demonstrates compliance with the peak conducted power limits. If the transmitter complies with the conducted power limits based on the use of RMS averaging over a time interval, as permitted under paragraph (b)(3) of this section, the attenuation required under this paragraph shall be 30 dB instead of 20 dB. Page 66 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 Operation Mode: TX / draft 802.11n Standard-20 MHz Channel Temperature:
Humidity:
mode / CH Low 23C 51 % RH Reading
(Peak)
(dBuV) 105.81 59.58 65.10 50.48 Reading
(Average)
(dBuV) 96.95
---
63.82
---
Correction Factor
(dB/m)
-2.91
-7.78
-1.17 1.18 Result
(Peak)
(dBuV/m) 102.90 51.80 63.93 51.66 Result
(Average)
(dBuV/m) 94.04
---
62.65
---
Test Date: July 12, 2010 Tested by: Ming Chen Polarity: Ver. / Hor. Limit
(Peak)
(dBuV/m) 74.00 82.90 74.00 Limit Margin
(Average)
(dBuV/m)
(dB) Fundamental
-2.20
-11.39
-2.34 54.00 74.04 54.00 Remark Peak 20dBc AVG Fundamental Peak 105.12 59.75 58.10 96.08
---
55.89
-2.92
-7.78
-1.17 102.20 51.97 56.93 93.16
---
54.72 Fundamental
-2.03
-18.44 54.00 73.16 74.00 82.20 Peak 20dBc AVG Fundamental Frequency
(MHz) 2412.00 1606.67 3216.67 4816.67 N/A Ant.Pol.
(H/V) V V V V 2412.00 1606.67 3216.67 N/A Remark:
H H H 1. Measuring frequencies from 1 GHz to the 10th harmonic of highest fundamental frequency. 2. Radiated emissions measured in frequency above 1000MHz were made with an instrument using peak/average detector mode. 3. Average test would be performed if the peak result were greater than the average limit or as required by the applicant. 4. Data of measurement within this frequency range shown --- in the table above means the reading of emissions are attenuated more than 20dB below the permissible limits or the field strength is too small to be measured. 5. Measurements above show only up to 6 maximum emissions noted, or would be lesser, with N/A remark, if no specific emissions from the EUT are recorded (ie: margin>20dB from the applicable limit) and considered that's already beyond the background noise floor. 6. Margin (dB) = Remark result (dBuV/m) Average limit (dBuV/m). 7. In any 100 kHz bandwidth outside the frequency band in which the spread spectrum or digitally modulated intentional radiator is operating, the radio frequency power that is produced by the intentional radiator shall be at least 20 dB below that in the 100 kHz bandwidth within the band that contains the highest level of the desired power, based on either an RF conducted or a radiated measurement, provided the transmitter demonstrates compliance with the peak conducted power limits. If the transmitter complies with the conducted power limits based on the use of RMS averaging over a time interval, as permitted under paragraph (b)(3) of this section, the attenuation required under this paragraph shall be 30 dB instead of 20 dB. Page 67 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 Frequency
(MHz) 2437.00 1623.33 3250.00 4866.67 N/A Ant.Pol.
