Introduction
|
![]() ![]() |
· | Make your computer behave like a camera fully compatible with the GigE Vision and GenICam standards.
|
· | Switch between GEV 1.2 and GEV 2.0 standards.
|
· | Create and run several virtual camera objects on one computer host.
|
· | Perform the development and testing of a client GigE Vision application while an actual camera is not available.
|
· | Stream individual images or video sequences to a remote computer and receive them with standard GigE Vision software.
|
· | Utilize 1 Gbit and 10 Gbit network equipment.
|
· | Extend your throughput by using several network connections in parallel.
|
· | Stream GigE Vision video over Wi-Fi network.
|
· | Assign arbitrary IP and MAC addresses to your virtual cameras.
|
· | Transmit video data from each of your virtual cameras to multiple computers on the network in the multicast mode or by utilizing several stream channels.
|
· | Convert an RGB color video to Bayer raw or YUV format to reduce the image payload size.
|
· | Select from dozens of monochrome and color pixel formats including packed ones.
|
· | Automatically compress outgoing image frames by utilizing built-in JPEG and H.264 encoders.
|
· | Add GenICam-compatible features to your virtual camera and control them from remote computers.
|
· | Integrate chunk data into each frame and associate them with GenICam chunk features.
|
· | Send data events from the virtual camera to remote clients on the message channel.
|
· | Receive action commands and scheduled action commands in accordance with IEEE 1588 Precision Time Protocol.
|
· | Select generated patterns, static images (bmp, jpeg, tif) and AVI files as the video source.
|
· | Convert cameras of standard types (analog, USB, 1394, CameraLink) into virtual GigE Vision cameras.
|
· | Implement distributed image processing on several computers in the parallel or/and sequential modes.
|
· | Prototype the development of a GigE Vision camera.
|
· | Adjust the interpacket delay as well as camera response timing.
|
· | Simulate rigorous network conditions by disordering and skipping UDP packets.
|