Home > ADDER > Extender > AdderView DDX CAM Manual

AdderView DDX CAM Manual

    Download as PDF Print this page Share this page

    Have a look at the manual AdderView DDX CAM Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 78 ADDER manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							40
    INSTALLATION
    CONFIGURATION
    OPERATION
    FURTHERINFORMATION
    INDEX
    APPENDIX 1 - LINK CABLE INTERFERENCE PROTECTION
     Name  Overall Screening  Pair Shielding
     U/UTP û	û
     F/UTP ü û
     U/FTP û	ü
     S/FTP ü ü	
    	or S/STP 
     or PiMF
    U/UTP
    F/UTP
    U/FTP
    S/FTP 
    S/STP 
    PiMF
    Pair shielding
    Overall screening
    Outer sheath
    General cable anatomy
    Overall screening
    Pair shielding
    Twisted Pair
    While the Category rating (e.g. CAT 5e, CAT 6a, CAT 7, etc.) 
    determines the electrical performance of a cable, another vital part 
    of the overall cable specification is its protection from interference. 
    As cabling distances and data rates increase, so too does the 
    susceptibility to interference, from both external and internal 
    sources. 
    Proximity to other electromagnetic sources are the main external 
    threat and these can be subdued using overall screening that 
    surrounds all four of the cable pairs. However, interference is also 
    possible from neighbouring twisted pairs within the same cable 
    and this can be just as hazardous to data integrity. Such crosstalk is 
    countered by shielding each cable pair separately. 
    Within each Category rating, you can specify different 
    combinations of external screening and internal shielding to suit 
    the environment into which the link is being placed. 
    Interference protection codes
    Interference protection is classified in the following manner:
    U/UTP
    where
    U = unshielded
    F = foil shielding
    S = braided shielding
    PiMF = Pairs in Metal Foil
    Note: Do not use unshielded 
    cables with the DDX modules.   
    						
    							41
    INSTALLATION
    CONFIGURATION
    OPERATION
    FURTHERINFORMATION
    INDEX
    APPENDIX 2 - FIRMWARE UPGRADES FOR  
    BASIC EXTENDER INSTALLATIONS
    Extender systems (or individual DDX-USR units) can be upgraded using a USB stick if 
    required. This is carried out as follows:
    1 Connect the DDX-USR to a compatible display and keyboard; optionally connect to a 
    DDX-CAM module using a Shielded CAT6a or CAT7 data cable to upgrade it at the 
    same time.
    2 On the DDX-USR unit, insert a FAT32-formatted USB stick containing the extender 
    firmware upgrade file into one of the front USB ports. Note: The extender firmware 
    upgrade file must be in the root folder. 
    3 Apply power to the DDX-USR unit and DDX-CAM modules. 
     IMPORTANT: Ensure power remains uninterrupted throughout the upgrade process.
    4 Press-and-hold the recessed reset button for ten seconds until the PWR indicator 
    begins to flash quickly, then release the reset button.
    5 When prompted, type in the name of the extender firmware upgrade file and press 
    Enter. 
    6 Type Y or N as appropriate, when asked if an attached (DDX-CAM) transmitter unit 
    should also be upgraded.
    7 The display will show the upgrade progress and confirmation message.
    8 If successful the DDX-USR and DDX-CAM modules will automatically be rebooted 
    and the USB stick can be removed.
    APPENDIX 3 - GPL LICENSE
    This product includes binaries that are derived from the open source community. The 
    modules listed below are licenced under the GNU General Public License v2 and must 
    be provided, in source form, on request:
    • u-boot
    • linux-arm-freescale
    • busybox
    • termcap
    • iproute
    • hotplug
    • udev
    • kobs-ng
    • freetype
    • i2c-tools
    This product includes binaries that are derived from the open source community. The 
    modules listed below are licenced under the GNU Lesser General Public License v2.1 
    and must be provided, in source form, on request:
    • libconfig
    • directfb
    • libdaemon
    • nss-mdns
    • avahi
    In addition to the GPL modules listed, this product also includes binaries derived from 
    3rd party open sources that have their own license requirements. Each module is listed 
    below with their required copyright statement and distribution conditions.
    Module: iperf
    “iperf, Copyright (c) 2014-2016, The Regents of the University of California, through 
    Lawrence Berkeley National Laboratory (subject to receipt of any required approvals 
    from the U.S. Dept. of Energy).  All rights reserved.”
    Redistribution and use in source and binary forms, with or without 
    modification, are permitted provided that the following conditions are met:
    (1) Redistributions of source code must retain the above copyright notice, this 
    list of conditions and the following disclaimer.
    (2) Redistributions in binary form must reproduce the above copyright notice, 
    this list of conditions and the following disclaimer in the documentation and/ 
    or other materials provided with the distribution.
    (3) Neither the name of the University of California, Lawrence Berkeley 
    National Laboratory, U.S. Dept. of Energy nor the names of its contributors may 
    be used to endorse or promote products derived from this software without 
    specific prior written permission.
    THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND 
    CONTRIBUTORS “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES, 
    INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF 
    MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.    
    						