(H/V) V V V V 2437.00 1623.33 3250.00 N/A Remark:
H H H Operation Mode: TX / draft 802.11n Standard-20 MHz Channel Temperature:
Humidity:
mode / CH Mid 23C 51 % RH Reading
(Peak)
(dBuV) 105.82 59.54 60.30 55.66 Reading
(Average)
(dBuV) 96.01
---
57.96 40.33 Correction Factor
(dB/m)
-2.84
-7.62
-1.16 1.16 Result
(Peak)
(dBuV/m) 102.98 51.92 59.14 56.82 Result
(Average)
(dBuV/m) 93.17
---
56.80 41.49 102.84 59.57 54.32 93.61
---
51.20
-2.84
-7.62
-1.16 100.00 51.95 53.16 90.77
---
50.04 Test Date: July 12, 2010 Tested by: Ming Chen Polarity: Ver. / Hor. Limit
(Peak)
(dBuV/m) 74.00 82.98 74.00 Limit Margin
(Average)
(dBuV/m)
(dB) Fundamental
-2.08
-16.37
-12.51 54.00 73.17 54.00 Remark Peak 20dBc AVG Fundamental AVG Fundamental
-2.05
-20.73 54.00 70.77 74.00 80.00 Peak 20dBc AVG Fundamental 1. Measuring frequencies from 1 GHz to the 10th harmonic of highest fundamental frequency. 2. Radiated emissions measured in frequency above 1000MHz were made with an instrument using peak/average detector mode. 3. Average test would be performed if the peak result were greater than the average limit or as required by the applicant. 4. Data of measurement within this frequency range shown --- in the table above means the reading of emissions are attenuated more than 20dB below the permissible limits or the field strength is too small to be measured. 5. Measurements above show only up to 6 maximum emissions noted, or would be lesser, with N/A remark, if no specific emissions from the EUT are recorded (ie: margin>20dB from the applicable limit) and considered that's already beyond the background noise floor. 6. Margin (dB) = Remark result (dBuV/m) Average limit (dBuV/m). 7. In any 100 kHz bandwidth outside the frequency band in which the spread spectrum or digitally modulated intentional radiator is operating, the radio frequency power that is produced by the intentional radiator shall be at least 20 dB below that in the 100 kHz bandwidth within the band that contains the highest level of the desired power, based on either an RF conducted or a radiated measurement, provided the transmitter demonstrates compliance with the peak conducted power limits. If the transmitter complies with the conducted power limits based on the use of RMS averaging over a time interval, as permitted under paragraph (b)(3) of this section, the attenuation required under this paragraph shall be 30 dB instead of 20 dB. Page 68 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 Operation Mode: TX / draft 802.11n Standard-20 MHz Channel Temperature:
Humidity:
mode / CH High 23C 51 % RH Frequency
(MHz) 2462.00 1640.00 3283.33 4925.00 N/A Ant.Pol.
(H/V) V V V V 2462.00 1640.00 3283.33 4925.00 N/A Remark:
H H H H Reading
(Peak)
(dBuV) 105.10 59.15 58.20 53.96 Reading
(Average)
(dBuV) 96.02
---
56.32 39.00 Correction Factor
(dB/m)
-2.77
-7.47
-1.15 1.14 Result
(Peak)
(dBuV/m) 102.33 51.69 57.05 55.10 Result
(Average)
(dBuV/m) 93.25
---
55.17 40.14 101.55 58.52 52.30 50.45 92.51
---
50.10
---
-2.76
-7.47
-1.15 1.14 98.79 51.05 51.15 51.59 89.75
---
48.95
---
Test Date: July 12, 2010 Tested by: Ming Chen Polarity: Ver. / Hor. Limit
(Peak)
(dBuV/m) 74.00 82.33 74.00 74.00 78.79 74.00 Limit Margin
(Average)
(dBuV/m)
(dB) Fundamental
-2.31
-18.08
-13.86 54.00 73.25 54.00 Remark Peak 20dBc AVG Fundamental AVG Fundamental
-2.95
-20.80
-2.41 54.00 69.75 54.00 Peak 20dBc AVG Fundamental Peak 1. Measuring frequencies from 1 GHz to the 10th harmonic of highest fundamental frequency. 2. Radiated emissions measured in frequency above 1000MHz were made with an instrument using peak/average detector mode. 3. Average test would be performed if the peak result were greater than the average limit or as required by the applicant. 4. Data of measurement within this frequency range shown --- in the table above means the reading of emissions are attenuated more than 20dB below the permissible limits or the field strength is too small to be measured. 5. Measurements above show only up to 6 maximum emissions noted, or would be lesser, with N/A remark, if no specific emissions from the EUT are recorded (ie: margin>20dB from the applicable limit) and considered that's already beyond the background noise floor. 6. Margin (dB) = Remark result (dBuV/m) Average limit (dBuV/m). 7. In any 100 kHz bandwidth outside the frequency band in which the spread spectrum or digitally modulated intentional radiator is operating, the radio frequency power that is produced by the intentional radiator shall be at least 20 dB below that in the 100 kHz bandwidth within the band that contains the highest level of the desired power, based on either an RF conducted or a radiated measurement, provided the transmitter demonstrates compliance with the peak conducted power limits. If the transmitter complies with the conducted power limits based on the use of RMS averaging over a time interval, as permitted under paragraph (b)(3) of this section, the attenuation required under this paragraph shall be 30 dB instead of 20 dB. Page 69 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 Operation Mode: TX / draft 802.11n Wide-40 MHz Channel mode Temperature:
Humidity:
/ CH Low 23C 51 % RH Test Date: July 12, 2010 Tested by: Ming Chen Polarity: Ver. / Hor. Frequency
(MHz) 2422.00 1616.67 3233.33 4841.67 N/A Ant.Pol.
