drilling machine,machine drilling,drilling and milling machine Jiangsu Bestech Industrial Co., Ltd. , https://www.jsbestmachine.com
What are the operating modes of network camera monitoring
Generally speaking, the network camera monitoring runs around four modes, namely, gateway mode, bridge mode, bypass mode, and listening mode. This article will briefly introduce these four operation modes and their principles:
Gateway mode
The principle is to use this machine as a gateway for other computers (the video surveillance is set to the machine by the computer's default gateway), which can be used as a single network card method, a dual network card or even a multiple network card method. The original PROXY mode is basically eliminated at present. Adopted, the NAT store-and-forward method is commonly used at present; simplistically speaking, it works like a router; therefore, the control is extremely strong, but because of the store-and-forward method, the function is somewhat lost; but the efficiency is better; the drawback is If the gateway dies, the entire network is paralyzed;
Bridge mode
The principle is that the dual network card is made into a transparent bridge, and the bridge works at the second layer, so it can be simply understood as the bridge is a network cable, so the function is * with almost no loss; WINDCAP itself does not support this mode; this mode can be said It ’s * ideal, even if the bridge is broken, just simply make a jumper. Since the bridge is transparent, it can be regarded as a network cable. Even if the bridge is broken, it can be understood that the network cable is broken for another one; it supports multiple VLANs, Wireless, thousands of million, and VPN, multi-exit, etc. almost all network conditions, the reason is very simple, because the transparent bridge is understood as that is just a network cable;
Bypass mode
The principle is to use ARP technology to establish a virtual gateway, which can only be suitable for small network monitoring, and there must not be a limited bypass mode in the environment; restrictions on routing or fire walls, or the supervised computer installing an ARP fire wall will cause the bypass to fail, because you While bypassing while forbidden, it is being bypassed, so it is self-contradictory; at the same time, multiple bypasses in the network at the same time will cause confusion and interrupt the network; but as long as the premise is that the method is * simple deployment and * convenient installation settings;
Listening mode
The principle is to bypass listening, as if there is a parallel machine listening to two people, so the efficiency is very low. This mode needs to use shared HUB or switch mirroring; however, the use of old-style shared HUB will affect Network exit function; if the mirror mode is adopted, on the one hand, investment is required to support bidirectional mirror switch equipment, and on the other hand, professional personnel are required to set up mirror switches, but some switches may block or reduce network functions during the blocking process; The problem is that the function is lost; the principle defect of the listening mode can not achieve UDP blocking perfectly, and it will severely lose the bandwidth of the webcam, and it cannot achieve good functions such as traffic restrictions; generally, it will lose at least 40% Network function; and WINSCAP works in this mode. Because of this, no matter the function, it basically determines the defects generated.