    							42
    INSTALLATION
    CONFIGURATION
    OPERATION
    FURTHERINFORMATION
    INDEX
    IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE 
    LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, 
    OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, 
    PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, 
    OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 
    THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 
    (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF 
    THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH 
    DAMAGE.
    You are under no obligation whatsoever to provide any bug fixes, patches, or upgrades 
    to the features, functionality or performance of the source code (“Enhancements”) to 
    anyone; however, if you choose to make your Enhancements available either publicly, or 
    directly to Lawrence Berkeley National Laboratory, without imposing a separate written 
    license agreement for such Enhancements, then you hereby grant the following license: a  
    non-exclusive, royalty-free perpetual license to install, use, modify, prepare derivative 
    works, incorporate into other computer software, distribute, and sublicense such 
    enhancements or derivative works thereof, in binary and source code form. 
    ====
    This software contains source code (src/cjson.{c,h}) that is:
    Copyright (c) 2009 Dave Gamble
    Permission is hereby granted, free of charge, to any person obtaining a copy of this 
    software and associated documentation files (the “Software”), to deal in the Software 
    without restriction, including without limitation the rights to use, copy, modify, merge, 
    publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons 
    to whom the Software is furnished to do so, subject to the following conditions:
    The above copyright notice and this permission notice shall be included in all copies or 
    substantial portions of the Software.
    THE SOFTWARE IS PROVIDED “AS IS”, WITHOUT WARRANTY OF ANY KIND, 
    EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES 
    OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND 
    NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT 
    HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER 
    IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF 
    OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS 
    IN THE  SOFTWARE. 
    ==== 
    This software contains source code (src/net.{c,h}) that is:
    This software was developed as part of a project at MIT.
    Copyright (c) 2005-2007 Russ Cox, Massachusetts Institute of Technology
    Permission is hereby granted, free of charge, to any person obtaining a copy of this 
    software and associated documentation files (the “Software”), to deal in the Software 
    without restriction, including without limitation the rights to use, copy, modify, merge, 
    publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons 
    to whom the Software is furnished to do so, subject to the following conditions:
    The above copyright notice and this permission notice shall be included in all copies or 
    substantial portions of the Software.
    THE SOFTWARE IS PROVIDED “AS IS”, WITHOUT WARRANTY OF ANY KIND, 
    EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES 
    OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND 
    NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT 
    HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER 
    IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF 
    OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS 
    IN THE  SOFTWARE. 
     
    ==== 
    Contains parts of an earlier library that has:
    The authors of this software are Rob Pike, Sape Mullender, and Russ Cox
    Copyright (c) 2003 by Lucent Technologies.
    Permission to use, copy, modify, and distribute this software for any purpose without fee 
    is hereby granted, provided that this entire notice is included in all copies of any software 
    which is or includes a copy or modification of this software and in all copies of the 
    supporting documentation for such software.
    THIS SOFTWARE IS BEING PROVIDED “AS IS”, WITHOUT ANY EXPRESS OR 
    IMPLIED WARRANTY.  IN PARTICULAR, NEITHER THE AUTHORS NOR LUCENT 
    TECHNOLOGIES MAKE ANY REPRESENTATION OR WARRANTY OF ANY KIND 
    CONCERNING THE MERCHANTABILITY OF THIS SOFTWARE OR ITS FITNESS FOR 
    ANY PARTICULAR PURPOSE.    
    						