(H/V) V V V V 2422.00 1613.33 3233.33 N/A Remark:
H H H Reading
(Peak)
(dBuV) 104.18 59.62 62.47 50.07 Reading
(Average)
(dBuV) 95.21
---
60.55
---
Correction Factor
(dB/m)
-2.93
-7.68
-1.16 1.17 Result
(Peak)
(dBuV/m) 101.25 51.94 61.31 51.25 Result
(Average)
(dBuV/m) 92.28
---
59.39
---
100.41 59.47 55.96 90.12
---
53.25
-2.91
-7.72
-1.16 97.50 51.75 54.80 87.21
---
52.09 Limit
(Peak)
(dBuV/m) 74.00 81.25 74.00 74.00 77.50 Limit Margin
(Average)
(dBuV/m)
(dB) Fundamental
-2.06
-12.89
-2.75 54.00 72.28 54.00 Remark Peak 20dBc AVG Fundamental Peak Fundamental
-2.25
-15.12 54.00 67.21 Peak 20dBc AVG Fundamental 1. Measuring frequencies from 1 GHz to the 10th harmonic of highest fundamental frequency. 2. Radiated emissions measured in frequency above 1000MHz were made with an instrument using peak/average detector mode. 3. Average test would be performed if the peak result were greater than the average limit or as required by the applicant. 4. Data of measurement within this frequency range shown --- in the table above means the reading of emissions are attenuated more than 20dB below the permissible limits or the field strength is too small to be measured. 5. Measurements above show only up to 6 maximum emissions noted, or would be lesser, with N/A remark, if no specific emissions from the EUT are recorded (ie: margin>20dB from the applicable limit) and considered that's already beyond the background noise floor. 6. Margin (dB) = Remark result (dBuV/m) Average limit (dBuV/m). 7. In any 100 kHz bandwidth outside the frequency band in which the spread spectrum or digitally modulated intentional radiator is operating, the radio frequency power that is produced by the intentional radiator shall be at least 20 dB below that in the 100 kHz bandwidth within the band that contains the highest level of the desired power, based on either an RF conducted or a radiated measurement, provided the transmitter demonstrates compliance with the peak conducted power limits. If the transmitter complies with the conducted power limits based on the use of RMS averaging over a time interval, as permitted under paragraph (b)(3) of this section, the attenuation required under this paragraph shall be 30 dB instead of 20 dB. Page 70 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 Operation Mode: TX / draft 802.11n Wide-40 MHz Channel mode Temperature:
Humidity:
/ CH Mid 23C 51 % RH Test Date: July 12, 2010 Tested by: Ming Chen Polarity: Ver. / Hor. Frequency
(MHz) 2437.00 1623.33 3250.00 4883.33 N/A Ant.Pol.
