Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Section


Column
width50%


Panel
borderColor#CCCCCC
bgColor#FFFFFF
titleBGColor#F0F0F0
borderStylesolid
titleOn the page:
Table of Contents



Column


Purpose and structure of the

...

guide

Administrator's Guide is a reference and information guide intended for system administrators, installation and configuration specialists, and users with administrative rights to digital video surveillance and audio monitoring systems created on the basis of Axxon PSIM.

This guide contains the following materials:

  1. General characteristics of Axxon PSIM.
  2. Hardware and software requirements for digital video surveillance and audio monitoring systems.
  3. Installation and configuration procedure for digital video surveillance and audio monitoring system components.
  4. Description of the administration interface.
  5. Description of administration functions and their use cases.
  6. Recommendations for setting up and operating digital video surveillance and audio monitoring systems.
  7. Appendices containing additional (extended) information about the components of Axxon PSIM and digital video surveillance and audio monitoring systems.

Purpose of Axxon PSIM

Axxon PSIM is designed to create industrial, scalable, flexible, and adaptable integrated security systems based on Axxon PSIM™ software is designed for the deployment of industrial scalable, flexible (adjustable) integrated security systems, based on the digital video surveillance and audio monitoring systems.

Axxon PSIM™ software possesses PSIM has the following basic features:

  1. Integration of digital video surveillance and audio monitoring systems with the existing data systems, various security equipment, and auxiliary software of other developers, from third-party developers using integrated open interfaces of the data exchange.
  2. Compatibility with diverse security devices and data systems, in particular, with the fire and security alarm and access control systems, video surveillance cameras, data analysis systems, and systems for recognition of objects (events) and identification by their images.
  3. Single-source registration and processing of events, generation of notifications and controlling response in compliance with the flexibly modified logics.
  4. Ultimately unlimited capabilities for scaling, solution -specific adjustments, re-distribution and redistribution of resources with changes in the number or quality of tasks in monitoring protected facilities and operating various equipment.

...

Recommendations for using Axxon PSIM

...

Functional facilities of Axxon PSIM software complex are based on logical cooperation of objects. Common data about ways of setting up the logical interrelation is given in the table.

...

Ways of setting up the logical interrelation

...

Description

...

Realization

...

Example

...

Objects settings panels

...

Base setting of system objects interrelation

...

Is realized with the use of system objects functionality – see Administrator's Guide

...

Setting up the video signal displaying in Monitor interface window

...

Macros

...

Setting up simple interrelations among objects which functionalities do not allow to carry out the required operations

...

Is realized with the use of Macros object functionality – see Administrator's Guide

...

Setting of enabling the additional executive relay with ray closed

...

Program

...

Setting up complex interactions among objects, when Macro object functionality does not allow to carry out the required operations

...

Is realized on the basis of Program object as a code on the embedded Axxon PSIM program language – see The Script object. Programming using the JScript language

...

It is necessary to return the cameras to the reference position and make a frame

...

Script

...

Is realized on the basis of Script object as a code on embedded JScript language – see The Script object. Programming using the JScript language

We recommend using Axxon PSIM as a basic software environment for industrial distributed integrated security systems and automated control systems at large, multifaceted facilities with a large number of monitored positions and a wide range of monitored parameters.

Licensing of Axxon PSIM

Licensing of Axxon PSIM is implemented through hardware and software protection.

Axxon PSIM

Purpose and structure of the guide

Documentation for the Axxon PSIM™ intelligent video surveillance system, Video surveillance and audio monitoring Administrator Guide is a reference and information handbook on programming on embedded Axxon PSIM software language, which is designed for system administrators, installation and configuration technicians, users with administrator rights to the digital video surveillance and audio monitoring systems, developed on the basis of Axxon PSIM™ software.

Programming in the Axxon PSIM™ enables system control by setting up complex logical interactions among objects. This guide contains the following materials:

  1. Software programming;
  2. Description of embedded program language syntax;
  3. Examples of program on the embedded language.

License method of the Axxon PSIM™ software

Licensing of the Axxon PSIM™ software is performed by means of software and program protection.

The Axxon PSIM™ software protection is built on one of the following components:

  1. dallas
  2. -
  3. codes of
  4. video capture cards’ cryptochips (FS-5B, FS-6C, FS-8, FS-16(Exp), WS-7, WS-17)
  5. the cryptochips of video capture cards;
  6. dallas
  7. -
  8. codes of the
  9. electronic hardware security key «Guardant»;dallas-codes of the electronic hardware security key «MatrixLock»
  10. Guardant or MatrixLock electronic keys of hardware security;
  11. codes of HID devices (hardware id).

The key file, connecting the software protection with program modules, belongs to the program protection part. A list of available for using functional program software component of the security system includes an activation key that links the security hardware with the software modules. The list of available software modules depends on the configuration of security system’s delivery security system's configuration and is registered specified in the activation key file.

While extending When you expand the system configuration (for example while installing , when you install a new functional subsystem) for activating the program module functionality, , in order to activate the functions of the software module corresponding to the subsystem being installed subsystem, in you must replace the previous key file has to be changed by activation key with a new one , which that will regulate the updated system functionality will be regulated with.functional capabilities of the system.

When you use a distributed architecture, a single activation key While using the distributed architecture a single key file is used for all the computers of in the system.

Note
titleAttention!
If the

When you replace a video capture card

is changed

, its dallas

-

codes

are changed too

change, so you must replace the

previous key file should be respectively changed by

old activation key with a new one.

While using the

When you use a distributed architecture, the activation key

file should

must be

changed

replaced on all

the

computers

of

in the system.