    							43
    INSTALLATION
    CONFIGURATION
    OPERATION
    FURTHERINFORMATION
    INDEX
    ===== 
    This software contains source code (src/queue.h) that is:
    Copyright (c) 1991, 1993
    The Regents of the University of California.  All rights reserved.
    Redistribution and use in source and binary forms, with or without modification, are 
    permitted provided that the following conditions are met:
    1. Redistributions of source code must retain the above copyright notice, this list of 
    conditions and the following disclaimer.
    2. Redistributions in binary form must reproduce the above copyright notice, this list of 
    conditions and the following disclaimer in the documentation and/or other materials 
    provided with the distribution.
    3. Neither the name of the University nor the names of its contributors may be used to 
    endorse or promote products derived from this software without specific prior written 
    permission.
    THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS’’ 
    AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED 
    TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A 
    PARTICULAR PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR 
    CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, 
    EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED 
    TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, 
    OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 
    THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 
    (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF 
    THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH 
    DAMAGE.
    @(#)queue.h     8.5 (Berkeley) 8/20/94
    ===== 
    This software contains source code (src/tcp_window_size.{c,h}) that is: 
    --------------------------------------------------------------- 
    Copyright (c) 1999,2000,2001,2002,2003 
    The Board of Trustees of the University of Illinois 
    All Rights Reserved. 
    --------------------------------------------------------------- 
    Permission is hereby granted, free of charge, to any person obtaining a copy of this 
    software (Iperf) and associated documentation files (the “Software”), to deal in the 
    Software without restriction, including without limitation the rights to use, copy, modify, 
    merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit 
    persons to whom the Software is furnished to do so, subject to the following conditions:
    Redistributions of source code must retain the above copyright notice, this list of 
    conditions and the following disclaimers. 
    Redistributions in binary form must reproduce the above copyright notice, this list of 
    conditions and the following disclaimers in the documentation and/or other materials 
    provided with the distribution.
    Neither the names of the University of Illinois, NCSA, nor the names of its contributors 
    may be used to endorse or promote products derived from this Software without 
    specific prior written permission.
    THE SOFTWARE IS PROVIDED “AS IS”, WITHOUT WARRANTY OF ANY 
    KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE 
    WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE 
    AND NONINFRINGEMENT. IN NO EVENT SHALL THE CONTRIBUTORS OR 
    COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER 
    LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, 
    ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE 
    USE OR OTHER DEALINGS IN THE SOFTWARE. 
    ________________________________________________________________ 
    National Laboratory for Applied Network Research 
    National Center for Supercomputing Applications 
    University of Illinois at Urbana-Champaign 
    http://www.ncsa.uiuc.edu 
    ________________________________________________________________ 
    tcp_window_size.c 
    by Mark Gates  
    ------------------------------------------------------------------- 
    set/getsockopt 
    -------------------------------------------------------------------  
     
    ===== 
    This software contains source code (src/units.{c.h}) that is: 
    --------------------------------------------------------------- 
    Copyright (c) 1999,2000,2001,2002,2003 
    The Board of Trustees of the University of Illinois 
    All Rights Reserved. 
    --------------------------------------------------------------- 
    Permission is hereby granted, free of charge, to any person obtaining a copy of this 
    software (Iperf) and associated documentation files (the “Software”), to deal in the 
    Software without restriction, including without limitation the rights to use, copy, modify, 
    merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit 
    persons to whom the Software is furnished to do so, subject to the following conditions: 
    Redistributions of source code must retain the above copyright notice, this list of 
    conditions and the following disclaimers.  
    Redistributions in binary form must reproduce the above copyright notice, this list of 
    conditions and the following disclaimers in the documentation and/or other materials 
    provided with the distribution.    
    						
    							44
    INSTALLATION
    CONFIGURATION
    OPERATION
    FURTHERINFORMATION
    INDEX
    Neither the names of the University of Illinois, NCSA, nor the names of its contributors 
    may be used to endorse or promote products derived from this Software without 
    specific prior written permission.
    THE SOFTWARE IS PROVIDED “AS IS”, WITHOUT WARRANTY OF ANY KIND, 
    EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES 
    OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND 
    NONINFRINGEMENT. IN NO EVENT SHALL THE CONTIBUTORS OR COPYRIGHT 
    HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER 
    IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF 
    OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS 
    IN THE  SOFTWARE. 
    ________________________________________________________________ 
    National Laboratory for Applied Network Research 
    National Center for Supercomputing Applications 
    University of Illinois at Urbana-Champaign 
    http://www.ncsa.uiuc.edu 
    ________________________________________________________________ 
    stdio.c 
    by Mark Gates  
    and Ajay Tirumalla  
    ------------------------------------------------------------------- 
    input and output numbers, converting with kilo, mega, giga 
    -------------------------------------------------------------------
    ===== 
    This software contains source code (src/portable_endian.h) that is: 
    // “License”: Public Domain 
    // I, Mathias Panzenböck, place this file hereby into the public domain. Use it at your own 
    risk for whatever you like. 
     