(H/V) V V V V 2437.00 1623.33 3250.00 N/A Remark:
H H H Reading
(Peak)
(dBuV) 103.84 59.61 62.47 50.82 100.49 59.38 52.57 Reading
(Average)
(dBuV) 94.31
---
60.28
---
90.39
---
---
Correction Factor
(dB/m)
-2.86
-7.62
-1.16 1.16 Result
(Peak)
(dBuV/m) 100.98 51.99 61.31 51.98
-2.83
-7.62
-1.16 97.66 51.76 51.41 Result
(Average)
(dBuV/m) 91.45
---
59.12
---
87.56
---
---
Limit
(Peak)
(dBuV/m) 74.00 80.98 74.00 74.00 77.66 Limit Margin
(Average)
(dBuV/m)
(dB) Fundamental
-2.01
-12.33
-2.02 54.00 71.45 54.00 Remark Peak 20dBc AVG Fundamental Peak Fundamental
-2.24
-26.25 54.00 67.56 Peak 20dBc Peak Fundamental 1. Measuring frequencies from 1 GHz to the 10th harmonic of highest fundamental frequency. 2. Radiated emissions measured in frequency above 1000MHz were made with an instrument using peak/average detector mode. 3. Average test would be performed if the peak result were greater than the average limit or as required by the applicant. 4. Data of measurement within this frequency range shown --- in the table above means the reading of emissions are attenuated more than 20dB below the permissible limits or the field strength is too small to be measured. 5. Measurements above show only up to 6 maximum emissions noted, or would be lesser, with N/A remark, if no specific emissions from the EUT are recorded (ie: margin>20dB from the applicable limit) and considered that's already beyond the background noise floor. 6. Margin (dB) = Remark result (dBuV/m) Average limit (dBuV/m). 7. In any 100 kHz bandwidth outside the frequency band in which the spread spectrum or digitally modulated intentional radiator is operating, the radio frequency power that is produced by the intentional radiator shall be at least 20 dB below that in the 100 kHz bandwidth within the band that contains the highest level of the desired power, based on either an RF conducted or a radiated measurement, provided the transmitter demonstrates compliance with the peak conducted power limits. If the transmitter complies with the conducted power limits based on the use of RMS averaging over a time interval, as permitted under paragraph (b)(3) of this section, the attenuation required under this paragraph shall be 30 dB instead of 20 dB. Page 71 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 Operation Mode: TX / draft 802.11n Wide-40 MHz Channel mode Temperature:
Humidity:
/ CH High 23C 51 % RH Test Date: July 12, 2010 Tested by: Ming Chen Polarity: Ver. / Hor. Frequency
(MHz) 1633.33 3266.67 4916.67 N/A Ant.Pol.
(H/V) V V V 2452.00 1633.33 3266.67 N/A Remark:
H H H Reading
(Peak)
(dBuV) 59.35 57.20 50.48 100.03 59.30 52.35
---
53.06
---
91.08
---
---
Reading
(Average)
(dBuV) Correction Factor
(dB/m)
-7.53
-1.16 1.15 Result
(Peak)
(dBuV/m) 51.82 56.04 51.62 Result
(Average)
(dBuV/m)
---
51.90
---
88.25
---
---
Limit
(Peak)
(dBuV/m) 74.00 74.00 74.00 Limit
(Average)
(dBuV/m) 54.00 54.00 54.00 Margin
(dB)
-2.18
-2.10
-2.38 Remark Peak AVG Peak Fundamental
-2.23
-26.00 54.00 68.25 74.00 77.20 Peak 20dBc Peak Fundamental
-2.83
-7.53
-1.16 97.20 51.77 51.20 1. Measuring frequencies from 1 GHz to the 10th harmonic of highest fundamental frequency. 2. Radiated emissions measured in frequency above 1000MHz were made with an instrument using peak/average detector mode. 3. Average test would be performed if the peak result were greater than the average limit or as required by the applicant. 4. Data of measurement within this frequency range shown --- in the table above means the reading of emissions are attenuated more than 20dB below the permissible limits or the field strength is too small to be measured. 5. Measurements above show only up to 6 maximum emissions noted, or would be lesser, with N/A remark, if no specific emissions from the EUT are recorded (ie: margin>20dB from the applicable limit) and considered that's already beyond the background noise floor. 6. Margin (dB) = Remark result (dBuV/m) Average limit (dBuV/m). 