Video servers (IP transmission) Comparison: VIVOTEK, LILIN (4)
Contact manufacturer | Contact | Contact | Contact | Contact |
Video Inputs |
1
|
4
|
CVBS 1.0 V
|
1
|
Audio Input |
✔
|
--
|
✔
|
✔
|
Compression Type |
H.264/M-JPEG
|
--
|
H.264/M-JPEG
|
H.264/M-JPEG
|
Network Protocols |
IPv4, IPv6, TCP/IP, HTTP, HTTPS, UPnP, RTSP/RTP/RTCP, IGMP, SMTP, FTP, DHCP, NTP, DNS, DDNS, PPPoE, CoS, QoS, SNMP, 802.1X
|
--
|
RTP/HTTP, RTP/TCP, RTP/UDP
|
RTP/HTTP, RTP/TCP, RTP/UDP
|
Interface |
10Base-T/100 BaseTX Ethernet (RJ-45)
|
--
|
--
|
10Mbps / 100Mbps , RJ-45
|
Resolution TVL |
720 x 480
|
--
|
960 x 480
|
960 x 480
|
Image per second (IPS) |
30 fps
|
--
|
--
|
30 / 25
|
Control |
PTZ
|
--
|
--
|
RS-485
|
Web Browser |
Mozilla Firefox 7~10, Google Chrome, Safari (streaming only) Internet Explorer 7.x or 8.x or 9.x
|
--
|
Windows Internet Explorer 6, 7, 8
|
Windows Internet Explorer 6, 7, 8
|
System Requirements |
Microsoft Windows XP/Vista/7/2000
|
--
|
--
|
Windows 2000, XP, Vista, 7
|
Data Input |
--
|
✔
|
--
|
--
|
Bandwidth MHz |
--
|
--
|
--
|
128 Kbps ~ 3 Mbps
|
Related Videos
VIVOTEK's VORTEX helps AVS cut false alarms by 90% and boosts MINI of Portland's efficiency
OPTEX LiDAR: What sort of applications will LiDAR be used in?
Cisco ISE interoperability with ALE solutions
Latest Video server (IP transmission) case studies
The IP-based video surveillance system consists of a LILIN NVR recorder, HD video decoder, VMS software, and IP cameras Background Tenaga Nasional Berhad (TNB)...
Background Wangke Corporation selected LILIN cameras and NVRs to provide security at the Beijing ZhongLiang WanKe shopping mall and entertainment centre in Beijing, China. Beijin...
Background Melli Bank is among the largest banks in Islamic world. There are more than 200 branches in the province of Khorasan alone. Prior to August 2010, the management adopte...
5 surprising findings from OT vulnerability assessments
DownloadThe 2024 state of physical access trend report
DownloadGuide for HAAS: New choice of SMB security system
DownloadSecurity practices for hotels
DownloadThe security challenges of data centers
Download