    ===== 
    Module: openssl 
     
    LICENSE ISSUES 
    ============== 
    The OpenSSL toolkit stays under a dual license, i.e. both the conditions of the OpenSSL 
    License and the original SSLeay license apply to the toolkit. See below for the actual 
    license texts. Actually both licenses are BSD-style Open Source licenses. In case of any 
    license issues related to OpenSSL please contact [email protected]. 
    OpenSSL License 
    ============================================================= 
    Copyright (c) 1998-2011 The OpenSSL Project.  All rights reserved.
    Redistribution and use in source and binary forms, with or without modification, are 
    permitted provided that the following conditions are met:
    1. Redistributions of source code must retain the above copyright notice, this list of 
    conditions and the following disclaimer.
    2. Redistributions in binary form must reproduce the above copyright notice, this list of 
    conditions and the following disclaimer in the documentation and/or other materials 
    provided with the distribution.
    3. All advertising materials mentioning features or use of this software must display the 
    following acknowledgment: 
    “This product includes software developed by the OpenSSL Project for use in the 
    OpenSSL Toolkit.  (http://www.openssl.org/)”
    4. The names “OpenSSL Toolkit” and “OpenSSL Project” must not be used to endorse 
    or promote products derived from this software without prior written permission. For 
    written permission, please contact
    [email protected].
    5. Products derived from this software may not be called “OpenSSL” nor may “OpenSSL” 
    appear in their names without prior written permission of the OpenSSL Project.
    6. Redistributions of any form whatsoever must retain the following acknowledgment: 
    “This product includes software developed by the OpenSSL Project for use in the 
    OpenSSL Toolkit  (http://www.openssl.org/)”
    THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS’’ AND ANY 
    EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 
    IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 
    PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS 
    CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, 
    EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED 
    TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, 
    OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 
    THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 
    (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF 
    THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH 
    DAMAGE. 
    ============================================================   
    						
    							45
    INSTALLATION
    CONFIGURATION
    OPERATION
    FURTHERINFORMATION
    INDEX
    This product includes cryptographic software written by Eric Young (eay@cryptsoft.
    com). This product includes software written by Tim Hudson ([email protected]).
    Original SSLeay License 
    Copyright (C) 1995-1998 Eric Young ([email protected]) 
    All rights reserved.
    This package is an SSL implementation written by Eric Young ([email protected]). 
    The implementation was written so as to conform with Netscapes SSL.
    This library is free for commercial and non-commercial use as long as the following 
    conditions are aheared to.  The following conditions apply to all code found in this 
    distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code.  The SSL 
    documentation included with this distribution is covered by the same copyright terms 
    except that the holder is Tim Hudson ([email protected]).
    Copyright remains Eric Young’s, and as such any Copyright notices in the code are not to 
    be removed. If this package is used in a product, Eric Young should be given attribution 
    as the author of the parts of the library used. This can be in the form of a textual 
    message at program startup or in documentation (online or textual) provided with the 
    package. 
    Redistribution and use in source and binary forms, with or without modification, are 
    permitted provided that the following conditions are met: 
    1. Redistributions of source code must retain the copyright notice, this list of conditions 
    and the following disclaimer.
    2. Redistributions in binary form must reproduce the above copyright notice, this list of 
    conditions and the following disclaimer in the documentation and/or other materials 
    provided with the distribution.
    3. All advertising materials mentioning features or use of this software must display the 
    following acknowledgement: 
    “This product includes cryptographic software written by Eric Young (eay@cryptsoft.
    com)” The word ‘cryptographic’ can be left out if the routines from the library being 
    used are not cryptographic related :-). 
    4. If you include any Windows specific code (or a derivative thereof) from the apps 
    directory (application code) you must include an acknowledgement:  
    “This product includes software written by Tim Hudson ([email protected])” 
    THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS’’ AND ANY EXPRESS 
    OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED 
    WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 
    ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS 
    BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, 
    OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, 
    PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, 
    OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 
    THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 
    (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF 
    THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH 
    DAMAGE.
    The licence and distribution terms for any publically available version or derivative of this 
    code cannot be changed.  i.e. this code cannot simply be copied and put under another 
    distribution licence [including the GNU Public Licence.] 
     