7. In any 100 kHz bandwidth outside the frequency band in which the spread spectrum or digitally modulated intentional radiator is operating, the radio frequency power that is produced by the intentional radiator shall be at least 20 dB below that in the 100 kHz bandwidth within the band that contains the highest level of the desired power, based on either an RF conducted or a radiated measurement, provided the transmitter demonstrates compliance with the peak conducted power limits. If the transmitter complies with the conducted power limits based on the use of RMS averaging over a time interval, as permitted under paragraph (b)(3) of this section, the attenuation required under this paragraph shall be 30 dB instead of 20 dB. Page 72 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 7.7 POWERLINE CONDUCTED EMISSIONS LIMIT According to 15.207(a), except as shown in paragraphs (b) and (c) of this section, for an intentional radiator that is designed to be connected to the public utility (AC) power line, the radio frequency voltage that is conducted back onto the AC power line on any frequency or frequencies within the band 150 kHz to 30 MHz shall not exceed the limits in the following table, as measured using a 50 H/50 ohms line impedance stabilization network (LISN). Compliance with the provisions of this paragraph shall be based on the measurement of the radio frequency voltage between each power line and ground at the power terminal. The lower limit applies at the boundary between the frequency ranges. Frequency Range
(MHz) 0.15 to 0.50 0.50 to 5 5 to 30 Limits
(dBV) Quasi-peak 66 to 56*
56 60 Average 56 to 46*
46 50
* Decreases with the logarithm of the frequency. Test Configuration See test photographs attached in Appendix 1 for the actual connections between EUT and support equipment. TEST PROCEDURE 1. The EUT was placed on a table, which is 0.8m above ground plane. 2. Maximum procedure was performed on the six highest emissions to ensure EUT compliance. 3. Repeat above procedures until all frequency measured were complete. Page 73 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 TEST RESULTS The initial step in collecting conducted data is a spectrum analyzer peak scan of the measurement range. Significant peaks are then marked as shown on the following data page, and these signals are then quasi-peaked. Test Data Operation Mode:
Temperature:
Humidity:
June 7, 2010 Howard Pang Normal Link 20C 62% RH Test Date:
Tested by:
QP Reading
(dBuV) 31.78 29.19 27.22 31.11 30.96 28.26 28.23 26.80 29.12 30.76 27.72 26.62 Freq.
(MHz) 0.1500 1.9500 4.2300 9.5060 14.2740 18.2420 0.3100 4.2220 9.5060 14.2740 18.2420 29.2340 Remark:
AV Reading
(dBuV) 18.41 15.35 12.29 26.41 26.09 22.30 19.66 10.83 25.60 25.26 20.80 21.24 Corr. factor
(dB/m) 10.90 10.64 10.69 10.80 10.90 10.97 10.58 10.62 10.73 10.83 10.91 11.09 QP Result
(dBuV/m) AV Result
(dBuV/m) QP Limit
(dBuV) AV Limit
(dBuV) 42.68 39.83 37.91 41.91 41.86 39.23 38.81 37.42 39.85 41.59 38.63 37.71 29.31 25.99 22.98 37.21 36.99 33.27 30.24 21.45 36.33 36.09 31.71 32.33 65.99 56.00 56.00 60.00 60.00 60.00 59.97 56.00 60.00 60.00 60.00 60.00 55.99 46.00 46.00 50.00 50.00 50.00 49.97 46.00 50.00 50.00 50.00 50.00 QP Margin
(dB)
-23.31
-16.17
-18.09
-18.09
-18.14
-20.77
-21.16
-18.58
-20.15
-18.41
-21.37
-22.29 AV Margin
(dB)
-26.68
-20.01
-23.02
-12.79
-13.01
-16.73
-19.73
-24.55
-13.67
-13.91
-18.29
-17.67 Note L1 L1 L1 L1 L1 L1 L2 L2 L2 L2 L2 L2 1. Measuring frequencies from 0.15 MHz to 30MHz. 2. The emissions measured in frequency range from 0.15 MHz to 30MHz were made with an instrument using Quasi-peak detector and average detector. 3. The IF bandwidth of SPA between 0.15MHz and 30MHz was 10 kHz; the IF bandwidth of Test Receiver between 0.15MHz and 30MHz was 9 kHz;
4. L1 = Line One (Live Line) / L2 = Line Two (Neutral Line) Page 74 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 Test Plots Conducted emissions (Line 1) Conducted emissions (Line 2) Page 75 Rev. 00
1 | Test setup photos | Test Setup Photos | 389.09 KiB | July 30 2010 |
Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 APPENDIX II PHOTOGRAPHS OF TEST SETUP Conducted Emissions Setup Photos Page 79 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 Radiated Emissions Setup Photos Page 80 Rev. 00 Compliance Certification Services Inc. Report No.: T100603205-RP1 FCC ID: P27OC810 Date of Issue: July 21, 2010 Powerline Conducted Emissions Setup Photos Page 81 Rev. 00
frequency | equipment class | purpose | ||
---|---|---|---|---|
1 | 2010-07-30 | 2422 ~ 2452 | DTS - Digital Transmission System | Original Equipment |
app s | Applicant Information | |||||
---|---|---|---|---|---|---|
1 | Effective |
2010-07-30
|
||||
1 | Applicant's complete, legal business name |
Sercomm Corporation
|
||||
1 | FCC Registration Number (FRN) |
0015548027
|
||||
1 | Physical Address |
8F, No. 3-1, YuanQu St, NanKang
|
||||
1 |
Taipei, N/A
|
|||||
1 |
Taiwan
|
|||||
app s | TCB Information | |||||
1 | TCB Application Email Address |
c******@ccsemc.com
|
||||
1 | TCB Scope |
A4: UNII devices & low power transmitters using spread spectrum techniques
|
||||
app s | FCC ID | |||||
1 | Grantee Code |
P27
|
||||
1 | Equipment Product Code |
OC810
|
||||
app s | Person at the applicant's address to receive grant or for contact | |||||
1 | Name |
N**** W******
|
||||
1 | Title |
Engineer
|
||||
1 | Telephone Number |
886-2******** Extension:
|
||||
1 | Fax Number |
886-2********
|
||||
1 |
N******@SERCOMM.COM
|
|||||
app s | Technical Contact | |||||
n/a | ||||||
app s | Non Technical Contact | |||||
n/a | ||||||
app s | Confidentiality (long or short term) | |||||
1 | Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | Yes | ||||
1 | Long-Term Confidentiality Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | No | ||||
if no date is supplied, the release date will be set to 45 calendar days past the date of grant. | ||||||
app s | Cognitive Radio & Software Defined Radio, Class, etc | |||||
1 | Is this application for software defined/cognitive radio authorization? | No | ||||
1 | Equipment Class | DTS - Digital Transmission System | ||||
1 | Description of product as it is marketed: (NOTE: This text will appear below the equipment class on the grant) | Wireless Outdoor camera | ||||
1 | Related OET KnowledgeDataBase Inquiry: Is there a KDB inquiry associated with this application? | No | ||||
1 | Modular Equipment Type | Does not apply | ||||
1 | Purpose / Application is for | Original Equipment | ||||
1 | Composite Equipment: Is the equipment in this application a composite device subject to an additional equipment authorization? | No | ||||
1 | Related Equipment: Is the equipment in this application part of a system that operates with, or is marketed with, another device that requires an equipment authorization? | No | ||||
1 | Grant Comments | Power listed is conducted. The antenna(s) used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons. The antenna(s) used for this transmitter must not be collocated or operating in conjunction with any other antenna or transmitter within a host device, except in accordance with FCC multi-transmitter product procedures. End-Users must be provided with transmitter operation conditions for satisfying RF exposure compliance. | ||||
1 | Is there an equipment authorization waiver associated with this application? | No | ||||
1 | If there is an equipment authorization waiver associated with this application, has the associated waiver been approved and all information uploaded? | No | ||||
app s | Test Firm Name and Contact Information | |||||
1 | Firm Name |
Compliance Certification Services
|
||||
1 | Name |
T****** C****
|
||||
1 | Telephone Number |
510-7********
|
||||
1 | Fax Number |
510-6********
|
||||
1 |
t******@ccsemc.com
|
|||||
Equipment Specifications | |||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
1 | 1 | 15C | 2 | 2412 | 2462 | 0.159 | |||||||||||||||||||||||||||||||||||
1 | 2 | 15C | 2 | 2422 | 2452 | 0.143 |
some individual PII (Personally Identifiable Information) available on the public forms may be redacted, original source may include additional details
This product uses the FCC Data API but is not endorsed or certified by the FCC