    Module: libupnp 
    Copyright (c) 2000-2003 Intel Corporation 
    All rights reserved.
    Redistribution and use in source and binary forms, with or without 
    modification, are permitted provided that the following conditions are met:
    • Redistributions of source code must retain the above copyright notice, this list of 
    conditions and the following disclaimer.
    • Redistributions in binary form must reproduce the above copyright notice, this list of 
    conditions and the following disclaimer in the documentation and/or other materials 
    provided with the distribution.
    • Neither name of Intel Corporation nor the names of its contributors may be used 
    to endorse or promote products derived from this software without specific prior 
    written permission.
    THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND 
    CONTRIBUTORS ``AS IS’’ AND ANY EXPRESS OR IMPLIED WARRANTIES, 
    INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF 
    MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. 
    IN NO EVENT SHALL INTEL OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, 
    INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES 
    (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 
    OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 
    HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 
    CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR 
    OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN 
    IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
    Module: tzdata
    Original TZdata  License
    This is the Debian prepackaged version of the Time Zone and Daylight Saving Time Data.
    It was downloaded from http://www.iana.org/time-zones
    Upstream Author: The Internet Assigned Numbers Authority (IANA) Commentary 
    should be addressed to [email protected]
    Copyright: This database is in the public domain.    
    						
    							46
    INSTALLATION
    CONFIGURATION
    OPERATION
    FURTHERINFORMATION
    INDEX
    WARRANTY
    Adder Technology Ltd warrants that this product shall be free from defects in 
    workmanship and materials for a period of two years from the date of original purchase. 
    If the product should fail to operate correctly in normal use during the warranty period, 
    Adder will replace or repair it free of charge. No liability can be accepted for damage due 
    to misuse or circumstances outside Adder’s control. Also Adder will not be responsible 
    for any loss, damage or injury arising directly or indirectly from the use of this product. 
    Adder’s total liability under the terms of this warranty shall in all circumstances be 
    limited to the replacement value of this product.
    If any difficulty is experienced in the installation or use of this product that you are 
    unable to resolve, please see the Getting assistance section.
    SAFETY INFORMATION
    • For use in dry, oil free indoor environments only.
    • Warning - live parts contained within power adapter(s).
    • No user serviceable parts within power adapter(s) - do not dismantle.
    • Plug the power adapter(s) into socket outlets close to the module that they are 
    powering.
    • Do not use an unearthed power socket or extension cable.
    • Do not use a power adapter if its case becomes damaged, cracked or broken or if you 
    suspect that it is not operating properly.
    • Replace the power adapter(s) with a manufacturer approved type only. 
    • If you use a power extension cord with the module, make sure the total ampere rating 
    of the devices plugged into the extension cord does not exceed the cord’s ampere 
    rating. Also, make sure that the total ampere rating of all the devices plugged into the 
    wall outlet does not exceed the wall outlet’s ampere rating.
    • Do not attempt to service the modules yourself.   
    						
    							47
    INSTALLATION
    CONFIGURATION
    OPERATION
    FURTHERINFORMATION
    INDEX
    RADIO FREQUENCY ENERGY
    A Category 5e (or better) twisted pair cable must be used to connect the units in order 
    to maintain compliance with radio frequency energy emission regulations and ensure a 
    suitably high level of immunity to electromagnetic disturbances.
    All cables used with this equipment must be shielded in order to maintain compliance 
    with radio frequency energy emission regulations and ensure a suitably high level of 
    immunity to electromagnetic disturbances.
    European EMC directive 2004/108/EC
    This equipment has been tested and found to comply with the limits for a class A 
    computing device in accordance with the specifications in the European standard 
    EN55032. These limits are designed to provide reasonable protection against harmful 
    interference. This equipment generates, uses and can radiate radio frequency energy 
    and if not installed and used in accordance with the instructions may cause harmful 
    interference to radio or television reception. However, there is no guarantee that 
    harmful interference will not occur in a particular installation. If this equipment does 
    cause interference to radio or television reception, which can be determined by turning 
    the equipment on and off, the user is encouraged to correct the interference with one 
    or more of the following measures: (a) Reorient or relocate the receiving antenna. 
    (b) Increase the separation between the equipment and the receiver. (c) Connect 
    the equipment to an outlet on a circuit different from that to which the receiver is 
    connected. (d) Consult the supplier or an experienced radio/TV technician for help. 
    FCC Compliance Statement (United States)
    This equipment generates, uses and can radiate radio frequency energy and if not 
    installed and used properly, that is, in strict accordance with the manufacturer’s 
    instructions, may cause interference to radio communication. It has been tested and 
    found to comply with the limits for a class A computing device in accordance with 
    the specifications in Subpart J of part 15 of FCC rules, which are designed to provide 
    reasonable protection against such interference when the equipment is operated in a 
    commercial environment. Operation of this equipment in a residential area may cause 
    interference, in which case the user at his own expense will be required to take whatever 
    measures may be necessary to correct the interference. Changes or modifications not 
    expressly approved by the manufacturer could void the user’s authority to operate the 
    equipment.
    Canadian Department of Communications RFI statement
    This equipment does not exceed the class A limits for radio noise emissions from digital 
    apparatus set out in the radio interference regulations of the Canadian Department of 
    Communications.
    Le présent appareil numérique n’émet pas de bruits radioélectriques dépassant les limites 
    applicables aux appareils numériques de la classe A prescrites dans le règlement sur le 
    brouillage radioélectriques publié par le ministère des Communications du Canada.   
    						
    							48
    INSTALLATION
    CONFIGURATION
    OPERATION
    FURTHERINFORMATION
    INDEX
    www.ctxd.com Documentation by:
    © 2016 Adder Technology Limited
    All trademarks are acknowledged.
    Part No. MAN-DDX-ADDER • Release 1.3a
    Web:  www.adder.com
    Contact:  www.adder.com/contact-details
    Support: www.adder.com/support   
    						
    							49
    INSTALLATION
    CONFIGURATION
    OPERATION
    FURTHERINFORMATION
    INDEX
    HT
    Index
    A
    Access permissions  3
    Add EDID  22
    Audio  36
    Audio connections
    console  14
    Auto Refresh  33
    B
    Backup  32
    C
    Cable types  40
    Category rating  40
    Computer
    choosing  35
    Computer link
    connecting  10
    switch  10
    Computers
    configure  26
    Configure pages  20
    Consoles
    configure  23
    Control page  19
    Crosstalk  40
    D
    Dashboard page  17
    Data link
    console  14
    Data link connection
    computer  9
    DDX-CAM  9
    DDX Matrix
    accessing  16
    DDX-USR switches  13
    DHCP  20
    Diagnostics  31
    DisplayPort  9
    DVI-D  9
    E
    EDID
    applying  28
    EDID management  13
    Exclusive  19
    F
    Firmware upgrade
    extenders  41
    via switch  32
    FTP  40
    G
    Gateway  20
    H
    Headphone connection  14
    Hotkeys  35
    HTTPS  16
    HTTP Server  20
    I
    IEC connector  12
    Ignore Firmware Mismatch  20
    Indicators  37
    modules  38
    switch  37
    Interference
    protection  40
    IP Address  20
    M
    MAC Address  20
    Maintenance pages  31
    Manage EDIDs  22
    Microphone connection  14
    Mode switches  16
    N
    Net Mask  20
    Network link
    connecting  11
    switch  11
    Network port
    temporary connection  16
    Network settings  20
    O
    OSD
    viewing  35
    OSD Settings  21
    P
    Password
    default  16
    PiMF  40
    Port
    designations  4
    reallocation  29
    Power connection
    console  15
    switch  12
    Power disconnect  12
    Primary console  23,24,26,27
    Private  19
    R
    Reallocating ports  29
    Reboot System  32
    Receivers
    configure  25
    Recover
    failed upgrade  34
    receiver  25
    transmitter  28
    Recovering a receiver  25
    Resetting  34
    Restore  32
    RJ-45 socket  10
    S
    Safety information  46
    Screening  40
    Settings  33
    Shared access  19
    Shielding  40
    STP  40
    Switches
    DDX-USR  13
    Sync Tx/Rx Firmware  32
    System Default EDID  20
    System Operations  32
    T
    Thumbnails  21,26
    Transmitters
    configure  28
    U
    Unique ID  25,28
    Upgrade firmware  32,41
    UPnP  16
    USB
    remote module  13
    USB connection
    computer  9
    console  13
    User console link
    switch  10
    Username
    deafult  16
    UTP  40
    V
    Video
    remote module  13
    Video connection
    computer  9
    console  13
    View only  19
    W
    Warranty  46
    Web UI Mode  33   
    						
    All ADDER manuals Comments (0)

    Related Manuals for AdderView DDX CAM Manual